-
Notifications
You must be signed in to change notification settings - Fork 674
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add optional service_group_id param support to policies and roles API #4455
add optional service_group_id param support to policies and roles API #4455
Conversation
Signed-off-by: Rajesh K Pirati <Rajesh.Pirati@ibm.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This looks good to me.
…into v2Roles-support-serviceGroupId Signed-off-by: Rajesh K Pirati <Rajesh.Pirati@ibm.com>
@@ -244,7 +244,7 @@ func testAccCheckIBMIAMTrustedProfilePolicyDataSourceTimeBasedCustom(name string | |||
profile_id = ibm_iam_trusted_profile.profileID.id | |||
roles = ["Viewer"] | |||
resources { | |||
service = "kms" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
why we changed exisiting testcase can we add new testcase for "service_group_id" for this new feature.
Don't modify exisitng testcases we will not have testcase support for old features
…IBM-Cloud#4455) * add optional service_group_id param support to V2Roles Signed-off-by: Rajesh K Pirati <Rajesh.Pirati@ibm.com> * Added new testcases for dataSource test --------- Signed-off-by: Rajesh K Pirati <Rajesh.Pirati@ibm.com>
Community Note
Relates OR Closes https://github.ibm.com/IAM/AM-issues/issues/645
Output from acceptance testing:
IAMUserPolicy with
service_group_id
IAMServicePolicy
IAMAccessGroupPolicy
IAMTrustedPolicy
Tested from terraform CLI:
HTTP error 400 when
service/serviceName
andservice_group_id
passed.configuration:
output:
policy with
service/serviceName
:policy with
service/serviceName
and service specific rolespolicy with
service_group_id