- html - 出于某种原因,IE8 对我的 Sass 文件中继承的 html5 CSS 不友好?
- JMeter 在响应断言中使用 span 标签的问题
- html - 在 :hover and :active? 上具有不同效果的 CSS 动画
- html - 相对于居中的 html 内容固定的 CSS 重复背景?
我最近在 Terraform 中创建了 AzureAD 应用程序,但是当我尝试将其客户端 ID 和密码作为 secret 传递到 Key Vault 时,我只是收到诸如 no resources returned in main.tf
之类的错误> 或者是一个奇怪的。 没有找到匹配过滤器的应用程序:“displayName eq
,但 Terraform 甚至还没有制作该应用程序。
请参阅下面的代码
# Terraform Block
terraform {
required_version = ">= 1.0"
required_providers {
azurerm = {
source = "hashicorp/azurerm"
version = ">= 2.0"
}
random = {
source = "hashicorp/random"
version = ">= 3.0"
}
}
#Terraform State Storage Account
# backend "azurerm" {}
}
# Providers Block
provider "azurerm" {
features {}
}
provider "azuread" {
tenant_id = "VALUE"
client_id = "VALUE"
client_secret = "VALUE"
}
provider "random" {}
provider "time" {}
# Random String Resource
resource "random_string" "myrandom" {
length = 6
number = false
upper = false
special = false
}
data "azurerm_client_config" "current" {}
data "azuread_service_principal" "current" {
object_id = "VALUE" // This will need changing per tenant used for KeyVault
}
data "azuread_user" "user" {
user_principal_name = "<a href="https://stackoverflow.com/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="2b61055846425f436b4844465b4a455205484446" rel="noreferrer noopener nofollow">[email protected]</a>"
}
data "azuread_group" "Classroom_In_The_Cloud_AZ_AD_Group" {
display_name = "companyadgroup"
security_enabled = true
}
resource "azurerm_key_vault" "Terraform_Testings" {
#depends_on = [
# azurerm_storage_container.website_tftestingwebsiteinstaller_account
#]
name = "cicterraformtesting"
location = azurerm_resource_group.Classroom_In_The_Cloud_Terraform_Testing.location
resource_group_name = azurerm_resource_group.Classroom_In_The_Cloud_Terraform_Testing.name
tenant_id = data.azurerm_client_config.current.tenant_id
sku_name = "premium"
soft_delete_retention_days = 7
}
resource "azurerm_key_vault_access_policy" "terraform_testings_client" { // This is for AD Users Logged into Azure to give them the right access when creating resources.
key_vault_id = azurerm_key_vault.Terraform_Testings.id
tenant_id = data.azurerm_client_config.current.tenant_id
object_id = data.azuread_group.Classroom_In_The_Cloud_AZ_AD_Group.object_id
secret_permissions = ["Backup", "Delete", "Get", "List", "Purge", "Recover", "Restore", "Set", ]
key_permissions = ["Backup", "Create", "Decrypt", "Delete", "Encrypt", "Get", "Import", "List", "Purge", "Recover", "Restore", "Sign", "UnwrapKey", "Update", "Verify", "WrapKey", ]
storage_permissions = ["Backup", "Delete", "DeleteSAS", "Get", "GetSAS", "List", "ListSAS", "Purge", "Recover", "RegenerateKey", "Restore", "Set", "SetSAS", "Update", ]
certificate_permissions = ["create", "delete", "deleteissuers", "get", "getissuers", "import", "list", "listissuers", "managecontacts", "manageissuers", "setissuers", "update", ]
}
resource "azurerm_key_vault_access_policy" "terraform_testings_service_principal" { // This is for the Service Principal in the pipeline to be able to make changes to Key Vault.
key_vault_id = azurerm_key_vault.Terraform_Testings.id
tenant_id = data.azurerm_client_config.current.tenant_id
object_id = data.azurerm_client_config.current.object_id
secret_permissions = ["Backup", "Delete", "Get", "List", "Purge", "Recover", "Restore", "Set", ]
key_permissions = ["Backup", "Create", "Decrypt", "Delete", "Encrypt", "Get", "Import", "List", "Purge", "Recover", "Restore", "Sign", "UnwrapKey", "Update", "Verify", "WrapKey", ]
storage_permissions = ["Backup", "Delete", "DeleteSAS", "Get", "GetSAS", "List", "ListSAS", "Purge", "Recover", "RegenerateKey", "Restore", "Set", "SetSAS", "Update", ]
certificate_permissions = ["create", "delete", "deleteissuers", "get", "getissuers", "import", "list", "listissuers", "managecontacts", "manageissuers", "setissuers", "update", ]
}
resource "azurerm_key_vault_secret" "WebsiteStorageConnectionString" { // Dont use dempends on, on key vault secrets gets itself in a mess
name = "WebsiteStorageConnectionString"
value = azurerm_storage_account.website_tftestwebinstaller_account.primary_access_key
#value = "szechuan"
key_vault_id = azurerm_key_vault.Terraform_Testings.id
depends_on = [
azurerm_key_vault_access_policy.terraform_testings_client,
azurerm_key_vault_access_policy.terraform_testings_service_principal,
azurerm_storage_account.website_tftestwebinstaller_account,
]
}
resource "azurerm_key_vault_secret" "WebsiteSignalRConnectionString" { // Dont use dempends on, on key vault secrets gets itself in a mess
name = "WebsiteSignalRConnectionString"
value = format("Endpoint=https://${azurerm_signalr_service.websitesignalr.name}.service.signalr.net;AccessKey=${azurerm_signalr_service.websitesignalr.primary_access_key};Version=1.0;")
key_vault_id = azurerm_key_vault.Terraform_Testings.id
depends_on = [
azurerm_key_vault_access_policy.terraform_testings_client,
azurerm_key_vault_access_policy.terraform_testings_service_principal,
azurerm_signalr_service.websitesignalr,
]
}
resource "azurerm_key_vault_secret" "AzureADClientID" {
name = "AzureADClientID"
value = data.azuread_application.websiteadapp.id
key_vault_id = azurerm_key_vault.Terraform_Testings.id
depends_on = [
azurerm_key_vault_access_policy.terraform_testings_client,
azurerm_key_vault_access_policy.terraform_testings_service_principal,
azureread_application.websiteadapp,
]
}
resource "azurerm_key_vault_secret" "AzureADAppPassword" {
name = "AzureADAppPassword"
value = data.azuread_application.websiteadapp.object_id
key_vault_id = azurerm_key_vault.Terraform_Testings.id
depends_on = [
azurerm_key_vault_access_policy.terraform_testings_client,
azurerm_key_vault_access_policy.terraform_testings_service_principal,
azuread_application_password.websiteadapp,
]
}
resource "azuread_application" "websiteadapp" {
display_name = var.adapplication_name
#identifier_uris = ["api://example-app"]
owners = [data.azurerm_client_config.current.object_id]
sign_in_audience = "AzureADMultipleOrgs"
required_resource_access {
resource_app_id = "VALUE" # Microsoft Graph
resource_access {
id = "VALUE" # User.Read.All
type = "Scope"
}
resource_access {
id = "VALUE" # User.ReadWrite
type = "Scope"
}
}
}
data "azuread_application" "websiteadapp" {
display_name = var.adapplication_name
depends_on = [
azureread_application.websiteadapp,
]
}
resource "azuread_application_password" "websiteadapp" {
application_object_id = azuread_application.websiteadapp.object_id
}
我尝试过删除 Key Vault 中的依赖项,如果您将 Key Vault 从马术中取出,应用程序确实会创建,这确实让我更加困惑。
我已经完成这项任务两天了,并且一直在关注 Terraform 此处链接中列出的文档:
https://registry.terraform.io/providers/hashicorp/azuread/latest/docs/resources/application#id
最佳答案
我在您的 terraform 代码中发现了一些问题。
资源“azuread_application”“websiteadapp”
时,您不需要数据“azuread_application”“websiteadapp”
azurerm_key_vault_secret
中没有看到您引用的资源 azurerm_storage_account.website_tftestwebinstaller_account
azurerm_key_vault_secret
中没有看到您引用的资源 azurerm_signalr_service.websitesignalr
“azurerm_key_vault_secret”“AzureADAppPassword”
应具有引用azurerm_application_password.websiteadapp.value
的值
这是重构后的代码:
# Terraform Block
terraform {
required_version = ">= 1.0"
required_providers {
azurerm = {
source = "hashicorp/azurerm"
version = ">= 2.0"
}
random = {
source = "hashicorp/random"
version = ">= 3.0"
}
}
#Terraform State Storage Account
# backend "azurerm" {}
}
# Providers Block
provider "azurerm" {
features {}
}
provider "azuread" {
tenant_id = "VALUE"
client_id = "VALUE"
client_secret = "VALUE"
}
provider "random" {}
provider "time" {}
# Random String Resource
resource "random_string" "myrandom" {
length = 6
number = false
upper = false
special = false
}
data "azurerm_client_config" "current" {}
data "azuread_service_principal" "current" {
object_id = "VALUE" // This will need changing per tenant used for KeyVault
}
data "azuread_user" "user" {
user_principal_name = "<a href="https://stackoverflow.com/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="6822461b05011c00280b070518090611460b0705" rel="noreferrer noopener nofollow">[email protected]</a>"
}
data "azuread_group" "Classroom_In_The_Cloud_AZ_AD_Group" {
display_name = "companyadgroup"
security_enabled = true
}
resource "azurerm_key_vault" "Terraform_Testings" {
#depends_on = [
# azurerm_storage_container.website_tftestingwebsiteinstaller_account
#]
name = "cicterraformtesting"
location = azurerm_resource_group.Classroom_In_The_Cloud_Terraform_Testing.location
resource_group_name = azurerm_resource_group.Classroom_In_The_Cloud_Terraform_Testing.name
tenant_id = data.azurerm_client_config.current.tenant_id
sku_name = "premium"
soft_delete_retention_days = 7
}
resource "azurerm_key_vault_access_policy" "terraform_testings_client" { // This is for AD Users Logged into Azure to give them the right access when creating resources.
key_vault_id = azurerm_key_vault.Terraform_Testings.id
tenant_id = data.azurerm_client_config.current.tenant_id
object_id = data.azuread_group.Classroom_In_The_Cloud_AZ_AD_Group.object_id
secret_permissions = ["Backup", "Delete", "Get", "List", "Purge", "Recover", "Restore", "Set", ]
key_permissions = ["Backup", "Create", "Decrypt", "Delete", "Encrypt", "Get", "Import", "List", "Purge", "Recover", "Restore", "Sign", "UnwrapKey", "Update", "Verify", "WrapKey", ]
storage_permissions = ["Backup", "Delete", "DeleteSAS", "Get", "GetSAS", "List", "ListSAS", "Purge", "Recover", "RegenerateKey", "Restore", "Set", "SetSAS", "Update", ]
certificate_permissions = ["create", "delete", "deleteissuers", "get", "getissuers", "import", "list", "listissuers", "managecontacts", "manageissuers", "setissuers", "update", ]
}
resource "azurerm_key_vault_access_policy" "terraform_testings_service_principal" { // This is for the Service Principal in the pipeline to be able to make changes to Key Vault.
key_vault_id = azurerm_key_vault.Terraform_Testings.id
tenant_id = data.azurerm_client_config.current.tenant_id
object_id = data.azurerm_client_config.current.object_id
secret_permissions = ["Backup", "Delete", "Get", "List", "Purge", "Recover", "Restore", "Set", ]
key_permissions = ["Backup", "Create", "Decrypt", "Delete", "Encrypt", "Get", "Import", "List", "Purge", "Recover", "Restore", "Sign", "UnwrapKey", "Update", "Verify", "WrapKey", ]
storage_permissions = ["Backup", "Delete", "DeleteSAS", "Get", "GetSAS", "List", "ListSAS", "Purge", "Recover", "RegenerateKey", "Restore", "Set", "SetSAS", "Update", ]
certificate_permissions = ["create", "delete", "deleteissuers", "get", "getissuers", "import", "list", "listissuers", "managecontacts", "manageissuers", "setissuers", "update", ]
}
resource "azurerm_key_vault_secret" "AzureADClientID" {
name = "AzureADClientID"
value = azuread_application.websiteadapp.id
key_vault_id = azurerm_key_vault.Terraform_Testings.id
depends_on = [
azurerm_key_vault_access_policy.terraform_testings_client,
azurerm_key_vault_access_policy.terraform_testings_service_principal,
]
}
resource "azurerm_key_vault_secret" "AzureADAppKeyId" {
name = "AzureADAppPassword"
value = azuread_application_password.websiteadapp.key_id
key_vault_id = azurerm_key_vault.Terraform_Testings.id
depends_on = [
azurerm_key_vault_access_policy.terraform_testings_client,
azurerm_key_vault_access_policy.terraform_testings_service_principal,
]
}
resource "azurerm_key_vault_secret" "AzureADAppPassword" {
name = "AzureADAppPassword"
value = azuread_application_password.websiteadapp.value
key_vault_id = azurerm_key_vault.Terraform_Testings.id
depends_on = [
azurerm_key_vault_access_policy.terraform_testings_client,
azurerm_key_vault_access_policy.terraform_testings_service_principal,
]
}
resource "azuread_application" "websiteadapp" {
display_name = var.adapplication_name
#identifier_uris = ["api://example-app"]
owners = [data.azurerm_client_config.current.object_id]
sign_in_audience = "AzureADMultipleOrgs"
required_resource_access {
resource_app_id = "VALUE" # Microsoft Graph
resource_access {
id = "VALUE" # User.Read.All
type = "Scope"
}
resource_access {
id = "VALUE" # User.ReadWrite
type = "Scope"
}
}
}
resource "azuread_application_password" "websiteadapp" {
application_object_id = azuread_application.websiteadapp.object_id
}
关于azure - Terraform Azure AD Web 应用程序不会将客户端 ID 和密码传递到 Key Vault,我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/69734826/
我有一个几乎可以构建的Maven / Grails应用,但在web.xml上找不到[my-app]\webapp\WEB-INF\web.xml。但是目录结构像往常一样包含web-app文件夹,而不是
正如我在标题中提到的:我想知道 web-service 和 web-socket 之间的区别?我们什么时候使用每一个? 谢谢! 最佳答案 一个web service是一个响应客户端 SOAP/REST
让我们看一个示例场景: 客户端打开一个网站并找到他从文本框中输入的两个数字的总和。然后单击“添加”按钮。两个参数通过 HTTP GET 发送到服务器,在服务器上写入 PHP 代码以添加数字,结果为回声
我知道这是一个老问题,肯定已经被回答了数百次,但我还无法找到令人满意的答案。 我正在创建一个应用程序,其他应用程序(移动/网络)将使用该应用程序来获取数据。现在我有两个选择: 将我的应用程序创建为简单
通过 Web 作业部署新功能有 3 种方法: 创建一个新的 Web 应用,并部署一个包含该函数的 Web 作业。 向现有 Web 作业添加一项新函数(这样您现在在一个 Web 作业中就拥有了多个函数)
我收到来自网络场景的通知,上面写着“问题”和“确定”。我想在问题发生时包含网络响应的内容。我不担心标题值,只担心网页的内容. 这是我可以在通知设置中引用的变量吗? 最佳答案 不幸的是 zabbix 不
就目前而言,这个问题不适合我们的问答形式。我们希望答案得到事实、引用或专业知识的支持,但这个问题可能会引起辩论、争论、投票或扩展讨论。如果您觉得这个问题可以改进并可能重新打开,visit the he
嗨,这是一个理论问题,但我真的无法弄清楚 Web 应用程序、基于 Web 的应用程序和基于云的应用程序之间的区别。这个你能帮我吗。 最佳答案 @Matt 是对的 - 这真的无关紧要,但是,为了清楚起见
我正在尝试使用多个 Web 服务,这些服务在它们的 wsdl 中重新定义了一些相同的公共(public)类。我目前在网站中引用了它们,但我想转换为 Web 应用程序。 由于一些相同的类是从多个 Web
一个。我必须考虑哪些事项?b.当前应用程序正在执行多个存储过程。如果我创建等效的方法来执行这些过程,会有什么风险或挑战。 最佳答案 在架构上,将网络应用程序转换为网络服务时必须考虑的一件事是,对方法和
关闭。这个问题不满足Stack Overflow guidelines .它目前不接受答案。 想改善这个问题吗?更新问题,使其成为 on-topic对于堆栈溢出。 5年前关闭。 Improve thi
网络 API 和网络服务之间有什么区别吗?或者它们是同一个吗? 最佳答案 网络服务通常提供 WSDL您可以从中自动创建客户端 stub 。 Web 服务基于 SOAP protocol 。ASP.NE
我已经获得了我需要的所有资源。我将 Web 服务放入应用程序服务环境中,然后将 NSG 连接到应用程序服务环境使用的子网。然后,我允许 VNET 内的应用程序与 Web 服务进行通信,但它无法正常工作
我已经获得了我需要的所有资源。我将 Web 服务放入应用程序服务环境中,然后将 NSG 连接到应用程序服务环境使用的子网。然后,我允许 VNET 内的应用程序与 Web 服务进行通信,但它无法正常工作
我正在使用 stub 将我的网络服务相关测试与实际网络服务隔离开来。 你/我应该如何合并测试以确保我制作的响应与实际的网络服务匹配(我无法控制它)? 我不想知道怎么做,而是何时何地? 我应该为测试数据
我在互联网上搜索了很多,但我仍然没有得到网络服务和网络 API 之间的明显区别?我在某处读到所有 Web 服务都是 API,但所有 API 都不是 Web 服务。如何? 我所知道的是两者都允许利用其他
假设我已经完成了使用 JavaEE 制作的 Web 应用程序。这个 Web 应用程序包含登录系统,但最后它是非常基本的 Web 应用程序。我使用的是 GlassFish 3.1.2.2。 我想知道一旦
我希望设计者能够打开与我相同的解决方案文件。这可以通过 Expressions Web 实现吗? 最佳答案 简短的回答是“不”;但这是一个非常常见的请求,我知道很多人都希望下一个版本(无论何时)对此有
我正在尝试在 CF10 中创建一个 Web 服务对象。我已验证它在 SoapUI 中按预期工作。但是,当我在 CF 中运行它时,我得到一个错误,它无法找到在 WSDL 的导入语句中导入的 XSD。这是
我的要求是开发一个 Web 服务,充当外部 Web 服务和客户端之间的中间人。 我知道,我可以为我的服务设计一个wsdl,然后将外部wsdl映射到代码中我的wsdl。我的问题是有一个开源 api/工具
我是一名优秀的程序员,十分优秀!