-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
azurerm_app_service_custom_hostname_binding
: support for the ssl_state
and thumbprint
properties
#4204
azurerm_app_service_custom_hostname_binding
: support for the ssl_state
and thumbprint
properties
#4204
Conversation
azurerm_app_service_custom_hostname_binding
: support for the ssl_state
and thumbprint
propertiesazurerm_app_service_custom_hostname_binding
: support for the ssl_state
and thumbprint
properties
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM - thanks for this @joakimhellum-in
Taking a look at the failing Travis tests here this is because this is based on top of master from when |
hey @joakimhellum-in Sorry it's taken a while to get to the tests for this - I've run them and they look good:
Thanks! |
This has been released in version 1.35.0 of the provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. As an example: provider "azurerm" {
version = "~> 1.35.0"
}
# ... other configuration ... |
@tombuildsstuff this actually breaks existing usage of the hostname binding where the certs are being updated out-of-band (e.g. via Let's Encrypt and build automation). Do you think the provider should handle this scenario (possibly by ignoring the diff if ssl_state and/or thumbprint aren't specified)? edit to add: It's easy to work around with |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 hashibot-feedback@hashicorp.com. Thanks! |
Depends on #4192 (because it uses the
azurerm_app_service_certificate
resource in the test).Fixes #1136 (together with #4192).
Not sure about preferred method to generate certificates for tests (private key, self-signed certificate and then the PFX). Have added a test that uses Key Vault to achieve this. Any advice is appreciated.