UNPKG

iam-floyd

Version:

AWS IAM policy statement generator with fluent interface

965 lines 88.3 kB
"use strict"; Object.defineProperty(exports, "__esModule", { value: true }); exports.Secretsmanager = void 0; const shared_1 = require("../../shared"); /** * Statement provider for service [secretsmanager](https://docs.aws.amazon.com/service-authorization/latest/reference/list_awssecretsmanager.html). * * @param sid [SID](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_sid.html) of the statement */ class Secretsmanager extends shared_1.PolicyStatement { /** * Statement provider for service [secretsmanager](https://docs.aws.amazon.com/service-authorization/latest/reference/list_awssecretsmanager.html). * * @param sid [SID](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_sid.html) of the statement */ constructor(sid) { super(sid); this.servicePrefix = 'secretsmanager'; this.accessLevelList = { List: [ 'BatchGetSecretValue', 'ListSecrets' ], Write: [ 'CancelRotateSecret', 'CreateSecret', 'DeleteSecret', 'PutSecretValue', 'RemoveRegionsFromReplication', 'ReplicateSecretToRegions', 'RestoreSecret', 'RotateSecret', 'StopReplicationToReplica', 'UpdateSecret', 'UpdateSecretVersionStage' ], 'Permissions management': [ 'DeleteResourcePolicy', 'PutResourcePolicy', 'ValidateResourcePolicy' ], Read: [ 'DescribeSecret', 'GetRandomPassword', 'GetResourcePolicy', 'GetSecretValue', 'ListSecretVersionIds' ], Tagging: [ 'TagResource', 'UntagResource' ] }; } /** * Grants permission to retrieve and decrypt a list of secrets * * Access Level: List * * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_BatchGetSecretValue.html */ toBatchGetSecretValue() { return this.to('BatchGetSecretValue'); } /** * Grants permission to cancel an in-progress secret rotation * * Access Level: Write * * Possible conditions: * - .ifSecretId() * - .ifResource() * - .ifResourceTag() * - .ifAwsResourceTag() * - .ifSecretPrimaryRegion() * - .ifResourceType() * * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_CancelRotateSecret.html */ toCancelRotateSecret() { return this.to('CancelRotateSecret'); } /** * Grants permission to create a secret that stores encrypted data that can be queried and rotated * * Access Level: Write * * Possible conditions: * - .ifName() * - .ifDescription() * - .ifKmsKeyArn() * - .ifKmsKeyId() * - .ifAwsRequestTag() * - .ifAwsResourceTag() * - .ifAwsTagKeys() * - .ifResourceTag() * - .ifAddReplicaRegions() * - .ifForceOverwriteReplicaSecret() * - .ifType() * * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_CreateSecret.html */ toCreateSecret() { return this.to('CreateSecret'); } /** * Grants permission to delete the resource policy attached to a secret * * Access Level: Permissions management * * Possible conditions: * - .ifSecretId() * - .ifResource() * - .ifResourceTag() * - .ifAwsResourceTag() * - .ifSecretPrimaryRegion() * - .ifResourceType() * * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_DeleteResourcePolicy.html */ toDeleteResourcePolicy() { return this.to('DeleteResourcePolicy'); } /** * Grants permission to delete a secret * * Access Level: Write * * Possible conditions: * - .ifSecretId() * - .ifResource() * - .ifRecoveryWindowInDays() * - .ifForceDeleteWithoutRecovery() * - .ifResourceTag() * - .ifAwsResourceTag() * - .ifSecretPrimaryRegion() * - .ifResourceType() * * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_DeleteSecret.html */ toDeleteSecret() { return this.to('DeleteSecret'); } /** * Grants permission to retrieve the metadata about a secret, but not the encrypted data * * Access Level: Read * * Possible conditions: * - .ifSecretId() * - .ifResource() * - .ifResourceTag() * - .ifAwsResourceTag() * - .ifSecretPrimaryRegion() * - .ifResourceType() * * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_DescribeSecret.html */ toDescribeSecret() { return this.to('DescribeSecret'); } /** * Grants permission to generate a random string for use in password creation * * Access Level: Read * * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_GetRandomPassword.html */ toGetRandomPassword() { return this.to('GetRandomPassword'); } /** * Grants permission to get the resource policy attached to a secret * * Access Level: Read * * Possible conditions: * - .ifSecretId() * - .ifResource() * - .ifResourceTag() * - .ifAwsResourceTag() * - .ifSecretPrimaryRegion() * - .ifResourceType() * * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_GetResourcePolicy.html */ toGetResourcePolicy() { return this.to('GetResourcePolicy'); } /** * Grants permission to retrieve and decrypt the encrypted data * * Access Level: Read * * Possible conditions: * - .ifSecretId() * - .ifVersionId() * - .ifVersionStage() * - .ifResource() * - .ifResourceTag() * - .ifAwsResourceTag() * - .ifSecretPrimaryRegion() * - .ifResourceType() * * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_GetSecretValue.html */ toGetSecretValue() { return this.to('GetSecretValue'); } /** * Grants permission to list the available versions of a secret * * Access Level: Read * * Possible conditions: * - .ifSecretId() * - .ifResource() * - .ifResourceTag() * - .ifAwsResourceTag() * - .ifSecretPrimaryRegion() * - .ifResourceType() * * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_ListSecretVersionIds.html */ toListSecretVersionIds() { return this.to('ListSecretVersionIds'); } /** * Grants permission to list the available secrets * * Access Level: List * * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_ListSecrets.html */ toListSecrets() { return this.to('ListSecrets'); } /** * Grants permission to attach a resource policy to a secret * * Access Level: Permissions management * * Possible conditions: * - .ifSecretId() * - .ifResource() * - .ifResourceTag() * - .ifAwsResourceTag() * - .ifBlockPublicPolicy() * - .ifSecretPrimaryRegion() * - .ifResourceType() * * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_PutResourcePolicy.html */ toPutResourcePolicy() { return this.to('PutResourcePolicy'); } /** * Grants permission to create a new version of the secret with new encrypted data * * Access Level: Write * * Possible conditions: * - .ifSecretId() * - .ifResource() * - .ifResourceTag() * - .ifAwsResourceTag() * - .ifSecretPrimaryRegion() * - .ifResourceType() * * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_PutSecretValue.html */ toPutSecretValue() { return this.to('PutSecretValue'); } /** * Grants permission to remove regions from replication * * Access Level: Write * * Possible conditions: * - .ifSecretId() * - .ifResource() * - .ifResourceTag() * - .ifAwsResourceTag() * - .ifSecretPrimaryRegion() * - .ifResourceType() * * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_RemoveRegionsFromReplication.html */ toRemoveRegionsFromReplication() { return this.to('RemoveRegionsFromReplication'); } /** * Grants permission to convert an existing secret to a multi-Region secret and begin replicating the secret to a list of new regions * * Access Level: Write * * Possible conditions: * - .ifSecretId() * - .ifResource() * - .ifResourceTag() * - .ifAwsResourceTag() * - .ifSecretPrimaryRegion() * - .ifAddReplicaRegions() * - .ifForceOverwriteReplicaSecret() * - .ifResourceType() * * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_ReplicateSecretToRegions.html */ toReplicateSecretToRegions() { return this.to('ReplicateSecretToRegions'); } /** * Grants permission to cancel deletion of a secret * * Access Level: Write * * Possible conditions: * - .ifSecretId() * - .ifResource() * - .ifResourceTag() * - .ifAwsResourceTag() * - .ifSecretPrimaryRegion() * - .ifResourceType() * * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_RestoreSecret.html */ toRestoreSecret() { return this.to('RestoreSecret'); } /** * Grants permission to start rotation of a secret * * Access Level: Write * * Possible conditions: * - .ifSecretId() * - .ifRotationLambdaARN() * - .ifResource() * - .ifResourceTag() * - .ifAwsResourceTag() * - .ifSecretPrimaryRegion() * - .ifModifyRotationRules() * - .ifRotateImmediately() * - .ifResourceType() * - .ifExternalSecretRotationRoleArn() * * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_RotateSecret.html */ toRotateSecret() { return this.to('RotateSecret'); } /** * Grants permission to remove the secret from replication and promote the secret to a regional secret in the replica Region * * Access Level: Write * * Possible conditions: * - .ifSecretId() * - .ifResource() * - .ifResourceTag() * - .ifAwsResourceTag() * - .ifSecretPrimaryRegion() * - .ifResourceType() * * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_StopReplicationToReplica.html */ toStopReplicationToReplica() { return this.to('StopReplicationToReplica'); } /** * Grants permission to add tags to a secret * * Access Level: Tagging * * Possible conditions: * - .ifSecretId() * - .ifAwsRequestTag() * - .ifAwsTagKeys() * - .ifResource() * - .ifResourceTag() * - .ifAwsResourceTag() * - .ifSecretPrimaryRegion() * - .ifResourceType() * * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_TagResource.html */ toTagResource() { return this.to('TagResource'); } /** * Grants permission to remove tags from a secret * * Access Level: Tagging * * Possible conditions: * - .ifSecretId() * - .ifAwsTagKeys() * - .ifResource() * - .ifResourceTag() * - .ifAwsResourceTag() * - .ifSecretPrimaryRegion() * - .ifResourceType() * * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_UntagResource.html */ toUntagResource() { return this.to('UntagResource'); } /** * Grants permission to update a secret with new metadata or with a new version of the encrypted data * * Access Level: Write * * Possible conditions: * - .ifSecretId() * - .ifDescription() * - .ifKmsKeyArn() * - .ifKmsKeyId() * - .ifResource() * - .ifResourceTag() * - .ifAwsResourceTag() * - .ifSecretPrimaryRegion() * - .ifType() * - .ifResourceType() * * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_UpdateSecret.html */ toUpdateSecret() { return this.to('UpdateSecret'); } /** * Grants permission to move a stage from one secret to another * * Access Level: Write * * Possible conditions: * - .ifSecretId() * - .ifVersionStage() * - .ifResource() * - .ifResourceTag() * - .ifAwsResourceTag() * - .ifSecretPrimaryRegion() * - .ifResourceType() * * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_UpdateSecretVersionStage.html */ toUpdateSecretVersionStage() { return this.to('UpdateSecretVersionStage'); } /** * Grants permission to validate a resource policy before attaching policy * * Access Level: Permissions management * * Possible conditions: * - .ifSecretId() * - .ifResource() * - .ifResourceTag() * - .ifAwsResourceTag() * - .ifSecretPrimaryRegion() * - .ifResourceType() * * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_ValidateResourcePolicy.html */ toValidateResourcePolicy() { return this.to('ValidateResourcePolicy'); } /** * Adds a resource of type Secret to the statement * * https://docs.aws.amazon.com/service-authorization/latest/reference/list_awssecretsmanager.html#awssecretsmanager-resources-for-iam-policies * * @param secretId - Identifier for the secretId. * @param account - Account of the resource; defaults to `*`, unless using the CDK, where the default is the current Stack's account. * @param region - Region of the resource; defaults to `*`, unless using the CDK, where the default is the current Stack's region. * @param partition - Partition of the AWS account [aws, aws-cn, aws-us-gov]; defaults to `aws`, unless using the CDK, where the default is the current Stack's partition. * * Possible conditions: * - .ifAwsRequestTag() * - .ifAwsResourceTag() * - .ifAwsTagKeys() * - .ifResourceTag() * - .ifResource() * - .ifResourceType() */ onSecret(secretId, account, region, partition) { return this.on(`arn:${partition ?? this.defaultPartition}:secretsmanager:${region ?? this.defaultRegion}:${account ?? this.defaultAccount}:secret:${secretId}`); } /** * Filters access by a key that is present in the request the user makes to the Secrets Manager service * * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-requesttag * * Applies to actions: * - .toCreateSecret() * - .toTagResource() * * Applies to resource types: * - Secret * * @param tagKey The tag key to check * @param value The value(s) to check * @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike` */ ifAwsRequestTag(tagKey, value, operator) { return this.if(`aws:RequestTag/${tagKey}`, value, operator ?? 'StringLike'); } /** * Filters access by the tags associated with the resource * * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-resourcetag * * Applies to actions: * - .toCancelRotateSecret() * - .toCreateSecret() * - .toDeleteResourcePolicy() * - .toDeleteSecret() * - .toDescribeSecret() * - .toGetResourcePolicy() * - .toGetSecretValue() * - .toListSecretVersionIds() * - .toPutResourcePolicy() * - .toPutSecretValue() * - .toRemoveRegionsFromReplication() * - .toReplicateSecretToRegions() * - .toRestoreSecret() * - .toRotateSecret() * - .toStopReplicationToReplica() * - .toTagResource() * - .toUntagResource() * - .toUpdateSecret() * - .toUpdateSecretVersionStage() * - .toValidateResourcePolicy() * * Applies to resource types: * - Secret * * @param tagKey The tag key to check * @param value The value(s) to check * @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike` */ ifAwsResourceTag(tagKey, value, operator) { return this.if(`aws:ResourceTag/${tagKey}`, value, operator ?? 'StringLike'); } /** * Filters access by the list of all the tag key names present in the request the user makes to the Secrets Manager service * * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-tagkeys * * Applies to actions: * - .toCreateSecret() * - .toTagResource() * - .toUntagResource() * * Applies to resource types: * - Secret * * @param value The value(s) to check * @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike` */ ifAwsTagKeys(value, operator) { return this.if(`aws:TagKeys`, value, operator ?? 'StringLike'); } /** * Filters access by the list of Regions in which to replicate the secret * * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html * * Applies to actions: * - .toCreateSecret() * - .toReplicateSecretToRegions() * * @param value The value(s) to check * @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike` */ ifAddReplicaRegions(value, operator) { return this.if(`AddReplicaRegions`, value, operator ?? 'StringLike'); } /** * Filters access by whether the resource policy blocks broad AWS account access * * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html * * Applies to actions: * - .toPutResourcePolicy() * * @param value `true` or `false`. **Default:** `true` */ ifBlockPublicPolicy(value) { return this.if(`BlockPublicPolicy`, (typeof value !== 'undefined' ? value : true), 'Bool'); } /** * Filters access by the description text in the request * * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html * * Applies to actions: * - .toCreateSecret() * - .toUpdateSecret() * * @param value The value(s) to check * @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike` */ ifDescription(value, operator) { return this.if(`Description`, value, operator ?? 'StringLike'); } /** * Filters access by the managed external secret rotation role ARN in the request * * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html * * Applies to actions: * - .toRotateSecret() * * @param value The value(s) to check * @param operator Works with [arn operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_ARN). **Default:** `ArnLike` */ ifExternalSecretRotationRoleArn(value, operator) { return this.if(`ExternalSecretRotationRoleArn`, value, operator ?? 'ArnLike'); } /** * Filters access by whether the secret is to be deleted immediately without any recovery window * * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html * * Applies to actions: * - .toDeleteSecret() * * @param value `true` or `false`. **Default:** `true` */ ifForceDeleteWithoutRecovery(value) { return this.if(`ForceDeleteWithoutRecovery`, (typeof value !== 'undefined' ? value : true), 'Bool'); } /** * Filters access by whether to overwrite a secret with the same name in the destination Region * * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html * * Applies to actions: * - .toCreateSecret() * - .toReplicateSecretToRegions() * * @param value `true` or `false`. **Default:** `true` */ ifForceOverwriteReplicaSecret(value) { return this.if(`ForceOverwriteReplicaSecret`, (typeof value !== 'undefined' ? value : true), 'Bool'); } /** * Filters access by the key ARN of the KMS key in the request * * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html * * Applies to actions: * - .toCreateSecret() * - .toUpdateSecret() * * @param value The value(s) to check * @param operator Works with [arn operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_ARN). **Default:** `ArnLike` */ ifKmsKeyArn(value, operator) { return this.if(`KmsKeyArn`, value, operator ?? 'ArnLike'); } /** * Filters access by the key identifier of the KMS key in the request. Deprecated: Use secretsmanager:KmsKeyArn * * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html * * Applies to actions: * - .toCreateSecret() * - .toUpdateSecret() * * @param value The value(s) to check * @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike` */ ifKmsKeyId(value, operator) { return this.if(`KmsKeyId`, value, operator ?? 'StringLike'); } /** * Filters access by whether the rotation rules of the secret are to be modified * * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html * * Applies to actions: * - .toRotateSecret() * * @param value `true` or `false`. **Default:** `true` */ ifModifyRotationRules(value) { return this.if(`ModifyRotationRules`, (typeof value !== 'undefined' ? value : true), 'Bool'); } /** * Filters access by the friendly name of the secret in the request * * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html * * Applies to actions: * - .toCreateSecret() * * @param value The value(s) to check * @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike` */ ifName(value, operator) { return this.if(`Name`, value, operator ?? 'StringLike'); } /** * Filters access by the number of days that Secrets Manager waits before it can delete the secret * * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html * * Applies to actions: * - .toDeleteSecret() * * @param value The value(s) to check * @param operator Works with [numeric operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_Numeric). **Default:** `NumericEquals` */ ifRecoveryWindowInDays(value, operator) { return this.if(`RecoveryWindowInDays`, value, operator ?? 'NumericEquals'); } /** * Filters access by a tag key and value pair * * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html * * Applies to actions: * - .toCancelRotateSecret() * - .toCreateSecret() * - .toDeleteResourcePolicy() * - .toDeleteSecret() * - .toDescribeSecret() * - .toGetResourcePolicy() * - .toGetSecretValue() * - .toListSecretVersionIds() * - .toPutResourcePolicy() * - .toPutSecretValue() * - .toRemoveRegionsFromReplication() * - .toReplicateSecretToRegions() * - .toRestoreSecret() * - .toRotateSecret() * - .toStopReplicationToReplica() * - .toTagResource() * - .toUntagResource() * - .toUpdateSecret() * - .toUpdateSecretVersionStage() * - .toValidateResourcePolicy() * * Applies to resource types: * - Secret * * @param tagKey The tag key to check * @param value The value(s) to check * @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike` */ ifResourceTag(tagKey, value, operator) { return this.if(`ResourceTag/${tagKey}`, value, operator ?? 'StringLike'); } /** * Filters access by whether the secret is to be rotated immediately * * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html * * Applies to actions: * - .toRotateSecret() * * @param value `true` or `false`. **Default:** `true` */ ifRotateImmediately(value) { return this.if(`RotateImmediately`, (typeof value !== 'undefined' ? value : true), 'Bool'); } /** * Filters access by the ARN of the rotation Lambda function in the request * * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html * * Applies to actions: * - .toRotateSecret() * * @param value The value(s) to check * @param operator Works with [arn operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_ARN). **Default:** `ArnLike` */ ifRotationLambdaARN(value, operator) { return this.if(`RotationLambdaARN`, value, operator ?? 'ArnLike'); } /** * Filters access by the SecretID value in the request * * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html * * Applies to actions: * - .toCancelRotateSecret() * - .toDeleteResourcePolicy() * - .toDeleteSecret() * - .toDescribeSecret() * - .toGetResourcePolicy() * - .toGetSecretValue() * - .toListSecretVersionIds() * - .toPutResourcePolicy() * - .toPutSecretValue() * - .toRemoveRegionsFromReplication() * - .toReplicateSecretToRegions() * - .toRestoreSecret() * - .toRotateSecret() * - .toStopReplicationToReplica() * - .toTagResource() * - .toUntagResource() * - .toUpdateSecret() * - .toUpdateSecretVersionStage() * - .toValidateResourcePolicy() * * @param value The value(s) to check * @param operator Works with [arn operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_ARN). **Default:** `ArnLike` */ ifSecretId(value, operator) { return this.if(`SecretId`, value, operator ?? 'ArnLike'); } /** * Filters access by primary region in which the secret is created if the secret is a multi-Region secret * * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html * * Applies to actions: * - .toCancelRotateSecret() * - .toDeleteResourcePolicy() * - .toDeleteSecret() * - .toDescribeSecret() * - .toGetResourcePolicy() * - .toGetSecretValue() * - .toListSecretVersionIds() * - .toPutResourcePolicy() * - .toPutSecretValue() * - .toRemoveRegionsFromReplication() * - .toReplicateSecretToRegions() * - .toRestoreSecret() * - .toRotateSecret() * - .toStopReplicationToReplica() * - .toTagResource() * - .toUntagResource() * - .toUpdateSecret() * - .toUpdateSecretVersionStage() * - .toValidateResourcePolicy() * * @param value The value(s) to check * @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike` */ ifSecretPrimaryRegion(value, operator) { return this.if(`SecretPrimaryRegion`, value, operator ?? 'StringLike'); } /** * Filters access by the managed external secret type in the request * * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html * * Applies to actions: * - .toCreateSecret() * - .toUpdateSecret() * * @param value The value(s) to check * @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike` */ ifType(value, operator) { return this.if(`Type`, value, operator ?? 'StringLike'); } /** * Filters access by the unique identifier of the version of the secret in the request * * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html * * Applies to actions: * - .toGetSecretValue() * * @param value The value(s) to check * @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike` */ ifVersionId(value, operator) { return this.if(`VersionId`, value, operator ?? 'StringLike'); } /** * Filters access by the list of version stages in the request * * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html * * Applies to actions: * - .toGetSecretValue() * - .toUpdateSecretVersionStage() * * @param value The value(s) to check * @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike` */ ifVersionStage(value, operator) { return this.if(`VersionStage`, value, operator ?? 'StringLike'); } /** * Filters access by the ARN of the rotation Lambda function associated with the secret * * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html * * Applies to actions: * - .toCancelRotateSecret() * - .toDeleteResourcePolicy() * - .toDeleteSecret() * - .toDescribeSecret() * - .toGetResourcePolicy() * - .toGetSecretValue() * - .toListSecretVersionIds() * - .toPutResourcePolicy() * - .toPutSecretValue() * - .toRemoveRegionsFromReplication() * - .toReplicateSecretToRegions() * - .toRestoreSecret() * - .toRotateSecret() * - .toStopReplicationToReplica() * - .toTagResource() * - .toUntagResource() * - .toUpdateSecret() * - .toUpdateSecretVersionStage() * - .toValidateResourcePolicy() * * Applies to resource types: * - Secret * * @param allowRotationLambdaArn The tag key to check * @param value The value(s) to check * @param operator Works with [arn operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_ARN). **Default:** `ArnLike` */ ifResource(allowRotationLambdaArn, value, operator) { return this.if(`resource/${allowRotationLambdaArn}`, value, operator ?? 'ArnLike'); } /** * Filters access by the managed external secret type associated with the secret * * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html * * Applies to actions: * - .toCancelRotateSecret() * - .toDeleteResourcePolicy() * - .toDeleteSecret() * - .toDescribeSecret() * - .toGetResourcePolicy() * - .toGetSecretValue() * - .toListSecretVersionIds() * - .toPutResourcePolicy() * - .toPutSecretValue() * - .toRemoveRegionsFromReplication() * - .toReplicateSecretToRegions() * - .toRestoreSecret() * - .toRotateSecret() * - .toStopReplicationToReplica() * - .toTagResource() * - .toUntagResource() * - .toUpdateSecret() * - .toUpdateSecretVersionStage() * - .toValidateResourcePolicy() * * Applies to resource types: * - Secret * * @param value The value(s) to check * @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike` */ ifResourceType(value, operator) { return this.if(`resource/Type`, value, operator ?? 'StringLike'); } } exports.Secretsmanager = Secretsmanager; //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"secretsmanager.js","sourceRoot":"","sources":["secretsmanager.ts"],"names":[],"mappings":";;;AACA,yCAAyD;AAEzD;;;;GAIG;AACH,MAAa,cAAe,SAAQ,wBAAe;IAGjD;;;;OAIG;IACH,YAAY,GAAY;QACtB,KAAK,CAAC,GAAG,CAAC,CAAC;QARN,kBAAa,GAAG,gBAAgB,CAAC;QAgc9B,oBAAe,GAAoB;YAC3C,IAAI,EAAE;gBACJ,qBAAqB;gBACrB,aAAa;aACd;YACD,KAAK,EAAE;gBACL,oBAAoB;gBACpB,cAAc;gBACd,cAAc;gBACd,gBAAgB;gBAChB,8BAA8B;gBAC9B,0BAA0B;gBAC1B,eAAe;gBACf,cAAc;gBACd,0BAA0B;gBAC1B,cAAc;gBACd,0BAA0B;aAC3B;YACD,wBAAwB,EAAE;gBACxB,sBAAsB;gBACtB,mBAAmB;gBACnB,wBAAwB;aACzB;YACD,IAAI,EAAE;gBACJ,gBAAgB;gBAChB,mBAAmB;gBACnB,mBAAmB;gBACnB,gBAAgB;gBAChB,sBAAsB;aACvB;YACD,OAAO,EAAE;gBACP,aAAa;gBACb,eAAe;aAChB;SACF,CAAC;IAzdF,CAAC;IAED;;;;;;OAMG;IACI,qBAAqB;QAC1B,OAAO,IAAI,CAAC,EAAE,CAAC,qBAAqB,CAAC,CAAC;IACxC,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACI,oBAAoB;QACzB,OAAO,IAAI,CAAC,EAAE,CAAC,oBAAoB,CAAC,CAAC;IACvC,CAAC;IAED;;;;;;;;;;;;;;;;;;;OAmBG;IACI,cAAc;QACnB,OAAO,IAAI,CAAC,EAAE,CAAC,cAAc,CAAC,CAAC;IACjC,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACI,sBAAsB;QAC3B,OAAO,IAAI,CAAC,EAAE,CAAC,sBAAsB,CAAC,CAAC;IACzC,CAAC;IAED;;;;;;;;;;;;;;;;OAgBG;IACI,cAAc;QACnB,OAAO,IAAI,CAAC,EAAE,CAAC,cAAc,CAAC,CAAC;IACjC,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACI,gBAAgB;QACrB,OAAO,IAAI,CAAC,EAAE,CAAC,gBAAgB,CAAC,CAAC;IACnC,CAAC;IAED;;;;;;OAMG;IACI,mBAAmB;QACxB,OAAO,IAAI,CAAC,EAAE,CAAC,mBAAmB,CAAC,CAAC;IACtC,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACI,mBAAmB;QACxB,OAAO,IAAI,CAAC,EAAE,CAAC,mBAAmB,CAAC,CAAC;IACtC,CAAC;IAED;;;;;;;;;;;;;;;;OAgBG;IACI,gBAAgB;QACrB,OAAO,IAAI,CAAC,EAAE,CAAC,gBAAgB,CAAC,CAAC;IACnC,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACI,sBAAsB;QAC3B,OAAO,IAAI,CAAC,EAAE,CAAC,sBAAsB,CAAC,CAAC;IACzC,CAAC;IAED;;;;;;OAMG;IACI,aAAa;QAClB,OAAO,IAAI,CAAC,EAAE,CAAC,aAAa,CAAC,CAAC;IAChC,CAAC;IAED;;;;;;;;;;;;;;;OAeG;IACI,mBAAmB;QACxB,OAAO,IAAI,CAAC,EAAE,CAAC,mBAAmB,CAAC,CAAC;IACtC,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACI,gBAAgB;QACrB,OAAO,IAAI,CAAC,EAAE,CAAC,gBAAgB,CAAC,CAAC;IACnC,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACI,8BAA8B;QACnC,OAAO,IAAI,CAAC,EAAE,CAAC,8BAA8B,CAAC,CAAC;IACjD,CAAC;IAED;;;;;;;;;;;;;;;;OAgBG;IACI,0BAA0B;QAC/B,OAAO,IAAI,CAAC,EAAE,CAAC,0BAA0B,CAAC,CAAC;IAC7C,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACI,eAAe;QACpB,OAAO,IAAI,CAAC,EAAE,CAAC,eAAe,CAAC,CAAC;IAClC,CAAC;IAED;;;;;;;;;;;;;;;;;;OAkBG;IACI,cAAc;QACnB,OAAO,IAAI,CAAC,EAAE,CAAC,cAAc,CAAC,CAAC;IACjC,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACI,0BAA0B;QAC/B,OAAO,IAAI,CAAC,EAAE,CAAC,0BAA0B,CAAC,CAAC;IAC7C,CAAC;IAED;;;;;;;;;;;;;;;;OAgBG;IACI,aAAa;QAClB,OAAO,IAAI,CAAC,EAAE,CAAC,aAAa,CAAC,CAAC;IAChC,CAAC;IAED;;;;;;;;;;;;;;;OAeG;IACI,eAAe;QACpB,OAAO,IAAI,CAAC,EAAE,CAAC,eAAe,CAAC,CAAC;IAClC,CAAC;IAED;;;;;;;;;;;;;;;;;;OAkBG;IACI,cAAc;QACnB,OAAO,IAAI,CAAC,EAAE,CAAC,cAAc,CAAC,CAAC;IACjC,CAAC;IAED;;;;;;;;;;;;;;;OAeG;IACI,0BAA0B;QAC/B,OAAO,IAAI,CAAC,EAAE,CAAC,0BAA0B,CAAC,CAAC;IAC7C,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACI,wBAAwB;QAC7B,OAAO,IAAI,CAAC,EAAE,CAAC,wBAAwB,CAAC,CAAC;IAC3C,CAAC;IAsCD;;;;;;;;;;;;;;;;;OAiBG;IACI,QAAQ,CAAC,QAAgB,EAAE,OAAgB,EAAE,MAAe,EAAE,SAAkB;QACrF,OAAO,IAAI,CAAC,EAAE,CAAC,OAAQ,SAAS,IAAI,IAAI,CAAC,gBAAiB,mBAAoB,MAAM,IAAI,IAAI,CAAC,aAAc,IAAK,OAAO,IAAI,IAAI,CAAC,cAAe,WAAY,QAAS,EAAE,CAAC,CAAC;IAC1K,CAAC;IAED;;;;;;;;;;;;;;;OAeG;IACI,eAAe,CAAC,MAAc,EAAE,KAAwB,EAAE,QAA4B;QAC3F,OAAO,IAAI,CAAC,EAAE,CAAC,kBAAmB,MAAO,EAAE,EAAE,KAAK,EAAE,QAAQ,IAAI,YAAY,CAAC,CAAC;IAChF,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OAiCG;IACI,gBAAgB,CAAC,MAAc,EAAE,KAAwB,EAAE,QAA4B;QAC5F,OAAO,IAAI,CAAC,EAAE,CAAC,mBAAoB,MAAO,EAAE,EAAE,KAAK,EAAE,QAAQ,IAAI,YAAY,CAAC,CAAC;IACjF,CAAC;IAED;;;;;;;;;;;;;;;OAeG;IACI,YAAY,CAAC,KAAwB,EAAE,QAA4B;QACxE,OAAO,IAAI,CAAC,EAAE,CAAC,aAAa,EAAE,KAAK,EAAE,QAAQ,IAAI,YAAY,CAAC,CAAC;IACjE,CAAC;IAED;;;;;;;;;;;OAWG;IACI,mBAAmB,CAAC,KAAwB,EAAE,QAA4B;QAC/E,OAAO,IAAI,CAAC,EAAE,CAAC,mBAAmB,EAAE,KAAK,EAAE,QAAQ,IAAI,YAAY,CAAC,CAAC;IACvE,CAAC;IAED;;;;;;;;;OASG;IACI,mBAAmB,CAAC,KAAe;QACxC,OAAO,IAAI,CAAC,EAAE,CAAC,mBAAmB,EAAE,CAAC,OAAO,KAAK,KAAK,WAAW,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,CAAC,EAAE,MAAM,CAAC,CAAC;IAC7F,CAAC;IAED;;;;;;;;;;;OAWG;IACI,aAAa,CAAC,KAAwB,EAAE,QAA4B;QACzE,OAAO,IAAI,CAAC,EAAE,CAAC,aAAa,EAAE,KAAK,EAAE,QAAQ,IAAI,YAAY,CAAC,CAAC;IACjE,CAAC;IAED;;;;;;;;;;OAUG;IACI,+BAA+B,CAAC,KAAwB,EAAE,QAA4B;QAC3F,OAAO,IAAI,CAAC,EAAE,CAAC,+BAA+B,EAAE,KAAK,EAAE,QAAQ,IAAI,SAAS,CAAC,CAAC;IAChF,CAAC;IAED;;;;;;;;;OASG;IACI,4BAA4B,CAAC,KAAe;QACjD,OAAO,IAAI,CAAC,EAAE,CAAC,4BAA4B,EAAE,CAAC,OAAO,KAAK,KAAK,WAAW,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,CAAC,EAAE,MAAM,CAAC,CAAC;IACtG,CAAC;IAED;;;;;;;;;;OAUG;IACI,6BAA6B,CAAC,KAAe;QAClD,OAAO,IAAI,CAAC,EAAE,CAAC,6BAA6B,EAAE,CAAC,OAAO,KAAK,KAAK,WAAW,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,CAAC,EAAE,MAAM,CAAC,CAAC;IACvG,CAAC;IAED;;;;;;;;;;;OAWG;IACI,WAAW,CAAC,KAAwB,EAAE,QAA4B;QACvE,OAAO,IAAI,CAAC,EAAE,CAAC,WAAW,EAAE,KAAK,EAAE,QAAQ,IAAI,SAAS,CAAC,CAAC;IAC5D,CAAC;IAED;;;;;;;;;;;OAWG;IACI,UAAU,CAAC,KAAwB,EAAE,QAA4B;QACtE,OAAO,IAAI,CAAC,EAAE,CAAC,UAAU,EAAE,KAAK,EAAE,QAAQ,IAAI,YAAY,CAAC,CAAC;IAC9D,CAAC;IAED;;;;;;;;;OASG;IACI,qBAAqB,CAAC,KAAe;QAC1C,OAAO,IAAI,CAAC,EAAE,CAAC,qBAAqB,EAAE,CAAC,OAAO,KAAK,KAAK,WAAW,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,CAAC,EAAE,MAAM,CAAC,CAAC;IAC/F,CAAC;IAED;;;;;;;;;;OAUG;IACI,MAAM,CAAC,KAAwB,EAAE,QAA4B;QAClE,OAAO,IAAI,CAAC,EAAE,CAAC,MAAM,EAAE,KAAK,EAAE,QAAQ,IAAI,YAAY,CAAC,CAAC;IAC1D,CAAC;IAED;;;;;;;;;;OAUG;IACI,sBAAsB,CAAC,KAAwB,EAAE,QAA4B;QAClF,OAAO,IAAI,CAAC,EAAE,CAAC,sBAAsB,EAAE,KAAK,EAAE,QAAQ,IAAI,eAAe,CAAC,CAAC;IAC7E,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OAiCG;IACI,aAAa,CAAC,MAAc,EAAE,KAAwB,EAAE,QAA4B;QACzF,OAAO,IAAI,CAAC,EAAE,CAAC,eAAgB,MAAO,EAAE,EAAE,KAAK,EAAE,QAAQ,IAAI,YAAY,CAAC,CAAC;IAC7E,CAAC;IAED;;;;;;;;;OASG;IACI,mBAAmB,CAAC,KAAe;QACxC,OAAO,IAAI,CAAC,EAAE,CAAC,mBAAmB,EAAE,CAAC,OAAO,KAAK,KAAK,WAAW,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,CAAC,EAAE,MAAM,CAAC,CAAC;IAC7F,CAAC;IAED;;;;;;;;;;OAUG;IACI,mBAAmB,CAAC,KAAwB,EAAE,QAA4B;QAC/E,OAAO,IAAI,CAAC,EAAE,CAAC,mBAAmB,EAAE,KAAK,EAAE,QAAQ,IAAI,SAAS,CAAC,CAAC;IACpE,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA4BG;IACI,UAAU,CAAC,KAAwB,EAAE,QAA4B;QACtE,OAAO,IAAI,CAAC,EAAE,CAAC,UAAU,EAAE,KAAK,EAAE,QAAQ,IAAI,SAAS,CAAC,CAAC;IAC3D,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA4BG;IACI,qBAAqB,CAAC,KAAwB,EAAE,QAA4B;QACjF,OAAO,IAAI,CAAC,EAAE,CAAC,qBAAqB,EAAE,KAAK,EAAE,QAAQ,IAAI,YAAY,CAAC,CAAC;IACzE,CAAC;IAED;;;;;;;;;;;OAWG;IACI,MAAM,CAAC,KAAwB,EAAE,QAA4B;QAClE,OAAO,IAAI,CAAC,EAAE,CAAC,MAAM,EAAE,KAAK,EAAE,QAAQ,IAAI,YAAY,CAAC,CAAC;IAC1D,CAAC;IAED;;;;;;;;;;OAUG;IACI,WAAW,CAAC,KAAwB,EAAE,QAA4B;QACvE,OAAO,IAAI,CAAC,EAAE,CAAC,WAAW,EAAE,KAAK,EAAE,QAAQ,IAAI,YAAY,CAAC,CAAC;IAC/D,CAAC;IAED;;;;;;;;;;;OAWG;IACI,cAAc,CAAC,KAAwB,EAAE,QAA4B;QAC1E,OAAO,IAAI,CAAC,EAAE,CAAC,cAAc,EAAE,KAAK,EAAE,QAAQ,IAAI,YAAY,CAAC,CAAC;IAClE,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OAgCG;IACI,UAAU,CAAC,sBAA8B,EAAE,KAAwB,EAAE,QAA4B;QACtG,OAAO,IAAI,CAAC,EAAE,CAAC,YAAa,sBAAuB,EAAE,EAAE,KAAK,EAAE,QAAQ,IAAI,SAAS,CAAC,CAAC;IACvF,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA+BG;IACI,cAAc,CAAC,KAAwB,EAAE,QAA4B;QAC1E,OAAO,IAAI,CAAC,EAAE,CAAC,eAAe,EAAE,KAAK,EAAE,QAAQ,IAAI,YAAY,CAAC,CAAC;IACnE,CAAC;CACF;AA3+BD,wCA2+BC","sourcesContent":["import { AccessLevelList } from '../../shared/access-level';\nimport { PolicyStatement, Operator } from '../../shared';\n\n/**\n * Statement provider for service [secretsmanager](https://docs.aws.amazon.com/service-authorization/latest/reference/list_awssecretsmanager.html).\n *\n * @param sid [SID](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_sid.html) of the statement\n */\nexport class Secretsmanager extends PolicyStatement {\n  public servicePrefix = 'secretsmanager';\n\n  /**\n   * Statement provider for service [secretsmanager](https://docs.aws.amazon.com/service-authorization/latest/reference/list_awssecretsmanager.html).\n   *\n   * @param sid [SID](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_sid.html) of the statement\n   */\n  constructor(sid?: string) {\n    super(sid);\n  }\n\n  /**\n   * Grants permission to retrieve and decrypt a list of secrets\n   *\n   * Access Level: List\n   *\n   * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_BatchGetSecretValue.html\n   */\n  public toBatchGetSecretValue() {\n    return this.to('BatchGetSecretValue');\n  }\n\n  /**\n   * Grants permission to cancel an in-progress secret rotation\n   *\n   * Access Level: Write\n   *\n   * Possible conditions:\n   * - .ifSecretId()\n   * - .ifResource()\n   * - .ifResourceTag()\n   * - .ifAwsResourceTag()\n   * - .ifSecretPrimaryRegion()\n   * - .ifResourceType()\n   *\n   * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_CancelRotateSecret.html\n   */\n  public toCancelRotateSecret() {\n    return this.to('CancelRotateSecret');\n  }\n\n  /**\n   * Grants permission to create a secret that stores encrypted data that can be queried and rotated\n   *\n   * Access Level: Write\n   *\n   * Possible conditions:\n   * - .ifName()\n   * - .ifDescription()\n   * - .ifKmsKeyArn()\n   * - .ifKmsKeyId()\n   * - .ifAwsRequestTag()\n   * - .ifAwsResourceTag()\n   * - .ifAwsTagKeys()\n   * - .ifResourceTag()\n   * - .ifAddReplicaRegions()\n   * - .ifForceOverwriteReplicaSecret()\n   * - .ifType()\n   *\n   * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_CreateSecret.html\n   */\n  public toCreateSecret() {\n    return this.to('CreateSecret');\n  }\n\n  /**\n   * Grants permission to delete the resource policy attached to a secret\n   *\n   * Access Level: Permissions management\n   *\n   * Possible conditions:\n   * - .ifSecretId()\n   * - .ifResource()\n   * - .ifResourceTag()\n   * - .ifAwsResourceTag()\n   * - .ifSecretPrimaryRegion()\n   * - .ifResourceType()\n   *\n   * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_DeleteResourcePolicy.html\n   */\n  public toDeleteResourcePolicy() {\n    return this.to('DeleteResourcePolicy');\n  }\n\n  /**\n   * Grants permission to delete a secret\n   *\n   * Access Level: Write\n   *\n   * Possible conditions:\n   * - .ifSecretId()\n   * - .ifResource()\n   * - .ifRecoveryWindowInDays()\n   * - .ifForceDeleteWithoutRecovery()\n   * - .ifResourceTag()\n   * - .ifAwsResourceTag()\n   * - .ifSecretPrimaryRegion()\n   * - .ifResourceType()\n   *\n   * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_DeleteSecret.html\n   */\n  public toDeleteSecret() {\n    return this.to('DeleteSecret');\n  }\n\n  /**\n   * Grants permission to retrieve the metadata about a secret, but not the encrypted data\n   *\n   * Access Level: Read\n   *\n   * Possible conditions:\n   * - .ifSecretId()\n   * - .ifResource()\n   * - .ifResourceTag()\n   * - .ifAwsResourceTag()\n   * - .ifSecretPrimaryRegion()\n   * - .ifResourceType()\n   *\n   * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_DescribeSecret.html\n   */\n  public toDescribeSecret() {\n    return this.to('DescribeSecret');\n  }\n\n  /**\n   * Grants permission to generate a random string for use in password creation\n   *\n   * Access Level: Read\n   *\n   * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_GetRandomPassword.html\n   */\n  public toGetRandomPassword() {\n    return this.to('GetRandomPassword');\n  }\n\n  /**\n   * Grants permission to get the resource policy attached to a secret\n   *\n   * Access Level: Read\n   *\n   * Possible conditions:\n   * - .ifSecretId()\n   * - .ifResource()\n   * - .ifResourceTag()\n   * - .ifAwsResourceTag()\n   * - .ifSecretPrimaryRegion()\n   * - .ifResourceType()\n   *\n   * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_GetResourcePolicy.html\n   */\n  public toGetResourcePolicy() {\n    return this.to('GetResourcePolicy');\n  }\n\n  /**\n   * Grants permission to retrieve and decrypt the encrypted data\n   *\n   * Access Level: Read\n   *\n   * Possible conditions:\n   * - .ifSecretId()\n   * - .ifVersionId()\n   * - .ifVersionStage()\n   * - .ifResource()\n   * - .ifResourceTag()\n   * - .ifAwsResourceTag()\n   * - .ifSecretPrimaryRegion()\n   * - .ifResourceType()\n   *\n   * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_GetSecretValue.html\n   */\n  public toGetSecretValue() {\n    return this.