You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,10 @@
1
1
# Changelog for AWS SDK for JavaScript
2
-
<!--LATEST=2.588.0-->
2
+
<!--LATEST=2.589.0-->
3
3
<!--ENTRYINSERT-->
4
4
5
+
## 2.589.0
6
+
* feature: AccessAnalyzer: This release includes improvements and fixes bugs for the IAM Access Analyzer feature.
7
+
5
8
## 2.588.0
6
9
* feature: EC2: This release allows customers to attach multiple Elastic Inference Accelerators to a single EC2 instance. It adds support for a Count parameter for each Elastic Inference Accelerator type you specify on the RunInstances and LaunchTemplate APIs.
Copy file name to clipboardExpand all lines: apis/accessanalyzer-2019-11-01.normal.json
+21-20Lines changed: 21 additions & 20 deletions
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@
45
45
"shape": "AccessDeniedException"
46
46
}
47
47
],
48
-
"documentation": "<p>Creates an analyzer with a zone of trust set to your account.</p>",
48
+
"documentation": "<p>Creates an analyzer for your account.</p>",
49
49
"idempotent": true
50
50
},
51
51
"CreateArchiveRule": {
@@ -81,7 +81,7 @@
81
81
"shape": "AccessDeniedException"
82
82
}
83
83
],
84
-
"documentation": "<p>Creates an archive rule for the specified analyzer.</p>",
84
+
"documentation": "<p>Creates an archive rule for the specified analyzer. Archive rules automatically archive findings that meet the criteria you define when you create the rule.</p>",
85
85
"idempotent": true
86
86
},
87
87
"DeleteAnalyzer": {
@@ -174,7 +174,7 @@
174
174
"shape": "AccessDeniedException"
175
175
}
176
176
],
177
-
"documentation": "<p>Retrieves information about an analyzed resource.</p>"
177
+
"documentation": "<p>Retrieves information about a resource that was analyzed.</p>"
178
178
},
179
179
"GetAnalyzer": {
180
180
"name": "GetAnalyzer",
@@ -302,7 +302,7 @@
302
302
"shape": "AccessDeniedException"
303
303
}
304
304
],
305
-
"documentation": "<p>Retrieves a list of resources that have been analyzed.</p>"
305
+
"documentation": "<p>Retrieves a list of resources of the specified type that have been analyzed by the specified analyzer..</p>"
306
306
},
307
307
"ListAnalyzers": {
308
308
"name": "ListAnalyzers",
@@ -453,7 +453,7 @@
453
453
"shape": "AccessDeniedException"
454
454
}
455
455
],
456
-
"documentation": "<p>Starts a scan of the policies applied to the specified resource.</p>"
456
+
"documentation": "<p>Immediately starts a scan of the policies applied to the specified resource.</p>"
457
457
},
458
458
"TagResource": {
459
459
"name": "TagResource",
@@ -548,7 +548,7 @@
548
548
"shape": "AccessDeniedException"
549
549
}
550
550
],
551
-
"documentation": "<p>Updates the specified archive rule.</p>",
551
+
"documentation": "<p>Updates the criteria and values for the specified archive rule.</p>",
552
552
"idempotent": true
553
553
},
554
554
"UpdateFindings": {
@@ -578,7 +578,7 @@
578
578
"shape": "AccessDeniedException"
579
579
}
580
580
],
581
-
"documentation": "<p>Updates findings with the new values provided in the request.</p>",
581
+
"documentation": "<p>Updates the status for the specified findings.</p>",
582
582
"idempotent": true
583
583
}
584
584
},
@@ -777,7 +777,7 @@
777
777
},
778
778
"archiveRules": {
779
779
"shape": "InlineArchiveRulesList",
780
-
"documentation": "<p>Specifies the archive rules to add for the analyzer.</p>"
780
+
"documentation": "<p>Specifies the archive rules to add for the analyzer. Archive rules automatically archive findings that meet the criteria you define for the rule.</p>"
781
781
},
782
782
"clientToken": {
783
783
"shape": "String",
@@ -790,7 +790,7 @@
790
790
},
791
791
"type": {
792
792
"shape": "Type",
793
-
"documentation": "<p>The zone of trust for the analyzer. You can create only one analyzer per account per Region.</p>"
793
+
"documentation": "<p>The type of analyzer to create. Only ACCOUNT analyzers are supported. You can create only one analyzer per account per Region.</p>"
794
794
}
795
795
},
796
796
"documentation": "<p>Creates an analyzer.</p>"
@@ -855,7 +855,7 @@
855
855
"documentation": "<p>A \"not equals\" operator to match for the filter used to create the rule.</p>"
856
856
}
857
857
},
858
-
"documentation": "<p>The criteria to use in the filter that defines the rule.</p>"
858
+
"documentation": "<p>The criteria to use in the filter that defines the archive rule.</p>"
859
859
},
860
860
"DeleteAnalyzerRequest": {
861
861
"type": "structure",
@@ -888,7 +888,7 @@
888
888
"members": {
889
889
"analyzerName": {
890
890
"shape": "Name",
891
-
"documentation": "<p>The name of the analyzer that was deleted.</p>",
891
+
"documentation": "<p>The name of the analyzer that associated with the archive rule to delete.</p>",
892
892
"location": "uri",
893
893
"locationName": "analyzerName"
894
894
},
@@ -1197,7 +1197,7 @@
1197
1197
"documentation": "<p>A <code>finding</code> object that contains finding details.</p>"
1198
1198
}
1199
1199
},
1200
-
"documentation": "<p>The resposne to the request.</p>"
1200
+
"documentation": "<p>The response to the request.</p>"
1201
1201
},
1202
1202
"InlineArchiveRule": {
1203
1203
"type": "structure",
@@ -1208,14 +1208,14 @@
1208
1208
"members": {
1209
1209
"filter": {
1210
1210
"shape": "FilterCriteriaMap",
1211
-
"documentation": "<p>The criteria for the rule.</p>"
1211
+
"documentation": "<p>The condition and values for a criterion.</p>"
1212
1212
},
1213
1213
"ruleName": {
1214
1214
"shape": "Name",
1215
1215
"documentation": "<p>The name of the rule.</p>"
1216
1216
}
1217
1217
},
1218
-
"documentation": "<p>An inline archive rule.</p>"
1218
+
"documentation": "<p>An criterion statement in an archive rule. Each archive rule may have multiple criteria.</p>"
1219
1219
},
1220
1220
"InlineArchiveRulesList": {
1221
1221
"type": "list",
@@ -1286,7 +1286,7 @@
1286
1286
},
1287
1287
"type": {
1288
1288
"shape": "Type",
1289
-
"documentation": "<p>The type of analyzer, which corresponds to the zone of trust selected when the analyzer was created.</p>",
1289
+
"documentation": "<p>The type of analyzer.</p>",
1290
1290
"location": "querystring",
1291
1291
"locationName": "type"
1292
1292
}
@@ -1398,7 +1398,7 @@
1398
1398
"documentation": "<p>A token used for pagination of results returned.</p>"
1399
1399
}
1400
1400
},
1401
-
"documentation": "<p>The resposne to the request.</p>"
1401
+
"documentation": "<p>The response to the request.</p>"
1402
1402
},
1403
1403
"ListTagsForResourceRequest": {
1404
1404
"type": "structure",
@@ -1480,7 +1480,7 @@
1480
1480
"documentation": "<p>The sort order, ascending or descending.</p>"
1481
1481
}
1482
1482
},
1483
-
"documentation": "<p>The sort criteria.</p>"
1483
+
"documentation": "<p>The criteria used to sort.</p>"
1484
1484
},
1485
1485
"StartResourceScanRequest": {
1486
1486
"type": "structure",
@@ -1544,7 +1544,8 @@
1544
1544
}
1545
1545
},
1546
1546
"Timestamp": {
1547
-
"type": "timestamp"
1547
+
"type": "timestamp",
1548
+
"timestampFormat": "iso8601"
1548
1549
},
1549
1550
"Token": {
1550
1551
"type": "string"
@@ -1580,7 +1581,7 @@
1580
1581
"UntagResourceResponse": {
1581
1582
"type": "structure",
1582
1583
"members": {},
1583
-
"documentation": "<p>The response tot he request.</p>"
1584
+
"documentation": "<p>The response to the request.</p>"
1584
1585
},
1585
1586
"UpdateArchiveRuleRequest": {
1586
1587
"type": "structure",
@@ -1654,5 +1655,5 @@
1654
1655
"min": 1
1655
1656
}
1656
1657
},
1657
-
"documentation": "<p>AWS IAM Access Analyzer API Reference</p>"
1658
+
"documentation": "<p>AWS IAM Access Analyzer helps identify potential resource-access risks by enabling you to identify any policies that grant access to an external principal. It does this by using logic-based reasoning to analyze resource-based policies in your AWS environment. An external principal can be another AWS account, a root user, an IAM user or role, a federated user, an AWS service, or an anonymous user. This guide describes the AWS IAM Access Analyzer operations that you can call programmatically. For general information about Access Analyzer, see the <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html\">AWS IAM Access Analyzer section of the IAM User Guide</a>.</p> <p>To start using Access Analyzer, you first need to create an analyzer.</p>"
0 commit comments