iam-floyd 0.773.0 → 0.775.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -16,9 +16,9 @@
16
16
  Support for:
17
17
 
18
18
  - 447 Services
19
- - 20597 Actions
19
+ - 20608 Actions
20
20
  - 2189 Resource Types
21
- - 2319 Condition keys
21
+ - 2329 Condition keys
22
22
  <!-- /stats -->
23
23
 
24
24
  ![EXPERIMENTAL](https://img.shields.io/badge/stability-experimantal-orange?style=for-the-badge)**<br>This is an early version of the package. The API will change while I implement new features. Therefore make sure you use an exact version in your `package.json` before it reaches 1.0.0.**
@@ -264,8 +264,12 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
264
264
  AmazonDynamoDBFullAccesswithDataPipeline(): aws_iam.IManagedPolicy;
265
265
  /** Provides read only access to Amazon DynamoDB via the AWS Management Console. */
266
266
  AmazonDynamoDBReadOnlyAccess(): aws_iam.IManagedPolicy;
267
+ /** IAM Policy that allows the CSI driver service account to make calls to related services such as EC2 on your behalf. This policy restricts the Amazon EBS CSI driver to only managing EBS volumes and snapshots that belong to a specific EKS cluster. It requires the resource tag ebs.csi.aws.com/cluster-name to match the eks-cluster-name tag on the IAM principal, preventing cross-cluster access when multiple clusters share the same AWS account. Attach and detach operations on instances are restricted to instances tagged with either the eks:cluster-name tag (set automatically by EKS on managed node groups) or the ebs.csi.aws.com/cluster-name tag (for manually tagged instances). */
268
+ AmazonEBSCSIDriverEKSClusterScopedPolicy(): aws_iam.IManagedPolicy;
267
269
  /** IAM Policy that allows the CSI driver service account to make calls to related services such as EC2 on your behalf. */
268
270
  AmazonEBSCSIDriverPolicy(): aws_iam.IManagedPolicy;
271
+ /** IAM Policy that allows the EBS CSI driver service account to make calls to related services such as EC2 on your behalf. It limits the Amazon EBS CSI driver to only managing EBS volumes and snapshots that are tagged with the key ebs.csi.aws.com/cluster set to true. Volumes provisioned by the in-tree Kubernetes volume plugin (CSI-migrated volumes) are also supported through the kubernetes.io/created-for/pvc/name resource tag. */
272
+ AmazonEBSCSIDriverPolicyV2(): aws_iam.IManagedPolicy;
269
273
  /** Provides administrative access to Amazon ECR resources */
270
274
  AmazonEC2ContainerRegistryFullAccess(): aws_iam.IManagedPolicy;
271
275
  /** Provides full access to Amazon EC2 Container Registry repositories, but does not allow repository deletion or policy changes. */
@@ -1292,6 +1296,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1292
1296
  AWSBCMDataExportsServiceRolePolicy(): aws_iam.IManagedPolicy;
1293
1297
  /** Allows Bedrock AgentCore Gateway to managed VPC Lattice resources on your behalf */
1294
1298
  AWSBedrockAgentCoreGatewayNetworkServiceRolePolicy(): aws_iam.IManagedPolicy;
1299
+ /** Allows Bedrock AgentCore Identity to managed VPC Lattice resources on your behalf */
1300
+ AWSBedrockAgentCoreIdentityNetworkServiceRolePolicy(): aws_iam.IManagedPolicy;
1295
1301
  /** Use the AWSBillingConductorFullAccess managed policy to allow complete access to AWS Billing Conductor (ABC) console and APIs. This policy allows users to list, create and delete ABC resources. */
1296
1302
  AWSBillingConductorFullAccess(): aws_iam.IManagedPolicy;
1297
1303
  /** Use the AWSBillingConductorReadOnlyAccess managed policy to allow read only access to AWS Billing Conductor (ABC) console and APIs. This policy grants permission to view and list all ABC resources. It does not include the ability to create or delete resources. */