aws-sdk-accessanalyzer 1.9.0 → 1.14.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: ebfc420d1c3cc22175a04e310116ef2a07173b6bc3fdb6dea76662eb02cee7be
4
- data.tar.gz: a5332e572b5a6ba702d19aa45d97e990f3e327b1f891e59ad6b2f3ca1ddff501
3
+ metadata.gz: 2a49bd2e7a89e7252fa8a669b007c8d8a58bf414ed383ef4d933c8d251986f26
4
+ data.tar.gz: 302ea5f085d32c9430646ac325169c56b536d4e91d622555713f17c031e7753d
5
5
  SHA512:
6
- metadata.gz: c68ad5d948daac6712338506ba6bdc635a53676cf05e498f3051a15ae3cfa51a933c092329309dff8ab4a67c8fecbcfc275bf7255458686a1290d1bb6855799a
7
- data.tar.gz: 3b05413bafebc76e30fc6ce81aad2b2c3e869602e52163141f9747f8102d27890d1da1eb87ff61eacb0acaf3d3e3cde012f4f6a1146a2d4e9b2ba51833e449e9
6
+ metadata.gz: 664ca5f095dc07271b4789ed432c819ddad443deeb2c4f3e6e710eb947e6c271766bdc6f2afa8b345dfc2af67c19211da56147d7a768de06d1afb209a57aa25d
7
+ data.tar.gz: 450b8509df467fe0efaf855a42c7d9c453a314c34323dd97e98d0da2f0aae48c669651fe4ed45b841a347c8167fe6ecfeade4971764805471c4adff4b22316f9
@@ -7,6 +7,7 @@
7
7
  #
8
8
  # WARNING ABOUT GENERATED CODE
9
9
 
10
+
10
11
  require 'aws-sdk-core'
11
12
  require 'aws-sigv4'
12
13
 
@@ -27,7 +28,7 @@ require_relative 'aws-sdk-accessanalyzer/customizations'
27
28
  # structure.
28
29
  #
29
30
  # access_analyzer = Aws::AccessAnalyzer::Client.new
30
- # resp = access_analyzer.create_analyzer(params)
31
+ # resp = access_analyzer.apply_archive_rule(params)
31
32
  #
32
33
  # See {Client} for more information.
33
34
  #
@@ -44,9 +45,9 @@ require_relative 'aws-sdk-accessanalyzer/customizations'
44
45
  #
45
46
  # See {Errors} for more information.
46
47
  #
47
- # @service
48
+ # @!group service
48
49
  module Aws::AccessAnalyzer
49
50
 
50
- GEM_VERSION = '1.9.0'
51
+ GEM_VERSION = '1.14.0'
51
52
 
52
53
  end
@@ -85,13 +85,28 @@ module Aws::AccessAnalyzer
85
85
  # * `Aws::Credentials` - Used for configuring static, non-refreshing
86
86
  # credentials.
87
87
  #
88
+ # * `Aws::SharedCredentials` - Used for loading static credentials from a
89
+ # shared file, such as `~/.aws/config`.
90
+ #
91
+ # * `Aws::AssumeRoleCredentials` - Used when you need to assume a role.
92
+ #
93
+ # * `Aws::AssumeRoleWebIdentityCredentials` - Used when you need to
94
+ # assume a role after providing credentials via the web.
95
+ #
96
+ # * `Aws::SSOCredentials` - Used for loading credentials from AWS SSO using an
97
+ # access token generated from `aws login`.
98
+ #
99
+ # * `Aws::ProcessCredentials` - Used for loading credentials from a
100
+ # process that outputs to stdout.
101
+ #
88
102
  # * `Aws::InstanceProfileCredentials` - Used for loading credentials
89
103
  # from an EC2 IMDS on an EC2 instance.
90
104
  #
91
- # * `Aws::SharedCredentials` - Used for loading credentials from a
92
- # shared file, such as `~/.aws/config`.
105
+ # * `Aws::ECSCredentials` - Used for loading credentials from
106
+ # instances running in ECS.
93
107
  #
94
- # * `Aws::AssumeRoleCredentials` - Used when you need to assume a role.
108
+ # * `Aws::CognitoIdentityCredentials` - Used for loading credentials
109
+ # from the Cognito Identity service.
95
110
  #
96
111
  # When `:credentials` are not configured directly, the following
97
112
  # locations will be searched for credentials:
@@ -101,10 +116,10 @@ module Aws::AccessAnalyzer
101
116
  # * ENV['AWS_ACCESS_KEY_ID'], ENV['AWS_SECRET_ACCESS_KEY']
102
117
  # * `~/.aws/credentials`
103
118
  # * `~/.aws/config`
104
- # * EC2 IMDS instance profile - When used by default, the timeouts are
105
- # very aggressive. Construct and pass an instance of
106
- # `Aws::InstanceProfileCredentails` to enable retries and extended
107
- # timeouts.
119
+ # * EC2/ECS IMDS instance profile - When used by default, the timeouts
120
+ # are very aggressive. Construct and pass an instance of
121
+ # `Aws::InstanceProfileCredentails` or `Aws::ECSCredentials` to
122
+ # enable retries and extended timeouts.
108
123
  #
109
124
  # @option options [required, String] :region
110
125
  # The AWS region to connect to. The configured `:region` is
@@ -312,6 +327,40 @@ module Aws::AccessAnalyzer
312
327
 
313
328
  # @!group API Operations
314
329
 
330
+ # Retroactively applies the archive rule to existing findings that meet
331
+ # the archive rule criteria.
332
+ #
333
+ # @option params [required, String] :analyzer_arn
334
+ # The Amazon resource name (ARN) of the analyzer.
335
+ #
336
+ # @option params [String] :client_token
337
+ # A client token.
338
+ #
339
+ # **A suitable default value is auto-generated.** You should normally
340
+ # not need to pass this option.**
341
+ #
342
+ # @option params [required, String] :rule_name
343
+ # The name of the rule to apply.
344
+ #
345
+ # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
346
+ #
347
+ # @example Request syntax with placeholder values
348
+ #
349
+ # resp = client.apply_archive_rule({
350
+ # analyzer_arn: "AnalyzerArn", # required
351
+ # client_token: "String",
352
+ # rule_name: "Name", # required
353
+ # })
354
+ #
355
+ # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ApplyArchiveRule AWS API Documentation
356
+ #
357
+ # @overload apply_archive_rule(params = {})
358
+ # @param [Hash] params ({})
359
+ def apply_archive_rule(params = {}, options = {})
360
+ req = build_request(:apply_archive_rule, params)
361
+ req.send_request(options)
362
+ end
363
+
315
364
  # Creates an analyzer for your account.
316
365
  #
317
366
  # @option params [required, String] :analyzer_name
@@ -377,8 +426,8 @@ module Aws::AccessAnalyzer
377
426
  end
378
427
 
379
428
  # Creates an archive rule for the specified analyzer. Archive rules
380
- # automatically archive findings that meet the criteria you define when
381
- # you create the rule.
429
+ # automatically archive new findings that meet the criteria you define
430
+ # when you create the rule.
382
431
  #
383
432
  # @option params [required, String] :analyzer_name
384
433
  # The name of the created analyzer.
@@ -517,7 +566,7 @@ module Aws::AccessAnalyzer
517
566
  # resp.resource.is_public #=> Boolean
518
567
  # resp.resource.resource_arn #=> String
519
568
  # resp.resource.resource_owner_account #=> String
520
- # resp.resource.resource_type #=> String, one of "AWS::IAM::Role", "AWS::KMS::Key", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::S3::Bucket", "AWS::SQS::Queue"
569
+ # resp.resource.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
521
570
  # resp.resource.shared_via #=> Array
522
571
  # resp.resource.shared_via[0] #=> String
523
572
  # resp.resource.status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
@@ -571,6 +620,13 @@ module Aws::AccessAnalyzer
571
620
 
572
621
  # Retrieves information about an archive rule.
573
622
  #
623
+ # To learn about filter keys that you can use to create an archive rule,
624
+ # see [Access Analyzer filter keys][1] in the **IAM User Guide**.
625
+ #
626
+ #
627
+ #
628
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html
629
+ #
574
630
  # @option params [required, String] :analyzer_name
575
631
  # The name of the analyzer to retrieve rules from.
576
632
  #
@@ -645,10 +701,10 @@ module Aws::AccessAnalyzer
645
701
  # resp.finding.principal["String"] #=> String
646
702
  # resp.finding.resource #=> String
647
703
  # resp.finding.resource_owner_account #=> String
648
- # resp.finding.resource_type #=> String, one of "AWS::IAM::Role", "AWS::KMS::Key", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::S3::Bucket", "AWS::SQS::Queue"
704
+ # resp.finding.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
649
705
  # resp.finding.sources #=> Array
650
706
  # resp.finding.sources[0].detail.access_point_arn #=> String
651
- # resp.finding.sources[0].type #=> String, one of "BUCKET_ACL", "POLICY", "S3_ACCESS_POINT"
707
+ # resp.finding.sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT"
652
708
  # resp.finding.status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
653
709
  # resp.finding.updated_at #=> Time
654
710
  #
@@ -689,7 +745,7 @@ module Aws::AccessAnalyzer
689
745
  # analyzer_arn: "AnalyzerArn", # required
690
746
  # max_results: 1,
691
747
  # next_token: "Token",
692
- # resource_type: "AWS::IAM::Role", # accepts AWS::IAM::Role, AWS::KMS::Key, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::S3::Bucket, AWS::SQS::Queue
748
+ # resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key
693
749
  # })
694
750
  #
695
751
  # @example Response structure
@@ -697,7 +753,7 @@ module Aws::AccessAnalyzer
697
753
  # resp.analyzed_resources #=> Array
698
754
  # resp.analyzed_resources[0].resource_arn #=> String
699
755
  # resp.analyzed_resources[0].resource_owner_account #=> String
700
- # resp.analyzed_resources[0].resource_type #=> String, one of "AWS::IAM::Role", "AWS::KMS::Key", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::S3::Bucket", "AWS::SQS::Queue"
756
+ # resp.analyzed_resources[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
701
757
  # resp.next_token #=> String
702
758
  #
703
759
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ListAnalyzedResources AWS API Documentation
@@ -812,6 +868,13 @@ module Aws::AccessAnalyzer
812
868
 
813
869
  # Retrieves a list of findings generated by the specified analyzer.
814
870
  #
871
+ # To learn about filter keys that you can use to create an archive rule,
872
+ # see [Access Analyzer filter keys][1] in the **IAM User Guide**.
873
+ #
874
+ #
875
+ #
876
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html
877
+ #
815
878
  # @option params [required, String] :analyzer_arn
816
879
  # The ARN of the analyzer to retrieve findings from.
817
880
  #
@@ -870,10 +933,10 @@ module Aws::AccessAnalyzer
870
933
  # resp.findings[0].principal["String"] #=> String
871
934
  # resp.findings[0].resource #=> String
872
935
  # resp.findings[0].resource_owner_account #=> String
873
- # resp.findings[0].resource_type #=> String, one of "AWS::IAM::Role", "AWS::KMS::Key", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::S3::Bucket", "AWS::SQS::Queue"
936
+ # resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
874
937
  # resp.findings[0].sources #=> Array
875
938
  # resp.findings[0].sources[0].detail.access_point_arn #=> String
876
- # resp.findings[0].sources[0].type #=> String, one of "BUCKET_ACL", "POLICY", "S3_ACCESS_POINT"
939
+ # resp.findings[0].sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT"
877
940
  # resp.findings[0].status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
878
941
  # resp.findings[0].updated_at #=> Time
879
942
  # resp.next_token #=> String
@@ -1099,7 +1162,7 @@ module Aws::AccessAnalyzer
1099
1162
  params: params,
1100
1163
  config: config)
1101
1164
  context[:gem_name] = 'aws-sdk-accessanalyzer'
1102
- context[:gem_version] = '1.9.0'
1165
+ context[:gem_version] = '1.14.0'
1103
1166
  Seahorse::Client::Request.new(handlers, context)
1104
1167
  end
1105
1168
 
@@ -22,6 +22,7 @@ module Aws::AccessAnalyzer
22
22
  AnalyzerStatus = Shapes::StringShape.new(name: 'AnalyzerStatus')
23
23
  AnalyzerSummary = Shapes::StructureShape.new(name: 'AnalyzerSummary')
24
24
  AnalyzersList = Shapes::ListShape.new(name: 'AnalyzersList')
25
+ ApplyArchiveRuleRequest = Shapes::StructureShape.new(name: 'ApplyArchiveRuleRequest')
25
26
  ArchiveRuleSummary = Shapes::StructureShape.new(name: 'ArchiveRuleSummary')
26
27
  ArchiveRulesList = Shapes::ListShape.new(name: 'ArchiveRulesList')
27
28
  Boolean = Shapes::BooleanShape.new(name: 'Boolean')
@@ -136,6 +137,11 @@ module Aws::AccessAnalyzer
136
137
 
137
138
  AnalyzersList.member = Shapes::ShapeRef.new(shape: AnalyzerSummary)
138
139
 
140
+ ApplyArchiveRuleRequest.add_member(:analyzer_arn, Shapes::ShapeRef.new(shape: AnalyzerArn, required: true, location_name: "analyzerArn"))
141
+ ApplyArchiveRuleRequest.add_member(:client_token, Shapes::ShapeRef.new(shape: String, location_name: "clientToken", metadata: {"idempotencyToken"=>true}))
142
+ ApplyArchiveRuleRequest.add_member(:rule_name, Shapes::ShapeRef.new(shape: Name, required: true, location_name: "ruleName"))
143
+ ApplyArchiveRuleRequest.struct_class = Types::ApplyArchiveRuleRequest
144
+
139
145
  ArchiveRuleSummary.add_member(:created_at, Shapes::ShapeRef.new(shape: Timestamp, required: true, location_name: "createdAt"))
140
146
  ArchiveRuleSummary.add_member(:filter, Shapes::ShapeRef.new(shape: FilterCriteriaMap, required: true, location_name: "filter"))
141
147
  ArchiveRuleSummary.add_member(:rule_name, Shapes::ShapeRef.new(shape: Name, required: true, location_name: "ruleName"))
@@ -404,6 +410,19 @@ module Aws::AccessAnalyzer
404
410
  "uid" => "accessanalyzer-2019-11-01",
405
411
  }
406
412
 
413
+ api.add_operation(:apply_archive_rule, Seahorse::Model::Operation.new.tap do |o|
414
+ o.name = "ApplyArchiveRule"
415
+ o.http_method = "PUT"
416
+ o.http_request_uri = "/archive-rule"
417
+ o.input = Shapes::ShapeRef.new(shape: ApplyArchiveRuleRequest)
418
+ o.output = Shapes::ShapeRef.new(shape: Shapes::StructureShape.new(struct_class: Aws::EmptyStructure))
419
+ o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
420
+ o.errors << Shapes::ShapeRef.new(shape: ValidationException)
421
+ o.errors << Shapes::ShapeRef.new(shape: InternalServerException)
422
+ o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
423
+ o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
424
+ end)
425
+
407
426
  api.add_operation(:create_analyzer, Seahorse::Model::Operation.new.tap do |o|
408
427
  o.name = "CreateAnalyzer"
409
428
  o.http_method = "PUT"
@@ -99,6 +99,10 @@ module Aws::AccessAnalyzer
99
99
  def retry_after_seconds
100
100
  @data[:retry_after_seconds]
101
101
  end
102
+
103
+ def retryable?
104
+ true
105
+ end
102
106
  end
103
107
 
104
108
  class ResourceNotFoundException < ServiceError
@@ -169,6 +173,14 @@ module Aws::AccessAnalyzer
169
173
  def retry_after_seconds
170
174
  @data[:retry_after_seconds]
171
175
  end
176
+
177
+ def retryable?
178
+ true
179
+ end
180
+
181
+ def throttling?
182
+ true
183
+ end
172
184
  end
173
185
 
174
186
  class ValidationException < ServiceError
@@ -181,6 +181,42 @@ module Aws::AccessAnalyzer
181
181
  include Aws::Structure
182
182
  end
183
183
 
184
+ # Retroactively applies an archive rule.
185
+ #
186
+ # @note When making an API call, you may pass ApplyArchiveRuleRequest
187
+ # data as a hash:
188
+ #
189
+ # {
190
+ # analyzer_arn: "AnalyzerArn", # required
191
+ # client_token: "String",
192
+ # rule_name: "Name", # required
193
+ # }
194
+ #
195
+ # @!attribute [rw] analyzer_arn
196
+ # The Amazon resource name (ARN) of the analyzer.
197
+ # @return [String]
198
+ #
199
+ # @!attribute [rw] client_token
200
+ # A client token.
201
+ #
202
+ # **A suitable default value is auto-generated.** You should normally
203
+ # not need to pass this option.
204
+ # @return [String]
205
+ #
206
+ # @!attribute [rw] rule_name
207
+ # The name of the rule to apply.
208
+ # @return [String]
209
+ #
210
+ # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ApplyArchiveRuleRequest AWS API Documentation
211
+ #
212
+ class ApplyArchiveRuleRequest < Struct.new(
213
+ :analyzer_arn,
214
+ :client_token,
215
+ :rule_name)
216
+ SENSITIVE = []
217
+ include Aws::Structure
218
+ end
219
+
184
220
  # Contains information about an archive rule.
185
221
  #
186
222
  # @!attribute [rw] created_at
@@ -901,7 +937,7 @@ module Aws::AccessAnalyzer
901
937
  # analyzer_arn: "AnalyzerArn", # required
902
938
  # max_results: 1,
903
939
  # next_token: "Token",
904
- # resource_type: "AWS::IAM::Role", # accepts AWS::IAM::Role, AWS::KMS::Key, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::S3::Bucket, AWS::SQS::Queue
940
+ # resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key
905
941
  # }
906
942
  #
907
943
  # @!attribute [rw] analyzer_arn
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-accessanalyzer
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.9.0
4
+ version: 1.14.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2020-06-23 00:00:00.000000000 Z
11
+ date: 2020-10-22 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core
@@ -19,7 +19,7 @@ dependencies:
19
19
  version: '3'
20
20
  - - ">="
21
21
  - !ruby/object:Gem::Version
22
- version: 3.99.0
22
+ version: 3.109.0
23
23
  type: :runtime
24
24
  prerelease: false
25
25
  version_requirements: !ruby/object:Gem::Requirement
@@ -29,7 +29,7 @@ dependencies:
29
29
  version: '3'
30
30
  - - ">="
31
31
  - !ruby/object:Gem::Version
32
- version: 3.99.0
32
+ version: 3.109.0
33
33
  - !ruby/object:Gem::Dependency
34
34
  name: aws-sigv4
35
35
  requirement: !ruby/object:Gem::Requirement