Skip to content

Commit 5d91e34

Browse files
author
AWS
committed
AWS Lake Formation Update: This release added "condition" to LakeFormation OptIn APIs, also added WithPrivilegedAccess flag to RegisterResource and DescribeResource.
1 parent 8836271 commit 5d91e34

File tree

2 files changed

+25
-4
lines changed

2 files changed

+25
-4
lines changed
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
{
2+
"type": "feature",
3+
"category": "AWS Lake Formation",
4+
"contributor": "",
5+
"description": "This release added \"condition\" to LakeFormation OptIn APIs, also added WithPrivilegedAccess flag to RegisterResource and DescribeResource."
6+
}

services/lakeformation/src/main/resources/codegen-resources/service-2.json

Lines changed: 19 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -201,7 +201,8 @@
201201
{"shape":"OperationTimeoutException"},
202202
{"shape":"EntityNotFoundException"},
203203
{"shape":"AccessDeniedException"},
204-
{"shape":"ConcurrentModificationException"}
204+
{"shape":"ConcurrentModificationException"},
205+
{"shape":"ResourceNumberLimitExceededException"}
205206
],
206207
"documentation":"<p>Enforce Lake Formation permissions for the given databases, tables, and principals.</p>"
207208
},
@@ -814,7 +815,7 @@
814815
{"shape":"ResourceNumberLimitExceededException"},
815816
{"shape":"AccessDeniedException"}
816817
],
817-
"documentation":"<p>Registers the resource as managed by the Data Catalog.</p> <p>To add or update data, Lake Formation needs read/write access to the chosen Amazon S3 path. Choose a role that you know has permission to do this, or choose the AWSServiceRoleForLakeFormationDataAccess service-linked role. When you register the first Amazon S3 path, the service-linked role and a new inline policy are created on your behalf. Lake Formation adds the first path to the inline policy and attaches it to the service-linked role. When you register subsequent paths, Lake Formation adds the path to the existing policy.</p> <p>The following request registers a new location and gives Lake Formation permission to use the service-linked role to access that location.</p> <p> <code>ResourceArn = arn:aws:s3:::my-bucket/ UseServiceLinkedRole = true</code> </p> <p>If <code>UseServiceLinkedRole</code> is not set to true, you must provide or set the <code>RoleArn</code>:</p> <p> <code>arn:aws:iam::12345:role/my-data-access-role</code> </p>"
818+
"documentation":"<p>Registers the resource as managed by the Data Catalog.</p> <p>To add or update data, Lake Formation needs read/write access to the chosen data location. Choose a role that you know has permission to do this, or choose the AWSServiceRoleForLakeFormationDataAccess service-linked role. When you register the first Amazon S3 path, the service-linked role and a new inline policy are created on your behalf. Lake Formation adds the first path to the inline policy and attaches it to the service-linked role. When you register subsequent paths, Lake Formation adds the path to the existing policy.</p> <p>The following request registers a new location and gives Lake Formation permission to use the service-linked role to access that location.</p> <p> <code>ResourceArn = arn:aws:s3:::my-bucket/ UseServiceLinkedRole = true</code> </p> <p>If <code>UseServiceLinkedRole</code> is not set to true, you must provide or set the <code>RoleArn</code>:</p> <p> <code>arn:aws:iam::12345:role/my-data-access-role</code> </p>"
818819
},
819820
"RemoveLFTagsFromResource":{
820821
"name":"RemoveLFTagsFromResource",
@@ -1276,6 +1277,7 @@
12761277
"shape":"PermissionList",
12771278
"documentation":"<p>The permissions to be granted.</p>"
12781279
},
1280+
"Condition":{"shape":"Condition"},
12791281
"PermissionsWithGrantOption":{
12801282
"shape":"PermissionList",
12811283
"documentation":"<p>Indicates if the option to pass permissions is granted.</p>"
@@ -1310,6 +1312,7 @@
13101312
}
13111313
}
13121314
},
1315+
"Boolean":{"type":"boolean"},
13131316
"BooleanNullable":{"type":"boolean"},
13141317
"CancelTransactionRequest":{
13151318
"type":"structure",
@@ -1549,7 +1552,8 @@
15491552
],
15501553
"members":{
15511554
"Principal":{"shape":"DataLakePrincipal"},
1552-
"Resource":{"shape":"Resource"}
1555+
"Resource":{"shape":"Resource"},
1556+
"Condition":{"shape":"Condition"}
15531557
}
15541558
},
15551559
"CreateLakeFormationOptInResponse":{
@@ -1838,7 +1842,8 @@
18381842
],
18391843
"members":{
18401844
"Principal":{"shape":"DataLakePrincipal"},
1841-
"Resource":{"shape":"Resource"}
1845+
"Resource":{"shape":"Resource"},
1846+
"Condition":{"shape":"Condition"}
18421847
}
18431848
},
18441849
"DeleteLakeFormationOptInResponse":{
@@ -2708,6 +2713,7 @@
27082713
"shape":"PermissionList",
27092714
"documentation":"<p>The permissions granted to the principal on the resource. Lake Formation defines privileges to grant and revoke access to metadata in the Data Catalog and data organized in underlying data storage such as Amazon S3. Lake Formation requires that each principal be authorized to perform a specific task on Lake Formation resources. </p>"
27102715
},
2716+
"Condition":{"shape":"Condition"},
27112717
"PermissionsWithGrantOption":{
27122718
"shape":"PermissionList",
27132719
"documentation":"<p>Indicates a list of the granted permissions that the principal may pass to other users. These permissions may only be a subset of the permissions granted in the <code>Privileges</code>.</p>"
@@ -3599,6 +3605,10 @@
35993605
"HybridAccessEnabled":{
36003606
"shape":"NullableBoolean",
36013607
"documentation":"<p> Specifies whether the data access of tables pointing to the location can be managed by both Lake Formation permissions as well as Amazon S3 bucket policies. </p>"
3608+
},
3609+
"WithPrivilegedAccess":{
3610+
"shape":"Boolean",
3611+
"documentation":"<p>Grants the calling principal the permissions to perform all supported Lake Formation operations on the registered data location. </p>"
36023612
}
36033613
}
36043614
},
@@ -3702,6 +3712,10 @@
37023712
"HybridAccessEnabled":{
37033713
"shape":"NullableBoolean",
37043714
"documentation":"<p> Indicates whether the data access of tables pointing to the location can be managed by both Lake Formation permissions as well as Amazon S3 bucket policies. </p>"
3715+
},
3716+
"WithPrivilegedAccess":{
3717+
"shape":"NullableBoolean",
3718+
"documentation":"<p>Grants the calling principal the permissions to perform all supported Lake Formation operations on the registered data location. </p>"
37053719
}
37063720
},
37073721
"documentation":"<p>A structure containing information about an Lake Formation resource.</p>"
@@ -3780,6 +3794,7 @@
37803794
"shape":"PermissionList",
37813795
"documentation":"<p>The permissions revoked to the principal on the resource. For information about permissions, see <a href=\"https://docs.aws.amazon.com/lake-formation/latest/dg/security-data-access.html\">Security and Access Control to Metadata and Data</a>.</p>"
37823796
},
3797+
"Condition":{"shape":"Condition"},
37833798
"PermissionsWithGrantOption":{
37843799
"shape":"PermissionList",
37853800
"documentation":"<p>Indicates a list of permissions for which to revoke the grant option allowing the principal to pass permissions to other principals.</p>"

0 commit comments

Comments
 (0)