We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Be able to add tag to the instance created in alicoud by alicloud-ecs. Something like the parameter run_tags in amazon-ebs provider.
Once this is done, We will be able to restrict access to ec2 instance based on tag, cf => https://www.alibabacloud.com/help/doc-detail/67912.htm?spm=a2c63.p38356.b99.151.3adb6612ZOeMYJ Exemple: { "Statement": [ { "Action": "ecs:", "Effect": "Allow", "Resource": "", "Condition": { "StringEquals": { "ecs:tag/team": "packer" } } }, ], "Version": "1" }
The idea is to limit ec2 access for some action like DeleteInstances, StopInstance.
The text was updated successfully, but these errors were encountered:
This issue has been migrated to hashicorp/packer-plugin-alicloud#136 due to the Packer Plugin split.
Please follow the new issue for updates.
Sorry, something went wrong.
No branches or pull requests
Description
Be able to add tag to the instance created in alicoud by alicloud-ecs.
Something like the parameter run_tags in amazon-ebs provider.
Use Case(s)
Once this is done, We will be able to restrict access to ec2 instance based on tag, cf =>
https://www.alibabacloud.com/help/doc-detail/67912.htm?spm=a2c63.p38356.b99.151.3adb6612ZOeMYJ
Exemple:
{
"Statement": [
{
"Action": "ecs:",
"Effect": "Allow",
"Resource": "",
"Condition": {
"StringEquals": {
"ecs:tag/team": "packer"
}
}
},
],
"Version": "1"
}
The idea is to limit ec2 access for some action like DeleteInstances, StopInstance.
The text was updated successfully, but these errors were encountered: