Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

policy_assignment - allow scopes without subscription/<id> #6576

Merged
merged 1 commit into from Apr 23, 2020

Conversation

ArcturusZhang
Copy link
Contributor

Fixes #6523

Copy link
Collaborator

@katbyte katbyte left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks @ArcturusZhang! LGTM 👍

@katbyte katbyte added this to the v2.7.0 milestone Apr 23, 2020
@katbyte katbyte changed the title Update azurerm_policy_assignment - Fix #6523, fix parsing built-in policy definition ID azurerm_policy_assignment - allow scopes that don't start with subscription/<id> Apr 23, 2020
@katbyte katbyte changed the title azurerm_policy_assignment - allow scopes that don't start with subscription/<id> policy_assignment - allow scopes without subscription/<id> Apr 23, 2020
@katbyte katbyte merged commit d093408 into hashicorp:master Apr 23, 2020
katbyte added a commit that referenced this pull request Apr 23, 2020
@ghost
Copy link

ghost commented Apr 23, 2020

This has been released in version 2.7.0 of the provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. As an example:

provider "azurerm" {
    version = "~> 2.7.0"
}
# ... other configuration ...

@ArcturusZhang ArcturusZhang deleted the fix-6523 branch April 24, 2020 02:59
@ghost
Copy link

ghost commented May 24, 2020

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.

If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 hashibot-feedback@hashicorp.com. Thanks!

@hashicorp hashicorp locked and limited conversation to collaborators May 24, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

azurerm_policy_assignment policy_definition_id fails validation in 2.5, expects scope to be prepended
3 participants