FYI, adding it as a role assignment doesn't work neither. I created an AD group, gave it read permissions into the ADLS at the root level (and path to the folder I want it to write to), and full permissions in the appropriate subfolder. I can see in my group, as a azure role assignment, there's the 'contributor' role for the subscription (assigned to this group).
but, running the release pipeline... LISTSTATUS failed with HttpStatus:Forbidden RemoteException: AccessControlException LISTSTATUS failed with error 0x83090aa2 (Forbidden. ACL verification failed. Either the resource does not exist or the user is not authorized to perform the requested operation.). [<uid>] failed with error 0x83090aa2 (Forbidden. ACL verification failed. Either the resource does not exist or the user is not authorized to perform the requested operation
obviously the resource exists... but Get-AzDataLakeStoreChildItem -Account $dlAccount -Path $datalakePath fails...
And FYI, part of this script tests to see if the datalake exists, and to error out of it doesn't (like wrong subscription or tenant, or the datalake doesn't exist).
That code itself looks like
$datalakeExists = Test-AzDataLakeStoreAccount -Name $DataLakeName
if (! $datalakeExists) {
Write-Warning "ERROR: DataLake '$DataLakeName' does NOT exist"
Write-Warning " - Check your name of the datalake, it might be wrong"
Write-Warning " - Check your subscription, it might be in a different subscription"
Write-Warning " - Check your tenant/directory, it might be in a different tenant"
Write-Warning ""
Write-Warning "Exiting..."
exit 1
}
script doesn't fail on that, it just keeps going, till it actually tries to access the datalake.