@jjrawlins/cdk-ami-builder 0.0.18 → 0.0.20

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (279) hide show
  1. package/.jsii +3 -3
  2. package/cdk-ami-builder/jsii/jsii.go +2 -2
  3. package/cdk-ami-builder/version +1 -1
  4. package/lib/ImagePipeline/ImagePipeline.js +1 -1
  5. package/lib/Lambdas/CheckStateMachineStatus/CheckStateMachineStatus-function.js +1 -1
  6. package/lib/Lambdas/StartStateMachine/StartStateMachine-function.js +1 -1
  7. package/node_modules/cdk-iam-floyd/.claude/settings.local.json +30 -0
  8. package/node_modules/cdk-iam-floyd/CLAUDE.md +147 -0
  9. package/node_modules/cdk-iam-floyd/README.md +4 -4
  10. package/node_modules/cdk-iam-floyd/lib/generated/aws-managed-policies/cdk-iam-floyd.d.ts +62 -14
  11. package/node_modules/cdk-iam-floyd/lib/generated/aws-managed-policies/cdk-iam-floyd.js +124 -28
  12. package/node_modules/cdk-iam-floyd/lib/generated/aws-managed-policies/iam-floyd.d.ts +62 -14
  13. package/node_modules/cdk-iam-floyd/lib/generated/aws-managed-policies/iam-floyd.js +63 -15
  14. package/node_modules/cdk-iam-floyd/lib/generated/index.d.ts +8 -1
  15. package/node_modules/cdk-iam-floyd/lib/generated/index.js +26 -12
  16. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/aioperations.d.ts +25 -0
  17. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/aioperations.js +39 -8
  18. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/amplify.d.ts +0 -6
  19. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/amplify.js +1 -7
  20. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/apigatewaymanagement.d.ts +26 -0
  21. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/apigatewaymanagement.js +31 -1
  22. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/apigatewaymanagementv2.d.ts +169 -5
  23. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/apigatewaymanagementv2.js +203 -8
  24. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/appintegrations.d.ts +60 -0
  25. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/appintegrations.js +82 -1
  26. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/applicationmigrationservice.d.ts +12 -0
  27. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/applicationmigrationservice.js +13 -1
  28. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/applicationrecoverycontroller-zonalshift.d.ts +35 -0
  29. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/applicationrecoverycontroller-zonalshift.js +42 -1
  30. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/appstream2-0.d.ts +15 -15
  31. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/appstream2-0.js +22 -22
  32. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/appsync.d.ts +1 -1
  33. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/appsync.js +5 -3
  34. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/arcregionswitch.d.ts +277 -0
  35. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/arcregionswitch.js +370 -0
  36. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/artifact.d.ts +10 -25
  37. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/artifact.js +11 -34
  38. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/auditmanager.d.ts +22 -5
  39. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/auditmanager.js +23 -6
  40. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/auroradsql.d.ts +96 -24
  41. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/auroradsql.js +121 -30
  42. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/backup.d.ts +62 -1
  43. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/backup.js +80 -2
  44. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/backupsearch.d.ts +4 -0
  45. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/backupsearch.js +5 -1
  46. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/batch.d.ts +106 -0
  47. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/batch.js +137 -3
  48. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/bedrock.d.ts +471 -0
  49. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/bedrock.js +595 -1
  50. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/bedrockagentcore.d.ts +912 -0
  51. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/bedrockagentcore.js +1203 -0
  52. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/billing.d.ts +6 -0
  53. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/billing.js +10 -1
  54. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/billingandcostmanagementdashboards.d.ts +122 -0
  55. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/billingandcostmanagementdashboards.js +165 -0
  56. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/billingandcostmanagementrecommendedactions.d.ts +25 -0
  57. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/billingandcostmanagementrecommendedactions.js +36 -0
  58. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/braket.d.ts +6 -6
  59. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/braket.js +7 -10
  60. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/budgetservice.d.ts +6 -0
  61. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/budgetservice.js +7 -1
  62. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/certificatemanager.d.ts +30 -1
  63. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/certificatemanager.js +36 -2
  64. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/chatbot.d.ts +128 -1
  65. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/chatbot.js +134 -1
  66. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cleanrooms.d.ts +56 -0
  67. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cleanrooms.js +72 -1
  68. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cleanroomsml.d.ts +14 -0
  69. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cleanroomsml.js +18 -1
  70. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cloud9.d.ts +6 -8
  71. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cloud9.js +8 -13
  72. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cloudmap.d.ts +57 -0
  73. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cloudmap.js +69 -1
  74. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cloudtrail.d.ts +20 -0
  75. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cloudtrail.js +27 -1
  76. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cloudwatch.d.ts +8 -0
  77. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cloudwatch.js +12 -1
  78. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cloudwatchlogs.d.ts +8 -0
  79. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cloudwatchlogs.js +12 -1
  80. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cloudwatchobservabilityadminservice.d.ts +200 -9
  81. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cloudwatchobservabilityadminservice.js +258 -14
  82. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/codebuild.d.ts +1909 -4
  83. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/codebuild.js +2131 -6
  84. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/codepipeline.d.ts +8 -0
  85. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/codepipeline.js +12 -1
  86. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cognitouserpools.d.ts +8 -0
  87. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cognitouserpools.js +12 -1
  88. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/connect.d.ts +44 -0
  89. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/connect.js +52 -1
  90. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/connectcases.d.ts +9 -1
  91. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/connectcases.js +13 -2
  92. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/connectcustomerprofiles.d.ts +106 -0
  93. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/connectcustomerprofiles.js +142 -1
  94. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/connectoutboundcampaigns.d.ts +16 -0
  95. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/connectoutboundcampaigns.js +23 -1
  96. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/controlcatalog.d.ts +8 -0
  97. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/controlcatalog.js +12 -1
  98. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/costandusagereport.d.ts +3 -0
  99. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/costandusagereport.js +4 -1
  100. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/costexplorerservice.d.ts +24 -0
  101. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/costexplorerservice.js +31 -1
  102. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/dataexchange.d.ts +16 -0
  103. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/dataexchange.js +17 -1
  104. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/datazone.d.ts +57 -3
  105. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/datazone.js +89 -8
  106. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/deadlinecloud.d.ts +17 -0
  107. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/deadlinecloud.js +18 -1
  108. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/directoryservice.d.ts +142 -0
  109. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/directoryservice.js +173 -1
  110. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/dynamodb.d.ts +16 -0
  111. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/dynamodb.js +23 -1
  112. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/ec2.d.ts +521 -17
  113. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/ec2.js +580 -29
  114. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/ec2imagebuilder.d.ts +147 -62
  115. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/ec2imagebuilder.js +155 -70
  116. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/elasticblockstore.d.ts +2 -2
  117. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/elasticblockstore.js +4 -4
  118. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/elasticcontainerservice.d.ts +1 -30
  119. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/elasticcontainerservice.js +2 -31
  120. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/elastickubernetesservice.d.ts +47 -0
  121. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/elastickubernetesservice.js +62 -1
  122. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/elasticloadbalancing.d.ts +1 -1
  123. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/elasticloadbalancing.js +2 -2
  124. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/elasticmapreduce.d.ts +8 -0
  125. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/elasticmapreduce.js +12 -1
  126. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/elementalmediaconnect.d.ts +55 -55
  127. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/elementalmediaconnect.js +56 -56
  128. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/elementalmediaconvert.d.ts +8 -0
  129. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/elementalmediaconvert.js +12 -1
  130. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/emroneksemrcontainers.d.ts +2 -13
  131. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/emroneksemrcontainers.js +3 -16
  132. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/emrserverless.d.ts +8 -0
  133. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/emrserverless.js +12 -1
  134. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/endusermessagingsocial.d.ts +64 -0
  135. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/endusermessagingsocial.js +91 -3
  136. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/entityresolution.d.ts +8 -0
  137. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/entityresolution.js +12 -1
  138. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/eventbridge.d.ts +30 -0
  139. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/eventbridge.js +38 -1
  140. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/freetier.d.ts +32 -0
  141. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/freetier.js +48 -2
  142. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/fsx.d.ts +32 -0
  143. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/fsx.js +42 -1
  144. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/glue.d.ts +249 -0
  145. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/glue.js +264 -1
  146. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/gluedatabrew.d.ts +16 -0
  147. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/gluedatabrew.js +17 -1
  148. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/guardduty.d.ts +138 -0
  149. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/guardduty.js +175 -3
  150. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/healthimaging.d.ts +56 -0
  151. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/healthimaging.js +78 -1
  152. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/iamidentitycenter.d.ts +24 -51
  153. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/iamidentitycenter.js +31 -70
  154. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/identityandaccessmanagementiam.d.ts +40 -0
  155. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/identityandaccessmanagementiam.js +45 -1
  156. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/inspector2.d.ts +179 -0
  157. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/inspector2.js +232 -1
  158. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/interactivevideoservice.d.ts +30 -0
  159. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/interactivevideoservice.js +40 -1
  160. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/iot.d.ts +32 -4
  161. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/iot.js +46 -9
  162. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/iotfleetwise.d.ts +0 -32
  163. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/iotfleetwise.js +1 -39
  164. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/iotmanagedintegrations.d.ts +42 -0
  165. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/iotmanagedintegrations.js +47 -1
  166. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/iotsitewise.d.ts +133 -0
  167. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/iotsitewise.js +178 -1
  168. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/keymanagementservice.d.ts +1 -1
  169. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/keymanagementservice.js +2 -2
  170. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/keyspacesforapachecassandra.d.ts +51 -2
  171. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/keyspacesforapachecassandra.js +68 -3
  172. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/kinesisdatastreams.d.ts +4 -0
  173. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/kinesisdatastreams.js +5 -1
  174. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/lexv2.d.ts +16 -0
  175. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/lexv2.js +23 -1
  176. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/managedserviceforprometheus.d.ts +129 -45
  177. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/managedserviceforprometheus.js +151 -46
  178. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/marketplacecatalog.d.ts +0 -32
  179. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/marketplacecatalog.js +3 -47
  180. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/marketplacemeteringservice.d.ts +4 -4
  181. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/marketplacemeteringservice.js +5 -5
  182. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/memorydb.d.ts +12 -0
  183. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/memorydb.js +16 -1
  184. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/mq.d.ts +6 -0
  185. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/mq.js +10 -1
  186. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/multi-partyapproval.d.ts +6 -6
  187. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/multi-partyapproval.js +10 -10
  188. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/neptuneanalytics.d.ts +28 -0
  189. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/neptuneanalytics.js +35 -1
  190. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/networkfirewall.d.ts +123 -3
  191. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/networkfirewall.js +163 -5
  192. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/opensearchserverless.d.ts +38 -6
  193. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/opensearchserverless.js +51 -7
  194. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/organizations.d.ts +29 -5
  195. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/organizations.js +36 -6
  196. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/outposts.d.ts +14 -0
  197. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/outposts.js +18 -1
  198. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/parallelcomputingservice.d.ts +5 -5
  199. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/parallelcomputingservice.js +6 -6
  200. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/partnercentralselling.d.ts +18 -16
  201. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/partnercentralselling.js +19 -17
  202. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/qbusiness.d.ts +87 -52
  203. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/qbusiness.js +114 -73
  204. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/qbusinessqapps.d.ts +0 -50
  205. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/qbusinessqapps.js +1 -60
  206. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/quicksight.d.ts +25 -20
  207. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/quicksight.js +35 -23
  208. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/rds.d.ts +59 -1
  209. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/rds.js +65 -2
  210. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/redshift.d.ts +0 -4
  211. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/redshift.js +1 -5
  212. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/repostprivate.d.ts +48 -0
  213. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/repostprivate.js +67 -1
  214. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/resourceexplorer.d.ts +2 -2
  215. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/resourceexplorer.js +7 -5
  216. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/s3.d.ts +187 -175
  217. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/s3.js +202 -176
  218. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/s3express.d.ts +151 -2
  219. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/s3express.js +174 -4
  220. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/s3glacier.d.ts +2 -31
  221. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/s3glacier.js +3 -36
  222. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/s3vectors.d.ts +202 -0
  223. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/s3vectors.js +272 -0
  224. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/sagemaker.d.ts +197 -1
  225. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/sagemaker.js +241 -2
  226. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/sagemakerwithmlflow.d.ts +54 -0
  227. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/sagemakerwithmlflow.js +83 -2
  228. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/savingsplans.d.ts +1 -1
  229. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/savingsplans.js +2 -2
  230. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/secretsmanager.d.ts +22 -22
  231. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/secretsmanager.js +23 -23
  232. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/securityhub.d.ts +295 -6
  233. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/securityhub.js +375 -7
  234. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/securityincidentresponse.d.ts +2 -1
  235. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/securityincidentresponse.js +3 -2
  236. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/securitylake.d.ts +4 -0
  237. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/securitylake.js +5 -1
  238. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/securitytokenservice.d.ts +10 -0
  239. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/securitytokenservice.js +13 -1
  240. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/service-oracledatabase-aws.d.ts +548 -0
  241. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/service-oracledatabase-aws.js +718 -0
  242. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/serviceformanagingawsconsoleuserexperiencecapabilities-.d.ts +41 -0
  243. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/serviceformanagingawsconsoleuserexperiencecapabilities-.js +60 -0
  244. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/servicequotas.d.ts +8 -0
  245. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/servicequotas.js +12 -1
  246. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/shield.d.ts +24 -0
  247. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/shield.js +34 -1
  248. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/shieldnetworksecuritydirector.d.ts +89 -0
  249. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/shieldnetworksecuritydirector.js +128 -0
  250. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/simpleemailservicev2.d.ts +211 -0
  251. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/simpleemailservicev2.js +256 -3
  252. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/snowdevicemanagement.d.ts +4 -0
  253. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/snowdevicemanagement.js +5 -1
  254. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/support.d.ts +24 -0
  255. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/support.js +35 -2
  256. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/systemsmanager.d.ts +27 -0
  257. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/systemsmanager.js +32 -1
  258. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/systemsmanagerforsap.d.ts +51 -3
  259. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/systemsmanagerforsap.js +76 -8
  260. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/transcribe.d.ts +27 -1
  261. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/transcribe.js +28 -2
  262. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/transform.d.ts +93 -8
  263. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/transform.js +117 -9
  264. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/usernotifications.d.ts +34 -2
  265. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/usernotifications.js +51 -5
  266. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/vpclattice.d.ts +6 -0
  267. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/vpclattice.js +10 -1
  268. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/workspaces.d.ts +83 -0
  269. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/workspaces.js +113 -1
  270. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/workspacessecurebrowser.d.ts +77 -0
  271. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/workspacessecurebrowser.js +101 -1
  272. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/workspacesthinclient.d.ts +1 -0
  273. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/workspacesthinclient.js +2 -1
  274. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/x-ray.d.ts +35 -1
  275. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/x-ray.js +40 -2
  276. package/node_modules/cdk-iam-floyd/package.json +10 -10
  277. package/package.json +2 -2
  278. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/supportrecommendations.d.ts +0 -33
  279. package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/supportrecommendations.js +0 -47
package/.jsii CHANGED
@@ -19,7 +19,7 @@
19
19
  "@types/aws-lambda": "^8.10.152",
20
20
  "@types/crypto-js": "^4.2.2",
21
21
  "@types/js-yaml": "^4.0.9",
22
- "cdk-iam-floyd": "^0.711.0",
22
+ "cdk-iam-floyd": "^0.714.0",
23
23
  "crypto-js": "^4.2.0",
24
24
  "js-yaml": "^4.1.0",
25
25
  "lodash": "^4.17.21",
@@ -5072,6 +5072,6 @@
5072
5072
  "symbolId": "src/ImagePipeline/ImagePipeline:VolumeProps"
5073
5073
  }
5074
5074
  },
5075
- "version": "0.0.18",
5076
- "fingerprint": "dadOnLhYV3ZUa/kMabcTItlIfdlQgGJmeLgdN8dku2U="
5075
+ "version": "0.0.20",
5076
+ "fingerprint": "jqSdXd7GZ6IcIuxZr4rS6Ro+4ju3/YgDOlA8rA+eSMs="
5077
5077
  }
@@ -13,7 +13,7 @@ import (
13
13
  constructs "github.com/aws/constructs-go/constructs/v10/jsii"
14
14
  )
15
15
 
16
- //go:embed jjrawlins-cdk-ami-builder-0.0.17.tgz
16
+ //go:embed jjrawlins-cdk-ami-builder-0.0.19.tgz
17
17
  var tarball []byte
18
18
 
19
19
  // Initialize loads the necessary packages in the @jsii/kernel to support the enclosing module.
@@ -24,5 +24,5 @@ func Initialize() {
24
24
  constructs.Initialize()
25
25
 
26
26
  // Load this library into the kernel
27
- _jsii_.Load("@jjrawlins/cdk-ami-builder", "0.0.17", tarball)
27
+ _jsii_.Load("@jjrawlins/cdk-ami-builder", "0.0.19", tarball)
28
28
  }
@@ -1 +1 @@
1
- 0.0.17
1
+ 0.0.19
@@ -364,5 +364,5 @@ class ImagePipeline extends constructs_1.Construct {
364
364
  }
365
365
  exports.ImagePipeline = ImagePipeline;
366
366
  _a = JSII_RTTI_SYMBOL_1;
367
- ImagePipeline[_a] = { fqn: "@jjrawlins/cdk-ami-builder.ImagePipeline", version: "0.0.18" };
367
+ ImagePipeline[_a] = { fqn: "@jjrawlins/cdk-ami-builder.ImagePipeline", version: "0.0.20" };
368
368
  //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"ImagePipeline.js","sourceRoot":"","sources":["../../src/ImagePipeline/ImagePipeline.ts"],"names":[],"mappings":";;;;;AAAA,yBAAyB;AACzB,kCAAkC;AAElC,6CAUqB;AACrB,2CAA2C;AAE3C,iDAA2C;AAC3C,iDAA0C;AAC1C,mEAAwD;AACxD,iDAA0C;AAC1C,2CAAuC;AACvC,sCAAsC;AACtC,gCAAgC;AAChC,0HAAsH;AACtH,wGAAoG;AACpG,kDAA+C;AA6M/C,MAAa,aAAc,SAAQ,sBAAS;IAK1C,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAyB;QACjE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,IAAI,oBAAiE,CAAC;QACtE,IAAI,WAAwC,CAAC;QAC7C,IAAI,CAAC,qBAAqB,GAAG,EAAE,CAAC;QAChC,IAAI,CAAC,OAAO,GAAG,EAAE,CAAC;QAClB,IAAI,CAAC,gBAAgB,GAAG,EAAE,CAAC;QAC3B,MAAM,OAAO,GAAG,mBAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,OAAO,CAAC;QACvC,MAAM,MAAM,GAAG,mBAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC;QACrC,MAAM,SAAS,GAAG,mBAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,SAAS,CAAC;QAC3C,MAAM,WAAW,GAAG,IAAI,aAAG,CAAC,IAAI,EAAE,aAAa,EAAE;YAC/C,WAAW,EAAE,uCAAuC;YACpD,KAAK,EAAE,gBAAgB,SAAS,cAAc;SAC/C,CAAC,CAAC;QACH,uBAAuB;QACvB,MAAM,KAAK,GAAG,IAAI,qBAAG,CAAC,KAAK,CAAC,IAAI,EAAE,mBAAmB,EAAE;YACrD,WAAW,EAAE,sBAAsB;YACnC,SAAS,EAAE,WAAW;SACvB,CAAC,CAAC;QAEH,IAAI,KAAK,CAAC,KAAK,IAAI,IAAI,EAAE,CAAC;YACxB,KAAK,CAAC,eAAe,CAAC,IAAI,mCAAa,CAAC,iBAAiB,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC;QAC1E,CAAC;QAED,MAAM,IAAI,GAAG,IAAI,qBAAG,CAAC,IAAI,CAAC,IAAI,EAAE,MAAM,EAAE;YACtC,SAAS,EAAE,IAAI,qBAAG,CAAC,gBAAgB,CAAC,mBAAmB,CAAC;YACxD,WAAW,EAAE,oDAAoD;SAClE,CAAC,CAAC;QAEH,IAAI,CAAC,gBAAgB,CAAC,qBAAG,CAAC,aAAa,CAAC,wBAAwB,CAAC,mCAAmC,CAAC,CAAC,CAAC;QACvG,IAAI,CAAC,gBAAgB,CAAC,qBAAG,CAAC,aAAa,CAAC,wBAAwB,CAAC,qDAAqD,CAAC,CAAC,CAAC;QACzH,IAAI,CAAC,gBAAgB,CAAC,qBAAG,CAAC,aAAa,CAAC,wBAAwB,CAAC,8BAA8B,CAAC,CAAC,CAAC;QAClG,IAAI,OAAO,KAAK,CAAC,kBAAkB,KAAK,WAAW,IAAI,KAAK,CAAC,kBAAkB,CAAC,MAAM,IAAI,CAAC,EAAE,CAAC;YAC5F,KAAK,MAAM,MAAM,IAAI,KAAK,CAAC,kBAAkB,EAAE,CAAC;gBAC9C,IAAI,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;YAChC,CAAC;QACH,CAAC;QAED,MAAM,mBAAmB,GAAG,KAAK,CAAC,WAAW,IAAI,GAAG,SAAS,kBAAkB,CAAC;QAChF,MAAM,eAAe,GAAG,GAAG,SAAS,8BAA8B,CAAC;QACnE,MAAM,eAAe,GAAG,GAAG,SAAS,cAAc,CAAC;QACnD,MAAM,kBAAkB,GAAG,KAAK,CAAC,kBAAkB,IAAI,OAAO,CAAC;QAC/D,MAAM,gBAAgB,GAAG,GAAG,SAAS,gBAAgB,CAAC;QACtD,MAAM,YAAY,GAAG,GAAG,gBAAgB,IAAI,kBAAkB,CAAC,OAAO,CAAC,KAAK,EAAE,GAAG,CAAC,EAAE,CAAC;QAErF,8EAA8E;QAC9E,mGAAmG;QACnG,uGAAuG;QACvG,MAAM,oBAAoB,GAAG,KAAK,CAAC,uBAAuB,IAAI,eAAe,CAAC;QAC9E,MAAM,0BAA0B,GAAG,KAAK,CAAC,uBAAuB,EAAE,CAAC,CAAC,CAAC,EAAE,GAAG,EAAE,QAAQ;YAClF,CAAC,CAAC,KAAK,CAAC,uBAAwB,CAAC,CAAC,CAAC,CAAC,GAAG,CAAC,QAAQ;YAChD,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,IAAI,eAAe,CAAC,CAAC;QACvD,MAAM,sBAAsB,GAAG,KAAK,CAAC,sBAAsB,IAAI,EAAE,CAAC;QAClE,MAAM,mBAAmB,GAAG,KAAK,CAAC,mBAAmB,IAAI,EAAE,CAAC;QAE5D,IAAI,CAAC,KAAK,CAAC,mBAAmB,EAAE,MAAM,KAAK,CAAC,IAAI,KAAK,CAAC,sBAAsB,EAAE,MAAM,CAAC;YACnF,CAAC,KAAK,CAAC,mBAAmB,EAAE,MAAM,IAAI,KAAK,CAAC,sBAAsB,EAAE,MAAM,KAAK,CAAC,CAAC,EAAE,CAAC;YACpF,MAAM,IAAI,KAAK,CAAC,8EAA8E,CAAC,CAAC;QAClG,CAAC;QAED,IAAI,CAAC,KAAK,CAAC,mBAAmB,EAAE,MAAM,IAAI,KAAK,CAAC,sBAAsB,EAAE,MAAM,CAAC,IAAI,KAAK,CAAC,uBAAuB,KAAK,eAAe,EAAE,CAAC;YACrI,MAAM,IAAI,KAAK,CAAC,4GAA4G,CAAC,CAAC;QAChI,CAAC;QAED,MAAM,OAAO,GAAG,IAAI,qBAAG,CAAC,kBAAkB,CAAC,IAAI,EAAE,iBAAiB,EAAE;YAClE,KAAK,EAAE,CAAC,IAAI,CAAC,QAAQ,CAAC;YACtB,mBAAmB,EAAE,mBAAmB;SACzC,CAAC,CAAC;QAEH,MAAM,YAAY,GAAG,IAAI,GAAG,CAAC,aAAa,CAAC,IAAI,EAAE,eAAe,EAAE;YAChE,GAAG,EAAE,KAAK,CAAC,GAAG;YACd,gBAAgB,EAAE,IAAI;SACvB,CAAC,CAAC;QAEH,IAAI,KAAK,CAAC,cAAc,IAAI,IAAI,IAAI,KAAK,CAAC,QAAQ,IAAI,IAAI,EAAE,CAAC;YAC3D,oBAAoB,GAAG,IAAI,8BAAY,CAAC,8BAA8B,CAAC,IAAI,EAAE,6BAA6B,EAAE;gBAC1G,mBAAmB,EAAE,mBAAmB;gBACxC,IAAI,EAAE,eAAe;gBACrB,WAAW,EAAE,gDAAgD;gBAC7D,aAAa,EAAE,KAAK,CAAC,aAAa,IAAI,CAAC,WAAW,EAAE,UAAU,EAAE,WAAW,CAAC;gBAC5E,WAAW,EAAE,KAAK,CAAC,QAAQ;gBAC3B,gBAAgB,EAAE,CAAC,YAAY,CAAC,eAAe,CAAC;gBAChD,QAAQ,EAAE,KAAK,CAAC,GAAG,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC,QAAQ;aAC9C,CAAC,CAAC;QAEL,CAAC;aAAM,CAAC;YACN,oBAAoB,GAAG,IAAI,8BAAY,CAAC,8BAA8B,CAAC,IAAI,EAAE,6BAA6B,EAAE;gBAC1G,mBAAmB,EAAE,mBAAmB;gBACxC,IAAI,EAAE,eAAe;gBACrB,WAAW,EAAE,gDAAgD;gBAC7D,aAAa,EAAE,KAAK,CAAC,aAAa,IAAI,CAAC,WAAW,EAAE,UAAU,EAAE,WAAW,CAAC;gBAC5E,WAAW,EAAE,KAAK,CAAC,QAAQ;gBAC3B,gBAAgB,EAAE,KAAK,CAAC,cAAc;gBACtC,QAAQ,EAAE,KAAK,CAAC,QAAQ;aACzB,CAAC,CAAC;QACL,CAAC;QACD,oBAAoB,CAAC,aAAa,CAAC,OAAO,CAAC,CAAC;QAE5C;;eAEO;QACP,IAAI,gBAAkD,CAAC;QACvD,gBAAgB,GAAG;YACjB,UAAU,EAAE,EAAE;YACd,IAAI,EAAE,eAAe;YACrB,WAAW,EAAE,KAAK,CAAC,WAAW;YAC9B,OAAO,EAAE,kBAAkB,IAAI,OAAO;SACvC,CAAC;QACF,IAAI,KAAK,CAAC,cAAc,EAAE,CAAC;YACzB,gBAAgB,GAAG;gBACjB,GAAG,gBAAgB;gBACnB,+BAA+B,EAAE;oBAC/B,gBAAgB,EAAE,KAAK,CAAC,cAAc;iBACvC;aACF,CAAC;QACJ,CAAC;QAED,IAAI,KAAK,CAAC,uBAAuB,EAAE,CAAC,CAAC,CAAC,CAAC,GAAG,EAAE,CAAC;YAC3C,iDAAiD;YACjD,KAAK,MAAM,MAAM,IAAI,KAAK,CAAC,uBAAwB,EAAE,CAAC;gBACpD,sCAAsC;gBACtC,IAAI,MAAM,CAAC,GAAG,CAAC,SAAS,KAAK,SAAS,EAAE,CAAC;oBACvC,MAAM,CAAC,GAAG,CAAC,SAAS,GAAG,IAAI,CAAC;gBAC9B,CAAC;gBAED,4CAA4C;gBAC5C,IAAI,CAAC,MAAM,CAAC,GAAG,CAAC,QAAQ,EAAE,CAAC;oBACzB,MAAM,CAAC,GAAG,CAAC,QAAQ,GAAG,0BAA0B,CAAC;gBACnD,CAAC;gBAED,+CAA+C;gBAC/C,IAAI,CAAC,MAAM,CAAC,GAAG,CAAC,mBAAmB,EAAE,CAAC;oBACpC,MAAM,CAAC,GAAG,CAAC,mBAAmB,GAAG,IAAI,CAAC;gBACxC,CAAC;YACH,CAAC;YACD,gBAAgB,GAAG;gBACjB,GAAG,gBAAgB;gBACnB,mBAAmB,EAAE,KAAK,CAAC,uBAAuB;aACnD,CAAC;QACJ,CAAC;aAAM,CAAC;YACN,gBAAgB,GAAG;gBACjB,GAAG,gBAAgB;gBACnB,mBAAmB,EAAE;oBACnB;wBACE,UAAU,EAAE,WAAW;wBACvB,GAAG,EAAE;4BACH,QAAQ,EAAE,eAAe;4BACzB,SAAS,EAAE,IAAI;4BACf,UAAU,EAAE,EAAE;4BACd,UAAU,EAAE,KAAK;4BACjB,mBAAmB,EAAE,IAAI;yBAC1B;qBACF;iBACF;aACF,CAAC;QACJ,CAAC;QACD,WAAW,GAAG,IAAI,8BAAY,CAAC,cAAc,CAAC,IAAI,EAAE,aAAa,EAAE,gBAAgB,CAAC,CAAC;QAErF,KAAK,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC,SAA0B,EAAE,KAAa,EAAE,EAAE;YACrE,MAAM,aAAa,GAAG,SAAS,CAAC,IAAI,EAAE,OAAO,CAAC,IAAI,EAAE,GAAG,CAAC,CAAC;YACzD,SAAS,CAAC,IAAI,GAAG,aAAa,CAAC;YAC/B,MAAM,aAAa,GAAG,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC,CAAC;YAClE,MAAM,qBAAqB,GAAG,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,SAAS,CAAC,SAAS,CAAC,iBAAiB,CAAC,CAAC,CAAC;YAC5F,MAAM,iBAAiB,GAAuB;gBAC5C,IAAI,EAAE,aAAa,IAAI,GAAG,SAAS,IAAI,qBAAqB,IAAI,KAAK,EAAE;gBACvE,WAAW,EAAE,SAAS,CAAC,WAAW;gBAClC,aAAa,EAAE,SAAS,CAAC,aAAa,IAAI,KAAK;gBAC/C,MAAM,EAAE,SAAS,CAAC,iBAAiB,CAAC,MAAM;aAC3C,CAAC;YACF,MAAM,IAAI,GAAG,IAAI,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC;YAC1C,IAAI,YAAY,GAAG,IAAI,8BAAY,CAAC,YAAY,CAAC,IAAI,EAAE,SAAS,CAAC,IAAI,IAAI,aAAa,KAAK,EAAE,EAAE;gBAC7F,IAAI,EAAE,SAAS,CAAC,IAAI,IAAI,GAAG,SAAS,CAAC,WAAW,EAAE,IAAI,aAAa,IAAI,KAAK,EAAE;gBAC9E,WAAW,EAAE,SAAS,CAAC,WAAW;gBAClC,QAAQ,EAAE,SAAS,CAAC,QAAQ,IAAI,OAAO;gBACvC,OAAO,EAAE,SAAS,CAAC,gBAAgB,IAAI,KAAK,CAAC,kBAAkB,IAAI,OAAO;gBAC1E,IAAI,EAAE,IAAI;aACX,CAAC,CAAC;YAEH,wCAAwC;YACxC,IAAI,CAAC,qBAAqB,CAAC,IAAI,CAAC,EAAE,YAAY,EAAE,YAAY,CAAC,OAAO,EAAE,CAAC,CAAC;YACxE,WAAW,CAAC,UAAU,GAAG,IAAI,CAAC,qBAAqB,CAAC;QACtD,CAAC,CAAC,CAAC;QAEH,MAAM,eAAe,GAAG,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,qBAAqB,CAAC,CAAC,CAAC;QACrF,WAAW,CAAC,IAAI,GAAG,GAAG,eAAe,IAAI,eAAe,IAAI,kBAAkB,CAAC,OAAO,CAAC,KAAK,EAAE,GAAG,CAAC,EAAE,CAAC;QAErG,IAAI,kBAAsD,CAAC;QAC3D,kBAAkB,GAAG;YACnB,8BAA8B,EAAE,oBAAoB,CAAC,OAAO;YAC5D,IAAI,EAAE,YAAY;YAClB,WAAW,EAAE,gBAAgB;YAC7B,cAAc,EAAE,WAAW,CAAC,OAAO;SACpC,CAAC;QACF,IAAI,KAAK,CAAC,eAAe,EAAE,CAAC;YAC1B,kBAAkB,GAAG;gBACnB,GAAG,kBAAkB;gBACrB,0BAA0B,EAAE;oBAC1B,oBAAoB,EAAE,KAAK,CAAC,eAAe;oBAC3C,gBAAgB,EAAE;wBAChB,cAAc,EAAE,KAAK,CAAC,iBAAiB;wBACvC,aAAa,EAAE,KAAK,CAAC,iBAAiB;qBACvC;iBACF;aACF,CAAC;QACJ,CAAC;QACD,IAAI,sBAAsB,CAAC,MAAM,GAAG,CAAC,IAAI,mBAAmB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACxE,MAAM,iBAAiB,GAAqE,EAAE,CAAC;YAC/F,mBAAmB,CAAC,OAAO,CAAC,kBAAkB,CAAC,EAAE;gBAC/C,MAAM,kBAAkB,GAAQ;oBAC9B,MAAM,EAAE,kBAAkB;oBAC1B,4BAA4B,EAAE;wBAC5B,8GAA8G;wBAC9G,wJAAwJ;wBACxJ,IAAI,EAAE,GAAG,eAAe,IAAI,kBAAkB,6BAA6B;wBAC3E,WAAW,EAAE,YAAY,eAAe,OAAO,kBAAkB,EAAE;wBACnE,gBAAgB,EAAE,sBAAsB;wBACxC,6BAA6B,EAAE;4BAC7B,OAAO,EAAE,sBAAsB;yBAChC;wBACD,QAAQ,EAAE,oBAAoB,EAAE,gEAAgE;qBACjG;iBACF,CAAC;gBACF,iBAAiB,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC;YAC7C,CAAC,CAAC,CAAC;YACH,MAAM,4BAA4B,GAAG,IAAI,8BAAY,CAAC,4BAA4B,CAAC,IAAI,EAAE,8BAA8B,EAAE;gBACvH,IAAI,EAAE,GAAG,eAAe,wBAAwB,kBAAkB,CAAC,OAAO,CAAC,KAAK,EAAE,GAAG,CAAC,EAAE;gBACxF,WAAW,EAAE,2CAA2C,eAAe,EAAE;gBACzE,aAAa,EAAE,iBAAiB;aACjC,CAAC,CAAC;YACH,kBAAkB,GAAG;gBACnB,GAAG,kBAAkB;gBACrB,4BAA4B,EAAE,4BAA4B,CAAC,OAAO;aACnE,CAAC;QACJ,CAAC;QAED,MAAM,kBAAkB,GAAG,IAAI,8BAAY,CAAC,gBAAgB,CAAC,IAAI,EAAE,eAAe,EAAE,kBAAkB,CAAC,CAAC;QACxG,IAAI,CAAC,gBAAgB,GAAG,kBAAkB,CAAC,OAAO,CAAC;QAEnD,MAAM,yBAAyB,GAAG,IAAI,sDAAyB,CAAC,IAAI,EAAE,2BAA2B,EAC/F;YACE,WAAW,EAAE,2BAA2B;YACxC,UAAU,EAAE,GAAG;YACf,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YAC7B,aAAa,EAAE;gBACb,IAAI,yBAAS,CAAC,MAAM,EAAE,CAAC,KAAK,EAAE;qBAC3B,gBAAgB,EAAE;qBAClB,qBAAqB,EAAE;qBACvB,gBAAgB,EAAE;qBAClB,mBAAmB,EAAE;qBACrB,cAAc,EAAE;gBACnB,IAAI,yBAAS,CAAC,YAAY,EAAE,CAAC,KAAK,EAAE;qBACjC,oBAAoB,EAAE;qBACtB,6BAA6B,EAAE;qBAC/B,UAAU,EAAE;qBACZ,cAAc,EAAE;gBACnB,IAAI,qBAAG,CAAC,eAAe,CAAC;oBACtB,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;oBACxB,OAAO,EAAE;wBACP,OAAO;qBACR;oBACD,+EAA+E;oBAC/E,SAAS,EAAE,CAAC,iBAAG,CAAC,MAAM,CAAC;4BACrB,OAAO,EAAE,KAAK;4BACd,QAAQ,EAAE,eAAe;4BACzB,OAAO,EAAE,GAAG;4BACZ,MAAM,EAAE,GAAG;4BACX,SAAS,EAAE,KAAK;yBACjB,CAAC,CAAC;iBACJ,CAAC;aACH;SACF,CAAC,CAAC;QAEL,MAAM,+BAA+B,GAAG,IAAI,kEAA+B,CAAC,IAAI,EAAE,iCAAiC,EAAE;YACnH,WAAW,EAAE,iCAAiC;YAC9C,UAAU,EAAE,GAAG;YACf,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YAC7B,aAAa,EAAE;gBACb,IAAI,yBAAS,CAAC,MAAM,EAAE,CAAC,KAAK,EAAE;qBAC3B,mBAAmB,EAAE;qBACrB,gBAAgB,EAAE;qBAClB,qBAAqB,EAAE;qBACvB,cAAc,EAAE;gBACnB,IAAI,yBAAS,CAAC,YAAY,EAAE,CAAC,KAAK,EAAE;qBACjC,oBAAoB,EAAE;qBACtB,6BAA6B,EAAE;qBAC/B,UAAU,EAAE;qBACZ,cAAc,EAAE;gBACnB,IAAI,yBAAS,CAAC,GAAG,EAAE,CAAC,KAAK,EAAE;qBACxB,sBAAsB,EAAE;qBACxB,cAAc,EAAE;gBACnB,IAAI,qBAAG,CAAC,eAAe,CAAC;oBACtB,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;oBACxB,OAAO,EAAE;wBACP,OAAO;qBACR;oBACD,SAAS,EAAE,CAAC,iBAAG,CAAC,MAAM,CAAC;4BACrB,OAAO,EAAE,KAAK;4BACd,QAAQ,EAAE,eAAe;4BACzB,OAAO,EAAE,GAAG;4BACZ,MAAM,EAAE,GAAG;4BACX,SAAS,EAAE,KAAK;yBACjB,CAAC,CAAC;iBACJ,CAAC;aACH;SACF,CAAC,CAAC;QAEH,MAAM,QAAQ,GAAG,IAAI,2BAAQ,CAAC,IAAI,EAAE,kBAAkB,EAAE;YACtD,cAAc,EAAE,yBAAyB;YACzC,iBAAiB,EAAE,+BAA+B;YAClD,YAAY,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YAClC,aAAa,EAAE,sBAAQ,CAAC,OAAO,CAAC,CAAC,CAAC;SACnC,CAAC,CAAC;QAEH,MAAM,gBAAgB,GAAG,IAAI,cAAI,CAAC,IAAI,EAAE,kBAAkB,EAAE;YAC1D,SAAS,EAAE,IAAI,qBAAG,CAAC,gBAAgB,CAAC,sBAAsB,CAAC;YAC3D,eAAe,EAAE;gBACf,qBAAG,CAAC,aAAa,CAAC,wBAAwB,CAAC,4BAA4B,CAAC;aACzE;YACD,cAAc,EAAE;gBACd,kBAAkB,EAAE,IAAI,qBAAG,CAAC,cAAc,CAAC;oBACzC,UAAU,EAAE;wBACV,IAAI,yBAAS,CAAC,IAAI,EAAE,CAAC,KAAK,EAAE;6BACzB,kBAAkB,EAAE;6BACpB,qBAAqB,EAAE;6BACvB,kBAAkB,EAAE;6BACpB,oBAAoB,EAAE;6BACtB,cAAc,EAAE;wBACnB,IAAI,qBAAG,CAAC,eAAe,CAAC;4BACtB,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;4BACxB,OAAO,EAAE;gCACP,gBAAgB;6BACjB;4BACD,SAAS,EAAE,CAAC,wBAAwB,MAAM,IAAI,GAAG,IAAI,OAAO,IAAI,GAAG,mBAAmB,gBAAgB,CAAC,WAAW,EAAE,IAAI,CAAC;yBAC1H,CAAC;wBACF,IAAI,yBAAS,CAAC,YAAY,EAAE,CAAC,KAAK,EAAE;6BACjC,UAAU,EAAE;6BACZ,cAAc,EAAE;qBACpB;iBACF,CAAC;aACH;SACF,CAAC,CAAC;QAEH,MAAM,YAAY,GAAG,IAAI,2BAAY,CAAC,IAAI,EAAE,cAAc,EAAE;YAC1D,UAAU,EAAE,IAAI,CAAC,KAAK,CACpB,EAAE,CAAC,YAAY,CAAC,IAAI,CAAC,IAAI,CACvB,SAAS,EAAE,IAAI,EAAE,mBAAmB,EAAE,gCAAgC,CAAC,EAAE,MAAM,CAAC,CAAC,QAAQ,EAAE,CAAC;YAChG,IAAI,EAAE,gBAAgB;SACvB,CAAC,CAAC;QAEH,MAAM,sBAAsB,GAAG,KAAK,CAAC,kBAAkB,KAAK,IAAI,CAAC,CAAC,CAAC,2BAAa,CAAC,0BAA0B,CAAC,CAAC,CAAC,2BAAa,CAAC,OAAO,CAAC;QAEpI,MAAM,cAAc,GAAG,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,SAAS,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC;QAC1E,MAAM,aAAa,GAAG,IAAI,4BAAc,CAAC,IAAI,EAAE,gBAAgB,EAC7D;YACE,YAAY,EAAE,QAAQ,CAAC,YAAY;YACnC,UAAU,EAAE;gBACV,gBAAgB,EAAE,kBAAkB,CAAC,OAAO;gBAC5C,eAAe,EAAE,YAAY,CAAC,eAAe;gBAC7C,OAAO,EAAE,KAAK,CAAC,kBAAkB,IAAI,OAAO;gBAC5C,cAAc,EAAE,cAAc;gBAC9B,kBAAkB,EAAE,GAAG,SAAS,kBAAkB,kBAAkB,CAAC,OAAO,CAAC,KAAK,EAAE,GAAG,CAAC,EAAE;gBAC1F,QAAQ,EAAE,oBAAoB;gBAC9B,gBAAgB,EAAE,sBAAsB,CAAC,IAAI,CAAC,GAAG,CAAC;gBAClD,kBAAkB,EAAE,KAAK,CAAC,kBAAkB,KAAK,IAAI,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,OAAO;aACzE;YACD,aAAa,EAAE,sBAAsB;SACtC,CAAC,CAAC;QAEL,IAAI,CAAC,OAAO,GAAG,aAAa,CAAC,YAAY,CAAC,OAAO,CAAC,CAAC;IACrD,CAAC;IAEO,WAAW,CAAC,WAAmB;QACrC,OAAO,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC,QAAQ,EAAE,CAAC;IAC9C,CAAC;;AA1XH,sCA4XC","sourcesContent":["import * as fs from 'fs';\nimport * as path from 'node:path';\n\nimport {\n  Arn,\n  aws_iam as iam,\n  aws_imagebuilder as imagebuilder,\n  aws_sns as sns,\n  aws_sns_subscriptions as subscriptions,\n  CustomResource,\n  Duration,\n  RemovalPolicy,\n  Stack,\n} from 'aws-cdk-lib';\nimport * as ec2 from 'aws-cdk-lib/aws-ec2';\nimport { Vpc } from 'aws-cdk-lib/aws-ec2';\nimport { Role } from 'aws-cdk-lib/aws-iam';\nimport { Key } from 'aws-cdk-lib/aws-kms';\nimport { Provider } from 'aws-cdk-lib/custom-resources';\nimport { Statement } from 'cdk-iam-floyd';\nimport { Construct } from 'constructs';\nimport * as CryptoJS from 'crypto-js';\nimport * as yaml from 'js-yaml';\nimport { CheckStateMachineStatusFunction } from '../Lambdas/CheckStateMachineStatus/CheckStateMachineStatus-function';\nimport { StartStateMachineFunction } from '../Lambdas/StartStateMachine/StartStateMachine-function';\nimport { StateMachine } from '../StateMachine';\n\nexport interface IEbsParameters {\n  /**\n     * Size of the volume in GiB\n     */\n  volumeSize: number;\n  /**\n     * Type of the volume\n     *\n     * @default gp2\n     */\n  volumeType?: string;\n  /**\n     * KMS Key Alias for the volume\n     * If not specified, the default AMI encryption key alias will be used\n     * Custom KMS Keys Alias need to exist in the other accounts for distribution to work correctly.\n     * @default alias/aws/ebs\n     */\n  kmsKeyId?: string;\n  /**\n     * Whether the volume is encrypted\n     *\n     * @default true\n     */\n  encrypted?: boolean;\n  /**\n     * Whether the volume is deleted when the instance is terminated\n     *\n     * @default true\n     */\n  deleteOnTermination?: boolean;\n}\n\nexport interface VolumeProps {\n  /**\n     * Name of the volume\n     */\n  readonly deviceName: string;\n  /**\n     * EBS Block Store Parameters\n     *\n     * By default, the 'kmsKeyId' of EBS volume is set to 'amiEncryptionKey.keyId',\n     * and 'encrypted' is set to 'true'. If you wish to use a different KMS Key,\n     * you may do so. However, please make sure that the necessary permissions\n     * and compliance requirements for the KMS Key are already set up.\n     */\n  readonly ebs: IEbsParameters;\n}\n\n/**\n * Build commands for the component\n */\nexport interface IActionCommands {\n  commands: string[];\n}\n\nexport interface IStepCommands {\n  name: string; // ^[-_A-Za-z-0-9][-_A-Za-z0-9 ]{1,126}[-_A-Za-z-0-9]$/\n  action: 'ExecuteBash' | 'ExecutePowerShell' | 'UpdateOS';\n  inputs?: IActionCommands;\n}\n\n/**\n * Phases for the component\n */\nexport interface IPhases {\n  name: 'build' | 'validate' | 'test';\n  steps: IStepCommands[];\n}\n\nexport interface IInputParameter {\n  type: string;\n  default: string;\n  description: string;\n}\n\nexport type IParameters = Record<string, IInputParameter>;\n\n/**\n * Component data\n */\nexport interface IComponentDocument {\n  name?: string;\n  description?: string;\n  schemaVersion?: string;\n  phases: IPhases[];\n}\n\n/**\n * Component props\n */\nexport interface IComponentProps {\n  name?: string;\n  description?: string;\n  componentVersion?: string;\n  schemaVersion?: string;\n  parameters?: IParameters;\n  platform?: 'Linux' | 'Windows';\n  componentDocument: IComponentDocument;\n}\n\nexport interface ImagePipelineProps {\n  readonly subnetId?: string;\n  readonly securityGroups?: string[];\n  readonly distributionRegions?: string[];\n  /**\n     * Vpc to use for the Image Builder Pipeline\n     */\n  readonly vpc: Vpc;\n  /**\n     * List of component props\n     */\n  readonly components: IComponentProps[];\n  /**\n     * Name of the instance profile that will be associated with the Instance Configuration.\n     */\n  readonly profileName?: string;\n  /**\n     * Additional policies to add to the instance profile associated with the Instance Configurations\n     */\n  readonly additionalPolicies?: iam.ManagedPolicy[];\n\n  /**\n     * UserData script that will override default one (if specified)\n     *\n     * @default - none\n     */\n  readonly userDataScript?: string;\n  /**\n     * Image recipe version (Default: 0.0.1)\n     */\n  readonly imageRecipeVersion?: string;\n\n  /**\n     * The source (parent) image that the image recipe uses as its base environment. The value can be the parent image ARN or an Image Builder AMI ID\n     */\n  readonly parentImage: string;\n\n  /**\n     * List of instance types used in the Instance Configuration (Default: [ 't3.medium', 'm5.large', 'm5.xlarge' ])\n     */\n  readonly instanceTypes?: string[];\n  /**\n     * Platform type Linux or Windows (Default: Linux)\n     */\n  readonly platform?: 'Linux' | 'Windows';\n  /**\n     * Email used to receive Image Builder Pipeline Notifications via SNS\n     */\n  readonly email?: string;\n  /**\n     * List of security group IDs for the Infrastructure Configuration\n     */\n  readonly securityGroupIds?: string[];\n  /**\n     * Subnet ID for the Infrastructure Configuration\n     */\n  readonly ebsVolumeConfigurations?: VolumeProps[];\n  /**\n     * Set to true if you want to enable continuous vulnerability scans through AWS Inpector\n     */\n  readonly enableVulnScans?: boolean;\n  /**\n     * Store vulnerability scans through AWS Inspector in ECR using this repo name (if option is enabled)\n     */\n  readonly vulnScansRepoName?: string;\n  /**\n     * Store vulnerability scans through AWS Inspector in ECR using these image tags (if option is enabled)\n     */\n  readonly vulnScansRepoTags?: string[];\n\n  /**\n     * This variable represents an array of shared account IDs.\n     * It is optional and readonly.\n     * If it is provided, this AMI will be visible to the accounts in the array.\n     *  In order to share the AMI with other accounts, you must specify a KMS key ID for the EBS volume configuration as AWS does not allow sharing AMIs encrypted with the default AMI encryption key.\n     * @type {Array<string>}\n     * @readonly\n     */\n  readonly distributionAccountIds?: string[];\n\n  /**\n     * Flag indicating whether the debug image pipeline is enabled or not.\n     * This variable is optional. Default value is false.\n     *  Functionally, this will flag to return as finished immediately after first check to see if the image pipeline has finished.\n     *  This is useful for debugging the image pipeline.  However, there will be no AMI value returned.\n     *\n     * @type {boolean}\n     * @readonly\n     */\n  readonly debugImagePipeline?: boolean;\n\n  /**\n     * The alias of the KMS key used for encryption and decryption of content in the distribution.\n     * This property is optional and readonly.\n     * The default encryption key is not compatible with cross-account AMI sharing.\n     * If you specify distributionAccountIds, you must specify a non-default encryption key using this property. Otherwise, Image Builder will throw an error.\n     * Keep in mind that the KMS key in the distribution account must allow the EC2ImageBuilderDistributionCrossAccountRole role to use the key.\n     * @type {string}\n     * @readonly\n     */\n  readonly distributionKmsKeyAlias?: string;\n}\n\nexport class ImagePipeline extends Construct {\n  imageRecipeComponents: imagebuilder.CfnImageRecipe.ComponentConfigurationProperty[];\n  imagePipelineArn: string;\n  imageId: string;\n\n  constructor(scope: Construct, id: string, props: ImagePipelineProps) {\n    super(scope, id);\n    let infrastructureConfig: imagebuilder.CfnInfrastructureConfiguration;\n    let imageRecipe: imagebuilder.CfnImageRecipe;\n    this.imageRecipeComponents = [];\n    this.imageId = '';\n    this.imagePipelineArn = '';\n    const account = Stack.of(this).account;\n    const region = Stack.of(this).region;\n    const stackName = Stack.of(this).stackName;\n    const topicKmsKey = new Key(this, 'TopicKmsKey', {\n      description: 'KMS Key used to encrypt the SNS topic',\n      alias: `/ami-builder/${stackName}-TopicKmsKey`,\n    });\n    // Construct code below\n    const topic = new sns.Topic(this, 'ImageBuilderTopic', {\n      displayName: 'Image Builder Notify',\n      masterKey: topicKmsKey,\n    });\n\n    if (props.email != null) {\n      topic.addSubscription(new subscriptions.EmailSubscription(props.email));\n    }\n\n    const role = new iam.Role(this, 'Role', {\n      assumedBy: new iam.ServicePrincipal('ec2.amazonaws.com'),\n      description: 'IAM role used as part of an Image Builder pipeline',\n    });\n\n    role.addManagedPolicy(iam.ManagedPolicy.fromAwsManagedPolicyName('EC2InstanceProfileForImageBuilder'));\n    role.addManagedPolicy(iam.ManagedPolicy.fromAwsManagedPolicyName('EC2InstanceProfileForImageBuilderECRContainerBuilds'));\n    role.addManagedPolicy(iam.ManagedPolicy.fromAwsManagedPolicyName('AmazonSSMManagedInstanceCore'));\n    if (typeof props.additionalPolicies !== 'undefined' && props.additionalPolicies.length >= 1) {\n      for (const policy of props.additionalPolicies) {\n        role.addManagedPolicy(policy);\n      }\n    }\n\n    const instanceProfileName = props.profileName ?? `${stackName}-InstanceProfile`;\n    const infraConfigName = `${stackName}-InfrastructureConfiguration`;\n    const imageRecipeName = `${stackName}-ImageRecipe`;\n    const imageRecipeVersion = props.imageRecipeVersion ?? '0.0.1';\n    const pipelineBaseName = `${stackName}-ImagePipeline`;\n    const pipelineName = `${pipelineBaseName}-${imageRecipeVersion.replace(/\\./g, '-')}`;\n\n    // Use the first volume configuration's KMS key ID as the effective KMS key ID\n    // If the first volume configuration does not have a KMS key ID, use the default AMI encryption key\n    // Keep in mind though that default AMI encryption key is not compatible with cross-account AMI sharing\n    const distributionKeyAlias = props.distributionKmsKeyAlias ?? 'alias/aws/ebs';\n    const ebsVolumeEffectiveKmsAlias = props.ebsVolumeConfigurations?.[0]?.ebs?.kmsKeyId\n      ? props.ebsVolumeConfigurations![0].ebs.kmsKeyId\n      : (props.distributionKmsKeyAlias ?? 'alias/aws/ebs');\n    const distributionAccountIds = props.distributionAccountIds ?? [];\n    const distributionRegions = props.distributionRegions ?? [];\n\n    if ((props.distributionRegions?.length === 0 && props.distributionAccountIds?.length) ||\n      (props.distributionRegions?.length && props.distributionAccountIds?.length === 0)) {\n      throw new Error('distributionRegions must be specified if distributionAccountIds is specified');\n    }\n\n    if ((props.distributionRegions?.length && props.distributionAccountIds?.length) && props.distributionKmsKeyAlias === 'alias/aws/ebs') {\n      throw new Error('If distributionRegions and distributionAccountIds are specified, distributionKmsKeyAlias must be specified');\n    }\n\n    const profile = new iam.CfnInstanceProfile(this, 'InstanceProfile', {\n      roles: [role.roleName],\n      instanceProfileName: instanceProfileName,\n    });\n\n    const defaultGroup = new ec2.SecurityGroup(this, 'SecurityGroup', {\n      vpc: props.vpc,\n      allowAllOutbound: true,\n    });\n\n    if (props.securityGroups == null || props.subnetId == null) {\n      infrastructureConfig = new imagebuilder.CfnInfrastructureConfiguration(this, 'InfrastructureConfiguration', {\n        instanceProfileName: instanceProfileName,\n        name: infraConfigName,\n        description: 'Infrastructure Configuration for Image Builder',\n        instanceTypes: props.instanceTypes ?? ['t3.medium', 'm5.large', 'm5.xlarge'],\n        snsTopicArn: topic.topicArn,\n        securityGroupIds: [defaultGroup.securityGroupId],\n        subnetId: props.vpc.publicSubnets[0].subnetId,\n      });\n\n    } else {\n      infrastructureConfig = new imagebuilder.CfnInfrastructureConfiguration(this, 'InfrastructureConfiguration', {\n        instanceProfileName: instanceProfileName,\n        name: infraConfigName,\n        description: 'Infrastructure Configuration for Image Builder',\n        instanceTypes: props.instanceTypes ?? ['t3.medium', 'm5.large', 'm5.xlarge'],\n        snsTopicArn: topic.topicArn,\n        securityGroupIds: props.securityGroups,\n        subnetId: props.subnetId,\n      });\n    }\n    infrastructureConfig.addDependency(profile);\n\n    /**\n         * Image recipe configuration\n         */\n    let imageRecipeProps: imagebuilder.CfnImageRecipeProps;\n    imageRecipeProps = {\n      components: [],\n      name: imageRecipeName,\n      parentImage: props.parentImage,\n      version: imageRecipeVersion ?? '0.0.1',\n    };\n    if (props.userDataScript) {\n      imageRecipeProps = {\n        ...imageRecipeProps,\n        additionalInstanceConfiguration: {\n          userDataOverride: props.userDataScript,\n        },\n      };\n    }\n\n    if (props.ebsVolumeConfigurations?.[0].ebs) {\n      // Go over each configuration and set the default\n      for (const config of props.ebsVolumeConfigurations!) {\n        // If encryption is not set, enable it\n        if (config.ebs.encrypted === undefined) {\n          config.ebs.encrypted = true;\n        }\n\n        // If KMS Key ID is not set, use the default\n        if (!config.ebs.kmsKeyId) {\n          config.ebs.kmsKeyId = ebsVolumeEffectiveKmsAlias;\n        }\n\n        // If deleteOnTermination is not set, enable it\n        if (!config.ebs.deleteOnTermination) {\n          config.ebs.deleteOnTermination = true;\n        }\n      }\n      imageRecipeProps = {\n        ...imageRecipeProps,\n        blockDeviceMappings: props.ebsVolumeConfigurations,\n      };\n    } else {\n      imageRecipeProps = {\n        ...imageRecipeProps,\n        blockDeviceMappings: [\n          {\n            deviceName: '/dev/sda1',\n            ebs: {\n              kmsKeyId: 'alias/aws/ebs',\n              encrypted: true,\n              volumeSize: 30,\n              volumeType: 'gp3',\n              deleteOnTermination: true,\n            },\n          },\n        ],\n      };\n    }\n    imageRecipe = new imagebuilder.CfnImageRecipe(this, 'ImageRecipe', imageRecipeProps);\n\n    props.components.forEach((component: IComponentProps, index: number) => {\n      const componentName = component.name?.replace(/ /g, '-');\n      component.name = componentName;\n      const componentHash = this.stringToMD5(JSON.stringify(component));\n      const componentDocumentHash = this.stringToMD5(JSON.stringify(component.componentDocument));\n      const componentDocument: IComponentDocument = {\n        name: componentName ?? `${stackName}-${componentDocumentHash}-${index}`,\n        description: component.description,\n        schemaVersion: component.schemaVersion ?? '1.0',\n        phases: component.componentDocument.phases,\n      };\n      const data = yaml.dump(componentDocument);\n      let newComponent = new imagebuilder.CfnComponent(this, component.name ?? `Component-${index}`, {\n        name: component.name ?? `${stackName.toLowerCase()}-${componentHash}-${index}`,\n        description: component.description,\n        platform: component.platform ?? 'Linux',\n        version: component.componentVersion ?? props.imageRecipeVersion ?? '0.0.1',\n        data: data,\n      });\n\n      // add the component to the Image Recipe\n      this.imageRecipeComponents.push({ componentArn: newComponent.attrArn });\n      imageRecipe.components = this.imageRecipeComponents;\n    });\n\n    const imageRecipeHash = this.stringToMD5(JSON.stringify(this.imageRecipeComponents));\n    imageRecipe.name = `${imageRecipeName}-${imageRecipeHash}-${imageRecipeVersion.replace(/\\./g, '-')}`;\n\n    let imagePipelineProps: imagebuilder.CfnImagePipelineProps;\n    imagePipelineProps = {\n      infrastructureConfigurationArn: infrastructureConfig.attrArn,\n      name: pipelineName,\n      description: 'Image pipeline',\n      imageRecipeArn: imageRecipe.attrArn,\n    };\n    if (props.enableVulnScans) {\n      imagePipelineProps = {\n        ...imagePipelineProps,\n        imageScanningConfiguration: {\n          imageScanningEnabled: props.enableVulnScans,\n          ecrConfiguration: {\n            repositoryName: props.vulnScansRepoName,\n            containerTags: props.vulnScansRepoTags,\n          },\n        },\n      };\n    }\n    if (distributionAccountIds.length > 0 && distributionRegions.length > 0) {\n      const distributionsList: imagebuilder.CfnDistributionConfiguration.DistributionProperty[] = [];\n      distributionRegions.forEach(distributionRegion => {\n        const distributionConfig: any = {\n          region: distributionRegion,\n          amiDistributionConfiguration: {\n            //Capital case here because it's an object of type any, but capital case is what is expected in CloudFormation\n            //https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-imagebuilder-distributionconfiguration-amidistributionconfiguration.html\n            Name: `${imageRecipeName}-${distributionRegion}-{{imagebuilder:buildDate}}`,\n            Description: `copy AMI ${imageRecipeName} to ${distributionRegion}`,\n            TargetAccountIds: distributionAccountIds,\n            LaunchPermissionConfiguration: {\n              UserIds: distributionAccountIds,\n            },\n            KmsKeyId: distributionKeyAlias, //using default AWS-managed key if one isn't given is prohibited\n          },\n        };\n        distributionsList.push(distributionConfig);\n      });\n      const amiDistributionConfiguration = new imagebuilder.CfnDistributionConfiguration(this, 'amiDistributionConfiguration', {\n        name: `${imageRecipeName}-distribution-config-${imageRecipeVersion.replace(/\\./g, '-')}`,\n        description: `Cross account distribution settings for ${imageRecipeName}`,\n        distributions: distributionsList,\n      });\n      imagePipelineProps = {\n        ...imagePipelineProps,\n        distributionConfigurationArn: amiDistributionConfiguration.attrArn,\n      };\n    }\n\n    const imageBuildPipeline = new imagebuilder.CfnImagePipeline(this, 'ImagePipeline', imagePipelineProps);\n    this.imagePipelineArn = imageBuildPipeline.attrArn;\n\n    const startStateMachineFunction = new StartStateMachineFunction(this, 'StartStateMachineFunction',\n      {\n        description: 'StartStateMachineFunction',\n        memorySize: 128,\n        timeout: Duration.minutes(12),\n        initialPolicy: [\n          new Statement.States().allow()\n            .toStartExecution()\n            .toGetExecutionHistory()\n            .toListExecutions()\n            .toDescribeExecution()\n            .onAllResources(),\n          new Statement.Imagebuilder().allow()\n            .toListImagePipelines()\n            .toStartImagePipelineExecution()\n            .toGetImage()\n            .onAllResources(),\n          new iam.PolicyStatement({\n            effect: iam.Effect.ALLOW,\n            actions: [\n              'kms:*',\n            ],\n            // arn:{partition}:{service}:{region}:{account}:{resource}{sep}{resource-name}/\n            resources: [Arn.format({\n              service: 'kms',\n              resource: 'alias/aws/ebs',\n              account: '*',\n              region: '*',\n              partition: 'aws',\n            })],\n          }),\n        ],\n      });\n\n    const checkStateMachineStatusFunction = new CheckStateMachineStatusFunction(this, 'CheckStateMachineStatusFunction', {\n      description: 'CheckStateMachineStatusFunction',\n      memorySize: 128,\n      timeout: Duration.minutes(12),\n      initialPolicy: [\n        new Statement.States().allow()\n          .toDescribeExecution()\n          .toListExecutions()\n          .toGetExecutionHistory()\n          .onAllResources(),\n        new Statement.Imagebuilder().allow()\n          .toListImagePipelines()\n          .toStartImagePipelineExecution()\n          .toGetImage()\n          .onAllResources(),\n        new Statement.Ec2().allow()\n          .toModifyImageAttribute()\n          .onAllResources(),\n        new iam.PolicyStatement({\n          effect: iam.Effect.ALLOW,\n          actions: [\n            'kms:*',\n          ],\n          resources: [Arn.format({\n            service: 'kms',\n            resource: 'alias/aws/ebs',\n            account: '*',\n            region: '*',\n            partition: 'aws',\n          })],\n        }),\n      ],\n    });\n\n    const provider = new Provider(this, 'ResourceProvider', {\n      onEventHandler: startStateMachineFunction,\n      isCompleteHandler: checkStateMachineStatusFunction,\n      totalTimeout: Duration.minutes(60),\n      queryInterval: Duration.minutes(2),\n    });\n\n    const stateMachineRole = new Role(this, 'StateMachineRole', {\n      assumedBy: new iam.ServicePrincipal('states.amazonaws.com'),\n      managedPolicies: [\n        iam.ManagedPolicy.fromAwsManagedPolicyName('service-role/AWSLambdaRole'),\n      ],\n      inlinePolicies: {\n        StateMachinePolicy: new iam.PolicyDocument({\n          statements: [\n            new Statement.Xray().allow()\n              .toPutTraceSegments()\n              .toPutTelemetryRecords()\n              .toGetSamplingRules()\n              .toGetSamplingTargets()\n              .onAllResources(),\n            new iam.PolicyStatement({\n              effect: iam.Effect.ALLOW,\n              actions: [\n                'imagebuilder:*',\n              ],\n              resources: [`arn:aws:imagebuilder:${region ?? '*'}:${account ?? '*'}:image-pipeline/${pipelineBaseName.toLowerCase()}-*`],\n            }),\n            new Statement.Imagebuilder().allow()\n              .toGetImage()\n              .onAllResources(),\n          ],\n        }),\n      },\n    });\n\n    const stateMachine = new StateMachine(this, 'StateMachine', {\n      definition: JSON.parse(\n        fs.readFileSync(path.join(\n          __dirname, '..', 'StateMachineFiles', 'ImageBuildingStateMachine.json'), 'utf8').toString()),\n      role: stateMachineRole,\n    });\n\n    const effectiveRemovalPolicy = props.debugImagePipeline === true ? RemovalPolicy.RETAIN_ON_UPDATE_OR_DELETE : RemovalPolicy.DESTROY;\n\n    const componentsHash = this.stringToMD5(JSON.stringify(props.components));\n    const imagePipeline = new CustomResource(this, 'CustomResource',\n      {\n        serviceToken: provider.serviceToken,\n        properties: {\n          ImagePipelineArn: imageBuildPipeline.attrArn,\n          StateMachineArn: stateMachine.stateMachineArn,\n          Version: props.imageRecipeVersion ?? '0.0.1',\n          ComponentsHash: componentsHash,\n          PhysicalResourceId: `${stackName}-ImagePipeline-${imageRecipeVersion.replace(/\\./g, '-')}`,\n          AmiKmsId: distributionKeyAlias,\n          SharedAccountIds: distributionAccountIds.join(','),\n          DebugImagePipeline: props.debugImagePipeline === true ? 'true' : 'false',\n        },\n        removalPolicy: effectiveRemovalPolicy,\n      });\n\n    this.imageId = imagePipeline.getAttString('AmiId');\n  }\n\n  private stringToMD5(inputString: string): string {\n    return CryptoJS.MD5(inputString).toString();\n  }\n\n}\n\n"]}
@@ -23,5 +23,5 @@ class CheckStateMachineStatusFunction extends lambda.Function {
23
23
  }
24
24
  exports.CheckStateMachineStatusFunction = CheckStateMachineStatusFunction;
25
25
  _a = JSII_RTTI_SYMBOL_1;
26
- CheckStateMachineStatusFunction[_a] = { fqn: "@jjrawlins/cdk-ami-builder.CheckStateMachineStatusFunction", version: "0.0.18" };
26
+ CheckStateMachineStatusFunction[_a] = { fqn: "@jjrawlins/cdk-ami-builder.CheckStateMachineStatusFunction", version: "0.0.20" };
27
27
  //# sourceMappingURL=data:application/json;base64,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
@@ -23,5 +23,5 @@ class StartStateMachineFunction extends lambda.Function {
23
23
  }
24
24
  exports.StartStateMachineFunction = StartStateMachineFunction;
25
25
  _a = JSII_RTTI_SYMBOL_1;
26
- StartStateMachineFunction[_a] = { fqn: "@jjrawlins/cdk-ami-builder.StartStateMachineFunction", version: "0.0.18" };
26
+ StartStateMachineFunction[_a] = { fqn: "@jjrawlins/cdk-ami-builder.StartStateMachineFunction", version: "0.0.20" };
27
27
  //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,30 @@
1
+ {
2
+ "permissions": {
3
+ "allow": [
4
+ "Bash(make build)",
5
+ "Bash(make generate)",
6
+ "Bash(SERVICE=* make generate)",
7
+ "Bash(make generate-force)",
8
+ "Bash(SERVICE=* make generate-force)",
9
+ "Bash(make index-managed-policies)",
10
+ "Bash(make package)",
11
+ "Bash(make cdk)",
12
+ "Bash(make uncdk)",
13
+ "Bash(make test)",
14
+ "Bash(make cdk-test)",
15
+ "Bash(make cdk-all)",
16
+ "Bash(make changelog)",
17
+ "Bash(make stats)",
18
+ "Bash(make clean)",
19
+ "Bash(make install)",
20
+ "Bash(make docs)",
21
+ "Bash(make test-typescript)",
22
+ "Bash(make test-typescript-cdk)",
23
+ "Bash(make regenerate-code-example-results)",
24
+ "Bash(make eslint)",
25
+ "Bash(npx tsc:*)"
26
+ ],
27
+ "deny": [],
28
+ "ask": []
29
+ }
30
+ }
@@ -0,0 +1,147 @@
1
+ # CLAUDE.md
2
+
3
+ This file provides guidance to Claude Code (claude.ai/code) when working with code in this repository.
4
+
5
+ ## Project Overview
6
+
7
+ IAM Floyd is an AWS IAM policy statement generator with a fluent interface. It generates TypeScript classes for all AWS services and their actions, resources, and condition keys from AWS documentation. The project supports both standalone usage (`iam-floyd`) and AWS CDK integration (`cdk-iam-floyd`).
8
+
9
+ ## Core Architecture
10
+
11
+ ### Generated Code Structure
12
+
13
+ - `lib/generated/policy-statements/` - Contains generated TypeScript classes for each AWS service (400+ services)
14
+ - `lib/generated/index.ts` - Main export file that re-exports all service classes
15
+ - `lib/generated/aws-managed-policies/` - Generated AWS managed policies
16
+ - `lib/shared/` - Core shared classes like `PolicyStatement`, `All`, and `Operator`
17
+ - `lib/collection/` - Predefined policy collections and utilities
18
+
19
+ ### Code Generation Pipeline
20
+
21
+ The codebase uses a sophisticated generation system:
22
+
23
+ 1. `bin/generate.ts` - Main generation entry point that orchestrates the process
24
+ 2. `lib/generator/` - Contains the generation logic that scrapes AWS documentation
25
+ 3. Generated files are created in TypeScript and compiled to JavaScript for distribution
26
+
27
+ ### Key Classes
28
+
29
+ - `PolicyStatement` - Base class for all policy statement builders
30
+ - `All` - Global action provider for cross-service policies
31
+ - Service-specific classes (e.g., `S3`, `EC2`, `Lambda`) - Each AWS service gets its own class with methods for actions, resources, and conditions
32
+
33
+ ## Development Commands
34
+
35
+ ### Building and Compilation
36
+
37
+ ```bash
38
+ # Build the project (compiles TypeScript)
39
+ make build
40
+ # Convert project to CDK-variant
41
+ ```
42
+
43
+ ### Code Generation
44
+
45
+ ```bash
46
+ # Generate service classes from AWS documentation
47
+ make generate
48
+ # Force regeneration (ignores time-based cache)
49
+ make generate-force
50
+ # Generate AWS managed policies index
51
+ make index-managed-policies
52
+ ```
53
+
54
+ ### Testing
55
+
56
+ ```bash
57
+ # Run main tests
58
+ make test
59
+ # Run CDK-specific tests
60
+ make cdk-test
61
+ # Convert package to CDK variant and run CDK-specific tests
62
+ make cdk-all
63
+ ```
64
+
65
+ ### Linting and Code Quality
66
+
67
+ ```bash
68
+ # Run ESLint
69
+ make eslint
70
+ # ESLint is configured with TypeScript, Prettier, and deprecation rules
71
+ ```
72
+
73
+ ### Package Management
74
+
75
+ ```bash
76
+ # Create npm package
77
+ make package
78
+ # Clean all generated files and dependencies
79
+ make clean
80
+ # Reinstall dependencies
81
+ make install
82
+ ```
83
+
84
+ ### CDK Variant Management
85
+
86
+ ```bash
87
+ # Convert to CDK variant (modifies package.json and lib structure)
88
+ make cdk
89
+ # Revert CDK changes
90
+ make uncdk
91
+ ```
92
+
93
+ ## Project Structure Patterns
94
+
95
+ ### Dual Package Strategy
96
+
97
+ The project maintains two npm packages from a single codebase:
98
+
99
+ - `iam-floyd` - Standalone IAM policy generator
100
+ - `cdk-iam-floyd` - AWS CDK integration that extends `iam.PolicyStatement`
101
+
102
+ The `bin/mkcdk.ts` script transforms the codebase between variants by modifying imports and package configuration.
103
+
104
+ ### TypeScript Configuration
105
+
106
+ - `tsconfig.json` - Main TypeScript configuration with strict settings
107
+ - `tsconfig.main.json` - Production build configuration
108
+ - `tsconfig.test-*.json` - Test-specific configurations
109
+ - Uses SWC for faster compilation via ts-node
110
+
111
+ ### Generated Code Conventions
112
+
113
+ - All generated classes follow the pattern: `export class ServiceName extends PolicyStatement`
114
+ - Method names correspond to AWS IAM action names (e.g., `getObject()`, `listBuckets()`)
115
+ - Resource and condition methods use fluent interface patterns
116
+ - Generated files include comprehensive JSDoc comments from AWS documentation
117
+
118
+ ## Important Notes
119
+
120
+ ### File Modification Rules
121
+
122
+ - **Never manually edit files in `lib/generated/`** - These are auto-generated and will be overwritten
123
+ - Generated code is created from AWS documentation and should only be updated via the generation process
124
+ - Manual changes should only be made to files in `lib/shared/`, `lib/collection/`, and core infrastructure
125
+
126
+ ### Code Style
127
+
128
+ - ESLint enforces strict TypeScript rules with Prettier formatting
129
+ - Single quotes for strings, except in YAML files
130
+ - Comprehensive type checking with `noImplicitAny` and strict null checks
131
+ - Generated files are excluded from linting (`lib/generated/*` in `.eslintrc`)
132
+
133
+ ### Testing Strategy
134
+
135
+ - Tests are located in the `test/` directory with its own Makefile
136
+ - Supports both unit tests for the main package and CDK integration tests
137
+ - CDK tests include actual deployment and destruction cycles for validation
138
+
139
+ ## Git Commit Conventions
140
+
141
+ This project follows conventional commit patterns:
142
+
143
+ - `chore(deps): description` - Dependency updates
144
+ - `feat: description` - New features
145
+ - `fix: description` - Bug fixes
146
+ - `docs: description` - Documentation changes
147
+ - Simple format: "Updates AWS managed policies" for automated policy updates
@@ -16,10 +16,10 @@
16
16
  <!-- stats -->
17
17
  Support for:
18
18
 
19
- - 422 Services
20
- - 18598 Actions
21
- - 1996 Resource Types
22
- - 1965 Condition keys
19
+ - 429 Services
20
+ - 19150 Actions
21
+ - 2051 Resource Types
22
+ - 2131 Condition keys
23
23
  <!-- /stats -->
24
24
 
25
25
  ![EXPERIMENTAL](https://img.shields.io/badge/stability-experimantal-orange?style=for-the-badge)**<br>This is an early version of the package. The API will change while I implement new features. Therefore make sure you use an exact version in your `package.json` before it reaches 1.0.0.**
@@ -70,8 +70,14 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
70
70
  AmazonAuroraDSQLFullAccess(): aws_iam.IManagedPolicy;
71
71
  /** Provides read only access to Aurora DSQL */
72
72
  AmazonAuroraDSQLReadOnlyAccess(): aws_iam.IManagedPolicy;
73
+ /** Provides Bedrock Model inference permission to Bedrock agent core memory */
74
+ AmazonBedrockAgentCoreMemoryBedrockModelInferenceExecutionRolePolicy(): aws_iam.IManagedPolicy;
73
75
  /** Provides full access to Amazon Bedrock as well as limited access to related services that are required by it */
74
76
  AmazonBedrockFullAccess(): aws_iam.IManagedPolicy;
77
+ /** Provides limited access to Amazon Bedrock as well as to related services that are required by it */
78
+ AmazonBedrockLimitedAccess(): aws_iam.IManagedPolicy;
79
+ /** Provides limited access to Amazon Bedrock Marketplace as well as to related services that are required by it */
80
+ AmazonBedrockMarketplaceAccess(): aws_iam.IManagedPolicy;
75
81
  /** Provides read only access to Amazon Bedrock */
76
82
  AmazonBedrockReadOnly(): aws_iam.IManagedPolicy;
77
83
  /** Defines the maximum permissions of IAM roles that Amazon Bedrock Studio creates for operating Amazon Bedrock Studio resources. */
@@ -256,6 +262,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
256
262
  AmazonEC2ContainerServiceRole(): aws_iam.IManagedPolicy;
257
263
  /** Provides full access to Amazon EC2 via the AWS Management Console. */
258
264
  AmazonEC2FullAccess(): aws_iam.IManagedPolicy;
265
+ /** Provides read-only access to scan all supported resource types for relevant data when using DescribeImageReferences. */
266
+ AmazonEC2ImageReferencesAccessPolicy(): aws_iam.IManagedPolicy;
259
267
  /** Provides read only access to Amazon EC2 via the AWS Management Console. */
260
268
  AmazonEC2ReadOnlyAccess(): aws_iam.IManagedPolicy;
261
269
  /** Provides EC2 access to S3 bucket to download revision. This role is needed by the CodeDeploy agent on EC2 instances. */
@@ -276,6 +284,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
276
284
  AmazonECSFullAccess(): aws_iam.IManagedPolicy;
277
285
  /** Policy to enable Amazon ECS Compute to manage your EC2 instances and related resources as part of ECS managed instances */
278
286
  AmazonECSComputeServiceRolePolicy(): aws_iam.IManagedPolicy;
287
+ /** Provides access to other AWS service resources required to manage load balancers associated with ECS workloads on your behalf. */
288
+ AmazonECSInfrastructureRolePolicyForLoadBalancers(): aws_iam.IManagedPolicy;
279
289
  /** Provides administrative access to Private Certificate Authority, AWS Secrets Manager and other AWS Services required to manage ECS Service Connect TLS features on your behalf. */
280
290
  AmazonECSInfrastructureRolePolicyForServiceConnectTransportLayerSecurity(): aws_iam.IManagedPolicy;
281
291
  /** Provides access to other AWS service resources required to manage volumes associated with ECS workloads on your behalf. */
@@ -478,6 +488,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
478
488
  AmazonInspector2AgentlessServiceRolePolicy(): aws_iam.IManagedPolicy;
479
489
  /** Provides full access to Amazon Inspector and access to other related services such as organizations. */
480
490
  AmazonInspector2FullAccess(): aws_iam.IManagedPolicy;
491
+ /** Provides full access to Amazon Inspector and access to other related services such as organizations with restrictive organizational access. */
492
+ AmazonInspector2FullAccessV2(): aws_iam.IManagedPolicy;
481
493
  /** This is a managed policy that customer should attach to their roles to communicate with inspector service for CIS scans */
482
494
  AmazonInspector2ManagedCisPolicy(): aws_iam.IManagedPolicy;
483
495
  /** Provides read only access to the Amazon inspector2 service and relevant support services */
@@ -820,8 +832,12 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
820
832
  AmazonSageMakerGeospatialFullAccess(): aws_iam.IManagedPolicy;
821
833
  /** Provides access to AWS services that are required to run SageMaker GroundTruth Labeling job */
822
834
  AmazonSageMakerGroundTruthExecution(): aws_iam.IManagedPolicy;
835
+ /** This policy provides administrative privileges required for setting up SageMaker HyperPod observability. It enables access to Amazon Managed Prometheus, Amazon Managed Grafana and EKS Addons. The policy also includes broad access to Grafana HTTP APIs through ServiceAccountTokens across all Amazon Managed Grafana workspaces in your account. */
836
+ AmazonSageMakerHyperPodObservabilityAdminAccess(): aws_iam.IManagedPolicy;
823
837
  /** This policy grants permissions to Amazon SageMaker HyperPod to related AWS services such as Amazon EKS, Amazon CloudWatch etc. */
824
838
  AmazonSageMakerHyperPodServiceRolePolicy(): aws_iam.IManagedPolicy;
839
+ /** This policy provides administrative permissions required to set up the SageMaker HyperPod training operator. It enables access to Amazon SageMaker HyperPod and EKS add-ons. The policy includes permissions to describe the SageMaker HyperPod resources in your account. */
840
+ AmazonSageMakerHyperPodTrainingOperatorAccess(): aws_iam.IManagedPolicy;
825
841
  /** Provides access to create Amazon Augmented AI FlowDefinition resources against any Workteam. */
826
842
  AmazonSageMakerMechanicalTurkAccess(): aws_iam.IManagedPolicy;
827
843
  /** This AWS managed policy grants permissions needed to use all Amazon SageMaker Governance features. The policy also provides select access to related services (e.g., S3, KMS). */
@@ -1188,6 +1204,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1188
1204
  AWSBatchServiceEventTargetRole(): aws_iam.IManagedPolicy;
1189
1205
  /** Policy for AWS Batch service role which allows access to related services including EC2, Autoscaling, EC2 Container service and Cloudwatch Logs. */
1190
1206
  AWSBatchServiceRole(): aws_iam.IManagedPolicy;
1207
+ /** Provides access for AWS Batch to queue and manage Amazon SageMaker workloads */
1208
+ AWSBatchServiceRolePolicyForSageMaker(): aws_iam.IManagedPolicy;
1191
1209
  /** A service linked role to provide Billing and Cost Management Data Exports access to AWS service data for exporting the data to a target location, such as Amazon S3, on behalf of a customer. */
1192
1210
  AWSBCMDataExportsServiceRolePolicy(): aws_iam.IManagedPolicy;
1193
1211
  /** Use the AWSBillingConductorFullAccess managed policy to allow complete access to AWS Billing Conductor (ABC) console and APIs. This policy allows users to list, create and delete ABC resources. */
@@ -1196,6 +1214,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1196
1214
  AWSBillingConductorReadOnlyAccess(): aws_iam.IManagedPolicy;
1197
1215
  /** Allows users to view bills on the Billing Console. */
1198
1216
  AWSBillingReadOnlyAccess(): aws_iam.IManagedPolicy;
1217
+ /** Allows billing service to validate access to billing view data for derived billing views */
1218
+ AWSBillingServiceRolePolicy(): aws_iam.IManagedPolicy;
1199
1219
  /** This policy gives permissions to control AWS resources. For example, to start and stop EC2 or RDS instances by executing AWS Systems Manager (SSM) scripts. */
1200
1220
  AWSBudgetsActionsRolePolicyForResourceAdministrationWithSSM(): aws_iam.IManagedPolicy;
1201
1221
  /** Provides full access to AWS Budgets Actions including using Budgets Actions to control states of running AWS resources via AWS Management Console */
@@ -1432,6 +1452,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1432
1452
  AWSDirectoryServiceFullAccess(): aws_iam.IManagedPolicy;
1433
1453
  /** Provides read only access to AWS Directory Service. */
1434
1454
  AWSDirectoryServiceReadOnlyAccess(): aws_iam.IManagedPolicy;
1455
+ /** Policy for the Directory Service Service Linked Role */
1456
+ AWSDirectoryServiceServiceRolePolicy(): aws_iam.IManagedPolicy;
1435
1457
  /** Provides write access to AWS resources required for AWS Discovery Continuous Export */
1436
1458
  AWSDiscoveryContinuousExportFirehosePolicy(): aws_iam.IManagedPolicy;
1437
1459
  /** Allows DMS Fleet Advisor to manage CloudWatch metrics on your behalf. */
@@ -1796,6 +1818,10 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1796
1818
  AWSManagedServicesSelfServiceReportingServiceRolePolicy(): aws_iam.IManagedPolicy;
1797
1819
  /** Allows AWS Managed Services to manage deployment toolkit on your behalf. */
1798
1820
  AWSManagedServicesDeploymentToolkitPolicy(): aws_iam.IManagedPolicy;
1821
+ /** Provides full access to configure and customize the AWS Management Console */
1822
+ AWSManagementConsoleAdministratorAccess(): aws_iam.IManagedPolicy;
1823
+ /** Grants access to essential AWS Management Console features and user experience (UX) capabilities for non-administrative users. */
1824
+ AWSManagementConsoleBasicUserAccess(): aws_iam.IManagedPolicy;
1799
1825
  /** Allows AWS Marketplace to copy your Amazon Machine Images (AMIs) in order to list them on AWS Marketplace */
1800
1826
  AWSMarketplaceAmiIngestion(): aws_iam.IManagedPolicy;
1801
1827
  /** Allows AWS Marketplace to create and manage seller deployment parameters for the products that you subscribe to on AWS Marketplace. */
@@ -1882,20 +1908,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1882
1908
  AWSNetworkManagerServiceRolePolicy(): aws_iam.IManagedPolicy;
1883
1909
  /** Provides access to manage AWS Config Configuration Recorder, manage AWS Config Configuration Aggregator, create AWS Config Service Linked Role for Configuration Recorder functionality, consume recorder configuration data, and read AWS Organizations data for organizational features. */
1884
1910
  AWSObservabilityAdminServiceRolePolicy(): aws_iam.IManagedPolicy;
1885
- /** Provides full access to AWS OpsWorks. */
1886
- AWSOpsWorksFullAccess(): aws_iam.IManagedPolicy;
1887
- /** Enables OpsWorks instances with the CWLogs integration enabled to ship logs and create required log groups */
1888
- AWSOpsWorksCloudWatchLogs(): aws_iam.IManagedPolicy;
1889
- /** Provides S3 access for instances launched by OpsWorks CM. */
1890
- AWSOpsWorksCMInstanceProfileRole(): aws_iam.IManagedPolicy;
1891
- /** Service Role Policy to be used for Creating OpsWorks CM servers. */
1892
- AWSOpsWorksCMServiceRole(): aws_iam.IManagedPolicy;
1893
- /** Provides access for an Amazon EC2 instance to register with an AWS OpsWorks stack. */
1894
- AWSOpsWorksInstanceRegistration(): aws_iam.IManagedPolicy;
1895
- /** Policy to enable registration of EC2 instances via the OpsWorks CLI */
1896
- AWSOpsWorksRegisterCLIEC2(): aws_iam.IManagedPolicy;
1897
- /** Policy to enable registration of On-Premises instances via the OpsWorks CLI */
1898
- AWSOpsWorksRegisterCLIOnPremises(): aws_iam.IManagedPolicy;
1911
+ /** Provides access to manage AWS Config recorder resource and telemetry settings on AWS resources including logs, metrics. */
1912
+ AWSObservabilityAdminTelemetryEnablementServiceRolePolicy(): aws_iam.IManagedPolicy;
1899
1913
  /** Provides full access to AWS Organizations. */
1900
1914
  AWSOrganizationsFullAccess(): aws_iam.IManagedPolicy;
1901
1915
  /** Provides read-only access to AWS Organizations. */
@@ -2006,6 +2020,10 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2006
2020
  AWSQuickSetupSSMLifecycleManagementExecutionPolicy(): aws_iam.IManagedPolicy;
2007
2021
  /** This policy grants permissions that allow Systems Manager to create prerequisites such as IAM roles required for Systems Manager onboarding. */
2008
2022
  AWSQuickSetupSSMManageResourcesExecutionPolicy(): aws_iam.IManagedPolicy;
2023
+ /** This policy grants permissions that allow principals to run the AWSQuickSetupType-StartSSMAssociations Automation runbook, which starts State Manager Associations. */
2024
+ AWSQuickSetupStartSSMAssociationsExecutionPolicy(): aws_iam.IManagedPolicy;
2025
+ /** The managed policy AWSQuickSetupStartStopInstancesExecutionPolicy provides permissions for Quick Setup to start and stop Amazon EC2 instances on a schedule. This policy is used with the Quick Setup scheduler configuration type. */
2026
+ AWSQuickSetupStartStopInstancesExecutionPolicy(): aws_iam.IManagedPolicy;
2009
2027
  /** Provides the set of permissions required to perform QuickSight Asset Bundle Export Operations */
2010
2028
  AWSQuickSightAssetBundleExportPolicy(): aws_iam.IManagedPolicy;
2011
2029
  /** Provides the set of permissions required to perform QuickSight Asset Bundle Import Operations */
@@ -2070,6 +2088,10 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2070
2088
  AWSRoboMakerServicePolicy(): aws_iam.IManagedPolicy;
2071
2089
  /** RoboMaker service policy */
2072
2090
  AWSRoboMakerServiceRolePolicy(): aws_iam.IManagedPolicy;
2091
+ /** Provides all permissions to IAM Roles Anywhere resources, including but not limited to: CreateProfile, DeleteTrustAnchor, DisableCRL, ResetNotificationSettings. */
2092
+ AWSRolesAnywhereFullAccess(): aws_iam.IManagedPolicy;
2093
+ /** Provides read-only permissions to IAM Roles Anywhere resources, including but not limited to: GetTrustAnchor, ListProfiles, GetCRL. There will be no other permissions for other services included in this policy. */
2094
+ AWSRolesAnywhereReadOnly(): aws_iam.IManagedPolicy;
2073
2095
  /** Allows IAM Roles Anywhere to publish service/usage metrics to CloudWatch and check the status of Private Certificate Authorities on your behalf. */
2074
2096
  AWSRolesAnywhereServicePolicy(): aws_iam.IManagedPolicy;
2075
2097
  /** Allow Amazon S3 on Outposts service to manage EC2 network resources on your behalf. */
@@ -2254,6 +2276,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2254
2276
  AWSTransferLoggingAccess(): aws_iam.IManagedPolicy;
2255
2277
  /** Provide readonly access to AWS Transfer services. */
2256
2278
  AWSTransferReadOnlyAccess(): aws_iam.IManagedPolicy;
2279
+ /** Enables the AWS Transform service to deploy transformed .NET applications by creating and managing AWS resources. This policy grants permissions to provision infrastructure, manage compute resources, and configure deployment settings across various AWS services. */
2280
+ AWSTransformApplicationDeploymentPolicy(): aws_iam.IManagedPolicy;
2257
2281
  /** Provides full access to AWS Trusted Advisor Priority. This policy also enables the user to add Trusted Advisor as a trusted service with AWS Organizations and to specify delegated administrator accounts for Trusted Advisor Priority. */
2258
2282
  AWSTrustedAdvisorPriorityFullAccess(): aws_iam.IManagedPolicy;
2259
2283
  /** Provides read-only access to AWS Trusted Advisor Priority. This includes permission to view the delegated administrator accounts. */
@@ -2306,10 +2330,16 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2306
2330
  AWSXrayWriteOnlyAccess(): aws_iam.IManagedPolicy;
2307
2331
  /** Provides administrative access for ARC zonal shift practice runs, and access to CloudWatch alarm statuses to monitor practice runs. */
2308
2332
  AWSZonalAutoshiftPracticeRunSLRPolicy(): aws_iam.IManagedPolicy;
2333
+ /** Provides read-only access to the APIs needed to support zone-group access-management for organizations. */
2334
+ AWSZoneGroupAccessManagementServiceRolePolicy(): aws_iam.IManagedPolicy;
2309
2335
  /** Provides access for the AWS Batch service to manage the required resources, including Amazon EC2 and Amazon ECS resources. */
2310
2336
  BatchServiceRolePolicy(): aws_iam.IManagedPolicy;
2337
+ /** Provides full access to Bedrock AgentCore as well as limited access to related services */
2338
+ BedrockAgentCoreFullAccess(): aws_iam.IManagedPolicy;
2311
2339
  /** Grants permissions for billing and cost management. This includes viewing account usage and viewing and modifying budgets and payment methods. */
2312
2340
  Billing(): aws_iam.IManagedPolicy;
2341
+ /** Allows Budgets to verify access to Billing Views shared across account boundaries. */
2342
+ BudgetsServiceRolePolicy(): aws_iam.IManagedPolicy;
2313
2343
  /** Amazon Certificate Manager Service Role Policy */
2314
2344
  CertificateManagerServiceRolePolicy(): aws_iam.IManagedPolicy;
2315
2345
  /** Policy to enable AWS Client VPN to manage your Client VPN endpoint connections. */
@@ -2628,6 +2658,10 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2628
2658
  ROSAManageSubscription(): aws_iam.IManagedPolicy;
2629
2659
  /** Allows Red Hat OpenShift Service on AWS (ROSA) to manage cluster EC2 instances as worker nodes, including permission to configure security groups and tag instances and volumes. This policy also allows for the use of EC2 instances with disk encryption provided by AWS Key Management Service (KMS) keys. */
2630
2660
  ROSANodePoolManagementPolicy(): aws_iam.IManagedPolicy;
2661
+ /** Allows the Red Hat OpenShift Service on AWS (ROSA) installer to configure VPC Endpoints and Security Groups. Intended to be used on a shared VPC. */
2662
+ ROSASharedVPCEndpointPolicy(): aws_iam.IManagedPolicy;
2663
+ /** Allows the Red Hat OpenShift Service on AWS (ROSA) installer to configure Route53 records. Intended to be used on a shared VPC. */
2664
+ ROSASharedVPCRoute53Policy(): aws_iam.IManagedPolicy;
2631
2665
  /** Provides ROSA site reliability engineering (SRE) the permissions needed to initially observe, diagnose, and support AWS resources associated with Red Hat OpenShift Service on AWS (ROSA) clusters, including the ability to change ROSA cluster node state. */
2632
2666
  ROSASRESupportPolicy(): aws_iam.IManagedPolicy;
2633
2667
  /** Allows Red Hat OpenShift Service on AWS (ROSA) worker nodes in your account read-only access to Amazon EC2 instances and AWS Regions for compute node lifecycle management. */
@@ -2640,6 +2674,14 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2640
2674
  S3StorageLensServiceRolePolicy(): aws_iam.IManagedPolicy;
2641
2675
  /** Provides access required to unlock a S3 bucket policy using the Security Token Service (STS) AssumeRoot API. Use this managed policy only with the STS AssumeRoot action. */
2642
2676
  S3UnlockBucketPolicy(): aws_iam.IManagedPolicy;
2677
+ /** Provides initial administrative and individual setup privileges for Amazon SageMaker Unified Studio via the AWS Management Console and SDK. Allows launching of SageMaker Unified Studio Portal. */
2678
+ SageMakerStudioAdminIAMConsolePolicy(): aws_iam.IManagedPolicy;
2679
+ /** Administrative execution policy for using IAM roles with SageMaker Unified Studio. Allows admins to provision, manage and access resources in your account (excluding access to data resources) for IAM-based usage of SageMaker Unified Studio. */
2680
+ SageMakerStudioAdminIAMDefaultExecutionPolicy(): aws_iam.IManagedPolicy;
2681
+ /** Administrative execution policy for using IAM roles with SageMaker Unified Studio. Allows admins to provision, manage and access resources in the local account (including broad access to all APIs in data services like S3, Glue, CloudWatch Logs, and others) for IAM-based usage of SageMaker Unified Studio. */
2682
+ SageMakerStudioAdminIAMPermissiveExecutionPolicy(): aws_iam.IManagedPolicy;
2683
+ /** This IAM policy grants an IAM role full access to AWS Glue Data Catalog (metadata) and Amazon S3 (actual data) for data lake operations, with access scoped by account, and role tags. */
2684
+ SageMakerStudioAdminProjectUserRolePolicy(): aws_iam.IManagedPolicy;
2643
2685
  /** Allows Amazon Bedrock Agents to access Amazon Bedrock models and other resources attached to an agent in SageMaker Studio. */
2644
2686
  SageMakerStudioBedrockAgentServiceRolePolicy(): aws_iam.IManagedPolicy;
2645
2687
  /** Provides access to an Amazon Bedrock chat agent app's configuration and Amazon Bedrock agent in SageMaker Studio. */
@@ -2676,6 +2718,12 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2676
2718
  SageMakerStudioProjectUserRolePolicy(): aws_iam.IManagedPolicy;
2677
2719
  /** Amazon SageMaker Studio uses this policy when running query executions on federated connections. */
2678
2720
  SageMakerStudioQueryExecutionRolePolicy(): aws_iam.IManagedPolicy;
2721
+ /** Provides individual setup privileges for Amazon SageMaker Unified Studio via the AWS Management Console and SDK. Allows launching of SageMaker Unified Studio Portal. */
2722
+ SageMakerStudioUserIAMConsolePolicy(): aws_iam.IManagedPolicy;
2723
+ /** Execution policy for using IAM roles with SageMaker Unified Studio. Allows users to access resources in the local account (excluding access to data resources) for IAM-based usage of SageMaker Unified Studio. */
2724
+ SageMakerStudioUserIAMDefaultExecutionPolicy(): aws_iam.IManagedPolicy;
2725
+ /** Execution policy for using IAM roles with SageMaker Unified Studio. Allows users to access resources in your account (including broad access to all APIs in data services like S3, Glue, CloudWatch Logs, and others) for IAM-based usage of SageMaker Unified Studio. */
2726
+ SageMakerStudioUserIAMPermissiveExecutionPolicy(): aws_iam.IManagedPolicy;
2679
2727
  /** Provides read/write access to AWS Secrets Manager via the AWS Management Console. Note: this exludes IAM actions, so combine with IAMFullAccess if rotation configuration is required. */
2680
2728
  SecretsManagerReadWrite(): aws_iam.IManagedPolicy;
2681
2729
  /** The security audit template grants access to read security configuration metadata. It is useful for software that audits the configuration of an AWS account. */