【问题标题】:Create IAM role only with managed cloudformation policy仅使用托管 cloudformation 策略创建 IAM 角色
【发布时间】:2017-01-31 17:08:54
【问题描述】:

我正在尝试使用现有的管理策略创建 IAM 角色:

"SomeRole": 
        {
            "Type": "AWS::IAM::Role",
            "Properties": 
            {
                "AssumeRolePolicyDocument": {},
                "ManagedPolicyArns": 
                [
                    "arn:aws:iam::aws:policy/AmazonKinesisReadOnlyAccess",
                    "arn:aws:iam::aws:policy/AmazonDynamoDBFullAccess",
                    "arn:aws:iam::aws:policy/CloudWatchFullAccess"
                ],

                "RoleName": "SomeRole"
            }
        },

但它失败并出现错误:位置 (1,3) 的语法错误

【问题讨论】:

  • 您能提供模板的其余部分吗?您可以通过 JSON linter 运行您的模板吗?

标签: amazon-cloudformation


【解决方案1】:

看起来你必须在 AssumeRolePolicyDocument 中有一些价值。

试试这个。

{
  "Resources": {
    "NewRole": {
      "Type": "AWS::IAM::Role",
      "Properties": {
        "AssumeRolePolicyDocument": {
          "Version": "2012-10-17",
          "Statement": [
            {
              "Effect": "Allow",
              "Principal": {
                "Service": [
                  "ec2.amazonaws.com"
                ]
              },
              "Action": [
                "sts:AssumeRole"
              ]
            }
          ]
        },
        "ManagedPolicyArns": [
          "arn:aws:iam::aws:policy/AmazonKinesisReadOnlyAccess",
          "arn:aws:iam::aws:policy/AmazonDynamoDBFullAccess",
          "arn:aws:iam::aws:policy/CloudWatchFullAccess"
        ]
      }
    }
  }
}

【讨论】:

  • 成功了,TY。 CloudFormation 有时真的很痛苦。
猜你喜欢
  • 2017-10-22
  • 2018-02-28
  • 1970-01-01
  • 2018-04-13
  • 2022-01-01
  • 2020-09-01
  • 2019-01-13
  • 1970-01-01
  • 1970-01-01
相关资源
最近更新 更多