@aws-sdk/client-accessanalyzer 3.28.0 → 3.32.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (60) hide show
  1. package/AccessAnalyzer.ts +17 -20
  2. package/AccessAnalyzerClient.ts +9 -9
  3. package/CHANGELOG.md +35 -0
  4. package/README.md +9 -9
  5. package/commands/CreateAccessPreviewCommand.ts +2 -2
  6. package/commands/CreateArchiveRuleCommand.ts +1 -2
  7. package/commands/DeleteAnalyzerCommand.ts +3 -3
  8. package/commands/GetArchiveRuleCommand.ts +1 -2
  9. package/commands/ListFindingsCommand.ts +1 -2
  10. package/dist/cjs/AccessAnalyzer.js +9 -9
  11. package/dist/cjs/AccessAnalyzer.js.map +1 -1
  12. package/dist/cjs/AccessAnalyzerClient.js +9 -9
  13. package/dist/cjs/commands/CreateAccessPreviewCommand.js +2 -2
  14. package/dist/cjs/commands/CreateArchiveRuleCommand.js +1 -2
  15. package/dist/cjs/commands/CreateArchiveRuleCommand.js.map +1 -1
  16. package/dist/cjs/commands/DeleteAnalyzerCommand.js +3 -3
  17. package/dist/cjs/commands/GetArchiveRuleCommand.js +1 -2
  18. package/dist/cjs/commands/GetArchiveRuleCommand.js.map +1 -1
  19. package/dist/cjs/commands/ListFindingsCommand.js +1 -2
  20. package/dist/cjs/commands/ListFindingsCommand.js.map +1 -1
  21. package/dist/cjs/models/models_0.js.map +1 -1
  22. package/dist/cjs/package.json +31 -31
  23. package/dist/cjs/protocols/Aws_restJson1.js +95 -53
  24. package/dist/cjs/protocols/Aws_restJson1.js.map +1 -1
  25. package/dist/es/AccessAnalyzer.js +9 -9
  26. package/dist/es/AccessAnalyzer.js.map +1 -1
  27. package/dist/es/AccessAnalyzerClient.js +9 -9
  28. package/dist/es/commands/CreateAccessPreviewCommand.js +2 -2
  29. package/dist/es/commands/CreateArchiveRuleCommand.js +1 -2
  30. package/dist/es/commands/CreateArchiveRuleCommand.js.map +1 -1
  31. package/dist/es/commands/DeleteAnalyzerCommand.js +3 -3
  32. package/dist/es/commands/GetArchiveRuleCommand.js +1 -2
  33. package/dist/es/commands/GetArchiveRuleCommand.js.map +1 -1
  34. package/dist/es/commands/ListFindingsCommand.js +1 -2
  35. package/dist/es/commands/ListFindingsCommand.js.map +1 -1
  36. package/dist/es/endpoints.js +1 -2
  37. package/dist/es/endpoints.js.map +1 -1
  38. package/dist/es/models/models_0.js.map +1 -1
  39. package/dist/es/package.json +31 -31
  40. package/dist/es/protocols/Aws_restJson1.js +186 -108
  41. package/dist/es/protocols/Aws_restJson1.js.map +1 -1
  42. package/dist/types/AccessAnalyzer.d.ts +17 -20
  43. package/dist/types/AccessAnalyzerClient.d.ts +9 -9
  44. package/dist/types/commands/CreateAccessPreviewCommand.d.ts +2 -2
  45. package/dist/types/commands/CreateArchiveRuleCommand.d.ts +1 -2
  46. package/dist/types/commands/DeleteAnalyzerCommand.d.ts +3 -3
  47. package/dist/types/commands/GetArchiveRuleCommand.d.ts +1 -2
  48. package/dist/types/commands/ListFindingsCommand.d.ts +1 -2
  49. package/dist/types/models/models_0.d.ts +105 -98
  50. package/dist/types/ts3.4/AccessAnalyzer.d.ts +17 -20
  51. package/dist/types/ts3.4/AccessAnalyzerClient.d.ts +9 -9
  52. package/dist/types/ts3.4/commands/CreateAccessPreviewCommand.d.ts +2 -2
  53. package/dist/types/ts3.4/commands/CreateArchiveRuleCommand.d.ts +1 -2
  54. package/dist/types/ts3.4/commands/DeleteAnalyzerCommand.d.ts +3 -3
  55. package/dist/types/ts3.4/commands/GetArchiveRuleCommand.d.ts +1 -2
  56. package/dist/types/ts3.4/commands/ListFindingsCommand.d.ts +1 -2
  57. package/dist/types/ts3.4/models/models_0.d.ts +105 -98
  58. package/models/models_0.ts +105 -98
  59. package/package.json +31 -31
  60. package/protocols/Aws_restJson1.ts +120 -55
@@ -9,8 +9,7 @@ export interface CreateArchiveRuleCommandOutput extends __MetadataBearer {
9
9
  /**
10
10
  * <p>Creates an archive rule for the specified analyzer. Archive rules automatically archive
11
11
  * new findings that meet the criteria you define when you create the rule.</p>
12
- * <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">Access Analyzer filter keys</a> in the <b>IAM User
13
- * Guide</b>.</p>
12
+ * <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
14
13
  * @example
15
14
  * Use a bare-bones client and the command you need to make an API call.
16
15
  * ```javascript
@@ -7,9 +7,9 @@ export interface DeleteAnalyzerCommandInput extends DeleteAnalyzerRequest {
7
7
  export interface DeleteAnalyzerCommandOutput extends __MetadataBearer {
8
8
  }
9
9
  /**
10
- * <p>Deletes the specified analyzer. When you delete an analyzer, Access Analyzer is disabled for the
11
- * account or organization in the current or specific Region. All findings that were generated
12
- * by the analyzer are deleted. You cannot undo this action.</p>
10
+ * <p>Deletes the specified analyzer. When you delete an analyzer, IAM Access Analyzer is disabled
11
+ * for the account or organization in the current or specific Region. All findings that were
12
+ * generated by the analyzer are deleted. You cannot undo this action.</p>
13
13
  * @example
14
14
  * Use a bare-bones client and the command you need to make an API call.
15
15
  * ```javascript
@@ -8,8 +8,7 @@ export interface GetArchiveRuleCommandOutput extends GetArchiveRuleResponse, __M
8
8
  }
9
9
  /**
10
10
  * <p>Retrieves information about an archive rule.</p>
11
- * <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">Access Analyzer filter keys</a> in the <b>IAM User
12
- * Guide</b>.</p>
11
+ * <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
13
12
  * @example
14
13
  * Use a bare-bones client and the command you need to make an API call.
15
14
  * ```javascript
@@ -8,8 +8,7 @@ export interface ListFindingsCommandOutput extends ListFindingsResponse, __Metad
8
8
  }
9
9
  /**
10
10
  * <p>Retrieves a list of findings generated by the specified analyzer.</p>
11
- * <p>To learn about filter keys that you can use to retrieve a list of findings, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">Access Analyzer filter keys</a> in the <b>IAM User
12
- * Guide</b>.</p>
11
+ * <p>To learn about filter keys that you can use to retrieve a list of findings, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
13
12
  * @example
14
13
  * Use a bare-bones client and the command you need to make an API call.
15
14
  * ```javascript
@@ -494,7 +494,7 @@ export declare type ReasonCode = "AWS_SERVICE_ACCESS_DISABLED" | "DELEGATED_ADMI
494
494
  * <p>Provides more details about the current status of the analyzer. For example, if the
495
495
  * creation for the analyzer fails, a <code>Failed</code> status is returned. For an analyzer
496
496
  * with organization as the type, this failure can be due to an issue with creating the
497
- * service-linked roles required in the member accounts of the AWS organization.</p>
497
+ * service-linked roles required in the member accounts of the Amazon Web Services organization.</p>
498
498
  */
499
499
  export interface StatusReason {
500
500
  /**
@@ -546,17 +546,17 @@ export interface AnalyzerSummary {
546
546
  /**
547
547
  * <p>The status of the analyzer. An <code>Active</code> analyzer successfully monitors
548
548
  * supported resources and generates new findings. The analyzer is <code>Disabled</code> when
549
- * a user action, such as removing trusted access for AWS IAM Access Analyzer from AWS Organizations,
550
- * causes the analyzer to stop generating new findings. The status is <code>Creating</code>
551
- * when the analyzer creation is in progress and <code>Failed</code> when the analyzer
552
- * creation has failed. </p>
549
+ * a user action, such as removing trusted access for Identity and Access Management Access Analyzer from Organizations, causes
550
+ * the analyzer to stop generating new findings. The status is <code>Creating</code> when the
551
+ * analyzer creation is in progress and <code>Failed</code> when the analyzer creation has
552
+ * failed. </p>
553
553
  */
554
554
  status: AnalyzerStatus | string | undefined;
555
555
  /**
556
556
  * <p>The <code>statusReason</code> provides more details about the current status of the
557
557
  * analyzer. For example, if the creation for the analyzer fails, a <code>Failed</code> status
558
558
  * is returned. For an analyzer with organization as the type, this failure can be due to an
559
- * issue with creating the service-linked roles required in the member accounts of the AWS
559
+ * issue with creating the service-linked roles required in the member accounts of the Amazon Web Services
560
560
  * organization.</p>
561
561
  */
562
562
  statusReason?: StatusReason;
@@ -767,8 +767,8 @@ export interface KmsGrantConfiguration {
767
767
  */
768
768
  constraints?: KmsGrantConstraints;
769
769
  /**
770
- * <p> The AWS account under which the grant was issued. The account is used to propose KMS
771
- * grants issued by accounts other than the owner of the key.</p>
770
+ * <p> The Amazon Web Services account under which the grant was issued. The account is used to propose
771
+ * KMS grants issued by accounts other than the owner of the key.</p>
772
772
  */
773
773
  issuingAccount: string | undefined;
774
774
  }
@@ -779,21 +779,21 @@ export declare namespace KmsGrantConfiguration {
779
779
  const filterSensitiveLog: (obj: KmsGrantConfiguration) => any;
780
780
  }
781
781
  /**
782
- * <p>Proposed access control configuration for a KMS key. You can propose a configuration for
783
- * a new KMS key or an existing KMS key that you own by specifying the key policy and KMS
784
- * grant configuration. If the configuration is for an existing key and you do not specify the
785
- * key policy, the access preview uses the existing policy for the key. If the access preview
786
- * is for a new resource and you do not specify the key policy, then the access preview uses
787
- * the default key policy. The proposed key policy cannot be an empty string. For more
788
- * information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default key
782
+ * <p>Proposed access control configuration for a KMS key. You can propose a configuration
783
+ * for a new KMS key or an existing KMS key that you own by specifying the key policy and
784
+ * KMS grant configuration. If the configuration is for an existing key and you do not
785
+ * specify the key policy, the access preview uses the existing policy for the key. If the
786
+ * access preview is for a new resource and you do not specify the key policy, then the access
787
+ * preview uses the default key policy. The proposed key policy cannot be an empty string. For
788
+ * more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default key
789
789
  * policy</a>. For more information about key policy limits, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/resource-limits.html">Resource
790
790
  * quotas</a>.</p>
791
791
  * <p/>
792
792
  */
793
793
  export interface KmsKeyConfiguration {
794
794
  /**
795
- * <p>Resource policy configuration for the KMS key. The only valid value for the name of the
796
- * key policy is <code>default</code>. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default key
795
+ * <p>Resource policy configuration for the KMS key. The only valid value for the name of
796
+ * the key policy is <code>default</code>. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default key
797
797
  * policy</a>.</p>
798
798
  */
799
799
  keyPolicies?: {
@@ -814,8 +814,8 @@ export declare namespace KmsKeyConfiguration {
814
814
  const filterSensitiveLog: (obj: KmsKeyConfiguration) => any;
815
815
  }
816
816
  /**
817
- * <p>This configuration sets the Amazon S3 access point network origin to
818
- * <code>Internet</code>.</p>
817
+ * <p>This configuration sets the network origin for the Amazon S3 access point or multi-region
818
+ * access point to <code>Internet</code>.</p>
819
819
  */
820
820
  export interface InternetConfiguration {
821
821
  }
@@ -826,9 +826,9 @@ export declare namespace InternetConfiguration {
826
826
  const filterSensitiveLog: (obj: InternetConfiguration) => any;
827
827
  }
828
828
  /**
829
- * <p> The proposed virtual private cloud (VPC) configuration for the Amazon S3 access point. For
830
- * more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_control_VpcConfiguration.html">VpcConfiguration</a>.
831
- * </p>
829
+ * <p>The proposed virtual private cloud (VPC) configuration for the Amazon S3 access point. VPC
830
+ * configuration does not apply to multi-region access points. For more information, see
831
+ * <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_control_VpcConfiguration.html">VpcConfiguration</a>. </p>
832
832
  */
833
833
  export interface VpcConfiguration {
834
834
  /**
@@ -845,8 +845,9 @@ export declare namespace VpcConfiguration {
845
845
  }
846
846
  /**
847
847
  * <p>The proposed <code>InternetConfiguration</code> or <code>VpcConfiguration</code> to
848
- * apply to the Amazon S3 Access point. You can make the access point accessible from the internet,
849
- * or you can specify that all requests made through that access point must originate from a
848
+ * apply to the Amazon S3 access point. <code>VpcConfiguration</code> does not apply to
849
+ * multi-region access points. You can make the access point accessible from the internet, or
850
+ * you can specify that all requests made through that access point must originate from a
850
851
  * specific virtual private cloud (VPC). You can specify only one type of network
851
852
  * configuration. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/creating-access-points.html">Creating access
852
853
  * points</a>.</p>
@@ -854,9 +855,9 @@ export declare namespace VpcConfiguration {
854
855
  export declare type NetworkOriginConfiguration = NetworkOriginConfiguration.InternetConfigurationMember | NetworkOriginConfiguration.VpcConfigurationMember | NetworkOriginConfiguration.$UnknownMember;
855
856
  export declare namespace NetworkOriginConfiguration {
856
857
  /**
857
- * <p> The proposed virtual private cloud (VPC) configuration for the Amazon S3 access point. For
858
- * more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_control_VpcConfiguration.html">VpcConfiguration</a>.
859
- * </p>
858
+ * <p>The proposed virtual private cloud (VPC) configuration for the Amazon S3 access point. VPC
859
+ * configuration does not apply to multi-region access points. For more information, see
860
+ * <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_control_VpcConfiguration.html">VpcConfiguration</a>. </p>
860
861
  */
861
862
  interface VpcConfigurationMember {
862
863
  vpcConfiguration: VpcConfiguration;
@@ -864,7 +865,8 @@ export declare namespace NetworkOriginConfiguration {
864
865
  $unknown?: never;
865
866
  }
866
867
  /**
867
- * <p>The configuration for the Amazon S3 access point with an <code>Internet</code> origin.</p>
868
+ * <p>The configuration for the Amazon S3 access point or multi-region access point with an
869
+ * <code>Internet</code> origin.</p>
868
870
  */
869
871
  interface InternetConfigurationMember {
870
872
  vpcConfiguration?: never;
@@ -895,9 +897,9 @@ export declare namespace NetworkOriginConfiguration {
895
897
  * proposed configuration is for an existing Amazon S3 bucket and the configuration is not
896
898
  * specified, the access preview uses the existing setting. If the proposed configuration is
897
899
  * for a new bucket and the configuration is not specified, the access preview uses
898
- * <code>false</code>. If the proposed configuration is for a new access point and the
899
- * access point BPA configuration is not specified, the access preview uses <code>true</code>.
900
- * For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-s3-bucket-publicaccessblockconfiguration.html">PublicAccessBlockConfiguration</a>. </p>
900
+ * <code>false</code>. If the proposed configuration is for a new access point or
901
+ * multi-region access point and the access point BPA configuration is not specified, the
902
+ * access preview uses <code>true</code>. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-s3-bucket-publicaccessblockconfiguration.html">PublicAccessBlockConfiguration</a>. </p>
901
903
  */
902
904
  export interface S3PublicAccessBlockConfiguration {
903
905
  /**
@@ -917,30 +919,32 @@ export declare namespace S3PublicAccessBlockConfiguration {
917
919
  const filterSensitiveLog: (obj: S3PublicAccessBlockConfiguration) => any;
918
920
  }
919
921
  /**
920
- * <p>The configuration for an Amazon S3 access point for the bucket. You can propose up to 10
921
- * access points per bucket. If the proposed Amazon S3 access point configuration is for an
922
- * existing bucket, the access preview uses the proposed access point configuration in place
923
- * of the existing access points. To propose an access point without a policy, you can provide
924
- * an empty string as the access point policy. For more information, see <a href="https://docs.aws.amazon.com/https:/docs.aws.amazon.com/AmazonS3/latest/dev/creating-access-points.html">Creating access points</a>. For more information about access point policy limits,
922
+ * <p>The configuration for an Amazon S3 access point or multi-region access point for the bucket.
923
+ * You can propose up to 10 access points or multi-region access points per bucket. If the
924
+ * proposed Amazon S3 access point configuration is for an existing bucket, the access preview uses
925
+ * the proposed access point configuration in place of the existing access points. To propose
926
+ * an access point without a policy, you can provide an empty string as the access point
927
+ * policy. For more information, see <a href="https://docs.aws.amazon.com/https:/docs.aws.amazon.com/AmazonS3/latest/dev/creating-access-points.html">Creating access points</a>. For more information about access point policy limits,
925
928
  * see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/access-points-restrictions-limitations.html">Access points
926
929
  * restrictions and limitations</a>.</p>
927
930
  */
928
931
  export interface S3AccessPointConfiguration {
929
932
  /**
930
- * <p>The access point policy.</p>
933
+ * <p>The access point or multi-region access point policy.</p>
931
934
  */
932
935
  accessPointPolicy?: string;
933
936
  /**
934
- * <p>The proposed <code>S3PublicAccessBlock</code> configuration to apply to this Amazon S3 Access
935
- * Point.</p>
937
+ * <p>The proposed <code>S3PublicAccessBlock</code> configuration to apply to this Amazon S3 access
938
+ * point or multi-region access point.</p>
936
939
  */
937
940
  publicAccessBlock?: S3PublicAccessBlockConfiguration;
938
941
  /**
939
942
  * <p>The proposed <code>Internet</code> and <code>VpcConfiguration</code> to apply to this
940
- * Amazon S3 access point. If the access preview is for a new resource and neither is specified,
941
- * the access preview uses <code>Internet</code> for the network origin. If the access preview
942
- * is for an existing resource and neither is specified, the access preview uses the exiting
943
- * network origin.</p>
943
+ * Amazon S3 access point. <code>VpcConfiguration</code> does not apply to multi-region access
944
+ * points. If the access preview is for a new resource and neither is specified, the access
945
+ * preview uses <code>Internet</code> for the network origin. If the access preview is for an
946
+ * existing resource and neither is specified, the access preview uses the exiting network
947
+ * origin.</p>
944
948
  */
945
949
  networkOrigin?: NetworkOriginConfiguration;
946
950
  }
@@ -957,7 +961,7 @@ export declare namespace S3AccessPointConfiguration {
957
961
  export declare type AclGrantee = AclGrantee.IdMember | AclGrantee.UriMember | AclGrantee.$UnknownMember;
958
962
  export declare namespace AclGrantee {
959
963
  /**
960
- * <p>The value specified is the canonical user ID of an AWS account.</p>
964
+ * <p>The value specified is the canonical user ID of an Amazon Web Services account.</p>
961
965
  */
962
966
  interface IdMember {
963
967
  id: string;
@@ -1022,13 +1026,13 @@ export declare namespace S3BucketAclGrantConfiguration {
1022
1026
  /**
1023
1027
  * <p>Proposed access control configuration for an Amazon S3 bucket. You can propose a
1024
1028
  * configuration for a new Amazon S3 bucket or an existing Amazon S3 bucket that you own by specifying
1025
- * the Amazon S3 bucket policy, bucket ACLs, bucket BPA settings, and Amazon S3 access points attached
1026
- * to the bucket. If the configuration is for an existing Amazon S3 bucket and you do not specify
1027
- * the Amazon S3 bucket policy, the access preview uses the existing policy attached to the bucket.
1028
- * If the access preview is for a new resource and you do not specify the Amazon S3 bucket policy,
1029
- * the access preview assumes a bucket without a policy. To propose deletion of an existing
1030
- * bucket policy, you can specify an empty string. For more information about bucket policy
1031
- * limits, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/example-bucket-policies.html">Bucket Policy
1029
+ * the Amazon S3 bucket policy, bucket ACLs, bucket BPA settings, Amazon S3 access points, and
1030
+ * multi-region access points attached to the bucket. If the configuration is for an existing
1031
+ * Amazon S3 bucket and you do not specify the Amazon S3 bucket policy, the access preview uses the
1032
+ * existing policy attached to the bucket. If the access preview is for a new resource and you
1033
+ * do not specify the Amazon S3 bucket policy, the access preview assumes a bucket without a
1034
+ * policy. To propose deletion of an existing bucket policy, you can specify an empty string.
1035
+ * For more information about bucket policy limits, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/example-bucket-policies.html">Bucket Policy
1032
1036
  * Examples</a>.</p>
1033
1037
  */
1034
1038
  export interface S3BucketConfiguration {
@@ -1048,7 +1052,8 @@ export interface S3BucketConfiguration {
1048
1052
  */
1049
1053
  bucketPublicAccessBlock?: S3PublicAccessBlockConfiguration;
1050
1054
  /**
1051
- * <p>The configuration of Amazon S3 access points for the bucket.</p>
1055
+ * <p>The configuration of Amazon S3 access points or multi-region access points for the bucket.
1056
+ * You can propose up to 10 new access points per bucket.</p>
1052
1057
  */
1053
1058
  accessPoints?: {
1054
1059
  [key: string]: S3AccessPointConfiguration;
@@ -1068,15 +1073,15 @@ export declare namespace S3BucketConfiguration {
1068
1073
  * existing policy for the secret. If the access preview is for a new resource and you do not
1069
1074
  * specify the policy, the access preview assumes a secret without a policy. To propose
1070
1075
  * deletion of an existing policy, you can specify an empty string. If the proposed
1071
- * configuration is for a new secret and you do not specify the KMS key ID, the access preview
1072
- * uses the default CMK of the AWS account. If you specify an empty string for the KMS key
1073
- * ID, the access preview uses the default CMK of the AWS account. For more information
1074
- * about secret policy limits, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_limits.html">Quotas for AWS Secrets
1075
- * Manager.</a>.</p>
1076
+ * configuration is for a new secret and you do not specify the KMS key ID, the access
1077
+ * preview uses the default CMK of the Amazon Web Services account. If you specify an empty string for the
1078
+ * KMS key ID, the access preview uses the default CMK of the Amazon Web Services account. For more
1079
+ * information about secret policy limits, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_limits.html">Quotas for
1080
+ * Secrets Manager.</a>.</p>
1076
1081
  */
1077
1082
  export interface SecretsManagerSecretConfiguration {
1078
1083
  /**
1079
- * <p>The proposed ARN, key ID, or alias of the AWS KMS customer master key (CMK).</p>
1084
+ * <p>The proposed ARN, key ID, or alias of the KMS customer master key (CMK).</p>
1080
1085
  */
1081
1086
  kmsKeyId?: string;
1082
1087
  /**
@@ -1091,19 +1096,19 @@ export declare namespace SecretsManagerSecretConfiguration {
1091
1096
  const filterSensitiveLog: (obj: SecretsManagerSecretConfiguration) => any;
1092
1097
  }
1093
1098
  /**
1094
- * <p>The proposed access control configuration for an SQS queue. You can propose a
1095
- * configuration for a new SQS queue or an existing SQS queue that you own by specifying the
1096
- * SQS policy. If the configuration is for an existing SQS queue and you do not specify the
1097
- * SQS policy, the access preview uses the existing SQS policy for the queue. If the access
1098
- * preview is for a new resource and you do not specify the policy, the access preview assumes
1099
- * an SQS queue without a policy. To propose deletion of an existing SQS queue policy, you can
1100
- * specify an empty string for the SQS policy. For more information about SQS policy limits,
1101
- * see <a href="https://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/quotas-policies.html">Quotas related
1099
+ * <p>The proposed access control configuration for an Amazon SQS queue. You can propose a
1100
+ * configuration for a new Amazon SQS queue or an existing Amazon SQS queue that you own by specifying
1101
+ * the Amazon SQS policy. If the configuration is for an existing Amazon SQS queue and you do not
1102
+ * specify the Amazon SQS policy, the access preview uses the existing Amazon SQS policy for the queue.
1103
+ * If the access preview is for a new resource and you do not specify the policy, the access
1104
+ * preview assumes an Amazon SQS queue without a policy. To propose deletion of an existing Amazon SQS
1105
+ * queue policy, you can specify an empty string for the Amazon SQS policy. For more information
1106
+ * about Amazon SQS policy limits, see <a href="https://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/quotas-policies.html">Quotas related
1102
1107
  * to policies</a>.</p>
1103
1108
  */
1104
1109
  export interface SqsQueueConfiguration {
1105
1110
  /**
1106
- * <p> The proposed resource policy for the SQS queue. </p>
1111
+ * <p> The proposed resource policy for the Amazon SQS queue. </p>
1107
1112
  */
1108
1113
  queuePolicy?: string;
1109
1114
  }
@@ -1164,7 +1169,7 @@ export declare namespace Configuration {
1164
1169
  $unknown?: never;
1165
1170
  }
1166
1171
  /**
1167
- * <p>The access control configuration is for an SQS queue. </p>
1172
+ * <p>The access control configuration is for an Amazon SQS queue. </p>
1168
1173
  */
1169
1174
  interface SqsQueueMember {
1170
1175
  iamRole?: never;
@@ -1416,7 +1421,7 @@ export interface AnalyzedResource {
1416
1421
  */
1417
1422
  status?: FindingStatus | string;
1418
1423
  /**
1419
- * <p>The AWS account ID that owns the resource.</p>
1424
+ * <p>The Amazon Web Services account ID that owns the resource.</p>
1420
1425
  */
1421
1426
  resourceOwnerAccount: string | undefined;
1422
1427
  /**
@@ -1435,8 +1440,8 @@ export declare namespace AnalyzedResource {
1435
1440
  */
1436
1441
  export interface GetAnalyzedResourceResponse {
1437
1442
  /**
1438
- * <p>An <code>AnalyzedResource</code> object that contains information that Access Analyzer found
1439
- * when it analyzed the resource.</p>
1443
+ * <p>An <code>AnalyzedResource</code> object that contains information that IAM Access Analyzer
1444
+ * found when it analyzed the resource.</p>
1440
1445
  */
1441
1446
  resource?: AnalyzedResource;
1442
1447
  }
@@ -1472,7 +1477,8 @@ export declare namespace GetFindingRequest {
1472
1477
  */
1473
1478
  export interface FindingSourceDetail {
1474
1479
  /**
1475
- * <p>The ARN of the access point that generated the finding.</p>
1480
+ * <p>The ARN of the access point that generated the finding. The ARN format depends on
1481
+ * whether the ARN represents an access point or a multi-region access point.</p>
1476
1482
  */
1477
1483
  accessPointArn?: string;
1478
1484
  }
@@ -1559,7 +1565,7 @@ export interface Finding {
1559
1565
  */
1560
1566
  status: FindingStatus | string | undefined;
1561
1567
  /**
1562
- * <p>The AWS account ID that owns the resource.</p>
1568
+ * <p>The Amazon Web Services account ID that owns the resource.</p>
1563
1569
  */
1564
1570
  resourceOwnerAccount: string | undefined;
1565
1571
  /**
@@ -1612,8 +1618,8 @@ export interface GetGeneratedPolicyRequest {
1612
1618
  /**
1613
1619
  * <p>The level of detail that you want to generate. You can specify whether to generate
1614
1620
  * service-level policies. </p>
1615
- * <p>Access Analyzer uses <code>iam:servicelastaccessed</code> to identify services that have been
1616
- * used recently to create this service-level template.</p>
1621
+ * <p>IAM Access Analyzer uses <code>iam:servicelastaccessed</code> to identify services that have
1622
+ * been used recently to create this service-level template.</p>
1617
1623
  */
1618
1624
  includeServiceLevelTemplate?: boolean;
1619
1625
  }
@@ -1654,7 +1660,7 @@ export interface TrailProperties {
1654
1660
  regions?: string[];
1655
1661
  /**
1656
1662
  * <p>Possible values are <code>true</code> or <code>false</code>. If set to
1657
- * <code>true</code>, Access Analyzer retrieves CloudTrail data from all regions to analyze and
1663
+ * <code>true</code>, IAM Access Analyzer retrieves CloudTrail data from all regions to analyze and
1658
1664
  * generate a policy.</p>
1659
1665
  */
1660
1666
  allRegions?: boolean;
@@ -1675,12 +1681,12 @@ export interface CloudTrailProperties {
1675
1681
  */
1676
1682
  trailProperties: TrailProperties[] | undefined;
1677
1683
  /**
1678
- * <p>The start of the time range for which Access Analyzer reviews your CloudTrail events. Events
1684
+ * <p>The start of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events
1679
1685
  * with a timestamp before this time are not considered to generate a policy.</p>
1680
1686
  */
1681
1687
  startTime: Date | undefined;
1682
1688
  /**
1683
- * <p>The end of the time range for which Access Analyzer reviews your CloudTrail events. Events with
1689
+ * <p>The end of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events with
1684
1690
  * a timestamp after this time are not considered to generate a policy. If this is not
1685
1691
  * included in the request, the default value is the current time.</p>
1686
1692
  */
@@ -1697,9 +1703,9 @@ export declare namespace CloudTrailProperties {
1697
1703
  */
1698
1704
  export interface GeneratedPolicyProperties {
1699
1705
  /**
1700
- * <p>This value is set to <code>true</code> if the generated policy contains all possible actions for a
1701
- * service that Access Analyzer identified from the CloudTrail trail that you specified, and
1702
- * <code>false</code> otherwise.</p>
1706
+ * <p>This value is set to <code>true</code> if the generated policy contains all possible
1707
+ * actions for a service that IAM Access Analyzer identified from the CloudTrail trail that you specified,
1708
+ * and <code>false</code> otherwise.</p>
1703
1709
  */
1704
1710
  isComplete?: boolean;
1705
1711
  /**
@@ -1794,7 +1800,7 @@ export interface JobDetails {
1794
1800
  */
1795
1801
  completedOn?: Date;
1796
1802
  /**
1797
- * <p>Contains the details about the policy generation error.</p>
1803
+ * <p>The job error for the policy generation request.</p>
1798
1804
  */
1799
1805
  jobError?: JobError;
1800
1806
  }
@@ -1869,7 +1875,8 @@ export interface AccessPreviewFinding {
1869
1875
  */
1870
1876
  id: string | undefined;
1871
1877
  /**
1872
- * <p>The existing ID of the finding in Access Analyzer, provided only for existing findings.</p>
1878
+ * <p>The existing ID of the finding in IAM Access Analyzer, provided only for existing
1879
+ * findings.</p>
1873
1880
  */
1874
1881
  existingFindingId?: string;
1875
1882
  /**
@@ -1913,7 +1920,7 @@ export interface AccessPreviewFinding {
1913
1920
  createdAt: Date | undefined;
1914
1921
  /**
1915
1922
  * <p>Provides context on how the access preview finding compares to existing access
1916
- * identified in Access Analyzer.</p>
1923
+ * identified in IAM Access Analyzer.</p>
1917
1924
  * <ul>
1918
1925
  * <li>
1919
1926
  * <p>
@@ -1944,7 +1951,7 @@ export interface AccessPreviewFinding {
1944
1951
  */
1945
1952
  status: FindingStatus | string | undefined;
1946
1953
  /**
1947
- * <p>The AWS account ID that owns the resource. For most AWS resources, the owning
1954
+ * <p>The Amazon Web Services account ID that owns the resource. For most Amazon Web Services resources, the owning
1948
1955
  * account is the account in which the resource was created.</p>
1949
1956
  */
1950
1957
  resourceOwnerAccount: string | undefined;
@@ -2103,7 +2110,7 @@ export interface AnalyzedResourceSummary {
2103
2110
  */
2104
2111
  resourceArn: string | undefined;
2105
2112
  /**
2106
- * <p>The AWS account ID that owns the resource.</p>
2113
+ * <p>The Amazon Web Services account ID that owns the resource.</p>
2107
2114
  */
2108
2115
  resourceOwnerAccount: string | undefined;
2109
2116
  /**
@@ -2246,7 +2253,7 @@ export interface FindingSummary {
2246
2253
  */
2247
2254
  status: FindingStatus | string | undefined;
2248
2255
  /**
2249
- * <p>The AWS account ID that owns the resource.</p>
2256
+ * <p>The Amazon Web Services account ID that owns the resource.</p>
2250
2257
  */
2251
2258
  resourceOwnerAccount: string | undefined;
2252
2259
  /**
@@ -2405,7 +2412,7 @@ export interface Trail {
2405
2412
  regions?: string[];
2406
2413
  /**
2407
2414
  * <p>Possible values are <code>true</code> or <code>false</code>. If set to
2408
- * <code>true</code>, Access Analyzer retrieves CloudTrail data from all regions to analyze and
2415
+ * <code>true</code>, IAM Access Analyzer retrieves CloudTrail data from all regions to analyze and
2409
2416
  * generate a policy.</p>
2410
2417
  */
2411
2418
  allRegions?: boolean;
@@ -2425,17 +2432,17 @@ export interface CloudTrailDetails {
2425
2432
  */
2426
2433
  trails: Trail[] | undefined;
2427
2434
  /**
2428
- * <p>The ARN of the service role that Access Analyzer uses to access your CloudTrail trail and
2435
+ * <p>The ARN of the service role that IAM Access Analyzer uses to access your CloudTrail trail and
2429
2436
  * service last accessed information.</p>
2430
2437
  */
2431
2438
  accessRole: string | undefined;
2432
2439
  /**
2433
- * <p>The start of the time range for which Access Analyzer reviews your CloudTrail events. Events
2440
+ * <p>The start of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events
2434
2441
  * with a timestamp before this time are not considered to generate a policy.</p>
2435
2442
  */
2436
2443
  startTime: Date | undefined;
2437
2444
  /**
2438
- * <p>The end of the time range for which Access Analyzer reviews your CloudTrail events. Events with
2445
+ * <p>The end of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events with
2439
2446
  * a timestamp after this time are not considered to generate a policy. If this is not
2440
2447
  * included in the request, the default value is the current time.</p>
2441
2448
  */
@@ -2480,7 +2487,7 @@ export interface StartPolicyGenerationRequest {
2480
2487
  * request, if the original request completes successfully, the subsequent retries with the
2481
2488
  * same client token return the result from the original successful request and they have no
2482
2489
  * additional effect.</p>
2483
- * <p>If you do not specify a client token, one is automatically generated by the AWS
2490
+ * <p>If you do not specify a client token, one is automatically generated by the Amazon Web Services
2484
2491
  * SDK.</p>
2485
2492
  */
2486
2493
  clientToken?: string;
@@ -2661,12 +2668,12 @@ export interface ValidatePolicyRequest {
2661
2668
  /**
2662
2669
  * <p>The type of policy to validate. Identity policies grant permissions to IAM principals.
2663
2670
  * Identity policies include managed and inline policies for IAM roles, users, and groups.
2664
- * They also include service-control policies (SCPs) that are attached to an AWS
2671
+ * They also include service-control policies (SCPs) that are attached to an Amazon Web Services
2665
2672
  * organization, organizational unit (OU), or an account.</p>
2666
- * <p>Resource policies grant permissions on AWS resources. Resource policies include trust
2667
- * policies for IAM roles and bucket policies for S3 buckets. You can provide a generic input
2668
- * such as identity policy or resource policy or a specific input such as managed policy or S3
2669
- * bucket policy. </p>
2673
+ * <p>Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust
2674
+ * policies for IAM roles and bucket policies for Amazon S3 buckets. You can provide a generic
2675
+ * input such as identity policy or resource policy or a specific input such as managed policy
2676
+ * or Amazon S3 bucket policy. </p>
2670
2677
  */
2671
2678
  policyType: PolicyType | string | undefined;
2672
2679
  }
@@ -2875,7 +2882,7 @@ export declare namespace ValidatePolicyFinding {
2875
2882
  }
2876
2883
  export interface ValidatePolicyResponse {
2877
2884
  /**
2878
- * <p>The list of findings in a policy returned by Access Analyzer based on its suite of policy
2885
+ * <p>The list of findings in a policy returned by IAM Access Analyzer based on its suite of policy
2879
2886
  * checks.</p>
2880
2887
  */
2881
2888
  findings: ValidatePolicyFinding[] | undefined;