@cloud-copilot/iam-data 0.9.202411261 → 0.9.202412071

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (73) hide show
  1. package/data/actions/aiops.json +384 -0
  2. package/data/actions/aoss.json +1 -0
  3. package/data/actions/bedrock.json +576 -2
  4. package/data/actions/chime.json +95 -1
  5. package/data/actions/cleanrooms.json +1 -0
  6. package/data/actions/config.json +146 -14
  7. package/data/actions/connect-campaigns.json +15 -0
  8. package/data/actions/connect.json +40 -1
  9. package/data/actions/datazone.json +0 -5
  10. package/data/actions/dsql.json +191 -0
  11. package/data/actions/eks.json +8 -2
  12. package/data/actions/es.json +99 -3
  13. package/data/actions/glue.json +75 -0
  14. package/data/actions/imagebuilder.json +15 -0
  15. package/data/actions/invoicing.json +136 -0
  16. package/data/actions/logs.json +32 -0
  17. package/data/actions/memorydb.json +162 -0
  18. package/data/actions/networkflowmonitor.json +393 -0
  19. package/data/actions/observabilityadmin.json +66 -0
  20. package/data/actions/opensearch.json +60 -0
  21. package/data/actions/partnercentral.json +256 -0
  22. package/data/actions/qapps.json +0 -4
  23. package/data/actions/qbusiness.json +377 -0
  24. package/data/actions/quicksight.json +79 -0
  25. package/data/actions/redshift-serverless.json +8 -0
  26. package/data/actions/redshift.json +16 -0
  27. package/data/actions/rekognition.json +58 -11
  28. package/data/actions/s3.json +71 -0
  29. package/data/actions/s3tables.json +461 -0
  30. package/data/actions/sagemaker-data-science-assistant.json +11 -0
  31. package/data/actions/sagemaker.json +371 -9
  32. package/data/actions/security-ir.json +344 -0
  33. package/data/actions/transfer.json +127 -0
  34. package/data/actions/vpc-lattice.json +423 -44
  35. package/data/actions/vpce.json +11 -0
  36. package/data/conditionKeys/aiops.json +17 -0
  37. package/data/conditionKeys/bedrock.json +5 -0
  38. package/data/conditionKeys/config.json +5 -0
  39. package/data/conditionKeys/dsql.json +22 -0
  40. package/data/conditionKeys/eks.json +15 -0
  41. package/data/conditionKeys/invoicing.json +17 -1
  42. package/data/conditionKeys/networkflowmonitor.json +17 -0
  43. package/data/conditionKeys/observabilityadmin.json +1 -0
  44. package/data/conditionKeys/s3express.json +5 -0
  45. package/data/conditionKeys/s3tables.json +12 -0
  46. package/data/conditionKeys/sagemaker-data-science-assistant.json +1 -0
  47. package/data/conditionKeys/security-ir.json +17 -0
  48. package/data/conditionKeys/vpc-lattice.json +10 -0
  49. package/data/conditionKeys/vpce.json +1 -0
  50. package/data/resourceTypes/aiops.json +9 -0
  51. package/data/resourceTypes/bedrock.json +27 -0
  52. package/data/resourceTypes/config.json +7 -0
  53. package/data/resourceTypes/dsql.json +9 -0
  54. package/data/resourceTypes/es.json +7 -0
  55. package/data/resourceTypes/invoicing.json +9 -1
  56. package/data/resourceTypes/memorydb.json +12 -0
  57. package/data/resourceTypes/networkflowmonitor.json +16 -0
  58. package/data/resourceTypes/observabilityadmin.json +1 -0
  59. package/data/resourceTypes/opensearch.json +4 -0
  60. package/data/resourceTypes/partnercentral.json +12 -0
  61. package/data/resourceTypes/personalize.json +3 -3
  62. package/data/resourceTypes/qbusiness.json +14 -0
  63. package/data/resourceTypes/rekognition.json +8 -2
  64. package/data/resourceTypes/s3tables.json +14 -0
  65. package/data/resourceTypes/sagemaker-data-science-assistant.json +1 -0
  66. package/data/resourceTypes/sagemaker.json +32 -0
  67. package/data/resourceTypes/security-ir.json +16 -0
  68. package/data/resourceTypes/transfer.json +7 -0
  69. package/data/resourceTypes/vpc-lattice.json +76 -35
  70. package/data/resourceTypes/vpce.json +1 -0
  71. package/data/serviceNames.json +8 -0
  72. package/data/services.json +8 -0
  73. package/package.json +2 -2
@@ -0,0 +1,384 @@
1
+ {
2
+ "createinvestigation": {
3
+ "name": "CreateInvestigation",
4
+ "description": "Grants permission to create a new investigation in the specified investigation group",
5
+ "accessLevel": "Write",
6
+ "resourceTypes": [
7
+ {
8
+ "name": "investigation-group",
9
+ "required": true,
10
+ "conditionKeys": [],
11
+ "dependentActions": []
12
+ }
13
+ ],
14
+ "conditionKeys": [],
15
+ "dependentActions": [
16
+ "kms:Decrypt",
17
+ "kms:GenerateDataKey",
18
+ "sts:SetContext"
19
+ ]
20
+ },
21
+ "createinvestigationevent": {
22
+ "name": "CreateInvestigationEvent",
23
+ "description": "Grants permission to create a new investigation event in the specified investigation group",
24
+ "accessLevel": "Write",
25
+ "resourceTypes": [
26
+ {
27
+ "name": "investigation-group",
28
+ "required": true,
29
+ "conditionKeys": [],
30
+ "dependentActions": []
31
+ }
32
+ ],
33
+ "conditionKeys": [],
34
+ "dependentActions": [
35
+ "kms:Decrypt",
36
+ "kms:GenerateDataKey",
37
+ "sts:SetContext"
38
+ ]
39
+ },
40
+ "createinvestigationgroup": {
41
+ "name": "CreateInvestigationGroup",
42
+ "description": "Grants permission to create a new investigation group",
43
+ "accessLevel": "Write",
44
+ "resourceTypes": [],
45
+ "conditionKeys": [
46
+ "aws:TagKeys",
47
+ "aws:RequestTag/${TagKey}"
48
+ ],
49
+ "dependentActions": [
50
+ "aiops:TagResource",
51
+ "cloudtrail:DescribeTrails",
52
+ "iam:PassRole",
53
+ "kms:Decrypt",
54
+ "kms:DescribeKey",
55
+ "kms:GenerateDataKey",
56
+ "sso:CreateApplication",
57
+ "sso:DeleteApplication",
58
+ "sso:PutApplicationAccessScope",
59
+ "sso:PutApplicationAssignmentConfiguration",
60
+ "sso:PutApplicationAuthenticationMethod",
61
+ "sso:PutApplicationGrant",
62
+ "sso:TagResource"
63
+ ]
64
+ },
65
+ "createinvestigationresource": {
66
+ "name": "CreateInvestigationResource",
67
+ "description": "Grants permission to create an investigation resource in the specified investigation group",
68
+ "accessLevel": "Write",
69
+ "resourceTypes": [
70
+ {
71
+ "name": "investigation-group",
72
+ "required": true,
73
+ "conditionKeys": [],
74
+ "dependentActions": []
75
+ }
76
+ ],
77
+ "conditionKeys": [],
78
+ "dependentActions": [
79
+ "cloudwatch:DescribeAlarmHistory",
80
+ "cloudwatch:DescribeAlarms",
81
+ "cloudwatch:GetInsightRuleReport",
82
+ "cloudwatch:GetMetricData",
83
+ "kms:GenerateDataKey",
84
+ "logs:GetQueryResults"
85
+ ]
86
+ },
87
+ "deleteinvestigation": {
88
+ "name": "DeleteInvestigation",
89
+ "description": "Grants permission to delete an investigation in the specified investigation group",
90
+ "accessLevel": "Write",
91
+ "resourceTypes": [
92
+ {
93
+ "name": "investigation-group",
94
+ "required": true,
95
+ "conditionKeys": [],
96
+ "dependentActions": []
97
+ }
98
+ ],
99
+ "conditionKeys": [],
100
+ "dependentActions": [
101
+ "sts:SetContext"
102
+ ]
103
+ },
104
+ "deleteinvestigationgroup": {
105
+ "name": "DeleteInvestigationGroup",
106
+ "description": "Grants permission to delete the specified investigation group",
107
+ "accessLevel": "Write",
108
+ "resourceTypes": [
109
+ {
110
+ "name": "investigation-group",
111
+ "required": true,
112
+ "conditionKeys": [],
113
+ "dependentActions": []
114
+ }
115
+ ],
116
+ "conditionKeys": [],
117
+ "dependentActions": [
118
+ "sso:DeleteApplication"
119
+ ]
120
+ },
121
+ "deleteinvestigationgrouppolicy": {
122
+ "name": "DeleteInvestigationGroupPolicy",
123
+ "description": "Grants permission to delete the investigation group policy attached to an investigation group",
124
+ "accessLevel": "Write",
125
+ "resourceTypes": [
126
+ {
127
+ "name": "investigation-group",
128
+ "required": true,
129
+ "conditionKeys": [],
130
+ "dependentActions": []
131
+ }
132
+ ],
133
+ "conditionKeys": [],
134
+ "dependentActions": []
135
+ },
136
+ "getinvestigation": {
137
+ "name": "GetInvestigation",
138
+ "description": "Grants permission to retrieve an investigation in the specified investigation group",
139
+ "accessLevel": "Read",
140
+ "resourceTypes": [
141
+ {
142
+ "name": "investigation-group",
143
+ "required": true,
144
+ "conditionKeys": [],
145
+ "dependentActions": []
146
+ }
147
+ ],
148
+ "conditionKeys": [],
149
+ "dependentActions": []
150
+ },
151
+ "getinvestigationevent": {
152
+ "name": "GetInvestigationEvent",
153
+ "description": "Grants permission to retrieve an investigation event in the specified investigation group",
154
+ "accessLevel": "Read",
155
+ "resourceTypes": [
156
+ {
157
+ "name": "investigation-group",
158
+ "required": true,
159
+ "conditionKeys": [],
160
+ "dependentActions": []
161
+ }
162
+ ],
163
+ "conditionKeys": [],
164
+ "dependentActions": [
165
+ "kms:Decrypt"
166
+ ]
167
+ },
168
+ "getinvestigationgroup": {
169
+ "name": "GetInvestigationGroup",
170
+ "description": "Grants permission to retrieve the specified investigation group",
171
+ "accessLevel": "Read",
172
+ "resourceTypes": [
173
+ {
174
+ "name": "investigation-group",
175
+ "required": true,
176
+ "conditionKeys": [],
177
+ "dependentActions": []
178
+ }
179
+ ],
180
+ "conditionKeys": [],
181
+ "dependentActions": []
182
+ },
183
+ "getinvestigationgrouppolicy": {
184
+ "name": "GetInvestigationGroupPolicy",
185
+ "description": "Grants permission to retrieve the investigation group policy attached to an investigation group",
186
+ "accessLevel": "Read",
187
+ "resourceTypes": [
188
+ {
189
+ "name": "investigation-group",
190
+ "required": true,
191
+ "conditionKeys": [],
192
+ "dependentActions": []
193
+ }
194
+ ],
195
+ "conditionKeys": [],
196
+ "dependentActions": []
197
+ },
198
+ "getinvestigationresource": {
199
+ "name": "GetInvestigationResource",
200
+ "description": "Grants permission to retrieve an investigation resource in the specified investigation group",
201
+ "accessLevel": "Read",
202
+ "resourceTypes": [
203
+ {
204
+ "name": "investigation-group",
205
+ "required": true,
206
+ "conditionKeys": [],
207
+ "dependentActions": []
208
+ }
209
+ ],
210
+ "conditionKeys": [],
211
+ "dependentActions": [
212
+ "kms:Decrypt"
213
+ ]
214
+ },
215
+ "listinvestigationevents": {
216
+ "name": "ListInvestigationEvents",
217
+ "description": "Grants permission to list all investigation events in the specified investigation group",
218
+ "accessLevel": "List",
219
+ "resourceTypes": [
220
+ {
221
+ "name": "investigation-group",
222
+ "required": true,
223
+ "conditionKeys": [],
224
+ "dependentActions": []
225
+ }
226
+ ],
227
+ "conditionKeys": [],
228
+ "dependentActions": []
229
+ },
230
+ "listinvestigationgroups": {
231
+ "name": "ListInvestigationGroups",
232
+ "description": "Grants permission to list all investigation groups in the AWS account making the request",
233
+ "accessLevel": "List",
234
+ "resourceTypes": [],
235
+ "conditionKeys": [],
236
+ "dependentActions": []
237
+ },
238
+ "listinvestigations": {
239
+ "name": "ListInvestigations",
240
+ "description": "Grants permission to list all investigations that are in the specified investigation group",
241
+ "accessLevel": "List",
242
+ "resourceTypes": [
243
+ {
244
+ "name": "investigation-group",
245
+ "required": true,
246
+ "conditionKeys": [],
247
+ "dependentActions": []
248
+ }
249
+ ],
250
+ "conditionKeys": [],
251
+ "dependentActions": []
252
+ },
253
+ "listtagsforresource": {
254
+ "name": "ListTagsForResource",
255
+ "description": "Grants permission to list the tags for the specified resource",
256
+ "accessLevel": "List",
257
+ "resourceTypes": [
258
+ {
259
+ "name": "investigation-group",
260
+ "required": true,
261
+ "conditionKeys": [],
262
+ "dependentActions": []
263
+ }
264
+ ],
265
+ "conditionKeys": [],
266
+ "dependentActions": []
267
+ },
268
+ "putinvestigationgrouppolicy": {
269
+ "name": "PutInvestigationGroupPolicy",
270
+ "description": "Grants permission to create/update the investigation group policy attached to an investigation group",
271
+ "accessLevel": "Write",
272
+ "resourceTypes": [
273
+ {
274
+ "name": "investigation-group",
275
+ "required": true,
276
+ "conditionKeys": [],
277
+ "dependentActions": []
278
+ }
279
+ ],
280
+ "conditionKeys": [],
281
+ "dependentActions": []
282
+ },
283
+ "tagresource": {
284
+ "name": "TagResource",
285
+ "description": "Grants permission to add or update the specified tags for the specified resource",
286
+ "accessLevel": "Tagging",
287
+ "resourceTypes": [
288
+ {
289
+ "name": "investigation-group",
290
+ "required": true,
291
+ "conditionKeys": [],
292
+ "dependentActions": []
293
+ }
294
+ ],
295
+ "conditionKeys": [
296
+ "aws:TagKeys",
297
+ "aws:RequestTag/${TagKey}"
298
+ ],
299
+ "dependentActions": []
300
+ },
301
+ "untagresource": {
302
+ "name": "UntagResource",
303
+ "description": "Grants permission to remove the specified tags from the specified resource",
304
+ "accessLevel": "Tagging",
305
+ "resourceTypes": [
306
+ {
307
+ "name": "investigation-group",
308
+ "required": true,
309
+ "conditionKeys": [],
310
+ "dependentActions": []
311
+ }
312
+ ],
313
+ "conditionKeys": [
314
+ "aws:TagKeys"
315
+ ],
316
+ "dependentActions": []
317
+ },
318
+ "updateinvestigation": {
319
+ "name": "UpdateInvestigation",
320
+ "description": "Grants permission to update an investigation in the specified investigation group",
321
+ "accessLevel": "Write",
322
+ "resourceTypes": [
323
+ {
324
+ "name": "investigation-group",
325
+ "required": true,
326
+ "conditionKeys": [],
327
+ "dependentActions": []
328
+ }
329
+ ],
330
+ "conditionKeys": [],
331
+ "dependentActions": [
332
+ "kms:Decrypt",
333
+ "kms:GenerateDataKey",
334
+ "sts:SetContext"
335
+ ]
336
+ },
337
+ "updateinvestigationevent": {
338
+ "name": "UpdateInvestigationEvent",
339
+ "description": "Grants permission to update an investigation event in the specified investigation group",
340
+ "accessLevel": "Write",
341
+ "resourceTypes": [
342
+ {
343
+ "name": "investigation-group",
344
+ "required": true,
345
+ "conditionKeys": [],
346
+ "dependentActions": []
347
+ }
348
+ ],
349
+ "conditionKeys": [],
350
+ "dependentActions": [
351
+ "kms:Decrypt",
352
+ "kms:GenerateDataKey",
353
+ "sts:SetContext"
354
+ ]
355
+ },
356
+ "updateinvestigationgroup": {
357
+ "name": "UpdateInvestigationGroup",
358
+ "description": "Grants permission to update the specified investigation group",
359
+ "accessLevel": "Write",
360
+ "resourceTypes": [
361
+ {
362
+ "name": "investigation-group",
363
+ "required": true,
364
+ "conditionKeys": [],
365
+ "dependentActions": []
366
+ }
367
+ ],
368
+ "conditionKeys": [],
369
+ "dependentActions": [
370
+ "cloudtrail:DescribeTrails",
371
+ "iam:PassRole",
372
+ "kms:Decrypt",
373
+ "kms:DescribeKey",
374
+ "kms:GenerateDataKey",
375
+ "sso:CreateApplication",
376
+ "sso:DeleteApplication",
377
+ "sso:PutApplicationAccessScope",
378
+ "sso:PutApplicationAssignmentConfiguration",
379
+ "sso:PutApplicationAuthenticationMethod",
380
+ "sso:PutApplicationGrant",
381
+ "sso:TagResource"
382
+ ]
383
+ }
384
+ }
@@ -296,6 +296,7 @@
296
296
  "accessLevel": "Write",
297
297
  "resourceTypes": [],
298
298
  "conditionKeys": [
299
+ "aws:ResourceTag/${TagKey}",
299
300
  "aws:RequestTag/${TagKey}",
300
301
  "aws:TagKeys"
301
302
  ],