Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

What IAM permissions do I need to give a role for developing the provider? #1306

Closed
darrenhaken opened this issue Apr 7, 2018 · 10 comments
Closed
Labels

Comments

@darrenhaken
Copy link
Contributor

I've picked up #1300 which is my first Google provider contrib but I've tried to run one of the tests and I receive this error:

* google_container_cluster.cluster: googleapi: Error 403: Google Compute Engine: Required 'compute.networks.get' permission for 'projects/sandbox/global/networks/default', forbidden

Can anyone offer advice on what IAM permissions I'd need?

We have been using TF for a while and not seen this issue before.

@Stono
Copy link

Stono commented Apr 9, 2018

@danawillow any chance you can help @darrenhaken and I resolve this so we can work on #1300 ?

It seems extremely strange as we've created a brand new project and created a service account with the following IAM roles:

  • Compute Admin
  • Compute Instance Admin (v1)
  • Compute Network Admin
  • Kubernetes Engine Admin
  • Editor
  • Owner

And we're still seeing this. I feel like the 403 is a red herring and something else is actually wrong in the way we're setting credentials.

@darrenhaken can you please post the output from the test run with TF_LOG=DEBUG

@Stono
Copy link

Stono commented Apr 9, 2018

I think we may have got to the bottom of this... will update soon!

@catsby catsby added the bug label Apr 9, 2018
@danawillow
Copy link
Contributor

@darrenhaken @Stono any updates? You're right that I can't really tell what's going on without debug logs. I'm also inclined to agree that the 403 is likely a red herring, but I'd double check to make sure you're using the service account you think you are (it should say in the debug logs how you're authenticating)

@Stono
Copy link

Stono commented Apr 9, 2018 via email

@Stono
Copy link

Stono commented Apr 10, 2018

@darrenhaken please close this issue in favour of #1313 which highlights the issue was due to a bad IAM policy caused by race conditions in TF

@darrenhaken
Copy link
Contributor Author

Closed

@bluemalkin
Copy link

Hi - I'm hitting this issue but despite reading the related issues I cannot figure out the fix.

I have the latest terraform and my service account has owner permission on the project with the shared VPC.
Am I missing something ?

Thanks

@danawillow
Copy link
Contributor

Hey @bluemalkin, can you file a separate issue and fill out the issue template (including debug logs)? Thanks!

@bluemalkin
Copy link

@danawillow sure #1711

@ghost
Copy link

ghost commented Nov 17, 2018

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.

If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 [email protected]. Thanks!

@ghost ghost locked and limited conversation to collaborators Nov 17, 2018
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Projects
None yet
Development

No branches or pull requests

5 participants