ROSAInstallerPolicy - AWS Kebijakan Terkelola

Terjemahan disediakan oleh mesin penerjemah. Jika konten terjemahan yang diberikan bertentangan dengan versi bahasa Inggris aslinya, utamakan versi bahasa Inggris.

ROSAInstallerPolicy

Deskripsi: Memungkinkan penginstal Red Hat OpenShift Service on AWS (ROSA) mengelola AWS sumber daya yang mendukung instalasi klaster ROSA. Ini termasuk mengelola profil instance untuk node pekerja ROSA.

ROSAInstallerPolicyadalah kebijakan yang AWS dikelola.

Menggunakan kebijakan ini

Anda dapat melampirkan ROSAInstallerPolicy ke pengguna, grup, dan peran Anda.

Rincian kebijakan

  • Jenis: Kebijakan peran layanan

  • Waktu pembuatan: 06 Juni 2023, 21:00 UTC

  • Waktu telah diedit: 24 April 2024, 19:49 UTC

  • ARN: arn:aws:iam::aws:policy/service-role/ROSAInstallerPolicy

Versi kebijakan

Versi kebijakan: v4 (default)

Versi default kebijakan adalah versi yang menentukan izin untuk kebijakan tersebut. Saat pengguna atau peran dengan kebijakan membuat permintaan untuk mengakses AWS sumber daya, AWS periksa versi default kebijakan untuk menentukan apakah akan mengizinkan permintaan tersebut.

Dokumen kebijakan JSON

{ "Version" : "2012-10-17", "Statement" : [ { "Sid" : "ReadPermissions", "Effect" : "Allow", "Action" : [ "ec2:DescribeAvailabilityZones", "ec2:DescribeInternetGateways", "ec2:DescribeInstances", "ec2:DescribeInstanceTypes", "ec2:DescribeRegions", "ec2:DescribeReservedInstancesOfferings", "ec2:DescribeRouteTables", "ec2:DescribeSecurityGroups", "ec2:DescribeSecurityGroupRules", "ec2:DescribeSubnets", "ec2:DescribeVpcAttribute", "ec2:DescribeVpcs", "ec2:DescribeInstanceTypeOfferings", "elasticloadbalancing:DescribeAccountLimits", "elasticloadbalancing:DescribeLoadBalancers", "iam:GetOpenIDConnectProvider", "iam:GetRole", "route53:GetHostedZone", "route53:ListHostedZones", "route53:ListHostedZonesByName", "route53:ListResourceRecordSets", "route53:GetAccountLimit", "servicequotas:GetServiceQuota" ], "Resource" : "*" }, { "Sid" : "PassRoleToEC2", "Effect" : "Allow", "Action" : [ "iam:PassRole" ], "Resource" : [ "arn:*:iam::*:role/*-ROSA-Worker-Role" ], "Condition" : { "StringEquals" : { "iam:PassedToService" : [ "ec2.amazonaws.com" ] } } }, { "Sid" : "ManageInstanceProfiles", "Effect" : "Allow", "Action" : [ "iam:AddRoleToInstanceProfile", "iam:RemoveRoleFromInstanceProfile", "iam:DeleteInstanceProfile", "iam:GetInstanceProfile" ], "Resource" : [ "arn:aws:iam::*:instance-profile/rosa-service-managed-*" ] }, { "Sid" : "CreateInstanceProfiles", "Effect" : "Allow", "Action" : [ "iam:CreateInstanceProfile", "iam:TagInstanceProfile" ], "Resource" : [ "arn:aws:iam::*:instance-profile/rosa-service-managed-*" ], "Condition" : { "StringEquals" : { "aws:RequestTag/red-hat-managed" : "true" } } }, { "Sid" : "GetSecretValue", "Effect" : "Allow", "Action" : [ "secretsmanager:GetSecretValue" ], "Resource" : [ "*" ], "Condition" : { "StringEquals" : { "aws:ResourceTag/red-hat-managed" : "true" } } }, { "Sid" : "Route53ManageRecords", "Effect" : "Allow", "Action" : [ "route53:ChangeResourceRecordSets" ], "Resource" : "*", "Condition" : { "ForAllValues:StringLike" : { "route53:ChangeResourceRecordSetsNormalizedRecordNames" : [ "*.openshiftapps.com", "*.devshift.org", "*.hypershift.local", "*.openshiftusgov.com", "*.devshiftusgov.com" ] } } }, { "Sid" : "Route53Manage", "Effect" : "Allow", "Action" : [ "route53:ChangeTagsForResource", "route53:CreateHostedZone", "route53:DeleteHostedZone" ], "Resource" : "*" }, { "Sid" : "CreateTags", "Effect" : "Allow", "Action" : [ "ec2:CreateTags" ], "Resource" : [ "arn:aws:ec2:*:*:instance/*", "arn:aws:ec2:*:*:volume/*" ], "Condition" : { "StringEquals" : { "ec2:CreateAction" : [ "RunInstances" ] } } }, { "Sid" : "RunInstancesNoCondition", "Effect" : "Allow", "Action" : "ec2:RunInstances", "Resource" : [ "arn:aws:ec2:*:*:subnet/*", "arn:aws:ec2:*:*:network-interface/*", "arn:aws:ec2:*:*:security-group/*", "arn:aws:ec2:*:*:snapshot/*" ] }, { "Sid" : "RunInstancesRestrictedRequestTag", "Effect" : "Allow", "Action" : "ec2:RunInstances", "Resource" : [ "arn:aws:ec2:*:*:instance/*", "arn:aws:ec2:*:*:volume/*" ], "Condition" : { "StringEquals" : { "aws:RequestTag/red-hat-managed" : "true" } } }, { "Sid" : "RunInstancesRedHatOwnedAMIs", "Effect" : "Allow", "Action" : [ "ec2:RunInstances" ], "Resource" : [ "arn:aws:ec2:*:*:image/*" ], "Condition" : { "StringEquals" : { "ec2:Owner" : [ "531415883065", "251351625822", "210686502322" ] } } }, { "Sid" : "ManageInstancesRestrictedResourceTag", "Effect" : "Allow", "Action" : [ "ec2:TerminateInstances", "ec2:GetConsoleOutput" ], "Resource" : "arn:aws:ec2:*:*:instance/*", "Condition" : { "StringEquals" : { "aws:ResourceTag/red-hat-managed" : "true" } } }, { "Sid" : "CreateGrantRestrictedResourceTag", "Effect" : "Allow", "Action" : [ "kms:CreateGrant" ], "Resource" : "*", "Condition" : { "StringEquals" : { "aws:ResourceTag/red-hat" : "true" }, "StringLike" : { "kms:ViaService" : "ec2.*.amazonaws.com" }, "Bool" : { "kms:GrantIsForAWSResource" : true } } }, { "Sid" : "ManagedKMSRestrictedResourceTag", "Effect" : "Allow", "Action" : [ "kms:DescribeKey", "kms:GenerateDataKeyWithoutPlaintext" ], "Resource" : "*", "Condition" : { "StringEquals" : { "aws:ResourceTag/red-hat" : "true" } } }, { "Sid" : "CreateSecurityGroups", "Effect" : "Allow", "Action" : [ "ec2:CreateSecurityGroup" ], "Resource" : [ "arn:aws:ec2:*:*:security-group*/*" ], "Condition" : { "StringEquals" : { "aws:RequestTag/red-hat-managed" : "true" } } }, { "Sid" : "DeleteSecurityGroup", "Effect" : "Allow", "Action" : [ "ec2:DeleteSecurityGroup" ], "Resource" : [ "arn:aws:ec2:*:*:security-group*/*" ], "Condition" : { "StringEquals" : { "aws:ResourceTag/red-hat-managed" : "true" } } }, { "Sid" : "SecurityGroupIngressEgress", "Effect" : "Allow", "Action" : [ "ec2:AuthorizeSecurityGroupIngress", "ec2:AuthorizeSecurityGroupEgress", "ec2:RevokeSecurityGroupIngress", "ec2:RevokeSecurityGroupEgress" ], "Resource" : [ "arn:aws:ec2:*:*:security-group*/*" ], "Condition" : { "StringEquals" : { "aws:ResourceTag/red-hat-managed" : "true" } } }, { "Sid" : "CreateSecurityGroupsVPCNoCondition", "Effect" : "Allow", "Action" : [ "ec2:CreateSecurityGroup" ], "Resource" : [ "arn:aws:ec2:*:*:vpc/*" ] }, { "Sid" : "CreateTagsRestrictedActions", "Effect" : "Allow", "Action" : [ "ec2:CreateTags" ], "Resource" : [ "arn:aws:ec2:*:*:security-group/*" ], "Condition" : { "StringEquals" : { "ec2:CreateAction" : [ "CreateSecurityGroup" ] } } }, { "Sid" : "CreateTagsK8sSubnet", "Effect" : "Allow", "Action" : [ "ec2:CreateTags" ], "Resource" : [ "arn:aws:ec2:*:*:subnet/*" ], "Condition" : { "ForAllValues:StringLike" : { "aws:TagKeys" : [ "kubernetes.io/cluster/*" ] } } }, { "Sid" : "ListPoliciesAttachedToRoles", "Effect" : "Allow", "Action" : [ "iam:ListAttachedRolePolicies", "iam:ListRolePolicies" ], "Resource" : "arn:aws:iam::*:role/*", "Condition" : { "StringEquals" : { "aws:ResourceTag/red-hat-managed" : "true" } } } ] }

Pelajari selengkapnya