cdk-docker-image-deployment 0.0.48 → 0.0.49
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +3 -3
- package/lib/destination.js +1 -1
- package/lib/docker-image-deployment.js +1 -1
- package/lib/source.js +1 -1
- package/node_modules/aws-sdk/CHANGELOG.md +6 -1
- package/node_modules/aws-sdk/README.md +1 -1
- package/node_modules/aws-sdk/apis/cognito-idp-2016-04-18.min.json +156 -153
- package/node_modules/aws-sdk/apis/s3-2006-03-01.examples.json +132 -132
- package/node_modules/aws-sdk/apis/sagemaker-2017-07-24.min.json +512 -467
- package/node_modules/aws-sdk/clients/cognitoidentityserviceprovider.d.ts +38 -25
- package/node_modules/aws-sdk/clients/sagemaker.d.ts +34 -1
- package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +1 -1
- package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +3 -3
- package/node_modules/aws-sdk/dist/aws-sdk.js +159 -156
- package/node_modules/aws-sdk/dist/aws-sdk.min.js +72 -72
- package/node_modules/aws-sdk/lib/core.js +1 -1
- package/node_modules/aws-sdk/package.json +1 -1
- package/package.json +4 -4
|
@@ -68,11 +68,11 @@ declare class CognitoIdentityServiceProvider extends Service {
|
|
|
68
68
|
*/
|
|
69
69
|
adminDisableProviderForUser(callback?: (err: AWSError, data: CognitoIdentityServiceProvider.Types.AdminDisableProviderForUserResponse) => void): Request<CognitoIdentityServiceProvider.Types.AdminDisableProviderForUserResponse, AWSError>;
|
|
70
70
|
/**
|
|
71
|
-
*
|
|
71
|
+
* Deactivates a user and revokes all access tokens for the user. A deactivated user can't sign in, but still appears in the responses to GetUser and ListUsers API requests. You must make this API request with Amazon Web Services credentials that have cognito-idp:AdminDisableUser permissions.
|
|
72
72
|
*/
|
|
73
73
|
adminDisableUser(params: CognitoIdentityServiceProvider.Types.AdminDisableUserRequest, callback?: (err: AWSError, data: CognitoIdentityServiceProvider.Types.AdminDisableUserResponse) => void): Request<CognitoIdentityServiceProvider.Types.AdminDisableUserResponse, AWSError>;
|
|
74
74
|
/**
|
|
75
|
-
*
|
|
75
|
+
* Deactivates a user and revokes all access tokens for the user. A deactivated user can't sign in, but still appears in the responses to GetUser and ListUsers API requests. You must make this API request with Amazon Web Services credentials that have cognito-idp:AdminDisableUser permissions.
|
|
76
76
|
*/
|
|
77
77
|
adminDisableUser(callback?: (err: AWSError, data: CognitoIdentityServiceProvider.Types.AdminDisableUserResponse) => void): Request<CognitoIdentityServiceProvider.Types.AdminDisableUserResponse, AWSError>;
|
|
78
78
|
/**
|
|
@@ -492,11 +492,11 @@ declare class CognitoIdentityServiceProvider extends Service {
|
|
|
492
492
|
*/
|
|
493
493
|
getIdentityProviderByIdentifier(callback?: (err: AWSError, data: CognitoIdentityServiceProvider.Types.GetIdentityProviderByIdentifierResponse) => void): Request<CognitoIdentityServiceProvider.Types.GetIdentityProviderByIdentifierResponse, AWSError>;
|
|
494
494
|
/**
|
|
495
|
-
* This method takes a user pool ID, and returns the signing certificate.
|
|
495
|
+
* This method takes a user pool ID, and returns the signing certificate. The issued certificate is valid for 10 years from the date of issue. Amazon Cognito issues and assigns a new signing certificate annually. This process returns a new value in the response to GetSigningCertificate, but doesn't invalidate the original certificate.
|
|
496
496
|
*/
|
|
497
497
|
getSigningCertificate(params: CognitoIdentityServiceProvider.Types.GetSigningCertificateRequest, callback?: (err: AWSError, data: CognitoIdentityServiceProvider.Types.GetSigningCertificateResponse) => void): Request<CognitoIdentityServiceProvider.Types.GetSigningCertificateResponse, AWSError>;
|
|
498
498
|
/**
|
|
499
|
-
* This method takes a user pool ID, and returns the signing certificate.
|
|
499
|
+
* This method takes a user pool ID, and returns the signing certificate. The issued certificate is valid for 10 years from the date of issue. Amazon Cognito issues and assigns a new signing certificate annually. This process returns a new value in the response to GetSigningCertificate, but doesn't invalidate the original certificate.
|
|
500
500
|
*/
|
|
501
501
|
getSigningCertificate(callback?: (err: AWSError, data: CognitoIdentityServiceProvider.Types.GetSigningCertificateResponse) => void): Request<CognitoIdentityServiceProvider.Types.GetSigningCertificateResponse, AWSError>;
|
|
502
502
|
/**
|
|
@@ -532,11 +532,11 @@ declare class CognitoIdentityServiceProvider extends Service {
|
|
|
532
532
|
*/
|
|
533
533
|
getUserPoolMfaConfig(callback?: (err: AWSError, data: CognitoIdentityServiceProvider.Types.GetUserPoolMfaConfigResponse) => void): Request<CognitoIdentityServiceProvider.Types.GetUserPoolMfaConfigResponse, AWSError>;
|
|
534
534
|
/**
|
|
535
|
-
* Signs out users from all devices. It also invalidates all refresh tokens that Amazon Cognito has issued to a user.
|
|
535
|
+
* Signs out users from all devices. It also invalidates all refresh tokens that Amazon Cognito has issued to a user. A user can still use a hosted UI cookie to retrieve new tokens for the duration of the 1-hour cookie validity period.
|
|
536
536
|
*/
|
|
537
537
|
globalSignOut(params: CognitoIdentityServiceProvider.Types.GlobalSignOutRequest, callback?: (err: AWSError, data: CognitoIdentityServiceProvider.Types.GlobalSignOutResponse) => void): Request<CognitoIdentityServiceProvider.Types.GlobalSignOutResponse, AWSError>;
|
|
538
538
|
/**
|
|
539
|
-
* Signs out users from all devices. It also invalidates all refresh tokens that Amazon Cognito has issued to a user.
|
|
539
|
+
* Signs out users from all devices. It also invalidates all refresh tokens that Amazon Cognito has issued to a user. A user can still use a hosted UI cookie to retrieve new tokens for the duration of the 1-hour cookie validity period.
|
|
540
540
|
*/
|
|
541
541
|
globalSignOut(callback?: (err: AWSError, data: CognitoIdentityServiceProvider.Types.GlobalSignOutResponse) => void): Request<CognitoIdentityServiceProvider.Types.GlobalSignOutResponse, AWSError>;
|
|
542
542
|
/**
|
|
@@ -644,11 +644,11 @@ declare class CognitoIdentityServiceProvider extends Service {
|
|
|
644
644
|
*/
|
|
645
645
|
respondToAuthChallenge(callback?: (err: AWSError, data: CognitoIdentityServiceProvider.Types.RespondToAuthChallengeResponse) => void): Request<CognitoIdentityServiceProvider.Types.RespondToAuthChallengeResponse, AWSError>;
|
|
646
646
|
/**
|
|
647
|
-
* Revokes all of the access tokens generated by the specified refresh token. After
|
|
647
|
+
* Revokes all of the access tokens generated by, and at the same time as, the specified refresh token. After a token is revoked, you can't use the revoked token to access Amazon Cognito user APIs, or to authorize access to your resource server.
|
|
648
648
|
*/
|
|
649
649
|
revokeToken(params: CognitoIdentityServiceProvider.Types.RevokeTokenRequest, callback?: (err: AWSError, data: CognitoIdentityServiceProvider.Types.RevokeTokenResponse) => void): Request<CognitoIdentityServiceProvider.Types.RevokeTokenResponse, AWSError>;
|
|
650
650
|
/**
|
|
651
|
-
* Revokes all of the access tokens generated by the specified refresh token. After
|
|
651
|
+
* Revokes all of the access tokens generated by, and at the same time as, the specified refresh token. After a token is revoked, you can't use the revoked token to access Amazon Cognito user APIs, or to authorize access to your resource server.
|
|
652
652
|
*/
|
|
653
653
|
revokeToken(callback?: (err: AWSError, data: CognitoIdentityServiceProvider.Types.RevokeTokenResponse) => void): Request<CognitoIdentityServiceProvider.Types.RevokeTokenResponse, AWSError>;
|
|
654
654
|
/**
|
|
@@ -1240,7 +1240,7 @@ declare namespace CognitoIdentityServiceProvider {
|
|
|
1240
1240
|
*/
|
|
1241
1241
|
Username: UsernameType;
|
|
1242
1242
|
/**
|
|
1243
|
-
* The maximum number of authentication events to return.
|
|
1243
|
+
* The maximum number of authentication events to return. Returns 60 events if you set MaxResults to 0, or if you don't include a MaxResults parameter.
|
|
1244
1244
|
*/
|
|
1245
1245
|
MaxResults?: QueryLimitType;
|
|
1246
1246
|
/**
|
|
@@ -1915,15 +1915,15 @@ declare namespace CognitoIdentityServiceProvider {
|
|
|
1915
1915
|
*/
|
|
1916
1916
|
GenerateSecret?: GenerateSecret;
|
|
1917
1917
|
/**
|
|
1918
|
-
* The refresh token time limit. After this limit expires, your user can't use their refresh token. To specify the time unit for RefreshTokenValidity as seconds, minutes, hours, or days, set a TokenValidityUnits value in your API request. For example, when you set RefreshTokenValidity as 10 and TokenValidityUnits as days, your user can refresh their session and retrieve new access and ID tokens for 10 days. The default time unit for RefreshTokenValidity in an API request is days. You can't set RefreshTokenValidity to 0. If you do, Amazon Cognito overrides the value with the default value of 30 days. Valid range is displayed below in seconds.
|
|
1918
|
+
* The refresh token time limit. After this limit expires, your user can't use their refresh token. To specify the time unit for RefreshTokenValidity as seconds, minutes, hours, or days, set a TokenValidityUnits value in your API request. For example, when you set RefreshTokenValidity as 10 and TokenValidityUnits as days, your user can refresh their session and retrieve new access and ID tokens for 10 days. The default time unit for RefreshTokenValidity in an API request is days. You can't set RefreshTokenValidity to 0. If you do, Amazon Cognito overrides the value with the default value of 30 days. Valid range is displayed below in seconds. If you don't specify otherwise in the configuration of your app client, your refresh tokens are valid for 30 days.
|
|
1919
1919
|
*/
|
|
1920
1920
|
RefreshTokenValidity?: RefreshTokenValidityType;
|
|
1921
1921
|
/**
|
|
1922
|
-
* The access token time limit. After this limit expires, your user can't use their access token. To specify the time unit for AccessTokenValidity as seconds, minutes, hours, or days, set a TokenValidityUnits value in your API request. For example, when you set AccessTokenValidity to 10 and TokenValidityUnits to hours, your user can authorize access with their access token for 10 hours. The default time unit for AccessTokenValidity in an API request is hours. Valid range is displayed below in seconds.
|
|
1922
|
+
* The access token time limit. After this limit expires, your user can't use their access token. To specify the time unit for AccessTokenValidity as seconds, minutes, hours, or days, set a TokenValidityUnits value in your API request. For example, when you set AccessTokenValidity to 10 and TokenValidityUnits to hours, your user can authorize access with their access token for 10 hours. The default time unit for AccessTokenValidity in an API request is hours. Valid range is displayed below in seconds. If you don't specify otherwise in the configuration of your app client, your access tokens are valid for one hour.
|
|
1923
1923
|
*/
|
|
1924
1924
|
AccessTokenValidity?: AccessTokenValidityType;
|
|
1925
1925
|
/**
|
|
1926
|
-
* The ID token time limit. After this limit expires, your user can't use their ID token. To specify the time unit for IdTokenValidity as seconds, minutes, hours, or days, set a TokenValidityUnits value in your API request. For example, when you set IdTokenValidity as 10 and TokenValidityUnits as hours, your user can authenticate their session with their ID token for 10 hours. The default time unit for AccessTokenValidity in an API request is hours. Valid range is displayed below in seconds.
|
|
1926
|
+
* The ID token time limit. After this limit expires, your user can't use their ID token. To specify the time unit for IdTokenValidity as seconds, minutes, hours, or days, set a TokenValidityUnits value in your API request. For example, when you set IdTokenValidity as 10 and TokenValidityUnits as hours, your user can authenticate their session with their ID token for 10 hours. The default time unit for AccessTokenValidity in an API request is hours. Valid range is displayed below in seconds. If you don't specify otherwise in the configuration of your app client, your ID tokens are valid for one hour.
|
|
1927
1927
|
*/
|
|
1928
1928
|
IdTokenValidity?: IdTokenValidityType;
|
|
1929
1929
|
/**
|
|
@@ -1939,7 +1939,7 @@ declare namespace CognitoIdentityServiceProvider {
|
|
|
1939
1939
|
*/
|
|
1940
1940
|
WriteAttributes?: ClientPermissionListType;
|
|
1941
1941
|
/**
|
|
1942
|
-
* The authentication flows that
|
|
1942
|
+
* The authentication flows that you want your user pool client to support. For each app client in your user pool, you can sign in your users with any combination of one or more flows, including with a user name and Secure Remote Password (SRP), a user name and password, or a custom authentication process that you define with Lambda functions. If you don't specify a value for ExplicitAuthFlows, your user client supports ALLOW_REFRESH_TOKEN_AUTH, ALLOW_USER_SRP_AUTH, and ALLOW_CUSTOM_AUTH. Valid values include: ALLOW_ADMIN_USER_PASSWORD_AUTH: Enable admin based user password authentication flow ADMIN_USER_PASSWORD_AUTH. This setting replaces the ADMIN_NO_SRP_AUTH setting. With this authentication flow, your app passes a user name and password to Amazon Cognito in the request, instead of using the Secure Remote Password (SRP) protocol to securely transmit the password. ALLOW_CUSTOM_AUTH: Enable Lambda trigger based authentication. ALLOW_USER_PASSWORD_AUTH: Enable user password-based authentication. In this flow, Amazon Cognito receives the password in the request instead of using the SRP protocol to verify passwords. ALLOW_USER_SRP_AUTH: Enable SRP-based authentication. ALLOW_REFRESH_TOKEN_AUTH: Enable authflow to refresh tokens. In some environments, you will see the values ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, or USER_PASSWORD_AUTH. You can't assign these legacy ExplicitAuthFlows values to user pool clients at the same time as values that begin with ALLOW_, like ALLOW_USER_SRP_AUTH.
|
|
1943
1943
|
*/
|
|
1944
1944
|
ExplicitAuthFlows?: ExplicitAuthFlowsListType;
|
|
1945
1945
|
/**
|
|
@@ -2026,6 +2026,10 @@ declare namespace CognitoIdentityServiceProvider {
|
|
|
2026
2026
|
* The policies associated with the new user pool.
|
|
2027
2027
|
*/
|
|
2028
2028
|
Policies?: UserPoolPolicyType;
|
|
2029
|
+
/**
|
|
2030
|
+
* When active, DeletionProtection prevents accidental deletion of your user pool. Before you can delete a user pool that you have protected against deletion, you must deactivate this feature. When you try to delete a protected user pool in a DeleteUserPool API request, Amazon Cognito returns an InvalidParameterException error. To delete a protected user pool, send a new DeleteUserPool request after you deactivate deletion protection in an UpdateUserPool API request.
|
|
2031
|
+
*/
|
|
2032
|
+
DeletionProtection?: DeletionProtectionType;
|
|
2029
2033
|
/**
|
|
2030
2034
|
* The Lambda trigger configuration information for the new user pool. In a push model, event sources (such as Amazon S3 and custom applications) need permission to invoke a function. So you must make an extra call to add permission for these event sources to invoke your Lambda function. For more information on using the Lambda API to add permission, see AddPermission . For adding permission using the CLI, see add-permission .
|
|
2031
2035
|
*/
|
|
@@ -2221,6 +2225,7 @@ declare namespace CognitoIdentityServiceProvider {
|
|
|
2221
2225
|
*/
|
|
2222
2226
|
AccessToken: TokenModelType;
|
|
2223
2227
|
}
|
|
2228
|
+
export type DeletionProtectionType = "ACTIVE"|"INACTIVE"|string;
|
|
2224
2229
|
export type DeliveryMediumListType = DeliveryMediumType[];
|
|
2225
2230
|
export type DeliveryMediumType = "SMS"|"EMAIL"|string;
|
|
2226
2231
|
export interface DescribeIdentityProviderRequest {
|
|
@@ -2235,7 +2240,7 @@ declare namespace CognitoIdentityServiceProvider {
|
|
|
2235
2240
|
}
|
|
2236
2241
|
export interface DescribeIdentityProviderResponse {
|
|
2237
2242
|
/**
|
|
2238
|
-
* The
|
|
2243
|
+
* The identity provider details.
|
|
2239
2244
|
*/
|
|
2240
2245
|
IdentityProvider: IdentityProviderType;
|
|
2241
2246
|
}
|
|
@@ -2422,7 +2427,7 @@ declare namespace CognitoIdentityServiceProvider {
|
|
|
2422
2427
|
*/
|
|
2423
2428
|
ReplyToEmailAddress?: EmailAddressType;
|
|
2424
2429
|
/**
|
|
2425
|
-
* Specifies whether Amazon Cognito uses its built-in functionality to send your users email messages, or uses your Amazon Simple Email Service email configuration. Specify one of the following values: COGNITO_DEFAULT When Amazon Cognito emails your users, it uses its built-in email functionality. When you use the default option, Amazon Cognito allows only a limited number of emails each day for your user pool. For typical production environments, the default email limit is less than the required delivery volume. To achieve a higher delivery volume, specify DEVELOPER to use your Amazon SES email configuration. To look up the email delivery limit for the default option, see Limits in
|
|
2430
|
+
* Specifies whether Amazon Cognito uses its built-in functionality to send your users email messages, or uses your Amazon Simple Email Service email configuration. Specify one of the following values: COGNITO_DEFAULT When Amazon Cognito emails your users, it uses its built-in email functionality. When you use the default option, Amazon Cognito allows only a limited number of emails each day for your user pool. For typical production environments, the default email limit is less than the required delivery volume. To achieve a higher delivery volume, specify DEVELOPER to use your Amazon SES email configuration. To look up the email delivery limit for the default option, see Limits in the Amazon Cognito Developer Guide. The default FROM address is no-reply@verificationemail.com. To customize the FROM address, provide the Amazon Resource Name (ARN) of an Amazon SES verified email address for the SourceArn parameter. DEVELOPER When Amazon Cognito emails your users, it uses your Amazon SES configuration. Amazon Cognito calls Amazon SES on your behalf to send email from your verified email address. When you use this option, the email delivery limits are the same limits that apply to your Amazon SES verified email address in your Amazon Web Services account. If you use this option, provide the ARN of an Amazon SES verified email address for the SourceArn parameter. Before Amazon Cognito can email your users, it requires additional permissions to call Amazon SES on your behalf. When you update your user pool with this option, Amazon Cognito creates a service-linked role, which is a type of role in your Amazon Web Services account. This role contains the permissions that allow you to access Amazon SES and send email messages from your email address. For more information about the service-linked role that Amazon Cognito creates, see Using Service-Linked Roles for Amazon Cognito in the Amazon Cognito Developer Guide.
|
|
2426
2431
|
*/
|
|
2427
2432
|
EmailSendingAccount?: EmailSendingAccountType;
|
|
2428
2433
|
/**
|
|
@@ -2603,7 +2608,7 @@ declare namespace CognitoIdentityServiceProvider {
|
|
|
2603
2608
|
}
|
|
2604
2609
|
export interface GetIdentityProviderByIdentifierResponse {
|
|
2605
2610
|
/**
|
|
2606
|
-
* The
|
|
2611
|
+
* The identity provider details.
|
|
2607
2612
|
*/
|
|
2608
2613
|
IdentityProvider: IdentityProviderType;
|
|
2609
2614
|
}
|
|
@@ -3946,7 +3951,7 @@ declare namespace CognitoIdentityServiceProvider {
|
|
|
3946
3951
|
}
|
|
3947
3952
|
export interface UpdateIdentityProviderResponse {
|
|
3948
3953
|
/**
|
|
3949
|
-
* The
|
|
3954
|
+
* The identity provider details.
|
|
3950
3955
|
*/
|
|
3951
3956
|
IdentityProvider: IdentityProviderType;
|
|
3952
3957
|
}
|
|
@@ -4008,15 +4013,15 @@ declare namespace CognitoIdentityServiceProvider {
|
|
|
4008
4013
|
*/
|
|
4009
4014
|
ClientName?: ClientNameType;
|
|
4010
4015
|
/**
|
|
4011
|
-
* The refresh token time limit. After this limit expires, your user can't use their refresh token. To specify the time unit for RefreshTokenValidity as seconds, minutes, hours, or days, set a TokenValidityUnits value in your API request. For example, when you set RefreshTokenValidity as 10 and TokenValidityUnits as days, your user can refresh their session and retrieve new access and ID tokens for 10 days. The default time unit for RefreshTokenValidity in an API request is days. You can't set RefreshTokenValidity to 0. If you do, Amazon Cognito overrides the value with the default value of 30 days. Valid range is displayed below in seconds.
|
|
4016
|
+
* The refresh token time limit. After this limit expires, your user can't use their refresh token. To specify the time unit for RefreshTokenValidity as seconds, minutes, hours, or days, set a TokenValidityUnits value in your API request. For example, when you set RefreshTokenValidity as 10 and TokenValidityUnits as days, your user can refresh their session and retrieve new access and ID tokens for 10 days. The default time unit for RefreshTokenValidity in an API request is days. You can't set RefreshTokenValidity to 0. If you do, Amazon Cognito overrides the value with the default value of 30 days. Valid range is displayed below in seconds. If you don't specify otherwise in the configuration of your app client, your refresh tokens are valid for 30 days.
|
|
4012
4017
|
*/
|
|
4013
4018
|
RefreshTokenValidity?: RefreshTokenValidityType;
|
|
4014
4019
|
/**
|
|
4015
|
-
* The access token time limit. After this limit expires, your user can't use their access token. To specify the time unit for AccessTokenValidity as seconds, minutes, hours, or days, set a TokenValidityUnits value in your API request. For example, when you set AccessTokenValidity to 10 and TokenValidityUnits to hours, your user can authorize access with their access token for 10 hours. The default time unit for AccessTokenValidity in an API request is hours. Valid range is displayed below in seconds.
|
|
4020
|
+
* The access token time limit. After this limit expires, your user can't use their access token. To specify the time unit for AccessTokenValidity as seconds, minutes, hours, or days, set a TokenValidityUnits value in your API request. For example, when you set AccessTokenValidity to 10 and TokenValidityUnits to hours, your user can authorize access with their access token for 10 hours. The default time unit for AccessTokenValidity in an API request is hours. Valid range is displayed below in seconds. If you don't specify otherwise in the configuration of your app client, your access tokens are valid for one hour.
|
|
4016
4021
|
*/
|
|
4017
4022
|
AccessTokenValidity?: AccessTokenValidityType;
|
|
4018
4023
|
/**
|
|
4019
|
-
* The ID token time limit. After this limit expires, your user can't use their ID token. To specify the time unit for IdTokenValidity as seconds, minutes, hours, or days, set a TokenValidityUnits value in your API request. For example, when you set IdTokenValidity as 10 and TokenValidityUnits as hours, your user can authenticate their session with their ID token for 10 hours. The default time unit for AccessTokenValidity in an API request is hours. Valid range is displayed below in seconds.
|
|
4024
|
+
* The ID token time limit. After this limit expires, your user can't use their ID token. To specify the time unit for IdTokenValidity as seconds, minutes, hours, or days, set a TokenValidityUnits value in your API request. For example, when you set IdTokenValidity as 10 and TokenValidityUnits as hours, your user can authenticate their session with their ID token for 10 hours. The default time unit for AccessTokenValidity in an API request is hours. Valid range is displayed below in seconds. If you don't specify otherwise in the configuration of your app client, your ID tokens are valid for one hour.
|
|
4020
4025
|
*/
|
|
4021
4026
|
IdTokenValidity?: IdTokenValidityType;
|
|
4022
4027
|
/**
|
|
@@ -4032,7 +4037,7 @@ declare namespace CognitoIdentityServiceProvider {
|
|
|
4032
4037
|
*/
|
|
4033
4038
|
WriteAttributes?: ClientPermissionListType;
|
|
4034
4039
|
/**
|
|
4035
|
-
* The authentication flows that
|
|
4040
|
+
* The authentication flows that you want your user pool client to support. For each app client in your user pool, you can sign in your users with any combination of one or more flows, including with a user name and Secure Remote Password (SRP), a user name and password, or a custom authentication process that you define with Lambda functions. If you don't specify a value for ExplicitAuthFlows, your user client supports ALLOW_REFRESH_TOKEN_AUTH, ALLOW_USER_SRP_AUTH, and ALLOW_CUSTOM_AUTH. Valid values include: ALLOW_ADMIN_USER_PASSWORD_AUTH: Enable admin based user password authentication flow ADMIN_USER_PASSWORD_AUTH. This setting replaces the ADMIN_NO_SRP_AUTH setting. With this authentication flow, your app passes a user name and password to Amazon Cognito in the request, instead of using the Secure Remote Password (SRP) protocol to securely transmit the password. ALLOW_CUSTOM_AUTH: Enable Lambda trigger based authentication. ALLOW_USER_PASSWORD_AUTH: Enable user password-based authentication. In this flow, Amazon Cognito receives the password in the request instead of using the SRP protocol to verify passwords. ALLOW_USER_SRP_AUTH: Enable SRP-based authentication. ALLOW_REFRESH_TOKEN_AUTH: Enable authflow to refresh tokens. In some environments, you will see the values ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, or USER_PASSWORD_AUTH. You can't assign these legacy ExplicitAuthFlows values to user pool clients at the same time as values that begin with ALLOW_, like ALLOW_USER_SRP_AUTH.
|
|
4036
4041
|
*/
|
|
4037
4042
|
ExplicitAuthFlows?: ExplicitAuthFlowsListType;
|
|
4038
4043
|
/**
|
|
@@ -4119,6 +4124,10 @@ declare namespace CognitoIdentityServiceProvider {
|
|
|
4119
4124
|
* A container with the policies you want to update in a user pool.
|
|
4120
4125
|
*/
|
|
4121
4126
|
Policies?: UserPoolPolicyType;
|
|
4127
|
+
/**
|
|
4128
|
+
* When active, DeletionProtection prevents accidental deletion of your user pool. Before you can delete a user pool that you have protected against deletion, you must deactivate this feature. When you try to delete a protected user pool in a DeleteUserPool API request, Amazon Cognito returns an InvalidParameterException error. To delete a protected user pool, send a new DeleteUserPool request after you deactivate deletion protection in an UpdateUserPool API request.
|
|
4129
|
+
*/
|
|
4130
|
+
DeletionProtection?: DeletionProtectionType;
|
|
4122
4131
|
/**
|
|
4123
4132
|
* The Lambda configuration information from the request to update the user pool.
|
|
4124
4133
|
*/
|
|
@@ -4309,15 +4318,15 @@ declare namespace CognitoIdentityServiceProvider {
|
|
|
4309
4318
|
*/
|
|
4310
4319
|
CreationDate?: DateType;
|
|
4311
4320
|
/**
|
|
4312
|
-
* The refresh token time limit. After this limit expires, your user can't use their refresh token. To specify the time unit for RefreshTokenValidity as seconds, minutes, hours, or days, set a TokenValidityUnits value in your API request. For example, when you set RefreshTokenValidity as 10 and TokenValidityUnits as days, your user can refresh their session and retrieve new access and ID tokens for 10 days. The default time unit for RefreshTokenValidity in an API request is days. You can't set RefreshTokenValidity to 0. If you do, Amazon Cognito overrides the value with the default value of 30 days. Valid range is displayed below in seconds.
|
|
4321
|
+
* The refresh token time limit. After this limit expires, your user can't use their refresh token. To specify the time unit for RefreshTokenValidity as seconds, minutes, hours, or days, set a TokenValidityUnits value in your API request. For example, when you set RefreshTokenValidity as 10 and TokenValidityUnits as days, your user can refresh their session and retrieve new access and ID tokens for 10 days. The default time unit for RefreshTokenValidity in an API request is days. You can't set RefreshTokenValidity to 0. If you do, Amazon Cognito overrides the value with the default value of 30 days. Valid range is displayed below in seconds. If you don't specify otherwise in the configuration of your app client, your refresh tokens are valid for 30 days.
|
|
4313
4322
|
*/
|
|
4314
4323
|
RefreshTokenValidity?: RefreshTokenValidityType;
|
|
4315
4324
|
/**
|
|
4316
|
-
* The access token time limit. After this limit expires, your user can't use their access token. To specify the time unit for AccessTokenValidity as seconds, minutes, hours, or days, set a TokenValidityUnits value in your API request. For example, when you set AccessTokenValidity to 10 and TokenValidityUnits to hours, your user can authorize access with their access token for 10 hours. The default time unit for AccessTokenValidity in an API request is hours. Valid range is displayed below in seconds.
|
|
4325
|
+
* The access token time limit. After this limit expires, your user can't use their access token. To specify the time unit for AccessTokenValidity as seconds, minutes, hours, or days, set a TokenValidityUnits value in your API request. For example, when you set AccessTokenValidity to 10 and TokenValidityUnits to hours, your user can authorize access with their access token for 10 hours. The default time unit for AccessTokenValidity in an API request is hours. Valid range is displayed below in seconds. If you don't specify otherwise in the configuration of your app client, your access tokens are valid for one hour.
|
|
4317
4326
|
*/
|
|
4318
4327
|
AccessTokenValidity?: AccessTokenValidityType;
|
|
4319
4328
|
/**
|
|
4320
|
-
* The ID token time limit. After this limit expires, your user can't use their ID token. To specify the time unit for IdTokenValidity as seconds, minutes, hours, or days, set a TokenValidityUnits value in your API request. For example, when you set IdTokenValidity as 10 and TokenValidityUnits as hours, your user can authenticate their session with their ID token for 10 hours. The default time unit for AccessTokenValidity in an API request is hours. Valid range is displayed below in seconds.
|
|
4329
|
+
* The ID token time limit. After this limit expires, your user can't use their ID token. To specify the time unit for IdTokenValidity as seconds, minutes, hours, or days, set a TokenValidityUnits value in your API request. For example, when you set IdTokenValidity as 10 and TokenValidityUnits as hours, your user can authenticate their session with their ID token for 10 hours. The default time unit for AccessTokenValidity in an API request is hours. Valid range is displayed below in seconds. If you don't specify otherwise in the configuration of your app client, your ID tokens are valid for one hour.
|
|
4321
4330
|
*/
|
|
4322
4331
|
IdTokenValidity?: IdTokenValidityType;
|
|
4323
4332
|
/**
|
|
@@ -4333,7 +4342,7 @@ declare namespace CognitoIdentityServiceProvider {
|
|
|
4333
4342
|
*/
|
|
4334
4343
|
WriteAttributes?: ClientPermissionListType;
|
|
4335
4344
|
/**
|
|
4336
|
-
* The authentication flows that
|
|
4345
|
+
* The authentication flows that you want your user pool client to support. For each app client in your user pool, you can sign in your users with any combination of one or more flows, including with a user name and Secure Remote Password (SRP), a user name and password, or a custom authentication process that you define with Lambda functions. If you don't specify a value for ExplicitAuthFlows, your user client supports ALLOW_REFRESH_TOKEN_AUTH, ALLOW_USER_SRP_AUTH, and ALLOW_CUSTOM_AUTH. Valid values include: ALLOW_ADMIN_USER_PASSWORD_AUTH: Enable admin based user password authentication flow ADMIN_USER_PASSWORD_AUTH. This setting replaces the ADMIN_NO_SRP_AUTH setting. With this authentication flow, your app passes a user name and password to Amazon Cognito in the request, instead of using the Secure Remote Password (SRP) protocol to securely transmit the password. ALLOW_CUSTOM_AUTH: Enable Lambda trigger based authentication. ALLOW_USER_PASSWORD_AUTH: Enable user password-based authentication. In this flow, Amazon Cognito receives the password in the request instead of using the SRP protocol to verify passwords. ALLOW_USER_SRP_AUTH: Enable SRP-based authentication. ALLOW_REFRESH_TOKEN_AUTH: Enable authflow to refresh tokens. In some environments, you will see the values ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, or USER_PASSWORD_AUTH. You can't assign these legacy ExplicitAuthFlows values to user pool clients at the same time as values that begin with ALLOW_, like ALLOW_USER_SRP_AUTH.
|
|
4337
4346
|
*/
|
|
4338
4347
|
ExplicitAuthFlows?: ExplicitAuthFlowsListType;
|
|
4339
4348
|
/**
|
|
@@ -4436,6 +4445,10 @@ declare namespace CognitoIdentityServiceProvider {
|
|
|
4436
4445
|
* The policies associated with the user pool.
|
|
4437
4446
|
*/
|
|
4438
4447
|
Policies?: UserPoolPolicyType;
|
|
4448
|
+
/**
|
|
4449
|
+
* When active, DeletionProtection prevents accidental deletion of your user pool. Before you can delete a user pool that you have protected against deletion, you must deactivate this feature. When you try to delete a protected user pool in a DeleteUserPool API request, Amazon Cognito returns an InvalidParameterException error. To delete a protected user pool, send a new DeleteUserPool request after you deactivate deletion protection in an UpdateUserPool API request.
|
|
4450
|
+
*/
|
|
4451
|
+
DeletionProtection?: DeletionProtectionType;
|
|
4439
4452
|
/**
|
|
4440
4453
|
* The Lambda triggers associated with the user pool.
|
|
4441
4454
|
*/
|
|
@@ -7491,6 +7491,10 @@ declare namespace SageMaker {
|
|
|
7491
7491
|
* The recommendations made by Inference Recommender.
|
|
7492
7492
|
*/
|
|
7493
7493
|
InferenceRecommendations?: InferenceRecommendations;
|
|
7494
|
+
/**
|
|
7495
|
+
* The performance results from running an Inference Recommender job on an existing endpoint.
|
|
7496
|
+
*/
|
|
7497
|
+
EndpointPerformances?: EndpointPerformances;
|
|
7494
7498
|
}
|
|
7495
7499
|
export interface DescribeLabelingJobRequest {
|
|
7496
7500
|
/**
|
|
@@ -9470,6 +9474,12 @@ declare namespace SageMaker {
|
|
|
9470
9474
|
CreationTime: Timestamp;
|
|
9471
9475
|
}
|
|
9472
9476
|
export type EndpointConfigSummaryList = EndpointConfigSummary[];
|
|
9477
|
+
export interface EndpointInfo {
|
|
9478
|
+
/**
|
|
9479
|
+
* The name of a customer's endpoint.
|
|
9480
|
+
*/
|
|
9481
|
+
EndpointName: EndpointName;
|
|
9482
|
+
}
|
|
9473
9483
|
export interface EndpointInput {
|
|
9474
9484
|
/**
|
|
9475
9485
|
* An endpoint in customer's account which has enabled DataCaptureConfig enabled.
|
|
@@ -9547,6 +9557,14 @@ declare namespace SageMaker {
|
|
|
9547
9557
|
*/
|
|
9548
9558
|
InitialInstanceCount: Integer;
|
|
9549
9559
|
}
|
|
9560
|
+
export interface EndpointPerformance {
|
|
9561
|
+
/**
|
|
9562
|
+
* The metrics for an existing endpoint.
|
|
9563
|
+
*/
|
|
9564
|
+
Metrics: InferenceMetrics;
|
|
9565
|
+
EndpointInfo: EndpointInfo;
|
|
9566
|
+
}
|
|
9567
|
+
export type EndpointPerformances = EndpointPerformance[];
|
|
9550
9568
|
export type EndpointSortKey = "Name"|"CreationTime"|"Status"|string;
|
|
9551
9569
|
export type EndpointStatus = "OutOfService"|"Creating"|"Updating"|"SystemUpdating"|"RollingBack"|"InService"|"Deleting"|"Failed"|string;
|
|
9552
9570
|
export interface EndpointSummary {
|
|
@@ -9572,6 +9590,7 @@ declare namespace SageMaker {
|
|
|
9572
9590
|
EndpointStatus: EndpointStatus;
|
|
9573
9591
|
}
|
|
9574
9592
|
export type EndpointSummaryList = EndpointSummary[];
|
|
9593
|
+
export type Endpoints = EndpointInfo[];
|
|
9575
9594
|
export type EntityDescription = string;
|
|
9576
9595
|
export type EntityName = string;
|
|
9577
9596
|
export type EnvironmentKey = string;
|
|
@@ -10717,6 +10736,16 @@ declare namespace SageMaker {
|
|
|
10717
10736
|
}
|
|
10718
10737
|
export type InferenceExecutionMode = "Serial"|"Direct"|string;
|
|
10719
10738
|
export type InferenceImage = string;
|
|
10739
|
+
export interface InferenceMetrics {
|
|
10740
|
+
/**
|
|
10741
|
+
* The expected maximum number of requests per minute for the instance.
|
|
10742
|
+
*/
|
|
10743
|
+
MaxInvocations: Integer;
|
|
10744
|
+
/**
|
|
10745
|
+
* The expected model latency at maximum invocations per minute for the instance.
|
|
10746
|
+
*/
|
|
10747
|
+
ModelLatency: Integer;
|
|
10748
|
+
}
|
|
10720
10749
|
export interface InferenceRecommendation {
|
|
10721
10750
|
/**
|
|
10722
10751
|
* The metrics used to decide what recommendation to make.
|
|
@@ -16405,6 +16434,10 @@ declare namespace SageMaker {
|
|
|
16405
16434
|
* Specifies mandatory fields for running an Inference Recommender job. The fields specified in ContainerConfig override the corresponding fields in the model package.
|
|
16406
16435
|
*/
|
|
16407
16436
|
ContainerConfig?: RecommendationJobContainerConfig;
|
|
16437
|
+
/**
|
|
16438
|
+
* Existing customer endpoints on which to run an Inference Recommender job.
|
|
16439
|
+
*/
|
|
16440
|
+
Endpoints?: Endpoints;
|
|
16408
16441
|
}
|
|
16409
16442
|
export type RecommendationJobName = string;
|
|
16410
16443
|
export interface RecommendationJobOutputConfig {
|
|
@@ -17793,7 +17826,7 @@ declare namespace SageMaker {
|
|
|
17793
17826
|
*/
|
|
17794
17827
|
InstanceType: TransformInstanceType;
|
|
17795
17828
|
/**
|
|
17796
|
-
* The number of ML compute instances to use in the transform job. For distributed transform jobs, specify a value greater than 1.
|
|
17829
|
+
* The number of ML compute instances to use in the transform job. The default value is 1, and the maximum is 100. For distributed transform jobs, specify a value greater than 1.
|
|
17797
17830
|
*/
|
|
17798
17831
|
InstanceCount: TransformInstanceCount;
|
|
17799
17832
|
/**
|