Skip to content

Commit

Permalink
Update to latest models
Browse files Browse the repository at this point in the history
  • Loading branch information
aws-sdk-python-automation committed Jul 5, 2022
1 parent 8721fe1 commit bdc1e59
Show file tree
Hide file tree
Showing 14 changed files with 1,814 additions and 92 deletions.
5 changes: 5 additions & 0 deletions .changes/next-release/api-change-config-69168.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
{
"type": "api-change",
"category": "``config``",
"description": "Updating documentation service limits"
}
5 changes: 5 additions & 0 deletions .changes/next-release/api-change-lexv2models-19152.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
{
"type": "api-change",
"category": "``lexv2-models``",
"description": "Update lexv2-models client to latest version"
}
5 changes: 5 additions & 0 deletions .changes/next-release/api-change-quicksight-20666.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
{
"type": "api-change",
"category": "``quicksight``",
"description": "This release allows customers to programmatically create QuickSight accounts with Enterprise and Enterprise + Q editions. It also releases allowlisting domains for embedding QuickSight dashboards at runtime through the embedding APIs."
}
5 changes: 5 additions & 0 deletions .changes/next-release/api-change-rds-3781.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
{
"type": "api-change",
"category": "``rds``",
"description": "Adds waiters support for DBCluster."
}
5 changes: 5 additions & 0 deletions .changes/next-release/api-change-rolesanywhere-70795.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
{
"type": "api-change",
"category": "``rolesanywhere``",
"description": "IAM Roles Anywhere allows your workloads such as servers, containers, and applications to obtain temporary AWS credentials and use the same IAM roles and policies that you have configured for your AWS workloads to access AWS resources."
}
5 changes: 5 additions & 0 deletions .changes/next-release/api-change-ssmincidents-19853.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
{
"type": "api-change",
"category": "``ssm-incidents``",
"description": "Adds support for tagging incident-record on creation by providing incident tags in the template within a response-plan."
}
16 changes: 8 additions & 8 deletions botocore/data/config/2014-11-12/service-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -521,7 +521,7 @@
{"shape":"InvalidLimitException"},
{"shape":"OrganizationAccessDeniedException"}
],
"documentation":"<p>Returns a list of organization Config rules. </p> <note> <p>When you specify the limit and the next token, you receive a paginated response. Limit and next token are not applicable if you specify organization Config rule names. It is only applicable, when you request all the organization Config rules.</p> </note>"
"documentation":"<p>Returns a list of organization Config rules. </p> <note> <p>When you specify the limit and the next token, you receive a paginated response.</p> <p>Limit and next token are not applicable if you specify organization Config rule names. It is only applicable, when you request all the organization Config rules.</p> <p> <i>For accounts within an organzation</i> </p> <p>If you deploy an organizational rule or conformance pack in an organization administrator account, and then establish a delegated administrator and deploy an organizational rule or conformance pack in the delegated administrator account, you won't be able to see the organizational rule or conformance pack in the organization administrator account from the delegated administrator account or see the organizational rule or conformance pack in the delegated administrator account from organization administrator account. The <code>DescribeOrganizationConfigRules</code> and <code>DescribeOrganizationConformancePacks</code> APIs can only see and interact with the organization-related resource that were deployed from within the account calling those APIs.</p> </note>"
},
"DescribeOrganizationConformancePackStatuses":{
"name":"DescribeOrganizationConformancePackStatuses",
Expand Down Expand Up @@ -553,7 +553,7 @@
{"shape":"InvalidLimitException"},
{"shape":"OrganizationAccessDeniedException"}
],
"documentation":"<p>Returns a list of organization conformance packs. </p> <note> <p>When you specify the limit and the next token, you receive a paginated response. </p> <p>Limit and next token are not applicable if you specify organization conformance packs names. They are only applicable, when you request all the organization conformance packs. </p> </note>"
"documentation":"<p>Returns a list of organization conformance packs. </p> <note> <p>When you specify the limit and the next token, you receive a paginated response. </p> <p>Limit and next token are not applicable if you specify organization conformance packs names. They are only applicable, when you request all the organization conformance packs. </p> <p> <i>For accounts within an organzation</i> </p> <p>If you deploy an organizational rule or conformance pack in an organization administrator account, and then establish a delegated administrator and deploy an organizational rule or conformance pack in the delegated administrator account, you won't be able to see the organizational rule or conformance pack in the organization administrator account from the delegated administrator account or see the organizational rule or conformance pack in the delegated administrator account from organization administrator account. The <code>DescribeOrganizationConfigRules</code> and <code>DescribeOrganizationConformancePacks</code> APIs can only see and interact with the organization-related resource that were deployed from within the account calling those APIs.</p> </note>"
},
"DescribePendingAggregationRequests":{
"name":"DescribePendingAggregationRequests",
Expand Down Expand Up @@ -1119,7 +1119,7 @@
{"shape":"OrganizationAllFeaturesNotEnabledException"},
{"shape":"NoAvailableOrganizationException"}
],
"documentation":"<p>Deploys conformance packs across member accounts in an Amazon Web Services Organization.</p> <p>Only a master account and a delegated administrator can call this API. When calling this API with a delegated administrator, you must ensure Organizations <code>ListDelegatedAdministrator</code> permissions are added.</p> <p>This API enables organization service access for <code>config-multiaccountsetup.amazonaws.com</code> through the <code>EnableAWSServiceAccess</code> action and creates a service linked role <code>AWSServiceRoleForConfigMultiAccountSetup</code> in the master or delegated administrator account of your organization. The service linked role is created only when the role does not exist in the caller account. To use this API with delegated administrator, register a delegated administrator by calling Amazon Web Services Organization <code>register-delegate-admin</code> for <code>config-multiaccountsetup.amazonaws.com</code>.</p> <note> <p>Prerequisite: Ensure you call <code>EnableAllFeatures</code> API to enable all features in an organization.</p> <p>You must specify either the <code>TemplateS3Uri</code> or the <code>TemplateBody</code> parameter, but not both. If you provide both Config uses the <code>TemplateS3Uri</code> parameter and ignores the <code>TemplateBody</code> parameter.</p> <p>Config sets the state of a conformance pack to CREATE_IN_PROGRESS and UPDATE_IN_PROGRESS until the conformance pack is created or updated. You cannot update a conformance pack while it is in this state.</p> <p>You can create 50 conformance packs with 25 Config rules in each pack and 3 delegated administrator per organization. </p> </note>"
"documentation":"<p>Deploys conformance packs across member accounts in an Amazon Web Services Organization. For information on how many organization conformance packs and how many Config rules you can have per account, see <a href=\"https://docs.aws.amazon.com/config/latest/developerguide/configlimits.html\"> <b>Service Limits</b> </a> in the Config Developer Guide.</p> <p>Only a master account and a delegated administrator can call this API. When calling this API with a delegated administrator, you must ensure Organizations <code>ListDelegatedAdministrator</code> permissions are added. An organization can have up to 3 delegated administrators.</p> <p>This API enables organization service access for <code>config-multiaccountsetup.amazonaws.com</code> through the <code>EnableAWSServiceAccess</code> action and creates a service linked role <code>AWSServiceRoleForConfigMultiAccountSetup</code> in the master or delegated administrator account of your organization. The service linked role is created only when the role does not exist in the caller account. To use this API with delegated administrator, register a delegated administrator by calling Amazon Web Services Organization <code>register-delegate-admin</code> for <code>config-multiaccountsetup.amazonaws.com</code>.</p> <note> <p>Prerequisite: Ensure you call <code>EnableAllFeatures</code> API to enable all features in an organization.</p> <p>You must specify either the <code>TemplateS3Uri</code> or the <code>TemplateBody</code> parameter, but not both. If you provide both Config uses the <code>TemplateS3Uri</code> parameter and ignores the <code>TemplateBody</code> parameter.</p> <p>Config sets the state of a conformance pack to CREATE_IN_PROGRESS and UPDATE_IN_PROGRESS until the conformance pack is created or updated. You cannot update a conformance pack while it is in this state.</p> </note>"
},
"PutRemediationConfigurations":{
"name":"PutRemediationConfigurations",
Expand All @@ -1133,7 +1133,7 @@
{"shape":"InsufficientPermissionsException"},
{"shape":"InvalidParameterValueException"}
],
"documentation":"<p>Adds or updates the remediation configuration with a specific Config rule with the selected target or action. The API creates the <code>RemediationConfiguration</code> object for the Config rule. The Config rule must already exist for you to add a remediation configuration. The target (SSM document) must exist and have permissions to use the target. </p> <note> <p>If you make backward incompatible changes to the SSM document, you must call this again to ensure the remediations can run.</p> <p>This API does not support adding remediation configurations for service-linked Config Rules such as Organization Config rules, the rules deployed by conformance packs, and rules deployed by Amazon Web Services Security Hub.</p> </note>"
"documentation":"<p>Adds or updates the remediation configuration with a specific Config rule with the selected target or action. The API creates the <code>RemediationConfiguration</code> object for the Config rule. The Config rule must already exist for you to add a remediation configuration. The target (SSM document) must exist and have permissions to use the target. </p> <note> <p>If you make backward incompatible changes to the SSM document, you must call this again to ensure the remediations can run.</p> <p>This API does not support adding remediation configurations for service-linked Config Rules such as Organization Config rules, the rules deployed by conformance packs, and rules deployed by Amazon Web Services Security Hub.</p> </note> <note> <p>For manual remediation configuration, you need to provide a value for <code>automationAssumeRole</code> or use a value in the <code>assumeRole</code>field to remediate your resources. The SSM automation document can use either as long as it maps to a valid parameter.</p> <p>However, for automatic remediation configuration, the only valid <code>assumeRole</code> field value is <code>AutomationAssumeRole</code> and you need to provide a value for <code>AutomationAssumeRole</code> to remediate your resources.</p> </note>"
},
"PutRemediationExceptions":{
"name":"PutRemediationExceptions",
Expand Down Expand Up @@ -2025,7 +2025,7 @@
},
"MaximumExecutionFrequency":{
"shape":"MaximumExecutionFrequency",
"documentation":"<p>The maximum frequency with which Config runs evaluations for a rule. You can specify a value for <code>MaximumExecutionFrequency</code> when:</p> <ul> <li> <p>You are using an Config managed rule that is triggered at a periodic frequency.</p> </li> <li> <p>Your custom rule is triggered when Config delivers the configuration snapshot. For more information, see <a>ConfigSnapshotDeliveryProperties</a>.</p> </li> </ul> <note> <p>By default, rules with a periodic trigger are evaluated every 24 hours. To change the frequency, specify a valid value for the <code>MaximumExecutionFrequency</code> parameter.</p> </note>"
"documentation":"<p>The maximum frequency with which Config runs evaluations for a rule. You can specify a value for <code>MaximumExecutionFrequency</code> when:</p> <ul> <li> <p>This is for an Config managed rule that is triggered at a periodic frequency.</p> </li> <li> <p>Your custom rule is triggered when Config delivers the configuration snapshot. For more information, see <a>ConfigSnapshotDeliveryProperties</a>.</p> </li> </ul> <note> <p>By default, rules with a periodic trigger are evaluated every 24 hours. To change the frequency, specify a valid value for the <code>MaximumExecutionFrequency</code> parameter.</p> </note>"
},
"ConfigRuleState":{
"shape":"ConfigRuleState",
Expand Down Expand Up @@ -2366,7 +2366,7 @@
},
"roleARN":{
"shape":"String",
"documentation":"<p>Amazon Resource Name (ARN) of the IAM role used to describe the Amazon Web Services resources associated with the account.</p>"
"documentation":"<p>Amazon Resource Name (ARN) of the IAM role used to describe the Amazon Web Services resources associated with the account.</p> <note> <p>While the API model does not require this field, the server will reject a request without a defined roleARN for the configuration recorder.</p> </note>"
},
"recordingGroup":{
"shape":"RecordingGroup",
Expand Down Expand Up @@ -5676,7 +5676,7 @@
},
"MaximumExecutionFrequency":{
"shape":"MaximumExecutionFrequency",
"documentation":"<p>The maximum frequency with which Config runs evaluations for a rule. You are using an Config managed rule that is triggered at a periodic frequency.</p> <note> <p>By default, rules with a periodic trigger are evaluated every 24 hours. To change the frequency, specify a valid value for the <code>MaximumExecutionFrequency</code> parameter.</p> </note>"
"documentation":"<p>The maximum frequency with which Config runs evaluations for a rule. This is for an Config managed rule that is triggered at a periodic frequency.</p> <note> <p>By default, rules with a periodic trigger are evaluated every 24 hours. To change the frequency, specify a valid value for the <code>MaximumExecutionFrequency</code> parameter.</p> </note>"
},
"ResourceTypesScope":{
"shape":"ResourceTypesScope",
Expand Down Expand Up @@ -6167,7 +6167,7 @@
},
"Tags":{
"shape":"Tags",
"documentation":"<p>Tags associated with the resource.</p>"
"documentation":"<p>Tags associated with the resource.</p> <note> <p>This field is not to be confused with the Amazon Web Services-wide tag feature for Amazon Web Services resources. Tags for <code>PutResourceConfig</code> are tags that you supply for the configuration items of your custom resources.</p> </note>"
}
}
},
Expand Down
17 changes: 14 additions & 3 deletions botocore/data/lexv2-models/2020-08-07/service-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -1327,7 +1327,7 @@
"members":{
"transcript":{
"shape":"Transcript",
"documentation":"<p>The content of the transcript that meets the search filter criteria. For the JSON format of the transcript, see <a href=\"https://docs.aws.amazon.com/lex/latest/dg/designing-output-format.html\">Output transcript format</a>.</p>"
"documentation":"<p>The content of the transcript that meets the search filter criteria. For the JSON format of the transcript, see <a href=\"https://docs.aws.amazon.com/lexv2/latest/dg/designing-output-format.html\">Output transcript format</a>.</p>"
}
},
"documentation":"<p>The object containing information that associates the recommended intent/slot type with a conversation.</p>"
Expand Down Expand Up @@ -1814,7 +1814,7 @@
"documentation":"<p>The statistical summary of the bot recommendation results.</p>"
}
},
"documentation":"<p>The object representing the URL of the bot definition, the URL of the associated transcript and a statistical summary of the bot recommendation results.</p>"
"documentation":"<p>The object representing the URL of the bot definition, the URL of the associated transcript, and a statistical summary of the bot recommendation results.</p>"
},
"BotRecommendationStatus":{
"type":"string",
Expand Down Expand Up @@ -2629,7 +2629,7 @@
},
"exportStatus":{
"shape":"ExportStatus",
"documentation":"<p>The status of the export. When the status is <code>Completed</code>, you can use the <a href=\"https://docs.aws.amazon.com/latest/dg/API_DescribeExport.html\">DescribeExport</a> operation to get the pre-signed S3 URL link to your exported bot or bot locale.</p>"
"documentation":"<p>The status of the export. When the status is <code>Completed</code>, you can use the <a href=\"https://docs.aws.amazon.com/lexv2/latest/dg/API_DescribeExport.html\">DescribeExport</a> operation to get the pre-signed S3 URL link to your exported bot or bot locale.</p>"
},
"creationDateTime":{
"shape":"Timestamp",
Expand Down Expand Up @@ -6204,6 +6204,13 @@
"max":5,
"min":1
},
"MessageSelectionStrategy":{
"type":"string",
"enum":[
"Random",
"Ordered"
]
},
"MessageVariationsList":{
"type":"list",
"member":{"shape":"Message"},
Expand Down Expand Up @@ -6413,6 +6420,10 @@
"allowInterrupt":{
"shape":"BoxedBoolean",
"documentation":"<p>Indicates whether the user can interrupt a speech prompt from the bot.</p>"
},
"messageSelectionStrategy":{
"shape":"MessageSelectionStrategy",
"documentation":"<p>Indicates how a message is selected from a message group among retries.</p>"
}
},
"documentation":"<p>Specifies a list of message groups that Amazon Lex sends to a user to elicit a response.</p>"
Expand Down

0 comments on commit bdc1e59

Please sign in to comment.