Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Auto PR: Regenerating based on (c5fafec787a50c2a4a9200291bc2409535b5f5bf) #22647

Merged
merged 1 commit into from Jul 24, 2023

Conversation

hc-github-team-tf-azure
Copy link
Contributor

Regenerating the Terraform Provider based on the latest changes

Copy link
Member

@tombuildsstuff tombuildsstuff left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Left a few comments inline but otherwise 👍

Comment on lines +20 to +76
resource "azurerm_application_insights" "example" {
name = "example"
location = azurerm_resource_group.example.location
resource_group_name = azurerm_resource_group.example.name
application_type = "example-value"
}
data "azurerm_client_config" "test" {}
resource "azurerm_key_vault" "example" {
name = "example"
location = azurerm_resource_group.example.location
resource_group_name = azurerm_resource_group.example.name
tenant_id = data.azurerm_client_config.example.tenant_id
sku_name = "example-value"
soft_delete_retention_days = "example-value"
}
resource "azurerm_key_vault_access_policy" "example" {
key_vault_id = azurerm_key_vault.example.id
tenant_id = data.azurerm_client_config.example.tenant_id
object_id = data.azurerm_client_config.example.object_id
key_permissions = "example-value"
}
resource "azurerm_kubernetes_cluster" "example" {
name = "example"
location = azurerm_resource_group.example.location
resource_group_name = azurerm_resource_group.example.name
dns_prefix = "acctestaksexample"
default_node_pool {
name = "example-value"
node_count = "example-value"
vm_size = "example-value"
}
identity {
type = "example-value"
}
}
resource "azurerm_machine_learning_workspace" "example" {
name = "example"
location = azurerm_resource_group.example.location
resource_group_name = azurerm_resource_group.example.name
key_vault_id = azurerm_key_vault.example.id
storage_account_id = azurerm_storage_account.example.id
application_insights_id = azurerm_application_insights.example.id
identity {
type = "example-value"
}
}
resource "azurerm_resource_group" "example" {
name = "example-resources"
location = "West Europe"
}
resource "azurerm_storage_account" "example" {
name = "example"
location = azurerm_resource_group.example.location
resource_group_name = azurerm_resource_group.example.name
account_tier = "example-value"
account_replication_type = "example-value"
}
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

minor, but why are the dependencies ordered alphabetically here?


The following arguments are supported:

* `kubernetes_cluster_id` - (Required) Specifies the Kubernetes Cluster Id within which this Kubernetes Cluster Trusted Access Role Binding should exist. Changing this forces a new Kubernetes Cluster Trusted Access Role Binding to be created.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this should become:

Suggested change
* `kubernetes_cluster_id` - (Required) Specifies the Kubernetes Cluster Id within which this Kubernetes Cluster Trusted Access Role Binding should exist. Changing this forces a new Kubernetes Cluster Trusted Access Role Binding to be created.
* `kubernetes_cluster_id` - (Required) Specifies the ID of the Kubernetes Cluster within which this Trusted Access Role Binding should exist. Changing this forces a new Kubernetes Cluster Trusted Access Role Binding to be created.


* `roles` - (Required) A list of roles to bind, each item is a resource type qualified role name.

* `source_resource_id` - (Required) The ARM resource ID of source resource that trusted access is configured for. Changing this forces a new Kubernetes Cluster Trusted Access Role Binding to be created.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this should become:

Suggested change
* `source_resource_id` - (Required) The ARM resource ID of source resource that trusted access is configured for. Changing this forces a new Kubernetes Cluster Trusted Access Role Binding to be created.
* `source_resource_id` - (Required) The ID of the source resource that trusted access is configured for. Changing this forces a new Kubernetes Cluster Trusted Access Role Binding to be created.

"kubernetes_cluster_id": {
ForceNew: true,
Required: true,
Type: pluginsdk.TypeString,
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

since we know what the Parent Resource ID is, can we add validation to check this is correct?

@tombuildsstuff
Copy link
Member

Tests pass:

Screenshot 2023-07-24 at 13 31 37

@tombuildsstuff tombuildsstuff added this to the v3.67.0 milestone Jul 24, 2023
@tombuildsstuff tombuildsstuff merged commit efe5416 into main Jul 24, 2023
23 checks passed
@tombuildsstuff tombuildsstuff deleted the auto-pr/f6ff5473e branch July 24, 2023 11:36
tombuildsstuff added a commit that referenced this pull request Jul 24, 2023
@stephybun stephybun mentioned this pull request Jul 25, 2023
1 task
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants