Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(ecs): reduce ecs service task role cloudwatch permissions when no log configured (under feature flag) #31475

Merged
merged 6 commits into from
Sep 18, 2024

Conversation

GavinZZ
Copy link
Contributor

@GavinZZ GavinZZ commented Sep 18, 2024

Issue # (if applicable)

Closes #31397

Reason for this change

If a FargateService or EC2 Service has enableExecuteCommand: true and the ECS cluster it runs on has executeCommandConfiguration.logging set to anything but ecs.ExecuteCommandLogging.NONE then the CDK automatically grants the underlying TaskDefinition overly broad cloudwatch logs permissions regardless of need even if the logging configuration has no cloudwatch logs config set.

This is not right behaviour as these permissions are not needed.

Description of changes

Add feature flag and if feature flag is on and cloudwatch log is configured, reduce the permissions.

Description of how you validated changes

New unit tests, integration tests.

Checklist


By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license

@aws-cdk-automation aws-cdk-automation requested a review from a team September 18, 2024 00:22
@github-actions github-actions bot added bug This issue is a bug. effort/small Small work item – less than a day of effort p1 labels Sep 18, 2024
@mergify mergify bot added the contribution/core This is a PR that came from AWS. label Sep 18, 2024
@GavinZZ GavinZZ marked this pull request as ready for review September 18, 2024 05:11
@aws-cdk-automation aws-cdk-automation added the pr/needs-maintainer-review This PR needs a review from a Core Team Member label Sep 18, 2024
@shikha372 shikha372 self-assigned this Sep 18, 2024
Copy link
Contributor

mergify bot commented Sep 18, 2024

Thank you for contributing! Your pull request will be updated from main and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork).

@aws-cdk-automation aws-cdk-automation removed the pr/needs-maintainer-review This PR needs a review from a Core Team Member label Sep 18, 2024
@aws-cdk-automation
Copy link
Collaborator

AWS CodeBuild CI Report

  • CodeBuild project: AutoBuildv2Project1C6BFA3F-wQm2hXv2jqQv
  • Commit ID: 9ff67bc
  • Result: SUCCEEDED
  • Build Logs (available for 30 days)

Powered by github-codebuild-logs, available on the AWS Serverless Application Repository

@mergify mergify bot merged commit de7ab7c into main Sep 18, 2024
14 of 15 checks passed
Copy link
Contributor

mergify bot commented Sep 18, 2024

Thank you for contributing! Your pull request will be updated from main and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork).

@mergify mergify bot deleted the yuanhaoz/ecs_cloudwatch_permission_fix branch September 18, 2024 20:40
Copy link

Comments on closed issues and PRs are hard for our team to see.
If you need help, please open a new issue that references this one.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Sep 18, 2024
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
bug This issue is a bug. contribution/core This is a PR that came from AWS. effort/small Small work item – less than a day of effort p1
Projects
None yet
Development

Successfully merging this pull request may close these issues.

aws_ecs: overly broad permissions granted by enableExecuteCommand
3 participants