iam-floyd 0.764.0 → 0.765.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -16,9 +16,9 @@
16
16
  Support for:
17
17
 
18
18
  - 445 Services
19
- - 20450 Actions
20
- - 2170 Resource Types
21
- - 2298 Condition keys
19
+ - 20433 Actions
20
+ - 2163 Resource Types
21
+ - 2301 Condition keys
22
22
  <!-- /stats -->
23
23
 
24
24
  ![EXPERIMENTAL](https://img.shields.io/badge/stability-experimantal-orange?style=for-the-badge)**<br>This is an early version of the package. The API will change while I implement new features. Therefore make sure you use an exact version in your `package.json` before it reaches 1.0.0.**
@@ -1528,6 +1528,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1528
1528
  AWSEC2SqlHaInstancePolicy(): aws_iam.IManagedPolicy;
1529
1529
  /** EC2 SQL High Availability service permissions to detect standby/passive instances */
1530
1530
  AWSEC2SqlHaServiceRolePolicy(): aws_iam.IManagedPolicy;
1531
+ /** Grants Amazon EC2 and AWS SSM permissions to restore SQL Server database from application consistent snapshots created by AWS VSS. */
1532
+ AWSEC2VssRestorePolicy(): aws_iam.IManagedPolicy;
1531
1533
  /** This policy is attached to the IAM role that's attached to your Amazon EC2 Windows Instances to enable the Amazon EC2 VSS solution to create and add tags to Amazon Machine Images (AMI) and EBS Snapshots. */
1532
1534
  AWSEC2VssSnapshotPolicy(): aws_iam.IManagedPolicy;
1533
1535
  /** Enables access to AWS services and resources used or managed by AWS ECR pull through cache */
@@ -2244,6 +2246,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2244
2246
  AWSServiceRoleForAmazonQDeveloper(): aws_iam.IManagedPolicy;
2245
2247
  /** This Service-Linked Role provides AWS Transform with the ability to provide usage information. */
2246
2248
  AWSServiceRoleForAWSTransform(): aws_iam.IManagedPolicy;
2249
+ /** Allows AWS Transform Custom to publish CloudWatch metrics to your account on your behalf. */
2250
+ AWSServiceRoleForAWSTransformCustom(): aws_iam.IManagedPolicy;
2247
2251
  /** Provides access to Systems Manager resources used by CloudWatch Alarms */
2248
2252
  AWSServiceRoleForCloudWatchAlarmsActionSSMServiceRolePolicy(): aws_iam.IManagedPolicy;
2249
2253
  /** Allows CloudWatch to access RDS Performance Insights metrics on your behalf */
@@ -2588,6 +2592,10 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2588
2592
  DataScientist(): aws_iam.IManagedPolicy;
2589
2593
  /** This policy allows DAX to create and manage Network interface, Security group, Subnet and Vpc on behalf of customer */
2590
2594
  DAXServiceRolePolicy(): aws_iam.IManagedPolicy;
2595
+ /** Discovery and Assessment permissions for database connector used in database modernization */
2596
+ DBModDiscoveryAndAssessment(): aws_iam.IManagedPolicy;
2597
+ /** Resource provisioning and data migration permissions for database connector used in database modernization */
2598
+ DBModProvisioningAndMigration(): aws_iam.IManagedPolicy;
2591
2599
  /** Provides access to read-only APIs needed to run EC2 Declarative Policies Account Status Report. */
2592
2600
  DeclarativePoliciesEC2Report(): aws_iam.IManagedPolicy;
2593
2601
  /** Permissions required to support Amazon CloudWatch Contributor Insights for Amazon DynamoDB. */