Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow custom runner agent IAM role #571

Closed
baolsen opened this issue Nov 9, 2022 · 2 comments · Fixed by #572
Closed

Allow custom runner agent IAM role #571

baolsen opened this issue Nov 9, 2022 · 2 comments · Fixed by #572
Labels

Comments

@baolsen
Copy link
Contributor

baolsen commented Nov 9, 2022

I have a use case where the role attached to the EC2 instance needs elevated privileges in my account.

This makes it very simple to run CI pipelines without needing to configure specific IAM policies for the pipeline requirements; instead the runner role can effectively perform any action (with some essential gaurdrails in place)

To enable this functionality, we require the ability to specify our own IAM role and to disable the creation of the runner agent role by this module.
Then, we can pass the name of our role to the module and it uses it as the instance-attached role, thus getting the elevated permissions.

The alternative was to allow our teams to attach the elevated permissions policy onto the runner role using the existing arguments to add policies to the role. However this would allow the teams to attach the elevated permissions onto any role rather than only the specific runner role. So instead, we create an elevated role with the elevated permissions, and only allow this role to be used by the runner when it is created.

@kayman-mk
Copy link
Collaborator

Sounds interesting. Could you post the role definition of your CI system? Or is it a "simple" allow everything?

@semantic-releaser
Copy link
Contributor

🎉 This issue has been resolved in version 5.5.0 🎉

The release is available on GitHub release

Your semantic-release bot 📦🚀

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants