-
Notifications
You must be signed in to change notification settings - Fork 202
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Documentation - IAM policy document #159
Comments
@zl4bv Anyone attempting to create ec2 instances would need permissions to manage the lifecycle of ec2 instances with the options they specify. I'd hesitate to make a hard recommendation on the exact API calls they need to issue because it's not universal. Example: a user might be testing a recipe that makes use of chef-provisioning-aws and calling out to services beyond ec2. We also expose a number of ec2 instance config options that make other calls beyond the basic ones listed (e.g. associating EIPs or options for Spot Instances) as PR's for them come in. My concern is that any granular recommendation for exact API calls to allow would either go stale as the config option list grows or be too permissive/not permissive enough for different user scenarios. Would it suffice to make reference to the fact that users should be authorized to manage any AWS resources they intend to modify or use and make a more general IAM recommendation like either using a managed policy such as arn:aws:iam::aws:policy/AmazonEC2FullAccess or a permissive policy like the one below and recommend users tailor it to their specific configuration requirements?
|
@gmiranda23 I was thinking of this as more of a base set of permissions for people to build upon than a concrete/complete list but I can see how easily the list could go stale and/or usage could be misconstrued by anyone trying to use it. Having something more generic like your example would be sufficient - provided, as you say, there is a recommendation that users tailor it to their specific requirements. |
Awesome, thank you! I will close this issue then. |
It would be nice to have documented the permissions that an IAM user will need to have in order to run kitchen-ec2.
Below is an IAM policy document that I have adapted from the one I found on the Packer website. I've tested the policy, but someone else should probably confirm that this list makes sense for kitchen-ec2.
The text was updated successfully, but these errors were encountered: