iam-floyd 0.710.0 → 0.711.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -16,10 +16,10 @@
16
16
  <!-- stats -->
17
17
  Support for:
18
18
 
19
- - 421 Services
20
- - 18549 Actions
21
- - 1992 Resource Types
22
- - 1957 Condition keys
19
+ - 422 Services
20
+ - 18598 Actions
21
+ - 1996 Resource Types
22
+ - 1965 Condition keys
23
23
  <!-- /stats -->
24
24
 
25
25
  ![EXPERIMENTAL](https://img.shields.io/badge/stability-experimantal-orange?style=for-the-badge)**<br>This is an early version of the package. The API will change while I implement new features. Therefore make sure you use an exact version in your `package.json` before it reaches 1.0.0.**
@@ -298,6 +298,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
298
298
  AmazonEKSComputePolicy(): aws_iam.IManagedPolicy;
299
299
  /** This policy allows Amazon EKS to manage AWS resources for EKS connector */
300
300
  AmazonEKSConnectorServiceRolePolicy(): aws_iam.IManagedPolicy;
301
+ /** Provides read only access to view the dashboard in the Amazon EKS console. The dashboard aggregates information about multiple clusters and related resources using AWS Organizations. */
302
+ AmazonEKSDashboardConsoleReadOnly(): aws_iam.IManagedPolicy;
301
303
  /** This policy enables the Amazon EKS Dashboard to access and display organization-wide information. The policy allows the EKS Dashboard service to gather information about your AWS Organizations structure and accounts. */
302
304
  AmazonEKSDashboardServiceRolePolicy(): aws_iam.IManagedPolicy;
303
305
  /** Provides access to other AWS service resources that are required to run Amazon EKS pods on AWS Fargate */
@@ -780,6 +782,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
780
782
  AmazonS3ReadOnlyAccess(): aws_iam.IManagedPolicy;
781
783
  /** Provides full access to all S3 table buckets. */
782
784
  AmazonS3TablesFullAccess(): aws_iam.IManagedPolicy;
785
+ /** This managed policy grants AWS Lake Formation permissions to act on all table buckets, namespaces, and tables within the account. */
786
+ AmazonS3TablesLakeFormationServiceRole(): aws_iam.IManagedPolicy;
783
787
  /** Provides read only access to all S3 table buckets. */
784
788
  AmazonS3TablesReadOnlyAccess(): aws_iam.IManagedPolicy;
785
789
  /** Service role policy used by the AWS Service Catalog service to provision products from Amazon SageMaker portfolio of products. Grants permissions to a set of related services including CodePipeline, CodeBuild, CodeCommit, Glue, CloudFormation, etc,. */
@@ -1926,6 +1930,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1926
1930
  AWSPartnerCentralSellingResourceSnapshotJobExecutionRolePolicy(): aws_iam.IManagedPolicy;
1927
1931
  /** This policy can be used to grant read-only access to APIs that can read service metadata for services in your AWS account. You can use this policy to provide your partners in the Partner-Led Support Program with access to the services specified in the permissions details section below. */
1928
1932
  AWSPartnerLedSupportReadOnlyAccess(): aws_iam.IManagedPolicy;
1933
+ /** Grants permission to AWS PCS compute nodes to connect to AWS PCS clusters. */
1934
+ AWSPCSComputeNodePolicy(): aws_iam.IManagedPolicy;
1929
1935
  /** Grants permissions to PCS to manage resources on your behalf. */
1930
1936
  AWSPCSServiceRolePolicy(): aws_iam.IManagedPolicy;
1931
1937
  /** Provides full access to AWS Price List Service. */
@@ -2530,6 +2536,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2530
2536
  KafkaConnectServiceRolePolicy(): aws_iam.IManagedPolicy;
2531
2537
  /** IAM service linked role policy for Kafka. */
2532
2538
  KafkaServiceRolePolicy(): aws_iam.IManagedPolicy;
2539
+ /** Grants the required permissions to Amazon Keyspaces for Change Data Capture */
2540
+ KeyspacesCDCServiceRolePolicy(): aws_iam.IManagedPolicy;
2533
2541
  /** Permissions required by Keyspaces for cross-region data replication */
2534
2542
  KeyspacesReplicationServiceRolePolicy(): aws_iam.IManagedPolicy;
2535
2543
  /** Policy to grant temporary data access to Lake Formation resources */
@@ -2554,6 +2562,10 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2554
2562
  MigrationHubSMSAccessServiceRolePolicy(): aws_iam.IManagedPolicy;
2555
2563
  /** Policy for AWS Monitron service linked role granting access to required customer resources. */
2556
2564
  MonitronServiceRolePolicy(): aws_iam.IManagedPolicy;
2565
+ /** Provides full access to Multi-party approval. This policy also includes related permissions to AWS Organizations and AWS IAM Identity for managing approval teams and identity sources. */
2566
+ MultiPartyApprovalFullAccess(): aws_iam.IManagedPolicy;
2567
+ /** Provides read-only access to Multi-party approval. This policy also includes related read permission to AWS Organizations and AWS IAM Identity for approval teams and identity sources. */
2568
+ MultiPartyApprovalReadOnlyAccess(): aws_iam.IManagedPolicy;
2557
2569
  /** Provides full access to manage Amazon Neptune using the AWS Console. Note this policy also grants full access to publish on all SNS topics within the account, permissions to create and edit Amazon EC2 instances and VPC configurations, permissions to view and list keys on Amazon KMS, and full access to Amazon RDS. For more information, see https://aws.amazon.com/neptune/faqs/. */
2558
2570
  NeptuneConsoleFullAccess(): aws_iam.IManagedPolicy;
2559
2571
  /** Provides full access to Amazon Neptune. Note this policy also grants full access to publish on all SNS topics within the account and full access to Amazon RDS. For more information, see https://aws.amazon.com/neptune/faqs/. */