vendor: update all dependencies

This commit is contained in:
Nick Craig-Wood
2018-03-19 15:51:38 +00:00
parent 940df88eb2
commit d64789528d
4309 changed files with 1327278 additions and 1001118 deletions

View File

@ -499,6 +499,10 @@
"type":"list",
"member":{"shape":"EnvironmentVariable"}
},
"GitCloneDepth":{
"type":"integer",
"min":0
},
"ImageVersions":{
"type":"list",
"member":{"shape":"String"}
@ -706,7 +710,8 @@
"image":{"shape":"NonEmptyString"},
"computeType":{"shape":"ComputeType"},
"environmentVariables":{"shape":"EnvironmentVariables"},
"privilegedMode":{"shape":"WrapperBoolean"}
"privilegedMode":{"shape":"WrapperBoolean"},
"certificate":{"shape":"String"}
}
},
"ProjectName":{
@ -735,8 +740,10 @@
"members":{
"type":{"shape":"SourceType"},
"location":{"shape":"String"},
"gitCloneDepth":{"shape":"GitCloneDepth"},
"buildspec":{"shape":"String"},
"auth":{"shape":"SourceAuth"}
"auth":{"shape":"SourceAuth"},
"insecureSsl":{"shape":"WrapperBoolean"}
}
},
"Projects":{
@ -786,7 +793,8 @@
"CODEPIPELINE",
"GITHUB",
"S3",
"BITBUCKET"
"BITBUCKET",
"GITHUB_ENTERPRISE"
]
},
"StartBuildInput":{
@ -797,6 +805,7 @@
"sourceVersion":{"shape":"String"},
"artifactsOverride":{"shape":"ProjectArtifacts"},
"environmentVariablesOverride":{"shape":"EnvironmentVariables"},
"gitCloneDepthOverride":{"shape":"GitCloneDepth"},
"buildspecOverride":{"shape":"String"},
"timeoutInMinutesOverride":{"shape":"TimeOut"}
}
@ -897,7 +906,9 @@
"Webhook":{
"type":"structure",
"members":{
"url":{"shape":"NonEmptyString"}
"url":{"shape":"NonEmptyString"},
"payloadUrl":{"shape":"NonEmptyString"},
"secret":{"shape":"NonEmptyString"}
}
},
"WrapperBoolean":{"type":"boolean"},

View File

@ -6,7 +6,7 @@
"BatchGetBuilds": "<p>Gets information about builds.</p>",
"BatchGetProjects": "<p>Gets information about build projects.</p>",
"CreateProject": "<p>Creates a build project.</p>",
"CreateWebhook": "<p>For an existing AWS CodeBuild build project that has its source code stored in a GitHub repository, enables AWS CodeBuild to begin automatically rebuilding the source code every time a code change is pushed to the repository.</p> <important> <p>If you enable webhooks for an AWS CodeBuild project, and the project is used as a build step in AWS CodePipeline, then two identical builds will be created for each commit. One build is triggered through webhooks, and one through AWS CodePipeline. Because billing is on a per-build basis, you will be billed for both builds. Therefore, if you are using AWS CodePipeline, we recommend that you disable webhooks in CodeBuild. In the AWS CodeBuild console, clear the Webhook box. For more information, see step 9 in <a href=\"http://docs.aws.amazon.com/codebuild/latest/userguide/change-project.html#change-project-console\">Change a Build Projects Settings</a>.</p> </important>",
"CreateWebhook": "<p>For an existing AWS CodeBuild build project that has its source code stored in a GitHub repository, enables AWS CodeBuild to begin automatically rebuilding the source code every time a code change is pushed to the repository.</p> <important> <p>If you enable webhooks for an AWS CodeBuild project, and the project is used as a build step in AWS CodePipeline, then two identical builds will be created for each commit. One build is triggered through webhooks, and one through AWS CodePipeline. Because billing is on a per-build basis, you will be billed for both builds. Therefore, if you are using AWS CodePipeline, we recommend that you disable webhooks in CodeBuild. In the AWS CodeBuild console, clear the Webhook box. For more information, see step 9 in <a href=\"http://docs.aws.amazon.com/codebuild/latest/userguide/change-project.html#change-project-console\">Change a Build Project's Settings</a>.</p> </important>",
"DeleteProject": "<p>Deletes a build project.</p>",
"DeleteWebhook": "<p>For an existing AWS CodeBuild build project that has its source code stored in a GitHub repository, stops AWS CodeBuild from automatically rebuilding the source code every time a code change is pushed to the repository.</p>",
"InvalidateProjectCache": "<p>Resets the cache for a project.</p>",
@ -253,6 +253,13 @@
"StartBuildInput$environmentVariablesOverride": "<p>A set of environment variables that overrides, for this build only, the latest ones already defined in the build project.</p>"
}
},
"GitCloneDepth": {
"base": null,
"refs": {
"ProjectSource$gitCloneDepth": "<p>Information about the git clone depth for the build project.</p>",
"StartBuildInput$gitCloneDepthOverride": "<p>The user-defined depth of history, with a minimum value of 0, that overrides, for this build only, any previous depth of history defined in the build project.</p>"
}
},
"ImageVersions": {
"base": null,
"refs": {
@ -368,7 +375,9 @@
"UpdateProjectInput$serviceRole": "<p>The replacement ARN of the AWS Identity and Access Management (IAM) role that enables AWS CodeBuild to interact with dependent AWS services on behalf of the AWS account.</p>",
"UpdateProjectInput$encryptionKey": "<p>The replacement AWS Key Management Service (AWS KMS) customer master key (CMK) to be used for encrypting the build output artifacts.</p> <p>You can specify either the CMK's Amazon Resource Name (ARN) or, if available, the CMK's alias (using the format <code>alias/<i>alias-name</i> </code>).</p>",
"VpcConfig$vpcId": "<p>The ID of the Amazon VPC.</p>",
"Webhook$url": "<p>The URL to the webhook.</p>"
"Webhook$url": "<p>The URL to the webhook.</p>",
"Webhook$payloadUrl": "<p>This is the server endpoint that will receive the webhook payload.</p>",
"Webhook$secret": "<p>Use this secret while creating a webhook in GitHub for Enterprise. The secret allows webhook requests sent by GitHub for Enterprise to be authenticated by AWS CodeBuild.</p>"
}
},
"OAuthProviderException": {
@ -579,6 +588,7 @@
"ProjectArtifacts$name": "<p>Along with <code>path</code> and <code>namespaceType</code>, the pattern that AWS CodeBuild will use to name and store the output artifact, as follows:</p> <ul> <li> <p>If <code>type</code> is set to <code>CODEPIPELINE</code>, then AWS CodePipeline will ignore this value if specified. This is because AWS CodePipeline manages its build output names instead of AWS CodeBuild.</p> </li> <li> <p>If <code>type</code> is set to <code>NO_ARTIFACTS</code>, then this value will be ignored if specified, because no build output will be produced.</p> </li> <li> <p>If <code>type</code> is set to <code>S3</code>, this is the name of the output artifact object.</p> </li> </ul> <p>For example, if <code>path</code> is set to <code>MyArtifacts</code>, <code>namespaceType</code> is set to <code>BUILD_ID</code>, and <code>name</code> is set to <code>MyArtifact.zip</code>, then the output artifact would be stored in <code>MyArtifacts/<i>build-ID</i>/MyArtifact.zip</code>.</p>",
"ProjectBadge$badgeRequestUrl": "<p>The publicly-accessible URL through which you can access the build badge for your project. </p>",
"ProjectCache$location": "<p>Information about the cache location, as follows: </p> <ul> <li> <p> <code>NO_CACHE</code>: This value will be ignored.</p> </li> <li> <p> <code>S3</code>: This is the S3 bucket name/prefix.</p> </li> </ul>",
"ProjectEnvironment$certificate": "<p>The certificate to use with this build project.</p>",
"ProjectSource$location": "<p>Information about the location of the source code to be built. Valid values include:</p> <ul> <li> <p>For source code settings that are specified in the source action of a pipeline in AWS CodePipeline, <code>location</code> should not be specified. If it is specified, AWS CodePipeline will ignore it. This is because AWS CodePipeline uses the settings in a pipeline's source action instead of this value.</p> </li> <li> <p>For source code in an AWS CodeCommit repository, the HTTPS clone URL to the repository that contains the source code and the build spec (for example, <code>https://git-codecommit.<i>region-ID</i>.amazonaws.com/v1/repos/<i>repo-name</i> </code>).</p> </li> <li> <p>For source code in an Amazon Simple Storage Service (Amazon S3) input bucket, the path to the ZIP file that contains the source code (for example, <code> <i>bucket-name</i>/<i>path</i>/<i>to</i>/<i>object-name</i>.zip</code>)</p> </li> <li> <p>For source code in a GitHub repository, the HTTPS clone URL to the repository that contains the source and the build spec. Also, you must connect your AWS account to your GitHub account. To do this, use the AWS CodeBuild console to begin creating a build project. When you use the console to connect (or reconnect) with GitHub, on the GitHub <b>Authorize application</b> page that displays, for <b>Organization access</b>, choose <b>Request access</b> next to each repository you want to allow AWS CodeBuild to have access to. Then choose <b>Authorize application</b>. (After you have connected to your GitHub account, you do not need to finish creating the build project, and you may then leave the AWS CodeBuild console.) To instruct AWS CodeBuild to then use this connection, in the <code>source</code> object, set the <code>auth</code> object's <code>type</code> value to <code>OAUTH</code>.</p> </li> <li> <p>For source code in a Bitbucket repository, the HTTPS clone URL to the repository that contains the source and the build spec. Also, you must connect your AWS account to your Bitbucket account. To do this, use the AWS CodeBuild console to begin creating a build project. When you use the console to connect (or reconnect) with Bitbucket, on the Bitbucket <b>Confirm access to your account</b> page that displays, choose <b>Grant access</b>. (After you have connected to your Bitbucket account, you do not need to finish creating the build project, and you may then leave the AWS CodeBuild console.) To instruct AWS CodeBuild to then use this connection, in the <code>source</code> object, set the <code>auth</code> object's <code>type</code> value to <code>OAUTH</code>.</p> </li> </ul>",
"ProjectSource$buildspec": "<p>The build spec declaration to use for the builds in this build project.</p> <p>If this value is not specified, a build spec must be included along with the source code to be built.</p>",
"SourceAuth$resource": "<p>The resource value that applies to the specified authorization type.</p>",
@ -663,6 +673,7 @@
"refs": {
"CreateProjectInput$badgeEnabled": "<p>Set this to true to generate a publicly-accessible URL for your project's build badge.</p>",
"ProjectEnvironment$privilegedMode": "<p>If set to true, enables running the Docker daemon inside a Docker container; otherwise, false or not specified (the default). This value must be set to true only if this build project will be used to build Docker images, and the specified build environment image is not one provided by AWS CodeBuild with Docker support. Otherwise, all associated builds that attempt to interact with the Docker daemon will fail. Note that you must also start the Docker daemon so that your builds can interact with it as needed. One way to do this is to initialize the Docker daemon in the install phase of your build spec by running the following build commands. (Do not run the following build commands if the specified build environment image is provided by AWS CodeBuild with Docker support.)</p> <p> <code>- nohup /usr/local/bin/dockerd --host=unix:///var/run/docker.sock --host=tcp://0.0.0.0:2375 --storage-driver=overlay&amp; - timeout -t 15 sh -c \"until docker info; do echo .; sleep 1; done\"</code> </p>",
"ProjectSource$insecureSsl": "<p>Enable this flag to ignore SSL warnings while connecting to the project source code.</p>",
"UpdateProjectInput$badgeEnabled": "<p>Set this to true to generate a publicly-accessible URL for your project's build badge.</p>"
}
},