"Statement": [
{
"Action": [
"*"
],
"Effect": "Allow",
"Resource": "*",
"Sid": "AdHocAdminPermissions"
}
],
"Version": "2012-10-17"
}
Гитлаб-раннер из другого акка ассюмит роль (успешно): AWS::STS::AssumedRole arn:aws:sts::xxx:assumed-role/assume-role-runner-isr-stack/1647946729028584325
...
"accessKeyId": "ASIA4RAG54GNAGNJZ7QF",
Но route53 шлет его в зад:
"eventSource": "route53.amazonaws.com",
"eventName": "GetHostedZone",
"awsRegion": "us-east-1",
"sourceIPAddress": "1.2.3.4",
"userAgent": "APN/1.0 HashiCorp/1.0 Terraform/1.0.6 (+https://www.terraform.io) terraform-provider-aws/3.75.0 (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.43.17 (go1.16; linux; amd64)",
"errorCode": "AccessDenied",
"errorMessage": "User: arn:aws:sts::xxx:assumed-role/assume-role-runner-isr-stack/1647946729028584325 is not authorized to access this resource",
что я делаю не так?
А там ведь две политики. Trust relationship настроен?
Обсуждают сегодня