artemnikitin / devicefarm-ci-tool

Tool that helps you to run tests in AWS Device Farm easily
MIT License
15 stars 5 forks source link

Bump github.com/aws/aws-sdk-go from 1.19.11 to 1.20.3 #78

Closed dependabot-preview[bot] closed 5 years ago

dependabot-preview[bot] commented 5 years ago

Bumps github.com/aws/aws-sdk-go from 1.19.11 to 1.20.3.

Release notes *Sourced from [github.com/aws/aws-sdk-go's releases](https://github.com/aws/aws-sdk-go/releases).* > Release v1.20.3 (2019-06-18) > === > > ### Service Client Updates > * `service/ec2`: Updates service API > * You can now launch new 12xlarge, 24xlarge, and metal instance sizes on the Amazon EC2 compute optimized C5 instance types featuring 2nd Gen Intel Xeon Scalable Processors. > * `service/resourcegroupstaggingapi`: Updates service API, documentation, and paginators > * You can use tag policies to help standardize on tags across your organization's resources. > > Release v1.20.2 (2019-06-17) > === > > ### Service Client Updates > * `aws/endpoints`: Updated Regions and Endpoints metadata. > * `service/neptune`: Updates service API and documentation > * This release adds a feature to configure Amazon Neptune to publish audit logs to Amazon CloudWatch Logs. > * `service/robomaker`: Updates service API and documentation > * `service/servicecatalog`: Updates service API > * Restrict concurrent calls by a single customer account for CreatePortfolioShare and DeletePortfolioShare when sharing/unsharing to an Organization. > > Release v1.20.1 (2019-06-14) > === > > ### Service Client Updates > * `service/appstream`: Updates service API > * Added 2 new values(WINDOWS_SERVER_2016, WINDOWS_SERVER_2019) for PlatformType enum. > * `service/cloudfront`: Adds new service > * A new datatype in the CloudFront API, AliasICPRecordal, provides the ICP recordal status for CNAMEs associated with distributions. AWS services in China customers must file for an Internet Content Provider (ICP) recordal if they want to serve content publicly on an alternate domain name, also known as a CNAME, that they have added to CloudFront. The status value is returned in the CloudFront response; you cannot configure it yourself. The status is set to APPROVED for all CNAMEs (aliases) in regions outside of China. > * `service/ec2`: Updates service API > * Correction to enumerations in EC2 client. > * `aws/endpoints`: Updated Regions and Endpoints metadata. > * `service/personalize`: Updates service documentation > > Release v1.20.0 (2019-06-13) > === > > ### Service Client Updates > * `service/appmesh`: Updates service API and documentation > * `service/ec2`: Updates service API > * G4 instances are Amazon EC2 instances based on NVIDIA T4 GPUs and are designed to provide cost-effective machine learning inference for applications, like image classification, object detection, recommender systems, automated speech recognition, and language translation. G4 instances are also a cost-effective platform for building and running graphics-intensive applications, such as remote graphics workstations, video transcoding, photo-realistic design, and game streaming in the cloud. To get started with G4 instances visit https://aws.amazon.com/ec2/instance-types/g4. > * `service/elasticache`: Updates service API and documentation > * This release is to add support for reader endpoint for cluster-mode disabled Amazon ElastiCache for Redis clusters. > * `service/guardduty`: Updates service API, documentation, and paginators > * Support for tagging functionality in Create and Get operations for Detector, IP Set, Threat Intel Set, and Finding Filter resources and 3 new tagging APIs: ListTagsForResource, TagResource, and UntagResource. > > ### SDK Features > > * `aws/session`: Add support for chaining assume IAM role from shared config ([#2579](https://github-redirect.dependabot.com/aws/aws-sdk-go/pull/2579)) > * Adds support chaining assume role credentials from the shared config/credentials files. This change allows you to create an assume role chain of multiple levels of assumed IAM roles. The config profile the deepest in the chain must use static credentials, or `credential_source`. If the deepest profile doesn't have either of these the session will fail to load. > * Fixes the SDK's shared config credential source not assuming a role with environment and ECS credentials. EC2 credentials were already supported. > ... (truncated)
Changelog *Sourced from [github.com/aws/aws-sdk-go's changelog](https://github.com/aws/aws-sdk-go/blob/master/CHANGELOG.md).* > Release v1.20.3 (2019-06-18) > === > > ### Service Client Updates > * `service/ec2`: Updates service API > * You can now launch new 12xlarge, 24xlarge, and metal instance sizes on the Amazon EC2 compute optimized C5 instance types featuring 2nd Gen Intel Xeon Scalable Processors. > * `service/resourcegroupstaggingapi`: Updates service API, documentation, and paginators > * You can use tag policies to help standardize on tags across your organization's resources. > > Release v1.20.2 (2019-06-17) > === > > ### Service Client Updates > * `aws/endpoints`: Updated Regions and Endpoints metadata. > * `service/neptune`: Updates service API and documentation > * This release adds a feature to configure Amazon Neptune to publish audit logs to Amazon CloudWatch Logs. > * `service/robomaker`: Updates service API and documentation > * `service/servicecatalog`: Updates service API > * Restrict concurrent calls by a single customer account for CreatePortfolioShare and DeletePortfolioShare when sharing/unsharing to an Organization. > > Release v1.20.1 (2019-06-14) > === > > ### Service Client Updates > * `service/appstream`: Updates service API > * Added 2 new values(WINDOWS_SERVER_2016, WINDOWS_SERVER_2019) for PlatformType enum. > * `service/cloudfront`: Adds new service > * A new datatype in the CloudFront API, AliasICPRecordal, provides the ICP recordal status for CNAMEs associated with distributions. AWS services in China customers must file for an Internet Content Provider (ICP) recordal if they want to serve content publicly on an alternate domain name, also known as a CNAME, that they have added to CloudFront. The status value is returned in the CloudFront response; you cannot configure it yourself. The status is set to APPROVED for all CNAMEs (aliases) in regions outside of China. > * `service/ec2`: Updates service API > * Correction to enumerations in EC2 client. > * `aws/endpoints`: Updated Regions and Endpoints metadata. > * `service/personalize`: Updates service documentation > > Release v1.20.0 (2019-06-13) > === > > ### Service Client Updates > * `service/appmesh`: Updates service API and documentation > * `service/ec2`: Updates service API > * G4 instances are Amazon EC2 instances based on NVIDIA T4 GPUs and are designed to provide cost-effective machine learning inference for applications, like image classification, object detection, recommender systems, automated speech recognition, and language translation. G4 instances are also a cost-effective platform for building and running graphics-intensive applications, such as remote graphics workstations, video transcoding, photo-realistic design, and game streaming in the cloud. To get started with G4 instances visit https://aws.amazon.com/ec2/instance-types/g4. > * `service/elasticache`: Updates service API and documentation > * This release is to add support for reader endpoint for cluster-mode disabled Amazon ElastiCache for Redis clusters. > * `service/guardduty`: Updates service API, documentation, and paginators > * Support for tagging functionality in Create and Get operations for Detector, IP Set, Threat Intel Set, and Finding Filter resources and 3 new tagging APIs: ListTagsForResource, TagResource, and UntagResource. > > ### SDK Features > > * `aws/session`: Add support for chaining assume IAM role from shared config ([#2579](https://github-redirect.dependabot.com/aws/aws-sdk-go/pull/2579)) > * Adds support chaining assume role credentials from the shared config/credentials files. This change allows you to create an assume role chain of multiple levels of assumed IAM roles. The config profile the deepest in the chain must use static credentials, or `credential_source`. If the deepest profile doesn't have either of these the session will fail to load. > * Fixes the SDK's shared config credential source not assuming a role with environment and ECS credentials. EC2 credentials were already supported. > ... (truncated)
Commits - [`f93aa42`](https://github.com/aws/aws-sdk-go/commit/f93aa42e3b85ff7cc865c95357006d68ad1b3b63) Release v1.20.3 - [`67344c7`](https://github.com/aws/aws-sdk-go/commit/67344c7d27430f17e1cb98f5f5ef38109ba317bd) Merge pull request [#2654](https://github-redirect.dependabot.com/aws/aws-sdk-go/issues/2654) from aws/release - [`f3c4e7e`](https://github.com/aws/aws-sdk-go/commit/f3c4e7e3131f7d980c1267c5a32e804847624eae) Release v1.20.2 - [`cb953fc`](https://github.com/aws/aws-sdk-go/commit/cb953fcef2462895a21d51884f2e054770b01994) aws/session: Add option to set AssumeRole duration with NewSessionWithOptions... - [`362bf00`](https://github.com/aws/aws-sdk-go/commit/362bf001edb6c3a5b1e267c98a1b5027574759a3) fix setting duration, test read cleanup - [`1efab3e`](https://github.com/aws/aws-sdk-go/commit/1efab3e77572ae32d1c73893a9d4d6fb195e34a4) Allow configuration session duration generally - [`a419312`](https://github.com/aws/aws-sdk-go/commit/a419312963c6f046a5962c28638958a9fe8877ea) Provide an option to set credential duration with NewSessionWithOptions - [`4d49ee0`](https://github.com/aws/aws-sdk-go/commit/4d49ee0b104dd356886a9e38805d41f9ab126c06) service/s3/s3manager: Add unit test for S3 Upload manager part retries ([#2636](https://github-redirect.dependabot.com/aws/aws-sdk-go/issues/2636)) - [`93f10ea`](https://github.com/aws/aws-sdk-go/commit/93f10ea6631457e2332a9bbed2f4e587c2e1f891) remove test skip - [`b835d6e`](https://github.com/aws/aws-sdk-go/commit/b835d6ea997baca7aea510752089be0bfb257618) Merge pull request [#2650](https://github-redirect.dependabot.com/aws/aws-sdk-go/issues/2650) from aws/release - Additional commits viewable in [compare view](https://github.com/aws/aws-sdk-go/compare/v1.19.11...v1.20.3)


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot ignore this [patch|minor|major] version` will close this PR and stop Dependabot creating any more for this minor/major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) - `@dependabot use these labels` will set the current labels as the default for future PRs for this repo and language - `@dependabot use these reviewers` will set the current reviewers as the default for future PRs for this repo and language - `@dependabot use these assignees` will set the current assignees as the default for future PRs for this repo and language - `@dependabot use this milestone` will set the current milestone as the default for future PRs for this repo and language - `@dependabot badge me` will comment on this PR with code to add a "Dependabot enabled" badge to your readme Additionally, you can set the following in your Dependabot [dashboard](https://app.dependabot.com): - Update frequency (including time of day and day of week) - Automerge options (never/patch/minor, and dev/runtime dependencies) - Pull request limits (per update run and/or open at any time) - Out-of-range updates (receive only lockfile updates, if desired) - Security updates (receive only security updates, if desired) Finally, you can contact us by mentioning @dependabot.
dependabot-preview[bot] commented 5 years ago

Superseded by #79.