Skip to content

Commit f6bcb61

Browse files
committed
Merge branch 'fix/cf-iam-updates' into 'develop'
Update IAM role along with short demo placeholders See merge request genaiic-reusable-assets/engagement-artifacts/genaiic-idp-accelerator!451
2 parents cf88934 + 2dcbe41 commit f6bcb61

File tree

3 files changed

+25
-16
lines changed

3 files changed

+25
-16
lines changed

docs/deployment.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -104,6 +104,9 @@ idp-cli deploy \
104104

105105
## Option 3: Build Deployment Assets from Source Code
106106

107+
Demo Video (5 minutes)
108+
109+
107110
### Dependencies
108111

109112
You need to have the following packages installed on your computer:

iam-roles/cloudformation-management/IDP-Cloudformation-Service-Role.yaml

Lines changed: 20 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,6 @@ Description: >
88
service role to CloudFormation. The iam:PassRole policy must be attached to
99
the user or role that will be using the CloudFormation Service Role in order
1010
to successfully pass the role.
11-
1211
Resources:
1312
CloudFormationServiceRole:
1413
Type: AWS::IAM::Role
@@ -55,28 +54,34 @@ Resources:
5554
- iam:DeleteRole
5655
- iam:UpdateRole
5756
- iam:GetRole
57+
- iam:GetRolePolicy
5858
- iam:ListRoles
59+
- iam:ListRolePolicies
60+
- iam:ListAttachedRolePolicies
61+
- iam:ListRoleTags
62+
- iam:PutRolePolicy
63+
- iam:DeleteRolePolicy
64+
- iam:AttachRolePolicy
65+
- iam:DetachRolePolicy
66+
- iam:TagRole
67+
- iam:UntagRole
68+
- iam:PassRole
69+
- iam:CreateServiceLinkedRole
70+
- iam:DeleteServiceLinkedRole
71+
Resource: '*'
72+
- Effect: Allow
73+
Action:
5974
- iam:CreatePolicy
6075
- iam:DeletePolicy
6176
- iam:GetPolicy
77+
- iam:GetPolicyVersion
6278
- iam:ListPolicies
6379
- iam:ListPolicyVersions
6480
- iam:CreatePolicyVersion
6581
- iam:DeletePolicyVersion
6682
- iam:SetDefaultPolicyVersion
67-
- iam:AttachRolePolicy
68-
- iam:DetachRolePolicy
69-
- iam:PutRolePolicy
70-
- iam:DeleteRolePolicy
71-
- iam:GetRolePolicy
72-
- iam:ListRolePolicies
73-
- iam:ListAttachedRolePolicies
74-
- iam:CreateServiceLinkedRole
75-
- iam:DeleteServiceLinkedRole
76-
- iam:TagRole
77-
- iam:UntagRole
78-
- iam:ListRoleTags
79-
- iam:PassRole
83+
- iam:TagPolicy
84+
- iam:UntagPolicy
8085
Resource: '*'
8186
- PolicyName: IDPAcceleratorPermissions
8287
PolicyDocument:
@@ -129,7 +134,6 @@ Resources:
129134
- ec2:DescribeAvailabilityZones
130135
- ecr:*
131136
Resource: '*'
132-
133137
PassRolePolicy:
134138
Type: AWS::IAM::ManagedPolicy
135139
Metadata:
@@ -158,4 +162,4 @@ Outputs:
158162
Description: ARN of the PassRole policy for admins to assign to users
159163
Value: !Ref PassRolePolicy
160164
Export:
161-
Name: !Sub '${AWS::StackName}-PassRolePolicyArn'
165+
Name: !Sub '${AWS::StackName}-PassRolePolicyArn'

iam-roles/cloudformation-management/README.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@ This approach enables a security model where:
1515

1616
The **IDPAcceleratorCloudFormationServiceRole** is a CloudFormation service role that provides the necessary permissions for AWS CloudFormation to deploy, update, and manage GenAI IDP Accelerator stacks across all patterns (Pattern 1: BDA, Pattern 2: Textract+Bedrock, Pattern 3: Textract+UDOP+Bedrock). This role can only be assumed by the CloudFormation service, not by users directly.
1717

18+
Demo (5 minutes)
19+
1820
### Key Capabilities
1921
- **Full CloudFormation Management**: Create, update, delete IDP stacks - This IAM service role (which CloudFormation assumes) gives necessary privileges to create/update/delete the stack which is helpful in development and sandbox environments. In production environments, admins can further limit these permissions to their discretion (e.g. disabling stack deletion).
2022

0 commit comments

Comments
 (0)