@aws-sdk/client-accessanalyzer 3.830.0 → 3.835.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -24
- package/dist-cjs/index.js +31 -0
- package/dist-es/models/models_0.js +22 -0
- package/dist-es/protocols/Aws_restJson1.js +5 -0
- package/dist-types/AccessAnalyzer.d.ts +1 -24
- package/dist-types/AccessAnalyzerClient.d.ts +1 -24
- package/dist-types/commands/ApplyArchiveRuleCommand.d.ts +1 -2
- package/dist-types/commands/CheckNoNewAccessCommand.d.ts +1 -6
- package/dist-types/commands/CheckNoPublicAccessCommand.d.ts +1 -2
- package/dist-types/commands/CreateAccessPreviewCommand.d.ts +1 -2
- package/dist-types/commands/CreateAnalyzerCommand.d.ts +17 -0
- package/dist-types/commands/CreateArchiveRuleCommand.d.ts +1 -3
- package/dist-types/commands/DeleteAnalyzerCommand.d.ts +1 -3
- package/dist-types/commands/GetAnalyzerCommand.d.ts +17 -0
- package/dist-types/commands/GetArchiveRuleCommand.d.ts +1 -2
- package/dist-types/commands/GetFindingCommand.d.ts +1 -4
- package/dist-types/commands/GetFindingV2Command.d.ts +29 -7
- package/dist-types/commands/GetFindingsStatisticsCommand.d.ts +13 -2
- package/dist-types/commands/GetGeneratedPolicyCommand.d.ts +1 -2
- package/dist-types/commands/ListAccessPreviewFindingsCommand.d.ts +1 -2
- package/dist-types/commands/ListAnalyzedResourcesCommand.d.ts +1 -2
- package/dist-types/commands/ListAnalyzersCommand.d.ts +17 -0
- package/dist-types/commands/ListFindingsCommand.d.ts +1 -5
- package/dist-types/commands/ListFindingsV2Command.d.ts +1 -5
- package/dist-types/commands/UpdateAnalyzerCommand.d.ts +34 -0
- package/dist-types/commands/ValidatePolicyCommand.d.ts +1 -3
- package/dist-types/endpoint/EndpointParameters.d.ts +1 -1
- package/dist-types/index.d.ts +1 -24
- package/dist-types/models/models_0.d.ts +455 -899
- package/dist-types/ts3.4/endpoint/EndpointParameters.d.ts +4 -1
- package/dist-types/ts3.4/models/models_0.d.ts +117 -18
- package/package.json +11 -11
|
@@ -1,22 +1,17 @@
|
|
|
1
1
|
import { ExceptionOptionType as __ExceptionOptionType } from "@smithy/smithy-client";
|
|
2
2
|
import { AccessAnalyzerServiceException as __BaseException } from "./AccessAnalyzerServiceException";
|
|
3
3
|
/**
|
|
4
|
-
* <p>Contains information about actions and resources that define permissions to check
|
|
5
|
-
* against a policy.</p>
|
|
4
|
+
* <p>Contains information about actions and resources that define permissions to check against a policy.</p>
|
|
6
5
|
* @public
|
|
7
6
|
*/
|
|
8
7
|
export interface Access {
|
|
9
8
|
/**
|
|
10
|
-
* <p>A list of actions for the access permissions. Any strings that can be used as an action
|
|
11
|
-
* in an IAM policy can be used in the list of actions to check.</p>
|
|
9
|
+
* <p>A list of actions for the access permissions. Any strings that can be used as an action in an IAM policy can be used in the list of actions to check.</p>
|
|
12
10
|
* @public
|
|
13
11
|
*/
|
|
14
12
|
actions?: string[] | undefined;
|
|
15
13
|
/**
|
|
16
|
-
* <p>A list of resources for the access permissions. Any strings that can be used as an
|
|
17
|
-
* Amazon Resource Name (ARN) in an IAM policy can be used in the list of resources to
|
|
18
|
-
* check. You can only use a wildcard in the portion of the ARN that specifies the resource
|
|
19
|
-
* ID.</p>
|
|
14
|
+
* <p>A list of resources for the access permissions. Any strings that can be used as an Amazon Resource Name (ARN) in an IAM policy can be used in the list of resources to check. You can only use a wildcard in the portion of the ARN that specifies the resource ID.</p>
|
|
20
15
|
* @public
|
|
21
16
|
*/
|
|
22
17
|
resources?: string[] | undefined;
|
|
@@ -56,9 +51,7 @@ export declare class ConflictException extends __BaseException {
|
|
|
56
51
|
constructor(opts: __ExceptionOptionType<ConflictException, __BaseException>);
|
|
57
52
|
}
|
|
58
53
|
/**
|
|
59
|
-
* <p>The criteria to use in the filter that defines the archive rule. For more information on
|
|
60
|
-
* available filter keys, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter
|
|
61
|
-
* keys</a>.</p>
|
|
54
|
+
* <p>The criteria to use in the filter that defines the archive rule. For more information on available filter keys, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a>.</p>
|
|
62
55
|
* @public
|
|
63
56
|
*/
|
|
64
57
|
export interface Criterion {
|
|
@@ -282,8 +275,7 @@ export interface GetArchiveRuleRequest {
|
|
|
282
275
|
ruleName: string | undefined;
|
|
283
276
|
}
|
|
284
277
|
/**
|
|
285
|
-
* <p>Contains information about an archive rule. Archive rules automatically archive new
|
|
286
|
-
* findings that meet the criteria you define when you create the rule.</p>
|
|
278
|
+
* <p>Contains information about an archive rule. Archive rules automatically archive new findings that meet the criteria you define when you create the rule.</p>
|
|
287
279
|
* @public
|
|
288
280
|
*/
|
|
289
281
|
export interface ArchiveRuleSummary {
|
|
@@ -314,8 +306,7 @@ export interface ArchiveRuleSummary {
|
|
|
314
306
|
*/
|
|
315
307
|
export interface GetArchiveRuleResponse {
|
|
316
308
|
/**
|
|
317
|
-
* <p>Contains information about an archive rule. Archive rules automatically archive new
|
|
318
|
-
* findings that meet the criteria you define when you create the rule.</p>
|
|
309
|
+
* <p>Contains information about an archive rule. Archive rules automatically archive new findings that meet the criteria you define when you create the rule.</p>
|
|
319
310
|
* @public
|
|
320
311
|
*/
|
|
321
312
|
archiveRule: ArchiveRuleSummary | undefined;
|
|
@@ -373,8 +364,7 @@ export interface UpdateArchiveRuleRequest {
|
|
|
373
364
|
*/
|
|
374
365
|
ruleName: string | undefined;
|
|
375
366
|
/**
|
|
376
|
-
* <p>A filter to match for the rules to update. Only rules that match the filter are
|
|
377
|
-
* updated.</p>
|
|
367
|
+
* <p>A filter to match for the rules to update. Only rules that match the filter are updated.</p>
|
|
378
368
|
* @public
|
|
379
369
|
*/
|
|
380
370
|
filter: Record<string, Criterion> | undefined;
|
|
@@ -385,8 +375,7 @@ export interface UpdateArchiveRuleRequest {
|
|
|
385
375
|
clientToken?: string | undefined;
|
|
386
376
|
}
|
|
387
377
|
/**
|
|
388
|
-
* <p>An criterion statement in an archive rule. Each archive rule may have multiple
|
|
389
|
-
* criteria.</p>
|
|
378
|
+
* <p>An criterion statement in an archive rule. Each archive rule may have multiple criteria.</p>
|
|
390
379
|
* @public
|
|
391
380
|
*/
|
|
392
381
|
export interface InlineArchiveRule {
|
|
@@ -402,42 +391,75 @@ export interface InlineArchiveRule {
|
|
|
402
391
|
filter: Record<string, Criterion> | undefined;
|
|
403
392
|
}
|
|
404
393
|
/**
|
|
405
|
-
*
|
|
406
|
-
|
|
394
|
+
* @public
|
|
395
|
+
*/
|
|
396
|
+
export type ResourceType = "AWS::DynamoDB::Stream" | "AWS::DynamoDB::Table" | "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::EFS::FileSystem" | "AWS::IAM::Role" | "AWS::IAM::User" | "AWS::KMS::Key" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::RDS::DBClusterSnapshot" | "AWS::RDS::DBSnapshot" | "AWS::S3::Bucket" | "AWS::S3Express::DirectoryBucket" | "AWS::SNS::Topic" | "AWS::SQS::Queue" | "AWS::SecretsManager::Secret";
|
|
397
|
+
/**
|
|
398
|
+
* <p>The criteria for an analysis rule for an internal access analyzer.</p>
|
|
399
|
+
* @public
|
|
400
|
+
*/
|
|
401
|
+
export interface InternalAccessAnalysisRuleCriteria {
|
|
402
|
+
/**
|
|
403
|
+
* <p>A list of Amazon Web Services account IDs to apply to the internal access analysis rule criteria. Account IDs can only be applied to the analysis rule criteria for organization-level analyzers.</p>
|
|
404
|
+
* @public
|
|
405
|
+
*/
|
|
406
|
+
accountIds?: string[] | undefined;
|
|
407
|
+
/**
|
|
408
|
+
* <p>A list of resource types to apply to the internal access analysis rule criteria. The analyzer will only generate findings for resources of these types. These resource types are currently supported for internal access analyzers:</p> <ul> <li> <p> <code>AWS::S3::Bucket</code> </p> </li> <li> <p> <code>AWS::RDS::DBSnapshot</code> </p> </li> <li> <p> <code>AWS::RDS::DBClusterSnapshot</code> </p> </li> <li> <p> <code>AWS::S3Express::DirectoryBucket</code> </p> </li> <li> <p> <code>AWS::DynamoDB::Table</code> </p> </li> <li> <p> <code>AWS::DynamoDB::Stream</code> </p> </li> </ul>
|
|
409
|
+
* @public
|
|
410
|
+
*/
|
|
411
|
+
resourceTypes?: ResourceType[] | undefined;
|
|
412
|
+
/**
|
|
413
|
+
* <p>A list of resource ARNs to apply to the internal access analysis rule criteria. The analyzer will only generate findings for resources that match these ARNs.</p>
|
|
414
|
+
* @public
|
|
415
|
+
*/
|
|
416
|
+
resourceArns?: string[] | undefined;
|
|
417
|
+
}
|
|
418
|
+
/**
|
|
419
|
+
* <p>Contains information about analysis rules for the internal access analyzer. Analysis rules determine which entities will generate findings based on the criteria you define when you create the rule.</p>
|
|
420
|
+
* @public
|
|
421
|
+
*/
|
|
422
|
+
export interface InternalAccessAnalysisRule {
|
|
423
|
+
/**
|
|
424
|
+
* <p>A list of rules for the internal access analyzer containing criteria to include in analysis. Only resources that meet the rule criteria will generate findings.</p>
|
|
425
|
+
* @public
|
|
426
|
+
*/
|
|
427
|
+
inclusions?: InternalAccessAnalysisRuleCriteria[] | undefined;
|
|
428
|
+
}
|
|
429
|
+
/**
|
|
430
|
+
* <p>Specifies the configuration of an internal access analyzer for an Amazon Web Services organization or account. This configuration determines how the analyzer evaluates internal access within your Amazon Web Services environment.</p>
|
|
431
|
+
* @public
|
|
432
|
+
*/
|
|
433
|
+
export interface InternalAccessConfiguration {
|
|
434
|
+
/**
|
|
435
|
+
* <p>Contains information about analysis rules for the internal access analyzer. These rules determine which resources and access patterns will be analyzed.</p>
|
|
436
|
+
* @public
|
|
437
|
+
*/
|
|
438
|
+
analysisRule?: InternalAccessAnalysisRule | undefined;
|
|
439
|
+
}
|
|
440
|
+
/**
|
|
441
|
+
* <p>The criteria for an analysis rule for an analyzer. The criteria determine which entities will generate findings.</p>
|
|
407
442
|
* @public
|
|
408
443
|
*/
|
|
409
444
|
export interface AnalysisRuleCriteria {
|
|
410
445
|
/**
|
|
411
|
-
* <p>A list of Amazon Web Services account IDs to apply to the analysis rule criteria. The accounts cannot
|
|
412
|
-
* include the organization analyzer owner account. Account IDs can only be applied to the
|
|
413
|
-
* analysis rule criteria for organization-level analyzers. The list cannot include more than
|
|
414
|
-
* 2,000 account IDs.</p>
|
|
446
|
+
* <p>A list of Amazon Web Services account IDs to apply to the analysis rule criteria. The accounts cannot include the organization analyzer owner account. Account IDs can only be applied to the analysis rule criteria for organization-level analyzers. The list cannot include more than 2,000 account IDs.</p>
|
|
415
447
|
* @public
|
|
416
448
|
*/
|
|
417
449
|
accountIds?: string[] | undefined;
|
|
418
450
|
/**
|
|
419
|
-
* <p>An array of key-value pairs to match for your resources. You can use the set of Unicode
|
|
420
|
-
* letters, digits, whitespace, <code>_</code>, <code>.</code>, <code>/</code>,
|
|
421
|
-
* <code>=</code>, <code>+</code>, and <code>-</code>.</p>
|
|
422
|
-
* <p>For the tag key, you can specify a value that is 1 to 128 characters in length and
|
|
423
|
-
* cannot be prefixed with <code>aws:</code>.</p>
|
|
424
|
-
* <p>For the tag value, you can specify a value that is 0 to 256 characters in length. If the
|
|
425
|
-
* specified tag value is 0 characters, the rule is applied to all principals with the
|
|
426
|
-
* specified tag key.</p>
|
|
451
|
+
* <p>An array of key-value pairs to match for your resources. You can use the set of Unicode letters, digits, whitespace, <code>_</code>, <code>.</code>, <code>/</code>, <code>=</code>, <code>+</code>, and <code>-</code>.</p> <p>For the tag key, you can specify a value that is 1 to 128 characters in length and cannot be prefixed with <code>aws:</code>.</p> <p>For the tag value, you can specify a value that is 0 to 256 characters in length. If the specified tag value is 0 characters, the rule is applied to all principals with the specified tag key.</p>
|
|
427
452
|
* @public
|
|
428
453
|
*/
|
|
429
454
|
resourceTags?: Record<string, string>[] | undefined;
|
|
430
455
|
}
|
|
431
456
|
/**
|
|
432
|
-
* <p>Contains information about analysis rules for the analyzer. Analysis rules determine
|
|
433
|
-
* which entities will generate findings based on the criteria you define when you create the
|
|
434
|
-
* rule.</p>
|
|
457
|
+
* <p>Contains information about analysis rules for the analyzer. Analysis rules determine which entities will generate findings based on the criteria you define when you create the rule.</p>
|
|
435
458
|
* @public
|
|
436
459
|
*/
|
|
437
460
|
export interface AnalysisRule {
|
|
438
461
|
/**
|
|
439
|
-
* <p>A list of rules for the analyzer containing criteria to exclude from analysis. Entities
|
|
440
|
-
* that meet the rule criteria will not generate findings.</p>
|
|
462
|
+
* <p>A list of rules for the analyzer containing criteria to exclude from analysis. Entities that meet the rule criteria will not generate findings.</p>
|
|
441
463
|
* @public
|
|
442
464
|
*/
|
|
443
465
|
exclusions?: AnalysisRuleCriteria[] | undefined;
|
|
@@ -448,39 +470,41 @@ export interface AnalysisRule {
|
|
|
448
470
|
*/
|
|
449
471
|
export interface UnusedAccessConfiguration {
|
|
450
472
|
/**
|
|
451
|
-
* <p>The specified access age in days for which to generate findings for unused access. For
|
|
452
|
-
* example, if you specify 90 days, the analyzer will generate findings for IAM entities
|
|
453
|
-
* within the accounts of the selected organization for any access that hasn't been used in 90
|
|
454
|
-
* or more days since the analyzer's last scan. You can choose a value between 1 and 365
|
|
455
|
-
* days.</p>
|
|
473
|
+
* <p>The specified access age in days for which to generate findings for unused access. For example, if you specify 90 days, the analyzer will generate findings for IAM entities within the accounts of the selected organization for any access that hasn't been used in 90 or more days since the analyzer's last scan. You can choose a value between 1 and 365 days.</p>
|
|
456
474
|
* @public
|
|
457
475
|
*/
|
|
458
476
|
unusedAccessAge?: number | undefined;
|
|
459
477
|
/**
|
|
460
|
-
* <p>Contains information about analysis rules for the analyzer. Analysis rules determine
|
|
461
|
-
* which entities will generate findings based on the criteria you define when you create the
|
|
462
|
-
* rule.</p>
|
|
478
|
+
* <p>Contains information about analysis rules for the analyzer. Analysis rules determine which entities will generate findings based on the criteria you define when you create the rule.</p>
|
|
463
479
|
* @public
|
|
464
480
|
*/
|
|
465
481
|
analysisRule?: AnalysisRule | undefined;
|
|
466
482
|
}
|
|
467
483
|
/**
|
|
468
|
-
* <p>Contains information about the configuration of an analyzer for an Amazon Web Services organization or
|
|
469
|
-
* account.</p>
|
|
484
|
+
* <p>Contains information about the configuration of an analyzer for an Amazon Web Services organization or account.</p>
|
|
470
485
|
* @public
|
|
471
486
|
*/
|
|
472
|
-
export type AnalyzerConfiguration = AnalyzerConfiguration.UnusedAccessMember | AnalyzerConfiguration.$UnknownMember;
|
|
487
|
+
export type AnalyzerConfiguration = AnalyzerConfiguration.InternalAccessMember | AnalyzerConfiguration.UnusedAccessMember | AnalyzerConfiguration.$UnknownMember;
|
|
473
488
|
/**
|
|
474
489
|
* @public
|
|
475
490
|
*/
|
|
476
491
|
export declare namespace AnalyzerConfiguration {
|
|
477
492
|
/**
|
|
478
|
-
* <p>Specifies the configuration of an unused access analyzer for an Amazon Web Services organization or
|
|
479
|
-
* account.</p>
|
|
493
|
+
* <p>Specifies the configuration of an unused access analyzer for an Amazon Web Services organization or account.</p>
|
|
480
494
|
* @public
|
|
481
495
|
*/
|
|
482
496
|
interface UnusedAccessMember {
|
|
483
497
|
unusedAccess: UnusedAccessConfiguration;
|
|
498
|
+
internalAccess?: never;
|
|
499
|
+
$unknown?: never;
|
|
500
|
+
}
|
|
501
|
+
/**
|
|
502
|
+
* <p>Specifies the configuration of an internal access analyzer for an Amazon Web Services organization or account. This configuration determines how the analyzer evaluates access within your Amazon Web Services environment.</p>
|
|
503
|
+
* @public
|
|
504
|
+
*/
|
|
505
|
+
interface InternalAccessMember {
|
|
506
|
+
unusedAccess?: never;
|
|
507
|
+
internalAccess: InternalAccessConfiguration;
|
|
484
508
|
$unknown?: never;
|
|
485
509
|
}
|
|
486
510
|
/**
|
|
@@ -488,10 +512,12 @@ export declare namespace AnalyzerConfiguration {
|
|
|
488
512
|
*/
|
|
489
513
|
interface $UnknownMember {
|
|
490
514
|
unusedAccess?: never;
|
|
515
|
+
internalAccess?: never;
|
|
491
516
|
$unknown: [string, any];
|
|
492
517
|
}
|
|
493
518
|
interface Visitor<T> {
|
|
494
519
|
unusedAccess: (value: UnusedAccessConfiguration) => T;
|
|
520
|
+
internalAccess: (value: InternalAccessConfiguration) => T;
|
|
495
521
|
_: (name: string, value: any) => T;
|
|
496
522
|
}
|
|
497
523
|
const visit: <T>(value: AnalyzerConfiguration, visitor: Visitor<T>) => T;
|
|
@@ -499,7 +525,7 @@ export declare namespace AnalyzerConfiguration {
|
|
|
499
525
|
/**
|
|
500
526
|
* @public
|
|
501
527
|
*/
|
|
502
|
-
export type Type = "ACCOUNT" | "ACCOUNT_UNUSED_ACCESS" | "ORGANIZATION" | "ORGANIZATION_UNUSED_ACCESS";
|
|
528
|
+
export type Type = "ACCOUNT" | "ACCOUNT_INTERNAL_ACCESS" | "ACCOUNT_UNUSED_ACCESS" | "ORGANIZATION" | "ORGANIZATION_INTERNAL_ACCESS" | "ORGANIZATION_UNUSED_ACCESS";
|
|
503
529
|
/**
|
|
504
530
|
* <p>Creates an analyzer.</p>
|
|
505
531
|
* @public
|
|
@@ -511,26 +537,17 @@ export interface CreateAnalyzerRequest {
|
|
|
511
537
|
*/
|
|
512
538
|
analyzerName: string | undefined;
|
|
513
539
|
/**
|
|
514
|
-
* <p>The type of analyzer to create.
|
|
515
|
-
* <code>ACCOUNT_UNUSED_ACCESS</code>, and <code>ORGANIZATION_UNUSED_ACCESS</code>
|
|
516
|
-
* analyzers are supported. You can create only one analyzer per account per Region. You can
|
|
517
|
-
* create up to 5 analyzers per organization per Region.</p>
|
|
540
|
+
* <p>The type of analyzer to create. You can create only one analyzer per account per Region. You can create up to 5 analyzers per organization per Region.</p>
|
|
518
541
|
* @public
|
|
519
542
|
*/
|
|
520
543
|
type: Type | undefined;
|
|
521
544
|
/**
|
|
522
|
-
* <p>Specifies the archive rules to add for the analyzer. Archive rules automatically archive
|
|
523
|
-
* findings that meet the criteria you define for the rule.</p>
|
|
545
|
+
* <p>Specifies the archive rules to add for the analyzer. Archive rules automatically archive findings that meet the criteria you define for the rule.</p>
|
|
524
546
|
* @public
|
|
525
547
|
*/
|
|
526
548
|
archiveRules?: InlineArchiveRule[] | undefined;
|
|
527
549
|
/**
|
|
528
|
-
* <p>An array of key-value pairs to apply to the analyzer. You can use the set of Unicode
|
|
529
|
-
* letters, digits, whitespace, <code>_</code>, <code>.</code>, <code>/</code>,
|
|
530
|
-
* <code>=</code>, <code>+</code>, and <code>-</code>.</p>
|
|
531
|
-
* <p>For the tag key, you can specify a value that is 1 to 128 characters in length and
|
|
532
|
-
* cannot be prefixed with <code>aws:</code>.</p>
|
|
533
|
-
* <p>For the tag value, you can specify a value that is 0 to 256 characters in length.</p>
|
|
550
|
+
* <p>An array of key-value pairs to apply to the analyzer. You can use the set of Unicode letters, digits, whitespace, <code>_</code>, <code>.</code>, <code>/</code>, <code>=</code>, <code>+</code>, and <code>-</code>.</p> <p>For the tag key, you can specify a value that is 1 to 128 characters in length and cannot be prefixed with <code>aws:</code>.</p> <p>For the tag value, you can specify a value that is 0 to 256 characters in length.</p>
|
|
534
551
|
* @public
|
|
535
552
|
*/
|
|
536
553
|
tags?: Record<string, string> | undefined;
|
|
@@ -540,8 +557,7 @@ export interface CreateAnalyzerRequest {
|
|
|
540
557
|
*/
|
|
541
558
|
clientToken?: string | undefined;
|
|
542
559
|
/**
|
|
543
|
-
* <p>Specifies the configuration of the analyzer. If the analyzer is an unused access
|
|
544
|
-
* analyzer, the specified scope of unused access is used for the configuration.</p>
|
|
560
|
+
* <p>Specifies the configuration of the analyzer. If the analyzer is an unused access analyzer, the specified scope of unused access is used for the configuration. If the analyzer is an internal access analyzer, the specified internal access analysis rules are used for the configuration.</p>
|
|
545
561
|
* @public
|
|
546
562
|
*/
|
|
547
563
|
configuration?: AnalyzerConfiguration | undefined;
|
|
@@ -593,10 +609,7 @@ export type AnalyzerStatus = "ACTIVE" | "CREATING" | "DISABLED" | "FAILED";
|
|
|
593
609
|
*/
|
|
594
610
|
export type ReasonCode = "AWS_SERVICE_ACCESS_DISABLED" | "DELEGATED_ADMINISTRATOR_DEREGISTERED" | "ORGANIZATION_DELETED" | "SERVICE_LINKED_ROLE_CREATION_FAILED";
|
|
595
611
|
/**
|
|
596
|
-
* <p>Provides more details about the current status of the analyzer. For example, if the
|
|
597
|
-
* creation for the analyzer fails, a <code>Failed</code> status is returned. For an analyzer
|
|
598
|
-
* with organization as the type, this failure can be due to an issue with creating the
|
|
599
|
-
* service-linked roles required in the member accounts of the Amazon Web Services organization.</p>
|
|
612
|
+
* <p>Provides more details about the current status of the analyzer. For example, if the creation for the analyzer fails, a <code>Failed</code> status is returned. For an analyzer with organization as the type, this failure can be due to an issue with creating the service-linked roles required in the member accounts of the Amazon Web Services organization.</p>
|
|
600
613
|
* @public
|
|
601
614
|
*/
|
|
602
615
|
export interface StatusReason {
|
|
@@ -622,8 +635,7 @@ export interface AnalyzerSummary {
|
|
|
622
635
|
*/
|
|
623
636
|
name: string | undefined;
|
|
624
637
|
/**
|
|
625
|
-
* <p>The type of analyzer, which corresponds to the zone of trust chosen for the
|
|
626
|
-
* analyzer.</p>
|
|
638
|
+
* <p>The type of analyzer, which corresponds to the zone of trust chosen for the analyzer.</p>
|
|
627
639
|
* @public
|
|
628
640
|
*/
|
|
629
641
|
type: Type | undefined;
|
|
@@ -648,26 +660,17 @@ export interface AnalyzerSummary {
|
|
|
648
660
|
*/
|
|
649
661
|
tags?: Record<string, string> | undefined;
|
|
650
662
|
/**
|
|
651
|
-
* <p>The status of the analyzer. An <code>Active</code> analyzer successfully monitors
|
|
652
|
-
* supported resources and generates new findings. The analyzer is <code>Disabled</code> when
|
|
653
|
-
* a user action, such as removing trusted access for Identity and Access Management Access Analyzer from Organizations, causes
|
|
654
|
-
* the analyzer to stop generating new findings. The status is <code>Creating</code> when the
|
|
655
|
-
* analyzer creation is in progress and <code>Failed</code> when the analyzer creation has
|
|
656
|
-
* failed. </p>
|
|
663
|
+
* <p>The status of the analyzer. An <code>Active</code> analyzer successfully monitors supported resources and generates new findings. The analyzer is <code>Disabled</code> when a user action, such as removing trusted access for Identity and Access Management Access Analyzer from Organizations, causes the analyzer to stop generating new findings. The status is <code>Creating</code> when the analyzer creation is in progress and <code>Failed</code> when the analyzer creation has failed. </p>
|
|
657
664
|
* @public
|
|
658
665
|
*/
|
|
659
666
|
status: AnalyzerStatus | undefined;
|
|
660
667
|
/**
|
|
661
|
-
* <p>The <code>statusReason</code> provides more details about the current status of the
|
|
662
|
-
* analyzer. For example, if the creation for the analyzer fails, a <code>Failed</code> status
|
|
663
|
-
* is returned. For an analyzer with organization as the type, this failure can be due to an
|
|
664
|
-
* issue with creating the service-linked roles required in the member accounts of the Amazon Web Services
|
|
665
|
-
* organization.</p>
|
|
668
|
+
* <p>The <code>statusReason</code> provides more details about the current status of the analyzer. For example, if the creation for the analyzer fails, a <code>Failed</code> status is returned. For an analyzer with organization as the type, this failure can be due to an issue with creating the service-linked roles required in the member accounts of the Amazon Web Services organization.</p>
|
|
666
669
|
* @public
|
|
667
670
|
*/
|
|
668
671
|
statusReason?: StatusReason | undefined;
|
|
669
672
|
/**
|
|
670
|
-
* <p>Specifies
|
|
673
|
+
* <p>Specifies if the analyzer is an external access, unused access, or internal access analyzer.</p>
|
|
671
674
|
* @public
|
|
672
675
|
*/
|
|
673
676
|
configuration?: AnalyzerConfiguration | undefined;
|
|
@@ -678,8 +681,7 @@ export interface AnalyzerSummary {
|
|
|
678
681
|
*/
|
|
679
682
|
export interface GetAnalyzerResponse {
|
|
680
683
|
/**
|
|
681
|
-
* <p>An <code>AnalyzerSummary</code> object that contains information about the
|
|
682
|
-
* analyzer.</p>
|
|
684
|
+
* <p>An <code>AnalyzerSummary</code> object that contains information about the analyzer.</p>
|
|
683
685
|
* @public
|
|
684
686
|
*/
|
|
685
687
|
analyzer: AnalyzerSummary | undefined;
|
|
@@ -731,8 +733,7 @@ export interface UpdateAnalyzerRequest {
|
|
|
731
733
|
*/
|
|
732
734
|
analyzerName: string | undefined;
|
|
733
735
|
/**
|
|
734
|
-
* <p>Contains information about the configuration of an analyzer for an Amazon Web Services organization or
|
|
735
|
-
* account.</p>
|
|
736
|
+
* <p>Contains information about the configuration of an analyzer for an Amazon Web Services organization or account.</p>
|
|
736
737
|
* @public
|
|
737
738
|
*/
|
|
738
739
|
configuration?: AnalyzerConfiguration | undefined;
|
|
@@ -742,8 +743,7 @@ export interface UpdateAnalyzerRequest {
|
|
|
742
743
|
*/
|
|
743
744
|
export interface UpdateAnalyzerResponse {
|
|
744
745
|
/**
|
|
745
|
-
* <p>Contains information about the configuration of an analyzer for an Amazon Web Services organization or
|
|
746
|
-
* account.</p>
|
|
746
|
+
* <p>Contains information about the configuration of an analyzer for an Amazon Web Services organization or account.</p>
|
|
747
747
|
* @public
|
|
748
748
|
*/
|
|
749
749
|
configuration?: AnalyzerConfiguration | undefined;
|
|
@@ -774,10 +774,7 @@ export interface ApplyArchiveRuleRequest {
|
|
|
774
774
|
*/
|
|
775
775
|
export interface CancelPolicyGenerationRequest {
|
|
776
776
|
/**
|
|
777
|
-
* <p>The <code>JobId</code> that is returned by the <code>StartPolicyGeneration</code>
|
|
778
|
-
* operation. The <code>JobId</code> can be used with <code>GetGeneratedPolicy</code> to
|
|
779
|
-
* retrieve the generated policies or used with <code>CancelPolicyGeneration</code> to cancel
|
|
780
|
-
* the policy generation request.</p>
|
|
777
|
+
* <p>The <code>JobId</code> that is returned by the <code>StartPolicyGeneration</code> operation. The <code>JobId</code> can be used with <code>GetGeneratedPolicy</code> to retrieve the generated policies or used with <code>CancelPolicyGeneration</code> to cancel the policy generation request.</p>
|
|
781
778
|
* @public
|
|
782
779
|
*/
|
|
783
780
|
jobId: string | undefined;
|
|
@@ -809,20 +806,12 @@ export interface CheckAccessNotGrantedRequest {
|
|
|
809
806
|
*/
|
|
810
807
|
policyDocument: string | undefined;
|
|
811
808
|
/**
|
|
812
|
-
* <p>An access object containing the permissions that shouldn't be granted by the specified
|
|
813
|
-
* policy. If only actions are specified, IAM Access Analyzer checks for access to peform at least
|
|
814
|
-
* one of the actions on any resource in the policy. If only resources are specified, then
|
|
815
|
-
* IAM Access Analyzer checks for access to perform any action on at least one of the resources. If
|
|
816
|
-
* both actions and resources are specified, IAM Access Analyzer checks for access to perform at
|
|
817
|
-
* least one of the specified actions on at least one of the specified resources.</p>
|
|
809
|
+
* <p>An access object containing the permissions that shouldn't be granted by the specified policy. If only actions are specified, IAM Access Analyzer checks for access to peform at least one of the actions on any resource in the policy. If only resources are specified, then IAM Access Analyzer checks for access to perform any action on at least one of the resources. If both actions and resources are specified, IAM Access Analyzer checks for access to perform at least one of the specified actions on at least one of the specified resources.</p>
|
|
818
810
|
* @public
|
|
819
811
|
*/
|
|
820
812
|
access: Access[] | undefined;
|
|
821
813
|
/**
|
|
822
|
-
* <p>The type of policy. Identity policies grant permissions to IAM principals. Identity
|
|
823
|
-
* policies include managed and inline policies for IAM roles, users, and groups.</p>
|
|
824
|
-
* <p>Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust
|
|
825
|
-
* policies for IAM roles and bucket policies for Amazon S3 buckets.</p>
|
|
814
|
+
* <p>The type of policy. Identity policies grant permissions to IAM principals. Identity policies include managed and inline policies for IAM roles, users, and groups.</p> <p>Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust policies for IAM roles and bucket policies for Amazon S3 buckets.</p>
|
|
826
815
|
* @public
|
|
827
816
|
*/
|
|
828
817
|
policyType: AccessCheckPolicyType | undefined;
|
|
@@ -865,10 +854,7 @@ export type CheckAccessNotGrantedResult = (typeof CheckAccessNotGrantedResult)[k
|
|
|
865
854
|
*/
|
|
866
855
|
export interface CheckAccessNotGrantedResponse {
|
|
867
856
|
/**
|
|
868
|
-
* <p>The result of the check for whether the access is allowed. If the result is
|
|
869
|
-
* <code>PASS</code>, the specified policy doesn't allow any of the specified permissions
|
|
870
|
-
* in the access object. If the result is <code>FAIL</code>, the specified policy might allow
|
|
871
|
-
* some or all of the permissions in the access object.</p>
|
|
857
|
+
* <p>The result of the check for whether the access is allowed. If the result is <code>PASS</code>, the specified policy doesn't allow any of the specified permissions in the access object. If the result is <code>FAIL</code>, the specified policy might allow some or all of the permissions in the access object.</p>
|
|
872
858
|
* @public
|
|
873
859
|
*/
|
|
874
860
|
result?: CheckAccessNotGrantedResult | undefined;
|
|
@@ -923,13 +909,7 @@ export interface CheckNoNewAccessRequest {
|
|
|
923
909
|
*/
|
|
924
910
|
existingPolicyDocument: string | undefined;
|
|
925
911
|
/**
|
|
926
|
-
* <p>The type of policy to compare. Identity policies grant permissions to IAM principals.
|
|
927
|
-
* Identity policies include managed and inline policies for IAM roles, users, and
|
|
928
|
-
* groups.</p>
|
|
929
|
-
* <p>Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust
|
|
930
|
-
* policies for IAM roles and bucket policies for Amazon S3 buckets. You can provide a generic
|
|
931
|
-
* input such as identity policy or resource policy or a specific input such as managed policy
|
|
932
|
-
* or Amazon S3 bucket policy.</p>
|
|
912
|
+
* <p>The type of policy to compare. Identity policies grant permissions to IAM principals. Identity policies include managed and inline policies for IAM roles, users, and groups.</p> <p>Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust policies for IAM roles and bucket policies for Amazon S3 buckets. You can provide a generic input such as identity policy or resource policy or a specific input such as managed policy or Amazon S3 bucket policy.</p>
|
|
933
913
|
* @public
|
|
934
914
|
*/
|
|
935
915
|
policyType: AccessCheckPolicyType | undefined;
|
|
@@ -951,9 +931,7 @@ export type CheckNoNewAccessResult = (typeof CheckNoNewAccessResult)[keyof typeo
|
|
|
951
931
|
*/
|
|
952
932
|
export interface CheckNoNewAccessResponse {
|
|
953
933
|
/**
|
|
954
|
-
* <p>The result of the check for new access. If the result is <code>PASS</code>, no new
|
|
955
|
-
* access is allowed by the updated policy. If the result is <code>FAIL</code>, the updated
|
|
956
|
-
* policy might allow new access.</p>
|
|
934
|
+
* <p>The result of the check for new access. If the result is <code>PASS</code>, no new access is allowed by the updated policy. If the result is <code>FAIL</code>, the updated policy might allow new access.</p>
|
|
957
935
|
* @public
|
|
958
936
|
*/
|
|
959
937
|
result?: CheckNoNewAccessResult | undefined;
|
|
@@ -1014,11 +992,7 @@ export interface CheckNoPublicAccessRequest {
|
|
|
1014
992
|
*/
|
|
1015
993
|
policyDocument: string | undefined;
|
|
1016
994
|
/**
|
|
1017
|
-
* <p>The type of resource to evaluate for public access. For example, to check for public
|
|
1018
|
-
* access to Amazon S3 buckets, you can choose <code>AWS::S3::Bucket</code> for the resource
|
|
1019
|
-
* type.</p>
|
|
1020
|
-
* <p>For resource types not supported as valid values, IAM Access Analyzer will return an
|
|
1021
|
-
* error.</p>
|
|
995
|
+
* <p>The type of resource to evaluate for public access. For example, to check for public access to Amazon S3 buckets, you can choose <code>AWS::S3::Bucket</code> for the resource type.</p> <p>For resource types not supported as valid values, IAM Access Analyzer will return an error.</p>
|
|
1022
996
|
* @public
|
|
1023
997
|
*/
|
|
1024
998
|
resourceType: AccessCheckResourceType | undefined;
|
|
@@ -1040,45 +1014,23 @@ export type CheckNoPublicAccessResult = (typeof CheckNoPublicAccessResult)[keyof
|
|
|
1040
1014
|
*/
|
|
1041
1015
|
export interface CheckNoPublicAccessResponse {
|
|
1042
1016
|
/**
|
|
1043
|
-
* <p>The result of the check for public access to the specified resource type. If the result
|
|
1044
|
-
* is <code>PASS</code>, the policy doesn't allow public access to the specified resource
|
|
1045
|
-
* type. If the result is <code>FAIL</code>, the policy might allow public access to the
|
|
1046
|
-
* specified resource type.</p>
|
|
1017
|
+
* <p>The result of the check for public access to the specified resource type. If the result is <code>PASS</code>, the policy doesn't allow public access to the specified resource type. If the result is <code>FAIL</code>, the policy might allow public access to the specified resource type.</p>
|
|
1047
1018
|
* @public
|
|
1048
1019
|
*/
|
|
1049
1020
|
result?: CheckNoPublicAccessResult | undefined;
|
|
1050
1021
|
/**
|
|
1051
|
-
* <p>The message indicating whether the specified policy allows public access to
|
|
1052
|
-
* resources.</p>
|
|
1022
|
+
* <p>The message indicating whether the specified policy allows public access to resources.</p>
|
|
1053
1023
|
* @public
|
|
1054
1024
|
*/
|
|
1055
1025
|
message?: string | undefined;
|
|
1056
1026
|
/**
|
|
1057
|
-
* <p>A list of reasons why the specified resource policy grants public access for the
|
|
1058
|
-
* resource type.</p>
|
|
1027
|
+
* <p>A list of reasons why the specified resource policy grants public access for the resource type.</p>
|
|
1059
1028
|
* @public
|
|
1060
1029
|
*/
|
|
1061
1030
|
reasons?: ReasonSummary[] | undefined;
|
|
1062
1031
|
}
|
|
1063
1032
|
/**
|
|
1064
|
-
* <p>The proposed access control configuration for a DynamoDB stream. You can propose a
|
|
1065
|
-
* configuration for a new DynamoDB stream or an existing DynamoDB stream that you own by specifying
|
|
1066
|
-
* the policy for the DynamoDB stream. For more information, see <a href="https://docs.aws.amazon.com/amazondynamodb/latest/APIReference/API_PutResourcePolicy.html">PutResourcePolicy</a>.</p>
|
|
1067
|
-
* <ul>
|
|
1068
|
-
* <li>
|
|
1069
|
-
* <p>If the configuration is for an existing DynamoDB stream and you do not specify the
|
|
1070
|
-
* DynamoDB policy, then the access preview uses the existing DynamoDB policy for the
|
|
1071
|
-
* stream.</p>
|
|
1072
|
-
* </li>
|
|
1073
|
-
* <li>
|
|
1074
|
-
* <p>If the access preview is for a new resource and you do not specify the policy,
|
|
1075
|
-
* then the access preview assumes a DynamoDB stream without a policy.</p>
|
|
1076
|
-
* </li>
|
|
1077
|
-
* <li>
|
|
1078
|
-
* <p>To propose deletion of an existing DynamoDB stream policy, you can specify an empty
|
|
1079
|
-
* string for the DynamoDB policy.</p>
|
|
1080
|
-
* </li>
|
|
1081
|
-
* </ul>
|
|
1033
|
+
* <p>The proposed access control configuration for a DynamoDB stream. You can propose a configuration for a new DynamoDB stream or an existing DynamoDB stream that you own by specifying the policy for the DynamoDB stream. For more information, see <a href="https://docs.aws.amazon.com/amazondynamodb/latest/APIReference/API_PutResourcePolicy.html">PutResourcePolicy</a>.</p> <ul> <li> <p>If the configuration is for an existing DynamoDB stream and you do not specify the DynamoDB policy, then the access preview uses the existing DynamoDB policy for the stream.</p> </li> <li> <p>If the access preview is for a new resource and you do not specify the policy, then the access preview assumes a DynamoDB stream without a policy.</p> </li> <li> <p>To propose deletion of an existing DynamoDB stream policy, you can specify an empty string for the DynamoDB policy.</p> </li> </ul>
|
|
1082
1034
|
* @public
|
|
1083
1035
|
*/
|
|
1084
1036
|
export interface DynamodbStreamConfiguration {
|
|
@@ -1089,24 +1041,7 @@ export interface DynamodbStreamConfiguration {
|
|
|
1089
1041
|
streamPolicy?: string | undefined;
|
|
1090
1042
|
}
|
|
1091
1043
|
/**
|
|
1092
|
-
* <p>The proposed access control configuration for a DynamoDB table or index. You can propose a
|
|
1093
|
-
* configuration for a new DynamoDB table or index or an existing DynamoDB table or index that you
|
|
1094
|
-
* own by specifying the policy for the DynamoDB table or index. For more information, see <a href="https://docs.aws.amazon.com/amazondynamodb/latest/APIReference/API_PutResourcePolicy.html">PutResourcePolicy</a>.</p>
|
|
1095
|
-
* <ul>
|
|
1096
|
-
* <li>
|
|
1097
|
-
* <p>If the configuration is for an existing DynamoDB table or index and you do not
|
|
1098
|
-
* specify the DynamoDB policy, then the access preview uses the existing DynamoDB policy for
|
|
1099
|
-
* the table or index.</p>
|
|
1100
|
-
* </li>
|
|
1101
|
-
* <li>
|
|
1102
|
-
* <p>If the access preview is for a new resource and you do not specify the policy,
|
|
1103
|
-
* then the access preview assumes a DynamoDB table without a policy.</p>
|
|
1104
|
-
* </li>
|
|
1105
|
-
* <li>
|
|
1106
|
-
* <p>To propose deletion of an existing DynamoDB table or index policy, you can specify an
|
|
1107
|
-
* empty string for the DynamoDB policy.</p>
|
|
1108
|
-
* </li>
|
|
1109
|
-
* </ul>
|
|
1044
|
+
* <p>The proposed access control configuration for a DynamoDB table or index. You can propose a configuration for a new DynamoDB table or index or an existing DynamoDB table or index that you own by specifying the policy for the DynamoDB table or index. For more information, see <a href="https://docs.aws.amazon.com/amazondynamodb/latest/APIReference/API_PutResourcePolicy.html">PutResourcePolicy</a>.</p> <ul> <li> <p>If the configuration is for an existing DynamoDB table or index and you do not specify the DynamoDB policy, then the access preview uses the existing DynamoDB policy for the table or index.</p> </li> <li> <p>If the access preview is for a new resource and you do not specify the policy, then the access preview assumes a DynamoDB table without a policy.</p> </li> <li> <p>To propose deletion of an existing DynamoDB table or index policy, you can specify an empty string for the DynamoDB policy.</p> </li> </ul>
|
|
1110
1045
|
* @public
|
|
1111
1046
|
*/
|
|
1112
1047
|
export interface DynamodbTableConfiguration {
|
|
@@ -1117,143 +1052,50 @@ export interface DynamodbTableConfiguration {
|
|
|
1117
1052
|
tablePolicy?: string | undefined;
|
|
1118
1053
|
}
|
|
1119
1054
|
/**
|
|
1120
|
-
* <p>The proposed access control configuration for an Amazon EBS volume snapshot. You can propose
|
|
1121
|
-
* a configuration for a new Amazon EBS volume snapshot or an Amazon EBS volume snapshot that you own by
|
|
1122
|
-
* specifying the user IDs, groups, and optional KMS encryption key. For more information,
|
|
1123
|
-
* see <a href="https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_ModifySnapshotAttribute.html">ModifySnapshotAttribute</a>.</p>
|
|
1055
|
+
* <p>The proposed access control configuration for an Amazon EBS volume snapshot. You can propose a configuration for a new Amazon EBS volume snapshot or an Amazon EBS volume snapshot that you own by specifying the user IDs, groups, and optional KMS encryption key. For more information, see <a href="https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_ModifySnapshotAttribute.html">ModifySnapshotAttribute</a>.</p>
|
|
1124
1056
|
* @public
|
|
1125
1057
|
*/
|
|
1126
1058
|
export interface EbsSnapshotConfiguration {
|
|
1127
1059
|
/**
|
|
1128
|
-
* <p>The IDs of the Amazon Web Services accounts that have access to the Amazon EBS volume snapshot.</p>
|
|
1129
|
-
* <ul>
|
|
1130
|
-
* <li>
|
|
1131
|
-
* <p>If the configuration is for an existing Amazon EBS volume snapshot and you do not
|
|
1132
|
-
* specify the <code>userIds</code>, then the access preview uses the existing shared
|
|
1133
|
-
* <code>userIds</code> for the snapshot.</p>
|
|
1134
|
-
* </li>
|
|
1135
|
-
* <li>
|
|
1136
|
-
* <p>If the access preview is for a new resource and you do not specify the
|
|
1137
|
-
* <code>userIds</code>, then the access preview considers the snapshot without any
|
|
1138
|
-
* <code>userIds</code>.</p>
|
|
1139
|
-
* </li>
|
|
1140
|
-
* <li>
|
|
1141
|
-
* <p>To propose deletion of existing shared <code>accountIds</code>, you can specify an
|
|
1142
|
-
* empty list for <code>userIds</code>.</p>
|
|
1143
|
-
* </li>
|
|
1144
|
-
* </ul>
|
|
1060
|
+
* <p>The IDs of the Amazon Web Services accounts that have access to the Amazon EBS volume snapshot.</p> <ul> <li> <p>If the configuration is for an existing Amazon EBS volume snapshot and you do not specify the <code>userIds</code>, then the access preview uses the existing shared <code>userIds</code> for the snapshot.</p> </li> <li> <p>If the access preview is for a new resource and you do not specify the <code>userIds</code>, then the access preview considers the snapshot without any <code>userIds</code>.</p> </li> <li> <p>To propose deletion of existing shared <code>accountIds</code>, you can specify an empty list for <code>userIds</code>.</p> </li> </ul>
|
|
1145
1061
|
* @public
|
|
1146
1062
|
*/
|
|
1147
1063
|
userIds?: string[] | undefined;
|
|
1148
1064
|
/**
|
|
1149
|
-
* <p>The groups that have access to the Amazon EBS volume snapshot. If the value <code>all</code>
|
|
1150
|
-
* is specified, then the Amazon EBS volume snapshot is public.</p>
|
|
1151
|
-
* <ul>
|
|
1152
|
-
* <li>
|
|
1153
|
-
* <p>If the configuration is for an existing Amazon EBS volume snapshot and you do not
|
|
1154
|
-
* specify the <code>groups</code>, then the access preview uses the existing shared
|
|
1155
|
-
* <code>groups</code> for the snapshot.</p>
|
|
1156
|
-
* </li>
|
|
1157
|
-
* <li>
|
|
1158
|
-
* <p>If the access preview is for a new resource and you do not specify the
|
|
1159
|
-
* <code>groups</code>, then the access preview considers the snapshot without any
|
|
1160
|
-
* <code>groups</code>.</p>
|
|
1161
|
-
* </li>
|
|
1162
|
-
* <li>
|
|
1163
|
-
* <p>To propose deletion of existing shared <code>groups</code>, you can specify an
|
|
1164
|
-
* empty list for <code>groups</code>.</p>
|
|
1165
|
-
* </li>
|
|
1166
|
-
* </ul>
|
|
1065
|
+
* <p>The groups that have access to the Amazon EBS volume snapshot. If the value <code>all</code> is specified, then the Amazon EBS volume snapshot is public.</p> <ul> <li> <p>If the configuration is for an existing Amazon EBS volume snapshot and you do not specify the <code>groups</code>, then the access preview uses the existing shared <code>groups</code> for the snapshot.</p> </li> <li> <p>If the access preview is for a new resource and you do not specify the <code>groups</code>, then the access preview considers the snapshot without any <code>groups</code>.</p> </li> <li> <p>To propose deletion of existing shared <code>groups</code>, you can specify an empty list for <code>groups</code>.</p> </li> </ul>
|
|
1167
1066
|
* @public
|
|
1168
1067
|
*/
|
|
1169
1068
|
groups?: string[] | undefined;
|
|
1170
1069
|
/**
|
|
1171
|
-
* <p>The KMS key identifier for an encrypted Amazon EBS volume snapshot. The KMS key
|
|
1172
|
-
* identifier is the key ARN, key ID, alias ARN, or alias name for the KMS key.</p>
|
|
1173
|
-
* <ul>
|
|
1174
|
-
* <li>
|
|
1175
|
-
* <p>If the configuration is for an existing Amazon EBS volume snapshot and you do not
|
|
1176
|
-
* specify the <code>kmsKeyId</code>, or you specify an empty string, then the access
|
|
1177
|
-
* preview uses the existing <code>kmsKeyId</code> of the snapshot.</p>
|
|
1178
|
-
* </li>
|
|
1179
|
-
* <li>
|
|
1180
|
-
* <p>If the access preview is for a new resource and you do not specify the
|
|
1181
|
-
* <code>kmsKeyId</code>, the access preview considers the snapshot as
|
|
1182
|
-
* unencrypted.</p>
|
|
1183
|
-
* </li>
|
|
1184
|
-
* </ul>
|
|
1070
|
+
* <p>The KMS key identifier for an encrypted Amazon EBS volume snapshot. The KMS key identifier is the key ARN, key ID, alias ARN, or alias name for the KMS key.</p> <ul> <li> <p>If the configuration is for an existing Amazon EBS volume snapshot and you do not specify the <code>kmsKeyId</code>, or you specify an empty string, then the access preview uses the existing <code>kmsKeyId</code> of the snapshot.</p> </li> <li> <p>If the access preview is for a new resource and you do not specify the <code>kmsKeyId</code>, the access preview considers the snapshot as unencrypted.</p> </li> </ul>
|
|
1185
1071
|
* @public
|
|
1186
1072
|
*/
|
|
1187
1073
|
kmsKeyId?: string | undefined;
|
|
1188
1074
|
}
|
|
1189
1075
|
/**
|
|
1190
|
-
* <p>The proposed access control configuration for an Amazon ECR repository. You can propose a
|
|
1191
|
-
* configuration for a new Amazon ECR repository or an existing Amazon ECR repository that you own by
|
|
1192
|
-
* specifying the Amazon ECR policy. For more information, see <a href="https://docs.aws.amazon.com/AmazonECR/latest/APIReference/API_Repository.html">Repository</a>.</p>
|
|
1193
|
-
* <ul>
|
|
1194
|
-
* <li>
|
|
1195
|
-
* <p>If the configuration is for an existing Amazon ECR repository and you do not specify
|
|
1196
|
-
* the Amazon ECR policy, then the access preview uses the existing Amazon ECR policy for the
|
|
1197
|
-
* repository.</p>
|
|
1198
|
-
* </li>
|
|
1199
|
-
* <li>
|
|
1200
|
-
* <p>If the access preview is for a new resource and you do not specify the policy,
|
|
1201
|
-
* then the access preview assumes an Amazon ECR repository without a policy.</p>
|
|
1202
|
-
* </li>
|
|
1203
|
-
* <li>
|
|
1204
|
-
* <p>To propose deletion of an existing Amazon ECR repository policy, you can specify an
|
|
1205
|
-
* empty string for the Amazon ECR policy.</p>
|
|
1206
|
-
* </li>
|
|
1207
|
-
* </ul>
|
|
1076
|
+
* <p>The proposed access control configuration for an Amazon ECR repository. You can propose a configuration for a new Amazon ECR repository or an existing Amazon ECR repository that you own by specifying the Amazon ECR policy. For more information, see <a href="https://docs.aws.amazon.com/AmazonECR/latest/APIReference/API_Repository.html">Repository</a>.</p> <ul> <li> <p>If the configuration is for an existing Amazon ECR repository and you do not specify the Amazon ECR policy, then the access preview uses the existing Amazon ECR policy for the repository.</p> </li> <li> <p>If the access preview is for a new resource and you do not specify the policy, then the access preview assumes an Amazon ECR repository without a policy.</p> </li> <li> <p>To propose deletion of an existing Amazon ECR repository policy, you can specify an empty string for the Amazon ECR policy.</p> </li> </ul>
|
|
1208
1077
|
* @public
|
|
1209
1078
|
*/
|
|
1210
1079
|
export interface EcrRepositoryConfiguration {
|
|
1211
1080
|
/**
|
|
1212
|
-
* <p>The JSON repository policy text to apply to the Amazon ECR repository. For more information,
|
|
1213
|
-
* see <a href="https://docs.aws.amazon.com/AmazonECR/latest/userguide/repository-policy-examples.html">Private repository
|
|
1214
|
-
* policy examples</a> in the <i>Amazon ECR User Guide</i>.</p>
|
|
1081
|
+
* <p>The JSON repository policy text to apply to the Amazon ECR repository. For more information, see <a href="https://docs.aws.amazon.com/AmazonECR/latest/userguide/repository-policy-examples.html">Private repository policy examples</a> in the <i>Amazon ECR User Guide</i>.</p>
|
|
1215
1082
|
* @public
|
|
1216
1083
|
*/
|
|
1217
1084
|
repositoryPolicy?: string | undefined;
|
|
1218
1085
|
}
|
|
1219
1086
|
/**
|
|
1220
|
-
* <p>The proposed access control configuration for an Amazon EFS file system. You can propose a
|
|
1221
|
-
* configuration for a new Amazon EFS file system or an existing Amazon EFS file system that you own by
|
|
1222
|
-
* specifying the Amazon EFS policy. For more information, see <a href="https://docs.aws.amazon.com/efs/latest/ug/using-fs.html">Using file systems in Amazon EFS</a>.</p>
|
|
1223
|
-
* <ul>
|
|
1224
|
-
* <li>
|
|
1225
|
-
* <p>If the configuration is for an existing Amazon EFS file system and you do not specify
|
|
1226
|
-
* the Amazon EFS policy, then the access preview uses the existing Amazon EFS policy for the file
|
|
1227
|
-
* system.</p>
|
|
1228
|
-
* </li>
|
|
1229
|
-
* <li>
|
|
1230
|
-
* <p>If the access preview is for a new resource and you do not specify the policy,
|
|
1231
|
-
* then the access preview assumes an Amazon EFS file system without a policy.</p>
|
|
1232
|
-
* </li>
|
|
1233
|
-
* <li>
|
|
1234
|
-
* <p>To propose deletion of an existing Amazon EFS file system policy, you can specify an
|
|
1235
|
-
* empty string for the Amazon EFS policy.</p>
|
|
1236
|
-
* </li>
|
|
1237
|
-
* </ul>
|
|
1087
|
+
* <p>The proposed access control configuration for an Amazon EFS file system. You can propose a configuration for a new Amazon EFS file system or an existing Amazon EFS file system that you own by specifying the Amazon EFS policy. For more information, see <a href="https://docs.aws.amazon.com/efs/latest/ug/using-fs.html">Using file systems in Amazon EFS</a>.</p> <ul> <li> <p>If the configuration is for an existing Amazon EFS file system and you do not specify the Amazon EFS policy, then the access preview uses the existing Amazon EFS policy for the file system.</p> </li> <li> <p>If the access preview is for a new resource and you do not specify the policy, then the access preview assumes an Amazon EFS file system without a policy.</p> </li> <li> <p>To propose deletion of an existing Amazon EFS file system policy, you can specify an empty string for the Amazon EFS policy.</p> </li> </ul>
|
|
1238
1088
|
* @public
|
|
1239
1089
|
*/
|
|
1240
1090
|
export interface EfsFileSystemConfiguration {
|
|
1241
1091
|
/**
|
|
1242
|
-
* <p>The JSON policy definition to apply to the Amazon EFS file system. For more information on
|
|
1243
|
-
* the elements that make up a file system policy, see <a href="https://docs.aws.amazon.com/efs/latest/ug/access-control-overview.html#access-control-manage-access-intro-resource-policies">Amazon EFS Resource-based policies</a>.</p>
|
|
1092
|
+
* <p>The JSON policy definition to apply to the Amazon EFS file system. For more information on the elements that make up a file system policy, see <a href="https://docs.aws.amazon.com/efs/latest/ug/access-control-overview.html#access-control-manage-access-intro-resource-policies">Amazon EFS Resource-based policies</a>.</p>
|
|
1244
1093
|
* @public
|
|
1245
1094
|
*/
|
|
1246
1095
|
fileSystemPolicy?: string | undefined;
|
|
1247
1096
|
}
|
|
1248
1097
|
/**
|
|
1249
|
-
* <p>The proposed access control configuration for an IAM role. You can propose a
|
|
1250
|
-
* configuration for a new IAM role or an existing IAM role that you own by specifying the
|
|
1251
|
-
* trust policy. If the configuration is for a new IAM role, you must specify the trust
|
|
1252
|
-
* policy. If the configuration is for an existing IAM role that you own and you do not
|
|
1253
|
-
* propose the trust policy, the access preview uses the existing trust policy for the role.
|
|
1254
|
-
* The proposed trust policy cannot be an empty string. For more information about role trust
|
|
1255
|
-
* policy limits, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html">IAM and STS
|
|
1256
|
-
* quotas</a>.</p>
|
|
1098
|
+
* <p>The proposed access control configuration for an IAM role. You can propose a configuration for a new IAM role or an existing IAM role that you own by specifying the trust policy. If the configuration is for a new IAM role, you must specify the trust policy. If the configuration is for an existing IAM role that you own and you do not propose the trust policy, the access preview uses the existing trust policy for the role. The proposed trust policy cannot be an empty string. For more information about role trust policy limits, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html">IAM and STS quotas</a>.</p>
|
|
1257
1099
|
* @public
|
|
1258
1100
|
*/
|
|
1259
1101
|
export interface IamRoleConfiguration {
|
|
@@ -1264,27 +1106,17 @@ export interface IamRoleConfiguration {
|
|
|
1264
1106
|
trustPolicy?: string | undefined;
|
|
1265
1107
|
}
|
|
1266
1108
|
/**
|
|
1267
|
-
* <p>Use this structure to propose allowing <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic
|
|
1268
|
-
* operations</a> in the grant only when the operation request includes the specified
|
|
1269
|
-
* <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#encrypt_context">encryption
|
|
1270
|
-
* context</a>. You can specify only one type of encryption context. An empty map is
|
|
1271
|
-
* treated as not specified. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/APIReference/API_GrantConstraints.html">GrantConstraints</a>.</p>
|
|
1109
|
+
* <p>Use this structure to propose allowing <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic operations</a> in the grant only when the operation request includes the specified <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#encrypt_context">encryption context</a>. You can specify only one type of encryption context. An empty map is treated as not specified. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/APIReference/API_GrantConstraints.html">GrantConstraints</a>.</p>
|
|
1272
1110
|
* @public
|
|
1273
1111
|
*/
|
|
1274
1112
|
export interface KmsGrantConstraints {
|
|
1275
1113
|
/**
|
|
1276
|
-
* <p>A list of key-value pairs that must match the encryption context in the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic
|
|
1277
|
-
* operation</a> request. The grant allows the operation only when the encryption
|
|
1278
|
-
* context in the request is the same as the encryption context specified in this
|
|
1279
|
-
* constraint.</p>
|
|
1114
|
+
* <p>A list of key-value pairs that must match the encryption context in the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic operation</a> request. The grant allows the operation only when the encryption context in the request is the same as the encryption context specified in this constraint.</p>
|
|
1280
1115
|
* @public
|
|
1281
1116
|
*/
|
|
1282
1117
|
encryptionContextEquals?: Record<string, string> | undefined;
|
|
1283
1118
|
/**
|
|
1284
|
-
* <p>A list of key-value pairs that must be included in the encryption context of the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic
|
|
1285
|
-
* operation</a> request. The grant allows the cryptographic operation only when the
|
|
1286
|
-
* encryption context in the request includes the key-value pairs specified in this
|
|
1287
|
-
* constraint, although it can include additional key-value pairs.</p>
|
|
1119
|
+
* <p>A list of key-value pairs that must be included in the encryption context of the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic operation</a> request. The grant allows the cryptographic operation only when the encryption context in the request includes the key-value pairs specified in this constraint, although it can include additional key-value pairs.</p>
|
|
1288
1120
|
* @public
|
|
1289
1121
|
*/
|
|
1290
1122
|
encryptionContextSubset?: Record<string, string> | undefined;
|
|
@@ -1324,8 +1156,7 @@ export interface KmsGrantConfiguration {
|
|
|
1324
1156
|
*/
|
|
1325
1157
|
operations: KmsGrantOperation[] | undefined;
|
|
1326
1158
|
/**
|
|
1327
|
-
* <p>The principal that is given permission to perform the operations that the grant
|
|
1328
|
-
* permits.</p>
|
|
1159
|
+
* <p>The principal that is given permission to perform the operations that the grant permits.</p>
|
|
1329
1160
|
* @public
|
|
1330
1161
|
*/
|
|
1331
1162
|
granteePrincipal: string | undefined;
|
|
@@ -1335,46 +1166,28 @@ export interface KmsGrantConfiguration {
|
|
|
1335
1166
|
*/
|
|
1336
1167
|
retiringPrincipal?: string | undefined;
|
|
1337
1168
|
/**
|
|
1338
|
-
* <p>Use this structure to propose allowing <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic
|
|
1339
|
-
* operations</a> in the grant only when the operation request includes the specified
|
|
1340
|
-
* <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#encrypt_context">encryption
|
|
1341
|
-
* context</a>.</p>
|
|
1169
|
+
* <p>Use this structure to propose allowing <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic operations</a> in the grant only when the operation request includes the specified <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#encrypt_context">encryption context</a>.</p>
|
|
1342
1170
|
* @public
|
|
1343
1171
|
*/
|
|
1344
1172
|
constraints?: KmsGrantConstraints | undefined;
|
|
1345
1173
|
/**
|
|
1346
|
-
* <p> The Amazon Web Services account under which the grant was issued. The account is used to propose
|
|
1347
|
-
* KMS grants issued by accounts other than the owner of the key.</p>
|
|
1174
|
+
* <p> The Amazon Web Services account under which the grant was issued. The account is used to propose KMS grants issued by accounts other than the owner of the key.</p>
|
|
1348
1175
|
* @public
|
|
1349
1176
|
*/
|
|
1350
1177
|
issuingAccount: string | undefined;
|
|
1351
1178
|
}
|
|
1352
1179
|
/**
|
|
1353
|
-
* <p>Proposed access control configuration for a KMS key. You can propose a configuration
|
|
1354
|
-
* for a new KMS key or an existing KMS key that you own by specifying the key policy and
|
|
1355
|
-
* KMS grant configuration. If the configuration is for an existing key and you do not
|
|
1356
|
-
* specify the key policy, the access preview uses the existing policy for the key. If the
|
|
1357
|
-
* access preview is for a new resource and you do not specify the key policy, then the access
|
|
1358
|
-
* preview uses the default key policy. The proposed key policy cannot be an empty string. For
|
|
1359
|
-
* more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default key
|
|
1360
|
-
* policy</a>. For more information about key policy limits, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/resource-limits.html">Resource
|
|
1361
|
-
* quotas</a>.</p>
|
|
1362
|
-
* <p/>
|
|
1180
|
+
* <p>Proposed access control configuration for a KMS key. You can propose a configuration for a new KMS key or an existing KMS key that you own by specifying the key policy and KMS grant configuration. If the configuration is for an existing key and you do not specify the key policy, the access preview uses the existing policy for the key. If the access preview is for a new resource and you do not specify the key policy, then the access preview uses the default key policy. The proposed key policy cannot be an empty string. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default key policy</a>. For more information about key policy limits, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/resource-limits.html">Resource quotas</a>.</p> <p/>
|
|
1363
1181
|
* @public
|
|
1364
1182
|
*/
|
|
1365
1183
|
export interface KmsKeyConfiguration {
|
|
1366
1184
|
/**
|
|
1367
|
-
* <p>Resource policy configuration for the KMS key. The only valid value for the name of
|
|
1368
|
-
* the key policy is <code>default</code>. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default key
|
|
1369
|
-
* policy</a>.</p>
|
|
1185
|
+
* <p>Resource policy configuration for the KMS key. The only valid value for the name of the key policy is <code>default</code>. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default key policy</a>.</p>
|
|
1370
1186
|
* @public
|
|
1371
1187
|
*/
|
|
1372
1188
|
keyPolicies?: Record<string, string> | undefined;
|
|
1373
1189
|
/**
|
|
1374
|
-
* <p>A list of proposed grant configurations for the KMS key. If the proposed grant
|
|
1375
|
-
* configuration is for an existing key, the access preview uses the proposed list of grant
|
|
1376
|
-
* configurations in place of the existing grants. Otherwise, the access preview uses the
|
|
1377
|
-
* existing grants for the key.</p>
|
|
1190
|
+
* <p>A list of proposed grant configurations for the KMS key. If the proposed grant configuration is for an existing key, the access preview uses the proposed list of grant configurations in place of the existing grants. Otherwise, the access preview uses the existing grants for the key.</p>
|
|
1378
1191
|
* @public
|
|
1379
1192
|
*/
|
|
1380
1193
|
grants?: KmsGrantConfiguration[] | undefined;
|
|
@@ -1389,27 +1202,7 @@ export type RdsDbClusterSnapshotAttributeValue = RdsDbClusterSnapshotAttributeVa
|
|
|
1389
1202
|
*/
|
|
1390
1203
|
export declare namespace RdsDbClusterSnapshotAttributeValue {
|
|
1391
1204
|
/**
|
|
1392
|
-
* <p>The Amazon Web Services account IDs that have access to the manual Amazon RDS DB cluster snapshot. If the
|
|
1393
|
-
* value <code>all</code> is specified, then the Amazon RDS DB cluster snapshot is public and can
|
|
1394
|
-
* be copied or restored by all Amazon Web Services accounts.</p>
|
|
1395
|
-
* <ul>
|
|
1396
|
-
* <li>
|
|
1397
|
-
* <p>If the configuration is for an existing Amazon RDS DB cluster snapshot and you do not
|
|
1398
|
-
* specify the <code>accountIds</code> in
|
|
1399
|
-
* <code>RdsDbClusterSnapshotAttributeValue</code>, then the access preview uses the
|
|
1400
|
-
* existing shared <code>accountIds</code> for the snapshot.</p>
|
|
1401
|
-
* </li>
|
|
1402
|
-
* <li>
|
|
1403
|
-
* <p>If the access preview is for a new resource and you do not specify the specify the
|
|
1404
|
-
* <code>accountIds</code> in <code>RdsDbClusterSnapshotAttributeValue</code>, then
|
|
1405
|
-
* the access preview considers the snapshot without any attributes.</p>
|
|
1406
|
-
* </li>
|
|
1407
|
-
* <li>
|
|
1408
|
-
* <p>To propose deletion of existing shared <code>accountIds</code>, you can specify an
|
|
1409
|
-
* empty list for <code>accountIds</code> in the
|
|
1410
|
-
* <code>RdsDbClusterSnapshotAttributeValue</code>.</p>
|
|
1411
|
-
* </li>
|
|
1412
|
-
* </ul>
|
|
1205
|
+
* <p>The Amazon Web Services account IDs that have access to the manual Amazon RDS DB cluster snapshot. If the value <code>all</code> is specified, then the Amazon RDS DB cluster snapshot is public and can be copied or restored by all Amazon Web Services accounts.</p> <ul> <li> <p>If the configuration is for an existing Amazon RDS DB cluster snapshot and you do not specify the <code>accountIds</code> in <code>RdsDbClusterSnapshotAttributeValue</code>, then the access preview uses the existing shared <code>accountIds</code> for the snapshot.</p> </li> <li> <p>If the access preview is for a new resource and you do not specify the specify the <code>accountIds</code> in <code>RdsDbClusterSnapshotAttributeValue</code>, then the access preview considers the snapshot without any attributes.</p> </li> <li> <p>To propose deletion of existing shared <code>accountIds</code>, you can specify an empty list for <code>accountIds</code> in the <code>RdsDbClusterSnapshotAttributeValue</code>.</p> </li> </ul>
|
|
1413
1206
|
* @public
|
|
1414
1207
|
*/
|
|
1415
1208
|
interface AccountIdsMember {
|
|
@@ -1430,45 +1223,23 @@ export declare namespace RdsDbClusterSnapshotAttributeValue {
|
|
|
1430
1223
|
const visit: <T>(value: RdsDbClusterSnapshotAttributeValue, visitor: Visitor<T>) => T;
|
|
1431
1224
|
}
|
|
1432
1225
|
/**
|
|
1433
|
-
* <p>The proposed access control configuration for an Amazon RDS DB cluster snapshot. You can
|
|
1434
|
-
* propose a configuration for a new Amazon RDS DB cluster snapshot or an Amazon RDS DB cluster snapshot
|
|
1435
|
-
* that you own by specifying the <code>RdsDbClusterSnapshotAttributeValue</code> and optional
|
|
1436
|
-
* KMS encryption key. For more information, see <a href="https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_ModifyDBClusterSnapshotAttribute.html">ModifyDBClusterSnapshotAttribute</a>.</p>
|
|
1226
|
+
* <p>The proposed access control configuration for an Amazon RDS DB cluster snapshot. You can propose a configuration for a new Amazon RDS DB cluster snapshot or an Amazon RDS DB cluster snapshot that you own by specifying the <code>RdsDbClusterSnapshotAttributeValue</code> and optional KMS encryption key. For more information, see <a href="https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_ModifyDBClusterSnapshotAttribute.html">ModifyDBClusterSnapshotAttribute</a>.</p>
|
|
1437
1227
|
* @public
|
|
1438
1228
|
*/
|
|
1439
1229
|
export interface RdsDbClusterSnapshotConfiguration {
|
|
1440
1230
|
/**
|
|
1441
|
-
* <p>The names and values of manual DB cluster snapshot attributes. Manual DB cluster
|
|
1442
|
-
* snapshot attributes are used to authorize other Amazon Web Services accounts to restore a manual DB
|
|
1443
|
-
* cluster snapshot. The only valid value for <code>AttributeName</code> for the attribute map
|
|
1444
|
-
* is <code>restore</code>
|
|
1445
|
-
* </p>
|
|
1231
|
+
* <p>The names and values of manual DB cluster snapshot attributes. Manual DB cluster snapshot attributes are used to authorize other Amazon Web Services accounts to restore a manual DB cluster snapshot. The only valid value for <code>AttributeName</code> for the attribute map is <code>restore</code> </p>
|
|
1446
1232
|
* @public
|
|
1447
1233
|
*/
|
|
1448
1234
|
attributes?: Record<string, RdsDbClusterSnapshotAttributeValue> | undefined;
|
|
1449
1235
|
/**
|
|
1450
|
-
* <p>The KMS key identifier for an encrypted Amazon RDS DB cluster snapshot. The KMS key
|
|
1451
|
-
* identifier is the key ARN, key ID, alias ARN, or alias name for the KMS key.</p>
|
|
1452
|
-
* <ul>
|
|
1453
|
-
* <li>
|
|
1454
|
-
* <p>If the configuration is for an existing Amazon RDS DB cluster snapshot and you do not
|
|
1455
|
-
* specify the <code>kmsKeyId</code>, or you specify an empty string, then the access
|
|
1456
|
-
* preview uses the existing <code>kmsKeyId</code> of the snapshot.</p>
|
|
1457
|
-
* </li>
|
|
1458
|
-
* <li>
|
|
1459
|
-
* <p>If the access preview is for a new resource and you do not specify the specify the
|
|
1460
|
-
* <code>kmsKeyId</code>, then the access preview considers the snapshot as
|
|
1461
|
-
* unencrypted.</p>
|
|
1462
|
-
* </li>
|
|
1463
|
-
* </ul>
|
|
1236
|
+
* <p>The KMS key identifier for an encrypted Amazon RDS DB cluster snapshot. The KMS key identifier is the key ARN, key ID, alias ARN, or alias name for the KMS key.</p> <ul> <li> <p>If the configuration is for an existing Amazon RDS DB cluster snapshot and you do not specify the <code>kmsKeyId</code>, or you specify an empty string, then the access preview uses the existing <code>kmsKeyId</code> of the snapshot.</p> </li> <li> <p>If the access preview is for a new resource and you do not specify the specify the <code>kmsKeyId</code>, then the access preview considers the snapshot as unencrypted.</p> </li> </ul>
|
|
1464
1237
|
* @public
|
|
1465
1238
|
*/
|
|
1466
1239
|
kmsKeyId?: string | undefined;
|
|
1467
1240
|
}
|
|
1468
1241
|
/**
|
|
1469
|
-
* <p>The name and values of a manual Amazon RDS DB snapshot attribute. Manual DB snapshot
|
|
1470
|
-
* attributes are used to authorize other Amazon Web Services accounts to restore a manual DB
|
|
1471
|
-
* snapshot.</p>
|
|
1242
|
+
* <p>The name and values of a manual Amazon RDS DB snapshot attribute. Manual DB snapshot attributes are used to authorize other Amazon Web Services accounts to restore a manual DB snapshot.</p>
|
|
1472
1243
|
* @public
|
|
1473
1244
|
*/
|
|
1474
1245
|
export type RdsDbSnapshotAttributeValue = RdsDbSnapshotAttributeValue.AccountIdsMember | RdsDbSnapshotAttributeValue.$UnknownMember;
|
|
@@ -1477,27 +1248,7 @@ export type RdsDbSnapshotAttributeValue = RdsDbSnapshotAttributeValue.AccountIds
|
|
|
1477
1248
|
*/
|
|
1478
1249
|
export declare namespace RdsDbSnapshotAttributeValue {
|
|
1479
1250
|
/**
|
|
1480
|
-
* <p>The Amazon Web Services account IDs that have access to the manual Amazon RDS DB snapshot. If the value
|
|
1481
|
-
* <code>all</code> is specified, then the Amazon RDS DB snapshot is public and can be copied or
|
|
1482
|
-
* restored by all Amazon Web Services accounts.</p>
|
|
1483
|
-
* <ul>
|
|
1484
|
-
* <li>
|
|
1485
|
-
* <p>If the configuration is for an existing Amazon RDS DB snapshot and you do not specify
|
|
1486
|
-
* the <code>accountIds</code> in <code>RdsDbSnapshotAttributeValue</code>, then the
|
|
1487
|
-
* access preview uses the existing shared <code>accountIds</code> for the
|
|
1488
|
-
* snapshot.</p>
|
|
1489
|
-
* </li>
|
|
1490
|
-
* <li>
|
|
1491
|
-
* <p>If the access preview is for a new resource and you do not specify the specify the
|
|
1492
|
-
* <code>accountIds</code> in <code>RdsDbSnapshotAttributeValue</code>, then the
|
|
1493
|
-
* access preview considers the snapshot without any attributes.</p>
|
|
1494
|
-
* </li>
|
|
1495
|
-
* <li>
|
|
1496
|
-
* <p>To propose deletion of an existing shared <code>accountIds</code>, you can specify
|
|
1497
|
-
* an empty list for <code>accountIds</code> in the
|
|
1498
|
-
* <code>RdsDbSnapshotAttributeValue</code>.</p>
|
|
1499
|
-
* </li>
|
|
1500
|
-
* </ul>
|
|
1251
|
+
* <p>The Amazon Web Services account IDs that have access to the manual Amazon RDS DB snapshot. If the value <code>all</code> is specified, then the Amazon RDS DB snapshot is public and can be copied or restored by all Amazon Web Services accounts.</p> <ul> <li> <p>If the configuration is for an existing Amazon RDS DB snapshot and you do not specify the <code>accountIds</code> in <code>RdsDbSnapshotAttributeValue</code>, then the access preview uses the existing shared <code>accountIds</code> for the snapshot.</p> </li> <li> <p>If the access preview is for a new resource and you do not specify the specify the <code>accountIds</code> in <code>RdsDbSnapshotAttributeValue</code>, then the access preview considers the snapshot without any attributes.</p> </li> <li> <p>To propose deletion of an existing shared <code>accountIds</code>, you can specify an empty list for <code>accountIds</code> in the <code>RdsDbSnapshotAttributeValue</code>.</p> </li> </ul>
|
|
1501
1252
|
* @public
|
|
1502
1253
|
*/
|
|
1503
1254
|
interface AccountIdsMember {
|
|
@@ -1518,67 +1269,40 @@ export declare namespace RdsDbSnapshotAttributeValue {
|
|
|
1518
1269
|
const visit: <T>(value: RdsDbSnapshotAttributeValue, visitor: Visitor<T>) => T;
|
|
1519
1270
|
}
|
|
1520
1271
|
/**
|
|
1521
|
-
* <p>The proposed access control configuration for an Amazon RDS DB snapshot. You can propose a
|
|
1522
|
-
* configuration for a new Amazon RDS DB snapshot or an Amazon RDS DB snapshot that you own by
|
|
1523
|
-
* specifying the <code>RdsDbSnapshotAttributeValue</code> and optional KMS encryption key.
|
|
1524
|
-
* For more information, see <a href="https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_ModifyDBSnapshotAttribute.html">ModifyDBSnapshotAttribute</a>.</p>
|
|
1272
|
+
* <p>The proposed access control configuration for an Amazon RDS DB snapshot. You can propose a configuration for a new Amazon RDS DB snapshot or an Amazon RDS DB snapshot that you own by specifying the <code>RdsDbSnapshotAttributeValue</code> and optional KMS encryption key. For more information, see <a href="https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_ModifyDBSnapshotAttribute.html">ModifyDBSnapshotAttribute</a>.</p>
|
|
1525
1273
|
* @public
|
|
1526
1274
|
*/
|
|
1527
1275
|
export interface RdsDbSnapshotConfiguration {
|
|
1528
1276
|
/**
|
|
1529
|
-
* <p>The names and values of manual DB snapshot attributes. Manual DB snapshot attributes are
|
|
1530
|
-
* used to authorize other Amazon Web Services accounts to restore a manual DB snapshot. The only valid
|
|
1531
|
-
* value for <code>attributeName</code> for the attribute map is restore.</p>
|
|
1277
|
+
* <p>The names and values of manual DB snapshot attributes. Manual DB snapshot attributes are used to authorize other Amazon Web Services accounts to restore a manual DB snapshot. The only valid value for <code>attributeName</code> for the attribute map is restore.</p>
|
|
1532
1278
|
* @public
|
|
1533
1279
|
*/
|
|
1534
1280
|
attributes?: Record<string, RdsDbSnapshotAttributeValue> | undefined;
|
|
1535
1281
|
/**
|
|
1536
|
-
* <p>The KMS key identifier for an encrypted Amazon RDS DB snapshot. The KMS key identifier is
|
|
1537
|
-
* the key ARN, key ID, alias ARN, or alias name for the KMS key.</p>
|
|
1538
|
-
* <ul>
|
|
1539
|
-
* <li>
|
|
1540
|
-
* <p>If the configuration is for an existing Amazon RDS DB snapshot and you do not specify
|
|
1541
|
-
* the <code>kmsKeyId</code>, or you specify an empty string, then the access preview
|
|
1542
|
-
* uses the existing <code>kmsKeyId</code> of the snapshot.</p>
|
|
1543
|
-
* </li>
|
|
1544
|
-
* <li>
|
|
1545
|
-
* <p>If the access preview is for a new resource and you do not specify the specify the
|
|
1546
|
-
* <code>kmsKeyId</code>, then the access preview considers the snapshot as
|
|
1547
|
-
* unencrypted.</p>
|
|
1548
|
-
* </li>
|
|
1549
|
-
* </ul>
|
|
1282
|
+
* <p>The KMS key identifier for an encrypted Amazon RDS DB snapshot. The KMS key identifier is the key ARN, key ID, alias ARN, or alias name for the KMS key.</p> <ul> <li> <p>If the configuration is for an existing Amazon RDS DB snapshot and you do not specify the <code>kmsKeyId</code>, or you specify an empty string, then the access preview uses the existing <code>kmsKeyId</code> of the snapshot.</p> </li> <li> <p>If the access preview is for a new resource and you do not specify the specify the <code>kmsKeyId</code>, then the access preview considers the snapshot as unencrypted.</p> </li> </ul>
|
|
1550
1283
|
* @public
|
|
1551
1284
|
*/
|
|
1552
1285
|
kmsKeyId?: string | undefined;
|
|
1553
1286
|
}
|
|
1554
1287
|
/**
|
|
1555
|
-
* <p>This configuration sets the network origin for the Amazon S3 access point or multi-region
|
|
1556
|
-
* access point to <code>Internet</code>.</p>
|
|
1288
|
+
* <p>This configuration sets the network origin for the Amazon S3 access point or multi-region access point to <code>Internet</code>.</p>
|
|
1557
1289
|
* @public
|
|
1558
1290
|
*/
|
|
1559
1291
|
export interface InternetConfiguration {
|
|
1560
1292
|
}
|
|
1561
1293
|
/**
|
|
1562
|
-
* <p>The proposed virtual private cloud (VPC) configuration for the Amazon S3 access point. VPC
|
|
1563
|
-
* configuration does not apply to multi-region access points. For more information, see
|
|
1564
|
-
* <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_control_VpcConfiguration.html">VpcConfiguration</a>. </p>
|
|
1294
|
+
* <p>The proposed virtual private cloud (VPC) configuration for the Amazon S3 access point. VPC configuration does not apply to multi-region access points. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_control_VpcConfiguration.html">VpcConfiguration</a>. </p>
|
|
1565
1295
|
* @public
|
|
1566
1296
|
*/
|
|
1567
1297
|
export interface VpcConfiguration {
|
|
1568
1298
|
/**
|
|
1569
|
-
* <p> If this field is specified, this access point will only allow connections from the
|
|
1570
|
-
* specified VPC ID. </p>
|
|
1299
|
+
* <p> If this field is specified, this access point will only allow connections from the specified VPC ID. </p>
|
|
1571
1300
|
* @public
|
|
1572
1301
|
*/
|
|
1573
1302
|
vpcId: string | undefined;
|
|
1574
1303
|
}
|
|
1575
1304
|
/**
|
|
1576
|
-
* <p>The proposed <code>InternetConfiguration</code> or <code>VpcConfiguration</code> to
|
|
1577
|
-
* apply to the Amazon S3 access point. You can make the access point accessible from the internet,
|
|
1578
|
-
* or you can specify that all requests made through that access point must originate from a
|
|
1579
|
-
* specific virtual private cloud (VPC). You can specify only one type of network
|
|
1580
|
-
* configuration. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/creating-access-points.html">Creating access
|
|
1581
|
-
* points</a>.</p>
|
|
1305
|
+
* <p>The proposed <code>InternetConfiguration</code> or <code>VpcConfiguration</code> to apply to the Amazon S3 access point. You can make the access point accessible from the internet, or you can specify that all requests made through that access point must originate from a specific virtual private cloud (VPC). You can specify only one type of network configuration. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/creating-access-points.html">Creating access points</a>.</p>
|
|
1582
1306
|
* @public
|
|
1583
1307
|
*/
|
|
1584
1308
|
export type NetworkOriginConfiguration = NetworkOriginConfiguration.InternetConfigurationMember | NetworkOriginConfiguration.VpcConfigurationMember | NetworkOriginConfiguration.$UnknownMember;
|
|
@@ -1587,9 +1311,7 @@ export type NetworkOriginConfiguration = NetworkOriginConfiguration.InternetConf
|
|
|
1587
1311
|
*/
|
|
1588
1312
|
export declare namespace NetworkOriginConfiguration {
|
|
1589
1313
|
/**
|
|
1590
|
-
* <p>The proposed virtual private cloud (VPC) configuration for the Amazon S3 access point. VPC
|
|
1591
|
-
* configuration does not apply to multi-region access points. For more information, see
|
|
1592
|
-
* <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_control_VpcConfiguration.html">VpcConfiguration</a>. </p>
|
|
1314
|
+
* <p>The proposed virtual private cloud (VPC) configuration for the Amazon S3 access point. VPC configuration does not apply to multi-region access points. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_control_VpcConfiguration.html">VpcConfiguration</a>. </p>
|
|
1593
1315
|
* @public
|
|
1594
1316
|
*/
|
|
1595
1317
|
interface VpcConfigurationMember {
|
|
@@ -1598,8 +1320,7 @@ export declare namespace NetworkOriginConfiguration {
|
|
|
1598
1320
|
$unknown?: never;
|
|
1599
1321
|
}
|
|
1600
1322
|
/**
|
|
1601
|
-
* <p>The configuration for the Amazon S3 access point or multi-region access point with an
|
|
1602
|
-
* <code>Internet</code> origin.</p>
|
|
1323
|
+
* <p>The configuration for the Amazon S3 access point or multi-region access point with an <code>Internet</code> origin.</p>
|
|
1603
1324
|
* @public
|
|
1604
1325
|
*/
|
|
1605
1326
|
interface InternetConfigurationMember {
|
|
@@ -1623,19 +1344,12 @@ export declare namespace NetworkOriginConfiguration {
|
|
|
1623
1344
|
const visit: <T>(value: NetworkOriginConfiguration, visitor: Visitor<T>) => T;
|
|
1624
1345
|
}
|
|
1625
1346
|
/**
|
|
1626
|
-
* <p>The <code>PublicAccessBlock</code> configuration to apply to this Amazon S3 bucket. If the
|
|
1627
|
-
* proposed configuration is for an existing Amazon S3 bucket and the configuration is not
|
|
1628
|
-
* specified, the access preview uses the existing setting. If the proposed configuration is
|
|
1629
|
-
* for a new bucket and the configuration is not specified, the access preview uses
|
|
1630
|
-
* <code>false</code>. If the proposed configuration is for a new access point or
|
|
1631
|
-
* multi-region access point and the access point BPA configuration is not specified, the
|
|
1632
|
-
* access preview uses <code>true</code>. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-s3-bucket-publicaccessblockconfiguration.html">PublicAccessBlockConfiguration</a>. </p>
|
|
1347
|
+
* <p>The <code>PublicAccessBlock</code> configuration to apply to this Amazon S3 bucket. If the proposed configuration is for an existing Amazon S3 bucket and the configuration is not specified, the access preview uses the existing setting. If the proposed configuration is for a new bucket and the configuration is not specified, the access preview uses <code>false</code>. If the proposed configuration is for a new access point or multi-region access point and the access point BPA configuration is not specified, the access preview uses <code>true</code>. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-s3-bucket-publicaccessblockconfiguration.html">PublicAccessBlockConfiguration</a>. </p>
|
|
1633
1348
|
* @public
|
|
1634
1349
|
*/
|
|
1635
1350
|
export interface S3PublicAccessBlockConfiguration {
|
|
1636
1351
|
/**
|
|
1637
|
-
* <p> Specifies whether Amazon S3 should ignore public ACLs for this bucket and objects in this
|
|
1638
|
-
* bucket. </p>
|
|
1352
|
+
* <p> Specifies whether Amazon S3 should ignore public ACLs for this bucket and objects in this bucket. </p>
|
|
1639
1353
|
* @public
|
|
1640
1354
|
*/
|
|
1641
1355
|
ignorePublicAcls: boolean | undefined;
|
|
@@ -1646,14 +1360,7 @@ export interface S3PublicAccessBlockConfiguration {
|
|
|
1646
1360
|
restrictPublicBuckets: boolean | undefined;
|
|
1647
1361
|
}
|
|
1648
1362
|
/**
|
|
1649
|
-
* <p>The configuration for an Amazon S3 access point or multi-region access point for the bucket.
|
|
1650
|
-
* You can propose up to 10 access points or multi-region access points per bucket. If the
|
|
1651
|
-
* proposed Amazon S3 access point configuration is for an existing bucket, the access preview uses
|
|
1652
|
-
* the proposed access point configuration in place of the existing access points. To propose
|
|
1653
|
-
* an access point without a policy, you can provide an empty string as the access point
|
|
1654
|
-
* policy. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/creating-access-points.html">Creating access points</a>.
|
|
1655
|
-
* For more information about access point policy limits, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/access-points-restrictions-limitations.html">Access points
|
|
1656
|
-
* restrictions and limitations</a>.</p>
|
|
1363
|
+
* <p>The configuration for an Amazon S3 access point or multi-region access point for the bucket. You can propose up to 10 access points or multi-region access points per bucket. If the proposed Amazon S3 access point configuration is for an existing bucket, the access preview uses the proposed access point configuration in place of the existing access points. To propose an access point without a policy, you can provide an empty string as the access point policy. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/creating-access-points.html">Creating access points</a>. For more information about access point policy limits, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/access-points-restrictions-limitations.html">Access points restrictions and limitations</a>.</p>
|
|
1657
1364
|
* @public
|
|
1658
1365
|
*/
|
|
1659
1366
|
export interface S3AccessPointConfiguration {
|
|
@@ -1663,25 +1370,18 @@ export interface S3AccessPointConfiguration {
|
|
|
1663
1370
|
*/
|
|
1664
1371
|
accessPointPolicy?: string | undefined;
|
|
1665
1372
|
/**
|
|
1666
|
-
* <p>The proposed <code>S3PublicAccessBlock</code> configuration to apply to this Amazon S3 access
|
|
1667
|
-
* point or multi-region access point.</p>
|
|
1373
|
+
* <p>The proposed <code>S3PublicAccessBlock</code> configuration to apply to this Amazon S3 access point or multi-region access point.</p>
|
|
1668
1374
|
* @public
|
|
1669
1375
|
*/
|
|
1670
1376
|
publicAccessBlock?: S3PublicAccessBlockConfiguration | undefined;
|
|
1671
1377
|
/**
|
|
1672
|
-
* <p>The proposed <code>Internet</code> and <code>VpcConfiguration</code> to apply to this
|
|
1673
|
-
* Amazon S3 access point. <code>VpcConfiguration</code> does not apply to multi-region access
|
|
1674
|
-
* points. If the access preview is for a new resource and neither is specified, the access
|
|
1675
|
-
* preview uses <code>Internet</code> for the network origin. If the access preview is for an
|
|
1676
|
-
* existing resource and neither is specified, the access preview uses the existing network
|
|
1677
|
-
* origin.</p>
|
|
1378
|
+
* <p>The proposed <code>Internet</code> and <code>VpcConfiguration</code> to apply to this Amazon S3 access point. <code>VpcConfiguration</code> does not apply to multi-region access points. If the access preview is for a new resource and neither is specified, the access preview uses <code>Internet</code> for the network origin. If the access preview is for an existing resource and neither is specified, the access preview uses the existing network origin.</p>
|
|
1678
1379
|
* @public
|
|
1679
1380
|
*/
|
|
1680
1381
|
networkOrigin?: NetworkOriginConfiguration | undefined;
|
|
1681
1382
|
}
|
|
1682
1383
|
/**
|
|
1683
|
-
* <p>You specify each grantee as a type-value pair using one of these types. You can specify
|
|
1684
|
-
* only one type of grantee. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketAcl.html">PutBucketAcl</a>.</p>
|
|
1384
|
+
* <p>You specify each grantee as a type-value pair using one of these types. You can specify only one type of grantee. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketAcl.html">PutBucketAcl</a>.</p>
|
|
1685
1385
|
* @public
|
|
1686
1386
|
*/
|
|
1687
1387
|
export type AclGrantee = AclGrantee.IdMember | AclGrantee.UriMember | AclGrantee.$UnknownMember;
|
|
@@ -1738,9 +1438,7 @@ export declare const AclPermission: {
|
|
|
1738
1438
|
*/
|
|
1739
1439
|
export type AclPermission = (typeof AclPermission)[keyof typeof AclPermission];
|
|
1740
1440
|
/**
|
|
1741
|
-
* <p>A proposed access control list grant configuration for an Amazon S3 bucket. For more
|
|
1742
|
-
* information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html#setting-acls">How to Specify an
|
|
1743
|
-
* ACL</a>.</p>
|
|
1441
|
+
* <p>A proposed access control list grant configuration for an Amazon S3 bucket. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html#setting-acls">How to Specify an ACL</a>.</p>
|
|
1744
1442
|
* @public
|
|
1745
1443
|
*/
|
|
1746
1444
|
export interface S3BucketAclGrantConfiguration {
|
|
@@ -1756,16 +1454,7 @@ export interface S3BucketAclGrantConfiguration {
|
|
|
1756
1454
|
grantee: AclGrantee | undefined;
|
|
1757
1455
|
}
|
|
1758
1456
|
/**
|
|
1759
|
-
* <p>Proposed access control configuration for an Amazon S3 bucket. You can propose a
|
|
1760
|
-
* configuration for a new Amazon S3 bucket or an existing Amazon S3 bucket that you own by specifying
|
|
1761
|
-
* the Amazon S3 bucket policy, bucket ACLs, bucket BPA settings, Amazon S3 access points, and
|
|
1762
|
-
* multi-region access points attached to the bucket. If the configuration is for an existing
|
|
1763
|
-
* Amazon S3 bucket and you do not specify the Amazon S3 bucket policy, the access preview uses the
|
|
1764
|
-
* existing policy attached to the bucket. If the access preview is for a new resource and you
|
|
1765
|
-
* do not specify the Amazon S3 bucket policy, the access preview assumes a bucket without a
|
|
1766
|
-
* policy. To propose deletion of an existing bucket policy, you can specify an empty string.
|
|
1767
|
-
* For more information about bucket policy limits, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/example-bucket-policies.html">Bucket Policy
|
|
1768
|
-
* Examples</a>.</p>
|
|
1457
|
+
* <p>Proposed access control configuration for an Amazon S3 bucket. You can propose a configuration for a new Amazon S3 bucket or an existing Amazon S3 bucket that you own by specifying the Amazon S3 bucket policy, bucket ACLs, bucket BPA settings, Amazon S3 access points, and multi-region access points attached to the bucket. If the configuration is for an existing Amazon S3 bucket and you do not specify the Amazon S3 bucket policy, the access preview uses the existing policy attached to the bucket. If the access preview is for a new resource and you do not specify the Amazon S3 bucket policy, the access preview assumes a bucket without a policy. To propose deletion of an existing bucket policy, you can specify an empty string. For more information about bucket policy limits, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/example-bucket-policies.html">Bucket Policy Examples</a>.</p>
|
|
1769
1458
|
* @public
|
|
1770
1459
|
*/
|
|
1771
1460
|
export interface S3BucketConfiguration {
|
|
@@ -1775,10 +1464,7 @@ export interface S3BucketConfiguration {
|
|
|
1775
1464
|
*/
|
|
1776
1465
|
bucketPolicy?: string | undefined;
|
|
1777
1466
|
/**
|
|
1778
|
-
* <p>The proposed list of ACL grants for the Amazon S3 bucket. You can propose up to 100 ACL
|
|
1779
|
-
* grants per bucket. If the proposed grant configuration is for an existing bucket, the
|
|
1780
|
-
* access preview uses the proposed list of grant configurations in place of the existing
|
|
1781
|
-
* grants. Otherwise, the access preview uses the existing grants for the bucket.</p>
|
|
1467
|
+
* <p>The proposed list of ACL grants for the Amazon S3 bucket. You can propose up to 100 ACL grants per bucket. If the proposed grant configuration is for an existing bucket, the access preview uses the proposed list of grant configurations in place of the existing grants. Otherwise, the access preview uses the existing grants for the bucket.</p>
|
|
1782
1468
|
* @public
|
|
1783
1469
|
*/
|
|
1784
1470
|
bucketAclGrants?: S3BucketAclGrantConfiguration[] | undefined;
|
|
@@ -1788,20 +1474,13 @@ export interface S3BucketConfiguration {
|
|
|
1788
1474
|
*/
|
|
1789
1475
|
bucketPublicAccessBlock?: S3PublicAccessBlockConfiguration | undefined;
|
|
1790
1476
|
/**
|
|
1791
|
-
* <p>The configuration of Amazon S3 access points or multi-region access points for the bucket.
|
|
1792
|
-
* You can propose up to 10 new access points per bucket.</p>
|
|
1477
|
+
* <p>The configuration of Amazon S3 access points or multi-region access points for the bucket. You can propose up to 10 new access points per bucket.</p>
|
|
1793
1478
|
* @public
|
|
1794
1479
|
*/
|
|
1795
1480
|
accessPoints?: Record<string, S3AccessPointConfiguration> | undefined;
|
|
1796
1481
|
}
|
|
1797
1482
|
/**
|
|
1798
|
-
* <p>Proposed configuration for an access point attached to an Amazon S3 directory bucket. You can
|
|
1799
|
-
* propose up to 10 access points per bucket. If the proposed access point configuration is
|
|
1800
|
-
* for an existing Amazon S3 directory bucket, the access preview uses the proposed access point
|
|
1801
|
-
* configuration in place of the existing access points. To propose an access point without a
|
|
1802
|
-
* policy, you can provide an empty string as the access point policy. For more information
|
|
1803
|
-
* about access points for Amazon S3 directory buckets, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-points-directory-buckets.html">Managing access to
|
|
1804
|
-
* directory buckets with access points</a> in the Amazon Simple Storage Service User Guide.</p>
|
|
1483
|
+
* <p>Proposed configuration for an access point attached to an Amazon S3 directory bucket. You can propose up to 10 access points per bucket. If the proposed access point configuration is for an existing Amazon S3 directory bucket, the access preview uses the proposed access point configuration in place of the existing access points. To propose an access point without a policy, you can provide an empty string as the access point policy. For more information about access points for Amazon S3 directory buckets, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-points-directory-buckets.html">Managing access to directory buckets with access points</a> in the Amazon Simple Storage Service User Guide.</p>
|
|
1805
1484
|
* @public
|
|
1806
1485
|
*/
|
|
1807
1486
|
export interface S3ExpressDirectoryAccessPointConfiguration {
|
|
@@ -1811,27 +1490,13 @@ export interface S3ExpressDirectoryAccessPointConfiguration {
|
|
|
1811
1490
|
*/
|
|
1812
1491
|
accessPointPolicy?: string | undefined;
|
|
1813
1492
|
/**
|
|
1814
|
-
* <p>The proposed <code>InternetConfiguration</code> or <code>VpcConfiguration</code> to
|
|
1815
|
-
* apply to the Amazon S3 access point. You can make the access point accessible from the internet,
|
|
1816
|
-
* or you can specify that all requests made through that access point must originate from a
|
|
1817
|
-
* specific virtual private cloud (VPC). You can specify only one type of network
|
|
1818
|
-
* configuration. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/creating-access-points.html">Creating access
|
|
1819
|
-
* points</a>.</p>
|
|
1493
|
+
* <p>The proposed <code>InternetConfiguration</code> or <code>VpcConfiguration</code> to apply to the Amazon S3 access point. You can make the access point accessible from the internet, or you can specify that all requests made through that access point must originate from a specific virtual private cloud (VPC). You can specify only one type of network configuration. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/creating-access-points.html">Creating access points</a>.</p>
|
|
1820
1494
|
* @public
|
|
1821
1495
|
*/
|
|
1822
1496
|
networkOrigin?: NetworkOriginConfiguration | undefined;
|
|
1823
1497
|
}
|
|
1824
1498
|
/**
|
|
1825
|
-
* <p>Proposed access control configuration for an Amazon S3 directory bucket. You can propose a
|
|
1826
|
-
* configuration for a new Amazon S3 directory bucket or an existing Amazon S3 directory bucket that you
|
|
1827
|
-
* own by specifying the Amazon S3 bucket policy. If the configuration is for an existing Amazon S3
|
|
1828
|
-
* directory bucket and you do not specify the Amazon S3 bucket policy, the access preview uses the
|
|
1829
|
-
* existing policy attached to the directory bucket. If the access preview is for a new
|
|
1830
|
-
* resource and you do not specify the Amazon S3 bucket policy, the access preview assumes an
|
|
1831
|
-
* directory bucket without a policy. To propose deletion of an existing bucket policy, you
|
|
1832
|
-
* can specify an empty string. For more information about Amazon S3 directory bucket policies, see
|
|
1833
|
-
* <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-security-iam-example-bucket-policies.html">Example bucket policies for directory buckets</a> in the Amazon Simple Storage Service User
|
|
1834
|
-
* Guide.</p>
|
|
1499
|
+
* <p>Proposed access control configuration for an Amazon S3 directory bucket. You can propose a configuration for a new Amazon S3 directory bucket or an existing Amazon S3 directory bucket that you own by specifying the Amazon S3 bucket policy. If the configuration is for an existing Amazon S3 directory bucket and you do not specify the Amazon S3 bucket policy, the access preview uses the existing policy attached to the directory bucket. If the access preview is for a new resource and you do not specify the Amazon S3 bucket policy, the access preview assumes an directory bucket without a policy. To propose deletion of an existing bucket policy, you can specify an empty string. For more information about Amazon S3 directory bucket policies, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-security-iam-example-bucket-policies.html">Example bucket policies for directory buckets</a> in the Amazon Simple Storage Service User Guide.</p>
|
|
1835
1500
|
* @public
|
|
1836
1501
|
*/
|
|
1837
1502
|
export interface S3ExpressDirectoryBucketConfiguration {
|
|
@@ -1847,18 +1512,7 @@ export interface S3ExpressDirectoryBucketConfiguration {
|
|
|
1847
1512
|
accessPoints?: Record<string, S3ExpressDirectoryAccessPointConfiguration> | undefined;
|
|
1848
1513
|
}
|
|
1849
1514
|
/**
|
|
1850
|
-
* <p>The configuration for a Secrets Manager secret. For more information, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_CreateSecret.html">CreateSecret</a>.</p>
|
|
1851
|
-
* <p>You can propose a configuration for a new secret or an existing secret that you own by
|
|
1852
|
-
* specifying the secret policy and optional KMS encryption key. If the configuration is for
|
|
1853
|
-
* an existing secret and you do not specify the secret policy, the access preview uses the
|
|
1854
|
-
* existing policy for the secret. If the access preview is for a new resource and you do not
|
|
1855
|
-
* specify the policy, the access preview assumes a secret without a policy. To propose
|
|
1856
|
-
* deletion of an existing policy, you can specify an empty string. If the proposed
|
|
1857
|
-
* configuration is for a new secret and you do not specify the KMS key ID, the access
|
|
1858
|
-
* preview uses the Amazon Web Services managed key <code>aws/secretsmanager</code>. If you specify an empty
|
|
1859
|
-
* string for the KMS key ID, the access preview uses the Amazon Web Services managed key of the
|
|
1860
|
-
* Amazon Web Services account. For more information about secret policy limits, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_limits.html">Quotas
|
|
1861
|
-
* for Secrets Manager.</a>.</p>
|
|
1515
|
+
* <p>The configuration for a Secrets Manager secret. For more information, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_CreateSecret.html">CreateSecret</a>.</p> <p>You can propose a configuration for a new secret or an existing secret that you own by specifying the secret policy and optional KMS encryption key. If the configuration is for an existing secret and you do not specify the secret policy, the access preview uses the existing policy for the secret. If the access preview is for a new resource and you do not specify the policy, the access preview assumes a secret without a policy. To propose deletion of an existing policy, you can specify an empty string. If the proposed configuration is for a new secret and you do not specify the KMS key ID, the access preview uses the Amazon Web Services managed key <code>aws/secretsmanager</code>. If you specify an empty string for the KMS key ID, the access preview uses the Amazon Web Services managed key of the Amazon Web Services account. For more information about secret policy limits, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_limits.html">Quotas for Secrets Manager.</a>.</p>
|
|
1862
1516
|
* @public
|
|
1863
1517
|
*/
|
|
1864
1518
|
export interface SecretsManagerSecretConfiguration {
|
|
@@ -1874,35 +1528,18 @@ export interface SecretsManagerSecretConfiguration {
|
|
|
1874
1528
|
secretPolicy?: string | undefined;
|
|
1875
1529
|
}
|
|
1876
1530
|
/**
|
|
1877
|
-
* <p>The proposed access control configuration for an Amazon SNS topic. You can propose a
|
|
1878
|
-
* configuration for a new Amazon SNS topic or an existing Amazon SNS topic that you own by specifying
|
|
1879
|
-
* the policy. If the configuration is for an existing Amazon SNS topic and you do not specify the
|
|
1880
|
-
* Amazon SNS policy, then the access preview uses the existing Amazon SNS policy for the topic. If the
|
|
1881
|
-
* access preview is for a new resource and you do not specify the policy, then the access
|
|
1882
|
-
* preview assumes an Amazon SNS topic without a policy. To propose deletion of an existing Amazon SNS
|
|
1883
|
-
* topic policy, you can specify an empty string for the Amazon SNS policy. For more information,
|
|
1884
|
-
* see <a href="https://docs.aws.amazon.com/sns/latest/api/API_Topic.html">Topic</a>.</p>
|
|
1531
|
+
* <p>The proposed access control configuration for an Amazon SNS topic. You can propose a configuration for a new Amazon SNS topic or an existing Amazon SNS topic that you own by specifying the policy. If the configuration is for an existing Amazon SNS topic and you do not specify the Amazon SNS policy, then the access preview uses the existing Amazon SNS policy for the topic. If the access preview is for a new resource and you do not specify the policy, then the access preview assumes an Amazon SNS topic without a policy. To propose deletion of an existing Amazon SNS topic policy, you can specify an empty string for the Amazon SNS policy. For more information, see <a href="https://docs.aws.amazon.com/sns/latest/api/API_Topic.html">Topic</a>.</p>
|
|
1885
1532
|
* @public
|
|
1886
1533
|
*/
|
|
1887
1534
|
export interface SnsTopicConfiguration {
|
|
1888
1535
|
/**
|
|
1889
|
-
* <p>The JSON policy text that defines who can access an Amazon SNS topic. For more information,
|
|
1890
|
-
* see <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-access-policy-use-cases.html">Example cases for Amazon SNS access control</a> in the <i>Amazon SNS Developer
|
|
1891
|
-
* Guide</i>.</p>
|
|
1536
|
+
* <p>The JSON policy text that defines who can access an Amazon SNS topic. For more information, see <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-access-policy-use-cases.html">Example cases for Amazon SNS access control</a> in the <i>Amazon SNS Developer Guide</i>.</p>
|
|
1892
1537
|
* @public
|
|
1893
1538
|
*/
|
|
1894
1539
|
topicPolicy?: string | undefined;
|
|
1895
1540
|
}
|
|
1896
1541
|
/**
|
|
1897
|
-
* <p>The proposed access control configuration for an Amazon SQS queue. You can propose a
|
|
1898
|
-
* configuration for a new Amazon SQS queue or an existing Amazon SQS queue that you own by specifying
|
|
1899
|
-
* the Amazon SQS policy. If the configuration is for an existing Amazon SQS queue and you do not
|
|
1900
|
-
* specify the Amazon SQS policy, the access preview uses the existing Amazon SQS policy for the queue.
|
|
1901
|
-
* If the access preview is for a new resource and you do not specify the policy, the access
|
|
1902
|
-
* preview assumes an Amazon SQS queue without a policy. To propose deletion of an existing Amazon SQS
|
|
1903
|
-
* queue policy, you can specify an empty string for the Amazon SQS policy. For more information
|
|
1904
|
-
* about Amazon SQS policy limits, see <a href="https://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/quotas-policies.html">Quotas related
|
|
1905
|
-
* to policies</a>.</p>
|
|
1542
|
+
* <p>The proposed access control configuration for an Amazon SQS queue. You can propose a configuration for a new Amazon SQS queue or an existing Amazon SQS queue that you own by specifying the Amazon SQS policy. If the configuration is for an existing Amazon SQS queue and you do not specify the Amazon SQS policy, the access preview uses the existing Amazon SQS policy for the queue. If the access preview is for a new resource and you do not specify the policy, the access preview assumes an Amazon SQS queue without a policy. To propose deletion of an existing Amazon SQS queue policy, you can specify an empty string for the Amazon SQS policy. For more information about Amazon SQS policy limits, see <a href="https://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/quotas-policies.html">Quotas related to policies</a>.</p>
|
|
1906
1543
|
* @public
|
|
1907
1544
|
*/
|
|
1908
1545
|
export interface SqsQueueConfiguration {
|
|
@@ -1913,8 +1550,7 @@ export interface SqsQueueConfiguration {
|
|
|
1913
1550
|
queuePolicy?: string | undefined;
|
|
1914
1551
|
}
|
|
1915
1552
|
/**
|
|
1916
|
-
* <p>Access control configuration structures for your resource. You specify the configuration
|
|
1917
|
-
* as a type-value pair. You can specify only one type of access control configuration.</p>
|
|
1553
|
+
* <p>Access control configuration structures for your resource. You specify the configuration as a type-value pair. You can specify only one type of access control configuration.</p>
|
|
1918
1554
|
* @public
|
|
1919
1555
|
*/
|
|
1920
1556
|
export type Configuration = Configuration.DynamodbStreamMember | Configuration.DynamodbTableMember | Configuration.EbsSnapshotMember | Configuration.EcrRepositoryMember | Configuration.EfsFileSystemMember | Configuration.IamRoleMember | Configuration.KmsKeyMember | Configuration.RdsDbClusterSnapshotMember | Configuration.RdsDbSnapshotMember | Configuration.S3BucketMember | Configuration.S3ExpressDirectoryBucketMember | Configuration.SecretsManagerSecretMember | Configuration.SnsTopicMember | Configuration.SqsQueueMember | Configuration.$UnknownMember;
|
|
@@ -2260,18 +1896,12 @@ export declare namespace Configuration {
|
|
|
2260
1896
|
*/
|
|
2261
1897
|
export interface CreateAccessPreviewRequest {
|
|
2262
1898
|
/**
|
|
2263
|
-
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
|
|
2264
|
-
* the account analyzer</a> used to generate the access preview. You can only create an
|
|
2265
|
-
* access preview for analyzers with an <code>Account</code> type and <code>Active</code>
|
|
2266
|
-
* status.</p>
|
|
1899
|
+
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the account analyzer</a> used to generate the access preview. You can only create an access preview for analyzers with an <code>Account</code> type and <code>Active</code> status.</p>
|
|
2267
1900
|
* @public
|
|
2268
1901
|
*/
|
|
2269
1902
|
analyzerArn: string | undefined;
|
|
2270
1903
|
/**
|
|
2271
|
-
* <p>Access control configuration for your resource that is used to generate the access
|
|
2272
|
-
* preview. The access preview includes findings for external access allowed to the resource
|
|
2273
|
-
* with the proposed access control configuration. The configuration must contain exactly one
|
|
2274
|
-
* element.</p>
|
|
1904
|
+
* <p>Access control configuration for your resource that is used to generate the access preview. The access preview includes findings for external access allowed to the resource with the proposed access control configuration. The configuration must contain exactly one element.</p>
|
|
2275
1905
|
* @public
|
|
2276
1906
|
*/
|
|
2277
1907
|
configurations: Record<string, Configuration> | undefined;
|
|
@@ -2296,8 +1926,7 @@ export interface CreateAccessPreviewResponse {
|
|
|
2296
1926
|
*/
|
|
2297
1927
|
export interface GenerateFindingRecommendationRequest {
|
|
2298
1928
|
/**
|
|
2299
|
-
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
|
|
2300
|
-
* the analyzer</a> used to generate the finding recommendation.</p>
|
|
1929
|
+
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the analyzer</a> used to generate the finding recommendation.</p>
|
|
2301
1930
|
* @public
|
|
2302
1931
|
*/
|
|
2303
1932
|
analyzerArn: string | undefined;
|
|
@@ -2317,8 +1946,7 @@ export interface GetAccessPreviewRequest {
|
|
|
2317
1946
|
*/
|
|
2318
1947
|
accessPreviewId: string | undefined;
|
|
2319
1948
|
/**
|
|
2320
|
-
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
|
|
2321
|
-
* the analyzer</a> used to generate the access preview.</p>
|
|
1949
|
+
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the analyzer</a> used to generate the access preview.</p>
|
|
2322
1950
|
* @public
|
|
2323
1951
|
*/
|
|
2324
1952
|
analyzerArn: string | undefined;
|
|
@@ -2349,10 +1977,7 @@ export declare const AccessPreviewStatusReasonCode: {
|
|
|
2349
1977
|
*/
|
|
2350
1978
|
export type AccessPreviewStatusReasonCode = (typeof AccessPreviewStatusReasonCode)[keyof typeof AccessPreviewStatusReasonCode];
|
|
2351
1979
|
/**
|
|
2352
|
-
* <p>Provides more details about the current status of the access preview. For example, if
|
|
2353
|
-
* the creation of the access preview fails, a <code>Failed</code> status is returned. This
|
|
2354
|
-
* failure can be due to an internal issue with the analysis or due to an invalid proposed
|
|
2355
|
-
* resource configuration.</p>
|
|
1980
|
+
* <p>Provides more details about the current status of the access preview. For example, if the creation of the access preview fails, a <code>Failed</code> status is returned. This failure can be due to an internal issue with the analysis or due to an invalid proposed resource configuration.</p>
|
|
2356
1981
|
* @public
|
|
2357
1982
|
*/
|
|
2358
1983
|
export interface AccessPreviewStatusReason {
|
|
@@ -2388,30 +2013,12 @@ export interface AccessPreview {
|
|
|
2388
2013
|
*/
|
|
2389
2014
|
createdAt: Date | undefined;
|
|
2390
2015
|
/**
|
|
2391
|
-
* <p>The status of the access preview.</p>
|
|
2392
|
-
* <ul>
|
|
2393
|
-
* <li>
|
|
2394
|
-
* <p>
|
|
2395
|
-
* <code>Creating</code> - The access preview creation is in progress.</p>
|
|
2396
|
-
* </li>
|
|
2397
|
-
* <li>
|
|
2398
|
-
* <p>
|
|
2399
|
-
* <code>Completed</code> - The access preview is complete. You can preview findings
|
|
2400
|
-
* for external access to the resource.</p>
|
|
2401
|
-
* </li>
|
|
2402
|
-
* <li>
|
|
2403
|
-
* <p>
|
|
2404
|
-
* <code>Failed</code> - The access preview creation has failed.</p>
|
|
2405
|
-
* </li>
|
|
2406
|
-
* </ul>
|
|
2016
|
+
* <p>The status of the access preview.</p> <ul> <li> <p> <code>Creating</code> - The access preview creation is in progress.</p> </li> <li> <p> <code>Completed</code> - The access preview is complete. You can preview findings for external access to the resource.</p> </li> <li> <p> <code>Failed</code> - The access preview creation has failed.</p> </li> </ul>
|
|
2407
2017
|
* @public
|
|
2408
2018
|
*/
|
|
2409
2019
|
status: AccessPreviewStatus | undefined;
|
|
2410
2020
|
/**
|
|
2411
|
-
* <p>Provides more details about the current status of the access preview.</p>
|
|
2412
|
-
* <p>For example, if the creation of the access preview fails, a <code>Failed</code> status
|
|
2413
|
-
* is returned. This failure can be due to an internal issue with the analysis or due to an
|
|
2414
|
-
* invalid resource configuration.</p>
|
|
2021
|
+
* <p>Provides more details about the current status of the access preview.</p> <p>For example, if the creation of the access preview fails, a <code>Failed</code> status is returned. This failure can be due to an internal issue with the analysis or due to an invalid resource configuration.</p>
|
|
2415
2022
|
* @public
|
|
2416
2023
|
*/
|
|
2417
2024
|
statusReason?: AccessPreviewStatusReason | undefined;
|
|
@@ -2432,8 +2039,7 @@ export interface GetAccessPreviewResponse {
|
|
|
2432
2039
|
*/
|
|
2433
2040
|
export interface GetAnalyzedResourceRequest {
|
|
2434
2041
|
/**
|
|
2435
|
-
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
|
|
2436
|
-
* the analyzer</a> to retrieve information from.</p>
|
|
2042
|
+
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the analyzer</a> to retrieve information from.</p>
|
|
2437
2043
|
* @public
|
|
2438
2044
|
*/
|
|
2439
2045
|
analyzerArn: string | undefined;
|
|
@@ -2443,10 +2049,6 @@ export interface GetAnalyzedResourceRequest {
|
|
|
2443
2049
|
*/
|
|
2444
2050
|
resourceArn: string | undefined;
|
|
2445
2051
|
}
|
|
2446
|
-
/**
|
|
2447
|
-
* @public
|
|
2448
|
-
*/
|
|
2449
|
-
export type ResourceType = "AWS::DynamoDB::Stream" | "AWS::DynamoDB::Table" | "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::EFS::FileSystem" | "AWS::IAM::Role" | "AWS::IAM::User" | "AWS::KMS::Key" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::RDS::DBClusterSnapshot" | "AWS::RDS::DBSnapshot" | "AWS::S3::Bucket" | "AWS::S3Express::DirectoryBucket" | "AWS::SNS::Topic" | "AWS::SQS::Queue" | "AWS::SecretsManager::Secret";
|
|
2450
2052
|
/**
|
|
2451
2053
|
* @public
|
|
2452
2054
|
*/
|
|
@@ -2482,20 +2084,17 @@ export interface AnalyzedResource {
|
|
|
2482
2084
|
*/
|
|
2483
2085
|
updatedAt: Date | undefined;
|
|
2484
2086
|
/**
|
|
2485
|
-
* <p>Indicates whether the policy that generated the finding grants public access to the
|
|
2486
|
-
* resource.</p>
|
|
2087
|
+
* <p>Indicates whether the policy that generated the finding grants public access to the resource.</p>
|
|
2487
2088
|
* @public
|
|
2488
2089
|
*/
|
|
2489
2090
|
isPublic: boolean | undefined;
|
|
2490
2091
|
/**
|
|
2491
|
-
* <p>The actions that an external principal is granted permission to use by the policy that
|
|
2492
|
-
* generated the finding.</p>
|
|
2092
|
+
* <p>The actions that an external principal is granted permission to use by the policy that generated the finding.</p>
|
|
2493
2093
|
* @public
|
|
2494
2094
|
*/
|
|
2495
2095
|
actions?: string[] | undefined;
|
|
2496
2096
|
/**
|
|
2497
|
-
* <p>Indicates how the access that generated the finding is granted. This is populated for
|
|
2498
|
-
* Amazon S3 bucket findings.</p>
|
|
2097
|
+
* <p>Indicates how the access that generated the finding is granted. This is populated for Amazon S3 bucket findings.</p>
|
|
2499
2098
|
* @public
|
|
2500
2099
|
*/
|
|
2501
2100
|
sharedVia?: string[] | undefined;
|
|
@@ -2521,8 +2120,7 @@ export interface AnalyzedResource {
|
|
|
2521
2120
|
*/
|
|
2522
2121
|
export interface GetAnalyzedResourceResponse {
|
|
2523
2122
|
/**
|
|
2524
|
-
* <p>An <code>AnalyzedResource</code> object that contains information that IAM Access Analyzer
|
|
2525
|
-
* found when it analyzed the resource.</p>
|
|
2123
|
+
* <p>An <code>AnalyzedResource</code> object that contains information that IAM Access Analyzer found when it analyzed the resource.</p>
|
|
2526
2124
|
* @public
|
|
2527
2125
|
*/
|
|
2528
2126
|
resource?: AnalyzedResource | undefined;
|
|
@@ -2533,8 +2131,7 @@ export interface GetAnalyzedResourceResponse {
|
|
|
2533
2131
|
*/
|
|
2534
2132
|
export interface GetFindingRequest {
|
|
2535
2133
|
/**
|
|
2536
|
-
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
|
|
2537
|
-
* the analyzer</a> that generated the finding.</p>
|
|
2134
|
+
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the analyzer</a> that generated the finding.</p>
|
|
2538
2135
|
* @public
|
|
2539
2136
|
*/
|
|
2540
2137
|
analyzerArn: string | undefined;
|
|
@@ -2550,6 +2147,7 @@ export interface GetFindingRequest {
|
|
|
2550
2147
|
*/
|
|
2551
2148
|
export declare const ResourceControlPolicyRestriction: {
|
|
2552
2149
|
readonly APPLICABLE: "APPLICABLE";
|
|
2150
|
+
readonly APPLIED: "APPLIED";
|
|
2553
2151
|
readonly FAILED_TO_EVALUATE_RCP: "FAILED_TO_EVALUATE_RCP";
|
|
2554
2152
|
readonly NOT_APPLICABLE: "NOT_APPLICABLE";
|
|
2555
2153
|
};
|
|
@@ -2558,14 +2156,12 @@ export declare const ResourceControlPolicyRestriction: {
|
|
|
2558
2156
|
*/
|
|
2559
2157
|
export type ResourceControlPolicyRestriction = (typeof ResourceControlPolicyRestriction)[keyof typeof ResourceControlPolicyRestriction];
|
|
2560
2158
|
/**
|
|
2561
|
-
* <p>Includes details about how the access that generated the finding is granted. This is
|
|
2562
|
-
* populated for Amazon S3 bucket findings.</p>
|
|
2159
|
+
* <p>Includes details about how the access that generated the finding is granted. This is populated for Amazon S3 bucket findings.</p>
|
|
2563
2160
|
* @public
|
|
2564
2161
|
*/
|
|
2565
2162
|
export interface FindingSourceDetail {
|
|
2566
2163
|
/**
|
|
2567
|
-
* <p>The ARN of the access point that generated the finding. The ARN format depends on
|
|
2568
|
-
* whether the ARN represents an access point or a multi-region access point.</p>
|
|
2164
|
+
* <p>The ARN of the access point that generated the finding. The ARN format depends on whether the ARN represents an access point or a multi-region access point.</p>
|
|
2569
2165
|
* @public
|
|
2570
2166
|
*/
|
|
2571
2167
|
accessPointArn?: string | undefined;
|
|
@@ -2580,8 +2176,7 @@ export interface FindingSourceDetail {
|
|
|
2580
2176
|
*/
|
|
2581
2177
|
export type FindingSourceType = "BUCKET_ACL" | "POLICY" | "S3_ACCESS_POINT" | "S3_ACCESS_POINT_ACCOUNT";
|
|
2582
2178
|
/**
|
|
2583
|
-
* <p>The source of the finding. This indicates how the access that generated the finding is
|
|
2584
|
-
* granted. It is populated for Amazon S3 bucket findings.</p>
|
|
2179
|
+
* <p>The source of the finding. This indicates how the access that generated the finding is granted. It is populated for Amazon S3 bucket findings.</p>
|
|
2585
2180
|
* @public
|
|
2586
2181
|
*/
|
|
2587
2182
|
export interface FindingSource {
|
|
@@ -2591,8 +2186,7 @@ export interface FindingSource {
|
|
|
2591
2186
|
*/
|
|
2592
2187
|
type: FindingSourceType | undefined;
|
|
2593
2188
|
/**
|
|
2594
|
-
* <p>Includes details about how the access that generated the finding is granted. This is
|
|
2595
|
-
* populated for Amazon S3 bucket findings.</p>
|
|
2189
|
+
* <p>Includes details about how the access that generated the finding is granted. This is populated for Amazon S3 bucket findings.</p>
|
|
2596
2190
|
* @public
|
|
2597
2191
|
*/
|
|
2598
2192
|
detail?: FindingSourceDetail | undefined;
|
|
@@ -2613,8 +2207,7 @@ export interface Finding {
|
|
|
2613
2207
|
*/
|
|
2614
2208
|
principal?: Record<string, string> | undefined;
|
|
2615
2209
|
/**
|
|
2616
|
-
* <p>The action in the analyzed policy statement that an external principal has permission to
|
|
2617
|
-
* use.</p>
|
|
2210
|
+
* <p>The action in the analyzed policy statement that an external principal has permission to use.</p>
|
|
2618
2211
|
* @public
|
|
2619
2212
|
*/
|
|
2620
2213
|
action?: string[] | undefined;
|
|
@@ -2624,8 +2217,7 @@ export interface Finding {
|
|
|
2624
2217
|
*/
|
|
2625
2218
|
resource?: string | undefined;
|
|
2626
2219
|
/**
|
|
2627
|
-
* <p>Indicates whether the policy that generated the finding allows public access to the
|
|
2628
|
-
* resource.</p>
|
|
2220
|
+
* <p>Indicates whether the policy that generated the finding allows public access to the resource.</p>
|
|
2629
2221
|
* @public
|
|
2630
2222
|
*/
|
|
2631
2223
|
isPublic?: boolean | undefined;
|
|
@@ -2670,14 +2262,12 @@ export interface Finding {
|
|
|
2670
2262
|
*/
|
|
2671
2263
|
error?: string | undefined;
|
|
2672
2264
|
/**
|
|
2673
|
-
* <p>The sources of the finding. This indicates how the access that generated the finding is
|
|
2674
|
-
* granted. It is populated for Amazon S3 bucket findings.</p>
|
|
2265
|
+
* <p>The sources of the finding. This indicates how the access that generated the finding is granted. It is populated for Amazon S3 bucket findings.</p>
|
|
2675
2266
|
* @public
|
|
2676
2267
|
*/
|
|
2677
2268
|
sources?: FindingSource[] | undefined;
|
|
2678
2269
|
/**
|
|
2679
|
-
* <p>The type of restriction applied to the finding by the resource owner with an Organizations
|
|
2680
|
-
* resource control policy (RCP).</p>
|
|
2270
|
+
* <p>The type of restriction applied to the finding by the resource owner with an Organizations resource control policy (RCP).</p>
|
|
2681
2271
|
* @public
|
|
2682
2272
|
*/
|
|
2683
2273
|
resourceControlPolicyRestriction?: ResourceControlPolicyRestriction | undefined;
|
|
@@ -2698,8 +2288,7 @@ export interface GetFindingResponse {
|
|
|
2698
2288
|
*/
|
|
2699
2289
|
export interface GetFindingRecommendationRequest {
|
|
2700
2290
|
/**
|
|
2701
|
-
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
|
|
2702
|
-
* the analyzer</a> used to generate the finding recommendation.</p>
|
|
2291
|
+
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the analyzer</a> used to generate the finding recommendation.</p>
|
|
2703
2292
|
* @public
|
|
2704
2293
|
*/
|
|
2705
2294
|
analyzerArn: string | undefined;
|
|
@@ -2720,8 +2309,7 @@ export interface GetFindingRecommendationRequest {
|
|
|
2720
2309
|
nextToken?: string | undefined;
|
|
2721
2310
|
}
|
|
2722
2311
|
/**
|
|
2723
|
-
* <p>Contains information about the reason that the retrieval of a recommendation for a
|
|
2724
|
-
* finding failed.</p>
|
|
2312
|
+
* <p>Contains information about the reason that the retrieval of a recommendation for a finding failed.</p>
|
|
2725
2313
|
* @public
|
|
2726
2314
|
*/
|
|
2727
2315
|
export interface RecommendationError {
|
|
@@ -2760,40 +2348,33 @@ export declare const RecommendedRemediationAction: {
|
|
|
2760
2348
|
*/
|
|
2761
2349
|
export type RecommendedRemediationAction = (typeof RecommendedRemediationAction)[keyof typeof RecommendedRemediationAction];
|
|
2762
2350
|
/**
|
|
2763
|
-
* <p>Contains information about the action to take for a policy in an unused permissions
|
|
2764
|
-
* finding.</p>
|
|
2351
|
+
* <p>Contains information about the action to take for a policy in an unused permissions finding.</p>
|
|
2765
2352
|
* @public
|
|
2766
2353
|
*/
|
|
2767
2354
|
export interface UnusedPermissionsRecommendedStep {
|
|
2768
2355
|
/**
|
|
2769
|
-
* <p>The time at which the existing policy for the unused permissions finding was last
|
|
2770
|
-
* updated.</p>
|
|
2356
|
+
* <p>The time at which the existing policy for the unused permissions finding was last updated.</p>
|
|
2771
2357
|
* @public
|
|
2772
2358
|
*/
|
|
2773
2359
|
policyUpdatedAt?: Date | undefined;
|
|
2774
2360
|
/**
|
|
2775
|
-
* <p>A recommendation of whether to create or detach a policy for an unused permissions
|
|
2776
|
-
* finding.</p>
|
|
2361
|
+
* <p>A recommendation of whether to create or detach a policy for an unused permissions finding.</p>
|
|
2777
2362
|
* @public
|
|
2778
2363
|
*/
|
|
2779
2364
|
recommendedAction: RecommendedRemediationAction | undefined;
|
|
2780
2365
|
/**
|
|
2781
|
-
* <p>If the recommended action for the unused permissions finding is to replace the existing
|
|
2782
|
-
* policy, the contents of the recommended policy to replace the policy specified in the
|
|
2783
|
-
* <code>existingPolicyId</code> field.</p>
|
|
2366
|
+
* <p>If the recommended action for the unused permissions finding is to replace the existing policy, the contents of the recommended policy to replace the policy specified in the <code>existingPolicyId</code> field.</p>
|
|
2784
2367
|
* @public
|
|
2785
2368
|
*/
|
|
2786
2369
|
recommendedPolicy?: string | undefined;
|
|
2787
2370
|
/**
|
|
2788
|
-
* <p>If the recommended action for the unused permissions finding is to detach a policy, the
|
|
2789
|
-
* ID of an existing policy to be detached.</p>
|
|
2371
|
+
* <p>If the recommended action for the unused permissions finding is to detach a policy, the ID of an existing policy to be detached.</p>
|
|
2790
2372
|
* @public
|
|
2791
2373
|
*/
|
|
2792
2374
|
existingPolicyId?: string | undefined;
|
|
2793
2375
|
}
|
|
2794
2376
|
/**
|
|
2795
|
-
* <p>Contains information about a recommended step for an unused access analyzer
|
|
2796
|
-
* finding.</p>
|
|
2377
|
+
* <p>Contains information about a recommended step for an unused access analyzer finding.</p>
|
|
2797
2378
|
* @public
|
|
2798
2379
|
*/
|
|
2799
2380
|
export type RecommendedStep = RecommendedStep.UnusedPermissionsRecommendedStepMember | RecommendedStep.$UnknownMember;
|
|
@@ -2855,8 +2436,7 @@ export interface GetFindingRecommendationResponse {
|
|
|
2855
2436
|
*/
|
|
2856
2437
|
nextToken?: string | undefined;
|
|
2857
2438
|
/**
|
|
2858
|
-
* <p>Detailed information about the reason that the retrieval of a recommendation for the
|
|
2859
|
-
* finding failed.</p>
|
|
2439
|
+
* <p>Detailed information about the reason that the retrieval of a recommendation for the finding failed.</p>
|
|
2860
2440
|
* @public
|
|
2861
2441
|
*/
|
|
2862
2442
|
error?: RecommendationError | undefined;
|
|
@@ -2886,15 +2466,13 @@ export interface GetFindingRecommendationResponse {
|
|
|
2886
2466
|
*/
|
|
2887
2467
|
export interface GetFindingsStatisticsRequest {
|
|
2888
2468
|
/**
|
|
2889
|
-
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
|
|
2890
|
-
* the analyzer</a> used to generate the statistics.</p>
|
|
2469
|
+
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the analyzer</a> used to generate the statistics.</p>
|
|
2891
2470
|
* @public
|
|
2892
2471
|
*/
|
|
2893
2472
|
analyzerArn: string | undefined;
|
|
2894
2473
|
}
|
|
2895
2474
|
/**
|
|
2896
|
-
* <p>Contains information about the total number of active cross-account and public findings
|
|
2897
|
-
* for a resource type of an external access analyzer.</p>
|
|
2475
|
+
* <p>Contains information about the total number of active cross-account and public findings for a resource type of an external access analyzer.</p>
|
|
2898
2476
|
* @public
|
|
2899
2477
|
*/
|
|
2900
2478
|
export interface ResourceTypeDetails {
|
|
@@ -2910,14 +2488,12 @@ export interface ResourceTypeDetails {
|
|
|
2910
2488
|
totalActiveCrossAccount?: number | undefined;
|
|
2911
2489
|
}
|
|
2912
2490
|
/**
|
|
2913
|
-
* <p>Provides aggregate statistics about the findings for the specified external access
|
|
2914
|
-
* analyzer.</p>
|
|
2491
|
+
* <p>Provides aggregate statistics about the findings for the specified external access analyzer.</p>
|
|
2915
2492
|
* @public
|
|
2916
2493
|
*/
|
|
2917
2494
|
export interface ExternalAccessFindingsStatistics {
|
|
2918
2495
|
/**
|
|
2919
|
-
* <p>The total number of active cross-account and public findings for each resource type of
|
|
2920
|
-
* the specified external access analyzer.</p>
|
|
2496
|
+
* <p>The total number of active cross-account and public findings for each resource type of the specified external access analyzer.</p>
|
|
2921
2497
|
* @public
|
|
2922
2498
|
*/
|
|
2923
2499
|
resourceTypeStatistics?: Partial<Record<ResourceType, ResourceTypeDetails>> | undefined;
|
|
@@ -2938,8 +2514,54 @@ export interface ExternalAccessFindingsStatistics {
|
|
|
2938
2514
|
totalResolvedFindings?: number | undefined;
|
|
2939
2515
|
}
|
|
2940
2516
|
/**
|
|
2941
|
-
* <p>Contains information about the findings for
|
|
2942
|
-
*
|
|
2517
|
+
* <p>Contains information about the total number of active, archived, and resolved findings for a resource type of an internal access analyzer.</p>
|
|
2518
|
+
* @public
|
|
2519
|
+
*/
|
|
2520
|
+
export interface InternalAccessResourceTypeDetails {
|
|
2521
|
+
/**
|
|
2522
|
+
* <p>The total number of active findings for the resource type in the internal access analyzer.</p>
|
|
2523
|
+
* @public
|
|
2524
|
+
*/
|
|
2525
|
+
totalActiveFindings?: number | undefined;
|
|
2526
|
+
/**
|
|
2527
|
+
* <p>The total number of resolved findings for the resource type in the internal access analyzer.</p>
|
|
2528
|
+
* @public
|
|
2529
|
+
*/
|
|
2530
|
+
totalResolvedFindings?: number | undefined;
|
|
2531
|
+
/**
|
|
2532
|
+
* <p>The total number of archived findings for the resource type in the internal access analyzer.</p>
|
|
2533
|
+
* @public
|
|
2534
|
+
*/
|
|
2535
|
+
totalArchivedFindings?: number | undefined;
|
|
2536
|
+
}
|
|
2537
|
+
/**
|
|
2538
|
+
* <p>Provides aggregate statistics about the findings for the specified internal access analyzer. This includes counts of active, archived, and resolved findings.</p>
|
|
2539
|
+
* @public
|
|
2540
|
+
*/
|
|
2541
|
+
export interface InternalAccessFindingsStatistics {
|
|
2542
|
+
/**
|
|
2543
|
+
* <p>The total number of active findings for each resource type of the specified internal access analyzer.</p>
|
|
2544
|
+
* @public
|
|
2545
|
+
*/
|
|
2546
|
+
resourceTypeStatistics?: Partial<Record<ResourceType, InternalAccessResourceTypeDetails>> | undefined;
|
|
2547
|
+
/**
|
|
2548
|
+
* <p>The number of active findings for the specified internal access analyzer.</p>
|
|
2549
|
+
* @public
|
|
2550
|
+
*/
|
|
2551
|
+
totalActiveFindings?: number | undefined;
|
|
2552
|
+
/**
|
|
2553
|
+
* <p>The number of archived findings for the specified internal access analyzer.</p>
|
|
2554
|
+
* @public
|
|
2555
|
+
*/
|
|
2556
|
+
totalArchivedFindings?: number | undefined;
|
|
2557
|
+
/**
|
|
2558
|
+
* <p>The number of resolved findings for the specified internal access analyzer.</p>
|
|
2559
|
+
* @public
|
|
2560
|
+
*/
|
|
2561
|
+
totalResolvedFindings?: number | undefined;
|
|
2562
|
+
}
|
|
2563
|
+
/**
|
|
2564
|
+
* <p>Contains information about the findings for an Amazon Web Services account in an organization unused access analyzer.</p>
|
|
2943
2565
|
* @public
|
|
2944
2566
|
*/
|
|
2945
2567
|
export interface FindingAggregationAccountDetails {
|
|
@@ -2954,15 +2576,13 @@ export interface FindingAggregationAccountDetails {
|
|
|
2954
2576
|
*/
|
|
2955
2577
|
numberOfActiveFindings?: number | undefined;
|
|
2956
2578
|
/**
|
|
2957
|
-
* <p>Provides the number of active findings for each type of unused access for the specified
|
|
2958
|
-
* Amazon Web Services account.</p>
|
|
2579
|
+
* <p>Provides the number of active findings for each type of unused access for the specified Amazon Web Services account.</p>
|
|
2959
2580
|
* @public
|
|
2960
2581
|
*/
|
|
2961
2582
|
details?: Record<string, number> | undefined;
|
|
2962
2583
|
}
|
|
2963
2584
|
/**
|
|
2964
|
-
* <p>Contains information about the total number of findings for a type of unused
|
|
2965
|
-
* access.</p>
|
|
2585
|
+
* <p>Contains information about the total number of findings for a type of unused access.</p>
|
|
2966
2586
|
* @public
|
|
2967
2587
|
*/
|
|
2968
2588
|
export interface UnusedAccessTypeStatistics {
|
|
@@ -2978,20 +2598,17 @@ export interface UnusedAccessTypeStatistics {
|
|
|
2978
2598
|
total?: number | undefined;
|
|
2979
2599
|
}
|
|
2980
2600
|
/**
|
|
2981
|
-
* <p>Provides aggregate statistics about the findings for the specified unused access
|
|
2982
|
-
* analyzer.</p>
|
|
2601
|
+
* <p>Provides aggregate statistics about the findings for the specified unused access analyzer.</p>
|
|
2983
2602
|
* @public
|
|
2984
2603
|
*/
|
|
2985
2604
|
export interface UnusedAccessFindingsStatistics {
|
|
2986
2605
|
/**
|
|
2987
|
-
* <p>A list of details about the total number of findings for each type of unused access for
|
|
2988
|
-
* the analyzer. </p>
|
|
2606
|
+
* <p>A list of details about the total number of findings for each type of unused access for the analyzer. </p>
|
|
2989
2607
|
* @public
|
|
2990
2608
|
*/
|
|
2991
2609
|
unusedAccessTypeStatistics?: UnusedAccessTypeStatistics[] | undefined;
|
|
2992
2610
|
/**
|
|
2993
|
-
* <p>A list of one to ten Amazon Web Services accounts that have the most active findings for the unused
|
|
2994
|
-
* access analyzer.</p>
|
|
2611
|
+
* <p>A list of one to ten Amazon Web Services accounts that have the most active findings for the unused access analyzer.</p>
|
|
2995
2612
|
* @public
|
|
2996
2613
|
*/
|
|
2997
2614
|
topAccounts?: FindingAggregationAccountDetails[] | undefined;
|
|
@@ -3012,12 +2629,10 @@ export interface UnusedAccessFindingsStatistics {
|
|
|
3012
2629
|
totalResolvedFindings?: number | undefined;
|
|
3013
2630
|
}
|
|
3014
2631
|
/**
|
|
3015
|
-
* <p>Contains information about the aggregate statistics for an external or unused access
|
|
3016
|
-
* analyzer. Only one parameter can be used in a <code>FindingsStatistics</code>
|
|
3017
|
-
* object.</p>
|
|
2632
|
+
* <p>Contains information about the aggregate statistics for an external or unused access analyzer. Only one parameter can be used in a <code>FindingsStatistics</code> object.</p>
|
|
3018
2633
|
* @public
|
|
3019
2634
|
*/
|
|
3020
|
-
export type FindingsStatistics = FindingsStatistics.ExternalAccessFindingsStatisticsMember | FindingsStatistics.UnusedAccessFindingsStatisticsMember | FindingsStatistics.$UnknownMember;
|
|
2635
|
+
export type FindingsStatistics = FindingsStatistics.ExternalAccessFindingsStatisticsMember | FindingsStatistics.InternalAccessFindingsStatisticsMember | FindingsStatistics.UnusedAccessFindingsStatisticsMember | FindingsStatistics.$UnknownMember;
|
|
3021
2636
|
/**
|
|
3022
2637
|
* @public
|
|
3023
2638
|
*/
|
|
@@ -3028,6 +2643,17 @@ export declare namespace FindingsStatistics {
|
|
|
3028
2643
|
*/
|
|
3029
2644
|
interface ExternalAccessFindingsStatisticsMember {
|
|
3030
2645
|
externalAccessFindingsStatistics: ExternalAccessFindingsStatistics;
|
|
2646
|
+
internalAccessFindingsStatistics?: never;
|
|
2647
|
+
unusedAccessFindingsStatistics?: never;
|
|
2648
|
+
$unknown?: never;
|
|
2649
|
+
}
|
|
2650
|
+
/**
|
|
2651
|
+
* <p>The aggregate statistics for an internal access analyzer. This includes information about active, archived, and resolved findings related to internal access within your Amazon Web Services organization or account.</p>
|
|
2652
|
+
* @public
|
|
2653
|
+
*/
|
|
2654
|
+
interface InternalAccessFindingsStatisticsMember {
|
|
2655
|
+
externalAccessFindingsStatistics?: never;
|
|
2656
|
+
internalAccessFindingsStatistics: InternalAccessFindingsStatistics;
|
|
3031
2657
|
unusedAccessFindingsStatistics?: never;
|
|
3032
2658
|
$unknown?: never;
|
|
3033
2659
|
}
|
|
@@ -3037,6 +2663,7 @@ export declare namespace FindingsStatistics {
|
|
|
3037
2663
|
*/
|
|
3038
2664
|
interface UnusedAccessFindingsStatisticsMember {
|
|
3039
2665
|
externalAccessFindingsStatistics?: never;
|
|
2666
|
+
internalAccessFindingsStatistics?: never;
|
|
3040
2667
|
unusedAccessFindingsStatistics: UnusedAccessFindingsStatistics;
|
|
3041
2668
|
$unknown?: never;
|
|
3042
2669
|
}
|
|
@@ -3045,11 +2672,13 @@ export declare namespace FindingsStatistics {
|
|
|
3045
2672
|
*/
|
|
3046
2673
|
interface $UnknownMember {
|
|
3047
2674
|
externalAccessFindingsStatistics?: never;
|
|
2675
|
+
internalAccessFindingsStatistics?: never;
|
|
3048
2676
|
unusedAccessFindingsStatistics?: never;
|
|
3049
2677
|
$unknown: [string, any];
|
|
3050
2678
|
}
|
|
3051
2679
|
interface Visitor<T> {
|
|
3052
2680
|
externalAccessFindingsStatistics: (value: ExternalAccessFindingsStatistics) => T;
|
|
2681
|
+
internalAccessFindingsStatistics: (value: InternalAccessFindingsStatistics) => T;
|
|
3053
2682
|
unusedAccessFindingsStatistics: (value: UnusedAccessFindingsStatistics) => T;
|
|
3054
2683
|
_: (name: string, value: any) => T;
|
|
3055
2684
|
}
|
|
@@ -3065,9 +2694,7 @@ export interface GetFindingsStatisticsResponse {
|
|
|
3065
2694
|
*/
|
|
3066
2695
|
findingsStatistics?: FindingsStatistics[] | undefined;
|
|
3067
2696
|
/**
|
|
3068
|
-
* <p>The time at which the retrieval of the findings statistics was last updated. If the
|
|
3069
|
-
* findings statistics have not been previously retrieved for the specified analyzer, this
|
|
3070
|
-
* field will not be populated.</p>
|
|
2697
|
+
* <p>The time at which the retrieval of the findings statistics was last updated. If the findings statistics have not been previously retrieved for the specified analyzer, this field will not be populated.</p>
|
|
3071
2698
|
* @public
|
|
3072
2699
|
*/
|
|
3073
2700
|
lastUpdatedAt?: Date | undefined;
|
|
@@ -3077,8 +2704,7 @@ export interface GetFindingsStatisticsResponse {
|
|
|
3077
2704
|
*/
|
|
3078
2705
|
export interface GetFindingV2Request {
|
|
3079
2706
|
/**
|
|
3080
|
-
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
|
|
3081
|
-
* the analyzer</a> that generated the finding.</p>
|
|
2707
|
+
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the analyzer</a> that generated the finding.</p>
|
|
3082
2708
|
* @public
|
|
3083
2709
|
*/
|
|
3084
2710
|
analyzerArn: string | undefined;
|
|
@@ -3104,14 +2730,12 @@ export interface GetFindingV2Request {
|
|
|
3104
2730
|
*/
|
|
3105
2731
|
export interface ExternalAccessDetails {
|
|
3106
2732
|
/**
|
|
3107
|
-
* <p>The action in the analyzed policy statement that an external principal has permission to
|
|
3108
|
-
* use.</p>
|
|
2733
|
+
* <p>The action in the analyzed policy statement that an external principal has permission to use.</p>
|
|
3109
2734
|
* @public
|
|
3110
2735
|
*/
|
|
3111
2736
|
action?: string[] | undefined;
|
|
3112
2737
|
/**
|
|
3113
|
-
* <p>The condition in the analyzed policy statement that resulted in an external access
|
|
3114
|
-
* finding.</p>
|
|
2738
|
+
* <p>The condition in the analyzed policy statement that resulted in an external access finding.</p>
|
|
3115
2739
|
* @public
|
|
3116
2740
|
*/
|
|
3117
2741
|
condition: Record<string, string> | undefined;
|
|
@@ -3126,23 +2750,107 @@ export interface ExternalAccessDetails {
|
|
|
3126
2750
|
*/
|
|
3127
2751
|
principal?: Record<string, string> | undefined;
|
|
3128
2752
|
/**
|
|
3129
|
-
* <p>The sources of the external access finding. This indicates how the access that generated
|
|
3130
|
-
*
|
|
2753
|
+
* <p>The sources of the external access finding. This indicates how the access that generated the finding is granted. It is populated for Amazon S3 bucket findings.</p>
|
|
2754
|
+
* @public
|
|
2755
|
+
*/
|
|
2756
|
+
sources?: FindingSource[] | undefined;
|
|
2757
|
+
/**
|
|
2758
|
+
* <p>The type of restriction applied to the finding by the resource owner with an Organizations resource control policy (RCP).</p> <ul> <li> <p> <code>APPLICABLE</code>: There is an RCP present in the organization but IAM Access Analyzer does not include it in the evaluation of effective permissions. For example, if <code>s3:DeleteObject</code> is blocked by the RCP and the restriction is <code>APPLICABLE</code>, then <code>s3:DeleteObject</code> would still be included in the list of actions for the finding.</p> </li> <li> <p> <code>FAILED_TO_EVALUATE_RCP</code>: There was an error evaluating the RCP.</p> </li> <li> <p> <code>NOT_APPLICABLE</code>: There was no RCP present in the organization, or there was no RCP applicable to the resource. For example, the resource being analyzed is an Amazon RDS snapshot and there is an RCP in the organization, but the RCP only impacts Amazon S3 buckets.</p> </li> <li> <p> <code>APPLIED</code>: This restriction is not currently available for external access findings. </p> </li> </ul>
|
|
2759
|
+
* @public
|
|
2760
|
+
*/
|
|
2761
|
+
resourceControlPolicyRestriction?: ResourceControlPolicyRestriction | undefined;
|
|
2762
|
+
}
|
|
2763
|
+
/**
|
|
2764
|
+
* @public
|
|
2765
|
+
* @enum
|
|
2766
|
+
*/
|
|
2767
|
+
export declare const InternalAccessType: {
|
|
2768
|
+
readonly INTRA_ACCOUNT: "INTRA_ACCOUNT";
|
|
2769
|
+
readonly INTRA_ORG: "INTRA_ORG";
|
|
2770
|
+
};
|
|
2771
|
+
/**
|
|
2772
|
+
* @public
|
|
2773
|
+
*/
|
|
2774
|
+
export type InternalAccessType = (typeof InternalAccessType)[keyof typeof InternalAccessType];
|
|
2775
|
+
/**
|
|
2776
|
+
* @public
|
|
2777
|
+
* @enum
|
|
2778
|
+
*/
|
|
2779
|
+
export declare const PrincipalType: {
|
|
2780
|
+
readonly IAM_ROLE: "IAM_ROLE";
|
|
2781
|
+
readonly IAM_USER: "IAM_USER";
|
|
2782
|
+
};
|
|
2783
|
+
/**
|
|
2784
|
+
* @public
|
|
2785
|
+
*/
|
|
2786
|
+
export type PrincipalType = (typeof PrincipalType)[keyof typeof PrincipalType];
|
|
2787
|
+
/**
|
|
2788
|
+
* @public
|
|
2789
|
+
* @enum
|
|
2790
|
+
*/
|
|
2791
|
+
export declare const ServiceControlPolicyRestriction: {
|
|
2792
|
+
readonly APPLICABLE: "APPLICABLE";
|
|
2793
|
+
readonly APPLIED: "APPLIED";
|
|
2794
|
+
readonly FAILED_TO_EVALUATE_SCP: "FAILED_TO_EVALUATE_SCP";
|
|
2795
|
+
readonly NOT_APPLICABLE: "NOT_APPLICABLE";
|
|
2796
|
+
};
|
|
2797
|
+
/**
|
|
2798
|
+
* @public
|
|
2799
|
+
*/
|
|
2800
|
+
export type ServiceControlPolicyRestriction = (typeof ServiceControlPolicyRestriction)[keyof typeof ServiceControlPolicyRestriction];
|
|
2801
|
+
/**
|
|
2802
|
+
* <p>Contains information about an internal access finding. This includes details about the access that was identified within your Amazon Web Services organization or account.</p>
|
|
2803
|
+
* @public
|
|
2804
|
+
*/
|
|
2805
|
+
export interface InternalAccessDetails {
|
|
2806
|
+
/**
|
|
2807
|
+
* <p>The action in the analyzed policy statement that has internal access permission to use.</p>
|
|
2808
|
+
* @public
|
|
2809
|
+
*/
|
|
2810
|
+
action?: string[] | undefined;
|
|
2811
|
+
/**
|
|
2812
|
+
* <p>The condition in the analyzed policy statement that resulted in an internal access finding.</p>
|
|
2813
|
+
* @public
|
|
2814
|
+
*/
|
|
2815
|
+
condition?: Record<string, string> | undefined;
|
|
2816
|
+
/**
|
|
2817
|
+
* <p>The principal that has access to a resource within the internal environment.</p>
|
|
2818
|
+
* @public
|
|
2819
|
+
*/
|
|
2820
|
+
principal?: Record<string, string> | undefined;
|
|
2821
|
+
/**
|
|
2822
|
+
* <p>The Amazon Web Services account ID that owns the principal identified in the internal access finding.</p>
|
|
2823
|
+
* @public
|
|
2824
|
+
*/
|
|
2825
|
+
principalOwnerAccount?: string | undefined;
|
|
2826
|
+
/**
|
|
2827
|
+
* <p>The type of internal access identified in the finding. This indicates how the access is granted within your Amazon Web Services environment.</p>
|
|
2828
|
+
* @public
|
|
2829
|
+
*/
|
|
2830
|
+
accessType?: InternalAccessType | undefined;
|
|
2831
|
+
/**
|
|
2832
|
+
* <p>The type of principal identified in the internal access finding, such as IAM role or IAM user.</p>
|
|
2833
|
+
* @public
|
|
2834
|
+
*/
|
|
2835
|
+
principalType?: PrincipalType | undefined;
|
|
2836
|
+
/**
|
|
2837
|
+
* <p>The sources of the internal access finding. This indicates how the access that generated the finding is granted within your Amazon Web Services environment.</p>
|
|
3131
2838
|
* @public
|
|
3132
2839
|
*/
|
|
3133
2840
|
sources?: FindingSource[] | undefined;
|
|
3134
2841
|
/**
|
|
3135
|
-
* <p>The type of restriction applied to the finding by the resource owner with an Organizations
|
|
3136
|
-
* resource control policy (RCP).</p>
|
|
2842
|
+
* <p>The type of restriction applied to the finding by the resource owner with an Organizations resource control policy (RCP).</p> <ul> <li> <p> <code>APPLICABLE</code>: There is an RCP present in the organization but IAM Access Analyzer does not include it in the evaluation of effective permissions. For example, if <code>s3:DeleteObject</code> is blocked by the RCP and the restriction is <code>APPLICABLE</code>, then <code>s3:DeleteObject</code> would still be included in the list of actions for the finding. Only applicable to internal access findings with the account as the zone of trust. </p> </li> <li> <p> <code>FAILED_TO_EVALUATE_RCP</code>: There was an error evaluating the RCP.</p> </li> <li> <p> <code>NOT_APPLICABLE</code>: There was no RCP present in the organization. For internal access findings with the account as the zone of trust, <code>NOT_APPLICABLE</code> could also indicate that there was no RCP applicable to the resource.</p> </li> <li> <p> <code>APPLIED</code>: An RCP is present in the organization and IAM Access Analyzer included it in the evaluation of effective permissions. For example, if <code>s3:DeleteObject</code> is blocked by the RCP and the restriction is <code>APPLIED</code>, then <code>s3:DeleteObject</code> would not be included in the list of actions for the finding. Only applicable to internal access findings with the organization as the zone of trust. </p> </li> </ul>
|
|
3137
2843
|
* @public
|
|
3138
2844
|
*/
|
|
3139
2845
|
resourceControlPolicyRestriction?: ResourceControlPolicyRestriction | undefined;
|
|
2846
|
+
/**
|
|
2847
|
+
* <p>The type of restriction applied to the finding by an Organizations service control policy (SCP).</p> <ul> <li> <p> <code>APPLICABLE</code>: There is an SCP present in the organization but IAM Access Analyzer does not include it in the evaluation of effective permissions. Only applicable to internal access findings with the account as the zone of trust. </p> </li> <li> <p> <code>FAILED_TO_EVALUATE_SCP</code>: There was an error evaluating the SCP.</p> </li> <li> <p> <code>NOT_APPLICABLE</code>: There was no SCP present in the organization. For internal access findings with the account as the zone of trust, <code>NOT_APPLICABLE</code> could also indicate that there was no SCP applicable to the principal.</p> </li> <li> <p> <code>APPLIED</code>: An SCP is present in the organization and IAM Access Analyzer included it in the evaluation of effective permissions. Only applicable to internal access findings with the organization as the zone of trust. </p> </li> </ul>
|
|
2848
|
+
* @public
|
|
2849
|
+
*/
|
|
2850
|
+
serviceControlPolicyRestriction?: ServiceControlPolicyRestriction | undefined;
|
|
3140
2851
|
}
|
|
3141
2852
|
/**
|
|
3142
|
-
* <p>Contains information about an unused access finding for an IAM role. IAM Access Analyzer
|
|
3143
|
-
* charges for unused access analysis based on the number of IAM roles and users analyzed
|
|
3144
|
-
* per month. For more details on pricing, see <a href="https://aws.amazon.com/iam/access-analyzer/pricing">IAM Access Analyzer
|
|
3145
|
-
* pricing</a>.</p>
|
|
2853
|
+
* <p>Contains information about an unused access finding for an IAM role. IAM Access Analyzer charges for unused access analysis based on the number of IAM roles and users analyzed per month. For more details on pricing, see <a href="https://aws.amazon.com/iam/access-analyzer/pricing">IAM Access Analyzer pricing</a>.</p>
|
|
3146
2854
|
* @public
|
|
3147
2855
|
*/
|
|
3148
2856
|
export interface UnusedIamRoleDetails {
|
|
@@ -3153,10 +2861,7 @@ export interface UnusedIamRoleDetails {
|
|
|
3153
2861
|
lastAccessed?: Date | undefined;
|
|
3154
2862
|
}
|
|
3155
2863
|
/**
|
|
3156
|
-
* <p>Contains information about an unused access finding for an IAM user access key.
|
|
3157
|
-
* IAM Access Analyzer charges for unused access analysis based on the number of IAM roles and
|
|
3158
|
-
* users analyzed per month. For more details on pricing, see <a href="https://aws.amazon.com/iam/access-analyzer/pricing">IAM Access Analyzer
|
|
3159
|
-
* pricing</a>.</p>
|
|
2864
|
+
* <p>Contains information about an unused access finding for an IAM user access key. IAM Access Analyzer charges for unused access analysis based on the number of IAM roles and users analyzed per month. For more details on pricing, see <a href="https://aws.amazon.com/iam/access-analyzer/pricing">IAM Access Analyzer pricing</a>.</p>
|
|
3160
2865
|
* @public
|
|
3161
2866
|
*/
|
|
3162
2867
|
export interface UnusedIamUserAccessKeyDetails {
|
|
@@ -3172,10 +2877,7 @@ export interface UnusedIamUserAccessKeyDetails {
|
|
|
3172
2877
|
lastAccessed?: Date | undefined;
|
|
3173
2878
|
}
|
|
3174
2879
|
/**
|
|
3175
|
-
* <p>Contains information about an unused access finding for an IAM user password.
|
|
3176
|
-
* IAM Access Analyzer charges for unused access analysis based on the number of IAM roles and
|
|
3177
|
-
* users analyzed per month. For more details on pricing, see <a href="https://aws.amazon.com/iam/access-analyzer/pricing">IAM Access Analyzer
|
|
3178
|
-
* pricing</a>.</p>
|
|
2880
|
+
* <p>Contains information about an unused access finding for an IAM user password. IAM Access Analyzer charges for unused access analysis based on the number of IAM roles and users analyzed per month. For more details on pricing, see <a href="https://aws.amazon.com/iam/access-analyzer/pricing">IAM Access Analyzer pricing</a>.</p>
|
|
3179
2881
|
* @public
|
|
3180
2882
|
*/
|
|
3181
2883
|
export interface UnusedIamUserPasswordDetails {
|
|
@@ -3186,10 +2888,7 @@ export interface UnusedIamUserPasswordDetails {
|
|
|
3186
2888
|
lastAccessed?: Date | undefined;
|
|
3187
2889
|
}
|
|
3188
2890
|
/**
|
|
3189
|
-
* <p>Contains information about an unused access finding for an action. IAM Access Analyzer charges
|
|
3190
|
-
* for unused access analysis based on the number of IAM roles and users analyzed per month.
|
|
3191
|
-
* For more details on pricing, see <a href="https://aws.amazon.com/iam/access-analyzer/pricing">IAM Access Analyzer
|
|
3192
|
-
* pricing</a>.</p>
|
|
2891
|
+
* <p>Contains information about an unused access finding for an action. IAM Access Analyzer charges for unused access analysis based on the number of IAM roles and users analyzed per month. For more details on pricing, see <a href="https://aws.amazon.com/iam/access-analyzer/pricing">IAM Access Analyzer pricing</a>.</p>
|
|
3193
2892
|
* @public
|
|
3194
2893
|
*/
|
|
3195
2894
|
export interface UnusedAction {
|
|
@@ -3205,10 +2904,7 @@ export interface UnusedAction {
|
|
|
3205
2904
|
lastAccessed?: Date | undefined;
|
|
3206
2905
|
}
|
|
3207
2906
|
/**
|
|
3208
|
-
* <p>Contains information about an unused access finding for a permission. IAM Access Analyzer
|
|
3209
|
-
* charges for unused access analysis based on the number of IAM roles and users analyzed
|
|
3210
|
-
* per month. For more details on pricing, see <a href="https://aws.amazon.com/iam/access-analyzer/pricing">IAM Access Analyzer
|
|
3211
|
-
* pricing</a>.</p>
|
|
2907
|
+
* <p>Contains information about an unused access finding for a permission. IAM Access Analyzer charges for unused access analysis based on the number of IAM roles and users analyzed per month. For more details on pricing, see <a href="https://aws.amazon.com/iam/access-analyzer/pricing">IAM Access Analyzer pricing</a>.</p>
|
|
3212
2908
|
* @public
|
|
3213
2909
|
*/
|
|
3214
2910
|
export interface UnusedPermissionDetails {
|
|
@@ -3229,20 +2925,33 @@ export interface UnusedPermissionDetails {
|
|
|
3229
2925
|
lastAccessed?: Date | undefined;
|
|
3230
2926
|
}
|
|
3231
2927
|
/**
|
|
3232
|
-
* <p>Contains information about an external access or unused access finding. Only one
|
|
3233
|
-
* parameter can be used in a <code>FindingDetails</code> object.</p>
|
|
2928
|
+
* <p>Contains information about an external access or unused access finding. Only one parameter can be used in a <code>FindingDetails</code> object.</p>
|
|
3234
2929
|
* @public
|
|
3235
2930
|
*/
|
|
3236
|
-
export type FindingDetails = FindingDetails.ExternalAccessDetailsMember | FindingDetails.UnusedIamRoleDetailsMember | FindingDetails.UnusedIamUserAccessKeyDetailsMember | FindingDetails.UnusedIamUserPasswordDetailsMember | FindingDetails.UnusedPermissionDetailsMember | FindingDetails.$UnknownMember;
|
|
2931
|
+
export type FindingDetails = FindingDetails.ExternalAccessDetailsMember | FindingDetails.InternalAccessDetailsMember | FindingDetails.UnusedIamRoleDetailsMember | FindingDetails.UnusedIamUserAccessKeyDetailsMember | FindingDetails.UnusedIamUserPasswordDetailsMember | FindingDetails.UnusedPermissionDetailsMember | FindingDetails.$UnknownMember;
|
|
3237
2932
|
/**
|
|
3238
2933
|
* @public
|
|
3239
2934
|
*/
|
|
3240
2935
|
export declare namespace FindingDetails {
|
|
2936
|
+
/**
|
|
2937
|
+
* <p>The details for an internal access analyzer finding. This contains information about access patterns identified within your Amazon Web Services organization or account.</p>
|
|
2938
|
+
* @public
|
|
2939
|
+
*/
|
|
2940
|
+
interface InternalAccessDetailsMember {
|
|
2941
|
+
internalAccessDetails: InternalAccessDetails;
|
|
2942
|
+
externalAccessDetails?: never;
|
|
2943
|
+
unusedPermissionDetails?: never;
|
|
2944
|
+
unusedIamUserAccessKeyDetails?: never;
|
|
2945
|
+
unusedIamRoleDetails?: never;
|
|
2946
|
+
unusedIamUserPasswordDetails?: never;
|
|
2947
|
+
$unknown?: never;
|
|
2948
|
+
}
|
|
3241
2949
|
/**
|
|
3242
2950
|
* <p>The details for an external access analyzer finding.</p>
|
|
3243
2951
|
* @public
|
|
3244
2952
|
*/
|
|
3245
2953
|
interface ExternalAccessDetailsMember {
|
|
2954
|
+
internalAccessDetails?: never;
|
|
3246
2955
|
externalAccessDetails: ExternalAccessDetails;
|
|
3247
2956
|
unusedPermissionDetails?: never;
|
|
3248
2957
|
unusedIamUserAccessKeyDetails?: never;
|
|
@@ -3251,11 +2960,11 @@ export declare namespace FindingDetails {
|
|
|
3251
2960
|
$unknown?: never;
|
|
3252
2961
|
}
|
|
3253
2962
|
/**
|
|
3254
|
-
* <p>The details for an unused access analyzer finding with an unused permission finding
|
|
3255
|
-
* type.</p>
|
|
2963
|
+
* <p>The details for an unused access analyzer finding with an unused permission finding type.</p>
|
|
3256
2964
|
* @public
|
|
3257
2965
|
*/
|
|
3258
2966
|
interface UnusedPermissionDetailsMember {
|
|
2967
|
+
internalAccessDetails?: never;
|
|
3259
2968
|
externalAccessDetails?: never;
|
|
3260
2969
|
unusedPermissionDetails: UnusedPermissionDetails;
|
|
3261
2970
|
unusedIamUserAccessKeyDetails?: never;
|
|
@@ -3264,11 +2973,11 @@ export declare namespace FindingDetails {
|
|
|
3264
2973
|
$unknown?: never;
|
|
3265
2974
|
}
|
|
3266
2975
|
/**
|
|
3267
|
-
* <p>The details for an unused access analyzer finding with an unused IAM user access key
|
|
3268
|
-
* finding type.</p>
|
|
2976
|
+
* <p>The details for an unused access analyzer finding with an unused IAM user access key finding type.</p>
|
|
3269
2977
|
* @public
|
|
3270
2978
|
*/
|
|
3271
2979
|
interface UnusedIamUserAccessKeyDetailsMember {
|
|
2980
|
+
internalAccessDetails?: never;
|
|
3272
2981
|
externalAccessDetails?: never;
|
|
3273
2982
|
unusedPermissionDetails?: never;
|
|
3274
2983
|
unusedIamUserAccessKeyDetails: UnusedIamUserAccessKeyDetails;
|
|
@@ -3277,11 +2986,11 @@ export declare namespace FindingDetails {
|
|
|
3277
2986
|
$unknown?: never;
|
|
3278
2987
|
}
|
|
3279
2988
|
/**
|
|
3280
|
-
* <p>The details for an unused access analyzer finding with an unused IAM role finding
|
|
3281
|
-
* type.</p>
|
|
2989
|
+
* <p>The details for an unused access analyzer finding with an unused IAM role finding type.</p>
|
|
3282
2990
|
* @public
|
|
3283
2991
|
*/
|
|
3284
2992
|
interface UnusedIamRoleDetailsMember {
|
|
2993
|
+
internalAccessDetails?: never;
|
|
3285
2994
|
externalAccessDetails?: never;
|
|
3286
2995
|
unusedPermissionDetails?: never;
|
|
3287
2996
|
unusedIamUserAccessKeyDetails?: never;
|
|
@@ -3290,11 +2999,11 @@ export declare namespace FindingDetails {
|
|
|
3290
2999
|
$unknown?: never;
|
|
3291
3000
|
}
|
|
3292
3001
|
/**
|
|
3293
|
-
* <p>The details for an unused access analyzer finding with an unused IAM user password
|
|
3294
|
-
* finding type.</p>
|
|
3002
|
+
* <p>The details for an unused access analyzer finding with an unused IAM user password finding type.</p>
|
|
3295
3003
|
* @public
|
|
3296
3004
|
*/
|
|
3297
3005
|
interface UnusedIamUserPasswordDetailsMember {
|
|
3006
|
+
internalAccessDetails?: never;
|
|
3298
3007
|
externalAccessDetails?: never;
|
|
3299
3008
|
unusedPermissionDetails?: never;
|
|
3300
3009
|
unusedIamUserAccessKeyDetails?: never;
|
|
@@ -3306,6 +3015,7 @@ export declare namespace FindingDetails {
|
|
|
3306
3015
|
* @public
|
|
3307
3016
|
*/
|
|
3308
3017
|
interface $UnknownMember {
|
|
3018
|
+
internalAccessDetails?: never;
|
|
3309
3019
|
externalAccessDetails?: never;
|
|
3310
3020
|
unusedPermissionDetails?: never;
|
|
3311
3021
|
unusedIamUserAccessKeyDetails?: never;
|
|
@@ -3314,6 +3024,7 @@ export declare namespace FindingDetails {
|
|
|
3314
3024
|
$unknown: [string, any];
|
|
3315
3025
|
}
|
|
3316
3026
|
interface Visitor<T> {
|
|
3027
|
+
internalAccessDetails: (value: InternalAccessDetails) => T;
|
|
3317
3028
|
externalAccessDetails: (value: ExternalAccessDetails) => T;
|
|
3318
3029
|
unusedPermissionDetails: (value: UnusedPermissionDetails) => T;
|
|
3319
3030
|
unusedIamUserAccessKeyDetails: (value: UnusedIamUserAccessKeyDetails) => T;
|
|
@@ -3329,6 +3040,7 @@ export declare namespace FindingDetails {
|
|
|
3329
3040
|
*/
|
|
3330
3041
|
export declare const FindingType: {
|
|
3331
3042
|
readonly EXTERNAL_ACCESS: "ExternalAccess";
|
|
3043
|
+
readonly INTERNAL_ACCESS: "InternalAccess";
|
|
3332
3044
|
readonly UNUSED_IAM_ROLE: "UnusedIAMRole";
|
|
3333
3045
|
readonly UNUSED_IAM_USER_ACCESS_KEY: "UnusedIAMUserAccessKey";
|
|
3334
3046
|
readonly UNUSED_IAM_USER_PASSWORD: "UnusedIAMUserPassword";
|
|
@@ -3343,8 +3055,7 @@ export type FindingType = (typeof FindingType)[keyof typeof FindingType];
|
|
|
3343
3055
|
*/
|
|
3344
3056
|
export interface GetFindingV2Response {
|
|
3345
3057
|
/**
|
|
3346
|
-
* <p>The time at which the resource-based policy or IAM entity that generated the finding
|
|
3347
|
-
* was analyzed.</p>
|
|
3058
|
+
* <p>The time at which the resource-based policy or IAM entity that generated the finding was analyzed.</p>
|
|
3348
3059
|
* @public
|
|
3349
3060
|
*/
|
|
3350
3061
|
analyzedAt: Date | undefined;
|
|
@@ -3394,16 +3105,12 @@ export interface GetFindingV2Response {
|
|
|
3394
3105
|
*/
|
|
3395
3106
|
updatedAt: Date | undefined;
|
|
3396
3107
|
/**
|
|
3397
|
-
* <p>A localized message that explains the finding and provides guidance on how to address
|
|
3398
|
-
* it.</p>
|
|
3108
|
+
* <p>A localized message that explains the finding and provides guidance on how to address it.</p>
|
|
3399
3109
|
* @public
|
|
3400
3110
|
*/
|
|
3401
3111
|
findingDetails: FindingDetails[] | undefined;
|
|
3402
3112
|
/**
|
|
3403
|
-
* <p>The type of the finding. For external access analyzers, the type is
|
|
3404
|
-
* <code>ExternalAccess</code>. For unused access analyzers, the type can be
|
|
3405
|
-
* <code>UnusedIAMRole</code>, <code>UnusedIAMUserAccessKey</code>,
|
|
3406
|
-
* <code>UnusedIAMUserPassword</code>, or <code>UnusedPermission</code>.</p>
|
|
3113
|
+
* <p>The type of the finding. For external access analyzers, the type is <code>ExternalAccess</code>. For unused access analyzers, the type can be <code>UnusedIAMRole</code>, <code>UnusedIAMUserAccessKey</code>, <code>UnusedIAMUserPassword</code>, or <code>UnusedPermission</code>. For internal access analyzers, the type is <code>InternalAccess</code>.</p>
|
|
3407
3114
|
* @public
|
|
3408
3115
|
*/
|
|
3409
3116
|
findingType?: FindingType | undefined;
|
|
@@ -3413,27 +3120,17 @@ export interface GetFindingV2Response {
|
|
|
3413
3120
|
*/
|
|
3414
3121
|
export interface GetGeneratedPolicyRequest {
|
|
3415
3122
|
/**
|
|
3416
|
-
* <p>The <code>JobId</code> that is returned by the <code>StartPolicyGeneration</code>
|
|
3417
|
-
* operation. The <code>JobId</code> can be used with <code>GetGeneratedPolicy</code> to
|
|
3418
|
-
* retrieve the generated policies or used with <code>CancelPolicyGeneration</code> to cancel
|
|
3419
|
-
* the policy generation request.</p>
|
|
3123
|
+
* <p>The <code>JobId</code> that is returned by the <code>StartPolicyGeneration</code> operation. The <code>JobId</code> can be used with <code>GetGeneratedPolicy</code> to retrieve the generated policies or used with <code>CancelPolicyGeneration</code> to cancel the policy generation request.</p>
|
|
3420
3124
|
* @public
|
|
3421
3125
|
*/
|
|
3422
3126
|
jobId: string | undefined;
|
|
3423
3127
|
/**
|
|
3424
|
-
* <p>The level of detail that you want to generate. You can specify whether to generate
|
|
3425
|
-
* policies with placeholders for resource ARNs for actions that support resource level
|
|
3426
|
-
* granularity in policies.</p>
|
|
3427
|
-
* <p>For example, in the resource section of a policy, you can receive a placeholder such as
|
|
3428
|
-
* <code>"Resource":"arn:aws:s3:::$\{BucketName\}"</code> instead of <code>"*"</code>.</p>
|
|
3128
|
+
* <p>The level of detail that you want to generate. You can specify whether to generate policies with placeholders for resource ARNs for actions that support resource level granularity in policies.</p> <p>For example, in the resource section of a policy, you can receive a placeholder such as <code>"Resource":"arn:aws:s3:::$\{BucketName\}"</code> instead of <code>"*"</code>.</p>
|
|
3429
3129
|
* @public
|
|
3430
3130
|
*/
|
|
3431
3131
|
includeResourcePlaceholders?: boolean | undefined;
|
|
3432
3132
|
/**
|
|
3433
|
-
* <p>The level of detail that you want to generate. You can specify whether to generate
|
|
3434
|
-
* service-level policies. </p>
|
|
3435
|
-
* <p>IAM Access Analyzer uses <code>iam:servicelastaccessed</code> to identify services that have
|
|
3436
|
-
* been used recently to create this service-level template.</p>
|
|
3133
|
+
* <p>The level of detail that you want to generate. You can specify whether to generate service-level policies. </p> <p>IAM Access Analyzer uses <code>iam:servicelastaccessed</code> to identify services that have been used recently to create this service-level template.</p>
|
|
3437
3134
|
* @public
|
|
3438
3135
|
*/
|
|
3439
3136
|
includeServiceLevelTemplate?: boolean | undefined;
|
|
@@ -3444,8 +3141,7 @@ export interface GetGeneratedPolicyRequest {
|
|
|
3444
3141
|
*/
|
|
3445
3142
|
export interface GeneratedPolicy {
|
|
3446
3143
|
/**
|
|
3447
|
-
* <p>The text to use as the content for the new policy. The policy is created using the
|
|
3448
|
-
* <a href="https://docs.aws.amazon.com/IAM/latest/APIReference/API_CreatePolicy.html">CreatePolicy</a> action.</p>
|
|
3144
|
+
* <p>The text to use as the content for the new policy. The policy is created using the <a href="https://docs.aws.amazon.com/IAM/latest/APIReference/API_CreatePolicy.html">CreatePolicy</a> action.</p>
|
|
3449
3145
|
* @public
|
|
3450
3146
|
*/
|
|
3451
3147
|
policy: string | undefined;
|
|
@@ -3456,8 +3152,7 @@ export interface GeneratedPolicy {
|
|
|
3456
3152
|
*/
|
|
3457
3153
|
export interface TrailProperties {
|
|
3458
3154
|
/**
|
|
3459
|
-
* <p>Specifies the ARN of the trail. The format of a trail ARN is
|
|
3460
|
-
* <code>arn:aws:cloudtrail:us-east-2:123456789012:trail/MyTrail</code>.</p>
|
|
3155
|
+
* <p>Specifies the ARN of the trail. The format of a trail ARN is <code>arn:aws:cloudtrail:us-east-2:123456789012:trail/MyTrail</code>.</p>
|
|
3461
3156
|
* @public
|
|
3462
3157
|
*/
|
|
3463
3158
|
cloudTrailArn: string | undefined;
|
|
@@ -3467,9 +3162,7 @@ export interface TrailProperties {
|
|
|
3467
3162
|
*/
|
|
3468
3163
|
regions?: string[] | undefined;
|
|
3469
3164
|
/**
|
|
3470
|
-
* <p>Possible values are <code>true</code> or <code>false</code>. If set to
|
|
3471
|
-
* <code>true</code>, IAM Access Analyzer retrieves CloudTrail data from all regions to analyze and
|
|
3472
|
-
* generate a policy.</p>
|
|
3165
|
+
* <p>Possible values are <code>true</code> or <code>false</code>. If set to <code>true</code>, IAM Access Analyzer retrieves CloudTrail data from all regions to analyze and generate a policy.</p>
|
|
3473
3166
|
* @public
|
|
3474
3167
|
*/
|
|
3475
3168
|
allRegions?: boolean | undefined;
|
|
@@ -3480,21 +3173,17 @@ export interface TrailProperties {
|
|
|
3480
3173
|
*/
|
|
3481
3174
|
export interface CloudTrailProperties {
|
|
3482
3175
|
/**
|
|
3483
|
-
* <p>A <code>TrailProperties</code> object that contains settings for trail
|
|
3484
|
-
* properties.</p>
|
|
3176
|
+
* <p>A <code>TrailProperties</code> object that contains settings for trail properties.</p>
|
|
3485
3177
|
* @public
|
|
3486
3178
|
*/
|
|
3487
3179
|
trailProperties: TrailProperties[] | undefined;
|
|
3488
3180
|
/**
|
|
3489
|
-
* <p>The start of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events
|
|
3490
|
-
* with a timestamp before this time are not considered to generate a policy.</p>
|
|
3181
|
+
* <p>The start of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events with a timestamp before this time are not considered to generate a policy.</p>
|
|
3491
3182
|
* @public
|
|
3492
3183
|
*/
|
|
3493
3184
|
startTime: Date | undefined;
|
|
3494
3185
|
/**
|
|
3495
|
-
* <p>The end of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events with
|
|
3496
|
-
* a timestamp after this time are not considered to generate a policy. If this is not
|
|
3497
|
-
* included in the request, the default value is the current time.</p>
|
|
3186
|
+
* <p>The end of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events with a timestamp after this time are not considered to generate a policy. If this is not included in the request, the default value is the current time.</p>
|
|
3498
3187
|
* @public
|
|
3499
3188
|
*/
|
|
3500
3189
|
endTime: Date | undefined;
|
|
@@ -3505,9 +3194,7 @@ export interface CloudTrailProperties {
|
|
|
3505
3194
|
*/
|
|
3506
3195
|
export interface GeneratedPolicyProperties {
|
|
3507
3196
|
/**
|
|
3508
|
-
* <p>This value is set to <code>true</code> if the generated policy contains all possible
|
|
3509
|
-
* actions for a service that IAM Access Analyzer identified from the CloudTrail trail that you specified,
|
|
3510
|
-
* and <code>false</code> otherwise.</p>
|
|
3197
|
+
* <p>This value is set to <code>true</code> if the generated policy contains all possible actions for a service that IAM Access Analyzer identified from the CloudTrail trail that you specified, and <code>false</code> otherwise.</p>
|
|
3511
3198
|
* @public
|
|
3512
3199
|
*/
|
|
3513
3200
|
isComplete?: boolean | undefined;
|
|
@@ -3528,14 +3215,12 @@ export interface GeneratedPolicyProperties {
|
|
|
3528
3215
|
*/
|
|
3529
3216
|
export interface GeneratedPolicyResult {
|
|
3530
3217
|
/**
|
|
3531
|
-
* <p>A <code>GeneratedPolicyProperties</code> object that contains properties of the
|
|
3532
|
-
* generated policy.</p>
|
|
3218
|
+
* <p>A <code>GeneratedPolicyProperties</code> object that contains properties of the generated policy.</p>
|
|
3533
3219
|
* @public
|
|
3534
3220
|
*/
|
|
3535
3221
|
properties: GeneratedPolicyProperties | undefined;
|
|
3536
3222
|
/**
|
|
3537
|
-
* <p>The text to use as the content for the new policy. The policy is created using the
|
|
3538
|
-
* <a href="https://docs.aws.amazon.com/IAM/latest/APIReference/API_CreatePolicy.html">CreatePolicy</a> action.</p>
|
|
3223
|
+
* <p>The text to use as the content for the new policy. The policy is created using the <a href="https://docs.aws.amazon.com/IAM/latest/APIReference/API_CreatePolicy.html">CreatePolicy</a> action.</p>
|
|
3539
3224
|
* @public
|
|
3540
3225
|
*/
|
|
3541
3226
|
generatedPolicies?: GeneratedPolicy[] | undefined;
|
|
@@ -3565,8 +3250,7 @@ export interface JobError {
|
|
|
3565
3250
|
*/
|
|
3566
3251
|
code: JobErrorCode | undefined;
|
|
3567
3252
|
/**
|
|
3568
|
-
* <p>Specific information about the error. For example, which service quota was exceeded or
|
|
3569
|
-
* which resource was not found.</p>
|
|
3253
|
+
* <p>Specific information about the error. For example, which service quota was exceeded or which resource was not found.</p>
|
|
3570
3254
|
* @public
|
|
3571
3255
|
*/
|
|
3572
3256
|
message: string | undefined;
|
|
@@ -3591,10 +3275,7 @@ export type JobStatus = (typeof JobStatus)[keyof typeof JobStatus];
|
|
|
3591
3275
|
*/
|
|
3592
3276
|
export interface JobDetails {
|
|
3593
3277
|
/**
|
|
3594
|
-
* <p>The <code>JobId</code> that is returned by the <code>StartPolicyGeneration</code>
|
|
3595
|
-
* operation. The <code>JobId</code> can be used with <code>GetGeneratedPolicy</code> to
|
|
3596
|
-
* retrieve the generated policies or used with <code>CancelPolicyGeneration</code> to cancel
|
|
3597
|
-
* the policy generation request.</p>
|
|
3278
|
+
* <p>The <code>JobId</code> that is returned by the <code>StartPolicyGeneration</code> operation. The <code>JobId</code> can be used with <code>GetGeneratedPolicy</code> to retrieve the generated policies or used with <code>CancelPolicyGeneration</code> to cancel the policy generation request.</p>
|
|
3598
3279
|
* @public
|
|
3599
3280
|
*/
|
|
3600
3281
|
jobId: string | undefined;
|
|
@@ -3624,14 +3305,12 @@ export interface JobDetails {
|
|
|
3624
3305
|
*/
|
|
3625
3306
|
export interface GetGeneratedPolicyResponse {
|
|
3626
3307
|
/**
|
|
3627
|
-
* <p>A <code>GeneratedPolicyDetails</code> object that contains details about the generated
|
|
3628
|
-
* policy.</p>
|
|
3308
|
+
* <p>A <code>GeneratedPolicyDetails</code> object that contains details about the generated policy.</p>
|
|
3629
3309
|
* @public
|
|
3630
3310
|
*/
|
|
3631
3311
|
jobDetails: JobDetails | undefined;
|
|
3632
3312
|
/**
|
|
3633
|
-
* <p>A <code>GeneratedPolicyResult</code> object that contains the generated policies and
|
|
3634
|
-
* associated details.</p>
|
|
3313
|
+
* <p>A <code>GeneratedPolicyResult</code> object that contains the generated policies and associated details.</p>
|
|
3635
3314
|
* @public
|
|
3636
3315
|
*/
|
|
3637
3316
|
generatedPolicyResult: GeneratedPolicyResult | undefined;
|
|
@@ -3646,8 +3325,7 @@ export interface ListAccessPreviewFindingsRequest {
|
|
|
3646
3325
|
*/
|
|
3647
3326
|
accessPreviewId: string | undefined;
|
|
3648
3327
|
/**
|
|
3649
|
-
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
|
|
3650
|
-
* the analyzer</a> used to generate the access.</p>
|
|
3328
|
+
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the analyzer</a> used to generate the access.</p>
|
|
3651
3329
|
* @public
|
|
3652
3330
|
*/
|
|
3653
3331
|
analyzerArn: string | undefined;
|
|
@@ -3686,15 +3364,12 @@ export type FindingChangeType = (typeof FindingChangeType)[keyof typeof FindingC
|
|
|
3686
3364
|
*/
|
|
3687
3365
|
export interface AccessPreviewFinding {
|
|
3688
3366
|
/**
|
|
3689
|
-
* <p>The ID of the access preview finding. This ID uniquely identifies the element in the
|
|
3690
|
-
* list of access preview findings and is not related to the finding ID in Access
|
|
3691
|
-
* Analyzer.</p>
|
|
3367
|
+
* <p>The ID of the access preview finding. This ID uniquely identifies the element in the list of access preview findings and is not related to the finding ID in Access Analyzer.</p>
|
|
3692
3368
|
* @public
|
|
3693
3369
|
*/
|
|
3694
3370
|
id: string | undefined;
|
|
3695
3371
|
/**
|
|
3696
|
-
* <p>The existing ID of the finding in IAM Access Analyzer, provided only for existing
|
|
3697
|
-
* findings.</p>
|
|
3372
|
+
* <p>The existing ID of the finding in IAM Access Analyzer, provided only for existing findings.</p>
|
|
3698
3373
|
* @public
|
|
3699
3374
|
*/
|
|
3700
3375
|
existingFindingId?: string | undefined;
|
|
@@ -3709,8 +3384,7 @@ export interface AccessPreviewFinding {
|
|
|
3709
3384
|
*/
|
|
3710
3385
|
principal?: Record<string, string> | undefined;
|
|
3711
3386
|
/**
|
|
3712
|
-
* <p>The action in the analyzed policy statement that an external principal has permission to
|
|
3713
|
-
* perform.</p>
|
|
3387
|
+
* <p>The action in the analyzed policy statement that an external principal has permission to perform.</p>
|
|
3714
3388
|
* @public
|
|
3715
3389
|
*/
|
|
3716
3390
|
action?: string[] | undefined;
|
|
@@ -3720,14 +3394,12 @@ export interface AccessPreviewFinding {
|
|
|
3720
3394
|
*/
|
|
3721
3395
|
condition?: Record<string, string> | undefined;
|
|
3722
3396
|
/**
|
|
3723
|
-
* <p>The resource that an external principal has access to. This is the resource associated
|
|
3724
|
-
* with the access preview.</p>
|
|
3397
|
+
* <p>The resource that an external principal has access to. This is the resource associated with the access preview.</p>
|
|
3725
3398
|
* @public
|
|
3726
3399
|
*/
|
|
3727
3400
|
resource?: string | undefined;
|
|
3728
3401
|
/**
|
|
3729
|
-
* <p>Indicates whether the policy that generated the finding allows public access to the
|
|
3730
|
-
* resource.</p>
|
|
3402
|
+
* <p>Indicates whether the policy that generated the finding allows public access to the resource.</p>
|
|
3731
3403
|
* @public
|
|
3732
3404
|
*/
|
|
3733
3405
|
isPublic?: boolean | undefined;
|
|
@@ -3742,42 +3414,17 @@ export interface AccessPreviewFinding {
|
|
|
3742
3414
|
*/
|
|
3743
3415
|
createdAt: Date | undefined;
|
|
3744
3416
|
/**
|
|
3745
|
-
* <p>Provides context on how the access preview finding compares to existing access
|
|
3746
|
-
* identified in IAM Access Analyzer.</p>
|
|
3747
|
-
* <ul>
|
|
3748
|
-
* <li>
|
|
3749
|
-
* <p>
|
|
3750
|
-
* <code>New</code> - The finding is for newly-introduced access.</p>
|
|
3751
|
-
* </li>
|
|
3752
|
-
* <li>
|
|
3753
|
-
* <p>
|
|
3754
|
-
* <code>Unchanged</code> - The preview finding is an existing finding that would
|
|
3755
|
-
* remain unchanged.</p>
|
|
3756
|
-
* </li>
|
|
3757
|
-
* <li>
|
|
3758
|
-
* <p>
|
|
3759
|
-
* <code>Changed</code> - The preview finding is an existing finding with a change in
|
|
3760
|
-
* status.</p>
|
|
3761
|
-
* </li>
|
|
3762
|
-
* </ul>
|
|
3763
|
-
* <p>For example, a <code>Changed</code> finding with preview status <code>Resolved</code>
|
|
3764
|
-
* and existing status <code>Active</code> indicates the existing <code>Active</code> finding
|
|
3765
|
-
* would become <code>Resolved</code> as a result of the proposed permissions change.</p>
|
|
3417
|
+
* <p>Provides context on how the access preview finding compares to existing access identified in IAM Access Analyzer.</p> <ul> <li> <p> <code>New</code> - The finding is for newly-introduced access.</p> </li> <li> <p> <code>Unchanged</code> - The preview finding is an existing finding that would remain unchanged.</p> </li> <li> <p> <code>Changed</code> - The preview finding is an existing finding with a change in status.</p> </li> </ul> <p>For example, a <code>Changed</code> finding with preview status <code>Resolved</code> and existing status <code>Active</code> indicates the existing <code>Active</code> finding would become <code>Resolved</code> as a result of the proposed permissions change.</p>
|
|
3766
3418
|
* @public
|
|
3767
3419
|
*/
|
|
3768
3420
|
changeType: FindingChangeType | undefined;
|
|
3769
3421
|
/**
|
|
3770
|
-
* <p>The preview status of the finding. This is what the status of the finding would be after
|
|
3771
|
-
* permissions deployment. For example, a <code>Changed</code> finding with preview status
|
|
3772
|
-
* <code>Resolved</code> and existing status <code>Active</code> indicates the existing
|
|
3773
|
-
* <code>Active</code> finding would become <code>Resolved</code> as a result of the
|
|
3774
|
-
* proposed permissions change.</p>
|
|
3422
|
+
* <p>The preview status of the finding. This is what the status of the finding would be after permissions deployment. For example, a <code>Changed</code> finding with preview status <code>Resolved</code> and existing status <code>Active</code> indicates the existing <code>Active</code> finding would become <code>Resolved</code> as a result of the proposed permissions change.</p>
|
|
3775
3423
|
* @public
|
|
3776
3424
|
*/
|
|
3777
3425
|
status: FindingStatus | undefined;
|
|
3778
3426
|
/**
|
|
3779
|
-
* <p>The Amazon Web Services account ID that owns the resource. For most Amazon Web Services resources, the owning
|
|
3780
|
-
* account is the account in which the resource was created.</p>
|
|
3427
|
+
* <p>The Amazon Web Services account ID that owns the resource. For most Amazon Web Services resources, the owning account is the account in which the resource was created.</p>
|
|
3781
3428
|
* @public
|
|
3782
3429
|
*/
|
|
3783
3430
|
resourceOwnerAccount: string | undefined;
|
|
@@ -3787,14 +3434,12 @@ export interface AccessPreviewFinding {
|
|
|
3787
3434
|
*/
|
|
3788
3435
|
error?: string | undefined;
|
|
3789
3436
|
/**
|
|
3790
|
-
* <p>The sources of the finding. This indicates how the access that generated the finding is
|
|
3791
|
-
* granted. It is populated for Amazon S3 bucket findings.</p>
|
|
3437
|
+
* <p>The sources of the finding. This indicates how the access that generated the finding is granted. It is populated for Amazon S3 bucket findings.</p>
|
|
3792
3438
|
* @public
|
|
3793
3439
|
*/
|
|
3794
3440
|
sources?: FindingSource[] | undefined;
|
|
3795
3441
|
/**
|
|
3796
|
-
* <p>The type of restriction applied to the finding by the resource owner with an Organizations
|
|
3797
|
-
* resource control policy (RCP).</p>
|
|
3442
|
+
* <p>The type of restriction applied to the finding by the resource owner with an Organizations resource control policy (RCP).</p>
|
|
3798
3443
|
* @public
|
|
3799
3444
|
*/
|
|
3800
3445
|
resourceControlPolicyRestriction?: ResourceControlPolicyRestriction | undefined;
|
|
@@ -3819,8 +3464,7 @@ export interface ListAccessPreviewFindingsResponse {
|
|
|
3819
3464
|
*/
|
|
3820
3465
|
export interface ListAccessPreviewsRequest {
|
|
3821
3466
|
/**
|
|
3822
|
-
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
|
|
3823
|
-
* the analyzer</a> used to generate the access preview.</p>
|
|
3467
|
+
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the analyzer</a> used to generate the access preview.</p>
|
|
3824
3468
|
* @public
|
|
3825
3469
|
*/
|
|
3826
3470
|
analyzerArn: string | undefined;
|
|
@@ -3856,30 +3500,12 @@ export interface AccessPreviewSummary {
|
|
|
3856
3500
|
*/
|
|
3857
3501
|
createdAt: Date | undefined;
|
|
3858
3502
|
/**
|
|
3859
|
-
* <p>The status of the access preview.</p>
|
|
3860
|
-
* <ul>
|
|
3861
|
-
* <li>
|
|
3862
|
-
* <p>
|
|
3863
|
-
* <code>Creating</code> - The access preview creation is in progress.</p>
|
|
3864
|
-
* </li>
|
|
3865
|
-
* <li>
|
|
3866
|
-
* <p>
|
|
3867
|
-
* <code>Completed</code> - The access preview is complete and previews the findings
|
|
3868
|
-
* for external access to the resource.</p>
|
|
3869
|
-
* </li>
|
|
3870
|
-
* <li>
|
|
3871
|
-
* <p>
|
|
3872
|
-
* <code>Failed</code> - The access preview creation has failed.</p>
|
|
3873
|
-
* </li>
|
|
3874
|
-
* </ul>
|
|
3503
|
+
* <p>The status of the access preview.</p> <ul> <li> <p> <code>Creating</code> - The access preview creation is in progress.</p> </li> <li> <p> <code>Completed</code> - The access preview is complete and previews the findings for external access to the resource.</p> </li> <li> <p> <code>Failed</code> - The access preview creation has failed.</p> </li> </ul>
|
|
3875
3504
|
* @public
|
|
3876
3505
|
*/
|
|
3877
3506
|
status: AccessPreviewStatus | undefined;
|
|
3878
3507
|
/**
|
|
3879
|
-
* <p>Provides more details about the current status of the access preview. For example, if
|
|
3880
|
-
* the creation of the access preview fails, a <code>Failed</code> status is returned. This
|
|
3881
|
-
* failure can be due to an internal issue with the analysis or due to an invalid proposed
|
|
3882
|
-
* resource configuration.</p>
|
|
3508
|
+
* <p>Provides more details about the current status of the access preview. For example, if the creation of the access preview fails, a <code>Failed</code> status is returned. This failure can be due to an internal issue with the analysis or due to an invalid proposed resource configuration.</p>
|
|
3883
3509
|
* @public
|
|
3884
3510
|
*/
|
|
3885
3511
|
statusReason?: AccessPreviewStatusReason | undefined;
|
|
@@ -3905,8 +3531,7 @@ export interface ListAccessPreviewsResponse {
|
|
|
3905
3531
|
*/
|
|
3906
3532
|
export interface ListAnalyzedResourcesRequest {
|
|
3907
3533
|
/**
|
|
3908
|
-
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
|
|
3909
|
-
* the analyzer</a> to retrieve a list of analyzed resources from.</p>
|
|
3534
|
+
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the analyzer</a> to retrieve a list of analyzed resources from.</p>
|
|
3910
3535
|
* @public
|
|
3911
3536
|
*/
|
|
3912
3537
|
analyzerArn: string | undefined;
|
|
@@ -3989,8 +3614,7 @@ export interface SortCriteria {
|
|
|
3989
3614
|
*/
|
|
3990
3615
|
export interface ListFindingsRequest {
|
|
3991
3616
|
/**
|
|
3992
|
-
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
|
|
3993
|
-
* the analyzer</a> to retrieve findings from.</p>
|
|
3617
|
+
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the analyzer</a> to retrieve findings from.</p>
|
|
3994
3618
|
* @public
|
|
3995
3619
|
*/
|
|
3996
3620
|
analyzerArn: string | undefined;
|
|
@@ -4031,8 +3655,7 @@ export interface FindingSummary {
|
|
|
4031
3655
|
*/
|
|
4032
3656
|
principal?: Record<string, string> | undefined;
|
|
4033
3657
|
/**
|
|
4034
|
-
* <p>The action in the analyzed policy statement that an external principal has permission to
|
|
4035
|
-
* use.</p>
|
|
3658
|
+
* <p>The action in the analyzed policy statement that an external principal has permission to use.</p>
|
|
4036
3659
|
* @public
|
|
4037
3660
|
*/
|
|
4038
3661
|
action?: string[] | undefined;
|
|
@@ -4042,8 +3665,7 @@ export interface FindingSummary {
|
|
|
4042
3665
|
*/
|
|
4043
3666
|
resource?: string | undefined;
|
|
4044
3667
|
/**
|
|
4045
|
-
* <p>Indicates whether the finding reports a resource that has a policy that allows public
|
|
4046
|
-
* access.</p>
|
|
3668
|
+
* <p>Indicates whether the finding reports a resource that has a policy that allows public access.</p>
|
|
4047
3669
|
* @public
|
|
4048
3670
|
*/
|
|
4049
3671
|
isPublic?: boolean | undefined;
|
|
@@ -4063,8 +3685,7 @@ export interface FindingSummary {
|
|
|
4063
3685
|
*/
|
|
4064
3686
|
createdAt: Date | undefined;
|
|
4065
3687
|
/**
|
|
4066
|
-
* <p>The time at which the resource-based policy that generated the finding was
|
|
4067
|
-
* analyzed.</p>
|
|
3688
|
+
* <p>The time at which the resource-based policy that generated the finding was analyzed.</p>
|
|
4068
3689
|
* @public
|
|
4069
3690
|
*/
|
|
4070
3691
|
analyzedAt: Date | undefined;
|
|
@@ -4089,14 +3710,12 @@ export interface FindingSummary {
|
|
|
4089
3710
|
*/
|
|
4090
3711
|
error?: string | undefined;
|
|
4091
3712
|
/**
|
|
4092
|
-
* <p>The sources of the finding. This indicates how the access that generated the finding is
|
|
4093
|
-
* granted. It is populated for Amazon S3 bucket findings.</p>
|
|
3713
|
+
* <p>The sources of the finding. This indicates how the access that generated the finding is granted. It is populated for Amazon S3 bucket findings.</p>
|
|
4094
3714
|
* @public
|
|
4095
3715
|
*/
|
|
4096
3716
|
sources?: FindingSource[] | undefined;
|
|
4097
3717
|
/**
|
|
4098
|
-
* <p>The type of restriction applied to the finding by the resource owner with an Organizations
|
|
4099
|
-
* resource control policy (RCP).</p>
|
|
3718
|
+
* <p>The type of restriction applied to the finding by the resource owner with an Organizations resource control policy (RCP).</p>
|
|
4100
3719
|
* @public
|
|
4101
3720
|
*/
|
|
4102
3721
|
resourceControlPolicyRestriction?: ResourceControlPolicyRestriction | undefined;
|
|
@@ -4107,8 +3726,7 @@ export interface FindingSummary {
|
|
|
4107
3726
|
*/
|
|
4108
3727
|
export interface ListFindingsResponse {
|
|
4109
3728
|
/**
|
|
4110
|
-
* <p>A list of findings retrieved from the analyzer that match the filter criteria specified,
|
|
4111
|
-
* if any.</p>
|
|
3729
|
+
* <p>A list of findings retrieved from the analyzer that match the filter criteria specified, if any.</p>
|
|
4112
3730
|
* @public
|
|
4113
3731
|
*/
|
|
4114
3732
|
findings: FindingSummary[] | undefined;
|
|
@@ -4123,8 +3741,7 @@ export interface ListFindingsResponse {
|
|
|
4123
3741
|
*/
|
|
4124
3742
|
export interface ListFindingsV2Request {
|
|
4125
3743
|
/**
|
|
4126
|
-
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
|
|
4127
|
-
* the analyzer</a> to retrieve findings from.</p>
|
|
3744
|
+
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the analyzer</a> to retrieve findings from.</p>
|
|
4128
3745
|
* @public
|
|
4129
3746
|
*/
|
|
4130
3747
|
analyzerArn: string | undefined;
|
|
@@ -4155,8 +3772,7 @@ export interface ListFindingsV2Request {
|
|
|
4155
3772
|
*/
|
|
4156
3773
|
export interface FindingSummaryV2 {
|
|
4157
3774
|
/**
|
|
4158
|
-
* <p>The time at which the resource-based policy or IAM entity that generated the finding
|
|
4159
|
-
* was analyzed.</p>
|
|
3775
|
+
* <p>The time at which the resource-based policy or IAM entity that generated the finding was analyzed.</p>
|
|
4160
3776
|
* @public
|
|
4161
3777
|
*/
|
|
4162
3778
|
analyzedAt: Date | undefined;
|
|
@@ -4201,7 +3817,7 @@ export interface FindingSummaryV2 {
|
|
|
4201
3817
|
*/
|
|
4202
3818
|
updatedAt: Date | undefined;
|
|
4203
3819
|
/**
|
|
4204
|
-
* <p>The type of the external access
|
|
3820
|
+
* <p>The type of the access finding. For external access analyzers, the type is <code>ExternalAccess</code>. For unused access analyzers, the type can be <code>UnusedIAMRole</code>, <code>UnusedIAMUserAccessKey</code>, <code>UnusedIAMUserPassword</code>, or <code>UnusedPermission</code>. For internal access analyzers, the type is <code>InternalAccess</code>.</p>
|
|
4205
3821
|
* @public
|
|
4206
3822
|
*/
|
|
4207
3823
|
findingType?: FindingType | undefined;
|
|
@@ -4211,8 +3827,7 @@ export interface FindingSummaryV2 {
|
|
|
4211
3827
|
*/
|
|
4212
3828
|
export interface ListFindingsV2Response {
|
|
4213
3829
|
/**
|
|
4214
|
-
* <p>A list of findings retrieved from the analyzer that match the filter criteria specified,
|
|
4215
|
-
* if any.</p>
|
|
3830
|
+
* <p>A list of findings retrieved from the analyzer that match the filter criteria specified, if any.</p>
|
|
4216
3831
|
* @public
|
|
4217
3832
|
*/
|
|
4218
3833
|
findings: FindingSummaryV2[] | undefined;
|
|
@@ -4227,9 +3842,7 @@ export interface ListFindingsV2Response {
|
|
|
4227
3842
|
*/
|
|
4228
3843
|
export interface ListPolicyGenerationsRequest {
|
|
4229
3844
|
/**
|
|
4230
|
-
* <p>The ARN of the IAM entity (user or role) for which you are generating a policy. Use
|
|
4231
|
-
* this with <code>ListGeneratedPolicies</code> to filter the results to only include results
|
|
4232
|
-
* for a specific principal.</p>
|
|
3845
|
+
* <p>The ARN of the IAM entity (user or role) for which you are generating a policy. Use this with <code>ListGeneratedPolicies</code> to filter the results to only include results for a specific principal.</p>
|
|
4233
3846
|
* @public
|
|
4234
3847
|
*/
|
|
4235
3848
|
principalArn?: string | undefined;
|
|
@@ -4250,10 +3863,7 @@ export interface ListPolicyGenerationsRequest {
|
|
|
4250
3863
|
*/
|
|
4251
3864
|
export interface PolicyGeneration {
|
|
4252
3865
|
/**
|
|
4253
|
-
* <p>The <code>JobId</code> that is returned by the <code>StartPolicyGeneration</code>
|
|
4254
|
-
* operation. The <code>JobId</code> can be used with <code>GetGeneratedPolicy</code> to
|
|
4255
|
-
* retrieve the generated policies or used with <code>CancelPolicyGeneration</code> to cancel
|
|
4256
|
-
* the policy generation request.</p>
|
|
3866
|
+
* <p>The <code>JobId</code> that is returned by the <code>StartPolicyGeneration</code> operation. The <code>JobId</code> can be used with <code>GetGeneratedPolicy</code> to retrieve the generated policies or used with <code>CancelPolicyGeneration</code> to cancel the policy generation request.</p>
|
|
4257
3867
|
* @public
|
|
4258
3868
|
*/
|
|
4259
3869
|
jobId: string | undefined;
|
|
@@ -4283,8 +3893,7 @@ export interface PolicyGeneration {
|
|
|
4283
3893
|
*/
|
|
4284
3894
|
export interface ListPolicyGenerationsResponse {
|
|
4285
3895
|
/**
|
|
4286
|
-
* <p>A <code>PolicyGeneration</code> object that contains details about the generated
|
|
4287
|
-
* policy.</p>
|
|
3896
|
+
* <p>A <code>PolicyGeneration</code> object that contains details about the generated policy.</p>
|
|
4288
3897
|
* @public
|
|
4289
3898
|
*/
|
|
4290
3899
|
policyGenerations: PolicyGeneration[] | undefined;
|
|
@@ -4322,8 +3931,7 @@ export interface ListTagsForResourceResponse {
|
|
|
4322
3931
|
*/
|
|
4323
3932
|
export interface Trail {
|
|
4324
3933
|
/**
|
|
4325
|
-
* <p>Specifies the ARN of the trail. The format of a trail ARN is
|
|
4326
|
-
* <code>arn:aws:cloudtrail:us-east-2:123456789012:trail/MyTrail</code>.</p>
|
|
3934
|
+
* <p>Specifies the ARN of the trail. The format of a trail ARN is <code>arn:aws:cloudtrail:us-east-2:123456789012:trail/MyTrail</code>.</p>
|
|
4327
3935
|
* @public
|
|
4328
3936
|
*/
|
|
4329
3937
|
cloudTrailArn: string | undefined;
|
|
@@ -4333,9 +3941,7 @@ export interface Trail {
|
|
|
4333
3941
|
*/
|
|
4334
3942
|
regions?: string[] | undefined;
|
|
4335
3943
|
/**
|
|
4336
|
-
* <p>Possible values are <code>true</code> or <code>false</code>. If set to
|
|
4337
|
-
* <code>true</code>, IAM Access Analyzer retrieves CloudTrail data from all regions to analyze and
|
|
4338
|
-
* generate a policy.</p>
|
|
3944
|
+
* <p>Possible values are <code>true</code> or <code>false</code>. If set to <code>true</code>, IAM Access Analyzer retrieves CloudTrail data from all regions to analyze and generate a policy.</p>
|
|
4339
3945
|
* @public
|
|
4340
3946
|
*/
|
|
4341
3947
|
allRegions?: boolean | undefined;
|
|
@@ -4351,28 +3957,23 @@ export interface CloudTrailDetails {
|
|
|
4351
3957
|
*/
|
|
4352
3958
|
trails: Trail[] | undefined;
|
|
4353
3959
|
/**
|
|
4354
|
-
* <p>The ARN of the service role that IAM Access Analyzer uses to access your CloudTrail trail and
|
|
4355
|
-
* service last accessed information.</p>
|
|
3960
|
+
* <p>The ARN of the service role that IAM Access Analyzer uses to access your CloudTrail trail and service last accessed information.</p>
|
|
4356
3961
|
* @public
|
|
4357
3962
|
*/
|
|
4358
3963
|
accessRole: string | undefined;
|
|
4359
3964
|
/**
|
|
4360
|
-
* <p>The start of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events
|
|
4361
|
-
* with a timestamp before this time are not considered to generate a policy.</p>
|
|
3965
|
+
* <p>The start of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events with a timestamp before this time are not considered to generate a policy.</p>
|
|
4362
3966
|
* @public
|
|
4363
3967
|
*/
|
|
4364
3968
|
startTime: Date | undefined;
|
|
4365
3969
|
/**
|
|
4366
|
-
* <p>The end of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events with
|
|
4367
|
-
* a timestamp after this time are not considered to generate a policy. If this is not
|
|
4368
|
-
* included in the request, the default value is the current time.</p>
|
|
3970
|
+
* <p>The end of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events with a timestamp after this time are not considered to generate a policy. If this is not included in the request, the default value is the current time.</p>
|
|
4369
3971
|
* @public
|
|
4370
3972
|
*/
|
|
4371
3973
|
endTime?: Date | undefined;
|
|
4372
3974
|
}
|
|
4373
3975
|
/**
|
|
4374
|
-
* <p>Contains the ARN details about the IAM entity for which the policy is
|
|
4375
|
-
* generated.</p>
|
|
3976
|
+
* <p>Contains the ARN details about the IAM entity for which the policy is generated.</p>
|
|
4376
3977
|
* @public
|
|
4377
3978
|
*/
|
|
4378
3979
|
export interface PolicyGenerationDetails {
|
|
@@ -4387,25 +3988,17 @@ export interface PolicyGenerationDetails {
|
|
|
4387
3988
|
*/
|
|
4388
3989
|
export interface StartPolicyGenerationRequest {
|
|
4389
3990
|
/**
|
|
4390
|
-
* <p>Contains the ARN of the IAM entity (user or role) for which you are generating a
|
|
4391
|
-
* policy.</p>
|
|
3991
|
+
* <p>Contains the ARN of the IAM entity (user or role) for which you are generating a policy.</p>
|
|
4392
3992
|
* @public
|
|
4393
3993
|
*/
|
|
4394
3994
|
policyGenerationDetails: PolicyGenerationDetails | undefined;
|
|
4395
3995
|
/**
|
|
4396
|
-
* <p>A <code>CloudTrailDetails</code> object that contains details about a <code>Trail</code>
|
|
4397
|
-
* that you want to analyze to generate policies.</p>
|
|
3996
|
+
* <p>A <code>CloudTrailDetails</code> object that contains details about a <code>Trail</code> that you want to analyze to generate policies.</p>
|
|
4398
3997
|
* @public
|
|
4399
3998
|
*/
|
|
4400
3999
|
cloudTrailDetails?: CloudTrailDetails | undefined;
|
|
4401
4000
|
/**
|
|
4402
|
-
* <p>A unique, case-sensitive identifier that you provide to ensure the idempotency of the
|
|
4403
|
-
* request. Idempotency ensures that an API request completes only once. With an idempotent
|
|
4404
|
-
* request, if the original request completes successfully, the subsequent retries with the
|
|
4405
|
-
* same client token return the result from the original successful request and they have no
|
|
4406
|
-
* additional effect.</p>
|
|
4407
|
-
* <p>If you do not specify a client token, one is automatically generated by the Amazon Web Services
|
|
4408
|
-
* SDK.</p>
|
|
4001
|
+
* <p>A unique, case-sensitive identifier that you provide to ensure the idempotency of the request. Idempotency ensures that an API request completes only once. With an idempotent request, if the original request completes successfully, the subsequent retries with the same client token return the result from the original successful request and they have no additional effect.</p> <p>If you do not specify a client token, one is automatically generated by the Amazon Web Services SDK.</p>
|
|
4409
4002
|
* @public
|
|
4410
4003
|
*/
|
|
4411
4004
|
clientToken?: string | undefined;
|
|
@@ -4415,10 +4008,7 @@ export interface StartPolicyGenerationRequest {
|
|
|
4415
4008
|
*/
|
|
4416
4009
|
export interface StartPolicyGenerationResponse {
|
|
4417
4010
|
/**
|
|
4418
|
-
* <p>The <code>JobId</code> that is returned by the <code>StartPolicyGeneration</code>
|
|
4419
|
-
* operation. The <code>JobId</code> can be used with <code>GetGeneratedPolicy</code> to
|
|
4420
|
-
* retrieve the generated policies or used with <code>CancelPolicyGeneration</code> to cancel
|
|
4421
|
-
* the policy generation request.</p>
|
|
4011
|
+
* <p>The <code>JobId</code> that is returned by the <code>StartPolicyGeneration</code> operation. The <code>JobId</code> can be used with <code>GetGeneratedPolicy</code> to retrieve the generated policies or used with <code>CancelPolicyGeneration</code> to cancel the policy generation request.</p>
|
|
4422
4012
|
* @public
|
|
4423
4013
|
*/
|
|
4424
4014
|
jobId: string | undefined;
|
|
@@ -4429,9 +4019,7 @@ export interface StartPolicyGenerationResponse {
|
|
|
4429
4019
|
*/
|
|
4430
4020
|
export interface StartResourceScanRequest {
|
|
4431
4021
|
/**
|
|
4432
|
-
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
|
|
4433
|
-
* the analyzer</a> to use to scan the policies applied to the specified
|
|
4434
|
-
* resource.</p>
|
|
4022
|
+
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the analyzer</a> to use to scan the policies applied to the specified resource.</p>
|
|
4435
4023
|
* @public
|
|
4436
4024
|
*/
|
|
4437
4025
|
analyzerArn: string | undefined;
|
|
@@ -4441,8 +4029,7 @@ export interface StartResourceScanRequest {
|
|
|
4441
4029
|
*/
|
|
4442
4030
|
resourceArn: string | undefined;
|
|
4443
4031
|
/**
|
|
4444
|
-
* <p>The Amazon Web Services account ID that owns the resource. For most Amazon Web Services resources, the owning
|
|
4445
|
-
* account is the account in which the resource was created.</p>
|
|
4032
|
+
* <p>The Amazon Web Services account ID that owns the resource. For most Amazon Web Services resources, the owning account is the account in which the resource was created.</p>
|
|
4446
4033
|
* @public
|
|
4447
4034
|
*/
|
|
4448
4035
|
resourceOwnerAccount?: string | undefined;
|
|
@@ -4501,15 +4088,12 @@ export type FindingStatusUpdate = "ACTIVE" | "ARCHIVED";
|
|
|
4501
4088
|
*/
|
|
4502
4089
|
export interface UpdateFindingsRequest {
|
|
4503
4090
|
/**
|
|
4504
|
-
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
|
|
4505
|
-
* the analyzer</a> that generated the findings to update.</p>
|
|
4091
|
+
* <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the analyzer</a> that generated the findings to update.</p>
|
|
4506
4092
|
* @public
|
|
4507
4093
|
*/
|
|
4508
4094
|
analyzerArn: string | undefined;
|
|
4509
4095
|
/**
|
|
4510
|
-
* <p>The state represents the action to take to update the finding Status. Use
|
|
4511
|
-
* <code>ARCHIVE</code> to change an Active finding to an Archived finding. Use
|
|
4512
|
-
* <code>ACTIVE</code> to change an Archived finding to an Active finding.</p>
|
|
4096
|
+
* <p>The state represents the action to take to update the finding Status. Use <code>ARCHIVE</code> to change an Active finding to an Archived finding. Use <code>ACTIVE</code> to change an Archived finding to an Active finding.</p>
|
|
4513
4097
|
* @public
|
|
4514
4098
|
*/
|
|
4515
4099
|
status: FindingStatusUpdate | undefined;
|
|
@@ -4604,27 +4188,12 @@ export interface ValidatePolicyRequest {
|
|
|
4604
4188
|
*/
|
|
4605
4189
|
policyDocument: string | undefined;
|
|
4606
4190
|
/**
|
|
4607
|
-
* <p>The type of policy to validate. Identity policies grant permissions to IAM principals.
|
|
4608
|
-
* Identity policies include managed and inline policies for IAM roles, users, and
|
|
4609
|
-
* groups.</p>
|
|
4610
|
-
* <p>Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust
|
|
4611
|
-
* policies for IAM roles and bucket policies for Amazon S3 buckets. You can provide a generic
|
|
4612
|
-
* input such as identity policy or resource policy or a specific input such as managed policy
|
|
4613
|
-
* or Amazon S3 bucket policy. </p>
|
|
4614
|
-
* <p>Service control policies (SCPs) are a type of organization policy attached to an Amazon Web Services
|
|
4615
|
-
* organization, organizational unit (OU), or an account.</p>
|
|
4191
|
+
* <p>The type of policy to validate. Identity policies grant permissions to IAM principals. Identity policies include managed and inline policies for IAM roles, users, and groups.</p> <p>Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust policies for IAM roles and bucket policies for Amazon S3 buckets. You can provide a generic input such as identity policy or resource policy or a specific input such as managed policy or Amazon S3 bucket policy. </p> <p>Service control policies (SCPs) are a type of organization policy attached to an Amazon Web Services organization, organizational unit (OU), or an account.</p>
|
|
4616
4192
|
* @public
|
|
4617
4193
|
*/
|
|
4618
4194
|
policyType: PolicyType | undefined;
|
|
4619
4195
|
/**
|
|
4620
|
-
* <p>The type of resource to attach to your resource policy. Specify a value for the policy
|
|
4621
|
-
* validation resource type only if the policy type is <code>RESOURCE_POLICY</code>. For
|
|
4622
|
-
* example, to validate a resource policy to attach to an Amazon S3 bucket, you can choose
|
|
4623
|
-
* <code>AWS::S3::Bucket</code> for the policy validation resource type.</p>
|
|
4624
|
-
* <p>For resource types not supported as valid values, IAM Access Analyzer runs policy checks that
|
|
4625
|
-
* apply to all resource policies. For example, to validate a resource policy to attach to a
|
|
4626
|
-
* KMS key, do not specify a value for the policy validation resource type and IAM Access Analyzer
|
|
4627
|
-
* will run policy checks that apply to all resource policies.</p>
|
|
4196
|
+
* <p>The type of resource to attach to your resource policy. Specify a value for the policy validation resource type only if the policy type is <code>RESOURCE_POLICY</code>. For example, to validate a resource policy to attach to an Amazon S3 bucket, you can choose <code>AWS::S3::Bucket</code> for the policy validation resource type.</p> <p>For resource types not supported as valid values, IAM Access Analyzer runs policy checks that apply to all resource policies. For example, to validate a resource policy to attach to a KMS key, do not specify a value for the policy validation resource type and IAM Access Analyzer will run policy checks that apply to all resource policies.</p>
|
|
4628
4197
|
* @public
|
|
4629
4198
|
*/
|
|
4630
4199
|
validatePolicyResourceType?: ValidatePolicyResourceType | undefined;
|
|
@@ -4753,8 +4322,7 @@ export interface Position {
|
|
|
4753
4322
|
offset: number | undefined;
|
|
4754
4323
|
}
|
|
4755
4324
|
/**
|
|
4756
|
-
* <p>A span in a policy. The span consists of a start position (inclusive) and end position
|
|
4757
|
-
* (exclusive).</p>
|
|
4325
|
+
* <p>A span in a policy. The span consists of a start position (inclusive) and end position (exclusive).</p>
|
|
4758
4326
|
* @public
|
|
4759
4327
|
*/
|
|
4760
4328
|
export interface Span {
|
|
@@ -4770,8 +4338,7 @@ export interface Span {
|
|
|
4770
4338
|
end: Position | undefined;
|
|
4771
4339
|
}
|
|
4772
4340
|
/**
|
|
4773
|
-
* <p>A location in a policy that is represented as a path through the JSON representation and
|
|
4774
|
-
* a corresponding span.</p>
|
|
4341
|
+
* <p>A location in a policy that is represented as a path through the JSON representation and a corresponding span.</p>
|
|
4775
4342
|
* @public
|
|
4776
4343
|
*/
|
|
4777
4344
|
export interface Location {
|
|
@@ -4787,26 +4354,17 @@ export interface Location {
|
|
|
4787
4354
|
span: Span | undefined;
|
|
4788
4355
|
}
|
|
4789
4356
|
/**
|
|
4790
|
-
* <p>A finding in a policy. Each finding is an actionable recommendation that can be used to
|
|
4791
|
-
* improve the policy.</p>
|
|
4357
|
+
* <p>A finding in a policy. Each finding is an actionable recommendation that can be used to improve the policy.</p>
|
|
4792
4358
|
* @public
|
|
4793
4359
|
*/
|
|
4794
4360
|
export interface ValidatePolicyFinding {
|
|
4795
4361
|
/**
|
|
4796
|
-
* <p>A localized message that explains the finding and provides guidance on how to address
|
|
4797
|
-
* it.</p>
|
|
4362
|
+
* <p>A localized message that explains the finding and provides guidance on how to address it.</p>
|
|
4798
4363
|
* @public
|
|
4799
4364
|
*/
|
|
4800
4365
|
findingDetails: string | undefined;
|
|
4801
4366
|
/**
|
|
4802
|
-
* <p>The impact of the finding.</p>
|
|
4803
|
-
* <p>Security warnings report when the policy allows access that we consider overly
|
|
4804
|
-
* permissive.</p>
|
|
4805
|
-
* <p>Errors report when a part of the policy is not functional.</p>
|
|
4806
|
-
* <p>Warnings report non-security issues when a policy does not conform to policy writing
|
|
4807
|
-
* best practices.</p>
|
|
4808
|
-
* <p>Suggestions recommend stylistic improvements in the policy that do not impact
|
|
4809
|
-
* access.</p>
|
|
4367
|
+
* <p>The impact of the finding.</p> <p>Security warnings report when the policy allows access that we consider overly permissive.</p> <p>Errors report when a part of the policy is not functional.</p> <p>Warnings report non-security issues when a policy does not conform to policy writing best practices.</p> <p>Suggestions recommend stylistic improvements in the policy that do not impact access.</p>
|
|
4810
4368
|
* @public
|
|
4811
4369
|
*/
|
|
4812
4370
|
findingType: ValidatePolicyFindingType | undefined;
|
|
@@ -4821,8 +4379,7 @@ export interface ValidatePolicyFinding {
|
|
|
4821
4379
|
*/
|
|
4822
4380
|
learnMoreLink: string | undefined;
|
|
4823
4381
|
/**
|
|
4824
|
-
* <p>The list of locations in the policy document that are related to the finding. The issue
|
|
4825
|
-
* code provides a summary of an issue identified by the finding.</p>
|
|
4382
|
+
* <p>The list of locations in the policy document that are related to the finding. The issue code provides a summary of an issue identified by the finding.</p>
|
|
4826
4383
|
* @public
|
|
4827
4384
|
*/
|
|
4828
4385
|
locations: Location[] | undefined;
|
|
@@ -4832,8 +4389,7 @@ export interface ValidatePolicyFinding {
|
|
|
4832
4389
|
*/
|
|
4833
4390
|
export interface ValidatePolicyResponse {
|
|
4834
4391
|
/**
|
|
4835
|
-
* <p>The list of findings in a policy returned by IAM Access Analyzer based on its suite of policy
|
|
4836
|
-
* checks.</p>
|
|
4392
|
+
* <p>The list of findings in a policy returned by IAM Access Analyzer based on its suite of policy checks.</p>
|
|
4837
4393
|
* @public
|
|
4838
4394
|
*/
|
|
4839
4395
|
findings: ValidatePolicyFinding[] | undefined;
|