-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
"tenant_id" or "object_id" is an invalid UUUID: uuid: UUID string too short: 1 #2103
Comments
I notice this is tagged "service/keyvault", however I can add that this does not seem to be limited to usage of the App Service identity by KeyVault. I get the same error with this code:
Results in:
(NOTE: I'm not sure I am going about setting up the SQL Database access from my App Service as described here https://docs.microsoft.com/en-us/azure/app-service/app-service-web-tutorial-connect-msi correctly with that bit of code, but this is certainly not an error I would have expected.) This seems to indicate a broader problem than anything specific to "service/keyvault". Original poster indicates that is intermittent, but it happens consistently for me. I haven't been able to generate a successful plan after over 10 attempts. |
Regarding my comment above, I am using Terraform 0.11.11 and AzureRM provider version 1.22.0. |
I have more to add with respect to my issue described above. Here's the config in question....
I have to successfully apply the first resource to Azure before I apply the second resource, otherwise I get the error indicated by this issue. I do this by commenting-out the second resource when I plan/apply the first time. Then I un-comment the second resource and plan/apply again and everything succeeds. This indicates that there is no way to create a new clean environment with just a single Terraform config template that achieves what I want. Clearly Please fix! My workaround is really not tenable and I'm loath to break this up into a series of Terraform config layers with a more complex staged deployment. P.S. I am trying to avoid putting the credentials in the connection string of the app service ( |
hey @willgarcia @bojingo Thanks for opening this issue - apologies for the delayed response here! Taking a look into this, I believe the underlying issue here is a graph bug in Terraform Core that existed prior to 0.12; as such I believe updating to Terraform 0.12 should fix this - would you be able to take a look and see if upgrading works for you? Since I believe that upgrading to Terraform 0.12 should fix this issue I'm going to close this issue for the moment however if you're still having issues please let us know and we'll take another look. Thanks! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 [email protected]. Thanks! |
Community Note
Terraform Version
TF: 0.11.7
AzureProvider: 1.15
Affected Resource(s)
Terraform Configuration Files
Expected Behavior
The tenant ID or object ID is retrieved from the App service resource.
Actual Behavior
This issue is not systematically reproduced.
When this issue happens, it seems to affect all Azure Key vault/Key vault access policies being applied and part of the same terraform plan.
Adding Terraform dependencies (
depends_on
) on theazurerm_app_service_slot
does not seem to help.This issue does not seem related to #1667 or #1288.
As mentioned previously, the current setup seems to work intermittently. I'll try to get TF logs when this occurs.
The text was updated successfully, but these errors were encountered: