Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(dynamodb): replication regions are incompatible with resource policies in TableV2 #31097

Closed
wants to merge 9 commits into from
Closed
5 changes: 3 additions & 2 deletions packages/aws-cdk-lib/aws-dynamodb/lib/table-v2.ts
Original file line number Diff line number Diff line change
Expand Up @@ -664,8 +664,9 @@ export class TableV2 extends TableBaseV2 {
private configureReplicaTable(props: ReplicaTableProps): CfnGlobalTable.ReplicaSpecificationProperty {
const pointInTimeRecovery = props.pointInTimeRecovery ?? this.tableOptions.pointInTimeRecovery;
const contributorInsights = props.contributorInsights ?? this.tableOptions.contributorInsights;
const resourcePolicy = props.resourcePolicy ?? this.tableOptions.resourcePolicy;

//const resourcePolicy = props.resourcePolicy ?? this.tableOptions.resourcePolicy;
//const resourcePolicy = props.resourcePolicy;
LeeroyHannigan marked this conversation as resolved.
Show resolved Hide resolved
const resourcePolicy = (props.region === this.region ? this.tableOptions.resourcePolicy : props.resourcePolicy) || undefined;
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is a breaking change for existing users. If existing users manage to bypass the CFN error by using escape hatch. They then remove the escape hatch and upgrade to a version that includes this change, their replication region will now have the resource policies removed, thus this is not an acceptable change. I would recommend you to do it following the suggested proposal in the original issue.

Ideally, the construct could allow null and when null is specified in a specific replica, no resourcePolicy is added to that replica even when one is defined in the TableV2 itself

new TableV2(this, `MyTable-${stage}`, {
      pointInTimeRecovery: true,
      partitionKey: {
        name: 'key',
        type: AttributeType.STRING,
      },
      tableName: 'MyTable',
      // us-east-2 should not have tablePolicyDocument added in the template
      replicas: [{ region: 'us-east-1' }, { region: 'us-east-2', resourcePolicy: null }], 
      resourcePolicy: tablePolicyDocument,
    });

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is forcing a user to add null for when they don't want a resource policy. The default implementation should only require them to add a policy to a replica should the want it. It shouldn't default to adding it to all replicas.

return {
region: props.region,
globalSecondaryIndexes: this.configureReplicaGlobalSecondaryIndexes(props.globalSecondaryIndexOptions),
Expand Down
178 changes: 178 additions & 0 deletions packages/aws-cdk-lib/aws-dynamodb/test/table-v2.test.ts
Original file line number Diff line number Diff line change
Expand Up @@ -3007,4 +3007,182 @@ test('Resource policy test', () => {
},
],
});
});

test('Add resource policy to local table only', () => {
// GIVEN
const stack = new Stack(undefined, 'Stack', { env: { region: 'eu-west-1' } });

const doc = new PolicyDocument({
statements: [
new PolicyStatement({
actions: ['dynamodb:GetItem'],
principals: [new ArnPrincipal('arn:aws:iam::111122223333:user/foobar')],
resources: ['*'],
}),
],
});

// WHEN
const table = new TableV2(stack, 'Table', {
partitionKey: { name: 'metric', type: AttributeType.STRING },
resourcePolicy: doc,
replicas: [{
region: 'eu-west-2',
}],
});

// THEN
Template.fromStack(stack).hasResourceProperties('AWS::DynamoDB::GlobalTable', {
Replicas: [
{
Region: 'eu-west-2',
},
{
Region: 'eu-west-1',
ResourcePolicy: {
PolicyDocument: {
Statement: [
{
Action: 'dynamodb:GetItem',
Effect: 'Allow',
Principal: {
AWS: 'arn:aws:iam::111122223333:user/foobar',
},
Resource: '*',
},
],
Version: '2012-10-17',
},
},
},
],
});
});

test('Add resource policy to replica table only', () => {
// GIVEN
const stack = new Stack(undefined, 'Stack', { env: { region: 'eu-west-1' } });

const doc = new PolicyDocument({
statements: [
new PolicyStatement({
actions: ['dynamodb:GetItem'],
principals: [new ArnPrincipal('arn:aws:iam::111122223333:user/foobar')],
resources: ['*'],
}),
],
});

// WHEN
const table = new TableV2(stack, 'Table', {
partitionKey: { name: 'metric', type: AttributeType.STRING },
replicas: [{
region: 'eu-west-2',
resourcePolicy: doc,
}],
});

// THEN
Template.fromStack(stack).hasResourceProperties('AWS::DynamoDB::GlobalTable', {
Replicas: [
{
Region: 'eu-west-2',
ResourcePolicy: {
PolicyDocument: {
Statement: [
{
Action: 'dynamodb:GetItem',
Effect: 'Allow',
Principal: {
AWS: 'arn:aws:iam::111122223333:user/foobar',
},
Resource: '*',
},
],
Version: '2012-10-17',
},
},
},
{
Region: 'eu-west-1',
},
],
});
});

test('Add two different resource policies to replicas', () => {
// GIVEN
const stack = new Stack(undefined, 'Stack', { env: { region: 'eu-west-1' } });

const doc1 = new PolicyDocument({
statements: [
new PolicyStatement({
actions: ['dynamodb:GetItem'],
principals: [new ArnPrincipal('arn:aws:iam::111122223333:user/foobar')],
resources: ['*'],
}),
],
});
const doc2 = new PolicyDocument({
statements: [
new PolicyStatement({
actions: ['dynamodb:DeleteItem'],
principals: [new ArnPrincipal('arn:aws:iam::111122223333:user/barfoo')],
resources: ['*'],
}),
],
});

// WHEN
const table = new TableV2(stack, 'Table', {
partitionKey: { name: 'metric', type: AttributeType.STRING },
resourcePolicy: doc1,
replicas: [{
region: 'eu-west-2',
resourcePolicy: doc2,
}],
});

// THEN
Template.fromStack(stack).hasResourceProperties('AWS::DynamoDB::GlobalTable', {
Replicas: [
{
Region: 'eu-west-2',
ResourcePolicy: {
PolicyDocument: {
Statement: [
{
Action: 'dynamodb:DeleteItem',
Effect: 'Allow',
Principal: {
AWS: 'arn:aws:iam::111122223333:user/barfoo',
},
Resource: '*',
},
],
Version: '2012-10-17',
},
},
},
{
Region: 'eu-west-1',
ResourcePolicy: {
PolicyDocument: {
Statement: [
{
Action: 'dynamodb:GetItem',
Effect: 'Allow',
Principal: {
AWS: 'arn:aws:iam::111122223333:user/foobar',
},
Resource: '*',
},
],
Version: '2012-10-17',
},
}
},
],
});
});
Loading