我正在尝试使用概述的here的方法在Terraform中验证ACM证书,基本上,这是使用Route53记录的DNS验证。据我了解,问题是它需要已经存在的Route53记录,以便它可以使用资源的records
属性。但就我而言,这是一条新记录,因此,如果我同时尝试alias
和records
属性,例如
resource aws_route53_record wildcard {
zone_id = var.environment.route53_zone.zone_id
name = "*.${local.cname}."
type = "A"
alias {
name = aws_cloudfront_distribution.main.domain_name
zone_id = aws_cloudfront_distribution.main.hosted_zone_id
evaluate_target_health = false
}
records = [aws_acm_certificate.wildcard[0].domain_validation_options.0.resource_record_value]
}
我收到错误"alias" conflicts with "records"
。在同一脚本中是否可以创建Route53记录并将其用于证书验证?
您需要使用aws_acm_certificate_validation资源,幸运的是,该页面提供了一个很好的示例,说明如何执行此操作。
resource "aws_acm_certificate" "cert" {
domain_name = "example.com"
validation_method = "DNS"
}
data "aws_route53_zone" "zone" {
name = "example.com."
private_zone = false
}
resource "aws_route53_record" "cert_validation" {
name = "${aws_acm_certificate.cert.domain_validation_options.0.resource_record_name}"
type = "${aws_acm_certificate.cert.domain_validation_options.0.resource_record_type}"
zone_id = "${data.aws_route53_zone.zone.zone_id}"
records = ["${aws_acm_certificate.cert.domain_validation_options.0.resource_record_value}"]
ttl = 60
}
resource "aws_acm_certificate_validation" "cert" {
certificate_arn = "${aws_acm_certificate.cert.arn}"
validation_record_fqdns = ["${aws_route53_record.cert_validation.fqdn}"]
}
resource "aws_lb_listener" "front_end" {
# [...]
certificate_arn = "${aws_acm_certificate_validation.cert.certificate_arn}"
}