iam-floyd 0.720.0 → 0.722.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -17,9 +17,9 @@
17
17
  Support for:
18
18
 
19
19
  - 428 Services
20
- - 19206 Actions
21
- - 2053 Resource Types
22
- - 2147 Condition keys
20
+ - 19256 Actions
21
+ - 2057 Resource Types
22
+ - 2148 Condition keys
23
23
  <!-- /stats -->
24
24
 
25
25
  ![EXPERIMENTAL](https://img.shields.io/badge/stability-experimantal-orange?style=for-the-badge)**<br>This is an early version of the package. The API will change while I implement new features. Therefore make sure you use an exact version in your `package.json` before it reaches 1.0.0.**
@@ -16,6 +16,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
16
16
  AdministratorAccessAmplify(): aws_iam.IManagedPolicy;
17
17
  /** Grants account administrative permissions. Explicitly allows developers and administrators to gain direct access to resources they need to manage AWS Elastic Beanstalk applications */
18
18
  AdministratorAccessAWSElasticBeanstalk(): aws_iam.IManagedPolicy;
19
+ /** Provides permissions required by the Amazon AI Operations Assistant to generate incident report of the investigation. */
20
+ AIOpsAssistantIncidentReportPolicy(): aws_iam.IManagedPolicy;
19
21
  /** Provides ReadOnly permissions required by the Amazon AI Operations Assistant to do analysis on customer AWS resources during investigations. */
20
22
  AIOpsAssistantPolicy(): aws_iam.IManagedPolicy;
21
23
  /** Grants full access to Amazon AI Operations service and its required permissions via AWS console. It also includes permissions to use identity-aware console sessions. */
@@ -1368,6 +1370,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1368
1370
  AWSConnector(): aws_iam.IManagedPolicy;
1369
1371
  /** Allows AWS Control Tower to call AWS services that provide automated account configuration and centralized governance on your behalf. */
1370
1372
  AWSControlTowerAccountServiceRolePolicy(): aws_iam.IManagedPolicy;
1373
+ /** Provides permissions to manage the IAM Identity Center (IdC) resources in the member accounts enrolled with AWS Control Tower. The policy is attached to the AWSControlTowerAdmin role only if the customer has opted-into IAM IdC integration in their AWS Control Tower Landing Zone. */
1374
+ AWSControlTowerIdentityCenterManagementPolicy(): aws_iam.IManagedPolicy;
1371
1375
  /** Provides access to AWS Resources managed or used by AWS Control Tower */
1372
1376
  AWSControlTowerServiceRolePolicy(): aws_iam.IManagedPolicy;
1373
1377
  /** Grants permissions to to describe the organization of the account, create S3 buckets for the MAP program and apply tags to it, create a Cost and Usage Report, and describe Cost and Usage Report definitions. */
@@ -1464,6 +1468,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1464
1468
  AWSDMSFleetAdvisorServiceRolePolicy(): aws_iam.IManagedPolicy;
1465
1469
  /** Grants AWS DMS Serverless permissions to create and manage DMS resources in your account on your behalf */
1466
1470
  AWSDMSServerlessServiceRolePolicy(): aws_iam.IManagedPolicy;
1471
+ /** Allows EC2 Capacity Manager to manage capacity resources and integrate with AWS Organizations on your behalf. */
1472
+ AWSEC2CapacityManagerServiceRolePolicy(): aws_iam.IManagedPolicy;
1467
1473
  /** Allows EC2 CapacityReservation Fleet service to manage Capacity Reservations */
1468
1474
  AWSEC2CapacityReservationFleetRolePolicy(): aws_iam.IManagedPolicy;
1469
1475
  /** Allows EC2 Fleet to launch and manage instances. */
@@ -2342,6 +2348,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2342
2348
  BedrockAgentCoreFullAccess(): aws_iam.IManagedPolicy;
2343
2349
  /** Allows access to other AWS service resources that are required to run Amazon Bedrock AgentCore in VPC mode */
2344
2350
  BedrockAgentCoreNetworkServiceRolePolicy(): aws_iam.IManagedPolicy;
2351
+ /** Allows access to identity and token management resources that are required for Amazon Bedrock AgentCore Runtime authentication and authorization. */
2352
+ BedrockAgentCoreRuntimeIdentityServiceRolePolicy(): aws_iam.IManagedPolicy;
2345
2353
  /** Grants permissions for billing and cost management. This includes viewing account usage and viewing and modifying budgets and payment methods. */
2346
2354
  Billing(): aws_iam.IManagedPolicy;
2347
2355
  /** Allows Budgets to verify access to Billing Views shared across account boundaries. */