cdk-iam-floyd 0.708.0 → 0.709.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +2 -2
- package/lib/generated/aws-managed-policies/cdk-iam-floyd.d.ts +4 -0
- package/lib/generated/aws-managed-policies/cdk-iam-floyd.js +9 -1
- package/lib/generated/aws-managed-policies/iam-floyd.d.ts +4 -0
- package/lib/generated/aws-managed-policies/iam-floyd.js +5 -1
- package/lib/generated/index.d.ts +0 -1
- package/lib/generated/index.js +3 -5
- package/package.json +3 -3
- package/lib/generated/policy-statements/serviceformanagingaccountleveldisplaysettings.d.ts +0 -41
- package/lib/generated/policy-statements/serviceformanagingaccountleveldisplaysettings.js +0 -60
package/README.md
CHANGED
|
@@ -446,6 +446,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
446
446
|
AmazonGrafanaServiceLinkedRolePolicy(): aws_iam.IManagedPolicy;
|
|
447
447
|
/** Provides full access to use Amazon GuardDuty. */
|
|
448
448
|
AmazonGuardDutyFullAccess(): aws_iam.IManagedPolicy;
|
|
449
|
+
/** Provides full access to use Amazon GuardDuty */
|
|
450
|
+
AmazonGuardDutyFullAccessV2(): aws_iam.IManagedPolicy;
|
|
449
451
|
/** GuardDuty malware protection uses the service-linked role (SLR) named AWSServiceRoleForAmazonGuardDutyMalwareProtection. This service-linked role allows GuardDuty malware protection to perform agent-less scans to detect malware. It allows GuardDuty to create snapshots in your account, and share the snapshots with the GuardDuty service account to scan for malware. It evaluates these shared snapshots and includes the retrieved EC2 instance metadata in the GuardDuty Malware Protection findings. The AWSServiceRoleForAmazonGuardDutyMalwareProtection service-linked role trusts the malware-protection.guardduty.amazonaws.com service to assume the role. */
|
|
450
452
|
AmazonGuardDutyMalwareProtectionServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
451
453
|
/** Provides read only access to Amazon GuardDuty resources */
|
|
@@ -834,6 +836,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
834
836
|
AmazonSageMakerPartnerServiceCatalogProductsLambdaServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
835
837
|
/** This Amazon Managed Policy grants permissions commonly needed for use with Callback steps and Lambda steps in SageMaker Model Building Pipelines. It is added to the AmazonSageMaker-ExecutionRole that can be created when setting up SageMaker Studio. It can also be attached to any other role that will be used for authoring or executing pipelines. */
|
|
836
838
|
AmazonSageMakerPipelinesIntegrations(): aws_iam.IManagedPolicy;
|
|
839
|
+
/** This policy will be used By SageMaker Unified Studios to create VPC related resources for QuickSight */
|
|
840
|
+
AmazonSageMakerQuickSightVPCPolicy(): aws_iam.IManagedPolicy;
|
|
837
841
|
/** Provides read only access to Amazon SageMaker via the AWS Management Console and SDK. */
|
|
838
842
|
AmazonSageMakerReadOnly(): aws_iam.IManagedPolicy;
|
|
839
843
|
/** Service role policy used by the AWS APIGateway within the AWS ServiceCatalog provisioned products from Amazon SageMaker portfolio of products. Grants permissions to a set of related services including CloudWatch Logs and others. */
|