-
-
Notifications
You must be signed in to change notification settings - Fork 231
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow domains to belong to different Route53 zones #21
Comments
Hi @joshuaspence ! Indeed, this sounds like a good feature request to support but I don't have time to work on this in the near future. Meanwhile, you should be able to create an ACM certificate without validating it ( I will keep this issue open in case someone has a similar need and want to implement the support for this in this module. |
@joshuaspence Looks like the |
I also ran into this as I have a couple of certificates that have SANs from 3-5 different domains that I was attempting to perform the route53 validation with. Working with the assumption that the zones were in the same AWS account so that it could be looked up easily enough I made use of an
That was the relevant logic I was using. I'd rather not have to keep maintaining but this is a key reason why I can't use the module as-is. |
Would welcome comments/suggestions but I forked and created a feature branch to work on adding support. I've created a draft PR (ugns#2) as a discussion point. While I hate to hear it myself... "It works for me" but I think there are a few caveats to what I have that could probably be improved with more input. |
@jbouse I've tried you branch and it also worked for me with the primary and then 5 different domains and wildcards within them |
This is something that is needed for GovCloud deployments since there is no public DNS available for GovCloud. https://docs.aws.amazon.com/govcloud-us/latest/UserGuide/setting-up-route53.html
The public DNS must be created with a normal AWS account. I think this issue may be related, but I'm not 100% certain. New to terraform. :) |
This issue has been automatically marked as stale because it has been open 30 days |
@stephgosling run into any issues I should look into for improvement? |
I have a feeling that there was a problem but it's so long ago now I don't remember exactly what it was :( I've just been through my code and I think it might have broken with more than 5 SANs as I have a couple of wildcard definitions that logically should be together but are in two different states, each with 5 SANs so it might have been that, but as I say it works fine for me with 5 or less. |
Okay, I'll take another look at it with that in mind. I didn't think that there would be any limit restrictions except for ACM SANs limits which as I recall is 10 by default but can be modified by quota request. That may have been what you encountered if it those 5 SANs were both wildcard (*.domain.tld) and domain (domain.tld) as that would be a total of 10. |
yeah am familiar with the 10 SAN limit but this must have been something else. I have two (terragrunt) files that are:
and
in both cases the |
This issue has been automatically marked as stale because it has been open 30 days |
This issue was automatically closed because of stale in 10 days |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Currently this module assumes that all domains (
domain_name
andsubject_alternative_names
) belong to the same Route53 zone. I have an alias domain that has its own Route53 zone (it is a completely different top-level domain) that lives on the same certificate as my primary domain but I am unable to use this module at the moment due to this assumptionThe text was updated successfully, but these errors were encountered: