-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Manage ACM PCA CA Permissions #10090
Comments
Marking this issue as stale due to inactivity. This helps our maintainers find and focus on the active issues. If this issue receives no comments in the next 30 days it will automatically be closed. Maintainers can also remove the stale label. If this issue was automatically closed and you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thank you! |
@breathingdust should this be open ? it seems like this was closed accidentally by the github-actions bot. |
@nitrocode thanks for the bump, the stale bot is doing what it should in this case. Reopening. |
New reference links as the issue notes are stale: ACM PCA Resource-based policy Using a service-linked role (SLR) with ACM Either case, both should be implemented. |
Hi all 👋 Just letting you know that this is issue is featured on this quarters roadmap. If a PR exists to close the issue a maintainer will review and either make changes directly, or work with the original author to get the contribution merged. If you have written a PR to resolve the issue please ensure the "Allow edits from maintainers" box is checked. Thanks for your patience and we are looking forward to getting this merged soon! |
This functionality has been released in v4.24.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Description
PCA requires you to assign "permissions" to the PCA CA in order to grant access that allows ACM to perform automated renewals of PCA certificates.
See the AWS documentation here: https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaRenewalPermissions.html
New or Affected Resource(s)
Potential Terraform Configuration
Perhaps create a new
aws_acmpca_certificate_authority_permission
resource that allows a user to define permissions on the PCA CA.References
The text was updated successfully, but these errors were encountered: