Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: added dynamic_keyvault_certificates to caf_solution #449

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

nusrath432
Copy link

Issue-ID: 447

PR Checklist


  • I have updated the documentation accordingly.
  • I have added tests to cover my changes.
  • All new and existing tests passed.
  • My code follows the code style of this project.
  • I ran lint checks locally prior to submission.
  • Have you checked to ensure there aren't other open Pull Requests for the same update/change?

Description

dynamic_keyvault_certificates have been added to v.5.6.1 modules.

Does this introduce a breaking change

  • YES
  • NO

Testing

Define a *.tfvars as:

dynamic_keyvault_certificates = {
  my_kv_name = {
    dynamic_certificate_pem = {
      secret_name = "my-secret-name"
      contents    = "<base64 encoded pem>"
    }
  }
}

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why do you add the module "dynamic_keyvault_certificates" in the caf solution?

I would assume it can be be handled in the aztfmod module directly.

The only reason we put the dynamic_keyvault_secrets into caf_solution is to prevent circular references and to be able to include in a secret value any output attribute of the aztfmod module. Looks like it is not required for the certificates.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@LaurentLesle I was just following the pattern. If not here, can you identify the location within the modules where this should be implemented, please.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The reason dynamic secrets was done that way was to have the option to inject as a keyvault secret's value any output object's attribute from the aztfmod module. Based on my deeper review of your PR is looks like it is only the outcome of the self_signed cert that you may want to add as a certificate value. In that case it can be handled within the module and terraform will deal with the dependencies.

image

Either you propose an update or I can submit a PR and share it with you for review

@LaurentLesle LaurentLesle added the question Further information is requested label Jul 4, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
question Further information is requested
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants