pulumi-gcp 9.0.0a1__py3-none-any.whl → 9.0.0a1758219982__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (209) hide show
  1. pulumi_gcp/__init__.py +48 -0
  2. pulumi_gcp/activedirectory/peering.py +16 -0
  3. pulumi_gcp/apigateway/api_config_iam_binding.py +4 -4
  4. pulumi_gcp/apigateway/api_config_iam_member.py +4 -4
  5. pulumi_gcp/apigateway/api_config_iam_policy.py +4 -4
  6. pulumi_gcp/apigateway/api_iam_binding.py +4 -4
  7. pulumi_gcp/apigateway/api_iam_member.py +4 -4
  8. pulumi_gcp/apigateway/api_iam_policy.py +4 -4
  9. pulumi_gcp/apigateway/gateway_iam_binding.py +4 -4
  10. pulumi_gcp/apigateway/gateway_iam_member.py +4 -4
  11. pulumi_gcp/apigateway/gateway_iam_policy.py +4 -4
  12. pulumi_gcp/artifactregistry/__init__.py +1 -0
  13. pulumi_gcp/artifactregistry/get_python_package.py +237 -0
  14. pulumi_gcp/artifactregistry/get_repository.py +12 -1
  15. pulumi_gcp/artifactregistry/repository.py +28 -0
  16. pulumi_gcp/backupdisasterrecovery/__init__.py +1 -0
  17. pulumi_gcp/backupdisasterrecovery/backup_plan.py +4 -4
  18. pulumi_gcp/backupdisasterrecovery/get_backup.py +12 -1
  19. pulumi_gcp/backupdisasterrecovery/get_backup_plan_association.py +4 -0
  20. pulumi_gcp/backupdisasterrecovery/get_data_source_references.py +135 -0
  21. pulumi_gcp/backupdisasterrecovery/get_management_server.py +4 -0
  22. pulumi_gcp/backupdisasterrecovery/outputs.py +103 -0
  23. pulumi_gcp/bigquery/app_profile.py +14 -49
  24. pulumi_gcp/bigquery/dataset_access.py +4 -8
  25. pulumi_gcp/bigquery/table.py +7 -21
  26. pulumi_gcp/bigqueryanalyticshub/data_exchange_subscription.py +20 -0
  27. pulumi_gcp/bigtable/app_profile.py +14 -49
  28. pulumi_gcp/bigtable/table.py +42 -42
  29. pulumi_gcp/certificatemanager/certificate_map_entry.py +7 -7
  30. pulumi_gcp/chronicle/_inputs.py +6 -5
  31. pulumi_gcp/chronicle/outputs.py +4 -3
  32. pulumi_gcp/chronicle/reference_list.py +53 -5
  33. pulumi_gcp/cloudasset/get_resources_search_all.py +8 -0
  34. pulumi_gcp/cloudbuild/_inputs.py +20 -0
  35. pulumi_gcp/cloudbuild/outputs.py +14 -0
  36. pulumi_gcp/cloudbuild/trigger.py +4 -2
  37. pulumi_gcp/cloudbuild/worker_pool.py +28 -21
  38. pulumi_gcp/cloudfunctions/function.py +4 -8
  39. pulumi_gcp/cloudquota/s_quota_adjuster_settings.py +16 -0
  40. pulumi_gcp/cloudrunv2/_inputs.py +57 -0
  41. pulumi_gcp/cloudrunv2/get_service.py +12 -1
  42. pulumi_gcp/cloudrunv2/outputs.py +81 -0
  43. pulumi_gcp/cloudrunv2/service.py +54 -0
  44. pulumi_gcp/cloudrunv2/worker_pool.py +2 -2
  45. pulumi_gcp/composer/environment.py +28 -49
  46. pulumi_gcp/compute/_inputs.py +804 -24
  47. pulumi_gcp/compute/backend_bucket.py +14 -0
  48. pulumi_gcp/compute/backend_bucket_iam_binding.py +236 -0
  49. pulumi_gcp/compute/backend_bucket_iam_member.py +236 -0
  50. pulumi_gcp/compute/backend_bucket_iam_policy.py +236 -0
  51. pulumi_gcp/compute/backend_service_iam_binding.py +464 -0
  52. pulumi_gcp/compute/backend_service_iam_member.py +464 -0
  53. pulumi_gcp/compute/backend_service_iam_policy.py +464 -0
  54. pulumi_gcp/compute/cross_site_network.py +16 -0
  55. pulumi_gcp/compute/future_reservation.py +32 -0
  56. pulumi_gcp/compute/get_region_backend_service.py +12 -1
  57. pulumi_gcp/compute/get_resource_policy.py +2 -20
  58. pulumi_gcp/compute/instance_from_machine_image.py +75 -110
  59. pulumi_gcp/compute/instance_from_template.py +75 -110
  60. pulumi_gcp/compute/instance_group_manager.py +7 -14
  61. pulumi_gcp/compute/instance_template.py +7 -14
  62. pulumi_gcp/compute/interconnect.py +4 -8
  63. pulumi_gcp/compute/machine_image_iam_binding.py +8 -4
  64. pulumi_gcp/compute/machine_image_iam_member.py +8 -4
  65. pulumi_gcp/compute/machine_image_iam_policy.py +8 -4
  66. pulumi_gcp/compute/network_edge_security_service.py +16 -0
  67. pulumi_gcp/compute/network_firewall_policy_packet_mirroring_rule.py +12 -0
  68. pulumi_gcp/compute/outputs.py +671 -16
  69. pulumi_gcp/compute/preview_feature.py +16 -0
  70. pulumi_gcp/compute/public_delegated_prefix.py +42 -0
  71. pulumi_gcp/compute/region_backend_service.py +54 -0
  72. pulumi_gcp/compute/region_backend_service_iam_binding.py +488 -0
  73. pulumi_gcp/compute/region_backend_service_iam_member.py +488 -0
  74. pulumi_gcp/compute/region_backend_service_iam_policy.py +488 -0
  75. pulumi_gcp/compute/region_instance_group_manager.py +7 -14
  76. pulumi_gcp/compute/region_network_endpoint_group.py +1 -3
  77. pulumi_gcp/compute/region_resize_request.py +24 -0
  78. pulumi_gcp/compute/region_url_map.py +75 -0
  79. pulumi_gcp/compute/wire_group.py +16 -0
  80. pulumi_gcp/container/_inputs.py +446 -18
  81. pulumi_gcp/container/aws_cluster.py +28 -42
  82. pulumi_gcp/container/aws_node_pool.py +28 -42
  83. pulumi_gcp/container/azure_cluster.py +35 -70
  84. pulumi_gcp/container/azure_node_pool.py +28 -42
  85. pulumi_gcp/container/cluster.py +16 -7
  86. pulumi_gcp/container/outputs.py +423 -15
  87. pulumi_gcp/dataflow/flex_template_job.py +10 -0
  88. pulumi_gcp/dataform/repository.py +16 -0
  89. pulumi_gcp/dataform/repository_release_config.py +16 -0
  90. pulumi_gcp/dataform/repository_workflow_config.py +16 -0
  91. pulumi_gcp/dataplex/asset.py +28 -21
  92. pulumi_gcp/dataplex/zone.py +28 -21
  93. pulumi_gcp/dataproc/cluster.py +21 -14
  94. pulumi_gcp/dataproc/workflow_template.py +42 -105
  95. pulumi_gcp/discoveryengine/__init__.py +1 -0
  96. pulumi_gcp/discoveryengine/_inputs.py +94 -0
  97. pulumi_gcp/discoveryengine/acl_config.py +393 -0
  98. pulumi_gcp/discoveryengine/outputs.py +92 -0
  99. pulumi_gcp/firebase/android_app.py +16 -0
  100. pulumi_gcp/firebase/apple_app.py +16 -0
  101. pulumi_gcp/firebase/database_instance.py +16 -0
  102. pulumi_gcp/firebase/extensions_instance.py +12 -0
  103. pulumi_gcp/firebase/get_android_app.py +4 -2
  104. pulumi_gcp/firebase/get_apple_app.py +4 -2
  105. pulumi_gcp/firebase/get_apple_app_config.py +16 -2
  106. pulumi_gcp/firebase/get_hosting_channel.py +4 -2
  107. pulumi_gcp/firebase/hosting_channel.py +20 -0
  108. pulumi_gcp/firebase/hosting_custom_domain.py +20 -0
  109. pulumi_gcp/firebase/hosting_release.py +16 -0
  110. pulumi_gcp/firebase/hosting_site.py +16 -0
  111. pulumi_gcp/firebase/hosting_version.py +16 -0
  112. pulumi_gcp/firebase/storage_bucket.py +18 -0
  113. pulumi_gcp/firestore/index.py +118 -3
  114. pulumi_gcp/folder/service_identity.py +26 -0
  115. pulumi_gcp/gkehub/membership_rbac_role_binding.py +16 -0
  116. pulumi_gcp/healthcare/_inputs.py +205 -0
  117. pulumi_gcp/healthcare/fhir_store.py +128 -0
  118. pulumi_gcp/healthcare/outputs.py +163 -0
  119. pulumi_gcp/iam/workload_identity_pool_iam_binding.py +464 -0
  120. pulumi_gcp/iam/workload_identity_pool_iam_member.py +464 -0
  121. pulumi_gcp/iam/workload_identity_pool_iam_policy.py +464 -0
  122. pulumi_gcp/iam/workload_identity_pool_managed_identity.py +18 -0
  123. pulumi_gcp/iam/workload_identity_pool_namespace.py +20 -0
  124. pulumi_gcp/iap/__init__.py +4 -0
  125. pulumi_gcp/iap/_inputs.py +130 -0
  126. pulumi_gcp/iap/get_web_forwarding_rule_service_iam_policy.py +159 -0
  127. pulumi_gcp/iap/outputs.py +76 -0
  128. pulumi_gcp/iap/web_forwarding_rule_service_iam_binding.py +1002 -0
  129. pulumi_gcp/iap/web_forwarding_rule_service_iam_member.py +1002 -0
  130. pulumi_gcp/iap/web_forwarding_rule_service_iam_policy.py +821 -0
  131. pulumi_gcp/kms/get_kms_secret_asymmetric.py +22 -0
  132. pulumi_gcp/logging/billing_account_bucket_config.py +7 -21
  133. pulumi_gcp/logging/folder_bucket_config.py +7 -21
  134. pulumi_gcp/logging/organization_bucket_config.py +7 -21
  135. pulumi_gcp/logging/organization_sink.py +7 -7
  136. pulumi_gcp/managedkafka/connect_cluster.py +4 -0
  137. pulumi_gcp/managedkafka/connector.py +4 -0
  138. pulumi_gcp/memorystore/instance.py +14 -14
  139. pulumi_gcp/monitoring/dashboard.py +7 -14
  140. pulumi_gcp/netapp/storage_pool.py +91 -2
  141. pulumi_gcp/netapp/volume.py +47 -0
  142. pulumi_gcp/networkmanagement/__init__.py +1 -0
  143. pulumi_gcp/networkmanagement/organization_vpc_flow_logs_config.py +1028 -0
  144. pulumi_gcp/networksecurity/authorization_policy.py +12 -0
  145. pulumi_gcp/networkservices/gateway.py +7 -7
  146. pulumi_gcp/networkservices/service_lb_policies.py +12 -0
  147. pulumi_gcp/oracledatabase/autonomous_database.py +2 -2
  148. pulumi_gcp/organizations/project.py +7 -21
  149. pulumi_gcp/projects/service.py +0 -7
  150. pulumi_gcp/pulumi-plugin.json +1 -1
  151. pulumi_gcp/resourcemanager/capability.py +16 -0
  152. pulumi_gcp/runtimeconfig/config.py +16 -0
  153. pulumi_gcp/runtimeconfig/config_iam_binding.py +236 -0
  154. pulumi_gcp/runtimeconfig/config_iam_member.py +236 -0
  155. pulumi_gcp/runtimeconfig/config_iam_policy.py +236 -0
  156. pulumi_gcp/runtimeconfig/variable.py +10 -0
  157. pulumi_gcp/saasruntime/__init__.py +1 -0
  158. pulumi_gcp/saasruntime/_inputs.py +458 -0
  159. pulumi_gcp/saasruntime/outputs.py +392 -0
  160. pulumi_gcp/saasruntime/saa_s.py +4 -0
  161. pulumi_gcp/saasruntime/unit_kind.py +1024 -0
  162. pulumi_gcp/securesourcemanager/instance.py +7 -7
  163. pulumi_gcp/securesourcemanager/repository.py +7 -7
  164. pulumi_gcp/servicedirectory/namespace_iam_binding.py +4 -4
  165. pulumi_gcp/servicedirectory/namespace_iam_member.py +4 -4
  166. pulumi_gcp/servicedirectory/namespace_iam_policy.py +4 -4
  167. pulumi_gcp/servicedirectory/service_iam_binding.py +4 -4
  168. pulumi_gcp/servicedirectory/service_iam_member.py +4 -4
  169. pulumi_gcp/servicedirectory/service_iam_policy.py +4 -4
  170. pulumi_gcp/sql/_inputs.py +135 -1
  171. pulumi_gcp/sql/database_instance.py +54 -14
  172. pulumi_gcp/sql/get_database_instance.py +12 -1
  173. pulumi_gcp/sql/outputs.py +265 -3
  174. pulumi_gcp/storage/_inputs.py +246 -0
  175. pulumi_gcp/storage/bucket.py +7 -14
  176. pulumi_gcp/storage/bucket_object.py +0 -9
  177. pulumi_gcp/storage/outputs.py +191 -1
  178. pulumi_gcp/storage/transfer_job.py +47 -0
  179. pulumi_gcp/tpu/v2_queued_resource.py +16 -0
  180. pulumi_gcp/tpu/v2_vm.py +16 -0
  181. pulumi_gcp/vertex/ai_feature_group_iam_binding.py +236 -0
  182. pulumi_gcp/vertex/ai_feature_group_iam_member.py +236 -0
  183. pulumi_gcp/vertex/ai_feature_group_iam_policy.py +236 -0
  184. pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_binding.py +248 -0
  185. pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_member.py +248 -0
  186. pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_policy.py +248 -0
  187. pulumi_gcp/vertex/ai_feature_online_store_iam_binding.py +236 -0
  188. pulumi_gcp/vertex/ai_feature_online_store_iam_member.py +236 -0
  189. pulumi_gcp/vertex/ai_feature_online_store_iam_policy.py +236 -0
  190. pulumi_gcp/vertex/ai_feature_store_entity_type_iam_binding.py +238 -0
  191. pulumi_gcp/vertex/ai_feature_store_entity_type_iam_member.py +238 -0
  192. pulumi_gcp/vertex/ai_feature_store_entity_type_iam_policy.py +238 -0
  193. pulumi_gcp/vertex/ai_feature_store_iam_binding.py +248 -0
  194. pulumi_gcp/vertex/ai_feature_store_iam_member.py +248 -0
  195. pulumi_gcp/vertex/ai_feature_store_iam_policy.py +248 -0
  196. pulumi_gcp/vertex/ai_metadata_store.py +16 -0
  197. pulumi_gcp/workstations/workstation.py +16 -0
  198. pulumi_gcp/workstations/workstation_cluster.py +16 -0
  199. pulumi_gcp/workstations/workstation_config.py +16 -0
  200. pulumi_gcp/workstations/workstation_config_iam_binding.py +260 -0
  201. pulumi_gcp/workstations/workstation_config_iam_member.py +260 -0
  202. pulumi_gcp/workstations/workstation_config_iam_policy.py +260 -0
  203. pulumi_gcp/workstations/workstation_iam_binding.py +272 -0
  204. pulumi_gcp/workstations/workstation_iam_member.py +272 -0
  205. pulumi_gcp/workstations/workstation_iam_policy.py +272 -0
  206. {pulumi_gcp-9.0.0a1.dist-info → pulumi_gcp-9.0.0a1758219982.dist-info}/METADATA +1 -1
  207. {pulumi_gcp-9.0.0a1.dist-info → pulumi_gcp-9.0.0a1758219982.dist-info}/RECORD +209 -200
  208. {pulumi_gcp-9.0.0a1.dist-info → pulumi_gcp-9.0.0a1758219982.dist-info}/WHEEL +0 -0
  209. {pulumi_gcp-9.0.0a1.dist-info → pulumi_gcp-9.0.0a1758219982.dist-info}/top_level.txt +0 -0
@@ -305,6 +305,130 @@ class AiFeatureStoreIamBinding(pulumi.CustomResource):
305
305
  role: Optional[pulumi.Input[_builtins.str]] = None,
306
306
  __props__=None):
307
307
  """
308
+ Three different resources help you manage your IAM policy for Vertex AI Featurestore. Each of these resources serves a different use case:
309
+
310
+ * `vertex.AiFeatureStoreIamPolicy`: Authoritative. Sets the IAM policy for the featurestore and replaces any existing policy already attached.
311
+ * `vertex.AiFeatureStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the featurestore are preserved.
312
+ * `vertex.AiFeatureStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the featurestore are preserved.
313
+
314
+ A data source can be used to retrieve policy data in advent you do not need creation
315
+
316
+ * `vertex.AiFeatureStoreIamPolicy`: Retrieves the IAM policy for the featurestore
317
+
318
+ > **Note:** `vertex.AiFeatureStoreIamPolicy` **cannot** be used in conjunction with `vertex.AiFeatureStoreIamBinding` and `vertex.AiFeatureStoreIamMember` or they will fight over what your policy should be.
319
+
320
+ > **Note:** `vertex.AiFeatureStoreIamBinding` resources **can be** used in conjunction with `vertex.AiFeatureStoreIamMember` resources **only if** they do not grant privilege to the same role.
321
+
322
+ ## vertex.AiFeatureStoreIamPolicy
323
+
324
+ ```python
325
+ import pulumi
326
+ import pulumi_gcp as gcp
327
+
328
+ admin = gcp.organizations.get_iam_policy(bindings=[{
329
+ "role": "roles/viewer",
330
+ "members": ["user:jane@example.com"],
331
+ }])
332
+ policy = gcp.vertex.AiFeatureStoreIamPolicy("policy",
333
+ project=featurestore["project"],
334
+ region=featurestore["region"],
335
+ featurestore=featurestore["name"],
336
+ policy_data=admin.policy_data)
337
+ ```
338
+
339
+ ## vertex.AiFeatureStoreIamBinding
340
+
341
+ ```python
342
+ import pulumi
343
+ import pulumi_gcp as gcp
344
+
345
+ binding = gcp.vertex.AiFeatureStoreIamBinding("binding",
346
+ project=featurestore["project"],
347
+ region=featurestore["region"],
348
+ featurestore=featurestore["name"],
349
+ role="roles/viewer",
350
+ members=["user:jane@example.com"])
351
+ ```
352
+
353
+ ## vertex.AiFeatureStoreIamMember
354
+
355
+ ```python
356
+ import pulumi
357
+ import pulumi_gcp as gcp
358
+
359
+ member = gcp.vertex.AiFeatureStoreIamMember("member",
360
+ project=featurestore["project"],
361
+ region=featurestore["region"],
362
+ featurestore=featurestore["name"],
363
+ role="roles/viewer",
364
+ member="user:jane@example.com")
365
+ ```
366
+
367
+ ## This resource supports User Project Overrides.
368
+
369
+ -
370
+
371
+ # IAM policy for Vertex AI Featurestore
372
+
373
+ Three different resources help you manage your IAM policy for Vertex AI Featurestore. Each of these resources serves a different use case:
374
+
375
+ * `vertex.AiFeatureStoreIamPolicy`: Authoritative. Sets the IAM policy for the featurestore and replaces any existing policy already attached.
376
+ * `vertex.AiFeatureStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the featurestore are preserved.
377
+ * `vertex.AiFeatureStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the featurestore are preserved.
378
+
379
+ A data source can be used to retrieve policy data in advent you do not need creation
380
+
381
+ * `vertex.AiFeatureStoreIamPolicy`: Retrieves the IAM policy for the featurestore
382
+
383
+ > **Note:** `vertex.AiFeatureStoreIamPolicy` **cannot** be used in conjunction with `vertex.AiFeatureStoreIamBinding` and `vertex.AiFeatureStoreIamMember` or they will fight over what your policy should be.
384
+
385
+ > **Note:** `vertex.AiFeatureStoreIamBinding` resources **can be** used in conjunction with `vertex.AiFeatureStoreIamMember` resources **only if** they do not grant privilege to the same role.
386
+
387
+ ## vertex.AiFeatureStoreIamPolicy
388
+
389
+ ```python
390
+ import pulumi
391
+ import pulumi_gcp as gcp
392
+
393
+ admin = gcp.organizations.get_iam_policy(bindings=[{
394
+ "role": "roles/viewer",
395
+ "members": ["user:jane@example.com"],
396
+ }])
397
+ policy = gcp.vertex.AiFeatureStoreIamPolicy("policy",
398
+ project=featurestore["project"],
399
+ region=featurestore["region"],
400
+ featurestore=featurestore["name"],
401
+ policy_data=admin.policy_data)
402
+ ```
403
+
404
+ ## vertex.AiFeatureStoreIamBinding
405
+
406
+ ```python
407
+ import pulumi
408
+ import pulumi_gcp as gcp
409
+
410
+ binding = gcp.vertex.AiFeatureStoreIamBinding("binding",
411
+ project=featurestore["project"],
412
+ region=featurestore["region"],
413
+ featurestore=featurestore["name"],
414
+ role="roles/viewer",
415
+ members=["user:jane@example.com"])
416
+ ```
417
+
418
+ ## vertex.AiFeatureStoreIamMember
419
+
420
+ ```python
421
+ import pulumi
422
+ import pulumi_gcp as gcp
423
+
424
+ member = gcp.vertex.AiFeatureStoreIamMember("member",
425
+ project=featurestore["project"],
426
+ region=featurestore["region"],
427
+ featurestore=featurestore["name"],
428
+ role="roles/viewer",
429
+ member="user:jane@example.com")
430
+ ```
431
+
308
432
  ## Import
309
433
 
310
434
  For all import syntaxes, the "resource in question" can take any of the following forms:
@@ -373,6 +497,130 @@ class AiFeatureStoreIamBinding(pulumi.CustomResource):
373
497
  args: AiFeatureStoreIamBindingArgs,
374
498
  opts: Optional[pulumi.ResourceOptions] = None):
375
499
  """
500
+ Three different resources help you manage your IAM policy for Vertex AI Featurestore. Each of these resources serves a different use case:
501
+
502
+ * `vertex.AiFeatureStoreIamPolicy`: Authoritative. Sets the IAM policy for the featurestore and replaces any existing policy already attached.
503
+ * `vertex.AiFeatureStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the featurestore are preserved.
504
+ * `vertex.AiFeatureStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the featurestore are preserved.
505
+
506
+ A data source can be used to retrieve policy data in advent you do not need creation
507
+
508
+ * `vertex.AiFeatureStoreIamPolicy`: Retrieves the IAM policy for the featurestore
509
+
510
+ > **Note:** `vertex.AiFeatureStoreIamPolicy` **cannot** be used in conjunction with `vertex.AiFeatureStoreIamBinding` and `vertex.AiFeatureStoreIamMember` or they will fight over what your policy should be.
511
+
512
+ > **Note:** `vertex.AiFeatureStoreIamBinding` resources **can be** used in conjunction with `vertex.AiFeatureStoreIamMember` resources **only if** they do not grant privilege to the same role.
513
+
514
+ ## vertex.AiFeatureStoreIamPolicy
515
+
516
+ ```python
517
+ import pulumi
518
+ import pulumi_gcp as gcp
519
+
520
+ admin = gcp.organizations.get_iam_policy(bindings=[{
521
+ "role": "roles/viewer",
522
+ "members": ["user:jane@example.com"],
523
+ }])
524
+ policy = gcp.vertex.AiFeatureStoreIamPolicy("policy",
525
+ project=featurestore["project"],
526
+ region=featurestore["region"],
527
+ featurestore=featurestore["name"],
528
+ policy_data=admin.policy_data)
529
+ ```
530
+
531
+ ## vertex.AiFeatureStoreIamBinding
532
+
533
+ ```python
534
+ import pulumi
535
+ import pulumi_gcp as gcp
536
+
537
+ binding = gcp.vertex.AiFeatureStoreIamBinding("binding",
538
+ project=featurestore["project"],
539
+ region=featurestore["region"],
540
+ featurestore=featurestore["name"],
541
+ role="roles/viewer",
542
+ members=["user:jane@example.com"])
543
+ ```
544
+
545
+ ## vertex.AiFeatureStoreIamMember
546
+
547
+ ```python
548
+ import pulumi
549
+ import pulumi_gcp as gcp
550
+
551
+ member = gcp.vertex.AiFeatureStoreIamMember("member",
552
+ project=featurestore["project"],
553
+ region=featurestore["region"],
554
+ featurestore=featurestore["name"],
555
+ role="roles/viewer",
556
+ member="user:jane@example.com")
557
+ ```
558
+
559
+ ## This resource supports User Project Overrides.
560
+
561
+ -
562
+
563
+ # IAM policy for Vertex AI Featurestore
564
+
565
+ Three different resources help you manage your IAM policy for Vertex AI Featurestore. Each of these resources serves a different use case:
566
+
567
+ * `vertex.AiFeatureStoreIamPolicy`: Authoritative. Sets the IAM policy for the featurestore and replaces any existing policy already attached.
568
+ * `vertex.AiFeatureStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the featurestore are preserved.
569
+ * `vertex.AiFeatureStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the featurestore are preserved.
570
+
571
+ A data source can be used to retrieve policy data in advent you do not need creation
572
+
573
+ * `vertex.AiFeatureStoreIamPolicy`: Retrieves the IAM policy for the featurestore
574
+
575
+ > **Note:** `vertex.AiFeatureStoreIamPolicy` **cannot** be used in conjunction with `vertex.AiFeatureStoreIamBinding` and `vertex.AiFeatureStoreIamMember` or they will fight over what your policy should be.
576
+
577
+ > **Note:** `vertex.AiFeatureStoreIamBinding` resources **can be** used in conjunction with `vertex.AiFeatureStoreIamMember` resources **only if** they do not grant privilege to the same role.
578
+
579
+ ## vertex.AiFeatureStoreIamPolicy
580
+
581
+ ```python
582
+ import pulumi
583
+ import pulumi_gcp as gcp
584
+
585
+ admin = gcp.organizations.get_iam_policy(bindings=[{
586
+ "role": "roles/viewer",
587
+ "members": ["user:jane@example.com"],
588
+ }])
589
+ policy = gcp.vertex.AiFeatureStoreIamPolicy("policy",
590
+ project=featurestore["project"],
591
+ region=featurestore["region"],
592
+ featurestore=featurestore["name"],
593
+ policy_data=admin.policy_data)
594
+ ```
595
+
596
+ ## vertex.AiFeatureStoreIamBinding
597
+
598
+ ```python
599
+ import pulumi
600
+ import pulumi_gcp as gcp
601
+
602
+ binding = gcp.vertex.AiFeatureStoreIamBinding("binding",
603
+ project=featurestore["project"],
604
+ region=featurestore["region"],
605
+ featurestore=featurestore["name"],
606
+ role="roles/viewer",
607
+ members=["user:jane@example.com"])
608
+ ```
609
+
610
+ ## vertex.AiFeatureStoreIamMember
611
+
612
+ ```python
613
+ import pulumi
614
+ import pulumi_gcp as gcp
615
+
616
+ member = gcp.vertex.AiFeatureStoreIamMember("member",
617
+ project=featurestore["project"],
618
+ region=featurestore["region"],
619
+ featurestore=featurestore["name"],
620
+ role="roles/viewer",
621
+ member="user:jane@example.com")
622
+ ```
623
+
376
624
  ## Import
377
625
 
378
626
  For all import syntaxes, the "resource in question" can take any of the following forms:
@@ -305,6 +305,130 @@ class AiFeatureStoreIamMember(pulumi.CustomResource):
305
305
  role: Optional[pulumi.Input[_builtins.str]] = None,
306
306
  __props__=None):
307
307
  """
308
+ Three different resources help you manage your IAM policy for Vertex AI Featurestore. Each of these resources serves a different use case:
309
+
310
+ * `vertex.AiFeatureStoreIamPolicy`: Authoritative. Sets the IAM policy for the featurestore and replaces any existing policy already attached.
311
+ * `vertex.AiFeatureStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the featurestore are preserved.
312
+ * `vertex.AiFeatureStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the featurestore are preserved.
313
+
314
+ A data source can be used to retrieve policy data in advent you do not need creation
315
+
316
+ * `vertex.AiFeatureStoreIamPolicy`: Retrieves the IAM policy for the featurestore
317
+
318
+ > **Note:** `vertex.AiFeatureStoreIamPolicy` **cannot** be used in conjunction with `vertex.AiFeatureStoreIamBinding` and `vertex.AiFeatureStoreIamMember` or they will fight over what your policy should be.
319
+
320
+ > **Note:** `vertex.AiFeatureStoreIamBinding` resources **can be** used in conjunction with `vertex.AiFeatureStoreIamMember` resources **only if** they do not grant privilege to the same role.
321
+
322
+ ## vertex.AiFeatureStoreIamPolicy
323
+
324
+ ```python
325
+ import pulumi
326
+ import pulumi_gcp as gcp
327
+
328
+ admin = gcp.organizations.get_iam_policy(bindings=[{
329
+ "role": "roles/viewer",
330
+ "members": ["user:jane@example.com"],
331
+ }])
332
+ policy = gcp.vertex.AiFeatureStoreIamPolicy("policy",
333
+ project=featurestore["project"],
334
+ region=featurestore["region"],
335
+ featurestore=featurestore["name"],
336
+ policy_data=admin.policy_data)
337
+ ```
338
+
339
+ ## vertex.AiFeatureStoreIamBinding
340
+
341
+ ```python
342
+ import pulumi
343
+ import pulumi_gcp as gcp
344
+
345
+ binding = gcp.vertex.AiFeatureStoreIamBinding("binding",
346
+ project=featurestore["project"],
347
+ region=featurestore["region"],
348
+ featurestore=featurestore["name"],
349
+ role="roles/viewer",
350
+ members=["user:jane@example.com"])
351
+ ```
352
+
353
+ ## vertex.AiFeatureStoreIamMember
354
+
355
+ ```python
356
+ import pulumi
357
+ import pulumi_gcp as gcp
358
+
359
+ member = gcp.vertex.AiFeatureStoreIamMember("member",
360
+ project=featurestore["project"],
361
+ region=featurestore["region"],
362
+ featurestore=featurestore["name"],
363
+ role="roles/viewer",
364
+ member="user:jane@example.com")
365
+ ```
366
+
367
+ ## This resource supports User Project Overrides.
368
+
369
+ -
370
+
371
+ # IAM policy for Vertex AI Featurestore
372
+
373
+ Three different resources help you manage your IAM policy for Vertex AI Featurestore. Each of these resources serves a different use case:
374
+
375
+ * `vertex.AiFeatureStoreIamPolicy`: Authoritative. Sets the IAM policy for the featurestore and replaces any existing policy already attached.
376
+ * `vertex.AiFeatureStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the featurestore are preserved.
377
+ * `vertex.AiFeatureStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the featurestore are preserved.
378
+
379
+ A data source can be used to retrieve policy data in advent you do not need creation
380
+
381
+ * `vertex.AiFeatureStoreIamPolicy`: Retrieves the IAM policy for the featurestore
382
+
383
+ > **Note:** `vertex.AiFeatureStoreIamPolicy` **cannot** be used in conjunction with `vertex.AiFeatureStoreIamBinding` and `vertex.AiFeatureStoreIamMember` or they will fight over what your policy should be.
384
+
385
+ > **Note:** `vertex.AiFeatureStoreIamBinding` resources **can be** used in conjunction with `vertex.AiFeatureStoreIamMember` resources **only if** they do not grant privilege to the same role.
386
+
387
+ ## vertex.AiFeatureStoreIamPolicy
388
+
389
+ ```python
390
+ import pulumi
391
+ import pulumi_gcp as gcp
392
+
393
+ admin = gcp.organizations.get_iam_policy(bindings=[{
394
+ "role": "roles/viewer",
395
+ "members": ["user:jane@example.com"],
396
+ }])
397
+ policy = gcp.vertex.AiFeatureStoreIamPolicy("policy",
398
+ project=featurestore["project"],
399
+ region=featurestore["region"],
400
+ featurestore=featurestore["name"],
401
+ policy_data=admin.policy_data)
402
+ ```
403
+
404
+ ## vertex.AiFeatureStoreIamBinding
405
+
406
+ ```python
407
+ import pulumi
408
+ import pulumi_gcp as gcp
409
+
410
+ binding = gcp.vertex.AiFeatureStoreIamBinding("binding",
411
+ project=featurestore["project"],
412
+ region=featurestore["region"],
413
+ featurestore=featurestore["name"],
414
+ role="roles/viewer",
415
+ members=["user:jane@example.com"])
416
+ ```
417
+
418
+ ## vertex.AiFeatureStoreIamMember
419
+
420
+ ```python
421
+ import pulumi
422
+ import pulumi_gcp as gcp
423
+
424
+ member = gcp.vertex.AiFeatureStoreIamMember("member",
425
+ project=featurestore["project"],
426
+ region=featurestore["region"],
427
+ featurestore=featurestore["name"],
428
+ role="roles/viewer",
429
+ member="user:jane@example.com")
430
+ ```
431
+
308
432
  ## Import
309
433
 
310
434
  For all import syntaxes, the "resource in question" can take any of the following forms:
@@ -373,6 +497,130 @@ class AiFeatureStoreIamMember(pulumi.CustomResource):
373
497
  args: AiFeatureStoreIamMemberArgs,
374
498
  opts: Optional[pulumi.ResourceOptions] = None):
375
499
  """
500
+ Three different resources help you manage your IAM policy for Vertex AI Featurestore. Each of these resources serves a different use case:
501
+
502
+ * `vertex.AiFeatureStoreIamPolicy`: Authoritative. Sets the IAM policy for the featurestore and replaces any existing policy already attached.
503
+ * `vertex.AiFeatureStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the featurestore are preserved.
504
+ * `vertex.AiFeatureStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the featurestore are preserved.
505
+
506
+ A data source can be used to retrieve policy data in advent you do not need creation
507
+
508
+ * `vertex.AiFeatureStoreIamPolicy`: Retrieves the IAM policy for the featurestore
509
+
510
+ > **Note:** `vertex.AiFeatureStoreIamPolicy` **cannot** be used in conjunction with `vertex.AiFeatureStoreIamBinding` and `vertex.AiFeatureStoreIamMember` or they will fight over what your policy should be.
511
+
512
+ > **Note:** `vertex.AiFeatureStoreIamBinding` resources **can be** used in conjunction with `vertex.AiFeatureStoreIamMember` resources **only if** they do not grant privilege to the same role.
513
+
514
+ ## vertex.AiFeatureStoreIamPolicy
515
+
516
+ ```python
517
+ import pulumi
518
+ import pulumi_gcp as gcp
519
+
520
+ admin = gcp.organizations.get_iam_policy(bindings=[{
521
+ "role": "roles/viewer",
522
+ "members": ["user:jane@example.com"],
523
+ }])
524
+ policy = gcp.vertex.AiFeatureStoreIamPolicy("policy",
525
+ project=featurestore["project"],
526
+ region=featurestore["region"],
527
+ featurestore=featurestore["name"],
528
+ policy_data=admin.policy_data)
529
+ ```
530
+
531
+ ## vertex.AiFeatureStoreIamBinding
532
+
533
+ ```python
534
+ import pulumi
535
+ import pulumi_gcp as gcp
536
+
537
+ binding = gcp.vertex.AiFeatureStoreIamBinding("binding",
538
+ project=featurestore["project"],
539
+ region=featurestore["region"],
540
+ featurestore=featurestore["name"],
541
+ role="roles/viewer",
542
+ members=["user:jane@example.com"])
543
+ ```
544
+
545
+ ## vertex.AiFeatureStoreIamMember
546
+
547
+ ```python
548
+ import pulumi
549
+ import pulumi_gcp as gcp
550
+
551
+ member = gcp.vertex.AiFeatureStoreIamMember("member",
552
+ project=featurestore["project"],
553
+ region=featurestore["region"],
554
+ featurestore=featurestore["name"],
555
+ role="roles/viewer",
556
+ member="user:jane@example.com")
557
+ ```
558
+
559
+ ## This resource supports User Project Overrides.
560
+
561
+ -
562
+
563
+ # IAM policy for Vertex AI Featurestore
564
+
565
+ Three different resources help you manage your IAM policy for Vertex AI Featurestore. Each of these resources serves a different use case:
566
+
567
+ * `vertex.AiFeatureStoreIamPolicy`: Authoritative. Sets the IAM policy for the featurestore and replaces any existing policy already attached.
568
+ * `vertex.AiFeatureStoreIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the featurestore are preserved.
569
+ * `vertex.AiFeatureStoreIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the featurestore are preserved.
570
+
571
+ A data source can be used to retrieve policy data in advent you do not need creation
572
+
573
+ * `vertex.AiFeatureStoreIamPolicy`: Retrieves the IAM policy for the featurestore
574
+
575
+ > **Note:** `vertex.AiFeatureStoreIamPolicy` **cannot** be used in conjunction with `vertex.AiFeatureStoreIamBinding` and `vertex.AiFeatureStoreIamMember` or they will fight over what your policy should be.
576
+
577
+ > **Note:** `vertex.AiFeatureStoreIamBinding` resources **can be** used in conjunction with `vertex.AiFeatureStoreIamMember` resources **only if** they do not grant privilege to the same role.
578
+
579
+ ## vertex.AiFeatureStoreIamPolicy
580
+
581
+ ```python
582
+ import pulumi
583
+ import pulumi_gcp as gcp
584
+
585
+ admin = gcp.organizations.get_iam_policy(bindings=[{
586
+ "role": "roles/viewer",
587
+ "members": ["user:jane@example.com"],
588
+ }])
589
+ policy = gcp.vertex.AiFeatureStoreIamPolicy("policy",
590
+ project=featurestore["project"],
591
+ region=featurestore["region"],
592
+ featurestore=featurestore["name"],
593
+ policy_data=admin.policy_data)
594
+ ```
595
+
596
+ ## vertex.AiFeatureStoreIamBinding
597
+
598
+ ```python
599
+ import pulumi
600
+ import pulumi_gcp as gcp
601
+
602
+ binding = gcp.vertex.AiFeatureStoreIamBinding("binding",
603
+ project=featurestore["project"],
604
+ region=featurestore["region"],
605
+ featurestore=featurestore["name"],
606
+ role="roles/viewer",
607
+ members=["user:jane@example.com"])
608
+ ```
609
+
610
+ ## vertex.AiFeatureStoreIamMember
611
+
612
+ ```python
613
+ import pulumi
614
+ import pulumi_gcp as gcp
615
+
616
+ member = gcp.vertex.AiFeatureStoreIamMember("member",
617
+ project=featurestore["project"],
618
+ region=featurestore["region"],
619
+ featurestore=featurestore["name"],
620
+ role="roles/viewer",
621
+ member="user:jane@example.com")
622
+ ```
623
+
376
624
  ## Import
377
625
 
378
626
  For all import syntaxes, the "resource in question" can take any of the following forms: