Last active
May 22, 2025 01:34
-
-
Save ryanartecona/95d4c485e2f725f59c06be580168f5d3 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"Path": "/", | |
"RoleName": "alb-controller-inlchu3g6soa2x4gap9mzok4na", | |
"RoleId": "AROA6CVWHFY6JETXHJ734", | |
"Arn": "arn:aws:iam::967823535676:role/alb-controller-inlchu3g6soa2x4gap9mzok4na", | |
"CreateDate": "2025-05-21T00:28:08+00:00", | |
"AssumeRolePolicyDocument": { | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Effect": "Allow", | |
"Principal": { | |
"Federated": "arn:aws:iam::967823535676:oidc-provider/oidc.eks.us-west-2.amazonaws.com/id/98193A85D4F59D436ED6A77BA0DFE598" | |
}, | |
"Action": "sts:AssumeRoleWithWebIdentity", | |
"Condition": { | |
"StringEquals": { | |
"oidc.eks.us-west-2.amazonaws.com/id/98193A85D4F59D436ED6A77BA0DFE598:aud": "sts.amazonaws.com", | |
"oidc.eks.us-west-2.amazonaws.com/id/98193A85D4F59D436ED6A77BA0DFE598:sub": "system:serviceaccount:alb-ingress-controller:alb-ingress-controller" | |
} | |
} | |
} | |
] | |
}, | |
"MaxSessionDuration": 3600, | |
"policy_docs": [ | |
{ | |
"Statement": [ | |
{ | |
"Action": "iam:CreateServiceLinkedRole", | |
"Condition": { | |
"StringEquals": { | |
"iam:AWSServiceName": "elasticloadbalancing.amazonaws.com" | |
} | |
}, | |
"Effect": "Allow", | |
"Resource": "*" | |
}, | |
{ | |
"Action": [ | |
"elasticloadbalancing:DescribeTrustStores", | |
"elasticloadbalancing:DescribeTargetHealth", | |
"elasticloadbalancing:DescribeTargetGroups", | |
"elasticloadbalancing:DescribeTargetGroupAttributes", | |
"elasticloadbalancing:DescribeTags", | |
"elasticloadbalancing:DescribeSSLPolicies", | |
"elasticloadbalancing:DescribeRules", | |
"elasticloadbalancing:DescribeLoadBalancers", | |
"elasticloadbalancing:DescribeLoadBalancerAttributes", | |
"elasticloadbalancing:DescribeListeners", | |
"elasticloadbalancing:DescribeListenerCertificates", | |
"elasticloadbalancing:DescribeListenerAttributes", | |
"elasticloadbalancing:DescribeCapacityReservation", | |
"ec2:GetSecurityGroupsForVpc", | |
"ec2:GetCoipPoolUsage", | |
"ec2:DescribeVpcs", | |
"ec2:DescribeVpcPeeringConnections", | |
"ec2:DescribeTags", | |
"ec2:DescribeSubnets", | |
"ec2:DescribeSecurityGroups", | |
"ec2:DescribeNetworkInterfaces", | |
"ec2:DescribeIpamPools", | |
"ec2:DescribeInternetGateways", | |
"ec2:DescribeInstances", | |
"ec2:DescribeCoipPools", | |
"ec2:DescribeAvailabilityZones", | |
"ec2:DescribeAddresses", | |
"ec2:DescribeAccountAttributes" | |
], | |
"Effect": "Allow", | |
"Resource": "*" | |
}, | |
{ | |
"Action": [ | |
"wafv2:GetWebACLForResource", | |
"wafv2:GetWebACL", | |
"wafv2:DisassociateWebACL", | |
"wafv2:AssociateWebACL", | |
"waf-regional:GetWebACLForResource", | |
"waf-regional:GetWebACL", | |
"waf-regional:DisassociateWebACL", | |
"waf-regional:AssociateWebACL", | |
"shield:GetSubscriptionState", | |
"shield:DescribeProtection", | |
"shield:DeleteProtection", | |
"shield:CreateProtection", | |
"iam:ListServerCertificates", | |
"iam:GetServerCertificate", | |
"cognito-idp:DescribeUserPoolClient", | |
"acm:ListCertificates", | |
"acm:DescribeCertificate" | |
], | |
"Effect": "Allow", | |
"Resource": "*" | |
}, | |
{ | |
"Action": [ | |
"ec2:RevokeSecurityGroupIngress", | |
"ec2:CreateSecurityGroup", | |
"ec2:AuthorizeSecurityGroupIngress" | |
], | |
"Effect": "Allow", | |
"Resource": "*" | |
}, | |
{ | |
"Action": "ec2:CreateTags", | |
"Condition": { | |
"Null": { | |
"aws:RequestTag/elbv2.k8s.aws/cluster": "false" | |
}, | |
"StringEquals": { | |
"ec2:CreateAction": "CreateSecurityGroup" | |
} | |
}, | |
"Effect": "Allow", | |
"Resource": "arn:aws:ec2:*:*:security-group/*" | |
}, | |
{ | |
"Action": [ | |
"ec2:DeleteTags", | |
"ec2:CreateTags" | |
], | |
"Condition": { | |
"Null": { | |
"aws:RequestTag/elbv2.k8s.aws/cluster": "true", | |
"aws:ResourceTag/elbv2.k8s.aws/cluster": "false" | |
} | |
}, | |
"Effect": "Allow", | |
"Resource": "arn:aws:ec2:*:*:security-group/*" | |
}, | |
{ | |
"Action": [ | |
"ec2:RevokeSecurityGroupIngress", | |
"ec2:DeleteSecurityGroup", | |
"ec2:AuthorizeSecurityGroupIngress" | |
], | |
"Condition": { | |
"Null": { | |
"aws:ResourceTag/elbv2.k8s.aws/cluster": "false" | |
} | |
}, | |
"Effect": "Allow", | |
"Resource": "*" | |
}, | |
{ | |
"Action": [ | |
"elasticloadbalancing:CreateTargetGroup", | |
"elasticloadbalancing:CreateLoadBalancer", | |
"elasticloadbalancing:AddTags" | |
], | |
"Condition": { | |
"Null": { | |
"aws:RequestTag/elbv2.k8s.aws/cluster": "false" | |
} | |
}, | |
"Effect": "Allow", | |
"Resource": "*" | |
}, | |
{ | |
"Action": [ | |
"elasticloadbalancing:DeleteRule", | |
"elasticloadbalancing:DeleteListener", | |
"elasticloadbalancing:CreateRule", | |
"elasticloadbalancing:CreateListener", | |
"elasticloadbalancing:AddTags" | |
], | |
"Effect": "Allow", | |
"Resource": "*" | |
}, | |
{ | |
"Action": [ | |
"elasticloadbalancing:RemoveTags", | |
"elasticloadbalancing:AddTags" | |
], | |
"Condition": { | |
"Null": { | |
"aws:RequestTag/elbv2.k8s.aws/cluster": "true", | |
"aws:ResourceTag/elbv2.k8s.aws/cluster": "false" | |
} | |
}, | |
"Effect": "Allow", | |
"Resource": [ | |
"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*", | |
"arn:aws:elasticloadbalancing:*:*:loadbalancer/net/*/*", | |
"arn:aws:elasticloadbalancing:*:*:loadbalancer/app/*/*" | |
] | |
}, | |
{ | |
"Action": [ | |
"elasticloadbalancing:RemoveTags", | |
"elasticloadbalancing:AddTags" | |
], | |
"Effect": "Allow", | |
"Resource": [ | |
"arn:aws:elasticloadbalancing:*:*:listener/net/*/*/*", | |
"arn:aws:elasticloadbalancing:*:*:listener/app/*/*/*", | |
"arn:aws:elasticloadbalancing:*:*:listener-rule/net/*/*/*", | |
"arn:aws:elasticloadbalancing:*:*:listener-rule/app/*/*/*" | |
] | |
}, | |
{ | |
"Action": [ | |
"elasticloadbalancing:SetSubnets", | |
"elasticloadbalancing:SetSecurityGroups", | |
"elasticloadbalancing:SetIpAddressType", | |
"elasticloadbalancing:ModifyTargetGroupAttributes", | |
"elasticloadbalancing:ModifyTargetGroup", | |
"elasticloadbalancing:ModifyLoadBalancerAttributes", | |
"elasticloadbalancing:ModifyListenerAttributes", | |
"elasticloadbalancing:ModifyIpPools", | |
"elasticloadbalancing:ModifyCapacityReservation", | |
"elasticloadbalancing:DeleteTargetGroup", | |
"elasticloadbalancing:DeleteLoadBalancer" | |
], | |
"Condition": { | |
"Null": { | |
"aws:ResourceTag/elbv2.k8s.aws/cluster": "false" | |
} | |
}, | |
"Effect": "Allow", | |
"Resource": "*" | |
}, | |
{ | |
"Action": "elasticloadbalancing:AddTags", | |
"Condition": { | |
"Null": { | |
"aws:RequestTag/elbv2.k8s.aws/cluster": "false" | |
}, | |
"StringEquals": { | |
"elasticloadbalancing:CreateAction": [ | |
"CreateTargetGroup", | |
"CreateLoadBalancer" | |
] | |
} | |
}, | |
"Effect": "Allow", | |
"Resource": [ | |
"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*", | |
"arn:aws:elasticloadbalancing:*:*:loadbalancer/net/*/*", | |
"arn:aws:elasticloadbalancing:*:*:loadbalancer/app/*/*" | |
] | |
}, | |
{ | |
"Action": [ | |
"elasticloadbalancing:RegisterTargets", | |
"elasticloadbalancing:DeregisterTargets" | |
], | |
"Effect": "Allow", | |
"Resource": "arn:aws:elasticloadbalancing:*:*:targetgroup/*/*" | |
}, | |
{ | |
"Action": [ | |
"elasticloadbalancing:SetWebAcl", | |
"elasticloadbalancing:SetRulePriorities", | |
"elasticloadbalancing:RemoveListenerCertificates", | |
"elasticloadbalancing:ModifyRule", | |
"elasticloadbalancing:ModifyListener", | |
"elasticloadbalancing:AddListenerCertificates" | |
], | |
"Effect": "Allow", | |
"Resource": "*" | |
} | |
], | |
"Version": "2012-10-17", | |
"policy_arn": "arn:aws:iam::967823535676:policy/AmazonEKS_AWS_Load_Balancer_Controller-20250521002808300500000001" | |
} | |
] | |
} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"Path": "/", | |
"RoleName": "ebs-csi-inlchu3g6soa2x4gap9mzok4na", | |
"RoleId": "AROA6CVWHFY6HF3KAYOE6", | |
"Arn": "arn:aws:iam::967823535676:role/ebs-csi-inlchu3g6soa2x4gap9mzok4na", | |
"CreateDate": "2025-05-20T23:20:08+00:00", | |
"AssumeRolePolicyDocument": { | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Effect": "Allow", | |
"Principal": { | |
"Federated": "arn:aws:iam::967823535676:oidc-provider/oidc.eks.us-west-2.amazonaws.com/id/98193A85D4F59D436ED6A77BA0DFE598" | |
}, | |
"Action": "sts:AssumeRoleWithWebIdentity", | |
"Condition": { | |
"StringEquals": { | |
"oidc.eks.us-west-2.amazonaws.com/id/98193A85D4F59D436ED6A77BA0DFE598:aud": "sts.amazonaws.com", | |
"oidc.eks.us-west-2.amazonaws.com/id/98193A85D4F59D436ED6A77BA0DFE598:sub": "system:serviceaccount:ebs-csi-controller:ebs-csi-controller-sa" | |
} | |
} | |
} | |
] | |
}, | |
"MaxSessionDuration": 3600, | |
"policy_docs": [ | |
{ | |
"Statement": [ | |
{ | |
"Action": [ | |
"ec2:ModifyVolume", | |
"ec2:EnableFastSnapshotRestores", | |
"ec2:DetachVolume", | |
"ec2:DescribeVolumesModifications", | |
"ec2:DescribeVolumes", | |
"ec2:DescribeTags", | |
"ec2:DescribeSnapshots", | |
"ec2:DescribeInstances", | |
"ec2:DescribeAvailabilityZones", | |
"ec2:CreateSnapshot", | |
"ec2:AttachVolume" | |
], | |
"Effect": "Allow", | |
"Resource": "*" | |
}, | |
{ | |
"Action": "ec2:CreateTags", | |
"Condition": { | |
"StringEquals": { | |
"ec2:CreateAction": [ | |
"CreateVolume", | |
"CreateSnapshot" | |
] | |
} | |
}, | |
"Effect": "Allow", | |
"Resource": [ | |
"arn:aws:ec2:*:*:volume/*", | |
"arn:aws:ec2:*:*:snapshot/*" | |
] | |
}, | |
{ | |
"Action": "ec2:DeleteTags", | |
"Effect": "Allow", | |
"Resource": [ | |
"arn:aws:ec2:*:*:volume/*", | |
"arn:aws:ec2:*:*:snapshot/*" | |
] | |
}, | |
{ | |
"Action": "ec2:CreateVolume", | |
"Condition": { | |
"StringLike": { | |
"aws:RequestTag/ebs.csi.aws.com/cluster": "true" | |
} | |
}, | |
"Effect": "Allow", | |
"Resource": "arn:aws:ec2:*:*:volume/*" | |
}, | |
{ | |
"Action": "ec2:CreateVolume", | |
"Condition": { | |
"StringLike": { | |
"aws:RequestTag/CSIVolumeName": "*" | |
} | |
}, | |
"Effect": "Allow", | |
"Resource": "arn:aws:ec2:*:*:volume/*" | |
}, | |
{ | |
"Action": "ec2:CreateVolume", | |
"Condition": { | |
"StringLike": { | |
"aws:RequestTag/kubernetes.io/cluster/*": "owned" | |
} | |
}, | |
"Effect": "Allow", | |
"Resource": "*" | |
}, | |
{ | |
"Action": "ec2:CreateVolume", | |
"Effect": "Allow", | |
"Resource": "arn:aws:ec2:*:*:snapshot/*" | |
}, | |
{ | |
"Action": "ec2:DeleteVolume", | |
"Condition": { | |
"StringLike": { | |
"ec2:ResourceTag/ebs.csi.aws.com/cluster": "true" | |
} | |
}, | |
"Effect": "Allow", | |
"Resource": "*" | |
}, | |
{ | |
"Action": "ec2:DeleteVolume", | |
"Condition": { | |
"StringLike": { | |
"ec2:ResourceTag/CSIVolumeName": "*" | |
} | |
}, | |
"Effect": "Allow", | |
"Resource": "*" | |
}, | |
{ | |
"Action": "ec2:DeleteVolume", | |
"Condition": { | |
"StringLike": { | |
"ec2:ResourceTag/kubernetes.io/cluster/*": "owned" | |
} | |
}, | |
"Effect": "Allow", | |
"Resource": "*" | |
}, | |
{ | |
"Action": "ec2:DeleteVolume", | |
"Condition": { | |
"StringLike": { | |
"ec2:ResourceTag/kubernetes.io/created-for/pvc/name": "*" | |
} | |
}, | |
"Effect": "Allow", | |
"Resource": "*" | |
}, | |
{ | |
"Action": "ec2:DeleteSnapshot", | |
"Condition": { | |
"StringLike": { | |
"ec2:ResourceTag/CSIVolumeSnapshotName": "*" | |
} | |
}, | |
"Effect": "Allow", | |
"Resource": "*" | |
}, | |
{ | |
"Action": "ec2:DeleteSnapshot", | |
"Condition": { | |
"StringLike": { | |
"ec2:ResourceTag/ebs.csi.aws.com/cluster": "true" | |
} | |
}, | |
"Effect": "Allow", | |
"Resource": "*" | |
} | |
], | |
"Version": "2012-10-17", | |
"policy_arn": "arn:aws:iam::967823535676:policy/AmazonEKS_EBS_CSI_Policy-20250520175051125200000003" | |
} | |
] | |
} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"Path": "/", | |
"RoleName": "inlchu3g6soa2x4gap9mzok4na-eks-external-secrets-irsa", | |
"RoleId": "AROA6CVWHFY6HJJFTKI46", | |
"Arn": "arn:aws:iam::967823535676:role/inlchu3g6soa2x4gap9mzok4na-eks-external-secrets-irsa", | |
"CreateDate": "2025-05-21T19:42:22+00:00", | |
"AssumeRolePolicyDocument": { | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Effect": "Allow", | |
"Principal": { | |
"Federated": "arn:aws:iam::967823535676:oidc-provider/oidc.eks.us-west-2.amazonaws.com/id/98193A85D4F59D436ED6A77BA0DFE598" | |
}, | |
"Action": "sts:AssumeRoleWithWebIdentity", | |
"Condition": { | |
"StringEquals": { | |
"oidc.eks.us-west-2.amazonaws.com/id/98193A85D4F59D436ED6A77BA0DFE598:aud": "sts.amazonaws.com", | |
"oidc.eks.us-west-2.amazonaws.com/id/98193A85D4F59D436ED6A77BA0DFE598:sub": "system:serviceaccount:external-secrets:external-secrets" | |
} | |
} | |
} | |
] | |
}, | |
"MaxSessionDuration": 3600, | |
"policy_docs": [ | |
{ | |
"Statement": [ | |
{ | |
"Action": [ | |
"secretsmanager:ListSecrets", | |
"secretsmanager:ListSecretVersionIds", | |
"secretsmanager:GetSecretValue", | |
"secretsmanager:GetResourcePolicy", | |
"secretsmanager:GetRandomPassword", | |
"secretsmanager:DescribeSecret", | |
"secretsmanager:BatchGetSecretValue" | |
], | |
"Effect": "Allow", | |
"Resource": "*" | |
} | |
], | |
"Version": "2012-10-17", | |
"policy_arn": "arn:aws:iam::967823535676:policy/inlchu3g6soa2x4gap9mzok4na-external-secrets" | |
} | |
] | |
} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"Path": "/", | |
"RoleName": "inlchu3g6soa2x4gap9mzok4na-maintenance", | |
"RoleId": "AROA6CVWHFY6HNGBNQPE6", | |
"Arn": "arn:aws:iam::967823535676:role/inlchu3g6soa2x4gap9mzok4na-maintenance", | |
"CreateDate": "2025-05-20T17:12:53+00:00", | |
"AssumeRolePolicyDocument": { | |
"Version": "2008-10-17", | |
"Statement": [ | |
{ | |
"Effect": "Allow", | |
"Principal": { | |
"AWS": "arn:aws:iam::967823535676:role/ra-test-kyruus-RunnerInstanceRole-jK9ieuI9QFfZ" | |
}, | |
"Action": "sts:AssumeRole" | |
} | |
] | |
}, | |
"Description": "", | |
"MaxSessionDuration": 3600, | |
"policy_docs": [ | |
{ | |
"Statement": [ | |
{ | |
"Action": [ | |
"ecr:*", | |
"cloudtrail:LookupEvents" | |
], | |
"Effect": "Allow", | |
"Resource": "arn:aws:ecr:us-west-2:967823535676:repository/inlchu3g6soa2x4gap9mzok4na" | |
}, | |
{ | |
"Action": "iam:CreateServiceLinkedRole", | |
"Condition": { | |
"StringEquals": { | |
"iam:AWSServiceName": "replication.ecr.amazonaws.com" | |
} | |
}, | |
"Effect": "Allow", | |
"Resource": "arn:aws:ecr:us-west-2:967823535676:repository/inlchu3g6soa2x4gap9mzok4na" | |
} | |
], | |
"Version": "2012-10-17", | |
"policy_arn": "arn:aws:iam::967823535676:policy/ecr-access-inlchu3g6soa2x4gap9mzok4na" | |
}, | |
{ | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Action": [ | |
"rds:CreateDBSubnetGroup", | |
"rds:CreateTenantDatabase", | |
"acm:DescribeCertificate", | |
"acm:ListTagsForCertificate", | |
"acm:RequestCertificate", | |
"ec2:AuthorizeSecurityGroupIngress", | |
"ec2:CreateTags", | |
"ec2:CreateSecurityGroup", | |
"ec2:DescribeAvailabilityZones", | |
"ec2:DescribeInternetGateways", | |
"ec2:DescribeSecurityGroupRules", | |
"ec2:DescribeSecurityGroups", | |
"ec2:DescribeSubnets", | |
"ec2:DescribeVpcs", | |
"ec2:RevokeSecurityGroupEgress", | |
"ec2:RevokeSecurityGroupIngress", | |
"ecr:BatchCheckLayerAvailability", | |
"ecr:BatchGetImage", | |
"ecr:CompleteLayerUpload", | |
"ecr:GetAuthorizationToken", | |
"ecr:GetDownloadUrlForLayer", | |
"ecr:InitiateLayerUpload", | |
"ecr:PutImage", | |
"ecr:UploadLayerPart", | |
"eks:DescribeCluster", | |
"eks:DescribeNodegroup", | |
"eks:ListNodegroups", | |
"eks:TagResource", | |
"elasticloadbalancing:AddTags", | |
"elasticloadbalancing:CreateTargetGroup", | |
"elasticloadbalancing:DescribeTags", | |
"elasticloadbalancing:DescribeTargetGroupAttributes", | |
"elasticloadbalancing:DescribeTargetGroups", | |
"elasticloadbalancing:ModifyTargetGroupAttributes", | |
"iam:AttachRolePolicy", | |
"iam:CreateOpenIDConnectProvider", | |
"iam:CreatePolicy", | |
"iam:CreateRole", | |
"iam:DetachRolePolicy", | |
"iam:DeleteOpenIDConnectProvider", | |
"iam:CreateServiceLinkedRole", | |
"iam:GetRole", | |
"iam:GetOpenIDConnectProvider", | |
"iam:GetRolePolicy", | |
"iam:GetPolicy", | |
"iam:GetPolicyVersion", | |
"iam:ListAttachedRolePolicies", | |
"iam:ListOpenIDConnectProviders", | |
"iam:ListRolePolicies", | |
"iam:ListRoleTags", | |
"iam:PassRole", | |
"iam:PutRolePolicy", | |
"iam:TagOpenIDConnectProvider", | |
"iam:TagRole", | |
"iam:TagPolicy", | |
"kms:CreateGrant", | |
"kms:Decrypt", | |
"kms:DescribeKey", | |
"kms:GenerateDataKey", | |
"rds:AddTagsToResource", | |
"rds:CreateDBInstance", | |
"rds:CreateDBParameterGroup", | |
"rds:CreateTenantDatabase", | |
"rds:DescribeDBInstances", | |
"rds:DescribeDBParameterGroups", | |
"rds:DescribeDBParameters", | |
"rds:DescribeDBSubnetGroups", | |
"rds:ListTagsForResource", | |
"rds:ModifyDBParameterGroup", | |
"route53:ChangeResourceRecordSets", | |
"route53:ChangeTagsForResource", | |
"route53:CreateHostedZone", | |
"route53:DeleteHostedZone", | |
"route53:GetChange", | |
"route53:GetHostedZone", | |
"route53:ListResourceRecordSets", | |
"route53:ListTagsForResource", | |
"s3:ListAllMyBuckets", | |
"s3:CreateBucket", | |
"s3:GetBucketTagging", | |
"s3:GetBucketPublicAccessBlock", | |
"s3:PutBucketTagging", | |
"secretsmanager:CreateSecret", | |
"secretsmanager:DescribeSecret", | |
"secretsmanager:TagResource", | |
"sts:AssumeRole", | |
"sts:GetCallerIdentity" | |
], | |
"Resource": "*", | |
"Effect": "Allow" | |
} | |
], | |
"policy_name": "inlchu3g6soa2x4gap9mzok4na-maintenance-minimal" | |
} | |
], | |
"permissions_boundary": { | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Effect": "Allow", | |
"Action": "*", | |
"Resource": "*" | |
}, | |
{ | |
"Effect": "Deny", | |
"Action": [ | |
"secretsmanager:GetSecretValue", | |
"rds-db:connect", | |
"rds-data:Execute*", | |
"elasticache:Connect", | |
"ec2-instance-connect:*", | |
"logs:GetLogEvents", | |
"logs:DescribeLogStreams", | |
"logs:FilterLogEvents" | |
], | |
"Resource": "*" | |
}, | |
{ | |
"Effect": "Deny", | |
"Action": "s3:GetObject", | |
"NotResource": "arn:aws:s3:::inlchu3g6soa2x4gap9mzok4na-terraform-state/*" | |
}, | |
{ | |
"Effect": "Deny", | |
"Action": [ | |
"iam:PutRolePermissionsBoundary", | |
"iam:CreateRole" | |
], | |
"Condition": { | |
"StringNotEquals": { | |
"iam:PermissionsBoundary": "arn:aws:iam::policy/inlchu3g6soa2x4gap9mzok4na-permissions-boundary" | |
} | |
}, | |
"Resource": "*" | |
}, | |
{ | |
"Effect": "Deny", | |
"Action": [ | |
"sts:AssumeRole", | |
"iam:UpdateAssumeRolePolicy", | |
"lambda:UpdateFunctionCode", | |
"lambda:InvokeFunction", | |
"lambda:CreateEventSourceMapping", | |
"iam:UpdateLoginProfile", | |
"iam:DeleteRolePermissionsBoundary", | |
"iam:CreateLoginProfile", | |
"iam:CreateAccessKey", | |
"glue:UpdateDevEndpoint", | |
"datapipeline:CreatePipeline", | |
"cloudformation:CreateStack" | |
], | |
"Resource": "*" | |
}, | |
{ | |
"Effect": "Deny", | |
"Action": [ | |
"eks:UpdateAccessEntry", | |
"eks:DisassociateAccessPolicy", | |
"eks:DeleteAccessEntry" | |
], | |
"Resource": "*" | |
}, | |
{ | |
"Effect": "Deny", | |
"Action": [ | |
"iam:SetDefaultPolicyVersion", | |
"iam:DeletePolicyVersion", | |
"iam:DeletePolicy", | |
"iam:CreatePolicyVersion" | |
], | |
"Resource": "arn:aws:iam::policy/inlchu3g6soa2x4gap9mzok4na-permissions-boundary" | |
} | |
] | |
} | |
} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"Path": "/", | |
"RoleName": "inlchu3g6soa2x4gap9mzok4na-provision", | |
"RoleId": "AROA6CVWHFY6DMIESQ7EK", | |
"Arn": "arn:aws:iam::967823535676:role/inlchu3g6soa2x4gap9mzok4na-provision", | |
"CreateDate": "2025-05-20T17:12:54+00:00", | |
"AssumeRolePolicyDocument": { | |
"Version": "2008-10-17", | |
"Statement": [ | |
{ | |
"Effect": "Allow", | |
"Principal": { | |
"AWS": "arn:aws:iam::967823535676:role/ra-test-kyruus-RunnerInstanceRole-jK9ieuI9QFfZ" | |
}, | |
"Action": "sts:AssumeRole" | |
} | |
] | |
}, | |
"Description": "", | |
"MaxSessionDuration": 3600, | |
"policy_docs": [ | |
{ | |
"Statement": [ | |
{ | |
"Action": [ | |
"ecr:*", | |
"cloudtrail:LookupEvents" | |
], | |
"Effect": "Allow", | |
"Resource": "arn:aws:ecr:us-west-2:967823535676:repository/inlchu3g6soa2x4gap9mzok4na" | |
}, | |
{ | |
"Action": "iam:CreateServiceLinkedRole", | |
"Condition": { | |
"StringEquals": { | |
"iam:AWSServiceName": "replication.ecr.amazonaws.com" | |
} | |
}, | |
"Effect": "Allow", | |
"Resource": "arn:aws:ecr:us-west-2:967823535676:repository/inlchu3g6soa2x4gap9mzok4na" | |
} | |
], | |
"Version": "2012-10-17", | |
"policy_arn": "arn:aws:iam::967823535676:policy/ecr-access-inlchu3g6soa2x4gap9mzok4na" | |
}, | |
{ | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Action": [ | |
"ec2:AuthorizeSecurityGroupEgress", | |
"ec2:AuthorizeSecurityGroupIngress", | |
"ec2:CreateLaunchTemplate", | |
"ec2:CreateSecurityGroup", | |
"ec2:CreateTags", | |
"ec2:DescribeAvailabilityZones", | |
"ec2:DescribeLaunchTemplates", | |
"ec2:DescribeLaunchTemplateVersions", | |
"ec2:DescribeRouteTables", | |
"ec2:DescribeSecurityGroups", | |
"ec2:DescribeSecurityGroupRules", | |
"ec2:DescribeSubnets", | |
"ec2:DescribeTags", | |
"ec2:DescribeVpcAttribute", | |
"ec2:DescribeVpcs", | |
"ec2:RevokeSecurityGroupEgress", | |
"ec2:RunInstances", | |
"ec2:RunInstances", | |
"ec2:RunInstances", | |
"ec2:RunInstances", | |
"ec2:RunInstances", | |
"ecr:CreateRepository", | |
"ecr:DescribeRepositories", | |
"ecr:ListTagsForResource", | |
"ecr:TagResource", | |
"eks:AssociateAccessPolicy", | |
"eks:CreateAccessEntry", | |
"eks:CreateAddon", | |
"eks:CreateCluster", | |
"eks:CreateNodegroup", | |
"eks:DescribeAccessEntry", | |
"eks:DescribeAddon", | |
"eks:DescribeAddonVersions", | |
"eks:DescribeCluster", | |
"eks:DescribeNodegroup", | |
"eks:TagResource", | |
"eks:ListAssociatedAccessPolicies", | |
"iam:AttachRolePolicy", | |
"iam:CreateOpenIDConnectProvider", | |
"iam:CreatePolicy", | |
"iam:CreateRole", | |
"iam:DetachRolePolicy", | |
"iam:DeleteOpenIDConnectProvider", | |
"iam:CreateServiceLinkedRole", | |
"iam:GetRole", | |
"iam:GetOpenIDConnectProvider", | |
"iam:GetRolePolicy", | |
"iam:GetPolicy", | |
"iam:GetPolicyVersion", | |
"iam:ListAttachedRolePolicies", | |
"iam:ListRolePolicies", | |
"iam:ListRoleTags", | |
"iam:PassRole", | |
"iam:PutRolePolicy", | |
"iam:TagOpenIDConnectProvider", | |
"iam:TagRole", | |
"iam:TagPolicy", | |
"kms:CreateGrant", | |
"kms:CreateKey", | |
"kms:DescribeKey", | |
"kms:GetKeyPolicy", | |
"kms:GetKeyRotationStatus", | |
"kms:ListResourceTags", | |
"kms:PutKeyPolicy", | |
"kms:TagResource", | |
"logs:CreateLogGroup", | |
"logs:DescribeLogGroups", | |
"logs:ListTagsForResource", | |
"logs:PutRetentionPolicy", | |
"logs:TagResource", | |
"ssm:GetParameters", | |
"sts:AssumeRole", | |
"sts:GetCallerIdentity" | |
], | |
"Resource": "*", | |
"Effect": "Allow" | |
} | |
], | |
"policy_name": "inlchu3g6soa2x4gap9mzok4na-provision-minimal" | |
} | |
] | |
} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"Path": "/", | |
"RoleName": "ra-test-kyruus-cluster-20250520175051100300000001", | |
"RoleId": "AROA6CVWHFY6G7ZJT7KD6", | |
"Arn": "arn:aws:iam::967823535676:role/ra-test-kyruus-cluster-20250520175051100300000001", | |
"CreateDate": "2025-05-20T17:50:51+00:00", | |
"AssumeRolePolicyDocument": { | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Sid": "EKSClusterAssumeRole", | |
"Effect": "Allow", | |
"Principal": { | |
"Service": "eks.amazonaws.com" | |
}, | |
"Action": [ | |
"sts:TagSession", | |
"sts:AssumeRole" | |
] | |
} | |
] | |
}, | |
"MaxSessionDuration": 3600, | |
"policy_docs": [ | |
{ | |
"Statement": [ | |
{ | |
"Action": [ | |
"kms:Encrypt", | |
"kms:Decrypt", | |
"kms:ListGrants", | |
"kms:DescribeKey" | |
], | |
"Effect": "Allow", | |
"Resource": "arn:aws:kms:us-west-2:967823535676:key/710514c8-4b4f-4347-a533-6a8c1d3a1e62" | |
} | |
], | |
"Version": "2012-10-17", | |
"policy_arn": "arn:aws:iam::967823535676:policy/ra-test-kyruus-cluster-ClusterEncryption20250520175055381500000007" | |
}, | |
{ | |
"Statement": [ | |
{ | |
"Action": [ | |
"ec2:RunInstances", | |
"ec2:CreateLaunchTemplate", | |
"ec2:CreateFleet" | |
], | |
"Condition": { | |
"StringEquals": { | |
"aws:RequestTag/eks:eks-cluster-name": "${aws:PrincipalTag/eks:eks-cluster-name}" | |
}, | |
"StringLike": { | |
"aws:RequestTag/eks:kubernetes-node-class-name": "*", | |
"aws:RequestTag/eks:kubernetes-node-pool-name": "*" | |
} | |
}, | |
"Effect": "Allow", | |
"Resource": "*", | |
"Sid": "Compute" | |
}, | |
{ | |
"Action": [ | |
"ec2:CreateVolume", | |
"ec2:CreateSnapshot" | |
], | |
"Condition": { | |
"StringEquals": { | |
"aws:RequestTag/eks:eks-cluster-name": "${aws:PrincipalTag/eks:eks-cluster-name}" | |
} | |
}, | |
"Effect": "Allow", | |
"Resource": [ | |
"arn:aws:ec2:*:*:volume/*", | |
"arn:aws:ec2:*:*:snapshot/*" | |
], | |
"Sid": "Storage" | |
}, | |
{ | |
"Action": "ec2:CreateNetworkInterface", | |
"Condition": { | |
"StringEquals": { | |
"aws:RequestTag/eks:eks-cluster-name": "${aws:PrincipalTag/eks:eks-cluster-name}", | |
"aws:RequestTag/eks:kubernetes-cni-node-name": "*" | |
} | |
}, | |
"Effect": "Allow", | |
"Resource": "*", | |
"Sid": "Networking" | |
}, | |
{ | |
"Action": [ | |
"elasticloadbalancing:CreateTargetGroup", | |
"elasticloadbalancing:CreateRule", | |
"elasticloadbalancing:CreateLoadBalancer", | |
"elasticloadbalancing:CreateListener", | |
"ec2:CreateSecurityGroup" | |
], | |
"Condition": { | |
"StringEquals": { | |
"aws:RequestTag/eks:eks-cluster-name": "${aws:PrincipalTag/eks:eks-cluster-name}" | |
} | |
}, | |
"Effect": "Allow", | |
"Resource": "*", | |
"Sid": "LoadBalancer" | |
}, | |
{ | |
"Action": "shield:CreateProtection", | |
"Condition": { | |
"StringEquals": { | |
"aws:RequestTag/eks:eks-cluster-name": "${aws:PrincipalTag/eks:eks-cluster-name}" | |
} | |
}, | |
"Effect": "Allow", | |
"Resource": "*", | |
"Sid": "ShieldProtection" | |
}, | |
{ | |
"Action": "shield:TagResource", | |
"Condition": { | |
"StringEquals": { | |
"aws:RequestTag/eks:eks-cluster-name": "${aws:PrincipalTag/eks:eks-cluster-name}" | |
} | |
}, | |
"Effect": "Allow", | |
"Resource": "arn:aws:shield::*:protection/*", | |
"Sid": "ShieldTagResource" | |
} | |
], | |
"Version": "2012-10-17", | |
"policy_arn": "arn:aws:iam::967823535676:policy/ra-test-kyruus-cluster-20250520175051143200000005" | |
}, | |
{ | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Sid": "AmazonEKSClusterPolicy", | |
"Effect": "Allow", | |
"Action": [ | |
"autoscaling:DescribeAutoScalingGroups", | |
"autoscaling:UpdateAutoScalingGroup", | |
"ec2:AttachVolume", | |
"ec2:AuthorizeSecurityGroupIngress", | |
"ec2:CreateRoute", | |
"ec2:CreateSecurityGroup", | |
"ec2:CreateTags", | |
"ec2:CreateVolume", | |
"ec2:DeleteRoute", | |
"ec2:DeleteSecurityGroup", | |
"ec2:DeleteVolume", | |
"ec2:DescribeInstances", | |
"ec2:DescribeRouteTables", | |
"ec2:DescribeSecurityGroups", | |
"ec2:DescribeSubnets", | |
"ec2:DescribeVolumes", | |
"ec2:DescribeVolumesModifications", | |
"ec2:DescribeVpcs", | |
"ec2:DescribeDhcpOptions", | |
"ec2:DescribeNetworkInterfaces", | |
"ec2:DescribeAvailabilityZones", | |
"ec2:DetachVolume", | |
"ec2:ModifyInstanceAttribute", | |
"ec2:ModifyVolume", | |
"ec2:RevokeSecurityGroupIngress", | |
"ec2:DescribeAccountAttributes", | |
"ec2:DescribeAddresses", | |
"ec2:DescribeInternetGateways", | |
"ec2:DescribeInstanceTopology", | |
"elasticloadbalancing:AddTags", | |
"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer", | |
"elasticloadbalancing:AttachLoadBalancerToSubnets", | |
"elasticloadbalancing:ConfigureHealthCheck", | |
"elasticloadbalancing:CreateListener", | |
"elasticloadbalancing:CreateLoadBalancer", | |
"elasticloadbalancing:CreateLoadBalancerListeners", | |
"elasticloadbalancing:CreateLoadBalancerPolicy", | |
"elasticloadbalancing:CreateTargetGroup", | |
"elasticloadbalancing:DeleteListener", | |
"elasticloadbalancing:DeleteLoadBalancer", | |
"elasticloadbalancing:DeleteLoadBalancerListeners", | |
"elasticloadbalancing:DeleteTargetGroup", | |
"elasticloadbalancing:DeregisterInstancesFromLoadBalancer", | |
"elasticloadbalancing:DeregisterTargets", | |
"elasticloadbalancing:DescribeListeners", | |
"elasticloadbalancing:DescribeLoadBalancerAttributes", | |
"elasticloadbalancing:DescribeLoadBalancerPolicies", | |
"elasticloadbalancing:DescribeLoadBalancers", | |
"elasticloadbalancing:DescribeTargetGroupAttributes", | |
"elasticloadbalancing:DescribeTargetGroups", | |
"elasticloadbalancing:DescribeTargetHealth", | |
"elasticloadbalancing:DetachLoadBalancerFromSubnets", | |
"elasticloadbalancing:ModifyListener", | |
"elasticloadbalancing:ModifyLoadBalancerAttributes", | |
"elasticloadbalancing:ModifyTargetGroup", | |
"elasticloadbalancing:ModifyTargetGroupAttributes", | |
"elasticloadbalancing:RegisterInstancesWithLoadBalancer", | |
"elasticloadbalancing:RegisterTargets", | |
"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer", | |
"elasticloadbalancing:SetLoadBalancerPoliciesOfListener", | |
"kms:DescribeKey" | |
], | |
"Resource": "*" | |
}, | |
{ | |
"Sid": "AmazonEKSClusterPolicySLRCreate", | |
"Effect": "Allow", | |
"Action": "iam:CreateServiceLinkedRole", | |
"Resource": "*", | |
"Condition": { | |
"StringEquals": { | |
"iam:AWSServiceName": "elasticloadbalancing.amazonaws.com" | |
} | |
} | |
}, | |
{ | |
"Sid": "AmazonEKSClusterPolicyENIDelete", | |
"Effect": "Allow", | |
"Action": "ec2:DeleteNetworkInterface", | |
"Resource": "*", | |
"Condition": { | |
"StringEquals": { | |
"ec2:ResourceTag/eks:eni:owner": "amazon-vpc-cni" | |
} | |
} | |
} | |
], | |
"policy_arn": "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy" | |
}, | |
{ | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Effect": "Allow", | |
"Action": "ec2:CreateNetworkInterfacePermission", | |
"Resource": "*", | |
"Condition": { | |
"ForAnyValue:StringEquals": { | |
"ec2:ResourceTag/eks:eni:owner": "eks-vpc-resource-controller" | |
} | |
} | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"ec2:CreateNetworkInterface", | |
"ec2:DetachNetworkInterface", | |
"ec2:ModifyNetworkInterfaceAttribute", | |
"ec2:DeleteNetworkInterface", | |
"ec2:AttachNetworkInterface", | |
"ec2:UnassignPrivateIpAddresses", | |
"ec2:AssignPrivateIpAddresses" | |
], | |
"Resource": "*" | |
} | |
], | |
"policy_arn": "arn:aws:iam::aws:policy/AmazonEKSVPCResourceController" | |
} | |
] | |
} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"Path": "/", | |
"RoleName": "ra-test-kyruus-RunnerInstanceRole-jK9ieuI9QFfZ", | |
"RoleId": "AROA6CVWHFY6BDLOQCSQJ", | |
"Arn": "arn:aws:iam::967823535676:role/ra-test-kyruus-RunnerInstanceRole-jK9ieuI9QFfZ", | |
"CreateDate": "2025-05-20T17:12:33+00:00", | |
"AssumeRolePolicyDocument": { | |
"Version": "2008-10-17", | |
"Statement": [ | |
{ | |
"Effect": "Allow", | |
"Principal": { | |
"Service": "ec2.amazonaws.com" | |
}, | |
"Action": "sts:AssumeRole" | |
} | |
] | |
}, | |
"Description": "Instance role for the runner ec2 instance and ASG. Used to assume Provision, Deprovision, and Maintenance roles as needed by the app.", | |
"MaxSessionDuration": 3600, | |
"policy_docs": [ | |
{ | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Action": [ | |
"logs:CreateLogStream", | |
"logs:PutLogEvents" | |
], | |
"Resource": [ | |
"arn:aws:logs:us-west-2:967823535676:log-group:runner-run71v31mb1w038twk9yskeray:*" | |
], | |
"Effect": "Allow" | |
} | |
], | |
"policy_name": "nuon-install-inlchu3g6soa2x4gap9mzok4na-cw-logs-access" | |
}, | |
{ | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Condition": { | |
"StringEquals": { | |
"aws:Ec2InstanceSourceVpc": "vpc-0cbf560d4bbc33c74" | |
} | |
}, | |
"Action": [ | |
"ec2:DescribeTags" | |
], | |
"Resource": "*", | |
"Effect": "Allow" | |
} | |
], | |
"policy_name": "nuon-install-inlchu3g6soa2x4gap9mzok4na-metadata" | |
}, | |
{ | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Action": [ | |
"sts:AssumeRole" | |
], | |
"Resource": "*", | |
"Effect": "Allow" | |
} | |
], | |
"policy_name": "RunnerInstancePolicy" | |
} | |
] | |
} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"Path": "/", | |
"RoleName": "ra-test-kyruus-RunnerPhoneHomeRole-MbTDUR5HcsT1", | |
"RoleId": "AROA6CVWHFY6OGQXNVTYL", | |
"Arn": "arn:aws:iam::967823535676:role/ra-test-kyruus-RunnerPhoneHomeRole-MbTDUR5HcsT1", | |
"CreateDate": "2025-05-20T17:12:33+00:00", | |
"AssumeRolePolicyDocument": { | |
"Version": "2008-10-17", | |
"Statement": [ | |
{ | |
"Effect": "Allow", | |
"Principal": { | |
"Service": "lambda.amazonaws.com" | |
}, | |
"Action": "sts:AssumeRole" | |
} | |
] | |
}, | |
"Description": "", | |
"MaxSessionDuration": 3600, | |
"policy_docs": [ | |
{ | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"logs:CreateLogGroup", | |
"logs:CreateLogStream", | |
"logs:PutLogEvents" | |
], | |
"Resource": "*" | |
} | |
], | |
"policy_arn": "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" | |
}, | |
{ | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Action": [ | |
"logs:CreateLogGroup", | |
"logs:CreateLogStream", | |
"logs:PutLogEvents" | |
], | |
"Resource": "*", | |
"Effect": "Allow" | |
} | |
], | |
"policy_name": "CloudwatchPolicy" | |
} | |
] | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
notes:
allow: *
, to be clear.)