Skip to content

Commit

Permalink
Updated API models and rebuilt service gems.
Browse files Browse the repository at this point in the history
  • Loading branch information
aws-sdk-ruby-automation committed Sep 17, 2024
1 parent 25675cf commit a55ab85
Show file tree
Hide file tree
Showing 67 changed files with 2,014 additions and 409 deletions.
3 changes: 2 additions & 1 deletion apis/codebuild/2016-10-06/api-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -2911,7 +2911,8 @@
"type":"string",
"enum":[
"GITHUB_ORGANIZATION",
"GITHUB_GLOBAL"
"GITHUB_GLOBAL",
"GITLAB_GROUP"
]
},
"WrapperBoolean":{"type":"boolean"},
Expand Down
6 changes: 3 additions & 3 deletions apis/codebuild/2016-10-06/docs-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -1840,8 +1840,8 @@
"S3LogsConfig$location": "<p> The ARN of an S3 bucket and the path prefix for S3 logs. If your Amazon S3 bucket name is <code>my-bucket</code>, and your path prefix is <code>build-log</code>, then acceptable formats are <code>my-bucket/build-log</code> or <code>arn:aws:s3:::my-bucket/build-log</code>. </p>",
"S3ReportExportConfig$bucketOwner": "<p>The Amazon Web Services account identifier of the owner of the Amazon S3 bucket. This allows report data to be exported to an Amazon S3 bucket that is owned by an account other than the account running the build.</p>",
"S3ReportExportConfig$path": "<p> The path to the exported report's raw data results. </p>",
"ScopeConfiguration$name": "<p>The name of either the enterprise or organization that will send webhook events to CodeBuild, depending on if the webhook is a global or organization webhook respectively.</p>",
"ScopeConfiguration$domain": "<p>The domain of the GitHub Enterprise organization. Note that this parameter is only required if your project's source type is GITHUB_ENTERPRISE</p>",
"ScopeConfiguration$name": "<p>The name of either the group, enterprise, or organization that will send webhook events to CodeBuild, depending on the type of webhook.</p>",
"ScopeConfiguration$domain": "<p>The domain of the GitHub Enterprise organization or the GitLab Self Managed group. Note that this parameter is only required if your project's source type is GITHUB_ENTERPRISE or GITLAB_SELF_MANAGED.</p>",
"SourceAuth$resource": "<p>The resource value that applies to the specified authorization type.</p>",
"SourceCredentialsInfo$resource": "<p>The connection ARN if your authType is CODECONNECTIONS or SECRETS_MANAGER.</p>",
"StartBuildBatchInput$sourceVersion": "<p>The version of the batch build input to be built, for this build only. If not specified, the latest version is used. If specified, the contents depends on the source provider:</p> <dl> <dt>CodeCommit</dt> <dd> <p>The commit ID, branch, or Git tag to use.</p> </dd> <dt>GitHub</dt> <dd> <p>The commit ID, pull request ID, branch name, or tag name that corresponds to the version of the source code you want to build. If a pull request ID is specified, it must use the format <code>pr/pull-request-ID</code> (for example <code>pr/25</code>). If a branch name is specified, the branch's HEAD commit ID is used. If not specified, the default branch's HEAD commit ID is used.</p> </dd> <dt>Bitbucket</dt> <dd> <p>The commit ID, branch name, or tag name that corresponds to the version of the source code you want to build. If a branch name is specified, the branch's HEAD commit ID is used. If not specified, the default branch's HEAD commit ID is used.</p> </dd> <dt>Amazon S3</dt> <dd> <p>The version ID of the object that represents the build input ZIP file to use.</p> </dd> </dl> <p>If <code>sourceVersion</code> is specified at the project level, then this <code>sourceVersion</code> (at the build level) takes precedence. </p> <p>For more information, see <a href=\"https://docs.aws.amazon.com/codebuild/latest/userguide/sample-source-version.html\">Source Version Sample with CodeBuild</a> in the <i>CodeBuild User Guide</i>. </p>",
Expand Down Expand Up @@ -2065,7 +2065,7 @@
"WebhookScopeType": {
"base": null,
"refs": {
"ScopeConfiguration$scope": "<p>The type of scope for a GitHub webhook.</p>"
"ScopeConfiguration$scope": "<p>The type of scope for a GitHub or GitLab webhook.</p>"
}
},
"WrapperBoolean": {
Expand Down
10 changes: 8 additions & 2 deletions apis/ecr/2015-09-21/api-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -1333,7 +1333,9 @@
"status":{"shape":"Status"},
"title":{"shape":"Title"},
"type":{"shape":"Type"},
"updatedAt":{"shape":"Date"}
"updatedAt":{"shape":"Date"},
"fixAvailable":{"shape":"FixAvailable"},
"exploitAvailable":{"shape":"ExploitAvailable"}
}
},
"EnhancedImageScanFindingList":{
Expand All @@ -1344,6 +1346,7 @@
"EvaluationTimestamp":{"type":"timestamp"},
"ExceptionMessage":{"type":"string"},
"ExpirationTimestamp":{"type":"timestamp"},
"ExploitAvailable":{"type":"string"},
"FilePath":{"type":"string"},
"FindingArn":{"type":"string"},
"FindingDescription":{"type":"string"},
Expand All @@ -1364,6 +1367,8 @@
"key":{"shape":"FindingSeverity"},
"value":{"shape":"SeverityCount"}
},
"FixAvailable":{"type":"string"},
"FixedInVersion":{"type":"string"},
"ForceFlag":{"type":"boolean"},
"GetAccountSettingRequest":{
"type":"structure",
Expand Down Expand Up @@ -2931,7 +2936,8 @@
"packageManager":{"shape":"PackageManager"},
"release":{"shape":"Release"},
"sourceLayerHash":{"shape":"SourceLayerHash"},
"version":{"shape":"Version"}
"version":{"shape":"Version"},
"fixedInVersion":{"shape":"FixedInVersion"}
}
},
"VulnerablePackageName":{"type":"string"},
Expand Down
20 changes: 19 additions & 1 deletion apis/ecr/2015-09-21/docs-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -471,7 +471,7 @@
"EncryptionType": {
"base": null,
"refs": {
"EncryptionConfiguration$encryptionType": "<p>The encryption type to use.</p> <p>If you use the <code>KMS</code> encryption type, the contents of the repository will be encrypted using server-side encryption with Key Management Service key stored in KMS. When you use KMS to encrypt your data, you can either use the default Amazon Web Services managed KMS key for Amazon ECR, or specify your own KMS key, which you already created.</p> <p>If you use the <code>KMS_DSSE</code> encryption type, the contents of the repository will be encrypted with two layers of encryption using server-side encryption with the KMS Management Service key stored in KMS. Similar to the KMS encryption type, you can either use the default Amazon Web Services managed KMS key for Amazon ECR, or specify your own KMS key, which you've already created. </p> <p>If you use the <code>AES256</code> encryption type, Amazon ECR uses server-side encryption with Amazon S3-managed encryption keys which encrypts the images in the repository using an AES256 encryption algorithm. For more information, see <a href=\"https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingServerSideEncryption.html\">Protecting data using server-side encryption with Amazon S3-managed encryption keys (SSE-S3)</a> in the <i>Amazon Simple Storage Service Console Developer Guide</i>.</p>",
"EncryptionConfiguration$encryptionType": "<p>The encryption type to use.</p> <p>If you use the <code>KMS</code> encryption type, the contents of the repository will be encrypted using server-side encryption with Key Management Service key stored in KMS. When you use KMS to encrypt your data, you can either use the default Amazon Web Services managed KMS key for Amazon ECR, or specify your own KMS key, which you already created.</p> <p>If you use the <code>KMS_DSSE</code> encryption type, the contents of the repository will be encrypted with two layers of encryption using server-side encryption with the KMS Management Service key stored in KMS. Similar to the <code>KMS</code> encryption type, you can either use the default Amazon Web Services managed KMS key for Amazon ECR, or specify your own KMS key, which you've already created. </p> <p>If you use the <code>AES256</code> encryption type, Amazon ECR uses server-side encryption with Amazon S3-managed encryption keys which encrypts the images in the repository using an AES256 encryption algorithm.</p> <p>For more information, see <a href=\"https://docs.aws.amazon.com/AmazonECR/latest/userguide/encryption-at-rest.html\">Amazon ECR encryption at rest</a> in the <i>Amazon Elastic Container Registry User Guide</i>.</p>",
"EncryptionConfigurationForRepositoryCreationTemplate$encryptionType": "<p>The encryption type to use.</p> <p>If you use the <code>KMS</code> encryption type, the contents of the repository will be encrypted using server-side encryption with Key Management Service key stored in KMS. When you use KMS to encrypt your data, you can either use the default Amazon Web Services managed KMS key for Amazon ECR, or specify your own KMS key, which you already created. For more information, see <a href=\"https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingKMSEncryption.html\">Protecting data using server-side encryption with an KMS key stored in Key Management Service (SSE-KMS)</a> in the <i>Amazon Simple Storage Service Console Developer Guide</i>.</p> <p>If you use the <code>AES256</code> encryption type, Amazon ECR uses server-side encryption with Amazon S3-managed encryption keys which encrypts the images in the repository using an AES256 encryption algorithm. For more information, see <a href=\"https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingServerSideEncryption.html\">Protecting data using server-side encryption with Amazon S3-managed encryption keys (SSE-S3)</a> in the <i>Amazon Simple Storage Service Console Developer Guide</i>.</p>"
}
},
Expand Down Expand Up @@ -551,6 +551,12 @@
"AuthorizationData$expiresAt": "<p>The Unix time in seconds and milliseconds when the authorization token expires. Authorization tokens are valid for 12 hours.</p>"
}
},
"ExploitAvailable": {
"base": null,
"refs": {
"EnhancedImageScanFinding$exploitAvailable": "<p>If a finding discovered in your environment has an exploit available.</p>"
}
},
"FilePath": {
"base": null,
"refs": {
Expand Down Expand Up @@ -590,6 +596,18 @@
"ImageScanFindingsSummary$findingSeverityCounts": "<p>The image vulnerability counts, sorted by severity.</p>"
}
},
"FixAvailable": {
"base": null,
"refs": {
"EnhancedImageScanFinding$fixAvailable": "<p>Details on whether a fix is available through a version update. This value can be <code>YES</code>, <code>NO</code>, or <code>PARTIAL</code>. A <code>PARTIAL</code> fix means that some, but not all, of the packages identified in the finding have fixes available through updated versions.</p>"
}
},
"FixedInVersion": {
"base": null,
"refs": {
"VulnerablePackage$fixedInVersion": "<p>The version of the package that contains the vulnerability fix.</p>"
}
},
"ForceFlag": {
"base": null,
"refs": {
Expand Down
Loading

0 comments on commit a55ab85

Please sign in to comment.