@trautonen/cdk-dns-validated-certificate 0.1.39 → 0.1.41

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/.jsii CHANGED
@@ -3465,7 +3465,7 @@
3465
3465
  "stability": "stable"
3466
3466
  },
3467
3467
  "homepage": "https://github.com/trautonen/cdk-dns-validated-certificate.git",
3468
- "jsiiVersion": "5.8.27 (build aebddcd)",
3468
+ "jsiiVersion": "5.9.32 (build ac92fbd)",
3469
3469
  "keywords": [
3470
3470
  "aws",
3471
3471
  "cdk",
@@ -3485,7 +3485,7 @@
3485
3485
  },
3486
3486
  "name": "@trautonen/cdk-dns-validated-certificate",
3487
3487
  "readme": {
3488
- "markdown": "# AWS CDK DNS Validated Certificate\n\nCDK does not have a built in construct to manage cross-region or cross-account DNS validated certificates. There's an\nattempt to work around the issue with a cross region references option for stacks, but it has a lot of issues and still\ndoes not solve the cross-account use case.\n\nThis construct solves these problems by managing the certificate as a custom resource and with direct API calls to ACM\nand Route53. In the future it will be possible to support not only Route53, but other DNS services too.\n\n## Usage for cross-region validation\n\n```typescript\n// hosted zone managed by the CDK application\nconst hostedZone: route53.IHostedZone = ...\n// no separate validation role is needed\nconst certificate = new DnsValidatedCertificate(this, 'CrossRegionCertificate', {\n hostedZone: hostedZone,\n domainName: 'example.com', // must be compatible with the hosted zone\n certificateRegion: 'us-east-1' // used by for example CloudFront\n})\n```\n\n## Usage for cross-account validation\n\n```typescript\n// external hosted zone\nconst hostedZone: route53.IHostedZone = route53.HostedZone.fromHostedZoneAttributes(this, 'HostedZone', {\n hostedZoneId: 'Z532DGDEDFS123456789',\n zoneName: 'example.com',\n})\n// validation role on the same account as the hosted zone\nconst roleArn = 'arn:aws:iam::123456789:role/ChangeDnsRecordsRole'\nconst externalId = 'domain-assume'\nconst validationRole: iam.IRole = iam.Role.fromRoleArn(this, 'ValidationRole', roleArn)\nconst certificate = new DnsValidatedCertificate(this, 'CrossAccountCertificate', {\n hostedZone: hostedZone,\n domainName: 'example.com',\n validationRole: validationRole,\n validationExternalId: externalId,\n})\n```\n\n## Usage for cross-account alternative names validation\n\n```typescript\n// example.com is validated on same account against managed hosted zone\n// and secondary.com is validated against external hosted zone on other account\nconst hostedZoneForMain: route53.IHostedZone = ...\nconst hostedZoneForAlternative: route53.IHostedZone =\n route53.HostedZone.fromHostedZoneAttributes(this, 'SecondaryHostedZone', {\n hostedZoneId: 'Z532DGDEDFS123456789',\n zoneName: 'secondary.com'\n})\nconst certificate = new DnsValidatedCertificate(this, 'CrossAccountCertificate', {\n domainName: 'example.com',\n alternativeDomainNames: ['secondary.com'],\n validationHostedZones: [{\n hostedZone: hostedZoneForMain\n },{\n hostedZone: hostedZoneForAlternative,\n validationRole: iam.Role.fromRoleArn(\n this, 'SecondaryValidationRole', 'arn:aws:iam::123456789:role/ChangeDnsRecordsRole'\n ),\n validationExternalId: 'domain-assume'\n }]\n})\n```\n"
3488
+ "markdown": "# @trautonen/cdk-dns-validated-certificate\n\n[![npm version](https://img.shields.io/npm/v/@trautonen/cdk-dns-validated-certificate.svg)](https://www.npmjs.com/package/@trautonen/cdk-dns-validated-certificate)\n[![npm downloads](https://img.shields.io/npm/dm/@trautonen/cdk-dns-validated-certificate.svg)](https://www.npmjs.com/package/@trautonen/cdk-dns-validated-certificate)\n[![license](https://img.shields.io/npm/l/@trautonen/cdk-dns-validated-certificate.svg)](https://github.com/trautonen/cdk-dns-validated-certificate/blob/main/LICENSE)\n[![release](https://github.com/trautonen/cdk-dns-validated-certificate/actions/workflows/release.yml/badge.svg)](https://github.com/trautonen/cdk-dns-validated-certificate/actions/workflows/release.yml)\n\nAn AWS CDK construct for creating DNS-validated ACM certificates with **cross-region** and **cross-account** support.\n\nThe built-in CDK `Certificate` construct does not support cross-region or cross-account DNS validation. The cross-region references workaround has known issues and still does not cover cross-account use cases. This construct solves both problems by managing the full certificate lifecycle — request, DNS validation, and cleanup — through a Lambda-backed custom resource with direct API calls to ACM and Route 53.\n\n## Features\n\n- **Cross-region certificates** — provision a certificate in `us-east-1` for CloudFront while your stack is in any other region\n- **Cross-account validation** — validate against a Route 53 hosted zone in a different AWS account using IAM role assumption\n- **Multiple hosted zones** — validate a primary domain and alternative names against different hosted zones, each with its own credentials\n- **Automatic DNS record management** — creates and cleans up CNAME validation records automatically\n- **Certificate Transparency logging** — configurable CT logging\n- **Tagging support** — tag your certificates via CDK's standard tagging mechanism\n- **Configurable removal policy** — retain certificates on stack deletion if needed\n\n## Installation\n\n```bash\n# npm\nnpm install @trautonen/cdk-dns-validated-certificate\n\n# yarn\nyarn add @trautonen/cdk-dns-validated-certificate\n\n# pnpm\npnpm add @trautonen/cdk-dns-validated-certificate\n\n# bun\nbun add @trautonen/cdk-dns-validated-certificate\n```\n\n### Peer Dependencies\n\nThis construct requires the following peer dependencies:\n\n| Package | Version |\n|---|---|\n| `aws-cdk-lib` | `>= 2.83.1` |\n| `constructs` | `>= 10.5.1` |\n\n## Quick Start\n\n```typescript\nimport { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';\nimport * as route53 from 'aws-cdk-lib/aws-route53';\n\nconst hostedZone = route53.HostedZone.fromLookup(this, 'HostedZone', {\n domainName: 'example.com',\n});\n\nconst certificate = new DnsValidatedCertificate(this, 'Certificate', {\n domainName: 'example.com',\n validationHostedZones: [{\n hostedZone,\n }],\n});\n```\n\n## Usage\n\n### Cross-Region Certificate\n\nA common scenario is provisioning a certificate in `us-east-1` for CloudFront while the CDK stack deploys to another region. Use the `certificateRegion` property to specify where the certificate should be created.\n\n```typescript\nimport { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';\nimport * as route53 from 'aws-cdk-lib/aws-route53';\nimport * as cloudfront from 'aws-cdk-lib/aws-cloudfront';\nimport * as origins from 'aws-cdk-lib/aws-cloudfront-origins';\nimport * as s3 from 'aws-cdk-lib/aws-s3';\n\nconst myBucket = new s3.Bucket(this, 'WebsiteBucket');\n\nconst hostedZone = route53.HostedZone.fromLookup(this, 'HostedZone', {\n domainName: 'example.com',\n});\n\n// Create the certificate in us-east-1 regardless of the stack's region\nconst certificate = new DnsValidatedCertificate(this, 'Certificate', {\n domainName: 'example.com',\n certificateRegion: 'us-east-1',\n validationHostedZones: [{\n hostedZone,\n }],\n});\n\n// Use with a CloudFront distribution\nconst distribution = new cloudfront.Distribution(this, 'Distribution', {\n domainNames: ['example.com'],\n certificate,\n defaultBehavior: {\n origin: new origins.S3Origin(myBucket),\n },\n});\n```\n\n### Cross-Account Validation\n\nWhen the Route 53 hosted zone is in a different AWS account, provide an IAM role that the construct can assume to create DNS validation records in the target account. Optionally, use an external ID for additional security.\n\n```typescript\nimport { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';\nimport * as route53 from 'aws-cdk-lib/aws-route53';\nimport * as iam from 'aws-cdk-lib/aws-iam';\n\n// Reference the hosted zone in the other account\nconst hostedZone = route53.HostedZone.fromHostedZoneAttributes(this, 'HostedZone', {\n hostedZoneId: 'Z0123456789ABCDEFGHIJ',\n zoneName: 'example.com',\n});\n\n// IAM role in the DNS account that permits Route 53 changes\nconst validationRole = iam.Role.fromRoleArn(\n this, 'ValidationRole',\n 'arn:aws:iam::111111111111:role/DnsValidationRole',\n);\n\nconst certificate = new DnsValidatedCertificate(this, 'Certificate', {\n domainName: 'example.com',\n validationHostedZones: [{\n hostedZone,\n validationRole,\n validationExternalId: 'my-external-id', // optional\n }],\n});\n```\n\n> **Note:** The role in the DNS account must trust the account running the CDK stack and have permissions to call `route53:ChangeResourceRecordSets` and `route53:GetChange`.\n\n### Multiple Hosted Zones with Alternative Names\n\nValidate a primary domain and subject alternative names (SANs) against different hosted zones, each with independent credentials. This is useful when your primary domain and alternative domains are managed in separate AWS accounts.\n\n```typescript\nimport { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';\nimport * as route53 from 'aws-cdk-lib/aws-route53';\nimport * as iam from 'aws-cdk-lib/aws-iam';\n\n// Primary domain — hosted zone in the current account\nconst primaryZone = route53.HostedZone.fromLookup(this, 'PrimaryZone', {\n domainName: 'example.com',\n});\n\n// Alternative domain — hosted zone in a different account\nconst secondaryZone = route53.HostedZone.fromHostedZoneAttributes(this, 'SecondaryZone', {\n hostedZoneId: 'Z0123456789ABCDEFGHIJ',\n zoneName: 'example.org',\n});\n\nconst certificate = new DnsValidatedCertificate(this, 'Certificate', {\n domainName: 'example.com',\n alternativeDomainNames: ['example.org'],\n certificateRegion: 'us-east-1',\n validationHostedZones: [{\n hostedZone: primaryZone,\n // No role needed — same account\n }, {\n hostedZone: secondaryZone,\n validationRole: iam.Role.fromRoleArn(\n this, 'SecondaryValidationRole',\n 'arn:aws:iam::222222222222:role/DnsValidationRole',\n ),\n validationExternalId: 'secondary-external-id',\n }],\n});\n```\n\n### Wildcard Certificate\n\nRequest a wildcard certificate that covers both the apex and all subdomains.\n\n```typescript\nimport { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';\nimport * as route53 from 'aws-cdk-lib/aws-route53';\n\nconst hostedZone = route53.HostedZone.fromLookup(this, 'HostedZone', {\n domainName: 'example.com',\n});\n\nconst certificate = new DnsValidatedCertificate(this, 'WildcardCertificate', {\n domainName: 'example.com',\n alternativeDomainNames: ['*.example.com'],\n validationHostedZones: [{\n hostedZone,\n }],\n});\n```\n\n### Configuring Removal Policy\n\nBy default, certificates are destroyed when the stack is deleted. Set a removal policy to retain the certificate instead.\n\n```typescript\nimport { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';\nimport * as cdk from 'aws-cdk-lib';\nimport * as route53 from 'aws-cdk-lib/aws-route53';\n\nconst hostedZone = route53.HostedZone.fromLookup(this, 'HostedZone', {\n domainName: 'example.com',\n});\n\nconst certificate = new DnsValidatedCertificate(this, 'Certificate', {\n domainName: 'example.com',\n validationHostedZones: [{ hostedZone }],\n removalPolicy: cdk.RemovalPolicy.RETAIN,\n});\n```\n\n### Disabling DNS Record Cleanup\n\nBy default, validation CNAME records are removed when the certificate is deleted. To keep them in DNS (useful for faster re-provisioning), set `cleanupValidationRecords` to `false`.\n\n```typescript\nimport { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';\nimport * as route53 from 'aws-cdk-lib/aws-route53';\n\nconst hostedZone = route53.HostedZone.fromLookup(this, 'HostedZone', {\n domainName: 'example.com',\n});\n\nconst certificate = new DnsValidatedCertificate(this, 'Certificate', {\n domainName: 'example.com',\n validationHostedZones: [{ hostedZone }],\n cleanupValidationRecords: false,\n});\n```\n\n### Using a Custom Lambda Execution Role\n\nProvide your own IAM role for the Lambda function that manages the certificate lifecycle. This is useful when you need fine-grained control over permissions or want to use a shared role.\n\n```typescript\nimport { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';\nimport * as iam from 'aws-cdk-lib/aws-iam';\nimport * as route53 from 'aws-cdk-lib/aws-route53';\n\nconst hostedZone = route53.HostedZone.fromLookup(this, 'HostedZone', {\n domainName: 'example.com',\n});\n\nconst lambdaRole = new iam.Role(this, 'CertificateLambdaRole', {\n assumedBy: new iam.ServicePrincipal('lambda.amazonaws.com'),\n managedPolicies: [\n iam.ManagedPolicy.fromAwsManagedPolicyName('service-role/AWSLambdaBasicExecutionRole'),\n ],\n});\n\nconst certificate = new DnsValidatedCertificate(this, 'Certificate', {\n domainName: 'example.com',\n validationHostedZones: [{ hostedZone }],\n customResourceRole: lambdaRole,\n});\n```\n\n## API Reference\n\n### `DnsValidatedCertificate`\n\n| Property | Type | Description |\n|---|---|---|\n| `certificateArn` | `string` | The ARN of the certificate |\n| `certificateRegion` | `string` | The region the certificate is deployed to |\n| `tags` | `TagManager` | Tag manager for the certificate |\n\n### `DnsValidatedCertificateProps`\n\n| Property | Type | Required | Default | Description |\n|---|---|---|---|---|\n| `domainName` | `string` | Yes | — | Fully qualified domain name. May contain a wildcard (`*.example.com`). |\n| `validationHostedZones` | `ValidationHostedZone[]` | Yes | — | Route 53 hosted zones to use for DNS validation. |\n| `alternativeDomainNames` | `string[]` | No | — | Subject Alternative Names (SANs) for the certificate. |\n| `certificateRegion` | `string` | No | Stack region | Region for the certificate (e.g. `us-east-1` for CloudFront). |\n| `customResourceRole` | `IRole` | No | Auto-created | IAM role for the Lambda custom resource. |\n| `cleanupValidationRecords` | `boolean` | No | `true` | Remove DNS validation records on certificate deletion. |\n| `transparencyLoggingEnabled` | `boolean` | No | `true` | Enable Certificate Transparency logging. |\n| `removalPolicy` | `RemovalPolicy` | No | `DESTROY` | What to do with the certificate when the stack is deleted. |\n\n### `ValidationHostedZone`\n\n| Property | Type | Required | Default | Description |\n|---|---|---|---|---|\n| `hostedZone` | `IHostedZone` | Yes | — | The Route 53 hosted zone for DNS validation. |\n| `validationRole` | `IRole` | No | — | IAM role to assume for cross-account DNS changes. |\n| `validationExternalId` | `string` | No | — | External ID for the role assumption. |\n\nFor the full API reference, see [API.md](API.md).\n\n## How It Works\n\nThe construct deploys a Lambda function (Node.js 22.x, ARM64) as a CloudFormation custom resource that:\n\n1. **Requests** a DNS-validated certificate from ACM\n2. **Creates** CNAME validation records in the specified Route 53 hosted zones (assuming cross-account roles when needed)\n3. **Waits** for ACM to validate the certificate\n4. **Applies** tags to the certificate\n5. **Cleans up** validation records and deletes the certificate on stack removal\n\nThe Lambda function handles the full lifecycle including updates (detecting when a new certificate is needed vs. a tag-only update) and graceful deletion (waiting for the certificate to stop being in-use before deleting).\n\n## License\n\n[Apache-2.0](LICENSE)\n"
3489
3489
  },
3490
3490
  "repository": {
3491
3491
  "type": "git",
@@ -3921,6 +3921,6 @@
3921
3921
  "symbolId": "src/dns-validated-certificate:ValidationHostedZone"
3922
3922
  }
3923
3923
  },
3924
- "version": "0.1.39",
3925
- "fingerprint": "QOILIWNqo2DTd8LzGwmqSEaGj1Sytl7rzwzK/GS+Hh4="
3924
+ "version": "0.1.41",
3925
+ "fingerprint": "8UKvOSI61xK0XIkClXpyOghMN/QKKHrwwCNIKmQAtRk="
3926
3926
  }
package/README.md CHANGED
@@ -1,67 +1,308 @@
1
- # AWS CDK DNS Validated Certificate
1
+ # @trautonen/cdk-dns-validated-certificate
2
2
 
3
- CDK does not have a built in construct to manage cross-region or cross-account DNS validated certificates. There's an
4
- attempt to work around the issue with a cross region references option for stacks, but it has a lot of issues and still
5
- does not solve the cross-account use case.
3
+ [![npm version](https://img.shields.io/npm/v/@trautonen/cdk-dns-validated-certificate.svg)](https://www.npmjs.com/package/@trautonen/cdk-dns-validated-certificate)
4
+ [![npm downloads](https://img.shields.io/npm/dm/@trautonen/cdk-dns-validated-certificate.svg)](https://www.npmjs.com/package/@trautonen/cdk-dns-validated-certificate)
5
+ [![license](https://img.shields.io/npm/l/@trautonen/cdk-dns-validated-certificate.svg)](https://github.com/trautonen/cdk-dns-validated-certificate/blob/main/LICENSE)
6
+ [![release](https://github.com/trautonen/cdk-dns-validated-certificate/actions/workflows/release.yml/badge.svg)](https://github.com/trautonen/cdk-dns-validated-certificate/actions/workflows/release.yml)
6
7
 
7
- This construct solves these problems by managing the certificate as a custom resource and with direct API calls to ACM
8
- and Route53. In the future it will be possible to support not only Route53, but other DNS services too.
8
+ An AWS CDK construct for creating DNS-validated ACM certificates with **cross-region** and **cross-account** support.
9
9
 
10
- ## Usage for cross-region validation
10
+ The built-in CDK `Certificate` construct does not support cross-region or cross-account DNS validation. The cross-region references workaround has known issues and still does not cover cross-account use cases. This construct solves both problems by managing the full certificate lifecycle — request, DNS validation, and cleanup — through a Lambda-backed custom resource with direct API calls to ACM and Route 53.
11
+
12
+ ## Features
13
+
14
+ - **Cross-region certificates** — provision a certificate in `us-east-1` for CloudFront while your stack is in any other region
15
+ - **Cross-account validation** — validate against a Route 53 hosted zone in a different AWS account using IAM role assumption
16
+ - **Multiple hosted zones** — validate a primary domain and alternative names against different hosted zones, each with its own credentials
17
+ - **Automatic DNS record management** — creates and cleans up CNAME validation records automatically
18
+ - **Certificate Transparency logging** — configurable CT logging
19
+ - **Tagging support** — tag your certificates via CDK's standard tagging mechanism
20
+ - **Configurable removal policy** — retain certificates on stack deletion if needed
21
+
22
+ ## Installation
23
+
24
+ ```bash
25
+ # npm
26
+ npm install @trautonen/cdk-dns-validated-certificate
27
+
28
+ # yarn
29
+ yarn add @trautonen/cdk-dns-validated-certificate
30
+
31
+ # pnpm
32
+ pnpm add @trautonen/cdk-dns-validated-certificate
33
+
34
+ # bun
35
+ bun add @trautonen/cdk-dns-validated-certificate
36
+ ```
37
+
38
+ ### Peer Dependencies
39
+
40
+ This construct requires the following peer dependencies:
41
+
42
+ | Package | Version |
43
+ |---|---|
44
+ | `aws-cdk-lib` | `>= 2.83.1` |
45
+ | `constructs` | `>= 10.5.1` |
46
+
47
+ ## Quick Start
11
48
 
12
49
  ```typescript
13
- // hosted zone managed by the CDK application
14
- const hostedZone: route53.IHostedZone = ...
15
- // no separate validation role is needed
16
- const certificate = new DnsValidatedCertificate(this, 'CrossRegionCertificate', {
17
- hostedZone: hostedZone,
18
- domainName: 'example.com', // must be compatible with the hosted zone
19
- certificateRegion: 'us-east-1' // used by for example CloudFront
20
- })
50
+ import { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';
51
+ import * as route53 from 'aws-cdk-lib/aws-route53';
52
+
53
+ const hostedZone = route53.HostedZone.fromLookup(this, 'HostedZone', {
54
+ domainName: 'example.com',
55
+ });
56
+
57
+ const certificate = new DnsValidatedCertificate(this, 'Certificate', {
58
+ domainName: 'example.com',
59
+ validationHostedZones: [{
60
+ hostedZone,
61
+ }],
62
+ });
21
63
  ```
22
64
 
23
- ## Usage for cross-account validation
65
+ ## Usage
66
+
67
+ ### Cross-Region Certificate
68
+
69
+ A common scenario is provisioning a certificate in `us-east-1` for CloudFront while the CDK stack deploys to another region. Use the `certificateRegion` property to specify where the certificate should be created.
24
70
 
25
71
  ```typescript
26
- // external hosted zone
27
- const hostedZone: route53.IHostedZone = route53.HostedZone.fromHostedZoneAttributes(this, 'HostedZone', {
28
- hostedZoneId: 'Z532DGDEDFS123456789',
72
+ import { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';
73
+ import * as route53 from 'aws-cdk-lib/aws-route53';
74
+ import * as cloudfront from 'aws-cdk-lib/aws-cloudfront';
75
+ import * as origins from 'aws-cdk-lib/aws-cloudfront-origins';
76
+ import * as s3 from 'aws-cdk-lib/aws-s3';
77
+
78
+ const myBucket = new s3.Bucket(this, 'WebsiteBucket');
79
+
80
+ const hostedZone = route53.HostedZone.fromLookup(this, 'HostedZone', {
81
+ domainName: 'example.com',
82
+ });
83
+
84
+ // Create the certificate in us-east-1 regardless of the stack's region
85
+ const certificate = new DnsValidatedCertificate(this, 'Certificate', {
86
+ domainName: 'example.com',
87
+ certificateRegion: 'us-east-1',
88
+ validationHostedZones: [{
89
+ hostedZone,
90
+ }],
91
+ });
92
+
93
+ // Use with a CloudFront distribution
94
+ const distribution = new cloudfront.Distribution(this, 'Distribution', {
95
+ domainNames: ['example.com'],
96
+ certificate,
97
+ defaultBehavior: {
98
+ origin: new origins.S3Origin(myBucket),
99
+ },
100
+ });
101
+ ```
102
+
103
+ ### Cross-Account Validation
104
+
105
+ When the Route 53 hosted zone is in a different AWS account, provide an IAM role that the construct can assume to create DNS validation records in the target account. Optionally, use an external ID for additional security.
106
+
107
+ ```typescript
108
+ import { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';
109
+ import * as route53 from 'aws-cdk-lib/aws-route53';
110
+ import * as iam from 'aws-cdk-lib/aws-iam';
111
+
112
+ // Reference the hosted zone in the other account
113
+ const hostedZone = route53.HostedZone.fromHostedZoneAttributes(this, 'HostedZone', {
114
+ hostedZoneId: 'Z0123456789ABCDEFGHIJ',
29
115
  zoneName: 'example.com',
30
- })
31
- // validation role on the same account as the hosted zone
32
- const roleArn = 'arn:aws:iam::123456789:role/ChangeDnsRecordsRole'
33
- const externalId = 'domain-assume'
34
- const validationRole: iam.IRole = iam.Role.fromRoleArn(this, 'ValidationRole', roleArn)
35
- const certificate = new DnsValidatedCertificate(this, 'CrossAccountCertificate', {
36
- hostedZone: hostedZone,
116
+ });
117
+
118
+ // IAM role in the DNS account that permits Route 53 changes
119
+ const validationRole = iam.Role.fromRoleArn(
120
+ this, 'ValidationRole',
121
+ 'arn:aws:iam::111111111111:role/DnsValidationRole',
122
+ );
123
+
124
+ const certificate = new DnsValidatedCertificate(this, 'Certificate', {
37
125
  domainName: 'example.com',
38
- validationRole: validationRole,
39
- validationExternalId: externalId,
40
- })
126
+ validationHostedZones: [{
127
+ hostedZone,
128
+ validationRole,
129
+ validationExternalId: 'my-external-id', // optional
130
+ }],
131
+ });
41
132
  ```
42
133
 
43
- ## Usage for cross-account alternative names validation
134
+ > **Note:** The role in the DNS account must trust the account running the CDK stack and have permissions to call `route53:ChangeResourceRecordSets` and `route53:GetChange`.
135
+
136
+ ### Multiple Hosted Zones with Alternative Names
137
+
138
+ Validate a primary domain and subject alternative names (SANs) against different hosted zones, each with independent credentials. This is useful when your primary domain and alternative domains are managed in separate AWS accounts.
44
139
 
45
140
  ```typescript
46
- // example.com is validated on same account against managed hosted zone
47
- // and secondary.com is validated against external hosted zone on other account
48
- const hostedZoneForMain: route53.IHostedZone = ...
49
- const hostedZoneForAlternative: route53.IHostedZone =
50
- route53.HostedZone.fromHostedZoneAttributes(this, 'SecondaryHostedZone', {
51
- hostedZoneId: 'Z532DGDEDFS123456789',
52
- zoneName: 'secondary.com'
53
- })
54
- const certificate = new DnsValidatedCertificate(this, 'CrossAccountCertificate', {
141
+ import { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';
142
+ import * as route53 from 'aws-cdk-lib/aws-route53';
143
+ import * as iam from 'aws-cdk-lib/aws-iam';
144
+
145
+ // Primary domain — hosted zone in the current account
146
+ const primaryZone = route53.HostedZone.fromLookup(this, 'PrimaryZone', {
147
+ domainName: 'example.com',
148
+ });
149
+
150
+ // Alternative domain — hosted zone in a different account
151
+ const secondaryZone = route53.HostedZone.fromHostedZoneAttributes(this, 'SecondaryZone', {
152
+ hostedZoneId: 'Z0123456789ABCDEFGHIJ',
153
+ zoneName: 'example.org',
154
+ });
155
+
156
+ const certificate = new DnsValidatedCertificate(this, 'Certificate', {
55
157
  domainName: 'example.com',
56
- alternativeDomainNames: ['secondary.com'],
158
+ alternativeDomainNames: ['example.org'],
159
+ certificateRegion: 'us-east-1',
57
160
  validationHostedZones: [{
58
- hostedZone: hostedZoneForMain
59
- },{
60
- hostedZone: hostedZoneForAlternative,
161
+ hostedZone: primaryZone,
162
+ // No role needed — same account
163
+ }, {
164
+ hostedZone: secondaryZone,
61
165
  validationRole: iam.Role.fromRoleArn(
62
- this, 'SecondaryValidationRole', 'arn:aws:iam::123456789:role/ChangeDnsRecordsRole'
166
+ this, 'SecondaryValidationRole',
167
+ 'arn:aws:iam::222222222222:role/DnsValidationRole',
63
168
  ),
64
- validationExternalId: 'domain-assume'
65
- }]
66
- })
169
+ validationExternalId: 'secondary-external-id',
170
+ }],
171
+ });
67
172
  ```
173
+
174
+ ### Wildcard Certificate
175
+
176
+ Request a wildcard certificate that covers both the apex and all subdomains.
177
+
178
+ ```typescript
179
+ import { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';
180
+ import * as route53 from 'aws-cdk-lib/aws-route53';
181
+
182
+ const hostedZone = route53.HostedZone.fromLookup(this, 'HostedZone', {
183
+ domainName: 'example.com',
184
+ });
185
+
186
+ const certificate = new DnsValidatedCertificate(this, 'WildcardCertificate', {
187
+ domainName: 'example.com',
188
+ alternativeDomainNames: ['*.example.com'],
189
+ validationHostedZones: [{
190
+ hostedZone,
191
+ }],
192
+ });
193
+ ```
194
+
195
+ ### Configuring Removal Policy
196
+
197
+ By default, certificates are destroyed when the stack is deleted. Set a removal policy to retain the certificate instead.
198
+
199
+ ```typescript
200
+ import { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';
201
+ import * as cdk from 'aws-cdk-lib';
202
+ import * as route53 from 'aws-cdk-lib/aws-route53';
203
+
204
+ const hostedZone = route53.HostedZone.fromLookup(this, 'HostedZone', {
205
+ domainName: 'example.com',
206
+ });
207
+
208
+ const certificate = new DnsValidatedCertificate(this, 'Certificate', {
209
+ domainName: 'example.com',
210
+ validationHostedZones: [{ hostedZone }],
211
+ removalPolicy: cdk.RemovalPolicy.RETAIN,
212
+ });
213
+ ```
214
+
215
+ ### Disabling DNS Record Cleanup
216
+
217
+ By default, validation CNAME records are removed when the certificate is deleted. To keep them in DNS (useful for faster re-provisioning), set `cleanupValidationRecords` to `false`.
218
+
219
+ ```typescript
220
+ import { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';
221
+ import * as route53 from 'aws-cdk-lib/aws-route53';
222
+
223
+ const hostedZone = route53.HostedZone.fromLookup(this, 'HostedZone', {
224
+ domainName: 'example.com',
225
+ });
226
+
227
+ const certificate = new DnsValidatedCertificate(this, 'Certificate', {
228
+ domainName: 'example.com',
229
+ validationHostedZones: [{ hostedZone }],
230
+ cleanupValidationRecords: false,
231
+ });
232
+ ```
233
+
234
+ ### Using a Custom Lambda Execution Role
235
+
236
+ Provide your own IAM role for the Lambda function that manages the certificate lifecycle. This is useful when you need fine-grained control over permissions or want to use a shared role.
237
+
238
+ ```typescript
239
+ import { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';
240
+ import * as iam from 'aws-cdk-lib/aws-iam';
241
+ import * as route53 from 'aws-cdk-lib/aws-route53';
242
+
243
+ const hostedZone = route53.HostedZone.fromLookup(this, 'HostedZone', {
244
+ domainName: 'example.com',
245
+ });
246
+
247
+ const lambdaRole = new iam.Role(this, 'CertificateLambdaRole', {
248
+ assumedBy: new iam.ServicePrincipal('lambda.amazonaws.com'),
249
+ managedPolicies: [
250
+ iam.ManagedPolicy.fromAwsManagedPolicyName('service-role/AWSLambdaBasicExecutionRole'),
251
+ ],
252
+ });
253
+
254
+ const certificate = new DnsValidatedCertificate(this, 'Certificate', {
255
+ domainName: 'example.com',
256
+ validationHostedZones: [{ hostedZone }],
257
+ customResourceRole: lambdaRole,
258
+ });
259
+ ```
260
+
261
+ ## API Reference
262
+
263
+ ### `DnsValidatedCertificate`
264
+
265
+ | Property | Type | Description |
266
+ |---|---|---|
267
+ | `certificateArn` | `string` | The ARN of the certificate |
268
+ | `certificateRegion` | `string` | The region the certificate is deployed to |
269
+ | `tags` | `TagManager` | Tag manager for the certificate |
270
+
271
+ ### `DnsValidatedCertificateProps`
272
+
273
+ | Property | Type | Required | Default | Description |
274
+ |---|---|---|---|---|
275
+ | `domainName` | `string` | Yes | — | Fully qualified domain name. May contain a wildcard (`*.example.com`). |
276
+ | `validationHostedZones` | `ValidationHostedZone[]` | Yes | — | Route 53 hosted zones to use for DNS validation. |
277
+ | `alternativeDomainNames` | `string[]` | No | — | Subject Alternative Names (SANs) for the certificate. |
278
+ | `certificateRegion` | `string` | No | Stack region | Region for the certificate (e.g. `us-east-1` for CloudFront). |
279
+ | `customResourceRole` | `IRole` | No | Auto-created | IAM role for the Lambda custom resource. |
280
+ | `cleanupValidationRecords` | `boolean` | No | `true` | Remove DNS validation records on certificate deletion. |
281
+ | `transparencyLoggingEnabled` | `boolean` | No | `true` | Enable Certificate Transparency logging. |
282
+ | `removalPolicy` | `RemovalPolicy` | No | `DESTROY` | What to do with the certificate when the stack is deleted. |
283
+
284
+ ### `ValidationHostedZone`
285
+
286
+ | Property | Type | Required | Default | Description |
287
+ |---|---|---|---|---|
288
+ | `hostedZone` | `IHostedZone` | Yes | — | The Route 53 hosted zone for DNS validation. |
289
+ | `validationRole` | `IRole` | No | — | IAM role to assume for cross-account DNS changes. |
290
+ | `validationExternalId` | `string` | No | — | External ID for the role assumption. |
291
+
292
+ For the full API reference, see [API.md](API.md).
293
+
294
+ ## How It Works
295
+
296
+ The construct deploys a Lambda function (Node.js 22.x, ARM64) as a CloudFormation custom resource that:
297
+
298
+ 1. **Requests** a DNS-validated certificate from ACM
299
+ 2. **Creates** CNAME validation records in the specified Route 53 hosted zones (assuming cross-account roles when needed)
300
+ 3. **Waits** for ACM to validate the certificate
301
+ 4. **Applies** tags to the certificate
302
+ 5. **Cleans up** validation records and deletes the certificate on stack removal
303
+
304
+ The Lambda function handles the full lifecycle including updates (detecting when a new certificate is needed vs. a tag-only update) and graceful deletion (waiting for the certificate to stop being in-use before deleting).
305
+
306
+ ## License
307
+
308
+ [Apache-2.0](LICENSE)
@@ -243,5 +243,5 @@ class DnsValidatedCertificate extends cdk.Resource {
243
243
  }
244
244
  exports.DnsValidatedCertificate = DnsValidatedCertificate;
245
245
  _a = JSII_RTTI_SYMBOL_1;
246
- DnsValidatedCertificate[_a] = { fqn: "@trautonen/cdk-dns-validated-certificate.DnsValidatedCertificate", version: "0.1.39" };
246
+ DnsValidatedCertificate[_a] = { fqn: "@trautonen/cdk-dns-validated-certificate.DnsValidatedCertificate", version: "0.1.41" };
247
247
  //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"dns-validated-certificate.js","sourceRoot":"","sources":["../src/dns-validated-certificate.ts"],"names":[],"mappings":";;;;;AAAA,mCAAkC;AAElC,yDAAwD;AACxD,2CAA0C;AAC1C,iDAAgD;AAEhD,iEAAgE;AAEhE,qFAA+E;AAE/E,mCAAgG;AAiHhG,MAAM,8BAA8B,GAAG,iCAAiC,CAAA;AACxE,MAAM,0BAA0B,GAAG,sCAAsC,CAAA;AAEzE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiEG;AACH,MAAa,uBAAwB,SAAQ,GAAG,CAAC,QAAQ;IAavD;;;;;;OAMG;IACH,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAmC;QAC3E,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAA;QAEhB,MAAM,UAAU,GAAG,IAAI,CAAC,mBAAmB,CAAC,KAAK,CAAC,UAAU,CAAC,CAAA;QAC7D,MAAM,sBAAsB,GAAG,KAAK,CAAC,sBAAsB,EAAE,GAAG,CAAC,CAAC,qBAAqB,EAAE,EAAE,CACzF,IAAI,CAAC,mBAAmB,CAAC,qBAAqB,CAAC,CAChD,CAAA;QACD,MAAM,UAAU,GAAG,CAAC,UAAU,EAAE,GAAG,CAAC,sBAAsB,IAAI,EAAE,CAAC,CAAC,CAAA;QAElE,IAAI,CAAC,iBAAiB,GAAG,KAAK,CAAC,iBAAiB,IAAI,IAAI,CAAC,KAAK,CAAC,MAAM,CAAA;QACrE,IAAI,CAAC,IAAI,GAAG,IAAI,GAAG,CAAC,UAAU,CAAC,GAAG,CAAC,OAAO,CAAC,GAAG,EAAE,0BAA0B,CAAC,CAAA;QAC3E,IAAI,CAAC,aAAa,GAAG,KAAK,CAAC,aAAa,IAAI,GAAG,CAAC,aAAa,CAAC,OAAO,CAAA;QAErE,MAAM,iBAAiB,GAAG,IAAI,6DAA4B,CAAC,IAAI,EAAE,mBAAmB,EAAE;YACpF,YAAY,EAAE,MAAM,CAAC,YAAY,CAAC,MAAM;YACxC,OAAO,EAAE,GAAG,CAAC,QAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YACjC,IAAI,EAAE,KAAK,CAAC,kBAAkB;SAC/B,CAAC,CAAA;QAEF,iBAAiB,CAAC,eAAe,CAC/B,IAAI,GAAG,CAAC,eAAe,CAAC;YACtB,MAAM,EAAE,GAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO,EAAE;gBACP,wBAAwB;gBACxB,yBAAyB;gBACzB,uBAAuB;gBACvB,0BAA0B;aAC3B;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CACH,CAAA;QAED,MAAM,cAAc,GAAG,IAAA,yBAAiB,EACtC,KAAK,CAAC,qBAAqB,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,EACnE,UAAU,EACV,CAAC,MAAM,EAAE,EAAE,CAAC,MAAM,CACnB,CAAA;QACD,MAAM,mBAAmB,GAAG,KAAK,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,cAAc,KAAK,SAAS,CAAC,CAAA;QAC3G,MAAM,sBAAsB,GAAG,KAAK,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,cAAc,KAAK,SAAS,CAAC,CAAA;QAE9G,mBAAmB,CAAC,OAAO,CAAC,CAAC,IAAI,EAAE,EAAE;YACnC,iBAAiB,CAAC,eAAe,CAC/B,IAAI,GAAG,CAAC,eAAe,CAAC;gBACtB,MAAM,EAAE,GAAG,CAAC,MAAM,CAAC,KAAK;gBACxB,OAAO,EAAE,CAAC,gBAAgB,CAAC;gBAC3B,SAAS,EAAE,CAAC,IAAI,CAAC,cAAe,CAAC,OAAO,CAAC;aAC1C,CAAC,CACH,CAAA;QACH,CAAC,CAAC,CAAA;QAEF,sBAAsB,CAAC,OAAO,CAAC,CAAC,IAAI,EAAE,EAAE;YACtC,iBAAiB,CAAC,eAAe,CAC/B,IAAI,GAAG,CAAC,eAAe,CAAC;gBACtB,OAAO,EAAE,CAAC,mBAAmB,CAAC;gBAC9B,SAAS,EAAE,CAAC,GAAG,CAAC;aACjB,CAAC,CACH,CAAA;YACD,MAAM,WAAW,GAAG,cAAc,CAAC,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAA;YAC5D,IAAI,WAAW,IAAI,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAC1C,iBAAiB,CAAC,eAAe,CAC/B,IAAI,GAAG,CAAC,eAAe,CAAC;oBACtB,OAAO,EAAE,CAAC,kCAAkC,CAAC;oBAC7C,SAAS,EAAE,CAAC,gCAAgC,IAAI,CAAC,qBAAqB,CAAC,IAAI,CAAC,UAAU,CAAC,YAAY,CAAC,EAAE,CAAC;oBACvG,UAAU,EAAE;wBACV,2BAA2B,EAAE;4BAC3B,6CAA6C,EAAE,CAAC,OAAO,CAAC;4BACxD,yCAAyC,EAAE,CAAC,QAAQ,EAAE,QAAQ,CAAC;yBAChE;wBACD,yBAAyB,EAAE;4BACzB,uDAAuD,EAAE,WAAW,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,KAAK,EAAE,EAAE;gCACvF,OAAO,IAAI,CAAC,kBAAkB,CAAC,iBAAiB,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,GAAG,KAAK,EAAE,EAAE,IAAI,CAAC,CAAA;4BAC1F,CAAC,CAAC;yBACH;qBACF;iBACF,CAAC,CACH,CAAA;YACH,CAAC;QACH,CAAC,CAAC,CAAA;QAEF,MAAM,iBAAiB,GAAG,IAAI,gBAAgB,CAAC,QAAQ,CAAC,IAAI,EAAE,mBAAmB,EAAE;YACjF,cAAc,EAAE,iBAAiB;SAClC,CAAC,CAAA;QAEF,MAAM,qBAAqB,GAAG,KAAK,CAAC,qBAAqB,CAAC,GAAG,CAA2C,CAAC,IAAI,EAAE,EAAE;YAC/G,MAAM,UAAU,GAAmC;gBACjD,UAAU,EAAE,IAAI,CAAC,mBAAmB,CAAC,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC;gBAC9D,YAAY,EAAE,IAAI,CAAC,qBAAqB,CAAC,IAAI,CAAC,UAAU,CAAC,YAAY,CAAC;gBACtE,iBAAiB,EAAE,IAAI,CAAC,cAAc,EAAE,OAAO;gBAC/C,oBAAoB,EAAE,IAAI,CAAC,oBAAoB;aAChD,CAAA;YACD,OAAO,CAAC,UAAU,CAAC,UAAU,EAAE,UAAU,CAAC,CAAA;QAC5C,CAAC,CAAC,CAAA;QAEF,MAAM,UAAU,GAAe;YAC7B,UAAU,EAAE,UAAU;YACtB,sBAAsB,EAAE,sBAAsB;YAC9C,qBAAqB,EAAE,MAAM,CAAC,WAAW,CAAC,qBAAqB,CAAC;YAChE,iBAAiB,EAAE,IAAI,CAAC,iBAAiB;YACzC,wBAAwB,EAAE,IAAA,uBAAe,EAAC,KAAK,CAAC,wBAAwB,IAAI,IAAI,CAAC;YACjF,0BAA0B,EAAE,IAAA,uBAAe,EAAC,KAAK,CAAC,0BAA0B,IAAI,IAAI,CAAC;YACrF,IAAI,EAAE,GAAG,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,OAAO,EAAE,GAAG,EAAE,CAAC,IAAI,CAAC,IAAI,CAAC,UAAU,EAAE,EAAE,CAAsC;YAClG,aAAa,EAAE,GAAG,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,OAAO,EAAE,GAAG,EAAE,CAAC,IAAI,CAAC,aAAa,EAAE,CAAC;SACtE,CAAA;QAED,MAAM,WAAW,GAAG,IAAI,GAAG,CAAC,cAAc,CAAC,IAAI,EAAE,mBAAmB,EAAE;YACpE,YAAY,EAAE,iBAAiB,CAAC,YAAY;YAC5C,YAAY,EAAE,8BAA8B;YAC5C,UAAU;SACX,CAAC,CAAA;QAEF,sEAAsE;QACtE,mEAAmE;QACnE,qEAAqE;QACrE,kEAAkE;QAClE,WAAW,CAAC,IAAI,CAAC,aAAa,CAAC,iBAAiB,CAAC,CAAA;QACjD,IAAI,iBAAiB,CAAC,IAAI,KAAK,SAAS,EAAE,CAAC;YACzC,WAAW,CAAC,IAAI,CAAC,aAAa,CAAC,iBAAiB,CAAC,IAAI,CAAC,CAAA;YACtD,MAAM,MAAM,GAAG,iBAAiB,CAAC,IAAI,CAAC,IAAI,CAAC,YAAY,CAAC,eAAe,CAAC,CAAA;YACxE,IAAI,MAAM,KAAK,SAAS,EAAE,CAAC;gBACzB,WAAW,CAAC,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,CAAA;YACxC,CAAC;QACH,CAAC;QAED,IAAI,CAAC,cAAc,GAAG,WAAW,CAAC,YAAY,CAAC,KAAK,CAAC,CAAA;QAErD,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC;YACtB,QAAQ,EAAE,GAAG,EAAE,CACb,IAAI,CAAC,4BAA4B,CAC/B,UAAU,EACV,qBAAqB,CAAC,GAAG,CAAC,CAAC,CAAC,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,CACvD;SACJ,CAAC,CAAA;IACJ,CAAC;IAED,kBAAkB,CAAC,KAAoD;QACrE,OAAO,IAAI,UAAU,CAAC,MAAM,CAAC;YAC3B,MAAM,EAAE,GAAG,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC,CAAC;YAC5B,GAAG,KAAK;YACR,aAAa,EAAE,EAAE,cAAc,EAAE,IAAI,CAAC,cAAc,EAAE;YACtD,UAAU,EAAE,cAAc;YAC1B,SAAS,EAAE,wBAAwB;YACnC,MAAM,EAAE,IAAI,CAAC,iBAAiB;YAC9B,SAAS,EAAE,UAAU,CAAC,KAAK,CAAC,OAAO;SACpC,CAAC,CAAA;IACJ,CAAC;IAED,kBAAkB,CAAC,MAAyB;QAC1C,IAAI,CAAC,aAAa,GAAG,MAAM,CAAA;IAC7B,CAAC;IAED,+IAA+I;IAC/I,qEAAqE;IACrE,6CAA6C;IAC7C,IAAW,cAAc;QACvB,OAAO;YACL,aAAa,EAAE,IAAI,CAAC,cAAc;SACnC,CAAA;IACH,CAAC;IAEO,mBAAmB,CAAC,UAAkB;QAC5C,IAAI,GAAG,CAAC,KAAK,CAAC,YAAY,CAAC,UAAU,CAAC,EAAE,CAAC;YACvC,OAAO,UAAU,CAAA;QACnB,CAAC;QACD,OAAO,IAAA,uBAAe,EAAC,UAAU,CAAC,CAAA;IACpC,CAAC;IAEO,qBAAqB,CAAC,YAAoB;QAChD,IAAI,GAAG,CAAC,KAAK,CAAC,YAAY,CAAC,YAAY,CAAC,EAAE,CAAC;YACzC,OAAO,YAAY,CAAA;QACrB,CAAC;QACD,OAAO,IAAA,yBAAiB,EAAC,YAAY,CAAC,CAAA;IACxC,CAAC;IAEO,kBAAkB,CAAC,EAAU,EAAE,UAAkB;QACvD,MAAM,KAAK,GAAG,GAAG,CAAC,EAAE,CAAC,KAAK,CAAC,GAAG,EAAE,UAAU,CAAC,CAAA;QAC3C,MAAM,KAAK,GAAG,GAAG,CAAC,EAAE,CAAC,MAAM,CAAC,CAAC,EAAE,KAAK,CAAC,CAAA;QACrC,MAAM,UAAU,GAAG,IAAI,GAAG,CAAC,YAAY,CAAC,IAAI,EAAE,KAAK,EAAE,EAAE,EAAE;YACvD,UAAU,EAAE,GAAG,CAAC,EAAE,CAAC,eAAe,CAAC,KAAK,EAAE,GAAG,CAAC;SAC/C,CAAC,CAAA;QACF,OAAO,GAAG,CAAC,EAAE,CAAC,WAAW,CAAC,UAAU,CAAC,SAAS,EAAE,UAAU,EAAE,KAAK,UAAU,EAAE,CAAC,CAAC,QAAQ,EAAE,CAAA;IAC3F,CAAC;IAEO,4BAA4B,CAAC,WAAqB,EAAE,SAAmB;QAC7E,MAAM,MAAM,GAAa,EAAE,CAAA;QAC3B,KAAK,MAAM,UAAU,IAAI,WAAW,EAAE,CAAC;YACrC,MAAM,oBAAoB,GAAG,CAAC,GAAG,CAAC,KAAK,CAAC,YAAY,CAAC,UAAU,CAAC,CAAA;YAChE,MAAM,mBAAmB,GAAG,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC,QAAQ,EAAE,EAAE,CAAC,GAAG,CAAC,KAAK,CAAC,YAAY,CAAC,QAAQ,CAAC,CAAC,CAAA;YAC3F,IAAI,oBAAoB,IAAI,mBAAmB,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC,QAAQ,EAAE,EAAE,CAAC,UAAU,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC,EAAE,CAAC;gBAChH,MAAM,CAAC,IAAI,CAAC,UAAU,UAAU,iDAAiD,CAAC,CAAA;YACpF,CAAC;QACH,CAAC;QACD,OAAO,MAAM,CAAA;IACf,CAAC;;AApNH,0DAqNC","sourcesContent":["import * as cdk from 'aws-cdk-lib'\nimport * as certificatemanager from 'aws-cdk-lib/aws-certificatemanager'\nimport * as cloudwatch from 'aws-cdk-lib/aws-cloudwatch'\nimport * as iam from 'aws-cdk-lib/aws-iam'\nimport * as lambda from 'aws-cdk-lib/aws-lambda'\nimport * as route53 from 'aws-cdk-lib/aws-route53'\nimport * as custom_resources from 'aws-cdk-lib/custom-resources'\nimport { Construct } from 'constructs'\nimport { CertificateRequestorFunction } from './certificate-requestor-function'\nimport { Properties, ValidationHostedZoneProperties } from './certificate-requestor.lambda'\nimport { booleanToString, cleanDomainName, cleanHostedZoneId, matchNamesToZones } from './utils'\n\nexport interface ValidationHostedZone {\n  /**\n   * Hosted zone to use for DNS validation. The zone name is matched to domain name to use the right\n   * hosted zone for validation.\n   *\n   * If the hosted zone is not managed by the CDK application, it needs to be provided via\n   * ``HostedZone.fromHostedZoneAttributes()``.\n   */\n  readonly hostedZone: route53.IHostedZone\n\n  /**\n   * The role that is assumed for DNS record changes for certificate validation.\n   *\n   * This role should exist in the same account as the hosted zone and include permissions to change the DNS records\n   * for the given ``hostedZone``. The ``customResourceRole`` or the default execution role is given permission to\n   * assume this role.\n   *\n   * @default - No separate role for DNS record changes. The given customResourceRole or the default role is used\n   * for DNS record changes.\n   */\n  readonly validationRole?: iam.IRole\n\n  /**\n   * External id for ``validationRole`` role assume verification.\n   *\n   * This should be used only when ``validationRole`` is given and the role expects an external id provided on assume.\n   *\n   * @default - No external id provided during assume.\n   */\n  readonly validationExternalId?: string\n}\n\nexport interface DnsValidatedCertificateProps {\n  /**\n   * Fully-qualified domain name to request a certificate for.\n   *\n   * May contain wildcards, such as ``*.domain.com``.\n   */\n  readonly domainName: string\n\n  /**\n   * Fully-qualified alternative domain names to request a certificate for.\n   *\n   * May contain wildcards, such as ``*.otherdomain.com``.\n   */\n  readonly alternativeDomainNames?: string[]\n\n  /**\n   * List of hosted zones to use for validation. Hosted zones are mapped to domain names by the zone name.\n   */\n  readonly validationHostedZones: ValidationHostedZone[]\n\n  /**\n   * AWS region where the certificate is deployed.\n   *\n   * You should use the default ``Certificate`` construct instead if the region is same as the stack's and the hosted\n   * zone is in the same account.\n   *\n   * @default - Same region as the stack.\n   */\n  readonly certificateRegion?: string\n\n  /**\n   * The role that is used for the custom resource Lambda execution.\n   *\n   * The role is given permissions to request certificates from ACM. If there are any ``validationRole``s provided,\n   * this role is also given permission to assume the ``validationRole``. Otherwise it is assumed that the hosted zone\n   * is in same account and the execution role is given permissions to change DNS records for the given ``domainName``.\n   *\n   * @default - Lambda creates a default execution role.\n   */\n  readonly customResourceRole?: iam.IRole\n\n  /**\n   * Enable or disable cleaning of validation DNS records from the hosted zone.\n   *\n   * If there's multiple certificates created for same domain, it is possible to encouter a race condition where some\n   * certificate is removed and another certificate would need the same validation record. Prefer single certificate\n   * for a domain or set this to false and cleanup records manually when not needed anymore. If you change this\n   * property after creation, a new certificate will be requested.\n   *\n   * @default true\n   */\n  readonly cleanupValidationRecords?: boolean\n\n  /**\n   * Enable or disable transparency logging for this certificate.\n   *\n   * Once a certificate has been logged, it cannot be removed from the log. Opting out at that point will have no\n   * effect. If you change this property after creation, a new certificate will be requested.\n   *\n   * @see https://docs.aws.amazon.com/acm/latest/userguide/acm-bestpractices.html#best-practices-transparency\n   *\n   * @default true\n   */\n  readonly transparencyLoggingEnabled?: boolean\n\n  /**\n   * Apply the given removal policy to this resource.\n   *\n   * The removal policy controls what happens to this resource when it stops being managed by CloudFormation, either\n   * because you've removed it from the CDK application or because you've made a change that requires the resource to\n   * be replaced. The resource can be deleted (``RemovalPolicy.DESTROY``), or left in your AWS account for data\n   * recovery and cleanup later (``RemovalPolicy.RETAIN``). If you change this property after creation, a new\n   * certificate will be requested.\n   *\n   * @default RemovalPolicy.DESTROY\n   */\n  readonly removalPolicy?: cdk.RemovalPolicy\n}\n\nconst DNS_VALIDATED_CERTIFICATE_TYPE = 'Custom::DnsValidatedCertificate'\nconst CERTTIFICATE_RESOURCE_TYPE = 'AWS::CertificateManager::Certificate'\n\n/**\n * A certificate managed by AWS Certificate Manager. Will be automatically validated using DNS validation against the\n * specified Route 53 hosted zone. This construct should be used only for cross-region or cross-account certificate\n * validations. The default ``Certificate`` construct is better in cases where everything is managed by the CDK\n * application.\n *\n * Please note that this construct does not support alternative names yet as it would require domain to role mapping.\n *\n * @example\n * // ### Cross-region certificate validation\n * // hosted zone managed by the CDK application\n * const hostedZone: route53.IHostedZone = ...\n * // no separate validation role is needed\n * const certificate = new DnsValidatedCertificate(this, 'CrossRegionCertificate', {\n *   domainName: 'example.com',     // must be compatible with the hosted zone\n *   validationHostedZones: [{      // hosted zone used with the execution role's permissions\n *     hostedZone: hostedZone\n *   }],\n *   certificateRegion: 'us-east-1' // used by for example CloudFront\n * })\n * // ### Cross-account certificate validation\n * // external hosted zone\n * const hostedZone: route53.IHostedZone =\n *   route53.HostedZone.fromHostedZoneAttributes(this, 'HostedZone', {\n *     hostedZoneId: 'Z532DGDEDFS123456789',\n *     zoneName: 'example.com'\n *   })\n * // validation role in the same account as the hosted zone\n * const roleArn = 'arn:aws:iam::123456789:role/ChangeDnsRecordsRole'\n * const externalId = 'domain-assume'\n * const validationRole: iam.IRole =\n *   iam.Role.fromRoleArn(this, 'ValidationRole', roleArn)\n * const certificate = new DnsValidatedCertificate(this, 'CrossAccountCertificate', {\n *   domainName: 'example.com',\n *   validationHostedZones: [{\n *     hostedZone: hostedZone,\n *     validationRole: validationRole,\n *     validationExternalId: externalId\n *   }]\n * })\n * // ### Cross-account alternative name validation\n * // example.com is validated on same account against managed hosted zone\n * // and secondary.com is validated against external hosted zone on other account\n * const hostedZoneForMain: route53.IHostedZone = ...\n * const hostedZoneForAlternative: route53.IHostedZone =\n *   route53.HostedZone.fromHostedZoneAttributes(this, 'SecondaryHostedZone', {\n *     hostedZoneId: 'Z532DGDEDFS123456789',\n *     zoneName: 'secondary.com'\n *   })\n * const certificate = new DnsValidatedCertificate(this, 'CrossAccountCertificate', {\n *   domainName: 'example.com',\n *   alternativeDomainNames: ['secondary.com'],\n *   validationHostedZones: [{\n *     hostedZone: hostedZoneForMain\n *   },{\n *     hostedZone: hostedZoneForAlternative,\n *     validationRole: iam.Role.fromRoleArn(\n *       this, 'SecondaryValidationRole', 'arn:aws:iam::123456789:role/ChangeDnsRecordsRole'\n *     ),\n *     validationExternalId: 'domain-assume'\n *   }]\n * })\n *\n * @resource Custom::DnsValidatedCertificate\n * @resource AWS::CertificateManager::Certificate\n */\nexport class DnsValidatedCertificate extends cdk.Resource implements certificatemanager.ICertificate, cdk.ITaggable {\n  /** The certificate's ARN */\n  public readonly certificateArn: string\n\n  /** The region where the certificate is deployed to */\n  public readonly certificateRegion: string\n\n  /** The tag manager to set, remove and format tags for the certificate  */\n  public readonly tags: cdk.TagManager\n\n  /** The removal policy for the certificate */\n  private removalPolicy: cdk.RemovalPolicy\n\n  /**\n   * Creates an instance of DnsValidatedCertificate construct.\n   *\n   * @param scope construct hosting this construct\n   * @param id construct's identifier\n   * @param props properties for the construct\n   */\n  constructor(scope: Construct, id: string, props: DnsValidatedCertificateProps) {\n    super(scope, id)\n\n    const domainName = this.normalizeDomainName(props.domainName)\n    const alternativeDomainNames = props.alternativeDomainNames?.map((alternativeDomainName) =>\n      this.normalizeDomainName(alternativeDomainName)\n    )\n    const allDomains = [domainName, ...(alternativeDomainNames ?? [])]\n\n    this.certificateRegion = props.certificateRegion ?? this.stack.region\n    this.tags = new cdk.TagManager(cdk.TagType.MAP, CERTTIFICATE_RESOURCE_TYPE)\n    this.removalPolicy = props.removalPolicy ?? cdk.RemovalPolicy.DESTROY\n\n    const requestorFunction = new CertificateRequestorFunction(this, 'RequestorFunction', {\n      architecture: lambda.Architecture.ARM_64,\n      timeout: cdk.Duration.minutes(14),\n      role: props.customResourceRole,\n    })\n\n    requestorFunction.addToRolePolicy(\n      new iam.PolicyStatement({\n        effect: iam.Effect.ALLOW,\n        actions: [\n          'acm:RequestCertificate',\n          'acm:DescribeCertificate',\n          'acm:DeleteCertificate',\n          'acm:AddTagsToCertificate',\n        ],\n        resources: ['*'],\n      })\n    )\n\n    const domainsToZones = matchNamesToZones(\n      props.validationHostedZones.map((zone) => zone.hostedZone.zoneName),\n      allDomains,\n      (domain) => domain\n    )\n    const hostedZonesWithRole = props.validationHostedZones.filter((zone) => zone.validationRole !== undefined)\n    const hostedZonesWithoutRole = props.validationHostedZones.filter((zone) => zone.validationRole === undefined)\n\n    hostedZonesWithRole.forEach((zone) => {\n      requestorFunction.addToRolePolicy(\n        new iam.PolicyStatement({\n          effect: iam.Effect.ALLOW,\n          actions: ['sts:AssumeRole'],\n          resources: [zone.validationRole!.roleArn],\n        })\n      )\n    })\n\n    hostedZonesWithoutRole.forEach((zone) => {\n      requestorFunction.addToRolePolicy(\n        new iam.PolicyStatement({\n          actions: ['route53:GetChange'],\n          resources: ['*'],\n        })\n      )\n      const domainNames = domainsToZones[zone.hostedZone.zoneName]\n      if (domainNames && domainNames.length > 0) {\n        requestorFunction.addToRolePolicy(\n          new iam.PolicyStatement({\n            actions: ['route53:ChangeResourceRecordSets'],\n            resources: [`arn:aws:route53:::hostedzone/${this.normalizeHostedZoneId(zone.hostedZone.hostedZoneId)}`],\n            conditions: {\n              'ForAllValues:StringEquals': {\n                'route53:ChangeResourceRecordSetsRecordTypes': ['CNAME'],\n                'route53:ChangeResourceRecordSetsActions': ['UPSERT', 'DELETE'],\n              },\n              'ForAllValues:StringLike': {\n                'route53:ChangeResourceRecordSetsNormalizedRecordNames': domainNames.map((name, index) => {\n                  return this.wildcardDomainName(`DomainWildcard${zone.hostedZone.node.id}${index}`, name)\n                }),\n              },\n            },\n          })\n        )\n      }\n    })\n\n    const requestorProvider = new custom_resources.Provider(this, 'RequestorProvider', {\n      onEventHandler: requestorFunction,\n    })\n\n    const validationHostedZones = props.validationHostedZones.map<[string, ValidationHostedZoneProperties]>((zone) => {\n      const properties: ValidationHostedZoneProperties = {\n        DomainName: this.normalizeDomainName(zone.hostedZone.zoneName),\n        HostedZoneId: this.normalizeHostedZoneId(zone.hostedZone.hostedZoneId),\n        ValidationRoleArn: zone.validationRole?.roleArn,\n        ValidationExternalId: zone.validationExternalId,\n      }\n      return [properties.DomainName, properties]\n    })\n\n    const properties: Properties = {\n      DomainName: domainName,\n      AlternativeDomainNames: alternativeDomainNames,\n      ValidationHostedZones: Object.fromEntries(validationHostedZones),\n      CertificateRegion: this.certificateRegion,\n      CleanupValidationRecords: booleanToString(props.cleanupValidationRecords ?? true),\n      TransparencyLoggingEnabled: booleanToString(props.transparencyLoggingEnabled ?? true),\n      Tags: cdk.Lazy.any({ produce: () => this.tags.renderTags() }) as unknown as Record<string, string>,\n      RemovalPolicy: cdk.Lazy.string({ produce: () => this.removalPolicy }),\n    }\n\n    const certificate = new cdk.CustomResource(this, 'RequestorResource', {\n      serviceToken: requestorProvider.serviceToken,\n      resourceType: DNS_VALIDATED_CERTIFICATE_TYPE,\n      properties,\n    })\n\n    // Ensure CloudFormation deletes the custom resource before the Lambda\n    // function and its IAM policies. CloudFormation may delete them in\n    // parallel during stack deletion, causing the DELETE handler to fail\n    // because the Lambda's ACM permissions have already been removed.\n    certificate.node.addDependency(requestorFunction)\n    if (requestorFunction.role !== undefined) {\n      certificate.node.addDependency(requestorFunction.role)\n      const policy = requestorFunction.role.node.tryFindChild('DefaultPolicy')\n      if (policy !== undefined) {\n        certificate.node.addDependency(policy)\n      }\n    }\n\n    this.certificateArn = certificate.getAttString('Arn')\n\n    this.node.addValidation({\n      validate: () =>\n        this.validateDomainsToHostedZones(\n          allDomains,\n          validationHostedZones.map(([zoneName, _]) => zoneName)\n        ),\n    })\n  }\n\n  metricDaysToExpiry(props?: cdk.aws_cloudwatch.MetricOptions | undefined): cdk.aws_cloudwatch.Metric {\n    return new cloudwatch.Metric({\n      period: cdk.Duration.days(1),\n      ...props,\n      dimensionsMap: { CertificateArn: this.certificateArn },\n      metricName: 'DaysToExpiry',\n      namespace: 'AWS/CertificateManager',\n      region: this.certificateRegion,\n      statistic: cloudwatch.Stats.MINIMUM,\n    })\n  }\n\n  applyRemovalPolicy(policy: cdk.RemovalPolicy): void {\n    this.removalPolicy = policy\n  }\n\n  // certificateRef is a required property of type certificatemanager.ICertificateRef on certificatemanager.ICertificate since aws-cdk-lib 2.35.0\n  // We use type any here to keep compatability with older CDK versions\n  /** A reference to a Certificate resource. */\n  public get certificateRef(): any {\n    return {\n      certificateId: this.certificateArn,\n    }\n  }\n\n  private normalizeDomainName(domainName: string): string {\n    if (cdk.Token.isUnresolved(domainName)) {\n      return domainName\n    }\n    return cleanDomainName(domainName)\n  }\n\n  private normalizeHostedZoneId(hostedZoneId: string): string {\n    if (cdk.Token.isUnresolved(hostedZoneId)) {\n      return hostedZoneId\n    }\n    return cleanHostedZoneId(hostedZoneId)\n  }\n\n  private wildcardDomainName(id: string, domainName: string): string {\n    const parts = cdk.Fn.split('.', domainName)\n    const first = cdk.Fn.select(0, parts)\n    const isWildcard = new cdk.CfnCondition(this, `Is${id}`, {\n      expression: cdk.Fn.conditionEquals(first, '*'),\n    })\n    return cdk.Fn.conditionIf(isWildcard.logicalId, domainName, `*.${domainName}`).toString()\n  }\n\n  private validateDomainsToHostedZones(domainNames: string[], zoneNames: string[]): string[] {\n    const errors: string[] = []\n    for (const domainName of domainNames) {\n      const resolvableDomainName = !cdk.Token.isUnresolved(domainName)\n      const resolvableZoneNames = !zoneNames.some((zoneName) => cdk.Token.isUnresolved(zoneName))\n      if (resolvableDomainName && resolvableZoneNames && !zoneNames.some((zoneName) => domainName.endsWith(zoneName))) {\n        errors.push(`Domain ${domainName} is not provided with authoritative hosted zone`)\n      }\n    }\n    return errors\n  }\n}\n"]}
package/package.json CHANGED
@@ -59,11 +59,11 @@
59
59
  "eslint-plugin-prettier": "^4.2.5",
60
60
  "jest": "^29.7.0",
61
61
  "jest-junit": "^16",
62
- "jsii": "~5.8.0",
62
+ "jsii": "~5.9.0",
63
63
  "jsii-diff": "^1.126.0",
64
64
  "jsii-docgen": "^10.5.0",
65
65
  "jsii-pacmak": "^1.126.0",
66
- "jsii-rosetta": "~5.8.0",
66
+ "jsii-rosetta": "~5.9.0",
67
67
  "prettier": "^2.8.8",
68
68
  "projen": "^0.99.16",
69
69
  "ts-jest": "^29.4.6",
@@ -87,7 +87,7 @@
87
87
  "publishConfig": {
88
88
  "access": "public"
89
89
  },
90
- "version": "0.1.39",
90
+ "version": "0.1.41",
91
91
  "jest": {
92
92
  "coverageProvider": "v8",
93
93
  "testMatch": [