Open Canito4 opened 1 year ago
@Rajesh-Pirati Can you look and provide your updates
we should be able to use custom roles while creating a policy.
Here is the sample terraform configuration to fetch roles which includes custom roles.
data "ibm_iam_roles" "test" {
service = "cloud-object-storage"
}
sample output:
{
description = ""
name = "Content Writer"
type = "custom"
},
{
description = "Testing terraform"
name = "Test"
type = "custom"
},
and pass that name value as roles in policy creation as mentioned below
resource "ibm_iam_access_group_policy" "ag_policy" {
access_group_id = "xxxxxxx"
roles = ["Content Writer"]
resources {
service = "cloud-object-storage"
}
}
If you still sees, please share transaction-id to debug.
Hello,
I have recently encountered a problem when we execute a terraform plan after the creation of a custom Platform management IAM role.
The scenario is the next one. After we create a new a custom IBMPlatform managment IAM role with the IBMCloud console, Terraform seems like is not finding this role. In the output of the terraform plan, appears as the role does not exist.
Steps we followed:
This is an issue because we need to define custom roles for the different needs that can appear by the technical teams.
Community Note
Terraform CLI and Terraform IBM Provider Version
Affected Resource(s)
ibm_iam_service_policy
Terraform Configuration Files
https://github.com/terraform-ibm-modules/terraform-ibm-iam
Debug Output
Panic Output
Expected Behavior
Actual Behavior
Steps to Reproduce
terraform apply
Important Factoids
References
0000