-
Notifications
You must be signed in to change notification settings - Fork 417
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enable additional IAM policies for pipeline's "build" stage #1689
Comments
Heya @danieloldberg ! Hmm that's interesting, that'd be a new feature requests for us to enable additional policies to the build stage. We have a way of adding additional IAM policies to the Task Role through the additional AWS resources feature: https://aws.github.io/copilot-cli/docs/developing/additional-aws-resources/ but that doesn't seem to be what you're asking for. |
I also need to pull something from an existing S3 bucket in the codebuild stage. I didn't find a way to do that. Adding IAM policies would help me very much! |
I was also looking for this! My use case is to have the Build stage (CodeBuild) to get values from SSM/ParameterStore or SecretsManager, and for that I need to have specific IAM permissions added to CodeBuild, such as |
Same here, we need this feature to get docker credentials stored as secrets in build pipeline. Driving force behind this is 'rate limiting implemented by docker hub' |
Related #2755 |
Closing this because #3709 resovles this! |
Is there a way to add additional policies to copilot roles?
I currently have a need to add IAM policy to enable codebuild role to pull down from CodeArtifact.
Tried to find something in the docs but couldn't find anything.
The text was updated successfully, but these errors were encountered: