@jjrawlins/cdk-ami-builder 0.0.19 → 0.0.20
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +3 -3
- package/cdk-ami-builder/jsii/jsii.go +2 -2
- package/cdk-ami-builder/version +1 -1
- package/lib/ImagePipeline/ImagePipeline.js +1 -1
- package/lib/Lambdas/CheckStateMachineStatus/CheckStateMachineStatus-function.js +1 -1
- package/lib/Lambdas/StartStateMachine/StartStateMachine-function.js +1 -1
- package/node_modules/cdk-iam-floyd/.claude/settings.local.json +30 -0
- package/node_modules/cdk-iam-floyd/CLAUDE.md +147 -0
- package/node_modules/cdk-iam-floyd/README.md +4 -4
- package/node_modules/cdk-iam-floyd/lib/generated/aws-managed-policies/cdk-iam-floyd.d.ts +62 -14
- package/node_modules/cdk-iam-floyd/lib/generated/aws-managed-policies/cdk-iam-floyd.js +124 -28
- package/node_modules/cdk-iam-floyd/lib/generated/aws-managed-policies/iam-floyd.d.ts +62 -14
- package/node_modules/cdk-iam-floyd/lib/generated/aws-managed-policies/iam-floyd.js +63 -15
- package/node_modules/cdk-iam-floyd/lib/generated/index.d.ts +8 -1
- package/node_modules/cdk-iam-floyd/lib/generated/index.js +26 -12
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/aioperations.d.ts +25 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/aioperations.js +39 -8
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/amplify.d.ts +0 -6
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/amplify.js +1 -7
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/apigatewaymanagement.d.ts +26 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/apigatewaymanagement.js +31 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/apigatewaymanagementv2.d.ts +169 -5
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/apigatewaymanagementv2.js +203 -8
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/appintegrations.d.ts +60 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/appintegrations.js +82 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/applicationmigrationservice.d.ts +12 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/applicationmigrationservice.js +13 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/applicationrecoverycontroller-zonalshift.d.ts +35 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/applicationrecoverycontroller-zonalshift.js +42 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/appstream2-0.d.ts +15 -15
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/appstream2-0.js +22 -22
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/appsync.d.ts +1 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/appsync.js +5 -3
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/arcregionswitch.d.ts +277 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/arcregionswitch.js +370 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/artifact.d.ts +10 -25
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/artifact.js +11 -34
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/auditmanager.d.ts +22 -5
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/auditmanager.js +23 -6
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/auroradsql.d.ts +96 -24
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/auroradsql.js +121 -30
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/backup.d.ts +62 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/backup.js +80 -2
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/backupsearch.d.ts +4 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/backupsearch.js +5 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/batch.d.ts +106 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/batch.js +137 -3
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/bedrock.d.ts +471 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/bedrock.js +595 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/bedrockagentcore.d.ts +912 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/bedrockagentcore.js +1203 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/billing.d.ts +6 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/billing.js +10 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/billingandcostmanagementdashboards.d.ts +122 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/billingandcostmanagementdashboards.js +165 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/billingandcostmanagementrecommendedactions.d.ts +25 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/billingandcostmanagementrecommendedactions.js +36 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/braket.d.ts +6 -6
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/braket.js +7 -10
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/budgetservice.d.ts +6 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/budgetservice.js +7 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/certificatemanager.d.ts +30 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/certificatemanager.js +36 -2
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/chatbot.d.ts +128 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/chatbot.js +134 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cleanrooms.d.ts +56 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cleanrooms.js +72 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cleanroomsml.d.ts +14 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cleanroomsml.js +18 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cloud9.d.ts +6 -8
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cloud9.js +8 -13
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cloudmap.d.ts +57 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cloudmap.js +69 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cloudtrail.d.ts +20 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cloudtrail.js +27 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cloudwatch.d.ts +8 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cloudwatch.js +12 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cloudwatchlogs.d.ts +8 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cloudwatchlogs.js +12 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cloudwatchobservabilityadminservice.d.ts +200 -9
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cloudwatchobservabilityadminservice.js +258 -14
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/codebuild.d.ts +1909 -4
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/codebuild.js +2131 -6
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/codepipeline.d.ts +8 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/codepipeline.js +12 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cognitouserpools.d.ts +8 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/cognitouserpools.js +12 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/connect.d.ts +44 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/connect.js +52 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/connectcases.d.ts +9 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/connectcases.js +13 -2
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/connectcustomerprofiles.d.ts +106 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/connectcustomerprofiles.js +142 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/connectoutboundcampaigns.d.ts +16 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/connectoutboundcampaigns.js +23 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/controlcatalog.d.ts +8 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/controlcatalog.js +12 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/costandusagereport.d.ts +3 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/costandusagereport.js +4 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/costexplorerservice.d.ts +24 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/costexplorerservice.js +31 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/dataexchange.d.ts +16 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/dataexchange.js +17 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/datazone.d.ts +57 -3
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/datazone.js +89 -8
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/deadlinecloud.d.ts +17 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/deadlinecloud.js +18 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/directoryservice.d.ts +142 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/directoryservice.js +173 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/dynamodb.d.ts +16 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/dynamodb.js +23 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/ec2.d.ts +521 -17
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/ec2.js +580 -29
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/ec2imagebuilder.d.ts +147 -62
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/ec2imagebuilder.js +155 -70
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/elasticblockstore.d.ts +2 -2
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/elasticblockstore.js +4 -4
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/elasticcontainerservice.d.ts +1 -30
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/elasticcontainerservice.js +2 -31
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/elastickubernetesservice.d.ts +47 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/elastickubernetesservice.js +62 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/elasticloadbalancing.d.ts +1 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/elasticloadbalancing.js +2 -2
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/elasticmapreduce.d.ts +8 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/elasticmapreduce.js +12 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/elementalmediaconnect.d.ts +55 -55
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/elementalmediaconnect.js +56 -56
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/elementalmediaconvert.d.ts +8 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/elementalmediaconvert.js +12 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/emroneksemrcontainers.d.ts +2 -13
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/emroneksemrcontainers.js +3 -16
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/emrserverless.d.ts +8 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/emrserverless.js +12 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/endusermessagingsocial.d.ts +64 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/endusermessagingsocial.js +91 -3
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/entityresolution.d.ts +8 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/entityresolution.js +12 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/eventbridge.d.ts +30 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/eventbridge.js +38 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/freetier.d.ts +32 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/freetier.js +48 -2
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/fsx.d.ts +32 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/fsx.js +42 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/glue.d.ts +249 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/glue.js +264 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/gluedatabrew.d.ts +16 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/gluedatabrew.js +17 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/guardduty.d.ts +138 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/guardduty.js +175 -3
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/healthimaging.d.ts +56 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/healthimaging.js +78 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/iamidentitycenter.d.ts +24 -51
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/iamidentitycenter.js +31 -70
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/identityandaccessmanagementiam.d.ts +40 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/identityandaccessmanagementiam.js +45 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/inspector2.d.ts +179 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/inspector2.js +232 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/interactivevideoservice.d.ts +30 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/interactivevideoservice.js +40 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/iot.d.ts +32 -4
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/iot.js +46 -9
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/iotfleetwise.d.ts +0 -32
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/iotfleetwise.js +1 -39
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/iotmanagedintegrations.d.ts +42 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/iotmanagedintegrations.js +47 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/iotsitewise.d.ts +133 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/iotsitewise.js +178 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/keymanagementservice.d.ts +1 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/keymanagementservice.js +2 -2
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/keyspacesforapachecassandra.d.ts +51 -2
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/keyspacesforapachecassandra.js +68 -3
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/kinesisdatastreams.d.ts +4 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/kinesisdatastreams.js +5 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/lexv2.d.ts +16 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/lexv2.js +23 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/managedserviceforprometheus.d.ts +129 -45
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/managedserviceforprometheus.js +151 -46
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/marketplacecatalog.d.ts +0 -32
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/marketplacecatalog.js +3 -47
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/marketplacemeteringservice.d.ts +4 -4
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/marketplacemeteringservice.js +5 -5
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/memorydb.d.ts +12 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/memorydb.js +16 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/mq.d.ts +6 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/mq.js +10 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/multi-partyapproval.d.ts +6 -6
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/multi-partyapproval.js +10 -10
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/neptuneanalytics.d.ts +28 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/neptuneanalytics.js +35 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/networkfirewall.d.ts +123 -3
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/networkfirewall.js +163 -5
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/opensearchserverless.d.ts +38 -6
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/opensearchserverless.js +51 -7
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/organizations.d.ts +29 -5
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/organizations.js +36 -6
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/outposts.d.ts +14 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/outposts.js +18 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/parallelcomputingservice.d.ts +5 -5
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/parallelcomputingservice.js +6 -6
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/partnercentralselling.d.ts +18 -16
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/partnercentralselling.js +19 -17
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/qbusiness.d.ts +87 -52
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/qbusiness.js +114 -73
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/qbusinessqapps.d.ts +0 -50
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/qbusinessqapps.js +1 -60
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/quicksight.d.ts +25 -20
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/quicksight.js +35 -23
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/rds.d.ts +59 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/rds.js +65 -2
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/redshift.d.ts +0 -4
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/redshift.js +1 -5
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/repostprivate.d.ts +48 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/repostprivate.js +67 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/resourceexplorer.d.ts +2 -2
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/resourceexplorer.js +7 -5
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/s3.d.ts +187 -175
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/s3.js +202 -176
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/s3express.d.ts +151 -2
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/s3express.js +174 -4
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/s3glacier.d.ts +2 -31
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/s3glacier.js +3 -36
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/s3vectors.d.ts +202 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/s3vectors.js +272 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/sagemaker.d.ts +197 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/sagemaker.js +241 -2
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/sagemakerwithmlflow.d.ts +54 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/sagemakerwithmlflow.js +83 -2
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/savingsplans.d.ts +1 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/savingsplans.js +2 -2
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/secretsmanager.d.ts +22 -22
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/secretsmanager.js +23 -23
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/securityhub.d.ts +295 -6
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/securityhub.js +375 -7
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/securityincidentresponse.d.ts +2 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/securityincidentresponse.js +3 -2
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/securitylake.d.ts +4 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/securitylake.js +5 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/securitytokenservice.d.ts +10 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/securitytokenservice.js +13 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/service-oracledatabase-aws.d.ts +548 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/service-oracledatabase-aws.js +718 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/serviceformanagingawsconsoleuserexperiencecapabilities-.d.ts +41 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/serviceformanagingawsconsoleuserexperiencecapabilities-.js +60 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/servicequotas.d.ts +8 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/servicequotas.js +12 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/shield.d.ts +24 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/shield.js +34 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/shieldnetworksecuritydirector.d.ts +89 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/shieldnetworksecuritydirector.js +128 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/simpleemailservicev2.d.ts +211 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/simpleemailservicev2.js +256 -3
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/snowdevicemanagement.d.ts +4 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/snowdevicemanagement.js +5 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/support.d.ts +24 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/support.js +35 -2
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/systemsmanager.d.ts +27 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/systemsmanager.js +32 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/systemsmanagerforsap.d.ts +51 -3
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/systemsmanagerforsap.js +76 -8
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/transcribe.d.ts +27 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/transcribe.js +28 -2
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/transform.d.ts +93 -8
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/transform.js +117 -9
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/usernotifications.d.ts +34 -2
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/usernotifications.js +51 -5
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/vpclattice.d.ts +6 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/vpclattice.js +10 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/workspaces.d.ts +83 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/workspaces.js +113 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/workspacessecurebrowser.d.ts +77 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/workspacessecurebrowser.js +101 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/workspacesthinclient.d.ts +1 -0
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/workspacesthinclient.js +2 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/x-ray.d.ts +35 -1
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/x-ray.js +40 -2
- package/node_modules/cdk-iam-floyd/package.json +10 -10
- package/package.json +2 -2
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/supportrecommendations.d.ts +0 -33
- package/node_modules/cdk-iam-floyd/lib/generated/policy-statements/supportrecommendations.js +0 -47
package/.jsii
CHANGED
|
@@ -19,7 +19,7 @@
|
|
|
19
19
|
"@types/aws-lambda": "^8.10.152",
|
|
20
20
|
"@types/crypto-js": "^4.2.2",
|
|
21
21
|
"@types/js-yaml": "^4.0.9",
|
|
22
|
-
"cdk-iam-floyd": "^0.
|
|
22
|
+
"cdk-iam-floyd": "^0.714.0",
|
|
23
23
|
"crypto-js": "^4.2.0",
|
|
24
24
|
"js-yaml": "^4.1.0",
|
|
25
25
|
"lodash": "^4.17.21",
|
|
@@ -5072,6 +5072,6 @@
|
|
|
5072
5072
|
"symbolId": "src/ImagePipeline/ImagePipeline:VolumeProps"
|
|
5073
5073
|
}
|
|
5074
5074
|
},
|
|
5075
|
-
"version": "0.0.
|
|
5076
|
-
"fingerprint": "
|
|
5075
|
+
"version": "0.0.20",
|
|
5076
|
+
"fingerprint": "jqSdXd7GZ6IcIuxZr4rS6Ro+4ju3/YgDOlA8rA+eSMs="
|
|
5077
5077
|
}
|
|
@@ -13,7 +13,7 @@ import (
|
|
|
13
13
|
constructs "github.com/aws/constructs-go/constructs/v10/jsii"
|
|
14
14
|
)
|
|
15
15
|
|
|
16
|
-
//go:embed jjrawlins-cdk-ami-builder-0.0.
|
|
16
|
+
//go:embed jjrawlins-cdk-ami-builder-0.0.19.tgz
|
|
17
17
|
var tarball []byte
|
|
18
18
|
|
|
19
19
|
// Initialize loads the necessary packages in the @jsii/kernel to support the enclosing module.
|
|
@@ -24,5 +24,5 @@ func Initialize() {
|
|
|
24
24
|
constructs.Initialize()
|
|
25
25
|
|
|
26
26
|
// Load this library into the kernel
|
|
27
|
-
_jsii_.Load("@jjrawlins/cdk-ami-builder", "0.0.
|
|
27
|
+
_jsii_.Load("@jjrawlins/cdk-ami-builder", "0.0.19", tarball)
|
|
28
28
|
}
|
package/cdk-ami-builder/version
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
0.0.
|
|
1
|
+
0.0.19
|
|
@@ -364,5 +364,5 @@ class ImagePipeline extends constructs_1.Construct {
|
|
|
364
364
|
}
|
|
365
365
|
exports.ImagePipeline = ImagePipeline;
|
|
366
366
|
_a = JSII_RTTI_SYMBOL_1;
|
|
367
|
-
ImagePipeline[_a] = { fqn: "@jjrawlins/cdk-ami-builder.ImagePipeline", version: "0.0.
|
|
367
|
+
ImagePipeline[_a] = { fqn: "@jjrawlins/cdk-ami-builder.ImagePipeline", version: "0.0.20" };
|
|
368
368
|
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"ImagePipeline.js","sourceRoot":"","sources":["../../src/ImagePipeline/ImagePipeline.ts"],"names":[],"mappings":";;;;;AAAA,yBAAyB;AACzB,kCAAkC;AAElC,6CAUqB;AACrB,2CAA2C;AAE3C,iDAA2C;AAC3C,iDAA0C;AAC1C,mEAAwD;AACxD,iDAA0C;AAC1C,2CAAuC;AACvC,sCAAsC;AACtC,gCAAgC;AAChC,0HAAsH;AACtH,wGAAoG;AACpG,kDAA+C;AA6M/C,MAAa,aAAc,SAAQ,sBAAS;IAK1C,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAyB;QACjE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,IAAI,oBAAiE,CAAC;QACtE,IAAI,WAAwC,CAAC;QAC7C,IAAI,CAAC,qBAAqB,GAAG,EAAE,CAAC;QAChC,IAAI,CAAC,OAAO,GAAG,EAAE,CAAC;QAClB,IAAI,CAAC,gBAAgB,GAAG,EAAE,CAAC;QAC3B,MAAM,OAAO,GAAG,mBAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,OAAO,CAAC;QACvC,MAAM,MAAM,GAAG,mBAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC;QACrC,MAAM,SAAS,GAAG,mBAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,SAAS,CAAC;QAC3C,MAAM,WAAW,GAAG,IAAI,aAAG,CAAC,IAAI,EAAE,aAAa,EAAE;YAC/C,WAAW,EAAE,uCAAuC;YACpD,KAAK,EAAE,gBAAgB,SAAS,cAAc;SAC/C,CAAC,CAAC;QACH,uBAAuB;QACvB,MAAM,KAAK,GAAG,IAAI,qBAAG,CAAC,KAAK,CAAC,IAAI,EAAE,mBAAmB,EAAE;YACrD,WAAW,EAAE,sBAAsB;YACnC,SAAS,EAAE,WAAW;SACvB,CAAC,CAAC;QAEH,IAAI,KAAK,CAAC,KAAK,IAAI,IAAI,EAAE,CAAC;YACxB,KAAK,CAAC,eAAe,CAAC,IAAI,mCAAa,CAAC,iBAAiB,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC;QAC1E,CAAC;QAED,MAAM,IAAI,GAAG,IAAI,qBAAG,CAAC,IAAI,CAAC,IAAI,EAAE,MAAM,EAAE;YACtC,SAAS,EAAE,IAAI,qBAAG,CAAC,gBAAgB,CAAC,mBAAmB,CAAC;YACxD,WAAW,EAAE,oDAAoD;SAClE,CAAC,CAAC;QAEH,IAAI,CAAC,gBAAgB,CAAC,qBAAG,CAAC,aAAa,CAAC,wBAAwB,CAAC,mCAAmC,CAAC,CAAC,CAAC;QACvG,IAAI,CAAC,gBAAgB,CAAC,qBAAG,CAAC,aAAa,CAAC,wBAAwB,CAAC,qDAAqD,CAAC,CAAC,CAAC;QACzH,IAAI,CAAC,gBAAgB,CAAC,qBAAG,CAAC,aAAa,CAAC,wBAAwB,CAAC,8BAA8B,CAAC,CAAC,CAAC;QAClG,IAAI,OAAO,KAAK,CAAC,kBAAkB,KAAK,WAAW,IAAI,KAAK,CAAC,kBAAkB,CAAC,MAAM,IAAI,CAAC,EAAE,CAAC;YAC5F,KAAK,MAAM,MAAM,IAAI,KAAK,CAAC,kBAAkB,EAAE,CAAC;gBAC9C,IAAI,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;YAChC,CAAC;QACH,CAAC;QAED,MAAM,mBAAmB,GAAG,KAAK,CAAC,WAAW,IAAI,GAAG,SAAS,kBAAkB,CAAC;QAChF,MAAM,eAAe,GAAG,GAAG,SAAS,8BAA8B,CAAC;QACnE,MAAM,eAAe,GAAG,GAAG,SAAS,cAAc,CAAC;QACnD,MAAM,kBAAkB,GAAG,KAAK,CAAC,kBAAkB,IAAI,OAAO,CAAC;QAC/D,MAAM,gBAAgB,GAAG,GAAG,SAAS,gBAAgB,CAAC;QACtD,MAAM,YAAY,GAAG,GAAG,gBAAgB,IAAI,kBAAkB,CAAC,OAAO,CAAC,KAAK,EAAE,GAAG,CAAC,EAAE,CAAC;QAErF,8EAA8E;QAC9E,mGAAmG;QACnG,uGAAuG;QACvG,MAAM,oBAAoB,GAAG,KAAK,CAAC,uBAAuB,IAAI,eAAe,CAAC;QAC9E,MAAM,0BAA0B,GAAG,KAAK,CAAC,uBAAuB,EAAE,CAAC,CAAC,CAAC,EAAE,GAAG,EAAE,QAAQ;YAClF,CAAC,CAAC,KAAK,CAAC,uBAAwB,CAAC,CAAC,CAAC,CAAC,GAAG,CAAC,QAAQ;YAChD,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,IAAI,eAAe,CAAC,CAAC;QACvD,MAAM,sBAAsB,GAAG,KAAK,CAAC,sBAAsB,IAAI,EAAE,CAAC;QAClE,MAAM,mBAAmB,GAAG,KAAK,CAAC,mBAAmB,IAAI,EAAE,CAAC;QAE5D,IAAI,CAAC,KAAK,CAAC,mBAAmB,EAAE,MAAM,KAAK,CAAC,IAAI,KAAK,CAAC,sBAAsB,EAAE,MAAM,CAAC;YACnF,CAAC,KAAK,CAAC,mBAAmB,EAAE,MAAM,IAAI,KAAK,CAAC,sBAAsB,EAAE,MAAM,KAAK,CAAC,CAAC,EAAE,CAAC;YACpF,MAAM,IAAI,KAAK,CAAC,8EAA8E,CAAC,CAAC;QAClG,CAAC;QAED,IAAI,CAAC,KAAK,CAAC,mBAAmB,EAAE,MAAM,IAAI,KAAK,CAAC,sBAAsB,EAAE,MAAM,CAAC,IAAI,KAAK,CAAC,uBAAuB,KAAK,eAAe,EAAE,CAAC;YACrI,MAAM,IAAI,KAAK,CAAC,4GAA4G,CAAC,CAAC;QAChI,CAAC;QAED,MAAM,OAAO,GAAG,IAAI,qBAAG,CAAC,kBAAkB,CAAC,IAAI,EAAE,iBAAiB,EAAE;YAClE,KAAK,EAAE,CAAC,IAAI,CAAC,QAAQ,CAAC;YACtB,mBAAmB,EAAE,mBAAmB;SACzC,CAAC,CAAC;QAEH,MAAM,YAAY,GAAG,IAAI,GAAG,CAAC,aAAa,CAAC,IAAI,EAAE,eAAe,EAAE;YAChE,GAAG,EAAE,KAAK,CAAC,GAAG;YACd,gBAAgB,EAAE,IAAI;SACvB,CAAC,CAAC;QAEH,IAAI,KAAK,CAAC,cAAc,IAAI,IAAI,IAAI,KAAK,CAAC,QAAQ,IAAI,IAAI,EAAE,CAAC;YAC3D,oBAAoB,GAAG,IAAI,8BAAY,CAAC,8BAA8B,CAAC,IAAI,EAAE,6BAA6B,EAAE;gBAC1G,mBAAmB,EAAE,mBAAmB;gBACxC,IAAI,EAAE,eAAe;gBACrB,WAAW,EAAE,gDAAgD;gBAC7D,aAAa,EAAE,KAAK,CAAC,aAAa,IAAI,CAAC,WAAW,EAAE,UAAU,EAAE,WAAW,CAAC;gBAC5E,WAAW,EAAE,KAAK,CAAC,QAAQ;gBAC3B,gBAAgB,EAAE,CAAC,YAAY,CAAC,eAAe,CAAC;gBAChD,QAAQ,EAAE,KAAK,CAAC,GAAG,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC,QAAQ;aAC9C,CAAC,CAAC;QAEL,CAAC;aAAM,CAAC;YACN,oBAAoB,GAAG,IAAI,8BAAY,CAAC,8BAA8B,CAAC,IAAI,EAAE,6BAA6B,EAAE;gBAC1G,mBAAmB,EAAE,mBAAmB;gBACxC,IAAI,EAAE,eAAe;gBACrB,WAAW,EAAE,gDAAgD;gBAC7D,aAAa,EAAE,KAAK,CAAC,aAAa,IAAI,CAAC,WAAW,EAAE,UAAU,EAAE,WAAW,CAAC;gBAC5E,WAAW,EAAE,KAAK,CAAC,QAAQ;gBAC3B,gBAAgB,EAAE,KAAK,CAAC,cAAc;gBACtC,QAAQ,EAAE,KAAK,CAAC,QAAQ;aACzB,CAAC,CAAC;QACL,CAAC;QACD,oBAAoB,CAAC,aAAa,CAAC,OAAO,CAAC,CAAC;QAE5C;;eAEO;QACP,IAAI,gBAAkD,CAAC;QACvD,gBAAgB,GAAG;YACjB,UAAU,EAAE,EAAE;YACd,IAAI,EAAE,eAAe;YACrB,WAAW,EAAE,KAAK,CAAC,WAAW;YAC9B,OAAO,EAAE,kBAAkB,IAAI,OAAO;SACvC,CAAC;QACF,IAAI,KAAK,CAAC,cAAc,EAAE,CAAC;YACzB,gBAAgB,GAAG;gBACjB,GAAG,gBAAgB;gBACnB,+BAA+B,EAAE;oBAC/B,gBAAgB,EAAE,KAAK,CAAC,cAAc;iBACvC;aACF,CAAC;QACJ,CAAC;QAED,IAAI,KAAK,CAAC,uBAAuB,EAAE,CAAC,CAAC,CAAC,CAAC,GAAG,EAAE,CAAC;YAC3C,iDAAiD;YACjD,KAAK,MAAM,MAAM,IAAI,KAAK,CAAC,uBAAwB,EAAE,CAAC;gBACpD,sCAAsC;gBACtC,IAAI,MAAM,CAAC,GAAG,CAAC,SAAS,KAAK,SAAS,EAAE,CAAC;oBACvC,MAAM,CAAC,GAAG,CAAC,SAAS,GAAG,IAAI,CAAC;gBAC9B,CAAC;gBAED,4CAA4C;gBAC5C,IAAI,CAAC,MAAM,CAAC,GAAG,CAAC,QAAQ,EAAE,CAAC;oBACzB,MAAM,CAAC,GAAG,CAAC,QAAQ,GAAG,0BAA0B,CAAC;gBACnD,CAAC;gBAED,+CAA+C;gBAC/C,IAAI,CAAC,MAAM,CAAC,GAAG,CAAC,mBAAmB,EAAE,CAAC;oBACpC,MAAM,CAAC,GAAG,CAAC,mBAAmB,GAAG,IAAI,CAAC;gBACxC,CAAC;YACH,CAAC;YACD,gBAAgB,GAAG;gBACjB,GAAG,gBAAgB;gBACnB,mBAAmB,EAAE,KAAK,CAAC,uBAAuB;aACnD,CAAC;QACJ,CAAC;aAAM,CAAC;YACN,gBAAgB,GAAG;gBACjB,GAAG,gBAAgB;gBACnB,mBAAmB,EAAE;oBACnB;wBACE,UAAU,EAAE,WAAW;wBACvB,GAAG,EAAE;4BACH,QAAQ,EAAE,eAAe;4BACzB,SAAS,EAAE,IAAI;4BACf,UAAU,EAAE,EAAE;4BACd,UAAU,EAAE,KAAK;4BACjB,mBAAmB,EAAE,IAAI;yBAC1B;qBACF;iBACF;aACF,CAAC;QACJ,CAAC;QACD,WAAW,GAAG,IAAI,8BAAY,CAAC,cAAc,CAAC,IAAI,EAAE,aAAa,EAAE,gBAAgB,CAAC,CAAC;QAErF,KAAK,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC,SAA0B,EAAE,KAAa,EAAE,EAAE;YACrE,MAAM,aAAa,GAAG,SAAS,CAAC,IAAI,EAAE,OAAO,CAAC,IAAI,EAAE,GAAG,CAAC,CAAC;YACzD,SAAS,CAAC,IAAI,GAAG,aAAa,CAAC;YAC/B,MAAM,aAAa,GAAG,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC,CAAC;YAClE,MAAM,qBAAqB,GAAG,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,SAAS,CAAC,SAAS,CAAC,iBAAiB,CAAC,CAAC,CAAC;YAC5F,MAAM,iBAAiB,GAAuB;gBAC5C,IAAI,EAAE,aAAa,IAAI,GAAG,SAAS,IAAI,qBAAqB,IAAI,KAAK,EAAE;gBACvE,WAAW,EAAE,SAAS,CAAC,WAAW;gBAClC,aAAa,EAAE,SAAS,CAAC,aAAa,IAAI,KAAK;gBAC/C,MAAM,EAAE,SAAS,CAAC,iBAAiB,CAAC,MAAM;aAC3C,CAAC;YACF,MAAM,IAAI,GAAG,IAAI,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC;YAC1C,IAAI,YAAY,GAAG,IAAI,8BAAY,CAAC,YAAY,CAAC,IAAI,EAAE,SAAS,CAAC,IAAI,IAAI,aAAa,KAAK,EAAE,EAAE;gBAC7F,IAAI,EAAE,SAAS,CAAC,IAAI,IAAI,GAAG,SAAS,CAAC,WAAW,EAAE,IAAI,aAAa,IAAI,KAAK,EAAE;gBAC9E,WAAW,EAAE,SAAS,CAAC,WAAW;gBAClC,QAAQ,EAAE,SAAS,CAAC,QAAQ,IAAI,OAAO;gBACvC,OAAO,EAAE,SAAS,CAAC,gBAAgB,IAAI,KAAK,CAAC,kBAAkB,IAAI,OAAO;gBAC1E,IAAI,EAAE,IAAI;aACX,CAAC,CAAC;YAEH,wCAAwC;YACxC,IAAI,CAAC,qBAAqB,CAAC,IAAI,CAAC,EAAE,YAAY,EAAE,YAAY,CAAC,OAAO,EAAE,CAAC,CAAC;YACxE,WAAW,CAAC,UAAU,GAAG,IAAI,CAAC,qBAAqB,CAAC;QACtD,CAAC,CAAC,CAAC;QAEH,MAAM,eAAe,GAAG,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,qBAAqB,CAAC,CAAC,CAAC;QACrF,WAAW,CAAC,IAAI,GAAG,GAAG,eAAe,IAAI,eAAe,IAAI,kBAAkB,CAAC,OAAO,CAAC,KAAK,EAAE,GAAG,CAAC,EAAE,CAAC;QAErG,IAAI,kBAAsD,CAAC;QAC3D,kBAAkB,GAAG;YACnB,8BAA8B,EAAE,oBAAoB,CAAC,OAAO;YAC5D,IAAI,EAAE,YAAY;YAClB,WAAW,EAAE,gBAAgB;YAC7B,cAAc,EAAE,WAAW,CAAC,OAAO;SACpC,CAAC;QACF,IAAI,KAAK,CAAC,eAAe,EAAE,CAAC;YAC1B,kBAAkB,GAAG;gBACnB,GAAG,kBAAkB;gBACrB,0BAA0B,EAAE;oBAC1B,oBAAoB,EAAE,KAAK,CAAC,eAAe;oBAC3C,gBAAgB,EAAE;wBAChB,cAAc,EAAE,KAAK,CAAC,iBAAiB;wBACvC,aAAa,EAAE,KAAK,CAAC,iBAAiB;qBACvC;iBACF;aACF,CAAC;QACJ,CAAC;QACD,IAAI,sBAAsB,CAAC,MAAM,GAAG,CAAC,IAAI,mBAAmB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACxE,MAAM,iBAAiB,GAAqE,EAAE,CAAC;YAC/F,mBAAmB,CAAC,OAAO,CAAC,kBAAkB,CAAC,EAAE;gBAC/C,MAAM,kBAAkB,GAAQ;oBAC9B,MAAM,EAAE,kBAAkB;oBAC1B,4BAA4B,EAAE;wBAC5B,8GAA8G;wBAC9G,wJAAwJ;wBACxJ,IAAI,EAAE,GAAG,eAAe,IAAI,kBAAkB,6BAA6B;wBAC3E,WAAW,EAAE,YAAY,eAAe,OAAO,kBAAkB,EAAE;wBACnE,gBAAgB,EAAE,sBAAsB;wBACxC,6BAA6B,EAAE;4BAC7B,OAAO,EAAE,sBAAsB;yBAChC;wBACD,QAAQ,EAAE,oBAAoB,EAAE,gEAAgE;qBACjG;iBACF,CAAC;gBACF,iBAAiB,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC;YAC7C,CAAC,CAAC,CAAC;YACH,MAAM,4BAA4B,GAAG,IAAI,8BAAY,CAAC,4BAA4B,CAAC,IAAI,EAAE,8BAA8B,EAAE;gBACvH,IAAI,EAAE,GAAG,eAAe,wBAAwB,kBAAkB,CAAC,OAAO,CAAC,KAAK,EAAE,GAAG,CAAC,EAAE;gBACxF,WAAW,EAAE,2CAA2C,eAAe,EAAE;gBACzE,aAAa,EAAE,iBAAiB;aACjC,CAAC,CAAC;YACH,kBAAkB,GAAG;gBACnB,GAAG,kBAAkB;gBACrB,4BAA4B,EAAE,4BAA4B,CAAC,OAAO;aACnE,CAAC;QACJ,CAAC;QAED,MAAM,kBAAkB,GAAG,IAAI,8BAAY,CAAC,gBAAgB,CAAC,IAAI,EAAE,eAAe,EAAE,kBAAkB,CAAC,CAAC;QACxG,IAAI,CAAC,gBAAgB,GAAG,kBAAkB,CAAC,OAAO,CAAC;QAEnD,MAAM,yBAAyB,GAAG,IAAI,sDAAyB,CAAC,IAAI,EAAE,2BAA2B,EAC/F;YACE,WAAW,EAAE,2BAA2B;YACxC,UAAU,EAAE,GAAG;YACf,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YAC7B,aAAa,EAAE;gBACb,IAAI,yBAAS,CAAC,MAAM,EAAE,CAAC,KAAK,EAAE;qBAC3B,gBAAgB,EAAE;qBAClB,qBAAqB,EAAE;qBACvB,gBAAgB,EAAE;qBAClB,mBAAmB,EAAE;qBACrB,cAAc,EAAE;gBACnB,IAAI,yBAAS,CAAC,YAAY,EAAE,CAAC,KAAK,EAAE;qBACjC,oBAAoB,EAAE;qBACtB,6BAA6B,EAAE;qBAC/B,UAAU,EAAE;qBACZ,cAAc,EAAE;gBACnB,IAAI,qBAAG,CAAC,eAAe,CAAC;oBACtB,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;oBACxB,OAAO,EAAE;wBACP,OAAO;qBACR;oBACD,+EAA+E;oBAC/E,SAAS,EAAE,CAAC,iBAAG,CAAC,MAAM,CAAC;4BACrB,OAAO,EAAE,KAAK;4BACd,QAAQ,EAAE,eAAe;4BACzB,OAAO,EAAE,GAAG;4BACZ,MAAM,EAAE,GAAG;4BACX,SAAS,EAAE,KAAK;yBACjB,CAAC,CAAC;iBACJ,CAAC;aACH;SACF,CAAC,CAAC;QAEL,MAAM,+BAA+B,GAAG,IAAI,kEAA+B,CAAC,IAAI,EAAE,iCAAiC,EAAE;YACnH,WAAW,EAAE,iCAAiC;YAC9C,UAAU,EAAE,GAAG;YACf,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YAC7B,aAAa,EAAE;gBACb,IAAI,yBAAS,CAAC,MAAM,EAAE,CAAC,KAAK,EAAE;qBAC3B,mBAAmB,EAAE;qBACrB,gBAAgB,EAAE;qBAClB,qBAAqB,EAAE;qBACvB,cAAc,EAAE;gBACnB,IAAI,yBAAS,CAAC,YAAY,EAAE,CAAC,KAAK,EAAE;qBACjC,oBAAoB,EAAE;qBACtB,6BAA6B,EAAE;qBAC/B,UAAU,EAAE;qBACZ,cAAc,EAAE;gBACnB,IAAI,yBAAS,CAAC,GAAG,EAAE,CAAC,KAAK,EAAE;qBACxB,sBAAsB,EAAE;qBACxB,cAAc,EAAE;gBACnB,IAAI,qBAAG,CAAC,eAAe,CAAC;oBACtB,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;oBACxB,OAAO,EAAE;wBACP,OAAO;qBACR;oBACD,SAAS,EAAE,CAAC,iBAAG,CAAC,MAAM,CAAC;4BACrB,OAAO,EAAE,KAAK;4BACd,QAAQ,EAAE,eAAe;4BACzB,OAAO,EAAE,GAAG;4BACZ,MAAM,EAAE,GAAG;4BACX,SAAS,EAAE,KAAK;yBACjB,CAAC,CAAC;iBACJ,CAAC;aACH;SACF,CAAC,CAAC;QAEH,MAAM,QAAQ,GAAG,IAAI,2BAAQ,CAAC,IAAI,EAAE,kBAAkB,EAAE;YACtD,cAAc,EAAE,yBAAyB;YACzC,iBAAiB,EAAE,+BAA+B;YAClD,YAAY,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YAClC,aAAa,EAAE,sBAAQ,CAAC,OAAO,CAAC,CAAC,CAAC;SACnC,CAAC,CAAC;QAEH,MAAM,gBAAgB,GAAG,IAAI,cAAI,CAAC,IAAI,EAAE,kBAAkB,EAAE;YAC1D,SAAS,EAAE,IAAI,qBAAG,CAAC,gBAAgB,CAAC,sBAAsB,CAAC;YAC3D,eAAe,EAAE;gBACf,qBAAG,CAAC,aAAa,CAAC,wBAAwB,CAAC,4BAA4B,CAAC;aACzE;YACD,cAAc,EAAE;gBACd,kBAAkB,EAAE,IAAI,qBAAG,CAAC,cAAc,CAAC;oBACzC,UAAU,EAAE;wBACV,IAAI,yBAAS,CAAC,IAAI,EAAE,CAAC,KAAK,EAAE;6BACzB,kBAAkB,EAAE;6BACpB,qBAAqB,EAAE;6BACvB,kBAAkB,EAAE;6BACpB,oBAAoB,EAAE;6BACtB,cAAc,EAAE;wBACnB,IAAI,qBAAG,CAAC,eAAe,CAAC;4BACtB,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;4BACxB,OAAO,EAAE;gCACP,gBAAgB;6BACjB;4BACD,SAAS,EAAE,CAAC,wBAAwB,MAAM,IAAI,GAAG,IAAI,OAAO,IAAI,GAAG,mBAAmB,gBAAgB,CAAC,WAAW,EAAE,IAAI,CAAC;yBAC1H,CAAC;wBACF,IAAI,yBAAS,CAAC,YAAY,EAAE,CAAC,KAAK,EAAE;6BACjC,UAAU,EAAE;6BACZ,cAAc,EAAE;qBACpB;iBACF,CAAC;aACH;SACF,CAAC,CAAC;QAEH,MAAM,YAAY,GAAG,IAAI,2BAAY,CAAC,IAAI,EAAE,cAAc,EAAE;YAC1D,UAAU,EAAE,IAAI,CAAC,KAAK,CACpB,EAAE,CAAC,YAAY,CAAC,IAAI,CAAC,IAAI,CACvB,SAAS,EAAE,IAAI,EAAE,mBAAmB,EAAE,gCAAgC,CAAC,EAAE,MAAM,CAAC,CAAC,QAAQ,EAAE,CAAC;YAChG,IAAI,EAAE,gBAAgB;SACvB,CAAC,CAAC;QAEH,MAAM,sBAAsB,GAAG,KAAK,CAAC,kBAAkB,KAAK,IAAI,CAAC,CAAC,CAAC,2BAAa,CAAC,0BAA0B,CAAC,CAAC,CAAC,2BAAa,CAAC,OAAO,CAAC;QAEpI,MAAM,cAAc,GAAG,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,SAAS,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC;QAC1E,MAAM,aAAa,GAAG,IAAI,4BAAc,CAAC,IAAI,EAAE,gBAAgB,EAC7D;YACE,YAAY,EAAE,QAAQ,CAAC,YAAY;YACnC,UAAU,EAAE;gBACV,gBAAgB,EAAE,kBAAkB,CAAC,OAAO;gBAC5C,eAAe,EAAE,YAAY,CAAC,eAAe;gBAC7C,OAAO,EAAE,KAAK,CAAC,kBAAkB,IAAI,OAAO;gBAC5C,cAAc,EAAE,cAAc;gBAC9B,kBAAkB,EAAE,GAAG,SAAS,kBAAkB,kBAAkB,CAAC,OAAO,CAAC,KAAK,EAAE,GAAG,CAAC,EAAE;gBAC1F,QAAQ,EAAE,oBAAoB;gBAC9B,gBAAgB,EAAE,sBAAsB,CAAC,IAAI,CAAC,GAAG,CAAC;gBAClD,kBAAkB,EAAE,KAAK,CAAC,kBAAkB,KAAK,IAAI,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,OAAO;aACzE;YACD,aAAa,EAAE,sBAAsB;SACtC,CAAC,CAAC;QAEL,IAAI,CAAC,OAAO,GAAG,aAAa,CAAC,YAAY,CAAC,OAAO,CAAC,CAAC;IACrD,CAAC;IAEO,WAAW,CAAC,WAAmB;QACrC,OAAO,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC,QAAQ,EAAE,CAAC;IAC9C,CAAC;;AA1XH,sCA4XC","sourcesContent":["import * as fs from 'fs';\nimport * as path from 'node:path';\n\nimport {\n  Arn,\n  aws_iam as iam,\n  aws_imagebuilder as imagebuilder,\n  aws_sns as sns,\n  aws_sns_subscriptions as subscriptions,\n  CustomResource,\n  Duration,\n  RemovalPolicy,\n  Stack,\n} from 'aws-cdk-lib';\nimport * as ec2 from 'aws-cdk-lib/aws-ec2';\nimport { Vpc } from 'aws-cdk-lib/aws-ec2';\nimport { Role } from 'aws-cdk-lib/aws-iam';\nimport { Key } from 'aws-cdk-lib/aws-kms';\nimport { Provider } from 'aws-cdk-lib/custom-resources';\nimport { Statement } from 'cdk-iam-floyd';\nimport { Construct } from 'constructs';\nimport * as CryptoJS from 'crypto-js';\nimport * as yaml from 'js-yaml';\nimport { CheckStateMachineStatusFunction } from '../Lambdas/CheckStateMachineStatus/CheckStateMachineStatus-function';\nimport { StartStateMachineFunction } from '../Lambdas/StartStateMachine/StartStateMachine-function';\nimport { StateMachine } from '../StateMachine';\n\nexport interface IEbsParameters {\n  /**\n     * Size of the volume in GiB\n     */\n  volumeSize: number;\n  /**\n     * Type of the volume\n     *\n     * @default gp2\n     */\n  volumeType?: string;\n  /**\n     * KMS Key Alias for the volume\n     * If not specified, the default AMI encryption key alias will be used\n     * Custom KMS Keys Alias need to exist in the other accounts for distribution to work correctly.\n     * @default alias/aws/ebs\n     */\n  kmsKeyId?: string;\n  /**\n     * Whether the volume is encrypted\n     *\n     * @default true\n     */\n  encrypted?: boolean;\n  /**\n     * Whether the volume is deleted when the instance is terminated\n     *\n     * @default true\n     */\n  deleteOnTermination?: boolean;\n}\n\nexport interface VolumeProps {\n  /**\n     * Name of the volume\n     */\n  readonly deviceName: string;\n  /**\n     * EBS Block Store Parameters\n     *\n     * By default, the 'kmsKeyId' of EBS volume is set to 'amiEncryptionKey.keyId',\n     * and 'encrypted' is set to 'true'. If you wish to use a different KMS Key,\n     * you may do so. However, please make sure that the necessary permissions\n     * and compliance requirements for the KMS Key are already set up.\n     */\n  readonly ebs: IEbsParameters;\n}\n\n/**\n * Build commands for the component\n */\nexport interface IActionCommands {\n  commands: string[];\n}\n\nexport interface IStepCommands {\n  name: string; // ^[-_A-Za-z-0-9][-_A-Za-z0-9 ]{1,126}[-_A-Za-z-0-9]$/\n  action: 'ExecuteBash' | 'ExecutePowerShell' | 'UpdateOS';\n  inputs?: IActionCommands;\n}\n\n/**\n * Phases for the component\n */\nexport interface IPhases {\n  name: 'build' | 'validate' | 'test';\n  steps: IStepCommands[];\n}\n\nexport interface IInputParameter {\n  type: string;\n  default: string;\n  description: string;\n}\n\nexport type IParameters = Record<string, IInputParameter>;\n\n/**\n * Component data\n */\nexport interface IComponentDocument {\n  name?: string;\n  description?: string;\n  schemaVersion?: string;\n  phases: IPhases[];\n}\n\n/**\n * Component props\n */\nexport interface IComponentProps {\n  name?: string;\n  description?: string;\n  componentVersion?: string;\n  schemaVersion?: string;\n  parameters?: IParameters;\n  platform?: 'Linux' | 'Windows';\n  componentDocument: IComponentDocument;\n}\n\nexport interface ImagePipelineProps {\n  readonly subnetId?: string;\n  readonly securityGroups?: string[];\n  readonly distributionRegions?: string[];\n  /**\n     * Vpc to use for the Image Builder Pipeline\n     */\n  readonly vpc: Vpc;\n  /**\n     * List of component props\n     */\n  readonly components: IComponentProps[];\n  /**\n     * Name of the instance profile that will be associated with the Instance Configuration.\n     */\n  readonly profileName?: string;\n  /**\n     * Additional policies to add to the instance profile associated with the Instance Configurations\n     */\n  readonly additionalPolicies?: iam.ManagedPolicy[];\n\n  /**\n     * UserData script that will override default one (if specified)\n     *\n     * @default - none\n     */\n  readonly userDataScript?: string;\n  /**\n     * Image recipe version (Default: 0.0.1)\n     */\n  readonly imageRecipeVersion?: string;\n\n  /**\n     * The source (parent) image that the image recipe uses as its base environment. The value can be the parent image ARN or an Image Builder AMI ID\n     */\n  readonly parentImage: string;\n\n  /**\n     * List of instance types used in the Instance Configuration (Default: [ 't3.medium', 'm5.large', 'm5.xlarge' ])\n     */\n  readonly instanceTypes?: string[];\n  /**\n     * Platform type Linux or Windows (Default: Linux)\n     */\n  readonly platform?: 'Linux' | 'Windows';\n  /**\n     * Email used to receive Image Builder Pipeline Notifications via SNS\n     */\n  readonly email?: string;\n  /**\n     * List of security group IDs for the Infrastructure Configuration\n     */\n  readonly securityGroupIds?: string[];\n  /**\n     * Subnet ID for the Infrastructure Configuration\n     */\n  readonly ebsVolumeConfigurations?: VolumeProps[];\n  /**\n     * Set to true if you want to enable continuous vulnerability scans through AWS Inpector\n     */\n  readonly enableVulnScans?: boolean;\n  /**\n     * Store vulnerability scans through AWS Inspector in ECR using this repo name (if option is enabled)\n     */\n  readonly vulnScansRepoName?: string;\n  /**\n     * Store vulnerability scans through AWS Inspector in ECR using these image tags (if option is enabled)\n     */\n  readonly vulnScansRepoTags?: string[];\n\n  /**\n     * This variable represents an array of shared account IDs.\n     * It is optional and readonly.\n     * If it is provided, this AMI will be visible to the accounts in the array.\n     *  In order to share the AMI with other accounts, you must specify a KMS key ID for the EBS volume configuration as AWS does not allow sharing AMIs encrypted with the default AMI encryption key.\n     * @type {Array<string>}\n     * @readonly\n     */\n  readonly distributionAccountIds?: string[];\n\n  /**\n     * Flag indicating whether the debug image pipeline is enabled or not.\n     * This variable is optional. Default value is false.\n     *  Functionally, this will flag to return as finished immediately after first check to see if the image pipeline has finished.\n     *  This is useful for debugging the image pipeline.  However, there will be no AMI value returned.\n     *\n     * @type {boolean}\n     * @readonly\n     */\n  readonly debugImagePipeline?: boolean;\n\n  /**\n     * The alias of the KMS key used for encryption and decryption of content in the distribution.\n     * This property is optional and readonly.\n     * The default encryption key is not compatible with cross-account AMI sharing.\n     * If you specify distributionAccountIds, you must specify a non-default encryption key using this property. Otherwise, Image Builder will throw an error.\n     * Keep in mind that the KMS key in the distribution account must allow the EC2ImageBuilderDistributionCrossAccountRole role to use the key.\n     * @type {string}\n     * @readonly\n     */\n  readonly distributionKmsKeyAlias?: string;\n}\n\nexport class ImagePipeline extends Construct {\n  imageRecipeComponents: imagebuilder.CfnImageRecipe.ComponentConfigurationProperty[];\n  imagePipelineArn: string;\n  imageId: string;\n\n  constructor(scope: Construct, id: string, props: ImagePipelineProps) {\n    super(scope, id);\n    let infrastructureConfig: imagebuilder.CfnInfrastructureConfiguration;\n    let imageRecipe: imagebuilder.CfnImageRecipe;\n    this.imageRecipeComponents = [];\n    this.imageId = '';\n    this.imagePipelineArn = '';\n    const account = Stack.of(this).account;\n    const region = Stack.of(this).region;\n    const stackName = Stack.of(this).stackName;\n    const topicKmsKey = new Key(this, 'TopicKmsKey', {\n      description: 'KMS Key used to encrypt the SNS topic',\n      alias: `/ami-builder/${stackName}-TopicKmsKey`,\n    });\n    // Construct code below\n    const topic = new sns.Topic(this, 'ImageBuilderTopic', {\n      displayName: 'Image Builder Notify',\n      masterKey: topicKmsKey,\n    });\n\n    if (props.email != null) {\n      topic.addSubscription(new subscriptions.EmailSubscription(props.email));\n    }\n\n    const role = new iam.Role(this, 'Role', {\n      assumedBy: new iam.ServicePrincipal('ec2.amazonaws.com'),\n      description: 'IAM role used as part of an Image Builder pipeline',\n    });\n\n    role.addManagedPolicy(iam.ManagedPolicy.fromAwsManagedPolicyName('EC2InstanceProfileForImageBuilder'));\n    role.addManagedPolicy(iam.ManagedPolicy.fromAwsManagedPolicyName('EC2InstanceProfileForImageBuilderECRContainerBuilds'));\n    role.addManagedPolicy(iam.ManagedPolicy.fromAwsManagedPolicyName('AmazonSSMManagedInstanceCore'));\n    if (typeof props.additionalPolicies !== 'undefined' && props.additionalPolicies.length >= 1) {\n      for (const policy of props.additionalPolicies) {\n        role.addManagedPolicy(policy);\n      }\n    }\n\n    const instanceProfileName = props.profileName ?? `${stackName}-InstanceProfile`;\n    const infraConfigName = `${stackName}-InfrastructureConfiguration`;\n    const imageRecipeName = `${stackName}-ImageRecipe`;\n    const imageRecipeVersion = props.imageRecipeVersion ?? '0.0.1';\n    const pipelineBaseName = `${stackName}-ImagePipeline`;\n    const pipelineName = `${pipelineBaseName}-${imageRecipeVersion.replace(/\\./g, '-')}`;\n\n    // Use the first volume configuration's KMS key ID as the effective KMS key ID\n    // If the first volume configuration does not have a KMS key ID, use the default AMI encryption key\n    // Keep in mind though that default AMI encryption key is not compatible with cross-account AMI sharing\n    const distributionKeyAlias = props.distributionKmsKeyAlias ?? 'alias/aws/ebs';\n    const ebsVolumeEffectiveKmsAlias = props.ebsVolumeConfigurations?.[0]?.ebs?.kmsKeyId\n      ? props.ebsVolumeConfigurations![0].ebs.kmsKeyId\n      : (props.distributionKmsKeyAlias ?? 'alias/aws/ebs');\n    const distributionAccountIds = props.distributionAccountIds ?? [];\n    const distributionRegions = props.distributionRegions ?? [];\n\n    if ((props.distributionRegions?.length === 0 && props.distributionAccountIds?.length) ||\n      (props.distributionRegions?.length && props.distributionAccountIds?.length === 0)) {\n      throw new Error('distributionRegions must be specified if distributionAccountIds is specified');\n    }\n\n    if ((props.distributionRegions?.length && props.distributionAccountIds?.length) && props.distributionKmsKeyAlias === 'alias/aws/ebs') {\n      throw new Error('If distributionRegions and distributionAccountIds are specified, distributionKmsKeyAlias must be specified');\n    }\n\n    const profile = new iam.CfnInstanceProfile(this, 'InstanceProfile', {\n      roles: [role.roleName],\n      instanceProfileName: instanceProfileName,\n    });\n\n    const defaultGroup = new ec2.SecurityGroup(this, 'SecurityGroup', {\n      vpc: props.vpc,\n      allowAllOutbound: true,\n    });\n\n    if (props.securityGroups == null || props.subnetId == null) {\n      infrastructureConfig = new imagebuilder.CfnInfrastructureConfiguration(this, 'InfrastructureConfiguration', {\n        instanceProfileName: instanceProfileName,\n        name: infraConfigName,\n        description: 'Infrastructure Configuration for Image Builder',\n        instanceTypes: props.instanceTypes ?? ['t3.medium', 'm5.large', 'm5.xlarge'],\n        snsTopicArn: topic.topicArn,\n        securityGroupIds: [defaultGroup.securityGroupId],\n        subnetId: props.vpc.publicSubnets[0].subnetId,\n      });\n\n    } else {\n      infrastructureConfig = new imagebuilder.CfnInfrastructureConfiguration(this, 'InfrastructureConfiguration', {\n        instanceProfileName: instanceProfileName,\n        name: infraConfigName,\n        description: 'Infrastructure Configuration for Image Builder',\n        instanceTypes: props.instanceTypes ?? ['t3.medium', 'm5.large', 'm5.xlarge'],\n        snsTopicArn: topic.topicArn,\n        securityGroupIds: props.securityGroups,\n        subnetId: props.subnetId,\n      });\n    }\n    infrastructureConfig.addDependency(profile);\n\n    /**\n         * Image recipe configuration\n         */\n    let imageRecipeProps: imagebuilder.CfnImageRecipeProps;\n    imageRecipeProps = {\n      components: [],\n      name: imageRecipeName,\n      parentImage: props.parentImage,\n      version: imageRecipeVersion ?? '0.0.1',\n    };\n    if (props.userDataScript) {\n      imageRecipeProps = {\n        ...imageRecipeProps,\n        additionalInstanceConfiguration: {\n          userDataOverride: props.userDataScript,\n        },\n      };\n    }\n\n    if (props.ebsVolumeConfigurations?.[0].ebs) {\n      // Go over each configuration and set the default\n      for (const config of props.ebsVolumeConfigurations!) {\n        // If encryption is not set, enable it\n        if (config.ebs.encrypted === undefined) {\n          config.ebs.encrypted = true;\n        }\n\n        // If KMS Key ID is not set, use the default\n        if (!config.ebs.kmsKeyId) {\n          config.ebs.kmsKeyId = ebsVolumeEffectiveKmsAlias;\n        }\n\n        // If deleteOnTermination is not set, enable it\n        if (!config.ebs.deleteOnTermination) {\n          config.ebs.deleteOnTermination = true;\n        }\n      }\n      imageRecipeProps = {\n        ...imageRecipeProps,\n        blockDeviceMappings: props.ebsVolumeConfigurations,\n      };\n    } else {\n      imageRecipeProps = {\n        ...imageRecipeProps,\n        blockDeviceMappings: [\n          {\n            deviceName: '/dev/sda1',\n            ebs: {\n              kmsKeyId: 'alias/aws/ebs',\n              encrypted: true,\n              volumeSize: 30,\n              volumeType: 'gp3',\n              deleteOnTermination: true,\n            },\n          },\n        ],\n      };\n    }\n    imageRecipe = new imagebuilder.CfnImageRecipe(this, 'ImageRecipe', imageRecipeProps);\n\n    props.components.forEach((component: IComponentProps, index: number) => {\n      const componentName = component.name?.replace(/ /g, '-');\n      component.name = componentName;\n      const componentHash = this.stringToMD5(JSON.stringify(component));\n      const componentDocumentHash = this.stringToMD5(JSON.stringify(component.componentDocument));\n      const componentDocument: IComponentDocument = {\n        name: componentName ?? `${stackName}-${componentDocumentHash}-${index}`,\n        description: component.description,\n        schemaVersion: component.schemaVersion ?? '1.0',\n        phases: component.componentDocument.phases,\n      };\n      const data = yaml.dump(componentDocument);\n      let newComponent = new imagebuilder.CfnComponent(this, component.name ?? `Component-${index}`, {\n        name: component.name ?? `${stackName.toLowerCase()}-${componentHash}-${index}`,\n        description: component.description,\n        platform: component.platform ?? 'Linux',\n        version: component.componentVersion ?? props.imageRecipeVersion ?? '0.0.1',\n        data: data,\n      });\n\n      // add the component to the Image Recipe\n      this.imageRecipeComponents.push({ componentArn: newComponent.attrArn });\n      imageRecipe.components = this.imageRecipeComponents;\n    });\n\n    const imageRecipeHash = this.stringToMD5(JSON.stringify(this.imageRecipeComponents));\n    imageRecipe.name = `${imageRecipeName}-${imageRecipeHash}-${imageRecipeVersion.replace(/\\./g, '-')}`;\n\n    let imagePipelineProps: imagebuilder.CfnImagePipelineProps;\n    imagePipelineProps = {\n      infrastructureConfigurationArn: infrastructureConfig.attrArn,\n      name: pipelineName,\n      description: 'Image pipeline',\n      imageRecipeArn: imageRecipe.attrArn,\n    };\n    if (props.enableVulnScans) {\n      imagePipelineProps = {\n        ...imagePipelineProps,\n        imageScanningConfiguration: {\n          imageScanningEnabled: props.enableVulnScans,\n          ecrConfiguration: {\n            repositoryName: props.vulnScansRepoName,\n            containerTags: props.vulnScansRepoTags,\n          },\n        },\n      };\n    }\n    if (distributionAccountIds.length > 0 && distributionRegions.length > 0) {\n      const distributionsList: imagebuilder.CfnDistributionConfiguration.DistributionProperty[] = [];\n      distributionRegions.forEach(distributionRegion => {\n        const distributionConfig: any = {\n          region: distributionRegion,\n          amiDistributionConfiguration: {\n            //Capital case here because it's an object of type any, but capital case is what is expected in CloudFormation\n            //https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-imagebuilder-distributionconfiguration-amidistributionconfiguration.html\n            Name: `${imageRecipeName}-${distributionRegion}-{{imagebuilder:buildDate}}`,\n            Description: `copy AMI ${imageRecipeName} to ${distributionRegion}`,\n            TargetAccountIds: distributionAccountIds,\n            LaunchPermissionConfiguration: {\n              UserIds: distributionAccountIds,\n            },\n            KmsKeyId: distributionKeyAlias, //using default AWS-managed key if one isn't given is prohibited\n          },\n        };\n        distributionsList.push(distributionConfig);\n      });\n      const amiDistributionConfiguration = new imagebuilder.CfnDistributionConfiguration(this, 'amiDistributionConfiguration', {\n        name: `${imageRecipeName}-distribution-config-${imageRecipeVersion.replace(/\\./g, '-')}`,\n        description: `Cross account distribution settings for ${imageRecipeName}`,\n        distributions: distributionsList,\n      });\n      imagePipelineProps = {\n        ...imagePipelineProps,\n        distributionConfigurationArn: amiDistributionConfiguration.attrArn,\n      };\n    }\n\n    const imageBuildPipeline = new imagebuilder.CfnImagePipeline(this, 'ImagePipeline', imagePipelineProps);\n    this.imagePipelineArn = imageBuildPipeline.attrArn;\n\n    const startStateMachineFunction = new StartStateMachineFunction(this, 'StartStateMachineFunction',\n      {\n        description: 'StartStateMachineFunction',\n        memorySize: 128,\n        timeout: Duration.minutes(12),\n        initialPolicy: [\n          new Statement.States().allow()\n            .toStartExecution()\n            .toGetExecutionHistory()\n            .toListExecutions()\n            .toDescribeExecution()\n            .onAllResources(),\n          new Statement.Imagebuilder().allow()\n            .toListImagePipelines()\n            .toStartImagePipelineExecution()\n            .toGetImage()\n            .onAllResources(),\n          new iam.PolicyStatement({\n            effect: iam.Effect.ALLOW,\n            actions: [\n              'kms:*',\n            ],\n            // arn:{partition}:{service}:{region}:{account}:{resource}{sep}{resource-name}/\n            resources: [Arn.format({\n              service: 'kms',\n              resource: 'alias/aws/ebs',\n              account: '*',\n              region: '*',\n              partition: 'aws',\n            })],\n          }),\n        ],\n      });\n\n    const checkStateMachineStatusFunction = new CheckStateMachineStatusFunction(this, 'CheckStateMachineStatusFunction', {\n      description: 'CheckStateMachineStatusFunction',\n      memorySize: 128,\n      timeout: Duration.minutes(12),\n      initialPolicy: [\n        new Statement.States().allow()\n          .toDescribeExecution()\n          .toListExecutions()\n          .toGetExecutionHistory()\n          .onAllResources(),\n        new Statement.Imagebuilder().allow()\n          .toListImagePipelines()\n          .toStartImagePipelineExecution()\n          .toGetImage()\n          .onAllResources(),\n        new Statement.Ec2().allow()\n          .toModifyImageAttribute()\n          .onAllResources(),\n        new iam.PolicyStatement({\n          effect: iam.Effect.ALLOW,\n          actions: [\n            'kms:*',\n          ],\n          resources: [Arn.format({\n            service: 'kms',\n            resource: 'alias/aws/ebs',\n            account: '*',\n            region: '*',\n            partition: 'aws',\n          })],\n        }),\n      ],\n    });\n\n    const provider = new Provider(this, 'ResourceProvider', {\n      onEventHandler: startStateMachineFunction,\n      isCompleteHandler: checkStateMachineStatusFunction,\n      totalTimeout: Duration.minutes(60),\n      queryInterval: Duration.minutes(2),\n    });\n\n    const stateMachineRole = new Role(this, 'StateMachineRole', {\n      assumedBy: new iam.ServicePrincipal('states.amazonaws.com'),\n      managedPolicies: [\n        iam.ManagedPolicy.fromAwsManagedPolicyName('service-role/AWSLambdaRole'),\n      ],\n      inlinePolicies: {\n        StateMachinePolicy: new iam.PolicyDocument({\n          statements: [\n            new Statement.Xray().allow()\n              .toPutTraceSegments()\n              .toPutTelemetryRecords()\n              .toGetSamplingRules()\n              .toGetSamplingTargets()\n              .onAllResources(),\n            new iam.PolicyStatement({\n              effect: iam.Effect.ALLOW,\n              actions: [\n                'imagebuilder:*',\n              ],\n              resources: [`arn:aws:imagebuilder:${region ?? '*'}:${account ?? '*'}:image-pipeline/${pipelineBaseName.toLowerCase()}-*`],\n            }),\n            new Statement.Imagebuilder().allow()\n              .toGetImage()\n              .onAllResources(),\n          ],\n        }),\n      },\n    });\n\n    const stateMachine = new StateMachine(this, 'StateMachine', {\n      definition: JSON.parse(\n        fs.readFileSync(path.join(\n          __dirname, '..', 'StateMachineFiles', 'ImageBuildingStateMachine.json'), 'utf8').toString()),\n      role: stateMachineRole,\n    });\n\n    const effectiveRemovalPolicy = props.debugImagePipeline === true ? RemovalPolicy.RETAIN_ON_UPDATE_OR_DELETE : RemovalPolicy.DESTROY;\n\n    const componentsHash = this.stringToMD5(JSON.stringify(props.components));\n    const imagePipeline = new CustomResource(this, 'CustomResource',\n      {\n        serviceToken: provider.serviceToken,\n        properties: {\n          ImagePipelineArn: imageBuildPipeline.attrArn,\n          StateMachineArn: stateMachine.stateMachineArn,\n          Version: props.imageRecipeVersion ?? '0.0.1',\n          ComponentsHash: componentsHash,\n          PhysicalResourceId: `${stackName}-ImagePipeline-${imageRecipeVersion.replace(/\\./g, '-')}`,\n          AmiKmsId: distributionKeyAlias,\n          SharedAccountIds: distributionAccountIds.join(','),\n          DebugImagePipeline: props.debugImagePipeline === true ? 'true' : 'false',\n        },\n        removalPolicy: effectiveRemovalPolicy,\n      });\n\n    this.imageId = imagePipeline.getAttString('AmiId');\n  }\n\n  private stringToMD5(inputString: string): string {\n    return CryptoJS.MD5(inputString).toString();\n  }\n\n}\n\n"]}
|
|
@@ -23,5 +23,5 @@ class CheckStateMachineStatusFunction extends lambda.Function {
|
|
|
23
23
|
}
|
|
24
24
|
exports.CheckStateMachineStatusFunction = CheckStateMachineStatusFunction;
|
|
25
25
|
_a = JSII_RTTI_SYMBOL_1;
|
|
26
|
-
CheckStateMachineStatusFunction[_a] = { fqn: "@jjrawlins/cdk-ami-builder.CheckStateMachineStatusFunction", version: "0.0.
|
|
26
|
+
CheckStateMachineStatusFunction[_a] = { fqn: "@jjrawlins/cdk-ami-builder.CheckStateMachineStatusFunction", version: "0.0.20" };
|
|
27
27
|
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -23,5 +23,5 @@ class StartStateMachineFunction extends lambda.Function {
|
|
|
23
23
|
}
|
|
24
24
|
exports.StartStateMachineFunction = StartStateMachineFunction;
|
|
25
25
|
_a = JSII_RTTI_SYMBOL_1;
|
|
26
|
-
StartStateMachineFunction[_a] = { fqn: "@jjrawlins/cdk-ami-builder.StartStateMachineFunction", version: "0.0.
|
|
26
|
+
StartStateMachineFunction[_a] = { fqn: "@jjrawlins/cdk-ami-builder.StartStateMachineFunction", version: "0.0.20" };
|
|
27
27
|
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,30 @@
|
|
|
1
|
+
{
|
|
2
|
+
"permissions": {
|
|
3
|
+
"allow": [
|
|
4
|
+
"Bash(make build)",
|
|
5
|
+
"Bash(make generate)",
|
|
6
|
+
"Bash(SERVICE=* make generate)",
|
|
7
|
+
"Bash(make generate-force)",
|
|
8
|
+
"Bash(SERVICE=* make generate-force)",
|
|
9
|
+
"Bash(make index-managed-policies)",
|
|
10
|
+
"Bash(make package)",
|
|
11
|
+
"Bash(make cdk)",
|
|
12
|
+
"Bash(make uncdk)",
|
|
13
|
+
"Bash(make test)",
|
|
14
|
+
"Bash(make cdk-test)",
|
|
15
|
+
"Bash(make cdk-all)",
|
|
16
|
+
"Bash(make changelog)",
|
|
17
|
+
"Bash(make stats)",
|
|
18
|
+
"Bash(make clean)",
|
|
19
|
+
"Bash(make install)",
|
|
20
|
+
"Bash(make docs)",
|
|
21
|
+
"Bash(make test-typescript)",
|
|
22
|
+
"Bash(make test-typescript-cdk)",
|
|
23
|
+
"Bash(make regenerate-code-example-results)",
|
|
24
|
+
"Bash(make eslint)",
|
|
25
|
+
"Bash(npx tsc:*)"
|
|
26
|
+
],
|
|
27
|
+
"deny": [],
|
|
28
|
+
"ask": []
|
|
29
|
+
}
|
|
30
|
+
}
|
|
@@ -0,0 +1,147 @@
|
|
|
1
|
+
# CLAUDE.md
|
|
2
|
+
|
|
3
|
+
This file provides guidance to Claude Code (claude.ai/code) when working with code in this repository.
|
|
4
|
+
|
|
5
|
+
## Project Overview
|
|
6
|
+
|
|
7
|
+
IAM Floyd is an AWS IAM policy statement generator with a fluent interface. It generates TypeScript classes for all AWS services and their actions, resources, and condition keys from AWS documentation. The project supports both standalone usage (`iam-floyd`) and AWS CDK integration (`cdk-iam-floyd`).
|
|
8
|
+
|
|
9
|
+
## Core Architecture
|
|
10
|
+
|
|
11
|
+
### Generated Code Structure
|
|
12
|
+
|
|
13
|
+
- `lib/generated/policy-statements/` - Contains generated TypeScript classes for each AWS service (400+ services)
|
|
14
|
+
- `lib/generated/index.ts` - Main export file that re-exports all service classes
|
|
15
|
+
- `lib/generated/aws-managed-policies/` - Generated AWS managed policies
|
|
16
|
+
- `lib/shared/` - Core shared classes like `PolicyStatement`, `All`, and `Operator`
|
|
17
|
+
- `lib/collection/` - Predefined policy collections and utilities
|
|
18
|
+
|
|
19
|
+
### Code Generation Pipeline
|
|
20
|
+
|
|
21
|
+
The codebase uses a sophisticated generation system:
|
|
22
|
+
|
|
23
|
+
1. `bin/generate.ts` - Main generation entry point that orchestrates the process
|
|
24
|
+
2. `lib/generator/` - Contains the generation logic that scrapes AWS documentation
|
|
25
|
+
3. Generated files are created in TypeScript and compiled to JavaScript for distribution
|
|
26
|
+
|
|
27
|
+
### Key Classes
|
|
28
|
+
|
|
29
|
+
- `PolicyStatement` - Base class for all policy statement builders
|
|
30
|
+
- `All` - Global action provider for cross-service policies
|
|
31
|
+
- Service-specific classes (e.g., `S3`, `EC2`, `Lambda`) - Each AWS service gets its own class with methods for actions, resources, and conditions
|
|
32
|
+
|
|
33
|
+
## Development Commands
|
|
34
|
+
|
|
35
|
+
### Building and Compilation
|
|
36
|
+
|
|
37
|
+
```bash
|
|
38
|
+
# Build the project (compiles TypeScript)
|
|
39
|
+
make build
|
|
40
|
+
# Convert project to CDK-variant
|
|
41
|
+
```
|
|
42
|
+
|
|
43
|
+
### Code Generation
|
|
44
|
+
|
|
45
|
+
```bash
|
|
46
|
+
# Generate service classes from AWS documentation
|
|
47
|
+
make generate
|
|
48
|
+
# Force regeneration (ignores time-based cache)
|
|
49
|
+
make generate-force
|
|
50
|
+
# Generate AWS managed policies index
|
|
51
|
+
make index-managed-policies
|
|
52
|
+
```
|
|
53
|
+
|
|
54
|
+
### Testing
|
|
55
|
+
|
|
56
|
+
```bash
|
|
57
|
+
# Run main tests
|
|
58
|
+
make test
|
|
59
|
+
# Run CDK-specific tests
|
|
60
|
+
make cdk-test
|
|
61
|
+
# Convert package to CDK variant and run CDK-specific tests
|
|
62
|
+
make cdk-all
|
|
63
|
+
```
|
|
64
|
+
|
|
65
|
+
### Linting and Code Quality
|
|
66
|
+
|
|
67
|
+
```bash
|
|
68
|
+
# Run ESLint
|
|
69
|
+
make eslint
|
|
70
|
+
# ESLint is configured with TypeScript, Prettier, and deprecation rules
|
|
71
|
+
```
|
|
72
|
+
|
|
73
|
+
### Package Management
|
|
74
|
+
|
|
75
|
+
```bash
|
|
76
|
+
# Create npm package
|
|
77
|
+
make package
|
|
78
|
+
# Clean all generated files and dependencies
|
|
79
|
+
make clean
|
|
80
|
+
# Reinstall dependencies
|
|
81
|
+
make install
|
|
82
|
+
```
|
|
83
|
+
|
|
84
|
+
### CDK Variant Management
|
|
85
|
+
|
|
86
|
+
```bash
|
|
87
|
+
# Convert to CDK variant (modifies package.json and lib structure)
|
|
88
|
+
make cdk
|
|
89
|
+
# Revert CDK changes
|
|
90
|
+
make uncdk
|
|
91
|
+
```
|
|
92
|
+
|
|
93
|
+
## Project Structure Patterns
|
|
94
|
+
|
|
95
|
+
### Dual Package Strategy
|
|
96
|
+
|
|
97
|
+
The project maintains two npm packages from a single codebase:
|
|
98
|
+
|
|
99
|
+
- `iam-floyd` - Standalone IAM policy generator
|
|
100
|
+
- `cdk-iam-floyd` - AWS CDK integration that extends `iam.PolicyStatement`
|
|
101
|
+
|
|
102
|
+
The `bin/mkcdk.ts` script transforms the codebase between variants by modifying imports and package configuration.
|
|
103
|
+
|
|
104
|
+
### TypeScript Configuration
|
|
105
|
+
|
|
106
|
+
- `tsconfig.json` - Main TypeScript configuration with strict settings
|
|
107
|
+
- `tsconfig.main.json` - Production build configuration
|
|
108
|
+
- `tsconfig.test-*.json` - Test-specific configurations
|
|
109
|
+
- Uses SWC for faster compilation via ts-node
|
|
110
|
+
|
|
111
|
+
### Generated Code Conventions
|
|
112
|
+
|
|
113
|
+
- All generated classes follow the pattern: `export class ServiceName extends PolicyStatement`
|
|
114
|
+
- Method names correspond to AWS IAM action names (e.g., `getObject()`, `listBuckets()`)
|
|
115
|
+
- Resource and condition methods use fluent interface patterns
|
|
116
|
+
- Generated files include comprehensive JSDoc comments from AWS documentation
|
|
117
|
+
|
|
118
|
+
## Important Notes
|
|
119
|
+
|
|
120
|
+
### File Modification Rules
|
|
121
|
+
|
|
122
|
+
- **Never manually edit files in `lib/generated/`** - These are auto-generated and will be overwritten
|
|
123
|
+
- Generated code is created from AWS documentation and should only be updated via the generation process
|
|
124
|
+
- Manual changes should only be made to files in `lib/shared/`, `lib/collection/`, and core infrastructure
|
|
125
|
+
|
|
126
|
+
### Code Style
|
|
127
|
+
|
|
128
|
+
- ESLint enforces strict TypeScript rules with Prettier formatting
|
|
129
|
+
- Single quotes for strings, except in YAML files
|
|
130
|
+
- Comprehensive type checking with `noImplicitAny` and strict null checks
|
|
131
|
+
- Generated files are excluded from linting (`lib/generated/*` in `.eslintrc`)
|
|
132
|
+
|
|
133
|
+
### Testing Strategy
|
|
134
|
+
|
|
135
|
+
- Tests are located in the `test/` directory with its own Makefile
|
|
136
|
+
- Supports both unit tests for the main package and CDK integration tests
|
|
137
|
+
- CDK tests include actual deployment and destruction cycles for validation
|
|
138
|
+
|
|
139
|
+
## Git Commit Conventions
|
|
140
|
+
|
|
141
|
+
This project follows conventional commit patterns:
|
|
142
|
+
|
|
143
|
+
- `chore(deps): description` - Dependency updates
|
|
144
|
+
- `feat: description` - New features
|
|
145
|
+
- `fix: description` - Bug fixes
|
|
146
|
+
- `docs: description` - Documentation changes
|
|
147
|
+
- Simple format: "Updates AWS managed policies" for automated policy updates
|
|
@@ -16,10 +16,10 @@
|
|
|
16
16
|
<!-- stats -->
|
|
17
17
|
Support for:
|
|
18
18
|
|
|
19
|
-
-
|
|
20
|
-
-
|
|
21
|
-
-
|
|
22
|
-
-
|
|
19
|
+
- 429 Services
|
|
20
|
+
- 19150 Actions
|
|
21
|
+
- 2051 Resource Types
|
|
22
|
+
- 2131 Condition keys
|
|
23
23
|
<!-- /stats -->
|
|
24
24
|
|
|
25
25
|
**<br>This is an early version of the package. The API will change while I implement new features. Therefore make sure you use an exact version in your `package.json` before it reaches 1.0.0.**
|
|
@@ -70,8 +70,14 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
70
70
|
AmazonAuroraDSQLFullAccess(): aws_iam.IManagedPolicy;
|
|
71
71
|
/** Provides read only access to Aurora DSQL */
|
|
72
72
|
AmazonAuroraDSQLReadOnlyAccess(): aws_iam.IManagedPolicy;
|
|
73
|
+
/** Provides Bedrock Model inference permission to Bedrock agent core memory */
|
|
74
|
+
AmazonBedrockAgentCoreMemoryBedrockModelInferenceExecutionRolePolicy(): aws_iam.IManagedPolicy;
|
|
73
75
|
/** Provides full access to Amazon Bedrock as well as limited access to related services that are required by it */
|
|
74
76
|
AmazonBedrockFullAccess(): aws_iam.IManagedPolicy;
|
|
77
|
+
/** Provides limited access to Amazon Bedrock as well as to related services that are required by it */
|
|
78
|
+
AmazonBedrockLimitedAccess(): aws_iam.IManagedPolicy;
|
|
79
|
+
/** Provides limited access to Amazon Bedrock Marketplace as well as to related services that are required by it */
|
|
80
|
+
AmazonBedrockMarketplaceAccess(): aws_iam.IManagedPolicy;
|
|
75
81
|
/** Provides read only access to Amazon Bedrock */
|
|
76
82
|
AmazonBedrockReadOnly(): aws_iam.IManagedPolicy;
|
|
77
83
|
/** Defines the maximum permissions of IAM roles that Amazon Bedrock Studio creates for operating Amazon Bedrock Studio resources. */
|
|
@@ -256,6 +262,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
256
262
|
AmazonEC2ContainerServiceRole(): aws_iam.IManagedPolicy;
|
|
257
263
|
/** Provides full access to Amazon EC2 via the AWS Management Console. */
|
|
258
264
|
AmazonEC2FullAccess(): aws_iam.IManagedPolicy;
|
|
265
|
+
/** Provides read-only access to scan all supported resource types for relevant data when using DescribeImageReferences. */
|
|
266
|
+
AmazonEC2ImageReferencesAccessPolicy(): aws_iam.IManagedPolicy;
|
|
259
267
|
/** Provides read only access to Amazon EC2 via the AWS Management Console. */
|
|
260
268
|
AmazonEC2ReadOnlyAccess(): aws_iam.IManagedPolicy;
|
|
261
269
|
/** Provides EC2 access to S3 bucket to download revision. This role is needed by the CodeDeploy agent on EC2 instances. */
|
|
@@ -276,6 +284,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
276
284
|
AmazonECSFullAccess(): aws_iam.IManagedPolicy;
|
|
277
285
|
/** Policy to enable Amazon ECS Compute to manage your EC2 instances and related resources as part of ECS managed instances */
|
|
278
286
|
AmazonECSComputeServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
287
|
+
/** Provides access to other AWS service resources required to manage load balancers associated with ECS workloads on your behalf. */
|
|
288
|
+
AmazonECSInfrastructureRolePolicyForLoadBalancers(): aws_iam.IManagedPolicy;
|
|
279
289
|
/** Provides administrative access to Private Certificate Authority, AWS Secrets Manager and other AWS Services required to manage ECS Service Connect TLS features on your behalf. */
|
|
280
290
|
AmazonECSInfrastructureRolePolicyForServiceConnectTransportLayerSecurity(): aws_iam.IManagedPolicy;
|
|
281
291
|
/** Provides access to other AWS service resources required to manage volumes associated with ECS workloads on your behalf. */
|
|
@@ -478,6 +488,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
478
488
|
AmazonInspector2AgentlessServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
479
489
|
/** Provides full access to Amazon Inspector and access to other related services such as organizations. */
|
|
480
490
|
AmazonInspector2FullAccess(): aws_iam.IManagedPolicy;
|
|
491
|
+
/** Provides full access to Amazon Inspector and access to other related services such as organizations with restrictive organizational access. */
|
|
492
|
+
AmazonInspector2FullAccessV2(): aws_iam.IManagedPolicy;
|
|
481
493
|
/** This is a managed policy that customer should attach to their roles to communicate with inspector service for CIS scans */
|
|
482
494
|
AmazonInspector2ManagedCisPolicy(): aws_iam.IManagedPolicy;
|
|
483
495
|
/** Provides read only access to the Amazon inspector2 service and relevant support services */
|
|
@@ -820,8 +832,12 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
820
832
|
AmazonSageMakerGeospatialFullAccess(): aws_iam.IManagedPolicy;
|
|
821
833
|
/** Provides access to AWS services that are required to run SageMaker GroundTruth Labeling job */
|
|
822
834
|
AmazonSageMakerGroundTruthExecution(): aws_iam.IManagedPolicy;
|
|
835
|
+
/** This policy provides administrative privileges required for setting up SageMaker HyperPod observability. It enables access to Amazon Managed Prometheus, Amazon Managed Grafana and EKS Addons. The policy also includes broad access to Grafana HTTP APIs through ServiceAccountTokens across all Amazon Managed Grafana workspaces in your account. */
|
|
836
|
+
AmazonSageMakerHyperPodObservabilityAdminAccess(): aws_iam.IManagedPolicy;
|
|
823
837
|
/** This policy grants permissions to Amazon SageMaker HyperPod to related AWS services such as Amazon EKS, Amazon CloudWatch etc. */
|
|
824
838
|
AmazonSageMakerHyperPodServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
839
|
+
/** This policy provides administrative permissions required to set up the SageMaker HyperPod training operator. It enables access to Amazon SageMaker HyperPod and EKS add-ons. The policy includes permissions to describe the SageMaker HyperPod resources in your account. */
|
|
840
|
+
AmazonSageMakerHyperPodTrainingOperatorAccess(): aws_iam.IManagedPolicy;
|
|
825
841
|
/** Provides access to create Amazon Augmented AI FlowDefinition resources against any Workteam. */
|
|
826
842
|
AmazonSageMakerMechanicalTurkAccess(): aws_iam.IManagedPolicy;
|
|
827
843
|
/** This AWS managed policy grants permissions needed to use all Amazon SageMaker Governance features. The policy also provides select access to related services (e.g., S3, KMS). */
|
|
@@ -1188,6 +1204,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
1188
1204
|
AWSBatchServiceEventTargetRole(): aws_iam.IManagedPolicy;
|
|
1189
1205
|
/** Policy for AWS Batch service role which allows access to related services including EC2, Autoscaling, EC2 Container service and Cloudwatch Logs. */
|
|
1190
1206
|
AWSBatchServiceRole(): aws_iam.IManagedPolicy;
|
|
1207
|
+
/** Provides access for AWS Batch to queue and manage Amazon SageMaker workloads */
|
|
1208
|
+
AWSBatchServiceRolePolicyForSageMaker(): aws_iam.IManagedPolicy;
|
|
1191
1209
|
/** A service linked role to provide Billing and Cost Management Data Exports access to AWS service data for exporting the data to a target location, such as Amazon S3, on behalf of a customer. */
|
|
1192
1210
|
AWSBCMDataExportsServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
1193
1211
|
/** Use the AWSBillingConductorFullAccess managed policy to allow complete access to AWS Billing Conductor (ABC) console and APIs. This policy allows users to list, create and delete ABC resources. */
|
|
@@ -1196,6 +1214,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
1196
1214
|
AWSBillingConductorReadOnlyAccess(): aws_iam.IManagedPolicy;
|
|
1197
1215
|
/** Allows users to view bills on the Billing Console. */
|
|
1198
1216
|
AWSBillingReadOnlyAccess(): aws_iam.IManagedPolicy;
|
|
1217
|
+
/** Allows billing service to validate access to billing view data for derived billing views */
|
|
1218
|
+
AWSBillingServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
1199
1219
|
/** This policy gives permissions to control AWS resources. For example, to start and stop EC2 or RDS instances by executing AWS Systems Manager (SSM) scripts. */
|
|
1200
1220
|
AWSBudgetsActionsRolePolicyForResourceAdministrationWithSSM(): aws_iam.IManagedPolicy;
|
|
1201
1221
|
/** Provides full access to AWS Budgets Actions including using Budgets Actions to control states of running AWS resources via AWS Management Console */
|
|
@@ -1432,6 +1452,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
1432
1452
|
AWSDirectoryServiceFullAccess(): aws_iam.IManagedPolicy;
|
|
1433
1453
|
/** Provides read only access to AWS Directory Service. */
|
|
1434
1454
|
AWSDirectoryServiceReadOnlyAccess(): aws_iam.IManagedPolicy;
|
|
1455
|
+
/** Policy for the Directory Service Service Linked Role */
|
|
1456
|
+
AWSDirectoryServiceServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
1435
1457
|
/** Provides write access to AWS resources required for AWS Discovery Continuous Export */
|
|
1436
1458
|
AWSDiscoveryContinuousExportFirehosePolicy(): aws_iam.IManagedPolicy;
|
|
1437
1459
|
/** Allows DMS Fleet Advisor to manage CloudWatch metrics on your behalf. */
|
|
@@ -1796,6 +1818,10 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
1796
1818
|
AWSManagedServicesSelfServiceReportingServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
1797
1819
|
/** Allows AWS Managed Services to manage deployment toolkit on your behalf. */
|
|
1798
1820
|
AWSManagedServicesDeploymentToolkitPolicy(): aws_iam.IManagedPolicy;
|
|
1821
|
+
/** Provides full access to configure and customize the AWS Management Console */
|
|
1822
|
+
AWSManagementConsoleAdministratorAccess(): aws_iam.IManagedPolicy;
|
|
1823
|
+
/** Grants access to essential AWS Management Console features and user experience (UX) capabilities for non-administrative users. */
|
|
1824
|
+
AWSManagementConsoleBasicUserAccess(): aws_iam.IManagedPolicy;
|
|
1799
1825
|
/** Allows AWS Marketplace to copy your Amazon Machine Images (AMIs) in order to list them on AWS Marketplace */
|
|
1800
1826
|
AWSMarketplaceAmiIngestion(): aws_iam.IManagedPolicy;
|
|
1801
1827
|
/** Allows AWS Marketplace to create and manage seller deployment parameters for the products that you subscribe to on AWS Marketplace. */
|
|
@@ -1882,20 +1908,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
1882
1908
|
AWSNetworkManagerServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
1883
1909
|
/** Provides access to manage AWS Config Configuration Recorder, manage AWS Config Configuration Aggregator, create AWS Config Service Linked Role for Configuration Recorder functionality, consume recorder configuration data, and read AWS Organizations data for organizational features. */
|
|
1884
1910
|
AWSObservabilityAdminServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
1885
|
-
/** Provides
|
|
1886
|
-
|
|
1887
|
-
/** Enables OpsWorks instances with the CWLogs integration enabled to ship logs and create required log groups */
|
|
1888
|
-
AWSOpsWorksCloudWatchLogs(): aws_iam.IManagedPolicy;
|
|
1889
|
-
/** Provides S3 access for instances launched by OpsWorks CM. */
|
|
1890
|
-
AWSOpsWorksCMInstanceProfileRole(): aws_iam.IManagedPolicy;
|
|
1891
|
-
/** Service Role Policy to be used for Creating OpsWorks CM servers. */
|
|
1892
|
-
AWSOpsWorksCMServiceRole(): aws_iam.IManagedPolicy;
|
|
1893
|
-
/** Provides access for an Amazon EC2 instance to register with an AWS OpsWorks stack. */
|
|
1894
|
-
AWSOpsWorksInstanceRegistration(): aws_iam.IManagedPolicy;
|
|
1895
|
-
/** Policy to enable registration of EC2 instances via the OpsWorks CLI */
|
|
1896
|
-
AWSOpsWorksRegisterCLIEC2(): aws_iam.IManagedPolicy;
|
|
1897
|
-
/** Policy to enable registration of On-Premises instances via the OpsWorks CLI */
|
|
1898
|
-
AWSOpsWorksRegisterCLIOnPremises(): aws_iam.IManagedPolicy;
|
|
1911
|
+
/** Provides access to manage AWS Config recorder resource and telemetry settings on AWS resources including logs, metrics. */
|
|
1912
|
+
AWSObservabilityAdminTelemetryEnablementServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
1899
1913
|
/** Provides full access to AWS Organizations. */
|
|
1900
1914
|
AWSOrganizationsFullAccess(): aws_iam.IManagedPolicy;
|
|
1901
1915
|
/** Provides read-only access to AWS Organizations. */
|
|
@@ -2006,6 +2020,10 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
2006
2020
|
AWSQuickSetupSSMLifecycleManagementExecutionPolicy(): aws_iam.IManagedPolicy;
|
|
2007
2021
|
/** This policy grants permissions that allow Systems Manager to create prerequisites such as IAM roles required for Systems Manager onboarding. */
|
|
2008
2022
|
AWSQuickSetupSSMManageResourcesExecutionPolicy(): aws_iam.IManagedPolicy;
|
|
2023
|
+
/** This policy grants permissions that allow principals to run the AWSQuickSetupType-StartSSMAssociations Automation runbook, which starts State Manager Associations. */
|
|
2024
|
+
AWSQuickSetupStartSSMAssociationsExecutionPolicy(): aws_iam.IManagedPolicy;
|
|
2025
|
+
/** The managed policy AWSQuickSetupStartStopInstancesExecutionPolicy provides permissions for Quick Setup to start and stop Amazon EC2 instances on a schedule. This policy is used with the Quick Setup scheduler configuration type. */
|
|
2026
|
+
AWSQuickSetupStartStopInstancesExecutionPolicy(): aws_iam.IManagedPolicy;
|
|
2009
2027
|
/** Provides the set of permissions required to perform QuickSight Asset Bundle Export Operations */
|
|
2010
2028
|
AWSQuickSightAssetBundleExportPolicy(): aws_iam.IManagedPolicy;
|
|
2011
2029
|
/** Provides the set of permissions required to perform QuickSight Asset Bundle Import Operations */
|
|
@@ -2070,6 +2088,10 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
2070
2088
|
AWSRoboMakerServicePolicy(): aws_iam.IManagedPolicy;
|
|
2071
2089
|
/** RoboMaker service policy */
|
|
2072
2090
|
AWSRoboMakerServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
2091
|
+
/** Provides all permissions to IAM Roles Anywhere resources, including but not limited to: CreateProfile, DeleteTrustAnchor, DisableCRL, ResetNotificationSettings. */
|
|
2092
|
+
AWSRolesAnywhereFullAccess(): aws_iam.IManagedPolicy;
|
|
2093
|
+
/** Provides read-only permissions to IAM Roles Anywhere resources, including but not limited to: GetTrustAnchor, ListProfiles, GetCRL. There will be no other permissions for other services included in this policy. */
|
|
2094
|
+
AWSRolesAnywhereReadOnly(): aws_iam.IManagedPolicy;
|
|
2073
2095
|
/** Allows IAM Roles Anywhere to publish service/usage metrics to CloudWatch and check the status of Private Certificate Authorities on your behalf. */
|
|
2074
2096
|
AWSRolesAnywhereServicePolicy(): aws_iam.IManagedPolicy;
|
|
2075
2097
|
/** Allow Amazon S3 on Outposts service to manage EC2 network resources on your behalf. */
|
|
@@ -2254,6 +2276,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
2254
2276
|
AWSTransferLoggingAccess(): aws_iam.IManagedPolicy;
|
|
2255
2277
|
/** Provide readonly access to AWS Transfer services. */
|
|
2256
2278
|
AWSTransferReadOnlyAccess(): aws_iam.IManagedPolicy;
|
|
2279
|
+
/** Enables the AWS Transform service to deploy transformed .NET applications by creating and managing AWS resources. This policy grants permissions to provision infrastructure, manage compute resources, and configure deployment settings across various AWS services. */
|
|
2280
|
+
AWSTransformApplicationDeploymentPolicy(): aws_iam.IManagedPolicy;
|
|
2257
2281
|
/** Provides full access to AWS Trusted Advisor Priority. This policy also enables the user to add Trusted Advisor as a trusted service with AWS Organizations and to specify delegated administrator accounts for Trusted Advisor Priority. */
|
|
2258
2282
|
AWSTrustedAdvisorPriorityFullAccess(): aws_iam.IManagedPolicy;
|
|
2259
2283
|
/** Provides read-only access to AWS Trusted Advisor Priority. This includes permission to view the delegated administrator accounts. */
|
|
@@ -2306,10 +2330,16 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
2306
2330
|
AWSXrayWriteOnlyAccess(): aws_iam.IManagedPolicy;
|
|
2307
2331
|
/** Provides administrative access for ARC zonal shift practice runs, and access to CloudWatch alarm statuses to monitor practice runs. */
|
|
2308
2332
|
AWSZonalAutoshiftPracticeRunSLRPolicy(): aws_iam.IManagedPolicy;
|
|
2333
|
+
/** Provides read-only access to the APIs needed to support zone-group access-management for organizations. */
|
|
2334
|
+
AWSZoneGroupAccessManagementServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
2309
2335
|
/** Provides access for the AWS Batch service to manage the required resources, including Amazon EC2 and Amazon ECS resources. */
|
|
2310
2336
|
BatchServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
2337
|
+
/** Provides full access to Bedrock AgentCore as well as limited access to related services */
|
|
2338
|
+
BedrockAgentCoreFullAccess(): aws_iam.IManagedPolicy;
|
|
2311
2339
|
/** Grants permissions for billing and cost management. This includes viewing account usage and viewing and modifying budgets and payment methods. */
|
|
2312
2340
|
Billing(): aws_iam.IManagedPolicy;
|
|
2341
|
+
/** Allows Budgets to verify access to Billing Views shared across account boundaries. */
|
|
2342
|
+
BudgetsServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
2313
2343
|
/** Amazon Certificate Manager Service Role Policy */
|
|
2314
2344
|
CertificateManagerServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
2315
2345
|
/** Policy to enable AWS Client VPN to manage your Client VPN endpoint connections. */
|
|
@@ -2628,6 +2658,10 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
2628
2658
|
ROSAManageSubscription(): aws_iam.IManagedPolicy;
|
|
2629
2659
|
/** Allows Red Hat OpenShift Service on AWS (ROSA) to manage cluster EC2 instances as worker nodes, including permission to configure security groups and tag instances and volumes. This policy also allows for the use of EC2 instances with disk encryption provided by AWS Key Management Service (KMS) keys. */
|
|
2630
2660
|
ROSANodePoolManagementPolicy(): aws_iam.IManagedPolicy;
|
|
2661
|
+
/** Allows the Red Hat OpenShift Service on AWS (ROSA) installer to configure VPC Endpoints and Security Groups. Intended to be used on a shared VPC. */
|
|
2662
|
+
ROSASharedVPCEndpointPolicy(): aws_iam.IManagedPolicy;
|
|
2663
|
+
/** Allows the Red Hat OpenShift Service on AWS (ROSA) installer to configure Route53 records. Intended to be used on a shared VPC. */
|
|
2664
|
+
ROSASharedVPCRoute53Policy(): aws_iam.IManagedPolicy;
|
|
2631
2665
|
/** Provides ROSA site reliability engineering (SRE) the permissions needed to initially observe, diagnose, and support AWS resources associated with Red Hat OpenShift Service on AWS (ROSA) clusters, including the ability to change ROSA cluster node state. */
|
|
2632
2666
|
ROSASRESupportPolicy(): aws_iam.IManagedPolicy;
|
|
2633
2667
|
/** Allows Red Hat OpenShift Service on AWS (ROSA) worker nodes in your account read-only access to Amazon EC2 instances and AWS Regions for compute node lifecycle management. */
|
|
@@ -2640,6 +2674,14 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
2640
2674
|
S3StorageLensServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
2641
2675
|
/** Provides access required to unlock a S3 bucket policy using the Security Token Service (STS) AssumeRoot API. Use this managed policy only with the STS AssumeRoot action. */
|
|
2642
2676
|
S3UnlockBucketPolicy(): aws_iam.IManagedPolicy;
|
|
2677
|
+
/** Provides initial administrative and individual setup privileges for Amazon SageMaker Unified Studio via the AWS Management Console and SDK. Allows launching of SageMaker Unified Studio Portal. */
|
|
2678
|
+
SageMakerStudioAdminIAMConsolePolicy(): aws_iam.IManagedPolicy;
|
|
2679
|
+
/** Administrative execution policy for using IAM roles with SageMaker Unified Studio. Allows admins to provision, manage and access resources in your account (excluding access to data resources) for IAM-based usage of SageMaker Unified Studio. */
|
|
2680
|
+
SageMakerStudioAdminIAMDefaultExecutionPolicy(): aws_iam.IManagedPolicy;
|
|
2681
|
+
/** Administrative execution policy for using IAM roles with SageMaker Unified Studio. Allows admins to provision, manage and access resources in the local account (including broad access to all APIs in data services like S3, Glue, CloudWatch Logs, and others) for IAM-based usage of SageMaker Unified Studio. */
|
|
2682
|
+
SageMakerStudioAdminIAMPermissiveExecutionPolicy(): aws_iam.IManagedPolicy;
|
|
2683
|
+
/** This IAM policy grants an IAM role full access to AWS Glue Data Catalog (metadata) and Amazon S3 (actual data) for data lake operations, with access scoped by account, and role tags. */
|
|
2684
|
+
SageMakerStudioAdminProjectUserRolePolicy(): aws_iam.IManagedPolicy;
|
|
2643
2685
|
/** Allows Amazon Bedrock Agents to access Amazon Bedrock models and other resources attached to an agent in SageMaker Studio. */
|
|
2644
2686
|
SageMakerStudioBedrockAgentServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
2645
2687
|
/** Provides access to an Amazon Bedrock chat agent app's configuration and Amazon Bedrock agent in SageMaker Studio. */
|
|
@@ -2676,6 +2718,12 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
2676
2718
|
SageMakerStudioProjectUserRolePolicy(): aws_iam.IManagedPolicy;
|
|
2677
2719
|
/** Amazon SageMaker Studio uses this policy when running query executions on federated connections. */
|
|
2678
2720
|
SageMakerStudioQueryExecutionRolePolicy(): aws_iam.IManagedPolicy;
|
|
2721
|
+
/** Provides individual setup privileges for Amazon SageMaker Unified Studio via the AWS Management Console and SDK. Allows launching of SageMaker Unified Studio Portal. */
|
|
2722
|
+
SageMakerStudioUserIAMConsolePolicy(): aws_iam.IManagedPolicy;
|
|
2723
|
+
/** Execution policy for using IAM roles with SageMaker Unified Studio. Allows users to access resources in the local account (excluding access to data resources) for IAM-based usage of SageMaker Unified Studio. */
|
|
2724
|
+
SageMakerStudioUserIAMDefaultExecutionPolicy(): aws_iam.IManagedPolicy;
|
|
2725
|
+
/** Execution policy for using IAM roles with SageMaker Unified Studio. Allows users to access resources in your account (including broad access to all APIs in data services like S3, Glue, CloudWatch Logs, and others) for IAM-based usage of SageMaker Unified Studio. */
|
|
2726
|
+
SageMakerStudioUserIAMPermissiveExecutionPolicy(): aws_iam.IManagedPolicy;
|
|
2679
2727
|
/** Provides read/write access to AWS Secrets Manager via the AWS Management Console. Note: this exludes IAM actions, so combine with IAMFullAccess if rotation configuration is required. */
|
|
2680
2728
|
SecretsManagerReadWrite(): aws_iam.IManagedPolicy;
|
|
2681
2729
|
/** The security audit template grants access to read security configuration metadata. It is useful for software that audits the configuration of an AWS account. */
|