Skip to content

Instantly share code, notes, and snippets.

@danilogco
Created December 30, 2024 19:46
Show Gist options
  • Save danilogco/c732c747b1e822c3a682ade5c5f7141f to your computer and use it in GitHub Desktop.
Save danilogco/c732c747b1e822c3a682ade5c5f7141f to your computer and use it in GitHub Desktop.
AWS SAM CLI deploy IAM Role Permissions
Statement:
- Effect: "Allow"
Action:
- "cloudformation:CreateChangeSet"
- "cloudformation:DescribeStackEvents"
- "cloudformation:DescribeStacks"
- "cloudformation:DescribeChangeSet"
- "cloudformation:ExecuteChangeSet"
- "cloudformation:GetTemplate"
- "cloudformation:GetTemplateSummary"
- "cloudformation:UpdateStack"
- "cloudformation:CreateStack"
- "cloudformation:DeleteStack"
- "cloudformation:DescribeStackResources"
- "cloudformation:ListStackResources"
- "s3:GetObject"
- "s3:PutObject"
- "s3:ListBucket"
- "lambda:*"
- "ec2:DescribeSecurityGroups"
- "ec2:DescribeSubnets"
- "ec2:DescribeVpcs"
- "sts:AssumeRole"
- "eks:DescribeCluster"
- "eks:ListFargateProfiles"
- "eks:ListNodegroups"
- "eks:ListUpdates"
- "eks:DescribeCluster"
- "eks:DescribeFargateProfile"
- "eks:DescribeNodegroup"
- "eks:DescribeUpdate"
- "eks:ListClusters"
- "eks:UpdateClusterConfig"
- "eks:UpdateClusterVersion"
- "iam:AttachRolePolicy"
- "iam:CreateRole"
- "iam:DetachRolePolicy"
- "iam:GetRole"
- "iam:PutRolePolicy"
- "iam:TagRole"
- "iam:DeleteRolePolicy"
- "iam:DeleteRole"
- "iam:PassRole"
- "states:StartExecution"
- "apigateway:POST"
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment