-
Notifications
You must be signed in to change notification settings - Fork 3.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
@aws-cdk/aws-cognito-identitypool-alpha: allowUnauthenticatedIdentities still creates IAM role #25470
Comments
Yes I believe we should fix this:
Are you interested to submit a PR for that? |
Yeah I'll submit a PR |
A redesign of this is in progress. |
Okay, I'll wait for that. Is there a tracking issue? |
This is the the expected behaviour of IdentityPools. When |
Comments on closed issues and PRs are hard for our team to see. |
Describe the bug
Hello!
When creating an
IdentityPool
that I only want authenticated users to access I setallowUnauthenticatedIdentities
tofalse
. However, this still ends up creating an IAM role for unauthenticated users, eventhough I specified I don't need it and it's not required.Expected Behavior
When setting
allowUnauthenticatedIdentities
tofalse
, an IAM role for unauthenticated users should not be synthesized.Current Behavior
When setting
allowUnauthenticatedIdentities
tofalse
, an IAM role for unauthenticated users is being synthesized.Reproduction Steps
Possible Solution
Check if
allowUnauthenticatedIdentities
isfalse
. If so, do not synthesize the unauthenticated IAM role.Additional Information/Context
No response
CDK CLI Version
2.78.0
Framework Version
No response
Node.js Version
16.16.0
OS
MacOS
Language
Typescript
Language Version
No response
Other information
No response
The text was updated successfully, but these errors were encountered: