Copyright | (c) 2013-2021 Brendan Hay |
---|---|
License | Mozilla Public License, v. 2.0. |
Maintainer | Brendan Hay <brendan.g.hay+amazonka@gmail.com> |
Stability | auto-generated |
Portability | non-portable (GHC extensions) |
Safe Haskell | None |
Simulate how a set of IAM policies and optionally a resource-based policy works with a list of API operations and Amazon Web Services resources to determine the policies' effective permissions. The policies are provided as strings.
The simulation does not perform the API operations; it only checks the authorization to determine if the simulated policies allow or deny the operations. You can simulate resources that don't exist in your account.
If you want to simulate existing policies that are attached to an IAM user, group, or role, use SimulatePrincipalPolicy instead.
Context keys are variables that are maintained by Amazon Web Services
and its services and which provide details about the context of an API
query request. You can use the Condition
element of an IAM policy to
evaluate context keys. To get the list of context keys that the policies
require for correct simulation, use GetContextKeysForCustomPolicy.
If the output is long, you can use MaxItems
and Marker
parameters to
paginate the results.
For more information about using the policy simulator, see Testing IAM policies with the IAM policy simulator in the IAM User Guide.
This operation returns paginated results.
Synopsis
- data SimulateCustomPolicy = SimulateCustomPolicy' {
- resourcePolicy :: Maybe Text
- callerArn :: Maybe Text
- resourceHandlingOption :: Maybe Text
- resourceArns :: Maybe [Text]
- permissionsBoundaryPolicyInputList :: Maybe [Text]
- marker :: Maybe Text
- maxItems :: Maybe Natural
- contextEntries :: Maybe [ContextEntry]
- resourceOwner :: Maybe Text
- policyInputList :: [Text]
- actionNames :: [Text]
- newSimulateCustomPolicy :: SimulateCustomPolicy
- simulateCustomPolicy_resourcePolicy :: Lens' SimulateCustomPolicy (Maybe Text)
- simulateCustomPolicy_callerArn :: Lens' SimulateCustomPolicy (Maybe Text)
- simulateCustomPolicy_resourceHandlingOption :: Lens' SimulateCustomPolicy (Maybe Text)
- simulateCustomPolicy_resourceArns :: Lens' SimulateCustomPolicy (Maybe [Text])
- simulateCustomPolicy_permissionsBoundaryPolicyInputList :: Lens' SimulateCustomPolicy (Maybe [Text])
- simulateCustomPolicy_marker :: Lens' SimulateCustomPolicy (Maybe Text)
- simulateCustomPolicy_maxItems :: Lens' SimulateCustomPolicy (Maybe Natural)
- simulateCustomPolicy_contextEntries :: Lens' SimulateCustomPolicy (Maybe [ContextEntry])
- simulateCustomPolicy_resourceOwner :: Lens' SimulateCustomPolicy (Maybe Text)
- simulateCustomPolicy_policyInputList :: Lens' SimulateCustomPolicy [Text]
- simulateCustomPolicy_actionNames :: Lens' SimulateCustomPolicy [Text]
- data SimulatePolicyResponse = SimulatePolicyResponse' {}
- newSimulatePolicyResponse :: SimulatePolicyResponse
- simulatePolicyResponse_evaluationResults :: Lens' SimulatePolicyResponse (Maybe [EvaluationResult])
- simulatePolicyResponse_marker :: Lens' SimulatePolicyResponse (Maybe Text)
- simulatePolicyResponse_isTruncated :: Lens' SimulatePolicyResponse (Maybe Bool)
Creating a Request
data SimulateCustomPolicy Source #
See: newSimulateCustomPolicy
smart constructor.
SimulateCustomPolicy' | |
|
Instances
newSimulateCustomPolicy :: SimulateCustomPolicy Source #
Create a value of SimulateCustomPolicy
with all optional fields omitted.
Use generic-lens or optics to modify other optional fields.
The following record fields are available, with the corresponding lenses provided for backwards compatibility:
$sel:resourcePolicy:SimulateCustomPolicy'
, simulateCustomPolicy_resourcePolicy
- A resource-based policy to include in the simulation provided as a
string. Each resource in the simulation is treated as if it had this
policy attached. You can include only one resource-based policy in a
simulation.
The maximum length of the policy document that you can pass in this operation, including whitespace, is listed below. To view the maximum character counts of a managed policy with no whitespaces, see IAM and STS character quotas.
The regex pattern used to validate this parameter is a string of characters consisting of the following:
- Any printable ASCII character ranging from the space character
(
\u0020
) through the end of the ASCII character range - The printable characters in the Basic Latin and Latin-1 Supplement
character set (through
\u00FF
) - The special characters tab (
\u0009
), line feed (\u000A
), and carriage return (\u000D
)
$sel:callerArn:SimulateCustomPolicy'
, simulateCustomPolicy_callerArn
- The ARN of the IAM user that you want to use as the simulated caller of
the API operations. CallerArn
is required if you include a
ResourcePolicy
so that the policy's Principal
element has a value
to use in evaluating the policy.
You can specify only the ARN of an IAM user. You cannot specify the ARN of an assumed role, federated user, or a service principal.
$sel:resourceHandlingOption:SimulateCustomPolicy'
, simulateCustomPolicy_resourceHandlingOption
- Specifies the type of simulation to run. Different API operations that
support resource-based policies require different combinations of
resources. By specifying the type of simulation to run, you enable the
policy simulator to enforce the presence of the required resources to
ensure reliable simulation results. If your simulation does not match
one of the following scenarios, then you can omit this parameter. The
following list shows each of the supported scenario values and the
resources that you must define to run the simulation.
Each of the EC2 scenarios requires that you specify instance, image, and security-group resources. If your scenario includes an EBS volume, then you must specify that volume as a resource. If the EC2 scenario includes VPC, then you must supply the network-interface resource. If it includes an IP subnet, then you must specify the subnet resource. For more information on the EC2 scenario options, see Supported platforms in the Amazon EC2 User Guide.
EC2-Classic-InstanceStore
instance, image, security-group
EC2-Classic-EBS
instance, image, security-group, volume
EC2-VPC-InstanceStore
instance, image, security-group, network-interface
EC2-VPC-InstanceStore-Subnet
instance, image, security-group, network-interface, subnet
EC2-VPC-EBS
instance, image, security-group, network-interface, volume
EC2-VPC-EBS-Subnet
instance, image, security-group, network-interface, subnet, volume
$sel:resourceArns:SimulateCustomPolicy'
, simulateCustomPolicy_resourceArns
- A list of ARNs of Amazon Web Services resources to include in the
simulation. If this parameter is not provided, then the value defaults
to *
(all resources). Each API in the ActionNames
parameter is
evaluated for each resource in this list. The simulation determines the
access result (allowed or denied) of each combination and reports it in
the response. You can simulate resources that don't exist in your
account.
The simulation does not automatically retrieve policies for the
specified resources. If you want to include a resource policy in the
simulation, then you must include the policy as a string in the
ResourcePolicy
parameter.
If you include a ResourcePolicy
, then it must be applicable to all of
the resources included in the simulation or you receive an invalid input
error.
For more information about ARNs, see Amazon Resource Names (ARNs) in the Amazon Web Services General Reference.
$sel:permissionsBoundaryPolicyInputList:SimulateCustomPolicy'
, simulateCustomPolicy_permissionsBoundaryPolicyInputList
- The IAM permissions boundary policy to simulate. The permissions
boundary sets the maximum permissions that an IAM entity can have. You
can input only one permissions boundary when you pass a policy to this
operation. For more information about permissions boundaries, see
Permissions boundaries for IAM entities
in the IAM User Guide. The policy input is specified as a string that
contains the complete, valid JSON text of a permissions boundary policy.
The maximum length of the policy document that you can pass in this operation, including whitespace, is listed below. To view the maximum character counts of a managed policy with no whitespaces, see IAM and STS character quotas.
The regex pattern used to validate this parameter is a string of characters consisting of the following:
- Any printable ASCII character ranging from the space character
(
\u0020
) through the end of the ASCII character range - The printable characters in the Basic Latin and Latin-1 Supplement
character set (through
\u00FF
) - The special characters tab (
\u0009
), line feed (\u000A
), and carriage return (\u000D
)
$sel:marker:SimulateCustomPolicy'
, simulateCustomPolicy_marker
- Use this parameter only when paginating results and only after you
receive a response indicating that the results are truncated. Set it to
the value of the Marker
element in the response that you received to
indicate where the next call should start.
$sel:maxItems:SimulateCustomPolicy'
, simulateCustomPolicy_maxItems
- Use this only when paginating results to indicate the maximum number of
items you want in the response. If additional items exist beyond the
maximum you specify, the IsTruncated
response element is true
.
If you do not include this parameter, the number of items defaults to
100. Note that IAM might return fewer results, even when there are more
results available. In that case, the IsTruncated
response element
returns true
, and Marker
contains a value to include in the
subsequent call that tells the service where to continue from.
$sel:contextEntries:SimulateCustomPolicy'
, simulateCustomPolicy_contextEntries
- A list of context keys and corresponding values for the simulation to
use. Whenever a context key is evaluated in one of the simulated IAM
permissions policies, the corresponding value is supplied.
$sel:resourceOwner:SimulateCustomPolicy'
, simulateCustomPolicy_resourceOwner
- An ARN representing the Amazon Web Services account ID that specifies
the owner of any simulated resource that does not identify its owner in
the resource ARN. Examples of resource ARNs include an S3 bucket or
object. If ResourceOwner
is specified, it is also used as the account
owner of any ResourcePolicy
included in the simulation. If the
ResourceOwner
parameter is not specified, then the owner of the
resources and the resource policy defaults to the account of the
identity provided in CallerArn
. This parameter is required only if you
specify a resource-based policy and account that owns the resource is
different from the account that owns the simulated calling user
CallerArn
.
The ARN for an account uses the following syntax:
arn:aws:iam::AWS-account-ID:root
. For example, to represent the
account with the 112233445566 ID, use the following ARN:
arn:aws:iam::112233445566-ID:root
.
$sel:policyInputList:SimulateCustomPolicy'
, simulateCustomPolicy_policyInputList
- A list of policy documents to include in the simulation. Each document
is specified as a string containing the complete, valid JSON text of an
IAM policy. Do not include any resource-based policies in this
parameter. Any resource-based policy must be submitted with the
ResourcePolicy
parameter. The policies cannot be "scope-down"
policies, such as you could include in a call to
GetFederationToken
or one of the
AssumeRole
API operations. In other words, do not use policies designed to restrict
what a user can do while using the temporary credentials.
The maximum length of the policy document that you can pass in this operation, including whitespace, is listed below. To view the maximum character counts of a managed policy with no whitespaces, see IAM and STS character quotas.
The regex pattern used to validate this parameter is a string of characters consisting of the following:
- Any printable ASCII character ranging from the space character
(
\u0020
) through the end of the ASCII character range - The printable characters in the Basic Latin and Latin-1 Supplement
character set (through
\u00FF
) - The special characters tab (
\u0009
), line feed (\u000A
), and carriage return (\u000D
)
$sel:actionNames:SimulateCustomPolicy'
, simulateCustomPolicy_actionNames
- A list of names of API operations to evaluate in the simulation. Each
operation is evaluated against each resource. Each operation must
include the service identifier, such as iam:CreateUser
. This operation
does not support using wildcards (*) in an action name.
Request Lenses
simulateCustomPolicy_resourcePolicy :: Lens' SimulateCustomPolicy (Maybe Text) Source #
A resource-based policy to include in the simulation provided as a string. Each resource in the simulation is treated as if it had this policy attached. You can include only one resource-based policy in a simulation.
The maximum length of the policy document that you can pass in this operation, including whitespace, is listed below. To view the maximum character counts of a managed policy with no whitespaces, see IAM and STS character quotas.
The regex pattern used to validate this parameter is a string of characters consisting of the following:
- Any printable ASCII character ranging from the space character
(
\u0020
) through the end of the ASCII character range - The printable characters in the Basic Latin and Latin-1 Supplement
character set (through
\u00FF
) - The special characters tab (
\u0009
), line feed (\u000A
), and carriage return (\u000D
)
simulateCustomPolicy_callerArn :: Lens' SimulateCustomPolicy (Maybe Text) Source #
The ARN of the IAM user that you want to use as the simulated caller of
the API operations. CallerArn
is required if you include a
ResourcePolicy
so that the policy's Principal
element has a value
to use in evaluating the policy.
You can specify only the ARN of an IAM user. You cannot specify the ARN of an assumed role, federated user, or a service principal.
simulateCustomPolicy_resourceHandlingOption :: Lens' SimulateCustomPolicy (Maybe Text) Source #
Specifies the type of simulation to run. Different API operations that support resource-based policies require different combinations of resources. By specifying the type of simulation to run, you enable the policy simulator to enforce the presence of the required resources to ensure reliable simulation results. If your simulation does not match one of the following scenarios, then you can omit this parameter. The following list shows each of the supported scenario values and the resources that you must define to run the simulation.
Each of the EC2 scenarios requires that you specify instance, image, and security-group resources. If your scenario includes an EBS volume, then you must specify that volume as a resource. If the EC2 scenario includes VPC, then you must supply the network-interface resource. If it includes an IP subnet, then you must specify the subnet resource. For more information on the EC2 scenario options, see Supported platforms in the Amazon EC2 User Guide.
EC2-Classic-InstanceStore
instance, image, security-group
EC2-Classic-EBS
instance, image, security-group, volume
EC2-VPC-InstanceStore
instance, image, security-group, network-interface
EC2-VPC-InstanceStore-Subnet
instance, image, security-group, network-interface, subnet
EC2-VPC-EBS
instance, image, security-group, network-interface, volume
EC2-VPC-EBS-Subnet
instance, image, security-group, network-interface, subnet, volume
simulateCustomPolicy_resourceArns :: Lens' SimulateCustomPolicy (Maybe [Text]) Source #
A list of ARNs of Amazon Web Services resources to include in the
simulation. If this parameter is not provided, then the value defaults
to *
(all resources). Each API in the ActionNames
parameter is
evaluated for each resource in this list. The simulation determines the
access result (allowed or denied) of each combination and reports it in
the response. You can simulate resources that don't exist in your
account.
The simulation does not automatically retrieve policies for the
specified resources. If you want to include a resource policy in the
simulation, then you must include the policy as a string in the
ResourcePolicy
parameter.
If you include a ResourcePolicy
, then it must be applicable to all of
the resources included in the simulation or you receive an invalid input
error.
For more information about ARNs, see Amazon Resource Names (ARNs) in the Amazon Web Services General Reference.
simulateCustomPolicy_permissionsBoundaryPolicyInputList :: Lens' SimulateCustomPolicy (Maybe [Text]) Source #
The IAM permissions boundary policy to simulate. The permissions boundary sets the maximum permissions that an IAM entity can have. You can input only one permissions boundary when you pass a policy to this operation. For more information about permissions boundaries, see Permissions boundaries for IAM entities in the IAM User Guide. The policy input is specified as a string that contains the complete, valid JSON text of a permissions boundary policy.
The maximum length of the policy document that you can pass in this operation, including whitespace, is listed below. To view the maximum character counts of a managed policy with no whitespaces, see IAM and STS character quotas.
The regex pattern used to validate this parameter is a string of characters consisting of the following:
- Any printable ASCII character ranging from the space character
(
\u0020
) through the end of the ASCII character range - The printable characters in the Basic Latin and Latin-1 Supplement
character set (through
\u00FF
) - The special characters tab (
\u0009
), line feed (\u000A
), and carriage return (\u000D
)
simulateCustomPolicy_marker :: Lens' SimulateCustomPolicy (Maybe Text) Source #
Use this parameter only when paginating results and only after you
receive a response indicating that the results are truncated. Set it to
the value of the Marker
element in the response that you received to
indicate where the next call should start.
simulateCustomPolicy_maxItems :: Lens' SimulateCustomPolicy (Maybe Natural) Source #
Use this only when paginating results to indicate the maximum number of
items you want in the response. If additional items exist beyond the
maximum you specify, the IsTruncated
response element is true
.
If you do not include this parameter, the number of items defaults to
100. Note that IAM might return fewer results, even when there are more
results available. In that case, the IsTruncated
response element
returns true
, and Marker
contains a value to include in the
subsequent call that tells the service where to continue from.
simulateCustomPolicy_contextEntries :: Lens' SimulateCustomPolicy (Maybe [ContextEntry]) Source #
A list of context keys and corresponding values for the simulation to use. Whenever a context key is evaluated in one of the simulated IAM permissions policies, the corresponding value is supplied.
simulateCustomPolicy_resourceOwner :: Lens' SimulateCustomPolicy (Maybe Text) Source #
An ARN representing the Amazon Web Services account ID that specifies
the owner of any simulated resource that does not identify its owner in
the resource ARN. Examples of resource ARNs include an S3 bucket or
object. If ResourceOwner
is specified, it is also used as the account
owner of any ResourcePolicy
included in the simulation. If the
ResourceOwner
parameter is not specified, then the owner of the
resources and the resource policy defaults to the account of the
identity provided in CallerArn
. This parameter is required only if you
specify a resource-based policy and account that owns the resource is
different from the account that owns the simulated calling user
CallerArn
.
The ARN for an account uses the following syntax:
arn:aws:iam::AWS-account-ID:root
. For example, to represent the
account with the 112233445566 ID, use the following ARN:
arn:aws:iam::112233445566-ID:root
.
simulateCustomPolicy_policyInputList :: Lens' SimulateCustomPolicy [Text] Source #
A list of policy documents to include in the simulation. Each document
is specified as a string containing the complete, valid JSON text of an
IAM policy. Do not include any resource-based policies in this
parameter. Any resource-based policy must be submitted with the
ResourcePolicy
parameter. The policies cannot be "scope-down"
policies, such as you could include in a call to
GetFederationToken
or one of the
AssumeRole
API operations. In other words, do not use policies designed to restrict
what a user can do while using the temporary credentials.
The maximum length of the policy document that you can pass in this operation, including whitespace, is listed below. To view the maximum character counts of a managed policy with no whitespaces, see IAM and STS character quotas.
The regex pattern used to validate this parameter is a string of characters consisting of the following:
- Any printable ASCII character ranging from the space character
(
\u0020
) through the end of the ASCII character range - The printable characters in the Basic Latin and Latin-1 Supplement
character set (through
\u00FF
) - The special characters tab (
\u0009
), line feed (\u000A
), and carriage return (\u000D
)
simulateCustomPolicy_actionNames :: Lens' SimulateCustomPolicy [Text] Source #
A list of names of API operations to evaluate in the simulation. Each
operation is evaluated against each resource. Each operation must
include the service identifier, such as iam:CreateUser
. This operation
does not support using wildcards (*) in an action name.
Destructuring the Response
data SimulatePolicyResponse Source #
Contains the response to a successful SimulatePrincipalPolicy or SimulateCustomPolicy request.
See: newSimulatePolicyResponse
smart constructor.
SimulatePolicyResponse' | |
|
Instances
newSimulatePolicyResponse :: SimulatePolicyResponse Source #
Create a value of SimulatePolicyResponse
with all optional fields omitted.
Use generic-lens or optics to modify other optional fields.
The following record fields are available, with the corresponding lenses provided for backwards compatibility:
$sel:evaluationResults:SimulatePolicyResponse'
, simulatePolicyResponse_evaluationResults
- The results of the simulation.
$sel:marker:SimulatePolicyResponse'
, simulatePolicyResponse_marker
- When IsTruncated
is true
, this element is present and contains the
value to use for the Marker
parameter in a subsequent pagination
request.
$sel:isTruncated:SimulatePolicyResponse'
, simulatePolicyResponse_isTruncated
- A flag that indicates whether there are more items to return. If your
results were truncated, you can make a subsequent pagination request
using the Marker
request parameter to retrieve more items. Note that
IAM might return fewer than the MaxItems
number of results even when
there are more results available. We recommend that you check
IsTruncated
after every call to ensure that you receive all your
results.
Response Lenses
simulatePolicyResponse_evaluationResults :: Lens' SimulatePolicyResponse (Maybe [EvaluationResult]) Source #
The results of the simulation.
simulatePolicyResponse_marker :: Lens' SimulatePolicyResponse (Maybe Text) Source #
When IsTruncated
is true
, this element is present and contains the
value to use for the Marker
parameter in a subsequent pagination
request.
simulatePolicyResponse_isTruncated :: Lens' SimulatePolicyResponse (Maybe Bool) Source #
A flag that indicates whether there are more items to return. If your
results were truncated, you can make a subsequent pagination request
using the Marker
request parameter to retrieve more items. Note that
IAM might return fewer than the MaxItems
number of results even when
there are more results available. We recommend that you check
IsTruncated
after every call to ensure that you receive all your
results.