Skip to content
This repository was archived by the owner on Jul 21, 2025. It is now read-only.
This repository was archived by the owner on Jul 21, 2025. It is now read-only.

Improve error handling for missing IAM policy action for assumed IAM role #21

@DjangoFett

Description

@DjangoFett

Would be nice to throw an error when an action is missing from an IAM policy instead of failing to run.
Even better would be to have some sort of error displayed on the UI to save the trouble of logging into the container for find that it failed to run.

Added the error in question below that I found while installing this the first time.

  File "/opt/staging/limits.py", line 68, in <module>
    dms_limits = dms.describe_account_attributes()
  File "/usr/local/lib/python3.4/site-packages/botocore/client.py", line 314, in
 _api_call
    return self._make_api_call(operation_name, kwargs)
  File "/usr/local/lib/python3.4/site-packages/botocore/client.py", line 612, in
 _make_api_call
    raise error_class(parsed_response, operation_name)
botocore.exceptions.ClientError: An error occurred (AccessDeniedException) when
calling the DescribeAccountAttributes operation: User: arn:aws:sts::[ACCOUNT]
:assumed-role/[ROLENAME]/limit_dashboard is not authorized to perform: dms:Des
cribeAccountAttributes

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions