S3 Bucket action doesn't apply to any resources

前端 未结 11 787
无人及你
无人及你 2021-01-30 09:55

I\'m following the instructions from this answer to generate the follow S3 bucket policy:

{
  \"Id\": \"Policy1495981680273\",
  \"Version\": \"2012-10-17\",
  \         


        
11条回答
  •  不要未来只要你来
    2021-01-30 10:40

    Just removing the s3:ListBucket permission wasn't really a good enough solution for me, and probably isn't for many others.

    If you want the s3:ListBucket permission, you need to just have the plain arn of the bucket (without the /* at the end) as this permission applies to the bucket itself and not items within the bucket.

    As shown below, you have to have the s3:ListBucket permission as a separate statement from the permissions pertaining to items within the bucket like s3:GetObject and s3:PutObject:

    {
      "Version": "2012-10-17",
      "Statement": [
        {
          "Effect": "Allow",
          "Action": [
            "s3:ListBucket"        
          ],
          "Principal": {
            "AWS": "[IAM ARN HERE]"
          },
          "Resource": "arn:aws:s3:::my-bucket-name"
        },
        {
          "Effect": "Allow",
          "Action": [
            "s3:GetObject", 
            "s3:PutObject"
          ],
          "Principal": {
            "AWS": "[IAM ARN HERE]"
          },
          "Resource": "arn:aws:s3:::my-bucket-name/*"
        }
      ]
    }
    

提交回复
热议问题