-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feature addition: store cert/key in s3 #1
Comments
@tkellen Hello! |
Ah yes, that makes more sense, I have no idea why I didn't suggest that from the outset! Would you feel equally supportive of my implementing this to store the private key as an encrypted string parameter in SSM (and the cert as an unencrypted one) instead? I am in the process of migrating away from secrets manager because I don't use the secret rotation functionality. |
@tkellen I think we can do the script more flexible and support multiple storages for private keys by passing an argument like |
Sounds good to me! I can cover the secretsmanager and parameter store one as well. I'll try to take a look in the next week or so and open a simple WIP PR for your feedback on the implementation before I go too far. |
@tkellen will glad to look at a PR, thanks :) |
Did anything come of this? I'm looking for the same thing. |
Actually, I think it's going to be more work for me to adapt this tool to do what I want than to write my own script, so I won't make a PR. Thanks anyway. It seems strange to me to store the certs in ACM, which doesn't allow exporting. If you need a cert in ACM for something like ALB where you don't need the private key, why not use the ACM provided certs directly? |
@tkellen Thoughts on this one? Decided to move to another solution? Any recommendations? |
Wound up minting certs with terraform/letsencrypt thusly
|
Hello! Thank you so much for making this tool, it does almost exactly what I need it to :)
I have a few use-cases in which I need access to the private key of a generated certificate. As this is not accessible once stored in ACM, would you accept a PR that introduces support for storing certs/private keys in s3 as an alternative destination?
The text was updated successfully, but these errors were encountered: