aws-sdk 2.1502.0 → 2.1503.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (121) hide show
  1. package/CHANGELOG.md +41 -1
  2. package/README.md +1 -3
  3. package/apis/accessanalyzer-2019-11-01.min.json +423 -86
  4. package/apis/accessanalyzer-2019-11-01.paginators.json +12 -0
  5. package/apis/amp-2020-08-01.min.json +320 -3
  6. package/apis/amp-2020-08-01.paginators.json +6 -0
  7. package/apis/amp-2020-08-01.waiters2.json +33 -0
  8. package/apis/bcm-data-exports-2023-11-26.examples.json +5 -0
  9. package/apis/bcm-data-exports-2023-11-26.min.json +470 -0
  10. package/apis/bcm-data-exports-2023-11-26.paginators.json +22 -0
  11. package/apis/cloudtrail-2013-11-01.min.json +67 -24
  12. package/apis/codestar-connections-2019-12-01.min.json +590 -3
  13. package/apis/codestar-connections-2019-12-01.paginators.json +10 -0
  14. package/apis/compute-optimizer-2019-11-01.min.json +243 -39
  15. package/apis/config-2014-11-12.min.json +204 -169
  16. package/apis/controltower-2018-05-10.min.json +249 -13
  17. package/apis/controltower-2018-05-10.paginators.json +6 -0
  18. package/apis/cost-optimization-hub-2022-07-26.examples.json +5 -0
  19. package/apis/cost-optimization-hub-2022-07-26.min.json +757 -0
  20. package/apis/cost-optimization-hub-2022-07-26.paginators.json +22 -0
  21. package/apis/detective-2018-10-26.min.json +294 -0
  22. package/apis/ecs-2014-11-13.min.json +108 -107
  23. package/apis/eks-2017-11-01.min.json +211 -4
  24. package/apis/eks-2017-11-01.paginators.json +12 -0
  25. package/apis/eks-auth-2023-11-26.examples.json +5 -0
  26. package/apis/eks-auth-2023-11-26.min.json +104 -0
  27. package/apis/eks-auth-2023-11-26.paginators.json +4 -0
  28. package/apis/eks-auth-2023-11-26.waiters2.json +5 -0
  29. package/apis/elasticfilesystem-2015-02-01.min.json +5 -1
  30. package/apis/elasticfilesystem-2015-02-01.paginators.json +18 -3
  31. package/apis/elasticloadbalancingv2-2015-12-01.min.json +403 -75
  32. package/apis/elasticloadbalancingv2-2015-12-01.paginators.json +15 -0
  33. package/apis/freetier-2023-09-07.examples.json +5 -0
  34. package/apis/freetier-2023-09-07.min.json +105 -0
  35. package/apis/freetier-2023-09-07.paginators.json +10 -0
  36. package/apis/fsx-2018-03-01.min.json +259 -135
  37. package/apis/guardduty-2017-11-28.min.json +64 -0
  38. package/apis/iotfleetwise-2021-06-17.min.json +159 -33
  39. package/apis/lakeformation-2017-03-31.min.json +126 -35
  40. package/apis/logs-2014-03-28.min.json +310 -36
  41. package/apis/logs-2014-03-28.paginators.json +12 -0
  42. package/apis/managedblockchain-2018-09-24.min.json +58 -50
  43. package/apis/metadata.json +22 -0
  44. package/apis/models.lex.v2-2020-08-07.min.json +633 -331
  45. package/apis/models.lex.v2-2020-08-07.paginators.json +5 -0
  46. package/apis/personalize-2018-05-22.min.json +85 -52
  47. package/apis/personalize-events-2018-03-22.min.json +97 -5
  48. package/apis/personalize-runtime-2018-05-22.min.json +68 -11
  49. package/apis/quicksight-2018-04-01.min.json +398 -268
  50. package/apis/redshift-2012-12-01.min.json +14 -2
  51. package/apis/repostspace-2022-05-13.examples.json +5 -0
  52. package/apis/repostspace-2022-05-13.min.json +447 -0
  53. package/apis/repostspace-2022-05-13.paginators.json +10 -0
  54. package/apis/runtime.lex.v2-2020-08-07.min.json +25 -24
  55. package/apis/s3-2006-03-01.examples.json +142 -142
  56. package/apis/s3-2006-03-01.min.json +45 -0
  57. package/apis/s3control-2018-08-20.min.json +1330 -314
  58. package/apis/s3control-2018-08-20.paginators.json +15 -0
  59. package/apis/secretsmanager-2017-10-17.min.json +111 -50
  60. package/apis/secretsmanager-2017-10-17.paginators.json +5 -0
  61. package/apis/securityhub-2018-10-26.examples.json +93 -2
  62. package/apis/securityhub-2018-10-26.min.json +551 -300
  63. package/apis/states-2016-11-23.min.json +85 -0
  64. package/apis/transcribe-2017-10-26.min.json +49 -38
  65. package/apis/workspaces-2015-04-08.min.json +119 -96
  66. package/apis/workspaces-thin-client-2023-08-22.examples.json +5 -0
  67. package/apis/workspaces-thin-client-2023-08-22.min.json +777 -0
  68. package/apis/workspaces-thin-client-2023-08-22.paginators.json +22 -0
  69. package/clients/accessanalyzer.d.ts +374 -5
  70. package/clients/all.d.ts +6 -0
  71. package/clients/all.js +7 -1
  72. package/clients/amp.d.ts +322 -0
  73. package/clients/bcmdataexports.d.ts +589 -0
  74. package/clients/bcmdataexports.js +18 -0
  75. package/clients/cloudtrail.d.ts +76 -2
  76. package/clients/cloudwatchlogs.d.ts +413 -1
  77. package/clients/codestarconnections.d.ts +727 -0
  78. package/clients/computeoptimizer.d.ts +307 -6
  79. package/clients/configservice.d.ts +60 -11
  80. package/clients/controltower.d.ts +258 -20
  81. package/clients/costoptimizationhub.d.ts +1283 -0
  82. package/clients/costoptimizationhub.js +18 -0
  83. package/clients/detective.d.ts +469 -0
  84. package/clients/ecs.d.ts +10 -5
  85. package/clients/efs.d.ts +39 -30
  86. package/clients/eks.d.ts +237 -15
  87. package/clients/eksauth.d.ts +124 -0
  88. package/clients/eksauth.js +19 -0
  89. package/clients/elbv2.d.ts +433 -4
  90. package/clients/freetier.d.ts +149 -0
  91. package/clients/freetier.js +18 -0
  92. package/clients/fsx.d.ts +194 -21
  93. package/clients/guardduty.d.ts +82 -11
  94. package/clients/iotfleetwise.d.ts +198 -13
  95. package/clients/lakeformation.d.ts +118 -2
  96. package/clients/lexmodelsv2.d.ts +343 -2
  97. package/clients/lexruntimev2.d.ts +14 -9
  98. package/clients/managedblockchain.d.ts +26 -5
  99. package/clients/personalize.d.ts +65 -20
  100. package/clients/personalizeevents.d.ts +102 -12
  101. package/clients/personalizeruntime.d.ts +72 -2
  102. package/clients/quicksight.d.ts +124 -0
  103. package/clients/redshift.d.ts +16 -0
  104. package/clients/repostspace.d.ts +458 -0
  105. package/clients/repostspace.js +18 -0
  106. package/clients/s3.d.ts +2 -2
  107. package/clients/s3control.d.ts +841 -13
  108. package/clients/secretsmanager.d.ts +94 -5
  109. package/clients/securityhub.d.ts +305 -2
  110. package/clients/stepfunctions.d.ts +153 -8
  111. package/clients/transcribeservice.d.ts +11 -1
  112. package/clients/workspaces.d.ts +43 -1
  113. package/clients/workspacesthinclient.d.ts +895 -0
  114. package/clients/workspacesthinclient.js +18 -0
  115. package/dist/aws-sdk-core-react-native.js +2 -2
  116. package/dist/aws-sdk-react-native.js +277 -48
  117. package/dist/aws-sdk.js +1976 -565
  118. package/dist/aws-sdk.min.js +104 -104
  119. package/lib/config_service_placeholders.d.ts +12 -0
  120. package/lib/core.js +1 -1
  121. package/package.json +1 -1
@@ -12,6 +12,38 @@ declare class S3Control extends Service {
12
12
  */
13
13
  constructor(options?: S3Control.Types.ClientConfiguration)
14
14
  config: Config & S3Control.Types.ClientConfiguration;
15
+ /**
16
+ * Associate your S3 Access Grants instance with an Amazon Web Services IAM Identity Center instance. Use this action if you want to create access grants for users or groups from your corporate identity directory. First, you must add your corporate identity directory to Amazon Web Services IAM Identity Center. Then, you can associate this IAM Identity Center instance with your S3 Access Grants instance. Permissions You must have the s3:AssociateAccessGrantsIdentityCenter permission to use this operation. Additional Permissions You must also have the following permissions: sso:CreateApplication, sso:PutApplicationGrant, and sso:PutApplicationAuthenticationMethod.
17
+ */
18
+ associateAccessGrantsIdentityCenter(params: S3Control.Types.AssociateAccessGrantsIdentityCenterRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
19
+ /**
20
+ * Associate your S3 Access Grants instance with an Amazon Web Services IAM Identity Center instance. Use this action if you want to create access grants for users or groups from your corporate identity directory. First, you must add your corporate identity directory to Amazon Web Services IAM Identity Center. Then, you can associate this IAM Identity Center instance with your S3 Access Grants instance. Permissions You must have the s3:AssociateAccessGrantsIdentityCenter permission to use this operation. Additional Permissions You must also have the following permissions: sso:CreateApplication, sso:PutApplicationGrant, and sso:PutApplicationAuthenticationMethod.
21
+ */
22
+ associateAccessGrantsIdentityCenter(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
23
+ /**
24
+ * Creates an access grant that gives a grantee access to your S3 data. The grantee can be an IAM user or role or a directory user, or group. Before you can create a grant, you must have an S3 Access Grants instance in the same Region as the S3 data. You can create an S3 Access Grants instance using the CreateAccessGrantsInstance. You must also have registered at least one S3 data location in your S3 Access Grants instance using CreateAccessGrantsLocation. Permissions You must have the s3:CreateAccessGrant permission to use this operation. Additional Permissions For any directory identity - sso:DescribeInstance and sso:DescribeApplication For directory users - identitystore:DescribeUser For directory groups - identitystore:DescribeGroup
25
+ */
26
+ createAccessGrant(params: S3Control.Types.CreateAccessGrantRequest, callback?: (err: AWSError, data: S3Control.Types.CreateAccessGrantResult) => void): Request<S3Control.Types.CreateAccessGrantResult, AWSError>;
27
+ /**
28
+ * Creates an access grant that gives a grantee access to your S3 data. The grantee can be an IAM user or role or a directory user, or group. Before you can create a grant, you must have an S3 Access Grants instance in the same Region as the S3 data. You can create an S3 Access Grants instance using the CreateAccessGrantsInstance. You must also have registered at least one S3 data location in your S3 Access Grants instance using CreateAccessGrantsLocation. Permissions You must have the s3:CreateAccessGrant permission to use this operation. Additional Permissions For any directory identity - sso:DescribeInstance and sso:DescribeApplication For directory users - identitystore:DescribeUser For directory groups - identitystore:DescribeGroup
29
+ */
30
+ createAccessGrant(callback?: (err: AWSError, data: S3Control.Types.CreateAccessGrantResult) => void): Request<S3Control.Types.CreateAccessGrantResult, AWSError>;
31
+ /**
32
+ * Creates an S3 Access Grants instance, which serves as a logical grouping for access grants. You can create one S3 Access Grants instance per Region per account. Permissions You must have the s3:CreateAccessGrantsInstance permission to use this operation. Additional Permissions To associate an IAM Identity Center instance with your S3 Access Grants instance, you must also have the sso:DescribeInstance, sso:CreateApplication, sso:PutApplicationGrant, and sso:PutApplicationAuthenticationMethod permissions.
33
+ */
34
+ createAccessGrantsInstance(params: S3Control.Types.CreateAccessGrantsInstanceRequest, callback?: (err: AWSError, data: S3Control.Types.CreateAccessGrantsInstanceResult) => void): Request<S3Control.Types.CreateAccessGrantsInstanceResult, AWSError>;
35
+ /**
36
+ * Creates an S3 Access Grants instance, which serves as a logical grouping for access grants. You can create one S3 Access Grants instance per Region per account. Permissions You must have the s3:CreateAccessGrantsInstance permission to use this operation. Additional Permissions To associate an IAM Identity Center instance with your S3 Access Grants instance, you must also have the sso:DescribeInstance, sso:CreateApplication, sso:PutApplicationGrant, and sso:PutApplicationAuthenticationMethod permissions.
37
+ */
38
+ createAccessGrantsInstance(callback?: (err: AWSError, data: S3Control.Types.CreateAccessGrantsInstanceResult) => void): Request<S3Control.Types.CreateAccessGrantsInstanceResult, AWSError>;
39
+ /**
40
+ * The S3 data location that you would like to register in your S3 Access Grants instance. Your S3 data must be in the same Region as your S3 Access Grants instance. The location can be one of the following: The default S3 location s3:// A bucket - S3://&lt;bucket-name&gt; A bucket and prefix - S3://&lt;bucket-name&gt;/&lt;prefix&gt; When you register a location, you must include the IAM role that has permission to manage the S3 location that you are registering. Give S3 Access Grants permission to assume this role using a policy. S3 Access Grants assumes this role to manage access to the location and to vend temporary credentials to grantees or client applications. Permissions You must have the s3:CreateAccessGrantsLocation permission to use this operation. Additional Permissions You must also have the following permission for the specified IAM role: iam:PassRole
41
+ */
42
+ createAccessGrantsLocation(params: S3Control.Types.CreateAccessGrantsLocationRequest, callback?: (err: AWSError, data: S3Control.Types.CreateAccessGrantsLocationResult) => void): Request<S3Control.Types.CreateAccessGrantsLocationResult, AWSError>;
43
+ /**
44
+ * The S3 data location that you would like to register in your S3 Access Grants instance. Your S3 data must be in the same Region as your S3 Access Grants instance. The location can be one of the following: The default S3 location s3:// A bucket - S3://&lt;bucket-name&gt; A bucket and prefix - S3://&lt;bucket-name&gt;/&lt;prefix&gt; When you register a location, you must include the IAM role that has permission to manage the S3 location that you are registering. Give S3 Access Grants permission to assume this role using a policy. S3 Access Grants assumes this role to manage access to the location and to vend temporary credentials to grantees or client applications. Permissions You must have the s3:CreateAccessGrantsLocation permission to use this operation. Additional Permissions You must also have the following permission for the specified IAM role: iam:PassRole
45
+ */
46
+ createAccessGrantsLocation(callback?: (err: AWSError, data: S3Control.Types.CreateAccessGrantsLocationResult) => void): Request<S3Control.Types.CreateAccessGrantsLocationResult, AWSError>;
15
47
  /**
16
48
  * Creates an access point and associates it with the specified bucket. For more information, see Managing Data Access with Amazon S3 Access Points in the Amazon S3 User Guide. S3 on Outposts only supports VPC-style access points. For more information, see Accessing Amazon S3 on Outposts using virtual private cloud (VPC) only access points in the Amazon S3 User Guide. All Amazon S3 on Outposts REST API requests for this action require an additional parameter of x-amz-outpost-id to be passed with the request. In addition, you must use an S3 on Outposts endpoint hostname prefix instead of s3-control. For an example of the request syntax for Amazon S3 on Outposts that uses the S3 on Outposts endpoint hostname prefix and the x-amz-outpost-id derived by using the access point ARN, see the Examples section. The following actions are related to CreateAccessPoint: GetAccessPoint DeleteAccessPoint ListAccessPoints
17
49
  */
@@ -60,6 +92,38 @@ declare class S3Control extends Service {
60
92
  * Creates a new S3 Storage Lens group and associates it with the specified Amazon Web Services account ID. An S3 Storage Lens group is a custom grouping of objects based on prefix, suffix, object tags, object size, object age, or a combination of these filters. For each Storage Lens group that you’ve created, you can also optionally add Amazon Web Services resource tags. For more information about S3 Storage Lens groups, see Working with S3 Storage Lens groups. To use this operation, you must have the permission to perform the s3:CreateStorageLensGroup action. If you’re trying to create a Storage Lens group with Amazon Web Services resource tags, you must also have permission to perform the s3:TagResource action. For more information about the required Storage Lens Groups permissions, see Setting account permissions to use S3 Storage Lens groups. For information about Storage Lens groups errors, see List of Amazon S3 Storage Lens error codes.
61
93
  */
62
94
  createStorageLensGroup(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
95
+ /**
96
+ * Deletes the access grant from the S3 Access Grants instance. You cannot undo an access grant deletion and the grantee will no longer have access to the S3 data. Permissions You must have the s3:DeleteAccessGrant permission to use this operation.
97
+ */
98
+ deleteAccessGrant(params: S3Control.Types.DeleteAccessGrantRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
99
+ /**
100
+ * Deletes the access grant from the S3 Access Grants instance. You cannot undo an access grant deletion and the grantee will no longer have access to the S3 data. Permissions You must have the s3:DeleteAccessGrant permission to use this operation.
101
+ */
102
+ deleteAccessGrant(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
103
+ /**
104
+ * Deletes your S3 Access Grants instance. You must first delete the access grants and locations before S3 Access Grants can delete the instance. See DeleteAccessGrant and DeleteAccessGrantsLocation. If you have associated an IAM Identity Center instance with your S3 Access Grants instance, you must first dissassociate the Identity Center instance from the S3 Access Grants instance before you can delete the S3 Access Grants instance. See AssociateAccessGrantsIdentityCenter and DissociateAccessGrantsIdentityCenter. Permissions You must have the s3:DeleteAccessGrantsInstance permission to use this operation.
105
+ */
106
+ deleteAccessGrantsInstance(params: S3Control.Types.DeleteAccessGrantsInstanceRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
107
+ /**
108
+ * Deletes your S3 Access Grants instance. You must first delete the access grants and locations before S3 Access Grants can delete the instance. See DeleteAccessGrant and DeleteAccessGrantsLocation. If you have associated an IAM Identity Center instance with your S3 Access Grants instance, you must first dissassociate the Identity Center instance from the S3 Access Grants instance before you can delete the S3 Access Grants instance. See AssociateAccessGrantsIdentityCenter and DissociateAccessGrantsIdentityCenter. Permissions You must have the s3:DeleteAccessGrantsInstance permission to use this operation.
109
+ */
110
+ deleteAccessGrantsInstance(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
111
+ /**
112
+ * Deletes the resource policy of the S3 Access Grants instance. The resource policy is used to manage cross-account access to your S3 Access Grants instance. By deleting the resource policy, you delete any cross-account permissions to your S3 Access Grants instance. Permissions You must have the s3:DeleteAccessGrantsInstanceResourcePolicy permission to use this operation.
113
+ */
114
+ deleteAccessGrantsInstanceResourcePolicy(params: S3Control.Types.DeleteAccessGrantsInstanceResourcePolicyRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
115
+ /**
116
+ * Deletes the resource policy of the S3 Access Grants instance. The resource policy is used to manage cross-account access to your S3 Access Grants instance. By deleting the resource policy, you delete any cross-account permissions to your S3 Access Grants instance. Permissions You must have the s3:DeleteAccessGrantsInstanceResourcePolicy permission to use this operation.
117
+ */
118
+ deleteAccessGrantsInstanceResourcePolicy(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
119
+ /**
120
+ * Deregisters a location from your S3 Access Grants instance. You can only delete a location registration from an S3 Access Grants instance if there are no grants associated with this location. See Delete a grant for information on how to delete grants. You need to have at least one registered location in your S3 Access Grants instance in order to create access grants. Permissions You must have the s3:DeleteAccessGrantsLocation permission to use this operation.
121
+ */
122
+ deleteAccessGrantsLocation(params: S3Control.Types.DeleteAccessGrantsLocationRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
123
+ /**
124
+ * Deregisters a location from your S3 Access Grants instance. You can only delete a location registration from an S3 Access Grants instance if there are no grants associated with this location. See Delete a grant for information on how to delete grants. You need to have at least one registered location in your S3 Access Grants instance in order to create access grants. Permissions You must have the s3:DeleteAccessGrantsLocation permission to use this operation.
125
+ */
126
+ deleteAccessGrantsLocation(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
63
127
  /**
64
128
  * Deletes the specified access point. All Amazon S3 on Outposts REST API requests for this action require an additional parameter of x-amz-outpost-id to be passed with the request. In addition, you must use an S3 on Outposts endpoint hostname prefix instead of s3-control. For an example of the request syntax for Amazon S3 on Outposts that uses the S3 on Outposts endpoint hostname prefix and the x-amz-outpost-id derived by using the access point ARN, see the Examples section. The following actions are related to DeleteAccessPoint: CreateAccessPoint GetAccessPoint ListAccessPoints
65
129
  */
@@ -196,6 +260,54 @@ declare class S3Control extends Service {
196
260
  * Retrieves the status of an asynchronous request to manage a Multi-Region Access Point. For more information about managing Multi-Region Access Points and how asynchronous requests work, see Managing Multi-Region Access Points in the Amazon S3 User Guide. The following actions are related to GetMultiRegionAccessPoint: CreateMultiRegionAccessPoint DeleteMultiRegionAccessPoint GetMultiRegionAccessPoint ListMultiRegionAccessPoints
197
261
  */
198
262
  describeMultiRegionAccessPointOperation(callback?: (err: AWSError, data: S3Control.Types.DescribeMultiRegionAccessPointOperationResult) => void): Request<S3Control.Types.DescribeMultiRegionAccessPointOperationResult, AWSError>;
263
+ /**
264
+ * Dissociates the Amazon Web Services IAM Identity Center instance from the S3 Access Grants instance. Permissions You must have the s3:DissociateAccessGrantsIdentityCenter permission to use this operation. Additional Permissions You must have the sso:DeleteApplication permission to use this operation.
265
+ */
266
+ dissociateAccessGrantsIdentityCenter(params: S3Control.Types.DissociateAccessGrantsIdentityCenterRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
267
+ /**
268
+ * Dissociates the Amazon Web Services IAM Identity Center instance from the S3 Access Grants instance. Permissions You must have the s3:DissociateAccessGrantsIdentityCenter permission to use this operation. Additional Permissions You must have the sso:DeleteApplication permission to use this operation.
269
+ */
270
+ dissociateAccessGrantsIdentityCenter(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
271
+ /**
272
+ * Get the details of an access grant from your S3 Access Grants instance. Permissions You must have the s3:GetAccessGrant permission to use this operation.
273
+ */
274
+ getAccessGrant(params: S3Control.Types.GetAccessGrantRequest, callback?: (err: AWSError, data: S3Control.Types.GetAccessGrantResult) => void): Request<S3Control.Types.GetAccessGrantResult, AWSError>;
275
+ /**
276
+ * Get the details of an access grant from your S3 Access Grants instance. Permissions You must have the s3:GetAccessGrant permission to use this operation.
277
+ */
278
+ getAccessGrant(callback?: (err: AWSError, data: S3Control.Types.GetAccessGrantResult) => void): Request<S3Control.Types.GetAccessGrantResult, AWSError>;
279
+ /**
280
+ * Retrieves the S3 Access Grants instance for a Region in your account. Permissions You must have the s3:GetAccessGrantsInstance permission to use this operation.
281
+ */
282
+ getAccessGrantsInstance(params: S3Control.Types.GetAccessGrantsInstanceRequest, callback?: (err: AWSError, data: S3Control.Types.GetAccessGrantsInstanceResult) => void): Request<S3Control.Types.GetAccessGrantsInstanceResult, AWSError>;
283
+ /**
284
+ * Retrieves the S3 Access Grants instance for a Region in your account. Permissions You must have the s3:GetAccessGrantsInstance permission to use this operation.
285
+ */
286
+ getAccessGrantsInstance(callback?: (err: AWSError, data: S3Control.Types.GetAccessGrantsInstanceResult) => void): Request<S3Control.Types.GetAccessGrantsInstanceResult, AWSError>;
287
+ /**
288
+ * Retrieve the S3 Access Grants instance that contains a particular prefix. Permissions You must have the s3:GetAccessGrantsInstanceForPrefix permission for the caller account to use this operation. Additional Permissions The prefix owner account must grant you the following permissions to their S3 Access Grants instance: s3:GetAccessGrantsInstanceForPrefix.
289
+ */
290
+ getAccessGrantsInstanceForPrefix(params: S3Control.Types.GetAccessGrantsInstanceForPrefixRequest, callback?: (err: AWSError, data: S3Control.Types.GetAccessGrantsInstanceForPrefixResult) => void): Request<S3Control.Types.GetAccessGrantsInstanceForPrefixResult, AWSError>;
291
+ /**
292
+ * Retrieve the S3 Access Grants instance that contains a particular prefix. Permissions You must have the s3:GetAccessGrantsInstanceForPrefix permission for the caller account to use this operation. Additional Permissions The prefix owner account must grant you the following permissions to their S3 Access Grants instance: s3:GetAccessGrantsInstanceForPrefix.
293
+ */
294
+ getAccessGrantsInstanceForPrefix(callback?: (err: AWSError, data: S3Control.Types.GetAccessGrantsInstanceForPrefixResult) => void): Request<S3Control.Types.GetAccessGrantsInstanceForPrefixResult, AWSError>;
295
+ /**
296
+ * Returns the resource policy of the S3 Access Grants instance. Permissions You must have the s3:GetAccessGrantsInstanceResourcePolicy permission to use this operation.
297
+ */
298
+ getAccessGrantsInstanceResourcePolicy(params: S3Control.Types.GetAccessGrantsInstanceResourcePolicyRequest, callback?: (err: AWSError, data: S3Control.Types.GetAccessGrantsInstanceResourcePolicyResult) => void): Request<S3Control.Types.GetAccessGrantsInstanceResourcePolicyResult, AWSError>;
299
+ /**
300
+ * Returns the resource policy of the S3 Access Grants instance. Permissions You must have the s3:GetAccessGrantsInstanceResourcePolicy permission to use this operation.
301
+ */
302
+ getAccessGrantsInstanceResourcePolicy(callback?: (err: AWSError, data: S3Control.Types.GetAccessGrantsInstanceResourcePolicyResult) => void): Request<S3Control.Types.GetAccessGrantsInstanceResourcePolicyResult, AWSError>;
303
+ /**
304
+ * Retrieves the details of a particular location registered in your S3 Access Grants instance. Permissions You must have the s3:GetAccessGrantsLocation permission to use this operation.
305
+ */
306
+ getAccessGrantsLocation(params: S3Control.Types.GetAccessGrantsLocationRequest, callback?: (err: AWSError, data: S3Control.Types.GetAccessGrantsLocationResult) => void): Request<S3Control.Types.GetAccessGrantsLocationResult, AWSError>;
307
+ /**
308
+ * Retrieves the details of a particular location registered in your S3 Access Grants instance. Permissions You must have the s3:GetAccessGrantsLocation permission to use this operation.
309
+ */
310
+ getAccessGrantsLocation(callback?: (err: AWSError, data: S3Control.Types.GetAccessGrantsLocationResult) => void): Request<S3Control.Types.GetAccessGrantsLocationResult, AWSError>;
199
311
  /**
200
312
  * Returns configuration information about the specified access point. All Amazon S3 on Outposts REST API requests for this action require an additional parameter of x-amz-outpost-id to be passed with the request. In addition, you must use an S3 on Outposts endpoint hostname prefix instead of s3-control. For an example of the request syntax for Amazon S3 on Outposts that uses the S3 on Outposts endpoint hostname prefix and the x-amz-outpost-id derived by using the access point ARN, see the Examples section. The following actions are related to GetAccessPoint: CreateAccessPoint DeleteAccessPoint ListAccessPoints
201
313
  */
@@ -300,6 +412,14 @@ declare class S3Control extends Service {
300
412
  * This operation returns the versioning state for S3 on Outposts buckets only. To return the versioning state for an S3 bucket, see GetBucketVersioning in the Amazon S3 API Reference. Returns the versioning state for an S3 on Outposts bucket. With S3 Versioning, you can save multiple distinct copies of your objects and recover from unintended user actions and application failures. If you've never set versioning on your bucket, it has no versioning state. In that case, the GetBucketVersioning request does not return a versioning state value. For more information about versioning, see Versioning in the Amazon S3 User Guide. All Amazon S3 on Outposts REST API requests for this action require an additional parameter of x-amz-outpost-id to be passed with the request. In addition, you must use an S3 on Outposts endpoint hostname prefix instead of s3-control. For an example of the request syntax for Amazon S3 on Outposts that uses the S3 on Outposts endpoint hostname prefix and the x-amz-outpost-id derived by using the access point ARN, see the Examples section. The following operations are related to GetBucketVersioning for S3 on Outposts. PutBucketVersioning PutBucketLifecycleConfiguration GetBucketLifecycleConfiguration
301
413
  */
302
414
  getBucketVersioning(callback?: (err: AWSError, data: S3Control.Types.GetBucketVersioningResult) => void): Request<S3Control.Types.GetBucketVersioningResult, AWSError>;
415
+ /**
416
+ * Returns a temporary access credential from S3 Access Grants to the grantee or client application. The temporary credential is an Amazon Web Services STS token that grants them access to the S3 data. Permissions You must have the s3:GetDataAccess permission to use this operation. Additional Permissions The IAM role that S3 Access Grants assumes must have the following permissions specified in the trust policy when registering the location: sts:AssumeRole, for directory users or groups sts:SetContext, and for IAM users or roles sts:SourceIdentity.
417
+ */
418
+ getDataAccess(params: S3Control.Types.GetDataAccessRequest, callback?: (err: AWSError, data: S3Control.Types.GetDataAccessResult) => void): Request<S3Control.Types.GetDataAccessResult, AWSError>;
419
+ /**
420
+ * Returns a temporary access credential from S3 Access Grants to the grantee or client application. The temporary credential is an Amazon Web Services STS token that grants them access to the S3 data. Permissions You must have the s3:GetDataAccess permission to use this operation. Additional Permissions The IAM role that S3 Access Grants assumes must have the following permissions specified in the trust policy when registering the location: sts:AssumeRole, for directory users or groups sts:SetContext, and for IAM users or roles sts:SourceIdentity.
421
+ */
422
+ getDataAccess(callback?: (err: AWSError, data: S3Control.Types.GetDataAccessResult) => void): Request<S3Control.Types.GetDataAccessResult, AWSError>;
303
423
  /**
304
424
  * Returns the tags on an S3 Batch Operations job. To use the GetJobTagging operation, you must have permission to perform the s3:GetJobTagging action. For more information, see Controlling access and labeling jobs using tags in the Amazon S3 User Guide. Related actions include: CreateJob PutJobTagging DeleteJobTagging
305
425
  */
@@ -372,6 +492,30 @@ declare class S3Control extends Service {
372
492
  * Retrieves the Storage Lens group configuration details. To use this operation, you must have the permission to perform the s3:GetStorageLensGroup action. For more information about the required Storage Lens Groups permissions, see Setting account permissions to use S3 Storage Lens groups. For information about Storage Lens groups errors, see List of Amazon S3 Storage Lens error codes.
373
493
  */
374
494
  getStorageLensGroup(callback?: (err: AWSError, data: S3Control.Types.GetStorageLensGroupResult) => void): Request<S3Control.Types.GetStorageLensGroupResult, AWSError>;
495
+ /**
496
+ * Returns the list of access grants in your S3 Access Grants instance. Permissions You must have the s3:ListAccessGrants permission to use this operation.
497
+ */
498
+ listAccessGrants(params: S3Control.Types.ListAccessGrantsRequest, callback?: (err: AWSError, data: S3Control.Types.ListAccessGrantsResult) => void): Request<S3Control.Types.ListAccessGrantsResult, AWSError>;
499
+ /**
500
+ * Returns the list of access grants in your S3 Access Grants instance. Permissions You must have the s3:ListAccessGrants permission to use this operation.
501
+ */
502
+ listAccessGrants(callback?: (err: AWSError, data: S3Control.Types.ListAccessGrantsResult) => void): Request<S3Control.Types.ListAccessGrantsResult, AWSError>;
503
+ /**
504
+ * Returns a list of S3 Access Grants instances. An S3 Access Grants instance serves as a logical grouping for your individual access grants. You can only have one S3 Access Grants instance per Region per account. Permissions You must have the s3:ListAccessGrantsInstances permission to use this operation.
505
+ */
506
+ listAccessGrantsInstances(params: S3Control.Types.ListAccessGrantsInstancesRequest, callback?: (err: AWSError, data: S3Control.Types.ListAccessGrantsInstancesResult) => void): Request<S3Control.Types.ListAccessGrantsInstancesResult, AWSError>;
507
+ /**
508
+ * Returns a list of S3 Access Grants instances. An S3 Access Grants instance serves as a logical grouping for your individual access grants. You can only have one S3 Access Grants instance per Region per account. Permissions You must have the s3:ListAccessGrantsInstances permission to use this operation.
509
+ */
510
+ listAccessGrantsInstances(callback?: (err: AWSError, data: S3Control.Types.ListAccessGrantsInstancesResult) => void): Request<S3Control.Types.ListAccessGrantsInstancesResult, AWSError>;
511
+ /**
512
+ * Returns a list of the locations registered in your S3 Access Grants instance. Permissions You must have the s3:ListAccessGrantsLocations permission to use this operation.
513
+ */
514
+ listAccessGrantsLocations(params: S3Control.Types.ListAccessGrantsLocationsRequest, callback?: (err: AWSError, data: S3Control.Types.ListAccessGrantsLocationsResult) => void): Request<S3Control.Types.ListAccessGrantsLocationsResult, AWSError>;
515
+ /**
516
+ * Returns a list of the locations registered in your S3 Access Grants instance. Permissions You must have the s3:ListAccessGrantsLocations permission to use this operation.
517
+ */
518
+ listAccessGrantsLocations(callback?: (err: AWSError, data: S3Control.Types.ListAccessGrantsLocationsResult) => void): Request<S3Control.Types.ListAccessGrantsLocationsResult, AWSError>;
375
519
  /**
376
520
  * Returns a list of the access points that are owned by the current account that's associated with the specified bucket. You can retrieve up to 1000 access points per call. If the specified bucket has more than 1,000 access points (or the number specified in maxResults, whichever is less), the response will include a continuation token that you can use to list the additional access points. All Amazon S3 on Outposts REST API requests for this action require an additional parameter of x-amz-outpost-id to be passed with the request. In addition, you must use an S3 on Outposts endpoint hostname prefix instead of s3-control. For an example of the request syntax for Amazon S3 on Outposts that uses the S3 on Outposts endpoint hostname prefix and the x-amz-outpost-id derived by using the access point ARN, see the Examples section. The following actions are related to ListAccessPoints: CreateAccessPoint DeleteAccessPoint GetAccessPoint
377
521
  */
@@ -429,13 +573,21 @@ declare class S3Control extends Service {
429
573
  */
430
574
  listStorageLensGroups(callback?: (err: AWSError, data: S3Control.Types.ListStorageLensGroupsResult) => void): Request<S3Control.Types.ListStorageLensGroupsResult, AWSError>;
431
575
  /**
432
- * This operation allows you to list all the Amazon Web Services resource tags for the specified resource. To use this operation, you must have the permission to perform the s3:ListTagsForResource action. For more information about the required Storage Lens Groups permissions, see Setting account permissions to use S3 Storage Lens groups. For information about S3 Tagging errors, see List of Amazon S3 Tagging error codes. This operation is only supported for S3 Storage Lens groups.
576
+ * This operation allows you to list all the Amazon Web Services resource tags for a specified resource. Each tag is a label consisting of a user-defined key and value. Tags can help you manage, identify, organize, search for, and filter resources. Permissions You must have the s3:ListTagsForResource permission to use this operation. This operation is only supported for S3 Storage Lens groups and for S3 Access Grants. The tagged resource can be an S3 Storage Lens group or S3 Access Grants instance, registered location, or grant. For more information about the required Storage Lens Groups permissions, see Setting account permissions to use S3 Storage Lens groups. For information about S3 Tagging errors, see List of Amazon S3 Tagging error codes.
433
577
  */
434
578
  listTagsForResource(params: S3Control.Types.ListTagsForResourceRequest, callback?: (err: AWSError, data: S3Control.Types.ListTagsForResourceResult) => void): Request<S3Control.Types.ListTagsForResourceResult, AWSError>;
435
579
  /**
436
- * This operation allows you to list all the Amazon Web Services resource tags for the specified resource. To use this operation, you must have the permission to perform the s3:ListTagsForResource action. For more information about the required Storage Lens Groups permissions, see Setting account permissions to use S3 Storage Lens groups. For information about S3 Tagging errors, see List of Amazon S3 Tagging error codes. This operation is only supported for S3 Storage Lens groups.
580
+ * This operation allows you to list all the Amazon Web Services resource tags for a specified resource. Each tag is a label consisting of a user-defined key and value. Tags can help you manage, identify, organize, search for, and filter resources. Permissions You must have the s3:ListTagsForResource permission to use this operation. This operation is only supported for S3 Storage Lens groups and for S3 Access Grants. The tagged resource can be an S3 Storage Lens group or S3 Access Grants instance, registered location, or grant. For more information about the required Storage Lens Groups permissions, see Setting account permissions to use S3 Storage Lens groups. For information about S3 Tagging errors, see List of Amazon S3 Tagging error codes.
437
581
  */
438
582
  listTagsForResource(callback?: (err: AWSError, data: S3Control.Types.ListTagsForResourceResult) => void): Request<S3Control.Types.ListTagsForResourceResult, AWSError>;
583
+ /**
584
+ * Updates the resource policy of the S3 Access Grants instance. Permissions You must have the s3:PutAccessGrantsInstanceResourcePolicy permission to use this operation.
585
+ */
586
+ putAccessGrantsInstanceResourcePolicy(params: S3Control.Types.PutAccessGrantsInstanceResourcePolicyRequest, callback?: (err: AWSError, data: S3Control.Types.PutAccessGrantsInstanceResourcePolicyResult) => void): Request<S3Control.Types.PutAccessGrantsInstanceResourcePolicyResult, AWSError>;
587
+ /**
588
+ * Updates the resource policy of the S3 Access Grants instance. Permissions You must have the s3:PutAccessGrantsInstanceResourcePolicy permission to use this operation.
589
+ */
590
+ putAccessGrantsInstanceResourcePolicy(callback?: (err: AWSError, data: S3Control.Types.PutAccessGrantsInstanceResourcePolicyResult) => void): Request<S3Control.Types.PutAccessGrantsInstanceResourcePolicyResult, AWSError>;
439
591
  /**
440
592
  * Replaces configuration for an Object Lambda Access Point. The following actions are related to PutAccessPointConfigurationForObjectLambda: GetAccessPointConfigurationForObjectLambda
441
593
  */
@@ -549,21 +701,29 @@ declare class S3Control extends Service {
549
701
  */
550
702
  submitMultiRegionAccessPointRoutes(callback?: (err: AWSError, data: S3Control.Types.SubmitMultiRegionAccessPointRoutesResult) => void): Request<S3Control.Types.SubmitMultiRegionAccessPointRoutesResult, AWSError>;
551
703
  /**
552
- * Creates a new Amazon Web Services resource tag or updates an existing resource tag. You can add up to 50 Amazon Web Services resource tags for each S3 resource. To use this operation, you must have the permission to perform the s3:TagResource action. For more information about the required Storage Lens Groups permissions, see Setting account permissions to use S3 Storage Lens groups. For information about S3 Tagging errors, see List of Amazon S3 Tagging error codes. This operation is only supported for S3 Storage Lens groups.
704
+ * Creates a new Amazon Web Services resource tag or updates an existing resource tag. Each tag is a label consisting of a user-defined key and value. Tags can help you manage, identify, organize, search for, and filter resources. You can add up to 50 Amazon Web Services resource tags for each S3 resource. This operation is only supported for S3 Storage Lens groups and for S3 Access Grants. The tagged resource can be an S3 Storage Lens group or S3 Access Grants instance, registered location, or grant. Permissions You must have the s3:TagResource permission to use this operation. For more information about the required Storage Lens Groups permissions, see Setting account permissions to use S3 Storage Lens groups. For information about S3 Tagging errors, see List of Amazon S3 Tagging error codes.
553
705
  */
554
706
  tagResource(params: S3Control.Types.TagResourceRequest, callback?: (err: AWSError, data: S3Control.Types.TagResourceResult) => void): Request<S3Control.Types.TagResourceResult, AWSError>;
555
707
  /**
556
- * Creates a new Amazon Web Services resource tag or updates an existing resource tag. You can add up to 50 Amazon Web Services resource tags for each S3 resource. To use this operation, you must have the permission to perform the s3:TagResource action. For more information about the required Storage Lens Groups permissions, see Setting account permissions to use S3 Storage Lens groups. For information about S3 Tagging errors, see List of Amazon S3 Tagging error codes. This operation is only supported for S3 Storage Lens groups.
708
+ * Creates a new Amazon Web Services resource tag or updates an existing resource tag. Each tag is a label consisting of a user-defined key and value. Tags can help you manage, identify, organize, search for, and filter resources. You can add up to 50 Amazon Web Services resource tags for each S3 resource. This operation is only supported for S3 Storage Lens groups and for S3 Access Grants. The tagged resource can be an S3 Storage Lens group or S3 Access Grants instance, registered location, or grant. Permissions You must have the s3:TagResource permission to use this operation. For more information about the required Storage Lens Groups permissions, see Setting account permissions to use S3 Storage Lens groups. For information about S3 Tagging errors, see List of Amazon S3 Tagging error codes.
557
709
  */
558
710
  tagResource(callback?: (err: AWSError, data: S3Control.Types.TagResourceResult) => void): Request<S3Control.Types.TagResourceResult, AWSError>;
559
711
  /**
560
- * This operation removes the specified Amazon Web Services resource tags from an S3 resource. To use this operation, you must have the permission to perform the s3:UntagResource action. For more information about the required Storage Lens Groups permissions, see Setting account permissions to use S3 Storage Lens groups. For information about S3 Tagging errors, see List of Amazon S3 Tagging error codes. This operation is only supported for S3 Storage Lens groups.
712
+ * This operation removes the specified Amazon Web Services resource tags from an S3 resource. Each tag is a label consisting of a user-defined key and value. Tags can help you manage, identify, organize, search for, and filter resources. This operation is only supported for S3 Storage Lens groups and for S3 Access Grants. The tagged resource can be an S3 Storage Lens group or S3 Access Grants instance, registered location, or grant. Permissions You must have the s3:UntagResource permission to use this operation. For more information about the required Storage Lens Groups permissions, see Setting account permissions to use S3 Storage Lens groups. For information about S3 Tagging errors, see List of Amazon S3 Tagging error codes.
561
713
  */
562
714
  untagResource(params: S3Control.Types.UntagResourceRequest, callback?: (err: AWSError, data: S3Control.Types.UntagResourceResult) => void): Request<S3Control.Types.UntagResourceResult, AWSError>;
563
715
  /**
564
- * This operation removes the specified Amazon Web Services resource tags from an S3 resource. To use this operation, you must have the permission to perform the s3:UntagResource action. For more information about the required Storage Lens Groups permissions, see Setting account permissions to use S3 Storage Lens groups. For information about S3 Tagging errors, see List of Amazon S3 Tagging error codes. This operation is only supported for S3 Storage Lens groups.
716
+ * This operation removes the specified Amazon Web Services resource tags from an S3 resource. Each tag is a label consisting of a user-defined key and value. Tags can help you manage, identify, organize, search for, and filter resources. This operation is only supported for S3 Storage Lens groups and for S3 Access Grants. The tagged resource can be an S3 Storage Lens group or S3 Access Grants instance, registered location, or grant. Permissions You must have the s3:UntagResource permission to use this operation. For more information about the required Storage Lens Groups permissions, see Setting account permissions to use S3 Storage Lens groups. For information about S3 Tagging errors, see List of Amazon S3 Tagging error codes.
565
717
  */
566
718
  untagResource(callback?: (err: AWSError, data: S3Control.Types.UntagResourceResult) => void): Request<S3Control.Types.UntagResourceResult, AWSError>;
719
+ /**
720
+ * Updates the IAM role of a registered location in your S3 Access Grants instance. Permissions You must have the s3:UpdateAccessGrantsLocation permission to use this operation. Additional Permissions You must also have the following permission: iam:PassRole
721
+ */
722
+ updateAccessGrantsLocation(params: S3Control.Types.UpdateAccessGrantsLocationRequest, callback?: (err: AWSError, data: S3Control.Types.UpdateAccessGrantsLocationResult) => void): Request<S3Control.Types.UpdateAccessGrantsLocationResult, AWSError>;
723
+ /**
724
+ * Updates the IAM role of a registered location in your S3 Access Grants instance. Permissions You must have the s3:UpdateAccessGrantsLocation permission to use this operation. Additional Permissions You must also have the following permission: iam:PassRole
725
+ */
726
+ updateAccessGrantsLocation(callback?: (err: AWSError, data: S3Control.Types.UpdateAccessGrantsLocationResult) => void): Request<S3Control.Types.UpdateAccessGrantsLocationResult, AWSError>;
567
727
  /**
568
728
  * Updates an existing S3 Batch Operations job's priority. For more information, see S3 Batch Operations in the Amazon S3 User Guide. Related actions include: CreateJob ListJobs DescribeJob UpdateJobStatus
569
729
  */
@@ -602,6 +762,22 @@ declare namespace S3Control {
602
762
  */
603
763
  Owner: OwnerOverride;
604
764
  }
765
+ export type AccessGrantArn = string;
766
+ export type AccessGrantId = string;
767
+ export type AccessGrantsInstanceArn = string;
768
+ export type AccessGrantsInstanceId = string;
769
+ export type AccessGrantsInstancesList = ListAccessGrantsInstanceEntry[];
770
+ export type AccessGrantsList = ListAccessGrantEntry[];
771
+ export type AccessGrantsLocationArn = string;
772
+ export interface AccessGrantsLocationConfiguration {
773
+ /**
774
+ * The S3SubPrefix is appended to the location scope creating the grant scope. Use this field to narrow the scope of the grant to a subset of the location scope. This field is required if the location scope is the default location s3:// because you cannot create a grant for all of your S3 data in the Region and must narrow the scope. For example, if the location scope is the default location s3://, the S3SubPrefx can be a &lt;bucket-name&gt;/*, so the full grant scope path would be s3://&lt;bucket-name&gt;/*. Or the S3SubPrefx can be &lt;bucket-name&gt;/&lt;prefix-name&gt;*, so the full grant scope path would be or s3://&lt;bucket-name&gt;/&lt;prefix-name&gt;*. If the S3SubPrefix includes a prefix, append the wildcard character * after the prefix to indicate that you want to include all object key names in the bucket that start with that prefix.
775
+ */
776
+ S3SubPrefix?: S3Prefix;
777
+ }
778
+ export type AccessGrantsLocationId = string;
779
+ export type AccessGrantsLocationsList = ListAccessGrantsLocationsEntry[];
780
+ export type AccessKeyId = string;
605
781
  export interface AccessPoint {
606
782
  /**
607
783
  * The name of this access point.
@@ -680,6 +856,16 @@ declare namespace S3Control {
680
856
  IsEnabled?: IsEnabled;
681
857
  }
682
858
  export type Alias = string;
859
+ export interface AssociateAccessGrantsIdentityCenterRequest {
860
+ /**
861
+ * The ID of the Amazon Web Services account that is making this request.
862
+ */
863
+ AccountId: AccountId;
864
+ /**
865
+ * The Amazon Resource Name (ARN) of the Amazon Web Services IAM Identity Center instance that you are associating with your S3 Access Grants instance. An IAM Identity Center instance is your corporate identity directory that you added to the IAM Identity Center. You can use the ListInstances API operation to retrieve a list of your Identity Center instances and their ARNs.
866
+ */
867
+ IdentityCenterArn: IdentityCenterArn;
868
+ }
683
869
  export type AsyncCreationTimestamp = Date;
684
870
  export interface AsyncErrorDetails {
685
871
  /**
@@ -803,6 +989,150 @@ declare namespace S3Control {
803
989
  export type ConfirmRemoveSelfBucketAccess = boolean;
804
990
  export type ConfirmationRequired = boolean;
805
991
  export type ContinuationToken = string;
992
+ export interface CreateAccessGrantRequest {
993
+ /**
994
+ * The ID of the Amazon Web Services account that is making this request.
995
+ */
996
+ AccountId: AccountId;
997
+ /**
998
+ * The ID of the registered location to which you are granting access. S3 Access Grants assigns this ID when you register the location. S3 Access Grants assigns the ID default to the default location s3:// and assigns an auto-generated ID to other locations that you register. If you are passing the default location, you cannot create an access grant for the entire default location. You must also specify a bucket or a bucket and prefix in the Subprefix field.
999
+ */
1000
+ AccessGrantsLocationId: AccessGrantsLocationId;
1001
+ /**
1002
+ * The configuration options of the grant location. The grant location is the S3 path to the data to which you are granting access. It contains the S3SubPrefix field. The grant scope is the result of appending the subprefix to the location scope of the registered location.
1003
+ */
1004
+ AccessGrantsLocationConfiguration?: AccessGrantsLocationConfiguration;
1005
+ /**
1006
+ * The user, group, or role to which you are granting access. You can grant access to an IAM user or role. If you have added your corporate directory to Amazon Web Services IAM Identity Center and associated your Identity Center instance with your S3 Access Grants instance, the grantee can also be a corporate directory user or group.
1007
+ */
1008
+ Grantee: Grantee;
1009
+ /**
1010
+ * The type of access that you are granting to your S3 data, which can be set to one of the following values: READ – Grant read-only access to the S3 data. WRITE – Grant write-only access to the S3 data. READWRITE – Grant both read and write access to the S3 data.
1011
+ */
1012
+ Permission: Permission;
1013
+ /**
1014
+ * The Amazon Resource Name (ARN) of an Amazon Web Services IAM Identity Center application associated with your Identity Center instance. If an application ARN is included in the request to create an access grant, the grantee can only access the S3 data through this application.
1015
+ */
1016
+ ApplicationArn?: IdentityCenterApplicationArn;
1017
+ /**
1018
+ * The type of S3SubPrefix. The only possible value is Object. Pass this value if the access grant scope is an object. Do not pass this value if the access grant scope is a bucket or a bucket and a prefix.
1019
+ */
1020
+ S3PrefixType?: S3PrefixType;
1021
+ /**
1022
+ * The Amazon Web Services resource tags that you are adding to the access grant. Each tag is a label consisting of a user-defined key and value. Tags can help you manage, identify, organize, search for, and filter resources.
1023
+ */
1024
+ Tags?: TagList;
1025
+ }
1026
+ export interface CreateAccessGrantResult {
1027
+ /**
1028
+ * The date and time when you created the access grant.
1029
+ */
1030
+ CreatedAt?: CreationTimestamp;
1031
+ /**
1032
+ * The ID of the access grant. S3 Access Grants auto-generates this ID when you create the access grant.
1033
+ */
1034
+ AccessGrantId?: AccessGrantId;
1035
+ /**
1036
+ * The Amazon Resource Name (ARN) of the access grant.
1037
+ */
1038
+ AccessGrantArn?: AccessGrantArn;
1039
+ /**
1040
+ * The user, group, or role to which you are granting access. You can grant access to an IAM user or role. If you have added your corporate directory to Amazon Web Services IAM Identity Center and associated your Identity Center instance with your S3 Access Grants instance, the grantee can also be a corporate directory user or group.
1041
+ */
1042
+ Grantee?: Grantee;
1043
+ /**
1044
+ * The ID of the registered location to which you are granting access. S3 Access Grants assigns this ID when you register the location. S3 Access Grants assigns the ID default to the default location s3:// and assigns an auto-generated ID to other locations that you register.
1045
+ */
1046
+ AccessGrantsLocationId?: AccessGrantsLocationId;
1047
+ /**
1048
+ * The configuration options of the grant location. The grant location is the S3 path to the data to which you are granting access.
1049
+ */
1050
+ AccessGrantsLocationConfiguration?: AccessGrantsLocationConfiguration;
1051
+ /**
1052
+ * The type of access that you are granting to your S3 data, which can be set to one of the following values: READ – Grant read-only access to the S3 data. WRITE – Grant write-only access to the S3 data. READWRITE – Grant both read and write access to the S3 data.
1053
+ */
1054
+ Permission?: Permission;
1055
+ /**
1056
+ * The Amazon Resource Name (ARN) of an Amazon Web Services IAM Identity Center application associated with your Identity Center instance. If the grant includes an application ARN, the grantee can only access the S3 data through this application.
1057
+ */
1058
+ ApplicationArn?: IdentityCenterApplicationArn;
1059
+ /**
1060
+ * The S3 path of the data to which you are granting access. It is the result of appending the Subprefix to the location scope.
1061
+ */
1062
+ GrantScope?: S3Prefix;
1063
+ }
1064
+ export interface CreateAccessGrantsInstanceRequest {
1065
+ /**
1066
+ * The ID of the Amazon Web Services account that is making this request.
1067
+ */
1068
+ AccountId: AccountId;
1069
+ /**
1070
+ * If you would like to associate your S3 Access Grants instance with an Amazon Web Services IAM Identity Center instance, use this field to pass the Amazon Resource Name (ARN) of the Amazon Web Services IAM Identity Center instance that you are associating with your S3 Access Grants instance. An IAM Identity Center instance is your corporate identity directory that you added to the IAM Identity Center. You can use the ListInstances API operation to retrieve a list of your Identity Center instances and their ARNs.
1071
+ */
1072
+ IdentityCenterArn?: IdentityCenterArn;
1073
+ /**
1074
+ * The Amazon Web Services resource tags that you are adding to the S3 Access Grants instance. Each tag is a label consisting of a user-defined key and value. Tags can help you manage, identify, organize, search for, and filter resources.
1075
+ */
1076
+ Tags?: TagList;
1077
+ }
1078
+ export interface CreateAccessGrantsInstanceResult {
1079
+ /**
1080
+ * The date and time when you created the S3 Access Grants instance.
1081
+ */
1082
+ CreatedAt?: CreationTimestamp;
1083
+ /**
1084
+ * The ID of the S3 Access Grants instance. The ID is default. You can have one S3 Access Grants instance per Region per account.
1085
+ */
1086
+ AccessGrantsInstanceId?: AccessGrantsInstanceId;
1087
+ /**
1088
+ * The Amazon Resource Name (ARN) of the S3 Access Grants instance.
1089
+ */
1090
+ AccessGrantsInstanceArn?: AccessGrantsInstanceArn;
1091
+ /**
1092
+ * If you associated your S3 Access Grants instance with an Amazon Web Services IAM Identity Center instance, this field returns the Amazon Resource Name (ARN) of the IAM Identity Center instance application; a subresource of the original Identity Center instance passed in the request. S3 Access Grants creates this Identity Center application for this specific S3 Access Grants instance.
1093
+ */
1094
+ IdentityCenterArn?: IdentityCenterArn;
1095
+ }
1096
+ export interface CreateAccessGrantsLocationRequest {
1097
+ /**
1098
+ * The ID of the Amazon Web Services account that is making this request.
1099
+ */
1100
+ AccountId: AccountId;
1101
+ /**
1102
+ * The S3 path to the location that you are registering. The location scope can be the default S3 location s3://, the S3 path to a bucket s3://&lt;bucket&gt;, or the S3 path to a bucket and prefix s3://&lt;bucket&gt;/&lt;prefix&gt;. A prefix in S3 is a string of characters at the beginning of an object key name used to organize the objects that you store in your S3 buckets. For example, object key names that start with the engineering/ prefix or object key names that start with the marketing/campaigns/ prefix.
1103
+ */
1104
+ LocationScope: S3Prefix;
1105
+ /**
1106
+ * The Amazon Resource Name (ARN) of the IAM role for the registered location. S3 Access Grants assumes this role to manage access to the registered location.
1107
+ */
1108
+ IAMRoleArn: IAMRoleArn;
1109
+ /**
1110
+ * The Amazon Web Services resource tags that you are adding to the S3 Access Grants location. Each tag is a label consisting of a user-defined key and value. Tags can help you manage, identify, organize, search for, and filter resources.
1111
+ */
1112
+ Tags?: TagList;
1113
+ }
1114
+ export interface CreateAccessGrantsLocationResult {
1115
+ /**
1116
+ * The date and time when you registered the location.
1117
+ */
1118
+ CreatedAt?: CreationTimestamp;
1119
+ /**
1120
+ * The ID of the registered location to which you are granting access. S3 Access Grants assigns this ID when you register the location. S3 Access Grants assigns the ID default to the default location s3:// and assigns an auto-generated ID to other locations that you register.
1121
+ */
1122
+ AccessGrantsLocationId?: AccessGrantsLocationId;
1123
+ /**
1124
+ * The Amazon Resource Name (ARN) of the location you are registering.
1125
+ */
1126
+ AccessGrantsLocationArn?: AccessGrantsLocationArn;
1127
+ /**
1128
+ * The S3 URI path to the location that you are registering. The location scope can be the default S3 location s3://, the S3 path to a bucket, or the S3 path to a bucket and prefix. A prefix in S3 is a string of characters at the beginning of an object key name used to organize the objects that you store in your S3 buckets. For example, object key names that start with the engineering/ prefix or object key names that start with the marketing/campaigns/ prefix.
1129
+ */
1130
+ LocationScope?: S3Prefix;
1131
+ /**
1132
+ * The Amazon Resource Name (ARN) of the IAM role for the registered location. S3 Access Grants assumes this role to manage access to the registered location.
1133
+ */
1134
+ IAMRoleArn?: IAMRoleArn;
1135
+ }
806
1136
  export interface CreateAccessPointForObjectLambdaRequest {
807
1137
  /**
808
1138
  * The Amazon Web Services account ID for owner of the specified Object Lambda Access Point.
@@ -1020,9 +1350,59 @@ declare namespace S3Control {
1020
1350
  }
1021
1351
  export type CreationDate = Date;
1022
1352
  export type CreationTimestamp = Date;
1353
+ export interface Credentials {
1354
+ /**
1355
+ * The unique access key ID of the Amazon Web Services STS temporary credential that S3 Access Grants vends to grantees and client applications.
1356
+ */
1357
+ AccessKeyId?: AccessKeyId;
1358
+ /**
1359
+ * The secret access key of the Amazon Web Services STS temporary credential that S3 Access Grants vends to grantees and client applications.
1360
+ */
1361
+ SecretAccessKey?: SecretAccessKey;
1362
+ /**
1363
+ * The Amazon Web Services STS temporary credential that S3 Access Grants vends to grantees and client applications.
1364
+ */
1365
+ SessionToken?: SessionToken;
1366
+ /**
1367
+ * The expiration date and time of the temporary credential that S3 Access Grants vends to grantees and client applications.
1368
+ */
1369
+ Expiration?: Expiration;
1370
+ }
1023
1371
  export type _Date = Date;
1024
1372
  export type Days = number;
1025
1373
  export type DaysAfterInitiation = number;
1374
+ export interface DeleteAccessGrantRequest {
1375
+ /**
1376
+ * The ID of the Amazon Web Services account that is making this request.
1377
+ */
1378
+ AccountId: AccountId;
1379
+ /**
1380
+ * The ID of the access grant. S3 Access Grants auto-generates this ID when you create the access grant.
1381
+ */
1382
+ AccessGrantId: AccessGrantId;
1383
+ }
1384
+ export interface DeleteAccessGrantsInstanceRequest {
1385
+ /**
1386
+ * The ID of the Amazon Web Services account that is making this request.
1387
+ */
1388
+ AccountId: AccountId;
1389
+ }
1390
+ export interface DeleteAccessGrantsInstanceResourcePolicyRequest {
1391
+ /**
1392
+ * The ID of the Amazon Web Services account that is making this request.
1393
+ */
1394
+ AccountId: AccountId;
1395
+ }
1396
+ export interface DeleteAccessGrantsLocationRequest {
1397
+ /**
1398
+ * The ID of the Amazon Web Services account that is making this request.
1399
+ */
1400
+ AccountId: AccountId;
1401
+ /**
1402
+ * The ID of the registered location that you are deregistering from your S3 Access Grants instance. S3 Access Grants assigned this ID when you registered the location. S3 Access Grants assigns the ID default to the default location s3:// and assigns an auto-generated ID to other locations that you register.
1403
+ */
1404
+ AccessGrantsLocationId: AccessGrantsLocationId;
1405
+ }
1026
1406
  export interface DeleteAccessPointForObjectLambdaRequest {
1027
1407
  /**
1028
1408
  * The account ID for the account that owns the specified Object Lambda Access Point.
@@ -1264,6 +1644,13 @@ declare namespace S3Control {
1264
1644
  */
1265
1645
  IsEnabled?: IsEnabled;
1266
1646
  }
1647
+ export interface DissociateAccessGrantsIdentityCenterRequest {
1648
+ /**
1649
+ * The ID of the Amazon Web Services account that is making this request.
1650
+ */
1651
+ AccountId: AccountId;
1652
+ }
1653
+ export type DurationSeconds = number;
1267
1654
  export interface EncryptionConfiguration {
1268
1655
  /**
1269
1656
  * Specifies the ID of the customer managed KMS key that's stored in Key Management Service (KMS) for the destination bucket. This ID is either the Amazon Resource Name (ARN) for the KMS key or the alias ARN for the KMS key. Amazon S3 uses this KMS key to encrypt replica objects. Amazon S3 supports only symmetric encryption KMS keys. For more information, see Symmetric encryption KMS keys in the Amazon Web Services Key Management Service Developer Guide.
@@ -1294,6 +1681,7 @@ declare namespace S3Control {
1294
1681
  Status: ExistingObjectReplicationStatus;
1295
1682
  }
1296
1683
  export type ExistingObjectReplicationStatus = "Enabled"|"Disabled"|string;
1684
+ export type Expiration = Date;
1297
1685
  export type ExpirationStatus = "Enabled"|"Disabled"|string;
1298
1686
  export type ExpiredObjectDeleteMarker = boolean;
1299
1687
  export type Format = "CSV"|"Parquet"|string;
@@ -1309,6 +1697,150 @@ declare namespace S3Control {
1309
1697
  SSEKMS?: SSEKMSEncryption;
1310
1698
  }
1311
1699
  export type GeneratedManifestFormat = "S3InventoryReport_CSV_20211130"|string;
1700
+ export interface GetAccessGrantRequest {
1701
+ /**
1702
+ * The ID of the Amazon Web Services account that is making this request.
1703
+ */
1704
+ AccountId: AccountId;
1705
+ /**
1706
+ * The ID of the access grant. S3 Access Grants auto-generates this ID when you create the access grant.
1707
+ */
1708
+ AccessGrantId: AccessGrantId;
1709
+ }
1710
+ export interface GetAccessGrantResult {
1711
+ /**
1712
+ * The date and time when you created the access grant.
1713
+ */
1714
+ CreatedAt?: CreationTimestamp;
1715
+ /**
1716
+ * The ID of the access grant. S3 Access Grants auto-generates this ID when you create the access grant.
1717
+ */
1718
+ AccessGrantId?: AccessGrantId;
1719
+ /**
1720
+ * The Amazon Resource Name (ARN) of the access grant.
1721
+ */
1722
+ AccessGrantArn?: AccessGrantArn;
1723
+ /**
1724
+ * The user, group, or role to which you are granting access. You can grant access to an IAM user or role. If you have added a corporate directory to Amazon Web Services IAM Identity Center and associated this Identity Center instance with the S3 Access Grants instance, the grantee can also be a corporate directory user or group.
1725
+ */
1726
+ Grantee?: Grantee;
1727
+ /**
1728
+ * The type of permission that was granted in the access grant. Can be one of the following values: READ – Grant read-only access to the S3 data. WRITE – Grant write-only access to the S3 data. READWRITE – Grant both read and write access to the S3 data.
1729
+ */
1730
+ Permission?: Permission;
1731
+ /**
1732
+ * The ID of the registered location to which you are granting access. S3 Access Grants assigns this ID when you register the location. S3 Access Grants assigns the ID default to the default location s3:// and assigns an auto-generated ID to other locations that you register.
1733
+ */
1734
+ AccessGrantsLocationId?: AccessGrantsLocationId;
1735
+ /**
1736
+ * The configuration options of the grant location. The grant location is the S3 path to the data to which you are granting access.
1737
+ */
1738
+ AccessGrantsLocationConfiguration?: AccessGrantsLocationConfiguration;
1739
+ /**
1740
+ * The S3 path of the data to which you are granting access. It is the result of appending the Subprefix to the location scope.
1741
+ */
1742
+ GrantScope?: S3Prefix;
1743
+ /**
1744
+ * The Amazon Resource Name (ARN) of an Amazon Web Services IAM Identity Center application associated with your Identity Center instance. If the grant includes an application ARN, the grantee can only access the S3 data through this application.
1745
+ */
1746
+ ApplicationArn?: IdentityCenterApplicationArn;
1747
+ }
1748
+ export interface GetAccessGrantsInstanceForPrefixRequest {
1749
+ /**
1750
+ * The ID of the Amazon Web Services account that is making this request.
1751
+ */
1752
+ AccountId: AccountId;
1753
+ /**
1754
+ * The S3 prefix of the access grants that you would like to retrieve.
1755
+ */
1756
+ S3Prefix: S3Prefix;
1757
+ }
1758
+ export interface GetAccessGrantsInstanceForPrefixResult {
1759
+ /**
1760
+ * The Amazon Resource Name (ARN) of the S3 Access Grants instance.
1761
+ */
1762
+ AccessGrantsInstanceArn?: AccessGrantsInstanceArn;
1763
+ /**
1764
+ * The ID of the S3 Access Grants instance. The ID is default. You can have one S3 Access Grants instance per Region per account.
1765
+ */
1766
+ AccessGrantsInstanceId?: AccessGrantsInstanceId;
1767
+ }
1768
+ export interface GetAccessGrantsInstanceRequest {
1769
+ /**
1770
+ * The ID of the Amazon Web Services account that is making this request.
1771
+ */
1772
+ AccountId: AccountId;
1773
+ }
1774
+ export interface GetAccessGrantsInstanceResourcePolicyRequest {
1775
+ /**
1776
+ * The ID of the Amazon Web Services account that is making this request.
1777
+ */
1778
+ AccountId: AccountId;
1779
+ }
1780
+ export interface GetAccessGrantsInstanceResourcePolicyResult {
1781
+ /**
1782
+ * The resource policy of the S3 Access Grants instance.
1783
+ */
1784
+ Policy?: PolicyDocument;
1785
+ /**
1786
+ * The Organization of the resource policy of the S3 Access Grants instance.
1787
+ */
1788
+ Organization?: Organization;
1789
+ /**
1790
+ * The date and time when you created the S3 Access Grants instance resource policy.
1791
+ */
1792
+ CreatedAt?: CreationTimestamp;
1793
+ }
1794
+ export interface GetAccessGrantsInstanceResult {
1795
+ /**
1796
+ * The Amazon Resource Name (ARN) of the S3 Access Grants instance.
1797
+ */
1798
+ AccessGrantsInstanceArn?: AccessGrantsInstanceArn;
1799
+ /**
1800
+ * The ID of the S3 Access Grants instance. The ID is default. You can have one S3 Access Grants instance per Region per account.
1801
+ */
1802
+ AccessGrantsInstanceId?: AccessGrantsInstanceId;
1803
+ /**
1804
+ * If you associated your S3 Access Grants instance with an Amazon Web Services IAM Identity Center instance, this field returns the Amazon Resource Name (ARN) of the Amazon Web Services IAM Identity Center instance application; a subresource of the original Identity Center instance. S3 Access Grants creates this Identity Center application for the specific S3 Access Grants instance.
1805
+ */
1806
+ IdentityCenterArn?: IdentityCenterArn;
1807
+ /**
1808
+ * The date and time when you created the S3 Access Grants instance.
1809
+ */
1810
+ CreatedAt?: CreationTimestamp;
1811
+ }
1812
+ export interface GetAccessGrantsLocationRequest {
1813
+ /**
1814
+ * The ID of the Amazon Web Services account that is making this request.
1815
+ */
1816
+ AccountId: AccountId;
1817
+ /**
1818
+ * The ID of the registered location that you are retrieving. S3 Access Grants assigns this ID when you register the location. S3 Access Grants assigns the ID default to the default location s3:// and assigns an auto-generated ID to other locations that you register.
1819
+ */
1820
+ AccessGrantsLocationId: AccessGrantsLocationId;
1821
+ }
1822
+ export interface GetAccessGrantsLocationResult {
1823
+ /**
1824
+ * The date and time when you registered the location.
1825
+ */
1826
+ CreatedAt?: CreationTimestamp;
1827
+ /**
1828
+ * The ID of the registered location to which you are granting access. S3 Access Grants assigns this ID when you register the location. S3 Access Grants assigns the ID default to the default location s3:// and assigns an auto-generated ID to other locations that you register.
1829
+ */
1830
+ AccessGrantsLocationId?: AccessGrantsLocationId;
1831
+ /**
1832
+ * The Amazon Resource Name (ARN) of the registered location.
1833
+ */
1834
+ AccessGrantsLocationArn?: AccessGrantsLocationArn;
1835
+ /**
1836
+ * The S3 URI path to the registered location. The location scope can be the default S3 location s3://, the S3 path to a bucket, or the S3 path to a bucket and prefix. A prefix in S3 is a string of characters at the beginning of an object key name used to organize the objects that you store in your S3 buckets. For example, object key names that start with the engineering/ prefix or object key names that start with the marketing/campaigns/ prefix.
1837
+ */
1838
+ LocationScope?: S3Prefix;
1839
+ /**
1840
+ * The Amazon Resource Name (ARN) of the IAM role for the registered location. S3 Access Grants assumes this role to manage access to the registered location.
1841
+ */
1842
+ IAMRoleArn?: IAMRoleArn;
1843
+ }
1312
1844
  export interface GetAccessPointConfigurationForObjectLambdaRequest {
1313
1845
  /**
1314
1846
  * The account ID for the account that owns the specified Object Lambda Access Point.
@@ -1571,6 +2103,42 @@ declare namespace S3Control {
1571
2103
  */
1572
2104
  MFADelete?: MFADeleteStatus;
1573
2105
  }
2106
+ export interface GetDataAccessRequest {
2107
+ /**
2108
+ * The ID of the Amazon Web Services account that is making this request.
2109
+ */
2110
+ AccountId: AccountId;
2111
+ /**
2112
+ * The S3 URI path of the data to which you are requesting temporary access credentials. If the requesting account has an access grant for this data, S3 Access Grants vends temporary access credentials in the response.
2113
+ */
2114
+ Target: S3Prefix;
2115
+ /**
2116
+ * The type of permission granted to your S3 data, which can be set to one of the following values: READ – Grant read-only access to the S3 data. WRITE – Grant write-only access to the S3 data. READWRITE – Grant both read and write access to the S3 data.
2117
+ */
2118
+ Permission: Permission;
2119
+ /**
2120
+ * The session duration, in seconds, of the temporary access credential that S3 Access Grants vends to the grantee or client application. The default value is 1 hour, but the grantee can specify a range from 900 seconds (15 minutes) up to 43200 seconds (12 hours). If the grantee requests a value higher than this maximum, the operation fails.
2121
+ */
2122
+ DurationSeconds?: DurationSeconds;
2123
+ /**
2124
+ * The scope of the temporary access credential that S3 Access Grants vends to the grantee or client application. Default – The scope of the returned temporary access token is the scope of the grant that is closest to the target scope. Minimal – The scope of the returned temporary access token is the same as the requested target scope as long as the requested scope is the same as or a subset of the grant scope.
2125
+ */
2126
+ Privilege?: Privilege;
2127
+ /**
2128
+ * The type of Target. The only possible value is Object. Pass this value if the target data that you would like to access is a path to an object. Do not pass this value if the target data is a bucket or a bucket and a prefix.
2129
+ */
2130
+ TargetType?: S3PrefixType;
2131
+ }
2132
+ export interface GetDataAccessResult {
2133
+ /**
2134
+ * The temporary credential token that S3 Access Grants vends.
2135
+ */
2136
+ Credentials?: Credentials;
2137
+ /**
2138
+ * The S3 URI path of the data to which you are being granted temporary access credentials.
2139
+ */
2140
+ MatchedGrantTarget?: S3Prefix;
2141
+ }
1574
2142
  export interface GetJobTaggingRequest {
1575
2143
  /**
1576
2144
  * The Amazon Web Services account ID associated with the S3 Batch Operations job.
@@ -1717,8 +2285,22 @@ declare namespace S3Control {
1717
2285
  export type GrantReadACP = string;
1718
2286
  export type GrantWrite = string;
1719
2287
  export type GrantWriteACP = string;
2288
+ export interface Grantee {
2289
+ /**
2290
+ * The type of the grantee to which access has been granted. It can be one of the following values: IAM - An IAM user or role. DIRECTORY_USER - Your corporate directory user. You can use this option if you have added your corporate identity directory to IAM Identity Center and associated the IAM Identity Center instance with your S3 Access Grants instance. DIRECTORY_GROUP - Your corporate directory group. You can use this option if you have added your corporate identity directory to IAM Identity Center and associated the IAM Identity Center instance with your S3 Access Grants instance.
2291
+ */
2292
+ GranteeType?: GranteeType;
2293
+ /**
2294
+ * The unique identifier of the Grantee. If the grantee type is IAM, the identifier is the IAM Amazon Resource Name (ARN) of the user or role. If the grantee type is a directory user or group, the identifier is 128-bit universally unique identifier (UUID) in the format a1b2c3d4-5678-90ab-cdef-EXAMPLE11111. You can obtain this UUID from your Amazon Web Services IAM Identity Center instance.
2295
+ */
2296
+ GranteeIdentifier?: GranteeIdentifier;
2297
+ }
2298
+ export type GranteeIdentifier = string;
2299
+ export type GranteeType = "DIRECTORY_USER"|"DIRECTORY_GROUP"|"IAM"|string;
1720
2300
  export type IAMRoleArn = string;
1721
2301
  export type ID = string;
2302
+ export type IdentityCenterApplicationArn = string;
2303
+ export type IdentityCenterArn = string;
1722
2304
  export interface Include {
1723
2305
  /**
1724
2306
  * A container for the S3 Storage Lens bucket includes.
@@ -2139,6 +2721,180 @@ declare namespace S3Control {
2139
2721
  ObjectSizeLessThan?: ObjectSizeLessThanBytes;
2140
2722
  }
2141
2723
  export type LifecycleRules = LifecycleRule[];
2724
+ export interface ListAccessGrantEntry {
2725
+ /**
2726
+ * The date and time when you created the S3 Access Grants instance.
2727
+ */
2728
+ CreatedAt?: CreationTimestamp;
2729
+ /**
2730
+ * The ID of the access grant. S3 Access Grants auto-generates this ID when you create the access grant.
2731
+ */
2732
+ AccessGrantId?: AccessGrantId;
2733
+ /**
2734
+ * The Amazon Resource Name (ARN) of the access grant.
2735
+ */
2736
+ AccessGrantArn?: AccessGrantArn;
2737
+ /**
2738
+ * The user, group, or role to which you are granting access. You can grant access to an IAM user or role. If you have added your corporate directory to Amazon Web Services IAM Identity Center and associated your Identity Center instance with your S3 Access Grants instance, the grantee can also be a corporate directory user or group.
2739
+ */
2740
+ Grantee?: Grantee;
2741
+ /**
2742
+ * The type of access granted to your S3 data, which can be set to one of the following values: READ – Grant read-only access to the S3 data. WRITE – Grant write-only access to the S3 data. READWRITE – Grant both read and write access to the S3 data.
2743
+ */
2744
+ Permission?: Permission;
2745
+ /**
2746
+ * The ID of the registered location to which you are granting access. S3 Access Grants assigns this ID when you register the location. S3 Access Grants assigns the ID default to the default location s3:// and assigns an auto-generated ID to other locations that you register.
2747
+ */
2748
+ AccessGrantsLocationId?: AccessGrantsLocationId;
2749
+ /**
2750
+ * The configuration options of the grant location. The grant location is the S3 path to the data to which you are granting access.
2751
+ */
2752
+ AccessGrantsLocationConfiguration?: AccessGrantsLocationConfiguration;
2753
+ /**
2754
+ * The S3 path of the data to which you are granting access. It is the result of appending the Subprefix to the location scope.
2755
+ */
2756
+ GrantScope?: S3Prefix;
2757
+ /**
2758
+ * The Amazon Resource Name (ARN) of an Amazon Web Services IAM Identity Center application associated with your Identity Center instance. If the grant includes an application ARN, the grantee can only access the S3 data through this application.
2759
+ */
2760
+ ApplicationArn?: IdentityCenterApplicationArn;
2761
+ }
2762
+ export interface ListAccessGrantsInstanceEntry {
2763
+ /**
2764
+ * The ID of the S3 Access Grants instance. The ID is default. You can have one S3 Access Grants instance per Region per account.
2765
+ */
2766
+ AccessGrantsInstanceId?: AccessGrantsInstanceId;
2767
+ /**
2768
+ * The Amazon Resource Name (ARN) of the S3 Access Grants instance.
2769
+ */
2770
+ AccessGrantsInstanceArn?: AccessGrantsInstanceArn;
2771
+ /**
2772
+ * The date and time when you created the S3 Access Grants instance.
2773
+ */
2774
+ CreatedAt?: CreationTimestamp;
2775
+ /**
2776
+ * If you associated your S3 Access Grants instance with an Amazon Web Services IAM Identity Center instance, this field returns the Amazon Resource Name (ARN) of the IAM Identity Center instance application; a subresource of the original Identity Center instance. S3 Access Grants creates this Identity Center application for the specific S3 Access Grants instance.
2777
+ */
2778
+ IdentityCenterArn?: IdentityCenterArn;
2779
+ }
2780
+ export interface ListAccessGrantsInstancesRequest {
2781
+ /**
2782
+ * The ID of the Amazon Web Services account that is making this request.
2783
+ */
2784
+ AccountId: AccountId;
2785
+ /**
2786
+ * A pagination token to request the next page of results. Pass this value into a subsequent List Access Grants Instances request in order to retrieve the next page of results.
2787
+ */
2788
+ NextToken?: ContinuationToken;
2789
+ /**
2790
+ * The maximum number of access grants that you would like returned in the List Access Grants response. If the results include the pagination token NextToken, make another call using the NextToken to determine if there are more results.
2791
+ */
2792
+ MaxResults?: MaxResults;
2793
+ }
2794
+ export interface ListAccessGrantsInstancesResult {
2795
+ /**
2796
+ * A pagination token to request the next page of results. Pass this value into a subsequent List Access Grants Instances request in order to retrieve the next page of results.
2797
+ */
2798
+ NextToken?: ContinuationToken;
2799
+ /**
2800
+ * A container for a list of S3 Access Grants instances.
2801
+ */
2802
+ AccessGrantsInstancesList?: AccessGrantsInstancesList;
2803
+ }
2804
+ export interface ListAccessGrantsLocationsEntry {
2805
+ /**
2806
+ * The date and time when you registered the location.
2807
+ */
2808
+ CreatedAt?: CreationTimestamp;
2809
+ /**
2810
+ * The ID of the registered location to which you are granting access. S3 Access Grants assigns this ID when you register the location. S3 Access Grants assigns the ID default to the default location s3:// and assigns an auto-generated ID to other locations that you register.
2811
+ */
2812
+ AccessGrantsLocationId?: AccessGrantsLocationId;
2813
+ /**
2814
+ * The Amazon Resource Name (ARN) of the registered location.
2815
+ */
2816
+ AccessGrantsLocationArn?: AccessGrantsLocationArn;
2817
+ /**
2818
+ * The S3 path to the location that you are registering. The location scope can be the default S3 location s3://, the S3 path to a bucket s3://&lt;bucket&gt;, or the S3 path to a bucket and prefix s3://&lt;bucket&gt;/&lt;prefix&gt;. A prefix in S3 is a string of characters at the beginning of an object key name used to organize the objects that you store in your S3 buckets. For example, object key names that start with the engineering/ prefix or object key names that start with the marketing/campaigns/ prefix.
2819
+ */
2820
+ LocationScope?: S3Prefix;
2821
+ /**
2822
+ * The Amazon Resource Name (ARN) of the IAM role for the registered location. S3 Access Grants assumes this role to manage access to the registered location.
2823
+ */
2824
+ IAMRoleArn?: IAMRoleArn;
2825
+ }
2826
+ export interface ListAccessGrantsLocationsRequest {
2827
+ /**
2828
+ * The ID of the Amazon Web Services account that is making this request.
2829
+ */
2830
+ AccountId: AccountId;
2831
+ /**
2832
+ * A pagination token to request the next page of results. Pass this value into a subsequent List Access Grants Locations request in order to retrieve the next page of results.
2833
+ */
2834
+ NextToken?: ContinuationToken;
2835
+ /**
2836
+ * The maximum number of access grants that you would like returned in the List Access Grants response. If the results include the pagination token NextToken, make another call using the NextToken to determine if there are more results.
2837
+ */
2838
+ MaxResults?: MaxResults;
2839
+ /**
2840
+ * The S3 path to the location that you are registering. The location scope can be the default S3 location s3://, the S3 path to a bucket s3://&lt;bucket&gt;, or the S3 path to a bucket and prefix s3://&lt;bucket&gt;/&lt;prefix&gt;. A prefix in S3 is a string of characters at the beginning of an object key name used to organize the objects that you store in your S3 buckets. For example, object key names that start with the engineering/ prefix or object key names that start with the marketing/campaigns/ prefix.
2841
+ */
2842
+ LocationScope?: S3Prefix;
2843
+ }
2844
+ export interface ListAccessGrantsLocationsResult {
2845
+ /**
2846
+ * A pagination token to request the next page of results. Pass this value into a subsequent List Access Grants Locations request in order to retrieve the next page of results.
2847
+ */
2848
+ NextToken?: ContinuationToken;
2849
+ /**
2850
+ * A container for a list of registered locations in an S3 Access Grants instance.
2851
+ */
2852
+ AccessGrantsLocationsList?: AccessGrantsLocationsList;
2853
+ }
2854
+ export interface ListAccessGrantsRequest {
2855
+ /**
2856
+ * The ID of the Amazon Web Services account that is making this request.
2857
+ */
2858
+ AccountId: AccountId;
2859
+ /**
2860
+ * A pagination token to request the next page of results. Pass this value into a subsequent List Access Grants request in order to retrieve the next page of results.
2861
+ */
2862
+ NextToken?: ContinuationToken;
2863
+ /**
2864
+ * The maximum number of access grants that you would like returned in the List Access Grants response. If the results include the pagination token NextToken, make another call using the NextToken to determine if there are more results.
2865
+ */
2866
+ MaxResults?: MaxResults;
2867
+ /**
2868
+ * The type of the grantee to which access has been granted. It can be one of the following values: IAM - An IAM user or role. DIRECTORY_USER - Your corporate directory user. You can use this option if you have added your corporate identity directory to IAM Identity Center and associated the IAM Identity Center instance with your S3 Access Grants instance. DIRECTORY_GROUP - Your corporate directory group. You can use this option if you have added your corporate identity directory to IAM Identity Center and associated the IAM Identity Center instance with your S3 Access Grants instance.
2869
+ */
2870
+ GranteeType?: GranteeType;
2871
+ /**
2872
+ * The unique identifer of the Grantee. If the grantee type is IAM, the identifier is the IAM Amazon Resource Name (ARN) of the user or role. If the grantee type is a directory user or group, the identifier is 128-bit universally unique identifier (UUID) in the format a1b2c3d4-5678-90ab-cdef-EXAMPLE11111. You can obtain this UUID from your Amazon Web Services IAM Identity Center instance.
2873
+ */
2874
+ GranteeIdentifier?: GranteeIdentifier;
2875
+ /**
2876
+ * The type of permission granted to your S3 data, which can be set to one of the following values: READ – Grant read-only access to the S3 data. WRITE – Grant write-only access to the S3 data. READWRITE – Grant both read and write access to the S3 data.
2877
+ */
2878
+ Permission?: Permission;
2879
+ /**
2880
+ * The S3 path of the data to which you are granting access. It is the result of appending the Subprefix to the location scope.
2881
+ */
2882
+ GrantScope?: S3Prefix;
2883
+ /**
2884
+ * The Amazon Resource Name (ARN) of an Amazon Web Services IAM Identity Center application associated with your Identity Center instance. If the grant includes an application ARN, the grantee can only access the S3 data through this application.
2885
+ */
2886
+ ApplicationArn?: IdentityCenterApplicationArn;
2887
+ }
2888
+ export interface ListAccessGrantsResult {
2889
+ /**
2890
+ * A pagination token to request the next page of results. Pass this value into a subsequent List Access Grants request in order to retrieve the next page of results.
2891
+ */
2892
+ NextToken?: ContinuationToken;
2893
+ /**
2894
+ * A container for a list of grants in an S3 Access Grants instance.
2895
+ */
2896
+ AccessGrantsList?: AccessGrantsList;
2897
+ }
2142
2898
  export interface ListAccessPointsForObjectLambdaRequest {
2143
2899
  /**
2144
2900
  * The account ID for the account that owns the specified Object Lambda Access Point.
@@ -2349,7 +3105,7 @@ declare namespace S3Control {
2349
3105
  */
2350
3106
  AccountId: AccountId;
2351
3107
  /**
2352
- * The Amazon Resource Name (ARN) of the S3 resource that you want to list the tags for.
3108
+ * The Amazon Resource Name (ARN) of the S3 resource that you want to list the tags for. The tagged resource can be an S3 Storage Lens group or S3 Access Grants instance, registered location, or grant.
2353
3109
  */
2354
3110
  ResourceArn: S3ResourceArn;
2355
3111
  }
@@ -2577,9 +3333,12 @@ declare namespace S3Control {
2577
3333
  export type ObjectSizeLessThanBytes = number;
2578
3334
  export type ObjectSizeValue = number;
2579
3335
  export type OperationName = "LambdaInvoke"|"S3PutObjectCopy"|"S3PutObjectAcl"|"S3PutObjectTagging"|"S3DeleteObjectTagging"|"S3InitiateRestoreObject"|"S3PutObjectLegalHold"|"S3PutObjectRetention"|"S3ReplicateObject"|string;
3336
+ export type Organization = string;
2580
3337
  export type OutputSchemaVersion = "V_1"|string;
2581
3338
  export type OwnerOverride = "Destination"|string;
3339
+ export type Permission = "READ"|"WRITE"|"READWRITE"|string;
2582
3340
  export type Policy = string;
3341
+ export type PolicyDocument = string;
2583
3342
  export interface PolicyStatus {
2584
3343
  /**
2585
3344
  *
@@ -2601,6 +3360,7 @@ declare namespace S3Control {
2601
3360
  SelectionCriteria?: SelectionCriteria;
2602
3361
  }
2603
3362
  export type Priority = number;
3363
+ export type Privilege = "Minimal"|"Default"|string;
2604
3364
  export interface ProposedMultiRegionAccessPointPolicy {
2605
3365
  /**
2606
3366
  * The details of the proposed policy.
@@ -2626,6 +3386,34 @@ declare namespace S3Control {
2626
3386
  RestrictPublicBuckets?: Setting;
2627
3387
  }
2628
3388
  export type PublicAccessBlockEnabled = boolean;
3389
+ export interface PutAccessGrantsInstanceResourcePolicyRequest {
3390
+ /**
3391
+ * The ID of the Amazon Web Services account that is making this request.
3392
+ */
3393
+ AccountId: AccountId;
3394
+ /**
3395
+ * The resource policy of the S3 Access Grants instance that you are updating.
3396
+ */
3397
+ Policy: PolicyDocument;
3398
+ /**
3399
+ * The Organization of the resource policy of the S3 Access Grants instance.
3400
+ */
3401
+ Organization?: Organization;
3402
+ }
3403
+ export interface PutAccessGrantsInstanceResourcePolicyResult {
3404
+ /**
3405
+ * The updated resource policy of the S3 Access Grants instance.
3406
+ */
3407
+ Policy?: PolicyDocument;
3408
+ /**
3409
+ * The Organization of the resource policy of the S3 Access Grants instance.
3410
+ */
3411
+ Organization?: Organization;
3412
+ /**
3413
+ * The date and time when you created the S3 Access Grants instance resource policy.
3414
+ */
3415
+ CreatedAt?: CreationTimestamp;
3416
+ }
2629
3417
  export interface PutAccessPointConfigurationForObjectLambdaRequest {
2630
3418
  /**
2631
3419
  * The account ID for the account that owns the specified Object Lambda Access Point.
@@ -3280,6 +4068,8 @@ declare namespace S3Control {
3280
4068
  }
3281
4069
  export type S3ObjectVersionId = string;
3282
4070
  export type S3Permission = "FULL_CONTROL"|"READ"|"WRITE"|"READ_ACP"|"WRITE_ACP"|string;
4071
+ export type S3Prefix = string;
4072
+ export type S3PrefixType = "Object"|string;
3283
4073
  export type S3RegionalBucketArn = string;
3284
4074
  export interface S3ReplicateObjectOperation {
3285
4075
  }
@@ -3353,6 +4143,7 @@ declare namespace S3Control {
3353
4143
  }
3354
4144
  export interface SSES3Encryption {
3355
4145
  }
4146
+ export type SecretAccessKey = string;
3356
4147
  export interface SelectionCriteria {
3357
4148
  /**
3358
4149
  * A container for the delimiter of the selection criteria being used.
@@ -3367,6 +4158,7 @@ declare namespace S3Control {
3367
4158
  */
3368
4159
  MinStorageBytesPercentage?: MinStorageBytesPercentage;
3369
4160
  }
4161
+ export type SessionToken = string;
3370
4162
  export type Setting = boolean;
3371
4163
  export interface SourceSelectionCriteria {
3372
4164
  /**
@@ -3592,11 +4384,11 @@ declare namespace S3Control {
3592
4384
  export type SuspendedDate = Date;
3593
4385
  export interface Tag {
3594
4386
  /**
3595
- * The tag key for your Amazon Web Services resource. A tag key can be up to 128 Unicode characters in length and is case-sensitive. System created tags that begin with aws: aren’t supported.
4387
+ * The key of the key-value pair of a tag added to your Amazon Web Services resource. A tag key can be up to 128 Unicode characters in length and is case-sensitive. System created tags that begin with aws: aren’t supported.
3596
4388
  */
3597
4389
  Key: TagKeyString;
3598
4390
  /**
3599
- * The tag value for your Amazon Web Services resource. A tag value can be up to 256 Unicode characters in length and is case-sensitive.
4391
+ * The value of the key-value pair of a tag added to your Amazon Web Services resource. A tag value can be up to 256 Unicode characters in length and is case-sensitive.
3600
4392
  */
3601
4393
  Value: TagValueString;
3602
4394
  }
@@ -3605,11 +4397,11 @@ declare namespace S3Control {
3605
4397
  export type TagList = Tag[];
3606
4398
  export interface TagResourceRequest {
3607
4399
  /**
3608
- * The Amazon Web Services account ID that created the S3 resource that you're trying to add tags to.
4400
+ * The Amazon Web Services account ID that created the S3 resource that you're trying to add tags to or the requester's account ID.
3609
4401
  */
3610
4402
  AccountId: AccountId;
3611
4403
  /**
3612
- * The Amazon Resource Name (ARN) of the S3 resource that you're trying to add tags to.
4404
+ * The Amazon Resource Name (ARN) of the S3 resource that you're trying to add tags to. The tagged resource can be an S3 Storage Lens group or S3 Access Grants instance, registered location, or grant.
3613
4405
  */
3614
4406
  ResourceArn: S3ResourceArn;
3615
4407
  /**
@@ -3650,16 +4442,52 @@ declare namespace S3Control {
3650
4442
  */
3651
4443
  AccountId: AccountId;
3652
4444
  /**
3653
- * The Amazon Resource Name (ARN) of the S3 resource that you want to remove the resource tags from.
4445
+ * The Amazon Resource Name (ARN) of the S3 resource that you're trying to remove the tags from.
3654
4446
  */
3655
4447
  ResourceArn: S3ResourceArn;
3656
4448
  /**
3657
- * The tag key pair of the S3 resource tag that you're trying to remove.
4449
+ * The array of tag key-value pairs that you're trying to remove from of the S3 resource.
3658
4450
  */
3659
4451
  TagKeys: TagKeyList;
3660
4452
  }
3661
4453
  export interface UntagResourceResult {
3662
4454
  }
4455
+ export interface UpdateAccessGrantsLocationRequest {
4456
+ /**
4457
+ * The ID of the Amazon Web Services account that is making this request.
4458
+ */
4459
+ AccountId: AccountId;
4460
+ /**
4461
+ * The ID of the registered location that you are updating. S3 Access Grants assigns this ID when you register the location. S3 Access Grants assigns the ID default to the default location s3:// and assigns an auto-generated ID to other locations that you register. The ID of the registered location to which you are granting access. S3 Access Grants assigned this ID when you registered the location. S3 Access Grants assigns the ID default to the default location s3:// and assigns an auto-generated ID to other locations that you register. If you are passing the default location, you cannot create an access grant for the entire default location. You must also specify a bucket or a bucket and prefix in the Subprefix field.
4462
+ */
4463
+ AccessGrantsLocationId: AccessGrantsLocationId;
4464
+ /**
4465
+ * The Amazon Resource Name (ARN) of the IAM role for the registered location. S3 Access Grants assumes this role to manage access to the registered location.
4466
+ */
4467
+ IAMRoleArn: IAMRoleArn;
4468
+ }
4469
+ export interface UpdateAccessGrantsLocationResult {
4470
+ /**
4471
+ * The date and time when you registered the location.
4472
+ */
4473
+ CreatedAt?: CreationTimestamp;
4474
+ /**
4475
+ * The ID of the registered location to which you are granting access. S3 Access Grants assigned this ID when you registered the location. S3 Access Grants assigns the ID default to the default location s3:// and assigns an auto-generated ID to other locations that you register.
4476
+ */
4477
+ AccessGrantsLocationId?: AccessGrantsLocationId;
4478
+ /**
4479
+ * The Amazon Resource Name (ARN) of the registered location that you are updating.
4480
+ */
4481
+ AccessGrantsLocationArn?: AccessGrantsLocationArn;
4482
+ /**
4483
+ * The S3 URI path of the location that you are updating. You cannot update the scope of the registered location. The location scope can be the default S3 location s3://, the S3 path to a bucket s3://&lt;bucket&gt;, or the S3 path to a bucket and prefix s3://&lt;bucket&gt;/&lt;prefix&gt;.
4484
+ */
4485
+ LocationScope?: S3Prefix;
4486
+ /**
4487
+ * The Amazon Resource Name (ARN) of the IAM role of the registered location. S3 Access Grants assumes this role to manage access to the registered location.
4488
+ */
4489
+ IAMRoleArn?: IAMRoleArn;
4490
+ }
3663
4491
  export interface UpdateJobPriorityRequest {
3664
4492
  /**
3665
4493
  * The Amazon Web Services account ID associated with the S3 Batch Operations job.