aws-sdk-accessanalyzer 1.43.0 → 1.45.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-accessanalyzer/client.rb +13 -9
- data/lib/aws-sdk-accessanalyzer/client_api.rb +7 -0
- data/lib/aws-sdk-accessanalyzer/plugins/endpoints.rb +4 -2
- data/lib/aws-sdk-accessanalyzer/types.rb +37 -1
- data/lib/aws-sdk-accessanalyzer.rb +1 -1
- data/sig/client.rbs +606 -0
- data/sig/errors.rbs +53 -0
- data/sig/resource.rbs +79 -0
- data/sig/types.rbs +1043 -0
- data/sig/waiters.rbs +13 -0
- metadata +13 -8
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 30d0b5758c70e8399097de843e90a31c4ac6e75e2c229978ea195dfad1538900
|
4
|
+
data.tar.gz: 5c6ef08352a8b4a6d900f309a7b206cdbda0cb1fc61030dfbd1565ebf74611a7
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: a432058a5fe3ac9bfc4c82fbc70cd95f8175b0064448172b302528af20fac9dcf31b233cf8f98d6f3c91e207e43ce7a04f782a4956a7a49e1f79be53952379f6
|
7
|
+
data.tar.gz: 4dcebb78315e71a4692601a9c03022856c7bf2dc9a5f860f174f7938121136ef8de51d56a778a8e04294c54458760dff744c86f985923bcbae39aacb26631939
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.45.0 (2024-01-26)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
8
|
+
|
9
|
+
1.44.0 (2023-11-28)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - This release adds support for external access findings for S3 directory buckets to help you easily identify cross-account access. Updated service API, documentation, and paginators.
|
13
|
+
|
4
14
|
1.43.0 (2023-11-27)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.45.0
|
@@ -695,6 +695,9 @@ module Aws::AccessAnalyzer
|
|
695
695
|
# sqs_queue: {
|
696
696
|
# queue_policy: "SqsQueuePolicy",
|
697
697
|
# },
|
698
|
+
# s3_express_directory_bucket: {
|
699
|
+
# bucket_policy: "S3ExpressDirectoryBucketPolicy",
|
700
|
+
# },
|
698
701
|
# },
|
699
702
|
# },
|
700
703
|
# client_token: "String",
|
@@ -982,6 +985,7 @@ module Aws::AccessAnalyzer
|
|
982
985
|
# resp.access_preview.configurations["ConfigurationsMapKey"].s3_bucket.access_points["AccessPointArn"].network_origin.vpc_configuration.vpc_id #=> String
|
983
986
|
# resp.access_preview.configurations["ConfigurationsMapKey"].sns_topic.topic_policy #=> String
|
984
987
|
# resp.access_preview.configurations["ConfigurationsMapKey"].sqs_queue.queue_policy #=> String
|
988
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].s3_express_directory_bucket.bucket_policy #=> String
|
985
989
|
# resp.access_preview.created_at #=> Time
|
986
990
|
# resp.access_preview.status #=> String, one of "COMPLETED", "CREATING", "FAILED"
|
987
991
|
# resp.access_preview.status_reason.code #=> String, one of "INTERNAL_ERROR", "INVALID_CONFIGURATION"
|
@@ -1021,7 +1025,7 @@ module Aws::AccessAnalyzer
|
|
1021
1025
|
# @example Response structure
|
1022
1026
|
#
|
1023
1027
|
# resp.resource.resource_arn #=> String
|
1024
|
-
# resp.resource.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic"
|
1028
|
+
# resp.resource.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket"
|
1025
1029
|
# resp.resource.created_at #=> Time
|
1026
1030
|
# resp.resource.analyzed_at #=> Time
|
1027
1031
|
# resp.resource.updated_at #=> Time
|
@@ -1162,7 +1166,7 @@ module Aws::AccessAnalyzer
|
|
1162
1166
|
# resp.finding.action[0] #=> String
|
1163
1167
|
# resp.finding.resource #=> String
|
1164
1168
|
# resp.finding.is_public #=> Boolean
|
1165
|
-
# resp.finding.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic"
|
1169
|
+
# resp.finding.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket"
|
1166
1170
|
# resp.finding.condition #=> Hash
|
1167
1171
|
# resp.finding.condition["String"] #=> String
|
1168
1172
|
# resp.finding.created_at #=> Time
|
@@ -1237,7 +1241,7 @@ module Aws::AccessAnalyzer
|
|
1237
1241
|
# resp.id #=> String
|
1238
1242
|
# resp.next_token #=> String
|
1239
1243
|
# resp.resource #=> String
|
1240
|
-
# resp.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic"
|
1244
|
+
# resp.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket"
|
1241
1245
|
# resp.resource_owner_account #=> String
|
1242
1246
|
# resp.status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
|
1243
1247
|
# resp.updated_at #=> Time
|
@@ -1400,7 +1404,7 @@ module Aws::AccessAnalyzer
|
|
1400
1404
|
# resp.findings[0].condition["String"] #=> String
|
1401
1405
|
# resp.findings[0].resource #=> String
|
1402
1406
|
# resp.findings[0].is_public #=> Boolean
|
1403
|
-
# resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic"
|
1407
|
+
# resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket"
|
1404
1408
|
# resp.findings[0].created_at #=> Time
|
1405
1409
|
# resp.findings[0].change_type #=> String, one of "CHANGED", "NEW", "UNCHANGED"
|
1406
1410
|
# resp.findings[0].status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
|
@@ -1501,7 +1505,7 @@ module Aws::AccessAnalyzer
|
|
1501
1505
|
#
|
1502
1506
|
# resp = client.list_analyzed_resources({
|
1503
1507
|
# analyzer_arn: "AnalyzerArn", # required
|
1504
|
-
# resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key, AWS::SecretsManager::Secret, AWS::EFS::FileSystem, AWS::EC2::Snapshot, AWS::ECR::Repository, AWS::RDS::DBSnapshot, AWS::RDS::DBClusterSnapshot, AWS::SNS::Topic
|
1508
|
+
# resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key, AWS::SecretsManager::Secret, AWS::EFS::FileSystem, AWS::EC2::Snapshot, AWS::ECR::Repository, AWS::RDS::DBSnapshot, AWS::RDS::DBClusterSnapshot, AWS::SNS::Topic, AWS::S3Express::DirectoryBucket
|
1505
1509
|
# next_token: "Token",
|
1506
1510
|
# max_results: 1,
|
1507
1511
|
# })
|
@@ -1511,7 +1515,7 @@ module Aws::AccessAnalyzer
|
|
1511
1515
|
# resp.analyzed_resources #=> Array
|
1512
1516
|
# resp.analyzed_resources[0].resource_arn #=> String
|
1513
1517
|
# resp.analyzed_resources[0].resource_owner_account #=> String
|
1514
|
-
# resp.analyzed_resources[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic"
|
1518
|
+
# resp.analyzed_resources[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket"
|
1515
1519
|
# resp.next_token #=> String
|
1516
1520
|
#
|
1517
1521
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ListAnalyzedResources AWS API Documentation
|
@@ -1691,7 +1695,7 @@ module Aws::AccessAnalyzer
|
|
1691
1695
|
# resp.findings[0].action[0] #=> String
|
1692
1696
|
# resp.findings[0].resource #=> String
|
1693
1697
|
# resp.findings[0].is_public #=> Boolean
|
1694
|
-
# resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic"
|
1698
|
+
# resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket"
|
1695
1699
|
# resp.findings[0].condition #=> Hash
|
1696
1700
|
# resp.findings[0].condition["String"] #=> String
|
1697
1701
|
# resp.findings[0].created_at #=> Time
|
@@ -1779,7 +1783,7 @@ module Aws::AccessAnalyzer
|
|
1779
1783
|
# resp.findings[0].error #=> String
|
1780
1784
|
# resp.findings[0].id #=> String
|
1781
1785
|
# resp.findings[0].resource #=> String
|
1782
|
-
# resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic"
|
1786
|
+
# resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket"
|
1783
1787
|
# resp.findings[0].resource_owner_account #=> String
|
1784
1788
|
# resp.findings[0].status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
|
1785
1789
|
# resp.findings[0].updated_at #=> Time
|
@@ -2224,7 +2228,7 @@ module Aws::AccessAnalyzer
|
|
2224
2228
|
params: params,
|
2225
2229
|
config: config)
|
2226
2230
|
context[:gem_name] = 'aws-sdk-accessanalyzer'
|
2227
|
-
context[:gem_version] = '1.
|
2231
|
+
context[:gem_version] = '1.45.0'
|
2228
2232
|
Seahorse::Client::Request.new(handlers, context)
|
2229
2233
|
end
|
2230
2234
|
|
@@ -213,6 +213,8 @@ module Aws::AccessAnalyzer
|
|
213
213
|
S3BucketAclGrantConfigurationsList = Shapes::ListShape.new(name: 'S3BucketAclGrantConfigurationsList')
|
214
214
|
S3BucketConfiguration = Shapes::StructureShape.new(name: 'S3BucketConfiguration')
|
215
215
|
S3BucketPolicy = Shapes::StringShape.new(name: 'S3BucketPolicy')
|
216
|
+
S3ExpressDirectoryBucketConfiguration = Shapes::StructureShape.new(name: 'S3ExpressDirectoryBucketConfiguration')
|
217
|
+
S3ExpressDirectoryBucketPolicy = Shapes::StringShape.new(name: 'S3ExpressDirectoryBucketPolicy')
|
216
218
|
S3PublicAccessBlockConfiguration = Shapes::StructureShape.new(name: 'S3PublicAccessBlockConfiguration')
|
217
219
|
SecretsManagerSecretConfiguration = Shapes::StructureShape.new(name: 'SecretsManagerSecretConfiguration')
|
218
220
|
SecretsManagerSecretKmsId = Shapes::StringShape.new(name: 'SecretsManagerSecretKmsId')
|
@@ -431,6 +433,7 @@ module Aws::AccessAnalyzer
|
|
431
433
|
Configuration.add_member(:s3_bucket, Shapes::ShapeRef.new(shape: S3BucketConfiguration, location_name: "s3Bucket"))
|
432
434
|
Configuration.add_member(:sns_topic, Shapes::ShapeRef.new(shape: SnsTopicConfiguration, location_name: "snsTopic"))
|
433
435
|
Configuration.add_member(:sqs_queue, Shapes::ShapeRef.new(shape: SqsQueueConfiguration, location_name: "sqsQueue"))
|
436
|
+
Configuration.add_member(:s3_express_directory_bucket, Shapes::ShapeRef.new(shape: S3ExpressDirectoryBucketConfiguration, location_name: "s3ExpressDirectoryBucket"))
|
434
437
|
Configuration.add_member(:unknown, Shapes::ShapeRef.new(shape: nil, location_name: 'unknown'))
|
435
438
|
Configuration.add_member_subclass(:ebs_snapshot, Types::Configuration::EbsSnapshot)
|
436
439
|
Configuration.add_member_subclass(:ecr_repository, Types::Configuration::EcrRepository)
|
@@ -443,6 +446,7 @@ module Aws::AccessAnalyzer
|
|
443
446
|
Configuration.add_member_subclass(:s3_bucket, Types::Configuration::S3Bucket)
|
444
447
|
Configuration.add_member_subclass(:sns_topic, Types::Configuration::SnsTopic)
|
445
448
|
Configuration.add_member_subclass(:sqs_queue, Types::Configuration::SqsQueue)
|
449
|
+
Configuration.add_member_subclass(:s3_express_directory_bucket, Types::Configuration::S3ExpressDirectoryBucket)
|
446
450
|
Configuration.add_member_subclass(:unknown, Types::Configuration::Unknown)
|
447
451
|
Configuration.struct_class = Types::Configuration
|
448
452
|
|
@@ -923,6 +927,9 @@ module Aws::AccessAnalyzer
|
|
923
927
|
S3BucketConfiguration.add_member(:access_points, Shapes::ShapeRef.new(shape: S3AccessPointConfigurationsMap, location_name: "accessPoints"))
|
924
928
|
S3BucketConfiguration.struct_class = Types::S3BucketConfiguration
|
925
929
|
|
930
|
+
S3ExpressDirectoryBucketConfiguration.add_member(:bucket_policy, Shapes::ShapeRef.new(shape: S3ExpressDirectoryBucketPolicy, location_name: "bucketPolicy"))
|
931
|
+
S3ExpressDirectoryBucketConfiguration.struct_class = Types::S3ExpressDirectoryBucketConfiguration
|
932
|
+
|
926
933
|
S3PublicAccessBlockConfiguration.add_member(:ignore_public_acls, Shapes::ShapeRef.new(shape: Boolean, required: true, location_name: "ignorePublicAcls"))
|
927
934
|
S3PublicAccessBlockConfiguration.add_member(:restrict_public_buckets, Shapes::ShapeRef.new(shape: Boolean, required: true, location_name: "restrictPublicBuckets"))
|
928
935
|
S3PublicAccessBlockConfiguration.struct_class = Types::S3PublicAccessBlockConfiguration
|
@@ -14,6 +14,7 @@ module Aws::AccessAnalyzer
|
|
14
14
|
option(
|
15
15
|
:endpoint_provider,
|
16
16
|
doc_type: 'Aws::AccessAnalyzer::EndpointProvider',
|
17
|
+
rbs_type: 'untyped',
|
17
18
|
docstring: 'The endpoint provider used to resolve endpoints. Any '\
|
18
19
|
'object that responds to `#resolve_endpoint(parameters)` '\
|
19
20
|
'where `parameters` is a Struct similar to '\
|
@@ -25,16 +26,17 @@ module Aws::AccessAnalyzer
|
|
25
26
|
# @api private
|
26
27
|
class Handler < Seahorse::Client::Handler
|
27
28
|
def call(context)
|
28
|
-
# If endpoint was discovered, do not resolve or apply the endpoint.
|
29
29
|
unless context[:discovered_endpoint]
|
30
30
|
params = parameters_for_operation(context)
|
31
31
|
endpoint = context.config.endpoint_provider.resolve_endpoint(params)
|
32
32
|
|
33
33
|
context.http_request.endpoint = endpoint.url
|
34
34
|
apply_endpoint_headers(context, endpoint.headers)
|
35
|
+
|
36
|
+
context[:endpoint_params] = params
|
37
|
+
context[:endpoint_properties] = endpoint.properties
|
35
38
|
end
|
36
39
|
|
37
|
-
context[:endpoint_params] = params
|
38
40
|
context[:auth_scheme] =
|
39
41
|
Aws::Endpoints.resolve_auth_scheme(context, endpoint)
|
40
42
|
|
@@ -788,7 +788,7 @@ module Aws::AccessAnalyzer
|
|
788
788
|
# @return [Types::SecretsManagerSecretConfiguration]
|
789
789
|
#
|
790
790
|
# @!attribute [rw] s3_bucket
|
791
|
-
# The access control configuration is for an Amazon S3
|
791
|
+
# The access control configuration is for an Amazon S3 bucket.
|
792
792
|
# @return [Types::S3BucketConfiguration]
|
793
793
|
#
|
794
794
|
# @!attribute [rw] sns_topic
|
@@ -799,6 +799,11 @@ module Aws::AccessAnalyzer
|
|
799
799
|
# The access control configuration is for an Amazon SQS queue.
|
800
800
|
# @return [Types::SqsQueueConfiguration]
|
801
801
|
#
|
802
|
+
# @!attribute [rw] s3_express_directory_bucket
|
803
|
+
# The access control configuration is for an Amazon S3 directory
|
804
|
+
# bucket.
|
805
|
+
# @return [Types::S3ExpressDirectoryBucketConfiguration]
|
806
|
+
#
|
802
807
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/Configuration AWS API Documentation
|
803
808
|
#
|
804
809
|
class Configuration < Struct.new(
|
@@ -813,6 +818,7 @@ module Aws::AccessAnalyzer
|
|
813
818
|
:s3_bucket,
|
814
819
|
:sns_topic,
|
815
820
|
:sqs_queue,
|
821
|
+
:s3_express_directory_bucket,
|
816
822
|
:unknown)
|
817
823
|
SENSITIVE = []
|
818
824
|
include Aws::Structure
|
@@ -829,6 +835,7 @@ module Aws::AccessAnalyzer
|
|
829
835
|
class S3Bucket < Configuration; end
|
830
836
|
class SnsTopic < Configuration; end
|
831
837
|
class SqsQueue < Configuration; end
|
838
|
+
class S3ExpressDirectoryBucket < Configuration; end
|
832
839
|
class Unknown < Configuration; end
|
833
840
|
end
|
834
841
|
|
@@ -3224,6 +3231,35 @@ module Aws::AccessAnalyzer
|
|
3224
3231
|
include Aws::Structure
|
3225
3232
|
end
|
3226
3233
|
|
3234
|
+
# Proposed access control configuration for an Amazon S3 directory
|
3235
|
+
# bucket. You can propose a configuration for a new Amazon S3 directory
|
3236
|
+
# bucket or an existing Amazon S3 directory bucket that you own by
|
3237
|
+
# specifying the Amazon S3 bucket policy. If the configuration is for an
|
3238
|
+
# existing Amazon S3 directory bucket and you do not specify the Amazon
|
3239
|
+
# S3 bucket policy, the access preview uses the existing policy attached
|
3240
|
+
# to the directory bucket. If the access preview is for a new resource
|
3241
|
+
# and you do not specify the Amazon S3 bucket policy, the access preview
|
3242
|
+
# assumes an directory bucket without a policy. To propose deletion of
|
3243
|
+
# an existing bucket policy, you can specify an empty string. For more
|
3244
|
+
# information about bucket policy limits, see [Example bucket
|
3245
|
+
# policies][1].
|
3246
|
+
#
|
3247
|
+
#
|
3248
|
+
#
|
3249
|
+
# [1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-security-iam-example-bucket-policies.html
|
3250
|
+
#
|
3251
|
+
# @!attribute [rw] bucket_policy
|
3252
|
+
# The proposed bucket policy for the Amazon S3 directory bucket.
|
3253
|
+
# @return [String]
|
3254
|
+
#
|
3255
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/S3ExpressDirectoryBucketConfiguration AWS API Documentation
|
3256
|
+
#
|
3257
|
+
class S3ExpressDirectoryBucketConfiguration < Struct.new(
|
3258
|
+
:bucket_policy)
|
3259
|
+
SENSITIVE = []
|
3260
|
+
include Aws::Structure
|
3261
|
+
end
|
3262
|
+
|
3227
3263
|
# The `PublicAccessBlock` configuration to apply to this Amazon S3
|
3228
3264
|
# bucket. If the proposed configuration is for an existing Amazon S3
|
3229
3265
|
# bucket and the configuration is not specified, the access preview uses
|