Skip to content

Commit

Permalink
revert: "fix(ses-actions): permissions too wide for S3 action" (aws#3…
Browse files Browse the repository at this point in the history
…0375)

### Issue # (if applicable)

Closes #[30143](aws#30143).

### Reason for this change

Fix the below deployment failure
Deployment fails with a Could not write to bucket error:

1:36:13 PM | CREATE_FAILED | AWS::SES::ReceiptRule | TestRuleSetStoreToBucketRule3E41D5CF
Could not write to bucket: reprosess3rulestack-testemailstoref58b593c-dxh45g1m3y6b (Service: AmazonSimpleEmailService; Status Code: 400; Error Code: InvalidS3Configuration; Request ID: 817f5520-748b-4bae-b347-ec68df52b675; Proxy: null)


This PR reverts the changes introduced in 
PR aws#29833


### Description of changes

This PR reverts the change that was made in CDK v2.139.0 to reduce overly broad permissions allocated to SES for the S3 receipt rule action. This resulted in deployment failure where SES is unable to write to s3 bucket.


### Description of how you validated changes

Dry-run for integration tests 

### Checklist
- [x] My code adheres to the [CONTRIBUTING GUIDE](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md) and [DESIGN GUIDELINES](https://github.com/aws/aws-cdk/blob/main/docs/DESIGN_GUIDELINES.md)

----

*By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
  • Loading branch information
shikha372 authored and atanaspam committed Jun 3, 2024
1 parent 049f1df commit 5a9abfb
Show file tree
Hide file tree
Showing 8 changed files with 35 additions and 145 deletions.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Original file line number Diff line number Diff line change
Expand Up @@ -86,35 +86,8 @@
"Action": "s3:PutObject",
"Condition": {
"StringEquals": {
"aws:SourceAccount": {
"aws:Referer": {
"Ref": "AWS::AccountId"
},
"aws:SourceArn": {
"Fn::Join": [
"",
[
"arn:",
{
"Ref": "AWS::Partition"
},
":ses:",
{
"Ref": "AWS::Region"
},
":",
{
"Ref": "AWS::AccountId"
},
":receipt-rule-set/",
{
"Ref": "RuleSetE30C6C48"
},
":receipt-rule/",
{
"Ref": "RuleSetFirstRule0A27C8CC"
}
]
]
}
}
},
Expand Down Expand Up @@ -313,6 +286,7 @@
}
},
"DependsOn": [
"BucketPolicyE9A3008A",
"FunctionAllowSes1829904A"
]
},
Expand Down

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

61 changes: 22 additions & 39 deletions packages/aws-cdk-lib/aws-ses-actions/lib/s3.ts
Original file line number Diff line number Diff line change
Expand Up @@ -42,12 +42,32 @@ export interface S3Props {
* a notification to Amazon SNS.
*/
export class S3 implements ses.IReceiptRuleAction {
private rule?: ses.IReceiptRule;

constructor(private readonly props: S3Props) {
}

public bind(rule: ses.IReceiptRule): ses.ReceiptRuleActionConfig {
this.rule = rule;
// Allow SES to write to S3 bucket
// See https://docs.aws.amazon.com/ses/latest/DeveloperGuide/receiving-email-permissions.html#receiving-email-permissions-s3
const keyPattern = this.props.objectKeyPrefix || '';
const s3Statement = new iam.PolicyStatement({
actions: ['s3:PutObject'],
principals: [new iam.ServicePrincipal('ses.amazonaws.com')],
resources: [this.props.bucket.arnForObjects(`${keyPattern}*`)],
conditions: {
StringEquals: {
'aws:Referer': cdk.Aws.ACCOUNT_ID,
},
},
});
this.props.bucket.addToResourcePolicy(s3Statement);

const policy = this.props.bucket.node.tryFindChild('Policy') as s3.BucketPolicy;
if (policy) { // The bucket could be imported
rule.node.addDependency(policy);
} else {
cdk.Annotations.of(rule).addWarningV2('@aws-cdk/s3:AddBucketPermissions', 'This rule is using a S3 action with an imported bucket. Ensure permission is given to SES to write to that bucket.');
}

// Allow SES to use KMS master key
// See https://docs.aws.amazon.com/ses/latest/DeveloperGuide/receiving-email-permissions.html#receiving-email-permissions-kms
Expand Down Expand Up @@ -79,41 +99,4 @@ export class S3 implements ses.IReceiptRuleAction {
},
};
}

/**
* Generate and apply the receipt rule action statement
*
* @param ruleSet The rule set the rule is being added to
* @internal
*/
public _applyPolicyStatement(receiptRuleSet: ses.IReceiptRuleSet): void {
if (!this.rule) {
throw new Error('Cannot apply policy statement before binding the action to a receipt rule');
}

// Allow SES to write to S3 bucket
// See https://docs.aws.amazon.com/ses/latest/DeveloperGuide/receiving-email-permissions.html#receiving-email-permissions-s3
const keyPattern = this.props.objectKeyPrefix || '';
const s3Statement = new iam.PolicyStatement({
actions: ['s3:PutObject'],
principals: [new iam.ServicePrincipal('ses.amazonaws.com')],
resources: [this.props.bucket.arnForObjects(`${keyPattern}*`)],
conditions: {
StringEquals: {
'aws:SourceAccount': cdk.Aws.ACCOUNT_ID,
'aws:SourceArn': cdk.Arn.format({
partition: cdk.Aws.PARTITION,
service: 'ses',
region: cdk.Aws.REGION,
account: cdk.Aws.ACCOUNT_ID,
resource: [
`receipt-rule-set/${receiptRuleSet.receiptRuleSetName}`,
`receipt-rule/${this.rule.receiptRuleName}`,
].join(':'),
}),
},
},
});
this.props.bucket.addToResourcePolicy(s3Statement);
}
}
19 changes: 1 addition & 18 deletions packages/aws-cdk-lib/aws-ses-actions/test/actions.test.ts
Original file line number Diff line number Diff line change
Expand Up @@ -190,26 +190,9 @@ test('add s3 action', () => {
Action: 's3:PutObject',
Condition: {
StringEquals: {
'aws:SourceAccount': {
'aws:Referer': {
Ref: 'AWS::AccountId',
},
'aws:SourceArn': {
'Fn::Join': [
'',
[
'arn:',
{ Ref: 'AWS::Partition' },
':ses:',
{ Ref: 'AWS::Region' },
':',
{ Ref: 'AWS::AccountId' },
':receipt-rule-set/',
{ Ref: 'RuleSetE30C6C48' },
':receipt-rule/',
{ Ref: 'RuleSetRule0B1D6BCA' },
],
],
},
},
},
Effect: 'Allow',
Expand Down
8 changes: 0 additions & 8 deletions packages/aws-cdk-lib/aws-ses/lib/receipt-rule-action.ts
Original file line number Diff line number Diff line change
@@ -1,5 +1,4 @@
import { IReceiptRule } from './receipt-rule';
import { IReceiptRuleSet } from './receipt-rule-set';

/**
* An abstract action for a receipt rule.
Expand All @@ -10,13 +9,6 @@ export interface IReceiptRuleAction {
*/
bind(receiptRule: IReceiptRule): ReceiptRuleActionConfig;

/**
* Generate and apply the receipt rule action statement
*
* @param ruleSet The rule set the rule is being added to
* @internal
*/
_applyPolicyStatement?(ruleSet: IReceiptRuleSet): void;
}

/**
Expand Down
17 changes: 4 additions & 13 deletions packages/aws-cdk-lib/aws-ses/lib/receipt-rule.ts
Original file line number Diff line number Diff line change
Expand Up @@ -112,10 +112,7 @@ export class ReceiptRule extends Resource implements IReceiptRule {
}

public readonly receiptRuleName: string;

private readonly ruleSet: IReceiptRuleSet;
private readonly actions: IReceiptRuleAction[] = [];
private readonly actionProperties: CfnReceiptRule.ActionProperty[] = [];
private readonly actions = new Array<CfnReceiptRule.ActionProperty>();

constructor(scope: Construct, id: string, props: ReceiptRuleProps) {
super(scope, id, {
Expand All @@ -136,7 +133,6 @@ export class ReceiptRule extends Resource implements IReceiptRule {
});

this.receiptRuleName = resource.ref;
this.ruleSet = props.ruleSet;

for (const action of props.actions || []) {
this.addAction(action);
Expand All @@ -147,20 +143,15 @@ export class ReceiptRule extends Resource implements IReceiptRule {
* Adds an action to this receipt rule.
*/
public addAction(action: IReceiptRuleAction) {
this.actions.push(action);
this.actionProperties.push(action.bind(this));
this.actions.push(action.bind(this));
}

private renderActions() {
if (this.actionProperties.length === 0) {
if (this.actions.length === 0) {
return undefined;
}

for (const action of this.actions) {
action._applyPolicyStatement?.(this.ruleSet);
}

return this.actionProperties;
return this.actions;
}
}

Expand Down

0 comments on commit 5a9abfb

Please sign in to comment.