Skip to content

Commit 3819ded

Browse files
Add member property to google_project_service_identity (#11130) (#18695)
[upstream:1bd899b3cb5a2ec3d7e3128090509d61098b43a3] Signed-off-by: Modular Magician <[email protected]>
1 parent e43c7fc commit 3819ded

8 files changed

+13
-9
lines changed

.changelog/11130.txt

+3
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
```release-note:enhancement
2+
resourcemanager: added the `member` property to `google_project_service_identity`
3+
```

website/docs/r/apigee_instance.html.markdown

+1-1
Original file line numberDiff line numberDiff line change
@@ -189,7 +189,7 @@ resource "google_kms_crypto_key_iam_member" "apigee_sa_keyuser" {
189189
crypto_key_id = google_kms_crypto_key.apigee_key.id
190190
role = "roles/cloudkms.cryptoKeyEncrypterDecrypter"
191191
192-
member = "serviceAccount:${google_project_service_identity.apigee_sa.email}"
192+
member = google_project_service_identity.apigee_sa.member
193193
}
194194
195195
resource "google_apigee_organization" "apigee_org" {

website/docs/r/apigee_nat_address.html.markdown

+1-1
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ resource "google_kms_crypto_key_iam_member" "apigee_sa_keyuser" {
7777
crypto_key_id = google_kms_crypto_key.apigee_key.id
7878
role = "roles/cloudkms.cryptoKeyEncrypterDecrypter"
7979
80-
member = "serviceAccount:${google_project_service_identity.apigee_sa.email}"
80+
member = google_project_service_identity.apigee_sa.member
8181
}
8282
8383
resource "google_apigee_organization" "apigee_org" {

website/docs/r/apigee_organization.html.markdown

+2-2
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ resource "google_kms_crypto_key_iam_member" "apigee_sa_keyuser" {
120120
crypto_key_id = google_kms_crypto_key.apigee_key.id
121121
role = "roles/cloudkms.cryptoKeyEncrypterDecrypter"
122122
123-
member = "serviceAccount:${google_project_service_identity.apigee_sa.email}"
123+
member = google_project_service_identity.apigee_sa.member
124124
}
125125
126126
resource "google_apigee_organization" "org" {
@@ -167,7 +167,7 @@ resource "google_kms_crypto_key_iam_member" "apigee_sa_keyuser" {
167167
crypto_key_id = google_kms_crypto_key.apigee_key.id
168168
role = "roles/cloudkms.cryptoKeyEncrypterDecrypter"
169169
170-
member = "serviceAccount:${google_project_service_identity.apigee_sa.email}"
170+
member = google_project_service_identity.apigee_sa.member
171171
}
172172
173173
resource "google_apigee_organization" "org" {

website/docs/r/cloudfunctions2_function.html.markdown

+1-1
Original file line numberDiff line numberDiff line change
@@ -780,7 +780,7 @@ resource "google_kms_crypto_key_iam_binding" "gcf_cmek_keyuser" {
780780
"serviceAccount:service-${data.google_project.project.number}@gcp-sa-artifactregistry.iam.gserviceaccount.com",
781781
"serviceAccount:service-${data.google_project.project.number}@gs-project-accounts.iam.gserviceaccount.com",
782782
"serviceAccount:service-${data.google_project.project.number}@serverless-robot-prod.iam.gserviceaccount.com",
783-
"serviceAccount:${google_project_service_identity.ea_sa.email}",
783+
google_project_service_identity.ea_sa.member,
784784
]
785785
786786
depends_on = [

website/docs/r/network_security_tls_inspection_policy.html.markdown

+1-1
Original file line numberDiff line numberDiff line change
@@ -200,7 +200,7 @@ resource "google_privateca_ca_pool_iam_member" "default" {
200200
provider = google-beta
201201
ca_pool = google_privateca_ca_pool.default.id
202202
role = "roles/privateca.certificateManager"
203-
member = "serviceAccount:${google_project_service_identity.ns_sa.email}"
203+
member = google_project_service_identity.ns_sa.member
204204
}
205205
206206
resource "google_certificate_manager_trust_config" "default" {

website/docs/r/privateca_certificate_authority.html.markdown

+2-2
Original file line numberDiff line numberDiff line change
@@ -207,13 +207,13 @@ resource "google_kms_crypto_key_iam_member" "privateca_sa_keyuser_signerverifier
207207
crypto_key_id = "projects/keys-project/locations/us-central1/keyRings/key-ring/cryptoKeys/crypto-key"
208208
role = "roles/cloudkms.signerVerifier"
209209
210-
member = "serviceAccount:${google_project_service_identity.privateca_sa.email}"
210+
member = google_project_service_identity.privateca_sa.member
211211
}
212212
213213
resource "google_kms_crypto_key_iam_member" "privateca_sa_keyuser_viewer" {
214214
crypto_key_id = "projects/keys-project/locations/us-central1/keyRings/key-ring/cryptoKeys/crypto-key"
215215
role = "roles/viewer"
216-
member = "serviceAccount:${google_project_service_identity.privateca_sa.email}"
216+
member = google_project_service_identity.privateca_sa.member
217217
}
218218
219219
resource "google_privateca_certificate_authority" "default" {

website/docs/r/project_service_identity.html.markdown

+2-1
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ resource "google_project_service_identity" "hc_sa" {
3737
resource "google_project_iam_member" "hc_sa_bq_jobuser" {
3838
project = data.google_project.project.project_id
3939
role = "roles/bigquery.jobUser"
40-
member = "serviceAccount:${google_project_service_identity.hc_sa.email}"
40+
member = google_project_service_identity.hc_sa.member
4141
}
4242
```
4343

@@ -59,6 +59,7 @@ The following arguments are supported:
5959
In addition to the arguments listed above, the following computed attributes are exported:
6060

6161
* `email` - The email address of the Google managed service account.
62+
* `member` - The Identity of the Google managed service account in the form 'serviceAccount:{email}'. This value is often used to refer to the service account in order to grant IAM permissions.
6263

6364
## Import
6465

0 commit comments

Comments
 (0)