-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
azurerm_disk_encryption_set
- unable to rotate azurerm_key_vault_key
#22893
Conversation
azurerm_disk_encryption_set
- Unable to rotate azurerm_key_vault_key
azurerm_disk_encryption_set
- unable to rotate azurerm_key_vault_key
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @WodansSon
I think we need a slightly different approach here, and need to maintain the Required
property on the key_vault_key_id
- I've left some comments below if you can take a look over?
Thanks!
website/docs/r/palo_alto_next_generation_firewall_virtual_network_panorama.html.markdown
Outdated
Show resolved
Hide resolved
website/docs/r/palo_alto_next_generation_firewall_virtual_network_local_rulestack.html.markdown
Outdated
Show resolved
Hide resolved
…r-azurerm into b_diskEncryption_rotation
…r-azurerm into b_diskEncryption_rotation
…r-azurerm into b_diskEncryption_rotation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the updates @WodansSon - One comment below to address, which I'll push a change for momentarily given the discussed urgency of this one. But otherwise LGTM 👍
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active contributions. |
Notice in the
Changes to Outputs
that thekey_vault_key_url
is reflecting that the key has in fact been rotated and is correctly modifying the output (e.g.,/3bdd259d0bf14bddafd4631daf4e1527
->/15851cd417af4e5eab096fa2ee51065d
), however due to persisting the versionless key ID in the resource and the state file itself it does not show up as a diff.Example of
Plan
output when the Key Vault Key has been Rotated(Fixes: #22864)