cdk-lambda-subminute 2.0.310 → 2.0.311
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +3 -3
- package/lib/cdk-lambda-subminute.js +3 -3
- package/node_modules/aws-sdk/CHANGELOG.md +52 -1
- package/node_modules/aws-sdk/README.md +1 -3
- package/node_modules/aws-sdk/apis/accessanalyzer-2019-11-01.min.json +423 -86
- package/node_modules/aws-sdk/apis/accessanalyzer-2019-11-01.paginators.json +12 -0
- package/node_modules/aws-sdk/apis/amp-2020-08-01.min.json +320 -3
- package/node_modules/aws-sdk/apis/amp-2020-08-01.paginators.json +6 -0
- package/node_modules/aws-sdk/apis/amp-2020-08-01.waiters2.json +33 -0
- package/node_modules/aws-sdk/apis/appsync-2017-07-25.min.json +141 -6
- package/node_modules/aws-sdk/apis/b2bi-2022-06-23.examples.json +714 -0
- package/node_modules/aws-sdk/apis/b2bi-2022-06-23.min.json +1095 -0
- package/node_modules/aws-sdk/apis/b2bi-2022-06-23.paginators.json +28 -0
- package/node_modules/aws-sdk/apis/backup-2018-11-15.min.json +855 -84
- package/node_modules/aws-sdk/apis/backup-2018-11-15.paginators.json +18 -0
- package/node_modules/aws-sdk/apis/bcm-data-exports-2023-11-26.examples.json +5 -0
- package/node_modules/aws-sdk/apis/bcm-data-exports-2023-11-26.min.json +470 -0
- package/node_modules/aws-sdk/apis/bcm-data-exports-2023-11-26.paginators.json +22 -0
- package/node_modules/aws-sdk/apis/cloudtrail-2013-11-01.min.json +67 -24
- package/node_modules/aws-sdk/apis/codestar-connections-2019-12-01.min.json +590 -3
- package/node_modules/aws-sdk/apis/codestar-connections-2019-12-01.paginators.json +10 -0
- package/node_modules/aws-sdk/apis/compute-optimizer-2019-11-01.min.json +243 -39
- package/node_modules/aws-sdk/apis/config-2014-11-12.min.json +204 -169
- package/node_modules/aws-sdk/apis/controltower-2018-05-10.min.json +317 -13
- package/node_modules/aws-sdk/apis/controltower-2018-05-10.paginators.json +6 -0
- package/node_modules/aws-sdk/apis/cost-optimization-hub-2022-07-26.examples.json +5 -0
- package/node_modules/aws-sdk/apis/cost-optimization-hub-2022-07-26.min.json +757 -0
- package/node_modules/aws-sdk/apis/cost-optimization-hub-2022-07-26.paginators.json +22 -0
- package/node_modules/aws-sdk/apis/detective-2018-10-26.min.json +294 -0
- package/node_modules/aws-sdk/apis/ecs-2014-11-13.min.json +108 -107
- package/node_modules/aws-sdk/apis/eks-2017-11-01.min.json +211 -4
- package/node_modules/aws-sdk/apis/eks-2017-11-01.paginators.json +12 -0
- package/node_modules/aws-sdk/apis/eks-auth-2023-11-26.examples.json +5 -0
- package/node_modules/aws-sdk/apis/eks-auth-2023-11-26.min.json +104 -0
- package/node_modules/aws-sdk/apis/eks-auth-2023-11-26.paginators.json +4 -0
- package/node_modules/aws-sdk/apis/eks-auth-2023-11-26.waiters2.json +5 -0
- package/node_modules/aws-sdk/apis/elasticfilesystem-2015-02-01.min.json +71 -33
- package/node_modules/aws-sdk/apis/elasticfilesystem-2015-02-01.paginators.json +18 -3
- package/node_modules/aws-sdk/apis/elasticloadbalancingv2-2015-12-01.min.json +403 -75
- package/node_modules/aws-sdk/apis/elasticloadbalancingv2-2015-12-01.paginators.json +15 -0
- package/node_modules/aws-sdk/apis/fis-2020-12-01.min.json +366 -15
- package/node_modules/aws-sdk/apis/fis-2020-12-01.paginators.json +10 -0
- package/node_modules/aws-sdk/apis/freetier-2023-09-07.examples.json +5 -0
- package/node_modules/aws-sdk/apis/freetier-2023-09-07.min.json +105 -0
- package/node_modules/aws-sdk/apis/freetier-2023-09-07.paginators.json +10 -0
- package/node_modules/aws-sdk/apis/fsx-2018-03-01.min.json +259 -135
- package/node_modules/aws-sdk/apis/guardduty-2017-11-28.min.json +64 -0
- package/node_modules/aws-sdk/apis/iotfleetwise-2021-06-17.min.json +159 -33
- package/node_modules/aws-sdk/apis/lakeformation-2017-03-31.min.json +126 -35
- package/node_modules/aws-sdk/apis/logs-2014-03-28.min.json +310 -36
- package/node_modules/aws-sdk/apis/logs-2014-03-28.paginators.json +12 -0
- package/node_modules/aws-sdk/apis/managedblockchain-2018-09-24.min.json +58 -50
- package/node_modules/aws-sdk/apis/metadata.json +25 -0
- package/node_modules/aws-sdk/apis/models.lex.v2-2020-08-07.min.json +633 -331
- package/node_modules/aws-sdk/apis/models.lex.v2-2020-08-07.paginators.json +5 -0
- package/node_modules/aws-sdk/apis/personalize-2018-05-22.min.json +85 -52
- package/node_modules/aws-sdk/apis/personalize-events-2018-03-22.min.json +97 -5
- package/node_modules/aws-sdk/apis/personalize-runtime-2018-05-22.min.json +68 -11
- package/node_modules/aws-sdk/apis/quicksight-2018-04-01.min.json +398 -268
- package/node_modules/aws-sdk/apis/redshift-2012-12-01.min.json +14 -2
- package/node_modules/aws-sdk/apis/repostspace-2022-05-13.examples.json +5 -0
- package/node_modules/aws-sdk/apis/repostspace-2022-05-13.min.json +447 -0
- package/node_modules/aws-sdk/apis/repostspace-2022-05-13.paginators.json +10 -0
- package/node_modules/aws-sdk/apis/runtime.lex.v2-2020-08-07.min.json +25 -24
- package/node_modules/aws-sdk/apis/s3-2006-03-01.examples.json +142 -142
- package/node_modules/aws-sdk/apis/s3-2006-03-01.min.json +45 -0
- package/node_modules/aws-sdk/apis/s3control-2018-08-20.min.json +1330 -314
- package/node_modules/aws-sdk/apis/s3control-2018-08-20.paginators.json +15 -0
- package/node_modules/aws-sdk/apis/secretsmanager-2017-10-17.min.json +111 -50
- package/node_modules/aws-sdk/apis/secretsmanager-2017-10-17.paginators.json +5 -0
- package/node_modules/aws-sdk/apis/securityhub-2018-10-26.examples.json +526 -10
- package/node_modules/aws-sdk/apis/securityhub-2018-10-26.min.json +1057 -352
- package/node_modules/aws-sdk/apis/securityhub-2018-10-26.paginators.json +12 -0
- package/node_modules/aws-sdk/apis/states-2016-11-23.min.json +85 -0
- package/node_modules/aws-sdk/apis/transcribe-2017-10-26.min.json +268 -70
- package/node_modules/aws-sdk/apis/transcribe-2017-10-26.paginators.json +5 -0
- package/node_modules/aws-sdk/apis/workspaces-2015-04-08.min.json +119 -96
- package/node_modules/aws-sdk/apis/workspaces-thin-client-2023-08-22.examples.json +5 -0
- package/node_modules/aws-sdk/apis/workspaces-thin-client-2023-08-22.min.json +777 -0
- package/node_modules/aws-sdk/apis/workspaces-thin-client-2023-08-22.paginators.json +22 -0
- package/node_modules/aws-sdk/clients/accessanalyzer.d.ts +374 -5
- package/node_modules/aws-sdk/clients/all.d.ts +7 -0
- package/node_modules/aws-sdk/clients/all.js +8 -1
- package/node_modules/aws-sdk/clients/amp.d.ts +322 -0
- package/node_modules/aws-sdk/clients/appsync.d.ts +169 -0
- package/node_modules/aws-sdk/clients/b2bi.d.ts +1388 -0
- package/node_modules/aws-sdk/clients/b2bi.js +18 -0
- package/node_modules/aws-sdk/clients/backup.d.ts +848 -45
- package/node_modules/aws-sdk/clients/bcmdataexports.d.ts +589 -0
- package/node_modules/aws-sdk/clients/bcmdataexports.js +18 -0
- package/node_modules/aws-sdk/clients/cloudtrail.d.ts +76 -2
- package/node_modules/aws-sdk/clients/cloudwatchlogs.d.ts +413 -1
- package/node_modules/aws-sdk/clients/codestarconnections.d.ts +727 -0
- package/node_modules/aws-sdk/clients/computeoptimizer.d.ts +307 -6
- package/node_modules/aws-sdk/clients/configservice.d.ts +60 -11
- package/node_modules/aws-sdk/clients/controltower.d.ts +319 -25
- package/node_modules/aws-sdk/clients/costoptimizationhub.d.ts +1283 -0
- package/node_modules/aws-sdk/clients/costoptimizationhub.js +18 -0
- package/node_modules/aws-sdk/clients/detective.d.ts +469 -0
- package/node_modules/aws-sdk/clients/ecs.d.ts +10 -5
- package/node_modules/aws-sdk/clients/efs.d.ts +75 -33
- package/node_modules/aws-sdk/clients/eks.d.ts +237 -15
- package/node_modules/aws-sdk/clients/eksauth.d.ts +124 -0
- package/node_modules/aws-sdk/clients/eksauth.js +19 -0
- package/node_modules/aws-sdk/clients/elbv2.d.ts +433 -4
- package/node_modules/aws-sdk/clients/fis.d.ts +383 -3
- package/node_modules/aws-sdk/clients/freetier.d.ts +149 -0
- package/node_modules/aws-sdk/clients/freetier.js +18 -0
- package/node_modules/aws-sdk/clients/fsx.d.ts +194 -21
- package/node_modules/aws-sdk/clients/glue.d.ts +3 -3
- package/node_modules/aws-sdk/clients/guardduty.d.ts +82 -11
- package/node_modules/aws-sdk/clients/iotfleetwise.d.ts +198 -13
- package/node_modules/aws-sdk/clients/lakeformation.d.ts +118 -2
- package/node_modules/aws-sdk/clients/lexmodelsv2.d.ts +343 -2
- package/node_modules/aws-sdk/clients/lexruntimev2.d.ts +14 -9
- package/node_modules/aws-sdk/clients/managedblockchain.d.ts +26 -5
- package/node_modules/aws-sdk/clients/personalize.d.ts +65 -20
- package/node_modules/aws-sdk/clients/personalizeevents.d.ts +102 -12
- package/node_modules/aws-sdk/clients/personalizeruntime.d.ts +72 -2
- package/node_modules/aws-sdk/clients/quicksight.d.ts +124 -0
- package/node_modules/aws-sdk/clients/rds.d.ts +80 -80
- package/node_modules/aws-sdk/clients/redshift.d.ts +16 -0
- package/node_modules/aws-sdk/clients/repostspace.d.ts +458 -0
- package/node_modules/aws-sdk/clients/repostspace.js +18 -0
- package/node_modules/aws-sdk/clients/s3.d.ts +2 -2
- package/node_modules/aws-sdk/clients/s3control.d.ts +841 -13
- package/node_modules/aws-sdk/clients/secretsmanager.d.ts +94 -5
- package/node_modules/aws-sdk/clients/securityhub.d.ts +908 -15
- package/node_modules/aws-sdk/clients/stepfunctions.d.ts +153 -8
- package/node_modules/aws-sdk/clients/transcribeservice.d.ts +312 -46
- package/node_modules/aws-sdk/clients/workspaces.d.ts +43 -1
- package/node_modules/aws-sdk/clients/workspacesthinclient.d.ts +895 -0
- package/node_modules/aws-sdk/clients/workspacesthinclient.js +18 -0
- package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +2 -2
- package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +321 -55
- package/node_modules/aws-sdk/dist/aws-sdk.js +2045 -597
- package/node_modules/aws-sdk/dist/aws-sdk.min.js +104 -104
- package/node_modules/aws-sdk/lib/config_service_placeholders.d.ts +14 -0
- package/node_modules/aws-sdk/lib/core.js +1 -1
- package/node_modules/aws-sdk/package.json +1 -1
- package/package.json +3 -3
@@ -0,0 +1,22 @@
|
|
1
|
+
{
|
2
|
+
"pagination": {
|
3
|
+
"ListDevices": {
|
4
|
+
"input_token": "nextToken",
|
5
|
+
"output_token": "nextToken",
|
6
|
+
"limit_key": "maxResults",
|
7
|
+
"result_key": "devices"
|
8
|
+
},
|
9
|
+
"ListEnvironments": {
|
10
|
+
"input_token": "nextToken",
|
11
|
+
"output_token": "nextToken",
|
12
|
+
"limit_key": "maxResults",
|
13
|
+
"result_key": "environments"
|
14
|
+
},
|
15
|
+
"ListSoftwareSets": {
|
16
|
+
"input_token": "nextToken",
|
17
|
+
"output_token": "nextToken",
|
18
|
+
"limit_key": "maxResults",
|
19
|
+
"result_key": "softwareSets"
|
20
|
+
}
|
21
|
+
}
|
22
|
+
}
|
@@ -27,6 +27,22 @@ declare class AccessAnalyzer extends Service {
|
|
27
27
|
* Cancels the requested policy generation.
|
28
28
|
*/
|
29
29
|
cancelPolicyGeneration(callback?: (err: AWSError, data: AccessAnalyzer.Types.CancelPolicyGenerationResponse) => void): Request<AccessAnalyzer.Types.CancelPolicyGenerationResponse, AWSError>;
|
30
|
+
/**
|
31
|
+
* Checks whether the specified access isn't allowed by a policy.
|
32
|
+
*/
|
33
|
+
checkAccessNotGranted(params: AccessAnalyzer.Types.CheckAccessNotGrantedRequest, callback?: (err: AWSError, data: AccessAnalyzer.Types.CheckAccessNotGrantedResponse) => void): Request<AccessAnalyzer.Types.CheckAccessNotGrantedResponse, AWSError>;
|
34
|
+
/**
|
35
|
+
* Checks whether the specified access isn't allowed by a policy.
|
36
|
+
*/
|
37
|
+
checkAccessNotGranted(callback?: (err: AWSError, data: AccessAnalyzer.Types.CheckAccessNotGrantedResponse) => void): Request<AccessAnalyzer.Types.CheckAccessNotGrantedResponse, AWSError>;
|
38
|
+
/**
|
39
|
+
* Checks whether new access is allowed for an updated policy when compared to the existing policy. You can find examples for reference policies and learn how to set up and run a custom policy check for new access in the IAM Access Analyzer custom policy checks samples repository on GitHub. The reference policies in this repository are meant to be passed to the existingPolicyDocument request parameter.
|
40
|
+
*/
|
41
|
+
checkNoNewAccess(params: AccessAnalyzer.Types.CheckNoNewAccessRequest, callback?: (err: AWSError, data: AccessAnalyzer.Types.CheckNoNewAccessResponse) => void): Request<AccessAnalyzer.Types.CheckNoNewAccessResponse, AWSError>;
|
42
|
+
/**
|
43
|
+
* Checks whether new access is allowed for an updated policy when compared to the existing policy. You can find examples for reference policies and learn how to set up and run a custom policy check for new access in the IAM Access Analyzer custom policy checks samples repository on GitHub. The reference policies in this repository are meant to be passed to the existingPolicyDocument request parameter.
|
44
|
+
*/
|
45
|
+
checkNoNewAccess(callback?: (err: AWSError, data: AccessAnalyzer.Types.CheckNoNewAccessResponse) => void): Request<AccessAnalyzer.Types.CheckNoNewAccessResponse, AWSError>;
|
30
46
|
/**
|
31
47
|
* Creates an access preview that allows you to preview IAM Access Analyzer findings for your resource before deploying resource permissions.
|
32
48
|
*/
|
@@ -107,6 +123,14 @@ declare class AccessAnalyzer extends Service {
|
|
107
123
|
* Retrieves information about the specified finding.
|
108
124
|
*/
|
109
125
|
getFinding(callback?: (err: AWSError, data: AccessAnalyzer.Types.GetFindingResponse) => void): Request<AccessAnalyzer.Types.GetFindingResponse, AWSError>;
|
126
|
+
/**
|
127
|
+
* Retrieves information about the specified finding.
|
128
|
+
*/
|
129
|
+
getFindingV2(params: AccessAnalyzer.Types.GetFindingV2Request, callback?: (err: AWSError, data: AccessAnalyzer.Types.GetFindingV2Response) => void): Request<AccessAnalyzer.Types.GetFindingV2Response, AWSError>;
|
130
|
+
/**
|
131
|
+
* Retrieves information about the specified finding.
|
132
|
+
*/
|
133
|
+
getFindingV2(callback?: (err: AWSError, data: AccessAnalyzer.Types.GetFindingV2Response) => void): Request<AccessAnalyzer.Types.GetFindingV2Response, AWSError>;
|
110
134
|
/**
|
111
135
|
* Retrieves the policy that was generated using StartPolicyGeneration.
|
112
136
|
*/
|
@@ -163,6 +187,14 @@ declare class AccessAnalyzer extends Service {
|
|
163
187
|
* Retrieves a list of findings generated by the specified analyzer. To learn about filter keys that you can use to retrieve a list of findings, see IAM Access Analyzer filter keys in the IAM User Guide.
|
164
188
|
*/
|
165
189
|
listFindings(callback?: (err: AWSError, data: AccessAnalyzer.Types.ListFindingsResponse) => void): Request<AccessAnalyzer.Types.ListFindingsResponse, AWSError>;
|
190
|
+
/**
|
191
|
+
* Retrieves a list of findings generated by the specified analyzer. To learn about filter keys that you can use to retrieve a list of findings, see IAM Access Analyzer filter keys in the IAM User Guide.
|
192
|
+
*/
|
193
|
+
listFindingsV2(params: AccessAnalyzer.Types.ListFindingsV2Request, callback?: (err: AWSError, data: AccessAnalyzer.Types.ListFindingsV2Response) => void): Request<AccessAnalyzer.Types.ListFindingsV2Response, AWSError>;
|
194
|
+
/**
|
195
|
+
* Retrieves a list of findings generated by the specified analyzer. To learn about filter keys that you can use to retrieve a list of findings, see IAM Access Analyzer filter keys in the IAM User Guide.
|
196
|
+
*/
|
197
|
+
listFindingsV2(callback?: (err: AWSError, data: AccessAnalyzer.Types.ListFindingsV2Response) => void): Request<AccessAnalyzer.Types.ListFindingsV2Response, AWSError>;
|
166
198
|
/**
|
167
199
|
* Lists all of the policy generations requested in the last seven days.
|
168
200
|
*/
|
@@ -237,6 +269,15 @@ declare class AccessAnalyzer extends Service {
|
|
237
269
|
validatePolicy(callback?: (err: AWSError, data: AccessAnalyzer.Types.ValidatePolicyResponse) => void): Request<AccessAnalyzer.Types.ValidatePolicyResponse, AWSError>;
|
238
270
|
}
|
239
271
|
declare namespace AccessAnalyzer {
|
272
|
+
export interface Access {
|
273
|
+
/**
|
274
|
+
* A list of actions for the access permissions.
|
275
|
+
*/
|
276
|
+
actions: AccessActionsList;
|
277
|
+
}
|
278
|
+
export type AccessActionsList = Action[];
|
279
|
+
export type AccessCheckPolicyDocument = string;
|
280
|
+
export type AccessCheckPolicyType = "IDENTITY_POLICY"|"RESOURCE_POLICY"|string;
|
240
281
|
export type AccessPointArn = string;
|
241
282
|
export type AccessPointPolicy = string;
|
242
283
|
export interface AccessPreview {
|
@@ -371,6 +412,7 @@ declare namespace AccessAnalyzer {
|
|
371
412
|
}
|
372
413
|
export type AclPermission = "READ"|"WRITE"|"READ_ACP"|"WRITE_ACP"|"FULL_CONTROL"|string;
|
373
414
|
export type AclUri = string;
|
415
|
+
export type Action = string;
|
374
416
|
export type ActionList = String[];
|
375
417
|
export interface AnalyzedResource {
|
376
418
|
/**
|
@@ -434,6 +476,12 @@ declare namespace AccessAnalyzer {
|
|
434
476
|
}
|
435
477
|
export type AnalyzedResourcesList = AnalyzedResourceSummary[];
|
436
478
|
export type AnalyzerArn = string;
|
479
|
+
export interface AnalyzerConfiguration {
|
480
|
+
/**
|
481
|
+
* Specifies the configuration of an unused access analyzer for an Amazon Web Services organization or account. External access analyzers do not support any configuration.
|
482
|
+
*/
|
483
|
+
unusedAccess?: UnusedAccessConfiguration;
|
484
|
+
}
|
437
485
|
export type AnalyzerStatus = "ACTIVE"|"CREATING"|"DISABLED"|"FAILED"|string;
|
438
486
|
export interface AnalyzerSummary {
|
439
487
|
/**
|
@@ -472,6 +520,10 @@ declare namespace AccessAnalyzer {
|
|
472
520
|
* The statusReason provides more details about the current status of the analyzer. For example, if the creation for the analyzer fails, a Failed status is returned. For an analyzer with organization as the type, this failure can be due to an issue with creating the service-linked roles required in the member accounts of the Amazon Web Services organization.
|
473
521
|
*/
|
474
522
|
statusReason?: StatusReason;
|
523
|
+
/**
|
524
|
+
* Specifies whether the analyzer is an external access or unused access analyzer.
|
525
|
+
*/
|
526
|
+
configuration?: AnalyzerConfiguration;
|
475
527
|
}
|
476
528
|
export type AnalyzersList = AnalyzerSummary[];
|
477
529
|
export interface ApplyArchiveRuleRequest {
|
@@ -516,6 +568,65 @@ declare namespace AccessAnalyzer {
|
|
516
568
|
}
|
517
569
|
export interface CancelPolicyGenerationResponse {
|
518
570
|
}
|
571
|
+
export interface CheckAccessNotGrantedRequest {
|
572
|
+
/**
|
573
|
+
* The JSON policy document to use as the content for the policy.
|
574
|
+
*/
|
575
|
+
policyDocument: AccessCheckPolicyDocument;
|
576
|
+
/**
|
577
|
+
* An access object containing the permissions that shouldn't be granted by the specified policy.
|
578
|
+
*/
|
579
|
+
access: CheckAccessNotGrantedRequestAccessList;
|
580
|
+
/**
|
581
|
+
* The type of policy. Identity policies grant permissions to IAM principals. Identity policies include managed and inline policies for IAM roles, users, and groups. Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust policies for IAM roles and bucket policies for Amazon S3 buckets. You can provide a generic input such as identity policy or resource policy or a specific input such as managed policy or Amazon S3 bucket policy.
|
582
|
+
*/
|
583
|
+
policyType: AccessCheckPolicyType;
|
584
|
+
}
|
585
|
+
export type CheckAccessNotGrantedRequestAccessList = Access[];
|
586
|
+
export interface CheckAccessNotGrantedResponse {
|
587
|
+
/**
|
588
|
+
* The result of the check for whether the access is allowed. If the result is PASS, the specified policy doesn't allow any of the specified permissions in the access object. If the result is FAIL, the specified policy might allow some or all of the permissions in the access object.
|
589
|
+
*/
|
590
|
+
result?: CheckAccessNotGrantedResult;
|
591
|
+
/**
|
592
|
+
* The message indicating whether the specified access is allowed.
|
593
|
+
*/
|
594
|
+
message?: String;
|
595
|
+
/**
|
596
|
+
* A description of the reasoning of the result.
|
597
|
+
*/
|
598
|
+
reasons?: ReasonSummaryList;
|
599
|
+
}
|
600
|
+
export type CheckAccessNotGrantedResult = "PASS"|"FAIL"|string;
|
601
|
+
export interface CheckNoNewAccessRequest {
|
602
|
+
/**
|
603
|
+
* The JSON policy document to use as the content for the updated policy.
|
604
|
+
*/
|
605
|
+
newPolicyDocument: AccessCheckPolicyDocument;
|
606
|
+
/**
|
607
|
+
* The JSON policy document to use as the content for the existing policy.
|
608
|
+
*/
|
609
|
+
existingPolicyDocument: AccessCheckPolicyDocument;
|
610
|
+
/**
|
611
|
+
* The type of policy to compare. Identity policies grant permissions to IAM principals. Identity policies include managed and inline policies for IAM roles, users, and groups. Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust policies for IAM roles and bucket policies for Amazon S3 buckets. You can provide a generic input such as identity policy or resource policy or a specific input such as managed policy or Amazon S3 bucket policy.
|
612
|
+
*/
|
613
|
+
policyType: AccessCheckPolicyType;
|
614
|
+
}
|
615
|
+
export interface CheckNoNewAccessResponse {
|
616
|
+
/**
|
617
|
+
* The result of the check for new access. If the result is PASS, no new access is allowed by the updated policy. If the result is FAIL, the updated policy might allow new access.
|
618
|
+
*/
|
619
|
+
result?: CheckNoNewAccessResult;
|
620
|
+
/**
|
621
|
+
* The message indicating whether the updated policy allows new access.
|
622
|
+
*/
|
623
|
+
message?: String;
|
624
|
+
/**
|
625
|
+
* A description of the reasoning of the result.
|
626
|
+
*/
|
627
|
+
reasons?: ReasonSummaryList;
|
628
|
+
}
|
629
|
+
export type CheckNoNewAccessResult = "PASS"|"FAIL"|string;
|
519
630
|
export type CloudTrailArn = string;
|
520
631
|
export interface CloudTrailDetails {
|
521
632
|
/**
|
@@ -624,7 +735,7 @@ declare namespace AccessAnalyzer {
|
|
624
735
|
*/
|
625
736
|
analyzerName: Name;
|
626
737
|
/**
|
627
|
-
* The type of analyzer to create. Only ACCOUNT and
|
738
|
+
* The type of analyzer to create. Only ACCOUNT, ORGANIZATION, ACCOUNT_UNUSED_ACCESS, and ORGANIZTAION_UNUSED_ACCESS analyzers are supported. You can create only one analyzer per account per Region. You can create up to 5 analyzers per organization per Region.
|
628
739
|
*/
|
629
740
|
type: Type;
|
630
741
|
/**
|
@@ -632,13 +743,17 @@ declare namespace AccessAnalyzer {
|
|
632
743
|
*/
|
633
744
|
archiveRules?: InlineArchiveRulesList;
|
634
745
|
/**
|
635
|
-
*
|
746
|
+
* An array of key-value pairs to apply to the analyzer.
|
636
747
|
*/
|
637
748
|
tags?: TagsMap;
|
638
749
|
/**
|
639
750
|
* A client token.
|
640
751
|
*/
|
641
752
|
clientToken?: String;
|
753
|
+
/**
|
754
|
+
* Specifies the configuration of the analyzer. If the analyzer is an unused access analyzer, the specified scope of unused access is used for the configuration. If the analyzer is an external access analyzer, this field is not used.
|
755
|
+
*/
|
756
|
+
configuration?: AnalyzerConfiguration;
|
642
757
|
}
|
643
758
|
export interface CreateAnalyzerResponse {
|
644
759
|
/**
|
@@ -739,6 +854,28 @@ declare namespace AccessAnalyzer {
|
|
739
854
|
fileSystemPolicy?: EfsFileSystemPolicy;
|
740
855
|
}
|
741
856
|
export type EfsFileSystemPolicy = string;
|
857
|
+
export interface ExternalAccessDetails {
|
858
|
+
/**
|
859
|
+
* The action in the analyzed policy statement that an external principal has permission to use.
|
860
|
+
*/
|
861
|
+
action?: ActionList;
|
862
|
+
/**
|
863
|
+
* The condition in the analyzed policy statement that resulted in an external access finding.
|
864
|
+
*/
|
865
|
+
condition: ConditionKeyMap;
|
866
|
+
/**
|
867
|
+
* Specifies whether the external access finding is public.
|
868
|
+
*/
|
869
|
+
isPublic?: Boolean;
|
870
|
+
/**
|
871
|
+
* The external principal that has access to a resource within the zone of trust.
|
872
|
+
*/
|
873
|
+
principal?: PrincipalMap;
|
874
|
+
/**
|
875
|
+
* The sources of the external access finding. This indicates how the access that generated the finding is granted. It is populated for Amazon S3 bucket findings.
|
876
|
+
*/
|
877
|
+
sources?: FindingSourceList;
|
878
|
+
}
|
742
879
|
export type FilterCriteriaMap = {[key: string]: Criterion};
|
743
880
|
export interface Finding {
|
744
881
|
/**
|
@@ -746,7 +883,7 @@ declare namespace AccessAnalyzer {
|
|
746
883
|
*/
|
747
884
|
id: FindingId;
|
748
885
|
/**
|
749
|
-
* The external principal that access to a resource within the zone of trust.
|
886
|
+
* The external principal that has access to a resource within the zone of trust.
|
750
887
|
*/
|
751
888
|
principal?: PrincipalMap;
|
752
889
|
/**
|
@@ -799,6 +936,29 @@ declare namespace AccessAnalyzer {
|
|
799
936
|
sources?: FindingSourceList;
|
800
937
|
}
|
801
938
|
export type FindingChangeType = "CHANGED"|"NEW"|"UNCHANGED"|string;
|
939
|
+
export interface FindingDetails {
|
940
|
+
/**
|
941
|
+
* The details for an external access analyzer finding.
|
942
|
+
*/
|
943
|
+
externalAccessDetails?: ExternalAccessDetails;
|
944
|
+
/**
|
945
|
+
* The details for an unused access analyzer finding with an unused permission finding type.
|
946
|
+
*/
|
947
|
+
unusedPermissionDetails?: UnusedPermissionDetails;
|
948
|
+
/**
|
949
|
+
* The details for an unused access analyzer finding with an unused IAM user access key finding type.
|
950
|
+
*/
|
951
|
+
unusedIamUserAccessKeyDetails?: UnusedIamUserAccessKeyDetails;
|
952
|
+
/**
|
953
|
+
* The details for an unused access analyzer finding with an unused IAM role finding type.
|
954
|
+
*/
|
955
|
+
unusedIamRoleDetails?: UnusedIamRoleDetails;
|
956
|
+
/**
|
957
|
+
* The details for an unused access analyzer finding with an unused IAM user password finding type.
|
958
|
+
*/
|
959
|
+
unusedIamUserPasswordDetails?: UnusedIamUserPasswordDetails;
|
960
|
+
}
|
961
|
+
export type FindingDetailsList = FindingDetails[];
|
802
962
|
export type FindingId = string;
|
803
963
|
export type FindingIdList = FindingId[];
|
804
964
|
export interface FindingSource {
|
@@ -883,7 +1043,51 @@ declare namespace AccessAnalyzer {
|
|
883
1043
|
*/
|
884
1044
|
sources?: FindingSourceList;
|
885
1045
|
}
|
1046
|
+
export interface FindingSummaryV2 {
|
1047
|
+
/**
|
1048
|
+
* The time at which the resource-based policy or IAM entity that generated the finding was analyzed.
|
1049
|
+
*/
|
1050
|
+
analyzedAt: Timestamp;
|
1051
|
+
/**
|
1052
|
+
* The time at which the finding was created.
|
1053
|
+
*/
|
1054
|
+
createdAt: Timestamp;
|
1055
|
+
/**
|
1056
|
+
* The error that resulted in an Error finding.
|
1057
|
+
*/
|
1058
|
+
error?: String;
|
1059
|
+
/**
|
1060
|
+
* The ID of the finding.
|
1061
|
+
*/
|
1062
|
+
id: FindingId;
|
1063
|
+
/**
|
1064
|
+
* The resource that the external principal has access to.
|
1065
|
+
*/
|
1066
|
+
resource?: String;
|
1067
|
+
/**
|
1068
|
+
* The type of the resource that the external principal has access to.
|
1069
|
+
*/
|
1070
|
+
resourceType: ResourceType;
|
1071
|
+
/**
|
1072
|
+
* The Amazon Web Services account ID that owns the resource.
|
1073
|
+
*/
|
1074
|
+
resourceOwnerAccount: String;
|
1075
|
+
/**
|
1076
|
+
* The status of the finding.
|
1077
|
+
*/
|
1078
|
+
status: FindingStatus;
|
1079
|
+
/**
|
1080
|
+
* The time at which the finding was most recently updated.
|
1081
|
+
*/
|
1082
|
+
updatedAt: Timestamp;
|
1083
|
+
/**
|
1084
|
+
* The type of the external access or unused access finding.
|
1085
|
+
*/
|
1086
|
+
findingType?: FindingType;
|
1087
|
+
}
|
1088
|
+
export type FindingType = "ExternalAccess"|"UnusedIAMRole"|"UnusedIAMUserAccessKey"|"UnusedIAMUserPassword"|"UnusedPermission"|string;
|
886
1089
|
export type FindingsList = FindingSummary[];
|
1090
|
+
export type FindingsListV2 = FindingSummaryV2[];
|
887
1091
|
export interface GeneratedPolicy {
|
888
1092
|
/**
|
889
1093
|
* The text to use as the content for the new policy. The policy is created using the CreatePolicy action.
|
@@ -988,6 +1192,74 @@ declare namespace AccessAnalyzer {
|
|
988
1192
|
*/
|
989
1193
|
finding?: Finding;
|
990
1194
|
}
|
1195
|
+
export interface GetFindingV2Request {
|
1196
|
+
/**
|
1197
|
+
* The ARN of the analyzer that generated the finding.
|
1198
|
+
*/
|
1199
|
+
analyzerArn: AnalyzerArn;
|
1200
|
+
/**
|
1201
|
+
* The ID of the finding to retrieve.
|
1202
|
+
*/
|
1203
|
+
id: FindingId;
|
1204
|
+
/**
|
1205
|
+
* The maximum number of results to return in the response.
|
1206
|
+
*/
|
1207
|
+
maxResults?: Integer;
|
1208
|
+
/**
|
1209
|
+
* A token used for pagination of results returned.
|
1210
|
+
*/
|
1211
|
+
nextToken?: Token;
|
1212
|
+
}
|
1213
|
+
export interface GetFindingV2Response {
|
1214
|
+
/**
|
1215
|
+
* The time at which the resource-based policy or IAM entity that generated the finding was analyzed.
|
1216
|
+
*/
|
1217
|
+
analyzedAt: Timestamp;
|
1218
|
+
/**
|
1219
|
+
* The time at which the finding was created.
|
1220
|
+
*/
|
1221
|
+
createdAt: Timestamp;
|
1222
|
+
/**
|
1223
|
+
* An error.
|
1224
|
+
*/
|
1225
|
+
error?: String;
|
1226
|
+
/**
|
1227
|
+
* The ID of the finding to retrieve.
|
1228
|
+
*/
|
1229
|
+
id: FindingId;
|
1230
|
+
/**
|
1231
|
+
* A token used for pagination of results returned.
|
1232
|
+
*/
|
1233
|
+
nextToken?: Token;
|
1234
|
+
/**
|
1235
|
+
* The resource that generated the finding.
|
1236
|
+
*/
|
1237
|
+
resource?: String;
|
1238
|
+
/**
|
1239
|
+
* The type of the resource identified in the finding.
|
1240
|
+
*/
|
1241
|
+
resourceType: ResourceType;
|
1242
|
+
/**
|
1243
|
+
* Tye Amazon Web Services account ID that owns the resource.
|
1244
|
+
*/
|
1245
|
+
resourceOwnerAccount: String;
|
1246
|
+
/**
|
1247
|
+
* The status of the finding.
|
1248
|
+
*/
|
1249
|
+
status: FindingStatus;
|
1250
|
+
/**
|
1251
|
+
* The time at which the finding was updated.
|
1252
|
+
*/
|
1253
|
+
updatedAt: Timestamp;
|
1254
|
+
/**
|
1255
|
+
* A localized message that explains the finding and provides guidance on how to address it.
|
1256
|
+
*/
|
1257
|
+
findingDetails: FindingDetailsList;
|
1258
|
+
/**
|
1259
|
+
* The type of the finding. For external access analyzers, the type is ExternalAccess. For unused access analyzers, the type can be UnusedIAMRole, UnusedIAMUserAccessKey, UnusedIAMUserPassword, or UnusedPermission.
|
1260
|
+
*/
|
1261
|
+
findingType?: FindingType;
|
1262
|
+
}
|
991
1263
|
export interface GetGeneratedPolicyRequest {
|
992
1264
|
/**
|
993
1265
|
* The JobId that is returned by the StartPolicyGeneration operation. The JobId can be used with GetGeneratedPolicy to retrieve the generated policies or used with CancelPolicyGeneration to cancel the policy generation request.
|
@@ -1286,6 +1558,35 @@ declare namespace AccessAnalyzer {
|
|
1286
1558
|
*/
|
1287
1559
|
nextToken?: Token;
|
1288
1560
|
}
|
1561
|
+
export interface ListFindingsV2Request {
|
1562
|
+
/**
|
1563
|
+
* The ARN of the analyzer to retrieve findings from.
|
1564
|
+
*/
|
1565
|
+
analyzerArn: AnalyzerArn;
|
1566
|
+
/**
|
1567
|
+
* A filter to match for the findings to return.
|
1568
|
+
*/
|
1569
|
+
filter?: FilterCriteriaMap;
|
1570
|
+
/**
|
1571
|
+
* The maximum number of results to return in the response.
|
1572
|
+
*/
|
1573
|
+
maxResults?: Integer;
|
1574
|
+
/**
|
1575
|
+
* A token used for pagination of results returned.
|
1576
|
+
*/
|
1577
|
+
nextToken?: Token;
|
1578
|
+
sort?: SortCriteria;
|
1579
|
+
}
|
1580
|
+
export interface ListFindingsV2Response {
|
1581
|
+
/**
|
1582
|
+
* A list of findings retrieved from the analyzer that match the filter criteria specified, if any.
|
1583
|
+
*/
|
1584
|
+
findings: FindingsListV2;
|
1585
|
+
/**
|
1586
|
+
* A token used for pagination of results returned.
|
1587
|
+
*/
|
1588
|
+
nextToken?: Token;
|
1589
|
+
}
|
1289
1590
|
export interface ListPolicyGenerationsRequest {
|
1290
1591
|
/**
|
1291
1592
|
* The ARN of the IAM entity (user or role) for which you are generating a policy. Use this with ListGeneratedPolicies to filter the results to only include results for a specific principal.
|
@@ -1454,6 +1755,21 @@ declare namespace AccessAnalyzer {
|
|
1454
1755
|
}
|
1455
1756
|
export type RdsDbSnapshotKmsKeyId = string;
|
1456
1757
|
export type ReasonCode = "AWS_SERVICE_ACCESS_DISABLED"|"DELEGATED_ADMINISTRATOR_DEREGISTERED"|"ORGANIZATION_DELETED"|"SERVICE_LINKED_ROLE_CREATION_FAILED"|string;
|
1758
|
+
export interface ReasonSummary {
|
1759
|
+
/**
|
1760
|
+
* A description of the reasoning of a result of checking for access.
|
1761
|
+
*/
|
1762
|
+
description?: String;
|
1763
|
+
/**
|
1764
|
+
* The index number of the reason statement.
|
1765
|
+
*/
|
1766
|
+
statementIndex?: Integer;
|
1767
|
+
/**
|
1768
|
+
* The identifier for the reason statement.
|
1769
|
+
*/
|
1770
|
+
statementId?: String;
|
1771
|
+
}
|
1772
|
+
export type ReasonSummaryList = ReasonSummary[];
|
1457
1773
|
export type RegionList = String[];
|
1458
1774
|
export type ResourceArn = string;
|
1459
1775
|
export type ResourceType = "AWS::S3::Bucket"|"AWS::IAM::Role"|"AWS::SQS::Queue"|"AWS::Lambda::Function"|"AWS::Lambda::LayerVersion"|"AWS::KMS::Key"|"AWS::SecretsManager::Secret"|"AWS::EFS::FileSystem"|"AWS::EC2::Snapshot"|"AWS::ECR::Repository"|"AWS::RDS::DBSnapshot"|"AWS::RDS::DBClusterSnapshot"|"AWS::SNS::Topic"|string;
|
@@ -1658,7 +1974,7 @@ declare namespace AccessAnalyzer {
|
|
1658
1974
|
allRegions?: Boolean;
|
1659
1975
|
}
|
1660
1976
|
export type TrailPropertiesList = TrailProperties[];
|
1661
|
-
export type Type = "ACCOUNT"|"ORGANIZATION"|string;
|
1977
|
+
export type Type = "ACCOUNT"|"ORGANIZATION"|"ACCOUNT_UNUSED_ACCESS"|"ORGANIZATION_UNUSED_ACCESS"|string;
|
1662
1978
|
export interface UntagResourceRequest {
|
1663
1979
|
/**
|
1664
1980
|
* The ARN of the resource to remove the tag from.
|
@@ -1671,6 +1987,59 @@ declare namespace AccessAnalyzer {
|
|
1671
1987
|
}
|
1672
1988
|
export interface UntagResourceResponse {
|
1673
1989
|
}
|
1990
|
+
export interface UnusedAccessConfiguration {
|
1991
|
+
/**
|
1992
|
+
* The specified access age in days for which to generate findings for unused access. For example, if you specify 90 days, the analyzer will generate findings for IAM entities within the accounts of the selected organization for any access that hasn't been used in 90 or more days since the analyzer's last scan. You can choose a value between 1 and 180 days.
|
1993
|
+
*/
|
1994
|
+
unusedAccessAge?: Integer;
|
1995
|
+
}
|
1996
|
+
export interface UnusedAction {
|
1997
|
+
/**
|
1998
|
+
* The action for which the unused access finding was generated.
|
1999
|
+
*/
|
2000
|
+
action: String;
|
2001
|
+
/**
|
2002
|
+
* The time at which the action was last accessed.
|
2003
|
+
*/
|
2004
|
+
lastAccessed?: Timestamp;
|
2005
|
+
}
|
2006
|
+
export type UnusedActionList = UnusedAction[];
|
2007
|
+
export interface UnusedIamRoleDetails {
|
2008
|
+
/**
|
2009
|
+
* The time at which the role was last accessed.
|
2010
|
+
*/
|
2011
|
+
lastAccessed?: Timestamp;
|
2012
|
+
}
|
2013
|
+
export interface UnusedIamUserAccessKeyDetails {
|
2014
|
+
/**
|
2015
|
+
* The ID of the access key for which the unused access finding was generated.
|
2016
|
+
*/
|
2017
|
+
accessKeyId: String;
|
2018
|
+
/**
|
2019
|
+
* The time at which the access key was last accessed.
|
2020
|
+
*/
|
2021
|
+
lastAccessed?: Timestamp;
|
2022
|
+
}
|
2023
|
+
export interface UnusedIamUserPasswordDetails {
|
2024
|
+
/**
|
2025
|
+
* The time at which the password was last accessed.
|
2026
|
+
*/
|
2027
|
+
lastAccessed?: Timestamp;
|
2028
|
+
}
|
2029
|
+
export interface UnusedPermissionDetails {
|
2030
|
+
/**
|
2031
|
+
* A list of unused actions for which the unused access finding was generated.
|
2032
|
+
*/
|
2033
|
+
actions?: UnusedActionList;
|
2034
|
+
/**
|
2035
|
+
* The namespace of the Amazon Web Services service that contains the unused actions.
|
2036
|
+
*/
|
2037
|
+
serviceNamespace: String;
|
2038
|
+
/**
|
2039
|
+
* The time at which the permission last accessed.
|
2040
|
+
*/
|
2041
|
+
lastAccessed?: Timestamp;
|
2042
|
+
}
|
1674
2043
|
export interface UpdateArchiveRuleRequest {
|
1675
2044
|
/**
|
1676
2045
|
* The name of the analyzer to update the archive rules for.
|
@@ -1753,7 +2122,7 @@ declare namespace AccessAnalyzer {
|
|
1753
2122
|
*/
|
1754
2123
|
policyDocument: PolicyDocument;
|
1755
2124
|
/**
|
1756
|
-
* The type of policy to validate. Identity policies grant permissions to IAM principals. Identity policies include managed and inline policies for IAM roles, users, and groups.
|
2125
|
+
* The type of policy to validate. Identity policies grant permissions to IAM principals. Identity policies include managed and inline policies for IAM roles, users, and groups. Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust policies for IAM roles and bucket policies for Amazon S3 buckets. You can provide a generic input such as identity policy or resource policy or a specific input such as managed policy or Amazon S3 bucket policy. Service control policies (SCPs) are a type of organization policy attached to an Amazon Web Services organization, organizational unit (OU), or an account.
|
1757
2126
|
*/
|
1758
2127
|
policyType: PolicyType;
|
1759
2128
|
/**
|
@@ -359,3 +359,10 @@ export import LaunchWizard = require('./launchwizard');
|
|
359
359
|
export import TrustedAdvisor = require('./trustedadvisor');
|
360
360
|
export import CloudFrontKeyValueStore = require('./cloudfrontkeyvaluestore');
|
361
361
|
export import InspectorScan = require('./inspectorscan');
|
362
|
+
export import BCMDataExports = require('./bcmdataexports');
|
363
|
+
export import CostOptimizationHub = require('./costoptimizationhub');
|
364
|
+
export import EKSAuth = require('./eksauth');
|
365
|
+
export import FreeTier = require('./freetier');
|
366
|
+
export import Repostspace = require('./repostspace');
|
367
|
+
export import WorkSpacesThinClient = require('./workspacesthinclient');
|
368
|
+
export import B2bi = require('./b2bi');
|
@@ -360,5 +360,12 @@ module.exports = {
|
|
360
360
|
LaunchWizard: require('./launchwizard'),
|
361
361
|
TrustedAdvisor: require('./trustedadvisor'),
|
362
362
|
CloudFrontKeyValueStore: require('./cloudfrontkeyvaluestore'),
|
363
|
-
InspectorScan: require('./inspectorscan')
|
363
|
+
InspectorScan: require('./inspectorscan'),
|
364
|
+
BCMDataExports: require('./bcmdataexports'),
|
365
|
+
CostOptimizationHub: require('./costoptimizationhub'),
|
366
|
+
EKSAuth: require('./eksauth'),
|
367
|
+
FreeTier: require('./freetier'),
|
368
|
+
Repostspace: require('./repostspace'),
|
369
|
+
WorkSpacesThinClient: require('./workspacesthinclient'),
|
370
|
+
B2bi: require('./b2bi')
|
364
371
|
};
|