Skip to content

Commit 9441cef

Browse files
Merge branch 'release-1.36.18'
* release-1.36.18: Bumping version to 1.36.18 Update endpoints model Update to latest models Drop log level for skipped validation to debug until support is more widespread (#3385)
2 parents bf3cfcb + 0c7dc1a commit 9441cef

File tree

11 files changed

+362
-165
lines changed

11 files changed

+362
-165
lines changed

.changes/1.36.18.json

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
[
2+
{
3+
"category": "``acm-pca``",
4+
"description": "Private Certificate Authority service now supports Partitioned CRL as a revocation configuration option.",
5+
"type": "api-change"
6+
},
7+
{
8+
"category": "``appsync``",
9+
"description": "Add support for operation level caching",
10+
"type": "api-change"
11+
},
12+
{
13+
"category": "``ec2``",
14+
"description": "Adding support for the new fullSnapshotSizeInBytes field in the response of the EC2 EBS DescribeSnapshots API. This field represents the size of all the blocks that were written to the source volume at the time the snapshot was created.",
15+
"type": "api-change"
16+
},
17+
{
18+
"category": "``pi``",
19+
"description": "Documentation only update for RDS Performance Insights dimensions for execution plans and locking analysis.",
20+
"type": "api-change"
21+
}
22+
]

CHANGELOG.rst

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,15 @@
22
CHANGELOG
33
=========
44

5+
1.36.18
6+
=======
7+
8+
* api-change:``acm-pca``: Private Certificate Authority service now supports Partitioned CRL as a revocation configuration option.
9+
* api-change:``appsync``: Add support for operation level caching
10+
* api-change:``ec2``: Adding support for the new fullSnapshotSizeInBytes field in the response of the EC2 EBS DescribeSnapshots API. This field represents the size of all the blocks that were written to the source volume at the time the snapshot was created.
11+
* api-change:``pi``: Documentation only update for RDS Performance Insights dimensions for execution plans and locking analysis.
12+
13+
514
1.36.17
615
=======
716

botocore/__init__.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616
import os
1717
import re
1818

19-
__version__ = '1.36.17'
19+
__version__ = '1.36.18'
2020

2121

2222
class NullHandler(logging.Handler):

botocore/data/acm-pca/2017-08-22/service-2.json

Lines changed: 22 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -470,7 +470,7 @@
470470
},
471471
"AWSPolicy":{
472472
"type":"string",
473-
"max":20480,
473+
"max":81920,
474474
"min":1,
475475
"pattern":"[\\u0009\\u000A\\u000D\\u0020-\\u00FF]+"
476476
},
@@ -887,6 +887,14 @@
887887
"CrlDistributionPointExtensionConfiguration":{
888888
"shape":"CrlDistributionPointExtensionConfiguration",
889889
"documentation":"<p>Configures the behavior of the CRL Distribution Point extension for certificates issued by your certificate authority. If this field is not provided, then the CRl Distribution Point Extension will be present and contain the default CRL URL.</p>"
890+
},
891+
"CrlType":{
892+
"shape":"CrlType",
893+
"documentation":"<p>Choose whether to use a partitioned or complete CRL. Your choice determines the maximum number of certificates that the certificate authority can issue and revoke, as described in the <a href=\"https://docs.aws.amazon.com/general/latest/gr/pca.html#limits_pca-connector-ad\">Amazon Web Services Private CA quotas</a>.</p> <ul> <li> <p> <code>PARTITIONED</code> - The default setting. Partitioned CRLs are an especially good option for devices that have limited processing power or storage capacity, such as certain IoT devices. Compared to complete CRLs, partitioned CRLs dramatically increase the number of certificates your private CA can issue. Each certificate that Amazon Web Services Private CA issues is bound to a specific CRL partition through the CRL distribution point (CDP) defined in <a href=\"https://datatracker.ietf.org/doc/html/rfc5280\">RFC 5280</a>.</p> <important> <p>To make sure that your client fetches the CRL from a valid endpoint, we recommend that you programmatically validate that the CRL's issuing distribution point (IDP) URI matches the certificate's CDP URI. Amazon Web Services Private CA marks the IDP extension as critical, which your client must be able to process.</p> </important> </li> <li> <p> <code>COMPLETE</code> - Amazon Web Services Private CA maintains a single CRL file for all unexpired certificates issued by a CA that have been revoked for any reason.</p> </li> </ul>"
894+
},
895+
"CustomPath":{
896+
"shape":"CrlPathString",
897+
"documentation":"<p>Designates a custom file path in S3 for CRL(s). For example, <code>http://&lt;CustomName&gt;/&lt;CustomPath&gt;/&lt;CrlPartition_GUID&gt;.crl</code>. You can change the custom path up to five times.</p>"
890898
}
891899
},
892900
"documentation":"<p>Contains configuration information for a certificate revocation list (CRL). Your private certificate authority (CA) creates base CRLs. Delta CRLs are not supported. You can enable CRLs for your new or an existing private CA by setting the <b>Enabled</b> parameter to <code>true</code>. Your private CA writes CRLs to an S3 bucket that you specify in the <b>S3BucketName</b> parameter. You can hide the name of your bucket by specifying a value for the <b>CustomCname</b> parameter. Your private CA by default copies the CNAME or the S3 bucket name to the <b>CRL Distribution Points</b> extension of each certificate it issues. If you want to configure this default behavior to be something different, you can set the <b>CrlDistributionPointExtensionConfiguration</b> parameter. Your S3 bucket policy must give write permission to Amazon Web Services Private CA. </p> <p>Amazon Web Services Private CA assets that are stored in Amazon S3 can be protected with encryption. For more information, see <a href=\"https://docs.aws.amazon.com/privateca/latest/userguide/crl-planning.html#crl-encryption\">Encrypting Your CRLs</a>.</p> <p>Your private CA uses the value in the <b>ExpirationInDays</b> parameter to calculate the <b>nextUpdate</b> field in the CRL. The CRL is refreshed prior to a certificate's expiration date or when a certificate is revoked. When a certificate is revoked, it appears in the CRL until the certificate expires, and then in one additional CRL after expiration, and it always appears in the audit report.</p> <p>A CRL is typically updated approximately 30 minutes after a certificate is revoked. If for any reason a CRL update fails, Amazon Web Services Private CA makes further attempts every 15 minutes.</p> <p>CRLs contain the following fields:</p> <ul> <li> <p> <b>Version</b>: The current version number defined in RFC 5280 is V2. The integer value is 0x1. </p> </li> <li> <p> <b>Signature Algorithm</b>: The name of the algorithm used to sign the CRL.</p> </li> <li> <p> <b>Issuer</b>: The X.500 distinguished name of your private CA that issued the CRL.</p> </li> <li> <p> <b>Last Update</b>: The issue date and time of this CRL.</p> </li> <li> <p> <b>Next Update</b>: The day and time by which the next CRL will be issued.</p> </li> <li> <p> <b>Revoked Certificates</b>: List of revoked certificates. Each list item contains the following information.</p> <ul> <li> <p> <b>Serial Number</b>: The serial number, in hexadecimal format, of the revoked certificate.</p> </li> <li> <p> <b>Revocation Date</b>: Date and time the certificate was revoked.</p> </li> <li> <p> <b>CRL Entry Extensions</b>: Optional extensions for the CRL entry.</p> <ul> <li> <p> <b>X509v3 CRL Reason Code</b>: Reason the certificate was revoked.</p> </li> </ul> </li> </ul> </li> <li> <p> <b>CRL Extensions</b>: Optional extensions for the CRL.</p> <ul> <li> <p> <b>X509v3 Authority Key Identifier</b>: Identifies the public key associated with the private key used to sign the certificate.</p> </li> <li> <p> <b>X509v3 CRL Number:</b>: Decimal sequence number for the CRL.</p> </li> </ul> </li> <li> <p> <b>Signature Algorithm</b>: Algorithm used by your private CA to sign the CRL.</p> </li> <li> <p> <b>Signature Value</b>: Signature computed over the CRL.</p> </li> </ul> <p>Certificate revocation lists created by Amazon Web Services Private CA are DER-encoded. You can use the following OpenSSL command to list a CRL.</p> <p> <code>openssl crl -inform DER -text -in <i>crl_path</i> -noout</code> </p> <p>For more information, see <a href=\"https://docs.aws.amazon.com/privateca/latest/userguide/crl-planning.html\">Planning a certificate revocation list (CRL)</a> in the <i>Amazon Web Services Private Certificate Authority User Guide</i> </p>"
@@ -903,6 +911,19 @@
903911
},
904912
"documentation":"<p>Contains configuration information for the default behavior of the CRL Distribution Point (CDP) extension in certificates issued by your CA. This extension contains a link to download the CRL, so you can check whether a certificate has been revoked. To choose whether you want this extension omitted or not in certificates issued by your CA, you can set the <b>OmitExtension</b> parameter.</p>"
905913
},
914+
"CrlPathString":{
915+
"type":"string",
916+
"max":253,
917+
"min":0,
918+
"pattern":"[-a-zA-Z0-9;?:@&=+$,%_.!~*()']+(/[-a-zA-Z0-9;?:@&=+$,%_.!~*()']+)*"
919+
},
920+
"CrlType":{
921+
"type":"string",
922+
"enum":[
923+
"COMPLETE",
924+
"PARTITIONED"
925+
]
926+
},
906927
"CsrBlob":{
907928
"type":"blob",
908929
"max":32768,
Lines changed: 62 additions & 74 deletions
Original file line numberDiff line numberDiff line change
@@ -1,76 +1,64 @@
11
{
2-
"version": 2,
3-
"waiters": {
4-
"CertificateAuthorityCSRCreated": {
5-
"description": "Wait until a Certificate Authority CSR is created",
6-
"operation": "GetCertificateAuthorityCsr",
7-
"delay": 3,
8-
"maxAttempts": 60,
9-
"acceptors": [
10-
{
11-
"state": "success",
12-
"matcher": "status",
13-
"expected": 200
14-
},
15-
{
16-
"state": "retry",
17-
"matcher": "error",
18-
"expected": "RequestInProgressException"
19-
},
20-
{
21-
"state": "failure",
22-
"matcher": "error",
23-
"expected": "AccessDeniedException"
24-
}
25-
]
26-
},
27-
"CertificateIssued": {
28-
"description": "Wait until a certificate is issued",
29-
"operation": "GetCertificate",
30-
"delay": 1,
31-
"maxAttempts": 60,
32-
"acceptors": [
33-
{
34-
"state": "success",
35-
"matcher": "status",
36-
"expected": 200
37-
},
38-
{
39-
"state": "retry",
40-
"matcher": "error",
41-
"expected": "RequestInProgressException"
42-
},
43-
{
44-
"state": "failure",
45-
"matcher": "error",
46-
"expected": "AccessDeniedException"
47-
}
48-
]
49-
},
50-
"AuditReportCreated": {
51-
"description": "Wait until a Audit Report is created",
52-
"operation": "DescribeCertificateAuthorityAuditReport",
53-
"delay": 3,
54-
"maxAttempts": 60,
55-
"acceptors": [
56-
{
57-
"state": "success",
58-
"matcher": "path",
59-
"argument": "AuditReportStatus",
60-
"expected": "SUCCESS"
61-
},
62-
{
63-
"state": "failure",
64-
"matcher": "path",
65-
"argument": "AuditReportStatus",
66-
"expected": "FAILED"
67-
},
68-
{
69-
"state": "failure",
70-
"matcher": "error",
71-
"expected": "AccessDeniedException"
72-
}
73-
]
74-
}
2+
"version" : 2,
3+
"waiters" : {
4+
"AuditReportCreated" : {
5+
"description" : "Wait until a Audit Report is created",
6+
"delay" : 3,
7+
"maxAttempts" : 60,
8+
"operation" : "DescribeCertificateAuthorityAuditReport",
9+
"acceptors" : [ {
10+
"matcher" : "path",
11+
"argument" : "AuditReportStatus",
12+
"state" : "success",
13+
"expected" : "SUCCESS"
14+
}, {
15+
"matcher" : "path",
16+
"argument" : "AuditReportStatus",
17+
"state" : "failure",
18+
"expected" : "FAILED"
19+
}, {
20+
"matcher" : "error",
21+
"state" : "failure",
22+
"expected" : "AccessDeniedException"
23+
} ]
24+
},
25+
"CertificateAuthorityCSRCreated" : {
26+
"description" : "Wait until a Certificate Authority CSR is created",
27+
"delay" : 3,
28+
"maxAttempts" : 60,
29+
"operation" : "GetCertificateAuthorityCsr",
30+
"acceptors" : [ {
31+
"matcher" : "error",
32+
"state" : "success",
33+
"expected" : false
34+
}, {
35+
"matcher" : "error",
36+
"state" : "retry",
37+
"expected" : "RequestInProgressException"
38+
}, {
39+
"matcher" : "error",
40+
"state" : "failure",
41+
"expected" : "AccessDeniedException"
42+
} ]
43+
},
44+
"CertificateIssued" : {
45+
"description" : "Wait until a certificate is issued",
46+
"delay" : 1,
47+
"maxAttempts" : 60,
48+
"operation" : "GetCertificate",
49+
"acceptors" : [ {
50+
"matcher" : "error",
51+
"state" : "success",
52+
"expected" : false
53+
}, {
54+
"matcher" : "error",
55+
"state" : "retry",
56+
"expected" : "RequestInProgressException"
57+
}, {
58+
"matcher" : "error",
59+
"state" : "failure",
60+
"expected" : "AccessDeniedException"
61+
} ]
7562
}
76-
}
63+
}
64+
}

botocore/data/appsync/2017-07-25/service-2.json

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1372,7 +1372,7 @@
13721372
},
13731373
"apiCachingBehavior":{
13741374
"shape":"ApiCachingBehavior",
1375-
"documentation":"<p>Caching behavior.</p> <ul> <li> <p> <b>FULL_REQUEST_CACHING</b>: All requests are fully cached.</p> </li> <li> <p> <b>PER_RESOLVER_CACHING</b>: Individual resolvers that you specify are cached.</p> </li> </ul>"
1375+
"documentation":"<p>Caching behavior.</p> <ul> <li> <p> <b>FULL_REQUEST_CACHING</b>: All requests from the same user are cached. Individual resolvers are automatically cached. All API calls will try to return responses from the cache.</p> </li> <li> <p> <b>PER_RESOLVER_CACHING</b>: Individual resolvers that you specify are cached.</p> </li> <li> <p> <b>OPERATION_LEVEL_CACHING</b>: Full requests are cached together and returned without executing resolvers.</p> </li> </ul>"
13761376
},
13771377
"transitEncryptionEnabled":{
13781378
"shape":"Boolean",
@@ -1431,7 +1431,8 @@
14311431
"type":"string",
14321432
"enum":[
14331433
"FULL_REQUEST_CACHING",
1434-
"PER_RESOLVER_CACHING"
1434+
"PER_RESOLVER_CACHING",
1435+
"OPERATION_LEVEL_CACHING"
14351436
]
14361437
},
14371438
"ApiKey":{
@@ -1967,7 +1968,7 @@
19671968
},
19681969
"apiCachingBehavior":{
19691970
"shape":"ApiCachingBehavior",
1970-
"documentation":"<p>Caching behavior.</p> <ul> <li> <p> <b>FULL_REQUEST_CACHING</b>: All requests are fully cached.</p> </li> <li> <p> <b>PER_RESOLVER_CACHING</b>: Individual resolvers that you specify are cached.</p> </li> </ul>"
1971+
"documentation":"<p>Caching behavior.</p> <ul> <li> <p> <b>FULL_REQUEST_CACHING</b>: All requests from the same user are cached. Individual resolvers are automatically cached. All API calls will try to return responses from the cache.</p> </li> <li> <p> <b>PER_RESOLVER_CACHING</b>: Individual resolvers that you specify are cached.</p> </li> <li> <p> <b>OPERATION_LEVEL_CACHING</b>: Full requests are cached together and returned without executing resolvers.</p> </li> </ul>"
19711972
},
19721973
"type":{
19731974
"shape":"ApiCacheType",
@@ -5317,7 +5318,7 @@
53175318
},
53185319
"apiCachingBehavior":{
53195320
"shape":"ApiCachingBehavior",
5320-
"documentation":"<p>Caching behavior.</p> <ul> <li> <p> <b>FULL_REQUEST_CACHING</b>: All requests are fully cached.</p> </li> <li> <p> <b>PER_RESOLVER_CACHING</b>: Individual resolvers that you specify are cached.</p> </li> </ul>"
5321+
"documentation":"<p>Caching behavior.</p> <ul> <li> <p> <b>FULL_REQUEST_CACHING</b>: All requests from the same user are cached. Individual resolvers are automatically cached. All API calls will try to return responses from the cache.</p> </li> <li> <p> <b>PER_RESOLVER_CACHING</b>: Individual resolvers that you specify are cached.</p> </li> <li> <p> <b>OPERATION_LEVEL_CACHING</b>: Full requests are cached together and returned without executing resolvers.</p> </li> </ul>"
53215322
},
53225323
"type":{
53235324
"shape":"ApiCacheType",

0 commit comments

Comments
 (0)