|
2 | 2 | "version":"2.0",
|
3 | 3 | "metadata":{
|
4 | 4 | "apiVersion":"2019-11-01",
|
| 5 | + "auth":["aws.auth#sigv4"], |
5 | 6 | "endpointPrefix":"access-analyzer",
|
6 | 7 | "protocol":"rest-json",
|
7 | 8 | "protocols":["rest-json"],
|
|
660 | 661 | },
|
661 | 662 | "resources":{
|
662 | 663 | "shape":"AccessResourcesList",
|
663 |
| - "documentation":"<p>A list of resources for the access permissions. Any strings that can be used as a resource in an IAM policy can be used in the list of resources to check.</p>" |
| 664 | + "documentation":"<p>A list of resources for the access permissions. Any strings that can be used as an Amazon Resource Name (ARN) in an IAM policy can be used in the list of resources to check. You can only use a wildcard in the portion of the ARN that specifies the resource ID.</p>" |
664 | 665 | }
|
665 | 666 | },
|
666 | 667 | "documentation":"<p>Contains information about actions and resources that define permissions to check against a policy.</p>"
|
|
830 | 831 | "sources":{
|
831 | 832 | "shape":"FindingSourceList",
|
832 | 833 | "documentation":"<p>The sources of the finding. This indicates how the access that generated the finding is granted. It is populated for Amazon S3 bucket findings.</p>"
|
| 834 | + }, |
| 835 | + "resourceControlPolicyRestriction":{ |
| 836 | + "shape":"ResourceControlPolicyRestriction", |
| 837 | + "documentation":"<p>The type of restriction applied to the finding by the resource owner with an Organizations resource control policy (RCP).</p>" |
833 | 838 | }
|
834 | 839 | },
|
835 | 840 | "documentation":"<p>An access preview finding generated by the access preview.</p>"
|
|
1197 | 1202 | },
|
1198 | 1203 | "access":{
|
1199 | 1204 | "shape":"CheckAccessNotGrantedRequestAccessList",
|
1200 |
| - "documentation":"<p>An access object containing the permissions that shouldn't be granted by the specified policy. If only actions are specified, IAM Access Analyzer checks for access of the actions on all resources in the policy. If only resources are specified, then IAM Access Analyzer checks which actions have access to the specified resources. If both actions and resources are specified, then IAM Access Analyzer checks which of the specified actions have access to the specified resources.</p>" |
| 1205 | + "documentation":"<p>An access object containing the permissions that shouldn't be granted by the specified policy. If only actions are specified, IAM Access Analyzer checks for access to peform at least one of the actions on any resource in the policy. If only resources are specified, then IAM Access Analyzer checks for access to perform any action on at least one of the resources. If both actions and resources are specified, IAM Access Analyzer checks for access to perform at least one of the specified actions on at least one of the specified resources.</p>" |
1201 | 1206 | },
|
1202 | 1207 | "policyType":{
|
1203 | 1208 | "shape":"AccessCheckPolicyType",
|
1204 |
| - "documentation":"<p>The type of policy. Identity policies grant permissions to IAM principals. Identity policies include managed and inline policies for IAM roles, users, and groups.</p> <p>Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust policies for IAM roles and bucket policies for Amazon S3 buckets. You can provide a generic input such as identity policy or resource policy or a specific input such as managed policy or Amazon S3 bucket policy.</p>" |
| 1209 | + "documentation":"<p>The type of policy. Identity policies grant permissions to IAM principals. Identity policies include managed and inline policies for IAM roles, users, and groups.</p> <p>Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust policies for IAM roles and bucket policies for Amazon S3 buckets.</p>" |
1205 | 1210 | }
|
1206 | 1211 | }
|
1207 | 1212 | },
|
|
1749 | 1754 | "sources":{
|
1750 | 1755 | "shape":"FindingSourceList",
|
1751 | 1756 | "documentation":"<p>The sources of the external access finding. This indicates how the access that generated the finding is granted. It is populated for Amazon S3 bucket findings.</p>"
|
| 1757 | + }, |
| 1758 | + "resourceControlPolicyRestriction":{ |
| 1759 | + "shape":"ResourceControlPolicyRestriction", |
| 1760 | + "documentation":"<p>The type of restriction applied to the finding by the resource owner with an Organizations resource control policy (RCP).</p>" |
1752 | 1761 | }
|
1753 | 1762 | },
|
1754 | 1763 | "documentation":"<p>Contains information about an external access finding.</p>"
|
|
1826 | 1835 | "sources":{
|
1827 | 1836 | "shape":"FindingSourceList",
|
1828 | 1837 | "documentation":"<p>The sources of the finding. This indicates how the access that generated the finding is granted. It is populated for Amazon S3 bucket findings.</p>"
|
| 1838 | + }, |
| 1839 | + "resourceControlPolicyRestriction":{ |
| 1840 | + "shape":"ResourceControlPolicyRestriction", |
| 1841 | + "documentation":"<p>The type of restriction applied to the finding by the resource owner with an Organizations resource control policy (RCP).</p>" |
1829 | 1842 | }
|
1830 | 1843 | },
|
1831 | 1844 | "documentation":"<p>Contains information about a finding.</p>"
|
|
1999 | 2012 | "sources":{
|
2000 | 2013 | "shape":"FindingSourceList",
|
2001 | 2014 | "documentation":"<p>The sources of the finding. This indicates how the access that generated the finding is granted. It is populated for Amazon S3 bucket findings.</p>"
|
| 2015 | + }, |
| 2016 | + "resourceControlPolicyRestriction":{ |
| 2017 | + "shape":"ResourceControlPolicyRestriction", |
| 2018 | + "documentation":"<p>The type of restriction applied to the finding by the resource owner with an Organizations resource control policy (RCP).</p>" |
2002 | 2019 | }
|
2003 | 2020 | },
|
2004 | 2021 | "documentation":"<p>Contains information about a finding.</p>"
|
|
3256 | 3273 | "enum":[
|
3257 | 3274 | "IDENTITY_POLICY",
|
3258 | 3275 | "RESOURCE_POLICY",
|
3259 |
| - "SERVICE_CONTROL_POLICY" |
| 3276 | + "SERVICE_CONTROL_POLICY", |
| 3277 | + "RESOURCE_CONTROL_POLICY" |
3260 | 3278 | ]
|
3261 | 3279 | },
|
3262 | 3280 | "Position":{
|
|
3453 | 3471 | "type":"string",
|
3454 | 3472 | "pattern":"arn:[^:]*:[^:]*:[^:]*:[^:]*:.*"
|
3455 | 3473 | },
|
| 3474 | + "ResourceControlPolicyRestriction":{ |
| 3475 | + "type":"string", |
| 3476 | + "enum":[ |
| 3477 | + "APPLICABLE", |
| 3478 | + "FAILED_TO_EVALUATE_RCP", |
| 3479 | + "NOT_APPLICABLE" |
| 3480 | + ] |
| 3481 | + }, |
3456 | 3482 | "ResourceNotFoundException":{
|
3457 | 3483 | "type":"structure",
|
3458 | 3484 | "required":[
|
|
0 commit comments