-
Notifications
You must be signed in to change notification settings - Fork 31
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ssm:AddTagsToResource is not included in the amplify admin policies #1094
Comments
The visual editor also complained that "lambda:GetLayerVersionbyArn" doesn't exit in Full-access-Policy |
Hey @OperationalFallacy, thank you for reaching out. This look like a miss on AdministratorAccess-Amplify policy (AmplifySSMCalls) when the root stack tags are propagated to the nested stack, marking as bug. On a side note did notice the Name Join has |
Hey @OperationalFallacy, Amplify managed policy supports permissions for native categories like api, auth, storage. For custom use cases, customers will have to add permissions in their inline policy. Add |
@bzsurbhi I'm confused, what is amplify managed policy? This is also a not custom case - this is amplify cli fails to make updates because some ssm permissions missing. |
How did you install the Amplify CLI?
yarn
If applicable, what version of Node.js are you using?
v20.9.0
Amplify CLI Version
12.10.1
What operating system are you using?
Mac
Did you make any manual changes to the cloud resources managed by Amplify? Please describe the changes made.
Yes, custom category to expose api endpoint via ssm param, so cognito trigger functions can get access/config of API.
I believe this is the relevant piece in the template that causing deployment failure:
Describe the bug
Copied from the custom category template deployment
Expected behavior
amplify role should have permissions correctly configured
Reproduction steps
Project Identifier
No response
Log output
Additional information
No response
Before submitting, please confirm:
The text was updated successfully, but these errors were encountered: