aws-sdk-accessanalyzer 1.14.0 → 1.15.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/lib/aws-sdk-accessanalyzer.rb +1 -1
- data/lib/aws-sdk-accessanalyzer/client.rb +13 -11
- data/lib/aws-sdk-accessanalyzer/types.rb +9 -7
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 834f3bb04382a9326903cc39f1d847f0ea6453dff9cc6f6a1e79130685b24d7a
|
4
|
+
data.tar.gz: 89c34346ac02f78a18963d887eeec70cacc8edeff6d3fb4579e4532129f45fcd
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: a05271f0ad161daa1d54e46d3e515de8202ada85b7ab6c824bd6192dd6080d49e4ed050e7548f8673f9c689d5553af5fde9e4b7b3cb55dbd75750a1435854a25
|
7
|
+
data.tar.gz: 7d0e397b9ba96564d9e7699e0725ff71ed5d5b43ae53a3a8d293819899d2a7134da825df053b703640629cb3f212abc85f087553061df50eb6c2a4d362195ea8
|
@@ -381,8 +381,10 @@ module Aws::AccessAnalyzer
|
|
381
381
|
# The tags to apply to the analyzer.
|
382
382
|
#
|
383
383
|
# @option params [required, String] :type
|
384
|
-
# The type of analyzer to create. Only ACCOUNT
|
385
|
-
# You can create only one analyzer per account
|
384
|
+
# The type of analyzer to create. Only ACCOUNT and ORGANIZATION
|
385
|
+
# analyzers are supported. You can create only one analyzer per account
|
386
|
+
# per Region. You can create up to 5 analyzers per organization per
|
387
|
+
# Region.
|
386
388
|
#
|
387
389
|
# @return [Types::CreateAnalyzerResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
388
390
|
#
|
@@ -472,9 +474,9 @@ module Aws::AccessAnalyzer
|
|
472
474
|
end
|
473
475
|
|
474
476
|
# Deletes the specified analyzer. When you delete an analyzer, Access
|
475
|
-
# Analyzer is disabled for the account in the current or
|
476
|
-
# Region. All findings that were generated by the analyzer are
|
477
|
-
# You cannot undo this action.
|
477
|
+
# Analyzer is disabled for the account or organization in the current or
|
478
|
+
# specific Region. All findings that were generated by the analyzer are
|
479
|
+
# deleted. You cannot undo this action.
|
478
480
|
#
|
479
481
|
# @option params [required, String] :analyzer_name
|
480
482
|
# The name of the analyzer to delete.
|
@@ -566,7 +568,7 @@ module Aws::AccessAnalyzer
|
|
566
568
|
# resp.resource.is_public #=> Boolean
|
567
569
|
# resp.resource.resource_arn #=> String
|
568
570
|
# resp.resource.resource_owner_account #=> String
|
569
|
-
# resp.resource.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
|
571
|
+
# resp.resource.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret"
|
570
572
|
# resp.resource.shared_via #=> Array
|
571
573
|
# resp.resource.shared_via[0] #=> String
|
572
574
|
# resp.resource.status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
|
@@ -701,7 +703,7 @@ module Aws::AccessAnalyzer
|
|
701
703
|
# resp.finding.principal["String"] #=> String
|
702
704
|
# resp.finding.resource #=> String
|
703
705
|
# resp.finding.resource_owner_account #=> String
|
704
|
-
# resp.finding.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
|
706
|
+
# resp.finding.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret"
|
705
707
|
# resp.finding.sources #=> Array
|
706
708
|
# resp.finding.sources[0].detail.access_point_arn #=> String
|
707
709
|
# resp.finding.sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT"
|
@@ -745,7 +747,7 @@ module Aws::AccessAnalyzer
|
|
745
747
|
# analyzer_arn: "AnalyzerArn", # required
|
746
748
|
# max_results: 1,
|
747
749
|
# next_token: "Token",
|
748
|
-
# resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key
|
750
|
+
# resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key, AWS::SecretsManager::Secret
|
749
751
|
# })
|
750
752
|
#
|
751
753
|
# @example Response structure
|
@@ -753,7 +755,7 @@ module Aws::AccessAnalyzer
|
|
753
755
|
# resp.analyzed_resources #=> Array
|
754
756
|
# resp.analyzed_resources[0].resource_arn #=> String
|
755
757
|
# resp.analyzed_resources[0].resource_owner_account #=> String
|
756
|
-
# resp.analyzed_resources[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
|
758
|
+
# resp.analyzed_resources[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret"
|
757
759
|
# resp.next_token #=> String
|
758
760
|
#
|
759
761
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ListAnalyzedResources AWS API Documentation
|
@@ -933,7 +935,7 @@ module Aws::AccessAnalyzer
|
|
933
935
|
# resp.findings[0].principal["String"] #=> String
|
934
936
|
# resp.findings[0].resource #=> String
|
935
937
|
# resp.findings[0].resource_owner_account #=> String
|
936
|
-
# resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
|
938
|
+
# resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret"
|
937
939
|
# resp.findings[0].sources #=> Array
|
938
940
|
# resp.findings[0].sources[0].detail.access_point_arn #=> String
|
939
941
|
# resp.findings[0].sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT"
|
@@ -1162,7 +1164,7 @@ module Aws::AccessAnalyzer
|
|
1162
1164
|
params: params,
|
1163
1165
|
config: config)
|
1164
1166
|
context[:gem_name] = 'aws-sdk-accessanalyzer'
|
1165
|
-
context[:gem_version] = '1.
|
1167
|
+
context[:gem_version] = '1.15.0'
|
1166
1168
|
Seahorse::Client::Request.new(handlers, context)
|
1167
1169
|
end
|
1168
1170
|
|
@@ -141,10 +141,10 @@ module Aws::AccessAnalyzer
|
|
141
141
|
# The status of the analyzer. An `Active` analyzer successfully
|
142
142
|
# monitors supported resources and generates new findings. The
|
143
143
|
# analyzer is `Disabled` when a user action, such as removing trusted
|
144
|
-
# access for IAM Access Analyzer from AWS Organizations, causes
|
145
|
-
# analyzer to stop generating new findings. The status is
|
146
|
-
# when the analyzer creation is in progress and `Failed`
|
147
|
-
# analyzer creation has failed.
|
144
|
+
# access for AWS IAM Access Analyzer from AWS Organizations, causes
|
145
|
+
# the analyzer to stop generating new findings. The status is
|
146
|
+
# `Creating` when the analyzer creation is in progress and `Failed`
|
147
|
+
# when the analyzer creation has failed.
|
148
148
|
# @return [String]
|
149
149
|
#
|
150
150
|
# @!attribute [rw] status_reason
|
@@ -318,8 +318,10 @@ module Aws::AccessAnalyzer
|
|
318
318
|
# @return [Hash<String,String>]
|
319
319
|
#
|
320
320
|
# @!attribute [rw] type
|
321
|
-
# The type of analyzer to create. Only ACCOUNT
|
322
|
-
# supported. You can create only one analyzer per
|
321
|
+
# The type of analyzer to create. Only ACCOUNT and ORGANIZATION
|
322
|
+
# analyzers are supported. You can create only one analyzer per
|
323
|
+
# account per Region. You can create up to 5 analyzers per
|
324
|
+
# organization per Region.
|
323
325
|
# @return [String]
|
324
326
|
#
|
325
327
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/CreateAnalyzerRequest AWS API Documentation
|
@@ -937,7 +939,7 @@ module Aws::AccessAnalyzer
|
|
937
939
|
# analyzer_arn: "AnalyzerArn", # required
|
938
940
|
# max_results: 1,
|
939
941
|
# next_token: "Token",
|
940
|
-
# resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key
|
942
|
+
# resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key, AWS::SecretsManager::Secret
|
941
943
|
# }
|
942
944
|
#
|
943
945
|
# @!attribute [rw] analyzer_arn
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-accessanalyzer
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.15.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date:
|
11
|
+
date: 2021-01-27 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|