Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Access Denied when trying to auto-delete a bucket with objects, created by other AWS services #14

Open
Dzhuneyt opened this issue Aug 13, 2020 · 0 comments

Comments

@Dzhuneyt
Copy link

I tried using this construct to create an S3 bucket that will be the target of a ReceiptRuleSet construct (see @aws-cdk/aws-ses package). In other words, the SES will send .iml files there whenever a given domain or email from a domain, configured in SES, receive incoming email.

My goal is to process these .iml files subsequently through a Lambda attached as listener, but that's not relevant to this topic.

The point is, the bucket is created by "me" as an owner (the canonical account ID of the AWS account, from which I assumed an IAM role while deploying the AWS CDK stack. The files inside though, are created by some strange "SES" related canonical user ID. As a result, when destroying the stack, the Lambda that is part of this construct is receiving "Access Denied" errors.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant