aws-sdk-accessanalyzer 1.63.0 → 1.65.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: c447bf8de1d6dd1a90d8e44347b1ac0c11b4e4f66631639613f55e7e46befd42
4
- data.tar.gz: 9c7ae9c351e0d8259bf12f8af1e344d696a7ed44e77d1cc12e4f3563f7f757bb
3
+ metadata.gz: c3ff3f6bceaf3418b3e54c4ea0d99ede89cc928cd0893b394e36754282a2192b
4
+ data.tar.gz: 0b058cdb0c604cd3fbf886753fbb2e0f2b6baaab60841bfca3b8bb20876fdf88
5
5
  SHA512:
6
- metadata.gz: bb005943fd3fb07e498393000ce199903ad7ee88531bea0b7183686202fc53afcb34c7709263cbd850280cba1e2b25a7f011ea3b3d8274609a93a711ac8f3ffd
7
- data.tar.gz: 60b3142ad2acbccdef1908dae580bb99f08c7411aac664e6edb25cb8d38afa2381d04c7e6252bc177adcd288b17fbb4bf4e289e4fc65722525850ae3dc476605
6
+ metadata.gz: 83e03b02eacead1f8189b7d20f6ba96cea831e6aeb8940e8bffb2054be060f2fa1e764623443793d320f013df2fd20f03580d421b65081759b5db9bdf9adb43d
7
+ data.tar.gz: 9ae70c95401884fae23af2cac48bf25e7bfc6a59daa12ee7250ed7c7ed880bb237cf09a483125682ee5abd478eb50f45bcdc0e6a945b4dfe8f86acdcb086296c
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.65.0 (2025-01-15)
5
+ ------------------
6
+
7
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
8
+
9
+ 1.64.0 (2024-11-14)
10
+ ------------------
11
+
12
+ * Feature - Expand analyzer configuration capabilities for unused access analyzers. Unused access analyzer configurations now support the ability to exclude accounts and resource tags from analysis providing more granular control over the scope of analysis.
13
+
4
14
  1.63.0 (2024-11-13)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.63.0
1
+ 1.65.0
@@ -257,11 +257,34 @@ module Aws::AccessAnalyzer
257
257
  # Used when loading credentials from the shared credentials file
258
258
  # at HOME/.aws/credentials. When not specified, 'default' is used.
259
259
  #
260
+ # @option options [String] :request_checksum_calculation ("when_supported")
261
+ # Determines when a checksum will be calculated for request payloads. Values are:
262
+ #
263
+ # * `when_supported` - (default) When set, a checksum will be
264
+ # calculated for all request payloads of operations modeled with the
265
+ # `httpChecksum` trait where `requestChecksumRequired` is `true` and/or a
266
+ # `requestAlgorithmMember` is modeled.
267
+ # * `when_required` - When set, a checksum will only be calculated for
268
+ # request payloads of operations modeled with the `httpChecksum` trait where
269
+ # `requestChecksumRequired` is `true` or where a `requestAlgorithmMember`
270
+ # is modeled and supplied.
271
+ #
260
272
  # @option options [Integer] :request_min_compression_size_bytes (10240)
261
273
  # The minimum size in bytes that triggers compression for request
262
274
  # bodies. The value must be non-negative integer value between 0
263
275
  # and 10485780 bytes inclusive.
264
276
  #
277
+ # @option options [String] :response_checksum_validation ("when_supported")
278
+ # Determines when checksum validation will be performed on response payloads. Values are:
279
+ #
280
+ # * `when_supported` - (default) When set, checksum validation is performed on all
281
+ # response payloads of operations modeled with the `httpChecksum` trait where
282
+ # `responseAlgorithms` is modeled, except when no modeled checksum algorithms
283
+ # are supported.
284
+ # * `when_required` - When set, checksum validation is not performed on
285
+ # response payloads of operations unless the checksum algorithm is supported and
286
+ # the `requestValidationModeMember` member is set to `ENABLED`.
287
+ #
265
288
  # @option options [Proc] :retry_backoff
266
289
  # A proc or lambda used for backoff. Defaults to 2**retries * retry_base_delay.
267
290
  # This option is only used in the `legacy` retry mode.
@@ -950,7 +973,15 @@ module Aws::AccessAnalyzer
950
973
  # the rule.
951
974
  #
952
975
  # @option params [Hash<String,String>] :tags
953
- # An array of key-value pairs to apply to the analyzer.
976
+ # An array of key-value pairs to apply to the analyzer. You can use the
977
+ # set of Unicode letters, digits, whitespace, `_`, `.`, `/`, `=`, `+`,
978
+ # and `-`.
979
+ #
980
+ # For the tag key, you can specify a value that is 1 to 128 characters
981
+ # in length and cannot be prefixed with `aws:`.
982
+ #
983
+ # For the tag value, you can specify a value that is 0 to 256 characters
984
+ # in length.
954
985
  #
955
986
  # @option params [String] :client_token
956
987
  # A client token.
@@ -961,8 +992,7 @@ module Aws::AccessAnalyzer
961
992
  # @option params [Types::AnalyzerConfiguration] :configuration
962
993
  # Specifies the configuration of the analyzer. If the analyzer is an
963
994
  # unused access analyzer, the specified scope of unused access is used
964
- # for the configuration. If the analyzer is an external access analyzer,
965
- # this field is not used.
995
+ # for the configuration.
966
996
  #
967
997
  # @return [Types::CreateAnalyzerResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
968
998
  #
@@ -993,6 +1023,18 @@ module Aws::AccessAnalyzer
993
1023
  # configuration: {
994
1024
  # unused_access: {
995
1025
  # unused_access_age: 1,
1026
+ # analysis_rule: {
1027
+ # exclusions: [
1028
+ # {
1029
+ # account_ids: ["String"],
1030
+ # resource_tags: [
1031
+ # {
1032
+ # "String" => "String",
1033
+ # },
1034
+ # ],
1035
+ # },
1036
+ # ],
1037
+ # },
996
1038
  # },
997
1039
  # },
998
1040
  # })
@@ -1294,7 +1336,7 @@ module Aws::AccessAnalyzer
1294
1336
  # @example Response structure
1295
1337
  #
1296
1338
  # resp.resource.resource_arn #=> String
1297
- # resp.resource.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket", "AWS::DynamoDB::Table", "AWS::DynamoDB::Stream"
1339
+ # resp.resource.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket", "AWS::DynamoDB::Table", "AWS::DynamoDB::Stream", "AWS::IAM::User"
1298
1340
  # resp.resource.created_at #=> Time
1299
1341
  # resp.resource.analyzed_at #=> Time
1300
1342
  # resp.resource.updated_at #=> Time
@@ -1344,6 +1386,12 @@ module Aws::AccessAnalyzer
1344
1386
  # resp.analyzer.status #=> String, one of "ACTIVE", "CREATING", "DISABLED", "FAILED"
1345
1387
  # resp.analyzer.status_reason.code #=> String, one of "AWS_SERVICE_ACCESS_DISABLED", "DELEGATED_ADMINISTRATOR_DEREGISTERED", "ORGANIZATION_DELETED", "SERVICE_LINKED_ROLE_CREATION_FAILED"
1346
1388
  # resp.analyzer.configuration.unused_access.unused_access_age #=> Integer
1389
+ # resp.analyzer.configuration.unused_access.analysis_rule.exclusions #=> Array
1390
+ # resp.analyzer.configuration.unused_access.analysis_rule.exclusions[0].account_ids #=> Array
1391
+ # resp.analyzer.configuration.unused_access.analysis_rule.exclusions[0].account_ids[0] #=> String
1392
+ # resp.analyzer.configuration.unused_access.analysis_rule.exclusions[0].resource_tags #=> Array
1393
+ # resp.analyzer.configuration.unused_access.analysis_rule.exclusions[0].resource_tags[0] #=> Hash
1394
+ # resp.analyzer.configuration.unused_access.analysis_rule.exclusions[0].resource_tags[0]["String"] #=> String
1347
1395
  #
1348
1396
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/GetAnalyzer AWS API Documentation
1349
1397
  #
@@ -1438,7 +1486,7 @@ module Aws::AccessAnalyzer
1438
1486
  # resp.finding.action[0] #=> String
1439
1487
  # resp.finding.resource #=> String
1440
1488
  # resp.finding.is_public #=> Boolean
1441
- # resp.finding.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket", "AWS::DynamoDB::Table", "AWS::DynamoDB::Stream"
1489
+ # resp.finding.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket", "AWS::DynamoDB::Table", "AWS::DynamoDB::Stream", "AWS::IAM::User"
1442
1490
  # resp.finding.condition #=> Hash
1443
1491
  # resp.finding.condition["String"] #=> String
1444
1492
  # resp.finding.created_at #=> Time
@@ -1662,7 +1710,7 @@ module Aws::AccessAnalyzer
1662
1710
  # resp.id #=> String
1663
1711
  # resp.next_token #=> String
1664
1712
  # resp.resource #=> String
1665
- # resp.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket", "AWS::DynamoDB::Table", "AWS::DynamoDB::Stream"
1713
+ # resp.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket", "AWS::DynamoDB::Table", "AWS::DynamoDB::Stream", "AWS::IAM::User"
1666
1714
  # resp.resource_owner_account #=> String
1667
1715
  # resp.status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
1668
1716
  # resp.updated_at #=> Time
@@ -1826,7 +1874,7 @@ module Aws::AccessAnalyzer
1826
1874
  # resp.findings[0].condition["String"] #=> String
1827
1875
  # resp.findings[0].resource #=> String
1828
1876
  # resp.findings[0].is_public #=> Boolean
1829
- # resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket", "AWS::DynamoDB::Table", "AWS::DynamoDB::Stream"
1877
+ # resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket", "AWS::DynamoDB::Table", "AWS::DynamoDB::Stream", "AWS::IAM::User"
1830
1878
  # resp.findings[0].created_at #=> Time
1831
1879
  # resp.findings[0].change_type #=> String, one of "CHANGED", "NEW", "UNCHANGED"
1832
1880
  # resp.findings[0].status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
@@ -1898,8 +1946,7 @@ module Aws::AccessAnalyzer
1898
1946
  end
1899
1947
 
1900
1948
  # Retrieves a list of resources of the specified type that have been
1901
- # analyzed by the specified external access analyzer. This action is not
1902
- # supported for unused access analyzers.
1949
+ # analyzed by the specified analyzer.
1903
1950
  #
1904
1951
  # @option params [required, String] :analyzer_arn
1905
1952
  # The [ARN of the analyzer][1] to retrieve a list of analyzed resources
@@ -1929,7 +1976,7 @@ module Aws::AccessAnalyzer
1929
1976
  #
1930
1977
  # resp = client.list_analyzed_resources({
1931
1978
  # analyzer_arn: "AnalyzerArn", # required
1932
- # resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key, AWS::SecretsManager::Secret, AWS::EFS::FileSystem, AWS::EC2::Snapshot, AWS::ECR::Repository, AWS::RDS::DBSnapshot, AWS::RDS::DBClusterSnapshot, AWS::SNS::Topic, AWS::S3Express::DirectoryBucket, AWS::DynamoDB::Table, AWS::DynamoDB::Stream
1979
+ # resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key, AWS::SecretsManager::Secret, AWS::EFS::FileSystem, AWS::EC2::Snapshot, AWS::ECR::Repository, AWS::RDS::DBSnapshot, AWS::RDS::DBClusterSnapshot, AWS::SNS::Topic, AWS::S3Express::DirectoryBucket, AWS::DynamoDB::Table, AWS::DynamoDB::Stream, AWS::IAM::User
1933
1980
  # next_token: "Token",
1934
1981
  # max_results: 1,
1935
1982
  # })
@@ -1939,7 +1986,7 @@ module Aws::AccessAnalyzer
1939
1986
  # resp.analyzed_resources #=> Array
1940
1987
  # resp.analyzed_resources[0].resource_arn #=> String
1941
1988
  # resp.analyzed_resources[0].resource_owner_account #=> String
1942
- # resp.analyzed_resources[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket", "AWS::DynamoDB::Table", "AWS::DynamoDB::Stream"
1989
+ # resp.analyzed_resources[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket", "AWS::DynamoDB::Table", "AWS::DynamoDB::Stream", "AWS::IAM::User"
1943
1990
  # resp.next_token #=> String
1944
1991
  #
1945
1992
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ListAnalyzedResources AWS API Documentation
@@ -1991,6 +2038,12 @@ module Aws::AccessAnalyzer
1991
2038
  # resp.analyzers[0].status #=> String, one of "ACTIVE", "CREATING", "DISABLED", "FAILED"
1992
2039
  # resp.analyzers[0].status_reason.code #=> String, one of "AWS_SERVICE_ACCESS_DISABLED", "DELEGATED_ADMINISTRATOR_DEREGISTERED", "ORGANIZATION_DELETED", "SERVICE_LINKED_ROLE_CREATION_FAILED"
1993
2040
  # resp.analyzers[0].configuration.unused_access.unused_access_age #=> Integer
2041
+ # resp.analyzers[0].configuration.unused_access.analysis_rule.exclusions #=> Array
2042
+ # resp.analyzers[0].configuration.unused_access.analysis_rule.exclusions[0].account_ids #=> Array
2043
+ # resp.analyzers[0].configuration.unused_access.analysis_rule.exclusions[0].account_ids[0] #=> String
2044
+ # resp.analyzers[0].configuration.unused_access.analysis_rule.exclusions[0].resource_tags #=> Array
2045
+ # resp.analyzers[0].configuration.unused_access.analysis_rule.exclusions[0].resource_tags[0] #=> Hash
2046
+ # resp.analyzers[0].configuration.unused_access.analysis_rule.exclusions[0].resource_tags[0]["String"] #=> String
1994
2047
  # resp.next_token #=> String
1995
2048
  #
1996
2049
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ListAnalyzers AWS API Documentation
@@ -2123,7 +2176,7 @@ module Aws::AccessAnalyzer
2123
2176
  # resp.findings[0].action[0] #=> String
2124
2177
  # resp.findings[0].resource #=> String
2125
2178
  # resp.findings[0].is_public #=> Boolean
2126
- # resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket", "AWS::DynamoDB::Table", "AWS::DynamoDB::Stream"
2179
+ # resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket", "AWS::DynamoDB::Table", "AWS::DynamoDB::Stream", "AWS::IAM::User"
2127
2180
  # resp.findings[0].condition #=> Hash
2128
2181
  # resp.findings[0].condition["String"] #=> String
2129
2182
  # resp.findings[0].created_at #=> Time
@@ -2216,7 +2269,7 @@ module Aws::AccessAnalyzer
2216
2269
  # resp.findings[0].error #=> String
2217
2270
  # resp.findings[0].id #=> String
2218
2271
  # resp.findings[0].resource #=> String
2219
- # resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket", "AWS::DynamoDB::Table", "AWS::DynamoDB::Stream"
2272
+ # resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket", "AWS::DynamoDB::Table", "AWS::DynamoDB::Stream", "AWS::IAM::User"
2220
2273
  # resp.findings[0].resource_owner_account #=> String
2221
2274
  # resp.findings[0].status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
2222
2275
  # resp.findings[0].updated_at #=> Time
@@ -2462,6 +2515,61 @@ module Aws::AccessAnalyzer
2462
2515
  req.send_request(options)
2463
2516
  end
2464
2517
 
2518
+ # Modifies the configuration of an existing analyzer.
2519
+ #
2520
+ # @option params [required, String] :analyzer_name
2521
+ # The name of the analyzer to modify.
2522
+ #
2523
+ # @option params [Types::AnalyzerConfiguration] :configuration
2524
+ # Contains information about the configuration of an analyzer for an
2525
+ # Amazon Web Services organization or account.
2526
+ #
2527
+ # @return [Types::UpdateAnalyzerResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
2528
+ #
2529
+ # * {Types::UpdateAnalyzerResponse#configuration #configuration} => Types::AnalyzerConfiguration
2530
+ #
2531
+ # @example Request syntax with placeholder values
2532
+ #
2533
+ # resp = client.update_analyzer({
2534
+ # analyzer_name: "Name", # required
2535
+ # configuration: {
2536
+ # unused_access: {
2537
+ # unused_access_age: 1,
2538
+ # analysis_rule: {
2539
+ # exclusions: [
2540
+ # {
2541
+ # account_ids: ["String"],
2542
+ # resource_tags: [
2543
+ # {
2544
+ # "String" => "String",
2545
+ # },
2546
+ # ],
2547
+ # },
2548
+ # ],
2549
+ # },
2550
+ # },
2551
+ # },
2552
+ # })
2553
+ #
2554
+ # @example Response structure
2555
+ #
2556
+ # resp.configuration.unused_access.unused_access_age #=> Integer
2557
+ # resp.configuration.unused_access.analysis_rule.exclusions #=> Array
2558
+ # resp.configuration.unused_access.analysis_rule.exclusions[0].account_ids #=> Array
2559
+ # resp.configuration.unused_access.analysis_rule.exclusions[0].account_ids[0] #=> String
2560
+ # resp.configuration.unused_access.analysis_rule.exclusions[0].resource_tags #=> Array
2561
+ # resp.configuration.unused_access.analysis_rule.exclusions[0].resource_tags[0] #=> Hash
2562
+ # resp.configuration.unused_access.analysis_rule.exclusions[0].resource_tags[0]["String"] #=> String
2563
+ #
2564
+ # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/UpdateAnalyzer AWS API Documentation
2565
+ #
2566
+ # @overload update_analyzer(params = {})
2567
+ # @param [Hash] params ({})
2568
+ def update_analyzer(params = {}, options = {})
2569
+ req = build_request(:update_analyzer, params)
2570
+ req.send_request(options)
2571
+ end
2572
+
2465
2573
  # Updates the criteria and values for the specified archive rule.
2466
2574
  #
2467
2575
  # @option params [required, String] :analyzer_name
@@ -2666,7 +2774,7 @@ module Aws::AccessAnalyzer
2666
2774
  tracer: tracer
2667
2775
  )
2668
2776
  context[:gem_name] = 'aws-sdk-accessanalyzer'
2669
- context[:gem_version] = '1.63.0'
2777
+ context[:gem_version] = '1.65.0'
2670
2778
  Seahorse::Client::Request.new(handlers, context)
2671
2779
  end
2672
2780
 
@@ -33,12 +33,16 @@ module Aws::AccessAnalyzer
33
33
  AccessPreviewSummary = Shapes::StructureShape.new(name: 'AccessPreviewSummary')
34
34
  AccessPreviewsList = Shapes::ListShape.new(name: 'AccessPreviewsList')
35
35
  AccessResourcesList = Shapes::ListShape.new(name: 'AccessResourcesList')
36
+ AccountIdsList = Shapes::ListShape.new(name: 'AccountIdsList')
36
37
  AclCanonicalId = Shapes::StringShape.new(name: 'AclCanonicalId')
37
38
  AclGrantee = Shapes::UnionShape.new(name: 'AclGrantee')
38
39
  AclPermission = Shapes::StringShape.new(name: 'AclPermission')
39
40
  AclUri = Shapes::StringShape.new(name: 'AclUri')
40
41
  Action = Shapes::StringShape.new(name: 'Action')
41
42
  ActionList = Shapes::ListShape.new(name: 'ActionList')
43
+ AnalysisRule = Shapes::StructureShape.new(name: 'AnalysisRule')
44
+ AnalysisRuleCriteria = Shapes::StructureShape.new(name: 'AnalysisRuleCriteria')
45
+ AnalysisRuleCriteriaList = Shapes::ListShape.new(name: 'AnalysisRuleCriteriaList')
42
46
  AnalyzedResource = Shapes::StructureShape.new(name: 'AnalyzedResource')
43
47
  AnalyzedResourceSummary = Shapes::StructureShape.new(name: 'AnalyzedResourceSummary')
44
48
  AnalyzedResourcesList = Shapes::ListShape.new(name: 'AnalyzedResourcesList')
@@ -260,6 +264,7 @@ module Aws::AccessAnalyzer
260
264
  TagKeys = Shapes::ListShape.new(name: 'TagKeys')
261
265
  TagResourceRequest = Shapes::StructureShape.new(name: 'TagResourceRequest')
262
266
  TagResourceResponse = Shapes::StructureShape.new(name: 'TagResourceResponse')
267
+ TagsList = Shapes::ListShape.new(name: 'TagsList')
263
268
  TagsMap = Shapes::MapShape.new(name: 'TagsMap')
264
269
  ThrottlingException = Shapes::StructureShape.new(name: 'ThrottlingException')
265
270
  Timestamp = Shapes::TimestampShape.new(name: 'Timestamp', timestampFormat: "iso8601")
@@ -280,6 +285,8 @@ module Aws::AccessAnalyzer
280
285
  UnusedIamUserPasswordDetails = Shapes::StructureShape.new(name: 'UnusedIamUserPasswordDetails')
281
286
  UnusedPermissionDetails = Shapes::StructureShape.new(name: 'UnusedPermissionDetails')
282
287
  UnusedPermissionsRecommendedStep = Shapes::StructureShape.new(name: 'UnusedPermissionsRecommendedStep')
288
+ UpdateAnalyzerRequest = Shapes::StructureShape.new(name: 'UpdateAnalyzerRequest')
289
+ UpdateAnalyzerResponse = Shapes::StructureShape.new(name: 'UpdateAnalyzerResponse')
283
290
  UpdateArchiveRuleRequest = Shapes::StructureShape.new(name: 'UpdateArchiveRuleRequest')
284
291
  UpdateFindingsRequest = Shapes::StructureShape.new(name: 'UpdateFindingsRequest')
285
292
  ValidatePolicyFinding = Shapes::StructureShape.new(name: 'ValidatePolicyFinding')
@@ -347,6 +354,8 @@ module Aws::AccessAnalyzer
347
354
 
348
355
  AccessResourcesList.member = Shapes::ShapeRef.new(shape: Resource)
349
356
 
357
+ AccountIdsList.member = Shapes::ShapeRef.new(shape: String)
358
+
350
359
  AclGrantee.add_member(:id, Shapes::ShapeRef.new(shape: AclCanonicalId, location_name: "id"))
351
360
  AclGrantee.add_member(:uri, Shapes::ShapeRef.new(shape: AclUri, location_name: "uri"))
352
361
  AclGrantee.add_member(:unknown, Shapes::ShapeRef.new(shape: nil, location_name: 'unknown'))
@@ -357,6 +366,15 @@ module Aws::AccessAnalyzer
357
366
 
358
367
  ActionList.member = Shapes::ShapeRef.new(shape: String)
359
368
 
369
+ AnalysisRule.add_member(:exclusions, Shapes::ShapeRef.new(shape: AnalysisRuleCriteriaList, location_name: "exclusions"))
370
+ AnalysisRule.struct_class = Types::AnalysisRule
371
+
372
+ AnalysisRuleCriteria.add_member(:account_ids, Shapes::ShapeRef.new(shape: AccountIdsList, location_name: "accountIds"))
373
+ AnalysisRuleCriteria.add_member(:resource_tags, Shapes::ShapeRef.new(shape: TagsList, location_name: "resourceTags"))
374
+ AnalysisRuleCriteria.struct_class = Types::AnalysisRuleCriteria
375
+
376
+ AnalysisRuleCriteriaList.member = Shapes::ShapeRef.new(shape: AnalysisRuleCriteria)
377
+
360
378
  AnalyzedResource.add_member(:resource_arn, Shapes::ShapeRef.new(shape: ResourceArn, required: true, location_name: "resourceArn"))
361
379
  AnalyzedResource.add_member(:resource_type, Shapes::ShapeRef.new(shape: ResourceType, required: true, location_name: "resourceType"))
362
380
  AnalyzedResource.add_member(:created_at, Shapes::ShapeRef.new(shape: Timestamp, required: true, location_name: "createdAt"))
@@ -1070,6 +1088,8 @@ module Aws::AccessAnalyzer
1070
1088
 
1071
1089
  TagResourceResponse.struct_class = Types::TagResourceResponse
1072
1090
 
1091
+ TagsList.member = Shapes::ShapeRef.new(shape: TagsMap)
1092
+
1073
1093
  TagsMap.key = Shapes::ShapeRef.new(shape: String)
1074
1094
  TagsMap.value = Shapes::ShapeRef.new(shape: String)
1075
1095
 
@@ -1101,6 +1121,7 @@ module Aws::AccessAnalyzer
1101
1121
  UntagResourceResponse.struct_class = Types::UntagResourceResponse
1102
1122
 
1103
1123
  UnusedAccessConfiguration.add_member(:unused_access_age, Shapes::ShapeRef.new(shape: Integer, location_name: "unusedAccessAge"))
1124
+ UnusedAccessConfiguration.add_member(:analysis_rule, Shapes::ShapeRef.new(shape: AnalysisRule, location_name: "analysisRule"))
1104
1125
  UnusedAccessConfiguration.struct_class = Types::UnusedAccessConfiguration
1105
1126
 
1106
1127
  UnusedAction.add_member(:action, Shapes::ShapeRef.new(shape: String, required: true, location_name: "action"))
@@ -1130,6 +1151,13 @@ module Aws::AccessAnalyzer
1130
1151
  UnusedPermissionsRecommendedStep.add_member(:existing_policy_id, Shapes::ShapeRef.new(shape: String, location_name: "existingPolicyId"))
1131
1152
  UnusedPermissionsRecommendedStep.struct_class = Types::UnusedPermissionsRecommendedStep
1132
1153
 
1154
+ UpdateAnalyzerRequest.add_member(:analyzer_name, Shapes::ShapeRef.new(shape: Name, required: true, location: "uri", location_name: "analyzerName"))
1155
+ UpdateAnalyzerRequest.add_member(:configuration, Shapes::ShapeRef.new(shape: AnalyzerConfiguration, location_name: "configuration"))
1156
+ UpdateAnalyzerRequest.struct_class = Types::UpdateAnalyzerRequest
1157
+
1158
+ UpdateAnalyzerResponse.add_member(:configuration, Shapes::ShapeRef.new(shape: AnalyzerConfiguration, location_name: "configuration"))
1159
+ UpdateAnalyzerResponse.struct_class = Types::UpdateAnalyzerResponse
1160
+
1133
1161
  UpdateArchiveRuleRequest.add_member(:analyzer_name, Shapes::ShapeRef.new(shape: Name, required: true, location: "uri", location_name: "analyzerName"))
1134
1162
  UpdateArchiveRuleRequest.add_member(:rule_name, Shapes::ShapeRef.new(shape: Name, required: true, location: "uri", location_name: "ruleName"))
1135
1163
  UpdateArchiveRuleRequest.add_member(:filter, Shapes::ShapeRef.new(shape: FilterCriteriaMap, required: true, location_name: "filter"))
@@ -1679,6 +1707,20 @@ module Aws::AccessAnalyzer
1679
1707
  o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
1680
1708
  end)
1681
1709
 
1710
+ api.add_operation(:update_analyzer, Seahorse::Model::Operation.new.tap do |o|
1711
+ o.name = "UpdateAnalyzer"
1712
+ o.http_method = "PUT"
1713
+ o.http_request_uri = "/analyzer/{analyzerName}"
1714
+ o.input = Shapes::ShapeRef.new(shape: UpdateAnalyzerRequest)
1715
+ o.output = Shapes::ShapeRef.new(shape: UpdateAnalyzerResponse)
1716
+ o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
1717
+ o.errors << Shapes::ShapeRef.new(shape: ConflictException)
1718
+ o.errors << Shapes::ShapeRef.new(shape: ValidationException)
1719
+ o.errors << Shapes::ShapeRef.new(shape: InternalServerException)
1720
+ o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
1721
+ o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
1722
+ end)
1723
+
1682
1724
  api.add_operation(:update_archive_rule, Seahorse::Model::Operation.new.tap do |o|
1683
1725
  o.name = "UpdateArchiveRule"
1684
1726
  o.http_method = "PUT"
@@ -318,6 +318,57 @@ module Aws::AccessAnalyzer
318
318
  class Unknown < AclGrantee; end
319
319
  end
320
320
 
321
+ # Contains information about analysis rules for the analyzer. Analysis
322
+ # rules determine which entities will generate findings based on the
323
+ # criteria you define when you create the rule.
324
+ #
325
+ # @!attribute [rw] exclusions
326
+ # A list of rules for the analyzer containing criteria to exclude from
327
+ # analysis. Entities that meet the rule criteria will not generate
328
+ # findings.
329
+ # @return [Array<Types::AnalysisRuleCriteria>]
330
+ #
331
+ # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/AnalysisRule AWS API Documentation
332
+ #
333
+ class AnalysisRule < Struct.new(
334
+ :exclusions)
335
+ SENSITIVE = []
336
+ include Aws::Structure
337
+ end
338
+
339
+ # The criteria for an analysis rule for an analyzer. The criteria
340
+ # determine which entities will generate findings.
341
+ #
342
+ # @!attribute [rw] account_ids
343
+ # A list of Amazon Web Services account IDs to apply to the analysis
344
+ # rule criteria. The accounts cannot include the organization analyzer
345
+ # owner account. Account IDs can only be applied to the analysis rule
346
+ # criteria for organization-level analyzers. The list cannot include
347
+ # more than 2,000 account IDs.
348
+ # @return [Array<String>]
349
+ #
350
+ # @!attribute [rw] resource_tags
351
+ # An array of key-value pairs to match for your resources. You can use
352
+ # the set of Unicode letters, digits, whitespace, `_`, `.`, `/`, `=`,
353
+ # `+`, and `-`.
354
+ #
355
+ # For the tag key, you can specify a value that is 1 to 128 characters
356
+ # in length and cannot be prefixed with `aws:`.
357
+ #
358
+ # For the tag value, you can specify a value that is 0 to 256
359
+ # characters in length. If the specified tag value is 0 characters,
360
+ # the rule is applied to all principals with the specified tag key.
361
+ # @return [Array<Hash<String,String>>]
362
+ #
363
+ # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/AnalysisRuleCriteria AWS API Documentation
364
+ #
365
+ class AnalysisRuleCriteria < Struct.new(
366
+ :account_ids,
367
+ :resource_tags)
368
+ SENSITIVE = []
369
+ include Aws::Structure
370
+ end
371
+
321
372
  # Contains details about the analyzed resource.
322
373
  #
323
374
  # @!attribute [rw] resource_arn
@@ -410,8 +461,8 @@ module Aws::AccessAnalyzer
410
461
  include Aws::Structure
411
462
  end
412
463
 
413
- # Contains information about the configuration of an unused access
414
- # analyzer for an Amazon Web Services organization or account.
464
+ # Contains information about the configuration of an analyzer for an
465
+ # Amazon Web Services organization or account.
415
466
  #
416
467
  # @note AnalyzerConfiguration is a union - when making an API calls you must set exactly one of the members.
417
468
  #
@@ -419,8 +470,7 @@ module Aws::AccessAnalyzer
419
470
  #
420
471
  # @!attribute [rw] unused_access
421
472
  # Specifies the configuration of an unused access analyzer for an
422
- # Amazon Web Services organization or account. External access
423
- # analyzers do not support any configuration.
473
+ # Amazon Web Services organization or account.
424
474
  # @return [Types::UnusedAccessConfiguration]
425
475
  #
426
476
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/AnalyzerConfiguration AWS API Documentation
@@ -535,7 +585,9 @@ module Aws::AccessAnalyzer
535
585
  include Aws::Structure
536
586
  end
537
587
 
538
- # Contains information about an archive rule.
588
+ # Contains information about an archive rule. Archive rules
589
+ # automatically archive new findings that meet the criteria you define
590
+ # when you create the rule.
539
591
  #
540
592
  # @!attribute [rw] rule_name
541
593
  # The name of the archive rule.
@@ -1012,7 +1064,15 @@ module Aws::AccessAnalyzer
1012
1064
  # @return [Array<Types::InlineArchiveRule>]
1013
1065
  #
1014
1066
  # @!attribute [rw] tags
1015
- # An array of key-value pairs to apply to the analyzer.
1067
+ # An array of key-value pairs to apply to the analyzer. You can use
1068
+ # the set of Unicode letters, digits, whitespace, `_`, `.`, `/`, `=`,
1069
+ # `+`, and `-`.
1070
+ #
1071
+ # For the tag key, you can specify a value that is 1 to 128 characters
1072
+ # in length and cannot be prefixed with `aws:`.
1073
+ #
1074
+ # For the tag value, you can specify a value that is 0 to 256
1075
+ # characters in length.
1016
1076
  # @return [Hash<String,String>]
1017
1077
  #
1018
1078
  # @!attribute [rw] client_token
@@ -1025,8 +1085,7 @@ module Aws::AccessAnalyzer
1025
1085
  # @!attribute [rw] configuration
1026
1086
  # Specifies the configuration of the analyzer. If the analyzer is an
1027
1087
  # unused access analyzer, the specified scope of unused access is used
1028
- # for the configuration. If the analyzer is an external access
1029
- # analyzer, this field is not used.
1088
+ # for the configuration.
1030
1089
  # @return [Types::AnalyzerConfiguration]
1031
1090
  #
1032
1091
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/CreateAnalyzerRequest AWS API Documentation
@@ -1988,7 +2047,9 @@ module Aws::AccessAnalyzer
1988
2047
  # The response to the request.
1989
2048
  #
1990
2049
  # @!attribute [rw] archive_rule
1991
- # Contains information about an archive rule.
2050
+ # Contains information about an archive rule. Archive rules
2051
+ # automatically archive new findings that meet the criteria you define
2052
+ # when you create the rule.
1992
2053
  # @return [Types::ArchiveRuleSummary]
1993
2054
  #
1994
2055
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/GetArchiveRuleResponse AWS API Documentation
@@ -4038,13 +4099,20 @@ module Aws::AccessAnalyzer
4038
4099
  # will generate findings for IAM entities within the accounts of the
4039
4100
  # selected organization for any access that hasn't been used in 90 or
4040
4101
  # more days since the analyzer's last scan. You can choose a value
4041
- # between 1 and 180 days.
4102
+ # between 1 and 365 days.
4042
4103
  # @return [Integer]
4043
4104
  #
4105
+ # @!attribute [rw] analysis_rule
4106
+ # Contains information about analysis rules for the analyzer. Analysis
4107
+ # rules determine which entities will generate findings based on the
4108
+ # criteria you define when you create the rule.
4109
+ # @return [Types::AnalysisRule]
4110
+ #
4044
4111
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/UnusedAccessConfiguration AWS API Documentation
4045
4112
  #
4046
4113
  class UnusedAccessConfiguration < Struct.new(
4047
- :unused_access_age)
4114
+ :unused_access_age,
4115
+ :analysis_rule)
4048
4116
  SENSITIVE = []
4049
4117
  include Aws::Structure
4050
4118
  end
@@ -4212,6 +4280,37 @@ module Aws::AccessAnalyzer
4212
4280
  include Aws::Structure
4213
4281
  end
4214
4282
 
4283
+ # @!attribute [rw] analyzer_name
4284
+ # The name of the analyzer to modify.
4285
+ # @return [String]
4286
+ #
4287
+ # @!attribute [rw] configuration
4288
+ # Contains information about the configuration of an analyzer for an
4289
+ # Amazon Web Services organization or account.
4290
+ # @return [Types::AnalyzerConfiguration]
4291
+ #
4292
+ # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/UpdateAnalyzerRequest AWS API Documentation
4293
+ #
4294
+ class UpdateAnalyzerRequest < Struct.new(
4295
+ :analyzer_name,
4296
+ :configuration)
4297
+ SENSITIVE = []
4298
+ include Aws::Structure
4299
+ end
4300
+
4301
+ # @!attribute [rw] configuration
4302
+ # Contains information about the configuration of an analyzer for an
4303
+ # Amazon Web Services organization or account.
4304
+ # @return [Types::AnalyzerConfiguration]
4305
+ #
4306
+ # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/UpdateAnalyzerResponse AWS API Documentation
4307
+ #
4308
+ class UpdateAnalyzerResponse < Struct.new(
4309
+ :configuration)
4310
+ SENSITIVE = []
4311
+ include Aws::Structure
4312
+ end
4313
+
4215
4314
  # Updates the specified archive rule.
4216
4315
  #
4217
4316
  # @!attribute [rw] analyzer_name
@@ -54,7 +54,7 @@ module Aws::AccessAnalyzer
54
54
  autoload :EndpointProvider, 'aws-sdk-accessanalyzer/endpoint_provider'
55
55
  autoload :Endpoints, 'aws-sdk-accessanalyzer/endpoints'
56
56
 
57
- GEM_VERSION = '1.63.0'
57
+ GEM_VERSION = '1.65.0'
58
58
 
59
59
  end
60
60
 
data/sig/client.rbs CHANGED
@@ -39,7 +39,9 @@ module Aws
39
39
  ?logger: untyped,
40
40
  ?max_attempts: Integer,
41
41
  ?profile: String,
42
+ ?request_checksum_calculation: String,
42
43
  ?request_min_compression_size_bytes: Integer,
44
+ ?response_checksum_validation: String,
43
45
  ?retry_backoff: Proc,
44
46
  ?retry_base_delay: Float,
45
47
  ?retry_jitter: (:none | :equal | :full | ^(Integer) -> Integer),
@@ -264,7 +266,17 @@ module Aws
264
266
  ?client_token: ::String,
265
267
  ?configuration: {
266
268
  unused_access: {
267
- unused_access_age: ::Integer?
269
+ unused_access_age: ::Integer?,
270
+ analysis_rule: {
271
+ exclusions: Array[
272
+ {
273
+ account_ids: Array[::String]?,
274
+ resource_tags: Array[
275
+ Hash[::String, ::String],
276
+ ]?
277
+ },
278
+ ]?
279
+ }?
268
280
  }?
269
281
  }
270
282
  ) -> _CreateAnalyzerResponseSuccess
@@ -386,7 +398,7 @@ module Aws
386
398
  def id: () -> ::String
387
399
  def next_token: () -> ::String
388
400
  def resource: () -> ::String
389
- def resource_type: () -> ("AWS::S3::Bucket" | "AWS::IAM::Role" | "AWS::SQS::Queue" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::KMS::Key" | "AWS::SecretsManager::Secret" | "AWS::EFS::FileSystem" | "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::RDS::DBSnapshot" | "AWS::RDS::DBClusterSnapshot" | "AWS::SNS::Topic" | "AWS::S3Express::DirectoryBucket" | "AWS::DynamoDB::Table" | "AWS::DynamoDB::Stream")
401
+ def resource_type: () -> ("AWS::S3::Bucket" | "AWS::IAM::Role" | "AWS::SQS::Queue" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::KMS::Key" | "AWS::SecretsManager::Secret" | "AWS::EFS::FileSystem" | "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::RDS::DBSnapshot" | "AWS::RDS::DBClusterSnapshot" | "AWS::SNS::Topic" | "AWS::S3Express::DirectoryBucket" | "AWS::DynamoDB::Table" | "AWS::DynamoDB::Stream" | "AWS::IAM::User")
390
402
  def resource_owner_account: () -> ::String
391
403
  def status: () -> ("ACTIVE" | "ARCHIVED" | "RESOLVED")
392
404
  def updated_at: () -> ::Time
@@ -456,7 +468,7 @@ module Aws
456
468
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/AccessAnalyzer/Client.html#list_analyzed_resources-instance_method
457
469
  def list_analyzed_resources: (
458
470
  analyzer_arn: ::String,
459
- ?resource_type: ("AWS::S3::Bucket" | "AWS::IAM::Role" | "AWS::SQS::Queue" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::KMS::Key" | "AWS::SecretsManager::Secret" | "AWS::EFS::FileSystem" | "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::RDS::DBSnapshot" | "AWS::RDS::DBClusterSnapshot" | "AWS::SNS::Topic" | "AWS::S3Express::DirectoryBucket" | "AWS::DynamoDB::Table" | "AWS::DynamoDB::Stream"),
471
+ ?resource_type: ("AWS::S3::Bucket" | "AWS::IAM::Role" | "AWS::SQS::Queue" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::KMS::Key" | "AWS::SecretsManager::Secret" | "AWS::EFS::FileSystem" | "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::RDS::DBSnapshot" | "AWS::RDS::DBClusterSnapshot" | "AWS::SNS::Topic" | "AWS::S3Express::DirectoryBucket" | "AWS::DynamoDB::Table" | "AWS::DynamoDB::Stream" | "AWS::IAM::User"),
460
472
  ?next_token: ::String,
461
473
  ?max_results: ::Integer
462
474
  ) -> _ListAnalyzedResourcesResponseSuccess
@@ -610,6 +622,31 @@ module Aws
610
622
  ) -> _UntagResourceResponseSuccess
611
623
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _UntagResourceResponseSuccess
612
624
 
625
+ interface _UpdateAnalyzerResponseSuccess
626
+ include ::Seahorse::Client::_ResponseSuccess[Types::UpdateAnalyzerResponse]
627
+ def configuration: () -> Types::AnalyzerConfiguration
628
+ end
629
+ # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/AccessAnalyzer/Client.html#update_analyzer-instance_method
630
+ def update_analyzer: (
631
+ analyzer_name: ::String,
632
+ ?configuration: {
633
+ unused_access: {
634
+ unused_access_age: ::Integer?,
635
+ analysis_rule: {
636
+ exclusions: Array[
637
+ {
638
+ account_ids: Array[::String]?,
639
+ resource_tags: Array[
640
+ Hash[::String, ::String],
641
+ ]?
642
+ },
643
+ ]?
644
+ }?
645
+ }?
646
+ }
647
+ ) -> _UpdateAnalyzerResponseSuccess
648
+ | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _UpdateAnalyzerResponseSuccess
649
+
613
650
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/AccessAnalyzer/Client.html#update_archive_rule-instance_method
614
651
  def update_archive_rule: (
615
652
  analyzer_name: ::String,
data/sig/resource.rbs CHANGED
@@ -39,7 +39,9 @@ module Aws
39
39
  ?logger: untyped,
40
40
  ?max_attempts: Integer,
41
41
  ?profile: String,
42
+ ?request_checksum_calculation: String,
42
43
  ?request_min_compression_size_bytes: Integer,
44
+ ?response_checksum_validation: String,
43
45
  ?retry_backoff: Proc,
44
46
  ?retry_base_delay: Float,
45
47
  ?retry_jitter: (:none | :equal | :full | ^(Integer) -> Integer),
data/sig/types.rbs CHANGED
@@ -38,7 +38,7 @@ module Aws::AccessAnalyzer
38
38
  attr_accessor condition: ::Hash[::String, ::String]
39
39
  attr_accessor resource: ::String
40
40
  attr_accessor is_public: bool
41
- attr_accessor resource_type: ("AWS::S3::Bucket" | "AWS::IAM::Role" | "AWS::SQS::Queue" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::KMS::Key" | "AWS::SecretsManager::Secret" | "AWS::EFS::FileSystem" | "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::RDS::DBSnapshot" | "AWS::RDS::DBClusterSnapshot" | "AWS::SNS::Topic" | "AWS::S3Express::DirectoryBucket" | "AWS::DynamoDB::Table" | "AWS::DynamoDB::Stream")
41
+ attr_accessor resource_type: ("AWS::S3::Bucket" | "AWS::IAM::Role" | "AWS::SQS::Queue" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::KMS::Key" | "AWS::SecretsManager::Secret" | "AWS::EFS::FileSystem" | "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::RDS::DBSnapshot" | "AWS::RDS::DBClusterSnapshot" | "AWS::SNS::Topic" | "AWS::S3Express::DirectoryBucket" | "AWS::DynamoDB::Table" | "AWS::DynamoDB::Stream" | "AWS::IAM::User")
42
42
  attr_accessor created_at: ::Time
43
43
  attr_accessor change_type: ("CHANGED" | "NEW" | "UNCHANGED")
44
44
  attr_accessor status: ("ACTIVE" | "ARCHIVED" | "RESOLVED")
@@ -77,9 +77,20 @@ module Aws::AccessAnalyzer
77
77
  end
78
78
  end
79
79
 
80
+ class AnalysisRule
81
+ attr_accessor exclusions: ::Array[Types::AnalysisRuleCriteria]
82
+ SENSITIVE: []
83
+ end
84
+
85
+ class AnalysisRuleCriteria
86
+ attr_accessor account_ids: ::Array[::String]
87
+ attr_accessor resource_tags: ::Array[::Hash[::String, ::String]]
88
+ SENSITIVE: []
89
+ end
90
+
80
91
  class AnalyzedResource
81
92
  attr_accessor resource_arn: ::String
82
- attr_accessor resource_type: ("AWS::S3::Bucket" | "AWS::IAM::Role" | "AWS::SQS::Queue" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::KMS::Key" | "AWS::SecretsManager::Secret" | "AWS::EFS::FileSystem" | "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::RDS::DBSnapshot" | "AWS::RDS::DBClusterSnapshot" | "AWS::SNS::Topic" | "AWS::S3Express::DirectoryBucket" | "AWS::DynamoDB::Table" | "AWS::DynamoDB::Stream")
93
+ attr_accessor resource_type: ("AWS::S3::Bucket" | "AWS::IAM::Role" | "AWS::SQS::Queue" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::KMS::Key" | "AWS::SecretsManager::Secret" | "AWS::EFS::FileSystem" | "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::RDS::DBSnapshot" | "AWS::RDS::DBClusterSnapshot" | "AWS::SNS::Topic" | "AWS::S3Express::DirectoryBucket" | "AWS::DynamoDB::Table" | "AWS::DynamoDB::Stream" | "AWS::IAM::User")
83
94
  attr_accessor created_at: ::Time
84
95
  attr_accessor analyzed_at: ::Time
85
96
  attr_accessor updated_at: ::Time
@@ -95,7 +106,7 @@ module Aws::AccessAnalyzer
95
106
  class AnalyzedResourceSummary
96
107
  attr_accessor resource_arn: ::String
97
108
  attr_accessor resource_owner_account: ::String
98
- attr_accessor resource_type: ("AWS::S3::Bucket" | "AWS::IAM::Role" | "AWS::SQS::Queue" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::KMS::Key" | "AWS::SecretsManager::Secret" | "AWS::EFS::FileSystem" | "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::RDS::DBSnapshot" | "AWS::RDS::DBClusterSnapshot" | "AWS::SNS::Topic" | "AWS::S3Express::DirectoryBucket" | "AWS::DynamoDB::Table" | "AWS::DynamoDB::Stream")
109
+ attr_accessor resource_type: ("AWS::S3::Bucket" | "AWS::IAM::Role" | "AWS::SQS::Queue" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::KMS::Key" | "AWS::SecretsManager::Secret" | "AWS::EFS::FileSystem" | "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::RDS::DBSnapshot" | "AWS::RDS::DBClusterSnapshot" | "AWS::SNS::Topic" | "AWS::S3Express::DirectoryBucket" | "AWS::DynamoDB::Table" | "AWS::DynamoDB::Stream" | "AWS::IAM::User")
99
110
  SENSITIVE: []
100
111
  end
101
112
 
@@ -359,7 +370,7 @@ module Aws::AccessAnalyzer
359
370
  attr_accessor action: ::Array[::String]
360
371
  attr_accessor resource: ::String
361
372
  attr_accessor is_public: bool
362
- attr_accessor resource_type: ("AWS::S3::Bucket" | "AWS::IAM::Role" | "AWS::SQS::Queue" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::KMS::Key" | "AWS::SecretsManager::Secret" | "AWS::EFS::FileSystem" | "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::RDS::DBSnapshot" | "AWS::RDS::DBClusterSnapshot" | "AWS::SNS::Topic" | "AWS::S3Express::DirectoryBucket" | "AWS::DynamoDB::Table" | "AWS::DynamoDB::Stream")
373
+ attr_accessor resource_type: ("AWS::S3::Bucket" | "AWS::IAM::Role" | "AWS::SQS::Queue" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::KMS::Key" | "AWS::SecretsManager::Secret" | "AWS::EFS::FileSystem" | "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::RDS::DBSnapshot" | "AWS::RDS::DBClusterSnapshot" | "AWS::SNS::Topic" | "AWS::S3Express::DirectoryBucket" | "AWS::DynamoDB::Table" | "AWS::DynamoDB::Stream" | "AWS::IAM::User")
363
374
  attr_accessor condition: ::Hash[::String, ::String]
364
375
  attr_accessor created_at: ::Time
365
376
  attr_accessor analyzed_at: ::Time
@@ -413,7 +424,7 @@ module Aws::AccessAnalyzer
413
424
  attr_accessor action: ::Array[::String]
414
425
  attr_accessor resource: ::String
415
426
  attr_accessor is_public: bool
416
- attr_accessor resource_type: ("AWS::S3::Bucket" | "AWS::IAM::Role" | "AWS::SQS::Queue" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::KMS::Key" | "AWS::SecretsManager::Secret" | "AWS::EFS::FileSystem" | "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::RDS::DBSnapshot" | "AWS::RDS::DBClusterSnapshot" | "AWS::SNS::Topic" | "AWS::S3Express::DirectoryBucket" | "AWS::DynamoDB::Table" | "AWS::DynamoDB::Stream")
427
+ attr_accessor resource_type: ("AWS::S3::Bucket" | "AWS::IAM::Role" | "AWS::SQS::Queue" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::KMS::Key" | "AWS::SecretsManager::Secret" | "AWS::EFS::FileSystem" | "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::RDS::DBSnapshot" | "AWS::RDS::DBClusterSnapshot" | "AWS::SNS::Topic" | "AWS::S3Express::DirectoryBucket" | "AWS::DynamoDB::Table" | "AWS::DynamoDB::Stream" | "AWS::IAM::User")
417
428
  attr_accessor condition: ::Hash[::String, ::String]
418
429
  attr_accessor created_at: ::Time
419
430
  attr_accessor analyzed_at: ::Time
@@ -432,7 +443,7 @@ module Aws::AccessAnalyzer
432
443
  attr_accessor error: ::String
433
444
  attr_accessor id: ::String
434
445
  attr_accessor resource: ::String
435
- attr_accessor resource_type: ("AWS::S3::Bucket" | "AWS::IAM::Role" | "AWS::SQS::Queue" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::KMS::Key" | "AWS::SecretsManager::Secret" | "AWS::EFS::FileSystem" | "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::RDS::DBSnapshot" | "AWS::RDS::DBClusterSnapshot" | "AWS::SNS::Topic" | "AWS::S3Express::DirectoryBucket" | "AWS::DynamoDB::Table" | "AWS::DynamoDB::Stream")
446
+ attr_accessor resource_type: ("AWS::S3::Bucket" | "AWS::IAM::Role" | "AWS::SQS::Queue" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::KMS::Key" | "AWS::SecretsManager::Secret" | "AWS::EFS::FileSystem" | "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::RDS::DBSnapshot" | "AWS::RDS::DBClusterSnapshot" | "AWS::SNS::Topic" | "AWS::S3Express::DirectoryBucket" | "AWS::DynamoDB::Table" | "AWS::DynamoDB::Stream" | "AWS::IAM::User")
436
447
  attr_accessor resource_owner_account: ::String
437
448
  attr_accessor status: ("ACTIVE" | "ARCHIVED" | "RESOLVED")
438
449
  attr_accessor updated_at: ::Time
@@ -553,7 +564,7 @@ module Aws::AccessAnalyzer
553
564
  attr_accessor id: ::String
554
565
  attr_accessor next_token: ::String
555
566
  attr_accessor resource: ::String
556
- attr_accessor resource_type: ("AWS::S3::Bucket" | "AWS::IAM::Role" | "AWS::SQS::Queue" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::KMS::Key" | "AWS::SecretsManager::Secret" | "AWS::EFS::FileSystem" | "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::RDS::DBSnapshot" | "AWS::RDS::DBClusterSnapshot" | "AWS::SNS::Topic" | "AWS::S3Express::DirectoryBucket" | "AWS::DynamoDB::Table" | "AWS::DynamoDB::Stream")
567
+ attr_accessor resource_type: ("AWS::S3::Bucket" | "AWS::IAM::Role" | "AWS::SQS::Queue" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::KMS::Key" | "AWS::SecretsManager::Secret" | "AWS::EFS::FileSystem" | "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::RDS::DBSnapshot" | "AWS::RDS::DBClusterSnapshot" | "AWS::SNS::Topic" | "AWS::S3Express::DirectoryBucket" | "AWS::DynamoDB::Table" | "AWS::DynamoDB::Stream" | "AWS::IAM::User")
557
568
  attr_accessor resource_owner_account: ::String
558
569
  attr_accessor status: ("ACTIVE" | "ARCHIVED" | "RESOLVED")
559
570
  attr_accessor updated_at: ::Time
@@ -666,7 +677,7 @@ module Aws::AccessAnalyzer
666
677
 
667
678
  class ListAnalyzedResourcesRequest
668
679
  attr_accessor analyzer_arn: ::String
669
- attr_accessor resource_type: ("AWS::S3::Bucket" | "AWS::IAM::Role" | "AWS::SQS::Queue" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::KMS::Key" | "AWS::SecretsManager::Secret" | "AWS::EFS::FileSystem" | "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::RDS::DBSnapshot" | "AWS::RDS::DBClusterSnapshot" | "AWS::SNS::Topic" | "AWS::S3Express::DirectoryBucket" | "AWS::DynamoDB::Table" | "AWS::DynamoDB::Stream")
680
+ attr_accessor resource_type: ("AWS::S3::Bucket" | "AWS::IAM::Role" | "AWS::SQS::Queue" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::KMS::Key" | "AWS::SecretsManager::Secret" | "AWS::EFS::FileSystem" | "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::RDS::DBSnapshot" | "AWS::RDS::DBClusterSnapshot" | "AWS::SNS::Topic" | "AWS::S3Express::DirectoryBucket" | "AWS::DynamoDB::Table" | "AWS::DynamoDB::Stream" | "AWS::IAM::User")
670
681
  attr_accessor next_token: ::String
671
682
  attr_accessor max_results: ::Integer
672
683
  SENSITIVE: []
@@ -1025,6 +1036,7 @@ module Aws::AccessAnalyzer
1025
1036
 
1026
1037
  class UnusedAccessConfiguration
1027
1038
  attr_accessor unused_access_age: ::Integer
1039
+ attr_accessor analysis_rule: Types::AnalysisRule
1028
1040
  SENSITIVE: []
1029
1041
  end
1030
1042
 
@@ -1065,6 +1077,17 @@ module Aws::AccessAnalyzer
1065
1077
  SENSITIVE: []
1066
1078
  end
1067
1079
 
1080
+ class UpdateAnalyzerRequest
1081
+ attr_accessor analyzer_name: ::String
1082
+ attr_accessor configuration: Types::AnalyzerConfiguration
1083
+ SENSITIVE: []
1084
+ end
1085
+
1086
+ class UpdateAnalyzerResponse
1087
+ attr_accessor configuration: Types::AnalyzerConfiguration
1088
+ SENSITIVE: []
1089
+ end
1090
+
1068
1091
  class UpdateArchiveRuleRequest
1069
1092
  attr_accessor analyzer_name: ::String
1070
1093
  attr_accessor rule_name: ::String
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-accessanalyzer
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.63.0
4
+ version: 1.65.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-11-13 00:00:00.000000000 Z
11
+ date: 2025-01-15 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core
@@ -19,7 +19,7 @@ dependencies:
19
19
  version: '3'
20
20
  - - ">="
21
21
  - !ruby/object:Gem::Version
22
- version: 3.210.0
22
+ version: 3.216.0
23
23
  type: :runtime
24
24
  prerelease: false
25
25
  version_requirements: !ruby/object:Gem::Requirement
@@ -29,7 +29,7 @@ dependencies:
29
29
  version: '3'
30
30
  - - ">="
31
31
  - !ruby/object:Gem::Version
32
- version: 3.210.0
32
+ version: 3.216.0
33
33
  - !ruby/object:Gem::Dependency
34
34
  name: aws-sigv4
35
35
  requirement: !ruby/object:Gem::Requirement