aws-sdk 2.1642.0 → 2.1643.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -1
- package/apis/acm-pca-2017-08-22.min.json +4 -1
- package/apis/batch-2016-08-10.min.json +4 -1
- package/apis/codebuild-2016-10-06.min.json +50 -29
- package/apis/cognito-idp-2016-04-18.min.json +108 -27
- package/apis/ds-2015-04-16.min.json +7 -1
- package/apis/elasticfilesystem-2015-02-01.min.json +7 -1
- package/apis/glue-2017-03-31.min.json +294 -142
- package/apis/glue-2017-03-31.paginators.json +6 -0
- package/apis/kms-2014-11-01.examples.json +4 -2
- package/apis/mediaconvert-2017-08-29.min.json +155 -130
- package/apis/waf-2015-08-24.min.json +7 -1
- package/clients/acmpca.d.ts +2 -2
- package/clients/codebuild.d.ts +24 -1
- package/clients/glue.d.ts +206 -4
- package/clients/mediaconvert.d.ts +31 -4
- package/clients/secretsmanager.d.ts +2 -2
- package/dist/aws-sdk-core-react-native.js +1 -1
- package/dist/aws-sdk-react-native.js +11 -11
- package/dist/aws-sdk.js +175 -61
- package/dist/aws-sdk.min.js +92 -92
- package/lib/core.js +1 -1
- package/package.json +1 -1
@@ -5,12 +5,18 @@
|
|
5
5
|
"endpointPrefix": "waf",
|
6
6
|
"jsonVersion": "1.1",
|
7
7
|
"protocol": "json",
|
8
|
+
"protocols": [
|
9
|
+
"json"
|
10
|
+
],
|
8
11
|
"serviceAbbreviation": "WAF",
|
9
12
|
"serviceFullName": "AWS WAF",
|
10
13
|
"serviceId": "WAF",
|
11
14
|
"signatureVersion": "v4",
|
12
15
|
"targetPrefix": "AWSWAF_20150824",
|
13
|
-
"uid": "waf-2015-08-24"
|
16
|
+
"uid": "waf-2015-08-24",
|
17
|
+
"auth": [
|
18
|
+
"aws.auth#sigv4"
|
19
|
+
]
|
14
20
|
},
|
15
21
|
"operations": {
|
16
22
|
"CreateByteMatchSet": {
|
package/clients/acmpca.d.ts
CHANGED
@@ -109,11 +109,11 @@ declare class ACMPCA extends Service {
|
|
109
109
|
*/
|
110
110
|
getPolicy(callback?: (err: AWSError, data: ACMPCA.Types.GetPolicyResponse) => void): Request<ACMPCA.Types.GetPolicyResponse, AWSError>;
|
111
111
|
/**
|
112
|
-
* Imports a signed private CA certificate into Amazon Web Services Private CA. This action is used when you are using a chain of trust whose root is located outside Amazon Web Services Private CA. Before you can call this action, the following preparations must in place: In Amazon Web Services Private CA, call the CreateCertificateAuthority action to create the private CA that you plan to back with the imported certificate. Call the GetCertificateAuthorityCsr action to generate a certificate signing request (CSR). Sign the CSR using a root or intermediate CA hosted by either an on-premises PKI hierarchy or by a commercial CA. Create a certificate chain and copy the signed certificate and the certificate chain to your working directory. Amazon Web Services Private CA supports three scenarios for installing a CA certificate: Installing a certificate for a root CA hosted by Amazon Web Services Private CA. Installing a subordinate CA certificate whose parent authority is hosted by Amazon Web Services Private CA. Installing a subordinate CA certificate whose parent authority is externally hosted. The following additional requirements apply when you import a CA certificate. Only a self-signed certificate can be imported as a root CA. A self-signed certificate cannot be imported as a subordinate CA. Your certificate chain must not include the private CA certificate that you are importing. Your root CA must be the last certificate in your chain. The subordinate certificate, if any, that your root CA signed must be next to last. The subordinate certificate signed by the preceding subordinate CA must come next, and so on until your chain is built. The chain must be PEM-encoded. The maximum allowed size of a certificate is 32 KB. The maximum allowed size of a certificate chain is 2 MB. Enforcement of Critical Constraints Amazon Web Services Private CA allows the following extensions to be marked critical in the imported CA certificate or chain. Basic constraints (must be marked critical)
|
112
|
+
* Imports a signed private CA certificate into Amazon Web Services Private CA. This action is used when you are using a chain of trust whose root is located outside Amazon Web Services Private CA. Before you can call this action, the following preparations must in place: In Amazon Web Services Private CA, call the CreateCertificateAuthority action to create the private CA that you plan to back with the imported certificate. Call the GetCertificateAuthorityCsr action to generate a certificate signing request (CSR). Sign the CSR using a root or intermediate CA hosted by either an on-premises PKI hierarchy or by a commercial CA. Create a certificate chain and copy the signed certificate and the certificate chain to your working directory. Amazon Web Services Private CA supports three scenarios for installing a CA certificate: Installing a certificate for a root CA hosted by Amazon Web Services Private CA. Installing a subordinate CA certificate whose parent authority is hosted by Amazon Web Services Private CA. Installing a subordinate CA certificate whose parent authority is externally hosted. The following additional requirements apply when you import a CA certificate. Only a self-signed certificate can be imported as a root CA. A self-signed certificate cannot be imported as a subordinate CA. Your certificate chain must not include the private CA certificate that you are importing. Your root CA must be the last certificate in your chain. The subordinate certificate, if any, that your root CA signed must be next to last. The subordinate certificate signed by the preceding subordinate CA must come next, and so on until your chain is built. The chain must be PEM-encoded. The maximum allowed size of a certificate is 32 KB. The maximum allowed size of a certificate chain is 2 MB. Enforcement of Critical Constraints Amazon Web Services Private CA allows the following extensions to be marked critical in the imported CA certificate or chain. Authority key identifier Basic constraints (must be marked critical) Certificate policies Extended key usage Inhibit anyPolicy Issuer alternative name Key usage Name constraints Policy mappings Subject alternative name Subject directory attributes Subject key identifier Subject information access Amazon Web Services Private CA rejects the following extensions when they are marked critical in an imported CA certificate or chain. Authority information access CRL distribution points Freshest CRL Policy constraints Amazon Web Services Private Certificate Authority will also reject any other extension marked as critical not contained on the preceding list of allowed extensions.
|
113
113
|
*/
|
114
114
|
importCertificateAuthorityCertificate(params: ACMPCA.Types.ImportCertificateAuthorityCertificateRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
115
115
|
/**
|
116
|
-
* Imports a signed private CA certificate into Amazon Web Services Private CA. This action is used when you are using a chain of trust whose root is located outside Amazon Web Services Private CA. Before you can call this action, the following preparations must in place: In Amazon Web Services Private CA, call the CreateCertificateAuthority action to create the private CA that you plan to back with the imported certificate. Call the GetCertificateAuthorityCsr action to generate a certificate signing request (CSR). Sign the CSR using a root or intermediate CA hosted by either an on-premises PKI hierarchy or by a commercial CA. Create a certificate chain and copy the signed certificate and the certificate chain to your working directory. Amazon Web Services Private CA supports three scenarios for installing a CA certificate: Installing a certificate for a root CA hosted by Amazon Web Services Private CA. Installing a subordinate CA certificate whose parent authority is hosted by Amazon Web Services Private CA. Installing a subordinate CA certificate whose parent authority is externally hosted. The following additional requirements apply when you import a CA certificate. Only a self-signed certificate can be imported as a root CA. A self-signed certificate cannot be imported as a subordinate CA. Your certificate chain must not include the private CA certificate that you are importing. Your root CA must be the last certificate in your chain. The subordinate certificate, if any, that your root CA signed must be next to last. The subordinate certificate signed by the preceding subordinate CA must come next, and so on until your chain is built. The chain must be PEM-encoded. The maximum allowed size of a certificate is 32 KB. The maximum allowed size of a certificate chain is 2 MB. Enforcement of Critical Constraints Amazon Web Services Private CA allows the following extensions to be marked critical in the imported CA certificate or chain. Basic constraints (must be marked critical)
|
116
|
+
* Imports a signed private CA certificate into Amazon Web Services Private CA. This action is used when you are using a chain of trust whose root is located outside Amazon Web Services Private CA. Before you can call this action, the following preparations must in place: In Amazon Web Services Private CA, call the CreateCertificateAuthority action to create the private CA that you plan to back with the imported certificate. Call the GetCertificateAuthorityCsr action to generate a certificate signing request (CSR). Sign the CSR using a root or intermediate CA hosted by either an on-premises PKI hierarchy or by a commercial CA. Create a certificate chain and copy the signed certificate and the certificate chain to your working directory. Amazon Web Services Private CA supports three scenarios for installing a CA certificate: Installing a certificate for a root CA hosted by Amazon Web Services Private CA. Installing a subordinate CA certificate whose parent authority is hosted by Amazon Web Services Private CA. Installing a subordinate CA certificate whose parent authority is externally hosted. The following additional requirements apply when you import a CA certificate. Only a self-signed certificate can be imported as a root CA. A self-signed certificate cannot be imported as a subordinate CA. Your certificate chain must not include the private CA certificate that you are importing. Your root CA must be the last certificate in your chain. The subordinate certificate, if any, that your root CA signed must be next to last. The subordinate certificate signed by the preceding subordinate CA must come next, and so on until your chain is built. The chain must be PEM-encoded. The maximum allowed size of a certificate is 32 KB. The maximum allowed size of a certificate chain is 2 MB. Enforcement of Critical Constraints Amazon Web Services Private CA allows the following extensions to be marked critical in the imported CA certificate or chain. Authority key identifier Basic constraints (must be marked critical) Certificate policies Extended key usage Inhibit anyPolicy Issuer alternative name Key usage Name constraints Policy mappings Subject alternative name Subject directory attributes Subject key identifier Subject information access Amazon Web Services Private CA rejects the following extensions when they are marked critical in an imported CA certificate or chain. Authority information access CRL distribution points Freshest CRL Policy constraints Amazon Web Services Private Certificate Authority will also reject any other extension marked as critical not contained on the preceding list of allowed extensions.
|
117
117
|
*/
|
118
118
|
importCertificateAuthorityCertificate(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
119
119
|
/**
|
package/clients/codebuild.d.ts
CHANGED
@@ -1204,6 +1204,10 @@ declare namespace CodeBuild {
|
|
1204
1204
|
* If manualCreation is true, CodeBuild doesn't create a webhook in GitHub and instead returns payloadUrl and secret values for the webhook. The payloadUrl and secret values in the output can be used to manually create a webhook within GitHub. manualCreation is only available for GitHub webhooks.
|
1205
1205
|
*/
|
1206
1206
|
manualCreation?: WrapperBoolean;
|
1207
|
+
/**
|
1208
|
+
* The scope configuration for global or organization webhooks. Global or organization webhooks are only available for GitHub and Github Enterprise webhooks.
|
1209
|
+
*/
|
1210
|
+
scopeConfiguration?: ScopeConfiguration;
|
1207
1211
|
}
|
1208
1212
|
export interface CreateWebhookOutput {
|
1209
1213
|
/**
|
@@ -2603,6 +2607,20 @@ declare namespace CodeBuild {
|
|
2603
2607
|
*/
|
2604
2608
|
desiredCapacity?: FleetCapacity;
|
2605
2609
|
}
|
2610
|
+
export interface ScopeConfiguration {
|
2611
|
+
/**
|
2612
|
+
* The name of either the enterprise or organization that will send webhook events to CodeBuild, depending on if the webhook is a global or organization webhook respectively.
|
2613
|
+
*/
|
2614
|
+
name: String;
|
2615
|
+
/**
|
2616
|
+
* The domain of the GitHub Enterprise organization. Note that this parameter is only required if your project's source type is GITHUB_ENTERPRISE
|
2617
|
+
*/
|
2618
|
+
domain?: String;
|
2619
|
+
/**
|
2620
|
+
* The type of scope for a GitHub webhook.
|
2621
|
+
*/
|
2622
|
+
scope: WebhookScopeType;
|
2623
|
+
}
|
2606
2624
|
export type SecurityGroupIds = NonEmptyString[];
|
2607
2625
|
export type SensitiveNonEmptyString = string;
|
2608
2626
|
export type SensitiveString = string;
|
@@ -3263,11 +3281,15 @@ declare namespace CodeBuild {
|
|
3263
3281
|
* A timestamp that indicates the last time a repository's secret token was modified.
|
3264
3282
|
*/
|
3265
3283
|
lastModifiedSecret?: Timestamp;
|
3284
|
+
/**
|
3285
|
+
* The scope configuration for global or organization webhooks. Global or organization webhooks are only available for GitHub and Github Enterprise webhooks.
|
3286
|
+
*/
|
3287
|
+
scopeConfiguration?: ScopeConfiguration;
|
3266
3288
|
}
|
3267
3289
|
export type WebhookBuildType = "BUILD"|"BUILD_BATCH"|string;
|
3268
3290
|
export interface WebhookFilter {
|
3269
3291
|
/**
|
3270
|
-
* The type of webhook filter. There are nine webhook filter types: EVENT, ACTOR_ACCOUNT_ID, HEAD_REF, BASE_REF, FILE_PATH, COMMIT_MESSAGE, TAG_NAME, RELEASE_NAME, and WORKFLOW_NAME. EVENT A webhook event triggers a build when the provided pattern matches one of nine event types: PUSH, PULL_REQUEST_CREATED, PULL_REQUEST_UPDATED, PULL_REQUEST_CLOSED, PULL_REQUEST_REOPENED, PULL_REQUEST_MERGED, RELEASED, PRERELEASED, and WORKFLOW_JOB_QUEUED. The EVENT patterns are specified as a comma-separated string. For example, PUSH, PULL_REQUEST_CREATED, PULL_REQUEST_UPDATED filters all push, pull request created, and pull request updated events. Types PULL_REQUEST_REOPENED and WORKFLOW_JOB_QUEUED work with GitHub and GitHub Enterprise only. Types RELEASED and PRERELEASED work with GitHub only. ACTOR_ACCOUNT_ID A webhook event triggers a build when a GitHub, GitHub Enterprise, or Bitbucket account ID matches the regular expression pattern. HEAD_REF A webhook event triggers a build when the head reference matches the regular expression pattern. For example, refs/heads/branch-name and refs/tags/tag-name. Works with GitHub and GitHub Enterprise push, GitHub and GitHub Enterprise pull request, Bitbucket push, and Bitbucket pull request events. BASE_REF A webhook event triggers a build when the base reference matches the regular expression pattern. For example, refs/heads/branch-name. Works with pull request events only. FILE_PATH A webhook triggers a build when the path of a changed file matches the regular expression pattern. Works with GitHub and Bitbucket events push and pull requests events. Also works with GitHub Enterprise push events, but does not work with GitHub Enterprise pull request events. COMMIT_MESSAGE A webhook triggers a build when the head commit message matches the regular expression pattern. Works with GitHub and Bitbucket events push and pull requests events. Also works with GitHub Enterprise push events, but does not work with GitHub Enterprise pull request events. TAG_NAME A webhook triggers a build when the tag name of the release matches the regular expression pattern. Works with RELEASED and PRERELEASED events only. RELEASE_NAME A webhook triggers a build when the release name matches the regular expression pattern. Works with RELEASED and PRERELEASED events only. WORKFLOW_NAME A webhook triggers a build when the workflow name matches the regular expression pattern. Works with WORKFLOW_JOB_QUEUED events only.
|
3292
|
+
* The type of webhook filter. There are nine webhook filter types: EVENT, ACTOR_ACCOUNT_ID, HEAD_REF, BASE_REF, FILE_PATH, COMMIT_MESSAGE, TAG_NAME, RELEASE_NAME, and WORKFLOW_NAME. EVENT A webhook event triggers a build when the provided pattern matches one of nine event types: PUSH, PULL_REQUEST_CREATED, PULL_REQUEST_UPDATED, PULL_REQUEST_CLOSED, PULL_REQUEST_REOPENED, PULL_REQUEST_MERGED, RELEASED, PRERELEASED, and WORKFLOW_JOB_QUEUED. The EVENT patterns are specified as a comma-separated string. For example, PUSH, PULL_REQUEST_CREATED, PULL_REQUEST_UPDATED filters all push, pull request created, and pull request updated events. Types PULL_REQUEST_REOPENED and WORKFLOW_JOB_QUEUED work with GitHub and GitHub Enterprise only. Types RELEASED and PRERELEASED work with GitHub only. ACTOR_ACCOUNT_ID A webhook event triggers a build when a GitHub, GitHub Enterprise, or Bitbucket account ID matches the regular expression pattern. HEAD_REF A webhook event triggers a build when the head reference matches the regular expression pattern. For example, refs/heads/branch-name and refs/tags/tag-name. Works with GitHub and GitHub Enterprise push, GitHub and GitHub Enterprise pull request, Bitbucket push, and Bitbucket pull request events. BASE_REF A webhook event triggers a build when the base reference matches the regular expression pattern. For example, refs/heads/branch-name. Works with pull request events only. FILE_PATH A webhook triggers a build when the path of a changed file matches the regular expression pattern. Works with GitHub and Bitbucket events push and pull requests events. Also works with GitHub Enterprise push events, but does not work with GitHub Enterprise pull request events. COMMIT_MESSAGE A webhook triggers a build when the head commit message matches the regular expression pattern. Works with GitHub and Bitbucket events push and pull requests events. Also works with GitHub Enterprise push events, but does not work with GitHub Enterprise pull request events. TAG_NAME A webhook triggers a build when the tag name of the release matches the regular expression pattern. Works with RELEASED and PRERELEASED events only. RELEASE_NAME A webhook triggers a build when the release name matches the regular expression pattern. Works with RELEASED and PRERELEASED events only. REPOSITORY_NAME A webhook triggers a build when the repository name matches the regular expression pattern. Works with GitHub global or organization webhooks only. WORKFLOW_NAME A webhook triggers a build when the workflow name matches the regular expression pattern. Works with WORKFLOW_JOB_QUEUED events only.
|
3271
3293
|
*/
|
3272
3294
|
type: WebhookFilterType;
|
3273
3295
|
/**
|
@@ -3280,6 +3302,7 @@ declare namespace CodeBuild {
|
|
3280
3302
|
excludeMatchedPattern?: WrapperBoolean;
|
3281
3303
|
}
|
3282
3304
|
export type WebhookFilterType = "EVENT"|"BASE_REF"|"HEAD_REF"|"ACTOR_ACCOUNT_ID"|"FILE_PATH"|"COMMIT_MESSAGE"|"WORKFLOW_NAME"|"TAG_NAME"|"RELEASE_NAME"|string;
|
3305
|
+
export type WebhookScopeType = "GITHUB_ORGANIZATION"|"GITHUB_GLOBAL"|string;
|
3283
3306
|
export type WrapperBoolean = boolean;
|
3284
3307
|
export type WrapperDouble = number;
|
3285
3308
|
export type WrapperInt = number;
|
package/clients/glue.d.ts
CHANGED
@@ -347,6 +347,14 @@ declare class Glue extends Service {
|
|
347
347
|
* Creates a new trigger.
|
348
348
|
*/
|
349
349
|
createTrigger(callback?: (err: AWSError, data: Glue.Types.CreateTriggerResponse) => void): Request<Glue.Types.CreateTriggerResponse, AWSError>;
|
350
|
+
/**
|
351
|
+
* Creates an Glue usage profile.
|
352
|
+
*/
|
353
|
+
createUsageProfile(params: Glue.Types.CreateUsageProfileRequest, callback?: (err: AWSError, data: Glue.Types.CreateUsageProfileResponse) => void): Request<Glue.Types.CreateUsageProfileResponse, AWSError>;
|
354
|
+
/**
|
355
|
+
* Creates an Glue usage profile.
|
356
|
+
*/
|
357
|
+
createUsageProfile(callback?: (err: AWSError, data: Glue.Types.CreateUsageProfileResponse) => void): Request<Glue.Types.CreateUsageProfileResponse, AWSError>;
|
350
358
|
/**
|
351
359
|
* Creates a new function definition in the Data Catalog.
|
352
360
|
*/
|
@@ -555,6 +563,14 @@ declare class Glue extends Service {
|
|
555
563
|
* Deletes a specified trigger. If the trigger is not found, no exception is thrown.
|
556
564
|
*/
|
557
565
|
deleteTrigger(callback?: (err: AWSError, data: Glue.Types.DeleteTriggerResponse) => void): Request<Glue.Types.DeleteTriggerResponse, AWSError>;
|
566
|
+
/**
|
567
|
+
* Deletes the Glue specified usage profile.
|
568
|
+
*/
|
569
|
+
deleteUsageProfile(params: Glue.Types.DeleteUsageProfileRequest, callback?: (err: AWSError, data: Glue.Types.DeleteUsageProfileResponse) => void): Request<Glue.Types.DeleteUsageProfileResponse, AWSError>;
|
570
|
+
/**
|
571
|
+
* Deletes the Glue specified usage profile.
|
572
|
+
*/
|
573
|
+
deleteUsageProfile(callback?: (err: AWSError, data: Glue.Types.DeleteUsageProfileResponse) => void): Request<Glue.Types.DeleteUsageProfileResponse, AWSError>;
|
558
574
|
/**
|
559
575
|
* Deletes an existing function definition from the Data Catalog.
|
560
576
|
*/
|
@@ -796,11 +812,11 @@ declare class Glue extends Service {
|
|
796
812
|
*/
|
797
813
|
getJobBookmark(callback?: (err: AWSError, data: Glue.Types.GetJobBookmarkResponse) => void): Request<Glue.Types.GetJobBookmarkResponse, AWSError>;
|
798
814
|
/**
|
799
|
-
* Retrieves the metadata for a given job run.
|
815
|
+
* Retrieves the metadata for a given job run. Job run history is accessible for 90 days for your workflow and job run.
|
800
816
|
*/
|
801
817
|
getJobRun(params: Glue.Types.GetJobRunRequest, callback?: (err: AWSError, data: Glue.Types.GetJobRunResponse) => void): Request<Glue.Types.GetJobRunResponse, AWSError>;
|
802
818
|
/**
|
803
|
-
* Retrieves the metadata for a given job run.
|
819
|
+
* Retrieves the metadata for a given job run. Job run history is accessible for 90 days for your workflow and job run.
|
804
820
|
*/
|
805
821
|
getJobRun(callback?: (err: AWSError, data: Glue.Types.GetJobRunResponse) => void): Request<Glue.Types.GetJobRunResponse, AWSError>;
|
806
822
|
/**
|
@@ -1067,6 +1083,14 @@ declare class Glue extends Service {
|
|
1067
1083
|
* Allows a third-party analytical engine to retrieve unfiltered table metadata from the Data Catalog. For IAM authorization, the public IAM action associated with this API is glue:GetTable.
|
1068
1084
|
*/
|
1069
1085
|
getUnfilteredTableMetadata(callback?: (err: AWSError, data: Glue.Types.GetUnfilteredTableMetadataResponse) => void): Request<Glue.Types.GetUnfilteredTableMetadataResponse, AWSError>;
|
1086
|
+
/**
|
1087
|
+
* Retrieves information about the specified Glue usage profile.
|
1088
|
+
*/
|
1089
|
+
getUsageProfile(params: Glue.Types.GetUsageProfileRequest, callback?: (err: AWSError, data: Glue.Types.GetUsageProfileResponse) => void): Request<Glue.Types.GetUsageProfileResponse, AWSError>;
|
1090
|
+
/**
|
1091
|
+
* Retrieves information about the specified Glue usage profile.
|
1092
|
+
*/
|
1093
|
+
getUsageProfile(callback?: (err: AWSError, data: Glue.Types.GetUsageProfileResponse) => void): Request<Glue.Types.GetUsageProfileResponse, AWSError>;
|
1070
1094
|
/**
|
1071
1095
|
* Retrieves a specified function definition from the Data Catalog.
|
1072
1096
|
*/
|
@@ -1092,11 +1116,11 @@ declare class Glue extends Service {
|
|
1092
1116
|
*/
|
1093
1117
|
getWorkflow(callback?: (err: AWSError, data: Glue.Types.GetWorkflowResponse) => void): Request<Glue.Types.GetWorkflowResponse, AWSError>;
|
1094
1118
|
/**
|
1095
|
-
* Retrieves the metadata for a given workflow run.
|
1119
|
+
* Retrieves the metadata for a given workflow run. Job run history is accessible for 90 days for your workflow and job run.
|
1096
1120
|
*/
|
1097
1121
|
getWorkflowRun(params: Glue.Types.GetWorkflowRunRequest, callback?: (err: AWSError, data: Glue.Types.GetWorkflowRunResponse) => void): Request<Glue.Types.GetWorkflowRunResponse, AWSError>;
|
1098
1122
|
/**
|
1099
|
-
* Retrieves the metadata for a given workflow run.
|
1123
|
+
* Retrieves the metadata for a given workflow run. Job run history is accessible for 90 days for your workflow and job run.
|
1100
1124
|
*/
|
1101
1125
|
getWorkflowRun(callback?: (err: AWSError, data: Glue.Types.GetWorkflowRunResponse) => void): Request<Glue.Types.GetWorkflowRunResponse, AWSError>;
|
1102
1126
|
/**
|
@@ -1275,6 +1299,14 @@ declare class Glue extends Service {
|
|
1275
1299
|
* Retrieves the names of all trigger resources in this Amazon Web Services account, or the resources with the specified tag. This operation allows you to see which resources are available in your account, and their names. This operation takes the optional Tags field, which you can use as a filter on the response so that tagged resources can be retrieved as a group. If you choose to use tags filtering, only resources with the tag are retrieved.
|
1276
1300
|
*/
|
1277
1301
|
listTriggers(callback?: (err: AWSError, data: Glue.Types.ListTriggersResponse) => void): Request<Glue.Types.ListTriggersResponse, AWSError>;
|
1302
|
+
/**
|
1303
|
+
* List all the Glue usage profiles.
|
1304
|
+
*/
|
1305
|
+
listUsageProfiles(params: Glue.Types.ListUsageProfilesRequest, callback?: (err: AWSError, data: Glue.Types.ListUsageProfilesResponse) => void): Request<Glue.Types.ListUsageProfilesResponse, AWSError>;
|
1306
|
+
/**
|
1307
|
+
* List all the Glue usage profiles.
|
1308
|
+
*/
|
1309
|
+
listUsageProfiles(callback?: (err: AWSError, data: Glue.Types.ListUsageProfilesResponse) => void): Request<Glue.Types.ListUsageProfilesResponse, AWSError>;
|
1278
1310
|
/**
|
1279
1311
|
* Lists names of workflows created in the account.
|
1280
1312
|
*/
|
@@ -1699,6 +1731,14 @@ declare class Glue extends Service {
|
|
1699
1731
|
* Updates a trigger definition.
|
1700
1732
|
*/
|
1701
1733
|
updateTrigger(callback?: (err: AWSError, data: Glue.Types.UpdateTriggerResponse) => void): Request<Glue.Types.UpdateTriggerResponse, AWSError>;
|
1734
|
+
/**
|
1735
|
+
* Update an Glue usage profile.
|
1736
|
+
*/
|
1737
|
+
updateUsageProfile(params: Glue.Types.UpdateUsageProfileRequest, callback?: (err: AWSError, data: Glue.Types.UpdateUsageProfileResponse) => void): Request<Glue.Types.UpdateUsageProfileResponse, AWSError>;
|
1738
|
+
/**
|
1739
|
+
* Update an Glue usage profile.
|
1740
|
+
*/
|
1741
|
+
updateUsageProfile(callback?: (err: AWSError, data: Glue.Types.UpdateUsageProfileResponse) => void): Request<Glue.Types.UpdateUsageProfileResponse, AWSError>;
|
1702
1742
|
/**
|
1703
1743
|
* Updates an existing function definition in the Data Catalog.
|
1704
1744
|
*/
|
@@ -1780,6 +1820,7 @@ declare namespace Glue {
|
|
1780
1820
|
AggFunc: AggFunction;
|
1781
1821
|
}
|
1782
1822
|
export type AggregateOperations = AggregateOperation[];
|
1823
|
+
export type AllowedValuesStringList = ConfigValueString[];
|
1783
1824
|
export interface AmazonRedshiftAdvancedOption {
|
1784
1825
|
/**
|
1785
1826
|
* The key for the additional connection option.
|
@@ -3506,6 +3547,26 @@ declare namespace Glue {
|
|
3506
3547
|
CrawlState?: CrawlState;
|
3507
3548
|
}
|
3508
3549
|
export type ConditionList = Condition[];
|
3550
|
+
export type ConfigValueString = string;
|
3551
|
+
export type ConfigurationMap = {[key: string]: ConfigurationObject};
|
3552
|
+
export interface ConfigurationObject {
|
3553
|
+
/**
|
3554
|
+
* A default value for the parameter.
|
3555
|
+
*/
|
3556
|
+
DefaultValue?: ConfigValueString;
|
3557
|
+
/**
|
3558
|
+
* A list of allowed values for the parameter.
|
3559
|
+
*/
|
3560
|
+
AllowedValues?: AllowedValuesStringList;
|
3561
|
+
/**
|
3562
|
+
* A minimum allowed value for the parameter.
|
3563
|
+
*/
|
3564
|
+
MinValue?: ConfigValueString;
|
3565
|
+
/**
|
3566
|
+
* A maximum allowed value for the parameter.
|
3567
|
+
*/
|
3568
|
+
MaxValue?: ConfigValueString;
|
3569
|
+
}
|
3509
3570
|
export interface ConfusionMatrix {
|
3510
3571
|
/**
|
3511
3572
|
* The number of matches in the data that the transform correctly found, in the confusion matrix for your transform.
|
@@ -4871,6 +4932,30 @@ declare namespace Glue {
|
|
4871
4932
|
*/
|
4872
4933
|
Name?: NameString;
|
4873
4934
|
}
|
4935
|
+
export interface CreateUsageProfileRequest {
|
4936
|
+
/**
|
4937
|
+
* The name of the usage profile.
|
4938
|
+
*/
|
4939
|
+
Name: NameString;
|
4940
|
+
/**
|
4941
|
+
* A description of the usage profile.
|
4942
|
+
*/
|
4943
|
+
Description?: DescriptionString;
|
4944
|
+
/**
|
4945
|
+
* A ProfileConfiguration object specifying the job and session values for the profile.
|
4946
|
+
*/
|
4947
|
+
Configuration: ProfileConfiguration;
|
4948
|
+
/**
|
4949
|
+
* A list of tags applied to the usage profile.
|
4950
|
+
*/
|
4951
|
+
Tags?: TagsMap;
|
4952
|
+
}
|
4953
|
+
export interface CreateUsageProfileResponse {
|
4954
|
+
/**
|
4955
|
+
* The name of the usage profile that was created.
|
4956
|
+
*/
|
4957
|
+
Name?: NameString;
|
4958
|
+
}
|
4874
4959
|
export interface CreateUserDefinedFunctionRequest {
|
4875
4960
|
/**
|
4876
4961
|
* The ID of the Data Catalog in which to create the function. If none is provided, the Amazon Web Services account ID is used by default.
|
@@ -5913,6 +5998,14 @@ declare namespace Glue {
|
|
5913
5998
|
*/
|
5914
5999
|
Name?: NameString;
|
5915
6000
|
}
|
6001
|
+
export interface DeleteUsageProfileRequest {
|
6002
|
+
/**
|
6003
|
+
* The name of the usage profile to delete.
|
6004
|
+
*/
|
6005
|
+
Name: NameString;
|
6006
|
+
}
|
6007
|
+
export interface DeleteUsageProfileResponse {
|
6008
|
+
}
|
5916
6009
|
export interface DeleteUserDefinedFunctionRequest {
|
5917
6010
|
/**
|
5918
6011
|
* The ID of the Data Catalog where the function to be deleted is located. If none is supplied, the Amazon Web Services account ID is used by default.
|
@@ -8441,6 +8534,34 @@ declare namespace Glue {
|
|
8441
8534
|
*/
|
8442
8535
|
RowFilter?: PredicateString;
|
8443
8536
|
}
|
8537
|
+
export interface GetUsageProfileRequest {
|
8538
|
+
/**
|
8539
|
+
* The name of the usage profile to retrieve.
|
8540
|
+
*/
|
8541
|
+
Name: NameString;
|
8542
|
+
}
|
8543
|
+
export interface GetUsageProfileResponse {
|
8544
|
+
/**
|
8545
|
+
* The name of the usage profile.
|
8546
|
+
*/
|
8547
|
+
Name?: NameString;
|
8548
|
+
/**
|
8549
|
+
* A description of the usage profile.
|
8550
|
+
*/
|
8551
|
+
Description?: DescriptionString;
|
8552
|
+
/**
|
8553
|
+
* A ProfileConfiguration object specifying the job and session values for the profile.
|
8554
|
+
*/
|
8555
|
+
Configuration?: ProfileConfiguration;
|
8556
|
+
/**
|
8557
|
+
* The date and time when the usage profile was created.
|
8558
|
+
*/
|
8559
|
+
CreatedOn?: TimestampValue;
|
8560
|
+
/**
|
8561
|
+
* The date and time when the usage profile was last modified.
|
8562
|
+
*/
|
8563
|
+
LastModifiedOn?: TimestampValue;
|
8564
|
+
}
|
8444
8565
|
export interface GetUserDefinedFunctionRequest {
|
8445
8566
|
/**
|
8446
8567
|
* The ID of the Data Catalog where the function to be retrieved is located. If none is provided, the Amazon Web Services account ID is used by default.
|
@@ -9019,6 +9140,10 @@ declare namespace Glue {
|
|
9019
9140
|
* This field specifies a day of the week and hour for a maintenance window for streaming jobs. Glue periodically performs maintenance activities. During these maintenance windows, Glue will need to restart your streaming jobs. Glue will restart the job within 3 hours of the specified maintenance window. For instance, if you set up the maintenance window for Monday at 10:00AM GMT, your jobs will be restarted between 10:00AM GMT to 1:00PM GMT.
|
9020
9141
|
*/
|
9021
9142
|
MaintenanceWindow?: MaintenanceWindow;
|
9143
|
+
/**
|
9144
|
+
* The name of an Glue usage profile associated with the job.
|
9145
|
+
*/
|
9146
|
+
ProfileName?: NameString;
|
9022
9147
|
}
|
9023
9148
|
export interface JobBookmarkEntry {
|
9024
9149
|
/**
|
@@ -9194,6 +9319,10 @@ declare namespace Glue {
|
|
9194
9319
|
* This field specifies a day of the week and hour for a maintenance window for streaming jobs. Glue periodically performs maintenance activities. During these maintenance windows, Glue will need to restart your streaming jobs. Glue will restart the job within 3 hours of the specified maintenance window. For instance, if you set up the maintenance window for Monday at 10:00AM GMT, your jobs will be restarted between 10:00AM GMT to 1:00PM GMT.
|
9195
9320
|
*/
|
9196
9321
|
MaintenanceWindow?: MaintenanceWindow;
|
9322
|
+
/**
|
9323
|
+
* The name of an Glue usage profile associated with the job run.
|
9324
|
+
*/
|
9325
|
+
ProfileName?: NameString;
|
9197
9326
|
}
|
9198
9327
|
export type JobRunList = JobRun[];
|
9199
9328
|
export type JobRunState = "STARTING"|"RUNNING"|"STOPPING"|"STOPPED"|"SUCCEEDED"|"FAILED"|"TIMEOUT"|"ERROR"|"WAITING"|"EXPIRED"|string;
|
@@ -10096,6 +10225,26 @@ declare namespace Glue {
|
|
10096
10225
|
*/
|
10097
10226
|
NextToken?: GenericString;
|
10098
10227
|
}
|
10228
|
+
export interface ListUsageProfilesRequest {
|
10229
|
+
/**
|
10230
|
+
* A continuation token, included if this is a continuation call.
|
10231
|
+
*/
|
10232
|
+
NextToken?: OrchestrationToken;
|
10233
|
+
/**
|
10234
|
+
* The maximum number of usage profiles to return in a single response.
|
10235
|
+
*/
|
10236
|
+
MaxResults?: OrchestrationPageSize200;
|
10237
|
+
}
|
10238
|
+
export interface ListUsageProfilesResponse {
|
10239
|
+
/**
|
10240
|
+
* A list of usage profile (UsageProfileDefinition) objects.
|
10241
|
+
*/
|
10242
|
+
Profiles?: UsageProfileDefinitionList;
|
10243
|
+
/**
|
10244
|
+
* A continuation token, present if the current list segment is not the last.
|
10245
|
+
*/
|
10246
|
+
NextToken?: OrchestrationToken;
|
10247
|
+
}
|
10099
10248
|
export interface ListWorkflowsRequest {
|
10100
10249
|
/**
|
10101
10250
|
* A continuation token, if this is a continuation request.
|
@@ -10907,6 +11056,16 @@ declare namespace Glue {
|
|
10907
11056
|
export type PrincipalPermissionsList = PrincipalPermissions[];
|
10908
11057
|
export type PrincipalType = "USER"|"ROLE"|"GROUP"|string;
|
10909
11058
|
export type Prob = number;
|
11059
|
+
export interface ProfileConfiguration {
|
11060
|
+
/**
|
11061
|
+
* A key-value map of configuration parameters for Glue sessions.
|
11062
|
+
*/
|
11063
|
+
SessionConfiguration?: ConfigurationMap;
|
11064
|
+
/**
|
11065
|
+
* A key-value map of configuration parameters for Glue jobs.
|
11066
|
+
*/
|
11067
|
+
JobConfiguration?: ConfigurationMap;
|
11068
|
+
}
|
10910
11069
|
export interface PropertyPredicate {
|
10911
11070
|
/**
|
10912
11071
|
* The key of the property.
|
@@ -12328,6 +12487,10 @@ declare namespace Glue {
|
|
12328
12487
|
* The number of minutes when idle before the session times out.
|
12329
12488
|
*/
|
12330
12489
|
IdleTimeout?: IdleTimeout;
|
12490
|
+
/**
|
12491
|
+
* The name of an Glue usage profile associated with the session.
|
12492
|
+
*/
|
12493
|
+
ProfileName?: NameString;
|
12331
12494
|
}
|
12332
12495
|
export interface SessionCommand {
|
12333
12496
|
/**
|
@@ -14426,6 +14589,26 @@ declare namespace Glue {
|
|
14426
14589
|
*/
|
14427
14590
|
Trigger?: Trigger;
|
14428
14591
|
}
|
14592
|
+
export interface UpdateUsageProfileRequest {
|
14593
|
+
/**
|
14594
|
+
* The name of the usage profile.
|
14595
|
+
*/
|
14596
|
+
Name: NameString;
|
14597
|
+
/**
|
14598
|
+
* A description of the usage profile.
|
14599
|
+
*/
|
14600
|
+
Description?: DescriptionString;
|
14601
|
+
/**
|
14602
|
+
* A ProfileConfiguration object specifying the job and session values for the profile.
|
14603
|
+
*/
|
14604
|
+
Configuration: ProfileConfiguration;
|
14605
|
+
}
|
14606
|
+
export interface UpdateUsageProfileResponse {
|
14607
|
+
/**
|
14608
|
+
* The name of the usage profile that was updated.
|
14609
|
+
*/
|
14610
|
+
Name?: NameString;
|
14611
|
+
}
|
14429
14612
|
export interface UpdateUserDefinedFunctionRequest {
|
14430
14613
|
/**
|
14431
14614
|
* The ID of the Data Catalog where the function to be updated is located. If none is provided, the Amazon Web Services account ID is used by default.
|
@@ -14500,6 +14683,25 @@ declare namespace Glue {
|
|
14500
14683
|
UpsertKeys?: EnclosedInStringPropertiesMinOne;
|
14501
14684
|
}
|
14502
14685
|
export type UriString = string;
|
14686
|
+
export interface UsageProfileDefinition {
|
14687
|
+
/**
|
14688
|
+
* The name of the usage profile.
|
14689
|
+
*/
|
14690
|
+
Name?: NameString;
|
14691
|
+
/**
|
14692
|
+
* A description of the usage profile.
|
14693
|
+
*/
|
14694
|
+
Description?: DescriptionString;
|
14695
|
+
/**
|
14696
|
+
* The date and time when the usage profile was created.
|
14697
|
+
*/
|
14698
|
+
CreatedOn?: TimestampValue;
|
14699
|
+
/**
|
14700
|
+
* The date and time when the usage profile was last modified.
|
14701
|
+
*/
|
14702
|
+
LastModifiedOn?: TimestampValue;
|
14703
|
+
}
|
14704
|
+
export type UsageProfileDefinitionList = UsageProfileDefinition[];
|
14503
14705
|
export interface UserDefinedFunction {
|
14504
14706
|
/**
|
14505
14707
|
* The name of the function.
|
@@ -1158,6 +1158,10 @@ When you do, you must also separately specify a regular, a bold, and an italic f
|
|
1158
1158
|
* Specification to use (RFC-6381 or the default RFC-4281) during m3u8 playlist generation.
|
1159
1159
|
*/
|
1160
1160
|
CodecSpecification?: CmafCodecSpecification;
|
1161
|
+
/**
|
1162
|
+
* Specify whether MediaConvert generates I-frame only video segments for DASH trick play, also known as trick mode. When specified, the I-frame only video segments are included within an additional AdaptationSet in your DASH output manifest. To generate I-frame only video segments: Enter a name as a text string, up to 256 character long. This name is appended to the end of this output group's base filename, that you specify as part of your destination URI, and used for the I-frame only video segment files. You may also include format identifiers. For more information, see: https://docs.aws.amazon.com/mediaconvert/latest/ug/using-variables-in-your-job-settings.html#using-settings-variables-with-streaming-outputs To not generate I-frame only video segments: Leave blank.
|
1163
|
+
*/
|
1164
|
+
DashIFrameTrickPlayNameModifier?: __stringMin1Max256;
|
1161
1165
|
/**
|
1162
1166
|
* Specify how MediaConvert writes SegmentTimeline in your output DASH manifest. To write a SegmentTimeline in each video Representation: Keep the default value, Basic. To write a common SegmentTimeline in the video AdaptationSet: Choose Compact. Note that MediaConvert will still write a SegmentTimeline in any Representation that does not share a common timeline. To write a video AdaptationSet for each different output framerate, and a common SegmentTimeline in each AdaptationSet: Choose Distinct.
|
1163
1167
|
*/
|
@@ -1685,6 +1689,10 @@ When you specify Version 1, you must also set ID3 metadata to Passthrough.
|
|
1685
1689
|
* A partial URI prefix that will be put in the manifest (.mpd) file at the top level BaseURL element. Can be used if streams are delivered from a different URL than the manifest file.
|
1686
1690
|
*/
|
1687
1691
|
BaseUrl?: __string;
|
1692
|
+
/**
|
1693
|
+
* Specify whether MediaConvert generates I-frame only video segments for DASH trick play, also known as trick mode. When specified, the I-frame only video segments are included within an additional AdaptationSet in your DASH output manifest. To generate I-frame only video segments: Enter a name as a text string, up to 256 character long. This name is appended to the end of this output group's base filename, that you specify as part of your destination URI, and used for the I-frame only video segment files. You may also include format identifiers. For more information, see: https://docs.aws.amazon.com/mediaconvert/latest/ug/using-variables-in-your-job-settings.html#using-settings-variables-with-streaming-outputs To not generate I-frame only video segments: Leave blank.
|
1694
|
+
*/
|
1695
|
+
DashIFrameTrickPlayNameModifier?: __stringMin1Max256;
|
1688
1696
|
/**
|
1689
1697
|
* Specify how MediaConvert writes SegmentTimeline in your output DASH manifest. To write a SegmentTimeline in each video Representation: Keep the default value, Basic. To write a common SegmentTimeline in the video AdaptationSet: Choose Compact. Note that MediaConvert will still write a SegmentTimeline in any Representation that does not share a common timeline. To write a video AdaptationSet for each different output framerate, and a common SegmentTimeline in each AdaptationSet: Choose Distinct.
|
1690
1698
|
*/
|
@@ -3425,11 +3433,11 @@ Within your job settings, all of your DVB-Sub settings must be identical.
|
|
3425
3433
|
/**
|
3426
3434
|
* Set End timecode to the end of the portion of the input you are clipping. The frame corresponding to the End timecode value is included in the clip. Start timecode or End timecode may be left blank, but not both. Use the format HH:MM:SS:FF or HH:MM:SS;FF, where HH is the hour, MM is the minute, SS is the second, and FF is the frame number. When choosing this value, take into account your setting for timecode source under input settings. For example, if you have embedded timecodes that start at 01:00:00:00 and you want your clip to end six minutes into the video, use 01:06:00:00.
|
3427
3435
|
*/
|
3428
|
-
EndTimecode?:
|
3436
|
+
EndTimecode?: __stringPattern010920405090509092090909;
|
3429
3437
|
/**
|
3430
3438
|
* Set Start timecode to the beginning of the portion of the input you are clipping. The frame corresponding to the Start timecode value is included in the clip. Start timecode or End timecode may be left blank, but not both. Use the format HH:MM:SS:FF or HH:MM:SS;FF, where HH is the hour, MM is the minute, SS is the second, and FF is the frame number. When choosing this value, take into account your setting for Input timecode source. For example, if you have embedded timecodes that start at 01:00:00:00 and you want your clip to begin five minutes into the video, use 01:05:00:00.
|
3431
3439
|
*/
|
3432
|
-
StartTimecode?:
|
3440
|
+
StartTimecode?: __stringPattern010920405090509092090909;
|
3433
3441
|
}
|
3434
3442
|
export type InputDeblockFilter = "ENABLED"|"DISABLED"|string;
|
3435
3443
|
export interface InputDecryptionSettings {
|
@@ -3548,9 +3556,27 @@ Within your job settings, all of your DVB-Sub settings must be identical.
|
|
3548
3556
|
export type InputTimecodeSource = "EMBEDDED"|"ZEROBASED"|"SPECIFIEDSTART"|string;
|
3549
3557
|
export interface InputVideoGenerator {
|
3550
3558
|
/**
|
3551
|
-
* Specify
|
3559
|
+
* Specify the number of audio channels to include in your video generator input. MediaConvert creates these audio channels as silent audio within a single audio track. Enter an integer from 1 to 32.
|
3560
|
+
*/
|
3561
|
+
Channels?: __integerMin1Max32;
|
3562
|
+
/**
|
3563
|
+
* Specify the duration, in milliseconds, for your video generator input.
|
3564
|
+
Enter an integer from 50 to 86400000.
|
3552
3565
|
*/
|
3553
3566
|
Duration?: __integerMin50Max86400000;
|
3567
|
+
/**
|
3568
|
+
* Specify the denominator of the fraction that represents the frame rate for your video generator input. When you do, you must also specify a value for Frame rate numerator. MediaConvert uses a default frame rate of 29.97 when you leave Frame rate numerator and Frame rate denominator blank.
|
3569
|
+
*/
|
3570
|
+
FramerateDenominator?: __integerMin1Max1001;
|
3571
|
+
/**
|
3572
|
+
* Specify the numerator of the fraction that represents the frame rate for your video generator input. When you do, you must also specify a value for Frame rate denominator. MediaConvert uses a default frame rate of 29.97 when you leave Frame rate numerator and Frame rate denominator blank.
|
3573
|
+
*/
|
3574
|
+
FramerateNumerator?: __integerMin1Max60000;
|
3575
|
+
/**
|
3576
|
+
* Specify the audio sample rate, in Hz, for the silent audio in your video generator input.
|
3577
|
+
Enter an integer from 32000 to 48000.
|
3578
|
+
*/
|
3579
|
+
SampleRate?: __integerMin32000Max48000;
|
3554
3580
|
}
|
3555
3581
|
export interface InsertableImage {
|
3556
3582
|
/**
|
@@ -4992,7 +5018,7 @@ When you specify Version 1, you must also set ID3 metadata to Passthrough.
|
|
4992
5018
|
/**
|
4993
5019
|
* Use Name modifier to have the service add a string to the end of each output filename. You specify the base filename as part of your destination URI. When you create multiple outputs in the same output group, Name modifier is required. Name modifier also accepts format identifiers. For DASH ISO outputs, if you use the format identifiers $Number$ or $Time$ in one output, you must use them in the same way in all outputs of the output group.
|
4994
5020
|
*/
|
4995
|
-
NameModifier?:
|
5021
|
+
NameModifier?: __stringMin1Max256;
|
4996
5022
|
/**
|
4997
5023
|
* Specific settings for this type of output.
|
4998
5024
|
*/
|
@@ -6643,6 +6669,7 @@ When you specify Version 1, you must also set ID3 metadata to Passthrough.
|
|
6643
6669
|
export type __stringMin9Max19PatternAZ26EastWestCentralNorthSouthEastWest1912 = string;
|
6644
6670
|
export type __stringPattern = string;
|
6645
6671
|
export type __stringPattern010920405090509092 = string;
|
6672
|
+
export type __stringPattern010920405090509092090909 = string;
|
6646
6673
|
export type __stringPattern01D20305D205D = string;
|
6647
6674
|
export type __stringPattern0940191020191209301 = string;
|
6648
6675
|
export type __stringPattern09aFAF809aFAF409aFAF409aFAF409aFAF12 = string;
|
@@ -28,11 +28,11 @@ declare class SecretsManager extends Service {
|
|
28
28
|
*/
|
29
29
|
cancelRotateSecret(callback?: (err: AWSError, data: SecretsManager.Types.CancelRotateSecretResponse) => void): Request<SecretsManager.Types.CancelRotateSecretResponse, AWSError>;
|
30
30
|
/**
|
31
|
-
* Creates a new secret. A secret can be a password, a set of credentials such as a user name and password, an OAuth token, or other secret information that you store in an encrypted form in Secrets Manager. The secret also includes the connection information to access a database or other service, which Secrets Manager doesn't encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information needed to manage the secret. For secrets that use managed rotation, you need to create the secret through the managing service. For more information, see Secrets Manager secrets managed by other Amazon Web Services services. For information about creating a secret in the console, see Create a secret. To create a secret, you can provide the secret value to be encrypted in either the SecretString parameter or the SecretBinary parameter, but not both. If you include SecretString or SecretBinary then Secrets Manager creates an initial secret version and automatically attaches the staging label AWSCURRENT to it. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the JSON you store in the SecretString matches the JSON structure of a database secret. If you don't specify an KMS encryption key, Secrets Manager uses the Amazon Web Services managed key aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant delay in returning the result. If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed KMS key. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:CreateSecret. If you include tags in the secret, you also need secretsmanager:TagResource. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. To encrypt the secret with a KMS key other than aws/secretsmanager, you need kms:GenerateDataKey and kms:Decrypt permission to the key.
|
31
|
+
* Creates a new secret. A secret can be a password, a set of credentials such as a user name and password, an OAuth token, or other secret information that you store in an encrypted form in Secrets Manager. The secret also includes the connection information to access a database or other service, which Secrets Manager doesn't encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information needed to manage the secret. For secrets that use managed rotation, you need to create the secret through the managing service. For more information, see Secrets Manager secrets managed by other Amazon Web Services services. For information about creating a secret in the console, see Create a secret. To create a secret, you can provide the secret value to be encrypted in either the SecretString parameter or the SecretBinary parameter, but not both. If you include SecretString or SecretBinary then Secrets Manager creates an initial secret version and automatically attaches the staging label AWSCURRENT to it. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the JSON you store in the SecretString matches the JSON structure of a database secret. If you don't specify an KMS encryption key, Secrets Manager uses the Amazon Web Services managed key aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant delay in returning the result. If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed KMS key. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:CreateSecret. If you include tags in the secret, you also need secretsmanager:TagResource. To add replica Regions, you must also have secretsmanager:ReplicateSecretToRegions. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. To encrypt the secret with a KMS key other than aws/secretsmanager, you need kms:GenerateDataKey and kms:Decrypt permission to the key.
|
32
32
|
*/
|
33
33
|
createSecret(params: SecretsManager.Types.CreateSecretRequest, callback?: (err: AWSError, data: SecretsManager.Types.CreateSecretResponse) => void): Request<SecretsManager.Types.CreateSecretResponse, AWSError>;
|
34
34
|
/**
|
35
|
-
* Creates a new secret. A secret can be a password, a set of credentials such as a user name and password, an OAuth token, or other secret information that you store in an encrypted form in Secrets Manager. The secret also includes the connection information to access a database or other service, which Secrets Manager doesn't encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information needed to manage the secret. For secrets that use managed rotation, you need to create the secret through the managing service. For more information, see Secrets Manager secrets managed by other Amazon Web Services services. For information about creating a secret in the console, see Create a secret. To create a secret, you can provide the secret value to be encrypted in either the SecretString parameter or the SecretBinary parameter, but not both. If you include SecretString or SecretBinary then Secrets Manager creates an initial secret version and automatically attaches the staging label AWSCURRENT to it. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the JSON you store in the SecretString matches the JSON structure of a database secret. If you don't specify an KMS encryption key, Secrets Manager uses the Amazon Web Services managed key aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant delay in returning the result. If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed KMS key. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:CreateSecret. If you include tags in the secret, you also need secretsmanager:TagResource. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. To encrypt the secret with a KMS key other than aws/secretsmanager, you need kms:GenerateDataKey and kms:Decrypt permission to the key.
|
35
|
+
* Creates a new secret. A secret can be a password, a set of credentials such as a user name and password, an OAuth token, or other secret information that you store in an encrypted form in Secrets Manager. The secret also includes the connection information to access a database or other service, which Secrets Manager doesn't encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information needed to manage the secret. For secrets that use managed rotation, you need to create the secret through the managing service. For more information, see Secrets Manager secrets managed by other Amazon Web Services services. For information about creating a secret in the console, see Create a secret. To create a secret, you can provide the secret value to be encrypted in either the SecretString parameter or the SecretBinary parameter, but not both. If you include SecretString or SecretBinary then Secrets Manager creates an initial secret version and automatically attaches the staging label AWSCURRENT to it. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the JSON you store in the SecretString matches the JSON structure of a database secret. If you don't specify an KMS encryption key, Secrets Manager uses the Amazon Web Services managed key aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant delay in returning the result. If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed KMS key. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:CreateSecret. If you include tags in the secret, you also need secretsmanager:TagResource. To add replica Regions, you must also have secretsmanager:ReplicateSecretToRegions. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. To encrypt the secret with a KMS key other than aws/secretsmanager, you need kms:GenerateDataKey and kms:Decrypt permission to the key.
|
36
36
|
*/
|
37
37
|
createSecret(callback?: (err: AWSError, data: SecretsManager.Types.CreateSecretResponse) => void): Request<SecretsManager.Types.CreateSecretResponse, AWSError>;
|
38
38
|
/**
|