@aws-sdk/client-accessanalyzer 3.28.0 → 3.32.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AccessAnalyzer.ts +17 -20
- package/AccessAnalyzerClient.ts +9 -9
- package/CHANGELOG.md +35 -0
- package/README.md +9 -9
- package/commands/CreateAccessPreviewCommand.ts +2 -2
- package/commands/CreateArchiveRuleCommand.ts +1 -2
- package/commands/DeleteAnalyzerCommand.ts +3 -3
- package/commands/GetArchiveRuleCommand.ts +1 -2
- package/commands/ListFindingsCommand.ts +1 -2
- package/dist/cjs/AccessAnalyzer.js +9 -9
- package/dist/cjs/AccessAnalyzer.js.map +1 -1
- package/dist/cjs/AccessAnalyzerClient.js +9 -9
- package/dist/cjs/commands/CreateAccessPreviewCommand.js +2 -2
- package/dist/cjs/commands/CreateArchiveRuleCommand.js +1 -2
- package/dist/cjs/commands/CreateArchiveRuleCommand.js.map +1 -1
- package/dist/cjs/commands/DeleteAnalyzerCommand.js +3 -3
- package/dist/cjs/commands/GetArchiveRuleCommand.js +1 -2
- package/dist/cjs/commands/GetArchiveRuleCommand.js.map +1 -1
- package/dist/cjs/commands/ListFindingsCommand.js +1 -2
- package/dist/cjs/commands/ListFindingsCommand.js.map +1 -1
- package/dist/cjs/models/models_0.js.map +1 -1
- package/dist/cjs/package.json +31 -31
- package/dist/cjs/protocols/Aws_restJson1.js +95 -53
- package/dist/cjs/protocols/Aws_restJson1.js.map +1 -1
- package/dist/es/AccessAnalyzer.js +9 -9
- package/dist/es/AccessAnalyzer.js.map +1 -1
- package/dist/es/AccessAnalyzerClient.js +9 -9
- package/dist/es/commands/CreateAccessPreviewCommand.js +2 -2
- package/dist/es/commands/CreateArchiveRuleCommand.js +1 -2
- package/dist/es/commands/CreateArchiveRuleCommand.js.map +1 -1
- package/dist/es/commands/DeleteAnalyzerCommand.js +3 -3
- package/dist/es/commands/GetArchiveRuleCommand.js +1 -2
- package/dist/es/commands/GetArchiveRuleCommand.js.map +1 -1
- package/dist/es/commands/ListFindingsCommand.js +1 -2
- package/dist/es/commands/ListFindingsCommand.js.map +1 -1
- package/dist/es/endpoints.js +1 -2
- package/dist/es/endpoints.js.map +1 -1
- package/dist/es/models/models_0.js.map +1 -1
- package/dist/es/package.json +31 -31
- package/dist/es/protocols/Aws_restJson1.js +186 -108
- package/dist/es/protocols/Aws_restJson1.js.map +1 -1
- package/dist/types/AccessAnalyzer.d.ts +17 -20
- package/dist/types/AccessAnalyzerClient.d.ts +9 -9
- package/dist/types/commands/CreateAccessPreviewCommand.d.ts +2 -2
- package/dist/types/commands/CreateArchiveRuleCommand.d.ts +1 -2
- package/dist/types/commands/DeleteAnalyzerCommand.d.ts +3 -3
- package/dist/types/commands/GetArchiveRuleCommand.d.ts +1 -2
- package/dist/types/commands/ListFindingsCommand.d.ts +1 -2
- package/dist/types/models/models_0.d.ts +105 -98
- package/dist/types/ts3.4/AccessAnalyzer.d.ts +17 -20
- package/dist/types/ts3.4/AccessAnalyzerClient.d.ts +9 -9
- package/dist/types/ts3.4/commands/CreateAccessPreviewCommand.d.ts +2 -2
- package/dist/types/ts3.4/commands/CreateArchiveRuleCommand.d.ts +1 -2
- package/dist/types/ts3.4/commands/DeleteAnalyzerCommand.d.ts +3 -3
- package/dist/types/ts3.4/commands/GetArchiveRuleCommand.d.ts +1 -2
- package/dist/types/ts3.4/commands/ListFindingsCommand.d.ts +1 -2
- package/dist/types/ts3.4/models/models_0.d.ts +105 -98
- package/models/models_0.ts +105 -98
- package/package.json +31 -31
- package/protocols/Aws_restJson1.ts +120 -55
|
@@ -494,7 +494,7 @@ export declare type ReasonCode = "AWS_SERVICE_ACCESS_DISABLED" | "DELEGATED_ADMI
|
|
|
494
494
|
* <p>Provides more details about the current status of the analyzer. For example, if the
|
|
495
495
|
* creation for the analyzer fails, a <code>Failed</code> status is returned. For an analyzer
|
|
496
496
|
* with organization as the type, this failure can be due to an issue with creating the
|
|
497
|
-
* service-linked roles required in the member accounts of the
|
|
497
|
+
* service-linked roles required in the member accounts of the Amazon Web Services organization.</p>
|
|
498
498
|
*/
|
|
499
499
|
export interface StatusReason {
|
|
500
500
|
/**
|
|
@@ -546,17 +546,17 @@ export interface AnalyzerSummary {
|
|
|
546
546
|
/**
|
|
547
547
|
* <p>The status of the analyzer. An <code>Active</code> analyzer successfully monitors
|
|
548
548
|
* supported resources and generates new findings. The analyzer is <code>Disabled</code> when
|
|
549
|
-
* a user action, such as removing trusted access for
|
|
550
|
-
*
|
|
551
|
-
*
|
|
552
|
-
*
|
|
549
|
+
* a user action, such as removing trusted access for Identity and Access Management Access Analyzer from Organizations, causes
|
|
550
|
+
* the analyzer to stop generating new findings. The status is <code>Creating</code> when the
|
|
551
|
+
* analyzer creation is in progress and <code>Failed</code> when the analyzer creation has
|
|
552
|
+
* failed. </p>
|
|
553
553
|
*/
|
|
554
554
|
status: AnalyzerStatus | string | undefined;
|
|
555
555
|
/**
|
|
556
556
|
* <p>The <code>statusReason</code> provides more details about the current status of the
|
|
557
557
|
* analyzer. For example, if the creation for the analyzer fails, a <code>Failed</code> status
|
|
558
558
|
* is returned. For an analyzer with organization as the type, this failure can be due to an
|
|
559
|
-
* issue with creating the service-linked roles required in the member accounts of the
|
|
559
|
+
* issue with creating the service-linked roles required in the member accounts of the Amazon Web Services
|
|
560
560
|
* organization.</p>
|
|
561
561
|
*/
|
|
562
562
|
statusReason?: StatusReason;
|
|
@@ -767,8 +767,8 @@ export interface KmsGrantConfiguration {
|
|
|
767
767
|
*/
|
|
768
768
|
constraints?: KmsGrantConstraints;
|
|
769
769
|
/**
|
|
770
|
-
* <p> The
|
|
771
|
-
* grants issued by accounts other than the owner of the key.</p>
|
|
770
|
+
* <p> The Amazon Web Services account under which the grant was issued. The account is used to propose
|
|
771
|
+
* KMS grants issued by accounts other than the owner of the key.</p>
|
|
772
772
|
*/
|
|
773
773
|
issuingAccount: string | undefined;
|
|
774
774
|
}
|
|
@@ -779,21 +779,21 @@ export declare namespace KmsGrantConfiguration {
|
|
|
779
779
|
const filterSensitiveLog: (obj: KmsGrantConfiguration) => any;
|
|
780
780
|
}
|
|
781
781
|
/**
|
|
782
|
-
* <p>Proposed access control configuration for a KMS key. You can propose a configuration
|
|
783
|
-
* a new KMS key or an existing KMS key that you own by specifying the key policy and
|
|
784
|
-
* grant configuration. If the configuration is for an existing key and you do not
|
|
785
|
-
* key policy, the access preview uses the existing policy for the key. If the
|
|
786
|
-
* is for a new resource and you do not specify the key policy, then the access
|
|
787
|
-
* the default key policy. The proposed key policy cannot be an empty string. For
|
|
788
|
-
* information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default key
|
|
782
|
+
* <p>Proposed access control configuration for a KMS key. You can propose a configuration
|
|
783
|
+
* for a new KMS key or an existing KMS key that you own by specifying the key policy and
|
|
784
|
+
* KMS grant configuration. If the configuration is for an existing key and you do not
|
|
785
|
+
* specify the key policy, the access preview uses the existing policy for the key. If the
|
|
786
|
+
* access preview is for a new resource and you do not specify the key policy, then the access
|
|
787
|
+
* preview uses the default key policy. The proposed key policy cannot be an empty string. For
|
|
788
|
+
* more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default key
|
|
789
789
|
* policy</a>. For more information about key policy limits, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/resource-limits.html">Resource
|
|
790
790
|
* quotas</a>.</p>
|
|
791
791
|
* <p/>
|
|
792
792
|
*/
|
|
793
793
|
export interface KmsKeyConfiguration {
|
|
794
794
|
/**
|
|
795
|
-
* <p>Resource policy configuration for the KMS key. The only valid value for the name of
|
|
796
|
-
* key policy is <code>default</code>. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default key
|
|
795
|
+
* <p>Resource policy configuration for the KMS key. The only valid value for the name of
|
|
796
|
+
* the key policy is <code>default</code>. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default key
|
|
797
797
|
* policy</a>.</p>
|
|
798
798
|
*/
|
|
799
799
|
keyPolicies?: {
|
|
@@ -814,8 +814,8 @@ export declare namespace KmsKeyConfiguration {
|
|
|
814
814
|
const filterSensitiveLog: (obj: KmsKeyConfiguration) => any;
|
|
815
815
|
}
|
|
816
816
|
/**
|
|
817
|
-
* <p>This configuration sets the Amazon S3 access point
|
|
818
|
-
* <code>Internet</code>.</p>
|
|
817
|
+
* <p>This configuration sets the network origin for the Amazon S3 access point or multi-region
|
|
818
|
+
* access point to <code>Internet</code>.</p>
|
|
819
819
|
*/
|
|
820
820
|
export interface InternetConfiguration {
|
|
821
821
|
}
|
|
@@ -826,9 +826,9 @@ export declare namespace InternetConfiguration {
|
|
|
826
826
|
const filterSensitiveLog: (obj: InternetConfiguration) => any;
|
|
827
827
|
}
|
|
828
828
|
/**
|
|
829
|
-
* <p>
|
|
830
|
-
* more information, see
|
|
831
|
-
*
|
|
829
|
+
* <p>The proposed virtual private cloud (VPC) configuration for the Amazon S3 access point. VPC
|
|
830
|
+
* configuration does not apply to multi-region access points. For more information, see
|
|
831
|
+
* <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_control_VpcConfiguration.html">VpcConfiguration</a>. </p>
|
|
832
832
|
*/
|
|
833
833
|
export interface VpcConfiguration {
|
|
834
834
|
/**
|
|
@@ -845,8 +845,9 @@ export declare namespace VpcConfiguration {
|
|
|
845
845
|
}
|
|
846
846
|
/**
|
|
847
847
|
* <p>The proposed <code>InternetConfiguration</code> or <code>VpcConfiguration</code> to
|
|
848
|
-
* apply to the Amazon S3
|
|
849
|
-
*
|
|
848
|
+
* apply to the Amazon S3 access point. <code>VpcConfiguration</code> does not apply to
|
|
849
|
+
* multi-region access points. You can make the access point accessible from the internet, or
|
|
850
|
+
* you can specify that all requests made through that access point must originate from a
|
|
850
851
|
* specific virtual private cloud (VPC). You can specify only one type of network
|
|
851
852
|
* configuration. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/creating-access-points.html">Creating access
|
|
852
853
|
* points</a>.</p>
|
|
@@ -854,9 +855,9 @@ export declare namespace VpcConfiguration {
|
|
|
854
855
|
export declare type NetworkOriginConfiguration = NetworkOriginConfiguration.InternetConfigurationMember | NetworkOriginConfiguration.VpcConfigurationMember | NetworkOriginConfiguration.$UnknownMember;
|
|
855
856
|
export declare namespace NetworkOriginConfiguration {
|
|
856
857
|
/**
|
|
857
|
-
* <p>
|
|
858
|
-
* more information, see
|
|
859
|
-
*
|
|
858
|
+
* <p>The proposed virtual private cloud (VPC) configuration for the Amazon S3 access point. VPC
|
|
859
|
+
* configuration does not apply to multi-region access points. For more information, see
|
|
860
|
+
* <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_control_VpcConfiguration.html">VpcConfiguration</a>. </p>
|
|
860
861
|
*/
|
|
861
862
|
interface VpcConfigurationMember {
|
|
862
863
|
vpcConfiguration: VpcConfiguration;
|
|
@@ -864,7 +865,8 @@ export declare namespace NetworkOriginConfiguration {
|
|
|
864
865
|
$unknown?: never;
|
|
865
866
|
}
|
|
866
867
|
/**
|
|
867
|
-
* <p>The configuration for the Amazon S3 access point with an
|
|
868
|
+
* <p>The configuration for the Amazon S3 access point or multi-region access point with an
|
|
869
|
+
* <code>Internet</code> origin.</p>
|
|
868
870
|
*/
|
|
869
871
|
interface InternetConfigurationMember {
|
|
870
872
|
vpcConfiguration?: never;
|
|
@@ -892,9 +894,9 @@ export declare namespace NetworkOriginConfiguration {
|
|
|
892
894
|
* proposed configuration is for an existing Amazon S3 bucket and the configuration is not
|
|
893
895
|
* specified, the access preview uses the existing setting. If the proposed configuration is
|
|
894
896
|
* for a new bucket and the configuration is not specified, the access preview uses
|
|
895
|
-
* <code>false</code>. If the proposed configuration is for a new access point
|
|
896
|
-
* access point BPA configuration is not specified, the
|
|
897
|
-
* For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-s3-bucket-publicaccessblockconfiguration.html">PublicAccessBlockConfiguration</a>. </p>
|
|
897
|
+
* <code>false</code>. If the proposed configuration is for a new access point or
|
|
898
|
+
* multi-region access point and the access point BPA configuration is not specified, the
|
|
899
|
+
* access preview uses <code>true</code>. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-s3-bucket-publicaccessblockconfiguration.html">PublicAccessBlockConfiguration</a>. </p>
|
|
898
900
|
*/
|
|
899
901
|
export interface S3PublicAccessBlockConfiguration {
|
|
900
902
|
/**
|
|
@@ -914,30 +916,32 @@ export declare namespace S3PublicAccessBlockConfiguration {
|
|
|
914
916
|
const filterSensitiveLog: (obj: S3PublicAccessBlockConfiguration) => any;
|
|
915
917
|
}
|
|
916
918
|
/**
|
|
917
|
-
* <p>The configuration for an Amazon S3 access point for the bucket.
|
|
918
|
-
*
|
|
919
|
-
*
|
|
920
|
-
*
|
|
921
|
-
* an
|
|
919
|
+
* <p>The configuration for an Amazon S3 access point or multi-region access point for the bucket.
|
|
920
|
+
* You can propose up to 10 access points or multi-region access points per bucket. If the
|
|
921
|
+
* proposed Amazon S3 access point configuration is for an existing bucket, the access preview uses
|
|
922
|
+
* the proposed access point configuration in place of the existing access points. To propose
|
|
923
|
+
* an access point without a policy, you can provide an empty string as the access point
|
|
924
|
+
* policy. For more information, see <a href="https://docs.aws.amazon.com/https:/docs.aws.amazon.com/AmazonS3/latest/dev/creating-access-points.html">Creating access points</a>. For more information about access point policy limits,
|
|
922
925
|
* see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/access-points-restrictions-limitations.html">Access points
|
|
923
926
|
* restrictions and limitations</a>.</p>
|
|
924
927
|
*/
|
|
925
928
|
export interface S3AccessPointConfiguration {
|
|
926
929
|
/**
|
|
927
|
-
* <p>The access point policy.</p>
|
|
930
|
+
* <p>The access point or multi-region access point policy.</p>
|
|
928
931
|
*/
|
|
929
932
|
accessPointPolicy?: string;
|
|
930
933
|
/**
|
|
931
|
-
* <p>The proposed <code>S3PublicAccessBlock</code> configuration to apply to this Amazon S3
|
|
932
|
-
*
|
|
934
|
+
* <p>The proposed <code>S3PublicAccessBlock</code> configuration to apply to this Amazon S3 access
|
|
935
|
+
* point or multi-region access point.</p>
|
|
933
936
|
*/
|
|
934
937
|
publicAccessBlock?: S3PublicAccessBlockConfiguration;
|
|
935
938
|
/**
|
|
936
939
|
* <p>The proposed <code>Internet</code> and <code>VpcConfiguration</code> to apply to this
|
|
937
|
-
* Amazon S3 access point.
|
|
938
|
-
* the access preview
|
|
939
|
-
*
|
|
940
|
-
* network
|
|
940
|
+
* Amazon S3 access point. <code>VpcConfiguration</code> does not apply to multi-region access
|
|
941
|
+
* points. If the access preview is for a new resource and neither is specified, the access
|
|
942
|
+
* preview uses <code>Internet</code> for the network origin. If the access preview is for an
|
|
943
|
+
* existing resource and neither is specified, the access preview uses the exiting network
|
|
944
|
+
* origin.</p>
|
|
941
945
|
*/
|
|
942
946
|
networkOrigin?: NetworkOriginConfiguration;
|
|
943
947
|
}
|
|
@@ -954,7 +958,7 @@ export declare namespace S3AccessPointConfiguration {
|
|
|
954
958
|
export declare type AclGrantee = AclGrantee.IdMember | AclGrantee.UriMember | AclGrantee.$UnknownMember;
|
|
955
959
|
export declare namespace AclGrantee {
|
|
956
960
|
/**
|
|
957
|
-
* <p>The value specified is the canonical user ID of an
|
|
961
|
+
* <p>The value specified is the canonical user ID of an Amazon Web Services account.</p>
|
|
958
962
|
*/
|
|
959
963
|
interface IdMember {
|
|
960
964
|
id: string;
|
|
@@ -1016,13 +1020,13 @@ export declare namespace S3BucketAclGrantConfiguration {
|
|
|
1016
1020
|
/**
|
|
1017
1021
|
* <p>Proposed access control configuration for an Amazon S3 bucket. You can propose a
|
|
1018
1022
|
* configuration for a new Amazon S3 bucket or an existing Amazon S3 bucket that you own by specifying
|
|
1019
|
-
* the Amazon S3 bucket policy, bucket ACLs, bucket BPA settings,
|
|
1020
|
-
* to the bucket. If the configuration is for an existing
|
|
1021
|
-
* the Amazon S3 bucket policy, the access preview uses the
|
|
1022
|
-
* If the access preview is for a new resource and you
|
|
1023
|
-
* the access preview assumes a bucket without a
|
|
1024
|
-
* bucket policy, you can specify an empty string.
|
|
1025
|
-
* limits, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/example-bucket-policies.html">Bucket Policy
|
|
1023
|
+
* the Amazon S3 bucket policy, bucket ACLs, bucket BPA settings, Amazon S3 access points, and
|
|
1024
|
+
* multi-region access points attached to the bucket. If the configuration is for an existing
|
|
1025
|
+
* Amazon S3 bucket and you do not specify the Amazon S3 bucket policy, the access preview uses the
|
|
1026
|
+
* existing policy attached to the bucket. If the access preview is for a new resource and you
|
|
1027
|
+
* do not specify the Amazon S3 bucket policy, the access preview assumes a bucket without a
|
|
1028
|
+
* policy. To propose deletion of an existing bucket policy, you can specify an empty string.
|
|
1029
|
+
* For more information about bucket policy limits, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/example-bucket-policies.html">Bucket Policy
|
|
1026
1030
|
* Examples</a>.</p>
|
|
1027
1031
|
*/
|
|
1028
1032
|
export interface S3BucketConfiguration {
|
|
@@ -1042,7 +1046,8 @@ export interface S3BucketConfiguration {
|
|
|
1042
1046
|
*/
|
|
1043
1047
|
bucketPublicAccessBlock?: S3PublicAccessBlockConfiguration;
|
|
1044
1048
|
/**
|
|
1045
|
-
* <p>The configuration of Amazon S3 access points for the bucket
|
|
1049
|
+
* <p>The configuration of Amazon S3 access points or multi-region access points for the bucket.
|
|
1050
|
+
* You can propose up to 10 new access points per bucket.</p>
|
|
1046
1051
|
*/
|
|
1047
1052
|
accessPoints?: {
|
|
1048
1053
|
[key: string]: S3AccessPointConfiguration;
|
|
@@ -1062,15 +1067,15 @@ export declare namespace S3BucketConfiguration {
|
|
|
1062
1067
|
* existing policy for the secret. If the access preview is for a new resource and you do not
|
|
1063
1068
|
* specify the policy, the access preview assumes a secret without a policy. To propose
|
|
1064
1069
|
* deletion of an existing policy, you can specify an empty string. If the proposed
|
|
1065
|
-
* configuration is for a new secret and you do not specify the KMS key ID, the access
|
|
1066
|
-
* uses the default CMK of the
|
|
1067
|
-
* ID, the access preview uses the default CMK of the
|
|
1068
|
-
* about secret policy limits, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_limits.html">Quotas for
|
|
1069
|
-
* Manager.</a>.</p>
|
|
1070
|
+
* configuration is for a new secret and you do not specify the KMS key ID, the access
|
|
1071
|
+
* preview uses the default CMK of the Amazon Web Services account. If you specify an empty string for the
|
|
1072
|
+
* KMS key ID, the access preview uses the default CMK of the Amazon Web Services account. For more
|
|
1073
|
+
* information about secret policy limits, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_limits.html">Quotas for
|
|
1074
|
+
* Secrets Manager.</a>.</p>
|
|
1070
1075
|
*/
|
|
1071
1076
|
export interface SecretsManagerSecretConfiguration {
|
|
1072
1077
|
/**
|
|
1073
|
-
* <p>The proposed ARN, key ID, or alias of the
|
|
1078
|
+
* <p>The proposed ARN, key ID, or alias of the KMS customer master key (CMK).</p>
|
|
1074
1079
|
*/
|
|
1075
1080
|
kmsKeyId?: string;
|
|
1076
1081
|
/**
|
|
@@ -1085,19 +1090,19 @@ export declare namespace SecretsManagerSecretConfiguration {
|
|
|
1085
1090
|
const filterSensitiveLog: (obj: SecretsManagerSecretConfiguration) => any;
|
|
1086
1091
|
}
|
|
1087
1092
|
/**
|
|
1088
|
-
* <p>The proposed access control configuration for an SQS queue. You can propose a
|
|
1089
|
-
* configuration for a new SQS queue or an existing SQS queue that you own by specifying
|
|
1090
|
-
* SQS policy. If the configuration is for an existing SQS queue and you do not
|
|
1091
|
-
* SQS policy, the access preview uses the existing SQS policy for the queue.
|
|
1092
|
-
* preview is for a new resource and you do not specify the policy, the access
|
|
1093
|
-
* an SQS queue without a policy. To propose deletion of an existing SQS
|
|
1094
|
-
* specify an empty string for the SQS policy. For more information
|
|
1095
|
-
* see <a href="https://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/quotas-policies.html">Quotas related
|
|
1093
|
+
* <p>The proposed access control configuration for an Amazon SQS queue. You can propose a
|
|
1094
|
+
* configuration for a new Amazon SQS queue or an existing Amazon SQS queue that you own by specifying
|
|
1095
|
+
* the Amazon SQS policy. If the configuration is for an existing Amazon SQS queue and you do not
|
|
1096
|
+
* specify the Amazon SQS policy, the access preview uses the existing Amazon SQS policy for the queue.
|
|
1097
|
+
* If the access preview is for a new resource and you do not specify the policy, the access
|
|
1098
|
+
* preview assumes an Amazon SQS queue without a policy. To propose deletion of an existing Amazon SQS
|
|
1099
|
+
* queue policy, you can specify an empty string for the Amazon SQS policy. For more information
|
|
1100
|
+
* about Amazon SQS policy limits, see <a href="https://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/quotas-policies.html">Quotas related
|
|
1096
1101
|
* to policies</a>.</p>
|
|
1097
1102
|
*/
|
|
1098
1103
|
export interface SqsQueueConfiguration {
|
|
1099
1104
|
/**
|
|
1100
|
-
* <p> The proposed resource policy for the SQS queue. </p>
|
|
1105
|
+
* <p> The proposed resource policy for the Amazon SQS queue. </p>
|
|
1101
1106
|
*/
|
|
1102
1107
|
queuePolicy?: string;
|
|
1103
1108
|
}
|
|
@@ -1158,7 +1163,7 @@ export declare namespace Configuration {
|
|
|
1158
1163
|
$unknown?: never;
|
|
1159
1164
|
}
|
|
1160
1165
|
/**
|
|
1161
|
-
* <p>The access control configuration is for an SQS queue. </p>
|
|
1166
|
+
* <p>The access control configuration is for an Amazon SQS queue. </p>
|
|
1162
1167
|
*/
|
|
1163
1168
|
interface SqsQueueMember {
|
|
1164
1169
|
iamRole?: never;
|
|
@@ -1407,7 +1412,7 @@ export interface AnalyzedResource {
|
|
|
1407
1412
|
*/
|
|
1408
1413
|
status?: FindingStatus | string;
|
|
1409
1414
|
/**
|
|
1410
|
-
* <p>The
|
|
1415
|
+
* <p>The Amazon Web Services account ID that owns the resource.</p>
|
|
1411
1416
|
*/
|
|
1412
1417
|
resourceOwnerAccount: string | undefined;
|
|
1413
1418
|
/**
|
|
@@ -1426,8 +1431,8 @@ export declare namespace AnalyzedResource {
|
|
|
1426
1431
|
*/
|
|
1427
1432
|
export interface GetAnalyzedResourceResponse {
|
|
1428
1433
|
/**
|
|
1429
|
-
* <p>An <code>AnalyzedResource</code> object that contains information that Access Analyzer
|
|
1430
|
-
* when it analyzed the resource.</p>
|
|
1434
|
+
* <p>An <code>AnalyzedResource</code> object that contains information that IAM Access Analyzer
|
|
1435
|
+
* found when it analyzed the resource.</p>
|
|
1431
1436
|
*/
|
|
1432
1437
|
resource?: AnalyzedResource;
|
|
1433
1438
|
}
|
|
@@ -1463,7 +1468,8 @@ export declare namespace GetFindingRequest {
|
|
|
1463
1468
|
*/
|
|
1464
1469
|
export interface FindingSourceDetail {
|
|
1465
1470
|
/**
|
|
1466
|
-
* <p>The ARN of the access point that generated the finding
|
|
1471
|
+
* <p>The ARN of the access point that generated the finding. The ARN format depends on
|
|
1472
|
+
* whether the ARN represents an access point or a multi-region access point.</p>
|
|
1467
1473
|
*/
|
|
1468
1474
|
accessPointArn?: string;
|
|
1469
1475
|
}
|
|
@@ -1550,7 +1556,7 @@ export interface Finding {
|
|
|
1550
1556
|
*/
|
|
1551
1557
|
status: FindingStatus | string | undefined;
|
|
1552
1558
|
/**
|
|
1553
|
-
* <p>The
|
|
1559
|
+
* <p>The Amazon Web Services account ID that owns the resource.</p>
|
|
1554
1560
|
*/
|
|
1555
1561
|
resourceOwnerAccount: string | undefined;
|
|
1556
1562
|
/**
|
|
@@ -1603,8 +1609,8 @@ export interface GetGeneratedPolicyRequest {
|
|
|
1603
1609
|
/**
|
|
1604
1610
|
* <p>The level of detail that you want to generate. You can specify whether to generate
|
|
1605
1611
|
* service-level policies. </p>
|
|
1606
|
-
* <p>Access Analyzer uses <code>iam:servicelastaccessed</code> to identify services that have
|
|
1607
|
-
* used recently to create this service-level template.</p>
|
|
1612
|
+
* <p>IAM Access Analyzer uses <code>iam:servicelastaccessed</code> to identify services that have
|
|
1613
|
+
* been used recently to create this service-level template.</p>
|
|
1608
1614
|
*/
|
|
1609
1615
|
includeServiceLevelTemplate?: boolean;
|
|
1610
1616
|
}
|
|
@@ -1645,7 +1651,7 @@ export interface TrailProperties {
|
|
|
1645
1651
|
regions?: string[];
|
|
1646
1652
|
/**
|
|
1647
1653
|
* <p>Possible values are <code>true</code> or <code>false</code>. If set to
|
|
1648
|
-
* <code>true</code>, Access Analyzer retrieves CloudTrail data from all regions to analyze and
|
|
1654
|
+
* <code>true</code>, IAM Access Analyzer retrieves CloudTrail data from all regions to analyze and
|
|
1649
1655
|
* generate a policy.</p>
|
|
1650
1656
|
*/
|
|
1651
1657
|
allRegions?: boolean;
|
|
@@ -1666,12 +1672,12 @@ export interface CloudTrailProperties {
|
|
|
1666
1672
|
*/
|
|
1667
1673
|
trailProperties: TrailProperties[] | undefined;
|
|
1668
1674
|
/**
|
|
1669
|
-
* <p>The start of the time range for which Access Analyzer reviews your CloudTrail events. Events
|
|
1675
|
+
* <p>The start of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events
|
|
1670
1676
|
* with a timestamp before this time are not considered to generate a policy.</p>
|
|
1671
1677
|
*/
|
|
1672
1678
|
startTime: Date | undefined;
|
|
1673
1679
|
/**
|
|
1674
|
-
* <p>The end of the time range for which Access Analyzer reviews your CloudTrail events. Events with
|
|
1680
|
+
* <p>The end of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events with
|
|
1675
1681
|
* a timestamp after this time are not considered to generate a policy. If this is not
|
|
1676
1682
|
* included in the request, the default value is the current time.</p>
|
|
1677
1683
|
*/
|
|
@@ -1688,9 +1694,9 @@ export declare namespace CloudTrailProperties {
|
|
|
1688
1694
|
*/
|
|
1689
1695
|
export interface GeneratedPolicyProperties {
|
|
1690
1696
|
/**
|
|
1691
|
-
* <p>This value is set to <code>true</code> if the generated policy contains all possible
|
|
1692
|
-
* service that Access Analyzer identified from the CloudTrail trail that you specified,
|
|
1693
|
-
* <code>false</code> otherwise.</p>
|
|
1697
|
+
* <p>This value is set to <code>true</code> if the generated policy contains all possible
|
|
1698
|
+
* actions for a service that IAM Access Analyzer identified from the CloudTrail trail that you specified,
|
|
1699
|
+
* and <code>false</code> otherwise.</p>
|
|
1694
1700
|
*/
|
|
1695
1701
|
isComplete?: boolean;
|
|
1696
1702
|
/**
|
|
@@ -1785,7 +1791,7 @@ export interface JobDetails {
|
|
|
1785
1791
|
*/
|
|
1786
1792
|
completedOn?: Date;
|
|
1787
1793
|
/**
|
|
1788
|
-
* <p>
|
|
1794
|
+
* <p>The job error for the policy generation request.</p>
|
|
1789
1795
|
*/
|
|
1790
1796
|
jobError?: JobError;
|
|
1791
1797
|
}
|
|
@@ -1860,7 +1866,8 @@ export interface AccessPreviewFinding {
|
|
|
1860
1866
|
*/
|
|
1861
1867
|
id: string | undefined;
|
|
1862
1868
|
/**
|
|
1863
|
-
* <p>The existing ID of the finding in Access Analyzer, provided only for existing
|
|
1869
|
+
* <p>The existing ID of the finding in IAM Access Analyzer, provided only for existing
|
|
1870
|
+
* findings.</p>
|
|
1864
1871
|
*/
|
|
1865
1872
|
existingFindingId?: string;
|
|
1866
1873
|
/**
|
|
@@ -1904,7 +1911,7 @@ export interface AccessPreviewFinding {
|
|
|
1904
1911
|
createdAt: Date | undefined;
|
|
1905
1912
|
/**
|
|
1906
1913
|
* <p>Provides context on how the access preview finding compares to existing access
|
|
1907
|
-
* identified in Access Analyzer.</p>
|
|
1914
|
+
* identified in IAM Access Analyzer.</p>
|
|
1908
1915
|
* <ul>
|
|
1909
1916
|
* <li>
|
|
1910
1917
|
* <p>
|
|
@@ -1935,7 +1942,7 @@ export interface AccessPreviewFinding {
|
|
|
1935
1942
|
*/
|
|
1936
1943
|
status: FindingStatus | string | undefined;
|
|
1937
1944
|
/**
|
|
1938
|
-
* <p>The
|
|
1945
|
+
* <p>The Amazon Web Services account ID that owns the resource. For most Amazon Web Services resources, the owning
|
|
1939
1946
|
* account is the account in which the resource was created.</p>
|
|
1940
1947
|
*/
|
|
1941
1948
|
resourceOwnerAccount: string | undefined;
|
|
@@ -2094,7 +2101,7 @@ export interface AnalyzedResourceSummary {
|
|
|
2094
2101
|
*/
|
|
2095
2102
|
resourceArn: string | undefined;
|
|
2096
2103
|
/**
|
|
2097
|
-
* <p>The
|
|
2104
|
+
* <p>The Amazon Web Services account ID that owns the resource.</p>
|
|
2098
2105
|
*/
|
|
2099
2106
|
resourceOwnerAccount: string | undefined;
|
|
2100
2107
|
/**
|
|
@@ -2237,7 +2244,7 @@ export interface FindingSummary {
|
|
|
2237
2244
|
*/
|
|
2238
2245
|
status: FindingStatus | string | undefined;
|
|
2239
2246
|
/**
|
|
2240
|
-
* <p>The
|
|
2247
|
+
* <p>The Amazon Web Services account ID that owns the resource.</p>
|
|
2241
2248
|
*/
|
|
2242
2249
|
resourceOwnerAccount: string | undefined;
|
|
2243
2250
|
/**
|
|
@@ -2396,7 +2403,7 @@ export interface Trail {
|
|
|
2396
2403
|
regions?: string[];
|
|
2397
2404
|
/**
|
|
2398
2405
|
* <p>Possible values are <code>true</code> or <code>false</code>. If set to
|
|
2399
|
-
* <code>true</code>, Access Analyzer retrieves CloudTrail data from all regions to analyze and
|
|
2406
|
+
* <code>true</code>, IAM Access Analyzer retrieves CloudTrail data from all regions to analyze and
|
|
2400
2407
|
* generate a policy.</p>
|
|
2401
2408
|
*/
|
|
2402
2409
|
allRegions?: boolean;
|
|
@@ -2416,17 +2423,17 @@ export interface CloudTrailDetails {
|
|
|
2416
2423
|
*/
|
|
2417
2424
|
trails: Trail[] | undefined;
|
|
2418
2425
|
/**
|
|
2419
|
-
* <p>The ARN of the service role that Access Analyzer uses to access your CloudTrail trail and
|
|
2426
|
+
* <p>The ARN of the service role that IAM Access Analyzer uses to access your CloudTrail trail and
|
|
2420
2427
|
* service last accessed information.</p>
|
|
2421
2428
|
*/
|
|
2422
2429
|
accessRole: string | undefined;
|
|
2423
2430
|
/**
|
|
2424
|
-
* <p>The start of the time range for which Access Analyzer reviews your CloudTrail events. Events
|
|
2431
|
+
* <p>The start of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events
|
|
2425
2432
|
* with a timestamp before this time are not considered to generate a policy.</p>
|
|
2426
2433
|
*/
|
|
2427
2434
|
startTime: Date | undefined;
|
|
2428
2435
|
/**
|
|
2429
|
-
* <p>The end of the time range for which Access Analyzer reviews your CloudTrail events. Events with
|
|
2436
|
+
* <p>The end of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events with
|
|
2430
2437
|
* a timestamp after this time are not considered to generate a policy. If this is not
|
|
2431
2438
|
* included in the request, the default value is the current time.</p>
|
|
2432
2439
|
*/
|
|
@@ -2471,7 +2478,7 @@ export interface StartPolicyGenerationRequest {
|
|
|
2471
2478
|
* request, if the original request completes successfully, the subsequent retries with the
|
|
2472
2479
|
* same client token return the result from the original successful request and they have no
|
|
2473
2480
|
* additional effect.</p>
|
|
2474
|
-
* <p>If you do not specify a client token, one is automatically generated by the
|
|
2481
|
+
* <p>If you do not specify a client token, one is automatically generated by the Amazon Web Services
|
|
2475
2482
|
* SDK.</p>
|
|
2476
2483
|
*/
|
|
2477
2484
|
clientToken?: string;
|
|
@@ -2652,12 +2659,12 @@ export interface ValidatePolicyRequest {
|
|
|
2652
2659
|
/**
|
|
2653
2660
|
* <p>The type of policy to validate. Identity policies grant permissions to IAM principals.
|
|
2654
2661
|
* Identity policies include managed and inline policies for IAM roles, users, and groups.
|
|
2655
|
-
* They also include service-control policies (SCPs) that are attached to an
|
|
2662
|
+
* They also include service-control policies (SCPs) that are attached to an Amazon Web Services
|
|
2656
2663
|
* organization, organizational unit (OU), or an account.</p>
|
|
2657
|
-
* <p>Resource policies grant permissions on
|
|
2658
|
-
* policies for IAM roles and bucket policies for S3 buckets. You can provide a generic
|
|
2659
|
-
* such as identity policy or resource policy or a specific input such as managed policy
|
|
2660
|
-
* bucket policy. </p>
|
|
2664
|
+
* <p>Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust
|
|
2665
|
+
* policies for IAM roles and bucket policies for Amazon S3 buckets. You can provide a generic
|
|
2666
|
+
* input such as identity policy or resource policy or a specific input such as managed policy
|
|
2667
|
+
* or Amazon S3 bucket policy. </p>
|
|
2661
2668
|
*/
|
|
2662
2669
|
policyType: PolicyType | string | undefined;
|
|
2663
2670
|
}
|
|
@@ -2863,7 +2870,7 @@ export declare namespace ValidatePolicyFinding {
|
|
|
2863
2870
|
}
|
|
2864
2871
|
export interface ValidatePolicyResponse {
|
|
2865
2872
|
/**
|
|
2866
|
-
* <p>The list of findings in a policy returned by Access Analyzer based on its suite of policy
|
|
2873
|
+
* <p>The list of findings in a policy returned by IAM Access Analyzer based on its suite of policy
|
|
2867
2874
|
* checks.</p>
|
|
2868
2875
|
*/
|
|
2869
2876
|
findings: ValidatePolicyFinding[] | undefined;
|
|
@@ -29,15 +29,15 @@ import { UpdateFindingsCommandInput, UpdateFindingsCommandOutput } from "./comma
|
|
|
29
29
|
import { ValidatePolicyCommandInput, ValidatePolicyCommandOutput } from "./commands/ValidatePolicyCommand";
|
|
30
30
|
import { HttpHandlerOptions as __HttpHandlerOptions } from "@aws-sdk/types";
|
|
31
31
|
/**
|
|
32
|
-
* <p>
|
|
33
|
-
* any policies that grant access to an external principal. It does this by using
|
|
34
|
-
* reasoning to analyze resource-based policies in your
|
|
35
|
-
* principal can be another
|
|
36
|
-
* user, an
|
|
37
|
-
* validate public and cross-account access to your resources before deploying
|
|
38
|
-
* changes. This guide describes the
|
|
39
|
-
* programmatically. For general information about Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">
|
|
40
|
-
* <p>To start using Access Analyzer, you first need to create an analyzer.</p>
|
|
32
|
+
* <p>Identity and Access Management Access Analyzer helps identify potential resource-access risks by enabling you to
|
|
33
|
+
* identify any policies that grant access to an external principal. It does this by using
|
|
34
|
+
* logic-based reasoning to analyze resource-based policies in your Amazon Web Services environment. An
|
|
35
|
+
* external principal can be another Amazon Web Services account, a root user, an IAM user or role, a
|
|
36
|
+
* federated user, an Amazon Web Services service, or an anonymous user. You can also use IAM Access Analyzer to
|
|
37
|
+
* preview and validate public and cross-account access to your resources before deploying
|
|
38
|
+
* permissions changes. This guide describes the Identity and Access Management Access Analyzer operations that you can
|
|
39
|
+
* call programmatically. For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity and Access Management Access Analyzer</a> in the <b>IAM User Guide</b>.</p>
|
|
40
|
+
* <p>To start using IAM Access Analyzer, you first need to create an analyzer.</p>
|
|
41
41
|
*/
|
|
42
42
|
export declare class AccessAnalyzer extends AccessAnalyzerClient {
|
|
43
43
|
/**
|
|
@@ -54,8 +54,8 @@ export declare class AccessAnalyzer extends AccessAnalyzerClient {
|
|
|
54
54
|
cancelPolicyGeneration(args: CancelPolicyGenerationCommandInput, cb: (err: any, data?: CancelPolicyGenerationCommandOutput) => void): void;
|
|
55
55
|
cancelPolicyGeneration(args: CancelPolicyGenerationCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: CancelPolicyGenerationCommandOutput) => void): void;
|
|
56
56
|
/**
|
|
57
|
-
* <p>Creates an access preview that allows you to preview Access Analyzer findings for your
|
|
58
|
-
* before deploying resource permissions.</p>
|
|
57
|
+
* <p>Creates an access preview that allows you to preview IAM Access Analyzer findings for your
|
|
58
|
+
* resource before deploying resource permissions.</p>
|
|
59
59
|
*/
|
|
60
60
|
createAccessPreview(args: CreateAccessPreviewCommandInput, options?: __HttpHandlerOptions): Promise<CreateAccessPreviewCommandOutput>;
|
|
61
61
|
createAccessPreview(args: CreateAccessPreviewCommandInput, cb: (err: any, data?: CreateAccessPreviewCommandOutput) => void): void;
|
|
@@ -69,16 +69,15 @@ export declare class AccessAnalyzer extends AccessAnalyzerClient {
|
|
|
69
69
|
/**
|
|
70
70
|
* <p>Creates an archive rule for the specified analyzer. Archive rules automatically archive
|
|
71
71
|
* new findings that meet the criteria you define when you create the rule.</p>
|
|
72
|
-
* <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">Access Analyzer filter keys</a> in the <b>IAM User
|
|
73
|
-
* Guide</b>.</p>
|
|
72
|
+
* <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
|
|
74
73
|
*/
|
|
75
74
|
createArchiveRule(args: CreateArchiveRuleCommandInput, options?: __HttpHandlerOptions): Promise<CreateArchiveRuleCommandOutput>;
|
|
76
75
|
createArchiveRule(args: CreateArchiveRuleCommandInput, cb: (err: any, data?: CreateArchiveRuleCommandOutput) => void): void;
|
|
77
76
|
createArchiveRule(args: CreateArchiveRuleCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: CreateArchiveRuleCommandOutput) => void): void;
|
|
78
77
|
/**
|
|
79
|
-
* <p>Deletes the specified analyzer. When you delete an analyzer, Access Analyzer is disabled
|
|
80
|
-
* account or organization in the current or specific Region. All findings that were
|
|
81
|
-
* by the analyzer are deleted. You cannot undo this action.</p>
|
|
78
|
+
* <p>Deletes the specified analyzer. When you delete an analyzer, IAM Access Analyzer is disabled
|
|
79
|
+
* for the account or organization in the current or specific Region. All findings that were
|
|
80
|
+
* generated by the analyzer are deleted. You cannot undo this action.</p>
|
|
82
81
|
*/
|
|
83
82
|
deleteAnalyzer(args: DeleteAnalyzerCommandInput, options?: __HttpHandlerOptions): Promise<DeleteAnalyzerCommandOutput>;
|
|
84
83
|
deleteAnalyzer(args: DeleteAnalyzerCommandInput, cb: (err: any, data?: DeleteAnalyzerCommandOutput) => void): void;
|
|
@@ -109,8 +108,7 @@ export declare class AccessAnalyzer extends AccessAnalyzerClient {
|
|
|
109
108
|
getAnalyzer(args: GetAnalyzerCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: GetAnalyzerCommandOutput) => void): void;
|
|
110
109
|
/**
|
|
111
110
|
* <p>Retrieves information about an archive rule.</p>
|
|
112
|
-
* <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">Access Analyzer filter keys</a> in the <b>IAM User
|
|
113
|
-
* Guide</b>.</p>
|
|
111
|
+
* <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
|
|
114
112
|
*/
|
|
115
113
|
getArchiveRule(args: GetArchiveRuleCommandInput, options?: __HttpHandlerOptions): Promise<GetArchiveRuleCommandOutput>;
|
|
116
114
|
getArchiveRule(args: GetArchiveRuleCommandInput, cb: (err: any, data?: GetArchiveRuleCommandOutput) => void): void;
|
|
@@ -162,8 +160,7 @@ export declare class AccessAnalyzer extends AccessAnalyzerClient {
|
|
|
162
160
|
listArchiveRules(args: ListArchiveRulesCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: ListArchiveRulesCommandOutput) => void): void;
|
|
163
161
|
/**
|
|
164
162
|
* <p>Retrieves a list of findings generated by the specified analyzer.</p>
|
|
165
|
-
* <p>To learn about filter keys that you can use to retrieve a list of findings, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">Access Analyzer filter keys</a> in the <b>IAM User
|
|
166
|
-
* Guide</b>.</p>
|
|
163
|
+
* <p>To learn about filter keys that you can use to retrieve a list of findings, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
|
|
167
164
|
*/
|
|
168
165
|
listFindings(args: ListFindingsCommandInput, options?: __HttpHandlerOptions): Promise<ListFindingsCommandOutput>;
|
|
169
166
|
listFindings(args: ListFindingsCommandInput, cb: (err: any, data?: ListFindingsCommandOutput) => void): void;
|
|
@@ -142,15 +142,15 @@ declare type AccessAnalyzerClientResolvedConfigType = __SmithyResolvedConfigurat
|
|
|
142
142
|
export interface AccessAnalyzerClientResolvedConfig extends AccessAnalyzerClientResolvedConfigType {
|
|
143
143
|
}
|
|
144
144
|
/**
|
|
145
|
-
* <p>
|
|
146
|
-
* any policies that grant access to an external principal. It does this by using
|
|
147
|
-
* reasoning to analyze resource-based policies in your
|
|
148
|
-
* principal can be another
|
|
149
|
-
* user, an
|
|
150
|
-
* validate public and cross-account access to your resources before deploying
|
|
151
|
-
* changes. This guide describes the
|
|
152
|
-
* programmatically. For general information about Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">
|
|
153
|
-
* <p>To start using Access Analyzer, you first need to create an analyzer.</p>
|
|
145
|
+
* <p>Identity and Access Management Access Analyzer helps identify potential resource-access risks by enabling you to
|
|
146
|
+
* identify any policies that grant access to an external principal. It does this by using
|
|
147
|
+
* logic-based reasoning to analyze resource-based policies in your Amazon Web Services environment. An
|
|
148
|
+
* external principal can be another Amazon Web Services account, a root user, an IAM user or role, a
|
|
149
|
+
* federated user, an Amazon Web Services service, or an anonymous user. You can also use IAM Access Analyzer to
|
|
150
|
+
* preview and validate public and cross-account access to your resources before deploying
|
|
151
|
+
* permissions changes. This guide describes the Identity and Access Management Access Analyzer operations that you can
|
|
152
|
+
* call programmatically. For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity and Access Management Access Analyzer</a> in the <b>IAM User Guide</b>.</p>
|
|
153
|
+
* <p>To start using IAM Access Analyzer, you first need to create an analyzer.</p>
|
|
154
154
|
*/
|
|
155
155
|
export declare class AccessAnalyzerClient extends __Client<__HttpHandlerOptions, ServiceInputTypes, ServiceOutputTypes, AccessAnalyzerClientResolvedConfig> {
|
|
156
156
|
/**
|
|
@@ -7,8 +7,8 @@ export interface CreateAccessPreviewCommandInput extends CreateAccessPreviewRequ
|
|
|
7
7
|
export interface CreateAccessPreviewCommandOutput extends CreateAccessPreviewResponse, __MetadataBearer {
|
|
8
8
|
}
|
|
9
9
|
/**
|
|
10
|
-
* <p>Creates an access preview that allows you to preview Access Analyzer findings for your
|
|
11
|
-
* before deploying resource permissions.</p>
|
|
10
|
+
* <p>Creates an access preview that allows you to preview IAM Access Analyzer findings for your
|
|
11
|
+
* resource before deploying resource permissions.</p>
|
|
12
12
|
* @example
|
|
13
13
|
* Use a bare-bones client and the command you need to make an API call.
|
|
14
14
|
* ```javascript
|