Skip to content

Commit

Permalink
Update models for release
Browse files Browse the repository at this point in the history
  • Loading branch information
aws-sdk-php-automation committed Aug 8, 2024
1 parent f6e488f commit a7ada87
Show file tree
Hide file tree
Showing 16 changed files with 267 additions and 25 deletions.
22 changes: 22 additions & 0 deletions .changes/3.319.1
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
[
{
"type": "api-change",
"category": "Glue",
"description": "This release adds support to retrieve the validation status when creating or updating Glue Data Catalog Views. Also added is support for BasicCatalogTarget partition keys."
},
{
"type": "api-change",
"category": "Connect",
"description": "This release fixes a regression in number of access control tags that are allowed to be added to a security profile in Amazon Connect. You can now add up to four access control tags on a single security profile."
},
{
"type": "api-change",
"category": "CognitoIdentityProvider",
"description": "Added support for threat protection for custom authentication in Amazon Cognito user pools."
},
{
"type": "api-change",
"category": "EC2",
"description": "Launch of private IPv6 addressing for VPCs and Subnets. VPC IPAM supports the planning and monitoring of private IPv6 usage."
}
]
7 changes: 7 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,12 @@
# CHANGELOG

## next release

* `Aws\Glue` - This release adds support to retrieve the validation status when creating or updating Glue Data Catalog Views. Also added is support for BasicCatalogTarget partition keys.
* `Aws\Connect` - This release fixes a regression in number of access control tags that are allowed to be added to a security profile in Amazon Connect. You can now add up to four access control tags on a single security profile.
* `Aws\CognitoIdentityProvider` - Added support for threat protection for custom authentication in Amazon Cognito user pools.
* `Aws\EC2` - Launch of private IPv6 addressing for VPCs and Subnets. VPC IPAM supports the planning and monitoring of private IPv6 usage.

## 3.319.0 - 2024-08-07

* `Aws\S3` - Adds customization to output structures for `Expires` parsing which adds an additional shape `ExpiresString`
Expand Down
16 changes: 15 additions & 1 deletion src/data/cognito-idp/2016-04-18/api-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -2575,6 +2575,19 @@
"members":{
}
},
"AdvancedSecurityAdditionalFlowsType":{
"type":"structure",
"members":{
"CustomAuthMode":{"shape":"AdvancedSecurityEnabledModeType"}
}
},
"AdvancedSecurityEnabledModeType":{
"type":"string",
"enum":[
"AUDIT",
"ENFORCED"
]
},
"AdvancedSecurityModeType":{
"type":"string",
"enum":[
Expand Down Expand Up @@ -5610,7 +5623,8 @@
"type":"structure",
"required":["AdvancedSecurityMode"],
"members":{
"AdvancedSecurityMode":{"shape":"AdvancedSecurityModeType"}
"AdvancedSecurityMode":{"shape":"AdvancedSecurityModeType"},
"AdvancedSecurityAdditionalFlows":{"shape":"AdvancedSecurityAdditionalFlowsType"}
}
},
"UserPoolClientDescription":{
Expand Down
2 changes: 1 addition & 1 deletion src/data/cognito-idp/2016-04-18/api-2.json.php

Large diffs are not rendered by default.

14 changes: 13 additions & 1 deletion src/data/cognito-idp/2016-04-18/docs-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -426,10 +426,22 @@
"refs": {
}
},
"AdvancedSecurityAdditionalFlowsType": {
"base": "<p>Advanced security configuration options for additional authentication types in your user pool, including custom authentication and refresh-token authentication. </p>",
"refs": {
"UserPoolAddOnsType$AdvancedSecurityAdditionalFlows": "<p>Advanced security configuration options for additional authentication types in your user pool, including custom authentication and refresh-token authentication. </p>"
}
},
"AdvancedSecurityEnabledModeType": {
"base": null,
"refs": {
"AdvancedSecurityAdditionalFlowsType$CustomAuthMode": "<p>The operating mode of advanced security features in custom authentication with <a href=\"https://docs.aws.amazon.com/cognito/latest/developerguide/user-pool-lambda-challenge.html\"> Custom authentication challenge Lambda triggers</a>. </p>"
}
},
"AdvancedSecurityModeType": {
"base": null,
"refs": {
"UserPoolAddOnsType$AdvancedSecurityMode": "<p>The operating mode of advanced security features in your user pool.</p>"
"UserPoolAddOnsType$AdvancedSecurityMode": "<p>The operating mode of advanced security features for standard authentication types in your user pool, including username-password and secure remote password (SRP) authentication. </p>"
}
},
"AliasAttributeType": {
Expand Down
2 changes: 1 addition & 1 deletion src/data/cognito-idp/2016-04-18/docs-2.json.php

Large diffs are not rendered by default.

2 changes: 1 addition & 1 deletion src/data/connect/2017-08-08/api-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -4447,7 +4447,7 @@
"type":"map",
"key":{"shape":"SecurityProfilePolicyKey"},
"value":{"shape":"SecurityProfilePolicyValue"},
"max":2
"max":4
},
"AllowedCapabilities":{
"type":"structure",
Expand Down
2 changes: 1 addition & 1 deletion src/data/connect/2017-08-08/api-2.json.php

Large diffs are not rendered by default.

53 changes: 51 additions & 2 deletions src/data/ec2/2016-11-15/api-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -11064,7 +11064,8 @@
"shape":"String",
"idempotencyToken":true
},
"Tier":{"shape":"IpamTier"}
"Tier":{"shape":"IpamTier"},
"EnablePrivateGua":{"shape":"Boolean"}
}
},
"CreateIpamResourceDiscoveryRequest":{
Expand Down Expand Up @@ -29281,6 +29282,14 @@
"locationName":"item"
}
},
"IpSource":{
"type":"string",
"enum":[
"amazon",
"byoip",
"none"
]
},
"Ipam":{
"type":"structure",
"members":{
Expand Down Expand Up @@ -29347,6 +29356,10 @@
"Tier":{
"shape":"IpamTier",
"locationName":"tier"
},
"EnablePrivateGua":{
"shape":"Boolean",
"locationName":"enablePrivateGua"
}
}
},
Expand Down Expand Up @@ -29587,6 +29600,10 @@
"shape":"String",
"locationName":"resourceCidr"
},
"IpSource":{
"shape":"IpamResourceCidrIpSource",
"locationName":"ipSource"
},
"ResourceType":{
"shape":"IpamResourceType",
"locationName":"resourceType"
Expand Down Expand Up @@ -30214,6 +30231,14 @@
}
}
},
"IpamResourceCidrIpSource":{
"type":"string",
"enum":[
"amazon",
"byoip",
"none"
]
},
"IpamResourceCidrSet":{
"type":"list",
"member":{
Expand Down Expand Up @@ -30549,6 +30574,13 @@
}
},
"Ipv6Address":{"type":"string"},
"Ipv6AddressAttribute":{
"type":"string",
"enum":[
"public",
"private"
]
},
"Ipv6AddressList":{
"type":"list",
"member":{
Expand Down Expand Up @@ -33421,7 +33453,8 @@
"shape":"RemoveIpamOperatingRegionSet",
"locationName":"RemoveOperatingRegion"
},
"Tier":{"shape":"IpamTier"}
"Tier":{"shape":"IpamTier"},
"EnablePrivateGua":{"shape":"Boolean"}
}
},
"ModifyIpamResourceCidrRequest":{
Expand Down Expand Up @@ -42779,6 +42812,14 @@
"Ipv6CidrBlockState":{
"shape":"SubnetCidrBlockState",
"locationName":"ipv6CidrBlockState"
},
"Ipv6AddressAttribute":{
"shape":"Ipv6AddressAttribute",
"locationName":"ipv6AddressAttribute"
},
"IpSource":{
"shape":"IpSource",
"locationName":"ipSource"
}
}
},
Expand Down Expand Up @@ -47125,6 +47166,14 @@
"Ipv6Pool":{
"shape":"String",
"locationName":"ipv6Pool"
},
"Ipv6AddressAttribute":{
"shape":"Ipv6AddressAttribute",
"locationName":"ipv6AddressAttribute"
},
"IpSource":{
"shape":"IpSource",
"locationName":"ipSource"
}
}
},
Expand Down
2 changes: 1 addition & 1 deletion src/data/ec2/2016-11-15/api-2.json.php

Large diffs are not rendered by default.

25 changes: 24 additions & 1 deletion src/data/ec2/2016-11-15/docs-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -2075,6 +2075,7 @@
"CreateIpamPoolRequest$AutoImport": "<p>If selected, IPAM will continuously look for resources within the CIDR range of this pool and automatically import them as allocations into your IPAM. The CIDRs that will be allocated for these resources must not already be allocated to other resources in order for the import to succeed. IPAM will import a CIDR regardless of its compliance with the pool's allocation rules, so a resource might be imported and subsequently marked as noncompliant. If IPAM discovers multiple CIDRs that overlap, IPAM will import the largest CIDR only. If IPAM discovers multiple CIDRs with matching CIDRs, IPAM will randomly import one of them only. </p> <p>A locale must be set on the pool for this feature to work.</p>",
"CreateIpamPoolRequest$PubliclyAdvertisable": "<p>Determines if the pool is publicly advertisable. This option is not available for pools with AddressFamily set to <code>ipv4</code>.</p>",
"CreateIpamRequest$DryRun": "<p>A check for whether you have the required permissions for the action without actually making the request and provides an error response. If you have the required permissions, the error response is <code>DryRunOperation</code>. Otherwise, it is <code>UnauthorizedOperation</code>.</p>",
"CreateIpamRequest$EnablePrivateGua": "<p>Enable this option to use your own GUA ranges as private IPv6 addresses. This option is disabled by default.</p>",
"CreateIpamResourceDiscoveryRequest$DryRun": "<p>A check for whether you have the required permissions for the action without actually making the request and provides an error response. If you have the required permissions, the error response is <code>DryRunOperation</code>. Otherwise, it is <code>UnauthorizedOperation</code>.</p>",
"CreateIpamScopeRequest$DryRun": "<p>A check for whether you have the required permissions for the action without actually making the request and provides an error response. If you have the required permissions, the error response is <code>DryRunOperation</code>. Otherwise, it is <code>UnauthorizedOperation</code>.</p>",
"CreateKeyPairRequest$DryRun": "<p>Checks whether you have the required permissions for the action, without actually making the request, and provides an error response. If you have the required permissions, the error response is <code>DryRunOperation</code>. Otherwise, it is <code>UnauthorizedOperation</code>.</p>",
Expand Down Expand Up @@ -2583,6 +2584,7 @@
"InstanceRequirementsRequest$RequireHibernateSupport": "<p>Indicates whether instance types must support hibernation for On-Demand Instances.</p> <p>This parameter is not supported for <a href=\"https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_GetSpotPlacementScores.html\">GetSpotPlacementScores</a>.</p> <p>Default: <code>false</code> </p>",
"InstanceSpecification$ExcludeBootVolume": "<p>Excludes the root volume from being snapshotted.</p>",
"InstanceTagNotificationAttribute$IncludeAllTagsOfInstance": "<p>Indicates wheter all tag keys in the current Region are registered to appear in scheduled event notifications. <code>true</code> indicates that all tag keys in the current Region are registered.</p>",
"Ipam$EnablePrivateGua": "<p>Enable this option to use your own GUA ranges as private IPv6 addresses. This option is disabled by default.</p>",
"IpamPool$AutoImport": "<p>If selected, IPAM will continuously look for resources within the CIDR range of this pool and automatically import them as allocations into your IPAM. The CIDRs that will be allocated for these resources must not already be allocated to other resources in order for the import to succeed. IPAM will import a CIDR regardless of its compliance with the pool's allocation rules, so a resource might be imported and subsequently marked as noncompliant. If IPAM discovers multiple CIDRs that overlap, IPAM will import the largest CIDR only. If IPAM discovers multiple CIDRs with matching CIDRs, IPAM will randomly import one of them only. </p> <p>A locale must be set on the pool for this feature to work.</p>",
"IpamPool$PubliclyAdvertisable": "<p>Determines if a pool is publicly advertisable. This option is not available for pools with AddressFamily set to <code>ipv4</code>.</p>",
"IpamResourceDiscovery$IsDefault": "<p>Defines if the resource discovery is the default. The default resource discovery is the resource discovery automatically created when you create an IPAM.</p>",
Expand Down Expand Up @@ -2652,6 +2654,7 @@
"ModifyIpamPoolRequest$AutoImport": "<p>If true, IPAM will continuously look for resources within the CIDR range of this pool and automatically import them as allocations into your IPAM. The CIDRs that will be allocated for these resources must not already be allocated to other resources in order for the import to succeed. IPAM will import a CIDR regardless of its compliance with the pool's allocation rules, so a resource might be imported and subsequently marked as noncompliant. If IPAM discovers multiple CIDRs that overlap, IPAM will import the largest CIDR only. If IPAM discovers multiple CIDRs with matching CIDRs, IPAM will randomly import one of them only. </p> <p>A locale must be set on the pool for this feature to work.</p>",
"ModifyIpamPoolRequest$ClearAllocationDefaultNetmaskLength": "<p>Clear the default netmask length allocation rule for this pool.</p>",
"ModifyIpamRequest$DryRun": "<p>A check for whether you have the required permissions for the action without actually making the request and provides an error response. If you have the required permissions, the error response is <code>DryRunOperation</code>. Otherwise, it is <code>UnauthorizedOperation</code>.</p>",
"ModifyIpamRequest$EnablePrivateGua": "<p>Enable this option to use your own GUA ranges as private IPv6 addresses. This option is disabled by default.</p>",
"ModifyIpamResourceCidrRequest$DryRun": "<p>A check for whether you have the required permissions for the action without actually making the request and provides an error response. If you have the required permissions, the error response is <code>DryRunOperation</code>. Otherwise, it is <code>UnauthorizedOperation</code>.</p>",
"ModifyIpamResourceCidrRequest$Monitored": "<p>Determines if the resource is monitored by IPAM. If a resource is monitored, the resource is discovered by IPAM and you can view details about the resource’s CIDR.</p>",
"ModifyIpamResourceDiscoveryRequest$DryRun": "<p>A check for whether you have the required permissions for the action without actually making the request and provides an error response. If you have the required permissions, the error response is <code>DryRunOperation</code>. Otherwise, it is <code>UnauthorizedOperation</code>.</p>",
Expand Down Expand Up @@ -12424,7 +12427,7 @@
"PortRange$To": "<p>The last port in the range.</p>",
"PricingDetail$Count": "<p>The number of reservations available for the price.</p>",
"ProvisionIpamPoolCidrRequest$NetmaskLength": "<p>The netmask length of the CIDR you'd like to provision to a pool. Can be used for provisioning Amazon-provided IPv6 CIDRs to top-level pools and for provisioning CIDRs to pools with source pools. Cannot be used to provision BYOIP CIDRs to top-level pools. Either \"NetmaskLength\" or \"Cidr\" is required.</p>",
"ProvisionPublicIpv4PoolCidrRequest$NetmaskLength": "<p>The netmask length of the CIDR you would like to allocate to the public IPv4 pool.</p>",
"ProvisionPublicIpv4PoolCidrRequest$NetmaskLength": "<p>The netmask length of the CIDR you would like to allocate to the public IPv4 pool. The least specific netmask length you can define is 24.</p>",
"PublicIpv4Pool$TotalAddressCount": "<p>The total number of addresses.</p>",
"PublicIpv4Pool$TotalAvailableAddressCount": "<p>The total number of available addresses.</p>",
"PublicIpv4PoolRange$AddressCount": "<p>The number of addresses in the range.</p>",
Expand Down Expand Up @@ -12691,6 +12694,13 @@
"StaleIpPermission$IpRanges": "<p>The IP ranges. Not applicable for stale security group rules.</p>"
}
},
"IpSource": {
"base": null,
"refs": {
"SubnetIpv6CidrBlockAssociation$IpSource": "<p>The source that allocated the IP address space. <code>byoip</code> or <code>amazon</code> indicates public IP address space allocated by Amazon or space that you have allocated with Bring your own IP (BYOIP). <code>none</code> indicates private space.</p>",
"VpcIpv6CidrBlockAssociation$IpSource": "<p>The source that allocated the IP address space. <code>byoip</code> or <code>amazon</code> indicates public IP address space allocated by Amazon or space that you have allocated with Bring your own IP (BYOIP). <code>none</code> indicates private space.</p>"
}
},
"Ipam": {
"base": "<p>IPAM is a VPC feature that you can use to automate your IP address management workflows including assigning, tracking, troubleshooting, and auditing IP addresses across Amazon Web Services Regions and accounts throughout your Amazon Web Services Organization. For more information, see <a href=\"https://docs.aws.amazon.com/vpc/latest/ipam/what-is-it-ipam.html\">What is IPAM?</a> in the <i>Amazon VPC IPAM User Guide</i>.</p>",
"refs": {
Expand Down Expand Up @@ -13111,6 +13121,12 @@
"ModifyIpamResourceCidrResult$IpamResourceCidr": "<p>The CIDR of the resource.</p>"
}
},
"IpamResourceCidrIpSource": {
"base": null,
"refs": {
"IpamDiscoveredResourceCidr$IpSource": "<p>The source that allocated the IP address space. <code>byoip</code> or <code>amazon</code> indicates public IP address space allocated by Amazon or space that you have allocated with Bring your own IP (BYOIP). <code>none</code> indicates private space.</p>"
}
},
"IpamResourceCidrSet": {
"base": null,
"refs": {
Expand Down Expand Up @@ -13338,6 +13354,13 @@
"ScheduledInstancesIpv6Address$Ipv6Address": "<p>The IPv6 address.</p>"
}
},
"Ipv6AddressAttribute": {
"base": null,
"refs": {
"SubnetIpv6CidrBlockAssociation$Ipv6AddressAttribute": "<p>Public IPv6 addresses are those advertised on the internet from Amazon Web Services. Private IP addresses are not and cannot be advertised on the internet from Amazon Web Services.</p>",
"VpcIpv6CidrBlockAssociation$Ipv6AddressAttribute": "<p>Public IPv6 addresses are those advertised on the internet from Amazon Web Services. Private IP addresses are not and cannot be advertised on the internet from Amazon Web Services.</p>"
}
},
"Ipv6AddressList": {
"base": null,
"refs": {
Expand Down
2 changes: 1 addition & 1 deletion src/data/ec2/2016-11-15/docs-2.json.php

Large diffs are not rendered by default.

Loading

0 comments on commit a7ada87

Please sign in to comment.