Las traducciones son generadas a través de traducción automática. En caso de conflicto entre la traducción y la version original de inglés, prevalecerá la version en inglés.
AWSCodeCommitPowerUser
Descripción: proporciona acceso completo a los repositorios de AWS CodeCommit, pero no permite su eliminación.
AWSCodeCommitPowerUser
es una política administrada de AWS.
Uso de la política
Puede asociar AWSCodeCommitPowerUser
a los usuarios, grupos y roles.
Información de la política
-
Tipo: política administrada por AWS
-
Hora de creación: 9 de julio de 2015 a las 17:06 UTC
-
Hora de edición: 17 de julio de 2023 a las 21:49 UTC
-
ARN:
arn:aws:iam::aws:policy/AWSCodeCommitPowerUser
Versión de la política
Versión de la política: v15 (predeterminada)
La versión predeterminada de la política define qué permisos tendrá. Cuando un usuario o un rol con la política solicita acceso a un recurso de AWS, AWS comprueba la versión predeterminada de la política para decidir si permite o no la solicitud.
Documento de política JSON
{ "Version" : "2012-10-17", "Statement" : [ { "Effect" : "Allow", "Action" : [ "codecommit:AssociateApprovalRuleTemplateWithRepository", "codecommit:BatchAssociateApprovalRuleTemplateWithRepositories", "codecommit:BatchDisassociateApprovalRuleTemplateFromRepositories", "codecommit:BatchGet*", "codecommit:BatchDescribe*", "codecommit:Create*", "codecommit:DeleteBranch", "codecommit:DeleteFile", "codecommit:Describe*", "codecommit:DisassociateApprovalRuleTemplateFromRepository", "codecommit:EvaluatePullRequestApprovalRules", "codecommit:Get*", "codecommit:List*", "codecommit:Merge*", "codecommit:OverridePullRequestApprovalRules", "codecommit:Put*", "codecommit:Post*", "codecommit:TagResource", "codecommit:Test*", "codecommit:UntagResource", "codecommit:Update*", "codecommit:GitPull", "codecommit:GitPush" ], "Resource" : "*" }, { "Sid" : "CloudWatchEventsCodeCommitRulesAccess", "Effect" : "Allow", "Action" : [ "events:DeleteRule", "events:DescribeRule", "events:DisableRule", "events:EnableRule", "events:PutRule", "events:PutTargets", "events:RemoveTargets", "events:ListTargetsByRule" ], "Resource" : "arn:aws:events:*:*:rule/codecommit*" }, { "Sid" : "SNSTopicAndSubscriptionAccess", "Effect" : "Allow", "Action" : [ "sns:Subscribe", "sns:Unsubscribe" ], "Resource" : "arn:aws:sns:*:*:codecommit*" }, { "Sid" : "SNSTopicAndSubscriptionReadAccess", "Effect" : "Allow", "Action" : [ "sns:ListTopics", "sns:ListSubscriptionsByTopic", "sns:GetTopicAttributes" ], "Resource" : "*" }, { "Sid" : "LambdaReadOnlyListAccess", "Effect" : "Allow", "Action" : [ "lambda:ListFunctions" ], "Resource" : "*" }, { "Sid" : "IAMReadOnlyListAccess", "Effect" : "Allow", "Action" : [ "iam:ListUsers" ], "Resource" : "*" }, { "Sid" : "IAMReadOnlyConsoleAccess", "Effect" : "Allow", "Action" : [ "iam:ListAccessKeys", "iam:ListSSHPublicKeys", "iam:ListServiceSpecificCredentials" ], "Resource" : "arn:aws:iam::*:user/${aws:username}" }, { "Sid" : "IAMUserSSHKeys", "Effect" : "Allow", "Action" : [ "iam:DeleteSSHPublicKey", "iam:GetSSHPublicKey", "iam:ListSSHPublicKeys", "iam:UpdateSSHPublicKey", "iam:UploadSSHPublicKey" ], "Resource" : "arn:aws:iam::*:user/${aws:username}" }, { "Sid" : "IAMSelfManageServiceSpecificCredentials", "Effect" : "Allow", "Action" : [ "iam:CreateServiceSpecificCredential", "iam:UpdateServiceSpecificCredential", "iam:DeleteServiceSpecificCredential", "iam:ResetServiceSpecificCredential" ], "Resource" : "arn:aws:iam::*:user/${aws:username}" }, { "Sid" : "CodeStarNotificationsReadWriteAccess", "Effect" : "Allow", "Action" : [ "codestar-notifications:CreateNotificationRule", "codestar-notifications:DescribeNotificationRule", "codestar-notifications:UpdateNotificationRule", "codestar-notifications:Subscribe", "codestar-notifications:Unsubscribe" ], "Resource" : "*", "Condition" : { "StringLike" : { "codestar-notifications:NotificationsForResource" : "arn:aws:codecommit:*" } } }, { "Sid" : "CodeStarNotificationsListAccess", "Effect" : "Allow", "Action" : [ "codestar-notifications:ListNotificationRules", "codestar-notifications:ListTargets", "codestar-notifications:ListTagsforResource", "codestar-notifications:ListEventTypes" ], "Resource" : "*" }, { "Sid" : "AmazonCodeGuruReviewerFullAccess", "Effect" : "Allow", "Action" : [ "codeguru-reviewer:AssociateRepository", "codeguru-reviewer:DescribeRepositoryAssociation", "codeguru-reviewer:ListRepositoryAssociations", "codeguru-reviewer:DisassociateRepository", "codeguru-reviewer:DescribeCodeReview", "codeguru-reviewer:ListCodeReviews" ], "Resource" : "*" }, { "Sid" : "AmazonCodeGuruReviewerSLRCreation", "Action" : "iam:CreateServiceLinkedRole", "Effect" : "Allow", "Resource" : "arn:aws:iam::*:role/aws-service-role/codeguru-reviewer.amazonaws.com/AWSServiceRoleForAmazonCodeGuruReviewer", "Condition" : { "StringLike" : { "iam:AWSServiceName" : "codeguru-reviewer.amazonaws.com" } } }, { "Sid" : "CloudWatchEventsManagedRules", "Effect" : "Allow", "Action" : [ "events:PutRule", "events:PutTargets", "events:DeleteRule", "events:RemoveTargets" ], "Resource" : "*", "Condition" : { "StringEquals" : { "events:ManagedBy" : "codeguru-reviewer.amazonaws.com" } } }, { "Sid" : "CodeStarNotificationsChatbotAccess", "Effect" : "Allow", "Action" : [ "chatbot:DescribeSlackChannelConfigurations", "chatbot:ListMicrosoftTeamsChannelConfigurations" ], "Resource" : "*" }, { "Sid" : "CodeStarConnectionsReadOnlyAccess", "Effect" : "Allow", "Action" : [ "codestar-connections:ListConnections", "codestar-connections:GetConnection" ], "Resource" : "arn:aws:codestar-connections:*:*:connection/*" } ] }