Actions, resources, and condition keys for AWS Device Farm
AWS Device Farm (service prefix: devicefarm
) provides the following service-specific resources, actions, and condition context keys for use in IAM permission policies.
References:
-
Learn how to configure this service.
-
View a list of the API operations available for this service.
-
Learn how to secure this service and its resources by using IAM permission policies.
Topics
Actions defined by AWS Device Farm
You can specify the following actions in the Action
element of an IAM policy statement. Use policies to grant permissions to perform an operation in AWS. When you use an action in a policy, you usually allow or deny access to the API operation or CLI command with the same name. However, in some cases, a single action controls access to more than one operation. Alternatively, some operations require several different actions.
The Resource types column of the Actions table indicates whether each action supports resource-level permissions. If there is no value for this column, you must specify all resources ("*") to which the policy applies in the Resource
element of your policy statement. If the column includes a resource type, then you can specify an ARN of that type in a statement with that action. If the action has one or more required resources, the caller must have permission to use the action with those resources. Required resources are indicated in the table with an asterisk (*). If you limit resource access with the Resource
element in an IAM policy, you must include an ARN or pattern for each required resource type. Some actions support multiple resource types. If the resource type is optional (not indicated as required), then you can choose to use one of the optional resource types.
The Condition keys column of the Actions table includes keys that you can specify in a policy statement's Condition
element. For more information on the condition keys that are associated with resources for the service, see the Condition keys column of the Resource types table.
Note
Resource condition keys are listed in the Resource types table. You can find a link to the resource type that applies to an action in the Resource types (*required) column of the Actions table. The resource type in the Resource types table includes the Condition keys column, which are the resource condition keys that apply to an action in the Actions table.
For details about the columns in the following table, see Actions table.
Actions | Description | Access level | Resource types (*required) | Condition keys | Dependent actions |
---|---|---|---|---|---|
CreateDevicePool | Grants permission to create a device pool within a project | Write | |||
CreateInstanceProfile | Grants permission to create a device instance profile | Write | |||
CreateNetworkProfile | Grants permission to create a network profile within a project | Write | |||
CreateProject | Grants permission to create a project for mobile testing | Write |
ec2:CreateNetworkInterface ec2:DescribeSecurityGroups ec2:DescribeSubnets ec2:DescribeVpcs iam:CreateServiceLinkedRole |
||
CreateRemoteAccessSession | Grants permission to start a remote access session to a device instance | Write | |||
CreateTestGridProject | Grants permission to create a project for desktop testing | Write |
ec2:CreateNetworkInterface ec2:DescribeSecurityGroups ec2:DescribeSubnets ec2:DescribeVpcs iam:CreateServiceLinkedRole |
||
CreateTestGridUrl | Grants permission to generate a new pre-signed url used to access our test grid service | Write | |||
CreateUpload | Grants permission to upload a new file or app within a project | Write | |||
CreateVPCEConfiguration | Grants permission to create an Amazon Virtual Private Cloud (VPC) endpoint configuration | Write | |||
DeleteDevicePool | Grants permission to delete a user-generated device pool | Write | |||
DeleteInstanceProfile | Grants permission to delete a user-generated instance profile | Write | |||
DeleteNetworkProfile | Grants permission to delete a user-generated network profile | Write | |||
DeleteProject | Grants permission to delete a mobile testing project | Write | |||
DeleteRemoteAccessSession | Grants permission to delete a completed remote access session and its results | Write | |||
DeleteRun | Grants permission to delete a run | Write | |||
DeleteTestGridProject | Grants permission to delete a desktop testing project | Write | |||
DeleteUpload | Grants permission to delete a user-uploaded file | Write | |||
DeleteVPCEConfiguration | Grants permission to delete an Amazon Virtual Private Cloud (VPC) endpoint configuration | Write | |||
GetAccountSettings | Grants permission to retrieve the number of unmetered iOS and/or unmetered Android devices purchased by the account | Read | |||
GetDevice | Grants permission to retrieve the information of a unique device type | Read | |||
GetDeviceInstance | Grants permission to retireve the information of a device instance | Read | |||
GetDevicePool | Grants permission to retireve the information of a device pool | Read | |||
GetDevicePoolCompatibility | Grants permission to retrieve information about the compatibility of a test and/or app with a device pool | Read | |||
GetInstanceProfile | Grants permission to retireve the information of an instance profile | Read | |||
GetJob | Grants permission to retireve the information of a job | Read | |||
GetNetworkProfile | Grants permission to retireve the information of a network profile | Read | |||
GetOfferingStatus | Grants permission to retrieve the current status and future status of all offerings purchased by an AWS account | Read | |||
GetProject | Grants permission to retrieve information about a mobile testing project | Read | |||
GetRemoteAccessSession | Grants permission to retireve the link to a currently running remote access session | Read | |||
GetRun | Grants permission to retireve the information of a run | Read | |||
GetSuite | Grants permission to retireve the information of a testing suite | Read | |||
GetTest | Grants permission to retireve the information of a test case | Read | |||
GetTestGridProject | Grants permission to retrieve information about a desktop testing project | Read | |||
GetTestGridSession | Grants permission to retireve the information of a test grid session | Read | |||
GetUpload | Grants permission to retireve the information of an uploaded file | Read | |||
GetVPCEConfiguration | Grants permission to retireve the information of an Amazon Virtual Private Cloud (VPC) endpoint configuration | Read | |||
InstallToRemoteAccessSession | Grants permission to install an application to a device in a remote access session | Write | |||
ListArtifacts | Grants permission to list the artifacts in a project | List | |||
ListDeviceInstances | Grants permission to list the information of device instances | List | |||
ListDevicePools | Grants permission to list the information of device pools | List | |||
ListDevices | Grants permission to list the information of unique device types | List | |||
ListInstanceProfiles | Grants permission to list the information of device instance profiles | List | |||
ListJobs | Grants permission to list the information of jobs within a run | List | |||
ListNetworkProfiles | Grants permission to list the information of network profiles within a project | List | |||
ListOfferingPromotions | Grants permission to list the offering promotions | List | |||
ListOfferingTransactions | Grants permission to list all of the historical purchases, renewals, and system renewal transactions for an AWS account | List | |||
ListOfferings | Grants permission to list the products or offerings that the user can manage through the API | List | |||
ListProjects | Grants permission to list the information of mobile testing projects for an AWS account | List | |||
ListRemoteAccessSessions | Grants permission to list the information of currently running remote access sessions | List | |||
ListRuns | Grants permission to list the information of runs within a project | List | |||
ListSamples | Grants permission to list the information of samples within a project | List | |||
ListSuites | Grants permission to list the information of testing suites within a job | List | |||
ListTagsForResource | Grants permission to list the tags of a resource | List | |||
ListTestGridProjects | Grants permission to list the information of desktop testing projects for an AWS account | List | |||
ListTestGridSessionActions | Grants permission to list the session actions performed during a test grid session | List | |||
ListTestGridSessionArtifacts | Grants permission to list the artifacts generated by a test grid session | List | |||
ListTestGridSessions | Grants permission to list the sessions within a test grid project | List | |||
ListTests | Grants permission to list the information of tests within a testing suite | List | |||
ListUniqueProblems | Grants permission to list the information of unique problems within a run | List | |||
ListUploads | Grants permission to list the information of uploads within a project | List | |||
ListVPCEConfigurations | Grants permission to list the information of Amazon Virtual Private Cloud (VPC) endpoint configurations | List | |||
PurchaseOffering | Grants permission to purchase offerings for an AWS account | Write | |||
RenewOffering | Grants permission to set the quantity of devices to renew for an offering | Write | |||
ScheduleRun | Grants permission to schedule a run | Write | |||
SCENARIO: Device Pool as filter |
|||||
SCENARIO: Device Selection Configuration as filter |
|||||
StopJob | Grants permission to terminate a running job | Write | |||
StopRemoteAccessSession | Grants permission to terminate a running remote access session | Write | |||
StopRun | Grants permission to terminate a running test run | Write | |||
TagResource | Grants permission to add tags to a resource | Tagging | |||
UntagResource | Grants permission to remove tags from a resource | Tagging | |||
UpdateDeviceInstance | Grants permission to modify an existing device instance | Write | |||
UpdateDevicePool | Grants permission to modify an existing device pool | Write | |||
UpdateInstanceProfile | Grants permission to modify an existing instance profile | Write | |||
UpdateNetworkProfile | Grants permission to modify an existing network profile | Write | |||
UpdateProject | Grants permission to modify an existing mobile testing project | Write |
ec2:CreateNetworkInterface ec2:DescribeSecurityGroups ec2:DescribeSubnets ec2:DescribeVpcs iam:CreateServiceLinkedRole |
||
UpdateTestGridProject | Grants permission to modify an existing desktop testing project | Write |
ec2:CreateNetworkInterface ec2:DescribeSecurityGroups ec2:DescribeSubnets ec2:DescribeVpcs iam:CreateServiceLinkedRole |
||
UpdateUpload | Grants permission to modify an existing upload | Write | |||
UpdateVPCEConfiguration | Grants permission to modify an existing Amazon Virtual Private Cloud (VPC) endpoint configuration | Write |
Resource types defined by AWS Device Farm
The following resource types are defined by this service and can be used in the Resource
element of IAM permission policy statements. Each action in the Actions table identifies the resource types that can be specified with that action. A resource type can also define which condition keys you can include in a policy. These keys are displayed in the last column of the Resource types table. For details about the columns in the following table, see Resource types table.
Resource types | ARN | Condition keys |
---|---|---|
project |
arn:${Partition}:devicefarm:${Region}:${Account}:project:${ResourceId}
|
|
run |
arn:${Partition}:devicefarm:${Region}:${Account}:run:${ResourceId}
|
|
job |
arn:${Partition}:devicefarm:${Region}:${Account}:job:${ResourceId}
|
|
suite |
arn:${Partition}:devicefarm:${Region}:${Account}:suite:${ResourceId}
|
|
test |
arn:${Partition}:devicefarm:${Region}:${Account}:test:${ResourceId}
|
|
upload |
arn:${Partition}:devicefarm:${Region}:${Account}:upload:${ResourceId}
|
|
artifact |
arn:${Partition}:devicefarm:${Region}:${Account}:artifact:${ResourceId}
|
|
sample |
arn:${Partition}:devicefarm:${Region}:${Account}:sample:${ResourceId}
|
|
networkprofile |
arn:${Partition}:devicefarm:${Region}:${Account}:networkprofile:${ResourceId}
|
|
deviceinstance |
arn:${Partition}:devicefarm:${Region}::deviceinstance:${ResourceId}
|
|
session |
arn:${Partition}:devicefarm:${Region}:${Account}:session:${ResourceId}
|
|
devicepool |
arn:${Partition}:devicefarm:${Region}:${Account}:devicepool:${ResourceId}
|
|
device |
arn:${Partition}:devicefarm:${Region}::device:${ResourceId}
|
|
instanceprofile |
arn:${Partition}:devicefarm:${Region}:${Account}:instanceprofile:${ResourceId}
|
|
vpceconfiguration |
arn:${Partition}:devicefarm:${Region}:${Account}:vpceconfiguration:${ResourceId}
|
|
testgrid-project |
arn:${Partition}:devicefarm:${Region}:${Account}:testgrid-project:${ResourceId}
|
|
testgrid-session |
arn:${Partition}:devicefarm:${Region}:${Account}:testgrid-session:${ResourceId}
|
Condition keys for AWS Device Farm
AWS Device Farm defines the following condition keys that can be used in the Condition
element of an IAM policy. You can use these keys to further refine the conditions under which the policy statement applies. For details about the columns in the following table, see Condition keys table.
To view the global condition keys that are available to all services, see Available global condition keys.
Condition keys | Description | Type |
---|---|---|
aws:RequestTag/${TagKey} | Filters actions based on the allowed set of values for each of the tags | String |
aws:ResourceTag/${TagKey} | Filters actions based on tag-value assoicated with the resource | String |
aws:TagKeys | Filters actions based on the presence of mandatory tags in the request | ArrayOfString |