UNPKG

iam-floyd

Version:

AWS IAM policy statement generator with fluent interface

302 lines (301 loc) 10.6 kB
import { AccessLevelList } from '../../shared/access-level'; import { PolicyStatement, Operator } from '../../shared'; /** * Statement provider for service [bugbust](https://docs.aws.amazon.com/service-authorization/latest/reference/list_awsbugbust.html). * * @param sid [SID](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_sid.html) of the statement */ export declare class Bugbust extends PolicyStatement { servicePrefix: string; /** * Statement provider for service [bugbust](https://docs.aws.amazon.com/service-authorization/latest/reference/list_awsbugbust.html). * * @param sid [SID](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_sid.html) of the statement */ constructor(sid?: string); /** * Grants permission to create a BugBust event * * Access Level: Write * * Possible conditions: * - .ifAwsTagKeys() * - .ifAwsRequestTag() * * Dependent actions: * - iam:CreateServiceLinkedRole * * https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html */ toCreateEvent(): this; /** * Grants permission to evaluate checked-in profiling groups * * Access Level: Write * * Possible conditions: * - .ifAwsResourceTag() * * https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html */ toEvaluateProfilingGroups(): this; /** * Grants permission to view customer details about an event * * Access Level: Read * * Possible conditions: * - .ifAwsResourceTag() * * https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html */ toGetEvent(): this; /** * Grants permission to view the status of a BugBust player's attempt to join a BugBust event * * Access Level: Read * * Possible conditions: * - .ifAwsResourceTag() * * https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html */ toGetJoinEventStatus(): this; /** * Grants permission to join an event * * Access Level: Write * * Possible conditions: * - .ifAwsResourceTag() * * https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html */ toJoinEvent(): this; /** * Grants permission to view the bugs that were imported into an event for players to work on * * Access Level: Read * * Possible conditions: * - .ifAwsResourceTag() * * Dependent actions: * - codeguru-reviewer:DescribeCodeReview * - codeguru-reviewer:ListRecommendations * * https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html */ toListBugs(): this; /** * Grants permission to view the participants of an event * * Access Level: Read * * Possible conditions: * - .ifAwsResourceTag() * * https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html */ toListEventParticipants(): this; /** * Grants permission to view the scores of an event's players * * Access Level: Read * * Possible conditions: * - .ifAwsResourceTag() * * https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html */ toListEventScores(): this; /** * Grants permission to List BugBust events * * Access Level: List * * Possible conditions: * - .ifAwsResourceTag() * * https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html */ toListEvents(): this; /** * Grants permission to view the profiling groups that were imported into an event for players to work on * * Access Level: Read * * Possible conditions: * - .ifAwsResourceTag() * * https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html */ toListProfilingGroups(): this; /** * Grants permission to view the pull requests used by players to submit fixes to their claimed bugs in an event * * Access Level: Read * * Possible conditions: * - .ifAwsResourceTag() * * https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html */ toListPullRequests(): this; /** * Grants permission to lists tag for a Bugbust resource * * Access Level: Read * * Possible conditions: * - .ifAwsResourceTag() * * https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html */ toListTagsForResource(): this; /** * Grants permission to tag a Bugbust resource * * Access Level: Tagging * * Possible conditions: * - .ifAwsTagKeys() * - .ifAwsRequestTag() * * https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html */ toTagResource(): this; /** * Grants permission to untag a Bugbust resource * * Access Level: Tagging * * Possible conditions: * - .ifAwsTagKeys() * - .ifAwsRequestTag() * * https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html */ toUntagResource(): this; /** * Grants permission to update a BugBust event * * Access Level: Write * * Possible conditions: * - .ifAwsResourceTag() * * Dependent actions: * - codeguru-profiler:DescribeProfilingGroup * - codeguru-profiler:ListProfilingGroups * - codeguru-reviewer:DescribeCodeReview * - codeguru-reviewer:ListCodeReviews * - codeguru-reviewer:ListRecommendations * - codeguru-reviewer:TagResource * - codeguru-reviewer:UnTagResource * * https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html */ toUpdateEvent(): this; /** * Grants permission to update a work item as claimed or unclaimed (bug or profiling group) * * Access Level: Write * * Possible conditions: * - .ifAwsResourceTag() * * Dependent actions: * - codeguru-reviewer:ListRecommendations * * https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html */ toUpdateWorkItem(): this; /** * Grants permission to update an event's work item (bug or profiling group) * * Access Level: Write * * Possible conditions: * - .ifAwsResourceTag() * * Dependent actions: * - codeguru-reviewer:ListRecommendations * * https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html */ toUpdateWorkItemAdmin(): this; protected accessLevelList: AccessLevelList; /** * Adds a resource of type Event to the statement * * https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/event-managing.html * * @param eventId - Identifier for the eventId. * @param account - Account of the resource; defaults to `*`, unless using the CDK, where the default is the current Stack's account. * @param region - Region of the resource; defaults to `*`, unless using the CDK, where the default is the current Stack's region. * @param partition - Partition of the AWS account [aws, aws-cn, aws-us-gov]; defaults to `aws`, unless using the CDK, where the default is the current Stack's partition. * * Possible conditions: * - .ifAwsResourceTag() */ onEvent(eventId: string, account?: string, region?: string, partition?: string): this; /** * Filters access based on the tags that are passed in the request * * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-requesttag * * Applies to actions: * - .toCreateEvent() * - .toTagResource() * - .toUntagResource() * * @param tagKey The tag key to check * @param value The value(s) to check * @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike` */ ifAwsRequestTag(tagKey: string, value: string | string[], operator?: Operator | string): this; /** * Filters access based on the tags associated with the resource * * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-resourcetag * * Applies to actions: * - .toEvaluateProfilingGroups() * - .toGetEvent() * - .toGetJoinEventStatus() * - .toJoinEvent() * - .toListBugs() * - .toListEventParticipants() * - .toListEventScores() * - .toListEvents() * - .toListProfilingGroups() * - .toListPullRequests() * - .toListTagsForResource() * - .toUpdateEvent() * - .toUpdateWorkItem() * - .toUpdateWorkItemAdmin() * * Applies to resource types: * - Event * * @param tagKey The tag key to check * @param value The value(s) to check * @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike` */ ifAwsResourceTag(tagKey: string, value: string | string[], operator?: Operator | string): this; /** * Filters access based on the tag keys that are passed in the request * * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-tagkeys * * Applies to actions: * - .toCreateEvent() * - .toTagResource() * - .toUntagResource() * * @param value The value(s) to check * @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike` */ ifAwsTagKeys(value: string | string[], operator?: Operator | string): this; }