Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

aws-acm-cert Add workaround for TF bug #138

Merged
merged 1 commit into from
Oct 4, 2019

Conversation

mbarrien
Copy link
Contributor

@mbarrien mbarrien commented Oct 3, 2019

Adds the ability for the user to specify the specific order they want for the certificate subject alternative names at a particular time applying. Unfortunately this cannot be a permanent workaround because of hashicorp/terraform-provider-aws#8531, meaning AWS will change the order arbitrarily on their own discretion although the order seems stable within short periods of time allowing the workaround to work. Because of this constantly changing order, just changing the type of cert_subject_alternative_names to a type that allows specifying ordering won't help. This workaround is only needed when the user starts providing more than 1 SAN for a cert.

In most cases, the user can omit this argument, but can possibly set a temporary one time value locally if only to get their PR to go through cleanly one time. Hopefully when Terraform or AWS fixes its bug, we won't need to change the module or its interface to support the fixed value.

@mbarrien mbarrien requested a review from a team as a code owner October 3, 2019 22:46
Copy link
Contributor

@edulop91 edulop91 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

😢 for some reason I thought they started doing sorting on the provider side

@mbarrien mbarrien merged commit f4e551e into master Oct 4, 2019
@mbarrien mbarrien deleted the mbarrien/acm-order-workaround branch October 4, 2019 20:20
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants