pulumi-gcp 7.36.0a1723105270__py3-none-any.whl → 7.36.0a1723456487__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
  2. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
  3. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
  4. pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
  5. pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
  6. pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
  7. pulumi_gcp/apigateway/api_iam_binding.py +38 -0
  8. pulumi_gcp/apigateway/api_iam_member.py +38 -0
  9. pulumi_gcp/apigateway/api_iam_policy.py +38 -0
  10. pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
  11. pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
  12. pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
  13. pulumi_gcp/apigee/environment_iam_binding.py +40 -0
  14. pulumi_gcp/apigee/environment_iam_member.py +40 -0
  15. pulumi_gcp/apigee/environment_iam_policy.py +40 -0
  16. pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
  17. pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
  18. pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
  19. pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
  20. pulumi_gcp/bigquery/connection_iam_member.py +38 -0
  21. pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
  22. pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
  23. pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
  24. pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
  25. pulumi_gcp/bigquery/iam_binding.py +42 -0
  26. pulumi_gcp/bigquery/iam_member.py +42 -0
  27. pulumi_gcp/bigquery/iam_policy.py +42 -0
  28. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
  29. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
  30. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
  31. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
  32. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
  33. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
  34. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
  35. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
  36. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
  37. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
  38. pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
  39. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
  40. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
  41. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
  42. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
  43. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
  44. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
  45. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
  46. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
  47. pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
  48. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
  49. pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
  50. pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
  51. pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
  52. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
  53. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
  54. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
  55. pulumi_gcp/cloudrun/iam_binding.py +38 -0
  56. pulumi_gcp/cloudrun/iam_member.py +38 -0
  57. pulumi_gcp/cloudrun/iam_policy.py +38 -0
  58. pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
  59. pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
  60. pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
  61. pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
  62. pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
  63. pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
  64. pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
  65. pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
  66. pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
  67. pulumi_gcp/compute/disk_iam_binding.py +38 -0
  68. pulumi_gcp/compute/disk_iam_member.py +38 -0
  69. pulumi_gcp/compute/disk_iam_policy.py +38 -0
  70. pulumi_gcp/compute/image_iam_binding.py +42 -0
  71. pulumi_gcp/compute/image_iam_member.py +42 -0
  72. pulumi_gcp/compute/image_iam_policy.py +42 -0
  73. pulumi_gcp/compute/instance_iam_binding.py +42 -0
  74. pulumi_gcp/compute/instance_iam_member.py +42 -0
  75. pulumi_gcp/compute/instance_iam_policy.py +42 -0
  76. pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
  77. pulumi_gcp/compute/machine_image_iam_member.py +40 -0
  78. pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
  79. pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
  80. pulumi_gcp/compute/region_disk_iam_member.py +38 -0
  81. pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
  82. pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
  83. pulumi_gcp/compute/snapshot_iam_member.py +38 -0
  84. pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
  85. pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
  86. pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
  87. pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
  88. pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
  89. pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
  90. pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
  91. pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
  92. pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
  93. pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
  94. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
  95. pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
  96. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
  97. pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
  98. pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
  99. pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
  100. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
  101. pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
  102. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
  103. pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
  104. pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
  105. pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
  106. pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
  107. pulumi_gcp/dataplex/asset_iam_member.py +38 -0
  108. pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
  109. pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
  110. pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
  111. pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
  112. pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
  113. pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
  114. pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
  115. pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
  116. pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
  117. pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
  118. pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
  119. pulumi_gcp/dataplex/lake_iam_member.py +38 -0
  120. pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
  121. pulumi_gcp/dataplex/task_iam_binding.py +38 -0
  122. pulumi_gcp/dataplex/task_iam_member.py +38 -0
  123. pulumi_gcp/dataplex/task_iam_policy.py +38 -0
  124. pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
  125. pulumi_gcp/dataplex/zone_iam_member.py +38 -0
  126. pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
  127. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
  128. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
  129. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
  130. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
  131. pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
  132. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
  133. pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
  134. pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
  135. pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
  136. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
  137. pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
  138. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
  139. pulumi_gcp/endpoints/service_iam_binding.py +40 -0
  140. pulumi_gcp/endpoints/service_iam_member.py +40 -0
  141. pulumi_gcp/endpoints/service_iam_policy.py +40 -0
  142. pulumi_gcp/folder/iam_audit_config.py +0 -86
  143. pulumi_gcp/folder/iam_member.py +0 -86
  144. pulumi_gcp/folder/iam_policy.py +0 -86
  145. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
  146. pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
  147. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
  148. pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
  149. pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
  150. pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
  151. pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
  152. pulumi_gcp/gkehub/feature_iam_member.py +38 -0
  153. pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
  154. pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
  155. pulumi_gcp/gkehub/membership_iam_member.py +38 -0
  156. pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
  157. pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
  158. pulumi_gcp/gkehub/scope_iam_member.py +38 -0
  159. pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
  160. pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
  161. pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
  162. pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
  163. pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
  164. pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
  165. pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
  166. pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
  167. pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
  168. pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
  169. pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
  170. pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
  171. pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
  172. pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
  173. pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
  174. pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
  175. pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
  176. pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
  177. pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
  178. pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
  179. pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
  180. pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
  181. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
  182. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
  183. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
  184. pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
  185. pulumi_gcp/iap/tunnel_iam_member.py +42 -0
  186. pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
  187. pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
  188. pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
  189. pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
  190. pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
  191. pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
  192. pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
  193. pulumi_gcp/iap/web_iam_binding.py +42 -0
  194. pulumi_gcp/iap/web_iam_member.py +42 -0
  195. pulumi_gcp/iap/web_iam_policy.py +42 -0
  196. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
  197. pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
  198. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
  199. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
  200. pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
  201. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
  202. pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
  203. pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
  204. pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
  205. pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
  206. pulumi_gcp/kms/key_ring_iam_member.py +0 -82
  207. pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
  208. pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
  209. pulumi_gcp/notebooks/instance_iam_member.py +38 -0
  210. pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
  211. pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
  212. pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
  213. pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
  214. pulumi_gcp/organizations/iam_member.py +0 -94
  215. pulumi_gcp/organizations/iam_policy.py +0 -94
  216. pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
  217. pulumi_gcp/pubsub/schema_iam_member.py +38 -0
  218. pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
  219. pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
  220. pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
  221. pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
  222. pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
  223. pulumi_gcp/pubsub/topic_iam_member.py +38 -0
  224. pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
  225. pulumi_gcp/pulumi-plugin.json +1 -1
  226. pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
  227. pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
  228. pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
  229. pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
  230. pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
  231. pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
  232. pulumi_gcp/serviceaccount/get_account.py +6 -6
  233. pulumi_gcp/serviceaccount/key.py +6 -6
  234. pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
  235. pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
  236. pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
  237. pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
  238. pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
  239. pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
  240. pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
  241. pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
  242. pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
  243. pulumi_gcp/spanner/database_iam_binding.py +0 -74
  244. pulumi_gcp/spanner/database_iam_member.py +0 -74
  245. pulumi_gcp/spanner/database_iam_policy.py +0 -74
  246. pulumi_gcp/spanner/instance_iam_binding.py +0 -30
  247. pulumi_gcp/spanner/instance_iam_member.py +0 -30
  248. pulumi_gcp/spanner/instance_iam_policy.py +0 -30
  249. pulumi_gcp/storage/bucket_iam_binding.py +42 -0
  250. pulumi_gcp/storage/bucket_iam_member.py +42 -0
  251. pulumi_gcp/storage/bucket_iam_policy.py +42 -0
  252. pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
  253. pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
  254. pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
  255. pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
  256. pulumi_gcp/tags/tag_key_iam_member.py +40 -0
  257. pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
  258. pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
  259. pulumi_gcp/tags/tag_value_iam_member.py +40 -0
  260. pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
  261. {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/METADATA +1 -1
  262. {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/RECORD +264 -264
  263. {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/WHEEL +0 -0
  264. {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723456487.dist-info}/top_level.txt +0 -0
@@ -347,6 +347,25 @@ class LakeIamMember(pulumi.CustomResource):
347
347
  member="user:jane@example.com")
348
348
  ```
349
349
 
350
+ ## This resource supports User Project Overrides.
351
+
352
+ -
353
+
354
+ # IAM policy for Dataplex Lake
355
+ Three different resources help you manage your IAM policy for Dataplex Lake. Each of these resources serves a different use case:
356
+
357
+ * `dataplex.LakeIamPolicy`: Authoritative. Sets the IAM policy for the lake and replaces any existing policy already attached.
358
+ * `dataplex.LakeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the lake are preserved.
359
+ * `dataplex.LakeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the lake are preserved.
360
+
361
+ A data source can be used to retrieve policy data in advent you do not need creation
362
+
363
+ * `dataplex.LakeIamPolicy`: Retrieves the IAM policy for the lake
364
+
365
+ > **Note:** `dataplex.LakeIamPolicy` **cannot** be used in conjunction with `dataplex.LakeIamBinding` and `dataplex.LakeIamMember` or they will fight over what your policy should be.
366
+
367
+ > **Note:** `dataplex.LakeIamBinding` resources **can be** used in conjunction with `dataplex.LakeIamMember` resources **only if** they do not grant privilege to the same role.
368
+
350
369
  ## dataplex.LakeIamPolicy
351
370
 
352
371
  ```python
@@ -516,6 +535,25 @@ class LakeIamMember(pulumi.CustomResource):
516
535
  member="user:jane@example.com")
517
536
  ```
518
537
 
538
+ ## This resource supports User Project Overrides.
539
+
540
+ -
541
+
542
+ # IAM policy for Dataplex Lake
543
+ Three different resources help you manage your IAM policy for Dataplex Lake. Each of these resources serves a different use case:
544
+
545
+ * `dataplex.LakeIamPolicy`: Authoritative. Sets the IAM policy for the lake and replaces any existing policy already attached.
546
+ * `dataplex.LakeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the lake are preserved.
547
+ * `dataplex.LakeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the lake are preserved.
548
+
549
+ A data source can be used to retrieve policy data in advent you do not need creation
550
+
551
+ * `dataplex.LakeIamPolicy`: Retrieves the IAM policy for the lake
552
+
553
+ > **Note:** `dataplex.LakeIamPolicy` **cannot** be used in conjunction with `dataplex.LakeIamBinding` and `dataplex.LakeIamMember` or they will fight over what your policy should be.
554
+
555
+ > **Note:** `dataplex.LakeIamBinding` resources **can be** used in conjunction with `dataplex.LakeIamMember` resources **only if** they do not grant privilege to the same role.
556
+
519
557
  ## dataplex.LakeIamPolicy
520
558
 
521
559
  ```python
@@ -244,6 +244,25 @@ class LakeIamPolicy(pulumi.CustomResource):
244
244
  member="user:jane@example.com")
245
245
  ```
246
246
 
247
+ ## This resource supports User Project Overrides.
248
+
249
+ -
250
+
251
+ # IAM policy for Dataplex Lake
252
+ Three different resources help you manage your IAM policy for Dataplex Lake. Each of these resources serves a different use case:
253
+
254
+ * `dataplex.LakeIamPolicy`: Authoritative. Sets the IAM policy for the lake and replaces any existing policy already attached.
255
+ * `dataplex.LakeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the lake are preserved.
256
+ * `dataplex.LakeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the lake are preserved.
257
+
258
+ A data source can be used to retrieve policy data in advent you do not need creation
259
+
260
+ * `dataplex.LakeIamPolicy`: Retrieves the IAM policy for the lake
261
+
262
+ > **Note:** `dataplex.LakeIamPolicy` **cannot** be used in conjunction with `dataplex.LakeIamBinding` and `dataplex.LakeIamMember` or they will fight over what your policy should be.
263
+
264
+ > **Note:** `dataplex.LakeIamBinding` resources **can be** used in conjunction with `dataplex.LakeIamMember` resources **only if** they do not grant privilege to the same role.
265
+
247
266
  ## dataplex.LakeIamPolicy
248
267
 
249
268
  ```python
@@ -401,6 +420,25 @@ class LakeIamPolicy(pulumi.CustomResource):
401
420
  member="user:jane@example.com")
402
421
  ```
403
422
 
423
+ ## This resource supports User Project Overrides.
424
+
425
+ -
426
+
427
+ # IAM policy for Dataplex Lake
428
+ Three different resources help you manage your IAM policy for Dataplex Lake. Each of these resources serves a different use case:
429
+
430
+ * `dataplex.LakeIamPolicy`: Authoritative. Sets the IAM policy for the lake and replaces any existing policy already attached.
431
+ * `dataplex.LakeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the lake are preserved.
432
+ * `dataplex.LakeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the lake are preserved.
433
+
434
+ A data source can be used to retrieve policy data in advent you do not need creation
435
+
436
+ * `dataplex.LakeIamPolicy`: Retrieves the IAM policy for the lake
437
+
438
+ > **Note:** `dataplex.LakeIamPolicy` **cannot** be used in conjunction with `dataplex.LakeIamBinding` and `dataplex.LakeIamMember` or they will fight over what your policy should be.
439
+
440
+ > **Note:** `dataplex.LakeIamBinding` resources **can be** used in conjunction with `dataplex.LakeIamMember` resources **only if** they do not grant privilege to the same role.
441
+
404
442
  ## dataplex.LakeIamPolicy
405
443
 
406
444
  ```python
@@ -398,6 +398,25 @@ class TaskIamBinding(pulumi.CustomResource):
398
398
  member="user:jane@example.com")
399
399
  ```
400
400
 
401
+ ## This resource supports User Project Overrides.
402
+
403
+ -
404
+
405
+ # IAM policy for Dataplex Task
406
+ Three different resources help you manage your IAM policy for Dataplex Task. Each of these resources serves a different use case:
407
+
408
+ * `dataplex.TaskIamPolicy`: Authoritative. Sets the IAM policy for the task and replaces any existing policy already attached.
409
+ * `dataplex.TaskIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the task are preserved.
410
+ * `dataplex.TaskIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the task are preserved.
411
+
412
+ A data source can be used to retrieve policy data in advent you do not need creation
413
+
414
+ * `dataplex.TaskIamPolicy`: Retrieves the IAM policy for the task
415
+
416
+ > **Note:** `dataplex.TaskIamPolicy` **cannot** be used in conjunction with `dataplex.TaskIamBinding` and `dataplex.TaskIamMember` or they will fight over what your policy should be.
417
+
418
+ > **Note:** `dataplex.TaskIamBinding` resources **can be** used in conjunction with `dataplex.TaskIamMember` resources **only if** they do not grant privilege to the same role.
419
+
401
420
  ## dataplex.TaskIamPolicy
402
421
 
403
422
  ```python
@@ -578,6 +597,25 @@ class TaskIamBinding(pulumi.CustomResource):
578
597
  member="user:jane@example.com")
579
598
  ```
580
599
 
600
+ ## This resource supports User Project Overrides.
601
+
602
+ -
603
+
604
+ # IAM policy for Dataplex Task
605
+ Three different resources help you manage your IAM policy for Dataplex Task. Each of these resources serves a different use case:
606
+
607
+ * `dataplex.TaskIamPolicy`: Authoritative. Sets the IAM policy for the task and replaces any existing policy already attached.
608
+ * `dataplex.TaskIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the task are preserved.
609
+ * `dataplex.TaskIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the task are preserved.
610
+
611
+ A data source can be used to retrieve policy data in advent you do not need creation
612
+
613
+ * `dataplex.TaskIamPolicy`: Retrieves the IAM policy for the task
614
+
615
+ > **Note:** `dataplex.TaskIamPolicy` **cannot** be used in conjunction with `dataplex.TaskIamBinding` and `dataplex.TaskIamMember` or they will fight over what your policy should be.
616
+
617
+ > **Note:** `dataplex.TaskIamBinding` resources **can be** used in conjunction with `dataplex.TaskIamMember` resources **only if** they do not grant privilege to the same role.
618
+
581
619
  ## dataplex.TaskIamPolicy
582
620
 
583
621
  ```python
@@ -398,6 +398,25 @@ class TaskIamMember(pulumi.CustomResource):
398
398
  member="user:jane@example.com")
399
399
  ```
400
400
 
401
+ ## This resource supports User Project Overrides.
402
+
403
+ -
404
+
405
+ # IAM policy for Dataplex Task
406
+ Three different resources help you manage your IAM policy for Dataplex Task. Each of these resources serves a different use case:
407
+
408
+ * `dataplex.TaskIamPolicy`: Authoritative. Sets the IAM policy for the task and replaces any existing policy already attached.
409
+ * `dataplex.TaskIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the task are preserved.
410
+ * `dataplex.TaskIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the task are preserved.
411
+
412
+ A data source can be used to retrieve policy data in advent you do not need creation
413
+
414
+ * `dataplex.TaskIamPolicy`: Retrieves the IAM policy for the task
415
+
416
+ > **Note:** `dataplex.TaskIamPolicy` **cannot** be used in conjunction with `dataplex.TaskIamBinding` and `dataplex.TaskIamMember` or they will fight over what your policy should be.
417
+
418
+ > **Note:** `dataplex.TaskIamBinding` resources **can be** used in conjunction with `dataplex.TaskIamMember` resources **only if** they do not grant privilege to the same role.
419
+
401
420
  ## dataplex.TaskIamPolicy
402
421
 
403
422
  ```python
@@ -578,6 +597,25 @@ class TaskIamMember(pulumi.CustomResource):
578
597
  member="user:jane@example.com")
579
598
  ```
580
599
 
600
+ ## This resource supports User Project Overrides.
601
+
602
+ -
603
+
604
+ # IAM policy for Dataplex Task
605
+ Three different resources help you manage your IAM policy for Dataplex Task. Each of these resources serves a different use case:
606
+
607
+ * `dataplex.TaskIamPolicy`: Authoritative. Sets the IAM policy for the task and replaces any existing policy already attached.
608
+ * `dataplex.TaskIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the task are preserved.
609
+ * `dataplex.TaskIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the task are preserved.
610
+
611
+ A data source can be used to retrieve policy data in advent you do not need creation
612
+
613
+ * `dataplex.TaskIamPolicy`: Retrieves the IAM policy for the task
614
+
615
+ > **Note:** `dataplex.TaskIamPolicy` **cannot** be used in conjunction with `dataplex.TaskIamBinding` and `dataplex.TaskIamMember` or they will fight over what your policy should be.
616
+
617
+ > **Note:** `dataplex.TaskIamBinding` resources **can be** used in conjunction with `dataplex.TaskIamMember` resources **only if** they do not grant privilege to the same role.
618
+
581
619
  ## dataplex.TaskIamPolicy
582
620
 
583
621
  ```python
@@ -295,6 +295,25 @@ class TaskIamPolicy(pulumi.CustomResource):
295
295
  member="user:jane@example.com")
296
296
  ```
297
297
 
298
+ ## This resource supports User Project Overrides.
299
+
300
+ -
301
+
302
+ # IAM policy for Dataplex Task
303
+ Three different resources help you manage your IAM policy for Dataplex Task. Each of these resources serves a different use case:
304
+
305
+ * `dataplex.TaskIamPolicy`: Authoritative. Sets the IAM policy for the task and replaces any existing policy already attached.
306
+ * `dataplex.TaskIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the task are preserved.
307
+ * `dataplex.TaskIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the task are preserved.
308
+
309
+ A data source can be used to retrieve policy data in advent you do not need creation
310
+
311
+ * `dataplex.TaskIamPolicy`: Retrieves the IAM policy for the task
312
+
313
+ > **Note:** `dataplex.TaskIamPolicy` **cannot** be used in conjunction with `dataplex.TaskIamBinding` and `dataplex.TaskIamMember` or they will fight over what your policy should be.
314
+
315
+ > **Note:** `dataplex.TaskIamBinding` resources **can be** used in conjunction with `dataplex.TaskIamMember` resources **only if** they do not grant privilege to the same role.
316
+
298
317
  ## dataplex.TaskIamPolicy
299
318
 
300
319
  ```python
@@ -463,6 +482,25 @@ class TaskIamPolicy(pulumi.CustomResource):
463
482
  member="user:jane@example.com")
464
483
  ```
465
484
 
485
+ ## This resource supports User Project Overrides.
486
+
487
+ -
488
+
489
+ # IAM policy for Dataplex Task
490
+ Three different resources help you manage your IAM policy for Dataplex Task. Each of these resources serves a different use case:
491
+
492
+ * `dataplex.TaskIamPolicy`: Authoritative. Sets the IAM policy for the task and replaces any existing policy already attached.
493
+ * `dataplex.TaskIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the task are preserved.
494
+ * `dataplex.TaskIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the task are preserved.
495
+
496
+ A data source can be used to retrieve policy data in advent you do not need creation
497
+
498
+ * `dataplex.TaskIamPolicy`: Retrieves the IAM policy for the task
499
+
500
+ > **Note:** `dataplex.TaskIamPolicy` **cannot** be used in conjunction with `dataplex.TaskIamBinding` and `dataplex.TaskIamMember` or they will fight over what your policy should be.
501
+
502
+ > **Note:** `dataplex.TaskIamBinding` resources **can be** used in conjunction with `dataplex.TaskIamMember` resources **only if** they do not grant privilege to the same role.
503
+
466
504
  ## dataplex.TaskIamPolicy
467
505
 
468
506
  ```python
@@ -374,6 +374,25 @@ class ZoneIamBinding(pulumi.CustomResource):
374
374
  member="user:jane@example.com")
375
375
  ```
376
376
 
377
+ ## This resource supports User Project Overrides.
378
+
379
+ -
380
+
381
+ # IAM policy for Dataplex Zone
382
+ Three different resources help you manage your IAM policy for Dataplex Zone. Each of these resources serves a different use case:
383
+
384
+ * `dataplex.ZoneIamPolicy`: Authoritative. Sets the IAM policy for the zone and replaces any existing policy already attached.
385
+ * `dataplex.ZoneIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the zone are preserved.
386
+ * `dataplex.ZoneIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the zone are preserved.
387
+
388
+ A data source can be used to retrieve policy data in advent you do not need creation
389
+
390
+ * `dataplex.ZoneIamPolicy`: Retrieves the IAM policy for the zone
391
+
392
+ > **Note:** `dataplex.ZoneIamPolicy` **cannot** be used in conjunction with `dataplex.ZoneIamBinding` and `dataplex.ZoneIamMember` or they will fight over what your policy should be.
393
+
394
+ > **Note:** `dataplex.ZoneIamBinding` resources **can be** used in conjunction with `dataplex.ZoneIamMember` resources **only if** they do not grant privilege to the same role.
395
+
377
396
  ## dataplex.ZoneIamPolicy
378
397
 
379
398
  ```python
@@ -549,6 +568,25 @@ class ZoneIamBinding(pulumi.CustomResource):
549
568
  member="user:jane@example.com")
550
569
  ```
551
570
 
571
+ ## This resource supports User Project Overrides.
572
+
573
+ -
574
+
575
+ # IAM policy for Dataplex Zone
576
+ Three different resources help you manage your IAM policy for Dataplex Zone. Each of these resources serves a different use case:
577
+
578
+ * `dataplex.ZoneIamPolicy`: Authoritative. Sets the IAM policy for the zone and replaces any existing policy already attached.
579
+ * `dataplex.ZoneIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the zone are preserved.
580
+ * `dataplex.ZoneIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the zone are preserved.
581
+
582
+ A data source can be used to retrieve policy data in advent you do not need creation
583
+
584
+ * `dataplex.ZoneIamPolicy`: Retrieves the IAM policy for the zone
585
+
586
+ > **Note:** `dataplex.ZoneIamPolicy` **cannot** be used in conjunction with `dataplex.ZoneIamBinding` and `dataplex.ZoneIamMember` or they will fight over what your policy should be.
587
+
588
+ > **Note:** `dataplex.ZoneIamBinding` resources **can be** used in conjunction with `dataplex.ZoneIamMember` resources **only if** they do not grant privilege to the same role.
589
+
552
590
  ## dataplex.ZoneIamPolicy
553
591
 
554
592
  ```python
@@ -374,6 +374,25 @@ class ZoneIamMember(pulumi.CustomResource):
374
374
  member="user:jane@example.com")
375
375
  ```
376
376
 
377
+ ## This resource supports User Project Overrides.
378
+
379
+ -
380
+
381
+ # IAM policy for Dataplex Zone
382
+ Three different resources help you manage your IAM policy for Dataplex Zone. Each of these resources serves a different use case:
383
+
384
+ * `dataplex.ZoneIamPolicy`: Authoritative. Sets the IAM policy for the zone and replaces any existing policy already attached.
385
+ * `dataplex.ZoneIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the zone are preserved.
386
+ * `dataplex.ZoneIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the zone are preserved.
387
+
388
+ A data source can be used to retrieve policy data in advent you do not need creation
389
+
390
+ * `dataplex.ZoneIamPolicy`: Retrieves the IAM policy for the zone
391
+
392
+ > **Note:** `dataplex.ZoneIamPolicy` **cannot** be used in conjunction with `dataplex.ZoneIamBinding` and `dataplex.ZoneIamMember` or they will fight over what your policy should be.
393
+
394
+ > **Note:** `dataplex.ZoneIamBinding` resources **can be** used in conjunction with `dataplex.ZoneIamMember` resources **only if** they do not grant privilege to the same role.
395
+
377
396
  ## dataplex.ZoneIamPolicy
378
397
 
379
398
  ```python
@@ -549,6 +568,25 @@ class ZoneIamMember(pulumi.CustomResource):
549
568
  member="user:jane@example.com")
550
569
  ```
551
570
 
571
+ ## This resource supports User Project Overrides.
572
+
573
+ -
574
+
575
+ # IAM policy for Dataplex Zone
576
+ Three different resources help you manage your IAM policy for Dataplex Zone. Each of these resources serves a different use case:
577
+
578
+ * `dataplex.ZoneIamPolicy`: Authoritative. Sets the IAM policy for the zone and replaces any existing policy already attached.
579
+ * `dataplex.ZoneIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the zone are preserved.
580
+ * `dataplex.ZoneIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the zone are preserved.
581
+
582
+ A data source can be used to retrieve policy data in advent you do not need creation
583
+
584
+ * `dataplex.ZoneIamPolicy`: Retrieves the IAM policy for the zone
585
+
586
+ > **Note:** `dataplex.ZoneIamPolicy` **cannot** be used in conjunction with `dataplex.ZoneIamBinding` and `dataplex.ZoneIamMember` or they will fight over what your policy should be.
587
+
588
+ > **Note:** `dataplex.ZoneIamBinding` resources **can be** used in conjunction with `dataplex.ZoneIamMember` resources **only if** they do not grant privilege to the same role.
589
+
552
590
  ## dataplex.ZoneIamPolicy
553
591
 
554
592
  ```python
@@ -271,6 +271,25 @@ class ZoneIamPolicy(pulumi.CustomResource):
271
271
  member="user:jane@example.com")
272
272
  ```
273
273
 
274
+ ## This resource supports User Project Overrides.
275
+
276
+ -
277
+
278
+ # IAM policy for Dataplex Zone
279
+ Three different resources help you manage your IAM policy for Dataplex Zone. Each of these resources serves a different use case:
280
+
281
+ * `dataplex.ZoneIamPolicy`: Authoritative. Sets the IAM policy for the zone and replaces any existing policy already attached.
282
+ * `dataplex.ZoneIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the zone are preserved.
283
+ * `dataplex.ZoneIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the zone are preserved.
284
+
285
+ A data source can be used to retrieve policy data in advent you do not need creation
286
+
287
+ * `dataplex.ZoneIamPolicy`: Retrieves the IAM policy for the zone
288
+
289
+ > **Note:** `dataplex.ZoneIamPolicy` **cannot** be used in conjunction with `dataplex.ZoneIamBinding` and `dataplex.ZoneIamMember` or they will fight over what your policy should be.
290
+
291
+ > **Note:** `dataplex.ZoneIamBinding` resources **can be** used in conjunction with `dataplex.ZoneIamMember` resources **only if** they do not grant privilege to the same role.
292
+
274
293
  ## dataplex.ZoneIamPolicy
275
294
 
276
295
  ```python
@@ -434,6 +453,25 @@ class ZoneIamPolicy(pulumi.CustomResource):
434
453
  member="user:jane@example.com")
435
454
  ```
436
455
 
456
+ ## This resource supports User Project Overrides.
457
+
458
+ -
459
+
460
+ # IAM policy for Dataplex Zone
461
+ Three different resources help you manage your IAM policy for Dataplex Zone. Each of these resources serves a different use case:
462
+
463
+ * `dataplex.ZoneIamPolicy`: Authoritative. Sets the IAM policy for the zone and replaces any existing policy already attached.
464
+ * `dataplex.ZoneIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the zone are preserved.
465
+ * `dataplex.ZoneIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the zone are preserved.
466
+
467
+ A data source can be used to retrieve policy data in advent you do not need creation
468
+
469
+ * `dataplex.ZoneIamPolicy`: Retrieves the IAM policy for the zone
470
+
471
+ > **Note:** `dataplex.ZoneIamPolicy` **cannot** be used in conjunction with `dataplex.ZoneIamBinding` and `dataplex.ZoneIamMember` or they will fight over what your policy should be.
472
+
473
+ > **Note:** `dataplex.ZoneIamBinding` resources **can be** used in conjunction with `dataplex.ZoneIamMember` resources **only if** they do not grant privilege to the same role.
474
+
437
475
  ## dataplex.ZoneIamPolicy
438
476
 
439
477
  ```python
@@ -383,6 +383,25 @@ class AutoscalingPolicyIamBinding(pulumi.CustomResource):
383
383
  member="user:jane@example.com")
384
384
  ```
385
385
 
386
+ ## This resource supports User Project Overrides.
387
+
388
+ -
389
+
390
+ # IAM policy for Dataproc AutoscalingPolicy
391
+ Three different resources help you manage your IAM policy for Dataproc AutoscalingPolicy. Each of these resources serves a different use case:
392
+
393
+ * `dataproc.AutoscalingPolicyIamPolicy`: Authoritative. Sets the IAM policy for the autoscalingpolicy and replaces any existing policy already attached.
394
+ * `dataproc.AutoscalingPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the autoscalingpolicy are preserved.
395
+ * `dataproc.AutoscalingPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the autoscalingpolicy are preserved.
396
+
397
+ A data source can be used to retrieve policy data in advent you do not need creation
398
+
399
+ * `dataproc.AutoscalingPolicyIamPolicy`: Retrieves the IAM policy for the autoscalingpolicy
400
+
401
+ > **Note:** `dataproc.AutoscalingPolicyIamPolicy` **cannot** be used in conjunction with `dataproc.AutoscalingPolicyIamBinding` and `dataproc.AutoscalingPolicyIamMember` or they will fight over what your policy should be.
402
+
403
+ > **Note:** `dataproc.AutoscalingPolicyIamBinding` resources **can be** used in conjunction with `dataproc.AutoscalingPolicyIamMember` resources **only if** they do not grant privilege to the same role.
404
+
386
405
  ## dataproc.AutoscalingPolicyIamPolicy
387
406
 
388
407
  ```python
@@ -560,6 +579,25 @@ class AutoscalingPolicyIamBinding(pulumi.CustomResource):
560
579
  member="user:jane@example.com")
561
580
  ```
562
581
 
582
+ ## This resource supports User Project Overrides.
583
+
584
+ -
585
+
586
+ # IAM policy for Dataproc AutoscalingPolicy
587
+ Three different resources help you manage your IAM policy for Dataproc AutoscalingPolicy. Each of these resources serves a different use case:
588
+
589
+ * `dataproc.AutoscalingPolicyIamPolicy`: Authoritative. Sets the IAM policy for the autoscalingpolicy and replaces any existing policy already attached.
590
+ * `dataproc.AutoscalingPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the autoscalingpolicy are preserved.
591
+ * `dataproc.AutoscalingPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the autoscalingpolicy are preserved.
592
+
593
+ A data source can be used to retrieve policy data in advent you do not need creation
594
+
595
+ * `dataproc.AutoscalingPolicyIamPolicy`: Retrieves the IAM policy for the autoscalingpolicy
596
+
597
+ > **Note:** `dataproc.AutoscalingPolicyIamPolicy` **cannot** be used in conjunction with `dataproc.AutoscalingPolicyIamBinding` and `dataproc.AutoscalingPolicyIamMember` or they will fight over what your policy should be.
598
+
599
+ > **Note:** `dataproc.AutoscalingPolicyIamBinding` resources **can be** used in conjunction with `dataproc.AutoscalingPolicyIamMember` resources **only if** they do not grant privilege to the same role.
600
+
563
601
  ## dataproc.AutoscalingPolicyIamPolicy
564
602
 
565
603
  ```python
@@ -383,6 +383,25 @@ class AutoscalingPolicyIamMember(pulumi.CustomResource):
383
383
  member="user:jane@example.com")
384
384
  ```
385
385
 
386
+ ## This resource supports User Project Overrides.
387
+
388
+ -
389
+
390
+ # IAM policy for Dataproc AutoscalingPolicy
391
+ Three different resources help you manage your IAM policy for Dataproc AutoscalingPolicy. Each of these resources serves a different use case:
392
+
393
+ * `dataproc.AutoscalingPolicyIamPolicy`: Authoritative. Sets the IAM policy for the autoscalingpolicy and replaces any existing policy already attached.
394
+ * `dataproc.AutoscalingPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the autoscalingpolicy are preserved.
395
+ * `dataproc.AutoscalingPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the autoscalingpolicy are preserved.
396
+
397
+ A data source can be used to retrieve policy data in advent you do not need creation
398
+
399
+ * `dataproc.AutoscalingPolicyIamPolicy`: Retrieves the IAM policy for the autoscalingpolicy
400
+
401
+ > **Note:** `dataproc.AutoscalingPolicyIamPolicy` **cannot** be used in conjunction with `dataproc.AutoscalingPolicyIamBinding` and `dataproc.AutoscalingPolicyIamMember` or they will fight over what your policy should be.
402
+
403
+ > **Note:** `dataproc.AutoscalingPolicyIamBinding` resources **can be** used in conjunction with `dataproc.AutoscalingPolicyIamMember` resources **only if** they do not grant privilege to the same role.
404
+
386
405
  ## dataproc.AutoscalingPolicyIamPolicy
387
406
 
388
407
  ```python
@@ -560,6 +579,25 @@ class AutoscalingPolicyIamMember(pulumi.CustomResource):
560
579
  member="user:jane@example.com")
561
580
  ```
562
581
 
582
+ ## This resource supports User Project Overrides.
583
+
584
+ -
585
+
586
+ # IAM policy for Dataproc AutoscalingPolicy
587
+ Three different resources help you manage your IAM policy for Dataproc AutoscalingPolicy. Each of these resources serves a different use case:
588
+
589
+ * `dataproc.AutoscalingPolicyIamPolicy`: Authoritative. Sets the IAM policy for the autoscalingpolicy and replaces any existing policy already attached.
590
+ * `dataproc.AutoscalingPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the autoscalingpolicy are preserved.
591
+ * `dataproc.AutoscalingPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the autoscalingpolicy are preserved.
592
+
593
+ A data source can be used to retrieve policy data in advent you do not need creation
594
+
595
+ * `dataproc.AutoscalingPolicyIamPolicy`: Retrieves the IAM policy for the autoscalingpolicy
596
+
597
+ > **Note:** `dataproc.AutoscalingPolicyIamPolicy` **cannot** be used in conjunction with `dataproc.AutoscalingPolicyIamBinding` and `dataproc.AutoscalingPolicyIamMember` or they will fight over what your policy should be.
598
+
599
+ > **Note:** `dataproc.AutoscalingPolicyIamBinding` resources **can be** used in conjunction with `dataproc.AutoscalingPolicyIamMember` resources **only if** they do not grant privilege to the same role.
600
+
563
601
  ## dataproc.AutoscalingPolicyIamPolicy
564
602
 
565
603
  ```python
@@ -280,6 +280,25 @@ class AutoscalingPolicyIamPolicy(pulumi.CustomResource):
280
280
  member="user:jane@example.com")
281
281
  ```
282
282
 
283
+ ## This resource supports User Project Overrides.
284
+
285
+ -
286
+
287
+ # IAM policy for Dataproc AutoscalingPolicy
288
+ Three different resources help you manage your IAM policy for Dataproc AutoscalingPolicy. Each of these resources serves a different use case:
289
+
290
+ * `dataproc.AutoscalingPolicyIamPolicy`: Authoritative. Sets the IAM policy for the autoscalingpolicy and replaces any existing policy already attached.
291
+ * `dataproc.AutoscalingPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the autoscalingpolicy are preserved.
292
+ * `dataproc.AutoscalingPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the autoscalingpolicy are preserved.
293
+
294
+ A data source can be used to retrieve policy data in advent you do not need creation
295
+
296
+ * `dataproc.AutoscalingPolicyIamPolicy`: Retrieves the IAM policy for the autoscalingpolicy
297
+
298
+ > **Note:** `dataproc.AutoscalingPolicyIamPolicy` **cannot** be used in conjunction with `dataproc.AutoscalingPolicyIamBinding` and `dataproc.AutoscalingPolicyIamMember` or they will fight over what your policy should be.
299
+
300
+ > **Note:** `dataproc.AutoscalingPolicyIamBinding` resources **can be** used in conjunction with `dataproc.AutoscalingPolicyIamMember` resources **only if** they do not grant privilege to the same role.
301
+
283
302
  ## dataproc.AutoscalingPolicyIamPolicy
284
303
 
285
304
  ```python
@@ -445,6 +464,25 @@ class AutoscalingPolicyIamPolicy(pulumi.CustomResource):
445
464
  member="user:jane@example.com")
446
465
  ```
447
466
 
467
+ ## This resource supports User Project Overrides.
468
+
469
+ -
470
+
471
+ # IAM policy for Dataproc AutoscalingPolicy
472
+ Three different resources help you manage your IAM policy for Dataproc AutoscalingPolicy. Each of these resources serves a different use case:
473
+
474
+ * `dataproc.AutoscalingPolicyIamPolicy`: Authoritative. Sets the IAM policy for the autoscalingpolicy and replaces any existing policy already attached.
475
+ * `dataproc.AutoscalingPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the autoscalingpolicy are preserved.
476
+ * `dataproc.AutoscalingPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the autoscalingpolicy are preserved.
477
+
478
+ A data source can be used to retrieve policy data in advent you do not need creation
479
+
480
+ * `dataproc.AutoscalingPolicyIamPolicy`: Retrieves the IAM policy for the autoscalingpolicy
481
+
482
+ > **Note:** `dataproc.AutoscalingPolicyIamPolicy` **cannot** be used in conjunction with `dataproc.AutoscalingPolicyIamBinding` and `dataproc.AutoscalingPolicyIamMember` or they will fight over what your policy should be.
483
+
484
+ > **Note:** `dataproc.AutoscalingPolicyIamBinding` resources **can be** used in conjunction with `dataproc.AutoscalingPolicyIamMember` resources **only if** they do not grant privilege to the same role.
485
+
448
486
  ## dataproc.AutoscalingPolicyIamPolicy
449
487
 
450
488
  ```python
@@ -359,6 +359,25 @@ class MetastoreFederationIamBinding(pulumi.CustomResource):
359
359
  member="user:jane@example.com")
360
360
  ```
361
361
 
362
+ ## This resource supports User Project Overrides.
363
+
364
+ -
365
+
366
+ # IAM policy for Dataproc metastore Federation
367
+ Three different resources help you manage your IAM policy for Dataproc metastore Federation. Each of these resources serves a different use case:
368
+
369
+ * `dataproc.MetastoreFederationIamPolicy`: Authoritative. Sets the IAM policy for the federation and replaces any existing policy already attached.
370
+ * `dataproc.MetastoreFederationIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the federation are preserved.
371
+ * `dataproc.MetastoreFederationIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the federation are preserved.
372
+
373
+ A data source can be used to retrieve policy data in advent you do not need creation
374
+
375
+ * `dataproc.MetastoreFederationIamPolicy`: Retrieves the IAM policy for the federation
376
+
377
+ > **Note:** `dataproc.MetastoreFederationIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreFederationIamBinding` and `dataproc.MetastoreFederationIamMember` or they will fight over what your policy should be.
378
+
379
+ > **Note:** `dataproc.MetastoreFederationIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreFederationIamMember` resources **only if** they do not grant privilege to the same role.
380
+
362
381
  ## dataproc.MetastoreFederationIamPolicy
363
382
 
364
383
  ```python
@@ -531,6 +550,25 @@ class MetastoreFederationIamBinding(pulumi.CustomResource):
531
550
  member="user:jane@example.com")
532
551
  ```
533
552
 
553
+ ## This resource supports User Project Overrides.
554
+
555
+ -
556
+
557
+ # IAM policy for Dataproc metastore Federation
558
+ Three different resources help you manage your IAM policy for Dataproc metastore Federation. Each of these resources serves a different use case:
559
+
560
+ * `dataproc.MetastoreFederationIamPolicy`: Authoritative. Sets the IAM policy for the federation and replaces any existing policy already attached.
561
+ * `dataproc.MetastoreFederationIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the federation are preserved.
562
+ * `dataproc.MetastoreFederationIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the federation are preserved.
563
+
564
+ A data source can be used to retrieve policy data in advent you do not need creation
565
+
566
+ * `dataproc.MetastoreFederationIamPolicy`: Retrieves the IAM policy for the federation
567
+
568
+ > **Note:** `dataproc.MetastoreFederationIamPolicy` **cannot** be used in conjunction with `dataproc.MetastoreFederationIamBinding` and `dataproc.MetastoreFederationIamMember` or they will fight over what your policy should be.
569
+
570
+ > **Note:** `dataproc.MetastoreFederationIamBinding` resources **can be** used in conjunction with `dataproc.MetastoreFederationIamMember` resources **only if** they do not grant privilege to the same role.
571
+
534
572
  ## dataproc.MetastoreFederationIamPolicy
535
573
 
536
574
  ```python