crl.tf 2.2 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879
  1. resource "aws_s3_bucket" "crl" {
  2. bucket = "xdr-root-crl"
  3. # CRLs are small, but regenerated every expiration/2 days, (every 3.5 days by default), so there will be a good number of versions
  4. versioning {
  5. enabled = true
  6. }
  7. # TODO: Enable S3 logging... everywhere. We don't have a C2 bucket for this.
  8. #logging {
  9. # target_bucket = module.xdr_config_logging_bucket.s3_bucket_name
  10. # target_prefix = "${var.aws_account_id}-${var.aws_region}-awsconfig/"
  11. #}
  12. lifecycle_rule {
  13. id = "CleanUp"
  14. enabled = true
  15. abort_incomplete_multipart_upload_days = 7
  16. # Clean up old versions after a year
  17. noncurrent_version_expiration {
  18. days = 365
  19. }
  20. }
  21. server_side_encryption_configuration {
  22. rule {
  23. apply_server_side_encryption_by_default {
  24. sse_algorithm = "AES256" # Default keys are fine. We don't really need encryption here.
  25. }
  26. }
  27. }
  28. tags = merge(var.standard_tags, var.tags)
  29. }
  30. data "aws_iam_policy_document" "acmpca_bucket_access" {
  31. statement {
  32. actions = [
  33. "s3:GetBucketAcl",
  34. "s3:GetBucketLocation",
  35. "s3:PutObject",
  36. "s3:PutObjectAcl",
  37. ]
  38. resources = [
  39. aws_s3_bucket.crl.arn,
  40. "${aws_s3_bucket.crl.arn}/*",
  41. ]
  42. principals {
  43. identifiers = ["acm-pca.amazonaws.com"]
  44. type = "Service"
  45. }
  46. # TODO: Consider restricting this to the account, but may need to add Get permissions?
  47. # "Condition":{
  48. # "StringEquals":{
  49. # "aws:SourceAccount":"account",
  50. # "aws:SourceArn":"arn:partition:acm-pca:region:account:certificate-authority/CA-ID"
  51. # }
  52. # }
  53. }
  54. }
  55. resource "aws_s3_bucket_policy" "crl" {
  56. bucket = aws_s3_bucket.crl.id
  57. policy = data.aws_iam_policy_document.acmpca_bucket_access.json
  58. }
  59. # We want the CRL publicly accessible for zero trust websites and such.
  60. #resource "aws_s3_bucket_public_access_block" "crl_bucket_block_public_access" {
  61. # bucket = aws_s3_bucket.crl.id
  62. # block_public_acls = false # Not supported for CRLs, see https://aws.amazon.com/premiumsupport/knowledge-center/s3-bucket-error-crl-acm-ca/
  63. # block_public_policy = true
  64. # ignore_public_acls = true
  65. # restrict_public_buckets = true
  66. # depends_on = [ aws_s3_bucket.crl ]
  67. #}