Marketplace

infra-permission-manager

Manage IAM permissions - grant missing permissions when deployments fail, maintain IAM audit trail, enforce profile separation, scope permissions to environment. Uses discover-deploy profile to grant permissions, never grants to production without explicit approval.

model: claude-haiku-4-5

$ 安裝

git clone https://github.com/fractary/claude-plugins /tmp/claude-plugins && cp -r /tmp/claude-plugins/plugins/faber-cloud/skills/infra-permission-manager ~/.claude/skills/claude-plugins

// tip: Run this command in your terminal to install the skill


name: infra-permission-manager model: claude-haiku-4-5 description: | Manage IAM permissions - grant missing permissions when deployments fail, maintain IAM audit trail, enforce profile separation, scope permissions to environment. Uses discover-deploy profile to grant permissions, never grants to production without explicit approval. tools: Bash, Read, Write

Infrastructure Permission Manager Skill

<CRITICAL_RULES>

  1. ONLY manage deploy user permissions (infrastructure operations)
  2. NEVER manage resource permissions (runtime operations)
  3. ALL permission changes MUST be recorded in audit trail
  4. Production permissions require additional approval
  5. Always use appropriate AWS profile for environment

IMPORTANT: Profile Separation

  • ONLY use discover-deploy profile (or aws_audit_profile) for IAM operations
  • NEVER grant IAM permissions using test-deploy or prod-deploy profiles
  • Validate profile before ANY AWS IAM operation
  • This is enforced at multiple levels for safety

IMPORTANT: Permission Scoping

  • Scope all permissions to specific environment from the start
  • Use resource ARN patterns with environment: arn:aws::::{project}-{subsystem}-{environment}-
  • NEVER grant account-wide permissions
  • Follow principle of least privilege

IMPORTANT: Audit Trail

  • Log EVERY permission grant in IAM audit file
  • Include: timestamp, profile, permission, resource scope, reason
  • Audit trail must be complete and accurate for compliance </CRITICAL_RULES>

<PERMISSION_TYPES> ✅ DEPLOY USER PERMISSIONS (OK to add)

  • Infrastructure operations performed during deployment
  • Examples:
    • Terraform state access (S3, DynamoDB)
    • Resource creation/updates (Lambda, API Gateway, S3 buckets)
    • IAM role creation/attachment
    • CloudWatch log group creation
    • VPC and networking setup

❌ RESOURCE PERMISSIONS (REJECT - use Terraform)

  • Runtime operations performed by deployed applications
  • Examples:
    • Lambda function reading from S3 bucket (use Terraform IAM role)
    • API Gateway invoking Lambda (use Terraform resource policy)
    • Application logging to CloudWatch (use Terraform IAM role)
    • Cross-service access (use Terraform IAM policies)

VALIDATION RULE: If user requests permission for runtime/application behavior → REJECT → Explain: "This is a resource permission. Please define it in Terraform as an IAM role/policy attached to the resource." </PERMISSION_TYPES>

EXECUTE STEPS:

  1. Load configuration for environment
  2. Switch to discover-deploy profile
  3. Validate profile separation (must be discover-deploy)
  4. Determine target profile (test-deploy or prod-deploy)
  5. Create scoped IAM policy statement
  6. Attach permission to target profile's IAM user/role
  7. Log grant in IAM audit trail
  8. Verify permission granted
  9. Return success

OUTPUT COMPLETION MESSAGE:

✅ COMPLETED: IAM Permission Manager
Environment: {env}
Permission Granted: {permission}
Target Profile: {target_profile}
Scope: {resource_pattern}
Audit file: infrastructure/iam-policies/{env}-deploy-permissions.json
Audit trail entry added: {timestamp}
───────────────────────────────────────
Next: Return to infra-debugger (or parent skill)

<AUDIT_WORKFLOW>

  1. Receive permission request

  2. Validate: Deploy user permission or resource permission?

    • If resource permission → REJECT with explanation
    • If deploy user permission → Continue
  3. Determine environment from context

  4. Load audit file: infrastructure/iam-policies/{env}-deploy-permissions.json

  5. Add requested permissions to audit file

  6. Record in audit_trail with timestamp and reason

  7. Apply to AWS using apply-to-aws.sh script

  8. Verify application successful

  9. Return success status </AUDIT_WORKFLOW>

update-audit.sh

  • Updates audit file with new permissions
  • Records audit trail entry

sync-from-aws.sh

  • Fetches current AWS IAM policy
  • Shows differences from audit file
  • Options to update audit file

apply-to-aws.sh

  • Applies audit file permissions to AWS
  • Uses {env}-deploy-discover profile

diff-audit-aws.sh

  • Compares audit file vs actual AWS state
  • Shows differences in readable format

<COMPLETION_CRITERIA> ✅ Profile separation validated (using discover-deploy) ✅ Permission granted with environment scoping ✅ IAM audit trail updated ✅ Permission verified as active </COMPLETION_CRITERIA>

<PERMISSION_SCOPING> Environment-scoped resource patterns:

Test Environment:

arn:aws:s3:::{project}-{subsystem}-test-*
arn:aws:lambda:{region}:{account}:function:{project}-{subsystem}-test-*
arn:aws:dynamodb:{region}:{account}:table/{project}-{subsystem}-test-*

Production Environment:

arn:aws:s3:::{project}-{subsystem}-prod-*
arn:aws:lambda:{region}:{account}:function:{project}-{subsystem}-prod-*
arn:aws:dynamodb:{region}:{account}:table/{project}-{subsystem}-prod-*

IAM Policy Statement:

{
  "Effect": "Allow",
  "Action": [
    "s3:PutObject",
    "s3:GetObject"
  ],
  "Resource": "arn:aws:s3:::myproject-core-test-*/*"
}

</PERMISSION_SCOPING>

<AUDIT_TRAIL> IAM Audit Log: .fractary/plugins/faber-cloud/deployments/iam-audit.json

{
  "audit_version": "1.0",
  "project": "myproject-core",
  "entries": [
    {
      "id": "2025-10-28-001",
      "timestamp": "2025-10-28T12:00:00Z",
      "action": "grant_permission",
      "permission": "s3:PutObject",
      "target_profile": "myproject-core-test-deploy",
      "resource_scope": "arn:aws:s3:::myproject-core-test-*/*",
      "environment": "test",
      "reason": "Deployment failed with AccessDenied",
      "granted_by_profile": "myproject-core-discover-deploy",
      "aws_account": "123456789012"
    }
  ]
}

</AUDIT_TRAIL>

<PERMISSION_DISCOVERY> When deployment fails with permission error:

  1. Extract Permission from Error:

    Error: AccessDenied: User is not authorized to perform: s3:PutObject
    → Required permission: s3:PutObject
    → Resource: arn:aws:s3:::myproject-core-test-uploads/*
    
  2. Determine Resource Pattern:

    Resource from error + environment scoping:
    arn:aws:s3:::myproject-core-test-uploads/*
    → Scope to environment:
    arn:aws:s3:::myproject-core-test-*/*
    
  3. Grant Permission:

    aws iam put-user-policy \
      --user-name myproject-core-test-deploy \
      --policy-name myproject-core-test-deploy-s3 \
      --policy-document '{
        "Version": "2012-10-17",
        "Statement": [{
          "Effect": "Allow",
          "Action": ["s3:PutObject"],
          "Resource": "arn:aws:s3:::myproject-core-test-*/*"
        }]
      }' \
      --profile myproject-core-discover-deploy
    

</PERMISSION_DISCOVERY>

<ERROR_HANDLING> If permission request is for resource (not deploy user):

  1. Identify the resource type (Lambda, API Gateway, etc.)
  2. Explain the distinction between deploy and resource permissions
  3. Provide Terraform example code
  4. REJECT the request

Example: Lambda function reading S3 bucket

# CORRECT: Define resource permission in Terraform as IAM role
resource "aws_iam_role" "lambda_role" {
  name = "my-function-role"
  assume_role_policy = jsonencode({
    Version = "2012-10-17"
    Statement = [{
      Action = "sts:AssumeRole"
      Effect = "Allow"
      Principal = {
        Service = "lambda.amazonaws.com"
      }
    }]
  })
}

resource "aws_iam_role_policy" "lambda_s3_access" {
  role = aws_iam_role.lambda_role.id
  policy = jsonencode({
    Version = "2012-10-17"
    Statement = [{
      Effect = "Allow"
      Action = ["s3:GetObject", "s3:PutObject"]
      Resource = "arn:aws:s3:::my-bucket/*"
    }]
  })
}

resource "aws_lambda_function" "my_function" {
  function_name = "my-function"
  role = aws_iam_role.lambda_role.arn
  # ...
}

Example: API Gateway invoking Lambda

# CORRECT: Define resource permission in Terraform as resource policy
resource "aws_lambda_permission" "apigw_lambda" {
  statement_id  = "AllowAPIGatewayInvoke"
  action        = "lambda:InvokeFunction"
  function_name = aws_lambda_function.my_function.function_name
  principal     = "apigateway.amazonaws.com"
  source_arn    = "${aws_api_gateway_rest_api.api.execution_arn}/*/*"
}

Response to user: "This is a resource permission (runtime behavior), not a deploy permission. Please define it in Terraform using the pattern above. Resource permissions should be managed as IAM roles/policies attached to resources, not as deploy user permissions." </ERROR_HANDLING>

Repository

fractary
fractary
Author
fractary/claude-plugins/plugins/faber-cloud/skills/infra-permission-manager
1
Stars
0
Forks
Updated4d ago
Added1w ago