iam-floyd 0.668.0 → 0.669.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -16,10 +16,10 @@
16
16
  <!-- stats -->
17
17
  Support for:
18
18
 
19
- - 417 Services
20
- - 18235 Actions
21
- - 1960 Resource Types
22
- - 1909 Condition keys
19
+ - 416 Services
20
+ - 18230 Actions
21
+ - 1959 Resource Types
22
+ - 1910 Condition keys
23
23
  <!-- /stats -->
24
24
 
25
25
  ![EXPERIMENTAL](https://img.shields.io/badge/stability-experimantal-orange?style=for-the-badge)**<br>This is an early version of the package. The API will change while I implement new features. Therefore make sure you use an exact version in your `package.json` before it reaches 1.0.0.**
@@ -2574,6 +2574,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2574
2574
  SageMakerStudioDomainExecutionRolePolicy(): aws_iam.IManagedPolicy;
2575
2575
  /** Service role for domain level actions in the portal that are performed by Amazon SageMaker Studio. */
2576
2576
  SageMakerStudioDomainServiceRolePolicy(): aws_iam.IManagedPolicy;
2577
+ /** Amazon SageMaker Studio creates IAM roles for projects users to perform data analytics, artificial intelligence, and machine learning actions, and uses this policy when creating these roles to define the permissions related to EMR. */
2578
+ SageMakerStudioEMRServiceRolePolicy(): aws_iam.IManagedPolicy;
2577
2579
  /** This policy provides full access to Amazon SageMaker Unified Studio via the Amazon SageMaker management console. */
2578
2580
  SageMakerStudioFullAccess(): aws_iam.IManagedPolicy;
2579
2581
  /** Amazon SageMaker Studio uses this policy to provision and manage resources in your account. */
@@ -2584,6 +2586,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2584
2586
  SageMakerStudioProjectUserRolePermissionsBoundary(): aws_iam.IManagedPolicy;
2585
2587
  /** Amazon SageMaker Studio creates IAM roles for projects users to perform data analytics, artificial intelligence, and machine learning actions, and uses this policy when creating these roles to define the permissions. */
2586
2588
  SageMakerStudioProjectUserRolePolicy(): aws_iam.IManagedPolicy;
2589
+ /** Amazon SageMaker Studio uses this policy when running query executions on federated connections. */
2590
+ SageMakerStudioQueryExecutionRolePolicy(): aws_iam.IManagedPolicy;
2587
2591
  /** Provides read/write access to AWS Secrets Manager via the AWS Management Console. Note: this exludes IAM actions, so combine with IAMFullAccess if rotation configuration is required. */
2588
2592
  SecretsManagerReadWrite(): aws_iam.IManagedPolicy;
2589
2593
  /** The security audit template grants access to read security configuration metadata. It is useful for software that audits the configuration of an AWS account. */