Closed
Description
Community Note
- Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request.
- Please do not leave +1 or me too comments, they generate extra noise for issue followers and do not help prioritize the request.
- If you are interested in working on this issue or have submitted a pull request, please leave a comment.
- If an issue is assigned to a user, that user is claiming responsibility for the issue.
- Customers working with a Google Technical Account Manager or Customer Engineer can ask them to reach out internally to expedite investigation and resolution of this issue.
Terraform Version
Terraform v1.8.2
Affected Resource(s)
google_org_policy_policy
Terraform Configuration
# Disable the Disable Service Account Key Creation policy for the project
resource "google_org_policy_policy" "disableServiceAccountKeyCreation" {
name = "projects/${var.project_id}/policies/iam.disableServiceAccountKeyCreation"
parent = "projects/${var.project_id}"
spec {
inherit_from_parent = false
rules {
enforce = "FALSE"
}
}
}
Debug Output
Error: Error creating Policy: failed to create a diff: failed to retrieve Policy resource: googleapi: Error 403: Your application is authenticating by using local Application Default Credentials. The orgpolicy.googleapis.com API requires a quota project, which is not set by default. To learn how to set your quota project, see https://cloud.google.com/docs/authentication/adc-troubleshooting/user-creds .
│ Details:
│ [
│ {
│ "@type": "type.googleapis.com/google.rpc.ErrorInfo",
│ "domain": "googleapis.com",
│ "metadata": {
│ "consumer": "projects/7640********",
│ "service": "orgpolicy.googleapis.com"
│ },
│ "reason": "SERVICE_DISABLED"
│ }
│ ]
Expected Behavior
Using Terraform in my local terminal, I'm trying to disable the Disable Service Account Key Creation
policy for a specific project and stop it from inheriting the policy from the parent organization.
Actual Behavior
What I noticed from the error message is that the project number from projects/7640********
does not match my project number. I also noticed that it's pulling that number from the first portions of the client_id
in the application_default_credentials.json
file.
Steps to reproduce
gcloud auth login $USER
gcloud auth application-default login $USER
gcloud auth application-default set-quota-project $PROJECT
terraform init
terraform apply
Important Factoids
- The
Org Policy API
is already enabled on this project. - The authenticated user does have the required
Org Policy Admin
role.
Did I stumble into a bug? Seems like someone from Google reported the same issue back in February but it was not fixed.