aws-sdk-lambda 1.80.0 → 1.81.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-lambda/client.rb +22 -14
- data/lib/aws-sdk-lambda/client_api.rb +2 -0
- data/lib/aws-sdk-lambda/types.rb +9 -1
- data/lib/aws-sdk-lambda.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: cbf59df8bb6ab3666f3d34cb78b5dddec8124414d09814709c7178788e769c1f
|
4
|
+
data.tar.gz: 9f87dcc69f1a2935ba755481b129cccd3a2a217a5b51b35b76228fb691d7c6f1
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: fedfc4453b4be2e63cdc6b8340bb8435544a7b263aa100dbc31dd170eabc22b43effee24f5aab9f24edbc5270a4c88ce49b592236fb28fdb4543db625a8018c5
|
7
|
+
data.tar.gz: 975b04e9066c91b8ad57c13350356795f0968e0d15e56aac24bb0dd5ec4c2cfbde476800d76fdffd81bb1aa1ac6ed3823f92dca611b0c12d71cc04f1b1cf1fc4
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,11 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.81.0 (2022-03-11)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Adds PrincipalOrgID support to AddPermission API. Customers can use it to manage permissions to lambda functions at AWS Organizations level.
|
8
|
+
|
4
9
|
1.80.0 (2022-02-24)
|
5
10
|
------------------
|
6
11
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.81.0
|
@@ -424,21 +424,23 @@ module Aws::Lambda
|
|
424
424
|
req.send_request(options)
|
425
425
|
end
|
426
426
|
|
427
|
-
# Grants an Amazon Web Services service
|
428
|
-
# use a function. You can apply the policy at the function
|
429
|
-
# specify a qualifier to restrict access to a single version
|
430
|
-
# If you use a qualifier, the invoker must use the full Amazon
|
431
|
-
# Name (ARN) of that version or alias to invoke the function.
|
432
|
-
# Lambda does not support adding policies to version $LATEST.
|
427
|
+
# Grants an Amazon Web Services service, account, or organization
|
428
|
+
# permission to use a function. You can apply the policy at the function
|
429
|
+
# level, or specify a qualifier to restrict access to a single version
|
430
|
+
# or alias. If you use a qualifier, the invoker must use the full Amazon
|
431
|
+
# Resource Name (ARN) of that version or alias to invoke the function.
|
432
|
+
# Note: Lambda does not support adding policies to version $LATEST.
|
433
433
|
#
|
434
434
|
# To grant permission to another account, specify the account ID as the
|
435
|
-
# `Principal`.
|
436
|
-
#
|
437
|
-
#
|
438
|
-
#
|
439
|
-
#
|
440
|
-
#
|
441
|
-
#
|
435
|
+
# `Principal`. To grant permission to an organization defined in
|
436
|
+
# Organizations, specify the organization ID as the `PrincipalOrgID`.
|
437
|
+
# For Amazon Web Services services, the principal is a domain-style
|
438
|
+
# identifier defined by the service, like `s3.amazonaws.com` or
|
439
|
+
# `sns.amazonaws.com`. For Amazon Web Services services, you can also
|
440
|
+
# specify the ARN of the associated resource as the `SourceArn`. If you
|
441
|
+
# grant permission to a service principal without specifying the source,
|
442
|
+
# other accounts could potentially configure resources in their account
|
443
|
+
# to invoke your Lambda function.
|
442
444
|
#
|
443
445
|
# This action adds a statement to a resource-based permissions policy
|
444
446
|
# for the function. For more information about function policies, see
|
@@ -505,6 +507,11 @@ module Aws::Lambda
|
|
505
507
|
# specified. Use this option to avoid modifying a policy that has
|
506
508
|
# changed since you last read it.
|
507
509
|
#
|
510
|
+
# @option params [String] :principal_org_id
|
511
|
+
# The identifier for your organization in Organizations. Use this to
|
512
|
+
# grant permissions to all the Amazon Web Services accounts under this
|
513
|
+
# organization.
|
514
|
+
#
|
508
515
|
# @return [Types::AddPermissionResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
509
516
|
#
|
510
517
|
# * {Types::AddPermissionResponse#statement #statement} => String
|
@@ -521,6 +528,7 @@ module Aws::Lambda
|
|
521
528
|
# event_source_token: "EventSourceToken",
|
522
529
|
# qualifier: "Qualifier",
|
523
530
|
# revision_id: "String",
|
531
|
+
# principal_org_id: "PrincipalOrgID",
|
524
532
|
# })
|
525
533
|
#
|
526
534
|
# @example Response structure
|
@@ -5280,7 +5288,7 @@ module Aws::Lambda
|
|
5280
5288
|
params: params,
|
5281
5289
|
config: config)
|
5282
5290
|
context[:gem_name] = 'aws-sdk-lambda'
|
5283
|
-
context[:gem_version] = '1.
|
5291
|
+
context[:gem_version] = '1.81.0'
|
5284
5292
|
Seahorse::Client::Request.new(handlers, context)
|
5285
5293
|
end
|
5286
5294
|
|
@@ -223,6 +223,7 @@ module Aws::Lambda
|
|
223
223
|
PositiveInteger = Shapes::IntegerShape.new(name: 'PositiveInteger')
|
224
224
|
PreconditionFailedException = Shapes::StructureShape.new(name: 'PreconditionFailedException')
|
225
225
|
Principal = Shapes::StringShape.new(name: 'Principal')
|
226
|
+
PrincipalOrgID = Shapes::StringShape.new(name: 'PrincipalOrgID')
|
226
227
|
ProvisionedConcurrencyConfigList = Shapes::ListShape.new(name: 'ProvisionedConcurrencyConfigList')
|
227
228
|
ProvisionedConcurrencyConfigListItem = Shapes::StructureShape.new(name: 'ProvisionedConcurrencyConfigListItem')
|
228
229
|
ProvisionedConcurrencyConfigNotFoundException = Shapes::StructureShape.new(name: 'ProvisionedConcurrencyConfigNotFoundException')
|
@@ -338,6 +339,7 @@ module Aws::Lambda
|
|
338
339
|
AddPermissionRequest.add_member(:event_source_token, Shapes::ShapeRef.new(shape: EventSourceToken, location_name: "EventSourceToken"))
|
339
340
|
AddPermissionRequest.add_member(:qualifier, Shapes::ShapeRef.new(shape: Qualifier, location: "querystring", location_name: "Qualifier"))
|
340
341
|
AddPermissionRequest.add_member(:revision_id, Shapes::ShapeRef.new(shape: String, location_name: "RevisionId"))
|
342
|
+
AddPermissionRequest.add_member(:principal_org_id, Shapes::ShapeRef.new(shape: PrincipalOrgID, location_name: "PrincipalOrgID"))
|
341
343
|
AddPermissionRequest.struct_class = Types::AddPermissionRequest
|
342
344
|
|
343
345
|
AddPermissionResponse.add_member(:statement, Shapes::ShapeRef.new(shape: String, location_name: "Statement"))
|
data/lib/aws-sdk-lambda/types.rb
CHANGED
@@ -164,6 +164,7 @@ module Aws::Lambda
|
|
164
164
|
# event_source_token: "EventSourceToken",
|
165
165
|
# qualifier: "Qualifier",
|
166
166
|
# revision_id: "String",
|
167
|
+
# principal_org_id: "PrincipalOrgID",
|
167
168
|
# }
|
168
169
|
#
|
169
170
|
# @!attribute [rw] function_name
|
@@ -233,6 +234,12 @@ module Aws::Lambda
|
|
233
234
|
# changed since you last read it.
|
234
235
|
# @return [String]
|
235
236
|
#
|
237
|
+
# @!attribute [rw] principal_org_id
|
238
|
+
# The identifier for your organization in Organizations. Use this to
|
239
|
+
# grant permissions to all the Amazon Web Services accounts under this
|
240
|
+
# organization.
|
241
|
+
# @return [String]
|
242
|
+
#
|
236
243
|
# @see http://docs.aws.amazon.com/goto/WebAPI/lambda-2015-03-31/AddPermissionRequest AWS API Documentation
|
237
244
|
#
|
238
245
|
class AddPermissionRequest < Struct.new(
|
@@ -244,7 +251,8 @@ module Aws::Lambda
|
|
244
251
|
:source_account,
|
245
252
|
:event_source_token,
|
246
253
|
:qualifier,
|
247
|
-
:revision_id
|
254
|
+
:revision_id,
|
255
|
+
:principal_org_id)
|
248
256
|
SENSITIVE = []
|
249
257
|
include Aws::Structure
|
250
258
|
end
|
data/lib/aws-sdk-lambda.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-lambda
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.81.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2022-
|
11
|
+
date: 2022-03-11 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|