-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New Resource and Data Source: aws_acmpca_certificate_authority #4458
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM! I'm just curious about a couple of things but you can merge it!
} | ||
|
||
d.Set("certificate", "") | ||
d.Set("certificate_chain", "") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Same as above
} | ||
} | ||
|
||
d.Set("certificate", "") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I haven't seen this before. What's the reasoning behind resetting this value?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ah yes! This allows folks to reference the potentially missing attribute until a certificate is imported into the certificate authority, which is a manual step for now. Mainly thinking about the case of an output
for a module that is also creating the certificate authority. Without doing this, Terraform will return a attribute 'certificate' does not exist
error until the CA certificate is imported, which means creating a module wouldn't necessarily be possible if I'm thinking about this correctly.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Makes sense to me!
|
||
* `key_algorithm` - (Required) Type of the public key algorithm and size, in bits, of the key pair that your key pair creates when it issues a certificate. Valid values can be found in the [ACM PCA Documentation](https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CertificateAuthorityConfiguration.html). | ||
* `signing_algorithm` - (Required) Name of the algorithm your private CA uses to sign certificate requests. Valid values can be found in the [ACM PCA Documentation](https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CertificateAuthorityConfiguration.html). | ||
* `subject` - (Required) Nested argument that contains X.500 distinguished name information |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The attributes for subject
are all optional but subject
itself is required. Are one of these attributes required when you create this resource?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ha yup, I missed adding that bit to the documentation. Great catch!
* aws_acmpca_certificate_authority.test: error creating ACMPCA Certificate Authority: ValidationException: 1 validation error detected: The subject must have at least one attribute set.
status code: 400, request id: afff1cd3-5b85-4d7e-abc3-06a14aecc2c7
…ificate_authority_configuration and subject, clarify subject requirement in documentation
Update passes TravisCI and acceptance testing, merging!
|
This has been released in version 1.18.0 of the AWS provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
Closes #4059