You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
feat(app-delivery) IAM policy for deploy stack (#1165)
* The "changeset" and "apply changeset" actions can now apply role IAM permissions,
and CloudFormation Capabilities
* Updated CloudFormationCapabilities enum to include `None`
* User must set adminPermissions boolean for pipeline action
* app-delivery defaults pipelin-action capabilities to AnonymousIAM
* Document updates for proper build stage configuration
* Fixes#1151
BREAKING CHANGE: `CloudFormationCapabilities.IAM` renamed to
`CloudFormation.AnonymousIAM` and `PipelineCloudFormationDeployActionProps.capabilities?: CloudFormationCapabilities[]` has been changed to
`PipelineCloudFormationDeployActionProps.capabilities?:
CloudFormationCapabilities` no longer an array.
`PipelineCloudFormationDeployActionProps.fullPermissions?:` has been
renamed to `PipelineCloudFormationDeployActionProps.adminPermissions:`
and is required instead of optional.
// Add the necessary permissions for you service deploy action. This role is
89
+
// is passed to CloudFormation and needs the permissions necessary to deploy
90
+
// stack. Alternatively you can enable [Administrator](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_job-functions.html#jf_administrator) permissions above,
91
+
// users should understand the privileged nature of this role.
92
+
deployServiceAAction.addToRolePolicy(
93
+
newiam.PolicyStatement()
94
+
.addAction('service:SomeAction')
95
+
.addResource(myResource.myResourceArn)
96
+
// add more Action(s) and/or Resource(s) here, as needed
0 commit comments