Skip to content

Commit

Permalink
fix(core): Remove encryption on lifecycle SNS Topic (#163)
Browse files Browse the repository at this point in the history
Fixes: #162
  • Loading branch information
ddneilson committed Oct 9, 2020
1 parent 9cbf99f commit 5b663ca
Show file tree
Hide file tree
Showing 2 changed files with 0 additions and 67 deletions.
13 changes: 0 additions & 13 deletions packages/aws-rfdk/lib/core/lib/staticip-server.ts
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,6 @@ import {
Role,
ServicePrincipal,
} from '@aws-cdk/aws-iam';
import {Key} from '@aws-cdk/aws-kms';
import {
Code,
Function as LambdaFunction,
Expand All @@ -52,7 +51,6 @@ import {
Construct,
Duration,
Lazy,
RemovalPolicy,
Stack,
Tags,
} from '@aws-cdk/core';
Expand Down Expand Up @@ -403,21 +401,10 @@ export class StaticPrivateIpServer extends Construct implements IConnectable, IG
assumedBy: new ServicePrincipal('autoscaling.amazonaws.com'),
});

const notificationTopicEncryptKeyUniqueId = 'SNSEncryptionKey' + this.removeHyphens('255e9e52-ad03-4ddf-8ff8-274bc10d63d1');
const notificationTopicEncryptKey = new Key(stack, notificationTopicEncryptKeyUniqueId, {
description: `This key is used to encrypt SNS messages for ${notificationTopicUniqueId}.`,
enableKeyRotation: true,
removalPolicy: RemovalPolicy.DESTROY,
trustAccountIdentities: true,
});

notificationTopic = new Topic(stack, notificationTopicUniqueId, {
displayName: `For RFDK instance-launch notifications for stack '${stack.stackName}'`,
masterKey: notificationTopicEncryptKey,
});

notificationTopicEncryptKey.grant(notificationRole, 'kms:Decrypt', 'kms:GenerateDataKey');

notificationTopic.addSubscription(new LambdaSubscription(lambdaHandler));
notificationTopic.grantPublish(notificationRole);
} else {
Expand Down
54 changes: 0 additions & 54 deletions packages/aws-rfdk/lib/core/test/staticip-server.test.ts
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@ import {
countResources,
countResourcesLike,
expect as cdkExpect,
expect as expectCDK,
haveResourceLike,
objectLike,
ResourcePart,
Expand Down Expand Up @@ -93,48 +92,8 @@ describe('Test StaticIpServer', () => {
Description: 'Created by RFDK StaticPrivateIpServer to process instance launch lifecycle events in stack \'StackName\'. This lambda attaches an ENI to newly launched instances.',
}));

expectCDK(stack).to(haveResourceLike('AWS::KMS::Key', {
UpdateReplacePolicy: 'Delete',
DeletionPolicy: 'Delete',
}, ResourcePart.CompleteDefinition));
expectCDK(stack).to(haveResourceLike('AWS::KMS::Key', {
KeyPolicy: {
Statement: [
{
Action: 'kms:*',
Effect: 'Allow',
Principal: {
AWS: {
'Fn::Join': [
'',
[
'arn:',
{
Ref: 'AWS::Partition',
},
':iam::',
{
Ref: 'AWS::AccountId',
},
':root',
],
],
},
},
Resource: '*',
},
],
},
EnableKeyRotation: true,
}));
cdkExpect(stack).to(haveResourceLike('AWS::SNS::Topic', {
DisplayName: 'For RFDK instance-launch notifications for stack \'StackName\'',
KmsMasterKeyId: {
'Fn::GetAtt': [
'SNSEncryptionKey255e9e52ad034ddf8ff8274bc10d63d1EDF79FFE',
'Arn',
],
},
}));

cdkExpect(stack).to(haveResourceLike('AWS::SNS::Subscription', {
Expand Down Expand Up @@ -214,19 +173,6 @@ describe('Test StaticIpServer', () => {
cdkExpect(stack).to(countResourcesLike('AWS::IAM::Policy', 1, {
PolicyDocument: {
Statement: [
{
Action: [
'kms:Decrypt',
'kms:GenerateDataKey',
],
Effect: 'Allow',
Resource: {
'Fn::GetAtt': [
'SNSEncryptionKey255e9e52ad034ddf8ff8274bc10d63d1EDF79FFE',
'Arn',
],
},
},
{
Action: 'sns:Publish',
Effect: 'Allow',
Expand Down

0 comments on commit 5b663ca

Please sign in to comment.