pulumi-gcp 7.36.0a1723105270__py3-none-any.whl → 7.36.0a1723631483__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
  2. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
  3. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
  4. pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
  5. pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
  6. pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
  7. pulumi_gcp/apigateway/api_iam_binding.py +38 -0
  8. pulumi_gcp/apigateway/api_iam_member.py +38 -0
  9. pulumi_gcp/apigateway/api_iam_policy.py +38 -0
  10. pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
  11. pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
  12. pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
  13. pulumi_gcp/apigee/environment_iam_binding.py +40 -0
  14. pulumi_gcp/apigee/environment_iam_member.py +40 -0
  15. pulumi_gcp/apigee/environment_iam_policy.py +40 -0
  16. pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
  17. pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
  18. pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
  19. pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
  20. pulumi_gcp/bigquery/connection_iam_member.py +38 -0
  21. pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
  22. pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
  23. pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
  24. pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
  25. pulumi_gcp/bigquery/iam_binding.py +42 -0
  26. pulumi_gcp/bigquery/iam_member.py +42 -0
  27. pulumi_gcp/bigquery/iam_policy.py +42 -0
  28. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
  29. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
  30. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
  31. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
  32. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
  33. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
  34. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
  35. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
  36. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
  37. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
  38. pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
  39. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
  40. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
  41. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
  42. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
  43. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
  44. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
  45. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
  46. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
  47. pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
  48. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
  49. pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
  50. pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
  51. pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
  52. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
  53. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
  54. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
  55. pulumi_gcp/cloudrun/iam_binding.py +38 -0
  56. pulumi_gcp/cloudrun/iam_member.py +38 -0
  57. pulumi_gcp/cloudrun/iam_policy.py +38 -0
  58. pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
  59. pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
  60. pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
  61. pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
  62. pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
  63. pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
  64. pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
  65. pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
  66. pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
  67. pulumi_gcp/compute/disk_iam_binding.py +38 -0
  68. pulumi_gcp/compute/disk_iam_member.py +38 -0
  69. pulumi_gcp/compute/disk_iam_policy.py +38 -0
  70. pulumi_gcp/compute/image_iam_binding.py +42 -0
  71. pulumi_gcp/compute/image_iam_member.py +42 -0
  72. pulumi_gcp/compute/image_iam_policy.py +42 -0
  73. pulumi_gcp/compute/instance_iam_binding.py +42 -0
  74. pulumi_gcp/compute/instance_iam_member.py +42 -0
  75. pulumi_gcp/compute/instance_iam_policy.py +42 -0
  76. pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
  77. pulumi_gcp/compute/machine_image_iam_member.py +40 -0
  78. pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
  79. pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
  80. pulumi_gcp/compute/region_disk_iam_member.py +38 -0
  81. pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
  82. pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
  83. pulumi_gcp/compute/snapshot_iam_member.py +38 -0
  84. pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
  85. pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
  86. pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
  87. pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
  88. pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
  89. pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
  90. pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
  91. pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
  92. pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
  93. pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
  94. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
  95. pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
  96. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
  97. pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
  98. pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
  99. pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
  100. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
  101. pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
  102. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
  103. pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
  104. pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
  105. pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
  106. pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
  107. pulumi_gcp/dataplex/asset_iam_member.py +38 -0
  108. pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
  109. pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
  110. pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
  111. pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
  112. pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
  113. pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
  114. pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
  115. pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
  116. pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
  117. pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
  118. pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
  119. pulumi_gcp/dataplex/lake_iam_member.py +38 -0
  120. pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
  121. pulumi_gcp/dataplex/task_iam_binding.py +38 -0
  122. pulumi_gcp/dataplex/task_iam_member.py +38 -0
  123. pulumi_gcp/dataplex/task_iam_policy.py +38 -0
  124. pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
  125. pulumi_gcp/dataplex/zone_iam_member.py +38 -0
  126. pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
  127. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
  128. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
  129. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
  130. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
  131. pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
  132. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
  133. pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
  134. pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
  135. pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
  136. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
  137. pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
  138. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
  139. pulumi_gcp/endpoints/service_iam_binding.py +40 -0
  140. pulumi_gcp/endpoints/service_iam_member.py +40 -0
  141. pulumi_gcp/endpoints/service_iam_policy.py +40 -0
  142. pulumi_gcp/folder/iam_audit_config.py +0 -86
  143. pulumi_gcp/folder/iam_member.py +0 -86
  144. pulumi_gcp/folder/iam_policy.py +0 -86
  145. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
  146. pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
  147. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
  148. pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
  149. pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
  150. pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
  151. pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
  152. pulumi_gcp/gkehub/feature_iam_member.py +38 -0
  153. pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
  154. pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
  155. pulumi_gcp/gkehub/membership_iam_member.py +38 -0
  156. pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
  157. pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
  158. pulumi_gcp/gkehub/scope_iam_member.py +38 -0
  159. pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
  160. pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
  161. pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
  162. pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
  163. pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
  164. pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
  165. pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
  166. pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
  167. pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
  168. pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
  169. pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
  170. pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
  171. pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
  172. pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
  173. pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
  174. pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
  175. pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
  176. pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
  177. pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
  178. pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
  179. pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
  180. pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
  181. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
  182. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
  183. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
  184. pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
  185. pulumi_gcp/iap/tunnel_iam_member.py +42 -0
  186. pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
  187. pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
  188. pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
  189. pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
  190. pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
  191. pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
  192. pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
  193. pulumi_gcp/iap/web_iam_binding.py +42 -0
  194. pulumi_gcp/iap/web_iam_member.py +42 -0
  195. pulumi_gcp/iap/web_iam_policy.py +42 -0
  196. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
  197. pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
  198. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
  199. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
  200. pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
  201. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
  202. pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
  203. pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
  204. pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
  205. pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
  206. pulumi_gcp/kms/key_ring_iam_member.py +0 -82
  207. pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
  208. pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
  209. pulumi_gcp/notebooks/instance_iam_member.py +38 -0
  210. pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
  211. pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
  212. pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
  213. pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
  214. pulumi_gcp/organizations/iam_member.py +0 -94
  215. pulumi_gcp/organizations/iam_policy.py +0 -94
  216. pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
  217. pulumi_gcp/pubsub/schema_iam_member.py +38 -0
  218. pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
  219. pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
  220. pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
  221. pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
  222. pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
  223. pulumi_gcp/pubsub/topic_iam_member.py +38 -0
  224. pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
  225. pulumi_gcp/pulumi-plugin.json +1 -1
  226. pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
  227. pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
  228. pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
  229. pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
  230. pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
  231. pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
  232. pulumi_gcp/serviceaccount/get_account.py +6 -6
  233. pulumi_gcp/serviceaccount/key.py +6 -6
  234. pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
  235. pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
  236. pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
  237. pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
  238. pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
  239. pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
  240. pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
  241. pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
  242. pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
  243. pulumi_gcp/spanner/database_iam_binding.py +0 -74
  244. pulumi_gcp/spanner/database_iam_member.py +0 -74
  245. pulumi_gcp/spanner/database_iam_policy.py +0 -74
  246. pulumi_gcp/spanner/instance_iam_binding.py +0 -30
  247. pulumi_gcp/spanner/instance_iam_member.py +0 -30
  248. pulumi_gcp/spanner/instance_iam_policy.py +0 -30
  249. pulumi_gcp/storage/bucket_iam_binding.py +42 -0
  250. pulumi_gcp/storage/bucket_iam_member.py +42 -0
  251. pulumi_gcp/storage/bucket_iam_policy.py +42 -0
  252. pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
  253. pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
  254. pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
  255. pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
  256. pulumi_gcp/tags/tag_key_iam_member.py +40 -0
  257. pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
  258. pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
  259. pulumi_gcp/tags/tag_value_iam_member.py +40 -0
  260. pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
  261. {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723631483.dist-info}/METADATA +1 -1
  262. {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723631483.dist-info}/RECORD +264 -264
  263. {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723631483.dist-info}/WHEEL +1 -1
  264. {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723631483.dist-info}/top_level.txt +0 -0
@@ -410,6 +410,27 @@ class IamBinding(pulumi.CustomResource):
410
410
  })
411
411
  ```
412
412
 
413
+ ## This resource supports User Project Overrides.
414
+
415
+ -
416
+
417
+ # IAM policy for BigQuery Table
418
+ Three different resources help you manage your IAM policy for BigQuery Table. Each of these resources serves a different use case:
419
+
420
+ * `bigquery.IamPolicy`: Authoritative. Sets the IAM policy for the table and replaces any existing policy already attached.
421
+ * `bigquery.IamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the table are preserved.
422
+ * `bigquery.IamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the table are preserved.
423
+
424
+ A data source can be used to retrieve policy data in advent you do not need creation
425
+
426
+ * `bigquery.IamPolicy`: Retrieves the IAM policy for the table
427
+
428
+ > **Note:** `bigquery.IamPolicy` **cannot** be used in conjunction with `bigquery.IamBinding` and `bigquery.IamMember` or they will fight over what your policy should be.
429
+
430
+ > **Note:** `bigquery.IamBinding` resources **can be** used in conjunction with `bigquery.IamMember` resources **only if** they do not grant privilege to the same role.
431
+
432
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
433
+
413
434
  ## bigquery.IamPolicy
414
435
 
415
436
  ```python
@@ -698,6 +719,27 @@ class IamBinding(pulumi.CustomResource):
698
719
  })
699
720
  ```
700
721
 
722
+ ## This resource supports User Project Overrides.
723
+
724
+ -
725
+
726
+ # IAM policy for BigQuery Table
727
+ Three different resources help you manage your IAM policy for BigQuery Table. Each of these resources serves a different use case:
728
+
729
+ * `bigquery.IamPolicy`: Authoritative. Sets the IAM policy for the table and replaces any existing policy already attached.
730
+ * `bigquery.IamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the table are preserved.
731
+ * `bigquery.IamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the table are preserved.
732
+
733
+ A data source can be used to retrieve policy data in advent you do not need creation
734
+
735
+ * `bigquery.IamPolicy`: Retrieves the IAM policy for the table
736
+
737
+ > **Note:** `bigquery.IamPolicy` **cannot** be used in conjunction with `bigquery.IamBinding` and `bigquery.IamMember` or they will fight over what your policy should be.
738
+
739
+ > **Note:** `bigquery.IamBinding` resources **can be** used in conjunction with `bigquery.IamMember` resources **only if** they do not grant privilege to the same role.
740
+
741
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
742
+
701
743
  ## bigquery.IamPolicy
702
744
 
703
745
  ```python
@@ -410,6 +410,27 @@ class IamMember(pulumi.CustomResource):
410
410
  })
411
411
  ```
412
412
 
413
+ ## This resource supports User Project Overrides.
414
+
415
+ -
416
+
417
+ # IAM policy for BigQuery Table
418
+ Three different resources help you manage your IAM policy for BigQuery Table. Each of these resources serves a different use case:
419
+
420
+ * `bigquery.IamPolicy`: Authoritative. Sets the IAM policy for the table and replaces any existing policy already attached.
421
+ * `bigquery.IamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the table are preserved.
422
+ * `bigquery.IamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the table are preserved.
423
+
424
+ A data source can be used to retrieve policy data in advent you do not need creation
425
+
426
+ * `bigquery.IamPolicy`: Retrieves the IAM policy for the table
427
+
428
+ > **Note:** `bigquery.IamPolicy` **cannot** be used in conjunction with `bigquery.IamBinding` and `bigquery.IamMember` or they will fight over what your policy should be.
429
+
430
+ > **Note:** `bigquery.IamBinding` resources **can be** used in conjunction with `bigquery.IamMember` resources **only if** they do not grant privilege to the same role.
431
+
432
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
433
+
413
434
  ## bigquery.IamPolicy
414
435
 
415
436
  ```python
@@ -698,6 +719,27 @@ class IamMember(pulumi.CustomResource):
698
719
  })
699
720
  ```
700
721
 
722
+ ## This resource supports User Project Overrides.
723
+
724
+ -
725
+
726
+ # IAM policy for BigQuery Table
727
+ Three different resources help you manage your IAM policy for BigQuery Table. Each of these resources serves a different use case:
728
+
729
+ * `bigquery.IamPolicy`: Authoritative. Sets the IAM policy for the table and replaces any existing policy already attached.
730
+ * `bigquery.IamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the table are preserved.
731
+ * `bigquery.IamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the table are preserved.
732
+
733
+ A data source can be used to retrieve policy data in advent you do not need creation
734
+
735
+ * `bigquery.IamPolicy`: Retrieves the IAM policy for the table
736
+
737
+ > **Note:** `bigquery.IamPolicy` **cannot** be used in conjunction with `bigquery.IamBinding` and `bigquery.IamMember` or they will fight over what your policy should be.
738
+
739
+ > **Note:** `bigquery.IamBinding` resources **can be** used in conjunction with `bigquery.IamMember` resources **only if** they do not grant privilege to the same role.
740
+
741
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
742
+
701
743
  ## bigquery.IamPolicy
702
744
 
703
745
  ```python
@@ -295,6 +295,27 @@ class IamPolicy(pulumi.CustomResource):
295
295
  })
296
296
  ```
297
297
 
298
+ ## This resource supports User Project Overrides.
299
+
300
+ -
301
+
302
+ # IAM policy for BigQuery Table
303
+ Three different resources help you manage your IAM policy for BigQuery Table. Each of these resources serves a different use case:
304
+
305
+ * `bigquery.IamPolicy`: Authoritative. Sets the IAM policy for the table and replaces any existing policy already attached.
306
+ * `bigquery.IamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the table are preserved.
307
+ * `bigquery.IamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the table are preserved.
308
+
309
+ A data source can be used to retrieve policy data in advent you do not need creation
310
+
311
+ * `bigquery.IamPolicy`: Retrieves the IAM policy for the table
312
+
313
+ > **Note:** `bigquery.IamPolicy` **cannot** be used in conjunction with `bigquery.IamBinding` and `bigquery.IamMember` or they will fight over what your policy should be.
314
+
315
+ > **Note:** `bigquery.IamBinding` resources **can be** used in conjunction with `bigquery.IamMember` resources **only if** they do not grant privilege to the same role.
316
+
317
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
318
+
298
319
  ## bigquery.IamPolicy
299
320
 
300
321
  ```python
@@ -569,6 +590,27 @@ class IamPolicy(pulumi.CustomResource):
569
590
  })
570
591
  ```
571
592
 
593
+ ## This resource supports User Project Overrides.
594
+
595
+ -
596
+
597
+ # IAM policy for BigQuery Table
598
+ Three different resources help you manage your IAM policy for BigQuery Table. Each of these resources serves a different use case:
599
+
600
+ * `bigquery.IamPolicy`: Authoritative. Sets the IAM policy for the table and replaces any existing policy already attached.
601
+ * `bigquery.IamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the table are preserved.
602
+ * `bigquery.IamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the table are preserved.
603
+
604
+ A data source can be used to retrieve policy data in advent you do not need creation
605
+
606
+ * `bigquery.IamPolicy`: Retrieves the IAM policy for the table
607
+
608
+ > **Note:** `bigquery.IamPolicy` **cannot** be used in conjunction with `bigquery.IamBinding` and `bigquery.IamMember` or they will fight over what your policy should be.
609
+
610
+ > **Note:** `bigquery.IamBinding` resources **can be** used in conjunction with `bigquery.IamMember` resources **only if** they do not grant privilege to the same role.
611
+
612
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
613
+
572
614
  ## bigquery.IamPolicy
573
615
 
574
616
  ```python
@@ -367,6 +367,25 @@ class DataExchangeIamBinding(pulumi.CustomResource):
367
367
  member="user:jane@example.com")
368
368
  ```
369
369
 
370
+ ## This resource supports User Project Overrides.
371
+
372
+ -
373
+
374
+ # IAM policy for Bigquery Analytics Hub DataExchange
375
+ Three different resources help you manage your IAM policy for Bigquery Analytics Hub DataExchange. Each of these resources serves a different use case:
376
+
377
+ * `bigqueryanalyticshub.DataExchangeIamPolicy`: Authoritative. Sets the IAM policy for the dataexchange and replaces any existing policy already attached.
378
+ * `bigqueryanalyticshub.DataExchangeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the dataexchange are preserved.
379
+ * `bigqueryanalyticshub.DataExchangeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the dataexchange are preserved.
380
+
381
+ A data source can be used to retrieve policy data in advent you do not need creation
382
+
383
+ * `bigqueryanalyticshub.DataExchangeIamPolicy`: Retrieves the IAM policy for the dataexchange
384
+
385
+ > **Note:** `bigqueryanalyticshub.DataExchangeIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.DataExchangeIamBinding` and `bigqueryanalyticshub.DataExchangeIamMember` or they will fight over what your policy should be.
386
+
387
+ > **Note:** `bigqueryanalyticshub.DataExchangeIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.DataExchangeIamMember` resources **only if** they do not grant privilege to the same role.
388
+
370
389
  ## bigqueryanalyticshub.DataExchangeIamPolicy
371
390
 
372
391
  ```python
@@ -540,6 +559,25 @@ class DataExchangeIamBinding(pulumi.CustomResource):
540
559
  member="user:jane@example.com")
541
560
  ```
542
561
 
562
+ ## This resource supports User Project Overrides.
563
+
564
+ -
565
+
566
+ # IAM policy for Bigquery Analytics Hub DataExchange
567
+ Three different resources help you manage your IAM policy for Bigquery Analytics Hub DataExchange. Each of these resources serves a different use case:
568
+
569
+ * `bigqueryanalyticshub.DataExchangeIamPolicy`: Authoritative. Sets the IAM policy for the dataexchange and replaces any existing policy already attached.
570
+ * `bigqueryanalyticshub.DataExchangeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the dataexchange are preserved.
571
+ * `bigqueryanalyticshub.DataExchangeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the dataexchange are preserved.
572
+
573
+ A data source can be used to retrieve policy data in advent you do not need creation
574
+
575
+ * `bigqueryanalyticshub.DataExchangeIamPolicy`: Retrieves the IAM policy for the dataexchange
576
+
577
+ > **Note:** `bigqueryanalyticshub.DataExchangeIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.DataExchangeIamBinding` and `bigqueryanalyticshub.DataExchangeIamMember` or they will fight over what your policy should be.
578
+
579
+ > **Note:** `bigqueryanalyticshub.DataExchangeIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.DataExchangeIamMember` resources **only if** they do not grant privilege to the same role.
580
+
543
581
  ## bigqueryanalyticshub.DataExchangeIamPolicy
544
582
 
545
583
  ```python
@@ -367,6 +367,25 @@ class DataExchangeIamMember(pulumi.CustomResource):
367
367
  member="user:jane@example.com")
368
368
  ```
369
369
 
370
+ ## This resource supports User Project Overrides.
371
+
372
+ -
373
+
374
+ # IAM policy for Bigquery Analytics Hub DataExchange
375
+ Three different resources help you manage your IAM policy for Bigquery Analytics Hub DataExchange. Each of these resources serves a different use case:
376
+
377
+ * `bigqueryanalyticshub.DataExchangeIamPolicy`: Authoritative. Sets the IAM policy for the dataexchange and replaces any existing policy already attached.
378
+ * `bigqueryanalyticshub.DataExchangeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the dataexchange are preserved.
379
+ * `bigqueryanalyticshub.DataExchangeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the dataexchange are preserved.
380
+
381
+ A data source can be used to retrieve policy data in advent you do not need creation
382
+
383
+ * `bigqueryanalyticshub.DataExchangeIamPolicy`: Retrieves the IAM policy for the dataexchange
384
+
385
+ > **Note:** `bigqueryanalyticshub.DataExchangeIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.DataExchangeIamBinding` and `bigqueryanalyticshub.DataExchangeIamMember` or they will fight over what your policy should be.
386
+
387
+ > **Note:** `bigqueryanalyticshub.DataExchangeIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.DataExchangeIamMember` resources **only if** they do not grant privilege to the same role.
388
+
370
389
  ## bigqueryanalyticshub.DataExchangeIamPolicy
371
390
 
372
391
  ```python
@@ -540,6 +559,25 @@ class DataExchangeIamMember(pulumi.CustomResource):
540
559
  member="user:jane@example.com")
541
560
  ```
542
561
 
562
+ ## This resource supports User Project Overrides.
563
+
564
+ -
565
+
566
+ # IAM policy for Bigquery Analytics Hub DataExchange
567
+ Three different resources help you manage your IAM policy for Bigquery Analytics Hub DataExchange. Each of these resources serves a different use case:
568
+
569
+ * `bigqueryanalyticshub.DataExchangeIamPolicy`: Authoritative. Sets the IAM policy for the dataexchange and replaces any existing policy already attached.
570
+ * `bigqueryanalyticshub.DataExchangeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the dataexchange are preserved.
571
+ * `bigqueryanalyticshub.DataExchangeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the dataexchange are preserved.
572
+
573
+ A data source can be used to retrieve policy data in advent you do not need creation
574
+
575
+ * `bigqueryanalyticshub.DataExchangeIamPolicy`: Retrieves the IAM policy for the dataexchange
576
+
577
+ > **Note:** `bigqueryanalyticshub.DataExchangeIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.DataExchangeIamBinding` and `bigqueryanalyticshub.DataExchangeIamMember` or they will fight over what your policy should be.
578
+
579
+ > **Note:** `bigqueryanalyticshub.DataExchangeIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.DataExchangeIamMember` resources **only if** they do not grant privilege to the same role.
580
+
543
581
  ## bigqueryanalyticshub.DataExchangeIamPolicy
544
582
 
545
583
  ```python
@@ -264,6 +264,25 @@ class DataExchangeIamPolicy(pulumi.CustomResource):
264
264
  member="user:jane@example.com")
265
265
  ```
266
266
 
267
+ ## This resource supports User Project Overrides.
268
+
269
+ -
270
+
271
+ # IAM policy for Bigquery Analytics Hub DataExchange
272
+ Three different resources help you manage your IAM policy for Bigquery Analytics Hub DataExchange. Each of these resources serves a different use case:
273
+
274
+ * `bigqueryanalyticshub.DataExchangeIamPolicy`: Authoritative. Sets the IAM policy for the dataexchange and replaces any existing policy already attached.
275
+ * `bigqueryanalyticshub.DataExchangeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the dataexchange are preserved.
276
+ * `bigqueryanalyticshub.DataExchangeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the dataexchange are preserved.
277
+
278
+ A data source can be used to retrieve policy data in advent you do not need creation
279
+
280
+ * `bigqueryanalyticshub.DataExchangeIamPolicy`: Retrieves the IAM policy for the dataexchange
281
+
282
+ > **Note:** `bigqueryanalyticshub.DataExchangeIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.DataExchangeIamBinding` and `bigqueryanalyticshub.DataExchangeIamMember` or they will fight over what your policy should be.
283
+
284
+ > **Note:** `bigqueryanalyticshub.DataExchangeIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.DataExchangeIamMember` resources **only if** they do not grant privilege to the same role.
285
+
267
286
  ## bigqueryanalyticshub.DataExchangeIamPolicy
268
287
 
269
288
  ```python
@@ -425,6 +444,25 @@ class DataExchangeIamPolicy(pulumi.CustomResource):
425
444
  member="user:jane@example.com")
426
445
  ```
427
446
 
447
+ ## This resource supports User Project Overrides.
448
+
449
+ -
450
+
451
+ # IAM policy for Bigquery Analytics Hub DataExchange
452
+ Three different resources help you manage your IAM policy for Bigquery Analytics Hub DataExchange. Each of these resources serves a different use case:
453
+
454
+ * `bigqueryanalyticshub.DataExchangeIamPolicy`: Authoritative. Sets the IAM policy for the dataexchange and replaces any existing policy already attached.
455
+ * `bigqueryanalyticshub.DataExchangeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the dataexchange are preserved.
456
+ * `bigqueryanalyticshub.DataExchangeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the dataexchange are preserved.
457
+
458
+ A data source can be used to retrieve policy data in advent you do not need creation
459
+
460
+ * `bigqueryanalyticshub.DataExchangeIamPolicy`: Retrieves the IAM policy for the dataexchange
461
+
462
+ > **Note:** `bigqueryanalyticshub.DataExchangeIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.DataExchangeIamBinding` and `bigqueryanalyticshub.DataExchangeIamMember` or they will fight over what your policy should be.
463
+
464
+ > **Note:** `bigqueryanalyticshub.DataExchangeIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.DataExchangeIamMember` resources **only if** they do not grant privilege to the same role.
465
+
428
466
  ## bigqueryanalyticshub.DataExchangeIamPolicy
429
467
 
430
468
  ```python
@@ -402,6 +402,25 @@ class ListingIamBinding(pulumi.CustomResource):
402
402
  member="user:jane@example.com")
403
403
  ```
404
404
 
405
+ ## This resource supports User Project Overrides.
406
+
407
+ -
408
+
409
+ # IAM policy for Bigquery Analytics Hub Listing
410
+ Three different resources help you manage your IAM policy for Bigquery Analytics Hub Listing. Each of these resources serves a different use case:
411
+
412
+ * `bigqueryanalyticshub.ListingIamPolicy`: Authoritative. Sets the IAM policy for the listing and replaces any existing policy already attached.
413
+ * `bigqueryanalyticshub.ListingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the listing are preserved.
414
+ * `bigqueryanalyticshub.ListingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the listing are preserved.
415
+
416
+ A data source can be used to retrieve policy data in advent you do not need creation
417
+
418
+ * `bigqueryanalyticshub.ListingIamPolicy`: Retrieves the IAM policy for the listing
419
+
420
+ > **Note:** `bigqueryanalyticshub.ListingIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.ListingIamBinding` and `bigqueryanalyticshub.ListingIamMember` or they will fight over what your policy should be.
421
+
422
+ > **Note:** `bigqueryanalyticshub.ListingIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.ListingIamMember` resources **only if** they do not grant privilege to the same role.
423
+
405
424
  ## bigqueryanalyticshub.ListingIamPolicy
406
425
 
407
426
  ```python
@@ -582,6 +601,25 @@ class ListingIamBinding(pulumi.CustomResource):
582
601
  member="user:jane@example.com")
583
602
  ```
584
603
 
604
+ ## This resource supports User Project Overrides.
605
+
606
+ -
607
+
608
+ # IAM policy for Bigquery Analytics Hub Listing
609
+ Three different resources help you manage your IAM policy for Bigquery Analytics Hub Listing. Each of these resources serves a different use case:
610
+
611
+ * `bigqueryanalyticshub.ListingIamPolicy`: Authoritative. Sets the IAM policy for the listing and replaces any existing policy already attached.
612
+ * `bigqueryanalyticshub.ListingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the listing are preserved.
613
+ * `bigqueryanalyticshub.ListingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the listing are preserved.
614
+
615
+ A data source can be used to retrieve policy data in advent you do not need creation
616
+
617
+ * `bigqueryanalyticshub.ListingIamPolicy`: Retrieves the IAM policy for the listing
618
+
619
+ > **Note:** `bigqueryanalyticshub.ListingIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.ListingIamBinding` and `bigqueryanalyticshub.ListingIamMember` or they will fight over what your policy should be.
620
+
621
+ > **Note:** `bigqueryanalyticshub.ListingIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.ListingIamMember` resources **only if** they do not grant privilege to the same role.
622
+
585
623
  ## bigqueryanalyticshub.ListingIamPolicy
586
624
 
587
625
  ```python
@@ -402,6 +402,25 @@ class ListingIamMember(pulumi.CustomResource):
402
402
  member="user:jane@example.com")
403
403
  ```
404
404
 
405
+ ## This resource supports User Project Overrides.
406
+
407
+ -
408
+
409
+ # IAM policy for Bigquery Analytics Hub Listing
410
+ Three different resources help you manage your IAM policy for Bigquery Analytics Hub Listing. Each of these resources serves a different use case:
411
+
412
+ * `bigqueryanalyticshub.ListingIamPolicy`: Authoritative. Sets the IAM policy for the listing and replaces any existing policy already attached.
413
+ * `bigqueryanalyticshub.ListingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the listing are preserved.
414
+ * `bigqueryanalyticshub.ListingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the listing are preserved.
415
+
416
+ A data source can be used to retrieve policy data in advent you do not need creation
417
+
418
+ * `bigqueryanalyticshub.ListingIamPolicy`: Retrieves the IAM policy for the listing
419
+
420
+ > **Note:** `bigqueryanalyticshub.ListingIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.ListingIamBinding` and `bigqueryanalyticshub.ListingIamMember` or they will fight over what your policy should be.
421
+
422
+ > **Note:** `bigqueryanalyticshub.ListingIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.ListingIamMember` resources **only if** they do not grant privilege to the same role.
423
+
405
424
  ## bigqueryanalyticshub.ListingIamPolicy
406
425
 
407
426
  ```python
@@ -582,6 +601,25 @@ class ListingIamMember(pulumi.CustomResource):
582
601
  member="user:jane@example.com")
583
602
  ```
584
603
 
604
+ ## This resource supports User Project Overrides.
605
+
606
+ -
607
+
608
+ # IAM policy for Bigquery Analytics Hub Listing
609
+ Three different resources help you manage your IAM policy for Bigquery Analytics Hub Listing. Each of these resources serves a different use case:
610
+
611
+ * `bigqueryanalyticshub.ListingIamPolicy`: Authoritative. Sets the IAM policy for the listing and replaces any existing policy already attached.
612
+ * `bigqueryanalyticshub.ListingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the listing are preserved.
613
+ * `bigqueryanalyticshub.ListingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the listing are preserved.
614
+
615
+ A data source can be used to retrieve policy data in advent you do not need creation
616
+
617
+ * `bigqueryanalyticshub.ListingIamPolicy`: Retrieves the IAM policy for the listing
618
+
619
+ > **Note:** `bigqueryanalyticshub.ListingIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.ListingIamBinding` and `bigqueryanalyticshub.ListingIamMember` or they will fight over what your policy should be.
620
+
621
+ > **Note:** `bigqueryanalyticshub.ListingIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.ListingIamMember` resources **only if** they do not grant privilege to the same role.
622
+
585
623
  ## bigqueryanalyticshub.ListingIamPolicy
586
624
 
587
625
  ```python
@@ -299,6 +299,25 @@ class ListingIamPolicy(pulumi.CustomResource):
299
299
  member="user:jane@example.com")
300
300
  ```
301
301
 
302
+ ## This resource supports User Project Overrides.
303
+
304
+ -
305
+
306
+ # IAM policy for Bigquery Analytics Hub Listing
307
+ Three different resources help you manage your IAM policy for Bigquery Analytics Hub Listing. Each of these resources serves a different use case:
308
+
309
+ * `bigqueryanalyticshub.ListingIamPolicy`: Authoritative. Sets the IAM policy for the listing and replaces any existing policy already attached.
310
+ * `bigqueryanalyticshub.ListingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the listing are preserved.
311
+ * `bigqueryanalyticshub.ListingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the listing are preserved.
312
+
313
+ A data source can be used to retrieve policy data in advent you do not need creation
314
+
315
+ * `bigqueryanalyticshub.ListingIamPolicy`: Retrieves the IAM policy for the listing
316
+
317
+ > **Note:** `bigqueryanalyticshub.ListingIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.ListingIamBinding` and `bigqueryanalyticshub.ListingIamMember` or they will fight over what your policy should be.
318
+
319
+ > **Note:** `bigqueryanalyticshub.ListingIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.ListingIamMember` resources **only if** they do not grant privilege to the same role.
320
+
302
321
  ## bigqueryanalyticshub.ListingIamPolicy
303
322
 
304
323
  ```python
@@ -467,6 +486,25 @@ class ListingIamPolicy(pulumi.CustomResource):
467
486
  member="user:jane@example.com")
468
487
  ```
469
488
 
489
+ ## This resource supports User Project Overrides.
490
+
491
+ -
492
+
493
+ # IAM policy for Bigquery Analytics Hub Listing
494
+ Three different resources help you manage your IAM policy for Bigquery Analytics Hub Listing. Each of these resources serves a different use case:
495
+
496
+ * `bigqueryanalyticshub.ListingIamPolicy`: Authoritative. Sets the IAM policy for the listing and replaces any existing policy already attached.
497
+ * `bigqueryanalyticshub.ListingIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the listing are preserved.
498
+ * `bigqueryanalyticshub.ListingIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the listing are preserved.
499
+
500
+ A data source can be used to retrieve policy data in advent you do not need creation
501
+
502
+ * `bigqueryanalyticshub.ListingIamPolicy`: Retrieves the IAM policy for the listing
503
+
504
+ > **Note:** `bigqueryanalyticshub.ListingIamPolicy` **cannot** be used in conjunction with `bigqueryanalyticshub.ListingIamBinding` and `bigqueryanalyticshub.ListingIamMember` or they will fight over what your policy should be.
505
+
506
+ > **Note:** `bigqueryanalyticshub.ListingIamBinding` resources **can be** used in conjunction with `bigqueryanalyticshub.ListingIamMember` resources **only if** they do not grant privilege to the same role.
507
+
470
508
  ## bigqueryanalyticshub.ListingIamPolicy
471
509
 
472
510
  ```python
@@ -359,6 +359,25 @@ class DataPolicyIamBinding(pulumi.CustomResource):
359
359
  member="user:jane@example.com")
360
360
  ```
361
361
 
362
+ ## This resource supports User Project Overrides.
363
+
364
+ -
365
+
366
+ # IAM policy for BigQuery Data Policy DataPolicy
367
+ Three different resources help you manage your IAM policy for BigQuery Data Policy DataPolicy. Each of these resources serves a different use case:
368
+
369
+ * `bigquerydatapolicy.DataPolicyIamPolicy`: Authoritative. Sets the IAM policy for the datapolicy and replaces any existing policy already attached.
370
+ * `bigquerydatapolicy.DataPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datapolicy are preserved.
371
+ * `bigquerydatapolicy.DataPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datapolicy are preserved.
372
+
373
+ A data source can be used to retrieve policy data in advent you do not need creation
374
+
375
+ * `bigquerydatapolicy.DataPolicyIamPolicy`: Retrieves the IAM policy for the datapolicy
376
+
377
+ > **Note:** `bigquerydatapolicy.DataPolicyIamPolicy` **cannot** be used in conjunction with `bigquerydatapolicy.DataPolicyIamBinding` and `bigquerydatapolicy.DataPolicyIamMember` or they will fight over what your policy should be.
378
+
379
+ > **Note:** `bigquerydatapolicy.DataPolicyIamBinding` resources **can be** used in conjunction with `bigquerydatapolicy.DataPolicyIamMember` resources **only if** they do not grant privilege to the same role.
380
+
362
381
  ## bigquerydatapolicy.DataPolicyIamPolicy
363
382
 
364
383
  ```python
@@ -531,6 +550,25 @@ class DataPolicyIamBinding(pulumi.CustomResource):
531
550
  member="user:jane@example.com")
532
551
  ```
533
552
 
553
+ ## This resource supports User Project Overrides.
554
+
555
+ -
556
+
557
+ # IAM policy for BigQuery Data Policy DataPolicy
558
+ Three different resources help you manage your IAM policy for BigQuery Data Policy DataPolicy. Each of these resources serves a different use case:
559
+
560
+ * `bigquerydatapolicy.DataPolicyIamPolicy`: Authoritative. Sets the IAM policy for the datapolicy and replaces any existing policy already attached.
561
+ * `bigquerydatapolicy.DataPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datapolicy are preserved.
562
+ * `bigquerydatapolicy.DataPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datapolicy are preserved.
563
+
564
+ A data source can be used to retrieve policy data in advent you do not need creation
565
+
566
+ * `bigquerydatapolicy.DataPolicyIamPolicy`: Retrieves the IAM policy for the datapolicy
567
+
568
+ > **Note:** `bigquerydatapolicy.DataPolicyIamPolicy` **cannot** be used in conjunction with `bigquerydatapolicy.DataPolicyIamBinding` and `bigquerydatapolicy.DataPolicyIamMember` or they will fight over what your policy should be.
569
+
570
+ > **Note:** `bigquerydatapolicy.DataPolicyIamBinding` resources **can be** used in conjunction with `bigquerydatapolicy.DataPolicyIamMember` resources **only if** they do not grant privilege to the same role.
571
+
534
572
  ## bigquerydatapolicy.DataPolicyIamPolicy
535
573
 
536
574
  ```python
@@ -359,6 +359,25 @@ class DataPolicyIamMember(pulumi.CustomResource):
359
359
  member="user:jane@example.com")
360
360
  ```
361
361
 
362
+ ## This resource supports User Project Overrides.
363
+
364
+ -
365
+
366
+ # IAM policy for BigQuery Data Policy DataPolicy
367
+ Three different resources help you manage your IAM policy for BigQuery Data Policy DataPolicy. Each of these resources serves a different use case:
368
+
369
+ * `bigquerydatapolicy.DataPolicyIamPolicy`: Authoritative. Sets the IAM policy for the datapolicy and replaces any existing policy already attached.
370
+ * `bigquerydatapolicy.DataPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datapolicy are preserved.
371
+ * `bigquerydatapolicy.DataPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datapolicy are preserved.
372
+
373
+ A data source can be used to retrieve policy data in advent you do not need creation
374
+
375
+ * `bigquerydatapolicy.DataPolicyIamPolicy`: Retrieves the IAM policy for the datapolicy
376
+
377
+ > **Note:** `bigquerydatapolicy.DataPolicyIamPolicy` **cannot** be used in conjunction with `bigquerydatapolicy.DataPolicyIamBinding` and `bigquerydatapolicy.DataPolicyIamMember` or they will fight over what your policy should be.
378
+
379
+ > **Note:** `bigquerydatapolicy.DataPolicyIamBinding` resources **can be** used in conjunction with `bigquerydatapolicy.DataPolicyIamMember` resources **only if** they do not grant privilege to the same role.
380
+
362
381
  ## bigquerydatapolicy.DataPolicyIamPolicy
363
382
 
364
383
  ```python
@@ -531,6 +550,25 @@ class DataPolicyIamMember(pulumi.CustomResource):
531
550
  member="user:jane@example.com")
532
551
  ```
533
552
 
553
+ ## This resource supports User Project Overrides.
554
+
555
+ -
556
+
557
+ # IAM policy for BigQuery Data Policy DataPolicy
558
+ Three different resources help you manage your IAM policy for BigQuery Data Policy DataPolicy. Each of these resources serves a different use case:
559
+
560
+ * `bigquerydatapolicy.DataPolicyIamPolicy`: Authoritative. Sets the IAM policy for the datapolicy and replaces any existing policy already attached.
561
+ * `bigquerydatapolicy.DataPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datapolicy are preserved.
562
+ * `bigquerydatapolicy.DataPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datapolicy are preserved.
563
+
564
+ A data source can be used to retrieve policy data in advent you do not need creation
565
+
566
+ * `bigquerydatapolicy.DataPolicyIamPolicy`: Retrieves the IAM policy for the datapolicy
567
+
568
+ > **Note:** `bigquerydatapolicy.DataPolicyIamPolicy` **cannot** be used in conjunction with `bigquerydatapolicy.DataPolicyIamBinding` and `bigquerydatapolicy.DataPolicyIamMember` or they will fight over what your policy should be.
569
+
570
+ > **Note:** `bigquerydatapolicy.DataPolicyIamBinding` resources **can be** used in conjunction with `bigquerydatapolicy.DataPolicyIamMember` resources **only if** they do not grant privilege to the same role.
571
+
534
572
  ## bigquerydatapolicy.DataPolicyIamPolicy
535
573
 
536
574
  ```python
@@ -256,6 +256,25 @@ class DataPolicyIamPolicy(pulumi.CustomResource):
256
256
  member="user:jane@example.com")
257
257
  ```
258
258
 
259
+ ## This resource supports User Project Overrides.
260
+
261
+ -
262
+
263
+ # IAM policy for BigQuery Data Policy DataPolicy
264
+ Three different resources help you manage your IAM policy for BigQuery Data Policy DataPolicy. Each of these resources serves a different use case:
265
+
266
+ * `bigquerydatapolicy.DataPolicyIamPolicy`: Authoritative. Sets the IAM policy for the datapolicy and replaces any existing policy already attached.
267
+ * `bigquerydatapolicy.DataPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datapolicy are preserved.
268
+ * `bigquerydatapolicy.DataPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datapolicy are preserved.
269
+
270
+ A data source can be used to retrieve policy data in advent you do not need creation
271
+
272
+ * `bigquerydatapolicy.DataPolicyIamPolicy`: Retrieves the IAM policy for the datapolicy
273
+
274
+ > **Note:** `bigquerydatapolicy.DataPolicyIamPolicy` **cannot** be used in conjunction with `bigquerydatapolicy.DataPolicyIamBinding` and `bigquerydatapolicy.DataPolicyIamMember` or they will fight over what your policy should be.
275
+
276
+ > **Note:** `bigquerydatapolicy.DataPolicyIamBinding` resources **can be** used in conjunction with `bigquerydatapolicy.DataPolicyIamMember` resources **only if** they do not grant privilege to the same role.
277
+
259
278
  ## bigquerydatapolicy.DataPolicyIamPolicy
260
279
 
261
280
  ```python
@@ -416,6 +435,25 @@ class DataPolicyIamPolicy(pulumi.CustomResource):
416
435
  member="user:jane@example.com")
417
436
  ```
418
437
 
438
+ ## This resource supports User Project Overrides.
439
+
440
+ -
441
+
442
+ # IAM policy for BigQuery Data Policy DataPolicy
443
+ Three different resources help you manage your IAM policy for BigQuery Data Policy DataPolicy. Each of these resources serves a different use case:
444
+
445
+ * `bigquerydatapolicy.DataPolicyIamPolicy`: Authoritative. Sets the IAM policy for the datapolicy and replaces any existing policy already attached.
446
+ * `bigquerydatapolicy.DataPolicyIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the datapolicy are preserved.
447
+ * `bigquerydatapolicy.DataPolicyIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the datapolicy are preserved.
448
+
449
+ A data source can be used to retrieve policy data in advent you do not need creation
450
+
451
+ * `bigquerydatapolicy.DataPolicyIamPolicy`: Retrieves the IAM policy for the datapolicy
452
+
453
+ > **Note:** `bigquerydatapolicy.DataPolicyIamPolicy` **cannot** be used in conjunction with `bigquerydatapolicy.DataPolicyIamBinding` and `bigquerydatapolicy.DataPolicyIamMember` or they will fight over what your policy should be.
454
+
455
+ > **Note:** `bigquerydatapolicy.DataPolicyIamBinding` resources **can be** used in conjunction with `bigquerydatapolicy.DataPolicyIamMember` resources **only if** they do not grant privilege to the same role.
456
+
419
457
  ## bigquerydatapolicy.DataPolicyIamPolicy
420
458
 
421
459
  ```python