Warning: file_get_contents(/data/phpspider/zhask/data//catemap/1/amazon-web-services/14.json): failed to open stream: No such file or directory in /data/phpspider/zhask/libs/function.php on line 167

Warning: Invalid argument supplied for foreach() in /data/phpspider/zhask/libs/tag.function.php on line 1116

Notice: Undefined index: in /data/phpspider/zhask/libs/function.php on line 180

Warning: array_chunk() expects parameter 1 to be array, null given in /data/phpspider/zhask/libs/function.php on line 181
Amazon web services 云信息管理策略_Amazon Web Services_Api_Amazon Cloudformation - Fatal编程技术网

Amazon web services 云信息管理策略

Amazon web services 云信息管理策略,amazon-web-services,api,amazon-cloudformation,Amazon Web Services,Api,Amazon Cloudformation,我不知道如何在我的Cloudformation模板中包含策略以允许 下面的Cloudformation模板创建了一个允许执行my Lambda函数的角色。我现在需要添加一个允许API执行Lambda函数的策略。根据AWS文档,我知道我必须添加以下策略,但我不清楚如何将其附加到我拥有的模板中 { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "

我不知道如何在我的Cloudformation模板中包含策略以允许

下面的Cloudformation模板创建了一个允许执行my Lambda函数的角色。我现在需要添加一个允许API执行Lambda函数的策略。根据AWS文档,我知道我必须添加以下策略,但我不清楚如何将其附加到我拥有的模板中

{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Allow",
      "Action": [
        "execute-api:Invoke"
      ],
      "Resource": [
        "arn:aws:execute-api:us-east-1:*:a123456789/test/POST/mydemoresource/*"
      ]
    }
  ]
}
这是我当前的模板

  LambdaServiceRole:
        Type: AWS::IAM::Role
        Properties:
          AssumeRolePolicyDocument:
            Version: '2012-10-17'
            Statement:
            - Effect: Allow
              Principal:
                Service:
                - lambda.amazonaws.com
              Action: sts:AssumeRole
          ManagedPolicyArns:
          - "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole"
          Path: "/"

我相信您会希望
AssumePolicyDocument
的操作成为一个列表

LambdaServiceRole:
  Type: AWS::IAM::Role
  Properties:
    AssumeRolePolicyDocument:
      Version: '2012-10-17'
      Statement:
      - Effect: Allow
        Principal:
          Service:
          - lambda.amazonaws.com
        Action: 
          - sts:AssumeRole
    ManagedPolicyArns:
    - "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole"
    Path: "/"

您是否收到任何特殊错误?