Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

azurerm_key_vault_certificate: fixed 'Unknown' issuer not working Issue #5589 #6979

Merged
merged 1 commit into from May 25, 2020
Merged

Conversation

ThomasZeman
Copy link

@ThomasZeman ThomasZeman commented May 18, 2020

The 'Unknown' issuer certificate workflow does not create a "ready to use" but pending certificate which needs to get signed. Until then it will not have a SID which is the reason why the current code times out waiting for a SID to become available (Refer to https://github.com/terraform-providers/terraform-provider-azurerm/blob/master/azurerm/internal/services/keyvault/key_vault_certificate_resource.go#L445).

In this workflow, the user needs to manually download a certificate signing request (CSR file) from the portal and get it signed by an external CA (upload the CSR there and so on). Because of this the azurerm resource for an unknown issuer is finished with its work as soon as the certificate exists which is the case when the go client receives http status code 200. (Refer to https://github.com/Azure/azure-sdk-for-go/blob/master/services/keyvault/2016-10-01/keyvault/client.go#L1303 )

All possible issuers are:

  • self: For self signed certificates (this works and is well tested)
  • < CA Alias configured in Azure >: CA configured in Azure with user's CA account name and password. Azure can then automatically request signing and renewing certificates
  • Unknown: Users need to take care that certificates get signed externally

@ghost ghost added the size/M label May 18, 2020
@ThomasZeman ThomasZeman changed the title Fixed 'Unknown' issuer not working Issue #5589 azurerm_key_vault_certificate: fixed 'Unknown' issuer not working Issue #5589 May 18, 2020
Copy link
Member

@tombuildsstuff tombuildsstuff left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

hey @ThomasZeman

Thanks for this PR - taking a look through this is looking good - if we can fix up the crash point then this otherwise LGTM 👍

Thanks!

Copy link
Member

@tombuildsstuff tombuildsstuff left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM - thanks for pushing that change @ThomasZeman

@tombuildsstuff
Copy link
Member

Acceptance Tests pass:

Screenshot 2020-05-25 at 16 31 00

@tombuildsstuff tombuildsstuff merged commit fd770c4 into hashicorp:master May 25, 2020
tombuildsstuff added a commit that referenced this pull request May 25, 2020
@ghost
Copy link

ghost commented May 28, 2020

This has been released in version 2.12.0 of the provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. As an example:

provider "azurerm" {
    version = "~> 2.12.0"
}
# ... other configuration ...

pbrit pushed a commit to pbrit/terraform-provider-azurerm that referenced this pull request May 31, 2020
@ghost
Copy link

ghost commented Jun 24, 2020

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.

If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 hashibot-feedback@hashicorp.com. Thanks!

@hashicorp hashicorp locked and limited conversation to collaborators Jun 24, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants