Skip to content

Commit fb950bc

Browse files
Add support for resource-based policies for Aurora DSQL clusters. This will enable you to implement Block Public Access (BPA) which will help restrict access to your Aurora DSQL public or VPC endpoints.
1 parent 8cacf2a commit fb950bc

25 files changed

+2444
-48
lines changed

generator/ServiceModels/dsql/dsql-2018-05-10.api.json

Lines changed: 147 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,6 +50,25 @@
5050
],
5151
"idempotent":true
5252
},
53+
"DeleteClusterPolicy":{
54+
"name":"DeleteClusterPolicy",
55+
"http":{
56+
"method":"DELETE",
57+
"requestUri":"/cluster/{identifier}/policy",
58+
"responseCode":200
59+
},
60+
"input":{"shape":"DeleteClusterPolicyInput"},
61+
"output":{"shape":"DeleteClusterPolicyOutput"},
62+
"errors":[
63+
{"shape":"ThrottlingException"},
64+
{"shape":"ValidationException"},
65+
{"shape":"AccessDeniedException"},
66+
{"shape":"InternalServerException"},
67+
{"shape":"ResourceNotFoundException"},
68+
{"shape":"ConflictException"}
69+
],
70+
"idempotent":true
71+
},
5372
"GetCluster":{
5473
"name":"GetCluster",
5574
"http":{
@@ -67,6 +86,23 @@
6786
{"shape":"ResourceNotFoundException"}
6887
]
6988
},
89+
"GetClusterPolicy":{
90+
"name":"GetClusterPolicy",
91+
"http":{
92+
"method":"GET",
93+
"requestUri":"/cluster/{identifier}/policy",
94+
"responseCode":200
95+
},
96+
"input":{"shape":"GetClusterPolicyInput"},
97+
"output":{"shape":"GetClusterPolicyOutput"},
98+
"errors":[
99+
{"shape":"ThrottlingException"},
100+
{"shape":"ValidationException"},
101+
{"shape":"AccessDeniedException"},
102+
{"shape":"InternalServerException"},
103+
{"shape":"ResourceNotFoundException"}
104+
]
105+
},
70106
"GetVpcEndpointServiceName":{
71107
"name":"GetVpcEndpointServiceName",
72108
"http":{
@@ -118,6 +154,25 @@
118154
{"shape":"ResourceNotFoundException"}
119155
]
120156
},
157+
"PutClusterPolicy":{
158+
"name":"PutClusterPolicy",
159+
"http":{
160+
"method":"POST",
161+
"requestUri":"/cluster/{identifier}/policy",
162+
"responseCode":200
163+
},
164+
"input":{"shape":"PutClusterPolicyInput"},
165+
"output":{"shape":"PutClusterPolicyOutput"},
166+
"errors":[
167+
{"shape":"ThrottlingException"},
168+
{"shape":"ValidationException"},
169+
{"shape":"AccessDeniedException"},
170+
{"shape":"InternalServerException"},
171+
{"shape":"ResourceNotFoundException"},
172+
{"shape":"ConflictException"}
173+
],
174+
"idempotent":true
175+
},
121176
"TagResource":{
122177
"name":"TagResource",
123178
"http":{
@@ -191,6 +246,10 @@
191246
"min":1,
192247
"pattern":"arn:.+"
193248
},
249+
"BypassPolicyLockoutSafetyCheck":{
250+
"type":"boolean",
251+
"box":true
252+
},
194253
"ClientToken":{
195254
"type":"string",
196255
"max":128,
@@ -264,7 +323,9 @@
264323
"shape":"ClientToken",
265324
"idempotencyToken":true
266325
},
267-
"multiRegionProperties":{"shape":"MultiRegionProperties"}
326+
"multiRegionProperties":{"shape":"MultiRegionProperties"},
327+
"policy":{"shape":"PolicyDocument"},
328+
"bypassPolicyLockoutSafetyCheck":{"shape":"BypassPolicyLockoutSafetyCheck"}
268329
}
269330
},
270331
"CreateClusterOutput":{
@@ -318,6 +379,35 @@
318379
"creationTime":{"shape":"ClusterCreationTime"}
319380
}
320381
},
382+
"DeleteClusterPolicyInput":{
383+
"type":"structure",
384+
"required":["identifier"],
385+
"members":{
386+
"identifier":{
387+
"shape":"ClusterId",
388+
"location":"uri",
389+
"locationName":"identifier"
390+
},
391+
"expectedPolicyVersion":{
392+
"shape":"PolicyVersion",
393+
"location":"querystring",
394+
"locationName":"expected-policy-version"
395+
},
396+
"clientToken":{
397+
"shape":"ClientToken",
398+
"idempotencyToken":true,
399+
"location":"querystring",
400+
"locationName":"client-token"
401+
}
402+
}
403+
},
404+
"DeleteClusterPolicyOutput":{
405+
"type":"structure",
406+
"required":["policyVersion"],
407+
"members":{
408+
"policyVersion":{"shape":"PolicyVersion"}
409+
}
410+
},
321411
"DeletionProtectionEnabled":{
322412
"type":"boolean",
323413
"box":true
@@ -381,6 +471,28 @@
381471
"encryptionDetails":{"shape":"EncryptionDetails"}
382472
}
383473
},
474+
"GetClusterPolicyInput":{
475+
"type":"structure",
476+
"required":["identifier"],
477+
"members":{
478+
"identifier":{
479+
"shape":"ClusterId",
480+
"location":"uri",
481+
"locationName":"identifier"
482+
}
483+
}
484+
},
485+
"GetClusterPolicyOutput":{
486+
"type":"structure",
487+
"required":[
488+
"policy",
489+
"policyVersion"
490+
],
491+
"members":{
492+
"policy":{"shape":"PolicyDocument"},
493+
"policyVersion":{"shape":"PolicyVersion"}
494+
}
495+
},
384496
"GetVpcEndpointServiceNameInput":{
385497
"type":"structure",
386498
"required":["identifier"],
@@ -480,6 +592,40 @@
480592
}
481593
},
482594
"NextToken":{"type":"string"},
595+
"PolicyDocument":{
596+
"type":"string",
597+
"max":20480,
598+
"min":1
599+
},
600+
"PolicyVersion":{"type":"string"},
601+
"PutClusterPolicyInput":{
602+
"type":"structure",
603+
"required":[
604+
"identifier",
605+
"policy"
606+
],
607+
"members":{
608+
"identifier":{
609+
"shape":"ClusterId",
610+
"location":"uri",
611+
"locationName":"identifier"
612+
},
613+
"policy":{"shape":"PolicyDocument"},
614+
"bypassPolicyLockoutSafetyCheck":{"shape":"BypassPolicyLockoutSafetyCheck"},
615+
"expectedPolicyVersion":{"shape":"PolicyVersion"},
616+
"clientToken":{
617+
"shape":"ClientToken",
618+
"idempotencyToken":true
619+
}
620+
}
621+
},
622+
"PutClusterPolicyOutput":{
623+
"type":"structure",
624+
"required":["policyVersion"],
625+
"members":{
626+
"policyVersion":{"shape":"PolicyVersion"}
627+
}
628+
},
483629
"Region":{
484630
"type":"string",
485631
"max":50,

0 commit comments

Comments
 (0)