-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Auto PR: Regenerating based on (c5fafec787a50c2a4a9200291bc2409535b5f5bf) #22647
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Left a few comments inline but otherwise 👍
resource "azurerm_application_insights" "example" { | ||
name = "example" | ||
location = azurerm_resource_group.example.location | ||
resource_group_name = azurerm_resource_group.example.name | ||
application_type = "example-value" | ||
} | ||
data "azurerm_client_config" "test" {} | ||
resource "azurerm_key_vault" "example" { | ||
name = "example" | ||
location = azurerm_resource_group.example.location | ||
resource_group_name = azurerm_resource_group.example.name | ||
tenant_id = data.azurerm_client_config.example.tenant_id | ||
sku_name = "example-value" | ||
soft_delete_retention_days = "example-value" | ||
} | ||
resource "azurerm_key_vault_access_policy" "example" { | ||
key_vault_id = azurerm_key_vault.example.id | ||
tenant_id = data.azurerm_client_config.example.tenant_id | ||
object_id = data.azurerm_client_config.example.object_id | ||
key_permissions = "example-value" | ||
} | ||
resource "azurerm_kubernetes_cluster" "example" { | ||
name = "example" | ||
location = azurerm_resource_group.example.location | ||
resource_group_name = azurerm_resource_group.example.name | ||
dns_prefix = "acctestaksexample" | ||
default_node_pool { | ||
name = "example-value" | ||
node_count = "example-value" | ||
vm_size = "example-value" | ||
} | ||
identity { | ||
type = "example-value" | ||
} | ||
} | ||
resource "azurerm_machine_learning_workspace" "example" { | ||
name = "example" | ||
location = azurerm_resource_group.example.location | ||
resource_group_name = azurerm_resource_group.example.name | ||
key_vault_id = azurerm_key_vault.example.id | ||
storage_account_id = azurerm_storage_account.example.id | ||
application_insights_id = azurerm_application_insights.example.id | ||
identity { | ||
type = "example-value" | ||
} | ||
} | ||
resource "azurerm_resource_group" "example" { | ||
name = "example-resources" | ||
location = "West Europe" | ||
} | ||
resource "azurerm_storage_account" "example" { | ||
name = "example" | ||
location = azurerm_resource_group.example.location | ||
resource_group_name = azurerm_resource_group.example.name | ||
account_tier = "example-value" | ||
account_replication_type = "example-value" | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
minor, but why are the dependencies ordered alphabetically here?
|
||
The following arguments are supported: | ||
|
||
* `kubernetes_cluster_id` - (Required) Specifies the Kubernetes Cluster Id within which this Kubernetes Cluster Trusted Access Role Binding should exist. Changing this forces a new Kubernetes Cluster Trusted Access Role Binding to be created. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this should become:
* `kubernetes_cluster_id` - (Required) Specifies the Kubernetes Cluster Id within which this Kubernetes Cluster Trusted Access Role Binding should exist. Changing this forces a new Kubernetes Cluster Trusted Access Role Binding to be created. | |
* `kubernetes_cluster_id` - (Required) Specifies the ID of the Kubernetes Cluster within which this Trusted Access Role Binding should exist. Changing this forces a new Kubernetes Cluster Trusted Access Role Binding to be created. |
|
||
* `roles` - (Required) A list of roles to bind, each item is a resource type qualified role name. | ||
|
||
* `source_resource_id` - (Required) The ARM resource ID of source resource that trusted access is configured for. Changing this forces a new Kubernetes Cluster Trusted Access Role Binding to be created. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this should become:
* `source_resource_id` - (Required) The ARM resource ID of source resource that trusted access is configured for. Changing this forces a new Kubernetes Cluster Trusted Access Role Binding to be created. | |
* `source_resource_id` - (Required) The ID of the source resource that trusted access is configured for. Changing this forces a new Kubernetes Cluster Trusted Access Role Binding to be created. |
"kubernetes_cluster_id": { | ||
ForceNew: true, | ||
Required: true, | ||
Type: pluginsdk.TypeString, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
since we know what the Parent Resource ID is, can we add validation to check this is correct?
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active contributions. |
Regenerating the Terraform Provider based on the latest changes