fix(aws): add InvokeFunction permission for public Function URLs#6358
fix(aws): add InvokeFunction permission for public Function URLs#6358bruno-espino wants to merge 1 commit intoanomalyco:devfrom
Conversation
|
Tested this PR and verified it works |
| // deployments). This can be removed after migrating to @pulumi/aws v7 | ||
| // (where Lambda/provider behavior matches the current AWS console policy). |
There was a problem hiding this comment.
I might not have tested this correctly but I don't think upgrading to @pulumi/aws v7 fixes this automatically. I tested by cloning #6259 and upgrading from v7.12.0 → v7.16.0 (which includes terraform-provider-aws v6.28.0 where hashicorp/terraform-provider-aws#44829 was resolved), but the issue persisted without these changes.
There was a problem hiding this comment.
Interesting, the fix for v7 was an assumption from my side, I didn't test it.
|
let's wait on merging #6259 first to see if the warning disappears |
|
thanks for your contribution @bruno-espino closed in favor of #6400 which contains the fix for
i've changed my mind on this since i don't want new users to wait on the v7 to get merged for this common use-case to work |
Fixes #6198
What this PR changes
sst.aws.Functionis configured withurl.authorization: "none", SST now adds an explicit resource-based permission:action: "lambda:InvokeFunction"principal: "*"function: <function name>This matches the AWS console guidance for public Function URLs and fixes existing stacks without requiring a manual policy edit.
Notes / follow-ups
InvokeFunctionstatement withlambda:InvokedViaFunctionUrl=true.aws.lambda.Permissionand includes an inline comment to remove it after we migrate to@pulumi/awsv7 (where Lambda/provider behavior matches the currentconsole policy).
Repro