Removed wrong IAM roles

0

I destroyed some IAM roles since they did not display a "last active" attribute. Now I cannot access my data properly.

When I try to reset my auth settings, I cannot:

NoSuchEntity - An error occurred while processing your request: The role with name us-east-1_g9F10WnFw_Manage-only cannot be found.

I'm struggling to figure out what Roles to recreate what access to give them to access my amplify environment

Not sure if this helps but here is my aws-export.js:

/* eslint-disable */
// WARNING: DO NOT EDIT. This file is automatically generated by AWS Amplify. It will be overwritten.

const awsmobile = {
    "aws_project_region": "us-east-1",
    "aws_appsync_graphqlEndpoint": "https://iai3fj7vd5hgjc22z4m7kj5tn4.appsync-api.us-east-1.amazonaws.com/graphql",
    "aws_appsync_region": "us-east-1",
    "aws_appsync_authenticationType": "API_KEY",
    "aws_appsync_apiKey": "da2-****",
    "aws_cognito_identity_pool_id": "us-east-1:0afc5fb7-9bb5-45a0-ad98-50a9a38491c0",
    "aws_cognito_region": "us-east-1",
    "aws_user_pools_id": "us-east-1_eW3yGAOvZ",
    "aws_user_pools_web_client_id": "7al4qgvvsu8qkicdsqtl9n4stv",
    "oauth": {},
    "aws_cognito_username_attributes": [
        "EMAIL"
    ],
    "aws_cognito_social_providers": [],
    "aws_cognito_signup_attributes": [],
    "aws_cognito_mfa_configuration": "OFF",
    "aws_cognito_mfa_types": [
        "SMS"
    ],
    "aws_cognito_password_protection_settings": {
        "passwordPolicyMinLength": 8,
        "passwordPolicyCharacters": [
            "REQUIRES_LOWERCASE",
            "REQUIRES_NUMBERS",
            "REQUIRES_SYMBOLS",
            "REQUIRES_UPPERCASE"
        ]
    },
    "aws_cognito_verification_mechanisms": [
        "EMAIL"
    ],
    "aws_user_files_s3_bucket": "gr-movement-storage-e48b8b36191308-staging",
    "aws_user_files_s3_bucket_region": "us-east-1"
};


export default awsmobile;
1 Respuesta
1

If you had AWS Config enabled, you can see the permissions of the IAM role you deleted. [1]

[1] Restoring an accidentally deleted IAM Policy using AWS Config | DevelopersIO
https://dev.classmethod.jp/articles/the-way-to-restore-iam-policy/

profile picture
mn87
respondido hace 2 años

No has iniciado sesión. Iniciar sesión para publicar una respuesta.

Una buena respuesta responde claramente a la pregunta, proporciona comentarios constructivos y fomenta el crecimiento profesional en la persona que hace la pregunta.

Pautas para responder preguntas