Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
10 changes: 10 additions & 0 deletions fixtures/basic-state-machine/serverless.yml
Original file line number Diff line number Diff line change
Expand Up @@ -24,3 +24,13 @@ stepFunctions:
Resource:
Fn::GetAtt: [HelloLambdaFunction, Arn]
End: true
fnSubMachine:
name: integration-basic-fn-sub-${opt:stage, 'test'}
definition:
StartAt: InvokeLambda
States:
InvokeLambda:
Type: Task
Resource:
Fn::Sub: "arn:${AWS::Partition}:lambda:${AWS::Region}:${AWS::AccountId}:function:my-fn"
End: true
73 changes: 73 additions & 0 deletions fixtures/basic-state-machine/verify.test.js
Original file line number Diff line number Diff line change
@@ -0,0 +1,73 @@
'use strict';

const fs = require('node:fs');
const path = require('node:path');
const expect = require('chai').expect;

const templatePath = path.join(__dirname, '.serverless', 'cloudformation-template-update-stack.json');

describe('basic-state-machine fixture — CloudFormation template', () => {
let resources;

before(() => {
const template = JSON.parse(fs.readFileSync(templatePath, 'utf8'));
resources = template.Resources;
});

it('should have an IAM role for each state machine', () => {
const stateMachineRoles = Object.values(resources).filter(
(r) => r.Type === 'AWS::IAM::Role'
&& JSON.stringify(r).includes('states.'),
);
expect(stateMachineRoles).to.have.lengthOf(2);
});

it('should grant lambda:InvokeFunction for a Fn::GetAtt resource reference', () => {
// basicMachine uses Fn::GetAtt: [HelloLambdaFunction, Arn] — the generated
// role should allow invoking that function and its aliases/versions (:*)
const roles = Object.values(resources).filter((r) => r.Type === 'AWS::IAM::Role');
const statements = roles.flatMap((r) => r.Properties.Policies[0].PolicyDocument.Statement);
const lambdaStatement = statements.find((s) => {
const actions = [].concat(s.Action);
return actions.includes('lambda:InvokeFunction');
});
expect(lambdaStatement, 'should have a lambda:InvokeFunction statement').to.not.equal(undefined);
const arnList = [].concat(lambdaStatement.Resource);
const hasGetAtt = arnList.some((a) => a && a['Fn::GetAtt']);
expect(hasGetAtt, 'should reference the Lambda function via Fn::GetAtt').to.equal(true);
});

it('should not produce nested Fn::Sub when Resource is a Fn::Sub expression (issue #302)', () => {
// fnSubMachine uses a Fn::Sub ARN (simulating serverless-pseudo-parameters output).
// The versioned form (:*) must not nest a Fn::Sub inside a Fn::Sub variable map —
// that is invalid CloudFormation and causes MalformedPolicyDocument errors.
const roles = Object.values(resources).filter((r) => r.Type === 'AWS::IAM::Role');
const statements = roles.flatMap((r) => r.Properties.Policies[0].PolicyDocument.Statement);
const allArns = statements
.filter((s) => [].concat(s.Action).includes('lambda:InvokeFunction'))
.flatMap((s) => [].concat(s.Resource));

for (const arn of allArns) {
if (arn && typeof arn === 'object' && Array.isArray(arn['Fn::Sub'])) {
const [, varMap] = arn['Fn::Sub'];
if (varMap) {
for (const val of Object.values(varMap)) {
expect(val, 'Fn::Sub variable map must not contain a nested Fn::Sub').to.not.have.property('Fn::Sub');
}
}
}
}
});

it('should include a valid versioned ARN (:*) for the Fn::Sub resource', () => {
const fnSubTemplate = 'arn:${AWS::Partition}:lambda:${AWS::Region}:${AWS::AccountId}:function:my-fn';
const roles = Object.values(resources).filter((r) => r.Type === 'AWS::IAM::Role');
const statements = roles.flatMap((r) => r.Properties.Policies[0].PolicyDocument.Statement);
const allArns = statements
.filter((s) => [].concat(s.Action).includes('lambda:InvokeFunction'))
.flatMap((s) => [].concat(s.Resource));

const versionedArn = allArns.find((a) => a && a['Fn::Sub'] === `${fnSubTemplate}:*`);
expect(versionedArn, 'versioned ARN should be a Fn::Sub string with :* appended').to.not.equal(undefined);
});
});
2 changes: 1 addition & 1 deletion fixtures/package-lock.json

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

15 changes: 14 additions & 1 deletion lib/deploy/stepFunctions/iamStrategies/lambda.js
Original file line number Diff line number Diff line change
Expand Up @@ -85,6 +85,19 @@ function getPermissions(state, { plugin }) {
}];
}

function getVersionedArn(functionArn) {
if (_.has(functionArn, 'Fn::Sub')) {
const sub = functionArn['Fn::Sub'];
if (typeof sub === 'string') {
return { 'Fn::Sub': `${sub}:*` };
}
if (Array.isArray(sub)) {
return { 'Fn::Sub': [`${sub[0]}:*`, sub[1]] };
}
}
return { 'Fn::Sub': ['${functionArn}:*', { functionArn }] };
}

function getFallbackPermissions(state, { plugin }) {
if (isIntrinsic(state.Resource) || !!state.Resource.match(/arn:aws(-[a-z]+)*:lambda/)) {
const trimmedArn = trimAliasFromLambdaArn(state.Resource);
Expand All @@ -93,7 +106,7 @@ function getFallbackPermissions(state, { plugin }) {
action: 'lambda:InvokeFunction',
resource: [
functionArn,
{ 'Fn::Sub': ['${functionArn}:*', { functionArn }] },
getVersionedArn(functionArn),
],
}];
}
Expand Down
39 changes: 39 additions & 0 deletions lib/deploy/stepFunctions/iamStrategies/lambda.test.js
Original file line number Diff line number Diff line change
Expand Up @@ -307,4 +307,43 @@ describe('lambda strategy — getFallbackPermissions (direct lambda ARN task res
const result = getFallbackPermissions(state, { plugin });
expect(result).to.deep.equal([]);
});

it('should not produce a nested Fn::Sub when Resource is a Fn::Sub expression (issue #302)', () => {
// serverless-pseudo-parameters converts #{AWS::Region} → ${AWS::Region} and wraps
// the whole ARN in Fn::Sub. Putting that object as a variable value inside another
// Fn::Sub array is invalid CloudFormation and causes MalformedPolicyDocument errors.
const state = {
Type: 'Task',
Resource: {
'Fn::Sub': 'arn:${AWS::Partition}:lambda:${AWS::Region}:${AWS::AccountId}:function:my-fn',
},
};
const plugin = makePlugin();
const result = getFallbackPermissions(state, { plugin });
expect(result[0].action).to.equal('lambda:InvokeFunction');
const arnList = result[0].resource;
for (const arn of arnList) {
if (arn && typeof arn === 'object' && Array.isArray(arn['Fn::Sub'])) {
const [, varMap] = arn['Fn::Sub'];
if (varMap) {
for (const val of Object.values(varMap)) {
expect(val, 'variable map value must not be a nested Fn::Sub').to.not.have.property('Fn::Sub');
}
}
}
}
});

it('should generate a valid versioned ARN when Resource is a Fn::Sub string', () => {
const fnSub = 'arn:${AWS::Partition}:lambda:${AWS::Region}:${AWS::AccountId}:function:my-fn';
const state = {
Type: 'Task',
Resource: { 'Fn::Sub': fnSub },
};
const plugin = makePlugin();
const result = getFallbackPermissions(state, { plugin });
const arnList = result[0].resource;
const versionedArn = arnList.find((a) => a && a['Fn::Sub'] === `${fnSub}:*`);
expect(versionedArn, 'versioned ARN should be a simple Fn::Sub string with :* appended').to.not.equal(undefined);
});
});
Loading