We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
terraform 1.9.5 azuread 3.0.2
azuread_directory_role
resource "azuread_directory_role" "example" { display_name = "Application Developer" }
https://gist.github.com/cveld/a49641198271a87ce18dc377c2f29680
The role provisioning should succeed.
The role provisioning resulted in an unexpected nil.
nil
terraform apply
It seems when I run this for roles that have identities assigned to, it runs fine. E.g. for Global Administrator I don't get any errors.
Global Administrator
The text was updated successfully, but these errors were encountered:
azuread_directory_role: fix for changes in Graph API: directoryRoles …
3af99e5
…with filter returns empty array instead of 404; fixes hashicorp#1526
Me too. I'm also getting this issue with the following versions:
$ terraform -version Terraform v1.6.6 on darwin_arm64 + provider registry.terraform.io/hashicorp/azuread v3.0.2 + provider registry.terraform.io/hashicorp/azurerm v3.105.0
Sorry, something went wrong.
Got the error for the Security Administrator role, using both display_name and template_id arguments, for versions 3.0.0, 3.0.1, and 3.0.2.
Security Administrator
display_name
template_id
3.0.0
3.0.1
3.0.2
No branches or pull requests
Community Note
Terraform (and AzureAD Provider) Version
terraform 1.9.5
azuread 3.0.2
Affected Resource(s)
azuread_directory_role
Terraform Configuration Files
Debug Output
https://gist.github.com/cveld/a49641198271a87ce18dc377c2f29680
Panic Output
Expected Behavior
The role provisioning should succeed.
Actual Behavior
The role provisioning resulted in an unexpected
nil
.Steps to Reproduce
terraform apply
Important Factoids
It seems when I run this for roles that have identities assigned to, it runs fine. E.g. for
Global Administrator
I don't get any errors.References
The text was updated successfully, but these errors were encountered: