Skip to content

Commit

Permalink
feat(clients): update clients as of 09/02/2021 (#2744)
Browse files Browse the repository at this point in the history
* chore(models): update api models as of 09/02/2021

* feat(clients): update clients as of 09/02/2021
  • Loading branch information
AllanZhengYP committed Sep 2, 2021
1 parent 49da47b commit 19f061f
Show file tree
Hide file tree
Showing 588 changed files with 36,482 additions and 10,017 deletions.
37 changes: 17 additions & 20 deletions clients/client-accessanalyzer/AccessAnalyzer.ts
Expand Up @@ -130,15 +130,15 @@ import {
import { HttpHandlerOptions as __HttpHandlerOptions } from "@aws-sdk/types";

/**
* <p>AWS IAM Access Analyzer helps identify potential resource-access risks by enabling you to identify
* any policies that grant access to an external principal. It does this by using logic-based
* reasoning to analyze resource-based policies in your AWS environment. An external
* principal can be another AWS account, a root user, an IAM user or role, a federated
* user, an AWS service, or an anonymous user. You can also use Access Analyzer to preview and
* validate public and cross-account access to your resources before deploying permissions
* changes. This guide describes the AWS IAM Access Analyzer operations that you can call
* programmatically. For general information about Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">AWS IAM Access Analyzer</a> in the <b>IAM User Guide</b>.</p>
* <p>To start using Access Analyzer, you first need to create an analyzer.</p>
* <p>Identity and Access Management Access Analyzer helps identify potential resource-access risks by enabling you to
* identify any policies that grant access to an external principal. It does this by using
* logic-based reasoning to analyze resource-based policies in your Amazon Web Services environment. An
* external principal can be another Amazon Web Services account, a root user, an IAM user or role, a
* federated user, an Amazon Web Services service, or an anonymous user. You can also use IAM Access Analyzer to
* preview and validate public and cross-account access to your resources before deploying
* permissions changes. This guide describes the Identity and Access Management Access Analyzer operations that you can
* call programmatically. For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity and Access Management Access Analyzer</a> in the <b>IAM User Guide</b>.</p>
* <p>To start using IAM Access Analyzer, you first need to create an analyzer.</p>
*/
export class AccessAnalyzer extends AccessAnalyzerClient {
/**
Expand Down Expand Up @@ -207,8 +207,8 @@ export class AccessAnalyzer extends AccessAnalyzerClient {
}

/**
* <p>Creates an access preview that allows you to preview Access Analyzer findings for your resource
* before deploying resource permissions.</p>
* <p>Creates an access preview that allows you to preview IAM Access Analyzer findings for your
* resource before deploying resource permissions.</p>
*/
public createAccessPreview(
args: CreateAccessPreviewCommandInput,
Expand Down Expand Up @@ -274,8 +274,7 @@ export class AccessAnalyzer extends AccessAnalyzerClient {
/**
* <p>Creates an archive rule for the specified analyzer. Archive rules automatically archive
* new findings that meet the criteria you define when you create the rule.</p>
* <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">Access Analyzer filter keys</a> in the <b>IAM User
* Guide</b>.</p>
* <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
*/
public createArchiveRule(
args: CreateArchiveRuleCommandInput,
Expand Down Expand Up @@ -307,9 +306,9 @@ export class AccessAnalyzer extends AccessAnalyzerClient {
}

/**
* <p>Deletes the specified analyzer. When you delete an analyzer, Access Analyzer is disabled for the
* account or organization in the current or specific Region. All findings that were generated
* by the analyzer are deleted. You cannot undo this action.</p>
* <p>Deletes the specified analyzer. When you delete an analyzer, IAM Access Analyzer is disabled
* for the account or organization in the current or specific Region. All findings that were
* generated by the analyzer are deleted. You cannot undo this action.</p>
*/
public deleteAnalyzer(
args: DeleteAnalyzerCommandInput,
Expand Down Expand Up @@ -464,8 +463,7 @@ export class AccessAnalyzer extends AccessAnalyzerClient {

/**
* <p>Retrieves information about an archive rule.</p>
* <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">Access Analyzer filter keys</a> in the <b>IAM User
* Guide</b>.</p>
* <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
*/
public getArchiveRule(
args: GetArchiveRuleCommandInput,
Expand Down Expand Up @@ -719,8 +717,7 @@ export class AccessAnalyzer extends AccessAnalyzerClient {

/**
* <p>Retrieves a list of findings generated by the specified analyzer.</p>
* <p>To learn about filter keys that you can use to retrieve a list of findings, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">Access Analyzer filter keys</a> in the <b>IAM User
* Guide</b>.</p>
* <p>To learn about filter keys that you can use to retrieve a list of findings, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
*/
public listFindings(
args: ListFindingsCommandInput,
Expand Down
18 changes: 9 additions & 9 deletions clients/client-accessanalyzer/AccessAnalyzerClient.ts
Expand Up @@ -301,15 +301,15 @@ type AccessAnalyzerClientResolvedConfigType = __SmithyResolvedConfiguration<__Ht
export interface AccessAnalyzerClientResolvedConfig extends AccessAnalyzerClientResolvedConfigType {}

/**
* <p>AWS IAM Access Analyzer helps identify potential resource-access risks by enabling you to identify
* any policies that grant access to an external principal. It does this by using logic-based
* reasoning to analyze resource-based policies in your AWS environment. An external
* principal can be another AWS account, a root user, an IAM user or role, a federated
* user, an AWS service, or an anonymous user. You can also use Access Analyzer to preview and
* validate public and cross-account access to your resources before deploying permissions
* changes. This guide describes the AWS IAM Access Analyzer operations that you can call
* programmatically. For general information about Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">AWS IAM Access Analyzer</a> in the <b>IAM User Guide</b>.</p>
* <p>To start using Access Analyzer, you first need to create an analyzer.</p>
* <p>Identity and Access Management Access Analyzer helps identify potential resource-access risks by enabling you to
* identify any policies that grant access to an external principal. It does this by using
* logic-based reasoning to analyze resource-based policies in your Amazon Web Services environment. An
* external principal can be another Amazon Web Services account, a root user, an IAM user or role, a
* federated user, an Amazon Web Services service, or an anonymous user. You can also use IAM Access Analyzer to
* preview and validate public and cross-account access to your resources before deploying
* permissions changes. This guide describes the Identity and Access Management Access Analyzer operations that you can
* call programmatically. For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity and Access Management Access Analyzer</a> in the <b>IAM User Guide</b>.</p>
* <p>To start using IAM Access Analyzer, you first need to create an analyzer.</p>
*/
export class AccessAnalyzerClient extends __Client<
__HttpHandlerOptions,
Expand Down
18 changes: 9 additions & 9 deletions clients/client-accessanalyzer/README.md
Expand Up @@ -7,15 +7,15 @@

AWS SDK for JavaScript AccessAnalyzer Client for Node.js, Browser and React Native.

<p>AWS IAM Access Analyzer helps identify potential resource-access risks by enabling you to identify
any policies that grant access to an external principal. It does this by using logic-based
reasoning to analyze resource-based policies in your AWS environment. An external
principal can be another AWS account, a root user, an IAM user or role, a federated
user, an AWS service, or an anonymous user. You can also use Access Analyzer to preview and
validate public and cross-account access to your resources before deploying permissions
changes. This guide describes the AWS IAM Access Analyzer operations that you can call
programmatically. For general information about Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">AWS IAM Access Analyzer</a> in the <b>IAM User Guide</b>.</p>
<p>To start using Access Analyzer, you first need to create an analyzer.</p>
<p>Identity and Access Management Access Analyzer helps identify potential resource-access risks by enabling you to
identify any policies that grant access to an external principal. It does this by using
logic-based reasoning to analyze resource-based policies in your Amazon Web Services environment. An
external principal can be another Amazon Web Services account, a root user, an IAM user or role, a
federated user, an Amazon Web Services service, or an anonymous user. You can also use IAM Access Analyzer to
preview and validate public and cross-account access to your resources before deploying
permissions changes. This guide describes the Identity and Access Management Access Analyzer operations that you can
call programmatically. For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity and Access Management Access Analyzer</a> in the <b>IAM User Guide</b>.</p>
<p>To start using IAM Access Analyzer, you first need to create an analyzer.</p>

## Installing

Expand Down
Expand Up @@ -21,8 +21,8 @@ export interface CreateAccessPreviewCommandInput extends CreateAccessPreviewRequ
export interface CreateAccessPreviewCommandOutput extends CreateAccessPreviewResponse, __MetadataBearer {}

/**
* <p>Creates an access preview that allows you to preview Access Analyzer findings for your resource
* before deploying resource permissions.</p>
* <p>Creates an access preview that allows you to preview IAM Access Analyzer findings for your
* resource before deploying resource permissions.</p>
* @example
* Use a bare-bones client and the command you need to make an API call.
* ```javascript
Expand Down
Expand Up @@ -23,8 +23,7 @@ export interface CreateArchiveRuleCommandOutput extends __MetadataBearer {}
/**
* <p>Creates an archive rule for the specified analyzer. Archive rules automatically archive
* new findings that meet the criteria you define when you create the rule.</p>
* <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">Access Analyzer filter keys</a> in the <b>IAM User
* Guide</b>.</p>
* <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
* @example
* Use a bare-bones client and the command you need to make an API call.
* ```javascript
Expand Down
Expand Up @@ -21,9 +21,9 @@ export interface DeleteAnalyzerCommandInput extends DeleteAnalyzerRequest {}
export interface DeleteAnalyzerCommandOutput extends __MetadataBearer {}

/**
* <p>Deletes the specified analyzer. When you delete an analyzer, Access Analyzer is disabled for the
* account or organization in the current or specific Region. All findings that were generated
* by the analyzer are deleted. You cannot undo this action.</p>
* <p>Deletes the specified analyzer. When you delete an analyzer, IAM Access Analyzer is disabled
* for the account or organization in the current or specific Region. All findings that were
* generated by the analyzer are deleted. You cannot undo this action.</p>
* @example
* Use a bare-bones client and the command you need to make an API call.
* ```javascript
Expand Down
Expand Up @@ -22,8 +22,7 @@ export interface GetArchiveRuleCommandOutput extends GetArchiveRuleResponse, __M

/**
* <p>Retrieves information about an archive rule.</p>
* <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">Access Analyzer filter keys</a> in the <b>IAM User
* Guide</b>.</p>
* <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
* @example
* Use a bare-bones client and the command you need to make an API call.
* ```javascript
Expand Down
Expand Up @@ -22,8 +22,7 @@ export interface ListFindingsCommandOutput extends ListFindingsResponse, __Metad

/**
* <p>Retrieves a list of findings generated by the specified analyzer.</p>
* <p>To learn about filter keys that you can use to retrieve a list of findings, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">Access Analyzer filter keys</a> in the <b>IAM User
* Guide</b>.</p>
* <p>To learn about filter keys that you can use to retrieve a list of findings, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
* @example
* Use a bare-bones client and the command you need to make an API call.
* ```javascript
Expand Down

0 comments on commit 19f061f

Please sign in to comment.