Skip to content

Commit f03905a

Browse files
Added supported resourceTypes for Config from July to November 2025
1 parent 51e0ea9 commit f03905a

File tree

5 files changed

+555
-9
lines changed

5 files changed

+555
-9
lines changed

generator/ServiceModels/config/config-2014-11-12.api.json

Lines changed: 92 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5369,7 +5369,98 @@
53695369
"AWS::S3Express::DirectoryBucket",
53705370
"AWS::SageMaker::InferenceExperiment",
53715371
"AWS::SecurityHub::Standard",
5372-
"AWS::Transfer::Profile"
5372+
"AWS::Transfer::Profile",
5373+
"AWS::CloudFormation::StackSet",
5374+
"AWS::MediaPackageV2::Channel",
5375+
"AWS::S3::AccessGrantsLocation",
5376+
"AWS::S3::AccessGrant",
5377+
"AWS::S3::AccessGrantsInstance",
5378+
"AWS::EMRServerless::Application",
5379+
"AWS::Config::AggregationAuthorization",
5380+
"AWS::Bedrock::ApplicationInferenceProfile",
5381+
"AWS::ApiGatewayV2::Integration",
5382+
"AWS::SageMaker::MlflowTrackingServer",
5383+
"AWS::SageMaker::ModelBiasJobDefinition",
5384+
"AWS::SecretsManager::RotationSchedule",
5385+
"AWS::Deadline::QueueFleetAssociation",
5386+
"AWS::ECR::RepositoryCreationTemplate",
5387+
"AWS::CloudFormation::LambdaHook",
5388+
"AWS::EC2::SubnetNetworkAclAssociation",
5389+
"AWS::ApiGateway::UsagePlan",
5390+
"AWS::AppConfig::Extension",
5391+
"AWS::Deadline::Fleet",
5392+
"AWS::EMR::Studio",
5393+
"AWS::S3Tables::TableBucket",
5394+
"AWS::CloudFront::RealtimeLogConfig",
5395+
"AWS::BackupGateway::Hypervisor",
5396+
"AWS::BCMDataExports::Export",
5397+
"AWS::CloudFormation::GuardHook",
5398+
"AWS::CloudFront::PublicKey",
5399+
"AWS::CloudTrail::EventDataStore",
5400+
"AWS::EntityResolution::IdMappingWorkflow",
5401+
"AWS::EntityResolution::SchemaMapping",
5402+
"AWS::IoT::DomainConfiguration",
5403+
"AWS::PCAConnectorAD::DirectoryRegistration",
5404+
"AWS::RDS::Integration",
5405+
"AWS::Config::ConformancePack",
5406+
"AWS::RolesAnywhere::Profile",
5407+
"AWS::CodeArtifact::Domain",
5408+
"AWS::Backup::RestoreTestingPlan",
5409+
"AWS::Config::StoredQuery",
5410+
"AWS::SageMaker::DataQualityJobDefinition",
5411+
"AWS::SageMaker::ModelExplainabilityJobDefinition",
5412+
"AWS::SageMaker::ModelQualityJobDefinition",
5413+
"AWS::SageMaker::StudioLifecycleConfig",
5414+
"AWS::SES::DedicatedIpPool",
5415+
"AWS::SES::MailManagerTrafficPolicy",
5416+
"AWS::SSM::ResourceDataSync",
5417+
"AWS::BedrockAgentCore::Runtime",
5418+
"AWS::BedrockAgentCore::BrowserCustom",
5419+
"AWS::ElasticLoadBalancingV2::TargetGroup",
5420+
"AWS::EMRContainers::VirtualCluster",
5421+
"AWS::EntityResolution::MatchingWorkflow",
5422+
"AWS::IoTCoreDeviceAdvisor::SuiteDefinition",
5423+
"AWS::EC2::SecurityGroupVpcAssociation",
5424+
"AWS::EC2::VerifiedAccessInstance",
5425+
"AWS::KafkaConnect::CustomPlugin",
5426+
"AWS::NetworkManager::TransitGatewayPeering",
5427+
"AWS::OpenSearchServerless::SecurityConfig",
5428+
"AWS::Redshift::Integration",
5429+
"AWS::RolesAnywhere::TrustAnchor",
5430+
"AWS::Route53Profiles::ProfileAssociation",
5431+
"AWS::SSMIncidents::ResponsePlan",
5432+
"AWS::Transfer::Server",
5433+
"AWS::Glue::Database",
5434+
"AWS::Organizations::OrganizationalUnit",
5435+
"AWS::EC2::IPAMPoolCidr",
5436+
"AWS::EC2::VPCGatewayAttachment",
5437+
"AWS::Bedrock::Prompt",
5438+
"AWS::Comprehend::Flywheel",
5439+
"AWS::DataSync::Agent",
5440+
"AWS::MediaTailor::LiveSource",
5441+
"AWS::MSK::ServerlessCluster",
5442+
"AWS::IoTSiteWise::Asset",
5443+
"AWS::B2BI::Capability",
5444+
"AWS::CloudFront::KeyValueStore",
5445+
"AWS::Deadline::Monitor",
5446+
"AWS::GuardDuty::MalwareProtectionPlan",
5447+
"AWS::Location::APIKey",
5448+
"AWS::MediaPackageV2::OriginEndpoint",
5449+
"AWS::PCAConnectorAD::Connector",
5450+
"AWS::S3Tables::TableBucketPolicy",
5451+
"AWS::SecretsManager::ResourcePolicy",
5452+
"AWS::SSMContacts::Contact",
5453+
"AWS::IoT::ThingGroup",
5454+
"AWS::ImageBuilder::LifecyclePolicy",
5455+
"AWS::GameLift::Build",
5456+
"AWS::ECR::ReplicationConfiguration",
5457+
"AWS::EC2::SubnetCidrBlock",
5458+
"AWS::Connect::SecurityProfile",
5459+
"AWS::CleanRoomsML::TrainingDataset",
5460+
"AWS::AppStream::AppBlockBuilder",
5461+
"AWS::Route53::DNSSEC",
5462+
"AWS::SageMaker::UserProfile",
5463+
"AWS::ApiGateway::Method"
53735464
]
53745465
},
53755466
"ResourceTypeList":{

generator/ServiceModels/config/config-2014-11-12.docs.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3433,7 +3433,7 @@
34333433
"ConfigRuleEvaluationStatus$LastDebugLogDeliveryStatusReason": "<p>The reason Config was not able to deliver a debug log. This is for the last failed attempt to retrieve a debug log for your Config Custom Policy rules.</p>",
34343434
"ConfigStreamDeliveryInfo$lastErrorCode": "<p>The error code from the last attempted delivery.</p>",
34353435
"ConfigStreamDeliveryInfo$lastErrorMessage": "<p>The error message from the last attempted delivery.</p>",
3436-
"ConfigurationRecorder$roleARN": "<p>The Amazon Resource Name (ARN) of the IAM role assumed by Config and used by the specified configuration recorder.</p> <note> <p> <b>The server will reject a request without a defined <code>roleARN</code> for the configuration recorder</b> </p> <p>While the API model does not require this field, the server will reject a request without a defined <code>roleARN</code> for the configuration recorder.</p> <p> <b>Policies and compliance results</b> </p> <p> <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html\">IAM policies</a> and <a href=\"https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies.html\">other policies managed in Organizations</a> can impact whether Config has permissions to record configuration changes for your resources. Additionally, rules directly evaluate the configuration of a resource and rules don't take into account these policies when running evaluations. Make sure that the policies in effect align with how you intend to use Config.</p> <p> <b>Keep Minimum Permisions When Reusing an IAM role</b> </p> <p>If you use an Amazon Web Services service that uses Config, such as Security Hub or Control Tower, and an IAM role has already been created, make sure that the IAM role that you use when setting up Config keeps the same minimum permissions as the pre-existing IAM role. You must do this to ensure that the other Amazon Web Services service continues to run as expected. </p> <p>For example, if Control Tower has an IAM role that allows Config to read S3 objects, make sure that the same permissions are granted to the IAM role you use when setting up Config. Otherwise, it may interfere with how Control Tower operates.</p> <p> <b>The service-linked IAM role for Config must be used for service-linked configuration recorders</b> </p> <p>For service-linked configuration recorders, you must use the service-linked IAM role for Config: <a href=\"https://docs.aws.amazon.com/config/latest/developerguide/using-service-linked-roles.html\">AWSServiceRoleForConfig</a>.</p> </note>",
3436+
"ConfigurationRecorder$roleARN": "<p>The Amazon Resource Name (ARN) of the IAM role assumed by Config and used by the specified configuration recorder.</p> <note> <p> <b>The server will reject a request without a defined <code>roleARN</code> for the configuration recorder</b> </p> <p>While the API model does not require this field, the server will reject a request without a defined <code>roleARN</code> for the configuration recorder.</p> <p> <b>Policies and compliance results</b> </p> <p> <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html\">IAM policies</a> and <a href=\"https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies.html\">other policies managed in Organizations</a> can impact whether Config has permissions to record configuration changes for your resources. Additionally, rules directly evaluate the configuration of a resource and rules don't take into account these policies when running evaluations. Make sure that the policies in effect align with how you intend to use Config.</p> <p> <b>Keep Minimum Permisions When Reusing an IAM role</b> </p> <p>If you use an Amazon Web Services service that uses Config, such as Security Hub CSPM or Control Tower, and an IAM role has already been created, make sure that the IAM role that you use when setting up Config keeps the same minimum permissions as the pre-existing IAM role. You must do this to ensure that the other Amazon Web Services service continues to run as expected. </p> <p>For example, if Control Tower has an IAM role that allows Config to read S3 objects, make sure that the same permissions are granted to the IAM role you use when setting up Config. Otherwise, it may interfere with how Control Tower operates.</p> <p> <b>The service-linked IAM role for Config must be used for service-linked configuration recorders</b> </p> <p>For service-linked configuration recorders, you must use the service-linked IAM role for Config: <a href=\"https://docs.aws.amazon.com/config/latest/developerguide/using-service-linked-roles.html\">AWSServiceRoleForConfig</a>.</p> </note>",
34373437
"ConfigurationRecorderStatus$name": "<p>The name of the configuration recorder.</p>",
34383438
"ConfigurationRecorderStatus$lastErrorCode": "<p>The latest error code from when the recorder last failed.</p>",
34393439
"ConfigurationRecorderStatus$lastErrorMessage": "<p>The latest error message from when the recorder last failed.</p>",

generator/ServiceModels/config/config-2014-11-12.normal.json

Lines changed: 93 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2612,7 +2612,7 @@
26122612
},
26132613
"roleARN":{
26142614
"shape":"String",
2615-
"documentation":"<p>The Amazon Resource Name (ARN) of the IAM role assumed by Config and used by the specified configuration recorder.</p> <note> <p> <b>The server will reject a request without a defined <code>roleARN</code> for the configuration recorder</b> </p> <p>While the API model does not require this field, the server will reject a request without a defined <code>roleARN</code> for the configuration recorder.</p> <p> <b>Policies and compliance results</b> </p> <p> <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html\">IAM policies</a> and <a href=\"https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies.html\">other policies managed in Organizations</a> can impact whether Config has permissions to record configuration changes for your resources. Additionally, rules directly evaluate the configuration of a resource and rules don't take into account these policies when running evaluations. Make sure that the policies in effect align with how you intend to use Config.</p> <p> <b>Keep Minimum Permisions When Reusing an IAM role</b> </p> <p>If you use an Amazon Web Services service that uses Config, such as Security Hub or Control Tower, and an IAM role has already been created, make sure that the IAM role that you use when setting up Config keeps the same minimum permissions as the pre-existing IAM role. You must do this to ensure that the other Amazon Web Services service continues to run as expected. </p> <p>For example, if Control Tower has an IAM role that allows Config to read S3 objects, make sure that the same permissions are granted to the IAM role you use when setting up Config. Otherwise, it may interfere with how Control Tower operates.</p> <p> <b>The service-linked IAM role for Config must be used for service-linked configuration recorders</b> </p> <p>For service-linked configuration recorders, you must use the service-linked IAM role for Config: <a href=\"https://docs.aws.amazon.com/config/latest/developerguide/using-service-linked-roles.html\">AWSServiceRoleForConfig</a>.</p> </note>"
2615+
"documentation":"<p>The Amazon Resource Name (ARN) of the IAM role assumed by Config and used by the specified configuration recorder.</p> <note> <p> <b>The server will reject a request without a defined <code>roleARN</code> for the configuration recorder</b> </p> <p>While the API model does not require this field, the server will reject a request without a defined <code>roleARN</code> for the configuration recorder.</p> <p> <b>Policies and compliance results</b> </p> <p> <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html\">IAM policies</a> and <a href=\"https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies.html\">other policies managed in Organizations</a> can impact whether Config has permissions to record configuration changes for your resources. Additionally, rules directly evaluate the configuration of a resource and rules don't take into account these policies when running evaluations. Make sure that the policies in effect align with how you intend to use Config.</p> <p> <b>Keep Minimum Permisions When Reusing an IAM role</b> </p> <p>If you use an Amazon Web Services service that uses Config, such as Security Hub CSPM or Control Tower, and an IAM role has already been created, make sure that the IAM role that you use when setting up Config keeps the same minimum permissions as the pre-existing IAM role. You must do this to ensure that the other Amazon Web Services service continues to run as expected. </p> <p>For example, if Control Tower has an IAM role that allows Config to read S3 objects, make sure that the same permissions are granted to the IAM role you use when setting up Config. Otherwise, it may interfere with how Control Tower operates.</p> <p> <b>The service-linked IAM role for Config must be used for service-linked configuration recorders</b> </p> <p>For service-linked configuration recorders, you must use the service-linked IAM role for Config: <a href=\"https://docs.aws.amazon.com/config/latest/developerguide/using-service-linked-roles.html\">AWSServiceRoleForConfig</a>.</p> </note>"
26162616
},
26172617
"recordingGroup":{
26182618
"shape":"RecordingGroup",
@@ -8022,7 +8022,98 @@
80228022
"AWS::S3Express::DirectoryBucket",
80238023
"AWS::SageMaker::InferenceExperiment",
80248024
"AWS::SecurityHub::Standard",
8025-
"AWS::Transfer::Profile"
8025+
"AWS::Transfer::Profile",
8026+
"AWS::CloudFormation::StackSet",
8027+
"AWS::MediaPackageV2::Channel",
8028+
"AWS::S3::AccessGrantsLocation",
8029+
"AWS::S3::AccessGrant",
8030+
"AWS::S3::AccessGrantsInstance",
8031+
"AWS::EMRServerless::Application",
8032+
"AWS::Config::AggregationAuthorization",
8033+
"AWS::Bedrock::ApplicationInferenceProfile",
8034+
"AWS::ApiGatewayV2::Integration",
8035+
"AWS::SageMaker::MlflowTrackingServer",
8036+
"AWS::SageMaker::ModelBiasJobDefinition",
8037+
"AWS::SecretsManager::RotationSchedule",
8038+
"AWS::Deadline::QueueFleetAssociation",
8039+
"AWS::ECR::RepositoryCreationTemplate",
8040+
"AWS::CloudFormation::LambdaHook",
8041+
"AWS::EC2::SubnetNetworkAclAssociation",
8042+
"AWS::ApiGateway::UsagePlan",
8043+
"AWS::AppConfig::Extension",
8044+
"AWS::Deadline::Fleet",
8045+
"AWS::EMR::Studio",
8046+
"AWS::S3Tables::TableBucket",
8047+
"AWS::CloudFront::RealtimeLogConfig",
8048+
"AWS::BackupGateway::Hypervisor",
8049+
"AWS::BCMDataExports::Export",
8050+
"AWS::CloudFormation::GuardHook",
8051+
"AWS::CloudFront::PublicKey",
8052+
"AWS::CloudTrail::EventDataStore",
8053+
"AWS::EntityResolution::IdMappingWorkflow",
8054+
"AWS::EntityResolution::SchemaMapping",
8055+
"AWS::IoT::DomainConfiguration",
8056+
"AWS::PCAConnectorAD::DirectoryRegistration",
8057+
"AWS::RDS::Integration",
8058+
"AWS::Config::ConformancePack",
8059+
"AWS::RolesAnywhere::Profile",
8060+
"AWS::CodeArtifact::Domain",
8061+
"AWS::Backup::RestoreTestingPlan",
8062+
"AWS::Config::StoredQuery",
8063+
"AWS::SageMaker::DataQualityJobDefinition",
8064+
"AWS::SageMaker::ModelExplainabilityJobDefinition",
8065+
"AWS::SageMaker::ModelQualityJobDefinition",
8066+
"AWS::SageMaker::StudioLifecycleConfig",
8067+
"AWS::SES::DedicatedIpPool",
8068+
"AWS::SES::MailManagerTrafficPolicy",
8069+
"AWS::SSM::ResourceDataSync",
8070+
"AWS::BedrockAgentCore::Runtime",
8071+
"AWS::BedrockAgentCore::BrowserCustom",
8072+
"AWS::ElasticLoadBalancingV2::TargetGroup",
8073+
"AWS::EMRContainers::VirtualCluster",
8074+
"AWS::EntityResolution::MatchingWorkflow",
8075+
"AWS::IoTCoreDeviceAdvisor::SuiteDefinition",
8076+
"AWS::EC2::SecurityGroupVpcAssociation",
8077+
"AWS::EC2::VerifiedAccessInstance",
8078+
"AWS::KafkaConnect::CustomPlugin",
8079+
"AWS::NetworkManager::TransitGatewayPeering",
8080+
"AWS::OpenSearchServerless::SecurityConfig",
8081+
"AWS::Redshift::Integration",
8082+
"AWS::RolesAnywhere::TrustAnchor",
8083+
"AWS::Route53Profiles::ProfileAssociation",
8084+
"AWS::SSMIncidents::ResponsePlan",
8085+
"AWS::Transfer::Server",
8086+
"AWS::Glue::Database",
8087+
"AWS::Organizations::OrganizationalUnit",
8088+
"AWS::EC2::IPAMPoolCidr",
8089+
"AWS::EC2::VPCGatewayAttachment",
8090+
"AWS::Bedrock::Prompt",
8091+
"AWS::Comprehend::Flywheel",
8092+
"AWS::DataSync::Agent",
8093+
"AWS::MediaTailor::LiveSource",
8094+
"AWS::MSK::ServerlessCluster",
8095+
"AWS::IoTSiteWise::Asset",
8096+
"AWS::B2BI::Capability",
8097+
"AWS::CloudFront::KeyValueStore",
8098+
"AWS::Deadline::Monitor",
8099+
"AWS::GuardDuty::MalwareProtectionPlan",
8100+
"AWS::Location::APIKey",
8101+
"AWS::MediaPackageV2::OriginEndpoint",
8102+
"AWS::PCAConnectorAD::Connector",
8103+
"AWS::S3Tables::TableBucketPolicy",
8104+
"AWS::SecretsManager::ResourcePolicy",
8105+
"AWS::SSMContacts::Contact",
8106+
"AWS::IoT::ThingGroup",
8107+
"AWS::ImageBuilder::LifecyclePolicy",
8108+
"AWS::GameLift::Build",
8109+
"AWS::ECR::ReplicationConfiguration",
8110+
"AWS::EC2::SubnetCidrBlock",
8111+
"AWS::Connect::SecurityProfile",
8112+
"AWS::CleanRoomsML::TrainingDataset",
8113+
"AWS::AppStream::AppBlockBuilder",
8114+
"AWS::Route53::DNSSEC",
8115+
"AWS::SageMaker::UserProfile",
8116+
"AWS::ApiGateway::Method"
80268117
]
80278118
},
80288119
"ResourceTypeList":{

sdk/src/Services/ConfigService/Generated/Model/ConfigurationRecorder.cs

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -257,11 +257,11 @@ internal bool IsSetRecordingScope()
257257
/// </para>
258258
///
259259
/// <para>
260-
/// If you use an Amazon Web Services service that uses Config, such as Security Hub or
261-
/// Control Tower, and an IAM role has already been created, make sure that the IAM role
262-
/// that you use when setting up Config keeps the same minimum permissions as the pre-existing
263-
/// IAM role. You must do this to ensure that the other Amazon Web Services service continues
264-
/// to run as expected.
260+
/// If you use an Amazon Web Services service that uses Config, such as Security Hub CSPM
261+
/// or Control Tower, and an IAM role has already been created, make sure that the IAM
262+
/// role that you use when setting up Config keeps the same minimum permissions as the
263+
/// pre-existing IAM role. You must do this to ensure that the other Amazon Web Services
264+
/// service continues to run as expected.
265265
/// </para>
266266
///
267267
/// <para>

0 commit comments

Comments
 (0)