aws-sdk 2.1642.0 → 2.1644.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -1
- package/apis/acm-pca-2017-08-22.min.json +4 -1
- package/apis/batch-2016-08-10.min.json +4 -1
- package/apis/bedrock-runtime-2023-09-30.min.json +248 -28
- package/apis/cloudtrail-2013-11-01.min.json +4 -1
- package/apis/codebuild-2016-10-06.min.json +50 -29
- package/apis/cognito-idp-2016-04-18.min.json +108 -27
- package/apis/config-2014-11-12.min.json +7 -1
- package/apis/ds-2015-04-16.min.json +7 -1
- package/apis/eks-2017-11-01.min.json +63 -42
- package/apis/elasticfilesystem-2015-02-01.min.json +7 -1
- package/apis/glue-2017-03-31.min.json +294 -142
- package/apis/glue-2017-03-31.paginators.json +6 -0
- package/apis/kms-2014-11-01.examples.json +4 -2
- package/apis/lightsail-2016-11-28.min.json +4 -1
- package/apis/mediaconvert-2017-08-29.min.json +155 -130
- package/apis/polly-2016-06-10.min.json +7 -1
- package/apis/rekognition-2016-06-27.min.json +7 -1
- package/apis/sagemaker-2017-07-24.min.json +1188 -945
- package/apis/sagemaker-2017-07-24.paginators.json +6 -0
- package/apis/shield-2016-06-02.min.json +7 -1
- package/apis/snowball-2016-06-30.min.json +7 -1
- package/apis/waf-2015-08-24.min.json +7 -1
- package/clients/acmpca.d.ts +2 -2
- package/clients/bedrockruntime.d.ts +264 -14
- package/clients/codebuild.d.ts +24 -1
- package/clients/eks.d.ts +26 -0
- package/clients/glue.d.ts +206 -4
- package/clients/mediaconvert.d.ts +31 -4
- package/clients/sagemaker.d.ts +364 -4
- package/clients/secretsmanager.d.ts +2 -2
- package/dist/aws-sdk-core-react-native.js +1 -1
- package/dist/aws-sdk-react-native.js +22 -22
- package/dist/aws-sdk.js +200 -65
- package/dist/aws-sdk.min.js +93 -93
- package/lib/core.js +1 -1
- package/package.json +1 -1
@@ -216,6 +216,12 @@
|
|
216
216
|
"limit_key": "MaxResults",
|
217
217
|
"result_key": "LineageGroupSummaries"
|
218
218
|
},
|
219
|
+
"ListMlflowTrackingServers": {
|
220
|
+
"input_token": "NextToken",
|
221
|
+
"output_token": "NextToken",
|
222
|
+
"limit_key": "MaxResults",
|
223
|
+
"result_key": "TrackingServerSummaries"
|
224
|
+
},
|
219
225
|
"ListModelBiasJobDefinitions": {
|
220
226
|
"input_token": "NextToken",
|
221
227
|
"output_token": "NextToken",
|
@@ -5,12 +5,18 @@
|
|
5
5
|
"endpointPrefix": "shield",
|
6
6
|
"jsonVersion": "1.1",
|
7
7
|
"protocol": "json",
|
8
|
+
"protocols": [
|
9
|
+
"json"
|
10
|
+
],
|
8
11
|
"serviceAbbreviation": "AWS Shield",
|
9
12
|
"serviceFullName": "AWS Shield",
|
10
13
|
"serviceId": "Shield",
|
11
14
|
"signatureVersion": "v4",
|
12
15
|
"targetPrefix": "AWSShield_20160616",
|
13
|
-
"uid": "shield-2016-06-02"
|
16
|
+
"uid": "shield-2016-06-02",
|
17
|
+
"auth": [
|
18
|
+
"aws.auth#sigv4"
|
19
|
+
]
|
14
20
|
},
|
15
21
|
"operations": {
|
16
22
|
"AssociateDRTLogBucket": {
|
@@ -5,12 +5,18 @@
|
|
5
5
|
"endpointPrefix": "snowball",
|
6
6
|
"jsonVersion": "1.1",
|
7
7
|
"protocol": "json",
|
8
|
+
"protocols": [
|
9
|
+
"json"
|
10
|
+
],
|
8
11
|
"serviceAbbreviation": "Amazon Snowball",
|
9
12
|
"serviceFullName": "Amazon Import/Export Snowball",
|
10
13
|
"serviceId": "Snowball",
|
11
14
|
"signatureVersion": "v4",
|
12
15
|
"targetPrefix": "AWSIESnowballJobManagementService",
|
13
|
-
"uid": "snowball-2016-06-30"
|
16
|
+
"uid": "snowball-2016-06-30",
|
17
|
+
"auth": [
|
18
|
+
"aws.auth#sigv4"
|
19
|
+
]
|
14
20
|
},
|
15
21
|
"operations": {
|
16
22
|
"CancelCluster": {
|
@@ -5,12 +5,18 @@
|
|
5
5
|
"endpointPrefix": "waf",
|
6
6
|
"jsonVersion": "1.1",
|
7
7
|
"protocol": "json",
|
8
|
+
"protocols": [
|
9
|
+
"json"
|
10
|
+
],
|
8
11
|
"serviceAbbreviation": "WAF",
|
9
12
|
"serviceFullName": "AWS WAF",
|
10
13
|
"serviceId": "WAF",
|
11
14
|
"signatureVersion": "v4",
|
12
15
|
"targetPrefix": "AWSWAF_20150824",
|
13
|
-
"uid": "waf-2015-08-24"
|
16
|
+
"uid": "waf-2015-08-24",
|
17
|
+
"auth": [
|
18
|
+
"aws.auth#sigv4"
|
19
|
+
]
|
14
20
|
},
|
15
21
|
"operations": {
|
16
22
|
"CreateByteMatchSet": {
|
package/clients/acmpca.d.ts
CHANGED
@@ -109,11 +109,11 @@ declare class ACMPCA extends Service {
|
|
109
109
|
*/
|
110
110
|
getPolicy(callback?: (err: AWSError, data: ACMPCA.Types.GetPolicyResponse) => void): Request<ACMPCA.Types.GetPolicyResponse, AWSError>;
|
111
111
|
/**
|
112
|
-
* Imports a signed private CA certificate into Amazon Web Services Private CA. This action is used when you are using a chain of trust whose root is located outside Amazon Web Services Private CA. Before you can call this action, the following preparations must in place: In Amazon Web Services Private CA, call the CreateCertificateAuthority action to create the private CA that you plan to back with the imported certificate. Call the GetCertificateAuthorityCsr action to generate a certificate signing request (CSR). Sign the CSR using a root or intermediate CA hosted by either an on-premises PKI hierarchy or by a commercial CA. Create a certificate chain and copy the signed certificate and the certificate chain to your working directory. Amazon Web Services Private CA supports three scenarios for installing a CA certificate: Installing a certificate for a root CA hosted by Amazon Web Services Private CA. Installing a subordinate CA certificate whose parent authority is hosted by Amazon Web Services Private CA. Installing a subordinate CA certificate whose parent authority is externally hosted. The following additional requirements apply when you import a CA certificate. Only a self-signed certificate can be imported as a root CA. A self-signed certificate cannot be imported as a subordinate CA. Your certificate chain must not include the private CA certificate that you are importing. Your root CA must be the last certificate in your chain. The subordinate certificate, if any, that your root CA signed must be next to last. The subordinate certificate signed by the preceding subordinate CA must come next, and so on until your chain is built. The chain must be PEM-encoded. The maximum allowed size of a certificate is 32 KB. The maximum allowed size of a certificate chain is 2 MB. Enforcement of Critical Constraints Amazon Web Services Private CA allows the following extensions to be marked critical in the imported CA certificate or chain. Basic constraints (must be marked critical)
|
112
|
+
* Imports a signed private CA certificate into Amazon Web Services Private CA. This action is used when you are using a chain of trust whose root is located outside Amazon Web Services Private CA. Before you can call this action, the following preparations must in place: In Amazon Web Services Private CA, call the CreateCertificateAuthority action to create the private CA that you plan to back with the imported certificate. Call the GetCertificateAuthorityCsr action to generate a certificate signing request (CSR). Sign the CSR using a root or intermediate CA hosted by either an on-premises PKI hierarchy or by a commercial CA. Create a certificate chain and copy the signed certificate and the certificate chain to your working directory. Amazon Web Services Private CA supports three scenarios for installing a CA certificate: Installing a certificate for a root CA hosted by Amazon Web Services Private CA. Installing a subordinate CA certificate whose parent authority is hosted by Amazon Web Services Private CA. Installing a subordinate CA certificate whose parent authority is externally hosted. The following additional requirements apply when you import a CA certificate. Only a self-signed certificate can be imported as a root CA. A self-signed certificate cannot be imported as a subordinate CA. Your certificate chain must not include the private CA certificate that you are importing. Your root CA must be the last certificate in your chain. The subordinate certificate, if any, that your root CA signed must be next to last. The subordinate certificate signed by the preceding subordinate CA must come next, and so on until your chain is built. The chain must be PEM-encoded. The maximum allowed size of a certificate is 32 KB. The maximum allowed size of a certificate chain is 2 MB. Enforcement of Critical Constraints Amazon Web Services Private CA allows the following extensions to be marked critical in the imported CA certificate or chain. Authority key identifier Basic constraints (must be marked critical) Certificate policies Extended key usage Inhibit anyPolicy Issuer alternative name Key usage Name constraints Policy mappings Subject alternative name Subject directory attributes Subject key identifier Subject information access Amazon Web Services Private CA rejects the following extensions when they are marked critical in an imported CA certificate or chain. Authority information access CRL distribution points Freshest CRL Policy constraints Amazon Web Services Private Certificate Authority will also reject any other extension marked as critical not contained on the preceding list of allowed extensions.
|
113
113
|
*/
|
114
114
|
importCertificateAuthorityCertificate(params: ACMPCA.Types.ImportCertificateAuthorityCertificateRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
115
115
|
/**
|
116
|
-
* Imports a signed private CA certificate into Amazon Web Services Private CA. This action is used when you are using a chain of trust whose root is located outside Amazon Web Services Private CA. Before you can call this action, the following preparations must in place: In Amazon Web Services Private CA, call the CreateCertificateAuthority action to create the private CA that you plan to back with the imported certificate. Call the GetCertificateAuthorityCsr action to generate a certificate signing request (CSR). Sign the CSR using a root or intermediate CA hosted by either an on-premises PKI hierarchy or by a commercial CA. Create a certificate chain and copy the signed certificate and the certificate chain to your working directory. Amazon Web Services Private CA supports three scenarios for installing a CA certificate: Installing a certificate for a root CA hosted by Amazon Web Services Private CA. Installing a subordinate CA certificate whose parent authority is hosted by Amazon Web Services Private CA. Installing a subordinate CA certificate whose parent authority is externally hosted. The following additional requirements apply when you import a CA certificate. Only a self-signed certificate can be imported as a root CA. A self-signed certificate cannot be imported as a subordinate CA. Your certificate chain must not include the private CA certificate that you are importing. Your root CA must be the last certificate in your chain. The subordinate certificate, if any, that your root CA signed must be next to last. The subordinate certificate signed by the preceding subordinate CA must come next, and so on until your chain is built. The chain must be PEM-encoded. The maximum allowed size of a certificate is 32 KB. The maximum allowed size of a certificate chain is 2 MB. Enforcement of Critical Constraints Amazon Web Services Private CA allows the following extensions to be marked critical in the imported CA certificate or chain. Basic constraints (must be marked critical)
|
116
|
+
* Imports a signed private CA certificate into Amazon Web Services Private CA. This action is used when you are using a chain of trust whose root is located outside Amazon Web Services Private CA. Before you can call this action, the following preparations must in place: In Amazon Web Services Private CA, call the CreateCertificateAuthority action to create the private CA that you plan to back with the imported certificate. Call the GetCertificateAuthorityCsr action to generate a certificate signing request (CSR). Sign the CSR using a root or intermediate CA hosted by either an on-premises PKI hierarchy or by a commercial CA. Create a certificate chain and copy the signed certificate and the certificate chain to your working directory. Amazon Web Services Private CA supports three scenarios for installing a CA certificate: Installing a certificate for a root CA hosted by Amazon Web Services Private CA. Installing a subordinate CA certificate whose parent authority is hosted by Amazon Web Services Private CA. Installing a subordinate CA certificate whose parent authority is externally hosted. The following additional requirements apply when you import a CA certificate. Only a self-signed certificate can be imported as a root CA. A self-signed certificate cannot be imported as a subordinate CA. Your certificate chain must not include the private CA certificate that you are importing. Your root CA must be the last certificate in your chain. The subordinate certificate, if any, that your root CA signed must be next to last. The subordinate certificate signed by the preceding subordinate CA must come next, and so on until your chain is built. The chain must be PEM-encoded. The maximum allowed size of a certificate is 32 KB. The maximum allowed size of a certificate chain is 2 MB. Enforcement of Critical Constraints Amazon Web Services Private CA allows the following extensions to be marked critical in the imported CA certificate or chain. Authority key identifier Basic constraints (must be marked critical) Certificate policies Extended key usage Inhibit anyPolicy Issuer alternative name Key usage Name constraints Policy mappings Subject alternative name Subject directory attributes Subject key identifier Subject information access Amazon Web Services Private CA rejects the following extensions when they are marked critical in an imported CA certificate or chain. Authority information access CRL distribution points Freshest CRL Policy constraints Amazon Web Services Private Certificate Authority will also reject any other extension marked as critical not contained on the preceding list of allowed extensions.
|
117
117
|
*/
|
118
118
|
importCertificateAuthorityCertificate(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
119
119
|
/**
|
@@ -13,19 +13,19 @@ declare class BedrockRuntime extends Service {
|
|
13
13
|
constructor(options?: BedrockRuntime.Types.ClientConfiguration)
|
14
14
|
config: Config & BedrockRuntime.Types.ClientConfiguration;
|
15
15
|
/**
|
16
|
-
* Sends messages to the specified Amazon Bedrock model. Converse provides a consistent interface that works with all models that support messages. This allows you to write code once and use it with different models. Should a model have unique inference parameters, you can also pass those unique parameters to the model. For
|
16
|
+
* Sends messages to the specified Amazon Bedrock model. Converse provides a consistent interface that works with all models that support messages. This allows you to write code once and use it with different models. Should a model have unique inference parameters, you can also pass those unique parameters to the model. For information about the Converse API, see Use the Converse API in the Amazon Bedrock User Guide. To use a guardrail, see Use a guardrail with the Converse API in the Amazon Bedrock User Guide. To use a tool with a model, see Tool use (Function calling) in the Amazon Bedrock User Guide For example code, see Converse API examples in the Amazon Bedrock User Guide. This operation requires permission for the bedrock:InvokeModel action.
|
17
17
|
*/
|
18
18
|
converse(params: BedrockRuntime.Types.ConverseRequest, callback?: (err: AWSError, data: BedrockRuntime.Types.ConverseResponse) => void): Request<BedrockRuntime.Types.ConverseResponse, AWSError>;
|
19
19
|
/**
|
20
|
-
* Sends messages to the specified Amazon Bedrock model. Converse provides a consistent interface that works with all models that support messages. This allows you to write code once and use it with different models. Should a model have unique inference parameters, you can also pass those unique parameters to the model. For
|
20
|
+
* Sends messages to the specified Amazon Bedrock model. Converse provides a consistent interface that works with all models that support messages. This allows you to write code once and use it with different models. Should a model have unique inference parameters, you can also pass those unique parameters to the model. For information about the Converse API, see Use the Converse API in the Amazon Bedrock User Guide. To use a guardrail, see Use a guardrail with the Converse API in the Amazon Bedrock User Guide. To use a tool with a model, see Tool use (Function calling) in the Amazon Bedrock User Guide For example code, see Converse API examples in the Amazon Bedrock User Guide. This operation requires permission for the bedrock:InvokeModel action.
|
21
21
|
*/
|
22
22
|
converse(callback?: (err: AWSError, data: BedrockRuntime.Types.ConverseResponse) => void): Request<BedrockRuntime.Types.ConverseResponse, AWSError>;
|
23
23
|
/**
|
24
|
-
* Sends messages to the specified Amazon Bedrock model and returns the response in a stream. ConverseStream provides a consistent API that works with all Amazon Bedrock models that support messages. This allows you to write code once and use it with different models. Should a model have unique inference parameters, you can also pass those unique parameters to the model. For
|
24
|
+
* Sends messages to the specified Amazon Bedrock model and returns the response in a stream. ConverseStream provides a consistent API that works with all Amazon Bedrock models that support messages. This allows you to write code once and use it with different models. Should a model have unique inference parameters, you can also pass those unique parameters to the model. To find out if a model supports streaming, call GetFoundationModel and check the responseStreamingSupported field in the response. For information about the Converse API, see Use the Converse API in the Amazon Bedrock User Guide. To use a guardrail, see Use a guardrail with the Converse API in the Amazon Bedrock User Guide. To use a tool with a model, see Tool use (Function calling) in the Amazon Bedrock User Guide For example code, see Conversation streaming example in the Amazon Bedrock User Guide. This operation requires permission for the bedrock:InvokeModelWithResponseStream action.
|
25
25
|
*/
|
26
26
|
converseStream(params: BedrockRuntime.Types.ConverseStreamRequest, callback?: (err: AWSError, data: BedrockRuntime.Types.ConverseStreamResponse) => void): Request<BedrockRuntime.Types.ConverseStreamResponse, AWSError>;
|
27
27
|
/**
|
28
|
-
* Sends messages to the specified Amazon Bedrock model and returns the response in a stream. ConverseStream provides a consistent API that works with all Amazon Bedrock models that support messages. This allows you to write code once and use it with different models. Should a model have unique inference parameters, you can also pass those unique parameters to the model. For
|
28
|
+
* Sends messages to the specified Amazon Bedrock model and returns the response in a stream. ConverseStream provides a consistent API that works with all Amazon Bedrock models that support messages. This allows you to write code once and use it with different models. Should a model have unique inference parameters, you can also pass those unique parameters to the model. To find out if a model supports streaming, call GetFoundationModel and check the responseStreamingSupported field in the response. For information about the Converse API, see Use the Converse API in the Amazon Bedrock User Guide. To use a guardrail, see Use a guardrail with the Converse API in the Amazon Bedrock User Guide. To use a tool with a model, see Tool use (Function calling) in the Amazon Bedrock User Guide For example code, see Conversation streaming example in the Amazon Bedrock User Guide. This operation requires permission for the bedrock:InvokeModelWithResponseStream action.
|
29
29
|
*/
|
30
30
|
converseStream(callback?: (err: AWSError, data: BedrockRuntime.Types.ConverseStreamResponse) => void): Request<BedrockRuntime.Types.ConverseStreamResponse, AWSError>;
|
31
31
|
/**
|
@@ -68,6 +68,10 @@ declare namespace BedrockRuntime {
|
|
68
68
|
* The result for a tool request that a model makes.
|
69
69
|
*/
|
70
70
|
toolResult?: ToolResultBlock;
|
71
|
+
/**
|
72
|
+
* Contains the content to assess with the guardrail. If you don't specify guardContent in a call to the Converse API, the guardrail (if passed in the Converse API) assesses the entire message. For more information, see Use a guardrail with the Converse API in the Amazon Bedrock User Guide. </p>
|
73
|
+
*/
|
74
|
+
guardContent?: GuardrailConverseContentBlock;
|
71
75
|
}
|
72
76
|
export interface ContentBlockDelta {
|
73
77
|
/**
|
@@ -147,12 +151,16 @@ declare namespace BedrockRuntime {
|
|
147
151
|
* Configuration information for the tools that the model can use when generating a response. This field is only supported by Anthropic Claude 3, Cohere Command R, Cohere Command R+, and Mistral Large models.
|
148
152
|
*/
|
149
153
|
toolConfig?: ToolConfiguration;
|
154
|
+
/**
|
155
|
+
* Configuration information for a guardrail that you want to use in the request.
|
156
|
+
*/
|
157
|
+
guardrailConfig?: GuardrailConfiguration;
|
150
158
|
/**
|
151
159
|
* Additional inference parameters that the model supports, beyond the base set of inference parameters that Converse supports in the inferenceConfig field. For more information, see Model parameters.
|
152
160
|
*/
|
153
161
|
additionalModelRequestFields?: Document;
|
154
162
|
/**
|
155
|
-
* Additional model parameters field paths to return in the response. Converse returns the requested fields as a JSON Pointer object in the
|
163
|
+
* Additional model parameters field paths to return in the response. Converse returns the requested fields as a JSON Pointer object in the additionalModelResponseFields field. The following is example JSON for additionalModelResponseFieldPaths. [ "/stop_sequence" ] For information about the JSON Pointer syntax, see the Internet Engineering Task Force (IETF) documentation. Converse rejects an empty JSON Pointer or incorrectly structured JSON Pointer with a 400 error code. if the JSON Pointer is valid, but the requested field is not in the model response, it is ignored by Converse.
|
156
164
|
*/
|
157
165
|
additionalModelResponseFieldPaths?: ConverseRequestAdditionalModelResponseFieldPathsList;
|
158
166
|
}
|
@@ -179,6 +187,10 @@ declare namespace BedrockRuntime {
|
|
179
187
|
* Additional fields in the response that are unique to the model.
|
180
188
|
*/
|
181
189
|
additionalModelResponseFields?: Document;
|
190
|
+
/**
|
191
|
+
* A trace object that contains information about the Guardrail behavior.
|
192
|
+
*/
|
193
|
+
trace?: ConverseTrace;
|
182
194
|
}
|
183
195
|
export interface ConverseStreamMetadataEvent {
|
184
196
|
/**
|
@@ -189,6 +201,10 @@ declare namespace BedrockRuntime {
|
|
189
201
|
* The metrics for the conversation stream metadata event.
|
190
202
|
*/
|
191
203
|
metrics: ConverseStreamMetrics;
|
204
|
+
/**
|
205
|
+
* The trace object in the response from ConverseStream that contains information about the guardrail behavior.
|
206
|
+
*/
|
207
|
+
trace?: ConverseStreamTrace;
|
192
208
|
}
|
193
209
|
export interface ConverseStreamMetrics {
|
194
210
|
/**
|
@@ -218,12 +234,16 @@ declare namespace BedrockRuntime {
|
|
218
234
|
* Configuration information for the tools that the model can use when generating a response. This field is only supported by Anthropic Claude 3 models.
|
219
235
|
*/
|
220
236
|
toolConfig?: ToolConfiguration;
|
237
|
+
/**
|
238
|
+
* Configuration information for a guardrail that you want to use in the request.
|
239
|
+
*/
|
240
|
+
guardrailConfig?: GuardrailStreamConfiguration;
|
221
241
|
/**
|
222
242
|
* Additional inference parameters that the model supports, beyond the base set of inference parameters that ConverseStream supports in the inferenceConfig field.
|
223
243
|
*/
|
224
244
|
additionalModelRequestFields?: Document;
|
225
245
|
/**
|
226
|
-
* Additional model parameters field paths to return in the response. ConverseStream returns the requested fields as a JSON Pointer object in the
|
246
|
+
* Additional model parameters field paths to return in the response. ConverseStream returns the requested fields as a JSON Pointer object in the additionalModelResponseFields field. The following is example JSON for additionalModelResponseFieldPaths. [ "/stop_sequence" ] For information about the JSON Pointer syntax, see the Internet Engineering Task Force (IETF) documentation. ConverseStream rejects an empty JSON Pointer or incorrectly structured JSON Pointer with a 400 error code. if the JSON Pointer is valid, but the requested field is not in the model response, it is ignored by ConverseStream.
|
227
247
|
*/
|
228
248
|
additionalModelResponseFieldPaths?: ConverseStreamRequestAdditionalModelResponseFieldPathsList;
|
229
249
|
}
|
@@ -235,10 +255,235 @@ declare namespace BedrockRuntime {
|
|
235
255
|
*/
|
236
256
|
stream?: ConverseStreamOutput;
|
237
257
|
}
|
258
|
+
export interface ConverseStreamTrace {
|
259
|
+
/**
|
260
|
+
* The guardrail trace object.
|
261
|
+
*/
|
262
|
+
guardrail?: GuardrailTraceAssessment;
|
263
|
+
}
|
264
|
+
export interface ConverseTrace {
|
265
|
+
/**
|
266
|
+
* The guardrail trace object.
|
267
|
+
*/
|
268
|
+
guardrail?: GuardrailTraceAssessment;
|
269
|
+
}
|
238
270
|
export interface Document {
|
239
271
|
}
|
272
|
+
export interface GuardrailAssessment {
|
273
|
+
/**
|
274
|
+
* The topic policy.
|
275
|
+
*/
|
276
|
+
topicPolicy?: GuardrailTopicPolicyAssessment;
|
277
|
+
/**
|
278
|
+
* The content policy.
|
279
|
+
*/
|
280
|
+
contentPolicy?: GuardrailContentPolicyAssessment;
|
281
|
+
/**
|
282
|
+
* The word policy.
|
283
|
+
*/
|
284
|
+
wordPolicy?: GuardrailWordPolicyAssessment;
|
285
|
+
/**
|
286
|
+
* The sensitive information policy.
|
287
|
+
*/
|
288
|
+
sensitiveInformationPolicy?: GuardrailSensitiveInformationPolicyAssessment;
|
289
|
+
}
|
290
|
+
export type GuardrailAssessmentList = GuardrailAssessment[];
|
291
|
+
export type GuardrailAssessmentListMap = {[key: string]: GuardrailAssessmentList};
|
292
|
+
export type GuardrailAssessmentMap = {[key: string]: GuardrailAssessment};
|
293
|
+
export interface GuardrailConfiguration {
|
294
|
+
/**
|
295
|
+
* The identifier for the guardrail.
|
296
|
+
*/
|
297
|
+
guardrailIdentifier: GuardrailIdentifier;
|
298
|
+
/**
|
299
|
+
* The version of the guardrail.
|
300
|
+
*/
|
301
|
+
guardrailVersion: GuardrailVersion;
|
302
|
+
/**
|
303
|
+
* The trace behavior for the guardrail.
|
304
|
+
*/
|
305
|
+
trace?: GuardrailTrace;
|
306
|
+
}
|
307
|
+
export interface GuardrailContentFilter {
|
308
|
+
/**
|
309
|
+
* The guardrail type.
|
310
|
+
*/
|
311
|
+
type: GuardrailContentFilterType;
|
312
|
+
/**
|
313
|
+
* The guardrail confidence.
|
314
|
+
*/
|
315
|
+
confidence: GuardrailContentFilterConfidence;
|
316
|
+
/**
|
317
|
+
* The guardrail action.
|
318
|
+
*/
|
319
|
+
action: GuardrailContentPolicyAction;
|
320
|
+
}
|
321
|
+
export type GuardrailContentFilterConfidence = "NONE"|"LOW"|"MEDIUM"|"HIGH"|string;
|
322
|
+
export type GuardrailContentFilterList = GuardrailContentFilter[];
|
323
|
+
export type GuardrailContentFilterType = "INSULTS"|"HATE"|"SEXUAL"|"VIOLENCE"|"MISCONDUCT"|"PROMPT_ATTACK"|string;
|
324
|
+
export type GuardrailContentPolicyAction = "BLOCKED"|string;
|
325
|
+
export interface GuardrailContentPolicyAssessment {
|
326
|
+
/**
|
327
|
+
* The content policy filters.
|
328
|
+
*/
|
329
|
+
filters: GuardrailContentFilterList;
|
330
|
+
}
|
331
|
+
export interface GuardrailConverseContentBlock {
|
332
|
+
/**
|
333
|
+
* The text to guard.
|
334
|
+
*/
|
335
|
+
text?: GuardrailConverseTextBlock;
|
336
|
+
}
|
337
|
+
export interface GuardrailConverseTextBlock {
|
338
|
+
/**
|
339
|
+
* The text that you want to guard.
|
340
|
+
*/
|
341
|
+
text: String;
|
342
|
+
}
|
343
|
+
export interface GuardrailCustomWord {
|
344
|
+
/**
|
345
|
+
* The match for the custom word.
|
346
|
+
*/
|
347
|
+
match: String;
|
348
|
+
/**
|
349
|
+
* The action for the custom word.
|
350
|
+
*/
|
351
|
+
action: GuardrailWordPolicyAction;
|
352
|
+
}
|
353
|
+
export type GuardrailCustomWordList = GuardrailCustomWord[];
|
240
354
|
export type GuardrailIdentifier = string;
|
355
|
+
export interface GuardrailManagedWord {
|
356
|
+
/**
|
357
|
+
* The match for the managed word.
|
358
|
+
*/
|
359
|
+
match: String;
|
360
|
+
/**
|
361
|
+
* The type for the managed word.
|
362
|
+
*/
|
363
|
+
type: GuardrailManagedWordType;
|
364
|
+
/**
|
365
|
+
* The action for the managed word.
|
366
|
+
*/
|
367
|
+
action: GuardrailWordPolicyAction;
|
368
|
+
}
|
369
|
+
export type GuardrailManagedWordList = GuardrailManagedWord[];
|
370
|
+
export type GuardrailManagedWordType = "PROFANITY"|string;
|
371
|
+
export type GuardrailOutputText = string;
|
372
|
+
export interface GuardrailPiiEntityFilter {
|
373
|
+
/**
|
374
|
+
* The PII entity filter match.
|
375
|
+
*/
|
376
|
+
match: String;
|
377
|
+
/**
|
378
|
+
* The PII entity filter type.
|
379
|
+
*/
|
380
|
+
type: GuardrailPiiEntityType;
|
381
|
+
/**
|
382
|
+
* The PII entity filter action.
|
383
|
+
*/
|
384
|
+
action: GuardrailSensitiveInformationPolicyAction;
|
385
|
+
}
|
386
|
+
export type GuardrailPiiEntityFilterList = GuardrailPiiEntityFilter[];
|
387
|
+
export type GuardrailPiiEntityType = "ADDRESS"|"AGE"|"AWS_ACCESS_KEY"|"AWS_SECRET_KEY"|"CA_HEALTH_NUMBER"|"CA_SOCIAL_INSURANCE_NUMBER"|"CREDIT_DEBIT_CARD_CVV"|"CREDIT_DEBIT_CARD_EXPIRY"|"CREDIT_DEBIT_CARD_NUMBER"|"DRIVER_ID"|"EMAIL"|"INTERNATIONAL_BANK_ACCOUNT_NUMBER"|"IP_ADDRESS"|"LICENSE_PLATE"|"MAC_ADDRESS"|"NAME"|"PASSWORD"|"PHONE"|"PIN"|"SWIFT_CODE"|"UK_NATIONAL_HEALTH_SERVICE_NUMBER"|"UK_NATIONAL_INSURANCE_NUMBER"|"UK_UNIQUE_TAXPAYER_REFERENCE_NUMBER"|"URL"|"USERNAME"|"US_BANK_ACCOUNT_NUMBER"|"US_BANK_ROUTING_NUMBER"|"US_INDIVIDUAL_TAX_IDENTIFICATION_NUMBER"|"US_PASSPORT_NUMBER"|"US_SOCIAL_SECURITY_NUMBER"|"VEHICLE_IDENTIFICATION_NUMBER"|string;
|
388
|
+
export interface GuardrailRegexFilter {
|
389
|
+
/**
|
390
|
+
* The regex filter name.
|
391
|
+
*/
|
392
|
+
name?: String;
|
393
|
+
/**
|
394
|
+
* The regesx filter match.
|
395
|
+
*/
|
396
|
+
match?: String;
|
397
|
+
/**
|
398
|
+
* The regex query.
|
399
|
+
*/
|
400
|
+
regex?: String;
|
401
|
+
/**
|
402
|
+
* The region filter action.
|
403
|
+
*/
|
404
|
+
action: GuardrailSensitiveInformationPolicyAction;
|
405
|
+
}
|
406
|
+
export type GuardrailRegexFilterList = GuardrailRegexFilter[];
|
407
|
+
export type GuardrailSensitiveInformationPolicyAction = "ANONYMIZED"|"BLOCKED"|string;
|
408
|
+
export interface GuardrailSensitiveInformationPolicyAssessment {
|
409
|
+
/**
|
410
|
+
* The PII entities in the assessment.
|
411
|
+
*/
|
412
|
+
piiEntities: GuardrailPiiEntityFilterList;
|
413
|
+
/**
|
414
|
+
* The regex queries in the assessment.
|
415
|
+
*/
|
416
|
+
regexes: GuardrailRegexFilterList;
|
417
|
+
}
|
418
|
+
export interface GuardrailStreamConfiguration {
|
419
|
+
/**
|
420
|
+
* The identifier for the guardrail.
|
421
|
+
*/
|
422
|
+
guardrailIdentifier: GuardrailIdentifier;
|
423
|
+
/**
|
424
|
+
* The version of the guardrail.
|
425
|
+
*/
|
426
|
+
guardrailVersion: GuardrailVersion;
|
427
|
+
/**
|
428
|
+
* The trace behavior for the guardrail.
|
429
|
+
*/
|
430
|
+
trace?: GuardrailTrace;
|
431
|
+
/**
|
432
|
+
* The processing mode. The processing mode. For more information, see Configure streaming response behavior in the Amazon Bedrock User Guide.
|
433
|
+
*/
|
434
|
+
streamProcessingMode?: GuardrailStreamProcessingMode;
|
435
|
+
}
|
436
|
+
export type GuardrailStreamProcessingMode = "sync"|"async"|string;
|
437
|
+
export interface GuardrailTopic {
|
438
|
+
/**
|
439
|
+
* The name for the guardrail.
|
440
|
+
*/
|
441
|
+
name: String;
|
442
|
+
/**
|
443
|
+
* The type behavior that the guardrail should perform when the model detects the topic.
|
444
|
+
*/
|
445
|
+
type: GuardrailTopicType;
|
446
|
+
/**
|
447
|
+
* The action the guardrail should take when it intervenes on a topic.
|
448
|
+
*/
|
449
|
+
action: GuardrailTopicPolicyAction;
|
450
|
+
}
|
451
|
+
export type GuardrailTopicList = GuardrailTopic[];
|
452
|
+
export type GuardrailTopicPolicyAction = "BLOCKED"|string;
|
453
|
+
export interface GuardrailTopicPolicyAssessment {
|
454
|
+
/**
|
455
|
+
* The topics in the assessment.
|
456
|
+
*/
|
457
|
+
topics: GuardrailTopicList;
|
458
|
+
}
|
459
|
+
export type GuardrailTopicType = "DENY"|string;
|
460
|
+
export type GuardrailTrace = "enabled"|"disabled"|string;
|
461
|
+
export interface GuardrailTraceAssessment {
|
462
|
+
/**
|
463
|
+
* The output from the model.
|
464
|
+
*/
|
465
|
+
modelOutput?: ModelOutputs;
|
466
|
+
/**
|
467
|
+
* The input assessment.
|
468
|
+
*/
|
469
|
+
inputAssessment?: GuardrailAssessmentMap;
|
470
|
+
/**
|
471
|
+
* the output assessments.
|
472
|
+
*/
|
473
|
+
outputAssessments?: GuardrailAssessmentListMap;
|
474
|
+
}
|
241
475
|
export type GuardrailVersion = string;
|
476
|
+
export type GuardrailWordPolicyAction = "BLOCKED"|string;
|
477
|
+
export interface GuardrailWordPolicyAssessment {
|
478
|
+
/**
|
479
|
+
* Custom words in the assessment.
|
480
|
+
*/
|
481
|
+
customWords: GuardrailCustomWordList;
|
482
|
+
/**
|
483
|
+
* Managed word lists in the assessment.
|
484
|
+
*/
|
485
|
+
managedWordLists: GuardrailManagedWordList;
|
486
|
+
}
|
242
487
|
export interface ImageBlock {
|
243
488
|
/**
|
244
489
|
* The format of the image.
|
@@ -259,7 +504,7 @@ declare namespace BedrockRuntime {
|
|
259
504
|
export type ImageSourceBytesBlob = Buffer|Uint8Array|Blob|string;
|
260
505
|
export interface InferenceConfiguration {
|
261
506
|
/**
|
262
|
-
* The maximum number of tokens to allow in the generated response. The default value is the maximum allowed value for the model that you are using. For more information, see Inference parameters for
|
507
|
+
* The maximum number of tokens to allow in the generated response. The default value is the maximum allowed value for the model that you are using. For more information, see Inference parameters for foundation models.
|
263
508
|
*/
|
264
509
|
maxTokens?: InferenceConfigurationMaxTokensInteger;
|
265
510
|
/**
|
@@ -285,11 +530,11 @@ declare namespace BedrockRuntime {
|
|
285
530
|
export type InvokeModelIdentifier = string;
|
286
531
|
export interface InvokeModelRequest {
|
287
532
|
/**
|
288
|
-
* The prompt and inference parameters in the format specified in the contentType in the header. To see the format and content of the request and response bodies for different models, refer to Inference parameters. For more information, see Run inference in the Bedrock User Guide.
|
533
|
+
* The prompt and inference parameters in the format specified in the contentType in the header. You must provide the body in JSON format. To see the format and content of the request and response bodies for different models, refer to Inference parameters. For more information, see Run inference in the Bedrock User Guide.
|
289
534
|
*/
|
290
535
|
body: Body;
|
291
536
|
/**
|
292
|
-
* The MIME type of the input data in the request.
|
537
|
+
* The MIME type of the input data in the request. You must specify application/json.
|
293
538
|
*/
|
294
539
|
contentType?: MimeType;
|
295
540
|
/**
|
@@ -325,11 +570,11 @@ declare namespace BedrockRuntime {
|
|
325
570
|
}
|
326
571
|
export interface InvokeModelWithResponseStreamRequest {
|
327
572
|
/**
|
328
|
-
* The prompt and inference parameters in the format specified in the contentType in the header. To see the format and content of the request and response bodies for different models, refer to Inference parameters. For more information, see Run inference in the Bedrock User Guide.
|
573
|
+
* The prompt and inference parameters in the format specified in the contentType in the header. You must provide the body in JSON format. To see the format and content of the request and response bodies for different models, refer to Inference parameters. For more information, see Run inference in the Bedrock User Guide.
|
329
574
|
*/
|
330
575
|
body: Body;
|
331
576
|
/**
|
332
|
-
* The MIME type of the input data in the request.
|
577
|
+
* The MIME type of the input data in the request. You must specify application/json.
|
333
578
|
*/
|
334
579
|
contentType?: MimeType;
|
335
580
|
/**
|
@@ -392,6 +637,7 @@ declare namespace BedrockRuntime {
|
|
392
637
|
}
|
393
638
|
export type Messages = Message[];
|
394
639
|
export type MimeType = string;
|
640
|
+
export type ModelOutputs = GuardrailOutputText[];
|
395
641
|
export interface ModelStreamErrorException {
|
396
642
|
message?: NonBlankString;
|
397
643
|
/**
|
@@ -424,13 +670,17 @@ declare namespace BedrockRuntime {
|
|
424
670
|
name: ToolName;
|
425
671
|
}
|
426
672
|
export type StatusCode = number;
|
427
|
-
export type StopReason = "end_turn"|"tool_use"|"max_tokens"|"stop_sequence"|"content_filtered"|string;
|
673
|
+
export type StopReason = "end_turn"|"tool_use"|"max_tokens"|"stop_sequence"|"guardrail_intervened"|"content_filtered"|string;
|
428
674
|
export type String = string;
|
429
675
|
export interface SystemContentBlock {
|
430
676
|
/**
|
431
677
|
* A system prompt for the model.
|
432
678
|
*/
|
433
679
|
text?: NonEmptyString;
|
680
|
+
/**
|
681
|
+
* A content block to assess with the guardrail. Use with the Converse API (Converse and ConverseStream). For more information, see Use a guardrail with the Converse API in the Amazon Bedrock User Guide.
|
682
|
+
*/
|
683
|
+
guardContent?: GuardrailConverseContentBlock;
|
434
684
|
}
|
435
685
|
export type SystemContentBlocks = SystemContentBlock[];
|
436
686
|
export interface ThrottlingException {
|
@@ -461,7 +711,7 @@ declare namespace BedrockRuntime {
|
|
461
711
|
}
|
462
712
|
export interface ToolChoice {
|
463
713
|
/**
|
464
|
-
* The Model automatically decides if a tool should be called or
|
714
|
+
* (Default). The Model automatically decides if a tool should be called or whether to generate text instead.
|
465
715
|
*/
|
466
716
|
auto?: AutoToolChoice;
|
467
717
|
/**
|
@@ -469,7 +719,7 @@ declare namespace BedrockRuntime {
|
|
469
719
|
*/
|
470
720
|
any?: AnyToolChoice;
|
471
721
|
/**
|
472
|
-
* The Model must request the specified tool.
|
722
|
+
* The Model must request the specified tool. Only supported by Anthropic Claude 3 models.
|
473
723
|
*/
|
474
724
|
tool?: SpecificToolChoice;
|
475
725
|
}
|
package/clients/codebuild.d.ts
CHANGED
@@ -1204,6 +1204,10 @@ declare namespace CodeBuild {
|
|
1204
1204
|
* If manualCreation is true, CodeBuild doesn't create a webhook in GitHub and instead returns payloadUrl and secret values for the webhook. The payloadUrl and secret values in the output can be used to manually create a webhook within GitHub. manualCreation is only available for GitHub webhooks.
|
1205
1205
|
*/
|
1206
1206
|
manualCreation?: WrapperBoolean;
|
1207
|
+
/**
|
1208
|
+
* The scope configuration for global or organization webhooks. Global or organization webhooks are only available for GitHub and Github Enterprise webhooks.
|
1209
|
+
*/
|
1210
|
+
scopeConfiguration?: ScopeConfiguration;
|
1207
1211
|
}
|
1208
1212
|
export interface CreateWebhookOutput {
|
1209
1213
|
/**
|
@@ -2603,6 +2607,20 @@ declare namespace CodeBuild {
|
|
2603
2607
|
*/
|
2604
2608
|
desiredCapacity?: FleetCapacity;
|
2605
2609
|
}
|
2610
|
+
export interface ScopeConfiguration {
|
2611
|
+
/**
|
2612
|
+
* The name of either the enterprise or organization that will send webhook events to CodeBuild, depending on if the webhook is a global or organization webhook respectively.
|
2613
|
+
*/
|
2614
|
+
name: String;
|
2615
|
+
/**
|
2616
|
+
* The domain of the GitHub Enterprise organization. Note that this parameter is only required if your project's source type is GITHUB_ENTERPRISE
|
2617
|
+
*/
|
2618
|
+
domain?: String;
|
2619
|
+
/**
|
2620
|
+
* The type of scope for a GitHub webhook.
|
2621
|
+
*/
|
2622
|
+
scope: WebhookScopeType;
|
2623
|
+
}
|
2606
2624
|
export type SecurityGroupIds = NonEmptyString[];
|
2607
2625
|
export type SensitiveNonEmptyString = string;
|
2608
2626
|
export type SensitiveString = string;
|
@@ -3263,11 +3281,15 @@ declare namespace CodeBuild {
|
|
3263
3281
|
* A timestamp that indicates the last time a repository's secret token was modified.
|
3264
3282
|
*/
|
3265
3283
|
lastModifiedSecret?: Timestamp;
|
3284
|
+
/**
|
3285
|
+
* The scope configuration for global or organization webhooks. Global or organization webhooks are only available for GitHub and Github Enterprise webhooks.
|
3286
|
+
*/
|
3287
|
+
scopeConfiguration?: ScopeConfiguration;
|
3266
3288
|
}
|
3267
3289
|
export type WebhookBuildType = "BUILD"|"BUILD_BATCH"|string;
|
3268
3290
|
export interface WebhookFilter {
|
3269
3291
|
/**
|
3270
|
-
* The type of webhook filter. There are nine webhook filter types: EVENT, ACTOR_ACCOUNT_ID, HEAD_REF, BASE_REF, FILE_PATH, COMMIT_MESSAGE, TAG_NAME, RELEASE_NAME, and WORKFLOW_NAME. EVENT A webhook event triggers a build when the provided pattern matches one of nine event types: PUSH, PULL_REQUEST_CREATED, PULL_REQUEST_UPDATED, PULL_REQUEST_CLOSED, PULL_REQUEST_REOPENED, PULL_REQUEST_MERGED, RELEASED, PRERELEASED, and WORKFLOW_JOB_QUEUED. The EVENT patterns are specified as a comma-separated string. For example, PUSH, PULL_REQUEST_CREATED, PULL_REQUEST_UPDATED filters all push, pull request created, and pull request updated events. Types PULL_REQUEST_REOPENED and WORKFLOW_JOB_QUEUED work with GitHub and GitHub Enterprise only. Types RELEASED and PRERELEASED work with GitHub only. ACTOR_ACCOUNT_ID A webhook event triggers a build when a GitHub, GitHub Enterprise, or Bitbucket account ID matches the regular expression pattern. HEAD_REF A webhook event triggers a build when the head reference matches the regular expression pattern. For example, refs/heads/branch-name and refs/tags/tag-name. Works with GitHub and GitHub Enterprise push, GitHub and GitHub Enterprise pull request, Bitbucket push, and Bitbucket pull request events. BASE_REF A webhook event triggers a build when the base reference matches the regular expression pattern. For example, refs/heads/branch-name. Works with pull request events only. FILE_PATH A webhook triggers a build when the path of a changed file matches the regular expression pattern. Works with GitHub and Bitbucket events push and pull requests events. Also works with GitHub Enterprise push events, but does not work with GitHub Enterprise pull request events. COMMIT_MESSAGE A webhook triggers a build when the head commit message matches the regular expression pattern. Works with GitHub and Bitbucket events push and pull requests events. Also works with GitHub Enterprise push events, but does not work with GitHub Enterprise pull request events. TAG_NAME A webhook triggers a build when the tag name of the release matches the regular expression pattern. Works with RELEASED and PRERELEASED events only. RELEASE_NAME A webhook triggers a build when the release name matches the regular expression pattern. Works with RELEASED and PRERELEASED events only. WORKFLOW_NAME A webhook triggers a build when the workflow name matches the regular expression pattern. Works with WORKFLOW_JOB_QUEUED events only.
|
3292
|
+
* The type of webhook filter. There are nine webhook filter types: EVENT, ACTOR_ACCOUNT_ID, HEAD_REF, BASE_REF, FILE_PATH, COMMIT_MESSAGE, TAG_NAME, RELEASE_NAME, and WORKFLOW_NAME. EVENT A webhook event triggers a build when the provided pattern matches one of nine event types: PUSH, PULL_REQUEST_CREATED, PULL_REQUEST_UPDATED, PULL_REQUEST_CLOSED, PULL_REQUEST_REOPENED, PULL_REQUEST_MERGED, RELEASED, PRERELEASED, and WORKFLOW_JOB_QUEUED. The EVENT patterns are specified as a comma-separated string. For example, PUSH, PULL_REQUEST_CREATED, PULL_REQUEST_UPDATED filters all push, pull request created, and pull request updated events. Types PULL_REQUEST_REOPENED and WORKFLOW_JOB_QUEUED work with GitHub and GitHub Enterprise only. Types RELEASED and PRERELEASED work with GitHub only. ACTOR_ACCOUNT_ID A webhook event triggers a build when a GitHub, GitHub Enterprise, or Bitbucket account ID matches the regular expression pattern. HEAD_REF A webhook event triggers a build when the head reference matches the regular expression pattern. For example, refs/heads/branch-name and refs/tags/tag-name. Works with GitHub and GitHub Enterprise push, GitHub and GitHub Enterprise pull request, Bitbucket push, and Bitbucket pull request events. BASE_REF A webhook event triggers a build when the base reference matches the regular expression pattern. For example, refs/heads/branch-name. Works with pull request events only. FILE_PATH A webhook triggers a build when the path of a changed file matches the regular expression pattern. Works with GitHub and Bitbucket events push and pull requests events. Also works with GitHub Enterprise push events, but does not work with GitHub Enterprise pull request events. COMMIT_MESSAGE A webhook triggers a build when the head commit message matches the regular expression pattern. Works with GitHub and Bitbucket events push and pull requests events. Also works with GitHub Enterprise push events, but does not work with GitHub Enterprise pull request events. TAG_NAME A webhook triggers a build when the tag name of the release matches the regular expression pattern. Works with RELEASED and PRERELEASED events only. RELEASE_NAME A webhook triggers a build when the release name matches the regular expression pattern. Works with RELEASED and PRERELEASED events only. REPOSITORY_NAME A webhook triggers a build when the repository name matches the regular expression pattern. Works with GitHub global or organization webhooks only. WORKFLOW_NAME A webhook triggers a build when the workflow name matches the regular expression pattern. Works with WORKFLOW_JOB_QUEUED events only.
|
3271
3293
|
*/
|
3272
3294
|
type: WebhookFilterType;
|
3273
3295
|
/**
|
@@ -3280,6 +3302,7 @@ declare namespace CodeBuild {
|
|
3280
3302
|
excludeMatchedPattern?: WrapperBoolean;
|
3281
3303
|
}
|
3282
3304
|
export type WebhookFilterType = "EVENT"|"BASE_REF"|"HEAD_REF"|"ACTOR_ACCOUNT_ID"|"FILE_PATH"|"COMMIT_MESSAGE"|"WORKFLOW_NAME"|"TAG_NAME"|"RELEASE_NAME"|string;
|
3305
|
+
export type WebhookScopeType = "GITHUB_ORGANIZATION"|"GITHUB_GLOBAL"|string;
|
3283
3306
|
export type WrapperBoolean = boolean;
|
3284
3307
|
export type WrapperDouble = number;
|
3285
3308
|
export type WrapperInt = number;
|
package/clients/eks.d.ts
CHANGED
@@ -1896,7 +1896,33 @@ declare namespace EKS {
|
|
1896
1896
|
* Metadata that assists with categorization and organization. Each tag consists of a key and an optional value. You define both. Tags don't propagate to any other cluster or Amazon Web Services resources.
|
1897
1897
|
*/
|
1898
1898
|
tags?: TagMap;
|
1899
|
+
/**
|
1900
|
+
* The health status of the Fargate profile. If there are issues with your Fargate profile's health, they are listed here.
|
1901
|
+
*/
|
1902
|
+
health?: FargateProfileHealth;
|
1903
|
+
}
|
1904
|
+
export interface FargateProfileHealth {
|
1905
|
+
/**
|
1906
|
+
* Any issues that are associated with the Fargate profile.
|
1907
|
+
*/
|
1908
|
+
issues?: FargateProfileIssueList;
|
1909
|
+
}
|
1910
|
+
export interface FargateProfileIssue {
|
1911
|
+
/**
|
1912
|
+
* A brief description of the error.
|
1913
|
+
*/
|
1914
|
+
code?: FargateProfileIssueCode;
|
1915
|
+
/**
|
1916
|
+
* The error message associated with the issue.
|
1917
|
+
*/
|
1918
|
+
message?: String;
|
1919
|
+
/**
|
1920
|
+
* The Amazon Web Services resources that are affected by this issue.
|
1921
|
+
*/
|
1922
|
+
resourceIds?: StringList;
|
1899
1923
|
}
|
1924
|
+
export type FargateProfileIssueCode = "PodExecutionRoleAlreadyInUse"|"AccessDenied"|"ClusterUnreachable"|"InternalFailure"|string;
|
1925
|
+
export type FargateProfileIssueList = FargateProfileIssue[];
|
1900
1926
|
export type FargateProfileLabel = {[key: string]: String};
|
1901
1927
|
export interface FargateProfileSelector {
|
1902
1928
|
/**
|