Open Darkfogel opened 6 days ago
The azuread_service_principal_password.password-1.start_date
is not fully compatible with the expiration_date, which requires an expiration UTC datetime (Y-m-d'T'H:M:S'Z'). Try using formatdate to convert the Azure AD time to the required expiration date format.
The
azuread_service_principal_password.password-1.start_date
is not fully compatible with the expiration_date, which requires an expiration UTC datetime (Y-m-d'T'H:M:S'Z'). Try using formatdate to convert the Azure AD time to the required expiration date format.
Thank you for your answer. I will try that.
Is it a new behavior? It's been working quite nicely for the past year and a half.
@Darkfogel I believe it's a breaking change in the AzureAD provider or the azure application API. There's a related issue.: https://github.com/hashicorp/terraform-provider-azuread/issues/1545.
Is there an existing issue for this?
Community Note
Terraform Version
1.9.8
AzureRM Provider Version
4.8.0
Affected Resource(s)/Data Source(s)
azurerm_key_vault_secret
Terraform Configuration Files
Debug Output/Panic Output
Expected Behaviour
The azurerm_key_vault_secret_password is updated, and the next plan shows no changes
Actual Behaviour
After the apply, the next plan shows the exact same changes, as if nothing was actually changed.
Terraform will perform the following actions:
azurerm_key_vault_secret.password_in_keyvault["kv1"] will be updated in-place
~ resource "azurerm_key_vault_secret" "password_in_keyvault" { ~ expiration_date = "2026-11-01T17:59:05Z" -> "2026-11-01T17:59:04.9661444Z" id = "xxxxxxxx" name = "xxxxxxxx" ~ not_before_date = "2024-11-01T17:59:05Z" -> "2024-11-01T17:59:04.9661444Z"
(7 unchanged attributes hidden)
Steps to Reproduce
Important Factoids
No response
References
No response