aws-sdk 2.1441.0 → 2.1442.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +6 -1
- package/README.md +1 -1
- package/apis/ce-2017-10-25.min.json +3 -1
- package/apis/rds-2014-10-31.min.json +4 -0
- package/apis/verifiedpermissions-2021-12-01.min.json +127 -33
- package/clients/costexplorer.d.ts +10 -2
- package/clients/globalaccelerator.d.ts +2 -2
- package/clients/rds.d.ts +8 -0
- package/clients/verifiedpermissions.d.ts +11 -11
- package/dist/aws-sdk-core-react-native.js +1 -1
- package/dist/aws-sdk-react-native.js +4 -4
- package/dist/aws-sdk.js +10 -4
- package/dist/aws-sdk.min.js +58 -58
- package/lib/core.js +1 -1
- package/package.json +1 -1
package/CHANGELOG.md
CHANGED
@@ -1,7 +1,12 @@
|
|
1
1
|
# Changelog for AWS SDK for JavaScript
|
2
|
-
<!--LATEST=2.
|
2
|
+
<!--LATEST=2.1442.0-->
|
3
3
|
<!--ENTRYINSERT-->
|
4
4
|
|
5
|
+
## 2.1442.0
|
6
|
+
* feature: CostExplorer: This release adds the LastUpdatedDate and LastUsedDate timestamps to help you manage your cost allocation tags.
|
7
|
+
* feature: RDS: Adding parameters to CreateCustomDbEngineVersion reserved for future use.
|
8
|
+
* feature: VerifiedPermissions: Documentation updates for Amazon Verified Permissions. Increases max results per page for ListPolicyStores, ListPolicies, and ListPolicyTemplates APIs from 20 to 50.
|
9
|
+
|
5
10
|
## 2.1441.0
|
6
11
|
* feature: EC2: The DeleteKeyPair API has been updated to return the keyPairId when an existing key pair is deleted.
|
7
12
|
* feature: Finspace: Allow customers to manage outbound traffic from their Kx Environment when attaching a transit gateway by providing network acl entries. Allow the customer to choose how they want to update the databases on a cluster allowing updates to possibly be faster than usual.
|
package/README.md
CHANGED
@@ -71,7 +71,7 @@ require('aws-sdk/lib/maintenance_mode_message').suppress = true;
|
|
71
71
|
To use the SDK in the browser, simply add the following script tag to your
|
72
72
|
HTML pages:
|
73
73
|
|
74
|
-
<script src="https://sdk.amazonaws.com/js/aws-sdk-2.
|
74
|
+
<script src="https://sdk.amazonaws.com/js/aws-sdk-2.1442.0.min.js"></script>
|
75
75
|
|
76
76
|
You can also build a custom browser SDK with your specified set of AWS services.
|
77
77
|
This can allow you to reduce the SDK's size, specify different API versions of
|
@@ -43,7 +43,9 @@
|
|
43
43
|
},
|
44
44
|
"union": true
|
45
45
|
},
|
46
|
-
"principalEntityType": {
|
46
|
+
"principalEntityType": {
|
47
|
+
"shape": "S9"
|
48
|
+
}
|
47
49
|
}
|
48
50
|
},
|
49
51
|
"output": {
|
@@ -88,8 +90,12 @@
|
|
88
90
|
"statement"
|
89
91
|
],
|
90
92
|
"members": {
|
91
|
-
"description": {
|
92
|
-
|
93
|
+
"description": {
|
94
|
+
"shape": "Sg"
|
95
|
+
},
|
96
|
+
"statement": {
|
97
|
+
"shape": "Sh"
|
98
|
+
}
|
93
99
|
}
|
94
100
|
},
|
95
101
|
"templateLinked": {
|
@@ -189,8 +195,12 @@
|
|
189
195
|
"idempotencyToken": true
|
190
196
|
},
|
191
197
|
"policyStoreId": {},
|
192
|
-
"description": {
|
193
|
-
|
198
|
+
"description": {
|
199
|
+
"shape": "Sw"
|
200
|
+
},
|
201
|
+
"statement": {
|
202
|
+
"shape": "Sh"
|
203
|
+
}
|
194
204
|
}
|
195
205
|
},
|
196
206
|
"output": {
|
@@ -326,7 +336,9 @@
|
|
326
336
|
"shape": "Sb"
|
327
337
|
},
|
328
338
|
"policyStoreId": {},
|
329
|
-
"principalEntityType": {
|
339
|
+
"principalEntityType": {
|
340
|
+
"shape": "S9"
|
341
|
+
}
|
330
342
|
}
|
331
343
|
}
|
332
344
|
},
|
@@ -371,8 +383,12 @@
|
|
371
383
|
"statement"
|
372
384
|
],
|
373
385
|
"members": {
|
374
|
-
"description": {
|
375
|
-
|
386
|
+
"description": {
|
387
|
+
"shape": "Sg"
|
388
|
+
},
|
389
|
+
"statement": {
|
390
|
+
"shape": "Sh"
|
391
|
+
}
|
376
392
|
}
|
377
393
|
},
|
378
394
|
"templateLinked": {
|
@@ -460,8 +476,12 @@
|
|
460
476
|
"members": {
|
461
477
|
"policyStoreId": {},
|
462
478
|
"policyTemplateId": {},
|
463
|
-
"description": {
|
464
|
-
|
479
|
+
"description": {
|
480
|
+
"shape": "Sw"
|
481
|
+
},
|
482
|
+
"statement": {
|
483
|
+
"shape": "Sh"
|
484
|
+
},
|
465
485
|
"createdDate": {
|
466
486
|
"shape": "Sb"
|
467
487
|
},
|
@@ -491,7 +511,9 @@
|
|
491
511
|
],
|
492
512
|
"members": {
|
493
513
|
"policyStoreId": {},
|
494
|
-
"schema": {
|
514
|
+
"schema": {
|
515
|
+
"shape": "S1m"
|
516
|
+
},
|
495
517
|
"createdDate": {
|
496
518
|
"shape": "Sb"
|
497
519
|
},
|
@@ -552,8 +574,12 @@
|
|
552
574
|
],
|
553
575
|
"members": {
|
554
576
|
"policyStoreId": {},
|
555
|
-
"identityToken": {
|
556
|
-
|
577
|
+
"identityToken": {
|
578
|
+
"shape": "S2c"
|
579
|
+
},
|
580
|
+
"accessToken": {
|
581
|
+
"shape": "S2c"
|
582
|
+
},
|
557
583
|
"action": {
|
558
584
|
"shape": "S1o"
|
559
585
|
},
|
@@ -603,7 +629,9 @@
|
|
603
629
|
"member": {
|
604
630
|
"type": "structure",
|
605
631
|
"members": {
|
606
|
-
"principalEntityType": {
|
632
|
+
"principalEntityType": {
|
633
|
+
"shape": "S9"
|
634
|
+
}
|
607
635
|
}
|
608
636
|
}
|
609
637
|
}
|
@@ -648,7 +676,9 @@
|
|
648
676
|
"shape": "Sb"
|
649
677
|
},
|
650
678
|
"policyStoreId": {},
|
651
|
-
"principalEntityType": {
|
679
|
+
"principalEntityType": {
|
680
|
+
"shape": "S9"
|
681
|
+
}
|
652
682
|
}
|
653
683
|
}
|
654
684
|
}
|
@@ -717,7 +747,9 @@
|
|
717
747
|
"static": {
|
718
748
|
"type": "structure",
|
719
749
|
"members": {
|
720
|
-
"description": {
|
750
|
+
"description": {
|
751
|
+
"shape": "Sg"
|
752
|
+
}
|
721
753
|
}
|
722
754
|
},
|
723
755
|
"templateLinked": {
|
@@ -822,7 +854,9 @@
|
|
822
854
|
"members": {
|
823
855
|
"policyStoreId": {},
|
824
856
|
"policyTemplateId": {},
|
825
|
-
"description": {
|
857
|
+
"description": {
|
858
|
+
"shape": "Sw"
|
859
|
+
},
|
826
860
|
"createdDate": {
|
827
861
|
"shape": "Sb"
|
828
862
|
},
|
@@ -847,7 +881,9 @@
|
|
847
881
|
"definition": {
|
848
882
|
"type": "structure",
|
849
883
|
"members": {
|
850
|
-
"cedarJson": {
|
884
|
+
"cedarJson": {
|
885
|
+
"shape": "S1m"
|
886
|
+
}
|
851
887
|
},
|
852
888
|
"union": true
|
853
889
|
}
|
@@ -865,7 +901,10 @@
|
|
865
901
|
"policyStoreId": {},
|
866
902
|
"namespaces": {
|
867
903
|
"type": "list",
|
868
|
-
"member": {
|
904
|
+
"member": {
|
905
|
+
"type": "string",
|
906
|
+
"sensitive": true
|
907
|
+
}
|
869
908
|
},
|
870
909
|
"createdDate": {
|
871
910
|
"shape": "Sb"
|
@@ -906,7 +945,9 @@
|
|
906
945
|
},
|
907
946
|
"union": true
|
908
947
|
},
|
909
|
-
"principalEntityType": {
|
948
|
+
"principalEntityType": {
|
949
|
+
"shape": "S9"
|
950
|
+
}
|
910
951
|
}
|
911
952
|
},
|
912
953
|
"output": {
|
@@ -950,8 +991,12 @@
|
|
950
991
|
"statement"
|
951
992
|
],
|
952
993
|
"members": {
|
953
|
-
"description": {
|
954
|
-
|
994
|
+
"description": {
|
995
|
+
"shape": "Sg"
|
996
|
+
},
|
997
|
+
"statement": {
|
998
|
+
"shape": "Sh"
|
999
|
+
}
|
955
1000
|
}
|
956
1001
|
}
|
957
1002
|
},
|
@@ -1034,8 +1079,12 @@
|
|
1034
1079
|
"members": {
|
1035
1080
|
"policyStoreId": {},
|
1036
1081
|
"policyTemplateId": {},
|
1037
|
-
"description": {
|
1038
|
-
|
1082
|
+
"description": {
|
1083
|
+
"shape": "Sw"
|
1084
|
+
},
|
1085
|
+
"statement": {
|
1086
|
+
"shape": "Sh"
|
1087
|
+
}
|
1039
1088
|
}
|
1040
1089
|
},
|
1041
1090
|
"output": {
|
@@ -1063,12 +1112,27 @@
|
|
1063
1112
|
"shapes": {
|
1064
1113
|
"S7": {
|
1065
1114
|
"type": "list",
|
1066
|
-
"member": {
|
1115
|
+
"member": {
|
1116
|
+
"type": "string",
|
1117
|
+
"sensitive": true
|
1118
|
+
}
|
1119
|
+
},
|
1120
|
+
"S9": {
|
1121
|
+
"type": "string",
|
1122
|
+
"sensitive": true
|
1067
1123
|
},
|
1068
1124
|
"Sb": {
|
1069
1125
|
"type": "timestamp",
|
1070
1126
|
"timestampFormat": "iso8601"
|
1071
1127
|
},
|
1128
|
+
"Sg": {
|
1129
|
+
"type": "string",
|
1130
|
+
"sensitive": true
|
1131
|
+
},
|
1132
|
+
"Sh": {
|
1133
|
+
"type": "string",
|
1134
|
+
"sensitive": true
|
1135
|
+
},
|
1072
1136
|
"Sk": {
|
1073
1137
|
"type": "structure",
|
1074
1138
|
"required": [
|
@@ -1076,8 +1140,14 @@
|
|
1076
1140
|
"entityId"
|
1077
1141
|
],
|
1078
1142
|
"members": {
|
1079
|
-
"entityType": {
|
1080
|
-
|
1143
|
+
"entityType": {
|
1144
|
+
"type": "string",
|
1145
|
+
"sensitive": true
|
1146
|
+
},
|
1147
|
+
"entityId": {
|
1148
|
+
"type": "string",
|
1149
|
+
"sensitive": true
|
1150
|
+
}
|
1081
1151
|
}
|
1082
1152
|
},
|
1083
1153
|
"Sr": {
|
@@ -1089,6 +1159,14 @@
|
|
1089
1159
|
"mode": {}
|
1090
1160
|
}
|
1091
1161
|
},
|
1162
|
+
"Sw": {
|
1163
|
+
"type": "string",
|
1164
|
+
"sensitive": true
|
1165
|
+
},
|
1166
|
+
"S1m": {
|
1167
|
+
"type": "string",
|
1168
|
+
"sensitive": true
|
1169
|
+
},
|
1092
1170
|
"S1o": {
|
1093
1171
|
"type": "structure",
|
1094
1172
|
"required": [
|
@@ -1096,8 +1174,14 @@
|
|
1096
1174
|
"actionId"
|
1097
1175
|
],
|
1098
1176
|
"members": {
|
1099
|
-
"actionType": {
|
1100
|
-
|
1177
|
+
"actionType": {
|
1178
|
+
"type": "string",
|
1179
|
+
"sensitive": true
|
1180
|
+
},
|
1181
|
+
"actionId": {
|
1182
|
+
"type": "string",
|
1183
|
+
"sensitive": true
|
1184
|
+
}
|
1101
1185
|
}
|
1102
1186
|
},
|
1103
1187
|
"S1r": {
|
@@ -1117,15 +1201,20 @@
|
|
1117
1201
|
"type": "structure",
|
1118
1202
|
"members": {
|
1119
1203
|
"boolean": {
|
1120
|
-
"type": "boolean"
|
1204
|
+
"type": "boolean",
|
1205
|
+
"sensitive": true
|
1121
1206
|
},
|
1122
1207
|
"entityIdentifier": {
|
1123
1208
|
"shape": "Sk"
|
1124
1209
|
},
|
1125
1210
|
"long": {
|
1126
|
-
"type": "long"
|
1211
|
+
"type": "long",
|
1212
|
+
"sensitive": true
|
1213
|
+
},
|
1214
|
+
"string": {
|
1215
|
+
"type": "string",
|
1216
|
+
"sensitive": true
|
1127
1217
|
},
|
1128
|
-
"string": {},
|
1129
1218
|
"set": {
|
1130
1219
|
"type": "list",
|
1131
1220
|
"member": {
|
@@ -1196,9 +1285,14 @@
|
|
1196
1285
|
],
|
1197
1286
|
"members": {
|
1198
1287
|
"errorDescription": {}
|
1199
|
-
}
|
1288
|
+
},
|
1289
|
+
"sensitive": true
|
1200
1290
|
}
|
1201
1291
|
},
|
1292
|
+
"S2c": {
|
1293
|
+
"type": "string",
|
1294
|
+
"sensitive": true
|
1295
|
+
},
|
1202
1296
|
"S2q": {
|
1203
1297
|
"type": "structure",
|
1204
1298
|
"members": {
|
@@ -164,11 +164,11 @@ declare class CostExplorer extends Service {
|
|
164
164
|
*/
|
165
165
|
getRightsizingRecommendation(callback?: (err: AWSError, data: CostExplorer.Types.GetRightsizingRecommendationResponse) => void): Request<CostExplorer.Types.GetRightsizingRecommendationResponse, AWSError>;
|
166
166
|
/**
|
167
|
-
* Retrieves the details for a Savings Plan recommendation. These details include the hourly data-points that construct the
|
167
|
+
* Retrieves the details for a Savings Plan recommendation. These details include the hourly data-points that construct the cost, coverage, and utilization charts.
|
168
168
|
*/
|
169
169
|
getSavingsPlanPurchaseRecommendationDetails(params: CostExplorer.Types.GetSavingsPlanPurchaseRecommendationDetailsRequest, callback?: (err: AWSError, data: CostExplorer.Types.GetSavingsPlanPurchaseRecommendationDetailsResponse) => void): Request<CostExplorer.Types.GetSavingsPlanPurchaseRecommendationDetailsResponse, AWSError>;
|
170
170
|
/**
|
171
|
-
* Retrieves the details for a Savings Plan recommendation. These details include the hourly data-points that construct the
|
171
|
+
* Retrieves the details for a Savings Plan recommendation. These details include the hourly data-points that construct the cost, coverage, and utilization charts.
|
172
172
|
*/
|
173
173
|
getSavingsPlanPurchaseRecommendationDetails(callback?: (err: AWSError, data: CostExplorer.Types.GetSavingsPlanPurchaseRecommendationDetailsResponse) => void): Request<CostExplorer.Types.GetSavingsPlanPurchaseRecommendationDetailsResponse, AWSError>;
|
174
174
|
/**
|
@@ -470,6 +470,14 @@ declare namespace CostExplorer {
|
|
470
470
|
* The status of a cost allocation tag.
|
471
471
|
*/
|
472
472
|
Status: CostAllocationTagStatus;
|
473
|
+
/**
|
474
|
+
* The last date that the tag was either activated or deactivated.
|
475
|
+
*/
|
476
|
+
LastUpdatedDate?: ZonedDateTime;
|
477
|
+
/**
|
478
|
+
* The last month that the tag was used on an Amazon Web Services resource.
|
479
|
+
*/
|
480
|
+
LastUsedDate?: ZonedDateTime;
|
473
481
|
}
|
474
482
|
export type CostAllocationTagKeyList = TagKey[];
|
475
483
|
export type CostAllocationTagList = CostAllocationTag[];
|
@@ -1122,7 +1122,7 @@ declare namespace GlobalAccelerator {
|
|
1122
1122
|
*/
|
1123
1123
|
Weight?: EndpointWeight;
|
1124
1124
|
/**
|
1125
|
-
* Indicates whether client IP address preservation is enabled for an endpoint. The value is true or false. The default value is true for new accelerators. If the value is set to true, the client's IP address is preserved in the X-Forwarded-For request header as traffic travels to applications on the endpoint fronted by the accelerator. Client IP address preservation is supported, in specific Amazon Web Services Regions, for endpoints that are Application Load Balancers
|
1125
|
+
* Indicates whether client IP address preservation is enabled for an endpoint. The value is true or false. The default value is true for new accelerators. If the value is set to true, the client's IP address is preserved in the X-Forwarded-For request header as traffic travels to applications on the endpoint fronted by the accelerator. Client IP address preservation is supported, in specific Amazon Web Services Regions, for endpoints that are Application Load Balancers, Amazon EC2 instances, and Network Load Balancers with Security Groups. IMPORTANT: You cannot use client IP address preservation with Network Load Balancers with TLS listeners. For more information, see Preserve client IP addresses in Global Accelerator in the Global Accelerator Developer Guide.
|
1126
1126
|
*/
|
1127
1127
|
ClientIPPreservationEnabled?: GenericBoolean;
|
1128
1128
|
}
|
@@ -1145,7 +1145,7 @@ declare namespace GlobalAccelerator {
|
|
1145
1145
|
*/
|
1146
1146
|
HealthReason?: GenericString;
|
1147
1147
|
/**
|
1148
|
-
* Indicates whether client IP address preservation is enabled for an endpoint. The value is true or false. The default value is true for new accelerators. If the value is set to true, the client's IP address is preserved in the X-Forwarded-For request header as traffic travels to applications on the endpoint fronted by the accelerator. Client IP address preservation is supported, in specific Amazon Web Services Regions, for endpoints that are Application Load Balancers
|
1148
|
+
* Indicates whether client IP address preservation is enabled for an endpoint. The value is true or false. The default value is true for new accelerators. If the value is set to true, the client's IP address is preserved in the X-Forwarded-For request header as traffic travels to applications on the endpoint fronted by the accelerator. Client IP address preservation is supported, in specific Amazon Web Services Regions, for endpoints that are Application Load Balancers, Amazon EC2 instances, and Network Load Balancers with Security Groups. IMPORTANT: You cannot use client IP address preservation with Network Load Balancers with TLS listeners. For more information, see Preserve client IP addresses in Global Accelerator in the Global Accelerator Developer Guide.
|
1149
1149
|
*/
|
1150
1150
|
ClientIPPreservationEnabled?: GenericBoolean;
|
1151
1151
|
}
|
package/clients/rds.d.ts
CHANGED
@@ -1814,6 +1814,14 @@ declare namespace RDS {
|
|
1814
1814
|
*/
|
1815
1815
|
Manifest?: CustomDBEngineVersionManifest;
|
1816
1816
|
Tags?: TagList;
|
1817
|
+
/**
|
1818
|
+
* Reserved for future use.
|
1819
|
+
*/
|
1820
|
+
SourceCustomDbEngineVersionIdentifier?: String255;
|
1821
|
+
/**
|
1822
|
+
* Reserved for future use.
|
1823
|
+
*/
|
1824
|
+
UseAwsProvidedLatestImage?: BooleanOptional;
|
1817
1825
|
}
|
1818
1826
|
export interface CreateDBClusterEndpointMessage {
|
1819
1827
|
/**
|
@@ -124,11 +124,11 @@ declare class VerifiedPermissions extends Service {
|
|
124
124
|
*/
|
125
125
|
isAuthorized(callback?: (err: AWSError, data: VerifiedPermissions.Types.IsAuthorizedOutput) => void): Request<VerifiedPermissions.Types.IsAuthorizedOutput, AWSError>;
|
126
126
|
/**
|
127
|
-
* Makes an authorization decision about a service request described in the parameters. The principal in this request comes from an external identity source. The information in the parameters can also define additional context that Verified Permissions can include in the evaluation. The request is evaluated against all matching policies in the specified policy store. The result of the decision is either Allow or Deny, along with a list of the policies that resulted in the decision. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire.
|
127
|
+
* Makes an authorization decision about a service request described in the parameters. The principal in this request comes from an external identity source in the form of an identity token formatted as a JSON web token (JWT). The information in the parameters can also define additional context that Verified Permissions can include in the evaluation. The request is evaluated against all matching policies in the specified policy store. The result of the decision is either Allow or Deny, along with a list of the policies that resulted in the decision. If you specify the identityToken parameter, then this operation derives the principal from that token. You must not also include that principal in the entities parameter or the operation fails and reports a conflict between the two entity sources. If you provide only an accessToken, then you can include the entity as part of the entities parameter to provide additional attributes. At this time, Verified Permissions accepts tokens from only Amazon Cognito. Verified Permissions validates each token that is specified in a request by checking its expiration date and its signature. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire.
|
128
128
|
*/
|
129
129
|
isAuthorizedWithToken(params: VerifiedPermissions.Types.IsAuthorizedWithTokenInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.IsAuthorizedWithTokenOutput) => void): Request<VerifiedPermissions.Types.IsAuthorizedWithTokenOutput, AWSError>;
|
130
130
|
/**
|
131
|
-
* Makes an authorization decision about a service request described in the parameters. The principal in this request comes from an external identity source. The information in the parameters can also define additional context that Verified Permissions can include in the evaluation. The request is evaluated against all matching policies in the specified policy store. The result of the decision is either Allow or Deny, along with a list of the policies that resulted in the decision. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire.
|
131
|
+
* Makes an authorization decision about a service request described in the parameters. The principal in this request comes from an external identity source in the form of an identity token formatted as a JSON web token (JWT). The information in the parameters can also define additional context that Verified Permissions can include in the evaluation. The request is evaluated against all matching policies in the specified policy store. The result of the decision is either Allow or Deny, along with a list of the policies that resulted in the decision. If you specify the identityToken parameter, then this operation derives the principal from that token. You must not also include that principal in the entities parameter or the operation fails and reports a conflict between the two entity sources. If you provide only an accessToken, then you can include the entity as part of the entities parameter to provide additional attributes. At this time, Verified Permissions accepts tokens from only Amazon Cognito. Verified Permissions validates each token that is specified in a request by checking its expiration date and its signature. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire.
|
132
132
|
*/
|
133
133
|
isAuthorizedWithToken(callback?: (err: AWSError, data: VerifiedPermissions.Types.IsAuthorizedWithTokenOutput) => void): Request<VerifiedPermissions.Types.IsAuthorizedWithTokenOutput, AWSError>;
|
134
134
|
/**
|
@@ -180,11 +180,11 @@ declare class VerifiedPermissions extends Service {
|
|
180
180
|
*/
|
181
181
|
updateIdentitySource(callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdateIdentitySourceOutput) => void): Request<VerifiedPermissions.Types.UpdateIdentitySourceOutput, AWSError>;
|
182
182
|
/**
|
183
|
-
* Modifies a Cedar static policy in the specified policy store. You can change only certain elements of the UpdatePolicyDefinition parameter. You can directly update only static policies. To change a template-linked policy, you must update the template instead, using UpdatePolicyTemplate.
|
183
|
+
* Modifies a Cedar static policy in the specified policy store. You can change only certain elements of the UpdatePolicyDefinition parameter. You can directly update only static policies. To change a template-linked policy, you must update the template instead, using UpdatePolicyTemplate. If policy validation is enabled in the policy store, then updating a static policy causes Verified Permissions to validate the policy against the schema in the policy store. If the updated static policy doesn't pass validation, the operation fails and the update isn't stored. When you edit a static policy, You can change only certain elements of a static policy: The action referenced by the policy. A condition clause, such as when and unless. You can't change these elements of a static policy: Changing a policy from a static policy to a template-linked policy. Changing the effect of a static policy from permit or forbid. The principal referenced by a static policy. The resource referenced by a static policy. To update a template-linked policy, you must update the template instead.
|
184
184
|
*/
|
185
185
|
updatePolicy(params: VerifiedPermissions.Types.UpdatePolicyInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdatePolicyOutput) => void): Request<VerifiedPermissions.Types.UpdatePolicyOutput, AWSError>;
|
186
186
|
/**
|
187
|
-
* Modifies a Cedar static policy in the specified policy store. You can change only certain elements of the UpdatePolicyDefinition parameter. You can directly update only static policies. To change a template-linked policy, you must update the template instead, using UpdatePolicyTemplate.
|
187
|
+
* Modifies a Cedar static policy in the specified policy store. You can change only certain elements of the UpdatePolicyDefinition parameter. You can directly update only static policies. To change a template-linked policy, you must update the template instead, using UpdatePolicyTemplate. If policy validation is enabled in the policy store, then updating a static policy causes Verified Permissions to validate the policy against the schema in the policy store. If the updated static policy doesn't pass validation, the operation fails and the update isn't stored. When you edit a static policy, You can change only certain elements of a static policy: The action referenced by the policy. A condition clause, such as when and unless. You can't change these elements of a static policy: Changing a policy from a static policy to a template-linked policy. Changing the effect of a static policy from permit or forbid. The principal referenced by a static policy. The resource referenced by a static policy. To update a template-linked policy, you must update the template instead.
|
188
188
|
*/
|
189
189
|
updatePolicy(callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdatePolicyOutput) => void): Request<VerifiedPermissions.Types.UpdatePolicyOutput, AWSError>;
|
190
190
|
/**
|
@@ -804,11 +804,11 @@ declare namespace VerifiedPermissions {
|
|
804
804
|
*/
|
805
805
|
policyStoreId: PolicyStoreId;
|
806
806
|
/**
|
807
|
-
* Specifies an identity token for the principal to be authorized. This token is provided to you by the identity provider (IdP) associated with the specified identity source. You must specify either an AccessToken or an IdentityToken,
|
807
|
+
* Specifies an identity token for the principal to be authorized. This token is provided to you by the identity provider (IdP) associated with the specified identity source. You must specify either an AccessToken or an IdentityToken, or both.
|
808
808
|
*/
|
809
809
|
identityToken?: Token;
|
810
810
|
/**
|
811
|
-
* Specifies an access token for the principal to be authorized. This token is provided to you by the identity provider (IdP) associated with the specified identity source. You must specify either an AccessToken or an IdentityToken,
|
811
|
+
* Specifies an access token for the principal to be authorized. This token is provided to you by the identity provider (IdP) associated with the specified identity source. You must specify either an AccessToken, or an IdentityToken, or both.
|
812
812
|
*/
|
813
813
|
accessToken?: Token;
|
814
814
|
/**
|
@@ -824,7 +824,7 @@ declare namespace VerifiedPermissions {
|
|
824
824
|
*/
|
825
825
|
context?: ContextDefinition;
|
826
826
|
/**
|
827
|
-
* Specifies the list of resources and
|
827
|
+
* Specifies the list of resources and their associated attributes that Verified Permissions can examine when evaluating the policies. You can include only resource and action entities in this parameter; you can't include principals. The IsAuthorizedWithToken operation takes principal attributes from only the identityToken or accessToken passed to the operation. For action entities, you can include only their Identifier and EntityType.
|
828
828
|
*/
|
829
829
|
entities?: EntitiesDefinition;
|
830
830
|
}
|
@@ -852,7 +852,7 @@ declare namespace VerifiedPermissions {
|
|
852
852
|
*/
|
853
853
|
nextToken?: NextToken;
|
854
854
|
/**
|
855
|
-
* Specifies the total number of results that you want included
|
855
|
+
* Specifies the total number of results that you want included in each response. If additional items exist beyond the number you specify, the NextToken response element is returned with a value (not null). Include the specified value as the NextToken request parameter in the next call to the operation to get the next set of results. Note that the service might return fewer results than the maximum even when there are more results available. You should check NextToken after every operation to ensure that you receive all of the results. If you do not specify this parameter, the operation defaults to 10 identity sources per response. You can specify a maximum of 200 identity sources per response.
|
856
856
|
*/
|
857
857
|
maxResults?: ListIdentitySourcesMaxResults;
|
858
858
|
/**
|
@@ -881,7 +881,7 @@ declare namespace VerifiedPermissions {
|
|
881
881
|
*/
|
882
882
|
nextToken?: NextToken;
|
883
883
|
/**
|
884
|
-
* Specifies the total number of results that you want included
|
884
|
+
* Specifies the total number of results that you want included in each response. If additional items exist beyond the number you specify, the NextToken response element is returned with a value (not null). Include the specified value as the NextToken request parameter in the next call to the operation to get the next set of results. Note that the service might return fewer results than the maximum even when there are more results available. You should check NextToken after every operation to ensure that you receive all of the results. If you do not specify this parameter, the operation defaults to 10 policies per response. You can specify a maximum of 50 policies per response.
|
885
885
|
*/
|
886
886
|
maxResults?: MaxResults;
|
887
887
|
/**
|
@@ -905,7 +905,7 @@ declare namespace VerifiedPermissions {
|
|
905
905
|
*/
|
906
906
|
nextToken?: NextToken;
|
907
907
|
/**
|
908
|
-
* Specifies the total number of results that you want included
|
908
|
+
* Specifies the total number of results that you want included in each response. If additional items exist beyond the number you specify, the NextToken response element is returned with a value (not null). Include the specified value as the NextToken request parameter in the next call to the operation to get the next set of results. Note that the service might return fewer results than the maximum even when there are more results available. You should check NextToken after every operation to ensure that you receive all of the results. If you do not specify this parameter, the operation defaults to 10 policy stores per response. You can specify a maximum of 50 policy stores per response.
|
909
909
|
*/
|
910
910
|
maxResults?: MaxResults;
|
911
911
|
}
|
@@ -929,7 +929,7 @@ declare namespace VerifiedPermissions {
|
|
929
929
|
*/
|
930
930
|
nextToken?: NextToken;
|
931
931
|
/**
|
932
|
-
* Specifies the total number of results that you want included
|
932
|
+
* Specifies the total number of results that you want included in each response. If additional items exist beyond the number you specify, the NextToken response element is returned with a value (not null). Include the specified value as the NextToken request parameter in the next call to the operation to get the next set of results. Note that the service might return fewer results than the maximum even when there are more results available. You should check NextToken after every operation to ensure that you receive all of the results. If you do not specify this parameter, the operation defaults to 10 policy templates per response. You can specify a maximum of 50 policy templates per response.
|
933
933
|
*/
|
934
934
|
maxResults?: MaxResults;
|
935
935
|
}
|