本文為英文版的機器翻譯版本,如內容有任何歧義或不一致之處,概以英文版為準。
APIGatewayServiceRolePolicy
描述:允許 API Gateway 代表客戶管理相關聯的 AWS 資源。
APIGatewayServiceRolePolicy
是AWS 受管理的策略。
使用此政策
此原則附加至服務連結角色,可讓服務代表您執行動作。您無法將此政策連接至使用者、群組或角色。
政策詳情
-
類型:服務連結角色原則
-
創建時間:2017 年 10 月 20 日, 世界標準時間 17:23
-
編輯時間:2021 年 7 月 12 日, 世界標準時間 22:24
-
ARN:
arn:aws:iam::aws:policy/aws-service-role/APIGatewayServiceRolePolicy
政策版本
策略版本:v9(預設值)
原則的預設版本是定義原則權限的版本。當具有策略的使用者或角色發出要求以存取 AWS 資源時,請 AWS 檢查原則的預設版本,以決定是否允許該要求。
政策文件
{
"Version" : "2012-10-17",
"Statement" : [
{
"Effect" : "Allow",
"Action" : [
"elasticloadbalancing:AddListenerCertificates",
"elasticloadbalancing:RemoveListenerCertificates",
"elasticloadbalancing:ModifyListener",
"elasticloadbalancing:DescribeListeners",
"elasticloadbalancing:DescribeLoadBalancers",
"xray:PutTraceSegments",
"xray:PutTelemetryRecords",
"xray:GetSamplingTargets",
"xray:GetSamplingRules",
"logs:CreateLogDelivery",
"logs:GetLogDelivery",
"logs:UpdateLogDelivery",
"logs:DeleteLogDelivery",
"logs:ListLogDeliveries",
"servicediscovery:DiscoverInstances"
],
"Resource" : [
"*"
]
},
{
"Effect" : "Allow",
"Action" : [
"firehose:DescribeDeliveryStream",
"firehose:PutRecord",
"firehose:PutRecordBatch"
],
"Resource" : "arn:aws:firehose:*:*:deliverystream/amazon-apigateway-*"
},
{
"Effect" : "Allow",
"Action" : [
"acm:DescribeCertificate",
"acm:GetCertificate"
],
"Resource" : "arn:aws:acm:*:*:certificate/*"
},
{
"Effect" : "Allow",
"Action" : "ec2:CreateNetworkInterfacePermission",
"Resource" : "arn:aws:ec2:*:*:network-interface/*"
},
{
"Effect" : "Allow",
"Action" : "ec2:CreateTags",
"Resource" : "arn:aws:ec2:*:*:network-interface/*",
"Condition" : {
"ForAllValues:StringEquals" : {
"aws:TagKeys" : [
"Owner",
"VpcLinkId"
]
}
}
},
{
"Effect" : "Allow",
"Action" : [
"ec2:ModifyNetworkInterfaceAttribute",
"ec2:DeleteNetworkInterface",
"ec2:AssignPrivateIpAddresses",
"ec2:CreateNetworkInterface",
"ec2:DeleteNetworkInterfacePermission",
"ec2:DescribeNetworkInterfaces",
"ec2:DescribeAvailabilityZones",
"ec2:DescribeNetworkInterfaceAttribute",
"ec2:DescribeVpcs",
"ec2:DescribeNetworkInterfacePermissions",
"ec2:UnassignPrivateIpAddresses",
"ec2:DescribeSubnets",
"ec2:DescribeRouteTables",
"ec2:DescribeSecurityGroups"
],
"Resource" : "*"
},
{
"Effect" : "Allow",
"Action" : "servicediscovery:GetNamespace",
"Resource" : "arn:aws:servicediscovery:*:*:namespace/*"
},
{
"Effect" : "Allow",
"Action" : "servicediscovery:GetService",
"Resource" : "arn:aws:servicediscovery:*:*:service/*"
}
]
}