S3 Copy Artifacts With Jenkings S3 Plugin
up vote
0
down vote
favorite
I am having some issues with Jenkings uploading to s3... basically we have two AWS environments, Live and Dev..
Jenkins is running on our Live environment, Has AWS access Keys, and Jenkins role from Live account..
Jenkings Role on Live has the policy as below:
{
"Version": "2012-10-17",
"Id": "Policy1541606229878898989",
"Statement": [
{
"Action": [
"s3:ListAllMyBuckets"
],
"Effect": "Allow",
"Resource": "arn:aws:s3:::*"
},
{
"Action": "s3:*",
"Effect": "Allow",
"Resource": [
"arn:aws:s3:::beta.mydomain.co.uk",
"arn:aws:s3:::beta.mydomain.co.uk/*"
]
}
]
}
beta.mydomain.co.uk - is a bucket created on Dev environment..
and the bucket Policy is a s below:
{
"Version": "2012-10-17",
"Id": "Policy1541615390300",
"Statement": [
{
"Sid": "Stmt1541606105471",
"Effect": "Allow",
"Principal": "*",
"Action": "s3:GetObject",
"Resource": "arn:aws:s3:::beta.mydomain.co.uk/*"
},
{
"Sid": "Stmt1541606206206",
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::123456789987:role/Jenkins"
},
"Action": "s3:*",
"Resource": "arn:aws:s3:::beta.mydomain.co.uk/*"
}
]
}
First part of this Policy is that, any contents which get uploaded to this bucket to be public with "Principal": "*", and actions: "Action": "s3:GetObject",
Second part of this bucket policy is that to allow jenkins role setup on our productions to have full access to dump the files
My problem is that Jenkings Dumps the files all fine, but For some reason those files are not PUBLIC.... when i try to make them public i get Access denined?
any ideas please? before my hair go more grey!
thanks
amazon-web-services jenkins amazon-s3 jenkins-plugins amazon-iam
add a comment |
up vote
0
down vote
favorite
I am having some issues with Jenkings uploading to s3... basically we have two AWS environments, Live and Dev..
Jenkins is running on our Live environment, Has AWS access Keys, and Jenkins role from Live account..
Jenkings Role on Live has the policy as below:
{
"Version": "2012-10-17",
"Id": "Policy1541606229878898989",
"Statement": [
{
"Action": [
"s3:ListAllMyBuckets"
],
"Effect": "Allow",
"Resource": "arn:aws:s3:::*"
},
{
"Action": "s3:*",
"Effect": "Allow",
"Resource": [
"arn:aws:s3:::beta.mydomain.co.uk",
"arn:aws:s3:::beta.mydomain.co.uk/*"
]
}
]
}
beta.mydomain.co.uk - is a bucket created on Dev environment..
and the bucket Policy is a s below:
{
"Version": "2012-10-17",
"Id": "Policy1541615390300",
"Statement": [
{
"Sid": "Stmt1541606105471",
"Effect": "Allow",
"Principal": "*",
"Action": "s3:GetObject",
"Resource": "arn:aws:s3:::beta.mydomain.co.uk/*"
},
{
"Sid": "Stmt1541606206206",
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::123456789987:role/Jenkins"
},
"Action": "s3:*",
"Resource": "arn:aws:s3:::beta.mydomain.co.uk/*"
}
]
}
First part of this Policy is that, any contents which get uploaded to this bucket to be public with "Principal": "*", and actions: "Action": "s3:GetObject",
Second part of this bucket policy is that to allow jenkins role setup on our productions to have full access to dump the files
My problem is that Jenkings Dumps the files all fine, but For some reason those files are not PUBLIC.... when i try to make them public i get Access denined?
any ideas please? before my hair go more grey!
thanks
amazon-web-services jenkins amazon-s3 jenkins-plugins amazon-iam
add a comment |
up vote
0
down vote
favorite
up vote
0
down vote
favorite
I am having some issues with Jenkings uploading to s3... basically we have two AWS environments, Live and Dev..
Jenkins is running on our Live environment, Has AWS access Keys, and Jenkins role from Live account..
Jenkings Role on Live has the policy as below:
{
"Version": "2012-10-17",
"Id": "Policy1541606229878898989",
"Statement": [
{
"Action": [
"s3:ListAllMyBuckets"
],
"Effect": "Allow",
"Resource": "arn:aws:s3:::*"
},
{
"Action": "s3:*",
"Effect": "Allow",
"Resource": [
"arn:aws:s3:::beta.mydomain.co.uk",
"arn:aws:s3:::beta.mydomain.co.uk/*"
]
}
]
}
beta.mydomain.co.uk - is a bucket created on Dev environment..
and the bucket Policy is a s below:
{
"Version": "2012-10-17",
"Id": "Policy1541615390300",
"Statement": [
{
"Sid": "Stmt1541606105471",
"Effect": "Allow",
"Principal": "*",
"Action": "s3:GetObject",
"Resource": "arn:aws:s3:::beta.mydomain.co.uk/*"
},
{
"Sid": "Stmt1541606206206",
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::123456789987:role/Jenkins"
},
"Action": "s3:*",
"Resource": "arn:aws:s3:::beta.mydomain.co.uk/*"
}
]
}
First part of this Policy is that, any contents which get uploaded to this bucket to be public with "Principal": "*", and actions: "Action": "s3:GetObject",
Second part of this bucket policy is that to allow jenkins role setup on our productions to have full access to dump the files
My problem is that Jenkings Dumps the files all fine, but For some reason those files are not PUBLIC.... when i try to make them public i get Access denined?
any ideas please? before my hair go more grey!
thanks
amazon-web-services jenkins amazon-s3 jenkins-plugins amazon-iam
I am having some issues with Jenkings uploading to s3... basically we have two AWS environments, Live and Dev..
Jenkins is running on our Live environment, Has AWS access Keys, and Jenkins role from Live account..
Jenkings Role on Live has the policy as below:
{
"Version": "2012-10-17",
"Id": "Policy1541606229878898989",
"Statement": [
{
"Action": [
"s3:ListAllMyBuckets"
],
"Effect": "Allow",
"Resource": "arn:aws:s3:::*"
},
{
"Action": "s3:*",
"Effect": "Allow",
"Resource": [
"arn:aws:s3:::beta.mydomain.co.uk",
"arn:aws:s3:::beta.mydomain.co.uk/*"
]
}
]
}
beta.mydomain.co.uk - is a bucket created on Dev environment..
and the bucket Policy is a s below:
{
"Version": "2012-10-17",
"Id": "Policy1541615390300",
"Statement": [
{
"Sid": "Stmt1541606105471",
"Effect": "Allow",
"Principal": "*",
"Action": "s3:GetObject",
"Resource": "arn:aws:s3:::beta.mydomain.co.uk/*"
},
{
"Sid": "Stmt1541606206206",
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::123456789987:role/Jenkins"
},
"Action": "s3:*",
"Resource": "arn:aws:s3:::beta.mydomain.co.uk/*"
}
]
}
First part of this Policy is that, any contents which get uploaded to this bucket to be public with "Principal": "*", and actions: "Action": "s3:GetObject",
Second part of this bucket policy is that to allow jenkins role setup on our productions to have full access to dump the files
My problem is that Jenkings Dumps the files all fine, but For some reason those files are not PUBLIC.... when i try to make them public i get Access denined?
any ideas please? before my hair go more grey!
thanks
amazon-web-services jenkins amazon-s3 jenkins-plugins amazon-iam
amazon-web-services jenkins amazon-s3 jenkins-plugins amazon-iam
edited Nov 8 at 10:34
asked Nov 7 at 18:53
Jenna Shaik
64
64
add a comment |
add a comment |
active
oldest
votes
active
oldest
votes
active
oldest
votes
active
oldest
votes
active
oldest
votes
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53195957%2fs3-copy-artifacts-with-jenkings-s3-plugin%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown