-
Notifications
You must be signed in to change notification settings - Fork 625
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
issue with resource "cloudflare_hostname_tls_setting_ciphers" #2918
Comments
Community NoteVoting for Prioritization
Volunteering to Work on This Issue
|
Thank you for reporting this issue! For maintainers to dig into issues it is required that all issues include the entirety of This issue has been marked with |
Thank you for opening this issue and sorry to hear you're hitting issues. Unfortunately, the reproduction case provided contains HCL dynamic expressions. Examples of these are:
Maintainers don't accept these as reproduction cases since using these constructs and expressions can hold their own logic bugs which are outside of the provider and not able to be diagnosed. For maintainers to triage this issue, we recommend providing a minimal reproduction test case that is only contains the impacted resources and can be easily reproduced in an isolated environment. Without providing this, maintainers are limited in what support they can provide. |
cause located,
options appear to be,
|
our CF TAM can reproduce the issue we see, we have also logged CF ticket -> 3024554 |
should be fixed with this update once released -> cloudflare/cloudflare-go#1440 |
Fix in release -> https://github.com/cloudflare/cloudflare-go/releases/tag/v0.82.0 We have tested this in the pipeline and now we get a provider crash on read of the TLS settings, Load of v4.20.0 of the provider,
Crash,
|
looks like our crash was related to what the terraform state held (applied using earlier version of provider) and what the updated provider expected (v4.20.0). to fix this we took the following steps for each of our pipelines containing resource "cloudflare_hostname_tls_setting_ciphers",
|
Confirmation
Terraform and Cloudflare provider version
terraform = v1.6.1
cloudflare/cloudflare = v4.18.0
Affected resource(s)
cloudflare_hostname_tls_setting_ciphers
Terraform configuration files
Link to debug output
https://gist.github.com/mattduguid/2a542d5c40730ff6ea65a27aa44afb3f
Error output
Expected output
When adding TLS settings for 1 to many hostnames in the same cloudflare zone using 1 to many terraform pipelines, we expect these to be able to be managed separately as we can do with the API, eg: perform the following 2 x PUT’s direct to the API bypassing terraform,
then the following GET to check, and it correctly returns both values and further writes do not remove the other entries,
and a scan using https://www.ssllabs.com/ssltest/ afterwards for all hostnames shows no weak ciphers as desired.
Actual output
The hostname being written overwrites the current array and hostnames meaning the previously disabled weak ciphers are enabled again.
Steps to reproduce
Run a terraform init/plan/apply using the terraform code supplied, once for terraform pipelineA with domainA.com, once for terraform pipelineB with domainB.com, then run a terraform plan for terraform pipelineA with domainA.com again to see issue which is an overwrite.
The text was updated successfully, but these errors were encountered: