Skip to content
This repository was archived by the owner on Jan 14, 2025. It is now read-only.

Commit 4e9c7bf

Browse files
authored
Merge pull request #159 from gibbsie/devops-module4
Clarified Step 1c by stating IAM Role that is having its attached inline policy edited
2 parents 188b24b + 1f35447 commit 4e9c7bf

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

DevOps/4_MultipleEnvironments/README.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -82,11 +82,11 @@ CodeStar generates IAM Roles and Policies that control access to AWS resources.
8282
1. Select Role in the left navigation, type `CodeStarWorker-uni-api-Lambda` in the filter text box, and click the Role name link in the Role table.
8383

8484
![Select Role](images/role1-1.png)
85-
85+
8686
1. On the Role Summary page, click the **Attach Policy** button in the **Managed Policies** section of the **Permissions** tab.
8787

8888
![Role Details](images/role1-2.png)
89-
89+
9090
1. Type `AWSCodePipelineCustomActionAccess` in the filter text box, select the checkbox next to the **AWSCodePipelineCustomActionAccess** Managed Policy.
9191

9292
![Attach Policy](images/role1-3.png)
@@ -114,7 +114,7 @@ CodeStar generates IAM Roles and Policies that control access to AWS resources.
114114
1. Select Role in the left navigation, type `CodeStarWorker-uni-api-CodePipeline` in the filter text box, and click the Role name link in the Role table.
115115

116116
![Select Role](images/role2-1.png)
117-
117+
118118
1. On the Role Summary page, click the **Attach Policy** button in the **Managed Policies** section of the **Permissions** tab.
119119

120120
![Role Details](images/role2-2.png)
@@ -131,16 +131,16 @@ CodeStar generates IAM Roles and Policies that control access to AWS resources.
131131

132132
![Policy Attached](images/role2-6.png)
133133

134-
#### 1c. Update `CodeStarWorkerCodePipelineRolePolicy` IAM Policy
135-
136-
1. Click **Edit Policy** for the `CodeStarWorkerCodePipelineRolePolicy` in the **Inline Policies** section.
134+
#### 1c. Update `CodeStarWorkerCodePipelineRolePolicy` IAM Policy
135+
136+
1. Whilst still viewing the `CodeStarWorker-uni-api-CodePipeline` IAM Role, click **Edit Policy** for the `CodeStarWorkerCodePipelineRolePolicy` in the **Inline Policies** section.
137137

138138
![Policy Attached](images/role2-7.png)
139-
139+
140140
1. Update the allowed CloudFormation Resource pattern in the policy (substitute your AWS Region and AccountId) a click **Save**.
141-
141+
142142
Before: `arn:aws:cloudformation:{region}:{accountId}:stack/awscodestar-uni-api-lambda/*`
143-
143+
144144
After: `arn:aws:cloudformation:{region}:{accountId}:stack/awscodestar-uni-api-lambda*`
145145

146146
![Policy Attached](images/role2-8.png)
@@ -193,7 +193,7 @@ Using your preferred Git client, run the commands on your local **uni-api** Git
193193
1. Click on the **AWS CodePipeline details** link at the bottom of the **Continuous deployment** tile on the right of the browser window.
194194

195195
![CodeStar App Endpoint](images/codestar-codepipeline-endpoint.png)
196-
196+
197197
1. On the CodePipeline page, click **Edit**.
198198

199199
#### 4b. Add Test Stage
@@ -299,7 +299,7 @@ The addition of the Test stage is complete. You will now validate the Test stag
299299
1. Click on the **AWS CodePipeline details** link at the bottom of the **Continuous deployment** tile on the right of the browser window.
300300

301301
![CodeStar App Endpoint](images/codestar-codepipeline-endpoint.png)
302-
302+
303303
1. On the CodePipeline page, click **Edit**.
304304

305305
#### 1b. Add Beta Stage

0 commit comments

Comments
 (0)