Amazon S3 Operations: Difference between revisions
Jump to navigation
Jump to search
Line 41: | Line 41: | ||
where "example-private-maven" is the name of the bucket hosting the repository in question, and arn:aws:iam::673499572719:root stands for the AWS account. <font color=darkgray>More details here.</font> | where "example-private-maven" is the name of the bucket hosting the repository in question, and arn:aws:iam::673499572719:root stands for the AWS account. <font color=darkgray>More details here.</font> | ||
=Create an S3 Bucket With CloudFormation= | |||
=Upload a File to an S3 Bucket via a CloudFormation Stack that Creates the Bucket= | =Upload a File to an S3 Bucket via a CloudFormation Stack that Creates the Bucket= | ||
<font color=darkgray>TODO: https://serverfault.com/a/845336</font> | <font color=darkgray>TODO: https://serverfault.com/a/845336</font> |
Revision as of 00:53, 8 April 2019
Internal
Command Line Operations
Grant an AWS Account Permissions on a Bucket
To grant an AWS account permissions on a bucket, edit the bucket policy and add a statement similar to the following to the list of existing statements:
{
"Version": "2012-10-17",
"Statement": [
...
{
"Sid": "PlaygroundCodeBuildAccessToPrivateMavenRepository",
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::673499572719:root"
},
"Action": [
"s3:ListBucket",
"s3:ListBucketMultipartUploads",
"s3:AbortMultipartUpload",
"s3:GetBucketLocation",
"s3:GetObject",
"s3:GetObjectVersion",
"s3:PutObject"
],
"Resource": [
"arn:aws:s3:::example-private-maven/*",
"arn:aws:s3:::example-private-maven"
]
}
]
}
where "example-private-maven" is the name of the bucket hosting the repository in question, and arn:aws:iam::673499572719:root stands for the AWS account. More details here.