the role is indeed use by servlerss as we can see it in cloudformation stack deployment :
IAM role
arn:aws:iam::xxxxx:role/common-dev-CloudFormationExecutionRole
Error Description
The terminal output show an error where it's the user role that it is used and not the deployment for this plugin.
Command Runsls deploy --stage=dev Console Output
Error: Unable to create domain 'xxx-dev.xxx.com':
Failed to UPSERT A Alias for 'xxx-dev.xxx.com':
User: arn:aws:sts::xxx:assumed-role/SSO-Lead/firstname.lastname@xxx.com is not authorized to perform: route53:ChangeResourceRecordSets on resource: arn:aws:route53:::
hostedzone/xxxxxxx because no identity-based policy allows the route53:ChangeResourceRecordSets action
at ServerlessCustomDomain.<anonymous> (/srv/node_modules/serverless-domain-manager/dist/src/index.js:256:23)
at Generator.throw (<anonymous>)
at rejected (/srv/node_modules/serverless-domain-manager/dist/src/index.js:6:65)
at process.processTicksAndRejections (node:internal/process/task_queues:95:5)
Community Note
Bug Report
We are using a deployment Role in our serverless.yml :
the role is indeed use by servlerss as we can see it in cloudformation stack deployment :
IAM role
arn:aws:iam::xxxxx:role/common-dev-CloudFormationExecutionRole
Error Description
The terminal output show an error where it's the user role that it is used and not the deployment for this plugin.
Command Run
sls deploy --stage=dev
Console OutputDomain Manager Configuration
Versions