aws-sdk-accessanalyzer 1.43.0 → 1.44.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: d8b47cfae651b3a9b193e49c16aa44cbfcbe875662a38a45fa48fa26e4edd422
4
- data.tar.gz: 33c9d5eaadb1afcda0f5d8506a8826c6c58af9d6155a9fb7d88f62cbae0db965
3
+ metadata.gz: 285b48379971e72e2dffbe557211cd2eaf67ce95132ad62106e055d1bb247890
4
+ data.tar.gz: 29e0cc6e1f4af53e6ecd79512eafa4cb4205045306d58c4b43e9eb86e7c490a2
5
5
  SHA512:
6
- metadata.gz: ce91c46bf6efb30b58534e145ff01ea523d5709e133cefecec11ad5919c4eb532fe5c98391145c29c0658a09a181f5db446c2a6a81607db45d0608f024d2a697
7
- data.tar.gz: '095cdb0877a4251d3e359d966da143c59c368f075cf857032a435f23974bb2dac6ac9a2b930b14934685667a366f5d4666d393a8af08fc84186fabc249134c3e'
6
+ metadata.gz: b803e3c443b6abdbb6cc1892e8b4c7f7a5cb1d3e922ce1eae316cbd189f2cb5c8987087c941f970ebbac8a336c5d61e718d4161004640368244fb09b7f35a910
7
+ data.tar.gz: 74d63e70911fde671d7fc76364d3d02c31a4b8e58b27bb98538072a95e7921b2cc8c703fa1dd56edf834659bc42eb1be4abb10dff2e4845df9afcd15ca818cfe
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.44.0 (2023-11-28)
5
+ ------------------
6
+
7
+ * Feature - This release adds support for external access findings for S3 directory buckets to help you easily identify cross-account access. Updated service API, documentation, and paginators.
8
+
4
9
  1.43.0 (2023-11-27)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.43.0
1
+ 1.44.0
@@ -695,6 +695,9 @@ module Aws::AccessAnalyzer
695
695
  # sqs_queue: {
696
696
  # queue_policy: "SqsQueuePolicy",
697
697
  # },
698
+ # s3_express_directory_bucket: {
699
+ # bucket_policy: "S3ExpressDirectoryBucketPolicy",
700
+ # },
698
701
  # },
699
702
  # },
700
703
  # client_token: "String",
@@ -982,6 +985,7 @@ module Aws::AccessAnalyzer
982
985
  # resp.access_preview.configurations["ConfigurationsMapKey"].s3_bucket.access_points["AccessPointArn"].network_origin.vpc_configuration.vpc_id #=> String
983
986
  # resp.access_preview.configurations["ConfigurationsMapKey"].sns_topic.topic_policy #=> String
984
987
  # resp.access_preview.configurations["ConfigurationsMapKey"].sqs_queue.queue_policy #=> String
988
+ # resp.access_preview.configurations["ConfigurationsMapKey"].s3_express_directory_bucket.bucket_policy #=> String
985
989
  # resp.access_preview.created_at #=> Time
986
990
  # resp.access_preview.status #=> String, one of "COMPLETED", "CREATING", "FAILED"
987
991
  # resp.access_preview.status_reason.code #=> String, one of "INTERNAL_ERROR", "INVALID_CONFIGURATION"
@@ -1021,7 +1025,7 @@ module Aws::AccessAnalyzer
1021
1025
  # @example Response structure
1022
1026
  #
1023
1027
  # resp.resource.resource_arn #=> String
1024
- # resp.resource.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic"
1028
+ # resp.resource.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket"
1025
1029
  # resp.resource.created_at #=> Time
1026
1030
  # resp.resource.analyzed_at #=> Time
1027
1031
  # resp.resource.updated_at #=> Time
@@ -1162,7 +1166,7 @@ module Aws::AccessAnalyzer
1162
1166
  # resp.finding.action[0] #=> String
1163
1167
  # resp.finding.resource #=> String
1164
1168
  # resp.finding.is_public #=> Boolean
1165
- # resp.finding.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic"
1169
+ # resp.finding.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket"
1166
1170
  # resp.finding.condition #=> Hash
1167
1171
  # resp.finding.condition["String"] #=> String
1168
1172
  # resp.finding.created_at #=> Time
@@ -1237,7 +1241,7 @@ module Aws::AccessAnalyzer
1237
1241
  # resp.id #=> String
1238
1242
  # resp.next_token #=> String
1239
1243
  # resp.resource #=> String
1240
- # resp.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic"
1244
+ # resp.resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket"
1241
1245
  # resp.resource_owner_account #=> String
1242
1246
  # resp.status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
1243
1247
  # resp.updated_at #=> Time
@@ -1400,7 +1404,7 @@ module Aws::AccessAnalyzer
1400
1404
  # resp.findings[0].condition["String"] #=> String
1401
1405
  # resp.findings[0].resource #=> String
1402
1406
  # resp.findings[0].is_public #=> Boolean
1403
- # resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic"
1407
+ # resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket"
1404
1408
  # resp.findings[0].created_at #=> Time
1405
1409
  # resp.findings[0].change_type #=> String, one of "CHANGED", "NEW", "UNCHANGED"
1406
1410
  # resp.findings[0].status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
@@ -1501,7 +1505,7 @@ module Aws::AccessAnalyzer
1501
1505
  #
1502
1506
  # resp = client.list_analyzed_resources({
1503
1507
  # analyzer_arn: "AnalyzerArn", # required
1504
- # resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key, AWS::SecretsManager::Secret, AWS::EFS::FileSystem, AWS::EC2::Snapshot, AWS::ECR::Repository, AWS::RDS::DBSnapshot, AWS::RDS::DBClusterSnapshot, AWS::SNS::Topic
1508
+ # resource_type: "AWS::S3::Bucket", # accepts AWS::S3::Bucket, AWS::IAM::Role, AWS::SQS::Queue, AWS::Lambda::Function, AWS::Lambda::LayerVersion, AWS::KMS::Key, AWS::SecretsManager::Secret, AWS::EFS::FileSystem, AWS::EC2::Snapshot, AWS::ECR::Repository, AWS::RDS::DBSnapshot, AWS::RDS::DBClusterSnapshot, AWS::SNS::Topic, AWS::S3Express::DirectoryBucket
1505
1509
  # next_token: "Token",
1506
1510
  # max_results: 1,
1507
1511
  # })
@@ -1511,7 +1515,7 @@ module Aws::AccessAnalyzer
1511
1515
  # resp.analyzed_resources #=> Array
1512
1516
  # resp.analyzed_resources[0].resource_arn #=> String
1513
1517
  # resp.analyzed_resources[0].resource_owner_account #=> String
1514
- # resp.analyzed_resources[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic"
1518
+ # resp.analyzed_resources[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket"
1515
1519
  # resp.next_token #=> String
1516
1520
  #
1517
1521
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ListAnalyzedResources AWS API Documentation
@@ -1691,7 +1695,7 @@ module Aws::AccessAnalyzer
1691
1695
  # resp.findings[0].action[0] #=> String
1692
1696
  # resp.findings[0].resource #=> String
1693
1697
  # resp.findings[0].is_public #=> Boolean
1694
- # resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic"
1698
+ # resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket"
1695
1699
  # resp.findings[0].condition #=> Hash
1696
1700
  # resp.findings[0].condition["String"] #=> String
1697
1701
  # resp.findings[0].created_at #=> Time
@@ -1779,7 +1783,7 @@ module Aws::AccessAnalyzer
1779
1783
  # resp.findings[0].error #=> String
1780
1784
  # resp.findings[0].id #=> String
1781
1785
  # resp.findings[0].resource #=> String
1782
- # resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic"
1786
+ # resp.findings[0].resource_type #=> String, one of "AWS::S3::Bucket", "AWS::IAM::Role", "AWS::SQS::Queue", "AWS::Lambda::Function", "AWS::Lambda::LayerVersion", "AWS::KMS::Key", "AWS::SecretsManager::Secret", "AWS::EFS::FileSystem", "AWS::EC2::Snapshot", "AWS::ECR::Repository", "AWS::RDS::DBSnapshot", "AWS::RDS::DBClusterSnapshot", "AWS::SNS::Topic", "AWS::S3Express::DirectoryBucket"
1783
1787
  # resp.findings[0].resource_owner_account #=> String
1784
1788
  # resp.findings[0].status #=> String, one of "ACTIVE", "ARCHIVED", "RESOLVED"
1785
1789
  # resp.findings[0].updated_at #=> Time
@@ -2224,7 +2228,7 @@ module Aws::AccessAnalyzer
2224
2228
  params: params,
2225
2229
  config: config)
2226
2230
  context[:gem_name] = 'aws-sdk-accessanalyzer'
2227
- context[:gem_version] = '1.43.0'
2231
+ context[:gem_version] = '1.44.0'
2228
2232
  Seahorse::Client::Request.new(handlers, context)
2229
2233
  end
2230
2234
 
@@ -213,6 +213,8 @@ module Aws::AccessAnalyzer
213
213
  S3BucketAclGrantConfigurationsList = Shapes::ListShape.new(name: 'S3BucketAclGrantConfigurationsList')
214
214
  S3BucketConfiguration = Shapes::StructureShape.new(name: 'S3BucketConfiguration')
215
215
  S3BucketPolicy = Shapes::StringShape.new(name: 'S3BucketPolicy')
216
+ S3ExpressDirectoryBucketConfiguration = Shapes::StructureShape.new(name: 'S3ExpressDirectoryBucketConfiguration')
217
+ S3ExpressDirectoryBucketPolicy = Shapes::StringShape.new(name: 'S3ExpressDirectoryBucketPolicy')
216
218
  S3PublicAccessBlockConfiguration = Shapes::StructureShape.new(name: 'S3PublicAccessBlockConfiguration')
217
219
  SecretsManagerSecretConfiguration = Shapes::StructureShape.new(name: 'SecretsManagerSecretConfiguration')
218
220
  SecretsManagerSecretKmsId = Shapes::StringShape.new(name: 'SecretsManagerSecretKmsId')
@@ -431,6 +433,7 @@ module Aws::AccessAnalyzer
431
433
  Configuration.add_member(:s3_bucket, Shapes::ShapeRef.new(shape: S3BucketConfiguration, location_name: "s3Bucket"))
432
434
  Configuration.add_member(:sns_topic, Shapes::ShapeRef.new(shape: SnsTopicConfiguration, location_name: "snsTopic"))
433
435
  Configuration.add_member(:sqs_queue, Shapes::ShapeRef.new(shape: SqsQueueConfiguration, location_name: "sqsQueue"))
436
+ Configuration.add_member(:s3_express_directory_bucket, Shapes::ShapeRef.new(shape: S3ExpressDirectoryBucketConfiguration, location_name: "s3ExpressDirectoryBucket"))
434
437
  Configuration.add_member(:unknown, Shapes::ShapeRef.new(shape: nil, location_name: 'unknown'))
435
438
  Configuration.add_member_subclass(:ebs_snapshot, Types::Configuration::EbsSnapshot)
436
439
  Configuration.add_member_subclass(:ecr_repository, Types::Configuration::EcrRepository)
@@ -443,6 +446,7 @@ module Aws::AccessAnalyzer
443
446
  Configuration.add_member_subclass(:s3_bucket, Types::Configuration::S3Bucket)
444
447
  Configuration.add_member_subclass(:sns_topic, Types::Configuration::SnsTopic)
445
448
  Configuration.add_member_subclass(:sqs_queue, Types::Configuration::SqsQueue)
449
+ Configuration.add_member_subclass(:s3_express_directory_bucket, Types::Configuration::S3ExpressDirectoryBucket)
446
450
  Configuration.add_member_subclass(:unknown, Types::Configuration::Unknown)
447
451
  Configuration.struct_class = Types::Configuration
448
452
 
@@ -923,6 +927,9 @@ module Aws::AccessAnalyzer
923
927
  S3BucketConfiguration.add_member(:access_points, Shapes::ShapeRef.new(shape: S3AccessPointConfigurationsMap, location_name: "accessPoints"))
924
928
  S3BucketConfiguration.struct_class = Types::S3BucketConfiguration
925
929
 
930
+ S3ExpressDirectoryBucketConfiguration.add_member(:bucket_policy, Shapes::ShapeRef.new(shape: S3ExpressDirectoryBucketPolicy, location_name: "bucketPolicy"))
931
+ S3ExpressDirectoryBucketConfiguration.struct_class = Types::S3ExpressDirectoryBucketConfiguration
932
+
926
933
  S3PublicAccessBlockConfiguration.add_member(:ignore_public_acls, Shapes::ShapeRef.new(shape: Boolean, required: true, location_name: "ignorePublicAcls"))
927
934
  S3PublicAccessBlockConfiguration.add_member(:restrict_public_buckets, Shapes::ShapeRef.new(shape: Boolean, required: true, location_name: "restrictPublicBuckets"))
928
935
  S3PublicAccessBlockConfiguration.struct_class = Types::S3PublicAccessBlockConfiguration
@@ -25,16 +25,17 @@ module Aws::AccessAnalyzer
25
25
  # @api private
26
26
  class Handler < Seahorse::Client::Handler
27
27
  def call(context)
28
- # If endpoint was discovered, do not resolve or apply the endpoint.
29
28
  unless context[:discovered_endpoint]
30
29
  params = parameters_for_operation(context)
31
30
  endpoint = context.config.endpoint_provider.resolve_endpoint(params)
32
31
 
33
32
  context.http_request.endpoint = endpoint.url
34
33
  apply_endpoint_headers(context, endpoint.headers)
34
+
35
+ context[:endpoint_params] = params
36
+ context[:endpoint_properties] = endpoint.properties
35
37
  end
36
38
 
37
- context[:endpoint_params] = params
38
39
  context[:auth_scheme] =
39
40
  Aws::Endpoints.resolve_auth_scheme(context, endpoint)
40
41
 
@@ -788,7 +788,7 @@ module Aws::AccessAnalyzer
788
788
  # @return [Types::SecretsManagerSecretConfiguration]
789
789
  #
790
790
  # @!attribute [rw] s3_bucket
791
- # The access control configuration is for an Amazon S3 Bucket.
791
+ # The access control configuration is for an Amazon S3 bucket.
792
792
  # @return [Types::S3BucketConfiguration]
793
793
  #
794
794
  # @!attribute [rw] sns_topic
@@ -799,6 +799,11 @@ module Aws::AccessAnalyzer
799
799
  # The access control configuration is for an Amazon SQS queue.
800
800
  # @return [Types::SqsQueueConfiguration]
801
801
  #
802
+ # @!attribute [rw] s3_express_directory_bucket
803
+ # The access control configuration is for an Amazon S3 directory
804
+ # bucket.
805
+ # @return [Types::S3ExpressDirectoryBucketConfiguration]
806
+ #
802
807
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/Configuration AWS API Documentation
803
808
  #
804
809
  class Configuration < Struct.new(
@@ -813,6 +818,7 @@ module Aws::AccessAnalyzer
813
818
  :s3_bucket,
814
819
  :sns_topic,
815
820
  :sqs_queue,
821
+ :s3_express_directory_bucket,
816
822
  :unknown)
817
823
  SENSITIVE = []
818
824
  include Aws::Structure
@@ -829,6 +835,7 @@ module Aws::AccessAnalyzer
829
835
  class S3Bucket < Configuration; end
830
836
  class SnsTopic < Configuration; end
831
837
  class SqsQueue < Configuration; end
838
+ class S3ExpressDirectoryBucket < Configuration; end
832
839
  class Unknown < Configuration; end
833
840
  end
834
841
 
@@ -3224,6 +3231,35 @@ module Aws::AccessAnalyzer
3224
3231
  include Aws::Structure
3225
3232
  end
3226
3233
 
3234
+ # Proposed access control configuration for an Amazon S3 directory
3235
+ # bucket. You can propose a configuration for a new Amazon S3 directory
3236
+ # bucket or an existing Amazon S3 directory bucket that you own by
3237
+ # specifying the Amazon S3 bucket policy. If the configuration is for an
3238
+ # existing Amazon S3 directory bucket and you do not specify the Amazon
3239
+ # S3 bucket policy, the access preview uses the existing policy attached
3240
+ # to the directory bucket. If the access preview is for a new resource
3241
+ # and you do not specify the Amazon S3 bucket policy, the access preview
3242
+ # assumes an directory bucket without a policy. To propose deletion of
3243
+ # an existing bucket policy, you can specify an empty string. For more
3244
+ # information about bucket policy limits, see [Example bucket
3245
+ # policies][1].
3246
+ #
3247
+ #
3248
+ #
3249
+ # [1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-security-iam-example-bucket-policies.html
3250
+ #
3251
+ # @!attribute [rw] bucket_policy
3252
+ # The proposed bucket policy for the Amazon S3 directory bucket.
3253
+ # @return [String]
3254
+ #
3255
+ # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/S3ExpressDirectoryBucketConfiguration AWS API Documentation
3256
+ #
3257
+ class S3ExpressDirectoryBucketConfiguration < Struct.new(
3258
+ :bucket_policy)
3259
+ SENSITIVE = []
3260
+ include Aws::Structure
3261
+ end
3262
+
3227
3263
  # The `PublicAccessBlock` configuration to apply to this Amazon S3
3228
3264
  # bucket. If the proposed configuration is for an existing Amazon S3
3229
3265
  # bucket and the configuration is not specified, the access preview uses
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-accessanalyzer/customizations'
52
52
  # @!group service
53
53
  module Aws::AccessAnalyzer
54
54
 
55
- GEM_VERSION = '1.43.0'
55
+ GEM_VERSION = '1.44.0'
56
56
 
57
57
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-accessanalyzer
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.43.0
4
+ version: 1.44.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-11-27 00:00:00.000000000 Z
11
+ date: 2023-11-28 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core