forked from loganmarchione/terraform-aws-static-site
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathacm.tf
60 lines (51 loc) · 1.69 KB
/
acm.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
################################################################################
### ACM + DNS
################################################################################
resource "aws_acm_certificate" "site" {
# Needed because CloudFront can only use ACM certs generated in us-east-1
provider = aws.us-east-1
domain_name = data.aws_route53_zone.site.name
validation_method = "DNS"
subject_alternative_names = [
"*.${data.aws_route53_zone.site.name}"
]
lifecycle {
create_before_destroy = true
}
}
resource "aws_route53_record" "site_validation" {
for_each = {
for dvo in aws_acm_certificate.site.domain_validation_options : dvo.domain_name => {
name = dvo.resource_record_name
record = dvo.resource_record_value
type = dvo.resource_record_type
}
}
allow_overwrite = true
zone_id = data.aws_route53_zone.site.zone_id
name = each.value.name
type = each.value.type
ttl = 60
records = [each.value.record]
depends_on = [aws_acm_certificate.site]
}
resource "aws_acm_certificate_validation" "site" {
# Needed because CloudFront can only use ACM certs generated in us-east-1
provider = aws.us-east-1
certificate_arn = aws_acm_certificate.site.arn
validation_record_fqdns = [for record in aws_route53_record.site_validation : record.fqdn]
timeouts {
create = "5m"
}
depends_on = [aws_route53_record.site_validation]
}
resource "aws_route53_record" "site_caa" {
zone_id = data.aws_route53_zone.site.zone_id
name = ""
type = "CAA"
ttl = "3600"
records = [
"0 issue \"amazon.com\"",
"0 issuewild \"amazon.com\""
]
}