generated from amazon-archives/__template_Apache-2.0
-
Notifications
You must be signed in to change notification settings - Fork 635
Open
Labels
bugSomething isn't workingSomething isn't working
Description
Describe the bug
According to documentation, you can use the name of the policy or ARN to add awsManaged policy to a group (https://awslabs.github.io/landing-zone-accelerator-on-aws/latest/typedocs/interfaces/packages__aws-accelerator_config_lib_models_iam-config.IPoliciesConfig.html#awsmanaged)
But adding the arn is causing failures in the Operations action of the pipeline:
Resource handler returned message: "ARN arn:aws:iam::aws:policy/arn:aws:iam::aws:policy/SecurityAudit is not valid.
To Reproduce
Create a IAM groupset:
- deploymentTargets:
accounts:
- AccountA
groups:
- name: name-of-group
policies:
awsManaged:
- arn:aws:iam::aws:policy/SecurityAudit
Expected behavior
According to docs this should work using ARN, but seems like it you need to use the name of the policy.
Please complete the following information about the solution:
- Version: v1.14.2
- Region: eu-north-1
- Was the solution modified from the version published on this repository?
- If the answer to the previous question was yes, are the changes available on GitHub?
- Have you checked your service quotas for the services this solution uses?
- Were there any errors in the CloudWatch Logs?
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
bugSomething isn't workingSomething isn't working