Skip to content

Commit 19f061f

Browse files
authored
feat(clients): update clients as of 09/02/2021 (#2744)
* chore(models): update api models as of 09/02/2021 * feat(clients): update clients as of 09/02/2021
1 parent 49da47b commit 19f061f

File tree

588 files changed

+36482
-10017
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

588 files changed

+36482
-10017
lines changed

clients/client-accessanalyzer/AccessAnalyzer.ts

Lines changed: 17 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -130,15 +130,15 @@ import {
130130
import { HttpHandlerOptions as __HttpHandlerOptions } from "@aws-sdk/types";
131131

132132
/**
133-
* <p>AWS IAM Access Analyzer helps identify potential resource-access risks by enabling you to identify
134-
* any policies that grant access to an external principal. It does this by using logic-based
135-
* reasoning to analyze resource-based policies in your AWS environment. An external
136-
* principal can be another AWS account, a root user, an IAM user or role, a federated
137-
* user, an AWS service, or an anonymous user. You can also use Access Analyzer to preview and
138-
* validate public and cross-account access to your resources before deploying permissions
139-
* changes. This guide describes the AWS IAM Access Analyzer operations that you can call
140-
* programmatically. For general information about Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">AWS IAM Access Analyzer</a> in the <b>IAM User Guide</b>.</p>
141-
* <p>To start using Access Analyzer, you first need to create an analyzer.</p>
133+
* <p>Identity and Access Management Access Analyzer helps identify potential resource-access risks by enabling you to
134+
* identify any policies that grant access to an external principal. It does this by using
135+
* logic-based reasoning to analyze resource-based policies in your Amazon Web Services environment. An
136+
* external principal can be another Amazon Web Services account, a root user, an IAM user or role, a
137+
* federated user, an Amazon Web Services service, or an anonymous user. You can also use IAM Access Analyzer to
138+
* preview and validate public and cross-account access to your resources before deploying
139+
* permissions changes. This guide describes the Identity and Access Management Access Analyzer operations that you can
140+
* call programmatically. For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity and Access Management Access Analyzer</a> in the <b>IAM User Guide</b>.</p>
141+
* <p>To start using IAM Access Analyzer, you first need to create an analyzer.</p>
142142
*/
143143
export class AccessAnalyzer extends AccessAnalyzerClient {
144144
/**
@@ -207,8 +207,8 @@ export class AccessAnalyzer extends AccessAnalyzerClient {
207207
}
208208

209209
/**
210-
* <p>Creates an access preview that allows you to preview Access Analyzer findings for your resource
211-
* before deploying resource permissions.</p>
210+
* <p>Creates an access preview that allows you to preview IAM Access Analyzer findings for your
211+
* resource before deploying resource permissions.</p>
212212
*/
213213
public createAccessPreview(
214214
args: CreateAccessPreviewCommandInput,
@@ -274,8 +274,7 @@ export class AccessAnalyzer extends AccessAnalyzerClient {
274274
/**
275275
* <p>Creates an archive rule for the specified analyzer. Archive rules automatically archive
276276
* new findings that meet the criteria you define when you create the rule.</p>
277-
* <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">Access Analyzer filter keys</a> in the <b>IAM User
278-
* Guide</b>.</p>
277+
* <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
279278
*/
280279
public createArchiveRule(
281280
args: CreateArchiveRuleCommandInput,
@@ -307,9 +306,9 @@ export class AccessAnalyzer extends AccessAnalyzerClient {
307306
}
308307

309308
/**
310-
* <p>Deletes the specified analyzer. When you delete an analyzer, Access Analyzer is disabled for the
311-
* account or organization in the current or specific Region. All findings that were generated
312-
* by the analyzer are deleted. You cannot undo this action.</p>
309+
* <p>Deletes the specified analyzer. When you delete an analyzer, IAM Access Analyzer is disabled
310+
* for the account or organization in the current or specific Region. All findings that were
311+
* generated by the analyzer are deleted. You cannot undo this action.</p>
313312
*/
314313
public deleteAnalyzer(
315314
args: DeleteAnalyzerCommandInput,
@@ -464,8 +463,7 @@ export class AccessAnalyzer extends AccessAnalyzerClient {
464463

465464
/**
466465
* <p>Retrieves information about an archive rule.</p>
467-
* <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">Access Analyzer filter keys</a> in the <b>IAM User
468-
* Guide</b>.</p>
466+
* <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
469467
*/
470468
public getArchiveRule(
471469
args: GetArchiveRuleCommandInput,
@@ -719,8 +717,7 @@ export class AccessAnalyzer extends AccessAnalyzerClient {
719717

720718
/**
721719
* <p>Retrieves a list of findings generated by the specified analyzer.</p>
722-
* <p>To learn about filter keys that you can use to retrieve a list of findings, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">Access Analyzer filter keys</a> in the <b>IAM User
723-
* Guide</b>.</p>
720+
* <p>To learn about filter keys that you can use to retrieve a list of findings, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
724721
*/
725722
public listFindings(
726723
args: ListFindingsCommandInput,

clients/client-accessanalyzer/AccessAnalyzerClient.ts

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -301,15 +301,15 @@ type AccessAnalyzerClientResolvedConfigType = __SmithyResolvedConfiguration<__Ht
301301
export interface AccessAnalyzerClientResolvedConfig extends AccessAnalyzerClientResolvedConfigType {}
302302

303303
/**
304-
* <p>AWS IAM Access Analyzer helps identify potential resource-access risks by enabling you to identify
305-
* any policies that grant access to an external principal. It does this by using logic-based
306-
* reasoning to analyze resource-based policies in your AWS environment. An external
307-
* principal can be another AWS account, a root user, an IAM user or role, a federated
308-
* user, an AWS service, or an anonymous user. You can also use Access Analyzer to preview and
309-
* validate public and cross-account access to your resources before deploying permissions
310-
* changes. This guide describes the AWS IAM Access Analyzer operations that you can call
311-
* programmatically. For general information about Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">AWS IAM Access Analyzer</a> in the <b>IAM User Guide</b>.</p>
312-
* <p>To start using Access Analyzer, you first need to create an analyzer.</p>
304+
* <p>Identity and Access Management Access Analyzer helps identify potential resource-access risks by enabling you to
305+
* identify any policies that grant access to an external principal. It does this by using
306+
* logic-based reasoning to analyze resource-based policies in your Amazon Web Services environment. An
307+
* external principal can be another Amazon Web Services account, a root user, an IAM user or role, a
308+
* federated user, an Amazon Web Services service, or an anonymous user. You can also use IAM Access Analyzer to
309+
* preview and validate public and cross-account access to your resources before deploying
310+
* permissions changes. This guide describes the Identity and Access Management Access Analyzer operations that you can
311+
* call programmatically. For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity and Access Management Access Analyzer</a> in the <b>IAM User Guide</b>.</p>
312+
* <p>To start using IAM Access Analyzer, you first need to create an analyzer.</p>
313313
*/
314314
export class AccessAnalyzerClient extends __Client<
315315
__HttpHandlerOptions,

clients/client-accessanalyzer/README.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -7,15 +7,15 @@
77

88
AWS SDK for JavaScript AccessAnalyzer Client for Node.js, Browser and React Native.
99

10-
<p>AWS IAM Access Analyzer helps identify potential resource-access risks by enabling you to identify
11-
any policies that grant access to an external principal. It does this by using logic-based
12-
reasoning to analyze resource-based policies in your AWS environment. An external
13-
principal can be another AWS account, a root user, an IAM user or role, a federated
14-
user, an AWS service, or an anonymous user. You can also use Access Analyzer to preview and
15-
validate public and cross-account access to your resources before deploying permissions
16-
changes. This guide describes the AWS IAM Access Analyzer operations that you can call
17-
programmatically. For general information about Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">AWS IAM Access Analyzer</a> in the <b>IAM User Guide</b>.</p>
18-
<p>To start using Access Analyzer, you first need to create an analyzer.</p>
10+
<p>Identity and Access Management Access Analyzer helps identify potential resource-access risks by enabling you to
11+
identify any policies that grant access to an external principal. It does this by using
12+
logic-based reasoning to analyze resource-based policies in your Amazon Web Services environment. An
13+
external principal can be another Amazon Web Services account, a root user, an IAM user or role, a
14+
federated user, an Amazon Web Services service, or an anonymous user. You can also use IAM Access Analyzer to
15+
preview and validate public and cross-account access to your resources before deploying
16+
permissions changes. This guide describes the Identity and Access Management Access Analyzer operations that you can
17+
call programmatically. For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity and Access Management Access Analyzer</a> in the <b>IAM User Guide</b>.</p>
18+
<p>To start using IAM Access Analyzer, you first need to create an analyzer.</p>
1919

2020
## Installing
2121

clients/client-accessanalyzer/commands/CreateAccessPreviewCommand.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,8 +21,8 @@ export interface CreateAccessPreviewCommandInput extends CreateAccessPreviewRequ
2121
export interface CreateAccessPreviewCommandOutput extends CreateAccessPreviewResponse, __MetadataBearer {}
2222

2323
/**
24-
* <p>Creates an access preview that allows you to preview Access Analyzer findings for your resource
25-
* before deploying resource permissions.</p>
24+
* <p>Creates an access preview that allows you to preview IAM Access Analyzer findings for your
25+
* resource before deploying resource permissions.</p>
2626
* @example
2727
* Use a bare-bones client and the command you need to make an API call.
2828
* ```javascript

clients/client-accessanalyzer/commands/CreateArchiveRuleCommand.ts

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,8 +23,7 @@ export interface CreateArchiveRuleCommandOutput extends __MetadataBearer {}
2323
/**
2424
* <p>Creates an archive rule for the specified analyzer. Archive rules automatically archive
2525
* new findings that meet the criteria you define when you create the rule.</p>
26-
* <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">Access Analyzer filter keys</a> in the <b>IAM User
27-
* Guide</b>.</p>
26+
* <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
2827
* @example
2928
* Use a bare-bones client and the command you need to make an API call.
3029
* ```javascript

clients/client-accessanalyzer/commands/DeleteAnalyzerCommand.ts

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,9 @@ export interface DeleteAnalyzerCommandInput extends DeleteAnalyzerRequest {}
2121
export interface DeleteAnalyzerCommandOutput extends __MetadataBearer {}
2222

2323
/**
24-
* <p>Deletes the specified analyzer. When you delete an analyzer, Access Analyzer is disabled for the
25-
* account or organization in the current or specific Region. All findings that were generated
26-
* by the analyzer are deleted. You cannot undo this action.</p>
24+
* <p>Deletes the specified analyzer. When you delete an analyzer, IAM Access Analyzer is disabled
25+
* for the account or organization in the current or specific Region. All findings that were
26+
* generated by the analyzer are deleted. You cannot undo this action.</p>
2727
* @example
2828
* Use a bare-bones client and the command you need to make an API call.
2929
* ```javascript

clients/client-accessanalyzer/commands/GetArchiveRuleCommand.ts

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,7 @@ export interface GetArchiveRuleCommandOutput extends GetArchiveRuleResponse, __M
2222

2323
/**
2424
* <p>Retrieves information about an archive rule.</p>
25-
* <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">Access Analyzer filter keys</a> in the <b>IAM User
26-
* Guide</b>.</p>
25+
* <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
2726
* @example
2827
* Use a bare-bones client and the command you need to make an API call.
2928
* ```javascript

clients/client-accessanalyzer/commands/ListFindingsCommand.ts

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,7 @@ export interface ListFindingsCommandOutput extends ListFindingsResponse, __Metad
2222

2323
/**
2424
* <p>Retrieves a list of findings generated by the specified analyzer.</p>
25-
* <p>To learn about filter keys that you can use to retrieve a list of findings, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">Access Analyzer filter keys</a> in the <b>IAM User
26-
* Guide</b>.</p>
25+
* <p>To learn about filter keys that you can use to retrieve a list of findings, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
2726
* @example
2827
* Use a bare-bones client and the command you need to make an API call.
2928
* ```javascript

0 commit comments

Comments
 (0)