aws-sdk 2.1659.0 → 2.1661.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -1
- package/apis/acm-pca-2017-08-22.waiters2.json +74 -62
- package/apis/connect-2017-08-08.min.json +364 -175
- package/apis/connect-2017-08-08.paginators.json +18 -0
- package/apis/datazone-2018-05-10.min.json +902 -364
- package/apis/datazone-2018-05-10.paginators.json +6 -0
- package/apis/ec2-2016-11-15.min.json +1161 -1028
- package/apis/firehose-2015-08-04.min.json +226 -81
- package/apis/ivs-2020-07-14.min.json +159 -154
- package/apis/ivschat-2020-07-14.min.json +144 -139
- package/apis/ivschat-2020-07-14.waiters2.json +5 -0
- package/apis/medialive-2017-10-14.min.json +327 -230
- package/apis/metadata.json +0 -3
- package/apis/redshift-serverless-2021-04-21.min.json +25 -21
- package/apis/taxsettings-2018-05-10.min.json +4 -1
- package/apis/timestream-query-2018-11-01.min.json +4 -1
- package/apis/workspaces-thin-client-2023-08-22.min.json +3 -0
- package/clients/acmpca.d.ts +12 -12
- package/clients/all.d.ts +0 -1
- package/clients/all.js +0 -1
- package/clients/connect.d.ts +198 -2
- package/clients/datazone.d.ts +576 -0
- package/clients/ec2.d.ts +172 -17
- package/clients/firehose.d.ts +141 -0
- package/clients/ivs.d.ts +229 -229
- package/clients/ivschat.d.ts +166 -166
- package/clients/ivschat.js +1 -0
- package/clients/medialive.d.ts +100 -4
- package/clients/rds.d.ts +9 -9
- package/clients/redshiftserverless.d.ts +20 -3
- package/clients/sagemaker.d.ts +2 -2
- package/clients/secretsmanager.d.ts +7 -7
- package/clients/timestreamquery.d.ts +1 -1
- package/clients/workspacesthinclient.d.ts +1 -1
- package/dist/aws-sdk-core-react-native.js +2 -2
- package/dist/aws-sdk-react-native.js +1807 -1837
- package/dist/aws-sdk.js +1772 -1290
- package/dist/aws-sdk.min.js +84 -84
- package/lib/config_service_placeholders.d.ts +0 -2
- package/lib/core.js +1 -1
- package/package.json +1 -1
- package/apis/mobile-2017-07-01.examples.json +0 -5
- package/apis/mobile-2017-07-01.min.json +0 -341
- package/apis/mobile-2017-07-01.paginators.json +0 -14
- package/clients/mobile.d.ts +0 -333
- package/clients/mobile.js +0 -18
package/clients/ivschat.js
CHANGED
@@ -9,6 +9,7 @@ Object.defineProperty(apiLoader.services['ivschat'], '2020-07-14', {
|
|
9
9
|
get: function get() {
|
10
10
|
var model = require('../apis/ivschat-2020-07-14.min.json');
|
11
11
|
model.paginators = require('../apis/ivschat-2020-07-14.paginators.json').pagination;
|
12
|
+
model.waiters = require('../apis/ivschat-2020-07-14.waiters2.json').waiters;
|
12
13
|
return model;
|
13
14
|
},
|
14
15
|
enumerable: true,
|
package/clients/medialive.d.ts
CHANGED
@@ -1933,6 +1933,10 @@ Only specify sources for PULL type Inputs. Leave Destinations empty.
|
|
1933
1933
|
Tags?: Tags;
|
1934
1934
|
Type?: InputType;
|
1935
1935
|
Vpc?: InputVpcRequest;
|
1936
|
+
/**
|
1937
|
+
* The settings associated with an SRT input.
|
1938
|
+
*/
|
1939
|
+
SrtSettings?: SrtSettingsRequest;
|
1936
1940
|
}
|
1937
1941
|
export interface CreateInputResponse {
|
1938
1942
|
Input?: Input;
|
@@ -2549,6 +2553,10 @@ during input switch actions. Presently, this functionality only works with MP4_F
|
|
2549
2553
|
*/
|
2550
2554
|
Tags?: Tags;
|
2551
2555
|
Type?: InputType;
|
2556
|
+
/**
|
2557
|
+
* The settings associated with an SRT input.
|
2558
|
+
*/
|
2559
|
+
SrtSettings?: SrtSettings;
|
2552
2560
|
}
|
2553
2561
|
export interface DescribeInputSecurityGroupRequest {
|
2554
2562
|
/**
|
@@ -2971,7 +2979,6 @@ provide the language to consider when translating the image-based source to text
|
|
2971
2979
|
export interface Eac3AtmosSettings {
|
2972
2980
|
/**
|
2973
2981
|
* Average bitrate in bits/second. Valid bitrates depend on the coding mode.
|
2974
|
-
// * @affectsRightSizing true
|
2975
2982
|
*/
|
2976
2983
|
Bitrate?: __double;
|
2977
2984
|
/**
|
@@ -3455,7 +3462,14 @@ EPOCH_LOCKING - MediaLive will attempt to synchronize the output of each pipelin
|
|
3455
3462
|
*/
|
3456
3463
|
EntropyEncoding?: H264EntropyEncoding;
|
3457
3464
|
/**
|
3458
|
-
* Optional filters
|
3465
|
+
* Optional. Both filters reduce bandwidth by removing imperceptible details. You can enable one of the filters. We
|
3466
|
+
recommend that you try both filters and observe the results to decide which one to use.
|
3467
|
+
|
3468
|
+
The Temporal Filter reduces bandwidth by removing imperceptible details in the content. It combines perceptual
|
3469
|
+
filtering and motion compensated temporal filtering (MCTF). It operates independently of the compression level.
|
3470
|
+
|
3471
|
+
The Bandwidth Reduction filter is a perceptual filter located within the encoding loop. It adapts to the current
|
3472
|
+
compression level to filter imperceptible signals. This filter works only when the resolution is 1080p or lower.
|
3459
3473
|
*/
|
3460
3474
|
FilterSettings?: H264FilterSettings;
|
3461
3475
|
/**
|
@@ -3678,7 +3692,14 @@ This field is optional; when no value is specified the encoder will choose the n
|
|
3678
3692
|
*/
|
3679
3693
|
ColorSpaceSettings?: H265ColorSpaceSettings;
|
3680
3694
|
/**
|
3681
|
-
* Optional filters
|
3695
|
+
* Optional. Both filters reduce bandwidth by removing imperceptible details. You can enable one of the filters. We
|
3696
|
+
recommend that you try both filters and observe the results to decide which one to use.
|
3697
|
+
|
3698
|
+
The Temporal Filter reduces bandwidth by removing imperceptible details in the content. It combines perceptual
|
3699
|
+
filtering and motion compensated temporal filtering (MCTF). It operates independently of the compression level.
|
3700
|
+
|
3701
|
+
The Bandwidth Reduction filter is a perceptual filter located within the encoding loop. It adapts to the current
|
3702
|
+
compression level to filter imperceptible signals. This filter works only when the resolution is 1080p or lower.
|
3682
3703
|
*/
|
3683
3704
|
FilterSettings?: H265FilterSettings;
|
3684
3705
|
/**
|
@@ -4306,6 +4327,10 @@ during input switch actions. Presently, this functionality only works with MP4_F
|
|
4306
4327
|
*/
|
4307
4328
|
Tags?: Tags;
|
4308
4329
|
Type?: InputType;
|
4330
|
+
/**
|
4331
|
+
* The settings associated with an SRT input.
|
4332
|
+
*/
|
4333
|
+
SrtSettings?: SrtSettings;
|
4309
4334
|
}
|
4310
4335
|
export interface InputAttachment {
|
4311
4336
|
/**
|
@@ -4852,7 +4877,7 @@ pulled from.
|
|
4852
4877
|
UrlPath?: __listOf__string;
|
4853
4878
|
}
|
4854
4879
|
export type InputTimecodeSource = "ZEROBASED"|"EMBEDDED"|string;
|
4855
|
-
export type InputType = "UDP_PUSH"|"RTP_PUSH"|"RTMP_PUSH"|"RTMP_PULL"|"URL_PULL"|"MP4_FILE"|"MEDIACONNECT"|"INPUT_DEVICE"|"AWS_CDI"|"TS_FILE"|string;
|
4880
|
+
export type InputType = "UDP_PUSH"|"RTP_PUSH"|"RTMP_PUSH"|"RTMP_PULL"|"URL_PULL"|"MP4_FILE"|"MEDIACONNECT"|"INPUT_DEVICE"|"AWS_CDI"|"TS_FILE"|"SRT_CALLER"|string;
|
4856
4881
|
export interface InputVpcRequest {
|
4857
4882
|
/**
|
4858
4883
|
* A list of up to 5 EC2 VPC security group IDs to attach to the Input VPC network interfaces.
|
@@ -7524,6 +7549,10 @@ exactly two source URLs for redundancy.
|
|
7524
7549
|
Only specify sources for PULL type Inputs. Leave Destinations empty.
|
7525
7550
|
*/
|
7526
7551
|
Sources?: __listOfInputSourceRequest;
|
7552
|
+
/**
|
7553
|
+
* The settings associated with an SRT input.
|
7554
|
+
*/
|
7555
|
+
SrtSettings?: SrtSettingsRequest;
|
7527
7556
|
}
|
7528
7557
|
export interface UpdateInputResponse {
|
7529
7558
|
Input?: Input;
|
@@ -9219,6 +9248,73 @@ one destination per packager.
|
|
9219
9248
|
export type __stringPatternArnMedialiveSignalMap = string;
|
9220
9249
|
export type __stringPatternS = string;
|
9221
9250
|
export type Scte35SegmentationScope = "ALL_OUTPUT_GROUPS"|"SCTE35_ENABLED_OUTPUT_GROUPS"|string;
|
9251
|
+
export type Algorithm = "AES128"|"AES192"|"AES256"|string;
|
9252
|
+
export interface SrtCallerDecryption {
|
9253
|
+
/**
|
9254
|
+
* The algorithm used to encrypt content.
|
9255
|
+
*/
|
9256
|
+
Algorithm?: Algorithm;
|
9257
|
+
/**
|
9258
|
+
* The ARN for the secret in Secrets Manager. Someone in your organization must create a secret and provide you with its ARN. The secret holds the passphrase that MediaLive uses to decrypt the source content.
|
9259
|
+
*/
|
9260
|
+
PassphraseSecretArn?: __string;
|
9261
|
+
}
|
9262
|
+
export interface SrtCallerDecryptionRequest {
|
9263
|
+
/**
|
9264
|
+
* The algorithm used to encrypt content.
|
9265
|
+
*/
|
9266
|
+
Algorithm?: Algorithm;
|
9267
|
+
/**
|
9268
|
+
* The ARN for the secret in Secrets Manager. Someone in your organization must create a secret and provide you with its ARN. This secret holds the passphrase that MediaLive will use to decrypt the source content.
|
9269
|
+
*/
|
9270
|
+
PassphraseSecretArn?: __string;
|
9271
|
+
}
|
9272
|
+
export interface SrtCallerSource {
|
9273
|
+
Decryption?: SrtCallerDecryption;
|
9274
|
+
/**
|
9275
|
+
* The preferred latency (in milliseconds) for implementing packet loss and recovery. Packet recovery is a key feature of SRT.
|
9276
|
+
*/
|
9277
|
+
MinimumLatency?: __integer;
|
9278
|
+
/**
|
9279
|
+
* The IP address at the upstream system (the listener) that MediaLive (the caller) connects to.
|
9280
|
+
*/
|
9281
|
+
SrtListenerAddress?: __string;
|
9282
|
+
/**
|
9283
|
+
* The port at the upstream system (the listener) that MediaLive (the caller) connects to.
|
9284
|
+
*/
|
9285
|
+
SrtListenerPort?: __string;
|
9286
|
+
/**
|
9287
|
+
* The stream ID, if the upstream system uses this identifier.
|
9288
|
+
*/
|
9289
|
+
StreamId?: __string;
|
9290
|
+
}
|
9291
|
+
export interface SrtCallerSourceRequest {
|
9292
|
+
Decryption?: SrtCallerDecryptionRequest;
|
9293
|
+
/**
|
9294
|
+
* The preferred latency (in milliseconds) for implementing packet loss and recovery. Packet recovery is a key feature of SRT. Obtain this value from the operator at the upstream system.
|
9295
|
+
*/
|
9296
|
+
MinimumLatency?: __integer;
|
9297
|
+
/**
|
9298
|
+
* The IP address at the upstream system (the listener) that MediaLive (the caller) will connect to.
|
9299
|
+
*/
|
9300
|
+
SrtListenerAddress?: __string;
|
9301
|
+
/**
|
9302
|
+
* The port at the upstream system (the listener) that MediaLive (the caller) will connect to.
|
9303
|
+
*/
|
9304
|
+
SrtListenerPort?: __string;
|
9305
|
+
/**
|
9306
|
+
* This value is required if the upstream system uses this identifier because without it, the SRT handshake between MediaLive (the caller) and the upstream system (the listener) might fail.
|
9307
|
+
*/
|
9308
|
+
StreamId?: __string;
|
9309
|
+
}
|
9310
|
+
export interface SrtSettings {
|
9311
|
+
SrtCallerSources?: __listOfSrtCallerSource;
|
9312
|
+
}
|
9313
|
+
export interface SrtSettingsRequest {
|
9314
|
+
SrtCallerSources?: __listOfSrtCallerSourceRequest;
|
9315
|
+
}
|
9316
|
+
export type __listOfSrtCallerSource = SrtCallerSource[];
|
9317
|
+
export type __listOfSrtCallerSourceRequest = SrtCallerSourceRequest[];
|
9222
9318
|
/**
|
9223
9319
|
* A string in YYYY-MM-DD format that represents the latest possible API version that can be used in this service. Specify 'latest' to use the latest possible version.
|
9224
9320
|
*/
|
package/clients/rds.d.ts
CHANGED
@@ -766,11 +766,11 @@ declare class RDS extends Service {
|
|
766
766
|
*/
|
767
767
|
describeOrderableDBInstanceOptions(callback?: (err: AWSError, data: RDS.Types.OrderableDBInstanceOptionsMessage) => void): Request<RDS.Types.OrderableDBInstanceOptionsMessage, AWSError>;
|
768
768
|
/**
|
769
|
-
* Returns a list of resources (for example, DB instances) that have at least one pending maintenance action.
|
769
|
+
* Returns a list of resources (for example, DB instances) that have at least one pending maintenance action. This API follows an eventual consistency model. This means that the result of the DescribePendingMaintenanceActions command might not be immediately visible to all subsequent RDS commands. Keep this in mind when you use DescribePendingMaintenanceActions immediately after using a previous API command such as ApplyPendingMaintenanceActions.
|
770
770
|
*/
|
771
771
|
describePendingMaintenanceActions(params: RDS.Types.DescribePendingMaintenanceActionsMessage, callback?: (err: AWSError, data: RDS.Types.PendingMaintenanceActionsMessage) => void): Request<RDS.Types.PendingMaintenanceActionsMessage, AWSError>;
|
772
772
|
/**
|
773
|
-
* Returns a list of resources (for example, DB instances) that have at least one pending maintenance action.
|
773
|
+
* Returns a list of resources (for example, DB instances) that have at least one pending maintenance action. This API follows an eventual consistency model. This means that the result of the DescribePendingMaintenanceActions command might not be immediately visible to all subsequent RDS commands. Keep this in mind when you use DescribePendingMaintenanceActions immediately after using a previous API command such as ApplyPendingMaintenanceActions.
|
774
774
|
*/
|
775
775
|
describePendingMaintenanceActions(callback?: (err: AWSError, data: RDS.Types.PendingMaintenanceActionsMessage) => void): Request<RDS.Types.PendingMaintenanceActionsMessage, AWSError>;
|
776
776
|
/**
|
@@ -2192,7 +2192,7 @@ declare namespace RDS {
|
|
2192
2192
|
*/
|
2193
2193
|
Iops?: IntegerOptional;
|
2194
2194
|
/**
|
2195
|
-
* Specifies whether the DB cluster is publicly accessible. When the DB cluster is publicly accessible, its Domain Name System (DNS) endpoint resolves to the
|
2195
|
+
* Specifies whether the DB cluster is publicly accessible. When the DB cluster is publicly accessible and you connect from outside of the DB cluster's virtual private cloud (VPC), its Domain Name System (DNS) endpoint resolves to the public IP address. When you connect from within the same VPC as the DB cluster, the endpoint resolves to the private IP address. Access to the DB cluster is ultimately controlled by the security group it uses. That public access isn't permitted if the security group assigned to the DB cluster doesn't permit it. When the DB cluster isn't publicly accessible, it is an internal DB cluster with a DNS name that resolves to a private IP address. Valid for Cluster Type: Multi-AZ DB clusters only Default: The default behavior varies depending on whether DBSubnetGroupName is specified. If DBSubnetGroupName isn't specified, and PubliclyAccessible isn't specified, the following applies: If the default VPC in the target Region doesn’t have an internet gateway attached to it, the DB cluster is private. If the default VPC in the target Region has an internet gateway attached to it, the DB cluster is public. If DBSubnetGroupName is specified, and PubliclyAccessible isn't specified, the following applies: If the subnets are part of a VPC that doesn’t have an internet gateway attached to it, the DB cluster is private. If the subnets are part of a VPC that has an internet gateway attached to it, the DB cluster is public.
|
2196
2196
|
*/
|
2197
2197
|
PubliclyAccessible?: BooleanOptional;
|
2198
2198
|
/**
|
@@ -2396,7 +2396,7 @@ declare namespace RDS {
|
|
2396
2396
|
*/
|
2397
2397
|
NcharCharacterSetName?: String;
|
2398
2398
|
/**
|
2399
|
-
* Specifies whether the DB instance is publicly accessible. When the DB instance is publicly accessible, its Domain Name System (DNS) endpoint resolves to the
|
2399
|
+
* Specifies whether the DB instance is publicly accessible. When the DB instance is publicly accessible and you connect from outside of the DB instance's virtual private cloud (VPC), its Domain Name System (DNS) endpoint resolves to the public IP address. When you connect from within the same VPC as the DB instance, the endpoint resolves to the private IP address. Access to the DB instance is ultimately controlled by the security group it uses. That public access is not permitted if the security group assigned to the DB instance doesn't permit it. When the DB instance isn't publicly accessible, it is an internal DB instance with a DNS name that resolves to a private IP address. Default: The default behavior varies depending on whether DBSubnetGroupName is specified. If DBSubnetGroupName isn't specified, and PubliclyAccessible isn't specified, the following applies: If the default VPC in the target Region doesn’t have an internet gateway attached to it, the DB instance is private. If the default VPC in the target Region has an internet gateway attached to it, the DB instance is public. If DBSubnetGroupName is specified, and PubliclyAccessible isn't specified, the following applies: If the subnets are part of a VPC that doesn’t have an internet gateway attached to it, the DB instance is private. If the subnets are part of a VPC that has an internet gateway attached to it, the DB instance is public.
|
2400
2400
|
*/
|
2401
2401
|
PubliclyAccessible?: BooleanOptional;
|
2402
2402
|
/**
|
@@ -3324,7 +3324,7 @@ declare namespace RDS {
|
|
3324
3324
|
*/
|
3325
3325
|
Iops?: IntegerOptional;
|
3326
3326
|
/**
|
3327
|
-
* Indicates whether the DB cluster is publicly accessible. When the DB cluster is publicly accessible, its Domain Name System (DNS) endpoint resolves to the
|
3327
|
+
* Indicates whether the DB cluster is publicly accessible. When the DB cluster is publicly accessible and you connect from outside of the DB cluster's virtual private cloud (VPC), its Domain Name System (DNS) endpoint resolves to the public IP address. When you connect from within the same VPC as the DB cluster, the endpoint resolves to the private IP address. Access to the DB cluster is ultimately controlled by the security group it uses. That public access isn't permitted if the security group assigned to the DB cluster doesn't permit it. When the DB cluster isn't publicly accessible, it is an internal DB cluster with a DNS name that resolves to a private IP address. For more information, see CreateDBCluster. This setting is only for non-Aurora Multi-AZ DB clusters.
|
3328
3328
|
*/
|
3329
3329
|
PubliclyAccessible?: BooleanOptional;
|
3330
3330
|
/**
|
@@ -4148,7 +4148,7 @@ declare namespace RDS {
|
|
4148
4148
|
*/
|
4149
4149
|
SecondaryAvailabilityZone?: String;
|
4150
4150
|
/**
|
4151
|
-
* Indicates whether the DB instance is publicly accessible. When the DB
|
4151
|
+
* Indicates whether the DB instance is publicly accessible. When the DB instance is publicly accessible and you connect from outside of the DB instance's virtual private cloud (VPC), its Domain Name System (DNS) endpoint resolves to the public IP address. When you connect from within the same VPC as the DB instance, the endpoint resolves to the private IP address. Access to the DB cluster is ultimately controlled by the security group it uses. That public access isn't permitted if the security group assigned to the DB cluster doesn't permit it. When the DB instance isn't publicly accessible, it is an internal DB instance with a DNS name that resolves to a private IP address. For more information, see CreateDBInstance.
|
4152
4152
|
*/
|
4153
4153
|
PubliclyAccessible?: Boolean;
|
4154
4154
|
/**
|
@@ -5302,7 +5302,7 @@ declare namespace RDS {
|
|
5302
5302
|
*/
|
5303
5303
|
FinalDBSnapshotIdentifier?: String;
|
5304
5304
|
/**
|
5305
|
-
* Specifies whether to remove automated backups immediately after the DB cluster is deleted. This parameter isn't case-sensitive. The default is to remove automated backups immediately after the DB cluster is deleted.
|
5305
|
+
* Specifies whether to remove automated backups immediately after the DB cluster is deleted. This parameter isn't case-sensitive. The default is to remove automated backups immediately after the DB cluster is deleted. You must delete automated backups for Amazon RDS Multi-AZ DB clusters. For more information about managing automated backups for RDS Multi-AZ DB clusters, see Managing automated backups.
|
5306
5306
|
*/
|
5307
5307
|
DeleteAutomatedBackups?: BooleanOptional;
|
5308
5308
|
}
|
@@ -5624,7 +5624,7 @@ declare namespace RDS {
|
|
5624
5624
|
*/
|
5625
5625
|
DBClusterParameterGroupName: String;
|
5626
5626
|
/**
|
5627
|
-
* A specific source to return parameters for. Valid Values:
|
5627
|
+
* A specific source to return parameters for. Valid Values: user engine service
|
5628
5628
|
*/
|
5629
5629
|
Source?: String;
|
5630
5630
|
/**
|
@@ -7726,7 +7726,7 @@ declare namespace RDS {
|
|
7726
7726
|
*/
|
7727
7727
|
DBPortNumber?: IntegerOptional;
|
7728
7728
|
/**
|
7729
|
-
* Specifies whether the DB instance is publicly accessible. When the DB
|
7729
|
+
* Specifies whether the DB instance is publicly accessible. When the DB instance is publicly accessible and you connect from outside of the DB instance's virtual private cloud (VPC), its Domain Name System (DNS) endpoint resolves to the public IP address. When you connect from within the same VPC as the DB instance, the endpoint resolves to the private IP address. Access to the DB instance is ultimately controlled by the security group it uses. That public access isn't permitted if the security group assigned to the DB instance doesn't permit it. When the DB instance isn't publicly accessible, it is an internal DB instance with a DNS name that resolves to a private IP address. PubliclyAccessible only applies to DB instances in a VPC. The DB instance must be part of a public subnet and PubliclyAccessible must be enabled for it to be publicly accessible. Changes to the PubliclyAccessible parameter are applied immediately regardless of the value of the ApplyImmediately parameter.
|
7730
7730
|
*/
|
7731
7731
|
PubliclyAccessible?: BooleanOptional;
|
7732
7732
|
/**
|
@@ -640,7 +640,7 @@ declare namespace RedshiftServerless {
|
|
640
640
|
*/
|
641
641
|
namespaceName: NamespaceName;
|
642
642
|
/**
|
643
|
-
* The ARN of the IAM role to assume to run the scheduled action. This IAM role must have permission to run the Amazon Redshift Serverless API operation in the scheduled action. This IAM role must allow the Amazon Redshift scheduler to schedule creating snapshots. (Principal scheduler.redshift.amazonaws.com) to assume permissions on your behalf. For more information about the IAM role to use with the Amazon Redshift scheduler, see Using Identity-Based Policies for Amazon Redshift in the Amazon Redshift
|
643
|
+
* The ARN of the IAM role to assume to run the scheduled action. This IAM role must have permission to run the Amazon Redshift Serverless API operation in the scheduled action. This IAM role must allow the Amazon Redshift scheduler to schedule creating snapshots. (Principal scheduler.redshift.amazonaws.com) to assume permissions on your behalf. For more information about the IAM role to use with the Amazon Redshift scheduler, see Using Identity-Based Policies for Amazon Redshift in the Amazon Redshift Management Guide
|
644
644
|
*/
|
645
645
|
roleArn: IamRoleArn;
|
646
646
|
/**
|
@@ -774,6 +774,10 @@ declare namespace RedshiftServerless {
|
|
774
774
|
* The value that specifies whether to turn on enhanced virtual private cloud (VPC) routing, which forces Amazon Redshift Serverless to route traffic through your VPC instead of over the internet.
|
775
775
|
*/
|
776
776
|
enhancedVpcRouting?: Boolean;
|
777
|
+
/**
|
778
|
+
* The IP address type that the workgroup supports. Possible values are ipv4 and dualstack.
|
779
|
+
*/
|
780
|
+
ipAddressType?: IpAddressType;
|
777
781
|
/**
|
778
782
|
* The maximum data-warehouse capacity Amazon Redshift Serverless uses to serve queries. The max capacity is specified in RPUs.
|
779
783
|
*/
|
@@ -1171,6 +1175,7 @@ declare namespace RedshiftServerless {
|
|
1171
1175
|
export type IamRoleArn = string;
|
1172
1176
|
export type IamRoleArnList = IamRoleArn[];
|
1173
1177
|
export type Integer = number;
|
1178
|
+
export type IpAddressType = string;
|
1174
1179
|
export type KmsKeyId = string;
|
1175
1180
|
export interface ListCustomDomainAssociationsRequest {
|
1176
1181
|
/**
|
@@ -1543,6 +1548,10 @@ declare namespace RedshiftServerless {
|
|
1543
1548
|
* The availability Zone.
|
1544
1549
|
*/
|
1545
1550
|
availabilityZone?: String;
|
1551
|
+
/**
|
1552
|
+
* The IPv6 address of the network interface within the subnet.
|
1553
|
+
*/
|
1554
|
+
ipv6Address?: String;
|
1546
1555
|
/**
|
1547
1556
|
* The unique identifier of the network interface.
|
1548
1557
|
*/
|
@@ -1809,7 +1818,7 @@ declare namespace RedshiftServerless {
|
|
1809
1818
|
*/
|
1810
1819
|
nextInvocations?: NextInvocationsList;
|
1811
1820
|
/**
|
1812
|
-
* The ARN of the IAM role to assume to run the scheduled action. This IAM role must have permission to run the Amazon Redshift Serverless API operation in the scheduled action. This IAM role must allow the Amazon Redshift scheduler to schedule creating snapshots. (Principal scheduler.redshift.amazonaws.com) to assume permissions on your behalf. For more information about the IAM role to use with the Amazon Redshift scheduler, see Using Identity-Based Policies for Amazon Redshift in the Amazon Redshift
|
1821
|
+
* The ARN of the IAM role to assume to run the scheduled action. This IAM role must have permission to run the Amazon Redshift Serverless API operation in the scheduled action. This IAM role must allow the Amazon Redshift scheduler to schedule creating snapshots. (Principal scheduler.redshift.amazonaws.com) to assume permissions on your behalf. For more information about the IAM role to use with the Amazon Redshift scheduler, see Using Identity-Based Policies for Amazon Redshift in the Amazon Redshift Management Guide
|
1813
1822
|
*/
|
1814
1823
|
roleArn?: IamRoleArn;
|
1815
1824
|
/**
|
@@ -2177,7 +2186,7 @@ declare namespace RedshiftServerless {
|
|
2177
2186
|
*/
|
2178
2187
|
endTime?: Timestamp;
|
2179
2188
|
/**
|
2180
|
-
* The ARN of the IAM role to assume to run the scheduled action. This IAM role must have permission to run the Amazon Redshift Serverless API operation in the scheduled action. This IAM role must allow the Amazon Redshift scheduler to schedule creating snapshots (Principal scheduler.redshift.amazonaws.com) to assume permissions on your behalf. For more information about the IAM role to use with the Amazon Redshift scheduler, see Using Identity-Based Policies for Amazon Redshift in the Amazon Redshift
|
2189
|
+
* The ARN of the IAM role to assume to run the scheduled action. This IAM role must have permission to run the Amazon Redshift Serverless API operation in the scheduled action. This IAM role must allow the Amazon Redshift scheduler to schedule creating snapshots (Principal scheduler.redshift.amazonaws.com) to assume permissions on your behalf. For more information about the IAM role to use with the Amazon Redshift scheduler, see Using Identity-Based Policies for Amazon Redshift in the Amazon Redshift Management Guide
|
2181
2190
|
*/
|
2182
2191
|
roleArn?: IamRoleArn;
|
2183
2192
|
/**
|
@@ -2269,6 +2278,10 @@ declare namespace RedshiftServerless {
|
|
2269
2278
|
* The value that specifies whether to turn on enhanced virtual private cloud (VPC) routing, which forces Amazon Redshift Serverless to route traffic through your VPC.
|
2270
2279
|
*/
|
2271
2280
|
enhancedVpcRouting?: Boolean;
|
2281
|
+
/**
|
2282
|
+
* The IP address type that the workgroup supports. Possible values are ipv4 and dualstack.
|
2283
|
+
*/
|
2284
|
+
ipAddressType?: IpAddressType;
|
2272
2285
|
/**
|
2273
2286
|
* The maximum data-warehouse capacity Amazon Redshift Serverless uses to serve queries. The max capacity is specified in RPUs.
|
2274
2287
|
*/
|
@@ -2400,6 +2413,10 @@ declare namespace RedshiftServerless {
|
|
2400
2413
|
* The value that specifies whether to enable enhanced virtual private cloud (VPC) routing, which forces Amazon Redshift Serverless to route traffic through your VPC.
|
2401
2414
|
*/
|
2402
2415
|
enhancedVpcRouting?: Boolean;
|
2416
|
+
/**
|
2417
|
+
* The IP address type that the workgroup supports. Possible values are ipv4 and dualstack.
|
2418
|
+
*/
|
2419
|
+
ipAddressType?: IpAddressType;
|
2403
2420
|
/**
|
2404
2421
|
* The maximum data-warehouse capacity Amazon Redshift Serverless uses to serve queries. The max capacity is specified in RPUs.
|
2405
2422
|
*/
|
package/clients/sagemaker.d.ts
CHANGED
@@ -20673,7 +20673,7 @@ declare namespace SageMaker {
|
|
20673
20673
|
}
|
20674
20674
|
export type ProcessingInputs = ProcessingInput[];
|
20675
20675
|
export type ProcessingInstanceCount = number;
|
20676
|
-
export type ProcessingInstanceType = "ml.t3.medium"|"ml.t3.large"|"ml.t3.xlarge"|"ml.t3.2xlarge"|"ml.m4.xlarge"|"ml.m4.2xlarge"|"ml.m4.4xlarge"|"ml.m4.10xlarge"|"ml.m4.16xlarge"|"ml.c4.xlarge"|"ml.c4.2xlarge"|"ml.c4.4xlarge"|"ml.c4.8xlarge"|"ml.p2.xlarge"|"ml.p2.8xlarge"|"ml.p2.16xlarge"|"ml.p3.2xlarge"|"ml.p3.8xlarge"|"ml.p3.16xlarge"|"ml.c5.xlarge"|"ml.c5.2xlarge"|"ml.c5.4xlarge"|"ml.c5.9xlarge"|"ml.c5.18xlarge"|"ml.m5.large"|"ml.m5.xlarge"|"ml.m5.2xlarge"|"ml.m5.4xlarge"|"ml.m5.12xlarge"|"ml.m5.24xlarge"|"ml.r5.large"|"ml.r5.xlarge"|"ml.r5.2xlarge"|"ml.r5.4xlarge"|"ml.r5.8xlarge"|"ml.r5.12xlarge"|"ml.r5.16xlarge"|"ml.r5.24xlarge"|"ml.g4dn.xlarge"|"ml.g4dn.2xlarge"|"ml.g4dn.4xlarge"|"ml.g4dn.8xlarge"|"ml.g4dn.12xlarge"|"ml.g4dn.16xlarge"|string;
|
20676
|
+
export type ProcessingInstanceType = "ml.t3.medium"|"ml.t3.large"|"ml.t3.xlarge"|"ml.t3.2xlarge"|"ml.m4.xlarge"|"ml.m4.2xlarge"|"ml.m4.4xlarge"|"ml.m4.10xlarge"|"ml.m4.16xlarge"|"ml.c4.xlarge"|"ml.c4.2xlarge"|"ml.c4.4xlarge"|"ml.c4.8xlarge"|"ml.p2.xlarge"|"ml.p2.8xlarge"|"ml.p2.16xlarge"|"ml.p3.2xlarge"|"ml.p3.8xlarge"|"ml.p3.16xlarge"|"ml.c5.xlarge"|"ml.c5.2xlarge"|"ml.c5.4xlarge"|"ml.c5.9xlarge"|"ml.c5.18xlarge"|"ml.m5.large"|"ml.m5.xlarge"|"ml.m5.2xlarge"|"ml.m5.4xlarge"|"ml.m5.12xlarge"|"ml.m5.24xlarge"|"ml.r5.large"|"ml.r5.xlarge"|"ml.r5.2xlarge"|"ml.r5.4xlarge"|"ml.r5.8xlarge"|"ml.r5.12xlarge"|"ml.r5.16xlarge"|"ml.r5.24xlarge"|"ml.g4dn.xlarge"|"ml.g4dn.2xlarge"|"ml.g4dn.4xlarge"|"ml.g4dn.8xlarge"|"ml.g4dn.12xlarge"|"ml.g4dn.16xlarge"|"ml.g5.xlarge"|"ml.g5.2xlarge"|"ml.g5.4xlarge"|"ml.g5.8xlarge"|"ml.g5.16xlarge"|"ml.g5.12xlarge"|"ml.g5.24xlarge"|"ml.g5.48xlarge"|"ml.r5d.large"|"ml.r5d.xlarge"|"ml.r5d.2xlarge"|"ml.r5d.4xlarge"|"ml.r5d.8xlarge"|"ml.r5d.12xlarge"|"ml.r5d.16xlarge"|"ml.r5d.24xlarge"|string;
|
20677
20677
|
export interface ProcessingJob {
|
20678
20678
|
/**
|
20679
20679
|
* List of input configurations for the processing job.
|
@@ -23232,7 +23232,7 @@ declare namespace SageMaker {
|
|
23232
23232
|
}
|
23233
23233
|
export type TrainingInputMode = "Pipe"|"File"|"FastFile"|string;
|
23234
23234
|
export type TrainingInstanceCount = number;
|
23235
|
-
export type TrainingInstanceType = "ml.m4.xlarge"|"ml.m4.2xlarge"|"ml.m4.4xlarge"|"ml.m4.10xlarge"|"ml.m4.16xlarge"|"ml.g4dn.xlarge"|"ml.g4dn.2xlarge"|"ml.g4dn.4xlarge"|"ml.g4dn.8xlarge"|"ml.g4dn.12xlarge"|"ml.g4dn.16xlarge"|"ml.m5.large"|"ml.m5.xlarge"|"ml.m5.2xlarge"|"ml.m5.4xlarge"|"ml.m5.12xlarge"|"ml.m5.24xlarge"|"ml.c4.xlarge"|"ml.c4.2xlarge"|"ml.c4.4xlarge"|"ml.c4.8xlarge"|"ml.p2.xlarge"|"ml.p2.8xlarge"|"ml.p2.16xlarge"|"ml.p3.2xlarge"|"ml.p3.8xlarge"|"ml.p3.16xlarge"|"ml.p3dn.24xlarge"|"ml.p4d.24xlarge"|"ml.p4de.24xlarge"|"ml.p5.48xlarge"|"ml.c5.xlarge"|"ml.c5.2xlarge"|"ml.c5.4xlarge"|"ml.c5.9xlarge"|"ml.c5.18xlarge"|"ml.c5n.xlarge"|"ml.c5n.2xlarge"|"ml.c5n.4xlarge"|"ml.c5n.9xlarge"|"ml.c5n.18xlarge"|"ml.g5.xlarge"|"ml.g5.2xlarge"|"ml.g5.4xlarge"|"ml.g5.8xlarge"|"ml.g5.16xlarge"|"ml.g5.12xlarge"|"ml.g5.24xlarge"|"ml.g5.48xlarge"|"ml.trn1.2xlarge"|"ml.trn1.32xlarge"|"ml.trn1n.32xlarge"|"ml.m6i.large"|"ml.m6i.xlarge"|"ml.m6i.2xlarge"|"ml.m6i.4xlarge"|"ml.m6i.8xlarge"|"ml.m6i.12xlarge"|"ml.m6i.16xlarge"|"ml.m6i.24xlarge"|"ml.m6i.32xlarge"|"ml.c6i.xlarge"|"ml.c6i.2xlarge"|"ml.c6i.8xlarge"|"ml.c6i.4xlarge"|"ml.c6i.12xlarge"|"ml.c6i.16xlarge"|"ml.c6i.24xlarge"|"ml.c6i.32xlarge"|string;
|
23235
|
+
export type TrainingInstanceType = "ml.m4.xlarge"|"ml.m4.2xlarge"|"ml.m4.4xlarge"|"ml.m4.10xlarge"|"ml.m4.16xlarge"|"ml.g4dn.xlarge"|"ml.g4dn.2xlarge"|"ml.g4dn.4xlarge"|"ml.g4dn.8xlarge"|"ml.g4dn.12xlarge"|"ml.g4dn.16xlarge"|"ml.m5.large"|"ml.m5.xlarge"|"ml.m5.2xlarge"|"ml.m5.4xlarge"|"ml.m5.12xlarge"|"ml.m5.24xlarge"|"ml.c4.xlarge"|"ml.c4.2xlarge"|"ml.c4.4xlarge"|"ml.c4.8xlarge"|"ml.p2.xlarge"|"ml.p2.8xlarge"|"ml.p2.16xlarge"|"ml.p3.2xlarge"|"ml.p3.8xlarge"|"ml.p3.16xlarge"|"ml.p3dn.24xlarge"|"ml.p4d.24xlarge"|"ml.p4de.24xlarge"|"ml.p5.48xlarge"|"ml.c5.xlarge"|"ml.c5.2xlarge"|"ml.c5.4xlarge"|"ml.c5.9xlarge"|"ml.c5.18xlarge"|"ml.c5n.xlarge"|"ml.c5n.2xlarge"|"ml.c5n.4xlarge"|"ml.c5n.9xlarge"|"ml.c5n.18xlarge"|"ml.g5.xlarge"|"ml.g5.2xlarge"|"ml.g5.4xlarge"|"ml.g5.8xlarge"|"ml.g5.16xlarge"|"ml.g5.12xlarge"|"ml.g5.24xlarge"|"ml.g5.48xlarge"|"ml.trn1.2xlarge"|"ml.trn1.32xlarge"|"ml.trn1n.32xlarge"|"ml.m6i.large"|"ml.m6i.xlarge"|"ml.m6i.2xlarge"|"ml.m6i.4xlarge"|"ml.m6i.8xlarge"|"ml.m6i.12xlarge"|"ml.m6i.16xlarge"|"ml.m6i.24xlarge"|"ml.m6i.32xlarge"|"ml.c6i.xlarge"|"ml.c6i.2xlarge"|"ml.c6i.8xlarge"|"ml.c6i.4xlarge"|"ml.c6i.12xlarge"|"ml.c6i.16xlarge"|"ml.c6i.24xlarge"|"ml.c6i.32xlarge"|"ml.r5d.large"|"ml.r5d.xlarge"|"ml.r5d.2xlarge"|"ml.r5d.4xlarge"|"ml.r5d.8xlarge"|"ml.r5d.12xlarge"|"ml.r5d.16xlarge"|"ml.r5d.24xlarge"|"ml.t3.medium"|"ml.t3.large"|"ml.t3.xlarge"|"ml.t3.2xlarge"|"ml.r5.large"|"ml.r5.xlarge"|"ml.r5.2xlarge"|"ml.r5.4xlarge"|"ml.r5.8xlarge"|"ml.r5.12xlarge"|"ml.r5.16xlarge"|"ml.r5.24xlarge"|string;
|
23236
23236
|
export type TrainingInstanceTypes = TrainingInstanceType[];
|
23237
23237
|
export interface TrainingJob {
|
23238
23238
|
/**
|
@@ -28,11 +28,11 @@ declare class SecretsManager extends Service {
|
|
28
28
|
*/
|
29
29
|
cancelRotateSecret(callback?: (err: AWSError, data: SecretsManager.Types.CancelRotateSecretResponse) => void): Request<SecretsManager.Types.CancelRotateSecretResponse, AWSError>;
|
30
30
|
/**
|
31
|
-
* Creates a new secret. A secret can be a password, a set of credentials such as a user name and password, an OAuth token, or other secret information that you store in an encrypted form in Secrets Manager. The secret also includes the connection information to access a database or other service, which Secrets Manager doesn't encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information needed to manage the secret. For secrets that use managed rotation, you need to create the secret through the managing service. For more information, see Secrets Manager secrets managed by other Amazon Web Services services. For information about creating a secret in the console, see Create a secret. To create a secret, you can provide the secret value to be encrypted in either the SecretString parameter or the SecretBinary parameter, but not both. If you include SecretString or SecretBinary then Secrets Manager creates an initial secret version and automatically attaches the staging label AWSCURRENT to it. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the JSON you store in the SecretString matches the JSON structure of a database secret. If you don't specify an KMS encryption key, Secrets Manager uses the Amazon Web Services managed key aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant delay in returning the result. If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed KMS key. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:CreateSecret. If you include tags in the secret, you also need secretsmanager:TagResource. To add replica Regions, you must also have secretsmanager:ReplicateSecretToRegions. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. To encrypt the secret with a KMS key other than aws/secretsmanager, you need kms:GenerateDataKey and kms:Decrypt permission to the key.
|
31
|
+
* Creates a new secret. A secret can be a password, a set of credentials such as a user name and password, an OAuth token, or other secret information that you store in an encrypted form in Secrets Manager. The secret also includes the connection information to access a database or other service, which Secrets Manager doesn't encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information needed to manage the secret. For secrets that use managed rotation, you need to create the secret through the managing service. For more information, see Secrets Manager secrets managed by other Amazon Web Services services. For information about creating a secret in the console, see Create a secret. To create a secret, you can provide the secret value to be encrypted in either the SecretString parameter or the SecretBinary parameter, but not both. If you include SecretString or SecretBinary then Secrets Manager creates an initial secret version and automatically attaches the staging label AWSCURRENT to it. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the JSON you store in the SecretString matches the JSON structure of a database secret. If you don't specify an KMS encryption key, Secrets Manager uses the Amazon Web Services managed key aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant delay in returning the result. If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed KMS key. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:CreateSecret. If you include tags in the secret, you also need secretsmanager:TagResource. To add replica Regions, you must also have secretsmanager:ReplicateSecretToRegions. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. To encrypt the secret with a KMS key other than aws/secretsmanager, you need kms:GenerateDataKey and kms:Decrypt permission to the key. When you enter commands in a command shell, there is a risk of the command history being accessed or utilities having access to your command parameters. This is a concern if the command includes the value of a secret. Learn how to Mitigate the risks of using command-line tools to store Secrets Manager secrets.
|
32
32
|
*/
|
33
33
|
createSecret(params: SecretsManager.Types.CreateSecretRequest, callback?: (err: AWSError, data: SecretsManager.Types.CreateSecretResponse) => void): Request<SecretsManager.Types.CreateSecretResponse, AWSError>;
|
34
34
|
/**
|
35
|
-
* Creates a new secret. A secret can be a password, a set of credentials such as a user name and password, an OAuth token, or other secret information that you store in an encrypted form in Secrets Manager. The secret also includes the connection information to access a database or other service, which Secrets Manager doesn't encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information needed to manage the secret. For secrets that use managed rotation, you need to create the secret through the managing service. For more information, see Secrets Manager secrets managed by other Amazon Web Services services. For information about creating a secret in the console, see Create a secret. To create a secret, you can provide the secret value to be encrypted in either the SecretString parameter or the SecretBinary parameter, but not both. If you include SecretString or SecretBinary then Secrets Manager creates an initial secret version and automatically attaches the staging label AWSCURRENT to it. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the JSON you store in the SecretString matches the JSON structure of a database secret. If you don't specify an KMS encryption key, Secrets Manager uses the Amazon Web Services managed key aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant delay in returning the result. If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed KMS key. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:CreateSecret. If you include tags in the secret, you also need secretsmanager:TagResource. To add replica Regions, you must also have secretsmanager:ReplicateSecretToRegions. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. To encrypt the secret with a KMS key other than aws/secretsmanager, you need kms:GenerateDataKey and kms:Decrypt permission to the key.
|
35
|
+
* Creates a new secret. A secret can be a password, a set of credentials such as a user name and password, an OAuth token, or other secret information that you store in an encrypted form in Secrets Manager. The secret also includes the connection information to access a database or other service, which Secrets Manager doesn't encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information needed to manage the secret. For secrets that use managed rotation, you need to create the secret through the managing service. For more information, see Secrets Manager secrets managed by other Amazon Web Services services. For information about creating a secret in the console, see Create a secret. To create a secret, you can provide the secret value to be encrypted in either the SecretString parameter or the SecretBinary parameter, but not both. If you include SecretString or SecretBinary then Secrets Manager creates an initial secret version and automatically attaches the staging label AWSCURRENT to it. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the JSON you store in the SecretString matches the JSON structure of a database secret. If you don't specify an KMS encryption key, Secrets Manager uses the Amazon Web Services managed key aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant delay in returning the result. If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed KMS key. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:CreateSecret. If you include tags in the secret, you also need secretsmanager:TagResource. To add replica Regions, you must also have secretsmanager:ReplicateSecretToRegions. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. To encrypt the secret with a KMS key other than aws/secretsmanager, you need kms:GenerateDataKey and kms:Decrypt permission to the key. When you enter commands in a command shell, there is a risk of the command history being accessed or utilities having access to your command parameters. This is a concern if the command includes the value of a secret. Learn how to Mitigate the risks of using command-line tools to store Secrets Manager secrets.
|
36
36
|
*/
|
37
37
|
createSecret(callback?: (err: AWSError, data: SecretsManager.Types.CreateSecretResponse) => void): Request<SecretsManager.Types.CreateSecretResponse, AWSError>;
|
38
38
|
/**
|
@@ -108,11 +108,11 @@ declare class SecretsManager extends Service {
|
|
108
108
|
*/
|
109
109
|
putResourcePolicy(callback?: (err: AWSError, data: SecretsManager.Types.PutResourcePolicyResponse) => void): Request<SecretsManager.Types.PutResourcePolicyResponse, AWSError>;
|
110
110
|
/**
|
111
|
-
* Creates a new version with a new encrypted secret value and attaches it to the secret. The version can contain a new SecretString value or a new SecretBinary value. We recommend you avoid calling PutSecretValue at a sustained rate of more than once every 10 minutes. When you update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you call PutSecretValue more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. You can specify the staging labels to attach to the new version in VersionStages. If you don't include VersionStages, then Secrets Manager automatically moves the staging label AWSCURRENT to this version. If this operation creates the first version for the secret, then Secrets Manager automatically attaches the staging label AWSCURRENT to it. If this operation moves the staging label AWSCURRENT from another version to this version, then Secrets Manager also automatically moves the staging label AWSPREVIOUS to the version that AWSCURRENT was removed from. This operation is idempotent. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, and you specify the same secret data, the operation succeeds but does nothing. However, if the secret data is different, then the operation fails because you can't modify an existing version; you can only create new ones. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary, SecretString, or RotationToken because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:PutSecretValue. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager.
|
111
|
+
* Creates a new version with a new encrypted secret value and attaches it to the secret. The version can contain a new SecretString value or a new SecretBinary value. We recommend you avoid calling PutSecretValue at a sustained rate of more than once every 10 minutes. When you update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you call PutSecretValue more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. You can specify the staging labels to attach to the new version in VersionStages. If you don't include VersionStages, then Secrets Manager automatically moves the staging label AWSCURRENT to this version. If this operation creates the first version for the secret, then Secrets Manager automatically attaches the staging label AWSCURRENT to it. If this operation moves the staging label AWSCURRENT from another version to this version, then Secrets Manager also automatically moves the staging label AWSPREVIOUS to the version that AWSCURRENT was removed from. This operation is idempotent. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, and you specify the same secret data, the operation succeeds but does nothing. However, if the secret data is different, then the operation fails because you can't modify an existing version; you can only create new ones. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary, SecretString, or RotationToken because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:PutSecretValue. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. When you enter commands in a command shell, there is a risk of the command history being accessed or utilities having access to your command parameters. This is a concern if the command includes the value of a secret. Learn how to Mitigate the risks of using command-line tools to store Secrets Manager secrets.
|
112
112
|
*/
|
113
113
|
putSecretValue(params: SecretsManager.Types.PutSecretValueRequest, callback?: (err: AWSError, data: SecretsManager.Types.PutSecretValueResponse) => void): Request<SecretsManager.Types.PutSecretValueResponse, AWSError>;
|
114
114
|
/**
|
115
|
-
* Creates a new version with a new encrypted secret value and attaches it to the secret. The version can contain a new SecretString value or a new SecretBinary value. We recommend you avoid calling PutSecretValue at a sustained rate of more than once every 10 minutes. When you update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you call PutSecretValue more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. You can specify the staging labels to attach to the new version in VersionStages. If you don't include VersionStages, then Secrets Manager automatically moves the staging label AWSCURRENT to this version. If this operation creates the first version for the secret, then Secrets Manager automatically attaches the staging label AWSCURRENT to it. If this operation moves the staging label AWSCURRENT from another version to this version, then Secrets Manager also automatically moves the staging label AWSPREVIOUS to the version that AWSCURRENT was removed from. This operation is idempotent. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, and you specify the same secret data, the operation succeeds but does nothing. However, if the secret data is different, then the operation fails because you can't modify an existing version; you can only create new ones. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary, SecretString, or RotationToken because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:PutSecretValue. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager.
|
115
|
+
* Creates a new version with a new encrypted secret value and attaches it to the secret. The version can contain a new SecretString value or a new SecretBinary value. We recommend you avoid calling PutSecretValue at a sustained rate of more than once every 10 minutes. When you update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you call PutSecretValue more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. You can specify the staging labels to attach to the new version in VersionStages. If you don't include VersionStages, then Secrets Manager automatically moves the staging label AWSCURRENT to this version. If this operation creates the first version for the secret, then Secrets Manager automatically attaches the staging label AWSCURRENT to it. If this operation moves the staging label AWSCURRENT from another version to this version, then Secrets Manager also automatically moves the staging label AWSPREVIOUS to the version that AWSCURRENT was removed from. This operation is idempotent. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, and you specify the same secret data, the operation succeeds but does nothing. However, if the secret data is different, then the operation fails because you can't modify an existing version; you can only create new ones. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary, SecretString, or RotationToken because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:PutSecretValue. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. When you enter commands in a command shell, there is a risk of the command history being accessed or utilities having access to your command parameters. This is a concern if the command includes the value of a secret. Learn how to Mitigate the risks of using command-line tools to store Secrets Manager secrets.
|
116
116
|
*/
|
117
117
|
putSecretValue(callback?: (err: AWSError, data: SecretsManager.Types.PutSecretValueResponse) => void): Request<SecretsManager.Types.PutSecretValueResponse, AWSError>;
|
118
118
|
/**
|
@@ -172,11 +172,11 @@ declare class SecretsManager extends Service {
|
|
172
172
|
*/
|
173
173
|
untagResource(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
174
174
|
/**
|
175
|
-
* Modifies the details of a secret, including metadata and the secret value. To change the secret value, you can also use PutSecretValue. To change the rotation configuration of a secret, use RotateSecret instead. To change a secret so that it is managed by another service, you need to recreate the secret in that service. See Secrets Manager secrets managed by other Amazon Web Services services. We recommend you avoid calling UpdateSecret at a sustained rate of more than once every 10 minutes. When you call UpdateSecret to update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you update the secret value more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. If you include SecretString or SecretBinary to create a new secret version, Secrets Manager automatically moves the staging label AWSCURRENT to the new version. Then it attaches the label AWSPREVIOUS to the version that AWSCURRENT was removed from. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, the operation results in an error. You can't modify an existing version, you can only create a new version. To remove a version, remove all staging labels from it. See UpdateSecretVersionStage. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:UpdateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. If you use a customer managed key, you must also have kms:GenerateDataKey, kms:Encrypt, and kms:Decrypt permissions on the key. If you change the KMS key and you don't have kms:Encrypt permission to the new key, Secrets Manager does not re-
|
175
|
+
* Modifies the details of a secret, including metadata and the secret value. To change the secret value, you can also use PutSecretValue. To change the rotation configuration of a secret, use RotateSecret instead. To change a secret so that it is managed by another service, you need to recreate the secret in that service. See Secrets Manager secrets managed by other Amazon Web Services services. We recommend you avoid calling UpdateSecret at a sustained rate of more than once every 10 minutes. When you call UpdateSecret to update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you update the secret value more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. If you include SecretString or SecretBinary to create a new secret version, Secrets Manager automatically moves the staging label AWSCURRENT to the new version. Then it attaches the label AWSPREVIOUS to the version that AWSCURRENT was removed from. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, the operation results in an error. You can't modify an existing version, you can only create a new version. To remove a version, remove all staging labels from it. See UpdateSecretVersionStage. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:UpdateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. If you use a customer managed key, you must also have kms:GenerateDataKey, kms:Encrypt, and kms:Decrypt permissions on the key. If you change the KMS key and you don't have kms:Encrypt permission to the new key, Secrets Manager does not re-encrypt existing secret versions with the new key. For more information, see Secret encryption and decryption. When you enter commands in a command shell, there is a risk of the command history being accessed or utilities having access to your command parameters. This is a concern if the command includes the value of a secret. Learn how to Mitigate the risks of using command-line tools to store Secrets Manager secrets.
|
176
176
|
*/
|
177
177
|
updateSecret(params: SecretsManager.Types.UpdateSecretRequest, callback?: (err: AWSError, data: SecretsManager.Types.UpdateSecretResponse) => void): Request<SecretsManager.Types.UpdateSecretResponse, AWSError>;
|
178
178
|
/**
|
179
|
-
* Modifies the details of a secret, including metadata and the secret value. To change the secret value, you can also use PutSecretValue. To change the rotation configuration of a secret, use RotateSecret instead. To change a secret so that it is managed by another service, you need to recreate the secret in that service. See Secrets Manager secrets managed by other Amazon Web Services services. We recommend you avoid calling UpdateSecret at a sustained rate of more than once every 10 minutes. When you call UpdateSecret to update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you update the secret value more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. If you include SecretString or SecretBinary to create a new secret version, Secrets Manager automatically moves the staging label AWSCURRENT to the new version. Then it attaches the label AWSPREVIOUS to the version that AWSCURRENT was removed from. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, the operation results in an error. You can't modify an existing version, you can only create a new version. To remove a version, remove all staging labels from it. See UpdateSecretVersionStage. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:UpdateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. If you use a customer managed key, you must also have kms:GenerateDataKey, kms:Encrypt, and kms:Decrypt permissions on the key. If you change the KMS key and you don't have kms:Encrypt permission to the new key, Secrets Manager does not re-
|
179
|
+
* Modifies the details of a secret, including metadata and the secret value. To change the secret value, you can also use PutSecretValue. To change the rotation configuration of a secret, use RotateSecret instead. To change a secret so that it is managed by another service, you need to recreate the secret in that service. See Secrets Manager secrets managed by other Amazon Web Services services. We recommend you avoid calling UpdateSecret at a sustained rate of more than once every 10 minutes. When you call UpdateSecret to update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you update the secret value more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. If you include SecretString or SecretBinary to create a new secret version, Secrets Manager automatically moves the staging label AWSCURRENT to the new version. Then it attaches the label AWSPREVIOUS to the version that AWSCURRENT was removed from. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, the operation results in an error. You can't modify an existing version, you can only create a new version. To remove a version, remove all staging labels from it. See UpdateSecretVersionStage. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:UpdateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. If you use a customer managed key, you must also have kms:GenerateDataKey, kms:Encrypt, and kms:Decrypt permissions on the key. If you change the KMS key and you don't have kms:Encrypt permission to the new key, Secrets Manager does not re-encrypt existing secret versions with the new key. For more information, see Secret encryption and decryption. When you enter commands in a command shell, there is a risk of the command history being accessed or utilities having access to your command parameters. This is a concern if the command includes the value of a secret. Learn how to Mitigate the risks of using command-line tools to store Secrets Manager secrets.
|
180
180
|
*/
|
181
181
|
updateSecret(callback?: (err: AWSError, data: SecretsManager.Types.UpdateSecretResponse) => void): Request<SecretsManager.Types.UpdateSecretResponse, AWSError>;
|
182
182
|
/**
|
@@ -1079,7 +1079,7 @@ declare namespace SecretsManager {
|
|
1079
1079
|
*/
|
1080
1080
|
Description?: DescriptionType;
|
1081
1081
|
/**
|
1082
|
-
* The ARN, key ID, or alias of the KMS key that Secrets Manager uses to encrypt new secret versions as well as any existing versions with the staging labels AWSCURRENT, AWSPENDING, or AWSPREVIOUS. If you don't have kms:Encrypt permission to the new key, Secrets Manager does not re-
|
1082
|
+
* The ARN, key ID, or alias of the KMS key that Secrets Manager uses to encrypt new secret versions as well as any existing versions with the staging labels AWSCURRENT, AWSPENDING, or AWSPREVIOUS. If you don't have kms:Encrypt permission to the new key, Secrets Manager does not re-encrypt existing secret versions with the new key. For more information about versions and staging labels, see Concepts: Version. A key alias is always prefixed by alias/, for example alias/aws/secretsmanager. For more information, see About aliases. If you set this to an empty string, Secrets Manager uses the Amazon Web Services managed key aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant delay in returning the result. You can only use the Amazon Web Services managed key aws/secretsmanager if you call this operation using credentials from the same Amazon Web Services account that owns the secret. If the secret is in a different account, then you must use a customer managed key and provide the ARN of that KMS key in this field. The user making the call must have permissions to both the secret and the KMS key in their respective accounts.
|
1083
1083
|
*/
|
1084
1084
|
KmsKeyId?: KmsKeyIdType;
|
1085
1085
|
/**
|
@@ -875,7 +875,7 @@ declare namespace TimestreamQuery {
|
|
875
875
|
*/
|
876
876
|
MaxQueryTCU?: MaxQueryCapacity;
|
877
877
|
/**
|
878
|
-
* The pricing model for queries in an account.
|
878
|
+
* The pricing model for queries in an account. The QueryPricingModel parameter is used by several Timestream operations; however, the UpdateAccountSettings API operation doesn't recognize any values other than COMPUTE_UNITS.
|
879
879
|
*/
|
880
880
|
QueryPricingModel?: QueryPricingModel;
|
881
881
|
}
|
@@ -475,7 +475,7 @@ declare namespace WorkSpacesThinClient {
|
|
475
475
|
*/
|
476
476
|
tags?: TagsMap;
|
477
477
|
/**
|
478
|
-
*
|
478
|
+
* The tag keys and optional values for the newly created devices for this environment.
|
479
479
|
*/
|
480
480
|
deviceCreationTags?: DeviceCreationTagsMap;
|
481
481
|
}
|