You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I see a couple problems with automagically treating a subject with a wildcard as a claims matching expression and otherwise using the existing property:
This is a breaking change for anyone who currently has a * or a ? in their sub claim
The claims matching language is complex enough that this doesn't cover its full capabilities. For example claims['job_workflow_ref'] eq 'foo-org/bar-repo/.github/workflows/deploy_prod.yml@refs/heads/main' is valid, requires using a claims matching expression (can't get this effect using the existing property), and doesn't contain any wildcards
I propose doing this:
resourceazuread_application_federated_identity_credential"example" {
...claims_matching_expression {
value="a valid claims matching expression"language_version=1// also defaults to 1 if not provided
}
}
I agree, making subject dual use is problematic. We probably want to be explicit about what we intend, either subject or claims_matching_expression and make sure they are considered mutually exclusive. @smmckay's suggested introduction of a block is most aligned with our existing implementation which uses a local exec to post json payloads:
Community Note
Description
Microsoft has introduced the support for flexible FIC (i.e., wildcards for the subject field)
New or Affected Resource(s)
Potential Terraform Configuration
I don't think that the terraform configuration will change, the user would pass in a string with a wildcard in the
subject
argument.References
The text was updated successfully, but these errors were encountered: