Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

docs: remove colon from IAM binding docs #8541

Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions .changelog/12153.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:none

```
Original file line number Diff line number Diff line change
Expand Up @@ -133,5 +133,5 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_access_context_manager_access_policy_iam_policy.editor accessPolicies/{{access_policy}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
2 changes: 1 addition & 1 deletion website/docs/r/api_gateway_api_config_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -148,7 +148,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_api_gateway_api_config_iam_policy.editor projects/{{project}}/locations/global/apis/{{api}}/configs/{{api_config}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/api_gateway_api_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -145,7 +145,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_api_gateway_api_iam_policy.editor projects/{{project}}/locations/global/apis/{{api}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/api_gateway_gateway_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -153,7 +153,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_api_gateway_gateway_iam_policy.editor projects/{{project}}/locations/{{region}}/gateways/{{gateway}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/apigee_environment_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -136,5 +136,5 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_apigee_environment_iam_policy.editor {{org_id}}/environments/{{environment}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
Original file line number Diff line number Diff line change
Expand Up @@ -148,7 +148,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_artifact_registry_repository_iam_policy.editor projects/{{project}}/locations/{{location}}/repositories/{{repository}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -148,7 +148,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_bigquery_analytics_hub_data_exchange_iam_policy.editor projects/{{project}}/locations/{{location}}/dataExchanges/{{data_exchange_id}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -152,7 +152,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_bigquery_analytics_hub_listing_iam_policy.editor projects/{{project}}/locations/{{location}}/dataExchanges/{{data_exchange_id}}/listings/{{listing_id}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/bigquery_connection_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -154,7 +154,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_bigquery_connection_iam_policy.editor projects/{{project}}/locations/{{location}}/connections/{{connection_id}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -147,7 +147,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_bigquery_datapolicy_data_policy_iam_policy.editor projects/{{project}}/locations/{{location}}/dataPolicies/{{data_policy_id}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/bigquery_table_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -143,7 +143,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_bigquery_table_iam_policy.editor projects/{{project}}/datasets/{{dataset_id}}/tables/{{table_id}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/bigtable_instance_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -104,7 +104,7 @@ exported:

## Import

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

### Importing IAM members
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/bigtable_table_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -101,7 +101,7 @@ exported:
## Import


-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

### Importing IAM members
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/billing_account_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -90,7 +90,7 @@ exported:
## Import


-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `organizations/my-org-id/roles/my-custom-role`.

### Importing IAM members
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -140,7 +140,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_binary_authorization_attestor_iam_policy.editor projects/{{project}}/attestors/{{attestor}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/cloud_run_service_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -147,7 +147,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_cloud_run_service_iam_policy.editor projects/{{project}}/locations/{{location}}/services/{{service}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/cloud_run_v2_job_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -147,7 +147,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_cloud_run_v2_job_iam_policy.editor projects/{{project}}/locations/{{location}}/jobs/{{job}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/cloud_run_v2_service_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -147,7 +147,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_cloud_run_v2_service_iam_policy.editor projects/{{project}}/locations/{{location}}/services/{{service}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/cloud_tasks_queue_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -147,7 +147,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_cloud_tasks_queue_iam_policy.editor projects/{{project}}/locations/{{location}}/queues/{{queue}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/cloudbuildv2_connection_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -147,7 +147,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_cloudbuildv2_connection_iam_policy.editor projects/{{project}}/locations/{{location}}/connections/{{connection}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -147,7 +147,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_clouddeploy_custom_target_type_iam_policy.editor projects/{{project}}/locations/{{location}}/customTargetTypes/{{custom_target_type}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -144,7 +144,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_clouddeploy_delivery_pipeline_iam_policy.editor projects/{{project}}/locations/{{location}}/deliveryPipelines/{{delivery_pipeline}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/clouddeploy_target_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -144,7 +144,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_clouddeploy_target_iam_policy.editor projects/{{project}}/locations/{{location}}/targets/{{target}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -147,7 +147,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_cloudfunctions2_function_iam_policy.editor projects/{{project}}/locations/{{location}}/functions/{{cloud_function}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/cloudfunctions_function_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -147,7 +147,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_cloudfunctions_function_iam_policy.editor projects/{{project}}/locations/{{region}}/functions/{{cloud_function}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/compute_backend_bucket_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -142,7 +142,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_compute_backend_bucket_iam_policy.editor projects/{{project}}/global/backendBuckets/{{backend_bucket}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/compute_backend_service_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -217,7 +217,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_compute_backend_service_iam_policy.editor projects/{{project}}/global/backendServices/{{backend_service}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/compute_disk_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -147,7 +147,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_compute_disk_iam_policy.editor projects/{{project}}/zones/{{zone}}/disks/{{disk}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/compute_image_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -215,7 +215,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_compute_image_iam_policy.editor projects/{{project}}/global/images/{{image}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/compute_instance_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -225,7 +225,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_compute_instance_iam_policy.editor projects/{{project}}/zones/{{zone}}/instances/{{instance}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/compute_machine_image_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -225,7 +225,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_compute_machine_image_iam_policy.editor projects/{{project}}/global/machineImages/{{machine_image}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -229,7 +229,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_compute_region_backend_service_iam_policy.editor projects/{{project}}/regions/{{region}}/backendServices/{{region_backend_service}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/compute_region_disk_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -147,7 +147,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_compute_region_disk_iam_policy.editor projects/{{project}}/regions/{{region}}/disks/{{region_disk}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/compute_snapshot_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -140,7 +140,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_compute_snapshot_iam_policy.editor projects/{{project}}/global/snapshots/{{snapshot}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/compute_subnetwork_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -226,7 +226,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_compute_subnetwork_iam_policy.editor projects/{{project}}/regions/{{region}}/subnetworks/{{subnetwork}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/container_analysis_note_iam.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -140,7 +140,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_container_analysis_note_iam_policy.editor projects/{{project}}/notes/{{note}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -138,7 +138,7 @@ IAM policy imports use the identifier of the resource in question, e.g.
$ terraform import google_data_catalog_entry_group_iam_policy.editor projects/{{project}}/locations/{{region}}/entryGroups/{{entry_group}}
```

-> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
-> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.

## User Project Overrides
Expand Down
Loading