iam-floyd 0.710.0 → 0.711.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +4 -4
- package/lib/generated/aws-managed-policies/cdk-iam-floyd.d.ts +12 -0
- package/lib/generated/aws-managed-policies/cdk-iam-floyd.js +25 -1
- package/lib/generated/aws-managed-policies/iam-floyd.d.ts +12 -0
- package/lib/generated/aws-managed-policies/iam-floyd.js +13 -1
- package/lib/generated/index.d.ts +3 -2
- package/lib/generated/index.js +8 -6
- package/lib/generated/policy-statements/{gamelift.d.ts → gameliftservers.d.ts} +131 -131
- package/lib/generated/policy-statements/gameliftservers.js +1725 -0
- package/lib/generated/policy-statements/{iotmanagedintegrationsfeatureofiotdevicemanagement.d.ts → iotmanagedintegrations.d.ts} +375 -65
- package/lib/generated/policy-statements/iotmanagedintegrations.js +1104 -0
- package/lib/generated/policy-statements/multi-partyapproval.d.ts +391 -0
- package/lib/generated/policy-statements/multi-partyapproval.js +496 -0
- package/package.json +7 -7
- package/lib/generated/policy-statements/gamelift.js +0 -1725
- package/lib/generated/policy-statements/iotmanagedintegrationsfeatureofiotdevicemanagement.js +0 -709
package/README.md
CHANGED
|
@@ -16,10 +16,10 @@
|
|
|
16
16
|
<!-- stats -->
|
|
17
17
|
Support for:
|
|
18
18
|
|
|
19
|
-
-
|
|
20
|
-
-
|
|
21
|
-
-
|
|
22
|
-
-
|
|
19
|
+
- 422 Services
|
|
20
|
+
- 18598 Actions
|
|
21
|
+
- 1996 Resource Types
|
|
22
|
+
- 1965 Condition keys
|
|
23
23
|
<!-- /stats -->
|
|
24
24
|
|
|
25
25
|
**<br>This is an early version of the package. The API will change while I implement new features. Therefore make sure you use an exact version in your `package.json` before it reaches 1.0.0.**
|
|
@@ -298,6 +298,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
298
298
|
AmazonEKSComputePolicy(): aws_iam.IManagedPolicy;
|
|
299
299
|
/** This policy allows Amazon EKS to manage AWS resources for EKS connector */
|
|
300
300
|
AmazonEKSConnectorServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
301
|
+
/** Provides read only access to view the dashboard in the Amazon EKS console. The dashboard aggregates information about multiple clusters and related resources using AWS Organizations. */
|
|
302
|
+
AmazonEKSDashboardConsoleReadOnly(): aws_iam.IManagedPolicy;
|
|
301
303
|
/** This policy enables the Amazon EKS Dashboard to access and display organization-wide information. The policy allows the EKS Dashboard service to gather information about your AWS Organizations structure and accounts. */
|
|
302
304
|
AmazonEKSDashboardServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
303
305
|
/** Provides access to other AWS service resources that are required to run Amazon EKS pods on AWS Fargate */
|
|
@@ -780,6 +782,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
780
782
|
AmazonS3ReadOnlyAccess(): aws_iam.IManagedPolicy;
|
|
781
783
|
/** Provides full access to all S3 table buckets. */
|
|
782
784
|
AmazonS3TablesFullAccess(): aws_iam.IManagedPolicy;
|
|
785
|
+
/** This managed policy grants AWS Lake Formation permissions to act on all table buckets, namespaces, and tables within the account. */
|
|
786
|
+
AmazonS3TablesLakeFormationServiceRole(): aws_iam.IManagedPolicy;
|
|
783
787
|
/** Provides read only access to all S3 table buckets. */
|
|
784
788
|
AmazonS3TablesReadOnlyAccess(): aws_iam.IManagedPolicy;
|
|
785
789
|
/** Service role policy used by the AWS Service Catalog service to provision products from Amazon SageMaker portfolio of products. Grants permissions to a set of related services including CodePipeline, CodeBuild, CodeCommit, Glue, CloudFormation, etc,. */
|
|
@@ -1926,6 +1930,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
1926
1930
|
AWSPartnerCentralSellingResourceSnapshotJobExecutionRolePolicy(): aws_iam.IManagedPolicy;
|
|
1927
1931
|
/** This policy can be used to grant read-only access to APIs that can read service metadata for services in your AWS account. You can use this policy to provide your partners in the Partner-Led Support Program with access to the services specified in the permissions details section below. */
|
|
1928
1932
|
AWSPartnerLedSupportReadOnlyAccess(): aws_iam.IManagedPolicy;
|
|
1933
|
+
/** Grants permission to AWS PCS compute nodes to connect to AWS PCS clusters. */
|
|
1934
|
+
AWSPCSComputeNodePolicy(): aws_iam.IManagedPolicy;
|
|
1929
1935
|
/** Grants permissions to PCS to manage resources on your behalf. */
|
|
1930
1936
|
AWSPCSServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
1931
1937
|
/** Provides full access to AWS Price List Service. */
|
|
@@ -2530,6 +2536,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
2530
2536
|
KafkaConnectServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
2531
2537
|
/** IAM service linked role policy for Kafka. */
|
|
2532
2538
|
KafkaServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
2539
|
+
/** Grants the required permissions to Amazon Keyspaces for Change Data Capture */
|
|
2540
|
+
KeyspacesCDCServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
2533
2541
|
/** Permissions required by Keyspaces for cross-region data replication */
|
|
2534
2542
|
KeyspacesReplicationServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
2535
2543
|
/** Policy to grant temporary data access to Lake Formation resources */
|
|
@@ -2554,6 +2562,10 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
|
|
|
2554
2562
|
MigrationHubSMSAccessServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
2555
2563
|
/** Policy for AWS Monitron service linked role granting access to required customer resources. */
|
|
2556
2564
|
MonitronServiceRolePolicy(): aws_iam.IManagedPolicy;
|
|
2565
|
+
/** Provides full access to Multi-party approval. This policy also includes related permissions to AWS Organizations and AWS IAM Identity for managing approval teams and identity sources. */
|
|
2566
|
+
MultiPartyApprovalFullAccess(): aws_iam.IManagedPolicy;
|
|
2567
|
+
/** Provides read-only access to Multi-party approval. This policy also includes related read permission to AWS Organizations and AWS IAM Identity for approval teams and identity sources. */
|
|
2568
|
+
MultiPartyApprovalReadOnlyAccess(): aws_iam.IManagedPolicy;
|
|
2557
2569
|
/** Provides full access to manage Amazon Neptune using the AWS Console. Note this policy also grants full access to publish on all SNS topics within the account, permissions to create and edit Amazon EC2 instances and VPC configurations, permissions to view and list keys on Amazon KMS, and full access to Amazon RDS. For more information, see https://aws.amazon.com/neptune/faqs/. */
|
|
2558
2570
|
NeptuneConsoleFullAccess(): aws_iam.IManagedPolicy;
|
|
2559
2571
|
/** Provides full access to Amazon Neptune. Note this policy also grants full access to publish on all SNS topics within the account and full access to Amazon RDS. For more information, see https://aws.amazon.com/neptune/faqs/. */
|