Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Failing test(s): inTestAccPrivatecaCertificateAuthority_privatecaCertificateAuthorityCustomSkiExample #18662

Open
SarahFrench opened this issue Jul 4, 2024 · 1 comment

Comments

@SarahFrench
Copy link
Member

SarahFrench commented Jul 4, 2024

Impacted tests

  • TestAccPrivatecaCertificateAuthority_privatecaCertificateAuthorityCustomSkiExample

Affected Resource(s)

  • google_privateca_certificate_authority

Failure rates

  • 100% since test was created

Message(s)

------- Stdout: -------
=== RUN   TestAccPrivatecaCertificateAuthority_privatecaCertificateAuthorityCustomSkiExample
=== PAUSE TestAccPrivatecaCertificateAuthority_privatecaCertificateAuthorityCustomSkiExample
=== CONT  TestAccPrivatecaCertificateAuthority_privatecaCertificateAuthorityCustomSkiExample
    vcr_utils.go:152: Step 1/2 error: Error running apply: exit status 1
        Error: Error waiting to create CertificateAuthority: Error waiting for Creating CertificateAuthority: Error code 3, message: com.google.apps.framework.request.StatusException: <eye3 title=\\\'INVALID_ARGUMENT\\\'/> generic::INVALID_ARGUMENT: Exception calling IAM: Service account [email protected] does not exist.; IAM SetIamPolicy RPC failed on project_id: a2b7a77cafa293e0bp-tp.
          with google_privateca_certificate_authority.default,
          on terraform_plugin_test.tf line 2, in resource "google_privateca_certificate_authority" "default":
           2: resource "google_privateca_certificate_authority" "default" {
--- FAIL: TestAccPrivatecaCertificateAuthority_privatecaCertificateAuthorityCustomSkiExample (14.92s)
FAIL

Nightly build test history

b/351842949

@github-actions github-actions bot added forward/review In review; remove label to forward service/privateca labels Jul 4, 2024
@SarahFrench
Copy link
Member Author

SarahFrench commented Jul 4, 2024

We can force the service account to exist by using this:

resource "google_project_service_identity" "privateca_sa" {
  provider = google-beta
  service = "privateca.googleapis.com"
}

But when this is introduced to the test then a permissions error occurs instead. See GoogleCloudPlatform/magic-modules#11109 (comment)

@BBBmau BBBmau removed the forward/review In review; remove label to forward label Jul 8, 2024
@BBBmau BBBmau added this to the Goals milestone Jul 8, 2024
@BBBmau BBBmau added the size/xs label Jul 8, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants