cdk-comprehend-s3olap 2.0.155 → 2.0.157

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (34) hide show
  1. package/.jsii +3 -3
  2. package/lib/cdk-comprehend-s3olap.js +2 -2
  3. package/lib/comprehend-lambdas.js +2 -2
  4. package/lib/iam-roles.js +4 -4
  5. package/node_modules/aws-sdk/CHANGELOG.md +14 -1
  6. package/node_modules/aws-sdk/README.md +1 -1
  7. package/node_modules/aws-sdk/apis/athena-2017-05-18.min.json +3 -0
  8. package/node_modules/aws-sdk/apis/codecatalyst-2022-09-28.min.json +75 -12
  9. package/node_modules/aws-sdk/apis/codecatalyst-2022-09-28.paginators.json +6 -0
  10. package/node_modules/aws-sdk/apis/glue-2017-03-31.min.json +6 -0
  11. package/node_modules/aws-sdk/apis/kafka-2018-11-14.min.json +6 -2
  12. package/node_modules/aws-sdk/apis/rekognition-2016-06-27.min.json +104 -90
  13. package/node_modules/aws-sdk/apis/rolesanywhere-2018-05-10.min.json +159 -43
  14. package/node_modules/aws-sdk/apis/transfer-2018-11-05.min.json +48 -47
  15. package/node_modules/aws-sdk/apis/wafv2-2019-07-29.min.json +194 -115
  16. package/node_modules/aws-sdk/clients/athena.d.ts +4 -0
  17. package/node_modules/aws-sdk/clients/codecatalyst.d.ts +66 -0
  18. package/node_modules/aws-sdk/clients/detective.d.ts +1 -1
  19. package/node_modules/aws-sdk/clients/directconnect.d.ts +2 -2
  20. package/node_modules/aws-sdk/clients/glue.d.ts +8 -0
  21. package/node_modules/aws-sdk/clients/kafka.d.ts +2 -2
  22. package/node_modules/aws-sdk/clients/rekognition.d.ts +19 -1
  23. package/node_modules/aws-sdk/clients/rolesanywhere.d.ts +154 -45
  24. package/node_modules/aws-sdk/clients/secretsmanager.d.ts +3 -3
  25. package/node_modules/aws-sdk/clients/transfer.d.ts +52 -44
  26. package/node_modules/aws-sdk/clients/wafv2.d.ts +103 -15
  27. package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +98 -73
  28. package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +1952 -1902
  29. package/node_modules/aws-sdk/dist/aws-sdk.js +111 -93
  30. package/node_modules/aws-sdk/dist/aws-sdk.min.js +30 -30
  31. package/node_modules/aws-sdk/lib/core.js +1 -1
  32. package/node_modules/aws-sdk/lib/region_config.js +1 -0
  33. package/node_modules/aws-sdk/package.json +1 -1
  34. package/package.json +3 -3
@@ -12,19 +12,19 @@ declare class RolesAnywhere extends Service {
12
12
  constructor(options?: RolesAnywhere.Types.ClientConfiguration)
13
13
  config: Config & RolesAnywhere.Types.ClientConfiguration;
14
14
  /**
15
- * Creates a profile. A profile is configuration resource to list the roles that RolesAnywhere service is trusted to assume. In addition, by applying a profile you can intersect permissions with IAM managed policies. Required permissions: rolesanywhere:CreateProfile.
15
+ * Creates a profile, a list of the roles that Roles Anywhere service is trusted to assume. You use profiles to intersect permissions with IAM managed policies. Required permissions: rolesanywhere:CreateProfile.
16
16
  */
17
17
  createProfile(params: RolesAnywhere.Types.CreateProfileRequest, callback?: (err: AWSError, data: RolesAnywhere.Types.ProfileDetailResponse) => void): Request<RolesAnywhere.Types.ProfileDetailResponse, AWSError>;
18
18
  /**
19
- * Creates a profile. A profile is configuration resource to list the roles that RolesAnywhere service is trusted to assume. In addition, by applying a profile you can intersect permissions with IAM managed policies. Required permissions: rolesanywhere:CreateProfile.
19
+ * Creates a profile, a list of the roles that Roles Anywhere service is trusted to assume. You use profiles to intersect permissions with IAM managed policies. Required permissions: rolesanywhere:CreateProfile.
20
20
  */
21
21
  createProfile(callback?: (err: AWSError, data: RolesAnywhere.Types.ProfileDetailResponse) => void): Request<RolesAnywhere.Types.ProfileDetailResponse, AWSError>;
22
22
  /**
23
- * Creates a trust anchor. You establish trust between IAM Roles Anywhere and your certificate authority (CA) by configuring a trust anchor. A Trust Anchor is defined either as a reference to a AWS Certificate Manager Private Certificate Authority (ACM PCA), or by uploading a Certificate Authority (CA) certificate. Your AWS workloads can authenticate with the trust anchor using certificates issued by the trusted Certificate Authority (CA) in exchange for temporary AWS credentials. Required permissions: rolesanywhere:CreateTrustAnchor.
23
+ * Creates a trust anchor to establish trust between IAM Roles Anywhere and your certificate authority (CA). You can define a trust anchor as a reference to an Private Certificate Authority (Private CA) or by uploading a CA certificate. Your Amazon Web Services workloads can authenticate with the trust anchor using certificates issued by the CA in exchange for temporary Amazon Web Services credentials. Required permissions: rolesanywhere:CreateTrustAnchor.
24
24
  */
25
25
  createTrustAnchor(params: RolesAnywhere.Types.CreateTrustAnchorRequest, callback?: (err: AWSError, data: RolesAnywhere.Types.TrustAnchorDetailResponse) => void): Request<RolesAnywhere.Types.TrustAnchorDetailResponse, AWSError>;
26
26
  /**
27
- * Creates a trust anchor. You establish trust between IAM Roles Anywhere and your certificate authority (CA) by configuring a trust anchor. A Trust Anchor is defined either as a reference to a AWS Certificate Manager Private Certificate Authority (ACM PCA), or by uploading a Certificate Authority (CA) certificate. Your AWS workloads can authenticate with the trust anchor using certificates issued by the trusted Certificate Authority (CA) in exchange for temporary AWS credentials. Required permissions: rolesanywhere:CreateTrustAnchor.
27
+ * Creates a trust anchor to establish trust between IAM Roles Anywhere and your certificate authority (CA). You can define a trust anchor as a reference to an Private Certificate Authority (Private CA) or by uploading a CA certificate. Your Amazon Web Services workloads can authenticate with the trust anchor using certificates issued by the CA in exchange for temporary Amazon Web Services credentials. Required permissions: rolesanywhere:CreateTrustAnchor.
28
28
  */
29
29
  createTrustAnchor(callback?: (err: AWSError, data: RolesAnywhere.Types.TrustAnchorDetailResponse) => void): Request<RolesAnywhere.Types.TrustAnchorDetailResponse, AWSError>;
30
30
  /**
@@ -60,19 +60,19 @@ declare class RolesAnywhere extends Service {
60
60
  */
61
61
  disableCrl(callback?: (err: AWSError, data: RolesAnywhere.Types.CrlDetailResponse) => void): Request<RolesAnywhere.Types.CrlDetailResponse, AWSError>;
62
62
  /**
63
- * Disables a profile. When disabled, CreateSession requests with this profile fail. Required permissions: rolesanywhere:DisableProfile.
63
+ * Disables a profile. When disabled, temporary credential requests with this profile fail. Required permissions: rolesanywhere:DisableProfile.
64
64
  */
65
65
  disableProfile(params: RolesAnywhere.Types.ScalarProfileRequest, callback?: (err: AWSError, data: RolesAnywhere.Types.ProfileDetailResponse) => void): Request<RolesAnywhere.Types.ProfileDetailResponse, AWSError>;
66
66
  /**
67
- * Disables a profile. When disabled, CreateSession requests with this profile fail. Required permissions: rolesanywhere:DisableProfile.
67
+ * Disables a profile. When disabled, temporary credential requests with this profile fail. Required permissions: rolesanywhere:DisableProfile.
68
68
  */
69
69
  disableProfile(callback?: (err: AWSError, data: RolesAnywhere.Types.ProfileDetailResponse) => void): Request<RolesAnywhere.Types.ProfileDetailResponse, AWSError>;
70
70
  /**
71
- * Disables a trust anchor. When disabled, CreateSession requests specifying this trust anchor are unauthorized. Required permissions: rolesanywhere:DisableTrustAnchor.
71
+ * Disables a trust anchor. When disabled, temporary credential requests specifying this trust anchor are unauthorized. Required permissions: rolesanywhere:DisableTrustAnchor.
72
72
  */
73
73
  disableTrustAnchor(params: RolesAnywhere.Types.ScalarTrustAnchorRequest, callback?: (err: AWSError, data: RolesAnywhere.Types.TrustAnchorDetailResponse) => void): Request<RolesAnywhere.Types.TrustAnchorDetailResponse, AWSError>;
74
74
  /**
75
- * Disables a trust anchor. When disabled, CreateSession requests specifying this trust anchor are unauthorized. Required permissions: rolesanywhere:DisableTrustAnchor.
75
+ * Disables a trust anchor. When disabled, temporary credential requests specifying this trust anchor are unauthorized. Required permissions: rolesanywhere:DisableTrustAnchor.
76
76
  */
77
77
  disableTrustAnchor(callback?: (err: AWSError, data: RolesAnywhere.Types.TrustAnchorDetailResponse) => void): Request<RolesAnywhere.Types.TrustAnchorDetailResponse, AWSError>;
78
78
  /**
@@ -84,11 +84,11 @@ declare class RolesAnywhere extends Service {
84
84
  */
85
85
  enableCrl(callback?: (err: AWSError, data: RolesAnywhere.Types.CrlDetailResponse) => void): Request<RolesAnywhere.Types.CrlDetailResponse, AWSError>;
86
86
  /**
87
- * Enables the roles in a profile to receive session credentials in CreateSession. Required permissions: rolesanywhere:EnableProfile.
87
+ * Enables temporary credential requests for a profile. Required permissions: rolesanywhere:EnableProfile.
88
88
  */
89
89
  enableProfile(params: RolesAnywhere.Types.ScalarProfileRequest, callback?: (err: AWSError, data: RolesAnywhere.Types.ProfileDetailResponse) => void): Request<RolesAnywhere.Types.ProfileDetailResponse, AWSError>;
90
90
  /**
91
- * Enables the roles in a profile to receive session credentials in CreateSession. Required permissions: rolesanywhere:EnableProfile.
91
+ * Enables temporary credential requests for a profile. Required permissions: rolesanywhere:EnableProfile.
92
92
  */
93
93
  enableProfile(callback?: (err: AWSError, data: RolesAnywhere.Types.ProfileDetailResponse) => void): Request<RolesAnywhere.Types.ProfileDetailResponse, AWSError>;
94
94
  /**
@@ -116,11 +116,11 @@ declare class RolesAnywhere extends Service {
116
116
  */
117
117
  getProfile(callback?: (err: AWSError, data: RolesAnywhere.Types.ProfileDetailResponse) => void): Request<RolesAnywhere.Types.ProfileDetailResponse, AWSError>;
118
118
  /**
119
- * Gets a Subject. A Subject associates a certificate identity with authentication attempts by CreateSession. The Subject resources stores audit information such as status of the last authentication attempt, the certificate data used in the attempt, and the last time the associated identity attempted authentication. Required permissions: rolesanywhere:GetSubject.
119
+ * Gets a subject, which associates a certificate identity with authentication attempts. The subject stores auditing information such as the status of the last authentication attempt, the certificate data used in the attempt, and the last time the associated identity attempted authentication. Required permissions: rolesanywhere:GetSubject.
120
120
  */
121
121
  getSubject(params: RolesAnywhere.Types.ScalarSubjectRequest, callback?: (err: AWSError, data: RolesAnywhere.Types.SubjectDetailResponse) => void): Request<RolesAnywhere.Types.SubjectDetailResponse, AWSError>;
122
122
  /**
123
- * Gets a Subject. A Subject associates a certificate identity with authentication attempts by CreateSession. The Subject resources stores audit information such as status of the last authentication attempt, the certificate data used in the attempt, and the last time the associated identity attempted authentication. Required permissions: rolesanywhere:GetSubject.
123
+ * Gets a subject, which associates a certificate identity with authentication attempts. The subject stores auditing information such as the status of the last authentication attempt, the certificate data used in the attempt, and the last time the associated identity attempted authentication. Required permissions: rolesanywhere:GetSubject.
124
124
  */
125
125
  getSubject(callback?: (err: AWSError, data: RolesAnywhere.Types.SubjectDetailResponse) => void): Request<RolesAnywhere.Types.SubjectDetailResponse, AWSError>;
126
126
  /**
@@ -132,19 +132,19 @@ declare class RolesAnywhere extends Service {
132
132
  */
133
133
  getTrustAnchor(callback?: (err: AWSError, data: RolesAnywhere.Types.TrustAnchorDetailResponse) => void): Request<RolesAnywhere.Types.TrustAnchorDetailResponse, AWSError>;
134
134
  /**
135
- * Imports the certificate revocation list (CRL). CRl is a list of certificates that have been revoked by the issuing certificate Authority (CA). IAM Roles Anywhere validates against the crl list before issuing credentials. Required permissions: rolesanywhere:ImportCrl.
135
+ * Imports the certificate revocation list (CRL). A CRL is a list of certificates that have been revoked by the issuing certificate Authority (CA). IAM Roles Anywhere validates against the CRL before issuing credentials. Required permissions: rolesanywhere:ImportCrl.
136
136
  */
137
137
  importCrl(params: RolesAnywhere.Types.ImportCrlRequest, callback?: (err: AWSError, data: RolesAnywhere.Types.CrlDetailResponse) => void): Request<RolesAnywhere.Types.CrlDetailResponse, AWSError>;
138
138
  /**
139
- * Imports the certificate revocation list (CRL). CRl is a list of certificates that have been revoked by the issuing certificate Authority (CA). IAM Roles Anywhere validates against the crl list before issuing credentials. Required permissions: rolesanywhere:ImportCrl.
139
+ * Imports the certificate revocation list (CRL). A CRL is a list of certificates that have been revoked by the issuing certificate Authority (CA). IAM Roles Anywhere validates against the CRL before issuing credentials. Required permissions: rolesanywhere:ImportCrl.
140
140
  */
141
141
  importCrl(callback?: (err: AWSError, data: RolesAnywhere.Types.CrlDetailResponse) => void): Request<RolesAnywhere.Types.CrlDetailResponse, AWSError>;
142
142
  /**
143
- * Lists all Crls in the authenticated account and Amazon Web Services Region. Required permissions: rolesanywhere:ListCrls.
143
+ * Lists all certificate revocation lists (CRL) in the authenticated account and Amazon Web Services Region. Required permissions: rolesanywhere:ListCrls.
144
144
  */
145
145
  listCrls(params: RolesAnywhere.Types.ListRequest, callback?: (err: AWSError, data: RolesAnywhere.Types.ListCrlsResponse) => void): Request<RolesAnywhere.Types.ListCrlsResponse, AWSError>;
146
146
  /**
147
- * Lists all Crls in the authenticated account and Amazon Web Services Region. Required permissions: rolesanywhere:ListCrls.
147
+ * Lists all certificate revocation lists (CRL) in the authenticated account and Amazon Web Services Region. Required permissions: rolesanywhere:ListCrls.
148
148
  */
149
149
  listCrls(callback?: (err: AWSError, data: RolesAnywhere.Types.ListCrlsResponse) => void): Request<RolesAnywhere.Types.ListCrlsResponse, AWSError>;
150
150
  /**
@@ -179,6 +179,22 @@ declare class RolesAnywhere extends Service {
179
179
  * Lists the trust anchors in the authenticated account and Amazon Web Services Region. Required permissions: rolesanywhere:ListTrustAnchors.
180
180
  */
181
181
  listTrustAnchors(callback?: (err: AWSError, data: RolesAnywhere.Types.ListTrustAnchorsResponse) => void): Request<RolesAnywhere.Types.ListTrustAnchorsResponse, AWSError>;
182
+ /**
183
+ * Attaches a list of notification settings to a trust anchor. A notification setting includes information such as event name, threshold, status of the notification setting, and the channel to notify. Required permissions: rolesanywhere:PutNotificationSettings.
184
+ */
185
+ putNotificationSettings(params: RolesAnywhere.Types.PutNotificationSettingsRequest, callback?: (err: AWSError, data: RolesAnywhere.Types.PutNotificationSettingsResponse) => void): Request<RolesAnywhere.Types.PutNotificationSettingsResponse, AWSError>;
186
+ /**
187
+ * Attaches a list of notification settings to a trust anchor. A notification setting includes information such as event name, threshold, status of the notification setting, and the channel to notify. Required permissions: rolesanywhere:PutNotificationSettings.
188
+ */
189
+ putNotificationSettings(callback?: (err: AWSError, data: RolesAnywhere.Types.PutNotificationSettingsResponse) => void): Request<RolesAnywhere.Types.PutNotificationSettingsResponse, AWSError>;
190
+ /**
191
+ * Resets the custom notification setting to IAM Roles Anywhere default setting. Required permissions: rolesanywhere:ResetNotificationSettings.
192
+ */
193
+ resetNotificationSettings(params: RolesAnywhere.Types.ResetNotificationSettingsRequest, callback?: (err: AWSError, data: RolesAnywhere.Types.ResetNotificationSettingsResponse) => void): Request<RolesAnywhere.Types.ResetNotificationSettingsResponse, AWSError>;
194
+ /**
195
+ * Resets the custom notification setting to IAM Roles Anywhere default setting. Required permissions: rolesanywhere:ResetNotificationSettings.
196
+ */
197
+ resetNotificationSettings(callback?: (err: AWSError, data: RolesAnywhere.Types.ResetNotificationSettingsResponse) => void): Request<RolesAnywhere.Types.ResetNotificationSettingsResponse, AWSError>;
182
198
  /**
183
199
  * Attaches tags to a resource. Required permissions: rolesanywhere:TagResource.
184
200
  */
@@ -196,27 +212,27 @@ declare class RolesAnywhere extends Service {
196
212
  */
197
213
  untagResource(callback?: (err: AWSError, data: RolesAnywhere.Types.UntagResourceResponse) => void): Request<RolesAnywhere.Types.UntagResourceResponse, AWSError>;
198
214
  /**
199
- * Updates the certificate revocation list (CRL). CRl is a list of certificates that have been revoked by the issuing certificate Authority (CA). IAM Roles Anywhere validates against the crl list before issuing credentials. Required permissions: rolesanywhere:UpdateCrl.
215
+ * Updates the certificate revocation list (CRL). A CRL is a list of certificates that have been revoked by the issuing certificate authority (CA). IAM Roles Anywhere validates against the CRL before issuing credentials. Required permissions: rolesanywhere:UpdateCrl.
200
216
  */
201
217
  updateCrl(params: RolesAnywhere.Types.UpdateCrlRequest, callback?: (err: AWSError, data: RolesAnywhere.Types.CrlDetailResponse) => void): Request<RolesAnywhere.Types.CrlDetailResponse, AWSError>;
202
218
  /**
203
- * Updates the certificate revocation list (CRL). CRl is a list of certificates that have been revoked by the issuing certificate Authority (CA). IAM Roles Anywhere validates against the crl list before issuing credentials. Required permissions: rolesanywhere:UpdateCrl.
219
+ * Updates the certificate revocation list (CRL). A CRL is a list of certificates that have been revoked by the issuing certificate authority (CA). IAM Roles Anywhere validates against the CRL before issuing credentials. Required permissions: rolesanywhere:UpdateCrl.
204
220
  */
205
221
  updateCrl(callback?: (err: AWSError, data: RolesAnywhere.Types.CrlDetailResponse) => void): Request<RolesAnywhere.Types.CrlDetailResponse, AWSError>;
206
222
  /**
207
- * Updates the profile. A profile is configuration resource to list the roles that RolesAnywhere service is trusted to assume. In addition, by applying a profile you can scope-down permissions with IAM managed policies. Required permissions: rolesanywhere:UpdateProfile.
223
+ * Updates a profile, a list of the roles that IAM Roles Anywhere service is trusted to assume. You use profiles to intersect permissions with IAM managed policies. Required permissions: rolesanywhere:UpdateProfile.
208
224
  */
209
225
  updateProfile(params: RolesAnywhere.Types.UpdateProfileRequest, callback?: (err: AWSError, data: RolesAnywhere.Types.ProfileDetailResponse) => void): Request<RolesAnywhere.Types.ProfileDetailResponse, AWSError>;
210
226
  /**
211
- * Updates the profile. A profile is configuration resource to list the roles that RolesAnywhere service is trusted to assume. In addition, by applying a profile you can scope-down permissions with IAM managed policies. Required permissions: rolesanywhere:UpdateProfile.
227
+ * Updates a profile, a list of the roles that IAM Roles Anywhere service is trusted to assume. You use profiles to intersect permissions with IAM managed policies. Required permissions: rolesanywhere:UpdateProfile.
212
228
  */
213
229
  updateProfile(callback?: (err: AWSError, data: RolesAnywhere.Types.ProfileDetailResponse) => void): Request<RolesAnywhere.Types.ProfileDetailResponse, AWSError>;
214
230
  /**
215
- * Updates the trust anchor.You establish trust between IAM Roles Anywhere and your certificate authority (CA) by configuring a trust anchor. A Trust Anchor is defined either as a reference to a AWS Certificate Manager Private Certificate Authority (ACM PCA), or by uploading a Certificate Authority (CA) certificate. Your AWS workloads can authenticate with the trust anchor using certificates issued by the trusted Certificate Authority (CA) in exchange for temporary AWS credentials. Required permissions: rolesanywhere:UpdateTrustAnchor.
231
+ * Updates a trust anchor. You establish trust between IAM Roles Anywhere and your certificate authority (CA) by configuring a trust anchor. You can define a trust anchor as a reference to an Private Certificate Authority (Private CA) or by uploading a CA certificate. Your Amazon Web Services workloads can authenticate with the trust anchor using certificates issued by the CA in exchange for temporary Amazon Web Services credentials. Required permissions: rolesanywhere:UpdateTrustAnchor.
216
232
  */
217
233
  updateTrustAnchor(params: RolesAnywhere.Types.UpdateTrustAnchorRequest, callback?: (err: AWSError, data: RolesAnywhere.Types.TrustAnchorDetailResponse) => void): Request<RolesAnywhere.Types.TrustAnchorDetailResponse, AWSError>;
218
234
  /**
219
- * Updates the trust anchor.You establish trust between IAM Roles Anywhere and your certificate authority (CA) by configuring a trust anchor. A Trust Anchor is defined either as a reference to a AWS Certificate Manager Private Certificate Authority (ACM PCA), or by uploading a Certificate Authority (CA) certificate. Your AWS workloads can authenticate with the trust anchor using certificates issued by the trusted Certificate Authority (CA) in exchange for temporary AWS credentials. Required permissions: rolesanywhere:UpdateTrustAnchor.
235
+ * Updates a trust anchor. You establish trust between IAM Roles Anywhere and your certificate authority (CA) by configuring a trust anchor. You can define a trust anchor as a reference to an Private Certificate Authority (Private CA) or by uploading a CA certificate. Your Amazon Web Services workloads can authenticate with the trust anchor using certificates issued by the CA in exchange for temporary Amazon Web Services credentials. Required permissions: rolesanywhere:UpdateTrustAnchor.
220
236
  */
221
237
  updateTrustAnchor(callback?: (err: AWSError, data: RolesAnywhere.Types.TrustAnchorDetailResponse) => void): Request<RolesAnywhere.Types.TrustAnchorDetailResponse, AWSError>;
222
238
  }
@@ -242,11 +258,11 @@ declare namespace RolesAnywhere {
242
258
  */
243
259
  name: ResourceName;
244
260
  /**
245
- * Specifies whether instance properties are required in CreateSession requests with this profile.
261
+ * Specifies whether instance properties are required in temporary credential requests with this profile.
246
262
  */
247
263
  requireInstanceProperties?: Boolean;
248
264
  /**
249
- * A list of IAM roles that this profile can assume in a CreateSession operation.
265
+ * A list of IAM roles that this profile can assume in a temporary credential request.
250
266
  */
251
267
  roleArns: RoleArnList;
252
268
  /**
@@ -268,6 +284,10 @@ declare namespace RolesAnywhere {
268
284
  * The name of the trust anchor.
269
285
  */
270
286
  name: ResourceName;
287
+ /**
288
+ * A list of notification settings to be associated to the trust anchor.
289
+ */
290
+ notificationSettings?: NotificationSettings;
271
291
  /**
272
292
  * The trust anchor type and its related certificate data.
273
293
  */
@@ -284,7 +304,7 @@ declare namespace RolesAnywhere {
284
304
  */
285
305
  enabled?: Boolean;
286
306
  /**
287
- * Indicates whether the CreateSession operation was successful.
307
+ * Indicates whether the temporary credential request was successful.
288
308
  */
289
309
  failed?: Boolean;
290
310
  /**
@@ -292,7 +312,7 @@ declare namespace RolesAnywhere {
292
312
  */
293
313
  issuer?: String;
294
314
  /**
295
- * The ISO-8601 time stamp of when the certificate was last used in a CreateSession operation.
315
+ * The ISO-8601 time stamp of when the certificate was last used in a temporary credential request.
296
316
  */
297
317
  seenAt?: SyntheticTimestamp_date_time;
298
318
  /**
@@ -347,7 +367,7 @@ declare namespace RolesAnywhere {
347
367
  export type CrlDetails = CrlDetail[];
348
368
  export interface ImportCrlRequest {
349
369
  /**
350
- * The x509 v3 specified certificate revocation list
370
+ * The x509 v3 specified certificate revocation list (CRL).
351
371
  */
352
372
  crlData: ImportCrlRequestCrlDataBlob;
353
373
  /**
@@ -371,7 +391,7 @@ declare namespace RolesAnywhere {
371
391
  export type InstanceProperties = InstanceProperty[];
372
392
  export interface InstanceProperty {
373
393
  /**
374
- * Indicates whether the CreateSession operation was successful.
394
+ * Indicates whether the temporary credential request was successful.
375
395
  */
376
396
  failed?: Boolean;
377
397
  /**
@@ -379,7 +399,7 @@ declare namespace RolesAnywhere {
379
399
  */
380
400
  properties?: InstancePropertyMap;
381
401
  /**
382
- * The ISO-8601 time stamp of when the certificate was last used in a CreateSession operation.
402
+ * The ISO-8601 time stamp of when the certificate was last used in a temporary credential request.
383
403
  */
384
404
  seenAt?: SyntheticTimestamp_date_time;
385
405
  }
@@ -393,13 +413,13 @@ declare namespace RolesAnywhere {
393
413
  */
394
414
  crls?: CrlDetails;
395
415
  /**
396
- * A token that indicates where the output should continue from, if a previous operation did not show all results. To get the next results, call the operation again with this value.
416
+ * A token that indicates where the output should continue from, if a previous request did not show all results. To get the next results, make the request again with this value.
397
417
  */
398
418
  nextToken?: String;
399
419
  }
400
420
  export interface ListProfilesResponse {
401
421
  /**
402
- * A token that indicates where the output should continue from, if a previous operation did not show all results. To get the next results, call the operation again with this value.
422
+ * A token that indicates where the output should continue from, if a previous request did not show all results. To get the next results, make the request again with this value.
403
423
  */
404
424
  nextToken?: String;
405
425
  /**
@@ -409,7 +429,7 @@ declare namespace RolesAnywhere {
409
429
  }
410
430
  export interface ListRequest {
411
431
  /**
412
- * A token that indicates where the output should continue from, if a previous operation did not show all results. To get the next results, call the operation again with this value.
432
+ * A token that indicates where the output should continue from, if a previous request did not show all results. To get the next results, make the request again with this value.
413
433
  */
414
434
  nextToken?: ListRequestNextTokenString;
415
435
  /**
@@ -420,7 +440,7 @@ declare namespace RolesAnywhere {
420
440
  export type ListRequestNextTokenString = string;
421
441
  export interface ListSubjectsResponse {
422
442
  /**
423
- * A token that indicates where the output should continue from, if a previous operation did not show all results. To get the next results, call the operation again with this value.
443
+ * A token that indicates where the output should continue from, if a previous request did not show all results. To get the next results, make the request again with this value.
424
444
  */
425
445
  nextToken?: String;
426
446
  /**
@@ -442,7 +462,7 @@ declare namespace RolesAnywhere {
442
462
  }
443
463
  export interface ListTrustAnchorsResponse {
444
464
  /**
445
- * A token that indicates where the output should continue from, if a previous operation did not show all results. To get the next results, call the operation again with this value.
465
+ * A token that indicates where the output should continue from, if a previous request did not show all results. To get the next results, make the request again with this value.
446
466
  */
447
467
  nextToken?: String;
448
468
  /**
@@ -452,6 +472,64 @@ declare namespace RolesAnywhere {
452
472
  }
453
473
  export type ManagedPolicyList = ManagedPolicyListMemberString[];
454
474
  export type ManagedPolicyListMemberString = string;
475
+ export type NotificationChannel = "ALL"|string;
476
+ export type NotificationEvent = "CA_CERTIFICATE_EXPIRY"|"END_ENTITY_CERTIFICATE_EXPIRY"|string;
477
+ export interface NotificationSetting {
478
+ /**
479
+ * The specified channel of notification. IAM Roles Anywhere uses CloudWatch metrics, EventBridge, and Health Dashboard to notify for an event. In the absence of a specific channel, IAM Roles Anywhere applies this setting to 'ALL' channels.
480
+ */
481
+ channel?: NotificationChannel;
482
+ /**
483
+ * Indicates whether the notification setting is enabled.
484
+ */
485
+ enabled: Boolean;
486
+ /**
487
+ * The event to which this notification setting is applied.
488
+ */
489
+ event: NotificationEvent;
490
+ /**
491
+ * The number of days before a notification event. This value is required for a notification setting that is enabled.
492
+ */
493
+ threshold?: NotificationSettingThresholdInteger;
494
+ }
495
+ export interface NotificationSettingDetail {
496
+ /**
497
+ * The specified channel of notification. IAM Roles Anywhere uses CloudWatch metrics, EventBridge, and Health Dashboard to notify for an event. In the absence of a specific channel, IAM Roles Anywhere applies this setting to 'ALL' channels.
498
+ */
499
+ channel?: NotificationChannel;
500
+ /**
501
+ * The principal that configured the notification setting. For default settings configured by IAM Roles Anywhere, the value is rolesanywhere.amazonaws.com, and for customized notifications settings, it is the respective account ID.
502
+ */
503
+ configuredBy?: NotificationSettingDetailConfiguredByString;
504
+ /**
505
+ * Indicates whether the notification setting is enabled.
506
+ */
507
+ enabled: Boolean;
508
+ /**
509
+ * The event to which this notification setting is applied.
510
+ */
511
+ event: NotificationEvent;
512
+ /**
513
+ * The number of days before a notification event.
514
+ */
515
+ threshold?: NotificationSettingDetailThresholdInteger;
516
+ }
517
+ export type NotificationSettingDetailConfiguredByString = string;
518
+ export type NotificationSettingDetailThresholdInteger = number;
519
+ export type NotificationSettingDetails = NotificationSettingDetail[];
520
+ export interface NotificationSettingKey {
521
+ /**
522
+ * The specified channel of notification.
523
+ */
524
+ channel?: NotificationChannel;
525
+ /**
526
+ * The notification setting event to reset.
527
+ */
528
+ event: NotificationEvent;
529
+ }
530
+ export type NotificationSettingKeys = NotificationSettingKey[];
531
+ export type NotificationSettingThresholdInteger = number;
532
+ export type NotificationSettings = NotificationSetting[];
455
533
  export type ProfileArn = string;
456
534
  export interface ProfileDetail {
457
535
  /**
@@ -487,11 +565,11 @@ declare namespace RolesAnywhere {
487
565
  */
488
566
  profileId?: Uuid;
489
567
  /**
490
- * Specifies whether instance properties are required in CreateSession requests with this profile.
568
+ * Specifies whether instance properties are required in temporary credential requests with this profile.
491
569
  */
492
570
  requireInstanceProperties?: Boolean;
493
571
  /**
494
- * A list of IAM roles that this profile can assume in a CreateSession operation.
572
+ * A list of IAM roles that this profile can assume in a temporary credential request.
495
573
  */
496
574
  roleArns?: RoleArnList;
497
575
  /**
@@ -510,6 +588,32 @@ declare namespace RolesAnywhere {
510
588
  profile?: ProfileDetail;
511
589
  }
512
590
  export type ProfileDetails = ProfileDetail[];
591
+ export interface PutNotificationSettingsRequest {
592
+ /**
593
+ * A list of notification settings to be associated to the trust anchor.
594
+ */
595
+ notificationSettings: NotificationSettings;
596
+ /**
597
+ * The unique identifier of the trust anchor.
598
+ */
599
+ trustAnchorId: Uuid;
600
+ }
601
+ export interface PutNotificationSettingsResponse {
602
+ trustAnchor: TrustAnchorDetail;
603
+ }
604
+ export interface ResetNotificationSettingsRequest {
605
+ /**
606
+ * A list of notification setting keys to reset. A notification setting key includes the event and the channel.
607
+ */
608
+ notificationSettingKeys: NotificationSettingKeys;
609
+ /**
610
+ * The unique identifier of the trust anchor.
611
+ */
612
+ trustAnchorId: Uuid;
613
+ }
614
+ export interface ResetNotificationSettingsResponse {
615
+ trustAnchor: TrustAnchorDetail;
616
+ }
513
617
  export type ResourceName = string;
514
618
  export type RoleArn = string;
515
619
  export type RoleArnList = RoleArn[];
@@ -549,14 +653,15 @@ declare namespace RolesAnywhere {
549
653
  }
550
654
  export interface SourceData {
551
655
  /**
552
- * The root certificate of the Certificate Manager Private Certificate Authority specified by this ARN is used in trust validation for CreateSession operations. Included for trust anchors of type AWS_ACM_PCA.
656
+ * The root certificate of the Private Certificate Authority specified by this ARN is used in trust validation for temporary credential requests. Included for trust anchors of type AWS_ACM_PCA.
553
657
  */
554
658
  acmPcaArn?: String;
555
659
  /**
556
660
  * The PEM-encoded data for the certificate anchor. Included for trust anchors of type CERTIFICATE_BUNDLE.
557
661
  */
558
- x509CertificateData?: String;
662
+ x509CertificateData?: SourceDataX509CertificateDataString;
559
663
  }
664
+ export type SourceDataX509CertificateDataString = string;
560
665
  export type String = string;
561
666
  export interface SubjectDetail {
562
667
  /**
@@ -564,7 +669,7 @@ declare namespace RolesAnywhere {
564
669
  */
565
670
  createdAt?: SyntheticTimestamp_date_time;
566
671
  /**
567
- * The temporary session credentials vended at the last authenticating call with this Subject.
672
+ * The temporary session credentials vended at the last authenticating call with this subject.
568
673
  */
569
674
  credentials?: CredentialSummaries;
570
675
  /**
@@ -576,7 +681,7 @@ declare namespace RolesAnywhere {
576
681
  */
577
682
  instanceProperties?: InstanceProperties;
578
683
  /**
579
- * The ISO-8601 timestamp of the last time this Subject requested temporary session credentials.
684
+ * The ISO-8601 timestamp of the last time this subject requested temporary session credentials.
580
685
  */
581
686
  lastSeenAt?: SyntheticTimestamp_date_time;
582
687
  /**
@@ -605,15 +710,15 @@ declare namespace RolesAnywhere {
605
710
  export type SubjectSummaries = SubjectSummary[];
606
711
  export interface SubjectSummary {
607
712
  /**
608
- * The ISO-8601 time stamp of when the certificate was first used in a CreateSession operation.
713
+ * The ISO-8601 time stamp of when the certificate was first used in a temporary credential request.
609
714
  */
610
715
  createdAt?: SyntheticTimestamp_date_time;
611
716
  /**
612
- * The enabled status of the Subject.
717
+ * The enabled status of the subject.
613
718
  */
614
719
  enabled?: Boolean;
615
720
  /**
616
- * The ISO-8601 time stamp of when the certificate was last used in a CreateSession operation.
721
+ * The ISO-8601 time stamp of when the certificate was last used in a temporary credential request.
617
722
  */
618
723
  lastSeenAt?: SyntheticTimestamp_date_time;
619
724
  /**
@@ -674,6 +779,10 @@ declare namespace RolesAnywhere {
674
779
  * The name of the trust anchor.
675
780
  */
676
781
  name?: ResourceName;
782
+ /**
783
+ * A list of notification settings to be associated to the trust anchor.
784
+ */
785
+ notificationSettings?: NotificationSettingDetails;
677
786
  /**
678
787
  * The trust anchor type and its related certificate data.
679
788
  */
@@ -713,7 +822,7 @@ declare namespace RolesAnywhere {
713
822
  }
714
823
  export interface UpdateCrlRequest {
715
824
  /**
716
- * The x509 v3 specified certificate revocation list
825
+ * The x509 v3 specified certificate revocation list (CRL).
717
826
  */
718
827
  crlData?: UpdateCrlRequestCrlDataBlob;
719
828
  /**
@@ -744,7 +853,7 @@ declare namespace RolesAnywhere {
744
853
  */
745
854
  profileId: Uuid;
746
855
  /**
747
- * A list of IAM roles that this profile can assume in a CreateSession operation.
856
+ * A list of IAM roles that this profile can assume in a temporary credential request.
748
857
  */
749
858
  roleArns?: RoleArnList;
750
859
  /**
@@ -296,7 +296,7 @@ declare namespace SecretsManager {
296
296
  */
297
297
  RecoveryWindowInDays?: RecoveryWindowInDaysType;
298
298
  /**
299
- * Specifies whether to delete the secret without any recovery window. You can't use both this parameter and RecoveryWindowInDays in the same call. If you don't use either, then by default Secrets Manager uses a 30 day recovery window. Secrets Manager performs the actual deletion with an asynchronous background process, so there might be a short delay before the secret is permanently deleted. If you delete a secret and then immediately create a secret with the same name, use appropriate back off and retry logic. Use this parameter with caution. This parameter causes the operation to skip the normal recovery window before the permanent deletion that Secrets Manager would normally impose with the RecoveryWindowInDays parameter. If you delete a secret with the ForceDeleteWithoutRecovery parameter, then you have no opportunity to recover the secret. You lose the secret permanently.
299
+ * Specifies whether to delete the secret without any recovery window. You can't use both this parameter and RecoveryWindowInDays in the same call. If you don't use either, then by default Secrets Manager uses a 30 day recovery window. Secrets Manager performs the actual deletion with an asynchronous background process, so there might be a short delay before the secret is permanently deleted. If you delete a secret and then immediately create a secret with the same name, use appropriate back off and retry logic. If you forcibly delete an already deleted or nonexistent secret, the operation does not return ResourceNotFoundException. Use this parameter with caution. This parameter causes the operation to skip the normal recovery window before the permanent deletion that Secrets Manager would normally impose with the RecoveryWindowInDays parameter. If you delete a secret with the ForceDeleteWithoutRecovery parameter, then you have no opportunity to recover the secret. You lose the secret permanently.
300
300
  */
301
301
  ForceDeleteWithoutRecovery?: BooleanType;
302
302
  }
@@ -368,7 +368,7 @@ declare namespace SecretsManager {
368
368
  */
369
369
  DeletedDate?: DeletedDateType;
370
370
  /**
371
- * The next date and time that Secrets Manager will rotate the secret, rounded to the nearest hour. If the secret isn't configured for rotation, Secrets Manager returns null.
371
+ * The next rotation is scheduled to occur on or before this date. If the secret isn't configured for rotation, Secrets Manager returns null.
372
372
  */
373
373
  NextRotationDate?: NextRotationDateType;
374
374
  /**
@@ -867,7 +867,7 @@ declare namespace SecretsManager {
867
867
  */
868
868
  DeletedDate?: DeletedDateType;
869
869
  /**
870
- * The next date and time that Secrets Manager will attempt to rotate the secret, rounded to the nearest hour. This value is null if the secret is not set up for rotation.
870
+ * The next rotation is scheduled to occur on or before this date. If the secret isn't configured for rotation, Secrets Manager returns null.
871
871
  */
872
872
  NextRotationDate?: NextRotationDateType;
873
873
  /**