Skip to content

Commit

Permalink
v0.13-alpha SDK import (#168)
Browse files Browse the repository at this point in the history
* Update README and services supported

* v0.17 Import

* update docs version number
  • Loading branch information
rcoh committed Jul 28, 2021
1 parent c44c200 commit 7c5f375
Show file tree
Hide file tree
Showing 4,002 changed files with 7,302,945 additions and 25,814 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
400 changes: 204 additions & 196 deletions AWS_SERVICES_SUPPORTED.md

Large diffs are not rendered by default.

4 changes: 2 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# The AWS SDK for Rust [![Docs](https://img.shields.io/badge/docs-v0.0.12--alpha-blue)](https://awslabs.github.io/aws-sdk-rust/) ![MSRV](https://img.shields.io/badge/msrv-1.52.1-red)
# The AWS SDK for Rust [![Docs](https://img.shields.io/badge/docs-v0.0.13--alpha-blue)](https://awslabs.github.io/aws-sdk-rust/) ![MSRV](https://img.shields.io/badge/msrv-1.52.1-red)

This repo contains the new AWS SDK for Rust and its [public roadmap](https://github.com/awslabs/aws-sdk-rust/projects/1)

Expand All @@ -15,7 +15,7 @@ The new AWS SDK for Rust is built with one crate per AWS service. [Tokio](https:

```toml
[dependencies]
dynamodb = { git = "https://github.com/awslabs/aws-sdk-rust", tag = "v0.0.12-alpha", package = "aws-sdk-dynamodb" }
dynamodb = { git = "https://github.com/awslabs/aws-sdk-rust", tag = "v0.0.13-alpha", package = "aws-sdk-dynamodb" }
tokio = { version = "1", features = ["full"] }
```
3. Provide your AWS credentials as environment variables:
Expand Down
2 changes: 1 addition & 1 deletion sdk/Cargo.toml
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
[workspace]
members = [
"apigateway","applicationautoscaling","autoscalingplans","autoscaling","batch","cloudformation","cognitoidentity","cognitoidentityprovider","cognitosync","config","dynamodb","ebs","ec2","ecr","ecs","eks","iam","kinesis","kms","lambda","cloudwatchlogs","medialive","mediapackage","cloudwatch","polly","qldbsession","qldb","rdsdata","rds","route53","s3","sagemakera2iruntime","sagemakeredge","sagemakerfeaturestoreruntime","sagemaker","secretsmanager","sesv2","snowball","sns","sqs","ssm","sts","smithy-types","smithy-json","smithy-query","smithy-xml","smithy-http","smithy-http-tower","smithy-client","protocol-test-helpers","aws-auth","aws-endpoint","aws-types","aws-hyper","aws-sig-auth","aws-http","examples/medialive","examples/secretsmanager","examples/cloudformation","examples/autoscaling","examples/ecs","examples/iam","examples/batch","examples/ec2","examples/mediapackage","examples/cognitoidentity","examples/sqs","examples/config","examples/ebs","examples/snowball","examples/sns","examples/kinesis","examples/sts","examples/eks","examples/lambda","examples/rds","examples/s3","examples/sagemaker","examples/polly","examples/cognitoidentityprovider","examples/cognitosync","examples/qldb","examples/rdsdata","examples/ssm","examples/ecr","examples/cloudwatch","examples/applicationautoscaling","examples/autoscalingplans","examples/cloudwatchlogs","examples/route53","examples/kms"
"migrationhub","accessanalyzer","acmpca","acm","alexaforbusiness","amp","amplify","amplifybackend","apigateway","apigatewaymanagement","apigatewayv2","appconfig","appflow","appintegrations","applicationautoscaling","applicationinsights","applicationcostprofiler","appmesh","apprunner","appstream","appsync","athena","auditmanager","autoscalingplans","autoscaling","backup","batch","braket","budgets","costexplorer","chime","cloud9","clouddirectory","cloudformation","cloudfront","cloudhsm","cloudhsmv2","cloudsearch","cloudsearchdomain","cloudtrail","codeartifact","codebuild","codecommit","codedeploy","codegurureviewer","codeguruprofiler","codepipeline","codestarconnections","codestarnotifications","codestar","cognitoidentity","cognitoidentityprovider","cognitosync","comprehend","comprehendmedical","computeoptimizer","config","connectcontactlens","connect","connectparticipant","costandusagereport","customerprofiles","databrew","dataexchange","datapipeline","datasync","dax","detective","devicefarm","devopsguru","directconnect","applicationdiscovery","dlm","databasemigration","docdb","directory","dynamodb","ebs","ec2instanceconnect","ec2","ecrpublic","ecr","ecs","eks","elasticinference","elasticache","elasticbeanstalk","efs","elasticloadbalancing","elasticloadbalancingv2","emr","elastictranscoder","ses","emrcontainers","marketplaceentitlement","elasticsearch","eventbridge","cloudwatchevents","finspacedata","finspace","firehose","fis","fms","forecast","forecastquery","frauddetector","fsx","gamelift","globalaccelerator","glue","greengrass","greengrassv2","groundstation","guardduty","health","healthlake","honeycode","iam","identitystore","imagebuilder","inspector","iotjobsdataplane","iot","iot1clickdevices","iot1clickprojects","iotanalytics","iotdeviceadvisor","ioteventsdata","iotevents","iotfleethub","iotsecuretunneling","iotsitewise","iotthingsgraph","iotwireless","ivs","kafka","kendra","kinesisvideoarchivedmedia","kinesisvideomedia","kinesisvideosignaling","kinesis","kinesisanalytics","kinesisanalyticsv2","kinesisvideo","kms","lakeformation","lambda","lexmodelbuilding","licensemanager","lightsail","location","cloudwatchlogs","lookoutequipment","lookoutmetrics","lookoutvision","machinelearning","macie","macie2","managedblockchain","marketplacecatalog","marketplacecommerceanalytics","mediaconnect","mediaconvert","medialive","mediapackagevod","mediapackage","mediastoredata","mediastore","mediatailor","marketplacemetering","mgn","migrationhubconfig","mobile","lexmodelsv2","cloudwatch","mq","mturk","mwaa","neptune","networkfirewall","networkmanager","nimble","opsworks","opsworkscm","organizations","outposts","personalizeevents","personalizeruntime","personalize","pi","pinpointemail","pinpoint","polly","pricing","proton","qldbsession","qldb","quicksight","ram","rdsdata","rds","redshiftdata","redshift","rekognition","resourcegroups","resourcegroupstagging","robomaker","route53","route53domains","route53resolver","lexruntime","lexruntimev2","sagemakerruntime","s3","s3control","s3outposts","sagemakera2iruntime","sagemakeredge","sagemakerfeaturestoreruntime","sagemaker","savingsplans","schemas","secretsmanager","securityhub","serverlessapplicationrepository","servicequotas","servicecatalogappregistry","servicecatalog","servicediscovery","sesv2","shield","signer","pinpointsmsvoice","sms","snowball","sns","sqs","ssmcontacts","ssmincidents","ssm","ssoadmin","ssooidc","sso","sfn","storagegateway","dynamodbstreams","sts","support","swf","synthetics","textract","transcribe","transfer","translate","wafregional","waf","wafv2","wellarchitected","workdocs","worklink","workmail","workmailmessageflow","workspaces","xray","smithy-types","smithy-json","smithy-query","smithy-xml","smithy-http","smithy-http-tower","smithy-client","protocol-test-helpers","aws-auth","aws-endpoint","aws-types","aws-hyper","aws-sig-auth","aws-http","examples/medialive","examples/secretsmanager","examples/cloudformation","examples/autoscaling","examples/ecs","examples/iam","examples/batch","examples/ec2","examples/mediapackage","examples/cognitoidentity","examples/sqs","examples/config","examples/ebs","examples/snowball","examples/sns","examples/kinesis","examples/sts","examples/eks","examples/lambda","examples/rds","examples/s3","examples/sagemaker","examples/polly","examples/ses","examples/cognitoidentityprovider","examples/cognitosync","examples/qldb","examples/rdsdata","examples/ssm","examples/ecr","examples/cloudwatch","examples/applicationautoscaling","examples/autoscalingplans","examples/cloudwatchlogs","examples/route53","examples/kms"
]
40 changes: 40 additions & 0 deletions sdk/accessanalyzer/Cargo.toml
Original file line number Diff line number Diff line change
@@ -0,0 +1,40 @@
# Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
[package]
name = "aws-sdk-accessanalyzer"
version = "0.0.13-alpha"
description = "<p>AWS IAM Access Analyzer helps identify potential resource-access risks by enabling you to identify\n any policies that grant access to an external principal. It does this by using logic-based\n reasoning to analyze resource-based policies in your AWS environment. An external\n principal can be another AWS account, a root user, an IAM user or role, a federated\n user, an AWS service, or an anonymous user. You can also use Access Analyzer to preview and\n validate public and cross-account access to your resources before deploying permissions\n changes. This guide describes the AWS IAM Access Analyzer operations that you can call\n programmatically. For general information about Access Analyzer, see <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html\">AWS IAM Access Analyzer</a> in the <b>IAM User Guide</b>.</p>\n <p>To start using Access Analyzer, you first need to create an analyzer.</p>"
authors = ["AWS Rust SDK Team <aws-sdk-rust@amazon.com>", "Russell Cohen <rcoh@amazon.com>"]
license = "Apache-2.0"
edition = "2018"
[dependencies.aws-endpoint]
path = "..//aws-endpoint"
[dependencies.aws-hyper]
path = "..//aws-hyper"
optional = true
[dependencies.smithy-http]
path = "..//smithy-http"
[dependencies.fastrand]
version = "1"
[dependencies.aws-types]
path = "..//aws-types"
[dependencies.aws-auth]
path = "..//aws-auth"
[dependencies.smithy-types]
path = "..//smithy-types"
[dependencies.http]
version = "0.2"
[dependencies.aws-http]
path = "..//aws-http"
[dependencies.aws-sig-auth]
path = "..//aws-sig-auth"
[dependencies.bytes]
version = "1"
[dependencies.smithy-json]
path = "..//smithy-json"
[features]
client = ["aws-hyper"]
rustls = ["aws-hyper/rustls"]
native-tls = ["aws-hyper/native-tls"]
default = ["client", "rustls"]


Loading

0 comments on commit 7c5f375

Please sign in to comment.