-
Notifications
You must be signed in to change notification settings - Fork 333
Fix eventual consistency issues in App Registration, Group, and Service Principal resources #1821
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
…ce Principal resources
|
Apologies if this isn't the right place for this feedback. We forked this branch and pushed it to our private registry for testing as the issue it resolves has become a major blocker for us. The code changes resolved the problems with app registrations, service principals and groups (thank you for that), but the same problem persists with I'm not a Golang dev, so I stole then tweaked the consistency changes from this PR and applied them to |
jaredfholgate
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@ms-henglu you are probably already aware, but I think this needs applying to every resource.
|
When we can expect this fix to be released? Thank you! |
I'm afraid I can't comment on the timescales. @ms-henglu is aware of the urgency and trying hard to get something out ASAP. |
@ms-henglu, thanks for the new commit but seems that is only to address The fix appears need to be applied to every resource, eg. |
It's not finished yet, a review will be requested when it is ready to be merged. |
|
Any update on this issue ? I'm facing this issue and can't provision anything. If there is a work arround, please tell us. If we have to wait, please tell us. |
@KrisBoeckx maybe try pinning the provider version to v3.6.0, this helped me move along with my work until the issue is resolved. |
Reverting back to version 3.6 is what I first did. But it did not resolve the issue. |
The problem is one of eventual consistency, meaning Entra / MS Graph will become eventually consistent at some point (often pretty soon), but due to the error, Terraform has marked the resource as tainted and will proceed to destroy and recreate it, creating a never-ending loop. If you are not automating this at scale, you could apply a manual workaround by updating the tf state file and then running the tf apply again. |
Our workaround for now has been to fork the PR in our pipelines and then build it on our agents for a local dev override in Terraform. This allowed us to work with the updates in this PR prior to the release. Now this won't be ideal to run in a sensitive production environment, but it works for us since we only face this issues in a setup which is in MVP phase anyway. |
|
Thanks for putting this together. Have forked the PR and built a local version of the provider, which has unblocked us significantly. Appreciate the work done. Will continue testing and follow up with any feedback. |
|
would be nice to have this released as soon as possible |
|
Is anyone terraform enterprise customers perhaps? He could request this issue to your corresponding technical account manager or something like this. |
|
this would be a lovely christmas present... 🎁 😅 |
|
The Entra ID API change has been reverted for Terraform, which should have solved this in the short term. It will be fully rolled out to all regions by end of today. This PR or a similar solution will still be implemented as a permanent solution. |
fixes #1802
Community Note
Description
Changes to existing Resource / Data Source
Testing
Change Log
Below please provide what should go into the changelog (if anything) conforming to the Changelog Format documented here.
azuread_resource- support for thething1property [GH-00000]This is a (please select all that apply):
Related Issue(s)
Fixes #0000
Rollback Plan
If a change needs to be reverted, we will publish an updated version of the provider.
Changes to Security Controls
Are there any changes to security controls (access controls, encryption, logging) in this pull request? If so, explain.
Note
If this PR changes meaningfully during the course of review please update the title and description as required.