Skip to content

Commit 6de19aa

Browse files
committed
Remove privilegedaccessmanager roles
1 parent eef2801 commit 6de19aa

File tree

3 files changed

+10
-10
lines changed

3 files changed

+10
-10
lines changed

4-appfactory/modules/app-group-baseline/main.tf

+4-4
Original file line numberDiff line numberDiff line change
@@ -26,14 +26,14 @@ locals {
2626
"roles/browser", "roles/serviceusage.serviceUsageAdmin",
2727
"roles/storage.admin", "roles/iam.serviceAccountAdmin",
2828
"roles/artifactregistry.admin", "roles/clouddeploy.admin",
29-
"roles/cloudbuild.builds.editor", "roles/privilegedaccessmanager.projectServiceAgent",
29+
"roles/cloudbuild.builds.editor", "roles/resourcemanager.projectIamAdmin",
3030
"roles/iam.serviceAccountUser", "roles/source.admin", "roles/cloudbuild.connectionAdmin"
3131
]
3232
} },
3333
{
3434
for cluster_project_id in var.cluster_projects_ids : cluster_project_id => {
3535
project_id = cluster_project_id
36-
roles = ["roles/privilegedaccessmanager.projectServiceAgent"]
36+
roles = ["roles/resourcemanager.projectIamAdmin"]
3737
}
3838
}
3939
)
@@ -201,10 +201,10 @@ resource "google_project_iam_member" "worker_pool_builder_logging_writer" {
201201
role = "roles/logging.logWriter"
202202
}
203203

204-
resource "google_project_iam_member" "worker_pool_roles_privilegedaccessmanager_projectServiceAgent" {
204+
resource "google_project_iam_member" "worker_pool_roles_project_iam_admin" {
205205
member = "serviceAccount:${reverse(split("/", module.tf_cloudbuild_workspace.cloudbuild_sa))[0]}"
206206
project = local.worker_pool_project
207-
role = "roles/privilegedaccessmanager.projectServiceAgent"
207+
role = "roles/resourcemanager.projectIamAdmin"
208208
}
209209

210210
resource "google_project_iam_member" "cloud_build_builder" {

examples/standalone_single_project/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ The entity used to deploy this examples must have the following roles at Project
7979
- Service Account Admin: `roles/iam.serviceAccountAdmin`
8080
- Service Account User: `roles/iam.serviceAccountUser`
8181
- Logging LogWriter: `roles/logging.logWriter`
82-
- Privileged Access Manager Project Service Agent: `roles/privilegedaccessmanager.projectServiceAgent`
82+
- Project IAM Admin: `roles/resourcemanager.projectIamAdmin`
8383
- Service Usage Admin: `roles/serviceusage.serviceUsageAdmin`
8484
- Source Repository Admin: `roles/source.admin` (if using CSR)
8585
- Storage Admin: `roles/storage.admin`
@@ -88,7 +88,7 @@ The entity used to deploy this examples must have the following roles at Project
8888

8989
The entity used to deploy this examples must have the following roles at Organization level:
9090

91-
- Privileged Access Manager Organization Service Agent: `roles/privilegedaccessmanager.organizationServiceAgent`
91+
- Organization Administrator: `roles/resourcemanager.organizationAdmin`
9292
- Access Context Manager Policy Admin: `roles/accesscontextmanager.policyAdmin`
9393

9494
This example requires a Single network configured:

test/setup/iam.tf

+4-4
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ locals {
2020
"roles/cloudbuild.workerPoolOwner",
2121
"roles/dns.admin",
2222
"roles/compute.networkAdmin",
23-
"roles/privilegedaccessmanager.projectServiceAgent",
23+
"roles/resourcemanager.projectIamAdmin",
2424
] : [
2525
"roles/artifactregistry.admin",
2626
"roles/certificatemanager.owner",
@@ -39,7 +39,7 @@ locals {
3939
"roles/iam.serviceAccountAdmin",
4040
"roles/iam.serviceAccountUser",
4141
"roles/logging.logWriter",
42-
"roles/privilegedaccessmanager.projectServiceAgent",
42+
"roles/resourcemanager.projectIamAdmin",
4343
"roles/serviceusage.serviceUsageAdmin",
4444
"roles/source.admin",
4545
"roles/storage.admin",
@@ -89,13 +89,13 @@ resource "google_project_iam_member" "int_test_iam" {
8989
for_each = module.vpc_project
9090

9191
project = each.value.project_id
92-
role = "roles/privilegedaccessmanager.projectServiceAgent"
92+
role = "roles/resourcemanager.projectIamAdmin"
9393
member = "serviceAccount:${google_service_account.int_test[local.index].email}"
9494
}
9595

9696
resource "google_organization_iam_member" "organizationServiceAgent_role" {
9797
org_id = var.org_id
98-
role = "roles/privilegedaccessmanager.organizationServiceAgent"
98+
role = "roles/resourcemanager.organizationAdmin"
9999
member = "serviceAccount:${google_service_account.int_test[local.index].email}"
100100
}
101101

0 commit comments

Comments
 (0)