Skip to content

Commit 93d8b1c

Browse files
hcanalesmxbrettstack
authored andcommitted
feat(policy-templates): add RekognitionFacesManagementPolicy Policy Template (#589)
1 parent c4f3f87 commit 93d8b1c

File tree

5 files changed

+108
-0
lines changed

5 files changed

+108
-0
lines changed

samtranslator/policy_templates_data/policy_templates.json

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -962,6 +962,36 @@
962962
]
963963
}
964964
},
965+
"RekognitionFacesManagementPolicy": {
966+
"Description": "Gives permission to add, delete and search faces in a collection",
967+
"Parameters": {
968+
"CollectionId": {
969+
"Description": "ID of the collection"
970+
}
971+
},
972+
"Definition": {
973+
"Statement": [{
974+
"Effect": "Allow",
975+
"Action": [
976+
"rekognition:IndexFaces",
977+
"rekognition:DeleteFaces",
978+
"rekognition:SearchFaces",
979+
"rekognition:SearchFacesByImage",
980+
"rekognition:ListFaces"
981+
],
982+
"Resource": {
983+
"Fn::Sub": [
984+
"arn:${AWS::Partition}:rekognition:${AWS::Region}:${AWS::AccountId}:collection/${collectionId}",
985+
{
986+
"collectionId": {
987+
"Ref": "CollectionId"
988+
}
989+
}
990+
]
991+
}
992+
}]
993+
}
994+
},
965995
"RekognitionFacesPolicy": {
966996
"Description": "Gives permission to compare and detect faces and labels",
967997
"Parameters": {

tests/translator/input/all_policy_templates.yaml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -120,3 +120,6 @@ Resources:
120120
PinpointApplicationId: id
121121

122122
- RekognitionDetectOnlyPolicy: {}
123+
124+
- RekognitionFacesManagementPolicy:
125+
CollectionId: collection

tests/translator/output/all_policy_templates.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1003,6 +1003,31 @@
10031003
}
10041004
]
10051005
}
1006+
},
1007+
{
1008+
"PolicyName": "KitchenSinkFunctionRolePolicy40",
1009+
"PolicyDocument": {
1010+
"Statement": [
1011+
{
1012+
"Action": [
1013+
"rekognition:IndexFaces",
1014+
"rekognition:DeleteFaces",
1015+
"rekognition:SearchFaces",
1016+
"rekognition:SearchFacesByImage",
1017+
"rekognition:ListFaces"
1018+
],
1019+
"Resource": {
1020+
"Fn::Sub": [
1021+
"arn:${AWS::Partition}:rekognition:${AWS::Region}:${AWS::AccountId}:collection/${collectionId}",
1022+
{
1023+
"collectionId": "collection"
1024+
}
1025+
]
1026+
},
1027+
"Effect": "Allow"
1028+
}
1029+
]
1030+
}
10061031
}
10071032
],
10081033
"AssumeRolePolicyDocument": {

tests/translator/output/aws-cn/all_policy_templates.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1003,6 +1003,31 @@
10031003
}
10041004
]
10051005
}
1006+
},
1007+
{
1008+
"PolicyName": "KitchenSinkFunctionRolePolicy40",
1009+
"PolicyDocument": {
1010+
"Statement": [
1011+
{
1012+
"Action": [
1013+
"rekognition:IndexFaces",
1014+
"rekognition:DeleteFaces",
1015+
"rekognition:SearchFaces",
1016+
"rekognition:SearchFacesByImage",
1017+
"rekognition:ListFaces"
1018+
],
1019+
"Resource": {
1020+
"Fn::Sub": [
1021+
"arn:${AWS::Partition}:rekognition:${AWS::Region}:${AWS::AccountId}:collection/${collectionId}",
1022+
{
1023+
"collectionId": "collection"
1024+
}
1025+
]
1026+
},
1027+
"Effect": "Allow"
1028+
}
1029+
]
1030+
}
10061031
}
10071032
],
10081033
"AssumeRolePolicyDocument": {

tests/translator/output/aws-us-gov/all_policy_templates.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1004,6 +1004,31 @@
10041004
}
10051005
]
10061006
}
1007+
},
1008+
{
1009+
"PolicyName": "KitchenSinkFunctionRolePolicy40",
1010+
"PolicyDocument": {
1011+
"Statement": [
1012+
{
1013+
"Action": [
1014+
"rekognition:IndexFaces",
1015+
"rekognition:DeleteFaces",
1016+
"rekognition:SearchFaces",
1017+
"rekognition:SearchFacesByImage",
1018+
"rekognition:ListFaces"
1019+
],
1020+
"Resource": {
1021+
"Fn::Sub": [
1022+
"arn:${AWS::Partition}:rekognition:${AWS::Region}:${AWS::AccountId}:collection/${collectionId}",
1023+
{
1024+
"collectionId": "collection"
1025+
}
1026+
]
1027+
},
1028+
"Effect": "Allow"
1029+
}
1030+
]
1031+
}
10071032
}
10081033
],
10091034
"AssumeRolePolicyDocument": {

0 commit comments

Comments
 (0)