-
Notifications
You must be signed in to change notification settings - Fork 101
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow Ref types for a Statement's Resource attribute #55
Comments
I believe that this is valid, and is licensed in the grammar: http://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_grammar.html
The main issue I believe is that awacs doesn't know anything about Refs (and my understanding is that awacs should be viewed as an independent module from troposphere), or other stringlike objects. It might be a good idea to give a "is_string_coercable" method to classes that should be treated as strings for this purpose. This will provide an interface that awacs can then take advantage of. |
s3.ARN('mybucket') <== This works and returns the correct ARN In the template, I see I recommend you document this issue in the docs, since many people are using troposphere and awacs together. |
Similar problem appears with using conditionals inside Statements. Something like this:
is entirely valid in CloudFormation, but will not work with troposphere. |
I ran into this limitation when trying to create a CloudFormation template including a policy document statement whose resource ARN references the template's region and account id ( |
I also ran into issues because Refs aren't supported. What would be the best way to solve this? Re-implement Refs and all the other string manipulation functions in awacs or try to import it from troposphere? A workaround is to just write raw JSON, for example: aws.Statement(
Effect="Allow",
Action=[aws.Action("logs", "CreateLogGroup")],
Resource=[
{
"Fn::Join": ["", [
"arn:aws:logs:",
{"Ref": "AWS::Region"},
":",
{"Ref": "AWS::AccountId"},
":*"
]]
}
]
) |
I've created a fork which solves the issue for me but probably isn't sufficiently generalized to be merged upstream: https://github.com/cloudtools/awacs/compare/master...clara-labs:arn-troposphere-join?expand=1 I doubt it's acceptable to always use troposphere to construct ARNs if it can be imported. Maybe this can serve as a straw man for discussion. What if we looked for any troposphere related instance in the ARN's parts and only used it in that case? |
Is there anything that still doesn't work? Can this be closed? |
Hi,
Currently it seems like
awacs.aws.Statement
's Resource attr can only be alist
(https://github.com/cloudtools/awacs/blob/master/awacs/aws.py#L143)It would be useful to allow passing in a
troposphere.Ref
object because then you can have a CommaDelimitedList parameter which contains the resources you want to create the policy for.I guess this could be done with a callable, like the
Effect
type check inStatement
, although it feels like there could be a more general solution that could be useful for all types, not just Statement.Thanks
The text was updated successfully, but these errors were encountered: