-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[certificatemanager] CNAME used for SSL Cert. validation is not deleted automatically. #11201
Comments
Related to #3333, with some of the same implications. This is the built-in CloudFormation behavior, and I suspect it's intentional. The important point to note is that for the same AWS account and domain name, the same CNAME is generated. This means two (or more) certificates can share the same CNAME record for validation, and removing the record when one certificate is removed will impact the others' ability to be renewed. The only option here -- besides lobbying to change the built-in CloudFormation behavior -- would be the creation of a new option ( @kerbachi, can you provide any details of if/how this is negatively impacting you? Is it mostly the principle of cleanup, or is there some adverse side-effect to these records remaining I might not be aware of? |
@njlynch That seems a good solution. Any plan to implement it? We need to clean up the AWS subaccounts we assign to our customers, therefore it's mandatory that CDK deletes all the created resources. |
Any updates here? |
was implemented with #18311 in the I guess this issue can also be close |
Thanks, @organom. I agree with you, this one can be closed. Please also note that |
|
I'm having the exact same issue when using Certificate. Which is now forcing me to go back to using |
I am getting the same issue with Certificate too. Any way to fix it without falling back to the old way? |
@ericchuawc I'm afraid the problem is not in the Certificate construct (CDK) but in the CloudFormation Resource |
As per this comment: Please upvote aws-cloudformation/cloudformation-coverage-roadmap#837 if this is important to you |
aws-cloudformation project has closed their issue and aws-cdk has closed theirs. Both projects pointing to eachother but CDK users loosing out on a working destroy command when you run essential infrastructure. Sad. |
Totally agree with @robzet . At the time or writing my original comment the Internal AWS team fights are of little interest, and right now, I depend on a feature that was deprecated with no alternative being offered, outside of an excuse saying the other team should do it. Please get your stuff together... Just my sincere opinion that I believe lots of CDK users can relate to @madeline-k can you please follow this with the cdk team, and hopefully fix or revert the internal decision? |
For anyone interested, I have published a construct to mitigate this specific issue until a better fix comes from AWS. https://www.npmjs.com/package/@servicevic-oss/cdk-cleanup-certificate-validation-records |
description of the bug:
aws_certificatemanager.Certificate creates and validate the SSL Certificates with 'CertificateValidation.from_dns' but does not delete the CNAME after 'cdk destroy'
Reproduction Steps
What did you expect to happen?
"cdk destroy" should deleted the CNAME record it created in Route53 for DNS validation
What actually happened?
The CNAME record is not deleted automatically after "cdk destroy" or after deleting the CloudFormation Template
Environment
Other
This is 🐛 Bug Report
The text was updated successfully, but these errors were encountered: