Skip to content

Commit 29d9a0f

Browse files
author
AWS
committed
AWS SDK for Java 1.12.122
1 parent da80f77 commit 29d9a0f

File tree

1,768 files changed

+443685
-76768
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,768 files changed

+443685
-76768
lines changed

CHANGELOG.md

+65
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,68 @@
1+
# __1.12.122__ __2021-12-01__
2+
## __AWS Backup Gateway__
3+
- ### Features
4+
- Initial release of AWS Backup gateway which enables you to centralize and automate protection of on-premises VMware and VMware Cloud on AWS workloads using AWS Backup.
5+
6+
## __AWS Glue__
7+
- ### Features
8+
- Support for DataLake transactions
9+
10+
## __AWS IoT__
11+
- ### Features
12+
- Added the ability to enable/disable IoT Fleet Indexing for Device Defender and Named Shadow information, and search them through IoT Fleet Indexing APIs.
13+
14+
## __AWS IoT TwinMaker__
15+
- ### Features
16+
- AWS IoT TwinMaker makes it faster and easier to create, visualize and monitor digital twins of real-world systems like buildings, factories and industrial equipment to optimize operations. Learn more: https://docs.aws.amazon.com/iot-twinmaker/latest/apireference/Welcome.html (New Service) (Preview)
17+
18+
## __AWS Lake Formation__
19+
- ### Features
20+
- This release adds support for row and cell-based access control in Lake Formation. It also adds support for Lake Formation Governed Tables, which support ACID transactions and automatic storage optimizations.
21+
22+
## __AWS Outposts__
23+
- ### Features
24+
- This release adds the SupportedHardwareType parameter to CreateOutpost.
25+
26+
## __AWS Storage Gateway__
27+
- ### Features
28+
- Added gateway type VTL_SNOW. Added new SNOWBALL HostEnvironment for gateways running on a Snowball device. Added new field HostEnvironmentId to serve as an identifier for the HostEnvironment on which the gateway is running.
29+
30+
## __Access Analyzer__
31+
- ### Features
32+
- AWS IAM Access Analyzer now supports policy validation for resource policies attached to S3 buckets and access points. You can run additional policy checks by specifying the S3 resource type you want to attach to your resource policy.
33+
34+
## __Amazon Elastic Compute Cloud__
35+
- ### Features
36+
- This release adds support for Is4gen and Im4gn instances. This release also adds a new subnet attribute, enableLniAtDeviceIndex, to support local network interfaces, which are logical networking components that connect an EC2 instance to your on-premises network.
37+
38+
## __Amazon FSx__
39+
- ### Features
40+
- This release adds support for the FSx for OpenZFS file system type, FSx for Lustre file systems with the Persistent_2 deployment type, and FSx for Lustre file systems with Amazon S3 data repository associations and automatic export policies.
41+
42+
## __Amazon Import/Export Snowball__
43+
- ### Features
44+
- Tapeball is to integrate tape gateway onto snowball, it enables customer to transfer local data on the tape to snowball,and then ingest the data into tape gateway on the cloud.
45+
46+
## __Amazon Kinesis__
47+
- ### Features
48+
- Amazon Kinesis Data Streams now supports on demand streams.
49+
50+
## __Amazon Simple Storage Service__
51+
- ### Features
52+
- Introduce Amazon S3 Glacier Instant Retrieval storage class and a new setting in S3 Object Ownership to disable ACLs for bucket and the objects in it.
53+
54+
## __Amazon WorkSpaces Web__
55+
- ### Features
56+
- This is the initial SDK release for Amazon WorkSpaces Web. Amazon WorkSpaces Web is a low-cost, fully managed WorkSpace built to deliver secure web-based workloads and software-as-a-service (SaaS) application access to users within existing web browsers.
57+
58+
## __Managed Streaming for Kafka__
59+
- ### Features
60+
- This release adds three new V2 APIs. CreateClusterV2 for creating both provisioned and serverless clusters. DescribeClusterV2 for getting information about provisioned and serverless clusters and ListClustersV2 for listing all clusters (both provisioned and serverless) in your account.
61+
62+
## __Redshift Data API Service__
63+
- ### Features
64+
- Data API now supports serverless queries.
65+
166
# __1.12.121__ __2021-11-29__
267
## __AWS Compute Optimizer__
368
- ### Features

README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ dependencies.
5151
<dependency>
5252
<groupId>com.amazonaws</groupId>
5353
<artifactId>aws-java-sdk-bom</artifactId>
54-
<version>1.12.121</version>
54+
<version>1.12.122</version>
5555
<type>pom</type>
5656
<scope>import</scope>
5757
</dependency>

aws-java-sdk-accessanalyzer/pom.xml

+1-1
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
<parent>
66
<groupId>com.amazonaws</groupId>
77
<artifactId>aws-java-sdk-pom</artifactId>
8-
<version>1.12.122-SNAPSHOT</version>
8+
<version>1.12.122</version>
99
</parent>
1010
<groupId>com.amazonaws</groupId>
1111
<artifactId>aws-java-sdk-accessanalyzer</artifactId>

aws-java-sdk-accessanalyzer/src/main/java/com/amazonaws/services/accessanalyzer/model/SecretsManagerSecretConfiguration.java

+10-10
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,9 @@
2828
* policy, the access preview uses the existing policy for the secret. If the access preview is for a new resource and
2929
* you do not specify the policy, the access preview assumes a secret without a policy. To propose deletion of an
3030
* existing policy, you can specify an empty string. If the proposed configuration is for a new secret and you do not
31-
* specify the KMS key ID, the access preview uses the default CMK of the Amazon Web Services account. If you specify an
32-
* empty string for the KMS key ID, the access preview uses the default CMK of the Amazon Web Services account. For more
33-
* information about secret policy limits, see <a
31+
* specify the KMS key ID, the access preview uses the Amazon Web Services managed key <code>aws/secretsmanager</code>.
32+
* If you specify an empty string for the KMS key ID, the access preview uses the Amazon Web Services managed key of the
33+
* Amazon Web Services account. For more information about secret policy limits, see <a
3434
* href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_limits.html">Quotas for Secrets
3535
* Manager.</a>.
3636
* </p>
@@ -43,7 +43,7 @@ public class SecretsManagerSecretConfiguration implements Serializable, Cloneabl
4343

4444
/**
4545
* <p>
46-
* The proposed ARN, key ID, or alias of the KMS customer master key (CMK).
46+
* The proposed ARN, key ID, or alias of the KMS key.
4747
* </p>
4848
*/
4949
private String kmsKeyId;
@@ -56,11 +56,11 @@ public class SecretsManagerSecretConfiguration implements Serializable, Cloneabl
5656

5757
/**
5858
* <p>
59-
* The proposed ARN, key ID, or alias of the KMS customer master key (CMK).
59+
* The proposed ARN, key ID, or alias of the KMS key.
6060
* </p>
6161
*
6262
* @param kmsKeyId
63-
* The proposed ARN, key ID, or alias of the KMS customer master key (CMK).
63+
* The proposed ARN, key ID, or alias of the KMS key.
6464
*/
6565

6666
public void setKmsKeyId(String kmsKeyId) {
@@ -69,10 +69,10 @@ public void setKmsKeyId(String kmsKeyId) {
6969

7070
/**
7171
* <p>
72-
* The proposed ARN, key ID, or alias of the KMS customer master key (CMK).
72+
* The proposed ARN, key ID, or alias of the KMS key.
7373
* </p>
7474
*
75-
* @return The proposed ARN, key ID, or alias of the KMS customer master key (CMK).
75+
* @return The proposed ARN, key ID, or alias of the KMS key.
7676
*/
7777

7878
public String getKmsKeyId() {
@@ -81,11 +81,11 @@ public String getKmsKeyId() {
8181

8282
/**
8383
* <p>
84-
* The proposed ARN, key ID, or alias of the KMS customer master key (CMK).
84+
* The proposed ARN, key ID, or alias of the KMS key.
8585
* </p>
8686
*
8787
* @param kmsKeyId
88-
* The proposed ARN, key ID, or alias of the KMS customer master key (CMK).
88+
* The proposed ARN, key ID, or alias of the KMS key.
8989
* @return Returns a reference to this object so that method calls can be chained together.
9090
*/
9191

aws-java-sdk-accessanalyzer/src/main/java/com/amazonaws/services/accessanalyzer/model/ValidatePolicyRequest.java

+145-1
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,20 @@ public class ValidatePolicyRequest extends com.amazonaws.AmazonWebServiceRequest
6262
* </p>
6363
*/
6464
private String policyType;
65+
/**
66+
* <p>
67+
* The type of resource to attach to your resource policy. Specify a value for the policy validation resource type
68+
* only if the policy type is <code>RESOURCE_POLICY</code>. For example, to validate a resource policy to attach to
69+
* an Amazon S3 bucket, you can choose <code>AWS::S3::Bucket</code> for the policy validation resource type.
70+
* </p>
71+
* <p>
72+
* For resource types not supported as valid values, IAM Access Analyzer runs policy checks that apply to all
73+
* resource policies. For example, to validate a resource policy to attach to a KMS key, do not specify a value for
74+
* the policy validation resource type and IAM Access Analyzer will run policy checks that apply to all resource
75+
* policies.
76+
* </p>
77+
*/
78+
private String validatePolicyResourceType;
6579

6680
/**
6781
* <p>
@@ -357,6 +371,129 @@ public ValidatePolicyRequest withPolicyType(PolicyType policyType) {
357371
return this;
358372
}
359373

374+
/**
375+
* <p>
376+
* The type of resource to attach to your resource policy. Specify a value for the policy validation resource type
377+
* only if the policy type is <code>RESOURCE_POLICY</code>. For example, to validate a resource policy to attach to
378+
* an Amazon S3 bucket, you can choose <code>AWS::S3::Bucket</code> for the policy validation resource type.
379+
* </p>
380+
* <p>
381+
* For resource types not supported as valid values, IAM Access Analyzer runs policy checks that apply to all
382+
* resource policies. For example, to validate a resource policy to attach to a KMS key, do not specify a value for
383+
* the policy validation resource type and IAM Access Analyzer will run policy checks that apply to all resource
384+
* policies.
385+
* </p>
386+
*
387+
* @param validatePolicyResourceType
388+
* The type of resource to attach to your resource policy. Specify a value for the policy validation resource
389+
* type only if the policy type is <code>RESOURCE_POLICY</code>. For example, to validate a resource policy
390+
* to attach to an Amazon S3 bucket, you can choose <code>AWS::S3::Bucket</code> for the policy validation
391+
* resource type.</p>
392+
* <p>
393+
* For resource types not supported as valid values, IAM Access Analyzer runs policy checks that apply to all
394+
* resource policies. For example, to validate a resource policy to attach to a KMS key, do not specify a
395+
* value for the policy validation resource type and IAM Access Analyzer will run policy checks that apply to
396+
* all resource policies.
397+
* @see ValidatePolicyResourceType
398+
*/
399+
400+
public void setValidatePolicyResourceType(String validatePolicyResourceType) {
401+
this.validatePolicyResourceType = validatePolicyResourceType;
402+
}
403+
404+
/**
405+
* <p>
406+
* The type of resource to attach to your resource policy. Specify a value for the policy validation resource type
407+
* only if the policy type is <code>RESOURCE_POLICY</code>. For example, to validate a resource policy to attach to
408+
* an Amazon S3 bucket, you can choose <code>AWS::S3::Bucket</code> for the policy validation resource type.
409+
* </p>
410+
* <p>
411+
* For resource types not supported as valid values, IAM Access Analyzer runs policy checks that apply to all
412+
* resource policies. For example, to validate a resource policy to attach to a KMS key, do not specify a value for
413+
* the policy validation resource type and IAM Access Analyzer will run policy checks that apply to all resource
414+
* policies.
415+
* </p>
416+
*
417+
* @return The type of resource to attach to your resource policy. Specify a value for the policy validation
418+
* resource type only if the policy type is <code>RESOURCE_POLICY</code>. For example, to validate a
419+
* resource policy to attach to an Amazon S3 bucket, you can choose <code>AWS::S3::Bucket</code> for the
420+
* policy validation resource type.</p>
421+
* <p>
422+
* For resource types not supported as valid values, IAM Access Analyzer runs policy checks that apply to
423+
* all resource policies. For example, to validate a resource policy to attach to a KMS key, do not specify
424+
* a value for the policy validation resource type and IAM Access Analyzer will run policy checks that apply
425+
* to all resource policies.
426+
* @see ValidatePolicyResourceType
427+
*/
428+
429+
public String getValidatePolicyResourceType() {
430+
return this.validatePolicyResourceType;
431+
}
432+
433+
/**
434+
* <p>
435+
* The type of resource to attach to your resource policy. Specify a value for the policy validation resource type
436+
* only if the policy type is <code>RESOURCE_POLICY</code>. For example, to validate a resource policy to attach to
437+
* an Amazon S3 bucket, you can choose <code>AWS::S3::Bucket</code> for the policy validation resource type.
438+
* </p>
439+
* <p>
440+
* For resource types not supported as valid values, IAM Access Analyzer runs policy checks that apply to all
441+
* resource policies. For example, to validate a resource policy to attach to a KMS key, do not specify a value for
442+
* the policy validation resource type and IAM Access Analyzer will run policy checks that apply to all resource
443+
* policies.
444+
* </p>
445+
*
446+
* @param validatePolicyResourceType
447+
* The type of resource to attach to your resource policy. Specify a value for the policy validation resource
448+
* type only if the policy type is <code>RESOURCE_POLICY</code>. For example, to validate a resource policy
449+
* to attach to an Amazon S3 bucket, you can choose <code>AWS::S3::Bucket</code> for the policy validation
450+
* resource type.</p>
451+
* <p>
452+
* For resource types not supported as valid values, IAM Access Analyzer runs policy checks that apply to all
453+
* resource policies. For example, to validate a resource policy to attach to a KMS key, do not specify a
454+
* value for the policy validation resource type and IAM Access Analyzer will run policy checks that apply to
455+
* all resource policies.
456+
* @return Returns a reference to this object so that method calls can be chained together.
457+
* @see ValidatePolicyResourceType
458+
*/
459+
460+
public ValidatePolicyRequest withValidatePolicyResourceType(String validatePolicyResourceType) {
461+
setValidatePolicyResourceType(validatePolicyResourceType);
462+
return this;
463+
}
464+
465+
/**
466+
* <p>
467+
* The type of resource to attach to your resource policy. Specify a value for the policy validation resource type
468+
* only if the policy type is <code>RESOURCE_POLICY</code>. For example, to validate a resource policy to attach to
469+
* an Amazon S3 bucket, you can choose <code>AWS::S3::Bucket</code> for the policy validation resource type.
470+
* </p>
471+
* <p>
472+
* For resource types not supported as valid values, IAM Access Analyzer runs policy checks that apply to all
473+
* resource policies. For example, to validate a resource policy to attach to a KMS key, do not specify a value for
474+
* the policy validation resource type and IAM Access Analyzer will run policy checks that apply to all resource
475+
* policies.
476+
* </p>
477+
*
478+
* @param validatePolicyResourceType
479+
* The type of resource to attach to your resource policy. Specify a value for the policy validation resource
480+
* type only if the policy type is <code>RESOURCE_POLICY</code>. For example, to validate a resource policy
481+
* to attach to an Amazon S3 bucket, you can choose <code>AWS::S3::Bucket</code> for the policy validation
482+
* resource type.</p>
483+
* <p>
484+
* For resource types not supported as valid values, IAM Access Analyzer runs policy checks that apply to all
485+
* resource policies. For example, to validate a resource policy to attach to a KMS key, do not specify a
486+
* value for the policy validation resource type and IAM Access Analyzer will run policy checks that apply to
487+
* all resource policies.
488+
* @return Returns a reference to this object so that method calls can be chained together.
489+
* @see ValidatePolicyResourceType
490+
*/
491+
492+
public ValidatePolicyRequest withValidatePolicyResourceType(ValidatePolicyResourceType validatePolicyResourceType) {
493+
this.validatePolicyResourceType = validatePolicyResourceType.toString();
494+
return this;
495+
}
496+
360497
/**
361498
* Returns a string representation of this object. This is useful for testing and debugging. Sensitive data will be
362499
* redacted from this string using a placeholder value.
@@ -378,7 +515,9 @@ public String toString() {
378515
if (getPolicyDocument() != null)
379516
sb.append("PolicyDocument: ").append(getPolicyDocument()).append(",");
380517
if (getPolicyType() != null)
381-
sb.append("PolicyType: ").append(getPolicyType());
518+
sb.append("PolicyType: ").append(getPolicyType()).append(",");
519+
if (getValidatePolicyResourceType() != null)
520+
sb.append("ValidatePolicyResourceType: ").append(getValidatePolicyResourceType());
382521
sb.append("}");
383522
return sb.toString();
384523
}
@@ -413,6 +552,10 @@ public boolean equals(Object obj) {
413552
return false;
414553
if (other.getPolicyType() != null && other.getPolicyType().equals(this.getPolicyType()) == false)
415554
return false;
555+
if (other.getValidatePolicyResourceType() == null ^ this.getValidatePolicyResourceType() == null)
556+
return false;
557+
if (other.getValidatePolicyResourceType() != null && other.getValidatePolicyResourceType().equals(this.getValidatePolicyResourceType()) == false)
558+
return false;
416559
return true;
417560
}
418561

@@ -426,6 +569,7 @@ public int hashCode() {
426569
hashCode = prime * hashCode + ((getNextToken() == null) ? 0 : getNextToken().hashCode());
427570
hashCode = prime * hashCode + ((getPolicyDocument() == null) ? 0 : getPolicyDocument().hashCode());
428571
hashCode = prime * hashCode + ((getPolicyType() == null) ? 0 : getPolicyType().hashCode());
572+
hashCode = prime * hashCode + ((getValidatePolicyResourceType() == null) ? 0 : getValidatePolicyResourceType().hashCode());
429573
return hashCode;
430574
}
431575

Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
/*
2+
* Copyright 2016-2021 Amazon.com, Inc. or its affiliates. All Rights Reserved.
3+
*
4+
* Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance with
5+
* the License. A copy of the License is located at
6+
*
7+
* http://aws.amazon.com/apache2.0
8+
*
9+
* or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
10+
* CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions
11+
* and limitations under the License.
12+
*/
13+
package com.amazonaws.services.accessanalyzer.model;
14+
15+
import javax.annotation.Generated;
16+
17+
/**
18+
*
19+
*/
20+
@Generated("com.amazonaws:aws-java-sdk-code-generator")
21+
public enum ValidatePolicyResourceType {
22+
23+
AWSS3Bucket("AWS::S3::Bucket"),
24+
AWSS3AccessPoint("AWS::S3::AccessPoint"),
25+
AWSS3MultiRegionAccessPoint("AWS::S3::MultiRegionAccessPoint"),
26+
AWSS3ObjectLambdaAccessPoint("AWS::S3ObjectLambda::AccessPoint");
27+
28+
private String value;
29+
30+
private ValidatePolicyResourceType(String value) {
31+
this.value = value;
32+
}
33+
34+
@Override
35+
public String toString() {
36+
return this.value;
37+
}
38+
39+
/**
40+
* Use this in place of valueOf.
41+
*
42+
* @param value
43+
* real value
44+
* @return ValidatePolicyResourceType corresponding to the value
45+
*
46+
* @throws IllegalArgumentException
47+
* If the specified value does not map to one of the known values in this enum.
48+
*/
49+
public static ValidatePolicyResourceType fromValue(String value) {
50+
if (value == null || "".equals(value)) {
51+
throw new IllegalArgumentException("Value cannot be null or empty!");
52+
}
53+
54+
for (ValidatePolicyResourceType enumEntry : ValidatePolicyResourceType.values()) {
55+
if (enumEntry.toString().equals(value)) {
56+
return enumEntry;
57+
}
58+
}
59+
60+
throw new IllegalArgumentException("Cannot create enum from " + value + " value!");
61+
}
62+
}

0 commit comments

Comments
 (0)