You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
to the agentcore package. Update also the gateway construct to support the credentials providers when configuring outbound auth for a target
Reason for this change
Feature gap
Description of changes
Updated the existing gateway construct
Added a new folder with the new L2 constructs for identity
BREAKING CHANGE: ICredentialProviderConfig.grantNeededPermissionsToRole parameter renamed from role (IRole) to gateway (IGateway) so the implementation can derive scoped resource ARNs (e.g. workload identity wildcards keyed on gateway name) and attach policies to the gateway's execution role in a single call, rather than requiring callers to pass both separately.
Describe any new or updated permissions being added
Exposed the permissions specific to the identity providers
Description of how you validated changes
added unit tests
added integration tests
deployed couple of examples:
Examples:
Created a cdk stack linking against the custom package
⚠️Experimental Feature: This security report is currently in experimental phase. Results may include false positives and the rules are being actively refined. This security report is NOT a review blocker. Please try merge from main to avoid findings unrelated to the PR.
To suppress a specific rule, see Suppressing Rules.
⚠️Experimental Feature: This security report is currently in experimental phase. Results may include false positives and the rules are being actively refined. This security report is NOT a review blocker. Please try merge from main to avoid findings unrelated to the PR.
To suppress a specific rule, see Suppressing Rules.
This PR cannot be merged because it has conflicts. Please resolve them. The PR will be considered stale and closed if it remains in an unmergeable state.
Thank you for contributing! Your pull request will be updated from main and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork).
✅ Entered queue — 2026-05-06 10:27 UTC · Rule: default-squash
🚫 Left the queue — 2026-05-06 10:54 UTC · at a8fe50443cf7b5ff34aab3d20e0bcaa5a5eb4da7
This pull request spent 26 minutes 41 seconds in the queue, with no time running CI.
Reason
The pull request can't be updated
For security reasons, Mergify can't update this pull request. Try updating locally.
GitHub response: refusing to allow a GitHub App to create or update workflow .github/workflows/pr-issue-check.yml without workflows permission
Hint
You should update or rebase your pull request manually. If you do, this pull request will automatically be requeued once the queue conditions match again.
If you think this was a flaky issue, you can requeue the pull request, without updating it, by posting a @mergifyio queue comment.
Thank you for contributing! Your pull request will be updated from main and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork).
Thank you for contributing! Your pull request will be updated from main and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork).
Thank you for contributing! Your pull request will be updated from main and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork).
Thank you for contributing! Your pull request will be updated from main and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork).
Comments on closed issues and PRs are hard for our team to see.
If you need help, please open a new issue that references this one.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Labels
p2pr/needs-further-reviewPR requires additional review from our team specialists due to the scope or complexity of changes.priority-prpush the PR to priority squash queuevalued-contributor[Pilot] contributed between 6-12 PRs to the CDK
5 participants
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Issue # (if applicable)
Add L2 CDK constructs for:
to the agentcore package. Update also the gateway construct to support the credentials providers when configuring outbound auth for a target
Reason for this change
Feature gap
Description of changes
Describe any new or updated permissions being added
Exposed the permissions specific to the identity providers
Description of how you validated changes
Examples:
With:
The following resources are deployed:
Deploys correctly
Checklist
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license