JSON.parse(resp.Parameter.Value))};ERROR AccessDeniedException: User: arn:aws:sts::XXX:assumed-role/lambdaExecutionRole is not authorizedresource: arn:aws:ssm:us-east-1:XXX:parameter/get/getVa
我得到以下错误:"Message":"User: arn:aws:sts::AccountB:assumed-role/lambdaRole1/sourceTableToES is not authorizedto perform: es:ESHttpPost on resource: beta-na-lifeguard"我已经尝试将STS和角色放入ES访问策略(在帐户“A”内),但没有成功。"arn:aws:iam::AccountA:ro
a live connection to thests_client = boto3.client('sts')
credentials = assumed_role_object['Credentials']
# Use the temporary credentials that AssumeRolecredentials['Secret
如果你熟悉这种行为,如果我在信任关系中扮演角色的话。角色B配置 "Condition": {} ]总结一下差异:A将访问X和Y作为内联策略。User [...] is not authorized to perform: sts:AssumeRole [...]。
这是有意义的,因为Y与A没有信任</e