terraform-aws-acm-request-certificate

Terraform module to request an ACM certificate for a domain name and create a CNAME record in the DNS zone to complete certificate validation

APACHE-2.0 License

Stars
106
Committers
25

Bot releases are visible (Hide)

terraform-aws-acm-request-certificate - v0.18.0 Latest Release

Published by Nuru 8 months ago

terraform-aws-acm-request-certificate - v0.16.3

Published by cloudpossebot over 1 year ago

what

  • Allow management of ACM certs with SANs in multiple zones
  • Add versions.tf to examples/complete

why

  • This is useful for more complex certificates and validation of those certificates
  • Workaround without this is to manage validation records outside of the module
resource "aws_route53_record" "default" {
  for_each = {
    for dvo in module.acm_certificate.domain_validation_options[0] : dvo.domain_name => {
      name   = dvo.resource_record_name
      record = dvo.resource_record_value
      type   = dvo.resource_record_type
    }
  }

  name    = each.value.name
  records = [each.value.record]
  type    = each.value.type
  zone_id = data.aws_route53_zone.default[local.domain_to_zone[each.key]].id
  ttl     = 300
}

references

🚀 Enhancements

what

This fixes what was mentioned in - https://github.com/cloudposse/terraform-aws-acm-request-certificate/pull/66

why

Adding a simple length check to where domains get update in an array fixes the mentioned issue.

  Error: no matching Route53Zone found
  
    with module.acm_request_certificate.data.aws_route53_zone.default["io"],
    on .terraform/modules/acm_request_certificate/main.tf line 38, in data "aws_route53_zone" "default":
    38: data "aws_route53_zone" "default" {

references

terraform-aws-acm-request-certificate - v0.17.0

Published by cloudpossebot about 2 years ago

This is a pre-release due to https://github.com/cloudposse/terraform-aws-acm-request-certificate/issues/62

NOTE: This feature requires that the zone to use for validation is the immediate parent of the name in the SAN. See #62.

what

  • Allow management of ACM certs with SANs in multiple zones
  • Add versions.tf to examples/complete

why

  • This is useful for more complex certificates and validation of those certificates
  • Workaround without this is to manage validation records outside of the module
resource "aws_route53_record" "default" {
  for_each = {
    for dvo in module.acm_certificate.domain_validation_options[0] : dvo.domain_name => {
      name   = dvo.resource_record_name
      record = dvo.resource_record_value
      type   = dvo.resource_record_type
    }
  }

  name    = each.value.name
  records = [each.value.record]
  type    = each.value.type
  zone_id = data.aws_route53_zone.default[local.domain_to_zone[each.key]].id
  ttl     = 300
}

references

terraform-aws-acm-request-certificate - v0.16.2

Published by cloudpossebot about 2 years ago

🚀 Enhancements

what

  • Skip validation method, correct data source input

why

  • Validation method is only applicable for public hosted zone acm certs
  • Use correct private_zone input for route53 zone data source

references

  • N/A
terraform-aws-acm-request-certificate - v0.16.1

Published by cloudpossebot about 2 years ago

what and why

Change all references to git.io/build-harness into cloudposse.tools/build-harness, since git.io redirects will stop working on April 29th, 2022.

References

  • DEV-143

🚀 Enhancements

what

  • added acm_certificate_validation.certification_arn output

why

  • to avoid alb module can't create listener because of not validated cert
  • use this output as certification arn in alb module

references

  • #58
  • closes #58
terraform-aws-acm-request-certificate - v0.16.0

Published by cloudpossebot almost 3 years ago

what

  • Add certificate_authority_arn
  • Add validation id output
  • Add verification of lowercase sans and domain names

why

  • For private CAs

references

terraform-aws-acm-request-certificate - v0.15.2

Published by cloudpossebot almost 3 years ago

🤖 Automatic Updates

what

This is an auto-generated PR that updates the README.md and docs

why

To have most recent changes of README.md and doc from origin templates

terraform-aws-acm-request-certificate - v0.15.1

Published by cloudpossebot about 3 years ago

🚀 Enhancements

what

  • Update context.tf.
  • Update build-harness assets by running make github/init.
  • Clean up unused providers.
  • Drop Terraform support prior to 0.13.

why

  • The latest version of context.tf (null-label:0.25.0), contains new labels. A module instantiating this module with version 0.25.0 of null-label and making use of new labels will not be able to use this module.
  • Running make github/init updates build-harness assets, which includes GitHub Actions Workflows and related files.
  • The latest distribution of context.tf (null-label:0.25.0) is not compatible with Terraform 0.12.* because it makes use of validation blocks.

references

terraform-aws-acm-request-certificate - v0.15.0

Published by cloudpossebot about 3 years ago

what

  • Add zone_id

why

  • Create an implicit link between zone creation and acm creation
  • This gives the consumer the option to use domain name, zone name, or zone id to use the data source to retrieve the existing hosted zone

references

terraform-aws-acm-request-certificate - v0.14.0

Published by cloudpossebot over 3 years ago

what

  • Add the option to DISABLE or ENABLE certificate_transparency_logging_preference parameter when creating the certificate

why

  • Some cases you don't want to disclose certificate names, as also this may leak internal information when you use this module for internal domains ACM generation in a split horizon dns configuration.

references

terraform-aws-acm-request-certificate - v0.13.1

Published by cloudpossebot over 3 years ago

🤖 Automatic Updates

what

This is an auto-generated PR that updates the README.md and docs

why

To have most recent changes of README.md and doc from origin templates

terraform-aws-acm-request-certificate - v0.13.0

Published by cloudpossebot over 3 years ago

what

  • Upgrade to support Terraform 0.14 and bring up to current Cloud Posse standard

why

  • Support Terraform 0.14
terraform-aws-acm-request-certificate - v0.12.0

Published by cloudpossebot almost 4 years ago

what

there is no need to convert to a list anymore as its a set

why

fixes bug introduced by me :)

references

terraform-aws-acm-request-certificate - v0.11.0

Published by cloudpossebot almost 4 years ago

what

  • Upgrade to support Terraform 0.14 and bring up to current Cloud Posse standard

why

  • Support Terraform 0.14
  • Support AWS Provider >= 3.x

references

Previously, the domain_validation_options attribute was a list type and completely unknown until after an initial terraform apply. This generally required complicated configuration workarounds to properly create DNS validation records since referencing this attribute directly could produce errors similar to the below:

Error: Invalid for_each argument

  on main.tf line 16, in resource "aws_route53_record" "existing":
  16:   for_each = aws_acm_certificate.existing.domain_validation_options

The "for_each" value depends on resource attributes that cannot be determined
until apply, so Terraform cannot predict how many instances will be created.
To work around this, use the -target argument to first apply only the
resources that the for_each depends on.

The domain_validation_options attribute is now a set type and the resource will attempt to populate the information necessary during the planning phase to handle the above situation in most environments without workarounds. This change also prevents Terraform from showing unexpected differences if the API returns the results in varying order.

terraform-aws-acm-request-certificate - v0.10.0

Published by cloudpossebot almost 4 years ago

what

  • Update to context.tf and other current standards

why

  • Ensure compatibility with our other modules and components
terraform-aws-acm-request-certificate - 0.9.0 Fix dns validation processing

Published by aknysh almost 4 years ago

what

  • Fix dns validation processing

why

  • Allow the DNS processing to work with wildcard certificates
terraform-aws-acm-request-certificate -

Published by Gowiem almost 4 years ago

what

  • Updated the required provider versions to get this module working with the latest terraform 0.13 release

why

  • Without this patch this module does not work with terraform 0.13.4
terraform-aws-acm-request-certificate -

Published by Gowiem about 4 years ago

What

  • Fixes a bug with an extra dot when using var.zone_name > var.domain_name

Why

  • The appending of the dot breaks the search of the zone when referencing the name from an existing aws_route53_zone resource because the name property already contains the dot.
terraform-aws-acm-request-certificate -

Published by Gowiem about 4 years ago

terraform-aws-acm-request-certificate -

Published by osterman over 4 years ago

Related Projects