aws-iam-managed-policies 0.0.366 → 0.0.367
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/managedPolicies.json +209 -6
- package/package.json +1 -1
|
@@ -126809,8 +126809,8 @@
|
|
|
126809
126809
|
},
|
|
126810
126810
|
"AmazonRoute53FullAccess": {
|
|
126811
126811
|
"arn": "arn:aws:iam::aws:policy/AmazonRoute53FullAccess",
|
|
126812
|
-
"latestVersionId": "
|
|
126813
|
-
"versionsCount":
|
|
126812
|
+
"latestVersionId": "v5",
|
|
126813
|
+
"versionsCount": 5,
|
|
126814
126814
|
"versions": {
|
|
126815
126815
|
"v2": {
|
|
126816
126816
|
"createdDate": "2017-02-14T21:25:53.000Z",
|
|
@@ -126927,10 +126927,51 @@
|
|
|
126927
126927
|
}
|
|
126928
126928
|
]
|
|
126929
126929
|
}
|
|
126930
|
+
},
|
|
126931
|
+
"v5": {
|
|
126932
|
+
"createdDate": "2015-02-06T18:40:54.000Z",
|
|
126933
|
+
"document": {
|
|
126934
|
+
"Version": "2012-10-17",
|
|
126935
|
+
"Statement": [
|
|
126936
|
+
{
|
|
126937
|
+
"Effect": "Allow",
|
|
126938
|
+
"Action": [
|
|
126939
|
+
"route53:*",
|
|
126940
|
+
"route53domains:*",
|
|
126941
|
+
"cloudfront:ListDistributions",
|
|
126942
|
+
"cloudfront:GetDistributionTenantByDomain",
|
|
126943
|
+
"cloudfront:GetConnectionGroup",
|
|
126944
|
+
"cloudwatch:DescribeAlarms",
|
|
126945
|
+
"cloudwatch:GetMetricStatistics",
|
|
126946
|
+
"cloudwatch:GetMetricData",
|
|
126947
|
+
"ec2:DescribeVpcs",
|
|
126948
|
+
"ec2:DescribeVpcEndpoints",
|
|
126949
|
+
"ec2:DescribeRegions",
|
|
126950
|
+
"elasticloadbalancing:DescribeLoadBalancers",
|
|
126951
|
+
"elasticbeanstalk:DescribeEnvironments",
|
|
126952
|
+
"es:ListDomainNames",
|
|
126953
|
+
"es:DescribeDomains",
|
|
126954
|
+
"lightsail:GetContainerServices",
|
|
126955
|
+
"s3:ListBucket",
|
|
126956
|
+
"s3:GetBucketLocation",
|
|
126957
|
+
"s3:GetBucketWebsite",
|
|
126958
|
+
"sns:ListTopics",
|
|
126959
|
+
"sns:ListSubscriptionsByTopic",
|
|
126960
|
+
"tag:GetResources"
|
|
126961
|
+
],
|
|
126962
|
+
"Resource": "*"
|
|
126963
|
+
},
|
|
126964
|
+
{
|
|
126965
|
+
"Effect": "Allow",
|
|
126966
|
+
"Action": "apigateway:GET",
|
|
126967
|
+
"Resource": "arn:aws:apigateway:*::/domainnames"
|
|
126968
|
+
}
|
|
126969
|
+
]
|
|
126970
|
+
}
|
|
126930
126971
|
}
|
|
126931
126972
|
},
|
|
126932
126973
|
"createdDate": "2015-02-06T18:40:54.000Z",
|
|
126933
|
-
"lastUpdatedDate": "
|
|
126974
|
+
"lastUpdatedDate": "2025-05-15T18:07:06.000Z"
|
|
126934
126975
|
},
|
|
126935
126976
|
"AmazonRoute53ReadOnlyAccess": {
|
|
126936
126977
|
"arn": "arn:aws:iam::aws:policy/AmazonRoute53ReadOnlyAccess",
|
|
@@ -348968,8 +349009,8 @@
|
|
|
348968
349009
|
},
|
|
348969
349010
|
"AWSVPCS2SVpnServiceRolePolicy": {
|
|
348970
349011
|
"arn": "arn:aws:iam::aws:policy/aws-service-role/AWSVPCS2SVpnServiceRolePolicy",
|
|
348971
|
-
"latestVersionId": "
|
|
348972
|
-
"versionsCount":
|
|
349012
|
+
"latestVersionId": "v2",
|
|
349013
|
+
"versionsCount": 2,
|
|
348973
349014
|
"versions": {
|
|
348974
349015
|
"v1": {
|
|
348975
349016
|
"createdDate": "2019-08-06T14:13:58.000Z",
|
|
@@ -348989,10 +349030,58 @@
|
|
|
348989
349030
|
}
|
|
348990
349031
|
]
|
|
348991
349032
|
}
|
|
349033
|
+
},
|
|
349034
|
+
"v2": {
|
|
349035
|
+
"createdDate": "2019-08-06T14:13:58.000Z",
|
|
349036
|
+
"document": {
|
|
349037
|
+
"Version": "2012-10-17",
|
|
349038
|
+
"Statement": [
|
|
349039
|
+
{
|
|
349040
|
+
"Sid": "0",
|
|
349041
|
+
"Effect": "Allow",
|
|
349042
|
+
"Action": [
|
|
349043
|
+
"acm:ExportCertificate",
|
|
349044
|
+
"acm:DescribeCertificate",
|
|
349045
|
+
"acm:ListCertificates",
|
|
349046
|
+
"acm-pca:DescribeCertificateAuthority"
|
|
349047
|
+
],
|
|
349048
|
+
"Resource": "*"
|
|
349049
|
+
},
|
|
349050
|
+
{
|
|
349051
|
+
"Sid": "VpnConnectionSecretsManagement",
|
|
349052
|
+
"Effect": "Allow",
|
|
349053
|
+
"Action": [
|
|
349054
|
+
"secretsmanager:DescribeSecret",
|
|
349055
|
+
"secretsmanager:DeleteSecret",
|
|
349056
|
+
"secretsmanager:PutSecretValue",
|
|
349057
|
+
"secretsmanager:UpdateSecret",
|
|
349058
|
+
"secretsmanager:GetSecretValue"
|
|
349059
|
+
],
|
|
349060
|
+
"Resource": "arn:aws:secretsmanager:*:*:secret:s2svpn!*",
|
|
349061
|
+
"Condition": {
|
|
349062
|
+
"StringEquals": {
|
|
349063
|
+
"secretsmanager:ResourceTag/aws:secretsmanager:owningService": "s2svpn",
|
|
349064
|
+
"aws:ResourceAccount": "${aws:PrincipalAccount}"
|
|
349065
|
+
}
|
|
349066
|
+
}
|
|
349067
|
+
},
|
|
349068
|
+
{
|
|
349069
|
+
"Sid": "VpnConnectionSecretsCreation",
|
|
349070
|
+
"Effect": "Allow",
|
|
349071
|
+
"Action": "secretsmanager:CreateSecret",
|
|
349072
|
+
"Resource": "arn:aws:secretsmanager:*:*:secret:s2svpn!*",
|
|
349073
|
+
"Condition": {
|
|
349074
|
+
"StringLike": {
|
|
349075
|
+
"secretsmanager:Name": "s2svpn!*"
|
|
349076
|
+
}
|
|
349077
|
+
}
|
|
349078
|
+
}
|
|
349079
|
+
]
|
|
349080
|
+
}
|
|
348992
349081
|
}
|
|
348993
349082
|
},
|
|
348994
349083
|
"createdDate": "2019-08-06T14:13:58.000Z",
|
|
348995
|
-
"lastUpdatedDate": "
|
|
349084
|
+
"lastUpdatedDate": "2025-05-15T16:52:07.000Z"
|
|
348996
349085
|
},
|
|
348997
349086
|
"AWSServiceRoleForSMS": {
|
|
348998
349087
|
"arn": "arn:aws:iam::aws:policy/aws-service-role/AWSServiceRoleForSMS",
|
|
@@ -786156,5 +786245,119 @@
|
|
|
786156
786245
|
},
|
|
786157
786246
|
"createdDate": "2025-05-12T19:22:07.000Z",
|
|
786158
786247
|
"lastUpdatedDate": "2025-05-12T19:22:07.000Z"
|
|
786248
|
+
},
|
|
786249
|
+
"AWSServiceRoleForAWSTransform": {
|
|
786250
|
+
"arn": "arn:aws:iam::aws:policy/aws-service-role/AWSServiceRoleForAWSTransform",
|
|
786251
|
+
"latestVersionId": "v1",
|
|
786252
|
+
"versionsCount": 1,
|
|
786253
|
+
"versions": {
|
|
786254
|
+
"v1": {
|
|
786255
|
+
"createdDate": "2025-05-15T13:37:07.000Z",
|
|
786256
|
+
"document": {
|
|
786257
|
+
"Version": "2012-10-17",
|
|
786258
|
+
"Statement": [
|
|
786259
|
+
{
|
|
786260
|
+
"Sid": "PublishCloudWatchMetrics",
|
|
786261
|
+
"Effect": "Allow",
|
|
786262
|
+
"Action": [
|
|
786263
|
+
"cloudwatch:PutMetricData"
|
|
786264
|
+
],
|
|
786265
|
+
"Resource": "*",
|
|
786266
|
+
"Condition": {
|
|
786267
|
+
"StringEquals": {
|
|
786268
|
+
"cloudwatch:namespace": [
|
|
786269
|
+
"AWS/Transform"
|
|
786270
|
+
]
|
|
786271
|
+
}
|
|
786272
|
+
}
|
|
786273
|
+
}
|
|
786274
|
+
]
|
|
786275
|
+
}
|
|
786276
|
+
}
|
|
786277
|
+
},
|
|
786278
|
+
"createdDate": "2025-05-15T13:37:07.000Z",
|
|
786279
|
+
"lastUpdatedDate": "2025-05-15T13:37:07.000Z"
|
|
786280
|
+
},
|
|
786281
|
+
"CloudTrailEventContext": {
|
|
786282
|
+
"arn": "arn:aws:iam::aws:policy/aws-service-role/CloudTrailEventContext",
|
|
786283
|
+
"latestVersionId": "v1",
|
|
786284
|
+
"versionsCount": 1,
|
|
786285
|
+
"versions": {
|
|
786286
|
+
"v1": {
|
|
786287
|
+
"createdDate": "2025-05-15T13:52:06.000Z",
|
|
786288
|
+
"document": {
|
|
786289
|
+
"Version": "2012-10-17",
|
|
786290
|
+
"Statement": [
|
|
786291
|
+
{
|
|
786292
|
+
"Sid": "CloudTrailEventContextPermissionForTag",
|
|
786293
|
+
"Effect": "Allow",
|
|
786294
|
+
"Action": "tag:GetResources",
|
|
786295
|
+
"Resource": "*",
|
|
786296
|
+
"Condition": {
|
|
786297
|
+
"StringEquals": {
|
|
786298
|
+
"aws:ResourceAccount": "${aws:PrincipalAccount}"
|
|
786299
|
+
}
|
|
786300
|
+
}
|
|
786301
|
+
},
|
|
786302
|
+
{
|
|
786303
|
+
"Sid": "AllowEventBridgeRuleCreation",
|
|
786304
|
+
"Effect": "Allow",
|
|
786305
|
+
"Action": "events:PutRule",
|
|
786306
|
+
"Resource": "arn:aws:events:*:*:rule/CloudTrailEventContext*",
|
|
786307
|
+
"Condition": {
|
|
786308
|
+
"ForAllValues:StringEquals": {
|
|
786309
|
+
"events:source": "aws.tag"
|
|
786310
|
+
},
|
|
786311
|
+
"StringEquals": {
|
|
786312
|
+
"events:creatorAccount": "${aws:PrincipalAccount}",
|
|
786313
|
+
"events:detail-type": "Tag Change on Resource",
|
|
786314
|
+
"events:ManagedBy": "context.cloudtrail.amazonaws.com"
|
|
786315
|
+
}
|
|
786316
|
+
}
|
|
786317
|
+
},
|
|
786318
|
+
{
|
|
786319
|
+
"Sid": "AllowEventBridgeRuleWrite",
|
|
786320
|
+
"Effect": "Allow",
|
|
786321
|
+
"Action": [
|
|
786322
|
+
"events:PutTargets",
|
|
786323
|
+
"events:DeleteRule",
|
|
786324
|
+
"events:RemoveTargets"
|
|
786325
|
+
],
|
|
786326
|
+
"Resource": "arn:aws:events:*:*:rule/CloudTrailEventContext*",
|
|
786327
|
+
"Condition": {
|
|
786328
|
+
"StringEquals": {
|
|
786329
|
+
"events:creatorAccount": "${aws:PrincipalAccount}",
|
|
786330
|
+
"events:ManagedBy": "context.cloudtrail.amazonaws.com"
|
|
786331
|
+
}
|
|
786332
|
+
}
|
|
786333
|
+
},
|
|
786334
|
+
{
|
|
786335
|
+
"Sid": "AllowEventBridgeRuleRead",
|
|
786336
|
+
"Effect": "Allow",
|
|
786337
|
+
"Action": [
|
|
786338
|
+
"events:DescribeRule",
|
|
786339
|
+
"events:ListTargetsByRule"
|
|
786340
|
+
],
|
|
786341
|
+
"Condition": {
|
|
786342
|
+
"StringEquals": {
|
|
786343
|
+
"events:creatorAccount": "${aws:PrincipalAccount}"
|
|
786344
|
+
}
|
|
786345
|
+
},
|
|
786346
|
+
"Resource": "arn:aws:events:*:*:rule/CloudTrailEventContext*"
|
|
786347
|
+
},
|
|
786348
|
+
{
|
|
786349
|
+
"Sid": "AllowEventBridgeRuleList",
|
|
786350
|
+
"Effect": "Allow",
|
|
786351
|
+
"Action": [
|
|
786352
|
+
"events:ListRules"
|
|
786353
|
+
],
|
|
786354
|
+
"Resource": "*"
|
|
786355
|
+
}
|
|
786356
|
+
]
|
|
786357
|
+
}
|
|
786358
|
+
}
|
|
786359
|
+
},
|
|
786360
|
+
"createdDate": "2025-05-15T13:52:06.000Z",
|
|
786361
|
+
"lastUpdatedDate": "2025-05-15T13:52:06.000Z"
|
|
786159
786362
|
}
|
|
786160
786363
|
}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "aws-iam-managed-policies",
|
|
3
|
-
"version": "0.0.
|
|
3
|
+
"version": "0.0.367",
|
|
4
4
|
"description": "Provides AWS IAM Managed Policies historical data as a convenient npm package that can be used in other OSS projects.",
|
|
5
5
|
"main": "./dist/index.js",
|
|
6
6
|
"types": "./dist/index.d.ts",
|