AWSCodeCommitPowerUser - AWS Managed Policy

AWSCodeCommitPowerUser

AWSCodeCommitPowerUser is an AWS managed policy that: Provides full access to AWS CodeCommit repositories, but does not allow repository deletion.

Using this policy

You can attach AWSCodeCommitPowerUser to your users, groups, and roles.

Policy details

  • Type: AWS managed policy

  • Creation time: July 09, 2015, 17:06 UTC

  • Edited time: July 17, 2023, 21:49 UTC

  • ARN: arn:aws:iam::aws:policy/AWSCodeCommitPowerUser

Policy version

Policy version: v15 (default)

The policy's default version is the version that defines the permissions for the policy. When a user or role with the policy makes a request to access an AWS resource, AWS checks the default version of the policy to determine whether to allow the request.

JSON policy document

{ "Version" : "2012-10-17", "Statement" : [ { "Effect" : "Allow", "Action" : [ "codecommit:AssociateApprovalRuleTemplateWithRepository", "codecommit:BatchAssociateApprovalRuleTemplateWithRepositories", "codecommit:BatchDisassociateApprovalRuleTemplateFromRepositories", "codecommit:BatchGet*", "codecommit:BatchDescribe*", "codecommit:Create*", "codecommit:DeleteBranch", "codecommit:DeleteFile", "codecommit:Describe*", "codecommit:DisassociateApprovalRuleTemplateFromRepository", "codecommit:EvaluatePullRequestApprovalRules", "codecommit:Get*", "codecommit:List*", "codecommit:Merge*", "codecommit:OverridePullRequestApprovalRules", "codecommit:Put*", "codecommit:Post*", "codecommit:TagResource", "codecommit:Test*", "codecommit:UntagResource", "codecommit:Update*", "codecommit:GitPull", "codecommit:GitPush" ], "Resource" : "*" }, { "Sid" : "CloudWatchEventsCodeCommitRulesAccess", "Effect" : "Allow", "Action" : [ "events:DeleteRule", "events:DescribeRule", "events:DisableRule", "events:EnableRule", "events:PutRule", "events:PutTargets", "events:RemoveTargets", "events:ListTargetsByRule" ], "Resource" : "arn:aws:events:*:*:rule/codecommit*" }, { "Sid" : "SNSTopicAndSubscriptionAccess", "Effect" : "Allow", "Action" : [ "sns:Subscribe", "sns:Unsubscribe" ], "Resource" : "arn:aws:sns:*:*:codecommit*" }, { "Sid" : "SNSTopicAndSubscriptionReadAccess", "Effect" : "Allow", "Action" : [ "sns:ListTopics", "sns:ListSubscriptionsByTopic", "sns:GetTopicAttributes" ], "Resource" : "*" }, { "Sid" : "LambdaReadOnlyListAccess", "Effect" : "Allow", "Action" : [ "lambda:ListFunctions" ], "Resource" : "*" }, { "Sid" : "IAMReadOnlyListAccess", "Effect" : "Allow", "Action" : [ "iam:ListUsers" ], "Resource" : "*" }, { "Sid" : "IAMReadOnlyConsoleAccess", "Effect" : "Allow", "Action" : [ "iam:ListAccessKeys", "iam:ListSSHPublicKeys", "iam:ListServiceSpecificCredentials" ], "Resource" : "arn:aws:iam::*:user/${aws:username}" }, { "Sid" : "IAMUserSSHKeys", "Effect" : "Allow", "Action" : [ "iam:DeleteSSHPublicKey", "iam:GetSSHPublicKey", "iam:ListSSHPublicKeys", "iam:UpdateSSHPublicKey", "iam:UploadSSHPublicKey" ], "Resource" : "arn:aws:iam::*:user/${aws:username}" }, { "Sid" : "IAMSelfManageServiceSpecificCredentials", "Effect" : "Allow", "Action" : [ "iam:CreateServiceSpecificCredential", "iam:UpdateServiceSpecificCredential", "iam:DeleteServiceSpecificCredential", "iam:ResetServiceSpecificCredential" ], "Resource" : "arn:aws:iam::*:user/${aws:username}" }, { "Sid" : "CodeStarNotificationsReadWriteAccess", "Effect" : "Allow", "Action" : [ "codestar-notifications:CreateNotificationRule", "codestar-notifications:DescribeNotificationRule", "codestar-notifications:UpdateNotificationRule", "codestar-notifications:Subscribe", "codestar-notifications:Unsubscribe" ], "Resource" : "*", "Condition" : { "StringLike" : { "codestar-notifications:NotificationsForResource" : "arn:aws:codecommit:*" } } }, { "Sid" : "CodeStarNotificationsListAccess", "Effect" : "Allow", "Action" : [ "codestar-notifications:ListNotificationRules", "codestar-notifications:ListTargets", "codestar-notifications:ListTagsforResource", "codestar-notifications:ListEventTypes" ], "Resource" : "*" }, { "Sid" : "AmazonCodeGuruReviewerFullAccess", "Effect" : "Allow", "Action" : [ "codeguru-reviewer:AssociateRepository", "codeguru-reviewer:DescribeRepositoryAssociation", "codeguru-reviewer:ListRepositoryAssociations", "codeguru-reviewer:DisassociateRepository", "codeguru-reviewer:DescribeCodeReview", "codeguru-reviewer:ListCodeReviews" ], "Resource" : "*" }, { "Sid" : "AmazonCodeGuruReviewerSLRCreation", "Action" : "iam:CreateServiceLinkedRole", "Effect" : "Allow", "Resource" : "arn:aws:iam::*:role/aws-service-role/codeguru-reviewer.amazonaws.com/AWSServiceRoleForAmazonCodeGuruReviewer", "Condition" : { "StringLike" : { "iam:AWSServiceName" : "codeguru-reviewer.amazonaws.com" } } }, { "Sid" : "CloudWatchEventsManagedRules", "Effect" : "Allow", "Action" : [ "events:PutRule", "events:PutTargets", "events:DeleteRule", "events:RemoveTargets" ], "Resource" : "*", "Condition" : { "StringEquals" : { "events:ManagedBy" : "codeguru-reviewer.amazonaws.com" } } }, { "Sid" : "CodeStarNotificationsChatbotAccess", "Effect" : "Allow", "Action" : [ "chatbot:DescribeSlackChannelConfigurations", "chatbot:ListMicrosoftTeamsChannelConfigurations" ], "Resource" : "*" }, { "Sid" : "CodeStarConnectionsReadOnlyAccess", "Effect" : "Allow", "Action" : [ "codestar-connections:ListConnections", "codestar-connections:GetConnection" ], "Resource" : "arn:aws:codestar-connections:*:*:connection/*" } ] }

Learn more