-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Question] Using AWS ACM with DNS validation #70
Comments
@adiii717 I can see that you are providing subject alternative names (SAN), in the certificate request. The code sample works with the example that AWS has provided using Route53 since they have an Based on AWS documentation we know that the validation record name and value will be identical when requesting a wildcard and root certificate source. One option you have is use the for_each = {
for dvo in aws_acm_certificate.certificate.domain_validation_options : dvo.resource_record_name => {
record_name = dvo.resource_record_name
record_value = dvo.resource_record_value
type = dvo.resource_record_type
domain_name = dvo.domain_name
}
} |
yes it's identical, but we have different load balancers which use their own wildcard certificates with minor variation, the minor variation work like a charm, but as soon as it tries to create the wildcard it failed because the record already exists. btw same behaviour with the above changes |
for now, I just skip the wildcard and just keep the variation, but it would be great if we cloud flag
|
Thanks for sharing your approach. We will definitely consider adding support for overrides when creating a record via the API. |
I am trying to create multiple AWS certificates, but when I tried to create zone records it ended up with
Any way to perform the update in place?
Originally posted by @adiii717 in #25 (comment)
The text was updated successfully, but these errors were encountered: