s3-deploy
s3-deploy copied to clipboard
Policy example
Hello!
Thank you for this great action!
However, it would be extremely helpful if someone would provide an IAM policy example with minimal required permissions for this action to work properly.
Thanks.
I'm using this one:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:PutObject",
"s3:PutObjectAcl",
"s3:GetObject",
"s3:GetObjectAcl",
"s3:DeleteObject",
"s3:ListMultipartUploadParts",
"s3:AbortMultipartUpload",
"s3:ListBucket"
],
"Resource": [
"arn:aws:s3:::bucket-name/*"
]
},
{
"Effect": "Allow",
"Action": [
"s3:ListBucket"
],
"Resource": [
"arn:aws:s3:::bucket-name"
]
},
{
"Effect": "Allow",
"Action": [
"cloudfront:CreateInvalidation",
"cloudfront:GetInvalidation",
"cloudfront:ListInvalidations"
],
"Resource": [
"arn:aws:cloudfront::dist-arn"
]
}
]
}
Would love to see a minimum required IAM policy as a part of the Documentation \ Readme. For sure, creating a role with S3FullAccess works just fine, but it is probably not the best practice.
This is available now: https://github.com/Reggionick/s3-deploy/blob/master/README.md#minimum-iam-policy