-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
google_project_iam_member Policy update access denied #10103
Comments
@Leo843 do you have environment |
There is no Here is the output for
Here is the output for
|
@Leo843 can you try adding |
Oh i did not know about this flag, it could have save time, sorry.
|
I tried using a user (with |
Ok, I found the error. It did not work because So this is not a bug but a misunderstanding. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
modular-magician
user, it is either in the process of being autogenerated, or is planned to be autogenerated soon. If an issue is assigned to a user, that user is claiming responsibility for the issue. If an issue is assigned tohashibot
, a community member has claimed the issue already.Terraform Version
Affected Resource(s)
Terraform Configuration Files
Debug Output
https://gist.github.com/Leo843/77cc7e919b80958ff911d9b979b9bc5e
Expected Behavior
The role is given to the service account.
Actual Behavior
Google API returns
403 Policy update access denied
when trying to set the role to the service account.Steps to Reproduce
gcloud auth activate-service-account --key-file=<key-file>
terraform apply
Important Factoids
terraform apply
is executed with a service account used for deployments. The service account has necessary permissions to grant roles (running gcloud projects add/remove-iam-policy-binding succeed).The text was updated successfully, but these errors were encountered: