Terjemahan disediakan oleh mesin penerjemah. Jika konten terjemahan yang diberikan bertentangan dengan versi bahasa Inggris aslinya, utamakan versi bahasa Inggris.
AWS SAM referensi konektor
Bagian ini berisi informasi referensi untuk tipe sumber daya konektor AWS Serverless Application Model (AWS SAM). Untuk pengenalan konektor, lihatMengelola izin sumber daya dengan konektor AWS SAM.
Jenis sumber daya dan tujuan yang didukung untuk konektor
Jenis AWS::Serverless::Connector sumber daya mendukung sejumlah koneksi yang dipilih antara sumber dan sumber daya tujuan. Saat mengonfigurasi konektor di AWS SAM templat Anda, gunakan tabel berikut untuk mereferensikan koneksi yang didukung dan properti yang perlu ditentukan untuk setiap jenis sumber daya sumber dan tujuan. Untuk informasi selengkapnya tentang mengonfigurasi konektor di templat Anda, lihatAWS::Serverless::Connector.
Untuk sumber daya sumber dan tujuan, ketika didefinisikan dalam template yang sama, gunakan Id properti. Secara opsional, a Qualifier dapat ditambahkan untuk mempersempit ruang lingkup sumber daya yang Anda tentukan. Ketika sumber daya tidak berada dalam template yang sama, gunakan kombinasi properti yang didukung.
Untuk meminta koneksi baru, kirimkan masalah baru
| Jenis sumber | Jenis tujuan | Izin | Properti sumber | Properti tujuan |
|---|---|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kebijakan IAM yang dibuat oleh konektor
Bagian ini mendokumentasikan kebijakan AWS Identity and Access Management (IAM) yang dibuat oleh AWS SAM saat menggunakan konektor.
AWS::DynamoDB::TableuntukAWS::Lambda::Function-
Jenis kebijakan
Kebijakan yang dikelola pelanggan melekat pada
AWS::Lambda::Functionperan tersebut.Kategori akses
Read{ "Statement": [ { "Effect": "Allow", "Action": [ "dynamodb:DescribeStream", "dynamodb:GetRecords", "dynamodb:GetShardIterator", "dynamodb:ListStreams" ], "Resource": [ "%{Source.Arn}/stream/*" ] } ] } AWS::Events::RuleuntukAWS::SNS::Topic-
Jenis kebijakan
AWS::SNS::TopicPolicymelekat padaAWS::SNS::Topic.Kategori akses
Write{ "Statement": [ { "Effect": "Allow", "Principal": { "Service": "events.amazonaws.com" }, "Resource": "%{Destination.Arn}", "Action": "sns:Publish", "Condition": { "ArnEquals": { "aws:SourceArn": "%{Source.Arn}" } } } ] } AWS::Events::RuleuntukAWS::Events::EventBus-
Jenis kebijakan
Kebijakan yang dikelola pelanggan melekat pada
AWS::Events::Ruleperan tersebut.Kategori akses
Write{ "Statement": [ { "Effect": "Allow", "Action": [ "events:PutEvents" ], "Resource": [ "%{Destination.Arn}" ] } ] } AWS::Events::RuleuntukAWS::StepFunctions::StateMachine-
Jenis kebijakan
Kebijakan yang dikelola pelanggan melekat pada
AWS::Events::Ruleperan tersebut.Kategori akses
Write{ "Statement": [ { "Effect": "Allow", "Action": [ "states:StartExecution" ], "Resource": [ "%{Destination.Arn}" ] } ] } AWS::Events::RuleuntukAWS::Lambda::Function-
Jenis kebijakan
AWS::Lambda::Permissionmelekat padaAWS::Lambda::Function.Kategori akses
Write{ "Action": "lambda:InvokeFunction", "Principal": "events.amazonaws.com", "SourceArn": "%{Source.Arn}" } AWS::Events::RuleuntukAWS::SQS::Queue-
Jenis kebijakan
AWS::SQS::QueuePolicymelekat padaAWS::SQS::Queue.Kategori akses
Write{ "Statement": [ { "Effect": "Allow", "Principal": { "Service": "events.amazonaws.com" }, "Resource": "%{Destination.Arn}", "Action": "sqs:SendMessage", "Condition": { "ArnEquals": { "aws:SourceArn": "%{Source.Arn}" } } } ] } AWS::Lambda::FunctionuntukAWS::Lambda::Function-
Jenis kebijakan
Kebijakan yang dikelola pelanggan melekat pada
AWS::Lambda::Functionperan tersebut.Kategori akses
Write{ "Statement": [ { "Effect": "Allow", "Action": [ "lambda:InvokeAsync", "lambda:InvokeFunction" ], "Resource": [ "%{Destination.Arn}" ] } ] } AWS::Lambda::FunctionuntukAWS::S3::Bucket-
Jenis kebijakan
Kebijakan yang dikelola pelanggan melekat pada
AWS::Lambda::Functionperan tersebut.Kategori akses
Read{ "Statement": [ { "Effect": "Allow", "Action": [ "s3:GetObject", "s3:GetObjectAcl", "s3:GetObjectLegalHold", "s3:GetObjectRetention", "s3:GetObjectTorrent", "s3:GetObjectVersion", "s3:GetObjectVersionAcl", "s3:GetObjectVersionForReplication", "s3:GetObjectVersionTorrent", "s3:ListBucket", "s3:ListBucketMultipartUploads", "s3:ListBucketVersions", "s3:ListMultipartUploadParts" ], "Resource": [ "%{Destination.Arn}", "%{Destination.Arn}/*" ] } ] }Write{ "Statement": [ { "Effect": "Allow", "Action": [ "s3:AbortMultipartUpload", "s3:DeleteObject", "s3:DeleteObjectVersion", "s3:PutObject", "s3:PutObjectLegalHold", "s3:PutObjectRetention", "s3:RestoreObject" ], "Resource": [ "%{Destination.Arn}", "%{Destination.Arn}/*" ] } ] } AWS::Lambda::FunctionuntukAWS::DynamoDB::Table-
Jenis kebijakan
Kebijakan yang dikelola pelanggan melekat pada
AWS::Lambda::Functionperan tersebut.Kategori akses
Read{ "Statement": [ { "Effect": "Allow", "Action": [ "dynamodb:GetItem", "dynamodb:Query", "dynamodb:Scan", "dynamodb:BatchGetItem", "dynamodb:ConditionCheckItem", "dynamodb:PartiQLSelect" ], "Resource": [ "%{Destination.Arn}", "%{Destination.Arn}/index/*" ] } ] }Write{ "Statement": [ { "Effect": "Allow", "Action": [ "dynamodb:PutItem", "dynamodb:UpdateItem", "dynamodb:DeleteItem", "dynamodb:BatchWriteItem", "dynamodb:PartiQLDelete", "dynamodb:PartiQLInsert", "dynamodb:PartiQLUpdate" ], "Resource": [ "%{Destination.Arn}", "%{Destination.Arn}/index/*" ] } ] } AWS::Lambda::FunctionuntukAWS::SQS::Queue-
Jenis kebijakan
Kebijakan yang dikelola pelanggan melekat pada
AWS::Lambda::Functionperan tersebut.Kategori akses
Read{ "Statement": [ { "Effect": "Allow", "Action": [ "sqs:ReceiveMessage", "sqs:GetQueueAttributes" ], "Resource": [ "%{Destination.Arn}" ] } ] }Write{ "Statement": [ { "Effect": "Allow", "Action": [ "sqs:DeleteMessage", "sqs:SendMessage", "sqs:ChangeMessageVisibility", "sqs:PurgeQueue" ], "Resource": [ "%{Destination.Arn}" ] } ] } AWS::Lambda::FunctionuntukAWS::SNS::Topic-
Jenis kebijakan
Kebijakan yang dikelola pelanggan melekat pada
AWS::Lambda::Functionperan tersebut.Kategori akses
Write{ "Statement": [ { "Effect": "Allow", "Action": [ "sns:Publish" ], "Resource": [ "%{Destination.Arn}" ] } ] } AWS::Lambda::FunctionuntukAWS::StepFunctions::StateMachine-
Jenis kebijakan
Kebijakan yang dikelola pelanggan melekat pada
AWS::Lambda::Functionperan tersebut.Kategori akses
Write{ "Statement": [ { "Effect": "Allow", "Action": [ "states:StartExecution", "states:StartSyncExecution" ], "Resource": [ "%{Destination.Arn}" ] }, { "Effect": "Allow", "Action": [ "states:StopExecution" ], "Resource": [ "arn:${AWS::Partition}:states:${AWS::Region}:${AWS::AccountId}:execution:%{Destination.Name}:*" ] } ] }Read{ "Statement": [ { "Effect": "Allow", "Action": [ "states:DescribeStateMachine", "states:ListExecutions" ], "Resource": [ "%{Destination.Arn}" ] }, { "Effect": "Allow", "Action": [ "states:DescribeExecution", "states:DescribeStateMachineForExecution", "states:GetExecutionHistory" ], "Resource": [ "arn:${AWS::Partition}:states:${AWS::Region}:${AWS::AccountId}:execution:%{Destination.Name}:*" ] } ] } AWS::Lambda::FunctionuntukAWS::Events::EventBus-
Jenis kebijakan
Kebijakan yang dikelola pelanggan melekat pada
AWS::Lambda::Functionperan tersebut.Kategori akses
Write{ "Statement": [ { "Effect": "Allow", "Action": [ "events:PutEvents" ], "Resource": [ "%{Destination.Arn}" ] } ] } AWS::Lambda::FunctionuntukAWS::Location::PlaceIndex-
Jenis kebijakan
Kebijakan yang dikelola pelanggan melekat pada
AWS::Lambda::Functionperan tersebut.Kategori akses
Read{ "Statement": [ { "Effect": "Allow", "Action": [ "geo:DescribePlaceIndex", "geo:GetPlace", "geo:SearchPlaceIndexForPosition", "geo:SearchPlaceIndexForSuggestions", "geo:SearchPlaceIndexForText" ], "Resource": [ "%{Destination.Arn}" ] } ] } AWS::ApiGatewayV2::ApiuntukAWS::Lambda::Function-
Jenis kebijakan
AWS::Lambda::Permissionmelekat padaAWS::Lambda::Function.Kategori akses
Write{ "Action": "lambda:InvokeFunction", "Principal": "apigateway.amazonaws.com", "SourceArn": "arn:${AWS::Partition}:execute-api:${AWS::Region}:${AWS::AccountId}:%{Source.ResourceId}/%{Source.Qualifier}" } AWS::ApiGateway::RestApiuntukAWS::Lambda::Function-
Jenis kebijakan
AWS::Lambda::Permissionmelekat padaAWS::Lambda::Function.Kategori akses
Write{ "Action": "lambda:InvokeFunction", "Principal": "apigateway.amazonaws.com", "SourceArn": "arn:${AWS::Partition}:execute-api:${AWS::Region}:${AWS::AccountId}:%{Source.ResourceId}/%{Source.Qualifier}" } AWS::SNS::TopicuntukAWS::SQS::Queue-
Jenis kebijakan
AWS::SQS::QueuePolicymelekat padaAWS::SQS::Queue.Kategori akses
Write{ "Statement": [ { "Effect": "Allow", "Principal": { "Service": "sns.amazonaws.com" }, "Resource": "%{Destination.Arn}", "Action": "sqs:SendMessage", "Condition": { "ArnEquals": { "aws:SourceArn": "%{Source.Arn}" } } } ] } AWS::SNS::TopicuntukAWS::Lambda::Function-
Jenis kebijakan
AWS::Lambda::Permissionmelekat padaAWS::Lambda::Function.Kategori akses
Write{ "Action": "lambda:InvokeFunction", "Principal": "sns.amazonaws.com", "SourceArn": "%{Source.Arn}" } AWS::SQS::QueueuntukAWS::Lambda::Function-
Jenis kebijakan
Kebijakan yang dikelola pelanggan melekat pada
AWS::Lambda::Functionperan tersebut.Kategori akses
Write{ "Statement": [ { "Effect": "Allow", "Action": [ "sqs:DeleteMessage" ], "Resource": [ "%{Source.Arn}" ] } ] }Read{ "Statement": [ { "Effect": "Allow", "Action": [ "sqs:ReceiveMessage", "sqs:GetQueueAttributes" ], "Resource": [ "%{Source.Arn}" ] } ] } AWS::S3::BucketuntukAWS::Lambda::Function-
Jenis kebijakan
AWS::Lambda::Permissionmelekat padaAWS::Lambda::Function.Kategori akses
Write{ "Action": "lambda:InvokeFunction", "Principal": "s3.amazonaws.com", "SourceArn": "%{Source.Arn}", "SourceAccount": "${AWS::AccountId}" } AWS::StepFunctions::StateMachineuntukAWS::Lambda::Function-
Jenis kebijakan
Kebijakan yang dikelola pelanggan melekat pada
AWS::StepFunctions::StateMachineperan tersebut.Kategori akses
Write{ "Statement": [ { "Effect": "Allow", "Action": [ "lambda:InvokeAsync", "lambda:InvokeFunction" ], "Resource": [ "%{Destination.Arn}" ] } ] } AWS::StepFunctions::StateMachineuntukAWS::SNS::Topic-
Jenis kebijakan
Kebijakan yang dikelola pelanggan melekat pada
AWS::StepFunctions::StateMachineperan tersebut.Kategori akses
Write{ "Statement": [ { "Effect": "Allow", "Action": [ "sns:Publish" ], "Resource": [ "%{Destination.Arn}" ] } ] } AWS::StepFunctions::StateMachineuntukAWS::SQS::Queue-
Jenis kebijakan
Kebijakan yang dikelola pelanggan melekat pada
AWS::StepFunctions::StateMachineperan tersebut.Kategori akses
Write{ "Statement": [ { "Effect": "Allow", "Action": [ "sqs:SendMessage" ], "Resource": [ "%{Destination.Arn}" ] } ] } AWS::StepFunctions::StateMachineuntukAWS::S3::Bucket-
Jenis kebijakan
Kebijakan yang dikelola pelanggan melekat pada
AWS::StepFunctions::StateMachineperan tersebut.Kategori akses
Read{ "Statement": [ { "Effect": "Allow", "Action": [ "s3:GetObject", "s3:GetObjectAcl", "s3:GetObjectLegalHold", "s3:GetObjectRetention", "s3:GetObjectTorrent", "s3:GetObjectVersion", "s3:GetObjectVersionAcl", "s3:GetObjectVersionForReplication", "s3:GetObjectVersionTorrent", "s3:ListBucket", "s3:ListBucketMultipartUploads", "s3:ListBucketVersions", "s3:ListMultipartUploadParts" ], "Resource": [ "%{Destination.Arn}", "%{Destination.Arn}/*" ] } ] }Write{ "Statement": [ { "Effect": "Allow", "Action": [ "s3:AbortMultipartUpload", "s3:DeleteObject", "s3:DeleteObjectVersion", "s3:PutObject", "s3:PutObjectLegalHold", "s3:PutObjectRetention", "s3:RestoreObject" ], "Resource": [ "%{Destination.Arn}", "%{Destination.Arn}/*" ] } ] } AWS::StepFunctions::StateMachineuntukAWS::DynamoDB::Table-
Jenis kebijakan
Kebijakan yang dikelola pelanggan melekat pada
AWS::StepFunctions::StateMachineperan tersebut.Kategori akses
Read{ "Statement": [ { "Effect": "Allow", "Action": [ "dynamodb:GetItem", "dynamodb:Query", "dynamodb:Scan", "dynamodb:BatchGetItem", "dynamodb:ConditionCheckItem", "dynamodb:PartiQLSelect" ], "Resource": [ "%{Destination.Arn}", "%{Destination.Arn}/index/*" ] } ] }Write{ "Statement": [ { "Effect": "Allow", "Action": [ "dynamodb:PutItem", "dynamodb:UpdateItem", "dynamodb:DeleteItem", "dynamodb:BatchWriteItem", "dynamodb:PartiQLDelete", "dynamodb:PartiQLInsert", "dynamodb:PartiQLUpdate" ], "Resource": [ "%{Destination.Arn}", "%{Destination.Arn}/index/*" ] } ] } AWS::StepFunctions::StateMachineuntukAWS::StepFunctions::StateMachine-
Jenis kebijakan
Kebijakan yang dikelola pelanggan melekat pada
AWS::StepFunctions::StateMachineperan tersebut.Kategori akses
Read{ "Statement": [ { "Effect": "Allow", "Action": [ "states:DescribeExecution" ], "Resource": [ "arn:${AWS::Partition}:states:${AWS::Region}:${AWS::AccountId}:execution:%{Destination.Name}:*" ] }, { "Effect": "Allow", "Action": [ "events:DescribeRule" ], "Resource": [ "arn:${AWS::Partition}:events:${AWS::Region}:${AWS::AccountId}:rule/StepFunctionsGetEventsForStepFunctionsExecutionRule" ] } ] }Write{ "Statement": [ { "Effect": "Allow", "Action": [ "states:StartExecution" ], "Resource": [ "%{Destination.Arn}" ] }, { "Effect": "Allow", "Action": [ "states:StopExecution" ], "Resource": [ "arn:${AWS::Partition}:states:${AWS::Region}:${AWS::AccountId}:execution:%{Destination.Name}:*" ] }, { "Effect": "Allow", "Action": [ "events:PutTargets", "events:PutRule" ], "Resource": [ "arn:${AWS::Partition}:events:${AWS::Region}:${AWS::AccountId}:rule/StepFunctionsGetEventsForStepFunctionsExecutionRule" ] } ] } AWS::StepFunctions::StateMachineuntukAWS::Events::EventBus-
Jenis kebijakan
Kebijakan yang dikelola pelanggan melekat pada
AWS::StepFunctions::StateMachineperan tersebut.Kategori akses
Write{ "Statement": [ { "Effect": "Allow", "Action": [ "events:PutEvents" ], "Resource": [ "%{Destination.Arn}" ] } ] } AWS::AppSync::DataSourceuntukAWS::DynamoDB::Table-
Jenis kebijakan
Kebijakan yang dikelola pelanggan melekat pada
AWS::AppSync::DataSourceperan tersebut.Kategori akses
Read{ "Statement": [ { "Effect": "Allow", "Action": [ "dynamodb:GetItem", "dynamodb:Query", "dynamodb:Scan", "dynamodb:BatchGetItem", "dynamodb:ConditionCheckItem", "dynamodb:PartiQLSelect" ], "Resource": [ "%{Destination.Arn}", "%{Destination.Arn}/index/*" ] } ] }Write{ "Statement": [ { "Effect": "Allow", "Action": [ "dynamodb:PutItem", "dynamodb:UpdateItem", "dynamodb:DeleteItem", "dynamodb:BatchWriteItem", "dynamodb:PartiQLDelete", "dynamodb:PartiQLInsert", "dynamodb:PartiQLUpdate" ], "Resource": [ "%{Destination.Arn}", "%{Destination.Arn}/index/*" ] } ] } AWS::AppSync::DataSourceuntukAWS::Lambda::Function-
Jenis kebijakan
Kebijakan yang dikelola pelanggan melekat pada
AWS::AppSync::DataSourceperan tersebut.Kategori akses
Write{ "Statement": [ { "Effect": "Allow", "Action": [ "lambda:InvokeAsync", "lambda:InvokeFunction" ], "Resource": [ "%{Destination.Arn}", "%{Destination.Arn}:*" ] } ] } AWS::AppSync::DataSourceuntukAWS::Events::EventBus-
Jenis kebijakan
Kebijakan yang dikelola pelanggan melekat pada
AWS::AppSync::DataSourceperan tersebut.Kategori akses
Write{ "Statement": [ { "Effect": "Allow", "Action": [ "events:PutEvents" ], "Resource": [ "%{Destination.Arn}" ] } ] } AWS::AppSync::GraphQLApiuntukAWS::Lambda::Function-
Jenis kebijakan
AWS::Lambda::Permissionmelekat padaAWS::Lambda::Function.Kategori akses
Write{ "Action": "lambda:InvokeFunction", "Principal": "appsync.amazonaws.com", "SourceArn": "arn:${AWS::Partition}:appsync:${AWS::Region}:${AWS::AccountId}:apis/%{Source.ResourceId}" }