Skip to content

Commit 8df187d

Browse files
author
awstools
committed
feat(client-glue): Introduce Catalog Encryption Role within Glue Data Catalog Settings. Introduce SASL/PLAIN as an authentication method for Glue Kafka connections
1 parent 29d33ec commit 8df187d

File tree

5 files changed

+64
-4
lines changed

5 files changed

+64
-4
lines changed

clients/client-glue/src/commands/GetDataCatalogEncryptionSettingsCommand.ts

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,8 +48,9 @@ export interface GetDataCatalogEncryptionSettingsCommandOutput
4848
* // { // GetDataCatalogEncryptionSettingsResponse
4949
* // DataCatalogEncryptionSettings: { // DataCatalogEncryptionSettings
5050
* // EncryptionAtRest: { // EncryptionAtRest
51-
* // CatalogEncryptionMode: "DISABLED" || "SSE-KMS", // required
51+
* // CatalogEncryptionMode: "DISABLED" || "SSE-KMS" || "SSE-KMS-WITH-SERVICE-ROLE", // required
5252
* // SseAwsKmsKeyId: "STRING_VALUE",
53+
* // CatalogEncryptionServiceRole: "STRING_VALUE",
5354
* // },
5455
* // ConnectionPasswordEncryption: { // ConnectionPasswordEncryption
5556
* // ReturnConnectionPasswordEncrypted: true || false, // required

clients/client-glue/src/commands/PutDataCatalogEncryptionSettingsCommand.ts

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,8 +45,9 @@ export interface PutDataCatalogEncryptionSettingsCommandOutput
4545
* CatalogId: "STRING_VALUE",
4646
* DataCatalogEncryptionSettings: { // DataCatalogEncryptionSettings
4747
* EncryptionAtRest: { // EncryptionAtRest
48-
* CatalogEncryptionMode: "DISABLED" || "SSE-KMS", // required
48+
* CatalogEncryptionMode: "DISABLED" || "SSE-KMS" || "SSE-KMS-WITH-SERVICE-ROLE", // required
4949
* SseAwsKmsKeyId: "STRING_VALUE",
50+
* CatalogEncryptionServiceRole: "STRING_VALUE",
5051
* },
5152
* ConnectionPasswordEncryption: { // ConnectionPasswordEncryption
5253
* ReturnConnectionPasswordEncrypted: true || false, // required

clients/client-glue/src/models/models_0.ts

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8943,6 +8943,7 @@ export const ConnectionPropertyKey = {
89438943
CUSTOM_JDBC_CERT_STRING: "CUSTOM_JDBC_CERT_STRING",
89448944
ENCRYPTED_KAFKA_CLIENT_KEYSTORE_PASSWORD: "ENCRYPTED_KAFKA_CLIENT_KEYSTORE_PASSWORD",
89458945
ENCRYPTED_KAFKA_CLIENT_KEY_PASSWORD: "ENCRYPTED_KAFKA_CLIENT_KEY_PASSWORD",
8946+
ENCRYPTED_KAFKA_SASL_PLAIN_PASSWORD: "ENCRYPTED_KAFKA_SASL_PLAIN_PASSWORD",
89468947
ENCRYPTED_KAFKA_SASL_SCRAM_PASSWORD: "ENCRYPTED_KAFKA_SASL_SCRAM_PASSWORD",
89478948
ENCRYPTED_PASSWORD: "ENCRYPTED_PASSWORD",
89488949
HOST: "HOST",
@@ -8963,6 +8964,8 @@ export const ConnectionPropertyKey = {
89638964
KAFKA_SASL_GSSAPI_PRINCIPAL: "KAFKA_SASL_GSSAPI_PRINCIPAL",
89648965
KAFKA_SASL_GSSAPI_SERVICE: "KAFKA_SASL_GSSAPI_SERVICE",
89658966
KAFKA_SASL_MECHANISM: "KAFKA_SASL_MECHANISM",
8967+
KAFKA_SASL_PLAIN_PASSWORD: "KAFKA_SASL_PLAIN_PASSWORD",
8968+
KAFKA_SASL_PLAIN_USERNAME: "KAFKA_SASL_PLAIN_USERNAME",
89668969
KAFKA_SASL_SCRAM_PASSWORD: "KAFKA_SASL_SCRAM_PASSWORD",
89678970
KAFKA_SASL_SCRAM_SECRETS_ARN: "KAFKA_SASL_SCRAM_SECRETS_ARN",
89688971
KAFKA_SASL_SCRAM_USERNAME: "KAFKA_SASL_SCRAM_USERNAME",

clients/client-glue/src/models/models_1.ts

Lines changed: 20 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4693,7 +4693,19 @@ export interface Connection {
46934693
* </li>
46944694
* <li>
46954695
* <p>
4696-
* <code>KAFKA_SASL_MECHANISM</code> - <code>"SCRAM-SHA-512"</code>, <code>"GSSAPI"</code>, or <code>"AWS_MSK_IAM"</code>. These are the supported <a href="https://www.iana.org/assignments/sasl-mechanisms/sasl-mechanisms.xhtml">SASL Mechanisms</a>.</p>
4696+
* <code>KAFKA_SASL_MECHANISM</code> - <code>"SCRAM-SHA-512"</code>, <code>"GSSAPI"</code>, <code>"AWS_MSK_IAM"</code>, or <code>"PLAIN"</code>. These are the supported <a href="https://www.iana.org/assignments/sasl-mechanisms/sasl-mechanisms.xhtml">SASL Mechanisms</a>.</p>
4697+
* </li>
4698+
* <li>
4699+
* <p>
4700+
* <code>KAFKA_SASL_PLAIN_USERNAME</code> - A plaintext username used to authenticate with the "PLAIN" mechanism.</p>
4701+
* </li>
4702+
* <li>
4703+
* <p>
4704+
* <code>KAFKA_SASL_PLAIN_PASSWORD</code> - A plaintext password used to authenticate with the "PLAIN" mechanism.</p>
4705+
* </li>
4706+
* <li>
4707+
* <p>
4708+
* <code>ENCRYPTED_KAFKA_SASL_PLAIN_PASSWORD</code> - The encrypted version of the Kafka SASL PLAIN password (if the user has the Glue encrypt passwords setting selected).</p>
46974709
* </li>
46984710
* <li>
46994711
* <p>
@@ -5249,6 +5261,7 @@ export interface ConnectionPasswordEncryption {
52495261
export const CatalogEncryptionMode = {
52505262
DISABLED: "DISABLED",
52515263
SSEKMS: "SSE-KMS",
5264+
SSEKMSWITHSERVICEROLE: "SSE-KMS-WITH-SERVICE-ROLE",
52525265
} as const;
52535266

52545267
/**
@@ -5272,6 +5285,12 @@ export interface EncryptionAtRest {
52725285
* <p>The ID of the KMS key to use for encryption at rest.</p>
52735286
*/
52745287
SseAwsKmsKeyId?: string;
5288+
5289+
/**
5290+
* @public
5291+
* <p>The role that Glue assumes to encrypt and decrypt the Data Catalog objects on the caller's behalf.</p>
5292+
*/
5293+
CatalogEncryptionServiceRole?: string;
52755294
}
52765295

52775296
/**

0 commit comments

Comments
 (0)