aws-sdk-accessanalyzer 1.13.0 → 1.18.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +109 -0
- data/LICENSE.txt +202 -0
- data/VERSION +1 -0
- data/lib/aws-sdk-accessanalyzer.rb +2 -2
- data/lib/aws-sdk-accessanalyzer/client.rb +461 -19
- data/lib/aws-sdk-accessanalyzer/client_api.rb +367 -1
- data/lib/aws-sdk-accessanalyzer/errors.rb +1 -1
- data/lib/aws-sdk-accessanalyzer/resource.rb +1 -1
- data/lib/aws-sdk-accessanalyzer/types.rb +1570 -38
- metadata +8 -5
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 29ab0a18e5c2de22ef07a1640e09a6a252a2c3f4f360f84f9203644eb07ee9af
|
4
|
+
data.tar.gz: c89e9bbefa4e981c75ddd2d5888763b15900f4edcf8fe48f4c5615cc98245ca6
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 69c525366ecdfa4c6832019200494e1eb4232cda4a5d1a9da77d0b855a2111a38b0de1111a2347f230826c3749ae55fdc27721b17e7909032949ea8994fcd026
|
7
|
+
data.tar.gz: 8337deadabd6b7472eb9efe02eff85dc9c207896374c320626043b381b88f52ade18fbc145444781e63773c777fbcdb7d3c34681dc57b214c5333bf598d34725
|
data/CHANGELOG.md
ADDED
@@ -0,0 +1,109 @@
|
|
1
|
+
Unreleased Changes
|
2
|
+
------------------
|
3
|
+
|
4
|
+
1.18.0 (2021-03-16)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - This release adds support for the ValidatePolicy API. IAM Access Analyzer is adding over 100 policy checks and actionable recommendations that help you validate your policies during authoring.
|
8
|
+
|
9
|
+
1.17.0 (2021-03-10)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - This release adds support to preview IAM Access Analyzer findings for a resource before deploying resource permission changes.
|
13
|
+
|
14
|
+
1.16.0 (2021-02-02)
|
15
|
+
------------------
|
16
|
+
|
17
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
18
|
+
|
19
|
+
1.15.0 (2021-01-27)
|
20
|
+
------------------
|
21
|
+
|
22
|
+
* Feature - This release adds Secrets Manager secrets as a supported resource in IAM Access Analyzer to help you identify secrets that can be accessed from outside your account or AWS organization.
|
23
|
+
|
24
|
+
1.14.0 (2020-10-22)
|
25
|
+
------------------
|
26
|
+
|
27
|
+
* Feature - API Documentation updates for IAM Access Analyzer.
|
28
|
+
|
29
|
+
1.13.0 (2020-10-15)
|
30
|
+
------------------
|
31
|
+
|
32
|
+
* Feature - This release adds support for the ApplyArchiveRule api in IAM Access Analyzer. The ApplyArchiveRule api allows users to apply an archive rule retroactively to existing findings in an analyzer.
|
33
|
+
|
34
|
+
1.12.0 (2020-09-30)
|
35
|
+
------------------
|
36
|
+
|
37
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
38
|
+
|
39
|
+
1.11.0 (2020-09-15)
|
40
|
+
------------------
|
41
|
+
|
42
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
43
|
+
|
44
|
+
1.10.0 (2020-08-25)
|
45
|
+
------------------
|
46
|
+
|
47
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
48
|
+
|
49
|
+
1.9.0 (2020-06-23)
|
50
|
+
------------------
|
51
|
+
|
52
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
53
|
+
|
54
|
+
1.8.1 (2020-06-11)
|
55
|
+
------------------
|
56
|
+
|
57
|
+
* Issue - Republish previous version with correct dependency on `aws-sdk-core`.
|
58
|
+
|
59
|
+
1.8.0 (2020-06-10)
|
60
|
+
------------------
|
61
|
+
|
62
|
+
* Issue - This version has been yanked. (#2327).
|
63
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
64
|
+
|
65
|
+
1.7.0 (2020-05-28)
|
66
|
+
------------------
|
67
|
+
|
68
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
69
|
+
|
70
|
+
1.6.0 (2020-05-07)
|
71
|
+
------------------
|
72
|
+
|
73
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
74
|
+
|
75
|
+
1.5.0 (2020-04-27)
|
76
|
+
------------------
|
77
|
+
|
78
|
+
* Feature - This release adds support for inclusion of S3 Access Point policies in IAM Access Analyzer evaluation of S3 bucket access. IAM Access Analyzer now reports findings for buckets shared through access points and identifies the access point that permits access.
|
79
|
+
|
80
|
+
1.4.0 (2020-03-30)
|
81
|
+
------------------
|
82
|
+
|
83
|
+
* Feature - This release adds support for the creation and management of IAM Access Analyzer analyzers with type organization. An analyzer with type organization continuously monitors all supported resources within the AWS organization and reports findings when they allow access from outside the organization.
|
84
|
+
|
85
|
+
1.3.0 (2020-03-09)
|
86
|
+
------------------
|
87
|
+
|
88
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
89
|
+
|
90
|
+
1.2.1 (2020-03-02)
|
91
|
+
------------------
|
92
|
+
|
93
|
+
* Issue - Republish the previously yanked version.
|
94
|
+
|
95
|
+
1.2.0 (2020-02-28)
|
96
|
+
------------------
|
97
|
+
|
98
|
+
* Issue - This version has been yanked. (#2239)
|
99
|
+
* Feature - This release includes improvements and fixes bugs for the IAM Access Analyzer feature.
|
100
|
+
|
101
|
+
1.1.0 (2019-12-12)
|
102
|
+
------------------
|
103
|
+
|
104
|
+
* Feature - This release includes improvements and fixes bugs for the IAM Access Analyzer feature.
|
105
|
+
|
106
|
+
1.0.0 (2019-12-02)
|
107
|
+
------------------
|
108
|
+
|
109
|
+
* Feature - Initial release of `aws-sdk-accessanalyzer`.
|
data/LICENSE.txt
ADDED
@@ -0,0 +1,202 @@
|
|
1
|
+
|
2
|
+
Apache License
|
3
|
+
Version 2.0, January 2004
|
4
|
+
http://www.apache.org/licenses/
|
5
|
+
|
6
|
+
TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
|
7
|
+
|
8
|
+
1. Definitions.
|
9
|
+
|
10
|
+
"License" shall mean the terms and conditions for use, reproduction,
|
11
|
+
and distribution as defined by Sections 1 through 9 of this document.
|
12
|
+
|
13
|
+
"Licensor" shall mean the copyright owner or entity authorized by
|
14
|
+
the copyright owner that is granting the License.
|
15
|
+
|
16
|
+
"Legal Entity" shall mean the union of the acting entity and all
|
17
|
+
other entities that control, are controlled by, or are under common
|
18
|
+
control with that entity. For the purposes of this definition,
|
19
|
+
"control" means (i) the power, direct or indirect, to cause the
|
20
|
+
direction or management of such entity, whether by contract or
|
21
|
+
otherwise, or (ii) ownership of fifty percent (50%) or more of the
|
22
|
+
outstanding shares, or (iii) beneficial ownership of such entity.
|
23
|
+
|
24
|
+
"You" (or "Your") shall mean an individual or Legal Entity
|
25
|
+
exercising permissions granted by this License.
|
26
|
+
|
27
|
+
"Source" form shall mean the preferred form for making modifications,
|
28
|
+
including but not limited to software source code, documentation
|
29
|
+
source, and configuration files.
|
30
|
+
|
31
|
+
"Object" form shall mean any form resulting from mechanical
|
32
|
+
transformation or translation of a Source form, including but
|
33
|
+
not limited to compiled object code, generated documentation,
|
34
|
+
and conversions to other media types.
|
35
|
+
|
36
|
+
"Work" shall mean the work of authorship, whether in Source or
|
37
|
+
Object form, made available under the License, as indicated by a
|
38
|
+
copyright notice that is included in or attached to the work
|
39
|
+
(an example is provided in the Appendix below).
|
40
|
+
|
41
|
+
"Derivative Works" shall mean any work, whether in Source or Object
|
42
|
+
form, that is based on (or derived from) the Work and for which the
|
43
|
+
editorial revisions, annotations, elaborations, or other modifications
|
44
|
+
represent, as a whole, an original work of authorship. For the purposes
|
45
|
+
of this License, Derivative Works shall not include works that remain
|
46
|
+
separable from, or merely link (or bind by name) to the interfaces of,
|
47
|
+
the Work and Derivative Works thereof.
|
48
|
+
|
49
|
+
"Contribution" shall mean any work of authorship, including
|
50
|
+
the original version of the Work and any modifications or additions
|
51
|
+
to that Work or Derivative Works thereof, that is intentionally
|
52
|
+
submitted to Licensor for inclusion in the Work by the copyright owner
|
53
|
+
or by an individual or Legal Entity authorized to submit on behalf of
|
54
|
+
the copyright owner. For the purposes of this definition, "submitted"
|
55
|
+
means any form of electronic, verbal, or written communication sent
|
56
|
+
to the Licensor or its representatives, including but not limited to
|
57
|
+
communication on electronic mailing lists, source code control systems,
|
58
|
+
and issue tracking systems that are managed by, or on behalf of, the
|
59
|
+
Licensor for the purpose of discussing and improving the Work, but
|
60
|
+
excluding communication that is conspicuously marked or otherwise
|
61
|
+
designated in writing by the copyright owner as "Not a Contribution."
|
62
|
+
|
63
|
+
"Contributor" shall mean Licensor and any individual or Legal Entity
|
64
|
+
on behalf of whom a Contribution has been received by Licensor and
|
65
|
+
subsequently incorporated within the Work.
|
66
|
+
|
67
|
+
2. Grant of Copyright License. Subject to the terms and conditions of
|
68
|
+
this License, each Contributor hereby grants to You a perpetual,
|
69
|
+
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
70
|
+
copyright license to reproduce, prepare Derivative Works of,
|
71
|
+
publicly display, publicly perform, sublicense, and distribute the
|
72
|
+
Work and such Derivative Works in Source or Object form.
|
73
|
+
|
74
|
+
3. Grant of Patent License. Subject to the terms and conditions of
|
75
|
+
this License, each Contributor hereby grants to You a perpetual,
|
76
|
+
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
77
|
+
(except as stated in this section) patent license to make, have made,
|
78
|
+
use, offer to sell, sell, import, and otherwise transfer the Work,
|
79
|
+
where such license applies only to those patent claims licensable
|
80
|
+
by such Contributor that are necessarily infringed by their
|
81
|
+
Contribution(s) alone or by combination of their Contribution(s)
|
82
|
+
with the Work to which such Contribution(s) was submitted. If You
|
83
|
+
institute patent litigation against any entity (including a
|
84
|
+
cross-claim or counterclaim in a lawsuit) alleging that the Work
|
85
|
+
or a Contribution incorporated within the Work constitutes direct
|
86
|
+
or contributory patent infringement, then any patent licenses
|
87
|
+
granted to You under this License for that Work shall terminate
|
88
|
+
as of the date such litigation is filed.
|
89
|
+
|
90
|
+
4. Redistribution. You may reproduce and distribute copies of the
|
91
|
+
Work or Derivative Works thereof in any medium, with or without
|
92
|
+
modifications, and in Source or Object form, provided that You
|
93
|
+
meet the following conditions:
|
94
|
+
|
95
|
+
(a) You must give any other recipients of the Work or
|
96
|
+
Derivative Works a copy of this License; and
|
97
|
+
|
98
|
+
(b) You must cause any modified files to carry prominent notices
|
99
|
+
stating that You changed the files; and
|
100
|
+
|
101
|
+
(c) You must retain, in the Source form of any Derivative Works
|
102
|
+
that You distribute, all copyright, patent, trademark, and
|
103
|
+
attribution notices from the Source form of the Work,
|
104
|
+
excluding those notices that do not pertain to any part of
|
105
|
+
the Derivative Works; and
|
106
|
+
|
107
|
+
(d) If the Work includes a "NOTICE" text file as part of its
|
108
|
+
distribution, then any Derivative Works that You distribute must
|
109
|
+
include a readable copy of the attribution notices contained
|
110
|
+
within such NOTICE file, excluding those notices that do not
|
111
|
+
pertain to any part of the Derivative Works, in at least one
|
112
|
+
of the following places: within a NOTICE text file distributed
|
113
|
+
as part of the Derivative Works; within the Source form or
|
114
|
+
documentation, if provided along with the Derivative Works; or,
|
115
|
+
within a display generated by the Derivative Works, if and
|
116
|
+
wherever such third-party notices normally appear. The contents
|
117
|
+
of the NOTICE file are for informational purposes only and
|
118
|
+
do not modify the License. You may add Your own attribution
|
119
|
+
notices within Derivative Works that You distribute, alongside
|
120
|
+
or as an addendum to the NOTICE text from the Work, provided
|
121
|
+
that such additional attribution notices cannot be construed
|
122
|
+
as modifying the License.
|
123
|
+
|
124
|
+
You may add Your own copyright statement to Your modifications and
|
125
|
+
may provide additional or different license terms and conditions
|
126
|
+
for use, reproduction, or distribution of Your modifications, or
|
127
|
+
for any such Derivative Works as a whole, provided Your use,
|
128
|
+
reproduction, and distribution of the Work otherwise complies with
|
129
|
+
the conditions stated in this License.
|
130
|
+
|
131
|
+
5. Submission of Contributions. Unless You explicitly state otherwise,
|
132
|
+
any Contribution intentionally submitted for inclusion in the Work
|
133
|
+
by You to the Licensor shall be under the terms and conditions of
|
134
|
+
this License, without any additional terms or conditions.
|
135
|
+
Notwithstanding the above, nothing herein shall supersede or modify
|
136
|
+
the terms of any separate license agreement you may have executed
|
137
|
+
with Licensor regarding such Contributions.
|
138
|
+
|
139
|
+
6. Trademarks. This License does not grant permission to use the trade
|
140
|
+
names, trademarks, service marks, or product names of the Licensor,
|
141
|
+
except as required for reasonable and customary use in describing the
|
142
|
+
origin of the Work and reproducing the content of the NOTICE file.
|
143
|
+
|
144
|
+
7. Disclaimer of Warranty. Unless required by applicable law or
|
145
|
+
agreed to in writing, Licensor provides the Work (and each
|
146
|
+
Contributor provides its Contributions) on an "AS IS" BASIS,
|
147
|
+
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
148
|
+
implied, including, without limitation, any warranties or conditions
|
149
|
+
of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
|
150
|
+
PARTICULAR PURPOSE. You are solely responsible for determining the
|
151
|
+
appropriateness of using or redistributing the Work and assume any
|
152
|
+
risks associated with Your exercise of permissions under this License.
|
153
|
+
|
154
|
+
8. Limitation of Liability. In no event and under no legal theory,
|
155
|
+
whether in tort (including negligence), contract, or otherwise,
|
156
|
+
unless required by applicable law (such as deliberate and grossly
|
157
|
+
negligent acts) or agreed to in writing, shall any Contributor be
|
158
|
+
liable to You for damages, including any direct, indirect, special,
|
159
|
+
incidental, or consequential damages of any character arising as a
|
160
|
+
result of this License or out of the use or inability to use the
|
161
|
+
Work (including but not limited to damages for loss of goodwill,
|
162
|
+
work stoppage, computer failure or malfunction, or any and all
|
163
|
+
other commercial damages or losses), even if such Contributor
|
164
|
+
has been advised of the possibility of such damages.
|
165
|
+
|
166
|
+
9. Accepting Warranty or Additional Liability. While redistributing
|
167
|
+
the Work or Derivative Works thereof, You may choose to offer,
|
168
|
+
and charge a fee for, acceptance of support, warranty, indemnity,
|
169
|
+
or other liability obligations and/or rights consistent with this
|
170
|
+
License. However, in accepting such obligations, You may act only
|
171
|
+
on Your own behalf and on Your sole responsibility, not on behalf
|
172
|
+
of any other Contributor, and only if You agree to indemnify,
|
173
|
+
defend, and hold each Contributor harmless for any liability
|
174
|
+
incurred by, or claims asserted against, such Contributor by reason
|
175
|
+
of your accepting any such warranty or additional liability.
|
176
|
+
|
177
|
+
END OF TERMS AND CONDITIONS
|
178
|
+
|
179
|
+
APPENDIX: How to apply the Apache License to your work.
|
180
|
+
|
181
|
+
To apply the Apache License to your work, attach the following
|
182
|
+
boilerplate notice, with the fields enclosed by brackets "[]"
|
183
|
+
replaced with your own identifying information. (Don't include
|
184
|
+
the brackets!) The text should be enclosed in the appropriate
|
185
|
+
comment syntax for the file format. We also recommend that a
|
186
|
+
file or class name and description of purpose be included on the
|
187
|
+
same "printed page" as the copyright notice for easier
|
188
|
+
identification within third-party archives.
|
189
|
+
|
190
|
+
Copyright [yyyy] [name of copyright owner]
|
191
|
+
|
192
|
+
Licensed under the Apache License, Version 2.0 (the "License");
|
193
|
+
you may not use this file except in compliance with the License.
|
194
|
+
You may obtain a copy of the License at
|
195
|
+
|
196
|
+
http://www.apache.org/licenses/LICENSE-2.0
|
197
|
+
|
198
|
+
Unless required by applicable law or agreed to in writing, software
|
199
|
+
distributed under the License is distributed on an "AS IS" BASIS,
|
200
|
+
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
201
|
+
See the License for the specific language governing permissions and
|
202
|
+
limitations under the License.
|
data/VERSION
ADDED
@@ -0,0 +1 @@
|
|
1
|
+
1.18.0
|
@@ -3,7 +3,7 @@
|
|
3
3
|
# WARNING ABOUT GENERATED CODE
|
4
4
|
#
|
5
5
|
# This file is generated. See the contributing guide for more information:
|
6
|
-
# https://github.com/aws/aws-sdk-ruby/blob/
|
6
|
+
# https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
|
7
7
|
#
|
8
8
|
# WARNING ABOUT GENERATED CODE
|
9
9
|
|
@@ -48,6 +48,6 @@ require_relative 'aws-sdk-accessanalyzer/customizations'
|
|
48
48
|
# @!group service
|
49
49
|
module Aws::AccessAnalyzer
|
50
50
|
|
51
|
-
GEM_VERSION = '1.
|
51
|
+
GEM_VERSION = '1.18.0'
|
52
52
|
|
53
53
|
end
|
@@ -3,7 +3,7 @@
|
|
3
3
|
# WARNING ABOUT GENERATED CODE
|
4
4
|
#
|
5
5
|
# This file is generated. See the contributing guide for more information:
|
6
|
-
# https://github.com/aws/aws-sdk-ruby/blob/
|
6
|
+
# https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
|
7
7
|
#
|
8
8
|
# WARNING ABOUT GENERATED CODE
|
9
9
|
|
@@ -361,6 +361,122 @@ module Aws::AccessAnalyzer
|
|
361
361
|
req.send_request(options)
|
362
362
|
end
|
363
363
|
|
364
|
+
# Creates an access preview that allows you to preview Access Analyzer
|
365
|
+
# findings for your resource before deploying resource permissions.
|
366
|
+
#
|
367
|
+
# @option params [required, String] :analyzer_arn
|
368
|
+
# The [ARN of the account analyzer][1] used to generate the access
|
369
|
+
# preview. You can only create an access preview for analyzers with an
|
370
|
+
# `Account` type and `Active` status.
|
371
|
+
#
|
372
|
+
#
|
373
|
+
#
|
374
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources
|
375
|
+
#
|
376
|
+
# @option params [String] :client_token
|
377
|
+
# A client token.
|
378
|
+
#
|
379
|
+
# **A suitable default value is auto-generated.** You should normally
|
380
|
+
# not need to pass this option.**
|
381
|
+
#
|
382
|
+
# @option params [required, Hash<String,Types::Configuration>] :configurations
|
383
|
+
# Access control configuration for your resource that is used to
|
384
|
+
# generate the access preview. The access preview includes findings for
|
385
|
+
# external access allowed to the resource with the proposed access
|
386
|
+
# control configuration. The configuration must contain exactly one
|
387
|
+
# element.
|
388
|
+
#
|
389
|
+
# @return [Types::CreateAccessPreviewResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
390
|
+
#
|
391
|
+
# * {Types::CreateAccessPreviewResponse#id #id} => String
|
392
|
+
#
|
393
|
+
# @example Request syntax with placeholder values
|
394
|
+
#
|
395
|
+
# resp = client.create_access_preview({
|
396
|
+
# analyzer_arn: "AnalyzerArn", # required
|
397
|
+
# client_token: "String",
|
398
|
+
# configurations: { # required
|
399
|
+
# "ConfigurationsMapKey" => {
|
400
|
+
# iam_role: {
|
401
|
+
# trust_policy: "IamTrustPolicy",
|
402
|
+
# },
|
403
|
+
# kms_key: {
|
404
|
+
# grants: [
|
405
|
+
# {
|
406
|
+
# constraints: {
|
407
|
+
# encryption_context_equals: {
|
408
|
+
# "KmsConstraintsKey" => "KmsConstraintsValue",
|
409
|
+
# },
|
410
|
+
# encryption_context_subset: {
|
411
|
+
# "KmsConstraintsKey" => "KmsConstraintsValue",
|
412
|
+
# },
|
413
|
+
# },
|
414
|
+
# grantee_principal: "GranteePrincipal", # required
|
415
|
+
# issuing_account: "IssuingAccount", # required
|
416
|
+
# operations: ["CreateGrant"], # required, accepts CreateGrant, Decrypt, DescribeKey, Encrypt, GenerateDataKey, GenerateDataKeyPair, GenerateDataKeyPairWithoutPlaintext, GenerateDataKeyWithoutPlaintext, GetPublicKey, ReEncryptFrom, ReEncryptTo, RetireGrant, Sign, Verify
|
417
|
+
# retiring_principal: "RetiringPrincipal",
|
418
|
+
# },
|
419
|
+
# ],
|
420
|
+
# key_policies: {
|
421
|
+
# "PolicyName" => "KmsKeyPolicy",
|
422
|
+
# },
|
423
|
+
# },
|
424
|
+
# s3_bucket: {
|
425
|
+
# access_points: {
|
426
|
+
# "AccessPointArn" => {
|
427
|
+
# access_point_policy: "AccessPointPolicy",
|
428
|
+
# network_origin: {
|
429
|
+
# internet_configuration: {
|
430
|
+
# },
|
431
|
+
# vpc_configuration: {
|
432
|
+
# vpc_id: "VpcId", # required
|
433
|
+
# },
|
434
|
+
# },
|
435
|
+
# public_access_block: {
|
436
|
+
# ignore_public_acls: false, # required
|
437
|
+
# restrict_public_buckets: false, # required
|
438
|
+
# },
|
439
|
+
# },
|
440
|
+
# },
|
441
|
+
# bucket_acl_grants: [
|
442
|
+
# {
|
443
|
+
# grantee: { # required
|
444
|
+
# id: "AclCanonicalId",
|
445
|
+
# uri: "AclUri",
|
446
|
+
# },
|
447
|
+
# permission: "READ", # required, accepts READ, WRITE, READ_ACP, WRITE_ACP, FULL_CONTROL
|
448
|
+
# },
|
449
|
+
# ],
|
450
|
+
# bucket_policy: "S3BucketPolicy",
|
451
|
+
# bucket_public_access_block: {
|
452
|
+
# ignore_public_acls: false, # required
|
453
|
+
# restrict_public_buckets: false, # required
|
454
|
+
# },
|
455
|
+
# },
|
456
|
+
# secrets_manager_secret: {
|
457
|
+
# kms_key_id: "SecretsManagerSecretKmsId",
|
458
|
+
# secret_policy: "SecretsManagerSecretPolicy",
|
459
|
+
# },
|
460
|
+
# sqs_queue: {
|
461
|
+
# queue_policy: "SqsQueuePolicy",
|
462
|
+
# },
|
463
|
+
# },
|
464
|
+
# },
|
465
|
+
# })
|
466
|
+
#
|
467
|
+
# @example Response structure
|
468
|
+
#
|
469
|
+
# resp.id #=> String
|
470
|
+
#
|
471
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/CreateAccessPreview AWS API Documentation
|
472
|
+
#
|
473
|
+
# @overload create_access_preview(params = {})
|
474
|
+
# @param [Hash] params ({})
|
475
|
+
def create_access_preview(params = {}, options = {})
|
476
|
+
req = build_request(:create_access_preview, params)
|
477
|
+
req.send_request(options)
|
478
|
+
end
|
479
|
+
|
364
480
|
# Creates an analyzer for your account.
|
365
481
|
#
|
366
482
|
# @option params [required, String] :analyzer_name
|
@@ -381,8 +497,10 @@ module Aws::AccessAnalyzer
|
|
381
497
|
# The tags to apply to the analyzer.
|
382
498
|
#
|
383
499
|
# @option params [required, String] :type
|
384
|
-
# The type of analyzer to create. Only ACCOUNT
|
385
|
-
# You can create only one analyzer per account
|
500
|
+
# The type of analyzer to create. Only ACCOUNT and ORGANIZATION
|
501
|
+
# analyzers are supported. You can create only one analyzer per account
|
502
|
+
# per Region. You can create up to 5 analyzers per organization per
|
503
|
+
# Region.
|
386
504
|
#
|
387
505
|
# @return [Types::CreateAnalyzerResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
388
506
|
#
|
@@ -429,6 +547,13 @@ module Aws::AccessAnalyzer
|
|
429
547
|
# automatically archive new findings that meet the criteria you define
|
430
548
|
# when you create the rule.
|
431
549
|
#
|
550
|
+
# To learn about filter keys that you can use to create an archive rule,
|
551
|
+
# see [Access Analyzer filter keys][1] in the **IAM User Guide**.
|
552
|
+
#
|
553
|
+
#
|
554
|
+
#
|
555
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html
|
556
|
+
#
|
432
557
|
# @option params [required, String] :analyzer_name
|
433
558
|
# The name of the created analyzer.
|
434
559
|
#
|
@@ -472,9 +597,9 @@ module Aws::AccessAnalyzer
|
|
472
597
|
end
|
473
598
|
|
474
599
|
# Deletes the specified analyzer. When you delete an analyzer, Access
|
475
|
-
# Analyzer is disabled for the account in the current or
|
476
|
-
# Region. All findings that were generated by the analyzer are
|
477
|
-
# You cannot undo this action.
|
600
|
+
# Analyzer is disabled for the account or organization in the current or
|
601
|
+
# specific Region. All findings that were generated by the analyzer are
|
602
|
+
# deleted. You cannot undo this action.
|
478
603
|
#
|
479
604
|
# @option params [required, String] :analyzer_name
|
480
605
|
# The name of the analyzer to delete.
|
@@ -537,10 +662,84 @@ module Aws::AccessAnalyzer
|
|
537
662
|
req.send_request(options)
|
538
663
|
end
|
539
664
|
|
665
|
+
# Retrieves information about an access preview for the specified
|
666
|
+
# analyzer.
|
667
|
+
#
|
668
|
+
# @option params [required, String] :access_preview_id
|
669
|
+
# The unique ID for the access preview.
|
670
|
+
#
|
671
|
+
# @option params [required, String] :analyzer_arn
|
672
|
+
# The [ARN of the analyzer][1] used to generate the access preview.
|
673
|
+
#
|
674
|
+
#
|
675
|
+
#
|
676
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources
|
677
|
+
#
|
678
|
+
# @return [Types::GetAccessPreviewResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
679
|
+
#
|
680
|
+
# * {Types::GetAccessPreviewResponse#access_preview #access_preview} => Types::AccessPreview
|
681
|
+
#
|
682
|
+
# @example Request syntax with placeholder values
|
683
|
+
#
|
684
|
+
# resp = client.get_access_preview({
|
685
|
+
# access_preview_id: "AccessPreviewId", # required
|
686
|
+
# analyzer_arn: "AnalyzerArn", # required
|
687
|
+
# })
|
688
|
+
#
|
689
|
+
# @example Response structure
|
690
|
+
#
|
691
|
+
# resp.access_preview.analyzer_arn #=> String
|
692
|
+
# resp.access_preview.configurations #=> Hash
|
693
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].iam_role.trust_policy #=> String
|
694
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].kms_key.grants #=> Array
|
695
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].kms_key.grants[0].constraints.encryption_context_equals #=> Hash
|
696
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].kms_key.grants[0].constraints.encryption_context_equals["KmsConstraintsKey"] #=> String
|
697
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].kms_key.grants[0].constraints.encryption_context_subset #=> Hash
|
698
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].kms_key.grants[0].constraints.encryption_context_subset["KmsConstraintsKey"] #=> String
|
699
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].kms_key.grants[0].grantee_principal #=> String
|
700
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].kms_key.grants[0].issuing_account #=> String
|
701
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].kms_key.grants[0].operations #=> Array
|
702
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].kms_key.grants[0].operations[0] #=> String, one of "CreateGrant", "Decrypt", "DescribeKey", "Encrypt", "GenerateDataKey", "GenerateDataKeyPair", "GenerateDataKeyPairWithoutPlaintext", "GenerateDataKeyWithoutPlaintext", "GetPublicKey", "ReEncryptFrom", "ReEncryptTo", "RetireGrant", "Sign", "Verify"
|
703
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].kms_key.grants[0].retiring_principal #=> String
|
704
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].kms_key.key_policies #=> Hash
|
705
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].kms_key.key_policies["PolicyName"] #=> String
|
706
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].s3_bucket.access_points #=> Hash
|
707
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].s3_bucket.access_points["AccessPointArn"].access_point_policy #=> String
|
708
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].s3_bucket.access_points["AccessPointArn"].network_origin.vpc_configuration.vpc_id #=> String
|
709
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].s3_bucket.access_points["AccessPointArn"].public_access_block.ignore_public_acls #=> Boolean
|
710
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].s3_bucket.access_points["AccessPointArn"].public_access_block.restrict_public_buckets #=> Boolean
|
711
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].s3_bucket.bucket_acl_grants #=> Array
|
712
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].s3_bucket.bucket_acl_grants[0].grantee.id #=> String
|
713
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].s3_bucket.bucket_acl_grants[0].grantee.uri #=> String
|
714
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].s3_bucket.bucket_acl_grants[0].permission #=> String, one of "READ", "WRITE", "READ_ACP", "WRITE_ACP", "FULL_CONTROL"
|
715
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].s3_bucket.bucket_policy #=> String
|
716
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].s3_bucket.bucket_public_access_block.ignore_public_acls #=> Boolean
|
717
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].s3_bucket.bucket_public_access_block.restrict_public_buckets #=> Boolean
|
718
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].secrets_manager_secret.kms_key_id #=> String
|
719
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].secrets_manager_secret.secret_policy #=> String
|
720
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].sqs_queue.queue_policy #=> String
|
721
|
+
# resp.access_preview.created_at #=> Time
|
722
|
+
# resp.access_preview.id #=> String
|
723
|
+
# resp.access_preview.status #=> String, one of "COMPLETED", "CREATING", "FAILED"
|
724
|
+
# resp.access_preview.status_reason.code #=> String, one of "INTERNAL_ERROR", "INVALID_CONFIGURATION"
|
725
|
+
#
|
726
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/GetAccessPreview AWS API Documentation
|
727
|
+
#
|
728
|
+
# @overload get_access_preview(params = {})
|
729
|
+
# @param [Hash] params ({})
|
730
|
+
def get_access_preview(params = {}, options = {})
|
731
|
+
req = build_request(:get_access_preview, params)
|
732
|
+
req.send_request(options)
|
733
|
+
end
|
734
|
+
|
540
735
|
# Retrieves information about a resource that was analyzed.
|
541
736
|
#
|
542
737
|
# @option params [required, String] :analyzer_arn
|
543
|
-
# The ARN of the analyzer to retrieve information from.
|
738
|
+
# The [ARN of the analyzer][1] to retrieve information from.
|
739
|
+
#
|
740
|
+
#
|
741
|
+
#
|
742
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources
|
544
743
|
#
|
545
744
|
# @option params [required, String] :resource_arn
|
546
745
|
# The ARN of the resource to retrieve information about.
|
@@ -566,7 +765,7 @@ module Aws::AccessAnalyzer
|
|
566
765
|
# resp.resource.is_public #=> Boolean
|
567
766
|
# resp.resource.resource_arn #=> String
|
568
767
|
# resp.resource.resource_owner_account #=> String
|
569
|
-
# resp.resource.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
|
768
|
+
# resp.resource.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret"
|
570
769
|
# resp.resource.shared_via #=> Array
|
571
770
|
# resp.resource.shared_via[0] #=> String
|
572
771
|
# resp.resource.status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
|
@@ -620,6 +819,13 @@ module Aws::AccessAnalyzer
|
|
620
819
|
|
621
820
|
# Retrieves information about an archive rule.
|
622
821
|
#
|
822
|
+
# To learn about filter keys that you can use to create an archive rule,
|
823
|
+
# see [Access Analyzer filter keys][1] in the **IAM User Guide**.
|
824
|
+
#
|
825
|
+
#
|
826
|
+
#
|
827
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html
|
828
|
+
#
|
623
829
|
# @option params [required, String] :analyzer_name
|
624
830
|
# The name of the analyzer to retrieve rules from.
|
625
831
|
#
|
@@ -663,7 +869,11 @@ module Aws::AccessAnalyzer
|
|
663
869
|
# Retrieves information about the specified finding.
|
664
870
|
#
|
665
871
|
# @option params [required, String] :analyzer_arn
|
666
|
-
# The ARN of the analyzer that generated the finding.
|
872
|
+
# The [ARN of the analyzer][1] that generated the finding.
|
873
|
+
#
|
874
|
+
#
|
875
|
+
#
|
876
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources
|
667
877
|
#
|
668
878
|
# @option params [required, String] :id
|
669
879
|
# The ID of the finding to retrieve.
|
@@ -694,7 +904,7 @@ module Aws::AccessAnalyzer
|
|
694
904
|
# resp.finding.principal["String"] #=> String
|
695
905
|
# resp.finding.resource #=> String
|
696
906
|
# resp.finding.resource_owner_account #=> String
|
697
|
-
# resp.finding.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
|
907
|
+
# resp.finding.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret"
|
698
908
|
# resp.finding.sources #=> Array
|
699
909
|
# resp.finding.sources[0].detail.access_point_arn #=> String
|
700
910
|
# resp.finding.sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT"
|
@@ -710,11 +920,145 @@ module Aws::AccessAnalyzer
|
|
710
920
|
req.send_request(options)
|
711
921
|
end
|
712
922
|
|
923
|
+
# Retrieves a list of access preview findings generated by the specified
|
924
|
+
# access preview.
|
925
|
+
#
|
926
|
+
# @option params [required, String] :access_preview_id
|
927
|
+
# The unique ID for the access preview.
|
928
|
+
#
|
929
|
+
# @option params [required, String] :analyzer_arn
|
930
|
+
# The [ARN of the analyzer][1] used to generate the access.
|
931
|
+
#
|
932
|
+
#
|
933
|
+
#
|
934
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources
|
935
|
+
#
|
936
|
+
# @option params [Hash<String,Types::Criterion>] :filter
|
937
|
+
# Criteria to filter the returned findings.
|
938
|
+
#
|
939
|
+
# @option params [Integer] :max_results
|
940
|
+
# The maximum number of results to return in the response.
|
941
|
+
#
|
942
|
+
# @option params [String] :next_token
|
943
|
+
# A token used for pagination of results returned.
|
944
|
+
#
|
945
|
+
# @return [Types::ListAccessPreviewFindingsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
946
|
+
#
|
947
|
+
# * {Types::ListAccessPreviewFindingsResponse#findings #findings} => Array<Types::AccessPreviewFinding>
|
948
|
+
# * {Types::ListAccessPreviewFindingsResponse#next_token #next_token} => String
|
949
|
+
#
|
950
|
+
# The returned {Seahorse::Client::Response response} is a pageable response and is Enumerable. For details on usage see {Aws::PageableResponse PageableResponse}.
|
951
|
+
#
|
952
|
+
# @example Request syntax with placeholder values
|
953
|
+
#
|
954
|
+
# resp = client.list_access_preview_findings({
|
955
|
+
# access_preview_id: "AccessPreviewId", # required
|
956
|
+
# analyzer_arn: "AnalyzerArn", # required
|
957
|
+
# filter: {
|
958
|
+
# "String" => {
|
959
|
+
# contains: ["String"],
|
960
|
+
# eq: ["String"],
|
961
|
+
# exists: false,
|
962
|
+
# neq: ["String"],
|
963
|
+
# },
|
964
|
+
# },
|
965
|
+
# max_results: 1,
|
966
|
+
# next_token: "Token",
|
967
|
+
# })
|
968
|
+
#
|
969
|
+
# @example Response structure
|
970
|
+
#
|
971
|
+
# resp.findings #=> Array
|
972
|
+
# resp.findings[0].action #=> Array
|
973
|
+
# resp.findings[0].action[0] #=> String
|
974
|
+
# resp.findings[0].change_type #=> String, one of "CHANGED", "NEW", "UNCHANGED"
|
975
|
+
# resp.findings[0].condition #=> Hash
|
976
|
+
# resp.findings[0].condition["String"] #=> String
|
977
|
+
# resp.findings[0].created_at #=> Time
|
978
|
+
# resp.findings[0].error #=> String
|
979
|
+
# resp.findings[0].existing_finding_id #=> String
|
980
|
+
# resp.findings[0].existing_finding_status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
|
981
|
+
# resp.findings[0].id #=> String
|
982
|
+
# resp.findings[0].is_public #=> Boolean
|
983
|
+
# resp.findings[0].principal #=> Hash
|
984
|
+
# resp.findings[0].principal["String"] #=> String
|
985
|
+
# resp.findings[0].resource #=> String
|
986
|
+
# resp.findings[0].resource_owner_account #=> String
|
987
|
+
# resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret"
|
988
|
+
# resp.findings[0].sources #=> Array
|
989
|
+
# resp.findings[0].sources[0].detail.access_point_arn #=> String
|
990
|
+
# resp.findings[0].sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT"
|
991
|
+
# resp.findings[0].status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
|
992
|
+
# resp.next_token #=> String
|
993
|
+
#
|
994
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ListAccessPreviewFindings AWS API Documentation
|
995
|
+
#
|
996
|
+
# @overload list_access_preview_findings(params = {})
|
997
|
+
# @param [Hash] params ({})
|
998
|
+
def list_access_preview_findings(params = {}, options = {})
|
999
|
+
req = build_request(:list_access_preview_findings, params)
|
1000
|
+
req.send_request(options)
|
1001
|
+
end
|
1002
|
+
|
1003
|
+
# Retrieves a list of access previews for the specified analyzer.
|
1004
|
+
#
|
1005
|
+
# @option params [required, String] :analyzer_arn
|
1006
|
+
# The [ARN of the analyzer][1] used to generate the access preview.
|
1007
|
+
#
|
1008
|
+
#
|
1009
|
+
#
|
1010
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources
|
1011
|
+
#
|
1012
|
+
# @option params [Integer] :max_results
|
1013
|
+
# The maximum number of results to return in the response.
|
1014
|
+
#
|
1015
|
+
# @option params [String] :next_token
|
1016
|
+
# A token used for pagination of results returned.
|
1017
|
+
#
|
1018
|
+
# @return [Types::ListAccessPreviewsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
1019
|
+
#
|
1020
|
+
# * {Types::ListAccessPreviewsResponse#access_previews #access_previews} => Array<Types::AccessPreviewSummary>
|
1021
|
+
# * {Types::ListAccessPreviewsResponse#next_token #next_token} => String
|
1022
|
+
#
|
1023
|
+
# The returned {Seahorse::Client::Response response} is a pageable response and is Enumerable. For details on usage see {Aws::PageableResponse PageableResponse}.
|
1024
|
+
#
|
1025
|
+
# @example Request syntax with placeholder values
|
1026
|
+
#
|
1027
|
+
# resp = client.list_access_previews({
|
1028
|
+
# analyzer_arn: "AnalyzerArn", # required
|
1029
|
+
# max_results: 1,
|
1030
|
+
# next_token: "Token",
|
1031
|
+
# })
|
1032
|
+
#
|
1033
|
+
# @example Response structure
|
1034
|
+
#
|
1035
|
+
# resp.access_previews #=> Array
|
1036
|
+
# resp.access_previews[0].analyzer_arn #=> String
|
1037
|
+
# resp.access_previews[0].created_at #=> Time
|
1038
|
+
# resp.access_previews[0].id #=> String
|
1039
|
+
# resp.access_previews[0].status #=> String, one of "COMPLETED", "CREATING", "FAILED"
|
1040
|
+
# resp.access_previews[0].status_reason.code #=> String, one of "INTERNAL_ERROR", "INVALID_CONFIGURATION"
|
1041
|
+
# resp.next_token #=> String
|
1042
|
+
#
|
1043
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ListAccessPreviews AWS API Documentation
|
1044
|
+
#
|
1045
|
+
# @overload list_access_previews(params = {})
|
1046
|
+
# @param [Hash] params ({})
|
1047
|
+
def list_access_previews(params = {}, options = {})
|
1048
|
+
req = build_request(:list_access_previews, params)
|
1049
|
+
req.send_request(options)
|
1050
|
+
end
|
1051
|
+
|
713
1052
|
# Retrieves a list of resources of the specified type that have been
|
714
1053
|
# analyzed by the specified analyzer..
|
715
1054
|
#
|
716
1055
|
# @option params [required, String] :analyzer_arn
|
717
|
-
# The ARN of the analyzer to retrieve a list of analyzed resources
|
1056
|
+
# The [ARN of the analyzer][1] to retrieve a list of analyzed resources
|
1057
|
+
# from.
|
1058
|
+
#
|
1059
|
+
#
|
1060
|
+
#
|
1061
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources
|
718
1062
|
#
|
719
1063
|
# @option params [Integer] :max_results
|
720
1064
|
# The maximum number of results to return in the response.
|
@@ -738,7 +1082,7 @@ module Aws::AccessAnalyzer
|
|
738
1082
|
# analyzer_arn: "AnalyzerArn", # required
|
739
1083
|
# max_results: 1,
|
740
1084
|
# next_token: "Token",
|
741
|
-
# resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key
|
1085
|
+
# resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key, AWS::SecretsManager::Secret
|
742
1086
|
# })
|
743
1087
|
#
|
744
1088
|
# @example Response structure
|
@@ -746,7 +1090,7 @@ module Aws::AccessAnalyzer
|
|
746
1090
|
# resp.analyzed_resources #=> Array
|
747
1091
|
# resp.analyzed_resources[0].resource_arn #=> String
|
748
1092
|
# resp.analyzed_resources[0].resource_owner_account #=> String
|
749
|
-
# resp.analyzed_resources[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
|
1093
|
+
# resp.analyzed_resources[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret"
|
750
1094
|
# resp.next_token #=> String
|
751
1095
|
#
|
752
1096
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ListAnalyzedResources AWS API Documentation
|
@@ -861,8 +1205,20 @@ module Aws::AccessAnalyzer
|
|
861
1205
|
|
862
1206
|
# Retrieves a list of findings generated by the specified analyzer.
|
863
1207
|
#
|
1208
|
+
# To learn about filter keys that you can use to retrieve a list of
|
1209
|
+
# findings, see [Access Analyzer filter keys][1] in the **IAM User
|
1210
|
+
# Guide**.
|
1211
|
+
#
|
1212
|
+
#
|
1213
|
+
#
|
1214
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html
|
1215
|
+
#
|
864
1216
|
# @option params [required, String] :analyzer_arn
|
865
|
-
# The ARN of the analyzer to retrieve findings from.
|
1217
|
+
# The [ARN of the analyzer][1] to retrieve findings from.
|
1218
|
+
#
|
1219
|
+
#
|
1220
|
+
#
|
1221
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources
|
866
1222
|
#
|
867
1223
|
# @option params [Hash<String,Types::Criterion>] :filter
|
868
1224
|
# A filter to match for the findings to return.
|
@@ -919,7 +1275,7 @@ module Aws::AccessAnalyzer
|
|
919
1275
|
# resp.findings[0].principal["String"] #=> String
|
920
1276
|
# resp.findings[0].resource #=> String
|
921
1277
|
# resp.findings[0].resource_owner_account #=> String
|
922
|
-
# resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
|
1278
|
+
# resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret"
|
923
1279
|
# resp.findings[0].sources #=> Array
|
924
1280
|
# resp.findings[0].sources[0].detail.access_point_arn #=> String
|
925
1281
|
# resp.findings[0].sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT"
|
@@ -969,8 +1325,12 @@ module Aws::AccessAnalyzer
|
|
969
1325
|
# resource.
|
970
1326
|
#
|
971
1327
|
# @option params [required, String] :analyzer_arn
|
972
|
-
# The ARN of the analyzer to use to scan the policies applied to
|
973
|
-
# specified resource.
|
1328
|
+
# The [ARN of the analyzer][1] to use to scan the policies applied to
|
1329
|
+
# the specified resource.
|
1330
|
+
#
|
1331
|
+
#
|
1332
|
+
#
|
1333
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources
|
974
1334
|
#
|
975
1335
|
# @option params [required, String] :resource_arn
|
976
1336
|
# The ARN of the resource to scan.
|
@@ -1095,7 +1455,11 @@ module Aws::AccessAnalyzer
|
|
1095
1455
|
# Updates the status for the specified findings.
|
1096
1456
|
#
|
1097
1457
|
# @option params [required, String] :analyzer_arn
|
1098
|
-
# The ARN of the analyzer that generated the findings to update.
|
1458
|
+
# The [ARN of the analyzer][1] that generated the findings to update.
|
1459
|
+
#
|
1460
|
+
#
|
1461
|
+
#
|
1462
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources
|
1099
1463
|
#
|
1100
1464
|
# @option params [String] :client_token
|
1101
1465
|
# A client token.
|
@@ -1135,6 +1499,84 @@ module Aws::AccessAnalyzer
|
|
1135
1499
|
req.send_request(options)
|
1136
1500
|
end
|
1137
1501
|
|
1502
|
+
# Requests the validation of a policy and returns a list of findings.
|
1503
|
+
# The findings help you identify issues and provide actionable
|
1504
|
+
# recommendations to resolve the issue and enable you to author
|
1505
|
+
# functional policies that meet security best practices.
|
1506
|
+
#
|
1507
|
+
# @option params [String] :locale
|
1508
|
+
# The locale to use for localizing the findings.
|
1509
|
+
#
|
1510
|
+
# @option params [Integer] :max_results
|
1511
|
+
# The maximum number of results to return in the response.
|
1512
|
+
#
|
1513
|
+
# @option params [String] :next_token
|
1514
|
+
# A token used for pagination of results returned.
|
1515
|
+
#
|
1516
|
+
# @option params [required, String] :policy_document
|
1517
|
+
# The JSON policy document to use as the content for the policy.
|
1518
|
+
#
|
1519
|
+
# @option params [required, String] :policy_type
|
1520
|
+
# The type of policy to validate. Identity policies grant permissions to
|
1521
|
+
# IAM principals. Identity policies include managed and inline policies
|
1522
|
+
# for IAM roles, users, and groups. They also include service-control
|
1523
|
+
# policies (SCPs) that are attached to an AWS organization,
|
1524
|
+
# organizational unit (OU), or an account.
|
1525
|
+
#
|
1526
|
+
# Resource policies grant permissions on AWS resources. Resource
|
1527
|
+
# policies include trust policies for IAM roles and bucket policies for
|
1528
|
+
# S3 buckets. You can provide a generic input such as identity policy or
|
1529
|
+
# resource policy or a specific input such as managed policy or S3
|
1530
|
+
# bucket policy.
|
1531
|
+
#
|
1532
|
+
# @return [Types::ValidatePolicyResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
1533
|
+
#
|
1534
|
+
# * {Types::ValidatePolicyResponse#findings #findings} => Array<Types::ValidatePolicyFinding>
|
1535
|
+
# * {Types::ValidatePolicyResponse#next_token #next_token} => String
|
1536
|
+
#
|
1537
|
+
# The returned {Seahorse::Client::Response response} is a pageable response and is Enumerable. For details on usage see {Aws::PageableResponse PageableResponse}.
|
1538
|
+
#
|
1539
|
+
# @example Request syntax with placeholder values
|
1540
|
+
#
|
1541
|
+
# resp = client.validate_policy({
|
1542
|
+
# locale: "DE", # accepts DE, EN, ES, FR, IT, JA, KO, PT_BR, ZH_CN, ZH_TW
|
1543
|
+
# max_results: 1,
|
1544
|
+
# next_token: "Token",
|
1545
|
+
# policy_document: "PolicyDocument", # required
|
1546
|
+
# policy_type: "IDENTITY_POLICY", # required, accepts IDENTITY_POLICY, RESOURCE_POLICY, SERVICE_CONTROL_POLICY
|
1547
|
+
# })
|
1548
|
+
#
|
1549
|
+
# @example Response structure
|
1550
|
+
#
|
1551
|
+
# resp.findings #=> Array
|
1552
|
+
# resp.findings[0].finding_details #=> String
|
1553
|
+
# resp.findings[0].finding_type #=> String, one of "ERROR", "SECURITY_WARNING", "SUGGESTION", "WARNING"
|
1554
|
+
# resp.findings[0].issue_code #=> String
|
1555
|
+
# resp.findings[0].learn_more_link #=> String
|
1556
|
+
# resp.findings[0].locations #=> Array
|
1557
|
+
# resp.findings[0].locations[0].path #=> Array
|
1558
|
+
# resp.findings[0].locations[0].path[0].index #=> Integer
|
1559
|
+
# resp.findings[0].locations[0].path[0].key #=> String
|
1560
|
+
# resp.findings[0].locations[0].path[0].substring.length #=> Integer
|
1561
|
+
# resp.findings[0].locations[0].path[0].substring.start #=> Integer
|
1562
|
+
# resp.findings[0].locations[0].path[0].value #=> String
|
1563
|
+
# resp.findings[0].locations[0].span.end.column #=> Integer
|
1564
|
+
# resp.findings[0].locations[0].span.end.line #=> Integer
|
1565
|
+
# resp.findings[0].locations[0].span.end.offset #=> Integer
|
1566
|
+
# resp.findings[0].locations[0].span.start.column #=> Integer
|
1567
|
+
# resp.findings[0].locations[0].span.start.line #=> Integer
|
1568
|
+
# resp.findings[0].locations[0].span.start.offset #=> Integer
|
1569
|
+
# resp.next_token #=> String
|
1570
|
+
#
|
1571
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ValidatePolicy AWS API Documentation
|
1572
|
+
#
|
1573
|
+
# @overload validate_policy(params = {})
|
1574
|
+
# @param [Hash] params ({})
|
1575
|
+
def validate_policy(params = {}, options = {})
|
1576
|
+
req = build_request(:validate_policy, params)
|
1577
|
+
req.send_request(options)
|
1578
|
+
end
|
1579
|
+
|
1138
1580
|
# @!endgroup
|
1139
1581
|
|
1140
1582
|
# @param params ({})
|
@@ -1148,7 +1590,7 @@ module Aws::AccessAnalyzer
|
|
1148
1590
|
params: params,
|
1149
1591
|
config: config)
|
1150
1592
|
context[:gem_name] = 'aws-sdk-accessanalyzer'
|
1151
|
-
context[:gem_version] = '1.
|
1593
|
+
context[:gem_version] = '1.18.0'
|
1152
1594
|
Seahorse::Client::Request.new(handlers, context)
|
1153
1595
|
end
|
1154
1596
|
|