def add_role_access_to_build()

in cdk/pipeline/pipeline_stack.py [0:0]


    def add_role_access_to_build(self, build):
        build.role.add_managed_policy(
            iam.ManagedPolicy.from_aws_managed_policy_name("AmazonEC2ContainerRegistryFullAccess"))
        build.role.add_managed_policy(
            iam.ManagedPolicy.from_aws_managed_policy_name("AmazonSSMReadOnlyAccess"))
        build.add_to_role_policy(iam.PolicyStatement(
            actions=["kms:Decrypt", "kms:GenerateDataKey*"], resources=["*"]))
        build.add_to_role_policy(iam.PolicyStatement(
            actions=["eks:DescribeNodegroup", "eks:DescribeFargateProfile", 
            "eks:DescribeUpdate", "eks:DescribeCluster"], resources=["*"]))
        build.add_to_role_policy(iam.PolicyStatement(
            actions=["sts:AssumeRole"], resources=[self.eks.kubectl_role.role_arn]))