Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add typical IAM policy to README #14

Closed
AntonUspishnyi opened this issue Apr 21, 2020 · 3 comments
Closed

Add typical IAM policy to README #14

AntonUspishnyi opened this issue Apr 21, 2020 · 3 comments

Comments

@AntonUspishnyi
Copy link
Contributor

I want to use this package in my CI-system, so I need to know what IAM policy create for everything works fine.

@AntonUspishnyi AntonUspishnyi changed the title Add typical IAM policy Add typical IAM policy to README Apr 21, 2020
@AntonUspishnyi
Copy link
Contributor Author

I think something like

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "ListBuckets",
            "Effect": "Allow",
            "Action": "s3:ListAllMyBuckets",
            "Resource": "arn:aws:s3:::*"
        },
        {
            "Sid": "OperateWithBucket",
            "Effect": "Allow",
            "Action": [
                "s3:PutObject",
                "s3:ListBucket",
                "s3:DeleteObject"
            ],
            "Resource": [
                "arn:aws:s3:::BUCKET_NAME",
                "arn:aws:s3:::BUCKET_NAME/*"
            ]
        },
        {
            "Sid": "CloudFrontInvalidations",
            "Effect": "Allow",
            "Action": "cloudfront:CreateInvalidation",
            "Resource": [
                "arn:aws:cloudfront::ACCOUNT_ID:distribution/DISTRIBUTION_ID"
            ]
        }
    ]
}

@apancutt
Copy link
Owner

The necessary policy permissions depend on the arguments used when calling the tool (additional permissions are required if invalidating CloudFront or setting object ACL).

I'll try to get the full scope documented in the README asap.

@apancutt
Copy link
Owner

The example provided by @AntonUspehov has been merged to master. Further examples will be required for advanced usage but closing for this issue now.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants