[BUG] S3 bucket access policy not created in cloudformation template and applied to MISP instance profile
sonofagl1tch opened this issue · 1 comments
sonofagl1tch commented
Describe the bug
S3 bucket access policy not created in cloudformation template and applied to MISP instance profile
To Reproduce
Steps to reproduce the behavior:
- run cloudformation template
- try and run
aws s3 cp s3://<artifact-bucket-name-here>/suricata.yaml .
- get error
fatal error: An error occurred (403) when calling the HeadObject operation: Forbidden
- cry
Expected behavior
- Create new policy in cloudformation template
- Attach new policy to MISP instance profile
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": "s3:GetObject",
"Resource": [
"arn:aws:s3:::/",
"arn:aws:s3:::$syntheticsun-artifacts"
]
}
]
}
routeronion commented
I ran into the same issue and updated the permissions.