AWS Cloudformation Role is not authorized to perform AssumeRole on Role





.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty{ height:90px;width:728px;box-sizing:border-box;
}







1















I am trying to execute a cloudformation stack which contains the following resources:




  • Codebuild project

  • Codepipeline pipeline

  • Roles needed


While trying to execute the stack, it fails with the following error:




arn:aws:iam::ACCOUNT_ID:role/CodePipelineRole is not authorized to perform AssumeRole on role arn:aws:iam::ACCOUNT_ID:role/CodePipelineRole (Service: AWSCodePipeline; Status Code: 400; Error Code: InvalidStructureException; Request ID: 7de2b1c6-a432-47e6-8208-2c0072ebaf4b)




I created the role using a managed policy, but I have already tried with a normal policy and it does not work neither.



This is the Role Policy:



CodePipelinePolicy:
Type: AWS::IAM::ManagedPolicy
Properties:
Description: 'This policy grants permissions to a service role to enable Codepipeline to use multiple AWS Resources on the users behalf'
Path: "/"
PolicyDocument:
Version: "2012-10-17"
Statement:
- Resource: "*"
Effect: "Allow"
Condition: {}
Action:
- autoscaling:*
- cloudwatch:*
- cloudtrail:*
- cloudformation:*
- codebuild:*
- codecommit:*
- codedeploy:*
- codepipeline:*
- ec2:*
- ecs:*
- ecr:*
- elasticbeanstalk:*
- elasticloadbalancing:*
- iam:*
- lambda:*
- logs:*
- rds:*
- s3:*
- sns:*
- ssm:*
- sqs:*
- kms:*


This is the Role



CodePipelineRole:
Type: "AWS::IAM::Role"
Properties:
RoleName: !Sub ${EnvironmentName}-CodePipelineRole
AssumeRolePolicyDocument:
Version: '2012-10-17'
Statement:
- Action:
- 'sts:AssumeRole'
Effect: Allow
Principal:
Service:
- codepipeline.amazonaws.com
Path: /
ManagedPolicyArns:
- !Ref CodePipelinePolicy


What intrigues me the most is that it seems like CodePipelineRole is trying to AssumeRole to itself. I'm not understanding what can be happening here.



And when I set the policy's action to *, it works! I don't know what permissions could be missing.



Thanks










share|improve this question























  • Are you trying ot use the same role for the CodePipeline role and the CloudFormation or action role? Try a different role and see if the error is still there.

    – TimB
    Nov 27 '18 at 17:46











  • Did you ever figure this out? I'm having the same issue.

    – user4601931
    Dec 28 '18 at 7:57











  • Same problem here, any answer yet?

    – David J Eddy
    Jan 24 at 18:12











  • Just had this happen to me for a codepipeline. I ended up waiting a couple minutes and clicked create again and it just worked

    – Frank
    Apr 3 at 15:34


















1















I am trying to execute a cloudformation stack which contains the following resources:




  • Codebuild project

  • Codepipeline pipeline

  • Roles needed


While trying to execute the stack, it fails with the following error:




arn:aws:iam::ACCOUNT_ID:role/CodePipelineRole is not authorized to perform AssumeRole on role arn:aws:iam::ACCOUNT_ID:role/CodePipelineRole (Service: AWSCodePipeline; Status Code: 400; Error Code: InvalidStructureException; Request ID: 7de2b1c6-a432-47e6-8208-2c0072ebaf4b)




I created the role using a managed policy, but I have already tried with a normal policy and it does not work neither.



This is the Role Policy:



CodePipelinePolicy:
Type: AWS::IAM::ManagedPolicy
Properties:
Description: 'This policy grants permissions to a service role to enable Codepipeline to use multiple AWS Resources on the users behalf'
Path: "/"
PolicyDocument:
Version: "2012-10-17"
Statement:
- Resource: "*"
Effect: "Allow"
Condition: {}
Action:
- autoscaling:*
- cloudwatch:*
- cloudtrail:*
- cloudformation:*
- codebuild:*
- codecommit:*
- codedeploy:*
- codepipeline:*
- ec2:*
- ecs:*
- ecr:*
- elasticbeanstalk:*
- elasticloadbalancing:*
- iam:*
- lambda:*
- logs:*
- rds:*
- s3:*
- sns:*
- ssm:*
- sqs:*
- kms:*


This is the Role



CodePipelineRole:
Type: "AWS::IAM::Role"
Properties:
RoleName: !Sub ${EnvironmentName}-CodePipelineRole
AssumeRolePolicyDocument:
Version: '2012-10-17'
Statement:
- Action:
- 'sts:AssumeRole'
Effect: Allow
Principal:
Service:
- codepipeline.amazonaws.com
Path: /
ManagedPolicyArns:
- !Ref CodePipelinePolicy


What intrigues me the most is that it seems like CodePipelineRole is trying to AssumeRole to itself. I'm not understanding what can be happening here.



And when I set the policy's action to *, it works! I don't know what permissions could be missing.



Thanks










share|improve this question























  • Are you trying ot use the same role for the CodePipeline role and the CloudFormation or action role? Try a different role and see if the error is still there.

    – TimB
    Nov 27 '18 at 17:46











  • Did you ever figure this out? I'm having the same issue.

    – user4601931
    Dec 28 '18 at 7:57











  • Same problem here, any answer yet?

    – David J Eddy
    Jan 24 at 18:12











  • Just had this happen to me for a codepipeline. I ended up waiting a couple minutes and clicked create again and it just worked

    – Frank
    Apr 3 at 15:34














1












1








1








I am trying to execute a cloudformation stack which contains the following resources:




  • Codebuild project

  • Codepipeline pipeline

  • Roles needed


While trying to execute the stack, it fails with the following error:




arn:aws:iam::ACCOUNT_ID:role/CodePipelineRole is not authorized to perform AssumeRole on role arn:aws:iam::ACCOUNT_ID:role/CodePipelineRole (Service: AWSCodePipeline; Status Code: 400; Error Code: InvalidStructureException; Request ID: 7de2b1c6-a432-47e6-8208-2c0072ebaf4b)




I created the role using a managed policy, but I have already tried with a normal policy and it does not work neither.



This is the Role Policy:



CodePipelinePolicy:
Type: AWS::IAM::ManagedPolicy
Properties:
Description: 'This policy grants permissions to a service role to enable Codepipeline to use multiple AWS Resources on the users behalf'
Path: "/"
PolicyDocument:
Version: "2012-10-17"
Statement:
- Resource: "*"
Effect: "Allow"
Condition: {}
Action:
- autoscaling:*
- cloudwatch:*
- cloudtrail:*
- cloudformation:*
- codebuild:*
- codecommit:*
- codedeploy:*
- codepipeline:*
- ec2:*
- ecs:*
- ecr:*
- elasticbeanstalk:*
- elasticloadbalancing:*
- iam:*
- lambda:*
- logs:*
- rds:*
- s3:*
- sns:*
- ssm:*
- sqs:*
- kms:*


This is the Role



CodePipelineRole:
Type: "AWS::IAM::Role"
Properties:
RoleName: !Sub ${EnvironmentName}-CodePipelineRole
AssumeRolePolicyDocument:
Version: '2012-10-17'
Statement:
- Action:
- 'sts:AssumeRole'
Effect: Allow
Principal:
Service:
- codepipeline.amazonaws.com
Path: /
ManagedPolicyArns:
- !Ref CodePipelinePolicy


What intrigues me the most is that it seems like CodePipelineRole is trying to AssumeRole to itself. I'm not understanding what can be happening here.



And when I set the policy's action to *, it works! I don't know what permissions could be missing.



Thanks










share|improve this question














I am trying to execute a cloudformation stack which contains the following resources:




  • Codebuild project

  • Codepipeline pipeline

  • Roles needed


While trying to execute the stack, it fails with the following error:




arn:aws:iam::ACCOUNT_ID:role/CodePipelineRole is not authorized to perform AssumeRole on role arn:aws:iam::ACCOUNT_ID:role/CodePipelineRole (Service: AWSCodePipeline; Status Code: 400; Error Code: InvalidStructureException; Request ID: 7de2b1c6-a432-47e6-8208-2c0072ebaf4b)




I created the role using a managed policy, but I have already tried with a normal policy and it does not work neither.



This is the Role Policy:



CodePipelinePolicy:
Type: AWS::IAM::ManagedPolicy
Properties:
Description: 'This policy grants permissions to a service role to enable Codepipeline to use multiple AWS Resources on the users behalf'
Path: "/"
PolicyDocument:
Version: "2012-10-17"
Statement:
- Resource: "*"
Effect: "Allow"
Condition: {}
Action:
- autoscaling:*
- cloudwatch:*
- cloudtrail:*
- cloudformation:*
- codebuild:*
- codecommit:*
- codedeploy:*
- codepipeline:*
- ec2:*
- ecs:*
- ecr:*
- elasticbeanstalk:*
- elasticloadbalancing:*
- iam:*
- lambda:*
- logs:*
- rds:*
- s3:*
- sns:*
- ssm:*
- sqs:*
- kms:*


This is the Role



CodePipelineRole:
Type: "AWS::IAM::Role"
Properties:
RoleName: !Sub ${EnvironmentName}-CodePipelineRole
AssumeRolePolicyDocument:
Version: '2012-10-17'
Statement:
- Action:
- 'sts:AssumeRole'
Effect: Allow
Principal:
Service:
- codepipeline.amazonaws.com
Path: /
ManagedPolicyArns:
- !Ref CodePipelinePolicy


What intrigues me the most is that it seems like CodePipelineRole is trying to AssumeRole to itself. I'm not understanding what can be happening here.



And when I set the policy's action to *, it works! I don't know what permissions could be missing.



Thanks







amazon-web-services amazon-cloudformation amazon-iam aws-codepipeline






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked Nov 22 '18 at 18:00









jprivillasojprivillaso

401513




401513













  • Are you trying ot use the same role for the CodePipeline role and the CloudFormation or action role? Try a different role and see if the error is still there.

    – TimB
    Nov 27 '18 at 17:46











  • Did you ever figure this out? I'm having the same issue.

    – user4601931
    Dec 28 '18 at 7:57











  • Same problem here, any answer yet?

    – David J Eddy
    Jan 24 at 18:12











  • Just had this happen to me for a codepipeline. I ended up waiting a couple minutes and clicked create again and it just worked

    – Frank
    Apr 3 at 15:34



















  • Are you trying ot use the same role for the CodePipeline role and the CloudFormation or action role? Try a different role and see if the error is still there.

    – TimB
    Nov 27 '18 at 17:46











  • Did you ever figure this out? I'm having the same issue.

    – user4601931
    Dec 28 '18 at 7:57











  • Same problem here, any answer yet?

    – David J Eddy
    Jan 24 at 18:12











  • Just had this happen to me for a codepipeline. I ended up waiting a couple minutes and clicked create again and it just worked

    – Frank
    Apr 3 at 15:34

















Are you trying ot use the same role for the CodePipeline role and the CloudFormation or action role? Try a different role and see if the error is still there.

– TimB
Nov 27 '18 at 17:46





Are you trying ot use the same role for the CodePipeline role and the CloudFormation or action role? Try a different role and see if the error is still there.

– TimB
Nov 27 '18 at 17:46













Did you ever figure this out? I'm having the same issue.

– user4601931
Dec 28 '18 at 7:57





Did you ever figure this out? I'm having the same issue.

– user4601931
Dec 28 '18 at 7:57













Same problem here, any answer yet?

– David J Eddy
Jan 24 at 18:12





Same problem here, any answer yet?

– David J Eddy
Jan 24 at 18:12













Just had this happen to me for a codepipeline. I ended up waiting a couple minutes and clicked create again and it just worked

– Frank
Apr 3 at 15:34





Just had this happen to me for a codepipeline. I ended up waiting a couple minutes and clicked create again and it just worked

– Frank
Apr 3 at 15:34












0






active

oldest

votes












Your Answer






StackExchange.ifUsing("editor", function () {
StackExchange.using("externalEditor", function () {
StackExchange.using("snippets", function () {
StackExchange.snippets.init();
});
});
}, "code-snippets");

StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "1"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});

function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});


}
});














draft saved

draft discarded


















StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53436197%2faws-cloudformation-role-is-not-authorized-to-perform-assumerole-on-role%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown

























0






active

oldest

votes








0






active

oldest

votes









active

oldest

votes






active

oldest

votes
















draft saved

draft discarded




















































Thanks for contributing an answer to Stack Overflow!


  • Please be sure to answer the question. Provide details and share your research!

But avoid



  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.


To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53436197%2faws-cloudformation-role-is-not-authorized-to-perform-assumerole-on-role%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

Biblatex bibliography style without URLs when DOI exists (in Overleaf with Zotero bibliography)

ComboBox Display Member on multiple fields

Is it possible to collect Nectar points via Trainline?