-
Notifications
You must be signed in to change notification settings - Fork 155
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ACM Certificate Replace subjectAlternativeNames #1384
Comments
What property does the update say has changed, and from what to what? Can you share the preview --diff output? |
For sure!...some names have been replaced with generic.
The code block for cert (did not change..was just adding a new bucket policy)..
|
Experiencing the same. Issues still seems to exist on pulumi version v3.36.0. Any updates on a solution / workaround?
Even get it when just feeding in one value into the |
If anyone has an example program here to reproduce, that would make it much easier. Thank you! |
Not 100% sure anymore. Would have a hard time to repro the scenario again today. But don't want to leave it unanswered: It must have been in the broader context of providing certs to pulumi-helm (very vague, I know). As said not sure but hope that it helps, must have been something similar to this that produced the issue: const cert = new aws.acm.Certificate(`myservice-certificate`, {
domainName: `myService.myDomainName`,
validationMethod: "DNS",
subjectAlternativeNames: [`${config.targetDomain}`]
});
const validationRecord = new aws.route53.Record(
`myservice-certificate-validation-record`,
{
type: aws.route53.RecordType.CNAME,
name: recordName,
records: [recordValue],
zoneId,
ttl: 1800,
});
const configCertValidation = new aws.acm.CertificateValidation(
`myservice-certificate-validation`,
{
certificateArn: cert.arn,
}
);
|
Closing this as stale as we still couldn't quite reproduce. If you're experiencing something similar, opening a new issue with a self-contained repro would be very helpful! |
Running a new
pulumi preview
against my 2 SAN's results in Pulumi wanting to replace my Certificate.I've noticed a past issue #1022 but that was closed and resolved.
I'm on the latest versions:
v2.22.0
@pulumi/aws@3.32.0
Expected behavior
Expected behavior is to not detect any changes. List has stayed static. No changes between up / preview
Current behavior
Pulumi tries to replace resource.
The text was updated successfully, but these errors were encountered: