-
Notifications
You must be signed in to change notification settings - Fork 340
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: Add key vault to cognitive service - avm/res/cognitive-services/account
#1932
fix: Add key vault to cognitive service - avm/res/cognitive-services/account
#1932
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hey @Agazoth thanks for the active contribution, keep it up 💪
A general comment from my side:
Adding resource types which are not part of the primary resource type hierarchy of the module is usually borderline a resource module. In many cases, while discussing, we can realize that a pattern (ptn) module would be a better fit. Since this is the second PR with a similar approach, I'd suggest to open a GitHub issue explaining the intention of this addition, so that we can discuss there and identify for example:
- which module type would be the best fit (res or ptn)
- the best way to implement (naming, interface etc)
- plan accordingly if needed to be adopted by other modules.
There is a discussion about the right approach for resources that emit secrets: #1934 - posting here for visibility |
avm/res/cognitive-services/account
Discussion still ongoing #1934 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
No doubts. After reading through the discussion - I agree on all points from the arrived upon option and implementation.
@Agazoth PR looks good to me
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'll merge the PR in once #3038 is merged as the pipeline will otherwise fail
@ChrisSidebotham / @jtracey93 / @eriqua a review would be much appreciated :)
#3038 has merged @AlexanderSehr The pipeline badge is red @Agazoth |
@Agazoth, I believe it's an issue a Re-Run of the failed job should fix. That said, I'd also recommend to re-run the |
@Agazoth, All workflows have a trigger on main as that's what kicks the publishing off. As re-syncs with upstream are not unheard of, we created the linked workflow (you can find in your list of workflows in your fork) to disable all workflows. This has the benefit that you can enable individual workflows as you need them, while no others are triggered - ever again. 💪 |
You are absolutely right, @AlexanderSehr and thank you for this! I have become pretty shavvy with the github cli now though 😄 - right now I am trying to convince Github actions to use a new subscription (I updated the Secrets with a new subscriptionid) but it is as if the old subscriptionid is stuck somewhere, and my google-fu seems to be weak today. There is no obvious setting that either cashes or force updates the secrets used in the workflow. |
That's indeed strange. Once you update the secrets, it should pick up on the new subscription immediately. :o |
I think I have to file a bug report at Github. I have tried just about everything - including deleting - and the Action still knows the old subscriptionid. However much I wnat to close this PR now, it seems to have to wait until that wierd issue is solved. I'll follow up and update here once the issue is solved and the pipeline runs. |
@Agazoth while you're try to resolve this - we could also take a detour and merge your PR into a branch in upstream from where I re-test it - and re-open it as a new PR. Git-history-wise you'd still be the author. |
I would be perfectly fine with that 😃 |
Off we go then. |
eb86faf
into
Azure:users/alsehr/Agazoth/AddKVToCognitiveService
@AlexanderSehr I figured it out. I only updated the subscription in ARM_SUBSCRIPTION_ID without updating the AZURE_CREDENTIALS. RTFM is still a thing, I guess 😆 - maybe AZURE_CREDENTIALS should only contain secrets not already covered by other secrets? |
Hey @Agazoth, |
That is awesome! |
…account (#3222) ## Description Follow-up to: #1932 cc: @Agazoth | Pipeline | | -------- | [![avm.res.cognitive-services.account](https://github.com/Azure/bicep-registry-modules/actions/workflows/avm.res.cognitive-services.account.yml/badge.svg?branch=users%2Falsehr%2FAgazoth%2FAddKVToCognitiveService&event=workflow_dispatch)](https://github.com/Azure/bicep-registry-modules/actions/workflows/avm.res.cognitive-services.account.yml) ## Type of Change <!-- Use the check-boxes [x] on the options that are relevant. --> - [ ] Update to CI Environment or utlities (Non-module effecting changes) - [x] Azure Verified Module updates: - [x] Bugfix containing backwards compatible bug fixes, and I have NOT bumped the MAJOR or MINOR version in `version.json`: - [ ] Someone has opened a bug report issue, and I have included "Closes #{bug_report_issue_number}" in the PR description. - [ ] The bug was found by the module author, and no one has opened an issue to report it yet. - [ ] Feature update backwards compatible feature updates, and I have bumped the MINOR version in `version.json`. - [ ] Breaking changes and I have bumped the MAJOR version in `version.json`. - [ ] Update to documentation ## Checklist - [x] I'm sure there are no other open Pull Requests for the same update/change - [x] I have run `Set-AVMModule` locally to generate the supporting module files. - [x] My corresponding pipelines / checks run clean and green without any errors or warnings <!-- Please keep up to day with the contribution guide at https://aka.ms/avm/contribute/bicep --> --------- Co-authored-by: Axel B. Andersen <axel.boeg.andersen@atea.dk> Co-authored-by: Javier Cevallos <javier.cevallos@microsoft.com>
Description
Add option for outputting keys to key vault
Pipeline Reference
Type of Change
version.json
:version.json
.version.json
.Checklist
Set-AVMModule
locally to generate the supporting module files.