Skip to content

Commit

Permalink
fix(stepfunctions-tasks): incorrect policy generated for athena start…
Browse files Browse the repository at this point in the history
…queryexecution task (#25911)

The policy was originally adjusted in #22314 to use `formatArn()` to account for other partitions. However, there were no tests for these policies before this fix, so it was not identified that the policy would start getting incorrectly generated without being able to act on the resources inside a bucket.

Closes #25875 

----

*By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
  • Loading branch information
peterwoodworth authored Jun 12, 2023
1 parent 37f1eb0 commit 86e1b4c
Show file tree
Hide file tree
Showing 8 changed files with 285 additions and 285 deletions.
Original file line number Diff line number Diff line change
@@ -1,15 +1,15 @@
{
"version": "30.0.0",
"version": "32.0.0",
"files": {
"4c057537867d65c4b98525bdce151c8a8c2babbe4117b04526bf194d8c82d40f": {
"d5b0852cda8e09b47bbf34672fc71a205e9a3e7dcd0ce808bb607ce6714fab1a": {
"source": {
"path": "aws-stepfunctions-tasks-athena-start-query-execution-integ.template.json",
"packaging": "file"
},
"destinations": {
"current_account-current_region": {
"bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
"objectKey": "4c057537867d65c4b98525bdce151c8a8c2babbe4117b04526bf194d8c82d40f.json",
"objectKey": "d5b0852cda8e09b47bbf34672fc71a205e9a3e7dcd0ce808bb607ce6714fab1a.json",
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
}
}
Expand Down
Loading

0 comments on commit 86e1b4c

Please # to comment.