Skip to content

Commit 4fc242f

Browse files
author
aws-sdk-cpp-automation
committed
This is the initial SDK release for AWS Telco Network Builder (TNB). AWS Telco Network Builder is a network automation service that helps you deploy and manage telecom networks.
Documentation updates for AWS Security Hub S3 data sources now accept a custom IAM role. In this release we improved resilience hub application creation and maintenance by introducing new resource and app component crud APIs, improving visibility and maintenance of application input sources and added support for additional information attributes to be provided by customers.
1 parent 04545bb commit 4fc242f

File tree

448 files changed

+45379
-4690
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

448 files changed

+45379
-4690
lines changed

VERSION

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
1.11.21
1+
1.11.22

generated/src/aws-cpp-sdk-quicksight/include/aws/quicksight/model/S3Parameters.h

Lines changed: 85 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@
66
#pragma once
77
#include <aws/quicksight/QuickSight_EXPORTS.h>
88
#include <aws/quicksight/model/ManifestFileLocation.h>
9+
#include <aws/core/utils/memory/stl/AWSString.h>
910
#include <utility>
1011

1112
namespace Aws
@@ -73,10 +74,94 @@ namespace Model
7374
*/
7475
inline S3Parameters& WithManifestFileLocation(ManifestFileLocation&& value) { SetManifestFileLocation(std::move(value)); return *this;}
7576

77+
78+
/**
79+
* <p>Use the <code>RoleArn</code> structure to override an account-wide role for a
80+
* specific S3 data source. For example, say an account administrator has turned
81+
* off all S3 access with an account-wide role. The administrator can then use
82+
* <code>RoleArn</code> to bypass the account-wide role and allow S3 access for the
83+
* single S3 data source that is specified in the structure, even if the
84+
* account-wide role forbidding S3 access is still active.</p>
85+
*/
86+
inline const Aws::String& GetRoleArn() const{ return m_roleArn; }
87+
88+
/**
89+
* <p>Use the <code>RoleArn</code> structure to override an account-wide role for a
90+
* specific S3 data source. For example, say an account administrator has turned
91+
* off all S3 access with an account-wide role. The administrator can then use
92+
* <code>RoleArn</code> to bypass the account-wide role and allow S3 access for the
93+
* single S3 data source that is specified in the structure, even if the
94+
* account-wide role forbidding S3 access is still active.</p>
95+
*/
96+
inline bool RoleArnHasBeenSet() const { return m_roleArnHasBeenSet; }
97+
98+
/**
99+
* <p>Use the <code>RoleArn</code> structure to override an account-wide role for a
100+
* specific S3 data source. For example, say an account administrator has turned
101+
* off all S3 access with an account-wide role. The administrator can then use
102+
* <code>RoleArn</code> to bypass the account-wide role and allow S3 access for the
103+
* single S3 data source that is specified in the structure, even if the
104+
* account-wide role forbidding S3 access is still active.</p>
105+
*/
106+
inline void SetRoleArn(const Aws::String& value) { m_roleArnHasBeenSet = true; m_roleArn = value; }
107+
108+
/**
109+
* <p>Use the <code>RoleArn</code> structure to override an account-wide role for a
110+
* specific S3 data source. For example, say an account administrator has turned
111+
* off all S3 access with an account-wide role. The administrator can then use
112+
* <code>RoleArn</code> to bypass the account-wide role and allow S3 access for the
113+
* single S3 data source that is specified in the structure, even if the
114+
* account-wide role forbidding S3 access is still active.</p>
115+
*/
116+
inline void SetRoleArn(Aws::String&& value) { m_roleArnHasBeenSet = true; m_roleArn = std::move(value); }
117+
118+
/**
119+
* <p>Use the <code>RoleArn</code> structure to override an account-wide role for a
120+
* specific S3 data source. For example, say an account administrator has turned
121+
* off all S3 access with an account-wide role. The administrator can then use
122+
* <code>RoleArn</code> to bypass the account-wide role and allow S3 access for the
123+
* single S3 data source that is specified in the structure, even if the
124+
* account-wide role forbidding S3 access is still active.</p>
125+
*/
126+
inline void SetRoleArn(const char* value) { m_roleArnHasBeenSet = true; m_roleArn.assign(value); }
127+
128+
/**
129+
* <p>Use the <code>RoleArn</code> structure to override an account-wide role for a
130+
* specific S3 data source. For example, say an account administrator has turned
131+
* off all S3 access with an account-wide role. The administrator can then use
132+
* <code>RoleArn</code> to bypass the account-wide role and allow S3 access for the
133+
* single S3 data source that is specified in the structure, even if the
134+
* account-wide role forbidding S3 access is still active.</p>
135+
*/
136+
inline S3Parameters& WithRoleArn(const Aws::String& value) { SetRoleArn(value); return *this;}
137+
138+
/**
139+
* <p>Use the <code>RoleArn</code> structure to override an account-wide role for a
140+
* specific S3 data source. For example, say an account administrator has turned
141+
* off all S3 access with an account-wide role. The administrator can then use
142+
* <code>RoleArn</code> to bypass the account-wide role and allow S3 access for the
143+
* single S3 data source that is specified in the structure, even if the
144+
* account-wide role forbidding S3 access is still active.</p>
145+
*/
146+
inline S3Parameters& WithRoleArn(Aws::String&& value) { SetRoleArn(std::move(value)); return *this;}
147+
148+
/**
149+
* <p>Use the <code>RoleArn</code> structure to override an account-wide role for a
150+
* specific S3 data source. For example, say an account administrator has turned
151+
* off all S3 access with an account-wide role. The administrator can then use
152+
* <code>RoleArn</code> to bypass the account-wide role and allow S3 access for the
153+
* single S3 data source that is specified in the structure, even if the
154+
* account-wide role forbidding S3 access is still active.</p>
155+
*/
156+
inline S3Parameters& WithRoleArn(const char* value) { SetRoleArn(value); return *this;}
157+
76158
private:
77159

78160
ManifestFileLocation m_manifestFileLocation;
79161
bool m_manifestFileLocationHasBeenSet = false;
162+
163+
Aws::String m_roleArn;
164+
bool m_roleArnHasBeenSet = false;
80165
};
81166

82167
} // namespace Model

0 commit comments

Comments
 (0)