Skip to content

Commit 590384d

Browse files
author
AWS SDK for Go v2 automation user
committed
Update API model
1 parent 6a28d22 commit 590384d

File tree

6 files changed

+651
-96
lines changed

6 files changed

+651
-96
lines changed

codegen/sdk-codegen/aws-models/codebuild.json

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7455,20 +7455,20 @@
74557455
"name": {
74567456
"target": "com.amazonaws.codebuild#String",
74577457
"traits": {
7458-
"smithy.api#documentation": "<p>The name of either the enterprise or organization that will send webhook events to CodeBuild, depending on if the webhook is a global or organization webhook respectively.</p>",
7458+
"smithy.api#documentation": "<p>The name of either the group, enterprise, or organization that will send webhook events to CodeBuild, depending on the type of webhook.</p>",
74597459
"smithy.api#required": {}
74607460
}
74617461
},
74627462
"domain": {
74637463
"target": "com.amazonaws.codebuild#String",
74647464
"traits": {
7465-
"smithy.api#documentation": "<p>The domain of the GitHub Enterprise organization. Note that this parameter is only required if your project's source type is GITHUB_ENTERPRISE</p>"
7465+
"smithy.api#documentation": "<p>The domain of the GitHub Enterprise organization or the GitLab Self Managed group. Note that this parameter is only required if your project's source type is GITHUB_ENTERPRISE or GITLAB_SELF_MANAGED.</p>"
74667466
}
74677467
},
74687468
"scope": {
74697469
"target": "com.amazonaws.codebuild#WebhookScopeType",
74707470
"traits": {
7471-
"smithy.api#documentation": "<p>The type of scope for a GitHub webhook.</p>",
7471+
"smithy.api#documentation": "<p>The type of scope for a GitHub or GitLab webhook.</p>",
74727472
"smithy.api#required": {}
74737473
}
74747474
}
@@ -9206,6 +9206,12 @@
92069206
"traits": {
92079207
"smithy.api#enumValue": "GITHUB_GLOBAL"
92089208
}
9209+
},
9210+
"GITLAB_GROUP": {
9211+
"target": "smithy.api#Unit",
9212+
"traits": {
9213+
"smithy.api#enumValue": "GITLAB_GROUP"
9214+
}
92099215
}
92109216
}
92119217
},

codegen/sdk-codegen/aws-models/ecr.json

Lines changed: 28 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3499,7 +3499,7 @@
34993499
"encryptionType": {
35003500
"target": "com.amazonaws.ecr#EncryptionType",
35013501
"traits": {
3502-
"smithy.api#documentation": "<p>The encryption type to use.</p>\n <p>If you use the <code>KMS</code> encryption type, the contents of the repository will\n be encrypted using server-side encryption with Key Management Service key stored in KMS. When you\n use KMS to encrypt your data, you can either use the default Amazon Web Services managed KMS key\n for Amazon ECR, or specify your own KMS key, which you already created.</p>\n <p>If you use the <code>KMS_DSSE</code> encryption type, the contents of the repository\n will be encrypted with two layers of encryption using server-side encryption with the\n KMS Management Service key stored in KMS. Similar to the KMS encryption type, you\n can either use the default Amazon Web Services managed KMS key for Amazon ECR, or specify your own KMS\n key, which you've already created. </p>\n <p>If you use the <code>AES256</code> encryption type, Amazon ECR uses server-side encryption\n with Amazon S3-managed encryption keys which encrypts the images in the repository using an\n AES256 encryption algorithm. For more information, see <a href=\"https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingServerSideEncryption.html\">Protecting data using\n server-side encryption with Amazon S3-managed encryption keys (SSE-S3)</a> in the\n <i>Amazon Simple Storage Service Console Developer Guide</i>.</p>",
3502+
"smithy.api#documentation": "<p>The encryption type to use.</p>\n <p>If you use the <code>KMS</code> encryption type, the contents of the repository will\n be encrypted using server-side encryption with Key Management Service key stored in KMS. When you\n use KMS to encrypt your data, you can either use the default Amazon Web Services managed KMS key\n for Amazon ECR, or specify your own KMS key, which you already created.</p>\n <p>If you use the <code>KMS_DSSE</code> encryption type, the contents of the repository\n will be encrypted with two layers of encryption using server-side encryption with the\n KMS Management Service key stored in KMS. Similar to the <code>KMS</code> encryption type, you\n can either use the default Amazon Web Services managed KMS key for Amazon ECR, or specify your own KMS\n key, which you've already created. </p>\n <p>If you use the <code>AES256</code> encryption type, Amazon ECR uses server-side encryption\n with Amazon S3-managed encryption keys which encrypts the images in the repository using an\n AES256 encryption algorithm.</p>\n <p>For more information, see <a href=\"https://docs.aws.amazon.com/AmazonECR/latest/userguide/encryption-at-rest.html\">Amazon ECR encryption at\n rest</a> in the <i>Amazon Elastic Container Registry User Guide</i>.</p>",
35033503
"smithy.api#required": {}
35043504
}
35053505
},
@@ -3651,6 +3651,18 @@
36513651
"traits": {
36523652
"smithy.api#documentation": "<p>The date and time the finding was last updated at.</p>"
36533653
}
3654+
},
3655+
"fixAvailable": {
3656+
"target": "com.amazonaws.ecr#FixAvailable",
3657+
"traits": {
3658+
"smithy.api#documentation": "<p>Details on whether a fix is available through a version update. This value can be\n <code>YES</code>, <code>NO</code>, or <code>PARTIAL</code>. A <code>PARTIAL</code>\n fix means that some, but not all, of the packages identified in the finding have fixes\n available through updated versions.</p>"
3659+
}
3660+
},
3661+
"exploitAvailable": {
3662+
"target": "com.amazonaws.ecr#ExploitAvailable",
3663+
"traits": {
3664+
"smithy.api#documentation": "<p>If a finding discovered in your environment has an exploit available.</p>"
3665+
}
36543666
}
36553667
},
36563668
"traits": {
@@ -3675,6 +3687,9 @@
36753687
"com.amazonaws.ecr#ExpirationTimestamp": {
36763688
"type": "timestamp"
36773689
},
3690+
"com.amazonaws.ecr#ExploitAvailable": {
3691+
"type": "string"
3692+
},
36783693
"com.amazonaws.ecr#FilePath": {
36793694
"type": "string"
36803695
},
@@ -3737,6 +3752,12 @@
37373752
"target": "com.amazonaws.ecr#SeverityCount"
37383753
}
37393754
},
3755+
"com.amazonaws.ecr#FixAvailable": {
3756+
"type": "string"
3757+
},
3758+
"com.amazonaws.ecr#FixedInVersion": {
3759+
"type": "string"
3760+
},
37403761
"com.amazonaws.ecr#ForceFlag": {
37413762
"type": "boolean",
37423763
"traits": {
@@ -8639,6 +8660,12 @@
86398660
"traits": {
86408661
"smithy.api#documentation": "<p>The version of the vulnerable package.</p>"
86418662
}
8663+
},
8664+
"fixedInVersion": {
8665+
"target": "com.amazonaws.ecr#FixedInVersion",
8666+
"traits": {
8667+
"smithy.api#documentation": "<p>The version of the package that contains the vulnerability fix.</p>"
8668+
}
86428669
}
86438670
},
86448671
"traits": {

0 commit comments

Comments
 (0)