Open chroche opened 4 years ago
Marking this issue as stale due to inactivity. This helps our maintainers find and focus on the active issues. If this issue receives no comments in the next 30 days it will automatically be closed. Maintainers can also remove the stale label.
If this issue was automatically closed and you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thank you!
The certificates aren't stored as hashes anymore, but the issue stays the same. DescribeCertificate
does not return CertificateBody
, CertificateChain
or PrivateKey
.
So, in order to ensure the imported certificate matches the defined resource, we would probably need to validate that the resource attributes (certificate_body
, certificate_chain
, private_key
) match each other and only then compare the certificates Serial
with the one returned by DescribeCertificate
.
Hello Team,
We are experiencing the same issue in one of our current use case, Kindly let us know if this has been fixed?? or the Bug is Still Open??
hi Team
On running terraform plan command i am able to see complete value (string) of my certificate. So how can i hide this.
this is indeed a bug and we have to manually update the state file
Community Note
Terraform Version
Terraform v0.12.20 provider.aws v2.66.0
Affected Resource(s)
aws_acm_certificate
Terraform Configuration Files
The certificate is successfully imported manually to ACM from these files through the AWS Console, resulting in ARN
arn:aws:acm:us-east-1:123456789:certificate/aaaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee
Debug Output
N/A
Panic Output
N/A
Expected Behavior
At that point
terraform plan
should showActual Behavior
The state file contains the following:
Note the
null
values instead of expected hash values.Important Factoids
It is possible to work around this issue by manually updating the
null
values in the state file with the values shown in the output ofafter which the plan shows no differences anymore.
0000