-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DnsValidatedCertificate
does not fail if certificate is both "pending validation" and "validation: success"
#6081
Comments
I don't know why this is happening, but I think it might be a bit of a stretch to call it a CDK bug without further evidence. You mentioned the stack deployed before. Did the CDK version change in the mean time? Did the template change? The thing to do would be to figure out why your certificate didn't validate. You must be destroying+deploying it, instead of updating, if the certificate is getting recreated. Are you sure you're not hitting account limits? If anything, the stack deployment should have failed on creating the certificate, if there's a bug it's that we pretended that the certificate creation succeeded. That's not going to help you get your cert created, but that's what I'm repurposing this ticket into. |
DnsValidatedCertificate
does not fail if certificate is both "pending validation" and "validation: success"
The combination of states "pending" and "success" is very odd to me, so it might also have been an ACM hiccup. Have you checked the health dashboard? |
I just confirmed the problem has gone away as of this morning by simply re-running the same stack deploy, so I think you're right it must've been an ACM hiccup (though the health dashboard didn't show anything). Appreciate the quick response! |
Same bug for me @rix0rrr . If you take a look on the waiter, we are waiting for I think you can ovveride in the What do you think about this guys and girls ? |
I think that a rewrite of this custom resource using an async provider from the custom resource framework ( |
…icate Automatically adding Amazon Route 53 CNAME records for DNS validation is now natively supported by CloudFormation. Add a `validation` prop to `Certificate` to handle both email and DNS validation. Deprecate `DnsValidatedCertificate`. The default remains email validation (non-breaking). Closes aws#5831 Closes aws#5835 Closes aws#6081 Closes aws#6516 Closes aws#7150 Closes aws#7941 Closes aws#7995 Closes aws#7996
…cate Automatically adding Amazon Route 53 CNAME records for DNS validation is now natively supported by CloudFormation. Add a `validation` prop to `Certificate` to handle both email and DNS validation. Deprecate `DnsValidatedCertificate`. The default remains email validation (non-breaking). Closes aws#5831 Closes aws#5835 Closes aws#6081 Closes aws#6516 Closes aws#7150 Closes aws#7941 Closes aws#7995 Closes aws#7996
…cate (#8552) Automatically adding Amazon Route 53 CNAME records for DNS validation is now natively supported by CloudFormation. Add a `validation` prop to `Certificate` to handle both email and DNS validation. `DnsValidatedCertificate` is now only useful for cross-region certificate creation. The default remains email validation (non-breaking). Closes #5831 Closes #5835 Closes #6081 Closes #6516 Closes #7150 Closes #7941 Closes #7995 Closes #7996 Closes #8282 Closes #8659 Closes #8783 ---- *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
As of this morning (Feb 3, 2020) a CDK stack deploy that previously worked, started failing with a
Service: AmazonElasticLoadBalancingV2; Status Code: 400; Error Code: CertificateNotFound;
The AWS Certificate Manager console shows the certificate stuck in a
Pending Validation
state (withValidation Status: Success
). I'm guessing this is the root cause of the issue?I've tried to deploy several times over the last 3 hours with the same error.
Reproduction Steps
Deploy a CDK stack with the following:
Error Log
Environment
Other
This is 🐛 Bug Report
The text was updated successfully, but these errors were encountered: