iam-floyd
Version:
AWS IAM policy statement generator with fluent interface
965 lines • 88.3 kB
JavaScript
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.Secretsmanager = void 0;
const shared_1 = require("../../shared");
/**
* Statement provider for service [secretsmanager](https://docs.aws.amazon.com/service-authorization/latest/reference/list_awssecretsmanager.html).
*
* @param sid [SID](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_sid.html) of the statement
*/
class Secretsmanager extends shared_1.PolicyStatement {
/**
* Statement provider for service [secretsmanager](https://docs.aws.amazon.com/service-authorization/latest/reference/list_awssecretsmanager.html).
*
* @param sid [SID](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_sid.html) of the statement
*/
constructor(sid) {
super(sid);
this.servicePrefix = 'secretsmanager';
this.accessLevelList = {
List: [
'BatchGetSecretValue',
'ListSecrets'
],
Write: [
'CancelRotateSecret',
'CreateSecret',
'DeleteSecret',
'PutSecretValue',
'RemoveRegionsFromReplication',
'ReplicateSecretToRegions',
'RestoreSecret',
'RotateSecret',
'StopReplicationToReplica',
'UpdateSecret',
'UpdateSecretVersionStage'
],
'Permissions management': [
'DeleteResourcePolicy',
'PutResourcePolicy',
'ValidateResourcePolicy'
],
Read: [
'DescribeSecret',
'GetRandomPassword',
'GetResourcePolicy',
'GetSecretValue',
'ListSecretVersionIds'
],
Tagging: [
'TagResource',
'UntagResource'
]
};
}
/**
* Grants permission to retrieve and decrypt a list of secrets
*
* Access Level: List
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_BatchGetSecretValue.html
*/
toBatchGetSecretValue() {
return this.to('BatchGetSecretValue');
}
/**
* Grants permission to cancel an in-progress secret rotation
*
* Access Level: Write
*
* Possible conditions:
* - .ifSecretId()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
* - .ifResourceType()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_CancelRotateSecret.html
*/
toCancelRotateSecret() {
return this.to('CancelRotateSecret');
}
/**
* Grants permission to create a secret that stores encrypted data that can be queried and rotated
*
* Access Level: Write
*
* Possible conditions:
* - .ifName()
* - .ifDescription()
* - .ifKmsKeyArn()
* - .ifKmsKeyId()
* - .ifAwsRequestTag()
* - .ifAwsResourceTag()
* - .ifAwsTagKeys()
* - .ifResourceTag()
* - .ifAddReplicaRegions()
* - .ifForceOverwriteReplicaSecret()
* - .ifType()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_CreateSecret.html
*/
toCreateSecret() {
return this.to('CreateSecret');
}
/**
* Grants permission to delete the resource policy attached to a secret
*
* Access Level: Permissions management
*
* Possible conditions:
* - .ifSecretId()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
* - .ifResourceType()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_DeleteResourcePolicy.html
*/
toDeleteResourcePolicy() {
return this.to('DeleteResourcePolicy');
}
/**
* Grants permission to delete a secret
*
* Access Level: Write
*
* Possible conditions:
* - .ifSecretId()
* - .ifResource()
* - .ifRecoveryWindowInDays()
* - .ifForceDeleteWithoutRecovery()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
* - .ifResourceType()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_DeleteSecret.html
*/
toDeleteSecret() {
return this.to('DeleteSecret');
}
/**
* Grants permission to retrieve the metadata about a secret, but not the encrypted data
*
* Access Level: Read
*
* Possible conditions:
* - .ifSecretId()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
* - .ifResourceType()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_DescribeSecret.html
*/
toDescribeSecret() {
return this.to('DescribeSecret');
}
/**
* Grants permission to generate a random string for use in password creation
*
* Access Level: Read
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_GetRandomPassword.html
*/
toGetRandomPassword() {
return this.to('GetRandomPassword');
}
/**
* Grants permission to get the resource policy attached to a secret
*
* Access Level: Read
*
* Possible conditions:
* - .ifSecretId()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
* - .ifResourceType()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_GetResourcePolicy.html
*/
toGetResourcePolicy() {
return this.to('GetResourcePolicy');
}
/**
* Grants permission to retrieve and decrypt the encrypted data
*
* Access Level: Read
*
* Possible conditions:
* - .ifSecretId()
* - .ifVersionId()
* - .ifVersionStage()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
* - .ifResourceType()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_GetSecretValue.html
*/
toGetSecretValue() {
return this.to('GetSecretValue');
}
/**
* Grants permission to list the available versions of a secret
*
* Access Level: Read
*
* Possible conditions:
* - .ifSecretId()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
* - .ifResourceType()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_ListSecretVersionIds.html
*/
toListSecretVersionIds() {
return this.to('ListSecretVersionIds');
}
/**
* Grants permission to list the available secrets
*
* Access Level: List
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_ListSecrets.html
*/
toListSecrets() {
return this.to('ListSecrets');
}
/**
* Grants permission to attach a resource policy to a secret
*
* Access Level: Permissions management
*
* Possible conditions:
* - .ifSecretId()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifBlockPublicPolicy()
* - .ifSecretPrimaryRegion()
* - .ifResourceType()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_PutResourcePolicy.html
*/
toPutResourcePolicy() {
return this.to('PutResourcePolicy');
}
/**
* Grants permission to create a new version of the secret with new encrypted data
*
* Access Level: Write
*
* Possible conditions:
* - .ifSecretId()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
* - .ifResourceType()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_PutSecretValue.html
*/
toPutSecretValue() {
return this.to('PutSecretValue');
}
/**
* Grants permission to remove regions from replication
*
* Access Level: Write
*
* Possible conditions:
* - .ifSecretId()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
* - .ifResourceType()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_RemoveRegionsFromReplication.html
*/
toRemoveRegionsFromReplication() {
return this.to('RemoveRegionsFromReplication');
}
/**
* Grants permission to convert an existing secret to a multi-Region secret and begin replicating the secret to a list of new regions
*
* Access Level: Write
*
* Possible conditions:
* - .ifSecretId()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
* - .ifAddReplicaRegions()
* - .ifForceOverwriteReplicaSecret()
* - .ifResourceType()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_ReplicateSecretToRegions.html
*/
toReplicateSecretToRegions() {
return this.to('ReplicateSecretToRegions');
}
/**
* Grants permission to cancel deletion of a secret
*
* Access Level: Write
*
* Possible conditions:
* - .ifSecretId()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
* - .ifResourceType()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_RestoreSecret.html
*/
toRestoreSecret() {
return this.to('RestoreSecret');
}
/**
* Grants permission to start rotation of a secret
*
* Access Level: Write
*
* Possible conditions:
* - .ifSecretId()
* - .ifRotationLambdaARN()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
* - .ifModifyRotationRules()
* - .ifRotateImmediately()
* - .ifResourceType()
* - .ifExternalSecretRotationRoleArn()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_RotateSecret.html
*/
toRotateSecret() {
return this.to('RotateSecret');
}
/**
* Grants permission to remove the secret from replication and promote the secret to a regional secret in the replica Region
*
* Access Level: Write
*
* Possible conditions:
* - .ifSecretId()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
* - .ifResourceType()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_StopReplicationToReplica.html
*/
toStopReplicationToReplica() {
return this.to('StopReplicationToReplica');
}
/**
* Grants permission to add tags to a secret
*
* Access Level: Tagging
*
* Possible conditions:
* - .ifSecretId()
* - .ifAwsRequestTag()
* - .ifAwsTagKeys()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
* - .ifResourceType()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_TagResource.html
*/
toTagResource() {
return this.to('TagResource');
}
/**
* Grants permission to remove tags from a secret
*
* Access Level: Tagging
*
* Possible conditions:
* - .ifSecretId()
* - .ifAwsTagKeys()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
* - .ifResourceType()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_UntagResource.html
*/
toUntagResource() {
return this.to('UntagResource');
}
/**
* Grants permission to update a secret with new metadata or with a new version of the encrypted data
*
* Access Level: Write
*
* Possible conditions:
* - .ifSecretId()
* - .ifDescription()
* - .ifKmsKeyArn()
* - .ifKmsKeyId()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
* - .ifType()
* - .ifResourceType()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_UpdateSecret.html
*/
toUpdateSecret() {
return this.to('UpdateSecret');
}
/**
* Grants permission to move a stage from one secret to another
*
* Access Level: Write
*
* Possible conditions:
* - .ifSecretId()
* - .ifVersionStage()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
* - .ifResourceType()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_UpdateSecretVersionStage.html
*/
toUpdateSecretVersionStage() {
return this.to('UpdateSecretVersionStage');
}
/**
* Grants permission to validate a resource policy before attaching policy
*
* Access Level: Permissions management
*
* Possible conditions:
* - .ifSecretId()
* - .ifResource()
* - .ifResourceTag()
* - .ifAwsResourceTag()
* - .ifSecretPrimaryRegion()
* - .ifResourceType()
*
* https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_ValidateResourcePolicy.html
*/
toValidateResourcePolicy() {
return this.to('ValidateResourcePolicy');
}
/**
* Adds a resource of type Secret to the statement
*
* https://docs.aws.amazon.com/service-authorization/latest/reference/list_awssecretsmanager.html#awssecretsmanager-resources-for-iam-policies
*
* @param secretId - Identifier for the secretId.
* @param account - Account of the resource; defaults to `*`, unless using the CDK, where the default is the current Stack's account.
* @param region - Region of the resource; defaults to `*`, unless using the CDK, where the default is the current Stack's region.
* @param partition - Partition of the AWS account [aws, aws-cn, aws-us-gov]; defaults to `aws`, unless using the CDK, where the default is the current Stack's partition.
*
* Possible conditions:
* - .ifAwsRequestTag()
* - .ifAwsResourceTag()
* - .ifAwsTagKeys()
* - .ifResourceTag()
* - .ifResource()
* - .ifResourceType()
*/
onSecret(secretId, account, region, partition) {
return this.on(`arn:${partition ?? this.defaultPartition}:secretsmanager:${region ?? this.defaultRegion}:${account ?? this.defaultAccount}:secret:${secretId}`);
}
/**
* Filters access by a key that is present in the request the user makes to the Secrets Manager service
*
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-requesttag
*
* Applies to actions:
* - .toCreateSecret()
* - .toTagResource()
*
* Applies to resource types:
* - Secret
*
* @param tagKey The tag key to check
* @param value The value(s) to check
* @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike`
*/
ifAwsRequestTag(tagKey, value, operator) {
return this.if(`aws:RequestTag/${tagKey}`, value, operator ?? 'StringLike');
}
/**
* Filters access by the tags associated with the resource
*
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-resourcetag
*
* Applies to actions:
* - .toCancelRotateSecret()
* - .toCreateSecret()
* - .toDeleteResourcePolicy()
* - .toDeleteSecret()
* - .toDescribeSecret()
* - .toGetResourcePolicy()
* - .toGetSecretValue()
* - .toListSecretVersionIds()
* - .toPutResourcePolicy()
* - .toPutSecretValue()
* - .toRemoveRegionsFromReplication()
* - .toReplicateSecretToRegions()
* - .toRestoreSecret()
* - .toRotateSecret()
* - .toStopReplicationToReplica()
* - .toTagResource()
* - .toUntagResource()
* - .toUpdateSecret()
* - .toUpdateSecretVersionStage()
* - .toValidateResourcePolicy()
*
* Applies to resource types:
* - Secret
*
* @param tagKey The tag key to check
* @param value The value(s) to check
* @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike`
*/
ifAwsResourceTag(tagKey, value, operator) {
return this.if(`aws:ResourceTag/${tagKey}`, value, operator ?? 'StringLike');
}
/**
* Filters access by the list of all the tag key names present in the request the user makes to the Secrets Manager service
*
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-tagkeys
*
* Applies to actions:
* - .toCreateSecret()
* - .toTagResource()
* - .toUntagResource()
*
* Applies to resource types:
* - Secret
*
* @param value The value(s) to check
* @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike`
*/
ifAwsTagKeys(value, operator) {
return this.if(`aws:TagKeys`, value, operator ?? 'StringLike');
}
/**
* Filters access by the list of Regions in which to replicate the secret
*
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html
*
* Applies to actions:
* - .toCreateSecret()
* - .toReplicateSecretToRegions()
*
* @param value The value(s) to check
* @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike`
*/
ifAddReplicaRegions(value, operator) {
return this.if(`AddReplicaRegions`, value, operator ?? 'StringLike');
}
/**
* Filters access by whether the resource policy blocks broad AWS account access
*
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html
*
* Applies to actions:
* - .toPutResourcePolicy()
*
* @param value `true` or `false`. **Default:** `true`
*/
ifBlockPublicPolicy(value) {
return this.if(`BlockPublicPolicy`, (typeof value !== 'undefined' ? value : true), 'Bool');
}
/**
* Filters access by the description text in the request
*
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html
*
* Applies to actions:
* - .toCreateSecret()
* - .toUpdateSecret()
*
* @param value The value(s) to check
* @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike`
*/
ifDescription(value, operator) {
return this.if(`Description`, value, operator ?? 'StringLike');
}
/**
* Filters access by the managed external secret rotation role ARN in the request
*
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html
*
* Applies to actions:
* - .toRotateSecret()
*
* @param value The value(s) to check
* @param operator Works with [arn operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_ARN). **Default:** `ArnLike`
*/
ifExternalSecretRotationRoleArn(value, operator) {
return this.if(`ExternalSecretRotationRoleArn`, value, operator ?? 'ArnLike');
}
/**
* Filters access by whether the secret is to be deleted immediately without any recovery window
*
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html
*
* Applies to actions:
* - .toDeleteSecret()
*
* @param value `true` or `false`. **Default:** `true`
*/
ifForceDeleteWithoutRecovery(value) {
return this.if(`ForceDeleteWithoutRecovery`, (typeof value !== 'undefined' ? value : true), 'Bool');
}
/**
* Filters access by whether to overwrite a secret with the same name in the destination Region
*
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html
*
* Applies to actions:
* - .toCreateSecret()
* - .toReplicateSecretToRegions()
*
* @param value `true` or `false`. **Default:** `true`
*/
ifForceOverwriteReplicaSecret(value) {
return this.if(`ForceOverwriteReplicaSecret`, (typeof value !== 'undefined' ? value : true), 'Bool');
}
/**
* Filters access by the key ARN of the KMS key in the request
*
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html
*
* Applies to actions:
* - .toCreateSecret()
* - .toUpdateSecret()
*
* @param value The value(s) to check
* @param operator Works with [arn operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_ARN). **Default:** `ArnLike`
*/
ifKmsKeyArn(value, operator) {
return this.if(`KmsKeyArn`, value, operator ?? 'ArnLike');
}
/**
* Filters access by the key identifier of the KMS key in the request. Deprecated: Use secretsmanager:KmsKeyArn
*
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html
*
* Applies to actions:
* - .toCreateSecret()
* - .toUpdateSecret()
*
* @param value The value(s) to check
* @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike`
*/
ifKmsKeyId(value, operator) {
return this.if(`KmsKeyId`, value, operator ?? 'StringLike');
}
/**
* Filters access by whether the rotation rules of the secret are to be modified
*
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html
*
* Applies to actions:
* - .toRotateSecret()
*
* @param value `true` or `false`. **Default:** `true`
*/
ifModifyRotationRules(value) {
return this.if(`ModifyRotationRules`, (typeof value !== 'undefined' ? value : true), 'Bool');
}
/**
* Filters access by the friendly name of the secret in the request
*
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html
*
* Applies to actions:
* - .toCreateSecret()
*
* @param value The value(s) to check
* @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike`
*/
ifName(value, operator) {
return this.if(`Name`, value, operator ?? 'StringLike');
}
/**
* Filters access by the number of days that Secrets Manager waits before it can delete the secret
*
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html
*
* Applies to actions:
* - .toDeleteSecret()
*
* @param value The value(s) to check
* @param operator Works with [numeric operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_Numeric). **Default:** `NumericEquals`
*/
ifRecoveryWindowInDays(value, operator) {
return this.if(`RecoveryWindowInDays`, value, operator ?? 'NumericEquals');
}
/**
* Filters access by a tag key and value pair
*
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html
*
* Applies to actions:
* - .toCancelRotateSecret()
* - .toCreateSecret()
* - .toDeleteResourcePolicy()
* - .toDeleteSecret()
* - .toDescribeSecret()
* - .toGetResourcePolicy()
* - .toGetSecretValue()
* - .toListSecretVersionIds()
* - .toPutResourcePolicy()
* - .toPutSecretValue()
* - .toRemoveRegionsFromReplication()
* - .toReplicateSecretToRegions()
* - .toRestoreSecret()
* - .toRotateSecret()
* - .toStopReplicationToReplica()
* - .toTagResource()
* - .toUntagResource()
* - .toUpdateSecret()
* - .toUpdateSecretVersionStage()
* - .toValidateResourcePolicy()
*
* Applies to resource types:
* - Secret
*
* @param tagKey The tag key to check
* @param value The value(s) to check
* @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike`
*/
ifResourceTag(tagKey, value, operator) {
return this.if(`ResourceTag/${tagKey}`, value, operator ?? 'StringLike');
}
/**
* Filters access by whether the secret is to be rotated immediately
*
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html
*
* Applies to actions:
* - .toRotateSecret()
*
* @param value `true` or `false`. **Default:** `true`
*/
ifRotateImmediately(value) {
return this.if(`RotateImmediately`, (typeof value !== 'undefined' ? value : true), 'Bool');
}
/**
* Filters access by the ARN of the rotation Lambda function in the request
*
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html
*
* Applies to actions:
* - .toRotateSecret()
*
* @param value The value(s) to check
* @param operator Works with [arn operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_ARN). **Default:** `ArnLike`
*/
ifRotationLambdaARN(value, operator) {
return this.if(`RotationLambdaARN`, value, operator ?? 'ArnLike');
}
/**
* Filters access by the SecretID value in the request
*
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html
*
* Applies to actions:
* - .toCancelRotateSecret()
* - .toDeleteResourcePolicy()
* - .toDeleteSecret()
* - .toDescribeSecret()
* - .toGetResourcePolicy()
* - .toGetSecretValue()
* - .toListSecretVersionIds()
* - .toPutResourcePolicy()
* - .toPutSecretValue()
* - .toRemoveRegionsFromReplication()
* - .toReplicateSecretToRegions()
* - .toRestoreSecret()
* - .toRotateSecret()
* - .toStopReplicationToReplica()
* - .toTagResource()
* - .toUntagResource()
* - .toUpdateSecret()
* - .toUpdateSecretVersionStage()
* - .toValidateResourcePolicy()
*
* @param value The value(s) to check
* @param operator Works with [arn operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_ARN). **Default:** `ArnLike`
*/
ifSecretId(value, operator) {
return this.if(`SecretId`, value, operator ?? 'ArnLike');
}
/**
* Filters access by primary region in which the secret is created if the secret is a multi-Region secret
*
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html
*
* Applies to actions:
* - .toCancelRotateSecret()
* - .toDeleteResourcePolicy()
* - .toDeleteSecret()
* - .toDescribeSecret()
* - .toGetResourcePolicy()
* - .toGetSecretValue()
* - .toListSecretVersionIds()
* - .toPutResourcePolicy()
* - .toPutSecretValue()
* - .toRemoveRegionsFromReplication()
* - .toReplicateSecretToRegions()
* - .toRestoreSecret()
* - .toRotateSecret()
* - .toStopReplicationToReplica()
* - .toTagResource()
* - .toUntagResource()
* - .toUpdateSecret()
* - .toUpdateSecretVersionStage()
* - .toValidateResourcePolicy()
*
* @param value The value(s) to check
* @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike`
*/
ifSecretPrimaryRegion(value, operator) {
return this.if(`SecretPrimaryRegion`, value, operator ?? 'StringLike');
}
/**
* Filters access by the managed external secret type in the request
*
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html
*
* Applies to actions:
* - .toCreateSecret()
* - .toUpdateSecret()
*
* @param value The value(s) to check
* @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike`
*/
ifType(value, operator) {
return this.if(`Type`, value, operator ?? 'StringLike');
}
/**
* Filters access by the unique identifier of the version of the secret in the request
*
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html
*
* Applies to actions:
* - .toGetSecretValue()
*
* @param value The value(s) to check
* @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike`
*/
ifVersionId(value, operator) {
return this.if(`VersionId`, value, operator ?? 'StringLike');
}
/**
* Filters access by the list of version stages in the request
*
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html
*
* Applies to actions:
* - .toGetSecretValue()
* - .toUpdateSecretVersionStage()
*
* @param value The value(s) to check
* @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike`
*/
ifVersionStage(value, operator) {
return this.if(`VersionStage`, value, operator ?? 'StringLike');
}
/**
* Filters access by the ARN of the rotation Lambda function associated with the secret
*
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html
*
* Applies to actions:
* - .toCancelRotateSecret()
* - .toDeleteResourcePolicy()
* - .toDeleteSecret()
* - .toDescribeSecret()
* - .toGetResourcePolicy()
* - .toGetSecretValue()
* - .toListSecretVersionIds()
* - .toPutResourcePolicy()
* - .toPutSecretValue()
* - .toRemoveRegionsFromReplication()
* - .toReplicateSecretToRegions()
* - .toRestoreSecret()
* - .toRotateSecret()
* - .toStopReplicationToReplica()
* - .toTagResource()
* - .toUntagResource()
* - .toUpdateSecret()
* - .toUpdateSecretVersionStage()
* - .toValidateResourcePolicy()
*
* Applies to resource types:
* - Secret
*
* @param allowRotationLambdaArn The tag key to check
* @param value The value(s) to check
* @param operator Works with [arn operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_ARN). **Default:** `ArnLike`
*/
ifResource(allowRotationLambdaArn, value, operator) {
return this.if(`resource/${allowRotationLambdaArn}`, value, operator ?? 'ArnLike');
}
/**
* Filters access by the managed external secret type associated with the secret
*
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html
*
* Applies to actions:
* - .toCancelRotateSecret()
* - .toDeleteResourcePolicy()
* - .toDeleteSecret()
* - .toDescribeSecret()
* - .toGetResourcePolicy()
* - .toGetSecretValue()
* - .toListSecretVersionIds()
* - .toPutResourcePolicy()
* - .toPutSecretValue()
* - .toRemoveRegionsFromReplication()
* - .toReplicateSecretToRegions()
* - .toRestoreSecret()
* - .toRotateSecret()
* - .toStopReplicationToReplica()
* - .toTagResource()
* - .toUntagResource()
* - .toUpdateSecret()
* - .toUpdateSecretVersionStage()
* - .toValidateResourcePolicy()
*
* Applies to resource types:
* - Secret
*
* @param value The value(s) to check
* @param operator Works with [string operators](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition_operators.html#Conditions_String). **Default:** `StringLike`
*/
ifResourceType(value, operator) {
return this.if(`resource/Type`, value, operator ?? 'StringLike');
}
}
exports.Secretsmanager = Secretsmanager;
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"secretsmanager.js","sourceRoot":"","sources":["secretsmanager.ts"],"names":[],"mappings":";;;AACA,yCAAyD;AAEzD;;;;GAIG;AACH,MAAa,cAAe,SAAQ,wBAAe;IAGjD;;;;OAIG;IACH,YAAY,GAAY;QACtB,KAAK,CAAC,GAAG,CAAC,CAAC;QARN,kBAAa,GAAG,gBAAgB,CAAC;QAgc9B,oBAAe,GAAoB;YAC3C,IAAI,EAAE;gBACJ,qBAAqB;gBACrB,aAAa;aACd;YACD,KAAK,EAAE;gBACL,oBAAoB;gBACpB,cAAc;gBACd,cAAc;gBACd,gBAAgB;gBAChB,8BAA8B;gBAC9B,0BAA0B;gBAC1B,eAAe;gBACf,cAAc;gBACd,0BAA0B;gBAC1B,cAAc;gBACd,0BAA0B;aAC3B;YACD,wBAAwB,EAAE;gBACxB,sBAAsB;gBACtB,mBAAmB;gBACnB,wBAAwB;aACzB;YACD,IAAI,EAAE;gBACJ,gBAAgB;gBAChB,mBAAmB;gBACnB,mBAAmB;gBACnB,gBAAgB;gBAChB,sBAAsB;aACvB;YACD,OAAO,EAAE;gBACP,aAAa;gBACb,eAAe;aAChB;SACF,CAAC;IAzdF,CAAC;IAED;;;;;;OAMG;IACI,qBAAqB;QAC1B,OAAO,IAAI,CAAC,EAAE,CAAC,qBAAqB,CAAC,CAAC;IACxC,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACI,oBAAoB;QACzB,OAAO,IAAI,CAAC,EAAE,CAAC,oBAAoB,CAAC,CAAC;IACvC,CAAC;IAED;;;;;;;;;;;;;;;;;;;OAmBG;IACI,cAAc;QACnB,OAAO,IAAI,CAAC,EAAE,CAAC,cAAc,CAAC,CAAC;IACjC,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACI,sBAAsB;QAC3B,OAAO,IAAI,CAAC,EAAE,CAAC,sBAAsB,CAAC,CAAC;IACzC,CAAC;IAED;;;;;;;;;;;;;;;;OAgBG;IACI,cAAc;QACnB,OAAO,IAAI,CAAC,EAAE,CAAC,cAAc,CAAC,CAAC;IACjC,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACI,gBAAgB;QACrB,OAAO,IAAI,CAAC,EAAE,CAAC,gBAAgB,CAAC,CAAC;IACnC,CAAC;IAED;;;;;;OAMG;IACI,mBAAmB;QACxB,OAAO,IAAI,CAAC,EAAE,CAAC,mBAAmB,CAAC,CAAC;IACtC,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACI,mBAAmB;QACxB,OAAO,IAAI,CAAC,EAAE,CAAC,mBAAmB,CAAC,CAAC;IACtC,CAAC;IAED;;;;;;;;;;;;;;;;OAgBG;IACI,gBAAgB;QACrB,OAAO,IAAI,CAAC,EAAE,CAAC,gBAAgB,CAAC,CAAC;IACnC,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACI,sBAAsB;QAC3B,OAAO,IAAI,CAAC,EAAE,CAAC,sBAAsB,CAAC,CAAC;IACzC,CAAC;IAED;;;;;;OAMG;IACI,aAAa;QAClB,OAAO,IAAI,CAAC,EAAE,CAAC,aAAa,CAAC,CAAC;IAChC,CAAC;IAED;;;;;;;;;;;;;;;OAeG;IACI,mBAAmB;QACxB,OAAO,IAAI,CAAC,EAAE,CAAC,mBAAmB,CAAC,CAAC;IACtC,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACI,gBAAgB;QACrB,OAAO,IAAI,CAAC,EAAE,CAAC,gBAAgB,CAAC,CAAC;IACnC,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACI,8BAA8B;QACnC,OAAO,IAAI,CAAC,EAAE,CAAC,8BAA8B,CAAC,CAAC;IACjD,CAAC;IAED;;;;;;;;;;;;;;;;OAgBG;IACI,0BAA0B;QAC/B,OAAO,IAAI,CAAC,EAAE,CAAC,0BAA0B,CAAC,CAAC;IAC7C,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACI,eAAe;QACpB,OAAO,IAAI,CAAC,EAAE,CAAC,eAAe,CAAC,CAAC;IAClC,CAAC;IAED;;;;;;;;;;;;;;;;;;OAkBG;IACI,cAAc;QACnB,OAAO,IAAI,CAAC,EAAE,CAAC,cAAc,CAAC,CAAC;IACjC,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACI,0BAA0B;QAC/B,OAAO,IAAI,CAAC,EAAE,CAAC,0BAA0B,CAAC,CAAC;IAC7C,CAAC;IAED;;;;;;;;;;;;;;;;OAgBG;IACI,aAAa;QAClB,OAAO,IAAI,CAAC,EAAE,CAAC,aAAa,CAAC,CAAC;IAChC,CAAC;IAED;;;;;;;;;;;;;;;OAeG;IACI,eAAe;QACpB,OAAO,IAAI,CAAC,EAAE,CAAC,eAAe,CAAC,CAAC;IAClC,CAAC;IAED;;;;;;;;;;;;;;;;;;OAkBG;IACI,cAAc;QACnB,OAAO,IAAI,CAAC,EAAE,CAAC,cAAc,CAAC,CAAC;IACjC,CAAC;IAED;;;;;;;;;;;;;;;OAeG;IACI,0BAA0B;QAC/B,OAAO,IAAI,CAAC,EAAE,CAAC,0BAA0B,CAAC,CAAC;IAC7C,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACI,wBAAwB;QAC7B,OAAO,IAAI,CAAC,EAAE,CAAC,wBAAwB,CAAC,CAAC;IAC3C,CAAC;IAsCD;;;;;;;;;;;;;;;;;OAiBG;IACI,QAAQ,CAAC,QAAgB,EAAE,OAAgB,EAAE,MAAe,EAAE,SAAkB;QACrF,OAAO,IAAI,CAAC,EAAE,CAAC,OAAQ,SAAS,IAAI,IAAI,CAAC,gBAAiB,mBAAoB,MAAM,IAAI,IAAI,CAAC,aAAc,IAAK,OAAO,IAAI,IAAI,CAAC,cAAe,WAAY,QAAS,EAAE,CAAC,CAAC;IAC1K,CAAC;IAED;;;;;;;;;;;;;;;OAeG;IACI,eAAe,CAAC,MAAc,EAAE,KAAwB,EAAE,QAA4B;QAC3F,OAAO,IAAI,CAAC,EAAE,CAAC,kBAAmB,MAAO,EAAE,EAAE,KAAK,EAAE,QAAQ,IAAI,YAAY,CAAC,CAAC;IAChF,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OAiCG;IACI,gBAAgB,CAAC,MAAc,EAAE,KAAwB,EAAE,QAA4B;QAC5F,OAAO,IAAI,CAAC,EAAE,CAAC,mBAAoB,MAAO,EAAE,EAAE,KAAK,EAAE,QAAQ,IAAI,YAAY,CAAC,CAAC;IACjF,CAAC;IAED;;;;;;;;;;;;;;;OAeG;IACI,YAAY,CAAC,KAAwB,EAAE,QAA4B;QACxE,OAAO,IAAI,CAAC,EAAE,CAAC,aAAa,EAAE,KAAK,EAAE,QAAQ,IAAI,YAAY,CAAC,CAAC;IACjE,CAAC;IAED;;;;;;;;;;;OAWG;IACI,mBAAmB,CAAC,KAAwB,EAAE,QAA4B;QAC/E,OAAO,IAAI,CAAC,EAAE,CAAC,mBAAmB,EAAE,KAAK,EAAE,QAAQ,IAAI,YAAY,CAAC,CAAC;IACvE,CAAC;IAED;;;;;;;;;OASG;IACI,mBAAmB,CAAC,KAAe;QACxC,OAAO,IAAI,CAAC,EAAE,CAAC,mBAAmB,EAAE,CAAC,OAAO,KAAK,KAAK,WAAW,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,CAAC,EAAE,MAAM,CAAC,CAAC;IAC7F,CAAC;IAED;;;;;;;;;;;OAWG;IACI,aAAa,CAAC,KAAwB,EAAE,QAA4B;QACzE,OAAO,IAAI,CAAC,EAAE,CAAC,aAAa,EAAE,KAAK,EAAE,QAAQ,IAAI,YAAY,CAAC,CAAC;IACjE,CAAC;IAED;;;;;;;;;;OAUG;IACI,+BAA+B,CAAC,KAAwB,EAAE,QAA4B;QAC3F,OAAO,IAAI,CAAC,EAAE,CAAC,+BAA+B,EAAE,KAAK,EAAE,QAAQ,IAAI,SAAS,CAAC,CAAC;IAChF,CAAC;IAED;;;;;;;;;OASG;IACI,4BAA4B,CAAC,KAAe;QACjD,OAAO,IAAI,CAAC,EAAE,CAAC,4BAA4B,EAAE,CAAC,OAAO,KAAK,KAAK,WAAW,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,CAAC,EAAE,MAAM,CAAC,CAAC;IACtG,CAAC;IAED;;;;;;;;;;OAUG;IACI,6BAA6B,CAAC,KAAe;QAClD,OAAO,IAAI,CAAC,EAAE,CAAC,6BAA6B,EAAE,CAAC,OAAO,KAAK,KAAK,WAAW,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,CAAC,EAAE,MAAM,CAAC,CAAC;IACvG,CAAC;IAED;;;;;;;;;;;OAWG;IACI,WAAW,CAAC,KAAwB,EAAE,QAA4B;QACvE,OAAO,IAAI,CAAC,EAAE,CAAC,WAAW,EAAE,KAAK,EAAE,QAAQ,IAAI,SAAS,CAAC,CAAC;IAC5D,CAAC;IAED;;;;;;;;;;;OAWG;IACI,UAAU,CAAC,KAAwB,EAAE,QAA4B;QACtE,OAAO,IAAI,CAAC,EAAE,CAAC,UAAU,EAAE,KAAK,EAAE,QAAQ,IAAI,YAAY,CAAC,CAAC;IAC9D,CAAC;IAED;;;;;;;;;OASG;IACI,qBAAqB,CAAC,KAAe;QAC1C,OAAO,IAAI,CAAC,EAAE,CAAC,qBAAqB,EAAE,CAAC,OAAO,KAAK,KAAK,WAAW,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,CAAC,EAAE,MAAM,CAAC,CAAC;IAC/F,CAAC;IAED;;;;;;;;;;OAUG;IACI,MAAM,CAAC,KAAwB,EAAE,QAA4B;QAClE,OAAO,IAAI,CAAC,EAAE,CAAC,MAAM,EAAE,KAAK,EAAE,QAAQ,IAAI,YAAY,CAAC,CAAC;IAC1D,CAAC;IAED;;;;;;;;;;OAUG;IACI,sBAAsB,CAAC,KAAwB,EAAE,QAA4B;QAClF,OAAO,IAAI,CAAC,EAAE,CAAC,sBAAsB,EAAE,KAAK,EAAE,QAAQ,IAAI,eAAe,CAAC,CAAC;IAC7E,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OAiCG;IACI,aAAa,CAAC,MAAc,EAAE,KAAwB,EAAE,QAA4B;QACzF,OAAO,IAAI,CAAC,EAAE,CAAC,eAAgB,MAAO,EAAE,EAAE,KAAK,EAAE,QAAQ,IAAI,YAAY,CAAC,CAAC;IAC7E,CAAC;IAED;;;;;;;;;OASG;IACI,mBAAmB,CAAC,KAAe;QACxC,OAAO,IAAI,CAAC,EAAE,CAAC,mBAAmB,EAAE,CAAC,OAAO,KAAK,KAAK,WAAW,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,IAAI,CAAC,EAAE,MAAM,CAAC,CAAC;IAC7F,CAAC;IAED;;;;;;;;;;OAUG;IACI,mBAAmB,CAAC,KAAwB,EAAE,QAA4B;QAC/E,OAAO,IAAI,CAAC,EAAE,CAAC,mBAAmB,EAAE,KAAK,EAAE,QAAQ,IAAI,SAAS,CAAC,CAAC;IACpE,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA4BG;IACI,UAAU,CAAC,KAAwB,EAAE,QAA4B;QACtE,OAAO,IAAI,CAAC,EAAE,CAAC,UAAU,EAAE,KAAK,EAAE,QAAQ,IAAI,SAAS,CAAC,CAAC;IAC3D,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA4BG;IACI,qBAAqB,CAAC,KAAwB,EAAE,QAA4B;QACjF,OAAO,IAAI,CAAC,EAAE,CAAC,qBAAqB,EAAE,KAAK,EAAE,QAAQ,IAAI,YAAY,CAAC,CAAC;IACzE,CAAC;IAED;;;;;;;;;;;OAWG;IACI,MAAM,CAAC,KAAwB,EAAE,QAA4B;QAClE,OAAO,IAAI,CAAC,EAAE,CAAC,MAAM,EAAE,KAAK,EAAE,QAAQ,IAAI,YAAY,CAAC,CAAC;IAC1D,CAAC;IAED;;;;;;;;;;OAUG;IACI,WAAW,CAAC,KAAwB,EAAE,QAA4B;QACvE,OAAO,IAAI,CAAC,EAAE,CAAC,WAAW,EAAE,KAAK,EAAE,QAAQ,IAAI,YAAY,CAAC,CAAC;IAC/D,CAAC;IAED;;;;;;;;;;;OAWG;IACI,cAAc,CAAC,KAAwB,EAAE,QAA4B;QAC1E,OAAO,IAAI,CAAC,EAAE,CAAC,cAAc,EAAE,KAAK,EAAE,QAAQ,IAAI,YAAY,CAAC,CAAC;IAClE,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OAgCG;IACI,UAAU,CAAC,sBAA8B,EAAE,KAAwB,EAAE,QAA4B;QACtG,OAAO,IAAI,CAAC,EAAE,CAAC,YAAa,sBAAuB,EAAE,EAAE,KAAK,EAAE,QAAQ,IAAI,SAAS,CAAC,CAAC;IACvF,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA+BG;IACI,cAAc,CAAC,KAAwB,EAAE,QAA4B;QAC1E,OAAO,IAAI,CAAC,EAAE,CAAC,eAAe,EAAE,KAAK,EAAE,QAAQ,IAAI,YAAY,CAAC,CAAC;IACnE,CAAC;CACF;AA3+BD,wCA2+BC","sourcesContent":["import { AccessLevelList } from '../../shared/access-level';\nimport { PolicyStatement, Operator } from '../../shared';\n\n/**\n * Statement provider for service [secretsmanager](https://docs.aws.amazon.com/service-authorization/latest/reference/list_awssecretsmanager.html).\n *\n * @param sid [SID](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_sid.html) of the statement\n */\nexport class Secretsmanager extends PolicyStatement {\n  public servicePrefix = 'secretsmanager';\n\n  /**\n   * Statement provider for service [secretsmanager](https://docs.aws.amazon.com/service-authorization/latest/reference/list_awssecretsmanager.html).\n   *\n   * @param sid [SID](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_sid.html) of the statement\n   */\n  constructor(sid?: string) {\n    super(sid);\n  }\n\n  /**\n   * Grants permission to retrieve and decrypt a list of secrets\n   *\n   * Access Level: List\n   *\n   * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_BatchGetSecretValue.html\n   */\n  public toBatchGetSecretValue() {\n    return this.to('BatchGetSecretValue');\n  }\n\n  /**\n   * Grants permission to cancel an in-progress secret rotation\n   *\n   * Access Level: Write\n   *\n   * Possible conditions:\n   * - .ifSecretId()\n   * - .ifResource()\n   * - .ifResourceTag()\n   * - .ifAwsResourceTag()\n   * - .ifSecretPrimaryRegion()\n   * - .ifResourceType()\n   *\n   * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_CancelRotateSecret.html\n   */\n  public toCancelRotateSecret() {\n    return this.to('CancelRotateSecret');\n  }\n\n  /**\n   * Grants permission to create a secret that stores encrypted data that can be queried and rotated\n   *\n   * Access Level: Write\n   *\n   * Possible conditions:\n   * - .ifName()\n   * - .ifDescription()\n   * - .ifKmsKeyArn()\n   * - .ifKmsKeyId()\n   * - .ifAwsRequestTag()\n   * - .ifAwsResourceTag()\n   * - .ifAwsTagKeys()\n   * - .ifResourceTag()\n   * - .ifAddReplicaRegions()\n   * - .ifForceOverwriteReplicaSecret()\n   * - .ifType()\n   *\n   * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_CreateSecret.html\n   */\n  public toCreateSecret() {\n    return this.to('CreateSecret');\n  }\n\n  /**\n   * Grants permission to delete the resource policy attached to a secret\n   *\n   * Access Level: Permissions management\n   *\n   * Possible conditions:\n   * - .ifSecretId()\n   * - .ifResource()\n   * - .ifResourceTag()\n   * - .ifAwsResourceTag()\n   * - .ifSecretPrimaryRegion()\n   * - .ifResourceType()\n   *\n   * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_DeleteResourcePolicy.html\n   */\n  public toDeleteResourcePolicy() {\n    return this.to('DeleteResourcePolicy');\n  }\n\n  /**\n   * Grants permission to delete a secret\n   *\n   * Access Level: Write\n   *\n   * Possible conditions:\n   * - .ifSecretId()\n   * - .ifResource()\n   * - .ifRecoveryWindowInDays()\n   * - .ifForceDeleteWithoutRecovery()\n   * - .ifResourceTag()\n   * - .ifAwsResourceTag()\n   * - .ifSecretPrimaryRegion()\n   * - .ifResourceType()\n   *\n   * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_DeleteSecret.html\n   */\n  public toDeleteSecret() {\n    return this.to('DeleteSecret');\n  }\n\n  /**\n   * Grants permission to retrieve the metadata about a secret, but not the encrypted data\n   *\n   * Access Level: Read\n   *\n   * Possible conditions:\n   * - .ifSecretId()\n   * - .ifResource()\n   * - .ifResourceTag()\n   * - .ifAwsResourceTag()\n   * - .ifSecretPrimaryRegion()\n   * - .ifResourceType()\n   *\n   * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_DescribeSecret.html\n   */\n  public toDescribeSecret() {\n    return this.to('DescribeSecret');\n  }\n\n  /**\n   * Grants permission to generate a random string for use in password creation\n   *\n   * Access Level: Read\n   *\n   * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_GetRandomPassword.html\n   */\n  public toGetRandomPassword() {\n    return this.to('GetRandomPassword');\n  }\n\n  /**\n   * Grants permission to get the resource policy attached to a secret\n   *\n   * Access Level: Read\n   *\n   * Possible conditions:\n   * - .ifSecretId()\n   * - .ifResource()\n   * - .ifResourceTag()\n   * - .ifAwsResourceTag()\n   * - .ifSecretPrimaryRegion()\n   * - .ifResourceType()\n   *\n   * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_GetResourcePolicy.html\n   */\n  public toGetResourcePolicy() {\n    return this.to('GetResourcePolicy');\n  }\n\n  /**\n   * Grants permission to retrieve and decrypt the encrypted data\n   *\n   * Access Level: Read\n   *\n   * Possible conditions:\n   * - .ifSecretId()\n   * - .ifVersionId()\n   * - .ifVersionStage()\n   * - .ifResource()\n   * - .ifResourceTag()\n   * - .ifAwsResourceTag()\n   * - .ifSecretPrimaryRegion()\n   * - .ifResourceType()\n   *\n   * https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_GetSecretValue.html\n   */\n  public toGetSecretValue() {\n    return this.