Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

aws_s3: cannot use noncurrent lifecycle rules on a version-suspended bucket #22392

Closed
rittneje opened this issue Oct 6, 2022 · 6 comments · Fixed by #22803
Closed

aws_s3: cannot use noncurrent lifecycle rules on a version-suspended bucket #22392

rittneje opened this issue Oct 6, 2022 · 6 comments · Fixed by #22803
Assignees
Labels
@aws-cdk/aws-s3 Related to Amazon S3 bug This issue is a bug. effort/small Small work item – less than a day of effort good first issue Related to contributions. See CONTRIBUTING.md p2

Comments

@rittneje
Copy link

rittneje commented Oct 6, 2022

Describe the bug

If I disable versioning on an S3 bucket, CDK does not allow me to create any lifecycle rules against non-current versions (e.g., noncurrent_version_expiration).

Expected Behavior

CDK must allow creating such lifecycle rules against versioning-suspended buckets. Note that S3 itself has not problem with this - it allows creating such rules against both versioning-suspended and versioning-disabled buckets.

Current Behavior

jsii.errors.JavaScriptError: 
  Error: Cannot use 'noncurrent' rules on a nonversioned bucket
      at Bucket.addLifecycleRule (/tmp/jsii-kernel-dcACjj/node_modules/aws-cdk-lib/aws-s3/lib/bucket.js:1:20681)
      at Array.forEach (<anonymous>)
      at new Bucket (/tmp/jsii-kernel-dcACjj/node_modules/aws-cdk-lib/aws-s3/lib/bucket.js:1:14963)
      at exports.Kernel._create (/tmp/tmpi6v6bnni/lib/program.js:5181:179)
      at exports.Kernel.create (/tmp/tmpi6v6bnni/lib/program.js:4989:29)
      at exports.KernelHost.processRequest (/tmp/tmpi6v6bnni/lib/program.js:6083:36)
      at exports.KernelHost.run (/tmp/tmpi6v6bnni/lib/program.js:6057:48)
      at Immediate._onImmediate (/tmp/tmpi6v6bnni/lib/program.js:6058:46)
      at processImmediate (node:internal/timers:466:21)

The above exception was the direct cause of the following exception:

Traceback (most recent call last):
  File "/Users/rittneje/s3-version-test/cdk.py", line 32, in <module>
    main()
  File "/Users/rittneje/s3-version-test/cdk.py", line 16, in main
    aws_s3.Bucket(
  File "/opt/.venv/lib/python3.10/site-packages/jsii/_runtime.py", line 86, in __call__
    inst = super().__call__(*args, **kwargs)
  File "/opt/.venv/lib/python3.10/site-packages/aws_cdk/aws_s3/__init__.py", line 16089, in __init__
    jsii.create(self.__class__, self, [scope, id, props])
  File "/opt/.venv/lib/python3.10/site-packages/jsii/_kernel/__init__.py", line 321, in create
    response = self.provider.create(
  File "/opt/.venv/lib/python3.10/site-packages/jsii/_kernel/providers/process.py", line 347, in create
    return self._process.send(request, CreateResponse)
  File "/opt/.venv/lib/python3.10/site-packages/jsii/_kernel/providers/process.py", line 329, in send
    raise JSIIError(resp.error) from JavaScriptError(resp.stack)
jsii.errors.JSIIError: Cannot use 'noncurrent' rules on a nonversioned bucket

Reproduction Steps

First deploy a bucket like so:

aws_s3.Bucket(
        stack,
        "test-bucket",
        block_public_access=aws_s3.BlockPublicAccess.BLOCK_ALL,
        versioned=True,
        enforce_ssl=True,
        removal_policy=aws_cdk.RemovalPolicy.DESTROY,
        auto_delete_objects=True,
)

Then disable versioning and add a lifecycle rule like so:

aws_s3.Bucket(
        stack,
        "test-bucket",
        block_public_access=aws_s3.BlockPublicAccess.BLOCK_ALL,
        versioned=False,
        lifecycle_rules=[
            aws_s3.LifecycleRule(noncurrent_version_expiration=aws_cdk.Duration.days(1)),
        ],
        enforce_ssl=True,
        removal_policy=aws_cdk.RemovalPolicy.DESTROY,
        auto_delete_objects=True,
    )

Possible Solution

No response

Additional Information/Context

No response

CDK CLI Version

2.39.1 (build f188fac)

Framework Version

No response

Node.js Version

v16.17.0

OS

Alpine 3.16

Language

Python

Language Version

3.10.6

Other information

No response

@rittneje rittneje added bug This issue is a bug. needs-triage This issue or PR still needs to be triaged. labels Oct 6, 2022
@github-actions github-actions bot added the @aws-cdk/aws-s3 Related to Amazon S3 label Oct 6, 2022
@rittneje
Copy link
Author

@otaviomacedo Any update on this? I would think the fix is just to remove the invalid restriction.

@vwfs-sasmoe
Copy link

@otaviomacedo We stumbled upon the same issue. When already having versioned buckets for which you want to suspend versioning, it would make sense to set lifecycle rules for noncurrent objects in order to get rid of the existing ones from the previous "versioning times".

@rittneje
Copy link
Author

cc @peterwoodworth

@peterwoodworth
Copy link
Contributor

Interesting bug, thanks for reporting!

We make the check here:

public addLifecycleRule(rule: LifecycleRule) {
if ((rule.noncurrentVersionExpiration !== undefined
|| (rule.noncurrentVersionTransitions && rule.noncurrentVersionTransitions.length > 0))
&& !this.versioned) {
throw new Error("Cannot use 'noncurrent' rules on a nonversioned bucket");
}

If S3 doesn't reject these rules then we shouldn't be throwing this error, especially since there's a valid case which you've described in which these settings would make sense.

We accept contributions! Check out our contributing guide if you're interested - there's a low chance the team will be able to address this soon but we'd be happy to review a PR 🙂

@peterwoodworth peterwoodworth added good first issue Related to contributions. See CONTRIBUTING.md p2 effort/small Small work item – less than a day of effort and removed needs-triage This issue or PR still needs to be triaged. labels Oct 28, 2022
@mergify mergify bot closed this as completed in #22803 Nov 7, 2022
mergify bot pushed a commit that referenced this issue Nov 7, 2022

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
… objects when bucket versionining is not set up (#22803)

fixes #22392

----

### All Submissions:

* [x] Have you followed the guidelines in our [Contributing guide?](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md)

### Adding new Unconventional Dependencies:

* [ ] This PR adds new unconventional dependencies following the process described [here](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md/#adding-new-unconventional-dependencies)

### New Features

* [x] Have you added the new feature to an [integration test](https://github.com/aws/aws-cdk/blob/main/INTEGRATION_TESTS.md)?
	* [x] Did you use `yarn integ` to deploy the infrastructure and generate the snapshot (i.e. `yarn integ` without `--dry-run`)?

*By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
@github-actions
Copy link

github-actions bot commented Nov 7, 2022

⚠️COMMENT VISIBILITY WARNING⚠️

Comments on closed issues are hard for our team to see.
If you need more assistance, please either tag a team member or open a new issue that references this one.
If you wish to keep having a conversation with other community members under this issue feel free to do so.

@bibhu107
Copy link

We are using "monocdk": "^1.152.0" but still getting this error. Can someone help me with what is the release of this PR

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
@aws-cdk/aws-s3 Related to Amazon S3 bug This issue is a bug. effort/small Small work item – less than a day of effort good first issue Related to contributions. See CONTRIBUTING.md p2
Projects
None yet
5 participants