-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
(codepipeline-actions): BitBucketSourceAction requires s3:PutObjectAcl permissions #13557
Comments
Hi @akuma12 , that permission was actually changed in release Can you check whether going back to Thanks, |
I wasn't sure which change modified the role permissions, but I saw a bunch of removals of |
We are facing the same issue and at the moment we are using this workaround #12391 (comment) |
I guess it would have helped if I'd read the instructions: It looks like |
@akuma12 yes, Any chance of a PR fixing this? Here's our "Contributing" guide: https://github.com/aws/aws-cdk/blob/master/CONTRIBUTING.md. |
@skinny85 Can I work on this? |
@BLasan go ahead 🙂 |
Hi @skinny85 |
Yes @panamclipper, something like this: sourceRole = new iam.Role(this, 'SourceRole', {
assumedBy: new iam.AccountRootPrincipal(),
});
new codepipeline_actions.BitBucketSourceAction({
// ...
role: sourceRole,
});
// add the extra permissions
artifactBucket.grantPutObjectAcl(sourceRole); |
…ed" error (#13637) Previously access control lists for putObject was not called. This had led in getting access denied issue when trying to upload objects into the s3 bucket fixes #13557 ---- *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
|
…ed" error (#13637) Previously access control lists for putObject was not called. This had led in getting access denied issue when trying to upload objects into the s3 bucket fixes #13557 ---- *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
…ed" error (#13637) Previously access control lists for putObject was not called. This had led in getting access denied issue when trying to upload objects into the s3 bucket fixes #13557 ---- *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
…ed" error (aws#13637) Previously access control lists for putObject was not called. This had led in getting access denied issue when trying to upload objects into the s3 bucket fixes aws#13557 ---- *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
@skinny85 Sorry for the late response. That solution worked perfectly! Thank you! |
…ed" error (aws#13637) Previously access control lists for putObject was not called. This had led in getting access denied issue when trying to upload objects into the s3 bucket fixes aws#13557 ---- *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
Some time between aws-cdk 1.90.0 and 1.91.0, a bunch of
s3:PutObject*
permissions were changed tos3:PutObject
, but that seems to have caused an issue with thecodepipeline-actions.BitBucketSourceAction
, leading to the error[GitHub] Upload to S3 failed with the following error: Access Denied
in the Source action of a pipeline.We're using this with GitHub as advised in #10632.
Reproduction Steps
Create a CodePipeline with the BitBucketSourceAction and a codestar-connection to a GitHub repository.
What did you expect to happen?
The source action has the necessary permissions to write to the pipeline artifact bucket.
What actually happened?
The source action failed with the error
[GitHub] Upload to S3 failed with the following error: Access Denied
Environment
Other
We just need to add
s3:PutObjectAcl
as part of the default role that is generated for a BitBucketSourceAction.This is 🐛 Bug Report
The text was updated successfully, but these errors were encountered: