ca_www.tf 1.7 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849
  1. resource "aws_acmpca_certificate_authority_certificate" "www_subordinate" {
  2. provider = aws.common # COMMON SERVICES
  3. certificate_authority_arn = aws_acmpca_certificate_authority.www_subordinate.arn
  4. certificate = aws_acmpca_certificate.www_subordinate.certificate
  5. certificate_chain = aws_acmpca_certificate.www_subordinate.certificate_chain
  6. }
  7. resource "aws_acmpca_certificate" "www_subordinate" {
  8. certificate_authority_arn = var.root_authority_arn
  9. certificate_signing_request = aws_acmpca_certificate_authority.www_subordinate.certificate_signing_request
  10. signing_algorithm = "SHA512WITHECDSA"
  11. template_arn = "arn:${var.aws_partition}:acm-pca:::template/SubordinateCACertificate_PathLen0/V1"
  12. validity {
  13. type = "YEARS"
  14. value = 10
  15. }
  16. }
  17. resource "aws_acmpca_certificate_authority" "www_subordinate" {
  18. provider = aws.common # COMMON SERVICES
  19. type = "SUBORDINATE"
  20. certificate_authority_configuration {
  21. key_algorithm = "EC_secp384r1"
  22. signing_algorithm = "SHA512WITHECDSA"
  23. subject {
  24. common_name = "XDR WWW Certificates Subordinate CA v2"
  25. country = "US"
  26. organization = "Accenture Federal Services"
  27. organizational_unit = "XDR"
  28. }
  29. }
  30. revocation_configuration {
  31. crl_configuration {
  32. #custom_cname = "crl.xdr.accenturefederalcyber.com" # Maybe we want to hide the S3 bucket? Adds cost and complexity so I'm going with YAGNI for now.
  33. enabled = true
  34. expiration_in_days = 7
  35. s3_bucket_name = aws_s3_bucket.crl.id
  36. }
  37. }
  38. tags = merge(local.standard_tags, var.tags)
  39. depends_on = [aws_s3_bucket_policy.crl]
  40. }