Skip to content

Commit 1e15eca

Browse files
Make accountIds a required field in GetRemainingFreeTrialDays API to reflect service behavior.
Adds support for linkedGroupId on the CreatePlacementGroup and DescribePlacementGroups APIs. The linkedGroupId parameter is reserved for future use. Change API Reference Documentation for default Mode in Accounting and SlurmRest Added supported resourceTypes for Config from July to November 2025
1 parent 478207e commit 1e15eca

File tree

22 files changed

+1056
-151
lines changed

22 files changed

+1056
-151
lines changed

VERSION

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
1.11.715
1+
1.11.716

generated/src/aws-cpp-sdk-config/include/aws/config/model/ConfigurationRecorder.h

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -101,10 +101,10 @@ class ConfigurationRecorder {
101101
* policies when running evaluations. Make sure that the policies in effect align
102102
* with how you intend to use Config.</p> <p> <b>Keep Minimum Permisions When
103103
* Reusing an IAM role</b> </p> <p>If you use an Amazon Web Services service that
104-
* uses Config, such as Security Hub or Control Tower, and an IAM role has already
105-
* been created, make sure that the IAM role that you use when setting up Config
106-
* keeps the same minimum permissions as the pre-existing IAM role. You must do
107-
* this to ensure that the other Amazon Web Services service continues to run as
104+
* uses Config, such as Security Hub CSPM or Control Tower, and an IAM role has
105+
* already been created, make sure that the IAM role that you use when setting up
106+
* Config keeps the same minimum permissions as the pre-existing IAM role. You must
107+
* do this to ensure that the other Amazon Web Services service continues to run as
108108
* expected. </p> <p>For example, if Control Tower has an IAM role that allows
109109
* Config to read S3 objects, make sure that the same permissions are granted to
110110
* the IAM role you use when setting up Config. Otherwise, it may interfere with

generated/src/aws-cpp-sdk-config/include/aws/config/model/ResourceType.h

Lines changed: 92 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -453,7 +453,98 @@ enum class ResourceType {
453453
AWS_S3Express_DirectoryBucket,
454454
AWS_SageMaker_InferenceExperiment,
455455
AWS_SecurityHub_Standard,
456-
AWS_Transfer_Profile
456+
AWS_Transfer_Profile,
457+
AWS_CloudFormation_StackSet,
458+
AWS_MediaPackageV2_Channel,
459+
AWS_S3_AccessGrantsLocation,
460+
AWS_S3_AccessGrant,
461+
AWS_S3_AccessGrantsInstance,
462+
AWS_EMRServerless_Application,
463+
AWS_Config_AggregationAuthorization,
464+
AWS_Bedrock_ApplicationInferenceProfile,
465+
AWS_ApiGatewayV2_Integration,
466+
AWS_SageMaker_MlflowTrackingServer,
467+
AWS_SageMaker_ModelBiasJobDefinition,
468+
AWS_SecretsManager_RotationSchedule,
469+
AWS_Deadline_QueueFleetAssociation,
470+
AWS_ECR_RepositoryCreationTemplate,
471+
AWS_CloudFormation_LambdaHook,
472+
AWS_EC2_SubnetNetworkAclAssociation,
473+
AWS_ApiGateway_UsagePlan,
474+
AWS_AppConfig_Extension,
475+
AWS_Deadline_Fleet,
476+
AWS_EMR_Studio,
477+
AWS_S3Tables_TableBucket,
478+
AWS_CloudFront_RealtimeLogConfig,
479+
AWS_BackupGateway_Hypervisor,
480+
AWS_BCMDataExports_Export,
481+
AWS_CloudFormation_GuardHook,
482+
AWS_CloudFront_PublicKey,
483+
AWS_CloudTrail_EventDataStore,
484+
AWS_EntityResolution_IdMappingWorkflow,
485+
AWS_EntityResolution_SchemaMapping,
486+
AWS_IoT_DomainConfiguration,
487+
AWS_PCAConnectorAD_DirectoryRegistration,
488+
AWS_RDS_Integration,
489+
AWS_Config_ConformancePack,
490+
AWS_RolesAnywhere_Profile,
491+
AWS_CodeArtifact_Domain,
492+
AWS_Backup_RestoreTestingPlan,
493+
AWS_Config_StoredQuery,
494+
AWS_SageMaker_DataQualityJobDefinition,
495+
AWS_SageMaker_ModelExplainabilityJobDefinition,
496+
AWS_SageMaker_ModelQualityJobDefinition,
497+
AWS_SageMaker_StudioLifecycleConfig,
498+
AWS_SES_DedicatedIpPool,
499+
AWS_SES_MailManagerTrafficPolicy,
500+
AWS_SSM_ResourceDataSync,
501+
AWS_BedrockAgentCore_Runtime,
502+
AWS_BedrockAgentCore_BrowserCustom,
503+
AWS_ElasticLoadBalancingV2_TargetGroup,
504+
AWS_EMRContainers_VirtualCluster,
505+
AWS_EntityResolution_MatchingWorkflow,
506+
AWS_IoTCoreDeviceAdvisor_SuiteDefinition,
507+
AWS_EC2_SecurityGroupVpcAssociation,
508+
AWS_EC2_VerifiedAccessInstance,
509+
AWS_KafkaConnect_CustomPlugin,
510+
AWS_NetworkManager_TransitGatewayPeering,
511+
AWS_OpenSearchServerless_SecurityConfig,
512+
AWS_Redshift_Integration,
513+
AWS_RolesAnywhere_TrustAnchor,
514+
AWS_Route53Profiles_ProfileAssociation,
515+
AWS_SSMIncidents_ResponsePlan,
516+
AWS_Transfer_Server,
517+
AWS_Glue_Database,
518+
AWS_Organizations_OrganizationalUnit,
519+
AWS_EC2_IPAMPoolCidr,
520+
AWS_EC2_VPCGatewayAttachment,
521+
AWS_Bedrock_Prompt,
522+
AWS_Comprehend_Flywheel,
523+
AWS_DataSync_Agent,
524+
AWS_MediaTailor_LiveSource,
525+
AWS_MSK_ServerlessCluster,
526+
AWS_IoTSiteWise_Asset,
527+
AWS_B2BI_Capability,
528+
AWS_CloudFront_KeyValueStore,
529+
AWS_Deadline_Monitor,
530+
AWS_GuardDuty_MalwareProtectionPlan,
531+
AWS_Location_APIKey,
532+
AWS_MediaPackageV2_OriginEndpoint,
533+
AWS_PCAConnectorAD_Connector,
534+
AWS_S3Tables_TableBucketPolicy,
535+
AWS_SecretsManager_ResourcePolicy,
536+
AWS_SSMContacts_Contact,
537+
AWS_IoT_ThingGroup,
538+
AWS_ImageBuilder_LifecyclePolicy,
539+
AWS_GameLift_Build,
540+
AWS_ECR_ReplicationConfiguration,
541+
AWS_EC2_SubnetCidrBlock,
542+
AWS_Connect_SecurityProfile,
543+
AWS_CleanRoomsML_TrainingDataset,
544+
AWS_AppStream_AppBlockBuilder,
545+
AWS_Route53_DNSSEC,
546+
AWS_SageMaker_UserProfile,
547+
AWS_ApiGateway_Method
457548
};
458549

459550
namespace ResourceTypeMapper {

0 commit comments

Comments
 (0)