aws-sdk-accessanalyzer 1.14.0 → 1.15.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/aws-sdk-accessanalyzer.rb +1 -1
- data/lib/aws-sdk-accessanalyzer/client.rb +13 -11
- data/lib/aws-sdk-accessanalyzer/types.rb +9 -7
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 834f3bb04382a9326903cc39f1d847f0ea6453dff9cc6f6a1e79130685b24d7a
|
4
|
+
data.tar.gz: 89c34346ac02f78a18963d887eeec70cacc8edeff6d3fb4579e4532129f45fcd
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: a05271f0ad161daa1d54e46d3e515de8202ada85b7ab6c824bd6192dd6080d49e4ed050e7548f8673f9c689d5553af5fde9e4b7b3cb55dbd75750a1435854a25
|
7
|
+
data.tar.gz: 7d0e397b9ba96564d9e7699e0725ff71ed5d5b43ae53a3a8d293819899d2a7134da825df053b703640629cb3f212abc85f087553061df50eb6c2a4d362195ea8
|
@@ -381,8 +381,10 @@ module Aws::AccessAnalyzer
|
|
381
381
|
# The tags to apply to the analyzer.
|
382
382
|
#
|
383
383
|
# @option params [required, String] :type
|
384
|
-
# The type of analyzer to create. Only ACCOUNT
|
385
|
-
# You can create only one analyzer per account
|
384
|
+
# The type of analyzer to create. Only ACCOUNT and ORGANIZATION
|
385
|
+
# analyzers are supported. You can create only one analyzer per account
|
386
|
+
# per Region. You can create up to 5 analyzers per organization per
|
387
|
+
# Region.
|
386
388
|
#
|
387
389
|
# @return [Types::CreateAnalyzerResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
388
390
|
#
|
@@ -472,9 +474,9 @@ module Aws::AccessAnalyzer
|
|
472
474
|
end
|
473
475
|
|
474
476
|
# Deletes the specified analyzer. When you delete an analyzer, Access
|
475
|
-
# Analyzer is disabled for the account in the current or
|
476
|
-
# Region. All findings that were generated by the analyzer are
|
477
|
-
# You cannot undo this action.
|
477
|
+
# Analyzer is disabled for the account or organization in the current or
|
478
|
+
# specific Region. All findings that were generated by the analyzer are
|
479
|
+
# deleted. You cannot undo this action.
|
478
480
|
#
|
479
481
|
# @option params [required, String] :analyzer_name
|
480
482
|
# The name of the analyzer to delete.
|
@@ -566,7 +568,7 @@ module Aws::AccessAnalyzer
|
|
566
568
|
# resp.resource.is_public #=> Boolean
|
567
569
|
# resp.resource.resource_arn #=> String
|
568
570
|
# resp.resource.resource_owner_account #=> String
|
569
|
-
# resp.resource.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
|
571
|
+
# resp.resource.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret"
|
570
572
|
# resp.resource.shared_via #=> Array
|
571
573
|
# resp.resource.shared_via[0] #=> String
|
572
574
|
# resp.resource.status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
|
@@ -701,7 +703,7 @@ module Aws::AccessAnalyzer
|
|
701
703
|
# resp.finding.principal["String"] #=> String
|
702
704
|
# resp.finding.resource #=> String
|
703
705
|
# resp.finding.resource_owner_account #=> String
|
704
|
-
# resp.finding.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
|
706
|
+
# resp.finding.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret"
|
705
707
|
# resp.finding.sources #=> Array
|
706
708
|
# resp.finding.sources[0].detail.access_point_arn #=> String
|
707
709
|
# resp.finding.sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT"
|
@@ -745,7 +747,7 @@ module Aws::AccessAnalyzer
|
|
745
747
|
# analyzer_arn: "AnalyzerArn", # required
|
746
748
|
# max_results: 1,
|
747
749
|
# next_token: "Token",
|
748
|
-
# resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key
|
750
|
+
# resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key, AWS::SecretsManager::Secret
|
749
751
|
# })
|
750
752
|
#
|
751
753
|
# @example Response structure
|
@@ -753,7 +755,7 @@ module Aws::AccessAnalyzer
|
|
753
755
|
# resp.analyzed_resources #=> Array
|
754
756
|
# resp.analyzed_resources[0].resource_arn #=> String
|
755
757
|
# resp.analyzed_resources[0].resource_owner_account #=> String
|
756
|
-
# resp.analyzed_resources[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
|
758
|
+
# resp.analyzed_resources[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret"
|
757
759
|
# resp.next_token #=> String
|
758
760
|
#
|
759
761
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ListAnalyzedResources AWS API Documentation
|
@@ -933,7 +935,7 @@ module Aws::AccessAnalyzer
|
|
933
935
|
# resp.findings[0].principal["String"] #=> String
|
934
936
|
# resp.findings[0].resource #=> String
|
935
937
|
# resp.findings[0].resource_owner_account #=> String
|
936
|
-
# resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
|
938
|
+
# resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret"
|
937
939
|
# resp.findings[0].sources #=> Array
|
938
940
|
# resp.findings[0].sources[0].detail.access_point_arn #=> String
|
939
941
|
# resp.findings[0].sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT"
|
@@ -1162,7 +1164,7 @@ module Aws::AccessAnalyzer
|
|
1162
1164
|
params: params,
|
1163
1165
|
config: config)
|
1164
1166
|
context[:gem_name] = 'aws-sdk-accessanalyzer'
|
1165
|
-
context[:gem_version] = '1.
|
1167
|
+
context[:gem_version] = '1.15.0'
|
1166
1168
|
Seahorse::Client::Request.new(handlers, context)
|
1167
1169
|
end
|
1168
1170
|
|
@@ -141,10 +141,10 @@ module Aws::AccessAnalyzer
|
|
141
141
|
# The status of the analyzer. An `Active` analyzer successfully
|
142
142
|
# monitors supported resources and generates new findings. The
|
143
143
|
# analyzer is `Disabled` when a user action, such as removing trusted
|
144
|
-
# access for IAM Access Analyzer from AWS Organizations, causes
|
145
|
-
# analyzer to stop generating new findings. The status is
|
146
|
-
# when the analyzer creation is in progress and `Failed`
|
147
|
-
# analyzer creation has failed.
|
144
|
+
# access for AWS IAM Access Analyzer from AWS Organizations, causes
|
145
|
+
# the analyzer to stop generating new findings. The status is
|
146
|
+
# `Creating` when the analyzer creation is in progress and `Failed`
|
147
|
+
# when the analyzer creation has failed.
|
148
148
|
# @return [String]
|
149
149
|
#
|
150
150
|
# @!attribute [rw] status_reason
|
@@ -318,8 +318,10 @@ module Aws::AccessAnalyzer
|
|
318
318
|
# @return [Hash<String,String>]
|
319
319
|
#
|
320
320
|
# @!attribute [rw] type
|
321
|
-
# The type of analyzer to create. Only ACCOUNT
|
322
|
-
# supported. You can create only one analyzer per
|
321
|
+
# The type of analyzer to create. Only ACCOUNT and ORGANIZATION
|
322
|
+
# analyzers are supported. You can create only one analyzer per
|
323
|
+
# account per Region. You can create up to 5 analyzers per
|
324
|
+
# organization per Region.
|
323
325
|
# @return [String]
|
324
326
|
#
|
325
327
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/CreateAnalyzerRequest AWS API Documentation
|
@@ -937,7 +939,7 @@ module Aws::AccessAnalyzer
|
|
937
939
|
# analyzer_arn: "AnalyzerArn", # required
|
938
940
|
# max_results: 1,
|
939
941
|
# next_token: "Token",
|
940
|
-
# resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key
|
942
|
+
# resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key, AWS::SecretsManager::Secret
|
941
943
|
# }
|
942
944
|
#
|
943
945
|
# @!attribute [rw] analyzer_arn
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-accessanalyzer
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.15.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date:
|
11
|
+
date: 2021-01-27 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|