Skip to content
This repository has been archived by the owner on Feb 5, 2024. It is now read-only.

Misc: documentation updates + bugfixes #36

Merged
merged 4 commits into from Dec 3, 2019
Merged

Conversation

ryan-roemer
Copy link
Member

@ryan-roemer ryan-roemer commented Dec 1, 2019

Work

Sandbox Environment

I have now manually deleted the existing SLS + TF sandbox environments as they were compromised. Then I recreated both with the following:

# Re-init sandbox stage in local state as superadmin.
$ STAGE=sandbox aws-vault exec FIRST.LAST --no-session -- \
  yarn tf:service:init

# Create sandbox TF stack as superadmin.
$ STAGE=sandbox aws-vault exec FIRST.LAST --no-session -- \
  yarn tf:service:apply

# Create sandbox SLS as `-admin`
$ STAGE=sandbox aws-vault exec FIRST.LAST-admin --no-session -- \
  yarn lambda:deploy

# Re-deploy existing sandbox SLS as `-developer`
$ STAGE=sandbox aws-vault exec FIRST.LAST-developer --no-session -- \
  yarn lambda:deploy

@ryan-roemer
Copy link
Member Author

ryan-roemer commented Dec 2, 2019

@tptee -- I've reprovisioned TF and that's fine. Where I'm stuck is on SLS deploy:

$ STAGE=sandbox aws-vault exec FIRST.NAME-admin --no-session -- \
  yarn lambda:deploy

# ...

  Serverless Error ---------------------------------------
 
  An error occurred: CodeDeployServiceRole - API: iam:CreateRole User: arn:aws:iam::ACCOUNT:user/FIRST.NAME-admin is not authorized to perform: iam:CreateRole on resource: arn:aws:iam::ACCOUNT:role/sls-simple-reference-sandbox-CodeDeployServiceRole-236BX48WS9ZX.

Looks like from generated resources from serverless-plugin-canary-deployments. What do we need to do to get that hooked up to our -admin role to be able to create?

Captured in #39

@ryan-roemer ryan-roemer marked this pull request as ready for review December 2, 2019 14:57
@ryan-roemer
Copy link
Member Author

Another note: After a superadmin deploy to kick things off, get hung up with:

$ STAGE=sandbox aws-vault exec FIRST.LAST-developer --no-session --   yarn lambda:deploy

  Serverless Error ---------------------------------------
 
  An error occurred: LayersLambdaFunction - User: arn:aws:iam::ACCOUNT:user/FIRST.LAST-developer is not authorized to perform: iam:PassRole on resource: arn:aws:iam::ACCOUNT:role/tf-simple-reference-sandbox-lambda-execution (Service: AWSLambdaInternal; Status Code: 403; Error Code: AccessDeniedException; Request ID: ba06c923-6e39-46ee-9cb6-7d80fb6a399c).

Same for -admin

@ryan-roemer ryan-roemer changed the title Misc documentation updates. Misc: documentation updates + bugfixes Dec 3, 2019
@ryan-roemer ryan-roemer merged commit 84dddf3 into master Dec 3, 2019
@ryan-roemer ryan-roemer deleted the chore/doc-updates branch December 3, 2019 04:51
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

BUG: Layers function is missing permissions.
2 participants