{ "info": { "author": "Will Rubel", "author_email": "willrubel@gmail.com", "bugtrack_url": null, "classifiers": [ "Development Status :: 4 - Beta", "Intended Audience :: Developers", "License :: OSI Approved :: MIT License", "Natural Language :: English", "Operating System :: OS Independent", "Programming Language :: Python", "Programming Language :: Python :: 2", "Programming Language :: Python :: 2.6", "Programming Language :: Python :: 2.7", "Programming Language :: Python :: 3", "Programming Language :: Python :: 3.3", "Programming Language :: Python :: 3.4", "Programming Language :: Python :: 3.5", "Programming Language :: Python :: 3.6" ], "description": "AWS Role Creator\n========================\n\nFeatures\n========\n\naws-role-creator creates an aws role.\n\nThe primary purpose is to create roles for projects, which automatically allows them access to various AWS\nresources based-on their project name. If the project name is 'test', they can only access resources which\nbegin with 'TEST' or 'test'\n\n\n\nInstallation\n============\n\naws-role-creator is on PyPI so all you need is:\n\n $ pip install aws-role-creator\n\nExample\n=======\n\nGetting help\n\n $ role-creator upsert --help\n Usage: role-creator upsert [OPTIONS]\n\n Creates a new role\n\n Options:\n -v, --version TEXT code version\n -d, --dryrun dry run\n --no-poll Start the stack work but do not poll\n -i, --ini TEXT INI file with needed information\n -n, --project-name TEXT project name\n -e, --environment-abbreviation TEXT\n environment abbreviation (i.e. dev, pd,\n sb,etc)\n -a, --aws-account-number TEXT aws account number for role or account\n number for aws account role will jump to if\n project_role_jump_account\n -b, --bucket TEXT bucket to upload cf template\n -t, --template-type TEXT template type - whether a project_role or\n project_role_jump_account\n -r, --region TEXT aws region\n -p, --aws-profile TEXT aws profile\n -w, --aws-resources TEXT comma delimited list of aws resources the\n role will have access to. Includes: ec2,clou\n dformation,s3,ecs,support,events,kms,waf,sns\n ,states,iam,elasticloadbalancing,cloudwatch,\n cloudfront,elasticbeanstalk,ecr,autoscaling,\n dynamodb,sqs,acm,route53,codebuild,codepipel\n ine,ssm,batch,apigateway,logs,elasticmapredu\n ce\n -m, --template TEXT cloudformation template path/name\n --debug Turn on debugging\n --help Show this message and exit.\n\n\nBackground\n\n If you have multiple AWS accounts, such as one for Dev, one for , QA, and one for Prod. Then you usually have an AWS jump account where\n users can login, and then assume roles in to other AWS accounts - this is the purpose of the project_role_jump_account\n\n The project_role account is the role which projects will utilize in various AWS accounts, and the role only has permissions\n to AWS resources which begin with the project-name - which the exception of S3 buckets. Because S3 buckets are globally scoped, the\n S3 bucket should be named environment-abbreviation, dash, project-name.\n\n Permissions are created with both upper and lower case.\n\n Utilize the aws-resources parameter to pass-in which resources the project will need access to.\n\n\nRunning From Command-Line\n\n To create a project jump account role:\n\n```console\n role-creator upsert --project-name test --environment-abbreviation dv --aws-account-number 1234567890 --template-type project_role_jump_account --region us-east-1 --aws-profile will --bucket cf-templates-987654\n```\n\n To create a normal role for a project:\n\n```console\n role-creator upsert --project-name test --environment-abbreviation dv --aws-account-number 12345678 --template-type project_role --region us-east-1 --aws-profile will --aws-resources ec2,cloudformation,s3,ecs,support,events,kms,waf,sns,states,iam,elasticloadbalancing,cloudwatch,cloudfront,elasticbeanstalk,ecr,autoscaling,dynamodb,sqs,acm,route53,codebuild,codepipeline,ssm,batch,apigateway,logs,elasticmapreduce --bucket cf-templates-987654\n```\n NOTE: When you run from the command-line, and template.json file will automatically be created for future use\n NOTE: Project name and environment abbreviation are capitalized automatically for consistency\n\nRunning from and Ini File\n\nExample Ini file\n\n [environment]\n template=template.json\n bucket = cf-templates\n template_type = project_role\n region = us-east-1\n stack_name = iam-role\n profile = me\n\n [tags]\n DeployedBy = me\n\n [parameters]\n UppercaseAwsEnvironmentPrefix = UT\n LowercaseAwsEnvironmentPrefix = ut\n AccountNumber = 123456789\n UppercaseProjectName = my-role\n LowercaseProjectName = my-role\n Resources = ec2,cloudformation,s3,ecs,support,events,kms,waf,sns,states,iam,elasticloadbalancing,cloudwatch,cloudfront,elasticbeanstalk,ecr,autoscaling,dynamodb,sqs,acm,route53,codebuild,codepipeline,ssm,batch,apigateway,logs,elasticmapreduce\n\n [meta-parameters]\n RoleName = my-role\n\n\nDemonstration\n\n

\"AWS

\n\n\n\nExample of a Jump Account Role which allows the assumption of a role in another account\n\n\n```console\n\n{\n \"Parameters\": {\n \"AccountNumber\": {\n \"Description\": \"AWS Account Number\",\n \"Type\": \"String\"\n },\n \"IAMNamespace\": {\n \"Default\": \"/\",\n \"Description\": \"Namespace for IAM users, policies, etc.\",\n \"Type\": \"String\"\n },\n \"LowercaseAwsEnvironmentPrefix\": {\n \"Description\": \"Lowercase abbreviation for AWS account (i.e. dev,qa,prod)\",\n \"Type\": \"String\"\n },\n \"LowercaseProjectName\": {\n \"Description\": \"Lowercase Project Name\",\n \"Type\": \"String\"\n },\n \"UppercaseAwsEnvironmentPrefix\": {\n \"Description\": \"Uppercase abbreviation for AWS account (i.e. DEV,QA,PROD)\",\n \"Type\": \"String\"\n },\n \"UppercaseProjectName\": {\n \"Description\": \"Uppercase Project Name\",\n \"Type\": \"String\"\n }\n },\n \"Resources\": {\n \"Group\": {\n \"Properties\": {\n \"GroupName\": {\n \"Fn::Join\": [\n \"-\",\n [\n {\n \"Ref\": \"UppercaseAwsEnvironmentPrefix\"\n },\n {\n \"Ref\": \"UppercaseProjectName\"\n }\n ]\n ]\n }\n },\n \"Type\": \"AWS::IAM::Group\"\n },\n \"ManagedPolicy\": {\n \"Properties\": {\n \"Description\": {\n \"Fn::Join\": [\n \"-\",\n [\n {\n \"Ref\": \"UppercaseAwsEnvironmentPrefix\"\n },\n {\n \"Ref\": \"UppercaseProjectName\"\n },\n \"project\"\n ]\n ]\n },\n \"ManagedPolicyName\": {\n \"Fn::Join\": [\n \"-\",\n [\n {\n \"Ref\": \"UppercaseAwsEnvironmentPrefix\"\n },\n {\n \"Ref\": \"UppercaseProjectName\"\n }\n ]\n ]\n },\n \"Path\": {\n \"Ref\": \"IAMNamespace\"\n },\n \"PolicyDocument\": {\n \"Statement\": [\n {\n \"Action\": [\n \"sts:AssumeRole\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws:sts::1234567890:role/DV-TEST\"\n ],\n \"Sid\": \"StsAccess\"\n }\n ],\n \"Version\": \"2012-10-17\"\n }\n },\n \"Type\": \"AWS::IAM::ManagedPolicy\"\n }\n }\n}\n```\n\n\nExample of the Role Created\n\n```console\n{\n\t\"Parameters\": {\n\t\t\"AccountNumber\": {\n\t\t\t\"Description\": \"AWS Account Number\",\n\t\t\t\"Type\": \"String\"\n\t\t},\n\t\t\"IAMNamespace\": {\n\t\t\t\"Default\": \"/\",\n\t\t\t\"Description\": \"Namespace for IAM users, policies, etc.\",\n\t\t\t\"Type\": \"String\"\n\t\t},\n\t\t\"LowercaseAwsEnvironmentPrefix\": {\n\t\t\t\"Description\": \"Lowercase abbreviation for AWS account (i.e. dev,qa,prod)\",\n\t\t\t\"Type\": \"String\"\n\t\t},\n\t\t\"LowercaseProjectName\": {\n\t\t\t\"Description\": \"Lowercase Project Name\",\n\t\t\t\"Type\": \"String\"\n\t\t},\n\t\t\"UppercaseAwsEnvironmentPrefix\": {\n\t\t\t\"Description\": \"Uppercase abbreviation for AWS account (i.e. DEV,QA,PROD)\",\n\t\t\t\"Type\": \"String\"\n\t\t},\n\t\t\"UppercaseProjectName\": {\n\t\t\t\"Description\": \"Uppercase Project Name\",\n\t\t\t\"Type\": \"String\"\n\t\t}\n\t},\n\t\"Resources\": {\n\t\t\"IamGroup\": {\n\t\t\t\"Properties\": {\n\t\t\t\t\"GroupName\": {\n\t\t\t\t\t\"Fn::Join\": [\n\t\t\t\t\t\t\"-\", [{\n\t\t\t\t\t\t\t\t\"Ref\": \"UppercaseAwsEnvironmentPrefix\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Ref\": \"UppercaseProjectName\"\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t]\n\t\t\t\t\t]\n\t\t\t\t},\n\t\t\t\t\"Path\": {\n\t\t\t\t\t\"Ref\": \"IAMNamespace\"\n\t\t\t\t}\n\t\t\t},\n\t\t\t\"Type\": \"AWS::IAM::Group\"\n\t\t},\n\t\t\"ManagedPolicy\": {\n\t\t\t\"Properties\": {\n\t\t\t\t\"Description\": {\n\t\t\t\t\t\"Fn::Join\": [\n\t\t\t\t\t\t\"-\", [{\n\t\t\t\t\t\t\t\t\"Ref\": \"UppercaseAwsEnvironmentPrefix\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Ref\": \"UppercaseProjectName\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"project\"\n\t\t\t\t\t\t]\n\t\t\t\t\t]\n\t\t\t\t},\n\t\t\t\t\"Groups\": [{\n\t\t\t\t\t\"Fn::Join\": [\n\t\t\t\t\t\t\"-\", [{\n\t\t\t\t\t\t\t\t\"Ref\": \"UppercaseAwsEnvironmentPrefix\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Ref\": \"UppercaseProjectName\"\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t]\n\t\t\t\t\t]\n\t\t\t\t}],\n\t\t\t\t\"ManagedPolicyName\": {\n\t\t\t\t\t\"Fn::Join\": [\n\t\t\t\t\t\t\"-\", [{\n\t\t\t\t\t\t\t\t\"Ref\": \"UppercaseAwsEnvironmentPrefix\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Ref\": \"UppercaseProjectName\"\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t]\n\t\t\t\t\t]\n\t\t\t\t},\n\t\t\t\t\"Path\": {\n\t\t\t\t\t\"Ref\": \"IAMNamespace\"\n\t\t\t\t},\n\t\t\t\t\"PolicyDocument\": {\n\t\t\t\t\t\"Ref\": {\n\t\t\t\t\t\t\"Id\": \"Account-Permissions\",\n\t\t\t\t\t\t\"Statement\": [{\n\t\t\t\t\t\t\t\t\"Action\": [\n\t\t\t\t\t\t\t\t\t\"ec2:*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\t\t\t\t\"Resource\": [\n\t\t\t\t\t\t\t\t\t\"arn:aws:ec2:us-east-1:1234567890:TEST*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:ec2:us-east-1:1234567890:test*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Sid\": \"Ec2Access\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Action\": [\n\t\t\t\t\t\t\t\t\t\"cloudformation:*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\t\t\t\t\"Resource\": [\n\t\t\t\t\t\t\t\t\t\"arn:aws:cloudformation:us-east-1:1234567890:TEST*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:cloudformation:us-east-1:1234567890:test*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Sid\": \"CloudformationAccess\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Action\": [\n\t\t\t\t\t\t\t\t\t\"s3:*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\t\t\t\t\"Resource\": [\n\t\t\t\t\t\t\t\t\t\"arn:aws:s3:::DV-TEST/*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:s3:::DV-TEST*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:s3:::DV-test/*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:s3:::DV-test*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Sid\": \"S3Access\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Action\": [\n\t\t\t\t\t\t\t\t\t\"ecs:*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\t\t\t\t\"Resource\": [\n\t\t\t\t\t\t\t\t\t\"arn:aws:ecs:us-east-1:1234567890:TEST*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:ecs:us-east-1:1234567890:test*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Sid\": \"ECSAccess\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Action\": [\n\t\t\t\t\t\t\t\t\t\"support:*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\t\t\t\t\"Resource\": [\n\t\t\t\t\t\t\t\t\t\"arn:aws:support:us-east-1:1234567890:TEST*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:support:us-east-1:1234567890:test*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Sid\": \"SupportAccess\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Action\": [\n\t\t\t\t\t\t\t\t\t\"events:*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\t\t\t\t\"Resource\": [\n\t\t\t\t\t\t\t\t\t\"arn:aws:events:us-east-1:1234567890:TEST*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:events:us-east-1:1234567890:test*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Sid\": \"EventsAccess\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Action\": [\n\t\t\t\t\t\t\t\t\t\"kms:*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\t\t\t\t\"Resource\": [\n\t\t\t\t\t\t\t\t\t\"arn:aws:kms:us-east-1:1234567890:TEST*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:kms:us-east-1:1234567890:test*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Sid\": \"KmsAccess\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Action\": [\n\t\t\t\t\t\t\t\t\t\"waf:*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\t\t\t\t\"Resource\": [\n\t\t\t\t\t\t\t\t\t\"arn:aws:waf:us-east-1:1234567890:TEST*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:waf:us-east-1:1234567890:test*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Sid\": \"WafAccess\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Action\": [\n\t\t\t\t\t\t\t\t\t\"sns:*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\t\t\t\t\"Resource\": [\n\t\t\t\t\t\t\t\t\t\"arn:aws:sns:us-east-1:1234567890:TEST*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:sns:us-east-1:1234567890:test*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Sid\": \"SnsAccess\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Action\": [\n\t\t\t\t\t\t\t\t\t\"states:*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\t\t\t\t\"Resource\": [\n\t\t\t\t\t\t\t\t\t\"arn:aws:states:us-east-1:1234567890:TEST*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:states:us-east-1:1234567890:test*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Sid\": \"StatesAccess\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Action\": [\n\t\t\t\t\t\t\t\t\t\"iam:Get*\",\n\t\t\t\t\t\t\t\t\t\"iam:List*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\t\t\t\t\"Resource\": [\n\t\t\t\t\t\t\t\t\t\"arn:aws:iam::1234567890:TEST*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:iam::1234567890:test*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Sid\": \"IamAccess\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Action\": [\n\t\t\t\t\t\t\t\t\t\"elasticloadbalancing:*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\t\t\t\t\"Resource\": [\n\t\t\t\t\t\t\t\t\t\"arn:aws:elasticloadbalancing:us-east-1:1234567890:TEST*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:elasticloadbalancing:us-east-1:1234567890:test*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Sid\": \"ElasticloadbalancingAccess\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Action\": [\n\t\t\t\t\t\t\t\t\t\"cloudwatch:*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\t\t\t\t\"Resource\": [\n\t\t\t\t\t\t\t\t\t\"arn:aws:cloudwatch:us-east-1:1234567890:TEST*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:cloudwatch:us-east-1:1234567890:test*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Sid\": \"CloudwatchAccess\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Action\": [\n\t\t\t\t\t\t\t\t\t\"cloudfront:*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\t\t\t\t\"Resource\": [\n\t\t\t\t\t\t\t\t\t\"arn:aws:cloudfront:us-east-1:1234567890:TEST*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:cloudfront:us-east-1:1234567890:test*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Sid\": \"CloudfrontAccess\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Action\": [\n\t\t\t\t\t\t\t\t\t\"elasticbeanstalk:*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\t\t\t\t\"Resource\": [\n\t\t\t\t\t\t\t\t\t\"arn:aws:elasticbeanstalk:us-east-1:1234567890:TEST*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:elasticbeanstalk:us-east-1:1234567890:test*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Sid\": \"ElasticbeanstalkAccess\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Action\": [\n\t\t\t\t\t\t\t\t\t\"ecr:*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\t\t\t\t\"Resource\": [\n\t\t\t\t\t\t\t\t\t\"arn:aws:ecr:us-east-1:1234567890:TEST*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:ecr:us-east-1:1234567890:test*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Sid\": \"EcrAccess\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Action\": [\n\t\t\t\t\t\t\t\t\t\"autoscaling:*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\t\t\t\t\"Resource\": [\n\t\t\t\t\t\t\t\t\t\"arn:aws:autoscaling:us-east-1:1234567890:TEST*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:autoscaling:us-east-1:1234567890:test*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Sid\": \"AutoscalingAccess\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Action\": [\n\t\t\t\t\t\t\t\t\t\"autoscaling:*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\t\t\t\t\"Resource\": [\n\t\t\t\t\t\t\t\t\t\"arn:aws:dynamodb:us-east-1:1234567890:TEST*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:dynamodb:us-east-1:1234567890:test*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Sid\": \"DynamodbAccess\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Action\": [\n\t\t\t\t\t\t\t\t\t\"sqs:*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\t\t\t\t\"Resource\": [\n\t\t\t\t\t\t\t\t\t\"arn:aws:sqs:us-east-1:1234567890:TEST*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:sqs:us-east-1:1234567890:test*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Sid\": \"SqsAccess\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Action\": [\n\t\t\t\t\t\t\t\t\t\"acm:*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\t\t\t\t\"Resource\": [\n\t\t\t\t\t\t\t\t\t\"arn:aws:acm:us-east-1:1234567890:TEST*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:acm:us-east-1:1234567890:test*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Sid\": \"AcmAccess\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Action\": [\n\t\t\t\t\t\t\t\t\t\"route53:*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\t\t\t\t\"Resource\": [\n\t\t\t\t\t\t\t\t\t\"arn:aws:route53:us-east-1:1234567890:TEST*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:route53:us-east-1:1234567890:test*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Sid\": \"Route53Access\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Action\": [\n\t\t\t\t\t\t\t\t\t\"codebuild:*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\t\t\t\t\"Resource\": [\n\t\t\t\t\t\t\t\t\t\"arn:aws:codebuild:us-east-1:1234567890:TEST*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:codebuild:us-east-1:1234567890:test*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Sid\": \"CodebuildAccess\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Action\": [\n\t\t\t\t\t\t\t\t\t\"codepipeline:*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\t\t\t\t\"Resource\": [\n\t\t\t\t\t\t\t\t\t\"arn:aws:codepipeline:us-east-1:1234567890:TEST*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:codepipeline:us-east-1:1234567890:test*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Sid\": \"CodepipelineAccess\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Action\": [\n\t\t\t\t\t\t\t\t\t\"ssm:*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\t\t\t\t\"Resource\": [\n\t\t\t\t\t\t\t\t\t\"arn:aws:ssm:us-east-1:1234567890:TEST*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:ssm:us-east-1:1234567890:test*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Sid\": \"SsmAccess\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Action\": [\n\t\t\t\t\t\t\t\t\t\"batch:*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\t\t\t\t\"Resource\": [\n\t\t\t\t\t\t\t\t\t\"arn:aws:batch:us-east-1:1234567890:TEST*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:batch:us-east-1:1234567890:test*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Sid\": \"BatchAccess\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Action\": [\n\t\t\t\t\t\t\t\t\t\"apigateway:*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\t\t\t\t\"Resource\": [\n\t\t\t\t\t\t\t\t\t\"arn:aws:apigateway:us-east-1:1234567890:TEST*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:apigateway:us-east-1:1234567890:test*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Sid\": \"ApigatewayAccess\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Action\": [\n\t\t\t\t\t\t\t\t\t\"logs:*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\t\t\t\t\"Resource\": [\n\t\t\t\t\t\t\t\t\t\"arn:aws:logs:us-east-1:1234567890:TEST*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:logs:us-east-1:1234567890:test*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Sid\": \"LogsAccess\"\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\"Action\": [\n\t\t\t\t\t\t\t\t\t\"elasticmapreduce:*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Effect\": \"Allow\",\n\t\t\t\t\t\t\t\t\"Resource\": [\n\t\t\t\t\t\t\t\t\t\"arn:aws:elasticmapreduce:us-east-1:1234567890:TEST*\",\n\t\t\t\t\t\t\t\t\t\"arn:aws:elasticmapreduce:us-east-1:1234567890:test*\"\n\t\t\t\t\t\t\t\t],\n\t\t\t\t\t\t\t\t\"Sid\": \"ElasticmapreduceAccess\"\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t],\n\t\t\t\t\t\t\"Version\": \"2012-10-17\"\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t},\n\t\t\t\"Type\": \"AWS::IAM::ManagedPolicy\"\n\t\t}\n\t}\n}\n```\n\n\n", "description_content_type": "text/markdown", "docs_url": null, "download_url": "", "downloads": { "last_day": -1, "last_month": -1, "last_week": -1 }, "home_page": "https://github.com/rubelw/aws_role_creator", "keywords": "aws,codebuild,pipeline,creator", "license": "", "maintainer": "", "maintainer_email": "", "name": "aws-role-creator", "package_url": "https://pypi.org/project/aws-role-creator/", "platform": "any", "project_url": "https://pypi.org/project/aws-role-creator/", "project_urls": { "Homepage": "https://github.com/rubelw/aws_role_creator" }, "release_url": "https://pypi.org/project/aws-role-creator/0.0.10/", "requires_dist": [ "boto3 (>=1.4.3)", "requests (>=2.18)", "Click (>=6.7)", "configparser (>=3.5.0)", "future (>=0.16.0)", "six (>=1.11.0)", "pip" ], "requires_python": "", "summary": "Creates AWS Rolee.", "version": "0.0.10" }, "last_serial": 4246981, "releases": { "0.0.10": [ { "comment_text": "", "digests": { "md5": "d7909d30c0bacffe8dc69884d2d0ba50", "sha256": "0975ce933d302b6cf610e6647ba2cefe5a277e1ef7a5feb98e2e7d91a6694d12" }, "downloads": -1, "filename": "aws_role_creator-0.0.10-py2-none-any.whl", "has_sig": false, "md5_digest": "d7909d30c0bacffe8dc69884d2d0ba50", "packagetype": "bdist_wheel", "python_version": "py2", "requires_python": null, "size": 13353, "upload_time": "2018-09-07T03:30:21", "url": "https://files.pythonhosted.org/packages/7b/81/b9b135e46db297057bf160ce145325a474229bc7126fd64cfda37103f94f/aws_role_creator-0.0.10-py2-none-any.whl" }, { "comment_text": "", "digests": { "md5": "ff27986228ef06cfdaa3e0c5d78453e6", "sha256": "133f70309ee6fa291ab29a39757bb21e7610bf51faa0688320cccdf7a5d91396" }, "downloads": -1, "filename": "aws_role_creator-0.0.10.tar.gz", "has_sig": false, "md5_digest": "ff27986228ef06cfdaa3e0c5d78453e6", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 16093, "upload_time": "2018-09-07T03:30:22", "url": "https://files.pythonhosted.org/packages/6b/f7/061ad76e7d0ed9de6900345668c532d0dfb02081a08f33eb4e50b0990a08/aws_role_creator-0.0.10.tar.gz" } ] }, "urls": [ { "comment_text": "", "digests": { "md5": "d7909d30c0bacffe8dc69884d2d0ba50", "sha256": "0975ce933d302b6cf610e6647ba2cefe5a277e1ef7a5feb98e2e7d91a6694d12" }, "downloads": -1, "filename": "aws_role_creator-0.0.10-py2-none-any.whl", "has_sig": false, "md5_digest": "d7909d30c0bacffe8dc69884d2d0ba50", "packagetype": "bdist_wheel", "python_version": "py2", "requires_python": null, "size": 13353, "upload_time": "2018-09-07T03:30:21", "url": "https://files.pythonhosted.org/packages/7b/81/b9b135e46db297057bf160ce145325a474229bc7126fd64cfda37103f94f/aws_role_creator-0.0.10-py2-none-any.whl" }, { "comment_text": "", "digests": { "md5": "ff27986228ef06cfdaa3e0c5d78453e6", "sha256": "133f70309ee6fa291ab29a39757bb21e7610bf51faa0688320cccdf7a5d91396" }, "downloads": -1, "filename": "aws_role_creator-0.0.10.tar.gz", "has_sig": false, "md5_digest": "ff27986228ef06cfdaa3e0c5d78453e6", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 16093, "upload_time": "2018-09-07T03:30:22", "url": "https://files.pythonhosted.org/packages/6b/f7/061ad76e7d0ed9de6900345668c532d0dfb02081a08f33eb4e50b0990a08/aws_role_creator-0.0.10.tar.gz" } ] }