Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Breaking change on policy resources #3410

Closed
kavya498 opened this issue Dec 8, 2021 · 1 comment · Fixed by #3412
Closed

Breaking change on policy resources #3410

kavya498 opened this issue Dec 8, 2021 · 1 comment · Fixed by #3412
Labels
service/IAMPAP Issues related to IAM Policy Management

Comments

@kavya498
Copy link
Collaborator

kavya498 commented Dec 8, 2021

Policy resources fail when trying to assign service roles with latest provider 1.37.0.. 1.36.0 works fine..

2021/12/07 19:52:22 Terraform apply | Error: RoleDoesnotExist: Content Reader was not found. Valid roles are Reader, Writer, Manager, Viewer, Administrator, Operator, Editor
 2021/12/07 19:52:22 Terraform apply | 
 2021/12/07 19:52:22 Terraform apply |   on security-group-reader.tf line 192, in resource "ibm_iam_trusted_profile_policy" "Reader_TrustProfile-Policy_10":
 2021/12/07 19:52:22 Terraform apply |  192: resource "ibm_iam_trusted_profile_policy" "Reader_TrustProfile-Policy_10" {
 2021/12/07 19:52:22 Terraform apply | 
 2021/12/07 19:52:22 Terraform apply | 
 2021/12/07 19:52:22 Terraform apply | 
 2021/12/07 19:52:22 Terraform apply | Error: RoleDoesnotExist: Standard member was not found. Valid roles are Reader, Writer, Manager, Viewer, Administrator, Operator, Editor
 2021/12/07 19:52:22 Terraform apply | 
 2021/12/07 19:52:22 Terraform apply |   on security-platform-user.tf line 17, in resource "ibm_iam_user_policy" "policy-1":
 2021/12/07 19:52:22 Terraform apply |   17: resource "ibm_iam_user_policy" "policy-1" {
 2021/12/07 19:52:22 Terraform apply | 
 2021/12/07 19:52:22 Terraform apply | 
 2021/12/07 19:52:22 Terraform apply | 
 2021/12/07 19:52:22 Terraform apply | Error: RoleDoesnotExist: Standard Member was not found. Valid roles are Reader, Writer, Manager, Viewer, Administrator, Operator, Editor
 2021/12/07 19:52:22 Terraform apply | 
 2021/12/07 19:52:22 Terraform apply |   on security-platform-user.tf line 26, in resource "ibm_iam_user_policy" "policy-2":
 2021/12/07 19:52:22 Terraform apply |   26: resource "ibm_iam_user_policy" "policy-2" {
 2021/12/07 19:52:22 Terraform apply | 

Try to reproduce with


resource "ibm_iam_user_policy" "policy" {
    ibm_id = "hkantare@in.ibm.com"
    roles  = [
        "Monitor",
        "Reader",
        "Viewer",
    ]

    resources {
        service    = "cloudantnosqldb"
    }
}
@kavya498
Copy link
Collaborator Author

kavya498 commented Dec 8, 2021

@Rajesh-Pirati , #3409 should fix this issue.. Please test all possible scenarios.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
service/IAMPAP Issues related to IAM Policy Management
Projects
None yet
1 participant