-
Story
-
Resolution: Unresolved
-
Undefined
-
None
-
None
-
None
Summary: Determine exactly what the current hardcoded "Cirrus" key is allowed to do so we can replicate it securely in the new OIDC role. Description: We are replacing a hardcoded AMI/IAM key currently used in Cirrus CI. Before creating the new role, we need to map out the exact permissions required (Least Privilege).
- Tasks:
-
- Identify the AWS Access Key ID currently configured in Cirrus CI (or the repository secrets).
-
- Find the corresponding IAM User in the AWS Console.
-
- Analyze the attached Policies (both Inline and Managed) to list required permissions (e.g., ec2:RunInstances, s3:PutObject, packer:build permissions).
-
- Draft a JSON IAM Policy that includes only these required permissions.
Acceptance Criteria:
- [ ] A list of required AWS actions/resources is documented.
- [ ] A draft JSON IAM policy is ready for the next story.
- split from
-
RUN-3994 Switch aws creds to openid connection (part 2)
-
- Closed
-