Description
Question
When using the principalmapper.querying.query_interface.search_authorization_full function
to check if a principal is able to use 'cognito-idp:DescribeUserPoolClient' on a specific resource, it will build a chain of edges that includes 'role/AWSServiceRoleForSupport' in order to call the action being checked. Because the trust policy on this role only allows it to be assumed by the AWS service 'support.amazonaws.com', should this role be ignored when building graph edges if it isn't the starting node?
Did the Wiki Have an Answer?
I'm not sure if this behaviour is a bug or not, but if the behaviour of principalmapper.querying.query_interface.search_authorization_full function
changes, then noting it in the library reference page for that function would be useful.