-
-
Notifications
You must be signed in to change notification settings - Fork 69
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Choosing the right zone for each SAN when attaching validation records #62
Comments
For now, you may want to set the If that doesn't work, you can also set |
Ive been thinking of the interface. How's this one? domains = [
{
domain = "google.com"
zone_name = "google.com"
san = false
},
{
domain = "*.xyz.google.com"
zone_name = "google.com"
san = true
},
{
domain = "*.abc.google.com"
zone_name = "abc.google.com"
san = true
},
] |
it makes it much easier to read and configure +1 |
Or option 2 # same interface for these top inputs
domain_name = "google.com"
zone_name = "google.com"
# or zone_id
process_domain_validation_options = true
ttl = "300"
# this one can become a list(object)
subject_alternative_names = [
{
domain = "*.xyz.google.com"
zone_name = "google.com"
# or zone_id
},
{
domain = "*.abc.google.com"
zone_name = "abc.google.com"
# or zone_id
},
] |
Both look good to me. Testing alternative suggestions now |
What's odd to me is that 0.16.2 worked. It created validation records in all the right places. |
What's the status? 0.17.0 is broken in the multi-domain case (even worse if domains are very different in our case) |
@vzaitsev77 @apanzerj @jamengual while we come up with an implementation that works for everyone, have you tried overriding the |
For now, I've set e.g. module "acm_request_certificate_east_coast" {
source = "cloudposse/acm-request-certificate/aws"
# Cloud Posse recommends pinning every module to a specific version
version = "0.17.0"
# explicit zone_name should be applied to each SANs' validation
zone_name = "baz.bar.com"
domain_name = "foo.baz.bar.com"
process_domain_validation_options = true
ttl = "300"
subject_alternative_names = ["*.foo.baz.bar.com", "*.bar.com"]
} If we cannot verify the above works as expected with 0.17.0,, then we can merge this PR #66 to release |
Found a bug? Maybe our Slack Community can help.
Describe the Bug
When you have two SANs that belong to different zones, the module tries to add validation records to the incorrect zone.
Expected Behavior
It should add validation records to zones:
foo.baz.bar.com and bar.com
Steps to Reproduce
Steps to reproduce the behavior:
Say you have these two zones:
zone 1: bar.com
zone 2: foo.baz.bar.com
You want a cert that allows you to use both zones so you do this:
When I terraform apply, the module does a data lookup for the zone:
baz.bar.com
The expectation is that the zones it should look up:
foo.baz.bar.com
bar.com
Screenshots
N/A
Environment (please complete the following information):
Mac OS
Additional Notes
In chatting on Slack I suggested this:
Instead of trying to guess what zone to put each SAN in, just have the user specify it manually:
The text was updated successfully, but these errors were encountered: