aws-sdk-accessanalyzer 1.67.0 → 1.69.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-accessanalyzer/client.rb +45 -30
- data/lib/aws-sdk-accessanalyzer/client_api.rb +30 -19
- data/lib/aws-sdk-accessanalyzer/types.rb +53 -5
- data/lib/aws-sdk-accessanalyzer.rb +1 -1
- data/sig/client.rbs +12 -2
- data/sig/types.rbs +8 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: '08edbc9cd3aa791467bef0dcb9670d19256366f2fb3f7777b374beda153932b3'
|
4
|
+
data.tar.gz: 694a5261533e88a39693da004d233df9f2095284313e46d86b3c983624d4be65
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: b7678d504b2d99fe260a2a5c00721909e6af1fa9b54f7cb0ebaab4130b9ba0bb911cea45c18e2f04ec12ba60dc8d43702d81b2c4d828e4a91fcbd590c0a322dc
|
7
|
+
data.tar.gz: 27546535916e8a4c8b7181b4dc7a60c29f2839bce534b78613ce7195ae62f330b7886686fa9ea095d2b1514922476775944130033f04aa3e8868154527f0a1e5
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.69.0 (2025-04-17)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Added new resource types to evaluate for public access in resource policies and added support for S3 directory bucket access points.
|
8
|
+
|
9
|
+
1.68.0 (2025-02-18)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
13
|
+
|
4
14
|
1.67.0 (2025-02-13)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.69.0
|
@@ -7,34 +7,34 @@
|
|
7
7
|
#
|
8
8
|
# WARNING ABOUT GENERATED CODE
|
9
9
|
|
10
|
-
require 'seahorse/client/plugins/content_length
|
11
|
-
require 'aws-sdk-core/plugins/credentials_configuration
|
12
|
-
require 'aws-sdk-core/plugins/logging
|
13
|
-
require 'aws-sdk-core/plugins/param_converter
|
14
|
-
require 'aws-sdk-core/plugins/param_validator
|
15
|
-
require 'aws-sdk-core/plugins/user_agent
|
16
|
-
require 'aws-sdk-core/plugins/helpful_socket_errors
|
17
|
-
require 'aws-sdk-core/plugins/retry_errors
|
18
|
-
require 'aws-sdk-core/plugins/global_configuration
|
19
|
-
require 'aws-sdk-core/plugins/regional_endpoint
|
20
|
-
require 'aws-sdk-core/plugins/endpoint_discovery
|
21
|
-
require 'aws-sdk-core/plugins/endpoint_pattern
|
22
|
-
require 'aws-sdk-core/plugins/response_paging
|
23
|
-
require 'aws-sdk-core/plugins/stub_responses
|
24
|
-
require 'aws-sdk-core/plugins/idempotency_token
|
25
|
-
require 'aws-sdk-core/plugins/invocation_id
|
26
|
-
require 'aws-sdk-core/plugins/jsonvalue_converter
|
27
|
-
require 'aws-sdk-core/plugins/client_metrics_plugin
|
28
|
-
require 'aws-sdk-core/plugins/client_metrics_send_plugin
|
29
|
-
require 'aws-sdk-core/plugins/transfer_encoding
|
30
|
-
require 'aws-sdk-core/plugins/http_checksum
|
31
|
-
require 'aws-sdk-core/plugins/checksum_algorithm
|
32
|
-
require 'aws-sdk-core/plugins/request_compression
|
33
|
-
require 'aws-sdk-core/plugins/defaults_mode
|
34
|
-
require 'aws-sdk-core/plugins/recursion_detection
|
35
|
-
require 'aws-sdk-core/plugins/telemetry
|
36
|
-
require 'aws-sdk-core/plugins/sign
|
37
|
-
require 'aws-sdk-core/plugins/protocols/rest_json
|
10
|
+
require 'seahorse/client/plugins/content_length'
|
11
|
+
require 'aws-sdk-core/plugins/credentials_configuration'
|
12
|
+
require 'aws-sdk-core/plugins/logging'
|
13
|
+
require 'aws-sdk-core/plugins/param_converter'
|
14
|
+
require 'aws-sdk-core/plugins/param_validator'
|
15
|
+
require 'aws-sdk-core/plugins/user_agent'
|
16
|
+
require 'aws-sdk-core/plugins/helpful_socket_errors'
|
17
|
+
require 'aws-sdk-core/plugins/retry_errors'
|
18
|
+
require 'aws-sdk-core/plugins/global_configuration'
|
19
|
+
require 'aws-sdk-core/plugins/regional_endpoint'
|
20
|
+
require 'aws-sdk-core/plugins/endpoint_discovery'
|
21
|
+
require 'aws-sdk-core/plugins/endpoint_pattern'
|
22
|
+
require 'aws-sdk-core/plugins/response_paging'
|
23
|
+
require 'aws-sdk-core/plugins/stub_responses'
|
24
|
+
require 'aws-sdk-core/plugins/idempotency_token'
|
25
|
+
require 'aws-sdk-core/plugins/invocation_id'
|
26
|
+
require 'aws-sdk-core/plugins/jsonvalue_converter'
|
27
|
+
require 'aws-sdk-core/plugins/client_metrics_plugin'
|
28
|
+
require 'aws-sdk-core/plugins/client_metrics_send_plugin'
|
29
|
+
require 'aws-sdk-core/plugins/transfer_encoding'
|
30
|
+
require 'aws-sdk-core/plugins/http_checksum'
|
31
|
+
require 'aws-sdk-core/plugins/checksum_algorithm'
|
32
|
+
require 'aws-sdk-core/plugins/request_compression'
|
33
|
+
require 'aws-sdk-core/plugins/defaults_mode'
|
34
|
+
require 'aws-sdk-core/plugins/recursion_detection'
|
35
|
+
require 'aws-sdk-core/plugins/telemetry'
|
36
|
+
require 'aws-sdk-core/plugins/sign'
|
37
|
+
require 'aws-sdk-core/plugins/protocols/rest_json'
|
38
38
|
|
39
39
|
module Aws::AccessAnalyzer
|
40
40
|
# An API client for AccessAnalyzer. To construct a client, you need to configure a `:region` and `:credentials`.
|
@@ -779,7 +779,7 @@ module Aws::AccessAnalyzer
|
|
779
779
|
#
|
780
780
|
# resp = client.check_no_public_access({
|
781
781
|
# policy_document: "AccessCheckPolicyDocument", # required
|
782
|
-
# resource_type: "AWS::DynamoDB::Table", # required, accepts AWS::DynamoDB::Table, AWS::DynamoDB::Stream, AWS::EFS::FileSystem, AWS::OpenSearchService::Domain, AWS::Kinesis::Stream, AWS::Kinesis::StreamConsumer, AWS::KMS::Key, AWS::Lambda::Function, AWS::S3::Bucket, AWS::S3::AccessPoint, AWS::S3Express::DirectoryBucket, AWS::S3::Glacier, AWS::S3Outposts::Bucket, AWS::S3Outposts::AccessPoint, AWS::SecretsManager::Secret, AWS::SNS::Topic, AWS::SQS::Queue, AWS::IAM::AssumeRolePolicyDocument
|
782
|
+
# resource_type: "AWS::DynamoDB::Table", # required, accepts AWS::DynamoDB::Table, AWS::DynamoDB::Stream, AWS::EFS::FileSystem, AWS::OpenSearchService::Domain, AWS::Kinesis::Stream, AWS::Kinesis::StreamConsumer, AWS::KMS::Key, AWS::Lambda::Function, AWS::S3::Bucket, AWS::S3::AccessPoint, AWS::S3Express::DirectoryBucket, AWS::S3::Glacier, AWS::S3Outposts::Bucket, AWS::S3Outposts::AccessPoint, AWS::SecretsManager::Secret, AWS::SNS::Topic, AWS::SQS::Queue, AWS::IAM::AssumeRolePolicyDocument, AWS::S3Tables::TableBucket, AWS::ApiGateway::RestApi, AWS::CodeArtifact::Domain, AWS::Backup::BackupVault, AWS::CloudTrail::Dashboard, AWS::CloudTrail::EventDataStore, AWS::S3Tables::Table, AWS::S3Express::AccessPoint
|
783
783
|
# })
|
784
784
|
#
|
785
785
|
# @example Response structure
|
@@ -931,6 +931,18 @@ module Aws::AccessAnalyzer
|
|
931
931
|
# },
|
932
932
|
# s3_express_directory_bucket: {
|
933
933
|
# bucket_policy: "S3ExpressDirectoryBucketPolicy",
|
934
|
+
# access_points: {
|
935
|
+
# "S3ExpressDirectoryAccessPointArn" => {
|
936
|
+
# access_point_policy: "AccessPointPolicy",
|
937
|
+
# network_origin: {
|
938
|
+
# vpc_configuration: {
|
939
|
+
# vpc_id: "VpcId", # required
|
940
|
+
# },
|
941
|
+
# internet_configuration: {
|
942
|
+
# },
|
943
|
+
# },
|
944
|
+
# },
|
945
|
+
# },
|
934
946
|
# },
|
935
947
|
# dynamodb_stream: {
|
936
948
|
# stream_policy: "DynamodbStreamPolicy",
|
@@ -1295,6 +1307,9 @@ module Aws::AccessAnalyzer
|
|
1295
1307
|
# resp.access_preview.configurations["ConfigurationsMapKey"].sns_topic.topic_policy #=> String
|
1296
1308
|
# resp.access_preview.configurations["ConfigurationsMapKey"].sqs_queue.queue_policy #=> String
|
1297
1309
|
# resp.access_preview.configurations["ConfigurationsMapKey"].s3_express_directory_bucket.bucket_policy #=> String
|
1310
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].s3_express_directory_bucket.access_points #=> Hash
|
1311
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].s3_express_directory_bucket.access_points["S3ExpressDirectoryAccessPointArn"].access_point_policy #=> String
|
1312
|
+
# resp.access_preview.configurations["ConfigurationsMapKey"].s3_express_directory_bucket.access_points["S3ExpressDirectoryAccessPointArn"].network_origin.vpc_configuration.vpc_id #=> String
|
1298
1313
|
# resp.access_preview.configurations["ConfigurationsMapKey"].dynamodb_stream.stream_policy #=> String
|
1299
1314
|
# resp.access_preview.configurations["ConfigurationsMapKey"].dynamodb_table.table_policy #=> String
|
1300
1315
|
# resp.access_preview.created_at #=> Time
|
@@ -2826,7 +2841,7 @@ module Aws::AccessAnalyzer
|
|
2826
2841
|
tracer: tracer
|
2827
2842
|
)
|
2828
2843
|
context[:gem_name] = 'aws-sdk-accessanalyzer'
|
2829
|
-
context[:gem_version] = '1.
|
2844
|
+
context[:gem_version] = '1.69.0'
|
2830
2845
|
Seahorse::Client::Request.new(handlers, context)
|
2831
2846
|
end
|
2832
2847
|
|
@@ -250,6 +250,9 @@ module Aws::AccessAnalyzer
|
|
250
250
|
S3BucketAclGrantConfigurationsList = Shapes::ListShape.new(name: 'S3BucketAclGrantConfigurationsList')
|
251
251
|
S3BucketConfiguration = Shapes::StructureShape.new(name: 'S3BucketConfiguration')
|
252
252
|
S3BucketPolicy = Shapes::StringShape.new(name: 'S3BucketPolicy')
|
253
|
+
S3ExpressDirectoryAccessPointArn = Shapes::StringShape.new(name: 'S3ExpressDirectoryAccessPointArn')
|
254
|
+
S3ExpressDirectoryAccessPointConfiguration = Shapes::StructureShape.new(name: 'S3ExpressDirectoryAccessPointConfiguration')
|
255
|
+
S3ExpressDirectoryAccessPointConfigurationsMap = Shapes::MapShape.new(name: 'S3ExpressDirectoryAccessPointConfigurationsMap')
|
253
256
|
S3ExpressDirectoryBucketConfiguration = Shapes::StructureShape.new(name: 'S3ExpressDirectoryBucketConfiguration')
|
254
257
|
S3ExpressDirectoryBucketPolicy = Shapes::StringShape.new(name: 'S3ExpressDirectoryBucketPolicy')
|
255
258
|
S3PublicAccessBlockConfiguration = Shapes::StructureShape.new(name: 'S3PublicAccessBlockConfiguration')
|
@@ -1081,7 +1084,15 @@ module Aws::AccessAnalyzer
|
|
1081
1084
|
S3BucketConfiguration.add_member(:access_points, Shapes::ShapeRef.new(shape: S3AccessPointConfigurationsMap, location_name: "accessPoints"))
|
1082
1085
|
S3BucketConfiguration.struct_class = Types::S3BucketConfiguration
|
1083
1086
|
|
1087
|
+
S3ExpressDirectoryAccessPointConfiguration.add_member(:access_point_policy, Shapes::ShapeRef.new(shape: AccessPointPolicy, location_name: "accessPointPolicy"))
|
1088
|
+
S3ExpressDirectoryAccessPointConfiguration.add_member(:network_origin, Shapes::ShapeRef.new(shape: NetworkOriginConfiguration, location_name: "networkOrigin"))
|
1089
|
+
S3ExpressDirectoryAccessPointConfiguration.struct_class = Types::S3ExpressDirectoryAccessPointConfiguration
|
1090
|
+
|
1091
|
+
S3ExpressDirectoryAccessPointConfigurationsMap.key = Shapes::ShapeRef.new(shape: S3ExpressDirectoryAccessPointArn)
|
1092
|
+
S3ExpressDirectoryAccessPointConfigurationsMap.value = Shapes::ShapeRef.new(shape: S3ExpressDirectoryAccessPointConfiguration)
|
1093
|
+
|
1084
1094
|
S3ExpressDirectoryBucketConfiguration.add_member(:bucket_policy, Shapes::ShapeRef.new(shape: S3ExpressDirectoryBucketPolicy, location_name: "bucketPolicy"))
|
1095
|
+
S3ExpressDirectoryBucketConfiguration.add_member(:access_points, Shapes::ShapeRef.new(shape: S3ExpressDirectoryAccessPointConfigurationsMap, location_name: "accessPoints"))
|
1085
1096
|
S3ExpressDirectoryBucketConfiguration.struct_class = Types::S3ExpressDirectoryBucketConfiguration
|
1086
1097
|
|
1087
1098
|
S3PublicAccessBlockConfiguration.add_member(:ignore_public_acls, Shapes::ShapeRef.new(shape: Boolean, required: true, location_name: "ignorePublicAcls"))
|
@@ -1312,8 +1323,8 @@ module Aws::AccessAnalyzer
|
|
1312
1323
|
o.http_request_uri = "/policy/generation/{jobId}"
|
1313
1324
|
o.input = Shapes::ShapeRef.new(shape: CancelPolicyGenerationRequest)
|
1314
1325
|
o.output = Shapes::ShapeRef.new(shape: CancelPolicyGenerationResponse)
|
1315
|
-
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1316
1326
|
o.errors << Shapes::ShapeRef.new(shape: InternalServerException)
|
1327
|
+
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1317
1328
|
o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
|
1318
1329
|
o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
|
1319
1330
|
end)
|
@@ -1324,8 +1335,8 @@ module Aws::AccessAnalyzer
|
|
1324
1335
|
o.http_request_uri = "/policy/check-access-not-granted"
|
1325
1336
|
o.input = Shapes::ShapeRef.new(shape: CheckAccessNotGrantedRequest)
|
1326
1337
|
o.output = Shapes::ShapeRef.new(shape: CheckAccessNotGrantedResponse)
|
1327
|
-
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1328
1338
|
o.errors << Shapes::ShapeRef.new(shape: InternalServerException)
|
1339
|
+
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1329
1340
|
o.errors << Shapes::ShapeRef.new(shape: InvalidParameterException)
|
1330
1341
|
o.errors << Shapes::ShapeRef.new(shape: UnprocessableEntityException)
|
1331
1342
|
o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
|
@@ -1338,8 +1349,8 @@ module Aws::AccessAnalyzer
|
|
1338
1349
|
o.http_request_uri = "/policy/check-no-new-access"
|
1339
1350
|
o.input = Shapes::ShapeRef.new(shape: CheckNoNewAccessRequest)
|
1340
1351
|
o.output = Shapes::ShapeRef.new(shape: CheckNoNewAccessResponse)
|
1341
|
-
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1342
1352
|
o.errors << Shapes::ShapeRef.new(shape: InternalServerException)
|
1353
|
+
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1343
1354
|
o.errors << Shapes::ShapeRef.new(shape: InvalidParameterException)
|
1344
1355
|
o.errors << Shapes::ShapeRef.new(shape: UnprocessableEntityException)
|
1345
1356
|
o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
|
@@ -1352,8 +1363,8 @@ module Aws::AccessAnalyzer
|
|
1352
1363
|
o.http_request_uri = "/policy/check-no-public-access"
|
1353
1364
|
o.input = Shapes::ShapeRef.new(shape: CheckNoPublicAccessRequest)
|
1354
1365
|
o.output = Shapes::ShapeRef.new(shape: CheckNoPublicAccessResponse)
|
1355
|
-
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1356
1366
|
o.errors << Shapes::ShapeRef.new(shape: InternalServerException)
|
1367
|
+
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1357
1368
|
o.errors << Shapes::ShapeRef.new(shape: InvalidParameterException)
|
1358
1369
|
o.errors << Shapes::ShapeRef.new(shape: UnprocessableEntityException)
|
1359
1370
|
o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
|
@@ -1366,10 +1377,10 @@ module Aws::AccessAnalyzer
|
|
1366
1377
|
o.http_request_uri = "/access-preview"
|
1367
1378
|
o.input = Shapes::ShapeRef.new(shape: CreateAccessPreviewRequest)
|
1368
1379
|
o.output = Shapes::ShapeRef.new(shape: CreateAccessPreviewResponse)
|
1369
|
-
o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
|
1370
1380
|
o.errors << Shapes::ShapeRef.new(shape: ConflictException)
|
1371
|
-
o.errors << Shapes::ShapeRef.new(shape:
|
1381
|
+
o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
|
1372
1382
|
o.errors << Shapes::ShapeRef.new(shape: InternalServerException)
|
1383
|
+
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1373
1384
|
o.errors << Shapes::ShapeRef.new(shape: ServiceQuotaExceededException)
|
1374
1385
|
o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
|
1375
1386
|
o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
|
@@ -1395,8 +1406,8 @@ module Aws::AccessAnalyzer
|
|
1395
1406
|
o.http_request_uri = "/analyzer/{analyzerName}/archive-rule"
|
1396
1407
|
o.input = Shapes::ShapeRef.new(shape: CreateArchiveRuleRequest)
|
1397
1408
|
o.output = Shapes::ShapeRef.new(shape: Shapes::StructureShape.new(struct_class: Aws::EmptyStructure))
|
1398
|
-
o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
|
1399
1409
|
o.errors << Shapes::ShapeRef.new(shape: ConflictException)
|
1410
|
+
o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
|
1400
1411
|
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1401
1412
|
o.errors << Shapes::ShapeRef.new(shape: InternalServerException)
|
1402
1413
|
o.errors << Shapes::ShapeRef.new(shape: ServiceQuotaExceededException)
|
@@ -1436,8 +1447,8 @@ module Aws::AccessAnalyzer
|
|
1436
1447
|
o.http_request_uri = "/recommendation/{id}"
|
1437
1448
|
o.input = Shapes::ShapeRef.new(shape: GenerateFindingRecommendationRequest)
|
1438
1449
|
o.output = Shapes::ShapeRef.new(shape: Shapes::StructureShape.new(struct_class: Aws::EmptyStructure))
|
1439
|
-
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1440
1450
|
o.errors << Shapes::ShapeRef.new(shape: InternalServerException)
|
1451
|
+
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1441
1452
|
o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
|
1442
1453
|
o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
|
1443
1454
|
end)
|
@@ -1449,8 +1460,8 @@ module Aws::AccessAnalyzer
|
|
1449
1460
|
o.input = Shapes::ShapeRef.new(shape: GetAccessPreviewRequest)
|
1450
1461
|
o.output = Shapes::ShapeRef.new(shape: GetAccessPreviewResponse)
|
1451
1462
|
o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
|
1452
|
-
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1453
1463
|
o.errors << Shapes::ShapeRef.new(shape: InternalServerException)
|
1464
|
+
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1454
1465
|
o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
|
1455
1466
|
o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
|
1456
1467
|
end)
|
@@ -1564,8 +1575,8 @@ module Aws::AccessAnalyzer
|
|
1564
1575
|
o.http_request_uri = "/policy/generation/{jobId}"
|
1565
1576
|
o.input = Shapes::ShapeRef.new(shape: GetGeneratedPolicyRequest)
|
1566
1577
|
o.output = Shapes::ShapeRef.new(shape: GetGeneratedPolicyResponse)
|
1567
|
-
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1568
1578
|
o.errors << Shapes::ShapeRef.new(shape: InternalServerException)
|
1579
|
+
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1569
1580
|
o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
|
1570
1581
|
o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
|
1571
1582
|
end)
|
@@ -1576,10 +1587,10 @@ module Aws::AccessAnalyzer
|
|
1576
1587
|
o.http_request_uri = "/access-preview/{accessPreviewId}"
|
1577
1588
|
o.input = Shapes::ShapeRef.new(shape: ListAccessPreviewFindingsRequest)
|
1578
1589
|
o.output = Shapes::ShapeRef.new(shape: ListAccessPreviewFindingsResponse)
|
1579
|
-
o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
|
1580
1590
|
o.errors << Shapes::ShapeRef.new(shape: ConflictException)
|
1581
|
-
o.errors << Shapes::ShapeRef.new(shape:
|
1591
|
+
o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
|
1582
1592
|
o.errors << Shapes::ShapeRef.new(shape: InternalServerException)
|
1593
|
+
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1583
1594
|
o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
|
1584
1595
|
o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
|
1585
1596
|
o[:pager] = Aws::Pager.new(
|
@@ -1597,8 +1608,8 @@ module Aws::AccessAnalyzer
|
|
1597
1608
|
o.input = Shapes::ShapeRef.new(shape: ListAccessPreviewsRequest)
|
1598
1609
|
o.output = Shapes::ShapeRef.new(shape: ListAccessPreviewsResponse)
|
1599
1610
|
o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
|
1600
|
-
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1601
1611
|
o.errors << Shapes::ShapeRef.new(shape: InternalServerException)
|
1612
|
+
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1602
1613
|
o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
|
1603
1614
|
o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
|
1604
1615
|
o[:pager] = Aws::Pager.new(
|
@@ -1708,8 +1719,8 @@ module Aws::AccessAnalyzer
|
|
1708
1719
|
o.http_request_uri = "/policy/generation"
|
1709
1720
|
o.input = Shapes::ShapeRef.new(shape: ListPolicyGenerationsRequest)
|
1710
1721
|
o.output = Shapes::ShapeRef.new(shape: ListPolicyGenerationsResponse)
|
1711
|
-
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1712
1722
|
o.errors << Shapes::ShapeRef.new(shape: InternalServerException)
|
1723
|
+
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1713
1724
|
o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
|
1714
1725
|
o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
|
1715
1726
|
o[:pager] = Aws::Pager.new(
|
@@ -1727,8 +1738,8 @@ module Aws::AccessAnalyzer
|
|
1727
1738
|
o.input = Shapes::ShapeRef.new(shape: ListTagsForResourceRequest)
|
1728
1739
|
o.output = Shapes::ShapeRef.new(shape: ListTagsForResourceResponse)
|
1729
1740
|
o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
|
1730
|
-
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1731
1741
|
o.errors << Shapes::ShapeRef.new(shape: InternalServerException)
|
1742
|
+
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1732
1743
|
o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
|
1733
1744
|
o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
|
1734
1745
|
end)
|
@@ -1740,8 +1751,8 @@ module Aws::AccessAnalyzer
|
|
1740
1751
|
o.input = Shapes::ShapeRef.new(shape: StartPolicyGenerationRequest)
|
1741
1752
|
o.output = Shapes::ShapeRef.new(shape: StartPolicyGenerationResponse)
|
1742
1753
|
o.errors << Shapes::ShapeRef.new(shape: ConflictException)
|
1743
|
-
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1744
1754
|
o.errors << Shapes::ShapeRef.new(shape: InternalServerException)
|
1755
|
+
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1745
1756
|
o.errors << Shapes::ShapeRef.new(shape: ServiceQuotaExceededException)
|
1746
1757
|
o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
|
1747
1758
|
o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
|
@@ -1767,8 +1778,8 @@ module Aws::AccessAnalyzer
|
|
1767
1778
|
o.input = Shapes::ShapeRef.new(shape: TagResourceRequest)
|
1768
1779
|
o.output = Shapes::ShapeRef.new(shape: TagResourceResponse)
|
1769
1780
|
o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
|
1770
|
-
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1771
1781
|
o.errors << Shapes::ShapeRef.new(shape: InternalServerException)
|
1782
|
+
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1772
1783
|
o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
|
1773
1784
|
o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
|
1774
1785
|
end)
|
@@ -1780,8 +1791,8 @@ module Aws::AccessAnalyzer
|
|
1780
1791
|
o.input = Shapes::ShapeRef.new(shape: UntagResourceRequest)
|
1781
1792
|
o.output = Shapes::ShapeRef.new(shape: UntagResourceResponse)
|
1782
1793
|
o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
|
1783
|
-
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1784
1794
|
o.errors << Shapes::ShapeRef.new(shape: InternalServerException)
|
1795
|
+
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1785
1796
|
o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
|
1786
1797
|
o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
|
1787
1798
|
end)
|
@@ -1832,8 +1843,8 @@ module Aws::AccessAnalyzer
|
|
1832
1843
|
o.http_request_uri = "/policy/validation"
|
1833
1844
|
o.input = Shapes::ShapeRef.new(shape: ValidatePolicyRequest)
|
1834
1845
|
o.output = Shapes::ShapeRef.new(shape: ValidatePolicyResponse)
|
1835
|
-
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1836
1846
|
o.errors << Shapes::ShapeRef.new(shape: InternalServerException)
|
1847
|
+
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
1837
1848
|
o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
|
1838
1849
|
o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
|
1839
1850
|
o[:pager] = Aws::Pager.new(
|
@@ -3189,8 +3189,7 @@ module Aws::AccessAnalyzer
|
|
3189
3189
|
end
|
3190
3190
|
|
3191
3191
|
# The proposed `InternetConfiguration` or `VpcConfiguration` to apply to
|
3192
|
-
# the Amazon S3 access point.
|
3193
|
-
# multi-region access points. You can make the access point accessible
|
3192
|
+
# the Amazon S3 access point. You can make the access point accessible
|
3194
3193
|
# from the internet, or you can specify that all requests made through
|
3195
3194
|
# that access point must originate from a specific virtual private cloud
|
3196
3195
|
# (VPC). You can specify only one type of network configuration. For
|
@@ -3666,7 +3665,7 @@ module Aws::AccessAnalyzer
|
|
3666
3665
|
# resource and neither is specified, the access preview uses
|
3667
3666
|
# `Internet` for the network origin. If the access preview is for an
|
3668
3667
|
# existing resource and neither is specified, the access preview uses
|
3669
|
-
# the
|
3668
|
+
# the existing network origin.
|
3670
3669
|
# @return [Types::NetworkOriginConfiguration]
|
3671
3670
|
#
|
3672
3671
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/S3AccessPointConfiguration AWS API Documentation
|
@@ -3756,6 +3755,49 @@ module Aws::AccessAnalyzer
|
|
3756
3755
|
include Aws::Structure
|
3757
3756
|
end
|
3758
3757
|
|
3758
|
+
# Proposed configuration for an access point attached to an Amazon S3
|
3759
|
+
# directory bucket. You can propose up to 10 access points per bucket.
|
3760
|
+
# If the proposed access point configuration is for an existing Amazon
|
3761
|
+
# S3 directory bucket, the access preview uses the proposed access point
|
3762
|
+
# configuration in place of the existing access points. To propose an
|
3763
|
+
# access point without a policy, you can provide an empty string as the
|
3764
|
+
# access point policy. For more information about access points for
|
3765
|
+
# Amazon S3 directory buckets, see [Managing access to directory buckets
|
3766
|
+
# with access points][1] in the Amazon Simple Storage Service User
|
3767
|
+
# Guide.
|
3768
|
+
#
|
3769
|
+
#
|
3770
|
+
#
|
3771
|
+
# [1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-points-directory-buckets.html
|
3772
|
+
#
|
3773
|
+
# @!attribute [rw] access_point_policy
|
3774
|
+
# The proposed access point policy for an Amazon S3 directory bucket
|
3775
|
+
# access point.
|
3776
|
+
# @return [String]
|
3777
|
+
#
|
3778
|
+
# @!attribute [rw] network_origin
|
3779
|
+
# The proposed `InternetConfiguration` or `VpcConfiguration` to apply
|
3780
|
+
# to the Amazon S3 access point. You can make the access point
|
3781
|
+
# accessible from the internet, or you can specify that all requests
|
3782
|
+
# made through that access point must originate from a specific
|
3783
|
+
# virtual private cloud (VPC). You can specify only one type of
|
3784
|
+
# network configuration. For more information, see [Creating access
|
3785
|
+
# points][1].
|
3786
|
+
#
|
3787
|
+
#
|
3788
|
+
#
|
3789
|
+
# [1]: https://docs.aws.amazon.com/AmazonS3/latest/dev/creating-access-points.html
|
3790
|
+
# @return [Types::NetworkOriginConfiguration]
|
3791
|
+
#
|
3792
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/S3ExpressDirectoryAccessPointConfiguration AWS API Documentation
|
3793
|
+
#
|
3794
|
+
class S3ExpressDirectoryAccessPointConfiguration < Struct.new(
|
3795
|
+
:access_point_policy,
|
3796
|
+
:network_origin)
|
3797
|
+
SENSITIVE = []
|
3798
|
+
include Aws::Structure
|
3799
|
+
end
|
3800
|
+
|
3759
3801
|
# Proposed access control configuration for an Amazon S3 directory
|
3760
3802
|
# bucket. You can propose a configuration for a new Amazon S3 directory
|
3761
3803
|
# bucket or an existing Amazon S3 directory bucket that you own by
|
@@ -3767,7 +3809,8 @@ module Aws::AccessAnalyzer
|
|
3767
3809
|
# assumes an directory bucket without a policy. To propose deletion of
|
3768
3810
|
# an existing bucket policy, you can specify an empty string. For more
|
3769
3811
|
# information about Amazon S3 directory bucket policies, see [Example
|
3770
|
-
#
|
3812
|
+
# bucket policies for directory buckets][1] in the Amazon Simple Storage
|
3813
|
+
# Service User Guide.
|
3771
3814
|
#
|
3772
3815
|
#
|
3773
3816
|
#
|
@@ -3777,10 +3820,15 @@ module Aws::AccessAnalyzer
|
|
3777
3820
|
# The proposed bucket policy for the Amazon S3 directory bucket.
|
3778
3821
|
# @return [String]
|
3779
3822
|
#
|
3823
|
+
# @!attribute [rw] access_points
|
3824
|
+
# The proposed access points for the Amazon S3 directory bucket.
|
3825
|
+
# @return [Hash<String,Types::S3ExpressDirectoryAccessPointConfiguration>]
|
3826
|
+
#
|
3780
3827
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/S3ExpressDirectoryBucketConfiguration AWS API Documentation
|
3781
3828
|
#
|
3782
3829
|
class S3ExpressDirectoryBucketConfiguration < Struct.new(
|
3783
|
-
:bucket_policy
|
3830
|
+
:bucket_policy,
|
3831
|
+
:access_points)
|
3784
3832
|
SENSITIVE = []
|
3785
3833
|
include Aws::Structure
|
3786
3834
|
end
|
data/sig/client.rbs
CHANGED
@@ -136,7 +136,7 @@ module Aws
|
|
136
136
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/AccessAnalyzer/Client.html#check_no_public_access-instance_method
|
137
137
|
def check_no_public_access: (
|
138
138
|
policy_document: ::String,
|
139
|
-
resource_type: ("AWS::DynamoDB::Table" | "AWS::DynamoDB::Stream" | "AWS::EFS::FileSystem" | "AWS::OpenSearchService::Domain" | "AWS::Kinesis::Stream" | "AWS::Kinesis::StreamConsumer" | "AWS::KMS::Key" | "AWS::Lambda::Function" | "AWS::S3::Bucket" | "AWS::S3::AccessPoint" | "AWS::S3Express::DirectoryBucket" | "AWS::S3::Glacier" | "AWS::S3Outposts::Bucket" | "AWS::S3Outposts::AccessPoint" | "AWS::SecretsManager::Secret" | "AWS::SNS::Topic" | "AWS::SQS::Queue" | "AWS::IAM::AssumeRolePolicyDocument")
|
139
|
+
resource_type: ("AWS::DynamoDB::Table" | "AWS::DynamoDB::Stream" | "AWS::EFS::FileSystem" | "AWS::OpenSearchService::Domain" | "AWS::Kinesis::Stream" | "AWS::Kinesis::StreamConsumer" | "AWS::KMS::Key" | "AWS::Lambda::Function" | "AWS::S3::Bucket" | "AWS::S3::AccessPoint" | "AWS::S3Express::DirectoryBucket" | "AWS::S3::Glacier" | "AWS::S3Outposts::Bucket" | "AWS::S3Outposts::AccessPoint" | "AWS::SecretsManager::Secret" | "AWS::SNS::Topic" | "AWS::SQS::Queue" | "AWS::IAM::AssumeRolePolicyDocument" | "AWS::S3Tables::TableBucket" | "AWS::ApiGateway::RestApi" | "AWS::CodeArtifact::Domain" | "AWS::Backup::BackupVault" | "AWS::CloudTrail::Dashboard" | "AWS::CloudTrail::EventDataStore" | "AWS::S3Tables::Table" | "AWS::S3Express::AccessPoint")
|
140
140
|
) -> _CheckNoPublicAccessResponseSuccess
|
141
141
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _CheckNoPublicAccessResponseSuccess
|
142
142
|
|
@@ -230,7 +230,17 @@ module Aws
|
|
230
230
|
queue_policy: ::String?
|
231
231
|
}?,
|
232
232
|
s3_express_directory_bucket: {
|
233
|
-
bucket_policy: ::String
|
233
|
+
bucket_policy: ::String?,
|
234
|
+
access_points: Hash[::String, {
|
235
|
+
access_point_policy: ::String?,
|
236
|
+
network_origin: {
|
237
|
+
vpc_configuration: {
|
238
|
+
vpc_id: ::String
|
239
|
+
}?,
|
240
|
+
internet_configuration: {
|
241
|
+
}?
|
242
|
+
}?
|
243
|
+
}]?
|
234
244
|
}?,
|
235
245
|
dynamodb_stream: {
|
236
246
|
stream_policy: ::String?
|
data/sig/types.rbs
CHANGED
@@ -188,7 +188,7 @@ module Aws::AccessAnalyzer
|
|
188
188
|
|
189
189
|
class CheckNoPublicAccessRequest
|
190
190
|
attr_accessor policy_document: ::String
|
191
|
-
attr_accessor resource_type: ("AWS::DynamoDB::Table" | "AWS::DynamoDB::Stream" | "AWS::EFS::FileSystem" | "AWS::OpenSearchService::Domain" | "AWS::Kinesis::Stream" | "AWS::Kinesis::StreamConsumer" | "AWS::KMS::Key" | "AWS::Lambda::Function" | "AWS::S3::Bucket" | "AWS::S3::AccessPoint" | "AWS::S3Express::DirectoryBucket" | "AWS::S3::Glacier" | "AWS::S3Outposts::Bucket" | "AWS::S3Outposts::AccessPoint" | "AWS::SecretsManager::Secret" | "AWS::SNS::Topic" | "AWS::SQS::Queue" | "AWS::IAM::AssumeRolePolicyDocument")
|
191
|
+
attr_accessor resource_type: ("AWS::DynamoDB::Table" | "AWS::DynamoDB::Stream" | "AWS::EFS::FileSystem" | "AWS::OpenSearchService::Domain" | "AWS::Kinesis::Stream" | "AWS::Kinesis::StreamConsumer" | "AWS::KMS::Key" | "AWS::Lambda::Function" | "AWS::S3::Bucket" | "AWS::S3::AccessPoint" | "AWS::S3Express::DirectoryBucket" | "AWS::S3::Glacier" | "AWS::S3Outposts::Bucket" | "AWS::S3Outposts::AccessPoint" | "AWS::SecretsManager::Secret" | "AWS::SNS::Topic" | "AWS::SQS::Queue" | "AWS::IAM::AssumeRolePolicyDocument" | "AWS::S3Tables::TableBucket" | "AWS::ApiGateway::RestApi" | "AWS::CodeArtifact::Domain" | "AWS::Backup::BackupVault" | "AWS::CloudTrail::Dashboard" | "AWS::CloudTrail::EventDataStore" | "AWS::S3Tables::Table" | "AWS::S3Express::AccessPoint")
|
192
192
|
SENSITIVE: [:policy_document]
|
193
193
|
end
|
194
194
|
|
@@ -961,8 +961,15 @@ module Aws::AccessAnalyzer
|
|
961
961
|
SENSITIVE: []
|
962
962
|
end
|
963
963
|
|
964
|
+
class S3ExpressDirectoryAccessPointConfiguration
|
965
|
+
attr_accessor access_point_policy: ::String
|
966
|
+
attr_accessor network_origin: Types::NetworkOriginConfiguration
|
967
|
+
SENSITIVE: []
|
968
|
+
end
|
969
|
+
|
964
970
|
class S3ExpressDirectoryBucketConfiguration
|
965
971
|
attr_accessor bucket_policy: ::String
|
972
|
+
attr_accessor access_points: ::Hash[::String, Types::S3ExpressDirectoryAccessPointConfiguration]
|
966
973
|
SENSITIVE: []
|
967
974
|
end
|
968
975
|
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-accessanalyzer
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.69.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2025-
|
11
|
+
date: 2025-04-17 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|