Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(certificatemanager): DNS validation for wildcard certificates #9291

Merged
merged 4 commits into from
Jul 30, 2020

Conversation

njlynch
Copy link
Contributor

@njlynch njlynch commented Jul 28, 2020

If a certificate with automatic (Route53) DNS validation contains both a base
domain name and the wildcard for that domain (e.g., example.com and
*.example.com), the corresponding DNS validation records are identical.
This seems to have caused problems for the automated CloudFormation DNS
validation.

Solving the problem by removing the redundant wildcard entries from the
DomainValidationOption.

fixes #9248


By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license

If a certificate with automatic (Route53) DNS validation contains both a base
domain name and the wildcard for that domain (e.g., `example.com` and
`*.example.com`), the corresponding DNS validation records are identical.
This seems to have caused problems for the automated CloudFormation DNS
validation.

Solving the problem by removing the redundant wildcard entries from the
DomainValidationOption.

fixes #9248
@njlynch njlynch requested a review from a team July 28, 2020 12:49
@njlynch njlynch changed the title fix(certificatemanager): Fix DNS validation for wildcard certificates fix(certificatemanager): DNS validation for wildcard certificates Jul 28, 2020
@mergify mergify bot added the contribution/core This is a PR that came from AWS. label Jul 28, 2020
@njlynch njlynch requested a review from eladb July 28, 2020 18:49
@mergify
Copy link
Contributor

mergify bot commented Jul 30, 2020

Thank you for contributing! Your pull request will be updated from master and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork).

@aws-cdk-automation
Copy link
Collaborator

AWS CodeBuild CI Report

  • CodeBuild project: AutoBuildProject6AEA49D1-qxepHUsryhcu
  • Commit ID: 2f9ec62
  • Result: SUCCEEDED
  • Build Logs (available for 30 days)

Powered by github-codebuild-logs, available on the AWS Serverless Application Repository

@mergify
Copy link
Contributor

mergify bot commented Jul 30, 2020

Thank you for contributing! Your pull request will be updated from master and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork).

@mergify mergify bot merged commit 419278b into master Jul 30, 2020
@mergify mergify bot deleted the njlynch/acm-wildcards branch July 30, 2020 13:04
curtiseppel pushed a commit to curtiseppel/aws-cdk that referenced this pull request Aug 11, 2020
…s#9291)

If a certificate with automatic (Route53) DNS validation contains both a base
domain name and the wildcard for that domain (e.g., `example.com` and
`*.example.com`), the corresponding DNS validation records are identical.
This seems to have caused problems for the automated CloudFormation DNS
validation.

Solving the problem by removing the redundant wildcard entries from the
DomainValidationOption.

fixes aws#9248


----

*By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
@singlewind
Copy link

Even this merged. However, there is another use case is if the base domain name is a token - an imported value. This patch doesn't work.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
contribution/core This is a PR that came from AWS.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[aws-certificatemanager] New DNS validation method not working due to route53 error
4 participants