aws-sdk 2.702.0 → 2.706.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +24 -1
- package/README.md +1 -1
- package/apis/amplify-2017-07-25.min.json +135 -73
- package/apis/backup-2018-11-15.min.json +64 -31
- package/apis/cloudformation-2010-05-15.min.json +40 -18
- package/apis/codecommit-2015-04-13.min.json +96 -24
- package/apis/codecommit-2015-04-13.paginators.json +5 -0
- package/apis/cognito-idp-2016-04-18.min.json +4 -2
- package/apis/ec2-2016-11-15.min.json +5 -1
- package/apis/elasticmapreduce-2009-03-31.min.json +103 -96
- package/apis/fsx-2018-03-01.min.json +59 -15
- package/apis/glue-2017-03-31.min.json +449 -60
- package/apis/honeycode-2020-03-01.examples.json +5 -0
- package/apis/honeycode-2020-03-01.min.json +182 -0
- package/apis/honeycode-2020-03-01.paginators.json +4 -0
- package/apis/mediatailor-2018-04-23.min.json +42 -23
- package/apis/metadata.json +3 -0
- package/apis/quicksight-2018-04-01.min.json +66 -53
- package/apis/sagemaker-2017-07-24.min.json +146 -129
- package/clients/all.d.ts +1 -0
- package/clients/all.js +2 -1
- package/clients/amplify.d.ts +413 -373
- package/clients/autoscaling.d.ts +35 -35
- package/clients/backup.d.ts +68 -15
- package/clients/cloudformation.d.ts +35 -3
- package/clients/codecommit.d.ts +105 -6
- package/clients/dms.d.ts +48 -48
- package/clients/ec2.d.ts +53 -49
- package/clients/emr.d.ts +18 -2
- package/clients/fsx.d.ts +63 -26
- package/clients/glue.d.ts +415 -0
- package/clients/honeycode.d.ts +190 -0
- package/clients/honeycode.js +18 -0
- package/clients/iam.d.ts +15 -15
- package/clients/mediatailor.d.ts +26 -0
- package/clients/organizations.d.ts +21 -21
- package/clients/quicksight.d.ts +33 -19
- package/clients/sagemaker.d.ts +23 -3
- package/dist/aws-sdk-core-react-native.js +2 -2
- package/dist/aws-sdk-react-native.js +54 -17
- package/dist/aws-sdk.js +259 -144
- package/dist/aws-sdk.min.js +74 -73
- package/lib/config_service_placeholders.d.ts +2 -0
- package/lib/core.js +1 -1
- package/package.json +1 -1
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
require('../lib/node_loader');
|
|
2
|
+
var AWS = require('../lib/core');
|
|
3
|
+
var Service = AWS.Service;
|
|
4
|
+
var apiLoader = AWS.apiLoader;
|
|
5
|
+
|
|
6
|
+
apiLoader.services['honeycode'] = {};
|
|
7
|
+
AWS.Honeycode = Service.defineService('honeycode', ['2020-03-01']);
|
|
8
|
+
Object.defineProperty(apiLoader.services['honeycode'], '2020-03-01', {
|
|
9
|
+
get: function get() {
|
|
10
|
+
var model = require('../apis/honeycode-2020-03-01.min.json');
|
|
11
|
+
model.paginators = require('../apis/honeycode-2020-03-01.paginators.json').pagination;
|
|
12
|
+
return model;
|
|
13
|
+
},
|
|
14
|
+
enumerable: true,
|
|
15
|
+
configurable: true
|
|
16
|
+
});
|
|
17
|
+
|
|
18
|
+
module.exports = AWS.Honeycode;
|
package/clients/iam.d.ts
CHANGED
|
@@ -21,11 +21,11 @@ declare class IAM extends Service {
|
|
|
21
21
|
*/
|
|
22
22
|
addClientIDToOpenIDConnectProvider(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
|
23
23
|
/**
|
|
24
|
-
* Adds the specified IAM role to the specified instance profile. An instance profile can contain only one role, and
|
|
24
|
+
* Adds the specified IAM role to the specified instance profile. An instance profile can contain only one role. (The number and size of IAM resources in an AWS account are limited. For more information, see IAM and STS Quotas in the IAM User Guide.) You can remove the existing role and then add a different role to an instance profile. You must then wait for the change to appear across all of AWS because of eventual consistency. To force the change, you must disassociate the instance profile and then associate the instance profile, or you can stop your instance and then restart it. The caller of this API must be granted the PassRole permission on the IAM role by a permissions policy. For more information about roles, go to Working with Roles. For more information about instance profiles, go to About Instance Profiles.
|
|
25
25
|
*/
|
|
26
26
|
addRoleToInstanceProfile(params: IAM.Types.AddRoleToInstanceProfileRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
|
27
27
|
/**
|
|
28
|
-
* Adds the specified IAM role to the specified instance profile. An instance profile can contain only one role, and
|
|
28
|
+
* Adds the specified IAM role to the specified instance profile. An instance profile can contain only one role. (The number and size of IAM resources in an AWS account are limited. For more information, see IAM and STS Quotas in the IAM User Guide.) You can remove the existing role and then add a different role to an instance profile. You must then wait for the change to appear across all of AWS because of eventual consistency. To force the change, you must disassociate the instance profile and then associate the instance profile, or you can stop your instance and then restart it. The caller of this API must be granted the PassRole permission on the IAM role by a permissions policy. For more information about roles, go to Working with Roles. For more information about instance profiles, go to About Instance Profiles.
|
|
29
29
|
*/
|
|
30
30
|
addRoleToInstanceProfile(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
|
31
31
|
/**
|
|
@@ -69,11 +69,11 @@ declare class IAM extends Service {
|
|
|
69
69
|
*/
|
|
70
70
|
changePassword(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
|
71
71
|
/**
|
|
72
|
-
* Creates a new AWS secret access key and corresponding AWS access key ID for the specified user. The default status for new keys is Active. If you do not specify a user name, IAM determines the user name implicitly based on the AWS access key ID signing the request. This operation works for access keys under the AWS account. Consequently, you can use this operation to manage AWS account root user credentials. This is true even if the AWS account has no associated users.
|
|
72
|
+
* Creates a new AWS secret access key and corresponding AWS access key ID for the specified user. The default status for new keys is Active. If you do not specify a user name, IAM determines the user name implicitly based on the AWS access key ID signing the request. This operation works for access keys under the AWS account. Consequently, you can use this operation to manage AWS account root user credentials. This is true even if the AWS account has no associated users. The number and size of IAM resources in an AWS account are limited. For more information, see IAM and STS Quotas in the IAM User Guide. To ensure the security of your AWS account, the secret access key is accessible only during key and user creation. You must save the key (for example, in a text file) if you want to be able to access it again. If a secret key is lost, you can delete the access keys for the associated user and then create new keys.
|
|
73
73
|
*/
|
|
74
74
|
createAccessKey(params: IAM.Types.CreateAccessKeyRequest, callback?: (err: AWSError, data: IAM.Types.CreateAccessKeyResponse) => void): Request<IAM.Types.CreateAccessKeyResponse, AWSError>;
|
|
75
75
|
/**
|
|
76
|
-
* Creates a new AWS secret access key and corresponding AWS access key ID for the specified user. The default status for new keys is Active. If you do not specify a user name, IAM determines the user name implicitly based on the AWS access key ID signing the request. This operation works for access keys under the AWS account. Consequently, you can use this operation to manage AWS account root user credentials. This is true even if the AWS account has no associated users.
|
|
76
|
+
* Creates a new AWS secret access key and corresponding AWS access key ID for the specified user. The default status for new keys is Active. If you do not specify a user name, IAM determines the user name implicitly based on the AWS access key ID signing the request. This operation works for access keys under the AWS account. Consequently, you can use this operation to manage AWS account root user credentials. This is true even if the AWS account has no associated users. The number and size of IAM resources in an AWS account are limited. For more information, see IAM and STS Quotas in the IAM User Guide. To ensure the security of your AWS account, the secret access key is accessible only during key and user creation. You must save the key (for example, in a text file) if you want to be able to access it again. If a secret key is lost, you can delete the access keys for the associated user and then create new keys.
|
|
77
77
|
*/
|
|
78
78
|
createAccessKey(callback?: (err: AWSError, data: IAM.Types.CreateAccessKeyResponse) => void): Request<IAM.Types.CreateAccessKeyResponse, AWSError>;
|
|
79
79
|
/**
|
|
@@ -85,19 +85,19 @@ declare class IAM extends Service {
|
|
|
85
85
|
*/
|
|
86
86
|
createAccountAlias(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
|
87
87
|
/**
|
|
88
|
-
* Creates a new group.
|
|
88
|
+
* Creates a new group. The number and size of IAM resources in an AWS account are limited. For more information, see IAM and STS Quotas in the IAM User Guide.
|
|
89
89
|
*/
|
|
90
90
|
createGroup(params: IAM.Types.CreateGroupRequest, callback?: (err: AWSError, data: IAM.Types.CreateGroupResponse) => void): Request<IAM.Types.CreateGroupResponse, AWSError>;
|
|
91
91
|
/**
|
|
92
|
-
* Creates a new group.
|
|
92
|
+
* Creates a new group. The number and size of IAM resources in an AWS account are limited. For more information, see IAM and STS Quotas in the IAM User Guide.
|
|
93
93
|
*/
|
|
94
94
|
createGroup(callback?: (err: AWSError, data: IAM.Types.CreateGroupResponse) => void): Request<IAM.Types.CreateGroupResponse, AWSError>;
|
|
95
95
|
/**
|
|
96
|
-
* Creates a new instance profile. For information about instance profiles, go to About Instance Profiles.
|
|
96
|
+
* Creates a new instance profile. For information about instance profiles, go to About Instance Profiles. The number and size of IAM resources in an AWS account are limited. For more information, see IAM and STS Quotas in the IAM User Guide.
|
|
97
97
|
*/
|
|
98
98
|
createInstanceProfile(params: IAM.Types.CreateInstanceProfileRequest, callback?: (err: AWSError, data: IAM.Types.CreateInstanceProfileResponse) => void): Request<IAM.Types.CreateInstanceProfileResponse, AWSError>;
|
|
99
99
|
/**
|
|
100
|
-
* Creates a new instance profile. For information about instance profiles, go to About Instance Profiles.
|
|
100
|
+
* Creates a new instance profile. For information about instance profiles, go to About Instance Profiles. The number and size of IAM resources in an AWS account are limited. For more information, see IAM and STS Quotas in the IAM User Guide.
|
|
101
101
|
*/
|
|
102
102
|
createInstanceProfile(callback?: (err: AWSError, data: IAM.Types.CreateInstanceProfileResponse) => void): Request<IAM.Types.CreateInstanceProfileResponse, AWSError>;
|
|
103
103
|
/**
|
|
@@ -133,11 +133,11 @@ declare class IAM extends Service {
|
|
|
133
133
|
*/
|
|
134
134
|
createPolicyVersion(callback?: (err: AWSError, data: IAM.Types.CreatePolicyVersionResponse) => void): Request<IAM.Types.CreatePolicyVersionResponse, AWSError>;
|
|
135
135
|
/**
|
|
136
|
-
* Creates a new role for your AWS account. For more information about roles, go to IAM Roles.
|
|
136
|
+
* Creates a new role for your AWS account. For more information about roles, go to IAM Roles. The number and size of IAM resources in an AWS account are limited. For more information, see IAM and STS Quotas in the IAM User Guide.
|
|
137
137
|
*/
|
|
138
138
|
createRole(params: IAM.Types.CreateRoleRequest, callback?: (err: AWSError, data: IAM.Types.CreateRoleResponse) => void): Request<IAM.Types.CreateRoleResponse, AWSError>;
|
|
139
139
|
/**
|
|
140
|
-
* Creates a new role for your AWS account. For more information about roles, go to IAM Roles.
|
|
140
|
+
* Creates a new role for your AWS account. For more information about roles, go to IAM Roles. The number and size of IAM resources in an AWS account are limited. For more information, see IAM and STS Quotas in the IAM User Guide.
|
|
141
141
|
*/
|
|
142
142
|
createRole(callback?: (err: AWSError, data: IAM.Types.CreateRoleResponse) => void): Request<IAM.Types.CreateRoleResponse, AWSError>;
|
|
143
143
|
/**
|
|
@@ -165,19 +165,19 @@ declare class IAM extends Service {
|
|
|
165
165
|
*/
|
|
166
166
|
createServiceSpecificCredential(callback?: (err: AWSError, data: IAM.Types.CreateServiceSpecificCredentialResponse) => void): Request<IAM.Types.CreateServiceSpecificCredentialResponse, AWSError>;
|
|
167
167
|
/**
|
|
168
|
-
* Creates a new IAM user for your AWS account.
|
|
168
|
+
* Creates a new IAM user for your AWS account. The number and size of IAM resources in an AWS account are limited. For more information, see IAM and STS Quotas in the IAM User Guide.
|
|
169
169
|
*/
|
|
170
170
|
createUser(params: IAM.Types.CreateUserRequest, callback?: (err: AWSError, data: IAM.Types.CreateUserResponse) => void): Request<IAM.Types.CreateUserResponse, AWSError>;
|
|
171
171
|
/**
|
|
172
|
-
* Creates a new IAM user for your AWS account.
|
|
172
|
+
* Creates a new IAM user for your AWS account. The number and size of IAM resources in an AWS account are limited. For more information, see IAM and STS Quotas in the IAM User Guide.
|
|
173
173
|
*/
|
|
174
174
|
createUser(callback?: (err: AWSError, data: IAM.Types.CreateUserResponse) => void): Request<IAM.Types.CreateUserResponse, AWSError>;
|
|
175
175
|
/**
|
|
176
|
-
* Creates a new virtual MFA device for the AWS account. After creating the virtual MFA, use EnableMFADevice to attach the MFA device to an IAM user. For more information about creating and working with virtual MFA devices, go to Using a Virtual MFA Device in the IAM User Guide.
|
|
176
|
+
* Creates a new virtual MFA device for the AWS account. After creating the virtual MFA, use EnableMFADevice to attach the MFA device to an IAM user. For more information about creating and working with virtual MFA devices, go to Using a Virtual MFA Device in the IAM User Guide. The number and size of IAM resources in an AWS account are limited. For more information, see IAM and STS Quotas in the IAM User Guide. The seed information contained in the QR code and the Base32 string should be treated like any other secret access information. In other words, protect the seed information as you would your AWS access keys or your passwords. After you provision your virtual device, you should ensure that the information is destroyed following secure procedures.
|
|
177
177
|
*/
|
|
178
178
|
createVirtualMFADevice(params: IAM.Types.CreateVirtualMFADeviceRequest, callback?: (err: AWSError, data: IAM.Types.CreateVirtualMFADeviceResponse) => void): Request<IAM.Types.CreateVirtualMFADeviceResponse, AWSError>;
|
|
179
179
|
/**
|
|
180
|
-
* Creates a new virtual MFA device for the AWS account. After creating the virtual MFA, use EnableMFADevice to attach the MFA device to an IAM user. For more information about creating and working with virtual MFA devices, go to Using a Virtual MFA Device in the IAM User Guide.
|
|
180
|
+
* Creates a new virtual MFA device for the AWS account. After creating the virtual MFA, use EnableMFADevice to attach the MFA device to an IAM user. For more information about creating and working with virtual MFA devices, go to Using a Virtual MFA Device in the IAM User Guide. The number and size of IAM resources in an AWS account are limited. For more information, see IAM and STS Quotas in the IAM User Guide. The seed information contained in the QR code and the Base32 string should be treated like any other secret access information. In other words, protect the seed information as you would your AWS access keys or your passwords. After you provision your virtual device, you should ensure that the information is destroyed following secure procedures.
|
|
181
181
|
*/
|
|
182
182
|
createVirtualMFADevice(callback?: (err: AWSError, data: IAM.Types.CreateVirtualMFADeviceResponse) => void): Request<IAM.Types.CreateVirtualMFADeviceResponse, AWSError>;
|
|
183
183
|
/**
|
|
@@ -441,7 +441,7 @@ declare class IAM extends Service {
|
|
|
441
441
|
*/
|
|
442
442
|
getAccountPasswordPolicy(callback?: (err: AWSError, data: IAM.Types.GetAccountPasswordPolicyResponse) => void): Request<IAM.Types.GetAccountPasswordPolicyResponse, AWSError>;
|
|
443
443
|
/**
|
|
444
|
-
* Retrieves information about IAM entity usage and IAM quotas in the AWS account.
|
|
444
|
+
* Retrieves information about IAM entity usage and IAM quotas in the AWS account. The number and size of IAM resources in an AWS account are limited. For more information, see IAM and STS Quotas in the IAM User Guide.
|
|
445
445
|
*/
|
|
446
446
|
getAccountSummary(callback?: (err: AWSError, data: IAM.Types.GetAccountSummaryResponse) => void): Request<IAM.Types.GetAccountSummaryResponse, AWSError>;
|
|
447
447
|
/**
|
package/clients/mediatailor.d.ts
CHANGED
|
@@ -79,6 +79,16 @@ declare namespace MediaTailor {
|
|
|
79
79
|
*/
|
|
80
80
|
Value?: __string;
|
|
81
81
|
}
|
|
82
|
+
export interface Bumper {
|
|
83
|
+
/**
|
|
84
|
+
* The URL for the end bumper asset.
|
|
85
|
+
*/
|
|
86
|
+
EndUrl?: __string;
|
|
87
|
+
/**
|
|
88
|
+
* The URL for the start bumper asset.
|
|
89
|
+
*/
|
|
90
|
+
StartUrl?: __string;
|
|
91
|
+
}
|
|
82
92
|
export interface CdnConfiguration {
|
|
83
93
|
/**
|
|
84
94
|
* A non-default content delivery network (CDN) to serve ad segments. By default, AWS Elemental MediaTailor uses Amazon CloudFront with default cache settings as its CDN for ad segments. To set up an alternate CDN, create a rule in your CDN for the following origin: ads.mediatailor.<region>.amazonaws.com. Then specify the rule's name in this AdSegmentUrlPrefix. When AWS Elemental MediaTailor serves a manifest, it reports your CDN as the source for ad segments.
|
|
@@ -136,6 +146,10 @@ declare namespace MediaTailor {
|
|
|
136
146
|
* The configuration for Avail Suppression. Ad suppression can be used to turn off ad personalization in a long manifest, or if a viewer joins mid-break.
|
|
137
147
|
*/
|
|
138
148
|
AvailSuppression?: AvailSuppression;
|
|
149
|
+
/**
|
|
150
|
+
* The configuration for bumpers. Bumpers are short audio or video clips that play at the start or before the end of an ad break.
|
|
151
|
+
*/
|
|
152
|
+
Bumper?: Bumper;
|
|
139
153
|
/**
|
|
140
154
|
* The configuration for using a content delivery network (CDN), like Amazon CloudFront, for content and ad segment management.
|
|
141
155
|
*/
|
|
@@ -243,6 +257,10 @@ declare namespace MediaTailor {
|
|
|
243
257
|
* The configuration for Avail Suppression. Ad suppression can be used to turn off ad personalization in a long manifest, or if a viewer joins mid-break.
|
|
244
258
|
*/
|
|
245
259
|
AvailSuppression?: AvailSuppression;
|
|
260
|
+
/**
|
|
261
|
+
* The configuration for bumpers. Bumpers are short audio or video clips that play at the start or before the end of an ad break.
|
|
262
|
+
*/
|
|
263
|
+
Bumper?: Bumper;
|
|
246
264
|
/**
|
|
247
265
|
* The configuration for using a content delivery network (CDN), like Amazon CloudFront, for content and ad segment management.
|
|
248
266
|
*/
|
|
@@ -311,6 +329,10 @@ declare namespace MediaTailor {
|
|
|
311
329
|
* The configuration for Avail Suppression. Ad suppression can be used to turn off ad personalization in a long manifest, or if a viewer joins mid-break.
|
|
312
330
|
*/
|
|
313
331
|
AvailSuppression?: AvailSuppression;
|
|
332
|
+
/**
|
|
333
|
+
* The configuration for bumpers. Bumpers are short audio or video clips that play at the start or before the end of an ad break.
|
|
334
|
+
*/
|
|
335
|
+
Bumper?: Bumper;
|
|
314
336
|
/**
|
|
315
337
|
* The configuration for using a content delivery network (CDN), like Amazon CloudFront, for content and ad segment management.
|
|
316
338
|
*/
|
|
@@ -357,6 +379,10 @@ declare namespace MediaTailor {
|
|
|
357
379
|
* The configuration for Avail Suppression. Ad suppression can be used to turn off ad personalization in a long manifest, or if a viewer joins mid-break.
|
|
358
380
|
*/
|
|
359
381
|
AvailSuppression?: AvailSuppression;
|
|
382
|
+
/**
|
|
383
|
+
* The configuration for bumpers. Bumpers are short audio or video clips that play at the start or before the end of an ad break.
|
|
384
|
+
*/
|
|
385
|
+
Bumper?: Bumper;
|
|
360
386
|
/**
|
|
361
387
|
* The configuration for using a content delivery network (CDN), like Amazon CloudFront, for content and ad segment management.
|
|
362
388
|
*/
|
|
@@ -20,11 +20,11 @@ declare class Organizations extends Service {
|
|
|
20
20
|
*/
|
|
21
21
|
acceptHandshake(callback?: (err: AWSError, data: Organizations.Types.AcceptHandshakeResponse) => void): Request<Organizations.Types.AcceptHandshakeResponse, AWSError>;
|
|
22
22
|
/**
|
|
23
|
-
* Attaches a policy to a root, an organizational unit (OU), or an individual account. How the policy affects accounts depends on the type of policy
|
|
23
|
+
* Attaches a policy to a root, an organizational unit (OU), or an individual account. How the policy affects accounts depends on the type of policy. Refer to the AWS Organizations User Guide for information about each policy type: BACKUP_POLICY SERVICE_CONTROL_POLICY TAG_POLICY This operation can be called only from the organization's master account.
|
|
24
24
|
*/
|
|
25
25
|
attachPolicy(params: Organizations.Types.AttachPolicyRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
|
26
26
|
/**
|
|
27
|
-
* Attaches a policy to a root, an organizational unit (OU), or an individual account. How the policy affects accounts depends on the type of policy
|
|
27
|
+
* Attaches a policy to a root, an organizational unit (OU), or an individual account. How the policy affects accounts depends on the type of policy. Refer to the AWS Organizations User Guide for information about each policy type: BACKUP_POLICY SERVICE_CONTROL_POLICY TAG_POLICY This operation can be called only from the organization's master account.
|
|
28
28
|
*/
|
|
29
29
|
attachPolicy(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
|
30
30
|
/**
|
|
@@ -44,11 +44,11 @@ declare class Organizations extends Service {
|
|
|
44
44
|
*/
|
|
45
45
|
createAccount(callback?: (err: AWSError, data: Organizations.Types.CreateAccountResponse) => void): Request<Organizations.Types.CreateAccountResponse, AWSError>;
|
|
46
46
|
/**
|
|
47
|
-
* This action is available if all of the following are true: You're authorized to create accounts in the AWS GovCloud (US) Region. For more information on the AWS GovCloud (US) Region, see the AWS GovCloud User Guide. You already have an account in the AWS GovCloud (US) Region that is associated with your master account in the commercial Region. You call this action from the master account of your organization in the commercial Region. You have the organizations:CreateGovCloudAccount permission. AWS Organizations creates the required service-linked role named AWSServiceRoleForOrganizations. For more information, see AWS Organizations and Service-Linked Roles in the AWS Organizations User Guide. AWS automatically enables AWS CloudTrail for AWS GovCloud (US) accounts, but you should also do the following: Verify that AWS CloudTrail is enabled to store logs. Create an S3 bucket for AWS CloudTrail log storage. For more information, see Verifying AWS CloudTrail Is Enabled in the AWS GovCloud User Guide. You call this action from the master account of your organization in the commercial Region to create a standalone AWS account in the AWS GovCloud (US) Region. After the account is created, the master account of an organization in the AWS GovCloud (US) Region can invite it to that organization. For more information on inviting standalone accounts in the AWS GovCloud (US) to join an organization, see AWS Organizations in the AWS GovCloud User Guide. Calling CreateGovCloudAccount is an asynchronous request that AWS performs in the background. Because CreateGovCloudAccount operates asynchronously, it can return a successful completion message even though account initialization might still be in progress. You might need to wait a few minutes before you can successfully access the account. To check the status of the request, do one of the following: Use the OperationId response element from this operation to provide as a parameter to the DescribeCreateAccountStatus operation. Check the AWS CloudTrail log for the CreateAccountResult event. For information on using AWS CloudTrail with Organizations, see Monitoring the Activity in Your Organization in the AWS Organizations User Guide. When you call the CreateGovCloudAccount action, you create two accounts: a standalone account in the AWS GovCloud (US) Region and an associated account in the commercial Region for billing and support purposes. The account in the commercial Region is automatically a member of the organization whose credentials made the request. Both accounts are associated with the same email address. A role is created in the new account in the commercial Region that allows the master account in the organization in the commercial Region to assume it. An AWS GovCloud (US) account is then created and associated with the commercial account that you just created. A role is created in the new AWS GovCloud (US) account that can be assumed by the AWS GovCloud (US) account that is associated with the master account of the commercial organization. For more information and to view a diagram that explains how account access works, see AWS Organizations in the AWS GovCloud User Guide. For more information about creating accounts, see Creating an AWS Account in Your Organization in the AWS Organizations User Guide. When you create an account in an organization using the AWS Organizations console, API, or CLI commands, the information required for the account to operate as a standalone account
|
|
47
|
+
* This action is available if all of the following are true: You're authorized to create accounts in the AWS GovCloud (US) Region. For more information on the AWS GovCloud (US) Region, see the AWS GovCloud User Guide. You already have an account in the AWS GovCloud (US) Region that is associated with your master account in the commercial Region. You call this action from the master account of your organization in the commercial Region. You have the organizations:CreateGovCloudAccount permission. AWS Organizations creates the required service-linked role named AWSServiceRoleForOrganizations. For more information, see AWS Organizations and Service-Linked Roles in the AWS Organizations User Guide. AWS automatically enables AWS CloudTrail for AWS GovCloud (US) accounts, but you should also do the following: Verify that AWS CloudTrail is enabled to store logs. Create an S3 bucket for AWS CloudTrail log storage. For more information, see Verifying AWS CloudTrail Is Enabled in the AWS GovCloud User Guide. You call this action from the master account of your organization in the commercial Region to create a standalone AWS account in the AWS GovCloud (US) Region. After the account is created, the master account of an organization in the AWS GovCloud (US) Region can invite it to that organization. For more information on inviting standalone accounts in the AWS GovCloud (US) to join an organization, see AWS Organizations in the AWS GovCloud User Guide. Calling CreateGovCloudAccount is an asynchronous request that AWS performs in the background. Because CreateGovCloudAccount operates asynchronously, it can return a successful completion message even though account initialization might still be in progress. You might need to wait a few minutes before you can successfully access the account. To check the status of the request, do one of the following: Use the OperationId response element from this operation to provide as a parameter to the DescribeCreateAccountStatus operation. Check the AWS CloudTrail log for the CreateAccountResult event. For information on using AWS CloudTrail with Organizations, see Monitoring the Activity in Your Organization in the AWS Organizations User Guide. When you call the CreateGovCloudAccount action, you create two accounts: a standalone account in the AWS GovCloud (US) Region and an associated account in the commercial Region for billing and support purposes. The account in the commercial Region is automatically a member of the organization whose credentials made the request. Both accounts are associated with the same email address. A role is created in the new account in the commercial Region that allows the master account in the organization in the commercial Region to assume it. An AWS GovCloud (US) account is then created and associated with the commercial account that you just created. A role is created in the new AWS GovCloud (US) account that can be assumed by the AWS GovCloud (US) account that is associated with the master account of the commercial organization. For more information and to view a diagram that explains how account access works, see AWS Organizations in the AWS GovCloud User Guide. For more information about creating accounts, see Creating an AWS Account in Your Organization in the AWS Organizations User Guide. When you create an account in an organization using the AWS Organizations console, API, or CLI commands, the information required for the account to operate as a standalone account is not automatically collected. This includes a payment method and signing the end user license agreement (EULA). If you must remove an account from your organization later, you can do so only after you provide the missing information. Follow the steps at To leave an organization as a member account in the AWS Organizations User Guide. If you get an exception that indicates that you exceeded your account limits for the organization, contact AWS Support. If you get an exception that indicates that the operation failed because your organization is still initializing, wait one hour and then try again. If the error persists, contact AWS Support. Using CreateGovCloudAccount to create multiple temporary accounts isn't recommended. You can only close an account from the AWS Billing and Cost Management console, and you must be signed in as the root user. For information on the requirements and process for closing an account, see Closing an AWS Account in the AWS Organizations User Guide. When you create a member account with this operation, you can choose whether to create the account with the IAM User and Role Access to Billing Information switch enabled. If you enable it, IAM users and roles that have appropriate permissions can view billing information for the account. If you disable it, only the account root user can access billing information. For information about how to disable this switch for an account, see Granting Access to Your Billing Information and Tools.
|
|
48
48
|
*/
|
|
49
49
|
createGovCloudAccount(params: Organizations.Types.CreateGovCloudAccountRequest, callback?: (err: AWSError, data: Organizations.Types.CreateGovCloudAccountResponse) => void): Request<Organizations.Types.CreateGovCloudAccountResponse, AWSError>;
|
|
50
50
|
/**
|
|
51
|
-
* This action is available if all of the following are true: You're authorized to create accounts in the AWS GovCloud (US) Region. For more information on the AWS GovCloud (US) Region, see the AWS GovCloud User Guide. You already have an account in the AWS GovCloud (US) Region that is associated with your master account in the commercial Region. You call this action from the master account of your organization in the commercial Region. You have the organizations:CreateGovCloudAccount permission. AWS Organizations creates the required service-linked role named AWSServiceRoleForOrganizations. For more information, see AWS Organizations and Service-Linked Roles in the AWS Organizations User Guide. AWS automatically enables AWS CloudTrail for AWS GovCloud (US) accounts, but you should also do the following: Verify that AWS CloudTrail is enabled to store logs. Create an S3 bucket for AWS CloudTrail log storage. For more information, see Verifying AWS CloudTrail Is Enabled in the AWS GovCloud User Guide. You call this action from the master account of your organization in the commercial Region to create a standalone AWS account in the AWS GovCloud (US) Region. After the account is created, the master account of an organization in the AWS GovCloud (US) Region can invite it to that organization. For more information on inviting standalone accounts in the AWS GovCloud (US) to join an organization, see AWS Organizations in the AWS GovCloud User Guide. Calling CreateGovCloudAccount is an asynchronous request that AWS performs in the background. Because CreateGovCloudAccount operates asynchronously, it can return a successful completion message even though account initialization might still be in progress. You might need to wait a few minutes before you can successfully access the account. To check the status of the request, do one of the following: Use the OperationId response element from this operation to provide as a parameter to the DescribeCreateAccountStatus operation. Check the AWS CloudTrail log for the CreateAccountResult event. For information on using AWS CloudTrail with Organizations, see Monitoring the Activity in Your Organization in the AWS Organizations User Guide. When you call the CreateGovCloudAccount action, you create two accounts: a standalone account in the AWS GovCloud (US) Region and an associated account in the commercial Region for billing and support purposes. The account in the commercial Region is automatically a member of the organization whose credentials made the request. Both accounts are associated with the same email address. A role is created in the new account in the commercial Region that allows the master account in the organization in the commercial Region to assume it. An AWS GovCloud (US) account is then created and associated with the commercial account that you just created. A role is created in the new AWS GovCloud (US) account that can be assumed by the AWS GovCloud (US) account that is associated with the master account of the commercial organization. For more information and to view a diagram that explains how account access works, see AWS Organizations in the AWS GovCloud User Guide. For more information about creating accounts, see Creating an AWS Account in Your Organization in the AWS Organizations User Guide. When you create an account in an organization using the AWS Organizations console, API, or CLI commands, the information required for the account to operate as a standalone account
|
|
51
|
+
* This action is available if all of the following are true: You're authorized to create accounts in the AWS GovCloud (US) Region. For more information on the AWS GovCloud (US) Region, see the AWS GovCloud User Guide. You already have an account in the AWS GovCloud (US) Region that is associated with your master account in the commercial Region. You call this action from the master account of your organization in the commercial Region. You have the organizations:CreateGovCloudAccount permission. AWS Organizations creates the required service-linked role named AWSServiceRoleForOrganizations. For more information, see AWS Organizations and Service-Linked Roles in the AWS Organizations User Guide. AWS automatically enables AWS CloudTrail for AWS GovCloud (US) accounts, but you should also do the following: Verify that AWS CloudTrail is enabled to store logs. Create an S3 bucket for AWS CloudTrail log storage. For more information, see Verifying AWS CloudTrail Is Enabled in the AWS GovCloud User Guide. You call this action from the master account of your organization in the commercial Region to create a standalone AWS account in the AWS GovCloud (US) Region. After the account is created, the master account of an organization in the AWS GovCloud (US) Region can invite it to that organization. For more information on inviting standalone accounts in the AWS GovCloud (US) to join an organization, see AWS Organizations in the AWS GovCloud User Guide. Calling CreateGovCloudAccount is an asynchronous request that AWS performs in the background. Because CreateGovCloudAccount operates asynchronously, it can return a successful completion message even though account initialization might still be in progress. You might need to wait a few minutes before you can successfully access the account. To check the status of the request, do one of the following: Use the OperationId response element from this operation to provide as a parameter to the DescribeCreateAccountStatus operation. Check the AWS CloudTrail log for the CreateAccountResult event. For information on using AWS CloudTrail with Organizations, see Monitoring the Activity in Your Organization in the AWS Organizations User Guide. When you call the CreateGovCloudAccount action, you create two accounts: a standalone account in the AWS GovCloud (US) Region and an associated account in the commercial Region for billing and support purposes. The account in the commercial Region is automatically a member of the organization whose credentials made the request. Both accounts are associated with the same email address. A role is created in the new account in the commercial Region that allows the master account in the organization in the commercial Region to assume it. An AWS GovCloud (US) account is then created and associated with the commercial account that you just created. A role is created in the new AWS GovCloud (US) account that can be assumed by the AWS GovCloud (US) account that is associated with the master account of the commercial organization. For more information and to view a diagram that explains how account access works, see AWS Organizations in the AWS GovCloud User Guide. For more information about creating accounts, see Creating an AWS Account in Your Organization in the AWS Organizations User Guide. When you create an account in an organization using the AWS Organizations console, API, or CLI commands, the information required for the account to operate as a standalone account is not automatically collected. This includes a payment method and signing the end user license agreement (EULA). If you must remove an account from your organization later, you can do so only after you provide the missing information. Follow the steps at To leave an organization as a member account in the AWS Organizations User Guide. If you get an exception that indicates that you exceeded your account limits for the organization, contact AWS Support. If you get an exception that indicates that the operation failed because your organization is still initializing, wait one hour and then try again. If the error persists, contact AWS Support. Using CreateGovCloudAccount to create multiple temporary accounts isn't recommended. You can only close an account from the AWS Billing and Cost Management console, and you must be signed in as the root user. For information on the requirements and process for closing an account, see Closing an AWS Account in the AWS Organizations User Guide. When you create a member account with this operation, you can choose whether to create the account with the IAM User and Role Access to Billing Information switch enabled. If you enable it, IAM users and roles that have appropriate permissions can view billing information for the account. If you disable it, only the account root user can access billing information. For information about how to disable this switch for an account, see Granting Access to Your Billing Information and Tools.
|
|
52
52
|
*/
|
|
53
53
|
createGovCloudAccount(callback?: (err: AWSError, data: Organizations.Types.CreateGovCloudAccountResponse) => void): Request<Organizations.Types.CreateGovCloudAccountResponse, AWSError>;
|
|
54
54
|
/**
|
|
@@ -128,11 +128,11 @@ declare class Organizations extends Service {
|
|
|
128
128
|
*/
|
|
129
129
|
describeCreateAccountStatus(callback?: (err: AWSError, data: Organizations.Types.DescribeCreateAccountStatusResponse) => void): Request<Organizations.Types.DescribeCreateAccountStatusResponse, AWSError>;
|
|
130
130
|
/**
|
|
131
|
-
* Returns the contents of the effective
|
|
131
|
+
* Returns the contents of the effective policy for specified policy type and account. The effective policy is the aggregation of any policies of the specified type that the account inherits, plus any policy of that type that is directly attached to the account. This operation applies only to policy types other than service control policies (SCPs). For more information about policy inheritance, see How Policy Inheritance Works in the AWS Organizations User Guide. This operation can be called only from the organization's master account or by a member account that is a delegated administrator for an AWS service.
|
|
132
132
|
*/
|
|
133
133
|
describeEffectivePolicy(params: Organizations.Types.DescribeEffectivePolicyRequest, callback?: (err: AWSError, data: Organizations.Types.DescribeEffectivePolicyResponse) => void): Request<Organizations.Types.DescribeEffectivePolicyResponse, AWSError>;
|
|
134
134
|
/**
|
|
135
|
-
* Returns the contents of the effective
|
|
135
|
+
* Returns the contents of the effective policy for specified policy type and account. The effective policy is the aggregation of any policies of the specified type that the account inherits, plus any policy of that type that is directly attached to the account. This operation applies only to policy types other than service control policies (SCPs). For more information about policy inheritance, see How Policy Inheritance Works in the AWS Organizations User Guide. This operation can be called only from the organization's master account or by a member account that is a delegated administrator for an AWS service.
|
|
136
136
|
*/
|
|
137
137
|
describeEffectivePolicy(callback?: (err: AWSError, data: Organizations.Types.DescribeEffectivePolicyResponse) => void): Request<Organizations.Types.DescribeEffectivePolicyResponse, AWSError>;
|
|
138
138
|
/**
|
|
@@ -164,11 +164,11 @@ declare class Organizations extends Service {
|
|
|
164
164
|
*/
|
|
165
165
|
describePolicy(callback?: (err: AWSError, data: Organizations.Types.DescribePolicyResponse) => void): Request<Organizations.Types.DescribePolicyResponse, AWSError>;
|
|
166
166
|
/**
|
|
167
|
-
* Detaches a policy from a target root, organizational unit (OU), or account.
|
|
167
|
+
* Detaches a policy from a target root, organizational unit (OU), or account. If the policy being detached is a service control policy (SCP), the changes to permissions for AWS Identity and Access Management (IAM) users and roles in affected accounts are immediate. Every root, OU, and account must have at least one SCP attached. If you want to replace the default FullAWSAccess policy with an SCP that limits the permissions that can be delegated, you must attach the replacement SCP before you can remove the default SCP. This is the authorization strategy of an "allow list". If you instead attach a second SCP and leave the FullAWSAccess SCP still attached, and specify "Effect": "Deny" in the second SCP to override the "Effect": "Allow" in the FullAWSAccess policy (or any other attached SCP), you're using the authorization strategy of a "deny list". This operation can be called only from the organization's master account.
|
|
168
168
|
*/
|
|
169
169
|
detachPolicy(params: Organizations.Types.DetachPolicyRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
|
170
170
|
/**
|
|
171
|
-
* Detaches a policy from a target root, organizational unit (OU), or account.
|
|
171
|
+
* Detaches a policy from a target root, organizational unit (OU), or account. If the policy being detached is a service control policy (SCP), the changes to permissions for AWS Identity and Access Management (IAM) users and roles in affected accounts are immediate. Every root, OU, and account must have at least one SCP attached. If you want to replace the default FullAWSAccess policy with an SCP that limits the permissions that can be delegated, you must attach the replacement SCP before you can remove the default SCP. This is the authorization strategy of an "allow list". If you instead attach a second SCP and leave the FullAWSAccess SCP still attached, and specify "Effect": "Deny" in the second SCP to override the "Effect": "Allow" in the FullAWSAccess policy (or any other attached SCP), you're using the authorization strategy of a "deny list". This operation can be called only from the organization's master account.
|
|
172
172
|
*/
|
|
173
173
|
detachPolicy(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
|
174
174
|
/**
|
|
@@ -180,11 +180,11 @@ declare class Organizations extends Service {
|
|
|
180
180
|
*/
|
|
181
181
|
disableAWSServiceAccess(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
|
182
182
|
/**
|
|
183
|
-
* Disables an organizational
|
|
183
|
+
* Disables an organizational policy type in a root. A policy of a certain type can be attached to entities in a root only if that type is enabled in the root. After you perform this operation, you no longer can attach policies of the specified type to that root or to any organizational unit (OU) or account in that root. You can undo this by using the EnablePolicyType operation. This is an asynchronous request that AWS performs in the background. If you disable a policy type for a root, it still appears enabled for the organization if all features are enabled for the organization. AWS recommends that you first use ListRoots to see the status of policy types for a specified root, and then use this operation. This operation can be called only from the organization's master account. To view the status of available policy types in the organization, use DescribeOrganization.
|
|
184
184
|
*/
|
|
185
185
|
disablePolicyType(params: Organizations.Types.DisablePolicyTypeRequest, callback?: (err: AWSError, data: Organizations.Types.DisablePolicyTypeResponse) => void): Request<Organizations.Types.DisablePolicyTypeResponse, AWSError>;
|
|
186
186
|
/**
|
|
187
|
-
* Disables an organizational
|
|
187
|
+
* Disables an organizational policy type in a root. A policy of a certain type can be attached to entities in a root only if that type is enabled in the root. After you perform this operation, you no longer can attach policies of the specified type to that root or to any organizational unit (OU) or account in that root. You can undo this by using the EnablePolicyType operation. This is an asynchronous request that AWS performs in the background. If you disable a policy type for a root, it still appears enabled for the organization if all features are enabled for the organization. AWS recommends that you first use ListRoots to see the status of policy types for a specified root, and then use this operation. This operation can be called only from the organization's master account. To view the status of available policy types in the organization, use DescribeOrganization.
|
|
188
188
|
*/
|
|
189
189
|
disablePolicyType(callback?: (err: AWSError, data: Organizations.Types.DisablePolicyTypeResponse) => void): Request<Organizations.Types.DisablePolicyTypeResponse, AWSError>;
|
|
190
190
|
/**
|
|
@@ -608,7 +608,7 @@ declare namespace Organizations {
|
|
|
608
608
|
}
|
|
609
609
|
export interface CreatePolicyRequest {
|
|
610
610
|
/**
|
|
611
|
-
* The policy content to add to the new policy.
|
|
611
|
+
* The policy text content to add to the new policy. The text that you supply must adhere to the rules of the policy type you specify in the Type parameter.
|
|
612
612
|
*/
|
|
613
613
|
Content: PolicyContent;
|
|
614
614
|
/**
|
|
@@ -620,7 +620,7 @@ declare namespace Organizations {
|
|
|
620
620
|
*/
|
|
621
621
|
Name: PolicyName;
|
|
622
622
|
/**
|
|
623
|
-
* The type of policy to create.
|
|
623
|
+
* The type of policy to create. You can specify one of the following values: BACKUP_POLICY SERVICE_CONTROL_POLICY TAG_POLICY
|
|
624
624
|
*/
|
|
625
625
|
Type: PolicyType;
|
|
626
626
|
}
|
|
@@ -736,11 +736,11 @@ declare namespace Organizations {
|
|
|
736
736
|
}
|
|
737
737
|
export interface DescribeEffectivePolicyRequest {
|
|
738
738
|
/**
|
|
739
|
-
* The type of policy that you want information about.
|
|
739
|
+
* The type of policy that you want information about. You can specify one of the following values: BACKUP_POLICY TAG_POLICY
|
|
740
740
|
*/
|
|
741
741
|
PolicyType: EffectivePolicyType;
|
|
742
742
|
/**
|
|
743
|
-
* When you're signed in as the master account, specify the ID of the account that you want details about. Specifying an organization root or OU as the target is not supported.
|
|
743
|
+
* When you're signed in as the master account, specify the ID of the account that you want details about. Specifying an organization root or organizational unit (OU) as the target is not supported.
|
|
744
744
|
*/
|
|
745
745
|
TargetId?: PolicyTargetId;
|
|
746
746
|
}
|
|
@@ -814,7 +814,7 @@ declare namespace Organizations {
|
|
|
814
814
|
*/
|
|
815
815
|
RootId: RootId;
|
|
816
816
|
/**
|
|
817
|
-
* The policy type that you want to disable in this root.
|
|
817
|
+
* The policy type that you want to disable in this root. You can specify one of the following values: BACKUP_POLICY SERVICE_CONTROL_POLICY TAG_POLICY
|
|
818
818
|
*/
|
|
819
819
|
PolicyType: PolicyType;
|
|
820
820
|
}
|
|
@@ -842,7 +842,7 @@ declare namespace Organizations {
|
|
|
842
842
|
*/
|
|
843
843
|
PolicyType?: EffectivePolicyType;
|
|
844
844
|
}
|
|
845
|
-
export type EffectivePolicyType = "TAG_POLICY"|string;
|
|
845
|
+
export type EffectivePolicyType = "TAG_POLICY"|"BACKUP_POLICY"|string;
|
|
846
846
|
export type Email = string;
|
|
847
847
|
export interface EnableAWSServiceAccessRequest {
|
|
848
848
|
/**
|
|
@@ -864,7 +864,7 @@ declare namespace Organizations {
|
|
|
864
864
|
*/
|
|
865
865
|
RootId: RootId;
|
|
866
866
|
/**
|
|
867
|
-
* The policy type that you want to enable.
|
|
867
|
+
* The policy type that you want to enable. You can specify one of the following values: BACKUP_POLICY SERVICE_CONTROL_POLICY TAG_POLICY
|
|
868
868
|
*/
|
|
869
869
|
PolicyType: PolicyType;
|
|
870
870
|
}
|
|
@@ -1248,7 +1248,7 @@ declare namespace Organizations {
|
|
|
1248
1248
|
*/
|
|
1249
1249
|
TargetId: PolicyTargetId;
|
|
1250
1250
|
/**
|
|
1251
|
-
* The type of policy that you want to include in the returned list.
|
|
1251
|
+
* The type of policy that you want to include in the returned list. You must specify one of the following values: BACKUP_POLICY SERVICE_CONTROL_POLICY TAG_POLICY
|
|
1252
1252
|
*/
|
|
1253
1253
|
Filter: PolicyType;
|
|
1254
1254
|
/**
|
|
@@ -1272,7 +1272,7 @@ declare namespace Organizations {
|
|
|
1272
1272
|
}
|
|
1273
1273
|
export interface ListPoliciesRequest {
|
|
1274
1274
|
/**
|
|
1275
|
-
* Specifies the type of policy that you want to include in the response.
|
|
1275
|
+
* Specifies the type of policy that you want to include in the response. You must specify one of the following values: BACKUP_POLICY SERVICE_CONTROL_POLICY TAG_POLICY
|
|
1276
1276
|
*/
|
|
1277
1277
|
Filter: PolicyType;
|
|
1278
1278
|
/**
|
|
@@ -1500,7 +1500,7 @@ declare namespace Organizations {
|
|
|
1500
1500
|
Type?: TargetType;
|
|
1501
1501
|
}
|
|
1502
1502
|
export type PolicyTargets = PolicyTargetSummary[];
|
|
1503
|
-
export type PolicyType = "SERVICE_CONTROL_POLICY"|"TAG_POLICY"|string;
|
|
1503
|
+
export type PolicyType = "SERVICE_CONTROL_POLICY"|"TAG_POLICY"|"BACKUP_POLICY"|string;
|
|
1504
1504
|
export type PolicyTypeStatus = "ENABLED"|"PENDING_ENABLE"|"PENDING_DISABLE"|string;
|
|
1505
1505
|
export interface PolicyTypeSummary {
|
|
1506
1506
|
/**
|
|
@@ -1571,7 +1571,7 @@ declare namespace Organizations {
|
|
|
1571
1571
|
*/
|
|
1572
1572
|
ResourceId: TaggableResourceId;
|
|
1573
1573
|
/**
|
|
1574
|
-
* The tag to add to the specified resource.
|
|
1574
|
+
* The tag to add to the specified resource. You must specify both a tag key and value. You can set the value of a tag to an empty string, but you can't set it to null.
|
|
1575
1575
|
*/
|
|
1576
1576
|
Tags: Tags;
|
|
1577
1577
|
}
|