@aws-sdk/client-accessanalyzer 3.28.0 → 3.32.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AccessAnalyzer.ts +17 -20
- package/AccessAnalyzerClient.ts +9 -9
- package/CHANGELOG.md +35 -0
- package/README.md +9 -9
- package/commands/CreateAccessPreviewCommand.ts +2 -2
- package/commands/CreateArchiveRuleCommand.ts +1 -2
- package/commands/DeleteAnalyzerCommand.ts +3 -3
- package/commands/GetArchiveRuleCommand.ts +1 -2
- package/commands/ListFindingsCommand.ts +1 -2
- package/dist/cjs/AccessAnalyzer.js +9 -9
- package/dist/cjs/AccessAnalyzer.js.map +1 -1
- package/dist/cjs/AccessAnalyzerClient.js +9 -9
- package/dist/cjs/commands/CreateAccessPreviewCommand.js +2 -2
- package/dist/cjs/commands/CreateArchiveRuleCommand.js +1 -2
- package/dist/cjs/commands/CreateArchiveRuleCommand.js.map +1 -1
- package/dist/cjs/commands/DeleteAnalyzerCommand.js +3 -3
- package/dist/cjs/commands/GetArchiveRuleCommand.js +1 -2
- package/dist/cjs/commands/GetArchiveRuleCommand.js.map +1 -1
- package/dist/cjs/commands/ListFindingsCommand.js +1 -2
- package/dist/cjs/commands/ListFindingsCommand.js.map +1 -1
- package/dist/cjs/models/models_0.js.map +1 -1
- package/dist/cjs/package.json +31 -31
- package/dist/cjs/protocols/Aws_restJson1.js +95 -53
- package/dist/cjs/protocols/Aws_restJson1.js.map +1 -1
- package/dist/es/AccessAnalyzer.js +9 -9
- package/dist/es/AccessAnalyzer.js.map +1 -1
- package/dist/es/AccessAnalyzerClient.js +9 -9
- package/dist/es/commands/CreateAccessPreviewCommand.js +2 -2
- package/dist/es/commands/CreateArchiveRuleCommand.js +1 -2
- package/dist/es/commands/CreateArchiveRuleCommand.js.map +1 -1
- package/dist/es/commands/DeleteAnalyzerCommand.js +3 -3
- package/dist/es/commands/GetArchiveRuleCommand.js +1 -2
- package/dist/es/commands/GetArchiveRuleCommand.js.map +1 -1
- package/dist/es/commands/ListFindingsCommand.js +1 -2
- package/dist/es/commands/ListFindingsCommand.js.map +1 -1
- package/dist/es/endpoints.js +1 -2
- package/dist/es/endpoints.js.map +1 -1
- package/dist/es/models/models_0.js.map +1 -1
- package/dist/es/package.json +31 -31
- package/dist/es/protocols/Aws_restJson1.js +186 -108
- package/dist/es/protocols/Aws_restJson1.js.map +1 -1
- package/dist/types/AccessAnalyzer.d.ts +17 -20
- package/dist/types/AccessAnalyzerClient.d.ts +9 -9
- package/dist/types/commands/CreateAccessPreviewCommand.d.ts +2 -2
- package/dist/types/commands/CreateArchiveRuleCommand.d.ts +1 -2
- package/dist/types/commands/DeleteAnalyzerCommand.d.ts +3 -3
- package/dist/types/commands/GetArchiveRuleCommand.d.ts +1 -2
- package/dist/types/commands/ListFindingsCommand.d.ts +1 -2
- package/dist/types/models/models_0.d.ts +105 -98
- package/dist/types/ts3.4/AccessAnalyzer.d.ts +17 -20
- package/dist/types/ts3.4/AccessAnalyzerClient.d.ts +9 -9
- package/dist/types/ts3.4/commands/CreateAccessPreviewCommand.d.ts +2 -2
- package/dist/types/ts3.4/commands/CreateArchiveRuleCommand.d.ts +1 -2
- package/dist/types/ts3.4/commands/DeleteAnalyzerCommand.d.ts +3 -3
- package/dist/types/ts3.4/commands/GetArchiveRuleCommand.d.ts +1 -2
- package/dist/types/ts3.4/commands/ListFindingsCommand.d.ts +1 -2
- package/dist/types/ts3.4/models/models_0.d.ts +105 -98
- package/models/models_0.ts +105 -98
- package/package.json +31 -31
- package/protocols/Aws_restJson1.ts +120 -55
|
@@ -9,8 +9,7 @@ export interface CreateArchiveRuleCommandOutput extends __MetadataBearer {
|
|
|
9
9
|
/**
|
|
10
10
|
* <p>Creates an archive rule for the specified analyzer. Archive rules automatically archive
|
|
11
11
|
* new findings that meet the criteria you define when you create the rule.</p>
|
|
12
|
-
* <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">Access Analyzer filter keys</a> in the <b>IAM User
|
|
13
|
-
* Guide</b>.</p>
|
|
12
|
+
* <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
|
|
14
13
|
* @example
|
|
15
14
|
* Use a bare-bones client and the command you need to make an API call.
|
|
16
15
|
* ```javascript
|
|
@@ -7,9 +7,9 @@ export interface DeleteAnalyzerCommandInput extends DeleteAnalyzerRequest {
|
|
|
7
7
|
export interface DeleteAnalyzerCommandOutput extends __MetadataBearer {
|
|
8
8
|
}
|
|
9
9
|
/**
|
|
10
|
-
* <p>Deletes the specified analyzer. When you delete an analyzer, Access Analyzer is disabled
|
|
11
|
-
* account or organization in the current or specific Region. All findings that were
|
|
12
|
-
* by the analyzer are deleted. You cannot undo this action.</p>
|
|
10
|
+
* <p>Deletes the specified analyzer. When you delete an analyzer, IAM Access Analyzer is disabled
|
|
11
|
+
* for the account or organization in the current or specific Region. All findings that were
|
|
12
|
+
* generated by the analyzer are deleted. You cannot undo this action.</p>
|
|
13
13
|
* @example
|
|
14
14
|
* Use a bare-bones client and the command you need to make an API call.
|
|
15
15
|
* ```javascript
|
|
@@ -8,8 +8,7 @@ export interface GetArchiveRuleCommandOutput extends GetArchiveRuleResponse, __M
|
|
|
8
8
|
}
|
|
9
9
|
/**
|
|
10
10
|
* <p>Retrieves information about an archive rule.</p>
|
|
11
|
-
* <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">Access Analyzer filter keys</a> in the <b>IAM User
|
|
12
|
-
* Guide</b>.</p>
|
|
11
|
+
* <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
|
|
13
12
|
* @example
|
|
14
13
|
* Use a bare-bones client and the command you need to make an API call.
|
|
15
14
|
* ```javascript
|
|
@@ -8,8 +8,7 @@ export interface ListFindingsCommandOutput extends ListFindingsResponse, __Metad
|
|
|
8
8
|
}
|
|
9
9
|
/**
|
|
10
10
|
* <p>Retrieves a list of findings generated by the specified analyzer.</p>
|
|
11
|
-
* <p>To learn about filter keys that you can use to retrieve a list of findings, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">Access Analyzer filter keys</a> in the <b>IAM User
|
|
12
|
-
* Guide</b>.</p>
|
|
11
|
+
* <p>To learn about filter keys that you can use to retrieve a list of findings, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
|
|
13
12
|
* @example
|
|
14
13
|
* Use a bare-bones client and the command you need to make an API call.
|
|
15
14
|
* ```javascript
|
|
@@ -494,7 +494,7 @@ export declare type ReasonCode = "AWS_SERVICE_ACCESS_DISABLED" | "DELEGATED_ADMI
|
|
|
494
494
|
* <p>Provides more details about the current status of the analyzer. For example, if the
|
|
495
495
|
* creation for the analyzer fails, a <code>Failed</code> status is returned. For an analyzer
|
|
496
496
|
* with organization as the type, this failure can be due to an issue with creating the
|
|
497
|
-
* service-linked roles required in the member accounts of the
|
|
497
|
+
* service-linked roles required in the member accounts of the Amazon Web Services organization.</p>
|
|
498
498
|
*/
|
|
499
499
|
export interface StatusReason {
|
|
500
500
|
/**
|
|
@@ -546,17 +546,17 @@ export interface AnalyzerSummary {
|
|
|
546
546
|
/**
|
|
547
547
|
* <p>The status of the analyzer. An <code>Active</code> analyzer successfully monitors
|
|
548
548
|
* supported resources and generates new findings. The analyzer is <code>Disabled</code> when
|
|
549
|
-
* a user action, such as removing trusted access for
|
|
550
|
-
*
|
|
551
|
-
*
|
|
552
|
-
*
|
|
549
|
+
* a user action, such as removing trusted access for Identity and Access Management Access Analyzer from Organizations, causes
|
|
550
|
+
* the analyzer to stop generating new findings. The status is <code>Creating</code> when the
|
|
551
|
+
* analyzer creation is in progress and <code>Failed</code> when the analyzer creation has
|
|
552
|
+
* failed. </p>
|
|
553
553
|
*/
|
|
554
554
|
status: AnalyzerStatus | string | undefined;
|
|
555
555
|
/**
|
|
556
556
|
* <p>The <code>statusReason</code> provides more details about the current status of the
|
|
557
557
|
* analyzer. For example, if the creation for the analyzer fails, a <code>Failed</code> status
|
|
558
558
|
* is returned. For an analyzer with organization as the type, this failure can be due to an
|
|
559
|
-
* issue with creating the service-linked roles required in the member accounts of the
|
|
559
|
+
* issue with creating the service-linked roles required in the member accounts of the Amazon Web Services
|
|
560
560
|
* organization.</p>
|
|
561
561
|
*/
|
|
562
562
|
statusReason?: StatusReason;
|
|
@@ -767,8 +767,8 @@ export interface KmsGrantConfiguration {
|
|
|
767
767
|
*/
|
|
768
768
|
constraints?: KmsGrantConstraints;
|
|
769
769
|
/**
|
|
770
|
-
* <p> The
|
|
771
|
-
* grants issued by accounts other than the owner of the key.</p>
|
|
770
|
+
* <p> The Amazon Web Services account under which the grant was issued. The account is used to propose
|
|
771
|
+
* KMS grants issued by accounts other than the owner of the key.</p>
|
|
772
772
|
*/
|
|
773
773
|
issuingAccount: string | undefined;
|
|
774
774
|
}
|
|
@@ -779,21 +779,21 @@ export declare namespace KmsGrantConfiguration {
|
|
|
779
779
|
const filterSensitiveLog: (obj: KmsGrantConfiguration) => any;
|
|
780
780
|
}
|
|
781
781
|
/**
|
|
782
|
-
* <p>Proposed access control configuration for a KMS key. You can propose a configuration
|
|
783
|
-
* a new KMS key or an existing KMS key that you own by specifying the key policy and
|
|
784
|
-
* grant configuration. If the configuration is for an existing key and you do not
|
|
785
|
-
* key policy, the access preview uses the existing policy for the key. If the
|
|
786
|
-
* is for a new resource and you do not specify the key policy, then the access
|
|
787
|
-
* the default key policy. The proposed key policy cannot be an empty string. For
|
|
788
|
-
* information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default key
|
|
782
|
+
* <p>Proposed access control configuration for a KMS key. You can propose a configuration
|
|
783
|
+
* for a new KMS key or an existing KMS key that you own by specifying the key policy and
|
|
784
|
+
* KMS grant configuration. If the configuration is for an existing key and you do not
|
|
785
|
+
* specify the key policy, the access preview uses the existing policy for the key. If the
|
|
786
|
+
* access preview is for a new resource and you do not specify the key policy, then the access
|
|
787
|
+
* preview uses the default key policy. The proposed key policy cannot be an empty string. For
|
|
788
|
+
* more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default key
|
|
789
789
|
* policy</a>. For more information about key policy limits, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/resource-limits.html">Resource
|
|
790
790
|
* quotas</a>.</p>
|
|
791
791
|
* <p/>
|
|
792
792
|
*/
|
|
793
793
|
export interface KmsKeyConfiguration {
|
|
794
794
|
/**
|
|
795
|
-
* <p>Resource policy configuration for the KMS key. The only valid value for the name of
|
|
796
|
-
* key policy is <code>default</code>. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default key
|
|
795
|
+
* <p>Resource policy configuration for the KMS key. The only valid value for the name of
|
|
796
|
+
* the key policy is <code>default</code>. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default key
|
|
797
797
|
* policy</a>.</p>
|
|
798
798
|
*/
|
|
799
799
|
keyPolicies?: {
|
|
@@ -814,8 +814,8 @@ export declare namespace KmsKeyConfiguration {
|
|
|
814
814
|
const filterSensitiveLog: (obj: KmsKeyConfiguration) => any;
|
|
815
815
|
}
|
|
816
816
|
/**
|
|
817
|
-
* <p>This configuration sets the Amazon S3 access point
|
|
818
|
-
* <code>Internet</code>.</p>
|
|
817
|
+
* <p>This configuration sets the network origin for the Amazon S3 access point or multi-region
|
|
818
|
+
* access point to <code>Internet</code>.</p>
|
|
819
819
|
*/
|
|
820
820
|
export interface InternetConfiguration {
|
|
821
821
|
}
|
|
@@ -826,9 +826,9 @@ export declare namespace InternetConfiguration {
|
|
|
826
826
|
const filterSensitiveLog: (obj: InternetConfiguration) => any;
|
|
827
827
|
}
|
|
828
828
|
/**
|
|
829
|
-
* <p>
|
|
830
|
-
* more information, see
|
|
831
|
-
*
|
|
829
|
+
* <p>The proposed virtual private cloud (VPC) configuration for the Amazon S3 access point. VPC
|
|
830
|
+
* configuration does not apply to multi-region access points. For more information, see
|
|
831
|
+
* <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_control_VpcConfiguration.html">VpcConfiguration</a>. </p>
|
|
832
832
|
*/
|
|
833
833
|
export interface VpcConfiguration {
|
|
834
834
|
/**
|
|
@@ -845,8 +845,9 @@ export declare namespace VpcConfiguration {
|
|
|
845
845
|
}
|
|
846
846
|
/**
|
|
847
847
|
* <p>The proposed <code>InternetConfiguration</code> or <code>VpcConfiguration</code> to
|
|
848
|
-
* apply to the Amazon S3
|
|
849
|
-
*
|
|
848
|
+
* apply to the Amazon S3 access point. <code>VpcConfiguration</code> does not apply to
|
|
849
|
+
* multi-region access points. You can make the access point accessible from the internet, or
|
|
850
|
+
* you can specify that all requests made through that access point must originate from a
|
|
850
851
|
* specific virtual private cloud (VPC). You can specify only one type of network
|
|
851
852
|
* configuration. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/creating-access-points.html">Creating access
|
|
852
853
|
* points</a>.</p>
|
|
@@ -854,9 +855,9 @@ export declare namespace VpcConfiguration {
|
|
|
854
855
|
export declare type NetworkOriginConfiguration = NetworkOriginConfiguration.InternetConfigurationMember | NetworkOriginConfiguration.VpcConfigurationMember | NetworkOriginConfiguration.$UnknownMember;
|
|
855
856
|
export declare namespace NetworkOriginConfiguration {
|
|
856
857
|
/**
|
|
857
|
-
* <p>
|
|
858
|
-
* more information, see
|
|
859
|
-
*
|
|
858
|
+
* <p>The proposed virtual private cloud (VPC) configuration for the Amazon S3 access point. VPC
|
|
859
|
+
* configuration does not apply to multi-region access points. For more information, see
|
|
860
|
+
* <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_control_VpcConfiguration.html">VpcConfiguration</a>. </p>
|
|
860
861
|
*/
|
|
861
862
|
interface VpcConfigurationMember {
|
|
862
863
|
vpcConfiguration: VpcConfiguration;
|
|
@@ -864,7 +865,8 @@ export declare namespace NetworkOriginConfiguration {
|
|
|
864
865
|
$unknown?: never;
|
|
865
866
|
}
|
|
866
867
|
/**
|
|
867
|
-
* <p>The configuration for the Amazon S3 access point with an
|
|
868
|
+
* <p>The configuration for the Amazon S3 access point or multi-region access point with an
|
|
869
|
+
* <code>Internet</code> origin.</p>
|
|
868
870
|
*/
|
|
869
871
|
interface InternetConfigurationMember {
|
|
870
872
|
vpcConfiguration?: never;
|
|
@@ -895,9 +897,9 @@ export declare namespace NetworkOriginConfiguration {
|
|
|
895
897
|
* proposed configuration is for an existing Amazon S3 bucket and the configuration is not
|
|
896
898
|
* specified, the access preview uses the existing setting. If the proposed configuration is
|
|
897
899
|
* for a new bucket and the configuration is not specified, the access preview uses
|
|
898
|
-
* <code>false</code>. If the proposed configuration is for a new access point
|
|
899
|
-
* access point BPA configuration is not specified, the
|
|
900
|
-
* For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-s3-bucket-publicaccessblockconfiguration.html">PublicAccessBlockConfiguration</a>. </p>
|
|
900
|
+
* <code>false</code>. If the proposed configuration is for a new access point or
|
|
901
|
+
* multi-region access point and the access point BPA configuration is not specified, the
|
|
902
|
+
* access preview uses <code>true</code>. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-s3-bucket-publicaccessblockconfiguration.html">PublicAccessBlockConfiguration</a>. </p>
|
|
901
903
|
*/
|
|
902
904
|
export interface S3PublicAccessBlockConfiguration {
|
|
903
905
|
/**
|
|
@@ -917,30 +919,32 @@ export declare namespace S3PublicAccessBlockConfiguration {
|
|
|
917
919
|
const filterSensitiveLog: (obj: S3PublicAccessBlockConfiguration) => any;
|
|
918
920
|
}
|
|
919
921
|
/**
|
|
920
|
-
* <p>The configuration for an Amazon S3 access point for the bucket.
|
|
921
|
-
*
|
|
922
|
-
*
|
|
923
|
-
*
|
|
924
|
-
* an
|
|
922
|
+
* <p>The configuration for an Amazon S3 access point or multi-region access point for the bucket.
|
|
923
|
+
* You can propose up to 10 access points or multi-region access points per bucket. If the
|
|
924
|
+
* proposed Amazon S3 access point configuration is for an existing bucket, the access preview uses
|
|
925
|
+
* the proposed access point configuration in place of the existing access points. To propose
|
|
926
|
+
* an access point without a policy, you can provide an empty string as the access point
|
|
927
|
+
* policy. For more information, see <a href="https://docs.aws.amazon.com/https:/docs.aws.amazon.com/AmazonS3/latest/dev/creating-access-points.html">Creating access points</a>. For more information about access point policy limits,
|
|
925
928
|
* see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/access-points-restrictions-limitations.html">Access points
|
|
926
929
|
* restrictions and limitations</a>.</p>
|
|
927
930
|
*/
|
|
928
931
|
export interface S3AccessPointConfiguration {
|
|
929
932
|
/**
|
|
930
|
-
* <p>The access point policy.</p>
|
|
933
|
+
* <p>The access point or multi-region access point policy.</p>
|
|
931
934
|
*/
|
|
932
935
|
accessPointPolicy?: string;
|
|
933
936
|
/**
|
|
934
|
-
* <p>The proposed <code>S3PublicAccessBlock</code> configuration to apply to this Amazon S3
|
|
935
|
-
*
|
|
937
|
+
* <p>The proposed <code>S3PublicAccessBlock</code> configuration to apply to this Amazon S3 access
|
|
938
|
+
* point or multi-region access point.</p>
|
|
936
939
|
*/
|
|
937
940
|
publicAccessBlock?: S3PublicAccessBlockConfiguration;
|
|
938
941
|
/**
|
|
939
942
|
* <p>The proposed <code>Internet</code> and <code>VpcConfiguration</code> to apply to this
|
|
940
|
-
* Amazon S3 access point.
|
|
941
|
-
* the access preview
|
|
942
|
-
*
|
|
943
|
-
* network
|
|
943
|
+
* Amazon S3 access point. <code>VpcConfiguration</code> does not apply to multi-region access
|
|
944
|
+
* points. If the access preview is for a new resource and neither is specified, the access
|
|
945
|
+
* preview uses <code>Internet</code> for the network origin. If the access preview is for an
|
|
946
|
+
* existing resource and neither is specified, the access preview uses the exiting network
|
|
947
|
+
* origin.</p>
|
|
944
948
|
*/
|
|
945
949
|
networkOrigin?: NetworkOriginConfiguration;
|
|
946
950
|
}
|
|
@@ -957,7 +961,7 @@ export declare namespace S3AccessPointConfiguration {
|
|
|
957
961
|
export declare type AclGrantee = AclGrantee.IdMember | AclGrantee.UriMember | AclGrantee.$UnknownMember;
|
|
958
962
|
export declare namespace AclGrantee {
|
|
959
963
|
/**
|
|
960
|
-
* <p>The value specified is the canonical user ID of an
|
|
964
|
+
* <p>The value specified is the canonical user ID of an Amazon Web Services account.</p>
|
|
961
965
|
*/
|
|
962
966
|
interface IdMember {
|
|
963
967
|
id: string;
|
|
@@ -1022,13 +1026,13 @@ export declare namespace S3BucketAclGrantConfiguration {
|
|
|
1022
1026
|
/**
|
|
1023
1027
|
* <p>Proposed access control configuration for an Amazon S3 bucket. You can propose a
|
|
1024
1028
|
* configuration for a new Amazon S3 bucket or an existing Amazon S3 bucket that you own by specifying
|
|
1025
|
-
* the Amazon S3 bucket policy, bucket ACLs, bucket BPA settings,
|
|
1026
|
-
* to the bucket. If the configuration is for an existing
|
|
1027
|
-
* the Amazon S3 bucket policy, the access preview uses the
|
|
1028
|
-
* If the access preview is for a new resource and you
|
|
1029
|
-
* the access preview assumes a bucket without a
|
|
1030
|
-
* bucket policy, you can specify an empty string.
|
|
1031
|
-
* limits, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/example-bucket-policies.html">Bucket Policy
|
|
1029
|
+
* the Amazon S3 bucket policy, bucket ACLs, bucket BPA settings, Amazon S3 access points, and
|
|
1030
|
+
* multi-region access points attached to the bucket. If the configuration is for an existing
|
|
1031
|
+
* Amazon S3 bucket and you do not specify the Amazon S3 bucket policy, the access preview uses the
|
|
1032
|
+
* existing policy attached to the bucket. If the access preview is for a new resource and you
|
|
1033
|
+
* do not specify the Amazon S3 bucket policy, the access preview assumes a bucket without a
|
|
1034
|
+
* policy. To propose deletion of an existing bucket policy, you can specify an empty string.
|
|
1035
|
+
* For more information about bucket policy limits, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/example-bucket-policies.html">Bucket Policy
|
|
1032
1036
|
* Examples</a>.</p>
|
|
1033
1037
|
*/
|
|
1034
1038
|
export interface S3BucketConfiguration {
|
|
@@ -1048,7 +1052,8 @@ export interface S3BucketConfiguration {
|
|
|
1048
1052
|
*/
|
|
1049
1053
|
bucketPublicAccessBlock?: S3PublicAccessBlockConfiguration;
|
|
1050
1054
|
/**
|
|
1051
|
-
* <p>The configuration of Amazon S3 access points for the bucket
|
|
1055
|
+
* <p>The configuration of Amazon S3 access points or multi-region access points for the bucket.
|
|
1056
|
+
* You can propose up to 10 new access points per bucket.</p>
|
|
1052
1057
|
*/
|
|
1053
1058
|
accessPoints?: {
|
|
1054
1059
|
[key: string]: S3AccessPointConfiguration;
|
|
@@ -1068,15 +1073,15 @@ export declare namespace S3BucketConfiguration {
|
|
|
1068
1073
|
* existing policy for the secret. If the access preview is for a new resource and you do not
|
|
1069
1074
|
* specify the policy, the access preview assumes a secret without a policy. To propose
|
|
1070
1075
|
* deletion of an existing policy, you can specify an empty string. If the proposed
|
|
1071
|
-
* configuration is for a new secret and you do not specify the KMS key ID, the access
|
|
1072
|
-
* uses the default CMK of the
|
|
1073
|
-
* ID, the access preview uses the default CMK of the
|
|
1074
|
-
* about secret policy limits, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_limits.html">Quotas for
|
|
1075
|
-
* Manager.</a>.</p>
|
|
1076
|
+
* configuration is for a new secret and you do not specify the KMS key ID, the access
|
|
1077
|
+
* preview uses the default CMK of the Amazon Web Services account. If you specify an empty string for the
|
|
1078
|
+
* KMS key ID, the access preview uses the default CMK of the Amazon Web Services account. For more
|
|
1079
|
+
* information about secret policy limits, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_limits.html">Quotas for
|
|
1080
|
+
* Secrets Manager.</a>.</p>
|
|
1076
1081
|
*/
|
|
1077
1082
|
export interface SecretsManagerSecretConfiguration {
|
|
1078
1083
|
/**
|
|
1079
|
-
* <p>The proposed ARN, key ID, or alias of the
|
|
1084
|
+
* <p>The proposed ARN, key ID, or alias of the KMS customer master key (CMK).</p>
|
|
1080
1085
|
*/
|
|
1081
1086
|
kmsKeyId?: string;
|
|
1082
1087
|
/**
|
|
@@ -1091,19 +1096,19 @@ export declare namespace SecretsManagerSecretConfiguration {
|
|
|
1091
1096
|
const filterSensitiveLog: (obj: SecretsManagerSecretConfiguration) => any;
|
|
1092
1097
|
}
|
|
1093
1098
|
/**
|
|
1094
|
-
* <p>The proposed access control configuration for an SQS queue. You can propose a
|
|
1095
|
-
* configuration for a new SQS queue or an existing SQS queue that you own by specifying
|
|
1096
|
-
* SQS policy. If the configuration is for an existing SQS queue and you do not
|
|
1097
|
-
* SQS policy, the access preview uses the existing SQS policy for the queue.
|
|
1098
|
-
* preview is for a new resource and you do not specify the policy, the access
|
|
1099
|
-
* an SQS queue without a policy. To propose deletion of an existing SQS
|
|
1100
|
-
* specify an empty string for the SQS policy. For more information
|
|
1101
|
-
* see <a href="https://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/quotas-policies.html">Quotas related
|
|
1099
|
+
* <p>The proposed access control configuration for an Amazon SQS queue. You can propose a
|
|
1100
|
+
* configuration for a new Amazon SQS queue or an existing Amazon SQS queue that you own by specifying
|
|
1101
|
+
* the Amazon SQS policy. If the configuration is for an existing Amazon SQS queue and you do not
|
|
1102
|
+
* specify the Amazon SQS policy, the access preview uses the existing Amazon SQS policy for the queue.
|
|
1103
|
+
* If the access preview is for a new resource and you do not specify the policy, the access
|
|
1104
|
+
* preview assumes an Amazon SQS queue without a policy. To propose deletion of an existing Amazon SQS
|
|
1105
|
+
* queue policy, you can specify an empty string for the Amazon SQS policy. For more information
|
|
1106
|
+
* about Amazon SQS policy limits, see <a href="https://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/quotas-policies.html">Quotas related
|
|
1102
1107
|
* to policies</a>.</p>
|
|
1103
1108
|
*/
|
|
1104
1109
|
export interface SqsQueueConfiguration {
|
|
1105
1110
|
/**
|
|
1106
|
-
* <p> The proposed resource policy for the SQS queue. </p>
|
|
1111
|
+
* <p> The proposed resource policy for the Amazon SQS queue. </p>
|
|
1107
1112
|
*/
|
|
1108
1113
|
queuePolicy?: string;
|
|
1109
1114
|
}
|
|
@@ -1164,7 +1169,7 @@ export declare namespace Configuration {
|
|
|
1164
1169
|
$unknown?: never;
|
|
1165
1170
|
}
|
|
1166
1171
|
/**
|
|
1167
|
-
* <p>The access control configuration is for an SQS queue. </p>
|
|
1172
|
+
* <p>The access control configuration is for an Amazon SQS queue. </p>
|
|
1168
1173
|
*/
|
|
1169
1174
|
interface SqsQueueMember {
|
|
1170
1175
|
iamRole?: never;
|
|
@@ -1416,7 +1421,7 @@ export interface AnalyzedResource {
|
|
|
1416
1421
|
*/
|
|
1417
1422
|
status?: FindingStatus | string;
|
|
1418
1423
|
/**
|
|
1419
|
-
* <p>The
|
|
1424
|
+
* <p>The Amazon Web Services account ID that owns the resource.</p>
|
|
1420
1425
|
*/
|
|
1421
1426
|
resourceOwnerAccount: string | undefined;
|
|
1422
1427
|
/**
|
|
@@ -1435,8 +1440,8 @@ export declare namespace AnalyzedResource {
|
|
|
1435
1440
|
*/
|
|
1436
1441
|
export interface GetAnalyzedResourceResponse {
|
|
1437
1442
|
/**
|
|
1438
|
-
* <p>An <code>AnalyzedResource</code> object that contains information that Access Analyzer
|
|
1439
|
-
* when it analyzed the resource.</p>
|
|
1443
|
+
* <p>An <code>AnalyzedResource</code> object that contains information that IAM Access Analyzer
|
|
1444
|
+
* found when it analyzed the resource.</p>
|
|
1440
1445
|
*/
|
|
1441
1446
|
resource?: AnalyzedResource;
|
|
1442
1447
|
}
|
|
@@ -1472,7 +1477,8 @@ export declare namespace GetFindingRequest {
|
|
|
1472
1477
|
*/
|
|
1473
1478
|
export interface FindingSourceDetail {
|
|
1474
1479
|
/**
|
|
1475
|
-
* <p>The ARN of the access point that generated the finding
|
|
1480
|
+
* <p>The ARN of the access point that generated the finding. The ARN format depends on
|
|
1481
|
+
* whether the ARN represents an access point or a multi-region access point.</p>
|
|
1476
1482
|
*/
|
|
1477
1483
|
accessPointArn?: string;
|
|
1478
1484
|
}
|
|
@@ -1559,7 +1565,7 @@ export interface Finding {
|
|
|
1559
1565
|
*/
|
|
1560
1566
|
status: FindingStatus | string | undefined;
|
|
1561
1567
|
/**
|
|
1562
|
-
* <p>The
|
|
1568
|
+
* <p>The Amazon Web Services account ID that owns the resource.</p>
|
|
1563
1569
|
*/
|
|
1564
1570
|
resourceOwnerAccount: string | undefined;
|
|
1565
1571
|
/**
|
|
@@ -1612,8 +1618,8 @@ export interface GetGeneratedPolicyRequest {
|
|
|
1612
1618
|
/**
|
|
1613
1619
|
* <p>The level of detail that you want to generate. You can specify whether to generate
|
|
1614
1620
|
* service-level policies. </p>
|
|
1615
|
-
* <p>Access Analyzer uses <code>iam:servicelastaccessed</code> to identify services that have
|
|
1616
|
-
* used recently to create this service-level template.</p>
|
|
1621
|
+
* <p>IAM Access Analyzer uses <code>iam:servicelastaccessed</code> to identify services that have
|
|
1622
|
+
* been used recently to create this service-level template.</p>
|
|
1617
1623
|
*/
|
|
1618
1624
|
includeServiceLevelTemplate?: boolean;
|
|
1619
1625
|
}
|
|
@@ -1654,7 +1660,7 @@ export interface TrailProperties {
|
|
|
1654
1660
|
regions?: string[];
|
|
1655
1661
|
/**
|
|
1656
1662
|
* <p>Possible values are <code>true</code> or <code>false</code>. If set to
|
|
1657
|
-
* <code>true</code>, Access Analyzer retrieves CloudTrail data from all regions to analyze and
|
|
1663
|
+
* <code>true</code>, IAM Access Analyzer retrieves CloudTrail data from all regions to analyze and
|
|
1658
1664
|
* generate a policy.</p>
|
|
1659
1665
|
*/
|
|
1660
1666
|
allRegions?: boolean;
|
|
@@ -1675,12 +1681,12 @@ export interface CloudTrailProperties {
|
|
|
1675
1681
|
*/
|
|
1676
1682
|
trailProperties: TrailProperties[] | undefined;
|
|
1677
1683
|
/**
|
|
1678
|
-
* <p>The start of the time range for which Access Analyzer reviews your CloudTrail events. Events
|
|
1684
|
+
* <p>The start of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events
|
|
1679
1685
|
* with a timestamp before this time are not considered to generate a policy.</p>
|
|
1680
1686
|
*/
|
|
1681
1687
|
startTime: Date | undefined;
|
|
1682
1688
|
/**
|
|
1683
|
-
* <p>The end of the time range for which Access Analyzer reviews your CloudTrail events. Events with
|
|
1689
|
+
* <p>The end of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events with
|
|
1684
1690
|
* a timestamp after this time are not considered to generate a policy. If this is not
|
|
1685
1691
|
* included in the request, the default value is the current time.</p>
|
|
1686
1692
|
*/
|
|
@@ -1697,9 +1703,9 @@ export declare namespace CloudTrailProperties {
|
|
|
1697
1703
|
*/
|
|
1698
1704
|
export interface GeneratedPolicyProperties {
|
|
1699
1705
|
/**
|
|
1700
|
-
* <p>This value is set to <code>true</code> if the generated policy contains all possible
|
|
1701
|
-
* service that Access Analyzer identified from the CloudTrail trail that you specified,
|
|
1702
|
-
* <code>false</code> otherwise.</p>
|
|
1706
|
+
* <p>This value is set to <code>true</code> if the generated policy contains all possible
|
|
1707
|
+
* actions for a service that IAM Access Analyzer identified from the CloudTrail trail that you specified,
|
|
1708
|
+
* and <code>false</code> otherwise.</p>
|
|
1703
1709
|
*/
|
|
1704
1710
|
isComplete?: boolean;
|
|
1705
1711
|
/**
|
|
@@ -1794,7 +1800,7 @@ export interface JobDetails {
|
|
|
1794
1800
|
*/
|
|
1795
1801
|
completedOn?: Date;
|
|
1796
1802
|
/**
|
|
1797
|
-
* <p>
|
|
1803
|
+
* <p>The job error for the policy generation request.</p>
|
|
1798
1804
|
*/
|
|
1799
1805
|
jobError?: JobError;
|
|
1800
1806
|
}
|
|
@@ -1869,7 +1875,8 @@ export interface AccessPreviewFinding {
|
|
|
1869
1875
|
*/
|
|
1870
1876
|
id: string | undefined;
|
|
1871
1877
|
/**
|
|
1872
|
-
* <p>The existing ID of the finding in Access Analyzer, provided only for existing
|
|
1878
|
+
* <p>The existing ID of the finding in IAM Access Analyzer, provided only for existing
|
|
1879
|
+
* findings.</p>
|
|
1873
1880
|
*/
|
|
1874
1881
|
existingFindingId?: string;
|
|
1875
1882
|
/**
|
|
@@ -1913,7 +1920,7 @@ export interface AccessPreviewFinding {
|
|
|
1913
1920
|
createdAt: Date | undefined;
|
|
1914
1921
|
/**
|
|
1915
1922
|
* <p>Provides context on how the access preview finding compares to existing access
|
|
1916
|
-
* identified in Access Analyzer.</p>
|
|
1923
|
+
* identified in IAM Access Analyzer.</p>
|
|
1917
1924
|
* <ul>
|
|
1918
1925
|
* <li>
|
|
1919
1926
|
* <p>
|
|
@@ -1944,7 +1951,7 @@ export interface AccessPreviewFinding {
|
|
|
1944
1951
|
*/
|
|
1945
1952
|
status: FindingStatus | string | undefined;
|
|
1946
1953
|
/**
|
|
1947
|
-
* <p>The
|
|
1954
|
+
* <p>The Amazon Web Services account ID that owns the resource. For most Amazon Web Services resources, the owning
|
|
1948
1955
|
* account is the account in which the resource was created.</p>
|
|
1949
1956
|
*/
|
|
1950
1957
|
resourceOwnerAccount: string | undefined;
|
|
@@ -2103,7 +2110,7 @@ export interface AnalyzedResourceSummary {
|
|
|
2103
2110
|
*/
|
|
2104
2111
|
resourceArn: string | undefined;
|
|
2105
2112
|
/**
|
|
2106
|
-
* <p>The
|
|
2113
|
+
* <p>The Amazon Web Services account ID that owns the resource.</p>
|
|
2107
2114
|
*/
|
|
2108
2115
|
resourceOwnerAccount: string | undefined;
|
|
2109
2116
|
/**
|
|
@@ -2246,7 +2253,7 @@ export interface FindingSummary {
|
|
|
2246
2253
|
*/
|
|
2247
2254
|
status: FindingStatus | string | undefined;
|
|
2248
2255
|
/**
|
|
2249
|
-
* <p>The
|
|
2256
|
+
* <p>The Amazon Web Services account ID that owns the resource.</p>
|
|
2250
2257
|
*/
|
|
2251
2258
|
resourceOwnerAccount: string | undefined;
|
|
2252
2259
|
/**
|
|
@@ -2405,7 +2412,7 @@ export interface Trail {
|
|
|
2405
2412
|
regions?: string[];
|
|
2406
2413
|
/**
|
|
2407
2414
|
* <p>Possible values are <code>true</code> or <code>false</code>. If set to
|
|
2408
|
-
* <code>true</code>, Access Analyzer retrieves CloudTrail data from all regions to analyze and
|
|
2415
|
+
* <code>true</code>, IAM Access Analyzer retrieves CloudTrail data from all regions to analyze and
|
|
2409
2416
|
* generate a policy.</p>
|
|
2410
2417
|
*/
|
|
2411
2418
|
allRegions?: boolean;
|
|
@@ -2425,17 +2432,17 @@ export interface CloudTrailDetails {
|
|
|
2425
2432
|
*/
|
|
2426
2433
|
trails: Trail[] | undefined;
|
|
2427
2434
|
/**
|
|
2428
|
-
* <p>The ARN of the service role that Access Analyzer uses to access your CloudTrail trail and
|
|
2435
|
+
* <p>The ARN of the service role that IAM Access Analyzer uses to access your CloudTrail trail and
|
|
2429
2436
|
* service last accessed information.</p>
|
|
2430
2437
|
*/
|
|
2431
2438
|
accessRole: string | undefined;
|
|
2432
2439
|
/**
|
|
2433
|
-
* <p>The start of the time range for which Access Analyzer reviews your CloudTrail events. Events
|
|
2440
|
+
* <p>The start of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events
|
|
2434
2441
|
* with a timestamp before this time are not considered to generate a policy.</p>
|
|
2435
2442
|
*/
|
|
2436
2443
|
startTime: Date | undefined;
|
|
2437
2444
|
/**
|
|
2438
|
-
* <p>The end of the time range for which Access Analyzer reviews your CloudTrail events. Events with
|
|
2445
|
+
* <p>The end of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events with
|
|
2439
2446
|
* a timestamp after this time are not considered to generate a policy. If this is not
|
|
2440
2447
|
* included in the request, the default value is the current time.</p>
|
|
2441
2448
|
*/
|
|
@@ -2480,7 +2487,7 @@ export interface StartPolicyGenerationRequest {
|
|
|
2480
2487
|
* request, if the original request completes successfully, the subsequent retries with the
|
|
2481
2488
|
* same client token return the result from the original successful request and they have no
|
|
2482
2489
|
* additional effect.</p>
|
|
2483
|
-
* <p>If you do not specify a client token, one is automatically generated by the
|
|
2490
|
+
* <p>If you do not specify a client token, one is automatically generated by the Amazon Web Services
|
|
2484
2491
|
* SDK.</p>
|
|
2485
2492
|
*/
|
|
2486
2493
|
clientToken?: string;
|
|
@@ -2661,12 +2668,12 @@ export interface ValidatePolicyRequest {
|
|
|
2661
2668
|
/**
|
|
2662
2669
|
* <p>The type of policy to validate. Identity policies grant permissions to IAM principals.
|
|
2663
2670
|
* Identity policies include managed and inline policies for IAM roles, users, and groups.
|
|
2664
|
-
* They also include service-control policies (SCPs) that are attached to an
|
|
2671
|
+
* They also include service-control policies (SCPs) that are attached to an Amazon Web Services
|
|
2665
2672
|
* organization, organizational unit (OU), or an account.</p>
|
|
2666
|
-
* <p>Resource policies grant permissions on
|
|
2667
|
-
* policies for IAM roles and bucket policies for S3 buckets. You can provide a generic
|
|
2668
|
-
* such as identity policy or resource policy or a specific input such as managed policy
|
|
2669
|
-
* bucket policy. </p>
|
|
2673
|
+
* <p>Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust
|
|
2674
|
+
* policies for IAM roles and bucket policies for Amazon S3 buckets. You can provide a generic
|
|
2675
|
+
* input such as identity policy or resource policy or a specific input such as managed policy
|
|
2676
|
+
* or Amazon S3 bucket policy. </p>
|
|
2670
2677
|
*/
|
|
2671
2678
|
policyType: PolicyType | string | undefined;
|
|
2672
2679
|
}
|
|
@@ -2875,7 +2882,7 @@ export declare namespace ValidatePolicyFinding {
|
|
|
2875
2882
|
}
|
|
2876
2883
|
export interface ValidatePolicyResponse {
|
|
2877
2884
|
/**
|
|
2878
|
-
* <p>The list of findings in a policy returned by Access Analyzer based on its suite of policy
|
|
2885
|
+
* <p>The list of findings in a policy returned by IAM Access Analyzer based on its suite of policy
|
|
2879
2886
|
* checks.</p>
|
|
2880
2887
|
*/
|
|
2881
2888
|
findings: ValidatePolicyFinding[] | undefined;
|