Skip to content

Commit 1945819

Browse files
Merge branch 'release-1.42.15' into develop
* release-1.42.15: Bumping version to 1.42.15 Update to latest models
2 parents 0e202ba + fde2b7d commit 1945819

File tree

8 files changed

+148
-14
lines changed

8 files changed

+148
-14
lines changed

.changes/1.42.15.json

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
[
2+
{
3+
"category": "``config``",
4+
"description": "Added supported resourceTypes for Config from July to November 2025",
5+
"type": "api-change"
6+
},
7+
{
8+
"category": "``ec2``",
9+
"description": "Adds support for linkedGroupId on the CreatePlacementGroup and DescribePlacementGroups APIs. The linkedGroupId parameter is reserved for future use.",
10+
"type": "api-change"
11+
},
12+
{
13+
"category": "``guardduty``",
14+
"description": "Make accountIds a required field in GetRemainingFreeTrialDays API to reflect service behavior.",
15+
"type": "api-change"
16+
},
17+
{
18+
"category": "``pcs``",
19+
"description": "Change API Reference Documentation for default Mode in Accounting and SlurmRest",
20+
"type": "api-change"
21+
}
22+
]

CHANGELOG.rst

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,15 @@
22
CHANGELOG
33
=========
44

5+
1.42.15
6+
=======
7+
8+
* api-change:``config``: Added supported resourceTypes for Config from July to November 2025
9+
* api-change:``ec2``: Adds support for linkedGroupId on the CreatePlacementGroup and DescribePlacementGroups APIs. The linkedGroupId parameter is reserved for future use.
10+
* api-change:``guardduty``: Make accountIds a required field in GetRemainingFreeTrialDays API to reflect service behavior.
11+
* api-change:``pcs``: Change API Reference Documentation for default Mode in Accounting and SlurmRest
12+
13+
514
1.42.14
615
=======
716

botocore/__init__.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@
1717
import re
1818
from logging import NullHandler
1919

20-
__version__ = '1.42.14'
20+
__version__ = '1.42.15'
2121

2222

2323
# Configure default logger to do nothing

botocore/data/config/2014-11-12/service-2.json

Lines changed: 93 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2612,7 +2612,7 @@
26122612
},
26132613
"roleARN":{
26142614
"shape":"String",
2615-
"documentation":"<p>The Amazon Resource Name (ARN) of the IAM role assumed by Config and used by the specified configuration recorder.</p> <note> <p> <b>The server will reject a request without a defined <code>roleARN</code> for the configuration recorder</b> </p> <p>While the API model does not require this field, the server will reject a request without a defined <code>roleARN</code> for the configuration recorder.</p> <p> <b>Policies and compliance results</b> </p> <p> <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html\">IAM policies</a> and <a href=\"https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies.html\">other policies managed in Organizations</a> can impact whether Config has permissions to record configuration changes for your resources. Additionally, rules directly evaluate the configuration of a resource and rules don't take into account these policies when running evaluations. Make sure that the policies in effect align with how you intend to use Config.</p> <p> <b>Keep Minimum Permisions When Reusing an IAM role</b> </p> <p>If you use an Amazon Web Services service that uses Config, such as Security Hub or Control Tower, and an IAM role has already been created, make sure that the IAM role that you use when setting up Config keeps the same minimum permissions as the pre-existing IAM role. You must do this to ensure that the other Amazon Web Services service continues to run as expected. </p> <p>For example, if Control Tower has an IAM role that allows Config to read S3 objects, make sure that the same permissions are granted to the IAM role you use when setting up Config. Otherwise, it may interfere with how Control Tower operates.</p> <p> <b>The service-linked IAM role for Config must be used for service-linked configuration recorders</b> </p> <p>For service-linked configuration recorders, you must use the service-linked IAM role for Config: <a href=\"https://docs.aws.amazon.com/config/latest/developerguide/using-service-linked-roles.html\">AWSServiceRoleForConfig</a>.</p> </note>"
2615+
"documentation":"<p>The Amazon Resource Name (ARN) of the IAM role assumed by Config and used by the specified configuration recorder.</p> <note> <p> <b>The server will reject a request without a defined <code>roleARN</code> for the configuration recorder</b> </p> <p>While the API model does not require this field, the server will reject a request without a defined <code>roleARN</code> for the configuration recorder.</p> <p> <b>Policies and compliance results</b> </p> <p> <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html\">IAM policies</a> and <a href=\"https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies.html\">other policies managed in Organizations</a> can impact whether Config has permissions to record configuration changes for your resources. Additionally, rules directly evaluate the configuration of a resource and rules don't take into account these policies when running evaluations. Make sure that the policies in effect align with how you intend to use Config.</p> <p> <b>Keep Minimum Permisions When Reusing an IAM role</b> </p> <p>If you use an Amazon Web Services service that uses Config, such as Security Hub CSPM or Control Tower, and an IAM role has already been created, make sure that the IAM role that you use when setting up Config keeps the same minimum permissions as the pre-existing IAM role. You must do this to ensure that the other Amazon Web Services service continues to run as expected. </p> <p>For example, if Control Tower has an IAM role that allows Config to read S3 objects, make sure that the same permissions are granted to the IAM role you use when setting up Config. Otherwise, it may interfere with how Control Tower operates.</p> <p> <b>The service-linked IAM role for Config must be used for service-linked configuration recorders</b> </p> <p>For service-linked configuration recorders, you must use the service-linked IAM role for Config: <a href=\"https://docs.aws.amazon.com/config/latest/developerguide/using-service-linked-roles.html\">AWSServiceRoleForConfig</a>.</p> </note>"
26162616
},
26172617
"recordingGroup":{
26182618
"shape":"RecordingGroup",
@@ -8022,7 +8022,98 @@
80228022
"AWS::S3Express::DirectoryBucket",
80238023
"AWS::SageMaker::InferenceExperiment",
80248024
"AWS::SecurityHub::Standard",
8025-
"AWS::Transfer::Profile"
8025+
"AWS::Transfer::Profile",
8026+
"AWS::CloudFormation::StackSet",
8027+
"AWS::MediaPackageV2::Channel",
8028+
"AWS::S3::AccessGrantsLocation",
8029+
"AWS::S3::AccessGrant",
8030+
"AWS::S3::AccessGrantsInstance",
8031+
"AWS::EMRServerless::Application",
8032+
"AWS::Config::AggregationAuthorization",
8033+
"AWS::Bedrock::ApplicationInferenceProfile",
8034+
"AWS::ApiGatewayV2::Integration",
8035+
"AWS::SageMaker::MlflowTrackingServer",
8036+
"AWS::SageMaker::ModelBiasJobDefinition",
8037+
"AWS::SecretsManager::RotationSchedule",
8038+
"AWS::Deadline::QueueFleetAssociation",
8039+
"AWS::ECR::RepositoryCreationTemplate",
8040+
"AWS::CloudFormation::LambdaHook",
8041+
"AWS::EC2::SubnetNetworkAclAssociation",
8042+
"AWS::ApiGateway::UsagePlan",
8043+
"AWS::AppConfig::Extension",
8044+
"AWS::Deadline::Fleet",
8045+
"AWS::EMR::Studio",
8046+
"AWS::S3Tables::TableBucket",
8047+
"AWS::CloudFront::RealtimeLogConfig",
8048+
"AWS::BackupGateway::Hypervisor",
8049+
"AWS::BCMDataExports::Export",
8050+
"AWS::CloudFormation::GuardHook",
8051+
"AWS::CloudFront::PublicKey",
8052+
"AWS::CloudTrail::EventDataStore",
8053+
"AWS::EntityResolution::IdMappingWorkflow",
8054+
"AWS::EntityResolution::SchemaMapping",
8055+
"AWS::IoT::DomainConfiguration",
8056+
"AWS::PCAConnectorAD::DirectoryRegistration",
8057+
"AWS::RDS::Integration",
8058+
"AWS::Config::ConformancePack",
8059+
"AWS::RolesAnywhere::Profile",
8060+
"AWS::CodeArtifact::Domain",
8061+
"AWS::Backup::RestoreTestingPlan",
8062+
"AWS::Config::StoredQuery",
8063+
"AWS::SageMaker::DataQualityJobDefinition",
8064+
"AWS::SageMaker::ModelExplainabilityJobDefinition",
8065+
"AWS::SageMaker::ModelQualityJobDefinition",
8066+
"AWS::SageMaker::StudioLifecycleConfig",
8067+
"AWS::SES::DedicatedIpPool",
8068+
"AWS::SES::MailManagerTrafficPolicy",
8069+
"AWS::SSM::ResourceDataSync",
8070+
"AWS::BedrockAgentCore::Runtime",
8071+
"AWS::BedrockAgentCore::BrowserCustom",
8072+
"AWS::ElasticLoadBalancingV2::TargetGroup",
8073+
"AWS::EMRContainers::VirtualCluster",
8074+
"AWS::EntityResolution::MatchingWorkflow",
8075+
"AWS::IoTCoreDeviceAdvisor::SuiteDefinition",
8076+
"AWS::EC2::SecurityGroupVpcAssociation",
8077+
"AWS::EC2::VerifiedAccessInstance",
8078+
"AWS::KafkaConnect::CustomPlugin",
8079+
"AWS::NetworkManager::TransitGatewayPeering",
8080+
"AWS::OpenSearchServerless::SecurityConfig",
8081+
"AWS::Redshift::Integration",
8082+
"AWS::RolesAnywhere::TrustAnchor",
8083+
"AWS::Route53Profiles::ProfileAssociation",
8084+
"AWS::SSMIncidents::ResponsePlan",
8085+
"AWS::Transfer::Server",
8086+
"AWS::Glue::Database",
8087+
"AWS::Organizations::OrganizationalUnit",
8088+
"AWS::EC2::IPAMPoolCidr",
8089+
"AWS::EC2::VPCGatewayAttachment",
8090+
"AWS::Bedrock::Prompt",
8091+
"AWS::Comprehend::Flywheel",
8092+
"AWS::DataSync::Agent",
8093+
"AWS::MediaTailor::LiveSource",
8094+
"AWS::MSK::ServerlessCluster",
8095+
"AWS::IoTSiteWise::Asset",
8096+
"AWS::B2BI::Capability",
8097+
"AWS::CloudFront::KeyValueStore",
8098+
"AWS::Deadline::Monitor",
8099+
"AWS::GuardDuty::MalwareProtectionPlan",
8100+
"AWS::Location::APIKey",
8101+
"AWS::MediaPackageV2::OriginEndpoint",
8102+
"AWS::PCAConnectorAD::Connector",
8103+
"AWS::S3Tables::TableBucketPolicy",
8104+
"AWS::SecretsManager::ResourcePolicy",
8105+
"AWS::SSMContacts::Contact",
8106+
"AWS::IoT::ThingGroup",
8107+
"AWS::ImageBuilder::LifecyclePolicy",
8108+
"AWS::GameLift::Build",
8109+
"AWS::ECR::ReplicationConfiguration",
8110+
"AWS::EC2::SubnetCidrBlock",
8111+
"AWS::Connect::SecurityProfile",
8112+
"AWS::CleanRoomsML::TrainingDataset",
8113+
"AWS::AppStream::AppBlockBuilder",
8114+
"AWS::Route53::DNSSEC",
8115+
"AWS::SageMaker::UserProfile",
8116+
"AWS::ApiGateway::Method"
80268117
]
80278118
},
80288119
"ResourceTypeList":{

botocore/data/ec2/2016-11-15/service-2.json

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17542,6 +17542,10 @@
1754217542
"shape":"SpreadLevel",
1754317543
"documentation":"<p>Determines how placement groups spread instances. </p> <ul> <li> <p>Host – You can use <code>host</code> only with Outpost placement groups.</p> </li> <li> <p>Rack – No usage restrictions.</p> </li> </ul>"
1754417544
},
17545+
"LinkedGroupId":{
17546+
"shape":"PlacementGroupId",
17547+
"documentation":"<p>Reserved for future use.</p>"
17548+
},
1754517549
"DryRun":{
1754617550
"shape":"Boolean",
1754717551
"documentation":"<p>Checks whether you have the required permissions for the operation, without actually making the request, and provides an error response. If you have the required permissions, the error response is <code>DryRunOperation</code>. Otherwise, it is <code>UnauthorizedOperation</code>.</p>",
@@ -58338,6 +58342,11 @@
5833858342
"shape":"SpreadLevel",
5833958343
"documentation":"<p>The spread level for the placement group. <i>Only</i> Outpost placement groups can be spread across hosts.</p>",
5834058344
"locationName":"spreadLevel"
58345+
},
58346+
"LinkedGroupId":{
58347+
"shape":"PlacementGroupId",
58348+
"documentation":"<p>Reserved for future use.</p>",
58349+
"locationName":"linkedGroupId"
5834158350
}
5834258351
},
5834358352
"documentation":"<p>Describes a placement group.</p>"

botocore/data/guardduty/2017-11-28/service-2.json

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5839,7 +5839,10 @@
58395839
},
58405840
"GetRemainingFreeTrialDaysRequest":{
58415841
"type":"structure",
5842-
"required":["DetectorId"],
5842+
"required":[
5843+
"AccountIds",
5844+
"DetectorId"
5845+
],
58435846
"members":{
58445847
"DetectorId":{
58455848
"shape":"DetectorId",

botocore/data/pcs/2023-02-10/service-2.json

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -382,7 +382,7 @@
382382
},
383383
"mode":{
384384
"shape":"AccountingMode",
385-
"documentation":"<p>The default value for <code>mode</code> is <code>STANDARD</code>. A value of <code>STANDARD</code> means Slurm accounting is enabled.</p>"
385+
"documentation":"<p>The default value for <code>mode</code> is <code>NONE</code>. A value of <code>STANDARD</code> means Slurm accounting is enabled.</p>"
386386
}
387387
},
388388
"documentation":"<p>The accounting configuration includes configurable settings for Slurm accounting. It's a property of the <b>ClusterSlurmConfiguration</b> object.</p>"
@@ -410,7 +410,7 @@
410410
},
411411
"mode":{
412412
"shape":"AccountingMode",
413-
"documentation":"<p>The default value for <code>mode</code> is <code>STANDARD</code>. A value of <code>STANDARD</code> means Slurm accounting is enabled.</p>"
413+
"documentation":"<p>The default value for <code>mode</code> is <code>NONE</code>. A value of <code>STANDARD</code> means Slurm accounting is enabled.</p>"
414414
}
415415
},
416416
"documentation":"<p>The accounting configuration includes configurable settings for Slurm accounting. It's a property of the <b>ClusterSlurmConfiguration</b> object.</p>"
@@ -1252,14 +1252,14 @@
12521252
"members":{
12531253
"secretArn":{
12541254
"shape":"String",
1255-
"documentation":"<p>The Amazon Resource Name (ARN) of the AWS Secrets Manager secret containing the JWT key.</p>"
1255+
"documentation":"<p>The Amazon Resource Name (ARN) of the Amazon Web Services Secrets Manager secret containing the JWT key.</p>"
12561256
},
12571257
"secretVersion":{
12581258
"shape":"String",
1259-
"documentation":"<p>The version of the AWS Secrets Manager secret containing the JWT key.</p>"
1259+
"documentation":"<p>The version of the Amazon Web Services Secrets Manager secret containing the JWT key.</p>"
12601260
}
12611261
},
1262-
"documentation":"<p>The JWT key stored in AWS Secrets Manager for Slurm REST API authentication.</p>"
1262+
"documentation":"<p>The JWT key stored in Amazon Web Services Secrets Manager for Slurm REST API authentication.</p>"
12631263
},
12641264
"ListClustersRequest":{
12651265
"type":"structure",
@@ -1842,7 +1842,7 @@
18421842
"members":{
18431843
"mode":{
18441844
"shape":"SlurmRestMode",
1845-
"documentation":"<p>The default value for <code>mode</code> is <code>STANDARD</code>. A value of <code>STANDARD</code> means the Slurm REST API is enabled.</p>"
1845+
"documentation":"<p>The default value for <code>mode</code> is <code>NONE</code>. A value of <code>STANDARD</code> means the Slurm REST API is enabled.</p>"
18461846
}
18471847
},
18481848
"documentation":"<p>The Slurm REST API configuration includes settings for enabling and configuring the Slurm REST API. It's a property of the <b>ClusterSlurmConfiguration</b> object.</p>"
@@ -1860,7 +1860,7 @@
18601860
"members":{
18611861
"mode":{
18621862
"shape":"SlurmRestMode",
1863-
"documentation":"<p>The default value for <code>mode</code> is <code>STANDARD</code>. A value of <code>STANDARD</code> means the Slurm REST API is enabled.</p>"
1863+
"documentation":"<p>The default value for <code>mode</code> is <code>NONE</code>. A value of <code>STANDARD</code> means the Slurm REST API is enabled.</p>"
18641864
}
18651865
},
18661866
"documentation":"<p>The Slurm REST API configuration includes settings for enabling and configuring the Slurm REST API. It's a property of the <b>ClusterSlurmConfiguration</b> object.</p>"
@@ -1982,7 +1982,7 @@
19821982
},
19831983
"mode":{
19841984
"shape":"AccountingMode",
1985-
"documentation":"<p>The default value for <code>mode</code> is <code>STANDARD</code>. A value of <code>STANDARD</code> means Slurm accounting is enabled.</p>"
1985+
"documentation":"<p>The default value for <code>mode</code> is <code>NONE</code>. A value of <code>STANDARD</code> means Slurm accounting is enabled.</p>"
19861986
}
19871987
},
19881988
"documentation":"<p>The accounting configuration includes configurable settings for Slurm accounting.</p>"
@@ -2161,7 +2161,7 @@
21612161
"members":{
21622162
"mode":{
21632163
"shape":"SlurmRestMode",
2164-
"documentation":"<p>The default value for <code>mode</code> is <code>STANDARD</code>. A value of <code>STANDARD</code> means the Slurm REST API is enabled.</p>"
2164+
"documentation":"<p>The default value for <code>mode</code> is <code>NONE</code>. A value of <code>STANDARD</code> means the Slurm REST API is enabled.</p>"
21652165
}
21662166
},
21672167
"documentation":"<p>The Slurm REST API configuration includes settings for enabling and configuring the Slurm REST API.</p>"

docs/source/conf.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@
5959
# The short X.Y version.
6060
version = '1.42.'
6161
# The full version, including alpha/beta/rc tags.
62-
release = '1.42.14'
62+
release = '1.42.15'
6363

6464
# The language for content autogenerated by Sphinx. Refer to documentation
6565
# for a list of supported languages.

0 commit comments

Comments
 (0)