Skip to content

Commit 349058b

Browse files
Update models for release
1 parent 99e13a3 commit 349058b

22 files changed

+120
-39
lines changed

.changes/3.306.2

+32
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
[
2+
{
3+
"type": "api-change",
4+
"category": "ECR",
5+
"description": "This release adds pull through cache rules support for GitLab container registry in Amazon ECR."
6+
},
7+
{
8+
"type": "api-change",
9+
"category": "CognitoIdentityProvider",
10+
"description": "Add EXTERNAL_PROVIDER enum value to UserStatusType."
11+
},
12+
{
13+
"type": "enhancement",
14+
"category": "FMS",
15+
"description": "The policy scope resource tag is always a string value, either a non-empty string or an empty string."
16+
},
17+
{
18+
"type": "api-change",
19+
"category": "EC2",
20+
"description": "Adding Precision Hardware Clock (PHC) to public API DescribeInstanceTypes"
21+
},
22+
{
23+
"type": "api-change",
24+
"category": "Polly",
25+
"description": "Add new engine - generative - that builds the most expressive conversational voices."
26+
},
27+
{
28+
"type": "api-change",
29+
"category": "SQS",
30+
"description": "This release adds MessageSystemAttributeNames to ReceiveMessageRequest to replace AttributeNames."
31+
}
32+
]

CHANGELOG.md

+9
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,14 @@
11
# CHANGELOG
22

3+
## next release
4+
5+
* `Aws\ECR` - This release adds pull through cache rules support for GitLab container registry in Amazon ECR.
6+
* `Aws\CognitoIdentityProvider` - Add EXTERNAL_PROVIDER enum value to UserStatusType.
7+
* `Aws\FMS` - The policy scope resource tag is always a string value, either a non-empty string or an empty string.
8+
* `Aws\EC2` - Adding Precision Hardware Clock (PHC) to public API DescribeInstanceTypes
9+
* `Aws\Polly` - Add new engine - generative - that builds the most expressive conversational voices.
10+
* `Aws\SQS` - This release adds MessageSystemAttributeNames to ReceiveMessageRequest to replace AttributeNames.
11+
312
## 3.306.1 - 2024-05-07
413

514
* `Aws\Budgets` - This release adds tag support for budgets and budget actions.

src/data/cognito-idp/2016-04-18/api-2.json

+3-1
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@
55
"endpointPrefix":"cognito-idp",
66
"jsonVersion":"1.1",
77
"protocol":"json",
8+
"protocols":["json"],
89
"serviceFullName":"Amazon Cognito Identity Provider",
910
"serviceId":"Cognito Identity Provider",
1011
"signatureVersion":"v4",
@@ -5698,7 +5699,8 @@
56985699
"COMPROMISED",
56995700
"UNKNOWN",
57005701
"RESET_REQUIRED",
5701-
"FORCE_CHANGE_PASSWORD"
5702+
"FORCE_CHANGE_PASSWORD",
5703+
"EXTERNAL_PROVIDER"
57025704
]
57035705
},
57045706
"UserType":{

src/data/cognito-idp/2016-04-18/api-2.json.php

+1-1
Large diffs are not rendered by default.

src/data/ec2/2016-11-15/api-2.json

+11
Original file line numberDiff line numberDiff line change
@@ -28829,6 +28829,10 @@
2882928829
"NeuronInfo":{
2883028830
"shape":"NeuronInfo",
2883128831
"locationName":"neuronInfo"
28832+
},
28833+
"PhcSupport":{
28834+
"shape":"PhcSupport",
28835+
"locationName":"phcSupport"
2883228836
}
2883328837
}
2883428838
},
@@ -36230,6 +36234,13 @@
3623036234
"Value":{"shape":"String"}
3623136235
}
3623236236
},
36237+
"PhcSupport":{
36238+
"type":"string",
36239+
"enum":[
36240+
"unsupported",
36241+
"supported"
36242+
]
36243+
},
3623336244
"Placement":{
3623436245
"type":"structure",
3623536246
"members":{

src/data/ec2/2016-11-15/api-2.json.php

+1-1
Large diffs are not rendered by default.

src/data/ec2/2016-11-15/docs-2.json

+6
Original file line numberDiff line numberDiff line change
@@ -16556,6 +16556,12 @@
1655616556
"Phase2IntegrityAlgorithmsRequestList$member": null
1655716557
}
1655816558
},
16559+
"PhcSupport": {
16560+
"base": null,
16561+
"refs": {
16562+
"InstanceTypeInfo$PhcSupport": "<p>Indicates whether a local Precision Time Protocol (PTP) hardware clock (PHC) is supported.</p>"
16563+
}
16564+
},
1655916565
"Placement": {
1656016566
"base": "<p>Describes the placement of an instance.</p>",
1656116567
"refs": {

src/data/ec2/2016-11-15/docs-2.json.php

+1-1
Large diffs are not rendered by default.

src/data/ecr/2015-09-21/api-2.json

+3-1
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@
55
"endpointPrefix":"api.ecr",
66
"jsonVersion":"1.1",
77
"protocol":"json",
8+
"protocols":["json"],
89
"serviceAbbreviation":"Amazon ECR",
910
"serviceFullName":"Amazon EC2 Container Registry",
1011
"serviceId":"ECR",
@@ -2598,7 +2599,8 @@
25982599
"k8s",
25992600
"docker-hub",
26002601
"github-container-registry",
2601-
"azure-container-registry"
2602+
"azure-container-registry",
2603+
"gitlab-container-registry"
26022604
]
26032605
},
26042606
"Url":{"type":"string"},

src/data/ecr/2015-09-21/api-2.json.php

+1-1
Large diffs are not rendered by default.

src/data/ecr/2015-09-21/docs-2.json

+1-1
Original file line numberDiff line numberDiff line change
@@ -2013,7 +2013,7 @@
20132013
"Url": {
20142014
"base": null,
20152015
"refs": {
2016-
"CreatePullThroughCacheRuleRequest$upstreamRegistryUrl": "<p>The registry URL of the upstream public registry to use as the source for the pull through cache rule. The following is the syntax to use for each supported upstream registry.</p> <ul> <li> <p>Amazon ECR Public (<code>ecr-public</code>) - <code>public.ecr.aws</code> </p> </li> <li> <p>Docker Hub (<code>docker-hub</code>) - <code>registry-1.docker.io</code> </p> </li> <li> <p>Quay (<code>quay</code>) - <code>quay.io</code> </p> </li> <li> <p>Kubernetes (<code>k8s</code>) - <code>registry.k8s.io</code> </p> </li> <li> <p>GitHub Container Registry (<code>github-container-registry</code>) - <code>ghcr.io</code> </p> </li> <li> <p>Microsoft Azure Container Registry (<code>azure-container-registry</code>) - <code>&lt;custom&gt;.azurecr.io</code> </p> </li> </ul>",
2016+
"CreatePullThroughCacheRuleRequest$upstreamRegistryUrl": "<p>The registry URL of the upstream public registry to use as the source for the pull through cache rule. The following is the syntax to use for each supported upstream registry.</p> <ul> <li> <p>Amazon ECR Public (<code>ecr-public</code>) - <code>public.ecr.aws</code> </p> </li> <li> <p>Docker Hub (<code>docker-hub</code>) - <code>registry-1.docker.io</code> </p> </li> <li> <p>Quay (<code>quay</code>) - <code>quay.io</code> </p> </li> <li> <p>Kubernetes (<code>k8s</code>) - <code>registry.k8s.io</code> </p> </li> <li> <p>GitHub Container Registry (<code>github-container-registry</code>) - <code>ghcr.io</code> </p> </li> <li> <p>Microsoft Azure Container Registry (<code>azure-container-registry</code>) - <code>&lt;custom&gt;.azurecr.io</code> </p> </li> <li> <p>GitLab Container Registry (<code>gitlab-container-registry</code>) - <code>registry.gitlab.com</code> </p> </li> </ul>",
20172017
"CreatePullThroughCacheRuleResponse$upstreamRegistryUrl": "<p>The upstream registry URL associated with the pull through cache rule.</p>",
20182018
"DeletePullThroughCacheRuleResponse$upstreamRegistryUrl": "<p>The upstream registry URL associated with the pull through cache rule.</p>",
20192019
"GetDownloadUrlForLayerResponse$downloadUrl": "<p>The pre-signed Amazon S3 download URL for the requested layer.</p>",

src/data/ecr/2015-09-21/docs-2.json.php

+1-1
Large diffs are not rendered by default.

src/data/fms/2018-01-01/docs-2.json

+6-6
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@
3939
"PutAdminAccount": "<p>Creates or updates an Firewall Manager administrator account. The account must be a member of the organization that was onboarded to Firewall Manager by <a>AssociateAdminAccount</a>. Only the organization's management account can create an Firewall Manager administrator account. When you create an Firewall Manager administrator account, the service checks to see if the account is already a delegated administrator within Organizations. If the account isn't a delegated administrator, Firewall Manager calls Organizations to delegate the account within Organizations. For more information about administrator accounts within Organizations, see <a href=\"https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts.html\">Managing the Amazon Web Services Accounts in Your Organization</a>.</p>",
4040
"PutAppsList": "<p>Creates an Firewall Manager applications list.</p>",
4141
"PutNotificationChannel": "<p>Designates the IAM role and Amazon Simple Notification Service (SNS) topic that Firewall Manager uses to record SNS logs.</p> <p>To perform this action outside of the console, you must first configure the SNS topic's access policy to allow the <code>SnsRoleName</code> to publish SNS logs. If the <code>SnsRoleName</code> provided is a role other than the <code>AWSServiceRoleForFMS</code> service-linked role, this role must have a trust relationship configured to allow the Firewall Manager service principal <code>fms.amazonaws.com</code> to assume this role. For information about configuring an SNS access policy, see <a href=\"https://docs.aws.amazon.com/waf/latest/developerguide/fms-security_iam_service-with-iam.html#fms-security_iam_service-with-iam-roles-service\">Service roles for Firewall Manager</a> in the <i>Firewall Manager Developer Guide</i>.</p>",
42-
"PutPolicy": "<p>Creates an Firewall Manager policy.</p> <p>A Firewall Manager policy is specific to the individual policy type. If you want to enforce multiple policy types across accounts, you can create multiple policies. You can create more than one policy for each type. </p> <p>If you add a new account to an organization that you created with Organizations, Firewall Manager automatically applies the policy to the resources in that account that are within scope of the policy. </p> <p>Firewall Manager provides the following types of policies: </p> <ul> <li> <p> <b>WAF policy</b> - This policy applies WAF web ACL protections to specified accounts and resources. </p> </li> <li> <p> <b>Shield Advanced policy</b> - This policy applies Shield Advanced protection to specified accounts and resources. </p> </li> <li> <p> <b>Security Groups policy</b> - This type of policy gives you control over security groups that are in use throughout your organization in Organizations and lets you enforce a baseline set of rules across your organization. </p> </li> <li> <p> <b>Network ACL policy</b> - This type of policy gives you control over the network ACLs that are in use throughout your organization in Organizations and lets you enforce a baseline set of first and last network ACL rules across your organization. </p> </li> <li> <p> <b>Network Firewall policy</b> - This policy applies Network Firewall protection to your organization's VPCs. </p> </li> <li> <p> <b>DNS Firewall policy</b> - This policy applies Amazon Route 53 Resolver DNS Firewall protections to your organization's VPCs. </p> </li> <li> <p> <b>Third-party firewall policy</b> - This policy applies third-party firewall protections. Third-party firewalls are available by subscription through the Amazon Web Services Marketplace console at <a href=\"https://aws.amazon.com/marketplace\">Amazon Web Services Marketplace</a>.</p> <ul> <li> <p> <b>Palo Alto Networks Cloud NGFW policy</b> - This policy applies Palo Alto Networks Cloud Next Generation Firewall (NGFW) protections and Palo Alto Networks Cloud NGFW rulestacks to your organization's VPCs.</p> </li> <li> <p> <b>Fortigate CNF policy</b> - This policy applies Fortigate Cloud Native Firewall (CNF) protections. Fortigate CNF is a cloud-centered solution that blocks Zero-Day threats and secures cloud infrastructures with industry-leading advanced threat prevention, smart web application firewalls (WAF), and API protection.</p> </li> </ul> </li> </ul>",
42+
"PutPolicy": "<p>Creates an Firewall Manager policy.</p> <p>A Firewall Manager policy is specific to the individual policy type. If you want to enforce multiple policy types across accounts, you can create multiple policies. You can create more than one policy for each type. </p> <p>If you add a new account to an organization that you created with Organizations, Firewall Manager automatically applies the policy to the resources in that account that are within scope of the policy. </p> <p>Firewall Manager provides the following types of policies: </p> <ul> <li> <p> <b>WAF policy</b> - This policy applies WAF web ACL protections to specified accounts and resources. </p> </li> <li> <p> <b>Shield Advanced policy</b> - This policy applies Shield Advanced protection to specified accounts and resources. </p> </li> <li> <p> <b>Security Groups policy</b> - This type of policy gives you control over security groups that are in use throughout your organization in Organizations and lets you enforce a baseline set of rules across your organization. </p> </li> <li> <p> <b>Network ACL policy</b> - This type of policy gives you control over the network ACLs that are in use throughout your organization in Organizations and lets you enforce a baseline set of first and last network ACL rules across your organization. </p> </li> <li> <p> <b>Network Firewall policy</b> - This policy applies Network Firewall protection to your organization's VPCs. </p> </li> <li> <p> <b>DNS Firewall policy</b> - This policy applies Amazon Route 53 Resolver DNS Firewall protections to your organization's VPCs. </p> </li> <li> <p> <b>Third-party firewall policy</b> - This policy applies third-party firewall protections. Third-party firewalls are available by subscription through the Amazon Web Services Marketplace console at <a href=\"http://aws.amazon.com/marketplace\">Amazon Web Services Marketplace</a>.</p> <ul> <li> <p> <b>Palo Alto Networks Cloud NGFW policy</b> - This policy applies Palo Alto Networks Cloud Next Generation Firewall (NGFW) protections and Palo Alto Networks Cloud NGFW rulestacks to your organization's VPCs.</p> </li> <li> <p> <b>Fortigate CNF policy</b> - This policy applies Fortigate Cloud Native Firewall (CNF) protections. Fortigate CNF is a cloud-centered solution that blocks Zero-Day threats and secures cloud infrastructures with industry-leading advanced threat prevention, smart web application firewalls (WAF), and API protection.</p> </li> </ul> </li> </ul>",
4343
"PutProtocolsList": "<p>Creates an Firewall Manager protocols list.</p>",
4444
"PutResourceSet": "<p>Creates the resource set.</p> <p>An Firewall Manager resource set defines the resources to import into an Firewall Manager policy from another Amazon Web Services service.</p>",
4545
"TagResource": "<p>Adds one or more tags to an Amazon Web Services resource.</p>",
@@ -297,8 +297,8 @@
297297
"base": null,
298298
"refs": {
299299
"NetworkAclEntry$Egress": "<p>Indicates whether the rule is an egress, or outbound, rule (applied to traffic leaving the subnet). If it's not an egress rule, then it's an ingress, or inbound, rule.</p>",
300-
"NetworkAclEntrySet$ForceRemediateForFirstEntries": "<p>Applies only when remediation is enabled for the policy as a whole. Firewall Manager uses this setting when it finds policy violations that involve conflicts between the custom entries and the policy entries. </p> <p>If forced remediation is disabled, Firewall Manager marks the network ACL as noncompliant and does not try to remediate. For more information about the remediation behavior, see <a href=\"https://docs.aws.amazon.com/waf/latest/developerguide/network-acl-policies.html\">Network access control list (ACL) policies</a> in the <i>Firewall Manager Developer Guide</i>.</p>",
301-
"NetworkAclEntrySet$ForceRemediateForLastEntries": "<p>Applies only when remediation is enabled for the policy as a whole. Firewall Manager uses this setting when it finds policy violations that involve conflicts between the custom entries and the policy entries. </p> <p>If forced remediation is disabled, Firewall Manager marks the network ACL as noncompliant and does not try to remediate. For more information about the remediation behavior, see <a href=\"https://docs.aws.amazon.com/waf/latest/developerguide/network-acl-policies.html\">Network access control list (ACL) policies</a> in the <i>Firewall Manager Developer Guide</i>.</p>"
300+
"NetworkAclEntrySet$ForceRemediateForFirstEntries": "<p>Applies only when remediation is enabled for the policy as a whole. Firewall Manager uses this setting when it finds policy violations that involve conflicts between the custom entries and the policy entries. </p> <p>If forced remediation is disabled, Firewall Manager marks the network ACL as noncompliant and does not try to remediate. For more information about the remediation behavior, see <a href=\"https://docs.aws.amazon.com/waf/latest/developerguide/network-acl-policies.html#network-acls-remediation\">Remediation for managed network ACLs</a> in the <i>Firewall Manager Developer Guide</i>.</p>",
301+
"NetworkAclEntrySet$ForceRemediateForLastEntries": "<p>Applies only when remediation is enabled for the policy as a whole. Firewall Manager uses this setting when it finds policy violations that involve conflicts between the custom entries and the policy entries. </p> <p>If forced remediation is disabled, Firewall Manager marks the network ACL as noncompliant and does not try to remediate. For more information about the remediation behavior, see <a href=\"https://docs.aws.amazon.com/waf/latest/developerguide/network-acl-policies.html#network-acls-remediation\">Remediation for managed network ACLs</a> in the <i>Firewall Manager Developer Guide</i>.</p>"
302302
}
303303
},
304304
"CIDR": {
@@ -1632,7 +1632,7 @@
16321632
"ResourceDescription": {
16331633
"base": null,
16341634
"refs": {
1635-
"Policy$PolicyDescription": "<p>The definition of the Network Firewall firewall policy.</p>"
1635+
"Policy$PolicyDescription": "<p>Your description of the Firewall Manager policy.</p>"
16361636
}
16371637
},
16381638
"ResourceId": {
@@ -1772,7 +1772,7 @@
17721772
}
17731773
},
17741774
"ResourceTag": {
1775-
"base": "<p>The resource tags that Firewall Manager uses to determine if a particular resource should be included or excluded from the Firewall Manager policy. Tags enable you to categorize your Amazon Web Services resources in different ways, for example, by purpose, owner, or environment. Each tag consists of a key and an optional value. Firewall Manager combines the tags with \"AND\" so that, if you add more than one tag to a policy scope, a resource must have all the specified tags to be included or excluded. For more information, see <a href=\"https://docs.aws.amazon.com/awsconsolehelpdocs/latest/gsg/tag-editor.html\">Working with Tag Editor</a>.</p>",
1775+
"base": "<p>The resource tags that Firewall Manager uses to determine if a particular resource should be included or excluded from the Firewall Manager policy. Tags enable you to categorize your Amazon Web Services resources in different ways, for example, by purpose, owner, or environment. Each tag consists of a key and an optional value. Firewall Manager combines the tags with \"AND\" so that, if you add more than one tag to a policy scope, a resource must have all the specified tags to be included or excluded. For more information, see <a href=\"https://docs.aws.amazon.com/awsconsolehelpdocs/latest/gsg/tag-editor.html\">Working with Tag Editor</a>.</p> <p>Every resource tag must have a string value, either a non-empty string or an empty string. If you don't provide a value for a resource tag, Firewall Manager saves the value as an empty string: \"\". When Firewall Manager compares tags, it only matches two tags if they have the same key and the same value. A tag with an empty string value only matches with tags that also have an empty string value. </p>",
17761776
"refs": {
17771777
"ResourceTags$member": null
17781778
}
@@ -1786,7 +1786,7 @@
17861786
"ResourceTagValue": {
17871787
"base": null,
17881788
"refs": {
1789-
"ResourceTag$Value": "<p>The resource tag value.</p>"
1789+
"ResourceTag$Value": "<p>The resource tag value. To specify an empty string value, either don't provide this or specify it as \"\". </p>"
17901790
}
17911791
},
17921792
"ResourceTags": {

src/data/fms/2018-01-01/docs-2.json.php

+1-1
Large diffs are not rendered by default.

src/data/polly/2016-06-10/api-2.json

+3-2
Original file line numberDiff line numberDiff line change
@@ -221,7 +221,8 @@
221221
"enum":[
222222
"standard",
223223
"neural",
224-
"long-form"
224+
"long-form",
225+
"generative"
225226
]
226227
},
227228
"EngineList":{
@@ -592,7 +593,7 @@
592593
"Size":{"type":"integer"},
593594
"SnsTopicArn":{
594595
"type":"string",
595-
"pattern":"^arn:aws(-(cn|iso(-b)?|us-gov))?:sns:[a-z0-9_-]{1,50}:\\d{12}:[a-zA-Z0-9_-]{1,256}$"
596+
"pattern":"^arn:aws(-(cn|iso(-b)?|us-gov))?:sns:[a-z0-9_-]{1,50}:\\d{12}:[a-zA-Z0-9_-]{1,251}([a-zA-Z0-9_-]{0,5}|\\.fifo)$"
596597
},
597598
"SpeechMarkType":{
598599
"type":"string",

src/data/polly/2016-06-10/api-2.json.php

+1-1
Large diffs are not rendered by default.

0 commit comments

Comments
 (0)