aws-sdk 2.981.0 → 2.982.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +12 -1
- package/README.md +1 -1
- package/apis/acm-pca-2017-08-22.min.json +26 -14
- package/apis/elasticfilesystem-2015-02-01.min.json +2 -1
- package/apis/fsx-2018-03-01.min.json +639 -66
- package/apis/fsx-2018-03-01.paginators.json +15 -0
- package/apis/quicksight-2018-04-01.min.json +162 -127
- package/apis/s3control-2018-08-20.min.json +470 -24
- package/apis/s3control-2018-08-20.paginators.json +5 -0
- package/apis/schemas-2019-12-02.min.json +49 -31
- package/apis/securityhub-2018-10-26.min.json +492 -205
- package/apis/securityhub-2018-10-26.paginators.json +22 -11
- package/apis/transfer-2018-11-05.min.json +403 -9
- package/apis/transfer-2018-11-05.paginators.json +10 -0
- package/clients/accessanalyzer.d.ts +46 -43
- package/clients/acmpca.d.ts +21 -7
- package/clients/ebs.d.ts +1 -1
- package/clients/efs.d.ts +57 -31
- package/clients/fsx.d.ts +694 -52
- package/clients/lexmodelbuildingservice.d.ts +1 -1
- package/clients/quicksight.d.ts +343 -310
- package/clients/s3control.d.ts +439 -44
- package/clients/schemas.d.ts +25 -0
- package/clients/securityhub.d.ts +524 -21
- package/clients/transfer.d.ts +556 -28
- package/dist/aws-sdk-core-react-native.js +1 -1
- package/dist/aws-sdk-react-native.js +13 -13
- package/dist/aws-sdk.js +5 -4
- package/dist/aws-sdk.min.js +6 -6
- package/lib/core.js +1 -1
- package/package.json +1 -1
|
@@ -28,11 +28,11 @@ declare class AccessAnalyzer extends Service {
|
|
|
28
28
|
*/
|
|
29
29
|
cancelPolicyGeneration(callback?: (err: AWSError, data: AccessAnalyzer.Types.CancelPolicyGenerationResponse) => void): Request<AccessAnalyzer.Types.CancelPolicyGenerationResponse, AWSError>;
|
|
30
30
|
/**
|
|
31
|
-
* Creates an access preview that allows you to preview Access Analyzer findings for your resource before deploying resource permissions.
|
|
31
|
+
* Creates an access preview that allows you to preview IAM Access Analyzer findings for your resource before deploying resource permissions.
|
|
32
32
|
*/
|
|
33
33
|
createAccessPreview(params: AccessAnalyzer.Types.CreateAccessPreviewRequest, callback?: (err: AWSError, data: AccessAnalyzer.Types.CreateAccessPreviewResponse) => void): Request<AccessAnalyzer.Types.CreateAccessPreviewResponse, AWSError>;
|
|
34
34
|
/**
|
|
35
|
-
* Creates an access preview that allows you to preview Access Analyzer findings for your resource before deploying resource permissions.
|
|
35
|
+
* Creates an access preview that allows you to preview IAM Access Analyzer findings for your resource before deploying resource permissions.
|
|
36
36
|
*/
|
|
37
37
|
createAccessPreview(callback?: (err: AWSError, data: AccessAnalyzer.Types.CreateAccessPreviewResponse) => void): Request<AccessAnalyzer.Types.CreateAccessPreviewResponse, AWSError>;
|
|
38
38
|
/**
|
|
@@ -44,19 +44,19 @@ declare class AccessAnalyzer extends Service {
|
|
|
44
44
|
*/
|
|
45
45
|
createAnalyzer(callback?: (err: AWSError, data: AccessAnalyzer.Types.CreateAnalyzerResponse) => void): Request<AccessAnalyzer.Types.CreateAnalyzerResponse, AWSError>;
|
|
46
46
|
/**
|
|
47
|
-
* Creates an archive rule for the specified analyzer. Archive rules automatically archive new findings that meet the criteria you define when you create the rule. To learn about filter keys that you can use to create an archive rule, see Access Analyzer filter keys in the IAM User Guide.
|
|
47
|
+
* Creates an archive rule for the specified analyzer. Archive rules automatically archive new findings that meet the criteria you define when you create the rule. To learn about filter keys that you can use to create an archive rule, see IAM Access Analyzer filter keys in the IAM User Guide.
|
|
48
48
|
*/
|
|
49
49
|
createArchiveRule(params: AccessAnalyzer.Types.CreateArchiveRuleRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
|
50
50
|
/**
|
|
51
|
-
* Creates an archive rule for the specified analyzer. Archive rules automatically archive new findings that meet the criteria you define when you create the rule. To learn about filter keys that you can use to create an archive rule, see Access Analyzer filter keys in the IAM User Guide.
|
|
51
|
+
* Creates an archive rule for the specified analyzer. Archive rules automatically archive new findings that meet the criteria you define when you create the rule. To learn about filter keys that you can use to create an archive rule, see IAM Access Analyzer filter keys in the IAM User Guide.
|
|
52
52
|
*/
|
|
53
53
|
createArchiveRule(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
|
54
54
|
/**
|
|
55
|
-
* Deletes the specified analyzer. When you delete an analyzer, Access Analyzer is disabled for the account or organization in the current or specific Region. All findings that were generated by the analyzer are deleted. You cannot undo this action.
|
|
55
|
+
* Deletes the specified analyzer. When you delete an analyzer, IAM Access Analyzer is disabled for the account or organization in the current or specific Region. All findings that were generated by the analyzer are deleted. You cannot undo this action.
|
|
56
56
|
*/
|
|
57
57
|
deleteAnalyzer(params: AccessAnalyzer.Types.DeleteAnalyzerRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
|
58
58
|
/**
|
|
59
|
-
* Deletes the specified analyzer. When you delete an analyzer, Access Analyzer is disabled for the account or organization in the current or specific Region. All findings that were generated by the analyzer are deleted. You cannot undo this action.
|
|
59
|
+
* Deletes the specified analyzer. When you delete an analyzer, IAM Access Analyzer is disabled for the account or organization in the current or specific Region. All findings that were generated by the analyzer are deleted. You cannot undo this action.
|
|
60
60
|
*/
|
|
61
61
|
deleteAnalyzer(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
|
62
62
|
/**
|
|
@@ -92,11 +92,11 @@ declare class AccessAnalyzer extends Service {
|
|
|
92
92
|
*/
|
|
93
93
|
getAnalyzer(callback?: (err: AWSError, data: AccessAnalyzer.Types.GetAnalyzerResponse) => void): Request<AccessAnalyzer.Types.GetAnalyzerResponse, AWSError>;
|
|
94
94
|
/**
|
|
95
|
-
* Retrieves information about an archive rule. To learn about filter keys that you can use to create an archive rule, see Access Analyzer filter keys in the IAM User Guide.
|
|
95
|
+
* Retrieves information about an archive rule. To learn about filter keys that you can use to create an archive rule, see IAM Access Analyzer filter keys in the IAM User Guide.
|
|
96
96
|
*/
|
|
97
97
|
getArchiveRule(params: AccessAnalyzer.Types.GetArchiveRuleRequest, callback?: (err: AWSError, data: AccessAnalyzer.Types.GetArchiveRuleResponse) => void): Request<AccessAnalyzer.Types.GetArchiveRuleResponse, AWSError>;
|
|
98
98
|
/**
|
|
99
|
-
* Retrieves information about an archive rule. To learn about filter keys that you can use to create an archive rule, see Access Analyzer filter keys in the IAM User Guide.
|
|
99
|
+
* Retrieves information about an archive rule. To learn about filter keys that you can use to create an archive rule, see IAM Access Analyzer filter keys in the IAM User Guide.
|
|
100
100
|
*/
|
|
101
101
|
getArchiveRule(callback?: (err: AWSError, data: AccessAnalyzer.Types.GetArchiveRuleResponse) => void): Request<AccessAnalyzer.Types.GetArchiveRuleResponse, AWSError>;
|
|
102
102
|
/**
|
|
@@ -156,11 +156,11 @@ declare class AccessAnalyzer extends Service {
|
|
|
156
156
|
*/
|
|
157
157
|
listArchiveRules(callback?: (err: AWSError, data: AccessAnalyzer.Types.ListArchiveRulesResponse) => void): Request<AccessAnalyzer.Types.ListArchiveRulesResponse, AWSError>;
|
|
158
158
|
/**
|
|
159
|
-
* Retrieves a list of findings generated by the specified analyzer. To learn about filter keys that you can use to retrieve a list of findings, see Access Analyzer filter keys in the IAM User Guide.
|
|
159
|
+
* Retrieves a list of findings generated by the specified analyzer. To learn about filter keys that you can use to retrieve a list of findings, see IAM Access Analyzer filter keys in the IAM User Guide.
|
|
160
160
|
*/
|
|
161
161
|
listFindings(params: AccessAnalyzer.Types.ListFindingsRequest, callback?: (err: AWSError, data: AccessAnalyzer.Types.ListFindingsResponse) => void): Request<AccessAnalyzer.Types.ListFindingsResponse, AWSError>;
|
|
162
162
|
/**
|
|
163
|
-
* Retrieves a list of findings generated by the specified analyzer. To learn about filter keys that you can use to retrieve a list of findings, see Access Analyzer filter keys in the IAM User Guide.
|
|
163
|
+
* Retrieves a list of findings generated by the specified analyzer. To learn about filter keys that you can use to retrieve a list of findings, see IAM Access Analyzer filter keys in the IAM User Guide.
|
|
164
164
|
*/
|
|
165
165
|
listFindings(callback?: (err: AWSError, data: AccessAnalyzer.Types.ListFindingsResponse) => void): Request<AccessAnalyzer.Types.ListFindingsResponse, AWSError>;
|
|
166
166
|
/**
|
|
@@ -271,7 +271,7 @@ declare namespace AccessAnalyzer {
|
|
|
271
271
|
*/
|
|
272
272
|
action?: ActionList;
|
|
273
273
|
/**
|
|
274
|
-
* Provides context on how the access preview finding compares to existing access identified in Access Analyzer. New - The finding is for newly-introduced access. Unchanged - The preview finding is an existing finding that would remain unchanged. Changed - The preview finding is an existing finding with a change in status. For example, a Changed finding with preview status Resolved and existing status Active indicates the existing Active finding would become Resolved as a result of the proposed permissions change.
|
|
274
|
+
* Provides context on how the access preview finding compares to existing access identified in IAM Access Analyzer. New - The finding is for newly-introduced access. Unchanged - The preview finding is an existing finding that would remain unchanged. Changed - The preview finding is an existing finding with a change in status. For example, a Changed finding with preview status Resolved and existing status Active indicates the existing Active finding would become Resolved as a result of the proposed permissions change.
|
|
275
275
|
*/
|
|
276
276
|
changeType: FindingChangeType;
|
|
277
277
|
/**
|
|
@@ -287,7 +287,7 @@ declare namespace AccessAnalyzer {
|
|
|
287
287
|
*/
|
|
288
288
|
error?: String;
|
|
289
289
|
/**
|
|
290
|
-
* The existing ID of the finding in Access Analyzer, provided only for existing findings.
|
|
290
|
+
* The existing ID of the finding in IAM Access Analyzer, provided only for existing findings.
|
|
291
291
|
*/
|
|
292
292
|
existingFindingId?: FindingId;
|
|
293
293
|
/**
|
|
@@ -311,7 +311,7 @@ declare namespace AccessAnalyzer {
|
|
|
311
311
|
*/
|
|
312
312
|
resource?: String;
|
|
313
313
|
/**
|
|
314
|
-
* The
|
|
314
|
+
* The Amazon Web Services account ID that owns the resource. For most Amazon Web Services resources, the owning account is the account in which the resource was created.
|
|
315
315
|
*/
|
|
316
316
|
resourceOwnerAccount: String;
|
|
317
317
|
/**
|
|
@@ -361,7 +361,7 @@ declare namespace AccessAnalyzer {
|
|
|
361
361
|
export type AclCanonicalId = string;
|
|
362
362
|
export interface AclGrantee {
|
|
363
363
|
/**
|
|
364
|
-
* The value specified is the canonical user ID of an
|
|
364
|
+
* The value specified is the canonical user ID of an Amazon Web Services account.
|
|
365
365
|
*/
|
|
366
366
|
id?: AclCanonicalId;
|
|
367
367
|
/**
|
|
@@ -398,7 +398,7 @@ declare namespace AccessAnalyzer {
|
|
|
398
398
|
*/
|
|
399
399
|
resourceArn: ResourceArn;
|
|
400
400
|
/**
|
|
401
|
-
* The
|
|
401
|
+
* The Amazon Web Services account ID that owns the resource.
|
|
402
402
|
*/
|
|
403
403
|
resourceOwnerAccount: String;
|
|
404
404
|
/**
|
|
@@ -424,7 +424,7 @@ declare namespace AccessAnalyzer {
|
|
|
424
424
|
*/
|
|
425
425
|
resourceArn: ResourceArn;
|
|
426
426
|
/**
|
|
427
|
-
* The
|
|
427
|
+
* The Amazon Web Services account ID that owns the resource.
|
|
428
428
|
*/
|
|
429
429
|
resourceOwnerAccount: String;
|
|
430
430
|
/**
|
|
@@ -457,11 +457,11 @@ declare namespace AccessAnalyzer {
|
|
|
457
457
|
*/
|
|
458
458
|
name: Name;
|
|
459
459
|
/**
|
|
460
|
-
* The status of the analyzer. An Active analyzer successfully monitors supported resources and generates new findings. The analyzer is Disabled when a user action, such as removing trusted access for
|
|
460
|
+
* The status of the analyzer. An Active analyzer successfully monitors supported resources and generates new findings. The analyzer is Disabled when a user action, such as removing trusted access for Identity and Access Management Access Analyzer from Organizations, causes the analyzer to stop generating new findings. The status is Creating when the analyzer creation is in progress and Failed when the analyzer creation has failed.
|
|
461
461
|
*/
|
|
462
462
|
status: AnalyzerStatus;
|
|
463
463
|
/**
|
|
464
|
-
* The statusReason provides more details about the current status of the analyzer. For example, if the creation for the analyzer fails, a Failed status is returned. For an analyzer with organization as the type, this failure can be due to an issue with creating the service-linked roles required in the member accounts of the
|
|
464
|
+
* The statusReason provides more details about the current status of the analyzer. For example, if the creation for the analyzer fails, a Failed status is returned. For an analyzer with organization as the type, this failure can be due to an issue with creating the service-linked roles required in the member accounts of the Amazon Web Services organization.
|
|
465
465
|
*/
|
|
466
466
|
statusReason?: StatusReason;
|
|
467
467
|
/**
|
|
@@ -519,15 +519,15 @@ declare namespace AccessAnalyzer {
|
|
|
519
519
|
export type CloudTrailArn = string;
|
|
520
520
|
export interface CloudTrailDetails {
|
|
521
521
|
/**
|
|
522
|
-
* The ARN of the service role that Access Analyzer uses to access your CloudTrail trail and service last accessed information.
|
|
522
|
+
* The ARN of the service role that IAM Access Analyzer uses to access your CloudTrail trail and service last accessed information.
|
|
523
523
|
*/
|
|
524
524
|
accessRole: RoleArn;
|
|
525
525
|
/**
|
|
526
|
-
* The end of the time range for which Access Analyzer reviews your CloudTrail events. Events with a timestamp after this time are not considered to generate a policy. If this is not included in the request, the default value is the current time.
|
|
526
|
+
* The end of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events with a timestamp after this time are not considered to generate a policy. If this is not included in the request, the default value is the current time.
|
|
527
527
|
*/
|
|
528
528
|
endTime?: Timestamp;
|
|
529
529
|
/**
|
|
530
|
-
* The start of the time range for which Access Analyzer reviews your CloudTrail events. Events with a timestamp before this time are not considered to generate a policy.
|
|
530
|
+
* The start of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events with a timestamp before this time are not considered to generate a policy.
|
|
531
531
|
*/
|
|
532
532
|
startTime: Timestamp;
|
|
533
533
|
/**
|
|
@@ -537,11 +537,11 @@ declare namespace AccessAnalyzer {
|
|
|
537
537
|
}
|
|
538
538
|
export interface CloudTrailProperties {
|
|
539
539
|
/**
|
|
540
|
-
* The end of the time range for which Access Analyzer reviews your CloudTrail events. Events with a timestamp after this time are not considered to generate a policy. If this is not included in the request, the default value is the current time.
|
|
540
|
+
* The end of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events with a timestamp after this time are not considered to generate a policy. If this is not included in the request, the default value is the current time.
|
|
541
541
|
*/
|
|
542
542
|
endTime: Timestamp;
|
|
543
543
|
/**
|
|
544
|
-
* The start of the time range for which Access Analyzer reviews your CloudTrail events. Events with a timestamp before this time are not considered to generate a policy.
|
|
544
|
+
* The start of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events with a timestamp before this time are not considered to generate a policy.
|
|
545
545
|
*/
|
|
546
546
|
startTime: Timestamp;
|
|
547
547
|
/**
|
|
@@ -568,7 +568,7 @@ declare namespace AccessAnalyzer {
|
|
|
568
568
|
*/
|
|
569
569
|
secretsManagerSecret?: SecretsManagerSecretConfiguration;
|
|
570
570
|
/**
|
|
571
|
-
* The access control configuration is for an SQS queue.
|
|
571
|
+
* The access control configuration is for an Amazon SQS queue.
|
|
572
572
|
*/
|
|
573
573
|
sqsQueue?: SqsQueueConfiguration;
|
|
574
574
|
}
|
|
@@ -721,7 +721,7 @@ declare namespace AccessAnalyzer {
|
|
|
721
721
|
*/
|
|
722
722
|
resource?: String;
|
|
723
723
|
/**
|
|
724
|
-
* The
|
|
724
|
+
* The Amazon Web Services account ID that owns the resource.
|
|
725
725
|
*/
|
|
726
726
|
resourceOwnerAccount: String;
|
|
727
727
|
/**
|
|
@@ -756,7 +756,7 @@ declare namespace AccessAnalyzer {
|
|
|
756
756
|
}
|
|
757
757
|
export interface FindingSourceDetail {
|
|
758
758
|
/**
|
|
759
|
-
* The ARN of the access point that generated the finding.
|
|
759
|
+
* The ARN of the access point that generated the finding. The ARN format depends on whether the ARN represents an access point or a multi-region access point.
|
|
760
760
|
*/
|
|
761
761
|
accessPointArn?: String;
|
|
762
762
|
}
|
|
@@ -802,7 +802,7 @@ declare namespace AccessAnalyzer {
|
|
|
802
802
|
*/
|
|
803
803
|
resource?: String;
|
|
804
804
|
/**
|
|
805
|
-
* The
|
|
805
|
+
* The Amazon Web Services account ID that owns the resource.
|
|
806
806
|
*/
|
|
807
807
|
resourceOwnerAccount: String;
|
|
808
808
|
/**
|
|
@@ -836,7 +836,7 @@ declare namespace AccessAnalyzer {
|
|
|
836
836
|
*/
|
|
837
837
|
cloudTrailProperties?: CloudTrailProperties;
|
|
838
838
|
/**
|
|
839
|
-
* This value is set to true if the generated policy contains all possible actions for a service that Access Analyzer identified from the CloudTrail trail that you specified, and false otherwise.
|
|
839
|
+
* This value is set to true if the generated policy contains all possible actions for a service that IAM Access Analyzer identified from the CloudTrail trail that you specified, and false otherwise.
|
|
840
840
|
*/
|
|
841
841
|
isComplete?: Boolean;
|
|
842
842
|
/**
|
|
@@ -882,7 +882,7 @@ declare namespace AccessAnalyzer {
|
|
|
882
882
|
}
|
|
883
883
|
export interface GetAnalyzedResourceResponse {
|
|
884
884
|
/**
|
|
885
|
-
* An AnalyzedResource object that contains information that Access Analyzer found when it analyzed the resource.
|
|
885
|
+
* An AnalyzedResource object that contains information that IAM Access Analyzer found when it analyzed the resource.
|
|
886
886
|
*/
|
|
887
887
|
resource?: AnalyzedResource;
|
|
888
888
|
}
|
|
@@ -933,7 +933,7 @@ declare namespace AccessAnalyzer {
|
|
|
933
933
|
*/
|
|
934
934
|
includeResourcePlaceholders?: Boolean;
|
|
935
935
|
/**
|
|
936
|
-
* The level of detail that you want to generate. You can specify whether to generate service-level policies. Access Analyzer uses iam:servicelastaccessed to identify services that have been used recently to create this service-level template.
|
|
936
|
+
* The level of detail that you want to generate. You can specify whether to generate service-level policies. IAM Access Analyzer uses iam:servicelastaccessed to identify services that have been used recently to create this service-level template.
|
|
937
937
|
*/
|
|
938
938
|
includeServiceLevelTemplate?: Boolean;
|
|
939
939
|
/**
|
|
@@ -980,6 +980,9 @@ declare namespace AccessAnalyzer {
|
|
|
980
980
|
* A timestamp of when the job was completed.
|
|
981
981
|
*/
|
|
982
982
|
completedOn?: Timestamp;
|
|
983
|
+
/**
|
|
984
|
+
* The job error for the policy generation request.
|
|
985
|
+
*/
|
|
983
986
|
jobError?: JobError;
|
|
984
987
|
/**
|
|
985
988
|
* The JobId that is returned by the StartPolicyGeneration operation. The JobId can be used with GetGeneratedPolicy to retrieve the generated policies or used with CancelPolicyGeneration to cancel the policy generation request.
|
|
@@ -1020,7 +1023,7 @@ declare namespace AccessAnalyzer {
|
|
|
1020
1023
|
*/
|
|
1021
1024
|
granteePrincipal: GranteePrincipal;
|
|
1022
1025
|
/**
|
|
1023
|
-
* The
|
|
1026
|
+
* The Amazon Web Services account under which the grant was issued. The account is used to propose KMS grants issued by accounts other than the owner of the key.
|
|
1024
1027
|
*/
|
|
1025
1028
|
issuingAccount: IssuingAccount;
|
|
1026
1029
|
/**
|
|
@@ -1274,7 +1277,7 @@ declare namespace AccessAnalyzer {
|
|
|
1274
1277
|
export type Name = string;
|
|
1275
1278
|
export interface NetworkOriginConfiguration {
|
|
1276
1279
|
/**
|
|
1277
|
-
* The configuration for the Amazon S3 access point with an Internet origin.
|
|
1280
|
+
* The configuration for the Amazon S3 access point or multi-region access point with an Internet origin.
|
|
1278
1281
|
*/
|
|
1279
1282
|
internetConfiguration?: InternetConfiguration;
|
|
1280
1283
|
vpcConfiguration?: VpcConfiguration;
|
|
@@ -1355,15 +1358,15 @@ declare namespace AccessAnalyzer {
|
|
|
1355
1358
|
export type RoleArn = string;
|
|
1356
1359
|
export interface S3AccessPointConfiguration {
|
|
1357
1360
|
/**
|
|
1358
|
-
* The access point policy.
|
|
1361
|
+
* The access point or multi-region access point policy.
|
|
1359
1362
|
*/
|
|
1360
1363
|
accessPointPolicy?: AccessPointPolicy;
|
|
1361
1364
|
/**
|
|
1362
|
-
* The proposed Internet and VpcConfiguration to apply to this Amazon S3 access point. If the access preview is for a new resource and neither is specified, the access preview uses Internet for the network origin. If the access preview is for an existing resource and neither is specified, the access preview uses the exiting network origin.
|
|
1365
|
+
* The proposed Internet and VpcConfiguration to apply to this Amazon S3 access point. VpcConfiguration does not apply to multi-region access points. If the access preview is for a new resource and neither is specified, the access preview uses Internet for the network origin. If the access preview is for an existing resource and neither is specified, the access preview uses the exiting network origin.
|
|
1363
1366
|
*/
|
|
1364
1367
|
networkOrigin?: NetworkOriginConfiguration;
|
|
1365
1368
|
/**
|
|
1366
|
-
* The proposed S3PublicAccessBlock configuration to apply to this Amazon S3
|
|
1369
|
+
* The proposed S3PublicAccessBlock configuration to apply to this Amazon S3 access point or multi-region access point.
|
|
1367
1370
|
*/
|
|
1368
1371
|
publicAccessBlock?: S3PublicAccessBlockConfiguration;
|
|
1369
1372
|
}
|
|
@@ -1381,7 +1384,7 @@ declare namespace AccessAnalyzer {
|
|
|
1381
1384
|
export type S3BucketAclGrantConfigurationsList = S3BucketAclGrantConfiguration[];
|
|
1382
1385
|
export interface S3BucketConfiguration {
|
|
1383
1386
|
/**
|
|
1384
|
-
* The configuration of Amazon S3 access points for the bucket.
|
|
1387
|
+
* The configuration of Amazon S3 access points or multi-region access points for the bucket. You can propose up to 10 new access points per bucket.
|
|
1385
1388
|
*/
|
|
1386
1389
|
accessPoints?: S3AccessPointConfigurationsMap;
|
|
1387
1390
|
/**
|
|
@@ -1410,7 +1413,7 @@ declare namespace AccessAnalyzer {
|
|
|
1410
1413
|
}
|
|
1411
1414
|
export interface SecretsManagerSecretConfiguration {
|
|
1412
1415
|
/**
|
|
1413
|
-
* The proposed ARN, key ID, or alias of the
|
|
1416
|
+
* The proposed ARN, key ID, or alias of the KMS customer master key (CMK).
|
|
1414
1417
|
*/
|
|
1415
1418
|
kmsKeyId?: SecretsManagerSecretKmsId;
|
|
1416
1419
|
/**
|
|
@@ -1443,14 +1446,14 @@ declare namespace AccessAnalyzer {
|
|
|
1443
1446
|
}
|
|
1444
1447
|
export interface SqsQueueConfiguration {
|
|
1445
1448
|
/**
|
|
1446
|
-
* The proposed resource policy for the SQS queue.
|
|
1449
|
+
* The proposed resource policy for the Amazon SQS queue.
|
|
1447
1450
|
*/
|
|
1448
1451
|
queuePolicy?: SqsQueuePolicy;
|
|
1449
1452
|
}
|
|
1450
1453
|
export type SqsQueuePolicy = string;
|
|
1451
1454
|
export interface StartPolicyGenerationRequest {
|
|
1452
1455
|
/**
|
|
1453
|
-
* A unique, case-sensitive identifier that you provide to ensure the idempotency of the request. Idempotency ensures that an API request completes only once. With an idempotent request, if the original request completes successfully, the subsequent retries with the same client token return the result from the original successful request and they have no additional effect. If you do not specify a client token, one is automatically generated by the
|
|
1456
|
+
* A unique, case-sensitive identifier that you provide to ensure the idempotency of the request. Idempotency ensures that an API request completes only once. With an idempotent request, if the original request completes successfully, the subsequent retries with the same client token return the result from the original successful request and they have no additional effect. If you do not specify a client token, one is automatically generated by the Amazon Web Services SDK.
|
|
1454
1457
|
*/
|
|
1455
1458
|
clientToken?: String;
|
|
1456
1459
|
/**
|
|
@@ -1513,7 +1516,7 @@ declare namespace AccessAnalyzer {
|
|
|
1513
1516
|
export type Token = string;
|
|
1514
1517
|
export interface Trail {
|
|
1515
1518
|
/**
|
|
1516
|
-
* Possible values are true or false. If set to true, Access Analyzer retrieves CloudTrail data from all regions to analyze and generate a policy.
|
|
1519
|
+
* Possible values are true or false. If set to true, IAM Access Analyzer retrieves CloudTrail data from all regions to analyze and generate a policy.
|
|
1517
1520
|
*/
|
|
1518
1521
|
allRegions?: Boolean;
|
|
1519
1522
|
/**
|
|
@@ -1528,7 +1531,7 @@ declare namespace AccessAnalyzer {
|
|
|
1528
1531
|
export type TrailList = Trail[];
|
|
1529
1532
|
export interface TrailProperties {
|
|
1530
1533
|
/**
|
|
1531
|
-
* Possible values are true or false. If set to true, Access Analyzer retrieves CloudTrail data from all regions to analyze and generate a policy.
|
|
1534
|
+
* Possible values are true or false. If set to true, IAM Access Analyzer retrieves CloudTrail data from all regions to analyze and generate a policy.
|
|
1532
1535
|
*/
|
|
1533
1536
|
allRegions?: Boolean;
|
|
1534
1537
|
/**
|
|
@@ -1636,13 +1639,13 @@ declare namespace AccessAnalyzer {
|
|
|
1636
1639
|
*/
|
|
1637
1640
|
policyDocument: PolicyDocument;
|
|
1638
1641
|
/**
|
|
1639
|
-
* The type of policy to validate. Identity policies grant permissions to IAM principals. Identity policies include managed and inline policies for IAM roles, users, and groups. They also include service-control policies (SCPs) that are attached to an
|
|
1642
|
+
* The type of policy to validate. Identity policies grant permissions to IAM principals. Identity policies include managed and inline policies for IAM roles, users, and groups. They also include service-control policies (SCPs) that are attached to an Amazon Web Services organization, organizational unit (OU), or an account. Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust policies for IAM roles and bucket policies for Amazon S3 buckets. You can provide a generic input such as identity policy or resource policy or a specific input such as managed policy or Amazon S3 bucket policy.
|
|
1640
1643
|
*/
|
|
1641
1644
|
policyType: PolicyType;
|
|
1642
1645
|
}
|
|
1643
1646
|
export interface ValidatePolicyResponse {
|
|
1644
1647
|
/**
|
|
1645
|
-
* The list of findings in a policy returned by Access Analyzer based on its suite of policy checks.
|
|
1648
|
+
* The list of findings in a policy returned by IAM Access Analyzer based on its suite of policy checks.
|
|
1646
1649
|
*/
|
|
1647
1650
|
findings: ValidatePolicyFindingList;
|
|
1648
1651
|
/**
|
package/clients/acmpca.d.ts
CHANGED
|
@@ -13,11 +13,11 @@ declare class ACMPCA extends Service {
|
|
|
13
13
|
constructor(options?: ACMPCA.Types.ClientConfiguration)
|
|
14
14
|
config: Config & ACMPCA.Types.ClientConfiguration;
|
|
15
15
|
/**
|
|
16
|
-
* Creates a root or subordinate private certificate authority (CA). You must specify the CA configuration,
|
|
16
|
+
* Creates a root or subordinate private certificate authority (CA). You must specify the CA configuration, an optional configuration for Online Certificate Status Protocol (OCSP) and/or a certificate revocation list (CRL), the CA type, and an optional idempotency token to avoid accidental creation of multiple CAs. The CA configuration specifies the name of the algorithm and key size to be used to create the CA private key, the type of signing algorithm that the CA uses, and X.500 subject information. The OCSP configuration can optionally specify a custom URL for the OCSP responder. The CRL configuration specifies the CRL expiration period in days (the validity period of the CRL), the Amazon S3 bucket that will contain the CRL, and a CNAME alias for the S3 bucket that is included in certificates issued by the CA. If successful, this action returns the Amazon Resource Name (ARN) of the CA. ACM Private CA assets that are stored in Amazon S3 can be protected with encryption. For more information, see Encrypting Your CRLs. Both PCA and the IAM principal must have permission to write to the S3 bucket that you specify. If the IAM principal making the call does not have permission to write to the bucket, then an exception is thrown. For more information, see Configure Access to ACM Private CA.
|
|
17
17
|
*/
|
|
18
18
|
createCertificateAuthority(params: ACMPCA.Types.CreateCertificateAuthorityRequest, callback?: (err: AWSError, data: ACMPCA.Types.CreateCertificateAuthorityResponse) => void): Request<ACMPCA.Types.CreateCertificateAuthorityResponse, AWSError>;
|
|
19
19
|
/**
|
|
20
|
-
* Creates a root or subordinate private certificate authority (CA). You must specify the CA configuration,
|
|
20
|
+
* Creates a root or subordinate private certificate authority (CA). You must specify the CA configuration, an optional configuration for Online Certificate Status Protocol (OCSP) and/or a certificate revocation list (CRL), the CA type, and an optional idempotency token to avoid accidental creation of multiple CAs. The CA configuration specifies the name of the algorithm and key size to be used to create the CA private key, the type of signing algorithm that the CA uses, and X.500 subject information. The OCSP configuration can optionally specify a custom URL for the OCSP responder. The CRL configuration specifies the CRL expiration period in days (the validity period of the CRL), the Amazon S3 bucket that will contain the CRL, and a CNAME alias for the S3 bucket that is included in certificates issued by the CA. If successful, this action returns the Amazon Resource Name (ARN) of the CA. ACM Private CA assets that are stored in Amazon S3 can be protected with encryption. For more information, see Encrypting Your CRLs. Both PCA and the IAM principal must have permission to write to the S3 bucket that you specify. If the IAM principal making the call does not have permission to write to the bucket, then an exception is thrown. For more information, see Configure Access to ACM Private CA.
|
|
21
21
|
*/
|
|
22
22
|
createCertificateAuthority(callback?: (err: AWSError, data: ACMPCA.Types.CreateCertificateAuthorityResponse) => void): Request<ACMPCA.Types.CreateCertificateAuthorityResponse, AWSError>;
|
|
23
23
|
/**
|
|
@@ -366,7 +366,7 @@ declare namespace ACMPCA {
|
|
|
366
366
|
*/
|
|
367
367
|
CertificateAuthorityConfiguration?: CertificateAuthorityConfiguration;
|
|
368
368
|
/**
|
|
369
|
-
* Information about the certificate revocation list (CRL) created and maintained by your private CA.
|
|
369
|
+
* Information about the Online Certificate Status Protocol (OCSP) configuration or certificate revocation list (CRL) created and maintained by your private CA.
|
|
370
370
|
*/
|
|
371
371
|
RevocationConfiguration?: RevocationConfiguration;
|
|
372
372
|
/**
|
|
@@ -434,7 +434,7 @@ declare namespace ACMPCA {
|
|
|
434
434
|
*/
|
|
435
435
|
CertificateAuthorityConfiguration: CertificateAuthorityConfiguration;
|
|
436
436
|
/**
|
|
437
|
-
* Contains
|
|
437
|
+
* Contains information to enable Online Certificate Status Protocol (OCSP) support, to enable a certificate revocation list (CRL), to enable both, or to enable neither. The default is for both certificate validation mechanisms to be disabled. For more information, see the OcspConfiguration and CrlConfiguration types.
|
|
438
438
|
*/
|
|
439
439
|
RevocationConfiguration?: RevocationConfiguration;
|
|
440
440
|
/**
|
|
@@ -492,7 +492,7 @@ declare namespace ACMPCA {
|
|
|
492
492
|
*/
|
|
493
493
|
CustomCname?: String253;
|
|
494
494
|
/**
|
|
495
|
-
* Name of the S3 bucket that contains the CRL. If you do not provide a value for the CustomCname argument, the name of your S3 bucket is placed into the CRL Distribution Points extension of the issued certificate. You can change the name of your bucket by calling the UpdateCertificateAuthority
|
|
495
|
+
* Name of the S3 bucket that contains the CRL. If you do not provide a value for the CustomCname argument, the name of your S3 bucket is placed into the CRL Distribution Points extension of the issued certificate. You can change the name of your bucket by calling the UpdateCertificateAuthority operation. You must specify a bucket policy that allows ACM Private CA to write the CRL to your bucket.
|
|
496
496
|
*/
|
|
497
497
|
S3BucketName?: String3To255;
|
|
498
498
|
/**
|
|
@@ -883,6 +883,16 @@ declare namespace ACMPCA {
|
|
|
883
883
|
}
|
|
884
884
|
export type MaxResults = number;
|
|
885
885
|
export type NextToken = string;
|
|
886
|
+
export interface OcspConfiguration {
|
|
887
|
+
/**
|
|
888
|
+
* Flag enabling use of the Online Certificate Status Protocol (OCSP) for validating certificate revocation status.
|
|
889
|
+
*/
|
|
890
|
+
Enabled: Boolean;
|
|
891
|
+
/**
|
|
892
|
+
* By default, ACM Private CA injects an AWS domain into certificates being validated by the Online Certificate Status Protocol (OCSP). A customer can alternatively use this object to define a CNAME specifying a customized OCSP domain. Note: The value of the CNAME must not include a protocol prefix such as "http://" or "https://". For more information, see Customizing Online Certificate Status Protocol (OCSP) in the AWS Certificate Manager Private Certificate Authority (PCA) User Guide.
|
|
893
|
+
*/
|
|
894
|
+
OcspCustomCname?: String253;
|
|
895
|
+
}
|
|
886
896
|
export interface OtherName {
|
|
887
897
|
/**
|
|
888
898
|
* Specifies an OID.
|
|
@@ -970,9 +980,13 @@ declare namespace ACMPCA {
|
|
|
970
980
|
}
|
|
971
981
|
export interface RevocationConfiguration {
|
|
972
982
|
/**
|
|
973
|
-
* Configuration of the certificate revocation list (CRL), if any, maintained by your private CA.
|
|
983
|
+
* Configuration of the certificate revocation list (CRL), if any, maintained by your private CA. A CRL is typically updated approximately 30 minutes after a certificate is revoked. If for any reason a CRL update fails, ACM Private CA makes further attempts every 15 minutes.
|
|
974
984
|
*/
|
|
975
985
|
CrlConfiguration?: CrlConfiguration;
|
|
986
|
+
/**
|
|
987
|
+
* Configuration of Online Certificate Status Protocol (OCSP) support, if any, maintained by your private CA. When you revoke a certificate, OCSP responses may take up to 60 minutes to reflect the new status.
|
|
988
|
+
*/
|
|
989
|
+
OcspConfiguration?: OcspConfiguration;
|
|
976
990
|
}
|
|
977
991
|
export type RevocationReason = "UNSPECIFIED"|"KEY_COMPROMISE"|"CERTIFICATE_AUTHORITY_COMPROMISE"|"AFFILIATION_CHANGED"|"SUPERSEDED"|"CESSATION_OF_OPERATION"|"PRIVILEGE_WITHDRAWN"|"A_A_COMPROMISE"|string;
|
|
978
992
|
export interface RevokeCertificateRequest {
|
|
@@ -1044,7 +1058,7 @@ declare namespace ACMPCA {
|
|
|
1044
1058
|
*/
|
|
1045
1059
|
CertificateAuthorityArn: Arn;
|
|
1046
1060
|
/**
|
|
1047
|
-
*
|
|
1061
|
+
* Contains information to enable Online Certificate Status Protocol (OCSP) support, to enable a certificate revocation list (CRL), to enable both, or to enable neither. If this parameter is not supplied, existing capibilites remain unchanged. For more information, see the OcspConfiguration and CrlConfiguration types.
|
|
1048
1062
|
*/
|
|
1049
1063
|
RevocationConfiguration?: RevocationConfiguration;
|
|
1050
1064
|
/**
|
package/clients/ebs.d.ts
CHANGED
|
@@ -292,7 +292,7 @@ declare namespace EBS {
|
|
|
292
292
|
export type SnapshotId = string;
|
|
293
293
|
export interface StartSnapshotRequest {
|
|
294
294
|
/**
|
|
295
|
-
* The size of the volume, in GiB. The maximum size is
|
|
295
|
+
* The size of the volume, in GiB. The maximum size is 65536 GiB (64 TiB).
|
|
296
296
|
*/
|
|
297
297
|
VolumeSize: VolumeSize;
|
|
298
298
|
/**
|