Skip to content

Conversation

@whoffler
Copy link
Contributor

@whoffler whoffler commented Oct 7, 2025

Description

for issue - https://github.ibm.com/GoldenEye/issues/issues/15942

Release required?

  • No release
  • Patch release (x.x.X)
  • Minor release (x.X.x)
  • Major release (X.x.x)
Release notes content

Run the pipeline

If the CI pipeline doesn't run when you create the PR, the PR requires a user with GitHub collaborators access to run the pipeline.

Run the CI pipeline when the PR is ready for review and you expect tests to pass. Add a comment to the PR with the following text:

/run pipeline

Checklist for reviewers

  • If relevant, a test for the change is included or updated with this PR.
  • If relevant, documentation for the change is included or updated with this PR.

For mergers

  • Use a conventional commit message to set the release level. Follow the guidelines.
  • Include information that users need to know about the PR in the commit message. The commit message becomes part of the GitHub release notes.
  • Use the Squash and merge option.

@whoffler
Copy link
Contributor Author

whoffler commented Oct 7, 2025

/run pipeline

2 similar comments
@whoffler
Copy link
Contributor Author

whoffler commented Oct 9, 2025

/run pipeline

@whoffler
Copy link
Contributor Author

/run pipeline

@whoffler whoffler force-pushed the updateDependenciesAndTests branch 2 times, most recently from fb91d52 to 3afdd86 Compare October 13, 2025 10:28
@whoffler
Copy link
Contributor Author

/run pipeline

@whoffler whoffler force-pushed the updateDependenciesAndTests branch from 3afdd86 to 2a0fb20 Compare October 14, 2025 12:16
@whoffler whoffler force-pushed the updateDependenciesAndTests branch from 2a0fb20 to f9906dc Compare October 16, 2025 18:07
@whoffler
Copy link
Contributor Author

/run pipeline

@whoffler
Copy link
Contributor Author

whoffler commented Oct 16, 2025

Error: 0/16 18:38:36 Terraform apply | Error: [ERROR] Error creating authorization policy: The policy wasn't created because an access policy with identical attributes already exists. Please update the roles in the existing policy (1e521329-8bb8-4337-9fe6-13f001a0b8a5), or update the one you're trying to assign to include a different attribute assignment. {
..

 2025/10/16 18:38:36 Terraform apply |     "StatusCode": 409
 2025/10/16 18:38:36 Terraform apply |                               "state": "active",
 2025/10/16 18:38:36 Terraform apply |                               "subject": {
 2025/10/16 18:38:36 Terraform apply |                                   "attributes": [
 2025/10/16 18:38:36 Terraform apply |                                       {
 2025/10/16 18:38:36 Terraform apply |                                           "key": "accountId",
 2025/10/16 18:38:36 Terraform apply |                                           "operator": "stringEquals",
 2025/10/16 18:38:36 Terraform apply |                                           "value": "abac0df06b644a9cabc6e44f55b3880e"
 2025/10/16 18:38:36 Terraform apply |                                       },
 2025/10/16 18:38:36 Terraform apply |                                       {
 2025/10/16 18:38:36 Terraform apply |                                           "key": "serviceName",
 2025/10/16 18:38:36 Terraform apply |                                           "operator": "stringEquals",
 2025/10/16 18:38:36 Terraform apply |                                           "value": "secrets-manager"
 2025/10/16 18:38:36 Terraform apply |                                       },
 2025/10/16 18:38:36 Terraform apply |                                       {
 2025/10/16 18:38:36 Terraform apply |                                           "key": "serviceInstance",
 2025/10/16 18:38:36 Terraform apply |                                           "operator": "stringEquals",
 2025/10/16 18:38:36 Terraform apply |                                           "value": "79c6d411-c18f-4670-b009-b0044a238667"
 2025/10/16 18:38:36 Terraform apply |                                       }
 2025/10/16 18:38:36 Terraform apply |                                   ]
 2025/10/16 18:38:36 Terraform apply |                               },
 2025/10/16 18:38:36 Terraform apply |                               "type": "authorization",
 2025/10/16 18:38:36 Terraform apply |                               "version": "v1.0"
 2025/10/16 18:38:36 Terraform apply |                           }
 2025/10/16 18:38:36 Terraform apply |                       }
 2025/10/16 18:38:36 Terraform apply |                   },
 2025/10/16 18:38:36 Terraform apply |                   "message": "The policy wasn't created because an access policy with identical attributes already exists. Please update the roles in the existing policy (1e521329-8bb8-4337-9fe6-13f001a0b8a5), or update the one you're trying to assign to include a different attribute assignment."
 2025/10/16 18:38:36 Terraform apply |               }
 2025/10/16 18:38:36 Terraform apply |           ],
 2025/10/16 18:38:36 Terraform apply |           "status_code": 409,
 2025/10/16 18:38:36 Terraform apply |           "trace": "3b2144691a3a46128440197bc663b34b"
...
with module.secrets_manager.ibm_iam_authorization_policy.iam_identity_policy[0],
 2025/10/16 18:38:36 Terraform apply |   on ../../main.tf line 46, in resource "ibm_iam_authorization_policy" "iam_identity_policy":
 2025/10/16 18:38:36 Terraform apply |   46: resource "ibm_iam_authorization_policy" "iam_identity_policy" {

@whoffler
Copy link
Contributor Author

/run pipeline

tests/pr_test.go Outdated
OfferingFlavor: "fully-configurable",
Inputs: map[string]interface{}{
"existing_secrets_manager_crn": permanentResources["secretsManagerCRN"],
"skip_secrets_manager_iam_auth_policy": true,
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@ocofaigh ocofaigh merged commit e76b5b2 into main Oct 17, 2025
@ocofaigh ocofaigh deleted the updateDependenciesAndTests branch October 17, 2025 09:57
@terraform-ibm-modules-ops
Copy link
Contributor

🎉 This PR is included in version 4.1.18 🎉

The release is available on:

Your semantic-release bot 📦🚀

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants