aws-sdk-accessanalyzer 1.90.0 → 1.91.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: f4dd901e636b8821c52d8556e734f5669548e39810586dc4680051dd657d7891
4
- data.tar.gz: a4d1770d7b2f2b61c88fabb13c9ee68f3da4022867e98113419e7cdd2bde64d3
3
+ metadata.gz: '08c9ab5eba4dbabd532a1863394a2b39e084d8c91373fd21b0381331a7565f52'
4
+ data.tar.gz: df5ad456949334f8b3df7183656ce19247047fec416c6ad93bccf3ec8d150334
5
5
  SHA512:
6
- metadata.gz: 454955e5ef827979e0419c495152505ee8cc58f0a3d4ccc227fe7a1170fc1bf69a41ae8ea8d006d25ee7ed2bc475563d93244bcf2c2a10a3b31a551f64162305
7
- data.tar.gz: e9ad619bdd1bdca97beee2fbd95ebe7bfc6fb7deb4ba20e44f8cba3f82030bac947f60d89b099f077c47154348cb21e1611f025f4e2f3d3d7d5fd8126872e6ab
6
+ metadata.gz: 64da33ce268e90e5b069484802ac871c91cb9103cd1c99b2e75ef5d78dbe6f03e73354d98a596c8c2f69bcab0c4e56a1d9039407f649a12ea75829db116d00e6
7
+ data.tar.gz: 287ef099a6fbf05054ee827ac0c016965d6cf682ba1b63c9e79fafde9d11f7ffb5588283624eea00abccbd4793354390107053ae33668359b55b28bfbc39452f
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.91.0 (2026-05-19)
5
+ ------------------
6
+
7
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
8
+
4
9
  1.90.0 (2026-05-18)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.90.0
1
+ 1.91.0
@@ -3068,7 +3068,7 @@ module Aws::AccessAnalyzer
3068
3068
  tracer: tracer
3069
3069
  )
3070
3070
  context[:gem_name] = 'aws-sdk-accessanalyzer'
3071
- context[:gem_version] = '1.90.0'
3071
+ context[:gem_version] = '1.91.0'
3072
3072
  Seahorse::Client::Request.new(handlers, context)
3073
3073
  end
3074
3074
 
@@ -54,7 +54,7 @@ module Aws::AccessAnalyzer
54
54
  autoload :EndpointProvider, 'aws-sdk-accessanalyzer/endpoint_provider'
55
55
  autoload :Endpoints, 'aws-sdk-accessanalyzer/endpoints'
56
56
 
57
- GEM_VERSION = '1.90.0'
57
+ GEM_VERSION = '1.91.0'
58
58
 
59
59
  end
60
60
 
data/sig/client.rbs CHANGED
@@ -108,7 +108,7 @@ module Aws
108
108
  {
109
109
  actions: Array[::String]?,
110
110
  resources: Array[::String]?
111
- },
111
+ }
112
112
  ],
113
113
  policy_type: ("IDENTITY_POLICY" | "RESOURCE_POLICY")
114
114
  ) -> _CheckAccessNotGrantedResponseSuccess
@@ -175,7 +175,7 @@ module Aws
175
175
  encryption_context_subset: Hash[::String, ::String]?
176
176
  }?,
177
177
  issuing_account: ::String
178
- },
178
+ }
179
179
  ]?
180
180
  }?,
181
181
  rds_db_cluster_snapshot: {
@@ -203,7 +203,7 @@ module Aws
203
203
  id: ::String?,
204
204
  uri: ::String?
205
205
  }
206
- },
206
+ }
207
207
  ]?,
208
208
  bucket_public_access_block: {
209
209
  ignore_public_acls: bool,
@@ -263,44 +263,11 @@ module Aws
263
263
  analyzer_name: ::String,
264
264
  type: ("ACCOUNT" | "ORGANIZATION" | "ACCOUNT_UNUSED_ACCESS" | "ORGANIZATION_UNUSED_ACCESS" | "ACCOUNT_INTERNAL_ACCESS" | "ORGANIZATION_INTERNAL_ACCESS"),
265
265
  ?archive_rules: Array[
266
- {
267
- rule_name: ::String,
268
- filter: Hash[::String, {
269
- eq: Array[::String]?,
270
- neq: Array[::String]?,
271
- contains: Array[::String]?,
272
- exists: bool?
273
- }]
274
- },
266
+ Params::inline_archive_rule
275
267
  ],
276
268
  ?tags: Hash[::String, ::String],
277
269
  ?client_token: ::String,
278
- ?configuration: {
279
- unused_access: {
280
- unused_access_age: ::Integer?,
281
- analysis_rule: {
282
- exclusions: Array[
283
- {
284
- account_ids: Array[::String]?,
285
- resource_tags: Array[
286
- Hash[::String, ::String],
287
- ]?
288
- },
289
- ]?
290
- }?
291
- }?,
292
- internal_access: {
293
- analysis_rule: {
294
- inclusions: Array[
295
- {
296
- account_ids: Array[::String]?,
297
- resource_types: Array[("AWS::S3::Bucket" | "AWS::IAM::Role" | "AWS::SQS::Queue" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::KMS::Key" | "AWS::SecretsManager::Secret" | "AWS::EFS::FileSystem" | "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::RDS::DBSnapshot" | "AWS::RDS::DBClusterSnapshot" | "AWS::SNS::Topic" | "AWS::S3Express::DirectoryBucket" | "AWS::DynamoDB::Table" | "AWS::DynamoDB::Stream" | "AWS::IAM::User")]?,
298
- resource_arns: Array[::String]?
299
- },
300
- ]?
301
- }?
302
- }?
303
- }
270
+ ?configuration: Params::analyzer_configuration
304
271
  ) -> _CreateAnalyzerResponseSuccess
305
272
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _CreateAnalyzerResponseSuccess
306
273
 
@@ -326,43 +293,10 @@ module Aws
326
293
  def create_service_linked_analyzer: (
327
294
  type: ("ACCOUNT" | "ORGANIZATION" | "ACCOUNT_UNUSED_ACCESS" | "ORGANIZATION_UNUSED_ACCESS" | "ACCOUNT_INTERNAL_ACCESS" | "ORGANIZATION_INTERNAL_ACCESS"),
328
295
  ?archive_rules: Array[
329
- {
330
- rule_name: ::String,
331
- filter: Hash[::String, {
332
- eq: Array[::String]?,
333
- neq: Array[::String]?,
334
- contains: Array[::String]?,
335
- exists: bool?
336
- }]
337
- },
296
+ Params::inline_archive_rule
338
297
  ],
339
298
  ?client_token: ::String,
340
- ?configuration: {
341
- unused_access: {
342
- unused_access_age: ::Integer?,
343
- analysis_rule: {
344
- exclusions: Array[
345
- {
346
- account_ids: Array[::String]?,
347
- resource_tags: Array[
348
- Hash[::String, ::String],
349
- ]?
350
- },
351
- ]?
352
- }?
353
- }?,
354
- internal_access: {
355
- analysis_rule: {
356
- inclusions: Array[
357
- {
358
- account_ids: Array[::String]?,
359
- resource_types: Array[("AWS::S3::Bucket" | "AWS::IAM::Role" | "AWS::SQS::Queue" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::KMS::Key" | "AWS::SecretsManager::Secret" | "AWS::EFS::FileSystem" | "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::RDS::DBSnapshot" | "AWS::RDS::DBClusterSnapshot" | "AWS::SNS::Topic" | "AWS::S3Express::DirectoryBucket" | "AWS::DynamoDB::Table" | "AWS::DynamoDB::Stream" | "AWS::IAM::User")]?,
360
- resource_arns: Array[::String]?
361
- },
362
- ]?
363
- }?
364
- }?
365
- }
299
+ ?configuration: Params::analyzer_configuration
366
300
  ) -> _CreateServiceLinkedAnalyzerResponseSuccess
367
301
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _CreateServiceLinkedAnalyzerResponseSuccess
368
302
 
@@ -672,7 +606,7 @@ module Aws
672
606
  cloud_trail_arn: ::String,
673
607
  regions: Array[::String]?,
674
608
  all_regions: bool?
675
- },
609
+ }
676
610
  ],
677
611
  access_role: ::String,
678
612
  start_time: ::Time,
@@ -717,32 +651,7 @@ module Aws
717
651
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/AccessAnalyzer/Client.html#update_analyzer-instance_method
718
652
  def update_analyzer: (
719
653
  analyzer_name: ::String,
720
- ?configuration: {
721
- unused_access: {
722
- unused_access_age: ::Integer?,
723
- analysis_rule: {
724
- exclusions: Array[
725
- {
726
- account_ids: Array[::String]?,
727
- resource_tags: Array[
728
- Hash[::String, ::String],
729
- ]?
730
- },
731
- ]?
732
- }?
733
- }?,
734
- internal_access: {
735
- analysis_rule: {
736
- inclusions: Array[
737
- {
738
- account_ids: Array[::String]?,
739
- resource_types: Array[("AWS::S3::Bucket" | "AWS::IAM::Role" | "AWS::SQS::Queue" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::KMS::Key" | "AWS::SecretsManager::Secret" | "AWS::EFS::FileSystem" | "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::RDS::DBSnapshot" | "AWS::RDS::DBClusterSnapshot" | "AWS::SNS::Topic" | "AWS::S3Express::DirectoryBucket" | "AWS::DynamoDB::Table" | "AWS::DynamoDB::Stream" | "AWS::IAM::User")]?,
740
- resource_arns: Array[::String]?
741
- },
742
- ]?
743
- }?
744
- }?
745
- }
654
+ ?configuration: Params::analyzer_configuration
746
655
  ) -> _UpdateAnalyzerResponseSuccess
747
656
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _UpdateAnalyzerResponseSuccess
748
657
 
data/sig/params.rbs ADDED
@@ -0,0 +1,54 @@
1
+ # WARNING ABOUT GENERATED CODE
2
+ #
3
+ # This file is generated. See the contributing guide for more information:
4
+ # https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
5
+ #
6
+ # WARNING ABOUT GENERATED CODE
7
+
8
+ module Aws
9
+ module AccessAnalyzer
10
+ module Params
11
+ type inline_archive_rule = {
12
+ rule_name: ::String,
13
+ filter: Hash[::String, {
14
+ eq: Array[::String]?,
15
+ neq: Array[::String]?,
16
+ contains: Array[::String]?,
17
+ exists: bool?
18
+ }]
19
+ }
20
+
21
+ type unused_access_configuration = {
22
+ unused_access_age: ::Integer?,
23
+ analysis_rule: {
24
+ exclusions: Array[
25
+ {
26
+ account_ids: Array[::String]?,
27
+ resource_tags: Array[
28
+ Hash[::String, ::String]
29
+ ]?
30
+ }
31
+ ]?
32
+ }?
33
+ }
34
+
35
+ type internal_access_configuration = {
36
+ analysis_rule: {
37
+ inclusions: Array[
38
+ {
39
+ account_ids: Array[::String]?,
40
+ resource_types: Array[("AWS::S3::Bucket" | "AWS::IAM::Role" | "AWS::SQS::Queue" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::KMS::Key" | "AWS::SecretsManager::Secret" | "AWS::EFS::FileSystem" | "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::RDS::DBSnapshot" | "AWS::RDS::DBClusterSnapshot" | "AWS::SNS::Topic" | "AWS::S3Express::DirectoryBucket" | "AWS::DynamoDB::Table" | "AWS::DynamoDB::Stream" | "AWS::IAM::User")]?,
41
+ resource_arns: Array[::String]?
42
+ }
43
+ ]?
44
+ }?
45
+ }
46
+
47
+ type analyzer_configuration = {
48
+ unused_access: Params::unused_access_configuration?,
49
+ internal_access: Params::internal_access_configuration?
50
+ }
51
+
52
+ end
53
+ end
54
+ end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-accessanalyzer
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.90.0
4
+ version: 1.91.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
@@ -67,6 +67,7 @@ files:
67
67
  - lib/aws-sdk-accessanalyzer/types.rb
68
68
  - sig/client.rbs
69
69
  - sig/errors.rbs
70
+ - sig/params.rbs
70
71
  - sig/resource.rbs
71
72
  - sig/types.rbs
72
73
  - sig/waiters.rbs