-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
r/aws_cognito_user_pool_domain - add update functionality for certificate_arn #25275
Conversation
Hey @austinvalle 👋 Thank you very much for your contribution! At times, our maintainers need to make direct edits to pull requests in order to help get it ready to be merged. Your current settings do not allow maintainers to make such edits. To help facilitate this, update your pull request to allow such edits as described in GitHub's Allowing changes to a pull request branch created from a fork documentation. (If you're using a fork owned by an organization, your organization may not allow you to change this setting. If that is the case, let us know.) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Welcome @austinvalle 👋
It looks like this is your first Pull Request submission to the Terraform AWS Provider! If you haven’t already done so please make sure you have checked out our CONTRIBUTING guide and FAQ to make sure your contribution is adhering to best practice and has all the necessary elements in place for a successful approval.
Also take a look at our FAQ which details how we prioritize Pull Requests for inclusion.
Thanks again, and welcome to the community! 😃
@@ -60,6 +62,10 @@ func ResourceUserPoolDomain() *schema.Resource { | |||
Computed: true, | |||
}, | |||
}, | |||
CustomizeDiff: customdiff.ForceNewIfChange("certificate_arn", func(_ context.Context, old, new, meta interface{}) bool { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
not needed if you removed ForceNew
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
So I added this ForceNewIfChange
to prevent the update function being ran in these two specific edge cases, which result in an error from the AWS API:
- A custom domain was initially set with a certificate arn, then was removed (this triggers an update to set the certificate ARN to blank, which will cause an error)
- A custom domain was not initially set with a certificate arn, then one is added (this indicates that there wasn't a custom domain, which means it must be fully destroyed and re-created to add the cert arn)
If there is an easier way to do this outside of the ForceNewIfChange
, or if we don't think it's necessary, I can remove it.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@DrFaust92 Friendly ping 😄 , do you think the above use-cases are valid? Or should I remove the CustomizeDiff
function?
Looks good austinvalle, see minor comment |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
certificate_arn
can only be changed to a different ARN, it cannot be added or removed or it will force a re-create of the resource.Community Note
Closes #14733
Output from acceptance testing: