Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

r/azurerm_app_service: Make key_vault_reference_identity_id configurable #13720

Merged
merged 4 commits into from
Oct 14, 2021

Conversation

patst
Copy link
Contributor

@patst patst commented Oct 13, 2021

Solves #13388 by making the user assigned identity id
for looking up key vault secrets configurable.

The attribute is computed to read the default value (at the moment: SystemAssigned ) if no value is specified .
The default value is returned by the API even if no SystemAssigned identity is set for an AppService. Therefore this behaviour should be fine.

Test case succeeded:

=== RUN   TestAccAppService_keyVaultUserAssignedIdentity
=== PAUSE TestAccAppService_keyVaultUserAssignedIdentity
=== CONT  TestAccAppService_keyVaultUserAssignedIdentity
--- PASS: TestAccAppService_keyVaultUserAssignedIdentity (160.26s)
PASS

Copy link
Collaborator

@katbyte katbyte left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks @patst - LGTM 🏗️

@katbyte katbyte added this to the v2.81.0 milestone Oct 14, 2021
@katbyte katbyte changed the title r/azurerm_app_service: Make keyVaultReferenceIdentity configurable r/azurerm_app_service: Make key_vault_reference_identity_id configurable Oct 14, 2021
@katbyte katbyte merged commit 3a3b0b2 into hashicorp:main Oct 14, 2021
katbyte added a commit that referenced this pull request Oct 14, 2021
@github-actions
Copy link

This functionality has been released in v2.81.0 of the Terraform Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading.

For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you!

katbyte pushed a commit that referenced this pull request Nov 2, 2021
…_app` (#13962)

This PR adds the key_vault_reference_identity_id attribute for azurerm_function_app. Plus some test cleanup.

From the docs:

key_vault_reference_identity_id - (Optional) The User Assigned Identity Id used for looking up KeyVault secrets. The identity must be assigned to the application. See Access vaults with a user-assigned identity for more information.

Thanks to @patst for #13720. This PR will close #13960

CC: @sebader
katbyte pushed a commit that referenced this pull request Nov 3, 2021
…ice_slot` (#13988)

This PR is related to PR #13720 and #13962 and adds support for key_vault_reference_identity_id to azurerm_app_service_slot. This work is based on @patst's work in PR #13720.

=== RUN   TestAccAppServiceSlot_keyVaultUserAssignedIdentity
=== PAUSE TestAccAppServiceSlot_keyVaultUserAssignedIdentity
=== CONT  TestAccAppServiceSlot_keyVaultUserAssignedIdentity
--- PASS: TestAccAppServiceSlot_keyVaultUserAssignedIdentity (233.09s)
PASS
ok      github.com/hashicorp/terraform-provider-azurerm/internal/services/web   233.130s
This PR closes #13968
@github-actions
Copy link

I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active contributions.
If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Nov 14, 2021
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants