-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for configuration of keyVaultReferenceIdentity in azurerm_app_service #13388
Comments
Maybe it's better to use
I don't know how we could set
There is a |
…ble (#13720) Solves #13388 by making the user assigned identity id for looking up key vault secrets configurable. The attribute is computed to read the default value (at the moment: SystemAssigned ) if no value is specified . The default value is returned by the API even if no SystemAssigned identity is set for an AppService. Therefore this behaviour should be fine. Test case succeeded:
This functionality has been released in v2.83.0 of the Terraform Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
It’s working as expected, great work @patst! |
This functionality has been released in v2.83.0 of the Terraform Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
Would be awesome if this could also be added to Function Apps! #13960 |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Description
Today there's no way to configure this through terraform making it hard to resolve key vault values needed a startup e.g.
@Microsoft.KeyVault(VaultName=myvault;SecretName=mysecret)
so we'll need to resort to a manual configuration similar to the one below.New or Affected Resource(s)
Potential Terraform Configuration
References
The text was updated successfully, but these errors were encountered: