Skip to content

Commit

Permalink
AWS SDK for Java 1.12.122
Browse files Browse the repository at this point in the history
  • Loading branch information
AWS committed Dec 1, 2021
1 parent da80f77 commit 29d9a0f
Show file tree
Hide file tree
Showing 1,768 changed files with 443,685 additions and 76,768 deletions.
65 changes: 65 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,68 @@
# __1.12.122__ __2021-12-01__
## __AWS Backup Gateway__
- ### Features
- Initial release of AWS Backup gateway which enables you to centralize and automate protection of on-premises VMware and VMware Cloud on AWS workloads using AWS Backup.

## __AWS Glue__
- ### Features
- Support for DataLake transactions

## __AWS IoT__
- ### Features
- Added the ability to enable/disable IoT Fleet Indexing for Device Defender and Named Shadow information, and search them through IoT Fleet Indexing APIs.

## __AWS IoT TwinMaker__
- ### Features
- AWS IoT TwinMaker makes it faster and easier to create, visualize and monitor digital twins of real-world systems like buildings, factories and industrial equipment to optimize operations. Learn more: https://docs.aws.amazon.com/iot-twinmaker/latest/apireference/Welcome.html (New Service) (Preview)

## __AWS Lake Formation__
- ### Features
- This release adds support for row and cell-based access control in Lake Formation. It also adds support for Lake Formation Governed Tables, which support ACID transactions and automatic storage optimizations.

## __AWS Outposts__
- ### Features
- This release adds the SupportedHardwareType parameter to CreateOutpost.

## __AWS Storage Gateway__
- ### Features
- Added gateway type VTL_SNOW. Added new SNOWBALL HostEnvironment for gateways running on a Snowball device. Added new field HostEnvironmentId to serve as an identifier for the HostEnvironment on which the gateway is running.

## __Access Analyzer__
- ### Features
- AWS IAM Access Analyzer now supports policy validation for resource policies attached to S3 buckets and access points. You can run additional policy checks by specifying the S3 resource type you want to attach to your resource policy.

## __Amazon Elastic Compute Cloud__
- ### Features
- This release adds support for Is4gen and Im4gn instances. This release also adds a new subnet attribute, enableLniAtDeviceIndex, to support local network interfaces, which are logical networking components that connect an EC2 instance to your on-premises network.

## __Amazon FSx__
- ### Features
- This release adds support for the FSx for OpenZFS file system type, FSx for Lustre file systems with the Persistent_2 deployment type, and FSx for Lustre file systems with Amazon S3 data repository associations and automatic export policies.

## __Amazon Import/Export Snowball__
- ### Features
- Tapeball is to integrate tape gateway onto snowball, it enables customer to transfer local data on the tape to snowball,and then ingest the data into tape gateway on the cloud.

## __Amazon Kinesis__
- ### Features
- Amazon Kinesis Data Streams now supports on demand streams.

## __Amazon Simple Storage Service__
- ### Features
- Introduce Amazon S3 Glacier Instant Retrieval storage class and a new setting in S3 Object Ownership to disable ACLs for bucket and the objects in it.

## __Amazon WorkSpaces Web__
- ### Features
- This is the initial SDK release for Amazon WorkSpaces Web. Amazon WorkSpaces Web is a low-cost, fully managed WorkSpace built to deliver secure web-based workloads and software-as-a-service (SaaS) application access to users within existing web browsers.

## __Managed Streaming for Kafka__
- ### Features
- This release adds three new V2 APIs. CreateClusterV2 for creating both provisioned and serverless clusters. DescribeClusterV2 for getting information about provisioned and serverless clusters and ListClustersV2 for listing all clusters (both provisioned and serverless) in your account.

## __Redshift Data API Service__
- ### Features
- Data API now supports serverless queries.

# __1.12.121__ __2021-11-29__
## __AWS Compute Optimizer__
- ### Features
Expand Down
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@ dependencies.
<dependency>
<groupId>com.amazonaws</groupId>
<artifactId>aws-java-sdk-bom</artifactId>
<version>1.12.121</version>
<version>1.12.122</version>
<type>pom</type>
<scope>import</scope>
</dependency>
Expand Down
2 changes: 1 addition & 1 deletion aws-java-sdk-accessanalyzer/pom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
<parent>
<groupId>com.amazonaws</groupId>
<artifactId>aws-java-sdk-pom</artifactId>
<version>1.12.122-SNAPSHOT</version>
<version>1.12.122</version>
</parent>
<groupId>com.amazonaws</groupId>
<artifactId>aws-java-sdk-accessanalyzer</artifactId>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -28,9 +28,9 @@
* policy, the access preview uses the existing policy for the secret. If the access preview is for a new resource and
* you do not specify the policy, the access preview assumes a secret without a policy. To propose deletion of an
* existing policy, you can specify an empty string. If the proposed configuration is for a new secret and you do not
* specify the KMS key ID, the access preview uses the default CMK of the Amazon Web Services account. If you specify an
* empty string for the KMS key ID, the access preview uses the default CMK of the Amazon Web Services account. For more
* information about secret policy limits, see <a
* specify the KMS key ID, the access preview uses the Amazon Web Services managed key <code>aws/secretsmanager</code>.
* If you specify an empty string for the KMS key ID, the access preview uses the Amazon Web Services managed key of the
* Amazon Web Services account. For more information about secret policy limits, see <a
* href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_limits.html">Quotas for Secrets
* Manager.</a>.
* </p>
Expand All @@ -43,7 +43,7 @@ public class SecretsManagerSecretConfiguration implements Serializable, Cloneabl

/**
* <p>
* The proposed ARN, key ID, or alias of the KMS customer master key (CMK).
* The proposed ARN, key ID, or alias of the KMS key.
* </p>
*/
private String kmsKeyId;
Expand All @@ -56,11 +56,11 @@ public class SecretsManagerSecretConfiguration implements Serializable, Cloneabl

/**
* <p>
* The proposed ARN, key ID, or alias of the KMS customer master key (CMK).
* The proposed ARN, key ID, or alias of the KMS key.
* </p>
*
* @param kmsKeyId
* The proposed ARN, key ID, or alias of the KMS customer master key (CMK).
* The proposed ARN, key ID, or alias of the KMS key.
*/

public void setKmsKeyId(String kmsKeyId) {
Expand All @@ -69,10 +69,10 @@ public void setKmsKeyId(String kmsKeyId) {

/**
* <p>
* The proposed ARN, key ID, or alias of the KMS customer master key (CMK).
* The proposed ARN, key ID, or alias of the KMS key.
* </p>
*
* @return The proposed ARN, key ID, or alias of the KMS customer master key (CMK).
* @return The proposed ARN, key ID, or alias of the KMS key.
*/

public String getKmsKeyId() {
Expand All @@ -81,11 +81,11 @@ public String getKmsKeyId() {

/**
* <p>
* The proposed ARN, key ID, or alias of the KMS customer master key (CMK).
* The proposed ARN, key ID, or alias of the KMS key.
* </p>
*
* @param kmsKeyId
* The proposed ARN, key ID, or alias of the KMS customer master key (CMK).
* The proposed ARN, key ID, or alias of the KMS key.
* @return Returns a reference to this object so that method calls can be chained together.
*/

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -62,6 +62,20 @@ public class ValidatePolicyRequest extends com.amazonaws.AmazonWebServiceRequest
* </p>
*/
private String policyType;
/**
* <p>
* The type of resource to attach to your resource policy. Specify a value for the policy validation resource type
* only if the policy type is <code>RESOURCE_POLICY</code>. For example, to validate a resource policy to attach to
* an Amazon S3 bucket, you can choose <code>AWS::S3::Bucket</code> for the policy validation resource type.
* </p>
* <p>
* For resource types not supported as valid values, IAM Access Analyzer runs policy checks that apply to all
* resource policies. For example, to validate a resource policy to attach to a KMS key, do not specify a value for
* the policy validation resource type and IAM Access Analyzer will run policy checks that apply to all resource
* policies.
* </p>
*/
private String validatePolicyResourceType;

/**
* <p>
Expand Down Expand Up @@ -357,6 +371,129 @@ public ValidatePolicyRequest withPolicyType(PolicyType policyType) {
return this;
}

/**
* <p>
* The type of resource to attach to your resource policy. Specify a value for the policy validation resource type
* only if the policy type is <code>RESOURCE_POLICY</code>. For example, to validate a resource policy to attach to
* an Amazon S3 bucket, you can choose <code>AWS::S3::Bucket</code> for the policy validation resource type.
* </p>
* <p>
* For resource types not supported as valid values, IAM Access Analyzer runs policy checks that apply to all
* resource policies. For example, to validate a resource policy to attach to a KMS key, do not specify a value for
* the policy validation resource type and IAM Access Analyzer will run policy checks that apply to all resource
* policies.
* </p>
*
* @param validatePolicyResourceType
* The type of resource to attach to your resource policy. Specify a value for the policy validation resource
* type only if the policy type is <code>RESOURCE_POLICY</code>. For example, to validate a resource policy
* to attach to an Amazon S3 bucket, you can choose <code>AWS::S3::Bucket</code> for the policy validation
* resource type.</p>
* <p>
* For resource types not supported as valid values, IAM Access Analyzer runs policy checks that apply to all
* resource policies. For example, to validate a resource policy to attach to a KMS key, do not specify a
* value for the policy validation resource type and IAM Access Analyzer will run policy checks that apply to
* all resource policies.
* @see ValidatePolicyResourceType
*/

public void setValidatePolicyResourceType(String validatePolicyResourceType) {
this.validatePolicyResourceType = validatePolicyResourceType;
}

/**
* <p>
* The type of resource to attach to your resource policy. Specify a value for the policy validation resource type
* only if the policy type is <code>RESOURCE_POLICY</code>. For example, to validate a resource policy to attach to
* an Amazon S3 bucket, you can choose <code>AWS::S3::Bucket</code> for the policy validation resource type.
* </p>
* <p>
* For resource types not supported as valid values, IAM Access Analyzer runs policy checks that apply to all
* resource policies. For example, to validate a resource policy to attach to a KMS key, do not specify a value for
* the policy validation resource type and IAM Access Analyzer will run policy checks that apply to all resource
* policies.
* </p>
*
* @return The type of resource to attach to your resource policy. Specify a value for the policy validation
* resource type only if the policy type is <code>RESOURCE_POLICY</code>. For example, to validate a
* resource policy to attach to an Amazon S3 bucket, you can choose <code>AWS::S3::Bucket</code> for the
* policy validation resource type.</p>
* <p>
* For resource types not supported as valid values, IAM Access Analyzer runs policy checks that apply to
* all resource policies. For example, to validate a resource policy to attach to a KMS key, do not specify
* a value for the policy validation resource type and IAM Access Analyzer will run policy checks that apply
* to all resource policies.
* @see ValidatePolicyResourceType
*/

public String getValidatePolicyResourceType() {
return this.validatePolicyResourceType;
}

/**
* <p>
* The type of resource to attach to your resource policy. Specify a value for the policy validation resource type
* only if the policy type is <code>RESOURCE_POLICY</code>. For example, to validate a resource policy to attach to
* an Amazon S3 bucket, you can choose <code>AWS::S3::Bucket</code> for the policy validation resource type.
* </p>
* <p>
* For resource types not supported as valid values, IAM Access Analyzer runs policy checks that apply to all
* resource policies. For example, to validate a resource policy to attach to a KMS key, do not specify a value for
* the policy validation resource type and IAM Access Analyzer will run policy checks that apply to all resource
* policies.
* </p>
*
* @param validatePolicyResourceType
* The type of resource to attach to your resource policy. Specify a value for the policy validation resource
* type only if the policy type is <code>RESOURCE_POLICY</code>. For example, to validate a resource policy
* to attach to an Amazon S3 bucket, you can choose <code>AWS::S3::Bucket</code> for the policy validation
* resource type.</p>
* <p>
* For resource types not supported as valid values, IAM Access Analyzer runs policy checks that apply to all
* resource policies. For example, to validate a resource policy to attach to a KMS key, do not specify a
* value for the policy validation resource type and IAM Access Analyzer will run policy checks that apply to
* all resource policies.
* @return Returns a reference to this object so that method calls can be chained together.
* @see ValidatePolicyResourceType
*/

public ValidatePolicyRequest withValidatePolicyResourceType(String validatePolicyResourceType) {
setValidatePolicyResourceType(validatePolicyResourceType);
return this;
}

/**
* <p>
* The type of resource to attach to your resource policy. Specify a value for the policy validation resource type
* only if the policy type is <code>RESOURCE_POLICY</code>. For example, to validate a resource policy to attach to
* an Amazon S3 bucket, you can choose <code>AWS::S3::Bucket</code> for the policy validation resource type.
* </p>
* <p>
* For resource types not supported as valid values, IAM Access Analyzer runs policy checks that apply to all
* resource policies. For example, to validate a resource policy to attach to a KMS key, do not specify a value for
* the policy validation resource type and IAM Access Analyzer will run policy checks that apply to all resource
* policies.
* </p>
*
* @param validatePolicyResourceType
* The type of resource to attach to your resource policy. Specify a value for the policy validation resource
* type only if the policy type is <code>RESOURCE_POLICY</code>. For example, to validate a resource policy
* to attach to an Amazon S3 bucket, you can choose <code>AWS::S3::Bucket</code> for the policy validation
* resource type.</p>
* <p>
* For resource types not supported as valid values, IAM Access Analyzer runs policy checks that apply to all
* resource policies. For example, to validate a resource policy to attach to a KMS key, do not specify a
* value for the policy validation resource type and IAM Access Analyzer will run policy checks that apply to
* all resource policies.
* @return Returns a reference to this object so that method calls can be chained together.
* @see ValidatePolicyResourceType
*/

public ValidatePolicyRequest withValidatePolicyResourceType(ValidatePolicyResourceType validatePolicyResourceType) {
this.validatePolicyResourceType = validatePolicyResourceType.toString();
return this;
}

/**
* Returns a string representation of this object. This is useful for testing and debugging. Sensitive data will be
* redacted from this string using a placeholder value.
Expand All @@ -378,7 +515,9 @@ public String toString() {
if (getPolicyDocument() != null)
sb.append("PolicyDocument: ").append(getPolicyDocument()).append(",");
if (getPolicyType() != null)
sb.append("PolicyType: ").append(getPolicyType());
sb.append("PolicyType: ").append(getPolicyType()).append(",");
if (getValidatePolicyResourceType() != null)
sb.append("ValidatePolicyResourceType: ").append(getValidatePolicyResourceType());
sb.append("}");
return sb.toString();
}
Expand Down Expand Up @@ -413,6 +552,10 @@ public boolean equals(Object obj) {
return false;
if (other.getPolicyType() != null && other.getPolicyType().equals(this.getPolicyType()) == false)
return false;
if (other.getValidatePolicyResourceType() == null ^ this.getValidatePolicyResourceType() == null)
return false;
if (other.getValidatePolicyResourceType() != null && other.getValidatePolicyResourceType().equals(this.getValidatePolicyResourceType()) == false)
return false;
return true;
}

Expand All @@ -426,6 +569,7 @@ public int hashCode() {
hashCode = prime * hashCode + ((getNextToken() == null) ? 0 : getNextToken().hashCode());
hashCode = prime * hashCode + ((getPolicyDocument() == null) ? 0 : getPolicyDocument().hashCode());
hashCode = prime * hashCode + ((getPolicyType() == null) ? 0 : getPolicyType().hashCode());
hashCode = prime * hashCode + ((getValidatePolicyResourceType() == null) ? 0 : getValidatePolicyResourceType().hashCode());
return hashCode;
}

Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,62 @@
/*
* Copyright 2016-2021 Amazon.com, Inc. or its affiliates. All Rights Reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance with
* the License. A copy of the License is located at
*
* http://aws.amazon.com/apache2.0
*
* or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
* CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions
* and limitations under the License.
*/
package com.amazonaws.services.accessanalyzer.model;

import javax.annotation.Generated;

/**
*
*/
@Generated("com.amazonaws:aws-java-sdk-code-generator")
public enum ValidatePolicyResourceType {

AWSS3Bucket("AWS::S3::Bucket"),
AWSS3AccessPoint("AWS::S3::AccessPoint"),
AWSS3MultiRegionAccessPoint("AWS::S3::MultiRegionAccessPoint"),
AWSS3ObjectLambdaAccessPoint("AWS::S3ObjectLambda::AccessPoint");

private String value;

private ValidatePolicyResourceType(String value) {
this.value = value;
}

@Override
public String toString() {
return this.value;
}

/**
* Use this in place of valueOf.
*
* @param value
* real value
* @return ValidatePolicyResourceType corresponding to the value
*
* @throws IllegalArgumentException
* If the specified value does not map to one of the known values in this enum.
*/
public static ValidatePolicyResourceType fromValue(String value) {
if (value == null || "".equals(value)) {
throw new IllegalArgumentException("Value cannot be null or empty!");
}

for (ValidatePolicyResourceType enumEntry : ValidatePolicyResourceType.values()) {
if (enumEntry.toString().equals(value)) {
return enumEntry;
}
}

throw new IllegalArgumentException("Cannot create enum from " + value + " value!");
}
}
Loading

0 comments on commit 29d9a0f

Please sign in to comment.