@@ -23,7 +23,7 @@ data "azuredevops_group" "group" {
23
23
24
24
resource "azuredevops_user_entitlement" "users" {
25
25
for_each = toset (var. aad_users )
26
- principal_name = " ${ each . value } "
26
+ principal_name = each. value
27
27
account_license_type = " stakeholder"
28
28
}
29
29
@@ -42,17 +42,16 @@ resource "azuredevops_build_definition" "build" {
42
42
43
43
repository {
44
44
repo_type = " TfsGit"
45
+ repo_id = azuredevops_git_repository. repository . id
45
46
repo_name = azuredevops_git_repository. repository . name
46
47
branch_name = azuredevops_git_repository. repository . default_branch
47
48
yml_path = " azure-pipelines.yml"
48
49
}
49
50
50
- # https://github.com/microsoft/terraform-provider-azuredevops/issues/171
51
- # variables_groups = [azuredevops_variable_group.vg.id]
51
+ variable_groups = [azuredevops_variable_group . vg . id ]
52
52
}
53
53
54
54
// This section configures an Azure DevOps Variable Group
55
- # https://github.com/microsoft/terraform-provider-azuredevops/issues/170
56
55
resource "azuredevops_variable_group" "vg" {
57
56
project_id = azuredevops_project. project . id
58
57
name = " Sample VG 1"
@@ -66,12 +65,12 @@ resource "azuredevops_variable_group" "vg" {
66
65
}
67
66
68
67
variable {
69
- name = " key2"
70
- value = " value2"
68
+ name = " key2"
69
+ value = " value2"
71
70
}
72
71
73
72
variable {
74
- name = " key3"
73
+ name = " key3"
75
74
}
76
75
}
77
76
@@ -86,54 +85,55 @@ resource "azuredevops_git_repository" "repository" {
86
85
87
86
// Configuration of AzureRm service end point
88
87
resource "azuredevops_serviceendpoint_azurerm" "endpoint1" {
89
- project_id = azuredevops_project. project . id
90
- service_endpoint_name = " TestServiceAzureRM"
91
- azurerm_spn_clientid = " ee7f75a0-8553-4e6a-xxxx-xxxxxxxx"
92
- azurerm_spn_clientsecret = " xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx"
88
+ project_id = azuredevops_project. project . id
89
+ service_endpoint_name = " TestServiceAzureRM"
90
+ credentials {
91
+ serviceprincipalid = " ee7f75a0-8553-4e6a-xxxx-xxxxxxxx"
92
+ serviceprincipalkey = " xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx"
93
+ }
93
94
azurerm_spn_tenantid = " 2e3a33f9-66b1-4xxx-xxxx-xxxxxxxxx"
94
95
azurerm_subscription_id = " 8a7aace5-xxxx-xxxx-xxxx-xxxxxxxxxx"
95
96
azurerm_subscription_name = " Microsoft Azure DEMO"
96
- azurerm_scope = " /subscriptions/1da42ac9-xxxx-xxxxx-xxxx-xxxxxxxxxxx"
97
97
}
98
98
99
99
resource "azuredevops_serviceendpoint_bitbucket" "bitbucket_account" {
100
- project_id = " vanilla-sky"
101
- username = " xxxx"
102
- password = " xxxx"
103
- service_endpoint_name = " test-bitbucket"
104
- description = " test"
100
+ project_id = " vanilla-sky"
101
+ username = " xxxx"
102
+ password = " xxxx"
103
+ service_endpoint_name = " test-bitbucket"
104
+ description = " test"
105
105
}
106
106
107
107
resource "azuredevops_resource_authorization" "bitbucket_account_authorization" {
108
- project_id = azuredevops_project. project . id
108
+ project_id = azuredevops_project. project . id
109
109
resource_id = azuredevops_serviceendpoint_bitbucket. bitbucket_account . id
110
- authorized = true
110
+ authorized = true
111
111
}
112
112
113
- resource "azuredevops_serviceendpoint_kubernetes" "serviceendpoint " {
114
- project_id = azuredevops_project. project . id
115
- service_endpoint_name = " Sample Kubernetes"
116
- apiserver_url = " https://sample-kubernetes-cluster.hcp.westeurope.azmk8s.io"
117
- authorization_type = " AzureSubscription"
113
+ resource "azuredevops_serviceendpoint_kubernetes" "kubeendpoint1 " {
114
+ project_id = azuredevops_project. project . id
115
+ service_endpoint_name = " Sample Kubernetes"
116
+ apiserver_url = " https://sample-kubernetes-cluster.hcp.westeurope.azmk8s.io"
117
+ authorization_type = " AzureSubscription"
118
118
119
119
azure_subscription {
120
- subscription_id = " 8a7aace5-xxxx-xxxx-xxxx-xxxxxxxxxx "
120
+ subscription_id = " 1c020621-d7a3-457d-b0cc-5d8e6e12d4e6 " # a fake GUID
121
121
subscription_name = " Microsoft Azure DEMO"
122
- tenant_id = " 2e3a33f9-66b1-4xxx-xxxx-xxxxxxxxx "
123
- resourcegroup_id = " sample-rg"
124
- namespace = " default"
125
- cluster_name = " sample-aks"
122
+ tenant_id = " e46643be-eb78-472f-9780-e01d8190ba10 " # a fake GUID
123
+ resourcegroup_id = " sample-rg"
124
+ namespace = " default"
125
+ cluster_name = " sample-aks"
126
126
}
127
127
}
128
128
129
- resource "azuredevops_serviceendpoint_kubernetes" "serviceendpoint " {
130
- project_id = azuredevops_project. project . id
131
- service_endpoint_name = " Sample Kubernetes"
132
- apiserver_url = " https://sample-aks.hcp.westeurope.azmk8s.io"
133
- authorization_type = " Kubeconfig"
129
+ resource "azuredevops_serviceendpoint_kubernetes" "kubeendpoint2 " {
130
+ project_id = azuredevops_project. project . id
131
+ service_endpoint_name = " Sample Kubernetes"
132
+ apiserver_url = " https://sample-aks.hcp.westeurope.azmk8s.io"
133
+ authorization_type = " Kubeconfig"
134
134
135
135
kubeconfig {
136
- kube_config = << EOT
136
+ kube_config = << EOT
137
137
apiVersion: v1
138
138
clusters:
139
139
- cluster:
@@ -156,67 +156,18 @@ resource "azuredevops_serviceendpoint_kubernetes" "serviceendpoint" {
156
156
client-key: fake-key-file
157
157
EOT
158
158
accept_untrusted_certs = true
159
- cluster_context = " dev-frontend"
159
+ cluster_context = " dev-frontend"
160
160
}
161
161
}
162
162
163
163
resource "azuredevops_serviceendpoint_kubernetes" "serviceendpoint" {
164
- project_id = azuredevops_project. project . id
165
- service_endpoint_name = " Sample Kubernetes"
166
- apiserver_url = " https://sample-kubernetes-cluster.hcp.westeurope.azmk8s.io"
167
- authorization_type = " ServiceAccount"
164
+ project_id = azuredevops_project. project . id
165
+ service_endpoint_name = " Sample Kubernetes"
166
+ apiserver_url = " https://sample-kubernetes-cluster.hcp.westeurope.azmk8s.io"
167
+ authorization_type = " ServiceAccount"
168
168
169
169
service_account {
170
- token = " bXktYXBw[...]K8bPxc2uQ=="
170
+ token = " bXktYXBw[...]K8bPxc2uQ=="
171
171
ca_cert = " Mzk1MjgkdmRnN0pi[...]mHHRUH14gw4Q=="
172
172
}
173
173
}
174
-
175
- #
176
- # https://github.com/microsoft/terraform-provider-azuredevops/issues/83
177
- # resource "azuredevops_policy_build" "p1" {
178
- # scope {
179
- # repository_id = azuredevops_git_repository.repository.id
180
- # repository_ref = azuredevops_git_repository.repository.default_branch
181
- # match_type = "Exact"
182
- # }
183
- # settings {
184
- # build_definition_id = azuredevops_build_definition.build.id
185
- # queue_on_source_update = true
186
- # }
187
- # }
188
- # resource "azuredevops_policy_min_reviewers" "p1" {
189
- # scope {
190
- # repository_id = azuredevops_git_repository.repository.id
191
- # repository_ref = azuredevops_git_repository.repository.default_branch
192
- # match_type = "Exact"
193
- # }
194
- # settings {
195
- # reviewer_count = 2
196
- # submitter_can_vote = false
197
- # }
198
- # }
199
-
200
-
201
- // This section configures service connections to Azure and ACR
202
- #
203
- # https://github.com/microsoft/terraform-provider-azuredevops/issues/3
204
- # resource "azuredevops_serviceendpoint_azurerm" "arm" {
205
- # project_id = azuredevops_project.project.id
206
- # service_endpoint_name = "Sample ARM Service Connection"
207
-
208
- # configuration = {
209
- # service_principal_username = "..."
210
- # service_principal_password = "..."
211
- # subscription_id = "..."
212
- # tenant_id = "..."
213
- # }
214
- # }
215
- # resource "azuredevops_serviceendpoint_acr" "acr" {
216
- # project_id = azuredevops_project.project.id
217
- # service_endpoint_name = "Sample ACR Service Connection"
218
-
219
- # configuration = {
220
- # ...
221
- # }
222
- # }
0 commit comments