iam-floyd
Version:
AWS IAM policy statement generator with fluent interface
749 lines (748 loc) • 27.6 kB
TypeScript
import { AccessLevelList } from '../../shared/access-level';
import { PolicyStatement, Operator } from '../../shared';
/**
* Statement provider for service [secretsmanager](https://docs.aws.amazon.com/service-authorization/latest/reference/list_awssecretsmanager.html).
*
* @param sid [SID](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_sid.html) of the statement
*/
export declare class Secretsmanager extends PolicyStatement {
servicePrefix: string;
/**
* Statement provider for service [secretsmanager](https://docs.aws.amazon.com/service-authorization/latest/reference/list_awssecretsmanager.html).
*
* @param sid [SID](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_sid.html) of the statement
*/
constructor(sid?: string);
/**
* Grants permission to retrieve and decrypt a list of secrets
*
* Access Level: List
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_BatchGetSecretValue.html
*/
toBatchGetSecretValue(): this;
/**
* Grants permission to cancel an in-progress secret rotation
*
* Access Level: Write
*
* Possible conditions:
* - .ifSecretId()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_CancelRotateSecret.html
*/
toCancelRotateSecret(): this;
/**
* Grants permission to create a secret that stores encrypted data that can be queried and rotated
*
* Access Level: Write
*
* Possible conditions:
* - .ifName()
* - .ifDescription()
* - .ifKmsKeyArn()
* - .ifKmsKeyId()
* - .ifAwsRequestTag()
* - .ifAwsResourceTag()
* - .ifAwsTagKeys()
* - .ifResourceTag()
* - .ifAddReplicaRegions()
* - .ifForceOverwriteReplicaSecret()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_CreateSecret.html
*/
toCreateSecret(): this;
/**
* Grants permission to delete the resource policy attached to a secret
*
* Access Level: Permissions management
*
* Possible conditions:
* - .ifSecretId()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_DeleteResourcePolicy.html
*/
toDeleteResourcePolicy(): this;
/**
* Grants permission to delete a secret
*
* Access Level: Write
*
* Possible conditions:
* - .ifSecretId()
* - .ifResource()
* - .ifRecoveryWindowInDays()
* - .ifForceDeleteWithoutRecovery()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_DeleteSecret.html
*/
toDeleteSecret(): this;
/**
* Grants permission to retrieve the metadata about a secret, but not the encrypted data
*
* Access Level: Read
*
* Possible conditions:
* - .ifSecretId()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_DescribeSecret.html
*/
toDescribeSecret(): this;
/**
* Grants permission to generate a random string for use in password creation
*
* Access Level: Read
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_GetRandomPassword.html
*/
toGetRandomPassword(): this;
/**
* Grants permission to get the resource policy attached to a secret
*
* Access Level: Read
*
* Possible conditions:
* - .ifSecretId()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_GetResourcePolicy.html
*/
toGetResourcePolicy(): this;
/**
* Grants permission to retrieve and decrypt the encrypted data
*
* Access Level: Read
*
* Possible conditions:
* - .ifSecretId()
* - .ifVersionId()
* - .ifVersionStage()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_GetSecretValue.html
*/
toGetSecretValue(): this;
/**
* Grants permission to list the available versions of a secret
*
* Access Level: Read
*
* Possible conditions:
* - .ifSecretId()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_ListSecretVersionIds.html
*/
toListSecretVersionIds(): this;
/**
* Grants permission to list the available secrets
*
* Access Level: List
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_ListSecrets.html
*/
toListSecrets(): this;
/**
* Grants permission to attach a resource policy to a secret
*
* Access Level: Permissions management
*
* Possible conditions:
* - .ifSecretId()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifBlockPublicPolicy()
* - .ifSecretPrimaryRegion()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_PutResourcePolicy.html
*/
toPutResourcePolicy(): this;
/**
* Grants permission to create a new version of the secret with new encrypted data
*
* Access Level: Write
*
* Possible conditions:
* - .ifSecretId()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_PutSecretValue.html
*/
toPutSecretValue(): this;
/**
* Grants permission to remove regions from replication
*
* Access Level: Write
*
* Possible conditions:
* - .ifSecretId()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_RemoveRegionsFromReplication.html
*/
toRemoveRegionsFromReplication(): this;
/**
* Grants permission to convert an existing secret to a multi-Region secret and begin replicating the secret to a list of new regions
*
* Access Level: Write
*
* Possible conditions:
* - .ifSecretId()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
* - .ifAddReplicaRegions()
* - .ifForceOverwriteReplicaSecret()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_ReplicateSecretToRegions.html
*/
toReplicateSecretToRegions(): this;
/**
* Grants permission to cancel deletion of a secret
*
* Access Level: Write
*
* Possible conditions:
* - .ifSecretId()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_RestoreSecret.html
*/
toRestoreSecret(): this;
/**
* Grants permission to start rotation of a secret
*
* Access Level: Write
*
* Possible conditions:
* - .ifSecretId()
* - .ifRotationLambdaARN()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
* - .ifModifyRotationRules()
* - .ifRotateImmediately()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_RotateSecret.html
*/
toRotateSecret(): this;
/**
* Grants permission to remove the secret from replication and promote the secret to a regional secret in the replica Region
*
* Access Level: Write
*
* Possible conditions:
* - .ifSecretId()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_StopReplicationToReplica.html
*/
toStopReplicationToReplica(): this;
/**
* Grants permission to add tags to a secret
*
* Access Level: Tagging
*
* Possible conditions:
* - .ifSecretId()
* - .ifAwsRequestTag()
* - .ifAwsTagKeys()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_TagResource.html
*/
toTagResource(): this;
/**
* Grants permission to remove tags from a secret
*
* Access Level: Tagging
*
* Possible conditions:
* - .ifSecretId()
* - .ifAwsTagKeys()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_UntagResource.html
*/
toUntagResource(): this;
/**
* Grants permission to update a secret with new metadata or with a new version of the encrypted data
*
* Access Level: Write
*
* Possible conditions:
* - .ifSecretId()
* - .ifDescription()
* - .ifKmsKeyArn()
* - .ifKmsKeyId()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_UpdateSecret.html
*/
toUpdateSecret(): this;
/**
* Grants permission to move a stage from one secret to another
*
* Access Level: Write
*
* Possible conditions:
* - .ifSecretId()
* - .ifVersionStage()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_UpdateSecretVersionStage.html
*/
toUpdateSecretVersionStage(): this;
/**
* Grants permission to validate a resource policy before attaching policy
*
* Access Level: Permissions management
*
* Possible conditions:
* - .ifSecretId()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_ValidateResourcePolicy.html
*/
toValidateResourcePolicy(): this;
protected accessLevelList: AccessLevelList;
/**
* Adds a resource of type Secret to the statement
*
* https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-resources
*
* @param secretId - Identifier for the secretId.
* @param account - Account of the resource; defaults to `*`, unless using the CDK, where the default is the current Stack's account.
* @param region - Region of the resource; defaults to `*`, unless using the CDK, where the default is the current Stack's region.
* @param partition - Partition of the AWS account [aws, aws-cn, aws-us-gov]; defaults to `aws`, unless using the CDK, where the default is the current Stack's partition.
*
* Possible conditions:
* - .ifAwsRequestTag()
* - .ifAwsResourceTag()
* - .ifAwsTagKeys()
* - .ifResourceTag()
* - .ifResource()
*/
onSecret(secretId: string, account?: string, region?: string, partition?: string): this;
/**
* Filters access by a key that is present in the request the user makes to the Secrets Manager service
*
* https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-contextkeys
*
* Applies to actions:
* - .toCreateSecret()
* - .toTagResource()
*
* Applies to resource types:
* - Secret
*
* @param tagKey The tag key to check
* @param value The value(s) to check
* @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike`
*/
ifAwsRequestTag(tagKey: string, value: string | string[], operator?: Operator | string): this;
/**
* Filters access by the tags associated with the resource
*
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-resourcetag
*
* Applies to actions:
* - .toCancelRotateSecret()
* - .toCreateSecret()
* - .toDeleteResourcePolicy()
* - .toDeleteSecret()
* - .toDescribeSecret()
* - .toGetResourcePolicy()
* - .toGetSecretValue()
* - .toListSecretVersionIds()
* - .toPutResourcePolicy()
* - .toPutSecretValue()
* - .toRemoveRegionsFromReplication()
* - .toReplicateSecretToRegions()
* - .toRestoreSecret()
* - .toRotateSecret()
* - .toStopReplicationToReplica()
* - .toTagResource()
* - .toUntagResource()
* - .toUpdateSecret()
* - .toUpdateSecretVersionStage()
* - .toValidateResourcePolicy()
*
* Applies to resource types:
* - Secret
*
* @param tagKey The tag key to check
* @param value The value(s) to check
* @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike`
*/
ifAwsResourceTag(tagKey: string, value: string | string[], operator?: Operator | string): this;
/**
* Filters access by the list of all the tag key names present in the request the user makes to the Secrets Manager service
*
* https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-contextkeys
*
* Applies to actions:
* - .toCreateSecret()
* - .toTagResource()
* - .toUntagResource()
*
* Applies to resource types:
* - Secret
*
* @param value The value(s) to check
* @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike`
*/
ifAwsTagKeys(value: string | string[], operator?: Operator | string): this;
/**
* Filters access by the list of Regions in which to replicate the secret
*
* https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-contextkeys
*
* Applies to actions:
* - .toCreateSecret()
* - .toReplicateSecretToRegions()
*
* @param value The value(s) to check
* @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike`
*/
ifAddReplicaRegions(value: string | string[], operator?: Operator | string): this;
/**
* Filters access by whether the resource policy blocks broad AWS account access
*
* https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-contextkeys
*
* Applies to actions:
* - .toPutResourcePolicy()
*
* @param value `true` or `false`. **Default:** `true`
*/
ifBlockPublicPolicy(value?: boolean): this;
/**
* Filters access by the description text in the request
*
* https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-contextkeys
*
* Applies to actions:
* - .toCreateSecret()
* - .toUpdateSecret()
*
* @param value The value(s) to check
* @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike`
*/
ifDescription(value: string | string[], operator?: Operator | string): this;
/**
* Filters access by whether the secret is to be deleted immediately without any recovery window
*
* https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-contextkeys
*
* Applies to actions:
* - .toDeleteSecret()
*
* @param value `true` or `false`. **Default:** `true`
*/
ifForceDeleteWithoutRecovery(value?: boolean): this;
/**
* Filters access by whether to overwrite a secret with the same name in the destination Region
*
* https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-contextkeys
*
* Applies to actions:
* - .toCreateSecret()
* - .toReplicateSecretToRegions()
*
* @param value `true` or `false`. **Default:** `true`
*/
ifForceOverwriteReplicaSecret(value?: boolean): this;
/**
* Filters access by the key ARN of the KMS key in the request
*
* https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-contextkeys
*
* Applies to actions:
* - .toCreateSecret()
* - .toUpdateSecret()
*
* @param value The value(s) to check
* @param operator Works with [arn operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_ARN). **Default:** `ArnLike`
*/
ifKmsKeyArn(value: string | string[], operator?: Operator | string): this;
/**
* Filters access by the key identifier of the KMS key in the request. Deprecated: Use secretsmanager:KmsKeyArn
*
* https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-contextkeys
*
* Applies to actions:
* - .toCreateSecret()
* - .toUpdateSecret()
*
* @param value The value(s) to check
* @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike`
*/
ifKmsKeyId(value: string | string[], operator?: Operator | string): this;
/**
* Filters access by whether the rotation rules of the secret are to be modified
*
* https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-contextkeys
*
* Applies to actions:
* - .toRotateSecret()
*
* @param value `true` or `false`. **Default:** `true`
*/
ifModifyRotationRules(value?: boolean): this;
/**
* Filters access by the friendly name of the secret in the request
*
* https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-contextkeys
*
* Applies to actions:
* - .toCreateSecret()
*
* @param value The value(s) to check
* @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike`
*/
ifName(value: string | string[], operator?: Operator | string): this;
/**
* Filters access by the number of days that Secrets Manager waits before it can delete the secret
*
* https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-contextkeys
*
* Applies to actions:
* - .toDeleteSecret()
*
* @param value The value(s) to check
* @param operator Works with [numeric operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_Numeric). **Default:** `NumericEquals`
*/
ifRecoveryWindowInDays(value: number | number[], operator?: Operator | string): this;
/**
* Filters access by a tag key and value pair
*
* https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-contextkeys
*
* Applies to actions:
* - .toCancelRotateSecret()
* - .toCreateSecret()
* - .toDeleteResourcePolicy()
* - .toDeleteSecret()
* - .toDescribeSecret()
* - .toGetResourcePolicy()
* - .toGetSecretValue()
* - .toListSecretVersionIds()
* - .toPutResourcePolicy()
* - .toPutSecretValue()
* - .toRemoveRegionsFromReplication()
* - .toReplicateSecretToRegions()
* - .toRestoreSecret()
* - .toRotateSecret()
* - .toStopReplicationToReplica()
* - .toTagResource()
* - .toUntagResource()
* - .toUpdateSecret()
* - .toUpdateSecretVersionStage()
* - .toValidateResourcePolicy()
*
* Applies to resource types:
* - Secret
*
* @param tagKey The tag key to check
* @param value The value(s) to check
* @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike`
*/
ifResourceTag(tagKey: string, value: string | string[], operator?: Operator | string): this;
/**
* Filters access by whether the secret is to be rotated immediately
*
* https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-contextkeys
*
* Applies to actions:
* - .toRotateSecret()
*
* @param value `true` or `false`. **Default:** `true`
*/
ifRotateImmediately(value?: boolean): this;
/**
* Filters access by the ARN of the rotation Lambda function in the request
*
* https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-contextkeys
*
* Applies to actions:
* - .toRotateSecret()
*
* @param value The value(s) to check
* @param operator Works with [arn operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_ARN). **Default:** `ArnLike`
*/
ifRotationLambdaARN(value: string | string[], operator?: Operator | string): this;
/**
* Filters access by the SecretID value in the request
*
* https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-contextkeys
*
* Applies to actions:
* - .toCancelRotateSecret()
* - .toDeleteResourcePolicy()
* - .toDeleteSecret()
* - .toDescribeSecret()
* - .toGetResourcePolicy()
* - .toGetSecretValue()
* - .toListSecretVersionIds()
* - .toPutResourcePolicy()
* - .toPutSecretValue()
* - .toRemoveRegionsFromReplication()
* - .toReplicateSecretToRegions()
* - .toRestoreSecret()
* - .toRotateSecret()
* - .toStopReplicationToReplica()
* - .toTagResource()
* - .toUntagResource()
* - .toUpdateSecret()
* - .toUpdateSecretVersionStage()
* - .toValidateResourcePolicy()
*
* @param value The value(s) to check
* @param operator Works with [arn operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_ARN). **Default:** `ArnLike`
*/
ifSecretId(value: string | string[], operator?: Operator | string): this;
/**
* Filters access by primary region in which the secret is created
*
* https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-contextkeys
*
* Applies to actions:
* - .toCancelRotateSecret()
* - .toDeleteResourcePolicy()
* - .toDeleteSecret()
* - .toDescribeSecret()
* - .toGetResourcePolicy()
* - .toGetSecretValue()
* - .toListSecretVersionIds()
* - .toPutResourcePolicy()
* - .toPutSecretValue()
* - .toRemoveRegionsFromReplication()
* - .toReplicateSecretToRegions()
* - .toRestoreSecret()
* - .toRotateSecret()
* - .toStopReplicationToReplica()
* - .toTagResource()
* - .toUntagResource()
* - .toUpdateSecret()
* - .toUpdateSecretVersionStage()
* - .toValidateResourcePolicy()
*
* @param value The value(s) to check
* @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike`
*/
ifSecretPrimaryRegion(value: string | string[], operator?: Operator | string): this;
/**
* Filters access by the unique identifier of the version of the secret in the request
*
* https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-contextkeys
*
* Applies to actions:
* - .toGetSecretValue()
*
* @param value The value(s) to check
* @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike`
*/
ifVersionId(value: string | string[], operator?: Operator | string): this;
/**
* Filters access by the list of version stages in the request
*
* https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-contextkeys
*
* Applies to actions:
* - .toGetSecretValue()
* - .toUpdateSecretVersionStage()
*
* @param value The value(s) to check
* @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike`
*/
ifVersionStage(value: string | string[], operator?: Operator | string): this;
/**
* Filters access by the ARN of the rotation Lambda function associated with the secret
*
* https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_iam-permissions.html#iam-contextkeys
*
* Applies to actions:
* - .toCancelRotateSecret()
* - .toDeleteResourcePolicy()
* - .toDeleteSecret()
* - .toDescribeSecret()
* - .toGetResourcePolicy()
* - .toGetSecretValue()
* - .toListSecretVersionIds()
* - .toPutResourcePolicy()
* - .toPutSecretValue()
* - .toRemoveRegionsFromReplication()
* - .toReplicateSecretToRegions()
* - .toRestoreSecret()
* - .toRotateSecret()
* - .toStopReplicationToReplica()
* - .toTagResource()
* - .toUntagResource()
* - .toUpdateSecret()
* - .toUpdateSecretVersionStage()
* - .toValidateResourcePolicy()
*
* Applies to resource types:
* - Secret
*
* @param allowRotationLambdaArn The tag key to check
* @param value The value(s) to check
* @param operator Works with [arn operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_ARN). **Default:** `ArnLike`
*/
ifResource(allowRotationLambdaArn: string, value: string | string[], operator?: Operator | string): this;
}