From 2c06b57402ab6000a3f0e3c2085babac54aa2648 Mon Sep 17 00:00:00 2001 From: Christoffer Rehn <1280602+hoffa@users.noreply.github.com> Date: Fri, 26 May 2023 15:10:47 -0700 Subject: [PATCH] chore: bundle `aws-us-gov` AWS managed policies (#3189) --- .../internal/data/aws_managed_policies.json | 612 ++++++++++++++++++ .../managed_policies_everything.json | 8 +- .../aws-us-gov/managed_policies_minimal.json | 4 +- .../aws-us-gov/schema_validation_1.json | 4 +- 4 files changed, 620 insertions(+), 8 deletions(-) diff --git a/samtranslator/internal/data/aws_managed_policies.json b/samtranslator/internal/data/aws_managed_policies.json index 6618a5f0a..aa12a8051 100644 --- a/samtranslator/internal/data/aws_managed_policies.json +++ b/samtranslator/internal/data/aws_managed_policies.json @@ -1645,5 +1645,617 @@ "ViewOnlyAccess": "arn:aws-cn:iam::aws:policy/job-function/ViewOnlyAccess", "WAFRegionalLoggingServiceRolePolicy": "arn:aws-cn:iam::aws:policy/aws-service-role/WAFRegionalLoggingServiceRolePolicy", "WAFV2LoggingServiceRolePolicy": "arn:aws-cn:iam::aws:policy/aws-service-role/WAFV2LoggingServiceRolePolicy" + }, + "aws-us-gov": { + "APIGatewayServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/APIGatewayServiceRolePolicy", + "AWSAccountActivityAccess": "arn:aws-us-gov:iam::aws:policy/AWSAccountActivityAccess", + "AWSAccountUsageReportAccess": "arn:aws-us-gov:iam::aws:policy/AWSAccountUsageReportAccess", + "AWSAppMeshFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSAppMeshFullAccess", + "AWSAppMeshPreviewEnvoyAccess": "arn:aws-us-gov:iam::aws:policy/AWSAppMeshPreviewEnvoyAccess", + "AWSAppMeshReadOnly": "arn:aws-us-gov:iam::aws:policy/AWSAppMeshReadOnly", + "AWSAppSyncInvokeFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSAppSyncInvokeFullAccess", + "AWSApplicationAutoscalingAppStreamFleetPolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSApplicationAutoscalingAppStreamFleetPolicy", + "AWSApplicationAutoscalingCassandraTablePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSApplicationAutoscalingCassandraTablePolicy", + "AWSApplicationAutoscalingComprehendEndpointPolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSApplicationAutoscalingComprehendEndpointPolicy", + "AWSApplicationAutoscalingDynamoDBTablePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSApplicationAutoscalingDynamoDBTablePolicy", + "AWSApplicationAutoscalingEC2SpotFleetRequestPolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSApplicationAutoscalingEC2SpotFleetRequestPolicy", + "AWSApplicationAutoscalingECSServicePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSApplicationAutoscalingECSServicePolicy", + "AWSApplicationAutoscalingEMRInstanceGroupPolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSApplicationAutoscalingEMRInstanceGroupPolicy", + "AWSApplicationAutoscalingKafkaClusterPolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSApplicationAutoscalingKafkaClusterPolicy", + "AWSApplicationAutoscalingLambdaConcurrencyPolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSApplicationAutoscalingLambdaConcurrencyPolicy", + "AWSApplicationAutoscalingNeptuneClusterPolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSApplicationAutoscalingNeptuneClusterPolicy", + "AWSApplicationAutoscalingRDSClusterPolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSApplicationAutoscalingRDSClusterPolicy", + "AWSApplicationAutoscalingSageMakerEndpointPolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSApplicationAutoscalingSageMakerEndpointPolicy", + "AWSArtifactAccountSync": "arn:aws-us-gov:iam::aws:policy/service-role/AWSArtifactAccountSync", + "AWSBackupAuditAccess": "arn:aws-us-gov:iam::aws:policy/AWSBackupAuditAccess", + "AWSBackupDataTransferAccess": "arn:aws-us-gov:iam::aws:policy/AWSBackupDataTransferAccess", + "AWSBackupFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSBackupFullAccess", + "AWSBackupGatewayServiceRolePolicyForVirtualMachineMetadataSync": "arn:aws-us-gov:iam::aws:policy/service-role/AWSBackupGatewayServiceRolePolicyForVirtualMachineMetadataSync", + "AWSBackupOperatorAccess": "arn:aws-us-gov:iam::aws:policy/AWSBackupOperatorAccess", + "AWSBackupOrganizationAdminAccess": "arn:aws-us-gov:iam::aws:policy/AWSBackupOrganizationAdminAccess", + "AWSBackupRestoreAccessForSAPHANA": "arn:aws-us-gov:iam::aws:policy/AWSBackupRestoreAccessForSAPHANA", + "AWSBackupServiceLinkedRolePolicyForBackup": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSBackupServiceLinkedRolePolicyForBackup", + "AWSBackupServiceRolePolicyForBackup": "arn:aws-us-gov:iam::aws:policy/service-role/AWSBackupServiceRolePolicyForBackup", + "AWSBackupServiceRolePolicyForRestores": "arn:aws-us-gov:iam::aws:policy/service-role/AWSBackupServiceRolePolicyForRestores", + "AWSBackupServiceRolePolicyForS3Backup": "arn:aws-us-gov:iam::aws:policy/AWSBackupServiceRolePolicyForS3Backup", + "AWSBackupServiceRolePolicyForS3Restore": "arn:aws-us-gov:iam::aws:policy/AWSBackupServiceRolePolicyForS3Restore", + "AWSBatchFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSBatchFullAccess", + "AWSBatchServiceEventTargetRole": "arn:aws-us-gov:iam::aws:policy/service-role/AWSBatchServiceEventTargetRole", + "AWSBatchServiceRole": "arn:aws-us-gov:iam::aws:policy/service-role/AWSBatchServiceRole", + "AWSBillingReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSBillingReadOnlyAccess", + "AWSCertificateManagerFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSCertificateManagerFullAccess", + "AWSCertificateManagerPrivateCAAuditor": "arn:aws-us-gov:iam::aws:policy/AWSCertificateManagerPrivateCAAuditor", + "AWSCertificateManagerPrivateCAFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSCertificateManagerPrivateCAFullAccess", + "AWSCertificateManagerPrivateCAPrivilegedUser": "arn:aws-us-gov:iam::aws:policy/AWSCertificateManagerPrivateCAPrivilegedUser", + "AWSCertificateManagerPrivateCAReadOnly": "arn:aws-us-gov:iam::aws:policy/AWSCertificateManagerPrivateCAReadOnly", + "AWSCertificateManagerPrivateCAUser": "arn:aws-us-gov:iam::aws:policy/AWSCertificateManagerPrivateCAUser", + "AWSCertificateManagerReadOnly": "arn:aws-us-gov:iam::aws:policy/AWSCertificateManagerReadOnly", + "AWSCloudFormationFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSCloudFormationFullAccess", + "AWSCloudFormationReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSCloudFormationReadOnlyAccess", + "AWSCloudHSMFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSCloudHSMFullAccess", + "AWSCloudHSMReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSCloudHSMReadOnlyAccess", + "AWSCloudHSMRole": "arn:aws-us-gov:iam::aws:policy/service-role/AWSCloudHSMRole", + "AWSCloudMapDiscoverInstanceAccess": "arn:aws-us-gov:iam::aws:policy/AWSCloudMapDiscoverInstanceAccess", + "AWSCloudMapFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSCloudMapFullAccess", + "AWSCloudMapReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSCloudMapReadOnlyAccess", + "AWSCloudMapRegisterInstanceAccess": "arn:aws-us-gov:iam::aws:policy/AWSCloudMapRegisterInstanceAccess", + "AWSCloudShellFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSCloudShellFullAccess", + "AWSCloudTrail_FullAccess": "arn:aws-us-gov:iam::aws:policy/AWSCloudTrail_FullAccess", + "AWSCloudTrail_ReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSCloudTrail_ReadOnlyAccess", + "AWSCloudWatchAlarms_ActionSSMIncidentsServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSCloudWatchAlarms_ActionSSMIncidentsServiceRolePolicy", + "AWSCodeBuildAdminAccess": "arn:aws-us-gov:iam::aws:policy/AWSCodeBuildAdminAccess", + "AWSCodeBuildDeveloperAccess": "arn:aws-us-gov:iam::aws:policy/AWSCodeBuildDeveloperAccess", + "AWSCodeBuildReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSCodeBuildReadOnlyAccess", + "AWSCodeCommitFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSCodeCommitFullAccess", + "AWSCodeCommitPowerUser": "arn:aws-us-gov:iam::aws:policy/AWSCodeCommitPowerUser", + "AWSCodeCommitReadOnly": "arn:aws-us-gov:iam::aws:policy/AWSCodeCommitReadOnly", + "AWSCodeDeployDeployerAccess": "arn:aws-us-gov:iam::aws:policy/AWSCodeDeployDeployerAccess", + "AWSCodeDeployFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSCodeDeployFullAccess", + "AWSCodeDeployReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSCodeDeployReadOnlyAccess", + "AWSCodeDeployRole": "arn:aws-us-gov:iam::aws:policy/service-role/AWSCodeDeployRole", + "AWSCodeDeployRoleForCloudFormation": "arn:aws-us-gov:iam::aws:policy/service-role/AWSCodeDeployRoleForCloudFormation", + "AWSCodeDeployRoleForECS": "arn:aws-us-gov:iam::aws:policy/AWSCodeDeployRoleForECS", + "AWSCodeDeployRoleForECSLimited": "arn:aws-us-gov:iam::aws:policy/AWSCodeDeployRoleForECSLimited", + "AWSCodeDeployRoleForLambda": "arn:aws-us-gov:iam::aws:policy/service-role/AWSCodeDeployRoleForLambda", + "AWSCodeDeployRoleForLambdaLimited": "arn:aws-us-gov:iam::aws:policy/service-role/AWSCodeDeployRoleForLambdaLimited", + "AWSCodePipelineApproverAccess": "arn:aws-us-gov:iam::aws:policy/AWSCodePipelineApproverAccess", + "AWSCodePipelineCustomActionAccess": "arn:aws-us-gov:iam::aws:policy/AWSCodePipelineCustomActionAccess", + "AWSCodePipeline_FullAccess": "arn:aws-us-gov:iam::aws:policy/AWSCodePipeline_FullAccess", + "AWSCodePipeline_ReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSCodePipeline_ReadOnlyAccess", + "AWSConfigMultiAccountSetupPolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSConfigMultiAccountSetupPolicy", + "AWSConfigRemediationServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSConfigRemediationServiceRolePolicy", + "AWSConfigRole": "arn:aws-us-gov:iam::aws:policy/service-role/AWSConfigRole", + "AWSConfigRoleForOrganizations": "arn:aws-us-gov:iam::aws:policy/service-role/AWSConfigRoleForOrganizations", + "AWSConfigRulesExecutionRole": "arn:aws-us-gov:iam::aws:policy/service-role/AWSConfigRulesExecutionRole", + "AWSConfigServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSConfigServiceRolePolicy", + "AWSConfigUserAccess": "arn:aws-us-gov:iam::aws:policy/AWSConfigUserAccess", + "AWSControlTowerServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/service-role/AWSControlTowerServiceRolePolicy", + "AWSDataExchangeFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSDataExchangeFullAccess", + "AWSDataExchangeProviderFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSDataExchangeProviderFullAccess", + "AWSDataExchangeSubscriberFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSDataExchangeSubscriberFullAccess", + "AWSDataLifecycleManagerServiceRole": "arn:aws-us-gov:iam::aws:policy/service-role/AWSDataLifecycleManagerServiceRole", + "AWSDataLifecycleManagerServiceRoleForAMIManagement": "arn:aws-us-gov:iam::aws:policy/service-role/AWSDataLifecycleManagerServiceRoleForAMIManagement", + "AWSDataPipelineRole": "arn:aws-us-gov:iam::aws:policy/service-role/AWSDataPipelineRole", + "AWSDataPipeline_FullAccess": "arn:aws-us-gov:iam::aws:policy/AWSDataPipeline_FullAccess", + "AWSDataPipeline_PowerUser": "arn:aws-us-gov:iam::aws:policy/AWSDataPipeline_PowerUser", + "AWSDataSyncFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSDataSyncFullAccess", + "AWSDataSyncReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSDataSyncReadOnlyAccess", + "AWSDeepLensServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/service-role/AWSDeepLensServiceRolePolicy", + "AWSDeepRacerAccountAdminAccess": "arn:aws-us-gov:iam::aws:policy/AWSDeepRacerAccountAdminAccess", + "AWSDeepRacerDefaultMultiUserAccess": "arn:aws-us-gov:iam::aws:policy/AWSDeepRacerDefaultMultiUserAccess", + "AWSDirectConnectFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSDirectConnectFullAccess", + "AWSDirectConnectReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSDirectConnectReadOnlyAccess", + "AWSDirectConnectServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSDirectConnectServiceRolePolicy", + "AWSDirectoryServiceFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSDirectoryServiceFullAccess", + "AWSDirectoryServiceReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSDirectoryServiceReadOnlyAccess", + "AWSEC2FleetServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSEC2FleetServiceRolePolicy", + "AWSEC2SpotFleetServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSEC2SpotFleetServiceRolePolicy", + "AWSElasticBeanstalkCustomPlatformforEC2Role": "arn:aws-us-gov:iam::aws:policy/AWSElasticBeanstalkCustomPlatformforEC2Role", + "AWSElasticBeanstalkEnhancedHealth": "arn:aws-us-gov:iam::aws:policy/service-role/AWSElasticBeanstalkEnhancedHealth", + "AWSElasticBeanstalkMaintenance": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSElasticBeanstalkMaintenance", + "AWSElasticBeanstalkManagedUpdatesCustomerRolePolicy": "arn:aws-us-gov:iam::aws:policy/AWSElasticBeanstalkManagedUpdatesCustomerRolePolicy", + "AWSElasticBeanstalkManagedUpdatesServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSElasticBeanstalkManagedUpdatesServiceRolePolicy", + "AWSElasticBeanstalkMulticontainerDocker": "arn:aws-us-gov:iam::aws:policy/AWSElasticBeanstalkMulticontainerDocker", + "AWSElasticBeanstalkReadOnly": "arn:aws-us-gov:iam::aws:policy/AWSElasticBeanstalkReadOnly", + "AWSElasticBeanstalkRoleCWL": "arn:aws-us-gov:iam::aws:policy/service-role/AWSElasticBeanstalkRoleCWL", + "AWSElasticBeanstalkRoleCore": "arn:aws-us-gov:iam::aws:policy/service-role/AWSElasticBeanstalkRoleCore", + "AWSElasticBeanstalkRoleECS": "arn:aws-us-gov:iam::aws:policy/service-role/AWSElasticBeanstalkRoleECS", + "AWSElasticBeanstalkRoleRDS": "arn:aws-us-gov:iam::aws:policy/service-role/AWSElasticBeanstalkRoleRDS", + "AWSElasticBeanstalkRoleSNS": "arn:aws-us-gov:iam::aws:policy/service-role/AWSElasticBeanstalkRoleSNS", + "AWSElasticBeanstalkRoleWorkerTier": "arn:aws-us-gov:iam::aws:policy/service-role/AWSElasticBeanstalkRoleWorkerTier", + "AWSElasticBeanstalkService": "arn:aws-us-gov:iam::aws:policy/service-role/AWSElasticBeanstalkService", + "AWSElasticBeanstalkServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSElasticBeanstalkServiceRolePolicy", + "AWSElasticBeanstalkWebTier": "arn:aws-us-gov:iam::aws:policy/AWSElasticBeanstalkWebTier", + "AWSElasticBeanstalkWorkerTier": "arn:aws-us-gov:iam::aws:policy/AWSElasticBeanstalkWorkerTier", + "AWSElasticDisasterRecoveryRecoveryInstancePolicy": "arn:aws-us-gov:iam::aws:policy/service-role/AWSElasticDisasterRecoveryRecoveryInstancePolicy", + "AWSElasticLoadBalancingClassicServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSElasticLoadBalancingClassicServiceRolePolicy", + "AWSElasticLoadBalancingServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSElasticLoadBalancingServiceRolePolicy", + "AWSElementalMediaPackageFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSElementalMediaPackageFullAccess", + "AWSElementalMediaPackageReadOnly": "arn:aws-us-gov:iam::aws:policy/AWSElementalMediaPackageReadOnly", + "AWSFMAdminFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSFMAdminFullAccess", + "AWSFMAdminReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSFMAdminReadOnlyAccess", + "AWSFMMemberReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSFMMemberReadOnlyAccess", + "AWSFaultInjectionSimulatorEC2Access": "arn:aws-us-gov:iam::aws:policy/service-role/AWSFaultInjectionSimulatorEC2Access", + "AWSFaultInjectionSimulatorECSAccess": "arn:aws-us-gov:iam::aws:policy/service-role/AWSFaultInjectionSimulatorECSAccess", + "AWSFaultInjectionSimulatorEKSAccess": "arn:aws-us-gov:iam::aws:policy/service-role/AWSFaultInjectionSimulatorEKSAccess", + "AWSFaultInjectionSimulatorNetworkAccess": "arn:aws-us-gov:iam::aws:policy/service-role/AWSFaultInjectionSimulatorNetworkAccess", + "AWSFaultInjectionSimulatorRDSAccess": "arn:aws-us-gov:iam::aws:policy/service-role/AWSFaultInjectionSimulatorRDSAccess", + "AWSFaultInjectionSimulatorSSMAccess": "arn:aws-us-gov:iam::aws:policy/service-role/AWSFaultInjectionSimulatorSSMAccess", + "AWSForWordPressPluginPolicy": "arn:aws-us-gov:iam::aws:policy/AWSForWordPressPluginPolicy", + "AWSGlueConsoleFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSGlueConsoleFullAccess", + "AWSGlueConsoleSageMakerNotebookFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSGlueConsoleSageMakerNotebookFullAccess", + "AWSGlueDataBrewServiceRole": "arn:aws-us-gov:iam::aws:policy/service-role/AWSGlueDataBrewServiceRole", + "AWSGlueSchemaRegistryFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSGlueSchemaRegistryFullAccess", + "AWSGlueSchemaRegistryReadonlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSGlueSchemaRegistryReadonlyAccess", + "AWSGlueServiceNotebookRole": "arn:aws-us-gov:iam::aws:policy/service-role/AWSGlueServiceNotebookRole", + "AWSGlueServiceRole": "arn:aws-us-gov:iam::aws:policy/service-role/AWSGlueServiceRole", + "AWSGreengrassFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSGreengrassFullAccess", + "AWSGreengrassReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSGreengrassReadOnlyAccess", + "AWSGreengrassResourceAccessRolePolicy": "arn:aws-us-gov:iam::aws:policy/service-role/AWSGreengrassResourceAccessRolePolicy", + "AWSIPAMServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSIPAMServiceRolePolicy", + "AWSIdentitySyncFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSIdentitySyncFullAccess", + "AWSIdentitySyncReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSIdentitySyncReadOnlyAccess", + "AWSImageBuilderFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSImageBuilderFullAccess", + "AWSImageBuilderReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSImageBuilderReadOnlyAccess", + "AWSIoTConfigAccess": "arn:aws-us-gov:iam::aws:policy/AWSIoTConfigAccess", + "AWSIoTConfigReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSIoTConfigReadOnlyAccess", + "AWSIoTDataAccess": "arn:aws-us-gov:iam::aws:policy/AWSIoTDataAccess", + "AWSIoTDeviceDefenderAddThingsToThingGroupMitigationAction": "arn:aws-us-gov:iam::aws:policy/service-role/AWSIoTDeviceDefenderAddThingsToThingGroupMitigationAction", + "AWSIoTDeviceDefenderAudit": "arn:aws-us-gov:iam::aws:policy/service-role/AWSIoTDeviceDefenderAudit", + "AWSIoTDeviceDefenderEnableIoTLoggingMitigationAction": "arn:aws-us-gov:iam::aws:policy/service-role/AWSIoTDeviceDefenderEnableIoTLoggingMitigationAction", + "AWSIoTDeviceDefenderPublishFindingsToSNSMitigationAction": "arn:aws-us-gov:iam::aws:policy/service-role/AWSIoTDeviceDefenderPublishFindingsToSNSMitigationAction", + "AWSIoTDeviceDefenderReplaceDefaultPolicyMitigationAction": "arn:aws-us-gov:iam::aws:policy/service-role/AWSIoTDeviceDefenderReplaceDefaultPolicyMitigationAction", + "AWSIoTDeviceDefenderUpdateCACertMitigationAction": "arn:aws-us-gov:iam::aws:policy/service-role/AWSIoTDeviceDefenderUpdateCACertMitigationAction", + "AWSIoTDeviceDefenderUpdateDeviceCertMitigationAction": "arn:aws-us-gov:iam::aws:policy/service-role/AWSIoTDeviceDefenderUpdateDeviceCertMitigationAction", + "AWSIoTDeviceTesterForGreengrassFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSIoTDeviceTesterForGreengrassFullAccess", + "AWSIoTFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSIoTFullAccess", + "AWSIoTLogging": "arn:aws-us-gov:iam::aws:policy/service-role/AWSIoTLogging", + "AWSIoTSiteWiseReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSIoTSiteWiseReadOnlyAccess", + "AWSIoTThingsRegistration": "arn:aws-us-gov:iam::aws:policy/service-role/AWSIoTThingsRegistration", + "AWSKeyManagementServiceCustomKeyStoresServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSKeyManagementServiceCustomKeyStoresServiceRolePolicy", + "AWSKeyManagementServiceMultiRegionKeysServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSKeyManagementServiceMultiRegionKeysServiceRolePolicy", + "AWSKeyManagementServicePowerUser": "arn:aws-us-gov:iam::aws:policy/AWSKeyManagementServicePowerUser", + "AWSLakeFormationCrossAccountManager": "arn:aws-us-gov:iam::aws:policy/AWSLakeFormationCrossAccountManager", + "AWSLakeFormationDataAdmin": "arn:aws-us-gov:iam::aws:policy/AWSLakeFormationDataAdmin", + "AWSLambdaBasicExecutionRole": "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", + "AWSLambdaDynamoDBExecutionRole": "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaDynamoDBExecutionRole", + "AWSLambdaENIManagementAccess": "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaENIManagementAccess", + "AWSLambdaExecute": "arn:aws-us-gov:iam::aws:policy/AWSLambdaExecute", + "AWSLambdaFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSLambdaFullAccess", + "AWSLambdaInvocation-DynamoDB": "arn:aws-us-gov:iam::aws:policy/AWSLambdaInvocation-DynamoDB", + "AWSLambdaKinesisExecutionRole": "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaKinesisExecutionRole", + "AWSLambdaMSKExecutionRole": "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaMSKExecutionRole", + "AWSLambdaReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSLambdaReadOnlyAccess", + "AWSLambdaRole": "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaRole", + "AWSLambdaSQSExecutionRole": "arn:aws-us-gov:iam::aws:policy/AWSLambdaSQSExecutionRole", + "AWSLambdaSQSQueueExecutionRole": "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaSQSQueueExecutionRole", + "AWSLambdaVPCAccessExecutionRole": "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole", + "AWSLambda_FullAccess": "arn:aws-us-gov:iam::aws:policy/AWSLambda_FullAccess", + "AWSLambda_ReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSLambda_ReadOnlyAccess", + "AWSLicenseManagerConsumptionPolicy": "arn:aws-us-gov:iam::aws:policy/service-role/AWSLicenseManagerConsumptionPolicy", + "AWSLicenseManagerLinuxSubscriptionsServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSLicenseManagerLinuxSubscriptionsServiceRolePolicy", + "AWSLicenseManagerMasterAccountRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSLicenseManagerMasterAccountRolePolicy", + "AWSLicenseManagerMemberAccountRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSLicenseManagerMemberAccountRolePolicy", + "AWSLicenseManagerServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSLicenseManagerServiceRolePolicy", + "AWSManagedServicesDeploymentToolkitPolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSManagedServicesDeploymentToolkitPolicy", + "AWSManagedServices_ContactsServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSManagedServices_ContactsServiceRolePolicy", + "AWSManagedServices_EventsServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSManagedServices_EventsServiceRolePolicy", + "AWSMarketplaceAmiIngestion": "arn:aws-us-gov:iam::aws:policy/AWSMarketplaceAmiIngestion", + "AWSMarketplaceFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSMarketplaceFullAccess", + "AWSMarketplaceMeteringFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSMarketplaceMeteringFullAccess", + "AWSMarketplaceSellerFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSMarketplaceSellerFullAccess", + "AWSMarketplaceSellerProductsFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSMarketplaceSellerProductsFullAccess", + "AWSMarketplaceSellerProductsReadOnly": "arn:aws-us-gov:iam::aws:policy/AWSMarketplaceSellerProductsReadOnly", + "AWSMobileHub_FullAccess": "arn:aws-us-gov:iam::aws:policy/AWSMobileHub_FullAccess", + "AWSMobileHub_ReadOnly": "arn:aws-us-gov:iam::aws:policy/AWSMobileHub_ReadOnly", + "AWSNetworkFirewallServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSNetworkFirewallServiceRolePolicy", + "AWSNetworkManagerFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSNetworkManagerFullAccess", + "AWSNetworkManagerReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSNetworkManagerReadOnlyAccess", + "AWSNetworkManagerServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSNetworkManagerServiceRolePolicy", + "AWSOpsWorksCMInstanceProfileRole": "arn:aws-us-gov:iam::aws:policy/AWSOpsWorksCMInstanceProfileRole", + "AWSOpsWorksCMServiceRole": "arn:aws-us-gov:iam::aws:policy/service-role/AWSOpsWorksCMServiceRole", + "AWSOrganizationsFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSOrganizationsFullAccess", + "AWSOrganizationsReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSOrganizationsReadOnlyAccess", + "AWSOrganizationsServiceTrustPolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSOrganizationsServiceTrustPolicy", + "AWSOutpostsServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSOutpostsServiceRolePolicy", + "AWSPrivateCAAuditor": "arn:aws-us-gov:iam::aws:policy/AWSPrivateCAAuditor", + "AWSPrivateCAFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSPrivateCAFullAccess", + "AWSPrivateCAPrivilegedUser": "arn:aws-us-gov:iam::aws:policy/AWSPrivateCAPrivilegedUser", + "AWSPrivateCAReadOnly": "arn:aws-us-gov:iam::aws:policy/AWSPrivateCAReadOnly", + "AWSPrivateCAUser": "arn:aws-us-gov:iam::aws:policy/AWSPrivateCAUser", + "AWSPrivateMarketplaceAdminFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSPrivateMarketplaceAdminFullAccess", + "AWSProtonCodeBuildProvisioningBasicAccess": "arn:aws-us-gov:iam::aws:policy/AWSProtonCodeBuildProvisioningBasicAccess", + "AWSQuickSightDescribeRDS": "arn:aws-us-gov:iam::aws:policy/service-role/AWSQuickSightDescribeRDS", + "AWSQuickSightDescribeRedshift": "arn:aws-us-gov:iam::aws:policy/service-role/AWSQuickSightDescribeRedshift", + "AWSQuickSightElasticsearchPolicy": "arn:aws-us-gov:iam::aws:policy/service-role/AWSQuickSightElasticsearchPolicy", + "AWSQuickSightListIAM": "arn:aws-us-gov:iam::aws:policy/service-role/AWSQuickSightListIAM", + "AWSQuickSightSageMakerPolicy": "arn:aws-us-gov:iam::aws:policy/service-role/AWSQuickSightSageMakerPolicy", + "AWSQuickSightTimestreamPolicy": "arn:aws-us-gov:iam::aws:policy/service-role/AWSQuickSightTimestreamPolicy", + "AWSQuicksightAthenaAccess": "arn:aws-us-gov:iam::aws:policy/service-role/AWSQuicksightAthenaAccess", + "AWSQuicksightOpenSearchPolicy": "arn:aws-us-gov:iam::aws:policy/service-role/AWSQuicksightOpenSearchPolicy", + "AWSResourceAccessManagerFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSResourceAccessManagerFullAccess", + "AWSResourceAccessManagerReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSResourceAccessManagerReadOnlyAccess", + "AWSResourceAccessManagerResourceShareParticipantAccess": "arn:aws-us-gov:iam::aws:policy/AWSResourceAccessManagerResourceShareParticipantAccess", + "AWSResourceAccessManagerServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSResourceAccessManagerServiceRolePolicy", + "AWSResourceGroupsReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSResourceGroupsReadOnlyAccess", + "AWSRoboMakerInternalServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSRoboMakerInternalServiceRolePolicy", + "AWSRoboMakerReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSRoboMakerReadOnlyAccess", + "AWSRoboMakerServicePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSRoboMakerServicePolicy", + "AWSRoboMaker_FullAccess": "arn:aws-us-gov:iam::aws:policy/AWSRoboMaker_FullAccess", + "AWSSSMOpsInsightsServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSSSMOpsInsightsServiceRolePolicy", + "AWSSSODirectoryAdministrator": "arn:aws-us-gov:iam::aws:policy/AWSSSODirectoryAdministrator", + "AWSSSODirectoryReadOnly": "arn:aws-us-gov:iam::aws:policy/AWSSSODirectoryReadOnly", + "AWSSSOMasterAccountAdministrator": "arn:aws-us-gov:iam::aws:policy/AWSSSOMasterAccountAdministrator", + "AWSSSOMemberAccountAdministrator": "arn:aws-us-gov:iam::aws:policy/AWSSSOMemberAccountAdministrator", + "AWSSSOReadOnly": "arn:aws-us-gov:iam::aws:policy/AWSSSOReadOnly", + "AWSSSOServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSSSOServiceRolePolicy", + "AWSSecurityHubFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSSecurityHubFullAccess", + "AWSSecurityHubOrganizationsAccess": "arn:aws-us-gov:iam::aws:policy/AWSSecurityHubOrganizationsAccess", + "AWSSecurityHubReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSSecurityHubReadOnlyAccess", + "AWSSecurityHubServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSSecurityHubServiceRolePolicy", + "AWSServiceCatalogAdminFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSServiceCatalogAdminFullAccess", + "AWSServiceCatalogAdminReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSServiceCatalogAdminReadOnlyAccess", + "AWSServiceCatalogAppRegistryFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSServiceCatalogAppRegistryFullAccess", + "AWSServiceCatalogAppRegistryReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSServiceCatalogAppRegistryReadOnlyAccess", + "AWSServiceCatalogAppRegistryServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSServiceCatalogAppRegistryServiceRolePolicy", + "AWSServiceCatalogEndUserFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSServiceCatalogEndUserFullAccess", + "AWSServiceCatalogEndUserReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSServiceCatalogEndUserReadOnlyAccess", + "AWSServiceCatalogOrgsDataSyncServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSServiceCatalogOrgsDataSyncServiceRolePolicy", + "AWSServiceRoleForAmazonEKSNodegroup": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSServiceRoleForAmazonEKSNodegroup", + "AWSServiceRoleForCloudWatchAlarmsActionSSMServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSServiceRoleForCloudWatchAlarmsActionSSMServiceRolePolicy", + "AWSServiceRoleForCodeGuruProfiler": "arn:aws-us-gov:iam::aws:policy/AWSServiceRoleForCodeGuruProfiler", + "AWSServiceRoleForImageBuilder": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSServiceRoleForImageBuilder", + "AWSServiceRoleForIoTSiteWise": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSServiceRoleForIoTSiteWise", + "AWSServiceRoleForLogDeliveryPolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSServiceRoleForLogDeliveryPolicy", + "AWSServiceRoleForSMS": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSServiceRoleForSMS", + "AWSServiceRolePolicyForBackupReports": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSServiceRolePolicyForBackupReports", + "AWSStepFunctionsConsoleFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSStepFunctionsConsoleFullAccess", + "AWSStepFunctionsFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSStepFunctionsFullAccess", + "AWSStepFunctionsReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSStepFunctionsReadOnlyAccess", + "AWSStorageGatewayFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSStorageGatewayFullAccess", + "AWSStorageGatewayReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSStorageGatewayReadOnlyAccess", + "AWSStorageGatewayServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSStorageGatewayServiceRolePolicy", + "AWSSupportAccess": "arn:aws-us-gov:iam::aws:policy/AWSSupportAccess", + "AWSSupportServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSSupportServiceRolePolicy", + "AWSSystemsManagerAccountDiscoveryServicePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSSystemsManagerAccountDiscoveryServicePolicy", + "AWSSystemsManagerChangeManagementServicePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSSystemsManagerChangeManagementServicePolicy", + "AWSSystemsManagerOpsDataSyncServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSSystemsManagerOpsDataSyncServiceRolePolicy", + "AWSThinkboxAWSPortalAdminPolicy": "arn:aws-us-gov:iam::aws:policy/AWSThinkboxAWSPortalAdminPolicy", + "AWSThinkboxAWSPortalGatewayPolicy": "arn:aws-us-gov:iam::aws:policy/AWSThinkboxAWSPortalGatewayPolicy", + "AWSThinkboxAWSPortalWorkerPolicy": "arn:aws-us-gov:iam::aws:policy/AWSThinkboxAWSPortalWorkerPolicy", + "AWSThinkboxAssetServerPolicy": "arn:aws-us-gov:iam::aws:policy/AWSThinkboxAssetServerPolicy", + "AWSThinkboxDeadlineResourceTrackerAccessPolicy": "arn:aws-us-gov:iam::aws:policy/AWSThinkboxDeadlineResourceTrackerAccessPolicy", + "AWSThinkboxDeadlineResourceTrackerAdminPolicy": "arn:aws-us-gov:iam::aws:policy/AWSThinkboxDeadlineResourceTrackerAdminPolicy", + "AWSThinkboxDeadlineSpotEventPluginAdminPolicy": "arn:aws-us-gov:iam::aws:policy/AWSThinkboxDeadlineSpotEventPluginAdminPolicy", + "AWSThinkboxDeadlineSpotEventPluginWorkerPolicy": "arn:aws-us-gov:iam::aws:policy/AWSThinkboxDeadlineSpotEventPluginWorkerPolicy", + "AWSTransferConsoleFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSTransferConsoleFullAccess", + "AWSTransferFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSTransferFullAccess", + "AWSTransferLoggingAccess": "arn:aws-us-gov:iam::aws:policy/service-role/AWSTransferLoggingAccess", + "AWSTrustedAdvisorServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSTrustedAdvisorServiceRolePolicy", + "AWSVPCS2SVpnServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSVPCS2SVpnServiceRolePolicy", + "AWSVPCTransitGatewayServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSVPCTransitGatewayServiceRolePolicy", + "AWSWAFConsoleFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSWAFConsoleFullAccess", + "AWSWAFConsoleReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSWAFConsoleReadOnlyAccess", + "AWSWAFFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSWAFFullAccess", + "AWSWAFReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSWAFReadOnlyAccess", + "AWSWellArchitectedDiscoveryServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSWellArchitectedDiscoveryServiceRolePolicy", + "AWSWellArchitectedOrganizationsServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AWSWellArchitectedOrganizationsServiceRolePolicy", + "AWSWickrFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSWickrFullAccess", + "AWSXRayDaemonWriteAccess": "arn:aws-us-gov:iam::aws:policy/AWSXRayDaemonWriteAccess", + "AWSXrayFullAccess": "arn:aws-us-gov:iam::aws:policy/AWSXrayFullAccess", + "AWSXrayReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSXrayReadOnlyAccess", + "AWSXrayWriteOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AWSXrayWriteOnlyAccess", + "AWS_ConfigRole": "arn:aws-us-gov:iam::aws:policy/service-role/AWS_ConfigRole", + "AWS_Config_Role": "arn:aws-us-gov:iam::aws:policy/AWS_Config_Role", + "AccessAnalyzerServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AccessAnalyzerServiceRolePolicy", + "AdministratorAccess": "arn:aws-us-gov:iam::aws:policy/AdministratorAccess", + "AdministratorAccess-AWSElasticBeanstalk": "arn:aws-us-gov:iam::aws:policy/AdministratorAccess-AWSElasticBeanstalk", + "AlexaForBusinessFullAccess": "arn:aws-us-gov:iam::aws:policy/AlexaForBusinessFullAccess", + "AlexaForBusinessLifesizeDelegatedAccessPolicy": "arn:aws-us-gov:iam::aws:policy/AlexaForBusinessLifesizeDelegatedAccessPolicy", + "AlexaForBusinessPolyDelegatedAccessPolicy": "arn:aws-us-gov:iam::aws:policy/AlexaForBusinessPolyDelegatedAccessPolicy", + "AmazonAPIGatewayAdministrator": "arn:aws-us-gov:iam::aws:policy/AmazonAPIGatewayAdministrator", + "AmazonAPIGatewayInvokeFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonAPIGatewayInvokeFullAccess", + "AmazonAPIGatewayPushToCloudWatchLogs": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonAPIGatewayPushToCloudWatchLogs", + "AmazonAppStreamFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonAppStreamFullAccess", + "AmazonAppStreamPCAAccess": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonAppStreamPCAAccess", + "AmazonAppStreamReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonAppStreamReadOnlyAccess", + "AmazonAppStreamServiceAccess": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonAppStreamServiceAccess", + "AmazonAthenaFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonAthenaFullAccess", + "AmazonChimeFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonChimeFullAccess", + "AmazonChimeReadOnly": "arn:aws-us-gov:iam::aws:policy/AmazonChimeReadOnly", + "AmazonChimeSDK": "arn:aws-us-gov:iam::aws:policy/AmazonChimeSDK", + "AmazonChimeTranscriptionServiceLinkedRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AmazonChimeTranscriptionServiceLinkedRolePolicy", + "AmazonChimeUserManagement": "arn:aws-us-gov:iam::aws:policy/AmazonChimeUserManagement", + "AmazonCloudDirectoryFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonCloudDirectoryFullAccess", + "AmazonCloudDirectoryReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonCloudDirectoryReadOnlyAccess", + "AmazonCodeGuruProfilerFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonCodeGuruProfilerFullAccess", + "AmazonCognitoIdpEmailServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AmazonCognitoIdpEmailServiceRolePolicy", + "AmazonCognitoPowerUser": "arn:aws-us-gov:iam::aws:policy/AmazonCognitoPowerUser", + "AmazonCognitoReadOnly": "arn:aws-us-gov:iam::aws:policy/AmazonCognitoReadOnly", + "AmazonCognitoUnauthenticatedIdentities": "arn:aws-us-gov:iam::aws:policy/AmazonCognitoUnauthenticatedIdentities", + "AmazonConnectReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonConnectReadOnlyAccess", + "AmazonConnectServiceLinkedRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AmazonConnectServiceLinkedRolePolicy", + "AmazonConnect_FullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonConnect_FullAccess", + "AmazonDMSCloudWatchLogsRole": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonDMSCloudWatchLogsRole", + "AmazonDMSRedshiftS3Role": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonDMSRedshiftS3Role", + "AmazonDMSVPCManagementRole": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonDMSVPCManagementRole", + "AmazonDetectiveFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonDetectiveFullAccess", + "AmazonDetectiveInvestigatorAccess": "arn:aws-us-gov:iam::aws:policy/AmazonDetectiveInvestigatorAccess", + "AmazonDetectiveMemberAccess": "arn:aws-us-gov:iam::aws:policy/AmazonDetectiveMemberAccess", + "AmazonDetectiveOrganizationsAccess": "arn:aws-us-gov:iam::aws:policy/AmazonDetectiveOrganizationsAccess", + "AmazonDetectiveServiceLinkedRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AmazonDetectiveServiceLinkedRolePolicy", + "AmazonDocDBConsoleFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonDocDBConsoleFullAccess", + "AmazonDocDBFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonDocDBFullAccess", + "AmazonDocDBReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonDocDBReadOnlyAccess", + "AmazonDynamoDBFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonDynamoDBFullAccess", + "AmazonDynamoDBFullAccesswithDataPipeline": "arn:aws-us-gov:iam::aws:policy/AmazonDynamoDBFullAccesswithDataPipeline", + "AmazonDynamoDBReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonDynamoDBReadOnlyAccess", + "AmazonEBSCSIDriverPolicy": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonEBSCSIDriverPolicy", + "AmazonEC2ContainerRegistryFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonEC2ContainerRegistryFullAccess", + "AmazonEC2ContainerRegistryPowerUser": "arn:aws-us-gov:iam::aws:policy/AmazonEC2ContainerRegistryPowerUser", + "AmazonEC2ContainerRegistryReadOnly": "arn:aws-us-gov:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly", + "AmazonEC2ContainerServiceAutoscaleRole": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonEC2ContainerServiceAutoscaleRole", + "AmazonEC2ContainerServiceEventsRole": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonEC2ContainerServiceEventsRole", + "AmazonEC2ContainerServiceRole": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonEC2ContainerServiceRole", + "AmazonEC2ContainerServiceforEC2Role": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonEC2ContainerServiceforEC2Role", + "AmazonEC2FullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonEC2FullAccess", + "AmazonEC2ReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonEC2ReadOnlyAccess", + "AmazonEC2RolePolicyForLaunchWizard": "arn:aws-us-gov:iam::aws:policy/AmazonEC2RolePolicyForLaunchWizard", + "AmazonEC2RoleforAWSCodeDeploy": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonEC2RoleforAWSCodeDeploy", + "AmazonEC2RoleforAWSCodeDeployLimited": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonEC2RoleforAWSCodeDeployLimited", + "AmazonEC2RoleforDataPipelineRole": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonEC2RoleforDataPipelineRole", + "AmazonEC2RoleforSSM": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonEC2RoleforSSM", + "AmazonEC2SpotFleetAutoscaleRole": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonEC2SpotFleetAutoscaleRole", + "AmazonEC2SpotFleetTaggingRole": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonEC2SpotFleetTaggingRole", + "AmazonECSServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AmazonECSServiceRolePolicy", + "AmazonECSTaskExecutionRolePolicy": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonECSTaskExecutionRolePolicy", + "AmazonECS_FullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonECS_FullAccess", + "AmazonEKSClusterPolicy": "arn:aws-us-gov:iam::aws:policy/AmazonEKSClusterPolicy", + "AmazonEKSFargatePodExecutionRolePolicy": "arn:aws-us-gov:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy", + "AmazonEKSServicePolicy": "arn:aws-us-gov:iam::aws:policy/AmazonEKSServicePolicy", + "AmazonEKSServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AmazonEKSServiceRolePolicy", + "AmazonEKSVPCResourceController": "arn:aws-us-gov:iam::aws:policy/AmazonEKSVPCResourceController", + "AmazonEKSWorkerNodePolicy": "arn:aws-us-gov:iam::aws:policy/AmazonEKSWorkerNodePolicy", + "AmazonEKS_CNI_Policy": "arn:aws-us-gov:iam::aws:policy/AmazonEKS_CNI_Policy", + "AmazonEMRCleanupPolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AmazonEMRCleanupPolicy", + "AmazonEMRContainersServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AmazonEMRContainersServiceRolePolicy", + "AmazonEMRFullAccessPolicy_v2": "arn:aws-us-gov:iam::aws:policy/AmazonEMRFullAccessPolicy_v2", + "AmazonEMRReadOnlyAccessPolicy_v2": "arn:aws-us-gov:iam::aws:policy/AmazonEMRReadOnlyAccessPolicy_v2", + "AmazonEMRServicePolicy_v2": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonEMRServicePolicy_v2", + "AmazonESCognitoAccess": "arn:aws-us-gov:iam::aws:policy/AmazonESCognitoAccess", + "AmazonESFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonESFullAccess", + "AmazonESReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonESReadOnlyAccess", + "AmazonElastiCacheFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonElastiCacheFullAccess", + "AmazonElastiCacheReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonElastiCacheReadOnlyAccess", + "AmazonElasticFileSystemClientFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonElasticFileSystemClientFullAccess", + "AmazonElasticFileSystemClientReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonElasticFileSystemClientReadOnlyAccess", + "AmazonElasticFileSystemClientReadWriteAccess": "arn:aws-us-gov:iam::aws:policy/AmazonElasticFileSystemClientReadWriteAccess", + "AmazonElasticFileSystemFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonElasticFileSystemFullAccess", + "AmazonElasticFileSystemReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonElasticFileSystemReadOnlyAccess", + "AmazonElasticFileSystemServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AmazonElasticFileSystemServiceRolePolicy", + "AmazonElasticFileSystemsUtils": "arn:aws-us-gov:iam::aws:policy/AmazonElasticFileSystemsUtils", + "AmazonElasticMapReduceEditorsRole": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonElasticMapReduceEditorsRole", + "AmazonElasticMapReduceFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonElasticMapReduceFullAccess", + "AmazonElasticMapReducePlacementGroupPolicy": "arn:aws-us-gov:iam::aws:policy/AmazonElasticMapReducePlacementGroupPolicy", + "AmazonElasticMapReduceReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonElasticMapReduceReadOnlyAccess", + "AmazonElasticMapReduceRole": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonElasticMapReduceRole", + "AmazonElasticMapReduceforAutoScalingRole": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonElasticMapReduceforAutoScalingRole", + "AmazonElasticMapReduceforEC2Role": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonElasticMapReduceforEC2Role", + "AmazonElasticsearchServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AmazonElasticsearchServiceRolePolicy", + "AmazonEventBridgeFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonEventBridgeFullAccess", + "AmazonEventBridgeReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonEventBridgeReadOnlyAccess", + "AmazonFISServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AmazonFISServiceRolePolicy", + "AmazonFSxConsoleFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonFSxConsoleFullAccess", + "AmazonFSxConsoleReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonFSxConsoleReadOnlyAccess", + "AmazonFSxFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonFSxFullAccess", + "AmazonFSxReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonFSxReadOnlyAccess", + "AmazonFSxServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AmazonFSxServiceRolePolicy", + "AmazonGlacierFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonGlacierFullAccess", + "AmazonGlacierReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonGlacierReadOnlyAccess", + "AmazonGuardDutyFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonGuardDutyFullAccess", + "AmazonGuardDutyReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonGuardDutyReadOnlyAccess", + "AmazonGuardDutyServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AmazonGuardDutyServiceRolePolicy", + "AmazonInspector2FullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonInspector2FullAccess", + "AmazonInspector2ReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonInspector2ReadOnlyAccess", + "AmazonInspector2ServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AmazonInspector2ServiceRolePolicy", + "AmazonInspectorFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonInspectorFullAccess", + "AmazonInspectorReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonInspectorReadOnlyAccess", + "AmazonInspectorServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AmazonInspectorServiceRolePolicy", + "AmazonKeyspacesFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonKeyspacesFullAccess", + "AmazonKeyspacesReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonKeyspacesReadOnlyAccess", + "AmazonKinesisFirehoseFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonKinesisFirehoseFullAccess", + "AmazonKinesisFirehoseReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonKinesisFirehoseReadOnlyAccess", + "AmazonKinesisFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonKinesisFullAccess", + "AmazonKinesisReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonKinesisReadOnlyAccess", + "AmazonKinesisVideoStreamsFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonKinesisVideoStreamsFullAccess", + "AmazonKinesisVideoStreamsReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonKinesisVideoStreamsReadOnlyAccess", + "AmazonLambdaRolePolicyForLaunchWizardSAP": "arn:aws-us-gov:iam::aws:policy/AmazonLambdaRolePolicyForLaunchWizardSAP", + "AmazonLaunchWizard_Fullaccess": "arn:aws-us-gov:iam::aws:policy/AmazonLaunchWizard_Fullaccess", + "AmazonLexBotPolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AmazonLexBotPolicy", + "AmazonLexFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonLexFullAccess", + "AmazonLexReadOnly": "arn:aws-us-gov:iam::aws:policy/AmazonLexReadOnly", + "AmazonLexRunBotsOnly": "arn:aws-us-gov:iam::aws:policy/AmazonLexRunBotsOnly", + "AmazonMQFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonMQFullAccess", + "AmazonMQServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AmazonMQServiceRolePolicy", + "AmazonMSKFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonMSKFullAccess", + "AmazonManagedBlockchainConsoleFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonManagedBlockchainConsoleFullAccess", + "AmazonManagedBlockchainFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonManagedBlockchainFullAccess", + "AmazonManagedBlockchainServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AmazonManagedBlockchainServiceRolePolicy", + "AmazonOpenSearchServiceCognitoAccess": "arn:aws-us-gov:iam::aws:policy/AmazonOpenSearchServiceCognitoAccess", + "AmazonOpenSearchServiceFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonOpenSearchServiceFullAccess", + "AmazonOpenSearchServiceReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonOpenSearchServiceReadOnlyAccess", + "AmazonOpenSearchServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AmazonOpenSearchServiceRolePolicy", + "AmazonPollyFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonPollyFullAccess", + "AmazonPollyReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonPollyReadOnlyAccess", + "AmazonPrometheusConsoleFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonPrometheusConsoleFullAccess", + "AmazonPrometheusFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonPrometheusFullAccess", + "AmazonPrometheusQueryAccess": "arn:aws-us-gov:iam::aws:policy/AmazonPrometheusQueryAccess", + "AmazonPrometheusRemoteWriteAccess": "arn:aws-us-gov:iam::aws:policy/AmazonPrometheusRemoteWriteAccess", + "AmazonRDSDirectoryServiceAccess": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonRDSDirectoryServiceAccess", + "AmazonRDSEnhancedMonitoringRole": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonRDSEnhancedMonitoringRole", + "AmazonRDSFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonRDSFullAccess", + "AmazonRDSReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonRDSReadOnlyAccess", + "AmazonRDSServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AmazonRDSServiceRolePolicy", + "AmazonRedshiftAllCommandsFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonRedshiftAllCommandsFullAccess", + "AmazonRedshiftDataFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonRedshiftDataFullAccess", + "AmazonRedshiftFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonRedshiftFullAccess", + "AmazonRedshiftQueryEditor": "arn:aws-us-gov:iam::aws:policy/AmazonRedshiftQueryEditor", + "AmazonRedshiftQueryEditorV2FullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonRedshiftQueryEditorV2FullAccess", + "AmazonRedshiftQueryEditorV2NoSharing": "arn:aws-us-gov:iam::aws:policy/AmazonRedshiftQueryEditorV2NoSharing", + "AmazonRedshiftQueryEditorV2ReadSharing": "arn:aws-us-gov:iam::aws:policy/AmazonRedshiftQueryEditorV2ReadSharing", + "AmazonRedshiftQueryEditorV2ReadWriteSharing": "arn:aws-us-gov:iam::aws:policy/AmazonRedshiftQueryEditorV2ReadWriteSharing", + "AmazonRedshiftServiceLinkedRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AmazonRedshiftServiceLinkedRolePolicy", + "AmazonRekognitionFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonRekognitionFullAccess", + "AmazonRekognitionReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonRekognitionReadOnlyAccess", + "AmazonRekognitionServiceRole": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonRekognitionServiceRole", + "AmazonRoute53FullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonRoute53FullAccess", + "AmazonRoute53ReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonRoute53ReadOnlyAccess", + "AmazonRoute53RecoveryControlConfigReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonRoute53RecoveryControlConfigReadOnlyAccess", + "AmazonRoute53ResolverFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonRoute53ResolverFullAccess", + "AmazonRoute53ResolverReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonRoute53ResolverReadOnlyAccess", + "AmazonS3FullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonS3FullAccess", + "AmazonS3ObjectLambdaExecutionRolePolicy": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonS3ObjectLambdaExecutionRolePolicy", + "AmazonS3ReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonS3ReadOnlyAccess", + "AmazonSESFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonSESFullAccess", + "AmazonSESReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonSESReadOnlyAccess", + "AmazonSNSFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonSNSFullAccess", + "AmazonSNSReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonSNSReadOnlyAccess", + "AmazonSQSFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonSQSFullAccess", + "AmazonSQSReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonSQSReadOnlyAccess", + "AmazonSSMAutomationApproverAccess": "arn:aws-us-gov:iam::aws:policy/AmazonSSMAutomationApproverAccess", + "AmazonSSMAutomationRole": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonSSMAutomationRole", + "AmazonSSMDirectoryServiceAccess": "arn:aws-us-gov:iam::aws:policy/AmazonSSMDirectoryServiceAccess", + "AmazonSSMFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonSSMFullAccess", + "AmazonSSMMaintenanceWindowRole": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonSSMMaintenanceWindowRole", + "AmazonSSMManagedEC2InstanceDefaultPolicy": "arn:aws-us-gov:iam::aws:policy/AmazonSSMManagedEC2InstanceDefaultPolicy", + "AmazonSSMManagedInstanceCore": "arn:aws-us-gov:iam::aws:policy/AmazonSSMManagedInstanceCore", + "AmazonSSMPatchAssociation": "arn:aws-us-gov:iam::aws:policy/AmazonSSMPatchAssociation", + "AmazonSSMReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonSSMReadOnlyAccess", + "AmazonSSMServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AmazonSSMServiceRolePolicy", + "AmazonSageMakerFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonSageMakerFullAccess", + "AmazonSageMakerNotebooksServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AmazonSageMakerNotebooksServiceRolePolicy", + "AmazonSageMakerReadOnly": "arn:aws-us-gov:iam::aws:policy/AmazonSageMakerReadOnly", + "AmazonTextractFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonTextractFullAccess", + "AmazonTextractServiceRole": "arn:aws-us-gov:iam::aws:policy/service-role/AmazonTextractServiceRole", + "AmazonTimestreamConsoleFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonTimestreamConsoleFullAccess", + "AmazonTimestreamFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonTimestreamFullAccess", + "AmazonTimestreamReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonTimestreamReadOnlyAccess", + "AmazonTranscribeFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonTranscribeFullAccess", + "AmazonTranscribeReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonTranscribeReadOnlyAccess", + "AmazonVPCCrossAccountNetworkInterfaceOperations": "arn:aws-us-gov:iam::aws:policy/AmazonVPCCrossAccountNetworkInterfaceOperations", + "AmazonVPCFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonVPCFullAccess", + "AmazonVPCReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonVPCReadOnlyAccess", + "AmazonWorkMailFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonWorkMailFullAccess", + "AmazonWorkMailMessageFlowFullAccess": "arn:aws-us-gov:iam::aws:policy/AmazonWorkMailMessageFlowFullAccess", + "AmazonWorkMailMessageFlowReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonWorkMailMessageFlowReadOnlyAccess", + "AmazonWorkMailReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AmazonWorkMailReadOnlyAccess", + "AmazonWorkSpacesAdmin": "arn:aws-us-gov:iam::aws:policy/AmazonWorkSpacesAdmin", + "AmazonWorkSpacesSelfServiceAccess": "arn:aws-us-gov:iam::aws:policy/AmazonWorkSpacesSelfServiceAccess", + "AmazonWorkSpacesServiceAccess": "arn:aws-us-gov:iam::aws:policy/AmazonWorkSpacesServiceAccess", + "AmazonWorkSpacesWebReadOnly": "arn:aws-us-gov:iam::aws:policy/AmazonWorkSpacesWebReadOnly", + "AmazonWorkspacesPCAAccess": "arn:aws-us-gov:iam::aws:policy/AmazonWorkspacesPCAAccess", + "ApplicationAutoScalingForAmazonAppStreamAccess": "arn:aws-us-gov:iam::aws:policy/service-role/ApplicationAutoScalingForAmazonAppStreamAccess", + "AutoScalingConsoleFullAccess": "arn:aws-us-gov:iam::aws:policy/AutoScalingConsoleFullAccess", + "AutoScalingConsoleReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AutoScalingConsoleReadOnlyAccess", + "AutoScalingFullAccess": "arn:aws-us-gov:iam::aws:policy/AutoScalingFullAccess", + "AutoScalingNotificationAccessRole": "arn:aws-us-gov:iam::aws:policy/service-role/AutoScalingNotificationAccessRole", + "AutoScalingReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/AutoScalingReadOnlyAccess", + "AutoScalingServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/AutoScalingServiceRolePolicy", + "AwsGlueDataBrewFullAccessPolicy": "arn:aws-us-gov:iam::aws:policy/AwsGlueDataBrewFullAccessPolicy", + "AwsGlueSessionUserRestrictedPolicy": "arn:aws-us-gov:iam::aws:policy/AwsGlueSessionUserRestrictedPolicy", + "AwsGlueSessionUserRestrictedServiceRole": "arn:aws-us-gov:iam::aws:policy/service-role/AwsGlueSessionUserRestrictedServiceRole", + "BatchServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/BatchServiceRolePolicy", + "Billing": "arn:aws-us-gov:iam::aws:policy/job-function/Billing", + "CertificateManagerServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/CertificateManagerServiceRolePolicy", + "ClientVPNServiceConnectionsRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/ClientVPNServiceConnectionsRolePolicy", + "ClientVPNServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/ClientVPNServiceRolePolicy", + "CloudFormationStackSetsOrgAdminServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/CloudFormationStackSetsOrgAdminServiceRolePolicy", + "CloudFormationStackSetsOrgMemberServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/CloudFormationStackSetsOrgMemberServiceRolePolicy", + "CloudFrontFullAccess": "arn:aws-us-gov:iam::aws:policy/CloudFrontFullAccess", + "CloudFrontReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/CloudFrontReadOnlyAccess", + "CloudHSMServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/CloudHSMServiceRolePolicy", + "CloudTrailServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/CloudTrailServiceRolePolicy", + "CloudWatch-CrossAccountAccess": "arn:aws-us-gov:iam::aws:policy/aws-service-role/CloudWatch-CrossAccountAccess", + "CloudWatchActionsEC2Access": "arn:aws-us-gov:iam::aws:policy/CloudWatchActionsEC2Access", + "CloudWatchAgentAdminPolicy": "arn:aws-us-gov:iam::aws:policy/CloudWatchAgentAdminPolicy", + "CloudWatchAgentServerPolicy": "arn:aws-us-gov:iam::aws:policy/CloudWatchAgentServerPolicy", + "CloudWatchApplicationInsightsFullAccess": "arn:aws-us-gov:iam::aws:policy/CloudWatchApplicationInsightsFullAccess", + "CloudWatchApplicationInsightsReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/CloudWatchApplicationInsightsReadOnlyAccess", + "CloudWatchAutomaticDashboardsAccess": "arn:aws-us-gov:iam::aws:policy/CloudWatchAutomaticDashboardsAccess", + "CloudWatchEventsFullAccess": "arn:aws-us-gov:iam::aws:policy/CloudWatchEventsFullAccess", + "CloudWatchEventsReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/CloudWatchEventsReadOnlyAccess", + "CloudWatchEventsServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/CloudWatchEventsServiceRolePolicy", + "CloudWatchFullAccess": "arn:aws-us-gov:iam::aws:policy/CloudWatchFullAccess", + "CloudWatchLambdaInsightsExecutionRolePolicy": "arn:aws-us-gov:iam::aws:policy/CloudWatchLambdaInsightsExecutionRolePolicy", + "CloudWatchLogsFullAccess": "arn:aws-us-gov:iam::aws:policy/CloudWatchLogsFullAccess", + "CloudWatchLogsReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/CloudWatchLogsReadOnlyAccess", + "CloudWatchReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/CloudWatchReadOnlyAccess", + "CloudWatchSyntheticsFullAccess": "arn:aws-us-gov:iam::aws:policy/CloudWatchSyntheticsFullAccess", + "CloudWatchSyntheticsReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/CloudWatchSyntheticsReadOnlyAccess", + "CloudwatchApplicationInsightsServiceLinkedRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/CloudwatchApplicationInsightsServiceLinkedRolePolicy", + "ComprehendDataAccessRolePolicy": "arn:aws-us-gov:iam::aws:policy/service-role/ComprehendDataAccessRolePolicy", + "ComprehendFullAccess": "arn:aws-us-gov:iam::aws:policy/ComprehendFullAccess", + "ComprehendMedicalFullAccess": "arn:aws-us-gov:iam::aws:policy/ComprehendMedicalFullAccess", + "ComprehendReadOnly": "arn:aws-us-gov:iam::aws:policy/ComprehendReadOnly", + "ComputeOptimizerReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/ComputeOptimizerReadOnlyAccess", + "ComputeOptimizerServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/ComputeOptimizerServiceRolePolicy", + "ConfigConformsServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/ConfigConformsServiceRolePolicy", + "DataScientist": "arn:aws-us-gov:iam::aws:policy/job-function/DataScientist", + "DatabaseAdministrator": "arn:aws-us-gov:iam::aws:policy/job-function/DatabaseAdministrator", + "DynamoDBCloudWatchContributorInsightsServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/DynamoDBCloudWatchContributorInsightsServiceRolePolicy", + "DynamoDBKinesisReplicationServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/DynamoDBKinesisReplicationServiceRolePolicy", + "DynamoDBReplicationServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/DynamoDBReplicationServiceRolePolicy", + "EC2FastLaunchServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/EC2FastLaunchServiceRolePolicy", + "EC2InstanceConnect": "arn:aws-us-gov:iam::aws:policy/EC2InstanceConnect", + "EC2InstanceProfileForImageBuilder": "arn:aws-us-gov:iam::aws:policy/EC2InstanceProfileForImageBuilder", + "EC2InstanceProfileForImageBuilderECRContainerBuilds": "arn:aws-us-gov:iam::aws:policy/EC2InstanceProfileForImageBuilderECRContainerBuilds", + "ECRReplicationServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/ECRReplicationServiceRolePolicy", + "Ec2ImageBuilderCrossAccountDistributionAccess": "arn:aws-us-gov:iam::aws:policy/Ec2ImageBuilderCrossAccountDistributionAccess", + "Ec2InstanceConnectEndpoint": "arn:aws-us-gov:iam::aws:policy/aws-service-role/Ec2InstanceConnectEndpoint", + "ElastiCacheServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/ElastiCacheServiceRolePolicy", + "ElasticLoadBalancingFullAccess": "arn:aws-us-gov:iam::aws:policy/ElasticLoadBalancingFullAccess", + "ElasticLoadBalancingReadOnly": "arn:aws-us-gov:iam::aws:policy/ElasticLoadBalancingReadOnly", + "FMSServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/FMSServiceRolePolicy", + "FSxDeleteServiceLinkedRoleAccess": "arn:aws-us-gov:iam::aws:policy/aws-service-role/FSxDeleteServiceLinkedRoleAccess", + "GameLiftGameServerGroupPolicy": "arn:aws-us-gov:iam::aws:policy/GameLiftGameServerGroupPolicy", + "GreengrassOTAUpdateArtifactAccess": "arn:aws-us-gov:iam::aws:policy/service-role/GreengrassOTAUpdateArtifactAccess", + "IAMAccessAnalyzerFullAccess": "arn:aws-us-gov:iam::aws:policy/IAMAccessAnalyzerFullAccess", + "IAMAccessAnalyzerReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/IAMAccessAnalyzerReadOnlyAccess", + "IAMFullAccess": "arn:aws-us-gov:iam::aws:policy/IAMFullAccess", + "IAMReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/IAMReadOnlyAccess", + "IAMUserChangePassword": "arn:aws-us-gov:iam::aws:policy/IAMUserChangePassword", + "KafkaServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/KafkaServiceRolePolicy", + "LakeFormationDataAccessServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/LakeFormationDataAccessServiceRolePolicy", + "NeptuneConsoleFullAccess": "arn:aws-us-gov:iam::aws:policy/NeptuneConsoleFullAccess", + "NeptuneFullAccess": "arn:aws-us-gov:iam::aws:policy/NeptuneFullAccess", + "NeptuneReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/NeptuneReadOnlyAccess", + "NetworkAdministrator": "arn:aws-us-gov:iam::aws:policy/job-function/NetworkAdministrator", + "PowerUserAccess": "arn:aws-us-gov:iam::aws:policy/PowerUserAccess", + "QuickSightAccessForS3StorageManagementAnalyticsReadOnly": "arn:aws-us-gov:iam::aws:policy/service-role/QuickSightAccessForS3StorageManagementAnalyticsReadOnly", + "RDSCloudHsmAuthorizationRole": "arn:aws-us-gov:iam::aws:policy/service-role/RDSCloudHsmAuthorizationRole", + "ReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/ReadOnlyAccess", + "ResourceGroupsandTagEditorFullAccess": "arn:aws-us-gov:iam::aws:policy/ResourceGroupsandTagEditorFullAccess", + "ResourceGroupsandTagEditorReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/ResourceGroupsandTagEditorReadOnlyAccess", + "Route53ResolverServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/Route53ResolverServiceRolePolicy", + "SecretsManagerReadWrite": "arn:aws-us-gov:iam::aws:policy/SecretsManagerReadWrite", + "SecurityAudit": "arn:aws-us-gov:iam::aws:policy/SecurityAudit", + "ServerMigrationConnector": "arn:aws-us-gov:iam::aws:policy/ServerMigrationConnector", + "ServerMigrationServiceConsoleFullAccess": "arn:aws-us-gov:iam::aws:policy/ServerMigrationServiceConsoleFullAccess", + "ServerMigrationServiceLaunchRole": "arn:aws-us-gov:iam::aws:policy/service-role/ServerMigrationServiceLaunchRole", + "ServerMigrationServiceRoleForInstanceValidation": "arn:aws-us-gov:iam::aws:policy/service-role/ServerMigrationServiceRoleForInstanceValidation", + "ServerMigration_ServiceRole": "arn:aws-us-gov:iam::aws:policy/service-role/ServerMigration_ServiceRole", + "ServiceCatalogAdminReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/ServiceCatalogAdminReadOnlyAccess", + "ServiceCatalogEndUserAccess": "arn:aws-us-gov:iam::aws:policy/ServiceCatalogEndUserAccess", + "ServiceQuotasFullAccess": "arn:aws-us-gov:iam::aws:policy/ServiceQuotasFullAccess", + "ServiceQuotasReadOnlyAccess": "arn:aws-us-gov:iam::aws:policy/ServiceQuotasReadOnlyAccess", + "ServiceQuotasServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/ServiceQuotasServiceRolePolicy", + "SimpleWorkflowFullAccess": "arn:aws-us-gov:iam::aws:policy/SimpleWorkflowFullAccess", + "SupportUser": "arn:aws-us-gov:iam::aws:policy/job-function/SupportUser", + "SystemAdministrator": "arn:aws-us-gov:iam::aws:policy/job-function/SystemAdministrator", + "TranslateFullAccess": "arn:aws-us-gov:iam::aws:policy/TranslateFullAccess", + "TranslateReadOnly": "arn:aws-us-gov:iam::aws:policy/TranslateReadOnly", + "ViewOnlyAccess": "arn:aws-us-gov:iam::aws:policy/job-function/ViewOnlyAccess", + "WAFRegionalLoggingServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/WAFRegionalLoggingServiceRolePolicy", + "WAFV2LoggingServiceRolePolicy": "arn:aws-us-gov:iam::aws:policy/aws-service-role/WAFV2LoggingServiceRolePolicy" } } diff --git a/tests/translator/output/aws-us-gov/managed_policies_everything.json b/tests/translator/output/aws-us-gov/managed_policies_everything.json index e520ebcfc..8d726b36e 100644 --- a/tests/translator/output/aws-us-gov/managed_policies_everything.json +++ b/tests/translator/output/aws-us-gov/managed_policies_everything.json @@ -57,8 +57,8 @@ }, "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", - "AmazonS3FullAccess", - "AmazonAPIGatewayPushToCloudWatchLogs", + "arn:aws-us-gov:iam::aws:policy/AmazonS3FullAccess", + "arn:aws-us-gov:iam::aws:policy/service-role/AmazonAPIGatewayPushToCloudWatchLogs", "AnyNonOfficialManagedPolicy", "arn:aws:iam::aws:policy/ThisIsPassedThroughAsIs", "arn:aws-cn:iam::aws:policy/ThisIsAlsoPassedThrough", @@ -177,8 +177,8 @@ "Version": "2012-10-17" }, "ManagedPolicyArns": [ - "AmazonS3FullAccess", - "AmazonAPIGatewayPushToCloudWatchLogs", + "arn:aws-us-gov:iam::aws:policy/AmazonS3FullAccess", + "arn:aws-us-gov:iam::aws:policy/service-role/AmazonAPIGatewayPushToCloudWatchLogs", "AnyNonOfficialManagedPolicy", "arn:aws:iam::aws:policy/ThisIsPassedThroughAsIs", "arn:aws-cn:iam::aws:policy/ThisIsAlsoPassedThrough", diff --git a/tests/translator/output/aws-us-gov/managed_policies_minimal.json b/tests/translator/output/aws-us-gov/managed_policies_minimal.json index e68361f12..2086a5129 100644 --- a/tests/translator/output/aws-us-gov/managed_policies_minimal.json +++ b/tests/translator/output/aws-us-gov/managed_policies_minimal.json @@ -43,7 +43,7 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "AnyNonOfficialManagedPolicy", - "AmazonS3FullAccess" + "arn:aws-us-gov:iam::aws:policy/AmazonS3FullAccess" ], "Tags": [ { @@ -95,7 +95,7 @@ }, "ManagedPolicyArns": [ "AnyNonOfficialManagedPolicy", - "AmazonS3FullAccess" + "arn:aws-us-gov:iam::aws:policy/AmazonS3FullAccess" ], "Tags": [ { diff --git a/tests/translator/output/aws-us-gov/schema_validation_1.json b/tests/translator/output/aws-us-gov/schema_validation_1.json index bdfeb13ad..a09bffe97 100644 --- a/tests/translator/output/aws-us-gov/schema_validation_1.json +++ b/tests/translator/output/aws-us-gov/schema_validation_1.json @@ -60,7 +60,7 @@ "Version": "2012-10-17" }, "ManagedPolicyArns": [ - "AWSXrayWriteOnlyAccess", + "arn:aws-us-gov:iam::aws:policy/AWSXrayWriteOnlyAccess", "arn:aws-us-gov:iam::aws:policy/AWSXRayDaemonWriteAccess", "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], @@ -170,7 +170,7 @@ "Version": "2012-10-17" }, "ManagedPolicyArns": [ - "AWSXrayWriteOnlyAccess", + "arn:aws-us-gov:iam::aws:policy/AWSXrayWriteOnlyAccess", "arn:aws-us-gov:iam::aws:policy/AWSXRayDaemonWriteAccess" ], "Policies": [