-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
azurerm_api_management - support key_vault_id's without a version #6723
Conversation
@katbyte As with previous PRs, I've not been able to run acceptance tests but have verified functionality within my org's tenant. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hey @sirlatrom
Thanks for this PR - taking a look through this mostly LGTM, however can we add an acceptance test covering provisioning with a versionless secret to confirm that this works?
Thanks!
azurerm/internal/services/apimanagement/resource_arm_api_management.go
Outdated
Show resolved
Hide resolved
I'd like to, but there's a catch 22: Currently, only System Assigned Identity is used against the Key Vault, and you can of course use an But if you create the API Management service with the Key Vault references, versioned or not, they are evaluated during creation of the API Management service, preventing us from creating the access policy ahead of time. I've tried with User Assigned Identity and confirmed it is not used for Key Vault access. I've got the impression that User Assigned Identity is currently only used to access API backends. Is there a way that I can have two phases in the acceptance test? In our pipeline we're currently working around the issue by using a variable to conditionally set the |
@tombuildsstuff In 31e4993, I've added acceptance tests setting the |
Signed-off-by: Sune Keller <[email protected]>
Signed-off-by: Sune Keller <[email protected]>
@tombuildsstuff @katbyte Rebased this on master after other tests were merged, should apply cleanly now. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @sirlatrom! LGLTM 👍
This has been released in version 2.10.0 of the provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. As an example: provider "azurerm" {
version = "~> 2.10.0"
}
# ... other configuration ... |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 [email protected]. Thanks! |
Fixes #4408.