Amazon web services AWS部署失败,权限不足:提供的角色没有Elasticbeanstalk:UpdateEnvironment权限

Amazon web services AWS部署失败,权限不足:提供的角色没有Elasticbeanstalk:UpdateEnvironment权限,amazon-web-services,aws-codepipeline,Amazon Web Services,Aws Codepipeline,所以,我对AWS还很陌生,我用AWS CodeStar构建了一个简单的管道。源->应用->测试版。我正试图部署到一个测试版站点,我得到了 我试着按照说明进行操作,但遇到了以下问题:步骤3“选择AWS服务角色类型,然后选择您希望允许担任此角色的服务。但这不是我看到的。我看不到选择CodePipeline的能力,我假设CodePipeline是需要访问Elastic Beanstalk的服务 我想我可能误解了他们所说的服务,并尝试了另一种方式,选择弹性豆茎,但这也偏离了说明 我尝试了此页面:,但无法

所以,我对AWS还很陌生,我用AWS CodeStar构建了一个简单的管道。源->应用->测试版。我正试图部署到一个测试版站点,我得到了

我试着按照说明进行操作,但遇到了以下问题:步骤3“选择AWS服务角色类型,然后选择您希望允许担任此角色的服务。但这不是我看到的。我看不到选择CodePipeline的能力,我假设CodePipeline是需要访问Elastic Beanstalk的服务

我想我可能误解了他们所说的服务,并尝试了另一种方式,选择弹性豆茎,但这也偏离了说明

我尝试了此页面:,但无法确定他们是如何创建默认AWS CodePipeline服务角色策略的

***************更新********************

以下是AWSCodeStarServiceRole策略

{
"Version": "2012-10-17",
"Statement": [
    {
        "Sid": "ProjectEventRules",
        "Effect": "Allow",
        "Action": [
            "events:PutTargets",
            "events:RemoveTargets",
            "events:PutRule",
            "events:DeleteRule",
            "events:DescribeRule"
        ],
        "Resource": [
            "arn:aws:events:*:*:rule/awscodestar-*"
        ]
    },
    {
        "Sid": "ProjectStack",
        "Effect": "Allow",
        "Action": [
            "cloudformation:*Stack*",
            "cloudformation:CreateChangeSet",
            "cloudformation:ExecuteChangeSet",
            "cloudformation:DeleteChangeSet",
            "cloudformation:GetTemplate"
        ],
        "Resource": [
            "arn:aws:cloudformation:*:*:stack/awscodestar-*",
            "arn:aws:cloudformation:*:*:stack/awseb-*",
            "arn:aws:cloudformation:*:*:stack/aws-cloud9-*",
            "arn:aws:cloudformation:*:aws:transform/CodeStar*"
        ]
    },
    {
        "Sid": "ProjectStackTemplate",
        "Effect": "Allow",
        "Action": [
            "cloudformation:GetTemplateSummary",
            "cloudformation:DescribeChangeSet"
        ],
        "Resource": "*"
    },
    {
        "Sid": "ProjectQuickstarts",
        "Effect": "Allow",
        "Action": [
            "s3:GetObject"
        ],
        "Resource": [
            "arn:aws:s3:::awscodestar-*/*"
        ]
    },
    {
        "Sid": "ProjectS3Buckets",
        "Effect": "Allow",
        "Action": [
            "s3:*"
        ],
        "Resource": [
            "arn:aws:s3:::aws-codestar-*",
            "arn:aws:s3:::aws-codestar-*/*",
            "arn:aws:s3:::elasticbeanstalk-*",
            "arn:aws:s3:::elasticbeanstalk-*/*"
        ]
    },
    {
        "Sid": "ProjectServices",
        "Effect": "Allow",
        "Action": [
            "codestar:*Project",
            "codestar:*Resource*",
            "codestar:List*",
            "codestar:Describe*",
            "codestar:Get*",
            "codestar:AssociateTeamMember",
            "codecommit:*",
            "codepipeline:*",
            "codedeploy:*",
            "codebuild:*",
            "ec2:RunInstances",
            "autoscaling:*",
            "cloudwatch:Put*",
            "ec2:*",
            "elasticbeanstalk:*",
            "elasticloadbalancing:*",
            "iam:ListRoles",
            "logs:*",
            "sns:*",
            "cloud9:CreateEnvironmentEC2",
            "cloud9:DeleteEnvironment",
            "cloud9:DescribeEnvironment*",
            "cloud9:ListEnvironments"
        ],
        "Resource": "*"
    },
    {
        "Sid": "ProjectWorkerRoles",
        "Effect": "Allow",
        "Action": [
            "iam:AttachRolePolicy",
            "iam:CreateRole",
            "iam:DeleteRole",
            "iam:DeleteRolePolicy",
            "iam:DetachRolePolicy",
            "iam:GetRole",
            "iam:PassRole",
            "iam:PutRolePolicy",
            "iam:SetDefaultPolicyVersion",
            "iam:CreatePolicy",
            "iam:DeletePolicy",
            "iam:AddRoleToInstanceProfile",
            "iam:CreateInstanceProfile",
            "iam:DeleteInstanceProfile",
            "iam:RemoveRoleFromInstanceProfile"
        ],
        "Resource": [
            "arn:aws:iam::*:role/CodeStarWorker*",
            "arn:aws:iam::*:policy/CodeStarWorker*",
            "arn:aws:iam::*:instance-profile/awscodestar-*"
        ]
    },
    {
        "Sid": "ProjectTeamMembers",
        "Effect": "Allow",
        "Action": [
            "iam:AttachUserPolicy",
            "iam:DetachUserPolicy"
        ],
        "Resource": "*",
        "Condition": {
            "ArnEquals": {
                "iam:PolicyArn": [
                    "arn:aws:iam::*:policy/CodeStar_*"
                ]
            }
        }
    },
    {
        "Sid": "ProjectRoles",
        "Effect": "Allow",
        "Action": [
            "iam:CreatePolicy",
            "iam:DeletePolicy",
            "iam:CreatePolicyVersion",
            "iam:DeletePolicyVersion",
            "iam:ListEntitiesForPolicy",
            "iam:ListPolicyVersions"
        ],
        "Resource": [
            "arn:aws:iam::*:policy/CodeStar_*"
        ]
    },
    {
        "Sid": "InspectServiceRole",
        "Effect": "Allow",
        "Action": [
            "iam:ListAttachedRolePolicies"
        ],
        "Resource": [
            "arn:aws:iam::*:role/aws-codestar-service-role",
            "arn:aws:iam::*:role/service-role/aws-codestar-service-role"
        ]
    },
    {
        "Sid": "IAMLinkRole",
        "Effect": "Allow",
        "Action": [
            "iam:CreateServiceLinkedRole"
        ],
        "Resource": "*",
        "Condition": {
            "StringEquals": {
                "iam:AWSServiceName": "cloud9.amazonaws.com"
            }
        }
    }
]
}

此外,我无法更新角色的权限,因为

我猜我错过了一些简单的事情,我错过了


提前感谢!

当您第一次转到AWS CodeStar控制台时,系统会提示您创建服务角色。您应该选择“是”。这将创建一个名为AWSCodeStarServiceRole的角色

此角色具有您所需的权限

此链接将引导您完成设置AWS CodeStar:


在尝试了许多调整设置和权限的方法之后,我尝试了创建一个重复的管道,所有的工作都在新管道上进行,但旧管道没有

因此,为了解决这个问题,我删除了保存在CodeStar中的管道,并创建了一个相同的新管道。然后,我删除了CodeStar中的连续部署磁贴,然后添加了一个新的连续部署磁贴,选择了我创建的新管道


这解决了问题,管道工作。

谢谢John,这很有帮助。我有角色设置,但仍然收到错误。我更新了问题以显示管道。简言之,我有3个EB环境,我正试图将代码部署到其中,它们都是第一个环境的克隆,具有不同的子域。第一个没有sub域。第二个域因上述错误而失败。通过添加标题为******Update****的新信息来更新您的问题,以便我们知道您更改了什么。请添加您正在使用的策略。下一步在配置中显示您正在使用该策略的位置。否则我只能猜测。我尝试删除了管道中的阶段失败,但下一个阶段失败,错误相同:提供的角色没有elasticbeanstalk:UpdateEnvironment权限修改角色并添加权限。