This is an automated email from the ASF dual-hosted git repository.

olehmykolaishyn pushed a commit to branch security_debt/datalab-2986-tcpc
in repository https://gitbox.apache.org/repos/asf/incubator-datalab.git


The following commit(s) were added to 
refs/heads/security_debt/datalab-2986-tcpc by this push:
     new a12eb4136 updated ssn policy
a12eb4136 is described below

commit a12eb41369e6e4ec5bc99399c9f86220558e0580
Author: owlleg6 <[email protected]>
AuthorDate: Tue May 3 11:14:03 2022 +0300

    updated ssn policy
---
 .../src/general/files/aws/ssn_policy.json          | 161 +++++++++++----------
 1 file changed, 82 insertions(+), 79 deletions(-)

diff --git a/infrastructure-provisioning/src/general/files/aws/ssn_policy.json 
b/infrastructure-provisioning/src/general/files/aws/ssn_policy.json
index 89f28c50c..4348e4c2a 100644
--- a/infrastructure-provisioning/src/general/files/aws/ssn_policy.json
+++ b/infrastructure-provisioning/src/general/files/aws/ssn_policy.json
@@ -2,121 +2,124 @@
     "Version": "2012-10-17",
     "Statement": [
         {
-            "Action": [
-                "iam:CreateRole",
-                "iam:CreateInstanceProfile",
-                "iam:CreatePolicy",
-                "iam:AttachRolePolicy",
-                "iam:AddRoleToInstanceProfile",
-                "iam:DetachRolePolicy",
-                "iam:DeleteInstanceProfile",
-                "iam:DeletePolicy",
-                "iam:DeleteRolePolicy",
-                "iam:DeleteRole",
-                "iam:RemoveRoleFromInstanceProfile",
-                "iam:GetRole",
-                "iam:GetRolePolicy",
-                "iam:GetInstanceProfile",
-                "iam:GetPolicy",
-                "iam:GetUser",
-                "iam:ListUsers",
-                "iam:ListAccessKeys",
-                "iam:PassRole",
-                "iam:ListUserPolicies",
-                "iam:PutRolePolicy",
-                "iam:ListInstanceProfiles",
-                "iam:ListAttachedRolePolicies",
-                "iam:ListInstanceProfilesForRole",
-                "iam:ListRoles",
-                "iam:ListPolicies",
-                "iam:ListRolePolicies",
-                "iam:TagRole"
-            ],
             "Effect": "Allow",
-            "Resource": "*"
-        },
-        {
             "Action": [
-                "ec2:CreateVpcEndpoint",
-                "ec2:CreateSubnet",
-                "ec2:CreateTags",
+                "ec2:AuthorizeSecurityGroupIngress",
+                "ec2:DeleteSubnet",
+                "ec2:DescribeInstances",
                 "ec2:CreateImage",
+                "ec2:DeleteRouteTable",
+                "ec2:AssociateRouteTable",
+                "ec2:StartInstances",
                 "ec2:CreateRoute",
+                "ec2:RevokeSecurityGroupEgress",
+                "ec2:DescribeRouteTables",
+                "ec2:CreateTags",
+                "ec2:CreateRouteTable",
+                "ec2:RunInstances",
                 "ec2:DeregisterImage",
-                "ec2:DescribeImages",
+                "ec2:DeleteSnapshot",
                 "ec2:DescribeAddresses",
+                "ec2:CreateVpcEndpoint",
+                "ec2:DescribeVpcs",
+                "ec2:DeleteSecurityGroup",
+                "ec2:AllocateAddress",
+                "ec2:DescribeSecurityGroups",
+                "ec2:DescribeImages",
+                "ec2:AuthorizeSecurityGroupEgress",
+                "ec2:TerminateInstances",
+                "ec2:StopInstances",
+                "ec2:RevokeSecurityGroupIngress",
+                "ec2:CreateSubnet",
                 "ec2:AssociateAddress",
+                "ec2:DescribeSubnets",
+                "ec2:ModifyVpcEndpoint",
                 "ec2:DisassociateAddress",
-                "ec2:AllocateAddress",
                 "ec2:ReleaseAddress",
-                "ec2:CreateRouteTable",
-                "ec2:CreateSecurityGroup",
-                "ec2:AuthorizeSecurityGroupEgress",
-                "ec2:AuthorizeSecurityGroupIngress",
-                "ec2:AssociateRouteTable",
-                "ec2:DeleteRouteTable",
-                "ec2:DeleteSubnet",
                 "ec2:DeleteTags",
-                "ec2:DeleteSecurityGroup",
-                "ec2:DeleteSnapshot",
-                "ec2:DescribeRouteTables",
                 "ec2:DescribeSpotInstanceRequests",
-                "ec2:ModifyVpcEndpoint",
-                "ec2:RunInstances",
-                "ec2:StartInstances",
-                "ec2:StopInstances",
-                "ec2:TerminateInstances",
-                "ec2:DescribeSubnets",
-                "ec2:DescribeVpcs",
-                "ec2:DescribeSecurityGroups",
-                "ec2:DescribeInstances",
-                "ec2:DescribeInstanceStatus",
+                "ec2:CreateSecurityGroup",
                 "ec2:ModifyInstanceAttribute",
-                "ec2:RevokeSecurityGroupEgress",
-                "ec2:RevokeSecurityGroupIngress",
-                "ec2:AuthorizeSecurityGroupEgress",
-                "ec2:AuthorizeSecurityGroupIngress"
+                "ec2:DescribeInstanceStatus"
             ],
+            "Resource": "*"
+        },
+        {
             "Effect": "Allow",
+            "Action": [
+                "iam:RemoveRoleFromInstanceProfile",
+                "iam:CreateRole",
+                "iam:AttachRolePolicy",
+                "iam:PutRolePolicy",
+                "iam:AddRoleToInstanceProfile",
+                "iam:DetachRolePolicy",
+                "iam:ListAttachedRolePolicies",
+                "iam:ListRolePolicies",
+                "iam:ListPolicies",
+                "iam:GetRole",
+                "iam:GetPolicy",
+                "iam:DeleteRole",
+                "iam:GetRolePolicy",
+                "iam:CreateInstanceProfile",
+                "iam:TagRole",
+                "iam:DeletePolicy",
+                "iam:ListInstanceProfilesForRole",
+                "iam:PassRole",
+                "iam:DeleteRolePolicy",
+                "iam:ListAccessKeys",
+                "iam:DeleteInstanceProfile",
+                "iam:GetInstanceProfile",
+                "iam:ListRoles",
+                "iam:ListUserPolicies",
+                "iam:ListInstanceProfiles",
+                "iam:CreatePolicy",
+                "iam:ListUsers",
+                "iam:GetUser"
+            ],
             "Resource": "*"
         },
         {
+            "Effect": "Allow",
             "Action": [
                 "s3:CreateBucket",
-                "s3:ListAllMyBuckets",
-                "s3:GetBucketLocation",
-                "s3:GetBucketTagging",
-                "s3:PutBucketTagging",
-                "s3:PutBucketPolicy",
-                "s3:GetBucketPolicy",
-                "s3:DeleteBucket",
                 "s3:DeleteObject",
+                "s3:PutObject",
                 "s3:GetObject",
+                "s3:GetBucketTagging",
                 "s3:ListBucket",
-                "s3:PutObject",
-                "s3:PutEncryptionConfiguration"
+                "s3:GetBucketPolicy",
+                "s3:PutEncryptionConfiguration",
+                "s3:PutBucketTagging",
+                "s3:DeleteBucket",
+                "s3:ListAllMyBuckets",
+                "s3:PutBucketPolicy",
+                "s3:GetBucketLocation",
+                "s3:PutBucketPublicAccessBlock",
+                "s3:PutBucketVersioning",
+                "s3:ListBucketVersions",
+                "s3:DeleteObjectVersion",
+                "s3:DeleteObjectVersionTagging"
             ],
-            "Effect": "Allow",
             "Resource": "*"
         },
         {
+            "Effect": "Allow",
             "Action": [
-                "elasticmapreduce:AddTags",
-                "elasticmapreduce:RemoveTags",
+                "elasticmapreduce:ListInstances",
                 "elasticmapreduce:DescribeCluster",
                 "elasticmapreduce:ListClusters",
-                "elasticmapreduce:RunJobFlow",
-                "elasticmapreduce:ListInstances",
-                "elasticmapreduce:TerminateJobFlows"
+                "elasticmapreduce:TerminateJobFlows",
+                "elasticmapreduce:RemoveTags",
+                "elasticmapreduce:AddTags",
+                "elasticmapreduce:RunJobFlow"
             ],
-            "Effect": "Allow",
             "Resource": "*"
         },
         {
+            "Effect": "Allow",
             "Action": [
                 "pricing:GetProducts"
             ],
-            "Effect": "Allow",
             "Resource": "*"
         }
     ]


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to