* `service/directconnect`: Updates service API, documentation, and paginators
* This update will introduce the ability for Direct Connect customers to take advantage of Link Aggregation (LAG). This allows you to bundle many individual physical interfaces into a single logical interface, referred to as a LAG. This makes administration much simpler as the majority of configuration is done on the LAG while you are free to add or remove physical interfaces from the bundle as bandwidth demand increases or decreases. A concrete example of the simplification added by LAG is that customers need only a single BGP session as opposed to one session per physical connection.
Release v1.6.24 (2017-02-16)
===
Service Client Updates
---
* `service/cognitoidentity`: Updates service API, documentation, and paginators
* Allow createIdentityPool and updateIdentityPool API to set server side token check value on identity pool
* `service/configservice`: Updates service API and documentation
* AWS Config now supports a new test mode for the PutEvaluations API. Set the TestMode parameter to true in your custom rule to verify whether your AWS Lambda function will deliver evaluation results to AWS Config. No updates occur to your existing evaluations, and evaluation results are not sent to AWS Config.
Release v1.6.23 (2017-02-15)
===
Service Client Updates
---
* `service/kms`: Updates service API, documentation, paginators, and examples
* his release of AWS Key Management Service introduces the ability to tag keys. Tagging keys can help you organize your keys and track your KMS costs in the cost allocation report. This release also increases the maximum length of a key ID to accommodate ARNs that include a long key alias.
@ -3651,18 +3924,18 @@ type CreateKeyInput struct {
// If you specify a policy and do not set BypassPolicyLockoutSafetyCheck to
// true, the policy must meet the following criteria:
//
// * It must allow the principal making the CreateKey request to make a subsequent
// PutKeyPolicy request on the CMK. This reduces the likelihood that the
// CMK becomes unmanageable. For more information, refer to the scenario
// in the Default Key Policy (http://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam)
// * It must allow the principal that is making the CreateKey request to
// make a subsequent PutKeyPolicy request on the CMK. This reduces the likelihood
// that the CMK becomes unmanageable. For more information, refer to the
// scenario in the Default Key Policy (http://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam)
// section in the AWS Key Management Service Developer Guide.
//
// * The principal(s) specified in the key policy must exist and be visible
// to AWS KMS. When you create a new AWS principal (for example, an IAM user
// or role), you might need to enforce a delay before specifying the new
// principal in a key policy because the new principal might not immediately
// be visible to AWS KMS. For more information, see Changes that I make are
// not always immediately visible (http://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_eventual-consistency)
// * The principals that are specified in the key policy must exist and be
// visible to AWS KMS. When you create a new AWS principal (for example,
// an IAM user or role), you might need to enforce a delay before specifying
// the new principal in a key policy because the new principal might not
// immediately be visible to AWS KMS. For more information, see Changes that
// I make are not always immediately visible (http://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_eventual-consistency)
// in the IAM User Guide.
//
// If you do not specify a policy, AWS KMS attaches a default key policy to
@ -3671,6 +3944,13 @@ type CreateKeyInput struct {
//
// The policy size limit is 32 KiB (32768 bytes).
Policy*string`min:"1" type:"string"`
// One or more tags. Each tag consists of a tag key and a tag value. Tag keys
// and tag values are both required, but tag values can be empty (null) strings.
//
// Use this parameter to tag the CMK when it is created. Alternately, you can
// omit this parameter and instead tag the CMK after it is created using TagResource.
Tags[]*Tag`type:"list"`
}
// String returns the string representation
@ -3689,6 +3969,16 @@ func (s *CreateKeyInput) Validate() error {
// Please also see https://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/ListRetirableGrantsRequest
typeListRetirableGrantsInputstruct{
_struct{}`type:"structure"`
// When paginating results, specify the maximum number of items to return in
// the response. If additional items exist beyond the number you specify, the
// Truncated element in the response is set to true.
// Use this parameter to specify the maximum number of items to return. When
// this value is present, AWS KMS does not return more than the specified number
// of items, but it might return fewer.
//
// This value is optional. If you include a value, it must be between 1 and
// 100, inclusive. If you do not include a value, it defaults to 50.
Limit*int64`min:"1" type:"integer"`
// Use this parameter only when paginating results and only in a subsequent
// request after you receive a response with truncated results. Set it to the
// value of NextMarker from the response you just received.
// Use this parameter in a subsequent request after you receive a response with
// truncated results. Set it to the value of NextMarker from the truncated response
// you just received.
Marker*string`min:"1" type:"string"`
// The retiring principal for which to list grants.
@ -6101,8 +6530,8 @@ type PutKeyPolicyInput struct {
// For more information, refer to the scenario in the Default Key Policy (http://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam)
// section in the AWS Key Management Service Developer Guide.
//
// Use this parameter only when you intend to prevent the principal making the
// request from making a subsequent PutKeyPolicy request on the CMK.
// Use this parameter only when you intend to prevent the principal that is
// making the request from making a subsequent PutKeyPolicy request on the CMK.
@ -6123,18 +6552,18 @@ type PutKeyPolicyInput struct {
// If you do not set BypassPolicyLockoutSafetyCheck to true, the policy must
// meet the following criteria:
//
// * It must allow the principal making the PutKeyPolicy request to make
// a subsequent PutKeyPolicy request on the CMK. This reduces the likelihood
// that the CMK becomes unmanageable. For more information, refer to the
// scenario in the Default Key Policy (http://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam)
// * It must allow the principal that is making the PutKeyPolicy request
// to make a subsequent PutKeyPolicy request on the CMK. This reduces the
// likelihood that the CMK becomes unmanageable. For more information, refer
// to the scenario in the Default Key Policy (http://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam)
// section in the AWS Key Management Service Developer Guide.
//
// * The principal(s) specified in the key policy must exist and be visible
// to AWS KMS. When you create a new AWS principal (for example, an IAM user
// or role), you might need to enforce a delay before specifying the new
// principal in a key policy because the new principal might not immediately
// be visible to AWS KMS. For more information, see Changes that I make are
// not always immediately visible (http://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_eventual-consistency)
// * The principals that are specified in the key policy must exist and be
// visible to AWS KMS. When you create a new AWS principal (for example,
// an IAM user or role), you might need to enforce a delay before specifying
// the new principal in a key policy because the new principal might not
// immediately be visible to AWS KMS. For more information, see Changes that
// I make are not always immediately visible (http://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_eventual-consistency)
// in the IAM User Guide.
//
// The policy size limit is 32 KiB (32768 bytes).
@ -6636,6 +7065,226 @@ func (s *ScheduleKeyDeletionOutput) SetKeyId(v string) *ScheduleKeyDeletionOutpu
returns
}
// A key-value pair. A tag consists of a tag key and a tag value. Tag keys and
// tag values are both required, but tag values can be empty (null) strings.
// Please also see https://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Tag