aws-sdk-accessanalyzer 1.14.0 → 1.15.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 2a49bd2e7a89e7252fa8a669b007c8d8a58bf414ed383ef4d933c8d251986f26
4
- data.tar.gz: 302ea5f085d32c9430646ac325169c56b536d4e91d622555713f17c031e7753d
3
+ metadata.gz: 834f3bb04382a9326903cc39f1d847f0ea6453dff9cc6f6a1e79130685b24d7a
4
+ data.tar.gz: 89c34346ac02f78a18963d887eeec70cacc8edeff6d3fb4579e4532129f45fcd
5
5
  SHA512:
6
- metadata.gz: 664ca5f095dc07271b4789ed432c819ddad443deeb2c4f3e6e710eb947e6c271766bdc6f2afa8b345dfc2af67c19211da56147d7a768de06d1afb209a57aa25d
7
- data.tar.gz: 450b8509df467fe0efaf855a42c7d9c453a314c34323dd97e98d0da2f0aae48c669651fe4ed45b841a347c8167fe6ecfeade4971764805471c4adff4b22316f9
6
+ metadata.gz: a05271f0ad161daa1d54e46d3e515de8202ada85b7ab6c824bd6192dd6080d49e4ed050e7548f8673f9c689d5553af5fde9e4b7b3cb55dbd75750a1435854a25
7
+ data.tar.gz: 7d0e397b9ba96564d9e7699e0725ff71ed5d5b43ae53a3a8d293819899d2a7134da825df053b703640629cb3f212abc85f087553061df50eb6c2a4d362195ea8
@@ -48,6 +48,6 @@ require_relative 'aws-sdk-accessanalyzer/customizations'
48
48
  # @!group service
49
49
  module Aws::AccessAnalyzer
50
50
 
51
- GEM_VERSION = '1.14.0'
51
+ GEM_VERSION = '1.15.0'
52
52
 
53
53
  end
@@ -381,8 +381,10 @@ module Aws::AccessAnalyzer
381
381
  # The tags to apply to the analyzer.
382
382
  #
383
383
  # @option params [required, String] :type
384
- # The type of analyzer to create. Only ACCOUNT analyzers are supported.
385
- # You can create only one analyzer per account per Region.
384
+ # The type of analyzer to create. Only ACCOUNT and ORGANIZATION
385
+ # analyzers are supported. You can create only one analyzer per account
386
+ # per Region. You can create up to 5 analyzers per organization per
387
+ # Region.
386
388
  #
387
389
  # @return [Types::CreateAnalyzerResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
388
390
  #
@@ -472,9 +474,9 @@ module Aws::AccessAnalyzer
472
474
  end
473
475
 
474
476
  # Deletes the specified analyzer. When you delete an analyzer, Access
475
- # Analyzer is disabled for the account in the current or specific
476
- # Region. All findings that were generated by the analyzer are deleted.
477
- # You cannot undo this action.
477
+ # Analyzer is disabled for the account or organization in the current or
478
+ # specific Region. All findings that were generated by the analyzer are
479
+ # deleted. You cannot undo this action.
478
480
  #
479
481
  # @option params [required, String] :analyzer_name
480
482
  # The name of the analyzer to delete.
@@ -566,7 +568,7 @@ module Aws::AccessAnalyzer
566
568
  # resp.resource.is_public #=> Boolean
567
569
  # resp.resource.resource_arn #=> String
568
570
  # resp.resource.resource_owner_account #=> String
569
- # resp.resource.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
571
+ # resp.resource.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret"
570
572
  # resp.resource.shared_via #=> Array
571
573
  # resp.resource.shared_via[0] #=> String
572
574
  # resp.resource.status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
@@ -701,7 +703,7 @@ module Aws::AccessAnalyzer
701
703
  # resp.finding.principal["String"] #=> String
702
704
  # resp.finding.resource #=> String
703
705
  # resp.finding.resource_owner_account #=> String
704
- # resp.finding.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
706
+ # resp.finding.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret"
705
707
  # resp.finding.sources #=> Array
706
708
  # resp.finding.sources[0].detail.access_point_arn #=> String
707
709
  # resp.finding.sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT"
@@ -745,7 +747,7 @@ module Aws::AccessAnalyzer
745
747
  # analyzer_arn: "AnalyzerArn", # required
746
748
  # max_results: 1,
747
749
  # next_token: "Token",
748
- # resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key
750
+ # resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key, AWS::SecretsManager::Secret
749
751
  # })
750
752
  #
751
753
  # @example Response structure
@@ -753,7 +755,7 @@ module Aws::AccessAnalyzer
753
755
  # resp.analyzed_resources #=> Array
754
756
  # resp.analyzed_resources[0].resource_arn #=> String
755
757
  # resp.analyzed_resources[0].resource_owner_account #=> String
756
- # resp.analyzed_resources[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
758
+ # resp.analyzed_resources[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret"
757
759
  # resp.next_token #=> String
758
760
  #
759
761
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ListAnalyzedResources AWS API Documentation
@@ -933,7 +935,7 @@ module Aws::AccessAnalyzer
933
935
  # resp.findings[0].principal["String"] #=> String
934
936
  # resp.findings[0].resource #=> String
935
937
  # resp.findings[0].resource_owner_account #=> String
936
- # resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
938
+ # resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret"
937
939
  # resp.findings[0].sources #=> Array
938
940
  # resp.findings[0].sources[0].detail.access_point_arn #=> String
939
941
  # resp.findings[0].sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT"
@@ -1162,7 +1164,7 @@ module Aws::AccessAnalyzer
1162
1164
  params: params,
1163
1165
  config: config)
1164
1166
  context[:gem_name] = 'aws-sdk-accessanalyzer'
1165
- context[:gem_version] = '1.14.0'
1167
+ context[:gem_version] = '1.15.0'
1166
1168
  Seahorse::Client::Request.new(handlers, context)
1167
1169
  end
1168
1170
 
@@ -141,10 +141,10 @@ module Aws::AccessAnalyzer
141
141
  # The status of the analyzer. An `Active` analyzer successfully
142
142
  # monitors supported resources and generates new findings. The
143
143
  # analyzer is `Disabled` when a user action, such as removing trusted
144
- # access for IAM Access Analyzer from AWS Organizations, causes the
145
- # analyzer to stop generating new findings. The status is `Creating`
146
- # when the analyzer creation is in progress and `Failed` when the
147
- # analyzer creation has failed.
144
+ # access for AWS IAM Access Analyzer from AWS Organizations, causes
145
+ # the analyzer to stop generating new findings. The status is
146
+ # `Creating` when the analyzer creation is in progress and `Failed`
147
+ # when the analyzer creation has failed.
148
148
  # @return [String]
149
149
  #
150
150
  # @!attribute [rw] status_reason
@@ -318,8 +318,10 @@ module Aws::AccessAnalyzer
318
318
  # @return [Hash<String,String>]
319
319
  #
320
320
  # @!attribute [rw] type
321
- # The type of analyzer to create. Only ACCOUNT analyzers are
322
- # supported. You can create only one analyzer per account per Region.
321
+ # The type of analyzer to create. Only ACCOUNT and ORGANIZATION
322
+ # analyzers are supported. You can create only one analyzer per
323
+ # account per Region. You can create up to 5 analyzers per
324
+ # organization per Region.
323
325
  # @return [String]
324
326
  #
325
327
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/CreateAnalyzerRequest AWS API Documentation
@@ -937,7 +939,7 @@ module Aws::AccessAnalyzer
937
939
  # analyzer_arn: "AnalyzerArn", # required
938
940
  # max_results: 1,
939
941
  # next_token: "Token",
940
- # resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key
942
+ # resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key, AWS::SecretsManager::Secret
941
943
  # }
942
944
  #
943
945
  # @!attribute [rw] analyzer_arn
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-accessanalyzer
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.14.0
4
+ version: 1.15.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2020-10-22 00:00:00.000000000 Z
11
+ date: 2021-01-27 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core