Skip to content

Commit

Permalink
Merge branch 'release-1.35.60' into develop
Browse files Browse the repository at this point in the history
* release-1.35.60:
  Bumping version to 1.35.60
  Update endpoints model
  Update to latest models
  • Loading branch information
aws-sdk-python-automation committed Nov 13, 2024
2 parents 2e0c68c + 83045be commit 22693a8
Show file tree
Hide file tree
Showing 19 changed files with 1,134 additions and 45 deletions.
52 changes: 52 additions & 0 deletions .changes/1.35.60.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,52 @@
[
{
"category": "``accessanalyzer``",
"description": "This release adds support for policy validation and external access findings for resource control policies (RCP). IAM Access Analyzer helps you author functional and secure RCPs and awareness that a RCP may restrict external access. Updated service API, documentation, and paginators.",
"type": "api-change"
},
{
"category": "``application-signals``",
"description": "Amazon CloudWatch Application Signals now supports creating Service Level Objectives with burn rates. Users can now create or update SLOs with burn rate configurations to meet their specific business requirements.",
"type": "api-change"
},
{
"category": "``b2bi``",
"description": "This release adds a GenerateMapping API to allow generation of JSONata or XSLT transformer code based on input and output samples.",
"type": "api-change"
},
{
"category": "``billing``",
"description": "Today, AWS announces the general availability of ListBillingViews API in the AWS SDKs, to enable AWS Billing Conductor (ABC) users to create proforma Cost and Usage Reports (CUR) programmatically.",
"type": "api-change"
},
{
"category": "``cloudtrail``",
"description": "This release adds a new API GenerateQuery that generates a query from a natural language prompt about the event data in your event data store. This operation uses generative artificial intelligence (generative AI) to produce a ready-to-use SQL query from the prompt.",
"type": "api-change"
},
{
"category": "``dynamodb``",
"description": "This release includes supports the new WarmThroughput feature for DynamoDB. You can now provide an optional WarmThroughput attribute for CreateTable or UpdateTable APIs to pre-warm your table or global secondary index. You can also use DescribeTable to see the latest WarmThroughput value.",
"type": "api-change"
},
{
"category": "``ec2``",
"description": "This release adds the source AMI details in DescribeImages API",
"type": "api-change"
},
{
"category": "``internetmonitor``",
"description": "Add new query type Routing_Suggestions regarding querying interface",
"type": "api-change"
},
{
"category": "``mediaconvert``",
"description": "This release adds support for ARN inputs in the Kantar credentials secrets name field and the MSPR field to the manifests for PlayReady DRM protected outputs.",
"type": "api-change"
},
{
"category": "``organizations``",
"description": "Add support for policy operations on the Resource Control Polices.",
"type": "api-change"
}
]
15 changes: 15 additions & 0 deletions CHANGELOG.rst
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,21 @@
CHANGELOG
=========

1.35.60
=======

* api-change:``accessanalyzer``: This release adds support for policy validation and external access findings for resource control policies (RCP). IAM Access Analyzer helps you author functional and secure RCPs and awareness that a RCP may restrict external access. Updated service API, documentation, and paginators.
* api-change:``application-signals``: Amazon CloudWatch Application Signals now supports creating Service Level Objectives with burn rates. Users can now create or update SLOs with burn rate configurations to meet their specific business requirements.
* api-change:``b2bi``: This release adds a GenerateMapping API to allow generation of JSONata or XSLT transformer code based on input and output samples.
* api-change:``billing``: Today, AWS announces the general availability of ListBillingViews API in the AWS SDKs, to enable AWS Billing Conductor (ABC) users to create proforma Cost and Usage Reports (CUR) programmatically.
* api-change:``cloudtrail``: This release adds a new API GenerateQuery that generates a query from a natural language prompt about the event data in your event data store. This operation uses generative artificial intelligence (generative AI) to produce a ready-to-use SQL query from the prompt.
* api-change:``dynamodb``: This release includes supports the new WarmThroughput feature for DynamoDB. You can now provide an optional WarmThroughput attribute for CreateTable or UpdateTable APIs to pre-warm your table or global secondary index. You can also use DescribeTable to see the latest WarmThroughput value.
* api-change:``ec2``: This release adds the source AMI details in DescribeImages API
* api-change:``internetmonitor``: Add new query type Routing_Suggestions regarding querying interface
* api-change:``mediaconvert``: This release adds support for ARN inputs in the Kantar credentials secrets name field and the MSPR field to the manifests for PlayReady DRM protected outputs.
* api-change:``organizations``: Add support for policy operations on the Resource Control Polices.


1.35.59
=======

Expand Down
2 changes: 1 addition & 1 deletion botocore/__init__.py
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@
import os
import re

__version__ = '1.35.59'
__version__ = '1.35.60'


class NullHandler(logging.Handler):
Expand Down
34 changes: 30 additions & 4 deletions botocore/data/accessanalyzer/2019-11-01/service-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@
"version":"2.0",
"metadata":{
"apiVersion":"2019-11-01",
"auth":["aws.auth#sigv4"],
"endpointPrefix":"access-analyzer",
"protocol":"rest-json",
"protocols":["rest-json"],
Expand Down Expand Up @@ -660,7 +661,7 @@
},
"resources":{
"shape":"AccessResourcesList",
"documentation":"<p>A list of resources for the access permissions. Any strings that can be used as a resource in an IAM policy can be used in the list of resources to check.</p>"
"documentation":"<p>A list of resources for the access permissions. Any strings that can be used as an Amazon Resource Name (ARN) in an IAM policy can be used in the list of resources to check. You can only use a wildcard in the portion of the ARN that specifies the resource ID.</p>"
}
},
"documentation":"<p>Contains information about actions and resources that define permissions to check against a policy.</p>"
Expand Down Expand Up @@ -830,6 +831,10 @@
"sources":{
"shape":"FindingSourceList",
"documentation":"<p>The sources of the finding. This indicates how the access that generated the finding is granted. It is populated for Amazon S3 bucket findings.</p>"
},
"resourceControlPolicyRestriction":{
"shape":"ResourceControlPolicyRestriction",
"documentation":"<p>The type of restriction applied to the finding by the resource owner with an Organizations resource control policy (RCP).</p>"
}
},
"documentation":"<p>An access preview finding generated by the access preview.</p>"
Expand Down Expand Up @@ -1197,11 +1202,11 @@
},
"access":{
"shape":"CheckAccessNotGrantedRequestAccessList",
"documentation":"<p>An access object containing the permissions that shouldn't be granted by the specified policy. If only actions are specified, IAM Access Analyzer checks for access of the actions on all resources in the policy. If only resources are specified, then IAM Access Analyzer checks which actions have access to the specified resources. If both actions and resources are specified, then IAM Access Analyzer checks which of the specified actions have access to the specified resources.</p>"
"documentation":"<p>An access object containing the permissions that shouldn't be granted by the specified policy. If only actions are specified, IAM Access Analyzer checks for access to peform at least one of the actions on any resource in the policy. If only resources are specified, then IAM Access Analyzer checks for access to perform any action on at least one of the resources. If both actions and resources are specified, IAM Access Analyzer checks for access to perform at least one of the specified actions on at least one of the specified resources.</p>"
},
"policyType":{
"shape":"AccessCheckPolicyType",
"documentation":"<p>The type of policy. Identity policies grant permissions to IAM principals. Identity policies include managed and inline policies for IAM roles, users, and groups.</p> <p>Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust policies for IAM roles and bucket policies for Amazon S3 buckets. You can provide a generic input such as identity policy or resource policy or a specific input such as managed policy or Amazon S3 bucket policy.</p>"
"documentation":"<p>The type of policy. Identity policies grant permissions to IAM principals. Identity policies include managed and inline policies for IAM roles, users, and groups.</p> <p>Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust policies for IAM roles and bucket policies for Amazon S3 buckets.</p>"
}
}
},
Expand Down Expand Up @@ -1749,6 +1754,10 @@
"sources":{
"shape":"FindingSourceList",
"documentation":"<p>The sources of the external access finding. This indicates how the access that generated the finding is granted. It is populated for Amazon S3 bucket findings.</p>"
},
"resourceControlPolicyRestriction":{
"shape":"ResourceControlPolicyRestriction",
"documentation":"<p>The type of restriction applied to the finding by the resource owner with an Organizations resource control policy (RCP).</p>"
}
},
"documentation":"<p>Contains information about an external access finding.</p>"
Expand Down Expand Up @@ -1826,6 +1835,10 @@
"sources":{
"shape":"FindingSourceList",
"documentation":"<p>The sources of the finding. This indicates how the access that generated the finding is granted. It is populated for Amazon S3 bucket findings.</p>"
},
"resourceControlPolicyRestriction":{
"shape":"ResourceControlPolicyRestriction",
"documentation":"<p>The type of restriction applied to the finding by the resource owner with an Organizations resource control policy (RCP).</p>"
}
},
"documentation":"<p>Contains information about a finding.</p>"
Expand Down Expand Up @@ -1999,6 +2012,10 @@
"sources":{
"shape":"FindingSourceList",
"documentation":"<p>The sources of the finding. This indicates how the access that generated the finding is granted. It is populated for Amazon S3 bucket findings.</p>"
},
"resourceControlPolicyRestriction":{
"shape":"ResourceControlPolicyRestriction",
"documentation":"<p>The type of restriction applied to the finding by the resource owner with an Organizations resource control policy (RCP).</p>"
}
},
"documentation":"<p>Contains information about a finding.</p>"
Expand Down Expand Up @@ -3256,7 +3273,8 @@
"enum":[
"IDENTITY_POLICY",
"RESOURCE_POLICY",
"SERVICE_CONTROL_POLICY"
"SERVICE_CONTROL_POLICY",
"RESOURCE_CONTROL_POLICY"
]
},
"Position":{
Expand Down Expand Up @@ -3453,6 +3471,14 @@
"type":"string",
"pattern":"arn:[^:]*:[^:]*:[^:]*:[^:]*:.*"
},
"ResourceControlPolicyRestriction":{
"type":"string",
"enum":[
"APPLICABLE",
"FAILED_TO_EVALUATE_RCP",
"NOT_APPLICABLE"
]
},
"ResourceNotFoundException":{
"type":"structure",
"required":[
Expand Down
37 changes: 36 additions & 1 deletion botocore/data/application-signals/2024-04-15/service-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -342,6 +342,29 @@
"type":"integer",
"box":true
},
"BurnRateConfiguration":{
"type":"structure",
"required":["LookBackWindowMinutes"],
"members":{
"LookBackWindowMinutes":{
"shape":"BurnRateLookBackWindowMinutes",
"documentation":"<p>The number of minutes to use as the look-back window.</p>"
}
},
"documentation":"<p>This object defines the length of the look-back window used to calculate one burn rate metric for this SLO. The burn rate measures how fast the service is consuming the error budget, relative to the attainment goal of the SLO. A burn rate of exactly 1 indicates that the SLO goal will be met exactly.</p> <p>For example, if you specify 60 as the number of minutes in the look-back window, the burn rate is calculated as the following:</p> <p> <i>burn rate = error rate over the look-back window / (1 - attainment goal percentage)</i> </p> <p>For more information about burn rates, see <a href=\"https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch-ServiceLevelObjectives.html#CloudWatch-ServiceLevelObjectives-burn\">Calculate burn rates</a>.</p>"
},
"BurnRateConfigurations":{
"type":"list",
"member":{"shape":"BurnRateConfiguration"},
"max":10,
"min":0
},
"BurnRateLookBackWindowMinutes":{
"type":"integer",
"box":true,
"max":10080,
"min":1
},
"CalendarInterval":{
"type":"structure",
"required":[
Expand Down Expand Up @@ -410,6 +433,10 @@
"Tags":{
"shape":"TagList",
"documentation":"<p>A list of key-value pairs to associate with the SLO. You can associate as many as 50 tags with an SLO. To be able to associate tags with the SLO when you create the SLO, you must have the <code>cloudwatch:TagResource</code> permission.</p> <p>Tags can help you organize and categorize your resources. You can also use them to scope user permissions by granting a user permission to access or change only resources with certain tag values.</p>"
},
"BurnRateConfigurations":{
"shape":"BurnRateConfigurations",
"documentation":"<p>Use this array to create <i>burn rates</i> for this SLO. Each burn rate is a metric that indicates how fast the service is consuming the error budget, relative to the attainment goal of the SLO.</p>"
}
}
},
Expand Down Expand Up @@ -1535,7 +1562,11 @@
"shape":"EvaluationType",
"documentation":"<p>Displays whether this is a period-based SLO or a request-based SLO.</p>"
},
"Goal":{"shape":"Goal"}
"Goal":{"shape":"Goal"},
"BurnRateConfigurations":{
"shape":"BurnRateConfigurations",
"documentation":"<p>Each object in this array defines the length of the look-back window used to calculate one burn rate metric for this SLO. The burn rate measures how fast the service is consuming the error budget, relative to the attainment goal of the SLO.</p>"
}
},
"documentation":"<p>A structure containing information about one service level objective (SLO) that has been created in Application Signals. Creating SLOs can help you ensure your services are performing to the level that you expect. SLOs help you set and track a specific target level for the reliability and availability of your applications and services. Each SLO uses a service level indicator (SLI), which is a key performance metric, to calculate how much underperformance can be tolerated before the goal that you set for the SLO is not achieved.</p>"
},
Expand Down Expand Up @@ -1940,6 +1971,10 @@
"Goal":{
"shape":"Goal",
"documentation":"<p>A structure that contains the attributes that determine the goal of the SLO. This includes the time period for evaluation and the attainment threshold.</p>"
},
"BurnRateConfigurations":{
"shape":"BurnRateConfigurations",
"documentation":"<p>Use this array to create <i>burn rates</i> for this SLO. Each burn rate is a metric that indicates how fast the service is consuming the error budget, relative to the attainment goal of the SLO.</p>"
}
}
},
Expand Down
71 changes: 70 additions & 1 deletion botocore/data/b2bi/2022-06-23/service-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -184,6 +184,23 @@
"documentation":"<p>Deletes the specified transformer. A transformer can take an EDI file as input and transform it into a JSON-or XML-formatted document. Alternatively, a transformer can take a JSON-or XML-formatted document as input and transform it into an EDI file.</p>",
"idempotent":true
},
"GenerateMapping":{
"name":"GenerateMapping",
"http":{
"method":"POST",
"requestUri":"/"
},
"input":{"shape":"GenerateMappingRequest"},
"output":{"shape":"GenerateMappingResponse"},
"errors":[
{"shape":"AccessDeniedException"},
{"shape":"ValidationException"},
{"shape":"ThrottlingException"},
{"shape":"InternalServerException"}
],
"documentation":"<p>Takes sample input and output documents and uses Amazon Bedrock to generate a mapping automatically. Depending on the accuracy and other factors, you can then edit the mapping for your needs.</p> <note> <p>Before you can use the AI-assisted feature for Amazon Web Services B2B Data Interchange you must enable models in Amazon Bedrock. For details, see <a href=\"https://docs.aws.amazon.com/b2bi/latest/userguide/ai-assisted-mapping.html#ai-assist-prereq\">AI-assisted template mapping prerequisites</a> in the <i>Amazon Web Services B2B Data Interchange User guide</i>.</p> </note>",
"idempotent":true
},
"GetCapability":{
"name":"GetCapability",
"http":{
Expand Down Expand Up @@ -1248,6 +1265,58 @@
"type":"string",
"enum":["X12"]
},
"GenerateMappingInputFileContent":{
"type":"string",
"max":5000000,
"min":0
},
"GenerateMappingOutputFileContent":{
"type":"string",
"max":5000000,
"min":0
},
"GenerateMappingRequest":{
"type":"structure",
"required":[
"inputFileContent",
"outputFileContent",
"mappingType"
],
"members":{
"inputFileContent":{
"shape":"GenerateMappingInputFileContent",
"documentation":"<p>Provide the contents of a sample X12 EDI file (for inbound EDI) or JSON/XML file (for outbound EDI) to use as a starting point for the mapping.</p>"
},
"outputFileContent":{
"shape":"GenerateMappingOutputFileContent",
"documentation":"<p>Provide the contents of a sample X12 EDI file (for outbound EDI) or JSON/XML file (for inbound EDI) to use as a target for the mapping.</p>"
},
"mappingType":{
"shape":"MappingType",
"documentation":"<p>Specify the mapping type: either <code>JSONATA</code> or <code>XSLT.</code> </p>"
}
}
},
"GenerateMappingResponse":{
"type":"structure",
"required":["mappingTemplate"],
"members":{
"mappingTemplate":{
"shape":"String",
"documentation":"<p>Returns a mapping template based on your inputs.</p>"
},
"mappingAccuracy":{
"shape":"GenerateMappingResponseMappingAccuracyFloat",
"documentation":"<p>Returns a percentage that estimates the accuracy of the generated mapping.</p>"
}
}
},
"GenerateMappingResponseMappingAccuracyFloat":{
"type":"float",
"box":true,
"max":1.0,
"min":0.0
},
"GetCapabilityRequest":{
"type":"structure",
"required":["capabilityId"],
Expand Down Expand Up @@ -2646,7 +2715,7 @@
},
"status":{
"shape":"TransformerStatus",
"documentation":"<p>Specifies the transformer's status. You can update the state of the transformer, from <code>active</code> to <code>inactive</code>, or <code>inactive</code> to <code>active</code>.</p>"
"documentation":"<p>Specifies the transformer's status. You can update the state of the transformer from <code>inactive</code> to <code>active</code>.</p>"
},
"fileFormat":{
"shape":"FileFormat",
Expand Down
Loading

0 comments on commit 22693a8

Please sign in to comment.