Skip to content
Discussion options

You must be logged in to vote

It was resolved by adding kms:decrypt permissions:

const role = new aws_iam.Role(this, 'BucketDeploymentRole',
    {
      assumedBy: new aws_iam.ServicePrincipal('lambda.amazonaws.com'),
      managedPolicies: [
        new aws_iam.ManagedPolicy(this, 'Policy', {
          statements: [
            new aws_iam.PolicyStatement({
              sid: "kmsPolicy",
              effect: aws_iam.Effect.ALLOW,
              actions: [
                "kms:Decrypt"
              ],
              resources: ["*"],
            })
          ]
        })
      ]
    });
    
    new BucketDeployment(this, 'DeployAssets', {
      sources: [
        Source.asset(
          path.join(__dirname, 'assets'…

Replies: 2 comments

Comment options

You must be logged in to vote
0 replies
Answer selected by AndreySamakhval
Comment options

You must be logged in to vote
0 replies
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
1 participant