fix(secretsmanager): hosted rotation with fromSecretNameV2() does not create correct iam policy#28379
Conversation
… with imported secret as master secret
…cret-hosted-schedule-from-method
aws-cdk-automation
left a comment
There was a problem hiding this comment.
The pull request linter has failed. See the aws-cdk-automation comment below for failure reasons. If you believe this pull request should receive an exemption, please comment and provide a justification.
A comment requesting an exemption should contain the text Exemption Request. Additionally, if clarification is needed add Clarification Request to a comment.
✅ Updated pull request passes all PRLinter validations. Dismissing previous PRLinter review.
| if (this.masterSecret?.secretFullArn) { | ||
| masterSecretArn = this.masterSecret.secretArn; | ||
| } else if (this.masterSecret) { // ISecret as an imported secret with partial ARN | ||
| masterSecretArn = this.masterSecret.secretArn + '-??????'; | ||
| } |
There was a problem hiding this comment.
if (this.masterSecret?.secretFullArn)- If we call a secret construct for
this.masterSecretin the stack, here is true. - Otherwise
this.masterSecretis generated fromfromSecretArn(),fromSecretCompleteArn()methods, etc. They also have a full ARN, so here is also true.- This
ifstatement will be true even if the arg (so it is the arn) for the methods is a token or not.
- This
- If we call a secret construct for
else if (this.masterSecret)- The secret is
ISecretas an imported secret with partial ARN. It is generated fromfromSecretNameV2(). - The
secretArnin this block will be a token. But processing this string is not a problem because the CloudFormation template can useFn::Jointo combine them properly. (see the unit tests.)
- The secret is
AWS CodeBuild CI Report
Powered by github-codebuild-logs, available on the AWS Serverless Application Repository |
|
Thank you for contributing! Your pull request will be updated from main and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork). |
… create correct iam policy (aws#28379) In the case for a hosted rotation with a master secret by `fromSecretNameV2()`, IAM policy for lambda is not correct. The secret by the method has a partial ARN, so a generated IAM policy should use an ARN with `'-??????'`, but it will not use the ARN. Closes aws#28308. ---- *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
In the case for a hosted rotation with a master secret by
fromSecretNameV2(), IAM policy for lambda is not correct.The secret by the method has a partial ARN, so a generated IAM policy should use an ARN with
'-??????', but it will not use the ARN.Closes #28308.
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license