Error Code AccessDeniedException

0

When I do a deploy I get the error AccessDeniedException when creating the Type: AWS::Serverless::Function resource and in the Lambda service it doesn't let me see any function.

已提問 1 年前檢視次數 265 次
2 個答案
0

Does the IAM role used to deploy your cloudformation stack have the correct IAM Permissions to deploy/Create Lambda?

profile picture
專家
已回答 1 年前
  • My policies are: myPolicies: Type: "AWS::IAM::Policy" Properties: PolicyName: "root" PolicyDocument: Version: "2012-10-17" Statement: - Effect: "Allow" Action: - "dynamodb:DeleteItem" - "dynamodb:GetItem" - "dynamodb:PutItem" - "dynamodb:Query" - "dynamodb:Scan" - "dynamodb:UpdateItem" Resource: "arn:aws:dynamodb:::table/practica_3" - Effect: "Allow" Action: - "cognito-idp:SignUp" - "cognito-idp:ConfirmSignUp" - "cognito-idp:ResendConfirmationCode" - "cognito-idp:ForgotPassword" - "cognito-idp:ConfirmForgotPassword" - "cognito-idp:InitiateAuth" - "cognito-idp:AdminGetUser" - "cognito-idp:AdminAddUserToGroup" Resource: "" - Effect: "Allow" Action: - "logs:" Resource: "" - Effect: "Allow" Action: - "s3:" - "s3-object-lambda:" Resource: "" Roles: - Ref: "myRole"

  • I dont see any permissions to allow any actions to be performed to lambda..

    I'd be looking for something like

    { "Version": "2012-10-17", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Allow", "Action": "lambda:CreateFunction", "Resource": "*" } ] }

    Or lambda:* if you wanted all access to lambda

  • I already added this policy but even so it keeps giving me the same error and the Lambda service appears as shown in the image, in the following comment.

0

I already added this policy but it still gives me the same error and the Lambda service appears as shown in the image

已回答 1 年前
  • So it’s showing red in the gui with the user you are using. Does your iam user/role have lambda:* access and are there any scp’s or permission boundaries?

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。

回答問題指南