-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathterraform-ec2-view-policy.json
83 lines (83 loc) · 2.95 KB
/
terraform-ec2-view-policy.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "EC2DescribeByRegion",
"Effect": "Allow",
"Action": [
"ec2:DescribeInstanceTypeOfferings",
"ec2:DescribeImages",
"ec2:DescribeAvailabilityZones",
"ec2:DescribeKeyPairs",
"ec2:DescribeVpcs",
"ec2:DescribeAddresses",
"ec2:DescribeAddressesAttribute",
"ec2:DescribeInternetGateways",
"ec2:DescribeSecurityGroups",
"ec2:DescribeSecurityGroupRules",
"ec2:DescribeSubnets",
"ec2:DescribeNetworkInterfaces",
"ec2:DescribeRouteTables",
"ec2:DescribeNatGateways",
"ec2:DescribeVpcEndpoints",
"ec2:DescribePrefixLists",
"ec2:DescribeLaunchTemplates",
"ec2:DescribeLaunchTemplateVersions",
"ec2:DescribeInstances",
"ec2:DescribeInstanceTypes",
"ec2:DescribeTags",
"ec2:DescribeVolumes",
"ec2:DescribeInstanceAttribute"
],
"Resource": "*",
"Condition": {
"StringLike": {
"ec2:Region": "{region}"
}
}
},
{
"Sid": "Tagging",
"Effect": "Allow",
"Action": [
"ec2:CreateTags"
],
"Resource": [
"arn:aws:ec2:{region}:{account}:vpc/*",
"arn:aws:ec2:{region}:{account}:security-group/*",
"arn:aws:ec2:{region}:{account}:subnet/*",
"arn:aws:ec2:{region}:{account}:key-pair/e3s-{env}-agent",
"arn:aws:ec2:{region}:{account}:elastic-ip/*",
"arn:aws:ec2:{region}:{account}:internet-gateway/*",
"arn:aws:ec2:{region}:{account}:route-table/*",
"arn:aws:ec2:{region}:{account}:vpc-endpoint/*",
"arn:aws:ec2:{region}:{account}:natgateway/*",
"arn:aws:ec2:{region}:{account}:launch-template/*",
"arn:aws:ec2:{region}:{account}:security-group-rule/*",
"arn:aws:ec2:{region}:{account}:volume/*"
],
"Condition": {
"StringEquals": {
"aws:RequestTag/Name": "e3s",
"aws:RequestTag/Environment": "{env}"
}
}
},
{
"Sid": "E3SServerTagging",
"Effect": "Allow",
"Action": [
"ec2:CreateTags"
],
"Resource": [
"arn:aws:ec2:{region}:{account}:instance/*"
],
"Condition": {
"StringEquals": {
"aws:RequestTag/Name": "e3s-{env}",
"aws:RequestTag/Environment": "{env}"
}
}
}
]
}