You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Dec 15, 2020. It is now read-only.
Currently, pipeformer will generate a least-privilege IAM Role for each category of thing that needs to do things (CodePipeline, CodeBuild, etc).
There are cases where these roles will need to be given additional, custom, permissions. We need to provide a way of specifying this.
We should also look into separating roles more granularly, so that, for example, a deployment CodeBuild project could be given access to deployment credentials without also giving that access to a test CodeBuild project.
The text was updated successfully, but these errors were encountered:
Currently, pipeformer will generate a least-privilege IAM Role for each category of thing that needs to do things (CodePipeline, CodeBuild, etc).
There are cases where these roles will need to be given additional, custom, permissions. We need to provide a way of specifying this.
We should also look into separating roles more granularly, so that, for example, a deployment CodeBuild project could be given access to deployment credentials without also giving that access to a test CodeBuild project.
The text was updated successfully, but these errors were encountered: