Skip to content

Commit 781e184

Browse files
author
iru
authored
docs: troubleshoot 403 gcp auth
1 parent 3c15675 commit 781e184

File tree

1 file changed

+15
-1
lines changed

1 file changed

+15
-1
lines changed

README.md

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ Your user **must** have following **roles** in your GCP credentials
5252
* _Organization Admin_ (organizational usage only)
5353

5454
### Google Cloud CLI Authentication
55-
To authorize the cloud CLI to be used by Terraform check the following [Google docs.](https://cloud.google.com/sdk/docs/authorizing)
55+
To authorize the cloud CLI to be used by Terraform check the following [Terraform Google Provider docs](https://registry.terraform.io/providers/hashicorp/google/latest/docs/guides/getting_started#configuring-the-provider)
5656

5757
#### Use a Service Account
5858

@@ -135,6 +135,20 @@ A: On your Google Cloud account, search for "APIs & Services > Enabled APIs & Se
135135
$ gcloud services list --enabled
136136
```
137137
138+
### Q: Getting "googleapi: 403 Permission *** denied for resource"
139+
A: This may happen because permissions are not enough, API services were not correctly enabled, or you're not correctly authenticated for terraform google prolvider.
140+
<br/>S: Verify [permissions](#prerequisites), [api-services](apis), and that the [Terraform Google Provider](https://registry.terraform.io/providers/hashicorp/google/latest/docs/guides/getting_started#configuring-the-provider) authentication has been correctly setup.
141+
You can also launch the following terraform manifest to check whether you're authenticated with what you expect
142+
143+
```
144+
data "google_client_openid_userinfo" "me" {
145+
}
146+
147+
output "me" {
148+
value = data.google_client_openid_userinfo.me.*
149+
}
150+
```
151+
138152
### Q: In organizaitonal setup, Compliance trust-relationship is not being deployed on our projects
139153
A: If your organizational uses folders we currently don't support that.
140154
<br/>S: A workaround would be to use the `benchmark_project_ids` parameter so you can define the projects where compliance role is to be deployed explicitly. Let us know if this workaround won't be enough and we will work on implementing a solution.

0 commit comments

Comments
 (0)