-
Notifications
You must be signed in to change notification settings - Fork 4.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New Data Source: azurerm_key_vault_certificate_data
#8184
New Data Source: azurerm_key_vault_certificate_data
#8184
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi @KSiig
Thanks for this PR. I'm afraid the changes here would represent a breaking change to this Data Source as the use of GetSecret
requires additional KeyVault access policy settings that are not guaranteed to be present for users of the data source. To support this functionality, this would need to be a new Data Source that can be used independently by users that need these additional property items.
Of course, didn't cross my mind. Would it make sense to create a data source called |
@KSiig Can you update the PR to resolve the merge conflicts? |
@KSiig At the risk of this sounding like a "me too", is there any further progress on this PR? I finally stumbled upon this PR and #8072 after hours of Googling. I've been wondering since yesterday why the |
Sorry everyone for the delay. I've had to deal with a lot of stuff these past many months. I will try and create the new |
No problem at all, things happen. Thanks! |
Really you should use |
azurerm_key_vault_certificate_data
Hi @KSiig - Apologies it's taken so long to get back to this, I hope you don't mind I pushed some changes rather than reviewing and requesting them after all this time. I'll get the tests run and we'll hopefully get this into today's release if everything passes. |
b7f45d8
to
c56d943
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM 👍
This has been released in version 2.47.0 of the provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. As an example: provider "azurerm" {
version = "~> 2.47.0"
}
# ... other configuration ... |
Hi @jackofallops, no I don't mind at all! I'm still relatively new to both Go and working on Terraform providers, so I half-expected there to be needed changes. I've looked through them and will try to remember them for another time 👍 |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 hashibot-feedback@hashicorp.com. Thanks! |
Currently it is only possible to get the raw certificate in hex format. This allows users to get the certificate in PEM format, and get the key. This gives the possibility of creating a Service Principal certificate with a Key Vault Certificate.
Fixes #8072