Las traducciones son generadas a través de traducción automática. En caso de conflicto entre la traducción y la version original de inglés, prevalecerá la version en inglés.
AWSCodeCommitPowerUser
Descripción: Proporciona acceso completo a AWS CodeCommit los repositorios, pero no permite eliminarlos.
AWSCodeCommitPowerUser
es una política administrada de AWS.
Uso de la política
Puede asociar AWSCodeCommitPowerUser
a los usuarios, grupos y roles.
Información de la política
-
Tipo: política AWS gestionada
-
Hora de creación: 9 de julio de 2015 a las 17:06 UTC
-
Hora editada: 10 de enero de 2025 a las 20:07 UTC
-
ARN:
arn:aws:iam::aws:policy/AWSCodeCommitPowerUser
Versión de la política
Versión de la política: v16 (predeterminado)
La versión predeterminada de la política define qué permisos tendrá. Cuando un usuario o un rol con la política solicita el acceso a un AWS recurso, AWS comprueba la versión predeterminada de la política para determinar si permite la solicitud.
Documento de política JSON
{
"Version" : "2012-10-17",
"Statement" : [
{
"Effect" : "Allow",
"Action" : [
"codecommit:AssociateApprovalRuleTemplateWithRepository",
"codecommit:BatchAssociateApprovalRuleTemplateWithRepositories",
"codecommit:BatchDisassociateApprovalRuleTemplateFromRepositories",
"codecommit:BatchGet*",
"codecommit:BatchDescribe*",
"codecommit:Create*",
"codecommit:DeleteBranch",
"codecommit:DeleteFile",
"codecommit:Describe*",
"codecommit:DisassociateApprovalRuleTemplateFromRepository",
"codecommit:EvaluatePullRequestApprovalRules",
"codecommit:Get*",
"codecommit:List*",
"codecommit:Merge*",
"codecommit:OverridePullRequestApprovalRules",
"codecommit:Put*",
"codecommit:Post*",
"codecommit:TagResource",
"codecommit:Test*",
"codecommit:UntagResource",
"codecommit:Update*",
"codecommit:GitPull",
"codecommit:GitPush"
],
"Resource" : "*"
},
{
"Sid" : "CloudWatchEventsCodeCommitRulesAccess",
"Effect" : "Allow",
"Action" : [
"events:DeleteRule",
"events:DescribeRule",
"events:DisableRule",
"events:EnableRule",
"events:PutRule",
"events:PutTargets",
"events:RemoveTargets",
"events:ListTargetsByRule"
],
"Resource" : "arn:aws:events:*:*:rule/codecommit*"
},
{
"Sid" : "SNSTopicAndSubscriptionAccess",
"Effect" : "Allow",
"Action" : [
"sns:Subscribe",
"sns:Unsubscribe"
],
"Resource" : "arn:aws:sns:*:*:codecommit*"
},
{
"Sid" : "SNSTopicAndSubscriptionReadAccess",
"Effect" : "Allow",
"Action" : [
"sns:ListTopics",
"sns:ListSubscriptionsByTopic",
"sns:GetTopicAttributes"
],
"Resource" : "*"
},
{
"Sid" : "LambdaReadOnlyListAccess",
"Effect" : "Allow",
"Action" : [
"lambda:ListFunctions"
],
"Resource" : "*"
},
{
"Sid" : "IAMReadOnlyListAccess",
"Effect" : "Allow",
"Action" : [
"iam:ListUsers"
],
"Resource" : "*"
},
{
"Sid" : "IAMReadOnlyConsoleAccess",
"Effect" : "Allow",
"Action" : [
"iam:ListAccessKeys",
"iam:ListSSHPublicKeys",
"iam:ListServiceSpecificCredentials"
],
"Resource" : "arn:aws:iam::*:user/${aws:username}"
},
{
"Sid" : "IAMUserSSHKeys",
"Effect" : "Allow",
"Action" : [
"iam:DeleteSSHPublicKey",
"iam:GetSSHPublicKey",
"iam:ListSSHPublicKeys",
"iam:UpdateSSHPublicKey",
"iam:UploadSSHPublicKey"
],
"Resource" : "arn:aws:iam::*:user/${aws:username}"
},
{
"Sid" : "IAMSelfManageServiceSpecificCredentials",
"Effect" : "Allow",
"Action" : [
"iam:CreateServiceSpecificCredential",
"iam:UpdateServiceSpecificCredential",
"iam:DeleteServiceSpecificCredential",
"iam:ResetServiceSpecificCredential"
],
"Resource" : "arn:aws:iam::*:user/${aws:username}"
},
{
"Sid" : "CodeStarNotificationsReadWriteAccess",
"Effect" : "Allow",
"Action" : [
"codestar-notifications:CreateNotificationRule",
"codestar-notifications:DescribeNotificationRule",
"codestar-notifications:UpdateNotificationRule",
"codestar-notifications:Subscribe",
"codestar-notifications:Unsubscribe"
],
"Resource" : "*",
"Condition" : {
"ArnLike" : {
"codestar-notifications:NotificationsForResource" : "arn:aws:codecommit:*:*:*"
}
}
},
{
"Sid" : "CodeStarNotificationsListAccess",
"Effect" : "Allow",
"Action" : [
"codestar-notifications:ListNotificationRules",
"codestar-notifications:ListTargets",
"codestar-notifications:ListTagsforResource",
"codestar-notifications:ListEventTypes"
],
"Resource" : "*"
},
{
"Sid" : "AmazonCodeGuruReviewerFullAccess",
"Effect" : "Allow",
"Action" : [
"codeguru-reviewer:AssociateRepository",
"codeguru-reviewer:DescribeRepositoryAssociation",
"codeguru-reviewer:ListRepositoryAssociations",
"codeguru-reviewer:DisassociateRepository",
"codeguru-reviewer:DescribeCodeReview",
"codeguru-reviewer:ListCodeReviews"
],
"Resource" : "*"
},
{
"Sid" : "AmazonCodeGuruReviewerSLRCreation",
"Action" : "iam:CreateServiceLinkedRole",
"Effect" : "Allow",
"Resource" : "arn:aws:iam::*:role/aws-service-role/codeguru-reviewer.amazonaws.com/AWSServiceRoleForAmazonCodeGuruReviewer",
"Condition" : {
"StringLike" : {
"iam:AWSServiceName" : "codeguru-reviewer.amazonaws.com"
}
}
},
{
"Sid" : "CloudWatchEventsManagedRules",
"Effect" : "Allow",
"Action" : [
"events:PutRule",
"events:PutTargets",
"events:DeleteRule",
"events:RemoveTargets"
],
"Resource" : "*",
"Condition" : {
"StringEquals" : {
"events:ManagedBy" : "codeguru-reviewer.amazonaws.com"
}
}
},
{
"Sid" : "CodeStarNotificationsChatbotAccess",
"Effect" : "Allow",
"Action" : [
"chatbot:DescribeSlackChannelConfigurations",
"chatbot:ListMicrosoftTeamsChannelConfigurations"
],
"Resource" : "*"
},
{
"Sid" : "CodeStarConnectionsReadOnlyAccess",
"Effect" : "Allow",
"Action" : [
"codestar-connections:ListConnections",
"codestar-connections:GetConnection"
],
"Resource" : "arn:aws:codestar-connections:*:*:connection/*"
}
]
}