No description
  • Go 99%
  • HCL 0.9%
  • Makefile 0.1%
Find a file
dependabot[bot] 05ee608628
build(deps): Bump github.com/elazarl/goproxy from 1.8.2 to 1.8.3 (#759)
Bumps [github.com/elazarl/goproxy](https://github.com/elazarl/goproxy) from 1.8.2 to 1.8.3.
- [Release notes](https://github.com/elazarl/goproxy/releases)
- [Commits](https://github.com/elazarl/goproxy/compare/v1.8.2...v1.8.3)

---
updated-dependencies:
- dependency-name: github.com/elazarl/goproxy
  dependency-version: 1.8.3
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2026-03-31 09:52:45 -04:00
.changes fix: remove default value for max_path_length and ensure proper handling in locally_signed_cert and self_signed_cert resources (#737) 2026-01-30 16:24:55 +01:00
.github build(deps): Bump actions/setup-go in the github-actions group (#758) 2026-03-30 10:42:11 -04:00
.release Add CRT files and prepare for upcoming 4.1.0 release (#644) 2025-04-23 15:54:06 -04:00
docs fix: remove default value for max_path_length and ensure proper handling in locally_signed_cert and self_signed_cert resources (#737) 2026-01-30 16:24:55 +01:00
examples Remove Read-Only Attribute in provider example doc (#692) 2025-08-25 16:47:56 -04:00
internal/provider build(deps): Bump github.com/elazarl/goproxy from 1.8.0 to 1.8.1 (#738) 2026-02-05 12:13:13 -05:00
META.d Add CRT files and prepare for upcoming 4.1.0 release (#644) 2025-04-23 15:54:06 -04:00
templates Add max_path_length attribute on certificates (#301) 2025-10-20 12:11:44 -04:00
tools build(deps): Bump github.com/hashicorp/copywrite in /tools (#757) 2026-03-30 11:12:42 -04:00
version fix: remove default value for max_path_length and ensure proper handling in locally_signed_cert and self_signed_cert resources (#737) 2026-01-30 16:24:55 +01:00
.changie.yaml [CI] terraform-devex-repos automation 2024-06-07 16:22:28 -04:00
.copywrite.hcl chore: Final onboarding to CRT (#646) 2025-04-23 17:20:10 -04:00
.gitignore Port TLS Provider to terraform-plugin-framework (#215) 2022-06-24 17:29:32 +01:00
.golangci.yml SEC-090: Automated trusted workflow pinning (2025-04-07) (#638) 2025-04-09 10:49:09 -05:00
CHANGELOG.md fix: remove default value for max_path_length and ensure proper handling in locally_signed_cert and self_signed_cert resources (#737) 2026-01-30 16:24:55 +01:00
DESIGN.md Pre-4.x tweaks (#235) 2022-07-11 15:13:44 +01:00
GNUmakefile Adding tooling for copywrite and files with copyright headers (#367) 2023-06-08 07:27:05 +01:00
go.mod build(deps): Bump github.com/elazarl/goproxy from 1.8.2 to 1.8.3 (#759) 2026-03-31 09:52:45 -04:00
go.sum build(deps): Bump github.com/elazarl/goproxy from 1.8.2 to 1.8.3 (#759) 2026-03-31 09:52:45 -04:00
LICENSE build(deps): Bump github.com/elazarl/goproxy from 1.8.0 to 1.8.1 (#738) 2026-02-05 12:13:13 -05:00
main.go build(deps): Bump github.com/elazarl/goproxy from 1.8.0 to 1.8.1 (#738) 2026-02-05 12:13:13 -05:00
README.md chore: Final onboarding to CRT (#646) 2025-04-23 17:20:10 -04:00
terraform-registry-manifest.json Take advantage of terraform-plugin-framework ability to still support Protocol v5 (i.e. preserve support for TF >= 0.12) (#242) 2022-07-21 17:46:51 +01:00

Terraform Provider: TLS

The TLS provider provides utilities for working with Transport Layer Security keys and certificates. It provides resources that allow private keys, certificates and certificate requests to be created as part of a Terraform deployment.

Documentation, questions and discussions

Official documentation on how to use this provider can be found on the Terraform Registry. In case of specific questions or discussions, please use the HashiCorp Terraform Providers Discuss forums, in accordance with HashiCorp Community Guidelines.

We also provide:

  • Support page for help when using the provider
  • Contributing guidelines in case you want to help this project
  • Design documentation to understand the scope and maintenance decisions

The remainder of this document will focus on the development aspects of the provider.

Compatibility

Compatibility table between this provider, the Terraform Plugin Protocol version it implements, and Terraform:

TLS Provider Terraform Plugin Protocol Terraform
>= 4.x 5 >= 0.12
>= 3.x 5 >= 0.12
>= 2.x 4 and 5 <= 0.12
>= 0.x 4 <= 0.11

Details can be found querying the Registry API that return all the details about which version are currently available for a particular provider. Here are the details for TLS (JSON response).

Requirements

Development

Building

  1. git clone this repository and cd into its directory
  2. make will trigger the Golang build

The provided GNUmakefile defines additional commands generally useful during development, like for running tests, generating documentation, code formatting and linting. Taking a look at it's content is recommended.

Testing

In order to test the provider, you can run

  • make test to run provider tests
  • make testacc to run provider acceptance tests

It's important to note that acceptance tests (testacc) will actually spawn terraform and the provider. Read more about they work on the official page.

Generating documentation

This provider uses terraform-plugin-docs to generate documentation and store it in the docs/ directory. Once a release is cut, the Terraform Registry will download the documentation from docs/ and associate it with the release version. Read more about how this works on the official page.

Use make generate to ensure the documentation is regenerated with any changes.

Using a development build

If running tests and acceptance tests isn't enough, it's possible to set up a local terraform configuration to use a development builds of the provider. This can be achieved by leveraging the Terraform CLI configuration file development overrides.

First, use make install to place a fresh development build of the provider in your ${GOBIN} (defaults to ${GOPATH}/bin or ${HOME}/go/bin if ${GOPATH} is not set). Repeat this every time you make changes to the provider locally.

Then, setup your environment following these instructions to make your local terraform use your local build.

Testing GitHub Actions

This project uses GitHub Actions to realize its CI.

Sometimes it might be helpful to locally reproduce the behaviour of those actions, and for this we use act. Once installed, you can simulate the actions executed when opening a PR with:

# List of workflows for the 'pull_request' action
$ act -l pull_request

# Execute the workflows associated with the `pull_request' action 
$ act pull_request

Releasing

The releasable builds are generated from the build GH workflow and the release/promotion process is completed via internal HashiCorp deployment tooling. Prior to release, the changelog should be updated in main with the changie tool, example:

changie batch 4.1.0 && changie merge

License

Mozilla Public License v2.0