aws-sdk 2.1638.0 → 2.1639.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -43,6 +43,14 @@ declare class AccessAnalyzer extends Service {
43
43
  * Checks whether new access is allowed for an updated policy when compared to the existing policy. You can find examples for reference policies and learn how to set up and run a custom policy check for new access in the IAM Access Analyzer custom policy checks samples repository on GitHub. The reference policies in this repository are meant to be passed to the existingPolicyDocument request parameter.
44
44
  */
45
45
  checkNoNewAccess(callback?: (err: AWSError, data: AccessAnalyzer.Types.CheckNoNewAccessResponse) => void): Request<AccessAnalyzer.Types.CheckNoNewAccessResponse, AWSError>;
46
+ /**
47
+ * Checks whether a resource policy can grant public access to the specified resource type.
48
+ */
49
+ checkNoPublicAccess(params: AccessAnalyzer.Types.CheckNoPublicAccessRequest, callback?: (err: AWSError, data: AccessAnalyzer.Types.CheckNoPublicAccessResponse) => void): Request<AccessAnalyzer.Types.CheckNoPublicAccessResponse, AWSError>;
50
+ /**
51
+ * Checks whether a resource policy can grant public access to the specified resource type.
52
+ */
53
+ checkNoPublicAccess(callback?: (err: AWSError, data: AccessAnalyzer.Types.CheckNoPublicAccessResponse) => void): Request<AccessAnalyzer.Types.CheckNoPublicAccessResponse, AWSError>;
46
54
  /**
47
55
  * Creates an access preview that allows you to preview IAM Access Analyzer findings for your resource before deploying resource permissions.
48
56
  */
@@ -83,6 +91,14 @@ declare class AccessAnalyzer extends Service {
83
91
  * Deletes the specified archive rule.
84
92
  */
85
93
  deleteArchiveRule(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
94
+ /**
95
+ * Creates a recommendation for an unused permissions finding.
96
+ */
97
+ generateFindingRecommendation(params: AccessAnalyzer.Types.GenerateFindingRecommendationRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
98
+ /**
99
+ * Creates a recommendation for an unused permissions finding.
100
+ */
101
+ generateFindingRecommendation(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
86
102
  /**
87
103
  * Retrieves information about an access preview for the specified analyzer.
88
104
  */
@@ -123,6 +139,14 @@ declare class AccessAnalyzer extends Service {
123
139
  * Retrieves information about the specified finding. GetFinding and GetFindingV2 both use access-analyzer:GetFinding in the Action element of an IAM policy statement. You must have permission to perform the access-analyzer:GetFinding action.
124
140
  */
125
141
  getFinding(callback?: (err: AWSError, data: AccessAnalyzer.Types.GetFindingResponse) => void): Request<AccessAnalyzer.Types.GetFindingResponse, AWSError>;
142
+ /**
143
+ * Retrieves information about a finding recommendation for the specified analyzer.
144
+ */
145
+ getFindingRecommendation(params: AccessAnalyzer.Types.GetFindingRecommendationRequest, callback?: (err: AWSError, data: AccessAnalyzer.Types.GetFindingRecommendationResponse) => void): Request<AccessAnalyzer.Types.GetFindingRecommendationResponse, AWSError>;
146
+ /**
147
+ * Retrieves information about a finding recommendation for the specified analyzer.
148
+ */
149
+ getFindingRecommendation(callback?: (err: AWSError, data: AccessAnalyzer.Types.GetFindingRecommendationResponse) => void): Request<AccessAnalyzer.Types.GetFindingRecommendationResponse, AWSError>;
126
150
  /**
127
151
  * Retrieves information about the specified finding. GetFinding and GetFindingV2 both use access-analyzer:GetFinding in the Action element of an IAM policy statement. You must have permission to perform the access-analyzer:GetFinding action.
128
152
  */
@@ -273,11 +297,16 @@ declare namespace AccessAnalyzer {
273
297
  /**
274
298
  * A list of actions for the access permissions. Any strings that can be used as an action in an IAM policy can be used in the list of actions to check.
275
299
  */
276
- actions: AccessActionsList;
300
+ actions?: AccessActionsList;
301
+ /**
302
+ * A list of resources for the access permissions. Any strings that can be used as a resource in an IAM policy can be used in the list of resources to check.
303
+ */
304
+ resources?: AccessResourcesList;
277
305
  }
278
306
  export type AccessActionsList = Action[];
279
307
  export type AccessCheckPolicyDocument = string;
280
308
  export type AccessCheckPolicyType = "IDENTITY_POLICY"|"RESOURCE_POLICY"|string;
309
+ export type AccessCheckResourceType = "AWS::DynamoDB::Table"|"AWS::DynamoDB::Stream"|"AWS::EFS::FileSystem"|"AWS::OpenSearchService::Domain"|"AWS::Kinesis::Stream"|"AWS::Kinesis::StreamConsumer"|"AWS::KMS::Key"|"AWS::Lambda::Function"|"AWS::S3::Bucket"|"AWS::S3::AccessPoint"|"AWS::S3Express::DirectoryBucket"|"AWS::S3::Glacier"|"AWS::S3Outposts::Bucket"|"AWS::S3Outposts::AccessPoint"|"AWS::SecretsManager::Secret"|"AWS::SNS::Topic"|"AWS::SQS::Queue"|"AWS::IAM::AssumeRolePolicyDocument"|string;
281
310
  export type AccessPointArn = string;
282
311
  export type AccessPointPolicy = string;
283
312
  export interface AccessPreview {
@@ -399,6 +428,7 @@ declare namespace AccessAnalyzer {
399
428
  statusReason?: AccessPreviewStatusReason;
400
429
  }
401
430
  export type AccessPreviewsList = AccessPreviewSummary[];
431
+ export type AccessResourcesList = Resource[];
402
432
  export type AclCanonicalId = string;
403
433
  export interface AclGrantee {
404
434
  /**
@@ -574,7 +604,7 @@ declare namespace AccessAnalyzer {
574
604
  */
575
605
  policyDocument: AccessCheckPolicyDocument;
576
606
  /**
577
- * An access object containing the permissions that shouldn't be granted by the specified policy.
607
+ * An access object containing the permissions that shouldn't be granted by the specified policy. If only actions are specified, IAM Access Analyzer checks for access of the actions on all resources in the policy. If only resources are specified, then IAM Access Analyzer checks which actions have access to the specified resources. If both actions and resources are specified, then IAM Access Analyzer checks which of the specified actions have access to the specified resources.
578
608
  */
579
609
  access: CheckAccessNotGrantedRequestAccessList;
580
610
  /**
@@ -627,6 +657,31 @@ declare namespace AccessAnalyzer {
627
657
  reasons?: ReasonSummaryList;
628
658
  }
629
659
  export type CheckNoNewAccessResult = "PASS"|"FAIL"|string;
660
+ export interface CheckNoPublicAccessRequest {
661
+ /**
662
+ * The JSON policy document to evaluate for public access.
663
+ */
664
+ policyDocument: AccessCheckPolicyDocument;
665
+ /**
666
+ * The type of resource to evaluate for public access. For example, to check for public access to Amazon S3 buckets, you can choose AWS::S3::Bucket for the resource type. For resource types not supported as valid values, IAM Access Analyzer will return an error.
667
+ */
668
+ resourceType: AccessCheckResourceType;
669
+ }
670
+ export interface CheckNoPublicAccessResponse {
671
+ /**
672
+ * The result of the check for public access to the specified resource type. If the result is PASS, the policy doesn't allow public access to the specified resource type. If the result is FAIL, the policy might allow public access to the specified resource type.
673
+ */
674
+ result?: CheckNoPublicAccessResult;
675
+ /**
676
+ * The message indicating whether the specified policy allows public access to resources.
677
+ */
678
+ message?: String;
679
+ /**
680
+ * A list of reasons why the specified resource policy grants public access for the resource type.
681
+ */
682
+ reasons?: ReasonSummaryList;
683
+ }
684
+ export type CheckNoPublicAccessResult = "PASS"|"FAIL"|string;
630
685
  export type CloudTrailArn = string;
631
686
  export interface CloudTrailDetails {
632
687
  /**
@@ -1114,6 +1169,17 @@ declare namespace AccessAnalyzer {
1114
1169
  export type FindingType = "ExternalAccess"|"UnusedIAMRole"|"UnusedIAMUserAccessKey"|"UnusedIAMUserPassword"|"UnusedPermission"|string;
1115
1170
  export type FindingsList = FindingSummary[];
1116
1171
  export type FindingsListV2 = FindingSummaryV2[];
1172
+ export interface GenerateFindingRecommendationRequest {
1173
+ /**
1174
+ * The ARN of the analyzer used to generate the finding recommendation.
1175
+ */
1176
+ analyzerArn: AnalyzerArn;
1177
+ /**
1178
+ * The unique ID for the finding recommendation.
1179
+ */
1180
+ id: GenerateFindingRecommendationRequestIdString;
1181
+ }
1182
+ export type GenerateFindingRecommendationRequestIdString = string;
1117
1183
  export interface GeneratedPolicy {
1118
1184
  /**
1119
1185
  * The text to use as the content for the new policy. The policy is created using the CreatePolicy action.
@@ -1202,6 +1268,60 @@ declare namespace AccessAnalyzer {
1202
1268
  export interface GetArchiveRuleResponse {
1203
1269
  archiveRule: ArchiveRuleSummary;
1204
1270
  }
1271
+ export interface GetFindingRecommendationRequest {
1272
+ /**
1273
+ * The ARN of the analyzer used to generate the finding recommendation.
1274
+ */
1275
+ analyzerArn: AnalyzerArn;
1276
+ /**
1277
+ * The unique ID for the finding recommendation.
1278
+ */
1279
+ id: GetFindingRecommendationRequestIdString;
1280
+ /**
1281
+ * The maximum number of results to return in the response.
1282
+ */
1283
+ maxResults?: GetFindingRecommendationRequestMaxResultsInteger;
1284
+ /**
1285
+ * A token used for pagination of results returned.
1286
+ */
1287
+ nextToken?: Token;
1288
+ }
1289
+ export type GetFindingRecommendationRequestIdString = string;
1290
+ export type GetFindingRecommendationRequestMaxResultsInteger = number;
1291
+ export interface GetFindingRecommendationResponse {
1292
+ /**
1293
+ * The time at which the retrieval of the finding recommendation was started.
1294
+ */
1295
+ startedAt: Timestamp;
1296
+ /**
1297
+ * The time at which the retrieval of the finding recommendation was completed.
1298
+ */
1299
+ completedAt?: Timestamp;
1300
+ /**
1301
+ * A token used for pagination of results returned.
1302
+ */
1303
+ nextToken?: Token;
1304
+ /**
1305
+ * Detailed information about the reason that the retrieval of a recommendation for the finding failed.
1306
+ */
1307
+ error?: RecommendationError;
1308
+ /**
1309
+ * The ARN of the resource of the finding.
1310
+ */
1311
+ resourceArn: ResourceArn;
1312
+ /**
1313
+ * A group of recommended steps for the finding.
1314
+ */
1315
+ recommendedSteps?: RecommendedStepList;
1316
+ /**
1317
+ * The type of recommendation for the finding.
1318
+ */
1319
+ recommendationType: RecommendationType;
1320
+ /**
1321
+ * The status of the retrieval of the finding recommendation.
1322
+ */
1323
+ status: Status;
1324
+ }
1205
1325
  export interface GetFindingRequest {
1206
1326
  /**
1207
1327
  * The ARN of the analyzer that generated the finding.
@@ -1796,7 +1916,27 @@ declare namespace AccessAnalyzer {
1796
1916
  statementId?: String;
1797
1917
  }
1798
1918
  export type ReasonSummaryList = ReasonSummary[];
1919
+ export interface RecommendationError {
1920
+ /**
1921
+ * The error code for a failed retrieval of a recommendation for a finding.
1922
+ */
1923
+ code: String;
1924
+ /**
1925
+ * The error message for a failed retrieval of a recommendation for a finding.
1926
+ */
1927
+ message: String;
1928
+ }
1929
+ export type RecommendationType = "UnusedPermissionRecommendation"|string;
1930
+ export type RecommendedRemediationAction = "CREATE_POLICY"|"DETACH_POLICY"|string;
1931
+ export interface RecommendedStep {
1932
+ /**
1933
+ * A recommended step for an unused permissions finding.
1934
+ */
1935
+ unusedPermissionsRecommendedStep?: UnusedPermissionsRecommendedStep;
1936
+ }
1937
+ export type RecommendedStepList = RecommendedStep[];
1799
1938
  export type RegionList = String[];
1939
+ export type Resource = string;
1800
1940
  export type ResourceArn = string;
1801
1941
  export type ResourceType = "AWS::S3::Bucket"|"AWS::IAM::Role"|"AWS::SQS::Queue"|"AWS::Lambda::Function"|"AWS::Lambda::LayerVersion"|"AWS::KMS::Key"|"AWS::SecretsManager::Secret"|"AWS::EFS::FileSystem"|"AWS::EC2::Snapshot"|"AWS::ECR::Repository"|"AWS::RDS::DBSnapshot"|"AWS::RDS::DBClusterSnapshot"|"AWS::SNS::Topic"|"AWS::S3Express::DirectoryBucket"|"AWS::DynamoDB::Table"|"AWS::DynamoDB::Stream"|string;
1802
1942
  export type RetiringPrincipal = string;
@@ -1944,6 +2084,7 @@ declare namespace AccessAnalyzer {
1944
2084
  */
1945
2085
  resourceOwnerAccount?: String;
1946
2086
  }
2087
+ export type Status = "SUCCEEDED"|"FAILED"|"IN_PROGRESS"|string;
1947
2088
  export interface StatusReason {
1948
2089
  /**
1949
2090
  * The reason code for the current status of the analyzer.
@@ -2069,10 +2210,28 @@ declare namespace AccessAnalyzer {
2069
2210
  */
2070
2211
  serviceNamespace: String;
2071
2212
  /**
2072
- * The time at which the permission last accessed.
2213
+ * The time at which the permission was last accessed.
2073
2214
  */
2074
2215
  lastAccessed?: Timestamp;
2075
2216
  }
2217
+ export interface UnusedPermissionsRecommendedStep {
2218
+ /**
2219
+ * The time at which the existing policy for the unused permissions finding was last updated.
2220
+ */
2221
+ policyUpdatedAt?: Timestamp;
2222
+ /**
2223
+ * A recommendation of whether to create or detach a policy for an unused permissions finding.
2224
+ */
2225
+ recommendedAction: RecommendedRemediationAction;
2226
+ /**
2227
+ * If the recommended action for the unused permissions finding is to replace the existing policy, the contents of the recommended policy to replace the policy specified in the existingPolicyId field.
2228
+ */
2229
+ recommendedPolicy?: String;
2230
+ /**
2231
+ * If the recommended action for the unused permissions finding is to detach a policy, the ID of an existing policy to be detached.
2232
+ */
2233
+ existingPolicyId?: String;
2234
+ }
2076
2235
  export interface UpdateArchiveRuleRequest {
2077
2236
  /**
2078
2237
  * The name of the analyzer to update the archive rules for.
package/clients/all.d.ts CHANGED
@@ -381,3 +381,4 @@ export import Route53Profiles = require('./route53profiles');
381
381
  export import MailManager = require('./mailmanager');
382
382
  export import TaxSettings = require('./taxsettings');
383
383
  export import ApplicationSignals = require('./applicationsignals');
384
+ export import PcaConnectorScep = require('./pcaconnectorscep');
package/clients/all.js CHANGED
@@ -382,5 +382,6 @@ module.exports = {
382
382
  Route53Profiles: require('./route53profiles'),
383
383
  MailManager: require('./mailmanager'),
384
384
  TaxSettings: require('./taxsettings'),
385
- ApplicationSignals: require('./applicationsignals')
385
+ ApplicationSignals: require('./applicationsignals'),
386
+ PcaConnectorScep: require('./pcaconnectorscep')
386
387
  };