Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release v1.35.8 #3597

Merged
merged 1 commit into from
Oct 15, 2020
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
35 changes: 35 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,38 @@
Release v1.35.8 (2020-10-15)
===

### Service Client Updates
* `service/accessanalyzer`: Updates service API and documentation
* `service/budgets`: Updates service API, documentation, and paginators
* This release introduces AWS Budgets Actions, allowing you to define an explicit response(or set of responses) to take when your budget exceeds it's action threshold.
* `service/ce`: Updates service API and documentation
* `service/dms`: Updates service API and documentation
* When creating Endpoints, Replication Instances, and Replication Tasks, the feature provides you the option to specify friendly name to the resources.
* `service/glue`: Updates service documentation
* API Documentation updates for Glue Get-Plan API
* `service/groundstation`: Updates service API and documentation
* `service/iot`: Updates service API and documentation
* Add new variable, lastStatusChangeDate, to DescribeDomainConfiguration API
* `service/macie2`: Updates service API and documentation
* `service/rds`: Updates service API and documentation
* Return tags for all resources in the output of DescribeDBInstances, DescribeDBSnapshots, DescribeDBClusters, and DescribeDBClusterSnapshots API operations.
* `service/rekognition`: Updates service API and documentation
* This SDK Release introduces new API (DetectProtectiveEquipment) for Amazon Rekognition. This release also adds ServiceQuotaExceeded exception to Amazon Rekognition IndexFaces API.
* `service/ssm`: Updates service API and documentation
* This Patch Manager release now supports searching for available packages from Amazon Linux and Amazon Linux 2 via the DescribeAvailablePatches API.
* `service/transfer`: Updates service API and documentation
* Add support to associate VPC Security Groups at server creation.
* `service/workmail`: Updates service API and documentation
* Add CreateOrganization and DeleteOrganization API operations.
* `service/workspaces`: Updates service documentation
* Documentation updates for WorkSpaces
* `service/xray`: Updates service API, documentation, and paginators
* Enhancing CreateGroup, UpdateGroup, GetGroup and GetGroups APIs to support configuring X-Ray Insights Notifications. Adding TraceLimit information into X-Ray BatchGetTraces API response.

### SDK Bugs
* `s3control`: Fixes bug in SDK that caused input for certain s3control operation to be modified, when using ARNs. ([#3595](https://github.com/aws/aws-sdk-go/pull/3595))
* Fixes [#3583](https://github.com/aws/aws-sdk-go/issues/3583).

Release v1.35.7 (2020-10-09)
===

Expand Down
3 changes: 0 additions & 3 deletions CHANGELOG_PENDING.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,3 @@
### SDK Enhancements

### SDK Bugs
* `s3control`: Fixes bug in SDK that caused input for certain s3control operation to be modified, when using ARNs. ([#3595](https://github.com/aws/aws-sdk-go/pull/3595))
* Fixes [#3583](https://github.com/aws/aws-sdk-go/issues/3583).

7 changes: 7 additions & 0 deletions aws/endpoints/defaults.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion aws/version.go
Original file line number Diff line number Diff line change
Expand Up @@ -5,4 +5,4 @@ package aws
const SDKName = "aws-sdk-go"

// SDKVersion is the version of this SDK
const SDKVersion = "1.35.7"
const SDKVersion = "1.35.8"
50 changes: 42 additions & 8 deletions models/apis/accessanalyzer/2019-11-01/api-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,23 @@
"uid":"accessanalyzer-2019-11-01"
},
"operations":{
"ApplyArchiveRule":{
"name":"ApplyArchiveRule",
"http":{
"method":"PUT",
"requestUri":"/archive-rule",
"responseCode":200
},
"input":{"shape":"ApplyArchiveRuleRequest"},
"errors":[
{"shape":"ResourceNotFoundException"},
{"shape":"ValidationException"},
{"shape":"InternalServerException"},
{"shape":"ThrottlingException"},
{"shape":"AccessDeniedException"}
],
"idempotent":true
},
"CreateAnalyzer":{
"name":"CreateAnalyzer",
"http":{
Expand Down Expand Up @@ -419,6 +436,21 @@
"type":"list",
"member":{"shape":"AnalyzerSummary"}
},
"ApplyArchiveRuleRequest":{
"type":"structure",
"required":[
"analyzerArn",
"ruleName"
],
"members":{
"analyzerArn":{"shape":"AnalyzerArn"},
"clientToken":{
"shape":"String",
"idempotencyToken":true
},
"ruleName":{"shape":"Name"}
}
},
"ArchiveRuleSummary":{
"type":"structure",
"required":[
Expand Down Expand Up @@ -620,8 +652,8 @@
"FindingSourceType":{
"type":"string",
"enum":[
"BUCKET_ACL",
"POLICY",
"BUCKET_ACL",
"S3_ACCESS_POINT"
]
},
Expand Down Expand Up @@ -799,7 +831,8 @@
},
"error":{"httpStatusCode":500},
"exception":true,
"fault":true
"fault":true,
"retryable":{"throttling":false}
},
"ListAnalyzedResourcesRequest":{
"type":"structure",
Expand Down Expand Up @@ -964,12 +997,12 @@
"ResourceType":{
"type":"string",
"enum":[
"AWS::S3::Bucket",
"AWS::IAM::Role",
"AWS::KMS::Key",
"AWS::SQS::Queue",
"AWS::Lambda::Function",
"AWS::Lambda::LayerVersion",
"AWS::S3::Bucket",
"AWS::SQS::Queue"
"AWS::KMS::Key"
]
},
"ServiceQuotaExceededException":{
Expand Down Expand Up @@ -1064,7 +1097,8 @@
"httpStatusCode":429,
"senderFault":true
},
"exception":true
"exception":true,
"retryable":{"throttling":true}
},
"Timestamp":{
"type":"timestamp",
Expand Down Expand Up @@ -1179,10 +1213,10 @@
"ValidationExceptionReason":{
"type":"string",
"enum":[
"unknownOperation",
"cannotParse",
"fieldValidationFailed",
"other",
"unknownOperation"
"other"
]
},
"ValueList":{
Expand Down
11 changes: 10 additions & 1 deletion models/apis/accessanalyzer/2019-11-01/docs-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,9 @@
"version": "2.0",
"service": "<p>AWS IAM Access Analyzer helps identify potential resource-access risks by enabling you to identify any policies that grant access to an external principal. It does this by using logic-based reasoning to analyze resource-based policies in your AWS environment. An external principal can be another AWS account, a root user, an IAM user or role, a federated user, an AWS service, or an anonymous user. This guide describes the AWS IAM Access Analyzer operations that you can call programmatically. For general information about Access Analyzer, see the <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html\">AWS IAM Access Analyzer section of the IAM User Guide</a>.</p> <p>To start using Access Analyzer, you first need to create an analyzer.</p>",
"operations": {
"ApplyArchiveRule": "<p>Retroactively applies the archive rule to existing findings that meet the archive rule criteria.</p>",
"CreateAnalyzer": "<p>Creates an analyzer for your account.</p>",
"CreateArchiveRule": "<p>Creates an archive rule for the specified analyzer. Archive rules automatically archive findings that meet the criteria you define when you create the rule.</p>",
"CreateArchiveRule": "<p>Creates an archive rule for the specified analyzer. Archive rules automatically archive new findings that meet the criteria you define when you create the rule.</p>",
"DeleteAnalyzer": "<p>Deletes the specified analyzer. When you delete an analyzer, Access Analyzer is disabled for the account in the current or specific Region. All findings that were generated by the analyzer are deleted. You cannot undo this action.</p>",
"DeleteArchiveRule": "<p>Deletes the specified archive rule.</p>",
"GetAnalyzedResource": "<p>Retrieves information about a resource that was analyzed.</p>",
Expand Down Expand Up @@ -57,6 +58,7 @@
"base": null,
"refs": {
"AnalyzerSummary$arn": "<p>The ARN of the analyzer.</p>",
"ApplyArchiveRuleRequest$analyzerArn": "<p>The Amazon resource name (ARN) of the analyzer.</p>",
"CreateAnalyzerResponse$arn": "<p>The ARN of the analyzer that was created by the request.</p>",
"GetAnalyzedResourceRequest$analyzerArn": "<p>The ARN of the analyzer to retrieve information from.</p>",
"GetFindingRequest$analyzerArn": "<p>The ARN of the analyzer that generated the finding.</p>",
Expand Down Expand Up @@ -85,6 +87,11 @@
"ListAnalyzersResponse$analyzers": "<p>The analyzers retrieved.</p>"
}
},
"ApplyArchiveRuleRequest": {
"base": "<p>Retroactively applies an archive rule.</p>",
"refs": {
}
},
"ArchiveRuleSummary": {
"base": "<p>Contains information about an archive rule.</p>",
"refs": {
Expand Down Expand Up @@ -354,6 +361,7 @@
"base": null,
"refs": {
"AnalyzerSummary$name": "<p>The name of the analyzer.</p>",
"ApplyArchiveRuleRequest$ruleName": "<p>The name of the rule to apply.</p>",
"ArchiveRuleSummary$ruleName": "<p>The name of the archive rule.</p>",
"CreateAnalyzerRequest$analyzerName": "<p>The name of the analyzer to create.</p>",
"CreateArchiveRuleRequest$analyzerName": "<p>The name of the created analyzer.</p>",
Expand Down Expand Up @@ -451,6 +459,7 @@
"AnalyzedResource$resourceOwnerAccount": "<p>The AWS account ID that owns the resource.</p>",
"AnalyzedResourceSummary$resourceOwnerAccount": "<p>The AWS account ID that owns the resource.</p>",
"AnalyzerSummary$lastResourceAnalyzed": "<p>The resource that was most recently analyzed by the analyzer.</p>",
"ApplyArchiveRuleRequest$clientToken": "<p>A client token.</p>",
"ConditionKeyMap$key": null,
"ConditionKeyMap$value": null,
"ConflictException$message": null,
Expand Down
Loading