aws-sdk-accessanalyzer 1.43.0 → 1.45.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-accessanalyzer/client.rb +13 -9
- data/lib/aws-sdk-accessanalyzer/client_api.rb +7 -0
- data/lib/aws-sdk-accessanalyzer/plugins/endpoints.rb +4 -2
- data/lib/aws-sdk-accessanalyzer/types.rb +37 -1
- data/lib/aws-sdk-accessanalyzer.rb +1 -1
- data/sig/client.rbs +606 -0
- data/sig/errors.rbs +53 -0
- data/sig/resource.rbs +79 -0
- data/sig/types.rbs +1043 -0
- data/sig/waiters.rbs +13 -0
- metadata +13 -8
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 30d0b5758c70e8399097de843e90a31c4ac6e75e2c229978ea195dfad1538900
|
4
|
+
data.tar.gz: 5c6ef08352a8b4a6d900f309a7b206cdbda0cb1fc61030dfbd1565ebf74611a7
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: a432058a5fe3ac9bfc4c82fbc70cd95f8175b0064448172b302528af20fac9dcf31b233cf8f98d6f3c91e207e43ce7a04f782a4956a7a49e1f79be53952379f6
|
7
|
+
data.tar.gz: 4dcebb78315e71a4692601a9c03022856c7bf2dc9a5f860f174f7938121136ef8de51d56a778a8e04294c54458760dff744c86f985923bcbae39aacb26631939
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.45.0 (2024-01-26)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
8
|
+
|
9
|
+
1.44.0 (2023-11-28)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - This release adds support for external access findings for S3 directory buckets to help you easily identify cross-account access. Updated service API, documentation, and paginators.
|
13
|
+
|
4
14
|
1.43.0 (2023-11-27)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.45.0
|
@@ -695,6 +695,9 @@ module Aws::AccessAnalyzer
|
|
695
695
|
# sqs_queue: {
|
696
696
|
# queue_policy: "SqsQueuePolicy",
|
697
697
|
# },
|
698
|
+
# s3_express_directory_bucket: {
|
699
|
+
# bucket_policy: "S3ExpressDirectoryBucketPolicy",
|
700
|
+
# },
|
698
701
|
# },
|
699
702
|
# },
|
700
703
|
# client_token: "String",
|
@@ -982,6 +985,7 @@ module Aws::AccessAnalyzer
|
|
982
985
|
# resp.access_preview.configurations["ConfigurationsMapKey"].s3_bucket.access_points["AccessPointArn"].network_origin.vpc_configuration.vpc_id #=> String
|
983
986
|
# resp.access_preview.configurations["ConfigurationsMapKey"].sns_topic.topic_policy #=> String
|
984
987
|
# resp.access_preview.configurations["ConfigurationsMapKey"].sqs_queue.queue_policy #=> String
|
988
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].s3_express_directory_bucket.bucket_policy #=> String
|
985
989
|
# resp.access_preview.created_at #=> Time
|
986
990
|
# resp.access_preview.status #=> String, one of "COMPLETED", "CREATING", "FAILED"
|
987
991
|
# resp.access_preview.status_reason.code #=> String, one of "INTERNAL_ERROR", "INVALID_CONFIGURATION"
|
@@ -1021,7 +1025,7 @@ module Aws::AccessAnalyzer
|
|
1021
1025
|
# @example Response structure
|
1022
1026
|
#
|
1023
1027
|
# resp.resource.resource_arn #=> String
|
1024
|
-
# resp.resource.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic"
|
1028
|
+
# resp.resource.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket"
|
1025
1029
|
# resp.resource.created_at #=> Time
|
1026
1030
|
# resp.resource.analyzed_at #=> Time
|
1027
1031
|
# resp.resource.updated_at #=> Time
|
@@ -1162,7 +1166,7 @@ module Aws::AccessAnalyzer
|
|
1162
1166
|
# resp.finding.action[0] #=> String
|
1163
1167
|
# resp.finding.resource #=> String
|
1164
1168
|
# resp.finding.is_public #=> Boolean
|
1165
|
-
# resp.finding.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic"
|
1169
|
+
# resp.finding.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket"
|
1166
1170
|
# resp.finding.condition #=> Hash
|
1167
1171
|
# resp.finding.condition["String"] #=> String
|
1168
1172
|
# resp.finding.created_at #=> Time
|
@@ -1237,7 +1241,7 @@ module Aws::AccessAnalyzer
|
|
1237
1241
|
# resp.id #=> String
|
1238
1242
|
# resp.next_token #=> String
|
1239
1243
|
# resp.resource #=> String
|
1240
|
-
# resp.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic"
|
1244
|
+
# resp.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket"
|
1241
1245
|
# resp.resource_owner_account #=> String
|
1242
1246
|
# resp.status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
|
1243
1247
|
# resp.updated_at #=> Time
|
@@ -1400,7 +1404,7 @@ module Aws::AccessAnalyzer
|
|
1400
1404
|
# resp.findings[0].condition["String"] #=> String
|
1401
1405
|
# resp.findings[0].resource #=> String
|
1402
1406
|
# resp.findings[0].is_public #=> Boolean
|
1403
|
-
# resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic"
|
1407
|
+
# resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket"
|
1404
1408
|
# resp.findings[0].created_at #=> Time
|
1405
1409
|
# resp.findings[0].change_type #=> String, one of "CHANGED", "NEW", "UNCHANGED"
|
1406
1410
|
# resp.findings[0].status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
|
@@ -1501,7 +1505,7 @@ module Aws::AccessAnalyzer
|
|
1501
1505
|
#
|
1502
1506
|
# resp = client.list_analyzed_resources({
|
1503
1507
|
# analyzer_arn: "AnalyzerArn", # required
|
1504
|
-
# resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key, AWS::SecretsManager::Secret, AWS::EFS::FileSystem, AWS::EC2::Snapshot, AWS::ECR::Repository, AWS::RDS::DBSnapshot, AWS::RDS::DBClusterSnapshot, AWS::SNS::Topic
|
1508
|
+
# resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key, AWS::SecretsManager::Secret, AWS::EFS::FileSystem, AWS::EC2::Snapshot, AWS::ECR::Repository, AWS::RDS::DBSnapshot, AWS::RDS::DBClusterSnapshot, AWS::SNS::Topic, AWS::S3Express::DirectoryBucket
|
1505
1509
|
# next_token: "Token",
|
1506
1510
|
# max_results: 1,
|
1507
1511
|
# })
|
@@ -1511,7 +1515,7 @@ module Aws::AccessAnalyzer
|
|
1511
1515
|
# resp.analyzed_resources #=> Array
|
1512
1516
|
# resp.analyzed_resources[0].resource_arn #=> String
|
1513
1517
|
# resp.analyzed_resources[0].resource_owner_account #=> String
|
1514
|
-
# resp.analyzed_resources[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic"
|
1518
|
+
# resp.analyzed_resources[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket"
|
1515
1519
|
# resp.next_token #=> String
|
1516
1520
|
#
|
1517
1521
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ListAnalyzedResources AWS API Documentation
|
@@ -1691,7 +1695,7 @@ module Aws::AccessAnalyzer
|
|
1691
1695
|
# resp.findings[0].action[0] #=> String
|
1692
1696
|
# resp.findings[0].resource #=> String
|
1693
1697
|
# resp.findings[0].is_public #=> Boolean
|
1694
|
-
# resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic"
|
1698
|
+
# resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket"
|
1695
1699
|
# resp.findings[0].condition #=> Hash
|
1696
1700
|
# resp.findings[0].condition["String"] #=> String
|
1697
1701
|
# resp.findings[0].created_at #=> Time
|
@@ -1779,7 +1783,7 @@ module Aws::AccessAnalyzer
|
|
1779
1783
|
# resp.findings[0].error #=> String
|
1780
1784
|
# resp.findings[0].id #=> String
|
1781
1785
|
# resp.findings[0].resource #=> String
|
1782
|
-
# resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic"
|
1786
|
+
# resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket"
|
1783
1787
|
# resp.findings[0].resource_owner_account #=> String
|
1784
1788
|
# resp.findings[0].status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
|
1785
1789
|
# resp.findings[0].updated_at #=> Time
|
@@ -2224,7 +2228,7 @@ module Aws::AccessAnalyzer
|
|
2224
2228
|
params: params,
|
2225
2229
|
config: config)
|
2226
2230
|
context[:gem_name] = 'aws-sdk-accessanalyzer'
|
2227
|
-
context[:gem_version] = '1.
|
2231
|
+
context[:gem_version] = '1.45.0'
|
2228
2232
|
Seahorse::Client::Request.new(handlers, context)
|
2229
2233
|
end
|
2230
2234
|
|
@@ -213,6 +213,8 @@ module Aws::AccessAnalyzer
|
|
213
213
|
S3BucketAclGrantConfigurationsList = Shapes::ListShape.new(name: 'S3BucketAclGrantConfigurationsList')
|
214
214
|
S3BucketConfiguration = Shapes::StructureShape.new(name: 'S3BucketConfiguration')
|
215
215
|
S3BucketPolicy = Shapes::StringShape.new(name: 'S3BucketPolicy')
|
216
|
+
S3ExpressDirectoryBucketConfiguration = Shapes::StructureShape.new(name: 'S3ExpressDirectoryBucketConfiguration')
|
217
|
+
S3ExpressDirectoryBucketPolicy = Shapes::StringShape.new(name: 'S3ExpressDirectoryBucketPolicy')
|
216
218
|
S3PublicAccessBlockConfiguration = Shapes::StructureShape.new(name: 'S3PublicAccessBlockConfiguration')
|
217
219
|
SecretsManagerSecretConfiguration = Shapes::StructureShape.new(name: 'SecretsManagerSecretConfiguration')
|
218
220
|
SecretsManagerSecretKmsId = Shapes::StringShape.new(name: 'SecretsManagerSecretKmsId')
|
@@ -431,6 +433,7 @@ module Aws::AccessAnalyzer
|
|
431
433
|
Configuration.add_member(:s3_bucket, Shapes::ShapeRef.new(shape: S3BucketConfiguration, location_name: "s3Bucket"))
|
432
434
|
Configuration.add_member(:sns_topic, Shapes::ShapeRef.new(shape: SnsTopicConfiguration, location_name: "snsTopic"))
|
433
435
|
Configuration.add_member(:sqs_queue, Shapes::ShapeRef.new(shape: SqsQueueConfiguration, location_name: "sqsQueue"))
|
436
|
+
Configuration.add_member(:s3_express_directory_bucket, Shapes::ShapeRef.new(shape: S3ExpressDirectoryBucketConfiguration, location_name: "s3ExpressDirectoryBucket"))
|
434
437
|
Configuration.add_member(:unknown, Shapes::ShapeRef.new(shape: nil, location_name: 'unknown'))
|
435
438
|
Configuration.add_member_subclass(:ebs_snapshot, Types::Configuration::EbsSnapshot)
|
436
439
|
Configuration.add_member_subclass(:ecr_repository, Types::Configuration::EcrRepository)
|
@@ -443,6 +446,7 @@ module Aws::AccessAnalyzer
|
|
443
446
|
Configuration.add_member_subclass(:s3_bucket, Types::Configuration::S3Bucket)
|
444
447
|
Configuration.add_member_subclass(:sns_topic, Types::Configuration::SnsTopic)
|
445
448
|
Configuration.add_member_subclass(:sqs_queue, Types::Configuration::SqsQueue)
|
449
|
+
Configuration.add_member_subclass(:s3_express_directory_bucket, Types::Configuration::S3ExpressDirectoryBucket)
|
446
450
|
Configuration.add_member_subclass(:unknown, Types::Configuration::Unknown)
|
447
451
|
Configuration.struct_class = Types::Configuration
|
448
452
|
|
@@ -923,6 +927,9 @@ module Aws::AccessAnalyzer
|
|
923
927
|
S3BucketConfiguration.add_member(:access_points, Shapes::ShapeRef.new(shape: S3AccessPointConfigurationsMap, location_name: "accessPoints"))
|
924
928
|
S3BucketConfiguration.struct_class = Types::S3BucketConfiguration
|
925
929
|
|
930
|
+
S3ExpressDirectoryBucketConfiguration.add_member(:bucket_policy, Shapes::ShapeRef.new(shape: S3ExpressDirectoryBucketPolicy, location_name: "bucketPolicy"))
|
931
|
+
S3ExpressDirectoryBucketConfiguration.struct_class = Types::S3ExpressDirectoryBucketConfiguration
|
932
|
+
|
926
933
|
S3PublicAccessBlockConfiguration.add_member(:ignore_public_acls, Shapes::ShapeRef.new(shape: Boolean, required: true, location_name: "ignorePublicAcls"))
|
927
934
|
S3PublicAccessBlockConfiguration.add_member(:restrict_public_buckets, Shapes::ShapeRef.new(shape: Boolean, required: true, location_name: "restrictPublicBuckets"))
|
928
935
|
S3PublicAccessBlockConfiguration.struct_class = Types::S3PublicAccessBlockConfiguration
|
@@ -14,6 +14,7 @@ module Aws::AccessAnalyzer
|
|
14
14
|
option(
|
15
15
|
:endpoint_provider,
|
16
16
|
doc_type: 'Aws::AccessAnalyzer::EndpointProvider',
|
17
|
+
rbs_type: 'untyped',
|
17
18
|
docstring: 'The endpoint provider used to resolve endpoints. Any '\
|
18
19
|
'object that responds to `#resolve_endpoint(parameters)` '\
|
19
20
|
'where `parameters` is a Struct similar to '\
|
@@ -25,16 +26,17 @@ module Aws::AccessAnalyzer
|
|
25
26
|
# @api private
|
26
27
|
class Handler < Seahorse::Client::Handler
|
27
28
|
def call(context)
|
28
|
-
# If endpoint was discovered, do not resolve or apply the endpoint.
|
29
29
|
unless context[:discovered_endpoint]
|
30
30
|
params = parameters_for_operation(context)
|
31
31
|
endpoint = context.config.endpoint_provider.resolve_endpoint(params)
|
32
32
|
|
33
33
|
context.http_request.endpoint = endpoint.url
|
34
34
|
apply_endpoint_headers(context, endpoint.headers)
|
35
|
+
|
36
|
+
context[:endpoint_params] = params
|
37
|
+
context[:endpoint_properties] = endpoint.properties
|
35
38
|
end
|
36
39
|
|
37
|
-
context[:endpoint_params] = params
|
38
40
|
context[:auth_scheme] =
|
39
41
|
Aws::Endpoints.resolve_auth_scheme(context, endpoint)
|
40
42
|
|
@@ -788,7 +788,7 @@ module Aws::AccessAnalyzer
|
|
788
788
|
# @return [Types::SecretsManagerSecretConfiguration]
|
789
789
|
#
|
790
790
|
# @!attribute [rw] s3_bucket
|
791
|
-
# The access control configuration is for an Amazon S3
|
791
|
+
# The access control configuration is for an Amazon S3 bucket.
|
792
792
|
# @return [Types::S3BucketConfiguration]
|
793
793
|
#
|
794
794
|
# @!attribute [rw] sns_topic
|
@@ -799,6 +799,11 @@ module Aws::AccessAnalyzer
|
|
799
799
|
# The access control configuration is for an Amazon SQS queue.
|
800
800
|
# @return [Types::SqsQueueConfiguration]
|
801
801
|
#
|
802
|
+
# @!attribute [rw] s3_express_directory_bucket
|
803
|
+
# The access control configuration is for an Amazon S3 directory
|
804
|
+
# bucket.
|
805
|
+
# @return [Types::S3ExpressDirectoryBucketConfiguration]
|
806
|
+
#
|
802
807
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/Configuration AWS API Documentation
|
803
808
|
#
|
804
809
|
class Configuration < Struct.new(
|
@@ -813,6 +818,7 @@ module Aws::AccessAnalyzer
|
|
813
818
|
:s3_bucket,
|
814
819
|
:sns_topic,
|
815
820
|
:sqs_queue,
|
821
|
+
:s3_express_directory_bucket,
|
816
822
|
:unknown)
|
817
823
|
SENSITIVE = []
|
818
824
|
include Aws::Structure
|
@@ -829,6 +835,7 @@ module Aws::AccessAnalyzer
|
|
829
835
|
class S3Bucket < Configuration; end
|
830
836
|
class SnsTopic < Configuration; end
|
831
837
|
class SqsQueue < Configuration; end
|
838
|
+
class S3ExpressDirectoryBucket < Configuration; end
|
832
839
|
class Unknown < Configuration; end
|
833
840
|
end
|
834
841
|
|
@@ -3224,6 +3231,35 @@ module Aws::AccessAnalyzer
|
|
3224
3231
|
include Aws::Structure
|
3225
3232
|
end
|
3226
3233
|
|
3234
|
+
# Proposed access control configuration for an Amazon S3 directory
|
3235
|
+
# bucket. You can propose a configuration for a new Amazon S3 directory
|
3236
|
+
# bucket or an existing Amazon S3 directory bucket that you own by
|
3237
|
+
# specifying the Amazon S3 bucket policy. If the configuration is for an
|
3238
|
+
# existing Amazon S3 directory bucket and you do not specify the Amazon
|
3239
|
+
# S3 bucket policy, the access preview uses the existing policy attached
|
3240
|
+
# to the directory bucket. If the access preview is for a new resource
|
3241
|
+
# and you do not specify the Amazon S3 bucket policy, the access preview
|
3242
|
+
# assumes an directory bucket without a policy. To propose deletion of
|
3243
|
+
# an existing bucket policy, you can specify an empty string. For more
|
3244
|
+
# information about bucket policy limits, see [Example bucket
|
3245
|
+
# policies][1].
|
3246
|
+
#
|
3247
|
+
#
|
3248
|
+
#
|
3249
|
+
# [1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-security-iam-example-bucket-policies.html
|
3250
|
+
#
|
3251
|
+
# @!attribute [rw] bucket_policy
|
3252
|
+
# The proposed bucket policy for the Amazon S3 directory bucket.
|
3253
|
+
# @return [String]
|
3254
|
+
#
|
3255
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/S3ExpressDirectoryBucketConfiguration AWS API Documentation
|
3256
|
+
#
|
3257
|
+
class S3ExpressDirectoryBucketConfiguration < Struct.new(
|
3258
|
+
:bucket_policy)
|
3259
|
+
SENSITIVE = []
|
3260
|
+
include Aws::Structure
|
3261
|
+
end
|
3262
|
+
|
3227
3263
|
# The `PublicAccessBlock` configuration to apply to this Amazon S3
|
3228
3264
|
# bucket. If the proposed configuration is for an existing Amazon S3
|
3229
3265
|
# bucket and the configuration is not specified, the access preview uses
|