简体   繁体   English

用户无权执行:iam:PassRole on resource error in create AWS codepipeline

[英]User not authorized to perform: iam:PassRole on resource error in creating AWS codepipeline

I am trying to set up a continuous delivery pipeline for Lambda function following this tutorial, https://docs.aws.amazon.com/lambda/latest/dg/build-pipeline.html . I am trying to set up a continuous delivery pipeline for Lambda function following this tutorial, https://docs.aws.amazon.com/lambda/latest/dg/build-pipeline.html . This is my first time setting it up.这是我第一次设置它。 Now I am stuck on the step, creating the pipeline and it is giving me the following error when I click on the create pipeline button.现在我被困在创建管道的步骤上,当我单击创建管道按钮时,它给了我以下错误。

在此处输入图像描述

I exactly followed the steps mentioned in the link.我完全按照链接中提到的步骤进行操作。 Why am I getting that error?为什么我会收到这个错误?

You can see the preview of my configuration here.你可以在这里看到我的配置预览。

在此处输入图像描述

在此处输入图像描述

What is wrong with my configuration?我的配置有什么问题? It is giving me this error as well.它也给了我这个错误。

Stack [lambda-pipeline-stack] does not exist

Hope this helps someone - The error basically says that希望这对某人有所帮助-错误基本上是说

the lambda has no permission to perform/do iam:PassRole on a specific resource/service you are trying to use/manipulate with lambda. lambda 无权在您尝试使用/操作 lambda 的特定资源/服务上执行/执行iam:PassRole PassRole。

To solve this on your lamnda policy add this -要在您的 lamnda 政策中解决此问题,请添加 -

{
      "Effect": "Allow",
      "Action": [
        "iam:PassRole"
        ],
      "Resource": "*"
    }

暂无
暂无

声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.

相关问题 CloudFormation 无权对资源执行:iam:PassRole - CloudFormation is not authorized to perform: iam:PassRole on resource 如何解决错误""Message":"User:anonymous is notauthorized to perform: iam:PassRole on resource" - How to solve the error ""Message":"User: anonymous is not authorized to perform: iam:PassRole on resource" 消息“:”用户:匿名无权执行:iam:PassRole - Message“:”User: anonymous is not authorized to perform: iam:PassRole AWS,GitHub 操作:用户无权执行:sts:AssumeRole on resource (CodePipeline) - AWS, GitHub Action: User is not authorized to perform: sts:AssumeRole on resource(CodePipeline) 通过 iam:passrole 创建 iam 用户和 aws 机密 - creating iam user and aws secrets via iam:passrole AWS IAM / QuickSight-用户无权执行:quicksight:资源上的GetDashboardEmbedUrl - AWS IAM / QuickSight - user is not authorized to perform: quicksight:GetDashboardEmbedUrl on resource 错误代码:AccessDeniedException。 用户:arn:aws:iam::xxx:user/xxx 无权执行:lambda:CreateEventSourceMapping on resource:* - Error code: AccessDeniedException. User: arn:aws:iam::xxx:user/xxx is not authorized to perform: lambda:CreateEventSourceMapping on resource: * AWS EKS:用户无权执行:对资源执行 iam:CreateRole - AWS EKS: user is not authorized to perform: iam:CreateRole on resource 使用 CloudMan 为 AWS 创建基因组学虚拟实验室 (GVL) 时,用户未被授权执行 iam:GetRole 错误 - User not authorized to perform iam:GetRole error while creating Genomics Virtual Lab (GVL) for AWS using CloudMan 收到错误“用户:arn:aws:iam::11345636234528:user/my_Api 无权执行:secretmanager:GetSecretValue on resouce:my_Resource”? - Receiving error "User: arn:aws:iam::11345636234528:user/my_Api is not authorized to perform: secretmanager:GetSecretValue on resouce: my_Resource"?
 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM