-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[WIP] ACM Certificate: sort domain validation options by domain name #8657
Conversation
Question: Would it make sense for the domain validations to be ordered by the matching order in |
It might be worth mentioning in the release notes that users may see a change in ordering the first time they plan and apply after upgrading the provider, especially since the original issue is only impacting certain regions. |
^ Yes, this definitely shouldn’t be Thank you for doing this though!! |
@ddfreyne Thanks for your constructive feedback. I have opened a PR that includes your suggestion to sort domain validation options (DVOs) according to the ordering of the subject alternative names (SANs) (#8708). The current PR suggests to ignore the problem of unsorted SANs and only sort the domain validation names (the SANs could be ignored with I have a slight preference for #8708 because it keeps both attribute sets consistent and won't require Please let me know what you think. |
Thanks, we can really benefit from this fix... we have many people running applies many times a day and each time they see the ACM change they hit the breaks and start asking around. Sinks a bit of time throughout the week! :-) |
@jtsaito, @tdmalone I'd like to comment that I think that a SANs fix is needed as well. The |
@jonseymour I believe the alternative PR mentioned above - #8708 - covers that |
@tdmalone Understood. My point is that i think #8708 should not be rejected in favour of this PR, because I don't think this PR alone is sufficient to address all the issues raised by the recent change in AWS behaviour - the other issues are real and need to be addressed, otherwise manual, out of band, workarounds will be required in a variety of scenarios which would be counter to the purpose of using terraform in the first place. |
I'm closing this PR. According to https://github.com/mlafeldt a fix for the issue should be rolled out by AWS until about 1. June 2019. Also, #8708 would now definitely a better solution. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
This PR ads a fix for #8531.
Domain validation options (DVOs) are sorted to guarantee the same order even when the AWS API returns them jumbled up. To order imposed is as follows: (1) the certificate's domain name comes first, (2) the remaining options are sorted by their respective
domain_name
attribute alphabetically.This PR does not address the issue of unsorted
subject alternative names
. However, these may be ignored by lifecycleignore_changes
.I have included unit tests but I'm not sure if they belong here at all.
I would be grateful if someone could run the acceptance tests.
Community Note
Fixes: #8531
Release note for CHANGELOG:
Output from acceptance testing:
I did not run the acc tests on this because I did not want to run the email validation. However, I tested the implementation by compiling and using it.