Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

@aws-cdk/aws-certificatemanager

Package Overview
Dependencies
Maintainers
5
Versions
288
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@aws-cdk/aws-certificatemanager - npm Package Compare versions

Comparing version 1.137.0 to 1.138.0

12

.warnings.jsii.js

@@ -13,2 +13,4 @@ function _aws_cdk_aws_certificatemanager_ValidationMethod(p) {

}
function _aws_cdk_aws_certificatemanager_ICertificate(p) {
}
function _aws_cdk_aws_certificatemanager_DnsValidatedCertificateProps(p) {

@@ -28,4 +30,2 @@ if (p == null)

}
function _aws_cdk_aws_certificatemanager_ICertificate(p) {
}
function _aws_cdk_aws_certificatemanager_CertificateProps(p) {

@@ -65,4 +65,2 @@ if (p == null)

}
function _aws_cdk_aws_certificatemanager_CertificateValidation(p) {
}
function _aws_cdk_aws_certificatemanager_CfnAccount(p) {

@@ -72,6 +70,8 @@ }

}
function _aws_cdk_aws_certificatemanager_PrivateCertificate(p) {
function _aws_cdk_aws_certificatemanager_CertificateValidation(p) {
}
function _aws_cdk_aws_certificatemanager_Certificate(p) {
}
function _aws_cdk_aws_certificatemanager_PrivateCertificate(p) {
}
function _aws_cdk_aws_certificatemanager_CfnCertificate(p) {

@@ -96,3 +96,3 @@ }

}
module.exports = { print, _aws_cdk_aws_certificatemanager_ValidationMethod, _aws_cdk_aws_certificatemanager_PrivateCertificateProps, _aws_cdk_aws_certificatemanager_CfnAccountProps, _aws_cdk_aws_certificatemanager_DnsValidatedCertificateProps, _aws_cdk_aws_certificatemanager_ICertificate, _aws_cdk_aws_certificatemanager_CertificateProps, _aws_cdk_aws_certificatemanager_CertificationValidationProps, _aws_cdk_aws_certificatemanager_CfnCertificateProps, _aws_cdk_aws_certificatemanager_DnsValidatedCertificate, _aws_cdk_aws_certificatemanager_CertificateValidation, _aws_cdk_aws_certificatemanager_CfnAccount, _aws_cdk_aws_certificatemanager_CfnAccount_ExpiryEventsConfigurationProperty, _aws_cdk_aws_certificatemanager_PrivateCertificate, _aws_cdk_aws_certificatemanager_Certificate, _aws_cdk_aws_certificatemanager_CfnCertificate, _aws_cdk_aws_certificatemanager_CfnCertificate_DomainValidationOptionProperty };
module.exports = { print, _aws_cdk_aws_certificatemanager_ValidationMethod, _aws_cdk_aws_certificatemanager_PrivateCertificateProps, _aws_cdk_aws_certificatemanager_CfnAccountProps, _aws_cdk_aws_certificatemanager_ICertificate, _aws_cdk_aws_certificatemanager_DnsValidatedCertificateProps, _aws_cdk_aws_certificatemanager_CertificateProps, _aws_cdk_aws_certificatemanager_CertificationValidationProps, _aws_cdk_aws_certificatemanager_CfnCertificateProps, _aws_cdk_aws_certificatemanager_DnsValidatedCertificate, _aws_cdk_aws_certificatemanager_CfnAccount, _aws_cdk_aws_certificatemanager_CfnAccount_ExpiryEventsConfigurationProperty, _aws_cdk_aws_certificatemanager_CertificateValidation, _aws_cdk_aws_certificatemanager_Certificate, _aws_cdk_aws_certificatemanager_PrivateCertificate, _aws_cdk_aws_certificatemanager_CfnCertificate, _aws_cdk_aws_certificatemanager_CfnCertificate_DomainValidationOptionProperty };
module.exports.DeprecationError = DeprecationError;
{
"name": "@aws-cdk/dns_validated_certificate_handler",
"private": true,
"version": "1.137.0",
"version": "1.138.0",
"description": "This module is part of the [AWS Cloud Development Kit](https://github.com/aws/aws-cdk) project.",

@@ -32,5 +32,5 @@ "main": "lib/index.js",

"devDependencies": {
"@types/aws-lambda": "^8.10.86",
"@types/aws-lambda": "^8.10.89",
"@types/sinon": "^9.0.11",
"@aws-cdk/cdk-build-tools": "1.137.0",
"@aws-cdk/cdk-build-tools": "1.138.0",
"aws-sdk": "^2.596.0",

@@ -44,8 +44,8 @@ "aws-sdk-mock": "^5.5.0",

"eslint-plugin-standard": "^4.1.0",
"jest": "^27.4.3",
"jest": "^27.4.5",
"lambda-tester": "^3.6.0",
"sinon": "^9.2.4",
"nock": "^13.2.1",
"ts-jest": "^27.1.1"
"ts-jest": "^27.1.2"
}
}

@@ -80,3 +80,3 @@ "use strict";

_a = JSII_RTTI_SYMBOL_1;
CertificateValidation[_a] = { fqn: "@aws-cdk/aws-certificatemanager.CertificateValidation", version: "1.137.0" };
CertificateValidation[_a] = { fqn: "@aws-cdk/aws-certificatemanager.CertificateValidation", version: "1.138.0" };
/**

@@ -132,3 +132,3 @@ * A certificate managed by AWS Certificate Manager.

_b = JSII_RTTI_SYMBOL_1;
Certificate[_b] = { fqn: "@aws-cdk/aws-certificatemanager.Certificate", version: "1.137.0" };
Certificate[_b] = { fqn: "@aws-cdk/aws-certificatemanager.Certificate", version: "1.138.0" };
/**

@@ -135,0 +135,0 @@ * Method used to assert ownership of the domain.

import * as cdk from '@aws-cdk/core';
import * as cfn_parse from '@aws-cdk/core/lib/cfn-parse';
/**
* Properties for defining a `AWS::CertificateManager::Account`.
* Properties for defining a `CfnAccount`.
*

@@ -11,4 +11,6 @@ * @external

/**
* `AWS::CertificateManager::Account.ExpiryEventsConfiguration`.
* Object containing expiration events options associated with an AWS account .
*
* For more information, see [ExpiryEventsConfiguration](https://docs.aws.amazon.com/acm/latest/APIReference/API_ExpiryEventsConfiguration.html) in the API reference.
*
* @external

@@ -22,2 +24,4 @@ * @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-certificatemanager-account.html#cfn-certificatemanager-account-expiryeventsconfiguration

*
* The `AWS::CertificateManager::Account` resource defines the expiry event configuration that determines the number of days prior to expiry when ACM starts generating EventBridge events.
*
* @external

@@ -43,2 +47,4 @@ * @cloudformationResource AWS::CertificateManager::Account

/**
* ID of the AWS account that owns the certificate.
*
* @external

@@ -49,4 +55,6 @@ * @cloudformationAttribute AccountId

/**
* `AWS::CertificateManager::Account.ExpiryEventsConfiguration`.
* Object containing expiration events options associated with an AWS account .
*
* For more information, see [ExpiryEventsConfiguration](https://docs.aws.amazon.com/acm/latest/APIReference/API_ExpiryEventsConfiguration.html) in the API reference.
*
* @external

@@ -90,2 +98,4 @@ * @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-certificatemanager-account.html#cfn-certificatemanager-account-expiryeventsconfiguration

*
* The `AWS::CertificateManager::Account` resource defines the expiry event configuration that determines the number of days prior to expiry when ACM starts generating EventBridge events.
*
* @external

@@ -97,2 +107,6 @@ * @cloudformationResource AWS::CertificateManager::Account

/**
* Object containing expiration events options associated with an AWS account .
*
* For more information, see [ExpiryEventsConfiguration](https://docs.aws.amazon.com/acm/latest/APIReference/API_ExpiryEventsConfiguration.html) in the API reference.
*
* @external

@@ -103,4 +117,6 @@ * @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-certificatemanager-account-expiryeventsconfiguration.html

/**
* `CfnAccount.ExpiryEventsConfigurationProperty.DaysBeforeExpiry`.
* This option specifies the number of days prior to certificate expiration when ACM starts generating `EventBridge` events.
*
* ACM sends one event per day per certificate until the certificate expires. By default, accounts receive events starting 45 days before certificate expiration.
*
* @external

@@ -113,3 +129,3 @@ * @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-certificatemanager-account-expiryeventsconfiguration.html#cfn-certificatemanager-account-expiryeventsconfiguration-daysbeforeexpiry

/**
* Properties for defining a `AWS::CertificateManager::Certificate`.
* Properties for defining a `CfnCertificate`.
*

@@ -121,3 +137,3 @@ * @external

/**
* `AWS::CertificateManager::Certificate.DomainName`.
* The fully qualified domain name (FQDN), such as www.example.com, with which you want to secure an ACM certificate. Use an asterisk (*) to create a wildcard certificate that protects several sites in the same domain. For example, `*.example.com` protects `www.example.com` , `site.example.com` , and `images.example.com.`.
*

@@ -129,4 +145,8 @@ * @external

/**
* `AWS::CertificateManager::Certificate.CertificateAuthorityArn`.
* The Amazon Resource Name (ARN) of the private certificate authority (CA) that will be used to issue the certificate.
*
* If you do not provide an ARN and you are trying to request a private certificate, ACM will attempt to issue a public certificate. For more information about private CAs, see the [AWS Certificate Manager Private Certificate Authority (PCA)](https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaWelcome.html) user guide. The ARN must have the following form:
*
* `arn:aws:acm-pca:region:account:certificate-authority/12345678-1234-1234-1234-123456789012`
*
* @external

@@ -137,4 +157,8 @@ * @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-certificatemanager-certificate.html#cfn-certificatemanager-certificate-certificateauthorityarn

/**
* `AWS::CertificateManager::Certificate.CertificateTransparencyLoggingPreference`.
* You can opt out of certificate transparency logging by specifying the `DISABLED` option. Opt in by specifying `ENABLED` .
*
* If you do not specify a certificate transparency logging preference on a new CloudFormation template, or if you remove the logging preference from an existing template, this is the same as explicitly enabling the preference.
*
* Changing the certificate transparency logging preference will update the existing resource by calling `UpdateCertificateOptions` on the certificate. This action will not create a new resource.
*
* @external

@@ -145,4 +169,6 @@ * @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-certificatemanager-certificate.html#cfn-certificatemanager-certificate-certificatetransparencyloggingpreference

/**
* `AWS::CertificateManager::Certificate.DomainValidationOptions`.
* Domain information that domain name registrars use to verify your identity.
*
* > In order for a AWS::CertificateManager::Certificate to be provisioned and validated in CloudFormation automatically, the `DomainName` property needs to be identical to one of the `DomainName` property supplied in DomainValidationOptions, if the ValidationMethod is **DNS**. Failing to keep them like-for-like will result in failure to create the domain validation records in Route53.
*
* @external

@@ -153,4 +179,6 @@ * @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-certificatemanager-certificate.html#cfn-certificatemanager-certificate-domainvalidationoptions

/**
* `AWS::CertificateManager::Certificate.SubjectAlternativeNames`.
* Additional FQDNs to be included in the Subject Alternative Name extension of the ACM certificate.
*
* For example, you can add www.example.net to a certificate for which the `DomainName` field is www.example.com if users can reach your site by using either name.
*
* @external

@@ -161,3 +189,3 @@ * @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-certificatemanager-certificate.html#cfn-certificatemanager-certificate-subjectalternativenames

/**
* `AWS::CertificateManager::Certificate.Tags`.
* Key-value pairs that can identify the certificate.
*

@@ -169,4 +197,8 @@ * @external

/**
* `AWS::CertificateManager::Certificate.ValidationMethod`.
* The method you want to use to validate that you own or control the domain associated with a public certificate.
*
* You can [validate with DNS](https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-validate-dns.html) or [validate with email](https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-validate-email.html) . We recommend that you use DNS validation.
*
* If not specified, this property defaults to email validation.
*
* @external

@@ -180,2 +212,8 @@ * @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-certificatemanager-certificate.html#cfn-certificatemanager-certificate-validationmethod

*
* The `AWS::CertificateManager::Certificate` resource requests an AWS Certificate Manager ( ACM ) certificate that you can use to enable secure connections. For example, you can deploy an ACM certificate to an Elastic Load Balancer to enable HTTPS support. For more information, see [RequestCertificate](https://docs.aws.amazon.com/acm/latest/APIReference/API_RequestCertificate.html) in the AWS Certificate Manager API Reference.
*
* > When you use the `AWS::CertificateManager::Certificate` resource in a CloudFormation stack, domain validation is handled automatically if all three of the following are true: The certificate domain is hosted in Amazon Route 53, the domain resides in your AWS account , and you are using DNS validation.
* >
* > However, if the certificate uses email validation, or if the domain is not hosted in Route 53, then the stack will remain in the `CREATE_IN_PROGRESS` state. Further stack operations are delayed until you validate the certificate request, either by acting upon the instructions in the validation email, or by adding a CNAME record to your DNS configuration. For more information, see [Option 1: DNS Validation](https://docs.aws.amazon.com/acm/latest/userguide/dns-validation.html) and [Option 2: Email Validation](https://docs.aws.amazon.com/acm/latest/userguide/email-validation.html) .
*
* @external

@@ -201,3 +239,3 @@ * @cloudformationResource AWS::CertificateManager::Certificate

/**
* `AWS::CertificateManager::Certificate.DomainName`.
* The fully qualified domain name (FQDN), such as www.example.com, with which you want to secure an ACM certificate. Use an asterisk (*) to create a wildcard certificate that protects several sites in the same domain. For example, `*.example.com` protects `www.example.com` , `site.example.com` , and `images.example.com.`.
*

@@ -209,4 +247,8 @@ * @external

/**
* `AWS::CertificateManager::Certificate.CertificateAuthorityArn`.
* The Amazon Resource Name (ARN) of the private certificate authority (CA) that will be used to issue the certificate.
*
* If you do not provide an ARN and you are trying to request a private certificate, ACM will attempt to issue a public certificate. For more information about private CAs, see the [AWS Certificate Manager Private Certificate Authority (PCA)](https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaWelcome.html) user guide. The ARN must have the following form:
*
* `arn:aws:acm-pca:region:account:certificate-authority/12345678-1234-1234-1234-123456789012`
*
* @external

@@ -217,4 +259,8 @@ * @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-certificatemanager-certificate.html#cfn-certificatemanager-certificate-certificateauthorityarn

/**
* `AWS::CertificateManager::Certificate.CertificateTransparencyLoggingPreference`.
* You can opt out of certificate transparency logging by specifying the `DISABLED` option. Opt in by specifying `ENABLED` .
*
* If you do not specify a certificate transparency logging preference on a new CloudFormation template, or if you remove the logging preference from an existing template, this is the same as explicitly enabling the preference.
*
* Changing the certificate transparency logging preference will update the existing resource by calling `UpdateCertificateOptions` on the certificate. This action will not create a new resource.
*
* @external

@@ -225,4 +271,6 @@ * @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-certificatemanager-certificate.html#cfn-certificatemanager-certificate-certificatetransparencyloggingpreference

/**
* `AWS::CertificateManager::Certificate.DomainValidationOptions`.
* Domain information that domain name registrars use to verify your identity.
*
* > In order for a AWS::CertificateManager::Certificate to be provisioned and validated in CloudFormation automatically, the `DomainName` property needs to be identical to one of the `DomainName` property supplied in DomainValidationOptions, if the ValidationMethod is **DNS**. Failing to keep them like-for-like will result in failure to create the domain validation records in Route53.
*
* @external

@@ -233,4 +281,6 @@ * @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-certificatemanager-certificate.html#cfn-certificatemanager-certificate-domainvalidationoptions

/**
* `AWS::CertificateManager::Certificate.SubjectAlternativeNames`.
* Additional FQDNs to be included in the Subject Alternative Name extension of the ACM certificate.
*
* For example, you can add www.example.net to a certificate for which the `DomainName` field is www.example.com if users can reach your site by using either name.
*
* @external

@@ -241,3 +291,3 @@ * @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-certificatemanager-certificate.html#cfn-certificatemanager-certificate-subjectalternativenames

/**
* `AWS::CertificateManager::Certificate.Tags`.
* Key-value pairs that can identify the certificate.
*

@@ -249,4 +299,8 @@ * @external

/**
* `AWS::CertificateManager::Certificate.ValidationMethod`.
* The method you want to use to validate that you own or control the domain associated with a public certificate.
*
* You can [validate with DNS](https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-validate-dns.html) or [validate with email](https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-validate-email.html) . We recommend that you use DNS validation.
*
* If not specified, this property defaults to email validation.
*
* @external

@@ -290,2 +344,8 @@ * @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-certificatemanager-certificate.html#cfn-certificatemanager-certificate-validationmethod

*
* The `AWS::CertificateManager::Certificate` resource requests an AWS Certificate Manager ( ACM ) certificate that you can use to enable secure connections. For example, you can deploy an ACM certificate to an Elastic Load Balancer to enable HTTPS support. For more information, see [RequestCertificate](https://docs.aws.amazon.com/acm/latest/APIReference/API_RequestCertificate.html) in the AWS Certificate Manager API Reference.
*
* > When you use the `AWS::CertificateManager::Certificate` resource in a CloudFormation stack, domain validation is handled automatically if all three of the following are true: The certificate domain is hosted in Amazon Route 53, the domain resides in your AWS account , and you are using DNS validation.
* >
* > However, if the certificate uses email validation, or if the domain is not hosted in Route 53, then the stack will remain in the `CREATE_IN_PROGRESS` state. Further stack operations are delayed until you validate the certificate request, either by acting upon the instructions in the validation email, or by adding a CNAME record to your DNS configuration. For more information, see [Option 1: DNS Validation](https://docs.aws.amazon.com/acm/latest/userguide/dns-validation.html) and [Option 2: Email Validation](https://docs.aws.amazon.com/acm/latest/userguide/email-validation.html) .
*
* @external

@@ -297,2 +357,4 @@ * @cloudformationResource AWS::CertificateManager::Certificate

/**
* `DomainValidationOption` is a property of the [AWS::CertificateManager::Certificate](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-certificatemanager-certificate.html) resource that specifies the AWS Certificate Manager ( ACM ) certificate domain to validate. Depending on the chosen validation method, ACM checks the domain's DNS record for a validation CNAME, or it attempts to send a validation email message to the domain owner.
*
* @external

@@ -303,3 +365,3 @@ * @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-certificatemanager-certificate-domainvalidationoption.html

/**
* `CfnCertificate.DomainValidationOptionProperty.DomainName`.
* A fully qualified domain name (FQDN) in the certificate request.
*

@@ -311,4 +373,12 @@ * @external

/**
* `CfnCertificate.DomainValidationOptionProperty.HostedZoneId`.
* The `HostedZoneId` option, which is available if you are using Route 53 as your domain registrar, causes ACM to add your CNAME to the domain record.
*
* Your list of `DomainValidationOptions` must contain one and only one of the domain-validation options, and the `HostedZoneId` can be used only when `DNS` is specified as your validation method.
*
* Use the Route 53 `ListHostedZones` API to discover IDs for available hosted zones.
*
* > The `ListHostedZones` API returns IDs in the format "/hostedzone/Z111111QQQQQQQ", but CloudFormation requires the IDs to be in the format "Z111111QQQQQQQ".
*
* When you change your `DomainValidationOptions` , a new resource is created.
*
* @external

@@ -319,4 +389,12 @@ * @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-certificatemanager-certificate-domainvalidationoption.html#cfn-certificatemanager-certificate-domainvalidationoption-hostedzoneid

/**
* `CfnCertificate.DomainValidationOptionProperty.ValidationDomain`.
* The domain name to which you want ACM to send validation emails.
*
* This domain name is the suffix of the email addresses that you want ACM to use. This must be the same as the `DomainName` value or a superdomain of the `DomainName` value. For example, if you request a certificate for `testing.example.com` , you can specify `example.com` as this value. In that case, ACM sends domain validation emails to the following five addresses:
*
* - admin@example.com
* - administrator@example.com
* - hostmaster@example.com
* - postmaster@example.com
* - webmaster@example.com
*
* @external

@@ -323,0 +401,0 @@ * @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-certificatemanager-certificate-domainvalidationoption.html#cfn-certificatemanager-certificate-domainvalidationoption-validationdomain

@@ -91,3 +91,3 @@ "use strict";

_a = JSII_RTTI_SYMBOL_1;
DnsValidatedCertificate[_a] = { fqn: "@aws-cdk/aws-certificatemanager.DnsValidatedCertificate", version: "1.137.0" };
DnsValidatedCertificate[_a] = { fqn: "@aws-cdk/aws-certificatemanager.DnsValidatedCertificate", version: "1.138.0" };
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"dns-validated-certificate.js","sourceRoot":"","sources":["dns-validated-certificate.ts"],"names":[],"mappings":";;;;;;AAAA,6BAA6B;AAC7B,wCAAwC;AACxC,8CAA8C;AAE9C,qCAAqC;AAGrC,yDAAqD;;;;;;;;;;AAkBrD,MAAa,uBAAwB,SAAQ,kCAAe;;;;IAW1D,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAmC;QAC3E,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;;QAEjB,IAAI,CAAC,MAAM,GAAG,KAAK,CAAC,MAAM,CAAC;QAE3B,IAAI,CAAC,UAAU,GAAG,KAAK,CAAC,UAAU,CAAC;QACnC,IAAI,CAAC,kBAAkB,GAAG,KAAK,CAAC,UAAU,CAAC,QAAQ,CAAC;QACpD,qCAAqC;QACrC,IAAI,IAAI,CAAC,kBAAkB,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE;YACzC,IAAI,CAAC,kBAAkB,GAAG,IAAI,CAAC,kBAAkB,CAAC,SAAS,CAAC,CAAC,EAAE,IAAI,CAAC,kBAAkB,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC;SACpG;QAED,2DAA2D;QAC3D,IAAI,CAAC,YAAY,GAAG,KAAK,CAAC,UAAU,CAAC,YAAY,CAAC,OAAO,CAAC,iBAAiB,EAAE,EAAE,CAAC,CAAC;QACjF,IAAI,CAAC,IAAI,GAAG,IAAI,GAAG,CAAC,UAAU,CAAC,GAAG,CAAC,OAAO,CAAC,GAAG,EAAE,sCAAsC,CAAC,CAAC;QAExF,MAAM,iBAAiB,GAAG,IAAI,MAAM,CAAC,QAAQ,CAAC,IAAI,EAAE,8BAA8B,EAAE;YAClF,IAAI,EAAE,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,SAAS,EAAE,IAAI,EAAE,iBAAiB,EAAE,mCAAmC,EAAE,KAAK,CAAC,CAAC;YACzH,OAAO,EAAE,iCAAiC;YAC1C,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC,WAAW;YACnC,OAAO,EAAE,GAAG,CAAC,QAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YACjC,IAAI,EAAE,KAAK,CAAC,kBAAkB;SAC/B,CAAC,CAAC;QACH,iBAAiB,CAAC,eAAe,CAAC,IAAI,GAAG,CAAC,eAAe,CAAC;YACxD,OAAO,EAAE,CAAC,wBAAwB,EAAE,yBAAyB,EAAE,uBAAuB,EAAE,0BAA0B,CAAC;YACnH,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CAAC,CAAC;QACJ,iBAAiB,CAAC,eAAe,CAAC,IAAI,GAAG,CAAC,eAAe,CAAC;YACxD,OAAO,EAAE,CAAC,mBAAmB,CAAC;YAC9B,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CAAC,CAAC;QACJ,iBAAiB,CAAC,eAAe,CAAC,IAAI,GAAG,CAAC,eAAe,CAAC;YACxD,OAAO,EAAE,CAAC,kCAAkC,CAAC;YAC7C,SAAS,EAAE,CAAC,OAAO,GAAG,CAAC,KAAK,CAAC,EAAE,CAAC,iBAAiB,CAAC,CAAC,SAAS,yBAAyB,IAAI,CAAC,YAAY,EAAE,CAAC;SAC1G,CAAC,CAAC,CAAC;QAEJ,MAAM,WAAW,GAAG,IAAI,GAAG,CAAC,cAAc,CAAC,IAAI,EAAE,8BAA8B,EAAE;YAC/E,YAAY,EAAE,iBAAiB,CAAC,WAAW;YAC3C,UAAU,EAAE;gBACV,UAAU,EAAE,KAAK,CAAC,UAAU;gBAC5B,uBAAuB,EAAE,GAAG,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,OAAO,EAAE,GAAG,EAAE,CAAC,KAAK,CAAC,uBAAuB,EAAE,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC;gBAC7G,YAAY,EAAE,IAAI,CAAC,YAAY;gBAC/B,MAAM,EAAE,KAAK,CAAC,MAAM;gBACpB,eAAe,EAAE,KAAK,CAAC,eAAe;gBACtC,IAAI,EAAE,GAAG,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,OAAO,EAAE,GAAG,EAAE,CAAC,IAAI,CAAC,IAAI,CAAC,UAAU,EAAE,EAAE,CAAC;aAC/D;SACF,CAAC,CAAC;QAEH,IAAI,CAAC,cAAc,GAAG,WAAW,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,QAAQ,EAAE,CAAC;KAC5D;;;;;;;;;IAES,QAAQ;QAChB,MAAM,MAAM,GAAa,EAAE,CAAC;QAC5B,uEAAuE;QACvE,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,YAAY,CAAC,IAAI,CAAC,kBAAkB,CAAC;YAClD,IAAI,CAAC,UAAU,KAAK,IAAI,CAAC,kBAAkB;YAC3C,CAAC,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,GAAG,GAAG,IAAI,CAAC,kBAAkB,CAAC,EAAE;YAC1D,MAAM,CAAC,IAAI,CAAC,YAAY,IAAI,CAAC,kBAAkB,qDAAqD,IAAI,CAAC,UAAU,EAAE,CAAC,CAAC;SACxH;QACD,OAAO,MAAM,CAAC;KACf;;AAvEH,0DAwEC","sourcesContent":["import * as path from 'path';\nimport * as iam from '@aws-cdk/aws-iam';\nimport * as lambda from '@aws-cdk/aws-lambda';\nimport * as route53 from '@aws-cdk/aws-route53';\nimport * as cdk from '@aws-cdk/core';\nimport { Construct } from 'constructs';\nimport { CertificateProps, ICertificate } from './certificate';\nimport { CertificateBase } from './certificate-base';\n\n                                                                                                 \nexport interface DnsValidatedCertificateProps extends CertificateProps {\n                                                                                                                                                                                   \n  readonly hostedZone: route53.IHostedZone;\n                                                                                                                                                                                                                                                     \n  readonly region?: string;\n\n                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                         \n  readonly route53Endpoint?: string;\n\n                                                                                                                                           \n  readonly customResourceRole?: iam.IRole;\n\n}\n\n                                                                                                                                                                                                                      \nexport class DnsValidatedCertificate extends CertificateBase implements ICertificate, cdk.ITaggable {\n  public readonly certificateArn: string;\n\n                                                                                                                                                                                              \n\n  public readonly tags: cdk.TagManager;\n  protected readonly region?: string;\n  private normalizedZoneName: string;\n  private hostedZoneId: string;\n  private domainName: string;\n\n  constructor(scope: Construct, id: string, props: DnsValidatedCertificateProps) {\n    super(scope, id);\n\n    this.region = props.region;\n\n    this.domainName = props.domainName;\n    this.normalizedZoneName = props.hostedZone.zoneName;\n    // Remove trailing `.` from zone name\n    if (this.normalizedZoneName.endsWith('.')) {\n      this.normalizedZoneName = this.normalizedZoneName.substring(0, this.normalizedZoneName.length - 1);\n    }\n\n    // Remove any `/hostedzone/` prefix from the Hosted Zone ID\n    this.hostedZoneId = props.hostedZone.hostedZoneId.replace(/^\\/hostedzone\\//, '');\n    this.tags = new cdk.TagManager(cdk.TagType.MAP, 'AWS::CertificateManager::Certificate');\n\n    const requestorFunction = new lambda.Function(this, 'CertificateRequestorFunction', {\n      code: lambda.Code.fromAsset(path.resolve(__dirname, '..', 'lambda-packages', 'dns_validated_certificate_handler', 'lib')),\n      handler: 'index.certificateRequestHandler',\n      runtime: lambda.Runtime.NODEJS_12_X,\n      timeout: cdk.Duration.minutes(15),\n      role: props.customResourceRole,\n    });\n    requestorFunction.addToRolePolicy(new iam.PolicyStatement({\n      actions: ['acm:RequestCertificate', 'acm:DescribeCertificate', 'acm:DeleteCertificate', 'acm:AddTagsToCertificate'],\n      resources: ['*'],\n    }));\n    requestorFunction.addToRolePolicy(new iam.PolicyStatement({\n      actions: ['route53:GetChange'],\n      resources: ['*'],\n    }));\n    requestorFunction.addToRolePolicy(new iam.PolicyStatement({\n      actions: ['route53:changeResourceRecordSets'],\n      resources: [`arn:${cdk.Stack.of(requestorFunction).partition}:route53:::hostedzone/${this.hostedZoneId}`],\n    }));\n\n    const certificate = new cdk.CustomResource(this, 'CertificateRequestorResource', {\n      serviceToken: requestorFunction.functionArn,\n      properties: {\n        DomainName: props.domainName,\n        SubjectAlternativeNames: cdk.Lazy.list({ produce: () => props.subjectAlternativeNames }, { omitEmpty: true }),\n        HostedZoneId: this.hostedZoneId,\n        Region: props.region,\n        Route53Endpoint: props.route53Endpoint,\n        Tags: cdk.Lazy.list({ produce: () => this.tags.renderTags() }),\n      },\n    });\n\n    this.certificateArn = certificate.getAtt('Arn').toString();\n  }\n\n  protected validate(): string[] {\n    const errors: string[] = [];\n    // Ensure the zone name is a parent zone of the certificate domain name\n    if (!cdk.Token.isUnresolved(this.normalizedZoneName) &&\n      this.domainName !== this.normalizedZoneName &&\n      !this.domainName.endsWith('.' + this.normalizedZoneName)) {\n      errors.push(`DNS zone ${this.normalizedZoneName} is not authoritative for certificate domain name ${this.domainName}`);\n    }\n    return errors;\n  }\n}\n"]}

@@ -46,3 +46,3 @@ "use strict";

_a = JSII_RTTI_SYMBOL_1;
PrivateCertificate[_a] = { fqn: "@aws-cdk/aws-certificatemanager.PrivateCertificate", version: "1.137.0" };
PrivateCertificate[_a] = { fqn: "@aws-cdk/aws-certificatemanager.PrivateCertificate", version: "1.138.0" };
//# sourceMappingURL=data:application/json;base64,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
{
"name": "@aws-cdk/aws-certificatemanager",
"version": "1.137.0",
"version": "1.138.0",
"description": "The CDK Construct Library for AWS::CertificateManager",

@@ -75,15 +75,15 @@ "main": "lib/index.js",

"devDependencies": {
"@aws-cdk/assert-internal": "1.137.0",
"@aws-cdk/cdk-build-tools": "1.137.0",
"@aws-cdk/cfn2ts": "1.137.0",
"@aws-cdk/pkglint": "1.137.0",
"@aws-cdk/assert-internal": "1.138.0",
"@aws-cdk/cdk-build-tools": "1.138.0",
"@aws-cdk/cfn2ts": "1.138.0",
"@aws-cdk/pkglint": "1.138.0",
"@types/jest": "^27.0.3"
},
"dependencies": {
"@aws-cdk/aws-acmpca": "1.137.0",
"@aws-cdk/aws-cloudwatch": "1.137.0",
"@aws-cdk/aws-iam": "1.137.0",
"@aws-cdk/aws-lambda": "1.137.0",
"@aws-cdk/aws-route53": "1.137.0",
"@aws-cdk/core": "1.137.0",
"@aws-cdk/aws-acmpca": "1.138.0",
"@aws-cdk/aws-cloudwatch": "1.138.0",
"@aws-cdk/aws-iam": "1.138.0",
"@aws-cdk/aws-lambda": "1.138.0",
"@aws-cdk/aws-route53": "1.138.0",
"@aws-cdk/core": "1.138.0",
"constructs": "^3.3.69"

@@ -93,8 +93,8 @@ },

"peerDependencies": {
"@aws-cdk/aws-acmpca": "1.137.0",
"@aws-cdk/aws-cloudwatch": "1.137.0",
"@aws-cdk/aws-iam": "1.137.0",
"@aws-cdk/aws-lambda": "1.137.0",
"@aws-cdk/aws-route53": "1.137.0",
"@aws-cdk/core": "1.137.0",
"@aws-cdk/aws-acmpca": "1.138.0",
"@aws-cdk/aws-cloudwatch": "1.138.0",
"@aws-cdk/aws-iam": "1.138.0",
"@aws-cdk/aws-lambda": "1.138.0",
"@aws-cdk/aws-route53": "1.138.0",
"@aws-cdk/core": "1.138.0",
"constructs": "^3.3.69"

@@ -101,0 +101,0 @@ },

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is too big to display

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is too big to display

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc