-
Notifications
You must be signed in to change notification settings - Fork 155
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
aws.acm.Certificate subjectAlternativeNames order is not consistent and replaces on different order #1022
Comments
Unfortunately, this looks like a fairly deep issue upstream as discussed in hashicorp/terraform-provider-aws#8531 |
Thanks for the information and for the link. |
hashicorp/terraform-provider-aws#8531 is fixed and will be released next week. |
This will be fixed and released in the v3.0.0 release |
I'm still getting attempts to recreate a freshly created certificate due to |
Hi All My most sincere apologies for taking so long to circle back here. I have just tested this with the latest pulumi-aws (v3.17.0) and at some point this has actually been fixed and I have verified that is the case. import * as pulumi from "@pulumi/pulumi";
import * as aws from "@pulumi/aws";
import * as awsx from "@pulumi/awsx";
const x = new aws.acm.Certificate("demo", {
domainName: "my.zone",
validationMethod: "DNS",
subjectAlternativeNames: [
"one.my.zone",
"two.my.zone",
"three.my.zone",
]
});
export const options = x.domainValidationOptions; pulumi up yields:
A further Pulumi up yields the following:
I am going to close this issue out as this isn't repeatable here and has not been reported in the upstream provider again (AFAICT) Please do let us know if there are any issues Paul |
Version
Windows - v2.5.0
@pulumi/pulumi 2.5.0
@pulumi/aws 2.11.0
Description
I am creating a certificate with multiple (4) SAN entries.
I had noticed that I had to change the ordering of the subjectAlternativeNames value for the values to match pulumi's current state.
Otherwise on pulumi up, pulumi would detect changes and attempt to recreate the certificate, usually resulting in a situation that I need to manually intervene to fix (potentially due to a different route53.Record/acm.CertificateValidation issue).
This was a satisfactory workaround until I started to deploy to a new stack (environment).
In the other stack, the order of subjectAlternativeNames seems to be different again.
If I always use the same order (pre-sort), then pulumi wants to replace the Certificate on every update, as it thinks the value has changed.
I'm guessing this is due to how another API reports the SAN order.
The text was updated successfully, but these errors were encountered: