Skip to content

Add support for IAM user name or assumed role #79

@bogdansturzoiu

Description

@bogdansturzoiu

Hi.
I was able to create a rule containing role like:

  • !Sub "arn:aws:sts::${AWS::AccountId}:assumed-role/Role1"
  • !Sub "arn:aws:iam::${AWS::AccountId}:assumed-role/Role2"

but the rule is is not satisfied when I approve a pull request, from console or terminal.
The user that appear as approver has no ARN displayed, and I assume that's why is reported as: "0 of 1 rules satisfied"

If I manually add "Approval pool members - optional" using IAM User name or assumed role" my role assumed in the console, then the rule is reported as passed.

If I try to add the rule entry as simple string, as you know the CF will throw an error because of this error: Invalid arn syntax in the ApprovalPoolMembers.

Thank you in advance

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions