-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(aws-iam): Permit the use of multiple actions in a policy principal #4915
Conversation
Thanks so much for taking the time to contribute to the AWS CDK ❤️ We will shortly assign someone to review this pull request and help get it
|
AWS CodeBuild CI Report
Powered by github-codebuild-logs, available on the AWS Serverless Application Repository |
AWS CodeBuild CI Report
Powered by github-codebuild-logs, available on the AWS Serverless Application Repository |
AWS CodeBuild CI Report
Powered by github-codebuild-logs, available on the AWS Serverless Application Repository |
Thanks for the contribution! I am aware of this issue, but I feel we need to address it more holistically. I think the shape of the ultimate solution will be something that doesn't violate Tell, Don't Ask so much as what we have today (probably a method that does some work to its parameters), so I'd also hate to introduce more properties that will be subsequently deprecated once we do the final version. I'm therefore not inclined to merge what feels like a stopgap solution. In the mean time, we don't allow breaking API changes, and removing a property from an interface is breaking, which is why you're experiencing build trouble. |
This is a stopgap solution, so I can abandon it. A more holistic solution would require breaking changes, though, wouldn't it? I read your comment about a composite that returned multiple statements, is that an approach you would take? I think, and disagree with me if you do, the whole approach to the principals where the policy document is given is part of the difficulty here. It seems that the document itself and the principal are inextricably linked and a working solution would be to disentangle the concepts entirely. |
closes #2041.
Doesn't address the larger policy principal, composite issues. Permits the use of multiple actions on a single policy principal.
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license