Skip to content

Commit

Permalink
Fixed a typo in description field.
Browse files Browse the repository at this point in the history
With this release, Amazon EC2 Auto Scaling groups, EC2 Fleet, and Spot Fleet improve the default price protection behavior of attribute-based instance type selection of Spot Instances, to consistently select from a wide range of instance types.
With this release, Amazon EC2 Auto Scaling groups, EC2 Fleet, and Spot Fleet improve the default price protection behavior of attribute-based instance type selection of Spot Instances, to consistently select from a wide range of instance types.
  • Loading branch information
aws-sdk-cpp-automation committed Mar 1, 2024
1 parent cd7eef9 commit 2439d5a
Show file tree
Hide file tree
Showing 21 changed files with 514 additions and 352 deletions.
2 changes: 1 addition & 1 deletion VERSION
Original file line number Diff line number Diff line change
@@ -1 +1 @@
1.11.276
1.11.277
Original file line number Diff line number Diff line change
Expand Up @@ -453,8 +453,11 @@ namespace AccessAnalyzer
}

/**
* <p>Retrieves information about the specified finding.</p><p><h3>See Also:</h3>
* <a
* <p>Retrieves information about the specified finding. GetFinding and
* GetFindingV2 both use <code>access-analyzer:GetFinding</code> in the
* <code>Action</code> element of an IAM policy statement. You must have permission
* to perform the <code>access-analyzer:GetFinding</code> action.</p><p><h3>See
* Also:</h3> <a
* href="http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/GetFinding">AWS
* API Reference</a></p>
*/
Expand All @@ -479,8 +482,11 @@ namespace AccessAnalyzer
}

/**
* <p>Retrieves information about the specified finding.</p><p><h3>See Also:</h3>
* <a
* <p>Retrieves information about the specified finding. GetFinding and
* GetFindingV2 both use <code>access-analyzer:GetFinding</code> in the
* <code>Action</code> element of an IAM policy statement. You must have permission
* to perform the <code>access-analyzer:GetFinding</code> action.</p><p><h3>See
* Also:</h3> <a
* href="http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/GetFindingV2">AWS
* API Reference</a></p>
*/
Expand Down Expand Up @@ -584,7 +590,8 @@ namespace AccessAnalyzer

/**
* <p>Retrieves a list of resources of the specified type that have been analyzed
* by the specified analyzer..</p><p><h3>See Also:</h3> <a
* by the specified external access analyzer. This action is not supported for
* unused access analyzers.</p><p><h3>See Also:</h3> <a
* href="http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/ListAnalyzedResources">AWS
* API Reference</a></p>
*/
Expand Down Expand Up @@ -660,8 +667,12 @@ namespace AccessAnalyzer
}

/**
* <p>Retrieves a list of findings generated by the specified analyzer.</p> <p>To
* learn about filter keys that you can use to retrieve a list of findings, see <a
* <p>Retrieves a list of findings generated by the specified analyzer.
* ListFindings and ListFindingsV2 both use
* <code>access-analyzer:ListFindings</code> in the <code>Action</code> element of
* an IAM policy statement. You must have permission to perform the
* <code>access-analyzer:ListFindings</code> action.</p> <p>To learn about filter
* keys that you can use to retrieve a list of findings, see <a
* href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM
* Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p><p><h3>See
* Also:</h3> <a
Expand Down Expand Up @@ -689,8 +700,12 @@ namespace AccessAnalyzer
}

/**
* <p>Retrieves a list of findings generated by the specified analyzer.</p> <p>To
* learn about filter keys that you can use to retrieve a list of findings, see <a
* <p>Retrieves a list of findings generated by the specified analyzer.
* ListFindings and ListFindingsV2 both use
* <code>access-analyzer:ListFindings</code> in the <code>Action</code> element of
* an IAM policy statement. You must have permission to perform the
* <code>access-analyzer:ListFindings</code> action.</p> <p>To learn about filter
* keys that you can use to retrieve a list of findings, see <a
* href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM
* Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p><p><h3>See
* Also:</h3> <a
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -40,47 +40,56 @@ namespace Model


/**
* <p>A list of actions for the access permissions.</p>
* <p>A list of actions for the access permissions. Any strings that can be used as
* an action in an IAM policy can be used in the list of actions to check.</p>
*/
inline const Aws::Vector<Aws::String>& GetActions() const{ return m_actions; }

/**
* <p>A list of actions for the access permissions.</p>
* <p>A list of actions for the access permissions. Any strings that can be used as
* an action in an IAM policy can be used in the list of actions to check.</p>
*/
inline bool ActionsHasBeenSet() const { return m_actionsHasBeenSet; }

/**
* <p>A list of actions for the access permissions.</p>
* <p>A list of actions for the access permissions. Any strings that can be used as
* an action in an IAM policy can be used in the list of actions to check.</p>
*/
inline void SetActions(const Aws::Vector<Aws::String>& value) { m_actionsHasBeenSet = true; m_actions = value; }

/**
* <p>A list of actions for the access permissions.</p>
* <p>A list of actions for the access permissions. Any strings that can be used as
* an action in an IAM policy can be used in the list of actions to check.</p>
*/
inline void SetActions(Aws::Vector<Aws::String>&& value) { m_actionsHasBeenSet = true; m_actions = std::move(value); }

/**
* <p>A list of actions for the access permissions.</p>
* <p>A list of actions for the access permissions. Any strings that can be used as
* an action in an IAM policy can be used in the list of actions to check.</p>
*/
inline Access& WithActions(const Aws::Vector<Aws::String>& value) { SetActions(value); return *this;}

/**
* <p>A list of actions for the access permissions.</p>
* <p>A list of actions for the access permissions. Any strings that can be used as
* an action in an IAM policy can be used in the list of actions to check.</p>
*/
inline Access& WithActions(Aws::Vector<Aws::String>&& value) { SetActions(std::move(value)); return *this;}

/**
* <p>A list of actions for the access permissions.</p>
* <p>A list of actions for the access permissions. Any strings that can be used as
* an action in an IAM policy can be used in the list of actions to check.</p>
*/
inline Access& AddActions(const Aws::String& value) { m_actionsHasBeenSet = true; m_actions.push_back(value); return *this; }

/**
* <p>A list of actions for the access permissions.</p>
* <p>A list of actions for the access permissions. Any strings that can be used as
* an action in an IAM policy can be used in the list of actions to check.</p>
*/
inline Access& AddActions(Aws::String&& value) { m_actionsHasBeenSet = true; m_actions.push_back(std::move(value)); return *this; }

/**
* <p>A list of actions for the access permissions.</p>
* <p>A list of actions for the access permissions. Any strings that can be used as
* an action in an IAM policy can be used in the list of actions to check.</p>
*/
inline Access& AddActions(const char* value) { m_actionsHasBeenSet = true; m_actions.push_back(value); return *this; }

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -85,7 +85,7 @@ namespace Model
/**
* <p>The type of analyzer to create. Only <code>ACCOUNT</code>,
* <code>ORGANIZATION</code>, <code>ACCOUNT_UNUSED_ACCESS</code>, and
* <code>ORGANIZTAION_UNUSED_ACCESS</code> analyzers are supported. You can create
* <code>ORGANIZATION_UNUSED_ACCESS</code> analyzers are supported. You can create
* only one analyzer per account per Region. You can create up to 5 analyzers per
* organization per Region.</p>
*/
Expand All @@ -94,7 +94,7 @@ namespace Model
/**
* <p>The type of analyzer to create. Only <code>ACCOUNT</code>,
* <code>ORGANIZATION</code>, <code>ACCOUNT_UNUSED_ACCESS</code>, and
* <code>ORGANIZTAION_UNUSED_ACCESS</code> analyzers are supported. You can create
* <code>ORGANIZATION_UNUSED_ACCESS</code> analyzers are supported. You can create
* only one analyzer per account per Region. You can create up to 5 analyzers per
* organization per Region.</p>
*/
Expand All @@ -103,7 +103,7 @@ namespace Model
/**
* <p>The type of analyzer to create. Only <code>ACCOUNT</code>,
* <code>ORGANIZATION</code>, <code>ACCOUNT_UNUSED_ACCESS</code>, and
* <code>ORGANIZTAION_UNUSED_ACCESS</code> analyzers are supported. You can create
* <code>ORGANIZATION_UNUSED_ACCESS</code> analyzers are supported. You can create
* only one analyzer per account per Region. You can create up to 5 analyzers per
* organization per Region.</p>
*/
Expand All @@ -112,7 +112,7 @@ namespace Model
/**
* <p>The type of analyzer to create. Only <code>ACCOUNT</code>,
* <code>ORGANIZATION</code>, <code>ACCOUNT_UNUSED_ACCESS</code>, and
* <code>ORGANIZTAION_UNUSED_ACCESS</code> analyzers are supported. You can create
* <code>ORGANIZATION_UNUSED_ACCESS</code> analyzers are supported. You can create
* only one analyzer per account per Region. You can create up to 5 analyzers per
* organization per Region.</p>
*/
Expand All @@ -121,7 +121,7 @@ namespace Model
/**
* <p>The type of analyzer to create. Only <code>ACCOUNT</code>,
* <code>ORGANIZATION</code>, <code>ACCOUNT_UNUSED_ACCESS</code>, and
* <code>ORGANIZTAION_UNUSED_ACCESS</code> analyzers are supported. You can create
* <code>ORGANIZATION_UNUSED_ACCESS</code> analyzers are supported. You can create
* only one analyzer per account per Region. You can create up to 5 analyzers per
* organization per Region.</p>
*/
Expand All @@ -130,7 +130,7 @@ namespace Model
/**
* <p>The type of analyzer to create. Only <code>ACCOUNT</code>,
* <code>ORGANIZATION</code>, <code>ACCOUNT_UNUSED_ACCESS</code>, and
* <code>ORGANIZTAION_UNUSED_ACCESS</code> analyzers are supported. You can create
* <code>ORGANIZATION_UNUSED_ACCESS</code> analyzers are supported. You can create
* only one analyzer per account per Region. You can create up to 5 analyzers per
* organization per Region.</p>
*/
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -33,9 +33,10 @@ namespace Model
* new resource and you do not specify the Amazon S3 bucket policy, the access
* preview assumes an directory bucket without a policy. To propose deletion of an
* existing bucket policy, you can specify an empty string. For more information
* about bucket policy limits, see <a
* about Amazon S3 directory bucket policies, see <a
* href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-security-iam-example-bucket-policies.html">Example
* bucket policies</a>.</p><p><h3>See Also:</h3> <a
* directory bucket policies for S3 Express One Zone</a>.</p><p><h3>See Also:</h3>
* <a
* href="http://docs.aws.amazon.com/goto/WebAPI/accessanalyzer-2019-11-01/S3ExpressDirectoryBucketConfiguration">AWS
* API Reference</a></p>
*/
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -389,16 +389,11 @@ namespace AutoScaling
* about updating this limit, see <a
* href="https://docs.aws.amazon.com/autoscaling/ec2/userguide/ec2-auto-scaling-quotas.html">Quotas
* for Amazon EC2 Auto Scaling</a> in the <i>Amazon EC2 Auto Scaling User
* Guide</i>.</p> <p>For introductory exercises for creating an Auto Scaling group,
* see <a
* href="https://docs.aws.amazon.com/autoscaling/ec2/userguide/GettingStartedTutorial.html">Getting
* started with Amazon EC2 Auto Scaling</a> and <a
* href="https://docs.aws.amazon.com/autoscaling/ec2/userguide/as-register-lbs-with-asg.html">Tutorial:
* Set up a scaled and load-balanced application</a> in the <i>Amazon EC2 Auto
* Scaling User Guide</i>. For more information, see <a
* href="https://docs.aws.amazon.com/autoscaling/ec2/userguide/AutoScalingGroup.html">Auto
* Scaling groups</a> in the <i>Amazon EC2 Auto Scaling User Guide</i>.</p>
* <p>Every Auto Scaling group has three size properties
* Guide</i>.</p> <p>If you're new to Amazon EC2 Auto Scaling, see the introductory
* tutorials in <a
* href="https://docs.aws.amazon.com/autoscaling/ec2/userguide/get-started-with-ec2-auto-scaling.html">Get
* started with Amazon EC2 Auto Scaling</a> in the <i>Amazon EC2 Auto Scaling User
* Guide</i>.</p> <p>Every Auto Scaling group has three size properties
* (<code>DesiredCapacity</code>, <code>MaxSize</code>, and <code>MinSize</code>).
* Usually, you set these sizes based on a specific number of instances. However,
* if you configure a mixed instances policy that defines weights for the instance
Expand Down
Loading

0 comments on commit 2439d5a

Please sign in to comment.