Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

azurerm_app_service_custom_hostname_binding: support for the ssl_state and thumbprint properties #4204

Merged
merged 3 commits into from Oct 2, 2019
Merged

Conversation

joakimhellum
Copy link

Depends on #4192 (because it uses the azurerm_app_service_certificate resource in the test).
Fixes #1136 (together with #4192).

Not sure about preferred method to generate certificates for tests (private key, self-signed certificate and then the PFX). Have added a test that uses Key Vault to achieve this. Any advice is appreciated.

@joakimhellum joakimhellum changed the title [WIP] azurerm_app_service_custom_hostname_binding: support for the ssl_state and thumbprint properties azurerm_app_service_custom_hostname_binding: support for the ssl_state and thumbprint properties Sep 1, 2019
@joakimhellum joakimhellum marked this pull request as ready for review September 1, 2019 19:07
Copy link
Member

@tombuildsstuff tombuildsstuff left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM - thanks for this @joakimhellum-in

@tombuildsstuff tombuildsstuff added this to the v1.34.0 milestone Sep 2, 2019
@tombuildsstuff
Copy link
Member

Taking a look at the failing Travis tests here this is because this is based on top of master from when git.apache.org was being used as a dependency source; so this should be safe to ignore 👍

@tombuildsstuff tombuildsstuff modified the milestones: v1.34.0, v1.35.0 Sep 13, 2019
@tombuildsstuff
Copy link
Member

hey @joakimhellum-in

Sorry it's taken a while to get to the tests for this - I've run them and they look good:

$ ARM_TEST_APP_SERVICE=**** ARM_TEST_DOMAIN=**** acctests azurerm TestAccAzureRMAppServiceCustomHostnameBinding
=== RUN   TestAccAzureRMAppServiceCustomHostnameBinding
=== RUN   TestAccAzureRMAppServiceCustomHostnameBinding/basic
=== RUN   TestAccAzureRMAppServiceCustomHostnameBinding/basic/multiple
=== RUN   TestAccAzureRMAppServiceCustomHostnameBinding/basic/requiresImport
=== RUN   TestAccAzureRMAppServiceCustomHostnameBinding/basic/ssl
=== RUN   TestAccAzureRMAppServiceCustomHostnameBinding/basic/basic
--- PASS: TestAccAzureRMAppServiceCustomHostnameBinding (447.88s)
    --- PASS: TestAccAzureRMAppServiceCustomHostnameBinding/basic (447.88s)
        --- SKIP: TestAccAzureRMAppServiceCustomHostnameBinding/basic/multiple (0.00s)
            resource_arm_app_service_custom_hostname_binding_test.go:112: Skipping as "ARM_ALT_TEST_DOMAIN" is not specified
        --- SKIP: TestAccAzureRMAppServiceCustomHostnameBinding/basic/requiresImport (0.00s)
            resource_arm_app_service_custom_hostname_binding_test.go:81: Skipping since resources aren't required to be imported
        --- PASS: TestAccAzureRMAppServiceCustomHostnameBinding/basic/ssl (293.02s)
        --- PASS: TestAccAzureRMAppServiceCustomHostnameBinding/basic/basic (154.86s)
PASS
ok  	github.com/terraform-providers/terraform-provider-azurerm/azurerm	447.924s

Thanks!

@tombuildsstuff tombuildsstuff merged commit c82e300 into hashicorp:master Oct 2, 2019
tombuildsstuff added a commit that referenced this pull request Oct 2, 2019
@ghost
Copy link

ghost commented Oct 4, 2019

This has been released in version 1.35.0 of the provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. As an example:

provider "azurerm" {
    version = "~> 1.35.0"
}
# ... other configuration ...

@phekmat
Copy link
Contributor

phekmat commented Oct 28, 2019

@tombuildsstuff this actually breaks existing usage of the hostname binding where the certs are being updated out-of-band (e.g. via Let's Encrypt and build automation). Do you think the provider should handle this scenario (possibly by ignoring the diff if ssl_state and/or thumbprint aren't specified)?

edit to add: It's easy to work around with ignore_changes, I'm just wondering if the provider should handle it since it seems like typical usage.

@ghost
Copy link

ghost commented Nov 2, 2019

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.

If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 hashibot-feedback@hashicorp.com. Thanks!

@ghost ghost locked and limited conversation to collaborators Nov 2, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

SSL Certificate support for app service
4 participants