-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add typical IAM policy to README #14
Comments
I think something like {
"Version": "2012-10-17",
"Statement": [
{
"Sid": "ListBuckets",
"Effect": "Allow",
"Action": "s3:ListAllMyBuckets",
"Resource": "arn:aws:s3:::*"
},
{
"Sid": "OperateWithBucket",
"Effect": "Allow",
"Action": [
"s3:PutObject",
"s3:ListBucket",
"s3:DeleteObject"
],
"Resource": [
"arn:aws:s3:::BUCKET_NAME",
"arn:aws:s3:::BUCKET_NAME/*"
]
},
{
"Sid": "CloudFrontInvalidations",
"Effect": "Allow",
"Action": "cloudfront:CreateInvalidation",
"Resource": [
"arn:aws:cloudfront::ACCOUNT_ID:distribution/DISTRIBUTION_ID"
]
}
]
} |
The necessary policy permissions depend on the arguments used when calling the tool (additional permissions are required if invalidating CloudFront or setting object ACL). I'll try to get the full scope documented in the README asap. |
Merged
The example provided by @AntonUspehov has been merged to master. Further examples will be required for advanced usage but closing for this issue now. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
I want to use this package in my CI-system, so I need to know what IAM policy create for everything works fine.
The text was updated successfully, but these errors were encountered: