aws-sdk 2.1543.0 → 2.1544.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -1
- package/apis/acm-pca-2017-08-22.min.json +26 -15
- package/apis/acm-pca-2017-08-22.waiters2.json +1 -1
- package/apis/lightsail-2016-11-28.min.json +11 -2
- package/clients/acmpca.d.ts +13 -3
- package/clients/lightsail.d.ts +8 -0
- package/dist/aws-sdk-core-react-native.js +1 -1
- package/dist/aws-sdk-react-native.js +4 -4
- package/dist/aws-sdk.js +3 -3
- package/dist/aws-sdk.min.js +2 -2
- package/lib/core.js +1 -1
- package/package.json +1 -1
package/README.md
CHANGED
@@ -69,7 +69,7 @@ require('aws-sdk/lib/maintenance_mode_message').suppress = true;
|
|
69
69
|
To use the SDK in the browser, simply add the following script tag to your
|
70
70
|
HTML pages:
|
71
71
|
|
72
|
-
<script src="https://sdk.amazonaws.com/js/aws-sdk-2.
|
72
|
+
<script src="https://sdk.amazonaws.com/js/aws-sdk-2.1544.0.min.js"></script>
|
73
73
|
|
74
74
|
You can also build a custom browser SDK with your specified set of AWS services.
|
75
75
|
This can allow you to reduce the SDK's size, specify different API versions of
|
@@ -31,7 +31,7 @@
|
|
31
31
|
"IdempotencyToken": {},
|
32
32
|
"KeyStorageSecurityStandard": {},
|
33
33
|
"Tags": {
|
34
|
-
"shape": "
|
34
|
+
"shape": "S16"
|
35
35
|
},
|
36
36
|
"UsageMode": {}
|
37
37
|
}
|
@@ -80,7 +80,7 @@
|
|
80
80
|
"Principal": {},
|
81
81
|
"SourceAccount": {},
|
82
82
|
"Actions": {
|
83
|
-
"shape": "
|
83
|
+
"shape": "S1m"
|
84
84
|
}
|
85
85
|
}
|
86
86
|
}
|
@@ -138,7 +138,7 @@
|
|
138
138
|
"type": "structure",
|
139
139
|
"members": {
|
140
140
|
"CertificateAuthority": {
|
141
|
-
"shape": "
|
141
|
+
"shape": "S1u"
|
142
142
|
}
|
143
143
|
}
|
144
144
|
}
|
@@ -357,10 +357,10 @@
|
|
357
357
|
"SigningAlgorithm": {},
|
358
358
|
"TemplateArn": {},
|
359
359
|
"Validity": {
|
360
|
-
"shape": "
|
360
|
+
"shape": "S2y"
|
361
361
|
},
|
362
362
|
"ValidityNotBefore": {
|
363
|
-
"shape": "
|
363
|
+
"shape": "S2y"
|
364
364
|
},
|
365
365
|
"IdempotencyToken": {}
|
366
366
|
}
|
@@ -390,7 +390,7 @@
|
|
390
390
|
"CertificateAuthorities": {
|
391
391
|
"type": "list",
|
392
392
|
"member": {
|
393
|
-
"shape": "
|
393
|
+
"shape": "S1u"
|
394
394
|
}
|
395
395
|
},
|
396
396
|
"NextToken": {}
|
@@ -426,7 +426,7 @@
|
|
426
426
|
"Principal": {},
|
427
427
|
"SourceAccount": {},
|
428
428
|
"Actions": {
|
429
|
-
"shape": "
|
429
|
+
"shape": "S1m"
|
430
430
|
},
|
431
431
|
"Policy": {}
|
432
432
|
}
|
@@ -454,7 +454,7 @@
|
|
454
454
|
"type": "structure",
|
455
455
|
"members": {
|
456
456
|
"Tags": {
|
457
|
-
"shape": "
|
457
|
+
"shape": "S16"
|
458
458
|
},
|
459
459
|
"NextToken": {}
|
460
460
|
}
|
@@ -509,7 +509,7 @@
|
|
509
509
|
"members": {
|
510
510
|
"CertificateAuthorityArn": {},
|
511
511
|
"Tags": {
|
512
|
-
"shape": "
|
512
|
+
"shape": "S16"
|
513
513
|
}
|
514
514
|
}
|
515
515
|
}
|
@@ -524,7 +524,7 @@
|
|
524
524
|
"members": {
|
525
525
|
"CertificateAuthorityArn": {},
|
526
526
|
"Tags": {
|
527
|
-
"shape": "
|
527
|
+
"shape": "S16"
|
528
528
|
}
|
529
529
|
}
|
530
530
|
}
|
@@ -707,7 +707,18 @@
|
|
707
707
|
},
|
708
708
|
"CustomCname": {},
|
709
709
|
"S3BucketName": {},
|
710
|
-
"S3ObjectAcl": {}
|
710
|
+
"S3ObjectAcl": {},
|
711
|
+
"CrlDistributionPointExtensionConfiguration": {
|
712
|
+
"type": "structure",
|
713
|
+
"required": [
|
714
|
+
"OmitExtension"
|
715
|
+
],
|
716
|
+
"members": {
|
717
|
+
"OmitExtension": {
|
718
|
+
"type": "boolean"
|
719
|
+
}
|
720
|
+
}
|
721
|
+
}
|
711
722
|
}
|
712
723
|
},
|
713
724
|
"OcspConfiguration": {
|
@@ -724,7 +735,7 @@
|
|
724
735
|
}
|
725
736
|
}
|
726
737
|
},
|
727
|
-
"
|
738
|
+
"S16": {
|
728
739
|
"type": "list",
|
729
740
|
"member": {
|
730
741
|
"type": "structure",
|
@@ -737,11 +748,11 @@
|
|
737
748
|
}
|
738
749
|
}
|
739
750
|
},
|
740
|
-
"
|
751
|
+
"S1m": {
|
741
752
|
"type": "list",
|
742
753
|
"member": {}
|
743
754
|
},
|
744
|
-
"
|
755
|
+
"S1u": {
|
745
756
|
"type": "structure",
|
746
757
|
"members": {
|
747
758
|
"Arn": {},
|
@@ -775,7 +786,7 @@
|
|
775
786
|
"UsageMode": {}
|
776
787
|
}
|
777
788
|
},
|
778
|
-
"
|
789
|
+
"S2y": {
|
779
790
|
"type": "structure",
|
780
791
|
"required": [
|
781
792
|
"Value",
|
@@ -1881,6 +1881,9 @@
|
|
1881
1881
|
"supportedAppCategories": {
|
1882
1882
|
"type": "list",
|
1883
1883
|
"member": {}
|
1884
|
+
},
|
1885
|
+
"publicIpv4AddressCount": {
|
1886
|
+
"type": "integer"
|
1884
1887
|
}
|
1885
1888
|
}
|
1886
1889
|
}
|
@@ -2609,6 +2612,9 @@
|
|
2609
2612
|
"type": "timestamp"
|
2610
2613
|
},
|
2611
2614
|
"ipAddress": {},
|
2615
|
+
"ipv6Addresses": {
|
2616
|
+
"shape": "Sbo"
|
2617
|
+
},
|
2612
2618
|
"password": {},
|
2613
2619
|
"passwordData": {
|
2614
2620
|
"type": "structure",
|
@@ -5269,8 +5275,7 @@
|
|
5269
5275
|
"privateIpAddress": {},
|
5270
5276
|
"publicIpAddress": {},
|
5271
5277
|
"ipv6Addresses": {
|
5272
|
-
"
|
5273
|
-
"member": {}
|
5278
|
+
"shape": "Sbo"
|
5274
5279
|
},
|
5275
5280
|
"ipAddressType": {},
|
5276
5281
|
"hardware": {
|
@@ -5347,6 +5352,10 @@
|
|
5347
5352
|
}
|
5348
5353
|
}
|
5349
5354
|
},
|
5355
|
+
"Sbo": {
|
5356
|
+
"type": "list",
|
5357
|
+
"member": {}
|
5358
|
+
},
|
5350
5359
|
"Sbx": {
|
5351
5360
|
"type": "structure",
|
5352
5361
|
"members": {
|
package/clients/acmpca.d.ts
CHANGED
@@ -205,11 +205,11 @@ declare class ACMPCA extends Service {
|
|
205
205
|
*/
|
206
206
|
waitFor(state: "certificateAuthorityCSRCreated", callback?: (err: AWSError, data: ACMPCA.Types.GetCertificateAuthorityCsrResponse) => void): Request<ACMPCA.Types.GetCertificateAuthorityCsrResponse, AWSError>;
|
207
207
|
/**
|
208
|
-
* Waits for the certificateIssued state by periodically calling the underlying ACMPCA.getCertificateoperation every
|
208
|
+
* Waits for the certificateIssued state by periodically calling the underlying ACMPCA.getCertificateoperation every 1 seconds (at most 60 times). Wait until a certificate is issued
|
209
209
|
*/
|
210
210
|
waitFor(state: "certificateIssued", params: ACMPCA.Types.GetCertificateRequest & {$waiter?: WaiterConfiguration}, callback?: (err: AWSError, data: ACMPCA.Types.GetCertificateResponse) => void): Request<ACMPCA.Types.GetCertificateResponse, AWSError>;
|
211
211
|
/**
|
212
|
-
* Waits for the certificateIssued state by periodically calling the underlying ACMPCA.getCertificateoperation every
|
212
|
+
* Waits for the certificateIssued state by periodically calling the underlying ACMPCA.getCertificateoperation every 1 seconds (at most 60 times). Wait until a certificate is issued
|
213
213
|
*/
|
214
214
|
waitFor(state: "certificateIssued", callback?: (err: AWSError, data: ACMPCA.Types.GetCertificateResponse) => void): Request<ACMPCA.Types.GetCertificateResponse, AWSError>;
|
215
215
|
/**
|
@@ -514,6 +514,16 @@ declare namespace ACMPCA {
|
|
514
514
|
* Determines whether the CRL will be publicly readable or privately held in the CRL Amazon S3 bucket. If you choose PUBLIC_READ, the CRL will be accessible over the public internet. If you choose BUCKET_OWNER_FULL_CONTROL, only the owner of the CRL S3 bucket can access the CRL, and your PKI clients may need an alternative method of access. If no value is specified, the default is PUBLIC_READ. Note: This default can cause CA creation to fail in some circumstances. If you have have enabled the Block Public Access (BPA) feature in your S3 account, then you must specify the value of this parameter as BUCKET_OWNER_FULL_CONTROL, and not doing so results in an error. If you have disabled BPA in S3, then you can specify either BUCKET_OWNER_FULL_CONTROL or PUBLIC_READ as the value. For more information, see Blocking public access to the S3 bucket.
|
515
515
|
*/
|
516
516
|
S3ObjectAcl?: S3ObjectAcl;
|
517
|
+
/**
|
518
|
+
* Configures the behavior of the CRL Distribution Point extension for certificates issued by your certificate authority. If this field is not provided, then the CRl Distribution Point Extension will be present and contain the default CRL URL.
|
519
|
+
*/
|
520
|
+
CrlDistributionPointExtensionConfiguration?: CrlDistributionPointExtensionConfiguration;
|
521
|
+
}
|
522
|
+
export interface CrlDistributionPointExtensionConfiguration {
|
523
|
+
/**
|
524
|
+
* Configures whether the CRL Distribution Point extension should be populated with the default URL to the CRL. If set to true, then the CDP extension will not be present in any certificates issued by that CA unless otherwise specified through CSR or API passthrough. Only set this if you have another way to distribute the CRL Distribution Points ffor certificates issued by your CA, such as the Matter Distributed Compliance Ledger This configuration cannot be enabled with a custom CNAME set.
|
525
|
+
*/
|
526
|
+
OmitExtension: Boolean;
|
517
527
|
}
|
518
528
|
export type CsrBlob = Buffer|Uint8Array|Blob|string;
|
519
529
|
export type CsrBody = string;
|
@@ -860,7 +870,7 @@ declare namespace ACMPCA {
|
|
860
870
|
*/
|
861
871
|
NextToken?: NextToken;
|
862
872
|
/**
|
863
|
-
* Use this parameter when paginating results to specify the maximum number of items to return in the response on each page. If additional items exist beyond the number you specify, the NextToken element is sent in the response. Use this NextToken value in a subsequent request to retrieve additional items.
|
873
|
+
* Use this parameter when paginating results to specify the maximum number of items to return in the response on each page. If additional items exist beyond the number you specify, the NextToken element is sent in the response. Use this NextToken value in a subsequent request to retrieve additional items. Although the maximum value is 1000, the action only returns a maximum of 100 items.
|
864
874
|
*/
|
865
875
|
MaxResults?: MaxResults;
|
866
876
|
/**
|
package/clients/lightsail.d.ts
CHANGED
@@ -1879,6 +1879,10 @@ declare namespace Lightsail {
|
|
1879
1879
|
* Virtual computer blueprints that are supported by a Lightsail for Research bundle. This parameter only applies to Lightsail for Research resources.
|
1880
1880
|
*/
|
1881
1881
|
supportedAppCategories?: AppCategoryList;
|
1882
|
+
/**
|
1883
|
+
* An integer that indicates the public ipv4 address count included in the bundle, the value is either 0 or 1.
|
1884
|
+
*/
|
1885
|
+
publicIpv4AddressCount?: integer;
|
1882
1886
|
}
|
1883
1887
|
export type BundleList = Bundle[];
|
1884
1888
|
export interface CacheBehavior {
|
@@ -5422,6 +5426,10 @@ declare namespace Lightsail {
|
|
5422
5426
|
* The public IP address of the Amazon Lightsail instance.
|
5423
5427
|
*/
|
5424
5428
|
ipAddress?: IpAddress;
|
5429
|
+
/**
|
5430
|
+
* The IPv6 address of the Amazon Lightsail instance.
|
5431
|
+
*/
|
5432
|
+
ipv6Addresses?: Ipv6AddressList;
|
5425
5433
|
/**
|
5426
5434
|
* For RDP access, the password for your Amazon Lightsail instance. Password will be an empty string if the password for your new instance is not ready yet. When you create an instance, it can take up to 15 minutes for the instance to be ready. If you create an instance using any key pair other than the default (LightsailDefaultKeyPair), password will always be an empty string. If you change the Administrator password on the instance, Lightsail will continue to return the original password value. When accessing the instance using RDP, you need to manually enter the Administrator password after changing it from the default.
|
5427
5435
|
*/
|