A fluent interface generator for AWS IAM policy statements with comprehensive AWS service coverage.
IAM Floyd is an open-source library that generates AWS IAM policy statements using a fluent, type-safe interface. It solves the problem of error-prone manual IAM policy creation by providing comprehensive AWS service coverage with compile-time validation. Developers can construct complex permissions programmatically with IDE auto-completion support.
AWS developers and infrastructure engineers working with IAM policies, particularly those using AWS CDK or the AWS SDK in TypeScript/JavaScript projects.
Developers choose IAM Floyd for its intuitive fluent interface that reduces IAM policy errors, its comprehensive coverage of AWS services and actions, and its seamless integration with AWS CDK for infrastructure-as-code workflows.
AWS IAM policy statement generator with fluent interface
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Supports 447 services, 20,549 actions, and thousands of resource/condition keys, ensuring broad compatibility with AWS permissions.
Provides compile-time validation with TypeScript, reducing common IAM errors through auto-completion and strict typing.
Chainable methods make policy construction intuitive and readable, as demonstrated in the README's auto-completion demo.
Dedicated cdk-iam-floyd package extends CDK's PolicyStatement class, seamlessly fitting into infrastructure-as-code workflows.
Enhances development speed with IDE integration, reducing the need for constant AWS documentation lookups.
The project is pre-1.0 with an experimental label, requiring exact version pinning due to frequent API changes, as warned in the README.
The compatibility matrix shows periods with no compatible versions for certain CDK releases, indicating maintenance challenges and potential upgrade hurdles.
For simple or static IAM policies, the library adds unnecessary complexity compared to writing minimal JSON directly.
Generated from AWS docs, so updates might lag behind AWS service changes, risking outdated or incomplete policy coverage.