Associate production-specific IAM policy to runners with environment=production · Issue #302 · runs-on/runs-on · GitHub
More Web Proxy on the site http://driver.im/
You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I'd like to be able to give my production runners (i.e. the ones that deploy to prod) more IAM permissions than my non-production runners (i.e. the ones that run tests). Github supports different environments for runners but it's not clear to me how I can then associate those environments to different IAM roles. Currently runs-on provides EC2InstanceCustomPolicy as a stack parameter but that's globally defined.
The text was updated successfully, but these errors were encountered:
@jesseduffield did you know RunsOn supports environments? This feature can be used to actually map GitHub environments to RunsOn environments. Downside is that you need to get one RunsOn stack per environment, but it helps maintaining strong isolation so maybe it's worth it?
I'd like to be able to give my production runners (i.e. the ones that deploy to prod) more IAM permissions than my non-production runners (i.e. the ones that run tests). Github supports different environments for runners but it's not clear to me how I can then associate those environments to different IAM roles. Currently runs-on provides
EC2InstanceCustomPolicy
as a stack parameter but that's globally defined.The text was updated successfully, but these errors were encountered: