Hi
I have a problem when i want build in GCP and when i want create a permission to build again the error is ERROR: Policy modification failed. For a binding with condition, run "gcloud alpha iam policies lint-condition" to identify issues in condition.
ERROR: (gcloud.iam.service-accounts.add-iam-policy-binding) INVALID_ARGUMENT: The role name must be in the form "roles/{role}", "organizations/{organization_id}/roles/{role}", or "projects/{project_id}/roles/{role}".
The first error is when compile to source to connect twilio:
INFO: The service account running this build does not have permission to write logs to Cloud Logging. To fix this, grant the Logs Writer (roles/logging.logWriter) role to the service account.
1 message(s) issued.
BUILD FAILURE: Build step failure: build step 0 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1
ERROR: (gcloud.builds.submit) build 413fd1c8-2722-4e67-a62d-87500c979788 completed with status "FAILURE"
I run the command:
gcloud iam service-accounts add-iam-policy-binding my-account@my-account-432322.iam.gserviceaccount.com --member='serviceAccount:my-account@my-account-432322.iam.gserviceaccount.com' --role='roles/logging.logWriter'
and show this error
ERROR: Policy modification failed. For a binding with condition, run "gcloud alpha iam policies lint-condition" to identify issues in condition.
ERROR: (gcloud.iam.service-accounts.add-iam-policy-binding) INVALID_ARGUMENT: The role name must be in the form "roles/{role}", "organizations/{organization_id}/roles/{role}", or "projects/{project_id}/roles/{role}".
sorry, i'm new and read the documentation about permission to account service:
https://cloud.google.com/sdk/gcloud/reference/iam/service-accounts/add-iam-policy-binding
But don't working, what can i be doing bad?
I hope your help. thanks!
Solved! Go to Solution.
Hi @zondixji,
Welcome to Google Cloud Community!
To grant a permission to your service account you can follow these workarounds:
“gcloud projects add-iam-policy-binding SERVICE_ACCOUNT_PROJECT_ID \
--member="serviceAccount:BUILD_SERVICE_AGENT" \
--role="logging.logWriter"
2. Use the Google Cloud Console to grant IAM roles to principals at the project level.
3. Run this command gcloud alpha IAM policies lint-condition to help you identify and fix potential issues in your condition expressions.
Let me know if this helps.
Hi @zondixji,
Welcome to Google Cloud Community!
To grant a permission to your service account you can follow these workarounds:
“gcloud projects add-iam-policy-binding SERVICE_ACCOUNT_PROJECT_ID \
--member="serviceAccount:BUILD_SERVICE_AGENT" \
--role="logging.logWriter"
2. Use the Google Cloud Console to grant IAM roles to principals at the project level.
3. Run this command gcloud alpha IAM policies lint-condition to help you identify and fix potential issues in your condition expressions.
Let me know if this helps.
Thanks, i was resolved