ssm-tls-self-signed-cert
cloudposse/ssm-tls-self-signed-cert/aws
This module creates a self-signed certificate and writes it alongside with its key to SSM Parameter Store (or alternatively AWS Secrets Manager).
terraform-aws-ssm-tls-self-signed-cert    [![README Header][readme_header_img]][readme_header_link] [![Cloud Posse][logo]](https://cpco.io/homepage) This module creates a self-signed certificate and writes it alongside with its key to SSM Parameter Store (or alternatively AWS Secrets Manager). --- This project is part of our comprehensive "SweetOps" approach towards DevOps. [ ][share_email] [ ][share_googleplus] [ ][share_facebook] [ ][share_reddit] [ ][share_linkedin] [ ][share_twitter] ![Terraform Open Source Modules][terraform_modules] It's 100% Open Source and licensed under the APACHE2. We li
| Name | Type | Description | Default |
|---|---|---|---|
| allowed_uses | list(string) | List of keywords each describing a use that is permitted for the issued certific | required |
| id_length_limit | number | Limit `id` to this many characters (minimum 6). Set to `0` for unlimited length. | null |
| label_value_case | string | Controls the letter case of ID elements (labels) as included in `id`, set as tag | null |
| private_key_rsa_bits | number | When `var.cert_key_algorithm` is `RSA`, the size of the generated RSA key in bit | 2048 |
| subject | any | The subject configuration for the certificate. This should be a map that is comp | {} |
| asm_recovery_window_in_days | number | Number of days that AWS Secrets Manager waits before it can delete the secret. T | 30 |
| certificate_backends_enabled | bool | Enable or disable writing to the secrets store. | true |
| context | any | Single object for setting entire context at once. See description of individual | {
"additional_tag_map": {},
"attribu |
| namespace | string | ID element. Usually an abbreviation of your organization name, e.g. 'eg' or 'cp' | null |
| regex_replace_chars | string | Terraform regular expression (regex) string. Characters matching the regex will | null |
| label_key_case | string | Controls the letter case of the `tags` keys (label names) for tags generated by | null |
| certificate_backend_kms_key_id | string | The KMD Key ID (ARN or ID) to use when encrypting either the AWS SSM Parameters | null |
| certificate_chain | object({ cert_pem = | When using ACM as a certificate backend, some certificates store a certificate c | null |
| skid_enabled | bool | Whether or not the subject key identifier (SKID) should be included in the certi | false |
| certificate_backends | set(string) | The certificate backend to use when writing secrets related to the self-signed c | [
"SSM"
] |
| tenant | string | ID element _(Rarely used, not included by default)_. A customer identifier, indi | null |
| tags | map(string) | Additional tags (e.g. `{'BusinessUnit': 'XYZ'}`). Neither the tag keys nor the t | {} |
| additional_tag_map | map(string) | Additional key-value pairs to add to each map in `tags_as_list_of_maps`. Not add | {} |
| basic_constraints | object({ ca = bool }) | The [basic constraints](https://datatracker.ietf.org/doc/html/rfc5280#section-4. | {
"ca": false
} |
| name | string | ID element. Usually the component or solution name, e.g. 'app' or 'jenkins'. Thi | null |
| delimiter | string | Delimiter to be used between ID elements. Defaults to `-` (hyphen). Set to `""` | null |
certificate_key_path — Secrets store path containing the certificate private key file.certificate_pem_path — Secrets store path containing the certificate PEM file.certificate_pem — Contents of the certificate PEM.certificate_arn — ARN of certificate stored in ACM that other services may need to refer to. This is useful when the cAzure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,