-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
auth_settings_v2
on azurerm_linux_web_app
requires client secret
#20676
Comments
Thanks for this issue @eric-gonzalez-tfs - I've re-checked this and the Service always needs the |
That is true in case you right away create a provider. In the Azure Portal it is possible to set just the Client ID and set Client Secret to an empty value which will trigger the implicit flow. Which in my case causes an issue, because pipeline refuses empty string in the AAD block in Terraform. |
If you setup the authentication flow with Azure AD you can clear the value afterwards in the portal, so I do think this validation should be removed: Sample config:
I think these
|
Thanks guys for the discussion here and thanks @pregress for making the PR! Your PR looks good, I included your code and added more tests and documentations against the change, you can check the linked pr and feel free to let me know if you have anu questions. |
This is exactly what i need, when will this be reviewed/merged? |
Any chance this can be picked up? The PR is there just the documentation needs to be updated and this is blocking me since few months now /cc @jackofallops |
Hello @jackofallops, is this possible to achieve with Terraform? When adding the auth mechanism via the protal the secret is automatically configured and, I assume, rotated. Currently it's not configured if only client_id is provided.
|
My bad, it was a typo in |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Is there an existing issue for this?
Community Note
Terraform Version
1.3.9
AzureRM Provider Version
3.45.0
Affected Resource(s)/Data Source(s)
azurerm_linux_web_app
Terraform Configuration Files
Debug Output/Panic Output
Expected Behaviour
The provider should not require that a secret in the
auth_settings_v2.active_directory_v2
block.Actual Behaviour
A validation error occurred and I was unable to apply the changes.
Steps to Reproduce
Perform a
terraform apply
Other notes:
After I encountered this error, I manually upgraded my app service to
auth_settings_v2
in the Azure UI. I then removed theauth_settings_v2
block and performed aterraform plan
to compare the output to my terraform code.The auth settings output did not show a secret in the configuration. Here is the output (with some details redacted):
Important Factoids
No response
References
No response
The text was updated successfully, but these errors were encountered: