-
Notifications
You must be signed in to change notification settings - Fork 4.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New Resource: azurerm_app_service_certificate
#4192
New Resource: azurerm_app_service_certificate
#4192
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
hey @joakimhellum-in
Thanks for this PR - taking a look through I've left a few extra comments in addition to the name
-> id
change - but this is otherwise looking pretty good 👍
Thanks!
} | ||
|
||
if v, ok := d.GetOk("key_vault_secret_name"); ok { | ||
certificate.CertificateProperties.KeyVaultSecretName = utils.String(v.(string)) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
thinking about this - would it be worth inferring the Key Vault ID from the Key Vault Secret ID so users didn't need to specify both fields?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This would be very nice. However the Key Vault Secret ID is in format {vaultBaseUrl}/certificates/{certificateName}/{certificateVersion}
so on top of the head not completely sure how to best manage this. Will investigate this during weekend.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
good point - FWIW we look this up for the Key Vault child resources (e.g. certificates, keys, secrets) - so it should be possible to reuse the same technique (which calls into this method) :)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks 🤯 Have made an attempt to reuse this.
azurerm_app_service_certificate
azurerm_app_service_certificate
@tombuildsstuff Many thanks for all your help on this. It should be ready for proper review now. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the revisions @joakimhellum-in, Looks great aside from a few comments i've left inline. Looks like your setting a property that doesn't exist in the schema.
@katbyte Thanks for this 😸 Will remember to run
|
No worries! I have a tool in progress that can auto format the blocks fairly well here: https://github.com/katbyte/terrafmt |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the changes @joakimhellum-in! LGTM now 🙂
This has been released in version 1.34.0 of the provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. As an example: provider "azurerm" {
version = "~> 1.34.0"
}
# ... other configuration ... |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 hashibot-feedback@hashicorp.com. Thanks! |
Reference to #1136
TODO:
key_vault_secret_name
tokey_vault_secret_id