You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I have graphql components configured to deploy to different stages each with a different provider defined in the serverless web ui with each provider being a different aws account.
When I deploy to the different stages the resources are created in the correct account, but about 50% of the time the account id in the lambda's role for invokeFunction is incorrect. When this happens making a graphql call returns an error that appsync is not able to call the lambda.
When the account id is incorrect it is an account id from one of the other 2 accounts.
When deploying to one account with one configured provider in the serverless UI it successfully created lambda invokeFunction policies with the correct account ids.
The text was updated successfully, but these errors were encountered:
hypexr
changed the title
Wrong account ids in lambda policy
Incorrect account ids in lambda policy
Feb 17, 2021
graphql 3.0.3
I have graphql components configured to deploy to different stages each with a different provider defined in the serverless web ui with each provider being a different aws account.
When I deploy to the different stages the resources are created in the correct account, but about 50% of the time the account id in the lambda's role for invokeFunction is incorrect. When this happens making a graphql call returns an error that appsync is not able to call the lambda.
When the account id is incorrect it is an account id from one of the other 2 accounts.
When deploying to one account with one configured provider in the serverless UI it successfully created lambda invokeFunction policies with the correct account ids.
The text was updated successfully, but these errors were encountered: