Advertisement
Guest User

Untitled

a guest
Aug 19th, 2019
87
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.30 KB | None | 0 0
  1. "AppTierS3AccessRole": {
  2. "Type": "AWS::IAM::Role",
  3. "Properties": {
  4. "AssumeRolePolicyDocument": {
  5. "Statement": [
  6. {
  7. "Effect": "Allow",
  8. "Principal": {
  9. "Service": [ "ec2.amazonaws.com" ]
  10. },
  11. "Action": [ "sts:AssumeRole" ]
  12. }
  13. ]
  14. },
  15. "Path": "/",
  16. "Policies": [ { "Ref": "existing-policy" } ]
  17. }
  18. },
  19.  
  20. ecrRole:
  21. Type: AWS::IAM::Role
  22. Properties:
  23. Path: "/"
  24. ManagedPolicyArns:
  25. - "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
  26. AssumeRolePolicyDocument:
  27. Version: '2012-10-17'
  28. Statement:
  29. - Effect: Allow
  30. Principal:
  31. Service:
  32. - ec2.amazonaws.com
  33. Action:
  34. - sts:AssumeRole
  35.  
  36. "ManagedPolicy": {
  37. "Type": "AWS::IAM::ManagedPolicy",
  38. "Properties": {
  39. "Description": "something descriptive",
  40. "Groups": [ ... ref(s) for groups ... ],
  41. "Roles: [{"Ref":"AppTierS3AccessRole"}],
  42. "Users": [ ... ref(s) for users ... ],
  43. "PolicyDocument": {
  44. "Version": "2012-10-17",
  45. "Statement": [
  46. ...
  47. ]
  48. }
  49. }
  50. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement