aws-sdk-accessanalyzer 1.9.0 → 1.14.0
Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 2a49bd2e7a89e7252fa8a669b007c8d8a58bf414ed383ef4d933c8d251986f26
|
4
|
+
data.tar.gz: 302ea5f085d32c9430646ac325169c56b536d4e91d622555713f17c031e7753d
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 664ca5f095dc07271b4789ed432c819ddad443deeb2c4f3e6e710eb947e6c271766bdc6f2afa8b345dfc2af67c19211da56147d7a768de06d1afb209a57aa25d
|
7
|
+
data.tar.gz: 450b8509df467fe0efaf855a42c7d9c453a314c34323dd97e98d0da2f0aae48c669651fe4ed45b841a347c8167fe6ecfeade4971764805471c4adff4b22316f9
|
@@ -7,6 +7,7 @@
|
|
7
7
|
#
|
8
8
|
# WARNING ABOUT GENERATED CODE
|
9
9
|
|
10
|
+
|
10
11
|
require 'aws-sdk-core'
|
11
12
|
require 'aws-sigv4'
|
12
13
|
|
@@ -27,7 +28,7 @@ require_relative 'aws-sdk-accessanalyzer/customizations'
|
|
27
28
|
# structure.
|
28
29
|
#
|
29
30
|
# access_analyzer = Aws::AccessAnalyzer::Client.new
|
30
|
-
# resp = access_analyzer.
|
31
|
+
# resp = access_analyzer.apply_archive_rule(params)
|
31
32
|
#
|
32
33
|
# See {Client} for more information.
|
33
34
|
#
|
@@ -44,9 +45,9 @@ require_relative 'aws-sdk-accessanalyzer/customizations'
|
|
44
45
|
#
|
45
46
|
# See {Errors} for more information.
|
46
47
|
#
|
47
|
-
#
|
48
|
+
# @!group service
|
48
49
|
module Aws::AccessAnalyzer
|
49
50
|
|
50
|
-
GEM_VERSION = '1.
|
51
|
+
GEM_VERSION = '1.14.0'
|
51
52
|
|
52
53
|
end
|
@@ -85,13 +85,28 @@ module Aws::AccessAnalyzer
|
|
85
85
|
# * `Aws::Credentials` - Used for configuring static, non-refreshing
|
86
86
|
# credentials.
|
87
87
|
#
|
88
|
+
# * `Aws::SharedCredentials` - Used for loading static credentials from a
|
89
|
+
# shared file, such as `~/.aws/config`.
|
90
|
+
#
|
91
|
+
# * `Aws::AssumeRoleCredentials` - Used when you need to assume a role.
|
92
|
+
#
|
93
|
+
# * `Aws::AssumeRoleWebIdentityCredentials` - Used when you need to
|
94
|
+
# assume a role after providing credentials via the web.
|
95
|
+
#
|
96
|
+
# * `Aws::SSOCredentials` - Used for loading credentials from AWS SSO using an
|
97
|
+
# access token generated from `aws login`.
|
98
|
+
#
|
99
|
+
# * `Aws::ProcessCredentials` - Used for loading credentials from a
|
100
|
+
# process that outputs to stdout.
|
101
|
+
#
|
88
102
|
# * `Aws::InstanceProfileCredentials` - Used for loading credentials
|
89
103
|
# from an EC2 IMDS on an EC2 instance.
|
90
104
|
#
|
91
|
-
# * `Aws::
|
92
|
-
#
|
105
|
+
# * `Aws::ECSCredentials` - Used for loading credentials from
|
106
|
+
# instances running in ECS.
|
93
107
|
#
|
94
|
-
# * `Aws::
|
108
|
+
# * `Aws::CognitoIdentityCredentials` - Used for loading credentials
|
109
|
+
# from the Cognito Identity service.
|
95
110
|
#
|
96
111
|
# When `:credentials` are not configured directly, the following
|
97
112
|
# locations will be searched for credentials:
|
@@ -101,10 +116,10 @@ module Aws::AccessAnalyzer
|
|
101
116
|
# * ENV['AWS_ACCESS_KEY_ID'], ENV['AWS_SECRET_ACCESS_KEY']
|
102
117
|
# * `~/.aws/credentials`
|
103
118
|
# * `~/.aws/config`
|
104
|
-
# * EC2 IMDS instance profile - When used by default, the timeouts
|
105
|
-
# very aggressive. Construct and pass an instance of
|
106
|
-
# `Aws::InstanceProfileCredentails`
|
107
|
-
# timeouts.
|
119
|
+
# * EC2/ECS IMDS instance profile - When used by default, the timeouts
|
120
|
+
# are very aggressive. Construct and pass an instance of
|
121
|
+
# `Aws::InstanceProfileCredentails` or `Aws::ECSCredentials` to
|
122
|
+
# enable retries and extended timeouts.
|
108
123
|
#
|
109
124
|
# @option options [required, String] :region
|
110
125
|
# The AWS region to connect to. The configured `:region` is
|
@@ -312,6 +327,40 @@ module Aws::AccessAnalyzer
|
|
312
327
|
|
313
328
|
# @!group API Operations
|
314
329
|
|
330
|
+
# Retroactively applies the archive rule to existing findings that meet
|
331
|
+
# the archive rule criteria.
|
332
|
+
#
|
333
|
+
# @option params [required, String] :analyzer_arn
|
334
|
+
# The Amazon resource name (ARN) of the analyzer.
|
335
|
+
#
|
336
|
+
# @option params [String] :client_token
|
337
|
+
# A client token.
|
338
|
+
#
|
339
|
+
# **A suitable default value is auto-generated.** You should normally
|
340
|
+
# not need to pass this option.**
|
341
|
+
#
|
342
|
+
# @option params [required, String] :rule_name
|
343
|
+
# The name of the rule to apply.
|
344
|
+
#
|
345
|
+
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
346
|
+
#
|
347
|
+
# @example Request syntax with placeholder values
|
348
|
+
#
|
349
|
+
# resp = client.apply_archive_rule({
|
350
|
+
# analyzer_arn: "AnalyzerArn", # required
|
351
|
+
# client_token: "String",
|
352
|
+
# rule_name: "Name", # required
|
353
|
+
# })
|
354
|
+
#
|
355
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ApplyArchiveRule AWS API Documentation
|
356
|
+
#
|
357
|
+
# @overload apply_archive_rule(params = {})
|
358
|
+
# @param [Hash] params ({})
|
359
|
+
def apply_archive_rule(params = {}, options = {})
|
360
|
+
req = build_request(:apply_archive_rule, params)
|
361
|
+
req.send_request(options)
|
362
|
+
end
|
363
|
+
|
315
364
|
# Creates an analyzer for your account.
|
316
365
|
#
|
317
366
|
# @option params [required, String] :analyzer_name
|
@@ -377,8 +426,8 @@ module Aws::AccessAnalyzer
|
|
377
426
|
end
|
378
427
|
|
379
428
|
# Creates an archive rule for the specified analyzer. Archive rules
|
380
|
-
# automatically archive findings that meet the criteria you define
|
381
|
-
# you create the rule.
|
429
|
+
# automatically archive new findings that meet the criteria you define
|
430
|
+
# when you create the rule.
|
382
431
|
#
|
383
432
|
# @option params [required, String] :analyzer_name
|
384
433
|
# The name of the created analyzer.
|
@@ -517,7 +566,7 @@ module Aws::AccessAnalyzer
|
|
517
566
|
# resp.resource.is_public #=> Boolean
|
518
567
|
# resp.resource.resource_arn #=> String
|
519
568
|
# resp.resource.resource_owner_account #=> String
|
520
|
-
# resp.resource.resource_type #=> String, one of "AWS::
|
569
|
+
# resp.resource.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
|
521
570
|
# resp.resource.shared_via #=> Array
|
522
571
|
# resp.resource.shared_via[0] #=> String
|
523
572
|
# resp.resource.status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
|
@@ -571,6 +620,13 @@ module Aws::AccessAnalyzer
|
|
571
620
|
|
572
621
|
# Retrieves information about an archive rule.
|
573
622
|
#
|
623
|
+
# To learn about filter keys that you can use to create an archive rule,
|
624
|
+
# see [Access Analyzer filter keys][1] in the **IAM User Guide**.
|
625
|
+
#
|
626
|
+
#
|
627
|
+
#
|
628
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html
|
629
|
+
#
|
574
630
|
# @option params [required, String] :analyzer_name
|
575
631
|
# The name of the analyzer to retrieve rules from.
|
576
632
|
#
|
@@ -645,10 +701,10 @@ module Aws::AccessAnalyzer
|
|
645
701
|
# resp.finding.principal["String"] #=> String
|
646
702
|
# resp.finding.resource #=> String
|
647
703
|
# resp.finding.resource_owner_account #=> String
|
648
|
-
# resp.finding.resource_type #=> String, one of "AWS::
|
704
|
+
# resp.finding.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
|
649
705
|
# resp.finding.sources #=> Array
|
650
706
|
# resp.finding.sources[0].detail.access_point_arn #=> String
|
651
|
-
# resp.finding.sources[0].type #=> String, one of "
|
707
|
+
# resp.finding.sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT"
|
652
708
|
# resp.finding.status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
|
653
709
|
# resp.finding.updated_at #=> Time
|
654
710
|
#
|
@@ -689,7 +745,7 @@ module Aws::AccessAnalyzer
|
|
689
745
|
# analyzer_arn: "AnalyzerArn", # required
|
690
746
|
# max_results: 1,
|
691
747
|
# next_token: "Token",
|
692
|
-
# resource_type: "AWS::
|
748
|
+
# resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key
|
693
749
|
# })
|
694
750
|
#
|
695
751
|
# @example Response structure
|
@@ -697,7 +753,7 @@ module Aws::AccessAnalyzer
|
|
697
753
|
# resp.analyzed_resources #=> Array
|
698
754
|
# resp.analyzed_resources[0].resource_arn #=> String
|
699
755
|
# resp.analyzed_resources[0].resource_owner_account #=> String
|
700
|
-
# resp.analyzed_resources[0].resource_type #=> String, one of "AWS::
|
756
|
+
# resp.analyzed_resources[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
|
701
757
|
# resp.next_token #=> String
|
702
758
|
#
|
703
759
|
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ListAnalyzedResources AWS API Documentation
|
@@ -812,6 +868,13 @@ module Aws::AccessAnalyzer
|
|
812
868
|
|
813
869
|
# Retrieves a list of findings generated by the specified analyzer.
|
814
870
|
#
|
871
|
+
# To learn about filter keys that you can use to create an archive rule,
|
872
|
+
# see [Access Analyzer filter keys][1] in the **IAM User Guide**.
|
873
|
+
#
|
874
|
+
#
|
875
|
+
#
|
876
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html
|
877
|
+
#
|
815
878
|
# @option params [required, String] :analyzer_arn
|
816
879
|
# The ARN of the analyzer to retrieve findings from.
|
817
880
|
#
|
@@ -870,10 +933,10 @@ module Aws::AccessAnalyzer
|
|
870
933
|
# resp.findings[0].principal["String"] #=> String
|
871
934
|
# resp.findings[0].resource #=> String
|
872
935
|
# resp.findings[0].resource_owner_account #=> String
|
873
|
-
# resp.findings[0].resource_type #=> String, one of "AWS::
|
936
|
+
# resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
|
874
937
|
# resp.findings[0].sources #=> Array
|
875
938
|
# resp.findings[0].sources[0].detail.access_point_arn #=> String
|
876
|
-
# resp.findings[0].sources[0].type #=> String, one of "
|
939
|
+
# resp.findings[0].sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT"
|
877
940
|
# resp.findings[0].status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
|
878
941
|
# resp.findings[0].updated_at #=> Time
|
879
942
|
# resp.next_token #=> String
|
@@ -1099,7 +1162,7 @@ module Aws::AccessAnalyzer
|
|
1099
1162
|
params: params,
|
1100
1163
|
config: config)
|
1101
1164
|
context[:gem_name] = 'aws-sdk-accessanalyzer'
|
1102
|
-
context[:gem_version] = '1.
|
1165
|
+
context[:gem_version] = '1.14.0'
|
1103
1166
|
Seahorse::Client::Request.new(handlers, context)
|
1104
1167
|
end
|
1105
1168
|
|
@@ -22,6 +22,7 @@ module Aws::AccessAnalyzer
|
|
22
22
|
AnalyzerStatus = Shapes::StringShape.new(name: 'AnalyzerStatus')
|
23
23
|
AnalyzerSummary = Shapes::StructureShape.new(name: 'AnalyzerSummary')
|
24
24
|
AnalyzersList = Shapes::ListShape.new(name: 'AnalyzersList')
|
25
|
+
ApplyArchiveRuleRequest = Shapes::StructureShape.new(name: 'ApplyArchiveRuleRequest')
|
25
26
|
ArchiveRuleSummary = Shapes::StructureShape.new(name: 'ArchiveRuleSummary')
|
26
27
|
ArchiveRulesList = Shapes::ListShape.new(name: 'ArchiveRulesList')
|
27
28
|
Boolean = Shapes::BooleanShape.new(name: 'Boolean')
|
@@ -136,6 +137,11 @@ module Aws::AccessAnalyzer
|
|
136
137
|
|
137
138
|
AnalyzersList.member = Shapes::ShapeRef.new(shape: AnalyzerSummary)
|
138
139
|
|
140
|
+
ApplyArchiveRuleRequest.add_member(:analyzer_arn, Shapes::ShapeRef.new(shape: AnalyzerArn, required: true, location_name: "analyzerArn"))
|
141
|
+
ApplyArchiveRuleRequest.add_member(:client_token, Shapes::ShapeRef.new(shape: String, location_name: "clientToken", metadata: {"idempotencyToken"=>true}))
|
142
|
+
ApplyArchiveRuleRequest.add_member(:rule_name, Shapes::ShapeRef.new(shape: Name, required: true, location_name: "ruleName"))
|
143
|
+
ApplyArchiveRuleRequest.struct_class = Types::ApplyArchiveRuleRequest
|
144
|
+
|
139
145
|
ArchiveRuleSummary.add_member(:created_at, Shapes::ShapeRef.new(shape: Timestamp, required: true, location_name: "createdAt"))
|
140
146
|
ArchiveRuleSummary.add_member(:filter, Shapes::ShapeRef.new(shape: FilterCriteriaMap, required: true, location_name: "filter"))
|
141
147
|
ArchiveRuleSummary.add_member(:rule_name, Shapes::ShapeRef.new(shape: Name, required: true, location_name: "ruleName"))
|
@@ -404,6 +410,19 @@ module Aws::AccessAnalyzer
|
|
404
410
|
"uid" => "accessanalyzer-2019-11-01",
|
405
411
|
}
|
406
412
|
|
413
|
+
api.add_operation(:apply_archive_rule, Seahorse::Model::Operation.new.tap do |o|
|
414
|
+
o.name = "ApplyArchiveRule"
|
415
|
+
o.http_method = "PUT"
|
416
|
+
o.http_request_uri = "/archive-rule"
|
417
|
+
o.input = Shapes::ShapeRef.new(shape: ApplyArchiveRuleRequest)
|
418
|
+
o.output = Shapes::ShapeRef.new(shape: Shapes::StructureShape.new(struct_class: Aws::EmptyStructure))
|
419
|
+
o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
|
420
|
+
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
421
|
+
o.errors << Shapes::ShapeRef.new(shape: InternalServerException)
|
422
|
+
o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
|
423
|
+
o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
|
424
|
+
end)
|
425
|
+
|
407
426
|
api.add_operation(:create_analyzer, Seahorse::Model::Operation.new.tap do |o|
|
408
427
|
o.name = "CreateAnalyzer"
|
409
428
|
o.http_method = "PUT"
|
@@ -99,6 +99,10 @@ module Aws::AccessAnalyzer
|
|
99
99
|
def retry_after_seconds
|
100
100
|
@data[:retry_after_seconds]
|
101
101
|
end
|
102
|
+
|
103
|
+
def retryable?
|
104
|
+
true
|
105
|
+
end
|
102
106
|
end
|
103
107
|
|
104
108
|
class ResourceNotFoundException < ServiceError
|
@@ -169,6 +173,14 @@ module Aws::AccessAnalyzer
|
|
169
173
|
def retry_after_seconds
|
170
174
|
@data[:retry_after_seconds]
|
171
175
|
end
|
176
|
+
|
177
|
+
def retryable?
|
178
|
+
true
|
179
|
+
end
|
180
|
+
|
181
|
+
def throttling?
|
182
|
+
true
|
183
|
+
end
|
172
184
|
end
|
173
185
|
|
174
186
|
class ValidationException < ServiceError
|
@@ -181,6 +181,42 @@ module Aws::AccessAnalyzer
|
|
181
181
|
include Aws::Structure
|
182
182
|
end
|
183
183
|
|
184
|
+
# Retroactively applies an archive rule.
|
185
|
+
#
|
186
|
+
# @note When making an API call, you may pass ApplyArchiveRuleRequest
|
187
|
+
# data as a hash:
|
188
|
+
#
|
189
|
+
# {
|
190
|
+
# analyzer_arn: "AnalyzerArn", # required
|
191
|
+
# client_token: "String",
|
192
|
+
# rule_name: "Name", # required
|
193
|
+
# }
|
194
|
+
#
|
195
|
+
# @!attribute [rw] analyzer_arn
|
196
|
+
# The Amazon resource name (ARN) of the analyzer.
|
197
|
+
# @return [String]
|
198
|
+
#
|
199
|
+
# @!attribute [rw] client_token
|
200
|
+
# A client token.
|
201
|
+
#
|
202
|
+
# **A suitable default value is auto-generated.** You should normally
|
203
|
+
# not need to pass this option.
|
204
|
+
# @return [String]
|
205
|
+
#
|
206
|
+
# @!attribute [rw] rule_name
|
207
|
+
# The name of the rule to apply.
|
208
|
+
# @return [String]
|
209
|
+
#
|
210
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ApplyArchiveRuleRequest AWS API Documentation
|
211
|
+
#
|
212
|
+
class ApplyArchiveRuleRequest < Struct.new(
|
213
|
+
:analyzer_arn,
|
214
|
+
:client_token,
|
215
|
+
:rule_name)
|
216
|
+
SENSITIVE = []
|
217
|
+
include Aws::Structure
|
218
|
+
end
|
219
|
+
|
184
220
|
# Contains information about an archive rule.
|
185
221
|
#
|
186
222
|
# @!attribute [rw] created_at
|
@@ -901,7 +937,7 @@ module Aws::AccessAnalyzer
|
|
901
937
|
# analyzer_arn: "AnalyzerArn", # required
|
902
938
|
# max_results: 1,
|
903
939
|
# next_token: "Token",
|
904
|
-
# resource_type: "AWS::
|
940
|
+
# resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key
|
905
941
|
# }
|
906
942
|
#
|
907
943
|
# @!attribute [rw] analyzer_arn
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-accessanalyzer
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.14.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2020-
|
11
|
+
date: 2020-10-22 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|
@@ -19,7 +19,7 @@ dependencies:
|
|
19
19
|
version: '3'
|
20
20
|
- - ">="
|
21
21
|
- !ruby/object:Gem::Version
|
22
|
-
version: 3.
|
22
|
+
version: 3.109.0
|
23
23
|
type: :runtime
|
24
24
|
prerelease: false
|
25
25
|
version_requirements: !ruby/object:Gem::Requirement
|
@@ -29,7 +29,7 @@ dependencies:
|
|
29
29
|
version: '3'
|
30
30
|
- - ">="
|
31
31
|
- !ruby/object:Gem::Version
|
32
|
-
version: 3.
|
32
|
+
version: 3.109.0
|
33
33
|
- !ruby/object:Gem::Dependency
|
34
34
|
name: aws-sigv4
|
35
35
|
requirement: !ruby/object:Gem::Requirement
|