Skip to content

Commit

Permalink
Automated SDK generation @ aws-cloudformation-user-guide 19dc52cd3f20…
Browse files Browse the repository at this point in the history
…07d6d268b65b739ffb5ebf8c1e76 (#1656)

Automated SDK generation @ aws-cloudformation-user-guide
19dc52cd3f2007d6d268b65b739ffb5ebf8c1e76

#### New resources:

- `cleanrooms.IdMappingTable`
- `cleanrooms.IdNamespaceAssociation`

#### New functions:

- `cleanrooms.getIdMappingTable`
- `cleanrooms.getIdNamespaceAssociation`
  • Loading branch information
pulumi-bot authored Aug 6, 2024
1 parent afc0e69 commit 39d241d
Show file tree
Hide file tree
Showing 76 changed files with 5,591 additions and 69 deletions.
2 changes: 1 addition & 1 deletion .docs.version
Original file line number Diff line number Diff line change
@@ -1 +1 @@
3f0bd75e36846801897080920bf4c479aca57c01
9460d1e13ded3a066026fe4ad23a2987b621a4a8
4 changes: 3 additions & 1 deletion aws-cloudformation-schema/aws-ec2-placementgroup.json
Original file line number Diff line number Diff line change
Expand Up @@ -58,7 +58,9 @@
"tagging" : {
"taggable" : true,
"tagUpdatable" : false,
"cloudFormationSystemTags" : false
"cloudFormationSystemTags" : false,
"tagProperty" : "/properties/Tags",
"permissions" : [ "ec2:CreateTags" ]
},
"handlers" : {
"create" : {
Expand Down
3 changes: 2 additions & 1 deletion aws-cloudformation-schema/aws-ec2-securitygroup.json
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
{
"tagging" : {
"permissions" : [ "ec2:CreateTags", "ec2:DeleteTags" ],
"taggable" : true,
"tagOnCreate" : true,
"tagUpdatable" : true,
Expand Down Expand Up @@ -36,7 +37,7 @@
"permissions" : [ "ec2:DescribeSecurityGroups" ]
},
"delete" : {
"permissions" : [ "ec2:DeleteSecurityGroup", "ec2:DescribeInstances" ]
"permissions" : [ "ec2:DescribeSecurityGroups", "ec2:DeleteSecurityGroup", "ec2:DescribeInstances" ]
}
},
"writeOnlyProperties" : [ "/properties/SecurityGroupIngress/*/SourceSecurityGroupName" ],
Expand Down
2 changes: 1 addition & 1 deletion aws-cloudformation-schema/aws-ec2-subnet.json
Original file line number Diff line number Diff line change
Expand Up @@ -61,7 +61,7 @@
},
"EnableDns64" : {
"type" : "boolean",
"description" : "Indicates whether DNS queries made to the Amazon-provided DNS Resolver in this subnet should return synthetic IPv6 addresses for IPv4-only destinations. For more information, see [DNS64 and NAT64](https://docs.aws.amazon.com/vpc/latest/userguide/vpc-nat-gateway.html#nat-gateway-nat64-dns64) in the *User Guide*."
"description" : "Indicates whether DNS queries made to the Amazon-provided DNS Resolver in this subnet should return synthetic IPv6 addresses for IPv4-only destinations.\n You must first configure a NAT gateway in a public subnet (separate from the subnet containing the IPv6-only workloads). For example, the subnet containing the NAT gateway should have a ``0.0.0.0/0`` route pointing to the internet gateway. For more information, see [Configure DNS64 and NAT64](https://docs.aws.amazon.com/vpc/latest/userguide/nat-gateway-nat64-dns64.html#nat-gateway-nat64-dns64-walkthrough) in the *User Guide*."
},
"PrivateDnsNameOptionsOnLaunch" : {
"type" : "object",
Expand Down
7 changes: 7 additions & 0 deletions aws-cloudformation-schema/aws-ec2-transitgatewayconnect.json
Original file line number Diff line number Diff line change
Expand Up @@ -62,6 +62,13 @@
"additionalProperties" : false
}
},
"tagging" : {
"taggable" : true,
"tagOnCreate" : true,
"tagUpdatable" : true,
"cloudFormationSystemTags" : false,
"tagProperty" : "/properties/Tags"
},
"additionalProperties" : false,
"readOnlyProperties" : [ "/properties/TransitGatewayAttachmentId", "/properties/State", "/properties/CreationTime", "/properties/TransitGatewayId" ],
"createOnlyProperties" : [ "/properties/TransportTransitGatewayAttachmentId", "/properties/Options" ],
Expand Down
11 changes: 11 additions & 0 deletions aws-cloudformation-schema/aws-redshift-cluster.json
Original file line number Diff line number Diff line change
Expand Up @@ -57,6 +57,17 @@
},
"S3KeyPrefix" : {
"type" : "string"
},
"LogDestinationType" : {
"type" : "string"
},
"LogExports" : {
"maxItems" : 3,
"insertionOrder" : false,
"type" : "array",
"items" : {
"type" : "string"
}
}
}
},
Expand Down
10 changes: 8 additions & 2 deletions aws-cloudformation-schema/aws-route53resolver-resolverrule.json
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,13 @@
"RuleType" : {
"type" : "string",
"description" : "When you want to forward DNS queries for specified domain name to resolvers on your network, specify FORWARD. When you have a forwarding rule to forward DNS queries for a domain to your network and you want Resolver to process queries for a subdomain of that domain, specify SYSTEM.",
"enum" : [ "FORWARD", "SYSTEM", "RECURSIVE" ]
"enum" : [ "FORWARD", "SYSTEM", "RECURSIVE", "DELEGATE" ]
},
"DelegationRecord" : {
"type" : "string",
"description" : "The name server domain for queries to be delegated to if a query matches the delegation record.",
"minLength" : 1,
"maxLength" : 256
},
"Tags" : {
"type" : "array",
Expand Down Expand Up @@ -107,7 +113,7 @@
"cloudFormationSystemTags" : false,
"tagProperty" : "/properties/Tags"
},
"required" : [ "DomainName", "RuleType" ],
"required" : [ "RuleType" ],
"primaryIdentifier" : [ "/properties/ResolverRuleId" ],
"readOnlyProperties" : [ "/properties/Arn", "/properties/ResolverRuleId" ],
"createOnlyProperties" : [ "/properties/RuleType" ],
Expand Down
2 changes: 2 additions & 0 deletions provider/cmd/pulumi-gen-aws-native/supported-types.txt
Original file line number Diff line number Diff line change
Expand Up @@ -130,6 +130,8 @@ AWS::CleanRooms::AnalysisTemplate
AWS::CleanRooms::Collaboration
AWS::CleanRooms::ConfiguredTable
AWS::CleanRooms::ConfiguredTableAssociation
AWS::CleanRooms::IdMappingTable
AWS::CleanRooms::IdNamespaceAssociation
AWS::CleanRooms::Membership
AWS::CleanRooms::PrivacyBudgetTemplate
AWS::CleanRoomsML::TrainingDataset
Expand Down
Loading

0 comments on commit 39d241d

Please sign in to comment.