本文属于机器翻译版本。若本译文内容与英语原文存在差异,则一律以英文原文为准。
AWSCodePipeline_FullAccess
描述:提供通过 AWS Management Console 访问 AWS CodePipeline 的完全访问权限。
AWSCodePipeline_FullAccess
是一项 AWS 托管式策略。
使用此策略
您可以将 AWSCodePipeline_FullAccess
附加到您的用户、组和角色。
策略详细信息
-
类型:AWS 托管策略
-
创建时间:2020 年 8 月 3 日 22:38 UTC
-
编辑时间:2024 年 3 月 14 日 17:06 UTC
-
ARN:
arn:aws:iam::aws:policy/AWSCodePipeline_FullAccess
策略版本
策略版本:v3(默认)
此策略的默认版本是定义策略权限的版本。当使用该策略的用户或角色请求访问 AWS 资源时,AWS 会检查策略的默认版本以确定是否允许该请求。
JSON 策略文档
{ "Statement" : [ { "Action" : [ "codepipeline:*", "cloudformation:DescribeStacks", "cloudformation:ListStacks", "cloudformation:ListChangeSets", "cloudtrail:DescribeTrails", "codebuild:BatchGetProjects", "codebuild:CreateProject", "codebuild:ListCuratedEnvironmentImages", "codebuild:ListProjects", "codecommit:ListBranches", "codecommit:GetReferences", "codecommit:ListRepositories", "codedeploy:BatchGetDeploymentGroups", "codedeploy:ListApplications", "codedeploy:ListDeploymentGroups", "ec2:DescribeSecurityGroups", "ec2:DescribeSubnets", "ec2:DescribeVpcs", "ecr:DescribeRepositories", "ecr:ListImages", "ecs:ListClusters", "ecs:ListServices", "elasticbeanstalk:DescribeApplications", "elasticbeanstalk:DescribeEnvironments", "iam:ListRoles", "iam:GetRole", "lambda:ListFunctions", "events:ListRules", "events:ListTargetsByRule", "events:DescribeRule", "opsworks:DescribeApps", "opsworks:DescribeLayers", "opsworks:DescribeStacks", "s3:ListAllMyBuckets", "sns:ListTopics", "codestar-notifications:ListNotificationRules", "codestar-notifications:ListTargets", "codestar-notifications:ListTagsforResource", "codestar-notifications:ListEventTypes", "states:ListStateMachines" ], "Effect" : "Allow", "Resource" : "*", "Sid" : "CodePipelineAuthoringAccess" }, { "Action" : [ "s3:GetObject", "s3:ListBucket", "s3:GetBucketPolicy", "s3:GetBucketVersioning", "s3:GetObjectVersion", "s3:CreateBucket", "s3:PutBucketPolicy" ], "Effect" : "Allow", "Resource" : "arn:aws:s3::*:codepipeline-*", "Sid" : "CodePipelineArtifactsReadWriteAccess" }, { "Action" : [ "cloudtrail:PutEventSelectors", "cloudtrail:CreateTrail", "cloudtrail:GetEventSelectors", "cloudtrail:StartLogging" ], "Effect" : "Allow", "Resource" : "arn:aws:cloudtrail:*:*:trail/codepipeline-source-trail", "Sid" : "CodePipelineSourceTrailReadWriteAccess" }, { "Action" : [ "iam:PassRole" ], "Effect" : "Allow", "Resource" : [ "arn:aws:iam::*:role/service-role/cwe-role-*" ], "Condition" : { "StringEquals" : { "iam:PassedToService" : [ "events.amazonaws.com" ] } }, "Sid" : "EventsIAMPassRole" }, { "Action" : [ "iam:PassRole" ], "Effect" : "Allow", "Resource" : "*", "Condition" : { "StringEquals" : { "iam:PassedToService" : [ "codepipeline.amazonaws.com" ] } }, "Sid" : "CodePipelineIAMPassRole" }, { "Action" : [ "events:PutRule", "events:PutTargets", "events:DeleteRule", "events:DisableRule", "events:RemoveTargets" ], "Effect" : "Allow", "Resource" : [ "arn:aws:events:*:*:rule/codepipeline-*" ], "Sid" : "CodePipelineEventsReadWriteAccess" }, { "Sid" : "CodeStarNotificationsReadWriteAccess", "Effect" : "Allow", "Action" : [ "codestar-notifications:CreateNotificationRule", "codestar-notifications:DescribeNotificationRule", "codestar-notifications:UpdateNotificationRule", "codestar-notifications:DeleteNotificationRule", "codestar-notifications:Subscribe", "codestar-notifications:Unsubscribe" ], "Resource" : "*", "Condition" : { "StringLike" : { "codestar-notifications:NotificationsForResource" : "arn:aws:codepipeline:*" } } }, { "Sid" : "CodeStarNotificationsSNSTopicCreateAccess", "Effect" : "Allow", "Action" : [ "sns:CreateTopic", "sns:SetTopicAttributes" ], "Resource" : "arn:aws:sns:*:*:codestar-notifications*" }, { "Sid" : "CodeStarNotificationsChatbotAccess", "Effect" : "Allow", "Action" : [ "chatbot:DescribeSlackChannelConfigurations", "chatbot:ListMicrosoftTeamsChannelConfigurations" ], "Resource" : "*" } ], "Version" : "2012-10-17" }