Open fuyong2022 opened 2 years ago
As the reference points out, keyUage needs to have "critical" defined.
[ rootCA_ext ] subjectKeyIdentifier = hash authorityKeyIdentifier = keyid:always,issuer basicConstraints = critical, CA:true keyUsage = critical, digitalSignature, cRLSign, keyCertSign
[ interCA_ext ] subjectKeyIdentifier = hash authorityKeyIdentifier = keyid:always,issuer basicConstraints = critical, CA:true, pathlen:1 keyUsage = critical, digitalSignature, cRLSign, keyCertSign
[ server_ext ] subjectKeyIdentifier = hash authorityKeyIdentifier = keyid:always,issuer basicConstraints = critical, CA:false keyUsage = critical, digitalSignature extendedKeyUsage = serverAuth
Still no progress on this?
Is there an existing issue for this?
Community Note
Terraform Version
1.1.8
AzureRM Provider Version
3.4.0
Affected Resource(s)/Data Source(s)
azurerm_key_vault_certificate
Terraform Configuration Files
Debug Output/Panic Output
Expected Behaviour
It should add "critical" to key_usage extended property value list
Actual Behaviour
│ Error: expected certificate_policy.0.x509_certificate_properties.0.key_usage.1 to be one of [cRLSign dataEncipherment decipherOnly digitalSignature encipherOnly keyAgreement keyCertSign keyEncipherment nonRepudiation], got critical
Steps to Reproduce
terraform init terraform validate
Important Factoids
key_usage property "critical" is required by azurerm_firewall_policy
References
https://docs.microsoft.com/en-us/azure/firewall/premium-certificates