Skip to content

Commit

Permalink
Merge branch 'release-1.20.77' into develop
Browse files Browse the repository at this point in the history
* release-1.20.77:
  Bumping version to 1.20.77
  Update to latest endpoints
  Update to latest models
  • Loading branch information
aws-sdk-python-automation committed May 20, 2021
2 parents 4608608 + 32e6cb9 commit 8de26ad
Show file tree
Hide file tree
Showing 9 changed files with 501 additions and 5 deletions.
22 changes: 22 additions & 0 deletions .changes/1.20.77.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
[
{
"category": "``personalize``",
"description": "Added new API to stop a solution version creation that is pending or in progress for Amazon Personalize",
"type": "api-change"
},
{
"category": "``lexv2-models``",
"description": "Update lexv2-models client to latest version",
"type": "api-change"
},
{
"category": "``quicksight``",
"description": "Add ARN based Row Level Security support to CreateDataSet/UpdateDataSet APIs.",
"type": "api-change"
},
{
"category": "``iam``",
"description": "Documentation updates for AWS Identity and Access Management (IAM).",
"type": "api-change"
}
]
9 changes: 9 additions & 0 deletions CHANGELOG.rst
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,15 @@
CHANGELOG
=========

1.20.77
=======

* api-change:``personalize``: Added new API to stop a solution version creation that is pending or in progress for Amazon Personalize
* api-change:``lexv2-models``: Update lexv2-models client to latest version
* api-change:``quicksight``: Add ARN based Row Level Security support to CreateDataSet/UpdateDataSet APIs.
* api-change:``iam``: Documentation updates for AWS Identity and Access Management (IAM).


1.20.76
=======

Expand Down
2 changes: 1 addition & 1 deletion botocore/__init__.py
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@
import re
import logging

__version__ = '1.20.76'
__version__ = '1.20.77'


class NullHandler(logging.Handler):
Expand Down
9 changes: 9 additions & 0 deletions botocore/data/endpoints.json
Original file line number Diff line number Diff line change
Expand Up @@ -723,6 +723,15 @@
"us-west-2" : { }
}
},
"apprunner" : {
"endpoints" : {
"ap-northeast-1" : { },
"eu-west-1" : { },
"us-east-1" : { },
"us-east-2" : { },
"us-west-2" : { }
}
},
"appstream2" : {
"defaults" : {
"credentialScope" : {
Expand Down
2 changes: 1 addition & 1 deletion botocore/data/iam/2010-05-08/service-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -233,7 +233,7 @@
{"shape":"ConcurrentModificationException"},
{"shape":"ServiceFailureException"}
],
"documentation":"<p>Creates an IAM entity to describe an identity provider (IdP) that supports <a href=\"http://openid.net/connect/\">OpenID Connect (OIDC)</a>.</p> <p>The OIDC provider that you create with this operation can be used as a principal in a role's trust policy. Such a policy establishes a trust relationship between AWS and the OIDC provider.</p> <p>When you create the IAM OIDC provider, you specify the following:</p> <ul> <li> <p>The URL of the OIDC identity provider (IdP) to trust</p> </li> <li> <p>A list of client IDs (also known as audiences) that identify the application or applications that are allowed to authenticate using the OIDC provider</p> </li> <li> <p>A list of thumbprints of one or more server certificates that the IdP uses</p> </li> </ul> <p>You get all of this information from the OIDC IdP that you want to use to access AWS.</p> <note> <p>The trust for the OIDC provider is derived from the IAM provider that this operation creates. Therefore, it is best to limit access to the <a>CreateOpenIDConnectProvider</a> operation to highly privileged users.</p> </note>"
"documentation":"<p>Creates an IAM entity to describe an identity provider (IdP) that supports <a href=\"http://openid.net/connect/\">OpenID Connect (OIDC)</a>.</p> <p>The OIDC provider that you create with this operation can be used as a principal in a role's trust policy. Such a policy establishes a trust relationship between AWS and the OIDC provider.</p> <p>If you are using an OIDC identity provider from Google, Facebook, or Amazon Cognito, you don't need to create a separate IAM identity provider. These OIDC identity providers are already built-in to AWS and are available for your use. Instead, you can move directly to creating new roles using your identity provider. To learn more, see <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_oidc.html\">Creating a role for web identity or OpenID connect federation</a> in the <i>IAM User Guide</i>.</p> <p>When you create the IAM OIDC provider, you specify the following:</p> <ul> <li> <p>The URL of the OIDC identity provider (IdP) to trust</p> </li> <li> <p>A list of client IDs (also known as audiences) that identify the application or applications that are allowed to authenticate using the OIDC provider</p> </li> <li> <p>A list of thumbprints of one or more server certificates that the IdP uses</p> </li> </ul> <p>You get all of this information from the OIDC IdP that you want to use to access AWS.</p> <note> <p>The trust for the OIDC provider is derived from the IAM provider that this operation creates. Therefore, it is best to limit access to the <a>CreateOpenIDConnectProvider</a> operation to highly privileged users.</p> </note>"
},
"CreatePolicy":{
"name":"CreatePolicy",
Expand Down
Loading

0 comments on commit 8de26ad

Please sign in to comment.