Skip to content

Commit 4194856

Browse files
add doc for iam_member (#5588) (#11299)
Signed-off-by: Modular Magician <[email protected]>
1 parent 1285699 commit 4194856

File tree

44 files changed

+89
-0
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

44 files changed

+89
-0
lines changed

.changelog/5588.txt

+3
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
```release-note:none
2+
3+
```

website/docs/r/api_gateway_api_config_iam.html.markdown

+2
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ Three different resources help you manage your IAM policy for API Gateway ApiCon
3131

3232
~> **Note:** `google_api_gateway_api_config_iam_binding` resources **can be** used in conjunction with `google_api_gateway_api_config_iam_member` resources **only if** they do not grant privilege to the same role.
3333

34+
~> **Note:** `google_api_gateway_api_config_iam_member` resources should depend on the associated `google_api_gateway_api_config`. If it does not have an implicit dependency, the dependency should be set explicitly using [`depends_on`](https://www.terraform.io/language/meta-arguments/depends_on). Otherwise, it may create race condition.
35+
3436

3537
~> **Warning:** This resource is in beta, and should be used with the terraform-provider-google-beta provider.
3638
See [Provider Versions](https://terraform.io/docs/providers/google/guides/provider_versions.html) for more details on beta resources.

website/docs/r/api_gateway_api_iam.html.markdown

+2
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ Three different resources help you manage your IAM policy for API Gateway Api. E
3131

3232
~> **Note:** `google_api_gateway_api_iam_binding` resources **can be** used in conjunction with `google_api_gateway_api_iam_member` resources **only if** they do not grant privilege to the same role.
3333

34+
~> **Note:** `google_api_gateway_api_iam_member` resources should depend on the associated `google_api_gateway_api`. If it does not have an implicit dependency, the dependency should be set explicitly using [`depends_on`](https://www.terraform.io/language/meta-arguments/depends_on). Otherwise, it may create race condition.
35+
3436

3537
~> **Warning:** This resource is in beta, and should be used with the terraform-provider-google-beta provider.
3638
See [Provider Versions](https://terraform.io/docs/providers/google/guides/provider_versions.html) for more details on beta resources.

website/docs/r/api_gateway_gateway_iam.html.markdown

+2
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ Three different resources help you manage your IAM policy for API Gateway Gatewa
3131

3232
~> **Note:** `google_api_gateway_gateway_iam_binding` resources **can be** used in conjunction with `google_api_gateway_gateway_iam_member` resources **only if** they do not grant privilege to the same role.
3333

34+
~> **Note:** `google_api_gateway_gateway_iam_member` resources should depend on the associated `google_api_gateway_gateway`. If it does not have an implicit dependency, the dependency should be set explicitly using [`depends_on`](https://www.terraform.io/language/meta-arguments/depends_on). Otherwise, it may create race condition.
35+
3436

3537
~> **Warning:** This resource is in beta, and should be used with the terraform-provider-google-beta provider.
3638
See [Provider Versions](https://terraform.io/docs/providers/google/guides/provider_versions.html) for more details on beta resources.

website/docs/r/apigee_environment_iam.html.markdown

+2
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ Three different resources help you manage your IAM policy for Apigee Environment
3131

3232
~> **Note:** `google_apigee_environment_iam_binding` resources **can be** used in conjunction with `google_apigee_environment_iam_member` resources **only if** they do not grant privilege to the same role.
3333

34+
~> **Note:** `google_apigee_environment_iam_member` resources should depend on the associated `google_apigee_environment`. If it does not have an implicit dependency, the dependency should be set explicitly using [`depends_on`](https://www.terraform.io/language/meta-arguments/depends_on). Otherwise, it may create race condition.
35+
3436

3537

3638

website/docs/r/artifact_registry_repository_iam.html.markdown

+2
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ Three different resources help you manage your IAM policy for Artifact Registry
3131

3232
~> **Note:** `google_artifact_registry_repository_iam_binding` resources **can be** used in conjunction with `google_artifact_registry_repository_iam_member` resources **only if** they do not grant privilege to the same role.
3333

34+
~> **Note:** `google_artifact_registry_repository_iam_member` resources should depend on the associated `google_artifact_registry_repository`. If it does not have an implicit dependency, the dependency should be set explicitly using [`depends_on`](https://www.terraform.io/language/meta-arguments/depends_on). Otherwise, it may create race condition.
35+
3436

3537
~> **Warning:** This resource is in beta, and should be used with the terraform-provider-google-beta provider.
3638
See [Provider Versions](https://terraform.io/docs/providers/google/guides/provider_versions.html) for more details on beta resources.

website/docs/r/bigquery_table_iam.html.markdown

+2
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ Three different resources help you manage your IAM policy for BigQuery Table. Ea
3131

3232
~> **Note:** `google_bigquery_table_iam_binding` resources **can be** used in conjunction with `google_bigquery_table_iam_member` resources **only if** they do not grant privilege to the same role.
3333

34+
~> **Note:** `google_bigquery_table_iam_member` resources should depend on the associated `google_bigquery_table`. If it does not have an implicit dependency, the dependency should be set explicitly using [`depends_on`](https://www.terraform.io/language/meta-arguments/depends_on). Otherwise, it may create race condition.
35+
3436
~> **Note:** This resource supports IAM Conditions ([beta](https://terraform.io/docs/providers/google/provider_versions.html)) but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
3537

3638

website/docs/r/binary_authorization_attestor_iam.html.markdown

+2
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ Three different resources help you manage your IAM policy for Binary Authorizati
3131

3232
~> **Note:** `google_binary_authorization_attestor_iam_binding` resources **can be** used in conjunction with `google_binary_authorization_attestor_iam_member` resources **only if** they do not grant privilege to the same role.
3333

34+
~> **Note:** `google_binary_authorization_attestor_iam_member` resources should depend on the associated `google_binary_authorization_attestor`. If it does not have an implicit dependency, the dependency should be set explicitly using [`depends_on`](https://www.terraform.io/language/meta-arguments/depends_on). Otherwise, it may create race condition.
35+
3436

3537

3638

website/docs/r/cloud_run_service_iam.html.markdown

+2
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ Three different resources help you manage your IAM policy for Cloud Run Service.
3131

3232
~> **Note:** `google_cloud_run_service_iam_binding` resources **can be** used in conjunction with `google_cloud_run_service_iam_member` resources **only if** they do not grant privilege to the same role.
3333

34+
~> **Note:** `google_cloud_run_service_iam_member` resources should depend on the associated `google_cloud_run_service`. If it does not have an implicit dependency, the dependency should be set explicitly using [`depends_on`](https://www.terraform.io/language/meta-arguments/depends_on). Otherwise, it may create race condition.
35+
3436

3537

3638

website/docs/r/cloudfunctions_function_iam.html.markdown

+2
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ Three different resources help you manage your IAM policy for Cloud Functions Cl
3131

3232
~> **Note:** `google_cloudfunctions_function_iam_binding` resources **can be** used in conjunction with `google_cloudfunctions_function_iam_member` resources **only if** they do not grant privilege to the same role.
3333

34+
~> **Note:** `google_cloudfunctions_function_iam_member` resources should depend on the associated `google_cloudfunctions_function`. If it does not have an implicit dependency, the dependency should be set explicitly using [`depends_on`](https://www.terraform.io/language/meta-arguments/depends_on). Otherwise, it may create race condition.
35+
3436

3537

3638

website/docs/r/compute_backend_service_iam.html.markdown

+2
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ Three different resources help you manage your IAM policy for Compute Engine Bac
3131

3232
~> **Note:** `google_compute_backend_service_iam_binding` resources **can be** used in conjunction with `google_compute_backend_service_iam_member` resources **only if** they do not grant privilege to the same role.
3333

34+
~> **Note:** `google_compute_backend_service_iam_member` resources should depend on the associated `google_compute_backend_service`. If it does not have an implicit dependency, the dependency should be set explicitly using [`depends_on`](https://www.terraform.io/language/meta-arguments/depends_on). Otherwise, it may create race condition.
35+
3436
~> **Note:** This resource supports IAM Conditions ([beta](https://terraform.io/docs/providers/google/provider_versions.html)) but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
3537

3638
~> **Warning:** This resource is in beta, and should be used with the terraform-provider-google-beta provider.

website/docs/r/compute_disk_iam.html.markdown

+2
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ Three different resources help you manage your IAM policy for Compute Engine Dis
3131

3232
~> **Note:** `google_compute_disk_iam_binding` resources **can be** used in conjunction with `google_compute_disk_iam_member` resources **only if** they do not grant privilege to the same role.
3333

34+
~> **Note:** `google_compute_disk_iam_member` resources should depend on the associated `google_compute_disk`. If it does not have an implicit dependency, the dependency should be set explicitly using [`depends_on`](https://www.terraform.io/language/meta-arguments/depends_on). Otherwise, it may create race condition.
35+
3436

3537

3638

website/docs/r/compute_image_iam.html.markdown

+2
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ Three different resources help you manage your IAM policy for Compute Engine Ima
3131

3232
~> **Note:** `google_compute_image_iam_binding` resources **can be** used in conjunction with `google_compute_image_iam_member` resources **only if** they do not grant privilege to the same role.
3333

34+
~> **Note:** `google_compute_image_iam_member` resources should depend on the associated `google_compute_image`. If it does not have an implicit dependency, the dependency should be set explicitly using [`depends_on`](https://www.terraform.io/language/meta-arguments/depends_on). Otherwise, it may create race condition.
35+
3436
~> **Note:** This resource supports IAM Conditions ([beta](https://terraform.io/docs/providers/google/provider_versions.html)) but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
3537

3638

website/docs/r/compute_instance_iam.html.markdown

+2
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ Three different resources help you manage your IAM policy for Compute Engine Ins
3131

3232
~> **Note:** `google_compute_instance_iam_binding` resources **can be** used in conjunction with `google_compute_instance_iam_member` resources **only if** they do not grant privilege to the same role.
3333

34+
~> **Note:** `google_compute_instance_iam_member` resources should depend on the associated `google_compute_instance`. If it does not have an implicit dependency, the dependency should be set explicitly using [`depends_on`](https://www.terraform.io/language/meta-arguments/depends_on). Otherwise, it may create race condition.
35+
3436
~> **Note:** This resource supports IAM Conditions ([beta](https://terraform.io/docs/providers/google/provider_versions.html)) but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
3537

3638

website/docs/r/compute_machine_image_iam.html.markdown

+2
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ Three different resources help you manage your IAM policy for Compute Engine Mac
3131

3232
~> **Note:** `google_compute_machine_image_iam_binding` resources **can be** used in conjunction with `google_compute_machine_image_iam_member` resources **only if** they do not grant privilege to the same role.
3333

34+
~> **Note:** `google_compute_machine_image_iam_member` resources should depend on the associated `google_compute_machine_image`. If it does not have an implicit dependency, the dependency should be set explicitly using [`depends_on`](https://www.terraform.io/language/meta-arguments/depends_on). Otherwise, it may create race condition.
35+
3436
~> **Note:** This resource supports IAM Conditions ([beta](https://terraform.io/docs/providers/google/provider_versions.html)) but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
3537

3638
~> **Warning:** This resource is in beta, and should be used with the terraform-provider-google-beta provider.

website/docs/r/compute_region_backend_service_iam.html.markdown

+2
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ Three different resources help you manage your IAM policy for Compute Engine Reg
3131

3232
~> **Note:** `google_compute_region_backend_service_iam_binding` resources **can be** used in conjunction with `google_compute_region_backend_service_iam_member` resources **only if** they do not grant privilege to the same role.
3333

34+
~> **Note:** `google_compute_region_backend_service_iam_member` resources should depend on the associated `google_compute_region_backend_service`. If it does not have an implicit dependency, the dependency should be set explicitly using [`depends_on`](https://www.terraform.io/language/meta-arguments/depends_on). Otherwise, it may create race condition.
35+
3436
~> **Note:** This resource supports IAM Conditions ([beta](https://terraform.io/docs/providers/google/provider_versions.html)) but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
3537

3638
~> **Warning:** This resource is in beta, and should be used with the terraform-provider-google-beta provider.

website/docs/r/compute_region_disk_iam.html.markdown

+2
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ Three different resources help you manage your IAM policy for Compute Engine Reg
3131

3232
~> **Note:** `google_compute_region_disk_iam_binding` resources **can be** used in conjunction with `google_compute_region_disk_iam_member` resources **only if** they do not grant privilege to the same role.
3333

34+
~> **Note:** `google_compute_region_disk_iam_member` resources should depend on the associated `google_compute_region_disk`. If it does not have an implicit dependency, the dependency should be set explicitly using [`depends_on`](https://www.terraform.io/language/meta-arguments/depends_on). Otherwise, it may create race condition.
35+
3436

3537

3638

website/docs/r/compute_subnetwork_iam.html.markdown

+2
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ Three different resources help you manage your IAM policy for Compute Engine Sub
3131

3232
~> **Note:** `google_compute_subnetwork_iam_binding` resources **can be** used in conjunction with `google_compute_subnetwork_iam_member` resources **only if** they do not grant privilege to the same role.
3333

34+
~> **Note:** `google_compute_subnetwork_iam_member` resources should depend on the associated `google_compute_subnetwork`. If it does not have an implicit dependency, the dependency should be set explicitly using [`depends_on`](https://www.terraform.io/language/meta-arguments/depends_on). Otherwise, it may create race condition.
35+
3436
~> **Note:** This resource supports IAM Conditions ([beta](https://terraform.io/docs/providers/google/provider_versions.html)) but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
3537

3638

website/docs/r/data_catalog_entry_group_iam.html.markdown

+2
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ Three different resources help you manage your IAM policy for Data catalog Entry
3131

3232
~> **Note:** `google_data_catalog_entry_group_iam_binding` resources **can be** used in conjunction with `google_data_catalog_entry_group_iam_member` resources **only if** they do not grant privilege to the same role.
3333

34+
~> **Note:** `google_data_catalog_entry_group_iam_member` resources should depend on the associated `google_data_catalog_entry_group`. If it does not have an implicit dependency, the dependency should be set explicitly using [`depends_on`](https://www.terraform.io/language/meta-arguments/depends_on). Otherwise, it may create race condition.
35+
3436

3537

3638

website/docs/r/data_catalog_policy_tag_iam.html.markdown

+2
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ Three different resources help you manage your IAM policy for Data catalog Polic
3131

3232
~> **Note:** `google_data_catalog_policy_tag_iam_binding` resources **can be** used in conjunction with `google_data_catalog_policy_tag_iam_member` resources **only if** they do not grant privilege to the same role.
3333

34+
~> **Note:** `google_data_catalog_policy_tag_iam_member` resources should depend on the associated `google_data_catalog_policy_tag`. If it does not have an implicit dependency, the dependency should be set explicitly using [`depends_on`](https://www.terraform.io/language/meta-arguments/depends_on). Otherwise, it may create race condition.
35+
3436

3537
~> **Warning:** This resource is in beta, and should be used with the terraform-provider-google-beta provider.
3638
See [Provider Versions](https://terraform.io/docs/providers/google/guides/provider_versions.html) for more details on beta resources.

website/docs/r/data_catalog_tag_template_iam.html.markdown

+2
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ Three different resources help you manage your IAM policy for Data catalog TagTe
3131

3232
~> **Note:** `google_data_catalog_tag_template_iam_binding` resources **can be** used in conjunction with `google_data_catalog_tag_template_iam_member` resources **only if** they do not grant privilege to the same role.
3333

34+
~> **Note:** `google_data_catalog_tag_template_iam_member` resources should depend on the associated `google_data_catalog_tag_template`. If it does not have an implicit dependency, the dependency should be set explicitly using [`depends_on`](https://www.terraform.io/language/meta-arguments/depends_on). Otherwise, it may create race condition.
35+
3436

3537

3638

website/docs/r/data_catalog_taxonomy_iam.html.markdown

+2
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ Three different resources help you manage your IAM policy for Data catalog Taxon
3131

3232
~> **Note:** `google_data_catalog_taxonomy_iam_binding` resources **can be** used in conjunction with `google_data_catalog_taxonomy_iam_member` resources **only if** they do not grant privilege to the same role.
3333

34+
~> **Note:** `google_data_catalog_taxonomy_iam_member` resources should depend on the associated `google_data_catalog_taxonomy`. If it does not have an implicit dependency, the dependency should be set explicitly using [`depends_on`](https://www.terraform.io/language/meta-arguments/depends_on). Otherwise, it may create race condition.
35+
3436

3537
~> **Warning:** This resource is in beta, and should be used with the terraform-provider-google-beta provider.
3638
See [Provider Versions](https://terraform.io/docs/providers/google/guides/provider_versions.html) for more details on beta resources.

website/docs/r/endpoints_service_iam.html.markdown

+2
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ Three different resources help you manage your IAM policy for Cloud Endpoints Se
3131

3232
~> **Note:** `google_endpoints_service_iam_binding` resources **can be** used in conjunction with `google_endpoints_service_iam_member` resources **only if** they do not grant privilege to the same role.
3333

34+
~> **Note:** `google_endpoints_service_iam_member` resources should depend on the associated `google_endpoints_service`. If it does not have an implicit dependency, the dependency should be set explicitly using [`depends_on`](https://www.terraform.io/language/meta-arguments/depends_on). Otherwise, it may create race condition.
35+
3436

3537

3638

website/docs/r/healthcare_consent_store_iam.html.markdown

+2
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ Three different resources help you manage your IAM policy for Cloud Healthcare C
3131

3232
~> **Note:** `google_healthcare_consent_store_iam_binding` resources **can be** used in conjunction with `google_healthcare_consent_store_iam_member` resources **only if** they do not grant privilege to the same role.
3333

34+
~> **Note:** `google_healthcare_consent_store_iam_member` resources should depend on the associated `google_healthcare_consent_store`. If it does not have an implicit dependency, the dependency should be set explicitly using [`depends_on`](https://www.terraform.io/language/meta-arguments/depends_on). Otherwise, it may create race condition.
35+
3436

3537

3638

website/docs/r/iap_app_engine_service_iam.html.markdown

+2
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ Three different resources help you manage your IAM policy for Identity-Aware Pro
3131

3232
~> **Note:** `google_iap_app_engine_service_iam_binding` resources **can be** used in conjunction with `google_iap_app_engine_service_iam_member` resources **only if** they do not grant privilege to the same role.
3333

34+
~> **Note:** `google_iap_app_engine_service_iam_member` resources should depend on the associated `google_iap_app_engine_service`. If it does not have an implicit dependency, the dependency should be set explicitly using [`depends_on`](https://www.terraform.io/language/meta-arguments/depends_on). Otherwise, it may create race condition.
35+
3436
~> **Note:** This resource supports IAM Conditions ([beta](https://terraform.io/docs/providers/google/provider_versions.html)) but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
3537

3638

0 commit comments

Comments
 (0)