aws-sdk 2.1441.0 → 2.1443.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +11 -1
- package/README.md +1 -1
- package/apis/apigateway-2015-07-09.min.json +2 -1
- package/apis/ce-2017-10-25.min.json +3 -1
- package/apis/ec2-2016-11-15.min.json +1199 -1195
- package/apis/rds-2014-10-31.min.json +4 -0
- package/apis/verifiedpermissions-2021-12-01.min.json +127 -33
- package/clients/apigateway.d.ts +34 -30
- package/clients/costexplorer.d.ts +10 -2
- package/clients/ec2.d.ts +4 -2
- package/clients/globalaccelerator.d.ts +2 -2
- package/clients/polly.d.ts +1 -1
- package/clients/rds.d.ts +8 -0
- package/clients/verifiedpermissions.d.ts +11 -11
- package/dist/aws-sdk-core-react-native.js +1 -1
- package/dist/aws-sdk-react-native.js +6 -6
- package/dist/aws-sdk.js +1211 -1200
- package/dist/aws-sdk.min.js +62 -62
- package/lib/core.js +1 -1
- package/package.json +1 -1
package/clients/polly.d.ts
CHANGED
@@ -488,7 +488,7 @@ declare namespace Polly {
|
|
488
488
|
*/
|
489
489
|
SupportedEngines?: EngineList;
|
490
490
|
}
|
491
|
-
export type VoiceId = "Aditi"|"Amy"|"Astrid"|"Bianca"|"Brian"|"Camila"|"Carla"|"Carmen"|"Celine"|"Chantal"|"Conchita"|"Cristiano"|"Dora"|"Emma"|"Enrique"|"Ewa"|"Filiz"|"Gabrielle"|"Geraint"|"Giorgio"|"Gwyneth"|"Hans"|"Ines"|"Ivy"|"Jacek"|"Jan"|"Joanna"|"Joey"|"Justin"|"Karl"|"Kendra"|"Kevin"|"Kimberly"|"Lea"|"Liv"|"Lotte"|"Lucia"|"Lupe"|"Mads"|"Maja"|"Marlene"|"Mathieu"|"Matthew"|"Maxim"|"Mia"|"Miguel"|"Mizuki"|"Naja"|"Nicole"|"Olivia"|"Penelope"|"Raveena"|"Ricardo"|"Ruben"|"Russell"|"Salli"|"Seoyeon"|"Takumi"|"Tatyana"|"Vicki"|"Vitoria"|"Zeina"|"Zhiyu"|"Aria"|"Ayanda"|"Arlet"|"Hannah"|"Arthur"|"Daniel"|"Liam"|"Pedro"|"Kajal"|"Hiujin"|"Laura"|"Elin"|"Ida"|"Suvi"|"Ola"|"Hala"|"Andres"|"Sergio"|"Remi"|"Adriano"|"Thiago"|"Ruth"|"Stephen"|"Kazuha"|"Tomoko"|"Niamh"|"Sofie"|"Lisa"|"Isabelle"|string;
|
491
|
+
export type VoiceId = "Aditi"|"Amy"|"Astrid"|"Bianca"|"Brian"|"Camila"|"Carla"|"Carmen"|"Celine"|"Chantal"|"Conchita"|"Cristiano"|"Dora"|"Emma"|"Enrique"|"Ewa"|"Filiz"|"Gabrielle"|"Geraint"|"Giorgio"|"Gwyneth"|"Hans"|"Ines"|"Ivy"|"Jacek"|"Jan"|"Joanna"|"Joey"|"Justin"|"Karl"|"Kendra"|"Kevin"|"Kimberly"|"Lea"|"Liv"|"Lotte"|"Lucia"|"Lupe"|"Mads"|"Maja"|"Marlene"|"Mathieu"|"Matthew"|"Maxim"|"Mia"|"Miguel"|"Mizuki"|"Naja"|"Nicole"|"Olivia"|"Penelope"|"Raveena"|"Ricardo"|"Ruben"|"Russell"|"Salli"|"Seoyeon"|"Takumi"|"Tatyana"|"Vicki"|"Vitoria"|"Zeina"|"Zhiyu"|"Aria"|"Ayanda"|"Arlet"|"Hannah"|"Arthur"|"Daniel"|"Liam"|"Pedro"|"Kajal"|"Hiujin"|"Laura"|"Elin"|"Ida"|"Suvi"|"Ola"|"Hala"|"Andres"|"Sergio"|"Remi"|"Adriano"|"Thiago"|"Ruth"|"Stephen"|"Kazuha"|"Tomoko"|"Niamh"|"Sofie"|"Lisa"|"Isabelle"|"Zayd"|string;
|
492
492
|
export type VoiceList = Voice[];
|
493
493
|
export type VoiceName = string;
|
494
494
|
/**
|
package/clients/rds.d.ts
CHANGED
@@ -1814,6 +1814,14 @@ declare namespace RDS {
|
|
1814
1814
|
*/
|
1815
1815
|
Manifest?: CustomDBEngineVersionManifest;
|
1816
1816
|
Tags?: TagList;
|
1817
|
+
/**
|
1818
|
+
* Reserved for future use.
|
1819
|
+
*/
|
1820
|
+
SourceCustomDbEngineVersionIdentifier?: String255;
|
1821
|
+
/**
|
1822
|
+
* Reserved for future use.
|
1823
|
+
*/
|
1824
|
+
UseAwsProvidedLatestImage?: BooleanOptional;
|
1817
1825
|
}
|
1818
1826
|
export interface CreateDBClusterEndpointMessage {
|
1819
1827
|
/**
|
@@ -124,11 +124,11 @@ declare class VerifiedPermissions extends Service {
|
|
124
124
|
*/
|
125
125
|
isAuthorized(callback?: (err: AWSError, data: VerifiedPermissions.Types.IsAuthorizedOutput) => void): Request<VerifiedPermissions.Types.IsAuthorizedOutput, AWSError>;
|
126
126
|
/**
|
127
|
-
* Makes an authorization decision about a service request described in the parameters. The principal in this request comes from an external identity source. The information in the parameters can also define additional context that Verified Permissions can include in the evaluation. The request is evaluated against all matching policies in the specified policy store. The result of the decision is either Allow or Deny, along with a list of the policies that resulted in the decision. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire.
|
127
|
+
* Makes an authorization decision about a service request described in the parameters. The principal in this request comes from an external identity source in the form of an identity token formatted as a JSON web token (JWT). The information in the parameters can also define additional context that Verified Permissions can include in the evaluation. The request is evaluated against all matching policies in the specified policy store. The result of the decision is either Allow or Deny, along with a list of the policies that resulted in the decision. If you specify the identityToken parameter, then this operation derives the principal from that token. You must not also include that principal in the entities parameter or the operation fails and reports a conflict between the two entity sources. If you provide only an accessToken, then you can include the entity as part of the entities parameter to provide additional attributes. At this time, Verified Permissions accepts tokens from only Amazon Cognito. Verified Permissions validates each token that is specified in a request by checking its expiration date and its signature. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire.
|
128
128
|
*/
|
129
129
|
isAuthorizedWithToken(params: VerifiedPermissions.Types.IsAuthorizedWithTokenInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.IsAuthorizedWithTokenOutput) => void): Request<VerifiedPermissions.Types.IsAuthorizedWithTokenOutput, AWSError>;
|
130
130
|
/**
|
131
|
-
* Makes an authorization decision about a service request described in the parameters. The principal in this request comes from an external identity source. The information in the parameters can also define additional context that Verified Permissions can include in the evaluation. The request is evaluated against all matching policies in the specified policy store. The result of the decision is either Allow or Deny, along with a list of the policies that resulted in the decision. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire.
|
131
|
+
* Makes an authorization decision about a service request described in the parameters. The principal in this request comes from an external identity source in the form of an identity token formatted as a JSON web token (JWT). The information in the parameters can also define additional context that Verified Permissions can include in the evaluation. The request is evaluated against all matching policies in the specified policy store. The result of the decision is either Allow or Deny, along with a list of the policies that resulted in the decision. If you specify the identityToken parameter, then this operation derives the principal from that token. You must not also include that principal in the entities parameter or the operation fails and reports a conflict between the two entity sources. If you provide only an accessToken, then you can include the entity as part of the entities parameter to provide additional attributes. At this time, Verified Permissions accepts tokens from only Amazon Cognito. Verified Permissions validates each token that is specified in a request by checking its expiration date and its signature. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire.
|
132
132
|
*/
|
133
133
|
isAuthorizedWithToken(callback?: (err: AWSError, data: VerifiedPermissions.Types.IsAuthorizedWithTokenOutput) => void): Request<VerifiedPermissions.Types.IsAuthorizedWithTokenOutput, AWSError>;
|
134
134
|
/**
|
@@ -180,11 +180,11 @@ declare class VerifiedPermissions extends Service {
|
|
180
180
|
*/
|
181
181
|
updateIdentitySource(callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdateIdentitySourceOutput) => void): Request<VerifiedPermissions.Types.UpdateIdentitySourceOutput, AWSError>;
|
182
182
|
/**
|
183
|
-
* Modifies a Cedar static policy in the specified policy store. You can change only certain elements of the UpdatePolicyDefinition parameter. You can directly update only static policies. To change a template-linked policy, you must update the template instead, using UpdatePolicyTemplate.
|
183
|
+
* Modifies a Cedar static policy in the specified policy store. You can change only certain elements of the UpdatePolicyDefinition parameter. You can directly update only static policies. To change a template-linked policy, you must update the template instead, using UpdatePolicyTemplate. If policy validation is enabled in the policy store, then updating a static policy causes Verified Permissions to validate the policy against the schema in the policy store. If the updated static policy doesn't pass validation, the operation fails and the update isn't stored. When you edit a static policy, You can change only certain elements of a static policy: The action referenced by the policy. A condition clause, such as when and unless. You can't change these elements of a static policy: Changing a policy from a static policy to a template-linked policy. Changing the effect of a static policy from permit or forbid. The principal referenced by a static policy. The resource referenced by a static policy. To update a template-linked policy, you must update the template instead.
|
184
184
|
*/
|
185
185
|
updatePolicy(params: VerifiedPermissions.Types.UpdatePolicyInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdatePolicyOutput) => void): Request<VerifiedPermissions.Types.UpdatePolicyOutput, AWSError>;
|
186
186
|
/**
|
187
|
-
* Modifies a Cedar static policy in the specified policy store. You can change only certain elements of the UpdatePolicyDefinition parameter. You can directly update only static policies. To change a template-linked policy, you must update the template instead, using UpdatePolicyTemplate.
|
187
|
+
* Modifies a Cedar static policy in the specified policy store. You can change only certain elements of the UpdatePolicyDefinition parameter. You can directly update only static policies. To change a template-linked policy, you must update the template instead, using UpdatePolicyTemplate. If policy validation is enabled in the policy store, then updating a static policy causes Verified Permissions to validate the policy against the schema in the policy store. If the updated static policy doesn't pass validation, the operation fails and the update isn't stored. When you edit a static policy, You can change only certain elements of a static policy: The action referenced by the policy. A condition clause, such as when and unless. You can't change these elements of a static policy: Changing a policy from a static policy to a template-linked policy. Changing the effect of a static policy from permit or forbid. The principal referenced by a static policy. The resource referenced by a static policy. To update a template-linked policy, you must update the template instead.
|
188
188
|
*/
|
189
189
|
updatePolicy(callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdatePolicyOutput) => void): Request<VerifiedPermissions.Types.UpdatePolicyOutput, AWSError>;
|
190
190
|
/**
|
@@ -804,11 +804,11 @@ declare namespace VerifiedPermissions {
|
|
804
804
|
*/
|
805
805
|
policyStoreId: PolicyStoreId;
|
806
806
|
/**
|
807
|
-
* Specifies an identity token for the principal to be authorized. This token is provided to you by the identity provider (IdP) associated with the specified identity source. You must specify either an AccessToken or an IdentityToken,
|
807
|
+
* Specifies an identity token for the principal to be authorized. This token is provided to you by the identity provider (IdP) associated with the specified identity source. You must specify either an AccessToken or an IdentityToken, or both.
|
808
808
|
*/
|
809
809
|
identityToken?: Token;
|
810
810
|
/**
|
811
|
-
* Specifies an access token for the principal to be authorized. This token is provided to you by the identity provider (IdP) associated with the specified identity source. You must specify either an AccessToken or an IdentityToken,
|
811
|
+
* Specifies an access token for the principal to be authorized. This token is provided to you by the identity provider (IdP) associated with the specified identity source. You must specify either an AccessToken, or an IdentityToken, or both.
|
812
812
|
*/
|
813
813
|
accessToken?: Token;
|
814
814
|
/**
|
@@ -824,7 +824,7 @@ declare namespace VerifiedPermissions {
|
|
824
824
|
*/
|
825
825
|
context?: ContextDefinition;
|
826
826
|
/**
|
827
|
-
* Specifies the list of resources and
|
827
|
+
* Specifies the list of resources and their associated attributes that Verified Permissions can examine when evaluating the policies. You can include only resource and action entities in this parameter; you can't include principals. The IsAuthorizedWithToken operation takes principal attributes from only the identityToken or accessToken passed to the operation. For action entities, you can include only their Identifier and EntityType.
|
828
828
|
*/
|
829
829
|
entities?: EntitiesDefinition;
|
830
830
|
}
|
@@ -852,7 +852,7 @@ declare namespace VerifiedPermissions {
|
|
852
852
|
*/
|
853
853
|
nextToken?: NextToken;
|
854
854
|
/**
|
855
|
-
* Specifies the total number of results that you want included
|
855
|
+
* Specifies the total number of results that you want included in each response. If additional items exist beyond the number you specify, the NextToken response element is returned with a value (not null). Include the specified value as the NextToken request parameter in the next call to the operation to get the next set of results. Note that the service might return fewer results than the maximum even when there are more results available. You should check NextToken after every operation to ensure that you receive all of the results. If you do not specify this parameter, the operation defaults to 10 identity sources per response. You can specify a maximum of 200 identity sources per response.
|
856
856
|
*/
|
857
857
|
maxResults?: ListIdentitySourcesMaxResults;
|
858
858
|
/**
|
@@ -881,7 +881,7 @@ declare namespace VerifiedPermissions {
|
|
881
881
|
*/
|
882
882
|
nextToken?: NextToken;
|
883
883
|
/**
|
884
|
-
* Specifies the total number of results that you want included
|
884
|
+
* Specifies the total number of results that you want included in each response. If additional items exist beyond the number you specify, the NextToken response element is returned with a value (not null). Include the specified value as the NextToken request parameter in the next call to the operation to get the next set of results. Note that the service might return fewer results than the maximum even when there are more results available. You should check NextToken after every operation to ensure that you receive all of the results. If you do not specify this parameter, the operation defaults to 10 policies per response. You can specify a maximum of 50 policies per response.
|
885
885
|
*/
|
886
886
|
maxResults?: MaxResults;
|
887
887
|
/**
|
@@ -905,7 +905,7 @@ declare namespace VerifiedPermissions {
|
|
905
905
|
*/
|
906
906
|
nextToken?: NextToken;
|
907
907
|
/**
|
908
|
-
* Specifies the total number of results that you want included
|
908
|
+
* Specifies the total number of results that you want included in each response. If additional items exist beyond the number you specify, the NextToken response element is returned with a value (not null). Include the specified value as the NextToken request parameter in the next call to the operation to get the next set of results. Note that the service might return fewer results than the maximum even when there are more results available. You should check NextToken after every operation to ensure that you receive all of the results. If you do not specify this parameter, the operation defaults to 10 policy stores per response. You can specify a maximum of 50 policy stores per response.
|
909
909
|
*/
|
910
910
|
maxResults?: MaxResults;
|
911
911
|
}
|
@@ -929,7 +929,7 @@ declare namespace VerifiedPermissions {
|
|
929
929
|
*/
|
930
930
|
nextToken?: NextToken;
|
931
931
|
/**
|
932
|
-
* Specifies the total number of results that you want included
|
932
|
+
* Specifies the total number of results that you want included in each response. If additional items exist beyond the number you specify, the NextToken response element is returned with a value (not null). Include the specified value as the NextToken request parameter in the next call to the operation to get the next set of results. Note that the service might return fewer results than the maximum even when there are more results available. You should check NextToken after every operation to ensure that you receive all of the results. If you do not specify this parameter, the operation defaults to 10 policy templates per response. You can specify a maximum of 50 policy templates per response.
|
933
933
|
*/
|
934
934
|
maxResults?: MaxResults;
|
935
935
|
}
|