@aws-sdk/client-accessanalyzer 3.28.0 → 3.32.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (60) hide show
  1. package/AccessAnalyzer.ts +17 -20
  2. package/AccessAnalyzerClient.ts +9 -9
  3. package/CHANGELOG.md +35 -0
  4. package/README.md +9 -9
  5. package/commands/CreateAccessPreviewCommand.ts +2 -2
  6. package/commands/CreateArchiveRuleCommand.ts +1 -2
  7. package/commands/DeleteAnalyzerCommand.ts +3 -3
  8. package/commands/GetArchiveRuleCommand.ts +1 -2
  9. package/commands/ListFindingsCommand.ts +1 -2
  10. package/dist/cjs/AccessAnalyzer.js +9 -9
  11. package/dist/cjs/AccessAnalyzer.js.map +1 -1
  12. package/dist/cjs/AccessAnalyzerClient.js +9 -9
  13. package/dist/cjs/commands/CreateAccessPreviewCommand.js +2 -2
  14. package/dist/cjs/commands/CreateArchiveRuleCommand.js +1 -2
  15. package/dist/cjs/commands/CreateArchiveRuleCommand.js.map +1 -1
  16. package/dist/cjs/commands/DeleteAnalyzerCommand.js +3 -3
  17. package/dist/cjs/commands/GetArchiveRuleCommand.js +1 -2
  18. package/dist/cjs/commands/GetArchiveRuleCommand.js.map +1 -1
  19. package/dist/cjs/commands/ListFindingsCommand.js +1 -2
  20. package/dist/cjs/commands/ListFindingsCommand.js.map +1 -1
  21. package/dist/cjs/models/models_0.js.map +1 -1
  22. package/dist/cjs/package.json +31 -31
  23. package/dist/cjs/protocols/Aws_restJson1.js +95 -53
  24. package/dist/cjs/protocols/Aws_restJson1.js.map +1 -1
  25. package/dist/es/AccessAnalyzer.js +9 -9
  26. package/dist/es/AccessAnalyzer.js.map +1 -1
  27. package/dist/es/AccessAnalyzerClient.js +9 -9
  28. package/dist/es/commands/CreateAccessPreviewCommand.js +2 -2
  29. package/dist/es/commands/CreateArchiveRuleCommand.js +1 -2
  30. package/dist/es/commands/CreateArchiveRuleCommand.js.map +1 -1
  31. package/dist/es/commands/DeleteAnalyzerCommand.js +3 -3
  32. package/dist/es/commands/GetArchiveRuleCommand.js +1 -2
  33. package/dist/es/commands/GetArchiveRuleCommand.js.map +1 -1
  34. package/dist/es/commands/ListFindingsCommand.js +1 -2
  35. package/dist/es/commands/ListFindingsCommand.js.map +1 -1
  36. package/dist/es/endpoints.js +1 -2
  37. package/dist/es/endpoints.js.map +1 -1
  38. package/dist/es/models/models_0.js.map +1 -1
  39. package/dist/es/package.json +31 -31
  40. package/dist/es/protocols/Aws_restJson1.js +186 -108
  41. package/dist/es/protocols/Aws_restJson1.js.map +1 -1
  42. package/dist/types/AccessAnalyzer.d.ts +17 -20
  43. package/dist/types/AccessAnalyzerClient.d.ts +9 -9
  44. package/dist/types/commands/CreateAccessPreviewCommand.d.ts +2 -2
  45. package/dist/types/commands/CreateArchiveRuleCommand.d.ts +1 -2
  46. package/dist/types/commands/DeleteAnalyzerCommand.d.ts +3 -3
  47. package/dist/types/commands/GetArchiveRuleCommand.d.ts +1 -2
  48. package/dist/types/commands/ListFindingsCommand.d.ts +1 -2
  49. package/dist/types/models/models_0.d.ts +105 -98
  50. package/dist/types/ts3.4/AccessAnalyzer.d.ts +17 -20
  51. package/dist/types/ts3.4/AccessAnalyzerClient.d.ts +9 -9
  52. package/dist/types/ts3.4/commands/CreateAccessPreviewCommand.d.ts +2 -2
  53. package/dist/types/ts3.4/commands/CreateArchiveRuleCommand.d.ts +1 -2
  54. package/dist/types/ts3.4/commands/DeleteAnalyzerCommand.d.ts +3 -3
  55. package/dist/types/ts3.4/commands/GetArchiveRuleCommand.d.ts +1 -2
  56. package/dist/types/ts3.4/commands/ListFindingsCommand.d.ts +1 -2
  57. package/dist/types/ts3.4/models/models_0.d.ts +105 -98
  58. package/models/models_0.ts +105 -98
  59. package/package.json +31 -31
  60. package/protocols/Aws_restJson1.ts +120 -55
@@ -494,7 +494,7 @@ export declare type ReasonCode = "AWS_SERVICE_ACCESS_DISABLED" | "DELEGATED_ADMI
494
494
  * <p>Provides more details about the current status of the analyzer. For example, if the
495
495
  * creation for the analyzer fails, a <code>Failed</code> status is returned. For an analyzer
496
496
  * with organization as the type, this failure can be due to an issue with creating the
497
- * service-linked roles required in the member accounts of the AWS organization.</p>
497
+ * service-linked roles required in the member accounts of the Amazon Web Services organization.</p>
498
498
  */
499
499
  export interface StatusReason {
500
500
  /**
@@ -546,17 +546,17 @@ export interface AnalyzerSummary {
546
546
  /**
547
547
  * <p>The status of the analyzer. An <code>Active</code> analyzer successfully monitors
548
548
  * supported resources and generates new findings. The analyzer is <code>Disabled</code> when
549
- * a user action, such as removing trusted access for AWS IAM Access Analyzer from AWS Organizations,
550
- * causes the analyzer to stop generating new findings. The status is <code>Creating</code>
551
- * when the analyzer creation is in progress and <code>Failed</code> when the analyzer
552
- * creation has failed. </p>
549
+ * a user action, such as removing trusted access for Identity and Access Management Access Analyzer from Organizations, causes
550
+ * the analyzer to stop generating new findings. The status is <code>Creating</code> when the
551
+ * analyzer creation is in progress and <code>Failed</code> when the analyzer creation has
552
+ * failed. </p>
553
553
  */
554
554
  status: AnalyzerStatus | string | undefined;
555
555
  /**
556
556
  * <p>The <code>statusReason</code> provides more details about the current status of the
557
557
  * analyzer. For example, if the creation for the analyzer fails, a <code>Failed</code> status
558
558
  * is returned. For an analyzer with organization as the type, this failure can be due to an
559
- * issue with creating the service-linked roles required in the member accounts of the AWS
559
+ * issue with creating the service-linked roles required in the member accounts of the Amazon Web Services
560
560
  * organization.</p>
561
561
  */
562
562
  statusReason?: StatusReason;
@@ -767,8 +767,8 @@ export interface KmsGrantConfiguration {
767
767
  */
768
768
  constraints?: KmsGrantConstraints;
769
769
  /**
770
- * <p> The AWS account under which the grant was issued. The account is used to propose KMS
771
- * grants issued by accounts other than the owner of the key.</p>
770
+ * <p> The Amazon Web Services account under which the grant was issued. The account is used to propose
771
+ * KMS grants issued by accounts other than the owner of the key.</p>
772
772
  */
773
773
  issuingAccount: string | undefined;
774
774
  }
@@ -779,21 +779,21 @@ export declare namespace KmsGrantConfiguration {
779
779
  const filterSensitiveLog: (obj: KmsGrantConfiguration) => any;
780
780
  }
781
781
  /**
782
- * <p>Proposed access control configuration for a KMS key. You can propose a configuration for
783
- * a new KMS key or an existing KMS key that you own by specifying the key policy and KMS
784
- * grant configuration. If the configuration is for an existing key and you do not specify the
785
- * key policy, the access preview uses the existing policy for the key. If the access preview
786
- * is for a new resource and you do not specify the key policy, then the access preview uses
787
- * the default key policy. The proposed key policy cannot be an empty string. For more
788
- * information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default key
782
+ * <p>Proposed access control configuration for a KMS key. You can propose a configuration
783
+ * for a new KMS key or an existing KMS key that you own by specifying the key policy and
784
+ * KMS grant configuration. If the configuration is for an existing key and you do not
785
+ * specify the key policy, the access preview uses the existing policy for the key. If the
786
+ * access preview is for a new resource and you do not specify the key policy, then the access
787
+ * preview uses the default key policy. The proposed key policy cannot be an empty string. For
788
+ * more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default key
789
789
  * policy</a>. For more information about key policy limits, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/resource-limits.html">Resource
790
790
  * quotas</a>.</p>
791
791
  * <p/>
792
792
  */
793
793
  export interface KmsKeyConfiguration {
794
794
  /**
795
- * <p>Resource policy configuration for the KMS key. The only valid value for the name of the
796
- * key policy is <code>default</code>. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default key
795
+ * <p>Resource policy configuration for the KMS key. The only valid value for the name of
796
+ * the key policy is <code>default</code>. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default key
797
797
  * policy</a>.</p>
798
798
  */
799
799
  keyPolicies?: {
@@ -814,8 +814,8 @@ export declare namespace KmsKeyConfiguration {
814
814
  const filterSensitiveLog: (obj: KmsKeyConfiguration) => any;
815
815
  }
816
816
  /**
817
- * <p>This configuration sets the Amazon S3 access point network origin to
818
- * <code>Internet</code>.</p>
817
+ * <p>This configuration sets the network origin for the Amazon S3 access point or multi-region
818
+ * access point to <code>Internet</code>.</p>
819
819
  */
820
820
  export interface InternetConfiguration {
821
821
  }
@@ -826,9 +826,9 @@ export declare namespace InternetConfiguration {
826
826
  const filterSensitiveLog: (obj: InternetConfiguration) => any;
827
827
  }
828
828
  /**
829
- * <p> The proposed virtual private cloud (VPC) configuration for the Amazon S3 access point. For
830
- * more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_control_VpcConfiguration.html">VpcConfiguration</a>.
831
- * </p>
829
+ * <p>The proposed virtual private cloud (VPC) configuration for the Amazon S3 access point. VPC
830
+ * configuration does not apply to multi-region access points. For more information, see
831
+ * <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_control_VpcConfiguration.html">VpcConfiguration</a>. </p>
832
832
  */
833
833
  export interface VpcConfiguration {
834
834
  /**
@@ -845,8 +845,9 @@ export declare namespace VpcConfiguration {
845
845
  }
846
846
  /**
847
847
  * <p>The proposed <code>InternetConfiguration</code> or <code>VpcConfiguration</code> to
848
- * apply to the Amazon S3 Access point. You can make the access point accessible from the internet,
849
- * or you can specify that all requests made through that access point must originate from a
848
+ * apply to the Amazon S3 access point. <code>VpcConfiguration</code> does not apply to
849
+ * multi-region access points. You can make the access point accessible from the internet, or
850
+ * you can specify that all requests made through that access point must originate from a
850
851
  * specific virtual private cloud (VPC). You can specify only one type of network
851
852
  * configuration. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/creating-access-points.html">Creating access
852
853
  * points</a>.</p>
@@ -854,9 +855,9 @@ export declare namespace VpcConfiguration {
854
855
  export declare type NetworkOriginConfiguration = NetworkOriginConfiguration.InternetConfigurationMember | NetworkOriginConfiguration.VpcConfigurationMember | NetworkOriginConfiguration.$UnknownMember;
855
856
  export declare namespace NetworkOriginConfiguration {
856
857
  /**
857
- * <p> The proposed virtual private cloud (VPC) configuration for the Amazon S3 access point. For
858
- * more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_control_VpcConfiguration.html">VpcConfiguration</a>.
859
- * </p>
858
+ * <p>The proposed virtual private cloud (VPC) configuration for the Amazon S3 access point. VPC
859
+ * configuration does not apply to multi-region access points. For more information, see
860
+ * <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_control_VpcConfiguration.html">VpcConfiguration</a>. </p>
860
861
  */
861
862
  interface VpcConfigurationMember {
862
863
  vpcConfiguration: VpcConfiguration;
@@ -864,7 +865,8 @@ export declare namespace NetworkOriginConfiguration {
864
865
  $unknown?: never;
865
866
  }
866
867
  /**
867
- * <p>The configuration for the Amazon S3 access point with an <code>Internet</code> origin.</p>
868
+ * <p>The configuration for the Amazon S3 access point or multi-region access point with an
869
+ * <code>Internet</code> origin.</p>
868
870
  */
869
871
  interface InternetConfigurationMember {
870
872
  vpcConfiguration?: never;
@@ -892,9 +894,9 @@ export declare namespace NetworkOriginConfiguration {
892
894
  * proposed configuration is for an existing Amazon S3 bucket and the configuration is not
893
895
  * specified, the access preview uses the existing setting. If the proposed configuration is
894
896
  * for a new bucket and the configuration is not specified, the access preview uses
895
- * <code>false</code>. If the proposed configuration is for a new access point and the
896
- * access point BPA configuration is not specified, the access preview uses <code>true</code>.
897
- * For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-s3-bucket-publicaccessblockconfiguration.html">PublicAccessBlockConfiguration</a>. </p>
897
+ * <code>false</code>. If the proposed configuration is for a new access point or
898
+ * multi-region access point and the access point BPA configuration is not specified, the
899
+ * access preview uses <code>true</code>. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-s3-bucket-publicaccessblockconfiguration.html">PublicAccessBlockConfiguration</a>. </p>
898
900
  */
899
901
  export interface S3PublicAccessBlockConfiguration {
900
902
  /**
@@ -914,30 +916,32 @@ export declare namespace S3PublicAccessBlockConfiguration {
914
916
  const filterSensitiveLog: (obj: S3PublicAccessBlockConfiguration) => any;
915
917
  }
916
918
  /**
917
- * <p>The configuration for an Amazon S3 access point for the bucket. You can propose up to 10
918
- * access points per bucket. If the proposed Amazon S3 access point configuration is for an
919
- * existing bucket, the access preview uses the proposed access point configuration in place
920
- * of the existing access points. To propose an access point without a policy, you can provide
921
- * an empty string as the access point policy. For more information, see <a href="https://docs.aws.amazon.com/https:/docs.aws.amazon.com/AmazonS3/latest/dev/creating-access-points.html">Creating access points</a>. For more information about access point policy limits,
919
+ * <p>The configuration for an Amazon S3 access point or multi-region access point for the bucket.
920
+ * You can propose up to 10 access points or multi-region access points per bucket. If the
921
+ * proposed Amazon S3 access point configuration is for an existing bucket, the access preview uses
922
+ * the proposed access point configuration in place of the existing access points. To propose
923
+ * an access point without a policy, you can provide an empty string as the access point
924
+ * policy. For more information, see <a href="https://docs.aws.amazon.com/https:/docs.aws.amazon.com/AmazonS3/latest/dev/creating-access-points.html">Creating access points</a>. For more information about access point policy limits,
922
925
  * see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/access-points-restrictions-limitations.html">Access points
923
926
  * restrictions and limitations</a>.</p>
924
927
  */
925
928
  export interface S3AccessPointConfiguration {
926
929
  /**
927
- * <p>The access point policy.</p>
930
+ * <p>The access point or multi-region access point policy.</p>
928
931
  */
929
932
  accessPointPolicy?: string;
930
933
  /**
931
- * <p>The proposed <code>S3PublicAccessBlock</code> configuration to apply to this Amazon S3 Access
932
- * Point.</p>
934
+ * <p>The proposed <code>S3PublicAccessBlock</code> configuration to apply to this Amazon S3 access
935
+ * point or multi-region access point.</p>
933
936
  */
934
937
  publicAccessBlock?: S3PublicAccessBlockConfiguration;
935
938
  /**
936
939
  * <p>The proposed <code>Internet</code> and <code>VpcConfiguration</code> to apply to this
937
- * Amazon S3 access point. If the access preview is for a new resource and neither is specified,
938
- * the access preview uses <code>Internet</code> for the network origin. If the access preview
939
- * is for an existing resource and neither is specified, the access preview uses the exiting
940
- * network origin.</p>
940
+ * Amazon S3 access point. <code>VpcConfiguration</code> does not apply to multi-region access
941
+ * points. If the access preview is for a new resource and neither is specified, the access
942
+ * preview uses <code>Internet</code> for the network origin. If the access preview is for an
943
+ * existing resource and neither is specified, the access preview uses the exiting network
944
+ * origin.</p>
941
945
  */
942
946
  networkOrigin?: NetworkOriginConfiguration;
943
947
  }
@@ -954,7 +958,7 @@ export declare namespace S3AccessPointConfiguration {
954
958
  export declare type AclGrantee = AclGrantee.IdMember | AclGrantee.UriMember | AclGrantee.$UnknownMember;
955
959
  export declare namespace AclGrantee {
956
960
  /**
957
- * <p>The value specified is the canonical user ID of an AWS account.</p>
961
+ * <p>The value specified is the canonical user ID of an Amazon Web Services account.</p>
958
962
  */
959
963
  interface IdMember {
960
964
  id: string;
@@ -1016,13 +1020,13 @@ export declare namespace S3BucketAclGrantConfiguration {
1016
1020
  /**
1017
1021
  * <p>Proposed access control configuration for an Amazon S3 bucket. You can propose a
1018
1022
  * configuration for a new Amazon S3 bucket or an existing Amazon S3 bucket that you own by specifying
1019
- * the Amazon S3 bucket policy, bucket ACLs, bucket BPA settings, and Amazon S3 access points attached
1020
- * to the bucket. If the configuration is for an existing Amazon S3 bucket and you do not specify
1021
- * the Amazon S3 bucket policy, the access preview uses the existing policy attached to the bucket.
1022
- * If the access preview is for a new resource and you do not specify the Amazon S3 bucket policy,
1023
- * the access preview assumes a bucket without a policy. To propose deletion of an existing
1024
- * bucket policy, you can specify an empty string. For more information about bucket policy
1025
- * limits, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/example-bucket-policies.html">Bucket Policy
1023
+ * the Amazon S3 bucket policy, bucket ACLs, bucket BPA settings, Amazon S3 access points, and
1024
+ * multi-region access points attached to the bucket. If the configuration is for an existing
1025
+ * Amazon S3 bucket and you do not specify the Amazon S3 bucket policy, the access preview uses the
1026
+ * existing policy attached to the bucket. If the access preview is for a new resource and you
1027
+ * do not specify the Amazon S3 bucket policy, the access preview assumes a bucket without a
1028
+ * policy. To propose deletion of an existing bucket policy, you can specify an empty string.
1029
+ * For more information about bucket policy limits, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/example-bucket-policies.html">Bucket Policy
1026
1030
  * Examples</a>.</p>
1027
1031
  */
1028
1032
  export interface S3BucketConfiguration {
@@ -1042,7 +1046,8 @@ export interface S3BucketConfiguration {
1042
1046
  */
1043
1047
  bucketPublicAccessBlock?: S3PublicAccessBlockConfiguration;
1044
1048
  /**
1045
- * <p>The configuration of Amazon S3 access points for the bucket.</p>
1049
+ * <p>The configuration of Amazon S3 access points or multi-region access points for the bucket.
1050
+ * You can propose up to 10 new access points per bucket.</p>
1046
1051
  */
1047
1052
  accessPoints?: {
1048
1053
  [key: string]: S3AccessPointConfiguration;
@@ -1062,15 +1067,15 @@ export declare namespace S3BucketConfiguration {
1062
1067
  * existing policy for the secret. If the access preview is for a new resource and you do not
1063
1068
  * specify the policy, the access preview assumes a secret without a policy. To propose
1064
1069
  * deletion of an existing policy, you can specify an empty string. If the proposed
1065
- * configuration is for a new secret and you do not specify the KMS key ID, the access preview
1066
- * uses the default CMK of the AWS account. If you specify an empty string for the KMS key
1067
- * ID, the access preview uses the default CMK of the AWS account. For more information
1068
- * about secret policy limits, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_limits.html">Quotas for AWS Secrets
1069
- * Manager.</a>.</p>
1070
+ * configuration is for a new secret and you do not specify the KMS key ID, the access
1071
+ * preview uses the default CMK of the Amazon Web Services account. If you specify an empty string for the
1072
+ * KMS key ID, the access preview uses the default CMK of the Amazon Web Services account. For more
1073
+ * information about secret policy limits, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_limits.html">Quotas for
1074
+ * Secrets Manager.</a>.</p>
1070
1075
  */
1071
1076
  export interface SecretsManagerSecretConfiguration {
1072
1077
  /**
1073
- * <p>The proposed ARN, key ID, or alias of the AWS KMS customer master key (CMK).</p>
1078
+ * <p>The proposed ARN, key ID, or alias of the KMS customer master key (CMK).</p>
1074
1079
  */
1075
1080
  kmsKeyId?: string;
1076
1081
  /**
@@ -1085,19 +1090,19 @@ export declare namespace SecretsManagerSecretConfiguration {
1085
1090
  const filterSensitiveLog: (obj: SecretsManagerSecretConfiguration) => any;
1086
1091
  }
1087
1092
  /**
1088
- * <p>The proposed access control configuration for an SQS queue. You can propose a
1089
- * configuration for a new SQS queue or an existing SQS queue that you own by specifying the
1090
- * SQS policy. If the configuration is for an existing SQS queue and you do not specify the
1091
- * SQS policy, the access preview uses the existing SQS policy for the queue. If the access
1092
- * preview is for a new resource and you do not specify the policy, the access preview assumes
1093
- * an SQS queue without a policy. To propose deletion of an existing SQS queue policy, you can
1094
- * specify an empty string for the SQS policy. For more information about SQS policy limits,
1095
- * see <a href="https://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/quotas-policies.html">Quotas related
1093
+ * <p>The proposed access control configuration for an Amazon SQS queue. You can propose a
1094
+ * configuration for a new Amazon SQS queue or an existing Amazon SQS queue that you own by specifying
1095
+ * the Amazon SQS policy. If the configuration is for an existing Amazon SQS queue and you do not
1096
+ * specify the Amazon SQS policy, the access preview uses the existing Amazon SQS policy for the queue.
1097
+ * If the access preview is for a new resource and you do not specify the policy, the access
1098
+ * preview assumes an Amazon SQS queue without a policy. To propose deletion of an existing Amazon SQS
1099
+ * queue policy, you can specify an empty string for the Amazon SQS policy. For more information
1100
+ * about Amazon SQS policy limits, see <a href="https://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/quotas-policies.html">Quotas related
1096
1101
  * to policies</a>.</p>
1097
1102
  */
1098
1103
  export interface SqsQueueConfiguration {
1099
1104
  /**
1100
- * <p> The proposed resource policy for the SQS queue. </p>
1105
+ * <p> The proposed resource policy for the Amazon SQS queue. </p>
1101
1106
  */
1102
1107
  queuePolicy?: string;
1103
1108
  }
@@ -1158,7 +1163,7 @@ export declare namespace Configuration {
1158
1163
  $unknown?: never;
1159
1164
  }
1160
1165
  /**
1161
- * <p>The access control configuration is for an SQS queue. </p>
1166
+ * <p>The access control configuration is for an Amazon SQS queue. </p>
1162
1167
  */
1163
1168
  interface SqsQueueMember {
1164
1169
  iamRole?: never;
@@ -1407,7 +1412,7 @@ export interface AnalyzedResource {
1407
1412
  */
1408
1413
  status?: FindingStatus | string;
1409
1414
  /**
1410
- * <p>The AWS account ID that owns the resource.</p>
1415
+ * <p>The Amazon Web Services account ID that owns the resource.</p>
1411
1416
  */
1412
1417
  resourceOwnerAccount: string | undefined;
1413
1418
  /**
@@ -1426,8 +1431,8 @@ export declare namespace AnalyzedResource {
1426
1431
  */
1427
1432
  export interface GetAnalyzedResourceResponse {
1428
1433
  /**
1429
- * <p>An <code>AnalyzedResource</code> object that contains information that Access Analyzer found
1430
- * when it analyzed the resource.</p>
1434
+ * <p>An <code>AnalyzedResource</code> object that contains information that IAM Access Analyzer
1435
+ * found when it analyzed the resource.</p>
1431
1436
  */
1432
1437
  resource?: AnalyzedResource;
1433
1438
  }
@@ -1463,7 +1468,8 @@ export declare namespace GetFindingRequest {
1463
1468
  */
1464
1469
  export interface FindingSourceDetail {
1465
1470
  /**
1466
- * <p>The ARN of the access point that generated the finding.</p>
1471
+ * <p>The ARN of the access point that generated the finding. The ARN format depends on
1472
+ * whether the ARN represents an access point or a multi-region access point.</p>
1467
1473
  */
1468
1474
  accessPointArn?: string;
1469
1475
  }
@@ -1550,7 +1556,7 @@ export interface Finding {
1550
1556
  */
1551
1557
  status: FindingStatus | string | undefined;
1552
1558
  /**
1553
- * <p>The AWS account ID that owns the resource.</p>
1559
+ * <p>The Amazon Web Services account ID that owns the resource.</p>
1554
1560
  */
1555
1561
  resourceOwnerAccount: string | undefined;
1556
1562
  /**
@@ -1603,8 +1609,8 @@ export interface GetGeneratedPolicyRequest {
1603
1609
  /**
1604
1610
  * <p>The level of detail that you want to generate. You can specify whether to generate
1605
1611
  * service-level policies. </p>
1606
- * <p>Access Analyzer uses <code>iam:servicelastaccessed</code> to identify services that have been
1607
- * used recently to create this service-level template.</p>
1612
+ * <p>IAM Access Analyzer uses <code>iam:servicelastaccessed</code> to identify services that have
1613
+ * been used recently to create this service-level template.</p>
1608
1614
  */
1609
1615
  includeServiceLevelTemplate?: boolean;
1610
1616
  }
@@ -1645,7 +1651,7 @@ export interface TrailProperties {
1645
1651
  regions?: string[];
1646
1652
  /**
1647
1653
  * <p>Possible values are <code>true</code> or <code>false</code>. If set to
1648
- * <code>true</code>, Access Analyzer retrieves CloudTrail data from all regions to analyze and
1654
+ * <code>true</code>, IAM Access Analyzer retrieves CloudTrail data from all regions to analyze and
1649
1655
  * generate a policy.</p>
1650
1656
  */
1651
1657
  allRegions?: boolean;
@@ -1666,12 +1672,12 @@ export interface CloudTrailProperties {
1666
1672
  */
1667
1673
  trailProperties: TrailProperties[] | undefined;
1668
1674
  /**
1669
- * <p>The start of the time range for which Access Analyzer reviews your CloudTrail events. Events
1675
+ * <p>The start of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events
1670
1676
  * with a timestamp before this time are not considered to generate a policy.</p>
1671
1677
  */
1672
1678
  startTime: Date | undefined;
1673
1679
  /**
1674
- * <p>The end of the time range for which Access Analyzer reviews your CloudTrail events. Events with
1680
+ * <p>The end of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events with
1675
1681
  * a timestamp after this time are not considered to generate a policy. If this is not
1676
1682
  * included in the request, the default value is the current time.</p>
1677
1683
  */
@@ -1688,9 +1694,9 @@ export declare namespace CloudTrailProperties {
1688
1694
  */
1689
1695
  export interface GeneratedPolicyProperties {
1690
1696
  /**
1691
- * <p>This value is set to <code>true</code> if the generated policy contains all possible actions for a
1692
- * service that Access Analyzer identified from the CloudTrail trail that you specified, and
1693
- * <code>false</code> otherwise.</p>
1697
+ * <p>This value is set to <code>true</code> if the generated policy contains all possible
1698
+ * actions for a service that IAM Access Analyzer identified from the CloudTrail trail that you specified,
1699
+ * and <code>false</code> otherwise.</p>
1694
1700
  */
1695
1701
  isComplete?: boolean;
1696
1702
  /**
@@ -1785,7 +1791,7 @@ export interface JobDetails {
1785
1791
  */
1786
1792
  completedOn?: Date;
1787
1793
  /**
1788
- * <p>Contains the details about the policy generation error.</p>
1794
+ * <p>The job error for the policy generation request.</p>
1789
1795
  */
1790
1796
  jobError?: JobError;
1791
1797
  }
@@ -1860,7 +1866,8 @@ export interface AccessPreviewFinding {
1860
1866
  */
1861
1867
  id: string | undefined;
1862
1868
  /**
1863
- * <p>The existing ID of the finding in Access Analyzer, provided only for existing findings.</p>
1869
+ * <p>The existing ID of the finding in IAM Access Analyzer, provided only for existing
1870
+ * findings.</p>
1864
1871
  */
1865
1872
  existingFindingId?: string;
1866
1873
  /**
@@ -1904,7 +1911,7 @@ export interface AccessPreviewFinding {
1904
1911
  createdAt: Date | undefined;
1905
1912
  /**
1906
1913
  * <p>Provides context on how the access preview finding compares to existing access
1907
- * identified in Access Analyzer.</p>
1914
+ * identified in IAM Access Analyzer.</p>
1908
1915
  * <ul>
1909
1916
  * <li>
1910
1917
  * <p>
@@ -1935,7 +1942,7 @@ export interface AccessPreviewFinding {
1935
1942
  */
1936
1943
  status: FindingStatus | string | undefined;
1937
1944
  /**
1938
- * <p>The AWS account ID that owns the resource. For most AWS resources, the owning
1945
+ * <p>The Amazon Web Services account ID that owns the resource. For most Amazon Web Services resources, the owning
1939
1946
  * account is the account in which the resource was created.</p>
1940
1947
  */
1941
1948
  resourceOwnerAccount: string | undefined;
@@ -2094,7 +2101,7 @@ export interface AnalyzedResourceSummary {
2094
2101
  */
2095
2102
  resourceArn: string | undefined;
2096
2103
  /**
2097
- * <p>The AWS account ID that owns the resource.</p>
2104
+ * <p>The Amazon Web Services account ID that owns the resource.</p>
2098
2105
  */
2099
2106
  resourceOwnerAccount: string | undefined;
2100
2107
  /**
@@ -2237,7 +2244,7 @@ export interface FindingSummary {
2237
2244
  */
2238
2245
  status: FindingStatus | string | undefined;
2239
2246
  /**
2240
- * <p>The AWS account ID that owns the resource.</p>
2247
+ * <p>The Amazon Web Services account ID that owns the resource.</p>
2241
2248
  */
2242
2249
  resourceOwnerAccount: string | undefined;
2243
2250
  /**
@@ -2396,7 +2403,7 @@ export interface Trail {
2396
2403
  regions?: string[];
2397
2404
  /**
2398
2405
  * <p>Possible values are <code>true</code> or <code>false</code>. If set to
2399
- * <code>true</code>, Access Analyzer retrieves CloudTrail data from all regions to analyze and
2406
+ * <code>true</code>, IAM Access Analyzer retrieves CloudTrail data from all regions to analyze and
2400
2407
  * generate a policy.</p>
2401
2408
  */
2402
2409
  allRegions?: boolean;
@@ -2416,17 +2423,17 @@ export interface CloudTrailDetails {
2416
2423
  */
2417
2424
  trails: Trail[] | undefined;
2418
2425
  /**
2419
- * <p>The ARN of the service role that Access Analyzer uses to access your CloudTrail trail and
2426
+ * <p>The ARN of the service role that IAM Access Analyzer uses to access your CloudTrail trail and
2420
2427
  * service last accessed information.</p>
2421
2428
  */
2422
2429
  accessRole: string | undefined;
2423
2430
  /**
2424
- * <p>The start of the time range for which Access Analyzer reviews your CloudTrail events. Events
2431
+ * <p>The start of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events
2425
2432
  * with a timestamp before this time are not considered to generate a policy.</p>
2426
2433
  */
2427
2434
  startTime: Date | undefined;
2428
2435
  /**
2429
- * <p>The end of the time range for which Access Analyzer reviews your CloudTrail events. Events with
2436
+ * <p>The end of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events with
2430
2437
  * a timestamp after this time are not considered to generate a policy. If this is not
2431
2438
  * included in the request, the default value is the current time.</p>
2432
2439
  */
@@ -2471,7 +2478,7 @@ export interface StartPolicyGenerationRequest {
2471
2478
  * request, if the original request completes successfully, the subsequent retries with the
2472
2479
  * same client token return the result from the original successful request and they have no
2473
2480
  * additional effect.</p>
2474
- * <p>If you do not specify a client token, one is automatically generated by the AWS
2481
+ * <p>If you do not specify a client token, one is automatically generated by the Amazon Web Services
2475
2482
  * SDK.</p>
2476
2483
  */
2477
2484
  clientToken?: string;
@@ -2652,12 +2659,12 @@ export interface ValidatePolicyRequest {
2652
2659
  /**
2653
2660
  * <p>The type of policy to validate. Identity policies grant permissions to IAM principals.
2654
2661
  * Identity policies include managed and inline policies for IAM roles, users, and groups.
2655
- * They also include service-control policies (SCPs) that are attached to an AWS
2662
+ * They also include service-control policies (SCPs) that are attached to an Amazon Web Services
2656
2663
  * organization, organizational unit (OU), or an account.</p>
2657
- * <p>Resource policies grant permissions on AWS resources. Resource policies include trust
2658
- * policies for IAM roles and bucket policies for S3 buckets. You can provide a generic input
2659
- * such as identity policy or resource policy or a specific input such as managed policy or S3
2660
- * bucket policy. </p>
2664
+ * <p>Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust
2665
+ * policies for IAM roles and bucket policies for Amazon S3 buckets. You can provide a generic
2666
+ * input such as identity policy or resource policy or a specific input such as managed policy
2667
+ * or Amazon S3 bucket policy. </p>
2661
2668
  */
2662
2669
  policyType: PolicyType | string | undefined;
2663
2670
  }
@@ -2863,7 +2870,7 @@ export declare namespace ValidatePolicyFinding {
2863
2870
  }
2864
2871
  export interface ValidatePolicyResponse {
2865
2872
  /**
2866
- * <p>The list of findings in a policy returned by Access Analyzer based on its suite of policy
2873
+ * <p>The list of findings in a policy returned by IAM Access Analyzer based on its suite of policy
2867
2874
  * checks.</p>
2868
2875
  */
2869
2876
  findings: ValidatePolicyFinding[] | undefined;
@@ -29,15 +29,15 @@ import { UpdateFindingsCommandInput, UpdateFindingsCommandOutput } from "./comma
29
29
  import { ValidatePolicyCommandInput, ValidatePolicyCommandOutput } from "./commands/ValidatePolicyCommand";
30
30
  import { HttpHandlerOptions as __HttpHandlerOptions } from "@aws-sdk/types";
31
31
  /**
32
- * <p>AWS IAM Access Analyzer helps identify potential resource-access risks by enabling you to identify
33
- * any policies that grant access to an external principal. It does this by using logic-based
34
- * reasoning to analyze resource-based policies in your AWS environment. An external
35
- * principal can be another AWS account, a root user, an IAM user or role, a federated
36
- * user, an AWS service, or an anonymous user. You can also use Access Analyzer to preview and
37
- * validate public and cross-account access to your resources before deploying permissions
38
- * changes. This guide describes the AWS IAM Access Analyzer operations that you can call
39
- * programmatically. For general information about Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">AWS IAM Access Analyzer</a> in the <b>IAM User Guide</b>.</p>
40
- * <p>To start using Access Analyzer, you first need to create an analyzer.</p>
32
+ * <p>Identity and Access Management Access Analyzer helps identify potential resource-access risks by enabling you to
33
+ * identify any policies that grant access to an external principal. It does this by using
34
+ * logic-based reasoning to analyze resource-based policies in your Amazon Web Services environment. An
35
+ * external principal can be another Amazon Web Services account, a root user, an IAM user or role, a
36
+ * federated user, an Amazon Web Services service, or an anonymous user. You can also use IAM Access Analyzer to
37
+ * preview and validate public and cross-account access to your resources before deploying
38
+ * permissions changes. This guide describes the Identity and Access Management Access Analyzer operations that you can
39
+ * call programmatically. For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity and Access Management Access Analyzer</a> in the <b>IAM User Guide</b>.</p>
40
+ * <p>To start using IAM Access Analyzer, you first need to create an analyzer.</p>
41
41
  */
42
42
  export declare class AccessAnalyzer extends AccessAnalyzerClient {
43
43
  /**
@@ -54,8 +54,8 @@ export declare class AccessAnalyzer extends AccessAnalyzerClient {
54
54
  cancelPolicyGeneration(args: CancelPolicyGenerationCommandInput, cb: (err: any, data?: CancelPolicyGenerationCommandOutput) => void): void;
55
55
  cancelPolicyGeneration(args: CancelPolicyGenerationCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: CancelPolicyGenerationCommandOutput) => void): void;
56
56
  /**
57
- * <p>Creates an access preview that allows you to preview Access Analyzer findings for your resource
58
- * before deploying resource permissions.</p>
57
+ * <p>Creates an access preview that allows you to preview IAM Access Analyzer findings for your
58
+ * resource before deploying resource permissions.</p>
59
59
  */
60
60
  createAccessPreview(args: CreateAccessPreviewCommandInput, options?: __HttpHandlerOptions): Promise<CreateAccessPreviewCommandOutput>;
61
61
  createAccessPreview(args: CreateAccessPreviewCommandInput, cb: (err: any, data?: CreateAccessPreviewCommandOutput) => void): void;
@@ -69,16 +69,15 @@ export declare class AccessAnalyzer extends AccessAnalyzerClient {
69
69
  /**
70
70
  * <p>Creates an archive rule for the specified analyzer. Archive rules automatically archive
71
71
  * new findings that meet the criteria you define when you create the rule.</p>
72
- * <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">Access Analyzer filter keys</a> in the <b>IAM User
73
- * Guide</b>.</p>
72
+ * <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
74
73
  */
75
74
  createArchiveRule(args: CreateArchiveRuleCommandInput, options?: __HttpHandlerOptions): Promise<CreateArchiveRuleCommandOutput>;
76
75
  createArchiveRule(args: CreateArchiveRuleCommandInput, cb: (err: any, data?: CreateArchiveRuleCommandOutput) => void): void;
77
76
  createArchiveRule(args: CreateArchiveRuleCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: CreateArchiveRuleCommandOutput) => void): void;
78
77
  /**
79
- * <p>Deletes the specified analyzer. When you delete an analyzer, Access Analyzer is disabled for the
80
- * account or organization in the current or specific Region. All findings that were generated
81
- * by the analyzer are deleted. You cannot undo this action.</p>
78
+ * <p>Deletes the specified analyzer. When you delete an analyzer, IAM Access Analyzer is disabled
79
+ * for the account or organization in the current or specific Region. All findings that were
80
+ * generated by the analyzer are deleted. You cannot undo this action.</p>
82
81
  */
83
82
  deleteAnalyzer(args: DeleteAnalyzerCommandInput, options?: __HttpHandlerOptions): Promise<DeleteAnalyzerCommandOutput>;
84
83
  deleteAnalyzer(args: DeleteAnalyzerCommandInput, cb: (err: any, data?: DeleteAnalyzerCommandOutput) => void): void;
@@ -109,8 +108,7 @@ export declare class AccessAnalyzer extends AccessAnalyzerClient {
109
108
  getAnalyzer(args: GetAnalyzerCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: GetAnalyzerCommandOutput) => void): void;
110
109
  /**
111
110
  * <p>Retrieves information about an archive rule.</p>
112
- * <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">Access Analyzer filter keys</a> in the <b>IAM User
113
- * Guide</b>.</p>
111
+ * <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
114
112
  */
115
113
  getArchiveRule(args: GetArchiveRuleCommandInput, options?: __HttpHandlerOptions): Promise<GetArchiveRuleCommandOutput>;
116
114
  getArchiveRule(args: GetArchiveRuleCommandInput, cb: (err: any, data?: GetArchiveRuleCommandOutput) => void): void;
@@ -162,8 +160,7 @@ export declare class AccessAnalyzer extends AccessAnalyzerClient {
162
160
  listArchiveRules(args: ListArchiveRulesCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: ListArchiveRulesCommandOutput) => void): void;
163
161
  /**
164
162
  * <p>Retrieves a list of findings generated by the specified analyzer.</p>
165
- * <p>To learn about filter keys that you can use to retrieve a list of findings, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">Access Analyzer filter keys</a> in the <b>IAM User
166
- * Guide</b>.</p>
163
+ * <p>To learn about filter keys that you can use to retrieve a list of findings, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
167
164
  */
168
165
  listFindings(args: ListFindingsCommandInput, options?: __HttpHandlerOptions): Promise<ListFindingsCommandOutput>;
169
166
  listFindings(args: ListFindingsCommandInput, cb: (err: any, data?: ListFindingsCommandOutput) => void): void;
@@ -142,15 +142,15 @@ declare type AccessAnalyzerClientResolvedConfigType = __SmithyResolvedConfigurat
142
142
  export interface AccessAnalyzerClientResolvedConfig extends AccessAnalyzerClientResolvedConfigType {
143
143
  }
144
144
  /**
145
- * <p>AWS IAM Access Analyzer helps identify potential resource-access risks by enabling you to identify
146
- * any policies that grant access to an external principal. It does this by using logic-based
147
- * reasoning to analyze resource-based policies in your AWS environment. An external
148
- * principal can be another AWS account, a root user, an IAM user or role, a federated
149
- * user, an AWS service, or an anonymous user. You can also use Access Analyzer to preview and
150
- * validate public and cross-account access to your resources before deploying permissions
151
- * changes. This guide describes the AWS IAM Access Analyzer operations that you can call
152
- * programmatically. For general information about Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">AWS IAM Access Analyzer</a> in the <b>IAM User Guide</b>.</p>
153
- * <p>To start using Access Analyzer, you first need to create an analyzer.</p>
145
+ * <p>Identity and Access Management Access Analyzer helps identify potential resource-access risks by enabling you to
146
+ * identify any policies that grant access to an external principal. It does this by using
147
+ * logic-based reasoning to analyze resource-based policies in your Amazon Web Services environment. An
148
+ * external principal can be another Amazon Web Services account, a root user, an IAM user or role, a
149
+ * federated user, an Amazon Web Services service, or an anonymous user. You can also use IAM Access Analyzer to
150
+ * preview and validate public and cross-account access to your resources before deploying
151
+ * permissions changes. This guide describes the Identity and Access Management Access Analyzer operations that you can
152
+ * call programmatically. For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity and Access Management Access Analyzer</a> in the <b>IAM User Guide</b>.</p>
153
+ * <p>To start using IAM Access Analyzer, you first need to create an analyzer.</p>
154
154
  */
155
155
  export declare class AccessAnalyzerClient extends __Client<__HttpHandlerOptions, ServiceInputTypes, ServiceOutputTypes, AccessAnalyzerClientResolvedConfig> {
156
156
  /**
@@ -7,8 +7,8 @@ export interface CreateAccessPreviewCommandInput extends CreateAccessPreviewRequ
7
7
  export interface CreateAccessPreviewCommandOutput extends CreateAccessPreviewResponse, __MetadataBearer {
8
8
  }
9
9
  /**
10
- * <p>Creates an access preview that allows you to preview Access Analyzer findings for your resource
11
- * before deploying resource permissions.</p>
10
+ * <p>Creates an access preview that allows you to preview IAM Access Analyzer findings for your
11
+ * resource before deploying resource permissions.</p>
12
12
  * @example
13
13
  * Use a bare-bones client and the command you need to make an API call.
14
14
  * ```javascript