aws-sdk 2.1638.0 → 2.1640.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -1
- package/apis/accessanalyzer-2019-11-01.examples.json +196 -0
- package/apis/accessanalyzer-2019-11-01.min.json +254 -111
- package/apis/accessanalyzer-2019-11-01.paginators.json +6 -0
- package/apis/apptest-2022-12-06.min.json +1917 -0
- package/apis/apptest-2022-12-06.paginators.json +40 -0
- package/apis/apptest-2022-12-06.waiters2.json +5 -0
- package/apis/ec2-2016-11-15.min.json +160 -107
- package/apis/guardduty-2017-11-28.min.json +429 -124
- package/apis/metadata.json +7 -3
- package/apis/networkmanager-2019-07-05.min.json +277 -175
- package/apis/osis-2022-01-01.min.json +33 -28
- package/apis/pca-connector-scep-2018-05-10.examples.json +5 -0
- package/apis/pca-connector-scep-2018-05-10.min.json +456 -0
- package/apis/pca-connector-scep-2018-05-10.paginators.json +16 -0
- package/apis/pca-connector-scep-2018-05-10.waiters2.json +5 -0
- package/apis/redshift-2012-12-01.min.json +7 -1
- package/apis/sagemaker-2017-07-24.min.json +302 -288
- package/apis/secretsmanager-2017-10-17.min.json +8 -1
- package/apis/securitylake-2018-05-10.min.json +7 -1
- package/apis/sesv2-2019-09-27.min.json +139 -121
- package/clients/accessanalyzer.d.ts +162 -3
- package/clients/all.d.ts +2 -1
- package/clients/all.js +3 -2
- package/clients/apptest.d.ts +2019 -0
- package/clients/apptest.js +19 -0
- package/clients/ec2.d.ts +57 -3
- package/clients/guardduty.d.ts +277 -5
- package/clients/networkmanager.d.ts +155 -11
- package/clients/osis.d.ts +9 -0
- package/clients/pcaconnectorscep.d.ts +486 -0
- package/clients/pcaconnectorscep.js +19 -0
- package/clients/redshift.d.ts +16 -16
- package/clients/sagemaker.d.ts +24 -0
- package/clients/secretsmanager.d.ts +18 -13
- package/clients/securitylake.d.ts +3 -3
- package/clients/sesv2.d.ts +24 -10
- package/dist/aws-sdk-core-react-native.js +2 -2
- package/dist/aws-sdk-react-native.js +582 -531
- package/dist/aws-sdk.js +185 -115
- package/dist/aws-sdk.min.js +78 -78
- package/lib/config_service_placeholders.d.ts +4 -2
- package/lib/core.js +1 -1
- package/package.json +1 -1
- package/apis/backupstorage-2018-04-10.min.json +0 -522
- package/apis/backupstorage-2018-04-10.paginators.json +0 -14
- package/clients/backupstorage.d.ts +0 -469
- package/clients/backupstorage.js +0 -18
- /package/apis/{backupstorage-2018-04-10.examples.json → apptest-2022-12-06.examples.json} +0 -0
@@ -43,6 +43,14 @@ declare class AccessAnalyzer extends Service {
|
|
43
43
|
* Checks whether new access is allowed for an updated policy when compared to the existing policy. You can find examples for reference policies and learn how to set up and run a custom policy check for new access in the IAM Access Analyzer custom policy checks samples repository on GitHub. The reference policies in this repository are meant to be passed to the existingPolicyDocument request parameter.
|
44
44
|
*/
|
45
45
|
checkNoNewAccess(callback?: (err: AWSError, data: AccessAnalyzer.Types.CheckNoNewAccessResponse) => void): Request<AccessAnalyzer.Types.CheckNoNewAccessResponse, AWSError>;
|
46
|
+
/**
|
47
|
+
* Checks whether a resource policy can grant public access to the specified resource type.
|
48
|
+
*/
|
49
|
+
checkNoPublicAccess(params: AccessAnalyzer.Types.CheckNoPublicAccessRequest, callback?: (err: AWSError, data: AccessAnalyzer.Types.CheckNoPublicAccessResponse) => void): Request<AccessAnalyzer.Types.CheckNoPublicAccessResponse, AWSError>;
|
50
|
+
/**
|
51
|
+
* Checks whether a resource policy can grant public access to the specified resource type.
|
52
|
+
*/
|
53
|
+
checkNoPublicAccess(callback?: (err: AWSError, data: AccessAnalyzer.Types.CheckNoPublicAccessResponse) => void): Request<AccessAnalyzer.Types.CheckNoPublicAccessResponse, AWSError>;
|
46
54
|
/**
|
47
55
|
* Creates an access preview that allows you to preview IAM Access Analyzer findings for your resource before deploying resource permissions.
|
48
56
|
*/
|
@@ -83,6 +91,14 @@ declare class AccessAnalyzer extends Service {
|
|
83
91
|
* Deletes the specified archive rule.
|
84
92
|
*/
|
85
93
|
deleteArchiveRule(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
94
|
+
/**
|
95
|
+
* Creates a recommendation for an unused permissions finding.
|
96
|
+
*/
|
97
|
+
generateFindingRecommendation(params: AccessAnalyzer.Types.GenerateFindingRecommendationRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
98
|
+
/**
|
99
|
+
* Creates a recommendation for an unused permissions finding.
|
100
|
+
*/
|
101
|
+
generateFindingRecommendation(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
86
102
|
/**
|
87
103
|
* Retrieves information about an access preview for the specified analyzer.
|
88
104
|
*/
|
@@ -123,6 +139,14 @@ declare class AccessAnalyzer extends Service {
|
|
123
139
|
* Retrieves information about the specified finding. GetFinding and GetFindingV2 both use access-analyzer:GetFinding in the Action element of an IAM policy statement. You must have permission to perform the access-analyzer:GetFinding action.
|
124
140
|
*/
|
125
141
|
getFinding(callback?: (err: AWSError, data: AccessAnalyzer.Types.GetFindingResponse) => void): Request<AccessAnalyzer.Types.GetFindingResponse, AWSError>;
|
142
|
+
/**
|
143
|
+
* Retrieves information about a finding recommendation for the specified analyzer.
|
144
|
+
*/
|
145
|
+
getFindingRecommendation(params: AccessAnalyzer.Types.GetFindingRecommendationRequest, callback?: (err: AWSError, data: AccessAnalyzer.Types.GetFindingRecommendationResponse) => void): Request<AccessAnalyzer.Types.GetFindingRecommendationResponse, AWSError>;
|
146
|
+
/**
|
147
|
+
* Retrieves information about a finding recommendation for the specified analyzer.
|
148
|
+
*/
|
149
|
+
getFindingRecommendation(callback?: (err: AWSError, data: AccessAnalyzer.Types.GetFindingRecommendationResponse) => void): Request<AccessAnalyzer.Types.GetFindingRecommendationResponse, AWSError>;
|
126
150
|
/**
|
127
151
|
* Retrieves information about the specified finding. GetFinding and GetFindingV2 both use access-analyzer:GetFinding in the Action element of an IAM policy statement. You must have permission to perform the access-analyzer:GetFinding action.
|
128
152
|
*/
|
@@ -273,11 +297,16 @@ declare namespace AccessAnalyzer {
|
|
273
297
|
/**
|
274
298
|
* A list of actions for the access permissions. Any strings that can be used as an action in an IAM policy can be used in the list of actions to check.
|
275
299
|
*/
|
276
|
-
actions
|
300
|
+
actions?: AccessActionsList;
|
301
|
+
/**
|
302
|
+
* A list of resources for the access permissions. Any strings that can be used as a resource in an IAM policy can be used in the list of resources to check.
|
303
|
+
*/
|
304
|
+
resources?: AccessResourcesList;
|
277
305
|
}
|
278
306
|
export type AccessActionsList = Action[];
|
279
307
|
export type AccessCheckPolicyDocument = string;
|
280
308
|
export type AccessCheckPolicyType = "IDENTITY_POLICY"|"RESOURCE_POLICY"|string;
|
309
|
+
export type AccessCheckResourceType = "AWS::DynamoDB::Table"|"AWS::DynamoDB::Stream"|"AWS::EFS::FileSystem"|"AWS::OpenSearchService::Domain"|"AWS::Kinesis::Stream"|"AWS::Kinesis::StreamConsumer"|"AWS::KMS::Key"|"AWS::Lambda::Function"|"AWS::S3::Bucket"|"AWS::S3::AccessPoint"|"AWS::S3Express::DirectoryBucket"|"AWS::S3::Glacier"|"AWS::S3Outposts::Bucket"|"AWS::S3Outposts::AccessPoint"|"AWS::SecretsManager::Secret"|"AWS::SNS::Topic"|"AWS::SQS::Queue"|"AWS::IAM::AssumeRolePolicyDocument"|string;
|
281
310
|
export type AccessPointArn = string;
|
282
311
|
export type AccessPointPolicy = string;
|
283
312
|
export interface AccessPreview {
|
@@ -399,6 +428,7 @@ declare namespace AccessAnalyzer {
|
|
399
428
|
statusReason?: AccessPreviewStatusReason;
|
400
429
|
}
|
401
430
|
export type AccessPreviewsList = AccessPreviewSummary[];
|
431
|
+
export type AccessResourcesList = Resource[];
|
402
432
|
export type AclCanonicalId = string;
|
403
433
|
export interface AclGrantee {
|
404
434
|
/**
|
@@ -574,7 +604,7 @@ declare namespace AccessAnalyzer {
|
|
574
604
|
*/
|
575
605
|
policyDocument: AccessCheckPolicyDocument;
|
576
606
|
/**
|
577
|
-
* An access object containing the permissions that shouldn't be granted by the specified policy.
|
607
|
+
* An access object containing the permissions that shouldn't be granted by the specified policy. If only actions are specified, IAM Access Analyzer checks for access of the actions on all resources in the policy. If only resources are specified, then IAM Access Analyzer checks which actions have access to the specified resources. If both actions and resources are specified, then IAM Access Analyzer checks which of the specified actions have access to the specified resources.
|
578
608
|
*/
|
579
609
|
access: CheckAccessNotGrantedRequestAccessList;
|
580
610
|
/**
|
@@ -627,6 +657,31 @@ declare namespace AccessAnalyzer {
|
|
627
657
|
reasons?: ReasonSummaryList;
|
628
658
|
}
|
629
659
|
export type CheckNoNewAccessResult = "PASS"|"FAIL"|string;
|
660
|
+
export interface CheckNoPublicAccessRequest {
|
661
|
+
/**
|
662
|
+
* The JSON policy document to evaluate for public access.
|
663
|
+
*/
|
664
|
+
policyDocument: AccessCheckPolicyDocument;
|
665
|
+
/**
|
666
|
+
* The type of resource to evaluate for public access. For example, to check for public access to Amazon S3 buckets, you can choose AWS::S3::Bucket for the resource type. For resource types not supported as valid values, IAM Access Analyzer will return an error.
|
667
|
+
*/
|
668
|
+
resourceType: AccessCheckResourceType;
|
669
|
+
}
|
670
|
+
export interface CheckNoPublicAccessResponse {
|
671
|
+
/**
|
672
|
+
* The result of the check for public access to the specified resource type. If the result is PASS, the policy doesn't allow public access to the specified resource type. If the result is FAIL, the policy might allow public access to the specified resource type.
|
673
|
+
*/
|
674
|
+
result?: CheckNoPublicAccessResult;
|
675
|
+
/**
|
676
|
+
* The message indicating whether the specified policy allows public access to resources.
|
677
|
+
*/
|
678
|
+
message?: String;
|
679
|
+
/**
|
680
|
+
* A list of reasons why the specified resource policy grants public access for the resource type.
|
681
|
+
*/
|
682
|
+
reasons?: ReasonSummaryList;
|
683
|
+
}
|
684
|
+
export type CheckNoPublicAccessResult = "PASS"|"FAIL"|string;
|
630
685
|
export type CloudTrailArn = string;
|
631
686
|
export interface CloudTrailDetails {
|
632
687
|
/**
|
@@ -1114,6 +1169,17 @@ declare namespace AccessAnalyzer {
|
|
1114
1169
|
export type FindingType = "ExternalAccess"|"UnusedIAMRole"|"UnusedIAMUserAccessKey"|"UnusedIAMUserPassword"|"UnusedPermission"|string;
|
1115
1170
|
export type FindingsList = FindingSummary[];
|
1116
1171
|
export type FindingsListV2 = FindingSummaryV2[];
|
1172
|
+
export interface GenerateFindingRecommendationRequest {
|
1173
|
+
/**
|
1174
|
+
* The ARN of the analyzer used to generate the finding recommendation.
|
1175
|
+
*/
|
1176
|
+
analyzerArn: AnalyzerArn;
|
1177
|
+
/**
|
1178
|
+
* The unique ID for the finding recommendation.
|
1179
|
+
*/
|
1180
|
+
id: GenerateFindingRecommendationRequestIdString;
|
1181
|
+
}
|
1182
|
+
export type GenerateFindingRecommendationRequestIdString = string;
|
1117
1183
|
export interface GeneratedPolicy {
|
1118
1184
|
/**
|
1119
1185
|
* The text to use as the content for the new policy. The policy is created using the CreatePolicy action.
|
@@ -1202,6 +1268,60 @@ declare namespace AccessAnalyzer {
|
|
1202
1268
|
export interface GetArchiveRuleResponse {
|
1203
1269
|
archiveRule: ArchiveRuleSummary;
|
1204
1270
|
}
|
1271
|
+
export interface GetFindingRecommendationRequest {
|
1272
|
+
/**
|
1273
|
+
* The ARN of the analyzer used to generate the finding recommendation.
|
1274
|
+
*/
|
1275
|
+
analyzerArn: AnalyzerArn;
|
1276
|
+
/**
|
1277
|
+
* The unique ID for the finding recommendation.
|
1278
|
+
*/
|
1279
|
+
id: GetFindingRecommendationRequestIdString;
|
1280
|
+
/**
|
1281
|
+
* The maximum number of results to return in the response.
|
1282
|
+
*/
|
1283
|
+
maxResults?: GetFindingRecommendationRequestMaxResultsInteger;
|
1284
|
+
/**
|
1285
|
+
* A token used for pagination of results returned.
|
1286
|
+
*/
|
1287
|
+
nextToken?: Token;
|
1288
|
+
}
|
1289
|
+
export type GetFindingRecommendationRequestIdString = string;
|
1290
|
+
export type GetFindingRecommendationRequestMaxResultsInteger = number;
|
1291
|
+
export interface GetFindingRecommendationResponse {
|
1292
|
+
/**
|
1293
|
+
* The time at which the retrieval of the finding recommendation was started.
|
1294
|
+
*/
|
1295
|
+
startedAt: Timestamp;
|
1296
|
+
/**
|
1297
|
+
* The time at which the retrieval of the finding recommendation was completed.
|
1298
|
+
*/
|
1299
|
+
completedAt?: Timestamp;
|
1300
|
+
/**
|
1301
|
+
* A token used for pagination of results returned.
|
1302
|
+
*/
|
1303
|
+
nextToken?: Token;
|
1304
|
+
/**
|
1305
|
+
* Detailed information about the reason that the retrieval of a recommendation for the finding failed.
|
1306
|
+
*/
|
1307
|
+
error?: RecommendationError;
|
1308
|
+
/**
|
1309
|
+
* The ARN of the resource of the finding.
|
1310
|
+
*/
|
1311
|
+
resourceArn: ResourceArn;
|
1312
|
+
/**
|
1313
|
+
* A group of recommended steps for the finding.
|
1314
|
+
*/
|
1315
|
+
recommendedSteps?: RecommendedStepList;
|
1316
|
+
/**
|
1317
|
+
* The type of recommendation for the finding.
|
1318
|
+
*/
|
1319
|
+
recommendationType: RecommendationType;
|
1320
|
+
/**
|
1321
|
+
* The status of the retrieval of the finding recommendation.
|
1322
|
+
*/
|
1323
|
+
status: Status;
|
1324
|
+
}
|
1205
1325
|
export interface GetFindingRequest {
|
1206
1326
|
/**
|
1207
1327
|
* The ARN of the analyzer that generated the finding.
|
@@ -1796,7 +1916,27 @@ declare namespace AccessAnalyzer {
|
|
1796
1916
|
statementId?: String;
|
1797
1917
|
}
|
1798
1918
|
export type ReasonSummaryList = ReasonSummary[];
|
1919
|
+
export interface RecommendationError {
|
1920
|
+
/**
|
1921
|
+
* The error code for a failed retrieval of a recommendation for a finding.
|
1922
|
+
*/
|
1923
|
+
code: String;
|
1924
|
+
/**
|
1925
|
+
* The error message for a failed retrieval of a recommendation for a finding.
|
1926
|
+
*/
|
1927
|
+
message: String;
|
1928
|
+
}
|
1929
|
+
export type RecommendationType = "UnusedPermissionRecommendation"|string;
|
1930
|
+
export type RecommendedRemediationAction = "CREATE_POLICY"|"DETACH_POLICY"|string;
|
1931
|
+
export interface RecommendedStep {
|
1932
|
+
/**
|
1933
|
+
* A recommended step for an unused permissions finding.
|
1934
|
+
*/
|
1935
|
+
unusedPermissionsRecommendedStep?: UnusedPermissionsRecommendedStep;
|
1936
|
+
}
|
1937
|
+
export type RecommendedStepList = RecommendedStep[];
|
1799
1938
|
export type RegionList = String[];
|
1939
|
+
export type Resource = string;
|
1800
1940
|
export type ResourceArn = string;
|
1801
1941
|
export type ResourceType = "AWS::S3::Bucket"|"AWS::IAM::Role"|"AWS::SQS::Queue"|"AWS::Lambda::Function"|"AWS::Lambda::LayerVersion"|"AWS::KMS::Key"|"AWS::SecretsManager::Secret"|"AWS::EFS::FileSystem"|"AWS::EC2::Snapshot"|"AWS::ECR::Repository"|"AWS::RDS::DBSnapshot"|"AWS::RDS::DBClusterSnapshot"|"AWS::SNS::Topic"|"AWS::S3Express::DirectoryBucket"|"AWS::DynamoDB::Table"|"AWS::DynamoDB::Stream"|string;
|
1802
1942
|
export type RetiringPrincipal = string;
|
@@ -1944,6 +2084,7 @@ declare namespace AccessAnalyzer {
|
|
1944
2084
|
*/
|
1945
2085
|
resourceOwnerAccount?: String;
|
1946
2086
|
}
|
2087
|
+
export type Status = "SUCCEEDED"|"FAILED"|"IN_PROGRESS"|string;
|
1947
2088
|
export interface StatusReason {
|
1948
2089
|
/**
|
1949
2090
|
* The reason code for the current status of the analyzer.
|
@@ -2069,10 +2210,28 @@ declare namespace AccessAnalyzer {
|
|
2069
2210
|
*/
|
2070
2211
|
serviceNamespace: String;
|
2071
2212
|
/**
|
2072
|
-
* The time at which the permission last accessed.
|
2213
|
+
* The time at which the permission was last accessed.
|
2073
2214
|
*/
|
2074
2215
|
lastAccessed?: Timestamp;
|
2075
2216
|
}
|
2217
|
+
export interface UnusedPermissionsRecommendedStep {
|
2218
|
+
/**
|
2219
|
+
* The time at which the existing policy for the unused permissions finding was last updated.
|
2220
|
+
*/
|
2221
|
+
policyUpdatedAt?: Timestamp;
|
2222
|
+
/**
|
2223
|
+
* A recommendation of whether to create or detach a policy for an unused permissions finding.
|
2224
|
+
*/
|
2225
|
+
recommendedAction: RecommendedRemediationAction;
|
2226
|
+
/**
|
2227
|
+
* If the recommended action for the unused permissions finding is to replace the existing policy, the contents of the recommended policy to replace the policy specified in the existingPolicyId field.
|
2228
|
+
*/
|
2229
|
+
recommendedPolicy?: String;
|
2230
|
+
/**
|
2231
|
+
* If the recommended action for the unused permissions finding is to detach a policy, the ID of an existing policy to be detached.
|
2232
|
+
*/
|
2233
|
+
existingPolicyId?: String;
|
2234
|
+
}
|
2076
2235
|
export interface UpdateArchiveRuleRequest {
|
2077
2236
|
/**
|
2078
2237
|
* The name of the analyzer to update the archive rules for.
|
package/clients/all.d.ts
CHANGED
@@ -306,7 +306,6 @@ export import ConnectCampaigns = require('./connectcampaigns');
|
|
306
306
|
export import RedshiftServerless = require('./redshiftserverless');
|
307
307
|
export import RolesAnywhere = require('./rolesanywhere');
|
308
308
|
export import LicenseManagerUserSubscriptions = require('./licensemanagerusersubscriptions');
|
309
|
-
export import BackupStorage = require('./backupstorage');
|
310
309
|
export import PrivateNetworks = require('./privatenetworks');
|
311
310
|
export import SupportApp = require('./supportapp');
|
312
311
|
export import ControlTower = require('./controltower');
|
@@ -381,3 +380,5 @@ export import Route53Profiles = require('./route53profiles');
|
|
381
380
|
export import MailManager = require('./mailmanager');
|
382
381
|
export import TaxSettings = require('./taxsettings');
|
383
382
|
export import ApplicationSignals = require('./applicationsignals');
|
383
|
+
export import PcaConnectorScep = require('./pcaconnectorscep');
|
384
|
+
export import AppTest = require('./apptest');
|
package/clients/all.js
CHANGED
@@ -308,7 +308,6 @@ module.exports = {
|
|
308
308
|
RedshiftServerless: require('./redshiftserverless'),
|
309
309
|
RolesAnywhere: require('./rolesanywhere'),
|
310
310
|
LicenseManagerUserSubscriptions: require('./licensemanagerusersubscriptions'),
|
311
|
-
BackupStorage: require('./backupstorage'),
|
312
311
|
PrivateNetworks: require('./privatenetworks'),
|
313
312
|
SupportApp: require('./supportapp'),
|
314
313
|
ControlTower: require('./controltower'),
|
@@ -382,5 +381,7 @@ module.exports = {
|
|
382
381
|
Route53Profiles: require('./route53profiles'),
|
383
382
|
MailManager: require('./mailmanager'),
|
384
383
|
TaxSettings: require('./taxsettings'),
|
385
|
-
ApplicationSignals: require('./applicationsignals')
|
384
|
+
ApplicationSignals: require('./applicationsignals'),
|
385
|
+
PcaConnectorScep: require('./pcaconnectorscep'),
|
386
|
+
AppTest: require('./apptest')
|
386
387
|
};
|