Skip to content

Commit f47abe0

Browse files
committed
Adding VPC Access Policy when VpcConfig is present
1 parent dbc8f79 commit f47abe0

File tree

4 files changed

+16
-6
lines changed

4 files changed

+16
-6
lines changed

samtranslator/model/sam_resources.py

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -198,6 +198,10 @@ def _construct_role(self, managed_policy_map):
198198
managed_policy_arns = [ArnGenerator.generate_aws_managed_policy_arn('service-role/AWSLambdaBasicExecutionRole')]
199199
if self.Tracing:
200200
managed_policy_arns.append(ArnGenerator.generate_aws_managed_policy_arn('AWSXrayWriteOnlyAccess'))
201+
if self.VpcConfig:
202+
managed_policy_arns.append(
203+
ArnGenerator.generate_aws_managed_policy_arn('service-role/AWSLambdaVPCAccessExecutionRole')
204+
)
201205

202206
function_policies = FunctionPolicies({"Policies": self.Policies},
203207
# No support for policy templates in the "core"

tests/translator/output/aws-cn/globals_for_function.json

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,8 @@
55
"Properties": {
66
"ManagedPolicyArns": [
77
"arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole",
8-
"arn:aws-cn:iam::aws:policy/AWSXrayWriteOnlyAccess"
8+
"arn:aws-cn:iam::aws:policy/AWSXrayWriteOnlyAccess",
9+
"arn:aws-cn:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole"
910
],
1011
"PermissionsBoundary": "arn:aws:1234:iam:boundary/OverridePermissionsBoundary",
1112
"AssumeRolePolicyDocument": {
@@ -92,7 +93,8 @@
9293
"Properties": {
9394
"ManagedPolicyArns": [
9495
"arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole",
95-
"arn:aws-cn:iam::aws:policy/AWSXrayWriteOnlyAccess"
96+
"arn:aws-cn:iam::aws:policy/AWSXrayWriteOnlyAccess",
97+
"arn:aws-cn:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole"
9698
],
9799
"PermissionsBoundary": "arn:aws:1234:iam:boundary/CustomerCreatedPermissionsBoundary",
98100
"AssumeRolePolicyDocument": {

tests/translator/output/aws-us-gov/globals_for_function.json

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,8 @@
55
"Properties": {
66
"ManagedPolicyArns": [
77
"arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole",
8-
"arn:aws-us-gov:iam::aws:policy/AWSXrayWriteOnlyAccess"
8+
"arn:aws-us-gov:iam::aws:policy/AWSXrayWriteOnlyAccess",
9+
"arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole"
910
],
1011
"PermissionsBoundary": "arn:aws:1234:iam:boundary/OverridePermissionsBoundary",
1112
"AssumeRolePolicyDocument": {
@@ -92,7 +93,8 @@
9293
"Properties": {
9394
"ManagedPolicyArns": [
9495
"arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole",
95-
"arn:aws-us-gov:iam::aws:policy/AWSXrayWriteOnlyAccess"
96+
"arn:aws-us-gov:iam::aws:policy/AWSXrayWriteOnlyAccess",
97+
"arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole"
9698
],
9799
"PermissionsBoundary": "arn:aws:1234:iam:boundary/CustomerCreatedPermissionsBoundary",
98100
"AssumeRolePolicyDocument": {

tests/translator/output/globals_for_function.json

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,8 @@
55
"Properties": {
66
"ManagedPolicyArns": [
77
"arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole",
8-
"arn:aws:iam::aws:policy/AWSXrayWriteOnlyAccess"
8+
"arn:aws:iam::aws:policy/AWSXrayWriteOnlyAccess",
9+
"arn:aws:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole"
910
],
1011
"PermissionsBoundary": "arn:aws:1234:iam:boundary/OverridePermissionsBoundary",
1112
"AssumeRolePolicyDocument": {
@@ -92,7 +93,8 @@
9293
"Properties": {
9394
"ManagedPolicyArns": [
9495
"arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole",
95-
"arn:aws:iam::aws:policy/AWSXrayWriteOnlyAccess"
96+
"arn:aws:iam::aws:policy/AWSXrayWriteOnlyAccess",
97+
"arn:aws:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole"
9698
],
9799
"PermissionsBoundary": "arn:aws:1234:iam:boundary/CustomerCreatedPermissionsBoundary",
98100
"AssumeRolePolicyDocument": {

0 commit comments

Comments
 (0)