Skip to content
This repository has been archived by the owner on May 7, 2024. It is now read-only.

Commit

Permalink
Release 1.1.4
Browse files Browse the repository at this point in the history
  • Loading branch information
davelemons committed May 4, 2023
1 parent afae7ca commit 5b6988d
Show file tree
Hide file tree
Showing 9 changed files with 37 additions and 5 deletions.
6 changes: 6 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,12 @@ All notable changes to this project will be documented in this file.
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).

## [1.1.4] - 2023-05-03

### Changed
- Modified S3 Bucket creation setting S3 ObjectOwnership to `BucketOwnerPreferred` to enable ACLs. [More Information...](https://aws.amazon.com/blogs/aws/heads-up-amazon-s3-security-changes-are-coming-in-april-of-2023/)
- Modifyed S3 Deny policies from S3:Bucket to S3:* on the TLS enforcement IAM permissions as this may set off some compliance alarms.

## [1.1.3] - 2023-03-16

### Changed
Expand Down
4 changes: 4 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,10 @@
# Voicemail for Amazon Connect
This solutions deploys the resources necessary to configure a voicemail system to use with Amazon Connect. See [Solution Architecture](https://aws.amazon.com/solutions/implementations/voicemail-for-amazon-connect/).

> Starting in April 2023 Amazon S3 made a change to set the **Bucket Owner Enforced Setting** to be enabled for any newly completed buckets which disables **ACLs**. Since this solution uses Default ACLs, this new default will prevent the CloudFormation stack from deploying. [More Information...](https://aws.amazon.com/blogs/aws/heads-up-amazon-s3-security-changes-are-coming-in-april-of-2023/).
The master and development branches have been updated to account for the recent S3 changes. Updated CloudFormation Templates and deployment instructions can be [found here](https://aws-contact-center-blog.s3.us-west-2.amazonaws.com/voicemail-s3-default-acl-issue/vmv1s3fix.zip)

## Development Branch
We have added a new branch to this solution: the "development" branch. The "development" branch contains the same solution, but has a simplified build system that removes complexities introduced by the AWS Solution. If you would like to pull down this code to modify it for your own testing, you should use the "development" branch. The "development" branch is where we will accept PRs and continue to build out the Voicemail solution with more functionality based on feedback from users. We will update the "master" branch with changes from the "development" branch twice a year.

Expand Down
9 changes: 8 additions & 1 deletion deployment/aws-connect-vm.template
Original file line number Diff line number Diff line change
Expand Up @@ -2327,6 +2327,13 @@
"VersioningConfiguration": {
"Status": "Enabled"
},
"OwnershipControls":{
"Rules": [
{
"ObjectOwnership": "BucketOwnerPreferred"
}
]
},
"PublicAccessBlockConfiguration": {
"BlockPublicAcls": true,
"BlockPublicPolicy": true,
Expand Down Expand Up @@ -3622,7 +3629,7 @@
{
"Effect": "Deny",
"Principal": "*",
"Action": "s3:GetObject",
"Action": "s3:*",
"Resource": {
"Fn::Sub": "arn:aws:s3:::${AudioRecordingsBucket}/*"
},
Expand Down
2 changes: 1 addition & 1 deletion deployment/cloudfront.template
Original file line number Diff line number Diff line change
Expand Up @@ -75,7 +75,7 @@ Resources:
Resource: !Sub 'arn:aws:s3:::${PortalBucket}/*'
Principal:
CanonicalUser: !GetAtt CloudFrontOriginAccessIdentity.S3CanonicalUserId
- Action: "s3:GetObject"
- Action: "s3:*"
Effect: Deny
Resource: !Sub 'arn:aws:s3:::${PortalBucket}/*'
Principal: "*"
Expand Down
5 changes: 4 additions & 1 deletion deployment/copy-artifacts.template
Original file line number Diff line number Diff line change
Expand Up @@ -52,6 +52,9 @@ Resources:
Tags: []
VersioningConfiguration:
Status: Enabled
OwnershipControls:
Rules:
- ObjectOwnership: BucketOwnerPreferred
PublicAccessBlockConfiguration:
BlockPublicAcls: True
BlockPublicPolicy: True
Expand All @@ -77,7 +80,7 @@ Resources:
Resource: !Sub 'arn:aws:s3:::${LambdaArtifactsBucket}/*'
Principal:
AWS: !Sub '${AWS::AccountId}'
- Action: "s3:GetObject"
- Action: "s3:*"
Effect: Deny
Resource: !Sub 'arn:aws:s3:::${LambdaArtifactsBucket}/*'
Principal: "*"
Expand Down
8 changes: 7 additions & 1 deletion deployment/voicemail-for-amazon-connect.template
Original file line number Diff line number Diff line change
Expand Up @@ -276,6 +276,9 @@ Resources:
PortalBucket:
Type: AWS::S3::Bucket
Properties:
OwnershipControls:
Rules:
- ObjectOwnership: BucketOwnerPreferred
PublicAccessBlockConfiguration:
BlockPublicAcls: True
BlockPublicPolicy: True
Expand Down Expand Up @@ -306,7 +309,7 @@ Resources:
PolicyDocument:
Statement:
- Action:
- "s3:GetObject"
- "s3:*"
Effect: "Deny"
Resource: !Sub 'arn:aws:s3:::${VoicemailAccessLogBucket}/*'
Principal: "*"
Expand All @@ -318,6 +321,9 @@ Resources:
Type: AWS::S3::Bucket
Properties:
AccessControl: "LogDeliveryWrite"
OwnershipControls:
Rules:
- ObjectOwnership: BucketOwnerPreferred
PublicAccessBlockConfiguration:
BlockPublicAcls: True
BlockPublicPolicy: True
Expand Down
3 changes: 3 additions & 0 deletions source/aws-connect-vm-portal/templates/cloudfront.yml
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,9 @@ Resources:
PortalBucket:
Type: AWS::S3::Bucket
Properties:
OwnershipControls:
Rules:
- ObjectOwnership: BucketOwnerPreferred
PublicAccessBlockConfiguration:
BlockPublicAcls: True
BlockPublicPolicy: True
Expand Down
3 changes: 3 additions & 0 deletions source/aws-connect-vm-serverless/serverless.yml
Original file line number Diff line number Diff line change
Expand Up @@ -470,6 +470,9 @@ resources:
AccessControl: LogDeliveryWrite
VersioningConfiguration:
Status: Enabled
OwnershipControls:
Rules:
- ObjectOwnership: BucketOwnerPreferred
PublicAccessBlockConfiguration:
BlockPublicAcls: True
BlockPublicPolicy: True
Expand Down
2 changes: 1 addition & 1 deletion source/tools/transform.py
Original file line number Diff line number Diff line change
Expand Up @@ -158,7 +158,7 @@ def transform_template(template, save_path, lambda_zip_key, lambda_jar_key):
{
"Effect": "Deny",
"Principal": "*",
"Action": "s3:GetObject",
"Action": "s3:*",
"Resource": {
"Fn::Sub": "arn:aws:s3:::${AudioRecordingsBucket}/*"
},
Expand Down

0 comments on commit 5b6988d

Please sign in to comment.