Skip to content

Add user prefix for generated iam import statements #7028

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions .changelog/3864.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:none

```
Original file line number Diff line number Diff line change
Expand Up @@ -122,7 +122,7 @@ Binary Authorization attestor IAM resources can be imported using the resource i

IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
```
$ terraform import google_binary_authorization_attestor_iam_member.editor "projects/{{project}}/attestors/{{attestor}} roles/viewer [email protected]"
$ terraform import google_binary_authorization_attestor_iam_member.editor "projects/{{project}}/attestors/{{attestor}} roles/viewer user:[email protected]"
```

IAM binding imports use space-delimited identifiers: the resource in question and the role, e.g.
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/cloud_run_service_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -127,7 +127,7 @@ Cloud Run service IAM resources can be imported using the resource identifiers,

IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
```
$ terraform import google_cloud_run_service_iam_member.editor "projects/{{project}}/locations/{{location}}/services/{{service}} roles/viewer [email protected]"
$ terraform import google_cloud_run_service_iam_member.editor "projects/{{project}}/locations/{{location}}/services/{{service}} roles/viewer user:[email protected]"
```

IAM binding imports use space-delimited identifiers: the resource in question and the role, e.g.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -129,7 +129,7 @@ Cloud Functions cloudfunction IAM resources can be imported using the resource i

IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
```
$ terraform import google_cloudfunctions_function_iam_member.editor "projects/{{project}}/locations/{{region}}/functions/{{cloud_function}} roles/viewer [email protected]"
$ terraform import google_cloudfunctions_function_iam_member.editor "projects/{{project}}/locations/{{region}}/functions/{{cloud_function}} roles/viewer user:[email protected]"
```

IAM binding imports use space-delimited identifiers: the resource in question and the role, e.g.
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/compute_instance_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -129,7 +129,7 @@ Compute Engine instance IAM resources can be imported using the resource identif

IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
```
$ terraform import google_compute_instance_iam_member.editor "projects/{{project}}/zones/{{zone}}/instances/{{instance}} roles/compute.osLogin [email protected]"
$ terraform import google_compute_instance_iam_member.editor "projects/{{project}}/zones/{{zone}}/instances/{{instance}} roles/compute.osLogin user:[email protected]"
```

IAM binding imports use space-delimited identifiers: the resource in question and the role, e.g.
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/compute_subnetwork_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -130,7 +130,7 @@ Compute Engine subnetwork IAM resources can be imported using the resource ident

IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
```
$ terraform import google_compute_subnetwork_iam_member.editor "projects/{{project}}/regions/{{region}}/subnetworks/{{subnetwork}} roles/compute.networkUser [email protected]"
$ terraform import google_compute_subnetwork_iam_member.editor "projects/{{project}}/regions/{{region}}/subnetworks/{{subnetwork}} roles/compute.networkUser user:[email protected]"
```

IAM binding imports use space-delimited identifiers: the resource in question and the role, e.g.
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/data_catalog_entry_group_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -120,7 +120,7 @@ Data catalog entrygroup IAM resources can be imported using the resource identif

IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
```
$ terraform import google_data_catalog_entry_group_iam_member.editor "projects/{{project}}/locations/{{region}}/entryGroups/{{entry_group}} roles/viewer [email protected]"
$ terraform import google_data_catalog_entry_group_iam_member.editor "projects/{{project}}/locations/{{region}}/entryGroups/{{entry_group}} roles/viewer user:[email protected]"
```

IAM binding imports use space-delimited identifiers: the resource in question and the role, e.g.
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/endpoints_service_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -115,7 +115,7 @@ Cloud Endpoints service IAM resources can be imported using the resource identif

IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
```
$ terraform import google_endpoints_service_iam_member.editor "services/{{serviceName}} roles/viewer [email protected]"
$ terraform import google_endpoints_service_iam_member.editor "services/{{serviceName}} roles/viewer user:[email protected]"
```

IAM binding imports use space-delimited identifiers: the resource in question and the role, e.g.
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/iap_app_engine_service_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -127,7 +127,7 @@ Identity-Aware Proxy appengineservice IAM resources can be imported using the re

IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
```
$ terraform import google_iap_app_engine_service_iam_member.editor "projects/{{project}}/iap_web/appengine-{{appId}}/services/{{service}} roles/iap.httpsResourceAccessor [email protected]"
$ terraform import google_iap_app_engine_service_iam_member.editor "projects/{{project}}/iap_web/appengine-{{appId}}/services/{{service}} roles/iap.httpsResourceAccessor user:[email protected]"
```

IAM binding imports use space-delimited identifiers: the resource in question and the role, e.g.
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/iap_app_engine_version_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -131,7 +131,7 @@ Identity-Aware Proxy appengineversion IAM resources can be imported using the re

IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
```
$ terraform import google_iap_app_engine_version_iam_member.editor "projects/{{project}}/iap_web/appengine-{{appId}}/services/{{service}}/versions/{{versionId}} roles/iap.httpsResourceAccessor [email protected]"
$ terraform import google_iap_app_engine_version_iam_member.editor "projects/{{project}}/iap_web/appengine-{{appId}}/services/{{service}}/versions/{{versionId}} roles/iap.httpsResourceAccessor user:[email protected]"
```

IAM binding imports use space-delimited identifiers: the resource in question and the role, e.g.
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/iap_tunnel_instance_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -127,7 +127,7 @@ Identity-Aware Proxy tunnelinstance IAM resources can be imported using the reso

IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
```
$ terraform import google_iap_tunnel_instance_iam_member.editor "projects/{{project}}/iap_tunnel/zones/{{zone}}/instances/{{tunnel_instance}} roles/iap.tunnelResourceAccessor [email protected]"
$ terraform import google_iap_tunnel_instance_iam_member.editor "projects/{{project}}/iap_tunnel/zones/{{zone}}/instances/{{tunnel_instance}} roles/iap.tunnelResourceAccessor user:[email protected]"
```

IAM binding imports use space-delimited identifiers: the resource in question and the role, e.g.
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/iap_web_backend_service_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -122,7 +122,7 @@ Identity-Aware Proxy webbackendservice IAM resources can be imported using the r

IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
```
$ terraform import google_iap_web_backend_service_iam_member.editor "projects/{{project}}/iap_web/compute/services/{{web_backend_service}} roles/iap.httpsResourceAccessor [email protected]"
$ terraform import google_iap_web_backend_service_iam_member.editor "projects/{{project}}/iap_web/compute/services/{{web_backend_service}} roles/iap.httpsResourceAccessor user:[email protected]"
```

IAM binding imports use space-delimited identifiers: the resource in question and the role, e.g.
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/iap_web_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -117,7 +117,7 @@ Identity-Aware Proxy web IAM resources can be imported using the resource identi

IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
```
$ terraform import google_iap_web_iam_member.editor "projects/{{project}}/iap_web roles/iap.httpsResourceAccessor [email protected]"
$ terraform import google_iap_web_iam_member.editor "projects/{{project}}/iap_web roles/iap.httpsResourceAccessor user:[email protected]"
```

IAM binding imports use space-delimited identifiers: the resource in question and the role, e.g.
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/iap_web_type_app_engine_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -122,7 +122,7 @@ Identity-Aware Proxy webtypeappengine IAM resources can be imported using the re

IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
```
$ terraform import google_iap_web_type_app_engine_iam_member.editor "projects/{{project}}/iap_web/appengine-{{appId}} roles/iap.httpsResourceAccessor [email protected]"
$ terraform import google_iap_web_type_app_engine_iam_member.editor "projects/{{project}}/iap_web/appengine-{{appId}} roles/iap.httpsResourceAccessor user:[email protected]"
```

IAM binding imports use space-delimited identifiers: the resource in question and the role, e.g.
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/iap_web_type_compute_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -117,7 +117,7 @@ Identity-Aware Proxy webtypecompute IAM resources can be imported using the reso

IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
```
$ terraform import google_iap_web_type_compute_iam_member.editor "projects/{{project}}/iap_web/compute roles/iap.httpsResourceAccessor [email protected]"
$ terraform import google_iap_web_type_compute_iam_member.editor "projects/{{project}}/iap_web/compute roles/iap.httpsResourceAccessor user:[email protected]"
```

IAM binding imports use space-delimited identifiers: the resource in question and the role, e.g.
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/pubsub_topic_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -122,7 +122,7 @@ Cloud Pub/Sub topic IAM resources can be imported using the resource identifiers

IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
```
$ terraform import google_pubsub_topic_iam_member.editor "projects/{{project}}/topics/{{topic}} roles/viewer [email protected]"
$ terraform import google_pubsub_topic_iam_member.editor "projects/{{project}}/topics/{{topic}} roles/viewer user:[email protected]"
```

IAM binding imports use space-delimited identifiers: the resource in question and the role, e.g.
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/runtimeconfig_config_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -122,7 +122,7 @@ Runtime Configurator config IAM resources can be imported using the resource ide

IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
```
$ terraform import google_runtimeconfig_config_iam_member.editor "projects/{{project}}/configs/{{config}} roles/viewer [email protected]"
$ terraform import google_runtimeconfig_config_iam_member.editor "projects/{{project}}/configs/{{config}} roles/viewer user:[email protected]"
```

IAM binding imports use space-delimited identifiers: the resource in question and the role, e.g.
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/secret_manager_secret_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -121,7 +121,7 @@ Secret Manager secret IAM resources can be imported using the resource identifie

IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
```
$ terraform import google_secret_manager_secret_iam_member.editor "projects/{{project}}/secrets/{{secret_id}} roles/secretmanager.secretAccessor [email protected]"
$ terraform import google_secret_manager_secret_iam_member.editor "projects/{{project}}/secrets/{{secret_id}} roles/secretmanager.secretAccessor user:[email protected]"
```

IAM binding imports use space-delimited identifiers: the resource in question and the role, e.g.
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/sourcerepo_repository_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -121,7 +121,7 @@ Cloud Source Repositories repository IAM resources can be imported using the res

IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
```
$ terraform import google_sourcerepo_repository_iam_member.editor "projects/{{project}}/repos/{{repository}} roles/viewer [email protected]"
$ terraform import google_sourcerepo_repository_iam_member.editor "projects/{{project}}/repos/{{repository}} roles/viewer user:[email protected]"
```

IAM binding imports use space-delimited identifiers: the resource in question and the role, e.g.
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/storage_bucket_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -118,7 +118,7 @@ Cloud Storage bucket IAM resources can be imported using the resource identifier

IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
```
$ terraform import google_storage_bucket_iam_member.editor "b/{{bucket}} roles/storage.objectViewer [email protected]"
$ terraform import google_storage_bucket_iam_member.editor "b/{{bucket}} roles/storage.objectViewer user:[email protected]"
```

IAM binding imports use space-delimited identifiers: the resource in question and the role, e.g.
Expand Down