12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849 |
- resource "aws_acmpca_certificate_authority_certificate" "www_subordinate" {
- provider = aws.common # COMMON SERVICES
- certificate_authority_arn = aws_acmpca_certificate_authority.www_subordinate.arn
- certificate = aws_acmpca_certificate.www_subordinate.certificate
- certificate_chain = aws_acmpca_certificate.www_subordinate.certificate_chain
- }
- resource "aws_acmpca_certificate" "www_subordinate" {
- certificate_authority_arn = var.root_authority_arn
- certificate_signing_request = aws_acmpca_certificate_authority.www_subordinate.certificate_signing_request
- signing_algorithm = "SHA512WITHECDSA"
- template_arn = "arn:${var.aws_partition}:acm-pca:::template/SubordinateCACertificate_PathLen0/V1"
- validity {
- type = "YEARS"
- value = 10
- }
- }
- resource "aws_acmpca_certificate_authority" "www_subordinate" {
- provider = aws.common # COMMON SERVICES
- type = "SUBORDINATE"
- certificate_authority_configuration {
- key_algorithm = "EC_secp384r1"
- signing_algorithm = "SHA512WITHECDSA"
- subject {
- common_name = "XDR WWW Certificates Subordinate CA v2"
- country = "US"
- organization = "Accenture Federal Services"
- organizational_unit = "XDR"
- }
- }
- revocation_configuration {
- crl_configuration {
- #custom_cname = "crl.xdr.accenturefederalcyber.com" # Maybe we want to hide the S3 bucket? Adds cost and complexity so I'm going with YAGNI for now.
- enabled = true
- expiration_in_days = 7
- s3_bucket_name = aws_s3_bucket.crl.id
- }
- }
- tags = merge(local.standard_tags, var.tags)
- depends_on = [aws_s3_bucket_policy.crl]
- }
|