Skip to content

Commit bd2109d

Browse files
authored
Generate APIs based on v1.42.18 of Go SDK (aws-beam#104)
This is based in the release of aws-sdk-go: https://github.com/aws/aws-sdk-go/releases/tag/v1.42.18
1 parent 8a604c4 commit bd2109d

File tree

170 files changed

+37469
-5809
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

170 files changed

+37469
-5809
lines changed

lib/aws/generated/access_analyzer.ex

Lines changed: 20 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -3,21 +3,22 @@
33

44
defmodule AWS.AccessAnalyzer do
55
@moduledoc """
6-
AWS IAM Access Analyzer helps identify potential resource-access risks by
7-
enabling you to identify any policies that grant access to an external
8-
principal.
6+
Identity and Access Management Access Analyzer helps identify potential
7+
resource-access risks by enabling you to identify any policies that grant access
8+
to an external principal.
99
1010
It does this by using logic-based reasoning to analyze resource-based policies
11-
in your AWS environment. An external principal can be another AWS account, a
12-
root user, an IAM user or role, a federated user, an AWS service, or an
13-
anonymous user. You can also use Access Analyzer to preview and validate public
14-
and cross-account access to your resources before deploying permissions changes.
15-
This guide describes the AWS IAM Access Analyzer operations that you can call
16-
programmatically. For general information about Access Analyzer, see [AWS IAM Access
17-
Analyzer](https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html)
11+
in your Amazon Web Services environment. An external principal can be another
12+
Amazon Web Services account, a root user, an IAM user or role, a federated user,
13+
an Amazon Web Services service, or an anonymous user. You can also use IAM
14+
Access Analyzer to preview and validate public and cross-account access to your
15+
resources before deploying permissions changes. This guide describes the
16+
Identity and Access Management Access Analyzer operations that you can call
17+
programmatically. For general information about IAM Access Analyzer, see
18+
[Identity and Access Management Access Analyzer](https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html)
1819
in the **IAM User Guide**.
1920
20-
To start using Access Analyzer, you first need to create an analyzer.
21+
To start using IAM Access Analyzer, you first need to create an analyzer.
2122
"""
2223

2324
alias AWS.Client
@@ -83,8 +84,8 @@ defmodule AWS.AccessAnalyzer do
8384
end
8485

8586
@doc """
86-
Creates an access preview that allows you to preview Access Analyzer findings
87-
for your resource before deploying resource permissions.
87+
Creates an access preview that allows you to preview IAM Access Analyzer
88+
findings for your resource before deploying resource permissions.
8889
"""
8990
def create_access_preview(%Client{} = client, input, options \\ []) do
9091
url_path = "/access-preview"
@@ -131,8 +132,8 @@ defmodule AWS.AccessAnalyzer do
131132
Archive rules automatically archive new findings that meet the criteria you
132133
define when you create the rule.
133134
134-
To learn about filter keys that you can use to create an archive rule, see
135-
[Access Analyzer filter keys](https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html)
135+
To learn about filter keys that you can use to create an archive rule, see [IAM Access Analyzer filter
136+
keys](https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html)
136137
in the **IAM User Guide**.
137138
"""
138139
def create_archive_rule(%Client{} = client, analyzer_name, input, options \\ []) do
@@ -156,7 +157,7 @@ defmodule AWS.AccessAnalyzer do
156157
@doc """
157158
Deletes the specified analyzer.
158159
159-
When you delete an analyzer, Access Analyzer is disabled for the account or
160+
When you delete an analyzer, IAM Access Analyzer is disabled for the account or
160161
organization in the current or specific Region. All findings that were generated
161162
by the analyzer are deleted. You cannot undo this action.
162163
"""
@@ -298,8 +299,8 @@ defmodule AWS.AccessAnalyzer do
298299
@doc """
299300
Retrieves information about an archive rule.
300301
301-
To learn about filter keys that you can use to create an archive rule, see
302-
[Access Analyzer filter keys](https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html)
302+
To learn about filter keys that you can use to create an archive rule, see [IAM Access Analyzer filter
303+
keys](https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html)
303304
in the **IAM User Guide**.
304305
"""
305306
def get_archive_rule(%Client{} = client, analyzer_name, rule_name, options \\ []) do
@@ -576,7 +577,7 @@ defmodule AWS.AccessAnalyzer do
576577
Retrieves a list of findings generated by the specified analyzer.
577578
578579
To learn about filter keys that you can use to retrieve a list of findings, see
579-
[Access Analyzer filter keys](https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html)
580+
[IAM Access Analyzer filter keys](https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html)
580581
in the **IAM User Guide**.
581582
"""
582583
def list_findings(%Client{} = client, input, options \\ []) do

lib/aws/generated/account.ex

Lines changed: 101 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,101 @@
1+
# WARNING: DO NOT EDIT, AUTO-GENERATED CODE!
2+
# See https://github.com/aws-beam/aws-codegen for more details.
3+
4+
defmodule AWS.Account do
5+
@moduledoc """
6+
Operations for Amazon Web Services Account Management
7+
"""
8+
9+
alias AWS.Client
10+
alias AWS.Request
11+
12+
def metadata do
13+
%AWS.ServiceMetadata{
14+
abbreviation: nil,
15+
api_version: "2021-02-01",
16+
content_type: "application/x-amz-json-1.1",
17+
credential_scope: "us-east-1",
18+
endpoint_prefix: "account",
19+
global?: true,
20+
protocol: "rest-json",
21+
service_id: "Account",
22+
signature_version: "v4",
23+
signing_name: "account",
24+
target_prefix: nil
25+
}
26+
end
27+
28+
@doc """
29+
Deletes the specified alternate contact from an Amazon Web Services account.
30+
31+
For complete details about how to use the alternate contact operations, see
32+
[Access or updating the alternate contacts](https://docs.aws.amazon.com/accounts/latest/reference/manage-acct-update-contact.html).
33+
"""
34+
def delete_alternate_contact(%Client{} = client, input, options \\ []) do
35+
url_path = "/deleteAlternateContact"
36+
headers = []
37+
query_params = []
38+
39+
Request.request_rest(
40+
client,
41+
metadata(),
42+
:post,
43+
url_path,
44+
query_params,
45+
headers,
46+
input,
47+
options,
48+
200
49+
)
50+
end
51+
52+
@doc """
53+
Retrieves the specified alternate contact attached to an Amazon Web Services
54+
account.
55+
56+
For complete details about how to use the alternate contact operations, see
57+
[Access or updating the alternate contacts](https://docs.aws.amazon.com/accounts/latest/reference/manage-acct-update-contact.html).
58+
"""
59+
def get_alternate_contact(%Client{} = client, input, options \\ []) do
60+
url_path = "/getAlternateContact"
61+
headers = []
62+
query_params = []
63+
64+
Request.request_rest(
65+
client,
66+
metadata(),
67+
:post,
68+
url_path,
69+
query_params,
70+
headers,
71+
input,
72+
options,
73+
200
74+
)
75+
end
76+
77+
@doc """
78+
Modifies the specified alternate contact attached to an Amazon Web Services
79+
account.
80+
81+
For complete details about how to use the alternate contact operations, see
82+
[Access or updating the alternate contacts](https://docs.aws.amazon.com/accounts/latest/reference/manage-acct-update-contact.html).
83+
"""
84+
def put_alternate_contact(%Client{} = client, input, options \\ []) do
85+
url_path = "/putAlternateContact"
86+
headers = []
87+
query_params = []
88+
89+
Request.request_rest(
90+
client,
91+
metadata(),
92+
:post,
93+
url_path,
94+
query_params,
95+
headers,
96+
input,
97+
options,
98+
200
99+
)
100+
end
101+
end

lib/aws/generated/acmpca.ex

Lines changed: 22 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -12,11 +12,17 @@ defmodule AWS.ACMPCA do
1212
The documentation for each action shows the Query API request parameters and the
1313
XML response. Alternatively, you can use one of the AWS SDKs to access an API
1414
that's tailored to the programming language or platform that you're using. For
15-
more information, see [AWS SDKs](https://aws.amazon.com/tools/#SDKs). Each ACM Private CA API action has a quota that determines the number of times
16-
the action can be called per second. For more information, see [API Rate Quotas
17-
in ACM Private
18-
CA](https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaLimits.html#PcaLimits-api)
19-
in the ACM Private CA user guide.
15+
more information, see [AWS SDKs](https://aws.amazon.com/tools/#SDKs). Each ACM Private CA API operation has a quota that determines the number of
16+
times the operation can be called per second. ACM Private CA throttles API
17+
requests at different rates depending on the operation. Throttling means that
18+
ACM Private CA rejects an otherwise valid request because the request exceeds
19+
the operation's quota for the number of requests per second. When a request is
20+
throttled, ACM Private CA returns a
21+
[ThrottlingException](https://docs.aws.amazon.com/acm-pca/latest/APIReference/CommonErrors.html)
22+
error. ACM Private CA does not guarantee a minimum request rate for APIs.
23+
24+
To see an up-to-date list of your ACM Private CA quotas, or to request a quota
25+
increase, log into your AWS account and visit the [Service Quotas](https://console.aws.amazon.com/servicequotas/) console.
2026
"""
2127

2228
alias AWS.Client
@@ -41,15 +47,17 @@ defmodule AWS.ACMPCA do
4147
@doc """
4248
Creates a root or subordinate private certificate authority (CA).
4349
44-
You must specify the CA configuration, the certificate revocation list (CRL)
45-
configuration, the CA type, and an optional idempotency token to avoid
46-
accidental creation of multiple CAs. The CA configuration specifies the name of
47-
the algorithm and key size to be used to create the CA private key, the type of
48-
signing algorithm that the CA uses, and X.500 subject information. The CRL
49-
configuration specifies the CRL expiration period in days (the validity period
50-
of the CRL), the Amazon S3 bucket that will contain the CRL, and a CNAME alias
51-
for the S3 bucket that is included in certificates issued by the CA. If
52-
successful, this action returns the Amazon Resource Name (ARN) of the CA.
50+
You must specify the CA configuration, an optional configuration for Online
51+
Certificate Status Protocol (OCSP) and/or a certificate revocation list (CRL),
52+
the CA type, and an optional idempotency token to avoid accidental creation of
53+
multiple CAs. The CA configuration specifies the name of the algorithm and key
54+
size to be used to create the CA private key, the type of signing algorithm that
55+
the CA uses, and X.500 subject information. The OCSP configuration can
56+
optionally specify a custom URL for the OCSP responder. The CRL configuration
57+
specifies the CRL expiration period in days (the validity period of the CRL),
58+
the Amazon S3 bucket that will contain the CRL, and a CNAME alias for the S3
59+
bucket that is included in certificates issued by the CA. If successful, this
60+
action returns the Amazon Resource Name (ARN) of the CA.
5361
5462
ACM Private CA assets that are stored in Amazon S3 can be protected with
5563
encryption. For more information, see [Encrypting Your CRLs](https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaCreateCa.html#crl-encryption).

0 commit comments

Comments
 (0)