-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
(aws-s3objectlambda): Missing access to supportingAccessPoint #31950
Comments
@lbustelo , thanks for requesting this. it makes sense to expose this access point However I see this CDK Example , where you can construct the access point arn. Marking it as P2 as there are ways to construct it a stated in example but it would be good to have direct access. Contributions are welcome from the community. |
Comments on closed issues and PRs are hard for our team to see. |
1 similar comment
Comments on closed issues and PRs are hard for our team to see. |
### Issue # (if applicable) Closes #31950 . ### Reason for this change Previously, users needed to manually construct ARN strings when using S3AccessPoint. This update exposes the S3AccessPoint ARN directly to reduce implementation effort. ### Description of changes This change makes the S3AccessPoint accessible as a property for reuse across the codebase. ### Describe any new or updated permissions being added No ### Description of how you validated changes - Added test cases to verify the newly exposed S3AccessPoint property in the existing unit test suite. ### Checklist - [x] My code adheres to the [CONTRIBUTING GUIDE](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md) and [DESIGN GUIDELINES](https://github.com/aws/aws-cdk/blob/main/docs/DESIGN_GUIDELINES.md) ---- *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
Describe the feature
When using aws-s3objectlambda.AccessPoint construct, it manages the creation of an s3.CfnAccessPoint. Unfortunately, the instance of aws-s3objectlambda.AccessPoint does not expose this AccessPoint.
Use Case
After the creation of a new aws-s3objectlambda.AccessPoint, you typically need to create an IAM policy to allow the user to have necessary access to the S3 Object Lambda access point. An example of these are provided in this AWS doc. One of the policy statements grants access to the S3 AccessPoint (supporting AccessPoint)
Unfortunately, the supportedAccessPoint is not expose by this construct and there is not clear way of getting the ARN of this S3 AccessPoint.
Proposed Solution
Expose the ARN of the internally managed s3 AccessPoint created here.
Other Information
No response
Acknowledgements
CDK version used
2.151.0
Environment details (OS name and version, etc.)
OSX 14.6.1 (Using the python bindings)
The text was updated successfully, but these errors were encountered: