aws-sdk-accessanalyzer 1.14.0 → 1.15.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 2a49bd2e7a89e7252fa8a669b007c8d8a58bf414ed383ef4d933c8d251986f26
4
- data.tar.gz: 302ea5f085d32c9430646ac325169c56b536d4e91d622555713f17c031e7753d
3
+ metadata.gz: 834f3bb04382a9326903cc39f1d847f0ea6453dff9cc6f6a1e79130685b24d7a
4
+ data.tar.gz: 89c34346ac02f78a18963d887eeec70cacc8edeff6d3fb4579e4532129f45fcd
5
5
  SHA512:
6
- metadata.gz: 664ca5f095dc07271b4789ed432c819ddad443deeb2c4f3e6e710eb947e6c271766bdc6f2afa8b345dfc2af67c19211da56147d7a768de06d1afb209a57aa25d
7
- data.tar.gz: 450b8509df467fe0efaf855a42c7d9c453a314c34323dd97e98d0da2f0aae48c669651fe4ed45b841a347c8167fe6ecfeade4971764805471c4adff4b22316f9
6
+ metadata.gz: a05271f0ad161daa1d54e46d3e515de8202ada85b7ab6c824bd6192dd6080d49e4ed050e7548f8673f9c689d5553af5fde9e4b7b3cb55dbd75750a1435854a25
7
+ data.tar.gz: 7d0e397b9ba96564d9e7699e0725ff71ed5d5b43ae53a3a8d293819899d2a7134da825df053b703640629cb3f212abc85f087553061df50eb6c2a4d362195ea8
@@ -48,6 +48,6 @@ require_relative 'aws-sdk-accessanalyzer/customizations'
48
48
  # @!group service
49
49
  module Aws::AccessAnalyzer
50
50
 
51
- GEM_VERSION = '1.14.0'
51
+ GEM_VERSION = '1.15.0'
52
52
 
53
53
  end
@@ -381,8 +381,10 @@ module Aws::AccessAnalyzer
381
381
  # The tags to apply to the analyzer.
382
382
  #
383
383
  # @option params [required, String] :type
384
- # The type of analyzer to create. Only ACCOUNT analyzers are supported.
385
- # You can create only one analyzer per account per Region.
384
+ # The type of analyzer to create. Only ACCOUNT and ORGANIZATION
385
+ # analyzers are supported. You can create only one analyzer per account
386
+ # per Region. You can create up to 5 analyzers per organization per
387
+ # Region.
386
388
  #
387
389
  # @return [Types::CreateAnalyzerResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
388
390
  #
@@ -472,9 +474,9 @@ module Aws::AccessAnalyzer
472
474
  end
473
475
 
474
476
  # Deletes the specified analyzer. When you delete an analyzer, Access
475
- # Analyzer is disabled for the account in the current or specific
476
- # Region. All findings that were generated by the analyzer are deleted.
477
- # You cannot undo this action.
477
+ # Analyzer is disabled for the account or organization in the current or
478
+ # specific Region. All findings that were generated by the analyzer are
479
+ # deleted. You cannot undo this action.
478
480
  #
479
481
  # @option params [required, String] :analyzer_name
480
482
  # The name of the analyzer to delete.
@@ -566,7 +568,7 @@ module Aws::AccessAnalyzer
566
568
  # resp.resource.is_public #=> Boolean
567
569
  # resp.resource.resource_arn #=> String
568
570
  # resp.resource.resource_owner_account #=> String
569
- # resp.resource.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
571
+ # resp.resource.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret"
570
572
  # resp.resource.shared_via #=> Array
571
573
  # resp.resource.shared_via[0] #=> String
572
574
  # resp.resource.status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
@@ -701,7 +703,7 @@ module Aws::AccessAnalyzer
701
703
  # resp.finding.principal["String"] #=> String
702
704
  # resp.finding.resource #=> String
703
705
  # resp.finding.resource_owner_account #=> String
704
- # resp.finding.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
706
+ # resp.finding.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret"
705
707
  # resp.finding.sources #=> Array
706
708
  # resp.finding.sources[0].detail.access_point_arn #=> String
707
709
  # resp.finding.sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT"
@@ -745,7 +747,7 @@ module Aws::AccessAnalyzer
745
747
  # analyzer_arn: "AnalyzerArn", # required
746
748
  # max_results: 1,
747
749
  # next_token: "Token",
748
- # resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key
750
+ # resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key, AWS::SecretsManager::Secret
749
751
  # })
750
752
  #
751
753
  # @example Response structure
@@ -753,7 +755,7 @@ module Aws::AccessAnalyzer
753
755
  # resp.analyzed_resources #=> Array
754
756
  # resp.analyzed_resources[0].resource_arn #=> String
755
757
  # resp.analyzed_resources[0].resource_owner_account #=> String
756
- # resp.analyzed_resources[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
758
+ # resp.analyzed_resources[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret"
757
759
  # resp.next_token #=> String
758
760
  #
759
761
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ListAnalyzedResources AWS API Documentation
@@ -933,7 +935,7 @@ module Aws::AccessAnalyzer
933
935
  # resp.findings[0].principal["String"] #=> String
934
936
  # resp.findings[0].resource #=> String
935
937
  # resp.findings[0].resource_owner_account #=> String
936
- # resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
938
+ # resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret"
937
939
  # resp.findings[0].sources #=> Array
938
940
  # resp.findings[0].sources[0].detail.access_point_arn #=> String
939
941
  # resp.findings[0].sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT"
@@ -1162,7 +1164,7 @@ module Aws::AccessAnalyzer
1162
1164
  params: params,
1163
1165
  config: config)
1164
1166
  context[:gem_name] = 'aws-sdk-accessanalyzer'
1165
- context[:gem_version] = '1.14.0'
1167
+ context[:gem_version] = '1.15.0'
1166
1168
  Seahorse::Client::Request.new(handlers, context)
1167
1169
  end
1168
1170
 
@@ -141,10 +141,10 @@ module Aws::AccessAnalyzer
141
141
  # The status of the analyzer. An `Active` analyzer successfully
142
142
  # monitors supported resources and generates new findings. The
143
143
  # analyzer is `Disabled` when a user action, such as removing trusted
144
- # access for IAM Access Analyzer from AWS Organizations, causes the
145
- # analyzer to stop generating new findings. The status is `Creating`
146
- # when the analyzer creation is in progress and `Failed` when the
147
- # analyzer creation has failed.
144
+ # access for AWS IAM Access Analyzer from AWS Organizations, causes
145
+ # the analyzer to stop generating new findings. The status is
146
+ # `Creating` when the analyzer creation is in progress and `Failed`
147
+ # when the analyzer creation has failed.
148
148
  # @return [String]
149
149
  #
150
150
  # @!attribute [rw] status_reason
@@ -318,8 +318,10 @@ module Aws::AccessAnalyzer
318
318
  # @return [Hash<String,String>]
319
319
  #
320
320
  # @!attribute [rw] type
321
- # The type of analyzer to create. Only ACCOUNT analyzers are
322
- # supported. You can create only one analyzer per account per Region.
321
+ # The type of analyzer to create. Only ACCOUNT and ORGANIZATION
322
+ # analyzers are supported. You can create only one analyzer per
323
+ # account per Region. You can create up to 5 analyzers per
324
+ # organization per Region.
323
325
  # @return [String]
324
326
  #
325
327
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/CreateAnalyzerRequest AWS API Documentation
@@ -937,7 +939,7 @@ module Aws::AccessAnalyzer
937
939
  # analyzer_arn: "AnalyzerArn", # required
938
940
  # max_results: 1,
939
941
  # next_token: "Token",
940
- # resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key
942
+ # resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key, AWS::SecretsManager::Secret
941
943
  # }
942
944
  #
943
945
  # @!attribute [rw] analyzer_arn
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-accessanalyzer
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.14.0
4
+ version: 1.15.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2020-10-22 00:00:00.000000000 Z
11
+ date: 2021-01-27 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core