Skip to content

Commit 6456873

Browse files
Updated API models and rebuilt service gems.
1 parent a6f10b2 commit 6456873

File tree

176 files changed

+25754
-935
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

176 files changed

+25754
-935
lines changed

README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -680,6 +680,7 @@ RubyGems.org page under "LINKS" section.
680680
| Managed Streaming for Kafka Connect | Aws::KafkaConnect | aws-sdk-kafkaconnect | 2021-09-14 |
681681
| Migration Hub Strategy Recommendations | Aws::MigrationHubStrategyRecommendations | aws-sdk-migrationhubstrategyrecommendations | 2020-02-19 |
682682
| OpenSearch Service Serverless | Aws::OpenSearchServerless | aws-sdk-opensearchserverless | 2021-11-01 |
683+
| Partner Central Selling API | Aws::PartnerCentralSelling | aws-sdk-partnercentralselling | 2022-07-26 |
683684
| Payment Cryptography Control Plane | Aws::PaymentCryptography | aws-sdk-paymentcryptography | 2021-09-14 |
684685
| Payment Cryptography Data Plane | Aws::PaymentCryptographyData | aws-sdk-paymentcryptographydata | 2022-02-03 |
685686
| PcaConnectorAd | Aws::PcaConnectorAd | aws-sdk-pcaconnectorad | 2018-05-10 |

apis/accessanalyzer/2019-11-01/api-2.json

Lines changed: 66 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -565,6 +565,25 @@
565565
],
566566
"idempotent":true
567567
},
568+
"UpdateAnalyzer":{
569+
"name":"UpdateAnalyzer",
570+
"http":{
571+
"method":"PUT",
572+
"requestUri":"/analyzer/{analyzerName}",
573+
"responseCode":200
574+
},
575+
"input":{"shape":"UpdateAnalyzerRequest"},
576+
"output":{"shape":"UpdateAnalyzerResponse"},
577+
"errors":[
578+
{"shape":"ResourceNotFoundException"},
579+
{"shape":"ConflictException"},
580+
{"shape":"ValidationException"},
581+
{"shape":"InternalServerException"},
582+
{"shape":"ThrottlingException"},
583+
{"shape":"AccessDeniedException"}
584+
],
585+
"idempotent":true
586+
},
568587
"UpdateArchiveRule":{
569588
"name":"UpdateArchiveRule",
570589
"http":{
@@ -785,6 +804,10 @@
785804
"max":100,
786805
"min":0
787806
},
807+
"AccountIdsList":{
808+
"type":"list",
809+
"member":{"shape":"String"}
810+
},
788811
"AclCanonicalId":{"type":"string"},
789812
"AclGrantee":{
790813
"type":"structure",
@@ -810,6 +833,23 @@
810833
"type":"list",
811834
"member":{"shape":"String"}
812835
},
836+
"AnalysisRule":{
837+
"type":"structure",
838+
"members":{
839+
"exclusions":{"shape":"AnalysisRuleCriteriaList"}
840+
}
841+
},
842+
"AnalysisRuleCriteria":{
843+
"type":"structure",
844+
"members":{
845+
"accountIds":{"shape":"AccountIdsList"},
846+
"resourceTags":{"shape":"TagsList"}
847+
}
848+
},
849+
"AnalysisRuleCriteriaList":{
850+
"type":"list",
851+
"member":{"shape":"AnalysisRuleCriteria"}
852+
},
813853
"AnalyzedResource":{
814854
"type":"structure",
815855
"required":[
@@ -2477,7 +2517,8 @@
24772517
"AWS::SNS::Topic",
24782518
"AWS::S3Express::DirectoryBucket",
24792519
"AWS::DynamoDB::Table",
2480-
"AWS::DynamoDB::Stream"
2520+
"AWS::DynamoDB::Stream",
2521+
"AWS::IAM::User"
24812522
]
24822523
},
24832524
"RetiringPrincipal":{"type":"string"},
@@ -2690,6 +2731,10 @@
26902731
"members":{
26912732
}
26922733
},
2734+
"TagsList":{
2735+
"type":"list",
2736+
"member":{"shape":"TagsMap"}
2737+
},
26932738
"TagsMap":{
26942739
"type":"map",
26952740
"key":{"shape":"String"},
@@ -2793,7 +2838,8 @@
27932838
"UnusedAccessConfiguration":{
27942839
"type":"structure",
27952840
"members":{
2796-
"unusedAccessAge":{"shape":"Integer"}
2841+
"unusedAccessAge":{"shape":"Integer"},
2842+
"analysisRule":{"shape":"AnalysisRule"}
27972843
}
27982844
},
27992845
"UnusedAction":{
@@ -2847,6 +2893,24 @@
28472893
"existingPolicyId":{"shape":"String"}
28482894
}
28492895
},
2896+
"UpdateAnalyzerRequest":{
2897+
"type":"structure",
2898+
"required":["analyzerName"],
2899+
"members":{
2900+
"analyzerName":{
2901+
"shape":"Name",
2902+
"location":"uri",
2903+
"locationName":"analyzerName"
2904+
},
2905+
"configuration":{"shape":"AnalyzerConfiguration"}
2906+
}
2907+
},
2908+
"UpdateAnalyzerResponse":{
2909+
"type":"structure",
2910+
"members":{
2911+
"configuration":{"shape":"AnalyzerConfiguration"}
2912+
}
2913+
},
28502914
"UpdateArchiveRuleRequest":{
28512915
"type":"structure",
28522916
"required":[

apis/accessanalyzer/2019-11-01/docs-2.json

Lines changed: 54 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@
2323
"GetGeneratedPolicy": "<p>Retrieves the policy that was generated using <code>StartPolicyGeneration</code>. </p>",
2424
"ListAccessPreviewFindings": "<p>Retrieves a list of access preview findings generated by the specified access preview.</p>",
2525
"ListAccessPreviews": "<p>Retrieves a list of access previews for the specified analyzer.</p>",
26-
"ListAnalyzedResources": "<p>Retrieves a list of resources of the specified type that have been analyzed by the specified external access analyzer. This action is not supported for unused access analyzers.</p>",
26+
"ListAnalyzedResources": "<p>Retrieves a list of resources of the specified type that have been analyzed by the specified analyzer.</p>",
2727
"ListAnalyzers": "<p>Retrieves a list of analyzers.</p>",
2828
"ListArchiveRules": "<p>Retrieves a list of archive rules created for the specified analyzer.</p>",
2929
"ListFindings": "<p>Retrieves a list of findings generated by the specified analyzer. ListFindings and ListFindingsV2 both use <code>access-analyzer:ListFindings</code> in the <code>Action</code> element of an IAM policy statement. You must have permission to perform the <code>access-analyzer:ListFindings</code> action.</p> <p>To learn about filter keys that you can use to retrieve a list of findings, see <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html\">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>",
@@ -34,6 +34,7 @@
3434
"StartResourceScan": "<p>Immediately starts a scan of the policies applied to the specified resource.</p>",
3535
"TagResource": "<p>Adds a tag to the specified resource.</p>",
3636
"UntagResource": "<p>Removes a tag from the specified resource.</p>",
37+
"UpdateAnalyzer": "<p>Modifies the configuration of an existing analyzer.</p>",
3738
"UpdateArchiveRule": "<p>Updates the criteria and values for the specified archive rule.</p>",
3839
"UpdateFindings": "<p>Updates the status for the specified findings.</p>",
3940
"ValidatePolicy": "<p>Requests the validation of a policy and returns a list of findings. The findings help you identify issues and provide actionable recommendations to resolve the issue and enable you to author functional policies that meet security best practices. </p>"
@@ -162,6 +163,12 @@
162163
"Access$resources": "<p>A list of resources for the access permissions. Any strings that can be used as an Amazon Resource Name (ARN) in an IAM policy can be used in the list of resources to check. You can only use a wildcard in the portion of the ARN that specifies the resource ID.</p>"
163164
}
164165
},
166+
"AccountIdsList": {
167+
"base": null,
168+
"refs": {
169+
"AnalysisRuleCriteria$accountIds": "<p>A list of Amazon Web Services account IDs to apply to the analysis rule criteria. The accounts cannot include the organization analyzer owner account. Account IDs can only be applied to the analysis rule criteria for organization-level analyzers. The list cannot include more than 2,000 account IDs.</p>"
170+
}
171+
},
165172
"AclCanonicalId": {
166173
"base": null,
167174
"refs": {
@@ -202,6 +209,24 @@
202209
"FindingSummary$action": "<p>The action in the analyzed policy statement that an external principal has permission to use.</p>"
203210
}
204211
},
212+
"AnalysisRule": {
213+
"base": "<p>Contains information about analysis rules for the analyzer. Analysis rules determine which entities will generate findings based on the criteria you define when you create the rule.</p>",
214+
"refs": {
215+
"UnusedAccessConfiguration$analysisRule": null
216+
}
217+
},
218+
"AnalysisRuleCriteria": {
219+
"base": "<p>The criteria for an analysis rule for an analyzer. The criteria determine which entities will generate findings.</p>",
220+
"refs": {
221+
"AnalysisRuleCriteriaList$member": null
222+
}
223+
},
224+
"AnalysisRuleCriteriaList": {
225+
"base": null,
226+
"refs": {
227+
"AnalysisRule$exclusions": "<p>A list of rules for the analyzer containing criteria to exclude from analysis. Entities that meet the rule criteria will not generate findings.</p>"
228+
}
229+
},
205230
"AnalyzedResource": {
206231
"base": "<p>Contains details about the analyzed resource.</p>",
207232
"refs": {
@@ -245,10 +270,12 @@
245270
}
246271
},
247272
"AnalyzerConfiguration": {
248-
"base": "<p>Contains information about the configuration of an unused access analyzer for an Amazon Web Services organization or account.</p>",
273+
"base": "<p>Contains information about the configuration of an analyzer for an Amazon Web Services organization or account.</p>",
249274
"refs": {
250275
"AnalyzerSummary$configuration": "<p>Specifies whether the analyzer is an external access or unused access analyzer.</p>",
251-
"CreateAnalyzerRequest$configuration": "<p>Specifies the configuration of the analyzer. If the analyzer is an unused access analyzer, the specified scope of unused access is used for the configuration. If the analyzer is an external access analyzer, this field is not used.</p>"
276+
"CreateAnalyzerRequest$configuration": "<p>Specifies the configuration of the analyzer. If the analyzer is an unused access analyzer, the specified scope of unused access is used for the configuration.</p>",
277+
"UpdateAnalyzerRequest$configuration": null,
278+
"UpdateAnalyzerResponse$configuration": null
252279
}
253280
},
254281
"AnalyzerStatus": {
@@ -276,7 +303,7 @@
276303
}
277304
},
278305
"ArchiveRuleSummary": {
279-
"base": "<p>Contains information about an archive rule.</p>",
306+
"base": "<p>Contains information about an archive rule. Archive rules automatically archive new findings that meet the criteria you define when you create the rule.</p>",
280307
"refs": {
281308
"ArchiveRulesList$member": null,
282309
"GetArchiveRuleResponse$archiveRule": null
@@ -861,7 +888,7 @@
861888
"Substring$start": "<p>The start index of the substring, starting from 0.</p>",
862889
"Substring$length": "<p>The length of the substring.</p>",
863890
"ThrottlingException$retryAfterSeconds": "<p>The seconds to wait to retry.</p>",
864-
"UnusedAccessConfiguration$unusedAccessAge": "<p>The specified access age in days for which to generate findings for unused access. For example, if you specify 90 days, the analyzer will generate findings for IAM entities within the accounts of the selected organization for any access that hasn't been used in 90 or more days since the analyzer's last scan. You can choose a value between 1 and 180 days.</p>",
891+
"UnusedAccessConfiguration$unusedAccessAge": "<p>The specified access age in days for which to generate findings for unused access. For example, if you specify 90 days, the analyzer will generate findings for IAM entities within the accounts of the selected organization for any access that hasn't been used in 90 or more days since the analyzer's last scan. You can choose a value between 1 and 365 days.</p>",
865892
"ValidatePolicyRequest$maxResults": "<p>The maximum number of results to return in the response.</p>"
866893
}
867894
},
@@ -1132,6 +1159,7 @@
11321159
"GetArchiveRuleRequest$ruleName": "<p>The name of the rule to retrieve.</p>",
11331160
"InlineArchiveRule$ruleName": "<p>The name of the rule.</p>",
11341161
"ListArchiveRulesRequest$analyzerName": "<p>The name of the analyzer to retrieve rules from.</p>",
1162+
"UpdateAnalyzerRequest$analyzerName": "<p>The name of the analyzer to modify.</p>",
11351163
"UpdateArchiveRuleRequest$analyzerName": "<p>The name of the analyzer to update the archive rules for.</p>",
11361164
"UpdateArchiveRuleRequest$ruleName": "<p>The name of the rule to update.</p>"
11371165
}
@@ -1573,6 +1601,7 @@
15731601
"AccessPreviewFinding$resource": "<p>The resource that an external principal has access to. This is the resource associated with the access preview.</p>",
15741602
"AccessPreviewFinding$resourceOwnerAccount": "<p>The Amazon Web Services account ID that owns the resource. For most Amazon Web Services resources, the owning account is the account in which the resource was created.</p>",
15751603
"AccessPreviewFinding$error": "<p>An error.</p>",
1604+
"AccountIdsList$member": null,
15761605
"ActionList$member": null,
15771606
"AnalyzedResource$resourceOwnerAccount": "<p>The Amazon Web Services account ID that owns the resource.</p>",
15781607
"AnalyzedResource$error": "<p>An error message.</p>",
@@ -1674,13 +1703,20 @@
16741703
"refs": {
16751704
}
16761705
},
1706+
"TagsList": {
1707+
"base": null,
1708+
"refs": {
1709+
"AnalysisRuleCriteria$resourceTags": "<p>An array of key-value pairs to match for your resources. You can use the set of Unicode letters, digits, whitespace, <code>_</code>, <code>.</code>, <code>/</code>, <code>=</code>, <code>+</code>, and <code>-</code>.</p> <p>For the tag key, you can specify a value that is 1 to 128 characters in length and cannot be prefixed with <code>aws:</code>.</p> <p>For the tag value, you can specify a value that is 0 to 256 characters in length. If the specified tag value is 0 characters, the rule is applied to all principals with the specified tag key.</p>"
1710+
}
1711+
},
16771712
"TagsMap": {
16781713
"base": null,
16791714
"refs": {
16801715
"AnalyzerSummary$tags": "<p>The tags added to the analyzer.</p>",
1681-
"CreateAnalyzerRequest$tags": "<p>An array of key-value pairs to apply to the analyzer.</p>",
1716+
"CreateAnalyzerRequest$tags": "<p>An array of key-value pairs to apply to the analyzer. You can use the set of Unicode letters, digits, whitespace, <code>_</code>, <code>.</code>, <code>/</code>, <code>=</code>, <code>+</code>, and <code>-</code>.</p> <p>For the tag key, you can specify a value that is 1 to 128 characters in length and cannot be prefixed with <code>aws:</code>.</p> <p>For the tag value, you can specify a value that is 0 to 256 characters in length.</p>",
16821717
"ListTagsForResourceResponse$tags": "<p>The tags that are applied to the specified resource.</p>",
1683-
"TagResourceRequest$tags": "<p>The tags to add to the resource.</p>"
1718+
"TagResourceRequest$tags": "<p>The tags to add to the resource.</p>",
1719+
"TagsList$member": null
16841720
}
16851721
},
16861722
"ThrottlingException": {
@@ -1808,7 +1844,7 @@
18081844
"UnusedAccessConfiguration": {
18091845
"base": "<p>Contains information about an unused access analyzer.</p>",
18101846
"refs": {
1811-
"AnalyzerConfiguration$unusedAccess": "<p>Specifies the configuration of an unused access analyzer for an Amazon Web Services organization or account. External access analyzers do not support any configuration.</p>"
1847+
"AnalyzerConfiguration$unusedAccess": "<p>Specifies the configuration of an unused access analyzer for an Amazon Web Services organization or account.</p>"
18121848
}
18131849
},
18141850
"UnusedAction": {
@@ -1853,6 +1889,16 @@
18531889
"RecommendedStep$unusedPermissionsRecommendedStep": "<p>A recommended step for an unused permissions finding.</p>"
18541890
}
18551891
},
1892+
"UpdateAnalyzerRequest": {
1893+
"base": null,
1894+
"refs": {
1895+
}
1896+
},
1897+
"UpdateAnalyzerResponse": {
1898+
"base": null,
1899+
"refs": {
1900+
}
1901+
},
18561902
"UpdateArchiveRuleRequest": {
18571903
"base": "<p>Updates the specified archive rule.</p>",
18581904
"refs": {

0 commit comments

Comments
 (0)