aws-sdk-accessanalyzer 1.43.0 → 1.45.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: d8b47cfae651b3a9b193e49c16aa44cbfcbe875662a38a45fa48fa26e4edd422
4
- data.tar.gz: 33c9d5eaadb1afcda0f5d8506a8826c6c58af9d6155a9fb7d88f62cbae0db965
3
+ metadata.gz: 30d0b5758c70e8399097de843e90a31c4ac6e75e2c229978ea195dfad1538900
4
+ data.tar.gz: 5c6ef08352a8b4a6d900f309a7b206cdbda0cb1fc61030dfbd1565ebf74611a7
5
5
  SHA512:
6
- metadata.gz: ce91c46bf6efb30b58534e145ff01ea523d5709e133cefecec11ad5919c4eb532fe5c98391145c29c0658a09a181f5db446c2a6a81607db45d0608f024d2a697
7
- data.tar.gz: '095cdb0877a4251d3e359d966da143c59c368f075cf857032a435f23974bb2dac6ac9a2b930b14934685667a366f5d4666d393a8af08fc84186fabc249134c3e'
6
+ metadata.gz: a432058a5fe3ac9bfc4c82fbc70cd95f8175b0064448172b302528af20fac9dcf31b233cf8f98d6f3c91e207e43ce7a04f782a4956a7a49e1f79be53952379f6
7
+ data.tar.gz: 4dcebb78315e71a4692601a9c03022856c7bf2dc9a5f860f174f7938121136ef8de51d56a778a8e04294c54458760dff744c86f985923bcbae39aacb26631939
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.45.0 (2024-01-26)
5
+ ------------------
6
+
7
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
8
+
9
+ 1.44.0 (2023-11-28)
10
+ ------------------
11
+
12
+ * Feature - This release adds support for external access findings for S3 directory buckets to help you easily identify cross-account access. Updated service API, documentation, and paginators.
13
+
4
14
  1.43.0 (2023-11-27)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.43.0
1
+ 1.45.0
@@ -695,6 +695,9 @@ module Aws::AccessAnalyzer
695
695
  # sqs_queue: {
696
696
  # queue_policy: "SqsQueuePolicy",
697
697
  # },
698
+ # s3_express_directory_bucket: {
699
+ # bucket_policy: "S3ExpressDirectoryBucketPolicy",
700
+ # },
698
701
  # },
699
702
  # },
700
703
  # client_token: "String",
@@ -982,6 +985,7 @@ module Aws::AccessAnalyzer
982
985
  # resp.access_preview.configurations["ConfigurationsMapKey"].s3_bucket.access_points["AccessPointArn"].network_origin.vpc_configuration.vpc_id #=> String
983
986
  # resp.access_preview.configurations["ConfigurationsMapKey"].sns_topic.topic_policy #=> String
984
987
  # resp.access_preview.configurations["ConfigurationsMapKey"].sqs_queue.queue_policy #=> String
988
+ # resp.access_preview.configurations["ConfigurationsMapKey"].s3_express_directory_bucket.bucket_policy #=> String
985
989
  # resp.access_preview.created_at #=> Time
986
990
  # resp.access_preview.status #=> String, one of "COMPLETED", "CREATING", "FAILED"
987
991
  # resp.access_preview.status_reason.code #=> String, one of "INTERNAL_ERROR", "INVALID_CONFIGURATION"
@@ -1021,7 +1025,7 @@ module Aws::AccessAnalyzer
1021
1025
  # @example Response structure
1022
1026
  #
1023
1027
  # resp.resource.resource_arn #=> String
1024
- # resp.resource.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic"
1028
+ # resp.resource.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket"
1025
1029
  # resp.resource.created_at #=> Time
1026
1030
  # resp.resource.analyzed_at #=> Time
1027
1031
  # resp.resource.updated_at #=> Time
@@ -1162,7 +1166,7 @@ module Aws::AccessAnalyzer
1162
1166
  # resp.finding.action[0] #=> String
1163
1167
  # resp.finding.resource #=> String
1164
1168
  # resp.finding.is_public #=> Boolean
1165
- # resp.finding.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic"
1169
+ # resp.finding.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket"
1166
1170
  # resp.finding.condition #=> Hash
1167
1171
  # resp.finding.condition["String"] #=> String
1168
1172
  # resp.finding.created_at #=> Time
@@ -1237,7 +1241,7 @@ module Aws::AccessAnalyzer
1237
1241
  # resp.id #=> String
1238
1242
  # resp.next_token #=> String
1239
1243
  # resp.resource #=> String
1240
- # resp.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic"
1244
+ # resp.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket"
1241
1245
  # resp.resource_owner_account #=> String
1242
1246
  # resp.status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
1243
1247
  # resp.updated_at #=> Time
@@ -1400,7 +1404,7 @@ module Aws::AccessAnalyzer
1400
1404
  # resp.findings[0].condition["String"] #=> String
1401
1405
  # resp.findings[0].resource #=> String
1402
1406
  # resp.findings[0].is_public #=> Boolean
1403
- # resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic"
1407
+ # resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket"
1404
1408
  # resp.findings[0].created_at #=> Time
1405
1409
  # resp.findings[0].change_type #=> String, one of "CHANGED", "NEW", "UNCHANGED"
1406
1410
  # resp.findings[0].status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
@@ -1501,7 +1505,7 @@ module Aws::AccessAnalyzer
1501
1505
  #
1502
1506
  # resp = client.list_analyzed_resources({
1503
1507
  # analyzer_arn: "AnalyzerArn", # required
1504
- # resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key, AWS::SecretsManager::Secret, AWS::EFS::FileSystem, AWS::EC2::Snapshot, AWS::ECR::Repository, AWS::RDS::DBSnapshot, AWS::RDS::DBClusterSnapshot, AWS::SNS::Topic
1508
+ # resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key, AWS::SecretsManager::Secret, AWS::EFS::FileSystem, AWS::EC2::Snapshot, AWS::ECR::Repository, AWS::RDS::DBSnapshot, AWS::RDS::DBClusterSnapshot, AWS::SNS::Topic, AWS::S3Express::DirectoryBucket
1505
1509
  # next_token: "Token",
1506
1510
  # max_results: 1,
1507
1511
  # })
@@ -1511,7 +1515,7 @@ module Aws::AccessAnalyzer
1511
1515
  # resp.analyzed_resources #=> Array
1512
1516
  # resp.analyzed_resources[0].resource_arn #=> String
1513
1517
  # resp.analyzed_resources[0].resource_owner_account #=> String
1514
- # resp.analyzed_resources[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic"
1518
+ # resp.analyzed_resources[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket"
1515
1519
  # resp.next_token #=> String
1516
1520
  #
1517
1521
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ListAnalyzedResources AWS API Documentation
@@ -1691,7 +1695,7 @@ module Aws::AccessAnalyzer
1691
1695
  # resp.findings[0].action[0] #=> String
1692
1696
  # resp.findings[0].resource #=> String
1693
1697
  # resp.findings[0].is_public #=> Boolean
1694
- # resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic"
1698
+ # resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket"
1695
1699
  # resp.findings[0].condition #=> Hash
1696
1700
  # resp.findings[0].condition["String"] #=> String
1697
1701
  # resp.findings[0].created_at #=> Time
@@ -1779,7 +1783,7 @@ module Aws::AccessAnalyzer
1779
1783
  # resp.findings[0].error #=> String
1780
1784
  # resp.findings[0].id #=> String
1781
1785
  # resp.findings[0].resource #=> String
1782
- # resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic"
1786
+ # resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket"
1783
1787
  # resp.findings[0].resource_owner_account #=> String
1784
1788
  # resp.findings[0].status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
1785
1789
  # resp.findings[0].updated_at #=> Time
@@ -2224,7 +2228,7 @@ module Aws::AccessAnalyzer
2224
2228
  params: params,
2225
2229
  config: config)
2226
2230
  context[:gem_name] = 'aws-sdk-accessanalyzer'
2227
- context[:gem_version] = '1.43.0'
2231
+ context[:gem_version] = '1.45.0'
2228
2232
  Seahorse::Client::Request.new(handlers, context)
2229
2233
  end
2230
2234
 
@@ -213,6 +213,8 @@ module Aws::AccessAnalyzer
213
213
  S3BucketAclGrantConfigurationsList = Shapes::ListShape.new(name: 'S3BucketAclGrantConfigurationsList')
214
214
  S3BucketConfiguration = Shapes::StructureShape.new(name: 'S3BucketConfiguration')
215
215
  S3BucketPolicy = Shapes::StringShape.new(name: 'S3BucketPolicy')
216
+ S3ExpressDirectoryBucketConfiguration = Shapes::StructureShape.new(name: 'S3ExpressDirectoryBucketConfiguration')
217
+ S3ExpressDirectoryBucketPolicy = Shapes::StringShape.new(name: 'S3ExpressDirectoryBucketPolicy')
216
218
  S3PublicAccessBlockConfiguration = Shapes::StructureShape.new(name: 'S3PublicAccessBlockConfiguration')
217
219
  SecretsManagerSecretConfiguration = Shapes::StructureShape.new(name: 'SecretsManagerSecretConfiguration')
218
220
  SecretsManagerSecretKmsId = Shapes::StringShape.new(name: 'SecretsManagerSecretKmsId')
@@ -431,6 +433,7 @@ module Aws::AccessAnalyzer
431
433
  Configuration.add_member(:s3_bucket, Shapes::ShapeRef.new(shape: S3BucketConfiguration, location_name: "s3Bucket"))
432
434
  Configuration.add_member(:sns_topic, Shapes::ShapeRef.new(shape: SnsTopicConfiguration, location_name: "snsTopic"))
433
435
  Configuration.add_member(:sqs_queue, Shapes::ShapeRef.new(shape: SqsQueueConfiguration, location_name: "sqsQueue"))
436
+ Configuration.add_member(:s3_express_directory_bucket, Shapes::ShapeRef.new(shape: S3ExpressDirectoryBucketConfiguration, location_name: "s3ExpressDirectoryBucket"))
434
437
  Configuration.add_member(:unknown, Shapes::ShapeRef.new(shape: nil, location_name: 'unknown'))
435
438
  Configuration.add_member_subclass(:ebs_snapshot, Types::Configuration::EbsSnapshot)
436
439
  Configuration.add_member_subclass(:ecr_repository, Types::Configuration::EcrRepository)
@@ -443,6 +446,7 @@ module Aws::AccessAnalyzer
443
446
  Configuration.add_member_subclass(:s3_bucket, Types::Configuration::S3Bucket)
444
447
  Configuration.add_member_subclass(:sns_topic, Types::Configuration::SnsTopic)
445
448
  Configuration.add_member_subclass(:sqs_queue, Types::Configuration::SqsQueue)
449
+ Configuration.add_member_subclass(:s3_express_directory_bucket, Types::Configuration::S3ExpressDirectoryBucket)
446
450
  Configuration.add_member_subclass(:unknown, Types::Configuration::Unknown)
447
451
  Configuration.struct_class = Types::Configuration
448
452
 
@@ -923,6 +927,9 @@ module Aws::AccessAnalyzer
923
927
  S3BucketConfiguration.add_member(:access_points, Shapes::ShapeRef.new(shape: S3AccessPointConfigurationsMap, location_name: "accessPoints"))
924
928
  S3BucketConfiguration.struct_class = Types::S3BucketConfiguration
925
929
 
930
+ S3ExpressDirectoryBucketConfiguration.add_member(:bucket_policy, Shapes::ShapeRef.new(shape: S3ExpressDirectoryBucketPolicy, location_name: "bucketPolicy"))
931
+ S3ExpressDirectoryBucketConfiguration.struct_class = Types::S3ExpressDirectoryBucketConfiguration
932
+
926
933
  S3PublicAccessBlockConfiguration.add_member(:ignore_public_acls, Shapes::ShapeRef.new(shape: Boolean, required: true, location_name: "ignorePublicAcls"))
927
934
  S3PublicAccessBlockConfiguration.add_member(:restrict_public_buckets, Shapes::ShapeRef.new(shape: Boolean, required: true, location_name: "restrictPublicBuckets"))
928
935
  S3PublicAccessBlockConfiguration.struct_class = Types::S3PublicAccessBlockConfiguration
@@ -14,6 +14,7 @@ module Aws::AccessAnalyzer
14
14
  option(
15
15
  :endpoint_provider,
16
16
  doc_type: 'Aws::AccessAnalyzer::EndpointProvider',
17
+ rbs_type: 'untyped',
17
18
  docstring: 'The endpoint provider used to resolve endpoints. Any '\
18
19
  'object that responds to `#resolve_endpoint(parameters)` '\
19
20
  'where `parameters` is a Struct similar to '\
@@ -25,16 +26,17 @@ module Aws::AccessAnalyzer
25
26
  # @api private
26
27
  class Handler < Seahorse::Client::Handler
27
28
  def call(context)
28
- # If endpoint was discovered, do not resolve or apply the endpoint.
29
29
  unless context[:discovered_endpoint]
30
30
  params = parameters_for_operation(context)
31
31
  endpoint = context.config.endpoint_provider.resolve_endpoint(params)
32
32
 
33
33
  context.http_request.endpoint = endpoint.url
34
34
  apply_endpoint_headers(context, endpoint.headers)
35
+
36
+ context[:endpoint_params] = params
37
+ context[:endpoint_properties] = endpoint.properties
35
38
  end
36
39
 
37
- context[:endpoint_params] = params
38
40
  context[:auth_scheme] =
39
41
  Aws::Endpoints.resolve_auth_scheme(context, endpoint)
40
42
 
@@ -788,7 +788,7 @@ module Aws::AccessAnalyzer
788
788
  # @return [Types::SecretsManagerSecretConfiguration]
789
789
  #
790
790
  # @!attribute [rw] s3_bucket
791
- # The access control configuration is for an Amazon S3 Bucket.
791
+ # The access control configuration is for an Amazon S3 bucket.
792
792
  # @return [Types::S3BucketConfiguration]
793
793
  #
794
794
  # @!attribute [rw] sns_topic
@@ -799,6 +799,11 @@ module Aws::AccessAnalyzer
799
799
  # The access control configuration is for an Amazon SQS queue.
800
800
  # @return [Types::SqsQueueConfiguration]
801
801
  #
802
+ # @!attribute [rw] s3_express_directory_bucket
803
+ # The access control configuration is for an Amazon S3 directory
804
+ # bucket.
805
+ # @return [Types::S3ExpressDirectoryBucketConfiguration]
806
+ #
802
807
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/Configuration AWS API Documentation
803
808
  #
804
809
  class Configuration < Struct.new(
@@ -813,6 +818,7 @@ module Aws::AccessAnalyzer
813
818
  :s3_bucket,
814
819
  :sns_topic,
815
820
  :sqs_queue,
821
+ :s3_express_directory_bucket,
816
822
  :unknown)
817
823
  SENSITIVE = []
818
824
  include Aws::Structure
@@ -829,6 +835,7 @@ module Aws::AccessAnalyzer
829
835
  class S3Bucket < Configuration; end
830
836
  class SnsTopic < Configuration; end
831
837
  class SqsQueue < Configuration; end
838
+ class S3ExpressDirectoryBucket < Configuration; end
832
839
  class Unknown < Configuration; end
833
840
  end
834
841
 
@@ -3224,6 +3231,35 @@ module Aws::AccessAnalyzer
3224
3231
  include Aws::Structure
3225
3232
  end
3226
3233
 
3234
+ # Proposed access control configuration for an Amazon S3 directory
3235
+ # bucket. You can propose a configuration for a new Amazon S3 directory
3236
+ # bucket or an existing Amazon S3 directory bucket that you own by
3237
+ # specifying the Amazon S3 bucket policy. If the configuration is for an
3238
+ # existing Amazon S3 directory bucket and you do not specify the Amazon
3239
+ # S3 bucket policy, the access preview uses the existing policy attached
3240
+ # to the directory bucket. If the access preview is for a new resource
3241
+ # and you do not specify the Amazon S3 bucket policy, the access preview
3242
+ # assumes an directory bucket without a policy. To propose deletion of
3243
+ # an existing bucket policy, you can specify an empty string. For more
3244
+ # information about bucket policy limits, see [Example bucket
3245
+ # policies][1].
3246
+ #
3247
+ #
3248
+ #
3249
+ # [1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-security-iam-example-bucket-policies.html
3250
+ #
3251
+ # @!attribute [rw] bucket_policy
3252
+ # The proposed bucket policy for the Amazon S3 directory bucket.
3253
+ # @return [String]
3254
+ #
3255
+ # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/S3ExpressDirectoryBucketConfiguration AWS API Documentation
3256
+ #
3257
+ class S3ExpressDirectoryBucketConfiguration < Struct.new(
3258
+ :bucket_policy)
3259
+ SENSITIVE = []
3260
+ include Aws::Structure
3261
+ end
3262
+
3227
3263
  # The `PublicAccessBlock` configuration to apply to this Amazon S3
3228
3264
  # bucket. If the proposed configuration is for an existing Amazon S3
3229
3265
  # bucket and the configuration is not specified, the access preview uses
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-accessanalyzer/customizations'
52
52
  # @!group service
53
53
  module Aws::AccessAnalyzer
54
54
 
55
- GEM_VERSION = '1.43.0'
55
+ GEM_VERSION = '1.45.0'
56
56
 
57
57
  end