-
Notifications
You must be signed in to change notification settings - Fork 4.4k
feat(s3-deployment): support securityGroups in BucketDeploymentProps #33233
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
(This review is outdated)
e9003c1 to
ba8b378
Compare
|
This now has integration tests and documentation for the new feature and the missing tests/documentation for the related VPC feature previously implemented. |
packages/aws-cdk-lib/aws-s3-deployment/lib/bucket-deployment.ts
Outdated
Show resolved
Hide resolved
8da326c to
a2a7583
Compare
33c979d to
71b57fa
Compare
|
Any traction on getting this one looked at reviewed? I can't see the build logs as to why it is failing. |
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #33233 +/- ##
=======================================
Coverage 80.84% 80.84%
=======================================
Files 236 236
Lines 14230 14230
Branches 2487 2487
=======================================
Hits 11504 11504
Misses 2442 2442
Partials 284 284
Flags with carried forward coverage won't be shown. Click here to find out more.
|
The CI is still failing. Looks like this is the start of the failing point |
aaythapa
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
packages/aws-cdk-lib/aws-s3-deployment/lib/bucket-deployment.ts
Outdated
Show resolved
Hide resolved
|
@drduhe Yes, you can make them run sequentially by using the |
But this will just make it run sequentially in my local dev deployment right? How would we enforce they get run sequentially as part of the production build that happens in the Github pipeline? |
|
@drduhe The Github pipeline currently only checks that the snapshots are matching. It doesn't currently deploy the snapshots automatically. |
|
Ack - running sequentially now |
9f553ef to
cffe5c7
Compare
|
Ok, sorry for the delay but it took like 8+ hours to run all the tests sequentially but they all this passed when I ran it them this final time - I cleaned up the other integration tests the grouping as well with this PR. See results below from my final deployment / tests this evening: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM. Thanks!
Pull request has been modified.
|
Fixed Rosetta README.md errors. Not sure why the |
|
Lemme know if I need to do anything specific - happy to work this down today so it doesn't lose traction again. |
|
Appreciate your efforts on this @drduhe , I want to see this PR done as well. 😅 |
|
@drduhe Please don't force push commits. Its hard to see what changes you made since last review when you do this. |
@Abogical - Ah, I won't do this moving forward, I realize now you support squashing on the merge and I should have left my changes as atomic commits. Pushing another commit now targeting the remaining failures in the Update: It seems to be passing the Rosetta linting workflow now. |
|
Thank you for contributing! Your pull request will be updated from main and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork). |
|
This pull request has been removed from the queue for the following reason: The pull request can't be updated
You should update or rebase your pull request manually. If you do, this pull request will automatically be requeued once the queue conditions match again. |
|
Thank you for contributing! Your pull request will be updated from main and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork). |
|
Comments on closed issues and PRs are hard for our team to see. |
Issue 33229
closes #33229
Reason for this change
The
BucketDeploymentconstruct in AWS CDK allows deploying assets to S3 buckets, often requiring a Lambda function to perform the deployment. Currently, users can specify a custom VPC viaBucketDeploymentProps, ensuring the deployment happens within a restricted network.However, many organizations require more granular network security control. While specifying a VPC is helpful, allowing custom security groups would enable teams to define specific ingress/egress rules, meeting stricter compliance and security requirements.
Description of changes
BucketDeploymentPropsto include an optionalsecurityGroups?: ec2.ISecurityGroup[]property.BucketDeploymentconstructor to passsecurityGroupsto the Lambda function.securityGroupsoptional.vpc,vpcSubnets, andsecurityGroupsparameters.Describe any new or updated permissions being added
N/A
Description of how you validated changes
Added unit tests to the relevant code modules to cover feature usage.
Checklist
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license