troposphere-dns-certificate


Nametroposphere-dns-certificate JSON
Version 2.0.0 PyPI version JSON
download
home_pagehttps://github.com/dflook/cloudformation-dns-certificate
SummaryCloudformation DNS validated certificate resource for troposphere
upload_time2023-04-24 20:35:37
maintainer
docs_urlNone
authorDaniel Flook
requires_python
licenseMIT
keywords cloudformation troposphere certificate
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            # Cloudformation DNS Validated Certificate Resource

This is a cloudformation custom resource which is an enhancement of the [AWS::CertificateManager::Certificate](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-certificatemanager-certificate.html) resource.

It allows creating a certificate in a region different from the stack's region (e.g. `us-east-1` for cloudfront),
and allows for creating a certificate for a Route 53 hosted zone in another AWS account.
It also allows for setting the key algorithm.

## Usage

To use this custom resource, copy the CustomAcmCertificateLambda and CustomAcmCertificateLambdaExecutionRole resources
into your template. You can then create certificate resources of Type: `Custom::DNSCertificate`.

This resource is also available as troposphere extension, in the [troposphere-dns-certificate](https://pypi.org/project/troposphere-dns-certificate/) package

Remember to add a ServiceToken property to the resource which references the CustomAcmCertificateLambda arn.
Certificates may take up to 30 minutes to be issued, but typically takes ~3 minutes. The Certificate resource remains as 
CREATE_IN_PROGRESS until the certificate is issued.

### Differences from AWS::CertificateManager::Certificate
It should behave similarly to [AWS::CertificateManager::Certificate](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-certificatemanager-certificate.html), 
except for the differences described here.

The additional `Region` property can be used to set the region to create the certificate in.

The [DomainValidationOption](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-certificatemanager-certificate-domainvalidationoption.html) has a additional properties `Route53RoleArn` and `Route53RoleExternalId` which allow assuming a role before creating DNS validation records.
This lets you create a certificate for a hosted zone in another account.

The additional `KeyAlgorithm` property allows setting the key algorithm used to generate the key pair used by the certificate.

### Certificate Resource

#### Syntax

```yaml
Type: Custom::DNSCertificate
Properties: 
  DomainName: String
  DomainValidationOptions:
    - DomainValidationOption
  SubjectAlternativeNames:
    - String
  Tags:
    - Resource Tag
  ValidationMethod: String
  Region: String
  CertificateTransparencyLoggingPreference: String
  KeyAlgorithm: String
  ServiceToken: !GetAtt 'CustomAcmCertificateLambda.Arn'  
```

#### Properties

* `DomainName`

  Fully qualified domain name (FQDN) to issue the certificate for. Use an asterisk as a wildcard.

  - Required: Yes
  - Type: String
  - Update requires: [Replacement](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-replacement)
  
* `DomainValidationOptions`

  Information for validating domain ownership. A DomainValidationOption should be present for the DomainName and all 
  SubjectAlternativeNames. A DomainValidationOption for a parent domain can be used for names that have the same HostedZoneId.

  - Required: Yes
  - Type: List of `DomainValidationOption`
  - Update requires: [Replacement](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-replacement) if a HostedZoneId changes

* `SubjectAlternativeNames`

  FQDNs to include in the Subject Alternative Name of the certificate.

  - Required: No
  - Type: List of String values
  - Update requires: [Replacement](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-replacement)  

* `Tags`

  Tags for this certificate

  - Required: No
  - Type: [Resource Tag](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html)
  - Update requires: [No interruption](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-no-interrupt)  

* `ValidationMethod`

  Method to use to validate domain ownership. This should be `DNS`.

  - Required: No
  - Default: `EMAIL`
  - Type: String
  - Update requires: [Replacement](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-replacement) 

* `Region`

  The region to create the certificate in.

  - Required: No
  - Default: The Stack's region
  - Type: String
  - Update requires: [Replacement](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-replacement) 

* `CertificateTransparencyLoggingPreference`

  Certificate Transparency Logging Preference. This may be 'ENABLED' or 'DISABLED'.
    
  - Required: No
  - Default: `ENABLED`
  - Type: String
  - Update requires: [No interruption](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-no-interrupt)  

* `KeyAlgorithm`

  The algorithm that will be used to generate the key pair used by the certificate.
  Currently, this may be `RSA_2048`, `EC_prime256v1`, or `EC_secp384r1` for new certificates.

  :warning: Not all algorithms are supported by all clients, AWS services or regions.

  - Required: No
  - Default: `RSA_2048`
  - Type: String
  - Update requires: [Replacement](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-replacement)

#### Return value

* Ref

  When the [`Ref`](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/intrinsic-function-reference-ref.html) 
  function is used on the logical ID of a Certificate resource the certificate ARN is returned.

### DomainValidationOption

#### Syntax

```yaml
DomainName: String
HostedZoneId: String
Route53RoleArn: String
Route53RoleExternalId: String
```

#### Properties

* `DomainName`

  Fully qualified domain name of the validation request.

  - Required: Yes
  - Type: String
  - Update requires: [Replacement](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-replacement)
  
* `HostedZoneId`

  The Route53 Hosted Zone to create validation records in.

  - Required: Yes
  - Type: String
  - Update requires: [Replacement](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-replacement) 
  
* `Route53RoleArn`

  The arn of an IAM Role to assume when creating DNS validation records. This can be used to create the records for a
  Hosted Zone in another AWS account.

  - Required: No
  - Type: String
  - Update requires: [No interruption](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-no-interrupt)  

* `Route53RoleExternalId`

  An External ID to use when assuming the Route53RoleArn. This can be set if required by the trust policy of the role. 
  See https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user_externalid.html for details of using ExternalIds.

  - Required: No
  - Type: String
  - Update requires: [No interruption](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-no-interrupt)

## Troposphere

If you are using troposphere you can install this resource as an extension using pip:

    $ pip install troposphere_dns_certificate

You can then import the Certificate resource from troposphere_dns_certificate.certificatemanager instead of troposphere.certificatemanager. 

cloudformation.py is an example of using troposphere to create a template with a Certificate resource. 

If you are not using troposphere, you can simply copy the CustomAcmCertificateLambda and CustomAcmCertificateLambdaExecutionRole
resources from the cloudformation.json or cloudformation.yaml files.

## Examples

The certificate resource looks like:

```yaml
ExampleCertificate:
  Properties:
    DomainName: test.example.com
    ValidationMethod: DNS
    DomainValidationOptions:
      - DomainName: test.example.com
        HostedZoneId: Z2KZ5YTUFZNC7H
    Tags:
      - Key: Name
        Value: Example Certificate
    ServiceToken: !GetAtt 'CustomAcmCertificateLambda.Arn'
  Type: Custom::DNSCertificate
```


As with AWS::CertificateManager::Certificate providing the logical ID of the resource to the Ref function returns the certificate ARN.

For example (in yaml): `!Ref 'ExampleCertificate'`

### SubjectAlternativeNames

Additional names can be added to the certificate using the SubjectAlternativeNames property.

```yaml
ExampleCertificate:
  Properties:
    DomainName: example.com
    SubjectAlternativeNames:
      - additional.example.com
      - another.example.com
    ValidationMethod: DNS
    DomainValidationOptions:
      - DomainName: example.com
        HostedZoneId: Z2KZ5YTUFZNC7H
    Tags:
      - Key: Name
        Value: Example Certificate
    ServiceToken: !GetAtt 'CustomAcmCertificateLambda.Arn'
Type: Custom::DNSCertificate
```

### Multiple Hosted Zones

Names from multiple hosted zones can be used by adding DomainValidationOptions for each of the hosted zones.
For example:

```yaml
ExampleCertificate:
  Properties:
    DomainName: example.com
    SubjectAlternativeNames:
      - additional.example.org
    ValidationMethod: DNS
    DomainValidationOptions:
      - DomainName: example.com
        HostedZoneId: Z2KZ5YTUFZNC7H
      - DomainName: example.org
        HostedZoneId: ZEJZ9DIN47IQN
    Tags:
      - Key: Name
        Value: Example Certificate
    ServiceToken: !GetAtt 'CustomAcmCertificateLambda.Arn'
Type: Custom::DNSCertificate
```

### Wildcards

Wildcards can be used normally. A certificate for a name and all subdomains for example:

```yaml
ExampleCertificate:
  Properties:
    DomainName: example.com
    SubjectAlternativeNames:
      - *.example.com
    ValidationMethod: DNS
    DomainValidationOptions:
      - DomainName: example.com
        HostedZoneId: Z2KZ5YTUFZNC7H
    Tags:
      - Key: Name
        Value: Example Certificate
    ServiceToken: !GetAtt 'CustomAcmCertificateLambda.Arn'
  Type: Custom::DNSCertificate
```

### Specifying a region

This example uses the Region property to create the certificate in us-east-1, for use with cloudfront:

```yaml
ExampleCertificate:
  Properties:
    DomainName: example.com
    ValidationMethod: DNS
    DomainValidationOptions:
      - DomainName: example.com
        HostedZoneId: Z2KZ5YTUFZNC7H
    Region: us-east-1
    Tags:
      - Key: Name
        Value: Example Certificate
    ServiceToken: !GetAtt 'CustomAcmCertificateLambda.Arn'
  Type: Custom::DNSCertificate
```

### Assuming a role for Route 53 record creation

In some cases the account owning the hosted zone might be a different one than the one you are generating the certificate in.
To support this you can specify the domain validation option property `Route53RoleArn` with a role-ARN that should be 
assumed before creating the records required for certificate validation.

Optionally, you can also specify a `Route53RoleExternalId` that will be used when assuming the role specified by `Route53RoleArn`.
This would be required if the trust policy of the role requires an external ID.

If a top-level Route53RoleArn property is specified it will be assumed when validating domains that don't contain a
Route53RoleArn domain validation option property.

```yaml
ExampleCertificate:
  Properties:
    DomainName: test.example.com
    ValidationMethod: DNS
    DomainValidationOptions:
      - DomainName: test.example.com
        HostedZoneId: Z2KZ5YTUFZNC7H
        Route53RoleArn: arn:aws:iam::TRUSTING-ACCOUNT-ID:role/ACMRecordCreationRole
        Route53RoleExternalId: EXTERNAL-ID
    Tags:
      - Key: Name
        Value: Example Certificate
    ServiceToken: !GetAtt 'CustomAcmCertificateLambda.Arn'
  Type: Custom::DNSCertificate
```

Additionally you have to allow the assumption of this role by adding this statement to the CustomAcmCertificateLambdaExecutionRole:

```yaml
- Action:
    - sts:AssumeRole
  Resource:
    - arn:aws:iam::TRUSTING-ACCOUNT-ID:role/ACMRecordCreationRole
  Effect: Allow
```

If you are using the troposphere extension, this statement is added automatically. The full CustomAcmCertificateLambdaExecutionRole
for this example would look like:

```yaml
CustomAcmCertificateLambdaExecutionRole:
  Properties:
    AssumeRolePolicyDocument:
      Statement:
        - Action:
            - sts:AssumeRole
          Effect: Allow
          Principal:
            Service: lambda.amazonaws.com
      Version: '2012-10-17'
    ManagedPolicyArns:
      - arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole
      - arn:aws:iam::aws:policy/service-role/AWSLambdaRole
    Policies:
      - PolicyDocument:
          Statement:
            - Action:
                - acm:AddTagsToCertificate
                - acm:DeleteCertificate
                - acm:DescribeCertificate
                - acm:RemoveTagsFromCertificate
                - acm:UpdateCertificateOptions
              Effect: Allow
              Resource:
                - !Sub 'arn:${AWS::Partition}:acm:*:${AWS::AccountId}:certificate/*'
            - Action:
                - acm:RequestCertificate
                - acm:ListTagsForCertificate
                - acm:ListCertificates
              Effect: Allow
              Resource:
                - '*'
            - Action:
                - route53:ChangeResourceRecordSets
              Effect: Allow
              Resource:
                - arn:aws:route53:::hostedzone/*
            - Action:
                - sts:AssumeRole
              Effect: Allow
              Resource:
                - arn:aws:iam::TRUSTING-ACCOUNT-ID:role/ACMRecordCreationRole
          Version: '2012-10-17'
        PolicyName: !Sub '${AWS::StackName}CustomAcmCertificateLambdaExecutionPolicy'
```

The IAM role in the account with the hosted zone would look something like:

```yaml
ACMRecordCreationRole:
  Type: AWS::IAM::Role
  Properties:
    AssumeRolePolicyDocument:
      Statement:
        - Action:
            - sts:AssumeRole
          Principal:
            AWS:
              - arn:aws:iam::TRUSTED-ACCOUNT-ID:root
          Effect: Allow
          Condition:
            StringEquals:
              'sts:ExternalId': EXTERNAL-ID
      Version: '2012-10-17'
    Policies:
      - PolicyName: 'ACMRecordCreation'
        PolicyDocument:
          Version: '2012-10-17'
          Statement:
            - Action:
                - route53:ChangeResourceRecordSets
              Resource:
                - arn:aws:route53:::hostedzone/Z2KZ5YTUFZNC7H
              Effect: Allow
    RoleName: ACMRecordCreationRole
```

            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/dflook/cloudformation-dns-certificate",
    "name": "troposphere-dns-certificate",
    "maintainer": "",
    "docs_url": null,
    "requires_python": "",
    "maintainer_email": "",
    "keywords": "cloudformation troposphere certificate",
    "author": "Daniel Flook",
    "author_email": "daniel@flook.org",
    "download_url": "https://files.pythonhosted.org/packages/25/f0/3ada55ba50c1264f29043a7943bc9f8711e658dd985b7447a84bd8677ad2/troposphere-dns-certificate-2.0.0.tar.gz",
    "platform": null,
    "description": "# Cloudformation DNS Validated Certificate Resource\n\nThis is a cloudformation custom resource which is an enhancement of the [AWS::CertificateManager::Certificate](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-certificatemanager-certificate.html) resource.\n\nIt allows creating a certificate in a region different from the stack's region (e.g. `us-east-1` for cloudfront),\nand allows for creating a certificate for a Route 53 hosted zone in another AWS account.\nIt also allows for setting the key algorithm.\n\n## Usage\n\nTo use this custom resource, copy the CustomAcmCertificateLambda and CustomAcmCertificateLambdaExecutionRole resources\ninto your template. You can then create certificate resources of Type: `Custom::DNSCertificate`.\n\nThis resource is also available as troposphere extension, in the [troposphere-dns-certificate](https://pypi.org/project/troposphere-dns-certificate/) package\n\nRemember to add a ServiceToken property to the resource which references the CustomAcmCertificateLambda arn.\nCertificates may take up to 30 minutes to be issued, but typically takes ~3 minutes. The Certificate resource remains as \nCREATE_IN_PROGRESS until the certificate is issued.\n\n### Differences from AWS::CertificateManager::Certificate\nIt should behave similarly to [AWS::CertificateManager::Certificate](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-certificatemanager-certificate.html), \nexcept for the differences described here.\n\nThe additional `Region` property can be used to set the region to create the certificate in.\n\nThe [DomainValidationOption](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-certificatemanager-certificate-domainvalidationoption.html) has a additional properties `Route53RoleArn` and `Route53RoleExternalId` which allow assuming a role before creating DNS validation records.\nThis lets you create a certificate for a hosted zone in another account.\n\nThe additional `KeyAlgorithm` property allows setting the key algorithm used to generate the key pair used by the certificate.\n\n### Certificate Resource\n\n#### Syntax\n\n```yaml\nType: Custom::DNSCertificate\nProperties: \n  DomainName: String\n  DomainValidationOptions:\n    - DomainValidationOption\n  SubjectAlternativeNames:\n    - String\n  Tags:\n    - Resource Tag\n  ValidationMethod: String\n  Region: String\n  CertificateTransparencyLoggingPreference: String\n  KeyAlgorithm: String\n  ServiceToken: !GetAtt 'CustomAcmCertificateLambda.Arn'  \n```\n\n#### Properties\n\n* `DomainName`\n\n  Fully qualified domain name (FQDN) to issue the certificate for. Use an asterisk as a wildcard.\n\n  - Required: Yes\n  - Type: String\n  - Update requires: [Replacement](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-replacement)\n  \n* `DomainValidationOptions`\n\n  Information for validating domain ownership. A DomainValidationOption should be present for the DomainName and all \n  SubjectAlternativeNames. A DomainValidationOption for a parent domain can be used for names that have the same HostedZoneId.\n\n  - Required: Yes\n  - Type: List of `DomainValidationOption`\n  - Update requires: [Replacement](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-replacement) if a HostedZoneId changes\n\n* `SubjectAlternativeNames`\n\n  FQDNs to include in the Subject Alternative Name of the certificate.\n\n  - Required: No\n  - Type: List of String values\n  - Update requires: [Replacement](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-replacement)  \n\n* `Tags`\n\n  Tags for this certificate\n\n  - Required: No\n  - Type: [Resource Tag](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html)\n  - Update requires: [No interruption](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-no-interrupt)  \n\n* `ValidationMethod`\n\n  Method to use to validate domain ownership. This should be `DNS`.\n\n  - Required: No\n  - Default: `EMAIL`\n  - Type: String\n  - Update requires: [Replacement](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-replacement) \n\n* `Region`\n\n  The region to create the certificate in.\n\n  - Required: No\n  - Default: The Stack's region\n  - Type: String\n  - Update requires: [Replacement](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-replacement) \n\n* `CertificateTransparencyLoggingPreference`\n\n  Certificate Transparency Logging Preference. This may be 'ENABLED' or 'DISABLED'.\n    \n  - Required: No\n  - Default: `ENABLED`\n  - Type: String\n  - Update requires: [No interruption](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-no-interrupt)  \n\n* `KeyAlgorithm`\n\n  The algorithm that will be used to generate the key pair used by the certificate.\n  Currently, this may be `RSA_2048`, `EC_prime256v1`, or `EC_secp384r1` for new certificates.\n\n  :warning: Not all algorithms are supported by all clients, AWS services or regions.\n\n  - Required: No\n  - Default: `RSA_2048`\n  - Type: String\n  - Update requires: [Replacement](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-replacement)\n\n#### Return value\n\n* Ref\n\n  When the [`Ref`](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/intrinsic-function-reference-ref.html) \n  function is used on the logical ID of a Certificate resource the certificate ARN is returned.\n\n### DomainValidationOption\n\n#### Syntax\n\n```yaml\nDomainName: String\nHostedZoneId: String\nRoute53RoleArn: String\nRoute53RoleExternalId: String\n```\n\n#### Properties\n\n* `DomainName`\n\n  Fully qualified domain name of the validation request.\n\n  - Required: Yes\n  - Type: String\n  - Update requires: [Replacement](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-replacement)\n  \n* `HostedZoneId`\n\n  The Route53 Hosted Zone to create validation records in.\n\n  - Required: Yes\n  - Type: String\n  - Update requires: [Replacement](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-replacement) \n  \n* `Route53RoleArn`\n\n  The arn of an IAM Role to assume when creating DNS validation records. This can be used to create the records for a\n  Hosted Zone in another AWS account.\n\n  - Required: No\n  - Type: String\n  - Update requires: [No interruption](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-no-interrupt)  \n\n* `Route53RoleExternalId`\n\n  An External ID to use when assuming the Route53RoleArn. This can be set if required by the trust policy of the role. \n  See https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user_externalid.html for details of using ExternalIds.\n\n  - Required: No\n  - Type: String\n  - Update requires: [No interruption](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-no-interrupt)\n\n## Troposphere\n\nIf you are using troposphere you can install this resource as an extension using pip:\n\n    $ pip install troposphere_dns_certificate\n\nYou can then import the Certificate resource from troposphere_dns_certificate.certificatemanager instead of troposphere.certificatemanager. \n\ncloudformation.py is an example of using troposphere to create a template with a Certificate resource. \n\nIf you are not using troposphere, you can simply copy the CustomAcmCertificateLambda and CustomAcmCertificateLambdaExecutionRole\nresources from the cloudformation.json or cloudformation.yaml files.\n\n## Examples\n\nThe certificate resource looks like:\n\n```yaml\nExampleCertificate:\n  Properties:\n    DomainName: test.example.com\n    ValidationMethod: DNS\n    DomainValidationOptions:\n      - DomainName: test.example.com\n        HostedZoneId: Z2KZ5YTUFZNC7H\n    Tags:\n      - Key: Name\n        Value: Example Certificate\n    ServiceToken: !GetAtt 'CustomAcmCertificateLambda.Arn'\n  Type: Custom::DNSCertificate\n```\n\n\nAs with AWS::CertificateManager::Certificate providing the logical ID of the resource to the Ref function returns the certificate ARN.\n\nFor example (in yaml): `!Ref 'ExampleCertificate'`\n\n### SubjectAlternativeNames\n\nAdditional names can be added to the certificate using the SubjectAlternativeNames property.\n\n```yaml\nExampleCertificate:\n  Properties:\n    DomainName: example.com\n    SubjectAlternativeNames:\n      - additional.example.com\n      - another.example.com\n    ValidationMethod: DNS\n    DomainValidationOptions:\n      - DomainName: example.com\n        HostedZoneId: Z2KZ5YTUFZNC7H\n    Tags:\n      - Key: Name\n        Value: Example Certificate\n    ServiceToken: !GetAtt 'CustomAcmCertificateLambda.Arn'\nType: Custom::DNSCertificate\n```\n\n### Multiple Hosted Zones\n\nNames from multiple hosted zones can be used by adding DomainValidationOptions for each of the hosted zones.\nFor example:\n\n```yaml\nExampleCertificate:\n  Properties:\n    DomainName: example.com\n    SubjectAlternativeNames:\n      - additional.example.org\n    ValidationMethod: DNS\n    DomainValidationOptions:\n      - DomainName: example.com\n        HostedZoneId: Z2KZ5YTUFZNC7H\n      - DomainName: example.org\n        HostedZoneId: ZEJZ9DIN47IQN\n    Tags:\n      - Key: Name\n        Value: Example Certificate\n    ServiceToken: !GetAtt 'CustomAcmCertificateLambda.Arn'\nType: Custom::DNSCertificate\n```\n\n### Wildcards\n\nWildcards can be used normally. A certificate for a name and all subdomains for example:\n\n```yaml\nExampleCertificate:\n  Properties:\n    DomainName: example.com\n    SubjectAlternativeNames:\n      - *.example.com\n    ValidationMethod: DNS\n    DomainValidationOptions:\n      - DomainName: example.com\n        HostedZoneId: Z2KZ5YTUFZNC7H\n    Tags:\n      - Key: Name\n        Value: Example Certificate\n    ServiceToken: !GetAtt 'CustomAcmCertificateLambda.Arn'\n  Type: Custom::DNSCertificate\n```\n\n### Specifying a region\n\nThis example uses the Region property to create the certificate in us-east-1, for use with cloudfront:\n\n```yaml\nExampleCertificate:\n  Properties:\n    DomainName: example.com\n    ValidationMethod: DNS\n    DomainValidationOptions:\n      - DomainName: example.com\n        HostedZoneId: Z2KZ5YTUFZNC7H\n    Region: us-east-1\n    Tags:\n      - Key: Name\n        Value: Example Certificate\n    ServiceToken: !GetAtt 'CustomAcmCertificateLambda.Arn'\n  Type: Custom::DNSCertificate\n```\n\n### Assuming a role for Route 53 record creation\n\nIn some cases the account owning the hosted zone might be a different one than the one you are generating the certificate in.\nTo support this you can specify the domain validation option property `Route53RoleArn` with a role-ARN that should be \nassumed before creating the records required for certificate validation.\n\nOptionally, you can also specify a `Route53RoleExternalId` that will be used when assuming the role specified by `Route53RoleArn`.\nThis would be required if the trust policy of the role requires an external ID.\n\nIf a top-level Route53RoleArn property is specified it will be assumed when validating domains that don't contain a\nRoute53RoleArn domain validation option property.\n\n```yaml\nExampleCertificate:\n  Properties:\n    DomainName: test.example.com\n    ValidationMethod: DNS\n    DomainValidationOptions:\n      - DomainName: test.example.com\n        HostedZoneId: Z2KZ5YTUFZNC7H\n        Route53RoleArn: arn:aws:iam::TRUSTING-ACCOUNT-ID:role/ACMRecordCreationRole\n        Route53RoleExternalId: EXTERNAL-ID\n    Tags:\n      - Key: Name\n        Value: Example Certificate\n    ServiceToken: !GetAtt 'CustomAcmCertificateLambda.Arn'\n  Type: Custom::DNSCertificate\n```\n\nAdditionally you have to allow the assumption of this role by adding this statement to the CustomAcmCertificateLambdaExecutionRole:\n\n```yaml\n- Action:\n    - sts:AssumeRole\n  Resource:\n    - arn:aws:iam::TRUSTING-ACCOUNT-ID:role/ACMRecordCreationRole\n  Effect: Allow\n```\n\nIf you are using the troposphere extension, this statement is added automatically. The full CustomAcmCertificateLambdaExecutionRole\nfor this example would look like:\n\n```yaml\nCustomAcmCertificateLambdaExecutionRole:\n  Properties:\n    AssumeRolePolicyDocument:\n      Statement:\n        - Action:\n            - sts:AssumeRole\n          Effect: Allow\n          Principal:\n            Service: lambda.amazonaws.com\n      Version: '2012-10-17'\n    ManagedPolicyArns:\n      - arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole\n      - arn:aws:iam::aws:policy/service-role/AWSLambdaRole\n    Policies:\n      - PolicyDocument:\n          Statement:\n            - Action:\n                - acm:AddTagsToCertificate\n                - acm:DeleteCertificate\n                - acm:DescribeCertificate\n                - acm:RemoveTagsFromCertificate\n                - acm:UpdateCertificateOptions\n              Effect: Allow\n              Resource:\n                - !Sub 'arn:${AWS::Partition}:acm:*:${AWS::AccountId}:certificate/*'\n            - Action:\n                - acm:RequestCertificate\n                - acm:ListTagsForCertificate\n                - acm:ListCertificates\n              Effect: Allow\n              Resource:\n                - '*'\n            - Action:\n                - route53:ChangeResourceRecordSets\n              Effect: Allow\n              Resource:\n                - arn:aws:route53:::hostedzone/*\n            - Action:\n                - sts:AssumeRole\n              Effect: Allow\n              Resource:\n                - arn:aws:iam::TRUSTING-ACCOUNT-ID:role/ACMRecordCreationRole\n          Version: '2012-10-17'\n        PolicyName: !Sub '${AWS::StackName}CustomAcmCertificateLambdaExecutionPolicy'\n```\n\nThe IAM role in the account with the hosted zone would look something like:\n\n```yaml\nACMRecordCreationRole:\n  Type: AWS::IAM::Role\n  Properties:\n    AssumeRolePolicyDocument:\n      Statement:\n        - Action:\n            - sts:AssumeRole\n          Principal:\n            AWS:\n              - arn:aws:iam::TRUSTED-ACCOUNT-ID:root\n          Effect: Allow\n          Condition:\n            StringEquals:\n              'sts:ExternalId': EXTERNAL-ID\n      Version: '2012-10-17'\n    Policies:\n      - PolicyName: 'ACMRecordCreation'\n        PolicyDocument:\n          Version: '2012-10-17'\n          Statement:\n            - Action:\n                - route53:ChangeResourceRecordSets\n              Resource:\n                - arn:aws:route53:::hostedzone/Z2KZ5YTUFZNC7H\n              Effect: Allow\n    RoleName: ACMRecordCreationRole\n```\n",
    "bugtrack_url": null,
    "license": "MIT",
    "summary": "Cloudformation DNS validated certificate resource for troposphere",
    "version": "2.0.0",
    "split_keywords": [
        "cloudformation",
        "troposphere",
        "certificate"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "0cbb94b841f9d1239ba036f43e498071590b7dbe1791d90ecaf3f15c929c7e9d",
                "md5": "041c5dd81ee9997afef380ecc5d439d8",
                "sha256": "3f6975fa95f8619c312a3333fe0341b659d142166515622475bb499e552de4ee"
            },
            "downloads": -1,
            "filename": "troposphere_dns_certificate-2.0.0-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "041c5dd81ee9997afef380ecc5d439d8",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": null,
            "size": 12000,
            "upload_time": "2023-04-24T20:35:36",
            "upload_time_iso_8601": "2023-04-24T20:35:36.044820Z",
            "url": "https://files.pythonhosted.org/packages/0c/bb/94b841f9d1239ba036f43e498071590b7dbe1791d90ecaf3f15c929c7e9d/troposphere_dns_certificate-2.0.0-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "25f03ada55ba50c1264f29043a7943bc9f8711e658dd985b7447a84bd8677ad2",
                "md5": "38fbe561f80434446956855fa65f94ea",
                "sha256": "d592744e0668377234db445a5af55d0a8ec14b442f28fc5eed538e32e605e70c"
            },
            "downloads": -1,
            "filename": "troposphere-dns-certificate-2.0.0.tar.gz",
            "has_sig": false,
            "md5_digest": "38fbe561f80434446956855fa65f94ea",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": null,
            "size": 16379,
            "upload_time": "2023-04-24T20:35:37",
            "upload_time_iso_8601": "2023-04-24T20:35:37.568396Z",
            "url": "https://files.pythonhosted.org/packages/25/f0/3ada55ba50c1264f29043a7943bc9f8711e658dd985b7447a84bd8677ad2/troposphere-dns-certificate-2.0.0.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2023-04-24 20:35:37",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "github_user": "dflook",
    "github_project": "cloudformation-dns-certificate",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": true,
    "lcname": "troposphere-dns-certificate"
}
        
Elapsed time: 0.25456s