-
Notifications
You must be signed in to change notification settings - Fork 204
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Lambda ARN missing from IAM Role #201
Comments
I might be missing something, but I have no clue what that would be. I removed the whole stack, did a clean deploy, policy still misses the ARN. If I add it manually, all is peachy again. |
@levegetarien it's because we generate the IAM permissions by matching against the |
in this case, the |
🎉 This issue has been resolved in version 1.21.0 🎉 The release is available on: Your semantic-release bot 📦🚀 |
This is a (Bug Report / Feature Proposal)
Description
When implementing Callbacks in step functions, the IAM policy that gets generated does not include the ARN of the Lambda (Task).
The step function looks like this:
The IAM policy that gets generated does contain all ARN of other lambdas included in the step, but not when using the ARN nested in the
Parameters
field. The resulting policy (and role) won't allow the step to invoke the lambda.Additional Data
The text was updated successfully, but these errors were encountered: