aws-sdk 2.566.0 → 2.570.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (44) hide show
  1. package/CHANGELOG.md +20 -1
  2. package/README.md +1 -1
  3. package/apis/ce-2017-10-25.min.json +110 -71
  4. package/apis/cloudformation-2010-05-15.min.json +68 -29
  5. package/apis/cloudformation-2010-05-15.waiters2.json +56 -1
  6. package/apis/codepipeline-2015-07-09.min.json +58 -40
  7. package/apis/cognito-identity-2014-06-30.min.json +50 -42
  8. package/apis/dynamodb-2012-08-10.min.json +66 -40
  9. package/apis/marketplace-catalog-2018-09-17.examples.json +5 -0
  10. package/apis/marketplace-catalog-2018-09-17.min.json +305 -0
  11. package/apis/marketplace-catalog-2018-09-17.paginators.json +14 -0
  12. package/apis/metadata.json +11 -0
  13. package/apis/sso-2019-06-10.examples.json +5 -0
  14. package/apis/sso-2019-06-10.min.json +190 -0
  15. package/apis/sso-2019-06-10.paginators.json +16 -0
  16. package/apis/sso-oidc-2019-06-10.examples.json +5 -0
  17. package/apis/sso-oidc-2019-06-10.min.json +131 -0
  18. package/apis/sso-oidc-2019-06-10.paginators.json +4 -0
  19. package/clients/all.d.ts +3 -0
  20. package/clients/all.js +4 -1
  21. package/clients/cloudformation.d.ts +65 -15
  22. package/clients/codepipeline.d.ts +26 -0
  23. package/clients/cognitoidentity.d.ts +14 -5
  24. package/clients/comprehend.d.ts +2 -2
  25. package/clients/costexplorer.d.ts +66 -18
  26. package/clients/dynamodb.d.ts +85 -53
  27. package/clients/ecr.d.ts +4 -4
  28. package/clients/elbv2.d.ts +14 -14
  29. package/clients/marketplacecatalog.d.ts +421 -0
  30. package/clients/marketplacecatalog.js +18 -0
  31. package/clients/sso.d.ts +197 -0
  32. package/clients/sso.js +18 -0
  33. package/clients/ssooidc.d.ts +210 -0
  34. package/clients/ssooidc.js +18 -0
  35. package/clients/transcribeservice.d.ts +8 -5
  36. package/dist/aws-sdk-core-react-native.js +2 -2
  37. package/dist/aws-sdk-react-native.js +239 -76
  38. package/dist/aws-sdk.js +423 -227
  39. package/dist/aws-sdk.min.js +69 -69
  40. package/dist/xml2js.js +117 -65
  41. package/lib/config_service_placeholders.d.ts +6 -0
  42. package/lib/core.js +1 -1
  43. package/lib/dynamodb/document_client.d.ts +81 -49
  44. package/package.json +1 -1
@@ -0,0 +1,131 @@
1
+ {
2
+ "version": "2.0",
3
+ "metadata": {
4
+ "apiVersion": "2019-06-10",
5
+ "endpointPrefix": "oidc",
6
+ "jsonVersion": "1.1",
7
+ "protocol": "rest-json",
8
+ "serviceAbbreviation": "SSO OIDC",
9
+ "serviceFullName": "AWS SSO OIDC",
10
+ "serviceId": "SSO OIDC",
11
+ "signatureVersion": "v4",
12
+ "signingName": "awsssooidc",
13
+ "uid": "sso-oidc-2019-06-10"
14
+ },
15
+ "operations": {
16
+ "CreateToken": {
17
+ "http": {
18
+ "requestUri": "/token"
19
+ },
20
+ "input": {
21
+ "type": "structure",
22
+ "required": [
23
+ "clientId",
24
+ "clientSecret",
25
+ "grantType",
26
+ "deviceCode"
27
+ ],
28
+ "members": {
29
+ "clientId": {},
30
+ "clientSecret": {},
31
+ "grantType": {},
32
+ "deviceCode": {},
33
+ "code": {},
34
+ "refreshToken": {},
35
+ "scope": {
36
+ "shape": "S8"
37
+ },
38
+ "redirectUri": {}
39
+ }
40
+ },
41
+ "output": {
42
+ "type": "structure",
43
+ "members": {
44
+ "accessToken": {},
45
+ "tokenType": {},
46
+ "expiresIn": {
47
+ "type": "integer"
48
+ },
49
+ "refreshToken": {},
50
+ "idToken": {}
51
+ }
52
+ },
53
+ "authtype": "none"
54
+ },
55
+ "RegisterClient": {
56
+ "http": {
57
+ "requestUri": "/client/register"
58
+ },
59
+ "input": {
60
+ "type": "structure",
61
+ "required": [
62
+ "clientName",
63
+ "clientType"
64
+ ],
65
+ "members": {
66
+ "clientName": {},
67
+ "clientType": {},
68
+ "scopes": {
69
+ "shape": "S8"
70
+ }
71
+ }
72
+ },
73
+ "output": {
74
+ "type": "structure",
75
+ "members": {
76
+ "clientId": {},
77
+ "clientSecret": {},
78
+ "clientIdIssuedAt": {
79
+ "type": "long"
80
+ },
81
+ "clientSecretExpiresAt": {
82
+ "type": "long"
83
+ },
84
+ "authorizationEndpoint": {},
85
+ "tokenEndpoint": {}
86
+ }
87
+ },
88
+ "authtype": "none"
89
+ },
90
+ "StartDeviceAuthorization": {
91
+ "http": {
92
+ "requestUri": "/device_authorization"
93
+ },
94
+ "input": {
95
+ "type": "structure",
96
+ "required": [
97
+ "clientId",
98
+ "clientSecret",
99
+ "startUrl"
100
+ ],
101
+ "members": {
102
+ "clientId": {},
103
+ "clientSecret": {},
104
+ "startUrl": {}
105
+ }
106
+ },
107
+ "output": {
108
+ "type": "structure",
109
+ "members": {
110
+ "deviceCode": {},
111
+ "userCode": {},
112
+ "verificationUri": {},
113
+ "verificationUriComplete": {},
114
+ "expiresIn": {
115
+ "type": "integer"
116
+ },
117
+ "interval": {
118
+ "type": "integer"
119
+ }
120
+ }
121
+ },
122
+ "authtype": "none"
123
+ }
124
+ },
125
+ "shapes": {
126
+ "S8": {
127
+ "type": "list",
128
+ "member": {}
129
+ }
130
+ }
131
+ }
@@ -0,0 +1,4 @@
1
+ {
2
+ "pagination": {
3
+ }
4
+ }
package/clients/all.d.ts CHANGED
@@ -192,3 +192,6 @@ export import QLDBSession = require('./qldbsession');
192
192
  export import WorkMailMessageFlow = require('./workmailmessageflow');
193
193
  export import CodeStarNotifications = require('./codestarnotifications');
194
194
  export import SavingsPlans = require('./savingsplans');
195
+ export import SSO = require('./sso');
196
+ export import SSOOIDC = require('./ssooidc');
197
+ export import MarketplaceCatalog = require('./marketplacecatalog');
package/clients/all.js CHANGED
@@ -193,5 +193,8 @@ module.exports = {
193
193
  QLDBSession: require('./qldbsession'),
194
194
  WorkMailMessageFlow: require('./workmailmessageflow'),
195
195
  CodeStarNotifications: require('./codestarnotifications'),
196
- SavingsPlans: require('./savingsplans')
196
+ SavingsPlans: require('./savingsplans'),
197
+ SSO: require('./sso'),
198
+ SSOOIDC: require('./ssooidc'),
199
+ MarketplaceCatalog: require('./marketplacecatalog')
197
200
  };
@@ -29,11 +29,11 @@ declare class CloudFormation extends Service {
29
29
  */
30
30
  continueUpdateRollback(callback?: (err: AWSError, data: CloudFormation.Types.ContinueUpdateRollbackOutput) => void): Request<CloudFormation.Types.ContinueUpdateRollbackOutput, AWSError>;
31
31
  /**
32
- * Creates a list of changes that will be applied to a stack so that you can review the changes before executing them. You can create a change set for a stack that doesn't exist or an existing stack. If you create a change set for a stack that doesn't exist, the change set shows all of the resources that AWS CloudFormation will create. If you create a change set for an existing stack, AWS CloudFormation compares the stack's information with the information that you submit in the change set and lists the differences. Use change sets to understand which resources AWS CloudFormation will create or change, and how it will change resources in an existing stack, before you create or update a stack. To create a change set for a stack that doesn't exist, for the ChangeSetType parameter, specify CREATE. To create a change set for an existing stack, specify UPDATE for the ChangeSetType parameter. After the CreateChangeSet call successfully completes, AWS CloudFormation starts creating the change set. To check the status of the change set or to review it, use the DescribeChangeSet action. When you are satisfied with the changes the change set will make, execute the change set by using the ExecuteChangeSet action. AWS CloudFormation doesn't make changes until you execute the change set.
32
+ * Creates a list of changes that will be applied to a stack so that you can review the changes before executing them. You can create a change set for a stack that doesn't exist or an existing stack. If you create a change set for a stack that doesn't exist, the change set shows all of the resources that AWS CloudFormation will create. If you create a change set for an existing stack, AWS CloudFormation compares the stack's information with the information that you submit in the change set and lists the differences. Use change sets to understand which resources AWS CloudFormation will create or change, and how it will change resources in an existing stack, before you create or update a stack. To create a change set for a stack that doesn't exist, for the ChangeSetType parameter, specify CREATE. To create a change set for an existing stack, specify UPDATE for the ChangeSetType parameter. To create a change set for an import operation, specify IMPORT for the ChangeSetType parameter. After the CreateChangeSet call successfully completes, AWS CloudFormation starts creating the change set. To check the status of the change set or to review it, use the DescribeChangeSet action. When you are satisfied with the changes the change set will make, execute the change set by using the ExecuteChangeSet action. AWS CloudFormation doesn't make changes until you execute the change set.
33
33
  */
34
34
  createChangeSet(params: CloudFormation.Types.CreateChangeSetInput, callback?: (err: AWSError, data: CloudFormation.Types.CreateChangeSetOutput) => void): Request<CloudFormation.Types.CreateChangeSetOutput, AWSError>;
35
35
  /**
36
- * Creates a list of changes that will be applied to a stack so that you can review the changes before executing them. You can create a change set for a stack that doesn't exist or an existing stack. If you create a change set for a stack that doesn't exist, the change set shows all of the resources that AWS CloudFormation will create. If you create a change set for an existing stack, AWS CloudFormation compares the stack's information with the information that you submit in the change set and lists the differences. Use change sets to understand which resources AWS CloudFormation will create or change, and how it will change resources in an existing stack, before you create or update a stack. To create a change set for a stack that doesn't exist, for the ChangeSetType parameter, specify CREATE. To create a change set for an existing stack, specify UPDATE for the ChangeSetType parameter. After the CreateChangeSet call successfully completes, AWS CloudFormation starts creating the change set. To check the status of the change set or to review it, use the DescribeChangeSet action. When you are satisfied with the changes the change set will make, execute the change set by using the ExecuteChangeSet action. AWS CloudFormation doesn't make changes until you execute the change set.
36
+ * Creates a list of changes that will be applied to a stack so that you can review the changes before executing them. You can create a change set for a stack that doesn't exist or an existing stack. If you create a change set for a stack that doesn't exist, the change set shows all of the resources that AWS CloudFormation will create. If you create a change set for an existing stack, AWS CloudFormation compares the stack's information with the information that you submit in the change set and lists the differences. Use change sets to understand which resources AWS CloudFormation will create or change, and how it will change resources in an existing stack, before you create or update a stack. To create a change set for a stack that doesn't exist, for the ChangeSetType parameter, specify CREATE. To create a change set for an existing stack, specify UPDATE for the ChangeSetType parameter. To create a change set for an import operation, specify IMPORT for the ChangeSetType parameter. After the CreateChangeSet call successfully completes, AWS CloudFormation starts creating the change set. To check the status of the change set or to review it, use the DescribeChangeSet action. When you are satisfied with the changes the change set will make, execute the change set by using the ExecuteChangeSet action. AWS CloudFormation doesn't make changes until you execute the change set.
37
37
  */
38
38
  createChangeSet(callback?: (err: AWSError, data: CloudFormation.Types.CreateChangeSetOutput) => void): Request<CloudFormation.Types.CreateChangeSetOutput, AWSError>;
39
39
  /**
@@ -404,6 +404,14 @@ declare class CloudFormation extends Service {
404
404
  * Waits for the stackUpdateComplete state by periodically calling the underlying CloudFormation.describeStacksoperation every 30 seconds (at most 120 times). Wait until stack status is UPDATE_COMPLETE.
405
405
  */
406
406
  waitFor(state: "stackUpdateComplete", callback?: (err: AWSError, data: CloudFormation.Types.DescribeStacksOutput) => void): Request<CloudFormation.Types.DescribeStacksOutput, AWSError>;
407
+ /**
408
+ * Waits for the stackImportComplete state by periodically calling the underlying CloudFormation.describeStacksoperation every 30 seconds (at most 120 times). Wait until stack status is IMPORT_COMPLETE.
409
+ */
410
+ waitFor(state: "stackImportComplete", params: CloudFormation.Types.DescribeStacksInput & {$waiter?: WaiterConfiguration}, callback?: (err: AWSError, data: CloudFormation.Types.DescribeStacksOutput) => void): Request<CloudFormation.Types.DescribeStacksOutput, AWSError>;
411
+ /**
412
+ * Waits for the stackImportComplete state by periodically calling the underlying CloudFormation.describeStacksoperation every 30 seconds (at most 120 times). Wait until stack status is IMPORT_COMPLETE.
413
+ */
414
+ waitFor(state: "stackImportComplete", callback?: (err: AWSError, data: CloudFormation.Types.DescribeStacksOutput) => void): Request<CloudFormation.Types.DescribeStacksOutput, AWSError>;
407
415
  /**
408
416
  * Waits for the changeSetCreateComplete state by periodically calling the underlying CloudFormation.describeChangeSetoperation every 30 seconds (at most 120 times). Wait until change set status is CREATE_COMPLETE.
409
417
  */
@@ -429,7 +437,7 @@ declare namespace CloudFormation {
429
437
  export type AccountGateStatusReason = string;
430
438
  export interface AccountLimit {
431
439
  /**
432
- * The name of the account limit.
440
+ * The name of the account limit. Values: ConcurrentResourcesLimit | StackLimit | StackOutputsLimit
433
441
  */
434
442
  Name?: LimitName;
435
443
  /**
@@ -468,7 +476,7 @@ declare namespace CloudFormation {
468
476
  */
469
477
  ResourceChange?: ResourceChange;
470
478
  }
471
- export type ChangeAction = "Add"|"Modify"|"Remove"|string;
479
+ export type ChangeAction = "Add"|"Modify"|"Remove"|"Import"|string;
472
480
  export type ChangeSetId = string;
473
481
  export type ChangeSetName = string;
474
482
  export type ChangeSetNameOrId = string;
@@ -513,7 +521,7 @@ declare namespace CloudFormation {
513
521
  */
514
522
  Description?: Description;
515
523
  }
516
- export type ChangeSetType = "CREATE"|"UPDATE"|string;
524
+ export type ChangeSetType = "CREATE"|"UPDATE"|"IMPORT"|string;
517
525
  export type ChangeSource = "ResourceReference"|"ParameterReference"|"ResourceAttribute"|"DirectModification"|"Automatic"|string;
518
526
  export type ChangeType = "Resource"|string;
519
527
  export type Changes = Change[];
@@ -561,7 +569,7 @@ declare namespace CloudFormation {
561
569
  */
562
570
  Parameters?: Parameters;
563
571
  /**
564
- * In some cases, you must explicity acknowledge that your stack template contains certain capabilities in order for AWS CloudFormation to create the stack. CAPABILITY_IAM and CAPABILITY_NAMED_IAM Some stack templates might include resources that can affect permissions in your AWS account; for example, by creating new AWS Identity and Access Management (IAM) users. For those stacks, you must explicitly acknowledge this by specifying one of these capabilities. The following IAM resources require you to specify either the CAPABILITY_IAM or CAPABILITY_NAMED_IAM capability. If you have IAM resources, you can specify either capability. If you have IAM resources with custom names, you must specify CAPABILITY_NAMED_IAM. If you don't specify either of these capabilities, AWS CloudFormation returns an InsufficientCapabilities error. If your stack template contains these resources, we recommend that you review all permissions associated with them and edit their permissions if necessary. AWS::IAM::AccessKey AWS::IAM::Group AWS::IAM::InstanceProfile AWS::IAM::Policy AWS::IAM::Role AWS::IAM::User AWS::IAM::UserToGroupAddition For more information, see Acknowledging IAM Resources in AWS CloudFormation Templates. CAPABILITY_AUTO_EXPAND Some template contain macros. Macros perform custom processing on templates; this can include simple actions like find-and-replace operations, all the way to extensive transformations of entire templates. Because of this, users typically create a change set from the processed template, so that they can review the changes resulting from the macros before actually creating the stack. If your stack template contains one or more macros, and you choose to create a stack directly from the processed template, without first reviewing the resulting changes in a change set, you must acknowledge this capability. This includes the AWS::Include and AWS::Serverless transforms, which are macros hosted by AWS CloudFormation. This capacity does not apply to creating change sets, and specifying it when creating change sets has no effect. Also, change sets do not currently support nested stacks. If you want to create a stack from a stack template that contains macros and nested stacks, you must create or update the stack directly from the template using the CreateStack or UpdateStack action, and specifying this capability. For more information on macros, see Using AWS CloudFormation Macros to Perform Custom Processing on Templates.
572
+ * In some cases, you must explicitly acknowledge that your stack template contains certain capabilities in order for AWS CloudFormation to create the stack. CAPABILITY_IAM and CAPABILITY_NAMED_IAM Some stack templates might include resources that can affect permissions in your AWS account; for example, by creating new AWS Identity and Access Management (IAM) users. For those stacks, you must explicitly acknowledge this by specifying one of these capabilities. The following IAM resources require you to specify either the CAPABILITY_IAM or CAPABILITY_NAMED_IAM capability. If you have IAM resources, you can specify either capability. If you have IAM resources with custom names, you must specify CAPABILITY_NAMED_IAM. If you don't specify either of these capabilities, AWS CloudFormation returns an InsufficientCapabilities error. If your stack template contains these resources, we recommend that you review all permissions associated with them and edit their permissions if necessary. AWS::IAM::AccessKey AWS::IAM::Group AWS::IAM::InstanceProfile AWS::IAM::Policy AWS::IAM::Role AWS::IAM::User AWS::IAM::UserToGroupAddition For more information, see Acknowledging IAM Resources in AWS CloudFormation Templates. CAPABILITY_AUTO_EXPAND Some template contain macros. Macros perform custom processing on templates; this can include simple actions like find-and-replace operations, all the way to extensive transformations of entire templates. Because of this, users typically create a change set from the processed template, so that they can review the changes resulting from the macros before actually creating the stack. If your stack template contains one or more macros, and you choose to create a stack directly from the processed template, without first reviewing the resulting changes in a change set, you must acknowledge this capability. This includes the AWS::Include and AWS::Serverless transforms, which are macros hosted by AWS CloudFormation. This capacity does not apply to creating change sets, and specifying it when creating change sets has no effect. Also, change sets do not currently support nested stacks. If you want to create a stack from a stack template that contains macros and nested stacks, you must create or update the stack directly from the template using the CreateStack or UpdateStack action, and specifying this capability. For more information on macros, see Using AWS CloudFormation Macros to Perform Custom Processing on Templates.
565
573
  */
566
574
  Capabilities?: Capabilities;
567
575
  /**
@@ -597,9 +605,13 @@ declare namespace CloudFormation {
597
605
  */
598
606
  Description?: Description;
599
607
  /**
600
- * The type of change set operation. To create a change set for a new stack, specify CREATE. To create a change set for an existing stack, specify UPDATE. If you create a change set for a new stack, AWS Cloudformation creates a stack with a unique stack ID, but no template or resources. The stack will be in the REVIEW_IN_PROGRESS state until you execute the change set. By default, AWS CloudFormation specifies UPDATE. You can't use the UPDATE type to create a change set for a new stack or the CREATE type to create a change set for an existing stack.
608
+ * The type of change set operation. To create a change set for a new stack, specify CREATE. To create a change set for an existing stack, specify UPDATE. To create a change set for an import operation, specify IMPORT. If you create a change set for a new stack, AWS Cloudformation creates a stack with a unique stack ID, but no template or resources. The stack will be in the REVIEW_IN_PROGRESS state until you execute the change set. By default, AWS CloudFormation specifies UPDATE. You can't use the UPDATE type to create a change set for a new stack or the CREATE type to create a change set for an existing stack.
601
609
  */
602
610
  ChangeSetType?: ChangeSetType;
611
+ /**
612
+ * The resources to import into your stack.
613
+ */
614
+ ResourcesToImport?: ResourcesToImport;
603
615
  }
604
616
  export interface CreateChangeSetOutput {
605
617
  /**
@@ -645,7 +657,7 @@ declare namespace CloudFormation {
645
657
  */
646
658
  NotificationARNs?: NotificationARNs;
647
659
  /**
648
- * In some cases, you must explicity acknowledge that your stack template contains certain capabilities in order for AWS CloudFormation to create the stack. CAPABILITY_IAM and CAPABILITY_NAMED_IAM Some stack templates might include resources that can affect permissions in your AWS account; for example, by creating new AWS Identity and Access Management (IAM) users. For those stacks, you must explicitly acknowledge this by specifying one of these capabilities. The following IAM resources require you to specify either the CAPABILITY_IAM or CAPABILITY_NAMED_IAM capability. If you have IAM resources, you can specify either capability. If you have IAM resources with custom names, you must specify CAPABILITY_NAMED_IAM. If you don't specify either of these capabilities, AWS CloudFormation returns an InsufficientCapabilities error. If your stack template contains these resources, we recommend that you review all permissions associated with them and edit their permissions if necessary. AWS::IAM::AccessKey AWS::IAM::Group AWS::IAM::InstanceProfile AWS::IAM::Policy AWS::IAM::Role AWS::IAM::User AWS::IAM::UserToGroupAddition For more information, see Acknowledging IAM Resources in AWS CloudFormation Templates. CAPABILITY_AUTO_EXPAND Some template contain macros. Macros perform custom processing on templates; this can include simple actions like find-and-replace operations, all the way to extensive transformations of entire templates. Because of this, users typically create a change set from the processed template, so that they can review the changes resulting from the macros before actually creating the stack. If your stack template contains one or more macros, and you choose to create a stack directly from the processed template, without first reviewing the resulting changes in a change set, you must acknowledge this capability. This includes the AWS::Include and AWS::Serverless transforms, which are macros hosted by AWS CloudFormation. Change sets do not currently support nested stacks. If you want to create a stack from a stack template that contains macros and nested stacks, you must create the stack directly from the template using this capability. You should only create stacks directly from a stack template that contains macros if you know what processing the macro performs. Each macro relies on an underlying Lambda service function for processing stack templates. Be aware that the Lambda function owner can update the function operation without AWS CloudFormation being notified. For more information, see Using AWS CloudFormation Macros to Perform Custom Processing on Templates.
660
+ * In some cases, you must explicitly acknowledge that your stack template contains certain capabilities in order for AWS CloudFormation to create the stack. CAPABILITY_IAM and CAPABILITY_NAMED_IAM Some stack templates might include resources that can affect permissions in your AWS account; for example, by creating new AWS Identity and Access Management (IAM) users. For those stacks, you must explicitly acknowledge this by specifying one of these capabilities. The following IAM resources require you to specify either the CAPABILITY_IAM or CAPABILITY_NAMED_IAM capability. If you have IAM resources, you can specify either capability. If you have IAM resources with custom names, you must specify CAPABILITY_NAMED_IAM. If you don't specify either of these capabilities, AWS CloudFormation returns an InsufficientCapabilities error. If your stack template contains these resources, we recommend that you review all permissions associated with them and edit their permissions if necessary. AWS::IAM::AccessKey AWS::IAM::Group AWS::IAM::InstanceProfile AWS::IAM::Policy AWS::IAM::Role AWS::IAM::User AWS::IAM::UserToGroupAddition For more information, see Acknowledging IAM Resources in AWS CloudFormation Templates. CAPABILITY_AUTO_EXPAND Some template contain macros. Macros perform custom processing on templates; this can include simple actions like find-and-replace operations, all the way to extensive transformations of entire templates. Because of this, users typically create a change set from the processed template, so that they can review the changes resulting from the macros before actually creating the stack. If your stack template contains one or more macros, and you choose to create a stack directly from the processed template, without first reviewing the resulting changes in a change set, you must acknowledge this capability. This includes the AWS::Include and AWS::Serverless transforms, which are macros hosted by AWS CloudFormation. Change sets do not currently support nested stacks. If you want to create a stack from a stack template that contains macros and nested stacks, you must create the stack directly from the template using this capability. You should only create stacks directly from a stack template that contains macros if you know what processing the macro performs. Each macro relies on an underlying Lambda service function for processing stack templates. Be aware that the Lambda function owner can update the function operation without AWS CloudFormation being notified. For more information, see Using AWS CloudFormation Macros to Perform Custom Processing on Templates.
649
661
  */
650
662
  Capabilities?: Capabilities;
651
663
  /**
@@ -741,7 +753,7 @@ declare namespace CloudFormation {
741
753
  */
742
754
  Parameters?: Parameters;
743
755
  /**
744
- * In some cases, you must explicity acknowledge that your stack set template contains certain capabilities in order for AWS CloudFormation to create the stack set and related stack instances. CAPABILITY_IAM and CAPABILITY_NAMED_IAM Some stack templates might include resources that can affect permissions in your AWS account; for example, by creating new AWS Identity and Access Management (IAM) users. For those stack sets, you must explicitly acknowledge this by specifying one of these capabilities. The following IAM resources require you to specify either the CAPABILITY_IAM or CAPABILITY_NAMED_IAM capability. If you have IAM resources, you can specify either capability. If you have IAM resources with custom names, you must specify CAPABILITY_NAMED_IAM. If you don't specify either of these capabilities, AWS CloudFormation returns an InsufficientCapabilities error. If your stack template contains these resources, we recommend that you review all permissions associated with them and edit their permissions if necessary. AWS::IAM::AccessKey AWS::IAM::Group AWS::IAM::InstanceProfile AWS::IAM::Policy AWS::IAM::Role AWS::IAM::User AWS::IAM::UserToGroupAddition For more information, see Acknowledging IAM Resources in AWS CloudFormation Templates. CAPABILITY_AUTO_EXPAND Some templates contain macros. If your stack template contains one or more macros, and you choose to create a stack directly from the processed template, without first reviewing the resulting changes in a change set, you must acknowledge this capability. For more information, see Using AWS CloudFormation Macros to Perform Custom Processing on Templates. Stack sets do not currently support macros in stack templates. (This includes the AWS::Include and AWS::Serverless transforms, which are macros hosted by AWS CloudFormation.) Even if you specify this capability, if you include a macro in your template the stack set operation will fail.
756
+ * In some cases, you must explicitly acknowledge that your stack set template contains certain capabilities in order for AWS CloudFormation to create the stack set and related stack instances. CAPABILITY_IAM and CAPABILITY_NAMED_IAM Some stack templates might include resources that can affect permissions in your AWS account; for example, by creating new AWS Identity and Access Management (IAM) users. For those stack sets, you must explicitly acknowledge this by specifying one of these capabilities. The following IAM resources require you to specify either the CAPABILITY_IAM or CAPABILITY_NAMED_IAM capability. If you have IAM resources, you can specify either capability. If you have IAM resources with custom names, you must specify CAPABILITY_NAMED_IAM. If you don't specify either of these capabilities, AWS CloudFormation returns an InsufficientCapabilities error. If your stack template contains these resources, we recommend that you review all permissions associated with them and edit their permissions if necessary. AWS::IAM::AccessKey AWS::IAM::Group AWS::IAM::InstanceProfile AWS::IAM::Policy AWS::IAM::Role AWS::IAM::User AWS::IAM::UserToGroupAddition For more information, see Acknowledging IAM Resources in AWS CloudFormation Templates. CAPABILITY_AUTO_EXPAND Some templates contain macros. If your stack template contains one or more macros, and you choose to create a stack directly from the processed template, without first reviewing the resulting changes in a change set, you must acknowledge this capability. For more information, see Using AWS CloudFormation Macros to Perform Custom Processing on Templates. Stack sets do not currently support macros in stack templates. (This includes the AWS::Include and AWS::Serverless transforms, which are macros hosted by AWS CloudFormation.) Even if you specify this capability, if you include a macro in your template the stack set operation will fail.
745
757
  */
746
758
  Capabilities?: Capabilities;
747
759
  /**
@@ -1305,6 +1317,10 @@ declare namespace CloudFormation {
1305
1317
  * A list of the transforms that are declared in the template.
1306
1318
  */
1307
1319
  DeclaredTransforms?: TransformsList;
1320
+ /**
1321
+ * A list of resource identifier summaries that describe the target resources of an import operation and the properties you can provide during the import to identify the target resources. For example, BucketName is a possible identifier property for an AWS::S3::Bucket resource.
1322
+ */
1323
+ ResourceIdentifierSummaries?: ResourceIdentifierSummaries;
1308
1324
  }
1309
1325
  export type Imports = StackName[];
1310
1326
  export type Key = string;
@@ -1693,10 +1709,29 @@ declare namespace CloudFormation {
1693
1709
  CausingEntity?: CausingEntity;
1694
1710
  }
1695
1711
  export type ResourceChangeDetails = ResourceChangeDetail[];
1712
+ export type ResourceIdentifierProperties = {[key: string]: ResourceIdentifierPropertyValue};
1713
+ export type ResourceIdentifierPropertyKey = string;
1714
+ export type ResourceIdentifierPropertyValue = string;
1715
+ export type ResourceIdentifierSummaries = ResourceIdentifierSummary[];
1716
+ export interface ResourceIdentifierSummary {
1717
+ /**
1718
+ * The template resource type of the target resources, such as AWS::S3::Bucket.
1719
+ */
1720
+ ResourceType?: ResourceType;
1721
+ /**
1722
+ * The logical IDs of the target resources of the specified ResourceType, as defined in the import template.
1723
+ */
1724
+ LogicalResourceIds?: LogicalResourceIds;
1725
+ /**
1726
+ * The resource properties you can provide during the import to identify your target resources. For example, BucketName is a possible identifier property for AWS::S3::Bucket resources.
1727
+ */
1728
+ ResourceIdentifiers?: ResourceIdentifiers;
1729
+ }
1730
+ export type ResourceIdentifiers = ResourceIdentifierPropertyKey[];
1696
1731
  export type ResourceProperties = string;
1697
1732
  export type ResourceSignalStatus = "SUCCESS"|"FAILURE"|string;
1698
1733
  export type ResourceSignalUniqueId = string;
1699
- export type ResourceStatus = "CREATE_IN_PROGRESS"|"CREATE_FAILED"|"CREATE_COMPLETE"|"DELETE_IN_PROGRESS"|"DELETE_FAILED"|"DELETE_COMPLETE"|"DELETE_SKIPPED"|"UPDATE_IN_PROGRESS"|"UPDATE_FAILED"|"UPDATE_COMPLETE"|string;
1734
+ export type ResourceStatus = "CREATE_IN_PROGRESS"|"CREATE_FAILED"|"CREATE_COMPLETE"|"DELETE_IN_PROGRESS"|"DELETE_FAILED"|"DELETE_COMPLETE"|"DELETE_SKIPPED"|"UPDATE_IN_PROGRESS"|"UPDATE_FAILED"|"UPDATE_COMPLETE"|"IMPORT_FAILED"|"IMPORT_COMPLETE"|"IMPORT_IN_PROGRESS"|"IMPORT_ROLLBACK_IN_PROGRESS"|"IMPORT_ROLLBACK_FAILED"|"IMPORT_ROLLBACK_COMPLETE"|string;
1700
1735
  export type ResourceStatusReason = string;
1701
1736
  export interface ResourceTargetDefinition {
1702
1737
  /**
@@ -1712,9 +1747,24 @@ declare namespace CloudFormation {
1712
1747
  */
1713
1748
  RequiresRecreation?: RequiresRecreation;
1714
1749
  }
1750
+ export interface ResourceToImport {
1751
+ /**
1752
+ * The type of resource to import into your stack, such as AWS::S3::Bucket.
1753
+ */
1754
+ ResourceType: ResourceType;
1755
+ /**
1756
+ * The logical ID of the target resource as specified in the template.
1757
+ */
1758
+ LogicalResourceId: LogicalResourceId;
1759
+ /**
1760
+ * A key-value pair that identifies the target resource. The key is an identifier property (for example, BucketName for AWS::S3::Bucket resources) and the value is the actual property value (for example, MyS3Bucket).
1761
+ */
1762
+ ResourceIdentifier: ResourceIdentifierProperties;
1763
+ }
1715
1764
  export type ResourceToSkip = string;
1716
1765
  export type ResourceType = string;
1717
1766
  export type ResourceTypes = ResourceType[];
1767
+ export type ResourcesToImport = ResourceToImport[];
1718
1768
  export type ResourcesToSkip = ResourceToSkip[];
1719
1769
  export type RetainResources = LogicalResourceId[];
1720
1770
  export type RetainStacks = boolean;
@@ -1856,7 +1906,7 @@ declare namespace CloudFormation {
1856
1906
  */
1857
1907
  ParentId?: StackId;
1858
1908
  /**
1859
- * For nested stacks--stacks created as resources for another stack--the stack ID of the the top-level stack to which the nested stack ultimately belongs. For more information, see Working with Nested Stacks in the AWS CloudFormation User Guide.
1909
+ * For nested stacks--stacks created as resources for another stack--the stack ID of the top-level stack to which the nested stack ultimately belongs. For more information, see Working with Nested Stacks in the AWS CloudFormation User Guide.
1860
1910
  */
1861
1911
  RootId?: StackId;
1862
1912
  /**
@@ -2368,7 +2418,7 @@ declare namespace CloudFormation {
2368
2418
  */
2369
2419
  Status?: StackSetStatus;
2370
2420
  }
2371
- export type StackStatus = "CREATE_IN_PROGRESS"|"CREATE_FAILED"|"CREATE_COMPLETE"|"ROLLBACK_IN_PROGRESS"|"ROLLBACK_FAILED"|"ROLLBACK_COMPLETE"|"DELETE_IN_PROGRESS"|"DELETE_FAILED"|"DELETE_COMPLETE"|"UPDATE_IN_PROGRESS"|"UPDATE_COMPLETE_CLEANUP_IN_PROGRESS"|"UPDATE_COMPLETE"|"UPDATE_ROLLBACK_IN_PROGRESS"|"UPDATE_ROLLBACK_FAILED"|"UPDATE_ROLLBACK_COMPLETE_CLEANUP_IN_PROGRESS"|"UPDATE_ROLLBACK_COMPLETE"|"REVIEW_IN_PROGRESS"|string;
2421
+ export type StackStatus = "CREATE_IN_PROGRESS"|"CREATE_FAILED"|"CREATE_COMPLETE"|"ROLLBACK_IN_PROGRESS"|"ROLLBACK_FAILED"|"ROLLBACK_COMPLETE"|"DELETE_IN_PROGRESS"|"DELETE_FAILED"|"DELETE_COMPLETE"|"UPDATE_IN_PROGRESS"|"UPDATE_COMPLETE_CLEANUP_IN_PROGRESS"|"UPDATE_COMPLETE"|"UPDATE_ROLLBACK_IN_PROGRESS"|"UPDATE_ROLLBACK_FAILED"|"UPDATE_ROLLBACK_COMPLETE_CLEANUP_IN_PROGRESS"|"UPDATE_ROLLBACK_COMPLETE"|"REVIEW_IN_PROGRESS"|"IMPORT_IN_PROGRESS"|"IMPORT_COMPLETE"|"IMPORT_ROLLBACK_IN_PROGRESS"|"IMPORT_ROLLBACK_FAILED"|"IMPORT_ROLLBACK_COMPLETE"|string;
2372
2422
  export type StackStatusFilter = StackStatus[];
2373
2423
  export type StackStatusReason = string;
2374
2424
  export type StackSummaries = StackSummary[];
@@ -2410,7 +2460,7 @@ declare namespace CloudFormation {
2410
2460
  */
2411
2461
  ParentId?: StackId;
2412
2462
  /**
2413
- * For nested stacks--stacks created as resources for another stack--the stack ID of the the top-level stack to which the nested stack ultimately belongs. For more information, see Working with Nested Stacks in the AWS CloudFormation User Guide.
2463
+ * For nested stacks--stacks created as resources for another stack--the stack ID of the top-level stack to which the nested stack ultimately belongs. For more information, see Working with Nested Stacks in the AWS CloudFormation User Guide.
2414
2464
  */
2415
2465
  RootId?: StackId;
2416
2466
  /**
@@ -2503,7 +2553,7 @@ declare namespace CloudFormation {
2503
2553
  */
2504
2554
  Parameters?: Parameters;
2505
2555
  /**
2506
- * In some cases, you must explicity acknowledge that your stack template contains certain capabilities in order for AWS CloudFormation to update the stack. CAPABILITY_IAM and CAPABILITY_NAMED_IAM Some stack templates might include resources that can affect permissions in your AWS account; for example, by creating new AWS Identity and Access Management (IAM) users. For those stacks, you must explicitly acknowledge this by specifying one of these capabilities. The following IAM resources require you to specify either the CAPABILITY_IAM or CAPABILITY_NAMED_IAM capability. If you have IAM resources, you can specify either capability. If you have IAM resources with custom names, you must specify CAPABILITY_NAMED_IAM. If you don't specify either of these capabilities, AWS CloudFormation returns an InsufficientCapabilities error. If your stack template contains these resources, we recommend that you review all permissions associated with them and edit their permissions if necessary. AWS::IAM::AccessKey AWS::IAM::Group AWS::IAM::InstanceProfile AWS::IAM::Policy AWS::IAM::Role AWS::IAM::User AWS::IAM::UserToGroupAddition For more information, see Acknowledging IAM Resources in AWS CloudFormation Templates. CAPABILITY_AUTO_EXPAND Some template contain macros. Macros perform custom processing on templates; this can include simple actions like find-and-replace operations, all the way to extensive transformations of entire templates. Because of this, users typically create a change set from the processed template, so that they can review the changes resulting from the macros before actually updating the stack. If your stack template contains one or more macros, and you choose to update a stack directly from the processed template, without first reviewing the resulting changes in a change set, you must acknowledge this capability. This includes the AWS::Include and AWS::Serverless transforms, which are macros hosted by AWS CloudFormation. Change sets do not currently support nested stacks. If you want to update a stack from a stack template that contains macros and nested stacks, you must update the stack directly from the template using this capability. You should only update stacks directly from a stack template that contains macros if you know what processing the macro performs. Each macro relies on an underlying Lambda service function for processing stack templates. Be aware that the Lambda function owner can update the function operation without AWS CloudFormation being notified. For more information, see Using AWS CloudFormation Macros to Perform Custom Processing on Templates.
2556
+ * In some cases, you must explicitly acknowledge that your stack template contains certain capabilities in order for AWS CloudFormation to update the stack. CAPABILITY_IAM and CAPABILITY_NAMED_IAM Some stack templates might include resources that can affect permissions in your AWS account; for example, by creating new AWS Identity and Access Management (IAM) users. For those stacks, you must explicitly acknowledge this by specifying one of these capabilities. The following IAM resources require you to specify either the CAPABILITY_IAM or CAPABILITY_NAMED_IAM capability. If you have IAM resources, you can specify either capability. If you have IAM resources with custom names, you must specify CAPABILITY_NAMED_IAM. If you don't specify either of these capabilities, AWS CloudFormation returns an InsufficientCapabilities error. If your stack template contains these resources, we recommend that you review all permissions associated with them and edit their permissions if necessary. AWS::IAM::AccessKey AWS::IAM::Group AWS::IAM::InstanceProfile AWS::IAM::Policy AWS::IAM::Role AWS::IAM::User AWS::IAM::UserToGroupAddition For more information, see Acknowledging IAM Resources in AWS CloudFormation Templates. CAPABILITY_AUTO_EXPAND Some template contain macros. Macros perform custom processing on templates; this can include simple actions like find-and-replace operations, all the way to extensive transformations of entire templates. Because of this, users typically create a change set from the processed template, so that they can review the changes resulting from the macros before actually updating the stack. If your stack template contains one or more macros, and you choose to update a stack directly from the processed template, without first reviewing the resulting changes in a change set, you must acknowledge this capability. This includes the AWS::Include and AWS::Serverless transforms, which are macros hosted by AWS CloudFormation. Change sets do not currently support nested stacks. If you want to update a stack from a stack template that contains macros and nested stacks, you must update the stack directly from the template using this capability. You should only update stacks directly from a stack template that contains macros if you know what processing the macro performs. Each macro relies on an underlying Lambda service function for processing stack templates. Be aware that the Lambda function owner can update the function operation without AWS CloudFormation being notified. For more information, see Using AWS CloudFormation Macros to Perform Custom Processing on Templates.
2507
2557
  */
2508
2558
  Capabilities?: Capabilities;
2509
2559
  /**
@@ -2603,7 +2653,7 @@ declare namespace CloudFormation {
2603
2653
  */
2604
2654
  Parameters?: Parameters;
2605
2655
  /**
2606
- * In some cases, you must explicity acknowledge that your stack template contains certain capabilities in order for AWS CloudFormation to update the stack set and its associated stack instances. CAPABILITY_IAM and CAPABILITY_NAMED_IAM Some stack templates might include resources that can affect permissions in your AWS account; for example, by creating new AWS Identity and Access Management (IAM) users. For those stacks sets, you must explicitly acknowledge this by specifying one of these capabilities. The following IAM resources require you to specify either the CAPABILITY_IAM or CAPABILITY_NAMED_IAM capability. If you have IAM resources, you can specify either capability. If you have IAM resources with custom names, you must specify CAPABILITY_NAMED_IAM. If you don't specify either of these capabilities, AWS CloudFormation returns an InsufficientCapabilities error. If your stack template contains these resources, we recommend that you review all permissions associated with them and edit their permissions if necessary. AWS::IAM::AccessKey AWS::IAM::Group AWS::IAM::InstanceProfile AWS::IAM::Policy AWS::IAM::Role AWS::IAM::User AWS::IAM::UserToGroupAddition For more information, see Acknowledging IAM Resources in AWS CloudFormation Templates. CAPABILITY_AUTO_EXPAND Some templates contain macros. If your stack template contains one or more macros, and you choose to update a stack directly from the processed template, without first reviewing the resulting changes in a change set, you must acknowledge this capability. For more information, see Using AWS CloudFormation Macros to Perform Custom Processing on Templates. Stack sets do not currently support macros in stack templates. (This includes the AWS::Include and AWS::Serverless transforms, which are macros hosted by AWS CloudFormation.) Even if you specify this capability, if you include a macro in your template the stack set operation will fail.
2656
+ * In some cases, you must explicitly acknowledge that your stack template contains certain capabilities in order for AWS CloudFormation to update the stack set and its associated stack instances. CAPABILITY_IAM and CAPABILITY_NAMED_IAM Some stack templates might include resources that can affect permissions in your AWS account; for example, by creating new AWS Identity and Access Management (IAM) users. For those stacks sets, you must explicitly acknowledge this by specifying one of these capabilities. The following IAM resources require you to specify either the CAPABILITY_IAM or CAPABILITY_NAMED_IAM capability. If you have IAM resources, you can specify either capability. If you have IAM resources with custom names, you must specify CAPABILITY_NAMED_IAM. If you don't specify either of these capabilities, AWS CloudFormation returns an InsufficientCapabilities error. If your stack template contains these resources, we recommend that you review all permissions associated with them and edit their permissions if necessary. AWS::IAM::AccessKey AWS::IAM::Group AWS::IAM::InstanceProfile AWS::IAM::Policy AWS::IAM::Role AWS::IAM::User AWS::IAM::UserToGroupAddition For more information, see Acknowledging IAM Resources in AWS CloudFormation Templates. CAPABILITY_AUTO_EXPAND Some templates contain macros. If your stack template contains one or more macros, and you choose to update a stack directly from the processed template, without first reviewing the resulting changes in a change set, you must acknowledge this capability. For more information, see Using AWS CloudFormation Macros to Perform Custom Processing on Templates. Stack sets do not currently support macros in stack templates. (This includes the AWS::Include and AWS::Serverless transforms, which are macros hosted by AWS CloudFormation.) Even if you specify this capability, if you include a macro in your template the stack set operation will fail.
2607
2657
  */
2608
2658
  Capabilities?: Capabilities;
2609
2659
  /**
@@ -440,6 +440,10 @@ declare namespace CodePipeline {
440
440
  * The action declaration's AWS Region, such as us-east-1.
441
441
  */
442
442
  region?: AWSRegionName;
443
+ /**
444
+ * The variable namespace associated with the action. All variables produced as output by this action fall under this namespace.
445
+ */
446
+ namespace?: ActionNamespace;
443
447
  }
444
448
  export interface ActionExecution {
445
449
  /**
@@ -535,6 +539,10 @@ declare namespace CodePipeline {
535
539
  * Configuration data for an action execution.
536
540
  */
537
541
  configuration?: ActionConfigurationMap;
542
+ /**
543
+ * Configuration data for an action execution with all variable references replaced with their real values for the execution.
544
+ */
545
+ resolvedConfiguration?: ResolvedActionConfigurationMap;
538
546
  /**
539
547
  * The ARN of the IAM service role that performs the declared action. This is assumed through the roleArn for the pipeline.
540
548
  */
@@ -547,6 +555,10 @@ declare namespace CodePipeline {
547
555
  * Details of input artifacts of the action that correspond to the action execution.
548
556
  */
549
557
  inputArtifacts?: ArtifactDetailList;
558
+ /**
559
+ * The variable namespace associated with the action. All variables produced as output by this action fall under this namespace.
560
+ */
561
+ namespace?: ActionNamespace;
550
562
  }
551
563
  export interface ActionExecutionOutput {
552
564
  /**
@@ -557,6 +569,10 @@ declare namespace CodePipeline {
557
569
  * Execution result information listed in the output details for an action execution.
558
570
  */
559
571
  executionResult?: ActionExecutionResult;
572
+ /**
573
+ * The outputVariables field shows the key-value pairs that were output as part of that execution.
574
+ */
575
+ outputVariables?: OutputVariablesMap;
560
576
  }
561
577
  export interface ActionExecutionResult {
562
578
  /**
@@ -575,6 +591,7 @@ declare namespace CodePipeline {
575
591
  export type ActionExecutionStatus = "InProgress"|"Succeeded"|"Failed"|string;
576
592
  export type ActionExecutionToken = string;
577
593
  export type ActionName = string;
594
+ export type ActionNamespace = string;
578
595
  export type ActionOwner = "AWS"|"ThirdParty"|"Custom"|string;
579
596
  export type ActionProvider = string;
580
597
  export interface ActionRevision {
@@ -1364,6 +1381,9 @@ declare namespace CodePipeline {
1364
1381
  name: ArtifactName;
1365
1382
  }
1366
1383
  export type OutputArtifactList = OutputArtifact[];
1384
+ export type OutputVariablesKey = string;
1385
+ export type OutputVariablesMap = {[key: string]: OutputVariablesValue};
1386
+ export type OutputVariablesValue = string;
1367
1387
  export type Percentage = number;
1368
1388
  export type PipelineArn = string;
1369
1389
  export interface PipelineContext {
@@ -1620,6 +1640,10 @@ declare namespace CodePipeline {
1620
1640
  * The execution details of the successful job, such as the actions taken by the job worker.
1621
1641
  */
1622
1642
  executionDetails?: ExecutionDetails;
1643
+ /**
1644
+ * Key-value pairs produced as output by a job worker that can be made available to a downstream action configuration. outputVariables can be included only when there is no continuation token on the request.
1645
+ */
1646
+ outputVariables?: OutputVariablesMap;
1623
1647
  }
1624
1648
  export interface PutThirdPartyJobFailureResultInput {
1625
1649
  /**
@@ -1682,6 +1706,7 @@ declare namespace CodePipeline {
1682
1706
  }
1683
1707
  export interface RegisterWebhookWithThirdPartyOutput {
1684
1708
  }
1709
+ export type ResolvedActionConfigurationMap = {[key: string]: String};
1685
1710
  export type ResourceArn = string;
1686
1711
  export interface RetryStageExecutionInput {
1687
1712
  /**
@@ -1827,6 +1852,7 @@ declare namespace CodePipeline {
1827
1852
  */
1828
1853
  pipelineExecutionId?: PipelineExecutionId;
1829
1854
  }
1855
+ export type String = string;
1830
1856
  export interface Tag {
1831
1857
  /**
1832
1858
  * The tag's key.
@@ -12,11 +12,11 @@ declare class CognitoIdentity extends Service {
12
12
  constructor(options?: CognitoIdentity.Types.ClientConfiguration)
13
13
  config: Config & CognitoIdentity.Types.ClientConfiguration;
14
14
  /**
15
- * Creates a new identity pool. The identity pool is a store of user identity information that is specific to your AWS account. The limit on identity pools is 60 per account. The keys for SupportedLoginProviders are as follows: Facebook: graph.facebook.com Google: accounts.google.com Amazon: www.amazon.com Twitter: api.twitter.com Digits: www.digits.com You must use AWS Developer credentials to call this API.
15
+ * Creates a new identity pool. The identity pool is a store of user identity information that is specific to your AWS account. The keys for SupportedLoginProviders are as follows: Facebook: graph.facebook.com Google: accounts.google.com Amazon: www.amazon.com Twitter: api.twitter.com Digits: www.digits.com You must use AWS Developer credentials to call this API.
16
16
  */
17
17
  createIdentityPool(params: CognitoIdentity.Types.CreateIdentityPoolInput, callback?: (err: AWSError, data: CognitoIdentity.Types.IdentityPool) => void): Request<CognitoIdentity.Types.IdentityPool, AWSError>;
18
18
  /**
19
- * Creates a new identity pool. The identity pool is a store of user identity information that is specific to your AWS account. The limit on identity pools is 60 per account. The keys for SupportedLoginProviders are as follows: Facebook: graph.facebook.com Google: accounts.google.com Amazon: www.amazon.com Twitter: api.twitter.com Digits: www.digits.com You must use AWS Developer credentials to call this API.
19
+ * Creates a new identity pool. The identity pool is a store of user identity information that is specific to your AWS account. The keys for SupportedLoginProviders are as follows: Facebook: graph.facebook.com Google: accounts.google.com Amazon: www.amazon.com Twitter: api.twitter.com Digits: www.digits.com You must use AWS Developer credentials to call this API.
20
20
  */
21
21
  createIdentityPool(callback?: (err: AWSError, data: CognitoIdentity.Types.IdentityPool) => void): Request<CognitoIdentity.Types.IdentityPool, AWSError>;
22
22
  /**
@@ -187,6 +187,7 @@ declare namespace CognitoIdentity {
187
187
  export type AmbiguousRoleResolutionType = "AuthenticatedRole"|"Deny"|string;
188
188
  export type ClaimName = string;
189
189
  export type ClaimValue = string;
190
+ export type ClassicFlow = boolean;
190
191
  export interface CognitoIdentityProvider {
191
192
  /**
192
193
  * The provider name for an Amazon Cognito user pool. For example, cognito-idp.us-east-1.amazonaws.com/us-east-1_123456789.
@@ -214,6 +215,10 @@ declare namespace CognitoIdentity {
214
215
  * TRUE if the identity pool supports unauthenticated logins.
215
216
  */
216
217
  AllowUnauthenticatedIdentities: IdentityPoolUnauthenticated;
218
+ /**
219
+ * Enables or disables the Basic (Classic) authentication flow. For more information, see Identity Pools (Federated Identities) Authentication Flow in the Amazon Cognito Developer Guide.
220
+ */
221
+ AllowClassicFlow?: ClassicFlow;
217
222
  /**
218
223
  * Optional key:value pairs mapping provider names to provider app IDs.
219
224
  */
@@ -370,7 +375,7 @@ declare namespace CognitoIdentity {
370
375
  */
371
376
  Logins: LoginsMap;
372
377
  /**
373
- * The expiration time of the token, in seconds. You can specify a custom expiration time for the token so that you can cache it. If you don't provide an expiration time, the token is valid for 15 minutes. You can exchange the token with Amazon STS for temporary AWS credentials, which are valid for a maximum of one hour. The maximum token duration you can set is 24 hours. You should take care in setting the expiration time for a token, as there are significant security implications: an attacker could use a leaked token to access your AWS resources for the token's duration.
378
+ * The expiration time of the token, in seconds. You can specify a custom expiration time for the token so that you can cache it. If you don't provide an expiration time, the token is valid for 15 minutes. You can exchange the token with Amazon STS for temporary AWS credentials, which are valid for a maximum of one hour. The maximum token duration you can set is 24 hours. You should take care in setting the expiration time for a token, as there are significant security implications: an attacker could use a leaked token to access your AWS resources for the token's duration. Please provide for a small grace period, usually no more than 5 minutes, to account for clock skew.
374
379
  */
375
380
  TokenDuration?: TokenDuration;
376
381
  }
@@ -439,6 +444,10 @@ declare namespace CognitoIdentity {
439
444
  * TRUE if the identity pool supports unauthenticated logins.
440
445
  */
441
446
  AllowUnauthenticatedIdentities: IdentityPoolUnauthenticated;
447
+ /**
448
+ * Enables or disables the Basic (Classic) authentication flow. For more information, see Identity Pools (Federated Identities) Authentication Flow in the Amazon Cognito Developer Guide.
449
+ */
450
+ AllowClassicFlow?: ClassicFlow;
442
451
  /**
443
452
  * Optional key:value pairs mapping provider names to provider app IDs.
444
453
  */
@@ -684,7 +693,7 @@ declare namespace CognitoIdentity {
684
693
  /**
685
694
  * The tags to assign to the identity pool.
686
695
  */
687
- Tags?: IdentityPoolTagsType;
696
+ Tags: IdentityPoolTagsType;
688
697
  }
689
698
  export interface TagResourceResponse {
690
699
  }
@@ -741,7 +750,7 @@ declare namespace CognitoIdentity {
741
750
  /**
742
751
  * The keys of the tags to remove from the user pool.
743
752
  */
744
- TagKeys?: IdentityPoolTagsListType;
753
+ TagKeys: IdentityPoolTagsListType;
745
754
  }
746
755
  export interface UntagResourceResponse {
747
756
  }
@@ -1278,7 +1278,7 @@ declare namespace Comprehend {
1278
1278
  */
1279
1279
  EvaluationMetrics?: EntityTypesEvaluationMetrics;
1280
1280
  /**
1281
- * indicates the number of times the given entity name was seen in the training data.
1281
+ * Indicates the number of times the given entity type was seen in the training data.
1282
1282
  */
1283
1283
  NumberOfTrainMentions?: Integer;
1284
1284
  }
@@ -1465,7 +1465,7 @@ declare namespace Comprehend {
1465
1465
  }
1466
1466
  export type KeyPhrasesDetectionJobPropertiesList = KeyPhrasesDetectionJobProperties[];
1467
1467
  export type KmsKeyId = string;
1468
- export type LanguageCode = "en"|"es"|"fr"|"de"|"it"|"pt"|string;
1468
+ export type LanguageCode = "en"|"es"|"fr"|"de"|"it"|"pt"|"ar"|"hi"|"ja"|"ko"|"zh"|"zh-TW"|string;
1469
1469
  export interface ListDocumentClassificationJobsRequest {
1470
1470
  /**
1471
1471
  * Filters the jobs that are returned. You can filter jobs on their names, status, or the date and time that they were submitted. You can only set one filter at a time.