AWSTemplateFormatVersion: "2010-09-09" Description: > This CloudFormation template creates a role assumed by CloudFormation during CRUDL operations to mutate resources on behalf of the customer. Resources: ExecutionRole: Type: AWS::IAM::Role Properties: MaxSessionDuration: 8400 AssumeRolePolicyDocument: Version: '2012-10-17' Statement: - Effect: Allow Principal: Service: resources.cloudformation.amazonaws.com Action: sts:AssumeRole Path: "/" Policies: - PolicyName: ResourceTypePolicy PolicyDocument: Version: '2012-10-17' Statement: - Effect: Allow Action: - "codecommit:GitPull" - "codecommit:TagResource" - "codecommit:UntagResource" - "codeguru-reviewer:AssociateRepository" - "codeguru-reviewer:DescribeRepositoryAssociation" - "codeguru-reviewer:DisassociateRepository" - "codeguru-reviewer:ListRepositoryAssociations" - "codeguru-reviewer:ListTagsForResource" - "codeguru-reviewer:TagResource" - "codestar-connections:ListBranches" - "codestar-connections:ListRepositories" - "codestar-connections:ListTagsForResource" - "codestar-connections:PassConnection" - "codestar-connections:TagResource" - "codestar-connections:UntagResource" - "codestar-connections:UseConnection" - "events:DeleteRule" - "events:PutRule" - "events:PutTargets" - "events:RemoveTargets" - "iam:CreateServiceLinkedRole" - "s3:CreateBucket" - "s3:PutLifecycleConfiguration" - "s3:PutObject" - "s3:PutBucketPolicy" - "s3:GetBucketPolicy" - "s3:ListBucket" Resource: "*" Outputs: ExecutionRoleArn: Value: Fn::GetAtt: ExecutionRole.Arn