Skip to content

Commit 085013f

Browse files
authored
Merge branch 'main' into ReuseStreamingChecksum
2 parents 1e8009d + d59ac28 commit 085013f

File tree

1,295 files changed

+80979
-18617
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,295 files changed

+80979
-18617
lines changed

VERSION

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
1.11.616
1+
1.11.619

cmake/sdksCommon.cmake

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -105,6 +105,7 @@ list(APPEND SDK_TEST_PROJECT_LIST "s3:tests/aws-cpp-sdk-s3-unit-tests")
105105
list(APPEND SDK_TEST_PROJECT_LIST "s3-crt:tests/aws-cpp-sdk-s3-crt-integration-tests")
106106
list(APPEND SDK_TEST_PROJECT_LIST "s3-encryption:tests/aws-cpp-sdk-s3-encryption-tests,tests/aws-cpp-sdk-s3-encryption-integration-tests")
107107
list(APPEND SDK_TEST_PROJECT_LIST "s3control:tests/aws-cpp-sdk-s3control-integration-tests")
108+
list(APPEND SDK_TEST_PROJECT_LIST "sns:tests/aws-cpp-sdk-sns-integration-tests")
108109
list(APPEND SDK_TEST_PROJECT_LIST "sqs:tests/aws-cpp-sdk-sqs-integration-tests")
109110
list(APPEND SDK_TEST_PROJECT_LIST "sqs:tests/aws-cpp-sdk-sqs-unit-tests")
110111
list(APPEND SDK_TEST_PROJECT_LIST "transfer:tests/aws-cpp-sdk-transfer-tests")

generated/src/aws-cpp-sdk-acm-pca/include/aws/acm-pca/ACMPCAClient.h

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -252,7 +252,17 @@ namespace ACMPCA
252252
* action returns the time remaining in the restoration window of a private CA in
253253
* the <code>DELETED</code> state. To restore an eligible CA, call the <a
254254
* href="https://docs.aws.amazon.com/privateca/latest/APIReference/API_RestoreCertificateAuthority.html">RestoreCertificateAuthority</a>
255-
* action.</p><p><h3>See Also:</h3> <a
255+
* action.</p> <p>A private CA can be deleted if it is in the
256+
* <code>PENDING_CERTIFICATE</code>, <code>CREATING</code>, <code>EXPIRED</code>,
257+
* <code>DISABLED</code>, or <code>FAILED</code> state. To delete a CA in the
258+
* <code>ACTIVE</code> state, you must first disable it, or else the delete request
259+
* results in an exception. If you are deleting a private CA in the
260+
* <code>PENDING_CERTIFICATE</code> or <code>DISABLED</code> state, you can set the
261+
* length of its restoration period to 7-30 days. The default is 30. During this
262+
* time, the status is set to <code>DELETED</code> and the CA can be restored. A
263+
* private CA deleted in the <code>CREATING</code> or <code>FAILED</code> state has
264+
* no assigned restoration period and cannot be restored.</p>
265+
* <p><h3>See Also:</h3> <a
256266
* href="http://docs.aws.amazon.com/goto/WebAPI/acm-pca-2017-08-22/DeleteCertificateAuthority">AWS
257267
* API Reference</a></p>
258268
*/
@@ -456,8 +466,8 @@ namespace ACMPCA
456466
* href="https://docs.aws.amazon.com/privateca/latest/APIReference/API_IssueCertificate.html">IssueCertificate</a>
457467
* action. You must specify both the ARN of your private CA and the ARN of the
458468
* issued certificate when calling the <b>GetCertificate</b> action. You can
459-
* retrieve the certificate if it is in the <b>ISSUED</b> state. You can call the
460-
* <a
469+
* retrieve the certificate if it is in the <b>ISSUED</b>, <b>EXPIRED</b>, or
470+
* <b>REVOKED</b> state. You can call the <a
461471
* href="https://docs.aws.amazon.com/privateca/latest/APIReference/API_CreateCertificateAuthorityAuditReport.html">CreateCertificateAuthorityAuditReport</a>
462472
* action to create a report that contains information about all of the
463473
* certificates issued and revoked by your private CA. </p><p><h3>See Also:</h3>

generated/src/aws-cpp-sdk-acm-pca/include/aws/acm-pca/model/CertificateAuthority.h

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -216,13 +216,15 @@ namespace Model
216216

217217
///@{
218218
/**
219-
* <p>Defines a cryptographic key management compliance standard used for handling
220-
* CA keys. </p> <p>Default: FIPS_140_2_LEVEL_3_OR_HIGHER</p> <p>Note: Amazon Web
221-
* Services Region ap-northeast-3 supports only FIPS_140_2_LEVEL_2_OR_HIGHER. You
222-
* must explicitly specify this parameter and value when creating a CA in that
223-
* Region. Specifying a different value (or no value) results in an
224-
* <code>InvalidArgsException</code> with the message "A certificate authority
225-
* cannot be created in this region with the specified security standard."</p>
219+
* <p>Defines a cryptographic key management compliance standard for handling and
220+
* protecting CA keys.</p> <p>Default: FIPS_140_2_LEVEL_3_OR_HIGHER</p>
221+
* <p>Starting January 26, 2023, Amazon Web Services Private CA protects all CA
222+
* private keys in non-China regions using hardware security modules (HSMs) that
223+
* comply with FIPS PUB 140-2 Level 3.</p> <p>For information about security
224+
* standard support in different Amazon Web Services Regions, see <a
225+
* href="https://docs.aws.amazon.com/privateca/latest/userguide/data-protection.html#private-keys">Storage
226+
* and security compliance of Amazon Web Services Private CA private keys</a>.</p>
227+
*
226228
*/
227229
inline KeyStorageSecurityStandard GetKeyStorageSecurityStandard() const { return m_keyStorageSecurityStandard; }
228230
inline bool KeyStorageSecurityStandardHasBeenSet() const { return m_keyStorageSecurityStandardHasBeenSet; }

generated/src/aws-cpp-sdk-acm-pca/include/aws/acm-pca/model/CreateCertificateAuthorityRequest.h

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -117,15 +117,15 @@ namespace Model
117117

118118
///@{
119119
/**
120-
* <p>Specifies a cryptographic key management compliance standard used for
121-
* handling CA keys.</p> <p>Default: FIPS_140_2_LEVEL_3_OR_HIGHER</p>
122-
* <p>Some Amazon Web Services Regions do not support the default. When creating a
123-
* CA in these Regions, you must provide <code>FIPS_140_2_LEVEL_2_OR_HIGHER</code>
124-
* as the argument for <code>KeyStorageSecurityStandard</code>. Failure to do this
125-
* results in an <code>InvalidArgsException</code> with the message, "A certificate
126-
* authority cannot be created in this region with the specified security
127-
* standard."</p> <p>For information about security standard support in various
128-
* Regions, see <a
120+
* <p>Specifies a cryptographic key management compliance standard for handling and
121+
* protecting CA keys.</p> <p>Default: FIPS_140_2_LEVEL_3_OR_HIGHER</p>
122+
* <p>Some Amazon Web Services Regions don't support the default value. When you
123+
* create a CA in these Regions, you must use <code>CCPC_LEVEL_1_OR_HIGHER</code>
124+
* for the <code>KeyStorageSecurityStandard</code> parameter. If you don't, the
125+
* operation returns an <code>InvalidArgsException</code> with this message: "A
126+
* certificate authority cannot be created in this region with the specified
127+
* security standard."</p> <p>For information about security standard support in
128+
* different Amazon Web Services Regions, see <a
129129
* href="https://docs.aws.amazon.com/privateca/latest/userguide/data-protection.html#private-keys">Storage
130130
* and security compliance of Amazon Web Services Private CA private keys</a>.</p>
131131
*

generated/src/aws-cpp-sdk-acm-pca/include/aws/acm-pca/model/GetPolicyRequest.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ namespace Model
3838
/**
3939
* <p>The Amazon Resource Number (ARN) of the private CA that will have its policy
4040
* retrieved. You can find the CA's ARN by calling the ListCertificateAuthorities
41-
* action. <pre><code> &lt;/p&gt; </code></pre>
41+
* action. </p>
4242
*/
4343
inline const Aws::String& GetResourceArn() const { return m_resourceArn; }
4444
inline bool ResourceArnHasBeenSet() const { return m_resourceArnHasBeenSet; }

generated/src/aws-cpp-sdk-aiops/include/aws/aiops/AIOpsClient.h

Lines changed: 21 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -94,17 +94,17 @@ namespace AIOps
9494
* <p>Currently, you can have one investigation group in each Region in your
9595
* account. Each investigation in a Region is a part of the investigation group in
9696
* that Region</p> <p>To create an investigation group and set up CloudWatch
97-
* investigations, you must be signed in to an IAM principal that has the either
98-
* the <code>AIOpsConsoleAdminPolicy</code> or the <code>AdministratorAccess</code>
99-
* IAM policy attached, or to an account that has similar permissions.</p>
100-
* <p>You can configure CloudWatch alarms to start investigations and
101-
* add events to investigations. If you create your investigation group with
97+
* investigations, you must be signed in to an IAM principal that has either the
98+
* <code>AIOpsConsoleAdminPolicy</code> or the <code>AdministratorAccess</code> IAM
99+
* policy attached, or to an account that has similar permissions.</p>
100+
* <p>You can configure CloudWatch alarms to start investigations and add events to
101+
* investigations. If you create your investigation group with
102102
* <code>CreateInvestigationGroup</code> and you want to enable alarms to do this,
103-
* you must use <a
104-
* href="https://docs.aws.amazon.com/operationalinvestigations/latest/AmazonQDeveloperOperationalInvestigationsAPIReference/API_PutInvestigationGroupPolicy.html">PutInvestigationGroupPolicy</a>
105-
* to create a resource policy that grants this permission to CloudWatch alarms.
106-
* </p> <p>For more information about configuring CloudWatch alarms to work with
107-
* CloudWatch investigations, see </p> <p><h3>See Also:</h3> <a
103+
* you must use <code>PutInvestigationGroupPolicy</code> to create a resource
104+
* policy that grants this permission to CloudWatch alarms. </p> <p>For more
105+
* information about configuring CloudWatch alarms, see <a
106+
* href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/AlarmThatSendsEmail.html">Using
107+
* Amazon CloudWatch alarms</a> </p> <p><h3>See Also:</h3> <a
108108
* href="http://docs.aws.amazon.com/goto/WebAPI/aiops-2018-05-10/CreateInvestigationGroup">AWS
109109
* API Reference</a></p>
110110
*/
@@ -209,8 +209,10 @@ namespace AIOps
209209
}
210210

211211
/**
212-
* <p>Returns the IAM resource policy that is associated with the specified
213-
* investigation group.</p><p><h3>See Also:</h3> <a
212+
* <p>Returns the JSON of the IAM resource policy associated with the specified
213+
* investigation group in a string. For example,
214+
* <code>{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"aiops.alarms.cloudwatch.amazonaws.com\"},\"Action\":[\"aiops:CreateInvestigation\",\"aiops:CreateInvestigationEvent\"],\"Resource\":\"*\",\"Condition\":{\"StringEquals\":{\"aws:SourceAccount\":\"111122223333\"},\"ArnLike\":{\"aws:SourceArn\":\"arn:aws:cloudwatch:us-east-1:111122223333:alarm:*\"}}}]}</code>.</p><p><h3>See
215+
* Also:</h3> <a
214216
* href="http://docs.aws.amazon.com/goto/WebAPI/aiops-2018-05-10/GetInvestigationGroupPolicy">AWS
215217
* API Reference</a></p>
216218
*/
@@ -291,14 +293,13 @@ namespace AIOps
291293
* group.</p> <p>If you create your investigation group with
292294
* <code>CreateInvestigationGroup</code> and you want to enable CloudWatch alarms
293295
* to create investigations and add events to investigations, you must use this
294-
* operation to create a policy similar to this example.</p> <p> <code>{ "Version":
295-
* "2008-10-17", "Statement": [{ "Effect": "Allow", "Principal": { "Service":
296-
* "aiops.alarms.cloudwatch.amazonaws.com" }, "Action":
297-
* ["aiops:CreateInvestigation", "aiops:CreateInvestigationEvent"], "Resource":
298-
* "*", "Condition": { "StringEquals": { "aws:SourceAccount": "<i>account-id</i>"
299-
* }, "ArnLike": { "aws:SourceArn":
300-
* "arn:aws:cloudwatch:<i>region</i>:<i>account-id</i>:alarm:*" } } }] }</code>
301-
* </p><p><h3>See Also:</h3> <a
296+
* operation to create a policy similar to this example.</p> <p> <code> {
297+
* "Version": "2008-10-17", "Statement": [ { "Effect": "Allow", "Principal": {
298+
* "Service": "aiops.alarms.cloudwatch.amazonaws.com" }, "Action": [
299+
* "aiops:CreateInvestigation", "aiops:CreateInvestigationEvent" ], "Resource":
300+
* "*", "Condition": { "StringEquals": { "aws:SourceAccount": "account-id" },
301+
* "ArnLike": { "aws:SourceArn": "arn:aws:cloudwatch:region:account-id:alarm:*" } }
302+
* } ] } </code> </p><p><h3>See Also:</h3> <a
302303
* href="http://docs.aws.amazon.com/goto/WebAPI/aiops-2018-05-10/PutInvestigationGroupPolicy">AWS
303304
* API Reference</a></p>
304305
*/

generated/src/aws-cpp-sdk-aiops/include/aws/aiops/model/CreateInvestigationGroupRequest.h

Lines changed: 18 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,8 @@ namespace Model
5555
* your resources that CloudWatch investigations will have access to during
5656
* investigations.</p> <p>For more information, see <a
5757
* href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-Security-Data">How
58-
* to control what data Amazon Q has access to during investigations</a>.</p>
58+
* to control what data CloudWatch investigations has access to during
59+
* investigations</a>.</p>
5960
*/
6061
inline const Aws::String& GetRoleArn() const { return m_roleArn; }
6162
inline bool RoleArnHasBeenSet() const { return m_roleArnHasBeenSet; }
@@ -121,15 +122,16 @@ namespace Model
121122
///@{
122123
/**
123124
* <p>Enter the existing custom tag keys for custom applications in your system.
124-
* Resource tags help Amazon Q narrow the search space when it is unable to
125-
* discover definite relationships between resources. For example, to discover that
126-
* an Amazon ECS service depends on an Amazon RDS database, Amazon Q can discover
127-
* this relationship using data sources such as X-Ray and CloudWatch Application
128-
* Signals. However, if you haven't deployed these features, Amazon Q will attempt
129-
* to identify possible relationships. Tag boundaries can be used to narrow the
130-
* resources that will be discovered by Amazon Q in these cases.</p> <p>You don't
131-
* need to enter tags created by myApplications or CloudFormation, because Amazon Q
132-
* can automatically detect those tags.</p>
125+
* Resource tags help CloudWatch investigations narrow the search space when it is
126+
* unable to discover definite relationships between resources. For example, to
127+
* discover that an Amazon ECS service depends on an Amazon RDS database,
128+
* CloudWatch investigations can discover this relationship using data sources such
129+
* as X-Ray and CloudWatch Application Signals. However, if you haven't deployed
130+
* these features, CloudWatch investigations will attempt to identify possible
131+
* relationships. Tag boundaries can be used to narrow the resources that will be
132+
* discovered by CloudWatch investigations in these cases.</p> <p>You don't need to
133+
* enter tags created by myApplications or CloudFormation, because CloudWatch
134+
* investigations can automatically detect those tags.</p>
133135
*/
134136
inline const Aws::Vector<Aws::String>& GetTagKeyBoundaries() const { return m_tagKeyBoundaries; }
135137
inline bool TagKeyBoundariesHasBeenSet() const { return m_tagKeyBoundariesHasBeenSet; }
@@ -143,12 +145,11 @@ namespace Model
143145

144146
///@{
145147
/**
146-
* <p>Use this structure to integrate CloudWatch investigations with Amazon Q in
147-
* chat applications. This structure is a string array. For the first string,
148-
* specify the ARN of an Amazon SNS topic. For the array of strings, specify the
149-
* ARNs of one or more Amazon Q in chat applications configurations that you want
150-
* to associate with that topic. For more information about these configuration
151-
* ARNs, see <a
148+
* <p>Use this structure to integrate CloudWatch investigations with chat
149+
* applications. This structure is a string array. For the first string, specify
150+
* the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of
151+
* one or more chat applications configurations that you want to associate with
152+
* that topic. For more information about these configuration ARNs, see <a
152153
* href="https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html">Getting
153154
* started with Amazon Q in chat applications</a> and <a
154155
* href="https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies">Resource
@@ -180,7 +181,7 @@ namespace Model
180181

181182
///@{
182183
/**
183-
* <p>Number of <code>sourceAccountId</code> values that have been configured for
184+
* <p>List of <code>sourceRoleArn</code> values that have been configured for
184185
* cross-account access.</p>
185186
*/
186187
inline const Aws::Vector<CrossAccountConfiguration>& GetCrossAccountConfigurations() const { return m_crossAccountConfigurations; }

generated/src/aws-cpp-sdk-aiops/include/aws/aiops/model/EncryptionConfiguration.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ namespace Model
4242
///@{
4343
/**
4444
* <p>Displays whether investigation data is encrypted by a customer managed key or
45-
* an Amazon Web Services owned kay.</p>
45+
* an Amazon Web Services owned key.</p>
4646
*/
4747
inline EncryptionConfigurationType GetType() const { return m_type; }
4848
inline bool TypeHasBeenSet() const { return m_typeHasBeenSet; }

0 commit comments

Comments
 (0)