aws-sdk-accessanalyzer 1.9.0 → 1.14.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: ebfc420d1c3cc22175a04e310116ef2a07173b6bc3fdb6dea76662eb02cee7be
4
- data.tar.gz: a5332e572b5a6ba702d19aa45d97e990f3e327b1f891e59ad6b2f3ca1ddff501
3
+ metadata.gz: 2a49bd2e7a89e7252fa8a669b007c8d8a58bf414ed383ef4d933c8d251986f26
4
+ data.tar.gz: 302ea5f085d32c9430646ac325169c56b536d4e91d622555713f17c031e7753d
5
5
  SHA512:
6
- metadata.gz: c68ad5d948daac6712338506ba6bdc635a53676cf05e498f3051a15ae3cfa51a933c092329309dff8ab4a67c8fecbcfc275bf7255458686a1290d1bb6855799a
7
- data.tar.gz: 3b05413bafebc76e30fc6ce81aad2b2c3e869602e52163141f9747f8102d27890d1da1eb87ff61eacb0acaf3d3e3cde012f4f6a1146a2d4e9b2ba51833e449e9
6
+ metadata.gz: 664ca5f095dc07271b4789ed432c819ddad443deeb2c4f3e6e710eb947e6c271766bdc6f2afa8b345dfc2af67c19211da56147d7a768de06d1afb209a57aa25d
7
+ data.tar.gz: 450b8509df467fe0efaf855a42c7d9c453a314c34323dd97e98d0da2f0aae48c669651fe4ed45b841a347c8167fe6ecfeade4971764805471c4adff4b22316f9
@@ -7,6 +7,7 @@
7
7
  #
8
8
  # WARNING ABOUT GENERATED CODE
9
9
 
10
+
10
11
  require 'aws-sdk-core'
11
12
  require 'aws-sigv4'
12
13
 
@@ -27,7 +28,7 @@ require_relative 'aws-sdk-accessanalyzer/customizations'
27
28
  # structure.
28
29
  #
29
30
  # access_analyzer = Aws::AccessAnalyzer::Client.new
30
- # resp = access_analyzer.create_analyzer(params)
31
+ # resp = access_analyzer.apply_archive_rule(params)
31
32
  #
32
33
  # See {Client} for more information.
33
34
  #
@@ -44,9 +45,9 @@ require_relative 'aws-sdk-accessanalyzer/customizations'
44
45
  #
45
46
  # See {Errors} for more information.
46
47
  #
47
- # @service
48
+ # @!group service
48
49
  module Aws::AccessAnalyzer
49
50
 
50
- GEM_VERSION = '1.9.0'
51
+ GEM_VERSION = '1.14.0'
51
52
 
52
53
  end
@@ -85,13 +85,28 @@ module Aws::AccessAnalyzer
85
85
  # * `Aws::Credentials` - Used for configuring static, non-refreshing
86
86
  # credentials.
87
87
  #
88
+ # * `Aws::SharedCredentials` - Used for loading static credentials from a
89
+ # shared file, such as `~/.aws/config`.
90
+ #
91
+ # * `Aws::AssumeRoleCredentials` - Used when you need to assume a role.
92
+ #
93
+ # * `Aws::AssumeRoleWebIdentityCredentials` - Used when you need to
94
+ # assume a role after providing credentials via the web.
95
+ #
96
+ # * `Aws::SSOCredentials` - Used for loading credentials from AWS SSO using an
97
+ # access token generated from `aws login`.
98
+ #
99
+ # * `Aws::ProcessCredentials` - Used for loading credentials from a
100
+ # process that outputs to stdout.
101
+ #
88
102
  # * `Aws::InstanceProfileCredentials` - Used for loading credentials
89
103
  # from an EC2 IMDS on an EC2 instance.
90
104
  #
91
- # * `Aws::SharedCredentials` - Used for loading credentials from a
92
- # shared file, such as `~/.aws/config`.
105
+ # * `Aws::ECSCredentials` - Used for loading credentials from
106
+ # instances running in ECS.
93
107
  #
94
- # * `Aws::AssumeRoleCredentials` - Used when you need to assume a role.
108
+ # * `Aws::CognitoIdentityCredentials` - Used for loading credentials
109
+ # from the Cognito Identity service.
95
110
  #
96
111
  # When `:credentials` are not configured directly, the following
97
112
  # locations will be searched for credentials:
@@ -101,10 +116,10 @@ module Aws::AccessAnalyzer
101
116
  # * ENV['AWS_ACCESS_KEY_ID'], ENV['AWS_SECRET_ACCESS_KEY']
102
117
  # * `~/.aws/credentials`
103
118
  # * `~/.aws/config`
104
- # * EC2 IMDS instance profile - When used by default, the timeouts are
105
- # very aggressive. Construct and pass an instance of
106
- # `Aws::InstanceProfileCredentails` to enable retries and extended
107
- # timeouts.
119
+ # * EC2/ECS IMDS instance profile - When used by default, the timeouts
120
+ # are very aggressive. Construct and pass an instance of
121
+ # `Aws::InstanceProfileCredentails` or `Aws::ECSCredentials` to
122
+ # enable retries and extended timeouts.
108
123
  #
109
124
  # @option options [required, String] :region
110
125
  # The AWS region to connect to. The configured `:region` is
@@ -312,6 +327,40 @@ module Aws::AccessAnalyzer
312
327
 
313
328
  # @!group API Operations
314
329
 
330
+ # Retroactively applies the archive rule to existing findings that meet
331
+ # the archive rule criteria.
332
+ #
333
+ # @option params [required, String] :analyzer_arn
334
+ # The Amazon resource name (ARN) of the analyzer.
335
+ #
336
+ # @option params [String] :client_token
337
+ # A client token.
338
+ #
339
+ # **A suitable default value is auto-generated.** You should normally
340
+ # not need to pass this option.**
341
+ #
342
+ # @option params [required, String] :rule_name
343
+ # The name of the rule to apply.
344
+ #
345
+ # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
346
+ #
347
+ # @example Request syntax with placeholder values
348
+ #
349
+ # resp = client.apply_archive_rule({
350
+ # analyzer_arn: "AnalyzerArn", # required
351
+ # client_token: "String",
352
+ # rule_name: "Name", # required
353
+ # })
354
+ #
355
+ # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ApplyArchiveRule AWS API Documentation
356
+ #
357
+ # @overload apply_archive_rule(params = {})
358
+ # @param [Hash] params ({})
359
+ def apply_archive_rule(params = {}, options = {})
360
+ req = build_request(:apply_archive_rule, params)
361
+ req.send_request(options)
362
+ end
363
+
315
364
  # Creates an analyzer for your account.
316
365
  #
317
366
  # @option params [required, String] :analyzer_name
@@ -377,8 +426,8 @@ module Aws::AccessAnalyzer
377
426
  end
378
427
 
379
428
  # Creates an archive rule for the specified analyzer. Archive rules
380
- # automatically archive findings that meet the criteria you define when
381
- # you create the rule.
429
+ # automatically archive new findings that meet the criteria you define
430
+ # when you create the rule.
382
431
  #
383
432
  # @option params [required, String] :analyzer_name
384
433
  # The name of the created analyzer.
@@ -517,7 +566,7 @@ module Aws::AccessAnalyzer
517
566
  # resp.resource.is_public #=> Boolean
518
567
  # resp.resource.resource_arn #=> String
519
568
  # resp.resource.resource_owner_account #=> String
520
- # resp.resource.resource_type #=> String, one of "AWS::IAM::Role", "AWS::KMS::Key", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::S3::Bucket", "AWS::SQS::Queue"
569
+ # resp.resource.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
521
570
  # resp.resource.shared_via #=> Array
522
571
  # resp.resource.shared_via[0] #=> String
523
572
  # resp.resource.status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
@@ -571,6 +620,13 @@ module Aws::AccessAnalyzer
571
620
 
572
621
  # Retrieves information about an archive rule.
573
622
  #
623
+ # To learn about filter keys that you can use to create an archive rule,
624
+ # see [Access Analyzer filter keys][1] in the **IAM User Guide**.
625
+ #
626
+ #
627
+ #
628
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html
629
+ #
574
630
  # @option params [required, String] :analyzer_name
575
631
  # The name of the analyzer to retrieve rules from.
576
632
  #
@@ -645,10 +701,10 @@ module Aws::AccessAnalyzer
645
701
  # resp.finding.principal["String"] #=> String
646
702
  # resp.finding.resource #=> String
647
703
  # resp.finding.resource_owner_account #=> String
648
- # resp.finding.resource_type #=> String, one of "AWS::IAM::Role", "AWS::KMS::Key", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::S3::Bucket", "AWS::SQS::Queue"
704
+ # resp.finding.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
649
705
  # resp.finding.sources #=> Array
650
706
  # resp.finding.sources[0].detail.access_point_arn #=> String
651
- # resp.finding.sources[0].type #=> String, one of "BUCKET_ACL", "POLICY", "S3_ACCESS_POINT"
707
+ # resp.finding.sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT"
652
708
  # resp.finding.status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
653
709
  # resp.finding.updated_at #=> Time
654
710
  #
@@ -689,7 +745,7 @@ module Aws::AccessAnalyzer
689
745
  # analyzer_arn: "AnalyzerArn", # required
690
746
  # max_results: 1,
691
747
  # next_token: "Token",
692
- # resource_type: "AWS::IAM::Role", # accepts AWS::IAM::Role, AWS::KMS::Key, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::S3::Bucket, AWS::SQS::Queue
748
+ # resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key
693
749
  # })
694
750
  #
695
751
  # @example Response structure
@@ -697,7 +753,7 @@ module Aws::AccessAnalyzer
697
753
  # resp.analyzed_resources #=> Array
698
754
  # resp.analyzed_resources[0].resource_arn #=> String
699
755
  # resp.analyzed_resources[0].resource_owner_account #=> String
700
- # resp.analyzed_resources[0].resource_type #=> String, one of "AWS::IAM::Role", "AWS::KMS::Key", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::S3::Bucket", "AWS::SQS::Queue"
756
+ # resp.analyzed_resources[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
701
757
  # resp.next_token #=> String
702
758
  #
703
759
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ListAnalyzedResources AWS API Documentation
@@ -812,6 +868,13 @@ module Aws::AccessAnalyzer
812
868
 
813
869
  # Retrieves a list of findings generated by the specified analyzer.
814
870
  #
871
+ # To learn about filter keys that you can use to create an archive rule,
872
+ # see [Access Analyzer filter keys][1] in the **IAM User Guide**.
873
+ #
874
+ #
875
+ #
876
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html
877
+ #
815
878
  # @option params [required, String] :analyzer_arn
816
879
  # The ARN of the analyzer to retrieve findings from.
817
880
  #
@@ -870,10 +933,10 @@ module Aws::AccessAnalyzer
870
933
  # resp.findings[0].principal["String"] #=> String
871
934
  # resp.findings[0].resource #=> String
872
935
  # resp.findings[0].resource_owner_account #=> String
873
- # resp.findings[0].resource_type #=> String, one of "AWS::IAM::Role", "AWS::KMS::Key", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::S3::Bucket", "AWS::SQS::Queue"
936
+ # resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
874
937
  # resp.findings[0].sources #=> Array
875
938
  # resp.findings[0].sources[0].detail.access_point_arn #=> String
876
- # resp.findings[0].sources[0].type #=> String, one of "BUCKET_ACL", "POLICY", "S3_ACCESS_POINT"
939
+ # resp.findings[0].sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT"
877
940
  # resp.findings[0].status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
878
941
  # resp.findings[0].updated_at #=> Time
879
942
  # resp.next_token #=> String
@@ -1099,7 +1162,7 @@ module Aws::AccessAnalyzer
1099
1162
  params: params,
1100
1163
  config: config)
1101
1164
  context[:gem_name] = 'aws-sdk-accessanalyzer'
1102
- context[:gem_version] = '1.9.0'
1165
+ context[:gem_version] = '1.14.0'
1103
1166
  Seahorse::Client::Request.new(handlers, context)
1104
1167
  end
1105
1168
 
@@ -22,6 +22,7 @@ module Aws::AccessAnalyzer
22
22
  AnalyzerStatus = Shapes::StringShape.new(name: 'AnalyzerStatus')
23
23
  AnalyzerSummary = Shapes::StructureShape.new(name: 'AnalyzerSummary')
24
24
  AnalyzersList = Shapes::ListShape.new(name: 'AnalyzersList')
25
+ ApplyArchiveRuleRequest = Shapes::StructureShape.new(name: 'ApplyArchiveRuleRequest')
25
26
  ArchiveRuleSummary = Shapes::StructureShape.new(name: 'ArchiveRuleSummary')
26
27
  ArchiveRulesList = Shapes::ListShape.new(name: 'ArchiveRulesList')
27
28
  Boolean = Shapes::BooleanShape.new(name: 'Boolean')
@@ -136,6 +137,11 @@ module Aws::AccessAnalyzer
136
137
 
137
138
  AnalyzersList.member = Shapes::ShapeRef.new(shape: AnalyzerSummary)
138
139
 
140
+ ApplyArchiveRuleRequest.add_member(:analyzer_arn, Shapes::ShapeRef.new(shape: AnalyzerArn, required: true, location_name: "analyzerArn"))
141
+ ApplyArchiveRuleRequest.add_member(:client_token, Shapes::ShapeRef.new(shape: String, location_name: "clientToken", metadata: {"idempotencyToken"=>true}))
142
+ ApplyArchiveRuleRequest.add_member(:rule_name, Shapes::ShapeRef.new(shape: Name, required: true, location_name: "ruleName"))
143
+ ApplyArchiveRuleRequest.struct_class = Types::ApplyArchiveRuleRequest
144
+
139
145
  ArchiveRuleSummary.add_member(:created_at, Shapes::ShapeRef.new(shape: Timestamp, required: true, location_name: "createdAt"))
140
146
  ArchiveRuleSummary.add_member(:filter, Shapes::ShapeRef.new(shape: FilterCriteriaMap, required: true, location_name: "filter"))
141
147
  ArchiveRuleSummary.add_member(:rule_name, Shapes::ShapeRef.new(shape: Name, required: true, location_name: "ruleName"))
@@ -404,6 +410,19 @@ module Aws::AccessAnalyzer
404
410
  "uid" => "accessanalyzer-2019-11-01",
405
411
  }
406
412
 
413
+ api.add_operation(:apply_archive_rule, Seahorse::Model::Operation.new.tap do |o|
414
+ o.name = "ApplyArchiveRule"
415
+ o.http_method = "PUT"
416
+ o.http_request_uri = "/archive-rule"
417
+ o.input = Shapes::ShapeRef.new(shape: ApplyArchiveRuleRequest)
418
+ o.output = Shapes::ShapeRef.new(shape: Shapes::StructureShape.new(struct_class: Aws::EmptyStructure))
419
+ o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
420
+ o.errors << Shapes::ShapeRef.new(shape: ValidationException)
421
+ o.errors << Shapes::ShapeRef.new(shape: InternalServerException)
422
+ o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
423
+ o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
424
+ end)
425
+
407
426
  api.add_operation(:create_analyzer, Seahorse::Model::Operation.new.tap do |o|
408
427
  o.name = "CreateAnalyzer"
409
428
  o.http_method = "PUT"
@@ -99,6 +99,10 @@ module Aws::AccessAnalyzer
99
99
  def retry_after_seconds
100
100
  @data[:retry_after_seconds]
101
101
  end
102
+
103
+ def retryable?
104
+ true
105
+ end
102
106
  end
103
107
 
104
108
  class ResourceNotFoundException < ServiceError
@@ -169,6 +173,14 @@ module Aws::AccessAnalyzer
169
173
  def retry_after_seconds
170
174
  @data[:retry_after_seconds]
171
175
  end
176
+
177
+ def retryable?
178
+ true
179
+ end
180
+
181
+ def throttling?
182
+ true
183
+ end
172
184
  end
173
185
 
174
186
  class ValidationException < ServiceError
@@ -181,6 +181,42 @@ module Aws::AccessAnalyzer
181
181
  include Aws::Structure
182
182
  end
183
183
 
184
+ # Retroactively applies an archive rule.
185
+ #
186
+ # @note When making an API call, you may pass ApplyArchiveRuleRequest
187
+ # data as a hash:
188
+ #
189
+ # {
190
+ # analyzer_arn: "AnalyzerArn", # required
191
+ # client_token: "String",
192
+ # rule_name: "Name", # required
193
+ # }
194
+ #
195
+ # @!attribute [rw] analyzer_arn
196
+ # The Amazon resource name (ARN) of the analyzer.
197
+ # @return [String]
198
+ #
199
+ # @!attribute [rw] client_token
200
+ # A client token.
201
+ #
202
+ # **A suitable default value is auto-generated.** You should normally
203
+ # not need to pass this option.
204
+ # @return [String]
205
+ #
206
+ # @!attribute [rw] rule_name
207
+ # The name of the rule to apply.
208
+ # @return [String]
209
+ #
210
+ # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ApplyArchiveRuleRequest AWS API Documentation
211
+ #
212
+ class ApplyArchiveRuleRequest < Struct.new(
213
+ :analyzer_arn,
214
+ :client_token,
215
+ :rule_name)
216
+ SENSITIVE = []
217
+ include Aws::Structure
218
+ end
219
+
184
220
  # Contains information about an archive rule.
185
221
  #
186
222
  # @!attribute [rw] created_at
@@ -901,7 +937,7 @@ module Aws::AccessAnalyzer
901
937
  # analyzer_arn: "AnalyzerArn", # required
902
938
  # max_results: 1,
903
939
  # next_token: "Token",
904
- # resource_type: "AWS::IAM::Role", # accepts AWS::IAM::Role, AWS::KMS::Key, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::S3::Bucket, AWS::SQS::Queue
940
+ # resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key
905
941
  # }
906
942
  #
907
943
  # @!attribute [rw] analyzer_arn
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-accessanalyzer
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.9.0
4
+ version: 1.14.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2020-06-23 00:00:00.000000000 Z
11
+ date: 2020-10-22 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core
@@ -19,7 +19,7 @@ dependencies:
19
19
  version: '3'
20
20
  - - ">="
21
21
  - !ruby/object:Gem::Version
22
- version: 3.99.0
22
+ version: 3.109.0
23
23
  type: :runtime
24
24
  prerelease: false
25
25
  version_requirements: !ruby/object:Gem::Requirement
@@ -29,7 +29,7 @@ dependencies:
29
29
  version: '3'
30
30
  - - ">="
31
31
  - !ruby/object:Gem::Version
32
- version: 3.99.0
32
+ version: 3.109.0
33
33
  - !ruby/object:Gem::Dependency
34
34
  name: aws-sigv4
35
35
  requirement: !ruby/object:Gem::Requirement