-
Notifications
You must be signed in to change notification settings - Fork 57
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AWS::CloudFormation::StackSet - enable SERVICE_MANAGED permission model in delegated account #799
Comments
This one's very important to my org too! We have a feature request open for this bug - I believe the more of us who add our voices to the feature request, the higher priority it will become... |
Just hit this issue myself. Want to use a delegated security account to deploy guardduty members across all accounts in my control tower, but alas I must create this stack set in the maanagement account. Is this a bug or feature request? ;) |
Running into this same issue. |
Hi folks, StackSets PM here. This is a miss on our part. We are aware of the missing support for creating and managing a Service Managed StackSet from a registered Delegated Admin account in your AWS Organization using the |
Thanks @anandsurada ! |
Just tripped over this myself. Annoying as the error message makes it seems like it's supported when it's not. |
Please get this resolved soon... it just stopped my project in its tracks. |
Any updates on this please team? @anandsurada |
There's now a |
Hi folks, Yes, we launched this yesterday! The CallAs attribute should now be available in the StackSet Resource. Thanks @jfoy for sharing the documentation link here. |
Confirmed - I just tried this and it worked first time. And still 6 weeks left in Q2 @anandsurada ! :) Thanks! |
@anandsurada Do you know if this update has enabled CodePipeline to create service managed StackSets as mentioned in #796 or would implementation fall to a different team? |
@anandsurada I am also interested in this functionality working for CodePipeline as well. |
Hi @PCIS-Paul, That would involve updating the StackSet action in Code Pipeline and would fall under a different team. Let me reach out to the Code Pipeline team and get their attention on #796 . |
AWS::CloudFormation::StackSet can successfully use
PermissionModel: SERVICE_MANAGED
in the management account of an AWS Organization, but it currently fails in a delegated account with failureYou must be the master or delegated admin account of an organization before operating a SERVICE_MANAGED stack set
.Note that I tested deploying a stack set in the delegated account through the web console and was successful, so I suspect this might be something to do with CloudFormation needing to set
callAs
on the call tocreateStackSet
(https://docs.aws.amazon.com/AWSCloudFormation/latest/APIReference/API_CreateStackSet.html)The text was updated successfully, but these errors were encountered: