You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi, I tried to use the netapp-cloudmanager provider within a corporate gcp account where the executing user needs to impersonate a service account that actually has the rights to deploy terraform stuff.
what am I trying to do?
installing connector resource from this provider via:
When I try to do the above with the current version of the provider (23.11.0) I get a "403 Permission Denied" when setting up the connector instance via my impersonated service account. Or following error via the credential type "external_account" (which is created by workload identity federation in combination with github orgs)
│ Error: cannot get credentials: google: error getting credentials using GOOGLE_APPLICATION_CREDENTIALS environment variable: unknown credential type: "external_account"
│
│ with netapp-cloudmanager_connector_gcp.netapp-connector,
│ on netapp-cloudmanager.tf line 2, in resource "netapp-cloudmanager_connector_gcp" "netapp-connector":
│ 2: resource "netapp-cloudmanager_connector_gcp" "netapp-connector" {
│
╵
underlying issue / possible solution
I have found a similar issue that has been resolved by upgrading the underlying go module.
My suggested change is documented here: #183 but currently only works for the normal impersonation, but still not for the external_account credential type.
Can you please take a look at this? Thanks in advance.
The text was updated successfully, but these errors were encountered:
Hi, I tried to use the netapp-cloudmanager provider within a corporate gcp account where the executing user needs to impersonate a service account that actually has the rights to deploy terraform stuff.
what am I trying to do?
installing connector resource from this provider via:
what is the problem
When I try to do the above with the current version of the provider (23.11.0) I get a "403 Permission Denied" when setting up the connector instance via my impersonated service account. Or following error via the credential type "external_account" (which is created by workload identity federation in combination with github orgs)
underlying issue / possible solution
I have found a similar issue that has been resolved by upgrading the underlying go module.
References:
My suggested change is documented here: #183 but currently only works for the normal impersonation, but still not for the external_account credential type.
Can you please take a look at this? Thanks in advance.
The text was updated successfully, but these errors were encountered: