-
Notifications
You must be signed in to change notification settings - Fork 26
import the certificate to aws certificate manager #20
Comments
If you don't need to use ACM, you can instead create an IAM Server Certificate by doing something like:
|
@ozbillwang, @lsowen's mentioned method is the correct way to import a certificate created here into AWS. Don't use "ACM" as it's mainly used for managing AWS' own provisioned certificates. Once you set it up this way it should update naturally as the certificate updates during renewals, etc. Thanks! |
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html
Those are excerpts from the doc linked above. It seems to be strongly suggested to use the ACM. It would also be nice because you could then see them in the console. Iam server certs don't show anywhere in the console as far as I can tell. But either way, the doc seems to implore you to use ACM over iam server certs and suggests server certs are only there for regions that don't use ACM yet. It would be great to have an ACM certificate import feature. |
|
+1 |
This does seem like it could be a useful feature, but I'm not sure the ACME provider is the right place for it. Instead, seems like a feature request for core terraform to add additional functionality to the |
+1 It would make more sense to include the additional functionality into the aws_acm_certificate resource creation. |
+1 |
Hey everyone, apologies for giving outdated info (re: IAM certificates versus ACM). To be honest it's been a while since I've had to deal with certificates within AWS so my own knowledge in that area probably needs a refresh. I haven't really been looking at this issue that much over the last few months as it's been closed. Further to that, regardless of how you get the certificate into AWS, all of this workflow is still outside of the scope of the ACME provider, ultimately meaning that my original comment and some of the other comments here about this functionality belonging in the AWS provider still stands. To get the certificate data out of this provider, you can use Seeing as this issue has been closed for some time and is ultimately inactionable, I'm going to lock the thread. Any questions regarding the AWS provider can be directed to the AWS issue tracker which can be found here. Thanks! |
@vancluever
I put a comment in Hashicorp Terraform (hashicorp/terraform#4782 (comment) )
But I think this should be implemented in provider
terraform-provider-acme
, more than in terraform core service or terraform provider aws.So after I get the free certificate from this provder, I need a new resource to import it to aws certificate manager, something as:
or directly add a new argument in resource
acme_certificate
Can you help?
And need support
reimport
as well to easily renew the certificate.Any suggestions to work around with terraform if i don't have this feature currently?
One more tip. When I manually import the PEMs, I need to remove all "\n" first, otherwise, AWS will report problem.
The text was updated successfully, but these errors were encountered: