Skip to content
This repository has been archived by the owner on Nov 5, 2024. It is now read-only.

IAM fuctions missing name path parameter #450

Closed
cp10000 opened this issue Jan 4, 2023 · 8 comments
Closed

IAM fuctions missing name path parameter #450

cp10000 opened this issue Jan 4, 2023 · 8 comments
Assignees
Labels
feature-request New feature or request iam service-api This issue pertains to the AWS API

Comments

@cp10000
Copy link

cp10000 commented Jan 4, 2023

Describe the bug

Several aws cli IAM functions, like put-policy and others, are missing the usual "path" parameter for policy name, role name, group name, ....etc. A complete review to correct this is required. Note that some functions like create-policy or create-role already have the path parameter. But it's not consistent across all IAM functions and it should be.

Expected Behavior

All aws cli IAM functions that pass policy name or/and role name and/or group name should have a corresponding "path" parameter. It's essential for proper use of IAM.

Current Behavior

Function aws iam put-policy (and several other functions) is missing the "path" parameter.

Reproduction Steps

aws iam put-policy help

Possible Solution

No response

Additional Information/Context

No response

CLI version used

2.9.12

Environment details (OS name and version, etc.)

ubuntu 18.04

@cp10000 cp10000 added bug Something isn't working needs-triage labels Jan 4, 2023
@tim-finnigan tim-finnigan self-assigned this Jan 5, 2023
@tim-finnigan
Copy link
Contributor

Hi @cp10000 thanks for reaching out. Here is documentation on IAM paths for reference: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers.html#identifiers-friendly-names

Rather than use the put-* commands to update the path, have you tried using the update-* commands? For example, commands such as update-group have a --new-path parameter that you can use to update the path.

I hope that helps, please let us know if you have any follow up questions.

@tim-finnigan tim-finnigan added feature-request New feature or request iam response-requested This issue requires a response to continue and removed bug Something isn't working needs-triage labels Jan 5, 2023
@cp10000
Copy link
Author

cp10000 commented Jan 6, 2023 via email

@github-actions github-actions bot removed the response-requested This issue requires a response to continue label Jan 6, 2023
@tim-finnigan
Copy link
Contributor

Hi @cp10000 thanks for following up. Which specific boto3 commands are you using? The service API functionality between boto3 and the AWS CLI should be consistent. If you're requesting new IAM API functionality, then that request would need to get redirected to the IAM team as they own their service API models which are used across AWS SDKs. We recommend reaching out through AWS Support to escalate requests such as those, but we can also forward them on your behalf. Please let us know.

@tim-finnigan tim-finnigan added the response-requested This issue requires a response to continue label Jan 10, 2023
@github-actions
Copy link

Greetings! It looks like this issue hasn’t been active in longer than five days. We encourage you to check if this is still an issue in the latest release. In the absence of more information, we will be closing this issue soon. If you find that this is still a problem, please feel free to provide a comment or upvote with a reaction on the initial post to prevent automatic closure. If the issue is already closed, please feel free to open a new one.

@github-actions github-actions bot added the closing-soon This issue will be closed soon label Jan 15, 2023
@cp10000
Copy link
Author

cp10000 commented Jan 16, 2023 via email

@github-actions github-actions bot removed closing-soon This issue will be closed soon response-requested This issue requires a response to continue labels Jan 16, 2023
@tim-finnigan
Copy link
Contributor

tim-finnigan commented Jan 17, 2023

Thanks for following up and explaining the issue further — my apologies for not understanding the problem. I'm going to transfer this issue to our cross-SDK repository and escalate it to the IAM team for further review and feedback, as service teams like IAM own their API definitions.

You can see the IAM service API model definitions here in botocore: https://github.com/boto/botocore/blob/develop/botocore/data/iam/2010-05-08/service-2.json. (Both the AWS CLI and boto3 rely on botocore models, which is why I mentioned that the functionality should be consistent between the CLI and boto3.)

If there is any more information you'd like me to pass along to the IAM team please let me know, such as which specific methods you need the --path parameter for and why you can't use the --new-path parameter for update-* commands. (P79227206)

@tim-finnigan tim-finnigan added the service-api This issue pertains to the AWS API label Jan 17, 2023
@tim-finnigan tim-finnigan transferred this issue from aws/aws-cli Jan 17, 2023
@tim-finnigan
Copy link
Contributor

Checking in again — if functionality is supported in Boto3 then it should generally also work with the CLI, as both the AWS CLI and Boto3 use the same models in Botocore. We haven't received any more details or customer reports of the issue here. For any future investigations please clarify which API(s) you are referring to (https://docs.aws.amazon.com/IAM/latest/APIReference/API_Operations.html) and how you are blocked with the existing behavior.

@tim-finnigan tim-finnigan closed this as not planned Won't fix, can't repro, duplicate, stale Sep 25, 2024
Copy link

This issue is now closed.

Comments on closed issues are hard for our team to see.
If you need more assistance, please either tag a team member or open a new issue that references this one.
If you wish to keep having a conversation with other community members under this issue feel free to do so.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
feature-request New feature or request iam service-api This issue pertains to the AWS API
Projects
None yet
Development

No branches or pull requests

2 participants