Skip to content

PMapper 1.1.5 builds edges that include role/AWSServiceRoleForSupport when performing authorization checks #108

Open
@DanHatesNumbers

Description

@DanHatesNumbers

Question

When using the principalmapper.querying.query_interface.search_authorization_full function to check if a principal is able to use 'cognito-idp:DescribeUserPoolClient' on a specific resource, it will build a chain of edges that includes 'role/AWSServiceRoleForSupport' in order to call the action being checked. Because the trust policy on this role only allows it to be assumed by the AWS service 'support.amazonaws.com', should this role be ignored when building graph edges if it isn't the starting node?

Did the Wiki Have an Answer?

I'm not sure if this behaviour is a bug or not, but if the behaviour of principalmapper.querying.query_interface.search_authorization_full function changes, then noting it in the library reference page for that function would be useful.

Metadata

Metadata

Labels

questionFurther information is requested

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions