Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

IAM role reuse not working #199

Closed
mathiasbc opened this issue Jul 26, 2016 · 2 comments
Closed

IAM role reuse not working #199

mathiasbc opened this issue Jul 26, 2016 · 2 comments

Comments

@mathiasbc
Copy link

In my organization my user does not have permission to create IAM roles. I had that permission for a couple of minutes and I was able to create the needed role for my zappa application and it worked correctly. However Zappa wasn't able to reuse that previously created role on future deployments. Complaining:

Creating LambdaPreview IAM Role... An error occurred (AccessDenied) when calling the CreateRole operation: User: arn:aws:iam::<my_arn>:user/<my_user> is not authorized to perform: iam:CreateRole on resource: arn:aws:iam::<my_arn>:role/LambdaPreview

@Miserlou
Copy link
Owner

Dang. There needs to be a more graceful way of handling this.

Zappa is currently way too aggressive about creating new Roles. If I remember correctly, it creates them if the IAM role isn't exactly the same as the local one, even if they are functionally equivalent.

This may have been solved by a new (but unpublished) feature added by @puhitaku - does this help you? #201

@Miserlou
Copy link
Owner

So now you can set "manage_roles": false along with the role_name setting to use a pre-defined role, and Zappa won't try to update it. Does that satisfy?

kalkehcoisa pushed a commit to kalkehcoisa/Zappa that referenced this issue Jan 30, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants