I have a static website setup on aws s3 using Cloudfront and route 53.
Currently I can correctly access the site correctly via https://www.example.com
I'm trying to redirect http://example.com
and https://example.com
to https://www.example.com
(http://www.example.com
already redirects correctly).
It seems that the only way to set this up is with two cloudfront distributions and two s3 buckets (and two alias A records in route 53).
I have configured an example.com
bucket to redirect to www.example.com
using https protocol.
One of the cloudfront distributions points to the www.example.com
bucket with http to https redirect and the default root object as index.html
and the alternate domain name as www.example.com
The other cloudfront distributions points to example.com
bucket with no http to https redirect and nothing set in the default root object (I've also tried index.html but that didn't help) and the alternate domain name as example.com
.
Both distributions use the same certificate setup in ACM that covers *.example.com
and example.com
(other settings use the defaults).
I'm not clear why I'm getting an access denied error when I try to access via https://example.com
(or http://example.com
) and what is wrong about my setup?
<Error>
<Code>AccessDenied</Code>
<Message>Access Denied</Message>
<RequestId>....</RequestId>
<HostId>.....</HostId>
</Error>
Update with more details on the buckets:
As mentioned below in the comments the root domain s3 bucket, redirects correctly without cloudfront. Adding cloudfront back in and the access denied errors reappear.
both buckets have public access ie Block all public access
is set to off.
The bucket policy for both is set to:
{
"Version": "2012-10-17",
"Id": "Policy1595518880784",
"Statement": [
{
"Sid": "Stmt1595518834954",
"Effect": "Allow",
"Principal": "*",
"Action": "s3:GetObject",
"Resource": "arn:aws:s3:::example.com/*"
}
]
}
and for the subdomain bucket it has a ..:::www.example.com/*
in the resourse.
The buckets origin used in cloudfront is example.com.s3.amazonaws.com
and www.example.com.s3.amazonaws.com
The issue is with the cloudfront distribution in front of the redirect bucket. Although the autocomplete of the origin for the www bucket in cloudfront works fine, it does not work for the redirect bucket. Instead you need to add this manually and it not to be of the s3 rest api format but of the static site version. So instead enter something of the form example.com.s3-website-us-east-1.amazonaws.com
This seems a bit of like a bug in the aws console and it shouldn't autocomplete invalid bucket names infront of s3 redirecting buckets.
To troubleshoot Access Denied errors, you must know if your distribution’s origin domain name is an S3 website endpoint or an S3 REST API endpoint. Try this:
Keep in mind that, REST API endpoints use this format:
AWSDOC-EXAMPLE-BUCKET.s3.amazonaws.com
Website endpoints use this format:
AWSDOC-EXAMPLE-BUCKET.s3-website-us-east-1.amazonaws.com
Also, don't forget that if your distribution is using a website endpoint, verify the following requirements to avoid Access Denied errors:
Finally, you might want to check these posts:
How do I use CloudFront to serve a static website hosted on Amazon S3?
I’m using an S3 REST API endpoint as the origin of my CloudFront distribution. Why am I getting 403 Access Denied errors?
The answer provided by Yunti helped, and in addition I had to do the following in order to get it to work, as it would still give me 403 Forbidden
error,
Edit the CloudFront distribution to include the other CNAME
's which are used to access the site,
This is a requirement of AWS if you're going to access the CloudFront distribution by an address other than the CloudFront auto-generated one (E.g. xyadjfjfg.cloudfront.net
).
(This applies if you want to support HTTPS for the users of your site) Had to request a new certificate in AWS Certificate Manager replace the old one, to include the additional host name example.com
in my example (notice there's no subdomain at all in front of example.com
). The certificate is issued for subject *.example.com
but needed explicit host without any subdomain. My original certificate was issued to *.example.com
only with no additional domain names specified, aka Subject Alternative Name
, or SAN
. AWS CloudFront will not let you save the distribution changes if the chosen ACM certificate does not mention all the CNAME
's you have provided in the comma-separated list.
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With