Erik Robertson
03/18/2022, 10:42 AMErik Robertson
03/18/2022, 10:43 AMFrank
Frank
thdxr
03/18/2022, 12:46 PMErik Robertson
03/18/2022, 12:53 PMthdxr
03/18/2022, 2:17 PMErik Robertson
03/18/2022, 2:23 PMthdxr
03/18/2022, 2:27 PMErik Robertson
03/18/2022, 2:29 PMDerek Kershner
03/18/2022, 6:59 PMFrank
sst start
with the default
IAM profile like this:
$ sst start --role-arn xxxx
Do u know what IAM permission does the default
profile has?Erik Robertson
03/20/2022, 6:33 PM{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"cloudformation:DescribeStacks",
"cloudformation:GetTemplate",
"cloudformation:DeleteChangeSet",
"cloudformation:CreateChangeSet",
"cloudformation:ExecuteChangeSet",
"cloudformation:DescribeChangeSet",
"cloudformation:DescribeStackEvents",
"cloudformation:DeleteStack"
],
"Resource": [
"arn:aws:cloudformation:us-west-2:ACCOUNT:stack/CDK*",
"arn:aws:cloudformation:us-west-2:ACCOUNT:stack/DEV-*"
]
},
{
"Effect": "Allow",
"Action": [
"iam:PassRole",
"sts:AssumeRole"
],
"Resource": [
"arn:aws:iam::ACCOUNT:role/DWAM-SST-CloudFormation-Role",
"arn:aws:iam::ACCOUNT:role/cdk-*"
]
},
{
"Effect": "Allow",
"Action": [
"ssm:GetParameter"
],
"Resource": "arn:aws:ssm:us-west-2:ACCOUNT:parameter/cdk-*"
},
{
"Effect": "Allow",
"Action": [
"s3:*Object",
"s3:ListBucket",
"s3:getBucketLocation"
],
"Resource": "arn:aws:s3:::cdk*"
},
{
"Effect": "Allow",
"Action": [
"s3:*Object"
],
"Resource": "arn:aws:s3:::dev-*"
},
{
"Effect": "Allow",
"Action": "secretsmanager:GetSecretValue",
"Resource": "arn:aws:secretsmanager:us-west-2:ACCOUNT:secret:CONFIG/DEV*"
},
{
"Effect": "Allow",
"Action": [
"logs:DeleteRetentionPolicy"
],
"Resource": "arn:aws:logs:us-west-2:ACCOUNT:log-group:*"
}
]
}
Frank
cloudformation:ListStacks
. Can you try temporarily giving the cloudformation:*
permission to *
resources in ur user policy just to confirm this is permission related.Frank
Erik Robertson
03/25/2022, 10:54 AMErik Robertson
04/06/2022, 10:02 AM