From 3861a131cf140f01ab2835cabed6cf06084e61e1 Mon Sep 17 00:00:00 2001 From: AWS SDK for Go v2 automation user Date: Wed, 20 Jul 2022 18:15:19 +0000 Subject: [PATCH] Regenerated Clients --- .../13015719936a4c22a921b2105b451733.json | 8 ++ .../974da55015014687b4deacfd628fb572.json | 8 ++ .../api_op_CreateCertificateAuthority.go | 18 +++-- service/acmpca/types/types.go | 4 +- service/iot/api_op_AttachPrincipalPolicy.go | 5 +- service/iot/deserializers.go | 77 +++++++++++++++++++ service/iot/serializers.go | 32 ++++++++ service/iot/types/types.go | 22 ++++++ .../internal/endpoints/endpoints.go | 12 +++ 9 files changed, 175 insertions(+), 11 deletions(-) create mode 100644 .changelog/13015719936a4c22a921b2105b451733.json create mode 100644 .changelog/974da55015014687b4deacfd628fb572.json diff --git a/.changelog/13015719936a4c22a921b2105b451733.json b/.changelog/13015719936a4c22a921b2105b451733.json new file mode 100644 index 00000000000..5be5ddb2427 --- /dev/null +++ b/.changelog/13015719936a4c22a921b2105b451733.json @@ -0,0 +1,8 @@ +{ + "id": "13015719-936a-4c22-a921-b2105b451733", + "type": "documentation", + "description": "AWS Certificate Manager (ACM) Private Certificate Authority (PCA) documentation updates", + "modules": [ + "service/acmpca" + ] +} \ No newline at end of file diff --git a/.changelog/974da55015014687b4deacfd628fb572.json b/.changelog/974da55015014687b4deacfd628fb572.json new file mode 100644 index 00000000000..6b83ce0a3e0 --- /dev/null +++ b/.changelog/974da55015014687b4deacfd628fb572.json @@ -0,0 +1,8 @@ +{ + "id": "974da550-1501-4687-b4de-acfd628fb572", + "type": "feature", + "description": "GA release the ability to enable/disable IoT Fleet Indexing for Device Defender and Named Shadow information, and search them through IoT Fleet Indexing APIs. This includes Named Shadow Selection as a part of the UpdateIndexingConfiguration API.", + "modules": [ + "service/iot" + ] +} \ No newline at end of file diff --git a/service/acmpca/api_op_CreateCertificateAuthority.go b/service/acmpca/api_op_CreateCertificateAuthority.go index 6619de2f65f..72b49d0470d 100644 --- a/service/acmpca/api_op_CreateCertificateAuthority.go +++ b/service/acmpca/api_op_CreateCertificateAuthority.go @@ -70,12 +70,18 @@ type CreateCertificateAuthorityInput struct { // Specifies a cryptographic key management compliance standard used for handling // CA keys. Default: FIPS_140_2_LEVEL_3_OR_HIGHER Note: - // FIPS_140_2_LEVEL_3_OR_HIGHER is not supported in Region ap-northeast-3. When - // creating a CA in the ap-northeast-3, you must provide - // FIPS_140_2_LEVEL_2_OR_HIGHER as the argument for KeyStorageSecurityStandard. - // Failure to do this results in an InvalidArgsException with the message, "A - // certificate authority cannot be created in this region with the specified - // security standard." + // FIPS_140_2_LEVEL_3_OR_HIGHER is not supported in the following Regions: + // + // * + // ap-northeast-3 + // + // * ap-southeast-3 + // + // When creating a CA in these Regions, you must + // provide FIPS_140_2_LEVEL_2_OR_HIGHER as the argument for + // KeyStorageSecurityStandard. Failure to do this results in an + // InvalidArgsException with the message, "A certificate authority cannot be + // created in this region with the specified security standard." KeyStorageSecurityStandard types.KeyStorageSecurityStandard // Contains information to enable Online Certificate Status Protocol (OCSP) diff --git a/service/acmpca/types/types.go b/service/acmpca/types/types.go index 830a876cc61..4917dd62077 100644 --- a/service/acmpca/types/types.go +++ b/service/acmpca/types/types.go @@ -464,9 +464,7 @@ type Extensions struct { // Contains a sequence of one or more X.509 extensions, each of which consists of // an object identifier (OID), a base64-encoded value, and the critical flag. For // more information, see the Global OID reference database. - // (https://oidref.com/2.5.29) The OID value of a CustomExtension - // (https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CustomExtension.html) - // must not match the OID of a predefined extension. + // (https://oidref.com/2.5.29) CustomExtensions []CustomExtension // Specifies additional purposes for which the certified public key may be used diff --git a/service/iot/api_op_AttachPrincipalPolicy.go b/service/iot/api_op_AttachPrincipalPolicy.go index 393a4c63d84..5c778febce8 100644 --- a/service/iot/api_op_AttachPrincipalPolicy.go +++ b/service/iot/api_op_AttachPrincipalPolicy.go @@ -11,8 +11,9 @@ import ( ) // Attaches the specified policy to the specified principal (certificate or other -// credential). Note: This action is deprecated. Please use AttachPolicy instead. -// Requires permission to access the AttachPrincipalPolicy +// credential). Note: This action is deprecated and works as expected for backward +// compatibility, but we won't add enhancements. Use AttachPolicy instead. Requires +// permission to access the AttachPrincipalPolicy // (https://docs.aws.amazon.com/service-authorization/latest/reference/list_awsiot.html#awsiot-actions-as-permissions) // action. // diff --git a/service/iot/deserializers.go b/service/iot/deserializers.go index 981887894c9..b5134d5eca3 100644 --- a/service/iot/deserializers.go +++ b/service/iot/deserializers.go @@ -44263,6 +44263,42 @@ func awsRestjson1_deserializeDocumentImplicitDeny(v **types.ImplicitDeny, value return nil } +func awsRestjson1_deserializeDocumentIndexingFilter(v **types.IndexingFilter, value interface{}) error { + if v == nil { + return fmt.Errorf("unexpected nil of type %T", v) + } + if value == nil { + return nil + } + + shape, ok := value.(map[string]interface{}) + if !ok { + return fmt.Errorf("unexpected JSON type %v", value) + } + + var sv *types.IndexingFilter + if *v == nil { + sv = &types.IndexingFilter{} + } else { + sv = *v + } + + for key, value := range shape { + switch key { + case "namedShadowNames": + if err := awsRestjson1_deserializeDocumentNamedShadowNamesFilter(&sv.NamedShadowNames, value); err != nil { + return err + } + + default: + _, _ = key, value + + } + } + *v = sv + return nil +} + func awsRestjson1_deserializeDocumentIndexNamesList(v *[]string, value interface{}) error { if v == nil { return fmt.Errorf("unexpected nil of type %T", v) @@ -47275,6 +47311,42 @@ func awsRestjson1_deserializeDocumentMitigationActionParams(v **types.Mitigation return nil } +func awsRestjson1_deserializeDocumentNamedShadowNamesFilter(v *[]string, value interface{}) error { + if v == nil { + return fmt.Errorf("unexpected nil of type %T", v) + } + if value == nil { + return nil + } + + shape, ok := value.([]interface{}) + if !ok { + return fmt.Errorf("unexpected JSON type %v", value) + } + + var cv []string + if *v == nil { + cv = []string{} + } else { + cv = *v + } + + for _, value := range shape { + var col string + if value != nil { + jtv, ok := value.(string) + if !ok { + return fmt.Errorf("expected ShadowName to be of type string, got %T instead", value) + } + col = jtv + } + cv = append(cv, col) + + } + *v = cv + return nil +} + func awsRestjson1_deserializeDocumentNonCompliantResource(v **types.NonCompliantResource, value interface{}) error { if v == nil { return fmt.Errorf("unexpected nil of type %T", v) @@ -53253,6 +53325,11 @@ func awsRestjson1_deserializeDocumentThingIndexingConfiguration(v **types.ThingI sv.DeviceDefenderIndexingMode = types.DeviceDefenderIndexingMode(jtv) } + case "filter": + if err := awsRestjson1_deserializeDocumentIndexingFilter(&sv.Filter, value); err != nil { + return err + } + case "managedFields": if err := awsRestjson1_deserializeDocumentFields(&sv.ManagedFields, value); err != nil { return err diff --git a/service/iot/serializers.go b/service/iot/serializers.go index 782152ffd83..d766bd4b313 100644 --- a/service/iot/serializers.go +++ b/service/iot/serializers.go @@ -18869,6 +18869,20 @@ func awsRestjson1_serializeDocumentHttpUrlDestinationConfiguration(v *types.Http return nil } +func awsRestjson1_serializeDocumentIndexingFilter(v *types.IndexingFilter, value smithyjson.Value) error { + object := value.Object() + defer object.Close() + + if v.NamedShadowNames != nil { + ok := object.Key("namedShadowNames") + if err := awsRestjson1_serializeDocumentNamedShadowNamesFilter(v.NamedShadowNames, ok); err != nil { + return err + } + } + + return nil +} + func awsRestjson1_serializeDocumentIotAnalyticsAction(v *types.IotAnalyticsAction, value smithyjson.Value) error { object := value.Object() defer object.Close() @@ -19276,6 +19290,17 @@ func awsRestjson1_serializeDocumentMqttContext(v *types.MqttContext, value smith return nil } +func awsRestjson1_serializeDocumentNamedShadowNamesFilter(v []string, value smithyjson.Value) error { + array := value.Array() + defer array.Close() + + for i := range v { + av := array.Value() + av.String(v[i]) + } + return nil +} + func awsRestjson1_serializeDocumentNumberList(v []float64, value smithyjson.Value) error { array := value.Array() defer array.Close() @@ -20273,6 +20298,13 @@ func awsRestjson1_serializeDocumentThingIndexingConfiguration(v *types.ThingInde ok.String(string(v.DeviceDefenderIndexingMode)) } + if v.Filter != nil { + ok := object.Key("filter") + if err := awsRestjson1_serializeDocumentIndexingFilter(v.Filter, ok); err != nil { + return err + } + } + if v.ManagedFields != nil { ok := object.Key("managedFields") if err := awsRestjson1_serializeDocumentFields(v.ManagedFields, ok); err != nil { diff --git a/service/iot/types/types.go b/service/iot/types/types.go index 9dd701fa7b6..aea6b26133b 100644 --- a/service/iot/types/types.go +++ b/service/iot/types/types.go @@ -1776,6 +1776,22 @@ type ImplicitDeny struct { noSmithyDocumentSerde } +// Provides additional filters for specific data sources. Named shadow is the only +// data source that currently supports and requires a filter. To add named shadows +// to your fleet indexing configuration, set namedShadowIndexingMode to be ON and +// specify your shadow names in filter. +type IndexingFilter struct { + + // The shadow names that you select to index. The default maximum number of shadow + // names for indexing is 10. To increase the limit, see Amazon Web Services IoT + // Device Management Quotas + // (https://docs.aws.amazon.com/general/latest/gr/iot_device_management.html#fleet-indexing-limits) + // in the Amazon Web Services General Reference. + NamedShadowNames []string + + noSmithyDocumentSerde +} + // Sends message data to an IoT Analytics channel. type IotAnalyticsAction struct { @@ -3625,6 +3641,12 @@ type ThingIndexingConfiguration struct { // (https://docs.aws.amazon.com/iot/latest/developerguide/device-defender-detect.html) DeviceDefenderIndexingMode DeviceDefenderIndexingMode + // Provides additional filters for specific data sources. Named shadow is the only + // data source that currently supports and requires a filter. To add named shadows + // to your fleet indexing configuration, set namedShadowIndexingMode to be ON and + // specify your shadow names in filter. + Filter *IndexingFilter + // Contains fields that are indexed and whose types are already known by the Fleet // Indexing service. ManagedFields []Field diff --git a/service/workspacesweb/internal/endpoints/endpoints.go b/service/workspacesweb/internal/endpoints/endpoints.go index 505a43f0dfc..7a11465a373 100644 --- a/service/workspacesweb/internal/endpoints/endpoints.go +++ b/service/workspacesweb/internal/endpoints/endpoints.go @@ -135,6 +135,18 @@ var defaultPartitions = endpoints.Partitions{ RegionRegex: partitionRegexp.Aws, IsRegionalized: true, Endpoints: endpoints.Endpoints{ + endpoints.EndpointKey{ + Region: "ap-northeast-1", + }: endpoints.Endpoint{}, + endpoints.EndpointKey{ + Region: "ap-south-1", + }: endpoints.Endpoint{}, + endpoints.EndpointKey{ + Region: "ap-southeast-1", + }: endpoints.Endpoint{}, + endpoints.EndpointKey{ + Region: "ap-southeast-2", + }: endpoints.Endpoint{}, endpoints.EndpointKey{ Region: "eu-west-1", }: endpoints.Endpoint{},