AWSTemplateFormatVersion: "2010-09-09" Description: > This CloudFormation template creates a role assumed by CloudFormation during CRUDL operations to mutate resources on behalf of the customer. Resources: ExecutionRole: Type: AWS::IAM::Role Properties: MaxSessionDuration: 8400 AssumeRolePolicyDocument: Version: '2012-10-17' Statement: - Effect: Allow Principal: Service: resources.cloudformation.amazonaws.com Action: sts:AssumeRole Path: "/" Policies: - PolicyName: ResourceTypePolicy PolicyDocument: Version: '2012-10-17' Statement: - Effect: Allow Action: - "amplify:CreateBranch" - "amplify:DeleteBranch" - "amplify:GetBranch" - "amplify:ListBranches" - "amplify:ListTagsForResource" - "amplify:TagResource" - "amplify:UntagResource" - "amplify:UpdateBranch" - "codecommit:GetRepository" - "codecommit:GetRepositoryTriggers" - "codecommit:PutRepositoryTriggers" - "iam:PassRole" - "s3:GetObject" - "s3:GetObjectAcl" - "s3:PutObject" - "s3:PutObjectAcl" - "sns:CreateTopic" - "sns:Subscribe" - "sns:Unsubscribe" Resource: "*" Outputs: ExecutionRoleArn: Value: Fn::GetAtt: ExecutionRole.Arn