Skip to content
This repository was archived by the owner on Aug 9, 2023. It is now read-only.

Commit 89e6ef4

Browse files
committed
add ListBucket permissions to Cromwell server role
addresses broadinstitute/cromwell#4686
1 parent c7ef95b commit 89e6ef4

File tree

1 file changed

+13
-7
lines changed

1 file changed

+13
-7
lines changed

src/templates/cromwell/cromwell-server.template.yaml

Lines changed: 13 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -122,16 +122,22 @@ Resources:
122122
- "batch:ListJobs"
123123
- "batch:DescribeComputeEnvironments"
124124

125-
- PolicyName: !Sub CromwellServer-S3Bucket-Access-${AWS::Region}
125+
- PolicyName: !Sub CromwellServer-S3-Access-${AWS::Region}
126126
PolicyDocument:
127127
Version: 2012-10-17
128128
Statement:
129-
Effect: Allow
130-
Resource:
131-
- !Join ["", ["arn:aws:s3:::", !Ref S3BucketName]]
132-
- !Join ["", ["arn:aws:s3:::", !Ref S3BucketName, "/*"]]
133-
Action:
134-
- "s3:*"
129+
- Effect: Allow
130+
Resource:
131+
- !Join ["", ["arn:aws:s3:::", !Ref S3BucketName]]
132+
- !Join ["", ["arn:aws:s3:::", !Ref S3BucketName, "/*"]]
133+
Action:
134+
- "s3:*"
135+
- Effect: Allow
136+
Resource: "*"
137+
Action:
138+
- "s3:ListBucket"
139+
- "s3:ListAllMyBuckets"
140+
135141

136142
- PolicyName: !Sub CromwellServer-CloudWatch-Access-${AWS::Region}
137143
PolicyDocument:

0 commit comments

Comments
 (0)