azurerm_role_assignment - fix id parsing for root or provider scoped role assignments#27237
Conversation
|
@stephybun @catriona-m I am taging you because you were involved in the original PR. |
stephybun
left a comment
There was a problem hiding this comment.
Thanks for this PR @Felix-Franz.
I'm wondering whether the parser used in the delete call might also require an update? Looking at what it's doing I believe it will be fine, but since our testing credentials lack the privileges to create role assignments on these scopes, it'd help us out if you could confirm whether with this fix you can also delete the role assignments without issue?
Co-authored-by: stephybun <steph@hashicorp.com>
stephybun
left a comment
There was a problem hiding this comment.
Thanks @Felix-Franz LGTM 🏖️
|
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active contributions. |
Community Note
Description
With the azurerm_role_assignment resource it is possible to make RBAC assignments on root or resource provider scope.
The functionality was added in #26663.
The creation succeeds, but the provider cannot parse the resource ID from the ARM-response.
Following error is displayed:
The PR is intended to fix the parsing of the resource ID and thus enable an assignment on root or resource provider scope.
PR Checklist
For example: “
resource_name_here- description of change e.g. adding propertynew_property_name_here”Changes to existing Resource / Data Source
Testing
Change Log
Below please provide what should go into the changelog (if anything) conforming to the Changelog Format documented here.
azurerm_resource- support for thething1property [GH-00000]This is a (please select all that apply):
Related Issue(s)
Fixes #0000
Note
If this PR changes meaningfully during the course of review please update the title and description as required.