Skip to content

Commit c28d1d2

Browse files
committed
Update services based on release-2025-06-12 of AWS Go SDK
Reference: https://github.com/aws/aws-sdk-go-v2/releases/tag/release-2025-06-12
1 parent d9838ff commit c28d1d2

File tree

6 files changed

+164
-55
lines changed

6 files changed

+164
-55
lines changed

.latest-tag-aws-sdk-go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
release-2025-06-11
1+
release-2025-06-12

lib/aws/generated/api_gateway_v2.ex

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3117,7 +3117,7 @@ defmodule AWS.ApiGatewayV2 do
31173117
end
31183118

31193119
@doc """
3120-
Creates a RoutingRule
3120+
Creates a RoutingRule.
31213121
"""
31223122
@spec create_routing_rule(map(), String.t(), create_routing_rule_request(), list()) ::
31233123
{:ok, create_routing_rule_response(), any()}

lib/aws/generated/connect_campaigns_v2.ex

Lines changed: 120 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -171,6 +171,17 @@ defmodule AWS.ConnectCampaignsV2 do
171171

172172
@typedoc """
173173
174+
## Example:
175+
176+
instance_communication_limits_config() :: %{
177+
"allChannelSubtypes" => list()
178+
}
179+
180+
"""
181+
@type instance_communication_limits_config() :: %{String.t() => any()}
182+
183+
@typedoc """
184+
174185
## Example:
175186
176187
delete_campaign_channel_subtype_config_request() :: %{
@@ -508,6 +519,17 @@ defmodule AWS.ConnectCampaignsV2 do
508519

509520
@typedoc """
510521
522+
## Example:
523+
524+
put_instance_communication_limits_request() :: %{
525+
required("communicationLimitsConfig") => instance_communication_limits_config()
526+
}
527+
528+
"""
529+
@type put_instance_communication_limits_request() :: %{String.t() => any()}
530+
531+
@typedoc """
532+
511533
## Example:
512534
513535
get_campaign_state_request() :: %{}
@@ -613,6 +635,15 @@ defmodule AWS.ConnectCampaignsV2 do
613635

614636
@typedoc """
615637
638+
## Example:
639+
640+
get_instance_communication_limits_request() :: %{}
641+
642+
"""
643+
@type get_instance_communication_limits_request() :: %{}
644+
645+
@typedoc """
646+
616647
## Example:
617648
618649
list_connect_instance_integrations_response() :: %{
@@ -679,7 +710,8 @@ defmodule AWS.ConnectCampaignsV2 do
679710
## Example:
680711
681712
communication_limits_config() :: %{
682-
"allChannelSubtypes" => list()
713+
"allChannelSubtypes" => list(),
714+
"instanceLimitsHandling" => String.t()
683715
}
684716
685717
"""
@@ -1093,6 +1125,17 @@ defmodule AWS.ConnectCampaignsV2 do
10931125

10941126
@typedoc """
10951127
1128+
## Example:
1129+
1130+
get_instance_communication_limits_response() :: %{
1131+
"communicationLimitsConfig" => instance_communication_limits_config()
1132+
}
1133+
1134+
"""
1135+
@type get_instance_communication_limits_response() :: %{String.t() => any()}
1136+
1137+
@typedoc """
1138+
10961139
## Example:
10971140
10981141
campaign_summary() :: %{
@@ -1249,6 +1292,12 @@ defmodule AWS.ConnectCampaignsV2 do
12491292
| internal_server_exception()
12501293
| resource_not_found_exception()
12511294

1295+
@type get_instance_communication_limits_errors() ::
1296+
validation_exception()
1297+
| access_denied_exception()
1298+
| internal_server_exception()
1299+
| resource_not_found_exception()
1300+
12521301
@type get_instance_onboarding_job_status_errors() ::
12531302
validation_exception()
12541303
| access_denied_exception()
@@ -1289,6 +1338,13 @@ defmodule AWS.ConnectCampaignsV2 do
12891338
| resource_not_found_exception()
12901339
| conflict_exception()
12911340

1341+
@type put_instance_communication_limits_errors() ::
1342+
validation_exception()
1343+
| access_denied_exception()
1344+
| internal_server_exception()
1345+
| resource_not_found_exception()
1346+
| conflict_exception()
1347+
12921348
@type put_outbound_request_batch_errors() ::
12931349
throttling_exception()
12941350
| validation_exception()
@@ -1817,6 +1873,26 @@ defmodule AWS.ConnectCampaignsV2 do
18171873
Request.request_rest(client, meta, :get, url_path, query_params, headers, nil, options, 200)
18181874
end
18191875

1876+
@doc """
1877+
Get the instance communication limits.
1878+
"""
1879+
@spec get_instance_communication_limits(map(), String.t(), list()) ::
1880+
{:ok, get_instance_communication_limits_response(), any()}
1881+
| {:error, {:unexpected_response, any()}}
1882+
| {:error, term()}
1883+
| {:error, get_instance_communication_limits_errors()}
1884+
def get_instance_communication_limits(%Client{} = client, connect_instance_id, options \\ []) do
1885+
url_path =
1886+
"/v2/connect-instance/#{AWS.Util.encode_uri(connect_instance_id)}/communication-limits"
1887+
1888+
headers = []
1889+
query_params = []
1890+
1891+
meta = metadata()
1892+
1893+
Request.request_rest(client, meta, :get, url_path, query_params, headers, nil, options, 200)
1894+
end
1895+
18201896
@doc """
18211897
Get the specific instance onboarding job status.
18221898
"""
@@ -1996,6 +2072,49 @@ defmodule AWS.ConnectCampaignsV2 do
19962072
)
19972073
end
19982074

2075+
@doc """
2076+
Put the instance communication limits.
2077+
2078+
This API is idempotent.
2079+
"""
2080+
@spec put_instance_communication_limits(
2081+
map(),
2082+
String.t(),
2083+
put_instance_communication_limits_request(),
2084+
list()
2085+
) ::
2086+
{:ok, nil, any()}
2087+
| {:error, {:unexpected_response, any()}}
2088+
| {:error, term()}
2089+
| {:error, put_instance_communication_limits_errors()}
2090+
def put_instance_communication_limits(
2091+
%Client{} = client,
2092+
connect_instance_id,
2093+
input,
2094+
options \\ []
2095+
) do
2096+
url_path =
2097+
"/v2/connect-instance/#{AWS.Util.encode_uri(connect_instance_id)}/communication-limits"
2098+
2099+
headers = []
2100+
custom_headers = []
2101+
query_params = []
2102+
2103+
meta = metadata()
2104+
2105+
Request.request_rest(
2106+
client,
2107+
meta,
2108+
:put,
2109+
url_path,
2110+
query_params,
2111+
custom_headers ++ headers,
2112+
input,
2113+
options,
2114+
200
2115+
)
2116+
end
2117+
19992118
@doc """
20002119
Creates outbound requests for the specified campaign Amazon Connect account.
20012120

lib/aws/generated/ecs.ex

Lines changed: 2 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -5633,7 +5633,8 @@ defmodule AWS.ECS do
56335633
(provided that the cluster resources required to do this are available).
56345634
56355635
When
5636-
[UpdateService](https://docs.aws.amazon.com/AmazonECS/latest/APIReference/API_UpdateService.html) stops a task during a deployment, the equivalent of `docker stop` is issued
5636+
[UpdateService](https://docs.aws.amazon.com/AmazonECS/latest/APIReference/API_UpdateService.html)
5637+
stops a task during a deployment, the equivalent of `docker stop` is issued
56375638
to the containers running in the task. This results in a `SIGTERM` and a
56385639
30-second timeout. After this, `SIGKILL` is sent and the containers are
56395640
forcibly stopped. If the container handles the `SIGTERM` gracefully and exits
@@ -5680,22 +5681,6 @@ defmodule AWS.ECS do
56805681
Stop the task on a container instance in an optimal Availability Zone (based
56815682
on the previous steps), favoring container instances with the largest number of
56825683
running tasks for this service.
5683-
5684-
You must have a service-linked role when you update any of the following service
5685-
properties:
5686-
5687-
5688-
5689-
`loadBalancers`,
5690-
5691-
5692-
5693-
`serviceRegistries`
5694-
5695-
For more information about the role see the `CreateService` request
5696-
parameter [
5697-
`role`
5698-
](https://docs.aws.amazon.com/AmazonECS/latest/APIReference/API_CreateService.html#ECS-CreateService-request-role).
56995684
"""
57005685
@spec update_service(map(), update_service_request(), list()) ::
57015686
{:ok, update_service_response(), any()}

lib/aws/generated/emr_serverless.ex

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -162,6 +162,7 @@ defmodule AWS.EMRServerless do
162162
"createdAt" => non_neg_integer(),
163163
"createdBy" => String.t(),
164164
"endedAt" => non_neg_integer(),
165+
"executionIamPolicy" => job_run_execution_iam_policy(),
165166
"executionRole" => String.t(),
166167
"executionTimeoutMinutes" => float(),
167168
"jobDriver" => list(),

lib/aws/generated/kms.ex

Lines changed: 39 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -3143,27 +3143,30 @@ defmodule AWS.KMS do
31433143
verify.
31443144
You can't change these properties after the KMS key is created.
31453145
3146-
Asymmetric KMS keys contain an RSA key pair, Elliptic Curve (ECC) key pair, or
3147-
an
3148-
SM2 key pair (China Regions only). The private key in an asymmetric KMS key
3149-
never leaves
3150-
KMS unencrypted. However, you can use the `GetPublicKey` operation to
3151-
download the public key so it can be used outside of KMS. Each KMS key can have
3152-
only
3153-
one key usage. KMS keys with RSA key pairs can be used to encrypt and decrypt
3154-
data or
3155-
sign and verify messages (but not both). KMS keys with NIST-recommended ECC key
3146+
Asymmetric KMS keys contain an RSA key pair, Elliptic Curve (ECC) key pair,
3147+
ML-DSA
3148+
key pair or an SM2 key pair (China Regions only). The private key in an
3149+
asymmetric KMS
3150+
key never leaves KMS unencrypted. However, you can use the `GetPublicKey`
3151+
operation to download the public key so it can be used
3152+
outside of KMS. Each KMS key can have only one key usage. KMS keys with RSA key
31563153
pairs
3157-
can be used to sign and verify messages or derive shared secrets (but not both).
3158-
KMS
3159-
keys with `ECC_SECG_P256K1` can be used only to sign and verify messages. KMS
3160-
keys with SM2 key pairs (China Regions only) can be used to either encrypt and
3161-
decrypt
3162-
data, sign and verify messages, or derive shared secrets (you must choose one
3163-
key usage
3164-
type). For information about asymmetric KMS keys, see [Asymmetric KMS keys](https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html)
3165-
in the
3166-
*Key Management Service Developer Guide*.
3154+
can be used to encrypt and decrypt data or sign and verify messages (but not
3155+
both). KMS
3156+
keys with NIST-recommended ECC key pairs can be used to sign and verify messages
3157+
or
3158+
derive shared secrets (but not both). KMS keys with `ECC_SECG_P256K1` can be
3159+
used only to sign and verify messages. KMS keys with ML-DSA key pairs can be
3160+
used to
3161+
sign and verify messages. KMS keys with SM2 key pairs (China Regions only) can
3162+
be used
3163+
to either encrypt and decrypt data, sign and verify messages, or derive shared
3164+
secrets
3165+
(you must choose one key usage type). For information about asymmetric KMS keys,
3166+
see
3167+
[Asymmetric KMS
3168+
keys](https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html)
3169+
in the *Key Management Service Developer Guide*.
31673170
31683171
### HMAC KMS key
31693172
@@ -6328,9 +6331,9 @@ defmodule AWS.KMS do
63286331
KMS key.
63296332
63306333
You can perform [on-demand rotation](https://docs.aws.amazon.com/kms/latest/developerguide/rotating-keys-on-demand.html)
6331-
of
6332-
the key material in customer managed KMS keys, regardless of whether or not
6333-
[automatic key rotation](https://docs.aws.amazon.com/kms/latest/developerguide/rotating-keys-enable-disable.html)
6334+
of the key
6335+
material in customer managed KMS keys, regardless of whether or not [automatic key
6336+
rotation](https://docs.aws.amazon.com/kms/latest/developerguide/rotating-keys-enable-disable.html)
63346337
is enabled. On-demand rotations do not change existing automatic rotation
63356338
schedules. For example, consider a KMS key that has automatic key rotation
63366339
enabled with a
@@ -6528,14 +6531,14 @@ defmodule AWS.KMS do
65286531
in the *Key Management Service Developer Guide*.
65296532
65306533
Digital signatures are generated and verified by using asymmetric key pair, such
6531-
as an RSA
6532-
or ECC pair that is represented by an asymmetric KMS key. The key owner (or an
6533-
authorized
6534-
user) uses their private key to sign a message. Anyone with the public key can
6535-
verify that the
6536-
message was signed with that particular private key and that the message hasn't
6537-
changed since
6538-
it was signed.
6534+
as an
6535+
RSA, ECC, or ML-DSA pair that is represented by an asymmetric KMS key. The key
6536+
owner (or an
6537+
authorized user) uses their private key to sign a message. Anyone with the
6538+
public key can
6539+
verify that the message was signed with that particular private key and that the
6540+
message
6541+
hasn't changed since it was signed.
65396542
65406543
To use the `Sign` operation, provide the following information:
65416544
@@ -6550,9 +6553,9 @@ defmodule AWS.KMS do
65506553
sign. You can submit messages of up to 4096 bytes. To sign a larger message,
65516554
generate a
65526555
hash digest of the message, and then provide the hash digest in the `Message`
6553-
parameter. To indicate whether the message is a full message or a digest, use
6554-
the
6555-
`MessageType` parameter.
6556+
parameter. To indicate whether the message is a full message, a digest, or an
6557+
ML-DSA
6558+
EXTERNAL_MU, use the `MessageType` parameter.
65566559
65576560
*
65586561
Choose a signing algorithm that is compatible with the KMS key.
@@ -7014,7 +7017,8 @@ defmodule AWS.KMS do
70147017
in `us-east-1` and a replica key in `eu-west-2`. If you run
70157018
`UpdatePrimaryRegion` with a `PrimaryRegion` value of
70167019
`eu-west-2`, the primary key is now the key in `eu-west-2`, and the
7017-
key in `us-east-1` becomes a replica key. For details, see [Change the primary key in a set of multi-Region
7020+
key in `us-east-1` becomes a replica key. For details, see [Change the primary key in a
7021+
set of multi-Region
70187022
keys](https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-update.html)
70197023
in the *Key Management Service Developer Guide*.
70207024

0 commit comments

Comments
 (0)