You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In restricted environments, in which only ChangeSet-based creation of stacks is possible, it is impossible to use this action.
Our use case is as follows: we configure the job (using aws-actions/configure-aws-credentials) to assume an IAM role which will execute the CloudFormation deployment action. This role only has Change/ExecuteChangeSet IAM permissions.
This works for updating stacks, but for new stacks, aws-cloudformation-github-deploy action will use CreateStack, which will fail in our case.
I think it should be possible to use CreateChangeSet with ChangeSetType set to CREATE in case the stack does not exist. This will keep the same behavior while requiring a less privileged role.
This would be a great implementation but would require making separate calls since as @kddejong mentioned, termination protection and policy changes currently can't be used with createChangeSet.
In restricted environments, in which only ChangeSet-based creation of stacks is possible, it is impossible to use this action.
Our use case is as follows: we configure the job (using
aws-actions/configure-aws-credentials
) to assume an IAM role which will execute the CloudFormation deployment action. This role only hasChange/ExecuteChangeSet
IAM permissions.This works for updating stacks, but for new stacks,
aws-cloudformation-github-deploy
action will useCreateStack
, which will fail in our case.I think it should be possible to use
CreateChangeSet
withChangeSetType
set toCREATE
in case the stack does not exist. This will keep the same behavior while requiring a less privileged role.See example here
If this sounds good, I am happy to contribute of course.
The text was updated successfully, but these errors were encountered: