Package software.amazon.awscdk.services.route53


package software.amazon.awscdk.services.route53

Amazon Route53 Construct Library

To add a public hosted zone:

 PublicHostedZone.Builder.create(this, "HostedZone")
         .zoneName("fully.qualified.domain.com")
         .build();
 

To add a private hosted zone, use PrivateHostedZone. Note that enableDnsHostnames and enableDnsSupport must have been enabled for the VPC you're configuring for private hosted zones.

 Vpc vpc;
 
 
 PrivateHostedZone zone = PrivateHostedZone.Builder.create(this, "HostedZone")
         .zoneName("fully.qualified.domain.com")
         .vpc(vpc)
         .build();
 

Additional VPCs can be added with zone.addVpc().

Adding Records

To add a TXT record to your zone:

 HostedZone myZone;
 
 
 TxtRecord.Builder.create(this, "TXTRecord")
         .zone(myZone)
         .recordName("_foo") // If the name ends with a ".", it will be used as-is;
         // if it ends with a "." followed by the zone name, a trailing "." will be added automatically;
         // otherwise, a ".", the zone name, and a trailing "." will be added automatically.
         // Defaults to zone root if not specified.
         .values(List.of("Bar!", "Baz?"))
         .ttl(Duration.minutes(90))
         .build();
 

To add a NS record to your zone:

 HostedZone myZone;
 
 
 NsRecord.Builder.create(this, "NSRecord")
         .zone(myZone)
         .recordName("foo")
         .values(List.of("ns-1.awsdns.co.uk.", "ns-2.awsdns.com."))
         .ttl(Duration.minutes(90))
         .build();
 

To add a DS record to your zone:

 HostedZone myZone;
 
 
 DsRecord.Builder.create(this, "DSRecord")
         .zone(myZone)
         .recordName("foo")
         .values(List.of("12345 3 1 123456789abcdef67890123456789abcdef67890"))
         .ttl(Duration.minutes(90))
         .build();
 

To add an A record to your zone:

 HostedZone myZone;
 
 
 ARecord.Builder.create(this, "ARecord")
         .zone(myZone)
         .target(RecordTarget.fromIpAddresses("1.2.3.4", "5.6.7.8"))
         .build();
 

To add an A record for an EC2 instance with an Elastic IP (EIP) to your zone:

 Instance instance;
 
 HostedZone myZone;
 
 
 CfnEIP elasticIp = CfnEIP.Builder.create(this, "EIP")
         .domain("vpc")
         .instanceId(instance.getInstanceId())
         .build();
 ARecord.Builder.create(this, "ARecord")
         .zone(myZone)
         .target(RecordTarget.fromIpAddresses(elasticIp.getRef()))
         .build();
 

To add an AAAA record pointing to a CloudFront distribution:

 import software.amazon.awscdk.services.cloudfront.*;
 
 HostedZone myZone;
 CloudFrontWebDistribution distribution;
 
 AaaaRecord.Builder.create(this, "Alias")
         .zone(myZone)
         .target(RecordTarget.fromAlias(new CloudFrontTarget(distribution)))
         .build();
 

Geolocation routing can be enabled for continent, country or subdivision:

 HostedZone myZone;
 
 
 // continent
 // continent
 ARecord.Builder.create(this, "ARecordGeoLocationContinent")
         .zone(myZone)
         .target(RecordTarget.fromIpAddresses("1.2.3.0", "5.6.7.0"))
         .geoLocation(GeoLocation.continent(Continent.EUROPE))
         .build();
 
 // country
 // country
 ARecord.Builder.create(this, "ARecordGeoLocationCountry")
         .zone(myZone)
         .target(RecordTarget.fromIpAddresses("1.2.3.1", "5.6.7.1"))
         .geoLocation(GeoLocation.country("DE"))
         .build();
 
 // subdivision
 // subdivision
 ARecord.Builder.create(this, "ARecordGeoLocationSubDividion")
         .zone(myZone)
         .target(RecordTarget.fromIpAddresses("1.2.3.2", "5.6.7.2"))
         .geoLocation(GeoLocation.subdivision("WA"))
         .build();
 
 // default (wildcard record if no specific record is found)
 // default (wildcard record if no specific record is found)
 ARecord.Builder.create(this, "ARecordGeoLocationDefault")
         .zone(myZone)
         .target(RecordTarget.fromIpAddresses("1.2.3.3", "5.6.7.3"))
         .geoLocation(GeoLocation.default())
         .build();
 

To enable weighted routing, use the weight parameter:

 HostedZone myZone;
 
 
 ARecord.Builder.create(this, "ARecordWeighted1")
         .zone(myZone)
         .target(RecordTarget.fromIpAddresses("1.2.3.4"))
         .weight(10)
         .build();
 

To enable latency based routing, use the region parameter:

 HostedZone myZone;
 
 
 ARecord.Builder.create(this, "ARecordLatency1")
         .zone(myZone)
         .target(RecordTarget.fromIpAddresses("1.2.3.4"))
         .region("us-east-1")
         .build();
 

To enable multivalue answer routing, use the multivalueAnswer parameter:

 HostedZone myZone;
 
 
 ARecord.Builder.create(this, "ARecordMultiValue1")
         .zone(myZone)
         .target(RecordTarget.fromIpAddresses("1.2.3.4"))
         .multiValueAnswer(true)
         .build();
 

To specify a unique identifier to differentiate among multiple resource record sets that have the same combination of name and type, use the setIdentifier parameter:

 HostedZone myZone;
 
 
 ARecord.Builder.create(this, "ARecordWeighted1")
         .zone(myZone)
         .target(RecordTarget.fromIpAddresses("1.2.3.4"))
         .weight(10)
         .setIdentifier("weighted-record-id")
         .build();
 

Warning It is not possible to specify setIdentifier for a simple routing policy.

Constructs are available for A, AAAA, CAA, CNAME, MX, NS, SRV and TXT records.

Use the CaaAmazonRecord construct to easily restrict certificate authorities allowed to issue certificates for a domain to Amazon only.

Replacing existing record sets (dangerous!)

Use the deleteExisting prop to delete an existing record set before deploying the new one. This is useful if you want to minimize downtime and avoid "manual" actions while deploying a stack with a record set that already exists. This is typically the case for record sets that are not already "owned" by CloudFormation or "owned" by another stack or construct that is going to be deleted (migration).

N.B.: this feature is dangerous, use with caution! It can only be used safely when deleteExisting is set to true as soon as the resource is added to the stack. Changing an existing Record Set's deleteExisting property from false -> true after deployment will delete the record!

 HostedZone myZone;
 
 
 ARecord.Builder.create(this, "ARecord")
         .zone(myZone)
         .target(RecordTarget.fromIpAddresses("1.2.3.4", "5.6.7.8"))
         .deleteExisting(true)
         .build();
 

Cross Account Zone Delegation

If you want to have your root domain hosted zone in one account and your subdomain hosted zone in a different one, you can use CrossAccountZoneDelegationRecord to set up delegation between them.

In the account containing the parent hosted zone:

 PublicHostedZone parentZone = PublicHostedZone.Builder.create(this, "HostedZone")
         .zoneName("someexample.com")
         .build();
 Role crossAccountRole = Role.Builder.create(this, "CrossAccountRole")
         // The role name must be predictable
         .roleName("MyDelegationRole")
         // The other account
         .assumedBy(new AccountPrincipal("12345678901"))
         // You can scope down this role policy to be least privileged.
         // If you want the other account to be able to manage specific records,
         // you can scope down by resource and/or normalized record names
         .inlinePolicies(Map.of(
                 "crossAccountPolicy", PolicyDocument.Builder.create()
                         .statements(List.of(
                             PolicyStatement.Builder.create()
                                     .sid("ListHostedZonesByName")
                                     .effect(Effect.ALLOW)
                                     .actions(List.of("route53:ListHostedZonesByName"))
                                     .resources(List.of("*"))
                                     .build(),
                             PolicyStatement.Builder.create()
                                     .sid("GetHostedZoneAndChangeResourceRecordSets")
                                     .effect(Effect.ALLOW)
                                     .actions(List.of("route53:GetHostedZone", "route53:ChangeResourceRecordSets"))
                                     // This example assumes the RecordSet subdomain.somexample.com
                                     // is contained in the HostedZone
                                     .resources(List.of("arn:aws:route53:::hostedzone/HZID00000000000000000"))
                                     .conditions(Map.of(
                                             "ForAllValues:StringLike", Map.of(
                                                     "route53:ChangeResourceRecordSetsNormalizedRecordNames", List.of("subdomain.someexample.com"))))
                                     .build()))
                         .build()))
         .build();
 parentZone.grantDelegation(crossAccountRole);
 

In the account containing the child zone to be delegated:

 PublicHostedZone subZone = PublicHostedZone.Builder.create(this, "SubZone")
         .zoneName("sub.someexample.com")
         .build();
 
 // import the delegation role by constructing the roleArn
 String delegationRoleArn = Stack.of(this).formatArn(ArnComponents.builder()
         .region("") // IAM is global in each partition
         .service("iam")
         .account("parent-account-id")
         .resource("role")
         .resourceName("MyDelegationRole")
         .build());
 IRole delegationRole = Role.fromRoleArn(this, "DelegationRole", delegationRoleArn);
 
 // create the record
 // create the record
 CrossAccountZoneDelegationRecord.Builder.create(this, "delegate")
         .delegatedZone(subZone)
         .parentHostedZoneName("someexample.com") // or you can use parentHostedZoneId
         .delegationRole(delegationRole)
         .build();
 

Delegating the hosted zone requires assuming a role in the parent hosted zone's account. In order for the assumed credentials to be valid, the resource must assume the role using an STS endpoint in a region where both the subdomain's account and the parent's account are opted-in. By default, this region is determined automatically, but if you need to change the region used for the AssumeRole call, specify assumeRoleRegion:

 PublicHostedZone subZone = PublicHostedZone.Builder.create(this, "SubZone")
         .zoneName("sub.someexample.com")
         .build();
 
 // import the delegation role by constructing the roleArn
 String delegationRoleArn = Stack.of(this).formatArn(ArnComponents.builder()
         .region("") // IAM is global in each partition
         .service("iam")
         .account("parent-account-id")
         .resource("role")
         .resourceName("MyDelegationRole")
         .build());
 IRole delegationRole = Role.fromRoleArn(this, "DelegationRole", delegationRoleArn);
 
 CrossAccountZoneDelegationRecord.Builder.create(this, "delegate")
         .delegatedZone(subZone)
         .parentHostedZoneName("someexample.com") // or you can use parentHostedZoneId
         .delegationRole(delegationRole)
         .assumeRoleRegion("us-east-1")
         .build();
 

Add Trailing Dot to Domain Names

In order to continue managing existing domain names with trailing dots using CDK, you can set addTrailingDot: false to prevent the Construct from adding a dot at the end of the domain name.

 PublicHostedZone.Builder.create(this, "HostedZone")
         .zoneName("fully.qualified.domain.com.")
         .addTrailingDot(false)
         .build();
 

Enabling DNSSEC

DNSSEC can be enabled for Hosted Zones. For detailed information, see Configuring DNSSEC signing in Amazon Route 53.

Enabling DNSSEC requires an asymmetric KMS Customer-Managed Key using the ECC_NIST_P256 key spec. Additionally, that KMS key must be in us-east-1.

 Key kmsKey = Key.Builder.create(this, "KmsCMK")
         .keySpec(KeySpec.ECC_NIST_P256)
         .keyUsage(KeyUsage.SIGN_VERIFY)
         .build();
 HostedZone hostedZone = HostedZone.Builder.create(this, "HostedZone")
         .zoneName("example.com")
         .build();
 // Enable DNSSEC signing for the zone
 hostedZone.enableDnssec(ZoneSigningOptions.builder().kmsKey(kmsKey).build());
 

The necessary permissions for Route 53 to use the key will automatically be added when using this configuration. If it is necessary to create a key signing key manually, that can be done using the KeySigningKey construct:

 HostedZone hostedZone;
 Key kmsKey;
 
 KeySigningKey.Builder.create(this, "KeySigningKey")
         .hostedZone(hostedZone)
         .kmsKey(kmsKey)
         .keySigningKeyName("ksk")
         .status(KeySigningKeyStatus.ACTIVE)
         .build();
 

When directly constructing the KeySigningKey resource, enabling DNSSEC signing for the hosted zone will be need to be done explicitly (either using the CfnDNSSEC construct or via another means).

Imports

If you don't know the ID of the Hosted Zone to import, you can use the HostedZone.fromLookup:

 HostedZone.fromLookup(this, "MyZone", HostedZoneProviderProps.builder()
         .domainName("example.com")
         .build());
 

HostedZone.fromLookup requires an environment to be configured. Check out the documentation for more documentation and examples. CDK automatically looks into your ~/.aws/config file for the [default] profile. If you want to specify a different account run cdk deploy --profile [profile].

 new MyDevStack(app, 'dev', {
   env: {
     account: process.env.CDK_DEFAULT_ACCOUNT,
     region: process.env.CDK_DEFAULT_REGION,
   },
 });
 

If you know the ID and Name of a Hosted Zone, you can import it directly:

 IHostedZone zone = HostedZone.fromHostedZoneAttributes(this, "MyZone", HostedZoneAttributes.builder()
         .zoneName("example.com")
         .hostedZoneId("ZOJJZC49E0EPZ")
         .build());
 

Alternatively, use the HostedZone.fromHostedZoneId to import hosted zones if you know the ID and the retrieval for the zoneName is undesirable.

 IHostedZone zone = HostedZone.fromHostedZoneId(this, "MyZone", "ZOJJZC49E0EPZ");
 

You can import a Public Hosted Zone as well with the similar PublicHostedZone.fromPublicHostedZoneId and PublicHostedZone.fromPublicHostedZoneAttributes methods:

 IPublicHostedZone zoneFromAttributes = PublicHostedZone.fromPublicHostedZoneAttributes(this, "MyZone", PublicHostedZoneAttributes.builder()
         .zoneName("example.com")
         .hostedZoneId("ZOJJZC49E0EPZ")
         .build());
 
 // Does not know zoneName
 IPublicHostedZone zoneFromId = PublicHostedZone.fromPublicHostedZoneId(this, "MyZone", "ZOJJZC49E0EPZ");
 

You can use CrossAccountZoneDelegationRecord on imported Hosted Zones with the grantDelegation method:

 Role crossAccountRole = Role.Builder.create(this, "CrossAccountRole")
         // The role name must be predictable
         .roleName("MyDelegationRole")
         // The other account
         .assumedBy(new AccountPrincipal("12345678901"))
         .build();
 
 IHostedZone zoneFromId = HostedZone.fromHostedZoneId(this, "MyZone", "zone-id");
 zoneFromId.grantDelegation(crossAccountRole);
 
 IPublicHostedZone publicZoneFromId = PublicHostedZone.fromPublicHostedZoneId(this, "MyPublicZone", "public-zone-id");
 publicZoneFromId.grantDelegation(crossAccountRole);
 
 IPrivateHostedZone privateZoneFromId = PrivateHostedZone.fromPrivateHostedZoneId(this, "MyPrivateZone", "private-zone-id");
 privateZoneFromId.grantDelegation(crossAccountRole);
 

VPC Endpoint Service Private DNS

When you create a VPC endpoint service, AWS generates endpoint-specific DNS hostnames that consumers use to communicate with the service. For example, vpce-1234-abcdev-us-east-1.vpce-svc-123345.us-east-1.vpce.amazonaws.com. By default, your consumers access the service with that DNS name. This can cause problems with HTTPS traffic because the DNS will not match the backend certificate:

 curl: (60) SSL: no alternative certificate subject name matches target host name 'vpce-abcdefghijklmnopq-rstuvwx.vpce-svc-abcdefghijklmnopq.us-east-1.vpce.amazonaws.com'
 

Effectively, the endpoint appears untrustworthy. To mitigate this, clients have to create an alias for this DNS name in Route53.

Private DNS for an endpoint service lets you configure a private DNS name so consumers can access the service using an existing DNS name without creating this Route53 DNS alias This DNS name can also be guaranteed to match up with the backend certificate.

Before consumers can use the private DNS name, you must verify that you have control of the domain/subdomain.

Assuming your account has ownership of the particular domain/subdomain, this construct sets up the private DNS configuration on the endpoint service, creates all the necessary Route53 entries, and verifies domain ownership.

 import software.amazon.awscdk.services.elasticloadbalancingv2.NetworkLoadBalancer;
 
 
 Vpc vpc = new Vpc(this, "VPC");
 NetworkLoadBalancer nlb = NetworkLoadBalancer.Builder.create(this, "NLB")
         .vpc(vpc)
         .build();
 VpcEndpointService vpces = VpcEndpointService.Builder.create(this, "VPCES")
         .vpcEndpointServiceLoadBalancers(List.of(nlb))
         .build();
 // You must use a public hosted zone so domain ownership can be verified
 PublicHostedZone zone = PublicHostedZone.Builder.create(this, "PHZ")
         .zoneName("aws-cdk.dev")
         .build();
 VpcEndpointServiceDomainName.Builder.create(this, "EndpointDomain")
         .endpointService(vpces)
         .domainName("my-stuff.aws-cdk.dev")
         .publicHostedZone(zone)
         .build();