ForAnyValue:NumericEquals
Warning:
As far as we know ForAnyValue:
NumericEquals
can never be used because there are no
context keys available that are an array of numbers. This is here as an example of
how it could work, but if you see this in the wild, it's probably a mistake.
It's totally possible this is a mistake on our part, if you think we got this wrong please send an email to wroooong
at cloudcopilot.io
and we'll get it fixed up.
ForAnyValue: NumericEquals
ForAnyValue:
NumericEquals
compares a list of numbers in a request to a list of numbers in your policy.
To match a request, the context key must exist in the request and at least one number in the request must match one of the numbers in your policy.
You can NOT use policy variables in the value of this operator.
ForAnyValue: NumericEquals in an Allow Statement
Click into any of these polices and change them test how they change the result.
Given the Policy Condition: |
"ForAnyValue:NumericEquals": { "aws:NonExistent": [ "10", "100" ] } |
When the Request Context has: |
aws:NonExistent: null |
Then the result is: |
Not Allowed Statement does not apply |
Given the Policy Condition: |
"ForAnyValue:NumericEquals": { "aws:NonExistent": [ "10", "100" ] } |
When the Request Context has: |
aws:NonExistent: |
Then the result is: |
Not Allowed Statement does not apply |
Given the Policy Condition: |
"ForAnyValue:NumericEquals": { "aws:NonExistent": [ "10", "100" ] } |
When the Request Context has: |
aws:NonExistent: |
Then the result is: |
Allowed Assuming no explicit Deny elsewhere |
Given the Policy Condition: |
"ForAnyValue:NumericEquals": { "aws:NonExistent": [ "10", "100" ] } |
When the Request Context has: |
aws:NonExistent: |
Then the result is: |
Allowed Assuming no explicit Deny elsewhere |
Given the Policy Condition: |
"ForAnyValue:NumericEquals": { "aws:NonExistent": [ "10", "100" ] } |
When the Request Context has: |
aws:NonExistent: |
Then the result is: |
Allowed Assuming no explicit Deny elsewhere |
ForAnyValue: NumericEquals in a Deny Statement
Click into any of these polices and change them test how they change the result.
Given the Policy Condition: |
"ForAnyValue:NumericEquals": { "aws:NonExistent": [ "10", "100" ] } |
When the Request Context has: |
aws:NonExistent: null |
Then the result is: |
Not Denied May be allowed by another statement |
Given the Policy Condition: |
"ForAnyValue:NumericEquals": { "aws:NonExistent": [ "10", "100" ] } |
When the Request Context has: |
aws:NonExistent: |
Then the result is: |
Not Denied May be allowed by another statement |
Given the Policy Condition: |
"ForAnyValue:NumericEquals": { "aws:NonExistent": [ "10", "100" ] } |
When the Request Context has: |
aws:NonExistent: |
Then the result is: |
Denied |
Given the Policy Condition: |
"ForAnyValue:NumericEquals": { "aws:NonExistent": [ "10", "100" ] } |
When the Request Context has: |
aws:NonExistent: |
Then the result is: |
Denied |
Given the Policy Condition: |
"ForAnyValue:NumericEquals": { "aws:NonExistent": [ "10", "100" ] } |
When the Request Context has: |
aws:NonExistent: |
Then the result is: |
Denied |