Skip to content

Commit

Permalink
Merge branch 'main' into misc-upgrade-coroutines
Browse files Browse the repository at this point in the history
  • Loading branch information
lauzadis authored Sep 18, 2024
2 parents b672da2 + 6ec9e41 commit 46a5659
Show file tree
Hide file tree
Showing 15 changed files with 4,620 additions and 194 deletions.
25 changes: 25 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,30 @@
# Changelog

## [1.3.35] - 09/18/2024

### Features
* (**costexplorer**) This release extends the GetReservationPurchaseRecommendation API to support recommendations for Amazon DynamoDB reservations.
* (**directoryservice**) Added new APIs for enabling, disabling, and describing access to the AWS Directory Service Data API
* (**directoryservicedata**) Added new AWS Directory Service Data API, enabling you to manage data stored in AWS Directory Service directories. This includes APIs for creating, reading, updating, and deleting directory users, groups, and group memberships.
* (**guardduty**) Add `launchType` and `sourceIPs` fields to GuardDuty findings.
* (**mailmanager**) Introduce a new RuleSet condition evaluation, where customers can set up a StringExpression with a MimeHeader condition. This condition will perform the necessary validation based on the X-header provided by customers.
* (**s3**) Added SSE-KMS support for directory buckets.

### Documentation
* (**rds**) Updates Amazon RDS documentation with information upgrading snapshots with unsupported engine versions for RDS for MySQL and RDS for PostgreSQL.

## [1.3.34] - 09/17/2024

### Features
* (**codebuild**) GitLab Enhancements - Add support for Self-Hosted GitLab runners in CodeBuild. Add group webhooks
* (**ecr**) The `DescribeImageScanning` API now includes `fixAvailable`, `exploitAvailable`, and `fixedInVersion` fields to provide more detailed information about the availability of fixes, exploits, and fixed versions for identified image vulnerabilities.
* (**lambda**) Support for JSON resource-based policies and block public access
* (**ssm**) Support for additional levels of cross-account, cross-Region organizational units in Automation. Various documentation updates.

### Documentation
* (**ecs**) This is a documentation only release to address various tickets.
* (**rds**) Updates Amazon RDS documentation with configuration information about the BYOL model for RDS for Db2.

## [1.3.33] - 09/16/2024

### Features
Expand Down
12 changes: 9 additions & 3 deletions codegen/sdk/aws-models/codebuild.json
Original file line number Diff line number Diff line change
Expand Up @@ -7455,20 +7455,20 @@
"name": {
"target": "com.amazonaws.codebuild#String",
"traits": {
"smithy.api#documentation": "<p>The name of either the enterprise or organization that will send webhook events to CodeBuild, depending on if the webhook is a global or organization webhook respectively.</p>",
"smithy.api#documentation": "<p>The name of either the group, enterprise, or organization that will send webhook events to CodeBuild, depending on the type of webhook.</p>",
"smithy.api#required": {}
}
},
"domain": {
"target": "com.amazonaws.codebuild#String",
"traits": {
"smithy.api#documentation": "<p>The domain of the GitHub Enterprise organization. Note that this parameter is only required if your project's source type is GITHUB_ENTERPRISE</p>"
"smithy.api#documentation": "<p>The domain of the GitHub Enterprise organization or the GitLab Self Managed group. Note that this parameter is only required if your project's source type is GITHUB_ENTERPRISE or GITLAB_SELF_MANAGED.</p>"
}
},
"scope": {
"target": "com.amazonaws.codebuild#WebhookScopeType",
"traits": {
"smithy.api#documentation": "<p>The type of scope for a GitHub webhook.</p>",
"smithy.api#documentation": "<p>The type of scope for a GitHub or GitLab webhook.</p>",
"smithy.api#required": {}
}
}
Expand Down Expand Up @@ -9206,6 +9206,12 @@
"traits": {
"smithy.api#enumValue": "GITHUB_GLOBAL"
}
},
"GITLAB_GROUP": {
"target": "smithy.api#Unit",
"traits": {
"smithy.api#enumValue": "GITLAB_GROUP"
}
}
}
},
Expand Down
82 changes: 73 additions & 9 deletions codegen/sdk/aws-models/cost-explorer.json

Large diffs are not rendered by default.

3,464 changes: 3,464 additions & 0 deletions codegen/sdk/aws-models/directory-service-data.json

Large diffs are not rendered by default.

252 changes: 240 additions & 12 deletions codegen/sdk/aws-models/directory-service.json

Large diffs are not rendered by default.

29 changes: 28 additions & 1 deletion codegen/sdk/aws-models/ecr.json
Original file line number Diff line number Diff line change
Expand Up @@ -3499,7 +3499,7 @@
"encryptionType": {
"target": "com.amazonaws.ecr#EncryptionType",
"traits": {
"smithy.api#documentation": "<p>The encryption type to use.</p>\n <p>If you use the <code>KMS</code> encryption type, the contents of the repository will\n be encrypted using server-side encryption with Key Management Service key stored in KMS. When you\n use KMS to encrypt your data, you can either use the default Amazon Web Services managed KMS key\n for Amazon ECR, or specify your own KMS key, which you already created.</p>\n <p>If you use the <code>KMS_DSSE</code> encryption type, the contents of the repository\n will be encrypted with two layers of encryption using server-side encryption with the\n KMS Management Service key stored in KMS. Similar to the KMS encryption type, you\n can either use the default Amazon Web Services managed KMS key for Amazon ECR, or specify your own KMS\n key, which you've already created. </p>\n <p>If you use the <code>AES256</code> encryption type, Amazon ECR uses server-side encryption\n with Amazon S3-managed encryption keys which encrypts the images in the repository using an\n AES256 encryption algorithm. For more information, see <a href=\"https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingServerSideEncryption.html\">Protecting data using\n server-side encryption with Amazon S3-managed encryption keys (SSE-S3)</a> in the\n <i>Amazon Simple Storage Service Console Developer Guide</i>.</p>",
"smithy.api#documentation": "<p>The encryption type to use.</p>\n <p>If you use the <code>KMS</code> encryption type, the contents of the repository will\n be encrypted using server-side encryption with Key Management Service key stored in KMS. When you\n use KMS to encrypt your data, you can either use the default Amazon Web Services managed KMS key\n for Amazon ECR, or specify your own KMS key, which you already created.</p>\n <p>If you use the <code>KMS_DSSE</code> encryption type, the contents of the repository\n will be encrypted with two layers of encryption using server-side encryption with the\n KMS Management Service key stored in KMS. Similar to the <code>KMS</code> encryption type, you\n can either use the default Amazon Web Services managed KMS key for Amazon ECR, or specify your own KMS\n key, which you've already created. </p>\n <p>If you use the <code>AES256</code> encryption type, Amazon ECR uses server-side encryption\n with Amazon S3-managed encryption keys which encrypts the images in the repository using an\n AES256 encryption algorithm.</p>\n <p>For more information, see <a href=\"https://docs.aws.amazon.com/AmazonECR/latest/userguide/encryption-at-rest.html\">Amazon ECR encryption at\n rest</a> in the <i>Amazon Elastic Container Registry User Guide</i>.</p>",
"smithy.api#required": {}
}
},
Expand Down Expand Up @@ -3651,6 +3651,18 @@
"traits": {
"smithy.api#documentation": "<p>The date and time the finding was last updated at.</p>"
}
},
"fixAvailable": {
"target": "com.amazonaws.ecr#FixAvailable",
"traits": {
"smithy.api#documentation": "<p>Details on whether a fix is available through a version update. This value can be\n <code>YES</code>, <code>NO</code>, or <code>PARTIAL</code>. A <code>PARTIAL</code>\n fix means that some, but not all, of the packages identified in the finding have fixes\n available through updated versions.</p>"
}
},
"exploitAvailable": {
"target": "com.amazonaws.ecr#ExploitAvailable",
"traits": {
"smithy.api#documentation": "<p>If a finding discovered in your environment has an exploit available.</p>"
}
}
},
"traits": {
Expand All @@ -3675,6 +3687,9 @@
"com.amazonaws.ecr#ExpirationTimestamp": {
"type": "timestamp"
},
"com.amazonaws.ecr#ExploitAvailable": {
"type": "string"
},
"com.amazonaws.ecr#FilePath": {
"type": "string"
},
Expand Down Expand Up @@ -3737,6 +3752,12 @@
"target": "com.amazonaws.ecr#SeverityCount"
}
},
"com.amazonaws.ecr#FixAvailable": {
"type": "string"
},
"com.amazonaws.ecr#FixedInVersion": {
"type": "string"
},
"com.amazonaws.ecr#ForceFlag": {
"type": "boolean",
"traits": {
Expand Down Expand Up @@ -8639,6 +8660,12 @@
"traits": {
"smithy.api#documentation": "<p>The version of the vulnerable package.</p>"
}
},
"fixedInVersion": {
"target": "com.amazonaws.ecr#FixedInVersion",
"traits": {
"smithy.api#documentation": "<p>The version of the package that contains the vulnerability fix.</p>"
}
}
},
"traits": {
Expand Down
Loading

0 comments on commit 46a5659

Please sign in to comment.