aws-sdk 2.871.0 → 2.875.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +26 -1
- package/README.md +1 -1
- package/apis/alexaforbusiness-2017-11-09.min.json +9 -0
- package/apis/customer-profiles-2020-08-15.min.json +164 -6
- package/apis/docdb-2014-10-31.min.json +298 -114
- package/apis/docdb-2014-10-31.paginators.json +6 -0
- package/apis/eventbridge-2015-10-07.min.json +22 -3
- package/apis/events-2015-10-07.min.json +22 -3
- package/apis/glue-2017-03-31.min.json +20 -10
- package/apis/iotwireless-2020-11-22.min.json +3 -0
- package/apis/location-2020-11-19.min.json +23 -1
- package/apis/lookoutmetrics-2017-07-25.examples.json +5 -0
- package/apis/lookoutmetrics-2017-07-25.min.json +1179 -0
- package/apis/lookoutmetrics-2017-07-25.paginators.json +39 -0
- package/apis/medialive-2017-10-14.min.json +189 -176
- package/apis/metadata.json +3 -0
- package/apis/rekognition-2016-06-27.min.json +181 -109
- package/apis/sagemaker-2017-07-24.min.json +213 -199
- package/apis/wafv2-2019-07-29.min.json +172 -81
- package/clients/alexaforbusiness.d.ts +12 -0
- package/clients/all.d.ts +1 -0
- package/clients/all.js +2 -1
- package/clients/cloudwatchevents.d.ts +25 -2
- package/clients/customerprofiles.d.ts +102 -1
- package/clients/docdb.d.ts +213 -0
- package/clients/eventbridge.d.ts +25 -2
- package/clients/glue.d.ts +21 -6
- package/clients/iotwireless.d.ts +13 -9
- package/clients/location.d.ts +100 -44
- package/clients/lookoutmetrics.d.ts +1497 -0
- package/clients/lookoutmetrics.js +19 -0
- package/clients/medialive.d.ts +8 -1
- package/clients/rekognition.d.ts +80 -3
- package/clients/sagemaker.d.ts +26 -11
- package/clients/sqs.d.ts +2 -2
- package/clients/transcribeservice.d.ts +2 -2
- package/clients/wafv2.d.ts +94 -3
- package/dist/aws-sdk-core-react-native.js +2 -2
- package/dist/aws-sdk-react-native.js +83 -17
- package/dist/aws-sdk.js +209 -115
- package/dist/aws-sdk.min.js +47 -47
- package/lib/config_service_placeholders.d.ts +2 -0
- package/lib/core.js +1 -1
- package/lib/services/lookoutmetrics.js +22 -0
- package/package.json +1 -1
package/clients/eventbridge.d.ts
CHANGED
|
@@ -340,11 +340,11 @@ declare class EventBridge extends Service {
|
|
|
340
340
|
*/
|
|
341
341
|
putRule(callback?: (err: AWSError, data: EventBridge.Types.PutRuleResponse) => void): Request<EventBridge.Types.PutRuleResponse, AWSError>;
|
|
342
342
|
/**
|
|
343
|
-
* Adds the specified targets to the specified rule, or updates the targets if they are already associated with the rule. Targets are the resources that are invoked when a rule is triggered. You can configure the following as targets for Events: EC2 instances SSM Run Command SSM Automation AWS Lambda functions Data streams in Amazon Kinesis Data Streams Data delivery streams in Amazon Kinesis Data Firehose Amazon ECS tasks AWS Step Functions state machines AWS Batch jobs AWS CodeBuild projects Pipelines in AWS CodePipeline Amazon Inspector assessment templates Amazon SNS topics Amazon SQS queues, including FIFO queues The default event bus of another AWS account Amazon API Gateway REST APIs Redshift Clusters to invoke Data API ExecuteStatement on Custom/SaaS HTTPS APIs via EventBridge API Destinations Creating rules with built-in targets is supported only in the AWS Management Console. The built-in targets are EC2 CreateSnapshot API call, EC2 RebootInstances API call, EC2 StopInstances API call, and EC2 TerminateInstances API call. For some target types, PutTargets provides target-specific parameters. If the target is a Kinesis data stream, you can optionally specify which shard the event goes to by using the KinesisParameters argument. To invoke a command on multiple EC2 instances with one rule, you can use the RunCommandParameters field. To be able to make API calls against the resources that you own, Amazon EventBridge (CloudWatch Events) needs the appropriate permissions. For AWS Lambda and Amazon SNS resources, EventBridge relies on resource-based policies. For EC2 instances, Kinesis data streams, AWS Step Functions state machines and API Gateway REST APIs, EventBridge relies on IAM roles that you specify in the RoleARN argument in PutTargets. For more information, see Authentication and Access Control in the Amazon EventBridge User Guide. If another AWS account is in the same region and has granted you permission (using PutPermission), you can send events to that account. Set that account's event bus as a target of the rules in your account. To send the matched events to the other account, specify that account's event bus as the Arn value when you run PutTargets. If your account sends events to another account, your account is charged for each sent event. Each event sent to another account is charged as a custom event. The account receiving the event is not charged. For more information, see Amazon EventBridge (CloudWatch Events) Pricing. Input, InputPath, and InputTransformer are not available with PutTarget if the target is an event bus of a different AWS account. If you are setting the event bus of another account as the target, and that account granted permission to your account through an organization instead of directly by the account ID, then you must specify a RoleArn with proper permissions in the Target structure. For more information, see Sending and Receiving Events Between AWS Accounts in the Amazon EventBridge User Guide. For more information about enabling cross-account events, see PutPermission. Input, InputPath, and InputTransformer are mutually exclusive and optional parameters of a target. When a rule is triggered due to a matched event: If none of the following arguments are specified for a target, then the entire event is passed to the target in JSON format (unless the target is Amazon EC2 Run Command or Amazon ECS task, in which case nothing from the event is passed to the target). If Input is specified in the form of valid JSON, then the matched event is overridden with this constant. If InputPath is specified in the form of JSONPath (for example, $.detail), then only the part of the event specified in the path is passed to the target (for example, only the detail part of the event is passed). If InputTransformer is specified, then one or more specified JSONPaths are extracted from the event and used as values in a template that you specify as the input to the target. When you specify InputPath or InputTransformer, you must use JSON dot notation, not bracket notation. When you add targets to a rule and the associated rule triggers soon after, new or updated targets might not be immediately invoked. Allow a short period of time for changes to take effect. This action can partially fail if too many requests are made at the same time. If that happens, FailedEntryCount is non-zero in the response and each entry in FailedEntries provides the ID of the failed target and the error code.
|
|
343
|
+
* Adds the specified targets to the specified rule, or updates the targets if they are already associated with the rule. Targets are the resources that are invoked when a rule is triggered. You can configure the following as targets for Events: EC2 instances SSM Run Command SSM Automation AWS Lambda functions Data streams in Amazon Kinesis Data Streams Data delivery streams in Amazon Kinesis Data Firehose Amazon ECS tasks AWS Step Functions state machines AWS Batch jobs AWS CodeBuild projects Pipelines in AWS CodePipeline Amazon Inspector assessment templates Amazon SNS topics Amazon SQS queues, including FIFO queues The default event bus of another AWS account Amazon API Gateway REST APIs Redshift Clusters to invoke Data API ExecuteStatement on Custom/SaaS HTTPS APIs via EventBridge API Destinations Amazon SageMaker Model Building Pipelines Creating rules with built-in targets is supported only in the AWS Management Console. The built-in targets are EC2 CreateSnapshot API call, EC2 RebootInstances API call, EC2 StopInstances API call, and EC2 TerminateInstances API call. For some target types, PutTargets provides target-specific parameters. If the target is a Kinesis data stream, you can optionally specify which shard the event goes to by using the KinesisParameters argument. To invoke a command on multiple EC2 instances with one rule, you can use the RunCommandParameters field. To be able to make API calls against the resources that you own, Amazon EventBridge (CloudWatch Events) needs the appropriate permissions. For AWS Lambda and Amazon SNS resources, EventBridge relies on resource-based policies. For EC2 instances, Kinesis data streams, AWS Step Functions state machines and API Gateway REST APIs, EventBridge relies on IAM roles that you specify in the RoleARN argument in PutTargets. For more information, see Authentication and Access Control in the Amazon EventBridge User Guide. If another AWS account is in the same region and has granted you permission (using PutPermission), you can send events to that account. Set that account's event bus as a target of the rules in your account. To send the matched events to the other account, specify that account's event bus as the Arn value when you run PutTargets. If your account sends events to another account, your account is charged for each sent event. Each event sent to another account is charged as a custom event. The account receiving the event is not charged. For more information, see Amazon EventBridge (CloudWatch Events) Pricing. Input, InputPath, and InputTransformer are not available with PutTarget if the target is an event bus of a different AWS account. If you are setting the event bus of another account as the target, and that account granted permission to your account through an organization instead of directly by the account ID, then you must specify a RoleArn with proper permissions in the Target structure. For more information, see Sending and Receiving Events Between AWS Accounts in the Amazon EventBridge User Guide. For more information about enabling cross-account events, see PutPermission. Input, InputPath, and InputTransformer are mutually exclusive and optional parameters of a target. When a rule is triggered due to a matched event: If none of the following arguments are specified for a target, then the entire event is passed to the target in JSON format (unless the target is Amazon EC2 Run Command or Amazon ECS task, in which case nothing from the event is passed to the target). If Input is specified in the form of valid JSON, then the matched event is overridden with this constant. If InputPath is specified in the form of JSONPath (for example, $.detail), then only the part of the event specified in the path is passed to the target (for example, only the detail part of the event is passed). If InputTransformer is specified, then one or more specified JSONPaths are extracted from the event and used as values in a template that you specify as the input to the target. When you specify InputPath or InputTransformer, you must use JSON dot notation, not bracket notation. When you add targets to a rule and the associated rule triggers soon after, new or updated targets might not be immediately invoked. Allow a short period of time for changes to take effect. This action can partially fail if too many requests are made at the same time. If that happens, FailedEntryCount is non-zero in the response and each entry in FailedEntries provides the ID of the failed target and the error code.
|
|
344
344
|
*/
|
|
345
345
|
putTargets(params: EventBridge.Types.PutTargetsRequest, callback?: (err: AWSError, data: EventBridge.Types.PutTargetsResponse) => void): Request<EventBridge.Types.PutTargetsResponse, AWSError>;
|
|
346
346
|
/**
|
|
347
|
-
* Adds the specified targets to the specified rule, or updates the targets if they are already associated with the rule. Targets are the resources that are invoked when a rule is triggered. You can configure the following as targets for Events: EC2 instances SSM Run Command SSM Automation AWS Lambda functions Data streams in Amazon Kinesis Data Streams Data delivery streams in Amazon Kinesis Data Firehose Amazon ECS tasks AWS Step Functions state machines AWS Batch jobs AWS CodeBuild projects Pipelines in AWS CodePipeline Amazon Inspector assessment templates Amazon SNS topics Amazon SQS queues, including FIFO queues The default event bus of another AWS account Amazon API Gateway REST APIs Redshift Clusters to invoke Data API ExecuteStatement on Custom/SaaS HTTPS APIs via EventBridge API Destinations Creating rules with built-in targets is supported only in the AWS Management Console. The built-in targets are EC2 CreateSnapshot API call, EC2 RebootInstances API call, EC2 StopInstances API call, and EC2 TerminateInstances API call. For some target types, PutTargets provides target-specific parameters. If the target is a Kinesis data stream, you can optionally specify which shard the event goes to by using the KinesisParameters argument. To invoke a command on multiple EC2 instances with one rule, you can use the RunCommandParameters field. To be able to make API calls against the resources that you own, Amazon EventBridge (CloudWatch Events) needs the appropriate permissions. For AWS Lambda and Amazon SNS resources, EventBridge relies on resource-based policies. For EC2 instances, Kinesis data streams, AWS Step Functions state machines and API Gateway REST APIs, EventBridge relies on IAM roles that you specify in the RoleARN argument in PutTargets. For more information, see Authentication and Access Control in the Amazon EventBridge User Guide. If another AWS account is in the same region and has granted you permission (using PutPermission), you can send events to that account. Set that account's event bus as a target of the rules in your account. To send the matched events to the other account, specify that account's event bus as the Arn value when you run PutTargets. If your account sends events to another account, your account is charged for each sent event. Each event sent to another account is charged as a custom event. The account receiving the event is not charged. For more information, see Amazon EventBridge (CloudWatch Events) Pricing. Input, InputPath, and InputTransformer are not available with PutTarget if the target is an event bus of a different AWS account. If you are setting the event bus of another account as the target, and that account granted permission to your account through an organization instead of directly by the account ID, then you must specify a RoleArn with proper permissions in the Target structure. For more information, see Sending and Receiving Events Between AWS Accounts in the Amazon EventBridge User Guide. For more information about enabling cross-account events, see PutPermission. Input, InputPath, and InputTransformer are mutually exclusive and optional parameters of a target. When a rule is triggered due to a matched event: If none of the following arguments are specified for a target, then the entire event is passed to the target in JSON format (unless the target is Amazon EC2 Run Command or Amazon ECS task, in which case nothing from the event is passed to the target). If Input is specified in the form of valid JSON, then the matched event is overridden with this constant. If InputPath is specified in the form of JSONPath (for example, $.detail), then only the part of the event specified in the path is passed to the target (for example, only the detail part of the event is passed). If InputTransformer is specified, then one or more specified JSONPaths are extracted from the event and used as values in a template that you specify as the input to the target. When you specify InputPath or InputTransformer, you must use JSON dot notation, not bracket notation. When you add targets to a rule and the associated rule triggers soon after, new or updated targets might not be immediately invoked. Allow a short period of time for changes to take effect. This action can partially fail if too many requests are made at the same time. If that happens, FailedEntryCount is non-zero in the response and each entry in FailedEntries provides the ID of the failed target and the error code.
|
|
347
|
+
* Adds the specified targets to the specified rule, or updates the targets if they are already associated with the rule. Targets are the resources that are invoked when a rule is triggered. You can configure the following as targets for Events: EC2 instances SSM Run Command SSM Automation AWS Lambda functions Data streams in Amazon Kinesis Data Streams Data delivery streams in Amazon Kinesis Data Firehose Amazon ECS tasks AWS Step Functions state machines AWS Batch jobs AWS CodeBuild projects Pipelines in AWS CodePipeline Amazon Inspector assessment templates Amazon SNS topics Amazon SQS queues, including FIFO queues The default event bus of another AWS account Amazon API Gateway REST APIs Redshift Clusters to invoke Data API ExecuteStatement on Custom/SaaS HTTPS APIs via EventBridge API Destinations Amazon SageMaker Model Building Pipelines Creating rules with built-in targets is supported only in the AWS Management Console. The built-in targets are EC2 CreateSnapshot API call, EC2 RebootInstances API call, EC2 StopInstances API call, and EC2 TerminateInstances API call. For some target types, PutTargets provides target-specific parameters. If the target is a Kinesis data stream, you can optionally specify which shard the event goes to by using the KinesisParameters argument. To invoke a command on multiple EC2 instances with one rule, you can use the RunCommandParameters field. To be able to make API calls against the resources that you own, Amazon EventBridge (CloudWatch Events) needs the appropriate permissions. For AWS Lambda and Amazon SNS resources, EventBridge relies on resource-based policies. For EC2 instances, Kinesis data streams, AWS Step Functions state machines and API Gateway REST APIs, EventBridge relies on IAM roles that you specify in the RoleARN argument in PutTargets. For more information, see Authentication and Access Control in the Amazon EventBridge User Guide. If another AWS account is in the same region and has granted you permission (using PutPermission), you can send events to that account. Set that account's event bus as a target of the rules in your account. To send the matched events to the other account, specify that account's event bus as the Arn value when you run PutTargets. If your account sends events to another account, your account is charged for each sent event. Each event sent to another account is charged as a custom event. The account receiving the event is not charged. For more information, see Amazon EventBridge (CloudWatch Events) Pricing. Input, InputPath, and InputTransformer are not available with PutTarget if the target is an event bus of a different AWS account. If you are setting the event bus of another account as the target, and that account granted permission to your account through an organization instead of directly by the account ID, then you must specify a RoleArn with proper permissions in the Target structure. For more information, see Sending and Receiving Events Between AWS Accounts in the Amazon EventBridge User Guide. For more information about enabling cross-account events, see PutPermission. Input, InputPath, and InputTransformer are mutually exclusive and optional parameters of a target. When a rule is triggered due to a matched event: If none of the following arguments are specified for a target, then the entire event is passed to the target in JSON format (unless the target is Amazon EC2 Run Command or Amazon ECS task, in which case nothing from the event is passed to the target). If Input is specified in the form of valid JSON, then the matched event is overridden with this constant. If InputPath is specified in the form of JSONPath (for example, $.detail), then only the part of the event specified in the path is passed to the target (for example, only the detail part of the event is passed). If InputTransformer is specified, then one or more specified JSONPaths are extracted from the event and used as values in a template that you specify as the input to the target. When you specify InputPath or InputTransformer, you must use JSON dot notation, not bracket notation. When you add targets to a rule and the associated rule triggers soon after, new or updated targets might not be immediately invoked. Allow a short period of time for changes to take effect. This action can partially fail if too many requests are made at the same time. If that happens, FailedEntryCount is non-zero in the response and each entry in FailedEntries provides the ID of the failed target and the error code.
|
|
348
348
|
*/
|
|
349
349
|
putTargets(callback?: (err: AWSError, data: EventBridge.Types.PutTargetsResponse) => void): Request<EventBridge.Types.PutTargetsResponse, AWSError>;
|
|
350
350
|
/**
|
|
@@ -2357,6 +2357,25 @@ declare namespace EventBridge {
|
|
|
2357
2357
|
export type RunCommandTargetValue = string;
|
|
2358
2358
|
export type RunCommandTargetValues = RunCommandTargetValue[];
|
|
2359
2359
|
export type RunCommandTargets = RunCommandTarget[];
|
|
2360
|
+
export interface SageMakerPipelineParameter {
|
|
2361
|
+
/**
|
|
2362
|
+
* Name of parameter to start execution of a SageMaker Model Building Pipeline.
|
|
2363
|
+
*/
|
|
2364
|
+
Name: SageMakerPipelineParameterName;
|
|
2365
|
+
/**
|
|
2366
|
+
* Value of parameter to start execution of a SageMaker Model Building Pipeline.
|
|
2367
|
+
*/
|
|
2368
|
+
Value: SageMakerPipelineParameterValue;
|
|
2369
|
+
}
|
|
2370
|
+
export type SageMakerPipelineParameterList = SageMakerPipelineParameter[];
|
|
2371
|
+
export type SageMakerPipelineParameterName = string;
|
|
2372
|
+
export type SageMakerPipelineParameterValue = string;
|
|
2373
|
+
export interface SageMakerPipelineParameters {
|
|
2374
|
+
/**
|
|
2375
|
+
* List of Parameter names and values for SageMaker Model Building Pipeline execution.
|
|
2376
|
+
*/
|
|
2377
|
+
PipelineParameterList?: SageMakerPipelineParameterList;
|
|
2378
|
+
}
|
|
2360
2379
|
export type ScheduleExpression = string;
|
|
2361
2380
|
export type SecretsManagerSecretArn = string;
|
|
2362
2381
|
export type Sql = string;
|
|
@@ -2493,6 +2512,10 @@ declare namespace EventBridge {
|
|
|
2493
2512
|
* Contains the Redshift Data API parameters to use when the target is a Redshift cluster. If you specify a Redshift Cluster as a Target, you can use this to specify parameters to invoke the Redshift Data API ExecuteStatement based on EventBridge events.
|
|
2494
2513
|
*/
|
|
2495
2514
|
RedshiftDataParameters?: RedshiftDataParameters;
|
|
2515
|
+
/**
|
|
2516
|
+
* Contains the SageMaker Model Building Pipeline parameters to start execution of a SageMaker Model Building Pipeline. If you specify a SageMaker Model Building Pipeline as a target, you can use this to specify parameters to start a pipeline execution based on EventBridge events.
|
|
2517
|
+
*/
|
|
2518
|
+
SageMakerPipelineParameters?: SageMakerPipelineParameters;
|
|
2496
2519
|
/**
|
|
2497
2520
|
* The DeadLetterConfig that defines the target queue to send dead-letter queue events to.
|
|
2498
2521
|
*/
|
package/clients/glue.d.ts
CHANGED
|
@@ -684,11 +684,11 @@ declare class Glue extends Service {
|
|
|
684
684
|
*/
|
|
685
685
|
getRegistry(callback?: (err: AWSError, data: Glue.Types.GetRegistryResponse) => void): Request<Glue.Types.GetRegistryResponse, AWSError>;
|
|
686
686
|
/**
|
|
687
|
-
* Retrieves the
|
|
687
|
+
* Retrieves the resource policies set on individual resources by AWS Resource Access Manager during cross-account permission grants. Also retrieves the Data Catalog resource policy. If you enabled metadata encryption in Data Catalog settings, and you do not have permission on the AWS KMS key, the operation can't return the Data Catalog resource policy.
|
|
688
688
|
*/
|
|
689
689
|
getResourcePolicies(params: Glue.Types.GetResourcePoliciesRequest, callback?: (err: AWSError, data: Glue.Types.GetResourcePoliciesResponse) => void): Request<Glue.Types.GetResourcePoliciesResponse, AWSError>;
|
|
690
690
|
/**
|
|
691
|
-
* Retrieves the
|
|
691
|
+
* Retrieves the resource policies set on individual resources by AWS Resource Access Manager during cross-account permission grants. Also retrieves the Data Catalog resource policy. If you enabled metadata encryption in Data Catalog settings, and you do not have permission on the AWS KMS key, the operation can't return the Data Catalog resource policy.
|
|
692
692
|
*/
|
|
693
693
|
getResourcePolicies(callback?: (err: AWSError, data: Glue.Types.GetResourcePoliciesResponse) => void): Request<Glue.Types.GetResourcePoliciesResponse, AWSError>;
|
|
694
694
|
/**
|
|
@@ -4633,7 +4633,7 @@ declare namespace Glue {
|
|
|
4633
4633
|
export type GetResourcePoliciesResponseList = GluePolicy[];
|
|
4634
4634
|
export interface GetResourcePolicyRequest {
|
|
4635
4635
|
/**
|
|
4636
|
-
* The ARN of the AWS Glue resource for the resource policy
|
|
4636
|
+
* The ARN of the AWS Glue resource for which to retrieve the resource policy. If not supplied, the Data Catalog resource policy is returned. Use GetResourcePolicies to view all existing resource policies. For more information see Specifying AWS Glue Resource ARNs.
|
|
4637
4637
|
*/
|
|
4638
4638
|
ResourceArn?: GlueResourceArn;
|
|
4639
4639
|
}
|
|
@@ -6023,6 +6023,10 @@ declare namespace Glue {
|
|
|
6023
6023
|
* The time at which the entry was created.
|
|
6024
6024
|
*/
|
|
6025
6025
|
CreatedTime?: CreatedTimestamp;
|
|
6026
|
+
/**
|
|
6027
|
+
* Other metadata belonging to the same metadata key.
|
|
6028
|
+
*/
|
|
6029
|
+
OtherMetadataValueList?: OtherMetadataValueList;
|
|
6026
6030
|
}
|
|
6027
6031
|
export type MetadataInfoMap = {[key: string]: MetadataInfo};
|
|
6028
6032
|
export type MetadataKeyString = string;
|
|
@@ -6110,6 +6114,17 @@ declare namespace Glue {
|
|
|
6110
6114
|
SortOrder: IntegerFlag;
|
|
6111
6115
|
}
|
|
6112
6116
|
export type OrderList = Order[];
|
|
6117
|
+
export type OtherMetadataValueList = OtherMetadataValueListItem[];
|
|
6118
|
+
export interface OtherMetadataValueListItem {
|
|
6119
|
+
/**
|
|
6120
|
+
* The metadata key’s corresponding value for the other metadata belonging to the same metadata key.
|
|
6121
|
+
*/
|
|
6122
|
+
MetadataValue?: MetadataValueString;
|
|
6123
|
+
/**
|
|
6124
|
+
* The time at which the entry was created.
|
|
6125
|
+
*/
|
|
6126
|
+
CreatedTime?: CreatedTimestamp;
|
|
6127
|
+
}
|
|
6113
6128
|
export type PageSize = number;
|
|
6114
6129
|
export type PaginationToken = string;
|
|
6115
6130
|
export type ParametersMap = {[key: string]: ParametersMapValue};
|
|
@@ -6310,7 +6325,7 @@ declare namespace Glue {
|
|
|
6310
6325
|
*/
|
|
6311
6326
|
PolicyInJson: PolicyJsonString;
|
|
6312
6327
|
/**
|
|
6313
|
-
*
|
|
6328
|
+
* Do not use. For internal use only.
|
|
6314
6329
|
*/
|
|
6315
6330
|
ResourceArn?: GlueResourceArn;
|
|
6316
6331
|
/**
|
|
@@ -6318,11 +6333,11 @@ declare namespace Glue {
|
|
|
6318
6333
|
*/
|
|
6319
6334
|
PolicyHashCondition?: HashString;
|
|
6320
6335
|
/**
|
|
6321
|
-
* A value of MUST_EXIST is used to update a policy. A value of NOT_EXIST is used to create a new policy. If a value of NONE or a null value is used, the call
|
|
6336
|
+
* A value of MUST_EXIST is used to update a policy. A value of NOT_EXIST is used to create a new policy. If a value of NONE or a null value is used, the call does not depend on the existence of a policy.
|
|
6322
6337
|
*/
|
|
6323
6338
|
PolicyExistsCondition?: ExistCondition;
|
|
6324
6339
|
/**
|
|
6325
|
-
*
|
|
6340
|
+
* If 'TRUE', indicates that you are using both methods to grant cross-account access to Data Catalog resources: By directly updating the resource policy with PutResourePolicy By using the Grant permissions command on the AWS Management Console. Must be set to 'TRUE' if you have already used the Management Console to grant cross-account access, otherwise the call fails. Default is 'FALSE'.
|
|
6326
6341
|
*/
|
|
6327
6342
|
EnableHybrid?: EnableHybridValues;
|
|
6328
6343
|
}
|
package/clients/iotwireless.d.ts
CHANGED
|
@@ -459,7 +459,7 @@ declare namespace IoTWireless {
|
|
|
459
459
|
*/
|
|
460
460
|
ClientRequestToken?: ClientRequestToken;
|
|
461
461
|
/**
|
|
462
|
-
* The tags
|
|
462
|
+
* The tags to attach to the specified resource. Tags are metadata that you can use to manage a resource.
|
|
463
463
|
*/
|
|
464
464
|
Tags?: TagList;
|
|
465
465
|
}
|
|
@@ -542,7 +542,7 @@ declare namespace IoTWireless {
|
|
|
542
542
|
*/
|
|
543
543
|
RoleArn: RoleArn;
|
|
544
544
|
/**
|
|
545
|
-
* The tags to attach to the new destination. Tags are metadata that can
|
|
545
|
+
* The tags to attach to the new destination. Tags are metadata that you can use to manage a resource.
|
|
546
546
|
*/
|
|
547
547
|
Tags?: TagList;
|
|
548
548
|
/**
|
|
@@ -570,7 +570,7 @@ declare namespace IoTWireless {
|
|
|
570
570
|
*/
|
|
571
571
|
LoRaWAN?: LoRaWANDeviceProfile;
|
|
572
572
|
/**
|
|
573
|
-
* The tags to attach to the new device profile Tags are metadata that can
|
|
573
|
+
* The tags to attach to the new device profile. Tags are metadata that you can use to manage a resource.
|
|
574
574
|
*/
|
|
575
575
|
Tags?: TagList;
|
|
576
576
|
/**
|
|
@@ -598,7 +598,7 @@ declare namespace IoTWireless {
|
|
|
598
598
|
*/
|
|
599
599
|
LoRaWAN?: LoRaWANServiceProfile;
|
|
600
600
|
/**
|
|
601
|
-
* The tags to attach to the new service profile. Tags are metadata that can
|
|
601
|
+
* The tags to attach to the new service profile. Tags are metadata that you can use to manage a resource.
|
|
602
602
|
*/
|
|
603
603
|
Tags?: TagList;
|
|
604
604
|
/**
|
|
@@ -641,6 +641,10 @@ declare namespace IoTWireless {
|
|
|
641
641
|
* The device configuration information to use to create the wireless device.
|
|
642
642
|
*/
|
|
643
643
|
LoRaWAN?: LoRaWANDevice;
|
|
644
|
+
/**
|
|
645
|
+
* The tags to attach to the new wireless device. Tags are metadata that you can use to manage a resource.
|
|
646
|
+
*/
|
|
647
|
+
Tags?: TagList;
|
|
644
648
|
}
|
|
645
649
|
export interface CreateWirelessDeviceResponse {
|
|
646
650
|
/**
|
|
@@ -666,7 +670,7 @@ declare namespace IoTWireless {
|
|
|
666
670
|
*/
|
|
667
671
|
LoRaWAN: LoRaWANGateway;
|
|
668
672
|
/**
|
|
669
|
-
* The tags to attach to the new wireless gateway. Tags are metadata that can
|
|
673
|
+
* The tags to attach to the new wireless gateway. Tags are metadata that you can use to manage a resource.
|
|
670
674
|
*/
|
|
671
675
|
Tags?: TagList;
|
|
672
676
|
/**
|
|
@@ -702,7 +706,7 @@ declare namespace IoTWireless {
|
|
|
702
706
|
*/
|
|
703
707
|
ClientRequestToken?: ClientRequestToken;
|
|
704
708
|
/**
|
|
705
|
-
* The tags
|
|
709
|
+
* The tags to attach to the specified resource. Tags are metadata that you can use to manage a resource.
|
|
706
710
|
*/
|
|
707
711
|
Tags?: TagList;
|
|
708
712
|
}
|
|
@@ -1305,13 +1309,13 @@ declare namespace IoTWireless {
|
|
|
1305
1309
|
}
|
|
1306
1310
|
export interface ListTagsForResourceRequest {
|
|
1307
1311
|
/**
|
|
1308
|
-
* The ARN of the resource for which to list tags.
|
|
1312
|
+
* The ARN of the resource for which you want to list tags.
|
|
1309
1313
|
*/
|
|
1310
1314
|
ResourceArn: AmazonResourceName;
|
|
1311
1315
|
}
|
|
1312
1316
|
export interface ListTagsForResourceResponse {
|
|
1313
1317
|
/**
|
|
1314
|
-
* The tags
|
|
1318
|
+
* The tags to attach to the specified resource. Tags are metadata that you can use to manage a resource.
|
|
1315
1319
|
*/
|
|
1316
1320
|
Tags?: TagList;
|
|
1317
1321
|
}
|
|
@@ -1904,7 +1908,7 @@ declare namespace IoTWireless {
|
|
|
1904
1908
|
*/
|
|
1905
1909
|
ResourceArn: AmazonResourceName;
|
|
1906
1910
|
/**
|
|
1907
|
-
* Adds to or modifies the tags of the given resource. Tags are metadata that can
|
|
1911
|
+
* Adds to or modifies the tags of the given resource. Tags are metadata that you can use to manage a resource.
|
|
1908
1912
|
*/
|
|
1909
1913
|
Tags: TagList;
|
|
1910
1914
|
}
|