Replies: 4 comments 1 reply
-
Any news about it ????? |
Beta Was this translation helpful? Give feedback.
-
There's a very easy way to make it so aws:accountId DOES NOT actually read a valid value. In your serverless file, you can create the following param:
In this case, serverless/parametrers/environment.yml is another yaml file that contains another definition for AWS_ACCOUNT_ID.
In this case, the definition of AWS_ACCOUNT_ID goes as follows: If current stage is Then, instead of using This can actually make you work on serverless without even having an AWS account/creds. |
Beta Was this translation helpful? Give feedback.
-
Is this a bug or is there a reason why resolving aws:accountId is impossible in local environment? |
Beta Was this translation helpful? Give feedback.
-
I'm experiencing exactly the same issue. I think it's a bug and is V3 specific. If your
The only workaround I've seen is to put all This is cludgey, nasty, horrible .... It should work like this:
This is how plugins like |
Beta Was this translation helpful? Give feedback.
-
How can you use serverless offline when you have ${was:accountId} defined in your serverless.yml file without setting .aws/credentials to anything valid?
I have a setup where I create an IAM which is used as my role. This IAM references the AWS account id. Locally I assume this is meaningless, however serverless throws an error, I assume because it is trying to login to AWS to get the account ID. Shouldn't this value be faked? Is there a way to tell serverless to not go look it up?
Beta Was this translation helpful? Give feedback.
All reactions