Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(lambda): Policy parsing for permissions when using roles as principles #2153

Conversation

kkendzia
Copy link

Description of your changes

When using roles as principle in permissions.lambda the key is "AWS", which got lost when unmarshaling the returned policy.

I have:

  • Read and followed Crossplane's contribution process.
  • Run make reviewable test to ensure this PR is ready for review.

How has this code been tested

Ran provider locally against AWS and added unittest

@MisterMX MisterMX changed the title fix policy parsing for lambda permissions when using roles as principles fix(lambda): Policy parsing for permissions when using roles as principles Feb 3, 2025
@MisterMX
Copy link
Collaborator

MisterMX commented Feb 3, 2025

Needs rebase on #2154

Also, please adjust PR title to follow CC conventions fix(lambda): .... Thanks!

@kkendzia kkendzia force-pushed the fix/lambda_permission_policy_parsing branch from e80be49 to 483a4df Compare February 3, 2025 11:19
@kkendzia kkendzia force-pushed the fix/lambda_permission_policy_parsing branch from 483a4df to d1aab6b Compare February 3, 2025 11:20
Copy link
Collaborator

@MisterMX MisterMX left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM. Thank you very much @kkendzia!

@MisterMX MisterMX merged commit 90927aa into crossplane-contrib:master Feb 3, 2025
8 checks passed
Copy link

github-actions bot commented Feb 3, 2025

Successfully created backport PR #2160 for release-0.51.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants