Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add table azure_key_vault_certificate Closes #633 #698

Open
wants to merge 10 commits into
base: main
Choose a base branch
from
Open

Conversation

ParthaI
Copy link
Contributor

@ParthaI ParthaI commented Nov 30, 2023

Integration test logs

Logs
No env file present for the current environment:  staging 
 Falling back to .env config
No env file present for the current environment:  staging
customEnv TURBOT_TEST_EXPECTED_TIMEOUT undefined

SETUP: tests/azure_key_vault_certificate []

PRETEST: tests/azure_key_vault_certificate

TEST: tests/azure_key_vault_certificate
Running terraform
azurerm_resource_group.named_test_resource: Refreshing state... [id=/subscriptions/e45kt455-f95f-4771-bbb5-e45kt4553432/resourceGroups/turbottest94388]
data.azurerm_client_config.current: Reading...
data.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD0wNGIwNzc5NS04ZGRiLTQ2MWEtYmJlZS0wMmY5ZTFiZjdiNDY7b2JqZWN0SWQ9MDZmZDQ2YjAtYTg2Ny00OWExLWE0ZjEtZjc3Njg0NjVjYWJhO3N1YnNjcmlwdGlvbklkPWQ0NmQ3NDE2LWY5NWYtNDc3MS1iYmI1LTUyOWQ0Yzc2NjU5Yzt0ZW5hbnRJZD1jZGZmZDcwOC03ZGEwLTRjZWEtYWJlYi0wYTRjMzM0ZDdmNjQ=]
data.null_data_source.resource: Reading...
data.null_data_source.resource: Read complete after 0s [id=static]
azurerm_key_vault.example: Refreshing state... [id=/subscriptions/e45kt455-f95f-4771-bbb5-e45kt4553432/resourceGroups/turbottest94388/providers/Microsoft.KeyVault/vaults/turbottest94388]
azurerm_key_vault_certificate.example: Refreshing state... [id=https://turbottest94388.vault.azure.net/certificates/turbottest94388/beaf55112a214cd88aa500fcee10b0f4]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
-/+ destroy and then create replacement

Terraform will perform the following actions:

  # azurerm_key_vault.example must be replaced
-/+ resource "azurerm_key_vault" "example" {
      ~ access_policy                   = [
          ~ {
              - application_id          = ""
              - storage_permissions     = []
                # (5 unchanged attributes hidden)
            },
        ]
      - enable_rbac_authorization       = false -> null
      - enabled_for_deployment          = false -> null
      - enabled_for_disk_encryption     = false -> null
      - enabled_for_template_deployment = false -> null
      ~ id                              = "/subscriptions/e45kt455-f95f-4771-bbb5-e45kt4553432/resourceGroups/turbottest94388/providers/Microsoft.KeyVault/vaults/turbottest94388" -> (known after apply)
      ~ name                            = "turbottest94388" -> "turbottest61640" # forces replacement
      - purge_protection_enabled        = false -> null
      ~ resource_group_name             = "turbottest94388" -> "turbottest61640" # forces replacement
      - tags                            = {} -> null
      ~ vault_uri                       = "https://turbottest94388.vault.azure.net/" -> (known after apply)
        # (5 unchanged attributes hidden)

      - network_acls {
          - bypass                     = "AzureServices" -> null
          - default_action             = "Allow" -> null
          - ip_rules                   = [] -> null
          - virtual_network_subnet_ids = [] -> null
        }
    }

  # azurerm_key_vault_certificate.example must be replaced
-/+ resource "azurerm_key_vault_certificate" "example" {
      ~ certificate_attribute           = [
          - {
              - created        = "2023-11-30T14:13:56Z"
              - enabled        = true
              - expires        = "2024-11-30T14:13:56Z"
              - not_before     = "2023-11-30T14:03:56Z"
              - recovery_level = "CustomizedRecoverable+Purgeable"
              - updated        = "2023-11-30T14:13:56Z"
            },
        ] -> (known after apply)
      ~ certificate_data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known after apply)
      ~ certificate_data_base64         = "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" -> (known after apply)
      ~ id                              = "https://turbottest94388.vault.azure.net/certificates/turbottest94388/beaf55112a214cd88aa500fcee10b0f4" -> (known after apply)
      ~ key_vault_id                    = "/subscriptions/e45kt455-f95f-4771-bbb5-e45kt4553432/resourceGroups/turbottest94388/providers/Microsoft.KeyVault/vaults/turbottest94388" # forces replacement -> (known after apply) # forces replacement
      ~ name                            = "turbottest94388" -> "turbottest61640" # forces replacement
      ~ resource_manager_id             = "/subscriptions/e45kt455-f95f-4771-bbb5-e45kt4553432/resourceGroups/turbottest94388/providers/Microsoft.KeyVault/vaults/turbottest94388/certificates/turbottest94388/versions/beaf55112a214cd88aa500fcee10b0f4" -> (known after apply)
      ~ resource_manager_versionless_id = "/subscriptions/e45kt455-f95f-4771-bbb5-e45kt4553432/resourceGroups/turbottest94388/providers/Microsoft.KeyVault/vaults/turbottest94388/certificates/turbottest94388" -> (known after apply)
      ~ secret_id                       = "https://turbottest94388.vault.azure.net/secrets/turbottest94388/beaf55112a214cd88aa500fcee10b0f4" -> (known after apply)
      - tags                            = {} -> null
      ~ thumbprint                      = "5293CBB2755A388297A534287EB88CB7241657A9" -> (known after apply)
      ~ version                         = "beaf55112a214cd88aa500fcee10b0f4" -> (known after apply)
      ~ versionless_id                  = "https://turbottest94388.vault.azure.net/certificates/turbottest94388" -> (known after apply)
      ~ versionless_secret_id           = "https://turbottest94388.vault.azure.net/secrets/turbottest94388" -> (known after apply)

      ~ certificate_policy {
          ~ key_properties {
              + curve      = (known after apply)
                # (4 unchanged attributes hidden)
            }
          ~ lifetime_action {
              ~ trigger {
                  - lifetime_percentage = 0 -> null
                    # (1 unchanged attribute hidden)
                }

                # (1 unchanged block hidden)
            }
          ~ x509_certificate_properties {
                # (4 unchanged attributes hidden)

              ~ subject_alternative_names {
                  - emails    = [] -> null
                  - upns      = [] -> null
                    # (1 unchanged attribute hidden)
                }
            }

            # (2 unchanged blocks hidden)
        }
    }

  # azurerm_resource_group.named_test_resource must be replaced
-/+ resource "azurerm_resource_group" "named_test_resource" {
      ~ id       = "/subscriptions/e45kt455-f95f-4771-bbb5-e45kt4553432/resourceGroups/turbottest94388" -> (known after apply)
      ~ name     = "turbottest94388" -> "turbottest61640" # forces replacement
      - tags     = {} -> null
        # (1 unchanged attribute hidden)
    }

Plan: 3 to add, 0 to change, 3 to destroy.

Changes to Outputs:
  + resource_aka       = (known after apply)
  + resource_aka_lower = (known after apply)
  + resource_id        = (known after apply)
  + resource_name      = "turbottest61640"
  + subscription_id    = "e45kt455-f95f-4771-bbb5-e45kt4553432"
azurerm_key_vault_certificate.example: Destroying... [id=https://turbottest94388.vault.azure.net/certificates/turbottest94388/beaf55112a214cd88aa500fcee10b0f4]
azurerm_key_vault_certificate.example: Still destroying... [id=https://turbottest94388.vault.azure.net...94388/beaf55112a214cd88aa500fcee10b0f4, 10s elapsed]
azurerm_key_vault_certificate.example: Still destroying... [id=https://turbottest94388.vault.azure.net...94388/beaf55112a214cd88aa500fcee10b0f4, 20s elapsed]
azurerm_key_vault_certificate.example: Destruction complete after 30s
azurerm_key_vault.example: Destroying... [id=/subscriptions/e45kt455-f95f-4771-bbb5-e45kt4553432/resourceGroups/turbottest94388/providers/Microsoft.KeyVault/vaults/turbottest94388]
azurerm_key_vault.example: Still destroying... [id=/subscriptions/e45kt455-f95f-4771-bbb5-...rosoft.KeyVault/vaults/turbottest94388, 10s elapsed]
azurerm_key_vault.example: Destruction complete after 17s
azurerm_resource_group.named_test_resource: Destroying... [id=/subscriptions/e45kt455-f95f-4771-bbb5-e45kt4553432/resourceGroups/turbottest94388]
azurerm_resource_group.named_test_resource: Still destroying... [id=/subscriptions/e45kt455-f95f-4771-bbb5-...c76659c/resourceGroups/turbottest94388, 10s elapsed]
azurerm_resource_group.named_test_resource: Still destroying... [id=/subscriptions/e45kt455-f95f-4771-bbb5-...c76659c/resourceGroups/turbottest94388, 20s elapsed]
azurerm_resource_group.named_test_resource: Still destroying... [id=/subscriptions/e45kt455-f95f-4771-bbb5-...c76659c/resourceGroups/turbottest94388, 30s elapsed]
azurerm_resource_group.named_test_resource: Still destroying... [id=/subscriptions/e45kt455-f95f-4771-bbb5-...c76659c/resourceGroups/turbottest94388, 40s elapsed]
azurerm_resource_group.named_test_resource: Still destroying... [id=/subscriptions/e45kt455-f95f-4771-bbb5-...c76659c/resourceGroups/turbottest94388, 50s elapsed]
azurerm_resource_group.named_test_resource: Still destroying... [id=/subscriptions/e45kt455-f95f-4771-bbb5-...c76659c/resourceGroups/turbottest94388, 1m0s elapsed]
azurerm_resource_group.named_test_resource: Still destroying... [id=/subscriptions/e45kt455-f95f-4771-bbb5-...c76659c/resourceGroups/turbottest94388, 1m10s elapsed]
azurerm_resource_group.named_test_resource: Still destroying... [id=/subscriptions/e45kt455-f95f-4771-bbb5-...c76659c/resourceGroups/turbottest94388, 1m20s elapsed]
azurerm_resource_group.named_test_resource: Destruction complete after 1m24s
azurerm_resource_group.named_test_resource: Creating...
azurerm_resource_group.named_test_resource: Creation complete after 2s [id=/subscriptions/e45kt455-f95f-4771-bbb5-e45kt4553432/resourceGroups/turbottest61640]
azurerm_key_vault.example: Creating...
azurerm_key_vault.example: Still creating... [10s elapsed]
azurerm_key_vault.example: Still creating... [20s elapsed]
azurerm_key_vault.example: Still creating... [30s elapsed]
azurerm_key_vault.example: Still creating... [40s elapsed]
azurerm_key_vault.example: Still creating... [50s elapsed]
azurerm_key_vault.example: Still creating... [1m0s elapsed]
azurerm_key_vault.example: Still creating... [1m10s elapsed]
azurerm_key_vault.example: Still creating... [1m20s elapsed]
azurerm_key_vault.example: Still creating... [1m30s elapsed]
azurerm_key_vault.example: Still creating... [1m40s elapsed]
azurerm_key_vault.example: Still creating... [1m50s elapsed]
azurerm_key_vault.example: Still creating... [2m0s elapsed]
azurerm_key_vault.example: Still creating... [2m10s elapsed]
azurerm_key_vault.example: Still creating... [2m20s elapsed]
azurerm_key_vault.example: Still creating... [2m30s elapsed]
azurerm_key_vault.example: Still creating... [2m40s elapsed]
azurerm_key_vault.example: Still creating... [2m50s elapsed]
azurerm_key_vault.example: Still creating... [3m0s elapsed]
azurerm_key_vault.example: Creation complete after 3m2s [id=/subscriptions/e45kt455-f95f-4771-bbb5-e45kt4553432/resourceGroups/turbottest61640/providers/Microsoft.KeyVault/vaults/turbottest61640]
azurerm_key_vault_certificate.example: Creating...
azurerm_key_vault_certificate.example: Still creating... [10s elapsed]
azurerm_key_vault_certificate.example: Creation complete after 19s [id=https://turbottest61640.vault.azure.net/certificates/turbottest61640/d803bda05f0a486f97c8e27ca9f38c18]

Warning: Deprecated

  with data.null_data_source.resource,
  on variables.tf line 28, in data "null_data_source" "resource":
  28: data "null_data_source" "resource" {

The null_data_source was historically used to construct intermediate values
to re-use elsewhere in configuration, the same can now be achieved using
locals or the terraform_data resource type in Terraform 1.4 and later.

(and one more similar warning elsewhere)

Apply complete! Resources: 3 added, 0 changed, 3 destroyed.

Outputs:

resource_aka = "azure://https://turbottest61640.vault.azure.net/certificates/turbottest61640/d803bda05f0a486f97c8e27ca9f38c18"
resource_aka_lower = "azure://https://turbottest61640.vault.azure.net/certificates/turbottest61640/d803bda05f0a486f97c8e27ca9f38c18"
resource_id = "https://turbottest61640.vault.azure.net/certificates/turbottest61640/d803bda05f0a486f97c8e27ca9f38c18"
resource_name = "turbottest61640"
subscription_id = "e45kt455-f95f-4771-bbb5-e45kt4553432"

Running SQL query: test-get-query.sql
[
  {
    "id": "https://turbottest61640.vault.azure.net/certificates/turbottest61640/d803bda05f0a486f97c8e27ca9f38c18",
    "name": "turbottest61640"
  }
]
✔ PASSED

Running SQL query: test-hydrate-query.sql
[
  {
    "id": "https://turbottest61640.vault.azure.net/certificates/turbottest61640/d803bda05f0a486f97c8e27ca9f38c18",
    "name": "turbottest61640",
    "vault_name": "turbottest61640"
  }
]
✔ PASSED

Running SQL query: test-list-query.sql
[
  {
    "id": "https://turbottest61640.vault.azure.net/certificates/turbottest61640/d803bda05f0a486f97c8e27ca9f38c18",
    "name": "turbottest61640"
  }
]
✔ PASSED

Running SQL query: test-not-found-query.sql
Warning: terminal options has been deprecated and will be removed in a future version of Steampipe.
These can now be set in a steampipe workspace.
(/Users/parthas/.steampipe/config/default.spc:34,20-42,2)
null
✔ PASSED

POSTTEST: tests/azure_key_vault_certificate

TEARDOWN: tests/azure_key_vault_certificate

SUMMARY:

1/1 passed.

Example query results

Results
> select * from azure_key_vault_certificate
+-----------------+-----------------+----------------------------------------------------------------------+-----------------------------+----------------+---------+---------------------------+---------------------------+---------------------------+---------------------->
| name            | vault_name      | id                                                                   | x509_thumbprint             | recovery_level | enabled | not_before                | expires                   | created                   | updated              >
+-----------------+-----------------+----------------------------------------------------------------------+-----------------------------+----------------+---------+---------------------------+---------------------------+---------------------------+---------------------->
| turbottest94388 | turbottest94388 | https://turbottest94388.vault.azure.net/certificates/turbottest94388 | UpPLsnVaOIKXpTQofriMtyQWV6k |                | true    | 1696-12-12T08:35:02+05:53 | 1864-04-15T01:55:56+05:53 | 1715-12-18T19:15:02+05:53 | 1715-12-18T19:15:02+0>
|                 |                 |                                                                      |                             |                |         |                           |                           |                           |                      >
+-----------------+-----------------+----------------------------------------------------------------------+-----------------------------+----------------+---------+---------------------------+---------------------------+---------------------------+---------------------

@ParthaI ParthaI self-assigned this Nov 30, 2023
@ParthaI ParthaI marked this pull request as draft November 30, 2023 17:26
@ParthaI ParthaI linked an issue Nov 30, 2023 that may be closed by this pull request
@ParthaI ParthaI marked this pull request as ready for review December 1, 2023 04:58
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Add table azure_key_vault_certificate
2 participants