@aws-sdk/client-accessanalyzer 3.181.0 → 3.185.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -3,6 +3,28 @@
3
3
  All notable changes to this project will be documented in this file.
4
4
  See [Conventional Commits](https://conventionalcommits.org) for commit guidelines.
5
5
 
6
+ # [3.185.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.184.0...v3.185.0) (2022-10-05)
7
+
8
+
9
+ ### Bug Fixes
10
+
11
+ * **codegen:** add deser check for x-amz-request-id ([#4015](https://github.com/aws/aws-sdk-js-v3/issues/4015)) ([6ff07bd](https://github.com/aws/aws-sdk-js-v3/commit/6ff07bd7e72bd56725f318013ac1d6d0fbbcdd9a))
12
+
13
+
14
+
15
+
16
+
17
+ # [3.183.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.182.0...v3.183.0) (2022-10-03)
18
+
19
+
20
+ ### Features
21
+
22
+ * **client-accessanalyzer:** AWS IAM Access Analyzer policy validation introduces new checks for role trust policies. As customers author a policy, IAM Access Analyzer policy validation evaluates the policy for any issues to make it easier for customers to author secure policies. ([b7db053](https://github.com/aws/aws-sdk-js-v3/commit/b7db05377b506e9692582e3b64a2376133b23d11))
23
+
24
+
25
+
26
+
27
+
6
28
  # [3.181.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.180.0...v3.181.0) (2022-09-29)
7
29
 
8
30
 
@@ -229,6 +229,7 @@ var PolicyType;
229
229
  })(PolicyType = exports.PolicyType || (exports.PolicyType = {}));
230
230
  var ValidatePolicyResourceType;
231
231
  (function (ValidatePolicyResourceType) {
232
+ ValidatePolicyResourceType["ROLE_TRUST"] = "AWS::IAM::AssumeRolePolicyDocument";
232
233
  ValidatePolicyResourceType["S3_ACCESS_POINT"] = "AWS::S3::AccessPoint";
233
234
  ValidatePolicyResourceType["S3_BUCKET"] = "AWS::S3::Bucket";
234
235
  ValidatePolicyResourceType["S3_MULTI_REGION_ACCESS_POINT"] = "AWS::S3::MultiRegionAccessPoint";
@@ -3073,10 +3073,10 @@ const deserializeAws_restJson1VpcConfiguration = (output, context) => {
3073
3073
  };
3074
3074
  };
3075
3075
  const deserializeMetadata = (output) => {
3076
- var _a;
3076
+ var _a, _b;
3077
3077
  return ({
3078
3078
  httpStatusCode: output.statusCode,
3079
- requestId: (_a = output.headers["x-amzn-requestid"]) !== null && _a !== void 0 ? _a : output.headers["x-amzn-request-id"],
3079
+ requestId: (_b = (_a = output.headers["x-amzn-requestid"]) !== null && _a !== void 0 ? _a : output.headers["x-amzn-request-id"]) !== null && _b !== void 0 ? _b : output.headers["x-amz-request-id"],
3080
3080
  extendedRequestId: output.headers["x-amz-id-2"],
3081
3081
  cfId: output.headers["x-amz-cf-id"],
3082
3082
  });
@@ -218,6 +218,7 @@ export var PolicyType;
218
218
  })(PolicyType || (PolicyType = {}));
219
219
  export var ValidatePolicyResourceType;
220
220
  (function (ValidatePolicyResourceType) {
221
+ ValidatePolicyResourceType["ROLE_TRUST"] = "AWS::IAM::AssumeRolePolicyDocument";
221
222
  ValidatePolicyResourceType["S3_ACCESS_POINT"] = "AWS::S3::AccessPoint";
222
223
  ValidatePolicyResourceType["S3_BUCKET"] = "AWS::S3::Bucket";
223
224
  ValidatePolicyResourceType["S3_MULTI_REGION_ACCESS_POINT"] = "AWS::S3::MultiRegionAccessPoint";
@@ -3790,10 +3790,10 @@ var deserializeAws_restJson1VpcConfiguration = function (output, context) {
3790
3790
  };
3791
3791
  };
3792
3792
  var deserializeMetadata = function (output) {
3793
- var _a;
3793
+ var _a, _b;
3794
3794
  return ({
3795
3795
  httpStatusCode: output.statusCode,
3796
- requestId: (_a = output.headers["x-amzn-requestid"]) !== null && _a !== void 0 ? _a : output.headers["x-amzn-request-id"],
3796
+ requestId: (_b = (_a = output.headers["x-amzn-requestid"]) !== null && _a !== void 0 ? _a : output.headers["x-amzn-request-id"]) !== null && _b !== void 0 ? _b : output.headers["x-amz-request-id"],
3797
3797
  extendedRequestId: output.headers["x-amz-id-2"],
3798
3798
  cfId: output.headers["x-amz-cf-id"],
3799
3799
  });
@@ -699,8 +699,8 @@ export interface S3PublicAccessBlockConfiguration {
699
699
  * proposed Amazon S3 access point configuration is for an existing bucket, the access preview uses
700
700
  * the proposed access point configuration in place of the existing access points. To propose
701
701
  * an access point without a policy, you can provide an empty string as the access point
702
- * policy. For more information, see <a href="https://docs.aws.amazon.com/https:/docs.aws.amazon.com/AmazonS3/latest/dev/creating-access-points.html">Creating access points</a>. For more information about access point policy limits,
703
- * see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/access-points-restrictions-limitations.html">Access points
702
+ * policy. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/creating-access-points.html">Creating access points</a>.
703
+ * For more information about access point policy limits, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/access-points-restrictions-limitations.html">Access points
704
704
  * restrictions and limitations</a>.</p>
705
705
  */
706
706
  export interface S3AccessPointConfiguration {
@@ -2042,6 +2042,7 @@ export declare enum PolicyType {
2042
2042
  SERVICE_CONTROL_POLICY = "SERVICE_CONTROL_POLICY"
2043
2043
  }
2044
2044
  export declare enum ValidatePolicyResourceType {
2045
+ ROLE_TRUST = "AWS::IAM::AssumeRolePolicyDocument",
2045
2046
  S3_ACCESS_POINT = "AWS::S3::AccessPoint",
2046
2047
  S3_BUCKET = "AWS::S3::Bucket",
2047
2048
  S3_MULTI_REGION_ACCESS_POINT = "AWS::S3::MultiRegionAccessPoint",
@@ -706,6 +706,7 @@ export declare enum PolicyType {
706
706
  SERVICE_CONTROL_POLICY = "SERVICE_CONTROL_POLICY",
707
707
  }
708
708
  export declare enum ValidatePolicyResourceType {
709
+ ROLE_TRUST = "AWS::IAM::AssumeRolePolicyDocument",
709
710
  S3_ACCESS_POINT = "AWS::S3::AccessPoint",
710
711
  S3_BUCKET = "AWS::S3::Bucket",
711
712
  S3_MULTI_REGION_ACCESS_POINT = "AWS::S3::MultiRegionAccessPoint",
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-accessanalyzer",
3
3
  "description": "AWS SDK for JavaScript Accessanalyzer Client for Node.js, Browser and React Native",
4
- "version": "3.181.0",
4
+ "version": "3.185.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
7
7
  "build:cjs": "tsc -p tsconfig.cjs.json",
@@ -19,42 +19,42 @@
19
19
  "dependencies": {
20
20
  "@aws-crypto/sha256-browser": "2.0.0",
21
21
  "@aws-crypto/sha256-js": "2.0.0",
22
- "@aws-sdk/client-sts": "3.181.0",
23
- "@aws-sdk/config-resolver": "3.178.0",
24
- "@aws-sdk/credential-provider-node": "3.181.0",
25
- "@aws-sdk/fetch-http-handler": "3.178.0",
26
- "@aws-sdk/hash-node": "3.178.0",
27
- "@aws-sdk/invalid-dependency": "3.178.0",
28
- "@aws-sdk/middleware-content-length": "3.178.0",
29
- "@aws-sdk/middleware-host-header": "3.178.0",
30
- "@aws-sdk/middleware-logger": "3.178.0",
31
- "@aws-sdk/middleware-recursion-detection": "3.178.0",
32
- "@aws-sdk/middleware-retry": "3.178.0",
33
- "@aws-sdk/middleware-serde": "3.178.0",
34
- "@aws-sdk/middleware-signing": "3.179.0",
35
- "@aws-sdk/middleware-stack": "3.178.0",
36
- "@aws-sdk/middleware-user-agent": "3.178.0",
37
- "@aws-sdk/node-config-provider": "3.178.0",
38
- "@aws-sdk/node-http-handler": "3.178.0",
39
- "@aws-sdk/protocol-http": "3.178.0",
40
- "@aws-sdk/smithy-client": "3.180.0",
41
- "@aws-sdk/types": "3.178.0",
42
- "@aws-sdk/url-parser": "3.178.0",
43
- "@aws-sdk/util-base64-browser": "3.170.0",
44
- "@aws-sdk/util-base64-node": "3.170.0",
45
- "@aws-sdk/util-body-length-browser": "3.170.0",
46
- "@aws-sdk/util-body-length-node": "3.170.0",
47
- "@aws-sdk/util-defaults-mode-browser": "3.180.0",
48
- "@aws-sdk/util-defaults-mode-node": "3.180.0",
49
- "@aws-sdk/util-user-agent-browser": "3.178.0",
50
- "@aws-sdk/util-user-agent-node": "3.178.0",
51
- "@aws-sdk/util-utf8-browser": "3.170.0",
52
- "@aws-sdk/util-utf8-node": "3.170.0",
22
+ "@aws-sdk/client-sts": "3.185.0",
23
+ "@aws-sdk/config-resolver": "3.183.0",
24
+ "@aws-sdk/credential-provider-node": "3.185.0",
25
+ "@aws-sdk/fetch-http-handler": "3.183.0",
26
+ "@aws-sdk/hash-node": "3.183.0",
27
+ "@aws-sdk/invalid-dependency": "3.183.0",
28
+ "@aws-sdk/middleware-content-length": "3.183.0",
29
+ "@aws-sdk/middleware-host-header": "3.183.0",
30
+ "@aws-sdk/middleware-logger": "3.183.0",
31
+ "@aws-sdk/middleware-recursion-detection": "3.183.0",
32
+ "@aws-sdk/middleware-retry": "3.185.0",
33
+ "@aws-sdk/middleware-serde": "3.183.0",
34
+ "@aws-sdk/middleware-signing": "3.183.0",
35
+ "@aws-sdk/middleware-stack": "3.183.0",
36
+ "@aws-sdk/middleware-user-agent": "3.183.0",
37
+ "@aws-sdk/node-config-provider": "3.183.0",
38
+ "@aws-sdk/node-http-handler": "3.185.0",
39
+ "@aws-sdk/protocol-http": "3.183.0",
40
+ "@aws-sdk/smithy-client": "3.183.0",
41
+ "@aws-sdk/types": "3.183.0",
42
+ "@aws-sdk/url-parser": "3.183.0",
43
+ "@aws-sdk/util-base64-browser": "3.183.0",
44
+ "@aws-sdk/util-base64-node": "3.183.0",
45
+ "@aws-sdk/util-body-length-browser": "3.183.0",
46
+ "@aws-sdk/util-body-length-node": "3.183.0",
47
+ "@aws-sdk/util-defaults-mode-browser": "3.183.0",
48
+ "@aws-sdk/util-defaults-mode-node": "3.183.0",
49
+ "@aws-sdk/util-user-agent-browser": "3.183.0",
50
+ "@aws-sdk/util-user-agent-node": "3.183.0",
51
+ "@aws-sdk/util-utf8-browser": "3.183.0",
52
+ "@aws-sdk/util-utf8-node": "3.183.0",
53
53
  "tslib": "^2.3.1",
54
54
  "uuid": "^8.3.2"
55
55
  },
56
56
  "devDependencies": {
57
- "@aws-sdk/service-client-documentation-generator": "3.170.0",
57
+ "@aws-sdk/service-client-documentation-generator": "3.183.0",
58
58
  "@tsconfig/recommended": "1.0.1",
59
59
  "@types/node": "^12.7.5",
60
60
  "@types/uuid": "^8.3.0",