aws-sdk-accessanalyzer 1.44.0 → 1.46.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 285b48379971e72e2dffbe557211cd2eaf67ce95132ad62106e055d1bb247890
4
- data.tar.gz: 29e0cc6e1f4af53e6ecd79512eafa4cb4205045306d58c4b43e9eb86e7c490a2
3
+ metadata.gz: de74ac7ea07e298ce1f27abd56bbdbb0d453326d41bc6cfc8c99e354d0378084
4
+ data.tar.gz: 13215496a791944b864713f93a19c5ca28a0a542af8e2c2f9ca63e9f3280c74b
5
5
  SHA512:
6
- metadata.gz: b803e3c443b6abdbb6cc1892e8b4c7f7a5cb1d3e922ce1eae316cbd189f2cb5c8987087c941f970ebbac8a336c5d61e718d4161004640368244fb09b7f35a910
7
- data.tar.gz: 74d63e70911fde671d7fc76364d3d02c31a4b8e58b27bb98538072a95e7921b2cc8c703fa1dd56edf834659bc42eb1be4abb10dff2e4845df9afcd15ca818cfe
6
+ metadata.gz: fca86b1cd0dd7a060690e5ba2839ab1f0601c4896f94982fb65c3d7c38a2e313d7eac81eda643d62a1c119f158acdef584a1fcadc6a50ddf3ff3952aa377097e
7
+ data.tar.gz: 6647fa0e5b066738ebe9c195853c43b8a6c858f3fcf2feaf69d7aea815439dc63b84b353b1d85ecc467693454f9572a52825aae463895a7c44a5ad1281deef50
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.46.0 (2024-03-01)
5
+ ------------------
6
+
7
+ * Feature - Fixed a typo in description field.
8
+
9
+ 1.45.0 (2024-01-26)
10
+ ------------------
11
+
12
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
13
+
4
14
  1.44.0 (2023-11-28)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.44.0
1
+ 1.46.0
@@ -723,7 +723,7 @@ module Aws::AccessAnalyzer
723
723
  #
724
724
  # @option params [required, String] :type
725
725
  # The type of analyzer to create. Only `ACCOUNT`, `ORGANIZATION`,
726
- # `ACCOUNT_UNUSED_ACCESS`, and `ORGANIZTAION_UNUSED_ACCESS` analyzers
726
+ # `ACCOUNT_UNUSED_ACCESS`, and `ORGANIZATION_UNUSED_ACCESS` analyzers
727
727
  # are supported. You can create only one analyzer per account per
728
728
  # Region. You can create up to 5 analyzers per organization per Region.
729
729
  #
@@ -1134,7 +1134,10 @@ module Aws::AccessAnalyzer
1134
1134
  req.send_request(options)
1135
1135
  end
1136
1136
 
1137
- # Retrieves information about the specified finding.
1137
+ # Retrieves information about the specified finding. GetFinding and
1138
+ # GetFindingV2 both use `access-analyzer:GetFinding` in the `Action`
1139
+ # element of an IAM policy statement. You must have permission to
1140
+ # perform the `access-analyzer:GetFinding` action.
1138
1141
  #
1139
1142
  # @option params [required, String] :analyzer_arn
1140
1143
  # The [ARN of the analyzer][1] that generated the finding.
@@ -1189,7 +1192,10 @@ module Aws::AccessAnalyzer
1189
1192
  req.send_request(options)
1190
1193
  end
1191
1194
 
1192
- # Retrieves information about the specified finding.
1195
+ # Retrieves information about the specified finding. GetFinding and
1196
+ # GetFindingV2 both use `access-analyzer:GetFinding` in the `Action`
1197
+ # element of an IAM policy statement. You must have permission to
1198
+ # perform the `access-analyzer:GetFinding` action.
1193
1199
  #
1194
1200
  # @option params [required, String] :analyzer_arn
1195
1201
  # The [ARN of the analyzer][1] that generated the finding.
@@ -1475,7 +1481,8 @@ module Aws::AccessAnalyzer
1475
1481
  end
1476
1482
 
1477
1483
  # Retrieves a list of resources of the specified type that have been
1478
- # analyzed by the specified analyzer..
1484
+ # analyzed by the specified external access analyzer. This action is not
1485
+ # supported for unused access analyzers.
1479
1486
  #
1480
1487
  # @option params [required, String] :analyzer_arn
1481
1488
  # The [ARN of the analyzer][1] to retrieve a list of analyzed resources
@@ -1630,6 +1637,10 @@ module Aws::AccessAnalyzer
1630
1637
  end
1631
1638
 
1632
1639
  # Retrieves a list of findings generated by the specified analyzer.
1640
+ # ListFindings and ListFindingsV2 both use
1641
+ # `access-analyzer:ListFindings` in the `Action` element of an IAM
1642
+ # policy statement. You must have permission to perform the
1643
+ # `access-analyzer:ListFindings` action.
1633
1644
  #
1634
1645
  # To learn about filter keys that you can use to retrieve a list of
1635
1646
  # findings, see [IAM Access Analyzer filter keys][1] in the **IAM User
@@ -1720,6 +1731,10 @@ module Aws::AccessAnalyzer
1720
1731
  end
1721
1732
 
1722
1733
  # Retrieves a list of findings generated by the specified analyzer.
1734
+ # ListFindings and ListFindingsV2 both use
1735
+ # `access-analyzer:ListFindings` in the `Action` element of an IAM
1736
+ # policy statement. You must have permission to perform the
1737
+ # `access-analyzer:ListFindings` action.
1723
1738
  #
1724
1739
  # To learn about filter keys that you can use to retrieve a list of
1725
1740
  # findings, see [IAM Access Analyzer filter keys][1] in the **IAM User
@@ -2228,7 +2243,7 @@ module Aws::AccessAnalyzer
2228
2243
  params: params,
2229
2244
  config: config)
2230
2245
  context[:gem_name] = 'aws-sdk-accessanalyzer'
2231
- context[:gem_version] = '1.44.0'
2246
+ context[:gem_version] = '1.46.0'
2232
2247
  Seahorse::Client::Request.new(handlers, context)
2233
2248
  end
2234
2249
 
@@ -14,6 +14,7 @@ module Aws::AccessAnalyzer
14
14
  option(
15
15
  :endpoint_provider,
16
16
  doc_type: 'Aws::AccessAnalyzer::EndpointProvider',
17
+ rbs_type: 'untyped',
17
18
  docstring: 'The endpoint provider used to resolve endpoints. Any '\
18
19
  'object that responds to `#resolve_endpoint(parameters)` '\
19
20
  'where `parameters` is a Struct similar to '\
@@ -14,7 +14,9 @@ module Aws::AccessAnalyzer
14
14
  # against a policy.
15
15
  #
16
16
  # @!attribute [rw] actions
17
- # A list of actions for the access permissions.
17
+ # A list of actions for the access permissions. Any strings that can
18
+ # be used as an action in an IAM policy can be used in the list of
19
+ # actions to check.
18
20
  # @return [Array<String>]
19
21
  #
20
22
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/Access AWS API Documentation
@@ -917,7 +919,7 @@ module Aws::AccessAnalyzer
917
919
  #
918
920
  # @!attribute [rw] type
919
921
  # The type of analyzer to create. Only `ACCOUNT`, `ORGANIZATION`,
920
- # `ACCOUNT_UNUSED_ACCESS`, and `ORGANIZTAION_UNUSED_ACCESS` analyzers
922
+ # `ACCOUNT_UNUSED_ACCESS`, and `ORGANIZATION_UNUSED_ACCESS` analyzers
921
923
  # are supported. You can create only one analyzer per account per
922
924
  # Region. You can create up to 5 analyzers per organization per
923
925
  # Region.
@@ -3241,8 +3243,8 @@ module Aws::AccessAnalyzer
3241
3243
  # and you do not specify the Amazon S3 bucket policy, the access preview
3242
3244
  # assumes an directory bucket without a policy. To propose deletion of
3243
3245
  # an existing bucket policy, you can specify an empty string. For more
3244
- # information about bucket policy limits, see [Example bucket
3245
- # policies][1].
3246
+ # information about Amazon S3 directory bucket policies, see [Example
3247
+ # directory bucket policies for S3 Express One Zone][1].
3246
3248
  #
3247
3249
  #
3248
3250
  #
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-accessanalyzer/customizations'
52
52
  # @!group service
53
53
  module Aws::AccessAnalyzer
54
54
 
55
- GEM_VERSION = '1.44.0'
55
+ GEM_VERSION = '1.46.0'
56
56
 
57
57
  end