aws-sdk 2.1639.0 → 2.1641.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -1
- package/apis/apptest-2022-12-06.min.json +1917 -0
- package/apis/apptest-2022-12-06.paginators.json +40 -0
- package/apis/apptest-2022-12-06.waiters2.json +5 -0
- package/apis/cloudhsmv2-2017-04-28.min.json +26 -19
- package/apis/ec2-2016-11-15.min.json +160 -107
- package/apis/glue-2017-03-31.min.json +99 -98
- package/apis/iotwireless-2020-11-22.min.json +4 -1
- package/apis/kms-2014-11-01.examples.json +29 -0
- package/apis/kms-2014-11-01.min.json +76 -23
- package/apis/mediapackagev2-2022-12-25.examples.json +1271 -0
- package/apis/mediapackagev2-2022-12-25.min.json +108 -71
- package/apis/metadata.json +3 -3
- package/apis/osis-2022-01-01.min.json +33 -28
- package/apis/redshift-2012-12-01.min.json +7 -1
- package/apis/secretsmanager-2017-10-17.min.json +8 -1
- package/apis/securitylake-2018-05-10.min.json +7 -1
- package/apis/sesv2-2019-09-27.min.json +139 -121
- package/clients/all.d.ts +1 -1
- package/clients/all.js +2 -2
- package/clients/apptest.d.ts +2019 -0
- package/clients/apptest.js +19 -0
- package/clients/cloudhsmv2.d.ts +18 -1
- package/clients/ec2.d.ts +57 -3
- package/clients/glue.d.ts +6 -1
- package/clients/iotwireless.d.ts +1 -1
- package/clients/kms.d.ts +80 -14
- package/clients/mediapackagev2.d.ts +57 -4
- package/clients/osis.d.ts +9 -0
- package/clients/redshift.d.ts +16 -16
- package/clients/secretsmanager.d.ts +18 -13
- package/clients/securitylake.d.ts +3 -3
- package/clients/sesv2.d.ts +24 -10
- package/dist/aws-sdk-core-react-native.js +2 -2
- package/dist/aws-sdk-react-native.js +555 -539
- package/dist/aws-sdk.js +292 -157
- package/dist/aws-sdk.min.js +93 -93
- package/lib/config_service_placeholders.d.ts +2 -2
- package/lib/core.js +1 -1
- package/lib/credentials/cognito_identity_credentials.js +9 -0
- package/lib/shared-ini/ini-loader.d.ts +24 -1
- package/lib/shared-ini/ini-loader.js +0 -6
- package/package.json +1 -1
- package/scripts/region-checker/allowlist.js +3 -3
- package/apis/backupstorage-2018-04-10.min.json +0 -522
- package/apis/backupstorage-2018-04-10.paginators.json +0 -14
- package/clients/backupstorage.d.ts +0 -469
- package/clients/backupstorage.js +0 -18
- /package/apis/{backupstorage-2018-04-10.examples.json → apptest-2022-12-06.examples.json} +0 -0
@@ -11,7 +11,10 @@
|
|
11
11
|
"serviceId": "IoT Wireless",
|
12
12
|
"signatureVersion": "v4",
|
13
13
|
"signingName": "iotwireless",
|
14
|
-
"uid": "iotwireless-2020-11-22"
|
14
|
+
"uid": "iotwireless-2020-11-22",
|
15
|
+
"auth": [
|
16
|
+
"aws.auth#sigv4"
|
17
|
+
]
|
15
18
|
},
|
16
19
|
"operations": {
|
17
20
|
"AssociateAwsAccountWithPartnerAccount": {
|
@@ -632,6 +632,35 @@
|
|
632
632
|
"title": "To delete imported key material"
|
633
633
|
}
|
634
634
|
],
|
635
|
+
"DeriveSharedSecret": [
|
636
|
+
{
|
637
|
+
"input": {
|
638
|
+
"KeyAgreementAlgorithm": "ECDH",
|
639
|
+
"KeyId": "1234abcd-12ab-34cd-56ef-1234567890ab",
|
640
|
+
"PublicKey": "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvH3Yj0wbkLEpUl95Cv1cJVjsVNSjwGq3tCLnzXfhVwVvmzGN8pYj3U8nKwgouaHbBWNJYjP5VutbbkKS4Kv4GojwZBJyHN17kmxo8yTjRmjR15SKIQ8cqRA2uaERMLnpztIXdZp232PQPbWGxDyXYJ0aJ5EFSag+iSK341kr2kFTpINN7T1ZaX9vfXBdGR+VtkRKMWoHQeWzHrPZ+3irvpXNCKxGUxmPNsJSjPUhuSXT5+0VrY/LEYLQ5lUTrhU6z5/OK0kzaCc66DXc5ipSloS4Xyg+QcYSMxe9xuqO5HtzFImUSKBm1W6eDT6lHnSbpi7vXzNbIX7pWxKw9nmQvQIDAQAB"
|
641
|
+
},
|
642
|
+
"output": {
|
643
|
+
"KeyAgreementAlgorithm": "ECDH",
|
644
|
+
"KeyId": "1234abcd-12ab-34cd-56ef-1234567890ab",
|
645
|
+
"SharedSecret": "MEYCIQCKZLWyTk5runarx6XiAkU9gv3lbwPO/pHa+DXFehzdDwIhANwpsIV2g/9SPWLLsF6p/hiSskuIXMTRwqrMdVKWTMHG"
|
646
|
+
},
|
647
|
+
"comments": {
|
648
|
+
"input": {
|
649
|
+
"KeyAgreementAlgorithm": "The key agreement algorithm used to derive the shared secret. The only valid value is ECDH.",
|
650
|
+
"KeyId": "The key identifier for an asymmetric KMS key pair. The private key in the specified key pair is used to derive the shared secret.",
|
651
|
+
"PublicKey": "The public key in your peer's asymmetric key pair."
|
652
|
+
},
|
653
|
+
"output": {
|
654
|
+
"KeyAgreementAlgorithm": "The key agreement algorithm used to derive the shared secret.",
|
655
|
+
"KeyId": "The asymmetric KMS key pair used to derive the shared secret.",
|
656
|
+
"SharedSecret": "The raw secret derived from the specified key agreement algorithm, private key in the asymmetric KMS key, and your peer's public key."
|
657
|
+
}
|
658
|
+
},
|
659
|
+
"description": "The following example derives a shared secret using a key agreement algorithm.",
|
660
|
+
"id": "to-derive-a-shared-secret-1716220614829",
|
661
|
+
"title": "To derive a shared secret"
|
662
|
+
}
|
663
|
+
],
|
635
664
|
"DescribeCustomKeyStores": [
|
636
665
|
{
|
637
666
|
"input": {
|
@@ -13,7 +13,10 @@
|
|
13
13
|
"serviceId": "KMS",
|
14
14
|
"signatureVersion": "v4",
|
15
15
|
"targetPrefix": "TrentService",
|
16
|
-
"uid": "kms-2014-11-01"
|
16
|
+
"uid": "kms-2014-11-01",
|
17
|
+
"auth": [
|
18
|
+
"aws.auth#sigv4"
|
19
|
+
]
|
17
20
|
},
|
18
21
|
"operations": {
|
19
22
|
"CancelKeyDeletion": {
|
@@ -181,7 +184,7 @@
|
|
181
184
|
"KeyId": {},
|
182
185
|
"EncryptionAlgorithm": {},
|
183
186
|
"Recipient": {
|
184
|
-
"shape": "
|
187
|
+
"shape": "S23"
|
185
188
|
},
|
186
189
|
"DryRun": {
|
187
190
|
"type": "boolean"
|
@@ -193,7 +196,7 @@
|
|
193
196
|
"members": {
|
194
197
|
"KeyId": {},
|
195
198
|
"Plaintext": {
|
196
|
-
"shape": "
|
199
|
+
"shape": "S27"
|
197
200
|
},
|
198
201
|
"EncryptionAlgorithm": {},
|
199
202
|
"CiphertextForRecipient": {
|
@@ -239,6 +242,46 @@
|
|
239
242
|
}
|
240
243
|
}
|
241
244
|
},
|
245
|
+
"DeriveSharedSecret": {
|
246
|
+
"input": {
|
247
|
+
"type": "structure",
|
248
|
+
"required": [
|
249
|
+
"KeyId",
|
250
|
+
"KeyAgreementAlgorithm",
|
251
|
+
"PublicKey"
|
252
|
+
],
|
253
|
+
"members": {
|
254
|
+
"KeyId": {},
|
255
|
+
"KeyAgreementAlgorithm": {},
|
256
|
+
"PublicKey": {
|
257
|
+
"type": "blob"
|
258
|
+
},
|
259
|
+
"GrantTokens": {
|
260
|
+
"shape": "Sv"
|
261
|
+
},
|
262
|
+
"DryRun": {
|
263
|
+
"type": "boolean"
|
264
|
+
},
|
265
|
+
"Recipient": {
|
266
|
+
"shape": "S23"
|
267
|
+
}
|
268
|
+
}
|
269
|
+
},
|
270
|
+
"output": {
|
271
|
+
"type": "structure",
|
272
|
+
"members": {
|
273
|
+
"KeyId": {},
|
274
|
+
"SharedSecret": {
|
275
|
+
"shape": "S27"
|
276
|
+
},
|
277
|
+
"CiphertextForRecipient": {
|
278
|
+
"type": "blob"
|
279
|
+
},
|
280
|
+
"KeyAgreementAlgorithm": {},
|
281
|
+
"KeyOrigin": {}
|
282
|
+
}
|
283
|
+
}
|
284
|
+
},
|
242
285
|
"DescribeCustomKeyStores": {
|
243
286
|
"input": {
|
244
287
|
"type": "structure",
|
@@ -385,7 +428,7 @@
|
|
385
428
|
"members": {
|
386
429
|
"KeyId": {},
|
387
430
|
"Plaintext": {
|
388
|
-
"shape": "
|
431
|
+
"shape": "S27"
|
389
432
|
},
|
390
433
|
"EncryptionContext": {
|
391
434
|
"shape": "Ss"
|
@@ -429,7 +472,7 @@
|
|
429
472
|
"shape": "Sv"
|
430
473
|
},
|
431
474
|
"Recipient": {
|
432
|
-
"shape": "
|
475
|
+
"shape": "S23"
|
433
476
|
},
|
434
477
|
"DryRun": {
|
435
478
|
"type": "boolean"
|
@@ -443,7 +486,7 @@
|
|
443
486
|
"type": "blob"
|
444
487
|
},
|
445
488
|
"Plaintext": {
|
446
|
-
"shape": "
|
489
|
+
"shape": "S27"
|
447
490
|
},
|
448
491
|
"KeyId": {},
|
449
492
|
"CiphertextForRecipient": {
|
@@ -469,7 +512,7 @@
|
|
469
512
|
"shape": "Sv"
|
470
513
|
},
|
471
514
|
"Recipient": {
|
472
|
-
"shape": "
|
515
|
+
"shape": "S23"
|
473
516
|
},
|
474
517
|
"DryRun": {
|
475
518
|
"type": "boolean"
|
@@ -483,7 +526,7 @@
|
|
483
526
|
"type": "blob"
|
484
527
|
},
|
485
528
|
"PrivateKeyPlaintext": {
|
486
|
-
"shape": "
|
529
|
+
"shape": "S27"
|
487
530
|
},
|
488
531
|
"PublicKey": {
|
489
532
|
"type": "blob"
|
@@ -574,7 +617,7 @@
|
|
574
617
|
],
|
575
618
|
"members": {
|
576
619
|
"Message": {
|
577
|
-
"shape": "
|
620
|
+
"shape": "S27"
|
578
621
|
},
|
579
622
|
"KeyId": {},
|
580
623
|
"MacAlgorithm": {},
|
@@ -606,7 +649,7 @@
|
|
606
649
|
},
|
607
650
|
"CustomKeyStoreId": {},
|
608
651
|
"Recipient": {
|
609
|
-
"shape": "
|
652
|
+
"shape": "S23"
|
610
653
|
}
|
611
654
|
}
|
612
655
|
},
|
@@ -614,7 +657,7 @@
|
|
614
657
|
"type": "structure",
|
615
658
|
"members": {
|
616
659
|
"Plaintext": {
|
617
|
-
"shape": "
|
660
|
+
"shape": "S27"
|
618
661
|
},
|
619
662
|
"CiphertextForRecipient": {
|
620
663
|
"type": "blob"
|
@@ -692,7 +735,7 @@
|
|
692
735
|
"type": "blob"
|
693
736
|
},
|
694
737
|
"PublicKey": {
|
695
|
-
"shape": "
|
738
|
+
"shape": "S27"
|
696
739
|
},
|
697
740
|
"ParametersValidTo": {
|
698
741
|
"type": "timestamp"
|
@@ -732,6 +775,9 @@
|
|
732
775
|
},
|
733
776
|
"SigningAlgorithms": {
|
734
777
|
"shape": "S1o"
|
778
|
+
},
|
779
|
+
"KeyAgreementAlgorithms": {
|
780
|
+
"shape": "S1q"
|
735
781
|
}
|
736
782
|
}
|
737
783
|
}
|
@@ -818,7 +864,7 @@
|
|
818
864
|
}
|
819
865
|
},
|
820
866
|
"output": {
|
821
|
-
"shape": "
|
867
|
+
"shape": "S3w"
|
822
868
|
}
|
823
869
|
},
|
824
870
|
"ListKeyPolicies": {
|
@@ -958,7 +1004,7 @@
|
|
958
1004
|
}
|
959
1005
|
},
|
960
1006
|
"output": {
|
961
|
-
"shape": "
|
1007
|
+
"shape": "S3w"
|
962
1008
|
}
|
963
1009
|
},
|
964
1010
|
"PutKeyPolicy": {
|
@@ -1137,7 +1183,7 @@
|
|
1137
1183
|
"members": {
|
1138
1184
|
"KeyId": {},
|
1139
1185
|
"Message": {
|
1140
|
-
"shape": "
|
1186
|
+
"shape": "S27"
|
1141
1187
|
},
|
1142
1188
|
"MessageType": {},
|
1143
1189
|
"GrantTokens": {
|
@@ -1269,7 +1315,7 @@
|
|
1269
1315
|
"members": {
|
1270
1316
|
"KeyId": {},
|
1271
1317
|
"Message": {
|
1272
|
-
"shape": "
|
1318
|
+
"shape": "S27"
|
1273
1319
|
},
|
1274
1320
|
"MessageType": {},
|
1275
1321
|
"Signature": {
|
@@ -1306,7 +1352,7 @@
|
|
1306
1352
|
],
|
1307
1353
|
"members": {
|
1308
1354
|
"Message": {
|
1309
|
-
"shape": "
|
1355
|
+
"shape": "S27"
|
1310
1356
|
},
|
1311
1357
|
"KeyId": {},
|
1312
1358
|
"MacAlgorithm": {},
|
@@ -1442,6 +1488,9 @@
|
|
1442
1488
|
"SigningAlgorithms": {
|
1443
1489
|
"shape": "S1o"
|
1444
1490
|
},
|
1491
|
+
"KeyAgreementAlgorithms": {
|
1492
|
+
"shape": "S1q"
|
1493
|
+
},
|
1445
1494
|
"MultiRegion": {
|
1446
1495
|
"type": "boolean"
|
1447
1496
|
},
|
@@ -1450,12 +1499,12 @@
|
|
1450
1499
|
"members": {
|
1451
1500
|
"MultiRegionKeyType": {},
|
1452
1501
|
"PrimaryKey": {
|
1453
|
-
"shape": "
|
1502
|
+
"shape": "S1u"
|
1454
1503
|
},
|
1455
1504
|
"ReplicaKeys": {
|
1456
1505
|
"type": "list",
|
1457
1506
|
"member": {
|
1458
|
-
"shape": "
|
1507
|
+
"shape": "S1u"
|
1459
1508
|
}
|
1460
1509
|
}
|
1461
1510
|
}
|
@@ -1483,14 +1532,18 @@
|
|
1483
1532
|
"type": "list",
|
1484
1533
|
"member": {}
|
1485
1534
|
},
|
1486
|
-
"
|
1535
|
+
"S1q": {
|
1536
|
+
"type": "list",
|
1537
|
+
"member": {}
|
1538
|
+
},
|
1539
|
+
"S1u": {
|
1487
1540
|
"type": "structure",
|
1488
1541
|
"members": {
|
1489
1542
|
"Arn": {},
|
1490
1543
|
"Region": {}
|
1491
1544
|
}
|
1492
1545
|
},
|
1493
|
-
"
|
1546
|
+
"S23": {
|
1494
1547
|
"type": "structure",
|
1495
1548
|
"members": {
|
1496
1549
|
"KeyEncryptionAlgorithm": {},
|
@@ -1499,11 +1552,11 @@
|
|
1499
1552
|
}
|
1500
1553
|
}
|
1501
1554
|
},
|
1502
|
-
"
|
1555
|
+
"S27": {
|
1503
1556
|
"type": "blob",
|
1504
1557
|
"sensitive": true
|
1505
1558
|
},
|
1506
|
-
"
|
1559
|
+
"S3w": {
|
1507
1560
|
"type": "structure",
|
1508
1561
|
"members": {
|
1509
1562
|
"Grants": {
|