aws-sdk-accessanalyzer 1.61.0 → 1.63.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-accessanalyzer/client.rb +15 -12
- data/lib/aws-sdk-accessanalyzer/client_api.rb +6 -0
- data/lib/aws-sdk-accessanalyzer/types.rb +40 -16
- data/lib/aws-sdk-accessanalyzer.rb +1 -1
- data/sig/client.rbs +1 -1
- data/sig/types.rbs +5 -1
- metadata +4 -4
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: c447bf8de1d6dd1a90d8e44347b1ac0c11b4e4f66631639613f55e7e46befd42
|
4
|
+
data.tar.gz: 9c7ae9c351e0d8259bf12f8af1e344d696a7ed44e77d1cc12e4f3563f7f757bb
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: bb005943fd3fb07e498393000ce199903ad7ee88531bea0b7183686202fc53afcb34c7709263cbd850280cba1e2b25a7f011ea3b3d8274609a93a711ac8f3ffd
|
7
|
+
data.tar.gz: 60b3142ad2acbccdef1908dae580bb99f08c7411aac664e6edb25cb8d38afa2381d04c7e6252bc177adcd288b17fbb4bf4e289e4fc65722525850ae3dc476605
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.63.0 (2024-11-13)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - This release adds support for policy validation and external access findings for resource control policies (RCP). IAM Access Analyzer helps you author functional and secure RCPs and awareness that a RCP may restrict external access. Updated service API, documentation, and paginators.
|
8
|
+
|
9
|
+
1.62.0 (2024-11-06)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
13
|
+
|
4
14
|
1.61.0 (2024-10-18)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.63.0
|
@@ -514,11 +514,12 @@ module Aws::AccessAnalyzer
|
|
514
514
|
# @option params [required, Array<Types::Access>] :access
|
515
515
|
# An access object containing the permissions that shouldn't be granted
|
516
516
|
# by the specified policy. If only actions are specified, IAM Access
|
517
|
-
# Analyzer checks for access of the actions on
|
518
|
-
# policy. If only resources are specified, then IAM
|
519
|
-
#
|
520
|
-
# actions and resources are specified,
|
521
|
-
#
|
517
|
+
# Analyzer checks for access to peform at least one of the actions on
|
518
|
+
# any resource in the policy. If only resources are specified, then IAM
|
519
|
+
# Access Analyzer checks for access to perform any action on at least
|
520
|
+
# one of the resources. If both actions and resources are specified, IAM
|
521
|
+
# Access Analyzer checks for access to perform at least one of the
|
522
|
+
# specified actions on at least one of the specified resources.
|
522
523
|
#
|
523
524
|
# @option params [required, String] :policy_type
|
524
525
|
# The type of policy. Identity policies grant permissions to IAM
|
@@ -527,9 +528,7 @@ module Aws::AccessAnalyzer
|
|
527
528
|
#
|
528
529
|
# Resource policies grant permissions on Amazon Web Services resources.
|
529
530
|
# Resource policies include trust policies for IAM roles and bucket
|
530
|
-
# policies for Amazon S3 buckets.
|
531
|
-
# as identity policy or resource policy or a specific input such as
|
532
|
-
# managed policy or Amazon S3 bucket policy.
|
531
|
+
# policies for Amazon S3 buckets.
|
533
532
|
#
|
534
533
|
# @return [Types::CheckAccessNotGrantedResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
535
534
|
#
|
@@ -1452,6 +1451,7 @@ module Aws::AccessAnalyzer
|
|
1452
1451
|
# resp.finding.sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT", "S3_ACCESS_POINT_ACCOUNT"
|
1453
1452
|
# resp.finding.sources[0].detail.access_point_arn #=> String
|
1454
1453
|
# resp.finding.sources[0].detail.access_point_account #=> String
|
1454
|
+
# resp.finding.resource_control_policy_restriction #=> String, one of "APPLICABLE", "FAILED_TO_EVALUATE_RCP", "NOT_APPLICABLE"
|
1455
1455
|
#
|
1456
1456
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/GetFinding AWS API Documentation
|
1457
1457
|
#
|
@@ -1678,6 +1678,7 @@ module Aws::AccessAnalyzer
|
|
1678
1678
|
# resp.finding_details[0].external_access_details.sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT", "S3_ACCESS_POINT_ACCOUNT"
|
1679
1679
|
# resp.finding_details[0].external_access_details.sources[0].detail.access_point_arn #=> String
|
1680
1680
|
# resp.finding_details[0].external_access_details.sources[0].detail.access_point_account #=> String
|
1681
|
+
# resp.finding_details[0].external_access_details.resource_control_policy_restriction #=> String, one of "APPLICABLE", "FAILED_TO_EVALUATE_RCP", "NOT_APPLICABLE"
|
1681
1682
|
# resp.finding_details[0].unused_permission_details.actions #=> Array
|
1682
1683
|
# resp.finding_details[0].unused_permission_details.actions[0].action #=> String
|
1683
1684
|
# resp.finding_details[0].unused_permission_details.actions[0].last_accessed #=> Time
|
@@ -1712,8 +1713,8 @@ module Aws::AccessAnalyzer
|
|
1712
1713
|
# that support resource level granularity in policies.
|
1713
1714
|
#
|
1714
1715
|
# For example, in the resource section of a policy, you can receive a
|
1715
|
-
# placeholder such as `"Resource":"arn:aws:s3
|
1716
|
-
#
|
1716
|
+
# placeholder such as `"Resource":"arn:aws:s3:::${BucketName}"` instead
|
1717
|
+
# of `"*"`.
|
1717
1718
|
#
|
1718
1719
|
# @option params [Boolean] :include_service_level_template
|
1719
1720
|
# The level of detail that you want to generate. You can specify whether
|
@@ -1835,6 +1836,7 @@ module Aws::AccessAnalyzer
|
|
1835
1836
|
# resp.findings[0].sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT", "S3_ACCESS_POINT_ACCOUNT"
|
1836
1837
|
# resp.findings[0].sources[0].detail.access_point_arn #=> String
|
1837
1838
|
# resp.findings[0].sources[0].detail.access_point_account #=> String
|
1839
|
+
# resp.findings[0].resource_control_policy_restriction #=> String, one of "APPLICABLE", "FAILED_TO_EVALUATE_RCP", "NOT_APPLICABLE"
|
1838
1840
|
# resp.next_token #=> String
|
1839
1841
|
#
|
1840
1842
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ListAccessPreviewFindings AWS API Documentation
|
@@ -2134,6 +2136,7 @@ module Aws::AccessAnalyzer
|
|
2134
2136
|
# resp.findings[0].sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT", "S3_ACCESS_POINT_ACCOUNT"
|
2135
2137
|
# resp.findings[0].sources[0].detail.access_point_arn #=> String
|
2136
2138
|
# resp.findings[0].sources[0].detail.access_point_account #=> String
|
2139
|
+
# resp.findings[0].resource_control_policy_restriction #=> String, one of "APPLICABLE", "FAILED_TO_EVALUATE_RCP", "NOT_APPLICABLE"
|
2137
2140
|
# resp.next_token #=> String
|
2138
2141
|
#
|
2139
2142
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ListFindings AWS API Documentation
|
@@ -2610,7 +2613,7 @@ module Aws::AccessAnalyzer
|
|
2610
2613
|
# max_results: 1,
|
2611
2614
|
# next_token: "Token",
|
2612
2615
|
# policy_document: "PolicyDocument", # required
|
2613
|
-
# policy_type: "IDENTITY_POLICY", # required, accepts IDENTITY_POLICY, RESOURCE_POLICY, SERVICE_CONTROL_POLICY
|
2616
|
+
# policy_type: "IDENTITY_POLICY", # required, accepts IDENTITY_POLICY, RESOURCE_POLICY, SERVICE_CONTROL_POLICY, RESOURCE_CONTROL_POLICY
|
2614
2617
|
# validate_policy_resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::S3::AccessPoint, AWS::S3::MultiRegionAccessPoint, AWS::S3ObjectLambda::AccessPoint, AWS::IAM::AssumeRolePolicyDocument, AWS::DynamoDB::Table
|
2615
2618
|
# })
|
2616
2619
|
#
|
@@ -2663,7 +2666,7 @@ module Aws::AccessAnalyzer
|
|
2663
2666
|
tracer: tracer
|
2664
2667
|
)
|
2665
2668
|
context[:gem_name] = 'aws-sdk-accessanalyzer'
|
2666
|
-
context[:gem_version] = '1.
|
2669
|
+
context[:gem_version] = '1.63.0'
|
2667
2670
|
Seahorse::Client::Request.new(handlers, context)
|
2668
2671
|
end
|
2669
2672
|
|
@@ -225,6 +225,7 @@ module Aws::AccessAnalyzer
|
|
225
225
|
RegionList = Shapes::ListShape.new(name: 'RegionList')
|
226
226
|
Resource = Shapes::StringShape.new(name: 'Resource')
|
227
227
|
ResourceArn = Shapes::StringShape.new(name: 'ResourceArn')
|
228
|
+
ResourceControlPolicyRestriction = Shapes::StringShape.new(name: 'ResourceControlPolicyRestriction')
|
228
229
|
ResourceNotFoundException = Shapes::StructureShape.new(name: 'ResourceNotFoundException')
|
229
230
|
ResourceType = Shapes::StringShape.new(name: 'ResourceType')
|
230
231
|
RetiringPrincipal = Shapes::StringShape.new(name: 'RetiringPrincipal')
|
@@ -327,6 +328,7 @@ module Aws::AccessAnalyzer
|
|
327
328
|
AccessPreviewFinding.add_member(:resource_owner_account, Shapes::ShapeRef.new(shape: String, required: true, location_name: "resourceOwnerAccount"))
|
328
329
|
AccessPreviewFinding.add_member(:error, Shapes::ShapeRef.new(shape: String, location_name: "error"))
|
329
330
|
AccessPreviewFinding.add_member(:sources, Shapes::ShapeRef.new(shape: FindingSourceList, location_name: "sources"))
|
331
|
+
AccessPreviewFinding.add_member(:resource_control_policy_restriction, Shapes::ShapeRef.new(shape: ResourceControlPolicyRestriction, location_name: "resourceControlPolicyRestriction"))
|
330
332
|
AccessPreviewFinding.struct_class = Types::AccessPreviewFinding
|
331
333
|
|
332
334
|
AccessPreviewFindingsList.member = Shapes::ShapeRef.new(shape: AccessPreviewFinding)
|
@@ -564,6 +566,7 @@ module Aws::AccessAnalyzer
|
|
564
566
|
ExternalAccessDetails.add_member(:is_public, Shapes::ShapeRef.new(shape: Boolean, location_name: "isPublic"))
|
565
567
|
ExternalAccessDetails.add_member(:principal, Shapes::ShapeRef.new(shape: PrincipalMap, location_name: "principal"))
|
566
568
|
ExternalAccessDetails.add_member(:sources, Shapes::ShapeRef.new(shape: FindingSourceList, location_name: "sources"))
|
569
|
+
ExternalAccessDetails.add_member(:resource_control_policy_restriction, Shapes::ShapeRef.new(shape: ResourceControlPolicyRestriction, location_name: "resourceControlPolicyRestriction"))
|
567
570
|
ExternalAccessDetails.struct_class = Types::ExternalAccessDetails
|
568
571
|
|
569
572
|
FilterCriteriaMap.key = Shapes::ShapeRef.new(shape: String)
|
@@ -583,6 +586,7 @@ module Aws::AccessAnalyzer
|
|
583
586
|
Finding.add_member(:resource_owner_account, Shapes::ShapeRef.new(shape: String, required: true, location_name: "resourceOwnerAccount"))
|
584
587
|
Finding.add_member(:error, Shapes::ShapeRef.new(shape: String, location_name: "error"))
|
585
588
|
Finding.add_member(:sources, Shapes::ShapeRef.new(shape: FindingSourceList, location_name: "sources"))
|
589
|
+
Finding.add_member(:resource_control_policy_restriction, Shapes::ShapeRef.new(shape: ResourceControlPolicyRestriction, location_name: "resourceControlPolicyRestriction"))
|
586
590
|
Finding.struct_class = Types::Finding
|
587
591
|
|
588
592
|
FindingDetails.add_member(:external_access_details, Shapes::ShapeRef.new(shape: ExternalAccessDetails, location_name: "externalAccessDetails"))
|
@@ -627,6 +631,7 @@ module Aws::AccessAnalyzer
|
|
627
631
|
FindingSummary.add_member(:resource_owner_account, Shapes::ShapeRef.new(shape: String, required: true, location_name: "resourceOwnerAccount"))
|
628
632
|
FindingSummary.add_member(:error, Shapes::ShapeRef.new(shape: String, location_name: "error"))
|
629
633
|
FindingSummary.add_member(:sources, Shapes::ShapeRef.new(shape: FindingSourceList, location_name: "sources"))
|
634
|
+
FindingSummary.add_member(:resource_control_policy_restriction, Shapes::ShapeRef.new(shape: ResourceControlPolicyRestriction, location_name: "resourceControlPolicyRestriction"))
|
630
635
|
FindingSummary.struct_class = Types::FindingSummary
|
631
636
|
|
632
637
|
FindingSummaryV2.add_member(:analyzed_at, Shapes::ShapeRef.new(shape: Timestamp, required: true, location_name: "analyzedAt"))
|
@@ -1183,6 +1188,7 @@ module Aws::AccessAnalyzer
|
|
1183
1188
|
|
1184
1189
|
api.metadata = {
|
1185
1190
|
"apiVersion" => "2019-11-01",
|
1191
|
+
"auth" => ["aws.auth#sigv4"],
|
1186
1192
|
"endpointPrefix" => "access-analyzer",
|
1187
1193
|
"protocol" => "rest-json",
|
1188
1194
|
"protocols" => ["rest-json"],
|
@@ -21,8 +21,9 @@ module Aws::AccessAnalyzer
|
|
21
21
|
#
|
22
22
|
# @!attribute [rw] resources
|
23
23
|
# A list of resources for the access permissions. Any strings that can
|
24
|
-
# be used as
|
25
|
-
# resources to check.
|
24
|
+
# be used as an Amazon Resource Name (ARN) in an IAM policy can be
|
25
|
+
# used in the list of resources to check. You can only use a wildcard
|
26
|
+
# in the portion of the ARN that specifies the resource ID.
|
26
27
|
# @return [Array<String>]
|
27
28
|
#
|
28
29
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/Access AWS API Documentation
|
@@ -191,6 +192,11 @@ module Aws::AccessAnalyzer
|
|
191
192
|
# bucket findings.
|
192
193
|
# @return [Array<Types::FindingSource>]
|
193
194
|
#
|
195
|
+
# @!attribute [rw] resource_control_policy_restriction
|
196
|
+
# The type of restriction applied to the finding by the resource owner
|
197
|
+
# with an Organizations resource control policy (RCP).
|
198
|
+
# @return [String]
|
199
|
+
#
|
194
200
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/AccessPreviewFinding AWS API Documentation
|
195
201
|
#
|
196
202
|
class AccessPreviewFinding < Struct.new(
|
@@ -208,7 +214,8 @@ module Aws::AccessAnalyzer
|
|
208
214
|
:status,
|
209
215
|
:resource_owner_account,
|
210
216
|
:error,
|
211
|
-
:sources
|
217
|
+
:sources,
|
218
|
+
:resource_control_policy_restriction)
|
212
219
|
SENSITIVE = []
|
213
220
|
include Aws::Structure
|
214
221
|
end
|
@@ -583,12 +590,13 @@ module Aws::AccessAnalyzer
|
|
583
590
|
# @!attribute [rw] access
|
584
591
|
# An access object containing the permissions that shouldn't be
|
585
592
|
# granted by the specified policy. If only actions are specified, IAM
|
586
|
-
# Access Analyzer checks for access
|
587
|
-
# the policy. If only resources are
|
588
|
-
# Analyzer checks
|
589
|
-
# resources. If both actions and
|
590
|
-
#
|
591
|
-
# the specified
|
593
|
+
# Access Analyzer checks for access to peform at least one of the
|
594
|
+
# actions on any resource in the policy. If only resources are
|
595
|
+
# specified, then IAM Access Analyzer checks for access to perform any
|
596
|
+
# action on at least one of the resources. If both actions and
|
597
|
+
# resources are specified, IAM Access Analyzer checks for access to
|
598
|
+
# perform at least one of the specified actions on at least one of the
|
599
|
+
# specified resources.
|
592
600
|
# @return [Array<Types::Access>]
|
593
601
|
#
|
594
602
|
# @!attribute [rw] policy_type
|
@@ -598,9 +606,7 @@ module Aws::AccessAnalyzer
|
|
598
606
|
#
|
599
607
|
# Resource policies grant permissions on Amazon Web Services
|
600
608
|
# resources. Resource policies include trust policies for IAM roles
|
601
|
-
# and bucket policies for Amazon S3 buckets.
|
602
|
-
# input such as identity policy or resource policy or a specific input
|
603
|
-
# such as managed policy or Amazon S3 bucket policy.
|
609
|
+
# and bucket policies for Amazon S3 buckets.
|
604
610
|
# @return [String]
|
605
611
|
#
|
606
612
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/CheckAccessNotGrantedRequest AWS API Documentation
|
@@ -1411,6 +1417,11 @@ module Aws::AccessAnalyzer
|
|
1411
1417
|
# Amazon S3 bucket findings.
|
1412
1418
|
# @return [Array<Types::FindingSource>]
|
1413
1419
|
#
|
1420
|
+
# @!attribute [rw] resource_control_policy_restriction
|
1421
|
+
# The type of restriction applied to the finding by the resource owner
|
1422
|
+
# with an Organizations resource control policy (RCP).
|
1423
|
+
# @return [String]
|
1424
|
+
#
|
1414
1425
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ExternalAccessDetails AWS API Documentation
|
1415
1426
|
#
|
1416
1427
|
class ExternalAccessDetails < Struct.new(
|
@@ -1418,7 +1429,8 @@ module Aws::AccessAnalyzer
|
|
1418
1429
|
:condition,
|
1419
1430
|
:is_public,
|
1420
1431
|
:principal,
|
1421
|
-
:sources
|
1432
|
+
:sources,
|
1433
|
+
:resource_control_policy_restriction)
|
1422
1434
|
SENSITIVE = []
|
1423
1435
|
include Aws::Structure
|
1424
1436
|
end
|
@@ -1487,6 +1499,11 @@ module Aws::AccessAnalyzer
|
|
1487
1499
|
# bucket findings.
|
1488
1500
|
# @return [Array<Types::FindingSource>]
|
1489
1501
|
#
|
1502
|
+
# @!attribute [rw] resource_control_policy_restriction
|
1503
|
+
# The type of restriction applied to the finding by the resource owner
|
1504
|
+
# with an Organizations resource control policy (RCP).
|
1505
|
+
# @return [String]
|
1506
|
+
#
|
1490
1507
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/Finding AWS API Documentation
|
1491
1508
|
#
|
1492
1509
|
class Finding < Struct.new(
|
@@ -1503,7 +1520,8 @@ module Aws::AccessAnalyzer
|
|
1503
1520
|
:status,
|
1504
1521
|
:resource_owner_account,
|
1505
1522
|
:error,
|
1506
|
-
:sources
|
1523
|
+
:sources,
|
1524
|
+
:resource_control_policy_restriction)
|
1507
1525
|
SENSITIVE = []
|
1508
1526
|
include Aws::Structure
|
1509
1527
|
end
|
@@ -1668,6 +1686,11 @@ module Aws::AccessAnalyzer
|
|
1668
1686
|
# bucket findings.
|
1669
1687
|
# @return [Array<Types::FindingSource>]
|
1670
1688
|
#
|
1689
|
+
# @!attribute [rw] resource_control_policy_restriction
|
1690
|
+
# The type of restriction applied to the finding by the resource owner
|
1691
|
+
# with an Organizations resource control policy (RCP).
|
1692
|
+
# @return [String]
|
1693
|
+
#
|
1671
1694
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/FindingSummary AWS API Documentation
|
1672
1695
|
#
|
1673
1696
|
class FindingSummary < Struct.new(
|
@@ -1684,7 +1707,8 @@ module Aws::AccessAnalyzer
|
|
1684
1707
|
:status,
|
1685
1708
|
:resource_owner_account,
|
1686
1709
|
:error,
|
1687
|
-
:sources
|
1710
|
+
:sources,
|
1711
|
+
:resource_control_policy_restriction)
|
1688
1712
|
SENSITIVE = []
|
1689
1713
|
include Aws::Structure
|
1690
1714
|
end
|
@@ -2210,7 +2234,7 @@ module Aws::AccessAnalyzer
|
|
2210
2234
|
# actions that support resource level granularity in policies.
|
2211
2235
|
#
|
2212
2236
|
# For example, in the resource section of a policy, you can receive a
|
2213
|
-
# placeholder such as `"Resource":"arn:aws:s3
|
2237
|
+
# placeholder such as `"Resource":"arn:aws:s3:::${BucketName}"`
|
2214
2238
|
# instead of `"*"`.
|
2215
2239
|
# @return [Boolean]
|
2216
2240
|
#
|
data/sig/client.rbs
CHANGED
@@ -645,7 +645,7 @@ module Aws
|
|
645
645
|
?max_results: ::Integer,
|
646
646
|
?next_token: ::String,
|
647
647
|
policy_document: ::String,
|
648
|
-
policy_type: ("IDENTITY_POLICY" | "RESOURCE_POLICY" | "SERVICE_CONTROL_POLICY"),
|
648
|
+
policy_type: ("IDENTITY_POLICY" | "RESOURCE_POLICY" | "SERVICE_CONTROL_POLICY" | "RESOURCE_CONTROL_POLICY"),
|
649
649
|
?validate_policy_resource_type: ("AWS::S3::Bucket" | "AWS::S3::AccessPoint" | "AWS::S3::MultiRegionAccessPoint" | "AWS::S3ObjectLambda::AccessPoint" | "AWS::IAM::AssumeRolePolicyDocument" | "AWS::DynamoDB::Table")
|
650
650
|
) -> _ValidatePolicyResponseSuccess
|
651
651
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _ValidatePolicyResponseSuccess
|
data/sig/types.rbs
CHANGED
@@ -45,6 +45,7 @@ module Aws::AccessAnalyzer
|
|
45
45
|
attr_accessor resource_owner_account: ::String
|
46
46
|
attr_accessor error: ::String
|
47
47
|
attr_accessor sources: ::Array[Types::FindingSource]
|
48
|
+
attr_accessor resource_control_policy_restriction: ("APPLICABLE" | "FAILED_TO_EVALUATE_RCP" | "NOT_APPLICABLE")
|
48
49
|
SENSITIVE: []
|
49
50
|
end
|
50
51
|
|
@@ -348,6 +349,7 @@ module Aws::AccessAnalyzer
|
|
348
349
|
attr_accessor is_public: bool
|
349
350
|
attr_accessor principal: ::Hash[::String, ::String]
|
350
351
|
attr_accessor sources: ::Array[Types::FindingSource]
|
352
|
+
attr_accessor resource_control_policy_restriction: ("APPLICABLE" | "FAILED_TO_EVALUATE_RCP" | "NOT_APPLICABLE")
|
351
353
|
SENSITIVE: []
|
352
354
|
end
|
353
355
|
|
@@ -366,6 +368,7 @@ module Aws::AccessAnalyzer
|
|
366
368
|
attr_accessor resource_owner_account: ::String
|
367
369
|
attr_accessor error: ::String
|
368
370
|
attr_accessor sources: ::Array[Types::FindingSource]
|
371
|
+
attr_accessor resource_control_policy_restriction: ("APPLICABLE" | "FAILED_TO_EVALUATE_RCP" | "NOT_APPLICABLE")
|
369
372
|
SENSITIVE: []
|
370
373
|
end
|
371
374
|
|
@@ -419,6 +422,7 @@ module Aws::AccessAnalyzer
|
|
419
422
|
attr_accessor resource_owner_account: ::String
|
420
423
|
attr_accessor error: ::String
|
421
424
|
attr_accessor sources: ::Array[Types::FindingSource]
|
425
|
+
attr_accessor resource_control_policy_restriction: ("APPLICABLE" | "FAILED_TO_EVALUATE_RCP" | "NOT_APPLICABLE")
|
422
426
|
SENSITIVE: []
|
423
427
|
end
|
424
428
|
|
@@ -1092,7 +1096,7 @@ module Aws::AccessAnalyzer
|
|
1092
1096
|
attr_accessor max_results: ::Integer
|
1093
1097
|
attr_accessor next_token: ::String
|
1094
1098
|
attr_accessor policy_document: ::String
|
1095
|
-
attr_accessor policy_type: ("IDENTITY_POLICY" | "RESOURCE_POLICY" | "SERVICE_CONTROL_POLICY")
|
1099
|
+
attr_accessor policy_type: ("IDENTITY_POLICY" | "RESOURCE_POLICY" | "SERVICE_CONTROL_POLICY" | "RESOURCE_CONTROL_POLICY")
|
1096
1100
|
attr_accessor validate_policy_resource_type: ("AWS::S3::Bucket" | "AWS::S3::AccessPoint" | "AWS::S3::MultiRegionAccessPoint" | "AWS::S3ObjectLambda::AccessPoint" | "AWS::IAM::AssumeRolePolicyDocument" | "AWS::DynamoDB::Table")
|
1097
1101
|
SENSITIVE: []
|
1098
1102
|
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-accessanalyzer
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.63.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-
|
11
|
+
date: 2024-11-13 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|
@@ -36,14 +36,14 @@ dependencies:
|
|
36
36
|
requirements:
|
37
37
|
- - "~>"
|
38
38
|
- !ruby/object:Gem::Version
|
39
|
-
version: '1.
|
39
|
+
version: '1.5'
|
40
40
|
type: :runtime
|
41
41
|
prerelease: false
|
42
42
|
version_requirements: !ruby/object:Gem::Requirement
|
43
43
|
requirements:
|
44
44
|
- - "~>"
|
45
45
|
- !ruby/object:Gem::Version
|
46
|
-
version: '1.
|
46
|
+
version: '1.5'
|
47
47
|
description: Official AWS Ruby gem for Access Analyzer. This gem is part of the AWS
|
48
48
|
SDK for Ruby.
|
49
49
|
email:
|