-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(config): cannot scope a custom rule without configurationChanges on #8738
Conversation
While CloudFormation allows to specify the scope for a custom ConfigRule without necessarily specifying `configurationChanges: true`, this was not allowed by the corresponding construct. This removed the offending guard, and replaced the test that verified the throwing behavior with a regression test that validates this configuration is allowed.
@jogold - you had introduced this guard... Let me know if you know of invalid situations that we should still guard against. I could not find anything by browsing the documentations for the Config service. |
@RomainMuller the console experience doesn't allow to scope a rule to resources if configuration change is not checked. You first select the trigger type and then the scoping option appears: |
@jogold interesting... I have heard from a customer who claims they can deploy via CloudFormation that setup you cannot make in the console. I'll write an integration test to confirm that then... |
Yeah I confirmed CloudFormation lets you do that. Interestingly, the scope is meaningless for custom rules on a periodic-only schedule, but customers have been found using the recorded scope as a configuration point for their periodic custom rules (which is creative, but sounds reasonable to me). |
Thank you for contributing! Your pull request will be updated from master and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork). |
AWS CodeBuild CI Report
Powered by github-codebuild-logs, available on the AWS Serverless Application Repository |
Thank you for contributing! Your pull request will be updated from master and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork). |
While CloudFormation allows to specify the scope for a custom ConfigRule
without necessarily specifying
configurationChanges: true
, this wasnot allowed by the corresponding construct.
This removed the offending guard, and replaced the test that verified
the throwing behavior with a regression test that validates this
configuration is allowed.
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license