Skip to content

feat: Support EndpointAccessMode property for AWS::Serverless::Api#3898

Merged
reedham-aws merged 3 commits intoaws:developfrom
wandora58:develop
Mar 30, 2026
Merged

feat: Support EndpointAccessMode property for AWS::Serverless::Api#3898
reedham-aws merged 3 commits intoaws:developfrom
wandora58:develop

Conversation

@wandora58
Copy link
Copy Markdown
Contributor

Issue #, if available

#3866

Description of changes

The SecurityPolicy property was added in a recent change.

When specifying a policy that begins with SecurityPolicy_ in the SecurityPolicy property, the EndpointAccessMode property must also be specified. This change is to pass through the EndpointAccessMode property directly to the API.

https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-security-policies.html#apigateway-security-policies-endpoint-access-mode

Endpoint access mode is an additional parameter that you must specify for any REST API or custom domain name that uses an enhanced security policy that begins with SecurityPolicy_. You do this when you create your resource or if you change the security policy from a legacy policy to an enhanced policy.

Description of how you validated changes

unit & integration test

Checklist

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.

Copy link
Copy Markdown
Contributor

@valerena valerena left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It looks good. We're checking with other people from the API Gateway service team to confirm that everything is okay.

Copy link
Copy Markdown
Contributor

@iph iph left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the PR! Some minor suggestions here and there around testing (and the random comment :) ).

I'm fine with it being in a separate PR (I can handle it after), but this doesn't solve for all use cases of EndpointAccessMode.

Essentially, you can add tls policies in 2 places:

  • Rest APIs
  • Custom Domains

hence, those are also the places you can add EndpointAccessMode. This covers Rest APIs but does not cover Custom Domains.

@seshubaws seshubaws added area/api-gateway need-customer-response Maintainer response provided, waiting for customer feedback. labels Mar 27, 2026
@rowanu
Copy link
Copy Markdown
Contributor

rowanu commented Mar 30, 2026

Keen to have this so I can avoid adding a lot of CloudFormation 🙇 🙏 Thanks!

@wandora58
Copy link
Copy Markdown
Contributor Author

support Custom Domains and enhance the unit and integration test

@iph
Copy link
Copy Markdown
Contributor

iph commented Mar 30, 2026

lgtm!

@reedham-aws reedham-aws merged commit ff5fa33 into aws:develop Mar 30, 2026
7 checks passed
@valerena
Copy link
Copy Markdown
Contributor

Thanks for the contribution! This still needs to go through a deployment through the different AWS regions, so it will still take some time to be fully available.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

area/api-gateway need-customer-response Maintainer response provided, waiting for customer feedback.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants