aws-sdk 2.1598.0 → 2.1600.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (44) hide show
  1. package/README.md +1 -1
  2. package/apis/bedrock-agent-2023-06-05.min.json +1 -2
  3. package/apis/cloudformation-2010-05-15.min.json +54 -45
  4. package/apis/emr-serverless-2021-07-13.min.json +56 -55
  5. package/apis/entityresolution-2018-05-10.min.json +602 -82
  6. package/apis/entityresolution-2018-05-10.paginators.json +6 -0
  7. package/apis/glue-2017-03-31.min.json +2 -0
  8. package/apis/healthlake-2017-07-01.min.json +21 -14
  9. package/apis/iotwireless-2020-11-22.min.json +23 -3
  10. package/apis/kms-2014-11-01.examples.json +73 -8
  11. package/apis/kms-2014-11-01.min.json +71 -4
  12. package/apis/kms-2014-11-01.paginators.json +14 -0
  13. package/apis/lakeformation-2017-03-31.min.json +35 -25
  14. package/apis/m2-2021-04-28.min.json +83 -6
  15. package/apis/mediapackagev2-2022-12-25.min.json +131 -8
  16. package/apis/mediatailor-2018-04-23.min.json +21 -17
  17. package/apis/outposts-2019-12-03.min.json +299 -43
  18. package/apis/outposts-2019-12-03.paginators.json +12 -0
  19. package/apis/redshift-2012-12-01.min.json +2 -1
  20. package/apis/wellarchitected-2020-03-31.min.json +203 -82
  21. package/clients/bedrockagent.d.ts +35 -35
  22. package/clients/cloudformation.d.ts +36 -1
  23. package/clients/configservice.d.ts +4 -4
  24. package/clients/emrserverless.d.ts +5 -0
  25. package/clients/entityresolution.d.ts +604 -19
  26. package/clients/glue.d.ts +13 -5
  27. package/clients/healthlake.d.ts +17 -1
  28. package/clients/iotfleethub.d.ts +19 -19
  29. package/clients/iotwireless.d.ts +71 -40
  30. package/clients/kms.d.ts +105 -12
  31. package/clients/lakeformation.d.ts +18 -2
  32. package/clients/m2.d.ts +88 -1
  33. package/clients/mediapackagev2.d.ts +154 -0
  34. package/clients/mediatailor.d.ts +17 -0
  35. package/clients/outposts.d.ts +264 -5
  36. package/clients/redshift.d.ts +4 -0
  37. package/clients/transfer.d.ts +4 -4
  38. package/clients/wellarchitected.d.ts +182 -4
  39. package/dist/aws-sdk-core-react-native.js +1 -1
  40. package/dist/aws-sdk-react-native.js +19 -19
  41. package/dist/aws-sdk.js +144 -53
  42. package/dist/aws-sdk.min.js +65 -65
  43. package/lib/core.js +1 -1
  44. package/package.json +1 -1
package/clients/kms.d.ts CHANGED
@@ -116,11 +116,11 @@ declare class KMS extends Service {
116
116
  */
117
117
  disableKey(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
118
118
  /**
119
- * Disables automatic rotation of the key material of the specified symmetric encryption KMS key. Automatic key rotation is supported only on symmetric encryption KMS keys. You cannot enable automatic rotation of asymmetric KMS keys, HMAC KMS keys, KMS keys with imported key material, or KMS keys in a custom key store. To enable or disable automatic rotation of a set of related multi-Region keys, set the property on the primary key. You can enable (EnableKeyRotation) and disable automatic rotation of the key material in customer managed KMS keys. Key material rotation of Amazon Web Services managed KMS keys is not configurable. KMS always rotates the key material for every year. Rotation of Amazon Web Services owned KMS keys varies. In May 2022, KMS changed the rotation schedule for Amazon Web Services managed keys from every three years to every year. For details, see EnableKeyRotation. The KMS key that you use for this operation must be in a compatible key state. For details, see Key states of KMS keys in the Key Management Service Developer Guide. Cross-account use: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account. Required permissions: kms:DisableKeyRotation (key policy) Related operations: EnableKeyRotation GetKeyRotationStatus Eventual consistency: The KMS API follows an eventual consistency model. For more information, see KMS eventual consistency.
119
+ * Disables automatic rotation of the key material of the specified symmetric encryption KMS key. Automatic key rotation is supported only on symmetric encryption KMS keys. You cannot enable automatic rotation of asymmetric KMS keys, HMAC KMS keys, KMS keys with imported key material, or KMS keys in a custom key store. To enable or disable automatic rotation of a set of related multi-Region keys, set the property on the primary key. You can enable (EnableKeyRotation) and disable automatic rotation of the key material in customer managed KMS keys. Key material rotation of Amazon Web Services managed KMS keys is not configurable. KMS always rotates the key material for every year. Rotation of Amazon Web Services owned KMS keys varies. In May 2022, KMS changed the rotation schedule for Amazon Web Services managed keys from every three years to every year. For details, see EnableKeyRotation. The KMS key that you use for this operation must be in a compatible key state. For details, see Key states of KMS keys in the Key Management Service Developer Guide. Cross-account use: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account. Required permissions: kms:DisableKeyRotation (key policy) Related operations: EnableKeyRotation GetKeyRotationStatus ListKeyRotations RotateKeyOnDemand Eventual consistency: The KMS API follows an eventual consistency model. For more information, see KMS eventual consistency.
120
120
  */
121
121
  disableKeyRotation(params: KMS.Types.DisableKeyRotationRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
122
122
  /**
123
- * Disables automatic rotation of the key material of the specified symmetric encryption KMS key. Automatic key rotation is supported only on symmetric encryption KMS keys. You cannot enable automatic rotation of asymmetric KMS keys, HMAC KMS keys, KMS keys with imported key material, or KMS keys in a custom key store. To enable or disable automatic rotation of a set of related multi-Region keys, set the property on the primary key. You can enable (EnableKeyRotation) and disable automatic rotation of the key material in customer managed KMS keys. Key material rotation of Amazon Web Services managed KMS keys is not configurable. KMS always rotates the key material for every year. Rotation of Amazon Web Services owned KMS keys varies. In May 2022, KMS changed the rotation schedule for Amazon Web Services managed keys from every three years to every year. For details, see EnableKeyRotation. The KMS key that you use for this operation must be in a compatible key state. For details, see Key states of KMS keys in the Key Management Service Developer Guide. Cross-account use: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account. Required permissions: kms:DisableKeyRotation (key policy) Related operations: EnableKeyRotation GetKeyRotationStatus Eventual consistency: The KMS API follows an eventual consistency model. For more information, see KMS eventual consistency.
123
+ * Disables automatic rotation of the key material of the specified symmetric encryption KMS key. Automatic key rotation is supported only on symmetric encryption KMS keys. You cannot enable automatic rotation of asymmetric KMS keys, HMAC KMS keys, KMS keys with imported key material, or KMS keys in a custom key store. To enable or disable automatic rotation of a set of related multi-Region keys, set the property on the primary key. You can enable (EnableKeyRotation) and disable automatic rotation of the key material in customer managed KMS keys. Key material rotation of Amazon Web Services managed KMS keys is not configurable. KMS always rotates the key material for every year. Rotation of Amazon Web Services owned KMS keys varies. In May 2022, KMS changed the rotation schedule for Amazon Web Services managed keys from every three years to every year. For details, see EnableKeyRotation. The KMS key that you use for this operation must be in a compatible key state. For details, see Key states of KMS keys in the Key Management Service Developer Guide. Cross-account use: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account. Required permissions: kms:DisableKeyRotation (key policy) Related operations: EnableKeyRotation GetKeyRotationStatus ListKeyRotations RotateKeyOnDemand Eventual consistency: The KMS API follows an eventual consistency model. For more information, see KMS eventual consistency.
124
124
  */
125
125
  disableKeyRotation(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
126
126
  /**
@@ -140,11 +140,11 @@ declare class KMS extends Service {
140
140
  */
141
141
  enableKey(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
142
142
  /**
143
- * Enables automatic rotation of the key material of the specified symmetric encryption KMS key. When you enable automatic rotation of a customer managed KMS key, KMS rotates the key material of the KMS key one year (approximately 365 days) from the enable date and every year thereafter. You can monitor rotation of the key material for your KMS keys in CloudTrail and Amazon CloudWatch. To disable rotation of the key material in a customer managed KMS key, use the DisableKeyRotation operation. Automatic key rotation is supported only on symmetric encryption KMS keys. You cannot enable automatic rotation of asymmetric KMS keys, HMAC KMS keys, KMS keys with imported key material, or KMS keys in a custom key store. To enable or disable automatic rotation of a set of related multi-Region keys, set the property on the primary key. You cannot enable or disable automatic rotation Amazon Web Services managed KMS keys. KMS always rotates the key material of Amazon Web Services managed keys every year. Rotation of Amazon Web Services owned KMS keys varies. In May 2022, KMS changed the rotation schedule for Amazon Web Services managed keys from every three years (approximately 1,095 days) to every year (approximately 365 days). New Amazon Web Services managed keys are automatically rotated one year after they are created, and approximately every year thereafter. Existing Amazon Web Services managed keys are automatically rotated one year after their most recent rotation, and every year thereafter. The KMS key that you use for this operation must be in a compatible key state. For details, see Key states of KMS keys in the Key Management Service Developer Guide. Cross-account use: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account. Required permissions: kms:EnableKeyRotation (key policy) Related operations: DisableKeyRotation GetKeyRotationStatus Eventual consistency: The KMS API follows an eventual consistency model. For more information, see KMS eventual consistency.
143
+ * Enables automatic rotation of the key material of the specified symmetric encryption KMS key. By default, when you enable automatic rotation of a customer managed KMS key, KMS rotates the key material of the KMS key one year (approximately 365 days) from the enable date and every year thereafter. You can use the optional RotationPeriodInDays parameter to specify a custom rotation period when you enable key rotation, or you can use RotationPeriodInDays to modify the rotation period of a key that you previously enabled automatic key rotation on. You can monitor rotation of the key material for your KMS keys in CloudTrail and Amazon CloudWatch. To disable rotation of the key material in a customer managed KMS key, use the DisableKeyRotation operation. You can use the GetKeyRotationStatus operation to identify any in progress rotations. You can use the ListKeyRotations operation to view the details of completed rotations. Automatic key rotation is supported only on symmetric encryption KMS keys. You cannot enable automatic rotation of asymmetric KMS keys, HMAC KMS keys, KMS keys with imported key material, or KMS keys in a custom key store. To enable or disable automatic rotation of a set of related multi-Region keys, set the property on the primary key. You cannot enable or disable automatic rotation of Amazon Web Services managed KMS keys. KMS always rotates the key material of Amazon Web Services managed keys every year. Rotation of Amazon Web Services owned KMS keys is managed by the Amazon Web Services service that owns the key. In May 2022, KMS changed the rotation schedule for Amazon Web Services managed keys from every three years (approximately 1,095 days) to every year (approximately 365 days). New Amazon Web Services managed keys are automatically rotated one year after they are created, and approximately every year thereafter. Existing Amazon Web Services managed keys are automatically rotated one year after their most recent rotation, and every year thereafter. The KMS key that you use for this operation must be in a compatible key state. For details, see Key states of KMS keys in the Key Management Service Developer Guide. Cross-account use: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account. Required permissions: kms:EnableKeyRotation (key policy) Related operations: DisableKeyRotation GetKeyRotationStatus ListKeyRotations RotateKeyOnDemand You can perform on-demand (RotateKeyOnDemand) rotation of the key material in customer managed KMS keys, regardless of whether or not automatic key rotation is enabled. Eventual consistency: The KMS API follows an eventual consistency model. For more information, see KMS eventual consistency.
144
144
  */
145
145
  enableKeyRotation(params: KMS.Types.EnableKeyRotationRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
146
146
  /**
147
- * Enables automatic rotation of the key material of the specified symmetric encryption KMS key. When you enable automatic rotation of a customer managed KMS key, KMS rotates the key material of the KMS key one year (approximately 365 days) from the enable date and every year thereafter. You can monitor rotation of the key material for your KMS keys in CloudTrail and Amazon CloudWatch. To disable rotation of the key material in a customer managed KMS key, use the DisableKeyRotation operation. Automatic key rotation is supported only on symmetric encryption KMS keys. You cannot enable automatic rotation of asymmetric KMS keys, HMAC KMS keys, KMS keys with imported key material, or KMS keys in a custom key store. To enable or disable automatic rotation of a set of related multi-Region keys, set the property on the primary key. You cannot enable or disable automatic rotation Amazon Web Services managed KMS keys. KMS always rotates the key material of Amazon Web Services managed keys every year. Rotation of Amazon Web Services owned KMS keys varies. In May 2022, KMS changed the rotation schedule for Amazon Web Services managed keys from every three years (approximately 1,095 days) to every year (approximately 365 days). New Amazon Web Services managed keys are automatically rotated one year after they are created, and approximately every year thereafter. Existing Amazon Web Services managed keys are automatically rotated one year after their most recent rotation, and every year thereafter. The KMS key that you use for this operation must be in a compatible key state. For details, see Key states of KMS keys in the Key Management Service Developer Guide. Cross-account use: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account. Required permissions: kms:EnableKeyRotation (key policy) Related operations: DisableKeyRotation GetKeyRotationStatus Eventual consistency: The KMS API follows an eventual consistency model. For more information, see KMS eventual consistency.
147
+ * Enables automatic rotation of the key material of the specified symmetric encryption KMS key. By default, when you enable automatic rotation of a customer managed KMS key, KMS rotates the key material of the KMS key one year (approximately 365 days) from the enable date and every year thereafter. You can use the optional RotationPeriodInDays parameter to specify a custom rotation period when you enable key rotation, or you can use RotationPeriodInDays to modify the rotation period of a key that you previously enabled automatic key rotation on. You can monitor rotation of the key material for your KMS keys in CloudTrail and Amazon CloudWatch. To disable rotation of the key material in a customer managed KMS key, use the DisableKeyRotation operation. You can use the GetKeyRotationStatus operation to identify any in progress rotations. You can use the ListKeyRotations operation to view the details of completed rotations. Automatic key rotation is supported only on symmetric encryption KMS keys. You cannot enable automatic rotation of asymmetric KMS keys, HMAC KMS keys, KMS keys with imported key material, or KMS keys in a custom key store. To enable or disable automatic rotation of a set of related multi-Region keys, set the property on the primary key. You cannot enable or disable automatic rotation of Amazon Web Services managed KMS keys. KMS always rotates the key material of Amazon Web Services managed keys every year. Rotation of Amazon Web Services owned KMS keys is managed by the Amazon Web Services service that owns the key. In May 2022, KMS changed the rotation schedule for Amazon Web Services managed keys from every three years (approximately 1,095 days) to every year (approximately 365 days). New Amazon Web Services managed keys are automatically rotated one year after they are created, and approximately every year thereafter. Existing Amazon Web Services managed keys are automatically rotated one year after their most recent rotation, and every year thereafter. The KMS key that you use for this operation must be in a compatible key state. For details, see Key states of KMS keys in the Key Management Service Developer Guide. Cross-account use: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account. Required permissions: kms:EnableKeyRotation (key policy) Related operations: DisableKeyRotation GetKeyRotationStatus ListKeyRotations RotateKeyOnDemand You can perform on-demand (RotateKeyOnDemand) rotation of the key material in customer managed KMS keys, regardless of whether or not automatic key rotation is enabled. Eventual consistency: The KMS API follows an eventual consistency model. For more information, see KMS eventual consistency.
148
148
  */
149
149
  enableKeyRotation(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
150
150
  /**
@@ -212,11 +212,11 @@ declare class KMS extends Service {
212
212
  */
213
213
  getKeyPolicy(callback?: (err: AWSError, data: KMS.Types.GetKeyPolicyResponse) => void): Request<KMS.Types.GetKeyPolicyResponse, AWSError>;
214
214
  /**
215
- * Gets a Boolean value that indicates whether automatic rotation of the key material is enabled for the specified KMS key. When you enable automatic rotation for customer managed KMS keys, KMS rotates the key material of the KMS key one year (approximately 365 days) from the enable date and every year thereafter. You can monitor rotation of the key material for your KMS keys in CloudTrail and Amazon CloudWatch. Automatic key rotation is supported only on symmetric encryption KMS keys. You cannot enable automatic rotation of asymmetric KMS keys, HMAC KMS keys, KMS keys with imported key material, or KMS keys in a custom key store. To enable or disable automatic rotation of a set of related multi-Region keys, set the property on the primary key.. You can enable (EnableKeyRotation) and disable automatic rotation (DisableKeyRotation) of the key material in customer managed KMS keys. Key material rotation of Amazon Web Services managed KMS keys is not configurable. KMS always rotates the key material in Amazon Web Services managed KMS keys every year. The key rotation status for Amazon Web Services managed KMS keys is always true. In May 2022, KMS changed the rotation schedule for Amazon Web Services managed keys from every three years to every year. For details, see EnableKeyRotation. The KMS key that you use for this operation must be in a compatible key state. For details, see Key states of KMS keys in the Key Management Service Developer Guide. Disabled: The key rotation status does not change when you disable a KMS key. However, while the KMS key is disabled, KMS does not rotate the key material. When you re-enable the KMS key, rotation resumes. If the key material in the re-enabled KMS key hasn't been rotated in one year, KMS rotates it immediately, and every year thereafter. If it's been less than a year since the key material in the re-enabled KMS key was rotated, the KMS key resumes its prior rotation schedule. Pending deletion: While a KMS key is pending deletion, its key rotation status is false and KMS does not rotate the key material. If you cancel the deletion, the original key rotation status returns to true. Cross-account use: Yes. To perform this operation on a KMS key in a different Amazon Web Services account, specify the key ARN in the value of the KeyId parameter. Required permissions: kms:GetKeyRotationStatus (key policy) Related operations: DisableKeyRotation EnableKeyRotation Eventual consistency: The KMS API follows an eventual consistency model. For more information, see KMS eventual consistency.
215
+ * Provides detailed information about the rotation status for a KMS key, including whether automatic rotation of the key material is enabled for the specified KMS key, the rotation period, and the next scheduled rotation date. Automatic key rotation is supported only on symmetric encryption KMS keys. You cannot enable automatic rotation of asymmetric KMS keys, HMAC KMS keys, KMS keys with imported key material, or KMS keys in a custom key store. To enable or disable automatic rotation of a set of related multi-Region keys, set the property on the primary key.. You can enable (EnableKeyRotation) and disable automatic rotation (DisableKeyRotation) of the key material in customer managed KMS keys. Key material rotation of Amazon Web Services managed KMS keys is not configurable. KMS always rotates the key material in Amazon Web Services managed KMS keys every year. The key rotation status for Amazon Web Services managed KMS keys is always true. You can perform on-demand (RotateKeyOnDemand) rotation of the key material in customer managed KMS keys, regardless of whether or not automatic key rotation is enabled. You can use GetKeyRotationStatus to identify the date and time that an in progress on-demand rotation was initiated. You can use ListKeyRotations to view the details of completed rotations. In May 2022, KMS changed the rotation schedule for Amazon Web Services managed keys from every three years to every year. For details, see EnableKeyRotation. The KMS key that you use for this operation must be in a compatible key state. For details, see Key states of KMS keys in the Key Management Service Developer Guide. Disabled: The key rotation status does not change when you disable a KMS key. However, while the KMS key is disabled, KMS does not rotate the key material. When you re-enable the KMS key, rotation resumes. If the key material in the re-enabled KMS key hasn't been rotated in one year, KMS rotates it immediately, and every year thereafter. If it's been less than a year since the key material in the re-enabled KMS key was rotated, the KMS key resumes its prior rotation schedule. Pending deletion: While a KMS key is pending deletion, its key rotation status is false and KMS does not rotate the key material. If you cancel the deletion, the original key rotation status returns to true. Cross-account use: Yes. To perform this operation on a KMS key in a different Amazon Web Services account, specify the key ARN in the value of the KeyId parameter. Required permissions: kms:GetKeyRotationStatus (key policy) Related operations: DisableKeyRotation EnableKeyRotation ListKeyRotations RotateKeyOnDemand Eventual consistency: The KMS API follows an eventual consistency model. For more information, see KMS eventual consistency.
216
216
  */
217
217
  getKeyRotationStatus(params: KMS.Types.GetKeyRotationStatusRequest, callback?: (err: AWSError, data: KMS.Types.GetKeyRotationStatusResponse) => void): Request<KMS.Types.GetKeyRotationStatusResponse, AWSError>;
218
218
  /**
219
- * Gets a Boolean value that indicates whether automatic rotation of the key material is enabled for the specified KMS key. When you enable automatic rotation for customer managed KMS keys, KMS rotates the key material of the KMS key one year (approximately 365 days) from the enable date and every year thereafter. You can monitor rotation of the key material for your KMS keys in CloudTrail and Amazon CloudWatch. Automatic key rotation is supported only on symmetric encryption KMS keys. You cannot enable automatic rotation of asymmetric KMS keys, HMAC KMS keys, KMS keys with imported key material, or KMS keys in a custom key store. To enable or disable automatic rotation of a set of related multi-Region keys, set the property on the primary key.. You can enable (EnableKeyRotation) and disable automatic rotation (DisableKeyRotation) of the key material in customer managed KMS keys. Key material rotation of Amazon Web Services managed KMS keys is not configurable. KMS always rotates the key material in Amazon Web Services managed KMS keys every year. The key rotation status for Amazon Web Services managed KMS keys is always true. In May 2022, KMS changed the rotation schedule for Amazon Web Services managed keys from every three years to every year. For details, see EnableKeyRotation. The KMS key that you use for this operation must be in a compatible key state. For details, see Key states of KMS keys in the Key Management Service Developer Guide. Disabled: The key rotation status does not change when you disable a KMS key. However, while the KMS key is disabled, KMS does not rotate the key material. When you re-enable the KMS key, rotation resumes. If the key material in the re-enabled KMS key hasn't been rotated in one year, KMS rotates it immediately, and every year thereafter. If it's been less than a year since the key material in the re-enabled KMS key was rotated, the KMS key resumes its prior rotation schedule. Pending deletion: While a KMS key is pending deletion, its key rotation status is false and KMS does not rotate the key material. If you cancel the deletion, the original key rotation status returns to true. Cross-account use: Yes. To perform this operation on a KMS key in a different Amazon Web Services account, specify the key ARN in the value of the KeyId parameter. Required permissions: kms:GetKeyRotationStatus (key policy) Related operations: DisableKeyRotation EnableKeyRotation Eventual consistency: The KMS API follows an eventual consistency model. For more information, see KMS eventual consistency.
219
+ * Provides detailed information about the rotation status for a KMS key, including whether automatic rotation of the key material is enabled for the specified KMS key, the rotation period, and the next scheduled rotation date. Automatic key rotation is supported only on symmetric encryption KMS keys. You cannot enable automatic rotation of asymmetric KMS keys, HMAC KMS keys, KMS keys with imported key material, or KMS keys in a custom key store. To enable or disable automatic rotation of a set of related multi-Region keys, set the property on the primary key.. You can enable (EnableKeyRotation) and disable automatic rotation (DisableKeyRotation) of the key material in customer managed KMS keys. Key material rotation of Amazon Web Services managed KMS keys is not configurable. KMS always rotates the key material in Amazon Web Services managed KMS keys every year. The key rotation status for Amazon Web Services managed KMS keys is always true. You can perform on-demand (RotateKeyOnDemand) rotation of the key material in customer managed KMS keys, regardless of whether or not automatic key rotation is enabled. You can use GetKeyRotationStatus to identify the date and time that an in progress on-demand rotation was initiated. You can use ListKeyRotations to view the details of completed rotations. In May 2022, KMS changed the rotation schedule for Amazon Web Services managed keys from every three years to every year. For details, see EnableKeyRotation. The KMS key that you use for this operation must be in a compatible key state. For details, see Key states of KMS keys in the Key Management Service Developer Guide. Disabled: The key rotation status does not change when you disable a KMS key. However, while the KMS key is disabled, KMS does not rotate the key material. When you re-enable the KMS key, rotation resumes. If the key material in the re-enabled KMS key hasn't been rotated in one year, KMS rotates it immediately, and every year thereafter. If it's been less than a year since the key material in the re-enabled KMS key was rotated, the KMS key resumes its prior rotation schedule. Pending deletion: While a KMS key is pending deletion, its key rotation status is false and KMS does not rotate the key material. If you cancel the deletion, the original key rotation status returns to true. Cross-account use: Yes. To perform this operation on a KMS key in a different Amazon Web Services account, specify the key ARN in the value of the KeyId parameter. Required permissions: kms:GetKeyRotationStatus (key policy) Related operations: DisableKeyRotation EnableKeyRotation ListKeyRotations RotateKeyOnDemand Eventual consistency: The KMS API follows an eventual consistency model. For more information, see KMS eventual consistency.
220
220
  */
221
221
  getKeyRotationStatus(callback?: (err: AWSError, data: KMS.Types.GetKeyRotationStatusResponse) => void): Request<KMS.Types.GetKeyRotationStatusResponse, AWSError>;
222
222
  /**
@@ -267,6 +267,14 @@ declare class KMS extends Service {
267
267
  * Gets the names of the key policies that are attached to a KMS key. This operation is designed to get policy names that you can use in a GetKeyPolicy operation. However, the only valid policy name is default. Cross-account use: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account. Required permissions: kms:ListKeyPolicies (key policy) Related operations: GetKeyPolicy PutKeyPolicy Eventual consistency: The KMS API follows an eventual consistency model. For more information, see KMS eventual consistency.
268
268
  */
269
269
  listKeyPolicies(callback?: (err: AWSError, data: KMS.Types.ListKeyPoliciesResponse) => void): Request<KMS.Types.ListKeyPoliciesResponse, AWSError>;
270
+ /**
271
+ * Returns information about all completed key material rotations for the specified KMS key. You must specify the KMS key in all requests. You can refine the key rotations list by limiting the number of rotations returned. For detailed information about automatic and on-demand key rotations, see Rotating KMS keys in the Key Management Service Developer Guide. Cross-account use: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account. Required permissions: kms:ListKeyRotations (key policy) Related operations: EnableKeyRotation DisableKeyRotation GetKeyRotationStatus RotateKeyOnDemand Eventual consistency: The KMS API follows an eventual consistency model. For more information, see KMS eventual consistency.
272
+ */
273
+ listKeyRotations(params: KMS.Types.ListKeyRotationsRequest, callback?: (err: AWSError, data: KMS.Types.ListKeyRotationsResponse) => void): Request<KMS.Types.ListKeyRotationsResponse, AWSError>;
274
+ /**
275
+ * Returns information about all completed key material rotations for the specified KMS key. You must specify the KMS key in all requests. You can refine the key rotations list by limiting the number of rotations returned. For detailed information about automatic and on-demand key rotations, see Rotating KMS keys in the Key Management Service Developer Guide. Cross-account use: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account. Required permissions: kms:ListKeyRotations (key policy) Related operations: EnableKeyRotation DisableKeyRotation GetKeyRotationStatus RotateKeyOnDemand Eventual consistency: The KMS API follows an eventual consistency model. For more information, see KMS eventual consistency.
276
+ */
277
+ listKeyRotations(callback?: (err: AWSError, data: KMS.Types.ListKeyRotationsResponse) => void): Request<KMS.Types.ListKeyRotationsResponse, AWSError>;
270
278
  /**
271
279
  * Gets a list of all KMS keys in the caller's Amazon Web Services account and Region. Cross-account use: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account. Required permissions: kms:ListKeys (IAM policy) Related operations: CreateKey DescribeKey ListAliases ListResourceTags Eventual consistency: The KMS API follows an eventual consistency model. For more information, see KMS eventual consistency.
272
280
  */
@@ -331,6 +339,14 @@ declare class KMS extends Service {
331
339
  * Deletes the specified grant. You revoke a grant to terminate the permissions that the grant allows. For more information, see Retiring and revoking grants in the Key Management Service Developer Guide . When you create, retire, or revoke a grant, there might be a brief delay, usually less than five minutes, until the grant is available throughout KMS. This state is known as eventual consistency. For details, see Eventual consistency in the Key Management Service Developer Guide . For detailed information about grants, including grant terminology, see Grants in KMS in the Key Management Service Developer Guide . For examples of working with grants in several programming languages, see Programming grants. Cross-account use: Yes. To perform this operation on a KMS key in a different Amazon Web Services account, specify the key ARN in the value of the KeyId parameter. Required permissions: kms:RevokeGrant (key policy). Related operations: CreateGrant ListGrants ListRetirableGrants RetireGrant Eventual consistency: The KMS API follows an eventual consistency model. For more information, see KMS eventual consistency.
332
340
  */
333
341
  revokeGrant(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
342
+ /**
343
+ * Immediately initiates rotation of the key material of the specified symmetric encryption KMS key. You can perform on-demand rotation of the key material in customer managed KMS keys, regardless of whether or not automatic key rotation is enabled. On-demand rotations do not change existing automatic rotation schedules. For example, consider a KMS key that has automatic key rotation enabled with a rotation period of 730 days. If the key is scheduled to automatically rotate on April 14, 2024, and you perform an on-demand rotation on April 10, 2024, the key will automatically rotate, as scheduled, on April 14, 2024 and every 730 days thereafter. You can perform on-demand key rotation a maximum of 10 times per KMS key. You can use the KMS console to view the number of remaining on-demand rotations available for a KMS key. You can use GetKeyRotationStatus to identify any in progress on-demand rotations. You can use ListKeyRotations to identify the date that completed on-demand rotations were performed. You can monitor rotation of the key material for your KMS keys in CloudTrail and Amazon CloudWatch. On-demand key rotation is supported only on symmetric encryption KMS keys. You cannot perform on-demand rotation of asymmetric KMS keys, HMAC KMS keys, KMS keys with imported key material, or KMS keys in a custom key store. To perform on-demand rotation of a set of related multi-Region keys, invoke the on-demand rotation on the primary key. You cannot initiate on-demand rotation of Amazon Web Services managed KMS keys. KMS always rotates the key material of Amazon Web Services managed keys every year. Rotation of Amazon Web Services owned KMS keys is managed by the Amazon Web Services service that owns the key. The KMS key that you use for this operation must be in a compatible key state. For details, see Key states of KMS keys in the Key Management Service Developer Guide. Cross-account use: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account. Required permissions: kms:RotateKeyOnDemand (key policy) Related operations: EnableKeyRotation DisableKeyRotation GetKeyRotationStatus ListKeyRotations Eventual consistency: The KMS API follows an eventual consistency model. For more information, see KMS eventual consistency.
344
+ */
345
+ rotateKeyOnDemand(params: KMS.Types.RotateKeyOnDemandRequest, callback?: (err: AWSError, data: KMS.Types.RotateKeyOnDemandResponse) => void): Request<KMS.Types.RotateKeyOnDemandResponse, AWSError>;
346
+ /**
347
+ * Immediately initiates rotation of the key material of the specified symmetric encryption KMS key. You can perform on-demand rotation of the key material in customer managed KMS keys, regardless of whether or not automatic key rotation is enabled. On-demand rotations do not change existing automatic rotation schedules. For example, consider a KMS key that has automatic key rotation enabled with a rotation period of 730 days. If the key is scheduled to automatically rotate on April 14, 2024, and you perform an on-demand rotation on April 10, 2024, the key will automatically rotate, as scheduled, on April 14, 2024 and every 730 days thereafter. You can perform on-demand key rotation a maximum of 10 times per KMS key. You can use the KMS console to view the number of remaining on-demand rotations available for a KMS key. You can use GetKeyRotationStatus to identify any in progress on-demand rotations. You can use ListKeyRotations to identify the date that completed on-demand rotations were performed. You can monitor rotation of the key material for your KMS keys in CloudTrail and Amazon CloudWatch. On-demand key rotation is supported only on symmetric encryption KMS keys. You cannot perform on-demand rotation of asymmetric KMS keys, HMAC KMS keys, KMS keys with imported key material, or KMS keys in a custom key store. To perform on-demand rotation of a set of related multi-Region keys, invoke the on-demand rotation on the primary key. You cannot initiate on-demand rotation of Amazon Web Services managed KMS keys. KMS always rotates the key material of Amazon Web Services managed keys every year. Rotation of Amazon Web Services owned KMS keys is managed by the Amazon Web Services service that owns the key. The KMS key that you use for this operation must be in a compatible key state. For details, see Key states of KMS keys in the Key Management Service Developer Guide. Cross-account use: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account. Required permissions: kms:RotateKeyOnDemand (key policy) Related operations: EnableKeyRotation DisableKeyRotation GetKeyRotationStatus ListKeyRotations Eventual consistency: The KMS API follows an eventual consistency model. For more information, see KMS eventual consistency.
348
+ */
349
+ rotateKeyOnDemand(callback?: (err: AWSError, data: KMS.Types.RotateKeyOnDemandResponse) => void): Request<KMS.Types.RotateKeyOnDemandResponse, AWSError>;
334
350
  /**
335
351
  * Schedules the deletion of a KMS key. By default, KMS applies a waiting period of 30 days, but you can specify a waiting period of 7-30 days. When this operation is successful, the key state of the KMS key changes to PendingDeletion and the key can't be used in any cryptographic operations. It remains in this state for the duration of the waiting period. Before the waiting period ends, you can use CancelKeyDeletion to cancel the deletion of the KMS key. After the waiting period ends, KMS deletes the KMS key, its key material, and all KMS data associated with it, including all aliases that refer to it. Deleting a KMS key is a destructive and potentially dangerous operation. When a KMS key is deleted, all data that was encrypted under the KMS key is unrecoverable. (The only exception is a multi-Region replica key, or an asymmetric or HMAC KMS key with imported key material.) To prevent the use of a KMS key without deleting it, use DisableKey. You can schedule the deletion of a multi-Region primary key and its replica keys at any time. However, KMS will not delete a multi-Region primary key with existing replica keys. If you schedule the deletion of a primary key with replicas, its key state changes to PendingReplicaDeletion and it cannot be replicated or used in cryptographic operations. This status can continue indefinitely. When the last of its replicas keys is deleted (not just scheduled), the key state of the primary key changes to PendingDeletion and its waiting period (PendingWindowInDays) begins. For details, see Deleting multi-Region keys in the Key Management Service Developer Guide. When KMS deletes a KMS key from an CloudHSM key store, it makes a best effort to delete the associated key material from the associated CloudHSM cluster. However, you might need to manually delete the orphaned key material from the cluster and its backups. Deleting a KMS key from an external key store has no effect on the associated external key. However, for both types of custom key stores, deleting a KMS key is destructive and irreversible. You cannot decrypt ciphertext encrypted under the KMS key by using only its associated external key or CloudHSM key. Also, you cannot recreate a KMS key in an external key store by creating a new KMS key with the same key material. For more information about scheduling a KMS key for deletion, see Deleting KMS keys in the Key Management Service Developer Guide. The KMS key that you use for this operation must be in a compatible key state. For details, see Key states of KMS keys in the Key Management Service Developer Guide. Cross-account use: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account. Required permissions: kms:ScheduleKeyDeletion (key policy) Related operations CancelKeyDeletion DisableKey Eventual consistency: The KMS API follows an eventual consistency model. For more information, see KMS eventual consistency.
336
352
  */
@@ -762,7 +778,7 @@ declare namespace KMS {
762
778
  */
763
779
  NextMarker?: MarkerType;
764
780
  /**
765
- * A flag that indicates whether there are more items in the list. When this value is true, the list in this response is truncated. To get more items, pass the value of the NextMarker element in thisresponse to the Marker parameter in a subsequent request.
781
+ * A flag that indicates whether there are more items in the list. When this value is true, the list in this response is truncated. To get more items, pass the value of the NextMarker element in this response to the Marker parameter in a subsequent request.
766
782
  */
767
783
  Truncated?: BooleanType;
768
784
  }
@@ -814,6 +830,10 @@ declare namespace KMS {
814
830
  * Identifies a symmetric encryption KMS key. You cannot enable automatic rotation of asymmetric KMS keys, HMAC KMS keys, KMS keys with imported key material, or KMS keys in a custom key store. To enable or disable automatic rotation of a set of related multi-Region keys, set the property on the primary key. Specify the key ID or key ARN of the KMS key. For example: Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab Key ARN: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey.
815
831
  */
816
832
  KeyId: KeyIdType;
833
+ /**
834
+ * Use this parameter to specify a custom period of time between each rotation date. If no value is specified, the default value is 365 days. The rotation period defines the number of days after you enable automatic key rotation that KMS will rotate your key material, and the number of days between each automatic rotation thereafter. You can use the kms:RotationPeriodInDays condition key to further constrain the values that principals can specify in the RotationPeriodInDays parameter.
835
+ */
836
+ RotationPeriodInDays?: RotationPeriodInDaysType;
817
837
  }
818
838
  export interface EncryptRequest {
819
839
  /**
@@ -1128,6 +1148,22 @@ declare namespace KMS {
1128
1148
  * A Boolean value that specifies whether key rotation is enabled.
1129
1149
  */
1130
1150
  KeyRotationEnabled?: BooleanType;
1151
+ /**
1152
+ * Identifies the specified symmetric encryption KMS key.
1153
+ */
1154
+ KeyId?: KeyIdType;
1155
+ /**
1156
+ * The number of days between each automatic rotation. The default value is 365 days.
1157
+ */
1158
+ RotationPeriodInDays?: RotationPeriodInDaysType;
1159
+ /**
1160
+ * The next date that KMS will automatically rotate the key material.
1161
+ */
1162
+ NextRotationDate?: DateType;
1163
+ /**
1164
+ * Identifies the date and time that an in progress on-demand rotation was initiated. The KMS API follows an eventual consistency model due to the distributed nature of the system. As a result, there might be a slight delay between initiating on-demand key rotation and the rotation's completion. Once the on-demand rotation is complete, use ListKeyRotations to view the details of the on-demand rotation.
1165
+ */
1166
+ OnDemandRotationStartDate?: DateType;
1131
1167
  }
1132
1168
  export interface GetParametersForImportRequest {
1133
1169
  /**
@@ -1421,7 +1457,7 @@ declare namespace KMS {
1421
1457
  */
1422
1458
  NextMarker?: MarkerType;
1423
1459
  /**
1424
- * A flag that indicates whether there are more items in the list. When this value is true, the list in this response is truncated. To get more items, pass the value of the NextMarker element in thisresponse to the Marker parameter in a subsequent request.
1460
+ * A flag that indicates whether there are more items in the list. When this value is true, the list in this response is truncated. To get more items, pass the value of the NextMarker element in this response to the Marker parameter in a subsequent request.
1425
1461
  */
1426
1462
  Truncated?: BooleanType;
1427
1463
  }
@@ -1457,7 +1493,7 @@ declare namespace KMS {
1457
1493
  */
1458
1494
  NextMarker?: MarkerType;
1459
1495
  /**
1460
- * A flag that indicates whether there are more items in the list. When this value is true, the list in this response is truncated. To get more items, pass the value of the NextMarker element in thisresponse to the Marker parameter in a subsequent request.
1496
+ * A flag that indicates whether there are more items in the list. When this value is true, the list in this response is truncated. To get more items, pass the value of the NextMarker element in this response to the Marker parameter in a subsequent request.
1461
1497
  */
1462
1498
  Truncated?: BooleanType;
1463
1499
  }
@@ -1485,7 +1521,35 @@ declare namespace KMS {
1485
1521
  */
1486
1522
  NextMarker?: MarkerType;
1487
1523
  /**
1488
- * A flag that indicates whether there are more items in the list. When this value is true, the list in this response is truncated. To get more items, pass the value of the NextMarker element in thisresponse to the Marker parameter in a subsequent request.
1524
+ * A flag that indicates whether there are more items in the list. When this value is true, the list in this response is truncated. To get more items, pass the value of the NextMarker element in this response to the Marker parameter in a subsequent request.
1525
+ */
1526
+ Truncated?: BooleanType;
1527
+ }
1528
+ export interface ListKeyRotationsRequest {
1529
+ /**
1530
+ * Gets the key rotations for the specified KMS key. Specify the key ID or key ARN of the KMS key. For example: Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab Key ARN: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey.
1531
+ */
1532
+ KeyId: KeyIdType;
1533
+ /**
1534
+ * Use this parameter to specify the maximum number of items to return. When this value is present, KMS does not return more than the specified number of items, but it might return fewer. This value is optional. If you include a value, it must be between 1 and 1000, inclusive. If you do not include a value, it defaults to 100.
1535
+ */
1536
+ Limit?: LimitType;
1537
+ /**
1538
+ * Use this parameter in a subsequent request after you receive a response with truncated results. Set it to the value of NextMarker from the truncated response you just received.
1539
+ */
1540
+ Marker?: MarkerType;
1541
+ }
1542
+ export interface ListKeyRotationsResponse {
1543
+ /**
1544
+ * A list of completed key material rotations.
1545
+ */
1546
+ Rotations?: RotationsList;
1547
+ /**
1548
+ * When Truncated is true, this element is present and contains the value to use for the Marker parameter in a subsequent request.
1549
+ */
1550
+ NextMarker?: MarkerType;
1551
+ /**
1552
+ * A flag that indicates whether there are more items in the list. When this value is true, the list in this response is truncated. To get more items, pass the value of the NextMarker element in this response to the Marker parameter in a subsequent request.
1489
1553
  */
1490
1554
  Truncated?: BooleanType;
1491
1555
  }
@@ -1509,7 +1573,7 @@ declare namespace KMS {
1509
1573
  */
1510
1574
  NextMarker?: MarkerType;
1511
1575
  /**
1512
- * A flag that indicates whether there are more items in the list. When this value is true, the list in this response is truncated. To get more items, pass the value of the NextMarker element in thisresponse to the Marker parameter in a subsequent request.
1576
+ * A flag that indicates whether there are more items in the list. When this value is true, the list in this response is truncated. To get more items, pass the value of the NextMarker element in this response to the Marker parameter in a subsequent request.
1513
1577
  */
1514
1578
  Truncated?: BooleanType;
1515
1579
  }
@@ -1537,7 +1601,7 @@ declare namespace KMS {
1537
1601
  */
1538
1602
  NextMarker?: MarkerType;
1539
1603
  /**
1540
- * A flag that indicates whether there are more items in the list. When this value is true, the list in this response is truncated. To get more items, pass the value of the NextMarker element in thisresponse to the Marker parameter in a subsequent request.
1604
+ * A flag that indicates whether there are more items in the list. When this value is true, the list in this response is truncated. To get more items, pass the value of the NextMarker element in this response to the Marker parameter in a subsequent request.
1541
1605
  */
1542
1606
  Truncated?: BooleanType;
1543
1607
  }
@@ -1756,6 +1820,35 @@ declare namespace KMS {
1756
1820
  */
1757
1821
  DryRun?: NullableBooleanType;
1758
1822
  }
1823
+ export interface RotateKeyOnDemandRequest {
1824
+ /**
1825
+ * Identifies a symmetric encryption KMS key. You cannot perform on-demand rotation of asymmetric KMS keys, HMAC KMS keys, KMS keys with imported key material, or KMS keys in a custom key store. To perform on-demand rotation of a set of related multi-Region keys, invoke the on-demand rotation on the primary key. Specify the key ID or key ARN of the KMS key. For example: Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab Key ARN: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey.
1826
+ */
1827
+ KeyId: KeyIdType;
1828
+ }
1829
+ export interface RotateKeyOnDemandResponse {
1830
+ /**
1831
+ * Identifies the symmetric encryption KMS key that you initiated on-demand rotation on.
1832
+ */
1833
+ KeyId?: KeyIdType;
1834
+ }
1835
+ export type RotationPeriodInDaysType = number;
1836
+ export type RotationType = "AUTOMATIC"|"ON_DEMAND"|string;
1837
+ export type RotationsList = RotationsListEntry[];
1838
+ export interface RotationsListEntry {
1839
+ /**
1840
+ * Unique identifier of the key.
1841
+ */
1842
+ KeyId?: KeyIdType;
1843
+ /**
1844
+ * Date and time that the key material rotation completed. Formatted as Unix time.
1845
+ */
1846
+ RotationDate?: DateType;
1847
+ /**
1848
+ * Identifies whether the key material rotation was a scheduled automatic rotation or an on-demand rotation.
1849
+ */
1850
+ RotationType?: RotationType;
1851
+ }
1759
1852
  export interface ScheduleKeyDeletionRequest {
1760
1853
  /**
1761
1854
  * The unique identifier of the KMS key to delete. Specify the key ID or key ARN of the KMS key. For example: Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab Key ARN: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey.
@@ -682,10 +682,14 @@ declare namespace LakeFormation {
682
682
  * A list of the account IDs of Amazon Web Services accounts of third-party applications that are allowed to access data managed by Lake Formation.
683
683
  */
684
684
  ExternalFiltering?: ExternalFilteringConfiguration;
685
+ /**
686
+ * A list of Amazon Web Services account IDs and/or Amazon Web Services organization/organizational unit ARNs that are allowed to access data managed by Lake Formation. If the ShareRecipients list includes valid values, a resource share is created with the principals you want to have access to the resources. If the ShareRecipients value is null or the list is empty, no resource share is created.
687
+ */
688
+ ShareRecipients?: DataLakePrincipalList;
685
689
  }
686
690
  export interface CreateLakeFormationIdentityCenterConfigurationResponse {
687
691
  /**
688
- * The Amazon Resource Name (ARN) of the integrated application.
692
+ * The Amazon Resource Name (ARN) of the Lake Formation application integrated with IAM Identity Center.
689
693
  */
690
694
  ApplicationArn?: ApplicationArn;
691
695
  }
@@ -930,13 +934,21 @@ declare namespace LakeFormation {
930
934
  */
931
935
  InstanceArn?: IdentityCenterInstanceArn;
932
936
  /**
933
- * The Amazon Resource Name (ARN) of the integrated application.
937
+ * The Amazon Resource Name (ARN) of the Lake Formation application integrated with IAM Identity Center.
934
938
  */
935
939
  ApplicationArn?: ApplicationArn;
936
940
  /**
937
941
  * Indicates if external filtering is enabled.
938
942
  */
939
943
  ExternalFiltering?: ExternalFilteringConfiguration;
944
+ /**
945
+ * A list of Amazon Web Services account IDs or Amazon Web Services organization/organizational unit ARNs that are allowed to access data managed by Lake Formation. If the ShareRecipients list includes valid values, a resource share is created with the principals you want to have access to the resources as the ShareRecipients. If the ShareRecipients value is null or the list is empty, no resource share is created.
946
+ */
947
+ ShareRecipients?: DataLakePrincipalList;
948
+ /**
949
+ * The Amazon Resource Name (ARN) of the RAM share.
950
+ */
951
+ ResourceShare?: RAMResourceShareArn;
940
952
  }
941
953
  export interface DescribeResourceRequest {
942
954
  /**
@@ -2264,6 +2276,10 @@ declare namespace LakeFormation {
2264
2276
  * The identifier for the Data Catalog. By default, the account ID. The Data Catalog is the persistent metadata store. It contains database definitions, table definitions, view definitions, and other control information to manage your Lake Formation environment.
2265
2277
  */
2266
2278
  CatalogId?: CatalogIdString;
2279
+ /**
2280
+ * A list of Amazon Web Services account IDs or Amazon Web Services organization/organizational unit ARNs that are allowed to access to access data managed by Lake Formation. If the ShareRecipients list includes valid values, then the resource share is updated with the principals you want to have access to the resources. If the ShareRecipients value is null, both the list of share recipients and the resource share remain unchanged. If the ShareRecipients value is an empty list, then the existing share recipients list will be cleared, and the resource share will be deleted.
2281
+ */
2282
+ ShareRecipients?: DataLakePrincipalList;
2267
2283
  /**
2268
2284
  * Allows to enable or disable the IAM Identity Center connection.
2269
2285
  */
package/clients/m2.d.ts CHANGED
@@ -167,6 +167,14 @@ declare class M2 extends Service {
167
167
  * Lists historical, current, and scheduled batch job executions for a specific application.
168
168
  */
169
169
  listBatchJobExecutions(callback?: (err: AWSError, data: M2.Types.ListBatchJobExecutionsResponse) => void): Request<M2.Types.ListBatchJobExecutionsResponse, AWSError>;
170
+ /**
171
+ * Lists all the job steps for JCL files to restart a batch job. This is only applicable for Micro Focus engine with versions 8.0.6 and above.
172
+ */
173
+ listBatchJobRestartPoints(params: M2.Types.ListBatchJobRestartPointsRequest, callback?: (err: AWSError, data: M2.Types.ListBatchJobRestartPointsResponse) => void): Request<M2.Types.ListBatchJobRestartPointsResponse, AWSError>;
174
+ /**
175
+ * Lists all the job steps for JCL files to restart a batch job. This is only applicable for Micro Focus engine with versions 8.0.6 and above.
176
+ */
177
+ listBatchJobRestartPoints(callback?: (err: AWSError, data: M2.Types.ListBatchJobRestartPointsResponse) => void): Request<M2.Types.ListBatchJobRestartPointsResponse, AWSError>;
170
178
  /**
171
179
  * Lists the data set imports for the specified application.
172
180
  */
@@ -382,7 +390,7 @@ declare namespace M2 {
382
390
  scriptBatchJobDefinition?: ScriptBatchJobDefinition;
383
391
  }
384
392
  export type BatchJobDefinitions = BatchJobDefinition[];
385
- export type BatchJobExecutionStatus = "Submitting"|"Holding"|"Dispatching"|"Running"|"Cancelling"|"Cancelled"|"Succeeded"|"Failed"|"Succeeded With Warning"|string;
393
+ export type BatchJobExecutionStatus = "Submitting"|"Holding"|"Dispatching"|"Running"|"Cancelling"|"Cancelled"|"Succeeded"|"Failed"|"Purged"|"Succeeded With Warning"|string;
386
394
  export interface BatchJobExecutionSummary {
387
395
  /**
388
396
  * The unique identifier of the application that hosts this batch job.
@@ -431,6 +439,10 @@ declare namespace M2 {
431
439
  * Specifies a file associated with a specific batch job.
432
440
  */
433
441
  fileBatchJobIdentifier?: FileBatchJobIdentifier;
442
+ /**
443
+ * Specifies the required information for restart, including execution ID and jobsteprestartmarker.
444
+ */
445
+ restartBatchJobIdentifier?: RestartBatchJobIdentifier;
434
446
  /**
435
447
  * Specifies an Amazon S3 location that identifies the batch jobs that you want to run. Use this identifier to run ad hoc batch jobs.
436
448
  */
@@ -441,6 +453,7 @@ declare namespace M2 {
441
453
  scriptBatchJobIdentifier?: ScriptBatchJobIdentifier;
442
454
  }
443
455
  export type BatchJobParametersMap = {[key: string]: BatchParamValue};
456
+ export type BatchJobStepList = JobStep[];
444
457
  export type BatchJobType = "VSE"|"JES2"|"JES3"|string;
445
458
  export type BatchParamKey = string;
446
459
  export type BatchParamValue = string;
@@ -1127,6 +1140,10 @@ declare namespace M2 {
1127
1140
  * The name of this batch job.
1128
1141
  */
1129
1142
  jobName?: String100;
1143
+ /**
1144
+ * The restart steps information for the most recent restart operation.
1145
+ */
1146
+ jobStepRestartMarker?: JobStepRestartMarker;
1130
1147
  /**
1131
1148
  * The type of job.
1132
1149
  */
@@ -1385,6 +1402,50 @@ declare namespace M2 {
1385
1402
  */
1386
1403
  scriptName?: String;
1387
1404
  }
1405
+ export interface JobStep {
1406
+ /**
1407
+ * The name of a procedure step.
1408
+ */
1409
+ procStepName?: String;
1410
+ /**
1411
+ * The number of a procedure step.
1412
+ */
1413
+ procStepNumber?: Integer;
1414
+ /**
1415
+ * The condition code of a step.
1416
+ */
1417
+ stepCondCode?: String;
1418
+ /**
1419
+ * The name of a step.
1420
+ */
1421
+ stepName?: String;
1422
+ /**
1423
+ * The number of a step.
1424
+ */
1425
+ stepNumber?: Integer;
1426
+ /**
1427
+ * Specifies if a step can be restarted or not.
1428
+ */
1429
+ stepRestartable?: Boolean;
1430
+ }
1431
+ export interface JobStepRestartMarker {
1432
+ /**
1433
+ * The procedure step name that a job was restarted from.
1434
+ */
1435
+ fromProcStep?: String;
1436
+ /**
1437
+ * The step name that a batch job restart was from.
1438
+ */
1439
+ fromStep: String;
1440
+ /**
1441
+ * The procedure step name that a batch job was restarted to.
1442
+ */
1443
+ toProcStep?: String;
1444
+ /**
1445
+ * The step name that a job was restarted to.
1446
+ */
1447
+ toStep?: String;
1448
+ }
1388
1449
  export interface ListApplicationVersionsRequest {
1389
1450
  /**
1390
1451
  * The unique identifier of the application.
@@ -1509,6 +1570,22 @@ declare namespace M2 {
1509
1570
  */
1510
1571
  nextToken?: NextToken;
1511
1572
  }
1573
+ export interface ListBatchJobRestartPointsRequest {
1574
+ /**
1575
+ * The unique identifier of the application.
1576
+ */
1577
+ applicationId: Identifier;
1578
+ /**
1579
+ * The unique identifier of each batch job execution.
1580
+ */
1581
+ executionId: Identifier;
1582
+ }
1583
+ export interface ListBatchJobRestartPointsResponse {
1584
+ /**
1585
+ * Returns all the batch job steps and related information for a batch job that previously ran.
1586
+ */
1587
+ batchJobSteps?: BatchJobStepList;
1588
+ }
1512
1589
  export interface ListDataSetImportHistoryRequest {
1513
1590
  /**
1514
1591
  * The unique identifier of the application.
@@ -1757,6 +1834,16 @@ declare namespace M2 {
1757
1834
  */
1758
1835
  min: Integer;
1759
1836
  }
1837
+ export interface RestartBatchJobIdentifier {
1838
+ /**
1839
+ * The executionId from the StartBatchJob response when the job ran for the first time.
1840
+ */
1841
+ executionId: Identifier;
1842
+ /**
1843
+ * The restart step information for the most recent restart operation.
1844
+ */
1845
+ jobStepRestartMarker: JobStepRestartMarker;
1846
+ }
1760
1847
  export interface S3BatchJobIdentifier {
1761
1848
  /**
1762
1849
  * The Amazon S3 bucket that contains the batch job definitions.