Kapil Thangavelu
Kapil Thangavelu
thanks, for filing the feature request, that makes sense
Actually not sure that works re list entities, as it’s really for a policy to find attached targets, whereas your looking to see all attached policies for a user including...
the new `check-permissions` filter probably gets to the end goal of checking permissions on a user regardless if policy came from inline/managed attached to user or group policies.
@sigmaris passing a list of resources as a static list in a policy? that seems fine .. that should probably be a separate issue.
@fwesselhoft I'm not aware that this filter check-permissions can be used to exhaustively generate, we have to pass in the resources to the simulate api, which would mean generating a...
s/budget/cost .. and I think the group_by will be mandatory.
Budget is a separate context, for AWS referring to a named resource that’s trove price typically at an account but also supports subsets using billing tags. This issue originally was...
so we primarily determine region support for a service based on service published sdk metadata which is accessible via >>> s.get_available_regions('bedrock') ['ap-northeast-1', 'ap-south-1', 'ap-southeast-1', 'ap-southeast-2', 'ca-central-1', 'eu-central-1', 'eu-west-1', 'eu-west-2', 'eu-west-3',...
sigh.. we might have to webscrape into a json file in the repo to get this clean, we have a makefile target for it in other cases.
I've gone through the list, and I'm just not seeing anything particularly compelling that would justify a switch over and dependency on an additional third party.