aws-sdk 2.1359.0 → 2.1361.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +16 -1
- package/README.md +1 -1
- package/apis/appflow-2020-08-23.min.json +107 -86
- package/apis/comprehend-2017-11-27.min.json +181 -154
- package/apis/drs-2020-02-26.min.json +183 -41
- package/apis/drs-2020-02-26.paginators.json +6 -0
- package/apis/emr-serverless-2021-07-13.min.json +14 -0
- package/apis/internetmonitor-2021-06-03.min.json +30 -23
- package/apis/iotwireless-2020-11-22.min.json +122 -107
- package/apis/ram-2018-01-04.min.json +396 -66
- package/apis/ram-2018-01-04.paginators.json +10 -0
- package/apis/s3-2006-03-01.examples.json +94 -94
- package/apis/secretsmanager-2017-10-17.examples.json +32 -0
- package/apis/securityhub-2018-10-26.examples.json +1516 -0
- package/clients/appflow.d.ts +29 -0
- package/clients/comprehend.d.ts +45 -5
- package/clients/drs.d.ts +170 -0
- package/clients/dynamodb.d.ts +4 -4
- package/clients/ecs.d.ts +7 -7
- package/clients/emrserverless.d.ts +22 -4
- package/clients/internetmonitor.d.ts +16 -3
- package/clients/iotwireless.d.ts +21 -0
- package/clients/lambda.d.ts +1 -1
- package/clients/ram.d.ts +538 -91
- package/clients/rds.d.ts +16 -16
- package/clients/s3.d.ts +117 -117
- package/clients/secretsmanager.d.ts +10 -10
- package/dist/aws-sdk-core-react-native.js +1 -1
- package/dist/aws-sdk-react-native.js +10 -10
- package/dist/aws-sdk.js +184 -157
- package/dist/aws-sdk.min.js +74 -74
- package/lib/core.js +1 -1
- package/package.json +1 -1
| @@ -180,11 +180,11 @@ declare class SecretsManager extends Service { | |
| 180 180 | 
             
               */
         | 
| 181 181 | 
             
              updateSecretVersionStage(callback?: (err: AWSError, data: SecretsManager.Types.UpdateSecretVersionStageResponse) => void): Request<SecretsManager.Types.UpdateSecretVersionStageResponse, AWSError>;
         | 
| 182 182 | 
             
              /**
         | 
| 183 | 
            -
               * Validates that a resource policy does not grant a wide range of principals access to your secret. A resource-based policy is optional for secrets. The API performs three checks when validating the policy:   Sends a call to Zelkova, an automated reasoning engine, to ensure your resource policy does not allow broad access to your secret, for example policies that use a wildcard for the principal.   Checks for correct syntax in a policy.   Verifies the policy does not lock out a caller.   Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail.  Required permissions:  secretsmanager:ValidateResourcePolicy. For more information, see  IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. 
         | 
| 183 | 
            +
               * Validates that a resource policy does not grant a wide range of principals access to your secret. A resource-based policy is optional for secrets. The API performs three checks when validating the policy:   Sends a call to Zelkova, an automated reasoning engine, to ensure your resource policy does not allow broad access to your secret, for example policies that use a wildcard for the principal.   Checks for correct syntax in a policy.   Verifies the policy does not lock out a caller.   Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail.  Required permissions:  secretsmanager:ValidateResourcePolicy and secretsmanager:PutResourcePolicy. For more information, see  IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. 
         | 
| 184 184 | 
             
               */
         | 
| 185 185 | 
             
              validateResourcePolicy(params: SecretsManager.Types.ValidateResourcePolicyRequest, callback?: (err: AWSError, data: SecretsManager.Types.ValidateResourcePolicyResponse) => void): Request<SecretsManager.Types.ValidateResourcePolicyResponse, AWSError>;
         | 
| 186 186 | 
             
              /**
         | 
| 187 | 
            -
               * Validates that a resource policy does not grant a wide range of principals access to your secret. A resource-based policy is optional for secrets. The API performs three checks when validating the policy:   Sends a call to Zelkova, an automated reasoning engine, to ensure your resource policy does not allow broad access to your secret, for example policies that use a wildcard for the principal.   Checks for correct syntax in a policy.   Verifies the policy does not lock out a caller.   Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail.  Required permissions:  secretsmanager:ValidateResourcePolicy. For more information, see  IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. 
         | 
| 187 | 
            +
               * Validates that a resource policy does not grant a wide range of principals access to your secret. A resource-based policy is optional for secrets. The API performs three checks when validating the policy:   Sends a call to Zelkova, an automated reasoning engine, to ensure your resource policy does not allow broad access to your secret, for example policies that use a wildcard for the principal.   Checks for correct syntax in a policy.   Verifies the policy does not lock out a caller.   Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail.  Required permissions:  secretsmanager:ValidateResourcePolicy and secretsmanager:PutResourcePolicy. For more information, see  IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. 
         | 
| 188 188 | 
             
               */
         | 
| 189 189 | 
             
              validateResourcePolicy(callback?: (err: AWSError, data: SecretsManager.Types.ValidateResourcePolicyResponse) => void): Request<SecretsManager.Types.ValidateResourcePolicyResponse, AWSError>;
         | 
| 190 190 | 
             
            }
         | 
| @@ -247,7 +247,7 @@ declare namespace SecretsManager { | |
| 247 247 | 
             
                 */
         | 
| 248 248 | 
             
                AddReplicaRegions?: AddReplicaRegionListType;
         | 
| 249 249 | 
             
                /**
         | 
| 250 | 
            -
                 * Specifies whether to overwrite a secret with the same name in the destination Region.
         | 
| 250 | 
            +
                 * Specifies whether to overwrite a secret with the same name in the destination Region. By default, secrets aren't overwritten.
         | 
| 251 251 | 
             
                 */
         | 
| 252 252 | 
             
                ForceOverwriteReplicaSecret?: BooleanType;
         | 
| 253 253 | 
             
              }
         | 
| @@ -292,11 +292,11 @@ declare namespace SecretsManager { | |
| 292 292 | 
             
                 */
         | 
| 293 293 | 
             
                SecretId: SecretIdType;
         | 
| 294 294 | 
             
                /**
         | 
| 295 | 
            -
                 * The number of days from 7 to 30 that Secrets Manager waits before permanently deleting the secret. You can't use both this parameter and ForceDeleteWithoutRecovery in the same call. If you don't use either, then Secrets Manager  | 
| 295 | 
            +
                 * The number of days from 7 to 30 that Secrets Manager waits before permanently deleting the secret. You can't use both this parameter and ForceDeleteWithoutRecovery in the same call. If you don't use either, then by default Secrets Manager uses a 30 day recovery window.
         | 
| 296 296 | 
             
                 */
         | 
| 297 297 | 
             
                RecoveryWindowInDays?: RecoveryWindowInDaysType;
         | 
| 298 298 | 
             
                /**
         | 
| 299 | 
            -
                 * Specifies whether to delete the secret without any recovery window. You can't use both this parameter and RecoveryWindowInDays in the same call. If you don't use either, then Secrets Manager  | 
| 299 | 
            +
                 * Specifies whether to delete the secret without any recovery window. You can't use both this parameter and RecoveryWindowInDays in the same call. If you don't use either, then by default Secrets Manager uses a 30 day recovery window. Secrets Manager performs the actual deletion with an asynchronous background process, so there might be a short delay before the secret is permanently deleted. If you delete a secret and then immediately create a secret with the same name, use appropriate back off and retry logic.  Use this parameter with caution. This parameter causes the operation to skip the normal recovery window before the permanent deletion that Secrets Manager would normally impose with the RecoveryWindowInDays parameter. If you delete a secret with the ForceDeleteWithoutRecovery parameter, then you have no opportunity to recover the secret. You lose the secret permanently. 
         | 
| 300 300 | 
             
                 */
         | 
| 301 301 | 
             
                ForceDeleteWithoutRecovery?: BooleanType;
         | 
| 302 302 | 
             
              }
         | 
| @@ -542,7 +542,7 @@ declare namespace SecretsManager { | |
| 542 542 | 
             
                 */
         | 
| 543 543 | 
             
                NextToken?: NextTokenType;
         | 
| 544 544 | 
             
                /**
         | 
| 545 | 
            -
                 * Specifies whether to include versions of secrets that don't have any staging labels attached to them. Versions without staging labels are considered deprecated and are subject to deletion by Secrets Manager.
         | 
| 545 | 
            +
                 * Specifies whether to include versions of secrets that don't have any staging labels attached to them. Versions without staging labels are considered deprecated and are subject to deletion by Secrets Manager. By default, versions without staging labels aren't included.
         | 
| 546 546 | 
             
                 */
         | 
| 547 547 | 
             
                IncludeDeprecated?: BooleanType;
         | 
| 548 548 | 
             
              }
         | 
| @@ -566,7 +566,7 @@ declare namespace SecretsManager { | |
| 566 566 | 
             
              }
         | 
| 567 567 | 
             
              export interface ListSecretsRequest {
         | 
| 568 568 | 
             
                /**
         | 
| 569 | 
            -
                 * Specifies whether to include secrets scheduled for deletion.
         | 
| 569 | 
            +
                 * Specifies whether to include secrets scheduled for deletion. By default, secrets scheduled for deletion aren't included.
         | 
| 570 570 | 
             
                 */
         | 
| 571 571 | 
             
                IncludePlannedDeletion?: BooleanType;
         | 
| 572 572 | 
             
                /**
         | 
| @@ -613,7 +613,7 @@ declare namespace SecretsManager { | |
| 613 613 | 
             
                 */
         | 
| 614 614 | 
             
                ResourcePolicy: NonEmptyResourcePolicyType;
         | 
| 615 615 | 
             
                /**
         | 
| 616 | 
            -
                 * Specifies whether to block resource-based policies that allow broad access to the secret, for example those that use a wildcard for the principal.
         | 
| 616 | 
            +
                 * Specifies whether to block resource-based policies that allow broad access to the secret, for example those that use a wildcard for the principal. By default, public policies aren't blocked.
         | 
| 617 617 | 
             
                 */
         | 
| 618 618 | 
             
                BlockPublicPolicy?: BooleanType;
         | 
| 619 619 | 
             
              }
         | 
| @@ -711,7 +711,7 @@ declare namespace SecretsManager { | |
| 711 711 | 
             
                 */
         | 
| 712 712 | 
             
                AddReplicaRegions: AddReplicaRegionListType;
         | 
| 713 713 | 
             
                /**
         | 
| 714 | 
            -
                 * Specifies whether to overwrite a secret with the same name in the destination Region.
         | 
| 714 | 
            +
                 * Specifies whether to overwrite a secret with the same name in the destination Region. By default, secrets aren't overwritten.
         | 
| 715 715 | 
             
                 */
         | 
| 716 716 | 
             
                ForceOverwriteReplicaSecret?: BooleanType;
         | 
| 717 717 | 
             
              }
         | 
| @@ -783,7 +783,7 @@ declare namespace SecretsManager { | |
| 783 783 | 
             
                 */
         | 
| 784 784 | 
             
                RotationRules?: RotationRulesType;
         | 
| 785 785 | 
             
                /**
         | 
| 786 | 
            -
                 * Specifies whether to rotate the secret immediately or wait until the next scheduled rotation window. The rotation schedule is defined in RotateSecretRequest$RotationRules. For secrets that use a Lambda rotation function to rotate, if you don't immediately rotate the secret, Secrets Manager tests the rotation configuration by running the  testSecret step of the Lambda rotation function. The test creates an AWSPENDING version of the secret and then removes it.  | 
| 786 | 
            +
                 * Specifies whether to rotate the secret immediately or wait until the next scheduled rotation window. The rotation schedule is defined in RotateSecretRequest$RotationRules. For secrets that use a Lambda rotation function to rotate, if you don't immediately rotate the secret, Secrets Manager tests the rotation configuration by running the  testSecret step of the Lambda rotation function. The test creates an AWSPENDING version of the secret and then removes it. By default, Secrets Manager rotates the secret immediately.
         | 
| 787 787 | 
             
                 */
         | 
| 788 788 | 
             
                RotateImmediately?: BooleanType;
         | 
| 789 789 | 
             
              }
         |