@aws-sdk/client-accessanalyzer 3.43.0 → 3.44.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +11 -0
- package/dist-cjs/models/models_0.js +8 -1
- package/dist-cjs/protocols/Aws_restJson1.js +2 -0
- package/dist-es/models/models_0.js +7 -0
- package/dist-es/protocols/Aws_restJson1.js +3 -2
- package/dist-types/models/models_0.d.ts +21 -4
- package/dist-types/ts3.4/models/models_0.d.ts +8 -0
- package/package.json +1 -1
package/CHANGELOG.md
CHANGED
|
@@ -3,6 +3,17 @@
|
|
|
3
3
|
All notable changes to this project will be documented in this file.
|
|
4
4
|
See [Conventional Commits](https://conventionalcommits.org) for commit guidelines.
|
|
5
5
|
|
|
6
|
+
# [3.44.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.43.0...v3.44.0) (2021-12-02)
|
|
7
|
+
|
|
8
|
+
|
|
9
|
+
### Features
|
|
10
|
+
|
|
11
|
+
* **clients:** update clients as of 2021/11/30 ([#3077](https://github.com/aws/aws-sdk-js-v3/issues/3077)) ([2bdba30](https://github.com/aws/aws-sdk-js-v3/commit/2bdba30963e550728ba2903d57daa1e666a29d71))
|
|
12
|
+
|
|
13
|
+
|
|
14
|
+
|
|
15
|
+
|
|
16
|
+
|
|
6
17
|
# [3.43.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.42.0...v3.43.0) (2021-11-29)
|
|
7
18
|
|
|
8
19
|
**Note:** Version bump only for package @aws-sdk/client-accessanalyzer
|
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
3
|
exports.CreateAccessPreviewResponse = exports.CreateAccessPreviewRequest = exports.Configuration = exports.SqsQueueConfiguration = exports.SecretsManagerSecretConfiguration = exports.S3BucketConfiguration = exports.S3BucketAclGrantConfiguration = exports.AclPermission = exports.AclGrantee = exports.S3AccessPointConfiguration = exports.S3PublicAccessBlockConfiguration = exports.NetworkOriginConfiguration = exports.VpcConfiguration = exports.InternetConfiguration = exports.KmsKeyConfiguration = exports.KmsGrantConfiguration = exports.KmsGrantOperation = exports.KmsGrantConstraints = exports.IamRoleConfiguration = exports.CancelPolicyGenerationResponse = exports.CancelPolicyGenerationRequest = exports.ApplyArchiveRuleRequest = exports.ListAnalyzersResponse = exports.ListAnalyzersRequest = exports.GetAnalyzerResponse = exports.AnalyzerSummary = exports.StatusReason = exports.GetAnalyzerRequest = exports.DeleteAnalyzerRequest = exports.CreateAnalyzerResponse = exports.CreateAnalyzerRequest = exports.InlineArchiveRule = exports.UpdateArchiveRuleRequest = exports.ListArchiveRulesResponse = exports.ListArchiveRulesRequest = exports.GetArchiveRuleResponse = exports.ArchiveRuleSummary = exports.GetArchiveRuleRequest = exports.DeleteArchiveRuleRequest = exports.ValidationException = exports.ValidationExceptionReason = exports.ValidationExceptionField = exports.ThrottlingException = exports.ServiceQuotaExceededException = exports.ResourceNotFoundException = exports.InternalServerException = exports.CreateArchiveRuleRequest = exports.Criterion = exports.ConflictException = exports.AccessDeniedException = void 0;
|
|
4
4
|
exports.StartResourceScanRequest = exports.StartPolicyGenerationResponse = exports.StartPolicyGenerationRequest = exports.PolicyGenerationDetails = exports.CloudTrailDetails = exports.Trail = exports.ListTagsForResourceResponse = exports.ListTagsForResourceRequest = exports.ListPolicyGenerationsResponse = exports.PolicyGeneration = exports.ListPolicyGenerationsRequest = exports.ListFindingsResponse = exports.FindingSummary = exports.ListFindingsRequest = exports.SortCriteria = exports.ListAnalyzedResourcesResponse = exports.AnalyzedResourceSummary = exports.ListAnalyzedResourcesRequest = exports.ListAccessPreviewsResponse = exports.AccessPreviewSummary = exports.ListAccessPreviewsRequest = exports.ListAccessPreviewFindingsResponse = exports.AccessPreviewFinding = exports.FindingChangeType = exports.ListAccessPreviewFindingsRequest = exports.GetGeneratedPolicyResponse = exports.JobDetails = exports.JobStatus = exports.JobError = exports.JobErrorCode = exports.GeneratedPolicyResult = exports.GeneratedPolicyProperties = exports.CloudTrailProperties = exports.TrailProperties = exports.GeneratedPolicy = exports.GetGeneratedPolicyRequest = exports.GetFindingResponse = exports.Finding = exports.FindingSource = exports.FindingSourceDetail = exports.GetFindingRequest = exports.GetAnalyzedResourceResponse = exports.AnalyzedResource = exports.GetAnalyzedResourceRequest = exports.GetAccessPreviewResponse = exports.AccessPreview = exports.AccessPreviewStatusReason = exports.AccessPreviewStatusReasonCode = exports.AccessPreviewStatus = exports.GetAccessPreviewRequest = void 0;
|
|
5
|
-
exports.ValidatePolicyResponse = exports.ValidatePolicyFinding = exports.Location = exports.Span = exports.Position = exports.PathElement = exports.Substring = exports.ValidatePolicyFindingType = exports.ValidatePolicyRequest = exports.PolicyType = exports.Locale = exports.UpdateFindingsRequest = exports.UntagResourceResponse = exports.UntagResourceRequest = exports.TagResourceResponse = exports.TagResourceRequest = void 0;
|
|
5
|
+
exports.ValidatePolicyResponse = exports.ValidatePolicyFinding = exports.Location = exports.Span = exports.Position = exports.PathElement = exports.Substring = exports.ValidatePolicyFindingType = exports.ValidatePolicyRequest = exports.ValidatePolicyResourceType = exports.PolicyType = exports.Locale = exports.UpdateFindingsRequest = exports.UntagResourceResponse = exports.UntagResourceRequest = exports.TagResourceResponse = exports.TagResourceRequest = void 0;
|
|
6
6
|
var AccessDeniedException;
|
|
7
7
|
(function (AccessDeniedException) {
|
|
8
8
|
AccessDeniedException.filterSensitiveLog = (obj) => ({
|
|
@@ -739,6 +739,13 @@ var PolicyType;
|
|
|
739
739
|
PolicyType["RESOURCE_POLICY"] = "RESOURCE_POLICY";
|
|
740
740
|
PolicyType["SERVICE_CONTROL_POLICY"] = "SERVICE_CONTROL_POLICY";
|
|
741
741
|
})(PolicyType = exports.PolicyType || (exports.PolicyType = {}));
|
|
742
|
+
var ValidatePolicyResourceType;
|
|
743
|
+
(function (ValidatePolicyResourceType) {
|
|
744
|
+
ValidatePolicyResourceType["S3_ACCESS_POINT"] = "AWS::S3::AccessPoint";
|
|
745
|
+
ValidatePolicyResourceType["S3_BUCKET"] = "AWS::S3::Bucket";
|
|
746
|
+
ValidatePolicyResourceType["S3_MULTI_REGION_ACCESS_POINT"] = "AWS::S3::MultiRegionAccessPoint";
|
|
747
|
+
ValidatePolicyResourceType["S3_OBJECT_LAMBDA_ACCESS_POINT"] = "AWS::S3ObjectLambda::AccessPoint";
|
|
748
|
+
})(ValidatePolicyResourceType = exports.ValidatePolicyResourceType || (exports.ValidatePolicyResourceType = {}));
|
|
742
749
|
var ValidatePolicyRequest;
|
|
743
750
|
(function (ValidatePolicyRequest) {
|
|
744
751
|
ValidatePolicyRequest.filterSensitiveLog = (obj) => ({
|
|
@@ -809,6 +809,8 @@ const serializeAws_restJson1ValidatePolicyCommand = async (input, context) => {
|
|
|
809
809
|
...(input.policyDocument !== undefined &&
|
|
810
810
|
input.policyDocument !== null && { policyDocument: input.policyDocument }),
|
|
811
811
|
...(input.policyType !== undefined && input.policyType !== null && { policyType: input.policyType }),
|
|
812
|
+
...(input.validatePolicyResourceType !== undefined &&
|
|
813
|
+
input.validatePolicyResourceType !== null && { validatePolicyResourceType: input.validatePolicyResourceType }),
|
|
812
814
|
});
|
|
813
815
|
return new protocol_http_1.HttpRequest({
|
|
814
816
|
protocol,
|
|
@@ -546,6 +546,13 @@ export var PolicyType;
|
|
|
546
546
|
PolicyType["RESOURCE_POLICY"] = "RESOURCE_POLICY";
|
|
547
547
|
PolicyType["SERVICE_CONTROL_POLICY"] = "SERVICE_CONTROL_POLICY";
|
|
548
548
|
})(PolicyType || (PolicyType = {}));
|
|
549
|
+
export var ValidatePolicyResourceType;
|
|
550
|
+
(function (ValidatePolicyResourceType) {
|
|
551
|
+
ValidatePolicyResourceType["S3_ACCESS_POINT"] = "AWS::S3::AccessPoint";
|
|
552
|
+
ValidatePolicyResourceType["S3_BUCKET"] = "AWS::S3::Bucket";
|
|
553
|
+
ValidatePolicyResourceType["S3_MULTI_REGION_ACCESS_POINT"] = "AWS::S3::MultiRegionAccessPoint";
|
|
554
|
+
ValidatePolicyResourceType["S3_OBJECT_LAMBDA_ACCESS_POINT"] = "AWS::S3ObjectLambda::AccessPoint";
|
|
555
|
+
})(ValidatePolicyResourceType || (ValidatePolicyResourceType = {}));
|
|
549
556
|
export var ValidatePolicyRequest;
|
|
550
557
|
(function (ValidatePolicyRequest) {
|
|
551
558
|
ValidatePolicyRequest.filterSensitiveLog = function (obj) { return (__assign({}, obj)); };
|
|
@@ -854,8 +854,9 @@ export var serializeAws_restJson1ValidatePolicyCommand = function (input, contex
|
|
|
854
854
|
};
|
|
855
855
|
resolvedPath = "" + ((basePath === null || basePath === void 0 ? void 0 : basePath.endsWith("/")) ? basePath.slice(0, -1) : basePath || "") + "/policy/validation";
|
|
856
856
|
query = __assign(__assign({}, (input.maxResults !== undefined && { maxResults: input.maxResults.toString() })), (input.nextToken !== undefined && { nextToken: input.nextToken }));
|
|
857
|
-
body = JSON.stringify(__assign(__assign(__assign({}, (input.locale !== undefined && input.locale !== null && { locale: input.locale })), (input.policyDocument !== undefined &&
|
|
858
|
-
input.policyDocument !== null && { policyDocument: input.policyDocument })), (input.policyType !== undefined && input.policyType !== null && { policyType: input.policyType }))
|
|
857
|
+
body = JSON.stringify(__assign(__assign(__assign(__assign({}, (input.locale !== undefined && input.locale !== null && { locale: input.locale })), (input.policyDocument !== undefined &&
|
|
858
|
+
input.policyDocument !== null && { policyDocument: input.policyDocument })), (input.policyType !== undefined && input.policyType !== null && { policyType: input.policyType })), (input.validatePolicyResourceType !== undefined &&
|
|
859
|
+
input.validatePolicyResourceType !== null && { validatePolicyResourceType: input.validatePolicyResourceType })));
|
|
859
860
|
return [2, new __HttpRequest({
|
|
860
861
|
protocol: protocol,
|
|
861
862
|
hostname: hostname,
|
|
@@ -1068,14 +1068,14 @@ export declare namespace S3BucketConfiguration {
|
|
|
1068
1068
|
* specify the policy, the access preview assumes a secret without a policy. To propose
|
|
1069
1069
|
* deletion of an existing policy, you can specify an empty string. If the proposed
|
|
1070
1070
|
* configuration is for a new secret and you do not specify the KMS key ID, the access
|
|
1071
|
-
* preview uses the
|
|
1072
|
-
* KMS key ID, the access preview uses the
|
|
1073
|
-
* information about secret policy limits, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_limits.html">Quotas for
|
|
1071
|
+
* preview uses the Amazon Web Services managed key <code>aws/secretsmanager</code>. If you specify an empty
|
|
1072
|
+
* string for the KMS key ID, the access preview uses the Amazon Web Services managed key of the Amazon Web Services
|
|
1073
|
+
* account. For more information about secret policy limits, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_limits.html">Quotas for
|
|
1074
1074
|
* Secrets Manager.</a>.</p>
|
|
1075
1075
|
*/
|
|
1076
1076
|
export interface SecretsManagerSecretConfiguration {
|
|
1077
1077
|
/**
|
|
1078
|
-
* <p>The proposed ARN, key ID, or alias of the KMS
|
|
1078
|
+
* <p>The proposed ARN, key ID, or alias of the KMS key.</p>
|
|
1079
1079
|
*/
|
|
1080
1080
|
kmsKeyId?: string;
|
|
1081
1081
|
/**
|
|
@@ -2639,6 +2639,12 @@ export declare enum PolicyType {
|
|
|
2639
2639
|
RESOURCE_POLICY = "RESOURCE_POLICY",
|
|
2640
2640
|
SERVICE_CONTROL_POLICY = "SERVICE_CONTROL_POLICY"
|
|
2641
2641
|
}
|
|
2642
|
+
export declare enum ValidatePolicyResourceType {
|
|
2643
|
+
S3_ACCESS_POINT = "AWS::S3::AccessPoint",
|
|
2644
|
+
S3_BUCKET = "AWS::S3::Bucket",
|
|
2645
|
+
S3_MULTI_REGION_ACCESS_POINT = "AWS::S3::MultiRegionAccessPoint",
|
|
2646
|
+
S3_OBJECT_LAMBDA_ACCESS_POINT = "AWS::S3ObjectLambda::AccessPoint"
|
|
2647
|
+
}
|
|
2642
2648
|
export interface ValidatePolicyRequest {
|
|
2643
2649
|
/**
|
|
2644
2650
|
* <p>The locale to use for localizing the findings.</p>
|
|
@@ -2667,6 +2673,17 @@ export interface ValidatePolicyRequest {
|
|
|
2667
2673
|
* or Amazon S3 bucket policy. </p>
|
|
2668
2674
|
*/
|
|
2669
2675
|
policyType: PolicyType | string | undefined;
|
|
2676
|
+
/**
|
|
2677
|
+
* <p>The type of resource to attach to your resource policy. Specify a value for the policy
|
|
2678
|
+
* validation resource type only if the policy type is <code>RESOURCE_POLICY</code>. For
|
|
2679
|
+
* example, to validate a resource policy to attach to an Amazon S3 bucket, you can choose
|
|
2680
|
+
* <code>AWS::S3::Bucket</code> for the policy validation resource type.</p>
|
|
2681
|
+
* <p>For resource types not supported as valid values, IAM Access Analyzer runs policy checks that
|
|
2682
|
+
* apply to all resource policies. For example, to validate a resource policy to attach to a
|
|
2683
|
+
* KMS key, do not specify a value for the policy validation resource type and IAM Access Analyzer
|
|
2684
|
+
* will run policy checks that apply to all resource policies.</p>
|
|
2685
|
+
*/
|
|
2686
|
+
validatePolicyResourceType?: ValidatePolicyResourceType | string;
|
|
2670
2687
|
}
|
|
2671
2688
|
export declare namespace ValidatePolicyRequest {
|
|
2672
2689
|
/**
|
|
@@ -1457,6 +1457,12 @@ export declare enum PolicyType {
|
|
|
1457
1457
|
RESOURCE_POLICY = "RESOURCE_POLICY",
|
|
1458
1458
|
SERVICE_CONTROL_POLICY = "SERVICE_CONTROL_POLICY"
|
|
1459
1459
|
}
|
|
1460
|
+
export declare enum ValidatePolicyResourceType {
|
|
1461
|
+
S3_ACCESS_POINT = "AWS::S3::AccessPoint",
|
|
1462
|
+
S3_BUCKET = "AWS::S3::Bucket",
|
|
1463
|
+
S3_MULTI_REGION_ACCESS_POINT = "AWS::S3::MultiRegionAccessPoint",
|
|
1464
|
+
S3_OBJECT_LAMBDA_ACCESS_POINT = "AWS::S3ObjectLambda::AccessPoint"
|
|
1465
|
+
}
|
|
1460
1466
|
export interface ValidatePolicyRequest {
|
|
1461
1467
|
|
|
1462
1468
|
locale?: Locale | string;
|
|
@@ -1468,6 +1474,8 @@ export interface ValidatePolicyRequest {
|
|
|
1468
1474
|
policyDocument: string | undefined;
|
|
1469
1475
|
|
|
1470
1476
|
policyType: PolicyType | string | undefined;
|
|
1477
|
+
|
|
1478
|
+
validatePolicyResourceType?: ValidatePolicyResourceType | string;
|
|
1471
1479
|
}
|
|
1472
1480
|
export declare namespace ValidatePolicyRequest {
|
|
1473
1481
|
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/client-accessanalyzer",
|
|
3
3
|
"description": "AWS SDK for JavaScript Accessanalyzer Client for Node.js, Browser and React Native",
|
|
4
|
-
"version": "3.
|
|
4
|
+
"version": "3.44.0",
|
|
5
5
|
"scripts": {
|
|
6
6
|
"build": "yarn build:cjs && yarn build:es && yarn build:types",
|
|
7
7
|
"build:cjs": "tsc -p tsconfig.json",
|