-
Notifications
You must be signed in to change notification settings - Fork 825
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Customize CloudFormation stack name and add Permission boundary for IAM roles #7468
Comments
No, this is not supported today. Amplify CLI uses the generated names internally so they cannot be changed. Depending on the use-case, tags might be a good alternative: https://docs.amplify.aws/cli/usage/tags
Not until the PR is merged. We do not have a timeline we can share. |
hi @vaibhavjainv - we've just launch IAM permissions boundary support. LMK if that coupled with the tags feature resolves this issue. |
@renebrandel , This is an extremely useful feature. This alleviated some of the issues for sure. However, inability to customize role names remains a pain point. A lot of organizations have standardized naming conventions for all resources. And changing governance policies is neither easy nor a quick activity that can fit in the timelines of various projects. This means we cannot use Amplify CLI that is such a useful tool. |
This issue has been automatically locked since there hasn't been any recent activity after it was closed. Please open a new issue for related bugs. Looking for a help forum? We recommend joining the Amplify Community Discord server |
Which Category is your question related to?
Amplify CLI Version
You can use
amplify -v
to check the amplify cli version on your system4.51.3
What AWS Services are you utilizing?
amplify init
Provide additional details e.g. code snippets
We have a requirement that any cloudformation template, IAM role and policy created in the account should have a prefix in the resource name like: XXX-ABCDEF123-* . However, when running "amplify init" command, there is no option for us to customize the cloudformation stack name and the AuthRoleName/UnauthRoleName. There is no option for us to add permission boundary to IAM policy either. Customer has the following questions:
There is a github pull for this feature. Is there any ETA on when this feature will be supported? Define IAM Permissions Boundary for Project #7144
Steps to reproduce the issue:
One CloudFormation stack, two IAM roles and one deployment S3 bucket will be created. They all have "amplify" as prefix in the resource name. For example, this is the team-provider-info.json file created by Amplify
The text was updated successfully, but these errors were encountered: