-
Notifications
You must be signed in to change notification settings - Fork 3.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow option to not inject region into iam.ServicePrincipal's Principal String #2999
Comments
Thank you for converting this. It has been received and noted! We are currently pausing work on most new feature requests and community PRs for a few weeks while we are working on increasing stability and tuning to meet our consistency guidelines, however feel free to continue the conversation here in the interim! |
I'm going to close this, as something you shouldn't need to want to do. You are asking to implement your solution, rather than describe your problem. Please provide an example of a use case that's broken with the current behavior, and we will make the appropriate changes to unbreak you. |
Please re-open this. |
It seems like you are just going out of your way to be awkward and close issues. |
Here is an example of why it's an issue, if you don't believe the two of us, |
would like to re-open this as well, or get any suggestions for workarounds |
This is still an issue and affects other services like SSM |
Just following up here for anyone who may find this page - a feature flag was added in 2.51.0 which controls the injection of region in the |
5 years is a solid turnaround, I wonder why people hate CDK so much.. |
the flag in question is:
|
Note: for support questions, please first reference our documentation, then use Stackoverflow. This repository's issues are intended for feature requests and bug reports.
I'm submitting a ...
What is the current behavior?
If the current behavior is a 🪲bug🪲: Please provide the steps to reproduce
When using new
iam.ServicePrincipal()
- the CloudFormation that is output injects the region into the Principal and there is no option to disable this behavior.There should be an optional parameter to not inject the region into the principal in the properties passed into new iam.ServicePrincipal().
Sometimes the console ignores roles with this region set in specific scenarios (certain CodeDeploy stuff). It is also useful to give devs the option to have this flexibility
Please tell us about your environment:
Other information (e.g. detailed explanation, stacktraces, related issues, suggestions how to fix, links for us to have context, eg. associated pull-request, stackoverflow, gitter, etc)
This expands on the discussion here #2622
The text was updated successfully, but these errors were encountered: