botocore助手库
botool的Python项目详细描述
botool
==
希望对管理aws资源的botocore脚本有用
----
--
-添加备份标志以将设置写入文件
-添加容量以删除用户、组,以及角色
-测试
-允许“用户”拥有单独的策略
策略名称:“allow-rw-to-s3”
策略文档:“example-allow-rw-to-s3.json”
-组名称:“group3”
策略名称:“allow-rw-to-s3”
策略文档:“example-allow-rw-to-s3.json”
用户:
-用户名:“user1”
组:[group2,group1]
-用户名:“user2”
组:[group1]
-用户名:“user3”
组:[group3,group2,group1]
-用户名:“user4”
组:[group2组3]
角色:
-角色名称:“role1 service”
策略名称:“allow-rw-to-s3”
假设角色策略文档:“allow-assume-role-by-ec2-service.json”
策略文档:“example-allow-rw-to-s3.json”
-角色名称:“role2 service”
策略名称:“allow-rw-to-s3”
假设角色策略文档:“allow-assempt-role-by-ec2-service.json”
策略文档:“example-allow-rw-to-s3.json”
-角色名称:“role3服务”
策略名称:“allow-rw-to-s3”
假设角色策略文档:“allow-assempt-role-by-ec2-service.json”
策略文档:“example-allow-rw-to-s3.json”
----
----
{
“Statement”:
[
{
“Effect”:“allow”,
“操作”:[
“sts:assumerole”
],
“主体”:
{
“服务”:
[
“ec2.amazonaws.com”
]
}
}
]
}
}
“version”:“2012-10-17”,
“statement”:
[
{
“effect”:“allow”,
“action”:
[
“s3:abortmultipartupload”,
“s3:deleteobject”,
“s3:getobject”,
“s3:GetObjectAcl”,
“s3:ListMultipartUploadParts”,
“s3:PutObject”,
“s3:PutObjectAcl”
],
“Resource”:
[
“arn:aws:s3:::hqmigrat stage/*”
]
},
{
“sid”:“stmt1391189122000”,
“effect”:“allow”,
“action”:
[
“s3:abortMultipartUpload”,
“s3:deleteObject”,
“s3:getObject”,
“s3:getobjectacl”、
“s3:listmultipartuploadparts”、
“s3:putobject”、
“s3:putobjectacl”
],
“资源”:
[
“arn:aws:s3:::hqmigrat prod/*”
]
}
]
}
===
--
-TBD
>0.1(2014-02-10)
————————————————————————————————————————————————————创建角色、组和用户的IAM基础管理用户角色,但其他的都是现在才添加的。
==
希望对管理aws资源的botocore脚本有用
-添加备份标志以将设置写入文件
-添加容量以删除用户、组,以及角色
-测试
-允许“用户”拥有单独的策略
策略名称:“allow-rw-to-s3”
策略文档:“example-allow-rw-to-s3.json”
-组名称:“group3”
策略名称:“allow-rw-to-s3”
策略文档:“example-allow-rw-to-s3.json”
用户:
-用户名:“user1”
组:[group2,group1]
-用户名:“user2”
组:[group1]
-用户名:“user3”
组:[group3,group2,group1]
-用户名:“user4”
组:[group2组3]
角色:
-角色名称:“role1 service”
策略名称:“allow-rw-to-s3”
假设角色策略文档:“allow-assume-role-by-ec2-service.json”
策略文档:“example-allow-rw-to-s3.json”
-角色名称:“role2 service”
策略名称:“allow-rw-to-s3”
假设角色策略文档:“allow-assempt-role-by-ec2-service.json”
策略文档:“example-allow-rw-to-s3.json”
-角色名称:“role3服务”
策略名称:“allow-rw-to-s3”
假设角色策略文档:“allow-assempt-role-by-ec2-service.json”
策略文档:“example-allow-rw-to-s3.json”
----
{
“Statement”:
[
{
“Effect”:“allow”,
“操作”:[
“sts:assumerole”
],
“主体”:
{
“服务”:
[
“ec2.amazonaws.com”
]
}
}
]
}
}
“statement”:
[
{
“effect”:“allow”,
“action”:
[
“s3:abortmultipartupload”,
“s3:deleteobject”,
“s3:getobject”,
“s3:GetObjectAcl”,
“s3:ListMultipartUploadParts”,
“s3:PutObject”,
“s3:PutObjectAcl”
],
“Resource”:
[
“arn:aws:s3:::hqmigrat stage/*”
]
},
{
“sid”:“stmt1391189122000”,
“effect”:“allow”,
“action”:
[
“s3:abortMultipartUpload”,
“s3:deleteObject”,
“s3:getObject”,
“s3:getobjectacl”、
“s3:listmultipartuploadparts”、
“s3:putobject”、
“s3:putobjectacl”
],
“资源”:
[
“arn:aws:s3:::hqmigrat prod/*”
]
}
]
}
===
--
-TBD
>0.1(2014-02-10)
————————————————————————————————————————————————————创建角色、组和用户的IAM基础管理用户角色,但其他的都是现在才添加的。