-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New Resource: 'azurerm_storage_account_customer_managed_key' to enable storage account encryption using key vault customer-managed keys #5668
Conversation
…form-provider-azurerm into nr_storage_account_cmk
``` $ TF_ACC=1 go test -v ./azurerm/internal/services/storage/tests/ -timeout=60m -run=TestAccAzureRMStorageAccountCustomerManagedKey === RUN TestAccAzureRMStorageAccountCustomerManagedKey_basic === PAUSE TestAccAzureRMStorageAccountCustomerManagedKey_basic === RUN TestAccAzureRMStorageAccountCustomerManagedKey_requiresImport === PAUSE TestAccAzureRMStorageAccountCustomerManagedKey_requiresImport === RUN TestAccAzureRMStorageAccountCustomerManagedKey_updateKey === PAUSE TestAccAzureRMStorageAccountCustomerManagedKey_updateKey === CONT TestAccAzureRMStorageAccountCustomerManagedKey_basic === CONT TestAccAzureRMStorageAccountCustomerManagedKey_updateKey === CONT TestAccAzureRMStorageAccountCustomerManagedKey_requiresImport --- PASS: TestAccAzureRMStorageAccountCustomerManagedKey_requiresImport (381.82s) --- PASS: TestAccAzureRMStorageAccountCustomerManagedKey_updateKey (410.36s) --- PASS: TestAccAzureRMStorageAccountCustomerManagedKey_basic (507.32s) PASS ok github.com/terraform-providers/terraform-provider-azurerm/azurerm/internal/services/storage/tests 507.376s ```
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
hey @WodansSon
Thanks for this PR :)
Taking a look through this is looking good - I've left some comments inline which I'm going to push a few commits for to fix - but this otherwise LGTM 👍
Thanks!
azurerm/internal/services/keyvault/resource_arm_key_vault_key.go
Outdated
Show resolved
Hide resolved
azurerm/internal/services/keyvault/resource_arm_key_vault_key.go
Outdated
Show resolved
Hide resolved
azurerm/internal/services/storage/resource_arm_storage_account_customer_managed_key.go
Outdated
Show resolved
Hide resolved
azurerm/internal/services/storage/resource_arm_storage_account_customer_managed_key.go
Show resolved
Hide resolved
azurerm/internal/services/storage/resource_arm_storage_account_customer_managed_key.go
Show resolved
Hide resolved
azurerm/internal/services/storage/resource_arm_storage_account_customer_managed_key.go
Outdated
Show resolved
Hide resolved
azurerm/internal/services/storage/resource_arm_storage_account_customer_managed_key.go
Outdated
Show resolved
Hide resolved
This has been released in version 2.0.0 of the provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. As an example: provider "azurerm" {
version = "~> 2.0.0"
}
# ... other configuration ... |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 [email protected]. Thanks! |
Port of PR #2046 to new code base.
Updated:
Since
storage accounts
are always encrypted by default and the API will now throw an error if you try to set thefile
orblob
arguments to false. I have removed them from the resource, which is also why I changed the name of the resource, becauseencryption settings
no longer made sense.NOTE: Travis CI checks are failing due to #5344 has not been merged to master as of yet.
Fixes #658
Fixes #3820