aws-sdk 2.1413.0 → 2.1415.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +18 -1
- package/README.md +1 -1
- package/apis/cognito-idp-2016-04-18.min.json +42 -13
- package/apis/connect-2017-08-08.min.json +223 -177
- package/apis/datasync-2018-11-09.min.json +11 -2
- package/apis/dms-2016-01-01.min.json +148 -146
- package/apis/fsx-2018-03-01.min.json +236 -131
- package/apis/mediatailor-2018-04-23.min.json +4 -3
- package/apis/personalize-2018-05-22.min.json +40 -6
- package/apis/proton-2020-07-20.min.json +400 -151
- package/apis/proton-2020-07-20.paginators.json +6 -0
- package/apis/s3-2006-03-01.examples.json +92 -92
- package/apis/sagemaker-2017-07-24.min.json +730 -723
- package/apis/secretsmanager-2017-10-17.examples.json +1 -1
- package/clients/connect.d.ts +38 -2
- package/clients/datasync.d.ts +24 -12
- package/clients/dms.d.ts +9 -0
- package/clients/ec2.d.ts +1 -1
- package/clients/fsx.d.ts +134 -4
- package/clients/iam.d.ts +27 -27
- package/clients/mediatailor.d.ts +6 -1
- package/clients/personalize.d.ts +52 -2
- package/clients/proton.d.ts +414 -0
- package/clients/s3.d.ts +4 -4
- package/clients/sagemaker.d.ts +21 -1
- package/clients/secretsmanager.d.ts +3 -3
- package/dist/aws-sdk-core-react-native.js +5 -4
- package/dist/aws-sdk-react-native.js +19 -17
- package/dist/aws-sdk.js +308 -199
- package/dist/aws-sdk.min.js +85 -84
- package/lib/core.js +1 -1
- package/lib/http/node.js +2 -1
- package/package.json +1 -1
package/clients/iam.d.ts
CHANGED
@@ -21,11 +21,11 @@ declare class IAM extends Service {
|
|
21
21
|
*/
|
22
22
|
addClientIDToOpenIDConnectProvider(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
23
23
|
/**
|
24
|
-
* Adds the specified IAM role to the specified instance profile. An instance profile can contain only one role, and this quota cannot be increased. You can remove the existing role and then add a different role to an instance profile. You must then wait for the change to appear across all of Amazon Web Services because of eventual consistency. To force the change, you must disassociate the instance profile and then associate the instance profile, or you can stop your instance and then restart it. The caller of this operation must be granted the PassRole permission on the IAM role by a permissions policy.
|
24
|
+
* Adds the specified IAM role to the specified instance profile. An instance profile can contain only one role, and this quota cannot be increased. You can remove the existing role and then add a different role to an instance profile. You must then wait for the change to appear across all of Amazon Web Services because of eventual consistency. To force the change, you must disassociate the instance profile and then associate the instance profile, or you can stop your instance and then restart it. The caller of this operation must be granted the PassRole permission on the IAM role by a permissions policy. For more information about roles, see IAM roles in the IAM User Guide. For more information about instance profiles, see Using instance profiles in the IAM User Guide.
|
25
25
|
*/
|
26
26
|
addRoleToInstanceProfile(params: IAM.Types.AddRoleToInstanceProfileRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
27
27
|
/**
|
28
|
-
* Adds the specified IAM role to the specified instance profile. An instance profile can contain only one role, and this quota cannot be increased. You can remove the existing role and then add a different role to an instance profile. You must then wait for the change to appear across all of Amazon Web Services because of eventual consistency. To force the change, you must disassociate the instance profile and then associate the instance profile, or you can stop your instance and then restart it. The caller of this operation must be granted the PassRole permission on the IAM role by a permissions policy.
|
28
|
+
* Adds the specified IAM role to the specified instance profile. An instance profile can contain only one role, and this quota cannot be increased. You can remove the existing role and then add a different role to an instance profile. You must then wait for the change to appear across all of Amazon Web Services because of eventual consistency. To force the change, you must disassociate the instance profile and then associate the instance profile, or you can stop your instance and then restart it. The caller of this operation must be granted the PassRole permission on the IAM role by a permissions policy. For more information about roles, see IAM roles in the IAM User Guide. For more information about instance profiles, see Using instance profiles in the IAM User Guide.
|
29
29
|
*/
|
30
30
|
addRoleToInstanceProfile(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
31
31
|
/**
|
@@ -109,11 +109,11 @@ declare class IAM extends Service {
|
|
109
109
|
*/
|
110
110
|
createLoginProfile(callback?: (err: AWSError, data: IAM.Types.CreateLoginProfileResponse) => void): Request<IAM.Types.CreateLoginProfileResponse, AWSError>;
|
111
111
|
/**
|
112
|
-
* Creates an IAM entity to describe an identity provider (IdP) that supports OpenID Connect (OIDC). The OIDC provider that you create with this operation can be used as a principal in a role's trust policy. Such a policy establishes a trust relationship between Amazon Web Services and the OIDC provider. If you are using an OIDC identity provider from Google, Facebook, or Amazon Cognito, you don't need to create a separate IAM identity provider. These OIDC identity providers are already built-in to Amazon Web Services and are available for your use. Instead, you can move directly to creating new roles using your identity provider. To learn more, see Creating a role for web identity or OpenID connect federation in the IAM User Guide. When you create the IAM OIDC provider, you specify the following: The URL of the OIDC identity provider (IdP) to trust A list of client IDs (also known as audiences) that identify the application or applications allowed to authenticate using the OIDC provider A list of tags that are attached to the specified IAM OIDC provider A list of thumbprints of one or more server certificates that the IdP uses You get all of this information from the OIDC IdP you want to use to access Amazon Web Services. Amazon Web Services secures communication with some OIDC identity providers (IdPs) through our library of trusted certificate authorities (CAs) instead of using a certificate thumbprint to verify your IdP server certificate. These OIDC IdPs include
|
112
|
+
* Creates an IAM entity to describe an identity provider (IdP) that supports OpenID Connect (OIDC). The OIDC provider that you create with this operation can be used as a principal in a role's trust policy. Such a policy establishes a trust relationship between Amazon Web Services and the OIDC provider. If you are using an OIDC identity provider from Google, Facebook, or Amazon Cognito, you don't need to create a separate IAM identity provider. These OIDC identity providers are already built-in to Amazon Web Services and are available for your use. Instead, you can move directly to creating new roles using your identity provider. To learn more, see Creating a role for web identity or OpenID connect federation in the IAM User Guide. When you create the IAM OIDC provider, you specify the following: The URL of the OIDC identity provider (IdP) to trust A list of client IDs (also known as audiences) that identify the application or applications allowed to authenticate using the OIDC provider A list of tags that are attached to the specified IAM OIDC provider A list of thumbprints of one or more server certificates that the IdP uses You get all of this information from the OIDC IdP you want to use to access Amazon Web Services. Amazon Web Services secures communication with some OIDC identity providers (IdPs) through our library of trusted root certificate authorities (CAs) instead of using a certificate thumbprint to verify your IdP server certificate. These OIDC IdPs include Auth0, GitHub, Google, and those that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS) endpoint. In these cases, your legacy thumbprint remains in your configuration, but is no longer used for validation. The trust for the OIDC provider is derived from the IAM provider that this operation creates. Therefore, it is best to limit access to the CreateOpenIDConnectProvider operation to highly privileged users.
|
113
113
|
*/
|
114
114
|
createOpenIDConnectProvider(params: IAM.Types.CreateOpenIDConnectProviderRequest, callback?: (err: AWSError, data: IAM.Types.CreateOpenIDConnectProviderResponse) => void): Request<IAM.Types.CreateOpenIDConnectProviderResponse, AWSError>;
|
115
115
|
/**
|
116
|
-
* Creates an IAM entity to describe an identity provider (IdP) that supports OpenID Connect (OIDC). The OIDC provider that you create with this operation can be used as a principal in a role's trust policy. Such a policy establishes a trust relationship between Amazon Web Services and the OIDC provider. If you are using an OIDC identity provider from Google, Facebook, or Amazon Cognito, you don't need to create a separate IAM identity provider. These OIDC identity providers are already built-in to Amazon Web Services and are available for your use. Instead, you can move directly to creating new roles using your identity provider. To learn more, see Creating a role for web identity or OpenID connect federation in the IAM User Guide. When you create the IAM OIDC provider, you specify the following: The URL of the OIDC identity provider (IdP) to trust A list of client IDs (also known as audiences) that identify the application or applications allowed to authenticate using the OIDC provider A list of tags that are attached to the specified IAM OIDC provider A list of thumbprints of one or more server certificates that the IdP uses You get all of this information from the OIDC IdP you want to use to access Amazon Web Services. Amazon Web Services secures communication with some OIDC identity providers (IdPs) through our library of trusted certificate authorities (CAs) instead of using a certificate thumbprint to verify your IdP server certificate. These OIDC IdPs include
|
116
|
+
* Creates an IAM entity to describe an identity provider (IdP) that supports OpenID Connect (OIDC). The OIDC provider that you create with this operation can be used as a principal in a role's trust policy. Such a policy establishes a trust relationship between Amazon Web Services and the OIDC provider. If you are using an OIDC identity provider from Google, Facebook, or Amazon Cognito, you don't need to create a separate IAM identity provider. These OIDC identity providers are already built-in to Amazon Web Services and are available for your use. Instead, you can move directly to creating new roles using your identity provider. To learn more, see Creating a role for web identity or OpenID connect federation in the IAM User Guide. When you create the IAM OIDC provider, you specify the following: The URL of the OIDC identity provider (IdP) to trust A list of client IDs (also known as audiences) that identify the application or applications allowed to authenticate using the OIDC provider A list of tags that are attached to the specified IAM OIDC provider A list of thumbprints of one or more server certificates that the IdP uses You get all of this information from the OIDC IdP you want to use to access Amazon Web Services. Amazon Web Services secures communication with some OIDC identity providers (IdPs) through our library of trusted root certificate authorities (CAs) instead of using a certificate thumbprint to verify your IdP server certificate. These OIDC IdPs include Auth0, GitHub, Google, and those that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS) endpoint. In these cases, your legacy thumbprint remains in your configuration, but is no longer used for validation. The trust for the OIDC provider is derived from the IAM provider that this operation creates. Therefore, it is best to limit access to the CreateOpenIDConnectProvider operation to highly privileged users.
|
117
117
|
*/
|
118
118
|
createOpenIDConnectProvider(callback?: (err: AWSError, data: IAM.Types.CreateOpenIDConnectProviderResponse) => void): Request<IAM.Types.CreateOpenIDConnectProviderResponse, AWSError>;
|
119
119
|
/**
|
@@ -133,11 +133,11 @@ declare class IAM extends Service {
|
|
133
133
|
*/
|
134
134
|
createPolicyVersion(callback?: (err: AWSError, data: IAM.Types.CreatePolicyVersionResponse) => void): Request<IAM.Types.CreatePolicyVersionResponse, AWSError>;
|
135
135
|
/**
|
136
|
-
* Creates a new role for your Amazon Web Services account.
|
136
|
+
* Creates a new role for your Amazon Web Services account. For more information about roles, see IAM roles in the IAM User Guide. For information about quotas for role names and the number of roles you can create, see IAM and STS quotas in the IAM User Guide.
|
137
137
|
*/
|
138
138
|
createRole(params: IAM.Types.CreateRoleRequest, callback?: (err: AWSError, data: IAM.Types.CreateRoleResponse) => void): Request<IAM.Types.CreateRoleResponse, AWSError>;
|
139
139
|
/**
|
140
|
-
* Creates a new role for your Amazon Web Services account.
|
140
|
+
* Creates a new role for your Amazon Web Services account. For more information about roles, see IAM roles in the IAM User Guide. For information about quotas for role names and the number of roles you can create, see IAM and STS quotas in the IAM User Guide.
|
141
141
|
*/
|
142
142
|
createRole(callback?: (err: AWSError, data: IAM.Types.CreateRoleResponse) => void): Request<IAM.Types.CreateRoleResponse, AWSError>;
|
143
143
|
/**
|
@@ -225,11 +225,11 @@ declare class IAM extends Service {
|
|
225
225
|
*/
|
226
226
|
deleteGroupPolicy(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
227
227
|
/**
|
228
|
-
* Deletes the specified instance profile. The instance profile must not have an associated role. Make sure that you do not have any Amazon EC2 instances running with the instance profile you are about to delete. Deleting a role or instance profile that is associated with a running instance will break any applications running on the instance. For more information about instance profiles, see
|
228
|
+
* Deletes the specified instance profile. The instance profile must not have an associated role. Make sure that you do not have any Amazon EC2 instances running with the instance profile you are about to delete. Deleting a role or instance profile that is associated with a running instance will break any applications running on the instance. For more information about instance profiles, see Using instance profiles in the IAM User Guide.
|
229
229
|
*/
|
230
230
|
deleteInstanceProfile(params: IAM.Types.DeleteInstanceProfileRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
231
231
|
/**
|
232
|
-
* Deletes the specified instance profile. The instance profile must not have an associated role. Make sure that you do not have any Amazon EC2 instances running with the instance profile you are about to delete. Deleting a role or instance profile that is associated with a running instance will break any applications running on the instance. For more information about instance profiles, see
|
232
|
+
* Deletes the specified instance profile. The instance profile must not have an associated role. Make sure that you do not have any Amazon EC2 instances running with the instance profile you are about to delete. Deleting a role or instance profile that is associated with a running instance will break any applications running on the instance. For more information about instance profiles, see Using instance profiles in the IAM User Guide.
|
233
233
|
*/
|
234
234
|
deleteInstanceProfile(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
235
235
|
/**
|
@@ -481,11 +481,11 @@ declare class IAM extends Service {
|
|
481
481
|
*/
|
482
482
|
getGroupPolicy(callback?: (err: AWSError, data: IAM.Types.GetGroupPolicyResponse) => void): Request<IAM.Types.GetGroupPolicyResponse, AWSError>;
|
483
483
|
/**
|
484
|
-
* Retrieves information about the specified instance profile, including the instance profile's path, GUID, ARN, and role. For more information about instance profiles, see
|
484
|
+
* Retrieves information about the specified instance profile, including the instance profile's path, GUID, ARN, and role. For more information about instance profiles, see Using instance profiles in the IAM User Guide.
|
485
485
|
*/
|
486
486
|
getInstanceProfile(params: IAM.Types.GetInstanceProfileRequest, callback?: (err: AWSError, data: IAM.Types.GetInstanceProfileResponse) => void): Request<IAM.Types.GetInstanceProfileResponse, AWSError>;
|
487
487
|
/**
|
488
|
-
* Retrieves information about the specified instance profile, including the instance profile's path, GUID, ARN, and role. For more information about instance profiles, see
|
488
|
+
* Retrieves information about the specified instance profile, including the instance profile's path, GUID, ARN, and role. For more information about instance profiles, see Using instance profiles in the IAM User Guide.
|
489
489
|
*/
|
490
490
|
getInstanceProfile(callback?: (err: AWSError, data: IAM.Types.GetInstanceProfileResponse) => void): Request<IAM.Types.GetInstanceProfileResponse, AWSError>;
|
491
491
|
/**
|
@@ -537,19 +537,19 @@ declare class IAM extends Service {
|
|
537
537
|
*/
|
538
538
|
getPolicyVersion(callback?: (err: AWSError, data: IAM.Types.GetPolicyVersionResponse) => void): Request<IAM.Types.GetPolicyVersionResponse, AWSError>;
|
539
539
|
/**
|
540
|
-
* Retrieves information about the specified role, including the role's path, GUID, ARN, and the role's trust policy that grants permission to assume the role. For more information about roles, see
|
540
|
+
* Retrieves information about the specified role, including the role's path, GUID, ARN, and the role's trust policy that grants permission to assume the role. For more information about roles, see IAM roles in the IAM User Guide. Policies returned by this operation are URL-encoded compliant with RFC 3986. You can use a URL decoding method to convert the policy back to plain JSON text. For example, if you use Java, you can use the decode method of the java.net.URLDecoder utility class in the Java SDK. Other languages and SDKs provide similar functionality.
|
541
541
|
*/
|
542
542
|
getRole(params: IAM.Types.GetRoleRequest, callback?: (err: AWSError, data: IAM.Types.GetRoleResponse) => void): Request<IAM.Types.GetRoleResponse, AWSError>;
|
543
543
|
/**
|
544
|
-
* Retrieves information about the specified role, including the role's path, GUID, ARN, and the role's trust policy that grants permission to assume the role. For more information about roles, see
|
544
|
+
* Retrieves information about the specified role, including the role's path, GUID, ARN, and the role's trust policy that grants permission to assume the role. For more information about roles, see IAM roles in the IAM User Guide. Policies returned by this operation are URL-encoded compliant with RFC 3986. You can use a URL decoding method to convert the policy back to plain JSON text. For example, if you use Java, you can use the decode method of the java.net.URLDecoder utility class in the Java SDK. Other languages and SDKs provide similar functionality.
|
545
545
|
*/
|
546
546
|
getRole(callback?: (err: AWSError, data: IAM.Types.GetRoleResponse) => void): Request<IAM.Types.GetRoleResponse, AWSError>;
|
547
547
|
/**
|
548
|
-
* Retrieves the specified inline policy document that is embedded with the specified IAM role. Policies returned by this operation are URL-encoded compliant with RFC 3986. You can use a URL decoding method to convert the policy back to plain JSON text. For example, if you use Java, you can use the decode method of the java.net.URLDecoder utility class in the Java SDK. Other languages and SDKs provide similar functionality. An IAM role can also have managed policies attached to it. To retrieve a managed policy document that is attached to a role, use GetPolicy to determine the policy's default version, then use GetPolicyVersion to retrieve the policy document. For more information about policies, see Managed policies and inline policies in the IAM User Guide.
|
548
|
+
* Retrieves the specified inline policy document that is embedded with the specified IAM role. Policies returned by this operation are URL-encoded compliant with RFC 3986. You can use a URL decoding method to convert the policy back to plain JSON text. For example, if you use Java, you can use the decode method of the java.net.URLDecoder utility class in the Java SDK. Other languages and SDKs provide similar functionality. An IAM role can also have managed policies attached to it. To retrieve a managed policy document that is attached to a role, use GetPolicy to determine the policy's default version, then use GetPolicyVersion to retrieve the policy document. For more information about policies, see Managed policies and inline policies in the IAM User Guide. For more information about roles, see IAM roles in the IAM User Guide.
|
549
549
|
*/
|
550
550
|
getRolePolicy(params: IAM.Types.GetRolePolicyRequest, callback?: (err: AWSError, data: IAM.Types.GetRolePolicyResponse) => void): Request<IAM.Types.GetRolePolicyResponse, AWSError>;
|
551
551
|
/**
|
552
|
-
* Retrieves the specified inline policy document that is embedded with the specified IAM role. Policies returned by this operation are URL-encoded compliant with RFC 3986. You can use a URL decoding method to convert the policy back to plain JSON text. For example, if you use Java, you can use the decode method of the java.net.URLDecoder utility class in the Java SDK. Other languages and SDKs provide similar functionality. An IAM role can also have managed policies attached to it. To retrieve a managed policy document that is attached to a role, use GetPolicy to determine the policy's default version, then use GetPolicyVersion to retrieve the policy document. For more information about policies, see Managed policies and inline policies in the IAM User Guide.
|
552
|
+
* Retrieves the specified inline policy document that is embedded with the specified IAM role. Policies returned by this operation are URL-encoded compliant with RFC 3986. You can use a URL decoding method to convert the policy back to plain JSON text. For example, if you use Java, you can use the decode method of the java.net.URLDecoder utility class in the Java SDK. Other languages and SDKs provide similar functionality. An IAM role can also have managed policies attached to it. To retrieve a managed policy document that is attached to a role, use GetPolicy to determine the policy's default version, then use GetPolicyVersion to retrieve the policy document. For more information about policies, see Managed policies and inline policies in the IAM User Guide. For more information about roles, see IAM roles in the IAM User Guide.
|
553
553
|
*/
|
554
554
|
getRolePolicy(callback?: (err: AWSError, data: IAM.Types.GetRolePolicyResponse) => void): Request<IAM.Types.GetRolePolicyResponse, AWSError>;
|
555
555
|
/**
|
@@ -697,19 +697,19 @@ declare class IAM extends Service {
|
|
697
697
|
*/
|
698
698
|
listInstanceProfileTags(callback?: (err: AWSError, data: IAM.Types.ListInstanceProfileTagsResponse) => void): Request<IAM.Types.ListInstanceProfileTagsResponse, AWSError>;
|
699
699
|
/**
|
700
|
-
* Lists the instance profiles that have the specified path prefix. If there are none, the operation returns an empty list. For more information about instance profiles, see
|
700
|
+
* Lists the instance profiles that have the specified path prefix. If there are none, the operation returns an empty list. For more information about instance profiles, see Using instance profiles in the IAM User Guide. IAM resource-listing operations return a subset of the available attributes for the resource. For example, this operation does not return tags, even though they are an attribute of the returned object. To view all of the information for an instance profile, see GetInstanceProfile. You can paginate the results using the MaxItems and Marker parameters.
|
701
701
|
*/
|
702
702
|
listInstanceProfiles(params: IAM.Types.ListInstanceProfilesRequest, callback?: (err: AWSError, data: IAM.Types.ListInstanceProfilesResponse) => void): Request<IAM.Types.ListInstanceProfilesResponse, AWSError>;
|
703
703
|
/**
|
704
|
-
* Lists the instance profiles that have the specified path prefix. If there are none, the operation returns an empty list. For more information about instance profiles, see
|
704
|
+
* Lists the instance profiles that have the specified path prefix. If there are none, the operation returns an empty list. For more information about instance profiles, see Using instance profiles in the IAM User Guide. IAM resource-listing operations return a subset of the available attributes for the resource. For example, this operation does not return tags, even though they are an attribute of the returned object. To view all of the information for an instance profile, see GetInstanceProfile. You can paginate the results using the MaxItems and Marker parameters.
|
705
705
|
*/
|
706
706
|
listInstanceProfiles(callback?: (err: AWSError, data: IAM.Types.ListInstanceProfilesResponse) => void): Request<IAM.Types.ListInstanceProfilesResponse, AWSError>;
|
707
707
|
/**
|
708
|
-
* Lists the instance profiles that have the specified associated IAM role. If there are none, the operation returns an empty list. For more information about instance profiles, go to
|
708
|
+
* Lists the instance profiles that have the specified associated IAM role. If there are none, the operation returns an empty list. For more information about instance profiles, go to Using instance profiles in the IAM User Guide. You can paginate the results using the MaxItems and Marker parameters.
|
709
709
|
*/
|
710
710
|
listInstanceProfilesForRole(params: IAM.Types.ListInstanceProfilesForRoleRequest, callback?: (err: AWSError, data: IAM.Types.ListInstanceProfilesForRoleResponse) => void): Request<IAM.Types.ListInstanceProfilesForRoleResponse, AWSError>;
|
711
711
|
/**
|
712
|
-
* Lists the instance profiles that have the specified associated IAM role. If there are none, the operation returns an empty list. For more information about instance profiles, go to
|
712
|
+
* Lists the instance profiles that have the specified associated IAM role. If there are none, the operation returns an empty list. For more information about instance profiles, go to Using instance profiles in the IAM User Guide. You can paginate the results using the MaxItems and Marker parameters.
|
713
713
|
*/
|
714
714
|
listInstanceProfilesForRole(callback?: (err: AWSError, data: IAM.Types.ListInstanceProfilesForRoleResponse) => void): Request<IAM.Types.ListInstanceProfilesForRoleResponse, AWSError>;
|
715
715
|
/**
|
@@ -793,11 +793,11 @@ declare class IAM extends Service {
|
|
793
793
|
*/
|
794
794
|
listRoleTags(callback?: (err: AWSError, data: IAM.Types.ListRoleTagsResponse) => void): Request<IAM.Types.ListRoleTagsResponse, AWSError>;
|
795
795
|
/**
|
796
|
-
* Lists the IAM roles that have the specified path prefix. If there are none, the operation returns an empty list. For more information about roles, see
|
796
|
+
* Lists the IAM roles that have the specified path prefix. If there are none, the operation returns an empty list. For more information about roles, see IAM roles in the IAM User Guide. IAM resource-listing operations return a subset of the available attributes for the resource. This operation does not return the following attributes, even though they are an attribute of the returned object: PermissionsBoundary RoleLastUsed Tags To view all of the information for a role, see GetRole. You can paginate the results using the MaxItems and Marker parameters.
|
797
797
|
*/
|
798
798
|
listRoles(params: IAM.Types.ListRolesRequest, callback?: (err: AWSError, data: IAM.Types.ListRolesResponse) => void): Request<IAM.Types.ListRolesResponse, AWSError>;
|
799
799
|
/**
|
800
|
-
* Lists the IAM roles that have the specified path prefix. If there are none, the operation returns an empty list. For more information about roles, see
|
800
|
+
* Lists the IAM roles that have the specified path prefix. If there are none, the operation returns an empty list. For more information about roles, see IAM roles in the IAM User Guide. IAM resource-listing operations return a subset of the available attributes for the resource. This operation does not return the following attributes, even though they are an attribute of the returned object: PermissionsBoundary RoleLastUsed Tags To view all of the information for a role, see GetRole. You can paginate the results using the MaxItems and Marker parameters.
|
801
801
|
*/
|
802
802
|
listRoles(callback?: (err: AWSError, data: IAM.Types.ListRolesResponse) => void): Request<IAM.Types.ListRolesResponse, AWSError>;
|
803
803
|
/**
|
@@ -905,11 +905,11 @@ declare class IAM extends Service {
|
|
905
905
|
*/
|
906
906
|
putRolePermissionsBoundary(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
907
907
|
/**
|
908
|
-
* Adds or updates an inline policy document that is embedded in the specified IAM role. When you embed an inline policy in a role, the inline policy is used as part of the role's access (permissions) policy. The role's trust policy is created at the same time as the role, using CreateRole . You can update a role's trust policy using
|
908
|
+
* Adds or updates an inline policy document that is embedded in the specified IAM role. When you embed an inline policy in a role, the inline policy is used as part of the role's access (permissions) policy. The role's trust policy is created at the same time as the role, using CreateRole . You can update a role's trust policy using UpdateAssumeRolePolicy . For more information about roles, see IAM roles in the IAM User Guide. A role can also have a managed policy attached to it. To attach a managed policy to a role, use AttachRolePolicy . To create a new managed policy, use CreatePolicy . For information about policies, see Managed policies and inline policies in the IAM User Guide. For information about the maximum number of inline policies that you can embed with a role, see IAM and STS quotas in the IAM User Guide. Because policy documents can be large, you should use POST rather than GET when calling PutRolePolicy. For general information about using the Query API with IAM, see Making query requests in the IAM User Guide.
|
909
909
|
*/
|
910
910
|
putRolePolicy(params: IAM.Types.PutRolePolicyRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
911
911
|
/**
|
912
|
-
* Adds or updates an inline policy document that is embedded in the specified IAM role. When you embed an inline policy in a role, the inline policy is used as part of the role's access (permissions) policy. The role's trust policy is created at the same time as the role, using CreateRole . You can update a role's trust policy using
|
912
|
+
* Adds or updates an inline policy document that is embedded in the specified IAM role. When you embed an inline policy in a role, the inline policy is used as part of the role's access (permissions) policy. The role's trust policy is created at the same time as the role, using CreateRole . You can update a role's trust policy using UpdateAssumeRolePolicy . For more information about roles, see IAM roles in the IAM User Guide. A role can also have a managed policy attached to it. To attach a managed policy to a role, use AttachRolePolicy . To create a new managed policy, use CreatePolicy . For information about policies, see Managed policies and inline policies in the IAM User Guide. For information about the maximum number of inline policies that you can embed with a role, see IAM and STS quotas in the IAM User Guide. Because policy documents can be large, you should use POST rather than GET when calling PutRolePolicy. For general information about using the Query API with IAM, see Making query requests in the IAM User Guide.
|
913
913
|
*/
|
914
914
|
putRolePolicy(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
915
915
|
/**
|
@@ -937,11 +937,11 @@ declare class IAM extends Service {
|
|
937
937
|
*/
|
938
938
|
removeClientIDFromOpenIDConnectProvider(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
939
939
|
/**
|
940
|
-
* Removes the specified IAM role from the specified EC2 instance profile. Make sure that you do not have any Amazon EC2 instances running with the role you are about to remove from the instance profile. Removing a role from an instance profile that is associated with a running instance might break any applications running on the instance. For more information about
|
940
|
+
* Removes the specified IAM role from the specified EC2 instance profile. Make sure that you do not have any Amazon EC2 instances running with the role you are about to remove from the instance profile. Removing a role from an instance profile that is associated with a running instance might break any applications running on the instance. For more information about roles, see IAM roles in the IAM User Guide. For more information about instance profiles, see Using instance profiles in the IAM User Guide.
|
941
941
|
*/
|
942
942
|
removeRoleFromInstanceProfile(params: IAM.Types.RemoveRoleFromInstanceProfileRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
943
943
|
/**
|
944
|
-
* Removes the specified IAM role from the specified EC2 instance profile. Make sure that you do not have any Amazon EC2 instances running with the role you are about to remove from the instance profile. Removing a role from an instance profile that is associated with a running instance might break any applications running on the instance. For more information about
|
944
|
+
* Removes the specified IAM role from the specified EC2 instance profile. Make sure that you do not have any Amazon EC2 instances running with the role you are about to remove from the instance profile. Removing a role from an instance profile that is associated with a running instance might break any applications running on the instance. For more information about roles, see IAM roles in the IAM User Guide. For more information about instance profiles, see Using instance profiles in the IAM User Guide.
|
945
945
|
*/
|
946
946
|
removeRoleFromInstanceProfile(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
947
947
|
/**
|
@@ -1169,11 +1169,11 @@ declare class IAM extends Service {
|
|
1169
1169
|
*/
|
1170
1170
|
updateLoginProfile(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
1171
1171
|
/**
|
1172
|
-
* Replaces the existing list of server certificate thumbprints associated with an OpenID Connect (OIDC) provider resource object with a new list of thumbprints. The list that you pass with this operation completely replaces the existing list of thumbprints. (The lists are not merged.) Typically, you need to update a thumbprint only when the identity provider certificate changes, which occurs rarely. However, if the provider's certificate does change, any attempt to assume an IAM role that specifies the OIDC provider as a principal fails until the certificate thumbprint is updated. Amazon Web Services secures communication with some OIDC identity providers (IdPs) through our library of trusted certificate authorities (CAs) instead of using a certificate thumbprint to verify your IdP server certificate. These OIDC IdPs include
|
1172
|
+
* Replaces the existing list of server certificate thumbprints associated with an OpenID Connect (OIDC) provider resource object with a new list of thumbprints. The list that you pass with this operation completely replaces the existing list of thumbprints. (The lists are not merged.) Typically, you need to update a thumbprint only when the identity provider certificate changes, which occurs rarely. However, if the provider's certificate does change, any attempt to assume an IAM role that specifies the OIDC provider as a principal fails until the certificate thumbprint is updated. Amazon Web Services secures communication with some OIDC identity providers (IdPs) through our library of trusted root certificate authorities (CAs) instead of using a certificate thumbprint to verify your IdP server certificate. These OIDC IdPs include Auth0, GitHub, Google, and those that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS) endpoint. In these cases, your legacy thumbprint remains in your configuration, but is no longer used for validation. Trust for the OIDC provider is derived from the provider certificate and is validated by the thumbprint. Therefore, it is best to limit access to the UpdateOpenIDConnectProviderThumbprint operation to highly privileged users.
|
1173
1173
|
*/
|
1174
1174
|
updateOpenIDConnectProviderThumbprint(params: IAM.Types.UpdateOpenIDConnectProviderThumbprintRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
1175
1175
|
/**
|
1176
|
-
* Replaces the existing list of server certificate thumbprints associated with an OpenID Connect (OIDC) provider resource object with a new list of thumbprints. The list that you pass with this operation completely replaces the existing list of thumbprints. (The lists are not merged.) Typically, you need to update a thumbprint only when the identity provider certificate changes, which occurs rarely. However, if the provider's certificate does change, any attempt to assume an IAM role that specifies the OIDC provider as a principal fails until the certificate thumbprint is updated. Amazon Web Services secures communication with some OIDC identity providers (IdPs) through our library of trusted certificate authorities (CAs) instead of using a certificate thumbprint to verify your IdP server certificate. These OIDC IdPs include
|
1176
|
+
* Replaces the existing list of server certificate thumbprints associated with an OpenID Connect (OIDC) provider resource object with a new list of thumbprints. The list that you pass with this operation completely replaces the existing list of thumbprints. (The lists are not merged.) Typically, you need to update a thumbprint only when the identity provider certificate changes, which occurs rarely. However, if the provider's certificate does change, any attempt to assume an IAM role that specifies the OIDC provider as a principal fails until the certificate thumbprint is updated. Amazon Web Services secures communication with some OIDC identity providers (IdPs) through our library of trusted root certificate authorities (CAs) instead of using a certificate thumbprint to verify your IdP server certificate. These OIDC IdPs include Auth0, GitHub, Google, and those that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS) endpoint. In these cases, your legacy thumbprint remains in your configuration, but is no longer used for validation. Trust for the OIDC provider is derived from the provider certificate and is validated by the thumbprint. Therefore, it is best to limit access to the UpdateOpenIDConnectProviderThumbprint operation to highly privileged users.
|
1177
1177
|
*/
|
1178
1178
|
updateOpenIDConnectProviderThumbprint(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
1179
1179
|
/**
|
@@ -4026,7 +4026,7 @@ declare namespace IAM {
|
|
4026
4026
|
*/
|
4027
4027
|
PolicyName: policyNameType;
|
4028
4028
|
/**
|
4029
|
-
* The policy document. You must provide policies in JSON format in IAM. However, for CloudFormation templates formatted in YAML, you can provide the policy in JSON or YAML format. CloudFormation always converts a YAML policy to JSON format before submitting it to
|
4029
|
+
* The policy document. You must provide policies in JSON format in IAM. However, for CloudFormation templates formatted in YAML, you can provide the policy in JSON or YAML format. CloudFormation always converts a YAML policy to JSON format before submitting it to IAM. The regex pattern used to validate this parameter is a string of characters consisting of the following: Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF) The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)
|
4030
4030
|
*/
|
4031
4031
|
PolicyDocument: policyDocumentType;
|
4032
4032
|
}
|
package/clients/mediatailor.d.ts
CHANGED
@@ -419,6 +419,10 @@ declare namespace MediaTailor {
|
|
419
419
|
* If an alert is generated for a resource, an explanation of the reason for the alert.
|
420
420
|
*/
|
421
421
|
AlertMessage: __string;
|
422
|
+
/**
|
423
|
+
* The category that MediaTailor assigns to the alert.
|
424
|
+
*/
|
425
|
+
Category?: AlertCategory;
|
422
426
|
/**
|
423
427
|
* The timestamp when the alert was last modified.
|
424
428
|
*/
|
@@ -432,6 +436,7 @@ declare namespace MediaTailor {
|
|
432
436
|
*/
|
433
437
|
ResourceArn: __string;
|
434
438
|
}
|
439
|
+
export type AlertCategory = "SCHEDULING_ERROR"|"PLAYBACK_WARNING"|"INFO"|string;
|
435
440
|
export interface AvailMatchingCriteria {
|
436
441
|
/**
|
437
442
|
* The dynamic variable(s) that MediaTailor should use as avail matching criteria. MediaTailor only places the prefetched ads into the avail if the avail matches the criteria defined by the dynamic variable. For information about dynamic variables, see Using dynamic ad variables in the MediaTailor User Guide. You can include up to 100 dynamic variables.
|
@@ -1488,7 +1493,7 @@ declare namespace MediaTailor {
|
|
1488
1493
|
*/
|
1489
1494
|
Key: String;
|
1490
1495
|
/**
|
1491
|
-
* For SCTE35_ENHANCED output, defines a
|
1496
|
+
* For SCTE35_ENHANCED output, defines a value. MediaTailor; takes this value, and its associated key, and generates the key/value pair within the EXT-X-ASSETtag. If you specify a value, you must also specify a corresponding key.
|
1492
1497
|
*/
|
1493
1498
|
Value: String;
|
1494
1499
|
}
|
package/clients/personalize.d.ts
CHANGED
@@ -523,6 +523,14 @@ declare class Personalize extends Service {
|
|
523
523
|
* Updates a campaign by either deploying a new solution or changing the value of the campaign's minProvisionedTPS parameter. To update a campaign, the campaign status must be ACTIVE or CREATE FAILED. Check the campaign status using the DescribeCampaign operation. You can still get recommendations from a campaign while an update is in progress. The campaign will use the previous solution version and campaign configuration to generate recommendations until the latest campaign update status is Active. For more information on campaigns, see CreateCampaign.
|
524
524
|
*/
|
525
525
|
updateCampaign(callback?: (err: AWSError, data: Personalize.Types.UpdateCampaignResponse) => void): Request<Personalize.Types.UpdateCampaignResponse, AWSError>;
|
526
|
+
/**
|
527
|
+
* Update a dataset to replace its schema with a new or existing one. For more information, see Replacing a dataset's schema.
|
528
|
+
*/
|
529
|
+
updateDataset(params: Personalize.Types.UpdateDatasetRequest, callback?: (err: AWSError, data: Personalize.Types.UpdateDatasetResponse) => void): Request<Personalize.Types.UpdateDatasetResponse, AWSError>;
|
530
|
+
/**
|
531
|
+
* Update a dataset to replace its schema with a new or existing one. For more information, see Replacing a dataset's schema.
|
532
|
+
*/
|
533
|
+
updateDataset(callback?: (err: AWSError, data: Personalize.Types.UpdateDatasetResponse) => void): Request<Personalize.Types.UpdateDatasetResponse, AWSError>;
|
526
534
|
/**
|
527
535
|
* Updates a metric attribution.
|
528
536
|
*/
|
@@ -1309,7 +1317,7 @@ declare namespace Personalize {
|
|
1309
1317
|
*/
|
1310
1318
|
performAutoML?: PerformAutoML;
|
1311
1319
|
/**
|
1312
|
-
* The ARN of the recipe to use for model training.
|
1320
|
+
* The ARN of the recipe to use for model training. This is required when performAutoML is false.
|
1313
1321
|
*/
|
1314
1322
|
recipeArn?: Arn;
|
1315
1323
|
/**
|
@@ -1398,6 +1406,10 @@ declare namespace Personalize {
|
|
1398
1406
|
* A time stamp that shows when the dataset was updated.
|
1399
1407
|
*/
|
1400
1408
|
lastUpdatedDateTime?: _Date;
|
1409
|
+
/**
|
1410
|
+
* Describes the latest update to the dataset.
|
1411
|
+
*/
|
1412
|
+
latestDatasetUpdate?: DatasetUpdateSummary;
|
1401
1413
|
}
|
1402
1414
|
export interface DatasetExportJob {
|
1403
1415
|
/**
|
@@ -1692,6 +1704,28 @@ declare namespace Personalize {
|
|
1692
1704
|
lastUpdatedDateTime?: _Date;
|
1693
1705
|
}
|
1694
1706
|
export type DatasetType = string;
|
1707
|
+
export interface DatasetUpdateSummary {
|
1708
|
+
/**
|
1709
|
+
* The Amazon Resource Name (ARN) of the schema that replaced the previous schema of the dataset.
|
1710
|
+
*/
|
1711
|
+
schemaArn?: Arn;
|
1712
|
+
/**
|
1713
|
+
* The status of the dataset update.
|
1714
|
+
*/
|
1715
|
+
status?: Status;
|
1716
|
+
/**
|
1717
|
+
* If updating a dataset fails, provides the reason why.
|
1718
|
+
*/
|
1719
|
+
failureReason?: FailureReason;
|
1720
|
+
/**
|
1721
|
+
* The creation date and time (in Unix time) of the dataset update.
|
1722
|
+
*/
|
1723
|
+
creationDateTime?: _Date;
|
1724
|
+
/**
|
1725
|
+
* The last update date and time (in Unix time) of the dataset.
|
1726
|
+
*/
|
1727
|
+
lastUpdatedDateTime?: _Date;
|
1728
|
+
}
|
1695
1729
|
export type Datasets = DatasetSummary[];
|
1696
1730
|
export type _Date = Date;
|
1697
1731
|
export interface DefaultCategoricalHyperParameterRange {
|
@@ -2985,7 +3019,7 @@ declare namespace Personalize {
|
|
2985
3019
|
*/
|
2986
3020
|
performAutoML?: PerformAutoML;
|
2987
3021
|
/**
|
2988
|
-
* The ARN of the recipe used to create the solution.
|
3022
|
+
* The ARN of the recipe used to create the solution. This is required when performAutoML is false.
|
2989
3023
|
*/
|
2990
3024
|
recipeArn?: Arn;
|
2991
3025
|
/**
|
@@ -3278,6 +3312,22 @@ declare namespace Personalize {
|
|
3278
3312
|
*/
|
3279
3313
|
campaignArn?: Arn;
|
3280
3314
|
}
|
3315
|
+
export interface UpdateDatasetRequest {
|
3316
|
+
/**
|
3317
|
+
* The Amazon Resource Name (ARN) of the dataset that you want to update.
|
3318
|
+
*/
|
3319
|
+
datasetArn: Arn;
|
3320
|
+
/**
|
3321
|
+
* The Amazon Resource Name (ARN) of the new schema you want use.
|
3322
|
+
*/
|
3323
|
+
schemaArn: Arn;
|
3324
|
+
}
|
3325
|
+
export interface UpdateDatasetResponse {
|
3326
|
+
/**
|
3327
|
+
* The Amazon Resource Name (ARN) of the dataset you updated.
|
3328
|
+
*/
|
3329
|
+
datasetArn?: Arn;
|
3330
|
+
}
|
3281
3331
|
export interface UpdateMetricAttributionRequest {
|
3282
3332
|
/**
|
3283
3333
|
* Add new metric attributes to the metric attribution.
|