Skip to content

fix: use us-east-1 STS endpoint for Route53 ACME DNS validation (#5531)#6001

Open
yaswanthkumar1995 wants to merge 2 commits intoInfisical:mainfrom
yaswanthkumar1995:fix/route53-sts-region-5531
Open

fix: use us-east-1 STS endpoint for Route53 ACME DNS validation (#5531)#6001
yaswanthkumar1995 wants to merge 2 commits intoInfisical:mainfrom
yaswanthkumar1995:fix/route53-sts-region-5531

Conversation

@yaswanthkumar1995
Copy link
Copy Markdown

Closes #5531

Context

Route53 ACME certificate requests (via Let's Encrypt) fail with:

STS is not activated in this region for account:xxx

This happens because route54.ts hardcodes AWSRegion.US_WEST_1 for the STS AssumeRole call. If the user's AWS account doesn't have STS activated in us-west-1 (common for EU-hosted accounts), the call fails even though Route53 is a global service and works from any region.

The getAwsConnectionConfig() function already defaults to US_EAST_1 (always active for all AWS accounts), but the Route53 DNS provider was overriding it with US_WEST_1.

Changes

  • route54.tsroute53.ts: Fixed the filename typo (Route53, not Route54)
  • AWSRegion.US_WEST_1AWSRegion.US_EAST_1: Updated both route53InsertTxtRecord() and route53DeleteTxtRecord() to use the global STS endpoint
  • Updated import in acme-certificate-authority-fns.ts to reference the renamed file

Steps to verify the change

  1. Set up an AWS connection with AssumeRole method
  2. Configure ACME certificate with Route53 DNS validation
  3. Request/renew a certificate — should succeed without requiring STS activation in us-west-1

Type

  • Fix

Checklist

…sical#5531)

Route53 ACME certificate requests fail with 'STS is not activated in
this region' when the user's AWS account doesn't have STS enabled in
us-west-1. Since Route53 is a global service, the region used for STS
AssumeRole is irrelevant to Route53 API functionality.

Changed the hardcoded AWSRegion.US_WEST_1 to AWSRegion.US_EAST_1 in
both route53InsertTxtRecord() and route53DeleteTxtRecord(). The
us-east-1 STS endpoint is always active for all AWS accounts by
default, so this eliminates the regional activation requirement.

Also renamed route54.ts to route53.ts to fix the filename typo.
Copy link
Copy Markdown

@claude claude bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Claude Code Review

This pull request is from a fork — automated review is disabled. A repository maintainer can comment @claude review to run a one-time review.

@maidul98
Copy link
Copy Markdown
Collaborator

maidul98 commented Apr 10, 2026

Snyk checks have passed. No issues have been found so far.

Status Scan Engine Critical High Medium Low Total (0)
Open Source Security 0 0 0 0 0 issues

💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

AWS STS

2 participants