File tree Expand file tree Collapse file tree 3 files changed +10
-27
lines changed Expand file tree Collapse file tree 3 files changed +10
-27
lines changed Original file line number Diff line number Diff line change @@ -2,6 +2,11 @@ Changelog
22=========
33
44
5+ 1.38.0 (2025-09-26)
6+ -------------------
7+ - Build: auto-update snippets to version: 1.38.0. [ Github Actions]
8+
9+
5101.37.0 (2025-09-19)
611-------------------
712- Build: auto-update snippets to version: 1.37.0. [ Github Actions]
Original file line number Diff line number Diff line change 33 "displayName" : " AWS IAM Service Principal Snippets" ,
44 "description" : " This VS Code extension provides autocompletion of all AWS services that can be used as Service Principals in your IAM policies." ,
55 "author" : " Danny Steenman" ,
6- "version" : " 1.38 .0" ,
6+ "version" : " 1.39 .0" ,
77 "publisher" : " dannysteenman" ,
88 "icon" : " images/iam-service-principal-snippets-extension-icon.png" ,
99 "homepage" : " https://towardsthecloud.com" ,
Original file line number Diff line number Diff line change 193193 " policy_generator"
194194 ]
195195 },
196- "application-cost-profiler" : {
197- "originalNames" : [
198- " application-cost-profiler"
199- ],
200- "reference_url" : " https://awspolicygen.s3.amazonaws.com/js/policies.js" ,
201- "servicePrincipal" : " application-cost-profiler.amazonaws.com" ,
202- "sources" : [
203- " policy_generator"
204- ]
205- },
206196 "application-signals" : {
207197 "originalNames" : [
208198 " application-signals"
14421432 },
14431433 "ecs" : {
14441434 "originalNames" : [
1445- " elasticcontainerserviceamazonecs" ,
14461435 " ecs"
14471436 ],
1448- "reference_url" : " https://docs.aws.amazon .com/AmazonECS/latest/developerguide/using-service-linked-roles.html " ,
1437+ "reference_url" : " https://awspolicygen.s3.amazonaws .com/js/policies.js " ,
14491438 "servicePrincipal" : " ecs.amazonaws.com" ,
14501439 "sources" : [
1451- " documentation" ,
14521440 " policy_generator"
14531441 ]
14541442 },
15801568 },
15811569 "email" : {
15821570 "originalNames" : [
1583- " cognito " ,
1571+ " cognitosync " ,
15841572 " cognitouserpools" ,
1585- " cognitosync "
1573+ " cognito "
15861574 ],
15871575 "reference_url" : " https://docs.aws.amazon.com/cognito/latest/developerguide/using-service-linked-roles.html" ,
15881576 "servicePrincipal" : " email.cognito-idp.amazonaws.com" ,
20902078 " policy_generator"
20912079 ]
20922080 },
2093- "iot1click" : {
2094- "originalNames" : [
2095- " iot1click"
2096- ],
2097- "reference_url" : " https://awspolicygen.s3.amazonaws.com/js/policies.js" ,
2098- "servicePrincipal" : " iot1click.amazonaws.com" ,
2099- "sources" : [
2100- " policy_generator"
2101- ]
2102- },
21032081 "iotanalytics" : {
21042082 "originalNames" : [
21052083 " iotanalytics"
38283806 },
38293807 "ses" : {
38303808 "originalNames" : [
3831- " simpleemailservicemailmanager" ,
38323809 " simpleemailserviceamazonsesv2" ,
3810+ " simpleemailservicemailmanager" ,
38333811 " ses"
38343812 ],
38353813 "reference_url" : " https://docs.aws.amazon.com/ses/latest/dg/using-service-linked-roles.html" ,
You can’t perform that action at this time.
0 commit comments