使用新记录验证证书

问题描述 投票:0回答:1

我正在尝试使用概述的here的方法在Terraform中验证ACM证书,基本上,这是使用Route53记录的DNS验证。据我了解,问题是它需要已经存在的Route53记录,以便它可以使用资源的records属性。但就我而言,这是一条新记录,因此,如果我同时尝试aliasrecords属性,例如

resource aws_route53_record wildcard {
  zone_id = var.environment.route53_zone.zone_id
  name    = "*.${local.cname}."
  type    = "A"
  alias {
    name                   = aws_cloudfront_distribution.main.domain_name
    zone_id                = aws_cloudfront_distribution.main.hosted_zone_id
    evaluate_target_health = false
  }
  records = [aws_acm_certificate.wildcard[0].domain_validation_options.0.resource_record_value]
}

我收到错误"alias" conflicts with "records"。在同一脚本中是否可以创建Route53记录并将其用于证书验证?

amazon-web-services terraform amazon-route53 terraform-provider-aws aws-certificate-manager
1个回答
0
投票

您需要使用aws_acm_certificate_validation资源,幸运的是,该页面提供了一个很好的示例,说明如何执行此操作。

resource "aws_acm_certificate" "cert" {
  domain_name       = "example.com"
  validation_method = "DNS"
}

data "aws_route53_zone" "zone" {
  name         = "example.com."
  private_zone = false
}

resource "aws_route53_record" "cert_validation" {
  name    = "${aws_acm_certificate.cert.domain_validation_options.0.resource_record_name}"
  type    = "${aws_acm_certificate.cert.domain_validation_options.0.resource_record_type}"
  zone_id = "${data.aws_route53_zone.zone.zone_id}"
  records = ["${aws_acm_certificate.cert.domain_validation_options.0.resource_record_value}"]
  ttl     = 60
}

resource "aws_acm_certificate_validation" "cert" {
  certificate_arn         = "${aws_acm_certificate.cert.arn}"
  validation_record_fqdns = ["${aws_route53_record.cert_validation.fqdn}"]
}

resource "aws_lb_listener" "front_end" {
  # [...]
  certificate_arn = "${aws_acm_certificate_validation.cert.certificate_arn}"
}
© www.soinside.com 2019 - 2024. All rights reserved.