Skip to content

Commit 74a59c5

Browse files
Improve web doc field description order (#14422) (#23483)
[upstream:861ac6c890191fc92878c22232f5ad2fd551ff2f] Signed-off-by: Modular Magician <[email protected]>
1 parent 14ff52b commit 74a59c5

File tree

681 files changed

+3710
-5072
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

681 files changed

+3710
-5072
lines changed

website/docs/r/access_context_manager_access_level.html.markdown

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -90,9 +90,6 @@ The following arguments are supported:
9090
Format: accessPolicies/{policy_id}/accessLevels/{short_name}
9191

9292

93-
- - -
94-
95-
9693
* `description` -
9794
(Optional)
9895
Description of the AccessLevel and its use. Does not affect behavior.
@@ -109,6 +106,7 @@ The following arguments are supported:
109106
Structure is [documented below](#nested_custom).
110107

111108

109+
112110
<a name="nested_basic"></a>The `basic` block supports:
113111

114112
* `combining_function` -

website/docs/r/access_context_manager_access_level_condition.html.markdown

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -111,9 +111,6 @@ The following arguments are supported:
111111
The name of the Access Level to add this condition to.
112112

113113

114-
- - -
115-
116-
117114
* `ip_subnetworks` -
118115
(Optional)
119116
A list of CIDR block IP subnetwork specification. May be IPv4
@@ -170,6 +167,7 @@ The following arguments are supported:
170167
Structure is [documented below](#nested_vpc_network_sources).
171168

172169

170+
173171
<a name="nested_device_policy"></a>The `device_policy` block supports:
174172

175173
* `require_screen_lock` -

website/docs/r/access_context_manager_access_levels.html.markdown

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -102,15 +102,13 @@ The following arguments are supported:
102102
Format: accessPolicies/{policy_id}
103103

104104

105-
- - -
106-
107-
108105
* `access_levels` -
109106
(Optional)
110107
The desired Access Levels that should replace all existing Access Levels in the Access Policy.
111108
Structure is [documented below](#nested_access_levels).
112109

113110

111+
114112
<a name="nested_access_levels"></a>The `access_levels` block supports:
115113

116114
* `name` -

website/docs/r/access_context_manager_access_policy.html.markdown

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -84,15 +84,13 @@ The following arguments are supported:
8484
Human readable title. Does not affect behavior.
8585

8686

87-
- - -
88-
89-
9087
* `scopes` -
9188
(Optional)
9289
Folder or project on which this policy is applicable.
9390
Format: 'folders/{{folder_id}}' or 'projects/{{project_number}}'
9491

9592

93+
9694
## Attributes Reference
9795

9896
In addition to the arguments listed above, the following computed attributes are exported:

website/docs/r/access_context_manager_authorized_orgs_desc.html.markdown

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -81,9 +81,6 @@ The following arguments are supported:
8181
After you create an `AuthorizedOrgsDesc`, you cannot change its `name`.
8282

8383

84-
- - -
85-
86-
8784
* `orgs` -
8885
(Optional)
8986
The list of organization ids in this AuthorizedOrgsDesc.
@@ -121,6 +118,7 @@ The following arguments are supported:
121118
Possible values are: `AUTHORIZATION_TYPE_TRUST`.
122119

123120

121+
124122
## Attributes Reference
125123

126124
In addition to the arguments listed above, the following computed attributes are exported:

website/docs/r/access_context_manager_egress_policy.html.markdown

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,8 +42,6 @@ The following arguments are supported:
4242
The name of the Service Perimeter to add this resource to.
4343

4444

45-
- - -
46-
4745

4846

4947
## Attributes Reference

website/docs/r/access_context_manager_gcp_user_access_binding.html.markdown

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -95,9 +95,6 @@ The following arguments are supported:
9595
Required. ID of the parent organization.
9696

9797

98-
- - -
99-
100-
10198
* `access_levels` -
10299
(Optional)
103100
Optional. Access level that a user must have to be granted access. Only one access level is supported, not multiple. This repeated field must have exactly one element. Example: "accessPolicies/9522/accessLevels/device_trusted"
@@ -113,6 +110,7 @@ The following arguments are supported:
113110
Structure is [documented below](#nested_scoped_access_settings).
114111

115112

113+
116114
<a name="nested_session_settings"></a>The `session_settings` block supports:
117115

118116
* `session_reauth_method` -

website/docs/r/access_context_manager_ingress_policy.html.markdown

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,8 +42,6 @@ The following arguments are supported:
4242
The name of the Service Perimeter to add this resource to.
4343

4444

45-
- - -
46-
4745

4846

4947
## Attributes Reference

website/docs/r/access_context_manager_service_perimeter.html.markdown

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -299,9 +299,6 @@ The following arguments are supported:
299299
Format: accessPolicies/{policy_id}/servicePerimeters/{short_name}
300300

301301

302-
- - -
303-
304-
305302
* `description` -
306303
(Optional)
307304
Description of the ServicePerimeter and its use. Does not affect
@@ -354,6 +351,7 @@ The following arguments are supported:
354351
bet set to True if any of the fields in the spec are set to non-default values.
355352

356353

354+
357355
<a name="nested_status"></a>The `status` block supports:
358356

359357
* `resources` -

website/docs/r/access_context_manager_service_perimeter_dry_run_egress_policy.html.markdown

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -136,9 +136,6 @@ The following arguments are supported:
136136
The name of the Service Perimeter to add this resource to.
137137

138138

139-
- - -
140-
141-
142139
* `egress_from` -
143140
(Optional)
144141
Defines conditions on the source of a request causing this `EgressPolicy` to apply.
@@ -155,6 +152,7 @@ The following arguments are supported:
155152
Human readable title. Must be unique within the perimeter. Does not affect behavior.
156153

157154

155+
158156
<a name="nested_egress_from"></a>The `egress_from` block supports:
159157

160158
* `identity_type` -

0 commit comments

Comments
 (0)