معرفی شرکت ها


aws-cdk.aws-certificatemanager-1.99.0


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

The CDK Construct Library for AWS::CertificateManager
ویژگی مقدار
سیستم عامل OS Independent
نام فایل aws-cdk.aws-certificatemanager-1.99.0
نام aws-cdk.aws-certificatemanager
نسخه کتابخانه 1.99.0
نگهدارنده []
ایمیل نگهدارنده []
نویسنده Amazon Web Services
ایمیل نویسنده -
آدرس صفحه اصلی https://github.com/aws/aws-cdk
آدرس اینترنتی https://pypi.org/project/aws-cdk.aws-certificatemanager/
مجوز Apache-2.0
# AWS Certificate Manager Construct Library <!--BEGIN STABILITY BANNER-->--- ![cfn-resources: Stable](https://img.shields.io/badge/cfn--resources-stable-success.svg?style=for-the-badge) ![cdk-constructs: Stable](https://img.shields.io/badge/cdk--constructs-stable-success.svg?style=for-the-badge) --- <!--END STABILITY BANNER--> AWS Certificate Manager (ACM) handles the complexity of creating, storing, and renewing public and private SSL/TLS X.509 certificates and keys that protect your AWS websites and applications. ACM certificates can secure singular domain names, multiple specific domain names, wildcard domains, or combinations of these. ACM wildcard certificates can protect an unlimited number of subdomains. This package provides Constructs for provisioning and referencing ACM certificates which can be used with CloudFront and ELB. After requesting a certificate, you will need to prove that you own the domain in question before the certificate will be granted. The CloudFormation deployment will wait until this verification process has been completed. Because of this wait time, when using manual validation methods, it's better to provision your certificates either in a separate stack from your main service, or provision them manually and import them into your CDK application. **Note:** There is a limit on total number of ACM certificates that can be requested on an account and region within a year. The default limit is 2000, but this limit may be (much) lower on new AWS accounts. See https://docs.aws.amazon.com/acm/latest/userguide/acm-limits.html for more information. ## DNS validation DNS validation is the preferred method to validate domain ownership, as it has a number of advantages over email validation. See also [Validate with DNS](https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-validate-dns.html) in the AWS Certificate Manager User Guide. If Amazon Route 53 is your DNS provider for the requested domain, the DNS record can be created automatically: ```python my_hosted_zone = route53.HostedZone(self, "HostedZone", zone_name="example.com" ) acm.Certificate(self, "Certificate", domain_name="hello.example.com", validation=acm.CertificateValidation.from_dns(my_hosted_zone) ) ``` If Route 53 is not your DNS provider, the DNS records must be added manually and the stack will not complete creating until the records are added. ```python acm.Certificate(self, "Certificate", domain_name="hello.example.com", validation=acm.CertificateValidation.from_dns() ) ``` When working with multiple domains, use the `CertificateValidation.fromDnsMultiZone()`: ```python example_com = route53.HostedZone(self, "ExampleCom", zone_name="example.com" ) example_net = route53.HostedZone(self, "ExampleNet", zone_name="example.net" ) cert = acm.Certificate(self, "Certificate", domain_name="test.example.com", subject_alternative_names=["cool.example.com", "test.example.net"], validation=acm.CertificateValidation.from_dns_multi_zone({ "test.example.com": example_com, "cool.example.com": example_com, "test.example.net": example_net }) ) ``` ## Email validation Email-validated certificates (the default) are validated by receiving an email on one of a number of predefined domains and following the instructions in the email. See [Validate with Email](https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-validate-email.html) in the AWS Certificate Manager User Guide. ```python acm.Certificate(self, "Certificate", domain_name="hello.example.com", validation=acm.CertificateValidation.from_email() ) ``` ## Cross-region Certificates ACM certificates that are used with CloudFront -- or higher-level constructs which rely on CloudFront -- must be in the `us-east-1` region. The `DnsValidatedCertificate` construct exists to facilitate creating these certificates cross-region. This resource can only be used with Route53-based DNS validation. ```python # my_hosted_zone: route53.HostedZone acm.DnsValidatedCertificate(self, "CrossRegionCertificate", domain_name="hello.example.com", hosted_zone=my_hosted_zone, region="us-east-1" ) ``` ## Requesting private certificates AWS Certificate Manager can create [private certificates](https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-request-private.html) issued by [Private Certificate Authority (PCA)](https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaWelcome.html). Validation of private certificates is not necessary. ```python import aws_cdk.aws_acmpca as acmpca acm.PrivateCertificate(self, "PrivateCertificate", domain_name="test.example.com", subject_alternative_names=["cool.example.com", "test.example.net"], # optional certificate_authority=acmpca.CertificateAuthority.from_certificate_authority_arn(self, "CA", "arn:aws:acm-pca:us-east-1:123456789012:certificate-authority/023077d8-2bfa-4eb0-8f22-05c96deade77") ) ``` ## Importing If you want to import an existing certificate, you can do so from its ARN: ```python arn = "arn:aws:..." certificate = acm.Certificate.from_certificate_arn(self, "Certificate", arn) ``` ## Sharing between Stacks To share the certificate between stacks in the same CDK application, simply pass the `Certificate` object between the stacks. ## Metrics The `DaysToExpiry` metric is available via the `metricDaysToExpiry` method for all certificates. This metric is emitted by AWS Certificates Manager once per day until the certificate has effectively expired. An alarm can be created to determine whether a certificate is soon due for renewal ussing the following code: ```python import aws_cdk.aws_cloudwatch as cloudwatch # my_hosted_zone: route53.HostedZone certificate = acm.Certificate(self, "Certificate", domain_name="hello.example.com", validation=acm.CertificateValidation.from_dns(my_hosted_zone) ) certificate.metric_days_to_expiry().create_alarm(self, "Alarm", comparison_operator=cloudwatch.ComparisonOperator.LESS_THAN_THRESHOLD, evaluation_periods=1, threshold=45 ) ```


نیازمندی

مقدار نام
==1.179.0 aws-cdk.aws-acmpca
==1.179.0 aws-cdk.aws-cloudwatch
==1.179.0 aws-cdk.aws-iam
==1.179.0 aws-cdk.aws-lambda
==1.179.0 aws-cdk.aws-route53
==1.179.0 aws-cdk.core
<4.0.0,>=3.3.69 constructs
<2.0.0,>=1.70.0 jsii
>=0.0.3 publication
~=2.13.3 typeguard


زبان مورد نیاز

مقدار نام
~=3.7 Python


نحوه نصب


نصب پکیج whl aws-cdk.aws-certificatemanager-1.99.0:

    pip install aws-cdk.aws-certificatemanager-1.99.0.whl


نصب پکیج tar.gz aws-cdk.aws-certificatemanager-1.99.0:

    pip install aws-cdk.aws-certificatemanager-1.99.0.tar.gz