@@ -46,35 +46,35 @@ resource "google_service_account" "cluster_service_account" {
4646 display_name = "Terraform-managed service account for cluster ${var.name}"
4747}
4848
49- resource "google_project_iam_member" "cluster_service_account-nodeService_account " {
49+ resource "google_project_iam_member" "cluster_service_account_node_service_account " {
5050 count = var.create_service_account ? 1 : 0
5151 project = google_service_account.cluster_service_account[0].project
5252 role = "roles/container.defaultNodeServiceAccount"
5353 member = google_service_account.cluster_service_account[0].member
5454}
5555
56- resource "google_project_iam_member" "cluster_service_account-metric_writer " {
56+ resource "google_project_iam_member" "cluster_service_account_metric_writer " {
5757 count = var.create_service_account ? 1 : 0
5858 project = google_service_account.cluster_service_account[0].project
5959 role = "roles/monitoring.metricWriter"
6060 member = google_service_account.cluster_service_account[0].member
6161}
6262
63- resource "google_project_iam_member" "cluster_service_account-resourceMetadata-writer " {
63+ resource "google_project_iam_member" "cluster_service_account_resource_metadata_writer " {
6464 count = var.create_service_account ? 1 : 0
6565 project = google_service_account.cluster_service_account[0].project
6666 role = "roles/stackdriver.resourceMetadata.writer"
6767 member = google_service_account.cluster_service_account[0].member
6868}
6969
70- resource "google_project_iam_member" "cluster_service_account-gcr " {
70+ resource "google_project_iam_member" "cluster_service_account_gcr " {
7171 for_each = var.create_service_account && var.grant_registry_access ? toset(local.registry_projects_list) : []
7272 project = each.key
7373 role = "roles/storage.objectViewer"
7474 member = "serviceAccount:${google_service_account.cluster_service_account[0].email}"
7575}
7676
77- resource "google_project_iam_member" "cluster_service_account-artifact-registry " {
77+ resource "google_project_iam_member" "cluster_service_account_artifact_registry " {
7878 for_each = var.create_service_account && var.grant_registry_access ? toset(local.registry_projects_list) : []
7979 project = each.key
8080 role = "roles/artifactregistry.reader"
0 commit comments