Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[pull] main from hashicorp:main #167

Closed
wants to merge 36 commits into from
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
36 commits
Select commit Hold shift + click to select a range
bb78dcf
tooling - add `update-go-azure-helpers` for automatically bumping the…
stephybun Feb 26, 2024
db8f1a2
[COMPLIANCE] Add Copyright and License Headers (#25019)
hashicorp-copywrite[bot] Feb 26, 2024
39c8118
Bump github.com/cloudflare/circl from 1.3.3 to 1.3.7 in /internal/too…
dependabot[bot] Feb 26, 2024
5db1ef3
`azurerm_data_protection_backup_instance_postgresql` `azurerm_data_pr…
teowa Feb 26, 2024
6bc7eb0
#24087 : Return error when use_system_assigned_identity and user_assi…
harshavmb Feb 26, 2024
658d338
Update CHANGELOG.md #24091
katbyte Feb 26, 2024
efb8caf
azurerm_nginx_deployment - support for the automatic_upgrade_channel …
puneetsarna Feb 26, 2024
932e0cb
Update CHANGELOG.md #24867
katbyte Feb 26, 2024
8e38b19
`azurerm_redis_cache`: Allow AAD auth for all SKUs (#25006)
favoretti Feb 26, 2024
cf94e97
Update CHANGELOG.md #25006
katbyte Feb 26, 2024
961ab72
`azurerm_spring_cloud_configuration_service` - support for the `refre…
ms-henglu Feb 26, 2024
de7dd04
Update CHANGELOG.md #25009
katbyte Feb 26, 2024
6fcb941
`azurerm_role_definition`: upgrade `go-azure-sdk` from `2018-01-01-pr…
ziyeqf Feb 26, 2024
9fc6681
Update CHANGELOG.md #25008
katbyte Feb 26, 2024
a8f5ddd
`azurerm_recovery_vaults`: fix creation with `SystemAssigned, UserAss…
ziyeqf Feb 26, 2024
8884fe5
Update CHANGELOG.md #24978
katbyte Feb 26, 2024
1ba187c
Add smb_access_based_enumeration and smb_non_browsable (#24514)
Orexii Feb 26, 2024
d21b8e1
Update CHANGELOG.md #24514
katbyte Feb 26, 2024
4474ddd
azurerm_federated_identity_credential - Allow modifying federated cre…
strakh-alex Feb 26, 2024
cba3d10
Update CHANGELOG.md #25003
katbyte Feb 26, 2024
42ccf70
`azurerm_iothub`: update diff suppress for `endpoint.connection_strin…
ziyeqf Feb 26, 2024
2da5d98
azurerm_mssql_database - support for the recovery_point_id & restore_…
katbyte Feb 27, 2024
ac57f14
Update CHANGELOG.md #24904
katbyte Feb 27, 2024
3f85dee
support migration of outbound types (#25021)
stephybun Feb 27, 2024
e735424
remove reference to non existing field in description for key managem…
stephybun Feb 27, 2024
4c2d9a0
`azurerm_linux_virtual_machine`,`azurerm_windows_virtual_machine` - S…
ms-zhenhua Feb 27, 2024
054653c
Update CHANGELOG.md #23394
katbyte Feb 27, 2024
afd1879
new resource: `azurerm_kubernetes_fleet_update_run` (#24813)
ms-henglu Feb 27, 2024
50a7dbb
Update CHANGELOG.md #24813
katbyte Feb 27, 2024
7bbb57f
`azurerm_chaos_studio_experiment` - set the `type` of `targetReferenc…
neil-yechenwei Feb 27, 2024
f5475fe
azurerm_netapp_pool - support for the encryption_type property (#24993)
Orexii Feb 27, 2024
63c2ef9
Update CHANGELOG.md #24993
katbyte Feb 27, 2024
fab4152
`azurerm_virtual_network_gateway`: remove `Static` value in documenta…
wuxu92 Feb 27, 2024
5978572
Fix minor typo
flcdrg Feb 27, 2024
7bfdad7
Merge pull request #25036 from flcdrg/fix-typo
tombuildsstuff Feb 27, 2024
a74f335
Merge pull request #25034 from hashicorp/docs/aks-kms-fix
tombuildsstuff Feb 27, 2024
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions .teamcity/components/settings.kt
Original file line number Diff line number Diff line change
Expand Up @@ -51,6 +51,9 @@ var serviceTestConfigurationOverrides = mapOf(
// CDN is only available in certain locations
"cdn" to testConfiguration(locationOverride = LocationConfiguration("centralus", "eastus2", "westeurope", true)),

// Chaosstudio is only available in certain locations
"chaosstudio" to testConfiguration(locationOverride = LocationConfiguration("westeurope", "eastus", "westus", false)),

// "cognitive" is expensive - Monday, Wednesday, Friday
// cognitive is only available in certain locations
"cognitive" to testConfiguration(daysOfWeek = "2,4,6", locationOverride = LocationConfiguration("westeurope", "eastus", "southcentralus", true)),
Expand Down
22 changes: 21 additions & 1 deletion CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,18 +1,38 @@
## 3.94.0 (Unreleased)

FEATURES:

* **New Resource**: `azurerm_kubernetes_fleet_update_run` [GH-24813]

ENHANCEMENTS:

* dependencies `springcloud`: updating to API Version `2024-01-01-preview` [GH-24937]
* dependencies: updating to `v0.20240222.1164640` of `github.com/hashicorp/go-azure-sdk` [GH-25002]
* `servicefabric`: updating to use the transport layer from `hashicorp/go-azure-sdk` rather than `Azure/go-autorest` [GH-25002]
* Data Source: `azurerm_storage_table_entities` - support for `select` [GH-24987]
* Data Source: `azurerm_netapp_volume` - support for the `smb_access_based_enumeration` and `smb_non_browsable` properties [GH-24514]
* `azurerm_federated_identity_credential` - the federated credentials can now be changed without creating a new resource [GH-25003]
* `azurerm_mssql_database` - support for the `recovery_point_id` and `restore_long_term_retention_backup_id` properties [GH-24904]
* `azurerm_linux_virtual_machine` - support for the `automatic_upgrade_enabled`, `disk_controller_type`, `os_image_notification`, `treat_failure_as_deployment_failure_enabled`, and `vm_agent_platform_updates_enabled`properties [GH-23394]
* `azurerm_nginx_deployment` - support for the `automatic_upgrade_channel` property [GH-24867]
* `azurerm_netapp_volume` - support for the `smb_access_based_enumeration` and `smb_non_browsable` properties [GH-24514]
* `azurerm_netapp_pool` - support for the `encryption_type` property [GH-24993]
* `azurerm_role_definition` - upgrade to the API version `2022-05-01-preview` [GH-25008]
* `azurerm_redis_cache` - allow AAD auth for all SKUs [GH-25006]
* `azurerm_spring_cloud_gateway` - support for the `application_performance_monitoring_ids` property [GH-24919]
* `azurerm_spring_cloud_configuration_service` - support for the `refresh_interval_in_seconds` property [GH-25009]
* `azurerm_windows_virtual_machine` - support for the `automatic_upgrade_enabled`, `disk_controller_type`, `os_image_notification`, `treat_failure_as_deployment_failure_enabled`, and `vm_agent_platform_updates_enabled`properties [GH-23394]

BUG FIXES:
* azurerm_batch_pool - fix setting the `extension.settings_json` property [GH-24976]

* `azurerm_batch_pool` - fix setting the `extension.settings_json` property [GH-24976]
* `azurerm_recovery_services_vault` - validate that `use_system_assigned_identity` and `user_assigned_identity_id` cannot be set at the same time [GH-24091]
* `azurerm_recovery_vaults` will now create properly with `SystemAssigned,UserAssigned` identity [GH-24978]

## 3.93.0 (February 22, 2024)

FEATURES:

* **New Data Source**: `azurerm_express_route_circuit_peering` ([#24971](https://github.com/hashicorp/terraform-provider-azurerm/issues/24971))
* **New Data Source**: `azurerm_storage_table_entities` ([#24973](https://github.com/hashicorp/terraform-provider-azurerm/issues/24973))
* **New Resource**: `azurerm_dev_center_catalog` ([#24833](https://github.com/hashicorp/terraform-provider-azurerm/issues/24833))
Expand Down
125 changes: 0 additions & 125 deletions internal/services/authorization/azuresdkhacks/definitions.go

This file was deleted.

11 changes: 1 addition & 10 deletions internal/services/authorization/client/client.go
Original file line number Diff line number Diff line change
Expand Up @@ -9,19 +9,17 @@ import (
"github.com/Azure/azure-sdk-for-go/services/preview/authorization/mgmt/2020-04-01-preview/authorization" // nolint: staticcheck // nolint: staticcheck

// To swap sdk for `azurerm_role_definition` without changing API version
oldRoleDefinitions "github.com/hashicorp/go-azure-sdk/resource-manager/authorization/2018-01-01-preview/roledefinitions"
"github.com/hashicorp/go-azure-sdk/resource-manager/authorization/2020-10-01/roleassignmentscheduleinstances"
"github.com/hashicorp/go-azure-sdk/resource-manager/authorization/2020-10-01/roleassignmentschedulerequests"
"github.com/hashicorp/go-azure-sdk/resource-manager/authorization/2020-10-01/roleeligibilityscheduleinstances"
"github.com/hashicorp/go-azure-sdk/resource-manager/authorization/2020-10-01/roleeligibilityschedulerequests"
"github.com/hashicorp/go-azure-sdk/resource-manager/authorization/2022-04-01/roleassignments"
"github.com/hashicorp/go-azure-sdk/resource-manager/authorization/2022-04-01/roledefinitions"
"github.com/hashicorp/go-azure-sdk/resource-manager/authorization/2022-05-01-preview/roledefinitions"
"github.com/hashicorp/terraform-provider-azurerm/internal/common"
)

type Client struct {
RoleAssignmentsClient *authorization.RoleAssignmentsClient
RoleDefinitionsClient *oldRoleDefinitions.RoleDefinitionsClient
RoleAssignmentScheduleRequestClient *roleassignmentschedulerequests.RoleAssignmentScheduleRequestsClient
RoleAssignmentScheduleInstancesClient *roleassignmentscheduleinstances.RoleAssignmentScheduleInstancesClient
RoleEligibilityScheduleRequestClient *roleeligibilityschedulerequests.RoleEligibilityScheduleRequestsClient
Expand All @@ -34,12 +32,6 @@ func NewClient(o *common.ClientOptions) (*Client, error) {
roleAssignmentsClient := authorization.NewRoleAssignmentsClientWithBaseURI(o.ResourceManagerEndpoint, o.SubscriptionId)
o.ConfigureClient(&roleAssignmentsClient.Client, o.ResourceManagerAuthorizer)

roleDefinitionsClient, err := oldRoleDefinitions.NewRoleDefinitionsClientWithBaseURI(o.Environment.ResourceManager)
if err != nil {
return nil, fmt.Errorf("creating roleDefinitionsClient: %+v", err)
}
o.Configure(roleDefinitionsClient.Client, o.Authorizers.ResourceManager)

roleAssignmentScheduleRequestsClient, err := roleassignmentschedulerequests.NewRoleAssignmentScheduleRequestsClientWithBaseURI(o.Environment.ResourceManager)
if err != nil {
return nil, fmt.Errorf("creating roleAssignmentScheduleRequestsClient: %+v", err)
Expand Down Expand Up @@ -79,7 +71,6 @@ func NewClient(o *common.ClientOptions) (*Client, error) {

return &Client{
RoleAssignmentsClient: &roleAssignmentsClient,
RoleDefinitionsClient: roleDefinitionsClient,
RoleAssignmentScheduleRequestClient: roleAssignmentScheduleRequestsClient,
RoleAssignmentScheduleInstancesClient: roleAssignmentScheduleInstancesClient,
RoleEligibilityScheduleRequestClient: roleEligibilityScheduleRequestClient,
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ import (
"github.com/hashicorp/go-azure-helpers/lang/response"
"github.com/hashicorp/go-azure-helpers/resourcemanager/commonids"
"github.com/hashicorp/go-azure-sdk/resource-manager/authorization/2022-04-01/roleassignments"
"github.com/hashicorp/go-azure-sdk/resource-manager/authorization/2022-04-01/roledefinitions"
"github.com/hashicorp/go-azure-sdk/resource-manager/authorization/2022-05-01-preview/roledefinitions"
"github.com/hashicorp/terraform-provider-azurerm/internal/acceptance"
"github.com/hashicorp/terraform-provider-azurerm/internal/acceptance/check"
"github.com/hashicorp/terraform-provider-azurerm/internal/acceptance/testclient"
Expand Down
6 changes: 3 additions & 3 deletions internal/services/authorization/role_assignment_resource.go
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ import (
"github.com/Azure/azure-sdk-for-go/services/preview/authorization/mgmt/2020-04-01-preview/authorization" // nolint: staticcheck
"github.com/hashicorp/go-azure-helpers/lang/pointer"
"github.com/hashicorp/go-azure-helpers/resourcemanager/commonids"
"github.com/hashicorp/go-azure-sdk/resource-manager/authorization/2018-01-01-preview/roledefinitions"
"github.com/hashicorp/go-azure-sdk/resource-manager/authorization/2022-05-01-preview/roledefinitions"
"github.com/hashicorp/go-azure-sdk/resource-manager/resources/2022-12-01/subscriptions"
"github.com/hashicorp/go-uuid"
"github.com/hashicorp/terraform-provider-azurerm/helpers/azure"
Expand Down Expand Up @@ -156,7 +156,7 @@ func resourceArmRoleAssignment() *pluginsdk.Resource {

func resourceArmRoleAssignmentCreate(d *pluginsdk.ResourceData, meta interface{}) error {
roleAssignmentsClient := meta.(*clients.Client).Authorization.RoleAssignmentsClient
roleDefinitionsClient := meta.(*clients.Client).Authorization.RoleDefinitionsClient
roleDefinitionsClient := meta.(*clients.Client).Authorization.ScopedRoleDefinitionsClient
subscriptionClient := meta.(*clients.Client).Subscription.SubscriptionsClient
subscriptionId := meta.(*clients.Client).Account.SubscriptionId
ctx, cancel := timeouts.ForCreate(meta.(*clients.Client).StopContext, d)
Expand Down Expand Up @@ -271,7 +271,7 @@ func resourceArmRoleAssignmentCreate(d *pluginsdk.ResourceData, meta interface{}

func resourceArmRoleAssignmentRead(d *pluginsdk.ResourceData, meta interface{}) error {
client := meta.(*clients.Client).Authorization.RoleAssignmentsClient
roleDefinitionsClient := meta.(*clients.Client).Authorization.RoleDefinitionsClient
roleDefinitionsClient := meta.(*clients.Client).Authorization.ScopedRoleDefinitionsClient
ctx, cancel := timeouts.ForRead(meta.(*clients.Client).StopContext, d)
defer cancel()

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ import (
"github.com/hashicorp/go-azure-helpers/lang/response"
"github.com/hashicorp/go-azure-helpers/resourcemanager/commonids"
"github.com/hashicorp/go-azure-sdk/resource-manager/authorization/2022-04-01/roleassignments"
"github.com/hashicorp/go-azure-sdk/resource-manager/authorization/2022-04-01/roledefinitions"
"github.com/hashicorp/go-azure-sdk/resource-manager/authorization/2022-05-01-preview/roledefinitions"
"github.com/hashicorp/go-uuid"
"github.com/hashicorp/terraform-provider-azurerm/helpers/azure"
"github.com/hashicorp/terraform-provider-azurerm/helpers/tf"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -328,7 +328,7 @@ data "azurerm_client_config" "test" {
}

resource "azurerm_resource_group" "test" {
name = "acctestRG-role-assigment-%d"
name = "acctestRG-role-assignment-%d"
location = "%s"
}

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ import (

"github.com/hashicorp/go-azure-helpers/lang/pointer"
"github.com/hashicorp/go-azure-helpers/resourcemanager/commonids"
"github.com/hashicorp/go-azure-sdk/resource-manager/authorization/2018-01-01-preview/roledefinitions"
"github.com/hashicorp/go-azure-sdk/resource-manager/authorization/2022-05-01-preview/roledefinitions"
"github.com/hashicorp/terraform-provider-azurerm/internal/sdk"
"github.com/hashicorp/terraform-provider-azurerm/internal/tf/pluginsdk"
"github.com/hashicorp/terraform-provider-azurerm/internal/tf/validation"
Expand Down Expand Up @@ -145,7 +145,7 @@ func (a RoleDefinitionDataSource) Read() sdk.ResourceFunc {
return sdk.ResourceFunc{
Timeout: 5 * time.Minute,
Func: func(ctx context.Context, metadata sdk.ResourceMetaData) error {
client := metadata.Client.Authorization.RoleDefinitionsClient
client := metadata.Client.Authorization.ScopedRoleDefinitionsClient

var config RoleDefinitionDataSourceModel
if err := metadata.Decode(&config); err != nil {
Expand Down Expand Up @@ -218,7 +218,7 @@ func (a RoleDefinitionDataSource) Read() sdk.ResourceFunc {
}

// The sdk managed id start with two "/" when scope is tenant level (empty).
// So we use the id from response without parsing and reformating it.
// So we use the id from response without parsing and reformatting it.
// Tracked on https://github.com/hashicorp/pandora/issues/3257
metadata.ResourceData.SetId(*role.Id)
return metadata.Encode(&state)
Expand Down
20 changes: 9 additions & 11 deletions internal/services/authorization/role_definition_resource.go
Original file line number Diff line number Diff line change
Expand Up @@ -12,10 +12,9 @@ import (
"github.com/hashicorp/go-azure-helpers/lang/pointer"
"github.com/hashicorp/go-azure-helpers/lang/response"
"github.com/hashicorp/go-azure-helpers/resourcemanager/commonids"
"github.com/hashicorp/go-azure-sdk/resource-manager/authorization/2018-01-01-preview/roledefinitions"
"github.com/hashicorp/go-azure-sdk/resource-manager/authorization/2022-05-01-preview/roledefinitions"
"github.com/hashicorp/go-uuid"
"github.com/hashicorp/terraform-provider-azurerm/internal/sdk"
"github.com/hashicorp/terraform-provider-azurerm/internal/services/authorization/azuresdkhacks"
"github.com/hashicorp/terraform-provider-azurerm/internal/services/authorization/migration"
"github.com/hashicorp/terraform-provider-azurerm/internal/services/authorization/parse"
"github.com/hashicorp/terraform-provider-azurerm/internal/tf/pluginsdk"
Expand Down Expand Up @@ -164,7 +163,7 @@ func (r RoleDefinitionResource) Create() sdk.ResourceFunc {
return sdk.ResourceFunc{
Timeout: 30 * time.Minute,
Func: func(ctx context.Context, metadata sdk.ResourceMetaData) error {
client := metadata.Client.Authorization.RoleDefinitionsClient
client := metadata.Client.Authorization.ScopedRoleDefinitionsClient

var config RoleDefinitionModel
if err := metadata.Decode(&config); err != nil {
Expand Down Expand Up @@ -232,7 +231,7 @@ func (r RoleDefinitionResource) Read() sdk.ResourceFunc {
return sdk.ResourceFunc{
Timeout: 5 * time.Minute,
Func: func(ctx context.Context, metadata sdk.ResourceMetaData) error {
client := metadata.Client.Authorization.RoleDefinitionsClient
client := metadata.Client.Authorization.ScopedRoleDefinitionsClient

stateId, err := parse.RoleDefinitionId(metadata.ResourceData.Id())
if err != nil {
Expand Down Expand Up @@ -276,8 +275,7 @@ func (r RoleDefinitionResource) Update() sdk.ResourceFunc {
return sdk.ResourceFunc{
Timeout: 60 * time.Minute,
Func: func(ctx context.Context, metadata sdk.ResourceMetaData) error {
sdkClient := metadata.Client.Authorization.RoleDefinitionsClient
client := azuresdkhacks.NewRoleDefinitionsWorkaroundClient(sdkClient.Client)
client := metadata.Client.Authorization.ScopedRoleDefinitionsClient

stateId, err := parse.RoleDefinitionId(metadata.ResourceData.Id())
if err != nil {
Expand All @@ -291,16 +289,16 @@ func (r RoleDefinitionResource) Update() sdk.ResourceFunc {
return err
}

exisiting, err := client.Get(ctx, id)
existing, err := client.Get(ctx, id)
if err != nil {
return fmt.Errorf("retrieving %s: %+v", stateId, err)
}

if exisiting.Model == nil {
if existing.Model == nil {
return fmt.Errorf("retrieving %s: model was nil", stateId)
}

model := *exisiting.Model
model := *existing.Model

if model.Properties == nil {
return fmt.Errorf("retrieving %s: properties was nil", stateId)
Expand Down Expand Up @@ -378,7 +376,7 @@ func (r RoleDefinitionResource) Delete() sdk.ResourceFunc {
return sdk.ResourceFunc{
Timeout: 30 * time.Minute,
Func: func(ctx context.Context, metadata sdk.ResourceMetaData) error {
client := metadata.Client.Authorization.RoleDefinitionsClient
client := metadata.Client.Authorization.ScopedRoleDefinitionsClient

stateId, err := parse.RoleDefinitionId(metadata.ResourceData.Id())
if err != nil {
Expand Down Expand Up @@ -432,7 +430,7 @@ func (RoleDefinitionResource) StateUpgraders() sdk.StateUpgradeData {
}
}

func roleDefinitionEventualConsistencyUpdate(ctx context.Context, client azuresdkhacks.RoleDefinitionsWorkaroundClient, id roledefinitions.ScopedRoleDefinitionId, updateRequestDate string) pluginsdk.StateRefreshFunc {
func roleDefinitionEventualConsistencyUpdate(ctx context.Context, client *roledefinitions.RoleDefinitionsClient, id roledefinitions.ScopedRoleDefinitionId, updateRequestDate string) pluginsdk.StateRefreshFunc {
return func() (interface{}, string, error) {
resp, err := client.Get(ctx, id)
if err != nil {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ import (
"github.com/google/uuid"
"github.com/hashicorp/go-azure-helpers/lang/pointer"
"github.com/hashicorp/go-azure-helpers/lang/response"
"github.com/hashicorp/go-azure-sdk/resource-manager/authorization/2018-01-01-preview/roledefinitions"
"github.com/hashicorp/go-azure-sdk/resource-manager/authorization/2022-05-01-preview/roledefinitions"
"github.com/hashicorp/terraform-provider-azurerm/internal/acceptance"
"github.com/hashicorp/terraform-provider-azurerm/internal/acceptance/check"
"github.com/hashicorp/terraform-provider-azurerm/internal/clients"
Expand Down Expand Up @@ -196,7 +196,7 @@ func (RoleDefinitionResource) Exists(ctx context.Context, client *clients.Client
roleId := state.Attributes["role_definition_id"]

id := roledefinitions.NewScopedRoleDefinitionID(scope, roleId)
resp, err := client.Authorization.RoleDefinitionsClient.Get(ctx, id)
resp, err := client.Authorization.ScopedRoleDefinitionsClient.Get(ctx, id)
if err != nil {
if response.WasNotFound(resp.HttpResponse) {
return pointer.To(false), nil
Expand Down
Loading
Loading