Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enable additional IAM policies for pipeline's "build" stage #1689

Closed
danieloldberg opened this issue Nov 17, 2020 · 6 comments
Closed

Enable additional IAM policies for pipeline's "build" stage #1689

danieloldberg opened this issue Nov 17, 2020 · 6 comments
Labels
area/pipeline Issues about pipelines to release applications. size/M We should be able to deliver roughly 1 medium issue in a sprint. type/feature Issues that are new feature requests. type/request Issues that are created by customers.

Comments

@danieloldberg
Copy link

Is there a way to add additional policies to copilot roles?
I currently have a need to add IAM policy to enable codebuild role to pull down from CodeArtifact.
Tried to find something in the docs but couldn't find anything.

@efekarakus efekarakus added type/feature Issues that are new feature requests. type/request Issues that are created by customers. labels Nov 17, 2020
@efekarakus
Copy link
Contributor

Heya @danieloldberg !

Hmm that's interesting, that'd be a new feature requests for us to enable additional policies to the build stage.

We have a way of adding additional IAM policies to the Task Role through the additional AWS resources feature: https://aws.github.io/copilot-cli/docs/developing/additional-aws-resources/ but that doesn't seem to be what you're asking for.

@efekarakus efekarakus changed the title Add policies to copilot roles Enable additional IAM policies for pipeline's "build" stage Nov 17, 2020
@sekamaneka
Copy link

I also need to pull something from an existing S3 bucket in the codebuild stage. I didn't find a way to do that. Adding IAM policies would help me very much!

@davivcgarcia
Copy link

I was also looking for this! My use case is to have the Build stage (CodeBuild) to get values from SSM/ParameterStore or SecretsManager, and for that I need to have specific IAM permissions added to CodeBuild, such as ssm:GetParameters or secretsmanager:GetSecretValue.

@gautam-nutalapati
Copy link
Contributor

gautam-nutalapati commented Jun 4, 2021

I was also looking for this! My use case is to have the Build stage (CodeBuild) to get values from SSM/ParameterStore or SecretsManager, and for that I need to have specific IAM permissions added to CodeBuild, such as ssm:GetParameters or secretsmanager:GetSecretValue.

Same here, we need this feature to get docker credentials stored as secrets in build pipeline. Driving force behind this is 'rate limiting implemented by docker hub'
Update: In case it's useful for anyone else, We ended up using SSM to store secrets for now. As copilot BuildProjectRole contains SSM READ permissions, it works perfectly.

@gautam-nutalapati
Copy link
Contributor

Related #2755

@efekarakus efekarakus added area/pipeline Issues about pipelines to release applications. size/M We should be able to deliver roughly 1 medium issue in a sprint. labels Aug 24, 2021
@Lou1415926
Copy link
Contributor

Closing this because #3709 resovles this!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/pipeline Issues about pipelines to release applications. size/M We should be able to deliver roughly 1 medium issue in a sprint. type/feature Issues that are new feature requests. type/request Issues that are created by customers.
Projects
None yet
Development

No branches or pull requests

6 participants