cdk-docker-image-deployment 0.0.118 → 0.0.119
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +3 -3
- package/lib/destination.js +1 -1
- package/lib/docker-image-deployment.js +1 -1
- package/lib/source.js +1 -1
- package/node_modules/aws-sdk/CHANGELOG.md +6 -1
- package/node_modules/aws-sdk/README.md +1 -1
- package/node_modules/aws-sdk/apis/elasticmapreduce-2009-03-31.min.json +54 -19
- package/node_modules/aws-sdk/apis/secretsmanager-2017-10-17.min.json +18 -9
- package/node_modules/aws-sdk/apis/wisdom-2020-10-19.min.json +48 -48
- package/node_modules/aws-sdk/clients/apigateway.d.ts +3 -3
- package/node_modules/aws-sdk/clients/emr.d.ts +67 -23
- package/node_modules/aws-sdk/clients/secretsmanager.d.ts +13 -9
- package/node_modules/aws-sdk/clients/wisdom.d.ts +4 -3
- package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +1 -1
- package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +4 -4
- package/node_modules/aws-sdk/dist/aws-sdk.js +75 -31
- package/node_modules/aws-sdk/dist/aws-sdk.min.js +54 -54
- package/node_modules/aws-sdk/lib/core.js +1 -1
- package/node_modules/aws-sdk/package.json +1 -1
- package/package.json +4 -4
|
@@ -20,11 +20,11 @@ declare class SecretsManager extends Service {
|
|
|
20
20
|
*/
|
|
21
21
|
cancelRotateSecret(callback?: (err: AWSError, data: SecretsManager.Types.CancelRotateSecretResponse) => void): Request<SecretsManager.Types.CancelRotateSecretResponse, AWSError>;
|
|
22
22
|
/**
|
|
23
|
-
* Creates a new secret. A secret can be a password, a set of credentials such as a user name and password, an OAuth token, or other secret information that you store in an encrypted form in Secrets Manager. The secret also includes the connection information to access a database or other service, which Secrets Manager doesn't encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information needed to manage the secret. For
|
|
23
|
+
* Creates a new secret. A secret can be a password, a set of credentials such as a user name and password, an OAuth token, or other secret information that you store in an encrypted form in Secrets Manager. The secret also includes the connection information to access a database or other service, which Secrets Manager doesn't encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information needed to manage the secret. For information about creating a secret in the console, see Create a secret. To create a secret, you can provide the secret value to be encrypted in either the SecretString parameter or the SecretBinary parameter, but not both. If you include SecretString or SecretBinary then Secrets Manager creates an initial secret version and automatically attaches the staging label AWSCURRENT to it. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the JSON you store in the SecretString matches the JSON structure of a database secret. If you don't specify an KMS encryption key, Secrets Manager uses the Amazon Web Services managed key aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant delay in returning the result. If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed KMS key. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:CreateSecret. If you include tags in the secret, you also need secretsmanager:TagResource. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. To encrypt the secret with a KMS key other than aws/secretsmanager, you need kms:GenerateDataKey and kms:Decrypt permission to the key.
|
|
24
24
|
*/
|
|
25
25
|
createSecret(params: SecretsManager.Types.CreateSecretRequest, callback?: (err: AWSError, data: SecretsManager.Types.CreateSecretResponse) => void): Request<SecretsManager.Types.CreateSecretResponse, AWSError>;
|
|
26
26
|
/**
|
|
27
|
-
* Creates a new secret. A secret can be a password, a set of credentials such as a user name and password, an OAuth token, or other secret information that you store in an encrypted form in Secrets Manager. The secret also includes the connection information to access a database or other service, which Secrets Manager doesn't encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information needed to manage the secret. For
|
|
27
|
+
* Creates a new secret. A secret can be a password, a set of credentials such as a user name and password, an OAuth token, or other secret information that you store in an encrypted form in Secrets Manager. The secret also includes the connection information to access a database or other service, which Secrets Manager doesn't encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information needed to manage the secret. For information about creating a secret in the console, see Create a secret. To create a secret, you can provide the secret value to be encrypted in either the SecretString parameter or the SecretBinary parameter, but not both. If you include SecretString or SecretBinary then Secrets Manager creates an initial secret version and automatically attaches the staging label AWSCURRENT to it. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the JSON you store in the SecretString matches the JSON structure of a database secret. If you don't specify an KMS encryption key, Secrets Manager uses the Amazon Web Services managed key aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant delay in returning the result. If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed KMS key. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:CreateSecret. If you include tags in the secret, you also need secretsmanager:TagResource. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. To encrypt the secret with a KMS key other than aws/secretsmanager, you need kms:GenerateDataKey and kms:Decrypt permission to the key.
|
|
28
28
|
*/
|
|
29
29
|
createSecret(callback?: (err: AWSError, data: SecretsManager.Types.CreateSecretResponse) => void): Request<SecretsManager.Types.CreateSecretResponse, AWSError>;
|
|
30
30
|
/**
|
|
@@ -132,11 +132,11 @@ declare class SecretsManager extends Service {
|
|
|
132
132
|
*/
|
|
133
133
|
restoreSecret(callback?: (err: AWSError, data: SecretsManager.Types.RestoreSecretResponse) => void): Request<SecretsManager.Types.RestoreSecretResponse, AWSError>;
|
|
134
134
|
/**
|
|
135
|
-
* Configures and starts the asynchronous process of rotating the secret. For information about rotation, see Rotate secrets
|
|
135
|
+
* Configures and starts the asynchronous process of rotating the secret. For more information about rotation, see Rotate secrets. If you include the configuration parameters, the operation sets the values for the secret and then immediately starts a rotation. If you don't include the configuration parameters, the operation starts a rotation with the values already stored in the secret. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the secret value is in the JSON structure of a database secret. In particular, if you want to use the alternating users strategy, your secret must contain the ARN of a superuser secret. To configure rotation, you also need the ARN of an Amazon Web Services Lambda function and the schedule for the rotation. The Lambda rotation function creates a new version of the secret and creates or updates the credentials on the database or service to match. After testing the new credentials, the function marks the new secret version with the staging label AWSCURRENT. Then anyone who retrieves the secret gets the new version. For more information, see How rotation works. You can create the Lambda rotation function based on the rotation function templates that Secrets Manager provides. Choose a template that matches your Rotation strategy. When rotation is successful, the AWSPENDING staging label might be attached to the same version as the AWSCURRENT version, or it might not be attached to any version. If the AWSPENDING staging label is present but not attached to the same version as AWSCURRENT, then any later invocation of RotateSecret assumes that a previous rotation request is still in progress and returns an error. When rotation is unsuccessful, the AWSPENDING staging label might be attached to an empty secret version. For more information, see Troubleshoot rotation in the Secrets Manager User Guide. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:RotateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. You also need lambda:InvokeFunction permissions on the rotation function. For more information, see Permissions for rotation.
|
|
136
136
|
*/
|
|
137
137
|
rotateSecret(params: SecretsManager.Types.RotateSecretRequest, callback?: (err: AWSError, data: SecretsManager.Types.RotateSecretResponse) => void): Request<SecretsManager.Types.RotateSecretResponse, AWSError>;
|
|
138
138
|
/**
|
|
139
|
-
* Configures and starts the asynchronous process of rotating the secret. For information about rotation, see Rotate secrets
|
|
139
|
+
* Configures and starts the asynchronous process of rotating the secret. For more information about rotation, see Rotate secrets. If you include the configuration parameters, the operation sets the values for the secret and then immediately starts a rotation. If you don't include the configuration parameters, the operation starts a rotation with the values already stored in the secret. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the secret value is in the JSON structure of a database secret. In particular, if you want to use the alternating users strategy, your secret must contain the ARN of a superuser secret. To configure rotation, you also need the ARN of an Amazon Web Services Lambda function and the schedule for the rotation. The Lambda rotation function creates a new version of the secret and creates or updates the credentials on the database or service to match. After testing the new credentials, the function marks the new secret version with the staging label AWSCURRENT. Then anyone who retrieves the secret gets the new version. For more information, see How rotation works. You can create the Lambda rotation function based on the rotation function templates that Secrets Manager provides. Choose a template that matches your Rotation strategy. When rotation is successful, the AWSPENDING staging label might be attached to the same version as the AWSCURRENT version, or it might not be attached to any version. If the AWSPENDING staging label is present but not attached to the same version as AWSCURRENT, then any later invocation of RotateSecret assumes that a previous rotation request is still in progress and returns an error. When rotation is unsuccessful, the AWSPENDING staging label might be attached to an empty secret version. For more information, see Troubleshoot rotation in the Secrets Manager User Guide. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:RotateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. You also need lambda:InvokeFunction permissions on the rotation function. For more information, see Permissions for rotation.
|
|
140
140
|
*/
|
|
141
141
|
rotateSecret(callback?: (err: AWSError, data: SecretsManager.Types.RotateSecretResponse) => void): Request<SecretsManager.Types.RotateSecretResponse, AWSError>;
|
|
142
142
|
/**
|
|
@@ -164,11 +164,11 @@ declare class SecretsManager extends Service {
|
|
|
164
164
|
*/
|
|
165
165
|
untagResource(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
|
166
166
|
/**
|
|
167
|
-
* Modifies the details of a secret, including metadata and the secret value. To change the secret value, you can also use PutSecretValue. To change the rotation configuration of a secret, use RotateSecret instead.
|
|
167
|
+
* Modifies the details of a secret, including metadata and the secret value. To change the secret value, you can also use PutSecretValue. To change the rotation configuration of a secret, use RotateSecret instead. We recommend you avoid calling UpdateSecret at a sustained rate of more than once every 10 minutes. When you call UpdateSecret to update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you update the secret value more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. If you include SecretString or SecretBinary to create a new secret version, Secrets Manager automatically moves the staging label AWSCURRENT to the new version. Then it attaches the label AWSPREVIOUS to the version that AWSCURRENT was removed from. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, the operation results in an error. You can't modify an existing version, you can only create a new version. To remove a version, remove all staging labels from it. See UpdateSecretVersionStage. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:UpdateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. If you use a customer managed key, you must also have kms:GenerateDataKey and kms:Decrypt permissions on the key. For more information, see Secret encryption and decryption.
|
|
168
168
|
*/
|
|
169
169
|
updateSecret(params: SecretsManager.Types.UpdateSecretRequest, callback?: (err: AWSError, data: SecretsManager.Types.UpdateSecretResponse) => void): Request<SecretsManager.Types.UpdateSecretResponse, AWSError>;
|
|
170
170
|
/**
|
|
171
|
-
* Modifies the details of a secret, including metadata and the secret value. To change the secret value, you can also use PutSecretValue. To change the rotation configuration of a secret, use RotateSecret instead.
|
|
171
|
+
* Modifies the details of a secret, including metadata and the secret value. To change the secret value, you can also use PutSecretValue. To change the rotation configuration of a secret, use RotateSecret instead. We recommend you avoid calling UpdateSecret at a sustained rate of more than once every 10 minutes. When you call UpdateSecret to update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you update the secret value more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. If you include SecretString or SecretBinary to create a new secret version, Secrets Manager automatically moves the staging label AWSCURRENT to the new version. Then it attaches the label AWSPREVIOUS to the version that AWSCURRENT was removed from. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, the operation results in an error. You can't modify an existing version, you can only create a new version. To remove a version, remove all staging labels from it. See UpdateSecretVersionStage. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:UpdateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. If you use a customer managed key, you must also have kms:GenerateDataKey and kms:Decrypt permissions on the key. For more information, see Secret encryption and decryption.
|
|
172
172
|
*/
|
|
173
173
|
updateSecret(callback?: (err: AWSError, data: SecretsManager.Types.UpdateSecretResponse) => void): Request<SecretsManager.Types.UpdateSecretResponse, AWSError>;
|
|
174
174
|
/**
|
|
@@ -367,6 +367,7 @@ declare namespace SecretsManager {
|
|
|
367
367
|
* The date the secret is scheduled for deletion. If it is not scheduled for deletion, this field is omitted. When you delete a secret, Secrets Manager requires a recovery window of at least 7 days before deleting the secret. Some time after the deleted date, Secrets Manager deletes the secret, including all of its versions. If a secret is scheduled for deletion, then its details, including the encrypted secret value, is not accessible. To cancel a scheduled deletion and restore access to the secret, use RestoreSecret.
|
|
368
368
|
*/
|
|
369
369
|
DeletedDate?: DeletedDateType;
|
|
370
|
+
NextRotationDate?: NextRotationDateType;
|
|
370
371
|
/**
|
|
371
372
|
* The list of tags attached to the secret. To add tags to a secret, use TagResource. To remove tags, use UntagResource.
|
|
372
373
|
*/
|
|
@@ -410,7 +411,7 @@ declare namespace SecretsManager {
|
|
|
410
411
|
*/
|
|
411
412
|
Values?: FilterValuesStringList;
|
|
412
413
|
}
|
|
413
|
-
export type FilterNameStringType = "description"|"name"|"tag-key"|"tag-value"|"primary-region"|"all"|string;
|
|
414
|
+
export type FilterNameStringType = "description"|"name"|"tag-key"|"tag-value"|"primary-region"|"owning-service"|"all"|string;
|
|
414
415
|
export type FilterValueStringType = string;
|
|
415
416
|
export type FilterValuesStringList = FilterValueStringType[];
|
|
416
417
|
export type FiltersListType = Filter[];
|
|
@@ -561,6 +562,7 @@ declare namespace SecretsManager {
|
|
|
561
562
|
Name?: SecretNameType;
|
|
562
563
|
}
|
|
563
564
|
export interface ListSecretsRequest {
|
|
565
|
+
IncludePlannedDeletion?: BooleanType;
|
|
564
566
|
/**
|
|
565
567
|
* The number of results to include in the response. If there are more results available, in the response, Secrets Manager includes NextToken. To get the next results, call ListSecrets again with the value from NextToken.
|
|
566
568
|
*/
|
|
@@ -590,6 +592,7 @@ declare namespace SecretsManager {
|
|
|
590
592
|
}
|
|
591
593
|
export type MaxResultsType = number;
|
|
592
594
|
export type NameType = string;
|
|
595
|
+
export type NextRotationDateType = Date;
|
|
593
596
|
export type NextTokenType = string;
|
|
594
597
|
export type NonEmptyResourcePolicyType = string;
|
|
595
598
|
export type OwningServiceType = string;
|
|
@@ -766,7 +769,7 @@ declare namespace SecretsManager {
|
|
|
766
769
|
*/
|
|
767
770
|
ClientRequestToken?: ClientRequestTokenType;
|
|
768
771
|
/**
|
|
769
|
-
*
|
|
772
|
+
* The ARN of the Lambda rotation function that can rotate the secret.
|
|
770
773
|
*/
|
|
771
774
|
RotationLambdaARN?: RotationLambdaARNType;
|
|
772
775
|
/**
|
|
@@ -774,7 +777,7 @@ declare namespace SecretsManager {
|
|
|
774
777
|
*/
|
|
775
778
|
RotationRules?: RotationRulesType;
|
|
776
779
|
/**
|
|
777
|
-
* Specifies whether to rotate the secret immediately or wait until the next scheduled rotation window. The rotation schedule is defined in RotateSecretRequest$RotationRules.
|
|
780
|
+
* Specifies whether to rotate the secret immediately or wait until the next scheduled rotation window. The rotation schedule is defined in RotateSecretRequest$RotationRules. If you don't immediately rotate the secret, Secrets Manager tests the rotation configuration by running the testSecret step of the Lambda rotation function. The test creates an AWSPENDING version of the secret and then removes it. If you don't specify this value, then by default, Secrets Manager rotates the secret immediately.
|
|
778
781
|
*/
|
|
779
782
|
RotateImmediately?: BooleanType;
|
|
780
783
|
}
|
|
@@ -857,6 +860,7 @@ declare namespace SecretsManager {
|
|
|
857
860
|
* The date and time the deletion of the secret occurred. Not present on active secrets. The secret can be recovered until the number of days in the recovery window has passed, as specified in the RecoveryWindowInDays parameter of the DeleteSecret operation.
|
|
858
861
|
*/
|
|
859
862
|
DeletedDate?: DeletedDateType;
|
|
863
|
+
NextRotationDate?: NextRotationDateType;
|
|
860
864
|
/**
|
|
861
865
|
* The list of user-defined tags associated with the secret. To add tags to a secret, use TagResource . To remove tags, use UntagResource .
|
|
862
866
|
*/
|
|
@@ -638,7 +638,7 @@ declare namespace Wisdom {
|
|
|
638
638
|
/**
|
|
639
639
|
* A pointer to the uploaded asset. This value is returned by StartContentUpload.
|
|
640
640
|
*/
|
|
641
|
-
uploadId:
|
|
641
|
+
uploadId: UploadId;
|
|
642
642
|
}
|
|
643
643
|
export interface CreateContentResponse {
|
|
644
644
|
/**
|
|
@@ -1424,7 +1424,7 @@ declare namespace Wisdom {
|
|
|
1424
1424
|
/**
|
|
1425
1425
|
* The identifier of the upload.
|
|
1426
1426
|
*/
|
|
1427
|
-
uploadId:
|
|
1427
|
+
uploadId: UploadId;
|
|
1428
1428
|
/**
|
|
1429
1429
|
* The URL of the upload.
|
|
1430
1430
|
*/
|
|
@@ -1496,7 +1496,7 @@ declare namespace Wisdom {
|
|
|
1496
1496
|
/**
|
|
1497
1497
|
* A pointer to the uploaded asset. This value is returned by StartContentUpload.
|
|
1498
1498
|
*/
|
|
1499
|
-
uploadId?:
|
|
1499
|
+
uploadId?: UploadId;
|
|
1500
1500
|
}
|
|
1501
1501
|
export interface UpdateContentResponse {
|
|
1502
1502
|
/**
|
|
@@ -1520,6 +1520,7 @@ declare namespace Wisdom {
|
|
|
1520
1520
|
*/
|
|
1521
1521
|
knowledgeBase?: KnowledgeBaseData;
|
|
1522
1522
|
}
|
|
1523
|
+
export type UploadId = string;
|
|
1523
1524
|
export type Uri = string;
|
|
1524
1525
|
export type Url = string;
|
|
1525
1526
|
export type Uuid = string;
|