Skip to content

Commit 5e197d3

Browse files
committed
updating iam role for CloudFormation for more IAM permissions. Adding placehoders for mini demos for deployment (option 3) and IAM role example
1 parent f8e434a commit 5e197d3

File tree

3 files changed

+43
-16
lines changed

3 files changed

+43
-16
lines changed

docs/deployment.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -104,6 +104,9 @@ idp-cli deploy \
104104

105105
## Option 3: Build Deployment Assets from Source Code
106106

107+
Demo Video (5 minutes)
108+
109+
107110
### Dependencies
108111

109112
You need to have the following packages installed on your computer:

iam-roles/cloudformation-management/IDP-Cloudformation-Service-Role.yaml

Lines changed: 38 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,21 @@
1+
Slack: #aws-gitlab-users | Docs: Gitlab Documentation | Instance owned by ProServe Products and Solutions
2+
genaiic-assets
3+
engagement-artifacts
4+
genaiic-idp-accelerator
5+
Repository
6+
You pushed to
7+
fix/cf-iam-role-update
8+
9 minutes ago
9+
genaiic-idp-accelerator
10+
iam-roles
11+
cloudformation-management
12+
IDP-Cloudformation-Service-Role.yaml
13+
Joe King's avatar
14+
updating cloudformation iam role policy. Adding placeholder for 'snack size'...
15+
Joe King authored 1 hour ago
16+
379b5af3
17+
IDP-Cloudformation-Service-Role.yaml
18+
7.26 KiB
119
AWSTemplateFormatVersion: '2010-09-09'
220
Description: >
321
This template creates a CloudFormation Service Role for the IDP Accelerator solution.
@@ -8,7 +26,6 @@ Description: >
826
service role to CloudFormation. The iam:PassRole policy must be attached to
927
the user or role that will be using the CloudFormation Service Role in order
1028
to successfully pass the role.
11-
1229
Resources:
1330
CloudFormationServiceRole:
1431
Type: AWS::IAM::Role
@@ -55,28 +72,34 @@ Resources:
5572
- iam:DeleteRole
5673
- iam:UpdateRole
5774
- iam:GetRole
75+
- iam:GetRolePolicy
5876
- iam:ListRoles
77+
- iam:ListRolePolicies
78+
- iam:ListAttachedRolePolicies
79+
- iam:ListRoleTags
80+
- iam:PutRolePolicy
81+
- iam:DeleteRolePolicy
82+
- iam:AttachRolePolicy
83+
- iam:DetachRolePolicy
84+
- iam:TagRole
85+
- iam:UntagRole
86+
- iam:PassRole
87+
- iam:CreateServiceLinkedRole
88+
- iam:DeleteServiceLinkedRole
89+
Resource: '*'
90+
- Effect: Allow
91+
Action:
5992
- iam:CreatePolicy
6093
- iam:DeletePolicy
6194
- iam:GetPolicy
95+
- iam:GetPolicyVersion
6296
- iam:ListPolicies
6397
- iam:ListPolicyVersions
6498
- iam:CreatePolicyVersion
6599
- iam:DeletePolicyVersion
66100
- iam:SetDefaultPolicyVersion
67-
- iam:AttachRolePolicy
68-
- iam:DetachRolePolicy
69-
- iam:PutRolePolicy
70-
- iam:DeleteRolePolicy
71-
- iam:GetRolePolicy
72-
- iam:ListRolePolicies
73-
- iam:ListAttachedRolePolicies
74-
- iam:CreateServiceLinkedRole
75-
- iam:DeleteServiceLinkedRole
76-
- iam:TagRole
77-
- iam:UntagRole
78-
- iam:ListRoleTags
79-
- iam:PassRole
101+
- iam:TagPolicy
102+
- iam:UntagPolicy
80103
Resource: '*'
81104
- PolicyName: IDPAcceleratorPermissions
82105
PolicyDocument:
@@ -129,7 +152,6 @@ Resources:
129152
- ec2:DescribeAvailabilityZones
130153
- ecr:*
131154
Resource: '*'
132-
133155
PassRolePolicy:
134156
Type: AWS::IAM::ManagedPolicy
135157
Metadata:
@@ -158,4 +180,4 @@ Outputs:
158180
Description: ARN of the PassRole policy for admins to assign to users
159181
Value: !Ref PassRolePolicy
160182
Export:
161-
Name: !Sub '${AWS::StackName}-PassRolePolicyArn'
183+
Name: !Sub '${AWS::StackName}-PassRolePolicyArn'

iam-roles/cloudformation-management/README.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@ This approach enables a security model where:
1515

1616
The **IDPAcceleratorCloudFormationServiceRole** is a CloudFormation service role that provides the necessary permissions for AWS CloudFormation to deploy, update, and manage GenAI IDP Accelerator stacks across all patterns (Pattern 1: BDA, Pattern 2: Textract+Bedrock, Pattern 3: Textract+UDOP+Bedrock). This role can only be assumed by the CloudFormation service, not by users directly.
1717

18+
Demo (5 minutes)
19+
1820
### Key Capabilities
1921
- **Full CloudFormation Management**: Create, update, delete IDP stacks - This IAM service role (which CloudFormation assumes) gives necessary privileges to create/update/delete the stack which is helpful in development and sandbox environments. In production environments, admins can further limit these permissions to their discretion (e.g. disabling stack deletion).
2022

0 commit comments

Comments
 (0)