Skip to content

fix(acm-certificatemanager): DnsValidatedCertificate doesn't wait long enough#7150

Closed
nlang wants to merge 14 commits intoaws:masterfrom
nlang:nlang/acm-dns-validation-lambda-timeout
Closed

fix(acm-certificatemanager): DnsValidatedCertificate doesn't wait long enough#7150
nlang wants to merge 14 commits intoaws:masterfrom
nlang:nlang/acm-dns-validation-lambda-timeout

Conversation

@nlang
Copy link
Copy Markdown
Contributor

@nlang nlang commented Apr 2, 2020

This can be considered a quick temporary fix, as it is not the best way to accomplish the longer wait. Best thing would probably be to use the custom resource framework which will use a Cloud Watch scheduled event to call the lambda every 2 minutes until the pending task is successfull or failed.

What I did here is to just let the Lambda call itself and then start another waiter. That's obviously not the most efficient way, but as I said, this is a quick fix that works for that (at least for me) urgent problem arising from the current 9.5 minute wait time maximum.

Any thoughts, comments or improvement suggestions are highly welcome.

Commit Message

fix(acm-certificatemanager): DnsValidatedCertificate doesn't wait long enough
fixes #5831

End Commit Message


By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license

@aws-cdk-automation
Copy link
Copy Markdown
Collaborator

AWS CodeBuild CI Report

  • CodeBuild project: AutoBuildProject6AEA49D1-qxepHUsryhcu
  • Commit ID: 7a51c42
  • Result: FAILED
  • Build Logs (available for 30 days)

Powered by github-codebuild-logs, available on the AWS Serverless Application Repository

@aws-cdk-automation
Copy link
Copy Markdown
Collaborator

AWS CodeBuild CI Report

  • CodeBuild project: AutoBuildProject6AEA49D1-qxepHUsryhcu
  • Commit ID: 9643d8e
  • Result: FAILED
  • Build Logs (available for 30 days)

Powered by github-codebuild-logs, available on the AWS Serverless Application Repository

@aws-cdk-automation
Copy link
Copy Markdown
Collaborator

AWS CodeBuild CI Report

  • CodeBuild project: AutoBuildProject6AEA49D1-qxepHUsryhcu
  • Commit ID: 3b6a037
  • Result: FAILED
  • Build Logs (available for 30 days)

Powered by github-codebuild-logs, available on the AWS Serverless Application Repository

@aws-cdk-automation
Copy link
Copy Markdown
Collaborator

AWS CodeBuild CI Report

  • CodeBuild project: AutoBuildProject6AEA49D1-qxepHUsryhcu
  • Commit ID: 39e6113
  • Result: FAILED
  • Build Logs (available for 30 days)

Powered by github-codebuild-logs, available on the AWS Serverless Application Repository

@aws-cdk-automation
Copy link
Copy Markdown
Collaborator

AWS CodeBuild CI Report

  • CodeBuild project: AutoBuildProject6AEA49D1-qxepHUsryhcu
  • Commit ID: 8e239f9
  • Result: SUCCEEDED
  • Build Logs (available for 30 days)

Powered by github-codebuild-logs, available on the AWS Serverless Application Repository

@nlang
Copy link
Copy Markdown
Contributor Author

nlang commented Apr 17, 2020

Hi! Can I help with clarifying things or can we start a discussion about if this is the right way or what can be improved for this PR to get accepted? Thanks a bunch!

@nlang
Copy link
Copy Markdown
Contributor Author

nlang commented May 6, 2020

Any news on this?

@skinny85
Copy link
Copy Markdown
Contributor

skinny85 commented Jun 8, 2020

Apologies for the long wait @nlang . I'll look into this PR.

Copy link
Copy Markdown
Contributor

@skinny85 skinny85 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@nlang would you mind rebasing/merging the PR from the latest master? It seems there is some conflict that appeared in the meantime.

Apologies again for the review taking so long.

jogold added a commit to jogold/aws-cdk that referenced this pull request Jun 15, 2020
…icate

Automatically adding Amazon Route 53 CNAME records for DNS validation is
now natively supported by CloudFormation.

Add a `validation` prop to `Certificate` to handle both email and DNS
validation. Deprecate `DnsValidatedCertificate`.

The default remains email validation (non-breaking).

Closes aws#5831
Closes aws#5835
Closes aws#6081
Closes aws#6516
Closes aws#7150
Closes aws#7941
Closes aws#7995
Closes aws#7996
jogold added a commit to jogold/aws-cdk that referenced this pull request Jun 15, 2020
…cate

Automatically adding Amazon Route 53 CNAME records for DNS validation is
now natively supported by CloudFormation.

Add a `validation` prop to `Certificate` to handle both email and DNS
validation. Deprecate `DnsValidatedCertificate`.

The default remains email validation (non-breaking).

Closes aws#5831
Closes aws#5835
Closes aws#6081
Closes aws#6516
Closes aws#7150
Closes aws#7941
Closes aws#7995
Closes aws#7996
@mergify mergify bot closed this in #8552 Jul 10, 2020
mergify bot pushed a commit that referenced this pull request Jul 10, 2020
…cate (#8552)

Automatically adding Amazon Route 53 CNAME records for DNS validation is
now natively supported by CloudFormation.

Add a `validation` prop to `Certificate` to handle both email and DNS
validation. `DnsValidatedCertificate` is now only useful for cross-region
certificate creation.

The default remains email validation (non-breaking).

Closes #5831
Closes #5835
Closes #6081
Closes #6516
Closes #7150
Closes #7941
Closes #7995
Closes #7996
Closes #8282 
Closes #8659
Closes #8783

----

*By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

certificatemanager : DnsValidatedCertificate doesn't wait long enough

3 participants