Skip to content

Commit 25ab1d7

Browse files
AWS SDK for RubyNobody
authored andcommitted
Updated API models and rebuilt service gems.
1 parent 1dcbc8c commit 25ab1d7

File tree

1,327 files changed

+47133
-3689
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,327 files changed

+47133
-3689
lines changed

README.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -303,6 +303,7 @@ RubyGems.org page under "LINKS" section.
303303
| AWS Audit Manager | Aws::AuditManager | aws-sdk-auditmanager | 2017-07-25 |
304304
| AWS Auto Scaling Plans | Aws::AutoScalingPlans | aws-sdk-autoscalingplans | 2018-01-06 |
305305
| AWS Backup | Aws::Backup | aws-sdk-backup | 2018-11-15 |
306+
| AWS Backup Gateway | Aws::BackupGateway | aws-sdk-backupgateway | 2021-01-01 |
306307
| AWS Batch | Aws::Batch | aws-sdk-batch | 2016-08-10 |
307308
| AWS Budgets | Aws::Budgets | aws-sdk-budgets | 2016-10-20 |
308309
| AWS Certificate Manager | Aws::ACM | aws-sdk-acm | 2015-12-08 |
@@ -363,6 +364,7 @@ RubyGems.org page under "LINKS" section.
363364
| AWS IoT Secure Tunneling | Aws::IoTSecureTunneling | aws-sdk-iotsecuretunneling | 2018-10-05 |
364365
| AWS IoT SiteWise | Aws::IoTSiteWise | aws-sdk-iotsitewise | 2019-12-02 |
365366
| AWS IoT Things Graph | Aws::IoTThingsGraph | aws-sdk-iotthingsgraph | 2018-09-06 |
367+
| AWS IoT TwinMaker | Aws::IoTTwinMaker | aws-sdk-iottwinmaker | 2021-11-29 |
366368
| AWS IoT Wireless | Aws::IoTWireless | aws-sdk-iotwireless | 2020-11-22 |
367369
| AWS Key Management Service | Aws::KMS | aws-sdk-kms | 2014-11-01 |
368370
| AWS Lake Formation | Aws::LakeFormation | aws-sdk-lakeformation | 2017-03-31 |
@@ -561,6 +563,7 @@ RubyGems.org page under "LINKS" section.
561563
| Amazon WorkMail | Aws::WorkMail | aws-sdk-workmail | 2017-10-01 |
562564
| Amazon WorkMail Message Flow | Aws::WorkMailMessageFlow | aws-sdk-workmailmessageflow | 2019-05-01 |
563565
| Amazon WorkSpaces | Aws::WorkSpaces | aws-sdk-workspaces | 2015-04-08 |
566+
| Amazon WorkSpaces Web | Aws::WorkSpacesWeb | aws-sdk-workspacesweb | 2020-07-08 |
564567
| AmazonApiGatewayManagementApi | Aws::ApiGatewayManagementApi | aws-sdk-apigatewaymanagementapi | 2018-11-29 |
565568
| AmazonApiGatewayV2 | Aws::ApiGatewayV2 | aws-sdk-apigatewayv2 | 2018-11-29 |
566569
| AmazonMQ | Aws::MQ | aws-sdk-mq | 2017-11-27 |

apis/accessanalyzer/2019-11-01/api-2.json

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2151,9 +2151,19 @@
21512151
"locationName":"nextToken"
21522152
},
21532153
"policyDocument":{"shape":"PolicyDocument"},
2154-
"policyType":{"shape":"PolicyType"}
2154+
"policyType":{"shape":"PolicyType"},
2155+
"validatePolicyResourceType":{"shape":"ValidatePolicyResourceType"}
21552156
}
21562157
},
2158+
"ValidatePolicyResourceType":{
2159+
"type":"string",
2160+
"enum":[
2161+
"AWS::S3::Bucket",
2162+
"AWS::S3::AccessPoint",
2163+
"AWS::S3::MultiRegionAccessPoint",
2164+
"AWS::S3ObjectLambda::AccessPoint"
2165+
]
2166+
},
21572167
"ValidatePolicyResponse":{
21582168
"type":"structure",
21592169
"required":["findings"],

apis/accessanalyzer/2019-11-01/docs-2.json

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1004,15 +1004,15 @@
10041004
}
10051005
},
10061006
"SecretsManagerSecretConfiguration": {
1007-
"base": "<p>The configuration for a Secrets Manager secret. For more information, see <a href=\"https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_CreateSecret.html\">CreateSecret</a>.</p> <p>You can propose a configuration for a new secret or an existing secret that you own by specifying the secret policy and optional KMS encryption key. If the configuration is for an existing secret and you do not specify the secret policy, the access preview uses the existing policy for the secret. If the access preview is for a new resource and you do not specify the policy, the access preview assumes a secret without a policy. To propose deletion of an existing policy, you can specify an empty string. If the proposed configuration is for a new secret and you do not specify the KMS key ID, the access preview uses the default CMK of the Amazon Web Services account. If you specify an empty string for the KMS key ID, the access preview uses the default CMK of the Amazon Web Services account. For more information about secret policy limits, see <a href=\"https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_limits.html\">Quotas for Secrets Manager.</a>.</p>",
1007+
"base": "<p>The configuration for a Secrets Manager secret. For more information, see <a href=\"https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_CreateSecret.html\">CreateSecret</a>.</p> <p>You can propose a configuration for a new secret or an existing secret that you own by specifying the secret policy and optional KMS encryption key. If the configuration is for an existing secret and you do not specify the secret policy, the access preview uses the existing policy for the secret. If the access preview is for a new resource and you do not specify the policy, the access preview assumes a secret without a policy. To propose deletion of an existing policy, you can specify an empty string. If the proposed configuration is for a new secret and you do not specify the KMS key ID, the access preview uses the Amazon Web Services managed key <code>aws/secretsmanager</code>. If you specify an empty string for the KMS key ID, the access preview uses the Amazon Web Services managed key of the Amazon Web Services account. For more information about secret policy limits, see <a href=\"https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_limits.html\">Quotas for Secrets Manager.</a>.</p>",
10081008
"refs": {
10091009
"Configuration$secretsManagerSecret": "<p>The access control configuration is for a Secrets Manager secret.</p>"
10101010
}
10111011
},
10121012
"SecretsManagerSecretKmsId": {
10131013
"base": null,
10141014
"refs": {
1015-
"SecretsManagerSecretConfiguration$kmsKeyId": "<p>The proposed ARN, key ID, or alias of the KMS customer master key (CMK).</p>"
1015+
"SecretsManagerSecretConfiguration$kmsKeyId": "<p>The proposed ARN, key ID, or alias of the KMS key.</p>"
10161016
}
10171017
},
10181018
"SecretsManagerSecretPolicy": {
@@ -1302,6 +1302,12 @@
13021302
"refs": {
13031303
}
13041304
},
1305+
"ValidatePolicyResourceType": {
1306+
"base": null,
1307+
"refs": {
1308+
"ValidatePolicyRequest$validatePolicyResourceType": "<p>The type of resource to attach to your resource policy. Specify a value for the policy validation resource type only if the policy type is <code>RESOURCE_POLICY</code>. For example, to validate a resource policy to attach to an Amazon S3 bucket, you can choose <code>AWS::S3::Bucket</code> for the policy validation resource type.</p> <p>For resource types not supported as valid values, IAM Access Analyzer runs policy checks that apply to all resource policies. For example, to validate a resource policy to attach to a KMS key, do not specify a value for the policy validation resource type and IAM Access Analyzer will run policy checks that apply to all resource policies.</p>"
1309+
}
1310+
},
13051311
"ValidatePolicyResponse": {
13061312
"base": null,
13071313
"refs": {

0 commit comments

Comments
 (0)