@cloud-copilot/iam-data 0.15.202511201 → 0.15.202511221

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (64) hide show
  1. package/data/actions/action-recommendations.json +1 -1
  2. package/data/actions/application-signals.json +8 -0
  3. package/data/actions/autoscaling.json +16 -0
  4. package/data/actions/backup.json +170 -2
  5. package/data/actions/bedrock-agentcore.json +2 -1
  6. package/data/actions/bedrock.json +31 -2
  7. package/data/actions/braket.json +62 -0
  8. package/data/actions/cloudformation.json +21 -0
  9. package/data/actions/cloudshell.json +1 -1
  10. package/data/actions/cloudtrail.json +35 -8
  11. package/data/actions/cost-optimization-hub.json +8 -0
  12. package/data/actions/dms.json +27 -0
  13. package/data/actions/ds.json +2 -2
  14. package/data/actions/ecs.json +90 -0
  15. package/data/actions/glue.json +38 -1
  16. package/data/actions/guardduty.json +24 -0
  17. package/data/actions/iam.json +158 -5
  18. package/data/actions/identitystore.json +76 -27
  19. package/data/actions/imagebuilder.json +40 -0
  20. package/data/actions/invoicing.json +56 -0
  21. package/data/actions/kafka.json +57 -1
  22. package/data/actions/kinesisvideo.json +30 -0
  23. package/data/actions/lakeformation.json +16 -0
  24. package/data/actions/license-manager.json +217 -3
  25. package/data/actions/logs.json +98 -0
  26. package/data/actions/mgn.json +54 -1
  27. package/data/actions/notifications-contacts.json +2 -1
  28. package/data/actions/odb.json +22 -0
  29. package/data/actions/organizations.json +117 -0
  30. package/data/actions/partnercentral.json +307 -3
  31. package/data/actions/pricingplanmanager.json +66 -0
  32. package/data/actions/quicksight.json +9 -0
  33. package/data/actions/s3.json +65 -1
  34. package/data/actions/secretsmanager.json +42 -20
  35. package/data/actions/securityhub.json +30 -0
  36. package/data/actions/signin.json +18 -2
  37. package/data/actions/ssm.json +1 -1
  38. package/data/actions/tag.json +8 -0
  39. package/data/conditionKeys/bedrock-agentcore.json +5 -0
  40. package/data/conditionKeys/bedrock.json +5 -0
  41. package/data/conditionKeys/dynamodb.json +21 -1
  42. package/data/conditionKeys/glue.json +1 -1
  43. package/data/conditionKeys/iam.json +20 -0
  44. package/data/conditionKeys/identitystore.json +26 -1
  45. package/data/conditionKeys/organizations.json +10 -0
  46. package/data/conditionKeys/partnercentral.json +7 -2
  47. package/data/conditionKeys/pricingplanmanager.json +1 -0
  48. package/data/conditionKeys/s3.json +5 -0
  49. package/data/conditionKeys/secretsmanager.json +15 -0
  50. package/data/conditionPatterns.json +1 -0
  51. package/data/resourceTypes/backup.json +7 -0
  52. package/data/resourceTypes/braket.json +7 -0
  53. package/data/resourceTypes/iam.json +7 -0
  54. package/data/resourceTypes/invoicing.json +7 -0
  55. package/data/resourceTypes/license-manager.json +14 -0
  56. package/data/resourceTypes/logs.json +7 -0
  57. package/data/resourceTypes/organizations.json +7 -0
  58. package/data/resourceTypes/partnercentral.json +21 -0
  59. package/data/resourceTypes/pricingplanmanager.json +6 -0
  60. package/data/resourceTypes/s3.json +11 -2
  61. package/data/resourceTypes/secretsmanager.json +2 -1
  62. package/data/serviceNames.json +4 -3
  63. package/data/services.json +1 -0
  64. package/package.json +2 -2
@@ -253,7 +253,9 @@
253
253
  "s3:x-amz-grant-read-acp",
254
254
  "s3:x-amz-grant-write",
255
255
  "s3:x-amz-grant-write-acp",
256
- "s3:x-amz-object-ownership"
256
+ "s3:x-amz-object-ownership",
257
+ "aws:RequestTag/${TagKey}",
258
+ "aws:TagKeys"
257
259
  ],
258
260
  "dependentActions": []
259
261
  },
@@ -1284,6 +1286,28 @@
1284
1286
  ],
1285
1287
  "dependentActions": []
1286
1288
  },
1289
+ "getbucketabac": {
1290
+ "name": "GetBucketAbac",
1291
+ "description": "Grants permission to retrieve ABAC configuration for a general purpose bucket",
1292
+ "accessLevel": "Read",
1293
+ "resourceTypes": [
1294
+ {
1295
+ "name": "bucket",
1296
+ "required": true,
1297
+ "conditionKeys": [],
1298
+ "dependentActions": []
1299
+ }
1300
+ ],
1301
+ "conditionKeys": [
1302
+ "s3:authType",
1303
+ "s3:ResourceAccount",
1304
+ "s3:signatureAge",
1305
+ "s3:signatureversion",
1306
+ "s3:TlsVersion",
1307
+ "s3:x-amz-content-sha256"
1308
+ ],
1309
+ "dependentActions": []
1310
+ },
1287
1311
  "getbucketacl": {
1288
1312
  "name": "GetBucketAcl",
1289
1313
  "description": "Grants permission to use the acl subresource to return the access control list (ACL) of an Amazon S3 bucket",
@@ -2724,6 +2748,12 @@
2724
2748
  "conditionKeys": [],
2725
2749
  "dependentActions": []
2726
2750
  },
2751
+ {
2752
+ "name": "bucket",
2753
+ "required": false,
2754
+ "conditionKeys": [],
2755
+ "dependentActions": []
2756
+ },
2727
2757
  {
2728
2758
  "name": "storagelensgroup",
2729
2759
  "required": false,
@@ -2952,6 +2982,28 @@
2952
2982
  ],
2953
2983
  "dependentActions": []
2954
2984
  },
2985
+ "putbucketabac": {
2986
+ "name": "PutBucketAbac",
2987
+ "description": "Grants permission to set ABAC configuration for a general purpose bucket",
2988
+ "accessLevel": "Write",
2989
+ "resourceTypes": [
2990
+ {
2991
+ "name": "bucket",
2992
+ "required": true,
2993
+ "conditionKeys": [],
2994
+ "dependentActions": []
2995
+ }
2996
+ ],
2997
+ "conditionKeys": [
2998
+ "s3:authType",
2999
+ "s3:ResourceAccount",
3000
+ "s3:signatureAge",
3001
+ "s3:signatureversion",
3002
+ "s3:TlsVersion",
3003
+ "s3:x-amz-content-sha256"
3004
+ ],
3005
+ "dependentActions": []
3006
+ },
2955
3007
  "putbucketacl": {
2956
3008
  "name": "PutBucketAcl",
2957
3009
  "description": "Grants permission to set the permissions on an existing bucket using access control lists (ACLs)",
@@ -3847,6 +3899,12 @@
3847
3899
  "conditionKeys": [],
3848
3900
  "dependentActions": []
3849
3901
  },
3902
+ {
3903
+ "name": "bucket",
3904
+ "required": false,
3905
+ "conditionKeys": [],
3906
+ "dependentActions": []
3907
+ },
3850
3908
  {
3851
3909
  "name": "storagelensgroup",
3852
3910
  "required": false,
@@ -3895,6 +3953,12 @@
3895
3953
  "conditionKeys": [],
3896
3954
  "dependentActions": []
3897
3955
  },
3956
+ {
3957
+ "name": "bucket",
3958
+ "required": false,
3959
+ "conditionKeys": [],
3960
+ "dependentActions": []
3961
+ },
3898
3962
  {
3899
3963
  "name": "storagelensgroup",
3900
3964
  "required": false,
@@ -24,7 +24,8 @@
24
24
  "secretsmanager:resource/AllowRotationLambdaArn",
25
25
  "secretsmanager:ResourceTag/tag-key",
26
26
  "aws:ResourceTag/${TagKey}",
27
- "secretsmanager:SecretPrimaryRegion"
27
+ "secretsmanager:SecretPrimaryRegion",
28
+ "secretsmanager:resource/Type"
28
29
  ],
29
30
  "dependentActions": []
30
31
  },
@@ -50,7 +51,8 @@
50
51
  "aws:TagKeys",
51
52
  "secretsmanager:ResourceTag/tag-key",
52
53
  "secretsmanager:AddReplicaRegions",
53
- "secretsmanager:ForceOverwriteReplicaSecret"
54
+ "secretsmanager:ForceOverwriteReplicaSecret",
55
+ "secretsmanager:Type"
54
56
  ],
55
57
  "dependentActions": []
56
58
  },
@@ -71,7 +73,8 @@
71
73
  "secretsmanager:resource/AllowRotationLambdaArn",
72
74
  "secretsmanager:ResourceTag/tag-key",
73
75
  "aws:ResourceTag/${TagKey}",
74
- "secretsmanager:SecretPrimaryRegion"
76
+ "secretsmanager:SecretPrimaryRegion",
77
+ "secretsmanager:resource/Type"
75
78
  ],
76
79
  "dependentActions": []
77
80
  },
@@ -94,7 +97,8 @@
94
97
  "secretsmanager:ForceDeleteWithoutRecovery",
95
98
  "secretsmanager:ResourceTag/tag-key",
96
99
  "aws:ResourceTag/${TagKey}",
97
- "secretsmanager:SecretPrimaryRegion"
100
+ "secretsmanager:SecretPrimaryRegion",
101
+ "secretsmanager:resource/Type"
98
102
  ],
99
103
  "dependentActions": []
100
104
  },
@@ -115,7 +119,8 @@
115
119
  "secretsmanager:resource/AllowRotationLambdaArn",
116
120
  "secretsmanager:ResourceTag/tag-key",
117
121
  "aws:ResourceTag/${TagKey}",
118
- "secretsmanager:SecretPrimaryRegion"
122
+ "secretsmanager:SecretPrimaryRegion",
123
+ "secretsmanager:resource/Type"
119
124
  ],
120
125
  "dependentActions": []
121
126
  },
@@ -144,7 +149,8 @@
144
149
  "secretsmanager:resource/AllowRotationLambdaArn",
145
150
  "secretsmanager:ResourceTag/tag-key",
146
151
  "aws:ResourceTag/${TagKey}",
147
- "secretsmanager:SecretPrimaryRegion"
152
+ "secretsmanager:SecretPrimaryRegion",
153
+ "secretsmanager:resource/Type"
148
154
  ],
149
155
  "dependentActions": []
150
156
  },
@@ -167,7 +173,8 @@
167
173
  "secretsmanager:resource/AllowRotationLambdaArn",
168
174
  "secretsmanager:ResourceTag/tag-key",
169
175
  "aws:ResourceTag/${TagKey}",
170
- "secretsmanager:SecretPrimaryRegion"
176
+ "secretsmanager:SecretPrimaryRegion",
177
+ "secretsmanager:resource/Type"
171
178
  ],
172
179
  "dependentActions": []
173
180
  },
@@ -188,7 +195,8 @@
188
195
  "secretsmanager:resource/AllowRotationLambdaArn",
189
196
  "secretsmanager:ResourceTag/tag-key",
190
197
  "aws:ResourceTag/${TagKey}",
191
- "secretsmanager:SecretPrimaryRegion"
198
+ "secretsmanager:SecretPrimaryRegion",
199
+ "secretsmanager:resource/Type"
192
200
  ],
193
201
  "dependentActions": []
194
202
  },
@@ -218,7 +226,8 @@
218
226
  "secretsmanager:ResourceTag/tag-key",
219
227
  "aws:ResourceTag/${TagKey}",
220
228
  "secretsmanager:BlockPublicPolicy",
221
- "secretsmanager:SecretPrimaryRegion"
229
+ "secretsmanager:SecretPrimaryRegion",
230
+ "secretsmanager:resource/Type"
222
231
  ],
223
232
  "dependentActions": []
224
233
  },
@@ -239,7 +248,8 @@
239
248
  "secretsmanager:resource/AllowRotationLambdaArn",
240
249
  "secretsmanager:ResourceTag/tag-key",
241
250
  "aws:ResourceTag/${TagKey}",
242
- "secretsmanager:SecretPrimaryRegion"
251
+ "secretsmanager:SecretPrimaryRegion",
252
+ "secretsmanager:resource/Type"
243
253
  ],
244
254
  "dependentActions": []
245
255
  },
@@ -260,7 +270,8 @@
260
270
  "secretsmanager:resource/AllowRotationLambdaArn",
261
271
  "secretsmanager:ResourceTag/tag-key",
262
272
  "aws:ResourceTag/${TagKey}",
263
- "secretsmanager:SecretPrimaryRegion"
273
+ "secretsmanager:SecretPrimaryRegion",
274
+ "secretsmanager:resource/Type"
264
275
  ],
265
276
  "dependentActions": []
266
277
  },
@@ -283,7 +294,8 @@
283
294
  "aws:ResourceTag/${TagKey}",
284
295
  "secretsmanager:SecretPrimaryRegion",
285
296
  "secretsmanager:AddReplicaRegions",
286
- "secretsmanager:ForceOverwriteReplicaSecret"
297
+ "secretsmanager:ForceOverwriteReplicaSecret",
298
+ "secretsmanager:resource/Type"
287
299
  ],
288
300
  "dependentActions": []
289
301
  },
@@ -304,7 +316,8 @@
304
316
  "secretsmanager:resource/AllowRotationLambdaArn",
305
317
  "secretsmanager:ResourceTag/tag-key",
306
318
  "aws:ResourceTag/${TagKey}",
307
- "secretsmanager:SecretPrimaryRegion"
319
+ "secretsmanager:SecretPrimaryRegion",
320
+ "secretsmanager:resource/Type"
308
321
  ],
309
322
  "dependentActions": []
310
323
  },
@@ -328,7 +341,9 @@
328
341
  "aws:ResourceTag/${TagKey}",
329
342
  "secretsmanager:SecretPrimaryRegion",
330
343
  "secretsmanager:ModifyRotationRules",
331
- "secretsmanager:RotateImmediately"
344
+ "secretsmanager:RotateImmediately",
345
+ "secretsmanager:resource/Type",
346
+ "secretsmanager:ExternalSecretRotationRoleArn"
332
347
  ],
333
348
  "dependentActions": []
334
349
  },
@@ -349,7 +364,8 @@
349
364
  "secretsmanager:resource/AllowRotationLambdaArn",
350
365
  "secretsmanager:ResourceTag/tag-key",
351
366
  "aws:ResourceTag/${TagKey}",
352
- "secretsmanager:SecretPrimaryRegion"
367
+ "secretsmanager:SecretPrimaryRegion",
368
+ "secretsmanager:resource/Type"
353
369
  ],
354
370
  "dependentActions": []
355
371
  },
@@ -372,7 +388,8 @@
372
388
  "secretsmanager:resource/AllowRotationLambdaArn",
373
389
  "secretsmanager:ResourceTag/tag-key",
374
390
  "aws:ResourceTag/${TagKey}",
375
- "secretsmanager:SecretPrimaryRegion"
391
+ "secretsmanager:SecretPrimaryRegion",
392
+ "secretsmanager:resource/Type"
376
393
  ],
377
394
  "dependentActions": []
378
395
  },
@@ -394,7 +411,8 @@
394
411
  "secretsmanager:resource/AllowRotationLambdaArn",
395
412
  "secretsmanager:ResourceTag/tag-key",
396
413
  "aws:ResourceTag/${TagKey}",
397
- "secretsmanager:SecretPrimaryRegion"
414
+ "secretsmanager:SecretPrimaryRegion",
415
+ "secretsmanager:resource/Type"
398
416
  ],
399
417
  "dependentActions": []
400
418
  },
@@ -418,7 +436,9 @@
418
436
  "secretsmanager:resource/AllowRotationLambdaArn",
419
437
  "secretsmanager:ResourceTag/tag-key",
420
438
  "aws:ResourceTag/${TagKey}",
421
- "secretsmanager:SecretPrimaryRegion"
439
+ "secretsmanager:SecretPrimaryRegion",
440
+ "secretsmanager:Type",
441
+ "secretsmanager:resource/Type"
422
442
  ],
423
443
  "dependentActions": []
424
444
  },
@@ -440,7 +460,8 @@
440
460
  "secretsmanager:resource/AllowRotationLambdaArn",
441
461
  "secretsmanager:ResourceTag/tag-key",
442
462
  "aws:ResourceTag/${TagKey}",
443
- "secretsmanager:SecretPrimaryRegion"
463
+ "secretsmanager:SecretPrimaryRegion",
464
+ "secretsmanager:resource/Type"
444
465
  ],
445
466
  "dependentActions": []
446
467
  },
@@ -461,7 +482,8 @@
461
482
  "secretsmanager:resource/AllowRotationLambdaArn",
462
483
  "secretsmanager:ResourceTag/tag-key",
463
484
  "aws:ResourceTag/${TagKey}",
464
- "secretsmanager:SecretPrimaryRegion"
485
+ "secretsmanager:SecretPrimaryRegion",
486
+ "secretsmanager:resource/Type"
465
487
  ],
466
488
  "dependentActions": []
467
489
  }
@@ -944,6 +944,21 @@
944
944
  "conditionKeys": [],
945
945
  "dependentActions": []
946
946
  },
947
+ "getfindingstrendsv2": {
948
+ "name": "GetFindingsTrendsV2",
949
+ "description": "Grants permission to retrieve findings trends",
950
+ "accessLevel": "Read",
951
+ "resourceTypes": [
952
+ {
953
+ "name": "hubv2",
954
+ "required": false,
955
+ "conditionKeys": [],
956
+ "dependentActions": []
957
+ }
958
+ ],
959
+ "conditionKeys": [],
960
+ "dependentActions": []
961
+ },
947
962
  "getfreetrialenddate": {
948
963
  "name": "GetFreeTrialEndDate",
949
964
  "isPermissionOnly": true,
@@ -1082,6 +1097,21 @@
1082
1097
  "conditionKeys": [],
1083
1098
  "dependentActions": []
1084
1099
  },
1100
+ "getresourcestrendsv2": {
1101
+ "name": "GetResourcesTrendsV2",
1102
+ "description": "Grants permission to retrieve resources trends",
1103
+ "accessLevel": "Read",
1104
+ "resourceTypes": [
1105
+ {
1106
+ "name": "hubv2",
1107
+ "required": false,
1108
+ "conditionKeys": [],
1109
+ "dependentActions": []
1110
+ }
1111
+ ],
1112
+ "conditionKeys": [],
1113
+ "dependentActions": []
1114
+ },
1085
1115
  "getresourcesv2": {
1086
1116
  "name": "GetResourcesV2",
1087
1117
  "description": "Grants permission to retrieve a list of resources",
@@ -1,7 +1,23 @@
1
1
  {
2
+ "authorizeoauth2access": {
3
+ "name": "AuthorizeOAuth2Access",
4
+ "description": "Grants permission to authenticate through a browser and obtain an OAuth 2.0 authorization code for credential exchange",
5
+ "accessLevel": "Read",
6
+ "resourceTypes": [],
7
+ "conditionKeys": [],
8
+ "dependentActions": []
9
+ },
10
+ "createoauth2token": {
11
+ "name": "CreateOAuth2Token",
12
+ "description": "Grants permission to exchange an authorization code for OAuth 2.0 access token and refresh token that can be used to access AWS services from developer tools and applications",
13
+ "accessLevel": "Read",
14
+ "resourceTypes": [],
15
+ "conditionKeys": [],
16
+ "dependentActions": []
17
+ },
2
18
  "createtrustedidentitypropagationapplicationforconsole": {
3
19
  "name": "CreateTrustedIdentityPropagationApplicationForConsole",
4
- "description": "Grants permission to create an Identity Center application that represents the the console on an Identity Center organization instance",
20
+ "description": "Grants permission to create an Identity Center application that represents the AWS Management Console on an Identity Center organization instance",
5
21
  "accessLevel": "Write",
6
22
  "resourceTypes": [],
7
23
  "conditionKeys": [],
@@ -17,7 +33,7 @@
17
33
  },
18
34
  "listtrustedidentitypropagationapplicationsforconsole": {
19
35
  "name": "ListTrustedIdentityPropagationApplicationsForConsole",
20
- "description": "Grants permission to list all Identity Center applications that represent the the console",
36
+ "description": "Grants permission to list all Identity Center applications that represent the AWS Management Console",
21
37
  "accessLevel": "List",
22
38
  "resourceTypes": [],
23
39
  "conditionKeys": [],
@@ -1013,7 +1013,7 @@
1013
1013
  },
1014
1014
  "executeapi": {
1015
1015
  "name": "ExecuteAPI",
1016
- "description": "Grants permission to a Systems Manager delegated administrator to view related resource details about OpsItems across multiple AWS accounts in the the console",
1016
+ "description": "Grants permission to a Systems Manager delegated administrator to view related resource details about OpsItems across multiple AWS accounts in the AWS Management Console",
1017
1017
  "accessLevel": "Read",
1018
1018
  "resourceTypes": [],
1019
1019
  "conditionKeys": [],
@@ -39,6 +39,14 @@
39
39
  "conditionKeys": [],
40
40
  "dependentActions": []
41
41
  },
42
+ "listrequiredtags": {
43
+ "name": "ListRequiredTags",
44
+ "description": "Grants permission to list required tags for supported resource types in the calling account",
45
+ "accessLevel": "List",
46
+ "resourceTypes": [],
47
+ "conditionKeys": [],
48
+ "dependentActions": []
49
+ },
42
50
  "startreportcreation": {
43
51
  "name": "StartReportCreation",
44
52
  "description": "Grants permission to start generating a report listing all tagged resources in accounts across your organization, and whether each resource is compliant with the effective tag policy",
@@ -44,6 +44,11 @@
44
44
  "description": "Filters access by the subject claim (sub) in the JWT passed in the request",
45
45
  "type": "String"
46
46
  },
47
+ "bedrock-agentcore:kmskeyarn": {
48
+ "key": "bedrock-agentcore:KmsKeyArn",
49
+ "description": "Filters access by KMS Key arn provided",
50
+ "type": "String"
51
+ },
47
52
  "bedrock-agentcore:actorid": {
48
53
  "key": "bedrock-agentcore:actorId",
49
54
  "description": "Filters access by Actor Id",
@@ -39,6 +39,11 @@
39
39
  "description": "Filters access by the specified prompt router",
40
40
  "type": "ARN"
41
41
  },
42
+ "bedrock:servicetier": {
43
+ "key": "bedrock:ServiceTier",
44
+ "description": "Filters access by the specified ServiceTier",
45
+ "type": "String"
46
+ },
42
47
  "bedrock:thirdpartyknowledgebasecredentialssecretarn": {
43
48
  "key": "bedrock:ThirdPartyKnowledgeBaseCredentialsSecretArn",
44
49
  "description": "Filters access by the secretArn containing the credentials of the third party platform",
@@ -24,6 +24,16 @@
24
24
  "description": "Filters access by blocking Transactions APIs calls and allow the non-Transaction APIs calls and vice-versa",
25
25
  "type": "String"
26
26
  },
27
+ "dynamodb:firstpartitionkeyvalues": {
28
+ "key": "dynamodb:FirstPartitionKeyValues",
29
+ "description": "Filters access by the first partition key of the table",
30
+ "type": "ArrayOfString"
31
+ },
32
+ "dynamodb:fourthpartitionkeyvalues": {
33
+ "key": "dynamodb:FourthPartitionKeyValues",
34
+ "description": "Filters access by the forth partition key of the table",
35
+ "type": "ArrayOfString"
36
+ },
27
37
  "dynamodb:fulltablescan": {
28
38
  "key": "dynamodb:FullTableScan",
29
39
  "description": "Filters access by blocking full table scan",
@@ -31,7 +41,7 @@
31
41
  },
32
42
  "dynamodb:leadingkeys": {
33
43
  "key": "dynamodb:LeadingKeys",
34
- "description": "Filters access by the partition key of the table",
44
+ "description": "Filters access by the first partition key of the table",
35
45
  "type": "ArrayOfString"
36
46
  },
37
47
  "dynamodb:returnconsumedcapacity": {
@@ -44,9 +54,19 @@
44
54
  "description": "Filters access by the ReturnValues parameter of request. Contains one of the following: \"ALL_OLD\", \"UPDATED_OLD\",\"ALL_NEW\",\"UPDATED_NEW\", or \"NONE\"",
45
55
  "type": "String"
46
56
  },
57
+ "dynamodb:secondpartitionkeyvalues": {
58
+ "key": "dynamodb:SecondPartitionKeyValues",
59
+ "description": "Filters access by the second partition key of the table",
60
+ "type": "ArrayOfString"
61
+ },
47
62
  "dynamodb:select": {
48
63
  "key": "dynamodb:Select",
49
64
  "description": "Filters access by the Select parameter of a Query or Scan request",
50
65
  "type": "String"
66
+ },
67
+ "dynamodb:thirdpartitionkeyvalues": {
68
+ "key": "dynamodb:ThirdPartitionKeyValues",
69
+ "description": "Filters access by the third partition key of the table",
70
+ "type": "ArrayOfString"
51
71
  }
52
72
  }
@@ -26,7 +26,7 @@
26
26
  },
27
27
  "glue:federatedauthorizationsource": {
28
28
  "key": "glue:FederatedAuthorizationSource",
29
- "description": "Filters access by whether the resource belongs to federarted authorization",
29
+ "description": "Filters access by whether the resource belongs to federated authorization",
30
30
  "type": "String"
31
31
  },
32
32
  "glue:lakeformationpermissions": {
@@ -24,6 +24,16 @@
24
24
  "description": "Filters access by the resource that the role will be used on behalf of",
25
25
  "type": "ARN"
26
26
  },
27
+ "iam:delegationduration": {
28
+ "key": "iam:DelegationDuration",
29
+ "description": "Filters access based on the requested delegation duration",
30
+ "type": "String"
31
+ },
32
+ "iam:delegationrequestowner": {
33
+ "key": "iam:DelegationRequestOwner",
34
+ "description": "Filters access based on the delegation request owner",
35
+ "type": "ARN"
36
+ },
27
37
  "iam:fido-fips-140-2-certification": {
28
38
  "key": "iam:FIDO-FIPS-140-2-certification",
29
39
  "description": "Filters access by the MFA device FIPS-140-2 validation certification level at the time of registration of a FIDO security key",
@@ -39,6 +49,11 @@
39
49
  "description": "Filters access by the MFA device FIDO certification level at the time of registration of a FIDO security key",
40
50
  "type": "String"
41
51
  },
52
+ "iam:notificationchannel": {
53
+ "key": "iam:NotificationChannel",
54
+ "description": "Filters access based on the requested notification channel",
55
+ "type": "String"
56
+ },
42
57
  "iam:organizationspolicyid": {
43
58
  "key": "iam:OrganizationsPolicyId",
44
59
  "description": "Filters access by the ID of an AWS Organizations policy",
@@ -78,5 +93,10 @@
78
93
  "key": "iam:ServiceSpecificCredentialServiceName",
79
94
  "description": "Filters access by the service associated with the credential",
80
95
  "type": "String"
96
+ },
97
+ "iam:templatearn": {
98
+ "key": "iam:TemplateArn",
99
+ "description": "Filters access based on the requested template ARN",
100
+ "type": "ARN"
81
101
  }
82
102
  }
@@ -1,7 +1,32 @@
1
1
  {
2
+ "identitystore:groupexternalidissuers": {
3
+ "key": "identitystore:GroupExternalIdIssuers",
4
+ "description": "Filters access by Issuer present in ExternalIds for Group resources",
5
+ "type": "ArrayOfARN"
6
+ },
7
+ "identitystore:identitystorearn": {
8
+ "key": "identitystore:IdentityStoreArn",
9
+ "description": "Filters access by Identity Store ARN",
10
+ "type": "ARN"
11
+ },
12
+ "identitystore:primaryregion": {
13
+ "key": "identitystore:PrimaryRegion",
14
+ "description": "Filters access by Primary Region of Identity Store",
15
+ "type": "String"
16
+ },
17
+ "identitystore:reserveduserid": {
18
+ "key": "identitystore:ReservedUserId",
19
+ "description": "Filters access by a previously reserved User ID for CreateUser operation",
20
+ "type": "String"
21
+ },
22
+ "identitystore:userexternalidissuers": {
23
+ "key": "identitystore:UserExternalIdIssuers",
24
+ "description": "Filters access by Issuer present in ExternalIds for User resources",
25
+ "type": "ArrayOfARN"
26
+ },
2
27
  "identitystore:userid": {
3
28
  "key": "identitystore:UserId",
4
- "description": "Filters access by IAM Identity Center User ID",
29
+ "description": "Filters access by Identity Store User ID",
5
30
  "type": "String"
6
31
  }
7
32
  }
@@ -23,5 +23,15 @@
23
23
  "key": "organizations:ServicePrincipal",
24
24
  "description": "Filters access by the specified service principal names",
25
25
  "type": "String"
26
+ },
27
+ "organizations:transferdirection": {
28
+ "key": "organizations:TransferDirection",
29
+ "description": "Filters access by the specified responsibility transfer by the direction",
30
+ "type": "String"
31
+ },
32
+ "organizations:transfertype": {
33
+ "key": "organizations:TransferType",
34
+ "description": "Filters access by the specified responsibility transfer type names",
35
+ "type": "String"
26
36
  }
27
37
  }
@@ -16,12 +16,17 @@
16
16
  },
17
17
  "partnercentral:catalog": {
18
18
  "key": "partnercentral:Catalog",
19
- "description": "Filters access by a specific Catalog. Accepted values: [AWS, Sandbox]",
19
+ "description": "Filters access by a specific Catalog",
20
+ "type": "String"
21
+ },
22
+ "partnercentral:channelhandshaketype": {
23
+ "key": "partnercentral:ChannelHandshakeType",
24
+ "description": "Filters access by channel handshake types",
20
25
  "type": "String"
21
26
  },
22
27
  "partnercentral:relatedentitytype": {
23
28
  "key": "partnercentral:RelatedEntityType",
24
- "description": "Filters access by entity types for Opportunity association. Accepted values: [Solutions, AwsProducts, AwsMarketplaceOffers]",
29
+ "description": "Filters access by entity types for Opportunity association",
25
30
  "type": "String"
26
31
  }
27
32
  }
@@ -39,6 +39,11 @@
39
39
  "description": "Filters access by existing access point tag key and value",
40
40
  "type": "String"
41
41
  },
42
+ "s3:buckettag/${tagkey}": {
43
+ "key": "s3:BucketTag/${TagKey}",
44
+ "description": "Filters access by the tags associated with the bucket",
45
+ "type": "String"
46
+ },
42
47
  "s3:dataaccesspointaccount": {
43
48
  "key": "s3:DataAccessPointAccount",
44
49
  "description": "Filters access by the AWS Account ID that owns the access point",
@@ -29,6 +29,11 @@
29
29
  "description": "Filters access by the description text in the request",
30
30
  "type": "String"
31
31
  },
32
+ "secretsmanager:externalsecretrotationrolearn": {
33
+ "key": "secretsmanager:ExternalSecretRotationRoleArn",
34
+ "description": "Filters access by the managed external secret rotation role ARN in the request",
35
+ "type": "ARN"
36
+ },
32
37
  "secretsmanager:forcedeletewithoutrecovery": {
33
38
  "key": "secretsmanager:ForceDeleteWithoutRecovery",
34
39
  "description": "Filters access by whether the secret is to be deleted immediately without any recovery window",
@@ -89,6 +94,11 @@
89
94
  "description": "Filters access by primary region in which the secret is created if the secret is a multi-Region secret",
90
95
  "type": "String"
91
96
  },
97
+ "secretsmanager:type": {
98
+ "key": "secretsmanager:Type",
99
+ "description": "Filters access by the managed external secret type in the request",
100
+ "type": "String"
101
+ },
92
102
  "secretsmanager:versionid": {
93
103
  "key": "secretsmanager:VersionId",
94
104
  "description": "Filters access by the unique identifier of the version of the secret in the request",
@@ -103,5 +113,10 @@
103
113
  "key": "secretsmanager:resource/AllowRotationLambdaArn",
104
114
  "description": "Filters access by the ARN of the rotation Lambda function associated with the secret",
105
115
  "type": "ARN"
116
+ },
117
+ "secretsmanager:resource/type": {
118
+ "key": "secretsmanager:resource/Type",
119
+ "description": "Filters access by the managed external secret type associated with the secret",
120
+ "type": "String"
106
121
  }
107
122
  }
@@ -125,6 +125,7 @@
125
125
  },
126
126
  "s3": {
127
127
  "s3:AccessPointTag/.+?": "s3:AccessPointTag/${TagKey}",
128
+ "s3:BucketTag/.+?": "s3:BucketTag/${TagKey}",
128
129
  "s3:ExistingObjectTag/.+?": "s3:ExistingObjectTag/<key>",
129
130
  "s3:RequestObjectTag/.+?": "s3:RequestObjectTag/<key>"
130
131
  },