aws-sdk 2.1638.0 → 2.1640.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -1
- package/apis/accessanalyzer-2019-11-01.examples.json +196 -0
- package/apis/accessanalyzer-2019-11-01.min.json +254 -111
- package/apis/accessanalyzer-2019-11-01.paginators.json +6 -0
- package/apis/apptest-2022-12-06.min.json +1917 -0
- package/apis/apptest-2022-12-06.paginators.json +40 -0
- package/apis/apptest-2022-12-06.waiters2.json +5 -0
- package/apis/ec2-2016-11-15.min.json +160 -107
- package/apis/guardduty-2017-11-28.min.json +429 -124
- package/apis/metadata.json +7 -3
- package/apis/networkmanager-2019-07-05.min.json +277 -175
- package/apis/osis-2022-01-01.min.json +33 -28
- package/apis/pca-connector-scep-2018-05-10.examples.json +5 -0
- package/apis/pca-connector-scep-2018-05-10.min.json +456 -0
- package/apis/pca-connector-scep-2018-05-10.paginators.json +16 -0
- package/apis/pca-connector-scep-2018-05-10.waiters2.json +5 -0
- package/apis/redshift-2012-12-01.min.json +7 -1
- package/apis/sagemaker-2017-07-24.min.json +302 -288
- package/apis/secretsmanager-2017-10-17.min.json +8 -1
- package/apis/securitylake-2018-05-10.min.json +7 -1
- package/apis/sesv2-2019-09-27.min.json +139 -121
- package/clients/accessanalyzer.d.ts +162 -3
- package/clients/all.d.ts +2 -1
- package/clients/all.js +3 -2
- package/clients/apptest.d.ts +2019 -0
- package/clients/apptest.js +19 -0
- package/clients/ec2.d.ts +57 -3
- package/clients/guardduty.d.ts +277 -5
- package/clients/networkmanager.d.ts +155 -11
- package/clients/osis.d.ts +9 -0
- package/clients/pcaconnectorscep.d.ts +486 -0
- package/clients/pcaconnectorscep.js +19 -0
- package/clients/redshift.d.ts +16 -16
- package/clients/sagemaker.d.ts +24 -0
- package/clients/secretsmanager.d.ts +18 -13
- package/clients/securitylake.d.ts +3 -3
- package/clients/sesv2.d.ts +24 -10
- package/dist/aws-sdk-core-react-native.js +2 -2
- package/dist/aws-sdk-react-native.js +582 -531
- package/dist/aws-sdk.js +185 -115
- package/dist/aws-sdk.min.js +78 -78
- package/lib/config_service_placeholders.d.ts +4 -2
- package/lib/core.js +1 -1
- package/package.json +1 -1
- package/apis/backupstorage-2018-04-10.min.json +0 -522
- package/apis/backupstorage-2018-04-10.paginators.json +0 -14
- package/clients/backupstorage.d.ts +0 -469
- package/clients/backupstorage.js +0 -18
- /package/apis/{backupstorage-2018-04-10.examples.json → apptest-2022-12-06.examples.json} +0 -0
package/README.md
CHANGED
@@ -64,7 +64,7 @@ require('aws-sdk/lib/maintenance_mode_message').suppress = true;
|
|
64
64
|
To use the SDK in the browser, simply add the following script tag to your
|
65
65
|
HTML pages:
|
66
66
|
|
67
|
-
<script src="https://sdk.amazonaws.com/js/aws-sdk-2.
|
67
|
+
<script src="https://sdk.amazonaws.com/js/aws-sdk-2.1640.0.min.js"></script>
|
68
68
|
|
69
69
|
You can also build a custom browser SDK with your specified set of AWS services.
|
70
70
|
This can allow you to reduce the SDK's size, specify different API versions of
|
@@ -1,5 +1,201 @@
|
|
1
1
|
{
|
2
2
|
"version": "1.0",
|
3
3
|
"examples": {
|
4
|
+
"CheckAccessNotGranted": [
|
5
|
+
{
|
6
|
+
"input": {
|
7
|
+
"access": [
|
8
|
+
{
|
9
|
+
"actions": [
|
10
|
+
"s3:PutObject"
|
11
|
+
]
|
12
|
+
}
|
13
|
+
],
|
14
|
+
"policyDocument": "{\"Version\":\"2012-10-17\",\"Id\":\"123\",\"Statement\":[{\"Sid\":\"AllowJohnDoe\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::123456789012:user/JohnDoe\"},\"Action\":\"s3:GetObject\",\"Resource\":\"*\"}]}",
|
15
|
+
"policyType": "RESOURCE_POLICY"
|
16
|
+
},
|
17
|
+
"output": {
|
18
|
+
"message": "The policy document does not grant access to perform the listed actions or resources.",
|
19
|
+
"result": "PASS"
|
20
|
+
},
|
21
|
+
"id": "example-1",
|
22
|
+
"title": "Passing check. Restrictive identity policy."
|
23
|
+
},
|
24
|
+
{
|
25
|
+
"input": {
|
26
|
+
"access": [
|
27
|
+
{
|
28
|
+
"resources": [
|
29
|
+
"arn:aws:s3:::sensitive-bucket/*"
|
30
|
+
]
|
31
|
+
}
|
32
|
+
],
|
33
|
+
"policyDocument": "{\"Version\":\"2012-10-17\",\"Id\":\"123\",\"Statement\":[{\"Sid\":\"AllowJohnDoe\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::123456789012:user/JohnDoe\"},\"Action\":\"s3:PutObject\",\"Resource\":\"arn:aws:s3:::non-sensitive-bucket/*\"}]}",
|
34
|
+
"policyType": "RESOURCE_POLICY"
|
35
|
+
},
|
36
|
+
"output": {
|
37
|
+
"message": "The policy document does not grant access to perform the listed actions or resources.",
|
38
|
+
"result": "PASS"
|
39
|
+
},
|
40
|
+
"id": "example-2",
|
41
|
+
"title": "Passing check. Restrictive S3 Bucket resource policy."
|
42
|
+
},
|
43
|
+
{
|
44
|
+
"input": {
|
45
|
+
"access": [
|
46
|
+
{
|
47
|
+
"resources": [
|
48
|
+
"arn:aws:s3:::my-bucket/*"
|
49
|
+
]
|
50
|
+
}
|
51
|
+
],
|
52
|
+
"policyDocument": "{\"Version\":\"2012-10-17\",\"Id\":\"123\",\"Statement\":[{\"Sid\":\"AllowJohnDoe\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::123456789012:user/JohnDoe\"},\"Action\":\"s3:PutObject\",\"Resource\":\"arn:aws:s3:::my-bucket/*\"}]}",
|
53
|
+
"policyType": "RESOURCE_POLICY"
|
54
|
+
},
|
55
|
+
"output": {
|
56
|
+
"message": "The policy document grants access to perform one or more of the listed actions or resources.",
|
57
|
+
"reasons": [
|
58
|
+
{
|
59
|
+
"description": "One or more of the listed actions or resources in the statement with sid: AllowJohnDoe.",
|
60
|
+
"statementId": "AllowJohnDoe",
|
61
|
+
"statementIndex": 0
|
62
|
+
}
|
63
|
+
],
|
64
|
+
"result": "FAIL"
|
65
|
+
},
|
66
|
+
"id": "example-3",
|
67
|
+
"title": "Failing check. Permissive S3 Bucket resource policy."
|
68
|
+
}
|
69
|
+
],
|
70
|
+
"CheckNoPublicAccess": [
|
71
|
+
{
|
72
|
+
"input": {
|
73
|
+
"policyDocument": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"Bob\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::111122223333:user/JohnDoe\"},\"Action\":[\"s3:GetObject\"]}]}",
|
74
|
+
"resourceType": "AWS::S3::Bucket"
|
75
|
+
},
|
76
|
+
"output": {
|
77
|
+
"message": "The resource policy does not grant public access for the given resource type.",
|
78
|
+
"result": "PASS"
|
79
|
+
},
|
80
|
+
"id": "example-1",
|
81
|
+
"title": "Passing check. S3 Bucket policy without public access."
|
82
|
+
},
|
83
|
+
{
|
84
|
+
"input": {
|
85
|
+
"policyDocument": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"Bob\",\"Effect\":\"Allow\",\"Principal\":\"*\",\"Action\":[\"s3:GetObject\"]}]}",
|
86
|
+
"resourceType": "AWS::S3::Bucket"
|
87
|
+
},
|
88
|
+
"output": {
|
89
|
+
"message": "The resource policy grants public access for the given resource type.",
|
90
|
+
"reasons": [
|
91
|
+
{
|
92
|
+
"description": "Public access granted in the following statement with sid: Bob.",
|
93
|
+
"statementId": "Bob",
|
94
|
+
"statementIndex": 0
|
95
|
+
}
|
96
|
+
],
|
97
|
+
"result": "FAIL"
|
98
|
+
},
|
99
|
+
"id": "example-2",
|
100
|
+
"title": "Failing check. S3 Bucket policy with public access."
|
101
|
+
}
|
102
|
+
],
|
103
|
+
"GenerateFindingRecommendation": [
|
104
|
+
{
|
105
|
+
"input": {
|
106
|
+
"analyzerArn": "arn:aws:access-analyzer:us-east-1:111122223333:analyzer/a",
|
107
|
+
"id": "finding-id"
|
108
|
+
},
|
109
|
+
"output": {
|
110
|
+
},
|
111
|
+
"id": "example-1",
|
112
|
+
"title": "Successfully started generating finding recommendation"
|
113
|
+
},
|
114
|
+
{
|
115
|
+
"input": {
|
116
|
+
"analyzerArn": "arn:aws:access-analyzer:us-east-1:111122223333:analyzer/a",
|
117
|
+
"id": "!"
|
118
|
+
},
|
119
|
+
"id": "example-2",
|
120
|
+
"title": "Failed field validation for id value"
|
121
|
+
}
|
122
|
+
],
|
123
|
+
"GetFindingRecommendation": [
|
124
|
+
{
|
125
|
+
"input": {
|
126
|
+
"analyzerArn": "arn:aws:access-analyzer:us-east-1:111122223333:analyzer/a",
|
127
|
+
"id": "finding-id",
|
128
|
+
"maxResults": 3,
|
129
|
+
"nextToken": "token"
|
130
|
+
},
|
131
|
+
"output": {
|
132
|
+
"completedAt": "2000-01-01T00:00:01Z",
|
133
|
+
"recommendationType": "UnusedPermissionRecommendation",
|
134
|
+
"recommendedSteps": [
|
135
|
+
{
|
136
|
+
"unusedPermissionsRecommendedStep": {
|
137
|
+
"existingPolicyId": "policy-id",
|
138
|
+
"recommendedAction": "DETACH_POLICY"
|
139
|
+
}
|
140
|
+
},
|
141
|
+
{
|
142
|
+
"unusedPermissionsRecommendedStep": {
|
143
|
+
"existingPolicyId": "policy-id",
|
144
|
+
"recommendedAction": "CREATE_POLICY",
|
145
|
+
"recommendedPolicy": "policy-content"
|
146
|
+
}
|
147
|
+
}
|
148
|
+
],
|
149
|
+
"resourceArn": "arn:aws:iam::111122223333:role/test",
|
150
|
+
"startedAt": "2000-01-01T00:00:00Z",
|
151
|
+
"status": "SUCCEEDED"
|
152
|
+
},
|
153
|
+
"id": "example-1",
|
154
|
+
"title": "Successfully fetched finding recommendation"
|
155
|
+
},
|
156
|
+
{
|
157
|
+
"input": {
|
158
|
+
"analyzerArn": "arn:aws:access-analyzer:us-east-1:111122223333:analyzer/a",
|
159
|
+
"id": "finding-id",
|
160
|
+
"maxResults": 3
|
161
|
+
},
|
162
|
+
"output": {
|
163
|
+
"recommendationType": "UnusedPermissionRecommendation",
|
164
|
+
"resourceArn": "arn:aws:iam::111122223333:role/test",
|
165
|
+
"startedAt": "2000-01-01T00:00:00Z",
|
166
|
+
"status": "IN_PROGRESS"
|
167
|
+
},
|
168
|
+
"id": "example-2",
|
169
|
+
"title": "In progress finding recommendation"
|
170
|
+
},
|
171
|
+
{
|
172
|
+
"input": {
|
173
|
+
"analyzerArn": "arn:aws:access-analyzer:us-east-1:111122223333:analyzer/a",
|
174
|
+
"id": "finding-id",
|
175
|
+
"maxResults": 3
|
176
|
+
},
|
177
|
+
"output": {
|
178
|
+
"completedAt": "2000-01-01T00:00:01Z",
|
179
|
+
"error": {
|
180
|
+
"code": "SERVICE_ERROR",
|
181
|
+
"message": "Service error. Please try again."
|
182
|
+
},
|
183
|
+
"recommendationType": "UnusedPermissionRecommendation",
|
184
|
+
"resourceArn": "arn:aws:iam::111122223333:role/test",
|
185
|
+
"startedAt": "2000-01-01T00:00:00Z",
|
186
|
+
"status": "FAILED"
|
187
|
+
},
|
188
|
+
"id": "example-3",
|
189
|
+
"title": "Failed finding recommendation"
|
190
|
+
},
|
191
|
+
{
|
192
|
+
"input": {
|
193
|
+
"analyzerArn": "arn:aws:access-analyzer:us-east-1:111122223333:analyzer/a",
|
194
|
+
"id": "!"
|
195
|
+
},
|
196
|
+
"id": "example-4",
|
197
|
+
"title": "Failed field validation for id value"
|
198
|
+
}
|
199
|
+
]
|
4
200
|
}
|
5
201
|
}
|