Skip to content

Commit 4b14d07

Browse files
Updated API models and rebuilt service gems.
1 parent 0f13530 commit 4b14d07

File tree

43 files changed

+347
-186
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

43 files changed

+347
-186
lines changed

apis/config/2014-11-12/api-2.json

Lines changed: 92 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5369,7 +5369,98 @@
53695369
"AWS::S3Express::DirectoryBucket",
53705370
"AWS::SageMaker::InferenceExperiment",
53715371
"AWS::SecurityHub::Standard",
5372-
"AWS::Transfer::Profile"
5372+
"AWS::Transfer::Profile",
5373+
"AWS::CloudFormation::StackSet",
5374+
"AWS::MediaPackageV2::Channel",
5375+
"AWS::S3::AccessGrantsLocation",
5376+
"AWS::S3::AccessGrant",
5377+
"AWS::S3::AccessGrantsInstance",
5378+
"AWS::EMRServerless::Application",
5379+
"AWS::Config::AggregationAuthorization",
5380+
"AWS::Bedrock::ApplicationInferenceProfile",
5381+
"AWS::ApiGatewayV2::Integration",
5382+
"AWS::SageMaker::MlflowTrackingServer",
5383+
"AWS::SageMaker::ModelBiasJobDefinition",
5384+
"AWS::SecretsManager::RotationSchedule",
5385+
"AWS::Deadline::QueueFleetAssociation",
5386+
"AWS::ECR::RepositoryCreationTemplate",
5387+
"AWS::CloudFormation::LambdaHook",
5388+
"AWS::EC2::SubnetNetworkAclAssociation",
5389+
"AWS::ApiGateway::UsagePlan",
5390+
"AWS::AppConfig::Extension",
5391+
"AWS::Deadline::Fleet",
5392+
"AWS::EMR::Studio",
5393+
"AWS::S3Tables::TableBucket",
5394+
"AWS::CloudFront::RealtimeLogConfig",
5395+
"AWS::BackupGateway::Hypervisor",
5396+
"AWS::BCMDataExports::Export",
5397+
"AWS::CloudFormation::GuardHook",
5398+
"AWS::CloudFront::PublicKey",
5399+
"AWS::CloudTrail::EventDataStore",
5400+
"AWS::EntityResolution::IdMappingWorkflow",
5401+
"AWS::EntityResolution::SchemaMapping",
5402+
"AWS::IoT::DomainConfiguration",
5403+
"AWS::PCAConnectorAD::DirectoryRegistration",
5404+
"AWS::RDS::Integration",
5405+
"AWS::Config::ConformancePack",
5406+
"AWS::RolesAnywhere::Profile",
5407+
"AWS::CodeArtifact::Domain",
5408+
"AWS::Backup::RestoreTestingPlan",
5409+
"AWS::Config::StoredQuery",
5410+
"AWS::SageMaker::DataQualityJobDefinition",
5411+
"AWS::SageMaker::ModelExplainabilityJobDefinition",
5412+
"AWS::SageMaker::ModelQualityJobDefinition",
5413+
"AWS::SageMaker::StudioLifecycleConfig",
5414+
"AWS::SES::DedicatedIpPool",
5415+
"AWS::SES::MailManagerTrafficPolicy",
5416+
"AWS::SSM::ResourceDataSync",
5417+
"AWS::BedrockAgentCore::Runtime",
5418+
"AWS::BedrockAgentCore::BrowserCustom",
5419+
"AWS::ElasticLoadBalancingV2::TargetGroup",
5420+
"AWS::EMRContainers::VirtualCluster",
5421+
"AWS::EntityResolution::MatchingWorkflow",
5422+
"AWS::IoTCoreDeviceAdvisor::SuiteDefinition",
5423+
"AWS::EC2::SecurityGroupVpcAssociation",
5424+
"AWS::EC2::VerifiedAccessInstance",
5425+
"AWS::KafkaConnect::CustomPlugin",
5426+
"AWS::NetworkManager::TransitGatewayPeering",
5427+
"AWS::OpenSearchServerless::SecurityConfig",
5428+
"AWS::Redshift::Integration",
5429+
"AWS::RolesAnywhere::TrustAnchor",
5430+
"AWS::Route53Profiles::ProfileAssociation",
5431+
"AWS::SSMIncidents::ResponsePlan",
5432+
"AWS::Transfer::Server",
5433+
"AWS::Glue::Database",
5434+
"AWS::Organizations::OrganizationalUnit",
5435+
"AWS::EC2::IPAMPoolCidr",
5436+
"AWS::EC2::VPCGatewayAttachment",
5437+
"AWS::Bedrock::Prompt",
5438+
"AWS::Comprehend::Flywheel",
5439+
"AWS::DataSync::Agent",
5440+
"AWS::MediaTailor::LiveSource",
5441+
"AWS::MSK::ServerlessCluster",
5442+
"AWS::IoTSiteWise::Asset",
5443+
"AWS::B2BI::Capability",
5444+
"AWS::CloudFront::KeyValueStore",
5445+
"AWS::Deadline::Monitor",
5446+
"AWS::GuardDuty::MalwareProtectionPlan",
5447+
"AWS::Location::APIKey",
5448+
"AWS::MediaPackageV2::OriginEndpoint",
5449+
"AWS::PCAConnectorAD::Connector",
5450+
"AWS::S3Tables::TableBucketPolicy",
5451+
"AWS::SecretsManager::ResourcePolicy",
5452+
"AWS::SSMContacts::Contact",
5453+
"AWS::IoT::ThingGroup",
5454+
"AWS::ImageBuilder::LifecyclePolicy",
5455+
"AWS::GameLift::Build",
5456+
"AWS::ECR::ReplicationConfiguration",
5457+
"AWS::EC2::SubnetCidrBlock",
5458+
"AWS::Connect::SecurityProfile",
5459+
"AWS::CleanRoomsML::TrainingDataset",
5460+
"AWS::AppStream::AppBlockBuilder",
5461+
"AWS::Route53::DNSSEC",
5462+
"AWS::SageMaker::UserProfile",
5463+
"AWS::ApiGateway::Method"
53735464
]
53745465
},
53755466
"ResourceTypeList":{

apis/config/2014-11-12/docs-2.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3433,7 +3433,7 @@
34333433
"ConfigRuleEvaluationStatus$LastDebugLogDeliveryStatusReason": "<p>The reason Config was not able to deliver a debug log. This is for the last failed attempt to retrieve a debug log for your Config Custom Policy rules.</p>",
34343434
"ConfigStreamDeliveryInfo$lastErrorCode": "<p>The error code from the last attempted delivery.</p>",
34353435
"ConfigStreamDeliveryInfo$lastErrorMessage": "<p>The error message from the last attempted delivery.</p>",
3436-
"ConfigurationRecorder$roleARN": "<p>The Amazon Resource Name (ARN) of the IAM role assumed by Config and used by the specified configuration recorder.</p> <note> <p> <b>The server will reject a request without a defined <code>roleARN</code> for the configuration recorder</b> </p> <p>While the API model does not require this field, the server will reject a request without a defined <code>roleARN</code> for the configuration recorder.</p> <p> <b>Policies and compliance results</b> </p> <p> <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html\">IAM policies</a> and <a href=\"https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies.html\">other policies managed in Organizations</a> can impact whether Config has permissions to record configuration changes for your resources. Additionally, rules directly evaluate the configuration of a resource and rules don't take into account these policies when running evaluations. Make sure that the policies in effect align with how you intend to use Config.</p> <p> <b>Keep Minimum Permisions When Reusing an IAM role</b> </p> <p>If you use an Amazon Web Services service that uses Config, such as Security Hub or Control Tower, and an IAM role has already been created, make sure that the IAM role that you use when setting up Config keeps the same minimum permissions as the pre-existing IAM role. You must do this to ensure that the other Amazon Web Services service continues to run as expected. </p> <p>For example, if Control Tower has an IAM role that allows Config to read S3 objects, make sure that the same permissions are granted to the IAM role you use when setting up Config. Otherwise, it may interfere with how Control Tower operates.</p> <p> <b>The service-linked IAM role for Config must be used for service-linked configuration recorders</b> </p> <p>For service-linked configuration recorders, you must use the service-linked IAM role for Config: <a href=\"https://docs.aws.amazon.com/config/latest/developerguide/using-service-linked-roles.html\">AWSServiceRoleForConfig</a>.</p> </note>",
3436+
"ConfigurationRecorder$roleARN": "<p>The Amazon Resource Name (ARN) of the IAM role assumed by Config and used by the specified configuration recorder.</p> <note> <p> <b>The server will reject a request without a defined <code>roleARN</code> for the configuration recorder</b> </p> <p>While the API model does not require this field, the server will reject a request without a defined <code>roleARN</code> for the configuration recorder.</p> <p> <b>Policies and compliance results</b> </p> <p> <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html\">IAM policies</a> and <a href=\"https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies.html\">other policies managed in Organizations</a> can impact whether Config has permissions to record configuration changes for your resources. Additionally, rules directly evaluate the configuration of a resource and rules don't take into account these policies when running evaluations. Make sure that the policies in effect align with how you intend to use Config.</p> <p> <b>Keep Minimum Permisions When Reusing an IAM role</b> </p> <p>If you use an Amazon Web Services service that uses Config, such as Security Hub CSPM or Control Tower, and an IAM role has already been created, make sure that the IAM role that you use when setting up Config keeps the same minimum permissions as the pre-existing IAM role. You must do this to ensure that the other Amazon Web Services service continues to run as expected. </p> <p>For example, if Control Tower has an IAM role that allows Config to read S3 objects, make sure that the same permissions are granted to the IAM role you use when setting up Config. Otherwise, it may interfere with how Control Tower operates.</p> <p> <b>The service-linked IAM role for Config must be used for service-linked configuration recorders</b> </p> <p>For service-linked configuration recorders, you must use the service-linked IAM role for Config: <a href=\"https://docs.aws.amazon.com/config/latest/developerguide/using-service-linked-roles.html\">AWSServiceRoleForConfig</a>.</p> </note>",
34373437
"ConfigurationRecorderStatus$name": "<p>The name of the configuration recorder.</p>",
34383438
"ConfigurationRecorderStatus$lastErrorCode": "<p>The latest error code from when the recorder last failed.</p>",
34393439
"ConfigurationRecorderStatus$lastErrorMessage": "<p>The latest error message from when the recorder last failed.</p>",

apis/ec2/2016-11-15/api-2.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14294,6 +14294,7 @@
1429414294
"locationName":"TagSpecification"
1429514295
},
1429614296
"SpreadLevel":{"shape":"SpreadLevel"},
14297+
"LinkedGroupId":{"shape":"PlacementGroupId"},
1429714298
"DryRun":{
1429814299
"shape":"Boolean",
1429914300
"locationName":"dryRun"
@@ -44707,6 +44708,10 @@
4470744708
"SpreadLevel":{
4470844709
"shape":"SpreadLevel",
4470944710
"locationName":"spreadLevel"
44711+
},
44712+
"LinkedGroupId":{
44713+
"shape":"PlacementGroupId",
44714+
"locationName":"linkedGroupId"
4471044715
}
4471144716
}
4471244717
},

apis/ec2/2016-11-15/docs-2.json

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20372,10 +20372,12 @@
2037220372
"PlacementGroupId": {
2037320373
"base": null,
2037420374
"refs": {
20375+
"CreatePlacementGroupRequest$LinkedGroupId": "<p>Reserved for future use.</p>",
2037520376
"LaunchTemplatePlacement$GroupId": "<p>The Group ID of the placement group. You must specify the Placement Group <b>Group ID</b> to launch an instance in a shared placement group.</p>",
2037620377
"LaunchTemplatePlacementRequest$GroupId": "<p>The Group Id of a placement group. You must specify the Placement Group <b>Group Id</b> to launch an instance in a shared placement group.</p>",
2037720378
"ModifyInstancePlacementRequest$GroupId": "<p>The Group Id of a placement group. You must specify the Placement Group <b>Group Id</b> to launch an instance in a shared placement group.</p>",
2037820379
"Placement$GroupId": "<p>The ID of the placement group that the instance is in.</p> <p>On input, you can specify <code>GroupId</code> or <code>GroupName</code>, but not both.</p>",
20380+
"PlacementGroup$LinkedGroupId": "<p>Reserved for future use.</p>",
2037920381
"PlacementGroupIdStringList$member": null
2038020382
}
2038120383
},

apis/guardduty/2017-11-28/api-2.json

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5134,7 +5134,10 @@
51345134
},
51355135
"GetRemainingFreeTrialDaysRequest":{
51365136
"type":"structure",
5137-
"required":["DetectorId"],
5137+
"required":[
5138+
"AccountIds",
5139+
"DetectorId"
5140+
],
51385141
"members":{
51395142
"DetectorId":{
51405143
"shape":"DetectorId",

apis/pcs/2023-02-10/docs-2.json

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -42,9 +42,9 @@
4242
"AccountingMode": {
4343
"base": null,
4444
"refs": {
45-
"Accounting$mode": "<p>The default value for <code>mode</code> is <code>STANDARD</code>. A value of <code>STANDARD</code> means Slurm accounting is enabled.</p>",
46-
"AccountingRequest$mode": "<p>The default value for <code>mode</code> is <code>STANDARD</code>. A value of <code>STANDARD</code> means Slurm accounting is enabled.</p>",
47-
"UpdateAccountingRequest$mode": "<p>The default value for <code>mode</code> is <code>STANDARD</code>. A value of <code>STANDARD</code> means Slurm accounting is enabled.</p>"
45+
"Accounting$mode": "<p>The default value for <code>mode</code> is <code>NONE</code>. A value of <code>STANDARD</code> means Slurm accounting is enabled.</p>",
46+
"AccountingRequest$mode": "<p>The default value for <code>mode</code> is <code>NONE</code>. A value of <code>STANDARD</code> means Slurm accounting is enabled.</p>",
47+
"UpdateAccountingRequest$mode": "<p>The default value for <code>mode</code> is <code>NONE</code>. A value of <code>STANDARD</code> means Slurm accounting is enabled.</p>"
4848
}
4949
},
5050
"AccountingRequest": {
@@ -381,7 +381,7 @@
381381
}
382382
},
383383
"JwtKey": {
384-
"base": "<p>The JWT key stored in AWS Secrets Manager for Slurm REST API authentication.</p>",
384+
"base": "<p>The JWT key stored in Amazon Web Services Secrets Manager for Slurm REST API authentication.</p>",
385385
"refs": {
386386
"JwtAuth$jwtKey": "<p>The JWT key for Slurm REST API authentication.</p>"
387387
}
@@ -670,9 +670,9 @@
670670
"SlurmRestMode": {
671671
"base": null,
672672
"refs": {
673-
"SlurmRest$mode": "<p>The default value for <code>mode</code> is <code>STANDARD</code>. A value of <code>STANDARD</code> means the Slurm REST API is enabled.</p>",
674-
"SlurmRestRequest$mode": "<p>The default value for <code>mode</code> is <code>STANDARD</code>. A value of <code>STANDARD</code> means the Slurm REST API is enabled.</p>",
675-
"UpdateSlurmRestRequest$mode": "<p>The default value for <code>mode</code> is <code>STANDARD</code>. A value of <code>STANDARD</code> means the Slurm REST API is enabled.</p>"
673+
"SlurmRest$mode": "<p>The default value for <code>mode</code> is <code>NONE</code>. A value of <code>STANDARD</code> means the Slurm REST API is enabled.</p>",
674+
"SlurmRestRequest$mode": "<p>The default value for <code>mode</code> is <code>NONE</code>. A value of <code>STANDARD</code> means the Slurm REST API is enabled.</p>",
675+
"UpdateSlurmRestRequest$mode": "<p>The default value for <code>mode</code> is <code>NONE</code>. A value of <code>STANDARD</code> means the Slurm REST API is enabled.</p>"
676676
}
677677
},
678678
"SlurmRestRequest": {
@@ -725,8 +725,8 @@
725725
"ErrorInfo$message": "<p>The detailed error information.</p>",
726726
"InstanceConfig$instanceType": "<p>The EC2 instance type that PCS can provision in the compute node group.</p> <p> Example: <code>t2.xlarge</code> </p>",
727727
"InternalServerException$message": null,
728-
"JwtKey$secretArn": "<p>The Amazon Resource Name (ARN) of the AWS Secrets Manager secret containing the JWT key.</p>",
729-
"JwtKey$secretVersion": "<p>The version of the AWS Secrets Manager secret containing the JWT key.</p>",
728+
"JwtKey$secretArn": "<p>The Amazon Resource Name (ARN) of the Amazon Web Services Secrets Manager secret containing the JWT key.</p>",
729+
"JwtKey$secretVersion": "<p>The version of the Amazon Web Services Secrets Manager secret containing the JWT key.</p>",
730730
"ListClustersRequest$nextToken": "<p>The value of <code>nextToken</code> is a unique pagination token for each page of results returned. If <code>nextToken</code> is returned, there are more results available. Make the call again using the returned token to retrieve the next page. Keep all other arguments unchanged. Each pagination token expires after 24 hours. Using an expired pagination token returns an <code>HTTP 400 InvalidToken</code> error.</p>",
731731
"ListClustersResponse$nextToken": "<p>The value of <code>nextToken</code> is a unique pagination token for each page of results returned. If <code>nextToken</code> is returned, there are more results available. Make the call again using the returned token to retrieve the next page. Keep all other arguments unchanged. Each pagination token expires after 24 hours. Using an expired pagination token returns an <code>HTTP 400 InvalidToken</code> error.</p>",
732732
"ListComputeNodeGroupsRequest$nextToken": "<p>The value of <code>nextToken</code> is a unique pagination token for each page of results returned. If <code>nextToken</code> is returned, there are more results available. Make the call again using the returned token to retrieve the next page. Keep all other arguments unchanged. Each pagination token expires after 24 hours. Using an expired pagination token returns an <code>HTTP 400 InvalidToken</code> error.</p>",

apis/pcs/2023-02-10/smoke-2.json

Lines changed: 43 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,6 @@
11
{
22
"version" : 2,
33
"testCases" : [ {
4-
"id" : "ListClustersSuccess",
5-
"operationName" : "ListClusters",
6-
"input" : { },
7-
"expectation" : {
8-
"success" : { }
9-
},
10-
"config" : {
11-
"region" : "us-west-2",
12-
"useFips" : false,
13-
"useDualstack" : false,
14-
"useAccountIdRouting" : true
15-
}
16-
}, {
174
"id" : "GetComputeNodeGroup_AccessDeniedException",
185
"operationName" : "GetComputeNodeGroup",
196
"input" : {
@@ -32,11 +19,10 @@
3219
"useAccountIdRouting" : true
3320
}
3421
}, {
35-
"id" : "GetQueueFailure_AccessDeniedException",
36-
"operationName" : "GetQueue",
22+
"id" : "UpdateCluster_AccessDeniedException",
23+
"operationName" : "UpdateCluster",
3724
"input" : {
38-
"clusterIdentifier" : "pcs_donotexist",
39-
"queueIdentifier" : "pcs_donotexist"
25+
"clusterIdentifier" : "pcs_donotexist"
4026
},
4127
"expectation" : {
4228
"failure" : {
@@ -50,8 +36,8 @@
5036
"useAccountIdRouting" : true
5137
}
5238
}, {
53-
"id" : "GetCluster_AccessDeniedException",
54-
"operationName" : "GetCluster",
39+
"id" : "ListQueueFailure_AccessDeniedException",
40+
"operationName" : "ListQueues",
5541
"input" : {
5642
"clusterIdentifier" : "pcs_donotexist"
5743
},
@@ -67,16 +53,43 @@
6753
"useAccountIdRouting" : true
6854
}
6955
}, {
70-
"id" : "ListQueueFailure_AccessDeniedException",
71-
"operationName" : "ListQueues",
56+
"id" : "InstanceArnSuccess",
57+
"operationName" : "CreateComputeNodeGroup",
7258
"input" : {
73-
"clusterIdentifier" : "pcs_donotexist"
59+
"clusterIdentifier" : "testCluster",
60+
"computeNodeGroupName" : "testNodeGroupName",
61+
"subnetIds" : [ "subnet-0cbf727bae9405b47" ],
62+
"scalingConfiguration" : {
63+
"minInstanceCount" : 1,
64+
"maxInstanceCount" : 1
65+
},
66+
"iamInstanceProfileArn" : "arn:aws:iam::975050141277:instance-profile/aws-pcs/example-role-2",
67+
"customLaunchTemplate" : {
68+
"id" : "lt-0b8f8ee3f92b73dc0",
69+
"version" : "1"
70+
},
71+
"instanceConfigs" : [ {
72+
"instanceType" : "t3.medium"
73+
} ]
7474
},
7575
"expectation" : {
7676
"failure" : {
7777
"errorId" : "AccessDeniedException"
7878
}
7979
},
80+
"config" : {
81+
"region" : "us-east-1",
82+
"useFips" : false,
83+
"useDualstack" : false,
84+
"useAccountIdRouting" : true
85+
}
86+
}, {
87+
"id" : "ListClustersSuccess",
88+
"operationName" : "ListClusters",
89+
"input" : { },
90+
"expectation" : {
91+
"success" : { }
92+
},
8093
"config" : {
8194
"region" : "us-west-2",
8295
"useFips" : false,
@@ -101,41 +114,28 @@
101114
"useAccountIdRouting" : true
102115
}
103116
}, {
104-
"id" : "InstanceArnSuccess",
105-
"operationName" : "CreateComputeNodeGroup",
117+
"id" : "GetCluster_AccessDeniedException",
118+
"operationName" : "GetCluster",
106119
"input" : {
107-
"clusterIdentifier" : "testCluster",
108-
"computeNodeGroupName" : "testNodeGroupName",
109-
"subnetIds" : [ "subnet-0cbf727bae9405b47" ],
110-
"scalingConfiguration" : {
111-
"minInstanceCount" : 1,
112-
"maxInstanceCount" : 1
113-
},
114-
"iamInstanceProfileArn" : "arn:aws:iam::975050141277:instance-profile/aws-pcs/example-role-2",
115-
"customLaunchTemplate" : {
116-
"id" : "lt-0b8f8ee3f92b73dc0",
117-
"version" : "1"
118-
},
119-
"instanceConfigs" : [ {
120-
"instanceType" : "t3.medium"
121-
} ]
120+
"clusterIdentifier" : "pcs_donotexist"
122121
},
123122
"expectation" : {
124123
"failure" : {
125124
"errorId" : "AccessDeniedException"
126125
}
127126
},
128127
"config" : {
129-
"region" : "us-east-1",
128+
"region" : "us-west-2",
130129
"useFips" : false,
131130
"useDualstack" : false,
132131
"useAccountIdRouting" : true
133132
}
134133
}, {
135-
"id" : "UpdateCluster_AccessDeniedException",
136-
"operationName" : "UpdateCluster",
134+
"id" : "GetQueueFailure_AccessDeniedException",
135+
"operationName" : "GetQueue",
137136
"input" : {
138-
"clusterIdentifier" : "pcs_donotexist"
137+
"clusterIdentifier" : "pcs_donotexist",
138+
"queueIdentifier" : "pcs_donotexist"
139139
},
140140
"expectation" : {
141141
"failure" : {

0 commit comments

Comments
 (0)