iam-floyd 0.734.0 → 0.737.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (74) hide show
  1. package/README.md +4 -4
  2. package/lib/generated/aws-managed-policies/cdk-iam-floyd.d.ts +24 -0
  3. package/lib/generated/aws-managed-policies/cdk-iam-floyd.js +49 -1
  4. package/lib/generated/aws-managed-policies/iam-floyd.d.ts +24 -0
  5. package/lib/generated/aws-managed-policies/iam-floyd.js +25 -1
  6. package/lib/generated/index.d.ts +8 -1
  7. package/lib/generated/index.js +27 -13
  8. package/lib/generated/policy-statements/bedrock.d.ts +32 -0
  9. package/lib/generated/policy-statements/bedrock.js +45 -1
  10. package/lib/generated/policy-statements/bedrockagentcore.d.ts +359 -13
  11. package/lib/generated/policy-statements/bedrockagentcore.js +478 -16
  12. package/lib/generated/policy-statements/bedrockpoweredbyawsmantle.d.ts +125 -0
  13. package/lib/generated/policy-statements/bedrockpoweredbyawsmantle.js +167 -0
  14. package/lib/generated/policy-statements/billingandcostmanagementdataexports.d.ts +28 -14
  15. package/lib/generated/policy-statements/billingandcostmanagementdataexports.js +31 -15
  16. package/lib/generated/policy-statements/cloudwatchlogs.d.ts +72 -0
  17. package/lib/generated/policy-statements/cloudwatchlogs.js +100 -1
  18. package/lib/generated/policy-statements/cloudwatchobservabilityadminservice.d.ts +143 -0
  19. package/lib/generated/policy-statements/cloudwatchobservabilityadminservice.js +184 -2
  20. package/lib/generated/policy-statements/computeoptimizerautomation.d.ts +274 -0
  21. package/lib/generated/policy-statements/computeoptimizerautomation.js +366 -0
  22. package/lib/generated/policy-statements/connect.d.ts +866 -13
  23. package/lib/generated/policy-statements/connect.js +1034 -9
  24. package/lib/generated/policy-statements/costexplorerservice.d.ts +8 -0
  25. package/lib/generated/policy-statements/costexplorerservice.js +12 -1
  26. package/lib/generated/policy-statements/datazone.d.ts +12 -0
  27. package/lib/generated/policy-statements/datazone.js +19 -1
  28. package/lib/generated/policy-statements/devopsagentservice.d.ts +469 -0
  29. package/lib/generated/policy-statements/devopsagentservice.js +631 -0
  30. package/lib/generated/policy-statements/elastickubernetesservice.d.ts +64 -0
  31. package/lib/generated/policy-statements/elastickubernetesservice.js +82 -1
  32. package/lib/generated/policy-statements/elementalmediaconnect.d.ts +357 -31
  33. package/lib/generated/policy-statements/elementalmediaconnect.js +450 -39
  34. package/lib/generated/policy-statements/healthlake.d.ts +2 -0
  35. package/lib/generated/policy-statements/healthlake.js +3 -1
  36. package/lib/generated/policy-statements/identitystore.d.ts +15 -0
  37. package/lib/generated/policy-statements/identitystore.js +19 -1
  38. package/lib/generated/policy-statements/lambda.d.ts +192 -3
  39. package/lib/generated/policy-statements/lambda.js +251 -4
  40. package/lib/generated/policy-statements/marketplace.d.ts +48 -0
  41. package/lib/generated/policy-statements/marketplace.js +67 -1
  42. package/lib/generated/policy-statements/mcpserver.d.ts +41 -0
  43. package/lib/generated/policy-statements/mcpserver.js +63 -0
  44. package/lib/generated/policy-statements/opensearch.d.ts +40 -0
  45. package/lib/generated/policy-statements/opensearch.js +59 -2
  46. package/lib/generated/policy-statements/partnercentral.d.ts +845 -9
  47. package/lib/generated/policy-statements/partnercentral.js +1037 -6
  48. package/lib/generated/policy-statements/partnercentralaccountmanagement.d.ts +47 -1
  49. package/lib/generated/policy-statements/partnercentralaccountmanagement.js +57 -1
  50. package/lib/generated/policy-statements/privatelink.d.ts +23 -1
  51. package/lib/generated/policy-statements/privatelink.js +28 -2
  52. package/lib/generated/policy-statements/route53.d.ts +8 -0
  53. package/lib/generated/policy-statements/route53.js +12 -1
  54. package/lib/generated/policy-statements/route53globalresolver.d.ts +551 -0
  55. package/lib/generated/policy-statements/route53globalresolver.js +728 -0
  56. package/lib/generated/policy-statements/s3.d.ts +3 -2
  57. package/lib/generated/policy-statements/s3.js +4 -3
  58. package/lib/generated/policy-statements/s3tables.d.ts +216 -33
  59. package/lib/generated/policy-statements/s3tables.js +262 -35
  60. package/lib/generated/policy-statements/s3vectors.d.ts +211 -0
  61. package/lib/generated/policy-statements/s3vectors.js +231 -1
  62. package/lib/generated/policy-statements/sagemaker.d.ts +83 -0
  63. package/lib/generated/policy-statements/sagemaker.js +107 -1
  64. package/lib/generated/policy-statements/securityagent.d.ts +624 -0
  65. package/lib/generated/policy-statements/securityagent.js +841 -0
  66. package/lib/generated/policy-statements/servicetomanageaiagentsforuiworkflows.d.ts +168 -0
  67. package/lib/generated/policy-statements/servicetomanageaiagentsforuiworkflows.js +233 -0
  68. package/lib/generated/policy-statements/transform.d.ts +76 -12
  69. package/lib/generated/policy-statements/transform.js +101 -13
  70. package/lib/generated/policy-statements/transformcustom.d.ts +281 -0
  71. package/lib/generated/policy-statements/transformcustom.js +374 -0
  72. package/package.json +6 -6
  73. package/lib/generated/policy-statements/deepcomposer.d.ts +0 -277
  74. package/lib/generated/policy-statements/deepcomposer.js +0 -358
package/README.md CHANGED
@@ -16,10 +16,10 @@
16
16
  <!-- stats -->
17
17
  Support for:
18
18
 
19
- - 434 Services
20
- - 19602 Actions
21
- - 2084 Resource Types
22
- - 2210 Condition keys
19
+ - 441 Services
20
+ - 20079 Actions
21
+ - 2137 Resource Types
22
+ - 2235 Condition keys
23
23
  <!-- /stats -->
24
24
 
25
25
  ![EXPERIMENTAL](https://img.shields.io/badge/stability-experimantal-orange?style=for-the-badge)**<br>This is an early version of the package. The API will change while I implement new features. Therefore make sure you use an exact version in your `package.json` before it reaches 1.0.0.**
@@ -82,6 +82,12 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
82
82
  AmazonBedrockFullAccess(): aws_iam.IManagedPolicy;
83
83
  /** Provides limited access to Amazon Bedrock as well as to related services that are required by it */
84
84
  AmazonBedrockLimitedAccess(): aws_iam.IManagedPolicy;
85
+ /** Provides full access to Amazon Bedrock Mantle as well as limited access to related services that are required by it */
86
+ AmazonBedrockMantleFullAccess(): aws_iam.IManagedPolicy;
87
+ /** Provides read and inference creation access to Amazon Bedrock Mantle */
88
+ AmazonBedrockMantleInferenceAccess(): aws_iam.IManagedPolicy;
89
+ /** Provides read only access to Amazon Bedrock Mantle */
90
+ AmazonBedrockMantleReadOnly(): aws_iam.IManagedPolicy;
85
91
  /** Provides limited access to Amazon Bedrock Marketplace as well as to related services that are required by it */
86
92
  AmazonBedrockMarketplaceAccess(): aws_iam.IManagedPolicy;
87
93
  /** Provides read only access to Amazon Bedrock */
@@ -1810,6 +1816,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1810
1816
  AWSLambdaFullAccess(): aws_iam.IManagedPolicy;
1811
1817
  /** Grants read-only access to AWS Lambda service, AWS Lambda console features, and other related AWS services. */
1812
1818
  AWSLambdaReadOnlyAccess(): aws_iam.IManagedPolicy;
1819
+ /** Provides write permissions to CloudWatch Logs and read/write permissions to durable execution APIs used by Lambda durable functions */
1820
+ AWSLambdaBasicDurableExecutionRolePolicy(): aws_iam.IManagedPolicy;
1813
1821
  /** Provides write permissions to CloudWatch Logs. */
1814
1822
  AWSLambdaBasicExecutionRole(): aws_iam.IManagedPolicy;
1815
1823
  /** Provides list and read access to DynamoDB streams and write permissions to CloudWatch logs. */
@@ -1822,12 +1830,16 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1822
1830
  AWSLambdaInvocationDynamoDB(): aws_iam.IManagedPolicy;
1823
1831
  /** Provides list and read access to Kinesis streams and write permissions to CloudWatch logs. */
1824
1832
  AWSLambdaKinesisExecutionRole(): aws_iam.IManagedPolicy;
1833
+ /** This policy grants permissions to to create and administer EC2 resources managed by the Lambda Managed Instances, and descriptive permissions. */
1834
+ AWSLambdaManagedEC2ResourceOperator(): aws_iam.IManagedPolicy;
1825
1835
  /** Provides permissions required to access MSK Cluster within a VPC, manage ENIs (create, describe, delete) in the VPC and write permissions to CloudWatch Logs. */
1826
1836
  AWSLambdaMSKExecutionRole(): aws_iam.IManagedPolicy;
1827
1837
  /** Grants Lambda Replicator necessary permissions to replicate functions across regions */
1828
1838
  AWSLambdaReplicator(): aws_iam.IManagedPolicy;
1829
1839
  /** Default policy for AWS Lambda service role. */
1830
1840
  AWSLambdaRole(): aws_iam.IManagedPolicy;
1841
+ /** Allows Lambda to describe and terminate managed instances from EC2 on your behalf. */
1842
+ AWSLambdaServiceRolePolicy(): aws_iam.IManagedPolicy;
1831
1843
  /** Provides receive message, delete message, and read attribute access to SQS queues, and write permissions to CloudWatch logs. */
1832
1844
  AWSLambdaSQSQueueExecutionRole(): aws_iam.IManagedPolicy;
1833
1845
  /** Provides minimum permissions for a Lambda function to execute while accessing a resource within a VPC - create, describe, delete network interfaces and write permissions to CloudWatch Logs. */
@@ -1984,6 +1996,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1984
1996
  AWSPartnerCentralChannelManagement(): aws_iam.IManagedPolicy;
1985
1997
  /** Provides full access to AWS Partner Central and related AWS Services. */
1986
1998
  AWSPartnerCentralFullAccess(): aws_iam.IManagedPolicy;
1999
+ /** Provides necessary access for marketing activities. */
2000
+ AWSPartnerCentralMarketingManagement(): aws_iam.IManagedPolicy;
1987
2001
  /** Provides necessary access for opportunity management activities. */
1988
2002
  AWSPartnerCentralOpportunityManagement(): aws_iam.IManagedPolicy;
1989
2003
  /** Provides necessary access for developer testing in the Sandbox catalog. */
@@ -2330,6 +2344,12 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2330
2344
  AWSTransformApplicationDeploymentPolicy(): aws_iam.IManagedPolicy;
2331
2345
  /** Enables the AWS Transform to deploy applications to Amazon Elastic Container Service (ECS) with Fargate. It grants permissions to provision, configure, and manage the underlying infrastructure required to run applications on ECS. */
2332
2346
  AWSTransformApplicationECSDeploymentPolicy(): aws_iam.IManagedPolicy;
2347
+ /** Provides access to execute transformations in AWS Transform custom. */
2348
+ AWSTransformCustomExecuteTransformations(): aws_iam.IManagedPolicy;
2349
+ /** Provides full access to AWS Transform custom. */
2350
+ AWSTransformCustomFullAccess(): aws_iam.IManagedPolicy;
2351
+ /** Enables the management of transformation resources and execution of transformations in AWS Transform custom. */
2352
+ AWSTransformCustomManageTransformations(): aws_iam.IManagedPolicy;
2333
2353
  /** Provides full access to AWS Trusted Advisor Priority. This policy also enables the user to add Trusted Advisor as a trusted service with AWS Organizations and to specify delegated administrator accounts for Trusted Advisor Priority. */
2334
2354
  AWSTrustedAdvisorPriorityFullAccess(): aws_iam.IManagedPolicy;
2335
2355
  /** Provides read-only access to AWS Trusted Advisor Priority. This includes permission to view the delegated administrator accounts. */
@@ -2668,6 +2688,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2668
2688
  NetworkAdministrator(): aws_iam.IManagedPolicy;
2669
2689
  /** Provides permissions for the AWS Shield network security director service linked role to assess specified environments. */
2670
2690
  NetworkSecurityDirectorServiceLinkedRolePolicy(): aws_iam.IManagedPolicy;
2691
+ /** This policy allows NovaAct to create and manage the necessary resources to operate the Nova Act agents. */
2692
+ NovaActServiceRolePolicy(): aws_iam.IManagedPolicy;
2671
2693
  /** Provides full access to CloudWatch Observability Access Manager */
2672
2694
  OAMFullAccess(): aws_iam.IManagedPolicy;
2673
2695
  /** Provides Read Only access to CloudWatch Observability Access Manager */
@@ -2790,6 +2812,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2790
2812
  SageMakerStudioUserIAMPermissiveExecutionPolicy(): aws_iam.IManagedPolicy;
2791
2813
  /** Provides read/write access to AWS Secrets Manager via the AWS Management Console. Note: this exludes IAM actions, so combine with IAMFullAccess if rotation configuration is required. */
2792
2814
  SecretsManagerReadWrite(): aws_iam.IManagedPolicy;
2815
+ /** Provides permissions for authenticated users to access the Security Agent Web Application for configuring and executing automated security penetration tests. This policy enables users to manage pentests, view findings, monitor test execution, and interact with AWS resources required for security testing operations. */
2816
+ SecurityAgentWebAppAPIPolicy(): aws_iam.IManagedPolicy;
2793
2817
  /** The security audit template grants access to read security configuration metadata. It is useful for software that audits the configuration of an AWS account. */
2794
2818
  SecurityAudit(): aws_iam.IManagedPolicy;
2795
2819
  /** Provides access to manage resources created by Security Lake. */