You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Jan 14, 2025. It is now read-only.
Copy file name to clipboardExpand all lines: DevOps/4_MultipleEnvironments/README.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -82,11 +82,11 @@ CodeStar generates IAM Roles and Policies that control access to AWS resources.
82
82
1. Select Role in the left navigation, type `CodeStarWorker-uni-api-Lambda` in the filter text box, and click the Role name link in the Role table.
83
83
84
84

85
-
85
+
86
86
1. On the Role Summary page, click the **Attach Policy** button in the **Managed Policies** section of the **Permissions** tab.
87
87
88
88

89
-
89
+
90
90
1. Type `AWSCodePipelineCustomActionAccess` in the filter text box, select the checkbox next to the **AWSCodePipelineCustomActionAccess** Managed Policy.
91
91
92
92

@@ -114,7 +114,7 @@ CodeStar generates IAM Roles and Policies that control access to AWS resources.
114
114
1. Select Role in the left navigation, type `CodeStarWorker-uni-api-CodePipeline` in the filter text box, and click the Role name link in the Role table.
115
115
116
116

117
-
117
+
118
118
1. On the Role Summary page, click the **Attach Policy** button in the **Managed Policies** section of the **Permissions** tab.
119
119
120
120

@@ -131,16 +131,16 @@ CodeStar generates IAM Roles and Policies that control access to AWS resources.
131
131
132
132

133
133
134
-
#### 1c. Update `CodeStarWorkerCodePipelineRolePolicy` IAM Policy
135
-
136
-
1.Click**Edit Policy** for the `CodeStarWorkerCodePipelineRolePolicy` in the **Inline Policies** section.
134
+
#### 1c. Update `CodeStarWorkerCodePipelineRolePolicy` IAM Policy
135
+
136
+
1.Whilst still viewing the `CodeStarWorker-uni-api-CodePipeline` IAM Role, click**Edit Policy** for the `CodeStarWorkerCodePipelineRolePolicy` in the **Inline Policies** section.
137
137
138
138

139
-
139
+
140
140
1. Update the allowed CloudFormation Resource pattern in the policy (substitute your AWS Region and AccountId) a click **Save**.
0 commit comments