-
-
Notifications
You must be signed in to change notification settings - Fork 230
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Allow multiple domains in a single certificate #149
feat: Allow multiple domains in a single certificate #149
Conversation
…llow_multiple_zones # Conflicts: # wrappers/main.tf
Hi @antonbabenko, is there a chance of resuming the review that you left on #137 here? |
Thank you @alemarmed for doing this, I totally dropped the ball on the #137 but glad you created this because now I'm needing this again 🤣. |
Would also love to see this feature merged! :) |
@bryantbiggs any chance you can check this out? Thanks! |
This PR has been automatically marked as stale because it has been open 30 days |
This would be amazing to have, commenting to keep it alive |
This PR has been automatically marked as stale because it has been open 30 days |
It would be great to have this feature! |
Waiting for this. It has been open since March, can a maintainer please review? |
@bryantbiggs @antonbabenko any chance you can review/merge this 🙏? Thanks! |
This PR has been automatically marked as stale because it has been open 30 days |
Another bump to prevent this PR from being stale. Really wish the maintainer would provide feedback here :( |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, it works! Thanks to everyone involved.
## [5.1.0](v5.0.1...v5.1.0) (2024-08-13) ### Features * Allow multiple domains in a single certificate ([#149](#149)) ([54e5422](54e5422))
This PR is included in version 5.1.0 🎉 |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
This is a follow up of #137
Credits to @amontalban for the work, I made requested changes and tested the feature.
Description
This PR allows creating one ACM certificate for multiple domains, which, is useful when using the certificate for CloudFront that only allows one certificate per distribution.
Motivation and Context
CloudFront does not support multiple ACM certificates, like ALB. Therefore, if you need to support multiple domains in a single CloudFront distribution you would have to create the certificate manually because this module does not support it.
Breaking Changes
This change should be backward compatible as I added a zones var containing a map with domains and their Route53 zone ID so the validation records are created in the correct Route53 zone.
Additionally, I have updated the tests in examples/complete-dns-validation to allow variables so it was easier for me (and others) to test with my test domains.
How Has This Been Tested?
examples/*
to demonstrate and validate my change(s)examples/*
projectspre-commit run -a
on my pull requestFixes #136