Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

Cloudfront to s3 redirect to subdomain giving Access denied error

I have a static website setup on aws s3 using Cloudfront and route 53. Currently I can correctly access the site correctly via https://www.example.com

I'm trying to redirect http://example.com and https://example.com to https://www.example.com (http://www.example.com already redirects correctly).

It seems that the only way to set this up is with two cloudfront distributions and two s3 buckets (and two alias A records in route 53).

I have configured an example.com bucket to redirect to www.example.com using https protocol.

One of the cloudfront distributions points to the www.example.com bucket with http to https redirect and the default root object as index.html and the alternate domain name as www.example.com The other cloudfront distributions points to example.com bucket with no http to https redirect and nothing set in the default root object (I've also tried index.html but that didn't help) and the alternate domain name as example.com.

Both distributions use the same certificate setup in ACM that covers *.example.com and example.com (other settings use the defaults).

I'm not clear why I'm getting an access denied error when I try to access via https://example.com (or http://example.com) and what is wrong about my setup?

<Error>
<Code>AccessDenied</Code>
<Message>Access Denied</Message>
<RequestId>....</RequestId>
<HostId>.....</HostId>
</Error>

Update with more details on the buckets:

As mentioned below in the comments the root domain s3 bucket, redirects correctly without cloudfront. Adding cloudfront back in and the access denied errors reappear.

both buckets have public access ie Block all public access is set to off.

The bucket policy for both is set to:

{
    "Version": "2012-10-17",
    "Id": "Policy1595518880784",
    "Statement": [
        {
            "Sid": "Stmt1595518834954",
            "Effect": "Allow",
            "Principal": "*",
            "Action": "s3:GetObject",
            "Resource": "arn:aws:s3:::example.com/*"
        }
    ]
}

and for the subdomain bucket it has a ..:::www.example.com/* in the resourse.

The buckets origin used in cloudfront is example.com.s3.amazonaws.com and www.example.com.s3.amazonaws.com

like image 417
Yunti Avatar asked Jul 30 '20 18:07

Yunti


3 Answers

The issue is with the cloudfront distribution in front of the redirect bucket. Although the autocomplete of the origin for the www bucket in cloudfront works fine, it does not work for the redirect bucket. Instead you need to add this manually and it not to be of the s3 rest api format but of the static site version. So instead enter something of the form example.com.s3-website-us-east-1.amazonaws.com This seems a bit of like a bug in the aws console and it shouldn't autocomplete invalid bucket names infront of s3 redirecting buckets.

like image 131
Yunti Avatar answered Oct 18 '22 11:10

Yunti


To troubleshoot Access Denied errors, you must know if your distribution’s origin domain name is an S3 website endpoint or an S3 REST API endpoint. Try this:

  1. Open the CloudFront console.
  2. Choose your CloudFront distribution, and then choose Distribution Settings.
  3. Choose the Origins and Origin Groups tab.
  4. Review the domain name under Origin Domain Name and Path, and then determine the endpoint type based on the format of the domain name.

Keep in mind that, REST API endpoints use this format:

AWSDOC-EXAMPLE-BUCKET.s3.amazonaws.com

Website endpoints use this format:

AWSDOC-EXAMPLE-BUCKET.s3-website-us-east-1.amazonaws.com

Also, don't forget that if your distribution is using a website endpoint, verify the following requirements to avoid Access Denied errors:

  • Objects in the bucket must be publicly accessible.
  • Objects in the bucket can't be encrypted by AWS Key Management Service (AWS KMS).
  • The bucket policy must allow access to s3:GetObject.
  • If the bucket policy grants public access, then the AWS account that owns the bucket must also own the object.
  • The requested objects must exist in the bucket.
  • Amazon S3 block public access must be disabled.
  • If Requester Pays is enabled, then the request must include the request-payer parameter.

Finally, you might want to check these posts:

How do I use CloudFront to serve a static website hosted on Amazon S3?

I’m using an S3 REST API endpoint as the origin of my CloudFront distribution. Why am I getting 403 Access Denied errors?

like image 36
baduker Avatar answered Oct 18 '22 10:10

baduker


The answer provided by Yunti helped, and in addition I had to do the following in order to get it to work, as it would still give me 403 Forbidden error,

  1. Edit the CloudFront distribution to include the other CNAME's which are used to access the site, enter image description here

    This is a requirement of AWS if you're going to access the CloudFront distribution by an address other than the CloudFront auto-generated one (E.g. xyadjfjfg.cloudfront.net).

  2. (This applies if you want to support HTTPS for the users of your site) Had to request a new certificate in AWS Certificate Manager replace the old one, to include the additional host name example.com in my example (notice there's no subdomain at all in front of example.com). The certificate is issued for subject *.example.com but needed explicit host without any subdomain. My original certificate was issued to *.example.com only with no additional domain names specified, aka Subject Alternative Name, or SAN. AWS CloudFront will not let you save the distribution changes if the chosen ACM certificate does not mention all the CNAME's you have provided in the comma-separated list.

like image 38
Jose Quijada Avatar answered Oct 18 '22 11:10

Jose Quijada