@@ -63,11 +63,11 @@ resource "google_service_account" "build_service_account" {
63
63
depends_on = [module . apis ]
64
64
}
65
65
66
- resource "google_project_iam_binding " "build_iam" {
66
+ resource "google_project_iam_member " "build_iam" {
67
67
for_each = toset ([" roles/storage.objectViewer" , " roles/logging.logWriter" , " roles/artifactregistry.writer" ])
68
68
project = data. google_project . project . project_id
69
69
role = each. value
70
- members = [ " serviceAccount:${ google_service_account . build_service_account . email } " ]
70
+ member = " serviceAccount:${ google_service_account . build_service_account . email } "
71
71
}
72
72
73
73
resource "google_artifact_registry_repository" "repo" {
@@ -83,10 +83,10 @@ resource "google_artifact_registry_repository" "repo" {
83
83
data "google_storage_project_service_account" "gcs_account" {
84
84
depends_on = [module . apis ]
85
85
}
86
- resource "google_project_iam_binding " "gcs_sa_pubsub_publish" {
86
+ resource "google_project_iam_member " "gcs_sa_pubsub_publish" {
87
87
project = data. google_project . project . project_id
88
88
role = " roles/pubsub.publisher"
89
- members = [ " serviceAccount:${ data . google_storage_project_service_account . gcs_account . email_address } " ]
89
+ member = " serviceAccount:${ data . google_storage_project_service_account . gcs_account . email_address } "
90
90
}
91
91
92
92
# # Create configured scanner buckets if requested.
@@ -110,13 +110,11 @@ data "google_storage_bucket" "scanner-buckets" {
110
110
name = each. value
111
111
depends_on = [module . create_buckets ]
112
112
}
113
- resource "google_storage_bucket_iam_binding " "buckets_sa_binding " {
113
+ resource "google_storage_bucket_iam_member " "buckets_sa_iam " {
114
114
for_each = local. all_buckets
115
115
bucket = data. google_storage_bucket . scanner-buckets [each . key ]. name
116
116
role = " roles/storage.admin"
117
- members = [
118
- " serviceAccount:${ google_service_account . malware_scanner_sa . email } " ,
119
- ]
117
+ member = " serviceAccount:${ google_service_account . malware_scanner_sa . email } "
120
118
}
121
119
122
120
# # Create the CVD Mirror bucket and allow service account admin access.
@@ -127,12 +125,10 @@ resource "google_storage_bucket" "cvd_mirror_bucket" {
127
125
uniform_bucket_level_access = var. uniform_bucket_level_access
128
126
depends_on = [module . apis ]
129
127
}
130
- resource "google_storage_bucket_iam_binding " "cvd_mirror_bucket_sa_binding " {
128
+ resource "google_storage_bucket_iam_member " "cvd_mirror_bucket_sa_iam " {
131
129
bucket = google_storage_bucket. cvd_mirror_bucket . name
132
130
role = " roles/storage.admin"
133
- members = [
134
- " serviceAccount:${ google_service_account . malware_scanner_sa . email } " ,
135
- ]
131
+ member = " serviceAccount:${ google_service_account . malware_scanner_sa . email } "
136
132
}
137
133
138
134
# # Perform an update/initial load of mirror bucket.
0 commit comments