aws-sdk-accessanalyzer 1.61.0 → 1.63.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 53a13ba99f718e6aa61c3c5260551d9cb47474ca19d3384890c357d144ff79cd
4
- data.tar.gz: e0354b42a617673d2e21200d6dc25a58905fc2060ec1f99de67f3f6b7d0d47f4
3
+ metadata.gz: c447bf8de1d6dd1a90d8e44347b1ac0c11b4e4f66631639613f55e7e46befd42
4
+ data.tar.gz: 9c7ae9c351e0d8259bf12f8af1e344d696a7ed44e77d1cc12e4f3563f7f757bb
5
5
  SHA512:
6
- metadata.gz: 99b53c539273846884dfd65a1ef2af8a7f0b1669de84f373b17ac883e528e9bd05e675d020087d7fa90bba777e642a1676fa99588e1d94e67266e044de152e8e
7
- data.tar.gz: 6c598991dcb7889b26e20932036e7ccfaad576bc430d20dee6e1d0945f55446428a701afa2fe6ed9d8bf5abe6f5de50d102e3ba5d08bbb465855885d2ca5823f
6
+ metadata.gz: bb005943fd3fb07e498393000ce199903ad7ee88531bea0b7183686202fc53afcb34c7709263cbd850280cba1e2b25a7f011ea3b3d8274609a93a711ac8f3ffd
7
+ data.tar.gz: 60b3142ad2acbccdef1908dae580bb99f08c7411aac664e6edb25cb8d38afa2381d04c7e6252bc177adcd288b17fbb4bf4e289e4fc65722525850ae3dc476605
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.63.0 (2024-11-13)
5
+ ------------------
6
+
7
+ * Feature - This release adds support for policy validation and external access findings for resource control policies (RCP). IAM Access Analyzer helps you author functional and secure RCPs and awareness that a RCP may restrict external access. Updated service API, documentation, and paginators.
8
+
9
+ 1.62.0 (2024-11-06)
10
+ ------------------
11
+
12
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
13
+
4
14
  1.61.0 (2024-10-18)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.61.0
1
+ 1.63.0
@@ -514,11 +514,12 @@ module Aws::AccessAnalyzer
514
514
  # @option params [required, Array<Types::Access>] :access
515
515
  # An access object containing the permissions that shouldn't be granted
516
516
  # by the specified policy. If only actions are specified, IAM Access
517
- # Analyzer checks for access of the actions on all resources in the
518
- # policy. If only resources are specified, then IAM Access Analyzer
519
- # checks which actions have access to the specified resources. If both
520
- # actions and resources are specified, then IAM Access Analyzer checks
521
- # which of the specified actions have access to the specified resources.
517
+ # Analyzer checks for access to peform at least one of the actions on
518
+ # any resource in the policy. If only resources are specified, then IAM
519
+ # Access Analyzer checks for access to perform any action on at least
520
+ # one of the resources. If both actions and resources are specified, IAM
521
+ # Access Analyzer checks for access to perform at least one of the
522
+ # specified actions on at least one of the specified resources.
522
523
  #
523
524
  # @option params [required, String] :policy_type
524
525
  # The type of policy. Identity policies grant permissions to IAM
@@ -527,9 +528,7 @@ module Aws::AccessAnalyzer
527
528
  #
528
529
  # Resource policies grant permissions on Amazon Web Services resources.
529
530
  # Resource policies include trust policies for IAM roles and bucket
530
- # policies for Amazon S3 buckets. You can provide a generic input such
531
- # as identity policy or resource policy or a specific input such as
532
- # managed policy or Amazon S3 bucket policy.
531
+ # policies for Amazon S3 buckets.
533
532
  #
534
533
  # @return [Types::CheckAccessNotGrantedResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
535
534
  #
@@ -1452,6 +1451,7 @@ module Aws::AccessAnalyzer
1452
1451
  # resp.finding.sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT", "S3_ACCESS_POINT_ACCOUNT"
1453
1452
  # resp.finding.sources[0].detail.access_point_arn #=> String
1454
1453
  # resp.finding.sources[0].detail.access_point_account #=> String
1454
+ # resp.finding.resource_control_policy_restriction #=> String, one of "APPLICABLE", "FAILED_TO_EVALUATE_RCP", "NOT_APPLICABLE"
1455
1455
  #
1456
1456
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/GetFinding AWS API Documentation
1457
1457
  #
@@ -1678,6 +1678,7 @@ module Aws::AccessAnalyzer
1678
1678
  # resp.finding_details[0].external_access_details.sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT", "S3_ACCESS_POINT_ACCOUNT"
1679
1679
  # resp.finding_details[0].external_access_details.sources[0].detail.access_point_arn #=> String
1680
1680
  # resp.finding_details[0].external_access_details.sources[0].detail.access_point_account #=> String
1681
+ # resp.finding_details[0].external_access_details.resource_control_policy_restriction #=> String, one of "APPLICABLE", "FAILED_TO_EVALUATE_RCP", "NOT_APPLICABLE"
1681
1682
  # resp.finding_details[0].unused_permission_details.actions #=> Array
1682
1683
  # resp.finding_details[0].unused_permission_details.actions[0].action #=> String
1683
1684
  # resp.finding_details[0].unused_permission_details.actions[0].last_accessed #=> Time
@@ -1712,8 +1713,8 @@ module Aws::AccessAnalyzer
1712
1713
  # that support resource level granularity in policies.
1713
1714
  #
1714
1715
  # For example, in the resource section of a policy, you can receive a
1715
- # placeholder such as `"Resource":"arn:aws:s3:::$\{BucketName\}"`
1716
- # instead of `"*"`.
1716
+ # placeholder such as `"Resource":"arn:aws:s3:::${BucketName}"` instead
1717
+ # of `"*"`.
1717
1718
  #
1718
1719
  # @option params [Boolean] :include_service_level_template
1719
1720
  # The level of detail that you want to generate. You can specify whether
@@ -1835,6 +1836,7 @@ module Aws::AccessAnalyzer
1835
1836
  # resp.findings[0].sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT", "S3_ACCESS_POINT_ACCOUNT"
1836
1837
  # resp.findings[0].sources[0].detail.access_point_arn #=> String
1837
1838
  # resp.findings[0].sources[0].detail.access_point_account #=> String
1839
+ # resp.findings[0].resource_control_policy_restriction #=> String, one of "APPLICABLE", "FAILED_TO_EVALUATE_RCP", "NOT_APPLICABLE"
1838
1840
  # resp.next_token #=> String
1839
1841
  #
1840
1842
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ListAccessPreviewFindings AWS API Documentation
@@ -2134,6 +2136,7 @@ module Aws::AccessAnalyzer
2134
2136
  # resp.findings[0].sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT", "S3_ACCESS_POINT_ACCOUNT"
2135
2137
  # resp.findings[0].sources[0].detail.access_point_arn #=> String
2136
2138
  # resp.findings[0].sources[0].detail.access_point_account #=> String
2139
+ # resp.findings[0].resource_control_policy_restriction #=> String, one of "APPLICABLE", "FAILED_TO_EVALUATE_RCP", "NOT_APPLICABLE"
2137
2140
  # resp.next_token #=> String
2138
2141
  #
2139
2142
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ListFindings AWS API Documentation
@@ -2610,7 +2613,7 @@ module Aws::AccessAnalyzer
2610
2613
  # max_results: 1,
2611
2614
  # next_token: "Token",
2612
2615
  # policy_document: "PolicyDocument", # required
2613
- # policy_type: "IDENTITY_POLICY", # required, accepts IDENTITY_POLICY, RESOURCE_POLICY, SERVICE_CONTROL_POLICY
2616
+ # policy_type: "IDENTITY_POLICY", # required, accepts IDENTITY_POLICY, RESOURCE_POLICY, SERVICE_CONTROL_POLICY, RESOURCE_CONTROL_POLICY
2614
2617
  # validate_policy_resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::S3::AccessPoint, AWS::S3::MultiRegionAccessPoint, AWS::S3ObjectLambda::AccessPoint, AWS::IAM::AssumeRolePolicyDocument, AWS::DynamoDB::Table
2615
2618
  # })
2616
2619
  #
@@ -2663,7 +2666,7 @@ module Aws::AccessAnalyzer
2663
2666
  tracer: tracer
2664
2667
  )
2665
2668
  context[:gem_name] = 'aws-sdk-accessanalyzer'
2666
- context[:gem_version] = '1.61.0'
2669
+ context[:gem_version] = '1.63.0'
2667
2670
  Seahorse::Client::Request.new(handlers, context)
2668
2671
  end
2669
2672
 
@@ -225,6 +225,7 @@ module Aws::AccessAnalyzer
225
225
  RegionList = Shapes::ListShape.new(name: 'RegionList')
226
226
  Resource = Shapes::StringShape.new(name: 'Resource')
227
227
  ResourceArn = Shapes::StringShape.new(name: 'ResourceArn')
228
+ ResourceControlPolicyRestriction = Shapes::StringShape.new(name: 'ResourceControlPolicyRestriction')
228
229
  ResourceNotFoundException = Shapes::StructureShape.new(name: 'ResourceNotFoundException')
229
230
  ResourceType = Shapes::StringShape.new(name: 'ResourceType')
230
231
  RetiringPrincipal = Shapes::StringShape.new(name: 'RetiringPrincipal')
@@ -327,6 +328,7 @@ module Aws::AccessAnalyzer
327
328
  AccessPreviewFinding.add_member(:resource_owner_account, Shapes::ShapeRef.new(shape: String, required: true, location_name: "resourceOwnerAccount"))
328
329
  AccessPreviewFinding.add_member(:error, Shapes::ShapeRef.new(shape: String, location_name: "error"))
329
330
  AccessPreviewFinding.add_member(:sources, Shapes::ShapeRef.new(shape: FindingSourceList, location_name: "sources"))
331
+ AccessPreviewFinding.add_member(:resource_control_policy_restriction, Shapes::ShapeRef.new(shape: ResourceControlPolicyRestriction, location_name: "resourceControlPolicyRestriction"))
330
332
  AccessPreviewFinding.struct_class = Types::AccessPreviewFinding
331
333
 
332
334
  AccessPreviewFindingsList.member = Shapes::ShapeRef.new(shape: AccessPreviewFinding)
@@ -564,6 +566,7 @@ module Aws::AccessAnalyzer
564
566
  ExternalAccessDetails.add_member(:is_public, Shapes::ShapeRef.new(shape: Boolean, location_name: "isPublic"))
565
567
  ExternalAccessDetails.add_member(:principal, Shapes::ShapeRef.new(shape: PrincipalMap, location_name: "principal"))
566
568
  ExternalAccessDetails.add_member(:sources, Shapes::ShapeRef.new(shape: FindingSourceList, location_name: "sources"))
569
+ ExternalAccessDetails.add_member(:resource_control_policy_restriction, Shapes::ShapeRef.new(shape: ResourceControlPolicyRestriction, location_name: "resourceControlPolicyRestriction"))
567
570
  ExternalAccessDetails.struct_class = Types::ExternalAccessDetails
568
571
 
569
572
  FilterCriteriaMap.key = Shapes::ShapeRef.new(shape: String)
@@ -583,6 +586,7 @@ module Aws::AccessAnalyzer
583
586
  Finding.add_member(:resource_owner_account, Shapes::ShapeRef.new(shape: String, required: true, location_name: "resourceOwnerAccount"))
584
587
  Finding.add_member(:error, Shapes::ShapeRef.new(shape: String, location_name: "error"))
585
588
  Finding.add_member(:sources, Shapes::ShapeRef.new(shape: FindingSourceList, location_name: "sources"))
589
+ Finding.add_member(:resource_control_policy_restriction, Shapes::ShapeRef.new(shape: ResourceControlPolicyRestriction, location_name: "resourceControlPolicyRestriction"))
586
590
  Finding.struct_class = Types::Finding
587
591
 
588
592
  FindingDetails.add_member(:external_access_details, Shapes::ShapeRef.new(shape: ExternalAccessDetails, location_name: "externalAccessDetails"))
@@ -627,6 +631,7 @@ module Aws::AccessAnalyzer
627
631
  FindingSummary.add_member(:resource_owner_account, Shapes::ShapeRef.new(shape: String, required: true, location_name: "resourceOwnerAccount"))
628
632
  FindingSummary.add_member(:error, Shapes::ShapeRef.new(shape: String, location_name: "error"))
629
633
  FindingSummary.add_member(:sources, Shapes::ShapeRef.new(shape: FindingSourceList, location_name: "sources"))
634
+ FindingSummary.add_member(:resource_control_policy_restriction, Shapes::ShapeRef.new(shape: ResourceControlPolicyRestriction, location_name: "resourceControlPolicyRestriction"))
630
635
  FindingSummary.struct_class = Types::FindingSummary
631
636
 
632
637
  FindingSummaryV2.add_member(:analyzed_at, Shapes::ShapeRef.new(shape: Timestamp, required: true, location_name: "analyzedAt"))
@@ -1183,6 +1188,7 @@ module Aws::AccessAnalyzer
1183
1188
 
1184
1189
  api.metadata = {
1185
1190
  "apiVersion" => "2019-11-01",
1191
+ "auth" => ["aws.auth#sigv4"],
1186
1192
  "endpointPrefix" => "access-analyzer",
1187
1193
  "protocol" => "rest-json",
1188
1194
  "protocols" => ["rest-json"],
@@ -21,8 +21,9 @@ module Aws::AccessAnalyzer
21
21
  #
22
22
  # @!attribute [rw] resources
23
23
  # A list of resources for the access permissions. Any strings that can
24
- # be used as a resource in an IAM policy can be used in the list of
25
- # resources to check.
24
+ # be used as an Amazon Resource Name (ARN) in an IAM policy can be
25
+ # used in the list of resources to check. You can only use a wildcard
26
+ # in the portion of the ARN that specifies the resource ID.
26
27
  # @return [Array<String>]
27
28
  #
28
29
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/Access AWS API Documentation
@@ -191,6 +192,11 @@ module Aws::AccessAnalyzer
191
192
  # bucket findings.
192
193
  # @return [Array<Types::FindingSource>]
193
194
  #
195
+ # @!attribute [rw] resource_control_policy_restriction
196
+ # The type of restriction applied to the finding by the resource owner
197
+ # with an Organizations resource control policy (RCP).
198
+ # @return [String]
199
+ #
194
200
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/AccessPreviewFinding AWS API Documentation
195
201
  #
196
202
  class AccessPreviewFinding < Struct.new(
@@ -208,7 +214,8 @@ module Aws::AccessAnalyzer
208
214
  :status,
209
215
  :resource_owner_account,
210
216
  :error,
211
- :sources)
217
+ :sources,
218
+ :resource_control_policy_restriction)
212
219
  SENSITIVE = []
213
220
  include Aws::Structure
214
221
  end
@@ -583,12 +590,13 @@ module Aws::AccessAnalyzer
583
590
  # @!attribute [rw] access
584
591
  # An access object containing the permissions that shouldn't be
585
592
  # granted by the specified policy. If only actions are specified, IAM
586
- # Access Analyzer checks for access of the actions on all resources in
587
- # the policy. If only resources are specified, then IAM Access
588
- # Analyzer checks which actions have access to the specified
589
- # resources. If both actions and resources are specified, then IAM
590
- # Access Analyzer checks which of the specified actions have access to
591
- # the specified resources.
593
+ # Access Analyzer checks for access to peform at least one of the
594
+ # actions on any resource in the policy. If only resources are
595
+ # specified, then IAM Access Analyzer checks for access to perform any
596
+ # action on at least one of the resources. If both actions and
597
+ # resources are specified, IAM Access Analyzer checks for access to
598
+ # perform at least one of the specified actions on at least one of the
599
+ # specified resources.
592
600
  # @return [Array<Types::Access>]
593
601
  #
594
602
  # @!attribute [rw] policy_type
@@ -598,9 +606,7 @@ module Aws::AccessAnalyzer
598
606
  #
599
607
  # Resource policies grant permissions on Amazon Web Services
600
608
  # resources. Resource policies include trust policies for IAM roles
601
- # and bucket policies for Amazon S3 buckets. You can provide a generic
602
- # input such as identity policy or resource policy or a specific input
603
- # such as managed policy or Amazon S3 bucket policy.
609
+ # and bucket policies for Amazon S3 buckets.
604
610
  # @return [String]
605
611
  #
606
612
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/CheckAccessNotGrantedRequest AWS API Documentation
@@ -1411,6 +1417,11 @@ module Aws::AccessAnalyzer
1411
1417
  # Amazon S3 bucket findings.
1412
1418
  # @return [Array<Types::FindingSource>]
1413
1419
  #
1420
+ # @!attribute [rw] resource_control_policy_restriction
1421
+ # The type of restriction applied to the finding by the resource owner
1422
+ # with an Organizations resource control policy (RCP).
1423
+ # @return [String]
1424
+ #
1414
1425
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ExternalAccessDetails AWS API Documentation
1415
1426
  #
1416
1427
  class ExternalAccessDetails < Struct.new(
@@ -1418,7 +1429,8 @@ module Aws::AccessAnalyzer
1418
1429
  :condition,
1419
1430
  :is_public,
1420
1431
  :principal,
1421
- :sources)
1432
+ :sources,
1433
+ :resource_control_policy_restriction)
1422
1434
  SENSITIVE = []
1423
1435
  include Aws::Structure
1424
1436
  end
@@ -1487,6 +1499,11 @@ module Aws::AccessAnalyzer
1487
1499
  # bucket findings.
1488
1500
  # @return [Array<Types::FindingSource>]
1489
1501
  #
1502
+ # @!attribute [rw] resource_control_policy_restriction
1503
+ # The type of restriction applied to the finding by the resource owner
1504
+ # with an Organizations resource control policy (RCP).
1505
+ # @return [String]
1506
+ #
1490
1507
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/Finding AWS API Documentation
1491
1508
  #
1492
1509
  class Finding < Struct.new(
@@ -1503,7 +1520,8 @@ module Aws::AccessAnalyzer
1503
1520
  :status,
1504
1521
  :resource_owner_account,
1505
1522
  :error,
1506
- :sources)
1523
+ :sources,
1524
+ :resource_control_policy_restriction)
1507
1525
  SENSITIVE = []
1508
1526
  include Aws::Structure
1509
1527
  end
@@ -1668,6 +1686,11 @@ module Aws::AccessAnalyzer
1668
1686
  # bucket findings.
1669
1687
  # @return [Array<Types::FindingSource>]
1670
1688
  #
1689
+ # @!attribute [rw] resource_control_policy_restriction
1690
+ # The type of restriction applied to the finding by the resource owner
1691
+ # with an Organizations resource control policy (RCP).
1692
+ # @return [String]
1693
+ #
1671
1694
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/FindingSummary AWS API Documentation
1672
1695
  #
1673
1696
  class FindingSummary < Struct.new(
@@ -1684,7 +1707,8 @@ module Aws::AccessAnalyzer
1684
1707
  :status,
1685
1708
  :resource_owner_account,
1686
1709
  :error,
1687
- :sources)
1710
+ :sources,
1711
+ :resource_control_policy_restriction)
1688
1712
  SENSITIVE = []
1689
1713
  include Aws::Structure
1690
1714
  end
@@ -2210,7 +2234,7 @@ module Aws::AccessAnalyzer
2210
2234
  # actions that support resource level granularity in policies.
2211
2235
  #
2212
2236
  # For example, in the resource section of a policy, you can receive a
2213
- # placeholder such as `"Resource":"arn:aws:s3:::$\{BucketName\}"`
2237
+ # placeholder such as `"Resource":"arn:aws:s3:::${BucketName}"`
2214
2238
  # instead of `"*"`.
2215
2239
  # @return [Boolean]
2216
2240
  #
@@ -54,7 +54,7 @@ module Aws::AccessAnalyzer
54
54
  autoload :EndpointProvider, 'aws-sdk-accessanalyzer/endpoint_provider'
55
55
  autoload :Endpoints, 'aws-sdk-accessanalyzer/endpoints'
56
56
 
57
- GEM_VERSION = '1.61.0'
57
+ GEM_VERSION = '1.63.0'
58
58
 
59
59
  end
60
60
 
data/sig/client.rbs CHANGED
@@ -645,7 +645,7 @@ module Aws
645
645
  ?max_results: ::Integer,
646
646
  ?next_token: ::String,
647
647
  policy_document: ::String,
648
- policy_type: ("IDENTITY_POLICY" | "RESOURCE_POLICY" | "SERVICE_CONTROL_POLICY"),
648
+ policy_type: ("IDENTITY_POLICY" | "RESOURCE_POLICY" | "SERVICE_CONTROL_POLICY" | "RESOURCE_CONTROL_POLICY"),
649
649
  ?validate_policy_resource_type: ("AWS::S3::Bucket" | "AWS::S3::AccessPoint" | "AWS::S3::MultiRegionAccessPoint" | "AWS::S3ObjectLambda::AccessPoint" | "AWS::IAM::AssumeRolePolicyDocument" | "AWS::DynamoDB::Table")
650
650
  ) -> _ValidatePolicyResponseSuccess
651
651
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _ValidatePolicyResponseSuccess
data/sig/types.rbs CHANGED
@@ -45,6 +45,7 @@ module Aws::AccessAnalyzer
45
45
  attr_accessor resource_owner_account: ::String
46
46
  attr_accessor error: ::String
47
47
  attr_accessor sources: ::Array[Types::FindingSource]
48
+ attr_accessor resource_control_policy_restriction: ("APPLICABLE" | "FAILED_TO_EVALUATE_RCP" | "NOT_APPLICABLE")
48
49
  SENSITIVE: []
49
50
  end
50
51
 
@@ -348,6 +349,7 @@ module Aws::AccessAnalyzer
348
349
  attr_accessor is_public: bool
349
350
  attr_accessor principal: ::Hash[::String, ::String]
350
351
  attr_accessor sources: ::Array[Types::FindingSource]
352
+ attr_accessor resource_control_policy_restriction: ("APPLICABLE" | "FAILED_TO_EVALUATE_RCP" | "NOT_APPLICABLE")
351
353
  SENSITIVE: []
352
354
  end
353
355
 
@@ -366,6 +368,7 @@ module Aws::AccessAnalyzer
366
368
  attr_accessor resource_owner_account: ::String
367
369
  attr_accessor error: ::String
368
370
  attr_accessor sources: ::Array[Types::FindingSource]
371
+ attr_accessor resource_control_policy_restriction: ("APPLICABLE" | "FAILED_TO_EVALUATE_RCP" | "NOT_APPLICABLE")
369
372
  SENSITIVE: []
370
373
  end
371
374
 
@@ -419,6 +422,7 @@ module Aws::AccessAnalyzer
419
422
  attr_accessor resource_owner_account: ::String
420
423
  attr_accessor error: ::String
421
424
  attr_accessor sources: ::Array[Types::FindingSource]
425
+ attr_accessor resource_control_policy_restriction: ("APPLICABLE" | "FAILED_TO_EVALUATE_RCP" | "NOT_APPLICABLE")
422
426
  SENSITIVE: []
423
427
  end
424
428
 
@@ -1092,7 +1096,7 @@ module Aws::AccessAnalyzer
1092
1096
  attr_accessor max_results: ::Integer
1093
1097
  attr_accessor next_token: ::String
1094
1098
  attr_accessor policy_document: ::String
1095
- attr_accessor policy_type: ("IDENTITY_POLICY" | "RESOURCE_POLICY" | "SERVICE_CONTROL_POLICY")
1099
+ attr_accessor policy_type: ("IDENTITY_POLICY" | "RESOURCE_POLICY" | "SERVICE_CONTROL_POLICY" | "RESOURCE_CONTROL_POLICY")
1096
1100
  attr_accessor validate_policy_resource_type: ("AWS::S3::Bucket" | "AWS::S3::AccessPoint" | "AWS::S3::MultiRegionAccessPoint" | "AWS::S3ObjectLambda::AccessPoint" | "AWS::IAM::AssumeRolePolicyDocument" | "AWS::DynamoDB::Table")
1097
1101
  SENSITIVE: []
1098
1102
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-accessanalyzer
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.61.0
4
+ version: 1.63.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-10-18 00:00:00.000000000 Z
11
+ date: 2024-11-13 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core
@@ -36,14 +36,14 @@ dependencies:
36
36
  requirements:
37
37
  - - "~>"
38
38
  - !ruby/object:Gem::Version
39
- version: '1.1'
39
+ version: '1.5'
40
40
  type: :runtime
41
41
  prerelease: false
42
42
  version_requirements: !ruby/object:Gem::Requirement
43
43
  requirements:
44
44
  - - "~>"
45
45
  - !ruby/object:Gem::Version
46
- version: '1.1'
46
+ version: '1.5'
47
47
  description: Official AWS Ruby gem for Access Analyzer. This gem is part of the AWS
48
48
  SDK for Ruby.
49
49
  email: