gRPC 7 PERMISSION_DENIED vs 15 DATA_LOSS
Both gRPC 7 (PERMISSION_DENIED) and 15 (DATA_LOSS) belong to the gRPC Status Codes category. 7 indicates that the caller does not have permission to execute the specified operation. This is not for unauthenticated callers — use UNAUTHENTICATED instead. Meanwhile, 15 means that unrecoverable data loss or corruption has occurred.
الوصف
The caller does not have permission to execute the specified operation. This is not for unauthenticated callers — use UNAUTHENTICATED instead.
متى تراه
The authenticated user lacks the required role, scope, or policy to perform this action. Different from UNAUTHENTICATED (code 16), which means no credentials at all.
كيفية الإصلاح
Verify the caller has the correct IAM role, API scope, or access policy. Check RBAC configuration on the server side.
الوصف
Unrecoverable data loss or corruption has occurred.
متى تراه
Critical data was lost or corrupted — for example, a checksum mismatch during transmission or an unrecoverable storage failure on the server.
كيفية الإصلاح
Investigate the data integrity failure immediately. Restore from backups if available, and check for hardware failures or network corruption in the data path.
الفروق الرئيسية
gRPC 7: The caller does not have permission to execute the specified operation. This is not for unauthenticated callers — use UNAUTHENTICATED instead.
gRPC 15: Unrecoverable data loss or corruption has occurred.
You encounter 7 when the authenticated user lacks the required role, scope, or policy to perform this action. Different from UNAUTHENTICATED (code 16), which means no credentials at all.
You encounter 15 when critical data was lost or corrupted — for example, a checksum mismatch during transmission or an unrecoverable storage failure on the server.
متى تستخدم أيًا منهما
For 7 (PERMISSION_DENIED): Verify the caller has the correct IAM role, API scope, or access policy. Check RBAC configuration on the server side. For 15 (DATA_LOSS): Investigate the data integrity failure immediately. Restore from backups if available, and check for hardware failures or network corruption in the data path.