aws-sdk-accessanalyzer 1.62.0 → 1.63.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 12a6c41022a8c2e51a54bbc7d94fbd5ebb6150cbfa1b9f8ae28a245751684c5e
4
- data.tar.gz: 944488ffb334f325076e717b517dc406f5e53fead8c50f27646a22d9c20485b0
3
+ metadata.gz: c447bf8de1d6dd1a90d8e44347b1ac0c11b4e4f66631639613f55e7e46befd42
4
+ data.tar.gz: 9c7ae9c351e0d8259bf12f8af1e344d696a7ed44e77d1cc12e4f3563f7f757bb
5
5
  SHA512:
6
- metadata.gz: b4e2445cc0667c0bf98d69ce646b31de63897159f728c439b05ad3a4c0c02a3cac9c65892a4a2c2d8e14fd68afa586b6d1366bdaa6f20e4cee07388aa715962a
7
- data.tar.gz: 44a4cfce4536f2b317b76f4c71ce66a2fdd399c22ab12d36c8c578e66909d1b17ea215870eb158bd74caf7c31b5490ba631186f2f34432a42504bb4f1b9e654c
6
+ metadata.gz: bb005943fd3fb07e498393000ce199903ad7ee88531bea0b7183686202fc53afcb34c7709263cbd850280cba1e2b25a7f011ea3b3d8274609a93a711ac8f3ffd
7
+ data.tar.gz: 60b3142ad2acbccdef1908dae580bb99f08c7411aac664e6edb25cb8d38afa2381d04c7e6252bc177adcd288b17fbb4bf4e289e4fc65722525850ae3dc476605
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.63.0 (2024-11-13)
5
+ ------------------
6
+
7
+ * Feature - This release adds support for policy validation and external access findings for resource control policies (RCP). IAM Access Analyzer helps you author functional and secure RCPs and awareness that a RCP may restrict external access. Updated service API, documentation, and paginators.
8
+
4
9
  1.62.0 (2024-11-06)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.62.0
1
+ 1.63.0
@@ -514,11 +514,12 @@ module Aws::AccessAnalyzer
514
514
  # @option params [required, Array<Types::Access>] :access
515
515
  # An access object containing the permissions that shouldn't be granted
516
516
  # by the specified policy. If only actions are specified, IAM Access
517
- # Analyzer checks for access of the actions on all resources in the
518
- # policy. If only resources are specified, then IAM Access Analyzer
519
- # checks which actions have access to the specified resources. If both
520
- # actions and resources are specified, then IAM Access Analyzer checks
521
- # which of the specified actions have access to the specified resources.
517
+ # Analyzer checks for access to peform at least one of the actions on
518
+ # any resource in the policy. If only resources are specified, then IAM
519
+ # Access Analyzer checks for access to perform any action on at least
520
+ # one of the resources. If both actions and resources are specified, IAM
521
+ # Access Analyzer checks for access to perform at least one of the
522
+ # specified actions on at least one of the specified resources.
522
523
  #
523
524
  # @option params [required, String] :policy_type
524
525
  # The type of policy. Identity policies grant permissions to IAM
@@ -527,9 +528,7 @@ module Aws::AccessAnalyzer
527
528
  #
528
529
  # Resource policies grant permissions on Amazon Web Services resources.
529
530
  # Resource policies include trust policies for IAM roles and bucket
530
- # policies for Amazon S3 buckets. You can provide a generic input such
531
- # as identity policy or resource policy or a specific input such as
532
- # managed policy or Amazon S3 bucket policy.
531
+ # policies for Amazon S3 buckets.
533
532
  #
534
533
  # @return [Types::CheckAccessNotGrantedResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
535
534
  #
@@ -1452,6 +1451,7 @@ module Aws::AccessAnalyzer
1452
1451
  # resp.finding.sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT", "S3_ACCESS_POINT_ACCOUNT"
1453
1452
  # resp.finding.sources[0].detail.access_point_arn #=> String
1454
1453
  # resp.finding.sources[0].detail.access_point_account #=> String
1454
+ # resp.finding.resource_control_policy_restriction #=> String, one of "APPLICABLE", "FAILED_TO_EVALUATE_RCP", "NOT_APPLICABLE"
1455
1455
  #
1456
1456
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/GetFinding AWS API Documentation
1457
1457
  #
@@ -1678,6 +1678,7 @@ module Aws::AccessAnalyzer
1678
1678
  # resp.finding_details[0].external_access_details.sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT", "S3_ACCESS_POINT_ACCOUNT"
1679
1679
  # resp.finding_details[0].external_access_details.sources[0].detail.access_point_arn #=> String
1680
1680
  # resp.finding_details[0].external_access_details.sources[0].detail.access_point_account #=> String
1681
+ # resp.finding_details[0].external_access_details.resource_control_policy_restriction #=> String, one of "APPLICABLE", "FAILED_TO_EVALUATE_RCP", "NOT_APPLICABLE"
1681
1682
  # resp.finding_details[0].unused_permission_details.actions #=> Array
1682
1683
  # resp.finding_details[0].unused_permission_details.actions[0].action #=> String
1683
1684
  # resp.finding_details[0].unused_permission_details.actions[0].last_accessed #=> Time
@@ -1835,6 +1836,7 @@ module Aws::AccessAnalyzer
1835
1836
  # resp.findings[0].sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT", "S3_ACCESS_POINT_ACCOUNT"
1836
1837
  # resp.findings[0].sources[0].detail.access_point_arn #=> String
1837
1838
  # resp.findings[0].sources[0].detail.access_point_account #=> String
1839
+ # resp.findings[0].resource_control_policy_restriction #=> String, one of "APPLICABLE", "FAILED_TO_EVALUATE_RCP", "NOT_APPLICABLE"
1838
1840
  # resp.next_token #=> String
1839
1841
  #
1840
1842
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ListAccessPreviewFindings AWS API Documentation
@@ -2134,6 +2136,7 @@ module Aws::AccessAnalyzer
2134
2136
  # resp.findings[0].sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT", "S3_ACCESS_POINT_ACCOUNT"
2135
2137
  # resp.findings[0].sources[0].detail.access_point_arn #=> String
2136
2138
  # resp.findings[0].sources[0].detail.access_point_account #=> String
2139
+ # resp.findings[0].resource_control_policy_restriction #=> String, one of "APPLICABLE", "FAILED_TO_EVALUATE_RCP", "NOT_APPLICABLE"
2137
2140
  # resp.next_token #=> String
2138
2141
  #
2139
2142
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ListFindings AWS API Documentation
@@ -2610,7 +2613,7 @@ module Aws::AccessAnalyzer
2610
2613
  # max_results: 1,
2611
2614
  # next_token: "Token",
2612
2615
  # policy_document: "PolicyDocument", # required
2613
- # policy_type: "IDENTITY_POLICY", # required, accepts IDENTITY_POLICY, RESOURCE_POLICY, SERVICE_CONTROL_POLICY
2616
+ # policy_type: "IDENTITY_POLICY", # required, accepts IDENTITY_POLICY, RESOURCE_POLICY, SERVICE_CONTROL_POLICY, RESOURCE_CONTROL_POLICY
2614
2617
  # validate_policy_resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::S3::AccessPoint, AWS::S3::MultiRegionAccessPoint, AWS::S3ObjectLambda::AccessPoint, AWS::IAM::AssumeRolePolicyDocument, AWS::DynamoDB::Table
2615
2618
  # })
2616
2619
  #
@@ -2663,7 +2666,7 @@ module Aws::AccessAnalyzer
2663
2666
  tracer: tracer
2664
2667
  )
2665
2668
  context[:gem_name] = 'aws-sdk-accessanalyzer'
2666
- context[:gem_version] = '1.62.0'
2669
+ context[:gem_version] = '1.63.0'
2667
2670
  Seahorse::Client::Request.new(handlers, context)
2668
2671
  end
2669
2672
 
@@ -225,6 +225,7 @@ module Aws::AccessAnalyzer
225
225
  RegionList = Shapes::ListShape.new(name: 'RegionList')
226
226
  Resource = Shapes::StringShape.new(name: 'Resource')
227
227
  ResourceArn = Shapes::StringShape.new(name: 'ResourceArn')
228
+ ResourceControlPolicyRestriction = Shapes::StringShape.new(name: 'ResourceControlPolicyRestriction')
228
229
  ResourceNotFoundException = Shapes::StructureShape.new(name: 'ResourceNotFoundException')
229
230
  ResourceType = Shapes::StringShape.new(name: 'ResourceType')
230
231
  RetiringPrincipal = Shapes::StringShape.new(name: 'RetiringPrincipal')
@@ -327,6 +328,7 @@ module Aws::AccessAnalyzer
327
328
  AccessPreviewFinding.add_member(:resource_owner_account, Shapes::ShapeRef.new(shape: String, required: true, location_name: "resourceOwnerAccount"))
328
329
  AccessPreviewFinding.add_member(:error, Shapes::ShapeRef.new(shape: String, location_name: "error"))
329
330
  AccessPreviewFinding.add_member(:sources, Shapes::ShapeRef.new(shape: FindingSourceList, location_name: "sources"))
331
+ AccessPreviewFinding.add_member(:resource_control_policy_restriction, Shapes::ShapeRef.new(shape: ResourceControlPolicyRestriction, location_name: "resourceControlPolicyRestriction"))
330
332
  AccessPreviewFinding.struct_class = Types::AccessPreviewFinding
331
333
 
332
334
  AccessPreviewFindingsList.member = Shapes::ShapeRef.new(shape: AccessPreviewFinding)
@@ -564,6 +566,7 @@ module Aws::AccessAnalyzer
564
566
  ExternalAccessDetails.add_member(:is_public, Shapes::ShapeRef.new(shape: Boolean, location_name: "isPublic"))
565
567
  ExternalAccessDetails.add_member(:principal, Shapes::ShapeRef.new(shape: PrincipalMap, location_name: "principal"))
566
568
  ExternalAccessDetails.add_member(:sources, Shapes::ShapeRef.new(shape: FindingSourceList, location_name: "sources"))
569
+ ExternalAccessDetails.add_member(:resource_control_policy_restriction, Shapes::ShapeRef.new(shape: ResourceControlPolicyRestriction, location_name: "resourceControlPolicyRestriction"))
567
570
  ExternalAccessDetails.struct_class = Types::ExternalAccessDetails
568
571
 
569
572
  FilterCriteriaMap.key = Shapes::ShapeRef.new(shape: String)
@@ -583,6 +586,7 @@ module Aws::AccessAnalyzer
583
586
  Finding.add_member(:resource_owner_account, Shapes::ShapeRef.new(shape: String, required: true, location_name: "resourceOwnerAccount"))
584
587
  Finding.add_member(:error, Shapes::ShapeRef.new(shape: String, location_name: "error"))
585
588
  Finding.add_member(:sources, Shapes::ShapeRef.new(shape: FindingSourceList, location_name: "sources"))
589
+ Finding.add_member(:resource_control_policy_restriction, Shapes::ShapeRef.new(shape: ResourceControlPolicyRestriction, location_name: "resourceControlPolicyRestriction"))
586
590
  Finding.struct_class = Types::Finding
587
591
 
588
592
  FindingDetails.add_member(:external_access_details, Shapes::ShapeRef.new(shape: ExternalAccessDetails, location_name: "externalAccessDetails"))
@@ -627,6 +631,7 @@ module Aws::AccessAnalyzer
627
631
  FindingSummary.add_member(:resource_owner_account, Shapes::ShapeRef.new(shape: String, required: true, location_name: "resourceOwnerAccount"))
628
632
  FindingSummary.add_member(:error, Shapes::ShapeRef.new(shape: String, location_name: "error"))
629
633
  FindingSummary.add_member(:sources, Shapes::ShapeRef.new(shape: FindingSourceList, location_name: "sources"))
634
+ FindingSummary.add_member(:resource_control_policy_restriction, Shapes::ShapeRef.new(shape: ResourceControlPolicyRestriction, location_name: "resourceControlPolicyRestriction"))
630
635
  FindingSummary.struct_class = Types::FindingSummary
631
636
 
632
637
  FindingSummaryV2.add_member(:analyzed_at, Shapes::ShapeRef.new(shape: Timestamp, required: true, location_name: "analyzedAt"))
@@ -1183,6 +1188,7 @@ module Aws::AccessAnalyzer
1183
1188
 
1184
1189
  api.metadata = {
1185
1190
  "apiVersion" => "2019-11-01",
1191
+ "auth" => ["aws.auth#sigv4"],
1186
1192
  "endpointPrefix" => "access-analyzer",
1187
1193
  "protocol" => "rest-json",
1188
1194
  "protocols" => ["rest-json"],
@@ -21,8 +21,9 @@ module Aws::AccessAnalyzer
21
21
  #
22
22
  # @!attribute [rw] resources
23
23
  # A list of resources for the access permissions. Any strings that can
24
- # be used as a resource in an IAM policy can be used in the list of
25
- # resources to check.
24
+ # be used as an Amazon Resource Name (ARN) in an IAM policy can be
25
+ # used in the list of resources to check. You can only use a wildcard
26
+ # in the portion of the ARN that specifies the resource ID.
26
27
  # @return [Array<String>]
27
28
  #
28
29
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/Access AWS API Documentation
@@ -191,6 +192,11 @@ module Aws::AccessAnalyzer
191
192
  # bucket findings.
192
193
  # @return [Array<Types::FindingSource>]
193
194
  #
195
+ # @!attribute [rw] resource_control_policy_restriction
196
+ # The type of restriction applied to the finding by the resource owner
197
+ # with an Organizations resource control policy (RCP).
198
+ # @return [String]
199
+ #
194
200
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/AccessPreviewFinding AWS API Documentation
195
201
  #
196
202
  class AccessPreviewFinding < Struct.new(
@@ -208,7 +214,8 @@ module Aws::AccessAnalyzer
208
214
  :status,
209
215
  :resource_owner_account,
210
216
  :error,
211
- :sources)
217
+ :sources,
218
+ :resource_control_policy_restriction)
212
219
  SENSITIVE = []
213
220
  include Aws::Structure
214
221
  end
@@ -583,12 +590,13 @@ module Aws::AccessAnalyzer
583
590
  # @!attribute [rw] access
584
591
  # An access object containing the permissions that shouldn't be
585
592
  # granted by the specified policy. If only actions are specified, IAM
586
- # Access Analyzer checks for access of the actions on all resources in
587
- # the policy. If only resources are specified, then IAM Access
588
- # Analyzer checks which actions have access to the specified
589
- # resources. If both actions and resources are specified, then IAM
590
- # Access Analyzer checks which of the specified actions have access to
591
- # the specified resources.
593
+ # Access Analyzer checks for access to peform at least one of the
594
+ # actions on any resource in the policy. If only resources are
595
+ # specified, then IAM Access Analyzer checks for access to perform any
596
+ # action on at least one of the resources. If both actions and
597
+ # resources are specified, IAM Access Analyzer checks for access to
598
+ # perform at least one of the specified actions on at least one of the
599
+ # specified resources.
592
600
  # @return [Array<Types::Access>]
593
601
  #
594
602
  # @!attribute [rw] policy_type
@@ -598,9 +606,7 @@ module Aws::AccessAnalyzer
598
606
  #
599
607
  # Resource policies grant permissions on Amazon Web Services
600
608
  # resources. Resource policies include trust policies for IAM roles
601
- # and bucket policies for Amazon S3 buckets. You can provide a generic
602
- # input such as identity policy or resource policy or a specific input
603
- # such as managed policy or Amazon S3 bucket policy.
609
+ # and bucket policies for Amazon S3 buckets.
604
610
  # @return [String]
605
611
  #
606
612
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/CheckAccessNotGrantedRequest AWS API Documentation
@@ -1411,6 +1417,11 @@ module Aws::AccessAnalyzer
1411
1417
  # Amazon S3 bucket findings.
1412
1418
  # @return [Array<Types::FindingSource>]
1413
1419
  #
1420
+ # @!attribute [rw] resource_control_policy_restriction
1421
+ # The type of restriction applied to the finding by the resource owner
1422
+ # with an Organizations resource control policy (RCP).
1423
+ # @return [String]
1424
+ #
1414
1425
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ExternalAccessDetails AWS API Documentation
1415
1426
  #
1416
1427
  class ExternalAccessDetails < Struct.new(
@@ -1418,7 +1429,8 @@ module Aws::AccessAnalyzer
1418
1429
  :condition,
1419
1430
  :is_public,
1420
1431
  :principal,
1421
- :sources)
1432
+ :sources,
1433
+ :resource_control_policy_restriction)
1422
1434
  SENSITIVE = []
1423
1435
  include Aws::Structure
1424
1436
  end
@@ -1487,6 +1499,11 @@ module Aws::AccessAnalyzer
1487
1499
  # bucket findings.
1488
1500
  # @return [Array<Types::FindingSource>]
1489
1501
  #
1502
+ # @!attribute [rw] resource_control_policy_restriction
1503
+ # The type of restriction applied to the finding by the resource owner
1504
+ # with an Organizations resource control policy (RCP).
1505
+ # @return [String]
1506
+ #
1490
1507
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/Finding AWS API Documentation
1491
1508
  #
1492
1509
  class Finding < Struct.new(
@@ -1503,7 +1520,8 @@ module Aws::AccessAnalyzer
1503
1520
  :status,
1504
1521
  :resource_owner_account,
1505
1522
  :error,
1506
- :sources)
1523
+ :sources,
1524
+ :resource_control_policy_restriction)
1507
1525
  SENSITIVE = []
1508
1526
  include Aws::Structure
1509
1527
  end
@@ -1668,6 +1686,11 @@ module Aws::AccessAnalyzer
1668
1686
  # bucket findings.
1669
1687
  # @return [Array<Types::FindingSource>]
1670
1688
  #
1689
+ # @!attribute [rw] resource_control_policy_restriction
1690
+ # The type of restriction applied to the finding by the resource owner
1691
+ # with an Organizations resource control policy (RCP).
1692
+ # @return [String]
1693
+ #
1671
1694
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/FindingSummary AWS API Documentation
1672
1695
  #
1673
1696
  class FindingSummary < Struct.new(
@@ -1684,7 +1707,8 @@ module Aws::AccessAnalyzer
1684
1707
  :status,
1685
1708
  :resource_owner_account,
1686
1709
  :error,
1687
- :sources)
1710
+ :sources,
1711
+ :resource_control_policy_restriction)
1688
1712
  SENSITIVE = []
1689
1713
  include Aws::Structure
1690
1714
  end
@@ -54,7 +54,7 @@ module Aws::AccessAnalyzer
54
54
  autoload :EndpointProvider, 'aws-sdk-accessanalyzer/endpoint_provider'
55
55
  autoload :Endpoints, 'aws-sdk-accessanalyzer/endpoints'
56
56
 
57
- GEM_VERSION = '1.62.0'
57
+ GEM_VERSION = '1.63.0'
58
58
 
59
59
  end
60
60
 
data/sig/client.rbs CHANGED
@@ -645,7 +645,7 @@ module Aws
645
645
  ?max_results: ::Integer,
646
646
  ?next_token: ::String,
647
647
  policy_document: ::String,
648
- policy_type: ("IDENTITY_POLICY" | "RESOURCE_POLICY" | "SERVICE_CONTROL_POLICY"),
648
+ policy_type: ("IDENTITY_POLICY" | "RESOURCE_POLICY" | "SERVICE_CONTROL_POLICY" | "RESOURCE_CONTROL_POLICY"),
649
649
  ?validate_policy_resource_type: ("AWS::S3::Bucket" | "AWS::S3::AccessPoint" | "AWS::S3::MultiRegionAccessPoint" | "AWS::S3ObjectLambda::AccessPoint" | "AWS::IAM::AssumeRolePolicyDocument" | "AWS::DynamoDB::Table")
650
650
  ) -> _ValidatePolicyResponseSuccess
651
651
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _ValidatePolicyResponseSuccess
data/sig/types.rbs CHANGED
@@ -45,6 +45,7 @@ module Aws::AccessAnalyzer
45
45
  attr_accessor resource_owner_account: ::String
46
46
  attr_accessor error: ::String
47
47
  attr_accessor sources: ::Array[Types::FindingSource]
48
+ attr_accessor resource_control_policy_restriction: ("APPLICABLE" | "FAILED_TO_EVALUATE_RCP" | "NOT_APPLICABLE")
48
49
  SENSITIVE: []
49
50
  end
50
51
 
@@ -348,6 +349,7 @@ module Aws::AccessAnalyzer
348
349
  attr_accessor is_public: bool
349
350
  attr_accessor principal: ::Hash[::String, ::String]
350
351
  attr_accessor sources: ::Array[Types::FindingSource]
352
+ attr_accessor resource_control_policy_restriction: ("APPLICABLE" | "FAILED_TO_EVALUATE_RCP" | "NOT_APPLICABLE")
351
353
  SENSITIVE: []
352
354
  end
353
355
 
@@ -366,6 +368,7 @@ module Aws::AccessAnalyzer
366
368
  attr_accessor resource_owner_account: ::String
367
369
  attr_accessor error: ::String
368
370
  attr_accessor sources: ::Array[Types::FindingSource]
371
+ attr_accessor resource_control_policy_restriction: ("APPLICABLE" | "FAILED_TO_EVALUATE_RCP" | "NOT_APPLICABLE")
369
372
  SENSITIVE: []
370
373
  end
371
374
 
@@ -419,6 +422,7 @@ module Aws::AccessAnalyzer
419
422
  attr_accessor resource_owner_account: ::String
420
423
  attr_accessor error: ::String
421
424
  attr_accessor sources: ::Array[Types::FindingSource]
425
+ attr_accessor resource_control_policy_restriction: ("APPLICABLE" | "FAILED_TO_EVALUATE_RCP" | "NOT_APPLICABLE")
422
426
  SENSITIVE: []
423
427
  end
424
428
 
@@ -1092,7 +1096,7 @@ module Aws::AccessAnalyzer
1092
1096
  attr_accessor max_results: ::Integer
1093
1097
  attr_accessor next_token: ::String
1094
1098
  attr_accessor policy_document: ::String
1095
- attr_accessor policy_type: ("IDENTITY_POLICY" | "RESOURCE_POLICY" | "SERVICE_CONTROL_POLICY")
1099
+ attr_accessor policy_type: ("IDENTITY_POLICY" | "RESOURCE_POLICY" | "SERVICE_CONTROL_POLICY" | "RESOURCE_CONTROL_POLICY")
1096
1100
  attr_accessor validate_policy_resource_type: ("AWS::S3::Bucket" | "AWS::S3::AccessPoint" | "AWS::S3::MultiRegionAccessPoint" | "AWS::S3ObjectLambda::AccessPoint" | "AWS::IAM::AssumeRolePolicyDocument" | "AWS::DynamoDB::Table")
1097
1101
  SENSITIVE: []
1098
1102
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-accessanalyzer
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.62.0
4
+ version: 1.63.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-11-06 00:00:00.000000000 Z
11
+ date: 2024-11-13 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core
@@ -36,14 +36,14 @@ dependencies:
36
36
  requirements:
37
37
  - - "~>"
38
38
  - !ruby/object:Gem::Version
39
- version: '1.1'
39
+ version: '1.5'
40
40
  type: :runtime
41
41
  prerelease: false
42
42
  version_requirements: !ruby/object:Gem::Requirement
43
43
  requirements:
44
44
  - - "~>"
45
45
  - !ruby/object:Gem::Version
46
- version: '1.1'
46
+ version: '1.5'
47
47
  description: Official AWS Ruby gem for Access Analyzer. This gem is part of the AWS
48
48
  SDK for Ruby.
49
49
  email: