Error Code AccessDeniedException

0

When I do a deploy I get the error AccessDeniedException when creating the Type: AWS::Serverless::Function resource and in the Lambda service it doesn't let me see any function.

已提问 1 年前265 查看次数
2 回答
0

Does the IAM role used to deploy your cloudformation stack have the correct IAM Permissions to deploy/Create Lambda?

profile picture
专家
已回答 1 年前
  • My policies are: myPolicies: Type: "AWS::IAM::Policy" Properties: PolicyName: "root" PolicyDocument: Version: "2012-10-17" Statement: - Effect: "Allow" Action: - "dynamodb:DeleteItem" - "dynamodb:GetItem" - "dynamodb:PutItem" - "dynamodb:Query" - "dynamodb:Scan" - "dynamodb:UpdateItem" Resource: "arn:aws:dynamodb:::table/practica_3" - Effect: "Allow" Action: - "cognito-idp:SignUp" - "cognito-idp:ConfirmSignUp" - "cognito-idp:ResendConfirmationCode" - "cognito-idp:ForgotPassword" - "cognito-idp:ConfirmForgotPassword" - "cognito-idp:InitiateAuth" - "cognito-idp:AdminGetUser" - "cognito-idp:AdminAddUserToGroup" Resource: "" - Effect: "Allow" Action: - "logs:" Resource: "" - Effect: "Allow" Action: - "s3:" - "s3-object-lambda:" Resource: "" Roles: - Ref: "myRole"

  • I dont see any permissions to allow any actions to be performed to lambda..

    I'd be looking for something like

    { "Version": "2012-10-17", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Allow", "Action": "lambda:CreateFunction", "Resource": "*" } ] }

    Or lambda:* if you wanted all access to lambda

  • I already added this policy but even so it keeps giving me the same error and the Lambda service appears as shown in the image, in the following comment.

0

I already added this policy but it still gives me the same error and the Lambda service appears as shown in the image

已回答 1 年前
  • So it’s showing red in the gui with the user you are using. Does your iam user/role have lambda:* access and are there any scp’s or permission boundaries?

您未登录。 登录 发布回答。

一个好的回答可以清楚地解答问题和提供建设性反馈,并能促进提问者的职业发展。

回答问题的准则