cdk-iam-floyd 0.708.0 → 0.710.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +4 -4
- package/lib/generated/aws-managed-policies/cdk-iam-floyd.d.ts +16 -0
- package/lib/generated/aws-managed-policies/cdk-iam-floyd.js +33 -1
- package/lib/generated/aws-managed-policies/iam-floyd.d.ts +16 -0
- package/lib/generated/aws-managed-policies/iam-floyd.js +17 -1
- package/lib/generated/index.d.ts +3 -1
- package/lib/generated/index.js +15 -11
- package/lib/generated/policy-statements/elasticvmwareservice.d.ts +177 -0
- package/lib/generated/policy-statements/elasticvmwareservice.js +232 -0
- package/lib/generated/policy-statements/supportconsole.d.ts +83 -0
- package/lib/generated/policy-statements/supportconsole.js +126 -0
- package/lib/generated/policy-statements/workspacesmanagedinstances.d.ts +224 -0
- package/lib/generated/policy-statements/workspacesmanagedinstances.js +287 -0
- package/package.json +4 -4
- package/lib/generated/policy-statements/serviceformanagingaccountleveldisplaysettings.d.ts +0 -41
- package/lib/generated/policy-statements/serviceformanagingaccountleveldisplaysettings.js +0 -60
package/README.md
CHANGED
|
@@ -16,10 +16,10 @@
|
|
|
16
16
|
<!-- stats -->
|
|
17
17
|
Support for:
|
|
18
18
|
|
|
19
|
-
-
|
|
20
|
-
-
|
|
21
|
-
-
|
|
22
|
-
-
|
|
19
|
+
- 421 Services
|
|
20
|
+
- 18549 Actions
|
|
21
|
+
- 1992 Resource Types
|
|
22
|
+
- 1957 Condition keys
|
|
23
23
|
<!-- /stats -->
|
|
24
24
|
|
|
25
25
|
**<br>This is an early version of the package. The API will change while I implement new features. Therefore make sure you use an exact version in your `package.json` before it reaches 1.0.0.**
|
|
@@ -446,6 +446,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
446
446
|
AmazonGrafanaServiceLinkedRolePolicy(): aws_iam.IManagedPolicy;
|
|
447
447
|
/** Provides full access to use Amazon GuardDuty. */
|
|
448
448
|
AmazonGuardDutyFullAccess(): aws_iam.IManagedPolicy;
|
|
449
|
+
/** Provides full access to use Amazon GuardDuty */
|
|
450
|
+
AmazonGuardDutyFullAccessV2(): aws_iam.IManagedPolicy;
|
|
449
451
|
/** GuardDuty malware protection uses the service-linked role (SLR) named AWSServiceRoleForAmazonGuardDutyMalwareProtection. This service-linked role allows GuardDuty malware protection to perform agent-less scans to detect malware. It allows GuardDuty to create snapshots in your account, and share the snapshots with the GuardDuty service account to scan for malware. It evaluates these shared snapshots and includes the retrieved EC2 instance metadata in the GuardDuty Malware Protection findings. The AWSServiceRoleForAmazonGuardDutyMalwareProtection service-linked role trusts the malware-protection.guardduty.amazonaws.com service to assume the role. */
|
|
450
452
|
AmazonGuardDutyMalwareProtectionServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
451
453
|
/** Provides read only access to Amazon GuardDuty resources */
|
|
@@ -834,6 +836,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
834
836
|
AmazonSageMakerPartnerServiceCatalogProductsLambdaServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
835
837
|
/** This Amazon Managed Policy grants permissions commonly needed for use with Callback steps and Lambda steps in SageMaker Model Building Pipelines. It is added to the AmazonSageMaker-ExecutionRole that can be created when setting up SageMaker Studio. It can also be attached to any other role that will be used for authoring or executing pipelines. */
|
|
836
838
|
AmazonSageMakerPipelinesIntegrations(): aws_iam.IManagedPolicy;
|
|
839
|
+
/** This policy will be used By SageMaker Unified Studios to create VPC related resources for QuickSight */
|
|
840
|
+
AmazonSageMakerQuickSightVPCPolicy(): aws_iam.IManagedPolicy;
|
|
837
841
|
/** Provides read only access to Amazon SageMaker via the AWS Management Console and SDK. */
|
|
838
842
|
AmazonSageMakerReadOnly(): aws_iam.IManagedPolicy;
|
|
839
843
|
/** Service role policy used by the AWS APIGateway within the AWS ServiceCatalog provisioned products from Amazon SageMaker portfolio of products. Grants permissions to a set of related services including CloudWatch Logs and others. */
|
|
@@ -962,6 +966,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
962
966
|
AmazonWorkSpacesServiceAccess(): aws_iam.IManagedPolicy;
|
|
963
967
|
/** Provides full access to Amazon WorkSpaces Thin Client as well as limited access to required related services */
|
|
964
968
|
AmazonWorkSpacesThinClientFullAccess(): aws_iam.IManagedPolicy;
|
|
969
|
+
/** Enables access to AWS Services and Resources used or managed by Amazon WorkSpaces Thin Client Monitoring */
|
|
970
|
+
AmazonWorkSpacesThinClientMonitoringServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
965
971
|
/** Provides read-only access to Amazon WorkSpaces Thin Client and its dependencies */
|
|
966
972
|
AmazonWorkSpacesThinClientReadOnlyAccess(): aws_iam.IManagedPolicy;
|
|
967
973
|
/** Provides read-only access to Amazon WorkSpaces Web and its dependencies through the AWS Management Console, SDK, and CLI. */
|
|
@@ -1856,6 +1862,10 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
1856
1862
|
AWSMigrationHubStrategyServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
1857
1863
|
/** Grants permissions to Amazon MSK Replicator to replicate data between MSK Clusters. */
|
|
1858
1864
|
AWSMSKReplicatorExecutionRole(): aws_iam.IManagedPolicy;
|
|
1865
|
+
/** Grants full access to AWS Network Firewall service, including permissions to create, configure, manage, and delete firewall resources, policies, and rule groups. Additionally includes permissions to modify VPC endpoints, S3 bucket policies, CloudWatch Logs configurations, and create service-linked roles for Network Firewall and log delivery services */
|
|
1866
|
+
AWSNetworkFirewallFullAccess(): aws_iam.IManagedPolicy;
|
|
1867
|
+
/** Provides read-only access to AWS Network Firewall resources via the AWS Management Console, CLI, and SDKs. This policy allows users to view and monitor firewall configurations, policies, rule groups, and associated resources, without the ability to make changes. */
|
|
1868
|
+
AWSNetworkFirewallReadOnlyAccess(): aws_iam.IManagedPolicy;
|
|
1859
1869
|
/** Allow AWSNetworkFirewall to create and manage necessary resources for your Firewalls. */
|
|
1860
1870
|
AWSNetworkFirewallServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
1861
1871
|
/** Allow NetworkManager to access resources associated with your Core Network */
|
|
@@ -2070,6 +2080,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
2070
2080
|
AWSSecurityHubReadOnlyAccess(): aws_iam.IManagedPolicy;
|
|
2071
2081
|
/** A service-linked role required for AWS Security Hub to access your resources. */
|
|
2072
2082
|
AWSSecurityHubServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
2083
|
+
/** This policy allows Security Hub to manage AWS Config rules and Security Hub resources in your organization and on your behalf. */
|
|
2084
|
+
AWSSecurityHubV2ServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
2073
2085
|
/** Policy provides customers with Read and Write permissions to case resources that are created through the Security Incident Response service. */
|
|
2074
2086
|
AWSSecurityIncidentResponseCaseFullAccess(): aws_iam.IManagedPolicy;
|
|
2075
2087
|
/** Policy provides customers with Read and Write permissions to all resources associated to the Security Incident Response service. */
|
|
@@ -2138,6 +2150,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
2138
2150
|
AWSServiceRolePolicyForBackupReports(): aws_iam.IManagedPolicy;
|
|
2139
2151
|
/** This policy contains permissions for testing restores and for cleaning up resources created during tests. */
|
|
2140
2152
|
AWSServiceRolePolicyForBackupRestoreTesting(): aws_iam.IManagedPolicy;
|
|
2153
|
+
/** This managed policy provides administrative access to Amazon WorkSpaces to manage EC2 instances in your AWS account */
|
|
2154
|
+
AWSServiceRolePolicyForWorkspacesInstances(): aws_iam.IManagedPolicy;
|
|
2141
2155
|
/** Provides the AWS DDoS Response Team with limited access to your AWS account to assist with DDoS attack mitigation during a high-severity event. */
|
|
2142
2156
|
AWSShieldDRTAccessPolicy(): aws_iam.IManagedPolicy;
|
|
2143
2157
|
/** Allows AWS Shield to access AWS resources on your behalf to provide DDoS protection. */
|
|
@@ -2550,6 +2564,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
2550
2564
|
NeptuneReadOnlyAccess(): aws_iam.IManagedPolicy;
|
|
2551
2565
|
/** Grants full access permissions to AWS services and actions required to set up and configure AWS network resources. */
|
|
2552
2566
|
NetworkAdministrator(): aws_iam.IManagedPolicy;
|
|
2567
|
+
/** Provides permissions for the AWS Shield network security director service linked role to assess specified environments. */
|
|
2568
|
+
NetworkSecurityDirectorServiceLinkedRolePolicy(): aws_iam.IManagedPolicy;
|
|
2553
2569
|
/** Provides full access to CloudWatch Observability Access Manager */
|
|
2554
2570
|
OAMFullAccess(): aws_iam.IManagedPolicy;
|
|
2555
2571
|
/** Provides Read Only access to CloudWatch Observability Access Manager */
|