-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
v0.3.3 azurerm provider fails to read cli auth if subscription_id is set #562
Comments
We are hitting this too I believe. Had to resort back to Service Principals. |
Hey @JettJones @codyja Thanks for raising this issue :) I've been taking a look into this - when implementing this functionality I was assuming that both a Subscription ID and a Tenant ID in the Provider block, rather than just a Subscription ID - however that's not the case.. I'm working on a fix for this at the moment with the intention of shipping this in the next release. Thanks! cc @pmarques |
Hi @tombuildsstuff i run "module.$moduleName.provider.azurerm: No valid (unexpired) Azure CLI Auth Tokens found. Please run Pinning the version to {version = "0.3.2"} fixes the issue Do you want me to open another issue or is this here ok for you? |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 hashibot-feedback@hashicorp.com. Thanks! |
Terraform Version
Terraform v0.10.8
also saw with
Terraform v0.10.7
Affected Resource(s)
azurerm_*
// Any azurerm resource.Terraform Configuration Files
Debug Output
https://gist.github.com/JettJones/df731f1b7f370d79962dddaa1ee4594d
Expected Behavior
Expected terraform plan to succeed, and report a resource group (in this example) that would be created.
Actual Behavior
Terraform reports not finding CLI credentials. At the same time I can look directly into
~/.aws/accessTokens.json
to see tokens with valid expiration times.Steps to Reproduce
Please list the steps required to reproduce the issue, for example:
terraform init
az login
terraform plan
Important Factoids
Running on Windows 10.
full output: https://gist.github.com/JettJones/d49b20f42403ba7563695098141f951c
Two notable workarounds, either of these allow me to create azure resources (without re-running az login).
subscription_id
from the provider configuration.References
The text was updated successfully, but these errors were encountered: