(synthetics): Default role breaks in non aws partitions #12094
Labels
@aws-cdk/aws-synthetics
Related to Amazon CloudWatch Synthetics
bug
This issue is a bug.
effort/small
Small work item – less than a day of effort
p1
Synthetics Canary default execution role hard codes
'arn:aws:logs:::*'
in the IAM policy which does not work in non AWS partitions (i.e aws-cn or aws-us-gov)Reproduction Steps
Synthesize the following code (
cdk synth
) for cn-north-1What did you expect to happen?
The default execution role IAM policy should contain a partition aware log access policy
What actually happened?
The default execution role contains an IAM policy which has aws hardcoded and isn't partition aware
Environment
Other
This is 🐛 Bug Report
The text was updated successfully, but these errors were encountered: