When creating a role allow multiple conditioned roles in assumeby property #3006
Closed
1 of 5 tasks
Labels
@aws-cdk/aws-iam
Related to AWS Identity and Access Management
closing-soon
This issue will automatically close in 4 days unless further comments are made.
duplicate
This issue is a duplicate.
feature-request
A feature should be added or improved.
response-requested
Waiting on additional info and feedback. Will move to "closing-soon" in 7 days.
Note: for support questions, please first reference our documentation, then use Stackoverflow. This repository's issues are intended for feature requests and bug reports.
I'm submitting a ...
What is the current behavior?
If the current behavior is a 🪲bug🪲: Please provide the steps to reproduce
When creating an IAM Role the assumeby property only allows a single role or multiple roles via the CompositePrincipal but the CompositePrincipal doesn't allow conditions and throws:
This can be accomplished by using the L1 CfnRole assumeRolePolicyDocument property which accepts a policy statement that allows multiple roles
could be nice to have assumeby accept an array of principals roles or have CompositePrincipal allow conditions
What is the motivation / use case for changing the behavior or adding this feature?
I can add all of the principals roles in the Role creation
Please tell us about your environment:
Other information (e.g. detailed explanation, stacktraces, related issues, suggestions how to fix, links for us to have context, eg. associated pull-request, stackoverflow, gitter, etc)
The text was updated successfully, but these errors were encountered: