Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use non-authoritative IAM policy #3845

Merged
merged 1 commit into from
Jun 25, 2019
Merged

Use non-authoritative IAM policy #3845

merged 1 commit into from
Jun 25, 2019

Conversation

NaurisSadovskis
Copy link

What: Update google_logging_organization_sink example to use google_project_iam_member instead of google_project_iam_binding.

Why: Provisioning two instances of the same example in a single project causes IAM binding to be removed from the other and vice versa. This is due to google_project_iam_binding being authoritative. I believe using google_project_iam_member is safer as there is no chance it will overwrite existing IAM policies.

Copy link
Contributor

@danawillow danawillow left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@danawillow danawillow merged commit 3a2d883 into hashicorp:master Jun 25, 2019
@NaurisSadovskis NaurisSadovskis deleted the feature/non-authoritative-iam branch June 25, 2019 09:32
@ghost
Copy link

ghost commented Jul 25, 2019

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.

If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 hashibot-feedback@hashicorp.com. Thanks!

@ghost ghost locked and limited conversation to collaborators Jul 25, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants