Skip to content

Conversation

@ms-henglu
Copy link

@ms-henglu ms-henglu commented Dec 8, 2025

fixes #1802

Community Note

  • Please vote on this PR by adding a 👍 reaction to the original PR to help the community and maintainers prioritize for review
  • Please do not leave comments along the lines of "+1", "me too" or "any updates", they generate extra noise for PR followers and do not help prioritize for review

Description

Changes to existing Resource / Data Source

  • I have added an explanation of what my changes do and why I'd like you to include them (This may be covered by linking to an issue above, but may benefit from additional explanation).
  • I have written new tests for my resource or datasource changes & updated any relevant documentation.
  • I have successfully run tests with my changes locally. If not, please provide details on testing challenges that prevented you running the tests.
  • (For changes that include a state migration only). I have manually tested the migration path between relevant versions of the provider.

Testing

  • My submission includes Test coverage as described in the Contribution Guide and the tests pass. (if this is not possible for any reason, please include details of why you did or could not add test coverage)

Change Log

Below please provide what should go into the changelog (if anything) conforming to the Changelog Format documented here.

  • azuread_resource - support for the thing1 property [GH-00000]

This is a (please select all that apply):

  • Bug Fix
  • New Feature (ie adding a service, resource, or data source)
  • Enhancement
  • Breaking Change

Related Issue(s)

Fixes #0000

Rollback Plan

If a change needs to be reverted, we will publish an updated version of the provider.

Changes to Security Controls

Are there any changes to security controls (access controls, encryption, logging) in this pull request? If so, explain.

Note

If this PR changes meaningfully during the course of review please update the title and description as required.

@khenderson42
Copy link

khenderson42 commented Dec 9, 2025

Apologies if this isn't the right place for this feedback.

We forked this branch and pushed it to our private registry for testing as the issue it resolves has become a major blocker for us.

The code changes resolved the problems with app registrations, service principals and groups (thank you for that), but the same problem persists with azuread_group_member, azuread_directory_role_assignment and azuread_app_role_assignment.

I'm not a Golang dev, so I stole then tweaked the consistency changes from this PR and applied them to azuread_group_member and azuread_app_role_assignment and it seems to have resolved the issue for us. I've not tried on azuread_directory_role_assignment yet.

Copy link
Contributor

@jaredfholgate jaredfholgate left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@ms-henglu you are probably already aware, but I think this needs applying to every resource.

@callummarshall9 callummarshall9 mentioned this pull request Dec 9, 2025
5 tasks
@vdidenko-dvps
Copy link

vdidenko-dvps commented Dec 10, 2025

When we can expect this fix to be released? Thank you!

@jaredfholgate

@jaredfholgate
Copy link
Contributor

jaredfholgate commented Dec 10, 2025

When we can expect this fix to be released? Thank you!

@jaredfholgate

I'm afraid I can't comment on the timescales. @ms-henglu is aware of the urgency and trying hard to get something out ASAP.

@travisgan
Copy link

@ms-henglu you are probably already aware, but I think this needs applying to every resource.
comment from @jaredfholgate

@ms-henglu, thanks for the new commit but seems that is only to address azuread_group_member, azuread_directory_role_assignment and azuread_app_role_assignment.

The fix appears need to be applied to every resource, eg. azuread_application_permission_scope, azuread_application_app_role and etc. Those are having similar issue as well.

@jaredfholgate
Copy link
Contributor

@ms-henglu you are probably already aware, but I think this needs applying to every resource.
comment from @jaredfholgate

@ms-henglu, thanks for the new commit but seems that is only to address azuread_group_member, azuread_directory_role_assignment and azuread_app_role_assignment.

The fix appears need to be applied to every resource, eg. azuread_application_permission_scope, azuread_application_app_role and etc. Those are having similar issue as well.

It's not finished yet, a review will be requested when it is ready to be merged.

@KrisBoeckx
Copy link

Any update on this issue ? I'm facing this issue and can't provision anything. If there is a work arround, please tell us. If we have to wait, please tell us.

@airahyusuff
Copy link

Any update on this issue ? I'm facing this issue and can't provision anything. If there is a work arround, please tell us. If we have to wait, please tell us.

@KrisBoeckx maybe try pinning the provider version to v3.6.0, this helped me move along with my work until the issue is resolved.

@KrisBoeckx
Copy link

KrisBoeckx commented Dec 15, 2025

Any update on this issue ? I'm facing this issue and can't provision anything. If there is a work arround, please tell us. If we have to wait, please tell us.

@KrisBoeckx maybe try pinning the provider version to v3.6.0, this helped me move along with my work until the issue is resolved.

Reverting back to version 3.6 is what I first did. But it did not resolve the issue.
The problem is that there was a change on the Microsoft GRAPH API side. Reverting back to an older version like 3.6 will not solve that issue...

@MvRoo
Copy link

MvRoo commented Dec 16, 2025

Any update on this issue ? I'm facing this issue and can't provision anything. If there is a work arround, please tell us. If we have to wait, please tell us.

The problem is one of eventual consistency, meaning Entra / MS Graph will become eventually consistent at some point (often pretty soon), but due to the error, Terraform has marked the resource as tainted and will proceed to destroy and recreate it, creating a never-ending loop. If you are not automating this at scale, you could apply a manual workaround by updating the tf state file and then running the tf apply again.

@SkyDrive26
Copy link

Any update on this issue ? I'm facing this issue and can't provision anything. If there is a work arround, please tell us. If we have to wait, please tell us.

@KrisBoeckx maybe try pinning the provider version to v3.6.0, this helped me move along with my work until the issue is resolved.

Reverting back to version 3.6 is what I first did. But it did not resolve the issue. The problem is that there was a change on the Microsoft GRAPH API side. Reverting back to an older version like 3.6 will not solve that issue...

Our workaround for now has been to fork the PR in our pipelines and then build it on our agents for a local dev override in Terraform. This allowed us to work with the updates in this PR prior to the release. Now this won't be ideal to run in a sensitive production environment, but it works for us since we only face this issues in a setup which is in MVP phase anyway.

@cvs79
Copy link
Contributor

cvs79 commented Dec 17, 2025

Thanks for putting this together. Have forked the PR and built a local version of the provider, which has unblocked us significantly.

Appreciate the work done. Will continue testing and follow up with any feedback.

@DerGary
Copy link

DerGary commented Dec 17, 2025

would be nice to have this released as soon as possible

@MaxPowers1337
Copy link

Is anyone terraform enterprise customers perhaps? He could request this issue to your corresponding technical account manager or something like this.

@markti
Copy link

markti commented Dec 19, 2025

this would be a lovely christmas present... 🎁 😅

@jaredfholgate
Copy link
Contributor

jaredfholgate commented Dec 19, 2025

The Entra ID API change has been reverted for Terraform, which should have solved this in the short term. It will be fully rolled out to all regions by end of today. This PR or a similar solution will still be implemented as a permanent solution.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Unable to create azuread_application_registration with service principal credentials