Skip to content

Commit a1f9c72

Browse files
committed
Merge branch 'main' of https://github.com/aws/aws-sdk-cpp into transfer-manager
2 parents 0e3db48 + 994384c commit a1f9c72

File tree

1,227 files changed

+74477
-21491
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,227 files changed

+74477
-21491
lines changed

VERSION

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
1.11.683
1+
1.11.686

generated/src/aws-cpp-sdk-AWSMigrationHub/source/MigrationHubClient.cpp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ void MigrationHubClient::init(const MigrationHub::MigrationHubClientConfiguratio
149149
m_clientConfiguration.executor = m_clientConfiguration.configFactories.executorCreateFn();
150150
}
151151
AWS_CHECK_PTR(SERVICE_NAME, m_endpointProvider);
152-
m_endpointProvider->InitBuiltInParameters(config);
152+
m_endpointProvider->InitBuiltInParameters(config, "mgh");
153153
}
154154

155155
void MigrationHubClient::OverrideEndpoint(const Aws::String& endpoint) {

generated/src/aws-cpp-sdk-accessanalyzer/include/aws/accessanalyzer/AccessAnalyzerClient.h

Lines changed: 41 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -16,29 +16,35 @@ namespace AccessAnalyzer {
1616
/**
1717
* <p>Identity and Access Management Access Analyzer helps you to set, verify, and
1818
* refine your IAM policies by providing a suite of capabilities. Its features
19-
* include findings for external and unused access, basic and custom policy checks
20-
* for validating policies, and policy generation to generate fine-grained
21-
* policies. To start using IAM Access Analyzer to identify external or unused
22-
* access, you first need to create an analyzer.</p> <p> <b>External access
23-
* analyzers</b> help identify potential risks of accessing resources by enabling
24-
* you to identify any resource policies that grant access to an external
25-
* principal. It does this by using logic-based reasoning to analyze resource-based
26-
* policies in your Amazon Web Services environment. An external principal can be
27-
* another Amazon Web Services account, a root user, an IAM user or role, a
28-
* federated user, an Amazon Web Services service, or an anonymous user. You can
29-
* also use IAM Access Analyzer to preview public and cross-account access to your
30-
* resources before deploying permissions changes.</p> <p> <b>Unused access
31-
* analyzers</b> help identify potential identity access risks by enabling you to
32-
* identify unused IAM roles, unused access keys, unused console passwords, and IAM
33-
* principals with unused service and action-level permissions.</p> <p>Beyond
34-
* findings, IAM Access Analyzer provides basic and custom policy checks to
35-
* validate IAM policies before deploying permissions changes. You can use policy
36-
* generation to refine permissions by attaching a policy generated using access
37-
* activity logged in CloudTrail logs. </p> <p>This guide describes the IAM Access
38-
* Analyzer operations that you can call programmatically. For general information
39-
* about IAM Access Analyzer, see <a
40-
* href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity
41-
* and Access Management Access Analyzer</a> in the <b>IAM User Guide</b>.</p>
19+
* include findings for external, internal, and unused access, basic and custom
20+
* policy checks for validating policies, and policy generation to generate
21+
* fine-grained policies. To start using IAM Access Analyzer to identify external,
22+
* internal, or unused access, you first need to create an analyzer.</p> <p>
23+
* <b>External access analyzers</b> help you identify potential risks of accessing
24+
* resources by enabling you to identify any resource policies that grant access to
25+
* an external principal. It does this by using logic-based reasoning to analyze
26+
* resource-based policies in your Amazon Web Services environment. An external
27+
* principal can be another Amazon Web Services account, a root user, an IAM user
28+
* or role, a federated user, an Amazon Web Services service, or an anonymous user.
29+
* You can also use IAM Access Analyzer to preview public and cross-account access
30+
* to your resources before deploying permissions changes.</p> <p> <b>Internal
31+
* access analyzers</b> help you identify which principals within your organization
32+
* or account have access to selected resources. This analysis supports
33+
* implementing the principle of least privilege by ensuring that your specified
34+
* resources can only be accessed by the intended principals within your
35+
* organization.</p> <p> <b>Unused access analyzers</b> help you identify potential
36+
* identity access risks by enabling you to identify unused IAM roles, unused
37+
* access keys, unused console passwords, and IAM principals with unused service
38+
* and action-level permissions.</p> <p>Beyond findings, IAM Access Analyzer
39+
* provides basic and custom policy checks to validate IAM policies before
40+
* deploying permissions changes. You can use policy generation to refine
41+
* permissions by attaching a policy generated using access activity logged in
42+
* CloudTrail logs. </p> <p>This guide describes the IAM Access Analyzer operations
43+
* that you can call programmatically. For general information about IAM Access
44+
* Analyzer, see <a
45+
* href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Using
46+
* Identity and Access Management Access Analyzer</a> in the <b>IAM User
47+
* Guide</b>.</p>
4248
*/
4349
class AWS_ACCESSANALYZER_API AccessAnalyzerClient : public Aws::Client::AWSJsonClient,
4450
public Aws::Client::ClientWithAsyncTemplateMethods<AccessAnalyzerClient> {
@@ -437,7 +443,8 @@ class AWS_ACCESSANALYZER_API AccessAnalyzerClient : public Aws::Client::AWSJsonC
437443
}
438444

439445
/**
440-
* <p>Retrieves information about a resource that was analyzed.</p><p><h3>See
446+
* <p>Retrieves information about a resource that was analyzed.</p> <p>This
447+
* action is supported only for external access analyzers.</p> <p><h3>See
441448
* Also:</h3> <a
442449
* href="http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/GetAnalyzedResource">AWS
443450
* API Reference</a></p>
@@ -522,7 +529,9 @@ class AWS_ACCESSANALYZER_API AccessAnalyzerClient : public Aws::Client::AWSJsonC
522529
* <p>Retrieves information about the specified finding. GetFinding and
523530
* GetFindingV2 both use <code>access-analyzer:GetFinding</code> in the
524531
* <code>Action</code> element of an IAM policy statement. You must have permission
525-
* to perform the <code>access-analyzer:GetFinding</code> action.</p><p><h3>See
532+
* to perform the <code>access-analyzer:GetFinding</code> action.</p>
533+
* <p>GetFinding is supported only for external access analyzers. You must use
534+
* GetFindingV2 for internal and unused access analyzers.</p> <p><h3>See
526535
* Also:</h3> <a
527536
* href="http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/GetFinding">AWS
528537
* API Reference</a></p>
@@ -802,7 +811,9 @@ class AWS_ACCESSANALYZER_API AccessAnalyzerClient : public Aws::Client::AWSJsonC
802811
* <code>access-analyzer:ListFindings</code> action.</p> <p>To learn about filter
803812
* keys that you can use to retrieve a list of findings, see <a
804813
* href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM
805-
* Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p><p><h3>See
814+
* Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
815+
* <p>ListFindings is supported only for external access analyzers. You must use
816+
* ListFindingsV2 for internal and unused access analyzers.</p> <p><h3>See
806817
* Also:</h3> <a
807818
* href="http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ListFindings">AWS
808819
* API Reference</a></p>
@@ -943,7 +954,8 @@ class AWS_ACCESSANALYZER_API AccessAnalyzerClient : public Aws::Client::AWSJsonC
943954

944955
/**
945956
* <p>Immediately starts a scan of the policies applied to the specified
946-
* resource.</p><p><h3>See Also:</h3> <a
957+
* resource.</p> <p>This action is supported only for external access
958+
* analyzers.</p> <p><h3>See Also:</h3> <a
947959
* href="http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/StartResourceScan">AWS
948960
* API Reference</a></p>
949961
*/
@@ -1019,7 +1031,8 @@ class AWS_ACCESSANALYZER_API AccessAnalyzerClient : public Aws::Client::AWSJsonC
10191031
}
10201032

10211033
/**
1022-
* <p>Modifies the configuration of an existing analyzer.</p><p><h3>See Also:</h3>
1034+
* <p>Modifies the configuration of an existing analyzer.</p> <p>This action
1035+
* is not supported for external access analyzers.</p> <p><h3>See Also:</h3>
10231036
* <a
10241037
* href="http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/UpdateAnalyzer">AWS
10251038
* API Reference</a></p>

generated/src/aws-cpp-sdk-accessanalyzer/include/aws/accessanalyzer/model/AnalyzerSummary.h

Lines changed: 13 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -75,8 +75,7 @@ class AnalyzerSummary {
7575

7676
///@{
7777
/**
78-
* <p>The type of analyzer, which corresponds to the zone of trust chosen for the
79-
* analyzer.</p>
78+
* <p>The type represents the zone of trust or scope for the analyzer.</p>
8079
*/
8180
inline Type GetType() const { return m_type; }
8281
inline bool TypeHasBeenSet() const { return m_typeHasBeenSet; }
@@ -146,7 +145,12 @@ class AnalyzerSummary {
146145

147146
///@{
148147
/**
149-
* <p>The tags added to the analyzer.</p>
148+
* <p>An array of key-value pairs applied to the analyzer. The key-value pairs
149+
* consist of the set of Unicode letters, digits, whitespace, <code>_</code>,
150+
* <code>.</code>, <code>/</code>, <code>=</code>, <code>+</code>, and
151+
* <code>-</code>.</p> <p>The tag key is a value that is 1 to 128 characters in
152+
* length and cannot be prefixed with <code>aws:</code>.</p> <p>The tag value is a
153+
* value that is 0 to 256 characters in length.</p>
150154
*/
151155
inline const Aws::Map<Aws::String, Aws::String>& GetTags() const { return m_tags; }
152156
inline bool TagsHasBeenSet() const { return m_tagsHasBeenSet; }
@@ -215,7 +219,12 @@ class AnalyzerSummary {
215219
///@{
216220
/**
217221
* <p>Specifies if the analyzer is an external access, unused access, or internal
218-
* access analyzer.</p>
222+
* access analyzer. The <a
223+
* href="https://docs.aws.amazon.com/access-analyzer/latest/APIReference/API_GetAnalyzer.html">GetAnalyzer</a>
224+
* action includes this property in its response if a configuration is specified,
225+
* while the <a
226+
* href="https://docs.aws.amazon.com/access-analyzer/latest/APIReference/API_ListAnalyzers.html">ListAnalyzers</a>
227+
* action omits it.</p>
219228
*/
220229
inline const AnalyzerConfiguration& GetConfiguration() const { return m_configuration; }
221230
inline bool ConfigurationHasBeenSet() const { return m_configurationHasBeenSet; }

generated/src/aws-cpp-sdk-accessanalyzer/include/aws/accessanalyzer/model/ResourceTypeDetails.h

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -61,12 +61,31 @@ class ResourceTypeDetails {
6161
return *this;
6262
}
6363
///@}
64+
65+
///@{
66+
/**
67+
* <p>The total number of active errors for the resource type.</p>
68+
*/
69+
inline int GetTotalActiveErrors() const { return m_totalActiveErrors; }
70+
inline bool TotalActiveErrorsHasBeenSet() const { return m_totalActiveErrorsHasBeenSet; }
71+
inline void SetTotalActiveErrors(int value) {
72+
m_totalActiveErrorsHasBeenSet = true;
73+
m_totalActiveErrors = value;
74+
}
75+
inline ResourceTypeDetails& WithTotalActiveErrors(int value) {
76+
SetTotalActiveErrors(value);
77+
return *this;
78+
}
79+
///@}
6480
private:
6581
int m_totalActivePublic{0};
6682
bool m_totalActivePublicHasBeenSet = false;
6783

6884
int m_totalActiveCrossAccount{0};
6985
bool m_totalActiveCrossAccountHasBeenSet = false;
86+
87+
int m_totalActiveErrors{0};
88+
bool m_totalActiveErrorsHasBeenSet = false;
7089
};
7190

7291
} // namespace Model

generated/src/aws-cpp-sdk-accessanalyzer/source/AccessAnalyzerClient.cpp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,7 @@ void AccessAnalyzerClient::init(const AccessAnalyzer::AccessAnalyzerClientConfig
165165
m_clientConfiguration.executor = m_clientConfiguration.configFactories.executorCreateFn();
166166
}
167167
AWS_CHECK_PTR(SERVICE_NAME, m_endpointProvider);
168-
m_endpointProvider->InitBuiltInParameters(config);
168+
m_endpointProvider->InitBuiltInParameters(config, "access-analyzer");
169169
}
170170

171171
void AccessAnalyzerClient::OverrideEndpoint(const Aws::String& endpoint) {

generated/src/aws-cpp-sdk-accessanalyzer/source/model/ResourceTypeDetails.cpp

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,10 @@ ResourceTypeDetails& ResourceTypeDetails::operator=(JsonView jsonValue) {
2626
m_totalActiveCrossAccount = jsonValue.GetInteger("totalActiveCrossAccount");
2727
m_totalActiveCrossAccountHasBeenSet = true;
2828
}
29+
if (jsonValue.ValueExists("totalActiveErrors")) {
30+
m_totalActiveErrors = jsonValue.GetInteger("totalActiveErrors");
31+
m_totalActiveErrorsHasBeenSet = true;
32+
}
2933
return *this;
3034
}
3135

@@ -40,6 +44,10 @@ JsonValue ResourceTypeDetails::Jsonize() const {
4044
payload.WithInteger("totalActiveCrossAccount", m_totalActiveCrossAccount);
4145
}
4246

47+
if (m_totalActiveErrorsHasBeenSet) {
48+
payload.WithInteger("totalActiveErrors", m_totalActiveErrors);
49+
}
50+
4351
return payload;
4452
}
4553

generated/src/aws-cpp-sdk-account/source/AccountClient.cpp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ void AccountClient::init(const Account::AccountClientConfiguration& config) {
141141
m_clientConfiguration.executor = m_clientConfiguration.configFactories.executorCreateFn();
142142
}
143143
AWS_CHECK_PTR(SERVICE_NAME, m_endpointProvider);
144-
m_endpointProvider->InitBuiltInParameters(config);
144+
m_endpointProvider->InitBuiltInParameters(config, "account");
145145
}
146146

147147
void AccountClient::OverrideEndpoint(const Aws::String& endpoint) {

generated/src/aws-cpp-sdk-acm-pca/source/ACMPCAClient.cpp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,7 @@ void ACMPCAClient::init(const ACMPCA::ACMPCAClientConfiguration& config) {
150150
m_clientConfiguration.executor = m_clientConfiguration.configFactories.executorCreateFn();
151151
}
152152
AWS_CHECK_PTR(SERVICE_NAME, m_endpointProvider);
153-
m_endpointProvider->InitBuiltInParameters(config);
153+
m_endpointProvider->InitBuiltInParameters(config, "acm-pca");
154154
}
155155

156156
void ACMPCAClient::OverrideEndpoint(const Aws::String& endpoint) {

generated/src/aws-cpp-sdk-acm/source/ACMClient.cpp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ void ACMClient::init(const ACM::ACMClientConfiguration& config) {
141141
m_clientConfiguration.executor = m_clientConfiguration.configFactories.executorCreateFn();
142142
}
143143
AWS_CHECK_PTR(SERVICE_NAME, m_endpointProvider);
144-
m_endpointProvider->InitBuiltInParameters(config);
144+
m_endpointProvider->InitBuiltInParameters(config, "acm");
145145
}
146146

147147
void ACMClient::OverrideEndpoint(const Aws::String& endpoint) {

0 commit comments

Comments
 (0)