-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
azurerm_key_vault_certificate resource is replaced every second time #23537
Comments
Hi, I replaced my version of azurerm with 3.70.0 and, indeed, plans are more consistent ! He doesn't want to destroy the existent certificate anymore. I made some modifications in the code because I wanted to replace another existent key vault certificate with the one I generate now, and when I apply, I obtain this error :
I tried with that :
But now, I am unable to generate certificate because of this error. I tried to modify p12 in pem, 2048 in 4096 and other things, but I always obtain this new behaviour. |
@ced360 The Contents field should be base64 encoded as key_vault_certificate#contents. I'm not sure if the |
Is there an existing issue for this?
Community Note
Terraform Version
1.0.0
AzureRM Provider Version
3.62.1
Affected Resource(s)/Data Source(s)
azurerm_key_vault_certificate
Terraform Configuration Files
Debug Output/Panic Output
Expected Behaviour
azurerm_key_vault_certificate.certificate["*.sub.domain"] will be updated in-place
~ resource "azurerm_key_vault_certificate" "certificate" {
id = "https://my-vault.vault.azure.net/certificates/certificate-autorenew-test/******************************"
name = "certificate-autorenew-test"
tags = {}
# (11 unchanged attributes hidden)
~ certificate {
~ contents = (sensitive value)
# (1 unchanged attribute hidden)
}
# (1 unchanged block hidden)
}
Actual Behaviour
I wanted to use that project : https://github.com/rdvansloten/letsencrypt-terraform-azure/tree/main to create a Let's Encrypt certificate in my key vault, and renew the certificate if it need to. To test my implementation, I fixed the min_days_remaining property of the acme_certificate resource to 1. The idea behind this is that I don't have to wait a certain number of days to test automatic renewal, I just have to wait for tomorrow. The first time I launch my pipeline, it will create the certificate and push it to my key vault.
Steps to Reproduce
No response
Important Factoids
No response
References
No response
The text was updated successfully, but these errors were encountered: