-
Notifications
You must be signed in to change notification settings - Fork 2.4k
Closed
Description
Description:
Invalid resource for policy template: CodePipelineLambdaExecutionPolicy
The codepipeline:PutJobSuccessResult
and codepipeline:PutJobFailureResult
actions require *
for the resource in an IAM policy statement. The statement in the policy_templates.json
is invalid:
Steps to reproduce the issue:
- Create a CFN template for a SAM
- Reference the policy template
CodePipelineLambdaExecutionPolicy: {}
- Create the stack
- Try to access the lambda function from a pipeline action
Observed result:
Pipeline times out waiting for acknowledgement from lambda function because lambda function gets access denied error:
Aws::CodePipeline::Errors::AccessDeniedException: User: arn:aws:sts::0000000000:assumed-role/aws-serverless-repository-cfn/foo is not authorized to perform: codepipeline:PutJobFailureResult
Expected result:
Lambda should be able to acknowledge the pipeline.
Tanbouz and 3goliad
Metadata
Metadata
Assignees
Labels
No labels