Skip to content
This repository has been archived by the owner on Jun 15, 2024. It is now read-only.

Show additional information on match-failures #3

Open
flosell opened this issue Apr 29, 2018 · 0 comments
Open

Show additional information on match-failures #3

flosell opened this issue Apr 29, 2018 · 0 comments

Comments

@flosell
Copy link
Owner

flosell commented Apr 29, 2018

For explicit allow or deny, IAM gives us more information than we show at the moment, e.g. which policy and which statement in the policy allowed it

#<struct Aws::IAM::Types::EvaluationResult eval_action_name="iam:CreateUser", eval_resource_name="*", eval_decision="allowed", matched_statements=[#<struct Aws::IAM::Types::Statement source_policy_id="AdministratorAccess", source_policy_type=nil, start_position=#<struct Aws::IAM::Types::Position line=3, column=17>, end_position=#<struct Aws::IAM::Types::Position line=8, column=6>>], missing_context_values=[], organizations_decision_detail=nil, eval_decision_details={}, resource_specific_results=[]>

We could display more detail in such a case, e.g.

Credential self service IAM Group "administrators" should not be allowed to iam:CreateUser
     Failure/Error: it {should not_be_allowed_to perform_action('iam:CreateUser')}
       iam:CreateUser was allowed because of allowed for iam:CreateUser in policy AdministratorAccess line 8, column 6

We could even extend this to get the policy and show the actual lines

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

1 participant