aws-sdk-accessanalyzer 1.45.0 → 1.46.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 30d0b5758c70e8399097de843e90a31c4ac6e75e2c229978ea195dfad1538900
4
- data.tar.gz: 5c6ef08352a8b4a6d900f309a7b206cdbda0cb1fc61030dfbd1565ebf74611a7
3
+ metadata.gz: de74ac7ea07e298ce1f27abd56bbdbb0d453326d41bc6cfc8c99e354d0378084
4
+ data.tar.gz: 13215496a791944b864713f93a19c5ca28a0a542af8e2c2f9ca63e9f3280c74b
5
5
  SHA512:
6
- metadata.gz: a432058a5fe3ac9bfc4c82fbc70cd95f8175b0064448172b302528af20fac9dcf31b233cf8f98d6f3c91e207e43ce7a04f782a4956a7a49e1f79be53952379f6
7
- data.tar.gz: 4dcebb78315e71a4692601a9c03022856c7bf2dc9a5f860f174f7938121136ef8de51d56a778a8e04294c54458760dff744c86f985923bcbae39aacb26631939
6
+ metadata.gz: fca86b1cd0dd7a060690e5ba2839ab1f0601c4896f94982fb65c3d7c38a2e313d7eac81eda643d62a1c119f158acdef584a1fcadc6a50ddf3ff3952aa377097e
7
+ data.tar.gz: 6647fa0e5b066738ebe9c195853c43b8a6c858f3fcf2feaf69d7aea815439dc63b84b353b1d85ecc467693454f9572a52825aae463895a7c44a5ad1281deef50
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.46.0 (2024-03-01)
5
+ ------------------
6
+
7
+ * Feature - Fixed a typo in description field.
8
+
4
9
  1.45.0 (2024-01-26)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.45.0
1
+ 1.46.0
@@ -723,7 +723,7 @@ module Aws::AccessAnalyzer
723
723
  #
724
724
  # @option params [required, String] :type
725
725
  # The type of analyzer to create. Only `ACCOUNT`, `ORGANIZATION`,
726
- # `ACCOUNT_UNUSED_ACCESS`, and `ORGANIZTAION_UNUSED_ACCESS` analyzers
726
+ # `ACCOUNT_UNUSED_ACCESS`, and `ORGANIZATION_UNUSED_ACCESS` analyzers
727
727
  # are supported. You can create only one analyzer per account per
728
728
  # Region. You can create up to 5 analyzers per organization per Region.
729
729
  #
@@ -1134,7 +1134,10 @@ module Aws::AccessAnalyzer
1134
1134
  req.send_request(options)
1135
1135
  end
1136
1136
 
1137
- # Retrieves information about the specified finding.
1137
+ # Retrieves information about the specified finding. GetFinding and
1138
+ # GetFindingV2 both use `access-analyzer:GetFinding` in the `Action`
1139
+ # element of an IAM policy statement. You must have permission to
1140
+ # perform the `access-analyzer:GetFinding` action.
1138
1141
  #
1139
1142
  # @option params [required, String] :analyzer_arn
1140
1143
  # The [ARN of the analyzer][1] that generated the finding.
@@ -1189,7 +1192,10 @@ module Aws::AccessAnalyzer
1189
1192
  req.send_request(options)
1190
1193
  end
1191
1194
 
1192
- # Retrieves information about the specified finding.
1195
+ # Retrieves information about the specified finding. GetFinding and
1196
+ # GetFindingV2 both use `access-analyzer:GetFinding` in the `Action`
1197
+ # element of an IAM policy statement. You must have permission to
1198
+ # perform the `access-analyzer:GetFinding` action.
1193
1199
  #
1194
1200
  # @option params [required, String] :analyzer_arn
1195
1201
  # The [ARN of the analyzer][1] that generated the finding.
@@ -1475,7 +1481,8 @@ module Aws::AccessAnalyzer
1475
1481
  end
1476
1482
 
1477
1483
  # Retrieves a list of resources of the specified type that have been
1478
- # analyzed by the specified analyzer..
1484
+ # analyzed by the specified external access analyzer. This action is not
1485
+ # supported for unused access analyzers.
1479
1486
  #
1480
1487
  # @option params [required, String] :analyzer_arn
1481
1488
  # The [ARN of the analyzer][1] to retrieve a list of analyzed resources
@@ -1630,6 +1637,10 @@ module Aws::AccessAnalyzer
1630
1637
  end
1631
1638
 
1632
1639
  # Retrieves a list of findings generated by the specified analyzer.
1640
+ # ListFindings and ListFindingsV2 both use
1641
+ # `access-analyzer:ListFindings` in the `Action` element of an IAM
1642
+ # policy statement. You must have permission to perform the
1643
+ # `access-analyzer:ListFindings` action.
1633
1644
  #
1634
1645
  # To learn about filter keys that you can use to retrieve a list of
1635
1646
  # findings, see [IAM Access Analyzer filter keys][1] in the **IAM User
@@ -1720,6 +1731,10 @@ module Aws::AccessAnalyzer
1720
1731
  end
1721
1732
 
1722
1733
  # Retrieves a list of findings generated by the specified analyzer.
1734
+ # ListFindings and ListFindingsV2 both use
1735
+ # `access-analyzer:ListFindings` in the `Action` element of an IAM
1736
+ # policy statement. You must have permission to perform the
1737
+ # `access-analyzer:ListFindings` action.
1723
1738
  #
1724
1739
  # To learn about filter keys that you can use to retrieve a list of
1725
1740
  # findings, see [IAM Access Analyzer filter keys][1] in the **IAM User
@@ -2228,7 +2243,7 @@ module Aws::AccessAnalyzer
2228
2243
  params: params,
2229
2244
  config: config)
2230
2245
  context[:gem_name] = 'aws-sdk-accessanalyzer'
2231
- context[:gem_version] = '1.45.0'
2246
+ context[:gem_version] = '1.46.0'
2232
2247
  Seahorse::Client::Request.new(handlers, context)
2233
2248
  end
2234
2249
 
@@ -14,7 +14,9 @@ module Aws::AccessAnalyzer
14
14
  # against a policy.
15
15
  #
16
16
  # @!attribute [rw] actions
17
- # A list of actions for the access permissions.
17
+ # A list of actions for the access permissions. Any strings that can
18
+ # be used as an action in an IAM policy can be used in the list of
19
+ # actions to check.
18
20
  # @return [Array<String>]
19
21
  #
20
22
  # @see http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/Access AWS API Documentation
@@ -917,7 +919,7 @@ module Aws::AccessAnalyzer
917
919
  #
918
920
  # @!attribute [rw] type
919
921
  # The type of analyzer to create. Only `ACCOUNT`, `ORGANIZATION`,
920
- # `ACCOUNT_UNUSED_ACCESS`, and `ORGANIZTAION_UNUSED_ACCESS` analyzers
922
+ # `ACCOUNT_UNUSED_ACCESS`, and `ORGANIZATION_UNUSED_ACCESS` analyzers
921
923
  # are supported. You can create only one analyzer per account per
922
924
  # Region. You can create up to 5 analyzers per organization per
923
925
  # Region.
@@ -3241,8 +3243,8 @@ module Aws::AccessAnalyzer
3241
3243
  # and you do not specify the Amazon S3 bucket policy, the access preview
3242
3244
  # assumes an directory bucket without a policy. To propose deletion of
3243
3245
  # an existing bucket policy, you can specify an empty string. For more
3244
- # information about bucket policy limits, see [Example bucket
3245
- # policies][1].
3246
+ # information about Amazon S3 directory bucket policies, see [Example
3247
+ # directory bucket policies for S3 Express One Zone][1].
3246
3248
  #
3247
3249
  #
3248
3250
  #
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-accessanalyzer/customizations'
52
52
  # @!group service
53
53
  module Aws::AccessAnalyzer
54
54
 
55
- GEM_VERSION = '1.45.0'
55
+ GEM_VERSION = '1.46.0'
56
56
 
57
57
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-accessanalyzer
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.45.0
4
+ version: 1.46.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-01-26 00:00:00.000000000 Z
11
+ date: 2024-03-01 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core