Skip to content

Commit eb8ad5a

Browse files
authored
fix: stackset AdminRole should assume the ExecRole (#3704)
We had a typo in the stackset IAM roles for the past 3 years 😱. However, there was no impact for the customer because all stack set instances are created within the same AWS account. Since the `ExecutionRole` allows `sts:AssumeRole` to the `AdministrationRole` and both roles live in the same IAM account (see https://serverfault.com/questions/944254/aws-iam-assumerole-within-same-account/1021603#1021603) the `AdministrationRole` could always assume the `ExecutionRole`. Although this bug has no impact, we should fix it because it's confusing to read that the `AdministrationRole` can assume itself when it should be `ExecutionRole` instead. By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the Apache 2.0 License.
1 parent ba68716 commit eb8ad5a

File tree

1 file changed

+1
-1
lines changed
  • internal/pkg/template/templates/app

1 file changed

+1
-1
lines changed

internal/pkg/template/templates/app/app.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ Resources:
5050
Action:
5151
- sts:AssumeRole
5252
Resource:
53-
- !Sub 'arn:${AWS::Partition}:iam::*:role/${AdminRoleName}'
53+
- !Sub 'arn:${AWS::Partition}:iam::*:role/${ExecutionRoleName}'
5454
ExecutionRole:
5555
Type: AWS::IAM::Role
5656
Properties:

0 commit comments

Comments
 (0)