iam-floyd
Version:
AWS IAM policy statement generator with fluent interface
302 lines (301 loc) • 10.6 kB
TypeScript
import { AccessLevelList } from '../../shared/access-level';
import { PolicyStatement, Operator } from '../../shared';
/**
* Statement provider for service [bugbust](https://docs.aws.amazon.com/service-authorization/latest/reference/list_awsbugbust.html).
*
* @param sid [SID](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_sid.html) of the statement
*/
export declare class Bugbust extends PolicyStatement {
servicePrefix: string;
/**
* Statement provider for service [bugbust](https://docs.aws.amazon.com/service-authorization/latest/reference/list_awsbugbust.html).
*
* @param sid [SID](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_sid.html) of the statement
*/
constructor(sid?: string);
/**
* Grants permission to create a BugBust event
*
* Access Level: Write
*
* Possible conditions:
* - .ifAwsTagKeys()
* - .ifAwsRequestTag()
*
* Dependent actions:
* - iam:CreateServiceLinkedRole
*
* https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html
*/
toCreateEvent(): this;
/**
* Grants permission to evaluate checked-in profiling groups
*
* Access Level: Write
*
* Possible conditions:
* - .ifAwsResourceTag()
*
* https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html
*/
toEvaluateProfilingGroups(): this;
/**
* Grants permission to view customer details about an event
*
* Access Level: Read
*
* Possible conditions:
* - .ifAwsResourceTag()
*
* https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html
*/
toGetEvent(): this;
/**
* Grants permission to view the status of a BugBust player's attempt to join a BugBust event
*
* Access Level: Read
*
* Possible conditions:
* - .ifAwsResourceTag()
*
* https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html
*/
toGetJoinEventStatus(): this;
/**
* Grants permission to join an event
*
* Access Level: Write
*
* Possible conditions:
* - .ifAwsResourceTag()
*
* https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html
*/
toJoinEvent(): this;
/**
* Grants permission to view the bugs that were imported into an event for players to work on
*
* Access Level: Read
*
* Possible conditions:
* - .ifAwsResourceTag()
*
* Dependent actions:
* - codeguru-reviewer:DescribeCodeReview
* - codeguru-reviewer:ListRecommendations
*
* https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html
*/
toListBugs(): this;
/**
* Grants permission to view the participants of an event
*
* Access Level: Read
*
* Possible conditions:
* - .ifAwsResourceTag()
*
* https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html
*/
toListEventParticipants(): this;
/**
* Grants permission to view the scores of an event's players
*
* Access Level: Read
*
* Possible conditions:
* - .ifAwsResourceTag()
*
* https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html
*/
toListEventScores(): this;
/**
* Grants permission to List BugBust events
*
* Access Level: List
*
* Possible conditions:
* - .ifAwsResourceTag()
*
* https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html
*/
toListEvents(): this;
/**
* Grants permission to view the profiling groups that were imported into an event for players to work on
*
* Access Level: Read
*
* Possible conditions:
* - .ifAwsResourceTag()
*
* https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html
*/
toListProfilingGroups(): this;
/**
* Grants permission to view the pull requests used by players to submit fixes to their claimed bugs in an event
*
* Access Level: Read
*
* Possible conditions:
* - .ifAwsResourceTag()
*
* https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html
*/
toListPullRequests(): this;
/**
* Grants permission to lists tag for a Bugbust resource
*
* Access Level: Read
*
* Possible conditions:
* - .ifAwsResourceTag()
*
* https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html
*/
toListTagsForResource(): this;
/**
* Grants permission to tag a Bugbust resource
*
* Access Level: Tagging
*
* Possible conditions:
* - .ifAwsTagKeys()
* - .ifAwsRequestTag()
*
* https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html
*/
toTagResource(): this;
/**
* Grants permission to untag a Bugbust resource
*
* Access Level: Tagging
*
* Possible conditions:
* - .ifAwsTagKeys()
* - .ifAwsRequestTag()
*
* https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html
*/
toUntagResource(): this;
/**
* Grants permission to update a BugBust event
*
* Access Level: Write
*
* Possible conditions:
* - .ifAwsResourceTag()
*
* Dependent actions:
* - codeguru-profiler:DescribeProfilingGroup
* - codeguru-profiler:ListProfilingGroups
* - codeguru-reviewer:DescribeCodeReview
* - codeguru-reviewer:ListCodeReviews
* - codeguru-reviewer:ListRecommendations
* - codeguru-reviewer:TagResource
* - codeguru-reviewer:UnTagResource
*
* https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html
*/
toUpdateEvent(): this;
/**
* Grants permission to update a work item as claimed or unclaimed (bug or profiling group)
*
* Access Level: Write
*
* Possible conditions:
* - .ifAwsResourceTag()
*
* Dependent actions:
* - codeguru-reviewer:ListRecommendations
*
* https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html
*/
toUpdateWorkItem(): this;
/**
* Grants permission to update an event's work item (bug or profiling group)
*
* Access Level: Write
*
* Possible conditions:
* - .ifAwsResourceTag()
*
* Dependent actions:
* - codeguru-reviewer:ListRecommendations
*
* https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/auth-and-access-control-permissions-reference.html
*/
toUpdateWorkItemAdmin(): this;
protected accessLevelList: AccessLevelList;
/**
* Adds a resource of type Event to the statement
*
* https://docs.aws.amazon.com/codeguru/latest/bugbust-ug/event-managing.html
*
* @param eventId - Identifier for the eventId.
* @param account - Account of the resource; defaults to `*`, unless using the CDK, where the default is the current Stack's account.
* @param region - Region of the resource; defaults to `*`, unless using the CDK, where the default is the current Stack's region.
* @param partition - Partition of the AWS account [aws, aws-cn, aws-us-gov]; defaults to `aws`, unless using the CDK, where the default is the current Stack's partition.
*
* Possible conditions:
* - .ifAwsResourceTag()
*/
onEvent(eventId: string, account?: string, region?: string, partition?: string): this;
/**
* Filters access based on the tags that are passed in the request
*
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-requesttag
*
* Applies to actions:
* - .toCreateEvent()
* - .toTagResource()
* - .toUntagResource()
*
* @param tagKey The tag key to check
* @param value The value(s) to check
* @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike`
*/
ifAwsRequestTag(tagKey: string, value: string | string[], operator?: Operator | string): this;
/**
* Filters access based on the tags associated with the resource
*
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-resourcetag
*
* Applies to actions:
* - .toEvaluateProfilingGroups()
* - .toGetEvent()
* - .toGetJoinEventStatus()
* - .toJoinEvent()
* - .toListBugs()
* - .toListEventParticipants()
* - .toListEventScores()
* - .toListEvents()
* - .toListProfilingGroups()
* - .toListPullRequests()
* - .toListTagsForResource()
* - .toUpdateEvent()
* - .toUpdateWorkItem()
* - .toUpdateWorkItemAdmin()
*
* Applies to resource types:
* - Event
*
* @param tagKey The tag key to check
* @param value The value(s) to check
* @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike`
*/
ifAwsResourceTag(tagKey: string, value: string | string[], operator?: Operator | string): this;
/**
* Filters access based on the tag keys that are passed in the request
*
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-tagkeys
*
* Applies to actions:
* - .toCreateEvent()
* - .toTagResource()
* - .toUntagResource()
*
* @param value The value(s) to check
* @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike`
*/
ifAwsTagKeys(value: string | string[], operator?: Operator | string): this;
}