Skip to content

Commit

Permalink
Merge branch 'release-1.21.53'
Browse files Browse the repository at this point in the history
* release-1.21.53:
  Bumping version to 1.21.53
  Update to latest endpoints
  Update to latest models
  • Loading branch information
aws-sdk-python-automation committed Oct 1, 2021
2 parents 0079dd9 + ca0c726 commit 7735964
Show file tree
Hide file tree
Showing 8 changed files with 165 additions and 62 deletions.
17 changes: 17 additions & 0 deletions .changes/1.21.53.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
[
{
"category": "``synthetics``",
"description": "CloudWatch Synthetics now enables customers to choose a customer managed AWS KMS key or an Amazon S3-managed key instead of an AWS managed key (default) for the encryption of artifacts that the canary stores in Amazon S3. CloudWatch Synthetics also supports artifact S3 location updation now.",
"type": "api-change"
},
{
"category": "``ssm``",
"description": "When \"AutoApprovable\" is true for a Change Template, then specifying --auto-approve (boolean) in Start-Change-Request-Execution will create a change request that bypasses approver review. (except for change calendar restrictions)",
"type": "api-change"
},
{
"category": "``apprunner``",
"description": "This release contains several minor bug fixes.",
"type": "api-change"
}
]
8 changes: 8 additions & 0 deletions CHANGELOG.rst
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,14 @@
CHANGELOG
=========

1.21.53
=======

* api-change:``synthetics``: CloudWatch Synthetics now enables customers to choose a customer managed AWS KMS key or an Amazon S3-managed key instead of an AWS managed key (default) for the encryption of artifacts that the canary stores in Amazon S3. CloudWatch Synthetics also supports artifact S3 location updation now.
* api-change:``ssm``: When "AutoApprovable" is true for a Change Template, then specifying --auto-approve (boolean) in Start-Change-Request-Execution will create a change request that bypasses approver review. (except for change calendar restrictions)
* api-change:``apprunner``: This release contains several minor bug fixes.


1.21.52
=======

Expand Down
2 changes: 1 addition & 1 deletion botocore/__init__.py
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@
import re
import logging

__version__ = '1.21.52'
__version__ = '1.21.53'


class NullHandler(logging.Handler):
Expand Down
118 changes: 61 additions & 57 deletions botocore/data/apprunner/2020-05-15/service-2.json

Large diffs are not rendered by default.

7 changes: 7 additions & 0 deletions botocore/data/endpoints.json
Original file line number Diff line number Diff line change
Expand Up @@ -3875,6 +3875,7 @@
"endpoints" : {
"ap-northeast-1" : { },
"ap-northeast-2" : { },
"ap-south-1" : { },
"ap-southeast-1" : { },
"ap-southeast-2" : { },
"eu-central-1" : { },
Expand All @@ -3899,6 +3900,12 @@
},
"hostname" : "data.iotevents.ap-northeast-2.amazonaws.com"
},
"ap-south-1" : {
"credentialScope" : {
"region" : "ap-south-1"
},
"hostname" : "data.iotevents.ap-south-1.amazonaws.com"
},
"ap-southeast-1" : {
"credentialScope" : {
"region" : "ap-southeast-1"
Expand Down
10 changes: 7 additions & 3 deletions botocore/data/ssm/2014-11-06/service-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -2350,7 +2350,7 @@
},
"Targets":{
"shape":"Targets",
"documentation":"<p>The instances targeted by the request to create an association. </p>"
"documentation":"<p>The instances targeted by the request to create an association. You can target all instances in an Amazon Web Services account by specifying the <code>InstanceIds</code> key with a value of <code>*</code>.</p>"
},
"LastExecutionDate":{
"shape":"DateTime",
Expand Down Expand Up @@ -4373,7 +4373,7 @@
},
"Targets":{
"shape":"Targets",
"documentation":"<p>The targets for the association. You can target instances by using tags, Amazon Web Services resource groups, all instances in an Amazon Web Services account, or individual instance IDs. For more information about choosing targets for an association, see <a href=\"https://docs.aws.amazon.com/systems-manager/latest/userguide/systems-manager-state-manager-targets-and-rate-controls.html\">Using targets and rate controls with State Manager associations</a> in the <i>Amazon Web Services Systems Manager User Guide</i>.</p>"
"documentation":"<p>The targets for the association. You can target instances by using tags, Amazon Web Services resource groups, all instances in an Amazon Web Services account, or individual instance IDs. You can target all instances in an Amazon Web Services account by specifying the <code>InstanceIds</code> key with a value of <code>*</code>. For more information about choosing targets for an association, see <a href=\"https://docs.aws.amazon.com/systems-manager/latest/userguide/systems-manager-state-manager-targets-and-rate-controls.html\">Using targets and rate controls with State Manager associations</a> in the <i>Amazon Web Services Systems Manager User Guide</i>.</p>"
},
"ScheduleExpression":{
"shape":"ScheduleExpression",
Expand Down Expand Up @@ -13973,7 +13973,7 @@
"members":{
"OutputS3Region":{
"shape":"S3Region",
"documentation":"<p>(Deprecated) You can no longer specify this parameter. The system ignores it. Instead, Amazon Web Services Systems Manager automatically determines the Region of the S3 bucket.</p>"
"documentation":"<p>The Amazon Web Services Region of the S3 bucket.</p>"
},
"OutputS3BucketName":{
"shape":"S3BucketName",
Expand Down Expand Up @@ -14532,6 +14532,10 @@
"shape":"IdempotencyToken",
"documentation":"<p>The user-provided idempotency token. The token must be unique, is case insensitive, enforces the UUID format, and can't be reused.</p>"
},
"AutoApprove":{
"shape":"Boolean",
"documentation":"<p>Indicates whether the change request can be approved automatically without the need for manual approvals.</p> <p>If <code>AutoApprovable</code> is enabled in a change template, then setting <code>AutoApprove</code> to <code>true</code> in <code>StartChangeRequestExecution</code> creates a change request that bypasses approver review.</p> <note> <p>Change Calendar restrictions are not bypassed in this scenario. If the state of an associated calendar is <code>CLOSED</code>, change freeze approvers must still grant permission for this change request to run. If they don't, the change won't be processed until the calendar state is again <code>OPEN</code>. </p> </note>"
},
"Runbooks":{
"shape":"Runbooks",
"documentation":"<p>Information about the Automation runbooks that are run during the runbook workflow.</p> <note> <p>The Automation runbooks specified for the runbook workflow can't run until all required approvals for the change request have been received.</p> </note>"
Expand Down
63 changes: 63 additions & 0 deletions botocore/data/synthetics/2017-10-11/service-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -209,6 +209,26 @@
}
},
"shapes":{
"ArtifactConfigInput":{
"type":"structure",
"members":{
"S3Encryption":{
"shape":"S3EncryptionConfig",
"documentation":"<p>A structure that contains the configuration of the encryption-at-rest settings for artifacts that the canary uploads to Amazon S3. Artifact encryption functionality is available only for canaries that use Synthetics runtime version syn-nodejs-puppeteer-3.3 or later. For more information, see <a href=\"https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch_Synthetics_artifact_encryption.html\">Encrypting canary artifacts</a> </p>"
}
},
"documentation":"<p>A structure that contains the configuration for canary artifacts, including the encryption-at-rest settings for artifacts that the canary uploads to Amazon S3.</p>"
},
"ArtifactConfigOutput":{
"type":"structure",
"members":{
"S3Encryption":{
"shape":"S3EncryptionConfig",
"documentation":"<p>A structure that contains the configuration of encryption settings for canary artifacts that are stored in Amazon S3. </p>"
}
},
"documentation":"<p>A structure that contains the configuration for canary artifacts, including the encryption-at-rest settings for artifacts that the canary uploads to Amazon S3.</p>"
},
"BaseScreenshot":{
"type":"structure",
"required":["ScreenshotName"],
Expand Down Expand Up @@ -308,6 +328,10 @@
"Tags":{
"shape":"TagMap",
"documentation":"<p>The list of key-value pairs that are associated with the canary.</p>"
},
"ArtifactConfig":{
"shape":"ArtifactConfigOutput",
"documentation":"<p>A structure that contains the configuration for canary artifacts, including the encryption-at-rest settings for artifacts that the canary uploads to Amazon S3.</p>"
}
},
"documentation":"<p>This structure contains all information about one canary in your account.</p>"
Expand Down Expand Up @@ -646,6 +670,10 @@
"Tags":{
"shape":"TagMap",
"documentation":"<p>A list of key-value pairs to associate with the canary. You can associate as many as 50 tags with a canary.</p> <p>Tags can help you organize and categorize your resources. You can also use them to scope user permissions, by granting a user permission to access or change only the resources that have certain tag values.</p>"
},
"ArtifactConfig":{
"shape":"ArtifactConfigInput",
"documentation":"<p>A structure that contains the configuration for canary artifacts, including the encryption-at-rest settings for artifacts that the canary uploads to Amazon S3.</p>"
}
}
},
Expand Down Expand Up @@ -753,6 +781,13 @@
}
}
},
"EncryptionMode":{
"type":"string",
"enum":[
"SSE_S3",
"SSE_KMS"
]
},
"EnvironmentVariableName":{
"type":"string",
"pattern":"[a-zA-Z]([a-zA-Z0-9_])+"
Expand Down Expand Up @@ -833,6 +868,12 @@
"error":{"httpStatusCode":500},
"exception":true
},
"KmsKeyArn":{
"type":"string",
"max":2048,
"min":1,
"pattern":"arn:(aws[a-zA-Z-]*)?:kms:[a-z]{2}((-gov)|(-iso(b?)))?-[a-z]+-\\d{1}:\\d{12}:key/[\\w\\-\\/]+"
},
"ListTagsForResourceRequest":{
"type":"structure",
"required":["ResourceArn"],
Expand Down Expand Up @@ -926,6 +967,20 @@
"type":"list",
"member":{"shape":"RuntimeVersion"}
},
"S3EncryptionConfig":{
"type":"structure",
"members":{
"EncryptionMode":{
"shape":"EncryptionMode",
"documentation":"<p> The encryption method to use for artifacts created by this canary. Specify <code>SSE_S3</code> to use server-side encryption (SSE) with an Amazon S3-managed key. Specify <code>SSE-KMS</code> to use server-side encryption with a customer-managed KMS key.</p> <p>If you omit this parameter, an Amazon Web Services-managed KMS key is used. </p>"
},
"KmsKeyArn":{
"shape":"KmsKeyArn",
"documentation":"<p>The ARN of the customer-managed KMS key to use, if you specify <code>SSE-KMS</code> for <code>EncryptionMode</code> </p>"
}
},
"documentation":"<p>A structure that contains the configuration of encryption-at-rest settings for canary artifacts that the canary uploads to Amazon S3. </p> <p>For more information, see <a href=\"https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch_Synthetics_artifact_encryption.html\">Encrypting canary artifacts</a> </p>"
},
"SecurityGroupId":{"type":"string"},
"SecurityGroupIds":{
"type":"list",
Expand Down Expand Up @@ -1107,6 +1162,14 @@
"VisualReference":{
"shape":"VisualReferenceInput",
"documentation":"<p>Defines the screenshots to use as the baseline for comparisons during visual monitoring comparisons during future runs of this canary. If you omit this parameter, no changes are made to any baseline screenshots that the canary might be using already.</p> <p>Visual monitoring is supported only on canaries running the <b>syn-puppeteer-node-3.2</b> runtime or later. For more information, see <a href=\"https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch_Synthetics_Library_SyntheticsLogger_VisualTesting.html\"> Visual monitoring</a> and <a href=\"https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch_Synthetics_Canaries_Blueprints_VisualTesting.html\"> Visual monitoring blueprint</a> </p>"
},
"ArtifactS3Location":{
"shape":"String",
"documentation":"<p>The location in Amazon S3 where Synthetics stores artifacts from the test runs of this canary. Artifacts include the log file, screenshots, and HAR files. The name of the S3 bucket can't include a period (.).</p>"
},
"ArtifactConfig":{
"shape":"ArtifactConfigInput",
"documentation":"<p>A structure that contains the configuration for canary artifacts, including the encryption-at-rest settings for artifacts that the canary uploads to Amazon S3.</p>"
}
}
},
Expand Down
2 changes: 1 addition & 1 deletion docs/source/conf.py
Original file line number Diff line number Diff line change
Expand Up @@ -54,7 +54,7 @@
# The short X.Y version.
version = '1.21.'
# The full version, including alpha/beta/rc tags.
release = '1.21.52'
release = '1.21.53'

# The language for content autogenerated by Sphinx. Refer to documentation
# for a list of supported languages.
Expand Down

0 comments on commit 7735964

Please sign in to comment.