|
91151 | 91151 | "properties": {
|
91152 | 91152 | "CloudWatchLogsConfiguration": {
|
91153 | 91153 | "$ref": "#/definitions/AWS::FIS::ExperimentTemplate.CloudWatchLogsConfiguration",
|
91154 |
| - "markdownDescription": "The configuration for experiment logging to Amazon CloudWatch Logs.", |
| 91154 | + "markdownDescription": "The configuration for experiment logging to CloudWatch Logs .", |
91155 | 91155 | "title": "CloudWatchLogsConfiguration"
|
91156 | 91156 | },
|
91157 | 91157 | "LogSchemaVersion": {
|
|
91161 | 91161 | },
|
91162 | 91162 | "S3Configuration": {
|
91163 | 91163 | "$ref": "#/definitions/AWS::FIS::ExperimentTemplate.S3Configuration",
|
91164 |
| - "markdownDescription": "The configuration for experiment logging to Amazon S3.", |
| 91164 | + "markdownDescription": "The configuration for experiment logging to Amazon S3 .", |
91165 | 91165 | "title": "S3Configuration"
|
91166 | 91166 | }
|
91167 | 91167 | },
|
|
91202 | 91202 | },
|
91203 | 91203 | "Parameters": {
|
91204 | 91204 | "additionalProperties": true,
|
91205 |
| - "markdownDescription": "The resource type parameters.", |
| 91205 | + "markdownDescription": "The parameters for the resource type.", |
91206 | 91206 | "patternProperties": {
|
91207 | 91207 | "^[a-zA-Z0-9]+$": {
|
91208 | 91208 | "type": "string"
|
@@ -125688,7 +125688,7 @@
|
125688 | 125688 | "items": {
|
125689 | 125689 | "type": "string"
|
125690 | 125690 | },
|
125691 |
| - "markdownDescription": "A list of glob patterns for documents that should not be indexed. If a document that matches an inclusion prefix or inclusion pattern also matches an exclusion pattern, the document is not indexed.\n\nSome [examples](https://docs.aws.amazon.com/cli/latest/reference/s3/#use-of-exclude-and-include-filters) are:\n\n- **.png , *.jpg* will exclude all PNG and JPEG image files in a directory (files with the extensions .png and .jpg).\n- **internal** will exclude all files in a directory that contain 'internal' in the file name, such as 'internal', 'internal_only', 'company_internal'.\n- ***/*internal** will exclude all internal-related files in a directory and its subdirectories.", |
| 125691 | + "markdownDescription": "A list of glob patterns (patterns that can expand a wildcard pattern into a list of path names that match the given pattern) for file names and file types that should not be indexed. If a document that matches an inclusion prefix or inclusion pattern also matches an exclusion pattern, the document is not indexed. Examples of glob patterns include:\n\n- `/myapp/config/*` - All files inside config directory\n- `/**/*.png` - All .png files in all directories\n- `/**/*.{png,ico,md}` - All .png, .ico or .md files in all directories\n- `/myapp/src/**/*.ts` - All .ts files inside src directory (and all its subdirectories)\n- `**/!(*.module).ts` - All .ts files but not .module.ts\n- **.png , *.jpg* will exclude all PNG and JPEG image files in a directory (files with the extensions .png and .jpg).\n- **internal** will exclude all files in a directory that contain 'internal' in the file name, such as 'internal', 'internal_only', 'company_internal'.\n- ***/*internal** will exclude all internal-related files in a directory and its subdirectories.\n\nFor more examples, see [Use of Exclude and Include Filters](https://docs.aws.amazon.com/cli/latest/reference/s3/#use-of-exclude-and-include-filters) in the AWS CLI Command Reference.", |
125692 | 125692 | "title": "ExclusionPatterns",
|
125693 | 125693 | "type": "array"
|
125694 | 125694 | },
|
@@ -213124,7 +213124,7 @@
|
213124 | 213124 | "type": "number"
|
213125 | 213125 | },
|
213126 | 213126 | "CACertificateIdentifier": {
|
213127 |
| - "markdownDescription": "The identifier of the CA certificate for this DB instance.\n\n> Specifying or updating this property triggers a reboot. \n\nFor more information about CA certificate identifiers for RDS DB engines, see [Rotating Your SSL/TLS Certificate](https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/UsingWithRDS.SSL-certificate-rotation.html) in the *Amazon RDS User Guide* .\n\nFor more information about CA certificate identifiers for Aurora DB engines, see [Rotating Your SSL/TLS Certificate](https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/UsingWithRDS.SSL-certificate-rotation.html) in the *Amazon Aurora User Guide* .", |
| 213127 | + "markdownDescription": "The identifier of the CA certificate for this DB instance.\n\nSpecifying or updating this property triggers a reboot. For more information about CA certificate identifiers for RDS DB engines, see [Rotating Your SSL/TLS Certificate](https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/UsingWithRDS.SSL-certificate-rotation.html) in the *Amazon RDS User Guide* . For more information about CA certificate identifiers for Aurora DB engines, see [Rotating Your SSL/TLS Certificate](https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/UsingWithRDS.SSL-certificate-rotation.html) in the *Amazon Aurora User Guide* .", |
213128 | 213128 | "title": "CACertificateIdentifier",
|
213129 | 213129 | "type": "string"
|
213130 | 213130 | },
|
@@ -219290,51 +219290,51 @@
|
219290 | 219290 | "additionalProperties": false,
|
219291 | 219291 | "properties": {
|
219292 | 219292 | "DurationSeconds": {
|
219293 |
| - "markdownDescription": "The number of seconds vended session credentials will be valid for", |
| 219293 | + "markdownDescription": "Sets the maximum number of seconds that vended temporary credentials through [CreateSession](https://docs.aws.amazon.com/rolesanywhere/latest/userguide/authentication-create-session.html) will be valid for, between 900 and 3600.", |
219294 | 219294 | "title": "DurationSeconds",
|
219295 | 219295 | "type": "number"
|
219296 | 219296 | },
|
219297 | 219297 | "Enabled": {
|
219298 |
| - "markdownDescription": "The enabled status of the resource.", |
| 219298 | + "markdownDescription": "Indicates whether the profile is enabled.", |
219299 | 219299 | "title": "Enabled",
|
219300 | 219300 | "type": "boolean"
|
219301 | 219301 | },
|
219302 | 219302 | "ManagedPolicyArns": {
|
219303 | 219303 | "items": {
|
219304 | 219304 | "type": "string"
|
219305 | 219305 | },
|
219306 |
| - "markdownDescription": "A list of managed policy ARNs. Managed policies identified by this list will be applied to the vended session credentials.", |
| 219306 | + "markdownDescription": "A list of managed policy ARNs that apply to the vended session credentials.", |
219307 | 219307 | "title": "ManagedPolicyArns",
|
219308 | 219308 | "type": "array"
|
219309 | 219309 | },
|
219310 | 219310 | "Name": {
|
219311 |
| - "markdownDescription": "The customer specified name of the resource.", |
| 219311 | + "markdownDescription": "The name of the profile.", |
219312 | 219312 | "title": "Name",
|
219313 | 219313 | "type": "string"
|
219314 | 219314 | },
|
219315 | 219315 | "RequireInstanceProperties": {
|
219316 |
| - "markdownDescription": "Specifies whether instance properties are required in CreateSession requests with this profile.", |
| 219316 | + "markdownDescription": "Specifies whether instance properties are required in temporary credential requests with this profile.", |
219317 | 219317 | "title": "RequireInstanceProperties",
|
219318 | 219318 | "type": "boolean"
|
219319 | 219319 | },
|
219320 | 219320 | "RoleArns": {
|
219321 | 219321 | "items": {
|
219322 | 219322 | "type": "string"
|
219323 | 219323 | },
|
219324 |
| - "markdownDescription": "A list of IAM role ARNs that can be assumed when this profile is specified in a CreateSession request.", |
| 219324 | + "markdownDescription": "A list of IAM role ARNs. During `CreateSession` , if a matching role ARN is provided, the properties in this profile will be applied to the intersection session policy.", |
219325 | 219325 | "title": "RoleArns",
|
219326 | 219326 | "type": "array"
|
219327 | 219327 | },
|
219328 | 219328 | "SessionPolicy": {
|
219329 |
| - "markdownDescription": "A session policy that will applied to the trust boundary of the vended session credentials.", |
| 219329 | + "markdownDescription": "A session policy that applies to the trust boundary of the vended session credentials.", |
219330 | 219330 | "title": "SessionPolicy",
|
219331 | 219331 | "type": "string"
|
219332 | 219332 | },
|
219333 | 219333 | "Tags": {
|
219334 | 219334 | "items": {
|
219335 | 219335 | "$ref": "#/definitions/Tag"
|
219336 | 219336 | },
|
219337 |
| - "markdownDescription": "A list of Tags.", |
| 219337 | + "markdownDescription": "The tags to attach to the profile.", |
219338 | 219338 | "title": "Tags",
|
219339 | 219339 | "type": "array"
|
219340 | 219340 | }
|
@@ -219495,11 +219495,11 @@
|
219495 | 219495 | "properties": {
|
219496 | 219496 | "SourceData": {
|
219497 | 219497 | "$ref": "#/definitions/AWS::RolesAnywhere::TrustAnchor.SourceData",
|
219498 |
| - "markdownDescription": "A union object representing the data field of the TrustAnchor depending on its type", |
| 219498 | + "markdownDescription": "The data field of the trust anchor depending on its type.", |
219499 | 219499 | "title": "SourceData"
|
219500 | 219500 | },
|
219501 | 219501 | "SourceType": {
|
219502 |
| - "markdownDescription": "The type of the TrustAnchor.", |
| 219502 | + "markdownDescription": "The type of the TrustAnchor.\n\n> `AWS_ACM_PCA` is not an allowed value in your region.", |
219503 | 219503 | "title": "SourceType",
|
219504 | 219504 | "type": "string"
|
219505 | 219505 | }
|
|
0 commit comments