Skip to content

Commit

Permalink
Merge branch 'release-1.35.13' into develop
Browse files Browse the repository at this point in the history
* release-1.35.13:
  Bumping version to 1.35.13
  Update to latest models
  • Loading branch information
aws-sdk-python-automation committed Sep 5, 2024
2 parents 56a36ab + 628e576 commit e711fa6
Show file tree
Hide file tree
Showing 10 changed files with 357 additions and 64 deletions.
32 changes: 32 additions & 0 deletions .changes/1.35.13.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
[
{
"category": "``application-signals``",
"description": "Amazon CloudWatch Application Signals now supports creating Service Level Objectives using a new calculation type. Users can now create SLOs which are configured with request-based SLIs to help meet their specific business requirements.",
"type": "api-change"
},
{
"category": "``codepipeline``",
"description": "Updates to add recent notes to APIs and to replace example S3 bucket names globally.",
"type": "api-change"
},
{
"category": "``connect``",
"description": "Amazon Connect Custom Vocabulary now supports Catalan (Spain), Danish (Denmark), Dutch (Netherlands), Finnish (Finland), Indonesian (Indonesia), Malay (Malaysia), Norwegian Bokmal (Norway), Polish (Poland), Swedish (Sweden), and Tagalog/Filipino (Philippines).",
"type": "api-change"
},
{
"category": "``gamelift``",
"description": "Amazon GameLift provides additional events for tracking the fleet creation process.",
"type": "api-change"
},
{
"category": "``kinesisanalyticsv2``",
"description": "Support for Flink 1.20 in Managed Service for Apache Flink",
"type": "api-change"
},
{
"category": "``sagemaker``",
"description": "Amazon SageMaker now supports idle shutdown of JupyterLab and CodeEditor applications on SageMaker Studio.",
"type": "api-change"
}
]
11 changes: 11 additions & 0 deletions CHANGELOG.rst
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,17 @@
CHANGELOG
=========

1.35.13
=======

* api-change:``application-signals``: Amazon CloudWatch Application Signals now supports creating Service Level Objectives using a new calculation type. Users can now create SLOs which are configured with request-based SLIs to help meet their specific business requirements.
* api-change:``codepipeline``: Updates to add recent notes to APIs and to replace example S3 bucket names globally.
* api-change:``connect``: Amazon Connect Custom Vocabulary now supports Catalan (Spain), Danish (Denmark), Dutch (Netherlands), Finnish (Finland), Indonesian (Indonesia), Malay (Malaysia), Norwegian Bokmal (Norway), Polish (Poland), Swedish (Sweden), and Tagalog/Filipino (Philippines).
* api-change:``gamelift``: Amazon GameLift provides additional events for tracking the fleet creation process.
* api-change:``kinesisanalyticsv2``: Support for Flink 1.20 in Managed Service for Apache Flink
* api-change:``sagemaker``: Amazon SageMaker now supports idle shutdown of JupyterLab and CodeEditor applications on SageMaker Studio.


1.35.12
=======

Expand Down
2 changes: 1 addition & 1 deletion botocore/__init__.py
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@
import os
import re

__version__ = '1.35.12'
__version__ = '1.35.13'


class NullHandler(logging.Handler):
Expand Down
203 changes: 177 additions & 26 deletions botocore/data/application-signals/2024-04-15/service-2.json

Large diffs are not rendered by default.

12 changes: 6 additions & 6 deletions botocore/data/codepipeline/2015-07-09/service-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -372,7 +372,7 @@
{"shape":"ValidationException"},
{"shape":"InvalidNextTokenException"}
],
"documentation":"<p>Gets a listing of all the webhooks in this Amazon Web Services Region for this account. The output lists all webhooks and includes the webhook URL and ARN and the configuration for each webhook.</p>"
"documentation":"<p>Gets a listing of all the webhooks in this Amazon Web Services Region for this account. The output lists all webhooks and includes the webhook URL and ARN and the configuration for each webhook.</p> <note> <p>If a secret token was provided, it will be redacted in the response.</p> </note>"
},
"OverrideStageCondition":{
"name":"OverrideStageCondition",
Expand Down Expand Up @@ -532,7 +532,7 @@
{"shape":"InvalidTagsException"},
{"shape":"ConcurrentModificationException"}
],
"documentation":"<p>Defines a webhook and returns a unique webhook URL generated by CodePipeline. This URL can be supplied to third party source hosting providers to call every time there's a code change. When CodePipeline receives a POST request on this URL, the pipeline defined in the webhook is started as long as the POST request satisfied the authentication and filtering requirements supplied when defining the webhook. RegisterWebhookWithThirdParty and DeregisterWebhookWithThirdParty APIs can be used to automatically configure supported third parties to call the generated webhook URL.</p>"
"documentation":"<p>Defines a webhook and returns a unique webhook URL generated by CodePipeline. This URL can be supplied to third party source hosting providers to call every time there's a code change. When CodePipeline receives a POST request on this URL, the pipeline defined in the webhook is started as long as the POST request satisfied the authentication and filtering requirements supplied when defining the webhook. RegisterWebhookWithThirdParty and DeregisterWebhookWithThirdParty APIs can be used to automatically configure supported third parties to call the generated webhook URL.</p> <important> <p>When creating CodePipeline webhooks, do not use your own credentials or reuse the same secret token across multiple webhooks. For optimal security, generate a unique secret token for each webhook you create. The secret token is an arbitrary string that you provide, which GitHub uses to compute and sign the webhook payloads sent to CodePipeline, for protecting the integrity and authenticity of the webhook payloads. Using your own credentials or reusing the same token across multiple webhooks can lead to security vulnerabilities.</p> </important> <note> <p>If a secret token was provided, it will be redacted in the response.</p> </note>"
},
"RegisterWebhookWithThirdParty":{
"name":"RegisterWebhookWithThirdParty",
Expand Down Expand Up @@ -4647,15 +4647,15 @@
"members":{
"category":{
"shape":"RuleCategory",
"documentation":"<p>A category defines what kind of rule can be run in the stage, and constrains the provider type for the rule. Valid categories are limited to one of the following values. </p> <ul> <li> <p>INVOKE</p> </li> <li> <p>Approval</p> </li> <li> <p>Rule</p> </li> </ul>"
"documentation":"<p>A category defines what kind of rule can be run in the stage, and constrains the provider type for the rule. The valid category is <code>Rule</code>. </p>"
},
"owner":{
"shape":"RuleOwner",
"documentation":"<p>The creator of the rule being called. The valid value for the <code>Owner</code> field in the rule category is <code>AWS</code>. </p>"
},
"provider":{
"shape":"RuleProvider",
"documentation":"<p>The provider of the service being called by the rule. Valid providers are determined by the rulecategory. For example, a managed rule in the Rule category type has an owner of AWS, which would be specified as <code>AWS</code>.</p>"
"documentation":"<p>The rule provider, such as the <code>DeploymentWindow</code> rule.</p>"
},
"version":{
"shape":"Version",
Expand Down Expand Up @@ -5399,7 +5399,7 @@
},
"SecretToken":{
"shape":"WebhookAuthConfigurationSecretToken",
"documentation":"<p>The property used to configure GitHub authentication. For GITHUB_HMAC, only the <code>SecretToken</code> property must be set.</p>"
"documentation":"<p>The property used to configure GitHub authentication. For GITHUB_HMAC, only the <code>SecretToken</code> property must be set.</p> <important> <p>When creating CodePipeline webhooks, do not use your own credentials or reuse the same secret token across multiple webhooks. For optimal security, generate a unique secret token for each webhook you create. The secret token is an arbitrary string that you provide, which GitHub uses to compute and sign the webhook payloads sent to CodePipeline, for protecting the integrity and authenticity of the webhook payloads. Using your own credentials or reusing the same token across multiple webhooks can lead to security vulnerabilities.</p> </important> <note> <p>If a secret token was provided, it will be redacted in the response.</p> </note>"
}
},
"documentation":"<p>The authentication applied to incoming webhook trigger requests.</p>"
Expand Down Expand Up @@ -5451,7 +5451,7 @@
},
"authentication":{
"shape":"WebhookAuthenticationType",
"documentation":"<p>Supported options are GITHUB_HMAC, IP, and UNAUTHENTICATED.</p> <ul> <li> <p>For information about the authentication scheme implemented by GITHUB_HMAC, see <a href=\"https://developer.github.com/webhooks/securing/\">Securing your webhooks</a> on the GitHub Developer website.</p> </li> <li> <p> IP rejects webhooks trigger requests unless they originate from an IP address in the IP range whitelisted in the authentication configuration.</p> </li> <li> <p> UNAUTHENTICATED accepts all webhook trigger requests regardless of origin.</p> </li> </ul>"
"documentation":"<p>Supported options are GITHUB_HMAC, IP, and UNAUTHENTICATED.</p> <important> <p>When creating CodePipeline webhooks, do not use your own credentials or reuse the same secret token across multiple webhooks. For optimal security, generate a unique secret token for each webhook you create. The secret token is an arbitrary string that you provide, which GitHub uses to compute and sign the webhook payloads sent to CodePipeline, for protecting the integrity and authenticity of the webhook payloads. Using your own credentials or reusing the same token across multiple webhooks can lead to security vulnerabilities.</p> </important> <note> <p>If a secret token was provided, it will be redacted in the response.</p> </note> <ul> <li> <p>For information about the authentication scheme implemented by GITHUB_HMAC, see <a href=\"https://developer.github.com/webhooks/securing/\">Securing your webhooks</a> on the GitHub Developer website.</p> </li> <li> <p> IP rejects webhooks trigger requests unless they originate from an IP address in the IP range whitelisted in the authentication configuration.</p> </li> <li> <p> UNAUTHENTICATED accepts all webhook trigger requests regardless of origin.</p> </li> </ul>"
},
"authenticationConfiguration":{
"shape":"WebhookAuthConfiguration",
Expand Down
12 changes: 11 additions & 1 deletion botocore/data/connect/2017-08-08/service-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -23815,7 +23815,17 @@
"pt-PT",
"zh-CN",
"en-NZ",
"en-ZA"
"en-ZA",
"ca-ES",
"da-DK",
"fi-FI",
"id-ID",
"ms-MY",
"nl-NL",
"no-NO",
"pl-PL",
"sv-SE",
"tl-PH"
]
},
"VocabularyLastModifiedTime":{"type":"timestamp"},
Expand Down
Loading

0 comments on commit e711fa6

Please sign in to comment.