Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Explain the IAM policy magic #13

Open
garnaat opened this issue Jun 27, 2016 · 2 comments
Open

Explain the IAM policy magic #13

garnaat opened this issue Jun 27, 2016 · 2 comments

Comments

@garnaat
Copy link
Collaborator

garnaat commented Jun 27, 2016

There is some pretty cool stuff going on with IAM policies but it's not explained anywhere. It's kind of cool that it just happens automatically but you definitely need a section on how it works.

Also, for the S3 example I noticed the policy just wildcards the resource. Is there anyway to figure out the actual bucket name being used and restrict the policy to just that resource?

Also, what are the limitations? What things aren't really detectable using this approach? For example, if my Lambda function has an SNS event source, I think it would be very difficult if not impossible to figure that out from the code.

@lstroud
Copy link

lstroud commented Jul 12, 2017

I agree. It would be nice if the policy generator could read a list of policy arns from the config file and append those to what it generates. That would enable incremental improvement in the generator while allowing folks to fulfill their needs until it's ready.

@dg-nvm
Copy link

dg-nvm commented May 31, 2019

Resources are just always wildcard, this feature is not usable at that state. Could ask developer about this, getting parameters for function calls is not impossible.

                    # Probably impossible, but it would be nice
                    # to even keep track of what resources are used
                    # so we can create ARNs and further restrict the policies.
'Resource': ['*'],

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants