@cloud-copilot/iam-data 0.9.202411251 → 0.9.202412071

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (80) hide show
  1. package/data/actions/aiops.json +384 -0
  2. package/data/actions/aoss.json +9 -2
  3. package/data/actions/bedrock.json +576 -2
  4. package/data/actions/chime.json +95 -1
  5. package/data/actions/cleanrooms.json +1 -0
  6. package/data/actions/config.json +146 -14
  7. package/data/actions/connect-campaigns.json +15 -0
  8. package/data/actions/connect.json +40 -1
  9. package/data/actions/datazone.json +0 -5
  10. package/data/actions/dsql.json +191 -0
  11. package/data/actions/eks.json +8 -2
  12. package/data/actions/es.json +99 -3
  13. package/data/actions/glue.json +75 -0
  14. package/data/actions/imagebuilder.json +15 -0
  15. package/data/actions/invoicing.json +136 -0
  16. package/data/actions/logs.json +32 -0
  17. package/data/actions/memorydb.json +162 -0
  18. package/data/actions/networkflowmonitor.json +393 -0
  19. package/data/actions/networkmanager.json +59 -0
  20. package/data/actions/observabilityadmin.json +66 -0
  21. package/data/actions/opensearch.json +60 -0
  22. package/data/actions/partnercentral.json +256 -0
  23. package/data/actions/qapps.json +0 -4
  24. package/data/actions/qbusiness.json +377 -0
  25. package/data/actions/quicksight.json +79 -0
  26. package/data/actions/redshift-data.json +19 -2
  27. package/data/actions/redshift-serverless.json +23 -0
  28. package/data/actions/redshift.json +16 -0
  29. package/data/actions/rekognition.json +58 -11
  30. package/data/actions/s3.json +71 -0
  31. package/data/actions/s3tables.json +461 -0
  32. package/data/actions/sagemaker-data-science-assistant.json +11 -0
  33. package/data/actions/sagemaker.json +371 -9
  34. package/data/actions/security-ir.json +344 -0
  35. package/data/actions/transfer.json +127 -0
  36. package/data/actions/vpc-lattice.json +423 -44
  37. package/data/actions/vpce.json +11 -0
  38. package/data/conditionKeys/aiops.json +17 -0
  39. package/data/conditionKeys/bedrock.json +5 -0
  40. package/data/conditionKeys/config.json +5 -0
  41. package/data/conditionKeys/dsql.json +22 -0
  42. package/data/conditionKeys/eks.json +15 -0
  43. package/data/conditionKeys/invoicing.json +17 -1
  44. package/data/conditionKeys/networkflowmonitor.json +17 -0
  45. package/data/conditionKeys/networkmanager.json +10 -0
  46. package/data/conditionKeys/observabilityadmin.json +1 -0
  47. package/data/conditionKeys/redshift-data.json +5 -0
  48. package/data/conditionKeys/redshift-serverless.json +5 -0
  49. package/data/conditionKeys/s3express.json +5 -0
  50. package/data/conditionKeys/s3tables.json +12 -0
  51. package/data/conditionKeys/sagemaker-data-science-assistant.json +1 -0
  52. package/data/conditionKeys/security-ir.json +17 -0
  53. package/data/conditionKeys/vpc-lattice.json +10 -0
  54. package/data/conditionKeys/vpce.json +1 -0
  55. package/data/resourceTypes/aiops.json +9 -0
  56. package/data/resourceTypes/bedrock.json +27 -0
  57. package/data/resourceTypes/config.json +7 -0
  58. package/data/resourceTypes/dsql.json +9 -0
  59. package/data/resourceTypes/es.json +7 -0
  60. package/data/resourceTypes/invoicing.json +9 -1
  61. package/data/resourceTypes/memorydb.json +12 -0
  62. package/data/resourceTypes/networkflowmonitor.json +16 -0
  63. package/data/resourceTypes/observabilityadmin.json +1 -0
  64. package/data/resourceTypes/opensearch.json +4 -0
  65. package/data/resourceTypes/partnercentral.json +12 -0
  66. package/data/resourceTypes/personalize.json +3 -3
  67. package/data/resourceTypes/qbusiness.json +14 -0
  68. package/data/resourceTypes/redshift-data.json +4 -0
  69. package/data/resourceTypes/redshift-serverless.json +4 -0
  70. package/data/resourceTypes/rekognition.json +8 -2
  71. package/data/resourceTypes/s3tables.json +14 -0
  72. package/data/resourceTypes/sagemaker-data-science-assistant.json +1 -0
  73. package/data/resourceTypes/sagemaker.json +32 -0
  74. package/data/resourceTypes/security-ir.json +16 -0
  75. package/data/resourceTypes/transfer.json +7 -0
  76. package/data/resourceTypes/vpc-lattice.json +76 -35
  77. package/data/resourceTypes/vpce.json +1 -0
  78. package/data/serviceNames.json +8 -0
  79. package/data/services.json +8 -0
  80. package/package.json +2 -2
@@ -0,0 +1,384 @@
1
+ {
2
+ "createinvestigation": {
3
+ "name": "CreateInvestigation",
4
+ "description": "Grants permission to create a new investigation in the specified investigation group",
5
+ "accessLevel": "Write",
6
+ "resourceTypes": [
7
+ {
8
+ "name": "investigation-group",
9
+ "required": true,
10
+ "conditionKeys": [],
11
+ "dependentActions": []
12
+ }
13
+ ],
14
+ "conditionKeys": [],
15
+ "dependentActions": [
16
+ "kms:Decrypt",
17
+ "kms:GenerateDataKey",
18
+ "sts:SetContext"
19
+ ]
20
+ },
21
+ "createinvestigationevent": {
22
+ "name": "CreateInvestigationEvent",
23
+ "description": "Grants permission to create a new investigation event in the specified investigation group",
24
+ "accessLevel": "Write",
25
+ "resourceTypes": [
26
+ {
27
+ "name": "investigation-group",
28
+ "required": true,
29
+ "conditionKeys": [],
30
+ "dependentActions": []
31
+ }
32
+ ],
33
+ "conditionKeys": [],
34
+ "dependentActions": [
35
+ "kms:Decrypt",
36
+ "kms:GenerateDataKey",
37
+ "sts:SetContext"
38
+ ]
39
+ },
40
+ "createinvestigationgroup": {
41
+ "name": "CreateInvestigationGroup",
42
+ "description": "Grants permission to create a new investigation group",
43
+ "accessLevel": "Write",
44
+ "resourceTypes": [],
45
+ "conditionKeys": [
46
+ "aws:TagKeys",
47
+ "aws:RequestTag/${TagKey}"
48
+ ],
49
+ "dependentActions": [
50
+ "aiops:TagResource",
51
+ "cloudtrail:DescribeTrails",
52
+ "iam:PassRole",
53
+ "kms:Decrypt",
54
+ "kms:DescribeKey",
55
+ "kms:GenerateDataKey",
56
+ "sso:CreateApplication",
57
+ "sso:DeleteApplication",
58
+ "sso:PutApplicationAccessScope",
59
+ "sso:PutApplicationAssignmentConfiguration",
60
+ "sso:PutApplicationAuthenticationMethod",
61
+ "sso:PutApplicationGrant",
62
+ "sso:TagResource"
63
+ ]
64
+ },
65
+ "createinvestigationresource": {
66
+ "name": "CreateInvestigationResource",
67
+ "description": "Grants permission to create an investigation resource in the specified investigation group",
68
+ "accessLevel": "Write",
69
+ "resourceTypes": [
70
+ {
71
+ "name": "investigation-group",
72
+ "required": true,
73
+ "conditionKeys": [],
74
+ "dependentActions": []
75
+ }
76
+ ],
77
+ "conditionKeys": [],
78
+ "dependentActions": [
79
+ "cloudwatch:DescribeAlarmHistory",
80
+ "cloudwatch:DescribeAlarms",
81
+ "cloudwatch:GetInsightRuleReport",
82
+ "cloudwatch:GetMetricData",
83
+ "kms:GenerateDataKey",
84
+ "logs:GetQueryResults"
85
+ ]
86
+ },
87
+ "deleteinvestigation": {
88
+ "name": "DeleteInvestigation",
89
+ "description": "Grants permission to delete an investigation in the specified investigation group",
90
+ "accessLevel": "Write",
91
+ "resourceTypes": [
92
+ {
93
+ "name": "investigation-group",
94
+ "required": true,
95
+ "conditionKeys": [],
96
+ "dependentActions": []
97
+ }
98
+ ],
99
+ "conditionKeys": [],
100
+ "dependentActions": [
101
+ "sts:SetContext"
102
+ ]
103
+ },
104
+ "deleteinvestigationgroup": {
105
+ "name": "DeleteInvestigationGroup",
106
+ "description": "Grants permission to delete the specified investigation group",
107
+ "accessLevel": "Write",
108
+ "resourceTypes": [
109
+ {
110
+ "name": "investigation-group",
111
+ "required": true,
112
+ "conditionKeys": [],
113
+ "dependentActions": []
114
+ }
115
+ ],
116
+ "conditionKeys": [],
117
+ "dependentActions": [
118
+ "sso:DeleteApplication"
119
+ ]
120
+ },
121
+ "deleteinvestigationgrouppolicy": {
122
+ "name": "DeleteInvestigationGroupPolicy",
123
+ "description": "Grants permission to delete the investigation group policy attached to an investigation group",
124
+ "accessLevel": "Write",
125
+ "resourceTypes": [
126
+ {
127
+ "name": "investigation-group",
128
+ "required": true,
129
+ "conditionKeys": [],
130
+ "dependentActions": []
131
+ }
132
+ ],
133
+ "conditionKeys": [],
134
+ "dependentActions": []
135
+ },
136
+ "getinvestigation": {
137
+ "name": "GetInvestigation",
138
+ "description": "Grants permission to retrieve an investigation in the specified investigation group",
139
+ "accessLevel": "Read",
140
+ "resourceTypes": [
141
+ {
142
+ "name": "investigation-group",
143
+ "required": true,
144
+ "conditionKeys": [],
145
+ "dependentActions": []
146
+ }
147
+ ],
148
+ "conditionKeys": [],
149
+ "dependentActions": []
150
+ },
151
+ "getinvestigationevent": {
152
+ "name": "GetInvestigationEvent",
153
+ "description": "Grants permission to retrieve an investigation event in the specified investigation group",
154
+ "accessLevel": "Read",
155
+ "resourceTypes": [
156
+ {
157
+ "name": "investigation-group",
158
+ "required": true,
159
+ "conditionKeys": [],
160
+ "dependentActions": []
161
+ }
162
+ ],
163
+ "conditionKeys": [],
164
+ "dependentActions": [
165
+ "kms:Decrypt"
166
+ ]
167
+ },
168
+ "getinvestigationgroup": {
169
+ "name": "GetInvestigationGroup",
170
+ "description": "Grants permission to retrieve the specified investigation group",
171
+ "accessLevel": "Read",
172
+ "resourceTypes": [
173
+ {
174
+ "name": "investigation-group",
175
+ "required": true,
176
+ "conditionKeys": [],
177
+ "dependentActions": []
178
+ }
179
+ ],
180
+ "conditionKeys": [],
181
+ "dependentActions": []
182
+ },
183
+ "getinvestigationgrouppolicy": {
184
+ "name": "GetInvestigationGroupPolicy",
185
+ "description": "Grants permission to retrieve the investigation group policy attached to an investigation group",
186
+ "accessLevel": "Read",
187
+ "resourceTypes": [
188
+ {
189
+ "name": "investigation-group",
190
+ "required": true,
191
+ "conditionKeys": [],
192
+ "dependentActions": []
193
+ }
194
+ ],
195
+ "conditionKeys": [],
196
+ "dependentActions": []
197
+ },
198
+ "getinvestigationresource": {
199
+ "name": "GetInvestigationResource",
200
+ "description": "Grants permission to retrieve an investigation resource in the specified investigation group",
201
+ "accessLevel": "Read",
202
+ "resourceTypes": [
203
+ {
204
+ "name": "investigation-group",
205
+ "required": true,
206
+ "conditionKeys": [],
207
+ "dependentActions": []
208
+ }
209
+ ],
210
+ "conditionKeys": [],
211
+ "dependentActions": [
212
+ "kms:Decrypt"
213
+ ]
214
+ },
215
+ "listinvestigationevents": {
216
+ "name": "ListInvestigationEvents",
217
+ "description": "Grants permission to list all investigation events in the specified investigation group",
218
+ "accessLevel": "List",
219
+ "resourceTypes": [
220
+ {
221
+ "name": "investigation-group",
222
+ "required": true,
223
+ "conditionKeys": [],
224
+ "dependentActions": []
225
+ }
226
+ ],
227
+ "conditionKeys": [],
228
+ "dependentActions": []
229
+ },
230
+ "listinvestigationgroups": {
231
+ "name": "ListInvestigationGroups",
232
+ "description": "Grants permission to list all investigation groups in the AWS account making the request",
233
+ "accessLevel": "List",
234
+ "resourceTypes": [],
235
+ "conditionKeys": [],
236
+ "dependentActions": []
237
+ },
238
+ "listinvestigations": {
239
+ "name": "ListInvestigations",
240
+ "description": "Grants permission to list all investigations that are in the specified investigation group",
241
+ "accessLevel": "List",
242
+ "resourceTypes": [
243
+ {
244
+ "name": "investigation-group",
245
+ "required": true,
246
+ "conditionKeys": [],
247
+ "dependentActions": []
248
+ }
249
+ ],
250
+ "conditionKeys": [],
251
+ "dependentActions": []
252
+ },
253
+ "listtagsforresource": {
254
+ "name": "ListTagsForResource",
255
+ "description": "Grants permission to list the tags for the specified resource",
256
+ "accessLevel": "List",
257
+ "resourceTypes": [
258
+ {
259
+ "name": "investigation-group",
260
+ "required": true,
261
+ "conditionKeys": [],
262
+ "dependentActions": []
263
+ }
264
+ ],
265
+ "conditionKeys": [],
266
+ "dependentActions": []
267
+ },
268
+ "putinvestigationgrouppolicy": {
269
+ "name": "PutInvestigationGroupPolicy",
270
+ "description": "Grants permission to create/update the investigation group policy attached to an investigation group",
271
+ "accessLevel": "Write",
272
+ "resourceTypes": [
273
+ {
274
+ "name": "investigation-group",
275
+ "required": true,
276
+ "conditionKeys": [],
277
+ "dependentActions": []
278
+ }
279
+ ],
280
+ "conditionKeys": [],
281
+ "dependentActions": []
282
+ },
283
+ "tagresource": {
284
+ "name": "TagResource",
285
+ "description": "Grants permission to add or update the specified tags for the specified resource",
286
+ "accessLevel": "Tagging",
287
+ "resourceTypes": [
288
+ {
289
+ "name": "investigation-group",
290
+ "required": true,
291
+ "conditionKeys": [],
292
+ "dependentActions": []
293
+ }
294
+ ],
295
+ "conditionKeys": [
296
+ "aws:TagKeys",
297
+ "aws:RequestTag/${TagKey}"
298
+ ],
299
+ "dependentActions": []
300
+ },
301
+ "untagresource": {
302
+ "name": "UntagResource",
303
+ "description": "Grants permission to remove the specified tags from the specified resource",
304
+ "accessLevel": "Tagging",
305
+ "resourceTypes": [
306
+ {
307
+ "name": "investigation-group",
308
+ "required": true,
309
+ "conditionKeys": [],
310
+ "dependentActions": []
311
+ }
312
+ ],
313
+ "conditionKeys": [
314
+ "aws:TagKeys"
315
+ ],
316
+ "dependentActions": []
317
+ },
318
+ "updateinvestigation": {
319
+ "name": "UpdateInvestigation",
320
+ "description": "Grants permission to update an investigation in the specified investigation group",
321
+ "accessLevel": "Write",
322
+ "resourceTypes": [
323
+ {
324
+ "name": "investigation-group",
325
+ "required": true,
326
+ "conditionKeys": [],
327
+ "dependentActions": []
328
+ }
329
+ ],
330
+ "conditionKeys": [],
331
+ "dependentActions": [
332
+ "kms:Decrypt",
333
+ "kms:GenerateDataKey",
334
+ "sts:SetContext"
335
+ ]
336
+ },
337
+ "updateinvestigationevent": {
338
+ "name": "UpdateInvestigationEvent",
339
+ "description": "Grants permission to update an investigation event in the specified investigation group",
340
+ "accessLevel": "Write",
341
+ "resourceTypes": [
342
+ {
343
+ "name": "investigation-group",
344
+ "required": true,
345
+ "conditionKeys": [],
346
+ "dependentActions": []
347
+ }
348
+ ],
349
+ "conditionKeys": [],
350
+ "dependentActions": [
351
+ "kms:Decrypt",
352
+ "kms:GenerateDataKey",
353
+ "sts:SetContext"
354
+ ]
355
+ },
356
+ "updateinvestigationgroup": {
357
+ "name": "UpdateInvestigationGroup",
358
+ "description": "Grants permission to update the specified investigation group",
359
+ "accessLevel": "Write",
360
+ "resourceTypes": [
361
+ {
362
+ "name": "investigation-group",
363
+ "required": true,
364
+ "conditionKeys": [],
365
+ "dependentActions": []
366
+ }
367
+ ],
368
+ "conditionKeys": [],
369
+ "dependentActions": [
370
+ "cloudtrail:DescribeTrails",
371
+ "iam:PassRole",
372
+ "kms:Decrypt",
373
+ "kms:DescribeKey",
374
+ "kms:GenerateDataKey",
375
+ "sso:CreateApplication",
376
+ "sso:DeleteApplication",
377
+ "sso:PutApplicationAccessScope",
378
+ "sso:PutApplicationAssignmentConfiguration",
379
+ "sso:PutApplicationAuthenticationMethod",
380
+ "sso:PutApplicationGrant",
381
+ "sso:TagResource"
382
+ ]
383
+ }
384
+ }
@@ -11,7 +11,10 @@
11
11
  "dependentActions": []
12
12
  }
13
13
  ],
14
- "conditionKeys": [],
14
+ "conditionKeys": [
15
+ "aoss:collection",
16
+ "aoss:CollectionId"
17
+ ],
15
18
  "dependentActions": []
16
19
  },
17
20
  "batchgetcollection": {
@@ -117,7 +120,10 @@
117
120
  "dependentActions": []
118
121
  }
119
122
  ],
120
- "conditionKeys": [],
123
+ "conditionKeys": [
124
+ "aoss:collection",
125
+ "aoss:CollectionId"
126
+ ],
121
127
  "dependentActions": []
122
128
  },
123
129
  "deleteaccesspolicy": {
@@ -290,6 +296,7 @@
290
296
  "accessLevel": "Write",
291
297
  "resourceTypes": [],
292
298
  "conditionKeys": [
299
+ "aws:ResourceTag/${TagKey}",
293
300
  "aws:RequestTag/${TagKey}",
294
301
  "aws:TagKeys"
295
302
  ],