Skip to content

v0.16.3

Compare
Choose a tag to compare
@cloudpossebot cloudpossebot released this 23 Apr 02:53
927a4cd
Allow management of ACM certs with SANs in multiple zones @nitrocode (#61)

what

  • Allow management of ACM certs with SANs in multiple zones
  • Add versions.tf to examples/complete

why

  • This is useful for more complex certificates and validation of those certificates
  • Workaround without this is to manage validation records outside of the module
resource "aws_route53_record" "default" {
  for_each = {
    for dvo in module.acm_certificate.domain_validation_options[0] : dvo.domain_name => {
      name   = dvo.resource_record_name
      record = dvo.resource_record_value
      type   = dvo.resource_record_type
    }
  }

  name    = each.value.name
  records = [each.value.record]
  type    = each.value.type
  zone_id = data.aws_route53_zone.default[local.domain_to_zone[each.key]].id
  ttl     = 300
}

references

🚀 Enhancements

fix spilt of root domain @shovelwagon (#68)

what

This fixes what was mentioned in - #66

why

Adding a simple length check to where domains get update in an array fixes the mentioned issue.

  Error: no matching Route53Zone found
  
    with module.acm_request_certificate.data.aws_route53_zone.default["io"],
    on .terraform/modules/acm_request_certificate/main.tf line 38, in data "aws_route53_zone" "default":
    38: data "aws_route53_zone" "default" {

references