-
Notifications
You must be signed in to change notification settings - Fork 273
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Permissions on ca-central-1 lambda bucket #564
Comments
It looks like this might be related to the user you are using to create the CloudFormation stack. AWS provided this insight:
|
Hmmm, I'm using a different set of users in my stack, but its the same IAM permissions as the other regions and they worked all fine. I thought those buckets/paths were fully publicly accessible? |
The key element here is the user that is creating the stack. Yes those bucket/paths are fully accessible, but check out point 2 in the above from AWS. |
I'm misunderstanding, I don't see what the Cloudformation stack or role is relevant with the bucket policy? 2 examples below: For example, here is a random account I'm authenticating against in ap-southeast-2:
Now here is another random account with ca-central-1:
|
So many face palms. You are right, we are getting this same error for some that do exist, but in this case you are correct and we haven't published the scaler there! Sorry! Seeing zebras when I should be seeing horses 🦓 |
Haha, great. I thought I was going crazy for a second. IAM will do that to you. I just put a workaround in place by moving the lambda in my stack code and push it up as a file rather than fetching from S3. |
I'll get buildkite/buildkite-agent-scaler#11 into 4.3.2 on Monday |
:(
The text was updated successfully, but these errors were encountered: