Skip to content

Commit

Permalink
Updates SDK to v2.649.0
Browse files Browse the repository at this point in the history
  • Loading branch information
awstools committed Mar 30, 2020
1 parent 09a2f4d commit 2fff14c
Show file tree
Hide file tree
Showing 12 changed files with 147 additions and 25 deletions.
7 changes: 7 additions & 0 deletions .changes/2.649.0.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
[
{
"type": "feature",
"category": "AccessAnalyzer",
"description": "This release adds support for the creation and management of IAM Access Analyzer analyzers with type organization. An analyzer with type organization continuously monitors all supported resources within the AWS organization and reports findings when they allow access from outside the organization."
}
]
5 changes: 4 additions & 1 deletion CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,10 @@
# Changelog for AWS SDK for JavaScript
<!--LATEST=2.648.0-->
<!--LATEST=2.649.0-->
<!--ENTRYINSERT-->

## 2.649.0
* feature: AccessAnalyzer: This release adds support for the creation and management of IAM Access Analyzer analyzers with type organization. An analyzer with type organization continuously monitors all supported resources within the AWS organization and reports findings when they allow access from outside the organization.

## 2.648.0
* feature: GlobalAccelerator: This update adds an event history to the ListByoipCidr API call. This enables you to see the changes that you've made for an IP address range that you bring to AWS Global Accelerator through bring your own IP address (BYOIP).
* feature: Kendra: The Amazon Kendra Microsoft SharePoint data source now supports include and exclude regular expressions and change log features. Include and exclude regular expressions enable you to provide a list of regular expressions to match the display URL of SharePoint documents to either include or exclude documents respectively. When you enable the changelog feature it enables Amazon Kendra to use the SharePoint change log to determine which documents to update in the index.
Expand Down
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ version.
To use the SDK in the browser, simply add the following script tag to your
HTML pages:

<script src="https://sdk.amazonaws.com/js/aws-sdk-2.648.0.min.js"></script>
<script src="https://sdk.amazonaws.com/js/aws-sdk-2.649.0.min.js"></script>

You can also build a custom browser SDK with your specified set of AWS services.
This can allow you to reduce the SDK's size, specify different API versions of
Expand Down
37 changes: 28 additions & 9 deletions apis/accessanalyzer-2019-11-01.min.json
Original file line number Diff line number Diff line change
Expand Up @@ -176,6 +176,7 @@
"createdAt",
"isPublic",
"resourceArn",
"resourceOwnerAccount",
"resourceType",
"updatedAt"
],
Expand All @@ -194,6 +195,7 @@
"type": "boolean"
},
"resourceArn": {},
"resourceOwnerAccount": {},
"resourceType": {},
"sharedVia": {
"type": "list",
Expand Down Expand Up @@ -268,7 +270,7 @@
],
"members": {
"archiveRule": {
"shape": "Sv"
"shape": "Sy"
}
}
}
Expand Down Expand Up @@ -306,6 +308,7 @@
"condition",
"createdAt",
"id",
"resourceOwnerAccount",
"resourceType",
"status",
"updatedAt"
Expand All @@ -318,7 +321,7 @@
"shape": "Sm"
},
"condition": {
"shape": "S10"
"shape": "S13"
},
"createdAt": {
"shape": "Sm"
Expand All @@ -329,9 +332,10 @@
"type": "boolean"
},
"principal": {
"shape": "S11"
"shape": "S14"
},
"resource": {},
"resourceOwnerAccount": {},
"resourceType": {},
"status": {},
"updatedAt": {
Expand Down Expand Up @@ -373,10 +377,12 @@
"type": "structure",
"required": [
"resourceArn",
"resourceOwnerAccount",
"resourceType"
],
"members": {
"resourceArn": {},
"resourceOwnerAccount": {},
"resourceType": {}
}
}
Expand Down Expand Up @@ -461,7 +467,7 @@
"archiveRules": {
"type": "list",
"member": {
"shape": "Sv"
"shape": "Sy"
}
},
"nextToken": {}
Expand Down Expand Up @@ -511,6 +517,7 @@
"condition",
"createdAt",
"id",
"resourceOwnerAccount",
"resourceType",
"status",
"updatedAt"
Expand All @@ -523,7 +530,7 @@
"shape": "Sm"
},
"condition": {
"shape": "S10"
"shape": "S13"
},
"createdAt": {
"shape": "Sm"
Expand All @@ -534,9 +541,10 @@
"type": "boolean"
},
"principal": {
"shape": "S11"
"shape": "S14"
},
"resource": {},
"resourceOwnerAccount": {},
"resourceType": {},
"status": {},
"updatedAt": {
Expand Down Expand Up @@ -756,6 +764,7 @@
"arn",
"createdAt",
"name",
"status",
"type"
],
"members": {
Expand All @@ -768,13 +777,23 @@
"shape": "Sm"
},
"name": {},
"status": {},
"statusReason": {
"type": "structure",
"required": [
"code"
],
"members": {
"code": {}
}
},
"tags": {
"shape": "Sa"
},
"type": {}
}
},
"Sv": {
"Sy": {
"type": "structure",
"required": [
"createdAt",
Expand All @@ -795,12 +814,12 @@
}
}
},
"S10": {
"S13": {
"type": "map",
"key": {},
"value": {}
},
"S11": {
"S14": {
"type": "map",
"key": {},
"value": {}
Expand Down
63 changes: 62 additions & 1 deletion apis/accessanalyzer-2019-11-01.normal.json
Original file line number Diff line number Diff line change
Expand Up @@ -596,6 +596,7 @@
"createdAt",
"isPublic",
"resourceArn",
"resourceOwnerAccount",
"resourceType",
"updatedAt"
],
Expand Down Expand Up @@ -624,6 +625,10 @@
"shape": "ResourceArn",
"documentation": "<p>The ARN of the resource that was analyzed.</p>"
},
"resourceOwnerAccount": {
"shape": "String",
"documentation": "<p>The AWS account ID that owns the resource.</p>"
},
"resourceType": {
"shape": "ResourceType",
"documentation": "<p>The type of the resource that was analyzed.</p>"
Expand All @@ -647,13 +652,18 @@
"type": "structure",
"required": [
"resourceArn",
"resourceOwnerAccount",
"resourceType"
],
"members": {
"resourceArn": {
"shape": "ResourceArn",
"documentation": "<p>The ARN of the analyzed resource.</p>"
},
"resourceOwnerAccount": {
"shape": "String",
"documentation": "<p>The AWS account ID that owns the resource.</p>"
},
"resourceType": {
"shape": "ResourceType",
"documentation": "<p>The type of resource that was analyzed.</p>"
Expand All @@ -671,12 +681,22 @@
"type": "string",
"pattern": "^[^:]*:[^:]*:[^:]*:[^:]*:[^:]*:analyzer/.{1,255}$"
},
"AnalyzerStatus": {
"type": "string",
"enum": [
"ACTIVE",
"CREATING",
"DISABLED",
"FAILED"
]
},
"AnalyzerSummary": {
"type": "structure",
"required": [
"arn",
"createdAt",
"name",
"status",
"type"
],
"members": {
Expand All @@ -700,6 +720,14 @@
"shape": "Name",
"documentation": "<p>The name of the analyzer.</p>"
},
"status": {
"shape": "AnalyzerStatus",
"documentation": "<p>The status of the analyzer. An <code>Active</code> analyzer successfully monitors supported resources and generates new findings. The analyzer is <code>Disabled</code> when a user action, such as removing trusted access for IAM Access Analyzer from AWS Organizations, causes the analyzer to stop generating new findings. The status is <code>Creating</code> when the analyzer creation is in progress and <code>Failed</code> when the analyzer creation has failed. </p>"
},
"statusReason": {
"shape": "StatusReason",
"documentation": "<p>The <code>statusReason</code> provides more details about the current status of the analyzer. For example, if the creation for the analyzer fails, a <code>Failed</code> status is displayed. For an analyzer with organization as the type, this failure can be due to an issue with creating the service-linked roles required in the member accounts of the AWS organization.</p>"
},
"tags": {
"shape": "TagsMap",
"documentation": "<p>The tags added to the analyzer.</p>"
Expand Down Expand Up @@ -924,6 +952,7 @@
"condition",
"createdAt",
"id",
"resourceOwnerAccount",
"resourceType",
"status",
"updatedAt"
Expand Down Expand Up @@ -965,6 +994,10 @@
"shape": "String",
"documentation": "<p>The resource that an external principal has access to.</p>"
},
"resourceOwnerAccount": {
"shape": "String",
"documentation": "<p>The AWS account ID that owns the resource.</p>"
},
"resourceType": {
"shape": "ResourceType",
"documentation": "<p>The type of the resource reported in the finding.</p>"
Expand Down Expand Up @@ -1011,6 +1044,7 @@
"condition",
"createdAt",
"id",
"resourceOwnerAccount",
"resourceType",
"status",
"updatedAt"
Expand Down Expand Up @@ -1052,6 +1086,10 @@
"shape": "String",
"documentation": "<p>The resource that the external principal has access to.</p>"
},
"resourceOwnerAccount": {
"shape": "String",
"documentation": "<p>The AWS account ID that owns the resource.</p>"
},
"resourceType": {
"shape": "ResourceType",
"documentation": "<p>The type of the resource that the external principal has access to.</p>"
Expand Down Expand Up @@ -1447,6 +1485,15 @@
"shape": "String"
}
},
"ReasonCode": {
"type": "string",
"enum": [
"AWS_SERVICE_ACCESS_DISABLED",
"DELEGATED_ADMINISTRATOR_DEREGISTERED",
"ORGANIZATION_DELETED",
"SERVICE_LINKED_ROLE_CREATION_FAILED"
]
},
"ResourceArn": {
"type": "string",
"pattern": "arn:[^:]*:[^:]*:[^:]*:[^:]*:.*$"
Expand Down Expand Up @@ -1500,6 +1547,19 @@
},
"documentation": "<p>Starts a scan of the policies applied to the specified resource.</p>"
},
"StatusReason": {
"type": "structure",
"required": [
"code"
],
"members": {
"code": {
"shape": "ReasonCode",
"documentation": "<p>The reason code for the current status of the analyzer.</p>"
}
},
"documentation": "<p>Provides more details about the current status of the analyzer. For example, if the creation for the analyzer fails, a <code>Failed</code> status is displayed. For an analyzer with organization as the type, this failure can be due to an issue with creating the service-linked roles required in the member accounts of the AWS organization.</p>"
},
"String": {
"type": "string"
},
Expand Down Expand Up @@ -1553,7 +1613,8 @@
"Type": {
"type": "string",
"enum": [
"ACCOUNT"
"ACCOUNT",
"ORGANIZATION"
]
},
"UntagResourceRequest": {
Expand Down
Loading

0 comments on commit 2fff14c

Please sign in to comment.