配置I AM 客製化Poliy : 只能訪問特定bucket
1. 新增客製化Poliy (使用json格式)
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"s3:PutObject",
"s3:GetObject",
"s3:DeleteObjectVersion",
"s3:DeleteObject",
"s3:GetObjectVersion"
],
"Resource": "arn:aws:s3:::yourbucket/*"
}
]
}
2. 把客製化Poliy連結到新建的使用者中
3. 下載AWS CLI ,輸入上述新增使用者的Access key ID , Secret access key ,即可取得已配置的權限.
4. 經測試發現並無List Object的權限 , 需要新增ListBucket才能取得List Object的權限.
將json修改為下列後. aws s3 ls s3://yourbucket 回應正常
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"s3:PutObject",
"s3:GetObject",
"s3:DeleteObjectVersion",
"s3:DeleteObject",
"s3:GetObjectVersion"
],
"Resource": "arn:aws:s3:::god-res/*"
},
{
"Sid": "VisualEditor1",
"Effect": "Allow",
"Action": "s3:ListBucket",
"Resource": "arn:aws:s3:::*"
}
]
}
參考文件:
https://docs.aws.amazon.com/zh_tw/AmazonS3/latest/dev/example-policies-s3.html#iam-policy-ex0
沒有留言:
張貼留言