-
Notifications
You must be signed in to change notification settings - Fork 3.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
(aws-cdk-lib/aws-certificatemanager): Support cross-account CertificateValidation #27152
Comments
Is a custom resource actually required to do this cross-region? Have you tried granting this cloudformation execution role access to deploy into other environments? |
The Cfn execution role currently has this policy {
"Version": "2012-10-17",
"Statement": [
{
"Action": "*",
"Resource": "*",
"Effect": "Allow"
}
]
} |
Yeah i see the blocker here. The request makes sense, thanks for the issue 🙂 |
me too have the same problem, error is very similar:
|
I also encountered this today. Target account has been bootstrapped with
Error:
This is a sIgnificant problem if it blocks all cross-account deployments that need to create ACM certs that rely on Route53 records to be created, which I expect is not an unusual thing to want to do... |
how did you guys bypassed it? |
I'm just doing manual/email verification, and not domain verification; not a solution at all really as this is very cumbersome, but for my use case its not terrible to wait for the verification emails when new certs are needed. |
I'm doing domain verification with a lambda custom resource using the secrets from the root account. it worked for what I needed, but I hated it. I wanted to assumeRole instead. |
Describe the feature
After CDK moved from the custom-lambda function to the R53 Cfn L1 constructs for RecordChangeSets, we've lost the ability to support cross-account Hosted Zones.
Ideally, I should be able to attach a policy to my HostedZone which grants permissions to the other account
Use Case
Example construct:
Error from Cloudformation:
Proposed Solution
in absence of the HostedZone resource policy, I propose we support an optional, custom IAM Role input on the
CertificateValidation.fromDNS*
methods. If provided, the construct would create aCustomResoruce
using that provided IAM Role.For my particular use case, this means the Custom Resource in account B would assume the Delegation Role I've created in Account A.
Other Information
No response
Acknowledgements
CDK version used
2.95.0
Environment details (OS name and version, etc.)
Amazon Linux release 2 (Karoo) / 5.4.254
The text was updated successfully, but these errors were encountered: