Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: handle viewer_certificate.ssl_support_method with CF default certificate #213

Merged
merged 3 commits into from
Jan 27, 2022

Conversation

syphernl
Copy link
Contributor

@syphernl syphernl commented Jan 25, 2022

what

  • Sets ssl_support_method to null when default certificate is being used instead of setting it to sni-only in all cases.

why

  • Setting this to an explicit value (sni-only) in conjunction with the "default certificate" results in the state not being idempotent.

references

@syphernl syphernl requested review from a team as code owners January 25, 2022 09:41
@syphernl syphernl requested review from adamcrews and leb4r and removed request for a team January 25, 2022 09:41
@korenyoni
Copy link
Member

/test all

@korenyoni korenyoni added patch A minor, backward compatible change bug 🐛 An issue with the system labels Jan 26, 2022
@@ -463,7 +463,7 @@ resource "aws_cloudfront_distribution" "default" {

viewer_certificate {
acm_certificate_arn = var.acm_certificate_arn
ssl_support_method = "sni-only"
ssl_support_method = local.use_default_acm_certificate ? null : "sni-only"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

#208

Does null behave differently than "" ? in terms of how the provider validates this field?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Unfortunately yes. Providing "" results in it complaining you need to provide one of the two valid values. However sni-only causes issues with CF-issued certificates which works fine with null.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Right I believe because it's an optional value it'll be fine, but "" is subject to the validation method https://github.com/hashicorp/terraform-provider-aws/blob/c47375e5482213883df51795322e2e2b55bc9348/internal/service/cloudfront/distribution.go#L694

korenyoni
korenyoni previously approved these changes Jan 26, 2022
Copy link
Member

@korenyoni korenyoni left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM.

@korenyoni
Copy link
Member

/test terratest

@mergify mergify bot dismissed korenyoni’s stale review January 27, 2022 16:25

This Pull Request has been updated, so we're dismissing all reviews.

@korenyoni
Copy link
Member

/test all

@korenyoni korenyoni added the no-release Do not create a new release (wait for additional code changes) label Jan 27, 2022
@korenyoni korenyoni merged commit 076c5bf into cloudposse:master Jan 27, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug 🐛 An issue with the system no-release Do not create a new release (wait for additional code changes) patch A minor, backward compatible change
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants