Closed websolut closed 1 year ago
I apologize I will close this ticket as it seems the issue is related to azurerm provider upgrade (SAS token was generated differently) with a newer version.
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.
Is there an existing issue for this?
Community Note
Terraform Version
v1.5.7
AzureRM Provider Version
3.57
Affected Resource(s)/Data Source(s)
azurerm_windows_virtual_machine_scale_set
Terraform Configuration Files
Debug Output/Panic Output
Expected Behaviour
Extensions should not be reinstalled.
Actual Behaviour
We noticed: We get the SAS token from a key vault. In the state we can see it in a json format (with some escapes):
"value": "?sv=2018-11-09\u0026sr=c\u0026st=2023-08-29T15:10:38Z\u0026se=2024-09-01T15:10:38Z\u0026sp=racwdl\u0026spr=https\u0026sig=R**",
Extension state we see even more escapes:
"protected_settings": "{\"configurationUrlSasToken\":\"?sv=2018-11-09\\u0026sr=c\\u0026st=2023-08-29T15:10:38Z\\u0026se=2024-09-01T15:10:38Z\\u0026sp=racwdl\\u0026spr=https\\u0026sig=R**\"}",
What we noticed with those strange TF apply runs is that state files for extensions had some additional encodings (%3A instead of ':' ):
"protected_settings": "{\"configurationUrlSasToken\":\"?sv=2018-11-09\\u0026sr=c\\u0026st=2023-08-29T15%3A10%3A38Z\\u0026se=2024-09-01T15%3A10%3A38Z\\u0026sp=racwdl\\u0026spr=https\\u0026sig=R**\"}",
We had to manually edit the state file with a lot of environments to make sure that TF does not envisage any changes related to this extension.
Steps to Reproduce
We are not sure about why this issue appears. We only use Azure devops to run TF.
Important Factoids
No response
References
No response