Skip to content

Commit

Permalink
Merge branch 'release-1.29.5' into develop
Browse files Browse the repository at this point in the history
* release-1.29.5:
  Bumping version to 1.29.5
  Update to latest partitions and endpoints
  Update to latest models
  Add paginator non_aggregate_key overrides for resource-explorer-2
  • Loading branch information
aws-sdk-python-automation committed Nov 8, 2022
2 parents f91b4fd + e7354ac commit 8c5993f
Show file tree
Hide file tree
Showing 26 changed files with 6,250 additions and 1,600 deletions.
52 changes: 52 additions & 0 deletions .changes/1.29.5.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,52 @@
[
{
"category": "``acm``",
"description": "Support added for requesting elliptic curve certificate key algorithm types P-256 (EC_prime256v1) and P-384 (EC_secp384r1).",
"type": "api-change"
},
{
"category": "``billingconductor``",
"description": "This release adds the Recurring Custom Line Item feature along with a new API ListCustomLineItemVersions.",
"type": "api-change"
},
{
"category": "``ec2``",
"description": "This release enables sharing of EC2 Placement Groups across accounts and within AWS Organizations using Resource Access Manager",
"type": "api-change"
},
{
"category": "``endpoint-rules``",
"description": "Update endpoint-rules client to latest version",
"type": "api-change"
},
{
"category": "``fms``",
"description": "AWS Firewall Manager now supports importing existing AWS Network Firewall firewalls into Firewall Manager policies.",
"type": "api-change"
},
{
"category": "``lightsail``",
"description": "This release adds support for Amazon Lightsail to automate the delegation of domains registered through Amazon Route 53 to Lightsail DNS management and to automate record creation for DNS validation of Lightsail SSL/TLS certificates.",
"type": "api-change"
},
{
"category": "``opensearch``",
"description": "Amazon OpenSearch Service now offers managed VPC endpoints to connect to your Amazon OpenSearch Service VPC-enabled domain in a Virtual Private Cloud (VPC). This feature allows you to privately access OpenSearch Service domain without using public IPs or requiring traffic to traverse the Internet.",
"type": "api-change"
},
{
"category": "``polly``",
"description": "Amazon Polly adds new voices: Elin (sv-SE), Ida (nb-NO), Laura (nl-NL) and Suvi (fi-FI). They are available as neural voices only.",
"type": "api-change"
},
{
"category": "``resource-explorer-2``",
"description": "This is the initial SDK release for AWS Resource Explorer. AWS Resource Explorer lets your users search for and discover your AWS resources across the AWS Regions in your account.",
"type": "api-change"
},
{
"category": "``route53``",
"description": "Amazon Route 53 now supports the Europe (Zurich) Region (eu-central-2) for latency records, geoproximity records, and private DNS for Amazon VPCs in that region.",
"type": "api-change"
}
]
15 changes: 15 additions & 0 deletions CHANGELOG.rst
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,21 @@
CHANGELOG
=========

1.29.5
======

* api-change:``acm``: Support added for requesting elliptic curve certificate key algorithm types P-256 (EC_prime256v1) and P-384 (EC_secp384r1).
* api-change:``billingconductor``: This release adds the Recurring Custom Line Item feature along with a new API ListCustomLineItemVersions.
* api-change:``ec2``: This release enables sharing of EC2 Placement Groups across accounts and within AWS Organizations using Resource Access Manager
* api-change:``endpoint-rules``: Update endpoint-rules client to latest version
* api-change:``fms``: AWS Firewall Manager now supports importing existing AWS Network Firewall firewalls into Firewall Manager policies.
* api-change:``lightsail``: This release adds support for Amazon Lightsail to automate the delegation of domains registered through Amazon Route 53 to Lightsail DNS management and to automate record creation for DNS validation of Lightsail SSL/TLS certificates.
* api-change:``opensearch``: Amazon OpenSearch Service now offers managed VPC endpoints to connect to your Amazon OpenSearch Service VPC-enabled domain in a Virtual Private Cloud (VPC). This feature allows you to privately access OpenSearch Service domain without using public IPs or requiring traffic to traverse the Internet.
* api-change:``polly``: Amazon Polly adds new voices: Elin (sv-SE), Ida (nb-NO), Laura (nl-NL) and Suvi (fi-FI). They are available as neural voices only.
* api-change:``resource-explorer-2``: This is the initial SDK release for AWS Resource Explorer. AWS Resource Explorer lets your users search for and discover your AWS resources across the AWS Regions in your account.
* api-change:``route53``: Amazon Route 53 now supports the Europe (Zurich) Region (eu-central-2) for latency records, geoproximity records, and private DNS for Amazon VPCs in that region.


1.29.4
======

Expand Down
2 changes: 1 addition & 1 deletion botocore/__init__.py
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@
import os
import re

__version__ = '1.29.4'
__version__ = '1.29.5'


class NullHandler(logging.Handler):
Expand Down
24 changes: 19 additions & 5 deletions botocore/data/acm/2015-12-08/service-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -41,6 +41,9 @@
"errors":[
{"shape":"ResourceNotFoundException"},
{"shape":"ResourceInUseException"},
{"shape":"AccessDeniedException"},
{"shape":"ThrottlingException"},
{"shape":"ConflictException"},
{"shape":"InvalidArnException"}
],
"documentation":"<p>Deletes a certificate and its associated private key. If this action succeeds, the certificate no longer appears in the list that can be displayed by calling the <a>ListCertificates</a> action or be retrieved by calling the <a>GetCertificate</a> action. The certificate will not be available for use by Amazon Web Services services integrated with ACM. </p> <note> <p>You cannot delete an ACM certificate that is being used by another Amazon Web Services service. To delete a certificate that is in use, the certificate association must first be removed.</p> </note>"
Expand Down Expand Up @@ -130,7 +133,8 @@
"input":{"shape":"ListCertificatesRequest"},
"output":{"shape":"ListCertificatesResponse"},
"errors":[
{"shape":"InvalidArgsException"}
{"shape":"InvalidArgsException"},
{"shape":"ValidationException"}
],
"documentation":"<p>Retrieves a list of certificate ARNs and domain names. You can request that only certificates that match a specific status be listed. You can also filter by specific attributes of the certificate. Default filtering returns only <code>RSA_2048</code> certificates. For more information, see <a>Filters</a>.</p>"
},
Expand Down Expand Up @@ -191,7 +195,7 @@
{"shape":"ResourceNotFoundException"},
{"shape":"InvalidArnException"}
],
"documentation":"<p>Renews an eligible ACM certificate. At this time, only exported private certificates can be renewed with this operation. In order to renew your ACM Private CA certificates with ACM, you must first <a href=\"https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaPermissions.html\">grant the ACM service principal permission to do so</a>. For more information, see <a href=\"https://docs.aws.amazon.com/acm/latest/userguide/manual-renewal.html\">Testing Managed Renewal</a> in the ACM User Guide.</p>"
"documentation":"<p>Renews an eligible ACM certificate. At this time, only exported private certificates can be renewed with this operation. In order to renew your Amazon Web Services Private CA certificates with ACM, you must first <a href=\"https://docs.aws.amazon.com/privateca/latest/userguide/PcaPermissions.html\">grant the ACM service principal permission to do so</a>. For more information, see <a href=\"https://docs.aws.amazon.com/acm/latest/userguide/manual-renewal.html\">Testing Managed Renewal</a> in the ACM User Guide.</p>"
},
"RequestCertificate":{
"name":"RequestCertificate",
Expand Down Expand Up @@ -274,7 +278,7 @@
"type":"string",
"max":2048,
"min":20,
"pattern":"arn:[\\w+=/,.@-]+:[\\w+=/,.@-]+:[\\w+=/,.@-]*:[0-9]+:[\\w+=,.@-]+(/[\\w+=,.@-]+)*"
"pattern":"arn:[\\w+=/,.@-]+:acm:[\\w+=/,.@-]*:[0-9]+:[\\w+=,.@-]+(/[\\w+=,.@-]+)*"
},
"AvailabilityErrorMessage":{"type":"string"},
"CertificateBody":{
Expand Down Expand Up @@ -1049,6 +1053,12 @@
"min":4,
"sensitive":true
},
"PcaArn":{
"type":"string",
"max":2048,
"min":20,
"pattern":"arn:[\\w+=/,.@-]+:acm-pca:[\\w+=/,.@-]*:[0-9]+:[\\w+=,.@-]+(/[\\w+=,.@-]+)*"
},
"PositiveInteger":{
"type":"integer",
"min":1
Expand Down Expand Up @@ -1183,12 +1193,16 @@
"documentation":"<p>Currently, you can use this parameter to specify whether to add the certificate to a certificate transparency log. Certificate transparency makes it possible to detect SSL/TLS certificates that have been mistakenly or maliciously issued. Certificates that have not been logged typically produce an error message in a browser. For more information, see <a href=\"https://docs.aws.amazon.com/acm/latest/userguide/acm-bestpractices.html#best-practices-transparency\">Opting Out of Certificate Transparency Logging</a>.</p>"
},
"CertificateAuthorityArn":{
"shape":"Arn",
"documentation":"<p>The Amazon Resource Name (ARN) of the private certificate authority (CA) that will be used to issue the certificate. If you do not provide an ARN and you are trying to request a private certificate, ACM will attempt to issue a public certificate. For more information about private CAs, see the <a href=\"https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaWelcome.html\">Certificate Manager Private Certificate Authority</a> user guide. The ARN must have the following form: </p> <p> <code>arn:aws:acm-pca:region:account:certificate-authority/12345678-1234-1234-1234-123456789012</code> </p>"
"shape":"PcaArn",
"documentation":"<p>The Amazon Resource Name (ARN) of the private certificate authority (CA) that will be used to issue the certificate. If you do not provide an ARN and you are trying to request a private certificate, ACM will attempt to issue a public certificate. For more information about private CAs, see the <a href=\"https://docs.aws.amazon.com/privateca/latest/userguide/PcaWelcome.html\">Amazon Web Services Private Certificate Authority</a> user guide. The ARN must have the following form: </p> <p> <code>arn:aws:acm-pca:region:account:certificate-authority/12345678-1234-1234-1234-123456789012</code> </p>"
},
"Tags":{
"shape":"TagList",
"documentation":"<p>One or more resource tags to associate with the certificate.</p>"
},
"KeyAlgorithm":{
"shape":"KeyAlgorithm",
"documentation":"<p>Specifies the algorithm of the public and private key pair that your certificate uses to encrypt data. RSA is the default key algorithm for ACM certificates. Elliptic Curve Digital Signature Algorithm (ECDSA) keys are smaller, offering security comparable to RSA keys but with greater computing efficiency. However, ECDSA is not supported by all network clients. Some AWS services may require RSA keys, or only support ECDSA keys of a particular size, while others allow the use of either RSA and ECDSA keys to ensure that compatibility is not broken. Check the requirements for the AWS service where you plan to deploy your certificate.</p> <p>Default: RSA_2048</p>"
}
}
},
Expand Down
20 changes: 10 additions & 10 deletions botocore/data/billingconductor/2021-07-30/endpoint-rule-set-1.json
Original file line number Diff line number Diff line change
Expand Up @@ -200,8 +200,8 @@
"authSchemes": [
{
"name": "sigv4",
"signingName": "billingconductor",
"signingRegion": "us-east-1"
"signingRegion": "us-east-1",
"signingName": "billingconductor"
}
]
},
Expand Down Expand Up @@ -260,8 +260,8 @@
"authSchemes": [
{
"name": "sigv4",
"signingName": "billingconductor",
"signingRegion": "us-east-1"
"signingRegion": "us-east-1",
"signingName": "billingconductor"
}
]
},
Expand Down Expand Up @@ -320,8 +320,8 @@
"authSchemes": [
{
"name": "sigv4",
"signingName": "billingconductor",
"signingRegion": "us-east-1"
"signingRegion": "us-east-1",
"signingName": "billingconductor"
}
]
},
Expand All @@ -346,8 +346,8 @@
"authSchemes": [
{
"name": "sigv4",
"signingName": "billingconductor",
"signingRegion": "us-east-1"
"signingRegion": "us-east-1",
"signingName": "billingconductor"
}
]
},
Expand Down Expand Up @@ -565,8 +565,8 @@
"authSchemes": [
{
"name": "sigv4",
"signingName": "billingconductor",
"signingRegion": "us-east-1"
"signingRegion": "us-east-1",
"signingName": "billingconductor"
}
]
},
Expand Down
6 changes: 6 additions & 0 deletions botocore/data/billingconductor/2021-07-30/paginators-1.json
Original file line number Diff line number Diff line change
Expand Up @@ -69,6 +69,12 @@
],
"output_token": "NextToken",
"result_key": "AssociatedResources"
},
"ListCustomLineItemVersions": {
"input_token": "NextToken",
"limit_key": "MaxResults",
"output_token": "NextToken",
"result_key": "CustomLineItemVersions"
}
}
}
Loading

0 comments on commit 8c5993f

Please sign in to comment.