-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Import acm certificates #5453
Import acm certificates #5453
Conversation
…-acm-certificates
What is needed to get this merged? |
@bflad could you please check? |
Can you check and merge this, please. I'm very much interested in using the feature. |
@bflad Could you please merge this Pull Request. Thanks! |
Guys, please merge the PR! It's a very useful feature! |
👍 |
Is there any issue holding this PR back from being merged? If so, it would be great to see some feedback. |
Until this feature go live, I find no other option to generate / maintain a PCA signed certificate without importing via command line. Bump up and thanks. |
I look forwarding to see this merge |
@bflad sorry to ping you on this, but I've been getting email updates on this for months and it seems nobody from hashicorp has responded other than when you first tagged the issue back in august we'd love any update on if this can be merged, even a rejection or a status update would help thanks! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi @julienduchesne and everyone watching this pull request. 👋 Very sorry for the lengthy delay before review. ACM testing is a bit of a hassle at the moment since it requires real, public domains and working against ACM per year limitations. I was able to verify this, along with a variation of the bug fix #5472. Thanks so much @julienduchesne for your work here! 🚀
--- PASS: TestAccAWSAcmCertificate_dnsValidation (12.03s)
--- PASS: TestAccAWSAcmCertificate_emailValidation (11.90s)
--- PASS: TestAccAWSAcmCertificate_imported (10.15s)
--- PASS: TestAccAWSAcmCertificate_root (10.82s)
--- PASS: TestAccAWSAcmCertificate_root_TrailingPeriod (12.27s)
--- PASS: TestAccAWSAcmCertificate_rootAndWildcardSan (11.53s)
--- PASS: TestAccAWSAcmCertificate_san_multiple (16.44s)
--- PASS: TestAccAWSAcmCertificate_san_single (19.11s)
--- PASS: TestAccAWSAcmCertificate_san_TrailingPeriod (17.28s)
--- PASS: TestAccAWSAcmCertificate_tags (25.84s)
--- PASS: TestAccAWSAcmCertificate_wildcard (11.95s)
--- PASS: TestAccAWSAcmCertificate_wildcardAndRootSan (15.09s)
--- PASS: TestAccAWSAcmCertificateValidation_basic (150.56s)
--- PASS: TestAccAWSAcmCertificateValidation_timeout (14.90s)
--- PASS: TestAccAWSAcmCertificateValidation_validationRecordFqdns (167.04s)
--- PASS: TestAccAWSAcmCertificateValidation_validationRecordFqdnsRoot (143.35s)
--- PASS: TestAccAWSAcmCertificateValidation_validationRecordFqdnsRootAndWildcard (535.21s)
--- PASS: TestAccAWSAcmCertificateValidation_validationRecordFqdnsSan (160.54s)
--- PASS: TestAccAWSAcmCertificateValidation_validationRecordFqdnsWildcard (154.88s)
--- PASS: TestAccAWSAcmCertificateValidation_validationRecordFqdnsWildcardAndRoot (120.23s)
@@ -149,7 +210,11 @@ func resourceAwsAcmCertificateRead(d *schema.ResourceData, meta interface{}) err | |||
if err := d.Set("validation_emails", emailValidationOptions); err != nil { | |||
return resource.NonRetryableError(err) | |||
} | |||
d.Set("validation_method", resourceAwsAcmCertificateGuessValidationMethod(domainValidationOptions, emailValidationOptions)) | |||
|
|||
if _, ok := d.GetOk("validation_method"); ok { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Found during testing: wound up switching validation_method
to Computed: true
(for now) instead of using this, since it breaks Terraform resource import functionality for this attribute.
This has been released in version 1.54.0 of the AWS provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
Redo of PR #5002
Fixes #3560
Changes proposed in this pull request:
aws_acm_certificate
resource, to do so:certificate_body
,certficate_chain
andprivate_key
arguments for theaws_acm_certificate
resource.Output from acceptance testing: