-
Notifications
You must be signed in to change notification settings - Fork 1
/
cfn-role.yaml
124 lines (120 loc) · 4.49 KB
/
cfn-role.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
Parameters:
OidcProvider:
Type: String
GitHubOrg:
Type: String
RepositoryName:
Type: String
Resources:
Role:
Type: AWS::IAM::Role
Properties:
RoleName: !Sub quinntainer-gha-${GitHubOrg}-${RepositoryName}
AssumeRolePolicyDocument:
Statement:
- Effect: Allow
Action: sts:AssumeRoleWithWebIdentity
Principal:
Federated: !Ref OidcProvider
Condition:
ForAllValues:StringLike:
token.actions.githubusercontent.com:aud: "sts.amazonaws.com"
token.actions.githubusercontent.com:sub: !Sub repo:${GitHubOrg}/${RepositoryName}:ref:refs/heads/*
Policies:
- PolicyName: gha-policy
PolicyDocument:
Version: "2012-10-17"
Statement:
- Effect: Allow
Action:
- ecr:GetAuthorizationToken
Resource: '*'
- Effect: Allow
Action:
- ecr:CreateRepository
- ecr:DescribeRepositories
- ecr:DeleteRepository
- ecr:BatchGetImage
- ecr:BatchCheckLayerAvailability
- ecr:CompleteLayerUpload
- ecr:GetDownloadUrlForLayer
- ecr:InitiateLayerUpload
- ecr:PutImage
- ecr:UploadLayerPart
Resource:
- !Sub arn:aws:ecr:${AWS::Region}:${AWS::AccountId}:repository/${GitHubOrg}/${RepositoryName}
- Effect: Allow
Action:
- cloudformation:DescribeStacks
- cloudformation:CreateStack
- cloudformation:CreateChangeSet
- cloudformation:DescribeChangeSet
- cloudformation:DeleteChangeSet
- cloudformation:ExecuteChangeSet
- cloudformation:DeleteStack
Resource:
- !Sub arn:aws:cloudformation:${AWS::Region}:${AWS::AccountId}:stack/quinntainer-repo-${GitHubOrg}-${RepositoryName}/*
- !Sub arn:aws:cloudformation:${AWS::Region}:${AWS::AccountId}:stack/quinntainer-app-${GitHubOrg}-${RepositoryName}/*
- Effect: Allow
Action:
- iam:GetRole
Resource: '*'
- Effect: Allow
Action:
- iam:CreateRole
- iam:PutRolePolicy
- iam:DeleteRolePolicy
- iam:DeleteRole
- iam:UpdateRole
Resource: '*'
Condition:
StringEquals:
iam:PermissionsBoundary: !Ref PermissionsBoundary
- Effect: Allow
Action:
- iam:PassRole
Resource: !Sub arn:aws:iam::${AWS::AccountId}:role/quinntainer-app-${GitHubOrg}-${RepositoryName}
- Effect: Allow
Action:
- iam:PassRole
Resource: '*'
Condition:
StringEquals:
iam:PassedToService: apprunner.amazonaws.com
- Effect: Allow
Action:
- apprunner:CreateService
- apprunner:DescribeService
- apprunner:UpdateService
- apprunner:DeleteService
Resource:
- !Sub arn:aws:apprunner:${AWS::Region}:${AWS::AccountId}:service/${GitHubOrg}-${RepositoryName}/*
- Effect: Allow
Action:
- iam:CreateServiceLinkedRole
Resource: !Sub arn:aws:iam::${AWS::AccountId}:role/aws-service-role/apprunner.amazonaws.com/AWSServiceRoleForAppRunner
Condition:
StringLike:
iam:AWSServiceName: apprunner.amazonaws.com
PermissionsBoundary:
Type: AWS::IAM::ManagedPolicy
Properties:
ManagedPolicyName: !Sub quinntainer-boundary-${GitHubOrg}-${RepositoryName}
PolicyDocument:
Version: "2012-10-17"
Statement:
- Effect: Allow
Action:
- ecr:GetAuthorizationToken
Resource: '*'
- Effect: Allow
Action:
- ecr:DescribeImages
- ecr:BatchGetImage
- ecr:BatchCheckLayerAvailability
- ecr:GetDownloadUrlForLayer
Resource:
- !Sub arn:aws:ecr:${AWS::Region}:${AWS::AccountId}:repository/${GitHubOrg}/${RepositoryName}
Outputs:
Role:
Value: !GetAtt Role.Arn