Skip to content

Commit

Permalink
Updated API models and rebuilt service gems.
Browse files Browse the repository at this point in the history
  • Loading branch information
aws-sdk-ruby-automation committed Aug 5, 2024
1 parent ba75fe2 commit c0c44f1
Show file tree
Hide file tree
Showing 48 changed files with 3,670 additions and 126 deletions.
541 changes: 531 additions & 10 deletions apis/datazone/2018-05-10/api-2.json

Large diffs are not rendered by default.

307 changes: 301 additions & 6 deletions apis/datazone/2018-05-10/docs-2.json

Large diffs are not rendered by default.

6 changes: 6 additions & 0 deletions apis/datazone/2018-05-10/paginators-1.json
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,12 @@
"limit_key": "maxResults",
"result_key": "items"
},
"ListDataProductRevisions": {
"input_token": "nextToken",
"output_token": "nextToken",
"limit_key": "maxResults",
"result_key": "items"
},
"ListDataSourceRunActivities": {
"input_token": "nextToken",
"output_token": "nextToken",
Expand Down
67 changes: 67 additions & 0 deletions apis/ecr/2015-09-21/api-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -346,6 +346,20 @@
{"shape":"InvalidParameterException"}
]
},
"GetAccountSetting":{
"name":"GetAccountSetting",
"http":{
"method":"POST",
"requestUri":"/"
},
"input":{"shape":"GetAccountSettingRequest"},
"output":{"shape":"GetAccountSettingResponse"},
"errors":[
{"shape":"ServerException"},
{"shape":"ValidationException"},
{"shape":"InvalidParameterException"}
]
},
"GetAuthorizationToken":{
"name":"GetAuthorizationToken",
"http":{
Expand Down Expand Up @@ -495,6 +509,21 @@
{"shape":"ServerException"}
]
},
"PutAccountSetting":{
"name":"PutAccountSetting",
"http":{
"method":"POST",
"requestUri":"/"
},
"input":{"shape":"PutAccountSettingRequest"},
"output":{"shape":"PutAccountSettingResponse"},
"errors":[
{"shape":"ServerException"},
{"shape":"ValidationException"},
{"shape":"InvalidParameterException"},
{"shape":"LimitExceededException"}
]
},
"PutImage":{
"name":"PutImage",
"http":{
Expand Down Expand Up @@ -751,6 +780,12 @@
}
},
"shapes":{
"AccountSettingName":{
"type":"string",
"max":64,
"min":1
},
"AccountSettingValue":{"type":"string"},
"Arch":{"type":"string"},
"Arn":{"type":"string"},
"Attribute":{
Expand Down Expand Up @@ -1329,6 +1364,20 @@
"value":{"shape":"SeverityCount"}
},
"ForceFlag":{"type":"boolean"},
"GetAccountSettingRequest":{
"type":"structure",
"required":["name"],
"members":{
"name":{"shape":"AccountSettingName"}
}
},
"GetAccountSettingResponse":{
"type":"structure",
"members":{
"name":{"shape":"AccountSettingName"},
"value":{"shape":"AccountSettingName"}
}
},
"GetAuthorizationTokenRegistryIdList":{
"type":"list",
"member":{"shape":"RegistryId"},
Expand Down Expand Up @@ -2014,6 +2063,24 @@
"min":1
},
"PushTimestamp":{"type":"timestamp"},
"PutAccountSettingRequest":{
"type":"structure",
"required":[
"name",
"value"
],
"members":{
"name":{"shape":"AccountSettingName"},
"value":{"shape":"AccountSettingValue"}
}
},
"PutAccountSettingResponse":{
"type":"structure",
"members":{
"name":{"shape":"AccountSettingName"},
"value":{"shape":"AccountSettingValue"}
}
},
"PutImageRequest":{
"type":"structure",
"required":[
Expand Down
45 changes: 42 additions & 3 deletions apis/ecr/2015-09-21/docs-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -23,6 +23,7 @@
"DescribeRegistry": "<p>Describes the settings for a registry. The replication configuration for a repository can be created or updated with the <a>PutReplicationConfiguration</a> API action.</p>",
"DescribeRepositories": "<p>Describes image repositories in a registry.</p>",
"DescribeRepositoryCreationTemplates": "<p>Returns details about the repository creation templates in a registry. The <code>prefixes</code> request parameter can be used to return the details for a specific repository creation template.</p>",
"GetAccountSetting": "<p>Retrieves the basic scan type version name.</p>",
"GetAuthorizationToken": "<p>Retrieves an authorization token. An authorization token represents your IAM authentication credentials and can be used to access any Amazon ECR registry that your IAM principal has access to. The authorization token is valid for 12 hours.</p> <p>The <code>authorizationToken</code> returned is a base64 encoded string that can be decoded and used in a <code>docker login</code> command to authenticate to a registry. The CLI offers an <code>get-login-password</code> command that simplifies the login process. For more information, see <a href=\"https://docs.aws.amazon.com/AmazonECR/latest/userguide/Registries.html#registry_auth\">Registry authentication</a> in the <i>Amazon Elastic Container Registry User Guide</i>.</p>",
"GetDownloadUrlForLayer": "<p>Retrieves the pre-signed Amazon S3 download URL corresponding to an image layer. You can only get URLs for image layers that are referenced in an image.</p> <p>When an image is pulled, the GetDownloadUrlForLayer API is called once per image layer that is not already cached.</p> <note> <p>This operation is used by the Amazon ECR proxy and is not generally used by customers for pulling and pushing images. In most cases, you should use the <code>docker</code> CLI to pull, tag, and push images.</p> </note>",
"GetLifecyclePolicy": "<p>Retrieves the lifecycle policy for the specified repository.</p>",
Expand All @@ -33,6 +34,7 @@
"InitiateLayerUpload": "<p>Notifies Amazon ECR that you intend to upload an image layer.</p> <p>When an image is pushed, the InitiateLayerUpload API is called once per image layer that has not already been uploaded. Whether or not an image layer has been uploaded is determined by the BatchCheckLayerAvailability API action.</p> <note> <p>This operation is used by the Amazon ECR proxy and is not generally used by customers for pulling and pushing images. In most cases, you should use the <code>docker</code> CLI to pull, tag, and push images.</p> </note>",
"ListImages": "<p>Lists all the image IDs for the specified repository.</p> <p>You can filter images based on whether or not they are tagged by using the <code>tagStatus</code> filter and specifying either <code>TAGGED</code>, <code>UNTAGGED</code> or <code>ANY</code>. For example, you can filter your results to return only <code>UNTAGGED</code> images and then pipe that result to a <a>BatchDeleteImage</a> operation to delete them. Or, you can filter your results to return only <code>TAGGED</code> images to list all of the tags in your repository.</p>",
"ListTagsForResource": "<p>List the tags for an Amazon ECR resource.</p>",
"PutAccountSetting": "<p>Allows you to change the basic scan type version by setting the <code>name</code> parameter to either <code>CLAIR</code> to <code>AWS_NATIVE</code>.</p>",
"PutImage": "<p>Creates or updates the image manifest and tags associated with an image.</p> <p>When an image is pushed and all new image layers have been uploaded, the PutImage API is called once to create or update the image manifest and the tags associated with the image.</p> <note> <p>This operation is used by the Amazon ECR proxy and is not generally used by customers for pulling and pushing images. In most cases, you should use the <code>docker</code> CLI to pull, tag, and push images.</p> </note>",
"PutImageScanningConfiguration": "<important> <p>The <code>PutImageScanningConfiguration</code> API is being deprecated, in favor of specifying the image scanning configuration at the registry level. For more information, see <a>PutRegistryScanningConfiguration</a>.</p> </important> <p>Updates the image scanning configuration for the specified repository.</p>",
"PutImageTagMutability": "<p>Updates the image tag mutability settings for the specified repository. For more information, see <a href=\"https://docs.aws.amazon.com/AmazonECR/latest/userguide/image-tag-mutability.html\">Image tag mutability</a> in the <i>Amazon Elastic Container Registry User Guide</i>.</p>",
Expand All @@ -51,6 +53,23 @@
"ValidatePullThroughCacheRule": "<p>Validates an existing pull through cache rule for an upstream registry that requires authentication. This will retrieve the contents of the Amazon Web Services Secrets Manager secret, verify the syntax, and then validate that authentication to the upstream registry is successful.</p>"
},
"shapes": {
"AccountSettingName": {
"base": null,
"refs": {
"GetAccountSettingRequest$name": "<p>Basic scan type version name. </p>",
"GetAccountSettingResponse$name": "<p>Retrieves the basic scan type version name.</p>",
"GetAccountSettingResponse$value": "<p>Retrieves the value that specifies what basic scan type is being used: <code>AWS_NATIVE</code> or <code>CLAIR</code>.</p>",
"PutAccountSettingRequest$name": "<p>Basic scan type version name. </p>",
"PutAccountSettingResponse$name": "<p>Retrieves the the basic scan type version name.</p>"
}
},
"AccountSettingValue": {
"base": null,
"refs": {
"PutAccountSettingRequest$value": "<p>Setting value that determines what basic scan type is being used: <code>AWS_NATIVE</code> or <code>CLAIR</code>.</p>",
"PutAccountSettingResponse$value": "<p>Retrieves the basic scan type value, either <code>AWS_NATIVE</code> or <code>-</code>.</p>"
}
},
"Arch": {
"base": null,
"refs": {
Expand Down Expand Up @@ -245,9 +264,9 @@
"CustomRoleArn": {
"base": null,
"refs": {
"CreateRepositoryCreationTemplateRequest$customRoleArn": "<p>The ARN of the role to be assumed by Amazon ECR. This role must be in the same account as the registry that you are configuring.</p>",
"RepositoryCreationTemplate$customRoleArn": "<p>The ARN of the role to be assumed by Amazon ECR.</p>",
"UpdateRepositoryCreationTemplateRequest$customRoleArn": "<p>The ARN of the role to be assumed by Amazon ECR. This role must be in the same account as the registry that you are configuring.</p>"
"CreateRepositoryCreationTemplateRequest$customRoleArn": "<p>The ARN of the role to be assumed by Amazon ECR. This role must be in the same account as the registry that you are configuring. Amazon ECR will assume your supplied role when the customRoleArn is specified. When this field isn't specified, Amazon ECR will use the service-linked role for the repository creation template.</p>",
"RepositoryCreationTemplate$customRoleArn": "<p>The ARN of the role to be assumed by Amazon ECR. Amazon ECR will assume your supplied role when the customRoleArn is specified. When this field isn't specified, Amazon ECR will use the service-linked role for the repository creation template.</p>",
"UpdateRepositoryCreationTemplateRequest$customRoleArn": "<p>The ARN of the role to be assumed by Amazon ECR. This role must be in the same account as the registry that you are configuring. Amazon ECR will assume your supplied role when the customRoleArn is specified. When this field isn't specified, Amazon ECR will use the service-linked role for the repository creation template.</p>"
}
},
"CvssScore": {
Expand Down Expand Up @@ -578,6 +597,16 @@
"SetRepositoryPolicyRequest$force": "<p>If the policy you are attempting to set on a repository policy would prevent you from setting another policy in the future, you must force the <a>SetRepositoryPolicy</a> operation. This is intended to prevent accidental repository lock outs.</p>"
}
},
"GetAccountSettingRequest": {
"base": null,
"refs": {
}
},
"GetAccountSettingResponse": {
"base": null,
"refs": {
}
},
"GetAuthorizationTokenRegistryIdList": {
"base": null,
"refs": {
Expand Down Expand Up @@ -1294,6 +1323,16 @@
"LifecyclePolicyPreviewResult$imagePushedAt": "<p>The date and time, expressed in standard JavaScript date format, at which the current image was pushed to the repository.</p>"
}
},
"PutAccountSettingRequest": {
"base": null,
"refs": {
}
},
"PutAccountSettingResponse": {
"base": null,
"refs": {
}
},
"PutImageRequest": {
"base": null,
"refs": {
Expand Down
32 changes: 32 additions & 0 deletions apis/kinesis-video-webrtc-storage/2018-05-10/api-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -26,6 +26,21 @@
{"shape":"AccessDeniedException"},
{"shape":"ResourceNotFoundException"}
]
},
"JoinStorageSessionAsViewer":{
"name":"JoinStorageSessionAsViewer",
"http":{
"method":"POST",
"requestUri":"/joinStorageSessionAsViewer",
"responseCode":200
},
"input":{"shape":"JoinStorageSessionAsViewerInput"},
"errors":[
{"shape":"ClientLimitExceededException"},
{"shape":"InvalidArgumentException"},
{"shape":"AccessDeniedException"},
{"shape":"ResourceNotFoundException"}
]
}
},
"shapes":{
Expand All @@ -44,6 +59,12 @@
"type":"string",
"pattern":"^arn:(aws[a-zA-Z-]*):kinesisvideo:[a-z0-9-]+:[0-9]+:[a-z]+/[a-zA-Z0-9_.-]+/[0-9]+$"
},
"ClientId":{
"type":"string",
"max":256,
"min":1,
"pattern":"^[a-zA-Z0-9_.-]+$"
},
"ClientLimitExceededException":{
"type":"structure",
"members":{
Expand All @@ -66,6 +87,17 @@
},
"exception":true
},
"JoinStorageSessionAsViewerInput":{
"type":"structure",
"required":[
"channelArn",
"clientId"
],
"members":{
"channelArn":{"shape":"ChannelArn"},
"clientId":{"shape":"ClientId"}
}
},
"JoinStorageSessionInput":{
"type":"structure",
"required":["channelArn"],
Expand Down
17 changes: 15 additions & 2 deletions apis/kinesis-video-webrtc-storage/2018-05-10/docs-2.json
Original file line number Diff line number Diff line change
@@ -1,8 +1,9 @@
{
"version": "2.0",
"service": "<p> </p>",
"service": "<p><fullname>webrtc</fullname> <p> </p></p>",
"operations": {
"JoinStorageSession": "<p> Join the ongoing one way-video and/or multi-way audio WebRTC session as a video producing device for an input channel. If there’s no existing session for the channel, a new streaming session needs to be created, and the Amazon Resource Name (ARN) of the signaling channel must be provided. </p> <p>Currently for the <code>SINGLE_MASTER</code> type, a video producing device is able to ingest both audio and video media into a stream, while viewers can only ingest audio. Both a video producing device and viewers can join the session first, and wait for other participants.</p> <p>While participants are having peer to peer conversations through webRTC, the ingested media session will be stored into the Kinesis Video Stream. Multiple viewers are able to playback real-time media.</p> <p>Customers can also use existing Kinesis Video Streams features like <code>HLS</code> or <code>DASH</code> playback, Image generation, and more with ingested WebRTC media.</p> <note> <p>Assume that only one video producing device client can be associated with a session for the channel. If more than one client joins the session of a specific channel as a video producing device, the most recent client request takes precedence. </p> </note>"
"JoinStorageSession": "<note> <p>Before using this API, you must call the <code>GetSignalingChannelEndpoint</code> API to request the WEBRTC endpoint. You then specify the endpoint and region in your <code>JoinStorageSession</code> API request.</p> </note> <p>Join the ongoing one way-video and/or multi-way audio WebRTC session as a video producing device for an input channel. If there’s no existing session for the channel, a new streaming session needs to be created, and the Amazon Resource Name (ARN) of the signaling channel must be provided. </p> <p>Currently for the <code>SINGLE_MASTER</code> type, a video producing device is able to ingest both audio and video media into a stream. Only video producing devices can join the session and record media.</p> <important> <p>Both audio and video tracks are currently required for WebRTC ingestion.</p> <p>Current requirements:</p> <ul> <li> <p>Video track: H.264</p> </li> <li> <p>Audio track: Opus</p> </li> </ul> </important> <p>The resulting ingested video in the Kinesis video stream will have the following parameters: H.264 video and AAC audio.</p> <p>Once a master participant has negotiated a connection through WebRTC, the ingested media session will be stored in the Kinesis video stream. Multiple viewers are then able to play back real-time media through our Playback APIs.</p> <p>You can also use existing Kinesis Video Streams features like <code>HLS</code> or <code>DASH</code> playback, image generation via <a href=\"https://docs.aws.amazon.com/kinesisvideostreams/latest/dg/gs-getImages.html\">GetImages</a>, and more with ingested WebRTC media.</p> <note> <p>S3 image delivery and notifications are not currently supported.</p> </note> <note> <p>Assume that only one video producing device client can be associated with a session for the channel. If more than one client joins the session of a specific channel as a video producing device, the most recent client request takes precedence. </p> </note> <p> <b>Additional information</b> </p> <ul> <li> <p> <b>Idempotent</b> - This API is not idempotent.</p> </li> <li> <p> <b>Retry behavior</b> - This is counted as a new API call.</p> </li> <li> <p> <b>Concurrent calls</b> - Concurrent calls are allowed. An offer is sent once per each call.</p> </li> </ul>",
"JoinStorageSessionAsViewer": "<p> Join the ongoing one way-video and/or multi-way audio WebRTC session as a viewer for an input channel. If there’s no existing session for the channel, create a new streaming session and provide the Amazon Resource Name (ARN) of the signaling channel (<code>channelArn</code>) and client id (<code>clientId</code>). </p> <p>Currently for <code>SINGLE_MASTER</code> type, a video producing device is able to ingest both audio and video media into a stream, while viewers can only ingest audio. Both a video producing device and viewers can join a session first and wait for other participants. While participants are having peer to peer conversations through WebRTC, the ingested media session will be stored into the Kinesis Video Stream. Multiple viewers are able to playback real-time media. </p> <p>Customers can also use existing Kinesis Video Streams features like <code>HLS</code> or <code>DASH</code> playback, Image generation, and more with ingested WebRTC media. If there’s an existing session with the same <code>clientId</code> that's found in the join session request, the new request takes precedence.</p>"
},
"shapes": {
"AccessDeniedException": {
Expand All @@ -13,9 +14,16 @@
"ChannelArn": {
"base": null,
"refs": {
"JoinStorageSessionAsViewerInput$channelArn": "<p> The Amazon Resource Name (ARN) of the signaling channel. </p>",
"JoinStorageSessionInput$channelArn": "<p> The Amazon Resource Name (ARN) of the signaling channel. </p>"
}
},
"ClientId": {
"base": null,
"refs": {
"JoinStorageSessionAsViewerInput$clientId": "<p> The unique identifier for the sender client. </p>"
}
},
"ClientLimitExceededException": {
"base": "<p> Kinesis Video Streams has throttled the request because you have exceeded the limit of allowed client calls. Try making the call later. </p>",
"refs": {
Expand All @@ -26,6 +34,11 @@
"refs": {
}
},
"JoinStorageSessionAsViewerInput": {
"base": null,
"refs": {
}
},
"JoinStorageSessionInput": {
"base": null,
"refs": {
Expand Down
Loading

0 comments on commit c0c44f1

Please sign in to comment.