- html - 出于某种原因,IE8 对我的 Sass 文件中继承的 html5 CSS 不友好?
- JMeter 在响应断言中使用 span 标签的问题
- html - 在 :hover and :active? 上具有不同效果的 CSS 动画
- html - 相对于居中的 html 内容固定的 CSS 重复背景?
我最近在 Terraform 中创建了 AzureAD 应用程序,但是当我尝试将其客户端 ID 和密码作为 secret 传递到 Key Vault 时,我只是收到诸如 no resources returned in main.tf
之类的错误> 或者是一个奇怪的。 没有找到匹配过滤器的应用程序:“displayName eq
,但 Terraform 甚至还没有制作该应用程序。
请参阅下面的代码
# Terraform Block
terraform {
required_version = ">= 1.0"
required_providers {
azurerm = {
source = "hashicorp/azurerm"
version = ">= 2.0"
}
random = {
source = "hashicorp/random"
version = ">= 3.0"
}
}
#Terraform State Storage Account
# backend "azurerm" {}
}
# Providers Block
provider "azurerm" {
features {}
}
provider "azuread" {
tenant_id = "VALUE"
client_id = "VALUE"
client_secret = "VALUE"
}
provider "random" {}
provider "time" {}
# Random String Resource
resource "random_string" "myrandom" {
length = 6
number = false
upper = false
special = false
}
data "azurerm_client_config" "current" {}
data "azuread_service_principal" "current" {
object_id = "VALUE" // This will need changing per tenant used for KeyVault
}
data "azuread_user" "user" {
user_principal_name = "<a href="https://stackoverflow.com/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="2b61055846425f436b4844465b4a455205484446" rel="noreferrer noopener nofollow">[email protected]</a>"
}
data "azuread_group" "Classroom_In_The_Cloud_AZ_AD_Group" {
display_name = "companyadgroup"
security_enabled = true
}
resource "azurerm_key_vault" "Terraform_Testings" {
#depends_on = [
# azurerm_storage_container.website_tftestingwebsiteinstaller_account
#]
name = "cicterraformtesting"
location = azurerm_resource_group.Classroom_In_The_Cloud_Terraform_Testing.location
resource_group_name = azurerm_resource_group.Classroom_In_The_Cloud_Terraform_Testing.name
tenant_id = data.azurerm_client_config.current.tenant_id
sku_name = "premium"
soft_delete_retention_days = 7
}
resource "azurerm_key_vault_access_policy" "terraform_testings_client" { // This is for AD Users Logged into Azure to give them the right access when creating resources.
key_vault_id = azurerm_key_vault.Terraform_Testings.id
tenant_id = data.azurerm_client_config.current.tenant_id
object_id = data.azuread_group.Classroom_In_The_Cloud_AZ_AD_Group.object_id
secret_permissions = ["Backup", "Delete", "Get", "List", "Purge", "Recover", "Restore", "Set", ]
key_permissions = ["Backup", "Create", "Decrypt", "Delete", "Encrypt", "Get", "Import", "List", "Purge", "Recover", "Restore", "Sign", "UnwrapKey", "Update", "Verify", "WrapKey", ]
storage_permissions = ["Backup", "Delete", "DeleteSAS", "Get", "GetSAS", "List", "ListSAS", "Purge", "Recover", "RegenerateKey", "Restore", "Set", "SetSAS", "Update", ]
certificate_permissions = ["create", "delete", "deleteissuers", "get", "getissuers", "import", "list", "listissuers", "managecontacts", "manageissuers", "setissuers", "update", ]
}
resource "azurerm_key_vault_access_policy" "terraform_testings_service_principal" { // This is for the Service Principal in the pipeline to be able to make changes to Key Vault.
key_vault_id = azurerm_key_vault.Terraform_Testings.id
tenant_id = data.azurerm_client_config.current.tenant_id
object_id = data.azurerm_client_config.current.object_id
secret_permissions = ["Backup", "Delete", "Get", "List", "Purge", "Recover", "Restore", "Set", ]
key_permissions = ["Backup", "Create", "Decrypt", "Delete", "Encrypt", "Get", "Import", "List", "Purge", "Recover", "Restore", "Sign", "UnwrapKey", "Update", "Verify", "WrapKey", ]
storage_permissions = ["Backup", "Delete", "DeleteSAS", "Get", "GetSAS", "List", "ListSAS", "Purge", "Recover", "RegenerateKey", "Restore", "Set", "SetSAS", "Update", ]
certificate_permissions = ["create", "delete", "deleteissuers", "get", "getissuers", "import", "list", "listissuers", "managecontacts", "manageissuers", "setissuers", "update", ]
}
resource "azurerm_key_vault_secret" "WebsiteStorageConnectionString" { // Dont use dempends on, on key vault secrets gets itself in a mess
name = "WebsiteStorageConnectionString"
value = azurerm_storage_account.website_tftestwebinstaller_account.primary_access_key
#value = "szechuan"
key_vault_id = azurerm_key_vault.Terraform_Testings.id
depends_on = [
azurerm_key_vault_access_policy.terraform_testings_client,
azurerm_key_vault_access_policy.terraform_testings_service_principal,
azurerm_storage_account.website_tftestwebinstaller_account,
]
}
resource "azurerm_key_vault_secret" "WebsiteSignalRConnectionString" { // Dont use dempends on, on key vault secrets gets itself in a mess
name = "WebsiteSignalRConnectionString"
value = format("Endpoint=https://${azurerm_signalr_service.websitesignalr.name}.service.signalr.net;AccessKey=${azurerm_signalr_service.websitesignalr.primary_access_key};Version=1.0;")
key_vault_id = azurerm_key_vault.Terraform_Testings.id
depends_on = [
azurerm_key_vault_access_policy.terraform_testings_client,
azurerm_key_vault_access_policy.terraform_testings_service_principal,
azurerm_signalr_service.websitesignalr,
]
}
resource "azurerm_key_vault_secret" "AzureADClientID" {
name = "AzureADClientID"
value = data.azuread_application.websiteadapp.id
key_vault_id = azurerm_key_vault.Terraform_Testings.id
depends_on = [
azurerm_key_vault_access_policy.terraform_testings_client,
azurerm_key_vault_access_policy.terraform_testings_service_principal,
azureread_application.websiteadapp,
]
}
resource "azurerm_key_vault_secret" "AzureADAppPassword" {
name = "AzureADAppPassword"
value = data.azuread_application.websiteadapp.object_id
key_vault_id = azurerm_key_vault.Terraform_Testings.id
depends_on = [
azurerm_key_vault_access_policy.terraform_testings_client,
azurerm_key_vault_access_policy.terraform_testings_service_principal,
azuread_application_password.websiteadapp,
]
}
resource "azuread_application" "websiteadapp" {
display_name = var.adapplication_name
#identifier_uris = ["api://example-app"]
owners = [data.azurerm_client_config.current.object_id]
sign_in_audience = "AzureADMultipleOrgs"
required_resource_access {
resource_app_id = "VALUE" # Microsoft Graph
resource_access {
id = "VALUE" # User.Read.All
type = "Scope"
}
resource_access {
id = "VALUE" # User.ReadWrite
type = "Scope"
}
}
}
data "azuread_application" "websiteadapp" {
display_name = var.adapplication_name
depends_on = [
azureread_application.websiteadapp,
]
}
resource "azuread_application_password" "websiteadapp" {
application_object_id = azuread_application.websiteadapp.object_id
}
我尝试过删除 Key Vault 中的依赖项,如果您将 Key Vault 从马术中取出,应用程序确实会创建,这确实让我更加困惑。
我已经完成这项任务两天了,并且一直在关注 Terraform 此处链接中列出的文档:
https://registry.terraform.io/providers/hashicorp/azuread/latest/docs/resources/application#id
最佳答案
我在您的 terraform 代码中发现了一些问题。
资源“azuread_application”“websiteadapp”
时,您不需要数据“azuread_application”“websiteadapp”
azurerm_key_vault_secret
中没有看到您引用的资源 azurerm_storage_account.website_tftestwebinstaller_account
azurerm_key_vault_secret
中没有看到您引用的资源 azurerm_signalr_service.websitesignalr
“azurerm_key_vault_secret”“AzureADAppPassword”
应具有引用azurerm_application_password.websiteadapp.value
的值
这是重构后的代码:
# Terraform Block
terraform {
required_version = ">= 1.0"
required_providers {
azurerm = {
source = "hashicorp/azurerm"
version = ">= 2.0"
}
random = {
source = "hashicorp/random"
version = ">= 3.0"
}
}
#Terraform State Storage Account
# backend "azurerm" {}
}
# Providers Block
provider "azurerm" {
features {}
}
provider "azuread" {
tenant_id = "VALUE"
client_id = "VALUE"
client_secret = "VALUE"
}
provider "random" {}
provider "time" {}
# Random String Resource
resource "random_string" "myrandom" {
length = 6
number = false
upper = false
special = false
}
data "azurerm_client_config" "current" {}
data "azuread_service_principal" "current" {
object_id = "VALUE" // This will need changing per tenant used for KeyVault
}
data "azuread_user" "user" {
user_principal_name = "<a href="https://stackoverflow.com/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="6822461b05011c00280b070518090611460b0705" rel="noreferrer noopener nofollow">[email protected]</a>"
}
data "azuread_group" "Classroom_In_The_Cloud_AZ_AD_Group" {
display_name = "companyadgroup"
security_enabled = true
}
resource "azurerm_key_vault" "Terraform_Testings" {
#depends_on = [
# azurerm_storage_container.website_tftestingwebsiteinstaller_account
#]
name = "cicterraformtesting"
location = azurerm_resource_group.Classroom_In_The_Cloud_Terraform_Testing.location
resource_group_name = azurerm_resource_group.Classroom_In_The_Cloud_Terraform_Testing.name
tenant_id = data.azurerm_client_config.current.tenant_id
sku_name = "premium"
soft_delete_retention_days = 7
}
resource "azurerm_key_vault_access_policy" "terraform_testings_client" { // This is for AD Users Logged into Azure to give them the right access when creating resources.
key_vault_id = azurerm_key_vault.Terraform_Testings.id
tenant_id = data.azurerm_client_config.current.tenant_id
object_id = data.azuread_group.Classroom_In_The_Cloud_AZ_AD_Group.object_id
secret_permissions = ["Backup", "Delete", "Get", "List", "Purge", "Recover", "Restore", "Set", ]
key_permissions = ["Backup", "Create", "Decrypt", "Delete", "Encrypt", "Get", "Import", "List", "Purge", "Recover", "Restore", "Sign", "UnwrapKey", "Update", "Verify", "WrapKey", ]
storage_permissions = ["Backup", "Delete", "DeleteSAS", "Get", "GetSAS", "List", "ListSAS", "Purge", "Recover", "RegenerateKey", "Restore", "Set", "SetSAS", "Update", ]
certificate_permissions = ["create", "delete", "deleteissuers", "get", "getissuers", "import", "list", "listissuers", "managecontacts", "manageissuers", "setissuers", "update", ]
}
resource "azurerm_key_vault_access_policy" "terraform_testings_service_principal" { // This is for the Service Principal in the pipeline to be able to make changes to Key Vault.
key_vault_id = azurerm_key_vault.Terraform_Testings.id
tenant_id = data.azurerm_client_config.current.tenant_id
object_id = data.azurerm_client_config.current.object_id
secret_permissions = ["Backup", "Delete", "Get", "List", "Purge", "Recover", "Restore", "Set", ]
key_permissions = ["Backup", "Create", "Decrypt", "Delete", "Encrypt", "Get", "Import", "List", "Purge", "Recover", "Restore", "Sign", "UnwrapKey", "Update", "Verify", "WrapKey", ]
storage_permissions = ["Backup", "Delete", "DeleteSAS", "Get", "GetSAS", "List", "ListSAS", "Purge", "Recover", "RegenerateKey", "Restore", "Set", "SetSAS", "Update", ]
certificate_permissions = ["create", "delete", "deleteissuers", "get", "getissuers", "import", "list", "listissuers", "managecontacts", "manageissuers", "setissuers", "update", ]
}
resource "azurerm_key_vault_secret" "AzureADClientID" {
name = "AzureADClientID"
value = azuread_application.websiteadapp.id
key_vault_id = azurerm_key_vault.Terraform_Testings.id
depends_on = [
azurerm_key_vault_access_policy.terraform_testings_client,
azurerm_key_vault_access_policy.terraform_testings_service_principal,
]
}
resource "azurerm_key_vault_secret" "AzureADAppKeyId" {
name = "AzureADAppPassword"
value = azuread_application_password.websiteadapp.key_id
key_vault_id = azurerm_key_vault.Terraform_Testings.id
depends_on = [
azurerm_key_vault_access_policy.terraform_testings_client,
azurerm_key_vault_access_policy.terraform_testings_service_principal,
]
}
resource "azurerm_key_vault_secret" "AzureADAppPassword" {
name = "AzureADAppPassword"
value = azuread_application_password.websiteadapp.value
key_vault_id = azurerm_key_vault.Terraform_Testings.id
depends_on = [
azurerm_key_vault_access_policy.terraform_testings_client,
azurerm_key_vault_access_policy.terraform_testings_service_principal,
]
}
resource "azuread_application" "websiteadapp" {
display_name = var.adapplication_name
#identifier_uris = ["api://example-app"]
owners = [data.azurerm_client_config.current.object_id]
sign_in_audience = "AzureADMultipleOrgs"
required_resource_access {
resource_app_id = "VALUE" # Microsoft Graph
resource_access {
id = "VALUE" # User.Read.All
type = "Scope"
}
resource_access {
id = "VALUE" # User.ReadWrite
type = "Scope"
}
}
}
resource "azuread_application_password" "websiteadapp" {
application_object_id = azuread_application.websiteadapp.object_id
}
关于azure - Terraform Azure AD Web 应用程序不会将客户端 ID 和密码传递到 Key Vault,我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/69734826/
我想在一些计算机之间建立点对点连接,这样用户就可以在没有外部服务器的情况下聊天和交换文件。我的第一个想法如下: 我在服务器上创建了一个中央 ServerSocket,所有应用程序都可以连接到该服务器。
我正在 Unity 中构建多人游戏。为此,我必须将一些值从客户端发送到两个或多个通过服务器连接的客户端。我想将其构建为服务器真实游戏。客户端将使用 Android,他们的数据将通过服务器同步(可能是一
练习 C 网络编程:我正在编写一个简单的 TCP 客户端-服务器应用程序,它应该将消息(在每个客户端的单独线程中)作为字符串从服务器发送到客户端并在客户端(稍后将成为控制台商店应用程序)。我首先发送消
我使用证书身份验证设置了 AWS Client VPN。我正在为客户端-客户端访问系统进行设置,基本上如 this AWS scenario/example 中所述.一切正常,如果我知道他们的 IP
我正在开发一个小型客户端1/客户端2、服务器(线程)TCP 游戏。在尝试处理延迟问题时,我意识到我的 transmitState() 中存在缺陷。它强制将不必要的信息传递到通讯流中,从而造成迟缓,将汽
来自文档:Configurable token lifetimes in Azure Active Directory (Public Preview) 它提到“ secret 客户端”,刷新 tok
Apollo 客户端开发工具无法连接到我的应用程序。我已在 ApolloClient 构造函数中将 connectToDevTools 传递为 true,但没有任何 react 。我也试过this p
我想在 Pod 内使用 Fabric8 kubernetes 客户端 (java)。如何获取部署集群的 kubernetes 客户端? 我可以使用该集群的 kubeconfig 文件获取任何集群的配置
我正在阅读 the security issue with Log4j我了解此产品受此漏洞影响。但是 Oracle 客户端 11.2 和 12 是否受此问题影响? 我找不到这些产品是否使用任何 Log
Eureka 服务器设置 pom.xml 1.8 Hoxton.SR1 org.springframework.cloud spring
我有一个点对点(客户端/服务器)设置(通过本地 LAN),它使用 Netty,一个 Java 网络框架。我使用原始 TCP/IP(例如,没有 HTTP)进行通信和传输。现在,根据要求,我们希望转向 T
上一篇已经实现了ModbusTcp服务器和8个主要的功能码,只是还没有实现错误处理功能。 但是在测试客户端时却发现了上一篇的一个错误,那就是写数据成功,服务器不需要响应。 接下来要做的就是实现Modb
有没有办法将二维十六进制代码数组转换为 png 图像? 数组看起来像这样(只是更大) [ [ '#FF0000', '#00FF00' ], [ '#0000FF'
我是套接字编程的新手。每次我运行客户端程序时,它都会说“无法连接到服务器”。谁能告诉我我在哪里犯了错误。任何帮助将不胜感激。 这是client.c #include #include #inclu
我们在UNIX环境下制作了简单的client.c和server.c程序。我们使用它来传输一个简单的文本文件,首先打开它,然后读取它并使用 open、read 和 send 系统调用发送;在客户端,我接
当我的程序来自 my previous question正在响应客户端,它应该发送加密消息。 当客户端连接时,它会发送一条类似“YourMessage”的消息。现在我想做的是,当客户端连接时,应该以某
我正在使用 C 和 putty 编写客户端/服务器程序。两个 c 文件位于同一系统上。 我目前在向客户端写回其正在使用的框架以及打印我的框架时遇到问题。它打印出 3 0 9 8,但随后开始打印 134
我正在使用 C 中的 select() 制作一个模拟快餐或其他任何东西的客户端服务器。 我有客户随机点 1-5 种“食物”。服务器每 30 秒决定一次。所有客户最喜欢的食物是什么?他为那些客户提供服务
对于单机游戏,基本的游戏循环是(来源:维基百科) while( user doesn't exit ) check for user input run AI move enemies
1、CentOS安装TortoiseSVN 复制代码 代码如下: yum install -y subversion 2、SVN客户端命令
我是一名优秀的程序员,十分优秀!