-
Notifications
You must be signed in to change notification settings - Fork 20
/
policy2.json
151 lines (151 loc) · 4.58 KB
/
policy2.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "ec2",
"Effect": "Allow",
"Action": [
"ec2:DescribeVpcs",
"ec2:DeleteVpc",
"ec2:DeleteSecurityGroup",
"ec2:RevokeSecurityGroupEgress",
"ec2:DeleteSubnet",
"ec2:DeleteLaunchTemplate",
"ec2:DescribeSecurityGroupRules",
"ec2:DescribeNatGateways",
"ec2:DescribeLaunchTemplates",
"ec2:DescribeLaunchTemplateVersions",
"ec2:DescribeSubnets",
"ec2:DescribeInternetGateways",
"ec2:DescribeAddresses",
"ec2:DescribeVpcAttribute",
"ec2:DescribeRouteTables",
"ec2:DescribeNetworkAcls",
"ec2:DescribeVpcClassicLinkDnsSupport",
"ec2:DescribeVpcClassicLink",
"ec2:DescribeAvailabilityZones",
"ec2:ReleaseAddress",
"ec2:DisassociateAddress",
"ec2:DeleteInternetGateway",
"ec2:DetachInternetGateway",
"ec2:DisassociateRouteTable",
"ec2:DeleteRouteTable",
"ec2:DeleteNatGateway",
"ec2:DeleteRoute",
"ec2:RunInstances",
"ec2:CreateRoute",
"ec2:CreateNatGateway",
"ec2:AssociateRouteTable",
"ec2:AuthorizeSecurityGroupEgress",
"ec2:AuthorizeSecurityGroupIngress",
"ec2:CreateSecurityGroup",
"ec2:ModifySubnetAttribute",
"ec2:CreateSubnet",
"ec2:CreateRouteTable",
"ec2:CreateInternetGateway",
"ec2:AttachInternetGateway",
"ec2:ModifyVpcAttribute",
"ec2:CreateVpc",
"ec2:CreateLaunchTemplate",
"ec2:AllocateAddress",
"ec2:DeleteTags",
"ec2:DescribeTags",
"ec2:CreateTags",
"ec2:CreateVolume",
"ec2:DescribeVolumes",
"ec2:DeleteVolume",
"ec2:DescribeSnapshots",
"ec2:DescribeSecurityGroups",
"ec2:DescribeNetworkInterfaces",
"ec2:RevokeSecurityGroupIngress",
"ec2:DescribeAddressesAttribute",
"ec2:CreateNetworkAclEntry",
"ec2:DeleteNetworkAclEntry",
"ec2:DeleteNetworkInterface"
],
"Resource": "*"
},
{
"Sid": "rds",
"Effect": "Allow",
"Action": [
"rds:CreateDBSubnetGroup",
"rds:DescribeDBSubnetGroups",
"rds:DeleteDBSubnetGroup",
"rds:CreateDBInstance",
"rds:DescribeDBInstances",
"rds:DeleteDBInstance",
"rds:DescribeDBSnapshots",
"rds:RestoreDBInstanceFromDBSnapshot",
"rds:ListTagsForResource",
"rds:AddTagsToResource",
"rds:RemoveTagsFromResource",
"rds:ModifyDBInstance"
],
"Resource": "*"
},
{
"Sid": "autoscaling",
"Effect": "Allow",
"Action": [
"autoscaling:CreateOrUpdateTags",
"autoscaling:DeleteTags",
"autoscaling:DescribeTags",
"autoscaling:DescribeAutoScalingGroups",
"autoscaling:DeleteAutoScalingGroup"
],
"Resource": "*"
},
{
"Sid": "iamlist",
"Effect": "Allow",
"Action": [
"iam:ListPolicies",
"iam:ListRoles"
],
"Resource": "*"
},
{
"Sid": "iam",
"Effect": "Allow",
"Action": [
"iam:ListRolePolicies",
"iam:ListAttachedRolePolicies",
"iam:DeleteRole",
"iam:ListInstanceProfilesForRole",
"iam:DetachRolePolicy",
"iam:GetRole",
"iam:GetPolicy",
"iam:GetOpenIDConnectProvider",
"iam:DeletePolicy",
"iam:ListPolicyVersions",
"iam:DeleteOpenIDConnectProvider",
"iam:GetPolicyVersion",
"iam:AttachRolePolicy",
"iam:CreateRole",
"iam:CreatePolicy",
"iam:CreateOpenIDConnectProvider",
"iam:PassRole",
"iam:TagRole",
"iam:TagPolicy",
"iam:TagOpenIDConnectProvider",
"iam:UntagRole",
"iam:UntagPolicy",
"iam:UntagOpenIDConnectProvider"
],
"Resource": [
"arn:aws:iam::123456789012:role/*-autoscaler",
"arn:aws:iam::123456789012:role/*-s3-storage-role",
"arn:aws:iam::123456789012:role/atlas-*",
"arn:aws:iam::123456789012:role/*-external-dns",
"arn:aws:iam::123456789012:policy/atlas-*",
"arn:aws:iam::123456789012:policy/cluster-autoscaler*",
"arn:aws:iam::123456789012:policy/*-s3-confluence-storage-policy",
"arn:aws:iam::123456789012:policy/*_ExternalDNS",
"arn:aws:iam::123456789012:oidc-provider/*",
"arn:aws:iam::123456789012:role/aws-service-role/eks-nodegroup.amazonaws.com/AWSServiceRoleForAmazonEKSNodegroup",
"arn:aws:iam::123456789012:policy/policy*"
]
}
]
}