Skip to content

Commit

Permalink
Updated service API models for release.
Browse files Browse the repository at this point in the history
  • Loading branch information
AWS SDK for Ruby authored and Nobody committed Oct 15, 2020
1 parent 055c310 commit b30397f
Show file tree
Hide file tree
Showing 32 changed files with 2,154 additions and 263 deletions.
30 changes: 30 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,36 @@
Unreleased Changes
------------------

* Feature - Aws::AccessAnalyzer - Updated the API, and documentation for Access Analyzer.

* Feature - Aws::Budgets - Updated the API, and documentation for AWS Budgets.

* Feature - Aws::CostExplorer - Updated the API, and documentation for AWS Cost Explorer Service.

* Feature - Aws::DatabaseMigrationService - Updated the API, and documentation for AWS Database Migration Service.

* Feature - Aws::Glue - Updated the documentation for AWS Glue.

* Feature - Aws::GroundStation - Updated the API, and documentation for AWS Ground Station.

* Feature - Aws::IoT - Updated the API, and documentation for AWS IoT.

* Feature - Aws::Macie2 - Updated the API, and documentation for Amazon Macie 2.

* Feature - Aws::RDS - Updated the API, and documentation for Amazon Relational Database Service.

* Feature - Aws::Rekognition - Updated the API, and documentation for Amazon Rekognition.

* Feature - Aws::SSM - Updated the API, and documentation for Amazon Simple Systems Manager (SSM).

* Feature - Aws::Transfer - Updated the API, and documentation for AWS Transfer Family.

* Feature - Aws::WorkMail - Updated the API, and documentation for Amazon WorkMail.

* Feature - Aws::WorkSpaces - Updated the documentation for Amazon WorkSpaces.

* Feature - Aws::XRay - Updated the API, and documentation for AWS X-Ray.

2.11.605 (2020-10-09)
------------------

Expand Down
50 changes: 42 additions & 8 deletions aws-sdk-core/apis/accessanalyzer/2019-11-01/api-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,23 @@
"uid":"accessanalyzer-2019-11-01"
},
"operations":{
"ApplyArchiveRule":{
"name":"ApplyArchiveRule",
"http":{
"method":"PUT",
"requestUri":"/archive-rule",
"responseCode":200
},
"input":{"shape":"ApplyArchiveRuleRequest"},
"errors":[
{"shape":"ResourceNotFoundException"},
{"shape":"ValidationException"},
{"shape":"InternalServerException"},
{"shape":"ThrottlingException"},
{"shape":"AccessDeniedException"}
],
"idempotent":true
},
"CreateAnalyzer":{
"name":"CreateAnalyzer",
"http":{
Expand Down Expand Up @@ -419,6 +436,21 @@
"type":"list",
"member":{"shape":"AnalyzerSummary"}
},
"ApplyArchiveRuleRequest":{
"type":"structure",
"required":[
"analyzerArn",
"ruleName"
],
"members":{
"analyzerArn":{"shape":"AnalyzerArn"},
"clientToken":{
"shape":"String",
"idempotencyToken":true
},
"ruleName":{"shape":"Name"}
}
},
"ArchiveRuleSummary":{
"type":"structure",
"required":[
Expand Down Expand Up @@ -620,8 +652,8 @@
"FindingSourceType":{
"type":"string",
"enum":[
"BUCKET_ACL",
"POLICY",
"BUCKET_ACL",
"S3_ACCESS_POINT"
]
},
Expand Down Expand Up @@ -799,7 +831,8 @@
},
"error":{"httpStatusCode":500},
"exception":true,
"fault":true
"fault":true,
"retryable":{"throttling":false}
},
"ListAnalyzedResourcesRequest":{
"type":"structure",
Expand Down Expand Up @@ -964,12 +997,12 @@
"ResourceType":{
"type":"string",
"enum":[
"AWS::S3::Bucket",
"AWS::IAM::Role",
"AWS::KMS::Key",
"AWS::SQS::Queue",
"AWS::Lambda::Function",
"AWS::Lambda::LayerVersion",
"AWS::S3::Bucket",
"AWS::SQS::Queue"
"AWS::KMS::Key"
]
},
"ServiceQuotaExceededException":{
Expand Down Expand Up @@ -1064,7 +1097,8 @@
"httpStatusCode":429,
"senderFault":true
},
"exception":true
"exception":true,
"retryable":{"throttling":true}
},
"Timestamp":{
"type":"timestamp",
Expand Down Expand Up @@ -1179,10 +1213,10 @@
"ValidationExceptionReason":{
"type":"string",
"enum":[
"unknownOperation",
"cannotParse",
"fieldValidationFailed",
"other",
"unknownOperation"
"other"
]
},
"ValueList":{
Expand Down
11 changes: 10 additions & 1 deletion aws-sdk-core/apis/accessanalyzer/2019-11-01/docs-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,9 @@
"version": "2.0",
"service": "<p>AWS IAM Access Analyzer helps identify potential resource-access risks by enabling you to identify any policies that grant access to an external principal. It does this by using logic-based reasoning to analyze resource-based policies in your AWS environment. An external principal can be another AWS account, a root user, an IAM user or role, a federated user, an AWS service, or an anonymous user. This guide describes the AWS IAM Access Analyzer operations that you can call programmatically. For general information about Access Analyzer, see the <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html\">AWS IAM Access Analyzer section of the IAM User Guide</a>.</p> <p>To start using Access Analyzer, you first need to create an analyzer.</p>",
"operations": {
"ApplyArchiveRule": "<p>Retroactively applies the archive rule to existing findings that meet the archive rule criteria.</p>",
"CreateAnalyzer": "<p>Creates an analyzer for your account.</p>",
"CreateArchiveRule": "<p>Creates an archive rule for the specified analyzer. Archive rules automatically archive findings that meet the criteria you define when you create the rule.</p>",
"CreateArchiveRule": "<p>Creates an archive rule for the specified analyzer. Archive rules automatically archive new findings that meet the criteria you define when you create the rule.</p>",
"DeleteAnalyzer": "<p>Deletes the specified analyzer. When you delete an analyzer, Access Analyzer is disabled for the account in the current or specific Region. All findings that were generated by the analyzer are deleted. You cannot undo this action.</p>",
"DeleteArchiveRule": "<p>Deletes the specified archive rule.</p>",
"GetAnalyzedResource": "<p>Retrieves information about a resource that was analyzed.</p>",
Expand Down Expand Up @@ -57,6 +58,7 @@
"base": null,
"refs": {
"AnalyzerSummary$arn": "<p>The ARN of the analyzer.</p>",
"ApplyArchiveRuleRequest$analyzerArn": "<p>The Amazon resource name (ARN) of the analyzer.</p>",
"CreateAnalyzerResponse$arn": "<p>The ARN of the analyzer that was created by the request.</p>",
"GetAnalyzedResourceRequest$analyzerArn": "<p>The ARN of the analyzer to retrieve information from.</p>",
"GetFindingRequest$analyzerArn": "<p>The ARN of the analyzer that generated the finding.</p>",
Expand Down Expand Up @@ -85,6 +87,11 @@
"ListAnalyzersResponse$analyzers": "<p>The analyzers retrieved.</p>"
}
},
"ApplyArchiveRuleRequest": {
"base": "<p>Retroactively applies an archive rule.</p>",
"refs": {
}
},
"ArchiveRuleSummary": {
"base": "<p>Contains information about an archive rule.</p>",
"refs": {
Expand Down Expand Up @@ -354,6 +361,7 @@
"base": null,
"refs": {
"AnalyzerSummary$name": "<p>The name of the analyzer.</p>",
"ApplyArchiveRuleRequest$ruleName": "<p>The name of the rule to apply.</p>",
"ArchiveRuleSummary$ruleName": "<p>The name of the archive rule.</p>",
"CreateAnalyzerRequest$analyzerName": "<p>The name of the analyzer to create.</p>",
"CreateArchiveRuleRequest$analyzerName": "<p>The name of the created analyzer.</p>",
Expand Down Expand Up @@ -451,6 +459,7 @@
"AnalyzedResource$resourceOwnerAccount": "<p>The AWS account ID that owns the resource.</p>",
"AnalyzedResourceSummary$resourceOwnerAccount": "<p>The AWS account ID that owns the resource.</p>",
"AnalyzerSummary$lastResourceAnalyzed": "<p>The resource that was most recently analyzed by the analyzer.</p>",
"ApplyArchiveRuleRequest$clientToken": "<p>A client token.</p>",
"ConditionKeyMap$key": null,
"ConditionKeyMap$value": null,
"ConflictException$message": null,
Expand Down
Loading

0 comments on commit b30397f

Please sign in to comment.