aws-sdk-accessanalyzer 1.44.0 → 1.46.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-accessanalyzer/client.rb +20 -5
- data/lib/aws-sdk-accessanalyzer/plugins/endpoints.rb +1 -0
- data/lib/aws-sdk-accessanalyzer/types.rb +6 -4
- data/lib/aws-sdk-accessanalyzer.rb +1 -1
- data/sig/client.rbs +606 -0
- data/sig/errors.rbs +53 -0
- data/sig/resource.rbs +79 -0
- data/sig/types.rbs +1043 -0
- data/sig/waiters.rbs +13 -0
- metadata +13 -8
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: de74ac7ea07e298ce1f27abd56bbdbb0d453326d41bc6cfc8c99e354d0378084
|
4
|
+
data.tar.gz: 13215496a791944b864713f93a19c5ca28a0a542af8e2c2f9ca63e9f3280c74b
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: fca86b1cd0dd7a060690e5ba2839ab1f0601c4896f94982fb65c3d7c38a2e313d7eac81eda643d62a1c119f158acdef584a1fcadc6a50ddf3ff3952aa377097e
|
7
|
+
data.tar.gz: 6647fa0e5b066738ebe9c195853c43b8a6c858f3fcf2feaf69d7aea815439dc63b84b353b1d85ecc467693454f9572a52825aae463895a7c44a5ad1281deef50
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.46.0 (2024-03-01)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Fixed a typo in description field.
|
8
|
+
|
9
|
+
1.45.0 (2024-01-26)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
13
|
+
|
4
14
|
1.44.0 (2023-11-28)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.46.0
|
@@ -723,7 +723,7 @@ module Aws::AccessAnalyzer
|
|
723
723
|
#
|
724
724
|
# @option params [required, String] :type
|
725
725
|
# The type of analyzer to create. Only `ACCOUNT`, `ORGANIZATION`,
|
726
|
-
# `ACCOUNT_UNUSED_ACCESS`, and `
|
726
|
+
# `ACCOUNT_UNUSED_ACCESS`, and `ORGANIZATION_UNUSED_ACCESS` analyzers
|
727
727
|
# are supported. You can create only one analyzer per account per
|
728
728
|
# Region. You can create up to 5 analyzers per organization per Region.
|
729
729
|
#
|
@@ -1134,7 +1134,10 @@ module Aws::AccessAnalyzer
|
|
1134
1134
|
req.send_request(options)
|
1135
1135
|
end
|
1136
1136
|
|
1137
|
-
# Retrieves information about the specified finding.
|
1137
|
+
# Retrieves information about the specified finding. GetFinding and
|
1138
|
+
# GetFindingV2 both use `access-analyzer:GetFinding` in the `Action`
|
1139
|
+
# element of an IAM policy statement. You must have permission to
|
1140
|
+
# perform the `access-analyzer:GetFinding` action.
|
1138
1141
|
#
|
1139
1142
|
# @option params [required, String] :analyzer_arn
|
1140
1143
|
# The [ARN of the analyzer][1] that generated the finding.
|
@@ -1189,7 +1192,10 @@ module Aws::AccessAnalyzer
|
|
1189
1192
|
req.send_request(options)
|
1190
1193
|
end
|
1191
1194
|
|
1192
|
-
# Retrieves information about the specified finding.
|
1195
|
+
# Retrieves information about the specified finding. GetFinding and
|
1196
|
+
# GetFindingV2 both use `access-analyzer:GetFinding` in the `Action`
|
1197
|
+
# element of an IAM policy statement. You must have permission to
|
1198
|
+
# perform the `access-analyzer:GetFinding` action.
|
1193
1199
|
#
|
1194
1200
|
# @option params [required, String] :analyzer_arn
|
1195
1201
|
# The [ARN of the analyzer][1] that generated the finding.
|
@@ -1475,7 +1481,8 @@ module Aws::AccessAnalyzer
|
|
1475
1481
|
end
|
1476
1482
|
|
1477
1483
|
# Retrieves a list of resources of the specified type that have been
|
1478
|
-
# analyzed by the specified analyzer
|
1484
|
+
# analyzed by the specified external access analyzer. This action is not
|
1485
|
+
# supported for unused access analyzers.
|
1479
1486
|
#
|
1480
1487
|
# @option params [required, String] :analyzer_arn
|
1481
1488
|
# The [ARN of the analyzer][1] to retrieve a list of analyzed resources
|
@@ -1630,6 +1637,10 @@ module Aws::AccessAnalyzer
|
|
1630
1637
|
end
|
1631
1638
|
|
1632
1639
|
# Retrieves a list of findings generated by the specified analyzer.
|
1640
|
+
# ListFindings and ListFindingsV2 both use
|
1641
|
+
# `access-analyzer:ListFindings` in the `Action` element of an IAM
|
1642
|
+
# policy statement. You must have permission to perform the
|
1643
|
+
# `access-analyzer:ListFindings` action.
|
1633
1644
|
#
|
1634
1645
|
# To learn about filter keys that you can use to retrieve a list of
|
1635
1646
|
# findings, see [IAM Access Analyzer filter keys][1] in the **IAM User
|
@@ -1720,6 +1731,10 @@ module Aws::AccessAnalyzer
|
|
1720
1731
|
end
|
1721
1732
|
|
1722
1733
|
# Retrieves a list of findings generated by the specified analyzer.
|
1734
|
+
# ListFindings and ListFindingsV2 both use
|
1735
|
+
# `access-analyzer:ListFindings` in the `Action` element of an IAM
|
1736
|
+
# policy statement. You must have permission to perform the
|
1737
|
+
# `access-analyzer:ListFindings` action.
|
1723
1738
|
#
|
1724
1739
|
# To learn about filter keys that you can use to retrieve a list of
|
1725
1740
|
# findings, see [IAM Access Analyzer filter keys][1] in the **IAM User
|
@@ -2228,7 +2243,7 @@ module Aws::AccessAnalyzer
|
|
2228
2243
|
params: params,
|
2229
2244
|
config: config)
|
2230
2245
|
context[:gem_name] = 'aws-sdk-accessanalyzer'
|
2231
|
-
context[:gem_version] = '1.
|
2246
|
+
context[:gem_version] = '1.46.0'
|
2232
2247
|
Seahorse::Client::Request.new(handlers, context)
|
2233
2248
|
end
|
2234
2249
|
|
@@ -14,6 +14,7 @@ module Aws::AccessAnalyzer
|
|
14
14
|
option(
|
15
15
|
:endpoint_provider,
|
16
16
|
doc_type: 'Aws::AccessAnalyzer::EndpointProvider',
|
17
|
+
rbs_type: 'untyped',
|
17
18
|
docstring: 'The endpoint provider used to resolve endpoints. Any '\
|
18
19
|
'object that responds to `#resolve_endpoint(parameters)` '\
|
19
20
|
'where `parameters` is a Struct similar to '\
|
@@ -14,7 +14,9 @@ module Aws::AccessAnalyzer
|
|
14
14
|
# against a policy.
|
15
15
|
#
|
16
16
|
# @!attribute [rw] actions
|
17
|
-
# A list of actions for the access permissions.
|
17
|
+
# A list of actions for the access permissions. Any strings that can
|
18
|
+
# be used as an action in an IAM policy can be used in the list of
|
19
|
+
# actions to check.
|
18
20
|
# @return [Array<String>]
|
19
21
|
#
|
20
22
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/Access AWS API Documentation
|
@@ -917,7 +919,7 @@ module Aws::AccessAnalyzer
|
|
917
919
|
#
|
918
920
|
# @!attribute [rw] type
|
919
921
|
# The type of analyzer to create. Only `ACCOUNT`, `ORGANIZATION`,
|
920
|
-
# `ACCOUNT_UNUSED_ACCESS`, and `
|
922
|
+
# `ACCOUNT_UNUSED_ACCESS`, and `ORGANIZATION_UNUSED_ACCESS` analyzers
|
921
923
|
# are supported. You can create only one analyzer per account per
|
922
924
|
# Region. You can create up to 5 analyzers per organization per
|
923
925
|
# Region.
|
@@ -3241,8 +3243,8 @@ module Aws::AccessAnalyzer
|
|
3241
3243
|
# and you do not specify the Amazon S3 bucket policy, the access preview
|
3242
3244
|
# assumes an directory bucket without a policy. To propose deletion of
|
3243
3245
|
# an existing bucket policy, you can specify an empty string. For more
|
3244
|
-
# information about bucket
|
3245
|
-
# policies][1].
|
3246
|
+
# information about Amazon S3 directory bucket policies, see [Example
|
3247
|
+
# directory bucket policies for S3 Express One Zone][1].
|
3246
3248
|
#
|
3247
3249
|
#
|
3248
3250
|
#
|