-
Notifications
You must be signed in to change notification settings - Fork 0
Setting Up AWS Website
-
Set up AWS account using email address: C##########A@G####L.COM
-
Set up needed policies from within the IAM Service
Create the following custom policies within IAM:
CodeDeployDemo-EC2-Permissions
{ "Version": "2012-10-17", "Statement": [ { "Action": [ "s3:Get*", "s3:List*" ], "Effect": "Allow", "Resource": "*" } ] }
Travis-Deploy-To-S3
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "s3:PutObject" ], "Resource": [ "*" ] } ] }
Travis-Code-Deploy-Policy
Resource
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "codedeploy:RegisterApplicationRevision", "codedeploy:GetApplicationRevision" ], "Resource": ["arn:aws:codedeploy:ServerRegionHERE:076002291156:application:NameOfTheCodeDeployApplicationNameHERE" ] }, { "Effect": "Allow", "Action": [ "codedeploy:CreateDeployment", "codedeploy:GetDeployment" ], "Resource": [ "*" ] }, { "Effect": "Allow", "Action": [ "codedeploy:GetDeploymentConfig" ], "Resource": [ "arn:aws:codedeploy:ServerRegionHERE:AccIdHERE:deploymentconfig:CodeDeployDefault.OneAtATime", "arn:aws:codedeploy:ServerRegionHERE:AccIdHERE:deploymentconfig:CodeDeployDefault.HalfAtATime", "arn:aws:codedeploy:ServerRegionHERE:AccIdHERE:deploymentconfig:CodeDeployDefault.AllAtOnce" ] } ]
Create user and then set up the user policies to include the 2 Travis policies that were previously created.
User Travis was created and all of the access information has been saved to secure slack channel.
Attach the CodeDeployDemo-EC2-Permissions
policy to this role.
Attach the AWSCodeDeployRole
policy to this role.