pulumi-gcp 7.36.0a1723105270__py3-none-any.whl → 7.36.0a1723631483__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
  2. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
  3. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
  4. pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
  5. pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
  6. pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
  7. pulumi_gcp/apigateway/api_iam_binding.py +38 -0
  8. pulumi_gcp/apigateway/api_iam_member.py +38 -0
  9. pulumi_gcp/apigateway/api_iam_policy.py +38 -0
  10. pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
  11. pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
  12. pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
  13. pulumi_gcp/apigee/environment_iam_binding.py +40 -0
  14. pulumi_gcp/apigee/environment_iam_member.py +40 -0
  15. pulumi_gcp/apigee/environment_iam_policy.py +40 -0
  16. pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
  17. pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
  18. pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
  19. pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
  20. pulumi_gcp/bigquery/connection_iam_member.py +38 -0
  21. pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
  22. pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
  23. pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
  24. pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
  25. pulumi_gcp/bigquery/iam_binding.py +42 -0
  26. pulumi_gcp/bigquery/iam_member.py +42 -0
  27. pulumi_gcp/bigquery/iam_policy.py +42 -0
  28. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
  29. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
  30. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
  31. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
  32. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
  33. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
  34. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
  35. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
  36. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
  37. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
  38. pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
  39. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
  40. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
  41. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
  42. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
  43. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
  44. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
  45. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
  46. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
  47. pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
  48. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
  49. pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
  50. pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
  51. pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
  52. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
  53. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
  54. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
  55. pulumi_gcp/cloudrun/iam_binding.py +38 -0
  56. pulumi_gcp/cloudrun/iam_member.py +38 -0
  57. pulumi_gcp/cloudrun/iam_policy.py +38 -0
  58. pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
  59. pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
  60. pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
  61. pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
  62. pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
  63. pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
  64. pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
  65. pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
  66. pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
  67. pulumi_gcp/compute/disk_iam_binding.py +38 -0
  68. pulumi_gcp/compute/disk_iam_member.py +38 -0
  69. pulumi_gcp/compute/disk_iam_policy.py +38 -0
  70. pulumi_gcp/compute/image_iam_binding.py +42 -0
  71. pulumi_gcp/compute/image_iam_member.py +42 -0
  72. pulumi_gcp/compute/image_iam_policy.py +42 -0
  73. pulumi_gcp/compute/instance_iam_binding.py +42 -0
  74. pulumi_gcp/compute/instance_iam_member.py +42 -0
  75. pulumi_gcp/compute/instance_iam_policy.py +42 -0
  76. pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
  77. pulumi_gcp/compute/machine_image_iam_member.py +40 -0
  78. pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
  79. pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
  80. pulumi_gcp/compute/region_disk_iam_member.py +38 -0
  81. pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
  82. pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
  83. pulumi_gcp/compute/snapshot_iam_member.py +38 -0
  84. pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
  85. pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
  86. pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
  87. pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
  88. pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
  89. pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
  90. pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
  91. pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
  92. pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
  93. pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
  94. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
  95. pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
  96. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
  97. pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
  98. pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
  99. pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
  100. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
  101. pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
  102. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
  103. pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
  104. pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
  105. pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
  106. pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
  107. pulumi_gcp/dataplex/asset_iam_member.py +38 -0
  108. pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
  109. pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
  110. pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
  111. pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
  112. pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
  113. pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
  114. pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
  115. pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
  116. pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
  117. pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
  118. pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
  119. pulumi_gcp/dataplex/lake_iam_member.py +38 -0
  120. pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
  121. pulumi_gcp/dataplex/task_iam_binding.py +38 -0
  122. pulumi_gcp/dataplex/task_iam_member.py +38 -0
  123. pulumi_gcp/dataplex/task_iam_policy.py +38 -0
  124. pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
  125. pulumi_gcp/dataplex/zone_iam_member.py +38 -0
  126. pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
  127. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
  128. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
  129. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
  130. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
  131. pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
  132. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
  133. pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
  134. pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
  135. pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
  136. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
  137. pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
  138. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
  139. pulumi_gcp/endpoints/service_iam_binding.py +40 -0
  140. pulumi_gcp/endpoints/service_iam_member.py +40 -0
  141. pulumi_gcp/endpoints/service_iam_policy.py +40 -0
  142. pulumi_gcp/folder/iam_audit_config.py +0 -86
  143. pulumi_gcp/folder/iam_member.py +0 -86
  144. pulumi_gcp/folder/iam_policy.py +0 -86
  145. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
  146. pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
  147. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
  148. pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
  149. pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
  150. pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
  151. pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
  152. pulumi_gcp/gkehub/feature_iam_member.py +38 -0
  153. pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
  154. pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
  155. pulumi_gcp/gkehub/membership_iam_member.py +38 -0
  156. pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
  157. pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
  158. pulumi_gcp/gkehub/scope_iam_member.py +38 -0
  159. pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
  160. pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
  161. pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
  162. pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
  163. pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
  164. pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
  165. pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
  166. pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
  167. pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
  168. pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
  169. pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
  170. pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
  171. pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
  172. pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
  173. pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
  174. pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
  175. pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
  176. pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
  177. pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
  178. pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
  179. pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
  180. pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
  181. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
  182. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
  183. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
  184. pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
  185. pulumi_gcp/iap/tunnel_iam_member.py +42 -0
  186. pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
  187. pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
  188. pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
  189. pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
  190. pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
  191. pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
  192. pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
  193. pulumi_gcp/iap/web_iam_binding.py +42 -0
  194. pulumi_gcp/iap/web_iam_member.py +42 -0
  195. pulumi_gcp/iap/web_iam_policy.py +42 -0
  196. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
  197. pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
  198. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
  199. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
  200. pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
  201. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
  202. pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
  203. pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
  204. pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
  205. pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
  206. pulumi_gcp/kms/key_ring_iam_member.py +0 -82
  207. pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
  208. pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
  209. pulumi_gcp/notebooks/instance_iam_member.py +38 -0
  210. pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
  211. pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
  212. pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
  213. pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
  214. pulumi_gcp/organizations/iam_member.py +0 -94
  215. pulumi_gcp/organizations/iam_policy.py +0 -94
  216. pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
  217. pulumi_gcp/pubsub/schema_iam_member.py +38 -0
  218. pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
  219. pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
  220. pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
  221. pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
  222. pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
  223. pulumi_gcp/pubsub/topic_iam_member.py +38 -0
  224. pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
  225. pulumi_gcp/pulumi-plugin.json +1 -1
  226. pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
  227. pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
  228. pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
  229. pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
  230. pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
  231. pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
  232. pulumi_gcp/serviceaccount/get_account.py +6 -6
  233. pulumi_gcp/serviceaccount/key.py +6 -6
  234. pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
  235. pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
  236. pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
  237. pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
  238. pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
  239. pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
  240. pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
  241. pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
  242. pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
  243. pulumi_gcp/spanner/database_iam_binding.py +0 -74
  244. pulumi_gcp/spanner/database_iam_member.py +0 -74
  245. pulumi_gcp/spanner/database_iam_policy.py +0 -74
  246. pulumi_gcp/spanner/instance_iam_binding.py +0 -30
  247. pulumi_gcp/spanner/instance_iam_member.py +0 -30
  248. pulumi_gcp/spanner/instance_iam_policy.py +0 -30
  249. pulumi_gcp/storage/bucket_iam_binding.py +42 -0
  250. pulumi_gcp/storage/bucket_iam_member.py +42 -0
  251. pulumi_gcp/storage/bucket_iam_policy.py +42 -0
  252. pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
  253. pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
  254. pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
  255. pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
  256. pulumi_gcp/tags/tag_key_iam_member.py +40 -0
  257. pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
  258. pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
  259. pulumi_gcp/tags/tag_value_iam_member.py +40 -0
  260. pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
  261. {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723631483.dist-info}/METADATA +1 -1
  262. {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723631483.dist-info}/RECORD +264 -264
  263. {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723631483.dist-info}/WHEEL +1 -1
  264. {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723631483.dist-info}/top_level.txt +0 -0
@@ -288,49 +288,6 @@ class IamAuditConfig(pulumi.CustomResource):
288
288
  ])
289
289
  ```
290
290
 
291
- ## folder.IAMPolicy
292
-
293
- !> **Be careful!** You can accidentally lock yourself out of your folder
294
- using this resource. Deleting a `folder.IAMPolicy` removes access
295
- from anyone without permissions on its parent folder/organization. Proceed with caution.
296
- It's not recommended to use `folder.IAMPolicy` with your provider folder
297
- to avoid locking yourself out, and it should generally only be used with folders
298
- fully managed by this provider. If you do use this resource, it is recommended to **import** the policy before
299
- applying the change.
300
-
301
- ```python
302
- import pulumi
303
- import pulumi_gcp as gcp
304
-
305
- admin = gcp.organizations.get_iam_policy(bindings=[{
306
- "role": "roles/editor",
307
- "members": ["user:jane@example.com"],
308
- }])
309
- folder = gcp.folder.IAMPolicy("folder",
310
- folder="folders/1234567",
311
- policy_data=admin.policy_data)
312
- ```
313
-
314
- With IAM Conditions:
315
-
316
- ```python
317
- import pulumi
318
- import pulumi_gcp as gcp
319
-
320
- admin = gcp.organizations.get_iam_policy(bindings=[{
321
- "role": "roles/compute.admin",
322
- "members": ["user:jane@example.com"],
323
- "condition": {
324
- "title": "expires_after_2019_12_31",
325
- "description": "Expiring at midnight of 2019-12-31",
326
- "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
327
- },
328
- }])
329
- folder = gcp.folder.IAMPolicy("folder",
330
- folder="folders/1234567",
331
- policy_data=admin.policy_data)
332
- ```
333
-
334
291
  ## folder.IAMBinding
335
292
 
336
293
  ```python
@@ -583,49 +540,6 @@ class IamAuditConfig(pulumi.CustomResource):
583
540
  ])
584
541
  ```
585
542
 
586
- ## folder.IAMPolicy
587
-
588
- !> **Be careful!** You can accidentally lock yourself out of your folder
589
- using this resource. Deleting a `folder.IAMPolicy` removes access
590
- from anyone without permissions on its parent folder/organization. Proceed with caution.
591
- It's not recommended to use `folder.IAMPolicy` with your provider folder
592
- to avoid locking yourself out, and it should generally only be used with folders
593
- fully managed by this provider. If you do use this resource, it is recommended to **import** the policy before
594
- applying the change.
595
-
596
- ```python
597
- import pulumi
598
- import pulumi_gcp as gcp
599
-
600
- admin = gcp.organizations.get_iam_policy(bindings=[{
601
- "role": "roles/editor",
602
- "members": ["user:jane@example.com"],
603
- }])
604
- folder = gcp.folder.IAMPolicy("folder",
605
- folder="folders/1234567",
606
- policy_data=admin.policy_data)
607
- ```
608
-
609
- With IAM Conditions:
610
-
611
- ```python
612
- import pulumi
613
- import pulumi_gcp as gcp
614
-
615
- admin = gcp.organizations.get_iam_policy(bindings=[{
616
- "role": "roles/compute.admin",
617
- "members": ["user:jane@example.com"],
618
- "condition": {
619
- "title": "expires_after_2019_12_31",
620
- "description": "Expiring at midnight of 2019-12-31",
621
- "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
622
- },
623
- }])
624
- folder = gcp.folder.IAMPolicy("folder",
625
- folder="folders/1234567",
626
- policy_data=admin.policy_data)
627
- ```
628
-
629
543
  ## folder.IAMBinding
630
544
 
631
545
  ```python
@@ -353,49 +353,6 @@ class IAMMember(pulumi.CustomResource):
353
353
  ])
354
354
  ```
355
355
 
356
- ## folder.IAMPolicy
357
-
358
- !> **Be careful!** You can accidentally lock yourself out of your folder
359
- using this resource. Deleting a `folder.IAMPolicy` removes access
360
- from anyone without permissions on its parent folder/organization. Proceed with caution.
361
- It's not recommended to use `folder.IAMPolicy` with your provider folder
362
- to avoid locking yourself out, and it should generally only be used with folders
363
- fully managed by this provider. If you do use this resource, it is recommended to **import** the policy before
364
- applying the change.
365
-
366
- ```python
367
- import pulumi
368
- import pulumi_gcp as gcp
369
-
370
- admin = gcp.organizations.get_iam_policy(bindings=[{
371
- "role": "roles/editor",
372
- "members": ["user:jane@example.com"],
373
- }])
374
- folder = gcp.folder.IAMPolicy("folder",
375
- folder="folders/1234567",
376
- policy_data=admin.policy_data)
377
- ```
378
-
379
- With IAM Conditions:
380
-
381
- ```python
382
- import pulumi
383
- import pulumi_gcp as gcp
384
-
385
- admin = gcp.organizations.get_iam_policy(bindings=[{
386
- "role": "roles/compute.admin",
387
- "members": ["user:jane@example.com"],
388
- "condition": {
389
- "title": "expires_after_2019_12_31",
390
- "description": "Expiring at midnight of 2019-12-31",
391
- "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
392
- },
393
- }])
394
- folder = gcp.folder.IAMPolicy("folder",
395
- folder="folders/1234567",
396
- policy_data=admin.policy_data)
397
- ```
398
-
399
356
  ## folder.IAMBinding
400
357
 
401
358
  ```python
@@ -657,49 +614,6 @@ class IAMMember(pulumi.CustomResource):
657
614
  ])
658
615
  ```
659
616
 
660
- ## folder.IAMPolicy
661
-
662
- !> **Be careful!** You can accidentally lock yourself out of your folder
663
- using this resource. Deleting a `folder.IAMPolicy` removes access
664
- from anyone without permissions on its parent folder/organization. Proceed with caution.
665
- It's not recommended to use `folder.IAMPolicy` with your provider folder
666
- to avoid locking yourself out, and it should generally only be used with folders
667
- fully managed by this provider. If you do use this resource, it is recommended to **import** the policy before
668
- applying the change.
669
-
670
- ```python
671
- import pulumi
672
- import pulumi_gcp as gcp
673
-
674
- admin = gcp.organizations.get_iam_policy(bindings=[{
675
- "role": "roles/editor",
676
- "members": ["user:jane@example.com"],
677
- }])
678
- folder = gcp.folder.IAMPolicy("folder",
679
- folder="folders/1234567",
680
- policy_data=admin.policy_data)
681
- ```
682
-
683
- With IAM Conditions:
684
-
685
- ```python
686
- import pulumi
687
- import pulumi_gcp as gcp
688
-
689
- admin = gcp.organizations.get_iam_policy(bindings=[{
690
- "role": "roles/compute.admin",
691
- "members": ["user:jane@example.com"],
692
- "condition": {
693
- "title": "expires_after_2019_12_31",
694
- "description": "Expiring at midnight of 2019-12-31",
695
- "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
696
- },
697
- }])
698
- folder = gcp.folder.IAMPolicy("folder",
699
- folder="folders/1234567",
700
- policy_data=admin.policy_data)
701
- ```
702
-
703
617
  ## folder.IAMBinding
704
618
 
705
619
  ```python
@@ -282,49 +282,6 @@ class IAMPolicy(pulumi.CustomResource):
282
282
  ])
283
283
  ```
284
284
 
285
- ## folder.IAMPolicy
286
-
287
- !> **Be careful!** You can accidentally lock yourself out of your folder
288
- using this resource. Deleting a `folder.IAMPolicy` removes access
289
- from anyone without permissions on its parent folder/organization. Proceed with caution.
290
- It's not recommended to use `folder.IAMPolicy` with your provider folder
291
- to avoid locking yourself out, and it should generally only be used with folders
292
- fully managed by this provider. If you do use this resource, it is recommended to **import** the policy before
293
- applying the change.
294
-
295
- ```python
296
- import pulumi
297
- import pulumi_gcp as gcp
298
-
299
- admin = gcp.organizations.get_iam_policy(bindings=[{
300
- "role": "roles/editor",
301
- "members": ["user:jane@example.com"],
302
- }])
303
- folder = gcp.folder.IAMPolicy("folder",
304
- folder="folders/1234567",
305
- policy_data=admin.policy_data)
306
- ```
307
-
308
- With IAM Conditions:
309
-
310
- ```python
311
- import pulumi
312
- import pulumi_gcp as gcp
313
-
314
- admin = gcp.organizations.get_iam_policy(bindings=[{
315
- "role": "roles/compute.admin",
316
- "members": ["user:jane@example.com"],
317
- "condition": {
318
- "title": "expires_after_2019_12_31",
319
- "description": "Expiring at midnight of 2019-12-31",
320
- "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
321
- },
322
- }])
323
- folder = gcp.folder.IAMPolicy("folder",
324
- folder="folders/1234567",
325
- policy_data=admin.policy_data)
326
- ```
327
-
328
285
  ## folder.IAMBinding
329
286
 
330
287
  ```python
@@ -583,49 +540,6 @@ class IAMPolicy(pulumi.CustomResource):
583
540
  ])
584
541
  ```
585
542
 
586
- ## folder.IAMPolicy
587
-
588
- !> **Be careful!** You can accidentally lock yourself out of your folder
589
- using this resource. Deleting a `folder.IAMPolicy` removes access
590
- from anyone without permissions on its parent folder/organization. Proceed with caution.
591
- It's not recommended to use `folder.IAMPolicy` with your provider folder
592
- to avoid locking yourself out, and it should generally only be used with folders
593
- fully managed by this provider. If you do use this resource, it is recommended to **import** the policy before
594
- applying the change.
595
-
596
- ```python
597
- import pulumi
598
- import pulumi_gcp as gcp
599
-
600
- admin = gcp.organizations.get_iam_policy(bindings=[{
601
- "role": "roles/editor",
602
- "members": ["user:jane@example.com"],
603
- }])
604
- folder = gcp.folder.IAMPolicy("folder",
605
- folder="folders/1234567",
606
- policy_data=admin.policy_data)
607
- ```
608
-
609
- With IAM Conditions:
610
-
611
- ```python
612
- import pulumi
613
- import pulumi_gcp as gcp
614
-
615
- admin = gcp.organizations.get_iam_policy(bindings=[{
616
- "role": "roles/compute.admin",
617
- "members": ["user:jane@example.com"],
618
- "condition": {
619
- "title": "expires_after_2019_12_31",
620
- "description": "Expiring at midnight of 2019-12-31",
621
- "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
622
- },
623
- }])
624
- folder = gcp.folder.IAMPolicy("folder",
625
- folder="folders/1234567",
626
- policy_data=admin.policy_data)
627
- ```
628
-
629
543
  ## folder.IAMBinding
630
544
 
631
545
  ```python
@@ -368,6 +368,25 @@ class BackupPlanIamBinding(pulumi.CustomResource):
368
368
  member="user:jane@example.com")
369
369
  ```
370
370
 
371
+ ## This resource supports User Project Overrides.
372
+
373
+ -
374
+
375
+ # IAM policy for Backup for GKE BackupPlan
376
+ Three different resources help you manage your IAM policy for Backup for GKE BackupPlan. Each of these resources serves a different use case:
377
+
378
+ * `gkebackup.BackupPlanIamPolicy`: Authoritative. Sets the IAM policy for the backupplan and replaces any existing policy already attached.
379
+ * `gkebackup.BackupPlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backupplan are preserved.
380
+ * `gkebackup.BackupPlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backupplan are preserved.
381
+
382
+ A data source can be used to retrieve policy data in advent you do not need creation
383
+
384
+ * `gkebackup.BackupPlanIamPolicy`: Retrieves the IAM policy for the backupplan
385
+
386
+ > **Note:** `gkebackup.BackupPlanIamPolicy` **cannot** be used in conjunction with `gkebackup.BackupPlanIamBinding` and `gkebackup.BackupPlanIamMember` or they will fight over what your policy should be.
387
+
388
+ > **Note:** `gkebackup.BackupPlanIamBinding` resources **can be** used in conjunction with `gkebackup.BackupPlanIamMember` resources **only if** they do not grant privilege to the same role.
389
+
371
390
  ## gkebackup.BackupPlanIamPolicy
372
391
 
373
392
  ```python
@@ -541,6 +560,25 @@ class BackupPlanIamBinding(pulumi.CustomResource):
541
560
  member="user:jane@example.com")
542
561
  ```
543
562
 
563
+ ## This resource supports User Project Overrides.
564
+
565
+ -
566
+
567
+ # IAM policy for Backup for GKE BackupPlan
568
+ Three different resources help you manage your IAM policy for Backup for GKE BackupPlan. Each of these resources serves a different use case:
569
+
570
+ * `gkebackup.BackupPlanIamPolicy`: Authoritative. Sets the IAM policy for the backupplan and replaces any existing policy already attached.
571
+ * `gkebackup.BackupPlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backupplan are preserved.
572
+ * `gkebackup.BackupPlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backupplan are preserved.
573
+
574
+ A data source can be used to retrieve policy data in advent you do not need creation
575
+
576
+ * `gkebackup.BackupPlanIamPolicy`: Retrieves the IAM policy for the backupplan
577
+
578
+ > **Note:** `gkebackup.BackupPlanIamPolicy` **cannot** be used in conjunction with `gkebackup.BackupPlanIamBinding` and `gkebackup.BackupPlanIamMember` or they will fight over what your policy should be.
579
+
580
+ > **Note:** `gkebackup.BackupPlanIamBinding` resources **can be** used in conjunction with `gkebackup.BackupPlanIamMember` resources **only if** they do not grant privilege to the same role.
581
+
544
582
  ## gkebackup.BackupPlanIamPolicy
545
583
 
546
584
  ```python
@@ -368,6 +368,25 @@ class BackupPlanIamMember(pulumi.CustomResource):
368
368
  member="user:jane@example.com")
369
369
  ```
370
370
 
371
+ ## This resource supports User Project Overrides.
372
+
373
+ -
374
+
375
+ # IAM policy for Backup for GKE BackupPlan
376
+ Three different resources help you manage your IAM policy for Backup for GKE BackupPlan. Each of these resources serves a different use case:
377
+
378
+ * `gkebackup.BackupPlanIamPolicy`: Authoritative. Sets the IAM policy for the backupplan and replaces any existing policy already attached.
379
+ * `gkebackup.BackupPlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backupplan are preserved.
380
+ * `gkebackup.BackupPlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backupplan are preserved.
381
+
382
+ A data source can be used to retrieve policy data in advent you do not need creation
383
+
384
+ * `gkebackup.BackupPlanIamPolicy`: Retrieves the IAM policy for the backupplan
385
+
386
+ > **Note:** `gkebackup.BackupPlanIamPolicy` **cannot** be used in conjunction with `gkebackup.BackupPlanIamBinding` and `gkebackup.BackupPlanIamMember` or they will fight over what your policy should be.
387
+
388
+ > **Note:** `gkebackup.BackupPlanIamBinding` resources **can be** used in conjunction with `gkebackup.BackupPlanIamMember` resources **only if** they do not grant privilege to the same role.
389
+
371
390
  ## gkebackup.BackupPlanIamPolicy
372
391
 
373
392
  ```python
@@ -541,6 +560,25 @@ class BackupPlanIamMember(pulumi.CustomResource):
541
560
  member="user:jane@example.com")
542
561
  ```
543
562
 
563
+ ## This resource supports User Project Overrides.
564
+
565
+ -
566
+
567
+ # IAM policy for Backup for GKE BackupPlan
568
+ Three different resources help you manage your IAM policy for Backup for GKE BackupPlan. Each of these resources serves a different use case:
569
+
570
+ * `gkebackup.BackupPlanIamPolicy`: Authoritative. Sets the IAM policy for the backupplan and replaces any existing policy already attached.
571
+ * `gkebackup.BackupPlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backupplan are preserved.
572
+ * `gkebackup.BackupPlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backupplan are preserved.
573
+
574
+ A data source can be used to retrieve policy data in advent you do not need creation
575
+
576
+ * `gkebackup.BackupPlanIamPolicy`: Retrieves the IAM policy for the backupplan
577
+
578
+ > **Note:** `gkebackup.BackupPlanIamPolicy` **cannot** be used in conjunction with `gkebackup.BackupPlanIamBinding` and `gkebackup.BackupPlanIamMember` or they will fight over what your policy should be.
579
+
580
+ > **Note:** `gkebackup.BackupPlanIamBinding` resources **can be** used in conjunction with `gkebackup.BackupPlanIamMember` resources **only if** they do not grant privilege to the same role.
581
+
544
582
  ## gkebackup.BackupPlanIamPolicy
545
583
 
546
584
  ```python
@@ -265,6 +265,25 @@ class BackupPlanIamPolicy(pulumi.CustomResource):
265
265
  member="user:jane@example.com")
266
266
  ```
267
267
 
268
+ ## This resource supports User Project Overrides.
269
+
270
+ -
271
+
272
+ # IAM policy for Backup for GKE BackupPlan
273
+ Three different resources help you manage your IAM policy for Backup for GKE BackupPlan. Each of these resources serves a different use case:
274
+
275
+ * `gkebackup.BackupPlanIamPolicy`: Authoritative. Sets the IAM policy for the backupplan and replaces any existing policy already attached.
276
+ * `gkebackup.BackupPlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backupplan are preserved.
277
+ * `gkebackup.BackupPlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backupplan are preserved.
278
+
279
+ A data source can be used to retrieve policy data in advent you do not need creation
280
+
281
+ * `gkebackup.BackupPlanIamPolicy`: Retrieves the IAM policy for the backupplan
282
+
283
+ > **Note:** `gkebackup.BackupPlanIamPolicy` **cannot** be used in conjunction with `gkebackup.BackupPlanIamBinding` and `gkebackup.BackupPlanIamMember` or they will fight over what your policy should be.
284
+
285
+ > **Note:** `gkebackup.BackupPlanIamBinding` resources **can be** used in conjunction with `gkebackup.BackupPlanIamMember` resources **only if** they do not grant privilege to the same role.
286
+
268
287
  ## gkebackup.BackupPlanIamPolicy
269
288
 
270
289
  ```python
@@ -426,6 +445,25 @@ class BackupPlanIamPolicy(pulumi.CustomResource):
426
445
  member="user:jane@example.com")
427
446
  ```
428
447
 
448
+ ## This resource supports User Project Overrides.
449
+
450
+ -
451
+
452
+ # IAM policy for Backup for GKE BackupPlan
453
+ Three different resources help you manage your IAM policy for Backup for GKE BackupPlan. Each of these resources serves a different use case:
454
+
455
+ * `gkebackup.BackupPlanIamPolicy`: Authoritative. Sets the IAM policy for the backupplan and replaces any existing policy already attached.
456
+ * `gkebackup.BackupPlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backupplan are preserved.
457
+ * `gkebackup.BackupPlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backupplan are preserved.
458
+
459
+ A data source can be used to retrieve policy data in advent you do not need creation
460
+
461
+ * `gkebackup.BackupPlanIamPolicy`: Retrieves the IAM policy for the backupplan
462
+
463
+ > **Note:** `gkebackup.BackupPlanIamPolicy` **cannot** be used in conjunction with `gkebackup.BackupPlanIamBinding` and `gkebackup.BackupPlanIamMember` or they will fight over what your policy should be.
464
+
465
+ > **Note:** `gkebackup.BackupPlanIamBinding` resources **can be** used in conjunction with `gkebackup.BackupPlanIamMember` resources **only if** they do not grant privilege to the same role.
466
+
429
467
  ## gkebackup.BackupPlanIamPolicy
430
468
 
431
469
  ```python
@@ -368,6 +368,25 @@ class RestorePlanIamBinding(pulumi.CustomResource):
368
368
  member="user:jane@example.com")
369
369
  ```
370
370
 
371
+ ## This resource supports User Project Overrides.
372
+
373
+ -
374
+
375
+ # IAM policy for Backup for GKE RestorePlan
376
+ Three different resources help you manage your IAM policy for Backup for GKE RestorePlan. Each of these resources serves a different use case:
377
+
378
+ * `gkebackup.RestorePlanIamPolicy`: Authoritative. Sets the IAM policy for the restoreplan and replaces any existing policy already attached.
379
+ * `gkebackup.RestorePlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the restoreplan are preserved.
380
+ * `gkebackup.RestorePlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the restoreplan are preserved.
381
+
382
+ A data source can be used to retrieve policy data in advent you do not need creation
383
+
384
+ * `gkebackup.RestorePlanIamPolicy`: Retrieves the IAM policy for the restoreplan
385
+
386
+ > **Note:** `gkebackup.RestorePlanIamPolicy` **cannot** be used in conjunction with `gkebackup.RestorePlanIamBinding` and `gkebackup.RestorePlanIamMember` or they will fight over what your policy should be.
387
+
388
+ > **Note:** `gkebackup.RestorePlanIamBinding` resources **can be** used in conjunction with `gkebackup.RestorePlanIamMember` resources **only if** they do not grant privilege to the same role.
389
+
371
390
  ## gkebackup.RestorePlanIamPolicy
372
391
 
373
392
  ```python
@@ -541,6 +560,25 @@ class RestorePlanIamBinding(pulumi.CustomResource):
541
560
  member="user:jane@example.com")
542
561
  ```
543
562
 
563
+ ## This resource supports User Project Overrides.
564
+
565
+ -
566
+
567
+ # IAM policy for Backup for GKE RestorePlan
568
+ Three different resources help you manage your IAM policy for Backup for GKE RestorePlan. Each of these resources serves a different use case:
569
+
570
+ * `gkebackup.RestorePlanIamPolicy`: Authoritative. Sets the IAM policy for the restoreplan and replaces any existing policy already attached.
571
+ * `gkebackup.RestorePlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the restoreplan are preserved.
572
+ * `gkebackup.RestorePlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the restoreplan are preserved.
573
+
574
+ A data source can be used to retrieve policy data in advent you do not need creation
575
+
576
+ * `gkebackup.RestorePlanIamPolicy`: Retrieves the IAM policy for the restoreplan
577
+
578
+ > **Note:** `gkebackup.RestorePlanIamPolicy` **cannot** be used in conjunction with `gkebackup.RestorePlanIamBinding` and `gkebackup.RestorePlanIamMember` or they will fight over what your policy should be.
579
+
580
+ > **Note:** `gkebackup.RestorePlanIamBinding` resources **can be** used in conjunction with `gkebackup.RestorePlanIamMember` resources **only if** they do not grant privilege to the same role.
581
+
544
582
  ## gkebackup.RestorePlanIamPolicy
545
583
 
546
584
  ```python
@@ -368,6 +368,25 @@ class RestorePlanIamMember(pulumi.CustomResource):
368
368
  member="user:jane@example.com")
369
369
  ```
370
370
 
371
+ ## This resource supports User Project Overrides.
372
+
373
+ -
374
+
375
+ # IAM policy for Backup for GKE RestorePlan
376
+ Three different resources help you manage your IAM policy for Backup for GKE RestorePlan. Each of these resources serves a different use case:
377
+
378
+ * `gkebackup.RestorePlanIamPolicy`: Authoritative. Sets the IAM policy for the restoreplan and replaces any existing policy already attached.
379
+ * `gkebackup.RestorePlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the restoreplan are preserved.
380
+ * `gkebackup.RestorePlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the restoreplan are preserved.
381
+
382
+ A data source can be used to retrieve policy data in advent you do not need creation
383
+
384
+ * `gkebackup.RestorePlanIamPolicy`: Retrieves the IAM policy for the restoreplan
385
+
386
+ > **Note:** `gkebackup.RestorePlanIamPolicy` **cannot** be used in conjunction with `gkebackup.RestorePlanIamBinding` and `gkebackup.RestorePlanIamMember` or they will fight over what your policy should be.
387
+
388
+ > **Note:** `gkebackup.RestorePlanIamBinding` resources **can be** used in conjunction with `gkebackup.RestorePlanIamMember` resources **only if** they do not grant privilege to the same role.
389
+
371
390
  ## gkebackup.RestorePlanIamPolicy
372
391
 
373
392
  ```python
@@ -541,6 +560,25 @@ class RestorePlanIamMember(pulumi.CustomResource):
541
560
  member="user:jane@example.com")
542
561
  ```
543
562
 
563
+ ## This resource supports User Project Overrides.
564
+
565
+ -
566
+
567
+ # IAM policy for Backup for GKE RestorePlan
568
+ Three different resources help you manage your IAM policy for Backup for GKE RestorePlan. Each of these resources serves a different use case:
569
+
570
+ * `gkebackup.RestorePlanIamPolicy`: Authoritative. Sets the IAM policy for the restoreplan and replaces any existing policy already attached.
571
+ * `gkebackup.RestorePlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the restoreplan are preserved.
572
+ * `gkebackup.RestorePlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the restoreplan are preserved.
573
+
574
+ A data source can be used to retrieve policy data in advent you do not need creation
575
+
576
+ * `gkebackup.RestorePlanIamPolicy`: Retrieves the IAM policy for the restoreplan
577
+
578
+ > **Note:** `gkebackup.RestorePlanIamPolicy` **cannot** be used in conjunction with `gkebackup.RestorePlanIamBinding` and `gkebackup.RestorePlanIamMember` or they will fight over what your policy should be.
579
+
580
+ > **Note:** `gkebackup.RestorePlanIamBinding` resources **can be** used in conjunction with `gkebackup.RestorePlanIamMember` resources **only if** they do not grant privilege to the same role.
581
+
544
582
  ## gkebackup.RestorePlanIamPolicy
545
583
 
546
584
  ```python
@@ -265,6 +265,25 @@ class RestorePlanIamPolicy(pulumi.CustomResource):
265
265
  member="user:jane@example.com")
266
266
  ```
267
267
 
268
+ ## This resource supports User Project Overrides.
269
+
270
+ -
271
+
272
+ # IAM policy for Backup for GKE RestorePlan
273
+ Three different resources help you manage your IAM policy for Backup for GKE RestorePlan. Each of these resources serves a different use case:
274
+
275
+ * `gkebackup.RestorePlanIamPolicy`: Authoritative. Sets the IAM policy for the restoreplan and replaces any existing policy already attached.
276
+ * `gkebackup.RestorePlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the restoreplan are preserved.
277
+ * `gkebackup.RestorePlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the restoreplan are preserved.
278
+
279
+ A data source can be used to retrieve policy data in advent you do not need creation
280
+
281
+ * `gkebackup.RestorePlanIamPolicy`: Retrieves the IAM policy for the restoreplan
282
+
283
+ > **Note:** `gkebackup.RestorePlanIamPolicy` **cannot** be used in conjunction with `gkebackup.RestorePlanIamBinding` and `gkebackup.RestorePlanIamMember` or they will fight over what your policy should be.
284
+
285
+ > **Note:** `gkebackup.RestorePlanIamBinding` resources **can be** used in conjunction with `gkebackup.RestorePlanIamMember` resources **only if** they do not grant privilege to the same role.
286
+
268
287
  ## gkebackup.RestorePlanIamPolicy
269
288
 
270
289
  ```python
@@ -426,6 +445,25 @@ class RestorePlanIamPolicy(pulumi.CustomResource):
426
445
  member="user:jane@example.com")
427
446
  ```
428
447
 
448
+ ## This resource supports User Project Overrides.
449
+
450
+ -
451
+
452
+ # IAM policy for Backup for GKE RestorePlan
453
+ Three different resources help you manage your IAM policy for Backup for GKE RestorePlan. Each of these resources serves a different use case:
454
+
455
+ * `gkebackup.RestorePlanIamPolicy`: Authoritative. Sets the IAM policy for the restoreplan and replaces any existing policy already attached.
456
+ * `gkebackup.RestorePlanIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the restoreplan are preserved.
457
+ * `gkebackup.RestorePlanIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the restoreplan are preserved.
458
+
459
+ A data source can be used to retrieve policy data in advent you do not need creation
460
+
461
+ * `gkebackup.RestorePlanIamPolicy`: Retrieves the IAM policy for the restoreplan
462
+
463
+ > **Note:** `gkebackup.RestorePlanIamPolicy` **cannot** be used in conjunction with `gkebackup.RestorePlanIamBinding` and `gkebackup.RestorePlanIamMember` or they will fight over what your policy should be.
464
+
465
+ > **Note:** `gkebackup.RestorePlanIamBinding` resources **can be** used in conjunction with `gkebackup.RestorePlanIamMember` resources **only if** they do not grant privilege to the same role.
466
+
429
467
  ## gkebackup.RestorePlanIamPolicy
430
468
 
431
469
  ```python
@@ -364,6 +364,25 @@ class FeatureIamBinding(pulumi.CustomResource):
364
364
  member="user:jane@example.com")
365
365
  ```
366
366
 
367
+ ## This resource supports User Project Overrides.
368
+
369
+ -
370
+
371
+ # IAM policy for GKEHub Feature
372
+ Three different resources help you manage your IAM policy for GKEHub Feature. Each of these resources serves a different use case:
373
+
374
+ * `gkehub.FeatureIamPolicy`: Authoritative. Sets the IAM policy for the feature and replaces any existing policy already attached.
375
+ * `gkehub.FeatureIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the feature are preserved.
376
+ * `gkehub.FeatureIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the feature are preserved.
377
+
378
+ A data source can be used to retrieve policy data in advent you do not need creation
379
+
380
+ * `gkehub.FeatureIamPolicy`: Retrieves the IAM policy for the feature
381
+
382
+ > **Note:** `gkehub.FeatureIamPolicy` **cannot** be used in conjunction with `gkehub.FeatureIamBinding` and `gkehub.FeatureIamMember` or they will fight over what your policy should be.
383
+
384
+ > **Note:** `gkehub.FeatureIamBinding` resources **can be** used in conjunction with `gkehub.FeatureIamMember` resources **only if** they do not grant privilege to the same role.
385
+
367
386
  ## gkehub.FeatureIamPolicy
368
387
 
369
388
  ```python
@@ -536,6 +555,25 @@ class FeatureIamBinding(pulumi.CustomResource):
536
555
  member="user:jane@example.com")
537
556
  ```
538
557
 
558
+ ## This resource supports User Project Overrides.
559
+
560
+ -
561
+
562
+ # IAM policy for GKEHub Feature
563
+ Three different resources help you manage your IAM policy for GKEHub Feature. Each of these resources serves a different use case:
564
+
565
+ * `gkehub.FeatureIamPolicy`: Authoritative. Sets the IAM policy for the feature and replaces any existing policy already attached.
566
+ * `gkehub.FeatureIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the feature are preserved.
567
+ * `gkehub.FeatureIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the feature are preserved.
568
+
569
+ A data source can be used to retrieve policy data in advent you do not need creation
570
+
571
+ * `gkehub.FeatureIamPolicy`: Retrieves the IAM policy for the feature
572
+
573
+ > **Note:** `gkehub.FeatureIamPolicy` **cannot** be used in conjunction with `gkehub.FeatureIamBinding` and `gkehub.FeatureIamMember` or they will fight over what your policy should be.
574
+
575
+ > **Note:** `gkehub.FeatureIamBinding` resources **can be** used in conjunction with `gkehub.FeatureIamMember` resources **only if** they do not grant privilege to the same role.
576
+
539
577
  ## gkehub.FeatureIamPolicy
540
578
 
541
579
  ```python