cdk-docker-image-deployment 0.0.150 → 0.0.152

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (51) hide show
  1. package/.jsii +3 -3
  2. package/lib/destination.js +1 -1
  3. package/lib/docker-image-deployment.js +1 -1
  4. package/lib/source.js +1 -1
  5. package/node_modules/aws-sdk/CHANGELOG.md +36 -1
  6. package/node_modules/aws-sdk/README.md +1 -1
  7. package/node_modules/aws-sdk/apis/appsync-2017-07-25.min.json +104 -86
  8. package/node_modules/aws-sdk/apis/cloudformation-2010-05-15.min.json +3 -0
  9. package/node_modules/aws-sdk/apis/cloudtrail-2013-11-01.min.json +204 -55
  10. package/node_modules/aws-sdk/apis/cloudtrail-data-2021-08-11.examples.json +5 -0
  11. package/node_modules/aws-sdk/apis/cloudtrail-data-2021-08-11.min.json +94 -0
  12. package/node_modules/aws-sdk/apis/cloudtrail-data-2021-08-11.paginators.json +4 -0
  13. package/node_modules/aws-sdk/apis/codeartifact-2018-09-22.min.json +73 -21
  14. package/node_modules/aws-sdk/apis/devops-guru-2020-12-01.min.json +41 -33
  15. package/node_modules/aws-sdk/apis/ec2-2016-11-15.min.json +1477 -1297
  16. package/node_modules/aws-sdk/apis/forecast-2018-06-26.min.json +68 -65
  17. package/node_modules/aws-sdk/apis/groundstation-2019-05-23.min.json +312 -41
  18. package/node_modules/aws-sdk/apis/iot-2015-05-28.min.json +4 -1
  19. package/node_modules/aws-sdk/apis/mediatailor-2018-04-23.min.json +175 -75
  20. package/node_modules/aws-sdk/apis/metadata.json +4 -0
  21. package/node_modules/aws-sdk/apis/opensearch-2021-01-01.min.json +192 -176
  22. package/node_modules/aws-sdk/apis/sagemaker-2017-07-24.min.json +630 -585
  23. package/node_modules/aws-sdk/apis/securityhub-2018-10-26.min.json +173 -157
  24. package/node_modules/aws-sdk/clients/all.d.ts +1 -0
  25. package/node_modules/aws-sdk/clients/all.js +2 -1
  26. package/node_modules/aws-sdk/clients/appsync.d.ts +20 -2
  27. package/node_modules/aws-sdk/clients/cloudformation.d.ts +1 -0
  28. package/node_modules/aws-sdk/clients/cloudtrail.d.ts +234 -40
  29. package/node_modules/aws-sdk/clients/cloudtraildata.d.ts +111 -0
  30. package/node_modules/aws-sdk/clients/cloudtraildata.js +18 -0
  31. package/node_modules/aws-sdk/clients/codeartifact.d.ts +43 -6
  32. package/node_modules/aws-sdk/clients/devopsguru.d.ts +7 -0
  33. package/node_modules/aws-sdk/clients/ec2.d.ts +212 -15
  34. package/node_modules/aws-sdk/clients/forecastservice.d.ts +52 -39
  35. package/node_modules/aws-sdk/clients/groundstation.d.ts +284 -0
  36. package/node_modules/aws-sdk/clients/iam.d.ts +18 -18
  37. package/node_modules/aws-sdk/clients/iot.d.ts +4 -0
  38. package/node_modules/aws-sdk/clients/mediatailor.d.ts +119 -0
  39. package/node_modules/aws-sdk/clients/opensearch.d.ts +31 -0
  40. package/node_modules/aws-sdk/clients/polly.d.ts +1 -1
  41. package/node_modules/aws-sdk/clients/sagemaker.d.ts +57 -1
  42. package/node_modules/aws-sdk/clients/securityhub.d.ts +26 -3
  43. package/node_modules/aws-sdk/clients/sns.d.ts +3 -3
  44. package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +2 -2
  45. package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +54 -17
  46. package/node_modules/aws-sdk/dist/aws-sdk.js +1763 -1421
  47. package/node_modules/aws-sdk/dist/aws-sdk.min.js +94 -94
  48. package/node_modules/aws-sdk/lib/config_service_placeholders.d.ts +2 -0
  49. package/node_modules/aws-sdk/lib/core.js +1 -1
  50. package/node_modules/aws-sdk/package.json +1 -1
  51. package/package.json +5 -6
@@ -100,6 +100,14 @@ declare class GroundStation extends Service {
100
100
  * Describes an existing ephemeris.
101
101
  */
102
102
  describeEphemeris(callback?: (err: AWSError, data: GroundStation.Types.DescribeEphemerisResponse) => void): Request<GroundStation.Types.DescribeEphemerisResponse, AWSError>;
103
+ /**
104
+ * Gets the latest configuration information for a registered agent.
105
+ */
106
+ getAgentConfiguration(params: GroundStation.Types.GetAgentConfigurationRequest, callback?: (err: AWSError, data: GroundStation.Types.GetAgentConfigurationResponse) => void): Request<GroundStation.Types.GetAgentConfigurationResponse, AWSError>;
107
+ /**
108
+ * Gets the latest configuration information for a registered agent.
109
+ */
110
+ getAgentConfiguration(callback?: (err: AWSError, data: GroundStation.Types.GetAgentConfigurationResponse) => void): Request<GroundStation.Types.GetAgentConfigurationResponse, AWSError>;
103
111
  /**
104
112
  * Returns Config information. Only one Config response can be returned.
105
113
  */
@@ -204,6 +212,14 @@ declare class GroundStation extends Service {
204
212
  * Returns a list of tags for a specified resource.
205
213
  */
206
214
  listTagsForResource(callback?: (err: AWSError, data: GroundStation.Types.ListTagsForResourceResponse) => void): Request<GroundStation.Types.ListTagsForResourceResponse, AWSError>;
215
+ /**
216
+ * Registers a new agent with AWS Groundstation.
217
+ */
218
+ registerAgent(params: GroundStation.Types.RegisterAgentRequest, callback?: (err: AWSError, data: GroundStation.Types.RegisterAgentResponse) => void): Request<GroundStation.Types.RegisterAgentResponse, AWSError>;
219
+ /**
220
+ * Registers a new agent with AWS Groundstation.
221
+ */
222
+ registerAgent(callback?: (err: AWSError, data: GroundStation.Types.RegisterAgentResponse) => void): Request<GroundStation.Types.RegisterAgentResponse, AWSError>;
207
223
  /**
208
224
  * Reserves a contact using specified parameters.
209
225
  */
@@ -228,6 +244,14 @@ declare class GroundStation extends Service {
228
244
  * Deassigns a resource tag.
229
245
  */
230
246
  untagResource(callback?: (err: AWSError, data: GroundStation.Types.UntagResourceResponse) => void): Request<GroundStation.Types.UntagResourceResponse, AWSError>;
247
+ /**
248
+ * Update the status of the agent.
249
+ */
250
+ updateAgentStatus(params: GroundStation.Types.UpdateAgentStatusRequest, callback?: (err: AWSError, data: GroundStation.Types.UpdateAgentStatusResponse) => void): Request<GroundStation.Types.UpdateAgentStatusResponse, AWSError>;
251
+ /**
252
+ * Update the status of the agent.
253
+ */
254
+ updateAgentStatus(callback?: (err: AWSError, data: GroundStation.Types.UpdateAgentStatusResponse) => void): Request<GroundStation.Types.UpdateAgentStatusResponse, AWSError>;
231
255
  /**
232
256
  * Updates the Config used when scheduling contacts. Updating a Config will not update the execution parameters for existing future contacts scheduled with this Config.
233
257
  */
@@ -263,6 +287,39 @@ declare class GroundStation extends Service {
263
287
  }
264
288
  declare namespace GroundStation {
265
289
  export type AWSRegion = string;
290
+ export interface AgentDetails {
291
+ /**
292
+ * Current agent version.
293
+ */
294
+ agentVersion: VersionString;
295
+ /**
296
+ * List of versions being used by agent components.
297
+ */
298
+ componentVersions: ComponentVersionList;
299
+ /**
300
+ * ID of EC2 instance agent is running on.
301
+ */
302
+ instanceId: InstanceId;
303
+ /**
304
+ * Type of EC2 instance agent is running on.
305
+ */
306
+ instanceType: InstanceType;
307
+ /**
308
+ * Number of Cpu cores reserved for agent.
309
+ */
310
+ reservedCpuCores: ReservedCpuCoresList;
311
+ }
312
+ export type AgentStatus = "SUCCESS"|"FAILED"|"ACTIVE"|"INACTIVE"|string;
313
+ export interface AggregateStatus {
314
+ /**
315
+ * Sparse map of failure signatures.
316
+ */
317
+ signatureMap?: SignatureMap;
318
+ /**
319
+ * Aggregate status.
320
+ */
321
+ status: AgentStatus;
322
+ }
266
323
  export type AngleUnits = "DEGREE_ANGLE"|"RADIAN"|string;
267
324
  export interface AntennaDemodDecodeDetails {
268
325
  /**
@@ -305,6 +362,29 @@ declare namespace GroundStation {
305
362
  transmitDisabled?: Boolean;
306
363
  }
307
364
  export type AnyArn = string;
365
+ export type AuditResults = "HEALTHY"|"UNHEALTHY"|string;
366
+ export interface AwsGroundStationAgentEndpoint {
367
+ /**
368
+ * The status of AgentEndpoint.
369
+ */
370
+ agentStatus?: AgentStatus;
371
+ /**
372
+ * The results of the audit.
373
+ */
374
+ auditResults?: AuditResults;
375
+ /**
376
+ * The egress address of AgentEndpoint.
377
+ */
378
+ egressAddress: ConnectionDetails;
379
+ /**
380
+ * The ingress address of AgentEndpoint.
381
+ */
382
+ ingressAddress: RangedConnectionDetails;
383
+ /**
384
+ * Name string associated with AgentEndpoint. Used as a human-readable identifier for AgentEndpoint.
385
+ */
386
+ name: SafeName;
387
+ }
308
388
  export type BandwidthUnits = "GHz"|"MHz"|"kHz"|string;
309
389
  export type Boolean = boolean;
310
390
  export type BucketArn = string;
@@ -314,6 +394,51 @@ declare namespace GroundStation {
314
394
  */
315
395
  contactId: Uuid;
316
396
  }
397
+ export type CapabilityArn = string;
398
+ export type CapabilityArnList = CapabilityArn[];
399
+ export interface ComponentStatusData {
400
+ /**
401
+ * Bytes received by the component.
402
+ */
403
+ bytesReceived?: Long;
404
+ /**
405
+ * Bytes sent by the component.
406
+ */
407
+ bytesSent?: Long;
408
+ /**
409
+ * Capability ARN of the component.
410
+ */
411
+ capabilityArn: CapabilityArn;
412
+ /**
413
+ * The Component type.
414
+ */
415
+ componentType: ComponentType;
416
+ /**
417
+ * Dataflow UUID associated with the component.
418
+ */
419
+ dataflowId: Uuid;
420
+ /**
421
+ * Packets dropped by component.
422
+ */
423
+ packetsDropped?: Long;
424
+ /**
425
+ * Component status.
426
+ */
427
+ status: AgentStatus;
428
+ }
429
+ export type ComponentStatusList = ComponentStatusData[];
430
+ export type ComponentType = "LAMINAR_FLOW"|"PRISM"|"DIGITIZER"|string;
431
+ export interface ComponentVersion {
432
+ /**
433
+ * Component type.
434
+ */
435
+ componentType: ComponentType;
436
+ /**
437
+ * List of versions.
438
+ */
439
+ versions: VersionStringList;
440
+ }
441
+ export type ComponentVersionList = ComponentVersion[];
317
442
  export type ConfigArn = string;
318
443
  export type ConfigCapabilityType = "antenna-downlink"|"antenna-downlink-demod-decode"|"antenna-uplink"|"dataflow-endpoint"|"tracking"|"uplink-echo"|"s3-recording"|string;
319
444
  export interface ConfigDetails {
@@ -390,6 +515,16 @@ declare namespace GroundStation {
390
515
  */
391
516
  uplinkEchoConfig?: UplinkEchoConfig;
392
517
  }
518
+ export interface ConnectionDetails {
519
+ /**
520
+ * Maximum transmission unit (MTU) size in bytes of a dataflow endpoint.
521
+ */
522
+ mtu?: Integer;
523
+ /**
524
+ * A socket address.
525
+ */
526
+ socketAddress: SocketAddress;
527
+ }
393
528
  export interface ContactData {
394
529
  /**
395
530
  * UUID of a contact.
@@ -539,6 +674,14 @@ declare namespace GroundStation {
539
674
  * Name of a mission profile.
540
675
  */
541
676
  name: SafeName;
677
+ /**
678
+ * KMS key to use for encrypting streams.
679
+ */
680
+ streamsKmsKey?: KmsKey;
681
+ /**
682
+ * Role to use for encrypting streams with KMS key.
683
+ */
684
+ streamsKmsRole?: RoleArn;
542
685
  /**
543
686
  * Tags assigned to a mission profile.
544
687
  */
@@ -779,6 +922,20 @@ declare namespace GroundStation {
779
922
  */
780
923
  dataflowDestinationRegion?: String;
781
924
  }
925
+ export interface DiscoveryData {
926
+ /**
927
+ * List of capabilities to associate with agent.
928
+ */
929
+ capabilityArns: CapabilityArnList;
930
+ /**
931
+ * List of private IP addresses to associate with agent.
932
+ */
933
+ privateIpAddresses: IpAddressList;
934
+ /**
935
+ * List of public IP addresses to associate with agent.
936
+ */
937
+ publicIpAddresses: IpAddressList;
938
+ }
782
939
  export type Double = number;
783
940
  export type DurationInSeconds = number;
784
941
  export interface Eirp {
@@ -803,6 +960,10 @@ declare namespace GroundStation {
803
960
  value: Double;
804
961
  }
805
962
  export interface EndpointDetails {
963
+ /**
964
+ * An agent endpoint.
965
+ */
966
+ awsGroundStationAgentEndpoint?: AwsGroundStationAgentEndpoint;
806
967
  /**
807
968
  * A dataflow endpoint.
808
969
  */
@@ -913,6 +1074,22 @@ declare namespace GroundStation {
913
1074
  value: Double;
914
1075
  }
915
1076
  export type FrequencyUnits = "GHz"|"MHz"|"kHz"|string;
1077
+ export interface GetAgentConfigurationRequest {
1078
+ /**
1079
+ * UUID of agent to get configuration information for.
1080
+ */
1081
+ agentId: Uuid;
1082
+ }
1083
+ export interface GetAgentConfigurationResponse {
1084
+ /**
1085
+ * UUID of agent.
1086
+ */
1087
+ agentId?: Uuid;
1088
+ /**
1089
+ * Tasking document for agent.
1090
+ */
1091
+ taskingDocument?: String;
1092
+ }
916
1093
  export interface GetConfigRequest {
917
1094
  /**
918
1095
  * UUID of a Config.
@@ -1052,6 +1229,14 @@ declare namespace GroundStation {
1052
1229
  * Region of a mission profile.
1053
1230
  */
1054
1231
  region?: AWSRegion;
1232
+ /**
1233
+ * KMS key to use for encrypting streams.
1234
+ */
1235
+ streamsKmsKey?: KmsKey;
1236
+ /**
1237
+ * Role to use for encrypting streams with KMS key.
1238
+ */
1239
+ streamsKmsRole?: RoleArn;
1055
1240
  /**
1056
1241
  * Tags assigned to a mission profile.
1057
1242
  */
@@ -1106,9 +1291,34 @@ declare namespace GroundStation {
1106
1291
  export type GroundStationIdList = GroundStationName[];
1107
1292
  export type GroundStationList = GroundStationData[];
1108
1293
  export type GroundStationName = string;
1294
+ export type InstanceId = string;
1295
+ export type InstanceType = string;
1109
1296
  export type Integer = number;
1297
+ export interface IntegerRange {
1298
+ /**
1299
+ * A maximum value.
1300
+ */
1301
+ maximum: Integer;
1302
+ /**
1303
+ * A minimum value.
1304
+ */
1305
+ minimum: Integer;
1306
+ }
1307
+ export type IpAddressList = IpV4Address[];
1308
+ export type IpV4Address = string;
1110
1309
  export type JsonString = string;
1310
+ export type KeyAliasArn = string;
1111
1311
  export type KeyArn = string;
1312
+ export interface KmsKey {
1313
+ /**
1314
+ * KMS Alias Arn.
1315
+ */
1316
+ kmsAliasArn?: KeyAliasArn;
1317
+ /**
1318
+ * KMS Key Arn.
1319
+ */
1320
+ kmsKeyArn?: KeyArn;
1321
+ }
1112
1322
  export interface ListConfigsRequest {
1113
1323
  /**
1114
1324
  * Maximum number of Configs returned.
@@ -1305,6 +1515,7 @@ declare namespace GroundStation {
1305
1515
  */
1306
1516
  tags?: TagsMap;
1307
1517
  }
1518
+ export type Long = number;
1308
1519
  export type MissionProfileArn = string;
1309
1520
  export interface MissionProfileIdResponse {
1310
1521
  /**
@@ -1346,6 +1557,43 @@ declare namespace GroundStation {
1346
1557
  export type PaginationToken = string;
1347
1558
  export type Polarization = "LEFT_HAND"|"NONE"|"RIGHT_HAND"|string;
1348
1559
  export type PositiveDurationInSeconds = number;
1560
+ export interface RangedConnectionDetails {
1561
+ /**
1562
+ * Maximum transmission unit (MTU) size in bytes of a dataflow endpoint.
1563
+ */
1564
+ mtu?: RangedConnectionDetailsMtuInteger;
1565
+ /**
1566
+ * A ranged socket address.
1567
+ */
1568
+ socketAddress: RangedSocketAddress;
1569
+ }
1570
+ export type RangedConnectionDetailsMtuInteger = number;
1571
+ export interface RangedSocketAddress {
1572
+ /**
1573
+ * IPv4 socket address.
1574
+ */
1575
+ name: IpV4Address;
1576
+ /**
1577
+ * Port range of a socket address.
1578
+ */
1579
+ portRange: IntegerRange;
1580
+ }
1581
+ export interface RegisterAgentRequest {
1582
+ /**
1583
+ * Detailed information about the agent being registered.
1584
+ */
1585
+ agentDetails: AgentDetails;
1586
+ /**
1587
+ * Data for associating and agent with the capabilities it is managing.
1588
+ */
1589
+ discoveryData: DiscoveryData;
1590
+ }
1591
+ export interface RegisterAgentResponse {
1592
+ /**
1593
+ * UUID of registered agent.
1594
+ */
1595
+ agentId?: Uuid;
1596
+ }
1349
1597
  export interface ReserveContactRequest {
1350
1598
  /**
1351
1599
  * End time of a contact in UTC.
@@ -1372,6 +1620,7 @@ declare namespace GroundStation {
1372
1620
  */
1373
1621
  tags?: TagsMap;
1374
1622
  }
1623
+ export type ReservedCpuCoresList = Integer[];
1375
1624
  export type RoleArn = string;
1376
1625
  export type S3BucketName = string;
1377
1626
  export type S3KeyPrefix = string;
@@ -1454,6 +1703,7 @@ declare namespace GroundStation {
1454
1703
  subnetIds: SubnetList;
1455
1704
  }
1456
1705
  export type SecurityGroupIdList = String[];
1706
+ export type SignatureMap = {[key: string]: Boolean};
1457
1707
  export interface SocketAddress {
1458
1708
  /**
1459
1709
  * Name of a socket address.
@@ -1570,6 +1820,30 @@ declare namespace GroundStation {
1570
1820
  }
1571
1821
  export interface UntagResourceResponse {
1572
1822
  }
1823
+ export interface UpdateAgentStatusRequest {
1824
+ /**
1825
+ * UUID of agent to update.
1826
+ */
1827
+ agentId: Uuid;
1828
+ /**
1829
+ * Aggregate status for agent.
1830
+ */
1831
+ aggregateStatus: AggregateStatus;
1832
+ /**
1833
+ * List of component statuses for agent.
1834
+ */
1835
+ componentStatuses: ComponentStatusList;
1836
+ /**
1837
+ * GUID of agent task.
1838
+ */
1839
+ taskId: Uuid;
1840
+ }
1841
+ export interface UpdateAgentStatusResponse {
1842
+ /**
1843
+ * UUID of updated agent.
1844
+ */
1845
+ agentId: Uuid;
1846
+ }
1573
1847
  export interface UpdateConfigRequest {
1574
1848
  /**
1575
1849
  * Parameters of a Config.
@@ -1631,6 +1905,14 @@ declare namespace GroundStation {
1631
1905
  * Name of a mission profile.
1632
1906
  */
1633
1907
  name?: SafeName;
1908
+ /**
1909
+ * KMS key to use for encrypting streams.
1910
+ */
1911
+ streamsKmsKey?: KmsKey;
1912
+ /**
1913
+ * Role to use for encrypting streams with KMS key.
1914
+ */
1915
+ streamsKmsRole?: RoleArn;
1634
1916
  /**
1635
1917
  * ARN of a tracking Config.
1636
1918
  */
@@ -1657,6 +1939,8 @@ declare namespace GroundStation {
1657
1939
  polarization?: Polarization;
1658
1940
  }
1659
1941
  export type Uuid = string;
1942
+ export type VersionString = string;
1943
+ export type VersionStringList = VersionString[];
1660
1944
  export type Year = number;
1661
1945
  export type noradSatelliteID = number;
1662
1946
  export type satelliteArn = string;
@@ -109,11 +109,11 @@ declare class IAM extends Service {
109
109
  */
110
110
  createLoginProfile(callback?: (err: AWSError, data: IAM.Types.CreateLoginProfileResponse) => void): Request<IAM.Types.CreateLoginProfileResponse, AWSError>;
111
111
  /**
112
- * Creates an IAM entity to describe an identity provider (IdP) that supports OpenID Connect (OIDC). The OIDC provider that you create with this operation can be used as a principal in a role's trust policy. Such a policy establishes a trust relationship between Amazon Web Services and the OIDC provider. If you are using an OIDC identity provider from Google, Facebook, or Amazon Cognito, you don't need to create a separate IAM identity provider. These OIDC identity providers are already built-in to Amazon Web Services and are available for your use. Instead, you can move directly to creating new roles using your identity provider. To learn more, see Creating a role for web identity or OpenID connect federation in the IAM User Guide. When you create the IAM OIDC provider, you specify the following: The URL of the OIDC identity provider (IdP) to trust A list of client IDs (also known as audiences) that identify the application or applications allowed to authenticate using the OIDC provider A list of thumbprints of one or more server certificates that the IdP uses You get all of this information from the OIDC IdP you want to use to access Amazon Web Services. Amazon Web Services secures communication with some OIDC identity providers (IdPs) through our library of trusted certificate authorities (CAs) instead of using a certificate thumbprint to verify your IdP server certificate. These OIDC IdPs include Google, and those that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS) endpoint. In these cases, your legacy thumbprint remains in your configuration, but is no longer used for validation. The trust for the OIDC provider is derived from the IAM provider that this operation creates. Therefore, it is best to limit access to the CreateOpenIDConnectProvider operation to highly privileged users.
112
+ * Creates an IAM entity to describe an identity provider (IdP) that supports OpenID Connect (OIDC). The OIDC provider that you create with this operation can be used as a principal in a role's trust policy. Such a policy establishes a trust relationship between Amazon Web Services and the OIDC provider. If you are using an OIDC identity provider from Google, Facebook, or Amazon Cognito, you don't need to create a separate IAM identity provider. These OIDC identity providers are already built-in to Amazon Web Services and are available for your use. Instead, you can move directly to creating new roles using your identity provider. To learn more, see Creating a role for web identity or OpenID connect federation in the IAM User Guide. When you create the IAM OIDC provider, you specify the following: The URL of the OIDC identity provider (IdP) to trust A list of client IDs (also known as audiences) that identify the application or applications allowed to authenticate using the OIDC provider A list of thumbprints of one or more server certificates that the IdP uses You get all of this information from the OIDC IdP you want to use to access Amazon Web Services. Amazon Web Services secures communication with some OIDC identity providers (IdPs) through our library of trusted certificate authorities (CAs) instead of using a certificate thumbprint to verify your IdP server certificate. These OIDC IdPs include Google, Auth0, and those that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS) endpoint. In these cases, your legacy thumbprint remains in your configuration, but is no longer used for validation. The trust for the OIDC provider is derived from the IAM provider that this operation creates. Therefore, it is best to limit access to the CreateOpenIDConnectProvider operation to highly privileged users.
113
113
  */
114
114
  createOpenIDConnectProvider(params: IAM.Types.CreateOpenIDConnectProviderRequest, callback?: (err: AWSError, data: IAM.Types.CreateOpenIDConnectProviderResponse) => void): Request<IAM.Types.CreateOpenIDConnectProviderResponse, AWSError>;
115
115
  /**
116
- * Creates an IAM entity to describe an identity provider (IdP) that supports OpenID Connect (OIDC). The OIDC provider that you create with this operation can be used as a principal in a role's trust policy. Such a policy establishes a trust relationship between Amazon Web Services and the OIDC provider. If you are using an OIDC identity provider from Google, Facebook, or Amazon Cognito, you don't need to create a separate IAM identity provider. These OIDC identity providers are already built-in to Amazon Web Services and are available for your use. Instead, you can move directly to creating new roles using your identity provider. To learn more, see Creating a role for web identity or OpenID connect federation in the IAM User Guide. When you create the IAM OIDC provider, you specify the following: The URL of the OIDC identity provider (IdP) to trust A list of client IDs (also known as audiences) that identify the application or applications allowed to authenticate using the OIDC provider A list of thumbprints of one or more server certificates that the IdP uses You get all of this information from the OIDC IdP you want to use to access Amazon Web Services. Amazon Web Services secures communication with some OIDC identity providers (IdPs) through our library of trusted certificate authorities (CAs) instead of using a certificate thumbprint to verify your IdP server certificate. These OIDC IdPs include Google, and those that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS) endpoint. In these cases, your legacy thumbprint remains in your configuration, but is no longer used for validation. The trust for the OIDC provider is derived from the IAM provider that this operation creates. Therefore, it is best to limit access to the CreateOpenIDConnectProvider operation to highly privileged users.
116
+ * Creates an IAM entity to describe an identity provider (IdP) that supports OpenID Connect (OIDC). The OIDC provider that you create with this operation can be used as a principal in a role's trust policy. Such a policy establishes a trust relationship between Amazon Web Services and the OIDC provider. If you are using an OIDC identity provider from Google, Facebook, or Amazon Cognito, you don't need to create a separate IAM identity provider. These OIDC identity providers are already built-in to Amazon Web Services and are available for your use. Instead, you can move directly to creating new roles using your identity provider. To learn more, see Creating a role for web identity or OpenID connect federation in the IAM User Guide. When you create the IAM OIDC provider, you specify the following: The URL of the OIDC identity provider (IdP) to trust A list of client IDs (also known as audiences) that identify the application or applications allowed to authenticate using the OIDC provider A list of thumbprints of one or more server certificates that the IdP uses You get all of this information from the OIDC IdP you want to use to access Amazon Web Services. Amazon Web Services secures communication with some OIDC identity providers (IdPs) through our library of trusted certificate authorities (CAs) instead of using a certificate thumbprint to verify your IdP server certificate. These OIDC IdPs include Google, Auth0, and those that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS) endpoint. In these cases, your legacy thumbprint remains in your configuration, but is no longer used for validation. The trust for the OIDC provider is derived from the IAM provider that this operation creates. Therefore, it is best to limit access to the CreateOpenIDConnectProvider operation to highly privileged users.
117
117
  */
118
118
  createOpenIDConnectProvider(callback?: (err: AWSError, data: IAM.Types.CreateOpenIDConnectProviderResponse) => void): Request<IAM.Types.CreateOpenIDConnectProviderResponse, AWSError>;
119
119
  /**
@@ -265,11 +265,11 @@ declare class IAM extends Service {
265
265
  */
266
266
  deletePolicyVersion(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
267
267
  /**
268
- * Deletes the specified role. The role must not have any policies attached. For more information about roles, see Working with roles. Make sure that you do not have any Amazon EC2 instances running with the role you are about to delete. Deleting a role or instance profile that is associated with a running instance will break any applications running on the instance.
268
+ * Deletes the specified role. Unlike the Amazon Web Services Management Console, when you delete a role programmatically, you must delete the items attached to the role manually, or the deletion fails. For more information, see Deleting an IAM role. Before attempting to delete a role, remove the following attached items: Inline policies (DeleteRolePolicy) Attached managed policies (DetachRolePolicy) Instance profile (RemoveRoleFromInstanceProfile) Optional – Delete instance profile after detaching from role for resource clean up (DeleteInstanceProfile) Make sure that you do not have any Amazon EC2 instances running with the role you are about to delete. Deleting a role or instance profile that is associated with a running instance will break any applications running on the instance.
269
269
  */
270
270
  deleteRole(params: IAM.Types.DeleteRoleRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
271
271
  /**
272
- * Deletes the specified role. The role must not have any policies attached. For more information about roles, see Working with roles. Make sure that you do not have any Amazon EC2 instances running with the role you are about to delete. Deleting a role or instance profile that is associated with a running instance will break any applications running on the instance.
272
+ * Deletes the specified role. Unlike the Amazon Web Services Management Console, when you delete a role programmatically, you must delete the items attached to the role manually, or the deletion fails. For more information, see Deleting an IAM role. Before attempting to delete a role, remove the following attached items: Inline policies (DeleteRolePolicy) Attached managed policies (DetachRolePolicy) Instance profile (RemoveRoleFromInstanceProfile) Optional – Delete instance profile after detaching from role for resource clean up (DeleteInstanceProfile) Make sure that you do not have any Amazon EC2 instances running with the role you are about to delete. Deleting a role or instance profile that is associated with a running instance will break any applications running on the instance.
273
273
  */
274
274
  deleteRole(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
275
275
  /**
@@ -977,19 +977,19 @@ declare class IAM extends Service {
977
977
  */
978
978
  setSecurityTokenServicePreferences(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
979
979
  /**
980
- * Simulate how a set of IAM policies and optionally a resource-based policy works with a list of API operations and Amazon Web Services resources to determine the policies' effective permissions. The policies are provided as strings. The simulation does not perform the API operations; it only checks the authorization to determine if the simulated policies allow or deny the operations. You can simulate resources that don't exist in your account. If you want to simulate existing policies that are attached to an IAM user, group, or role, use SimulatePrincipalPolicy instead. Context keys are variables that are maintained by Amazon Web Services and its services and which provide details about the context of an API query request. You can use the Condition element of an IAM policy to evaluate context keys. To get the list of context keys that the policies require for correct simulation, use GetContextKeysForCustomPolicy. If the output is long, you can use MaxItems and Marker parameters to paginate the results. For more information about using the policy simulator, see Testing IAM policies with the IAM policy simulator in the IAM User Guide.
980
+ * Simulate how a set of IAM policies and optionally a resource-based policy works with a list of API operations and Amazon Web Services resources to determine the policies' effective permissions. The policies are provided as strings. The simulation does not perform the API operations; it only checks the authorization to determine if the simulated policies allow or deny the operations. You can simulate resources that don't exist in your account. If you want to simulate existing policies that are attached to an IAM user, group, or role, use SimulatePrincipalPolicy instead. Context keys are variables that are maintained by Amazon Web Services and its services and which provide details about the context of an API query request. You can use the Condition element of an IAM policy to evaluate context keys. To get the list of context keys that the policies require for correct simulation, use GetContextKeysForCustomPolicy. If the output is long, you can use MaxItems and Marker parameters to paginate the results. The IAM policy simulator evaluates statements in the identity-based policy and the inputs that you provide during simulation. The policy simulator results can differ from your live Amazon Web Services environment. We recommend that you check your policies against your live Amazon Web Services environment after testing using the policy simulator to confirm that you have the desired results. For more information about using the policy simulator, see Testing IAM policies with the IAM policy simulator in the IAM User Guide.
981
981
  */
982
982
  simulateCustomPolicy(params: IAM.Types.SimulateCustomPolicyRequest, callback?: (err: AWSError, data: IAM.Types.SimulatePolicyResponse) => void): Request<IAM.Types.SimulatePolicyResponse, AWSError>;
983
983
  /**
984
- * Simulate how a set of IAM policies and optionally a resource-based policy works with a list of API operations and Amazon Web Services resources to determine the policies' effective permissions. The policies are provided as strings. The simulation does not perform the API operations; it only checks the authorization to determine if the simulated policies allow or deny the operations. You can simulate resources that don't exist in your account. If you want to simulate existing policies that are attached to an IAM user, group, or role, use SimulatePrincipalPolicy instead. Context keys are variables that are maintained by Amazon Web Services and its services and which provide details about the context of an API query request. You can use the Condition element of an IAM policy to evaluate context keys. To get the list of context keys that the policies require for correct simulation, use GetContextKeysForCustomPolicy. If the output is long, you can use MaxItems and Marker parameters to paginate the results. For more information about using the policy simulator, see Testing IAM policies with the IAM policy simulator in the IAM User Guide.
984
+ * Simulate how a set of IAM policies and optionally a resource-based policy works with a list of API operations and Amazon Web Services resources to determine the policies' effective permissions. The policies are provided as strings. The simulation does not perform the API operations; it only checks the authorization to determine if the simulated policies allow or deny the operations. You can simulate resources that don't exist in your account. If you want to simulate existing policies that are attached to an IAM user, group, or role, use SimulatePrincipalPolicy instead. Context keys are variables that are maintained by Amazon Web Services and its services and which provide details about the context of an API query request. You can use the Condition element of an IAM policy to evaluate context keys. To get the list of context keys that the policies require for correct simulation, use GetContextKeysForCustomPolicy. If the output is long, you can use MaxItems and Marker parameters to paginate the results. The IAM policy simulator evaluates statements in the identity-based policy and the inputs that you provide during simulation. The policy simulator results can differ from your live Amazon Web Services environment. We recommend that you check your policies against your live Amazon Web Services environment after testing using the policy simulator to confirm that you have the desired results. For more information about using the policy simulator, see Testing IAM policies with the IAM policy simulator in the IAM User Guide.
985
985
  */
986
986
  simulateCustomPolicy(callback?: (err: AWSError, data: IAM.Types.SimulatePolicyResponse) => void): Request<IAM.Types.SimulatePolicyResponse, AWSError>;
987
987
  /**
988
- * Simulate how a set of IAM policies attached to an IAM entity works with a list of API operations and Amazon Web Services resources to determine the policies' effective permissions. The entity can be an IAM user, group, or role. If you specify a user, then the simulation also includes all of the policies that are attached to groups that the user belongs to. You can simulate resources that don't exist in your account. You can optionally include a list of one or more additional policies specified as strings to include in the simulation. If you want to simulate only policies specified as strings, use SimulateCustomPolicy instead. You can also optionally include one resource-based policy to be evaluated with each of the resources included in the simulation. The simulation does not perform the API operations; it only checks the authorization to determine if the simulated policies allow or deny the operations. Note: This operation discloses information about the permissions granted to other users. If you do not want users to see other user's permissions, then consider allowing them to use SimulateCustomPolicy instead. Context keys are variables maintained by Amazon Web Services and its services that provide details about the context of an API query request. You can use the Condition element of an IAM policy to evaluate context keys. To get the list of context keys that the policies require for correct simulation, use GetContextKeysForPrincipalPolicy. If the output is long, you can use the MaxItems and Marker parameters to paginate the results. For more information about using the policy simulator, see Testing IAM policies with the IAM policy simulator in the IAM User Guide.
988
+ * Simulate how a set of IAM policies attached to an IAM entity works with a list of API operations and Amazon Web Services resources to determine the policies' effective permissions. The entity can be an IAM user, group, or role. If you specify a user, then the simulation also includes all of the policies that are attached to groups that the user belongs to. You can simulate resources that don't exist in your account. You can optionally include a list of one or more additional policies specified as strings to include in the simulation. If you want to simulate only policies specified as strings, use SimulateCustomPolicy instead. You can also optionally include one resource-based policy to be evaluated with each of the resources included in the simulation for IAM users only. The simulation does not perform the API operations; it only checks the authorization to determine if the simulated policies allow or deny the operations. Note: This operation discloses information about the permissions granted to other users. If you do not want users to see other user's permissions, then consider allowing them to use SimulateCustomPolicy instead. Context keys are variables maintained by Amazon Web Services and its services that provide details about the context of an API query request. You can use the Condition element of an IAM policy to evaluate context keys. To get the list of context keys that the policies require for correct simulation, use GetContextKeysForPrincipalPolicy. If the output is long, you can use the MaxItems and Marker parameters to paginate the results. The IAM policy simulator evaluates statements in the identity-based policy and the inputs that you provide during simulation. The policy simulator results can differ from your live Amazon Web Services environment. We recommend that you check your policies against your live Amazon Web Services environment after testing using the policy simulator to confirm that you have the desired results. For more information about using the policy simulator, see Testing IAM policies with the IAM policy simulator in the IAM User Guide.
989
989
  */
990
990
  simulatePrincipalPolicy(params: IAM.Types.SimulatePrincipalPolicyRequest, callback?: (err: AWSError, data: IAM.Types.SimulatePolicyResponse) => void): Request<IAM.Types.SimulatePolicyResponse, AWSError>;
991
991
  /**
992
- * Simulate how a set of IAM policies attached to an IAM entity works with a list of API operations and Amazon Web Services resources to determine the policies' effective permissions. The entity can be an IAM user, group, or role. If you specify a user, then the simulation also includes all of the policies that are attached to groups that the user belongs to. You can simulate resources that don't exist in your account. You can optionally include a list of one or more additional policies specified as strings to include in the simulation. If you want to simulate only policies specified as strings, use SimulateCustomPolicy instead. You can also optionally include one resource-based policy to be evaluated with each of the resources included in the simulation. The simulation does not perform the API operations; it only checks the authorization to determine if the simulated policies allow or deny the operations. Note: This operation discloses information about the permissions granted to other users. If you do not want users to see other user's permissions, then consider allowing them to use SimulateCustomPolicy instead. Context keys are variables maintained by Amazon Web Services and its services that provide details about the context of an API query request. You can use the Condition element of an IAM policy to evaluate context keys. To get the list of context keys that the policies require for correct simulation, use GetContextKeysForPrincipalPolicy. If the output is long, you can use the MaxItems and Marker parameters to paginate the results. For more information about using the policy simulator, see Testing IAM policies with the IAM policy simulator in the IAM User Guide.
992
+ * Simulate how a set of IAM policies attached to an IAM entity works with a list of API operations and Amazon Web Services resources to determine the policies' effective permissions. The entity can be an IAM user, group, or role. If you specify a user, then the simulation also includes all of the policies that are attached to groups that the user belongs to. You can simulate resources that don't exist in your account. You can optionally include a list of one or more additional policies specified as strings to include in the simulation. If you want to simulate only policies specified as strings, use SimulateCustomPolicy instead. You can also optionally include one resource-based policy to be evaluated with each of the resources included in the simulation for IAM users only. The simulation does not perform the API operations; it only checks the authorization to determine if the simulated policies allow or deny the operations. Note: This operation discloses information about the permissions granted to other users. If you do not want users to see other user's permissions, then consider allowing them to use SimulateCustomPolicy instead. Context keys are variables maintained by Amazon Web Services and its services that provide details about the context of an API query request. You can use the Condition element of an IAM policy to evaluate context keys. To get the list of context keys that the policies require for correct simulation, use GetContextKeysForPrincipalPolicy. If the output is long, you can use the MaxItems and Marker parameters to paginate the results. The IAM policy simulator evaluates statements in the identity-based policy and the inputs that you provide during simulation. The policy simulator results can differ from your live Amazon Web Services environment. We recommend that you check your policies against your live Amazon Web Services environment after testing using the policy simulator to confirm that you have the desired results. For more information about using the policy simulator, see Testing IAM policies with the IAM policy simulator in the IAM User Guide.
993
993
  */
994
994
  simulatePrincipalPolicy(callback?: (err: AWSError, data: IAM.Types.SimulatePolicyResponse) => void): Request<IAM.Types.SimulatePolicyResponse, AWSError>;
995
995
  /**
@@ -1161,11 +1161,11 @@ declare class IAM extends Service {
1161
1161
  */
1162
1162
  updateLoginProfile(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
1163
1163
  /**
1164
- * Replaces the existing list of server certificate thumbprints associated with an OpenID Connect (OIDC) provider resource object with a new list of thumbprints. The list that you pass with this operation completely replaces the existing list of thumbprints. (The lists are not merged.) Typically, you need to update a thumbprint only when the identity provider certificate changes, which occurs rarely. However, if the provider's certificate does change, any attempt to assume an IAM role that specifies the OIDC provider as a principal fails until the certificate thumbprint is updated. Amazon Web Services secures communication with some OIDC identity providers (IdPs) through our library of trusted certificate authorities (CAs) instead of using a certificate thumbprint to verify your IdP server certificate. These OIDC IdPs include Google, and those that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS) endpoint. In these cases, your legacy thumbprint remains in your configuration, but is no longer used for validation. Trust for the OIDC provider is derived from the provider certificate and is validated by the thumbprint. Therefore, it is best to limit access to the UpdateOpenIDConnectProviderThumbprint operation to highly privileged users.
1164
+ * Replaces the existing list of server certificate thumbprints associated with an OpenID Connect (OIDC) provider resource object with a new list of thumbprints. The list that you pass with this operation completely replaces the existing list of thumbprints. (The lists are not merged.) Typically, you need to update a thumbprint only when the identity provider certificate changes, which occurs rarely. However, if the provider's certificate does change, any attempt to assume an IAM role that specifies the OIDC provider as a principal fails until the certificate thumbprint is updated. Amazon Web Services secures communication with some OIDC identity providers (IdPs) through our library of trusted certificate authorities (CAs) instead of using a certificate thumbprint to verify your IdP server certificate. These OIDC IdPs include Google, Auth0, and those that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS) endpoint. In these cases, your legacy thumbprint remains in your configuration, but is no longer used for validation. Trust for the OIDC provider is derived from the provider certificate and is validated by the thumbprint. Therefore, it is best to limit access to the UpdateOpenIDConnectProviderThumbprint operation to highly privileged users.
1165
1165
  */
1166
1166
  updateOpenIDConnectProviderThumbprint(params: IAM.Types.UpdateOpenIDConnectProviderThumbprintRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
1167
1167
  /**
1168
- * Replaces the existing list of server certificate thumbprints associated with an OpenID Connect (OIDC) provider resource object with a new list of thumbprints. The list that you pass with this operation completely replaces the existing list of thumbprints. (The lists are not merged.) Typically, you need to update a thumbprint only when the identity provider certificate changes, which occurs rarely. However, if the provider's certificate does change, any attempt to assume an IAM role that specifies the OIDC provider as a principal fails until the certificate thumbprint is updated. Amazon Web Services secures communication with some OIDC identity providers (IdPs) through our library of trusted certificate authorities (CAs) instead of using a certificate thumbprint to verify your IdP server certificate. These OIDC IdPs include Google, and those that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS) endpoint. In these cases, your legacy thumbprint remains in your configuration, but is no longer used for validation. Trust for the OIDC provider is derived from the provider certificate and is validated by the thumbprint. Therefore, it is best to limit access to the UpdateOpenIDConnectProviderThumbprint operation to highly privileged users.
1168
+ * Replaces the existing list of server certificate thumbprints associated with an OpenID Connect (OIDC) provider resource object with a new list of thumbprints. The list that you pass with this operation completely replaces the existing list of thumbprints. (The lists are not merged.) Typically, you need to update a thumbprint only when the identity provider certificate changes, which occurs rarely. However, if the provider's certificate does change, any attempt to assume an IAM role that specifies the OIDC provider as a principal fails until the certificate thumbprint is updated. Amazon Web Services secures communication with some OIDC identity providers (IdPs) through our library of trusted certificate authorities (CAs) instead of using a certificate thumbprint to verify your IdP server certificate. These OIDC IdPs include Google, Auth0, and those that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS) endpoint. In these cases, your legacy thumbprint remains in your configuration, but is no longer used for validation. Trust for the OIDC provider is derived from the provider certificate and is validated by the thumbprint. Therefore, it is best to limit access to the UpdateOpenIDConnectProviderThumbprint operation to highly privileged users.
1169
1169
  */
1170
1170
  updateOpenIDConnectProviderThumbprint(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
1171
1171
  /**
@@ -1656,7 +1656,7 @@ declare namespace IAM {
1656
1656
  */
1657
1657
  MaxSessionDuration?: roleMaxSessionDurationType;
1658
1658
  /**
1659
- * The ARN of the policy that is used to set the permissions boundary for the role.
1659
+ * The ARN of the managed policy that is used to set the permissions boundary for the role. A permissions boundary policy defines the maximum permissions that identity-based policies can grant to an entity, but does not grant permissions. Permissions boundaries do not define the maximum permissions that a resource-based policy can grant to an entity. To learn more, see Permissions boundaries for IAM entities in the IAM User Guide. For more information about policy types, see Policy types in the IAM User Guide.
1660
1660
  */
1661
1661
  PermissionsBoundary?: arnType;
1662
1662
  /**
@@ -1740,7 +1740,7 @@ declare namespace IAM {
1740
1740
  */
1741
1741
  UserName: userNameType;
1742
1742
  /**
1743
- * The ARN of the policy that is used to set the permissions boundary for the user.
1743
+ * The ARN of the managed policy that is used to set the permissions boundary for the user. A permissions boundary policy defines the maximum permissions that identity-based policies can grant to an entity, but does not grant permissions. Permissions boundaries do not define the maximum permissions that a resource-based policy can grant to an entity. To learn more, see Permissions boundaries for IAM entities in the IAM User Guide. For more information about policy types, see Policy types in the IAM User Guide.
1744
1744
  */
1745
1745
  PermissionsBoundary?: arnType;
1746
1746
  /**
@@ -3997,7 +3997,7 @@ declare namespace IAM {
3997
3997
  */
3998
3998
  RoleName: roleNameType;
3999
3999
  /**
4000
- * The ARN of the policy that is used to set the permissions boundary for the role.
4000
+ * The ARN of the managed policy that is used to set the permissions boundary for the role. A permissions boundary policy defines the maximum permissions that identity-based policies can grant to an entity, but does not grant permissions. Permissions boundaries do not define the maximum permissions that a resource-based policy can grant to an entity. To learn more, see Permissions boundaries for IAM entities in the IAM User Guide. For more information about policy types, see Policy types in the IAM User Guide.
4001
4001
  */
4002
4002
  PermissionsBoundary: arnType;
4003
4003
  }
@@ -4021,7 +4021,7 @@ declare namespace IAM {
4021
4021
  */
4022
4022
  UserName: userNameType;
4023
4023
  /**
4024
- * The ARN of the policy that is used to set the permissions boundary for the user.
4024
+ * The ARN of the managed policy that is used to set the permissions boundary for the user. A permissions boundary policy defines the maximum permissions that identity-based policies can grant to an entity, but does not grant permissions. Permissions boundaries do not define the maximum permissions that a resource-based policy can grant to an entity. To learn more, see Permissions boundaries for IAM entities in the IAM User Guide. For more information about policy types, see Policy types in the IAM User Guide.
4025
4025
  */
4026
4026
  PermissionsBoundary: arnType;
4027
4027
  }
@@ -4499,11 +4499,11 @@ declare namespace IAM {
4499
4499
  */
4500
4500
  ActionNames: ActionNameListType;
4501
4501
  /**
4502
- * A list of ARNs of Amazon Web Services resources to include in the simulation. If this parameter is not provided, then the value defaults to * (all resources). Each API in the ActionNames parameter is evaluated for each resource in this list. The simulation determines the access result (allowed or denied) of each combination and reports it in the response. You can simulate resources that don't exist in your account. The simulation does not automatically retrieve policies for the specified resources. If you want to include a resource policy in the simulation, then you must include the policy as a string in the ResourcePolicy parameter. If you include a ResourcePolicy, then it must be applicable to all of the resources included in the simulation or you receive an invalid input error. For more information about ARNs, see Amazon Resource Names (ARNs) in the Amazon Web Services General Reference.
4502
+ * A list of ARNs of Amazon Web Services resources to include in the simulation. If this parameter is not provided, then the value defaults to * (all resources). Each API in the ActionNames parameter is evaluated for each resource in this list. The simulation determines the access result (allowed or denied) of each combination and reports it in the response. You can simulate resources that don't exist in your account. The simulation does not automatically retrieve policies for the specified resources. If you want to include a resource policy in the simulation, then you must include the policy as a string in the ResourcePolicy parameter. If you include a ResourcePolicy, then it must be applicable to all of the resources included in the simulation or you receive an invalid input error. For more information about ARNs, see Amazon Resource Names (ARNs) in the Amazon Web Services General Reference. Simulation of resource-based policies isn't supported for IAM roles.
4503
4503
  */
4504
4504
  ResourceArns?: ResourceNameListType;
4505
4505
  /**
4506
- * A resource-based policy to include in the simulation provided as a string. Each resource in the simulation is treated as if it had this policy attached. You can include only one resource-based policy in a simulation. The maximum length of the policy document that you can pass in this operation, including whitespace, is listed below. To view the maximum character counts of a managed policy with no whitespaces, see IAM and STS character quotas. The regex pattern used to validate this parameter is a string of characters consisting of the following: Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF) The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)
4506
+ * A resource-based policy to include in the simulation provided as a string. Each resource in the simulation is treated as if it had this policy attached. You can include only one resource-based policy in a simulation. The maximum length of the policy document that you can pass in this operation, including whitespace, is listed below. To view the maximum character counts of a managed policy with no whitespaces, see IAM and STS character quotas. The regex pattern used to validate this parameter is a string of characters consisting of the following: Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF) The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D) Simulation of resource-based policies isn't supported for IAM roles.
4507
4507
  */
4508
4508
  ResourcePolicy?: policyDocumentType;
4509
4509
  /**
@@ -4563,11 +4563,11 @@ declare namespace IAM {
4563
4563
  */
4564
4564
  ActionNames: ActionNameListType;
4565
4565
  /**
4566
- * A list of ARNs of Amazon Web Services resources to include in the simulation. If this parameter is not provided, then the value defaults to * (all resources). Each API in the ActionNames parameter is evaluated for each resource in this list. The simulation determines the access result (allowed or denied) of each combination and reports it in the response. You can simulate resources that don't exist in your account. The simulation does not automatically retrieve policies for the specified resources. If you want to include a resource policy in the simulation, then you must include the policy as a string in the ResourcePolicy parameter. For more information about ARNs, see Amazon Resource Names (ARNs) in the Amazon Web Services General Reference.
4566
+ * A list of ARNs of Amazon Web Services resources to include in the simulation. If this parameter is not provided, then the value defaults to * (all resources). Each API in the ActionNames parameter is evaluated for each resource in this list. The simulation determines the access result (allowed or denied) of each combination and reports it in the response. You can simulate resources that don't exist in your account. The simulation does not automatically retrieve policies for the specified resources. If you want to include a resource policy in the simulation, then you must include the policy as a string in the ResourcePolicy parameter. For more information about ARNs, see Amazon Resource Names (ARNs) in the Amazon Web Services General Reference. Simulation of resource-based policies isn't supported for IAM roles.
4567
4567
  */
4568
4568
  ResourceArns?: ResourceNameListType;
4569
4569
  /**
4570
- * A resource-based policy to include in the simulation provided as a string. Each resource in the simulation is treated as if it had this policy attached. You can include only one resource-based policy in a simulation. The maximum length of the policy document that you can pass in this operation, including whitespace, is listed below. To view the maximum character counts of a managed policy with no whitespaces, see IAM and STS character quotas. The regex pattern used to validate this parameter is a string of characters consisting of the following: Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF) The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)
4570
+ * A resource-based policy to include in the simulation provided as a string. Each resource in the simulation is treated as if it had this policy attached. You can include only one resource-based policy in a simulation. The maximum length of the policy document that you can pass in this operation, including whitespace, is listed below. To view the maximum character counts of a managed policy with no whitespaces, see IAM and STS character quotas. The regex pattern used to validate this parameter is a string of characters consisting of the following: Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF) The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D) Simulation of resource-based policies isn't supported for IAM roles.
4571
4571
  */
4572
4572
  ResourcePolicy?: policyDocumentType;
4573
4573
  /**
@@ -3155,6 +3155,10 @@ declare namespace Iot {
3155
3155
  * The CloudWatch log group to which the action sends data.
3156
3156
  */
3157
3157
  logGroupName: LogGroupName;
3158
+ /**
3159
+ * Indicates whether batches of log records will be extracted and uploaded into CloudWatch. Values include true or false (default).
3160
+ */
3161
+ batchMode?: BatchMode;
3158
3162
  }
3159
3163
  export interface CloudwatchMetricAction {
3160
3164
  /**