@aws-sdk/client-glue 3.504.0 → 3.507.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -41,8 +41,9 @@ declare const GetDataCatalogEncryptionSettingsCommand_base: {
41
41
  * // { // GetDataCatalogEncryptionSettingsResponse
42
42
  * // DataCatalogEncryptionSettings: { // DataCatalogEncryptionSettings
43
43
  * // EncryptionAtRest: { // EncryptionAtRest
44
- * // CatalogEncryptionMode: "DISABLED" || "SSE-KMS", // required
44
+ * // CatalogEncryptionMode: "DISABLED" || "SSE-KMS" || "SSE-KMS-WITH-SERVICE-ROLE", // required
45
45
  * // SseAwsKmsKeyId: "STRING_VALUE",
46
+ * // CatalogEncryptionServiceRole: "STRING_VALUE",
46
47
  * // },
47
48
  * // ConnectionPasswordEncryption: { // ConnectionPasswordEncryption
48
49
  * // ReturnConnectionPasswordEncrypted: true || false, // required
@@ -38,8 +38,9 @@ declare const PutDataCatalogEncryptionSettingsCommand_base: {
38
38
  * CatalogId: "STRING_VALUE",
39
39
  * DataCatalogEncryptionSettings: { // DataCatalogEncryptionSettings
40
40
  * EncryptionAtRest: { // EncryptionAtRest
41
- * CatalogEncryptionMode: "DISABLED" || "SSE-KMS", // required
41
+ * CatalogEncryptionMode: "DISABLED" || "SSE-KMS" || "SSE-KMS-WITH-SERVICE-ROLE", // required
42
42
  * SseAwsKmsKeyId: "STRING_VALUE",
43
+ * CatalogEncryptionServiceRole: "STRING_VALUE",
43
44
  * },
44
45
  * ConnectionPasswordEncryption: { // ConnectionPasswordEncryption
45
46
  * ReturnConnectionPasswordEncrypted: true || false, // required
@@ -7715,6 +7715,7 @@ export declare const ConnectionPropertyKey: {
7715
7715
  readonly CUSTOM_JDBC_CERT_STRING: "CUSTOM_JDBC_CERT_STRING";
7716
7716
  readonly ENCRYPTED_KAFKA_CLIENT_KEYSTORE_PASSWORD: "ENCRYPTED_KAFKA_CLIENT_KEYSTORE_PASSWORD";
7717
7717
  readonly ENCRYPTED_KAFKA_CLIENT_KEY_PASSWORD: "ENCRYPTED_KAFKA_CLIENT_KEY_PASSWORD";
7718
+ readonly ENCRYPTED_KAFKA_SASL_PLAIN_PASSWORD: "ENCRYPTED_KAFKA_SASL_PLAIN_PASSWORD";
7718
7719
  readonly ENCRYPTED_KAFKA_SASL_SCRAM_PASSWORD: "ENCRYPTED_KAFKA_SASL_SCRAM_PASSWORD";
7719
7720
  readonly ENCRYPTED_PASSWORD: "ENCRYPTED_PASSWORD";
7720
7721
  readonly HOST: "HOST";
@@ -7735,6 +7736,8 @@ export declare const ConnectionPropertyKey: {
7735
7736
  readonly KAFKA_SASL_GSSAPI_PRINCIPAL: "KAFKA_SASL_GSSAPI_PRINCIPAL";
7736
7737
  readonly KAFKA_SASL_GSSAPI_SERVICE: "KAFKA_SASL_GSSAPI_SERVICE";
7737
7738
  readonly KAFKA_SASL_MECHANISM: "KAFKA_SASL_MECHANISM";
7739
+ readonly KAFKA_SASL_PLAIN_PASSWORD: "KAFKA_SASL_PLAIN_PASSWORD";
7740
+ readonly KAFKA_SASL_PLAIN_USERNAME: "KAFKA_SASL_PLAIN_USERNAME";
7738
7741
  readonly KAFKA_SASL_SCRAM_PASSWORD: "KAFKA_SASL_SCRAM_PASSWORD";
7739
7742
  readonly KAFKA_SASL_SCRAM_SECRETS_ARN: "KAFKA_SASL_SCRAM_SECRETS_ARN";
7740
7743
  readonly KAFKA_SASL_SCRAM_USERNAME: "KAFKA_SASL_SCRAM_USERNAME";
@@ -4066,7 +4066,19 @@ export interface Connection {
4066
4066
  * </li>
4067
4067
  * <li>
4068
4068
  * <p>
4069
- * <code>KAFKA_SASL_MECHANISM</code> - <code>"SCRAM-SHA-512"</code>, <code>"GSSAPI"</code>, or <code>"AWS_MSK_IAM"</code>. These are the supported <a href="https://www.iana.org/assignments/sasl-mechanisms/sasl-mechanisms.xhtml">SASL Mechanisms</a>.</p>
4069
+ * <code>KAFKA_SASL_MECHANISM</code> - <code>"SCRAM-SHA-512"</code>, <code>"GSSAPI"</code>, <code>"AWS_MSK_IAM"</code>, or <code>"PLAIN"</code>. These are the supported <a href="https://www.iana.org/assignments/sasl-mechanisms/sasl-mechanisms.xhtml">SASL Mechanisms</a>.</p>
4070
+ * </li>
4071
+ * <li>
4072
+ * <p>
4073
+ * <code>KAFKA_SASL_PLAIN_USERNAME</code> - A plaintext username used to authenticate with the "PLAIN" mechanism.</p>
4074
+ * </li>
4075
+ * <li>
4076
+ * <p>
4077
+ * <code>KAFKA_SASL_PLAIN_PASSWORD</code> - A plaintext password used to authenticate with the "PLAIN" mechanism.</p>
4078
+ * </li>
4079
+ * <li>
4080
+ * <p>
4081
+ * <code>ENCRYPTED_KAFKA_SASL_PLAIN_PASSWORD</code> - The encrypted version of the Kafka SASL PLAIN password (if the user has the Glue encrypt passwords setting selected).</p>
4070
4082
  * </li>
4071
4083
  * <li>
4072
4084
  * <p>
@@ -4561,6 +4573,7 @@ export interface ConnectionPasswordEncryption {
4561
4573
  export declare const CatalogEncryptionMode: {
4562
4574
  readonly DISABLED: "DISABLED";
4563
4575
  readonly SSEKMS: "SSE-KMS";
4576
+ readonly SSEKMSWITHSERVICEROLE: "SSE-KMS-WITH-SERVICE-ROLE";
4564
4577
  };
4565
4578
  /**
4566
4579
  * @public
@@ -4581,6 +4594,11 @@ export interface EncryptionAtRest {
4581
4594
  * <p>The ID of the KMS key to use for encryption at rest.</p>
4582
4595
  */
4583
4596
  SseAwsKmsKeyId?: string;
4597
+ /**
4598
+ * @public
4599
+ * <p>The role that Glue assumes to encrypt and decrypt the Data Catalog objects on the caller's behalf.</p>
4600
+ */
4601
+ CatalogEncryptionServiceRole?: string;
4584
4602
  }
4585
4603
  /**
4586
4604
  * @public
@@ -2004,6 +2004,7 @@ export declare const ConnectionPropertyKey: {
2004
2004
  readonly CUSTOM_JDBC_CERT_STRING: "CUSTOM_JDBC_CERT_STRING";
2005
2005
  readonly ENCRYPTED_KAFKA_CLIENT_KEYSTORE_PASSWORD: "ENCRYPTED_KAFKA_CLIENT_KEYSTORE_PASSWORD";
2006
2006
  readonly ENCRYPTED_KAFKA_CLIENT_KEY_PASSWORD: "ENCRYPTED_KAFKA_CLIENT_KEY_PASSWORD";
2007
+ readonly ENCRYPTED_KAFKA_SASL_PLAIN_PASSWORD: "ENCRYPTED_KAFKA_SASL_PLAIN_PASSWORD";
2007
2008
  readonly ENCRYPTED_KAFKA_SASL_SCRAM_PASSWORD: "ENCRYPTED_KAFKA_SASL_SCRAM_PASSWORD";
2008
2009
  readonly ENCRYPTED_PASSWORD: "ENCRYPTED_PASSWORD";
2009
2010
  readonly HOST: "HOST";
@@ -2024,6 +2025,8 @@ export declare const ConnectionPropertyKey: {
2024
2025
  readonly KAFKA_SASL_GSSAPI_PRINCIPAL: "KAFKA_SASL_GSSAPI_PRINCIPAL";
2025
2026
  readonly KAFKA_SASL_GSSAPI_SERVICE: "KAFKA_SASL_GSSAPI_SERVICE";
2026
2027
  readonly KAFKA_SASL_MECHANISM: "KAFKA_SASL_MECHANISM";
2028
+ readonly KAFKA_SASL_PLAIN_PASSWORD: "KAFKA_SASL_PLAIN_PASSWORD";
2029
+ readonly KAFKA_SASL_PLAIN_USERNAME: "KAFKA_SASL_PLAIN_USERNAME";
2027
2030
  readonly KAFKA_SASL_SCRAM_PASSWORD: "KAFKA_SASL_SCRAM_PASSWORD";
2028
2031
  readonly KAFKA_SASL_SCRAM_SECRETS_ARN: "KAFKA_SASL_SCRAM_SECRETS_ARN";
2029
2032
  readonly KAFKA_SASL_SCRAM_USERNAME: "KAFKA_SASL_SCRAM_USERNAME";
@@ -1118,12 +1118,14 @@ export interface ConnectionPasswordEncryption {
1118
1118
  export declare const CatalogEncryptionMode: {
1119
1119
  readonly DISABLED: "DISABLED";
1120
1120
  readonly SSEKMS: "SSE-KMS";
1121
+ readonly SSEKMSWITHSERVICEROLE: "SSE-KMS-WITH-SERVICE-ROLE";
1121
1122
  };
1122
1123
  export type CatalogEncryptionMode =
1123
1124
  (typeof CatalogEncryptionMode)[keyof typeof CatalogEncryptionMode];
1124
1125
  export interface EncryptionAtRest {
1125
1126
  CatalogEncryptionMode: CatalogEncryptionMode | undefined;
1126
1127
  SseAwsKmsKeyId?: string;
1128
+ CatalogEncryptionServiceRole?: string;
1127
1129
  }
1128
1130
  export interface DataCatalogEncryptionSettings {
1129
1131
  EncryptionAtRest?: EncryptionAtRest;
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-glue",
3
3
  "description": "AWS SDK for JavaScript Glue Client for Node.js, Browser and React Native",
4
- "version": "3.504.0",
4
+ "version": "3.507.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
7
7
  "build:cjs": "node ../../scripts/compilation/inline client-glue",
@@ -20,9 +20,9 @@
20
20
  "dependencies": {
21
21
  "@aws-crypto/sha256-browser": "3.0.0",
22
22
  "@aws-crypto/sha256-js": "3.0.0",
23
- "@aws-sdk/client-sts": "3.504.0",
23
+ "@aws-sdk/client-sts": "3.507.0",
24
24
  "@aws-sdk/core": "3.496.0",
25
- "@aws-sdk/credential-provider-node": "3.504.0",
25
+ "@aws-sdk/credential-provider-node": "3.507.0",
26
26
  "@aws-sdk/middleware-host-header": "3.502.0",
27
27
  "@aws-sdk/middleware-logger": "3.502.0",
28
28
  "@aws-sdk/middleware-recursion-detection": "3.502.0",