Skip to content

Commit

Permalink
Release v1.44.206 (2023-02-21) (#4734)
Browse files Browse the repository at this point in the history
Release v1.44.206 (2023-02-21)
===

### Service Client Updates
* `service/quicksight`: Updates service API and documentation
  * S3 data sources now accept a custom IAM role.
* `service/resiliencehub`: Updates service API, documentation, and paginators
* `service/securityhub`: Updates service documentation
* `service/tnb`: Updates service API, documentation, paginators, and examples
  • Loading branch information
aws-sdk-go-automation committed Feb 21, 2023
1 parent 162792e commit 33b50e7
Show file tree
Hide file tree
Showing 33 changed files with 26,856 additions and 7,107 deletions.
10 changes: 10 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,13 @@
Release v1.44.206 (2023-02-21)
===

### Service Client Updates
* `service/quicksight`: Updates service API and documentation
* S3 data sources now accept a custom IAM role.
* `service/resiliencehub`: Updates service API, documentation, and paginators
* `service/securityhub`: Updates service documentation
* `service/tnb`: Updates service API, documentation, paginators, and examples

Release v1.44.205 (2023-02-20)
===

Expand Down
3 changes: 3 additions & 0 deletions aws/endpoints/defaults.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion aws/version.go
Original file line number Diff line number Diff line change
Expand Up @@ -5,4 +5,4 @@ package aws
const SDKName = "aws-sdk-go"

// SDKVersion is the version of this SDK
const SDKVersion = "1.44.205"
const SDKVersion = "1.44.206"
3 changes: 2 additions & 1 deletion models/apis/quicksight/2018-04-01/api-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -12323,7 +12323,8 @@
"type":"structure",
"required":["ManifestFileLocation"],
"members":{
"ManifestFileLocation":{"shape":"ManifestFileLocation"}
"ManifestFileLocation":{"shape":"ManifestFileLocation"},
"RoleArn":{"shape":"RoleArn"}
}
},
"S3Source":{
Expand Down
3 changes: 2 additions & 1 deletion models/apis/quicksight/2018-04-01/docs-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -6953,7 +6953,8 @@
"RoleArn": {
"base": null,
"refs": {
"AthenaParameters$RoleArn": "<p>Use the <code>RoleArn</code> structure to override an account-wide role for a specific Athena data source. For example, say an account administrator has turned off all Athena access with an account-wide role. The administrator can then use <code>RoleArn</code> to bypass the account-wide role and allow Athena access for the single Athena data source that is specified in the structure, even if the account-wide role forbidding Athena access is still active.</p>"
"AthenaParameters$RoleArn": "<p>Use the <code>RoleArn</code> structure to override an account-wide role for a specific Athena data source. For example, say an account administrator has turned off all Athena access with an account-wide role. The administrator can then use <code>RoleArn</code> to bypass the account-wide role and allow Athena access for the single Athena data source that is specified in the structure, even if the account-wide role forbidding Athena access is still active.</p>",
"S3Parameters$RoleArn": "<p>Use the <code>RoleArn</code> structure to override an account-wide role for a specific S3 data source. For example, say an account administrator has turned off all S3 access with an account-wide role. The administrator can then use <code>RoleArn</code> to bypass the account-wide role and allow S3 access for the single S3 data source that is specified in the structure, even if the account-wide role forbidding S3 access is still active.</p>"
}
},
"RoleName": {
Expand Down
380 changes: 203 additions & 177 deletions models/apis/quicksight/2018-04-01/endpoint-rule-set-1.json

Large diffs are not rendered by default.

0 comments on commit 33b50e7

Please sign in to comment.