cdk-docker-image-deployment 0.0.96 → 0.0.97
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +3 -3
- package/lib/destination.js +1 -1
- package/lib/docker-image-deployment.js +1 -1
- package/lib/source.js +1 -1
- package/node_modules/aws-sdk/CHANGELOG.md +6 -1
- package/node_modules/aws-sdk/README.md +1 -1
- package/node_modules/aws-sdk/apis/ce-2017-10-25.min.json +2 -1
- package/node_modules/aws-sdk/apis/cloudfront-2020-05-31.min.json +48 -1
- package/node_modules/aws-sdk/apis/eks-2017-11-01.min.json +41 -7
- package/node_modules/aws-sdk/apis/kms-2014-11-01.examples.json +42 -14
- package/node_modules/aws-sdk/clients/cloudfront.d.ts +42 -1
- package/node_modules/aws-sdk/clients/costexplorer.d.ts +4 -0
- package/node_modules/aws-sdk/clients/eks.d.ts +46 -2
- package/node_modules/aws-sdk/clients/kms.d.ts +3 -3
- package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +1 -1
- package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +4 -4
- package/node_modules/aws-sdk/dist/aws-sdk.js +53 -5
- package/node_modules/aws-sdk/dist/aws-sdk.min.js +87 -87
- package/node_modules/aws-sdk/lib/core.js +1 -1
- package/node_modules/aws-sdk/package.json +1 -1
- package/package.json +6 -6
package/.jsii
CHANGED
|
@@ -8,7 +8,7 @@
|
|
|
8
8
|
},
|
|
9
9
|
"bundled": {
|
|
10
10
|
"@types/aws-lambda": "^8.10.109",
|
|
11
|
-
"aws-sdk": "^2.
|
|
11
|
+
"aws-sdk": "^2.1270.0"
|
|
12
12
|
},
|
|
13
13
|
"dependencies": {
|
|
14
14
|
"aws-cdk-lib": "^2.24.0",
|
|
@@ -3549,6 +3549,6 @@
|
|
|
3549
3549
|
"symbolId": "src/source:SourceContext"
|
|
3550
3550
|
}
|
|
3551
3551
|
},
|
|
3552
|
-
"version": "0.0.
|
|
3553
|
-
"fingerprint": "
|
|
3552
|
+
"version": "0.0.97",
|
|
3553
|
+
"fingerprint": "YeoWpI1dLVbIY3ydaEw8YSyklUU3EE8X1VJbGkYBuGc="
|
|
3554
3554
|
}
|
package/lib/destination.js
CHANGED
|
@@ -26,7 +26,7 @@ class Destination {
|
|
|
26
26
|
}
|
|
27
27
|
exports.Destination = Destination;
|
|
28
28
|
_a = JSII_RTTI_SYMBOL_1;
|
|
29
|
-
Destination[_a] = { fqn: "cdk-docker-image-deployment.Destination", version: "0.0.
|
|
29
|
+
Destination[_a] = { fqn: "cdk-docker-image-deployment.Destination", version: "0.0.97" };
|
|
30
30
|
/**
|
|
31
31
|
* Class used when the destination of docker image deployment is an ECR repository in the same account as the stack
|
|
32
32
|
*/
|
|
@@ -114,5 +114,5 @@ class DockerImageDeployment extends constructs_1.Construct {
|
|
|
114
114
|
}
|
|
115
115
|
exports.DockerImageDeployment = DockerImageDeployment;
|
|
116
116
|
_a = JSII_RTTI_SYMBOL_1;
|
|
117
|
-
DockerImageDeployment[_a] = { fqn: "cdk-docker-image-deployment.DockerImageDeployment", version: "0.0.
|
|
117
|
+
DockerImageDeployment[_a] = { fqn: "cdk-docker-image-deployment.DockerImageDeployment", version: "0.0.97" };
|
|
118
118
|
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"docker-image-deployment.js","sourceRoot":"","sources":["../src/docker-image-deployment.ts"],"names":[],"mappings":";;;;;AAAA,6BAA6B;AAC7B,6CAAyE;AACzE,uDAAuD;AACvD,2CAA2C;AAC3C,uDAAiD;AACjD,wDAAwD;AACxD,mDAAmD;AACnD,2CAAuC;AAgBvC;;GAEG;AACH,MAAa,qBAAsB,SAAQ,sBAAS;IAGlD,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAiC;QACzE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAEjB,MAAM,WAAW,GAAG,IAAI,GAAG,CAAC,IAAI,CAAC,IAAI,EAAE,uBAAuB,EAAE;YAC9D,SAAS,EAAE,IAAI,GAAG,CAAC,gBAAgB,CAAC,yBAAyB,CAAC;SAC/D,CAAC,CAAC;QAEH,MAAM,YAAY,GAAG,KAAK,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,EAAE,EAAE,WAAW,EAAE,CAAC,CAAC;QAC9D,MAAM,iBAAiB,GAAG,KAAK,CAAC,WAAW,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;QAE9D,MAAM,SAAS,GAAG,YAAY,CAAC,QAAQ,CAAC;QAExC,MAAM,OAAO,GAAG,iBAAiB,CAAC,cAAc,IAAI,YAAY,CAAC,QAAQ,CAAC;QAC1E,IAAI,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAE1B,MAAM,OAAO,GAAG,GAAG,iBAAiB,CAAC,cAAc,IAAI,OAAO,EAAE,CAAC;QAEjE,MAAM,QAAQ,GAAG;YACf,YAAY,CAAC,WAAW,CAAC,YAAY;YACrC,eAAe,SAAS,EAAE;YAC1B,cAAc,SAAS,IAAI,OAAO,EAAE;SACrC,CAAC;QAEF,IAAI,YAAY,CAAC,WAAW,CAAC,MAAM,KAAK,iBAAiB,CAAC,WAAW,CAAC,MAAM,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,MAAM,EAAE,EAAE,gEAAgE;YAClL,QAAQ,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;YAC/B,QAAQ,CAAC,IAAI,CAAC,iBAAiB,CAAC,WAAW,CAAC,YAAY,CAAC,CAAC;SAC3D;QAED,QAAQ,CAAC,IAAI,CAAC,eAAe,OAAO,EAAE,CAAC,CAAC;QACxC,QAAQ,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QAE/B,IAAI,CAAC,EAAE,GAAG,IAAI,SAAS,CAAC,OAAO,CAAC,IAAI,EAAE,0BAA0B,EAAE;YAChE,SAAS,EAAE,SAAS,CAAC,SAAS,CAAC,UAAU,CAAC;gBACxC,OAAO,EAAE,KAAK;gBACd,MAAM,EAAE;oBACN,KAAK,EAAE;wBACL,QAAQ,EAAE,QAAQ;qBACnB;iBACF;aACF,CAAC;YACF,WAAW,EAAE;gBACX,UAAU,EAAE,IAAI;gBAChB,UAAU,EAAE,SAAS,CAAC,eAAe,CAAC,YAAY;aACnD;YACD,IAAI,EAAE,WAAW;SAClB,CAAC,CAAC;QAEH,MAAM,cAAc,GAAG,IAAI,MAAM,CAAC,cAAc,CAAC,IAAI,EAAE,gBAAgB,EAAE;YACvE,KAAK,EAAE,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,4BAA4B,CAAC;YACzD,OAAO,EAAE,gBAAgB;YACzB,OAAO,EAAE,oBAAO,CAAC,WAAW;SAC7B,CAAC,CAAC;QAEH,MAAM,iBAAiB,GAAG,IAAI,MAAM,CAAC,cAAc,CAAC,IAAI,EAAE,mBAAmB,EAAE;YAC7E,KAAK,EAAE,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,4BAA4B,CAAC;YACzD,OAAO,EAAE,mBAAmB;YAC5B,OAAO,EAAE,oBAAO,CAAC,WAAW;SAC7B,CAAC,CAAC;QAEH,sFAAsF;QACtF,MAAM,YAAY,GAAG,GAAG,CAAC,KAAK,CAAC,cAAc,CAAC;YAC5C,OAAO,EAAE,cAAc;YACvB,OAAO,EAAE,CAAC,sBAAsB,CAAC;YACjC,YAAY,EAAE,CAAC,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC;YAClC,KAAK,EAAE,IAAI;SACZ,CAAC,CAAC;QAEH,MAAM,eAAe,GAAG,GAAG,CAAC,KAAK,CAAC,cAAc,CAAC;YAC/C,OAAO,EAAE,iBAAiB;YAC1B,OAAO,EAAE;gBACP,gCAAgC;gBAChC,0BAA0B;aAC3B;YACD,YAAY,EAAE,CAAC,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC;YAClC,KAAK,EAAE,IAAI;SACZ,CAAC,CAAC;QAEH,MAAM,UAAU,GAAG,IAAI,EAAE,CAAC,QAAQ,CAAC,IAAI,EAAE,YAAY,EAAE;YACrD,cAAc,EAAE,cAAc;YAC9B,iBAAiB,EAAE,iBAAiB;YACpC,aAAa,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YACnC,YAAY,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SACnC,CAAC,CAAC;QAEH,MAAM,cAAc,GAAG,IAAI,4BAAc,CAAC,IAAI,EAAE,iBAAiB,IAAI,CAAC,GAAG,EAAE,CAAC,QAAQ,EAAE,EAAE,EAAE;YACxF,YAAY,EAAE,UAAU,CAAC,YAAY;YACrC,UAAU,EAAE;gBACV,WAAW,EAAE,IAAI,CAAC,EAAE,CAAC,WAAW;aACjC;SACF,CAAC,CAAC;QAEH,cAAc,CAAC,IAAI,CAAC,aAAa,CAAC,YAAY,EAAE,eAAe,CAAC,CAAC;QAEjE,IAAI;YACF,IAAI,uBAAS,CAAC,IAAI,EAAE,sBAAsB,EAAE;gBAC1C,KAAK,EAAE,GAAG,cAAc,CAAC,YAAY,CAAC,QAAQ,CAAC,wBAAwB,cAAc,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE;aAC1G,CAAC,CAAC;SACJ;QAAC,OAAO,KAAK,EAAE;YACd,MAAM,IAAI,KAAK,CAAC,mDAAmD,CAAC,CAAC;SACtE;IACH,CAAC;IAEO,WAAW,CAAC,GAAW;QAC7B,IAAI,mBAAK,CAAC,YAAY,CAAC,GAAG,CAAC,EAAE;YAC3B,OAAO,CAAC,4DAA4D;SACrE;QACD,IAAI,GAAG,CAAC,MAAM,GAAG,GAAG,EAAE;YACpB,MAAM,IAAI,KAAK,CAAE,uEAAuE,GAAG,QAAQ,GAAG,CAAC,MAAM,aAAa,CAAC,CAAC;SAC7H;QACD,IAAI,CAAC,wBAAwB,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE;YACvC,MAAM,IAAI,KAAK,CAAC,0IAA0I,GAAG,EAAE,CAAC,CAAC;SAClK;IACH,CAAC;;AAnHH,sDAoHC","sourcesContent":["import * as path from 'path';\nimport { CustomResource, Duration, CfnOutput, Token } from 'aws-cdk-lib';\nimport * as codebuild from 'aws-cdk-lib/aws-codebuild';\nimport * as iam from 'aws-cdk-lib/aws-iam';\nimport { Runtime } from 'aws-cdk-lib/aws-lambda';\nimport * as lambda from 'aws-cdk-lib/aws-lambda-nodejs';\nimport * as cr from 'aws-cdk-lib/custom-resources';\nimport { Construct } from 'constructs';\nimport { Destination } from './destination';\nimport { Source } from './source';\n\nexport interface DockerImageDeploymentProps {\n  /**\n   * Source of the image to deploy.\n   */\n  readonly source: Source;\n\n  /**\n   * Destination repository to deploy the image to.\n   */\n  readonly destination: Destination;\n}\n\n/**\n * `DockerImageDeployment` pushes an image from a local or external source to a specified external destination\n */\nexport class DockerImageDeployment extends Construct {\n  private readonly cb: codebuild.Project;\n\n  constructor(scope: Construct, id: string, props: DockerImageDeploymentProps) {\n    super(scope, id);\n\n    const handlerRole = new iam.Role(this, 'DockerImageDeployRole', {\n      assumedBy: new iam.ServicePrincipal('codebuild.amazonaws.com'),\n    });\n\n    const sourceConfig = props.source.bind(this, { handlerRole });\n    const destinationConfig = props.destination.bind(handlerRole);\n\n    const sourceUri = sourceConfig.imageUri;\n\n    const destTag = destinationConfig.destinationTag ?? sourceConfig.imageTag;\n    this.validateTag(destTag);\n\n    const destUri = `${destinationConfig.destinationUri}:${destTag}`;\n\n    const commands = [\n      sourceConfig.loginConfig.loginCommand,\n      `docker pull ${sourceUri}`,\n      `docker tag ${sourceUri} ${destUri}`,\n    ];\n\n    if (sourceConfig.loginConfig.region !== destinationConfig.loginConfig.region || !sourceConfig.loginConfig.region) { // different regions or either undefined should logout and login\n      commands.push('docker logout');\n      commands.push(destinationConfig.loginConfig.loginCommand);\n    }\n\n    commands.push(`docker push ${destUri}`);\n    commands.push('docker logout');\n\n    this.cb = new codebuild.Project(this, 'DockerImageDeployProject', {\n      buildSpec: codebuild.BuildSpec.fromObject({\n        version: '0.2',\n        phases: {\n          build: {\n            commands: commands,\n          },\n        },\n      }),\n      environment: {\n        privileged: true,\n        buildImage: codebuild.LinuxBuildImage.STANDARD_5_0,\n      },\n      role: handlerRole,\n    });\n\n    const onEventHandler = new lambda.NodejsFunction(this, 'onEventHandler', {\n      entry: path.join(__dirname, 'codebuild-handler/index.js'),\n      handler: 'onEventhandler',\n      runtime: Runtime.NODEJS_16_X,\n    });\n\n    const isCompleteHandler = new lambda.NodejsFunction(this, 'isCompleteHandler', {\n      entry: path.join(__dirname, 'codebuild-handler/index.js'),\n      handler: 'isCompleteHandler',\n      runtime: Runtime.NODEJS_16_X,\n    });\n\n    // https://github.com/aws/aws-cdk/issues/21721 issue to add grant methods to codebuild\n    const grantOnEvent = iam.Grant.addToPrincipal({\n      grantee: onEventHandler,\n      actions: ['codebuild:StartBuild'],\n      resourceArns: [this.cb.projectArn],\n      scope: this,\n    });\n\n    const grantIsComplete = iam.Grant.addToPrincipal({\n      grantee: isCompleteHandler,\n      actions: [\n        'codebuild:ListBuildsForProject',\n        'codebuild:BatchGetBuilds',\n      ],\n      resourceArns: [this.cb.projectArn],\n      scope: this,\n    });\n\n    const crProvider = new cr.Provider(this, 'CRProvider', {\n      onEventHandler: onEventHandler,\n      isCompleteHandler: isCompleteHandler,\n      queryInterval: Duration.seconds(30),\n      totalTimeout: Duration.minutes(30),\n    });\n\n    const customResource = new CustomResource(this, `CustomResource${Date.now().toString()}`, {\n      serviceToken: crProvider.serviceToken,\n      properties: {\n        projectName: this.cb.projectName,\n      },\n    });\n\n    customResource.node.addDependency(grantOnEvent, grantIsComplete);\n\n    try {\n      new CfnOutput(this, 'CustomResourceReport', {\n        value: `${customResource.getAttString('Status')}, see the logs here: ${customResource.getAtt('LogsUrl')}`,\n      });\n    } catch (error) {\n      throw new Error('Error getting the report from the custom resource');\n    }\n  }\n\n  private validateTag(tag: string): void {\n    if (Token.isUnresolved(tag)) {\n      return; // if token tag is likely from source, so assume it is valid\n    }\n    if (tag.length > 128) {\n      throw new Error (`Invalid tag: tags may contain a maximum of 128 characters; your tag ${tag} has ${tag.length} characters`);\n    }\n    if (!/^[^-.][a-zA-Z0-9-_.]+$/.test(tag)) {\n      throw new Error(`Invalid tag: tags must contain alphanumeric characters and \\'-\\' \\'_\\' \\'.\\' only and must not begin with \\'.\\' or \\'-\\'; your tag was ${tag}`);\n    }\n  }\n}\n"]}
|
package/lib/source.js
CHANGED
|
@@ -29,7 +29,7 @@ class Source {
|
|
|
29
29
|
}
|
|
30
30
|
exports.Source = Source;
|
|
31
31
|
_a = JSII_RTTI_SYMBOL_1;
|
|
32
|
-
Source[_a] = { fqn: "cdk-docker-image-deployment.Source", version: "0.0.
|
|
32
|
+
Source[_a] = { fqn: "cdk-docker-image-deployment.Source", version: "0.0.97" };
|
|
33
33
|
/**
|
|
34
34
|
* Source of docker image deployment is a local image from a directory
|
|
35
35
|
*/
|
|
@@ -1,7 +1,12 @@
|
|
|
1
1
|
# Changelog for AWS SDK for JavaScript
|
|
2
|
-
<!--LATEST=2.
|
|
2
|
+
<!--LATEST=2.1270.0-->
|
|
3
3
|
<!--ENTRYINSERT-->
|
|
4
4
|
|
|
5
|
+
## 2.1270.0
|
|
6
|
+
* feature: CloudFront: Introducing UpdateDistributionWithStagingConfig that can be used to promote the staging configuration to the production.
|
|
7
|
+
* feature: CostExplorer: This release adds the LinkedAccountName field to the GetAnomalies API response under RootCause
|
|
8
|
+
* feature: EKS: Adds support for EKS add-ons configurationValues fields and DescribeAddonConfiguration function
|
|
9
|
+
|
|
5
10
|
## 2.1269.0
|
|
6
11
|
* feature: Billingconductor: This release adds the Tiering Pricing Rule feature.
|
|
7
12
|
* feature: Connect: This release provides APIs that enable you to programmatically manage rules for Contact Lens conversational analytics and third party applications. For more information, see https://docs.aws.amazon.com/connect/latest/APIReference/rules-api.html
|
|
@@ -57,7 +57,7 @@ for further details.
|
|
|
57
57
|
To use the SDK in the browser, simply add the following script tag to your
|
|
58
58
|
HTML pages:
|
|
59
59
|
|
|
60
|
-
<script src="https://sdk.amazonaws.com/js/aws-sdk-2.
|
|
60
|
+
<script src="https://sdk.amazonaws.com/js/aws-sdk-2.1270.0.min.js"></script>
|
|
61
61
|
|
|
62
62
|
You can also build a custom browser SDK with your specified set of AWS services.
|
|
63
63
|
This can allow you to reduce the SDK's size, specify different API versions of
|
|
@@ -3593,6 +3593,45 @@
|
|
|
3593
3593
|
"payload": "Distribution"
|
|
3594
3594
|
}
|
|
3595
3595
|
},
|
|
3596
|
+
"UpdateDistributionWithStagingConfig": {
|
|
3597
|
+
"http": {
|
|
3598
|
+
"method": "PUT",
|
|
3599
|
+
"requestUri": "/2020-05-31/distribution/{Id}/promote-staging-config"
|
|
3600
|
+
},
|
|
3601
|
+
"input": {
|
|
3602
|
+
"type": "structure",
|
|
3603
|
+
"required": [
|
|
3604
|
+
"Id"
|
|
3605
|
+
],
|
|
3606
|
+
"members": {
|
|
3607
|
+
"Id": {
|
|
3608
|
+
"location": "uri",
|
|
3609
|
+
"locationName": "Id"
|
|
3610
|
+
},
|
|
3611
|
+
"StagingDistributionId": {
|
|
3612
|
+
"location": "querystring",
|
|
3613
|
+
"locationName": "StagingDistributionId"
|
|
3614
|
+
},
|
|
3615
|
+
"IfMatch": {
|
|
3616
|
+
"location": "header",
|
|
3617
|
+
"locationName": "If-Match"
|
|
3618
|
+
}
|
|
3619
|
+
}
|
|
3620
|
+
},
|
|
3621
|
+
"output": {
|
|
3622
|
+
"type": "structure",
|
|
3623
|
+
"members": {
|
|
3624
|
+
"Distribution": {
|
|
3625
|
+
"shape": "S6"
|
|
3626
|
+
},
|
|
3627
|
+
"ETag": {
|
|
3628
|
+
"location": "header",
|
|
3629
|
+
"locationName": "ETag"
|
|
3630
|
+
}
|
|
3631
|
+
},
|
|
3632
|
+
"payload": "Distribution"
|
|
3633
|
+
}
|
|
3634
|
+
},
|
|
3596
3635
|
"UpdateFieldLevelEncryptionConfig": {
|
|
3597
3636
|
"http": {
|
|
3598
3637
|
"method": "PUT",
|
|
@@ -4202,6 +4241,10 @@
|
|
|
4202
4241
|
"HttpVersion": {},
|
|
4203
4242
|
"IsIPV6Enabled": {
|
|
4204
4243
|
"type": "boolean"
|
|
4244
|
+
},
|
|
4245
|
+
"ContinuousDeploymentPolicyId": {},
|
|
4246
|
+
"Staging": {
|
|
4247
|
+
"type": "boolean"
|
|
4205
4248
|
}
|
|
4206
4249
|
}
|
|
4207
4250
|
},
|
|
@@ -5976,7 +6019,8 @@
|
|
|
5976
6019
|
"Restrictions",
|
|
5977
6020
|
"WebACLId",
|
|
5978
6021
|
"HttpVersion",
|
|
5979
|
-
"IsIPV6Enabled"
|
|
6022
|
+
"IsIPV6Enabled",
|
|
6023
|
+
"Staging"
|
|
5980
6024
|
],
|
|
5981
6025
|
"members": {
|
|
5982
6026
|
"Id": {},
|
|
@@ -6022,6 +6066,9 @@
|
|
|
6022
6066
|
},
|
|
6023
6067
|
"AliasICPRecordals": {
|
|
6024
6068
|
"shape": "S2j"
|
|
6069
|
+
},
|
|
6070
|
+
"Staging": {
|
|
6071
|
+
"type": "boolean"
|
|
6025
6072
|
}
|
|
6026
6073
|
}
|
|
6027
6074
|
}
|
|
@@ -124,7 +124,8 @@
|
|
|
124
124
|
},
|
|
125
125
|
"tags": {
|
|
126
126
|
"shape": "Sn"
|
|
127
|
-
}
|
|
127
|
+
},
|
|
128
|
+
"configurationValues": {}
|
|
128
129
|
}
|
|
129
130
|
},
|
|
130
131
|
"output": {
|
|
@@ -492,6 +493,37 @@
|
|
|
492
493
|
}
|
|
493
494
|
}
|
|
494
495
|
},
|
|
496
|
+
"DescribeAddonConfiguration": {
|
|
497
|
+
"http": {
|
|
498
|
+
"method": "GET",
|
|
499
|
+
"requestUri": "/addons/configuration-schemas"
|
|
500
|
+
},
|
|
501
|
+
"input": {
|
|
502
|
+
"type": "structure",
|
|
503
|
+
"required": [
|
|
504
|
+
"addonName",
|
|
505
|
+
"addonVersion"
|
|
506
|
+
],
|
|
507
|
+
"members": {
|
|
508
|
+
"addonName": {
|
|
509
|
+
"location": "querystring",
|
|
510
|
+
"locationName": "addonName"
|
|
511
|
+
},
|
|
512
|
+
"addonVersion": {
|
|
513
|
+
"location": "querystring",
|
|
514
|
+
"locationName": "addonVersion"
|
|
515
|
+
}
|
|
516
|
+
}
|
|
517
|
+
},
|
|
518
|
+
"output": {
|
|
519
|
+
"type": "structure",
|
|
520
|
+
"members": {
|
|
521
|
+
"addonName": {},
|
|
522
|
+
"addonVersion": {},
|
|
523
|
+
"configurationSchema": {}
|
|
524
|
+
}
|
|
525
|
+
}
|
|
526
|
+
},
|
|
495
527
|
"DescribeAddonVersions": {
|
|
496
528
|
"http": {
|
|
497
529
|
"method": "GET",
|
|
@@ -659,7 +691,7 @@
|
|
|
659
691
|
"locationName": "name"
|
|
660
692
|
},
|
|
661
693
|
"identityProviderConfig": {
|
|
662
|
-
"shape": "
|
|
694
|
+
"shape": "S3o"
|
|
663
695
|
}
|
|
664
696
|
}
|
|
665
697
|
},
|
|
@@ -781,7 +813,7 @@
|
|
|
781
813
|
"locationName": "name"
|
|
782
814
|
},
|
|
783
815
|
"identityProviderConfig": {
|
|
784
|
-
"shape": "
|
|
816
|
+
"shape": "S3o"
|
|
785
817
|
},
|
|
786
818
|
"clientRequestToken": {
|
|
787
819
|
"idempotencyToken": true
|
|
@@ -936,7 +968,7 @@
|
|
|
936
968
|
"identityProviderConfigs": {
|
|
937
969
|
"type": "list",
|
|
938
970
|
"member": {
|
|
939
|
-
"shape": "
|
|
971
|
+
"shape": "S3o"
|
|
940
972
|
}
|
|
941
973
|
},
|
|
942
974
|
"nextToken": {}
|
|
@@ -1167,7 +1199,8 @@
|
|
|
1167
1199
|
"resolveConflicts": {},
|
|
1168
1200
|
"clientRequestToken": {
|
|
1169
1201
|
"idempotencyToken": true
|
|
1170
|
-
}
|
|
1202
|
+
},
|
|
1203
|
+
"configurationValues": {}
|
|
1171
1204
|
}
|
|
1172
1205
|
},
|
|
1173
1206
|
"output": {
|
|
@@ -1453,7 +1486,8 @@
|
|
|
1453
1486
|
"owner": {},
|
|
1454
1487
|
"marketplaceInformation": {
|
|
1455
1488
|
"shape": "S12"
|
|
1456
|
-
}
|
|
1489
|
+
},
|
|
1490
|
+
"configurationValues": {}
|
|
1457
1491
|
}
|
|
1458
1492
|
},
|
|
1459
1493
|
"S12": {
|
|
@@ -1802,7 +1836,7 @@
|
|
|
1802
1836
|
}
|
|
1803
1837
|
}
|
|
1804
1838
|
},
|
|
1805
|
-
"
|
|
1839
|
+
"S3o": {
|
|
1806
1840
|
"type": "structure",
|
|
1807
1841
|
"required": [
|
|
1808
1842
|
"type",
|
|
@@ -88,7 +88,10 @@
|
|
|
88
88
|
"input": {
|
|
89
89
|
"CustomKeyStoreName": "ExampleVPCEndpointKeyStore",
|
|
90
90
|
"CustomKeyStoreType": "EXTERNAL_KEY_STORE",
|
|
91
|
-
"XksProxyAuthenticationCredential":
|
|
91
|
+
"XksProxyAuthenticationCredential": {
|
|
92
|
+
"AccessKeyId": "ABCDE12345670EXAMPLE",
|
|
93
|
+
"RawSecretAccessKey": "DXjSUawnel2fr6SKC7G25CNxTyWKE5PF9XX6H/u9pSo="
|
|
94
|
+
},
|
|
92
95
|
"XksProxyConnectivity": "VPC_ENDPOINT_SERVICE",
|
|
93
96
|
"XksProxyUriEndpoint": "https://myproxy-private.xks.example.com",
|
|
94
97
|
"XksProxyUriPath": "/example-prefix/kms/xks/v1",
|
|
@@ -119,7 +122,10 @@
|
|
|
119
122
|
"input": {
|
|
120
123
|
"CustomKeyStoreName": "ExamplePublicEndpointKeyStore",
|
|
121
124
|
"CustomKeyStoreType": "EXTERNAL_KEY_STORE",
|
|
122
|
-
"XksProxyAuthenticationCredential":
|
|
125
|
+
"XksProxyAuthenticationCredential": {
|
|
126
|
+
"AccessKeyId": "ABCDE12345670EXAMPLE",
|
|
127
|
+
"RawSecretAccessKey": "DXjSUawnel2fr6SKC7G25CNxTyWKE5PF9XX6H/u9pSo="
|
|
128
|
+
},
|
|
123
129
|
"XksProxyConnectivity": "PUBLIC_ENDPOINT",
|
|
124
130
|
"XksProxyUriEndpoint": "https://myproxy.xks.example.com",
|
|
125
131
|
"XksProxyUriPath": "/kms/xks/v1"
|
|
@@ -1860,40 +1866,40 @@
|
|
|
1860
1866
|
{
|
|
1861
1867
|
"input": {
|
|
1862
1868
|
"CustomKeyStoreId": "cks-1234567890abcdef0",
|
|
1863
|
-
"
|
|
1869
|
+
"NewCustomKeyStoreName": "DevelopmentKeys"
|
|
1864
1870
|
},
|
|
1865
1871
|
"output": {
|
|
1866
1872
|
},
|
|
1867
1873
|
"comments": {
|
|
1868
1874
|
"input": {
|
|
1869
1875
|
"CustomKeyStoreId": "The ID of the custom key store that you are updating.",
|
|
1870
|
-
"
|
|
1876
|
+
"NewCustomKeyStoreName": "A new friendly name for the custom key store."
|
|
1871
1877
|
},
|
|
1872
1878
|
"output": {
|
|
1873
1879
|
}
|
|
1874
1880
|
},
|
|
1875
|
-
"description": "This example
|
|
1876
|
-
"id": "to-edit-the-
|
|
1877
|
-
"title": "To edit the
|
|
1881
|
+
"description": "This example changes the friendly name of the AWS KMS custom key store to the name that you specify. This operation does not return any data. To verify that the operation worked, use the DescribeCustomKeyStores operation.",
|
|
1882
|
+
"id": "to-edit-the-friendly-name-of-a-custom-key-store-1",
|
|
1883
|
+
"title": "To edit the friendly name of a custom key store"
|
|
1878
1884
|
},
|
|
1879
1885
|
{
|
|
1880
1886
|
"input": {
|
|
1881
1887
|
"CustomKeyStoreId": "cks-1234567890abcdef0",
|
|
1882
|
-
"
|
|
1888
|
+
"KeyStorePassword": "ExamplePassword"
|
|
1883
1889
|
},
|
|
1884
1890
|
"output": {
|
|
1885
1891
|
},
|
|
1886
1892
|
"comments": {
|
|
1887
1893
|
"input": {
|
|
1888
1894
|
"CustomKeyStoreId": "The ID of the custom key store that you are updating.",
|
|
1889
|
-
"
|
|
1895
|
+
"KeyStorePassword": "The password for the kmsuser crypto user in the CloudHSM cluster."
|
|
1890
1896
|
},
|
|
1891
1897
|
"output": {
|
|
1892
1898
|
}
|
|
1893
1899
|
},
|
|
1894
|
-
"description": "This example
|
|
1895
|
-
"id": "to-edit-the-
|
|
1896
|
-
"title": "To edit the
|
|
1900
|
+
"description": "This example tells AWS KMS the password for the kmsuser crypto user in the AWS CloudHSM cluster that is associated with the AWS KMS custom key store. (It does not change the password in the CloudHSM cluster.) This operation does not return any data.",
|
|
1901
|
+
"id": "to-edit-the-properties-of-an-aws-cloudhsm-key-store-2",
|
|
1902
|
+
"title": "To edit the password of an AWS CloudHSM key store"
|
|
1897
1903
|
},
|
|
1898
1904
|
{
|
|
1899
1905
|
"input": {
|
|
@@ -1914,6 +1920,28 @@
|
|
|
1914
1920
|
"id": "to-associate-the-custom-key-store-with-a-different-but-related-aws-cloudhsm-cluster-3",
|
|
1915
1921
|
"title": "To associate the custom key store with a different, but related, AWS CloudHSM cluster."
|
|
1916
1922
|
},
|
|
1923
|
+
{
|
|
1924
|
+
"input": {
|
|
1925
|
+
"CustomKeyStoreId": "cks-1234567890abcdef0",
|
|
1926
|
+
"XksProxyAuthenticationCredential": {
|
|
1927
|
+
"AccessKeyId": "ABCDE12345670EXAMPLE",
|
|
1928
|
+
"RawSecretAccessKey": "DXjSUawnel2fr6SKC7G25CNxTyWKE5PF9XX6H/u9pSo="
|
|
1929
|
+
}
|
|
1930
|
+
},
|
|
1931
|
+
"output": {
|
|
1932
|
+
},
|
|
1933
|
+
"comments": {
|
|
1934
|
+
"input": {
|
|
1935
|
+
"CustomKeyStoreId": "Identifies the custom key store",
|
|
1936
|
+
"XksProxyAuthenticationCredential": "Specifies the values in the proxy authentication credential"
|
|
1937
|
+
},
|
|
1938
|
+
"output": {
|
|
1939
|
+
}
|
|
1940
|
+
},
|
|
1941
|
+
"description": "To update the proxy authentication credential for your external key store, specify both the <code>RawSecretAccessKey</code> and the <code>AccessKeyId</code>, even if you are changing only one of the values. You can use this feature to fix an invalid credential or to change the credential when the external key store proxy rotates it.",
|
|
1942
|
+
"id": "to-update-the-proxy-authentication-credential-of-an-external-key-store-4",
|
|
1943
|
+
"title": "To update the proxy authentication credential of an external key store"
|
|
1944
|
+
},
|
|
1917
1945
|
{
|
|
1918
1946
|
"input": {
|
|
1919
1947
|
"CustomKeyStoreId": "cks-1234567890abcdef0",
|
|
@@ -1930,7 +1958,7 @@
|
|
|
1930
1958
|
}
|
|
1931
1959
|
},
|
|
1932
1960
|
"description": "This example updates the proxy URI path for an external key store",
|
|
1933
|
-
"id": "to-update-the-xks-proxy-api-path-of-an-external-
|
|
1961
|
+
"id": "to-update-the-xks-proxy-api-path-of-an-external-key-store-5",
|
|
1934
1962
|
"title": "To edit the proxy URI path of an external key store."
|
|
1935
1963
|
},
|
|
1936
1964
|
{
|
|
@@ -1953,7 +1981,7 @@
|
|
|
1953
1981
|
}
|
|
1954
1982
|
},
|
|
1955
1983
|
"description": "To change the external key store proxy connectivity option from public endpoint connectivity to VPC endpoint service connectivity, in addition to changing the <code>XksProxyConnectivity</code> value, you must change the <code>XksProxyUriEndpoint</code> value to reflect the private DNS name associated with the VPC endpoint service. You must also add an <code>XksProxyVpcEndpointServiceName</code> value.",
|
|
1956
|
-
"id": "to-update-the-proxy-connectivity-of-an-external-key-store-to-vpc_endpoint_service-
|
|
1984
|
+
"id": "to-update-the-proxy-connectivity-of-an-external-key-store-to-vpc_endpoint_service-6",
|
|
1957
1985
|
"title": "To update the proxy connectivity of an external key store to VPC_ENDPOINT_SERVICE"
|
|
1958
1986
|
}
|
|
1959
1987
|
],
|
|
@@ -773,6 +773,14 @@ declare class CloudFront extends CloudFrontCustomizations {
|
|
|
773
773
|
* Updates the configuration for a CloudFront distribution. The update process includes getting the current distribution configuration, updating it to make your changes, and then submitting an UpdateDistribution request to make the updates. To update a web distribution using the CloudFront API Use GetDistributionConfig to get the current configuration, including the version identifier (ETag). Update the distribution configuration that was returned in the response. Note the following important requirements and restrictions: You must rename the ETag field to IfMatch, leaving the value unchanged. (Set the value of IfMatch to the value of ETag, then remove the ETag field.) You can’t change the value of CallerReference. Submit an UpdateDistribution request, providing the distribution configuration. The new configuration replaces the existing configuration. The values that you specify in an UpdateDistribution request are not merged into your existing configuration. Make sure to include all fields: the ones that you modified and also the ones that you didn’t.
|
|
774
774
|
*/
|
|
775
775
|
updateDistribution(callback?: (err: AWSError, data: CloudFront.Types.UpdateDistributionResult) => void): Request<CloudFront.Types.UpdateDistributionResult, AWSError>;
|
|
776
|
+
/**
|
|
777
|
+
* Copies the staging distribution's configuration to its corresponding primary distribution. The primary distribution retains its Aliases (also known as alternate domain names or CNAMEs) and ContinuousDeploymentPolicyId value, but otherwise its configuration is overwritten to match the staging distribution. You can use this operation in a continuous deployment workflow after you have tested configuration changes on the staging distribution. After using a continuous deployment policy to move a portion of your domain name’s traffic to the staging distribution and verifying that it works as intended, you can use this operation to copy the staging distribution’s configuration to the primary distribution. This action will disable the continuous deployment policy and move your domain’s traffic back to the primary distribution.
|
|
778
|
+
*/
|
|
779
|
+
updateDistributionWithStagingConfig(params: CloudFront.Types.UpdateDistributionWithStagingConfigRequest, callback?: (err: AWSError, data: CloudFront.Types.UpdateDistributionWithStagingConfigResult) => void): Request<CloudFront.Types.UpdateDistributionWithStagingConfigResult, AWSError>;
|
|
780
|
+
/**
|
|
781
|
+
* Copies the staging distribution's configuration to its corresponding primary distribution. The primary distribution retains its Aliases (also known as alternate domain names or CNAMEs) and ContinuousDeploymentPolicyId value, but otherwise its configuration is overwritten to match the staging distribution. You can use this operation in a continuous deployment workflow after you have tested configuration changes on the staging distribution. After using a continuous deployment policy to move a portion of your domain name’s traffic to the staging distribution and verifying that it works as intended, you can use this operation to copy the staging distribution’s configuration to the primary distribution. This action will disable the continuous deployment policy and move your domain’s traffic back to the primary distribution.
|
|
782
|
+
*/
|
|
783
|
+
updateDistributionWithStagingConfig(callback?: (err: AWSError, data: CloudFront.Types.UpdateDistributionWithStagingConfigResult) => void): Request<CloudFront.Types.UpdateDistributionWithStagingConfigResult, AWSError>;
|
|
776
784
|
/**
|
|
777
785
|
* Update a field-level encryption configuration.
|
|
778
786
|
*/
|
|
@@ -1349,7 +1357,7 @@ declare namespace CloudFront {
|
|
|
1349
1357
|
}
|
|
1350
1358
|
export interface ContinuousDeploymentSingleWeightConfig {
|
|
1351
1359
|
/**
|
|
1352
|
-
* The percentage of traffic to send to
|
|
1360
|
+
* The percentage of traffic to send to a staging distribution, expressed as a decimal number between 0 and .15.
|
|
1353
1361
|
*/
|
|
1354
1362
|
Weight: float;
|
|
1355
1363
|
SessionStickinessConfig?: SessionStickinessConfig;
|
|
@@ -2187,6 +2195,14 @@ declare namespace CloudFront {
|
|
|
2187
2195
|
* If you want CloudFront to respond to IPv6 DNS requests with an IPv6 address for your distribution, specify true. If you specify false, CloudFront responds to IPv6 DNS requests with the DNS response code NOERROR and with no IP addresses. This allows viewers to submit a second request, for an IPv4 address for your distribution. In general, you should enable IPv6 if you have users on IPv6 networks who want to access your content. However, if you're using signed URLs or signed cookies to restrict access to your content, and if you're using a custom policy that includes the IpAddress parameter to restrict the IP addresses that can access your content, don't enable IPv6. If you want to restrict access to some content by IP address and not restrict access to other content (or restrict access but not by IP address), you can create two distributions. For more information, see Creating a Signed URL Using a Custom Policy in the Amazon CloudFront Developer Guide. If you're using an Route 53 Amazon Web Services Integration alias resource record set to route traffic to your CloudFront distribution, you need to create a second alias resource record set when both of the following are true: You enable IPv6 for the distribution You're using alternate domain names in the URLs for your objects For more information, see Routing Traffic to an Amazon CloudFront Web Distribution by Using Your Domain Name in the Route 53 Amazon Web Services Integration Developer Guide. If you created a CNAME resource record set, either with Route 53 Amazon Web Services Integration or with another DNS service, you don't need to make any changes. A CNAME record will route traffic to your distribution regardless of the IP address format of the viewer request.
|
|
2188
2196
|
*/
|
|
2189
2197
|
IsIPV6Enabled?: boolean;
|
|
2198
|
+
/**
|
|
2199
|
+
* The identifier of a continuous deployment policy. For more information, see CreateContinuousDeploymentPolicy.
|
|
2200
|
+
*/
|
|
2201
|
+
ContinuousDeploymentPolicyId?: string;
|
|
2202
|
+
/**
|
|
2203
|
+
* A Boolean that indicates whether this is a staging distribution. When this value is true, this is a staging distribution. When this value is false, this is not a staging distribution.
|
|
2204
|
+
*/
|
|
2205
|
+
Staging?: boolean;
|
|
2190
2206
|
}
|
|
2191
2207
|
export interface DistributionConfigWithTags {
|
|
2192
2208
|
/**
|
|
@@ -2332,6 +2348,10 @@ declare namespace CloudFront {
|
|
|
2332
2348
|
* Amazon Web Services services in China customers must file for an Internet Content Provider (ICP) recordal if they want to serve content publicly on an alternate domain name, also known as a CNAME, that they've added to CloudFront. AliasICPRecordal provides the ICP recordal status for CNAMEs associated with distributions. For more information about ICP recordals, see Signup, Accounts, and Credentials in Getting Started with Amazon Web Services services in China.
|
|
2333
2349
|
*/
|
|
2334
2350
|
AliasICPRecordals?: AliasICPRecordals;
|
|
2351
|
+
/**
|
|
2352
|
+
* Whether the primary distribution has a staging distribution enabled.
|
|
2353
|
+
*/
|
|
2354
|
+
Staging: boolean;
|
|
2335
2355
|
}
|
|
2336
2356
|
export type DistributionSummaryList = DistributionSummary[];
|
|
2337
2357
|
export interface EncryptionEntities {
|
|
@@ -5017,6 +5037,27 @@ declare namespace CloudFront {
|
|
|
5017
5037
|
*/
|
|
5018
5038
|
ETag?: string;
|
|
5019
5039
|
}
|
|
5040
|
+
export interface UpdateDistributionWithStagingConfigRequest {
|
|
5041
|
+
/**
|
|
5042
|
+
* The identifier of the primary distribution to which you are copying a staging distribution's configuration.
|
|
5043
|
+
*/
|
|
5044
|
+
Id: string;
|
|
5045
|
+
/**
|
|
5046
|
+
* The identifier of the staging distribution whose configuration you are copying to the primary distribution.
|
|
5047
|
+
*/
|
|
5048
|
+
StagingDistributionId?: string;
|
|
5049
|
+
/**
|
|
5050
|
+
* The current versions (ETag values) of both primary and staging distributions. Provide these in the following format: <primary ETag>, <staging ETag>
|
|
5051
|
+
*/
|
|
5052
|
+
IfMatch?: string;
|
|
5053
|
+
}
|
|
5054
|
+
export interface UpdateDistributionWithStagingConfigResult {
|
|
5055
|
+
Distribution?: Distribution;
|
|
5056
|
+
/**
|
|
5057
|
+
* The current version of the primary distribution (after it’s updated).
|
|
5058
|
+
*/
|
|
5059
|
+
ETag?: string;
|
|
5060
|
+
}
|
|
5020
5061
|
export interface UpdateFieldLevelEncryptionConfigRequest {
|
|
5021
5062
|
/**
|
|
5022
5063
|
* Request to update a field-level encryption configuration.
|
|
@@ -2552,6 +2552,10 @@ declare namespace CostExplorer {
|
|
|
2552
2552
|
* The UsageType value that's associated with the cost anomaly.
|
|
2553
2553
|
*/
|
|
2554
2554
|
UsageType?: GenericString;
|
|
2555
|
+
/**
|
|
2556
|
+
* The member account name value that's associated with the cost anomaly.
|
|
2557
|
+
*/
|
|
2558
|
+
LinkedAccountName?: GenericString;
|
|
2555
2559
|
}
|
|
2556
2560
|
export type RootCauses = RootCause[];
|
|
2557
2561
|
export type SavingsPlanArn = string;
|
|
@@ -108,6 +108,14 @@ declare class EKS extends Service {
|
|
|
108
108
|
* Describes an Amazon EKS add-on.
|
|
109
109
|
*/
|
|
110
110
|
describeAddon(callback?: (err: AWSError, data: EKS.Types.DescribeAddonResponse) => void): Request<EKS.Types.DescribeAddonResponse, AWSError>;
|
|
111
|
+
/**
|
|
112
|
+
* Returns configuration options.
|
|
113
|
+
*/
|
|
114
|
+
describeAddonConfiguration(params: EKS.Types.DescribeAddonConfigurationRequest, callback?: (err: AWSError, data: EKS.Types.DescribeAddonConfigurationResponse) => void): Request<EKS.Types.DescribeAddonConfigurationResponse, AWSError>;
|
|
115
|
+
/**
|
|
116
|
+
* Returns configuration options.
|
|
117
|
+
*/
|
|
118
|
+
describeAddonConfiguration(callback?: (err: AWSError, data: EKS.Types.DescribeAddonConfigurationResponse) => void): Request<EKS.Types.DescribeAddonConfigurationResponse, AWSError>;
|
|
111
119
|
/**
|
|
112
120
|
* Describes the versions for an add-on. Information such as the Kubernetes versions that you can use the add-on with, the owner, publisher, and the type of the add-on are returned.
|
|
113
121
|
*/
|
|
@@ -404,6 +412,10 @@ declare namespace EKS {
|
|
|
404
412
|
* Information about an Amazon EKS add-on from the Amazon Web Services Marketplace.
|
|
405
413
|
*/
|
|
406
414
|
marketplaceInformation?: MarketplaceInformation;
|
|
415
|
+
/**
|
|
416
|
+
* The provided configuration values.
|
|
417
|
+
*/
|
|
418
|
+
configurationValues?: String;
|
|
407
419
|
}
|
|
408
420
|
export interface AddonHealth {
|
|
409
421
|
/**
|
|
@@ -729,6 +741,10 @@ declare namespace EKS {
|
|
|
729
741
|
* The metadata to apply to the cluster to assist with categorization and organization. Each tag consists of a key and an optional value. You define both.
|
|
730
742
|
*/
|
|
731
743
|
tags?: TagMap;
|
|
744
|
+
/**
|
|
745
|
+
* The set of configuration values for the add-on being created. Whatever values provided here are validated against the schema from DescribeAddonConfiguration .
|
|
746
|
+
*/
|
|
747
|
+
configurationValues?: String;
|
|
732
748
|
}
|
|
733
749
|
export interface CreateAddonResponse {
|
|
734
750
|
addon?: Addon;
|
|
@@ -967,6 +983,30 @@ declare namespace EKS {
|
|
|
967
983
|
export interface DeregisterClusterResponse {
|
|
968
984
|
cluster?: Cluster;
|
|
969
985
|
}
|
|
986
|
+
export interface DescribeAddonConfigurationRequest {
|
|
987
|
+
/**
|
|
988
|
+
* The name of the add-on. The name must match one of the names returned by DescribeAddonVersions .
|
|
989
|
+
*/
|
|
990
|
+
addonName: String;
|
|
991
|
+
/**
|
|
992
|
+
* The version of the add-on. The version must match one of the versions returned by DescribeAddonVersions .
|
|
993
|
+
*/
|
|
994
|
+
addonVersion: String;
|
|
995
|
+
}
|
|
996
|
+
export interface DescribeAddonConfigurationResponse {
|
|
997
|
+
/**
|
|
998
|
+
* The name of the add-on.
|
|
999
|
+
*/
|
|
1000
|
+
addonName?: String;
|
|
1001
|
+
/**
|
|
1002
|
+
* The version of the add-on. The version must match one of the versions returned by DescribeAddonVersions .
|
|
1003
|
+
*/
|
|
1004
|
+
addonVersion?: String;
|
|
1005
|
+
/**
|
|
1006
|
+
* A JSON schema used to validate provided configuration values when creating or updating an addon.
|
|
1007
|
+
*/
|
|
1008
|
+
configurationSchema?: String;
|
|
1009
|
+
}
|
|
970
1010
|
export interface DescribeAddonRequest {
|
|
971
1011
|
/**
|
|
972
1012
|
* The name of the cluster.
|
|
@@ -1762,11 +1802,11 @@ declare namespace EKS {
|
|
|
1762
1802
|
}
|
|
1763
1803
|
export interface RemoteAccessConfig {
|
|
1764
1804
|
/**
|
|
1765
|
-
* The Amazon EC2 SSH key that provides access for SSH communication with the nodes in the managed node group. For more information, see Amazon EC2 key pairs and Linux instances in the Amazon Elastic Compute Cloud User Guide for Linux Instances.
|
|
1805
|
+
* The Amazon EC2 SSH key name that provides access for SSH communication with the nodes in the managed node group. For more information, see Amazon EC2 key pairs and Linux instances in the Amazon Elastic Compute Cloud User Guide for Linux Instances.
|
|
1766
1806
|
*/
|
|
1767
1807
|
ec2SshKey?: String;
|
|
1768
1808
|
/**
|
|
1769
|
-
* The security
|
|
1809
|
+
* The security group ids that are allowed SSH access (port 22) to the nodes. If you specify an Amazon EC2 SSH key but do not specify a source security group when you create a managed node group, then port 22 on the nodes is opened to the internet (0.0.0.0/0). For more information, see Security Groups for Your VPC in the Amazon Virtual Private Cloud User Guide.
|
|
1770
1810
|
*/
|
|
1771
1811
|
sourceSecurityGroups?: StringList;
|
|
1772
1812
|
}
|
|
@@ -1869,6 +1909,10 @@ declare namespace EKS {
|
|
|
1869
1909
|
* Unique, case-sensitive identifier that you provide to ensure the idempotency of the request.
|
|
1870
1910
|
*/
|
|
1871
1911
|
clientRequestToken?: String;
|
|
1912
|
+
/**
|
|
1913
|
+
* The set of configuration values for the add-on being created. Whatever values provided here are validated against the schema from DescribeAddonConfiguration
|
|
1914
|
+
*/
|
|
1915
|
+
configurationValues?: String;
|
|
1872
1916
|
}
|
|
1873
1917
|
export interface UpdateAddonResponse {
|
|
1874
1918
|
update?: Update;
|
|
@@ -100,11 +100,11 @@ declare class KMS extends Service {
|
|
|
100
100
|
*/
|
|
101
101
|
describeCustomKeyStores(callback?: (err: AWSError, data: KMS.Types.DescribeCustomKeyStoresResponse) => void): Request<KMS.Types.DescribeCustomKeyStoresResponse, AWSError>;
|
|
102
102
|
/**
|
|
103
|
-
* Provides detailed information about a KMS key. You can run DescribeKey on a customer managed key or an Amazon Web Services managed key. This detailed information includes the key ARN, creation date (and deletion date, if applicable), the key state, and the origin and expiration date (if any) of the key material. It includes fields, like KeySpec, that help you distinguish different types of KMS keys. It also displays the key usage (encryption, signing, or generating and verifying MACs) and the algorithms that the KMS key supports.
|
|
103
|
+
* Provides detailed information about a KMS key. You can run DescribeKey on a customer managed key or an Amazon Web Services managed key. This detailed information includes the key ARN, creation date (and deletion date, if applicable), the key state, and the origin and expiration date (if any) of the key material. It includes fields, like KeySpec, that help you distinguish different types of KMS keys. It also displays the key usage (encryption, signing, or generating and verifying MACs) and the algorithms that the KMS key supports. For multi-Region keys, DescribeKey displays the primary key and all related replica keys. For KMS keys in CloudHSM key stores, it includes information about the key store, such as the key store ID and the CloudHSM cluster ID. For KMS keys in external key stores, it includes the custom key store ID and the ID of the external key. DescribeKey does not return the following information: Aliases associated with the KMS key. To get this information, use ListAliases. Whether automatic key rotation is enabled on the KMS key. To get this information, use GetKeyRotationStatus. Also, some key states prevent a KMS key from being automatically rotated. For details, see How Automatic Key Rotation Works in the Key Management Service Developer Guide. Tags on the KMS key. To get this information, use ListResourceTags. Key policies and grants on the KMS key. To get this information, use GetKeyPolicy and ListGrants. In general, DescribeKey is a non-mutating operation. It returns data about KMS keys, but doesn't change them. However, Amazon Web Services services use DescribeKey to create Amazon Web Services managed keys from a predefined Amazon Web Services alias with no key ID. Cross-account use: Yes. To perform this operation with a KMS key in a different Amazon Web Services account, specify the key ARN or alias ARN in the value of the KeyId parameter. Required permissions: kms:DescribeKey (key policy) Related operations: GetKeyPolicy GetKeyRotationStatus ListAliases ListGrants ListKeys ListResourceTags ListRetirableGrants
|
|
104
104
|
*/
|
|
105
105
|
describeKey(params: KMS.Types.DescribeKeyRequest, callback?: (err: AWSError, data: KMS.Types.DescribeKeyResponse) => void): Request<KMS.Types.DescribeKeyResponse, AWSError>;
|
|
106
106
|
/**
|
|
107
|
-
* Provides detailed information about a KMS key. You can run DescribeKey on a customer managed key or an Amazon Web Services managed key. This detailed information includes the key ARN, creation date (and deletion date, if applicable), the key state, and the origin and expiration date (if any) of the key material. It includes fields, like KeySpec, that help you distinguish different types of KMS keys. It also displays the key usage (encryption, signing, or generating and verifying MACs) and the algorithms that the KMS key supports.
|
|
107
|
+
* Provides detailed information about a KMS key. You can run DescribeKey on a customer managed key or an Amazon Web Services managed key. This detailed information includes the key ARN, creation date (and deletion date, if applicable), the key state, and the origin and expiration date (if any) of the key material. It includes fields, like KeySpec, that help you distinguish different types of KMS keys. It also displays the key usage (encryption, signing, or generating and verifying MACs) and the algorithms that the KMS key supports. For multi-Region keys, DescribeKey displays the primary key and all related replica keys. For KMS keys in CloudHSM key stores, it includes information about the key store, such as the key store ID and the CloudHSM cluster ID. For KMS keys in external key stores, it includes the custom key store ID and the ID of the external key. DescribeKey does not return the following information: Aliases associated with the KMS key. To get this information, use ListAliases. Whether automatic key rotation is enabled on the KMS key. To get this information, use GetKeyRotationStatus. Also, some key states prevent a KMS key from being automatically rotated. For details, see How Automatic Key Rotation Works in the Key Management Service Developer Guide. Tags on the KMS key. To get this information, use ListResourceTags. Key policies and grants on the KMS key. To get this information, use GetKeyPolicy and ListGrants. In general, DescribeKey is a non-mutating operation. It returns data about KMS keys, but doesn't change them. However, Amazon Web Services services use DescribeKey to create Amazon Web Services managed keys from a predefined Amazon Web Services alias with no key ID. Cross-account use: Yes. To perform this operation with a KMS key in a different Amazon Web Services account, specify the key ARN or alias ARN in the value of the KeyId parameter. Required permissions: kms:DescribeKey (key policy) Related operations: GetKeyPolicy GetKeyRotationStatus ListAliases ListGrants ListKeys ListResourceTags ListRetirableGrants
|
|
108
108
|
*/
|
|
109
109
|
describeKey(callback?: (err: AWSError, data: KMS.Types.DescribeKeyResponse) => void): Request<KMS.Types.DescribeKeyResponse, AWSError>;
|
|
110
110
|
/**
|
|
@@ -485,7 +485,7 @@ declare namespace KMS {
|
|
|
485
485
|
*/
|
|
486
486
|
CloudHsmClusterId?: CloudHsmClusterIdType;
|
|
487
487
|
/**
|
|
488
|
-
*
|
|
488
|
+
* Specifies the certificate for an CloudHSM key store. This parameter is required for custom key stores with a CustomKeyStoreType of AWS_CLOUDHSM. Enter the content of the trust anchor certificate for the CloudHSM cluster. This is the content of the customerCA.crt file that you created when you initialized the cluster.
|
|
489
489
|
*/
|
|
490
490
|
TrustAnchorCertificate?: TrustAnchorCertificateType;
|
|
491
491
|
/**
|