@aws-sdk/client-accessanalyzer 3.28.0 → 3.32.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (60) hide show
  1. package/AccessAnalyzer.ts +17 -20
  2. package/AccessAnalyzerClient.ts +9 -9
  3. package/CHANGELOG.md +35 -0
  4. package/README.md +9 -9
  5. package/commands/CreateAccessPreviewCommand.ts +2 -2
  6. package/commands/CreateArchiveRuleCommand.ts +1 -2
  7. package/commands/DeleteAnalyzerCommand.ts +3 -3
  8. package/commands/GetArchiveRuleCommand.ts +1 -2
  9. package/commands/ListFindingsCommand.ts +1 -2
  10. package/dist/cjs/AccessAnalyzer.js +9 -9
  11. package/dist/cjs/AccessAnalyzer.js.map +1 -1
  12. package/dist/cjs/AccessAnalyzerClient.js +9 -9
  13. package/dist/cjs/commands/CreateAccessPreviewCommand.js +2 -2
  14. package/dist/cjs/commands/CreateArchiveRuleCommand.js +1 -2
  15. package/dist/cjs/commands/CreateArchiveRuleCommand.js.map +1 -1
  16. package/dist/cjs/commands/DeleteAnalyzerCommand.js +3 -3
  17. package/dist/cjs/commands/GetArchiveRuleCommand.js +1 -2
  18. package/dist/cjs/commands/GetArchiveRuleCommand.js.map +1 -1
  19. package/dist/cjs/commands/ListFindingsCommand.js +1 -2
  20. package/dist/cjs/commands/ListFindingsCommand.js.map +1 -1
  21. package/dist/cjs/models/models_0.js.map +1 -1
  22. package/dist/cjs/package.json +31 -31
  23. package/dist/cjs/protocols/Aws_restJson1.js +95 -53
  24. package/dist/cjs/protocols/Aws_restJson1.js.map +1 -1
  25. package/dist/es/AccessAnalyzer.js +9 -9
  26. package/dist/es/AccessAnalyzer.js.map +1 -1
  27. package/dist/es/AccessAnalyzerClient.js +9 -9
  28. package/dist/es/commands/CreateAccessPreviewCommand.js +2 -2
  29. package/dist/es/commands/CreateArchiveRuleCommand.js +1 -2
  30. package/dist/es/commands/CreateArchiveRuleCommand.js.map +1 -1
  31. package/dist/es/commands/DeleteAnalyzerCommand.js +3 -3
  32. package/dist/es/commands/GetArchiveRuleCommand.js +1 -2
  33. package/dist/es/commands/GetArchiveRuleCommand.js.map +1 -1
  34. package/dist/es/commands/ListFindingsCommand.js +1 -2
  35. package/dist/es/commands/ListFindingsCommand.js.map +1 -1
  36. package/dist/es/endpoints.js +1 -2
  37. package/dist/es/endpoints.js.map +1 -1
  38. package/dist/es/models/models_0.js.map +1 -1
  39. package/dist/es/package.json +31 -31
  40. package/dist/es/protocols/Aws_restJson1.js +186 -108
  41. package/dist/es/protocols/Aws_restJson1.js.map +1 -1
  42. package/dist/types/AccessAnalyzer.d.ts +17 -20
  43. package/dist/types/AccessAnalyzerClient.d.ts +9 -9
  44. package/dist/types/commands/CreateAccessPreviewCommand.d.ts +2 -2
  45. package/dist/types/commands/CreateArchiveRuleCommand.d.ts +1 -2
  46. package/dist/types/commands/DeleteAnalyzerCommand.d.ts +3 -3
  47. package/dist/types/commands/GetArchiveRuleCommand.d.ts +1 -2
  48. package/dist/types/commands/ListFindingsCommand.d.ts +1 -2
  49. package/dist/types/models/models_0.d.ts +105 -98
  50. package/dist/types/ts3.4/AccessAnalyzer.d.ts +17 -20
  51. package/dist/types/ts3.4/AccessAnalyzerClient.d.ts +9 -9
  52. package/dist/types/ts3.4/commands/CreateAccessPreviewCommand.d.ts +2 -2
  53. package/dist/types/ts3.4/commands/CreateArchiveRuleCommand.d.ts +1 -2
  54. package/dist/types/ts3.4/commands/DeleteAnalyzerCommand.d.ts +3 -3
  55. package/dist/types/ts3.4/commands/GetArchiveRuleCommand.d.ts +1 -2
  56. package/dist/types/ts3.4/commands/ListFindingsCommand.d.ts +1 -2
  57. package/dist/types/ts3.4/models/models_0.d.ts +105 -98
  58. package/models/models_0.ts +105 -98
  59. package/package.json +31 -31
  60. package/protocols/Aws_restJson1.ts +120 -55
@@ -610,7 +610,7 @@ export type ReasonCode =
610
610
  * <p>Provides more details about the current status of the analyzer. For example, if the
611
611
  * creation for the analyzer fails, a <code>Failed</code> status is returned. For an analyzer
612
612
  * with organization as the type, this failure can be due to an issue with creating the
613
- * service-linked roles required in the member accounts of the AWS organization.</p>
613
+ * service-linked roles required in the member accounts of the Amazon Web Services organization.</p>
614
614
  */
615
615
  export interface StatusReason {
616
616
  /**
@@ -671,10 +671,10 @@ export interface AnalyzerSummary {
671
671
  /**
672
672
  * <p>The status of the analyzer. An <code>Active</code> analyzer successfully monitors
673
673
  * supported resources and generates new findings. The analyzer is <code>Disabled</code> when
674
- * a user action, such as removing trusted access for AWS IAM Access Analyzer from AWS Organizations,
675
- * causes the analyzer to stop generating new findings. The status is <code>Creating</code>
676
- * when the analyzer creation is in progress and <code>Failed</code> when the analyzer
677
- * creation has failed. </p>
674
+ * a user action, such as removing trusted access for Identity and Access Management Access Analyzer from Organizations, causes
675
+ * the analyzer to stop generating new findings. The status is <code>Creating</code> when the
676
+ * analyzer creation is in progress and <code>Failed</code> when the analyzer creation has
677
+ * failed. </p>
678
678
  */
679
679
  status: AnalyzerStatus | string | undefined;
680
680
 
@@ -682,7 +682,7 @@ export interface AnalyzerSummary {
682
682
  * <p>The <code>statusReason</code> provides more details about the current status of the
683
683
  * analyzer. For example, if the creation for the analyzer fails, a <code>Failed</code> status
684
684
  * is returned. For an analyzer with organization as the type, this failure can be due to an
685
- * issue with creating the service-linked roles required in the member accounts of the AWS
685
+ * issue with creating the service-linked roles required in the member accounts of the Amazon Web Services
686
686
  * organization.</p>
687
687
  */
688
688
  statusReason?: StatusReason;
@@ -935,8 +935,8 @@ export interface KmsGrantConfiguration {
935
935
  constraints?: KmsGrantConstraints;
936
936
 
937
937
  /**
938
- * <p> The AWS account under which the grant was issued. The account is used to propose KMS
939
- * grants issued by accounts other than the owner of the key.</p>
938
+ * <p> The Amazon Web Services account under which the grant was issued. The account is used to propose
939
+ * KMS grants issued by accounts other than the owner of the key.</p>
940
940
  */
941
941
  issuingAccount: string | undefined;
942
942
  }
@@ -951,21 +951,21 @@ export namespace KmsGrantConfiguration {
951
951
  }
952
952
 
953
953
  /**
954
- * <p>Proposed access control configuration for a KMS key. You can propose a configuration for
955
- * a new KMS key or an existing KMS key that you own by specifying the key policy and KMS
956
- * grant configuration. If the configuration is for an existing key and you do not specify the
957
- * key policy, the access preview uses the existing policy for the key. If the access preview
958
- * is for a new resource and you do not specify the key policy, then the access preview uses
959
- * the default key policy. The proposed key policy cannot be an empty string. For more
960
- * information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default key
954
+ * <p>Proposed access control configuration for a KMS key. You can propose a configuration
955
+ * for a new KMS key or an existing KMS key that you own by specifying the key policy and
956
+ * KMS grant configuration. If the configuration is for an existing key and you do not
957
+ * specify the key policy, the access preview uses the existing policy for the key. If the
958
+ * access preview is for a new resource and you do not specify the key policy, then the access
959
+ * preview uses the default key policy. The proposed key policy cannot be an empty string. For
960
+ * more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default key
961
961
  * policy</a>. For more information about key policy limits, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/resource-limits.html">Resource
962
962
  * quotas</a>.</p>
963
963
  * <p/>
964
964
  */
965
965
  export interface KmsKeyConfiguration {
966
966
  /**
967
- * <p>Resource policy configuration for the KMS key. The only valid value for the name of the
968
- * key policy is <code>default</code>. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default key
967
+ * <p>Resource policy configuration for the KMS key. The only valid value for the name of
968
+ * the key policy is <code>default</code>. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default key
969
969
  * policy</a>.</p>
970
970
  */
971
971
  keyPolicies?: { [key: string]: string };
@@ -989,8 +989,8 @@ export namespace KmsKeyConfiguration {
989
989
  }
990
990
 
991
991
  /**
992
- * <p>This configuration sets the Amazon S3 access point network origin to
993
- * <code>Internet</code>.</p>
992
+ * <p>This configuration sets the network origin for the Amazon S3 access point or multi-region
993
+ * access point to <code>Internet</code>.</p>
994
994
  */
995
995
  export interface InternetConfiguration {}
996
996
 
@@ -1004,9 +1004,9 @@ export namespace InternetConfiguration {
1004
1004
  }
1005
1005
 
1006
1006
  /**
1007
- * <p> The proposed virtual private cloud (VPC) configuration for the Amazon S3 access point. For
1008
- * more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_control_VpcConfiguration.html">VpcConfiguration</a>.
1009
- * </p>
1007
+ * <p>The proposed virtual private cloud (VPC) configuration for the Amazon S3 access point. VPC
1008
+ * configuration does not apply to multi-region access points. For more information, see
1009
+ * <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_control_VpcConfiguration.html">VpcConfiguration</a>. </p>
1010
1010
  */
1011
1011
  export interface VpcConfiguration {
1012
1012
  /**
@@ -1027,8 +1027,9 @@ export namespace VpcConfiguration {
1027
1027
 
1028
1028
  /**
1029
1029
  * <p>The proposed <code>InternetConfiguration</code> or <code>VpcConfiguration</code> to
1030
- * apply to the Amazon S3 Access point. You can make the access point accessible from the internet,
1031
- * or you can specify that all requests made through that access point must originate from a
1030
+ * apply to the Amazon S3 access point. <code>VpcConfiguration</code> does not apply to
1031
+ * multi-region access points. You can make the access point accessible from the internet, or
1032
+ * you can specify that all requests made through that access point must originate from a
1032
1033
  * specific virtual private cloud (VPC). You can specify only one type of network
1033
1034
  * configuration. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/creating-access-points.html">Creating access
1034
1035
  * points</a>.</p>
@@ -1040,9 +1041,9 @@ export type NetworkOriginConfiguration =
1040
1041
 
1041
1042
  export namespace NetworkOriginConfiguration {
1042
1043
  /**
1043
- * <p> The proposed virtual private cloud (VPC) configuration for the Amazon S3 access point. For
1044
- * more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_control_VpcConfiguration.html">VpcConfiguration</a>.
1045
- * </p>
1044
+ * <p>The proposed virtual private cloud (VPC) configuration for the Amazon S3 access point. VPC
1045
+ * configuration does not apply to multi-region access points. For more information, see
1046
+ * <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_control_VpcConfiguration.html">VpcConfiguration</a>. </p>
1046
1047
  */
1047
1048
  export interface VpcConfigurationMember {
1048
1049
  vpcConfiguration: VpcConfiguration;
@@ -1051,7 +1052,8 @@ export namespace NetworkOriginConfiguration {
1051
1052
  }
1052
1053
 
1053
1054
  /**
1054
- * <p>The configuration for the Amazon S3 access point with an <code>Internet</code> origin.</p>
1055
+ * <p>The configuration for the Amazon S3 access point or multi-region access point with an
1056
+ * <code>Internet</code> origin.</p>
1055
1057
  */
1056
1058
  export interface InternetConfigurationMember {
1057
1059
  vpcConfiguration?: never;
@@ -1094,9 +1096,9 @@ export namespace NetworkOriginConfiguration {
1094
1096
  * proposed configuration is for an existing Amazon S3 bucket and the configuration is not
1095
1097
  * specified, the access preview uses the existing setting. If the proposed configuration is
1096
1098
  * for a new bucket and the configuration is not specified, the access preview uses
1097
- * <code>false</code>. If the proposed configuration is for a new access point and the
1098
- * access point BPA configuration is not specified, the access preview uses <code>true</code>.
1099
- * For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-s3-bucket-publicaccessblockconfiguration.html">PublicAccessBlockConfiguration</a>. </p>
1099
+ * <code>false</code>. If the proposed configuration is for a new access point or
1100
+ * multi-region access point and the access point BPA configuration is not specified, the
1101
+ * access preview uses <code>true</code>. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-s3-bucket-publicaccessblockconfiguration.html">PublicAccessBlockConfiguration</a>. </p>
1100
1102
  */
1101
1103
  export interface S3PublicAccessBlockConfiguration {
1102
1104
  /**
@@ -1121,32 +1123,34 @@ export namespace S3PublicAccessBlockConfiguration {
1121
1123
  }
1122
1124
 
1123
1125
  /**
1124
- * <p>The configuration for an Amazon S3 access point for the bucket. You can propose up to 10
1125
- * access points per bucket. If the proposed Amazon S3 access point configuration is for an
1126
- * existing bucket, the access preview uses the proposed access point configuration in place
1127
- * of the existing access points. To propose an access point without a policy, you can provide
1128
- * an empty string as the access point policy. For more information, see <a href="https://docs.aws.amazon.com/https:/docs.aws.amazon.com/AmazonS3/latest/dev/creating-access-points.html">Creating access points</a>. For more information about access point policy limits,
1126
+ * <p>The configuration for an Amazon S3 access point or multi-region access point for the bucket.
1127
+ * You can propose up to 10 access points or multi-region access points per bucket. If the
1128
+ * proposed Amazon S3 access point configuration is for an existing bucket, the access preview uses
1129
+ * the proposed access point configuration in place of the existing access points. To propose
1130
+ * an access point without a policy, you can provide an empty string as the access point
1131
+ * policy. For more information, see <a href="https://docs.aws.amazon.com/https:/docs.aws.amazon.com/AmazonS3/latest/dev/creating-access-points.html">Creating access points</a>. For more information about access point policy limits,
1129
1132
  * see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/access-points-restrictions-limitations.html">Access points
1130
1133
  * restrictions and limitations</a>.</p>
1131
1134
  */
1132
1135
  export interface S3AccessPointConfiguration {
1133
1136
  /**
1134
- * <p>The access point policy.</p>
1137
+ * <p>The access point or multi-region access point policy.</p>
1135
1138
  */
1136
1139
  accessPointPolicy?: string;
1137
1140
 
1138
1141
  /**
1139
- * <p>The proposed <code>S3PublicAccessBlock</code> configuration to apply to this Amazon S3 Access
1140
- * Point.</p>
1142
+ * <p>The proposed <code>S3PublicAccessBlock</code> configuration to apply to this Amazon S3 access
1143
+ * point or multi-region access point.</p>
1141
1144
  */
1142
1145
  publicAccessBlock?: S3PublicAccessBlockConfiguration;
1143
1146
 
1144
1147
  /**
1145
1148
  * <p>The proposed <code>Internet</code> and <code>VpcConfiguration</code> to apply to this
1146
- * Amazon S3 access point. If the access preview is for a new resource and neither is specified,
1147
- * the access preview uses <code>Internet</code> for the network origin. If the access preview
1148
- * is for an existing resource and neither is specified, the access preview uses the exiting
1149
- * network origin.</p>
1149
+ * Amazon S3 access point. <code>VpcConfiguration</code> does not apply to multi-region access
1150
+ * points. If the access preview is for a new resource and neither is specified, the access
1151
+ * preview uses <code>Internet</code> for the network origin. If the access preview is for an
1152
+ * existing resource and neither is specified, the access preview uses the exiting network
1153
+ * origin.</p>
1150
1154
  */
1151
1155
  networkOrigin?: NetworkOriginConfiguration;
1152
1156
  }
@@ -1169,7 +1173,7 @@ export type AclGrantee = AclGrantee.IdMember | AclGrantee.UriMember | AclGrantee
1169
1173
 
1170
1174
  export namespace AclGrantee {
1171
1175
  /**
1172
- * <p>The value specified is the canonical user ID of an AWS account.</p>
1176
+ * <p>The value specified is the canonical user ID of an Amazon Web Services account.</p>
1173
1177
  */
1174
1178
  export interface IdMember {
1175
1179
  id: string;
@@ -1252,13 +1256,13 @@ export namespace S3BucketAclGrantConfiguration {
1252
1256
  /**
1253
1257
  * <p>Proposed access control configuration for an Amazon S3 bucket. You can propose a
1254
1258
  * configuration for a new Amazon S3 bucket or an existing Amazon S3 bucket that you own by specifying
1255
- * the Amazon S3 bucket policy, bucket ACLs, bucket BPA settings, and Amazon S3 access points attached
1256
- * to the bucket. If the configuration is for an existing Amazon S3 bucket and you do not specify
1257
- * the Amazon S3 bucket policy, the access preview uses the existing policy attached to the bucket.
1258
- * If the access preview is for a new resource and you do not specify the Amazon S3 bucket policy,
1259
- * the access preview assumes a bucket without a policy. To propose deletion of an existing
1260
- * bucket policy, you can specify an empty string. For more information about bucket policy
1261
- * limits, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/example-bucket-policies.html">Bucket Policy
1259
+ * the Amazon S3 bucket policy, bucket ACLs, bucket BPA settings, Amazon S3 access points, and
1260
+ * multi-region access points attached to the bucket. If the configuration is for an existing
1261
+ * Amazon S3 bucket and you do not specify the Amazon S3 bucket policy, the access preview uses the
1262
+ * existing policy attached to the bucket. If the access preview is for a new resource and you
1263
+ * do not specify the Amazon S3 bucket policy, the access preview assumes a bucket without a
1264
+ * policy. To propose deletion of an existing bucket policy, you can specify an empty string.
1265
+ * For more information about bucket policy limits, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/example-bucket-policies.html">Bucket Policy
1262
1266
  * Examples</a>.</p>
1263
1267
  */
1264
1268
  export interface S3BucketConfiguration {
@@ -1281,7 +1285,8 @@ export interface S3BucketConfiguration {
1281
1285
  bucketPublicAccessBlock?: S3PublicAccessBlockConfiguration;
1282
1286
 
1283
1287
  /**
1284
- * <p>The configuration of Amazon S3 access points for the bucket.</p>
1288
+ * <p>The configuration of Amazon S3 access points or multi-region access points for the bucket.
1289
+ * You can propose up to 10 new access points per bucket.</p>
1285
1290
  */
1286
1291
  accessPoints?: { [key: string]: S3AccessPointConfiguration };
1287
1292
  }
@@ -1315,15 +1320,15 @@ export namespace S3BucketConfiguration {
1315
1320
  * existing policy for the secret. If the access preview is for a new resource and you do not
1316
1321
  * specify the policy, the access preview assumes a secret without a policy. To propose
1317
1322
  * deletion of an existing policy, you can specify an empty string. If the proposed
1318
- * configuration is for a new secret and you do not specify the KMS key ID, the access preview
1319
- * uses the default CMK of the AWS account. If you specify an empty string for the KMS key
1320
- * ID, the access preview uses the default CMK of the AWS account. For more information
1321
- * about secret policy limits, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_limits.html">Quotas for AWS Secrets
1322
- * Manager.</a>.</p>
1323
+ * configuration is for a new secret and you do not specify the KMS key ID, the access
1324
+ * preview uses the default CMK of the Amazon Web Services account. If you specify an empty string for the
1325
+ * KMS key ID, the access preview uses the default CMK of the Amazon Web Services account. For more
1326
+ * information about secret policy limits, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_limits.html">Quotas for
1327
+ * Secrets Manager.</a>.</p>
1323
1328
  */
1324
1329
  export interface SecretsManagerSecretConfiguration {
1325
1330
  /**
1326
- * <p>The proposed ARN, key ID, or alias of the AWS KMS customer master key (CMK).</p>
1331
+ * <p>The proposed ARN, key ID, or alias of the KMS customer master key (CMK).</p>
1327
1332
  */
1328
1333
  kmsKeyId?: string;
1329
1334
 
@@ -1343,19 +1348,19 @@ export namespace SecretsManagerSecretConfiguration {
1343
1348
  }
1344
1349
 
1345
1350
  /**
1346
- * <p>The proposed access control configuration for an SQS queue. You can propose a
1347
- * configuration for a new SQS queue or an existing SQS queue that you own by specifying the
1348
- * SQS policy. If the configuration is for an existing SQS queue and you do not specify the
1349
- * SQS policy, the access preview uses the existing SQS policy for the queue. If the access
1350
- * preview is for a new resource and you do not specify the policy, the access preview assumes
1351
- * an SQS queue without a policy. To propose deletion of an existing SQS queue policy, you can
1352
- * specify an empty string for the SQS policy. For more information about SQS policy limits,
1353
- * see <a href="https://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/quotas-policies.html">Quotas related
1351
+ * <p>The proposed access control configuration for an Amazon SQS queue. You can propose a
1352
+ * configuration for a new Amazon SQS queue or an existing Amazon SQS queue that you own by specifying
1353
+ * the Amazon SQS policy. If the configuration is for an existing Amazon SQS queue and you do not
1354
+ * specify the Amazon SQS policy, the access preview uses the existing Amazon SQS policy for the queue.
1355
+ * If the access preview is for a new resource and you do not specify the policy, the access
1356
+ * preview assumes an Amazon SQS queue without a policy. To propose deletion of an existing Amazon SQS
1357
+ * queue policy, you can specify an empty string for the Amazon SQS policy. For more information
1358
+ * about Amazon SQS policy limits, see <a href="https://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/quotas-policies.html">Quotas related
1354
1359
  * to policies</a>.</p>
1355
1360
  */
1356
1361
  export interface SqsQueueConfiguration {
1357
1362
  /**
1358
- * <p> The proposed resource policy for the SQS queue. </p>
1363
+ * <p> The proposed resource policy for the Amazon SQS queue. </p>
1359
1364
  */
1360
1365
  queuePolicy?: string;
1361
1366
  }
@@ -1431,7 +1436,7 @@ export namespace Configuration {
1431
1436
  }
1432
1437
 
1433
1438
  /**
1434
- * <p>The access control configuration is for an SQS queue. </p>
1439
+ * <p>The access control configuration is for an Amazon SQS queue. </p>
1435
1440
  */
1436
1441
  export interface SqsQueueMember {
1437
1442
  iamRole?: never;
@@ -1772,7 +1777,7 @@ export interface AnalyzedResource {
1772
1777
  status?: FindingStatus | string;
1773
1778
 
1774
1779
  /**
1775
- * <p>The AWS account ID that owns the resource.</p>
1780
+ * <p>The Amazon Web Services account ID that owns the resource.</p>
1776
1781
  */
1777
1782
  resourceOwnerAccount: string | undefined;
1778
1783
 
@@ -1796,8 +1801,8 @@ export namespace AnalyzedResource {
1796
1801
  */
1797
1802
  export interface GetAnalyzedResourceResponse {
1798
1803
  /**
1799
- * <p>An <code>AnalyzedResource</code> object that contains information that Access Analyzer found
1800
- * when it analyzed the resource.</p>
1804
+ * <p>An <code>AnalyzedResource</code> object that contains information that IAM Access Analyzer
1805
+ * found when it analyzed the resource.</p>
1801
1806
  */
1802
1807
  resource?: AnalyzedResource;
1803
1808
  }
@@ -1842,7 +1847,8 @@ export namespace GetFindingRequest {
1842
1847
  */
1843
1848
  export interface FindingSourceDetail {
1844
1849
  /**
1845
- * <p>The ARN of the access point that generated the finding.</p>
1850
+ * <p>The ARN of the access point that generated the finding. The ARN format depends on
1851
+ * whether the ARN represents an access point or a multi-region access point.</p>
1846
1852
  */
1847
1853
  accessPointArn?: string;
1848
1854
  }
@@ -1946,7 +1952,7 @@ export interface Finding {
1946
1952
  status: FindingStatus | string | undefined;
1947
1953
 
1948
1954
  /**
1949
- * <p>The AWS account ID that owns the resource.</p>
1955
+ * <p>The Amazon Web Services account ID that owns the resource.</p>
1950
1956
  */
1951
1957
  resourceOwnerAccount: string | undefined;
1952
1958
 
@@ -2011,8 +2017,8 @@ export interface GetGeneratedPolicyRequest {
2011
2017
  /**
2012
2018
  * <p>The level of detail that you want to generate. You can specify whether to generate
2013
2019
  * service-level policies. </p>
2014
- * <p>Access Analyzer uses <code>iam:servicelastaccessed</code> to identify services that have been
2015
- * used recently to create this service-level template.</p>
2020
+ * <p>IAM Access Analyzer uses <code>iam:servicelastaccessed</code> to identify services that have
2021
+ * been used recently to create this service-level template.</p>
2016
2022
  */
2017
2023
  includeServiceLevelTemplate?: boolean;
2018
2024
  }
@@ -2063,7 +2069,7 @@ export interface TrailProperties {
2063
2069
 
2064
2070
  /**
2065
2071
  * <p>Possible values are <code>true</code> or <code>false</code>. If set to
2066
- * <code>true</code>, Access Analyzer retrieves CloudTrail data from all regions to analyze and
2072
+ * <code>true</code>, IAM Access Analyzer retrieves CloudTrail data from all regions to analyze and
2067
2073
  * generate a policy.</p>
2068
2074
  */
2069
2075
  allRegions?: boolean;
@@ -2089,13 +2095,13 @@ export interface CloudTrailProperties {
2089
2095
  trailProperties: TrailProperties[] | undefined;
2090
2096
 
2091
2097
  /**
2092
- * <p>The start of the time range for which Access Analyzer reviews your CloudTrail events. Events
2098
+ * <p>The start of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events
2093
2099
  * with a timestamp before this time are not considered to generate a policy.</p>
2094
2100
  */
2095
2101
  startTime: Date | undefined;
2096
2102
 
2097
2103
  /**
2098
- * <p>The end of the time range for which Access Analyzer reviews your CloudTrail events. Events with
2104
+ * <p>The end of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events with
2099
2105
  * a timestamp after this time are not considered to generate a policy. If this is not
2100
2106
  * included in the request, the default value is the current time.</p>
2101
2107
  */
@@ -2116,9 +2122,9 @@ export namespace CloudTrailProperties {
2116
2122
  */
2117
2123
  export interface GeneratedPolicyProperties {
2118
2124
  /**
2119
- * <p>This value is set to <code>true</code> if the generated policy contains all possible actions for a
2120
- * service that Access Analyzer identified from the CloudTrail trail that you specified, and
2121
- * <code>false</code> otherwise.</p>
2125
+ * <p>This value is set to <code>true</code> if the generated policy contains all possible
2126
+ * actions for a service that IAM Access Analyzer identified from the CloudTrail trail that you specified,
2127
+ * and <code>false</code> otherwise.</p>
2122
2128
  */
2123
2129
  isComplete?: boolean;
2124
2130
 
@@ -2235,7 +2241,7 @@ export interface JobDetails {
2235
2241
  completedOn?: Date;
2236
2242
 
2237
2243
  /**
2238
- * <p>Contains the details about the policy generation error.</p>
2244
+ * <p>The job error for the policy generation request.</p>
2239
2245
  */
2240
2246
  jobError?: JobError;
2241
2247
  }
@@ -2327,7 +2333,8 @@ export interface AccessPreviewFinding {
2327
2333
  id: string | undefined;
2328
2334
 
2329
2335
  /**
2330
- * <p>The existing ID of the finding in Access Analyzer, provided only for existing findings.</p>
2336
+ * <p>The existing ID of the finding in IAM Access Analyzer, provided only for existing
2337
+ * findings.</p>
2331
2338
  */
2332
2339
  existingFindingId?: string;
2333
2340
 
@@ -2376,7 +2383,7 @@ export interface AccessPreviewFinding {
2376
2383
 
2377
2384
  /**
2378
2385
  * <p>Provides context on how the access preview finding compares to existing access
2379
- * identified in Access Analyzer.</p>
2386
+ * identified in IAM Access Analyzer.</p>
2380
2387
  * <ul>
2381
2388
  * <li>
2382
2389
  * <p>
@@ -2409,7 +2416,7 @@ export interface AccessPreviewFinding {
2409
2416
  status: FindingStatus | string | undefined;
2410
2417
 
2411
2418
  /**
2412
- * <p>The AWS account ID that owns the resource. For most AWS resources, the owning
2419
+ * <p>The Amazon Web Services account ID that owns the resource. For most Amazon Web Services resources, the owning
2413
2420
  * account is the account in which the resource was created.</p>
2414
2421
  */
2415
2422
  resourceOwnerAccount: string | undefined;
@@ -2606,7 +2613,7 @@ export interface AnalyzedResourceSummary {
2606
2613
  resourceArn: string | undefined;
2607
2614
 
2608
2615
  /**
2609
- * <p>The AWS account ID that owns the resource.</p>
2616
+ * <p>The Amazon Web Services account ID that owns the resource.</p>
2610
2617
  */
2611
2618
  resourceOwnerAccount: string | undefined;
2612
2619
 
@@ -2778,7 +2785,7 @@ export interface FindingSummary {
2778
2785
  status: FindingStatus | string | undefined;
2779
2786
 
2780
2787
  /**
2781
- * <p>The AWS account ID that owns the resource.</p>
2788
+ * <p>The Amazon Web Services account ID that owns the resource.</p>
2782
2789
  */
2783
2790
  resourceOwnerAccount: string | undefined;
2784
2791
 
@@ -2975,7 +2982,7 @@ export interface Trail {
2975
2982
 
2976
2983
  /**
2977
2984
  * <p>Possible values are <code>true</code> or <code>false</code>. If set to
2978
- * <code>true</code>, Access Analyzer retrieves CloudTrail data from all regions to analyze and
2985
+ * <code>true</code>, IAM Access Analyzer retrieves CloudTrail data from all regions to analyze and
2979
2986
  * generate a policy.</p>
2980
2987
  */
2981
2988
  allRegions?: boolean;
@@ -3000,19 +3007,19 @@ export interface CloudTrailDetails {
3000
3007
  trails: Trail[] | undefined;
3001
3008
 
3002
3009
  /**
3003
- * <p>The ARN of the service role that Access Analyzer uses to access your CloudTrail trail and
3010
+ * <p>The ARN of the service role that IAM Access Analyzer uses to access your CloudTrail trail and
3004
3011
  * service last accessed information.</p>
3005
3012
  */
3006
3013
  accessRole: string | undefined;
3007
3014
 
3008
3015
  /**
3009
- * <p>The start of the time range for which Access Analyzer reviews your CloudTrail events. Events
3016
+ * <p>The start of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events
3010
3017
  * with a timestamp before this time are not considered to generate a policy.</p>
3011
3018
  */
3012
3019
  startTime: Date | undefined;
3013
3020
 
3014
3021
  /**
3015
- * <p>The end of the time range for which Access Analyzer reviews your CloudTrail events. Events with
3022
+ * <p>The end of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events with
3016
3023
  * a timestamp after this time are not considered to generate a policy. If this is not
3017
3024
  * included in the request, the default value is the current time.</p>
3018
3025
  */
@@ -3067,7 +3074,7 @@ export interface StartPolicyGenerationRequest {
3067
3074
  * request, if the original request completes successfully, the subsequent retries with the
3068
3075
  * same client token return the result from the original successful request and they have no
3069
3076
  * additional effect.</p>
3070
- * <p>If you do not specify a client token, one is automatically generated by the AWS
3077
+ * <p>If you do not specify a client token, one is automatically generated by the Amazon Web Services
3071
3078
  * SDK.</p>
3072
3079
  */
3073
3080
  clientToken?: string;
@@ -3290,12 +3297,12 @@ export interface ValidatePolicyRequest {
3290
3297
  /**
3291
3298
  * <p>The type of policy to validate. Identity policies grant permissions to IAM principals.
3292
3299
  * Identity policies include managed and inline policies for IAM roles, users, and groups.
3293
- * They also include service-control policies (SCPs) that are attached to an AWS
3300
+ * They also include service-control policies (SCPs) that are attached to an Amazon Web Services
3294
3301
  * organization, organizational unit (OU), or an account.</p>
3295
- * <p>Resource policies grant permissions on AWS resources. Resource policies include trust
3296
- * policies for IAM roles and bucket policies for S3 buckets. You can provide a generic input
3297
- * such as identity policy or resource policy or a specific input such as managed policy or S3
3298
- * bucket policy. </p>
3302
+ * <p>Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust
3303
+ * policies for IAM roles and bucket policies for Amazon S3 buckets. You can provide a generic
3304
+ * input such as identity policy or resource policy or a specific input such as managed policy
3305
+ * or Amazon S3 bucket policy. </p>
3299
3306
  */
3300
3307
  policyType: PolicyType | string | undefined;
3301
3308
  }
@@ -3563,7 +3570,7 @@ export namespace ValidatePolicyFinding {
3563
3570
 
3564
3571
  export interface ValidatePolicyResponse {
3565
3572
  /**
3566
- * <p>The list of findings in a policy returned by Access Analyzer based on its suite of policy
3573
+ * <p>The list of findings in a policy returned by IAM Access Analyzer based on its suite of policy
3567
3574
  * checks.</p>
3568
3575
  */
3569
3576
  findings: ValidatePolicyFinding[] | undefined;
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-accessanalyzer",
3
3
  "description": "AWS SDK for JavaScript Accessanalyzer Client for Node.js, Browser and React Native",
4
- "version": "3.28.0",
4
+ "version": "3.32.0",
5
5
  "scripts": {
6
6
  "clean": "yarn remove-definitions && yarn remove-dist && yarn remove-documentation",
7
7
  "build-documentation": "yarn remove-documentation && typedoc ./",
@@ -27,39 +27,39 @@
27
27
  "dependencies": {
28
28
  "@aws-crypto/sha256-browser": "^1.0.0",
29
29
  "@aws-crypto/sha256-js": "^1.0.0",
30
- "@aws-sdk/client-sts": "3.28.0",
31
- "@aws-sdk/config-resolver": "3.28.0",
32
- "@aws-sdk/credential-provider-node": "3.28.0",
33
- "@aws-sdk/fetch-http-handler": "3.25.0",
34
- "@aws-sdk/hash-node": "3.25.0",
35
- "@aws-sdk/invalid-dependency": "3.25.0",
36
- "@aws-sdk/middleware-content-length": "3.25.0",
37
- "@aws-sdk/middleware-host-header": "3.25.0",
38
- "@aws-sdk/middleware-logger": "3.25.0",
39
- "@aws-sdk/middleware-retry": "3.28.0",
40
- "@aws-sdk/middleware-serde": "3.25.0",
41
- "@aws-sdk/middleware-signing": "3.28.0",
42
- "@aws-sdk/middleware-stack": "3.25.0",
43
- "@aws-sdk/middleware-user-agent": "3.25.0",
44
- "@aws-sdk/node-config-provider": "3.28.0",
45
- "@aws-sdk/node-http-handler": "3.25.0",
46
- "@aws-sdk/protocol-http": "3.25.0",
47
- "@aws-sdk/smithy-client": "3.28.0",
48
- "@aws-sdk/types": "3.25.0",
49
- "@aws-sdk/url-parser": "3.25.0",
50
- "@aws-sdk/util-base64-browser": "3.23.0",
51
- "@aws-sdk/util-base64-node": "3.23.0",
52
- "@aws-sdk/util-body-length-browser": "3.23.0",
53
- "@aws-sdk/util-body-length-node": "3.23.0",
54
- "@aws-sdk/util-user-agent-browser": "3.25.0",
55
- "@aws-sdk/util-user-agent-node": "3.28.0",
56
- "@aws-sdk/util-utf8-browser": "3.23.0",
57
- "@aws-sdk/util-utf8-node": "3.23.0",
30
+ "@aws-sdk/client-sts": "3.32.0",
31
+ "@aws-sdk/config-resolver": "3.32.0",
32
+ "@aws-sdk/credential-provider-node": "3.32.0",
33
+ "@aws-sdk/fetch-http-handler": "3.32.0",
34
+ "@aws-sdk/hash-node": "3.32.0",
35
+ "@aws-sdk/invalid-dependency": "3.32.0",
36
+ "@aws-sdk/middleware-content-length": "3.32.0",
37
+ "@aws-sdk/middleware-host-header": "3.32.0",
38
+ "@aws-sdk/middleware-logger": "3.32.0",
39
+ "@aws-sdk/middleware-retry": "3.32.0",
40
+ "@aws-sdk/middleware-serde": "3.32.0",
41
+ "@aws-sdk/middleware-signing": "3.32.0",
42
+ "@aws-sdk/middleware-stack": "3.32.0",
43
+ "@aws-sdk/middleware-user-agent": "3.32.0",
44
+ "@aws-sdk/node-config-provider": "3.32.0",
45
+ "@aws-sdk/node-http-handler": "3.32.0",
46
+ "@aws-sdk/protocol-http": "3.32.0",
47
+ "@aws-sdk/smithy-client": "3.32.0",
48
+ "@aws-sdk/types": "3.32.0",
49
+ "@aws-sdk/url-parser": "3.32.0",
50
+ "@aws-sdk/util-base64-browser": "3.32.0",
51
+ "@aws-sdk/util-base64-node": "3.32.0",
52
+ "@aws-sdk/util-body-length-browser": "3.32.0",
53
+ "@aws-sdk/util-body-length-node": "3.32.0",
54
+ "@aws-sdk/util-user-agent-browser": "3.32.0",
55
+ "@aws-sdk/util-user-agent-node": "3.32.0",
56
+ "@aws-sdk/util-utf8-browser": "3.32.0",
57
+ "@aws-sdk/util-utf8-node": "3.32.0",
58
58
  "tslib": "^2.3.0",
59
59
  "uuid": "^8.3.2"
60
60
  },
61
61
  "devDependencies": {
62
- "@aws-sdk/client-documentation-generator": "3.23.0",
62
+ "@aws-sdk/client-documentation-generator": "3.32.0",
63
63
  "@types/node": "^12.7.5",
64
64
  "@types/uuid": "^8.3.0",
65
65
  "downlevel-dts": "0.7.0",
@@ -67,7 +67,7 @@
67
67
  "rimraf": "^3.0.0",
68
68
  "ts-jest": "^26.4.1",
69
69
  "typedoc": "^0.19.2",
70
- "typescript": "~4.3.2"
70
+ "typescript": "~4.3.5"
71
71
  },
72
72
  "engines": {
73
73
  "node": ">=10.0.0"