Le traduzioni sono generate tramite traduzione automatica. In caso di conflitto tra il contenuto di una traduzione e la versione originale in Inglese, quest'ultima prevarrà.
AWSCodeStarServiceRole
Descrizione: DO NOT USE - AWS CodeStar Service Role Policy che concede privilegi amministrativi per CodeStar gestire IAM e altre risorse di servizio per conto del cliente.
AWSCodeStarServiceRole
è una politica AWS gestita.
Utilizzo di questa politica
Puoi collegarti AWSCodeStarServiceRole
ai tuoi utenti, gruppi e ruoli.
Dettagli della politica
-
Tipo: politica del ruolo di servizio
-
Ora di creazione: 19 aprile 2017, 15:20 UTC
-
Ora modificata: 20 settembre 2021, 19:11 UTC
-
ARN:
arn:aws:iam::aws:policy/service-role/AWSCodeStarServiceRole
Versione della politica
Versione della politica: v11 (predefinita)
La versione predefinita della politica è la versione che definisce le autorizzazioni per la politica. Quando un utente o un ruolo con la politica effettua una richiesta di accesso a una AWS risorsa, AWS controlla la versione predefinita della politica per determinare se consentire la richiesta.
Documento di policy JSON
{
"Version" : "2012-10-17",
"Statement" : [
{
"Sid" : "ProjectEventRules",
"Effect" : "Allow",
"Action" : [
"events:PutTargets",
"events:RemoveTargets",
"events:PutRule",
"events:DeleteRule",
"events:DescribeRule"
],
"Resource" : [
"arn:aws:events:*:*:rule/awscodestar-*"
]
},
{
"Sid" : "ProjectStack",
"Effect" : "Allow",
"Action" : [
"cloudformation:*Stack*",
"cloudformation:CreateChangeSet",
"cloudformation:ExecuteChangeSet",
"cloudformation:DeleteChangeSet",
"cloudformation:GetTemplate"
],
"Resource" : [
"arn:aws:cloudformation:*:*:stack/awscodestar-*",
"arn:aws:cloudformation:*:*:stack/awseb-*",
"arn:aws:cloudformation:*:*:stack/aws-cloud9-*",
"arn:aws:cloudformation:*:aws:transform/CodeStar*"
]
},
{
"Sid" : "ProjectStackTemplate",
"Effect" : "Allow",
"Action" : [
"cloudformation:GetTemplateSummary",
"cloudformation:DescribeChangeSet"
],
"Resource" : "*"
},
{
"Sid" : "ProjectQuickstarts",
"Effect" : "Allow",
"Action" : [
"s3:GetObject"
],
"Resource" : [
"arn:aws:s3:::awscodestar-*/*"
]
},
{
"Sid" : "ProjectS3Buckets",
"Effect" : "Allow",
"Action" : [
"s3:*"
],
"Resource" : [
"arn:aws:s3:::aws-codestar-*",
"arn:aws:s3:::elasticbeanstalk-*"
]
},
{
"Sid" : "ProjectServices",
"Effect" : "Allow",
"Action" : [
"codestar:*",
"codecommit:*",
"codepipeline:*",
"codedeploy:*",
"codebuild:*",
"autoscaling:*",
"cloudwatch:Put*",
"ec2:*",
"elasticbeanstalk:*",
"elasticloadbalancing:*",
"iam:ListRoles",
"logs:*",
"sns:*",
"cloud9:CreateEnvironmentEC2",
"cloud9:DeleteEnvironment",
"cloud9:DescribeEnvironment*",
"cloud9:ListEnvironments"
],
"Resource" : "*"
},
{
"Sid" : "ProjectWorkerRoles",
"Effect" : "Allow",
"Action" : [
"iam:AttachRolePolicy",
"iam:CreateRole",
"iam:DeleteRole",
"iam:DeleteRolePolicy",
"iam:DetachRolePolicy",
"iam:GetRole",
"iam:PassRole",
"iam:GetRolePolicy",
"iam:PutRolePolicy",
"iam:SetDefaultPolicyVersion",
"iam:CreatePolicy",
"iam:DeletePolicy",
"iam:AddRoleToInstanceProfile",
"iam:CreateInstanceProfile",
"iam:DeleteInstanceProfile",
"iam:RemoveRoleFromInstanceProfile"
],
"Resource" : [
"arn:aws:iam::*:role/CodeStarWorker*",
"arn:aws:iam::*:policy/CodeStarWorker*",
"arn:aws:iam::*:instance-profile/awscodestar-*"
]
},
{
"Sid" : "ProjectTeamMembers",
"Effect" : "Allow",
"Action" : [
"iam:AttachUserPolicy",
"iam:DetachUserPolicy"
],
"Resource" : "*",
"Condition" : {
"ArnEquals" : {
"iam:PolicyArn" : [
"arn:aws:iam::*:policy/CodeStar_*"
]
}
}
},
{
"Sid" : "ProjectRoles",
"Effect" : "Allow",
"Action" : [
"iam:CreatePolicy",
"iam:DeletePolicy",
"iam:CreatePolicyVersion",
"iam:DeletePolicyVersion",
"iam:ListEntitiesForPolicy",
"iam:ListPolicyVersions",
"iam:GetPolicy",
"iam:GetPolicyVersion"
],
"Resource" : [
"arn:aws:iam::*:policy/CodeStar_*"
]
},
{
"Sid" : "InspectServiceRole",
"Effect" : "Allow",
"Action" : [
"iam:ListAttachedRolePolicies"
],
"Resource" : [
"arn:aws:iam::*:role/aws-codestar-service-role",
"arn:aws:iam::*:role/service-role/aws-codestar-service-role"
]
},
{
"Sid" : "IAMLinkRole",
"Effect" : "Allow",
"Action" : [
"iam:CreateServiceLinkedRole"
],
"Resource" : "*",
"Condition" : {
"StringEquals" : {
"iam:AWSServiceName" : "cloud9.amazonaws.com"
}
}
},
{
"Sid" : "DescribeConfigRuleForARN",
"Effect" : "Allow",
"Action" : [
"config:DescribeConfigRules"
],
"Resource" : [
"*"
]
},
{
"Sid" : "ProjectCodeStarConnections",
"Effect" : "Allow",
"Action" : [
"codestar-connections:UseConnection",
"codestar-connections:GetConnection"
],
"Resource" : "*"
},
{
"Sid" : "ProjectCodeStarConnectionsPassConnections",
"Effect" : "Allow",
"Action" : "codestar-connections:PassConnection",
"Resource" : "*",
"Condition" : {
"StringEqualsIfExists" : {
"codestar-connections:PassedToService" : "codepipeline.amazonaws.com"
}
}
}
]
}