-
Notifications
You must be signed in to change notification settings - Fork 301
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
azuread_application: unexpectedly has an 'exposed API' when viewed in the preview portal #73
Comments
I'm pretty sure the UPDATE |
Hi @katbyte, |
Hello, sorry for my ignorance, but why is this a issue? This has been the default for as long as I can remember:
Reference: |
Hi again, sorry for missing this:
The application ID in this context is also referred to as However I believe these are two different issues:
|
Thanks for raising this! As mentioned, the You will be able to override this with #252 by setting: resource "azuread_application" "example" {
name = "Example"
homepage = "https://example"
reply_urls = "https://example"
oauth2_permissions = []
} |
This has been released in version 0.10.0 of the provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. As an example: provider "azuread" {
version = "~> 0.10.0"
}
# ... other configuration ... |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 hashibot-feedback@hashicorp.com. Thanks! |
Community Note
Terraform 0.11.13 / Azure AD 0.2.0
Affected Resource(s)
azuread_application
Terraform Configuration Files
Expected Behavior
The Azure AD application created should have the specified API permissions when viewed in the preview portal
Actual Behavior
Although the application has the permissions specified, it also gains an 'exposed API' visible in the preview portal:
The exposed API correlates with the
41094075-9dad-400e-a0bd-54e686782033
permission (user_impersonation).The behaviour is definitely odd because an application ID is not set, so the portal displays an
undefined
prefix:Important Factoids
I'm reasonably certain this is a bug: adding these scopes shouldn't cause APIs to be exposed, and the scope is usable without the API exposed
Exposed APIs seem to be decided by this block of the manifest, which does not correlate with the attributes set in the HCL:
The big issue is tracking down where this issue is introduced, i.e. is it
Note
I can provide a debug log but it seems to be of limited use since it does not contain HTTP request bodies or their responses
The text was updated successfully, but these errors were encountered: