-
Notifications
You must be signed in to change notification settings - Fork 3.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
(@aws-cdk/aws-s3): Use pre-defined role for autoDeleteObjects
#17198
Comments
I don't think we're going to add this property. In the short term, you could do one of:
In the long term, this would be covered by something like: aws/aws-cdk-rfcs#25 Does that give you enough to go on? |
Yeah, I think we found a workaround. I was kinda hoping that this functionality was already in place and easy to use, and I was just missing it somehow :) Thanks! |
|
@TheJoshuaEvans can you please share the workaround you have implemented ? I'm trying to reach the lambda role which is generated for this auto delition nd can't figure it out (all advanced concepts are "in learning progress" so I do not quite follow what rix0rr said above) |
I believe our work around was... To not use the auto-delete functionality :( |
Ok to bad ;(. |
@TheJoshuaEvans fyi:
It is sad that those kind of examples are not in AWS docs |
Description
When creating an S3 bucket with
autoDeleteObjects
set to true, CDK will generate a bespoke Lambda function that handles deletion of any S3 Objects. Can the properties of this bespoke function be modified? Specifically, can a pre-defined IAM Role be provided to the S3 constructor for use in the auto delete Lambda?Use Case
I work for a vendor working with a larger company. We are working in their AWS account, but for security reasons we are not allowed to create or modify IAM roles (I am aware that permission boundaries exist to handle this specific problem... we are working on it). We can just disable this feature to get by, but I would prefer if we didn't have to
Proposed Solution
For backwards compatibility, could add an additional construct prop, something like
autoDeleteObjectsRoleArn
that takes the ARN of the desired role:Other information
To be even more specific, the following IAM actions are banned:
Acknowledge
The text was updated successfully, but these errors were encountered: