ssm-tls-self-signed-cert

cloudposse/ssm-tls-self-signed-cert/aws

Terraform Module HCL AWS

This module creates a self-signed certificate and writes it alongside with its key to SSM Parameter Store (or alternatively AWS Secrets Manager).

Install
module "ssm-tls-self-signed-cert" {
source = "cloudposse/ssm-tls-self-signed-cert/aws"
version = "1.3.0"
}
plain text: /constructs/tfmod-cloudposse-ssm-tls-self-signed-cert-aws/install.txt
⭐ Source on GitHub 📦 Registry page
README

terraform-aws-ssm-tls-self-signed-cert ![Latest Release](https://github.com/cloudposse/terraform-aws-ssm-tls-self-signed-cert/releases/latest) ![Slack Community](https://slack.cloudposse.com) ![Discourse Forum](https://ask.sweetops.com/) [![README Header][readme_header_img]][readme_header_link] [![Cloud Posse][logo]](https://cpco.io/homepage) This module creates a self-signed certificate and writes it alongside with its key to SSM Parameter Store (or alternatively AWS Secrets Manager). --- This project is part of our comprehensive "SweetOps" approach towards DevOps. [ ][share_email] [ ][share_googleplus] [ ][share_facebook] [ ][share_reddit] [ ][share_linkedin] [ ][share_twitter] ![Terraform Open Source Modules][terraform_modules] It's 100% Open Source and licensed under the APACHE2. We li

Inputs (37)
NameTypeDescriptionDefault
allowed_useslist(string)List of keywords each describing a use that is permitted for the issued certific required
id_length_limitnumberLimit `id` to this many characters (minimum 6). Set to `0` for unlimited length.null
label_value_casestringControls the letter case of ID elements (labels) as included in `id`, set as tagnull
private_key_rsa_bitsnumberWhen `var.cert_key_algorithm` is `RSA`, the size of the generated RSA key in bit2048
subjectanyThe subject configuration for the certificate. This should be a map that is comp{}
asm_recovery_window_in_daysnumberNumber of days that AWS Secrets Manager waits before it can delete the secret. T30
certificate_backends_enabledboolEnable or disable writing to the secrets store.true
contextanySingle object for setting entire context at once. See description of individual { "additional_tag_map": {}, "attribu
namespacestringID element. Usually an abbreviation of your organization name, e.g. 'eg' or 'cp'null
regex_replace_charsstringTerraform regular expression (regex) string. Characters matching the regex will null
label_key_casestringControls the letter case of the `tags` keys (label names) for tags generated by null
certificate_backend_kms_key_idstringThe KMD Key ID (ARN or ID) to use when encrypting either the AWS SSM Parameters null
certificate_chainobject({ cert_pem =When using ACM as a certificate backend, some certificates store a certificate cnull
skid_enabledboolWhether or not the subject key identifier (SKID) should be included in the certifalse
certificate_backendsset(string)The certificate backend to use when writing secrets related to the self-signed c[ "SSM" ]
tenantstringID element _(Rarely used, not included by default)_. A customer identifier, indinull
tagsmap(string)Additional tags (e.g. `{'BusinessUnit': 'XYZ'}`). Neither the tag keys nor the t{}
additional_tag_mapmap(string)Additional key-value pairs to add to each map in `tags_as_list_of_maps`. Not add{}
basic_constraintsobject({ ca = bool })The [basic constraints](https://datatracker.ietf.org/doc/html/rfc5280#section-4.{ "ca": false }
namestringID element. Usually the component or solution name, e.g. 'app' or 'jenkins'. Thinull
delimiterstringDelimiter to be used between ID elements. Defaults to `-` (hyphen). Set to `""` null
Outputs (4)
certificate_key_path — Secrets store path containing the certificate private key file.
certificate_pem_path — Secrets store path containing the certificate PEM file.
certificate_pem — Contents of the certificate PEM.
certificate_arn — ARN of certificate stored in ACM that other services may need to refer to. This is useful when the c
Resources (8)
aws_acm_certificateaws_secretsmanager_secretaws_secretsmanager_secret_versionaws_ssm_parametertls_cert_requesttls_locally_signed_certtls_private_keytls_self_signed_cert
Details
FrameworkTerraform Module
LanguageHCL
Version1.3.0
Cloud AWS
★ Stars8
Forks12
Total downloads537.7k
Inputs37
Outputs4
Resources8
Examples4
LicenseApache-2.0
Namespacecloudposse
Updated