Skip to content

Commit

Permalink
Automated SDK generation @ aws-cloudformation-user-guide 19dc52cd3f20…
Browse files Browse the repository at this point in the history
…07d6d268b65b739ffb5ebf8c1e76 (#1788)

*Automated PR*
  • Loading branch information
pulumi-bot authored Oct 29, 2024
1 parent 268bf64 commit cb38aa7
Show file tree
Hide file tree
Showing 58 changed files with 1,869 additions and 118 deletions.
2 changes: 1 addition & 1 deletion .docs.version
Original file line number Diff line number Diff line change
@@ -1 +1 @@
e407891fcd23524f54f73d89fc230fd574cd5560
5443f8af63af83b98a4c035d7f5d15ba0ea8bf07
27 changes: 27 additions & 0 deletions aws-cloudformation-schema/aws-mediapackagev2-originendpoint.json
Original file line number Diff line number Diff line change
Expand Up @@ -137,6 +137,11 @@
"maximum" : 1209600,
"minimum" : 0,
"description" : "<p>Optionally specify the time delay for all of your manifest egress requests. Enter a value that is smaller than your endpoint's startover window. When you include time delay, note that you cannot use time delay query parameters for this manifest's endpoint URL.</p>"
},
"ClipStartTime" : {
"type" : "string",
"description" : "<p>Optionally specify the clip start time for all of your manifest egress requests. When you include clip start time, note that you cannot use clip start time query parameters for this manifest's endpoint URL.</p>",
"format" : "date-time"
}
},
"additionalProperties" : false
Expand Down Expand Up @@ -245,6 +250,9 @@
},
"FilterConfiguration" : {
"$ref" : "#/definitions/FilterConfiguration"
},
"StartTag" : {
"$ref" : "#/definitions/StartTag"
}
},
"required" : [ "ManifestName" ],
Expand Down Expand Up @@ -285,6 +293,9 @@
},
"FilterConfiguration" : {
"$ref" : "#/definitions/FilterConfiguration"
},
"StartTag" : {
"$ref" : "#/definitions/StartTag"
}
},
"required" : [ "ManifestName" ],
Expand Down Expand Up @@ -415,6 +426,22 @@
"required" : [ "DrmSystems", "EncryptionContractConfiguration", "ResourceId", "RoleArn", "Url" ],
"additionalProperties" : false
},
"StartTag" : {
"type" : "object",
"description" : "<p>To insert an EXT-X-START tag in your HLS playlist, specify a StartTag configuration object with a valid TimeOffset. When you do, you can also optionally specify whether to include a PRECISE value in the EXT-X-START tag.</p>",
"properties" : {
"TimeOffset" : {
"type" : "number",
"description" : "<p>Specify the value for TIME-OFFSET within your EXT-X-START tag. Enter a signed floating point value which, if positive, must be less than the configured manifest duration minus three times the configured segment target duration. If negative, the absolute value must be larger than three times the configured segment target duration, and the absolute value must be smaller than the configured manifest duration.</p>"
},
"Precise" : {
"type" : "boolean",
"description" : "<p>Specify the value for PRECISE within your EXT-X-START tag. Leave blank, or choose false, to use the default value NO. Choose yes to use the value YES.</p>"
}
},
"required" : [ "TimeOffset" ],
"additionalProperties" : false
},
"TsEncryptionMethod" : {
"type" : "string",
"enum" : [ "AES_128", "SAMPLE_AES" ]
Expand Down
10 changes: 10 additions & 0 deletions aws-cloudformation-schema/aws-sagemaker-domain.json
Original file line number Diff line number Diff line change
Expand Up @@ -108,6 +108,11 @@
"description" : "The ID of the security group that authorizes traffic between the RSessionGateway apps and the RStudioServerPro app.",
"maxLength" : 32,
"pattern" : "[-0-9a-zA-Z]+"
},
"TagPropagation" : {
"type" : "string",
"description" : "Indicates whether the tags added to Domain, User Profile and Space entity is propagated to all SageMaker resources.",
"enum" : [ "ENABLED", "DISABLED" ]
}
},
"definitions" : {
Expand Down Expand Up @@ -641,6 +646,11 @@
},
"DockerSettings" : {
"$ref" : "#/definitions/DockerSettings"
},
"ExecutionRoleIdentityConfig" : {
"type" : "string",
"description" : "The configuration for attaching a SageMaker user profile name to the execution role as a sts:SourceIdentity key.",
"enum" : [ "USER_PROFILE_NAME", "DISABLED" ]
}
}
},
Expand Down
96 changes: 69 additions & 27 deletions aws-cloudformation-schema/aws-secretsmanager-rotationschedule.json
Original file line number Diff line number Diff line change
@@ -1,86 +1,128 @@
{
"tagging" : {
"taggable" : false
},
"typeName" : "AWS::SecretsManager::RotationSchedule",
"readOnlyProperties" : [ "/properties/Id" ],
"description" : "Resource Type definition for AWS::SecretsManager::RotationSchedule",
"additionalProperties" : false,
"properties" : {
"Id" : {
"type" : "string"
"createOnlyProperties" : [ "/properties/SecretId" ],
"primaryIdentifier" : [ "/properties/Id" ],
"required" : [ "SecretId" ],
"sourceUrl" : "https://github.com/aws-cloudformation/aws-cloudformation-resource-providers-secretsmanager",
"handlers" : {
"read" : {
"permissions" : [ "secretsmanager:DescribeSecret" ]
},
"RotationLambdaARN" : {
"type" : "string"
"create" : {
"permissions" : [ "secretsmanager:RotateSecret", "secretsmanager:DescribeSecret", "lambda:InvokeFunction" ]
},
"RotationRules" : {
"$ref" : "#/definitions/RotationRules"
"update" : {
"permissions" : [ "secretsmanager:RotateSecret", "secretsmanager:DescribeSecret", "lambda:InvokeFunction" ]
},
"RotateImmediatelyOnUpdate" : {
"type" : "boolean"
"list" : {
"permissions" : [ "secretsmanager:DescribeSecret", "secretsmanager:ListSecrets" ]
},
"SecretId" : {
"type" : "string"
},
"HostedRotationLambda" : {
"$ref" : "#/definitions/HostedRotationLambda"
"delete" : {
"permissions" : [ "secretsmanager:CancelRotateSecret", "secretsmanager:DescribeSecret" ]
}
},
"writeOnlyProperties" : [ "/properties/RotateImmediatelyOnUpdate", "/properties/HostedRotationLambda", "/properties/HostedRotationLambda/ExcludeCharacters", "/properties/HostedRotationLambda/KmsKeyArn", "/properties/HostedRotationLambda/MasterSecretArn", "/properties/HostedRotationLambda/MasterSecretKmsKeyArn", "/properties/HostedRotationLambda/RotationLambdaName", "/properties/HostedRotationLambda/RotationType", "/properties/HostedRotationLambda/Runtime", "/properties/HostedRotationLambda/SuperuserSecretArn", "/properties/HostedRotationLambda/SuperuserSecretKmsKeyArn", "/properties/HostedRotationLambda/VpcSecurityGroupIds", "/properties/HostedRotationLambda/VpcSubnetIds" ],
"additionalProperties" : false,
"definitions" : {
"HostedRotationLambda" : {
"type" : "object",
"additionalProperties" : false,
"type" : "object",
"properties" : {
"Runtime" : {
"description" : "The python runtime associated with the Lambda function",
"type" : "string"
},
"RotationType" : {
"KmsKeyArn" : {
"description" : "The ARN of the KMS key that Secrets Manager uses to encrypt the secret. If you don't specify this value, then Secrets Manager uses the key aws/secretsmanager. If aws/secretsmanager doesn't yet exist, then Secrets Manager creates it for you automatically the first time it encrypts the secret value.",
"type" : "string"
},
"RotationLambdaName" : {
"MasterSecretArn" : {
"description" : "The ARN of the secret that contains superuser credentials, if you use the alternating users rotation strategy. CloudFormation grants the execution role for the Lambda rotation function GetSecretValue permission to the secret in this property.",
"type" : "string"
},
"KmsKeyArn" : {
"RotationLambdaName" : {
"description" : "The name of the Lambda rotation function.",
"type" : "string"
},
"MasterSecretArn" : {
"RotationType" : {
"description" : "The type of rotation template to use",
"type" : "string"
},
"VpcSecurityGroupIds" : {
"ExcludeCharacters" : {
"description" : "A string of the characters that you don't want in the password.",
"type" : "string"
},
"ExcludeCharacters" : {
"VpcSecurityGroupIds" : {
"description" : "A comma-separated list of security group IDs applied to the target database.",
"type" : "string"
},
"MasterSecretKmsKeyArn" : {
"description" : "The ARN of the KMS key that Secrets Manager used to encrypt the superuser secret, if you use the alternating users strategy and the superuser secret is encrypted with a customer managed key. You don't need to specify this property if the superuser secret is encrypted using the key aws/secretsmanager. CloudFormation grants the execution role for the Lambda rotation function Decrypt, DescribeKey, and GenerateDataKey permission to the key in this property.",
"type" : "string"
},
"SuperuserSecretArn" : {
"description" : "The ARN of the secret that contains superuser credentials, if you use the alternating users rotation strategy. CloudFormation grants the execution role for the Lambda rotation function GetSecretValue permission to the secret in this property.",
"type" : "string"
},
"SuperuserSecretKmsKeyArn" : {
"description" : "The ARN of the KMS key that Secrets Manager used to encrypt the superuser secret, if you use the alternating users strategy and the superuser secret is encrypted with a customer managed key. You don't need to specify this property if the superuser secret is encrypted using the key aws/secretsmanager. CloudFormation grants the execution role for the Lambda rotation function Decrypt, DescribeKey, and GenerateDataKey permission to the key in this property.",
"type" : "string"
},
"VpcSubnetIds" : {
"description" : "A comma separated list of VPC subnet IDs of the target database network. The Lambda rotation function is in the same subnet group.",
"type" : "string"
}
},
"required" : [ "RotationType" ]
},
"RotationRules" : {
"type" : "object",
"additionalProperties" : false,
"type" : "object",
"properties" : {
"ScheduleExpression" : {
"description" : "A cron() or rate() expression that defines the schedule for rotating your secret. Secrets Manager rotation schedules use UTC time zone.",
"type" : "string"
},
"Duration" : {
"description" : "The length of the rotation window in hours, for example 3h for a three hour window. Secrets Manager rotates your secret at any time during this window. The window must not extend into the next rotation window or the next UTC day. The window starts according to the ScheduleExpression. If you don't specify a Duration, for a ScheduleExpression in hours, the window automatically closes after one hour. For a ScheduleExpression in days, the window automatically closes at the end of the UTC day.",
"type" : "string"
},
"AutomaticallyAfterDays" : {
"description" : "The number of days between automatic scheduled rotations of the secret. You can use this value to check that your secret meets your compliance guidelines for how often secrets must be rotated.",
"type" : "integer"
}
}
}
},
"required" : [ "SecretId" ],
"createOnlyProperties" : [ "/properties/SecretId" ],
"primaryIdentifier" : [ "/properties/Id" ],
"readOnlyProperties" : [ "/properties/Id" ]
"properties" : {
"HostedRotationLambda" : {
"description" : "Creates a new Lambda rotation function based on one of the Secrets Manager rotation function templates. To use a rotation function that already exists, specify RotationLambdaARN instead.",
"$ref" : "#/definitions/HostedRotationLambda"
},
"SecretId" : {
"description" : "The ARN or name of the secret to rotate.",
"type" : "string"
},
"Id" : {
"description" : "The ARN of the secret.",
"type" : "string"
},
"RotateImmediatelyOnUpdate" : {
"description" : "Specifies whether to rotate the secret immediately or wait until the next scheduled rotation window.",
"type" : "boolean"
},
"RotationLambdaARN" : {
"description" : "The ARN of an existing Lambda rotation function. To specify a rotation function that is also defined in this template, use the Ref function.",
"type" : "string"
},
"RotationRules" : {
"description" : "A structure that defines the rotation configuration for this secret.",
"$ref" : "#/definitions/RotationRules"
}
}
}
2 changes: 1 addition & 1 deletion meta/.botocore.version
Original file line number Diff line number Diff line change
@@ -1 +1 @@
1.35.49
1.35.50
Loading

0 comments on commit cb38aa7

Please sign in to comment.