|
91151 | 91151 | "properties": { |
91152 | 91152 | "CloudWatchLogsConfiguration": { |
91153 | 91153 | "$ref": "#/definitions/AWS::FIS::ExperimentTemplate.CloudWatchLogsConfiguration", |
91154 | | - "markdownDescription": "The configuration for experiment logging to Amazon CloudWatch Logs.", |
| 91154 | + "markdownDescription": "The configuration for experiment logging to CloudWatch Logs .", |
91155 | 91155 | "title": "CloudWatchLogsConfiguration" |
91156 | 91156 | }, |
91157 | 91157 | "LogSchemaVersion": { |
|
91161 | 91161 | }, |
91162 | 91162 | "S3Configuration": { |
91163 | 91163 | "$ref": "#/definitions/AWS::FIS::ExperimentTemplate.S3Configuration", |
91164 | | - "markdownDescription": "The configuration for experiment logging to Amazon S3.", |
| 91164 | + "markdownDescription": "The configuration for experiment logging to Amazon S3 .", |
91165 | 91165 | "title": "S3Configuration" |
91166 | 91166 | } |
91167 | 91167 | }, |
|
91202 | 91202 | }, |
91203 | 91203 | "Parameters": { |
91204 | 91204 | "additionalProperties": true, |
91205 | | - "markdownDescription": "The resource type parameters.", |
| 91205 | + "markdownDescription": "The parameters for the resource type.", |
91206 | 91206 | "patternProperties": { |
91207 | 91207 | "^[a-zA-Z0-9]+$": { |
91208 | 91208 | "type": "string" |
@@ -125688,7 +125688,7 @@ |
125688 | 125688 | "items": { |
125689 | 125689 | "type": "string" |
125690 | 125690 | }, |
125691 | | - "markdownDescription": "A list of glob patterns for documents that should not be indexed. If a document that matches an inclusion prefix or inclusion pattern also matches an exclusion pattern, the document is not indexed.\n\nSome [examples](https://docs.aws.amazon.com/cli/latest/reference/s3/#use-of-exclude-and-include-filters) are:\n\n- **.png , *.jpg* will exclude all PNG and JPEG image files in a directory (files with the extensions .png and .jpg).\n- **internal** will exclude all files in a directory that contain 'internal' in the file name, such as 'internal', 'internal_only', 'company_internal'.\n- ***/*internal** will exclude all internal-related files in a directory and its subdirectories.", |
| 125691 | + "markdownDescription": "A list of glob patterns (patterns that can expand a wildcard pattern into a list of path names that match the given pattern) for file names and file types that should not be indexed. If a document that matches an inclusion prefix or inclusion pattern also matches an exclusion pattern, the document is not indexed. Examples of glob patterns include:\n\n- `/myapp/config/*` - All files inside config directory\n- `/**/*.png` - All .png files in all directories\n- `/**/*.{png,ico,md}` - All .png, .ico or .md files in all directories\n- `/myapp/src/**/*.ts` - All .ts files inside src directory (and all its subdirectories)\n- `**/!(*.module).ts` - All .ts files but not .module.ts\n- **.png , *.jpg* will exclude all PNG and JPEG image files in a directory (files with the extensions .png and .jpg).\n- **internal** will exclude all files in a directory that contain 'internal' in the file name, such as 'internal', 'internal_only', 'company_internal'.\n- ***/*internal** will exclude all internal-related files in a directory and its subdirectories.\n\nFor more examples, see [Use of Exclude and Include Filters](https://docs.aws.amazon.com/cli/latest/reference/s3/#use-of-exclude-and-include-filters) in the AWS CLI Command Reference.", |
125692 | 125692 | "title": "ExclusionPatterns", |
125693 | 125693 | "type": "array" |
125694 | 125694 | }, |
@@ -213124,7 +213124,7 @@ |
213124 | 213124 | "type": "number" |
213125 | 213125 | }, |
213126 | 213126 | "CACertificateIdentifier": { |
213127 | | - "markdownDescription": "The identifier of the CA certificate for this DB instance.\n\n> Specifying or updating this property triggers a reboot. \n\nFor more information about CA certificate identifiers for RDS DB engines, see [Rotating Your SSL/TLS Certificate](https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/UsingWithRDS.SSL-certificate-rotation.html) in the *Amazon RDS User Guide* .\n\nFor more information about CA certificate identifiers for Aurora DB engines, see [Rotating Your SSL/TLS Certificate](https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/UsingWithRDS.SSL-certificate-rotation.html) in the *Amazon Aurora User Guide* .", |
| 213127 | + "markdownDescription": "The identifier of the CA certificate for this DB instance.\n\nSpecifying or updating this property triggers a reboot. For more information about CA certificate identifiers for RDS DB engines, see [Rotating Your SSL/TLS Certificate](https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/UsingWithRDS.SSL-certificate-rotation.html) in the *Amazon RDS User Guide* . For more information about CA certificate identifiers for Aurora DB engines, see [Rotating Your SSL/TLS Certificate](https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/UsingWithRDS.SSL-certificate-rotation.html) in the *Amazon Aurora User Guide* .", |
213128 | 213128 | "title": "CACertificateIdentifier", |
213129 | 213129 | "type": "string" |
213130 | 213130 | }, |
@@ -219290,51 +219290,51 @@ |
219290 | 219290 | "additionalProperties": false, |
219291 | 219291 | "properties": { |
219292 | 219292 | "DurationSeconds": { |
219293 | | - "markdownDescription": "The number of seconds vended session credentials will be valid for", |
| 219293 | + "markdownDescription": "Sets the maximum number of seconds that vended temporary credentials through [CreateSession](https://docs.aws.amazon.com/rolesanywhere/latest/userguide/authentication-create-session.html) will be valid for, between 900 and 3600.", |
219294 | 219294 | "title": "DurationSeconds", |
219295 | 219295 | "type": "number" |
219296 | 219296 | }, |
219297 | 219297 | "Enabled": { |
219298 | | - "markdownDescription": "The enabled status of the resource.", |
| 219298 | + "markdownDescription": "Indicates whether the profile is enabled.", |
219299 | 219299 | "title": "Enabled", |
219300 | 219300 | "type": "boolean" |
219301 | 219301 | }, |
219302 | 219302 | "ManagedPolicyArns": { |
219303 | 219303 | "items": { |
219304 | 219304 | "type": "string" |
219305 | 219305 | }, |
219306 | | - "markdownDescription": "A list of managed policy ARNs. Managed policies identified by this list will be applied to the vended session credentials.", |
| 219306 | + "markdownDescription": "A list of managed policy ARNs that apply to the vended session credentials.", |
219307 | 219307 | "title": "ManagedPolicyArns", |
219308 | 219308 | "type": "array" |
219309 | 219309 | }, |
219310 | 219310 | "Name": { |
219311 | | - "markdownDescription": "The customer specified name of the resource.", |
| 219311 | + "markdownDescription": "The name of the profile.", |
219312 | 219312 | "title": "Name", |
219313 | 219313 | "type": "string" |
219314 | 219314 | }, |
219315 | 219315 | "RequireInstanceProperties": { |
219316 | | - "markdownDescription": "Specifies whether instance properties are required in CreateSession requests with this profile.", |
| 219316 | + "markdownDescription": "Specifies whether instance properties are required in temporary credential requests with this profile.", |
219317 | 219317 | "title": "RequireInstanceProperties", |
219318 | 219318 | "type": "boolean" |
219319 | 219319 | }, |
219320 | 219320 | "RoleArns": { |
219321 | 219321 | "items": { |
219322 | 219322 | "type": "string" |
219323 | 219323 | }, |
219324 | | - "markdownDescription": "A list of IAM role ARNs that can be assumed when this profile is specified in a CreateSession request.", |
| 219324 | + "markdownDescription": "A list of IAM role ARNs. During `CreateSession` , if a matching role ARN is provided, the properties in this profile will be applied to the intersection session policy.", |
219325 | 219325 | "title": "RoleArns", |
219326 | 219326 | "type": "array" |
219327 | 219327 | }, |
219328 | 219328 | "SessionPolicy": { |
219329 | | - "markdownDescription": "A session policy that will applied to the trust boundary of the vended session credentials.", |
| 219329 | + "markdownDescription": "A session policy that applies to the trust boundary of the vended session credentials.", |
219330 | 219330 | "title": "SessionPolicy", |
219331 | 219331 | "type": "string" |
219332 | 219332 | }, |
219333 | 219333 | "Tags": { |
219334 | 219334 | "items": { |
219335 | 219335 | "$ref": "#/definitions/Tag" |
219336 | 219336 | }, |
219337 | | - "markdownDescription": "A list of Tags.", |
| 219337 | + "markdownDescription": "The tags to attach to the profile.", |
219338 | 219338 | "title": "Tags", |
219339 | 219339 | "type": "array" |
219340 | 219340 | } |
@@ -219495,11 +219495,11 @@ |
219495 | 219495 | "properties": { |
219496 | 219496 | "SourceData": { |
219497 | 219497 | "$ref": "#/definitions/AWS::RolesAnywhere::TrustAnchor.SourceData", |
219498 | | - "markdownDescription": "A union object representing the data field of the TrustAnchor depending on its type", |
| 219498 | + "markdownDescription": "The data field of the trust anchor depending on its type.", |
219499 | 219499 | "title": "SourceData" |
219500 | 219500 | }, |
219501 | 219501 | "SourceType": { |
219502 | | - "markdownDescription": "The type of the TrustAnchor.", |
| 219502 | + "markdownDescription": "The type of the TrustAnchor.\n\n> `AWS_ACM_PCA` is not an allowed value in your region.", |
219503 | 219503 | "title": "SourceType", |
219504 | 219504 | "type": "string" |
219505 | 219505 | } |
|
0 commit comments