cdk-comprehend-s3olap 2.0.42 → 2.0.43

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -3914,7 +3914,7 @@
3914
3914
  "shape": "Sls"
3915
3915
  },
3916
3916
  "thingGroupIndexingConfiguration": {
3917
- "shape": "Sm1"
3917
+ "shape": "Sm4"
3918
3918
  }
3919
3919
  }
3920
3920
  }
@@ -4360,7 +4360,7 @@
4360
4360
  "shape": "S8s"
4361
4361
  },
4362
4362
  "violationEventAdditionalInfo": {
4363
- "shape": "Snj"
4363
+ "shape": "Snm"
4364
4364
  },
4365
4365
  "verificationState": {},
4366
4366
  "verificationStateDescription": {},
@@ -4411,7 +4411,7 @@
4411
4411
  "type": "structure",
4412
4412
  "members": {
4413
4413
  "policies": {
4414
- "shape": "Snq"
4414
+ "shape": "Snt"
4415
4415
  },
4416
4416
  "nextMarker": {}
4417
4417
  }
@@ -4848,7 +4848,7 @@
4848
4848
  "type": "structure",
4849
4849
  "members": {
4850
4850
  "certificates": {
4851
- "shape": "Sos"
4851
+ "shape": "Sov"
4852
4852
  },
4853
4853
  "nextMarker": {}
4854
4854
  }
@@ -4889,7 +4889,7 @@
4889
4889
  "type": "structure",
4890
4890
  "members": {
4891
4891
  "certificates": {
4892
- "shape": "Sos"
4892
+ "shape": "Sov"
4893
4893
  },
4894
4894
  "nextMarker": {}
4895
4895
  }
@@ -5217,7 +5217,7 @@
5217
5217
  "members": {
5218
5218
  "thingArn": {},
5219
5219
  "jobExecutionSummary": {
5220
- "shape": "Sps"
5220
+ "shape": "Spv"
5221
5221
  }
5222
5222
  }
5223
5223
  }
@@ -5274,7 +5274,7 @@
5274
5274
  "members": {
5275
5275
  "jobId": {},
5276
5276
  "jobExecutionSummary": {
5277
- "shape": "Sps"
5277
+ "shape": "Spv"
5278
5278
  }
5279
5279
  }
5280
5280
  }
@@ -5674,7 +5674,7 @@
5674
5674
  "type": "structure",
5675
5675
  "members": {
5676
5676
  "policies": {
5677
- "shape": "Snq"
5677
+ "shape": "Snt"
5678
5678
  },
5679
5679
  "nextMarker": {}
5680
5680
  }
@@ -5715,7 +5715,7 @@
5715
5715
  "type": "structure",
5716
5716
  "members": {
5717
5717
  "principals": {
5718
- "shape": "Squ"
5718
+ "shape": "Sqx"
5719
5719
  },
5720
5720
  "nextMarker": {}
5721
5721
  }
@@ -5795,7 +5795,7 @@
5795
5795
  "type": "structure",
5796
5796
  "members": {
5797
5797
  "policies": {
5798
- "shape": "Snq"
5798
+ "shape": "Snt"
5799
5799
  },
5800
5800
  "nextMarker": {}
5801
5801
  }
@@ -5832,7 +5832,7 @@
5832
5832
  "type": "structure",
5833
5833
  "members": {
5834
5834
  "things": {
5835
- "shape": "Sr4"
5835
+ "shape": "Sr7"
5836
5836
  },
5837
5837
  "nextToken": {}
5838
5838
  }
@@ -6041,7 +6041,7 @@
6041
6041
  "securityProfileIdentifiers": {
6042
6042
  "type": "list",
6043
6043
  "member": {
6044
- "shape": "Srn"
6044
+ "shape": "Srq"
6045
6045
  }
6046
6046
  },
6047
6047
  "nextToken": {}
@@ -6088,10 +6088,10 @@
6088
6088
  "type": "structure",
6089
6089
  "members": {
6090
6090
  "securityProfileIdentifier": {
6091
- "shape": "Srn"
6091
+ "shape": "Srq"
6092
6092
  },
6093
6093
  "target": {
6094
- "shape": "Srs"
6094
+ "shape": "Srv"
6095
6095
  }
6096
6096
  }
6097
6097
  }
@@ -6244,7 +6244,7 @@
6244
6244
  "securityProfileTargets": {
6245
6245
  "type": "list",
6246
6246
  "member": {
6247
- "shape": "Srs"
6247
+ "shape": "Srv"
6248
6248
  }
6249
6249
  },
6250
6250
  "nextToken": {}
@@ -6359,7 +6359,7 @@
6359
6359
  "type": "structure",
6360
6360
  "members": {
6361
6361
  "principals": {
6362
- "shape": "Squ"
6362
+ "shape": "Sqx"
6363
6363
  },
6364
6364
  "nextToken": {}
6365
6365
  }
@@ -6578,7 +6578,7 @@
6578
6578
  "type": "structure",
6579
6579
  "members": {
6580
6580
  "things": {
6581
- "shape": "Sr4"
6581
+ "shape": "Sr7"
6582
6582
  },
6583
6583
  "nextToken": {}
6584
6584
  }
@@ -6619,7 +6619,7 @@
6619
6619
  "type": "structure",
6620
6620
  "members": {
6621
6621
  "things": {
6622
- "shape": "Sr4"
6622
+ "shape": "Sr7"
6623
6623
  },
6624
6624
  "nextToken": {}
6625
6625
  }
@@ -6771,7 +6771,7 @@
6771
6771
  "type": "structure",
6772
6772
  "members": {
6773
6773
  "logTarget": {
6774
- "shape": "Stg"
6774
+ "shape": "Stj"
6775
6775
  },
6776
6776
  "logLevel": {}
6777
6777
  }
@@ -6853,7 +6853,7 @@
6853
6853
  "shape": "S8s"
6854
6854
  },
6855
6855
  "violationEventAdditionalInfo": {
6856
- "shape": "Snj"
6856
+ "shape": "Snm"
6857
6857
  },
6858
6858
  "violationEventType": {},
6859
6859
  "verificationState": {},
@@ -7124,7 +7124,7 @@
7124
7124
  "thingId": {},
7125
7125
  "thingTypeName": {},
7126
7126
  "thingGroupNames": {
7127
- "shape": "Suc"
7127
+ "shape": "Suf"
7128
7128
  },
7129
7129
  "attributes": {
7130
7130
  "shape": "S3i"
@@ -7158,7 +7158,7 @@
7158
7158
  "shape": "S3i"
7159
7159
  },
7160
7160
  "parentGroupNames": {
7161
- "shape": "Suc"
7161
+ "shape": "Suf"
7162
7162
  }
7163
7163
  }
7164
7164
  }
@@ -7246,7 +7246,7 @@
7246
7246
  ],
7247
7247
  "members": {
7248
7248
  "logTarget": {
7249
- "shape": "Stg"
7249
+ "shape": "Stj"
7250
7250
  },
7251
7251
  "logLevel": {}
7252
7252
  }
@@ -7455,7 +7455,7 @@
7455
7455
  "authInfos": {
7456
7456
  "type": "list",
7457
7457
  "member": {
7458
- "shape": "Sv5"
7458
+ "shape": "Sv8"
7459
7459
  }
7460
7460
  },
7461
7461
  "clientId": {
@@ -7463,10 +7463,10 @@
7463
7463
  "locationName": "clientId"
7464
7464
  },
7465
7465
  "policyNamesToAdd": {
7466
- "shape": "Sv9"
7466
+ "shape": "Svc"
7467
7467
  },
7468
7468
  "policyNamesToSkip": {
7469
- "shape": "Sv9"
7469
+ "shape": "Svc"
7470
7470
  }
7471
7471
  }
7472
7472
  },
@@ -7479,13 +7479,13 @@
7479
7479
  "type": "structure",
7480
7480
  "members": {
7481
7481
  "authInfo": {
7482
- "shape": "Sv5"
7482
+ "shape": "Sv8"
7483
7483
  },
7484
7484
  "allowed": {
7485
7485
  "type": "structure",
7486
7486
  "members": {
7487
7487
  "policies": {
7488
- "shape": "Snq"
7488
+ "shape": "Snt"
7489
7489
  }
7490
7490
  }
7491
7491
  },
@@ -7496,7 +7496,7 @@
7496
7496
  "type": "structure",
7497
7497
  "members": {
7498
7498
  "policies": {
7499
- "shape": "Snq"
7499
+ "shape": "Snt"
7500
7500
  }
7501
7501
  }
7502
7502
  },
@@ -7504,7 +7504,7 @@
7504
7504
  "type": "structure",
7505
7505
  "members": {
7506
7506
  "policies": {
7507
- "shape": "Snq"
7507
+ "shape": "Snt"
7508
7508
  }
7509
7509
  }
7510
7510
  }
@@ -8018,7 +8018,7 @@
8018
8018
  "shape": "Sls"
8019
8019
  },
8020
8020
  "thingGroupIndexingConfiguration": {
8021
- "shape": "Sm1"
8021
+ "shape": "Sm4"
8022
8022
  }
8023
8023
  }
8024
8024
  },
@@ -8376,10 +8376,10 @@
8376
8376
  "members": {
8377
8377
  "thingName": {},
8378
8378
  "thingGroupsToAdd": {
8379
- "shape": "Sxk"
8379
+ "shape": "Sxn"
8380
8380
  },
8381
8381
  "thingGroupsToRemove": {
8382
- "shape": "Sxk"
8382
+ "shape": "Sxn"
8383
8383
  },
8384
8384
  "overrideDynamicGroups": {
8385
8385
  "type": "boolean"
@@ -9833,6 +9833,15 @@
9833
9833
  },
9834
9834
  "customFields": {
9835
9835
  "shape": "Slx"
9836
+ },
9837
+ "filter": {
9838
+ "type": "structure",
9839
+ "members": {
9840
+ "namedShadowNames": {
9841
+ "type": "list",
9842
+ "member": {}
9843
+ }
9844
+ }
9836
9845
  }
9837
9846
  }
9838
9847
  },
@@ -9846,7 +9855,7 @@
9846
9855
  }
9847
9856
  }
9848
9857
  },
9849
- "Sm1": {
9858
+ "Sm4": {
9850
9859
  "type": "structure",
9851
9860
  "required": [
9852
9861
  "thingGroupIndexingMode"
@@ -9861,13 +9870,13 @@
9861
9870
  }
9862
9871
  }
9863
9872
  },
9864
- "Snj": {
9873
+ "Snm": {
9865
9874
  "type": "structure",
9866
9875
  "members": {
9867
9876
  "confidenceLevel": {}
9868
9877
  }
9869
9878
  },
9870
- "Snq": {
9879
+ "Snt": {
9871
9880
  "type": "list",
9872
9881
  "member": {
9873
9882
  "type": "structure",
@@ -9877,7 +9886,7 @@
9877
9886
  }
9878
9887
  }
9879
9888
  },
9880
- "Sos": {
9889
+ "Sov": {
9881
9890
  "type": "list",
9882
9891
  "member": {
9883
9892
  "type": "structure",
@@ -9892,7 +9901,7 @@
9892
9901
  }
9893
9902
  }
9894
9903
  },
9895
- "Sps": {
9904
+ "Spv": {
9896
9905
  "type": "structure",
9897
9906
  "members": {
9898
9907
  "status": {},
@@ -9913,15 +9922,15 @@
9913
9922
  }
9914
9923
  }
9915
9924
  },
9916
- "Squ": {
9925
+ "Sqx": {
9917
9926
  "type": "list",
9918
9927
  "member": {}
9919
9928
  },
9920
- "Sr4": {
9929
+ "Sr7": {
9921
9930
  "type": "list",
9922
9931
  "member": {}
9923
9932
  },
9924
- "Srn": {
9933
+ "Srq": {
9925
9934
  "type": "structure",
9926
9935
  "required": [
9927
9936
  "name",
@@ -9932,7 +9941,7 @@
9932
9941
  "arn": {}
9933
9942
  }
9934
9943
  },
9935
- "Srs": {
9944
+ "Srv": {
9936
9945
  "type": "structure",
9937
9946
  "required": [
9938
9947
  "arn"
@@ -9941,7 +9950,7 @@
9941
9950
  "arn": {}
9942
9951
  }
9943
9952
  },
9944
- "Stg": {
9953
+ "Stj": {
9945
9954
  "type": "structure",
9946
9955
  "required": [
9947
9956
  "targetType"
@@ -9951,11 +9960,11 @@
9951
9960
  "targetName": {}
9952
9961
  }
9953
9962
  },
9954
- "Suc": {
9963
+ "Suf": {
9955
9964
  "type": "list",
9956
9965
  "member": {}
9957
9966
  },
9958
- "Sv5": {
9967
+ "Sv8": {
9959
9968
  "type": "structure",
9960
9969
  "required": [
9961
9970
  "resources"
@@ -9968,11 +9977,11 @@
9968
9977
  }
9969
9978
  }
9970
9979
  },
9971
- "Sv9": {
9980
+ "Svc": {
9972
9981
  "type": "list",
9973
9982
  "member": {}
9974
9983
  },
9975
- "Sxk": {
9984
+ "Sxn": {
9976
9985
  "type": "list",
9977
9986
  "member": {}
9978
9987
  }
@@ -451,7 +451,7 @@ declare namespace ACMPCA {
451
451
  */
452
452
  IdempotencyToken?: IdempotencyToken;
453
453
  /**
454
- * Specifies a cryptographic key management compliance standard used for handling CA keys. Default: FIPS_140_2_LEVEL_3_OR_HIGHER Note: FIPS_140_2_LEVEL_3_OR_HIGHER is not supported in Region ap-northeast-3. When creating a CA in the ap-northeast-3, you must provide FIPS_140_2_LEVEL_2_OR_HIGHER as the argument for KeyStorageSecurityStandard. Failure to do this results in an InvalidArgsException with the message, "A certificate authority cannot be created in this region with the specified security standard."
454
+ * Specifies a cryptographic key management compliance standard used for handling CA keys. Default: FIPS_140_2_LEVEL_3_OR_HIGHER Note: FIPS_140_2_LEVEL_3_OR_HIGHER is not supported in the following Regions: ap-northeast-3 ap-southeast-3 When creating a CA in these Regions, you must provide FIPS_140_2_LEVEL_2_OR_HIGHER as the argument for KeyStorageSecurityStandard. Failure to do this results in an InvalidArgsException with the message, "A certificate authority cannot be created in this region with the specified security standard."
455
455
  */
456
456
  KeyStorageSecurityStandard?: KeyStorageSecurityStandard;
457
457
  /**
@@ -651,7 +651,7 @@ declare namespace ACMPCA {
651
651
  */
652
652
  SubjectAlternativeNames?: GeneralNameList;
653
653
  /**
654
- * Contains a sequence of one or more X.509 extensions, each of which consists of an object identifier (OID), a base64-encoded value, and the critical flag. For more information, see the Global OID reference database. The OID value of a CustomExtension must not match the OID of a predefined extension.
654
+ * Contains a sequence of one or more X.509 extensions, each of which consists of an object identifier (OID), a base64-encoded value, and the critical flag. For more information, see the Global OID reference database.
655
655
  */
656
656
  CustomExtensions?: CustomExtensionList;
657
657
  }
@@ -52,11 +52,11 @@ declare class Iot extends Service {
52
52
  */
53
53
  attachPolicy(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
54
54
  /**
55
- * Attaches the specified policy to the specified principal (certificate or other credential). Note: This action is deprecated. Please use AttachPolicy instead. Requires permission to access the AttachPrincipalPolicy action.
55
+ * Attaches the specified policy to the specified principal (certificate or other credential). Note: This action is deprecated and works as expected for backward compatibility, but we won't add enhancements. Use AttachPolicy instead. Requires permission to access the AttachPrincipalPolicy action.
56
56
  */
57
57
  attachPrincipalPolicy(params: Iot.Types.AttachPrincipalPolicyRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
58
58
  /**
59
- * Attaches the specified policy to the specified principal (certificate or other credential). Note: This action is deprecated. Please use AttachPolicy instead. Requires permission to access the AttachPrincipalPolicy action.
59
+ * Attaches the specified policy to the specified principal (certificate or other credential). Note: This action is deprecated and works as expected for backward compatibility, but we won't add enhancements. Use AttachPolicy instead. Requires permission to access the AttachPrincipalPolicy action.
60
60
  */
61
61
  attachPrincipalPolicy(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
62
62
  /**
@@ -6395,6 +6395,12 @@ declare namespace Iot {
6395
6395
  export type IndexNamesList = IndexName[];
6396
6396
  export type IndexSchema = string;
6397
6397
  export type IndexStatus = "ACTIVE"|"BUILDING"|"REBUILDING"|string;
6398
+ export interface IndexingFilter {
6399
+ /**
6400
+ * The shadow names that you select to index. The default maximum number of shadow names for indexing is 10. To increase the limit, see Amazon Web Services IoT Device Management Quotas in the Amazon Web Services General Reference.
6401
+ */
6402
+ namedShadowNames?: NamedShadowNamesFilter;
6403
+ }
6398
6404
  export type InlineDocument = string;
6399
6405
  export type InputName = string;
6400
6406
  export interface IotAnalyticsAction {
@@ -8574,6 +8580,7 @@ declare namespace Iot {
8574
8580
  export type MqttPassword = Buffer|Uint8Array|Blob|string;
8575
8581
  export type MqttUsername = string;
8576
8582
  export type NamedShadowIndexingMode = "OFF"|"ON"|string;
8583
+ export type NamedShadowNamesFilter = ShadowName[];
8577
8584
  export type NamespaceId = string;
8578
8585
  export type NextToken = string;
8579
8586
  export type NonCompliantChecksCount = number;
@@ -9539,6 +9546,7 @@ declare namespace Iot {
9539
9546
  */
9540
9547
  disableAllLogs?: DisableAllLogs;
9541
9548
  }
9549
+ export type ShadowName = string;
9542
9550
  export interface SigV4Authorization {
9543
9551
  /**
9544
9552
  * The signing region.
@@ -10219,6 +10227,10 @@ declare namespace Iot {
10219
10227
  * Contains custom field names and their data type.
10220
10228
  */
10221
10229
  customFields?: Fields;
10230
+ /**
10231
+ * Provides additional filters for specific data sources. Named shadow is the only data source that currently supports and requires a filter. To add named shadows to your fleet indexing configuration, set namedShadowIndexingMode to be ON and specify your shadow names in filter.
10232
+ */
10233
+ filter?: IndexingFilter;
10222
10234
  }
10223
10235
  export type ThingIndexingMode = "OFF"|"REGISTRY"|"REGISTRY_AND_SHADOW"|string;
10224
10236
  export type ThingName = string;
@@ -83,7 +83,7 @@ return /******/ (function(modules) { // webpackBootstrap
83
83
  /**
84
84
  * @constant
85
85
  */
86
- VERSION: '2.1178.0',
86
+ VERSION: '2.1179.0',
87
87
 
88
88
  /**
89
89
  * @api private