-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Azurerm_data_factory_linked_service_azure_blob_storage account name stored asterisks #19862
Comments
Hi @levgoronshteyn , Thank you for taking time to open this issue. Is it duplicated with #14358? |
Hi @ms-henglu, It is the same issue as #14358 but since 14358 was never solved i have opened a new issue. If using Terraform or even AZ CLI you cannot see the storage account name. |
Hi @levgoronshteyn , Thanks for the clarification. I have a workaround for this, https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/data_factory_linked_custom_service is a generic data factory linked service resource, you can use it to pass any payload, I think it might solve the problem. |
thank you for getting back to me @ms-henglu, i will test the workaround but at the same time please check the code and see if it can be fixed without using this workaround? As stated also that this can be reproduced via AZ CLI and not just on Terraform. Even if we use AZ API Provider it is asking to send the connection string as SecureString:
If you then see the SecretBase object, it will refer you to the SecureString section. also for clarity, as an example, the connection string is below: If you do this from Azure Portal UI, Azure will break up the string into two properties:
If you do the same via Terraform or AZ CLI, the connection string is not broken out after it is received by the portal. |
@ms-henglu I have tested the work around provided and it worked as well. I sent the outcome and details to the client until the reported issue is resolved. I also see that there has bee a PR created and tested to verify that the resource can be used as designed without encrypting non-sensitive data. Do you know when the fix will be in and i can let the client know that they can test? |
@ms-henglu this is an Azure Portal issue which needs to be fixed there, since Terraform is matching the behaviour of the Azure CLI etc? |
I opened an issue on the rest API specs as this appears to be something that needs to be corrected in the portal as both providers + the CLI are sending the connection string in the same way. |
@ms-henglu any update on this? |
@ms-henglu the client also tested your recommended workaround but they cannot use it as the resource is not an approved one to be used in their org. |
This functionality has been released in v3.44.0 of the Terraform Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Is there an existing issue for this?
Community Note
Terraform Version
1.0
AzureRM Provider Version
3.0
Affected Resource(s)/Data Source(s)
azurerm_data_factory_linked_service_azure_blob_storage
Terraform Configuration Files
Debug Output/Panic Output
Expected Behaviour
When a user uses Azure Portal to add a linked service for blob storage, the portal breaks up the connection string into two properties below:
Actual Behaviour
When using AzureRM provider, the connection string is stored as secure string and the storage account name is hidden with asterisks.
Steps to Reproduce
Use the Terraform Configuration File provided
change the resource group and storage account
apply the terraform file.
Important Factoids
No response
References
The AZ CLI tool has the same behaviour as terraform:
The text was updated successfully, but these errors were encountered: