Terraform module which creates ACM certificates and validates them using Route53 DNS.
Here's the gist of using it directly from github.
module acm {
source = "terraform-module/acm/aws"
version = "~> 2"
domain_name = "example.com"
zone_id = "Z0FK2F3K10ACF0"
validation_method = "DNS"
subject_alternative_names = [
"*.example.com"
]
tags = {}
}
Will not allow to add new SANS due to bug that shoulb de fixed here
Name | Version |
---|---|
terraform | >= 0.12 |
Name | Version |
---|---|
aws | n/a |
Name | Description | Type | Default | Required |
---|---|---|---|---|
allow_overwrite_records | Allow creation of this record in Terraform to overwrite an existing record, if any. | bool |
true |
no |
domain_name | A domain name for which the certificate should be issued | string |
"" |
no |
subject_alternative_names | A list of domains that should be SANs in the issued certificate | list(string) |
[] |
no |
tags | A mapping of tags to assign to the resource | map(string) |
{} |
no |
ttl | The TTL of the record. | number |
60 |
no |
validate_certificate | Whether or not certificate should be validated | bool |
true |
no |
validation_method | Which method to use for validation. DNS or EMAIL are valid, NONE can be used for certificates that were imported into ACM and then into Terraform. | string |
"DNS" |
no |
zone_id | The ID of the hosted zone to contain this record. | string |
"" |
no |
Name | Description |
---|---|
arn | Certificate ARN. |
distinct_domain_names | Distinct domain names. |
$ make help
hooks Commit hooks setup
validate Validate with pre-commit hooks
changelog Update changelog
release Create release version
- 📝 Use a succinct title and description.
- 🐛 Bugs & feature requests can be be opened
- 📶 Support questions are better asked on Stack Overflow
- 😊 Be nice, civil and polite (as always).
Copyright 2019 Ivan Katliarhcuk
MIT Licensed. See LICENSE for full details.
Submit a pull request
Currently maintained by Ivan Katliarchuk and these awesome contributors.