aws-sdk-accessanalyzer 1.44.0 → 1.46.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-accessanalyzer/client.rb +20 -5
- data/lib/aws-sdk-accessanalyzer/plugins/endpoints.rb +1 -0
- data/lib/aws-sdk-accessanalyzer/types.rb +6 -4
- data/lib/aws-sdk-accessanalyzer.rb +1 -1
- data/sig/client.rbs +606 -0
- data/sig/errors.rbs +53 -0
- data/sig/resource.rbs +79 -0
- data/sig/types.rbs +1043 -0
- data/sig/waiters.rbs +13 -0
- metadata +13 -8
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: de74ac7ea07e298ce1f27abd56bbdbb0d453326d41bc6cfc8c99e354d0378084
|
4
|
+
data.tar.gz: 13215496a791944b864713f93a19c5ca28a0a542af8e2c2f9ca63e9f3280c74b
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: fca86b1cd0dd7a060690e5ba2839ab1f0601c4896f94982fb65c3d7c38a2e313d7eac81eda643d62a1c119f158acdef584a1fcadc6a50ddf3ff3952aa377097e
|
7
|
+
data.tar.gz: 6647fa0e5b066738ebe9c195853c43b8a6c858f3fcf2feaf69d7aea815439dc63b84b353b1d85ecc467693454f9572a52825aae463895a7c44a5ad1281deef50
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.46.0 (2024-03-01)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Fixed a typo in description field.
|
8
|
+
|
9
|
+
1.45.0 (2024-01-26)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
13
|
+
|
4
14
|
1.44.0 (2023-11-28)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.46.0
|
@@ -723,7 +723,7 @@ module Aws::AccessAnalyzer
|
|
723
723
|
#
|
724
724
|
# @option params [required, String] :type
|
725
725
|
# The type of analyzer to create. Only `ACCOUNT`, `ORGANIZATION`,
|
726
|
-
# `ACCOUNT_UNUSED_ACCESS`, and `
|
726
|
+
# `ACCOUNT_UNUSED_ACCESS`, and `ORGANIZATION_UNUSED_ACCESS` analyzers
|
727
727
|
# are supported. You can create only one analyzer per account per
|
728
728
|
# Region. You can create up to 5 analyzers per organization per Region.
|
729
729
|
#
|
@@ -1134,7 +1134,10 @@ module Aws::AccessAnalyzer
|
|
1134
1134
|
req.send_request(options)
|
1135
1135
|
end
|
1136
1136
|
|
1137
|
-
# Retrieves information about the specified finding.
|
1137
|
+
# Retrieves information about the specified finding. GetFinding and
|
1138
|
+
# GetFindingV2 both use `access-analyzer:GetFinding` in the `Action`
|
1139
|
+
# element of an IAM policy statement. You must have permission to
|
1140
|
+
# perform the `access-analyzer:GetFinding` action.
|
1138
1141
|
#
|
1139
1142
|
# @option params [required, String] :analyzer_arn
|
1140
1143
|
# The [ARN of the analyzer][1] that generated the finding.
|
@@ -1189,7 +1192,10 @@ module Aws::AccessAnalyzer
|
|
1189
1192
|
req.send_request(options)
|
1190
1193
|
end
|
1191
1194
|
|
1192
|
-
# Retrieves information about the specified finding.
|
1195
|
+
# Retrieves information about the specified finding. GetFinding and
|
1196
|
+
# GetFindingV2 both use `access-analyzer:GetFinding` in the `Action`
|
1197
|
+
# element of an IAM policy statement. You must have permission to
|
1198
|
+
# perform the `access-analyzer:GetFinding` action.
|
1193
1199
|
#
|
1194
1200
|
# @option params [required, String] :analyzer_arn
|
1195
1201
|
# The [ARN of the analyzer][1] that generated the finding.
|
@@ -1475,7 +1481,8 @@ module Aws::AccessAnalyzer
|
|
1475
1481
|
end
|
1476
1482
|
|
1477
1483
|
# Retrieves a list of resources of the specified type that have been
|
1478
|
-
# analyzed by the specified analyzer
|
1484
|
+
# analyzed by the specified external access analyzer. This action is not
|
1485
|
+
# supported for unused access analyzers.
|
1479
1486
|
#
|
1480
1487
|
# @option params [required, String] :analyzer_arn
|
1481
1488
|
# The [ARN of the analyzer][1] to retrieve a list of analyzed resources
|
@@ -1630,6 +1637,10 @@ module Aws::AccessAnalyzer
|
|
1630
1637
|
end
|
1631
1638
|
|
1632
1639
|
# Retrieves a list of findings generated by the specified analyzer.
|
1640
|
+
# ListFindings and ListFindingsV2 both use
|
1641
|
+
# `access-analyzer:ListFindings` in the `Action` element of an IAM
|
1642
|
+
# policy statement. You must have permission to perform the
|
1643
|
+
# `access-analyzer:ListFindings` action.
|
1633
1644
|
#
|
1634
1645
|
# To learn about filter keys that you can use to retrieve a list of
|
1635
1646
|
# findings, see [IAM Access Analyzer filter keys][1] in the **IAM User
|
@@ -1720,6 +1731,10 @@ module Aws::AccessAnalyzer
|
|
1720
1731
|
end
|
1721
1732
|
|
1722
1733
|
# Retrieves a list of findings generated by the specified analyzer.
|
1734
|
+
# ListFindings and ListFindingsV2 both use
|
1735
|
+
# `access-analyzer:ListFindings` in the `Action` element of an IAM
|
1736
|
+
# policy statement. You must have permission to perform the
|
1737
|
+
# `access-analyzer:ListFindings` action.
|
1723
1738
|
#
|
1724
1739
|
# To learn about filter keys that you can use to retrieve a list of
|
1725
1740
|
# findings, see [IAM Access Analyzer filter keys][1] in the **IAM User
|
@@ -2228,7 +2243,7 @@ module Aws::AccessAnalyzer
|
|
2228
2243
|
params: params,
|
2229
2244
|
config: config)
|
2230
2245
|
context[:gem_name] = 'aws-sdk-accessanalyzer'
|
2231
|
-
context[:gem_version] = '1.
|
2246
|
+
context[:gem_version] = '1.46.0'
|
2232
2247
|
Seahorse::Client::Request.new(handlers, context)
|
2233
2248
|
end
|
2234
2249
|
|
@@ -14,6 +14,7 @@ module Aws::AccessAnalyzer
|
|
14
14
|
option(
|
15
15
|
:endpoint_provider,
|
16
16
|
doc_type: 'Aws::AccessAnalyzer::EndpointProvider',
|
17
|
+
rbs_type: 'untyped',
|
17
18
|
docstring: 'The endpoint provider used to resolve endpoints. Any '\
|
18
19
|
'object that responds to `#resolve_endpoint(parameters)` '\
|
19
20
|
'where `parameters` is a Struct similar to '\
|
@@ -14,7 +14,9 @@ module Aws::AccessAnalyzer
|
|
14
14
|
# against a policy.
|
15
15
|
#
|
16
16
|
# @!attribute [rw] actions
|
17
|
-
# A list of actions for the access permissions.
|
17
|
+
# A list of actions for the access permissions. Any strings that can
|
18
|
+
# be used as an action in an IAM policy can be used in the list of
|
19
|
+
# actions to check.
|
18
20
|
# @return [Array<String>]
|
19
21
|
#
|
20
22
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/Access AWS API Documentation
|
@@ -917,7 +919,7 @@ module Aws::AccessAnalyzer
|
|
917
919
|
#
|
918
920
|
# @!attribute [rw] type
|
919
921
|
# The type of analyzer to create. Only `ACCOUNT`, `ORGANIZATION`,
|
920
|
-
# `ACCOUNT_UNUSED_ACCESS`, and `
|
922
|
+
# `ACCOUNT_UNUSED_ACCESS`, and `ORGANIZATION_UNUSED_ACCESS` analyzers
|
921
923
|
# are supported. You can create only one analyzer per account per
|
922
924
|
# Region. You can create up to 5 analyzers per organization per
|
923
925
|
# Region.
|
@@ -3241,8 +3243,8 @@ module Aws::AccessAnalyzer
|
|
3241
3243
|
# and you do not specify the Amazon S3 bucket policy, the access preview
|
3242
3244
|
# assumes an directory bucket without a policy. To propose deletion of
|
3243
3245
|
# an existing bucket policy, you can specify an empty string. For more
|
3244
|
-
# information about bucket
|
3245
|
-
# policies][1].
|
3246
|
+
# information about Amazon S3 directory bucket policies, see [Example
|
3247
|
+
# directory bucket policies for S3 Express One Zone][1].
|
3246
3248
|
#
|
3247
3249
|
#
|
3248
3250
|
#
|