Skip to content

Commit 8d4b9ad

Browse files
[#11127] Fixes ability to add secret manager secrets IAM bindings with conditions (#10844) (#18294)
[upstream:8d5eac137cb5ca51dc764d18d6c7038018b97222] Signed-off-by: Modular Magician <magic-modules@google.com>
1 parent 6cd0f04 commit 8d4b9ad

File tree

4 files changed

+641
-6
lines changed

4 files changed

+641
-6
lines changed

google/services/secretmanager/iam_secret_manager_secret.go

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -133,6 +133,10 @@ func (u *SecretManagerSecretIamUpdater) GetResourceIamPolicy() (*cloudresourcema
133133
return nil, err
134134
}
135135
var obj map[string]interface{}
136+
url, err = transport_tpg.AddQueryParams(url, map[string]string{"options.requestedPolicyVersion": fmt.Sprintf("%d", tpgiamresource.IamPolicyVersion)})
137+
if err != nil {
138+
return nil, err
139+
}
136140

137141
userAgent, err := tpgresource.GenerateUserAgentString(u.d, u.Config.UserAgent)
138142
if err != nil {

0 commit comments

Comments
 (0)