Skip to content

Commit d340d53

Browse files
author
awstools
committed
docs(client-codepipeline): Updates to add recent notes to APIs and to replace example S3 bucket names globally.
1 parent b72eaa9 commit d340d53

File tree

4 files changed

+48
-24
lines changed

4 files changed

+48
-24
lines changed

clients/client-codepipeline/src/commands/ListWebhooksCommand.ts

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,9 @@ export interface ListWebhooksCommandOutput extends ListWebhooksOutput, __Metadat
3131
* <p>Gets a listing of all the webhooks in this Amazon Web Services Region for this
3232
* account. The output lists all webhooks and includes the webhook URL and ARN and the
3333
* configuration for each webhook.</p>
34+
* <note>
35+
* <p>If a secret token was provided, it will be redacted in the response.</p>
36+
* </note>
3437
* @example
3538
* Use a bare-bones client and the command you need to make an API call.
3639
* ```javascript

clients/client-codepipeline/src/commands/PutWebhookCommand.ts

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,18 @@ export interface PutWebhookCommandOutput extends PutWebhookOutput, __MetadataBea
3636
* RegisterWebhookWithThirdParty and DeregisterWebhookWithThirdParty APIs can be used to
3737
* automatically configure supported third parties to call the generated webhook
3838
* URL.</p>
39+
* <important>
40+
* <p>When creating CodePipeline webhooks, do not use your own credentials or
41+
* reuse the same secret token across multiple webhooks. For optimal security, generate
42+
* a unique secret token for each webhook you create. The secret token is an arbitrary
43+
* string that you provide, which GitHub uses to compute and sign the webhook payloads
44+
* sent to CodePipeline, for protecting the integrity and authenticity of the
45+
* webhook payloads. Using your own credentials or reusing the same token across
46+
* multiple webhooks can lead to security vulnerabilities.</p>
47+
* </important>
48+
* <note>
49+
* <p>If a secret token was provided, it will be redacted in the response.</p>
50+
* </note>
3951
* @example
4052
* Use a bare-bones client and the command you need to make an API call.
4153
* ```javascript

clients/client-codepipeline/src/models/models_0.ts

Lines changed: 27 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1791,20 +1791,8 @@ export type RuleOwner = (typeof RuleOwner)[keyof typeof RuleOwner];
17911791
*/
17921792
export interface RuleTypeId {
17931793
/**
1794-
* <p>A category defines what kind of rule can be run in the stage, and constrains
1795-
* the provider type for the rule. Valid categories are limited to one of the following
1796-
* values. </p>
1797-
* <ul>
1798-
* <li>
1799-
* <p>INVOKE</p>
1800-
* </li>
1801-
* <li>
1802-
* <p>Approval</p>
1803-
* </li>
1804-
* <li>
1805-
* <p>Rule</p>
1806-
* </li>
1807-
* </ul>
1794+
* <p>A category defines what kind of rule can be run in the stage, and constrains the provider
1795+
* type for the rule. The valid category is <code>Rule</code>. </p>
18081796
* @public
18091797
*/
18101798
category: RuleCategory | undefined;
@@ -1817,10 +1805,7 @@ export interface RuleTypeId {
18171805
owner?: RuleOwner;
18181806

18191807
/**
1820-
* <p>The provider of the service being called by the rule. Valid providers are
1821-
* determined by the rulecategory. For example, a managed rule in the Rule category type
1822-
* has an owner of AWS, which would be specified as
1823-
* <code>AWS</code>.</p>
1808+
* <p>The rule provider, such as the <code>DeploymentWindow</code> rule.</p>
18241809
* @public
18251810
*/
18261811
provider: string | undefined;
@@ -5118,6 +5103,18 @@ export interface WebhookAuthConfiguration {
51185103
/**
51195104
* <p>The property used to configure GitHub authentication. For GITHUB_HMAC, only the
51205105
* <code>SecretToken</code> property must be set.</p>
5106+
* <important>
5107+
* <p>When creating CodePipeline webhooks, do not use your own credentials or
5108+
* reuse the same secret token across multiple webhooks. For optimal security, generate
5109+
* a unique secret token for each webhook you create. The secret token is an arbitrary
5110+
* string that you provide, which GitHub uses to compute and sign the webhook payloads
5111+
* sent to CodePipeline, for protecting the integrity and authenticity of the
5112+
* webhook payloads. Using your own credentials or reusing the same token across
5113+
* multiple webhooks can lead to security vulnerabilities.</p>
5114+
* </important>
5115+
* <note>
5116+
* <p>If a secret token was provided, it will be redacted in the response.</p>
5117+
* </note>
51215118
* @public
51225119
*/
51235120
SecretToken?: string;
@@ -5187,6 +5184,18 @@ export interface WebhookDefinition {
51875184

51885185
/**
51895186
* <p>Supported options are GITHUB_HMAC, IP, and UNAUTHENTICATED.</p>
5187+
* <important>
5188+
* <p>When creating CodePipeline webhooks, do not use your own credentials or
5189+
* reuse the same secret token across multiple webhooks. For optimal security, generate
5190+
* a unique secret token for each webhook you create. The secret token is an arbitrary
5191+
* string that you provide, which GitHub uses to compute and sign the webhook payloads
5192+
* sent to CodePipeline, for protecting the integrity and authenticity of the
5193+
* webhook payloads. Using your own credentials or reusing the same token across
5194+
* multiple webhooks can lead to security vulnerabilities.</p>
5195+
* </important>
5196+
* <note>
5197+
* <p>If a secret token was provided, it will be redacted in the response.</p>
5198+
* </note>
51905199
* <ul>
51915200
* <li>
51925201
* <p>For information about the authentication scheme implemented by GITHUB_HMAC,

codegen/sdk-codegen/aws-models/codepipeline.json

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5719,7 +5719,7 @@
57195719
}
57205720
],
57215721
"traits": {
5722-
"smithy.api#documentation": "<p>Gets a listing of all the webhooks in this Amazon Web Services Region for this\n account. The output lists all webhooks and includes the webhook URL and ARN and the\n configuration for each webhook.</p>",
5722+
"smithy.api#documentation": "<p>Gets a listing of all the webhooks in this Amazon Web Services Region for this\n account. The output lists all webhooks and includes the webhook URL and ARN and the\n configuration for each webhook.</p>\n <note>\n <p>If a secret token was provided, it will be redacted in the response.</p>\n </note>",
57235723
"smithy.api#paginated": {
57245724
"inputToken": "NextToken",
57255725
"outputToken": "NextToken",
@@ -7332,7 +7332,7 @@
73327332
}
73337333
],
73347334
"traits": {
7335-
"smithy.api#documentation": "<p>Defines a webhook and returns a unique webhook URL generated by CodePipeline.\n This URL can be supplied to third party source hosting providers to call every time\n there's a code change. When CodePipeline receives a POST request on this URL, the\n pipeline defined in the webhook is started as long as the POST request satisfied the\n authentication and filtering requirements supplied when defining the webhook.\n RegisterWebhookWithThirdParty and DeregisterWebhookWithThirdParty APIs can be used to\n automatically configure supported third parties to call the generated webhook\n URL.</p>"
7335+
"smithy.api#documentation": "<p>Defines a webhook and returns a unique webhook URL generated by CodePipeline.\n This URL can be supplied to third party source hosting providers to call every time\n there's a code change. When CodePipeline receives a POST request on this URL, the\n pipeline defined in the webhook is started as long as the POST request satisfied the\n authentication and filtering requirements supplied when defining the webhook.\n RegisterWebhookWithThirdParty and DeregisterWebhookWithThirdParty APIs can be used to\n automatically configure supported third parties to call the generated webhook\n URL.</p>\n <important>\n <p>When creating CodePipeline webhooks, do not use your own credentials or\n reuse the same secret token across multiple webhooks. For optimal security, generate\n a unique secret token for each webhook you create. The secret token is an arbitrary\n string that you provide, which GitHub uses to compute and sign the webhook payloads\n sent to CodePipeline, for protecting the integrity and authenticity of the\n webhook payloads. Using your own credentials or reusing the same token across\n multiple webhooks can lead to security vulnerabilities.</p>\n </important>\n <note>\n <p>If a secret token was provided, it will be redacted in the response.</p>\n </note>"
73367336
}
73377337
},
73387338
"com.amazonaws.codepipeline#PutWebhookInput": {
@@ -8367,7 +8367,7 @@
83678367
"category": {
83688368
"target": "com.amazonaws.codepipeline#RuleCategory",
83698369
"traits": {
8370-
"smithy.api#documentation": "<p>A category defines what kind of rule can be run in the stage, and constrains\n the provider type for the rule. Valid categories are limited to one of the following\n values. </p>\n <ul>\n <li>\n <p>INVOKE</p>\n </li>\n <li>\n <p>Approval</p>\n </li>\n <li>\n <p>Rule</p>\n </li>\n </ul>",
8370+
"smithy.api#documentation": "<p>A category defines what kind of rule can be run in the stage, and constrains the provider\n type for the rule. The valid category is <code>Rule</code>. </p>",
83718371
"smithy.api#required": {}
83728372
}
83738373
},
@@ -8380,7 +8380,7 @@
83808380
"provider": {
83818381
"target": "com.amazonaws.codepipeline#RuleProvider",
83828382
"traits": {
8383-
"smithy.api#documentation": "<p>The provider of the service being called by the rule. Valid providers are\n determined by the rulecategory. For example, a managed rule in the Rule category type\n has an owner of AWS, which would be specified as\n <code>AWS</code>.</p>",
8383+
"smithy.api#documentation": "<p>The rule provider, such as the <code>DeploymentWindow</code> rule.</p>",
83848384
"smithy.api#required": {}
83858385
}
83868386
},
@@ -9759,7 +9759,7 @@
97599759
"SecretToken": {
97609760
"target": "com.amazonaws.codepipeline#WebhookAuthConfigurationSecretToken",
97619761
"traits": {
9762-
"smithy.api#documentation": "<p>The property used to configure GitHub authentication. For GITHUB_HMAC, only the\n <code>SecretToken</code> property must be set.</p>"
9762+
"smithy.api#documentation": "<p>The property used to configure GitHub authentication. For GITHUB_HMAC, only the\n <code>SecretToken</code> property must be set.</p>\n <important>\n <p>When creating CodePipeline webhooks, do not use your own credentials or\n reuse the same secret token across multiple webhooks. For optimal security, generate\n a unique secret token for each webhook you create. The secret token is an arbitrary\n string that you provide, which GitHub uses to compute and sign the webhook payloads\n sent to CodePipeline, for protecting the integrity and authenticity of the\n webhook payloads. Using your own credentials or reusing the same token across\n multiple webhooks can lead to security vulnerabilities.</p>\n </important>\n <note>\n <p>If a secret token was provided, it will be redacted in the response.</p>\n </note>"
97639763
}
97649764
}
97659765
},
@@ -9842,7 +9842,7 @@
98429842
"authentication": {
98439843
"target": "com.amazonaws.codepipeline#WebhookAuthenticationType",
98449844
"traits": {
9845-
"smithy.api#documentation": "<p>Supported options are GITHUB_HMAC, IP, and UNAUTHENTICATED.</p>\n <ul>\n <li>\n <p>For information about the authentication scheme implemented by GITHUB_HMAC,\n see <a href=\"https://developer.github.com/webhooks/securing/\">Securing your\n webhooks</a> on the GitHub Developer website.</p>\n </li>\n <li>\n <p> IP rejects webhooks trigger requests unless they originate from an IP\n address in the IP range whitelisted in the authentication\n configuration.</p>\n </li>\n <li>\n <p> UNAUTHENTICATED accepts all webhook trigger requests regardless of\n origin.</p>\n </li>\n </ul>",
9845+
"smithy.api#documentation": "<p>Supported options are GITHUB_HMAC, IP, and UNAUTHENTICATED.</p>\n <important>\n <p>When creating CodePipeline webhooks, do not use your own credentials or\n reuse the same secret token across multiple webhooks. For optimal security, generate\n a unique secret token for each webhook you create. The secret token is an arbitrary\n string that you provide, which GitHub uses to compute and sign the webhook payloads\n sent to CodePipeline, for protecting the integrity and authenticity of the\n webhook payloads. Using your own credentials or reusing the same token across\n multiple webhooks can lead to security vulnerabilities.</p>\n </important>\n <note>\n <p>If a secret token was provided, it will be redacted in the response.</p>\n </note>\n <ul>\n <li>\n <p>For information about the authentication scheme implemented by GITHUB_HMAC,\n see <a href=\"https://developer.github.com/webhooks/securing/\">Securing your\n webhooks</a> on the GitHub Developer website.</p>\n </li>\n <li>\n <p> IP rejects webhooks trigger requests unless they originate from an IP\n address in the IP range whitelisted in the authentication\n configuration.</p>\n </li>\n <li>\n <p> UNAUTHENTICATED accepts all webhook trigger requests regardless of\n origin.</p>\n </li>\n </ul>",
98469846
"smithy.api#required": {}
98479847
}
98489848
},

0 commit comments

Comments
 (0)