-
Notifications
You must be signed in to change notification settings - Fork 285
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
azuredevops_serviceendpoint_servicefabric - client_certificate not updated (due to bcrypt?) #613
Comments
@xuzhang3 - what can we do to address this, is there a different hashing mechanism that could be used? |
@hbuckle for other service connection with secret/password, this issue used to be an unnecessary set of the secret/password. I need to debug into it to find out why terraform ignore the changes. |
@hbuckle this is |
@xuzhang3 - yes that's what I assumed. The |
@hbuckle tend to remove the hash validator |
Community Note
Terraform (and Azure DevOps Provider) Version
Terraform v1.2.2
on windows_amd64
Affected Resource(s)
azuredevops_serviceendpoint_servicefabric
Terraform Configuration Files
Expected Behavior
Change the client_certificate to reference
string2
and runterraform plan
- the service endpoint should be updatedActual Behavior
No changes. Your infrastructure matches the configuration.
Important Factoids
I think this may be due to the bcrypt hashing mechanism being used - it seems bcrypt has a limit of 72 bytes for passwords.
In my real configuration the client_certificate comes from a key vault certificate - when it gets renewed the first part of the base 64 string representation of the certificate is the same as the previous version
The text was updated successfully, but these errors were encountered: