-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add tags as search criteria for aws_acm_certificate data source #1918
Comments
Bump and +1 to this. The current data source isn't usable as we also have certificates with the same domain name, and so this single filter isn't sufficient. |
I know its not exactly what you're looking for, but we did just recently merge in I do think filtering via tags is a valid request though, even if the above items mitigate its need partially! |
Thanks @bflad - the resource news is very good! Look forward to using it :) |
It's quite useful to match ACM by tags whenever domain name will be optional, cause it can be not the same in different contexts. Thx |
Is this still going to be implemented? We also have multiple domain certs and need to be able to filter via tags. |
Same here, would be nice to match the ACM by what tag I want rather than the specific domain name.. I've been tagging my certs with application and environment, would rather keep passing that to get the cert rather than also requiring the domain name |
As the message above states, I implemented the basic functionality for this in #8352. But my familiarity with how the testing of the provider works is not enough to finish it. It is unclear to me how to properly implement the tests as I don't know where the resources the data source has to retrieve are created and what they look like. |
Do we have any hopes of filtering the datasource for the certificates via tag? Is there any workaround to achieve this using terraform aws provider? |
Any status on this. It seems like all data sources for resources that accept tags should support search by tags. |
Unable to use this data source without tag filtering. |
filtering based only on domain_name can cause very big issues when you have certs with same domain name but different |
to summarize this issue then abandoned PR another abandoned PR to do the filtering PR to add tag attribute, NOT filter by tag as a workaround, i am looking at using https://registry.terraform.io/providers/hashicorp/external/latest/docs/data-sources/data_source |
+1 |
2 similar comments
+1 |
+1 |
Hey guys, Please add reactions to the PR so it can be reviewed faster :) Thanks! |
Hello, we are also running into issues because of this. When is this going to be released? Thanks |
1 similar comment
Hello, we are also running into issues because of this. When is this going to be released? Thanks |
Hi all, I was stuck with the same issue and figured out the following workaround.
You can then reference to the ARN of the certificate as follows:
Hope this helps! Regards, |
Warning This issue has been closed, meaning that any additional comments are hard for our team to see. Please assume that the maintainers will not see them. Ongoing conversations amongst community members are welcome, however, the issue will be locked after 30 days. Moving conversations to another venue, such as the AWS Provider forum, is recommended. If you have additional concerns, please open a new issue, referencing this one where needed. |
This functionality has been released in v5.67.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
We are currently attempting to add more domains to our certificate and need to rotate it out across our ALBs. However, the aws_acm_certificate data source functionally only accepts the domain for discovery. Discovery with tags allows matching on similar domain certificates through a method that is commonly accepted with other data sources.
There is another issue that is similar to this: #546
However, tagged resources are immune to users creating new certificates and could allow for more than two ACM resources with the same name at once.
The text was updated successfully, but these errors were encountered: