Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add certificate_map to compute_target_ssl_proxy #4654

Conversation

modular-magician
Copy link
Collaborator

Add certificate_map option to compute_target_ssl_proxy in order to support new certificate-manager (with wildcard support).

Similar PR: GoogleCloudPlatform/magic-modules#5991

If this PR is for Terraform, I acknowledge that I have:

  • Searched through the issue tracker for an open issue that this either resolves or contributes to, commented on it to claim it, and written "fixes {url}" or "part of {url}" in this PR description. If there were no relevant open issues, I opened one and commented that I would like to work on it (not necessary for very small changes).
  • Generated Terraform, and ran make test and make lint to ensure it passes unit and linter tests.
  • Ensured that all new fields I added that can be set by a user appear in at least one example (for generated resources) or third_party test (for handwritten resources or update tests).
  • Ran relevant acceptance tests (If the acceptance tests do not yet pass or you are unable to run them, please let your reviewer know).
  • Read the Release Notes Guide before writing my release note below.
compute: added `certificate_map` to `compute_target_ssl_proxy` resource

Derived from GoogleCloudPlatform/magic-modules#6443

Co-authored-by: Pawel Krawczyk <[email protected]>
Signed-off-by: Modular Magician <[email protected]>
@modular-magician modular-magician merged commit 2c08dd3 into hashicorp:main Sep 2, 2022
@modular-magician modular-magician deleted the downstream-pr-9dbf6c0a7bc682ff5847288508faa64b3e08f06d branch November 16, 2024 03:55
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant