-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New Resource: azurerm_azuread_application
#1269
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
hey @Stavrus
Thanks for this PR & splitting it out from the other PR :)
I've taken a look through and left some comments in-line - my main question at this point is would it be prudent to split the AD Application up into multiple sub-resources? e.g. azurerm_azuread_application
/ azurerm_azuread_application_password
/ azurerm_azuread_application_certificate
since I could see these being added independent of an application. For example, a user may by assigned an Application by a central team, and have permissions to add Passwords/Certificates to it, but doesn't have permissions to create a new one.
I've also got a separate question around the naming of this resource - given the product name is Azure AD perhaps these resources should contain that phrase? All that said, this is off to a good start :)
Thanks!
"github.com/hashicorp/terraform/helper/resource" | ||
) | ||
|
||
func TestAccAzureRMAdApplication_importSimple(t *testing.T) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
can we update the test prefixes to be TestAccAzureRMActiveDirectoryApplication_
to make them consistent with the other resources?
azurerm/key_credentials.go
Outdated
l["type"] = *cred.Type | ||
l["usage"] = *cred.Usage | ||
l["start_date"] = string((*cred.StartDate).Format(time.RFC3339)) | ||
l["end_date"] = string((*cred.EndDate).Format(time.RFC3339)) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
can we nil-check each of these, else there's a potential crash here?
azurerm/key_credentials.go
Outdated
return hashcode.String(buf.String()) | ||
} | ||
|
||
func flattenAzureRmKeyCredential(cred *graphrbac.KeyCredential) interface{} { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
looks like we can remove the pointer from this and avoid making a nil-check for the cred
object?
azurerm/key_credentials.go
Outdated
} | ||
|
||
func flattenAzureRmKeyCredentials(creds *[]graphrbac.KeyCredential) []interface{} { | ||
result := make([]interface{}, 0, len(*creds)) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
there's a potential crash here if creds
is nil (which can happen in the case of a bad API response) - as such can we make this:
result := make([]interface{}, 0)
azurerm/key_credentials.go
Outdated
func flattenAzureRmKeyCredentials(creds *[]graphrbac.KeyCredential) []interface{} { | ||
result := make([]interface{}, 0, len(*creds)) | ||
for _, cred := range *creds { | ||
result = append(result, flattenAzureRmKeyCredential(&cred)) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
minor since it's minor can we in-line this function?
|
||
"password_credential": passwordCredentialsSchema(), | ||
|
||
"app_id": { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
can we make this application_id
to be consistent with other fields in the Provider? also - is this ID different to the one used for the id
field?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, the app_id
is different from id
. It's object_id
that's redundant so I'll be removing that.
"available_to_other_tenants": { | ||
Type: schema.TypeBool, | ||
Optional: true, | ||
Computed: true, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
IMO we should make this a Required field?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sure, not a problem. To give some context when picking what to set as default I followed the Azure CLI's az ad app create which only has the display name as a required parameter.
I think there's also some extra AD permissions required in setting it to true (default is false), but I would have to look into which permissions these are.
Type: schema.TypeList, | ||
Optional: true, | ||
Computed: true, | ||
MinItems: 1, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
given this has to be specified at create time - isn't this Required?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You can edit these at any time to add/remove as needed, and they're not required for creation. I believe the bare minimum properties required for creating an application are the display name, 1 identifier URI, and the homepage. Those last two properties attempt to set default values for you based on the display name you give in their expand functions as a convenience, but the expand for reply_urls doesn't as it's not required. I modeled the default functionality based on how Azure CLI's az ad app create works.
|
||
"identifier_uris": { | ||
Type: schema.TypeList, | ||
Optional: true, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
is this field user-specifyable in the portal?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I believe this is the "App ID URI" under settings->properties. You can't specify it during creation in the portal but can modify it afterwards as long as it's globally unique. The manifest section, which allows you to edit all the application settings as a JSON document, is another way of changing it through the portal but that's probably cheating :)
return fmt.Errorf("Error loading Application %q: %+v", d.Id(), err) | ||
} | ||
|
||
d.Set("display_name", resp.DisplayName) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
can we access all of these properties on resp.[XX]Properties
? it's how they're returned from the API - these fields aren't necessarily guaranteed to be populated. This also means we can do a nil-check e.g.
if props := resp.[XX]Properties; props != nil {
d.Set("name", resp.DisplayName)
# ...
}
azurerm_azuread_application
@tombuildsstuff Yes, it totally makes sense to split the KeyCredentials and PasswordCredentials out like that and I'll pull them out into new resources with new PRs* as I make your requested fixes to this one. I do want to clarify that it is possible to assign those credentials to ServicePrincipals as well. I believe this is to support multi-tenanted applications, allowing individual credentials per tenant. It's not a feature that appears in the portal but the endpoints are there in the SDK. Given the above, this will leave us with 4 credentials resources in total: * Since their tests are dependent on this application resource I'll have to wait on actually creating them until this one's merged to simplify the PR process. |
@Stavrus that's fair - my understanding is that these endpoints are for the |
@tombuildsstuff Hey, sorry for the delay in updating this PR. I've made most of the requested changes and it should be ready for re-review. I'll be working on the Password/Key resources in the meantime. What I left out/need further comment on:
|
- updating the acceptance tests to prefix the name with `acctest` so it's easily identifyable - wrapping the error messages to display more useful information - ensuring we disable apps or other tenants before deleting them - making available_to_other_tenants / oauth2_allow_implicit_flow not computed - updating the docs ``` $ acctests azurerm TestAccAzureRMActiveDirectoryApplication_ === RUN TestAccAzureRMActiveDirectoryApplication_importBasic --- PASS: TestAccAzureRMActiveDirectoryApplication_importBasic (38.38s) === RUN TestAccAzureRMActiveDirectoryApplication_importComplete --- PASS: TestAccAzureRMActiveDirectoryApplication_importComplete (25.42s) === RUN TestAccAzureRMActiveDirectoryApplication_basic --- PASS: TestAccAzureRMActiveDirectoryApplication_basic (20.18s) === RUN TestAccAzureRMActiveDirectoryApplication_availableToOtherTenants --- PASS: TestAccAzureRMActiveDirectoryApplication_availableToOtherTenants (21.60s) === RUN TestAccAzureRMActiveDirectoryApplication_complete --- PASS: TestAccAzureRMActiveDirectoryApplication_complete (20.19s) === RUN TestAccAzureRMActiveDirectoryApplication_update --- PASS: TestAccAzureRMActiveDirectoryApplication_update (39.92s) PASS ok github.com/terraform-providers/terraform-provider-azurerm/azurerm 165.735s ```
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
hey @Stavrus
Thanks for pushing those changes - I've taken a look through and spent some time testing this and it's pretty close. Whilst testing this I've noticed a couple of issues which I'm going to push a commit to fix (I hope you don't mind!) - and this now LGTM 👍
Thanks!
d.Set("application_id", resp.AppID) | ||
d.Set("homepage", resp.Homepage) | ||
d.Set("identifier_uris", resp.IdentifierUris) | ||
d.Set("reply_urls", resp.ReplyUrls) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
given these are complex objects - I'm going to push a commit to add a flatten function for each of these and check for errors when setting them
d.Set("homepage", resp.Homepage) | ||
d.Set("identifier_uris", resp.IdentifierUris) | ||
d.Set("reply_urls", resp.ReplyUrls) | ||
d.Set("available_to_other_tenants", resp.AvailableToOtherTenants) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
in some manual testing of this resource - it appears this property needs to be false
upon deletion; I'll push a commit to ensure this is set before deleting the application
} | ||
if len(identifiers) == 0 { | ||
identifiers = append(identifiers, fmt.Sprintf("http://%s", name)) | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
looks like we don't need this from testing - so I'll push a commit to remove it
--- | ||
layout: "azurerm" | ||
page_title: "Azure Resource Manager: azurerm_azuread_application" | ||
sidebar_current: "docs-azurerm-resource-active-directory-application" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
minor let's update this to docs-azurerm-resource-azuread-application
3d151ad
to
ef6167d
Compare
Tests pass:
|
* api-management: Updating to include hashicorp#1565 resource/servicebus_subscription_rule: Fix the correlation_filter optional values (hashicorp#1565) Updating to include hashicorp#1563 resouce/app_insights: Allow different application_type deployments (hashicorp#1563) VMSS: changed sku property from a set to list Update CHANGELOG.md to include hashicorp#1552 Renamed azurerm_azuread_application.html.markdown to azuread_application.html.markdown New Data Source: `azurerm_azuread_application` VMSS: Updating the code samples to be valid. Fixes hashicorp#1539 (hashicorp#1549) Creation Data -> Creation Date (hashicorp#1548) Updating to include hashicorp#1546 Workaround upstream issue in creating azureEndpoints in traffic manager (hashicorp#1546) Cleanup after v1.9.0 release v1.9.0 Updating to include hashicorp#1269 New Resource: `azurerm_azuread_application` (hashicorp#1269) Remove tags validate in preConfig of TestAccAzureRMKeyVault_update (hashicorp#1534) Updating to include hashicorp#1535 `azurerm_key_vault_key` - handling the parent Key Vault being deleted (hashicorp#1535)
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 [email protected]. Thanks! |
Split from PR #961.