Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Apply for ibm_iam_authorization_policy fails with 404 when using IBMCLOUD_VISIBILITY=private #2926

Closed
l2fprod opened this issue Aug 2, 2021 · 0 comments · Fixed by #2937 or #3271
Closed
Labels
bug service/IAMPAP Issues related to IAM Policy Management Visibility

Comments

@l2fprod
Copy link
Member

l2fprod commented Aug 2, 2021

Similar to #2828

Terraform versions

$ terraform version
Terraform v1.0.3
on linux_amd64
+ provider registry.terraform.io/ibm-cloud/ibm v1.29.0

Affected Resource(s)

  • ibm_iam_authorization_policy

Terraform Configuration Files

resource "ibm_iam_authorization_policy" "redis_policy" {
  source_service_name         = "databases-for-redis"
  target_service_name         = data.terraform_remote_state.kms.outputs.key.type
  target_resource_instance_id = data.terraform_remote_state.kms.outputs.kms.guid
  roles                       = ["Reader", "AuthorizationDelegator"]
}

Actual Behavior

ibm_iam_authorization_policy.redis_policy: Creating...
╷
│ Error: Request failed with status code: 404, ServerErrorResponse: <!DOCTYPE html><html><head><title>Error</title><style>body {
│         width: 35em;
│         margin: 0 auto;
│         font-family: Tahoma, Verdana, Arial, sans-serif;
│     }
│ </style></head><body><h1>An 404 error occurred in iam-gateway.</h1></body></html>
│
│   with ibm_iam_authorization_policy.redis_policy,
│   on main.tf line 26, in resource "ibm_iam_authorization_policy" "redis_policy":
│   26: resource "ibm_iam_authorization_policy" "redis_policy" {
│
╵
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug service/IAMPAP Issues related to IAM Policy Management Visibility
Projects
None yet
2 participants