3 Answers
- Newest
- Most votes
- Most comments
1
You can refer to this documentation to modify your IAM policy for using AWS Serverless Repo : https://docs.aws.amazon.com/serverlessrepo/latest/devguide/security_iam_service-with-iam.html
0
I am having this same problem, but the documentation does not offer any solutions on what to add for an access policy. Was your problem solved?
In my case, the error is coming from a cloudformation stack that is deploying the serverless repo. If I update the execution role of the stack to include s3:Get* on Resource: "*" then it works. I need to know how to scope this down
answered 6 months ago
0
The bucket name in your case is awsserverlessrepo-changesets-1my58927y6rqa
Relevant content
- asked 2 years ago
- asked 2 years ago
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 7 months ago
- AWS OFFICIALUpdated 3 months ago
- AWS OFFICIALUpdated 2 months ago
Thanks Behrang. This documentation doesn't mention any policies that would allow my deployer to access the relevant S3 bucket. Is this something I'm misunderstanding? If I were to grant my deployer the "serverlessrepo:CreateApplication" permission, would that grant it the access it needs to access the S3 bucket?