-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
r/azurerm_app_service: Make key_vault_reference_identity_id configurable #13720
r/azurerm_app_service: Make key_vault_reference_identity_id configurable #13720
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @patst - LGTM 🏗️
This functionality has been released in v2.81.0 of the Terraform Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
…_app` (#13962) This PR adds the key_vault_reference_identity_id attribute for azurerm_function_app. Plus some test cleanup. From the docs: key_vault_reference_identity_id - (Optional) The User Assigned Identity Id used for looking up KeyVault secrets. The identity must be assigned to the application. See Access vaults with a user-assigned identity for more information. Thanks to @patst for #13720. This PR will close #13960 CC: @sebader
…ice_slot` (#13988) This PR is related to PR #13720 and #13962 and adds support for key_vault_reference_identity_id to azurerm_app_service_slot. This work is based on @patst's work in PR #13720. === RUN TestAccAppServiceSlot_keyVaultUserAssignedIdentity === PAUSE TestAccAppServiceSlot_keyVaultUserAssignedIdentity === CONT TestAccAppServiceSlot_keyVaultUserAssignedIdentity --- PASS: TestAccAppServiceSlot_keyVaultUserAssignedIdentity (233.09s) PASS ok github.com/hashicorp/terraform-provider-azurerm/internal/services/web 233.130s This PR closes #13968
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active contributions. |
Solves #13388 by making the user assigned identity id
for looking up key vault secrets configurable.
The attribute is computed to read the default value (at the moment:
SystemAssigned
) if no value is specified .The default value is returned by the API even if no SystemAssigned identity is set for an AppService. Therefore this behaviour should be fine.
Test case succeeded: