@cloud-copilot/iam-data 0.15.202511261 → 0.15.202512061

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (56) hide show
  1. package/data/actions/aidevops.json +489 -0
  2. package/data/actions/aws-marketplace.json +48 -0
  3. package/data/actions/aws-mcp.json +26 -0
  4. package/data/actions/bedrock-agentcore.json +594 -2
  5. package/data/actions/bedrock-mantle.json +106 -0
  6. package/data/actions/connect.json +1081 -8
  7. package/data/actions/datazone.json +16 -0
  8. package/data/actions/eks.json +108 -0
  9. package/data/actions/lambda.json +296 -4
  10. package/data/actions/logs.json +90 -0
  11. package/data/actions/mediaconnect.json +748 -91
  12. package/data/actions/observabilityadmin.json +180 -0
  13. package/data/actions/opensearch.json +40 -0
  14. package/data/actions/partnercentral-account-management.json +22 -0
  15. package/data/actions/partnercentral.json +903 -22
  16. package/data/actions/route53.json +15 -0
  17. package/data/actions/route53globalresolver.json +700 -0
  18. package/data/actions/s3.json +1 -0
  19. package/data/actions/s3tables.json +243 -3
  20. package/data/actions/s3vectors.json +147 -22
  21. package/data/actions/sagemaker.json +110 -0
  22. package/data/actions/securityagent.json +503 -0
  23. package/data/actions/transform-custom.json +274 -0
  24. package/data/actions/transform.json +72 -0
  25. package/data/conditionKeys/aidevops.json +22 -0
  26. package/data/conditionKeys/aws-mcp.json +1 -0
  27. package/data/conditionKeys/bedrock-agentcore.json +0 -5
  28. package/data/conditionKeys/bedrock-mantle.json +17 -0
  29. package/data/conditionKeys/connect.json +10 -0
  30. package/data/conditionKeys/observabilityadmin.json +5 -0
  31. package/data/conditionKeys/partnercentral-account-management.json +12 -1
  32. package/data/conditionKeys/partnercentral.json +15 -0
  33. package/data/conditionKeys/route53globalresolver.json +17 -0
  34. package/data/conditionKeys/s3tables.json +5 -0
  35. package/data/conditionKeys/s3vectors.json +20 -0
  36. package/data/conditionKeys/securityagent.json +1 -0
  37. package/data/conditionKeys/transform-custom.json +17 -0
  38. package/data/conditionPatterns.json +4 -0
  39. package/data/resourceTypes/aidevops.json +24 -0
  40. package/data/resourceTypes/aws-mcp.json +1 -0
  41. package/data/resourceTypes/bedrock-agentcore.json +20 -0
  42. package/data/resourceTypes/bedrock-mantle.json +6 -0
  43. package/data/resourceTypes/connect.json +18 -0
  44. package/data/resourceTypes/eks.json +7 -0
  45. package/data/resourceTypes/lambda.json +11 -0
  46. package/data/resourceTypes/mediaconnect.json +41 -12
  47. package/data/resourceTypes/observabilityadmin.json +14 -0
  48. package/data/resourceTypes/partnercentral.json +42 -0
  49. package/data/resourceTypes/route53globalresolver.json +37 -0
  50. package/data/resourceTypes/s3vectors.json +10 -2
  51. package/data/resourceTypes/sagemaker.json +8 -0
  52. package/data/resourceTypes/securityagent.json +38 -0
  53. package/data/resourceTypes/transform-custom.json +18 -0
  54. package/data/serviceNames.json +6 -0
  55. package/data/services.json +6 -0
  56. package/package.json +2 -2
@@ -14,6 +14,14 @@
14
14
  "conditionKeys": [],
15
15
  "dependentActions": []
16
16
  },
17
+ "associatesourcetos3tableintegration": {
18
+ "name": "AssociateSourceToS3TableIntegration",
19
+ "description": "Grants permission to associate a log source to an S3 Tables integration",
20
+ "accessLevel": "Write",
21
+ "resourceTypes": [],
22
+ "conditionKeys": [],
23
+ "dependentActions": []
24
+ },
17
25
  "cancelexporttask": {
18
26
  "name": "CancelExportTask",
19
27
  "description": "Grants permission to cancel an export task if it is in PENDING or RUNNING state",
@@ -328,6 +336,15 @@
328
336
  "conditionKeys": [],
329
337
  "dependentActions": []
330
338
  },
339
+ "deletepipelinerule": {
340
+ "name": "DeletePipelineRule",
341
+ "isPermissionOnly": true,
342
+ "description": "Grants permission to delete telemetry pipeline",
343
+ "accessLevel": "Write",
344
+ "resourceTypes": [],
345
+ "conditionKeys": [],
346
+ "dependentActions": []
347
+ },
331
348
  "deletequerydefinition": {
332
349
  "name": "DeleteQueryDefinition",
333
350
  "description": "Grants permission to delete a saved CloudWatch Logs Insights query definition",
@@ -568,6 +585,14 @@
568
585
  "conditionKeys": [],
569
586
  "dependentActions": []
570
587
  },
588
+ "disassociatesourcefroms3tableintegration": {
589
+ "name": "DisassociateSourceFromS3TableIntegration",
590
+ "description": "Grants permission to disassociate a log source from an S3 Tables integration",
591
+ "accessLevel": "Write",
592
+ "resourceTypes": [],
593
+ "conditionKeys": [],
594
+ "dependentActions": []
595
+ },
571
596
  "filterlogevents": {
572
597
  "name": "FilterLogEvents",
573
598
  "description": "Grants permission to retrieve log events, optionally filtered by a filter pattern from the specified log group",
@@ -705,6 +730,14 @@
705
730
  "conditionKeys": [],
706
731
  "dependentActions": []
707
732
  },
733
+ "getlogfields": {
734
+ "name": "GetLogFields",
735
+ "description": "Grants permission to retrieve a list of log fields for a data source",
736
+ "accessLevel": "Read",
737
+ "resourceTypes": [],
738
+ "conditionKeys": [],
739
+ "dependentActions": []
740
+ },
708
741
  "getloggroupfields": {
709
742
  "name": "GetLogGroupFields",
710
743
  "description": "Grants permission to return a list of the fields that are included in log events in the specified log group, along with the percentage of log events that contain each field",
@@ -795,6 +828,22 @@
795
828
  "conditionKeys": [],
796
829
  "dependentActions": []
797
830
  },
831
+ "integratewiths3table": {
832
+ "name": "IntegrateWithS3Table",
833
+ "isPermissionOnly": true,
834
+ "description": "Grants permission to deliver log events to S3 Tables",
835
+ "accessLevel": "Write",
836
+ "resourceTypes": [
837
+ {
838
+ "name": "log-group",
839
+ "required": true,
840
+ "conditionKeys": [],
841
+ "dependentActions": []
842
+ }
843
+ ],
844
+ "conditionKeys": [],
845
+ "dependentActions": []
846
+ },
798
847
  "link": {
799
848
  "name": "Link",
800
849
  "isPermissionOnly": true,
@@ -804,6 +853,14 @@
804
853
  "conditionKeys": [],
805
854
  "dependentActions": []
806
855
  },
856
+ "listaggregateloggroupsummaries": {
857
+ "name": "ListAggregateLogGroupSummaries",
858
+ "description": "Grants permission to return an aggregate summary of all log groups in the region grouped by specified data-source characteristics",
859
+ "accessLevel": "List",
860
+ "resourceTypes": [],
861
+ "conditionKeys": [],
862
+ "dependentActions": []
863
+ },
807
864
  "listanomalies": {
808
865
  "name": "ListAnomalies",
809
866
  "description": "Grants permission to list all anomalies detected in the AWS account making the request",
@@ -893,6 +950,14 @@
893
950
  "conditionKeys": [],
894
951
  "dependentActions": []
895
952
  },
953
+ "listsourcesfors3tableintegration": {
954
+ "name": "ListSourcesForS3TableIntegration",
955
+ "description": "Grants permission to return all log sources associated with an S3 Tables integration",
956
+ "accessLevel": "List",
957
+ "resourceTypes": [],
958
+ "conditionKeys": [],
959
+ "dependentActions": []
960
+ },
896
961
  "listtagsforresource": {
897
962
  "name": "ListTagsForResource",
898
963
  "description": "Grants permission to list the tags for the specified resource",
@@ -953,6 +1018,22 @@
953
1018
  "conditionKeys": [],
954
1019
  "dependentActions": []
955
1020
  },
1021
+ "processwithpipeline": {
1022
+ "name": "ProcessWithPipeline",
1023
+ "isPermissionOnly": true,
1024
+ "description": "Grants permission to process and transform log events through pipeline transformers before storage",
1025
+ "accessLevel": "Write",
1026
+ "resourceTypes": [
1027
+ {
1028
+ "name": "log-group",
1029
+ "required": true,
1030
+ "conditionKeys": [],
1031
+ "dependentActions": []
1032
+ }
1033
+ ],
1034
+ "conditionKeys": [],
1035
+ "dependentActions": []
1036
+ },
956
1037
  "putaccountpolicy": {
957
1038
  "name": "PutAccountPolicy",
958
1039
  "description": "Grants permission to attach an account policy",
@@ -1125,6 +1206,15 @@
1125
1206
  "conditionKeys": [],
1126
1207
  "dependentActions": []
1127
1208
  },
1209
+ "putpipelinerule": {
1210
+ "name": "PutPipelineRule",
1211
+ "isPermissionOnly": true,
1212
+ "description": "Grants permission to create telemetry pipeline",
1213
+ "accessLevel": "Write",
1214
+ "resourceTypes": [],
1215
+ "conditionKeys": [],
1216
+ "dependentActions": []
1217
+ },
1128
1218
  "putquerydefinition": {
1129
1219
  "name": "PutQueryDefinition",
1130
1220
  "description": "Grants permission to create or update a query definition",