Skip to content

Commit 8774416

Browse files
kevouelletKevin Ouellet
and
Kevin Ouellet
authored
feat: Add support for service connect tls settings (#216)
* add dynamic tls block for service connect service * set aws_pca_authority_arn to required * also apply fix to ecs service without ignore_task_def * formatting --------- Co-authored-by: Kevin Ouellet <[email protected]>
1 parent 5f25125 commit 8774416

File tree

1 file changed

+36
-0
lines changed

1 file changed

+36
-0
lines changed

modules/service/main.tf

+36
Original file line numberDiff line numberDiff line change
@@ -177,6 +177,24 @@ resource "aws_ecs_service" "this" {
177177
}
178178
}
179179

180+
dynamic "tls" {
181+
for_each = try([service.value.tls], [])
182+
183+
content {
184+
185+
dynamic "issuer_cert_authority" {
186+
for_each = tls.value.issuer_cert_authority
187+
188+
content {
189+
aws_pca_authority_arn = issuer_cert_authority.value.aws_pca_authority_arn
190+
}
191+
}
192+
193+
kms_key = try(tls.value.kms_key, null)
194+
role_arn = try(tls.value.role_arn, null)
195+
}
196+
}
197+
180198
discovery_name = try(service.value.discovery_name, null)
181199
ingress_port_override = try(service.value.ingress_port_override, null)
182200
port_name = service.value.port_name
@@ -399,6 +417,24 @@ resource "aws_ecs_service" "ignore_task_definition" {
399417
}
400418
}
401419

420+
dynamic "tls" {
421+
for_each = try([service.value.tls], [])
422+
423+
content {
424+
425+
dynamic "issuer_cert_authority" {
426+
for_each = tls.value.issuer_cert_authority
427+
428+
content {
429+
aws_pca_authority_arn = issuer_cert_authority.value.aws_pca_authority_arn
430+
}
431+
}
432+
433+
kms_key = try(tls.value.kms_key, null)
434+
role_arn = try(tls.value.role_arn, null)
435+
}
436+
}
437+
402438
discovery_name = try(service.value.discovery_name, null)
403439
ingress_port_override = try(service.value.ingress_port_override, null)
404440
port_name = service.value.port_name

0 commit comments

Comments
 (0)