You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: website/docs/r/google_project.html.markdown
+11-19Lines changed: 11 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,28 +14,20 @@ Allows creation and management of a Google Cloud Platform project.
14
14
Projects created with this resource must be associated with an Organization.
15
15
See the [Organization documentation](https://cloud.google.com/resource-manager/docs/quickstarts) for more details.
16
16
17
-
The service account used to run Terraform when creating a `google_project`
18
-
resource must have `roles/resourcemanager.projectCreator`. See the
17
+
The user or service account that is running Terraform when creating a `google_project`
18
+
resource must have `roles/resourcemanager.projectCreator` on the specified organization. See the
19
19
[Access Control for Organizations Using IAM](https://cloud.google.com/resource-manager/docs/access-control-org)
20
20
doc for more information.
21
21
22
-
Note that prior to 0.8.5, `google_project` functioned like a data source,
23
-
meaning any project referenced by it had to be created and managed outside
24
-
Terraform. As of 0.8.5, `google_project` functions like any other Terraform
25
-
resource, with Terraform creating and managing the project. To replicate the old
26
-
behavior, either:
22
+
~> This resource reads the specified billing account on every terraform apply and plan operation so you must have permissions on the specified billing account.
27
23
28
-
* Use the project ID directly in whatever is referencing the project, using the
* Use the [import](/docs/import/usage.html) functionality
32
-
to import your pre-existing project into Terraform, where it can be referenced and
33
-
used just like always, keeping in mind that Terraform will attempt to undo any changes
34
-
made outside Terraform.
24
+
~> It is recommended to use the `constraints/compute.skipDefaultNetworkCreation`[constraint](/docs/providers/google/r/google_organization_policy.html) to remove the default network instead of setting `auto_create_network` to false.
35
25
36
-
~> It's important to note that any project resources that were added to your Terraform config
37
-
prior to 0.8.5 will continue to function as they always have, and will not be managed by
38
-
Terraform. Only newly added projects are affected.
Copy file name to clipboardExpand all lines: website/docs/r/google_project_default_service_accounts.html.markdown
+9-1Lines changed: 9 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,15 @@ Allows management of Google Cloud Platform project default service accounts.
14
14
When certain service APIs are enabled, Google Cloud Platform automatically creates service accounts to help get started, but
15
15
this is not recommended for production environments as per [Google's documentation](https://cloud.google.com/iam/docs/service-accounts#default).
16
16
See the [Organization documentation](https://cloud.google.com/resource-manager/docs/quickstarts) for more details.
17
-
~> This resource works on a best-effort basis, as no API formally describes the default service accounts. If the default service accounts change their name or additional service accounts are added, this resource will need to be updated.
17
+
18
+
~> **WARNING** Some Google Cloud products do not work if the default service accounts are deleted so it is better to `DEPRIVILEGE` as
19
+
Google **CAN NOT** recover service accounts that have been deleted for more than 30 days.
20
+
Also Google recommends using the `constraints/iam.automaticIamGrantsForDefaultServiceAccounts`[constraint](/docs/providers/google/r/google_organization_policy.html)
21
+
to disable automatic IAM Grants to default service accounts.
22
+
23
+
~> This resource works on a best-effort basis, as no API formally describes the default service accounts
24
+
and it is for users who are unable to use constraints. If the default service accounts change their name
25
+
or additional service accounts are added, this resource will need to be updated.
0 commit comments