aws-sdk-accessanalyzer 1.62.0 → 1.63.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-accessanalyzer/client.rb +13 -10
- data/lib/aws-sdk-accessanalyzer/client_api.rb +6 -0
- data/lib/aws-sdk-accessanalyzer/types.rb +39 -15
- data/lib/aws-sdk-accessanalyzer.rb +1 -1
- data/sig/client.rbs +1 -1
- data/sig/types.rbs +5 -1
- metadata +4 -4
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: c447bf8de1d6dd1a90d8e44347b1ac0c11b4e4f66631639613f55e7e46befd42
|
4
|
+
data.tar.gz: 9c7ae9c351e0d8259bf12f8af1e344d696a7ed44e77d1cc12e4f3563f7f757bb
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: bb005943fd3fb07e498393000ce199903ad7ee88531bea0b7183686202fc53afcb34c7709263cbd850280cba1e2b25a7f011ea3b3d8274609a93a711ac8f3ffd
|
7
|
+
data.tar.gz: 60b3142ad2acbccdef1908dae580bb99f08c7411aac664e6edb25cb8d38afa2381d04c7e6252bc177adcd288b17fbb4bf4e289e4fc65722525850ae3dc476605
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,11 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.63.0 (2024-11-13)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - This release adds support for policy validation and external access findings for resource control policies (RCP). IAM Access Analyzer helps you author functional and secure RCPs and awareness that a RCP may restrict external access. Updated service API, documentation, and paginators.
|
8
|
+
|
4
9
|
1.62.0 (2024-11-06)
|
5
10
|
------------------
|
6
11
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.63.0
|
@@ -514,11 +514,12 @@ module Aws::AccessAnalyzer
|
|
514
514
|
# @option params [required, Array<Types::Access>] :access
|
515
515
|
# An access object containing the permissions that shouldn't be granted
|
516
516
|
# by the specified policy. If only actions are specified, IAM Access
|
517
|
-
# Analyzer checks for access of the actions on
|
518
|
-
# policy. If only resources are specified, then IAM
|
519
|
-
#
|
520
|
-
# actions and resources are specified,
|
521
|
-
#
|
517
|
+
# Analyzer checks for access to peform at least one of the actions on
|
518
|
+
# any resource in the policy. If only resources are specified, then IAM
|
519
|
+
# Access Analyzer checks for access to perform any action on at least
|
520
|
+
# one of the resources. If both actions and resources are specified, IAM
|
521
|
+
# Access Analyzer checks for access to perform at least one of the
|
522
|
+
# specified actions on at least one of the specified resources.
|
522
523
|
#
|
523
524
|
# @option params [required, String] :policy_type
|
524
525
|
# The type of policy. Identity policies grant permissions to IAM
|
@@ -527,9 +528,7 @@ module Aws::AccessAnalyzer
|
|
527
528
|
#
|
528
529
|
# Resource policies grant permissions on Amazon Web Services resources.
|
529
530
|
# Resource policies include trust policies for IAM roles and bucket
|
530
|
-
# policies for Amazon S3 buckets.
|
531
|
-
# as identity policy or resource policy or a specific input such as
|
532
|
-
# managed policy or Amazon S3 bucket policy.
|
531
|
+
# policies for Amazon S3 buckets.
|
533
532
|
#
|
534
533
|
# @return [Types::CheckAccessNotGrantedResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
535
534
|
#
|
@@ -1452,6 +1451,7 @@ module Aws::AccessAnalyzer
|
|
1452
1451
|
# resp.finding.sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT", "S3_ACCESS_POINT_ACCOUNT"
|
1453
1452
|
# resp.finding.sources[0].detail.access_point_arn #=> String
|
1454
1453
|
# resp.finding.sources[0].detail.access_point_account #=> String
|
1454
|
+
# resp.finding.resource_control_policy_restriction #=> String, one of "APPLICABLE", "FAILED_TO_EVALUATE_RCP", "NOT_APPLICABLE"
|
1455
1455
|
#
|
1456
1456
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/GetFinding AWS API Documentation
|
1457
1457
|
#
|
@@ -1678,6 +1678,7 @@ module Aws::AccessAnalyzer
|
|
1678
1678
|
# resp.finding_details[0].external_access_details.sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT", "S3_ACCESS_POINT_ACCOUNT"
|
1679
1679
|
# resp.finding_details[0].external_access_details.sources[0].detail.access_point_arn #=> String
|
1680
1680
|
# resp.finding_details[0].external_access_details.sources[0].detail.access_point_account #=> String
|
1681
|
+
# resp.finding_details[0].external_access_details.resource_control_policy_restriction #=> String, one of "APPLICABLE", "FAILED_TO_EVALUATE_RCP", "NOT_APPLICABLE"
|
1681
1682
|
# resp.finding_details[0].unused_permission_details.actions #=> Array
|
1682
1683
|
# resp.finding_details[0].unused_permission_details.actions[0].action #=> String
|
1683
1684
|
# resp.finding_details[0].unused_permission_details.actions[0].last_accessed #=> Time
|
@@ -1835,6 +1836,7 @@ module Aws::AccessAnalyzer
|
|
1835
1836
|
# resp.findings[0].sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT", "S3_ACCESS_POINT_ACCOUNT"
|
1836
1837
|
# resp.findings[0].sources[0].detail.access_point_arn #=> String
|
1837
1838
|
# resp.findings[0].sources[0].detail.access_point_account #=> String
|
1839
|
+
# resp.findings[0].resource_control_policy_restriction #=> String, one of "APPLICABLE", "FAILED_TO_EVALUATE_RCP", "NOT_APPLICABLE"
|
1838
1840
|
# resp.next_token #=> String
|
1839
1841
|
#
|
1840
1842
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ListAccessPreviewFindings AWS API Documentation
|
@@ -2134,6 +2136,7 @@ module Aws::AccessAnalyzer
|
|
2134
2136
|
# resp.findings[0].sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT", "S3_ACCESS_POINT_ACCOUNT"
|
2135
2137
|
# resp.findings[0].sources[0].detail.access_point_arn #=> String
|
2136
2138
|
# resp.findings[0].sources[0].detail.access_point_account #=> String
|
2139
|
+
# resp.findings[0].resource_control_policy_restriction #=> String, one of "APPLICABLE", "FAILED_TO_EVALUATE_RCP", "NOT_APPLICABLE"
|
2137
2140
|
# resp.next_token #=> String
|
2138
2141
|
#
|
2139
2142
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ListFindings AWS API Documentation
|
@@ -2610,7 +2613,7 @@ module Aws::AccessAnalyzer
|
|
2610
2613
|
# max_results: 1,
|
2611
2614
|
# next_token: "Token",
|
2612
2615
|
# policy_document: "PolicyDocument", # required
|
2613
|
-
# policy_type: "IDENTITY_POLICY", # required, accepts IDENTITY_POLICY, RESOURCE_POLICY, SERVICE_CONTROL_POLICY
|
2616
|
+
# policy_type: "IDENTITY_POLICY", # required, accepts IDENTITY_POLICY, RESOURCE_POLICY, SERVICE_CONTROL_POLICY, RESOURCE_CONTROL_POLICY
|
2614
2617
|
# validate_policy_resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::S3::AccessPoint, AWS::S3::MultiRegionAccessPoint, AWS::S3ObjectLambda::AccessPoint, AWS::IAM::AssumeRolePolicyDocument, AWS::DynamoDB::Table
|
2615
2618
|
# })
|
2616
2619
|
#
|
@@ -2663,7 +2666,7 @@ module Aws::AccessAnalyzer
|
|
2663
2666
|
tracer: tracer
|
2664
2667
|
)
|
2665
2668
|
context[:gem_name] = 'aws-sdk-accessanalyzer'
|
2666
|
-
context[:gem_version] = '1.
|
2669
|
+
context[:gem_version] = '1.63.0'
|
2667
2670
|
Seahorse::Client::Request.new(handlers, context)
|
2668
2671
|
end
|
2669
2672
|
|
@@ -225,6 +225,7 @@ module Aws::AccessAnalyzer
|
|
225
225
|
RegionList = Shapes::ListShape.new(name: 'RegionList')
|
226
226
|
Resource = Shapes::StringShape.new(name: 'Resource')
|
227
227
|
ResourceArn = Shapes::StringShape.new(name: 'ResourceArn')
|
228
|
+
ResourceControlPolicyRestriction = Shapes::StringShape.new(name: 'ResourceControlPolicyRestriction')
|
228
229
|
ResourceNotFoundException = Shapes::StructureShape.new(name: 'ResourceNotFoundException')
|
229
230
|
ResourceType = Shapes::StringShape.new(name: 'ResourceType')
|
230
231
|
RetiringPrincipal = Shapes::StringShape.new(name: 'RetiringPrincipal')
|
@@ -327,6 +328,7 @@ module Aws::AccessAnalyzer
|
|
327
328
|
AccessPreviewFinding.add_member(:resource_owner_account, Shapes::ShapeRef.new(shape: String, required: true, location_name: "resourceOwnerAccount"))
|
328
329
|
AccessPreviewFinding.add_member(:error, Shapes::ShapeRef.new(shape: String, location_name: "error"))
|
329
330
|
AccessPreviewFinding.add_member(:sources, Shapes::ShapeRef.new(shape: FindingSourceList, location_name: "sources"))
|
331
|
+
AccessPreviewFinding.add_member(:resource_control_policy_restriction, Shapes::ShapeRef.new(shape: ResourceControlPolicyRestriction, location_name: "resourceControlPolicyRestriction"))
|
330
332
|
AccessPreviewFinding.struct_class = Types::AccessPreviewFinding
|
331
333
|
|
332
334
|
AccessPreviewFindingsList.member = Shapes::ShapeRef.new(shape: AccessPreviewFinding)
|
@@ -564,6 +566,7 @@ module Aws::AccessAnalyzer
|
|
564
566
|
ExternalAccessDetails.add_member(:is_public, Shapes::ShapeRef.new(shape: Boolean, location_name: "isPublic"))
|
565
567
|
ExternalAccessDetails.add_member(:principal, Shapes::ShapeRef.new(shape: PrincipalMap, location_name: "principal"))
|
566
568
|
ExternalAccessDetails.add_member(:sources, Shapes::ShapeRef.new(shape: FindingSourceList, location_name: "sources"))
|
569
|
+
ExternalAccessDetails.add_member(:resource_control_policy_restriction, Shapes::ShapeRef.new(shape: ResourceControlPolicyRestriction, location_name: "resourceControlPolicyRestriction"))
|
567
570
|
ExternalAccessDetails.struct_class = Types::ExternalAccessDetails
|
568
571
|
|
569
572
|
FilterCriteriaMap.key = Shapes::ShapeRef.new(shape: String)
|
@@ -583,6 +586,7 @@ module Aws::AccessAnalyzer
|
|
583
586
|
Finding.add_member(:resource_owner_account, Shapes::ShapeRef.new(shape: String, required: true, location_name: "resourceOwnerAccount"))
|
584
587
|
Finding.add_member(:error, Shapes::ShapeRef.new(shape: String, location_name: "error"))
|
585
588
|
Finding.add_member(:sources, Shapes::ShapeRef.new(shape: FindingSourceList, location_name: "sources"))
|
589
|
+
Finding.add_member(:resource_control_policy_restriction, Shapes::ShapeRef.new(shape: ResourceControlPolicyRestriction, location_name: "resourceControlPolicyRestriction"))
|
586
590
|
Finding.struct_class = Types::Finding
|
587
591
|
|
588
592
|
FindingDetails.add_member(:external_access_details, Shapes::ShapeRef.new(shape: ExternalAccessDetails, location_name: "externalAccessDetails"))
|
@@ -627,6 +631,7 @@ module Aws::AccessAnalyzer
|
|
627
631
|
FindingSummary.add_member(:resource_owner_account, Shapes::ShapeRef.new(shape: String, required: true, location_name: "resourceOwnerAccount"))
|
628
632
|
FindingSummary.add_member(:error, Shapes::ShapeRef.new(shape: String, location_name: "error"))
|
629
633
|
FindingSummary.add_member(:sources, Shapes::ShapeRef.new(shape: FindingSourceList, location_name: "sources"))
|
634
|
+
FindingSummary.add_member(:resource_control_policy_restriction, Shapes::ShapeRef.new(shape: ResourceControlPolicyRestriction, location_name: "resourceControlPolicyRestriction"))
|
630
635
|
FindingSummary.struct_class = Types::FindingSummary
|
631
636
|
|
632
637
|
FindingSummaryV2.add_member(:analyzed_at, Shapes::ShapeRef.new(shape: Timestamp, required: true, location_name: "analyzedAt"))
|
@@ -1183,6 +1188,7 @@ module Aws::AccessAnalyzer
|
|
1183
1188
|
|
1184
1189
|
api.metadata = {
|
1185
1190
|
"apiVersion" => "2019-11-01",
|
1191
|
+
"auth" => ["aws.auth#sigv4"],
|
1186
1192
|
"endpointPrefix" => "access-analyzer",
|
1187
1193
|
"protocol" => "rest-json",
|
1188
1194
|
"protocols" => ["rest-json"],
|
@@ -21,8 +21,9 @@ module Aws::AccessAnalyzer
|
|
21
21
|
#
|
22
22
|
# @!attribute [rw] resources
|
23
23
|
# A list of resources for the access permissions. Any strings that can
|
24
|
-
# be used as
|
25
|
-
# resources to check.
|
24
|
+
# be used as an Amazon Resource Name (ARN) in an IAM policy can be
|
25
|
+
# used in the list of resources to check. You can only use a wildcard
|
26
|
+
# in the portion of the ARN that specifies the resource ID.
|
26
27
|
# @return [Array<String>]
|
27
28
|
#
|
28
29
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/Access AWS API Documentation
|
@@ -191,6 +192,11 @@ module Aws::AccessAnalyzer
|
|
191
192
|
# bucket findings.
|
192
193
|
# @return [Array<Types::FindingSource>]
|
193
194
|
#
|
195
|
+
# @!attribute [rw] resource_control_policy_restriction
|
196
|
+
# The type of restriction applied to the finding by the resource owner
|
197
|
+
# with an Organizations resource control policy (RCP).
|
198
|
+
# @return [String]
|
199
|
+
#
|
194
200
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/AccessPreviewFinding AWS API Documentation
|
195
201
|
#
|
196
202
|
class AccessPreviewFinding < Struct.new(
|
@@ -208,7 +214,8 @@ module Aws::AccessAnalyzer
|
|
208
214
|
:status,
|
209
215
|
:resource_owner_account,
|
210
216
|
:error,
|
211
|
-
:sources
|
217
|
+
:sources,
|
218
|
+
:resource_control_policy_restriction)
|
212
219
|
SENSITIVE = []
|
213
220
|
include Aws::Structure
|
214
221
|
end
|
@@ -583,12 +590,13 @@ module Aws::AccessAnalyzer
|
|
583
590
|
# @!attribute [rw] access
|
584
591
|
# An access object containing the permissions that shouldn't be
|
585
592
|
# granted by the specified policy. If only actions are specified, IAM
|
586
|
-
# Access Analyzer checks for access
|
587
|
-
# the policy. If only resources are
|
588
|
-
# Analyzer checks
|
589
|
-
# resources. If both actions and
|
590
|
-
#
|
591
|
-
# the specified
|
593
|
+
# Access Analyzer checks for access to peform at least one of the
|
594
|
+
# actions on any resource in the policy. If only resources are
|
595
|
+
# specified, then IAM Access Analyzer checks for access to perform any
|
596
|
+
# action on at least one of the resources. If both actions and
|
597
|
+
# resources are specified, IAM Access Analyzer checks for access to
|
598
|
+
# perform at least one of the specified actions on at least one of the
|
599
|
+
# specified resources.
|
592
600
|
# @return [Array<Types::Access>]
|
593
601
|
#
|
594
602
|
# @!attribute [rw] policy_type
|
@@ -598,9 +606,7 @@ module Aws::AccessAnalyzer
|
|
598
606
|
#
|
599
607
|
# Resource policies grant permissions on Amazon Web Services
|
600
608
|
# resources. Resource policies include trust policies for IAM roles
|
601
|
-
# and bucket policies for Amazon S3 buckets.
|
602
|
-
# input such as identity policy or resource policy or a specific input
|
603
|
-
# such as managed policy or Amazon S3 bucket policy.
|
609
|
+
# and bucket policies for Amazon S3 buckets.
|
604
610
|
# @return [String]
|
605
611
|
#
|
606
612
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/CheckAccessNotGrantedRequest AWS API Documentation
|
@@ -1411,6 +1417,11 @@ module Aws::AccessAnalyzer
|
|
1411
1417
|
# Amazon S3 bucket findings.
|
1412
1418
|
# @return [Array<Types::FindingSource>]
|
1413
1419
|
#
|
1420
|
+
# @!attribute [rw] resource_control_policy_restriction
|
1421
|
+
# The type of restriction applied to the finding by the resource owner
|
1422
|
+
# with an Organizations resource control policy (RCP).
|
1423
|
+
# @return [String]
|
1424
|
+
#
|
1414
1425
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ExternalAccessDetails AWS API Documentation
|
1415
1426
|
#
|
1416
1427
|
class ExternalAccessDetails < Struct.new(
|
@@ -1418,7 +1429,8 @@ module Aws::AccessAnalyzer
|
|
1418
1429
|
:condition,
|
1419
1430
|
:is_public,
|
1420
1431
|
:principal,
|
1421
|
-
:sources
|
1432
|
+
:sources,
|
1433
|
+
:resource_control_policy_restriction)
|
1422
1434
|
SENSITIVE = []
|
1423
1435
|
include Aws::Structure
|
1424
1436
|
end
|
@@ -1487,6 +1499,11 @@ module Aws::AccessAnalyzer
|
|
1487
1499
|
# bucket findings.
|
1488
1500
|
# @return [Array<Types::FindingSource>]
|
1489
1501
|
#
|
1502
|
+
# @!attribute [rw] resource_control_policy_restriction
|
1503
|
+
# The type of restriction applied to the finding by the resource owner
|
1504
|
+
# with an Organizations resource control policy (RCP).
|
1505
|
+
# @return [String]
|
1506
|
+
#
|
1490
1507
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/Finding AWS API Documentation
|
1491
1508
|
#
|
1492
1509
|
class Finding < Struct.new(
|
@@ -1503,7 +1520,8 @@ module Aws::AccessAnalyzer
|
|
1503
1520
|
:status,
|
1504
1521
|
:resource_owner_account,
|
1505
1522
|
:error,
|
1506
|
-
:sources
|
1523
|
+
:sources,
|
1524
|
+
:resource_control_policy_restriction)
|
1507
1525
|
SENSITIVE = []
|
1508
1526
|
include Aws::Structure
|
1509
1527
|
end
|
@@ -1668,6 +1686,11 @@ module Aws::AccessAnalyzer
|
|
1668
1686
|
# bucket findings.
|
1669
1687
|
# @return [Array<Types::FindingSource>]
|
1670
1688
|
#
|
1689
|
+
# @!attribute [rw] resource_control_policy_restriction
|
1690
|
+
# The type of restriction applied to the finding by the resource owner
|
1691
|
+
# with an Organizations resource control policy (RCP).
|
1692
|
+
# @return [String]
|
1693
|
+
#
|
1671
1694
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/FindingSummary AWS API Documentation
|
1672
1695
|
#
|
1673
1696
|
class FindingSummary < Struct.new(
|
@@ -1684,7 +1707,8 @@ module Aws::AccessAnalyzer
|
|
1684
1707
|
:status,
|
1685
1708
|
:resource_owner_account,
|
1686
1709
|
:error,
|
1687
|
-
:sources
|
1710
|
+
:sources,
|
1711
|
+
:resource_control_policy_restriction)
|
1688
1712
|
SENSITIVE = []
|
1689
1713
|
include Aws::Structure
|
1690
1714
|
end
|
data/sig/client.rbs
CHANGED
@@ -645,7 +645,7 @@ module Aws
|
|
645
645
|
?max_results: ::Integer,
|
646
646
|
?next_token: ::String,
|
647
647
|
policy_document: ::String,
|
648
|
-
policy_type: ("IDENTITY_POLICY" | "RESOURCE_POLICY" | "SERVICE_CONTROL_POLICY"),
|
648
|
+
policy_type: ("IDENTITY_POLICY" | "RESOURCE_POLICY" | "SERVICE_CONTROL_POLICY" | "RESOURCE_CONTROL_POLICY"),
|
649
649
|
?validate_policy_resource_type: ("AWS::S3::Bucket" | "AWS::S3::AccessPoint" | "AWS::S3::MultiRegionAccessPoint" | "AWS::S3ObjectLambda::AccessPoint" | "AWS::IAM::AssumeRolePolicyDocument" | "AWS::DynamoDB::Table")
|
650
650
|
) -> _ValidatePolicyResponseSuccess
|
651
651
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _ValidatePolicyResponseSuccess
|
data/sig/types.rbs
CHANGED
@@ -45,6 +45,7 @@ module Aws::AccessAnalyzer
|
|
45
45
|
attr_accessor resource_owner_account: ::String
|
46
46
|
attr_accessor error: ::String
|
47
47
|
attr_accessor sources: ::Array[Types::FindingSource]
|
48
|
+
attr_accessor resource_control_policy_restriction: ("APPLICABLE" | "FAILED_TO_EVALUATE_RCP" | "NOT_APPLICABLE")
|
48
49
|
SENSITIVE: []
|
49
50
|
end
|
50
51
|
|
@@ -348,6 +349,7 @@ module Aws::AccessAnalyzer
|
|
348
349
|
attr_accessor is_public: bool
|
349
350
|
attr_accessor principal: ::Hash[::String, ::String]
|
350
351
|
attr_accessor sources: ::Array[Types::FindingSource]
|
352
|
+
attr_accessor resource_control_policy_restriction: ("APPLICABLE" | "FAILED_TO_EVALUATE_RCP" | "NOT_APPLICABLE")
|
351
353
|
SENSITIVE: []
|
352
354
|
end
|
353
355
|
|
@@ -366,6 +368,7 @@ module Aws::AccessAnalyzer
|
|
366
368
|
attr_accessor resource_owner_account: ::String
|
367
369
|
attr_accessor error: ::String
|
368
370
|
attr_accessor sources: ::Array[Types::FindingSource]
|
371
|
+
attr_accessor resource_control_policy_restriction: ("APPLICABLE" | "FAILED_TO_EVALUATE_RCP" | "NOT_APPLICABLE")
|
369
372
|
SENSITIVE: []
|
370
373
|
end
|
371
374
|
|
@@ -419,6 +422,7 @@ module Aws::AccessAnalyzer
|
|
419
422
|
attr_accessor resource_owner_account: ::String
|
420
423
|
attr_accessor error: ::String
|
421
424
|
attr_accessor sources: ::Array[Types::FindingSource]
|
425
|
+
attr_accessor resource_control_policy_restriction: ("APPLICABLE" | "FAILED_TO_EVALUATE_RCP" | "NOT_APPLICABLE")
|
422
426
|
SENSITIVE: []
|
423
427
|
end
|
424
428
|
|
@@ -1092,7 +1096,7 @@ module Aws::AccessAnalyzer
|
|
1092
1096
|
attr_accessor max_results: ::Integer
|
1093
1097
|
attr_accessor next_token: ::String
|
1094
1098
|
attr_accessor policy_document: ::String
|
1095
|
-
attr_accessor policy_type: ("IDENTITY_POLICY" | "RESOURCE_POLICY" | "SERVICE_CONTROL_POLICY")
|
1099
|
+
attr_accessor policy_type: ("IDENTITY_POLICY" | "RESOURCE_POLICY" | "SERVICE_CONTROL_POLICY" | "RESOURCE_CONTROL_POLICY")
|
1096
1100
|
attr_accessor validate_policy_resource_type: ("AWS::S3::Bucket" | "AWS::S3::AccessPoint" | "AWS::S3::MultiRegionAccessPoint" | "AWS::S3ObjectLambda::AccessPoint" | "AWS::IAM::AssumeRolePolicyDocument" | "AWS::DynamoDB::Table")
|
1097
1101
|
SENSITIVE: []
|
1098
1102
|
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-accessanalyzer
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.63.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-11-
|
11
|
+
date: 2024-11-13 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|
@@ -36,14 +36,14 @@ dependencies:
|
|
36
36
|
requirements:
|
37
37
|
- - "~>"
|
38
38
|
- !ruby/object:Gem::Version
|
39
|
-
version: '1.
|
39
|
+
version: '1.5'
|
40
40
|
type: :runtime
|
41
41
|
prerelease: false
|
42
42
|
version_requirements: !ruby/object:Gem::Requirement
|
43
43
|
requirements:
|
44
44
|
- - "~>"
|
45
45
|
- !ruby/object:Gem::Version
|
46
|
-
version: '1.
|
46
|
+
version: '1.5'
|
47
47
|
description: Official AWS Ruby gem for Access Analyzer. This gem is part of the AWS
|
48
48
|
SDK for Ruby.
|
49
49
|
email:
|