-
Notifications
You must be signed in to change notification settings - Fork 219
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AccessDenied: User: arn:aws:iam::xxxx:user/yyy is not authorized to perform: iam:CreateRole on resource: arn:aws:iam::xxxxx:role/aws-lambda-image-executor #153
Comments
Adding the following policy to the user put me one step ahead.
Now another issue occurs:
Seems that there is no real "admin" user having access to everything. |
Modifiying the policy from latest comment and adding the action: "iam:PutRolePolicy" fixed this issue. Next issue that appears then is "user is not authorized to perform: lambda:CreateFunction on resource" There is a big zoo of missing permissions. Can someone publish a policy with all actions that are required for being whitelistet? |
This is my policy but it still fails on missing permissions for "iam:PassRole":
|
At the end some more Policy-Entries was required:
But now i stuck with
(which exists then in the root folder and needs to removed) All my attempts tell me that the script isnt able to get executed repeated like only to create a role if it is not exiting and only create a function after deleting an existing one and so on. |
Finally give up now with this one, which can't be solved even with adding the specific actions to the users policy:
What are the other people doing with this repo? Any ideas? UPDATE: finally figured out that AWS sometimes needs up to 10 minutes to apply policies |
This is the final policy that is required to deploy the lambda:
|
@itinance It seems a running user permission issue. What is user running a command? and Does that user have a permission to execute add |
^ looks like |
A huge thanks for this post. Using VS2019 ASP.Net Core and AWS. { |
|
in aws you must -> create new politic and pest the above 💥🤷♀️✔ |
Like other have said (@stewa11 and @itinance , this is the configuration to put as
|
In my case, it was solved by allowing IAM user iam:createRole and iam:createPolicy action. |
Can someone explain to me why our AWS-user having Full S3 Access isn't able to create a IAM Role?
I get this error while deploying very soon:
Any help would be greatly appreciated!
The text was updated successfully, but these errors were encountered: