Skip to content

Commit

Permalink
Release v1.25.43 (2019-11-26) (#2979)
Browse files Browse the repository at this point in the history
Release v1.25.43 (2019-11-26)
===

### Service Client Updates
* `service/cognito-idp`: Updates service API and documentation
* `service/ds`: Updates service API and documentation
  * This release will introduce optional encryption over LDAP network traffic using SSL certificates between customer's self-managed AD and AWS Directory Services instances. The release also provides APIs for Certificate management.
* `service/dynamodb`: Updates service API, documentation, and paginators
  * 1) Amazon Contributor Insights for Amazon DynamoDB is a diagnostic tool for identifying frequently accessed keys and understanding database traffic trends. 2) Support for displaying new fields when a table's encryption state is Inaccessible or the table have been Archived.
* `service/elastic-inference`: Adds new service
* `service/mediatailor`: Updates service API and documentation
* `service/organizations`: Updates service API and documentation
  * Introduces the DescribeEffectivePolicy action, which returns the contents of the policy that's in effect for the account.
* `service/quicksight`: Updates service documentation
  * Documentation updates for QuickSight
* `service/rds-data`: Updates service API and documentation
* `service/resourcegroupstaggingapi`: Updates service API, documentation, and paginators
  * You can use tag policies to help standardize on tags across your organization's resources.
* `service/serverlessrepo`: Updates service API and documentation
* `service/workspaces`: Updates service API and documentation
  * For the WorkspaceBundle API, added the image identifier and the time of the last update.
  • Loading branch information
aws-sdk-go-automation committed Nov 26, 2019
1 parent 98babde commit eed38bc
Show file tree
Hide file tree
Showing 54 changed files with 8,202 additions and 1,830 deletions.
22 changes: 22 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,25 @@
Release v1.25.43 (2019-11-26)
===

### Service Client Updates
* `service/cognito-idp`: Updates service API and documentation
* `service/ds`: Updates service API and documentation
* This release will introduce optional encryption over LDAP network traffic using SSL certificates between customer's self-managed AD and AWS Directory Services instances. The release also provides APIs for Certificate management.
* `service/dynamodb`: Updates service API, documentation, and paginators
* 1) Amazon Contributor Insights for Amazon DynamoDB is a diagnostic tool for identifying frequently accessed keys and understanding database traffic trends. 2) Support for displaying new fields when a table's encryption state is Inaccessible or the table have been Archived.
* `service/elastic-inference`: Adds new service
* `service/mediatailor`: Updates service API and documentation
* `service/organizations`: Updates service API and documentation
* Introduces the DescribeEffectivePolicy action, which returns the contents of the policy that's in effect for the account.
* `service/quicksight`: Updates service documentation
* Documentation updates for QuickSight
* `service/rds-data`: Updates service API and documentation
* `service/resourcegroupstaggingapi`: Updates service API, documentation, and paginators
* You can use tag policies to help standardize on tags across your organization's resources.
* `service/serverlessrepo`: Updates service API and documentation
* `service/workspaces`: Updates service API and documentation
* For the WorkspaceBundle API, added the image identifier and the time of the last update.

Release v1.25.42 (2019-11-25)
===

Expand Down
6 changes: 6 additions & 0 deletions aws/endpoints/defaults.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion aws/version.go
Original file line number Diff line number Diff line change
Expand Up @@ -5,4 +5,4 @@ package aws
const SDKName = "aws-sdk-go"

// SDKVersion is the version of this SDK
const SDKVersion = "1.25.42"
const SDKVersion = "1.25.43"
45 changes: 42 additions & 3 deletions models/apis/cognito-idp/2016-04-18/api-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -1887,6 +1887,12 @@
},
"shapes":{
"AWSAccountIdType":{"type":"string"},
"AccountRecoverySettingType":{
"type":"structure",
"members":{
"RecoveryMechanisms":{"shape":"RecoveryMechanismsType"}
}
},
"AccountTakeoverActionNotifyType":{"type":"boolean"},
"AccountTakeoverActionType":{
"type":"structure",
Expand Down Expand Up @@ -3011,7 +3017,8 @@
"UserPoolTags":{"shape":"UserPoolTagsType"},
"AdminCreateUserConfig":{"shape":"AdminCreateUserConfigType"},
"Schema":{"shape":"SchemaAttributesListType"},
"UserPoolAddOns":{"shape":"UserPoolAddOnsType"}
"UserPoolAddOns":{"shape":"UserPoolAddOnsType"},
"AccountRecoverySetting":{"shape":"AccountRecoverySettingType"}
}
},
"CreateUserPoolResponse":{
Expand Down Expand Up @@ -4235,6 +4242,11 @@
"ENABLED"
]
},
"PriorityType":{
"type":"integer",
"max":2,
"min":1
},
"ProviderDescription":{
"type":"structure",
"members":{
Expand Down Expand Up @@ -4285,6 +4297,31 @@
"max":60,
"min":0
},
"RecoveryMechanismsType":{
"type":"list",
"member":{"shape":"RecoveryOptionType"},
"max":2,
"min":1
},
"RecoveryOptionNameType":{
"type":"string",
"enum":[
"verified_email",
"verified_phone_number",
"admin_only"
]
},
"RecoveryOptionType":{
"type":"structure",
"required":[
"Priority",
"Name"
],
"members":{
"Priority":{"shape":"PriorityType"},
"Name":{"shape":"RecoveryOptionNameType"}
}
},
"RedirectUrlType":{
"type":"string",
"max":1024,
Expand Down Expand Up @@ -5032,7 +5069,8 @@
"SmsConfiguration":{"shape":"SmsConfigurationType"},
"UserPoolTags":{"shape":"UserPoolTagsType"},
"AdminCreateUserConfig":{"shape":"AdminCreateUserConfigType"},
"UserPoolAddOns":{"shape":"UserPoolAddOnsType"}
"UserPoolAddOns":{"shape":"UserPoolAddOnsType"},
"AccountRecoverySetting":{"shape":"AccountRecoverySettingType"}
}
},
"UpdateUserPoolResponse":{
Expand Down Expand Up @@ -5272,7 +5310,8 @@
"CustomDomain":{"shape":"DomainType"},
"AdminCreateUserConfig":{"shape":"AdminCreateUserConfigType"},
"UserPoolAddOns":{"shape":"UserPoolAddOnsType"},
"Arn":{"shape":"ArnType"}
"Arn":{"shape":"ArnType"},
"AccountRecoverySetting":{"shape":"AccountRecoverySettingType"}
}
},
"UserStatusType":{
Expand Down
36 changes: 34 additions & 2 deletions models/apis/cognito-idp/2016-04-18/docs-2.json
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@
"AdminUpdateAuthEventFeedback": "<p>Provides feedback for an authentication event as to whether it was from a valid user. This feedback is used for improving the risk evaluation decision for the user pool as part of Amazon Cognito advanced security.</p>",
"AdminUpdateDeviceStatus": "<p>Updates the device status as an administrator.</p> <p>Calling this action requires developer credentials.</p>",
"AdminUpdateUserAttributes": "<p>Updates the specified user's attributes, including developer attributes, as an administrator. Works on any user.</p> <p>For custom attributes, you must prepend the <code>custom:</code> prefix to the attribute name.</p> <p>In addition to updating user attributes, this API can also be used to mark phone and email as verified.</p> <p>Calling this action requires developer credentials.</p>",
"AdminUserGlobalSignOut": "<p>Signs out users from all devices, as an administrator.</p> <p>Calling this action requires developer credentials.</p>",
"AdminUserGlobalSignOut": "<p>Signs out users from all devices, as an administrator. It also invalidates all refresh tokens issued to a user. The user's current access and Id tokens remain valid until their expiry. Access and Id tokens expire one hour after they are issued.</p> <p>Calling this action requires developer credentials.</p>",
"AssociateSoftwareToken": "<p>Returns a unique generated shared secret key code for the user account. The request takes an access token or a session string, but not both.</p>",
"ChangePassword": "<p>Changes the password for a specified user in a user pool.</p>",
"ConfirmDevice": "<p>Confirms tracking of the device. This API call is the call that begins device tracking.</p>",
Expand Down Expand Up @@ -67,7 +67,7 @@
"GetUser": "<p>Gets the user attributes and metadata for a user.</p>",
"GetUserAttributeVerificationCode": "<p>Gets the user attribute verification code for the specified attribute name.</p>",
"GetUserPoolMfaConfig": "<p>Gets the user pool multi-factor authentication (MFA) configuration.</p>",
"GlobalSignOut": "<p>Signs out users from all devices.</p>",
"GlobalSignOut": "<p>Signs out users from all devices. It also invalidates all refresh tokens issued to a user. The user's current access and Id tokens remain valid until their expiry. Access and Id tokens expire one hour after they are issued.</p>",
"InitiateAuth": "<p>Initiates the authentication flow.</p>",
"ListDevices": "<p>Lists the devices.</p>",
"ListGroups": "<p>Lists the groups associated with a user pool.</p> <p>Calling this action requires developer credentials.</p>",
Expand Down Expand Up @@ -110,6 +110,14 @@
"DomainDescriptionType$AWSAccountId": "<p>The AWS account ID for the user pool owner.</p>"
}
},
"AccountRecoverySettingType": {
"base": "<p>The data type for <code>AccountRecoverySetting</code>.</p>",
"refs": {
"CreateUserPoolRequest$AccountRecoverySetting": "<p>Use this setting to define which verified available method a user can use to recover their password when they call <code>ForgotPassword</code>. It allows you to define a preferred method when a user has more than one method available. With this setting, SMS does not qualify for a valid password recovery mechanism if the user also has SMS MFA enabled. In the absence of this setting, Cognito uses the legacy behavior to determine the recovery method where SMS is preferred over email.</p> <note> <p>Starting February 1, 2020, the value of <code>AccountRecoverySetting</code> will default to <code>verified_email</code> first and <code>verified_phone_number</code> as the second option for newly created user pools if no value is provided.</p> </note>",
"UpdateUserPoolRequest$AccountRecoverySetting": "<p>Use this setting to define which verified available method a user can use to recover their password when they call <code>ForgotPassword</code>. It allows you to define a preferred method when a user has more than one method available. With this setting, SMS does not qualify for a valid password recovery mechanism if the user also has SMS MFA enabled. In the absence of this setting, Cognito uses the legacy behavior to determine the recovery method where SMS is preferred over email.</p>",
"UserPoolType$AccountRecoverySetting": "<p>Use this setting to define which verified available method a user can use to recover their password when they call <code>ForgotPassword</code>. It allows you to define a preferred method when a user has more than one method available. With this setting, SMS does not qualify for a valid password recovery mechanism if the user also has SMS MFA enabled. In the absence of this setting, Cognito uses the legacy behavior to determine the recovery method where SMS is preferred over email.</p>"
}
},
"AccountTakeoverActionNotifyType": {
"base": null,
"refs": {
Expand Down Expand Up @@ -2041,6 +2049,12 @@
"UserPoolClientType$PreventUserExistenceErrors": "<p>Use this setting to choose which errors and responses are returned by Cognito APIs during authentication, account confirmation, and password recovery when the user does not exist in the user pool. When set to <code>ENABLED</code> and the user does not exist, authentication returns an error indicating either the username or password was incorrect, and account confirmation and password recovery return a response indicating a code was sent to a simulated destination. When set to <code>LEGACY</code>, those APIs will return a <code>UserNotFoundException</code> exception if the user does not exist in the user pool.</p> <p>Valid values include:</p> <ul> <li> <p> <code>ENABLED</code> - This prevents user existence-related errors.</p> </li> <li> <p> <code>LEGACY</code> - This represents the old behavior of Cognito where user existence related errors are not prevented.</p> </li> </ul> <p>This setting affects the behavior of following APIs:</p> <ul> <li> <p> <a>AdminInitiateAuth</a> </p> </li> <li> <p> <a>AdminRespondToAuthChallenge</a> </p> </li> <li> <p> <a>InitiateAuth</a> </p> </li> <li> <p> <a>RespondToAuthChallenge</a> </p> </li> <li> <p> <a>ForgotPassword</a> </p> </li> <li> <p> <a>ConfirmForgotPassword</a> </p> </li> <li> <p> <a>ConfirmSignUp</a> </p> </li> <li> <p> <a>ResendConfirmationCode</a> </p> </li> </ul> <note> <p>After January 1st 2020, the value of <code>PreventUserExistenceErrors</code> will default to <code>ENABLED</code> for newly created user pool clients if no value is provided.</p> </note>"
}
},
"PriorityType": {
"base": null,
"refs": {
"RecoveryOptionType$Priority": "<p>A positive integer specifying priority of a method with 1 being the highest priority.</p>"
}
},
"ProviderDescription": {
"base": "<p>A container for identity provider details.</p>",
"refs": {
Expand Down Expand Up @@ -2105,6 +2119,24 @@
"ListUsersRequest$Limit": "<p>Maximum number of users to be returned.</p>"
}
},
"RecoveryMechanismsType": {
"base": null,
"refs": {
"AccountRecoverySettingType$RecoveryMechanisms": "<p>The list of <code>RecoveryOptionTypes</code>.</p>"
}
},
"RecoveryOptionNameType": {
"base": null,
"refs": {
"RecoveryOptionType$Name": "<p>Specifies the recovery method for a user.</p>"
}
},
"RecoveryOptionType": {
"base": "<p>A map containing a priority as a key, and recovery method name as a value.</p>",
"refs": {
"RecoveryMechanismsType$member": null
}
},
"RedirectUrlType": {
"base": null,
"refs": {
Expand Down
Loading

0 comments on commit eed38bc

Please sign in to comment.