@aws-sdk/client-accessanalyzer 3.194.0 → 3.197.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (150) hide show
  1. package/CHANGELOG.md +23 -0
  2. package/dist-cjs/AccessAnalyzerClient.js +11 -8
  3. package/dist-cjs/commands/ApplyArchiveRuleCommand.js +10 -0
  4. package/dist-cjs/commands/CancelPolicyGenerationCommand.js +10 -0
  5. package/dist-cjs/commands/CreateAccessPreviewCommand.js +10 -0
  6. package/dist-cjs/commands/CreateAnalyzerCommand.js +10 -0
  7. package/dist-cjs/commands/CreateArchiveRuleCommand.js +10 -0
  8. package/dist-cjs/commands/DeleteAnalyzerCommand.js +10 -0
  9. package/dist-cjs/commands/DeleteArchiveRuleCommand.js +10 -0
  10. package/dist-cjs/commands/GetAccessPreviewCommand.js +10 -0
  11. package/dist-cjs/commands/GetAnalyzedResourceCommand.js +10 -0
  12. package/dist-cjs/commands/GetAnalyzerCommand.js +10 -0
  13. package/dist-cjs/commands/GetArchiveRuleCommand.js +10 -0
  14. package/dist-cjs/commands/GetFindingCommand.js +10 -0
  15. package/dist-cjs/commands/GetGeneratedPolicyCommand.js +10 -0
  16. package/dist-cjs/commands/ListAccessPreviewFindingsCommand.js +10 -0
  17. package/dist-cjs/commands/ListAccessPreviewsCommand.js +10 -0
  18. package/dist-cjs/commands/ListAnalyzedResourcesCommand.js +10 -0
  19. package/dist-cjs/commands/ListAnalyzersCommand.js +10 -0
  20. package/dist-cjs/commands/ListArchiveRulesCommand.js +10 -0
  21. package/dist-cjs/commands/ListFindingsCommand.js +10 -0
  22. package/dist-cjs/commands/ListPolicyGenerationsCommand.js +10 -0
  23. package/dist-cjs/commands/ListTagsForResourceCommand.js +10 -0
  24. package/dist-cjs/commands/StartPolicyGenerationCommand.js +10 -0
  25. package/dist-cjs/commands/StartResourceScanCommand.js +10 -0
  26. package/dist-cjs/commands/TagResourceCommand.js +10 -0
  27. package/dist-cjs/commands/UntagResourceCommand.js +10 -0
  28. package/dist-cjs/commands/UpdateArchiveRuleCommand.js +10 -0
  29. package/dist-cjs/commands/UpdateFindingsCommand.js +10 -0
  30. package/dist-cjs/commands/ValidatePolicyCommand.js +10 -0
  31. package/dist-cjs/endpoint/EndpointParameters.js +13 -0
  32. package/dist-cjs/endpoint/endpointResolver.js +12 -0
  33. package/dist-cjs/endpoint/ruleset.js +318 -0
  34. package/dist-cjs/models/models_0.js +93 -3
  35. package/dist-cjs/protocols/Aws_restJson1.js +259 -0
  36. package/dist-cjs/runtimeConfig.shared.js +3 -3
  37. package/dist-es/AccessAnalyzerClient.js +12 -9
  38. package/dist-es/commands/ApplyArchiveRuleCommand.js +10 -0
  39. package/dist-es/commands/CancelPolicyGenerationCommand.js +10 -0
  40. package/dist-es/commands/CreateAccessPreviewCommand.js +10 -0
  41. package/dist-es/commands/CreateAnalyzerCommand.js +10 -0
  42. package/dist-es/commands/CreateArchiveRuleCommand.js +10 -0
  43. package/dist-es/commands/DeleteAnalyzerCommand.js +10 -0
  44. package/dist-es/commands/DeleteArchiveRuleCommand.js +10 -0
  45. package/dist-es/commands/GetAccessPreviewCommand.js +10 -0
  46. package/dist-es/commands/GetAnalyzedResourceCommand.js +10 -0
  47. package/dist-es/commands/GetAnalyzerCommand.js +10 -0
  48. package/dist-es/commands/GetArchiveRuleCommand.js +10 -0
  49. package/dist-es/commands/GetFindingCommand.js +10 -0
  50. package/dist-es/commands/GetGeneratedPolicyCommand.js +10 -0
  51. package/dist-es/commands/ListAccessPreviewFindingsCommand.js +10 -0
  52. package/dist-es/commands/ListAccessPreviewsCommand.js +10 -0
  53. package/dist-es/commands/ListAnalyzedResourcesCommand.js +10 -0
  54. package/dist-es/commands/ListAnalyzersCommand.js +10 -0
  55. package/dist-es/commands/ListArchiveRulesCommand.js +10 -0
  56. package/dist-es/commands/ListFindingsCommand.js +10 -0
  57. package/dist-es/commands/ListPolicyGenerationsCommand.js +10 -0
  58. package/dist-es/commands/ListTagsForResourceCommand.js +10 -0
  59. package/dist-es/commands/StartPolicyGenerationCommand.js +10 -0
  60. package/dist-es/commands/StartResourceScanCommand.js +10 -0
  61. package/dist-es/commands/TagResourceCommand.js +10 -0
  62. package/dist-es/commands/UntagResourceCommand.js +10 -0
  63. package/dist-es/commands/UpdateArchiveRuleCommand.js +10 -0
  64. package/dist-es/commands/UpdateFindingsCommand.js +10 -0
  65. package/dist-es/commands/ValidatePolicyCommand.js +10 -0
  66. package/dist-es/endpoint/EndpointParameters.js +8 -0
  67. package/dist-es/endpoint/endpointResolver.js +8 -0
  68. package/dist-es/endpoint/ruleset.js +315 -0
  69. package/dist-es/models/models_0.js +82 -0
  70. package/dist-es/protocols/Aws_restJson1.js +260 -1
  71. package/dist-es/runtimeConfig.shared.js +2 -2
  72. package/dist-types/AccessAnalyzerClient.d.ts +6 -9
  73. package/dist-types/commands/ApplyArchiveRuleCommand.d.ts +2 -0
  74. package/dist-types/commands/CancelPolicyGenerationCommand.d.ts +2 -0
  75. package/dist-types/commands/CreateAccessPreviewCommand.d.ts +2 -0
  76. package/dist-types/commands/CreateAnalyzerCommand.d.ts +2 -0
  77. package/dist-types/commands/CreateArchiveRuleCommand.d.ts +2 -0
  78. package/dist-types/commands/DeleteAnalyzerCommand.d.ts +2 -0
  79. package/dist-types/commands/DeleteArchiveRuleCommand.d.ts +2 -0
  80. package/dist-types/commands/GetAccessPreviewCommand.d.ts +2 -0
  81. package/dist-types/commands/GetAnalyzedResourceCommand.d.ts +2 -0
  82. package/dist-types/commands/GetAnalyzerCommand.d.ts +2 -0
  83. package/dist-types/commands/GetArchiveRuleCommand.d.ts +2 -0
  84. package/dist-types/commands/GetFindingCommand.d.ts +2 -0
  85. package/dist-types/commands/GetGeneratedPolicyCommand.d.ts +2 -0
  86. package/dist-types/commands/ListAccessPreviewFindingsCommand.d.ts +2 -0
  87. package/dist-types/commands/ListAccessPreviewsCommand.d.ts +2 -0
  88. package/dist-types/commands/ListAnalyzedResourcesCommand.d.ts +2 -0
  89. package/dist-types/commands/ListAnalyzersCommand.d.ts +2 -0
  90. package/dist-types/commands/ListArchiveRulesCommand.d.ts +2 -0
  91. package/dist-types/commands/ListFindingsCommand.d.ts +2 -0
  92. package/dist-types/commands/ListPolicyGenerationsCommand.d.ts +2 -0
  93. package/dist-types/commands/ListTagsForResourceCommand.d.ts +2 -0
  94. package/dist-types/commands/StartPolicyGenerationCommand.d.ts +2 -0
  95. package/dist-types/commands/StartResourceScanCommand.d.ts +2 -0
  96. package/dist-types/commands/TagResourceCommand.d.ts +2 -0
  97. package/dist-types/commands/UntagResourceCommand.d.ts +2 -0
  98. package/dist-types/commands/UpdateArchiveRuleCommand.d.ts +2 -0
  99. package/dist-types/commands/UpdateFindingsCommand.d.ts +2 -0
  100. package/dist-types/commands/ValidatePolicyCommand.d.ts +2 -0
  101. package/dist-types/endpoint/EndpointParameters.d.ts +19 -0
  102. package/dist-types/endpoint/endpointResolver.d.ts +5 -0
  103. package/dist-types/endpoint/ruleset.d.ts +2 -0
  104. package/dist-types/models/models_0.d.ts +475 -5
  105. package/dist-types/runtimeConfig.browser.d.ts +4 -2
  106. package/dist-types/runtimeConfig.d.ts +4 -2
  107. package/dist-types/runtimeConfig.native.d.ts +4 -2
  108. package/dist-types/runtimeConfig.shared.d.ts +3 -1
  109. package/dist-types/ts3.4/AccessAnalyzerClient.d.ts +15 -8
  110. package/dist-types/ts3.4/commands/ApplyArchiveRuleCommand.d.ts +2 -0
  111. package/dist-types/ts3.4/commands/CancelPolicyGenerationCommand.d.ts +2 -0
  112. package/dist-types/ts3.4/commands/CreateAccessPreviewCommand.d.ts +2 -0
  113. package/dist-types/ts3.4/commands/CreateAnalyzerCommand.d.ts +2 -0
  114. package/dist-types/ts3.4/commands/CreateArchiveRuleCommand.d.ts +2 -0
  115. package/dist-types/ts3.4/commands/DeleteAnalyzerCommand.d.ts +2 -0
  116. package/dist-types/ts3.4/commands/DeleteArchiveRuleCommand.d.ts +2 -0
  117. package/dist-types/ts3.4/commands/GetAccessPreviewCommand.d.ts +2 -0
  118. package/dist-types/ts3.4/commands/GetAnalyzedResourceCommand.d.ts +2 -0
  119. package/dist-types/ts3.4/commands/GetAnalyzerCommand.d.ts +2 -0
  120. package/dist-types/ts3.4/commands/GetArchiveRuleCommand.d.ts +2 -0
  121. package/dist-types/ts3.4/commands/GetFindingCommand.d.ts +2 -0
  122. package/dist-types/ts3.4/commands/GetGeneratedPolicyCommand.d.ts +2 -0
  123. package/dist-types/ts3.4/commands/ListAccessPreviewFindingsCommand.d.ts +2 -0
  124. package/dist-types/ts3.4/commands/ListAccessPreviewsCommand.d.ts +2 -0
  125. package/dist-types/ts3.4/commands/ListAnalyzedResourcesCommand.d.ts +2 -0
  126. package/dist-types/ts3.4/commands/ListAnalyzersCommand.d.ts +2 -0
  127. package/dist-types/ts3.4/commands/ListArchiveRulesCommand.d.ts +2 -0
  128. package/dist-types/ts3.4/commands/ListFindingsCommand.d.ts +2 -0
  129. package/dist-types/ts3.4/commands/ListPolicyGenerationsCommand.d.ts +2 -0
  130. package/dist-types/ts3.4/commands/ListTagsForResourceCommand.d.ts +2 -0
  131. package/dist-types/ts3.4/commands/StartPolicyGenerationCommand.d.ts +2 -0
  132. package/dist-types/ts3.4/commands/StartResourceScanCommand.d.ts +2 -0
  133. package/dist-types/ts3.4/commands/TagResourceCommand.d.ts +2 -0
  134. package/dist-types/ts3.4/commands/UntagResourceCommand.d.ts +2 -0
  135. package/dist-types/ts3.4/commands/UpdateArchiveRuleCommand.d.ts +2 -0
  136. package/dist-types/ts3.4/commands/UpdateFindingsCommand.d.ts +2 -0
  137. package/dist-types/ts3.4/commands/ValidatePolicyCommand.d.ts +2 -0
  138. package/dist-types/ts3.4/endpoint/EndpointParameters.d.ts +34 -0
  139. package/dist-types/ts3.4/endpoint/endpointResolver.d.ts +8 -0
  140. package/dist-types/ts3.4/endpoint/ruleset.d.ts +2 -0
  141. package/dist-types/ts3.4/models/models_0.d.ts +227 -0
  142. package/dist-types/ts3.4/runtimeConfig.browser.d.ts +23 -4
  143. package/dist-types/ts3.4/runtimeConfig.d.ts +23 -4
  144. package/dist-types/ts3.4/runtimeConfig.native.d.ts +8 -1
  145. package/dist-types/ts3.4/runtimeConfig.shared.d.ts +6 -1
  146. package/package.json +28 -26
  147. package/dist-cjs/endpoints.js +0 -196
  148. package/dist-es/endpoints.js +0 -192
  149. package/dist-types/endpoints.d.ts +0 -2
  150. package/dist-types/ts3.4/endpoints.d.ts +0 -2
@@ -501,6 +501,127 @@ export interface CancelPolicyGenerationRequest {
501
501
  }
502
502
  export interface CancelPolicyGenerationResponse {
503
503
  }
504
+ /**
505
+ * <p>The proposed access control configuration for an Amazon EBS volume snapshot. You can propose
506
+ * a configuration for a new Amazon EBS volume snapshot or an Amazon EBS volume snapshot that you own by
507
+ * specifying the user IDs, groups, and optional KMS encryption key. For more information,
508
+ * see <a href="https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_ModifySnapshotAttribute.html">ModifySnapshotAttribute</a>.</p>
509
+ */
510
+ export interface EbsSnapshotConfiguration {
511
+ /**
512
+ * <p>The IDs of the Amazon Web Services accounts that have access to the Amazon EBS volume snapshot.</p>
513
+ * <ul>
514
+ * <li>
515
+ * <p>If the configuration is for an existing Amazon EBS volume snapshot and you do not
516
+ * specify the <code>userIds</code>, then the access preview uses the existing shared
517
+ * <code>userIds</code> for the snapshot.</p>
518
+ * </li>
519
+ * <li>
520
+ * <p>If the access preview is for a new resource and you do not specify the
521
+ * <code>userIds</code>, then the access preview considers the snapshot without any
522
+ * <code>userIds</code>.</p>
523
+ * </li>
524
+ * <li>
525
+ * <p>To propose deletion of existing shared <code>accountIds</code>, you can specify an
526
+ * empty list for <code>userIds</code>.</p>
527
+ * </li>
528
+ * </ul>
529
+ */
530
+ userIds?: string[];
531
+ /**
532
+ * <p>The groups that have access to the Amazon EBS volume snapshot. If the value <code>all</code>
533
+ * is specified, then the Amazon EBS volume snapshot is public.</p>
534
+ * <ul>
535
+ * <li>
536
+ * <p>If the configuration is for an existing Amazon EBS volume snapshot and you do not
537
+ * specify the <code>groups</code>, then the access preview uses the existing shared
538
+ * <code>groups</code> for the snapshot.</p>
539
+ * </li>
540
+ * <li>
541
+ * <p>If the access preview is for a new resource and you do not specify the
542
+ * <code>groups</code>, then the access preview considers the snapshot without any
543
+ * <code>groups</code>.</p>
544
+ * </li>
545
+ * <li>
546
+ * <p>To propose deletion of existing shared <code>groups</code>, you can specify an
547
+ * empty list for <code>groups</code>.</p>
548
+ * </li>
549
+ * </ul>
550
+ */
551
+ groups?: string[];
552
+ /**
553
+ * <p>The KMS key identifier for an encrypted Amazon EBS volume snapshot. The KMS key
554
+ * identifier is the key ARN, key ID, alias ARN, or alias name for the KMS key.</p>
555
+ * <ul>
556
+ * <li>
557
+ * <p>If the configuration is for an existing Amazon EBS volume snapshot and you do not
558
+ * specify the <code>kmsKeyId</code>, or you specify an empty string, then the access
559
+ * preview uses the existing <code>kmsKeyId</code> of the snapshot.</p>
560
+ * </li>
561
+ * <li>
562
+ * <p>If the access preview is for a new resource and you do not specify the
563
+ * <code>kmsKeyId</code>, the access preview considers the snapshot as
564
+ * unencrypted.</p>
565
+ * </li>
566
+ * </ul>
567
+ */
568
+ kmsKeyId?: string;
569
+ }
570
+ /**
571
+ * <p>The proposed access control configuration for an Amazon ECR repository. You can propose a
572
+ * configuration for a new Amazon ECR repository or an existing Amazon ECR repository that you own by
573
+ * specifying the Amazon ECR policy. For more information, see <a href="https://docs.aws.amazon.com/AmazonECR/latest/APIReference/API_Repository.html">Repository</a>.</p>
574
+ * <ul>
575
+ * <li>
576
+ * <p>If the configuration is for an existing Amazon ECR repository and you do not specify
577
+ * the Amazon ECR policy, then the access preview uses the existing Amazon ECR policy for the
578
+ * repository.</p>
579
+ * </li>
580
+ * <li>
581
+ * <p>If the access preview is for a new resource and you do not specify the policy,
582
+ * then the access preview assumes an Amazon ECR repository without a policy.</p>
583
+ * </li>
584
+ * <li>
585
+ * <p>To propose deletion of an existing Amazon ECR repository policy, you can specify an
586
+ * empty string for the Amazon ECR policy.</p>
587
+ * </li>
588
+ * </ul>
589
+ */
590
+ export interface EcrRepositoryConfiguration {
591
+ /**
592
+ * <p>The JSON repository policy text to apply to the Amazon ECR repository. For more information,
593
+ * see <a href="https://docs.aws.amazon.com/AmazonECR/latest/userguide/repository-policy-examples.html">Private repository
594
+ * policy examples</a> in the <i>Amazon ECR User Guide</i>.</p>
595
+ */
596
+ repositoryPolicy?: string;
597
+ }
598
+ /**
599
+ * <p>The proposed access control configuration for an Amazon EFS file system. You can propose a
600
+ * configuration for a new Amazon EFS file system or an existing Amazon EFS file system that you own by
601
+ * specifying the Amazon EFS policy. For more information, see <a href="https://docs.aws.amazon.com/efs/latest/ug/using-fs.html">Using file systems in Amazon EFS</a>.</p>
602
+ * <ul>
603
+ * <li>
604
+ * <p>If the configuration is for an existing Amazon EFS file system and you do not specify
605
+ * the Amazon EFS policy, then the access preview uses the existing Amazon EFS policy for the file
606
+ * system.</p>
607
+ * </li>
608
+ * <li>
609
+ * <p>If the access preview is for a new resource and you do not specify the policy,
610
+ * then the access preview assumes an Amazon EFS file system without a policy.</p>
611
+ * </li>
612
+ * <li>
613
+ * <p>To propose deletion of an existing Amazon EFS file system policy, you can specify an
614
+ * empty string for the Amazon EFS policy.</p>
615
+ * </li>
616
+ * </ul>
617
+ */
618
+ export interface EfsFileSystemConfiguration {
619
+ /**
620
+ * <p>The JSON policy definition to apply to the Amazon EFS file system. For more information on
621
+ * the elements that make up a file system policy, see <a href="https://docs.aws.amazon.com/efs/latest/ug/access-control-overview.html#access-control-manage-access-intro-resource-policies">Amazon EFS Resource-based policies</a>.</p>
622
+ */
623
+ fileSystemPolicy?: string;
624
+ }
504
625
  /**
505
626
  * <p>The proposed access control configuration for an IAM role. You can propose a
506
627
  * configuration for a new IAM role or an existing IAM role that you own by specifying the
@@ -613,6 +734,156 @@ export interface KmsKeyConfiguration {
613
734
  */
614
735
  grants?: KmsGrantConfiguration[];
615
736
  }
737
+ /**
738
+ * <p>The values for a manual Amazon RDS DB cluster snapshot attribute.</p>
739
+ */
740
+ export declare type RdsDbClusterSnapshotAttributeValue = RdsDbClusterSnapshotAttributeValue.AccountIdsMember | RdsDbClusterSnapshotAttributeValue.$UnknownMember;
741
+ export declare namespace RdsDbClusterSnapshotAttributeValue {
742
+ /**
743
+ * <p>The Amazon Web Services account IDs that have access to the manual Amazon RDS DB cluster snapshot. If the
744
+ * value <code>all</code> is specified, then the Amazon RDS DB cluster snapshot is public and can
745
+ * be copied or restored by all Amazon Web Services accounts.</p>
746
+ * <ul>
747
+ * <li>
748
+ * <p>If the configuration is for an existing Amazon RDS DB cluster snapshot and you do not
749
+ * specify the <code>accountIds</code> in
750
+ * <code>RdsDbClusterSnapshotAttributeValue</code>, then the access preview uses the
751
+ * existing shared <code>accountIds</code> for the snapshot.</p>
752
+ * </li>
753
+ * <li>
754
+ * <p>If the access preview is for a new resource and you do not specify the specify the
755
+ * <code>accountIds</code> in <code>RdsDbClusterSnapshotAttributeValue</code>, then
756
+ * the access preview considers the snapshot without any attributes.</p>
757
+ * </li>
758
+ * <li>
759
+ * <p>To propose deletion of existing shared <code>accountIds</code>, you can specify an
760
+ * empty list for <code>accountIds</code> in the
761
+ * <code>RdsDbClusterSnapshotAttributeValue</code>.</p>
762
+ * </li>
763
+ * </ul>
764
+ */
765
+ interface AccountIdsMember {
766
+ accountIds: string[];
767
+ $unknown?: never;
768
+ }
769
+ interface $UnknownMember {
770
+ accountIds?: never;
771
+ $unknown: [string, any];
772
+ }
773
+ interface Visitor<T> {
774
+ accountIds: (value: string[]) => T;
775
+ _: (name: string, value: any) => T;
776
+ }
777
+ const visit: <T>(value: RdsDbClusterSnapshotAttributeValue, visitor: Visitor<T>) => T;
778
+ }
779
+ /**
780
+ * <p>The proposed access control configuration for an Amazon RDS DB cluster snapshot. You can
781
+ * propose a configuration for a new Amazon RDS DB cluster snapshot or an Amazon RDS DB cluster snapshot
782
+ * that you own by specifying the <code>RdsDbClusterSnapshotAttributeValue</code> and optional
783
+ * KMS encryption key. For more information, see <a href="https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_ModifyDBClusterSnapshotAttribute.html">ModifyDBClusterSnapshotAttribute</a>.</p>
784
+ */
785
+ export interface RdsDbClusterSnapshotConfiguration {
786
+ /**
787
+ * <p>The names and values of manual DB cluster snapshot attributes. Manual DB cluster
788
+ * snapshot attributes are used to authorize other Amazon Web Services accounts to restore a manual DB
789
+ * cluster snapshot. The only valid value for <code>AttributeName</code> for the attribute map
790
+ * is <code>restore</code>
791
+ * </p>
792
+ */
793
+ attributes?: Record<string, RdsDbClusterSnapshotAttributeValue>;
794
+ /**
795
+ * <p>The KMS key identifier for an encrypted Amazon RDS DB cluster snapshot. The KMS key
796
+ * identifier is the key ARN, key ID, alias ARN, or alias name for the KMS key.</p>
797
+ * <ul>
798
+ * <li>
799
+ * <p>If the configuration is for an existing Amazon RDS DB cluster snapshot and you do not
800
+ * specify the <code>kmsKeyId</code>, or you specify an empty string, then the access
801
+ * preview uses the existing <code>kmsKeyId</code> of the snapshot.</p>
802
+ * </li>
803
+ * <li>
804
+ * <p>If the access preview is for a new resource and you do not specify the specify the
805
+ * <code>kmsKeyId</code>, then the access preview considers the snapshot as
806
+ * unencrypted.</p>
807
+ * </li>
808
+ * </ul>
809
+ */
810
+ kmsKeyId?: string;
811
+ }
812
+ /**
813
+ * <p>The name and values of a manual Amazon RDS DB snapshot attribute. Manual DB snapshot
814
+ * attributes are used to authorize other Amazon Web Services accounts to restore a manual DB
815
+ * snapshot.</p>
816
+ */
817
+ export declare type RdsDbSnapshotAttributeValue = RdsDbSnapshotAttributeValue.AccountIdsMember | RdsDbSnapshotAttributeValue.$UnknownMember;
818
+ export declare namespace RdsDbSnapshotAttributeValue {
819
+ /**
820
+ * <p>The Amazon Web Services account IDs that have access to the manual Amazon RDS DB snapshot. If the value
821
+ * <code>all</code> is specified, then the Amazon RDS DB snapshot is public and can be copied or
822
+ * restored by all Amazon Web Services accounts.</p>
823
+ * <ul>
824
+ * <li>
825
+ * <p>If the configuration is for an existing Amazon RDS DB snapshot and you do not specify
826
+ * the <code>accountIds</code> in <code>RdsDbSnapshotAttributeValue</code>, then the
827
+ * access preview uses the existing shared <code>accountIds</code> for the
828
+ * snapshot.</p>
829
+ * </li>
830
+ * <li>
831
+ * <p>If the access preview is for a new resource and you do not specify the specify the
832
+ * <code>accountIds</code> in <code>RdsDbSnapshotAttributeValue</code>, then the
833
+ * access preview considers the snapshot without any attributes.</p>
834
+ * </li>
835
+ * <li>
836
+ * <p>To propose deletion of an existing shared <code>accountIds</code>, you can specify
837
+ * an empty list for <code>accountIds</code> in the
838
+ * <code>RdsDbSnapshotAttributeValue</code>.</p>
839
+ * </li>
840
+ * </ul>
841
+ */
842
+ interface AccountIdsMember {
843
+ accountIds: string[];
844
+ $unknown?: never;
845
+ }
846
+ interface $UnknownMember {
847
+ accountIds?: never;
848
+ $unknown: [string, any];
849
+ }
850
+ interface Visitor<T> {
851
+ accountIds: (value: string[]) => T;
852
+ _: (name: string, value: any) => T;
853
+ }
854
+ const visit: <T>(value: RdsDbSnapshotAttributeValue, visitor: Visitor<T>) => T;
855
+ }
856
+ /**
857
+ * <p>The proposed access control configuration for an Amazon RDS DB snapshot. You can propose a
858
+ * configuration for a new Amazon RDS DB snapshot or an Amazon RDS DB snapshot that you own by
859
+ * specifying the <code>RdsDbSnapshotAttributeValue</code> and optional KMS encryption key.
860
+ * For more information, see <a href="https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_ModifyDBSnapshotAttribute.html">ModifyDBSnapshotAttribute</a>.</p>
861
+ */
862
+ export interface RdsDbSnapshotConfiguration {
863
+ /**
864
+ * <p>The names and values of manual DB snapshot attributes. Manual DB snapshot attributes are
865
+ * used to authorize other Amazon Web Services accounts to restore a manual DB snapshot. The only valid
866
+ * value for <code>attributeName</code> for the attribute map is restore.</p>
867
+ */
868
+ attributes?: Record<string, RdsDbSnapshotAttributeValue>;
869
+ /**
870
+ * <p>The KMS key identifier for an encrypted Amazon RDS DB snapshot. The KMS key identifier is
871
+ * the key ARN, key ID, alias ARN, or alias name for the KMS key.</p>
872
+ * <ul>
873
+ * <li>
874
+ * <p>If the configuration is for an existing Amazon RDS DB snapshot and you do not specify
875
+ * the <code>kmsKeyId</code>, or you specify an empty string, then the access preview
876
+ * uses the existing <code>kmsKeyId</code> of the snapshot.</p>
877
+ * </li>
878
+ * <li>
879
+ * <p>If the access preview is for a new resource and you do not specify the specify the
880
+ * <code>kmsKeyId</code>, then the access preview considers the snapshot as
881
+ * unencrypted.</p>
882
+ * </li>
883
+ * </ul>
884
+ */
885
+ kmsKeyId?: string;
886
+ }
616
887
  /**
617
888
  * <p>This configuration sets the network origin for the Amazon S3 access point or multi-region
618
889
  * access point to <code>Internet</code>.</p>
@@ -823,9 +1094,9 @@ export interface S3BucketConfiguration {
823
1094
  * deletion of an existing policy, you can specify an empty string. If the proposed
824
1095
  * configuration is for a new secret and you do not specify the KMS key ID, the access
825
1096
  * preview uses the Amazon Web Services managed key <code>aws/secretsmanager</code>. If you specify an empty
826
- * string for the KMS key ID, the access preview uses the Amazon Web Services managed key of the Amazon Web Services
827
- * account. For more information about secret policy limits, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_limits.html">Quotas for
828
- * Secrets Manager.</a>.</p>
1097
+ * string for the KMS key ID, the access preview uses the Amazon Web Services managed key of the
1098
+ * Amazon Web Services account. For more information about secret policy limits, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_limits.html">Quotas
1099
+ * for Secrets Manager.</a>.</p>
829
1100
  */
830
1101
  export interface SecretsManagerSecretConfiguration {
831
1102
  /**
@@ -837,6 +1108,24 @@ export interface SecretsManagerSecretConfiguration {
837
1108
  */
838
1109
  secretPolicy?: string;
839
1110
  }
1111
+ /**
1112
+ * <p>The proposed access control configuration for an Amazon SNS topic. You can propose a
1113
+ * configuration for a new Amazon SNS topic or an existing Amazon SNS topic that you own by specifying
1114
+ * the policy. If the configuration is for an existing Amazon SNS topic and you do not specify the
1115
+ * Amazon SNS policy, then the access preview uses the existing Amazon SNS policy for the topic. If the
1116
+ * access preview is for a new resource and you do not specify the policy, then the access
1117
+ * preview assumes an Amazon SNS topic without a policy. To propose deletion of an existing Amazon SNS
1118
+ * topic policy, you can specify an empty string for the Amazon SNS policy. For more information,
1119
+ * see <a href="https://docs.aws.amazon.com/sns/latest/api/API_Topic.html">Topic</a>.</p>
1120
+ */
1121
+ export interface SnsTopicConfiguration {
1122
+ /**
1123
+ * <p>The JSON policy text that defines who can access an Amazon SNS topic. For more information,
1124
+ * see <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-access-policy-use-cases.html">Example cases for Amazon SNS access control</a> in the <i>Amazon SNS Developer
1125
+ * Guide</i>.</p>
1126
+ */
1127
+ topicPolicy?: string;
1128
+ }
840
1129
  /**
841
1130
  * <p>The proposed access control configuration for an Amazon SQS queue. You can propose a
842
1131
  * configuration for a new Amazon SQS queue or an existing Amazon SQS queue that you own by specifying
@@ -858,16 +1147,73 @@ export interface SqsQueueConfiguration {
858
1147
  * <p>Access control configuration structures for your resource. You specify the configuration
859
1148
  * as a type-value pair. You can specify only one type of access control configuration.</p>
860
1149
  */
861
- export declare type Configuration = Configuration.IamRoleMember | Configuration.KmsKeyMember | Configuration.S3BucketMember | Configuration.SecretsManagerSecretMember | Configuration.SqsQueueMember | Configuration.$UnknownMember;
1150
+ export declare type Configuration = Configuration.EbsSnapshotMember | Configuration.EcrRepositoryMember | Configuration.EfsFileSystemMember | Configuration.IamRoleMember | Configuration.KmsKeyMember | Configuration.RdsDbClusterSnapshotMember | Configuration.RdsDbSnapshotMember | Configuration.S3BucketMember | Configuration.SecretsManagerSecretMember | Configuration.SnsTopicMember | Configuration.SqsQueueMember | Configuration.$UnknownMember;
862
1151
  export declare namespace Configuration {
1152
+ /**
1153
+ * <p>The access control configuration is for an Amazon EBS volume snapshot.</p>
1154
+ */
1155
+ interface EbsSnapshotMember {
1156
+ ebsSnapshot: EbsSnapshotConfiguration;
1157
+ ecrRepository?: never;
1158
+ iamRole?: never;
1159
+ efsFileSystem?: never;
1160
+ kmsKey?: never;
1161
+ rdsDbClusterSnapshot?: never;
1162
+ rdsDbSnapshot?: never;
1163
+ secretsManagerSecret?: never;
1164
+ s3Bucket?: never;
1165
+ snsTopic?: never;
1166
+ sqsQueue?: never;
1167
+ $unknown?: never;
1168
+ }
1169
+ /**
1170
+ * <p>The access control configuration is for an Amazon ECR repository.</p>
1171
+ */
1172
+ interface EcrRepositoryMember {
1173
+ ebsSnapshot?: never;
1174
+ ecrRepository: EcrRepositoryConfiguration;
1175
+ iamRole?: never;
1176
+ efsFileSystem?: never;
1177
+ kmsKey?: never;
1178
+ rdsDbClusterSnapshot?: never;
1179
+ rdsDbSnapshot?: never;
1180
+ secretsManagerSecret?: never;
1181
+ s3Bucket?: never;
1182
+ snsTopic?: never;
1183
+ sqsQueue?: never;
1184
+ $unknown?: never;
1185
+ }
863
1186
  /**
864
1187
  * <p>The access control configuration is for an IAM role. </p>
865
1188
  */
866
1189
  interface IamRoleMember {
1190
+ ebsSnapshot?: never;
1191
+ ecrRepository?: never;
867
1192
  iamRole: IamRoleConfiguration;
1193
+ efsFileSystem?: never;
1194
+ kmsKey?: never;
1195
+ rdsDbClusterSnapshot?: never;
1196
+ rdsDbSnapshot?: never;
1197
+ secretsManagerSecret?: never;
1198
+ s3Bucket?: never;
1199
+ snsTopic?: never;
1200
+ sqsQueue?: never;
1201
+ $unknown?: never;
1202
+ }
1203
+ /**
1204
+ * <p>The access control configuration is for an Amazon EFS file system.</p>
1205
+ */
1206
+ interface EfsFileSystemMember {
1207
+ ebsSnapshot?: never;
1208
+ ecrRepository?: never;
1209
+ iamRole?: never;
1210
+ efsFileSystem: EfsFileSystemConfiguration;
868
1211
  kmsKey?: never;
1212
+ rdsDbClusterSnapshot?: never;
1213
+ rdsDbSnapshot?: never;
869
1214
  secretsManagerSecret?: never;
870
1215
  s3Bucket?: never;
1216
+ snsTopic?: never;
871
1217
  sqsQueue?: never;
872
1218
  $unknown?: never;
873
1219
  }
@@ -875,10 +1221,50 @@ export declare namespace Configuration {
875
1221
  * <p>The access control configuration is for a KMS key. </p>
876
1222
  */
877
1223
  interface KmsKeyMember {
1224
+ ebsSnapshot?: never;
1225
+ ecrRepository?: never;
878
1226
  iamRole?: never;
1227
+ efsFileSystem?: never;
879
1228
  kmsKey: KmsKeyConfiguration;
1229
+ rdsDbClusterSnapshot?: never;
1230
+ rdsDbSnapshot?: never;
880
1231
  secretsManagerSecret?: never;
881
1232
  s3Bucket?: never;
1233
+ snsTopic?: never;
1234
+ sqsQueue?: never;
1235
+ $unknown?: never;
1236
+ }
1237
+ /**
1238
+ * <p>The access control configuration is for an Amazon RDS DB cluster snapshot.</p>
1239
+ */
1240
+ interface RdsDbClusterSnapshotMember {
1241
+ ebsSnapshot?: never;
1242
+ ecrRepository?: never;
1243
+ iamRole?: never;
1244
+ efsFileSystem?: never;
1245
+ kmsKey?: never;
1246
+ rdsDbClusterSnapshot: RdsDbClusterSnapshotConfiguration;
1247
+ rdsDbSnapshot?: never;
1248
+ secretsManagerSecret?: never;
1249
+ s3Bucket?: never;
1250
+ snsTopic?: never;
1251
+ sqsQueue?: never;
1252
+ $unknown?: never;
1253
+ }
1254
+ /**
1255
+ * <p>The access control configuration is for an Amazon RDS DB snapshot.</p>
1256
+ */
1257
+ interface RdsDbSnapshotMember {
1258
+ ebsSnapshot?: never;
1259
+ ecrRepository?: never;
1260
+ iamRole?: never;
1261
+ efsFileSystem?: never;
1262
+ kmsKey?: never;
1263
+ rdsDbClusterSnapshot?: never;
1264
+ rdsDbSnapshot: RdsDbSnapshotConfiguration;
1265
+ secretsManagerSecret?: never;
1266
+ s3Bucket?: never;
1267
+ snsTopic?: never;
882
1268
  sqsQueue?: never;
883
1269
  $unknown?: never;
884
1270
  }
@@ -886,10 +1272,16 @@ export declare namespace Configuration {
886
1272
  * <p>The access control configuration is for a Secrets Manager secret.</p>
887
1273
  */
888
1274
  interface SecretsManagerSecretMember {
1275
+ ebsSnapshot?: never;
1276
+ ecrRepository?: never;
889
1277
  iamRole?: never;
1278
+ efsFileSystem?: never;
890
1279
  kmsKey?: never;
1280
+ rdsDbClusterSnapshot?: never;
1281
+ rdsDbSnapshot?: never;
891
1282
  secretsManagerSecret: SecretsManagerSecretConfiguration;
892
1283
  s3Bucket?: never;
1284
+ snsTopic?: never;
893
1285
  sqsQueue?: never;
894
1286
  $unknown?: never;
895
1287
  }
@@ -897,10 +1289,33 @@ export declare namespace Configuration {
897
1289
  * <p>The access control configuration is for an Amazon S3 Bucket. </p>
898
1290
  */
899
1291
  interface S3BucketMember {
1292
+ ebsSnapshot?: never;
1293
+ ecrRepository?: never;
900
1294
  iamRole?: never;
1295
+ efsFileSystem?: never;
901
1296
  kmsKey?: never;
1297
+ rdsDbClusterSnapshot?: never;
1298
+ rdsDbSnapshot?: never;
902
1299
  secretsManagerSecret?: never;
903
1300
  s3Bucket: S3BucketConfiguration;
1301
+ snsTopic?: never;
1302
+ sqsQueue?: never;
1303
+ $unknown?: never;
1304
+ }
1305
+ /**
1306
+ * <p>The access control configuration is for an Amazon SNS topic</p>
1307
+ */
1308
+ interface SnsTopicMember {
1309
+ ebsSnapshot?: never;
1310
+ ecrRepository?: never;
1311
+ iamRole?: never;
1312
+ efsFileSystem?: never;
1313
+ kmsKey?: never;
1314
+ rdsDbClusterSnapshot?: never;
1315
+ rdsDbSnapshot?: never;
1316
+ secretsManagerSecret?: never;
1317
+ s3Bucket?: never;
1318
+ snsTopic: SnsTopicConfiguration;
904
1319
  sqsQueue?: never;
905
1320
  $unknown?: never;
906
1321
  }
@@ -908,26 +1323,44 @@ export declare namespace Configuration {
908
1323
  * <p>The access control configuration is for an Amazon SQS queue. </p>
909
1324
  */
910
1325
  interface SqsQueueMember {
1326
+ ebsSnapshot?: never;
1327
+ ecrRepository?: never;
911
1328
  iamRole?: never;
1329
+ efsFileSystem?: never;
912
1330
  kmsKey?: never;
1331
+ rdsDbClusterSnapshot?: never;
1332
+ rdsDbSnapshot?: never;
913
1333
  secretsManagerSecret?: never;
914
1334
  s3Bucket?: never;
1335
+ snsTopic?: never;
915
1336
  sqsQueue: SqsQueueConfiguration;
916
1337
  $unknown?: never;
917
1338
  }
918
1339
  interface $UnknownMember {
1340
+ ebsSnapshot?: never;
1341
+ ecrRepository?: never;
919
1342
  iamRole?: never;
1343
+ efsFileSystem?: never;
920
1344
  kmsKey?: never;
1345
+ rdsDbClusterSnapshot?: never;
1346
+ rdsDbSnapshot?: never;
921
1347
  secretsManagerSecret?: never;
922
1348
  s3Bucket?: never;
1349
+ snsTopic?: never;
923
1350
  sqsQueue?: never;
924
1351
  $unknown: [string, any];
925
1352
  }
926
1353
  interface Visitor<T> {
1354
+ ebsSnapshot: (value: EbsSnapshotConfiguration) => T;
1355
+ ecrRepository: (value: EcrRepositoryConfiguration) => T;
927
1356
  iamRole: (value: IamRoleConfiguration) => T;
1357
+ efsFileSystem: (value: EfsFileSystemConfiguration) => T;
928
1358
  kmsKey: (value: KmsKeyConfiguration) => T;
1359
+ rdsDbClusterSnapshot: (value: RdsDbClusterSnapshotConfiguration) => T;
1360
+ rdsDbSnapshot: (value: RdsDbSnapshotConfiguration) => T;
929
1361
  secretsManagerSecret: (value: SecretsManagerSecretConfiguration) => T;
930
1362
  s3Bucket: (value: S3BucketConfiguration) => T;
1363
+ snsTopic: (value: SnsTopicConfiguration) => T;
931
1364
  sqsQueue: (value: SqsQueueConfiguration) => T;
932
1365
  _: (name: string, value: any) => T;
933
1366
  }
@@ -1058,7 +1491,7 @@ export interface GetAnalyzedResourceRequest {
1058
1491
  */
1059
1492
  resourceArn: string | undefined;
1060
1493
  }
1061
- export declare type ResourceType = "AWS::IAM::Role" | "AWS::KMS::Key" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::S3::Bucket" | "AWS::SQS::Queue" | "AWS::SecretsManager::Secret";
1494
+ export declare type ResourceType = "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::EFS::FileSystem" | "AWS::IAM::Role" | "AWS::KMS::Key" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::RDS::DBClusterSnapshot" | "AWS::RDS::DBSnapshot" | "AWS::S3::Bucket" | "AWS::SNS::Topic" | "AWS::SQS::Queue" | "AWS::SecretsManager::Secret";
1062
1495
  export declare type FindingStatus = "ACTIVE" | "ARCHIVED" | "RESOLVED";
1063
1496
  /**
1064
1497
  * <p>Contains details about the analyzed resource.</p>
@@ -1958,6 +2391,11 @@ export interface StartResourceScanRequest {
1958
2391
  * <p>The ARN of the resource to scan.</p>
1959
2392
  */
1960
2393
  resourceArn: string | undefined;
2394
+ /**
2395
+ * <p>The Amazon Web Services account ID that owns the resource. For most Amazon Web Services resources, the owning
2396
+ * account is the account in which the resource was created.</p>
2397
+ */
2398
+ resourceOwnerAccount?: string;
1961
2399
  }
1962
2400
  /**
1963
2401
  * <p>Adds a tag to the specified resource.</p>
@@ -2351,6 +2789,18 @@ export declare const CancelPolicyGenerationRequestFilterSensitiveLog: (obj: Canc
2351
2789
  * @internal
2352
2790
  */
2353
2791
  export declare const CancelPolicyGenerationResponseFilterSensitiveLog: (obj: CancelPolicyGenerationResponse) => any;
2792
+ /**
2793
+ * @internal
2794
+ */
2795
+ export declare const EbsSnapshotConfigurationFilterSensitiveLog: (obj: EbsSnapshotConfiguration) => any;
2796
+ /**
2797
+ * @internal
2798
+ */
2799
+ export declare const EcrRepositoryConfigurationFilterSensitiveLog: (obj: EcrRepositoryConfiguration) => any;
2800
+ /**
2801
+ * @internal
2802
+ */
2803
+ export declare const EfsFileSystemConfigurationFilterSensitiveLog: (obj: EfsFileSystemConfiguration) => any;
2354
2804
  /**
2355
2805
  * @internal
2356
2806
  */
@@ -2367,6 +2817,22 @@ export declare const KmsGrantConfigurationFilterSensitiveLog: (obj: KmsGrantConf
2367
2817
  * @internal
2368
2818
  */
2369
2819
  export declare const KmsKeyConfigurationFilterSensitiveLog: (obj: KmsKeyConfiguration) => any;
2820
+ /**
2821
+ * @internal
2822
+ */
2823
+ export declare const RdsDbClusterSnapshotAttributeValueFilterSensitiveLog: (obj: RdsDbClusterSnapshotAttributeValue) => any;
2824
+ /**
2825
+ * @internal
2826
+ */
2827
+ export declare const RdsDbClusterSnapshotConfigurationFilterSensitiveLog: (obj: RdsDbClusterSnapshotConfiguration) => any;
2828
+ /**
2829
+ * @internal
2830
+ */
2831
+ export declare const RdsDbSnapshotAttributeValueFilterSensitiveLog: (obj: RdsDbSnapshotAttributeValue) => any;
2832
+ /**
2833
+ * @internal
2834
+ */
2835
+ export declare const RdsDbSnapshotConfigurationFilterSensitiveLog: (obj: RdsDbSnapshotConfiguration) => any;
2370
2836
  /**
2371
2837
  * @internal
2372
2838
  */
@@ -2403,6 +2869,10 @@ export declare const S3BucketConfigurationFilterSensitiveLog: (obj: S3BucketConf
2403
2869
  * @internal
2404
2870
  */
2405
2871
  export declare const SecretsManagerSecretConfigurationFilterSensitiveLog: (obj: SecretsManagerSecretConfiguration) => any;
2872
+ /**
2873
+ * @internal
2874
+ */
2875
+ export declare const SnsTopicConfigurationFilterSensitiveLog: (obj: SnsTopicConfiguration) => any;
2406
2876
  /**
2407
2877
  * @internal
2408
2878
  */
@@ -26,8 +26,10 @@ export declare const getRuntimeConfig: (config: AccessAnalyzerClientConfig) => {
26
26
  disableHostPrefix: boolean;
27
27
  logger: import("@aws-sdk/types").Logger;
28
28
  serviceId: string;
29
- regionInfoProvider: import("@aws-sdk/types").RegionInfoProvider;
30
- endpoint?: string | import("@aws-sdk/types").Endpoint | import("@aws-sdk/types").Provider<import("@aws-sdk/types").Endpoint> | undefined;
29
+ endpoint?: ((string | import("@aws-sdk/types").Endpoint | import("@aws-sdk/types").Provider<import("@aws-sdk/types").Endpoint> | import("@aws-sdk/types").EndpointV2 | import("@aws-sdk/types").Provider<import("@aws-sdk/types").EndpointV2>) & (string | import("@aws-sdk/types").Provider<string> | import("@aws-sdk/types").Endpoint | import("@aws-sdk/types").Provider<import("@aws-sdk/types").Endpoint> | import("@aws-sdk/types").EndpointV2 | import("@aws-sdk/types").Provider<import("@aws-sdk/types").EndpointV2>)) | undefined;
30
+ endpointProvider: (endpointParams: import("./endpoint/EndpointParameters").EndpointParameters, context?: {
31
+ logger?: import("@aws-sdk/types").Logger | undefined;
32
+ }) => import("@aws-sdk/types").EndpointV2;
31
33
  tls?: boolean | undefined;
32
34
  retryStrategy?: import("@aws-sdk/types").RetryStrategy | undefined;
33
35
  credentials?: import("@aws-sdk/types").Credentials | import("@aws-sdk/types").Provider<import("@aws-sdk/types").Credentials> | undefined;
@@ -26,8 +26,10 @@ export declare const getRuntimeConfig: (config: AccessAnalyzerClientConfig) => {
26
26
  disableHostPrefix: boolean;
27
27
  logger: import("@aws-sdk/types").Logger;
28
28
  serviceId: string;
29
- regionInfoProvider: import("@aws-sdk/types").RegionInfoProvider;
30
- endpoint?: string | import("@aws-sdk/types").Endpoint | import("@aws-sdk/types").Provider<import("@aws-sdk/types").Endpoint> | undefined;
29
+ endpoint?: ((string | import("@aws-sdk/types").Endpoint | import("@aws-sdk/types").Provider<import("@aws-sdk/types").Endpoint> | import("@aws-sdk/types").EndpointV2 | import("@aws-sdk/types").Provider<import("@aws-sdk/types").EndpointV2>) & (string | import("@aws-sdk/types").Provider<string> | import("@aws-sdk/types").Endpoint | import("@aws-sdk/types").Provider<import("@aws-sdk/types").Endpoint> | import("@aws-sdk/types").EndpointV2 | import("@aws-sdk/types").Provider<import("@aws-sdk/types").EndpointV2>)) | undefined;
30
+ endpointProvider: (endpointParams: import("./endpoint/EndpointParameters").EndpointParameters, context?: {
31
+ logger?: import("@aws-sdk/types").Logger | undefined;
32
+ }) => import("@aws-sdk/types").EndpointV2;
31
33
  tls?: boolean | undefined;
32
34
  retryStrategy?: import("@aws-sdk/types").RetryStrategy | undefined;
33
35
  credentials?: import("@aws-sdk/types").Credentials | import("@aws-sdk/types").Provider<import("@aws-sdk/types").Credentials> | undefined;
@@ -23,10 +23,12 @@ export declare const getRuntimeConfig: (config: AccessAnalyzerClientConfig) => {
23
23
  serviceId: string;
24
24
  region: string | import("@aws-sdk/types").Provider<any>;
25
25
  credentialDefaultProvider: (input: any) => import("@aws-sdk/types").Provider<import("@aws-sdk/types").Credentials>;
26
- regionInfoProvider: import("@aws-sdk/types").RegionInfoProvider;
27
26
  defaultUserAgentProvider: import("@aws-sdk/types").Provider<import("@aws-sdk/types").UserAgent>;
28
27
  defaultsMode: import("@aws-sdk/smithy-client").DefaultsMode | import("@aws-sdk/types").Provider<import("@aws-sdk/smithy-client").DefaultsMode>;
29
- endpoint?: string | import("@aws-sdk/types").Endpoint | import("@aws-sdk/types").Provider<import("@aws-sdk/types").Endpoint> | undefined;
28
+ endpoint?: string | import("@aws-sdk/types").Endpoint | import("@aws-sdk/types").Provider<import("@aws-sdk/types").Endpoint> | import("@aws-sdk/types").EndpointV2 | import("@aws-sdk/types").Provider<import("@aws-sdk/types").EndpointV2> | undefined;
29
+ endpointProvider: (endpointParams: import("./endpoint/EndpointParameters").EndpointParameters, context?: {
30
+ logger?: import("@aws-sdk/types").Logger | undefined;
31
+ }) => import("@aws-sdk/types").EndpointV2;
30
32
  tls?: boolean | undefined;
31
33
  retryStrategy?: import("@aws-sdk/types").RetryStrategy | undefined;
32
34
  credentials?: import("@aws-sdk/types").Credentials | import("@aws-sdk/types").Provider<import("@aws-sdk/types").Credentials> | undefined;