Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Pass ECR Policy with conditional constraint #2330

Conversation

MooreDerek
Copy link
Contributor

@MooreDerek MooreDerek commented Feb 3, 2022

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.

Fixes #1582

Issue 1582 - Allow an AWS ECR Policy to pass with a wildcarded Prinicipal if there is a Principal Org ID constraint conditional statement.

Copy link
Contributor

@gruebel gruebel left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

and of course adjust your code to be correctly formatted 👍

Copy link
Contributor

@gruebel gruebel left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thanks for the contribution 🥇

@gruebel gruebel merged commit 7c33005 into bridgecrewio:master Feb 5, 2022
github-actions bot pushed a commit that referenced this pull request Feb 5, 2022
* Pass ECR Policy with conditional constraint

* Update following Code Review

* Added tests for conditional ECR Policy

* Fix test count for CloudFormation

Co-authored-by: Derek Moore <derek.moore@leaven.co.nz>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

BC_AWS_PUBLIC_1 does not take Conditions into account
2 participants