-
Notifications
You must be signed in to change notification settings - Fork 4.3k
fix(route53): add vpce:AllowMultiRegion permission to VpcEndpointServiceDomainName #36221
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
fix(route53): add vpce:AllowMultiRegion permission to VpcEndpointServiceDomainName #36221
Conversation
aws-cdk-automation
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The pull request linter fails with the following errors:
❌ Fixes must contain a change to an integration test file and the resulting snapshot.
If you believe this pull request should receive an exemption, please comment and provide a justification. A comment requesting an exemption should contain the text Exemption Request. Additionally, if clarification is needed, add Clarification Request to a comment.
c64db56 to
892f005
Compare
…iceDomainName When using VpcEndpointServiceDomainName with a VpcEndpointService that has cross-region PrivateLink enabled via allowedRegions, the custom resource Lambda fails because the IAM policy is missing the vpce:AllowMultiRegion permission. This change updates the EnableDns custom resource to use an explicit policy with both ec2:ModifyVpcEndpointServiceConfiguration and vpce:AllowMultiRegion permissions, scoped to the specific VPC endpoint service resource. Fixes aws#36216
892f005 to
ed4df80
Compare
|
For some reason, it's blocked by this. I am hitting the update branch button and see if it unblocks itself.
|
|
OK looks like the linter expects this PR to have change on |
Fixes #36216
When using
VpcEndpointServiceDomainNamewith aVpcEndpointServicethat has cross-region PrivateLink enabled viaallowedRegions, the custom resource Lambda fails with:This PR adds the
vpce:AllowMultiRegionpermission to the custom resource policy. The permission is always included since:Changes
packages/aws-cdk-lib/aws-route53/lib/vpc-endpoint-service-domain-name.ts:aws-iamimportAwsCustomResourcePolicy.fromSdkCalls()toAwsCustomResourcePolicy.fromStatements()for theEnableDnscustom resourceec2:ModifyVpcEndpointServiceConfigurationandvpce:AllowMultiRegionactions to the policypackages/aws-cdk-lib/aws-route53/test/vpc-endpoint-service-domain-name.test.tsTesting
All 264 tests pass.
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license