-
-
Notifications
You must be signed in to change notification settings - Fork 382
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow customization of IAM func role #539
Comments
Is it acceptable just to add the permissions to the up role in the AWS IAM console, after deploying? It persists IIRC. |
Yep! That's what I've been doing too |
Would save a lot of additional work on our end if we could override the IAM role pragmatically. Currently have to deploy a whole CloudFormation stack to create the role and somehow wire it into Up. |
I'll prioritize this some more, pretty common to add Dynamo etc and it shouldn't take long to add—I always end up manually tweaking mine in the console but yeah that's not ideal haha. |
Any expected ETA on this one? Sorry to pressure. |
@mgoodings I'm not sure yet how to best handle this since it's not part of the CloudFormation stack, it wouldn't be part of the |
Just a note that 9f4faca seems to overwrite my edits to the function's inline policy. Didn't expect that. 😅 |
Pretty common to add dynamo/kinesis/s3 access etc, probably time to add this to up.json so people don't have to use the AWS console to manipulate the permissions.
The text was updated successfully, but these errors were encountered: