aws-sdk-accessanalyzer 1.12.0 → 1.13.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 463045b20db3fe9d082ab525f25d6189dc64d313e1b9aa5c546e4ec4c9947792
4
- data.tar.gz: 34c85e9ab8252c667acfdd11f079a66a2861f39f17d6ca99625f70d54b6b674d
3
+ metadata.gz: 541528f9a889e86e8d0ea0c49a4ef0462b637a54b7b7fb856427c8318cbce67a
4
+ data.tar.gz: 666fecc496b544553833a215a96ac83459495e2b566781de03147f471caa9ef1
5
5
  SHA512:
6
- metadata.gz: 73ed30966dfb9173b8be529f7ec2b3884379d66832d67608784c98bdb7e050e27fa53a84a46caa6a77b05a4a2b2d32c9907bd2d6c342c6027e91c4d9377f0629
7
- data.tar.gz: b5957b17a4bd9cc92ef5b50b591af87e629e6c6c70bf3bb1de9b18faf2487df738febdd80d782e1937231a141cf98db188ff292f2a4fea86e52ce25c39b864c9
6
+ metadata.gz: bf341d946090502136177c06ffa3ef775fa2aed1738fde503446050b7a89062b6a24e858dc37fc48211541783fadc487f386aa0a4c2d8f536a6d08e671da1218
7
+ data.tar.gz: 3d0940c6f07a0af073853f9a6ff58bb28eb9754d9635d83c3644c8a1e1356892a9c90543a2e3a53ecaa2b7a8b27a20690228e43f522bd3453ed66d4ef97f6984
@@ -28,7 +28,7 @@ require_relative 'aws-sdk-accessanalyzer/customizations'
28
28
  # structure.
29
29
  #
30
30
  # access_analyzer = Aws::AccessAnalyzer::Client.new
31
- # resp = access_analyzer.create_analyzer(params)
31
+ # resp = access_analyzer.apply_archive_rule(params)
32
32
  #
33
33
  # See {Client} for more information.
34
34
  #
@@ -48,6 +48,6 @@ require_relative 'aws-sdk-accessanalyzer/customizations'
48
48
  # @!group service
49
49
  module Aws::AccessAnalyzer
50
50
 
51
- GEM_VERSION = '1.12.0'
51
+ GEM_VERSION = '1.13.0'
52
52
 
53
53
  end
@@ -327,6 +327,40 @@ module Aws::AccessAnalyzer
327
327
 
328
328
  # @!group API Operations
329
329
 
330
+ # Retroactively applies the archive rule to existing findings that meet
331
+ # the archive rule criteria.
332
+ #
333
+ # @option params [required, String] :analyzer_arn
334
+ # The Amazon resource name (ARN) of the analyzer.
335
+ #
336
+ # @option params [String] :client_token
337
+ # A client token.
338
+ #
339
+ # **A suitable default value is auto-generated.** You should normally
340
+ # not need to pass this option.**
341
+ #
342
+ # @option params [required, String] :rule_name
343
+ # The name of the rule to apply.
344
+ #
345
+ # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
346
+ #
347
+ # @example Request syntax with placeholder values
348
+ #
349
+ # resp = client.apply_archive_rule({
350
+ # analyzer_arn: "AnalyzerArn", # required
351
+ # client_token: "String",
352
+ # rule_name: "Name", # required
353
+ # })
354
+ #
355
+ # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ApplyArchiveRule AWS API Documentation
356
+ #
357
+ # @overload apply_archive_rule(params = {})
358
+ # @param [Hash] params ({})
359
+ def apply_archive_rule(params = {}, options = {})
360
+ req = build_request(:apply_archive_rule, params)
361
+ req.send_request(options)
362
+ end
363
+
330
364
  # Creates an analyzer for your account.
331
365
  #
332
366
  # @option params [required, String] :analyzer_name
@@ -392,8 +426,8 @@ module Aws::AccessAnalyzer
392
426
  end
393
427
 
394
428
  # Creates an archive rule for the specified analyzer. Archive rules
395
- # automatically archive findings that meet the criteria you define when
396
- # you create the rule.
429
+ # automatically archive new findings that meet the criteria you define
430
+ # when you create the rule.
397
431
  #
398
432
  # @option params [required, String] :analyzer_name
399
433
  # The name of the created analyzer.
@@ -532,7 +566,7 @@ module Aws::AccessAnalyzer
532
566
  # resp.resource.is_public #=> Boolean
533
567
  # resp.resource.resource_arn #=> String
534
568
  # resp.resource.resource_owner_account #=> String
535
- # resp.resource.resource_type #=> String, one of "AWS::IAM::Role", "AWS::KMS::Key", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::S3::Bucket", "AWS::SQS::Queue"
569
+ # resp.resource.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
536
570
  # resp.resource.shared_via #=> Array
537
571
  # resp.resource.shared_via[0] #=> String
538
572
  # resp.resource.status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
@@ -660,10 +694,10 @@ module Aws::AccessAnalyzer
660
694
  # resp.finding.principal["String"] #=> String
661
695
  # resp.finding.resource #=> String
662
696
  # resp.finding.resource_owner_account #=> String
663
- # resp.finding.resource_type #=> String, one of "AWS::IAM::Role", "AWS::KMS::Key", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::S3::Bucket", "AWS::SQS::Queue"
697
+ # resp.finding.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
664
698
  # resp.finding.sources #=> Array
665
699
  # resp.finding.sources[0].detail.access_point_arn #=> String
666
- # resp.finding.sources[0].type #=> String, one of "BUCKET_ACL", "POLICY", "S3_ACCESS_POINT"
700
+ # resp.finding.sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT"
667
701
  # resp.finding.status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
668
702
  # resp.finding.updated_at #=> Time
669
703
  #
@@ -704,7 +738,7 @@ module Aws::AccessAnalyzer
704
738
  # analyzer_arn: "AnalyzerArn", # required
705
739
  # max_results: 1,
706
740
  # next_token: "Token",
707
- # resource_type: "AWS::IAM::Role", # accepts AWS::IAM::Role, AWS::KMS::Key, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::S3::Bucket, AWS::SQS::Queue
741
+ # resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key
708
742
  # })
709
743
  #
710
744
  # @example Response structure
@@ -712,7 +746,7 @@ module Aws::AccessAnalyzer
712
746
  # resp.analyzed_resources #=> Array
713
747
  # resp.analyzed_resources[0].resource_arn #=> String
714
748
  # resp.analyzed_resources[0].resource_owner_account #=> String
715
- # resp.analyzed_resources[0].resource_type #=> String, one of "AWS::IAM::Role", "AWS::KMS::Key", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::S3::Bucket", "AWS::SQS::Queue"
749
+ # resp.analyzed_resources[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
716
750
  # resp.next_token #=> String
717
751
  #
718
752
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ListAnalyzedResources AWS API Documentation
@@ -885,10 +919,10 @@ module Aws::AccessAnalyzer
885
919
  # resp.findings[0].principal["String"] #=> String
886
920
  # resp.findings[0].resource #=> String
887
921
  # resp.findings[0].resource_owner_account #=> String
888
- # resp.findings[0].resource_type #=> String, one of "AWS::IAM::Role", "AWS::KMS::Key", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::S3::Bucket", "AWS::SQS::Queue"
922
+ # resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key"
889
923
  # resp.findings[0].sources #=> Array
890
924
  # resp.findings[0].sources[0].detail.access_point_arn #=> String
891
- # resp.findings[0].sources[0].type #=> String, one of "BUCKET_ACL", "POLICY", "S3_ACCESS_POINT"
925
+ # resp.findings[0].sources[0].type #=> String, one of "POLICY", "BUCKET_ACL", "S3_ACCESS_POINT"
892
926
  # resp.findings[0].status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
893
927
  # resp.findings[0].updated_at #=> Time
894
928
  # resp.next_token #=> String
@@ -1114,7 +1148,7 @@ module Aws::AccessAnalyzer
1114
1148
  params: params,
1115
1149
  config: config)
1116
1150
  context[:gem_name] = 'aws-sdk-accessanalyzer'
1117
- context[:gem_version] = '1.12.0'
1151
+ context[:gem_version] = '1.13.0'
1118
1152
  Seahorse::Client::Request.new(handlers, context)
1119
1153
  end
1120
1154
 
@@ -22,6 +22,7 @@ module Aws::AccessAnalyzer
22
22
  AnalyzerStatus = Shapes::StringShape.new(name: 'AnalyzerStatus')
23
23
  AnalyzerSummary = Shapes::StructureShape.new(name: 'AnalyzerSummary')
24
24
  AnalyzersList = Shapes::ListShape.new(name: 'AnalyzersList')
25
+ ApplyArchiveRuleRequest = Shapes::StructureShape.new(name: 'ApplyArchiveRuleRequest')
25
26
  ArchiveRuleSummary = Shapes::StructureShape.new(name: 'ArchiveRuleSummary')
26
27
  ArchiveRulesList = Shapes::ListShape.new(name: 'ArchiveRulesList')
27
28
  Boolean = Shapes::BooleanShape.new(name: 'Boolean')
@@ -136,6 +137,11 @@ module Aws::AccessAnalyzer
136
137
 
137
138
  AnalyzersList.member = Shapes::ShapeRef.new(shape: AnalyzerSummary)
138
139
 
140
+ ApplyArchiveRuleRequest.add_member(:analyzer_arn, Shapes::ShapeRef.new(shape: AnalyzerArn, required: true, location_name: "analyzerArn"))
141
+ ApplyArchiveRuleRequest.add_member(:client_token, Shapes::ShapeRef.new(shape: String, location_name: "clientToken", metadata: {"idempotencyToken"=>true}))
142
+ ApplyArchiveRuleRequest.add_member(:rule_name, Shapes::ShapeRef.new(shape: Name, required: true, location_name: "ruleName"))
143
+ ApplyArchiveRuleRequest.struct_class = Types::ApplyArchiveRuleRequest
144
+
139
145
  ArchiveRuleSummary.add_member(:created_at, Shapes::ShapeRef.new(shape: Timestamp, required: true, location_name: "createdAt"))
140
146
  ArchiveRuleSummary.add_member(:filter, Shapes::ShapeRef.new(shape: FilterCriteriaMap, required: true, location_name: "filter"))
141
147
  ArchiveRuleSummary.add_member(:rule_name, Shapes::ShapeRef.new(shape: Name, required: true, location_name: "ruleName"))
@@ -404,6 +410,19 @@ module Aws::AccessAnalyzer
404
410
  "uid" => "accessanalyzer-2019-11-01",
405
411
  }
406
412
 
413
+ api.add_operation(:apply_archive_rule, Seahorse::Model::Operation.new.tap do |o|
414
+ o.name = "ApplyArchiveRule"
415
+ o.http_method = "PUT"
416
+ o.http_request_uri = "/archive-rule"
417
+ o.input = Shapes::ShapeRef.new(shape: ApplyArchiveRuleRequest)
418
+ o.output = Shapes::ShapeRef.new(shape: Shapes::StructureShape.new(struct_class: Aws::EmptyStructure))
419
+ o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
420
+ o.errors << Shapes::ShapeRef.new(shape: ValidationException)
421
+ o.errors << Shapes::ShapeRef.new(shape: InternalServerException)
422
+ o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
423
+ o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
424
+ end)
425
+
407
426
  api.add_operation(:create_analyzer, Seahorse::Model::Operation.new.tap do |o|
408
427
  o.name = "CreateAnalyzer"
409
428
  o.http_method = "PUT"
@@ -99,6 +99,10 @@ module Aws::AccessAnalyzer
99
99
  def retry_after_seconds
100
100
  @data[:retry_after_seconds]
101
101
  end
102
+
103
+ def retryable?
104
+ true
105
+ end
102
106
  end
103
107
 
104
108
  class ResourceNotFoundException < ServiceError
@@ -169,6 +173,14 @@ module Aws::AccessAnalyzer
169
173
  def retry_after_seconds
170
174
  @data[:retry_after_seconds]
171
175
  end
176
+
177
+ def retryable?
178
+ true
179
+ end
180
+
181
+ def throttling?
182
+ true
183
+ end
172
184
  end
173
185
 
174
186
  class ValidationException < ServiceError
@@ -181,6 +181,42 @@ module Aws::AccessAnalyzer
181
181
  include Aws::Structure
182
182
  end
183
183
 
184
+ # Retroactively applies an archive rule.
185
+ #
186
+ # @note When making an API call, you may pass ApplyArchiveRuleRequest
187
+ # data as a hash:
188
+ #
189
+ # {
190
+ # analyzer_arn: "AnalyzerArn", # required
191
+ # client_token: "String",
192
+ # rule_name: "Name", # required
193
+ # }
194
+ #
195
+ # @!attribute [rw] analyzer_arn
196
+ # The Amazon resource name (ARN) of the analyzer.
197
+ # @return [String]
198
+ #
199
+ # @!attribute [rw] client_token
200
+ # A client token.
201
+ #
202
+ # **A suitable default value is auto-generated.** You should normally
203
+ # not need to pass this option.
204
+ # @return [String]
205
+ #
206
+ # @!attribute [rw] rule_name
207
+ # The name of the rule to apply.
208
+ # @return [String]
209
+ #
210
+ # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ApplyArchiveRuleRequest AWS API Documentation
211
+ #
212
+ class ApplyArchiveRuleRequest < Struct.new(
213
+ :analyzer_arn,
214
+ :client_token,
215
+ :rule_name)
216
+ SENSITIVE = []
217
+ include Aws::Structure
218
+ end
219
+
184
220
  # Contains information about an archive rule.
185
221
  #
186
222
  # @!attribute [rw] created_at
@@ -901,7 +937,7 @@ module Aws::AccessAnalyzer
901
937
  # analyzer_arn: "AnalyzerArn", # required
902
938
  # max_results: 1,
903
939
  # next_token: "Token",
904
- # resource_type: "AWS::IAM::Role", # accepts AWS::IAM::Role, AWS::KMS::Key, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::S3::Bucket, AWS::SQS::Queue
940
+ # resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key
905
941
  # }
906
942
  #
907
943
  # @!attribute [rw] analyzer_arn
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-accessanalyzer
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.12.0
4
+ version: 1.13.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2020-09-30 00:00:00.000000000 Z
11
+ date: 2020-10-15 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core