You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Would it be possible to add validation of IAM ARNs?
For example the following ARN is incorrect and leads to issues that are reported only by AWS Management Console's IAM Role JSON edit mode:
'arn:aws:logs::eu-west-1::log-group:/aws/vpc/flowlogs/'
Correct IAM Role ARN:
'arn:aws:logs:eu-west-1::log-group:/aws/vpc/flowlogs/'
This validation would be really useful if it could be applied not only to statically hard-coded ARNs but to dynamically created (Fn::Join) ARNs as well.
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
-
Would it be possible to add validation of IAM ARNs?
For example the following ARN is incorrect and leads to issues that are reported only by AWS Management Console's IAM Role JSON edit mode:
'arn:aws:logs::eu-west-1::log-group:/aws/vpc/flowlogs/'
Correct IAM Role ARN:
'arn:aws:logs:eu-west-1::log-group:/aws/vpc/flowlogs/'
This validation would be really useful if it could be applied not only to statically hard-coded ARNs but to dynamically created (Fn::Join) ARNs as well.
Beta Was this translation helpful? Give feedback.
All reactions