(bootstrap): own account should be included in trust #25290
Labels
bug
This issue is a bug.
effort/medium
Medium work item – several days of effort
p1
package/tools
Related to AWS CDK Tools or CLI
Describe the bug
If I bootstrap my aws account 111111111111 with
in the past the resulting cdk-hnb659fds-deploy-role did contain
Since #24588 this behaviour has changed though, now the Resource is restricted to
Expected Behavior
The account to be bootstrapped (111111111111) is allowed to use the KMS key used for the cdk bucket as well, not just the trusted account 222222222222.
Current Behavior
Only the trusted account is allowed to. This results in cdk uploading the Stacks into its S3-bucket but then cloudformation fails reading from it as the deploy-role no longer has access rights.
One could argue that the account itself should also be explicitly listed as trusted account, but that would mean the default parameters generate a non-working environment, so I think it should work without explicit mentioning of 111111111111.
Reproduction Steps
Possible Solution
Add the account to be bootstrapped into the grant as well or revert to the behaviour before #24588 for the deployment role.
Additional Information/Context
No response
CDK CLI Version
2.76.0 (build 78c411b)
Framework Version
No response
Node.js Version
v16.18.1
OS
Amazon Linux 2
Language
Python
Language Version
3.9.16
Other information
No response
The text was updated successfully, but these errors were encountered: