Open go-to-k opened 1 year ago
Custom Resource Provider Role Policy missing?
However, when I retried deployment (after complete updating rollback for UPDATE_ROLLBACK_FAILED
), I succeeded...
Tried it multiple times with different stacks, but all of them will be the error at first.
And in all, retries are successful.
Provider has next policies. But no change after a successful retry.
AWSLambdaBasicExecutionRole
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"logs:CreateLogGroup",
"logs:CreateLogStream",
"logs:PutLogEvents"
],
"Resource": "*"
}
]
}
Inline
{
"Version": "2012-10-17",
"Statement": [
{
"Action": "lambda:InvokeFunction",
"Resource": [
"arn:aws:lambda:ap-northeast-1:123456789012:function:dev-main-BastionTunnel-CustomImageScannerWithDockl-hzy008aOF787",
"arn:aws:lambda:ap-northeast-1:123456789012:function:dev-main-BastionTunnel-CustomImageScannerWithDockl-hzy008aOF787:*"
],
"Effect": "Allow"
}
]
}
Retry succeeds, so I'll close it this time for now...
What policy you have added to your role? I am also getting the same AccessDenied error.
Users of this library do not need to specify explicit policies. Apparently this is a bug on the aws-cdk side.
Version: v1.0.9
When I deployed, I got the following error in CloudFormation Event message.
(This deployment has no changes in Lambda, IAM Role and IAM Policy, only Custom Resource has changes for update.)