def attach_policy(self, S3_User, bucket_name): policy = '''{ "Version": "2012-10-17", "Statement": [ { "Action": [ "s3:ListAllMyBuckets" ], "Effect": "Allow", "Resource": "arn:aws:s3:::*" }, { "Action": "s3:*", "Effect": "Allow", "Resource": [ "arn:aws:s3:::%s*", "arn:aws:s3:::%s*/*" ] } ] }''' % (bucket_name, bucket_name) print policy # # Attach Policy to acces s3 bucket connect = IAMConnection(self.admin_access_key, self.admin_secret_key) connect.put_user_policy(S3_User, bucket_name, policy)
print "aws_key_key:%s" % key_key #put the user policy plicy_json = """{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": "ses:SendRawEmail", "Resource": "*" } ] }""" policy = iamconn.put_user_policy(username, AmazonSesSendingAccess, plicy_json) #display policy print policy time.sleep(10) #delete key delete = iamconn.delete_access_key(key_id, user_name=username) print "success delete key_id" #delete user delete = iamconn.delete_user(username) print delete
print "aws_key_key:%s" % key_key #put the user policy plicy_json="""{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": "ses:SendRawEmail", "Resource": "*" } ] }""" policy=iamconn.put_user_policy(username,AmazonSesSendingAccess,plicy_json) print policy time.sleep(10) #delete key delete = iamconn.delete_access_key(key_id,user_name=username) print "success delete key_id" #delete user delete = iamconn.delete_user(username) print delete #for user in data.user: