aws-iam-data 0.0.150 → 0.0.151
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/data/json/iam.json
CHANGED
|
@@ -282786,7 +282786,8 @@
|
|
|
282786
282786
|
"s3:signatureAge",
|
|
282787
282787
|
"s3:signatureversion",
|
|
282788
282788
|
"s3:TlsVersion",
|
|
282789
|
-
"s3:x-amz-content-sha256"
|
|
282789
|
+
"s3:x-amz-content-sha256",
|
|
282790
|
+
"s3:InventoryAccessibleOptionalFields"
|
|
282790
282791
|
],
|
|
282791
282792
|
"dependentActions": []
|
|
282792
282793
|
}
|
|
@@ -283765,6 +283766,12 @@
|
|
|
283765
283766
|
"description": "Filters access by existing object tag key and value",
|
|
283766
283767
|
"type": "String"
|
|
283767
283768
|
},
|
|
283769
|
+
{
|
|
283770
|
+
"name": "s3:InventoryAccessibleOptionalFields",
|
|
283771
|
+
"apiReferenceUrl": "https://docs.aws.amazon.com/AmazonS3/latest/userguide/example-bucket-policies.html#example-bucket-policies-s3-inventory-2",
|
|
283772
|
+
"description": "Filters access by restricting which optional metadata fields a user can add when configuring S3 Inventory reports",
|
|
283773
|
+
"type": "ArrayOfString"
|
|
283774
|
+
},
|
|
283768
283775
|
{
|
|
283769
283776
|
"name": "s3:JobSuspendedCause",
|
|
283770
283777
|
"apiReferenceUrl": "https://docs.aws.amazon.com/AmazonS3/latest/userguide/batch-ops-job-tags-examples.html",
|
|
@@ -332140,6 +332147,14 @@
|
|
|
332140
332147
|
"required": true,
|
|
332141
332148
|
"conditionKeys": [],
|
|
332142
332149
|
"dependentActions": []
|
|
332150
|
+
},
|
|
332151
|
+
{
|
|
332152
|
+
"resourceType": "",
|
|
332153
|
+
"required": false,
|
|
332154
|
+
"conditionKeys": [
|
|
332155
|
+
"wafv2:LogScope"
|
|
332156
|
+
],
|
|
332157
|
+
"dependentActions": []
|
|
332143
332158
|
}
|
|
332144
332159
|
]
|
|
332145
332160
|
},
|
|
@@ -332385,7 +332400,8 @@
|
|
|
332385
332400
|
"resourceType": "",
|
|
332386
332401
|
"required": false,
|
|
332387
332402
|
"conditionKeys": [
|
|
332388
|
-
"aws:ResourceTag/${TagKey}"
|
|
332403
|
+
"aws:ResourceTag/${TagKey}",
|
|
332404
|
+
"wafv2:LogScope"
|
|
332389
332405
|
],
|
|
332390
332406
|
"dependentActions": []
|
|
332391
332407
|
}
|
|
@@ -332669,7 +332685,9 @@
|
|
|
332669
332685
|
{
|
|
332670
332686
|
"resourceType": "",
|
|
332671
332687
|
"required": false,
|
|
332672
|
-
"conditionKeys": [
|
|
332688
|
+
"conditionKeys": [
|
|
332689
|
+
"wafv2:LogScope"
|
|
332690
|
+
],
|
|
332673
332691
|
"dependentActions": []
|
|
332674
332692
|
}
|
|
332675
332693
|
]
|
|
@@ -332856,6 +332874,15 @@
|
|
|
332856
332874
|
"dependentActions": [
|
|
332857
332875
|
"iam:CreateServiceLinkedRole"
|
|
332858
332876
|
]
|
|
332877
|
+
},
|
|
332878
|
+
{
|
|
332879
|
+
"resourceType": "",
|
|
332880
|
+
"required": false,
|
|
332881
|
+
"conditionKeys": [
|
|
332882
|
+
"wafv2:LogScope",
|
|
332883
|
+
"wafv2:LogDestinationResource"
|
|
332884
|
+
],
|
|
332885
|
+
"dependentActions": []
|
|
332859
332886
|
}
|
|
332860
332887
|
]
|
|
332861
332888
|
},
|
|
@@ -333217,6 +333244,18 @@
|
|
|
333217
333244
|
"apiReferenceUrl": "https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-tagkeys",
|
|
333218
333245
|
"description": "Filters access by the presence of mandatory tags in the request",
|
|
333219
333246
|
"type": "ArrayOfString"
|
|
333247
|
+
},
|
|
333248
|
+
{
|
|
333249
|
+
"name": "wafv2:LogDestinationResource",
|
|
333250
|
+
"apiReferenceUrl": "https://docs.aws.amazon.com/waf/latest/developerguide/security_iam_service-with-iam.html#security_iam_service-with-iam-id-based-policies-conditionkeys",
|
|
333251
|
+
"description": "Filters access by log destination ARN for PutLoggingConfiguration API",
|
|
333252
|
+
"type": "ARN"
|
|
333253
|
+
},
|
|
333254
|
+
{
|
|
333255
|
+
"name": "wafv2:LogScope",
|
|
333256
|
+
"apiReferenceUrl": "https://docs.aws.amazon.com/waf/latest/developerguide/security_iam_service-with-iam.html#security_iam_service-with-iam-id-based-policies-conditionkeys",
|
|
333257
|
+
"description": "Filters access by log scope for Logging Configuration API",
|
|
333258
|
+
"type": "String"
|
|
333220
333259
|
}
|
|
333221
333260
|
]
|
|
333222
333261
|
},
|
|
@@ -20775,7 +20775,7 @@
|
|
|
20775
20775
|
"accessgrantslocation",
|
|
20776
20776
|
"accessgrant"
|
|
20777
20777
|
],
|
|
20778
|
-
"conditionKeysCount":
|
|
20778
|
+
"conditionKeysCount": 45,
|
|
20779
20779
|
"conditionKeys": [
|
|
20780
20780
|
"aws:RequestTag/${TagKey}",
|
|
20781
20781
|
"aws:ResourceTag/${TagKey}",
|
|
@@ -20787,6 +20787,7 @@
|
|
|
20787
20787
|
"s3:ExistingJobOperation",
|
|
20788
20788
|
"s3:ExistingJobPriority",
|
|
20789
20789
|
"s3:ExistingObjectTag/<key>",
|
|
20790
|
+
"s3:InventoryAccessibleOptionalFields",
|
|
20790
20791
|
"s3:JobSuspendedCause",
|
|
20791
20792
|
"s3:RequestJobOperation",
|
|
20792
20793
|
"s3:RequestJobPriority",
|
|
@@ -24575,11 +24576,13 @@
|
|
|
24575
24576
|
"apprunner",
|
|
24576
24577
|
"verified-access-instance"
|
|
24577
24578
|
],
|
|
24578
|
-
"conditionKeysCount":
|
|
24579
|
+
"conditionKeysCount": 5,
|
|
24579
24580
|
"conditionKeys": [
|
|
24580
24581
|
"aws:RequestTag/${TagKey}",
|
|
24581
24582
|
"aws:ResourceTag/${TagKey}",
|
|
24582
|
-
"aws:TagKeys"
|
|
24583
|
+
"aws:TagKeys",
|
|
24584
|
+
"wafv2:LogDestinationResource",
|
|
24585
|
+
"wafv2:LogScope"
|
|
24583
24586
|
]
|
|
24584
24587
|
},
|
|
24585
24588
|
{
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "aws-iam-data",
|
|
3
|
-
"version": "0.0.
|
|
3
|
+
"version": "0.0.151",
|
|
4
4
|
"description": "Provides AWS IAM data gathered from the official AWS IAM docs as a convenient npm package that can be used in other OSS projects.",
|
|
5
5
|
"main": "./dist/index.js",
|
|
6
6
|
"types": "./dist/index.d.ts",
|