Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

aws_cloudfront_distribution: acm_certificate_arn and cloudfront_default_certificate(false) conflicts #7786

Closed
ghost opened this issue Mar 1, 2019 · 2 comments

Comments

@ghost
Copy link

ghost commented Mar 1, 2019

This issue was originally opened by @only1vinay as hashicorp/terraform#20511. It was migrated here as a result of the provider split. The original body of the issue is below.


viewer_certificate {
acm_certificate_arn = "${var.acm_certificate_arn}"
cloudfront_default_certificate = "${length(var.acm_certificate_arn) > 0 ? false : true}"
minimum_protocol_version = "TLSv1.1_2016"
ssl_support_method = "sni-only"
}

This part used to work, i.e we can make cloudfront_default_certificate false and pass acm_certificate_arn.
But Its resulting in error: viewer_certificate.0.acm_certificate_arn": conflicts with viewer_certificate.0.cloudfront_default_certificate

This means I need to pass either one of those, Which doesn't make it modular.

@bflad
Copy link
Contributor

bflad commented Mar 1, 2019

Hi @only1vinay 👋 Thank you for reporting this and sorry for the hassle. We have a previously created tracking issue for this one (#7773) so to consolidate efforts and discussions, I am going to close this issue in preference of the earlier one. 👍

@bflad bflad closed this as completed Mar 1, 2019
@ghost
Copy link
Author

ghost commented Mar 31, 2020

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.

If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks!

@ghost ghost locked and limited conversation to collaborators Mar 31, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant