Skip to content

Commit

Permalink
Adding lambda get function for PC prevalidation KIA lambda check (#2390)
Browse files Browse the repository at this point in the history
Summary:
Pull Request resolved: #2390

Currently, our cb instance is not supporting kia_service status checking, and it'll display the error as below when we fetch the kia_service from our smart platform:
"Failed to fetch Lambda status during resource check.
Error: User: arn:aws:sts::046312032962:assumed-role/vg-onebox-111-feb2-ConversionsApiGatewayIamRole-toCtIrRgJBMz/i-0de4416bd949ed716 is not authorized to perform: lambda:GetFunction on resource: arn:aws:lambda:us-west-2:046312032962:function:cb-kia-5ujbtee-t0ug because no identity-based policy allows the lambda:GetFunction action (Service: AWSLambda; Status Code: 403; Error Code: AccessDeniedException; Request ID: 2199e72e-a5c4-4dc0-bef1-47fb848a9e04; Proxy: null)"
To resolve this issue, we can add lambda:GetFunction to the existing I AM policy.

Reviewed By: jinxinl22, chennyc

Differential Revision: D53434002

fbshipit-source-id: 02e472e1cb4e672b072d0356d59292f61ea6a7c5
  • Loading branch information
Ankush Singh authored and facebook-github-bot committed Feb 5, 2024
1 parent b79df09 commit 23ee45b
Showing 1 changed file with 2 additions and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -54,7 +54,8 @@
},
{
"Action": [
"lambda:InvokeFunction"
"lambda:InvokeFunction",
"lambda:GetFunction"
],
"Effect": "Allow",
"Resource": "arn:aws:lambda:${REGION}:${ACCOUNT_ID}:function:${KIA_LAMBDA_NAME}"
Expand Down

0 comments on commit 23ee45b

Please sign in to comment.