pulumi-gcp 9.0.0a1__py3-none-any.whl → 9.0.0a1758219982__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (209) hide show
  1. pulumi_gcp/__init__.py +48 -0
  2. pulumi_gcp/activedirectory/peering.py +16 -0
  3. pulumi_gcp/apigateway/api_config_iam_binding.py +4 -4
  4. pulumi_gcp/apigateway/api_config_iam_member.py +4 -4
  5. pulumi_gcp/apigateway/api_config_iam_policy.py +4 -4
  6. pulumi_gcp/apigateway/api_iam_binding.py +4 -4
  7. pulumi_gcp/apigateway/api_iam_member.py +4 -4
  8. pulumi_gcp/apigateway/api_iam_policy.py +4 -4
  9. pulumi_gcp/apigateway/gateway_iam_binding.py +4 -4
  10. pulumi_gcp/apigateway/gateway_iam_member.py +4 -4
  11. pulumi_gcp/apigateway/gateway_iam_policy.py +4 -4
  12. pulumi_gcp/artifactregistry/__init__.py +1 -0
  13. pulumi_gcp/artifactregistry/get_python_package.py +237 -0
  14. pulumi_gcp/artifactregistry/get_repository.py +12 -1
  15. pulumi_gcp/artifactregistry/repository.py +28 -0
  16. pulumi_gcp/backupdisasterrecovery/__init__.py +1 -0
  17. pulumi_gcp/backupdisasterrecovery/backup_plan.py +4 -4
  18. pulumi_gcp/backupdisasterrecovery/get_backup.py +12 -1
  19. pulumi_gcp/backupdisasterrecovery/get_backup_plan_association.py +4 -0
  20. pulumi_gcp/backupdisasterrecovery/get_data_source_references.py +135 -0
  21. pulumi_gcp/backupdisasterrecovery/get_management_server.py +4 -0
  22. pulumi_gcp/backupdisasterrecovery/outputs.py +103 -0
  23. pulumi_gcp/bigquery/app_profile.py +14 -49
  24. pulumi_gcp/bigquery/dataset_access.py +4 -8
  25. pulumi_gcp/bigquery/table.py +7 -21
  26. pulumi_gcp/bigqueryanalyticshub/data_exchange_subscription.py +20 -0
  27. pulumi_gcp/bigtable/app_profile.py +14 -49
  28. pulumi_gcp/bigtable/table.py +42 -42
  29. pulumi_gcp/certificatemanager/certificate_map_entry.py +7 -7
  30. pulumi_gcp/chronicle/_inputs.py +6 -5
  31. pulumi_gcp/chronicle/outputs.py +4 -3
  32. pulumi_gcp/chronicle/reference_list.py +53 -5
  33. pulumi_gcp/cloudasset/get_resources_search_all.py +8 -0
  34. pulumi_gcp/cloudbuild/_inputs.py +20 -0
  35. pulumi_gcp/cloudbuild/outputs.py +14 -0
  36. pulumi_gcp/cloudbuild/trigger.py +4 -2
  37. pulumi_gcp/cloudbuild/worker_pool.py +28 -21
  38. pulumi_gcp/cloudfunctions/function.py +4 -8
  39. pulumi_gcp/cloudquota/s_quota_adjuster_settings.py +16 -0
  40. pulumi_gcp/cloudrunv2/_inputs.py +57 -0
  41. pulumi_gcp/cloudrunv2/get_service.py +12 -1
  42. pulumi_gcp/cloudrunv2/outputs.py +81 -0
  43. pulumi_gcp/cloudrunv2/service.py +54 -0
  44. pulumi_gcp/cloudrunv2/worker_pool.py +2 -2
  45. pulumi_gcp/composer/environment.py +28 -49
  46. pulumi_gcp/compute/_inputs.py +804 -24
  47. pulumi_gcp/compute/backend_bucket.py +14 -0
  48. pulumi_gcp/compute/backend_bucket_iam_binding.py +236 -0
  49. pulumi_gcp/compute/backend_bucket_iam_member.py +236 -0
  50. pulumi_gcp/compute/backend_bucket_iam_policy.py +236 -0
  51. pulumi_gcp/compute/backend_service_iam_binding.py +464 -0
  52. pulumi_gcp/compute/backend_service_iam_member.py +464 -0
  53. pulumi_gcp/compute/backend_service_iam_policy.py +464 -0
  54. pulumi_gcp/compute/cross_site_network.py +16 -0
  55. pulumi_gcp/compute/future_reservation.py +32 -0
  56. pulumi_gcp/compute/get_region_backend_service.py +12 -1
  57. pulumi_gcp/compute/get_resource_policy.py +2 -20
  58. pulumi_gcp/compute/instance_from_machine_image.py +75 -110
  59. pulumi_gcp/compute/instance_from_template.py +75 -110
  60. pulumi_gcp/compute/instance_group_manager.py +7 -14
  61. pulumi_gcp/compute/instance_template.py +7 -14
  62. pulumi_gcp/compute/interconnect.py +4 -8
  63. pulumi_gcp/compute/machine_image_iam_binding.py +8 -4
  64. pulumi_gcp/compute/machine_image_iam_member.py +8 -4
  65. pulumi_gcp/compute/machine_image_iam_policy.py +8 -4
  66. pulumi_gcp/compute/network_edge_security_service.py +16 -0
  67. pulumi_gcp/compute/network_firewall_policy_packet_mirroring_rule.py +12 -0
  68. pulumi_gcp/compute/outputs.py +671 -16
  69. pulumi_gcp/compute/preview_feature.py +16 -0
  70. pulumi_gcp/compute/public_delegated_prefix.py +42 -0
  71. pulumi_gcp/compute/region_backend_service.py +54 -0
  72. pulumi_gcp/compute/region_backend_service_iam_binding.py +488 -0
  73. pulumi_gcp/compute/region_backend_service_iam_member.py +488 -0
  74. pulumi_gcp/compute/region_backend_service_iam_policy.py +488 -0
  75. pulumi_gcp/compute/region_instance_group_manager.py +7 -14
  76. pulumi_gcp/compute/region_network_endpoint_group.py +1 -3
  77. pulumi_gcp/compute/region_resize_request.py +24 -0
  78. pulumi_gcp/compute/region_url_map.py +75 -0
  79. pulumi_gcp/compute/wire_group.py +16 -0
  80. pulumi_gcp/container/_inputs.py +446 -18
  81. pulumi_gcp/container/aws_cluster.py +28 -42
  82. pulumi_gcp/container/aws_node_pool.py +28 -42
  83. pulumi_gcp/container/azure_cluster.py +35 -70
  84. pulumi_gcp/container/azure_node_pool.py +28 -42
  85. pulumi_gcp/container/cluster.py +16 -7
  86. pulumi_gcp/container/outputs.py +423 -15
  87. pulumi_gcp/dataflow/flex_template_job.py +10 -0
  88. pulumi_gcp/dataform/repository.py +16 -0
  89. pulumi_gcp/dataform/repository_release_config.py +16 -0
  90. pulumi_gcp/dataform/repository_workflow_config.py +16 -0
  91. pulumi_gcp/dataplex/asset.py +28 -21
  92. pulumi_gcp/dataplex/zone.py +28 -21
  93. pulumi_gcp/dataproc/cluster.py +21 -14
  94. pulumi_gcp/dataproc/workflow_template.py +42 -105
  95. pulumi_gcp/discoveryengine/__init__.py +1 -0
  96. pulumi_gcp/discoveryengine/_inputs.py +94 -0
  97. pulumi_gcp/discoveryengine/acl_config.py +393 -0
  98. pulumi_gcp/discoveryengine/outputs.py +92 -0
  99. pulumi_gcp/firebase/android_app.py +16 -0
  100. pulumi_gcp/firebase/apple_app.py +16 -0
  101. pulumi_gcp/firebase/database_instance.py +16 -0
  102. pulumi_gcp/firebase/extensions_instance.py +12 -0
  103. pulumi_gcp/firebase/get_android_app.py +4 -2
  104. pulumi_gcp/firebase/get_apple_app.py +4 -2
  105. pulumi_gcp/firebase/get_apple_app_config.py +16 -2
  106. pulumi_gcp/firebase/get_hosting_channel.py +4 -2
  107. pulumi_gcp/firebase/hosting_channel.py +20 -0
  108. pulumi_gcp/firebase/hosting_custom_domain.py +20 -0
  109. pulumi_gcp/firebase/hosting_release.py +16 -0
  110. pulumi_gcp/firebase/hosting_site.py +16 -0
  111. pulumi_gcp/firebase/hosting_version.py +16 -0
  112. pulumi_gcp/firebase/storage_bucket.py +18 -0
  113. pulumi_gcp/firestore/index.py +118 -3
  114. pulumi_gcp/folder/service_identity.py +26 -0
  115. pulumi_gcp/gkehub/membership_rbac_role_binding.py +16 -0
  116. pulumi_gcp/healthcare/_inputs.py +205 -0
  117. pulumi_gcp/healthcare/fhir_store.py +128 -0
  118. pulumi_gcp/healthcare/outputs.py +163 -0
  119. pulumi_gcp/iam/workload_identity_pool_iam_binding.py +464 -0
  120. pulumi_gcp/iam/workload_identity_pool_iam_member.py +464 -0
  121. pulumi_gcp/iam/workload_identity_pool_iam_policy.py +464 -0
  122. pulumi_gcp/iam/workload_identity_pool_managed_identity.py +18 -0
  123. pulumi_gcp/iam/workload_identity_pool_namespace.py +20 -0
  124. pulumi_gcp/iap/__init__.py +4 -0
  125. pulumi_gcp/iap/_inputs.py +130 -0
  126. pulumi_gcp/iap/get_web_forwarding_rule_service_iam_policy.py +159 -0
  127. pulumi_gcp/iap/outputs.py +76 -0
  128. pulumi_gcp/iap/web_forwarding_rule_service_iam_binding.py +1002 -0
  129. pulumi_gcp/iap/web_forwarding_rule_service_iam_member.py +1002 -0
  130. pulumi_gcp/iap/web_forwarding_rule_service_iam_policy.py +821 -0
  131. pulumi_gcp/kms/get_kms_secret_asymmetric.py +22 -0
  132. pulumi_gcp/logging/billing_account_bucket_config.py +7 -21
  133. pulumi_gcp/logging/folder_bucket_config.py +7 -21
  134. pulumi_gcp/logging/organization_bucket_config.py +7 -21
  135. pulumi_gcp/logging/organization_sink.py +7 -7
  136. pulumi_gcp/managedkafka/connect_cluster.py +4 -0
  137. pulumi_gcp/managedkafka/connector.py +4 -0
  138. pulumi_gcp/memorystore/instance.py +14 -14
  139. pulumi_gcp/monitoring/dashboard.py +7 -14
  140. pulumi_gcp/netapp/storage_pool.py +91 -2
  141. pulumi_gcp/netapp/volume.py +47 -0
  142. pulumi_gcp/networkmanagement/__init__.py +1 -0
  143. pulumi_gcp/networkmanagement/organization_vpc_flow_logs_config.py +1028 -0
  144. pulumi_gcp/networksecurity/authorization_policy.py +12 -0
  145. pulumi_gcp/networkservices/gateway.py +7 -7
  146. pulumi_gcp/networkservices/service_lb_policies.py +12 -0
  147. pulumi_gcp/oracledatabase/autonomous_database.py +2 -2
  148. pulumi_gcp/organizations/project.py +7 -21
  149. pulumi_gcp/projects/service.py +0 -7
  150. pulumi_gcp/pulumi-plugin.json +1 -1
  151. pulumi_gcp/resourcemanager/capability.py +16 -0
  152. pulumi_gcp/runtimeconfig/config.py +16 -0
  153. pulumi_gcp/runtimeconfig/config_iam_binding.py +236 -0
  154. pulumi_gcp/runtimeconfig/config_iam_member.py +236 -0
  155. pulumi_gcp/runtimeconfig/config_iam_policy.py +236 -0
  156. pulumi_gcp/runtimeconfig/variable.py +10 -0
  157. pulumi_gcp/saasruntime/__init__.py +1 -0
  158. pulumi_gcp/saasruntime/_inputs.py +458 -0
  159. pulumi_gcp/saasruntime/outputs.py +392 -0
  160. pulumi_gcp/saasruntime/saa_s.py +4 -0
  161. pulumi_gcp/saasruntime/unit_kind.py +1024 -0
  162. pulumi_gcp/securesourcemanager/instance.py +7 -7
  163. pulumi_gcp/securesourcemanager/repository.py +7 -7
  164. pulumi_gcp/servicedirectory/namespace_iam_binding.py +4 -4
  165. pulumi_gcp/servicedirectory/namespace_iam_member.py +4 -4
  166. pulumi_gcp/servicedirectory/namespace_iam_policy.py +4 -4
  167. pulumi_gcp/servicedirectory/service_iam_binding.py +4 -4
  168. pulumi_gcp/servicedirectory/service_iam_member.py +4 -4
  169. pulumi_gcp/servicedirectory/service_iam_policy.py +4 -4
  170. pulumi_gcp/sql/_inputs.py +135 -1
  171. pulumi_gcp/sql/database_instance.py +54 -14
  172. pulumi_gcp/sql/get_database_instance.py +12 -1
  173. pulumi_gcp/sql/outputs.py +265 -3
  174. pulumi_gcp/storage/_inputs.py +246 -0
  175. pulumi_gcp/storage/bucket.py +7 -14
  176. pulumi_gcp/storage/bucket_object.py +0 -9
  177. pulumi_gcp/storage/outputs.py +191 -1
  178. pulumi_gcp/storage/transfer_job.py +47 -0
  179. pulumi_gcp/tpu/v2_queued_resource.py +16 -0
  180. pulumi_gcp/tpu/v2_vm.py +16 -0
  181. pulumi_gcp/vertex/ai_feature_group_iam_binding.py +236 -0
  182. pulumi_gcp/vertex/ai_feature_group_iam_member.py +236 -0
  183. pulumi_gcp/vertex/ai_feature_group_iam_policy.py +236 -0
  184. pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_binding.py +248 -0
  185. pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_member.py +248 -0
  186. pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_policy.py +248 -0
  187. pulumi_gcp/vertex/ai_feature_online_store_iam_binding.py +236 -0
  188. pulumi_gcp/vertex/ai_feature_online_store_iam_member.py +236 -0
  189. pulumi_gcp/vertex/ai_feature_online_store_iam_policy.py +236 -0
  190. pulumi_gcp/vertex/ai_feature_store_entity_type_iam_binding.py +238 -0
  191. pulumi_gcp/vertex/ai_feature_store_entity_type_iam_member.py +238 -0
  192. pulumi_gcp/vertex/ai_feature_store_entity_type_iam_policy.py +238 -0
  193. pulumi_gcp/vertex/ai_feature_store_iam_binding.py +248 -0
  194. pulumi_gcp/vertex/ai_feature_store_iam_member.py +248 -0
  195. pulumi_gcp/vertex/ai_feature_store_iam_policy.py +248 -0
  196. pulumi_gcp/vertex/ai_metadata_store.py +16 -0
  197. pulumi_gcp/workstations/workstation.py +16 -0
  198. pulumi_gcp/workstations/workstation_cluster.py +16 -0
  199. pulumi_gcp/workstations/workstation_config.py +16 -0
  200. pulumi_gcp/workstations/workstation_config_iam_binding.py +260 -0
  201. pulumi_gcp/workstations/workstation_config_iam_member.py +260 -0
  202. pulumi_gcp/workstations/workstation_config_iam_policy.py +260 -0
  203. pulumi_gcp/workstations/workstation_iam_binding.py +272 -0
  204. pulumi_gcp/workstations/workstation_iam_member.py +272 -0
  205. pulumi_gcp/workstations/workstation_iam_policy.py +272 -0
  206. {pulumi_gcp-9.0.0a1.dist-info → pulumi_gcp-9.0.0a1758219982.dist-info}/METADATA +1 -1
  207. {pulumi_gcp-9.0.0a1.dist-info → pulumi_gcp-9.0.0a1758219982.dist-info}/RECORD +209 -200
  208. {pulumi_gcp-9.0.0a1.dist-info → pulumi_gcp-9.0.0a1758219982.dist-info}/WHEEL +0 -0
  209. {pulumi_gcp-9.0.0a1.dist-info → pulumi_gcp-9.0.0a1758219982.dist-info}/top_level.txt +0 -0
@@ -259,6 +259,125 @@ class AiFeatureStoreEntityTypeIamMember(pulumi.CustomResource):
259
259
  role: Optional[pulumi.Input[_builtins.str]] = None,
260
260
  __props__=None):
261
261
  """
262
+ Three different resources help you manage your IAM policy for Vertex AI FeaturestoreEntitytype. Each of these resources serves a different use case:
263
+
264
+ * `vertex.AiFeatureStoreEntityTypeIamPolicy`: Authoritative. Sets the IAM policy for the featurestoreentitytype and replaces any existing policy already attached.
265
+ * `vertex.AiFeatureStoreEntityTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the featurestoreentitytype are preserved.
266
+ * `vertex.AiFeatureStoreEntityTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the featurestoreentitytype are preserved.
267
+
268
+ A data source can be used to retrieve policy data in advent you do not need creation
269
+
270
+ * `vertex.AiFeatureStoreEntityTypeIamPolicy`: Retrieves the IAM policy for the featurestoreentitytype
271
+
272
+ > **Note:** `vertex.AiFeatureStoreEntityTypeIamPolicy` **cannot** be used in conjunction with `vertex.AiFeatureStoreEntityTypeIamBinding` and `vertex.AiFeatureStoreEntityTypeIamMember` or they will fight over what your policy should be.
273
+
274
+ > **Note:** `vertex.AiFeatureStoreEntityTypeIamBinding` resources **can be** used in conjunction with `vertex.AiFeatureStoreEntityTypeIamMember` resources **only if** they do not grant privilege to the same role.
275
+
276
+ ## vertex.AiFeatureStoreEntityTypeIamPolicy
277
+
278
+ ```python
279
+ import pulumi
280
+ import pulumi_gcp as gcp
281
+
282
+ admin = gcp.organizations.get_iam_policy(bindings=[{
283
+ "role": "roles/viewer",
284
+ "members": ["user:jane@example.com"],
285
+ }])
286
+ policy = gcp.vertex.AiFeatureStoreEntityTypeIamPolicy("policy",
287
+ featurestore=entity["featurestore"],
288
+ entitytype=entity["name"],
289
+ policy_data=admin.policy_data)
290
+ ```
291
+
292
+ ## vertex.AiFeatureStoreEntityTypeIamBinding
293
+
294
+ ```python
295
+ import pulumi
296
+ import pulumi_gcp as gcp
297
+
298
+ binding = gcp.vertex.AiFeatureStoreEntityTypeIamBinding("binding",
299
+ featurestore=entity["featurestore"],
300
+ entitytype=entity["name"],
301
+ role="roles/viewer",
302
+ members=["user:jane@example.com"])
303
+ ```
304
+
305
+ ## vertex.AiFeatureStoreEntityTypeIamMember
306
+
307
+ ```python
308
+ import pulumi
309
+ import pulumi_gcp as gcp
310
+
311
+ member = gcp.vertex.AiFeatureStoreEntityTypeIamMember("member",
312
+ featurestore=entity["featurestore"],
313
+ entitytype=entity["name"],
314
+ role="roles/viewer",
315
+ member="user:jane@example.com")
316
+ ```
317
+
318
+ ## > **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
319
+
320
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
321
+ ---
322
+
323
+ # IAM policy for Vertex AI FeaturestoreEntitytype
324
+
325
+ Three different resources help you manage your IAM policy for Vertex AI FeaturestoreEntitytype. Each of these resources serves a different use case:
326
+
327
+ * `vertex.AiFeatureStoreEntityTypeIamPolicy`: Authoritative. Sets the IAM policy for the featurestoreentitytype and replaces any existing policy already attached.
328
+ * `vertex.AiFeatureStoreEntityTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the featurestoreentitytype are preserved.
329
+ * `vertex.AiFeatureStoreEntityTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the featurestoreentitytype are preserved.
330
+
331
+ A data source can be used to retrieve policy data in advent you do not need creation
332
+
333
+ * `vertex.AiFeatureStoreEntityTypeIamPolicy`: Retrieves the IAM policy for the featurestoreentitytype
334
+
335
+ > **Note:** `vertex.AiFeatureStoreEntityTypeIamPolicy` **cannot** be used in conjunction with `vertex.AiFeatureStoreEntityTypeIamBinding` and `vertex.AiFeatureStoreEntityTypeIamMember` or they will fight over what your policy should be.
336
+
337
+ > **Note:** `vertex.AiFeatureStoreEntityTypeIamBinding` resources **can be** used in conjunction with `vertex.AiFeatureStoreEntityTypeIamMember` resources **only if** they do not grant privilege to the same role.
338
+
339
+ ## vertex.AiFeatureStoreEntityTypeIamPolicy
340
+
341
+ ```python
342
+ import pulumi
343
+ import pulumi_gcp as gcp
344
+
345
+ admin = gcp.organizations.get_iam_policy(bindings=[{
346
+ "role": "roles/viewer",
347
+ "members": ["user:jane@example.com"],
348
+ }])
349
+ policy = gcp.vertex.AiFeatureStoreEntityTypeIamPolicy("policy",
350
+ featurestore=entity["featurestore"],
351
+ entitytype=entity["name"],
352
+ policy_data=admin.policy_data)
353
+ ```
354
+
355
+ ## vertex.AiFeatureStoreEntityTypeIamBinding
356
+
357
+ ```python
358
+ import pulumi
359
+ import pulumi_gcp as gcp
360
+
361
+ binding = gcp.vertex.AiFeatureStoreEntityTypeIamBinding("binding",
362
+ featurestore=entity["featurestore"],
363
+ entitytype=entity["name"],
364
+ role="roles/viewer",
365
+ members=["user:jane@example.com"])
366
+ ```
367
+
368
+ ## vertex.AiFeatureStoreEntityTypeIamMember
369
+
370
+ ```python
371
+ import pulumi
372
+ import pulumi_gcp as gcp
373
+
374
+ member = gcp.vertex.AiFeatureStoreEntityTypeIamMember("member",
375
+ featurestore=entity["featurestore"],
376
+ entitytype=entity["name"],
377
+ role="roles/viewer",
378
+ member="user:jane@example.com")
379
+ ```
380
+
262
381
  ## Import
263
382
 
264
383
  For all import syntaxes, the "resource in question" can take any of the following forms:
@@ -319,6 +438,125 @@ class AiFeatureStoreEntityTypeIamMember(pulumi.CustomResource):
319
438
  args: AiFeatureStoreEntityTypeIamMemberArgs,
320
439
  opts: Optional[pulumi.ResourceOptions] = None):
321
440
  """
441
+ Three different resources help you manage your IAM policy for Vertex AI FeaturestoreEntitytype. Each of these resources serves a different use case:
442
+
443
+ * `vertex.AiFeatureStoreEntityTypeIamPolicy`: Authoritative. Sets the IAM policy for the featurestoreentitytype and replaces any existing policy already attached.
444
+ * `vertex.AiFeatureStoreEntityTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the featurestoreentitytype are preserved.
445
+ * `vertex.AiFeatureStoreEntityTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the featurestoreentitytype are preserved.
446
+
447
+ A data source can be used to retrieve policy data in advent you do not need creation
448
+
449
+ * `vertex.AiFeatureStoreEntityTypeIamPolicy`: Retrieves the IAM policy for the featurestoreentitytype
450
+
451
+ > **Note:** `vertex.AiFeatureStoreEntityTypeIamPolicy` **cannot** be used in conjunction with `vertex.AiFeatureStoreEntityTypeIamBinding` and `vertex.AiFeatureStoreEntityTypeIamMember` or they will fight over what your policy should be.
452
+
453
+ > **Note:** `vertex.AiFeatureStoreEntityTypeIamBinding` resources **can be** used in conjunction with `vertex.AiFeatureStoreEntityTypeIamMember` resources **only if** they do not grant privilege to the same role.
454
+
455
+ ## vertex.AiFeatureStoreEntityTypeIamPolicy
456
+
457
+ ```python
458
+ import pulumi
459
+ import pulumi_gcp as gcp
460
+
461
+ admin = gcp.organizations.get_iam_policy(bindings=[{
462
+ "role": "roles/viewer",
463
+ "members": ["user:jane@example.com"],
464
+ }])
465
+ policy = gcp.vertex.AiFeatureStoreEntityTypeIamPolicy("policy",
466
+ featurestore=entity["featurestore"],
467
+ entitytype=entity["name"],
468
+ policy_data=admin.policy_data)
469
+ ```
470
+
471
+ ## vertex.AiFeatureStoreEntityTypeIamBinding
472
+
473
+ ```python
474
+ import pulumi
475
+ import pulumi_gcp as gcp
476
+
477
+ binding = gcp.vertex.AiFeatureStoreEntityTypeIamBinding("binding",
478
+ featurestore=entity["featurestore"],
479
+ entitytype=entity["name"],
480
+ role="roles/viewer",
481
+ members=["user:jane@example.com"])
482
+ ```
483
+
484
+ ## vertex.AiFeatureStoreEntityTypeIamMember
485
+
486
+ ```python
487
+ import pulumi
488
+ import pulumi_gcp as gcp
489
+
490
+ member = gcp.vertex.AiFeatureStoreEntityTypeIamMember("member",
491
+ featurestore=entity["featurestore"],
492
+ entitytype=entity["name"],
493
+ role="roles/viewer",
494
+ member="user:jane@example.com")
495
+ ```
496
+
497
+ ## > **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
498
+
499
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
500
+ ---
501
+
502
+ # IAM policy for Vertex AI FeaturestoreEntitytype
503
+
504
+ Three different resources help you manage your IAM policy for Vertex AI FeaturestoreEntitytype. Each of these resources serves a different use case:
505
+
506
+ * `vertex.AiFeatureStoreEntityTypeIamPolicy`: Authoritative. Sets the IAM policy for the featurestoreentitytype and replaces any existing policy already attached.
507
+ * `vertex.AiFeatureStoreEntityTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the featurestoreentitytype are preserved.
508
+ * `vertex.AiFeatureStoreEntityTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the featurestoreentitytype are preserved.
509
+
510
+ A data source can be used to retrieve policy data in advent you do not need creation
511
+
512
+ * `vertex.AiFeatureStoreEntityTypeIamPolicy`: Retrieves the IAM policy for the featurestoreentitytype
513
+
514
+ > **Note:** `vertex.AiFeatureStoreEntityTypeIamPolicy` **cannot** be used in conjunction with `vertex.AiFeatureStoreEntityTypeIamBinding` and `vertex.AiFeatureStoreEntityTypeIamMember` or they will fight over what your policy should be.
515
+
516
+ > **Note:** `vertex.AiFeatureStoreEntityTypeIamBinding` resources **can be** used in conjunction with `vertex.AiFeatureStoreEntityTypeIamMember` resources **only if** they do not grant privilege to the same role.
517
+
518
+ ## vertex.AiFeatureStoreEntityTypeIamPolicy
519
+
520
+ ```python
521
+ import pulumi
522
+ import pulumi_gcp as gcp
523
+
524
+ admin = gcp.organizations.get_iam_policy(bindings=[{
525
+ "role": "roles/viewer",
526
+ "members": ["user:jane@example.com"],
527
+ }])
528
+ policy = gcp.vertex.AiFeatureStoreEntityTypeIamPolicy("policy",
529
+ featurestore=entity["featurestore"],
530
+ entitytype=entity["name"],
531
+ policy_data=admin.policy_data)
532
+ ```
533
+
534
+ ## vertex.AiFeatureStoreEntityTypeIamBinding
535
+
536
+ ```python
537
+ import pulumi
538
+ import pulumi_gcp as gcp
539
+
540
+ binding = gcp.vertex.AiFeatureStoreEntityTypeIamBinding("binding",
541
+ featurestore=entity["featurestore"],
542
+ entitytype=entity["name"],
543
+ role="roles/viewer",
544
+ members=["user:jane@example.com"])
545
+ ```
546
+
547
+ ## vertex.AiFeatureStoreEntityTypeIamMember
548
+
549
+ ```python
550
+ import pulumi
551
+ import pulumi_gcp as gcp
552
+
553
+ member = gcp.vertex.AiFeatureStoreEntityTypeIamMember("member",
554
+ featurestore=entity["featurestore"],
555
+ entitytype=entity["name"],
556
+ role="roles/viewer",
557
+ member="user:jane@example.com")
558
+ ```
559
+
322
560
  ## Import
323
561
 
324
562
  For all import syntaxes, the "resource in question" can take any of the following forms:
@@ -156,6 +156,125 @@ class AiFeatureStoreEntityTypeIamPolicy(pulumi.CustomResource):
156
156
  policy_data: Optional[pulumi.Input[_builtins.str]] = None,
157
157
  __props__=None):
158
158
  """
159
+ Three different resources help you manage your IAM policy for Vertex AI FeaturestoreEntitytype. Each of these resources serves a different use case:
160
+
161
+ * `vertex.AiFeatureStoreEntityTypeIamPolicy`: Authoritative. Sets the IAM policy for the featurestoreentitytype and replaces any existing policy already attached.
162
+ * `vertex.AiFeatureStoreEntityTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the featurestoreentitytype are preserved.
163
+ * `vertex.AiFeatureStoreEntityTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the featurestoreentitytype are preserved.
164
+
165
+ A data source can be used to retrieve policy data in advent you do not need creation
166
+
167
+ * `vertex.AiFeatureStoreEntityTypeIamPolicy`: Retrieves the IAM policy for the featurestoreentitytype
168
+
169
+ > **Note:** `vertex.AiFeatureStoreEntityTypeIamPolicy` **cannot** be used in conjunction with `vertex.AiFeatureStoreEntityTypeIamBinding` and `vertex.AiFeatureStoreEntityTypeIamMember` or they will fight over what your policy should be.
170
+
171
+ > **Note:** `vertex.AiFeatureStoreEntityTypeIamBinding` resources **can be** used in conjunction with `vertex.AiFeatureStoreEntityTypeIamMember` resources **only if** they do not grant privilege to the same role.
172
+
173
+ ## vertex.AiFeatureStoreEntityTypeIamPolicy
174
+
175
+ ```python
176
+ import pulumi
177
+ import pulumi_gcp as gcp
178
+
179
+ admin = gcp.organizations.get_iam_policy(bindings=[{
180
+ "role": "roles/viewer",
181
+ "members": ["user:jane@example.com"],
182
+ }])
183
+ policy = gcp.vertex.AiFeatureStoreEntityTypeIamPolicy("policy",
184
+ featurestore=entity["featurestore"],
185
+ entitytype=entity["name"],
186
+ policy_data=admin.policy_data)
187
+ ```
188
+
189
+ ## vertex.AiFeatureStoreEntityTypeIamBinding
190
+
191
+ ```python
192
+ import pulumi
193
+ import pulumi_gcp as gcp
194
+
195
+ binding = gcp.vertex.AiFeatureStoreEntityTypeIamBinding("binding",
196
+ featurestore=entity["featurestore"],
197
+ entitytype=entity["name"],
198
+ role="roles/viewer",
199
+ members=["user:jane@example.com"])
200
+ ```
201
+
202
+ ## vertex.AiFeatureStoreEntityTypeIamMember
203
+
204
+ ```python
205
+ import pulumi
206
+ import pulumi_gcp as gcp
207
+
208
+ member = gcp.vertex.AiFeatureStoreEntityTypeIamMember("member",
209
+ featurestore=entity["featurestore"],
210
+ entitytype=entity["name"],
211
+ role="roles/viewer",
212
+ member="user:jane@example.com")
213
+ ```
214
+
215
+ ## > **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
216
+
217
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
218
+ ---
219
+
220
+ # IAM policy for Vertex AI FeaturestoreEntitytype
221
+
222
+ Three different resources help you manage your IAM policy for Vertex AI FeaturestoreEntitytype. Each of these resources serves a different use case:
223
+
224
+ * `vertex.AiFeatureStoreEntityTypeIamPolicy`: Authoritative. Sets the IAM policy for the featurestoreentitytype and replaces any existing policy already attached.
225
+ * `vertex.AiFeatureStoreEntityTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the featurestoreentitytype are preserved.
226
+ * `vertex.AiFeatureStoreEntityTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the featurestoreentitytype are preserved.
227
+
228
+ A data source can be used to retrieve policy data in advent you do not need creation
229
+
230
+ * `vertex.AiFeatureStoreEntityTypeIamPolicy`: Retrieves the IAM policy for the featurestoreentitytype
231
+
232
+ > **Note:** `vertex.AiFeatureStoreEntityTypeIamPolicy` **cannot** be used in conjunction with `vertex.AiFeatureStoreEntityTypeIamBinding` and `vertex.AiFeatureStoreEntityTypeIamMember` or they will fight over what your policy should be.
233
+
234
+ > **Note:** `vertex.AiFeatureStoreEntityTypeIamBinding` resources **can be** used in conjunction with `vertex.AiFeatureStoreEntityTypeIamMember` resources **only if** they do not grant privilege to the same role.
235
+
236
+ ## vertex.AiFeatureStoreEntityTypeIamPolicy
237
+
238
+ ```python
239
+ import pulumi
240
+ import pulumi_gcp as gcp
241
+
242
+ admin = gcp.organizations.get_iam_policy(bindings=[{
243
+ "role": "roles/viewer",
244
+ "members": ["user:jane@example.com"],
245
+ }])
246
+ policy = gcp.vertex.AiFeatureStoreEntityTypeIamPolicy("policy",
247
+ featurestore=entity["featurestore"],
248
+ entitytype=entity["name"],
249
+ policy_data=admin.policy_data)
250
+ ```
251
+
252
+ ## vertex.AiFeatureStoreEntityTypeIamBinding
253
+
254
+ ```python
255
+ import pulumi
256
+ import pulumi_gcp as gcp
257
+
258
+ binding = gcp.vertex.AiFeatureStoreEntityTypeIamBinding("binding",
259
+ featurestore=entity["featurestore"],
260
+ entitytype=entity["name"],
261
+ role="roles/viewer",
262
+ members=["user:jane@example.com"])
263
+ ```
264
+
265
+ ## vertex.AiFeatureStoreEntityTypeIamMember
266
+
267
+ ```python
268
+ import pulumi
269
+ import pulumi_gcp as gcp
270
+
271
+ member = gcp.vertex.AiFeatureStoreEntityTypeIamMember("member",
272
+ featurestore=entity["featurestore"],
273
+ entitytype=entity["name"],
274
+ role="roles/viewer",
275
+ member="user:jane@example.com")
276
+ ```
277
+
159
278
  ## Import
160
279
 
161
280
  For all import syntaxes, the "resource in question" can take any of the following forms:
@@ -204,6 +323,125 @@ class AiFeatureStoreEntityTypeIamPolicy(pulumi.CustomResource):
204
323
  args: AiFeatureStoreEntityTypeIamPolicyArgs,
205
324
  opts: Optional[pulumi.ResourceOptions] = None):
206
325
  """
326
+ Three different resources help you manage your IAM policy for Vertex AI FeaturestoreEntitytype. Each of these resources serves a different use case:
327
+
328
+ * `vertex.AiFeatureStoreEntityTypeIamPolicy`: Authoritative. Sets the IAM policy for the featurestoreentitytype and replaces any existing policy already attached.
329
+ * `vertex.AiFeatureStoreEntityTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the featurestoreentitytype are preserved.
330
+ * `vertex.AiFeatureStoreEntityTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the featurestoreentitytype are preserved.
331
+
332
+ A data source can be used to retrieve policy data in advent you do not need creation
333
+
334
+ * `vertex.AiFeatureStoreEntityTypeIamPolicy`: Retrieves the IAM policy for the featurestoreentitytype
335
+
336
+ > **Note:** `vertex.AiFeatureStoreEntityTypeIamPolicy` **cannot** be used in conjunction with `vertex.AiFeatureStoreEntityTypeIamBinding` and `vertex.AiFeatureStoreEntityTypeIamMember` or they will fight over what your policy should be.
337
+
338
+ > **Note:** `vertex.AiFeatureStoreEntityTypeIamBinding` resources **can be** used in conjunction with `vertex.AiFeatureStoreEntityTypeIamMember` resources **only if** they do not grant privilege to the same role.
339
+
340
+ ## vertex.AiFeatureStoreEntityTypeIamPolicy
341
+
342
+ ```python
343
+ import pulumi
344
+ import pulumi_gcp as gcp
345
+
346
+ admin = gcp.organizations.get_iam_policy(bindings=[{
347
+ "role": "roles/viewer",
348
+ "members": ["user:jane@example.com"],
349
+ }])
350
+ policy = gcp.vertex.AiFeatureStoreEntityTypeIamPolicy("policy",
351
+ featurestore=entity["featurestore"],
352
+ entitytype=entity["name"],
353
+ policy_data=admin.policy_data)
354
+ ```
355
+
356
+ ## vertex.AiFeatureStoreEntityTypeIamBinding
357
+
358
+ ```python
359
+ import pulumi
360
+ import pulumi_gcp as gcp
361
+
362
+ binding = gcp.vertex.AiFeatureStoreEntityTypeIamBinding("binding",
363
+ featurestore=entity["featurestore"],
364
+ entitytype=entity["name"],
365
+ role="roles/viewer",
366
+ members=["user:jane@example.com"])
367
+ ```
368
+
369
+ ## vertex.AiFeatureStoreEntityTypeIamMember
370
+
371
+ ```python
372
+ import pulumi
373
+ import pulumi_gcp as gcp
374
+
375
+ member = gcp.vertex.AiFeatureStoreEntityTypeIamMember("member",
376
+ featurestore=entity["featurestore"],
377
+ entitytype=entity["name"],
378
+ role="roles/viewer",
379
+ member="user:jane@example.com")
380
+ ```
381
+
382
+ ## > **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
383
+
384
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
385
+ ---
386
+
387
+ # IAM policy for Vertex AI FeaturestoreEntitytype
388
+
389
+ Three different resources help you manage your IAM policy for Vertex AI FeaturestoreEntitytype. Each of these resources serves a different use case:
390
+
391
+ * `vertex.AiFeatureStoreEntityTypeIamPolicy`: Authoritative. Sets the IAM policy for the featurestoreentitytype and replaces any existing policy already attached.
392
+ * `vertex.AiFeatureStoreEntityTypeIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the featurestoreentitytype are preserved.
393
+ * `vertex.AiFeatureStoreEntityTypeIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the featurestoreentitytype are preserved.
394
+
395
+ A data source can be used to retrieve policy data in advent you do not need creation
396
+
397
+ * `vertex.AiFeatureStoreEntityTypeIamPolicy`: Retrieves the IAM policy for the featurestoreentitytype
398
+
399
+ > **Note:** `vertex.AiFeatureStoreEntityTypeIamPolicy` **cannot** be used in conjunction with `vertex.AiFeatureStoreEntityTypeIamBinding` and `vertex.AiFeatureStoreEntityTypeIamMember` or they will fight over what your policy should be.
400
+
401
+ > **Note:** `vertex.AiFeatureStoreEntityTypeIamBinding` resources **can be** used in conjunction with `vertex.AiFeatureStoreEntityTypeIamMember` resources **only if** they do not grant privilege to the same role.
402
+
403
+ ## vertex.AiFeatureStoreEntityTypeIamPolicy
404
+
405
+ ```python
406
+ import pulumi
407
+ import pulumi_gcp as gcp
408
+
409
+ admin = gcp.organizations.get_iam_policy(bindings=[{
410
+ "role": "roles/viewer",
411
+ "members": ["user:jane@example.com"],
412
+ }])
413
+ policy = gcp.vertex.AiFeatureStoreEntityTypeIamPolicy("policy",
414
+ featurestore=entity["featurestore"],
415
+ entitytype=entity["name"],
416
+ policy_data=admin.policy_data)
417
+ ```
418
+
419
+ ## vertex.AiFeatureStoreEntityTypeIamBinding
420
+
421
+ ```python
422
+ import pulumi
423
+ import pulumi_gcp as gcp
424
+
425
+ binding = gcp.vertex.AiFeatureStoreEntityTypeIamBinding("binding",
426
+ featurestore=entity["featurestore"],
427
+ entitytype=entity["name"],
428
+ role="roles/viewer",
429
+ members=["user:jane@example.com"])
430
+ ```
431
+
432
+ ## vertex.AiFeatureStoreEntityTypeIamMember
433
+
434
+ ```python
435
+ import pulumi
436
+ import pulumi_gcp as gcp
437
+
438
+ member = gcp.vertex.AiFeatureStoreEntityTypeIamMember("member",
439
+ featurestore=entity["featurestore"],
440
+ entitytype=entity["name"],
441
+ role="roles/viewer",
442
+ member="user:jane@example.com")
443
+ ```
444
+
207
445
  ## Import
208
446
 
209
447
  For all import syntaxes, the "resource in question" can take any of the following forms: