pulumi-gcp 7.36.0a1723105270__py3-none-any.whl → 7.36.0a1723631483__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +40 -0
  2. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +40 -0
  3. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +40 -0
  4. pulumi_gcp/apigateway/api_config_iam_binding.py +38 -0
  5. pulumi_gcp/apigateway/api_config_iam_member.py +38 -0
  6. pulumi_gcp/apigateway/api_config_iam_policy.py +38 -0
  7. pulumi_gcp/apigateway/api_iam_binding.py +38 -0
  8. pulumi_gcp/apigateway/api_iam_member.py +38 -0
  9. pulumi_gcp/apigateway/api_iam_policy.py +38 -0
  10. pulumi_gcp/apigateway/gateway_iam_binding.py +38 -0
  11. pulumi_gcp/apigateway/gateway_iam_member.py +38 -0
  12. pulumi_gcp/apigateway/gateway_iam_policy.py +38 -0
  13. pulumi_gcp/apigee/environment_iam_binding.py +40 -0
  14. pulumi_gcp/apigee/environment_iam_member.py +40 -0
  15. pulumi_gcp/apigee/environment_iam_policy.py +40 -0
  16. pulumi_gcp/artifactregistry/repository_iam_binding.py +38 -0
  17. pulumi_gcp/artifactregistry/repository_iam_member.py +38 -0
  18. pulumi_gcp/artifactregistry/repository_iam_policy.py +38 -0
  19. pulumi_gcp/bigquery/connection_iam_binding.py +38 -0
  20. pulumi_gcp/bigquery/connection_iam_member.py +38 -0
  21. pulumi_gcp/bigquery/connection_iam_policy.py +38 -0
  22. pulumi_gcp/bigquery/dataset_iam_binding.py +0 -32
  23. pulumi_gcp/bigquery/dataset_iam_member.py +0 -32
  24. pulumi_gcp/bigquery/dataset_iam_policy.py +0 -32
  25. pulumi_gcp/bigquery/iam_binding.py +42 -0
  26. pulumi_gcp/bigquery/iam_member.py +42 -0
  27. pulumi_gcp/bigquery/iam_policy.py +42 -0
  28. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +38 -0
  29. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +38 -0
  30. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +38 -0
  31. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +38 -0
  32. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +38 -0
  33. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +38 -0
  34. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +38 -0
  35. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +38 -0
  36. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +38 -0
  37. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +38 -0
  38. pulumi_gcp/binaryauthorization/attestor_iam_member.py +38 -0
  39. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +38 -0
  40. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +42 -0
  41. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +42 -0
  42. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +42 -0
  43. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +42 -0
  44. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +42 -0
  45. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +42 -0
  46. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +38 -0
  47. pulumi_gcp/cloudbuildv2/connection_iam_member.py +38 -0
  48. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +38 -0
  49. pulumi_gcp/cloudfunctions/function_iam_binding.py +38 -0
  50. pulumi_gcp/cloudfunctions/function_iam_member.py +38 -0
  51. pulumi_gcp/cloudfunctions/function_iam_policy.py +38 -0
  52. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +38 -0
  53. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +38 -0
  54. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +38 -0
  55. pulumi_gcp/cloudrun/iam_binding.py +38 -0
  56. pulumi_gcp/cloudrun/iam_member.py +38 -0
  57. pulumi_gcp/cloudrun/iam_policy.py +38 -0
  58. pulumi_gcp/cloudrunv2/job_iam_binding.py +38 -0
  59. pulumi_gcp/cloudrunv2/job_iam_member.py +38 -0
  60. pulumi_gcp/cloudrunv2/job_iam_policy.py +38 -0
  61. pulumi_gcp/cloudrunv2/service_iam_binding.py +38 -0
  62. pulumi_gcp/cloudrunv2/service_iam_member.py +38 -0
  63. pulumi_gcp/cloudrunv2/service_iam_policy.py +38 -0
  64. pulumi_gcp/cloudtasks/queue_iam_binding.py +38 -0
  65. pulumi_gcp/cloudtasks/queue_iam_member.py +38 -0
  66. pulumi_gcp/cloudtasks/queue_iam_policy.py +38 -0
  67. pulumi_gcp/compute/disk_iam_binding.py +38 -0
  68. pulumi_gcp/compute/disk_iam_member.py +38 -0
  69. pulumi_gcp/compute/disk_iam_policy.py +38 -0
  70. pulumi_gcp/compute/image_iam_binding.py +42 -0
  71. pulumi_gcp/compute/image_iam_member.py +42 -0
  72. pulumi_gcp/compute/image_iam_policy.py +42 -0
  73. pulumi_gcp/compute/instance_iam_binding.py +42 -0
  74. pulumi_gcp/compute/instance_iam_member.py +42 -0
  75. pulumi_gcp/compute/instance_iam_policy.py +42 -0
  76. pulumi_gcp/compute/machine_image_iam_binding.py +40 -0
  77. pulumi_gcp/compute/machine_image_iam_member.py +40 -0
  78. pulumi_gcp/compute/machine_image_iam_policy.py +40 -0
  79. pulumi_gcp/compute/region_disk_iam_binding.py +38 -0
  80. pulumi_gcp/compute/region_disk_iam_member.py +38 -0
  81. pulumi_gcp/compute/region_disk_iam_policy.py +38 -0
  82. pulumi_gcp/compute/snapshot_iam_binding.py +38 -0
  83. pulumi_gcp/compute/snapshot_iam_member.py +38 -0
  84. pulumi_gcp/compute/snapshot_iam_policy.py +38 -0
  85. pulumi_gcp/compute/subnetwork_iam_binding.py +42 -0
  86. pulumi_gcp/compute/subnetwork_iam_member.py +42 -0
  87. pulumi_gcp/compute/subnetwork_iam_policy.py +42 -0
  88. pulumi_gcp/containeranalysis/note_iam_binding.py +38 -0
  89. pulumi_gcp/containeranalysis/note_iam_member.py +38 -0
  90. pulumi_gcp/containeranalysis/note_iam_policy.py +38 -0
  91. pulumi_gcp/datacatalog/entry_group_iam_binding.py +38 -0
  92. pulumi_gcp/datacatalog/entry_group_iam_member.py +38 -0
  93. pulumi_gcp/datacatalog/entry_group_iam_policy.py +38 -0
  94. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +40 -0
  95. pulumi_gcp/datacatalog/policy_tag_iam_member.py +40 -0
  96. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +40 -0
  97. pulumi_gcp/datacatalog/tag_template_iam_binding.py +38 -0
  98. pulumi_gcp/datacatalog/tag_template_iam_member.py +38 -0
  99. pulumi_gcp/datacatalog/tag_template_iam_policy.py +38 -0
  100. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +38 -0
  101. pulumi_gcp/datacatalog/taxonomy_iam_member.py +38 -0
  102. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +38 -0
  103. pulumi_gcp/dataplex/aspect_type_iam_binding.py +38 -0
  104. pulumi_gcp/dataplex/aspect_type_iam_member.py +38 -0
  105. pulumi_gcp/dataplex/aspect_type_iam_policy.py +38 -0
  106. pulumi_gcp/dataplex/asset_iam_binding.py +38 -0
  107. pulumi_gcp/dataplex/asset_iam_member.py +38 -0
  108. pulumi_gcp/dataplex/asset_iam_policy.py +38 -0
  109. pulumi_gcp/dataplex/datascan_iam_binding.py +38 -0
  110. pulumi_gcp/dataplex/datascan_iam_member.py +38 -0
  111. pulumi_gcp/dataplex/datascan_iam_policy.py +38 -0
  112. pulumi_gcp/dataplex/entry_group_iam_binding.py +38 -0
  113. pulumi_gcp/dataplex/entry_group_iam_member.py +38 -0
  114. pulumi_gcp/dataplex/entry_group_iam_policy.py +38 -0
  115. pulumi_gcp/dataplex/entry_type_iam_binding.py +38 -0
  116. pulumi_gcp/dataplex/entry_type_iam_member.py +38 -0
  117. pulumi_gcp/dataplex/entry_type_iam_policy.py +38 -0
  118. pulumi_gcp/dataplex/lake_iam_binding.py +38 -0
  119. pulumi_gcp/dataplex/lake_iam_member.py +38 -0
  120. pulumi_gcp/dataplex/lake_iam_policy.py +38 -0
  121. pulumi_gcp/dataplex/task_iam_binding.py +38 -0
  122. pulumi_gcp/dataplex/task_iam_member.py +38 -0
  123. pulumi_gcp/dataplex/task_iam_policy.py +38 -0
  124. pulumi_gcp/dataplex/zone_iam_binding.py +38 -0
  125. pulumi_gcp/dataplex/zone_iam_member.py +38 -0
  126. pulumi_gcp/dataplex/zone_iam_policy.py +38 -0
  127. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +38 -0
  128. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +38 -0
  129. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +38 -0
  130. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +38 -0
  131. pulumi_gcp/dataproc/metastore_federation_iam_member.py +38 -0
  132. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +38 -0
  133. pulumi_gcp/dataproc/metastore_service_iam_binding.py +38 -0
  134. pulumi_gcp/dataproc/metastore_service_iam_member.py +38 -0
  135. pulumi_gcp/dataproc/metastore_service_iam_policy.py +38 -0
  136. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +38 -0
  137. pulumi_gcp/dns/dns_managed_zone_iam_member.py +38 -0
  138. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +38 -0
  139. pulumi_gcp/endpoints/service_iam_binding.py +40 -0
  140. pulumi_gcp/endpoints/service_iam_member.py +40 -0
  141. pulumi_gcp/endpoints/service_iam_policy.py +40 -0
  142. pulumi_gcp/folder/iam_audit_config.py +0 -86
  143. pulumi_gcp/folder/iam_member.py +0 -86
  144. pulumi_gcp/folder/iam_policy.py +0 -86
  145. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +38 -0
  146. pulumi_gcp/gkebackup/backup_plan_iam_member.py +38 -0
  147. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +38 -0
  148. pulumi_gcp/gkebackup/restore_plan_iam_binding.py +38 -0
  149. pulumi_gcp/gkebackup/restore_plan_iam_member.py +38 -0
  150. pulumi_gcp/gkebackup/restore_plan_iam_policy.py +38 -0
  151. pulumi_gcp/gkehub/feature_iam_binding.py +38 -0
  152. pulumi_gcp/gkehub/feature_iam_member.py +38 -0
  153. pulumi_gcp/gkehub/feature_iam_policy.py +38 -0
  154. pulumi_gcp/gkehub/membership_iam_binding.py +38 -0
  155. pulumi_gcp/gkehub/membership_iam_member.py +38 -0
  156. pulumi_gcp/gkehub/membership_iam_policy.py +38 -0
  157. pulumi_gcp/gkehub/scope_iam_binding.py +38 -0
  158. pulumi_gcp/gkehub/scope_iam_member.py +38 -0
  159. pulumi_gcp/gkehub/scope_iam_policy.py +38 -0
  160. pulumi_gcp/healthcare/consent_store_iam_binding.py +40 -0
  161. pulumi_gcp/healthcare/consent_store_iam_member.py +40 -0
  162. pulumi_gcp/healthcare/consent_store_iam_policy.py +40 -0
  163. pulumi_gcp/healthcare/dataset_iam_binding.py +0 -30
  164. pulumi_gcp/healthcare/dataset_iam_member.py +0 -30
  165. pulumi_gcp/healthcare/dataset_iam_policy.py +0 -30
  166. pulumi_gcp/healthcare/dicom_store_iam_binding.py +0 -30
  167. pulumi_gcp/healthcare/dicom_store_iam_member.py +0 -30
  168. pulumi_gcp/healthcare/dicom_store_iam_policy.py +0 -30
  169. pulumi_gcp/healthcare/fhir_store_iam_binding.py +0 -30
  170. pulumi_gcp/healthcare/fhir_store_iam_member.py +0 -30
  171. pulumi_gcp/healthcare/fhir_store_iam_policy.py +0 -30
  172. pulumi_gcp/healthcare/hl7_store_iam_binding.py +0 -30
  173. pulumi_gcp/healthcare/hl7_store_iam_member.py +0 -30
  174. pulumi_gcp/healthcare/hl7_store_iam_policy.py +0 -30
  175. pulumi_gcp/iap/app_engine_service_iam_binding.py +42 -0
  176. pulumi_gcp/iap/app_engine_service_iam_member.py +42 -0
  177. pulumi_gcp/iap/app_engine_service_iam_policy.py +42 -0
  178. pulumi_gcp/iap/app_engine_version_iam_binding.py +42 -0
  179. pulumi_gcp/iap/app_engine_version_iam_member.py +42 -0
  180. pulumi_gcp/iap/app_engine_version_iam_policy.py +42 -0
  181. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +42 -0
  182. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +42 -0
  183. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +42 -0
  184. pulumi_gcp/iap/tunnel_iam_binding.py +42 -0
  185. pulumi_gcp/iap/tunnel_iam_member.py +42 -0
  186. pulumi_gcp/iap/tunnel_iam_policy.py +42 -0
  187. pulumi_gcp/iap/tunnel_instance_iam_binding.py +42 -0
  188. pulumi_gcp/iap/tunnel_instance_iam_member.py +42 -0
  189. pulumi_gcp/iap/tunnel_instance_iam_policy.py +42 -0
  190. pulumi_gcp/iap/web_backend_service_iam_binding.py +42 -0
  191. pulumi_gcp/iap/web_backend_service_iam_member.py +42 -0
  192. pulumi_gcp/iap/web_backend_service_iam_policy.py +42 -0
  193. pulumi_gcp/iap/web_iam_binding.py +42 -0
  194. pulumi_gcp/iap/web_iam_member.py +42 -0
  195. pulumi_gcp/iap/web_iam_policy.py +42 -0
  196. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +42 -0
  197. pulumi_gcp/iap/web_region_backend_service_iam_member.py +42 -0
  198. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +42 -0
  199. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +42 -0
  200. pulumi_gcp/iap/web_type_app_enging_iam_member.py +42 -0
  201. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +42 -0
  202. pulumi_gcp/iap/web_type_compute_iam_binding.py +42 -0
  203. pulumi_gcp/iap/web_type_compute_iam_member.py +42 -0
  204. pulumi_gcp/iap/web_type_compute_iam_policy.py +42 -0
  205. pulumi_gcp/kms/key_ring_iam_binding.py +0 -82
  206. pulumi_gcp/kms/key_ring_iam_member.py +0 -82
  207. pulumi_gcp/kms/key_ring_iam_policy.py +0 -82
  208. pulumi_gcp/notebooks/instance_iam_binding.py +38 -0
  209. pulumi_gcp/notebooks/instance_iam_member.py +38 -0
  210. pulumi_gcp/notebooks/instance_iam_policy.py +38 -0
  211. pulumi_gcp/notebooks/runtime_iam_binding.py +38 -0
  212. pulumi_gcp/notebooks/runtime_iam_member.py +38 -0
  213. pulumi_gcp/notebooks/runtime_iam_policy.py +38 -0
  214. pulumi_gcp/organizations/iam_member.py +0 -94
  215. pulumi_gcp/organizations/iam_policy.py +0 -94
  216. pulumi_gcp/pubsub/schema_iam_binding.py +38 -0
  217. pulumi_gcp/pubsub/schema_iam_member.py +38 -0
  218. pulumi_gcp/pubsub/schema_iam_policy.py +38 -0
  219. pulumi_gcp/pubsub/subscription_iam_binding.py +0 -30
  220. pulumi_gcp/pubsub/subscription_iam_member.py +0 -30
  221. pulumi_gcp/pubsub/subscription_iam_policy.py +0 -30
  222. pulumi_gcp/pubsub/topic_iam_binding.py +38 -0
  223. pulumi_gcp/pubsub/topic_iam_member.py +38 -0
  224. pulumi_gcp/pubsub/topic_iam_policy.py +38 -0
  225. pulumi_gcp/pulumi-plugin.json +1 -1
  226. pulumi_gcp/secretmanager/secret_iam_binding.py +42 -0
  227. pulumi_gcp/secretmanager/secret_iam_member.py +42 -0
  228. pulumi_gcp/secretmanager/secret_iam_policy.py +42 -0
  229. pulumi_gcp/securesourcemanager/repository_iam_binding.py +38 -0
  230. pulumi_gcp/securesourcemanager/repository_iam_member.py +38 -0
  231. pulumi_gcp/securesourcemanager/repository_iam_policy.py +38 -0
  232. pulumi_gcp/serviceaccount/get_account.py +6 -6
  233. pulumi_gcp/serviceaccount/key.py +6 -6
  234. pulumi_gcp/servicedirectory/namespace_iam_binding.py +40 -0
  235. pulumi_gcp/servicedirectory/namespace_iam_member.py +40 -0
  236. pulumi_gcp/servicedirectory/namespace_iam_policy.py +40 -0
  237. pulumi_gcp/servicedirectory/service_iam_binding.py +40 -0
  238. pulumi_gcp/servicedirectory/service_iam_member.py +40 -0
  239. pulumi_gcp/servicedirectory/service_iam_policy.py +40 -0
  240. pulumi_gcp/sourcerepo/repository_iam_binding.py +38 -0
  241. pulumi_gcp/sourcerepo/repository_iam_member.py +38 -0
  242. pulumi_gcp/sourcerepo/repository_iam_policy.py +38 -0
  243. pulumi_gcp/spanner/database_iam_binding.py +0 -74
  244. pulumi_gcp/spanner/database_iam_member.py +0 -74
  245. pulumi_gcp/spanner/database_iam_policy.py +0 -74
  246. pulumi_gcp/spanner/instance_iam_binding.py +0 -30
  247. pulumi_gcp/spanner/instance_iam_member.py +0 -30
  248. pulumi_gcp/spanner/instance_iam_policy.py +0 -30
  249. pulumi_gcp/storage/bucket_iam_binding.py +42 -0
  250. pulumi_gcp/storage/bucket_iam_member.py +42 -0
  251. pulumi_gcp/storage/bucket_iam_policy.py +42 -0
  252. pulumi_gcp/storage/managed_folder_iam_binding.py +44 -0
  253. pulumi_gcp/storage/managed_folder_iam_member.py +44 -0
  254. pulumi_gcp/storage/managed_folder_iam_policy.py +44 -0
  255. pulumi_gcp/tags/tag_key_iam_binding.py +40 -0
  256. pulumi_gcp/tags/tag_key_iam_member.py +40 -0
  257. pulumi_gcp/tags/tag_key_iam_policy.py +40 -0
  258. pulumi_gcp/tags/tag_value_iam_binding.py +40 -0
  259. pulumi_gcp/tags/tag_value_iam_member.py +40 -0
  260. pulumi_gcp/tags/tag_value_iam_policy.py +40 -0
  261. {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723631483.dist-info}/METADATA +1 -1
  262. {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723631483.dist-info}/RECORD +264 -264
  263. {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723631483.dist-info}/WHEEL +1 -1
  264. {pulumi_gcp-7.36.0a1723105270.dist-info → pulumi_gcp-7.36.0a1723631483.dist-info}/top_level.txt +0 -0
@@ -319,6 +319,25 @@ class AttestorIamBinding(pulumi.CustomResource):
319
319
  member="user:jane@example.com")
320
320
  ```
321
321
 
322
+ ## This resource supports User Project Overrides.
323
+
324
+ -
325
+
326
+ # IAM policy for Binary Authorization Attestor
327
+ Three different resources help you manage your IAM policy for Binary Authorization Attestor. Each of these resources serves a different use case:
328
+
329
+ * `binaryauthorization.AttestorIamPolicy`: Authoritative. Sets the IAM policy for the attestor and replaces any existing policy already attached.
330
+ * `binaryauthorization.AttestorIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the attestor are preserved.
331
+ * `binaryauthorization.AttestorIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the attestor are preserved.
332
+
333
+ A data source can be used to retrieve policy data in advent you do not need creation
334
+
335
+ * `binaryauthorization.AttestorIamPolicy`: Retrieves the IAM policy for the attestor
336
+
337
+ > **Note:** `binaryauthorization.AttestorIamPolicy` **cannot** be used in conjunction with `binaryauthorization.AttestorIamBinding` and `binaryauthorization.AttestorIamMember` or they will fight over what your policy should be.
338
+
339
+ > **Note:** `binaryauthorization.AttestorIamBinding` resources **can be** used in conjunction with `binaryauthorization.AttestorIamMember` resources **only if** they do not grant privilege to the same role.
340
+
322
341
  ## binaryauthorization.AttestorIamPolicy
323
342
 
324
343
  ```python
@@ -480,6 +499,25 @@ class AttestorIamBinding(pulumi.CustomResource):
480
499
  member="user:jane@example.com")
481
500
  ```
482
501
 
502
+ ## This resource supports User Project Overrides.
503
+
504
+ -
505
+
506
+ # IAM policy for Binary Authorization Attestor
507
+ Three different resources help you manage your IAM policy for Binary Authorization Attestor. Each of these resources serves a different use case:
508
+
509
+ * `binaryauthorization.AttestorIamPolicy`: Authoritative. Sets the IAM policy for the attestor and replaces any existing policy already attached.
510
+ * `binaryauthorization.AttestorIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the attestor are preserved.
511
+ * `binaryauthorization.AttestorIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the attestor are preserved.
512
+
513
+ A data source can be used to retrieve policy data in advent you do not need creation
514
+
515
+ * `binaryauthorization.AttestorIamPolicy`: Retrieves the IAM policy for the attestor
516
+
517
+ > **Note:** `binaryauthorization.AttestorIamPolicy` **cannot** be used in conjunction with `binaryauthorization.AttestorIamBinding` and `binaryauthorization.AttestorIamMember` or they will fight over what your policy should be.
518
+
519
+ > **Note:** `binaryauthorization.AttestorIamBinding` resources **can be** used in conjunction with `binaryauthorization.AttestorIamMember` resources **only if** they do not grant privilege to the same role.
520
+
483
521
  ## binaryauthorization.AttestorIamPolicy
484
522
 
485
523
  ```python
@@ -319,6 +319,25 @@ class AttestorIamMember(pulumi.CustomResource):
319
319
  member="user:jane@example.com")
320
320
  ```
321
321
 
322
+ ## This resource supports User Project Overrides.
323
+
324
+ -
325
+
326
+ # IAM policy for Binary Authorization Attestor
327
+ Three different resources help you manage your IAM policy for Binary Authorization Attestor. Each of these resources serves a different use case:
328
+
329
+ * `binaryauthorization.AttestorIamPolicy`: Authoritative. Sets the IAM policy for the attestor and replaces any existing policy already attached.
330
+ * `binaryauthorization.AttestorIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the attestor are preserved.
331
+ * `binaryauthorization.AttestorIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the attestor are preserved.
332
+
333
+ A data source can be used to retrieve policy data in advent you do not need creation
334
+
335
+ * `binaryauthorization.AttestorIamPolicy`: Retrieves the IAM policy for the attestor
336
+
337
+ > **Note:** `binaryauthorization.AttestorIamPolicy` **cannot** be used in conjunction with `binaryauthorization.AttestorIamBinding` and `binaryauthorization.AttestorIamMember` or they will fight over what your policy should be.
338
+
339
+ > **Note:** `binaryauthorization.AttestorIamBinding` resources **can be** used in conjunction with `binaryauthorization.AttestorIamMember` resources **only if** they do not grant privilege to the same role.
340
+
322
341
  ## binaryauthorization.AttestorIamPolicy
323
342
 
324
343
  ```python
@@ -480,6 +499,25 @@ class AttestorIamMember(pulumi.CustomResource):
480
499
  member="user:jane@example.com")
481
500
  ```
482
501
 
502
+ ## This resource supports User Project Overrides.
503
+
504
+ -
505
+
506
+ # IAM policy for Binary Authorization Attestor
507
+ Three different resources help you manage your IAM policy for Binary Authorization Attestor. Each of these resources serves a different use case:
508
+
509
+ * `binaryauthorization.AttestorIamPolicy`: Authoritative. Sets the IAM policy for the attestor and replaces any existing policy already attached.
510
+ * `binaryauthorization.AttestorIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the attestor are preserved.
511
+ * `binaryauthorization.AttestorIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the attestor are preserved.
512
+
513
+ A data source can be used to retrieve policy data in advent you do not need creation
514
+
515
+ * `binaryauthorization.AttestorIamPolicy`: Retrieves the IAM policy for the attestor
516
+
517
+ > **Note:** `binaryauthorization.AttestorIamPolicy` **cannot** be used in conjunction with `binaryauthorization.AttestorIamBinding` and `binaryauthorization.AttestorIamMember` or they will fight over what your policy should be.
518
+
519
+ > **Note:** `binaryauthorization.AttestorIamBinding` resources **can be** used in conjunction with `binaryauthorization.AttestorIamMember` resources **only if** they do not grant privilege to the same role.
520
+
483
521
  ## binaryauthorization.AttestorIamPolicy
484
522
 
485
523
  ```python
@@ -216,6 +216,25 @@ class AttestorIamPolicy(pulumi.CustomResource):
216
216
  member="user:jane@example.com")
217
217
  ```
218
218
 
219
+ ## This resource supports User Project Overrides.
220
+
221
+ -
222
+
223
+ # IAM policy for Binary Authorization Attestor
224
+ Three different resources help you manage your IAM policy for Binary Authorization Attestor. Each of these resources serves a different use case:
225
+
226
+ * `binaryauthorization.AttestorIamPolicy`: Authoritative. Sets the IAM policy for the attestor and replaces any existing policy already attached.
227
+ * `binaryauthorization.AttestorIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the attestor are preserved.
228
+ * `binaryauthorization.AttestorIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the attestor are preserved.
229
+
230
+ A data source can be used to retrieve policy data in advent you do not need creation
231
+
232
+ * `binaryauthorization.AttestorIamPolicy`: Retrieves the IAM policy for the attestor
233
+
234
+ > **Note:** `binaryauthorization.AttestorIamPolicy` **cannot** be used in conjunction with `binaryauthorization.AttestorIamBinding` and `binaryauthorization.AttestorIamMember` or they will fight over what your policy should be.
235
+
236
+ > **Note:** `binaryauthorization.AttestorIamBinding` resources **can be** used in conjunction with `binaryauthorization.AttestorIamMember` resources **only if** they do not grant privilege to the same role.
237
+
219
238
  ## binaryauthorization.AttestorIamPolicy
220
239
 
221
240
  ```python
@@ -365,6 +384,25 @@ class AttestorIamPolicy(pulumi.CustomResource):
365
384
  member="user:jane@example.com")
366
385
  ```
367
386
 
387
+ ## This resource supports User Project Overrides.
388
+
389
+ -
390
+
391
+ # IAM policy for Binary Authorization Attestor
392
+ Three different resources help you manage your IAM policy for Binary Authorization Attestor. Each of these resources serves a different use case:
393
+
394
+ * `binaryauthorization.AttestorIamPolicy`: Authoritative. Sets the IAM policy for the attestor and replaces any existing policy already attached.
395
+ * `binaryauthorization.AttestorIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the attestor are preserved.
396
+ * `binaryauthorization.AttestorIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the attestor are preserved.
397
+
398
+ A data source can be used to retrieve policy data in advent you do not need creation
399
+
400
+ * `binaryauthorization.AttestorIamPolicy`: Retrieves the IAM policy for the attestor
401
+
402
+ > **Note:** `binaryauthorization.AttestorIamPolicy` **cannot** be used in conjunction with `binaryauthorization.AttestorIamBinding` and `binaryauthorization.AttestorIamMember` or they will fight over what your policy should be.
403
+
404
+ > **Note:** `binaryauthorization.AttestorIamBinding` resources **can be** used in conjunction with `binaryauthorization.AttestorIamMember` resources **only if** they do not grant privilege to the same role.
405
+
368
406
  ## binaryauthorization.AttestorIamPolicy
369
407
 
370
408
  ```python
@@ -431,6 +431,27 @@ class CaPoolIamBinding(pulumi.CustomResource):
431
431
  })
432
432
  ```
433
433
 
434
+ ## This resource supports User Project Overrides.
435
+
436
+ -
437
+
438
+ # IAM policy for Certificate Authority Service CaPool
439
+ Three different resources help you manage your IAM policy for Certificate Authority Service CaPool. Each of these resources serves a different use case:
440
+
441
+ * `certificateauthority.CaPoolIamPolicy`: Authoritative. Sets the IAM policy for the capool and replaces any existing policy already attached.
442
+ * `certificateauthority.CaPoolIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the capool are preserved.
443
+ * `certificateauthority.CaPoolIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the capool are preserved.
444
+
445
+ A data source can be used to retrieve policy data in advent you do not need creation
446
+
447
+ * `certificateauthority.CaPoolIamPolicy`: Retrieves the IAM policy for the capool
448
+
449
+ > **Note:** `certificateauthority.CaPoolIamPolicy` **cannot** be used in conjunction with `certificateauthority.CaPoolIamBinding` and `certificateauthority.CaPoolIamMember` or they will fight over what your policy should be.
450
+
451
+ > **Note:** `certificateauthority.CaPoolIamBinding` resources **can be** used in conjunction with `certificateauthority.CaPoolIamMember` resources **only if** they do not grant privilege to the same role.
452
+
453
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
454
+
434
455
  ## certificateauthority.CaPoolIamPolicy
435
456
 
436
457
  ```python
@@ -699,6 +720,27 @@ class CaPoolIamBinding(pulumi.CustomResource):
699
720
  })
700
721
  ```
701
722
 
723
+ ## This resource supports User Project Overrides.
724
+
725
+ -
726
+
727
+ # IAM policy for Certificate Authority Service CaPool
728
+ Three different resources help you manage your IAM policy for Certificate Authority Service CaPool. Each of these resources serves a different use case:
729
+
730
+ * `certificateauthority.CaPoolIamPolicy`: Authoritative. Sets the IAM policy for the capool and replaces any existing policy already attached.
731
+ * `certificateauthority.CaPoolIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the capool are preserved.
732
+ * `certificateauthority.CaPoolIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the capool are preserved.
733
+
734
+ A data source can be used to retrieve policy data in advent you do not need creation
735
+
736
+ * `certificateauthority.CaPoolIamPolicy`: Retrieves the IAM policy for the capool
737
+
738
+ > **Note:** `certificateauthority.CaPoolIamPolicy` **cannot** be used in conjunction with `certificateauthority.CaPoolIamBinding` and `certificateauthority.CaPoolIamMember` or they will fight over what your policy should be.
739
+
740
+ > **Note:** `certificateauthority.CaPoolIamBinding` resources **can be** used in conjunction with `certificateauthority.CaPoolIamMember` resources **only if** they do not grant privilege to the same role.
741
+
742
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
743
+
702
744
  ## certificateauthority.CaPoolIamPolicy
703
745
 
704
746
  ```python
@@ -431,6 +431,27 @@ class CaPoolIamMember(pulumi.CustomResource):
431
431
  })
432
432
  ```
433
433
 
434
+ ## This resource supports User Project Overrides.
435
+
436
+ -
437
+
438
+ # IAM policy for Certificate Authority Service CaPool
439
+ Three different resources help you manage your IAM policy for Certificate Authority Service CaPool. Each of these resources serves a different use case:
440
+
441
+ * `certificateauthority.CaPoolIamPolicy`: Authoritative. Sets the IAM policy for the capool and replaces any existing policy already attached.
442
+ * `certificateauthority.CaPoolIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the capool are preserved.
443
+ * `certificateauthority.CaPoolIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the capool are preserved.
444
+
445
+ A data source can be used to retrieve policy data in advent you do not need creation
446
+
447
+ * `certificateauthority.CaPoolIamPolicy`: Retrieves the IAM policy for the capool
448
+
449
+ > **Note:** `certificateauthority.CaPoolIamPolicy` **cannot** be used in conjunction with `certificateauthority.CaPoolIamBinding` and `certificateauthority.CaPoolIamMember` or they will fight over what your policy should be.
450
+
451
+ > **Note:** `certificateauthority.CaPoolIamBinding` resources **can be** used in conjunction with `certificateauthority.CaPoolIamMember` resources **only if** they do not grant privilege to the same role.
452
+
453
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
454
+
434
455
  ## certificateauthority.CaPoolIamPolicy
435
456
 
436
457
  ```python
@@ -699,6 +720,27 @@ class CaPoolIamMember(pulumi.CustomResource):
699
720
  })
700
721
  ```
701
722
 
723
+ ## This resource supports User Project Overrides.
724
+
725
+ -
726
+
727
+ # IAM policy for Certificate Authority Service CaPool
728
+ Three different resources help you manage your IAM policy for Certificate Authority Service CaPool. Each of these resources serves a different use case:
729
+
730
+ * `certificateauthority.CaPoolIamPolicy`: Authoritative. Sets the IAM policy for the capool and replaces any existing policy already attached.
731
+ * `certificateauthority.CaPoolIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the capool are preserved.
732
+ * `certificateauthority.CaPoolIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the capool are preserved.
733
+
734
+ A data source can be used to retrieve policy data in advent you do not need creation
735
+
736
+ * `certificateauthority.CaPoolIamPolicy`: Retrieves the IAM policy for the capool
737
+
738
+ > **Note:** `certificateauthority.CaPoolIamPolicy` **cannot** be used in conjunction with `certificateauthority.CaPoolIamBinding` and `certificateauthority.CaPoolIamMember` or they will fight over what your policy should be.
739
+
740
+ > **Note:** `certificateauthority.CaPoolIamBinding` resources **can be** used in conjunction with `certificateauthority.CaPoolIamMember` resources **only if** they do not grant privilege to the same role.
741
+
742
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
743
+
702
744
  ## certificateauthority.CaPoolIamPolicy
703
745
 
704
746
  ```python
@@ -316,6 +316,27 @@ class CaPoolIamPolicy(pulumi.CustomResource):
316
316
  })
317
317
  ```
318
318
 
319
+ ## This resource supports User Project Overrides.
320
+
321
+ -
322
+
323
+ # IAM policy for Certificate Authority Service CaPool
324
+ Three different resources help you manage your IAM policy for Certificate Authority Service CaPool. Each of these resources serves a different use case:
325
+
326
+ * `certificateauthority.CaPoolIamPolicy`: Authoritative. Sets the IAM policy for the capool and replaces any existing policy already attached.
327
+ * `certificateauthority.CaPoolIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the capool are preserved.
328
+ * `certificateauthority.CaPoolIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the capool are preserved.
329
+
330
+ A data source can be used to retrieve policy data in advent you do not need creation
331
+
332
+ * `certificateauthority.CaPoolIamPolicy`: Retrieves the IAM policy for the capool
333
+
334
+ > **Note:** `certificateauthority.CaPoolIamPolicy` **cannot** be used in conjunction with `certificateauthority.CaPoolIamBinding` and `certificateauthority.CaPoolIamMember` or they will fight over what your policy should be.
335
+
336
+ > **Note:** `certificateauthority.CaPoolIamBinding` resources **can be** used in conjunction with `certificateauthority.CaPoolIamMember` resources **only if** they do not grant privilege to the same role.
337
+
338
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
339
+
319
340
  ## certificateauthority.CaPoolIamPolicy
320
341
 
321
342
  ```python
@@ -570,6 +591,27 @@ class CaPoolIamPolicy(pulumi.CustomResource):
570
591
  })
571
592
  ```
572
593
 
594
+ ## This resource supports User Project Overrides.
595
+
596
+ -
597
+
598
+ # IAM policy for Certificate Authority Service CaPool
599
+ Three different resources help you manage your IAM policy for Certificate Authority Service CaPool. Each of these resources serves a different use case:
600
+
601
+ * `certificateauthority.CaPoolIamPolicy`: Authoritative. Sets the IAM policy for the capool and replaces any existing policy already attached.
602
+ * `certificateauthority.CaPoolIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the capool are preserved.
603
+ * `certificateauthority.CaPoolIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the capool are preserved.
604
+
605
+ A data source can be used to retrieve policy data in advent you do not need creation
606
+
607
+ * `certificateauthority.CaPoolIamPolicy`: Retrieves the IAM policy for the capool
608
+
609
+ > **Note:** `certificateauthority.CaPoolIamPolicy` **cannot** be used in conjunction with `certificateauthority.CaPoolIamBinding` and `certificateauthority.CaPoolIamMember` or they will fight over what your policy should be.
610
+
611
+ > **Note:** `certificateauthority.CaPoolIamBinding` resources **can be** used in conjunction with `certificateauthority.CaPoolIamMember` resources **only if** they do not grant privilege to the same role.
612
+
613
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
614
+
573
615
  ## certificateauthority.CaPoolIamPolicy
574
616
 
575
617
  ```python
@@ -423,6 +423,27 @@ class CertificateTemplateIamBinding(pulumi.CustomResource):
423
423
  })
424
424
  ```
425
425
 
426
+ ## This resource supports User Project Overrides.
427
+
428
+ -
429
+
430
+ # IAM policy for Certificate Authority Service CertificateTemplate
431
+ Three different resources help you manage your IAM policy for Certificate Authority Service CertificateTemplate. Each of these resources serves a different use case:
432
+
433
+ * `certificateauthority.CertificateTemplateIamPolicy`: Authoritative. Sets the IAM policy for the certificatetemplate and replaces any existing policy already attached.
434
+ * `certificateauthority.CertificateTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the certificatetemplate are preserved.
435
+ * `certificateauthority.CertificateTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the certificatetemplate are preserved.
436
+
437
+ A data source can be used to retrieve policy data in advent you do not need creation
438
+
439
+ * `certificateauthority.CertificateTemplateIamPolicy`: Retrieves the IAM policy for the certificatetemplate
440
+
441
+ > **Note:** `certificateauthority.CertificateTemplateIamPolicy` **cannot** be used in conjunction with `certificateauthority.CertificateTemplateIamBinding` and `certificateauthority.CertificateTemplateIamMember` or they will fight over what your policy should be.
442
+
443
+ > **Note:** `certificateauthority.CertificateTemplateIamBinding` resources **can be** used in conjunction with `certificateauthority.CertificateTemplateIamMember` resources **only if** they do not grant privilege to the same role.
444
+
445
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
446
+
426
447
  ## certificateauthority.CertificateTemplateIamPolicy
427
448
 
428
449
  ```python
@@ -689,6 +710,27 @@ class CertificateTemplateIamBinding(pulumi.CustomResource):
689
710
  })
690
711
  ```
691
712
 
713
+ ## This resource supports User Project Overrides.
714
+
715
+ -
716
+
717
+ # IAM policy for Certificate Authority Service CertificateTemplate
718
+ Three different resources help you manage your IAM policy for Certificate Authority Service CertificateTemplate. Each of these resources serves a different use case:
719
+
720
+ * `certificateauthority.CertificateTemplateIamPolicy`: Authoritative. Sets the IAM policy for the certificatetemplate and replaces any existing policy already attached.
721
+ * `certificateauthority.CertificateTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the certificatetemplate are preserved.
722
+ * `certificateauthority.CertificateTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the certificatetemplate are preserved.
723
+
724
+ A data source can be used to retrieve policy data in advent you do not need creation
725
+
726
+ * `certificateauthority.CertificateTemplateIamPolicy`: Retrieves the IAM policy for the certificatetemplate
727
+
728
+ > **Note:** `certificateauthority.CertificateTemplateIamPolicy` **cannot** be used in conjunction with `certificateauthority.CertificateTemplateIamBinding` and `certificateauthority.CertificateTemplateIamMember` or they will fight over what your policy should be.
729
+
730
+ > **Note:** `certificateauthority.CertificateTemplateIamBinding` resources **can be** used in conjunction with `certificateauthority.CertificateTemplateIamMember` resources **only if** they do not grant privilege to the same role.
731
+
732
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
733
+
692
734
  ## certificateauthority.CertificateTemplateIamPolicy
693
735
 
694
736
  ```python
@@ -423,6 +423,27 @@ class CertificateTemplateIamMember(pulumi.CustomResource):
423
423
  })
424
424
  ```
425
425
 
426
+ ## This resource supports User Project Overrides.
427
+
428
+ -
429
+
430
+ # IAM policy for Certificate Authority Service CertificateTemplate
431
+ Three different resources help you manage your IAM policy for Certificate Authority Service CertificateTemplate. Each of these resources serves a different use case:
432
+
433
+ * `certificateauthority.CertificateTemplateIamPolicy`: Authoritative. Sets the IAM policy for the certificatetemplate and replaces any existing policy already attached.
434
+ * `certificateauthority.CertificateTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the certificatetemplate are preserved.
435
+ * `certificateauthority.CertificateTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the certificatetemplate are preserved.
436
+
437
+ A data source can be used to retrieve policy data in advent you do not need creation
438
+
439
+ * `certificateauthority.CertificateTemplateIamPolicy`: Retrieves the IAM policy for the certificatetemplate
440
+
441
+ > **Note:** `certificateauthority.CertificateTemplateIamPolicy` **cannot** be used in conjunction with `certificateauthority.CertificateTemplateIamBinding` and `certificateauthority.CertificateTemplateIamMember` or they will fight over what your policy should be.
442
+
443
+ > **Note:** `certificateauthority.CertificateTemplateIamBinding` resources **can be** used in conjunction with `certificateauthority.CertificateTemplateIamMember` resources **only if** they do not grant privilege to the same role.
444
+
445
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
446
+
426
447
  ## certificateauthority.CertificateTemplateIamPolicy
427
448
 
428
449
  ```python
@@ -689,6 +710,27 @@ class CertificateTemplateIamMember(pulumi.CustomResource):
689
710
  })
690
711
  ```
691
712
 
713
+ ## This resource supports User Project Overrides.
714
+
715
+ -
716
+
717
+ # IAM policy for Certificate Authority Service CertificateTemplate
718
+ Three different resources help you manage your IAM policy for Certificate Authority Service CertificateTemplate. Each of these resources serves a different use case:
719
+
720
+ * `certificateauthority.CertificateTemplateIamPolicy`: Authoritative. Sets the IAM policy for the certificatetemplate and replaces any existing policy already attached.
721
+ * `certificateauthority.CertificateTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the certificatetemplate are preserved.
722
+ * `certificateauthority.CertificateTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the certificatetemplate are preserved.
723
+
724
+ A data source can be used to retrieve policy data in advent you do not need creation
725
+
726
+ * `certificateauthority.CertificateTemplateIamPolicy`: Retrieves the IAM policy for the certificatetemplate
727
+
728
+ > **Note:** `certificateauthority.CertificateTemplateIamPolicy` **cannot** be used in conjunction with `certificateauthority.CertificateTemplateIamBinding` and `certificateauthority.CertificateTemplateIamMember` or they will fight over what your policy should be.
729
+
730
+ > **Note:** `certificateauthority.CertificateTemplateIamBinding` resources **can be** used in conjunction with `certificateauthority.CertificateTemplateIamMember` resources **only if** they do not grant privilege to the same role.
731
+
732
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
733
+
692
734
  ## certificateauthority.CertificateTemplateIamPolicy
693
735
 
694
736
  ```python
@@ -308,6 +308,27 @@ class CertificateTemplateIamPolicy(pulumi.CustomResource):
308
308
  })
309
309
  ```
310
310
 
311
+ ## This resource supports User Project Overrides.
312
+
313
+ -
314
+
315
+ # IAM policy for Certificate Authority Service CertificateTemplate
316
+ Three different resources help you manage your IAM policy for Certificate Authority Service CertificateTemplate. Each of these resources serves a different use case:
317
+
318
+ * `certificateauthority.CertificateTemplateIamPolicy`: Authoritative. Sets the IAM policy for the certificatetemplate and replaces any existing policy already attached.
319
+ * `certificateauthority.CertificateTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the certificatetemplate are preserved.
320
+ * `certificateauthority.CertificateTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the certificatetemplate are preserved.
321
+
322
+ A data source can be used to retrieve policy data in advent you do not need creation
323
+
324
+ * `certificateauthority.CertificateTemplateIamPolicy`: Retrieves the IAM policy for the certificatetemplate
325
+
326
+ > **Note:** `certificateauthority.CertificateTemplateIamPolicy` **cannot** be used in conjunction with `certificateauthority.CertificateTemplateIamBinding` and `certificateauthority.CertificateTemplateIamMember` or they will fight over what your policy should be.
327
+
328
+ > **Note:** `certificateauthority.CertificateTemplateIamBinding` resources **can be** used in conjunction with `certificateauthority.CertificateTemplateIamMember` resources **only if** they do not grant privilege to the same role.
329
+
330
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
331
+
311
332
  ## certificateauthority.CertificateTemplateIamPolicy
312
333
 
313
334
  ```python
@@ -560,6 +581,27 @@ class CertificateTemplateIamPolicy(pulumi.CustomResource):
560
581
  })
561
582
  ```
562
583
 
584
+ ## This resource supports User Project Overrides.
585
+
586
+ -
587
+
588
+ # IAM policy for Certificate Authority Service CertificateTemplate
589
+ Three different resources help you manage your IAM policy for Certificate Authority Service CertificateTemplate. Each of these resources serves a different use case:
590
+
591
+ * `certificateauthority.CertificateTemplateIamPolicy`: Authoritative. Sets the IAM policy for the certificatetemplate and replaces any existing policy already attached.
592
+ * `certificateauthority.CertificateTemplateIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the certificatetemplate are preserved.
593
+ * `certificateauthority.CertificateTemplateIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the certificatetemplate are preserved.
594
+
595
+ A data source can be used to retrieve policy data in advent you do not need creation
596
+
597
+ * `certificateauthority.CertificateTemplateIamPolicy`: Retrieves the IAM policy for the certificatetemplate
598
+
599
+ > **Note:** `certificateauthority.CertificateTemplateIamPolicy` **cannot** be used in conjunction with `certificateauthority.CertificateTemplateIamBinding` and `certificateauthority.CertificateTemplateIamMember` or they will fight over what your policy should be.
600
+
601
+ > **Note:** `certificateauthority.CertificateTemplateIamBinding` resources **can be** used in conjunction with `certificateauthority.CertificateTemplateIamMember` resources **only if** they do not grant privilege to the same role.
602
+
603
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
604
+
563
605
  ## certificateauthority.CertificateTemplateIamPolicy
564
606
 
565
607
  ```python
@@ -364,6 +364,25 @@ class ConnectionIAMBinding(pulumi.CustomResource):
364
364
  member="user:jane@example.com")
365
365
  ```
366
366
 
367
+ ## This resource supports User Project Overrides.
368
+
369
+ -
370
+
371
+ # IAM policy for Cloud Build v2 Connection
372
+ Three different resources help you manage your IAM policy for Cloud Build v2 Connection. Each of these resources serves a different use case:
373
+
374
+ * `cloudbuildv2.ConnectionIAMPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
375
+ * `cloudbuildv2.ConnectionIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
376
+ * `cloudbuildv2.ConnectionIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
377
+
378
+ A data source can be used to retrieve policy data in advent you do not need creation
379
+
380
+ * `cloudbuildv2.ConnectionIAMPolicy`: Retrieves the IAM policy for the connection
381
+
382
+ > **Note:** `cloudbuildv2.ConnectionIAMPolicy` **cannot** be used in conjunction with `cloudbuildv2.ConnectionIAMBinding` and `cloudbuildv2.ConnectionIAMMember` or they will fight over what your policy should be.
383
+
384
+ > **Note:** `cloudbuildv2.ConnectionIAMBinding` resources **can be** used in conjunction with `cloudbuildv2.ConnectionIAMMember` resources **only if** they do not grant privilege to the same role.
385
+
367
386
  ## cloudbuildv2.ConnectionIAMPolicy
368
387
 
369
388
  ```python
@@ -536,6 +555,25 @@ class ConnectionIAMBinding(pulumi.CustomResource):
536
555
  member="user:jane@example.com")
537
556
  ```
538
557
 
558
+ ## This resource supports User Project Overrides.
559
+
560
+ -
561
+
562
+ # IAM policy for Cloud Build v2 Connection
563
+ Three different resources help you manage your IAM policy for Cloud Build v2 Connection. Each of these resources serves a different use case:
564
+
565
+ * `cloudbuildv2.ConnectionIAMPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
566
+ * `cloudbuildv2.ConnectionIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
567
+ * `cloudbuildv2.ConnectionIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
568
+
569
+ A data source can be used to retrieve policy data in advent you do not need creation
570
+
571
+ * `cloudbuildv2.ConnectionIAMPolicy`: Retrieves the IAM policy for the connection
572
+
573
+ > **Note:** `cloudbuildv2.ConnectionIAMPolicy` **cannot** be used in conjunction with `cloudbuildv2.ConnectionIAMBinding` and `cloudbuildv2.ConnectionIAMMember` or they will fight over what your policy should be.
574
+
575
+ > **Note:** `cloudbuildv2.ConnectionIAMBinding` resources **can be** used in conjunction with `cloudbuildv2.ConnectionIAMMember` resources **only if** they do not grant privilege to the same role.
576
+
539
577
  ## cloudbuildv2.ConnectionIAMPolicy
540
578
 
541
579
  ```python
@@ -364,6 +364,25 @@ class ConnectionIAMMember(pulumi.CustomResource):
364
364
  member="user:jane@example.com")
365
365
  ```
366
366
 
367
+ ## This resource supports User Project Overrides.
368
+
369
+ -
370
+
371
+ # IAM policy for Cloud Build v2 Connection
372
+ Three different resources help you manage your IAM policy for Cloud Build v2 Connection. Each of these resources serves a different use case:
373
+
374
+ * `cloudbuildv2.ConnectionIAMPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
375
+ * `cloudbuildv2.ConnectionIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
376
+ * `cloudbuildv2.ConnectionIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
377
+
378
+ A data source can be used to retrieve policy data in advent you do not need creation
379
+
380
+ * `cloudbuildv2.ConnectionIAMPolicy`: Retrieves the IAM policy for the connection
381
+
382
+ > **Note:** `cloudbuildv2.ConnectionIAMPolicy` **cannot** be used in conjunction with `cloudbuildv2.ConnectionIAMBinding` and `cloudbuildv2.ConnectionIAMMember` or they will fight over what your policy should be.
383
+
384
+ > **Note:** `cloudbuildv2.ConnectionIAMBinding` resources **can be** used in conjunction with `cloudbuildv2.ConnectionIAMMember` resources **only if** they do not grant privilege to the same role.
385
+
367
386
  ## cloudbuildv2.ConnectionIAMPolicy
368
387
 
369
388
  ```python
@@ -536,6 +555,25 @@ class ConnectionIAMMember(pulumi.CustomResource):
536
555
  member="user:jane@example.com")
537
556
  ```
538
557
 
558
+ ## This resource supports User Project Overrides.
559
+
560
+ -
561
+
562
+ # IAM policy for Cloud Build v2 Connection
563
+ Three different resources help you manage your IAM policy for Cloud Build v2 Connection. Each of these resources serves a different use case:
564
+
565
+ * `cloudbuildv2.ConnectionIAMPolicy`: Authoritative. Sets the IAM policy for the connection and replaces any existing policy already attached.
566
+ * `cloudbuildv2.ConnectionIAMBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the connection are preserved.
567
+ * `cloudbuildv2.ConnectionIAMMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the connection are preserved.
568
+
569
+ A data source can be used to retrieve policy data in advent you do not need creation
570
+
571
+ * `cloudbuildv2.ConnectionIAMPolicy`: Retrieves the IAM policy for the connection
572
+
573
+ > **Note:** `cloudbuildv2.ConnectionIAMPolicy` **cannot** be used in conjunction with `cloudbuildv2.ConnectionIAMBinding` and `cloudbuildv2.ConnectionIAMMember` or they will fight over what your policy should be.
574
+
575
+ > **Note:** `cloudbuildv2.ConnectionIAMBinding` resources **can be** used in conjunction with `cloudbuildv2.ConnectionIAMMember` resources **only if** they do not grant privilege to the same role.
576
+
539
577
  ## cloudbuildv2.ConnectionIAMPolicy
540
578
 
541
579
  ```python