Skip to content

Conversation

@etcart
Copy link
Contributor

@etcart etcart commented Jan 2, 2026

Summary: Summary of changes

Addresses CUMULUS-4416: Develop amazing new feature

Changes

  • add lambda iam permission to access any sqs

PR Checklist

  • Update CHANGELOG
  • Unit tests
  • Ad-hoc testing - Deploy changes and test manually
  • Integration tests

📝 Note:
For most pull requests, please Squash and merge to maintain a clean and readable commit history.

"states:SendTaskSuccess",
"states:StartExecution",
"states:StopExecution"
"states:StopExecution",
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We should consider carefully if we want expanding the '*' resource. Generally we should be working to reduce wide-open perms as much as possible to reduce potential blast-radius.

Is there a sane way to limit scope/configure this, particularly with an eye to production?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

the problem is two fold:
#1 I would need to know the account ID in this place in order to update this permission to point at the "correct" sqs queue
#2 I would need to know the sqs queue itself. I can't point it at a queue named the same, because one queue can't point at multiple lambda functions. I need to create a new sqs queue in the daac legacy environment which ingest can be switched over to, and I need to somehow know that here

a big part of all of this is how we play well with cirrus, and this part is making me regret dealing with cirrus as it puts all of that configuration somewhere else.

### Changes

- **CUMULUS-4416**
- sqs permissions granted to "\*" instead of "\<account\>/\*"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please include (either in PR or here) justification for the change

Copy link
Member

@Jkovarik Jkovarik left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@etcart just a couple of comments, let me know what you think!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants