@trautonen/cdk-dns-validated-certificate 0.1.39 → 0.1.41
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +4 -4
- package/README.md +288 -47
- package/lib/dns-validated-certificate.js +1 -1
- package/package.json +3 -3
package/.jsii
CHANGED
|
@@ -3465,7 +3465,7 @@
|
|
|
3465
3465
|
"stability": "stable"
|
|
3466
3466
|
},
|
|
3467
3467
|
"homepage": "https://github.com/trautonen/cdk-dns-validated-certificate.git",
|
|
3468
|
-
"jsiiVersion": "5.
|
|
3468
|
+
"jsiiVersion": "5.9.32 (build ac92fbd)",
|
|
3469
3469
|
"keywords": [
|
|
3470
3470
|
"aws",
|
|
3471
3471
|
"cdk",
|
|
@@ -3485,7 +3485,7 @@
|
|
|
3485
3485
|
},
|
|
3486
3486
|
"name": "@trautonen/cdk-dns-validated-certificate",
|
|
3487
3487
|
"readme": {
|
|
3488
|
-
"markdown": "# AWS CDK DNS Validated Certificate\n\nCDK does not have a built in construct to manage cross-region or cross-account DNS validated certificates. There's an\nattempt to work around the issue with a cross region references option for stacks, but it has a lot of issues and still\ndoes not solve the cross-account use case.\n\nThis construct solves these problems by managing the certificate as a custom resource and with direct API calls to ACM\nand Route53. In the future it will be possible to support not only Route53, but other DNS services too.\n\n## Usage for cross-region validation\n\n```typescript\n// hosted zone managed by the CDK application\nconst hostedZone: route53.IHostedZone = ...\n// no separate validation role is needed\nconst certificate = new DnsValidatedCertificate(this, 'CrossRegionCertificate', {\n hostedZone: hostedZone,\n domainName: 'example.com', // must be compatible with the hosted zone\n certificateRegion: 'us-east-1' // used by for example CloudFront\n})\n```\n\n## Usage for cross-account validation\n\n```typescript\n// external hosted zone\nconst hostedZone: route53.IHostedZone = route53.HostedZone.fromHostedZoneAttributes(this, 'HostedZone', {\n hostedZoneId: 'Z532DGDEDFS123456789',\n zoneName: 'example.com',\n})\n// validation role on the same account as the hosted zone\nconst roleArn = 'arn:aws:iam::123456789:role/ChangeDnsRecordsRole'\nconst externalId = 'domain-assume'\nconst validationRole: iam.IRole = iam.Role.fromRoleArn(this, 'ValidationRole', roleArn)\nconst certificate = new DnsValidatedCertificate(this, 'CrossAccountCertificate', {\n hostedZone: hostedZone,\n domainName: 'example.com',\n validationRole: validationRole,\n validationExternalId: externalId,\n})\n```\n\n## Usage for cross-account alternative names validation\n\n```typescript\n// example.com is validated on same account against managed hosted zone\n// and secondary.com is validated against external hosted zone on other account\nconst hostedZoneForMain: route53.IHostedZone = ...\nconst hostedZoneForAlternative: route53.IHostedZone =\n route53.HostedZone.fromHostedZoneAttributes(this, 'SecondaryHostedZone', {\n hostedZoneId: 'Z532DGDEDFS123456789',\n zoneName: 'secondary.com'\n})\nconst certificate = new DnsValidatedCertificate(this, 'CrossAccountCertificate', {\n domainName: 'example.com',\n alternativeDomainNames: ['secondary.com'],\n validationHostedZones: [{\n hostedZone: hostedZoneForMain\n },{\n hostedZone: hostedZoneForAlternative,\n validationRole: iam.Role.fromRoleArn(\n this, 'SecondaryValidationRole', 'arn:aws:iam::123456789:role/ChangeDnsRecordsRole'\n ),\n validationExternalId: 'domain-assume'\n }]\n})\n```\n"
|
|
3488
|
+
"markdown": "# @trautonen/cdk-dns-validated-certificate\n\n[](https://www.npmjs.com/package/@trautonen/cdk-dns-validated-certificate)\n[](https://www.npmjs.com/package/@trautonen/cdk-dns-validated-certificate)\n[](https://github.com/trautonen/cdk-dns-validated-certificate/blob/main/LICENSE)\n[](https://github.com/trautonen/cdk-dns-validated-certificate/actions/workflows/release.yml)\n\nAn AWS CDK construct for creating DNS-validated ACM certificates with **cross-region** and **cross-account** support.\n\nThe built-in CDK `Certificate` construct does not support cross-region or cross-account DNS validation. The cross-region references workaround has known issues and still does not cover cross-account use cases. This construct solves both problems by managing the full certificate lifecycle — request, DNS validation, and cleanup — through a Lambda-backed custom resource with direct API calls to ACM and Route 53.\n\n## Features\n\n- **Cross-region certificates** — provision a certificate in `us-east-1` for CloudFront while your stack is in any other region\n- **Cross-account validation** — validate against a Route 53 hosted zone in a different AWS account using IAM role assumption\n- **Multiple hosted zones** — validate a primary domain and alternative names against different hosted zones, each with its own credentials\n- **Automatic DNS record management** — creates and cleans up CNAME validation records automatically\n- **Certificate Transparency logging** — configurable CT logging\n- **Tagging support** — tag your certificates via CDK's standard tagging mechanism\n- **Configurable removal policy** — retain certificates on stack deletion if needed\n\n## Installation\n\n```bash\n# npm\nnpm install @trautonen/cdk-dns-validated-certificate\n\n# yarn\nyarn add @trautonen/cdk-dns-validated-certificate\n\n# pnpm\npnpm add @trautonen/cdk-dns-validated-certificate\n\n# bun\nbun add @trautonen/cdk-dns-validated-certificate\n```\n\n### Peer Dependencies\n\nThis construct requires the following peer dependencies:\n\n| Package | Version |\n|---|---|\n| `aws-cdk-lib` | `>= 2.83.1` |\n| `constructs` | `>= 10.5.1` |\n\n## Quick Start\n\n```typescript\nimport { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';\nimport * as route53 from 'aws-cdk-lib/aws-route53';\n\nconst hostedZone = route53.HostedZone.fromLookup(this, 'HostedZone', {\n domainName: 'example.com',\n});\n\nconst certificate = new DnsValidatedCertificate(this, 'Certificate', {\n domainName: 'example.com',\n validationHostedZones: [{\n hostedZone,\n }],\n});\n```\n\n## Usage\n\n### Cross-Region Certificate\n\nA common scenario is provisioning a certificate in `us-east-1` for CloudFront while the CDK stack deploys to another region. Use the `certificateRegion` property to specify where the certificate should be created.\n\n```typescript\nimport { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';\nimport * as route53 from 'aws-cdk-lib/aws-route53';\nimport * as cloudfront from 'aws-cdk-lib/aws-cloudfront';\nimport * as origins from 'aws-cdk-lib/aws-cloudfront-origins';\nimport * as s3 from 'aws-cdk-lib/aws-s3';\n\nconst myBucket = new s3.Bucket(this, 'WebsiteBucket');\n\nconst hostedZone = route53.HostedZone.fromLookup(this, 'HostedZone', {\n domainName: 'example.com',\n});\n\n// Create the certificate in us-east-1 regardless of the stack's region\nconst certificate = new DnsValidatedCertificate(this, 'Certificate', {\n domainName: 'example.com',\n certificateRegion: 'us-east-1',\n validationHostedZones: [{\n hostedZone,\n }],\n});\n\n// Use with a CloudFront distribution\nconst distribution = new cloudfront.Distribution(this, 'Distribution', {\n domainNames: ['example.com'],\n certificate,\n defaultBehavior: {\n origin: new origins.S3Origin(myBucket),\n },\n});\n```\n\n### Cross-Account Validation\n\nWhen the Route 53 hosted zone is in a different AWS account, provide an IAM role that the construct can assume to create DNS validation records in the target account. Optionally, use an external ID for additional security.\n\n```typescript\nimport { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';\nimport * as route53 from 'aws-cdk-lib/aws-route53';\nimport * as iam from 'aws-cdk-lib/aws-iam';\n\n// Reference the hosted zone in the other account\nconst hostedZone = route53.HostedZone.fromHostedZoneAttributes(this, 'HostedZone', {\n hostedZoneId: 'Z0123456789ABCDEFGHIJ',\n zoneName: 'example.com',\n});\n\n// IAM role in the DNS account that permits Route 53 changes\nconst validationRole = iam.Role.fromRoleArn(\n this, 'ValidationRole',\n 'arn:aws:iam::111111111111:role/DnsValidationRole',\n);\n\nconst certificate = new DnsValidatedCertificate(this, 'Certificate', {\n domainName: 'example.com',\n validationHostedZones: [{\n hostedZone,\n validationRole,\n validationExternalId: 'my-external-id', // optional\n }],\n});\n```\n\n> **Note:** The role in the DNS account must trust the account running the CDK stack and have permissions to call `route53:ChangeResourceRecordSets` and `route53:GetChange`.\n\n### Multiple Hosted Zones with Alternative Names\n\nValidate a primary domain and subject alternative names (SANs) against different hosted zones, each with independent credentials. This is useful when your primary domain and alternative domains are managed in separate AWS accounts.\n\n```typescript\nimport { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';\nimport * as route53 from 'aws-cdk-lib/aws-route53';\nimport * as iam from 'aws-cdk-lib/aws-iam';\n\n// Primary domain — hosted zone in the current account\nconst primaryZone = route53.HostedZone.fromLookup(this, 'PrimaryZone', {\n domainName: 'example.com',\n});\n\n// Alternative domain — hosted zone in a different account\nconst secondaryZone = route53.HostedZone.fromHostedZoneAttributes(this, 'SecondaryZone', {\n hostedZoneId: 'Z0123456789ABCDEFGHIJ',\n zoneName: 'example.org',\n});\n\nconst certificate = new DnsValidatedCertificate(this, 'Certificate', {\n domainName: 'example.com',\n alternativeDomainNames: ['example.org'],\n certificateRegion: 'us-east-1',\n validationHostedZones: [{\n hostedZone: primaryZone,\n // No role needed — same account\n }, {\n hostedZone: secondaryZone,\n validationRole: iam.Role.fromRoleArn(\n this, 'SecondaryValidationRole',\n 'arn:aws:iam::222222222222:role/DnsValidationRole',\n ),\n validationExternalId: 'secondary-external-id',\n }],\n});\n```\n\n### Wildcard Certificate\n\nRequest a wildcard certificate that covers both the apex and all subdomains.\n\n```typescript\nimport { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';\nimport * as route53 from 'aws-cdk-lib/aws-route53';\n\nconst hostedZone = route53.HostedZone.fromLookup(this, 'HostedZone', {\n domainName: 'example.com',\n});\n\nconst certificate = new DnsValidatedCertificate(this, 'WildcardCertificate', {\n domainName: 'example.com',\n alternativeDomainNames: ['*.example.com'],\n validationHostedZones: [{\n hostedZone,\n }],\n});\n```\n\n### Configuring Removal Policy\n\nBy default, certificates are destroyed when the stack is deleted. Set a removal policy to retain the certificate instead.\n\n```typescript\nimport { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';\nimport * as cdk from 'aws-cdk-lib';\nimport * as route53 from 'aws-cdk-lib/aws-route53';\n\nconst hostedZone = route53.HostedZone.fromLookup(this, 'HostedZone', {\n domainName: 'example.com',\n});\n\nconst certificate = new DnsValidatedCertificate(this, 'Certificate', {\n domainName: 'example.com',\n validationHostedZones: [{ hostedZone }],\n removalPolicy: cdk.RemovalPolicy.RETAIN,\n});\n```\n\n### Disabling DNS Record Cleanup\n\nBy default, validation CNAME records are removed when the certificate is deleted. To keep them in DNS (useful for faster re-provisioning), set `cleanupValidationRecords` to `false`.\n\n```typescript\nimport { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';\nimport * as route53 from 'aws-cdk-lib/aws-route53';\n\nconst hostedZone = route53.HostedZone.fromLookup(this, 'HostedZone', {\n domainName: 'example.com',\n});\n\nconst certificate = new DnsValidatedCertificate(this, 'Certificate', {\n domainName: 'example.com',\n validationHostedZones: [{ hostedZone }],\n cleanupValidationRecords: false,\n});\n```\n\n### Using a Custom Lambda Execution Role\n\nProvide your own IAM role for the Lambda function that manages the certificate lifecycle. This is useful when you need fine-grained control over permissions or want to use a shared role.\n\n```typescript\nimport { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';\nimport * as iam from 'aws-cdk-lib/aws-iam';\nimport * as route53 from 'aws-cdk-lib/aws-route53';\n\nconst hostedZone = route53.HostedZone.fromLookup(this, 'HostedZone', {\n domainName: 'example.com',\n});\n\nconst lambdaRole = new iam.Role(this, 'CertificateLambdaRole', {\n assumedBy: new iam.ServicePrincipal('lambda.amazonaws.com'),\n managedPolicies: [\n iam.ManagedPolicy.fromAwsManagedPolicyName('service-role/AWSLambdaBasicExecutionRole'),\n ],\n});\n\nconst certificate = new DnsValidatedCertificate(this, 'Certificate', {\n domainName: 'example.com',\n validationHostedZones: [{ hostedZone }],\n customResourceRole: lambdaRole,\n});\n```\n\n## API Reference\n\n### `DnsValidatedCertificate`\n\n| Property | Type | Description |\n|---|---|---|\n| `certificateArn` | `string` | The ARN of the certificate |\n| `certificateRegion` | `string` | The region the certificate is deployed to |\n| `tags` | `TagManager` | Tag manager for the certificate |\n\n### `DnsValidatedCertificateProps`\n\n| Property | Type | Required | Default | Description |\n|---|---|---|---|---|\n| `domainName` | `string` | Yes | — | Fully qualified domain name. May contain a wildcard (`*.example.com`). |\n| `validationHostedZones` | `ValidationHostedZone[]` | Yes | — | Route 53 hosted zones to use for DNS validation. |\n| `alternativeDomainNames` | `string[]` | No | — | Subject Alternative Names (SANs) for the certificate. |\n| `certificateRegion` | `string` | No | Stack region | Region for the certificate (e.g. `us-east-1` for CloudFront). |\n| `customResourceRole` | `IRole` | No | Auto-created | IAM role for the Lambda custom resource. |\n| `cleanupValidationRecords` | `boolean` | No | `true` | Remove DNS validation records on certificate deletion. |\n| `transparencyLoggingEnabled` | `boolean` | No | `true` | Enable Certificate Transparency logging. |\n| `removalPolicy` | `RemovalPolicy` | No | `DESTROY` | What to do with the certificate when the stack is deleted. |\n\n### `ValidationHostedZone`\n\n| Property | Type | Required | Default | Description |\n|---|---|---|---|---|\n| `hostedZone` | `IHostedZone` | Yes | — | The Route 53 hosted zone for DNS validation. |\n| `validationRole` | `IRole` | No | — | IAM role to assume for cross-account DNS changes. |\n| `validationExternalId` | `string` | No | — | External ID for the role assumption. |\n\nFor the full API reference, see [API.md](API.md).\n\n## How It Works\n\nThe construct deploys a Lambda function (Node.js 22.x, ARM64) as a CloudFormation custom resource that:\n\n1. **Requests** a DNS-validated certificate from ACM\n2. **Creates** CNAME validation records in the specified Route 53 hosted zones (assuming cross-account roles when needed)\n3. **Waits** for ACM to validate the certificate\n4. **Applies** tags to the certificate\n5. **Cleans up** validation records and deletes the certificate on stack removal\n\nThe Lambda function handles the full lifecycle including updates (detecting when a new certificate is needed vs. a tag-only update) and graceful deletion (waiting for the certificate to stop being in-use before deleting).\n\n## License\n\n[Apache-2.0](LICENSE)\n"
|
|
3489
3489
|
},
|
|
3490
3490
|
"repository": {
|
|
3491
3491
|
"type": "git",
|
|
@@ -3921,6 +3921,6 @@
|
|
|
3921
3921
|
"symbolId": "src/dns-validated-certificate:ValidationHostedZone"
|
|
3922
3922
|
}
|
|
3923
3923
|
},
|
|
3924
|
-
"version": "0.1.
|
|
3925
|
-
"fingerprint": "
|
|
3924
|
+
"version": "0.1.41",
|
|
3925
|
+
"fingerprint": "8UKvOSI61xK0XIkClXpyOghMN/QKKHrwwCNIKmQAtRk="
|
|
3926
3926
|
}
|
package/README.md
CHANGED
|
@@ -1,67 +1,308 @@
|
|
|
1
|
-
#
|
|
1
|
+
# @trautonen/cdk-dns-validated-certificate
|
|
2
2
|
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
3
|
+
[](https://www.npmjs.com/package/@trautonen/cdk-dns-validated-certificate)
|
|
4
|
+
[](https://www.npmjs.com/package/@trautonen/cdk-dns-validated-certificate)
|
|
5
|
+
[](https://github.com/trautonen/cdk-dns-validated-certificate/blob/main/LICENSE)
|
|
6
|
+
[](https://github.com/trautonen/cdk-dns-validated-certificate/actions/workflows/release.yml)
|
|
6
7
|
|
|
7
|
-
|
|
8
|
-
and Route53. In the future it will be possible to support not only Route53, but other DNS services too.
|
|
8
|
+
An AWS CDK construct for creating DNS-validated ACM certificates with **cross-region** and **cross-account** support.
|
|
9
9
|
|
|
10
|
-
|
|
10
|
+
The built-in CDK `Certificate` construct does not support cross-region or cross-account DNS validation. The cross-region references workaround has known issues and still does not cover cross-account use cases. This construct solves both problems by managing the full certificate lifecycle — request, DNS validation, and cleanup — through a Lambda-backed custom resource with direct API calls to ACM and Route 53.
|
|
11
|
+
|
|
12
|
+
## Features
|
|
13
|
+
|
|
14
|
+
- **Cross-region certificates** — provision a certificate in `us-east-1` for CloudFront while your stack is in any other region
|
|
15
|
+
- **Cross-account validation** — validate against a Route 53 hosted zone in a different AWS account using IAM role assumption
|
|
16
|
+
- **Multiple hosted zones** — validate a primary domain and alternative names against different hosted zones, each with its own credentials
|
|
17
|
+
- **Automatic DNS record management** — creates and cleans up CNAME validation records automatically
|
|
18
|
+
- **Certificate Transparency logging** — configurable CT logging
|
|
19
|
+
- **Tagging support** — tag your certificates via CDK's standard tagging mechanism
|
|
20
|
+
- **Configurable removal policy** — retain certificates on stack deletion if needed
|
|
21
|
+
|
|
22
|
+
## Installation
|
|
23
|
+
|
|
24
|
+
```bash
|
|
25
|
+
# npm
|
|
26
|
+
npm install @trautonen/cdk-dns-validated-certificate
|
|
27
|
+
|
|
28
|
+
# yarn
|
|
29
|
+
yarn add @trautonen/cdk-dns-validated-certificate
|
|
30
|
+
|
|
31
|
+
# pnpm
|
|
32
|
+
pnpm add @trautonen/cdk-dns-validated-certificate
|
|
33
|
+
|
|
34
|
+
# bun
|
|
35
|
+
bun add @trautonen/cdk-dns-validated-certificate
|
|
36
|
+
```
|
|
37
|
+
|
|
38
|
+
### Peer Dependencies
|
|
39
|
+
|
|
40
|
+
This construct requires the following peer dependencies:
|
|
41
|
+
|
|
42
|
+
| Package | Version |
|
|
43
|
+
|---|---|
|
|
44
|
+
| `aws-cdk-lib` | `>= 2.83.1` |
|
|
45
|
+
| `constructs` | `>= 10.5.1` |
|
|
46
|
+
|
|
47
|
+
## Quick Start
|
|
11
48
|
|
|
12
49
|
```typescript
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
const
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
50
|
+
import { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';
|
|
51
|
+
import * as route53 from 'aws-cdk-lib/aws-route53';
|
|
52
|
+
|
|
53
|
+
const hostedZone = route53.HostedZone.fromLookup(this, 'HostedZone', {
|
|
54
|
+
domainName: 'example.com',
|
|
55
|
+
});
|
|
56
|
+
|
|
57
|
+
const certificate = new DnsValidatedCertificate(this, 'Certificate', {
|
|
58
|
+
domainName: 'example.com',
|
|
59
|
+
validationHostedZones: [{
|
|
60
|
+
hostedZone,
|
|
61
|
+
}],
|
|
62
|
+
});
|
|
21
63
|
```
|
|
22
64
|
|
|
23
|
-
## Usage
|
|
65
|
+
## Usage
|
|
66
|
+
|
|
67
|
+
### Cross-Region Certificate
|
|
68
|
+
|
|
69
|
+
A common scenario is provisioning a certificate in `us-east-1` for CloudFront while the CDK stack deploys to another region. Use the `certificateRegion` property to specify where the certificate should be created.
|
|
24
70
|
|
|
25
71
|
```typescript
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
72
|
+
import { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';
|
|
73
|
+
import * as route53 from 'aws-cdk-lib/aws-route53';
|
|
74
|
+
import * as cloudfront from 'aws-cdk-lib/aws-cloudfront';
|
|
75
|
+
import * as origins from 'aws-cdk-lib/aws-cloudfront-origins';
|
|
76
|
+
import * as s3 from 'aws-cdk-lib/aws-s3';
|
|
77
|
+
|
|
78
|
+
const myBucket = new s3.Bucket(this, 'WebsiteBucket');
|
|
79
|
+
|
|
80
|
+
const hostedZone = route53.HostedZone.fromLookup(this, 'HostedZone', {
|
|
81
|
+
domainName: 'example.com',
|
|
82
|
+
});
|
|
83
|
+
|
|
84
|
+
// Create the certificate in us-east-1 regardless of the stack's region
|
|
85
|
+
const certificate = new DnsValidatedCertificate(this, 'Certificate', {
|
|
86
|
+
domainName: 'example.com',
|
|
87
|
+
certificateRegion: 'us-east-1',
|
|
88
|
+
validationHostedZones: [{
|
|
89
|
+
hostedZone,
|
|
90
|
+
}],
|
|
91
|
+
});
|
|
92
|
+
|
|
93
|
+
// Use with a CloudFront distribution
|
|
94
|
+
const distribution = new cloudfront.Distribution(this, 'Distribution', {
|
|
95
|
+
domainNames: ['example.com'],
|
|
96
|
+
certificate,
|
|
97
|
+
defaultBehavior: {
|
|
98
|
+
origin: new origins.S3Origin(myBucket),
|
|
99
|
+
},
|
|
100
|
+
});
|
|
101
|
+
```
|
|
102
|
+
|
|
103
|
+
### Cross-Account Validation
|
|
104
|
+
|
|
105
|
+
When the Route 53 hosted zone is in a different AWS account, provide an IAM role that the construct can assume to create DNS validation records in the target account. Optionally, use an external ID for additional security.
|
|
106
|
+
|
|
107
|
+
```typescript
|
|
108
|
+
import { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';
|
|
109
|
+
import * as route53 from 'aws-cdk-lib/aws-route53';
|
|
110
|
+
import * as iam from 'aws-cdk-lib/aws-iam';
|
|
111
|
+
|
|
112
|
+
// Reference the hosted zone in the other account
|
|
113
|
+
const hostedZone = route53.HostedZone.fromHostedZoneAttributes(this, 'HostedZone', {
|
|
114
|
+
hostedZoneId: 'Z0123456789ABCDEFGHIJ',
|
|
29
115
|
zoneName: 'example.com',
|
|
30
|
-
})
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
const
|
|
34
|
-
|
|
35
|
-
|
|
36
|
-
|
|
116
|
+
});
|
|
117
|
+
|
|
118
|
+
// IAM role in the DNS account that permits Route 53 changes
|
|
119
|
+
const validationRole = iam.Role.fromRoleArn(
|
|
120
|
+
this, 'ValidationRole',
|
|
121
|
+
'arn:aws:iam::111111111111:role/DnsValidationRole',
|
|
122
|
+
);
|
|
123
|
+
|
|
124
|
+
const certificate = new DnsValidatedCertificate(this, 'Certificate', {
|
|
37
125
|
domainName: 'example.com',
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
126
|
+
validationHostedZones: [{
|
|
127
|
+
hostedZone,
|
|
128
|
+
validationRole,
|
|
129
|
+
validationExternalId: 'my-external-id', // optional
|
|
130
|
+
}],
|
|
131
|
+
});
|
|
41
132
|
```
|
|
42
133
|
|
|
43
|
-
|
|
134
|
+
> **Note:** The role in the DNS account must trust the account running the CDK stack and have permissions to call `route53:ChangeResourceRecordSets` and `route53:GetChange`.
|
|
135
|
+
|
|
136
|
+
### Multiple Hosted Zones with Alternative Names
|
|
137
|
+
|
|
138
|
+
Validate a primary domain and subject alternative names (SANs) against different hosted zones, each with independent credentials. This is useful when your primary domain and alternative domains are managed in separate AWS accounts.
|
|
44
139
|
|
|
45
140
|
```typescript
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
50
|
-
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
})
|
|
54
|
-
|
|
141
|
+
import { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';
|
|
142
|
+
import * as route53 from 'aws-cdk-lib/aws-route53';
|
|
143
|
+
import * as iam from 'aws-cdk-lib/aws-iam';
|
|
144
|
+
|
|
145
|
+
// Primary domain — hosted zone in the current account
|
|
146
|
+
const primaryZone = route53.HostedZone.fromLookup(this, 'PrimaryZone', {
|
|
147
|
+
domainName: 'example.com',
|
|
148
|
+
});
|
|
149
|
+
|
|
150
|
+
// Alternative domain — hosted zone in a different account
|
|
151
|
+
const secondaryZone = route53.HostedZone.fromHostedZoneAttributes(this, 'SecondaryZone', {
|
|
152
|
+
hostedZoneId: 'Z0123456789ABCDEFGHIJ',
|
|
153
|
+
zoneName: 'example.org',
|
|
154
|
+
});
|
|
155
|
+
|
|
156
|
+
const certificate = new DnsValidatedCertificate(this, 'Certificate', {
|
|
55
157
|
domainName: 'example.com',
|
|
56
|
-
alternativeDomainNames: ['
|
|
158
|
+
alternativeDomainNames: ['example.org'],
|
|
159
|
+
certificateRegion: 'us-east-1',
|
|
57
160
|
validationHostedZones: [{
|
|
58
|
-
hostedZone:
|
|
59
|
-
|
|
60
|
-
|
|
161
|
+
hostedZone: primaryZone,
|
|
162
|
+
// No role needed — same account
|
|
163
|
+
}, {
|
|
164
|
+
hostedZone: secondaryZone,
|
|
61
165
|
validationRole: iam.Role.fromRoleArn(
|
|
62
|
-
this, 'SecondaryValidationRole',
|
|
166
|
+
this, 'SecondaryValidationRole',
|
|
167
|
+
'arn:aws:iam::222222222222:role/DnsValidationRole',
|
|
63
168
|
),
|
|
64
|
-
validationExternalId: '
|
|
65
|
-
}]
|
|
66
|
-
})
|
|
169
|
+
validationExternalId: 'secondary-external-id',
|
|
170
|
+
}],
|
|
171
|
+
});
|
|
67
172
|
```
|
|
173
|
+
|
|
174
|
+
### Wildcard Certificate
|
|
175
|
+
|
|
176
|
+
Request a wildcard certificate that covers both the apex and all subdomains.
|
|
177
|
+
|
|
178
|
+
```typescript
|
|
179
|
+
import { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';
|
|
180
|
+
import * as route53 from 'aws-cdk-lib/aws-route53';
|
|
181
|
+
|
|
182
|
+
const hostedZone = route53.HostedZone.fromLookup(this, 'HostedZone', {
|
|
183
|
+
domainName: 'example.com',
|
|
184
|
+
});
|
|
185
|
+
|
|
186
|
+
const certificate = new DnsValidatedCertificate(this, 'WildcardCertificate', {
|
|
187
|
+
domainName: 'example.com',
|
|
188
|
+
alternativeDomainNames: ['*.example.com'],
|
|
189
|
+
validationHostedZones: [{
|
|
190
|
+
hostedZone,
|
|
191
|
+
}],
|
|
192
|
+
});
|
|
193
|
+
```
|
|
194
|
+
|
|
195
|
+
### Configuring Removal Policy
|
|
196
|
+
|
|
197
|
+
By default, certificates are destroyed when the stack is deleted. Set a removal policy to retain the certificate instead.
|
|
198
|
+
|
|
199
|
+
```typescript
|
|
200
|
+
import { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';
|
|
201
|
+
import * as cdk from 'aws-cdk-lib';
|
|
202
|
+
import * as route53 from 'aws-cdk-lib/aws-route53';
|
|
203
|
+
|
|
204
|
+
const hostedZone = route53.HostedZone.fromLookup(this, 'HostedZone', {
|
|
205
|
+
domainName: 'example.com',
|
|
206
|
+
});
|
|
207
|
+
|
|
208
|
+
const certificate = new DnsValidatedCertificate(this, 'Certificate', {
|
|
209
|
+
domainName: 'example.com',
|
|
210
|
+
validationHostedZones: [{ hostedZone }],
|
|
211
|
+
removalPolicy: cdk.RemovalPolicy.RETAIN,
|
|
212
|
+
});
|
|
213
|
+
```
|
|
214
|
+
|
|
215
|
+
### Disabling DNS Record Cleanup
|
|
216
|
+
|
|
217
|
+
By default, validation CNAME records are removed when the certificate is deleted. To keep them in DNS (useful for faster re-provisioning), set `cleanupValidationRecords` to `false`.
|
|
218
|
+
|
|
219
|
+
```typescript
|
|
220
|
+
import { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';
|
|
221
|
+
import * as route53 from 'aws-cdk-lib/aws-route53';
|
|
222
|
+
|
|
223
|
+
const hostedZone = route53.HostedZone.fromLookup(this, 'HostedZone', {
|
|
224
|
+
domainName: 'example.com',
|
|
225
|
+
});
|
|
226
|
+
|
|
227
|
+
const certificate = new DnsValidatedCertificate(this, 'Certificate', {
|
|
228
|
+
domainName: 'example.com',
|
|
229
|
+
validationHostedZones: [{ hostedZone }],
|
|
230
|
+
cleanupValidationRecords: false,
|
|
231
|
+
});
|
|
232
|
+
```
|
|
233
|
+
|
|
234
|
+
### Using a Custom Lambda Execution Role
|
|
235
|
+
|
|
236
|
+
Provide your own IAM role for the Lambda function that manages the certificate lifecycle. This is useful when you need fine-grained control over permissions or want to use a shared role.
|
|
237
|
+
|
|
238
|
+
```typescript
|
|
239
|
+
import { DnsValidatedCertificate } from '@trautonen/cdk-dns-validated-certificate';
|
|
240
|
+
import * as iam from 'aws-cdk-lib/aws-iam';
|
|
241
|
+
import * as route53 from 'aws-cdk-lib/aws-route53';
|
|
242
|
+
|
|
243
|
+
const hostedZone = route53.HostedZone.fromLookup(this, 'HostedZone', {
|
|
244
|
+
domainName: 'example.com',
|
|
245
|
+
});
|
|
246
|
+
|
|
247
|
+
const lambdaRole = new iam.Role(this, 'CertificateLambdaRole', {
|
|
248
|
+
assumedBy: new iam.ServicePrincipal('lambda.amazonaws.com'),
|
|
249
|
+
managedPolicies: [
|
|
250
|
+
iam.ManagedPolicy.fromAwsManagedPolicyName('service-role/AWSLambdaBasicExecutionRole'),
|
|
251
|
+
],
|
|
252
|
+
});
|
|
253
|
+
|
|
254
|
+
const certificate = new DnsValidatedCertificate(this, 'Certificate', {
|
|
255
|
+
domainName: 'example.com',
|
|
256
|
+
validationHostedZones: [{ hostedZone }],
|
|
257
|
+
customResourceRole: lambdaRole,
|
|
258
|
+
});
|
|
259
|
+
```
|
|
260
|
+
|
|
261
|
+
## API Reference
|
|
262
|
+
|
|
263
|
+
### `DnsValidatedCertificate`
|
|
264
|
+
|
|
265
|
+
| Property | Type | Description |
|
|
266
|
+
|---|---|---|
|
|
267
|
+
| `certificateArn` | `string` | The ARN of the certificate |
|
|
268
|
+
| `certificateRegion` | `string` | The region the certificate is deployed to |
|
|
269
|
+
| `tags` | `TagManager` | Tag manager for the certificate |
|
|
270
|
+
|
|
271
|
+
### `DnsValidatedCertificateProps`
|
|
272
|
+
|
|
273
|
+
| Property | Type | Required | Default | Description |
|
|
274
|
+
|---|---|---|---|---|
|
|
275
|
+
| `domainName` | `string` | Yes | — | Fully qualified domain name. May contain a wildcard (`*.example.com`). |
|
|
276
|
+
| `validationHostedZones` | `ValidationHostedZone[]` | Yes | — | Route 53 hosted zones to use for DNS validation. |
|
|
277
|
+
| `alternativeDomainNames` | `string[]` | No | — | Subject Alternative Names (SANs) for the certificate. |
|
|
278
|
+
| `certificateRegion` | `string` | No | Stack region | Region for the certificate (e.g. `us-east-1` for CloudFront). |
|
|
279
|
+
| `customResourceRole` | `IRole` | No | Auto-created | IAM role for the Lambda custom resource. |
|
|
280
|
+
| `cleanupValidationRecords` | `boolean` | No | `true` | Remove DNS validation records on certificate deletion. |
|
|
281
|
+
| `transparencyLoggingEnabled` | `boolean` | No | `true` | Enable Certificate Transparency logging. |
|
|
282
|
+
| `removalPolicy` | `RemovalPolicy` | No | `DESTROY` | What to do with the certificate when the stack is deleted. |
|
|
283
|
+
|
|
284
|
+
### `ValidationHostedZone`
|
|
285
|
+
|
|
286
|
+
| Property | Type | Required | Default | Description |
|
|
287
|
+
|---|---|---|---|---|
|
|
288
|
+
| `hostedZone` | `IHostedZone` | Yes | — | The Route 53 hosted zone for DNS validation. |
|
|
289
|
+
| `validationRole` | `IRole` | No | — | IAM role to assume for cross-account DNS changes. |
|
|
290
|
+
| `validationExternalId` | `string` | No | — | External ID for the role assumption. |
|
|
291
|
+
|
|
292
|
+
For the full API reference, see [API.md](API.md).
|
|
293
|
+
|
|
294
|
+
## How It Works
|
|
295
|
+
|
|
296
|
+
The construct deploys a Lambda function (Node.js 22.x, ARM64) as a CloudFormation custom resource that:
|
|
297
|
+
|
|
298
|
+
1. **Requests** a DNS-validated certificate from ACM
|
|
299
|
+
2. **Creates** CNAME validation records in the specified Route 53 hosted zones (assuming cross-account roles when needed)
|
|
300
|
+
3. **Waits** for ACM to validate the certificate
|
|
301
|
+
4. **Applies** tags to the certificate
|
|
302
|
+
5. **Cleans up** validation records and deletes the certificate on stack removal
|
|
303
|
+
|
|
304
|
+
The Lambda function handles the full lifecycle including updates (detecting when a new certificate is needed vs. a tag-only update) and graceful deletion (waiting for the certificate to stop being in-use before deleting).
|
|
305
|
+
|
|
306
|
+
## License
|
|
307
|
+
|
|
308
|
+
[Apache-2.0](LICENSE)
|
|
@@ -243,5 +243,5 @@ class DnsValidatedCertificate extends cdk.Resource {
|
|
|
243
243
|
}
|
|
244
244
|
exports.DnsValidatedCertificate = DnsValidatedCertificate;
|
|
245
245
|
_a = JSII_RTTI_SYMBOL_1;
|
|
246
|
-
DnsValidatedCertificate[_a] = { fqn: "@trautonen/cdk-dns-validated-certificate.DnsValidatedCertificate", version: "0.1.
|
|
246
|
+
DnsValidatedCertificate[_a] = { fqn: "@trautonen/cdk-dns-validated-certificate.DnsValidatedCertificate", version: "0.1.41" };
|
|
247
247
|
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"dns-validated-certificate.js","sourceRoot":"","sources":["../src/dns-validated-certificate.ts"],"names":[],"mappings":";;;;;AAAA,mCAAkC;AAElC,yDAAwD;AACxD,2CAA0C;AAC1C,iDAAgD;AAEhD,iEAAgE;AAEhE,qFAA+E;AAE/E,mCAAgG;AAiHhG,MAAM,8BAA8B,GAAG,iCAAiC,CAAA;AACxE,MAAM,0BAA0B,GAAG,sCAAsC,CAAA;AAEzE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiEG;AACH,MAAa,uBAAwB,SAAQ,GAAG,CAAC,QAAQ;IAavD;;;;;;OAMG;IACH,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAmC;QAC3E,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAA;QAEhB,MAAM,UAAU,GAAG,IAAI,CAAC,mBAAmB,CAAC,KAAK,CAAC,UAAU,CAAC,CAAA;QAC7D,MAAM,sBAAsB,GAAG,KAAK,CAAC,sBAAsB,EAAE,GAAG,CAAC,CAAC,qBAAqB,EAAE,EAAE,CACzF,IAAI,CAAC,mBAAmB,CAAC,qBAAqB,CAAC,CAChD,CAAA;QACD,MAAM,UAAU,GAAG,CAAC,UAAU,EAAE,GAAG,CAAC,sBAAsB,IAAI,EAAE,CAAC,CAAC,CAAA;QAElE,IAAI,CAAC,iBAAiB,GAAG,KAAK,CAAC,iBAAiB,IAAI,IAAI,CAAC,KAAK,CAAC,MAAM,CAAA;QACrE,IAAI,CAAC,IAAI,GAAG,IAAI,GAAG,CAAC,UAAU,CAAC,GAAG,CAAC,OAAO,CAAC,GAAG,EAAE,0BAA0B,CAAC,CAAA;QAC3E,IAAI,CAAC,aAAa,GAAG,KAAK,CAAC,aAAa,IAAI,GAAG,CAAC,aAAa,CAAC,OAAO,CAAA;QAErE,MAAM,iBAAiB,GAAG,IAAI,6DAA4B,CAAC,IAAI,EAAE,mBAAmB,EAAE;YACpF,YAAY,EAAE,MAAM,CAAC,YAAY,CAAC,MAAM;YACxC,OAAO,EAAE,GAAG,CAAC,QAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YACjC,IAAI,EAAE,KAAK,CAAC,kBAAkB;SAC/B,CAAC,CAAA;QAEF,iBAAiB,CAAC,eAAe,CAC/B,IAAI,GAAG,CAAC,eAAe,CAAC;YACtB,MAAM,EAAE,GAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO,EAAE;gBACP,wBAAwB;gBACxB,yBAAyB;gBACzB,uBAAuB;gBACvB,0BAA0B;aAC3B;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CACH,CAAA;QAED,MAAM,cAAc,GAAG,IAAA,yBAAiB,EACtC,KAAK,CAAC,qBAAqB,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,EACnE,UAAU,EACV,CAAC,MAAM,EAAE,EAAE,CAAC,MAAM,CACnB,CAAA;QACD,MAAM,mBAAmB,GAAG,KAAK,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,cAAc,KAAK,SAAS,CAAC,CAAA;QAC3G,MAAM,sBAAsB,GAAG,KAAK,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,cAAc,KAAK,SAAS,CAAC,CAAA;QAE9G,mBAAmB,CAAC,OAAO,CAAC,CAAC,IAAI,EAAE,EAAE;YACnC,iBAAiB,CAAC,eAAe,CAC/B,IAAI,GAAG,CAAC,eAAe,CAAC;gBACtB,MAAM,EAAE,GAAG,CAAC,MAAM,CAAC,KAAK;gBACxB,OAAO,EAAE,CAAC,gBAAgB,CAAC;gBAC3B,SAAS,EAAE,CAAC,IAAI,CAAC,cAAe,CAAC,OAAO,CAAC;aAC1C,CAAC,CACH,CAAA;QACH,CAAC,CAAC,CAAA;QAEF,sBAAsB,CAAC,OAAO,CAAC,CAAC,IAAI,EAAE,EAAE;YACtC,iBAAiB,CAAC,eAAe,CAC/B,IAAI,GAAG,CAAC,eAAe,CAAC;gBACtB,OAAO,EAAE,CAAC,mBAAmB,CAAC;gBAC9B,SAAS,EAAE,CAAC,GAAG,CAAC;aACjB,CAAC,CACH,CAAA;YACD,MAAM,WAAW,GAAG,cAAc,CAAC,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAA;YAC5D,IAAI,WAAW,IAAI,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAC1C,iBAAiB,CAAC,eAAe,CAC/B,IAAI,GAAG,CAAC,eAAe,CAAC;oBACtB,OAAO,EAAE,CAAC,kCAAkC,CAAC;oBAC7C,SAAS,EAAE,CAAC,gCAAgC,IAAI,CAAC,qBAAqB,CAAC,IAAI,CAAC,UAAU,CAAC,YAAY,CAAC,EAAE,CAAC;oBACvG,UAAU,EAAE;wBACV,2BAA2B,EAAE;4BAC3B,6CAA6C,EAAE,CAAC,OAAO,CAAC;4BACxD,yCAAyC,EAAE,CAAC,QAAQ,EAAE,QAAQ,CAAC;yBAChE;wBACD,yBAAyB,EAAE;4BACzB,uDAAuD,EAAE,WAAW,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,KAAK,EAAE,EAAE;gCACvF,OAAO,IAAI,CAAC,kBAAkB,CAAC,iBAAiB,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,GAAG,KAAK,EAAE,EAAE,IAAI,CAAC,CAAA;4BAC1F,CAAC,CAAC;yBACH;qBACF;iBACF,CAAC,CACH,CAAA;YACH,CAAC;QACH,CAAC,CAAC,CAAA;QAEF,MAAM,iBAAiB,GAAG,IAAI,gBAAgB,CAAC,QAAQ,CAAC,IAAI,EAAE,mBAAmB,EAAE;YACjF,cAAc,EAAE,iBAAiB;SAClC,CAAC,CAAA;QAEF,MAAM,qBAAqB,GAAG,KAAK,CAAC,qBAAqB,CAAC,GAAG,CAA2C,CAAC,IAAI,EAAE,EAAE;YAC/G,MAAM,UAAU,GAAmC;gBACjD,UAAU,EAAE,IAAI,CAAC,mBAAmB,CAAC,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC;gBAC9D,YAAY,EAAE,IAAI,CAAC,qBAAqB,CAAC,IAAI,CAAC,UAAU,CAAC,YAAY,CAAC;gBACtE,iBAAiB,EAAE,IAAI,CAAC,cAAc,EAAE,OAAO;gBAC/C,oBAAoB,EAAE,IAAI,CAAC,oBAAoB;aAChD,CAAA;YACD,OAAO,CAAC,UAAU,CAAC,UAAU,EAAE,UAAU,CAAC,CAAA;QAC5C,CAAC,CAAC,CAAA;QAEF,MAAM,UAAU,GAAe;YAC7B,UAAU,EAAE,UAAU;YACtB,sBAAsB,EAAE,sBAAsB;YAC9C,qBAAqB,EAAE,MAAM,CAAC,WAAW,CAAC,qBAAqB,CAAC;YAChE,iBAAiB,EAAE,IAAI,CAAC,iBAAiB;YACzC,wBAAwB,EAAE,IAAA,uBAAe,EAAC,KAAK,CAAC,wBAAwB,IAAI,IAAI,CAAC;YACjF,0BAA0B,EAAE,IAAA,uBAAe,EAAC,KAAK,CAAC,0BAA0B,IAAI,IAAI,CAAC;YACrF,IAAI,EAAE,GAAG,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,OAAO,EAAE,GAAG,EAAE,CAAC,IAAI,CAAC,IAAI,CAAC,UAAU,EAAE,EAAE,CAAsC;YAClG,aAAa,EAAE,GAAG,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,OAAO,EAAE,GAAG,EAAE,CAAC,IAAI,CAAC,aAAa,EAAE,CAAC;SACtE,CAAA;QAED,MAAM,WAAW,GAAG,IAAI,GAAG,CAAC,cAAc,CAAC,IAAI,EAAE,mBAAmB,EAAE;YACpE,YAAY,EAAE,iBAAiB,CAAC,YAAY;YAC5C,YAAY,EAAE,8BAA8B;YAC5C,UAAU;SACX,CAAC,CAAA;QAEF,sEAAsE;QACtE,mEAAmE;QACnE,qEAAqE;QACrE,kEAAkE;QAClE,WAAW,CAAC,IAAI,CAAC,aAAa,CAAC,iBAAiB,CAAC,CAAA;QACjD,IAAI,iBAAiB,CAAC,IAAI,KAAK,SAAS,EAAE,CAAC;YACzC,WAAW,CAAC,IAAI,CAAC,aAAa,CAAC,iBAAiB,CAAC,IAAI,CAAC,CAAA;YACtD,MAAM,MAAM,GAAG,iBAAiB,CAAC,IAAI,CAAC,IAAI,CAAC,YAAY,CAAC,eAAe,CAAC,CAAA;YACxE,IAAI,MAAM,KAAK,SAAS,EAAE,CAAC;gBACzB,WAAW,CAAC,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,CAAA;YACxC,CAAC;QACH,CAAC;QAED,IAAI,CAAC,cAAc,GAAG,WAAW,CAAC,YAAY,CAAC,KAAK,CAAC,CAAA;QAErD,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC;YACtB,QAAQ,EAAE,GAAG,EAAE,CACb,IAAI,CAAC,4BAA4B,CAC/B,UAAU,EACV,qBAAqB,CAAC,GAAG,CAAC,CAAC,CAAC,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,CACvD;SACJ,CAAC,CAAA;IACJ,CAAC;IAED,kBAAkB,CAAC,KAAoD;QACrE,OAAO,IAAI,UAAU,CAAC,MAAM,CAAC;YAC3B,MAAM,EAAE,GAAG,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC,CAAC;YAC5B,GAAG,KAAK;YACR,aAAa,EAAE,EAAE,cAAc,EAAE,IAAI,CAAC,cAAc,EAAE;YACtD,UAAU,EAAE,cAAc;YAC1B,SAAS,EAAE,wBAAwB;YACnC,MAAM,EAAE,IAAI,CAAC,iBAAiB;YAC9B,SAAS,EAAE,UAAU,CAAC,KAAK,CAAC,OAAO;SACpC,CAAC,CAAA;IACJ,CAAC;IAED,kBAAkB,CAAC,MAAyB;QAC1C,IAAI,CAAC,aAAa,GAAG,MAAM,CAAA;IAC7B,CAAC;IAED,+IAA+I;IAC/I,qEAAqE;IACrE,6CAA6C;IAC7C,IAAW,cAAc;QACvB,OAAO;YACL,aAAa,EAAE,IAAI,CAAC,cAAc;SACnC,CAAA;IACH,CAAC;IAEO,mBAAmB,CAAC,UAAkB;QAC5C,IAAI,GAAG,CAAC,KAAK,CAAC,YAAY,CAAC,UAAU,CAAC,EAAE,CAAC;YACvC,OAAO,UAAU,CAAA;QACnB,CAAC;QACD,OAAO,IAAA,uBAAe,EAAC,UAAU,CAAC,CAAA;IACpC,CAAC;IAEO,qBAAqB,CAAC,YAAoB;QAChD,IAAI,GAAG,CAAC,KAAK,CAAC,YAAY,CAAC,YAAY,CAAC,EAAE,CAAC;YACzC,OAAO,YAAY,CAAA;QACrB,CAAC;QACD,OAAO,IAAA,yBAAiB,EAAC,YAAY,CAAC,CAAA;IACxC,CAAC;IAEO,kBAAkB,CAAC,EAAU,EAAE,UAAkB;QACvD,MAAM,KAAK,GAAG,GAAG,CAAC,EAAE,CAAC,KAAK,CAAC,GAAG,EAAE,UAAU,CAAC,CAAA;QAC3C,MAAM,KAAK,GAAG,GAAG,CAAC,EAAE,CAAC,MAAM,CAAC,CAAC,EAAE,KAAK,CAAC,CAAA;QACrC,MAAM,UAAU,GAAG,IAAI,GAAG,CAAC,YAAY,CAAC,IAAI,EAAE,KAAK,EAAE,EAAE,EAAE;YACvD,UAAU,EAAE,GAAG,CAAC,EAAE,CAAC,eAAe,CAAC,KAAK,EAAE,GAAG,CAAC;SAC/C,CAAC,CAAA;QACF,OAAO,GAAG,CAAC,EAAE,CAAC,WAAW,CAAC,UAAU,CAAC,SAAS,EAAE,UAAU,EAAE,KAAK,UAAU,EAAE,CAAC,CAAC,QAAQ,EAAE,CAAA;IAC3F,CAAC;IAEO,4BAA4B,CAAC,WAAqB,EAAE,SAAmB;QAC7E,MAAM,MAAM,GAAa,EAAE,CAAA;QAC3B,KAAK,MAAM,UAAU,IAAI,WAAW,EAAE,CAAC;YACrC,MAAM,oBAAoB,GAAG,CAAC,GAAG,CAAC,KAAK,CAAC,YAAY,CAAC,UAAU,CAAC,CAAA;YAChE,MAAM,mBAAmB,GAAG,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC,QAAQ,EAAE,EAAE,CAAC,GAAG,CAAC,KAAK,CAAC,YAAY,CAAC,QAAQ,CAAC,CAAC,CAAA;YAC3F,IAAI,oBAAoB,IAAI,mBAAmB,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC,QAAQ,EAAE,EAAE,CAAC,UAAU,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC,EAAE,CAAC;gBAChH,MAAM,CAAC,IAAI,CAAC,UAAU,UAAU,iDAAiD,CAAC,CAAA;YACpF,CAAC;QACH,CAAC;QACD,OAAO,MAAM,CAAA;IACf,CAAC;;AApNH,0DAqNC","sourcesContent":["import * as cdk from 'aws-cdk-lib'\nimport * as certificatemanager from 'aws-cdk-lib/aws-certificatemanager'\nimport * as cloudwatch from 'aws-cdk-lib/aws-cloudwatch'\nimport * as iam from 'aws-cdk-lib/aws-iam'\nimport * as lambda from 'aws-cdk-lib/aws-lambda'\nimport * as route53 from 'aws-cdk-lib/aws-route53'\nimport * as custom_resources from 'aws-cdk-lib/custom-resources'\nimport { Construct } from 'constructs'\nimport { CertificateRequestorFunction } from './certificate-requestor-function'\nimport { Properties, ValidationHostedZoneProperties } from './certificate-requestor.lambda'\nimport { booleanToString, cleanDomainName, cleanHostedZoneId, matchNamesToZones } from './utils'\n\nexport interface ValidationHostedZone {\n  /**\n   * Hosted zone to use for DNS validation. The zone name is matched to domain name to use the right\n   * hosted zone for validation.\n   *\n   * If the hosted zone is not managed by the CDK application, it needs to be provided via\n   * ``HostedZone.fromHostedZoneAttributes()``.\n   */\n  readonly hostedZone: route53.IHostedZone\n\n  /**\n   * The role that is assumed for DNS record changes for certificate validation.\n   *\n   * This role should exist in the same account as the hosted zone and include permissions to change the DNS records\n   * for the given ``hostedZone``. The ``customResourceRole`` or the default execution role is given permission to\n   * assume this role.\n   *\n   * @default - No separate role for DNS record changes. The given customResourceRole or the default role is used\n   * for DNS record changes.\n   */\n  readonly validationRole?: iam.IRole\n\n  /**\n   * External id for ``validationRole`` role assume verification.\n   *\n   * This should be used only when ``validationRole`` is given and the role expects an external id provided on assume.\n   *\n   * @default - No external id provided during assume.\n   */\n  readonly validationExternalId?: string\n}\n\nexport interface DnsValidatedCertificateProps {\n  /**\n   * Fully-qualified domain name to request a certificate for.\n   *\n   * May contain wildcards, such as ``*.domain.com``.\n   */\n  readonly domainName: string\n\n  /**\n   * Fully-qualified alternative domain names to request a certificate for.\n   *\n   * May contain wildcards, such as ``*.otherdomain.com``.\n   */\n  readonly alternativeDomainNames?: string[]\n\n  /**\n   * List of hosted zones to use for validation. Hosted zones are mapped to domain names by the zone name.\n   */\n  readonly validationHostedZones: ValidationHostedZone[]\n\n  /**\n   * AWS region where the certificate is deployed.\n   *\n   * You should use the default ``Certificate`` construct instead if the region is same as the stack's and the hosted\n   * zone is in the same account.\n   *\n   * @default - Same region as the stack.\n   */\n  readonly certificateRegion?: string\n\n  /**\n   * The role that is used for the custom resource Lambda execution.\n   *\n   * The role is given permissions to request certificates from ACM. If there are any ``validationRole``s provided,\n   * this role is also given permission to assume the ``validationRole``. Otherwise it is assumed that the hosted zone\n   * is in same account and the execution role is given permissions to change DNS records for the given ``domainName``.\n   *\n   * @default - Lambda creates a default execution role.\n   */\n  readonly customResourceRole?: iam.IRole\n\n  /**\n   * Enable or disable cleaning of validation DNS records from the hosted zone.\n   *\n   * If there's multiple certificates created for same domain, it is possible to encouter a race condition where some\n   * certificate is removed and another certificate would need the same validation record. Prefer single certificate\n   * for a domain or set this to false and cleanup records manually when not needed anymore. If you change this\n   * property after creation, a new certificate will be requested.\n   *\n   * @default true\n   */\n  readonly cleanupValidationRecords?: boolean\n\n  /**\n   * Enable or disable transparency logging for this certificate.\n   *\n   * Once a certificate has been logged, it cannot be removed from the log. Opting out at that point will have no\n   * effect. If you change this property after creation, a new certificate will be requested.\n   *\n   * @see https://docs.aws.amazon.com/acm/latest/userguide/acm-bestpractices.html#best-practices-transparency\n   *\n   * @default true\n   */\n  readonly transparencyLoggingEnabled?: boolean\n\n  /**\n   * Apply the given removal policy to this resource.\n   *\n   * The removal policy controls what happens to this resource when it stops being managed by CloudFormation, either\n   * because you've removed it from the CDK application or because you've made a change that requires the resource to\n   * be replaced. The resource can be deleted (``RemovalPolicy.DESTROY``), or left in your AWS account for data\n   * recovery and cleanup later (``RemovalPolicy.RETAIN``). If you change this property after creation, a new\n   * certificate will be requested.\n   *\n   * @default RemovalPolicy.DESTROY\n   */\n  readonly removalPolicy?: cdk.RemovalPolicy\n}\n\nconst DNS_VALIDATED_CERTIFICATE_TYPE = 'Custom::DnsValidatedCertificate'\nconst CERTTIFICATE_RESOURCE_TYPE = 'AWS::CertificateManager::Certificate'\n\n/**\n * A certificate managed by AWS Certificate Manager. Will be automatically validated using DNS validation against the\n * specified Route 53 hosted zone. This construct should be used only for cross-region or cross-account certificate\n * validations. The default ``Certificate`` construct is better in cases where everything is managed by the CDK\n * application.\n *\n * Please note that this construct does not support alternative names yet as it would require domain to role mapping.\n *\n * @example\n * // ### Cross-region certificate validation\n * // hosted zone managed by the CDK application\n * const hostedZone: route53.IHostedZone = ...\n * // no separate validation role is needed\n * const certificate = new DnsValidatedCertificate(this, 'CrossRegionCertificate', {\n *   domainName: 'example.com',     // must be compatible with the hosted zone\n *   validationHostedZones: [{      // hosted zone used with the execution role's permissions\n *     hostedZone: hostedZone\n *   }],\n *   certificateRegion: 'us-east-1' // used by for example CloudFront\n * })\n * // ### Cross-account certificate validation\n * // external hosted zone\n * const hostedZone: route53.IHostedZone =\n *   route53.HostedZone.fromHostedZoneAttributes(this, 'HostedZone', {\n *     hostedZoneId: 'Z532DGDEDFS123456789',\n *     zoneName: 'example.com'\n *   })\n * // validation role in the same account as the hosted zone\n * const roleArn = 'arn:aws:iam::123456789:role/ChangeDnsRecordsRole'\n * const externalId = 'domain-assume'\n * const validationRole: iam.IRole =\n *   iam.Role.fromRoleArn(this, 'ValidationRole', roleArn)\n * const certificate = new DnsValidatedCertificate(this, 'CrossAccountCertificate', {\n *   domainName: 'example.com',\n *   validationHostedZones: [{\n *     hostedZone: hostedZone,\n *     validationRole: validationRole,\n *     validationExternalId: externalId\n *   }]\n * })\n * // ### Cross-account alternative name validation\n * // example.com is validated on same account against managed hosted zone\n * // and secondary.com is validated against external hosted zone on other account\n * const hostedZoneForMain: route53.IHostedZone = ...\n * const hostedZoneForAlternative: route53.IHostedZone =\n *   route53.HostedZone.fromHostedZoneAttributes(this, 'SecondaryHostedZone', {\n *     hostedZoneId: 'Z532DGDEDFS123456789',\n *     zoneName: 'secondary.com'\n *   })\n * const certificate = new DnsValidatedCertificate(this, 'CrossAccountCertificate', {\n *   domainName: 'example.com',\n *   alternativeDomainNames: ['secondary.com'],\n *   validationHostedZones: [{\n *     hostedZone: hostedZoneForMain\n *   },{\n *     hostedZone: hostedZoneForAlternative,\n *     validationRole: iam.Role.fromRoleArn(\n *       this, 'SecondaryValidationRole', 'arn:aws:iam::123456789:role/ChangeDnsRecordsRole'\n *     ),\n *     validationExternalId: 'domain-assume'\n *   }]\n * })\n *\n * @resource Custom::DnsValidatedCertificate\n * @resource AWS::CertificateManager::Certificate\n */\nexport class DnsValidatedCertificate extends cdk.Resource implements certificatemanager.ICertificate, cdk.ITaggable {\n  /** The certificate's ARN */\n  public readonly certificateArn: string\n\n  /** The region where the certificate is deployed to */\n  public readonly certificateRegion: string\n\n  /** The tag manager to set, remove and format tags for the certificate  */\n  public readonly tags: cdk.TagManager\n\n  /** The removal policy for the certificate */\n  private removalPolicy: cdk.RemovalPolicy\n\n  /**\n   * Creates an instance of DnsValidatedCertificate construct.\n   *\n   * @param scope construct hosting this construct\n   * @param id construct's identifier\n   * @param props properties for the construct\n   */\n  constructor(scope: Construct, id: string, props: DnsValidatedCertificateProps) {\n    super(scope, id)\n\n    const domainName = this.normalizeDomainName(props.domainName)\n    const alternativeDomainNames = props.alternativeDomainNames?.map((alternativeDomainName) =>\n      this.normalizeDomainName(alternativeDomainName)\n    )\n    const allDomains = [domainName, ...(alternativeDomainNames ?? [])]\n\n    this.certificateRegion = props.certificateRegion ?? this.stack.region\n    this.tags = new cdk.TagManager(cdk.TagType.MAP, CERTTIFICATE_RESOURCE_TYPE)\n    this.removalPolicy = props.removalPolicy ?? cdk.RemovalPolicy.DESTROY\n\n    const requestorFunction = new CertificateRequestorFunction(this, 'RequestorFunction', {\n      architecture: lambda.Architecture.ARM_64,\n      timeout: cdk.Duration.minutes(14),\n      role: props.customResourceRole,\n    })\n\n    requestorFunction.addToRolePolicy(\n      new iam.PolicyStatement({\n        effect: iam.Effect.ALLOW,\n        actions: [\n          'acm:RequestCertificate',\n          'acm:DescribeCertificate',\n          'acm:DeleteCertificate',\n          'acm:AddTagsToCertificate',\n        ],\n        resources: ['*'],\n      })\n    )\n\n    const domainsToZones = matchNamesToZones(\n      props.validationHostedZones.map((zone) => zone.hostedZone.zoneName),\n      allDomains,\n      (domain) => domain\n    )\n    const hostedZonesWithRole = props.validationHostedZones.filter((zone) => zone.validationRole !== undefined)\n    const hostedZonesWithoutRole = props.validationHostedZones.filter((zone) => zone.validationRole === undefined)\n\n    hostedZonesWithRole.forEach((zone) => {\n      requestorFunction.addToRolePolicy(\n        new iam.PolicyStatement({\n          effect: iam.Effect.ALLOW,\n          actions: ['sts:AssumeRole'],\n          resources: [zone.validationRole!.roleArn],\n        })\n      )\n    })\n\n    hostedZonesWithoutRole.forEach((zone) => {\n      requestorFunction.addToRolePolicy(\n        new iam.PolicyStatement({\n          actions: ['route53:GetChange'],\n          resources: ['*'],\n        })\n      )\n      const domainNames = domainsToZones[zone.hostedZone.zoneName]\n      if (domainNames && domainNames.length > 0) {\n        requestorFunction.addToRolePolicy(\n          new iam.PolicyStatement({\n            actions: ['route53:ChangeResourceRecordSets'],\n            resources: [`arn:aws:route53:::hostedzone/${this.normalizeHostedZoneId(zone.hostedZone.hostedZoneId)}`],\n            conditions: {\n              'ForAllValues:StringEquals': {\n                'route53:ChangeResourceRecordSetsRecordTypes': ['CNAME'],\n                'route53:ChangeResourceRecordSetsActions': ['UPSERT', 'DELETE'],\n              },\n              'ForAllValues:StringLike': {\n                'route53:ChangeResourceRecordSetsNormalizedRecordNames': domainNames.map((name, index) => {\n                  return this.wildcardDomainName(`DomainWildcard${zone.hostedZone.node.id}${index}`, name)\n                }),\n              },\n            },\n          })\n        )\n      }\n    })\n\n    const requestorProvider = new custom_resources.Provider(this, 'RequestorProvider', {\n      onEventHandler: requestorFunction,\n    })\n\n    const validationHostedZones = props.validationHostedZones.map<[string, ValidationHostedZoneProperties]>((zone) => {\n      const properties: ValidationHostedZoneProperties = {\n        DomainName: this.normalizeDomainName(zone.hostedZone.zoneName),\n        HostedZoneId: this.normalizeHostedZoneId(zone.hostedZone.hostedZoneId),\n        ValidationRoleArn: zone.validationRole?.roleArn,\n        ValidationExternalId: zone.validationExternalId,\n      }\n      return [properties.DomainName, properties]\n    })\n\n    const properties: Properties = {\n      DomainName: domainName,\n      AlternativeDomainNames: alternativeDomainNames,\n      ValidationHostedZones: Object.fromEntries(validationHostedZones),\n      CertificateRegion: this.certificateRegion,\n      CleanupValidationRecords: booleanToString(props.cleanupValidationRecords ?? true),\n      TransparencyLoggingEnabled: booleanToString(props.transparencyLoggingEnabled ?? true),\n      Tags: cdk.Lazy.any({ produce: () => this.tags.renderTags() }) as unknown as Record<string, string>,\n      RemovalPolicy: cdk.Lazy.string({ produce: () => this.removalPolicy }),\n    }\n\n    const certificate = new cdk.CustomResource(this, 'RequestorResource', {\n      serviceToken: requestorProvider.serviceToken,\n      resourceType: DNS_VALIDATED_CERTIFICATE_TYPE,\n      properties,\n    })\n\n    // Ensure CloudFormation deletes the custom resource before the Lambda\n    // function and its IAM policies. CloudFormation may delete them in\n    // parallel during stack deletion, causing the DELETE handler to fail\n    // because the Lambda's ACM permissions have already been removed.\n    certificate.node.addDependency(requestorFunction)\n    if (requestorFunction.role !== undefined) {\n      certificate.node.addDependency(requestorFunction.role)\n      const policy = requestorFunction.role.node.tryFindChild('DefaultPolicy')\n      if (policy !== undefined) {\n        certificate.node.addDependency(policy)\n      }\n    }\n\n    this.certificateArn = certificate.getAttString('Arn')\n\n    this.node.addValidation({\n      validate: () =>\n        this.validateDomainsToHostedZones(\n          allDomains,\n          validationHostedZones.map(([zoneName, _]) => zoneName)\n        ),\n    })\n  }\n\n  metricDaysToExpiry(props?: cdk.aws_cloudwatch.MetricOptions | undefined): cdk.aws_cloudwatch.Metric {\n    return new cloudwatch.Metric({\n      period: cdk.Duration.days(1),\n      ...props,\n      dimensionsMap: { CertificateArn: this.certificateArn },\n      metricName: 'DaysToExpiry',\n      namespace: 'AWS/CertificateManager',\n      region: this.certificateRegion,\n      statistic: cloudwatch.Stats.MINIMUM,\n    })\n  }\n\n  applyRemovalPolicy(policy: cdk.RemovalPolicy): void {\n    this.removalPolicy = policy\n  }\n\n  // certificateRef is a required property of type certificatemanager.ICertificateRef on certificatemanager.ICertificate since aws-cdk-lib 2.35.0\n  // We use type any here to keep compatability with older CDK versions\n  /** A reference to a Certificate resource. */\n  public get certificateRef(): any {\n    return {\n      certificateId: this.certificateArn,\n    }\n  }\n\n  private normalizeDomainName(domainName: string): string {\n    if (cdk.Token.isUnresolved(domainName)) {\n      return domainName\n    }\n    return cleanDomainName(domainName)\n  }\n\n  private normalizeHostedZoneId(hostedZoneId: string): string {\n    if (cdk.Token.isUnresolved(hostedZoneId)) {\n      return hostedZoneId\n    }\n    return cleanHostedZoneId(hostedZoneId)\n  }\n\n  private wildcardDomainName(id: string, domainName: string): string {\n    const parts = cdk.Fn.split('.', domainName)\n    const first = cdk.Fn.select(0, parts)\n    const isWildcard = new cdk.CfnCondition(this, `Is${id}`, {\n      expression: cdk.Fn.conditionEquals(first, '*'),\n    })\n    return cdk.Fn.conditionIf(isWildcard.logicalId, domainName, `*.${domainName}`).toString()\n  }\n\n  private validateDomainsToHostedZones(domainNames: string[], zoneNames: string[]): string[] {\n    const errors: string[] = []\n    for (const domainName of domainNames) {\n      const resolvableDomainName = !cdk.Token.isUnresolved(domainName)\n      const resolvableZoneNames = !zoneNames.some((zoneName) => cdk.Token.isUnresolved(zoneName))\n      if (resolvableDomainName && resolvableZoneNames && !zoneNames.some((zoneName) => domainName.endsWith(zoneName))) {\n        errors.push(`Domain ${domainName} is not provided with authoritative hosted zone`)\n      }\n    }\n    return errors\n  }\n}\n"]}
|
package/package.json
CHANGED
|
@@ -59,11 +59,11 @@
|
|
|
59
59
|
"eslint-plugin-prettier": "^4.2.5",
|
|
60
60
|
"jest": "^29.7.0",
|
|
61
61
|
"jest-junit": "^16",
|
|
62
|
-
"jsii": "~5.
|
|
62
|
+
"jsii": "~5.9.0",
|
|
63
63
|
"jsii-diff": "^1.126.0",
|
|
64
64
|
"jsii-docgen": "^10.5.0",
|
|
65
65
|
"jsii-pacmak": "^1.126.0",
|
|
66
|
-
"jsii-rosetta": "~5.
|
|
66
|
+
"jsii-rosetta": "~5.9.0",
|
|
67
67
|
"prettier": "^2.8.8",
|
|
68
68
|
"projen": "^0.99.16",
|
|
69
69
|
"ts-jest": "^29.4.6",
|
|
@@ -87,7 +87,7 @@
|
|
|
87
87
|
"publishConfig": {
|
|
88
88
|
"access": "public"
|
|
89
89
|
},
|
|
90
|
-
"version": "0.1.
|
|
90
|
+
"version": "0.1.41",
|
|
91
91
|
"jest": {
|
|
92
92
|
"coverageProvider": "v8",
|
|
93
93
|
"testMatch": [
|