Skip to content

Commit 6882a72

Browse files
Updating CONTRIBUTING.md and CONTRIBUTING_COMMON_ERRORS.md (#1512)
1 parent 0545dc8 commit 6882a72

File tree

2 files changed

+23
-4
lines changed

2 files changed

+23
-4
lines changed

CONTRIBUTING.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -246,11 +246,11 @@ or
246246

247247
* To run a specific test function:
248248

249-
``pytest tests/test_db.py::test_sql``
249+
``pytest tests/test_mysql.py::test_read_sql_query_simple``
250250

251-
* To run all database test functions (Using 8 parallel processes):
251+
* To run all database test functions for MySQL (Using 8 parallel processes):
252252

253-
``pytest -n 8 tests/test_db.py``
253+
``pytest -n 8 tests/test_mysql.py``
254254

255255
* To run all data lake test functions for all python versions (Only if Amazon QuickSight is activated and Amazon OpenSearch template is deployed):
256256

CONTRIBUTING_COMMON_ERRORS.md

Lines changed: 20 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -110,4 +110,23 @@ https://stackoverflow.com/questions/54302793/dyld-library-not-loaded-usr-local-o
110110
brew install unixodbc
111111
```
112112

113-
-----
113+
-----
114+
115+
## CloudFormation Deployment
116+
117+
### Error Message
118+
119+
During the deployment of `aws-data-wrangler-databases`, the creation of the resource `CodeBuildTestRoleLFPermissions` fails with
120+
121+
```
122+
Resource does not exist or requester is not authorized to access requested permissions. (Service: AWSLakeFormation; Status Code: 400; Error Code: AccessDeniedException; Request ID: 14a26718-ee4e-49f2-a7ca-d308e49485f8; Proxy: null)
123+
```
124+
125+
### Solution
126+
127+
The IAM role used to deploy the CloudForation stack does not have permissions to assign permissions in AWS Lake Formation. The quickest solution is to find the IAM role and set it as an admin in Lake Formation.
128+
129+
In order to find the role:
130+
1. Navigate to the CloudFormation console in your account
131+
1. Select the `aws-data-wrangler-databases` stack which failed to deploy
132+
1. Under the "Stack info" tab, find the value for "IAM role". The name of the role should be in the following format: `arn:aws:iam::{ACCOUNT_ID}:role/cdk-{UUID}-cfn-exec-role-{ACCOUNT_ID}-{REGION}`

0 commit comments

Comments
 (0)