@@ -131,6 +131,7 @@ The account number present in the `sts_installer_trust_policy.json` and `sts_sup
131
131
"ec2:DescribeInstanceCreditSpecifications",
132
132
"ec2:DescribeInstances",
133
133
"ec2:DescribeInstanceStatus",
134
+ "ec2:DescribeInstanceTypeOfferings",
134
135
"ec2:DescribeInstanceTypes",
135
136
"ec2:DescribeInternetGateways",
136
137
"ec2:DescribeKeyPairs",
@@ -142,6 +143,7 @@ The account number present in the `sts_installer_trust_policy.json` and `sts_sup
142
143
"ec2:DescribeReservedInstancesOfferings",
143
144
"ec2:DescribeRouteTables",
144
145
"ec2:DescribeSecurityGroups",
146
+ "ec2:DescribeSecurityGroupRules",
145
147
"ec2:DescribeSubnets",
146
148
"ec2:DescribeTags",
147
149
"ec2:DescribeVolumes",
@@ -178,6 +180,7 @@ The account number present in the `sts_installer_trust_policy.json` and `sts_sup
178
180
"elasticloadbalancing:DeleteTargetGroup",
179
181
"elasticloadbalancing:DeregisterInstancesFromLoadBalancer",
180
182
"elasticloadbalancing:DeregisterTargets",
183
+ "elasticloadbalancing:DescribeAccountLimits",
181
184
"elasticloadbalancing:DescribeInstanceHealth",
182
185
"elasticloadbalancing:DescribeListeners",
183
186
"elasticloadbalancing:DescribeLoadBalancerAttributes",
@@ -196,6 +199,7 @@ The account number present in the `sts_installer_trust_policy.json` and `sts_sup
196
199
"iam:CreateInstanceProfile",
197
200
"iam:DeleteInstanceProfile",
198
201
"iam:GetInstanceProfile",
202
+ "iam:TagInstanceProfile",
199
203
"iam:GetRole",
200
204
"iam:GetRolePolicy",
201
205
"iam:GetUser",
@@ -215,6 +219,7 @@ The account number present in the `sts_installer_trust_policy.json` and `sts_sup
215
219
"route53:ChangeTagsForResource",
216
220
"route53:CreateHostedZone",
217
221
"route53:DeleteHostedZone",
222
+ "route53:GetAccountLimit",
218
223
"route53:GetChange",
219
224
"route53:GetHostedZone",
220
225
"route53:ListHostedZones",
@@ -225,12 +230,14 @@ The account number present in the `sts_installer_trust_policy.json` and `sts_sup
225
230
"s3:CreateBucket",
226
231
"s3:DeleteBucket",
227
232
"s3:DeleteObject",
233
+ "s3:DeleteObjectVersion",
228
234
"s3:GetAccelerateConfiguration",
229
235
"s3:GetBucketAcl",
230
236
"s3:GetBucketCORS",
231
237
"s3:GetBucketLocation",
232
238
"s3:GetBucketLogging",
233
239
"s3:GetBucketObjectLockConfiguration",
240
+ "s3:GetBucketPolicy",
234
241
"s3:GetBucketReplication",
235
242
"s3:GetBucketRequestPayment",
236
243
"s3:GetBucketTagging",
@@ -247,6 +254,7 @@ The account number present in the `sts_installer_trust_policy.json` and `sts_sup
247
254
"s3:ListBucketVersions",
248
255
"s3:PutBucketAcl",
249
256
"s3:PutBucketTagging",
257
+ "s3:PutBucketVersioning",
250
258
"s3:PutEncryptionConfiguration",
251
259
"s3:PutObject",
252
260
"s3:PutObjectAcl",
@@ -263,11 +271,23 @@ The account number present in the `sts_installer_trust_policy.json` and `sts_sup
263
271
"ec2:DescribeVpcEndpointServiceConfigurations",
264
272
"ec2:DescribeVpcEndpointServicePermissions",
265
273
"ec2:DescribeVpcEndpointServices",
266
- "ec2:ModifyVpcEndpointServicePermissions"
274
+ "ec2:ModifyVpcEndpointServicePermissions",
267
275
"kms:DescribeKey",
268
276
"cloudwatch:GetMetricData"
269
277
],
270
278
"Resource": "*"
279
+ },
280
+ {
281
+ "Effect": "Allow",
282
+ "Action": [
283
+ "secretsmanager:GetSecretValue"
284
+ ],
285
+ "Resource": "*",
286
+ "Condition": {
287
+ "StringEquals": {
288
+ "aws:ResourceTag/red-hat-managed": "true"
289
+ }
290
+ }
271
291
}
272
292
]
273
293
}
0 commit comments