本文属于机器翻译版本。若本译文内容与英语原文存在差异,则一律以英文原文为准。
AWSCodePipeline_FullAccess
描述:提供通过 AWS Management Console 访问 AWS CodePipeline 的完全访问权限。
AWSCodePipeline_FullAccess
是一项 AWS 托管式策略。
使用此策略
您可以将 AWSCodePipeline_FullAccess
附加到您的用户、组和角色。
策略详细信息
-
类型:AWS 托管策略
-
创建时间:2020 年 8 月 3 日 22:38 UTC
-
编辑时间:2024 年 3 月 14 日 17:06 UTC
-
ARN:
arn:aws:iam::aws:policy/AWSCodePipeline_FullAccess
策略版本
策略版本:v3(默认)
此策略的默认版本是定义策略权限的版本。当使用该策略的用户或角色请求访问 AWS 资源时,AWS 会检查策略的默认版本以确定是否允许该请求。
JSON 策略文档
{
"Statement" : [
{
"Action" : [
"codepipeline:*",
"cloudformation:DescribeStacks",
"cloudformation:ListStacks",
"cloudformation:ListChangeSets",
"cloudtrail:DescribeTrails",
"codebuild:BatchGetProjects",
"codebuild:CreateProject",
"codebuild:ListCuratedEnvironmentImages",
"codebuild:ListProjects",
"codecommit:ListBranches",
"codecommit:GetReferences",
"codecommit:ListRepositories",
"codedeploy:BatchGetDeploymentGroups",
"codedeploy:ListApplications",
"codedeploy:ListDeploymentGroups",
"ec2:DescribeSecurityGroups",
"ec2:DescribeSubnets",
"ec2:DescribeVpcs",
"ecr:DescribeRepositories",
"ecr:ListImages",
"ecs:ListClusters",
"ecs:ListServices",
"elasticbeanstalk:DescribeApplications",
"elasticbeanstalk:DescribeEnvironments",
"iam:ListRoles",
"iam:GetRole",
"lambda:ListFunctions",
"events:ListRules",
"events:ListTargetsByRule",
"events:DescribeRule",
"opsworks:DescribeApps",
"opsworks:DescribeLayers",
"opsworks:DescribeStacks",
"s3:ListAllMyBuckets",
"sns:ListTopics",
"codestar-notifications:ListNotificationRules",
"codestar-notifications:ListTargets",
"codestar-notifications:ListTagsforResource",
"codestar-notifications:ListEventTypes",
"states:ListStateMachines"
],
"Effect" : "Allow",
"Resource" : "*",
"Sid" : "CodePipelineAuthoringAccess"
},
{
"Action" : [
"s3:GetObject",
"s3:ListBucket",
"s3:GetBucketPolicy",
"s3:GetBucketVersioning",
"s3:GetObjectVersion",
"s3:CreateBucket",
"s3:PutBucketPolicy"
],
"Effect" : "Allow",
"Resource" : "arn:aws:s3::*:codepipeline-*",
"Sid" : "CodePipelineArtifactsReadWriteAccess"
},
{
"Action" : [
"cloudtrail:PutEventSelectors",
"cloudtrail:CreateTrail",
"cloudtrail:GetEventSelectors",
"cloudtrail:StartLogging"
],
"Effect" : "Allow",
"Resource" : "arn:aws:cloudtrail:*:*:trail/codepipeline-source-trail",
"Sid" : "CodePipelineSourceTrailReadWriteAccess"
},
{
"Action" : [
"iam:PassRole"
],
"Effect" : "Allow",
"Resource" : [
"arn:aws:iam::*:role/service-role/cwe-role-*"
],
"Condition" : {
"StringEquals" : {
"iam:PassedToService" : [
"events.amazonaws.com"
]
}
},
"Sid" : "EventsIAMPassRole"
},
{
"Action" : [
"iam:PassRole"
],
"Effect" : "Allow",
"Resource" : "*",
"Condition" : {
"StringEquals" : {
"iam:PassedToService" : [
"codepipeline.amazonaws.com"
]
}
},
"Sid" : "CodePipelineIAMPassRole"
},
{
"Action" : [
"events:PutRule",
"events:PutTargets",
"events:DeleteRule",
"events:DisableRule",
"events:RemoveTargets"
],
"Effect" : "Allow",
"Resource" : [
"arn:aws:events:*:*:rule/codepipeline-*"
],
"Sid" : "CodePipelineEventsReadWriteAccess"
},
{
"Sid" : "CodeStarNotificationsReadWriteAccess",
"Effect" : "Allow",
"Action" : [
"codestar-notifications:CreateNotificationRule",
"codestar-notifications:DescribeNotificationRule",
"codestar-notifications:UpdateNotificationRule",
"codestar-notifications:DeleteNotificationRule",
"codestar-notifications:Subscribe",
"codestar-notifications:Unsubscribe"
],
"Resource" : "*",
"Condition" : {
"StringLike" : {
"codestar-notifications:NotificationsForResource" : "arn:aws:codepipeline:*"
}
}
},
{
"Sid" : "CodeStarNotificationsSNSTopicCreateAccess",
"Effect" : "Allow",
"Action" : [
"sns:CreateTopic",
"sns:SetTopicAttributes"
],
"Resource" : "arn:aws:sns:*:*:codestar-notifications*"
},
{
"Sid" : "CodeStarNotificationsChatbotAccess",
"Effect" : "Allow",
"Action" : [
"chatbot:DescribeSlackChannelConfigurations",
"chatbot:ListMicrosoftTeamsChannelConfigurations"
],
"Resource" : "*"
}
],
"Version" : "2012-10-17"
}