Gogs %!s(int64=6) %!d(string=hai) anos
pai
achega
f900a72227

+ 0 - 26
policies/bak/FIAM-BOUNDARY-Developer.json

@@ -1,26 +0,0 @@
-{
-    "Version": "2012-10-17",
-    "Statement": [
-        {
-            "Sid": "TODOThereIsNoReasonForThisPolicy",
-            "Effect": "Allow",
-            "Action": "s3:PutObject",
-            "Resource": "arn:aws:s3:::*/*"
-        },
-        {
-            "Sid": "TODOThisIsOnlyAPlaceHolder",
-            "Effect": "Allow",
-            "Action": "s3:ListBucket",
-            "Resource": "arn:aws:s3:::*"
-        },
-        {
-            "Sid": "TODO",
-            "Effect": "Allow",
-            "Action": [
-                "s3:ListAllMyBuckets",
-                "s3:HeadBucket"
-            ],
-            "Resource": "*"
-        }
-    ]
-}

+ 0 - 16
policies/bak/FIAM-COMMON-IAM-EC2.json

@@ -1,16 +0,0 @@
-{
-    "Version": "2012-10-17",
-    "Statement": [
-        {
-            "Sid": "InstanceProfiles",
-            "Effect": "Allow",
-            "Action": [
-                "iam:CreateInstanceProfile",
-                "iam:DeleteInstanceProfile",
-                "iam:AddRoleToInstanceProfile",
-                "iam:RemoveRoleFromInstanceProfile"
-            ],
-            "Resource": "arn:aws:iam::082012130604:instance-profile/${aws:PrincipalTag/IAM:NamePrefix}*"
-        }
-    ]
-}

+ 0 - 47
policies/bak/FIAM-COMMON-IAMBasics.json

@@ -1,47 +0,0 @@
-{
-    "Version": "2012-10-17",
-    "Statement": [
-        {
-            "Sid": "RequirePermissionsBoundary",
-            "Effect": "Allow",
-            "Action": [
-                "iam:DetachRolePolicy",
-                "iam:CreateRole",
-                "iam:AttachRolePolicy"
-            ],
-            "Resource": "arn:aws:iam::082012130604:role/${aws:PrincipalTag/IAM:NamePrefix}*",
-            "Condition": {
-                "StringEquals": {
-                    "iam:PermissionsBoundary": "arn:aws:iam::082012130604:policy/${aws:PrincipalTag/IAM:PermissionsBoundary}"
-                }
-            }
-        },
-        {
-            "Sid": "DeleteAppropriatelyNamedRole",
-            "Effect": "Allow",
-            "Action": "iam:DeleteRole",
-            "Resource": "arn:aws:iam::082012130604:role/${aws:PrincipalTag/IAM:NamePrefix}*"
-        },
-        {
-            "Sid": "ModifyAppropriatelyNamedPolicies",
-            "Effect": "Allow",
-            "Action": [
-                "iam:CreatePolicy",
-                "iam:DeletePolicy",
-                "iam:CreatePolicyVersion",
-                "iam:DeletePolicyVersion"
-            ],
-            "Resource": "arn:aws:iam::082012130604:policy/${aws:PrincipalTag/IAM:NamePrefix}**"
-        },
-        {
-            "Sid": "AdditionalUsefulAccessTODO",
-            "Effect": "Allow",
-            "Action": [
-                "iam:Get*",
-                "iam:List*",
-                "iam:GenerateServiceLastAccessedDetails"
-            ],
-            "Resource": "*"
-        }
-    ]
-}

+ 0 - 19
policies/bak/FIAM-COMMON-RestrictRegions.json

@@ -1,19 +0,0 @@
-{
-    "Version": "2012-10-17",
-    "Statement": [
-        {
-            "Effect": "Deny",
-            "Action": "*",
-            "Resource": "*",
-            "Condition": {
-                "StringNotEquals": {
-                    "aws:RequestedRegion": [
-                        "us-east-1",
-                        "us-east-2",
-                        "us-west-1"
-                    ]
-                }
-            }
-        }
-    ]
-}

+ 0 - 19
policies/bak/FIAM-COMMON-RestrictServices.json

@@ -1,19 +0,0 @@
-{
-    "Version": "2012-10-17",
-    "Statement": [
-        {
-            "Effect": "Deny",
-            "Action": "*",
-            "Resource": "*",
-            "Condition": {
-                "StringNotEquals": {
-                    "aws:RequestedRegion": [
-                        "us-east-1",
-                        "us-east-2",
-                        "us-west-1"
-                    ]
-                }
-            }
-        }
-    ]
-}

+ 0 - 11
policies/bak/FIAM-TESTING-assume_any_fiam_role.json

@@ -1,11 +0,0 @@
-{
-    "Version": "2012-10-17",
-    "Statement": [
-        {
-            "Sid": "VisualEditor0",
-            "Effect": "Allow",
-            "Action": "sts:AssumeRole",
-            "Resource": "arn:aws:iam::082012130604:role/FIAM-*"
-        }
-    ]
-}

+ 0 - 1
policies/tmp.txt

@@ -1 +0,0 @@
-he