-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature: AWS Regional API Endpoints #2195
Comments
Would love to have this feature. |
Related to #2167 |
Just to clarify, would this make multi availability zone apigateways possible? I tried such a setup a while ago with terraform but hit a design limitation, if I remember correctly the exact issue that hindered my setup was that the api gateway cloudfront was owned by a service account and as such I couldn't add an Alternate Name to cloudfront to enable it to accept the apigateway url and my domain. Something along that. |
+1 for this feature. Need this sooner. |
@nikhil-p Here's how I'm doing it
You might also need
|
@jonathan-kosgei - Thanks for the reply, any templates for doing it in cloud formation? Also, how would i grab the target domain from the step above ? i would need that to create a cname. |
If you would like to be able to configure between REGIONAL and EDGE then using a null resource may be a better way to achieve the functionality. This allows for updates with the use of the trigger variable "endpoint_configuration_type" {
//REGIONAL or EDGE
default = "REGIONAL"
}
resource "null_resource" "endpoint_configuration" {
triggers {
endpoint_configuration_type = "${var.endpoint_configuration_type}"
}
provisioner "local-exec" {
command = "aws apigateway update-rest-api --rest-api-id ${aws_api_gateway_rest_api.api.id} --patch-operations op=replace,path=/endpointConfiguration/types/EDGE,value=${var.endpoint_configuration_type}"
}
} |
Thought I'd share how I got this working. Thanks to the other examples posted here!
|
These work arounds are okay for updating API Gateways in many regions, but they do not solve the problem in cn-north-1 where only regional API Gateways are supported (presumably since there is no CloudFront in China either). The API Gateway creation fails, so it cannot be updated afterward. If anyone knows a different workaround, I would love to hear it. I'll be watching this and the associated PR. |
+1 |
+1 |
+1 for this feature. Need it soon. |
|
+1 |
+1. Really hoping to see this as it's blocking us from migrating to Terraform for some of our config. |
+1 |
Totally forgot I created this feature request. Excited to start testing it out after PR #2866 it gets merged, which appears to be very soon. |
Support for managing regional REST APIs and domain names has been merged into master and will release with v1.20.0 of the AWS provider later this week. 🎉 |
This has been released in version 1.20.0 of the AWS provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
This issue was originally opened by @willfarrell as hashicorp/terraform#16576. It was migrated here as a result of the provider split. The original body of the issue is below.
Announcement: https://aws.amazon.com/about-aws/whats-new/2017/11/amazon-api-gateway-supports-regional-api-endpoints/
In short you can now terminate a certificate at the API endpoint in it's region instead of at the edge (which requires the cert to be from us-east-1).
The feature would apply too:
api_gateway_domain_name
/apigateway/home?region=us-west-2#/custom-domain-names
The text was updated successfully, but these errors were encountered: