aws-sdk-accessanalyzer 1.44.0 → 1.46.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 285b48379971e72e2dffbe557211cd2eaf67ce95132ad62106e055d1bb247890
4
- data.tar.gz: 29e0cc6e1f4af53e6ecd79512eafa4cb4205045306d58c4b43e9eb86e7c490a2
3
+ metadata.gz: de74ac7ea07e298ce1f27abd56bbdbb0d453326d41bc6cfc8c99e354d0378084
4
+ data.tar.gz: 13215496a791944b864713f93a19c5ca28a0a542af8e2c2f9ca63e9f3280c74b
5
5
  SHA512:
6
- metadata.gz: b803e3c443b6abdbb6cc1892e8b4c7f7a5cb1d3e922ce1eae316cbd189f2cb5c8987087c941f970ebbac8a336c5d61e718d4161004640368244fb09b7f35a910
7
- data.tar.gz: 74d63e70911fde671d7fc76364d3d02c31a4b8e58b27bb98538072a95e7921b2cc8c703fa1dd56edf834659bc42eb1be4abb10dff2e4845df9afcd15ca818cfe
6
+ metadata.gz: fca86b1cd0dd7a060690e5ba2839ab1f0601c4896f94982fb65c3d7c38a2e313d7eac81eda643d62a1c119f158acdef584a1fcadc6a50ddf3ff3952aa377097e
7
+ data.tar.gz: 6647fa0e5b066738ebe9c195853c43b8a6c858f3fcf2feaf69d7aea815439dc63b84b353b1d85ecc467693454f9572a52825aae463895a7c44a5ad1281deef50
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.46.0 (2024-03-01)
5
+ ------------------
6
+
7
+ * Feature - Fixed a typo in description field.
8
+
9
+ 1.45.0 (2024-01-26)
10
+ ------------------
11
+
12
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
13
+
4
14
  1.44.0 (2023-11-28)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.44.0
1
+ 1.46.0
@@ -723,7 +723,7 @@ module Aws::AccessAnalyzer
723
723
  #
724
724
  # @option params [required, String] :type
725
725
  # The type of analyzer to create. Only `ACCOUNT`, `ORGANIZATION`,
726
- # `ACCOUNT_UNUSED_ACCESS`, and `ORGANIZTAION_UNUSED_ACCESS` analyzers
726
+ # `ACCOUNT_UNUSED_ACCESS`, and `ORGANIZATION_UNUSED_ACCESS` analyzers
727
727
  # are supported. You can create only one analyzer per account per
728
728
  # Region. You can create up to 5 analyzers per organization per Region.
729
729
  #
@@ -1134,7 +1134,10 @@ module Aws::AccessAnalyzer
1134
1134
  req.send_request(options)
1135
1135
  end
1136
1136
 
1137
- # Retrieves information about the specified finding.
1137
+ # Retrieves information about the specified finding. GetFinding and
1138
+ # GetFindingV2 both use `access-analyzer:GetFinding` in the `Action`
1139
+ # element of an IAM policy statement. You must have permission to
1140
+ # perform the `access-analyzer:GetFinding` action.
1138
1141
  #
1139
1142
  # @option params [required, String] :analyzer_arn
1140
1143
  # The [ARN of the analyzer][1] that generated the finding.
@@ -1189,7 +1192,10 @@ module Aws::AccessAnalyzer
1189
1192
  req.send_request(options)
1190
1193
  end
1191
1194
 
1192
- # Retrieves information about the specified finding.
1195
+ # Retrieves information about the specified finding. GetFinding and
1196
+ # GetFindingV2 both use `access-analyzer:GetFinding` in the `Action`
1197
+ # element of an IAM policy statement. You must have permission to
1198
+ # perform the `access-analyzer:GetFinding` action.
1193
1199
  #
1194
1200
  # @option params [required, String] :analyzer_arn
1195
1201
  # The [ARN of the analyzer][1] that generated the finding.
@@ -1475,7 +1481,8 @@ module Aws::AccessAnalyzer
1475
1481
  end
1476
1482
 
1477
1483
  # Retrieves a list of resources of the specified type that have been
1478
- # analyzed by the specified analyzer..
1484
+ # analyzed by the specified external access analyzer. This action is not
1485
+ # supported for unused access analyzers.
1479
1486
  #
1480
1487
  # @option params [required, String] :analyzer_arn
1481
1488
  # The [ARN of the analyzer][1] to retrieve a list of analyzed resources
@@ -1630,6 +1637,10 @@ module Aws::AccessAnalyzer
1630
1637
  end
1631
1638
 
1632
1639
  # Retrieves a list of findings generated by the specified analyzer.
1640
+ # ListFindings and ListFindingsV2 both use
1641
+ # `access-analyzer:ListFindings` in the `Action` element of an IAM
1642
+ # policy statement. You must have permission to perform the
1643
+ # `access-analyzer:ListFindings` action.
1633
1644
  #
1634
1645
  # To learn about filter keys that you can use to retrieve a list of
1635
1646
  # findings, see [IAM Access Analyzer filter keys][1] in the **IAM User
@@ -1720,6 +1731,10 @@ module Aws::AccessAnalyzer
1720
1731
  end
1721
1732
 
1722
1733
  # Retrieves a list of findings generated by the specified analyzer.
1734
+ # ListFindings and ListFindingsV2 both use
1735
+ # `access-analyzer:ListFindings` in the `Action` element of an IAM
1736
+ # policy statement. You must have permission to perform the
1737
+ # `access-analyzer:ListFindings` action.
1723
1738
  #
1724
1739
  # To learn about filter keys that you can use to retrieve a list of
1725
1740
  # findings, see [IAM Access Analyzer filter keys][1] in the **IAM User
@@ -2228,7 +2243,7 @@ module Aws::AccessAnalyzer
2228
2243
  params: params,
2229
2244
  config: config)
2230
2245
  context[:gem_name] = 'aws-sdk-accessanalyzer'
2231
- context[:gem_version] = '1.44.0'
2246
+ context[:gem_version] = '1.46.0'
2232
2247
  Seahorse::Client::Request.new(handlers, context)
2233
2248
  end
2234
2249
 
@@ -14,6 +14,7 @@ module Aws::AccessAnalyzer
14
14
  option(
15
15
  :endpoint_provider,
16
16
  doc_type: 'Aws::AccessAnalyzer::EndpointProvider',
17
+ rbs_type: 'untyped',
17
18
  docstring: 'The endpoint provider used to resolve endpoints. Any '\
18
19
  'object that responds to `#resolve_endpoint(parameters)` '\
19
20
  'where `parameters` is a Struct similar to '\
@@ -14,7 +14,9 @@ module Aws::AccessAnalyzer
14
14
  # against a policy.
15
15
  #
16
16
  # @!attribute [rw] actions
17
- # A list of actions for the access permissions.
17
+ # A list of actions for the access permissions. Any strings that can
18
+ # be used as an action in an IAM policy can be used in the list of
19
+ # actions to check.
18
20
  # @return [Array<String>]
19
21
  #
20
22
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/Access AWS API Documentation
@@ -917,7 +919,7 @@ module Aws::AccessAnalyzer
917
919
  #
918
920
  # @!attribute [rw] type
919
921
  # The type of analyzer to create. Only `ACCOUNT`, `ORGANIZATION`,
920
- # `ACCOUNT_UNUSED_ACCESS`, and `ORGANIZTAION_UNUSED_ACCESS` analyzers
922
+ # `ACCOUNT_UNUSED_ACCESS`, and `ORGANIZATION_UNUSED_ACCESS` analyzers
921
923
  # are supported. You can create only one analyzer per account per
922
924
  # Region. You can create up to 5 analyzers per organization per
923
925
  # Region.
@@ -3241,8 +3243,8 @@ module Aws::AccessAnalyzer
3241
3243
  # and you do not specify the Amazon S3 bucket policy, the access preview
3242
3244
  # assumes an directory bucket without a policy. To propose deletion of
3243
3245
  # an existing bucket policy, you can specify an empty string. For more
3244
- # information about bucket policy limits, see [Example bucket
3245
- # policies][1].
3246
+ # information about Amazon S3 directory bucket policies, see [Example
3247
+ # directory bucket policies for S3 Express One Zone][1].
3246
3248
  #
3247
3249
  #
3248
3250
  #
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-accessanalyzer/customizations'
52
52
  # @!group service
53
53
  module Aws::AccessAnalyzer
54
54
 
55
- GEM_VERSION = '1.44.0'
55
+ GEM_VERSION = '1.46.0'
56
56
 
57
57
  end