Since an IAM account can only support up to 20 server certificates by default, it may be useful to have an automated way to deleted expired certificates. However, a server certificate can only be deleted if it's not associated with an AWS asset (ELB and CloudFront distribution).
Also, the question is how to identify certificates that haven't been managed/deployed by LetsLambda?
And last, there should be an alert/notification mechanism to inform the status of each operation (related to #12)
Since an IAM account can only support up to 20 server certificates by default, it may be useful to have an automated way to deleted expired certificates. However, a server certificate can only be deleted if it's not associated with an AWS asset (ELB and CloudFront distribution). Also, the question is how to identify certificates that haven't been managed/deployed by LetsLambda? And last, there should be an alert/notification mechanism to inform the status of each operation (related to #12)