-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CLI: add flag when running garbage collector to ignore non-authorized stacks #32322
Comments
Hi @TiagoVentosa , thanks for reaching out and requesting this.
But what you are suggesting also seems to be a good add-on. Requesting team's thoughts on this feature as it would be great to have their say whether its something on their radar for future implementation or would be considered from community. |
It will be unsafe to do garbage collection in that configuration. I suppose we can add a flag, but can you add a bit more color to this story? Why are you in a situation where you are trying to GC assets on an account that you don't have access to all stacks in? |
This issue has not received a response in a while. If you want to keep this issue open, please leave a comment below and auto-close will be canceled. |
@rix0rrr I can give my context. In my company a platform team is responsible for providing accounts and limiting resources on them to guarantee compliance with the platform rules. Some of these resources are provided through stacks in the accounts, but with some limitations on what the account users can use it for. I don't know specifically if GetTemplateSummary is really necessary to be blocked or not, but I do know that these stacks do not contain any assets, and even if they did, it is not assets that I would want to manage. |
The ask here is to add a flag like |
It would be cool to be able to provide a regex because for us the managed stacks all adhere to the same format. |
I would also like to ask why stacks that are not managed in the current app are considered at all? |
Describe the feature
add some kind of flag to the cdk gc command (for example --skip-unauthorized-stacks) so that when checking the stacks (GetTemplateSummary) it ignores those that the user does not have access instead of failing the command
Use Case
I was very excited for this new feature, but when I tried running it, I got the following error:
(newlines added to improve readability)
Where is a stack used my my company to do initial setup of AWS accounts.
Proposed Solution
Instead of automatically failing, have some way to ignore stacks in error. Right now I know of no way to skip it
Other Information
No response
Acknowledgements
CDK version used
2.171.1
Environment details (OS name and version, etc.)
macOS Sonoma 14.7
The text was updated successfully, but these errors were encountered: