如何调试cloudformation模板?策略中的语法错误。YAML 文件

Lem*_*Lem 2 configuration amazon-web-services aws-cloudformation amazon-iam

部署堆栈时遇到的错误:

Syntax errors in policy. (Service: AmazonIdentityManagement; Status Code: 400; Error Code: MalformedPolicyDocument; Request ID: 
Run Code Online (Sandbox Code Playgroud)

这是我的角色策略导致错误:

  roleEc2:
Type: AWS::IAM::Role
Properties:
  AssumeRolePolicyDocument:
    Version: "2012-10-17"
    Statement:
      -
        Effect: Allow
        Principal:
          Service:
            - 'ec2.amazonaws.com'
        Action:
            - 'sts:AssumeRole'
  Path: '/'
  Policies:
    -
      PolicyName: 'bucket-access'
      PolicyDocument:
        Version: '2012-10-17'
        Id: 'BucketPolicy'
        Statement:
        - Effect: Allow
          Action:
          - s3:ListBucket
          - s3:GetObject
          - s3:GetBucketLocation
          Resource:
          - arn:aws:s3:::code-dir
          - arn:aws:s3:::code-dir/*
          Principal: !Ref BucketPrincipal
Run Code Online (Sandbox Code Playgroud)

而且我不知道如何调试它,我不知道如何理解哪里有错误,什么行号。

小智 5

(我知道这是一年后的事了,但仍然......)我喜欢使用的一个好工具是 cfn-lint: https: //github.com/aws-cloudformation/cfn-python-lint针对您的模板运行它,它会告诉你你做错了什么,在哪一行:

代码中的问题:没有前四行,在 IAM 策略中不能有主体(最后一行)。

---
AWSTemplateFormatVersion: '2010-09-09'
Description: AoD CloudFormation Template Detective Controls
Resources:
  roleEc2:
    Type: AWS::IAM::Role
    Properties:
      AssumeRolePolicyDocument:
        Version: "2012-10-17"
        Statement:
          -
            Effect: Allow
            Principal:
              Service:
                - 'ec2.amazonaws.com'
            Action:
                - 'sts:AssumeRole'
      Path: '/'
      Policies:
        -
          PolicyName: 'bucket-access'
          PolicyDocument:
            Version: '2012-10-17'
            Id: 'BucketPolicy'
            Statement:
            - Effect: Allow
              Action:
              - s3:ListBucket
              - s3:GetObject
              - s3:GetBucketLocation
              Resource:
              - arn:aws:s3:::code-dir
              - arn:aws:s3:::code-dir/*
Run Code Online (Sandbox Code Playgroud)