cdk-lambda-subminute 2.0.226 → 2.0.228

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (190) hide show
  1. package/.jsii +15 -15
  2. package/README.md +12 -0
  3. package/lib/cdk-lambda-subminute.js +3 -3
  4. package/node_modules/aws-sdk/CHANGELOG.md +174 -1
  5. package/node_modules/aws-sdk/README.md +1 -1
  6. package/node_modules/aws-sdk/apis/amplifybackend-2020-08-11.min.json +4 -0
  7. package/node_modules/aws-sdk/apis/amplifyuibuilder-2021-08-11.min.json +40 -9
  8. package/node_modules/aws-sdk/apis/apigateway-2015-07-09.min.json +2 -1
  9. package/node_modules/aws-sdk/apis/appflow-2020-08-23.min.json +115 -87
  10. package/node_modules/aws-sdk/apis/application-insights-2018-11-25.min.json +228 -43
  11. package/node_modules/aws-sdk/apis/application-insights-2018-11-25.paginators.json +5 -0
  12. package/node_modules/aws-sdk/apis/auditmanager-2017-07-25.min.json +238 -63
  13. package/node_modules/aws-sdk/apis/autoscaling-2011-01-01.examples.json +74 -11
  14. package/node_modules/aws-sdk/apis/autoscaling-2011-01-01.min.json +61 -52
  15. package/node_modules/aws-sdk/apis/backup-2018-11-15.min.json +217 -104
  16. package/node_modules/aws-sdk/apis/backup-2018-11-15.paginators.json +6 -0
  17. package/node_modules/aws-sdk/apis/ce-2017-10-25.min.json +3 -1
  18. package/node_modules/aws-sdk/apis/chime-sdk-media-pipelines-2021-07-15.min.json +261 -21
  19. package/node_modules/aws-sdk/apis/chime-sdk-voice-2022-08-03.min.json +198 -182
  20. package/node_modules/aws-sdk/apis/cleanrooms-2022-02-17.min.json +657 -102
  21. package/node_modules/aws-sdk/apis/cleanrooms-2022-02-17.paginators.json +12 -0
  22. package/node_modules/aws-sdk/apis/cloudformation-2010-05-15.min.json +95 -80
  23. package/node_modules/aws-sdk/apis/cloudfront-2020-05-31.min.json +4 -1
  24. package/node_modules/aws-sdk/apis/cloudhsm-2014-05-30.min.json +60 -20
  25. package/node_modules/aws-sdk/apis/codecommit-2015-04-13.min.json +44 -0
  26. package/node_modules/aws-sdk/apis/codecommit-2015-04-13.paginators.json +5 -0
  27. package/node_modules/aws-sdk/apis/cognito-idp-2016-04-18.examples.json +849 -0
  28. package/node_modules/aws-sdk/apis/cognito-idp-2016-04-18.min.json +110 -24
  29. package/node_modules/aws-sdk/apis/compute-optimizer-2019-11-01.min.json +200 -57
  30. package/node_modules/aws-sdk/apis/connect-2017-08-08.min.json +903 -316
  31. package/node_modules/aws-sdk/apis/connect-2017-08-08.paginators.json +18 -0
  32. package/node_modules/aws-sdk/apis/connectcampaigns-2021-01-30.min.json +103 -90
  33. package/node_modules/aws-sdk/apis/connectparticipant-2018-09-07.min.json +62 -0
  34. package/node_modules/aws-sdk/apis/customer-profiles-2020-08-15.min.json +269 -118
  35. package/node_modules/aws-sdk/apis/datasync-2018-11-09.min.json +103 -14
  36. package/node_modules/aws-sdk/apis/detective-2018-10-26.min.json +14 -3
  37. package/node_modules/aws-sdk/apis/dms-2016-01-01.min.json +1123 -217
  38. package/node_modules/aws-sdk/apis/dms-2016-01-01.paginators.json +50 -0
  39. package/node_modules/aws-sdk/apis/ec2-2016-11-15.min.json +1254 -1191
  40. package/node_modules/aws-sdk/apis/elasticache-2015-02-02.min.json +37 -10
  41. package/node_modules/aws-sdk/apis/elasticloadbalancingv2-2015-12-01.min.json +49 -46
  42. package/node_modules/aws-sdk/apis/finspace-2021-03-12.min.json +74 -13
  43. package/node_modules/aws-sdk/apis/fsx-2018-03-01.min.json +190 -143
  44. package/node_modules/aws-sdk/apis/glue-2017-03-31.min.json +235 -216
  45. package/node_modules/aws-sdk/apis/grafana-2020-08-18.min.json +2 -1
  46. package/node_modules/aws-sdk/apis/health-2016-08-04.min.json +116 -34
  47. package/node_modules/aws-sdk/apis/inspector2-2020-06-08.min.json +291 -192
  48. package/node_modules/aws-sdk/apis/internetmonitor-2021-06-03.min.json +37 -19
  49. package/node_modules/aws-sdk/apis/kafka-2018-11-14.min.json +237 -52
  50. package/node_modules/aws-sdk/apis/kafka-2018-11-14.paginators.json +6 -0
  51. package/node_modules/aws-sdk/apis/kafkaconnect-2021-09-14.min.json +38 -36
  52. package/node_modules/aws-sdk/apis/kinesis-video-archived-media-2017-09-30.min.json +0 -1
  53. package/node_modules/aws-sdk/apis/lookoutequipment-2020-12-15.min.json +337 -23
  54. package/node_modules/aws-sdk/apis/lookoutequipment-2020-12-15.paginators.json +5 -0
  55. package/node_modules/aws-sdk/apis/mediaconvert-2017-08-29.min.json +134 -96
  56. package/node_modules/aws-sdk/apis/medialive-2017-10-14.min.json +249 -225
  57. package/node_modules/aws-sdk/apis/mediapackage-2017-10-12.min.json +93 -87
  58. package/node_modules/aws-sdk/apis/metadata.json +7 -0
  59. package/node_modules/aws-sdk/apis/neptunedata-2023-08-01.examples.json +5 -0
  60. package/node_modules/aws-sdk/apis/neptunedata-2023-08-01.min.json +1923 -0
  61. package/node_modules/aws-sdk/apis/neptunedata-2023-08-01.paginators.json +4 -0
  62. package/node_modules/aws-sdk/apis/omics-2022-11-28.min.json +756 -204
  63. package/node_modules/aws-sdk/apis/omics-2022-11-28.paginators.json +12 -0
  64. package/node_modules/aws-sdk/apis/omics-2022-11-28.waiters2.json +48 -0
  65. package/node_modules/aws-sdk/apis/payment-cryptography-data-2022-02-03.min.json +29 -16
  66. package/node_modules/aws-sdk/apis/pca-connector-ad-2018-05-10.examples.json +5 -0
  67. package/node_modules/aws-sdk/apis/pca-connector-ad-2018-05-10.min.json +1465 -0
  68. package/node_modules/aws-sdk/apis/pca-connector-ad-2018-05-10.paginators.json +34 -0
  69. package/node_modules/aws-sdk/apis/pi-2018-02-27.min.json +304 -11
  70. package/node_modules/aws-sdk/apis/pi-2018-02-27.paginators.json +5 -0
  71. package/node_modules/aws-sdk/apis/pinpoint-2016-12-01.examples.json +6 -12
  72. package/node_modules/aws-sdk/apis/pinpoint-2016-12-01.min.json +286 -243
  73. package/node_modules/aws-sdk/apis/quicksight-2018-04-01.min.json +1194 -1134
  74. package/node_modules/aws-sdk/apis/quicksight-2018-04-01.paginators.json +30 -0
  75. package/node_modules/aws-sdk/apis/rds-2014-10-31.min.json +334 -180
  76. package/node_modules/aws-sdk/apis/rds-2014-10-31.paginators.json +6 -0
  77. package/node_modules/aws-sdk/apis/rekognition-2016-06-27.examples.json +501 -1
  78. package/node_modules/aws-sdk/apis/resiliencehub-2020-04-30.min.json +354 -125
  79. package/node_modules/aws-sdk/apis/resiliencehub-2020-04-30.paginators.json +5 -0
  80. package/node_modules/aws-sdk/apis/route53domains-2014-05-15.min.json +103 -44
  81. package/node_modules/aws-sdk/apis/runtime.sagemaker-2017-05-13.min.json +104 -0
  82. package/node_modules/aws-sdk/apis/s3-2006-03-01.examples.json +131 -131
  83. package/node_modules/aws-sdk/apis/sagemaker-2017-07-24.min.json +868 -726
  84. package/node_modules/aws-sdk/apis/scheduler-2021-06-30.min.json +15 -12
  85. package/node_modules/aws-sdk/apis/securityhub-2018-10-26.min.json +100 -61
  86. package/node_modules/aws-sdk/apis/service-quotas-2019-06-24.min.json +45 -23
  87. package/node_modules/aws-sdk/apis/sesv2-2019-09-27.examples.json +244 -0
  88. package/node_modules/aws-sdk/apis/sesv2-2019-09-27.min.json +491 -153
  89. package/node_modules/aws-sdk/apis/sesv2-2019-09-27.paginators.json +5 -0
  90. package/node_modules/aws-sdk/apis/swf-2012-01-25.min.json +12 -3
  91. package/node_modules/aws-sdk/apis/verifiedpermissions-2021-12-01.min.json +127 -33
  92. package/node_modules/aws-sdk/apis/workspaces-web-2020-07-08.min.json +136 -58
  93. package/node_modules/aws-sdk/clients/acmpca.d.ts +1 -1
  94. package/node_modules/aws-sdk/clients/all.d.ts +2 -0
  95. package/node_modules/aws-sdk/clients/all.js +3 -1
  96. package/node_modules/aws-sdk/clients/amplifyuibuilder.d.ts +48 -4
  97. package/node_modules/aws-sdk/clients/apigateway.d.ts +34 -30
  98. package/node_modules/aws-sdk/clients/appflow.d.ts +30 -0
  99. package/node_modules/aws-sdk/clients/applicationinsights.d.ts +342 -2
  100. package/node_modules/aws-sdk/clients/apprunner.d.ts +5 -5
  101. package/node_modules/aws-sdk/clients/autoscaling.d.ts +13 -2
  102. package/node_modules/aws-sdk/clients/backup.d.ts +131 -8
  103. package/node_modules/aws-sdk/clients/batch.d.ts +9 -9
  104. package/node_modules/aws-sdk/clients/budgets.d.ts +1 -1
  105. package/node_modules/aws-sdk/clients/chimesdkmediapipelines.d.ts +228 -2
  106. package/node_modules/aws-sdk/clients/chimesdkvoice.d.ts +17 -0
  107. package/node_modules/aws-sdk/clients/cleanrooms.d.ts +557 -14
  108. package/node_modules/aws-sdk/clients/cloud9.d.ts +1 -1
  109. package/node_modules/aws-sdk/clients/cloudformation.d.ts +21 -0
  110. package/node_modules/aws-sdk/clients/cloudfront.d.ts +14 -10
  111. package/node_modules/aws-sdk/clients/cloudtrail.d.ts +4 -4
  112. package/node_modules/aws-sdk/clients/cloudwatch.d.ts +7 -7
  113. package/node_modules/aws-sdk/clients/cloudwatchevents.d.ts +2 -2
  114. package/node_modules/aws-sdk/clients/codecommit.d.ts +87 -30
  115. package/node_modules/aws-sdk/clients/codestarconnections.d.ts +10 -10
  116. package/node_modules/aws-sdk/clients/cognitoidentityserviceprovider.d.ts +292 -215
  117. package/node_modules/aws-sdk/clients/computeoptimizer.d.ts +214 -2
  118. package/node_modules/aws-sdk/clients/configservice.d.ts +1 -1
  119. package/node_modules/aws-sdk/clients/connect.d.ts +609 -17
  120. package/node_modules/aws-sdk/clients/connectcampaigns.d.ts +30 -23
  121. package/node_modules/aws-sdk/clients/connectparticipant.d.ts +71 -2
  122. package/node_modules/aws-sdk/clients/costexplorer.d.ts +10 -2
  123. package/node_modules/aws-sdk/clients/customerprofiles.d.ts +56 -52
  124. package/node_modules/aws-sdk/clients/datasync.d.ts +170 -39
  125. package/node_modules/aws-sdk/clients/dms.d.ts +1289 -13
  126. package/node_modules/aws-sdk/clients/drs.d.ts +1 -1
  127. package/node_modules/aws-sdk/clients/ec2.d.ts +87 -20
  128. package/node_modules/aws-sdk/clients/ecs.d.ts +32 -32
  129. package/node_modules/aws-sdk/clients/elasticache.d.ts +22 -1
  130. package/node_modules/aws-sdk/clients/elbv2.d.ts +23 -9
  131. package/node_modules/aws-sdk/clients/finspace.d.ts +73 -5
  132. package/node_modules/aws-sdk/clients/fsx.d.ts +108 -33
  133. package/node_modules/aws-sdk/clients/gamelift.d.ts +91 -91
  134. package/node_modules/aws-sdk/clients/globalaccelerator.d.ts +12 -12
  135. package/node_modules/aws-sdk/clients/glue.d.ts +40 -2
  136. package/node_modules/aws-sdk/clients/guardduty.d.ts +4 -4
  137. package/node_modules/aws-sdk/clients/health.d.ts +86 -2
  138. package/node_modules/aws-sdk/clients/identitystore.d.ts +26 -26
  139. package/node_modules/aws-sdk/clients/inspector2.d.ts +101 -2
  140. package/node_modules/aws-sdk/clients/internetmonitor.d.ts +49 -26
  141. package/node_modules/aws-sdk/clients/ivs.d.ts +4 -4
  142. package/node_modules/aws-sdk/clients/ivsrealtime.d.ts +2 -2
  143. package/node_modules/aws-sdk/clients/kafka.d.ts +204 -0
  144. package/node_modules/aws-sdk/clients/kafkaconnect.d.ts +6 -8
  145. package/node_modules/aws-sdk/clients/kinesisvideo.d.ts +2 -2
  146. package/node_modules/aws-sdk/clients/kinesisvideoarchivedmedia.d.ts +16 -16
  147. package/node_modules/aws-sdk/clients/lookoutequipment.d.ts +522 -15
  148. package/node_modules/aws-sdk/clients/mediaconvert.d.ts +52 -6
  149. package/node_modules/aws-sdk/clients/medialive.d.ts +35 -0
  150. package/node_modules/aws-sdk/clients/mediapackage.d.ts +3 -2
  151. package/node_modules/aws-sdk/clients/mediatailor.d.ts +2 -2
  152. package/node_modules/aws-sdk/clients/neptunedata.d.ts +1976 -0
  153. package/node_modules/aws-sdk/clients/neptunedata.js +18 -0
  154. package/node_modules/aws-sdk/clients/networkfirewall.d.ts +9 -9
  155. package/node_modules/aws-sdk/clients/omics.d.ts +619 -21
  156. package/node_modules/aws-sdk/clients/organizations.d.ts +55 -55
  157. package/node_modules/aws-sdk/clients/paymentcryptographydata.d.ts +8 -6
  158. package/node_modules/aws-sdk/clients/pcaconnectorad.d.ts +1606 -0
  159. package/node_modules/aws-sdk/clients/pcaconnectorad.js +18 -0
  160. package/node_modules/aws-sdk/clients/pi.d.ts +382 -5
  161. package/node_modules/aws-sdk/clients/pinpoint.d.ts +69 -5
  162. package/node_modules/aws-sdk/clients/polly.d.ts +2 -2
  163. package/node_modules/aws-sdk/clients/quicksight.d.ts +148 -33
  164. package/node_modules/aws-sdk/clients/rds.d.ts +255 -23
  165. package/node_modules/aws-sdk/clients/rekognition.d.ts +19 -19
  166. package/node_modules/aws-sdk/clients/resiliencehub.d.ts +588 -274
  167. package/node_modules/aws-sdk/clients/route53.d.ts +9 -9
  168. package/node_modules/aws-sdk/clients/route53domains.d.ts +9 -3
  169. package/node_modules/aws-sdk/clients/sagemaker.d.ts +227 -22
  170. package/node_modules/aws-sdk/clients/sagemakerruntime.d.ts +86 -8
  171. package/node_modules/aws-sdk/clients/scheduler.d.ts +16 -3
  172. package/node_modules/aws-sdk/clients/securityhub.d.ts +68 -4
  173. package/node_modules/aws-sdk/clients/servicecatalog.d.ts +16 -16
  174. package/node_modules/aws-sdk/clients/servicequotas.d.ts +138 -80
  175. package/node_modules/aws-sdk/clients/ses.d.ts +158 -158
  176. package/node_modules/aws-sdk/clients/sesv2.d.ts +374 -3
  177. package/node_modules/aws-sdk/clients/sqs.d.ts +9 -9
  178. package/node_modules/aws-sdk/clients/swf.d.ts +18 -1
  179. package/node_modules/aws-sdk/clients/transfer.d.ts +12 -12
  180. package/node_modules/aws-sdk/clients/verifiedpermissions.d.ts +27 -27
  181. package/node_modules/aws-sdk/clients/workspacesweb.d.ts +69 -16
  182. package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +2 -2
  183. package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +152 -78
  184. package/node_modules/aws-sdk/dist/aws-sdk.js +3098 -1970
  185. package/node_modules/aws-sdk/dist/aws-sdk.min.js +101 -101
  186. package/node_modules/aws-sdk/lib/config_service_placeholders.d.ts +4 -0
  187. package/node_modules/aws-sdk/lib/core.js +1 -1
  188. package/node_modules/aws-sdk/lib/token/sso_token_provider.js +3 -3
  189. package/node_modules/aws-sdk/package.json +1 -1
  190. package/package.json +13 -13
@@ -29,11 +29,11 @@ declare class Transfer extends Service {
29
29
  */
30
30
  createAgreement(callback?: (err: AWSError, data: Transfer.Types.CreateAgreementResponse) => void): Request<Transfer.Types.CreateAgreementResponse, AWSError>;
31
31
  /**
32
- * Creates the connector, which captures the parameters for an outbound connection for the AS2 or SFTP protocol. The connector is required for sending files to an externally hosted AS2 or SFTP server. For more details about AS2 connectors, see Create AS2 connectors. You must specify exactly one configuration object: either for AS2 (As2Config) or SFTP (SftpConfig).
32
+ * Creates the connector, which captures the parameters for a connection for the AS2 or SFTP protocol. For AS2, the connector is required for sending files to an externally hosted AS2 server. For SFTP, the connector is required when sending files to an SFTP server or receiving files from an SFTP server. For more details about connectors, see Create AS2 connectors and Create SFTP connectors. You must specify exactly one configuration object: either for AS2 (As2Config) or SFTP (SftpConfig).
33
33
  */
34
34
  createConnector(params: Transfer.Types.CreateConnectorRequest, callback?: (err: AWSError, data: Transfer.Types.CreateConnectorResponse) => void): Request<Transfer.Types.CreateConnectorResponse, AWSError>;
35
35
  /**
36
- * Creates the connector, which captures the parameters for an outbound connection for the AS2 or SFTP protocol. The connector is required for sending files to an externally hosted AS2 or SFTP server. For more details about AS2 connectors, see Create AS2 connectors. You must specify exactly one configuration object: either for AS2 (As2Config) or SFTP (SftpConfig).
36
+ * Creates the connector, which captures the parameters for a connection for the AS2 or SFTP protocol. For AS2, the connector is required for sending files to an externally hosted AS2 server. For SFTP, the connector is required when sending files to an SFTP server or receiving files from an SFTP server. For more details about connectors, see Create AS2 connectors and Create SFTP connectors. You must specify exactly one configuration object: either for AS2 (As2Config) or SFTP (SftpConfig).
37
37
  */
38
38
  createConnector(callback?: (err: AWSError, data: Transfer.Types.CreateConnectorResponse) => void): Request<Transfer.Types.CreateConnectorResponse, AWSError>;
39
39
  /**
@@ -365,11 +365,11 @@ declare class Transfer extends Service {
365
365
  */
366
366
  sendWorkflowStepState(callback?: (err: AWSError, data: Transfer.Types.SendWorkflowStepStateResponse) => void): Request<Transfer.Types.SendWorkflowStepStateResponse, AWSError>;
367
367
  /**
368
- * Begins a file transfer between local Amazon Web Services storage and a remote AS2 or SFTP server. For an AS2 connector, you specify the ConnectorId and one or more SendFilePaths to identify the files you want to transfer. For an SFTP connector, the file transfer can be either outbound or inbound. In both cases, you specify the ConnectorId. Depending on the direction of the transfer, you also specify the following items: If you are transferring file from a partner's SFTP server to a Transfer Family server, you specify one or more RetreiveFilePaths to identify the files you want to transfer, and a LocalDirectoryPath to specify the destination folder. If you are transferring file to a partner's SFTP server from Amazon Web Services storage, you specify one or more SendFilePaths to identify the files you want to transfer, and a RemoteDirectoryPath to specify the destination folder.
368
+ * Begins a file transfer between local Amazon Web Services storage and a remote AS2 or SFTP server. For an AS2 connector, you specify the ConnectorId and one or more SendFilePaths to identify the files you want to transfer. For an SFTP connector, the file transfer can be either outbound or inbound. In both cases, you specify the ConnectorId. Depending on the direction of the transfer, you also specify the following items: If you are transferring file from a partner's SFTP server to Amazon Web Services storage, you specify one or more RetreiveFilePaths to identify the files you want to transfer, and a LocalDirectoryPath to specify the destination folder. If you are transferring file to a partner's SFTP server from Amazon Web Services storage, you specify one or more SendFilePaths to identify the files you want to transfer, and a RemoteDirectoryPath to specify the destination folder.
369
369
  */
370
370
  startFileTransfer(params: Transfer.Types.StartFileTransferRequest, callback?: (err: AWSError, data: Transfer.Types.StartFileTransferResponse) => void): Request<Transfer.Types.StartFileTransferResponse, AWSError>;
371
371
  /**
372
- * Begins a file transfer between local Amazon Web Services storage and a remote AS2 or SFTP server. For an AS2 connector, you specify the ConnectorId and one or more SendFilePaths to identify the files you want to transfer. For an SFTP connector, the file transfer can be either outbound or inbound. In both cases, you specify the ConnectorId. Depending on the direction of the transfer, you also specify the following items: If you are transferring file from a partner's SFTP server to a Transfer Family server, you specify one or more RetreiveFilePaths to identify the files you want to transfer, and a LocalDirectoryPath to specify the destination folder. If you are transferring file to a partner's SFTP server from Amazon Web Services storage, you specify one or more SendFilePaths to identify the files you want to transfer, and a RemoteDirectoryPath to specify the destination folder.
372
+ * Begins a file transfer between local Amazon Web Services storage and a remote AS2 or SFTP server. For an AS2 connector, you specify the ConnectorId and one or more SendFilePaths to identify the files you want to transfer. For an SFTP connector, the file transfer can be either outbound or inbound. In both cases, you specify the ConnectorId. Depending on the direction of the transfer, you also specify the following items: If you are transferring file from a partner's SFTP server to Amazon Web Services storage, you specify one or more RetreiveFilePaths to identify the files you want to transfer, and a LocalDirectoryPath to specify the destination folder. If you are transferring file to a partner's SFTP server from Amazon Web Services storage, you specify one or more SendFilePaths to identify the files you want to transfer, and a RemoteDirectoryPath to specify the destination folder.
373
373
  */
374
374
  startFileTransfer(callback?: (err: AWSError, data: Transfer.Types.StartFileTransferResponse) => void): Request<Transfer.Types.StartFileTransferResponse, AWSError>;
375
375
  /**
@@ -643,7 +643,7 @@ declare namespace Transfer {
643
643
  */
644
644
  BaseDirectory: HomeDirectory;
645
645
  /**
646
- * With AS2, you can send files by calling StartFileTransfer and specifying the file paths in the request parameter, SendFilePaths. We use the file’s parent directory (for example, for --send-file-paths /bucket/dir/file.txt, parent directory is /bucket/dir/) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the AccessRole needs to provide read and write access to the parent directory of the file location used in the StartFileTransfer request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with StartFileTransfer. If you are using Basic authentication for your AS2 connector, the access role requires the secretsmanager:GetSecretValue permission for the secret. If the secret is encrypted using a customer-managed key instead of the Amazon Web Services managed key in Secrets Manager, then the role also needs the kms:Decrypt permission for that key.
646
+ * Connectors are used to send files using either the AS2 or SFTP protocol. For the access role, provide the Amazon Resource Name (ARN) of the Identity and Access Management role to use. For AS2 connectors With AS2, you can send files by calling StartFileTransfer and specifying the file paths in the request parameter, SendFilePaths. We use the file’s parent directory (for example, for --send-file-paths /bucket/dir/file.txt, parent directory is /bucket/dir/) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the AccessRole needs to provide read and write access to the parent directory of the file location used in the StartFileTransfer request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with StartFileTransfer. If you are using Basic authentication for your AS2 connector, the access role requires the secretsmanager:GetSecretValue permission for the secret. If the secret is encrypted using a customer-managed key instead of the Amazon Web Services managed key in Secrets Manager, then the role also needs the kms:Decrypt permission for that key. For SFTP connectors Make sure that the access role provides read and write access to the parent directory of the file location that's used in the StartFileTransfer request. Additionally, make sure that the role provides secretsmanager:GetSecretValue permission to Secrets Manager.
647
647
  */
648
648
  AccessRole: Role;
649
649
  /**
@@ -671,7 +671,7 @@ declare namespace Transfer {
671
671
  */
672
672
  As2Config?: As2ConnectorConfig;
673
673
  /**
674
- * With AS2, you can send files by calling StartFileTransfer and specifying the file paths in the request parameter, SendFilePaths. We use the file’s parent directory (for example, for --send-file-paths /bucket/dir/file.txt, parent directory is /bucket/dir/) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the AccessRole needs to provide read and write access to the parent directory of the file location used in the StartFileTransfer request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with StartFileTransfer. If you are using Basic authentication for your AS2 connector, the access role requires the secretsmanager:GetSecretValue permission for the secret. If the secret is encrypted using a customer-managed key instead of the Amazon Web Services managed key in Secrets Manager, then the role also needs the kms:Decrypt permission for that key.
674
+ * Connectors are used to send files using either the AS2 or SFTP protocol. For the access role, provide the Amazon Resource Name (ARN) of the Identity and Access Management role to use. For AS2 connectors With AS2, you can send files by calling StartFileTransfer and specifying the file paths in the request parameter, SendFilePaths. We use the file’s parent directory (for example, for --send-file-paths /bucket/dir/file.txt, parent directory is /bucket/dir/) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the AccessRole needs to provide read and write access to the parent directory of the file location used in the StartFileTransfer request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with StartFileTransfer. If you are using Basic authentication for your AS2 connector, the access role requires the secretsmanager:GetSecretValue permission for the secret. If the secret is encrypted using a customer-managed key instead of the Amazon Web Services managed key in Secrets Manager, then the role also needs the kms:Decrypt permission for that key. For SFTP connectors Make sure that the access role provides read and write access to the parent directory of the file location that's used in the StartFileTransfer request. Additionally, make sure that the role provides secretsmanager:GetSecretValue permission to Secrets Manager.
675
675
  */
676
676
  AccessRole: Role;
677
677
  /**
@@ -1228,7 +1228,7 @@ declare namespace Transfer {
1228
1228
  */
1229
1229
  BaseDirectory?: HomeDirectory;
1230
1230
  /**
1231
- * With AS2, you can send files by calling StartFileTransfer and specifying the file paths in the request parameter, SendFilePaths. We use the file’s parent directory (for example, for --send-file-paths /bucket/dir/file.txt, parent directory is /bucket/dir/) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the AccessRole needs to provide read and write access to the parent directory of the file location used in the StartFileTransfer request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with StartFileTransfer. If you are using Basic authentication for your AS2 connector, the access role requires the secretsmanager:GetSecretValue permission for the secret. If the secret is encrypted using a customer-managed key instead of the Amazon Web Services managed key in Secrets Manager, then the role also needs the kms:Decrypt permission for that key.
1231
+ * Connectors are used to send files using either the AS2 or SFTP protocol. For the access role, provide the Amazon Resource Name (ARN) of the Identity and Access Management role to use. For AS2 connectors With AS2, you can send files by calling StartFileTransfer and specifying the file paths in the request parameter, SendFilePaths. We use the file’s parent directory (for example, for --send-file-paths /bucket/dir/file.txt, parent directory is /bucket/dir/) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the AccessRole needs to provide read and write access to the parent directory of the file location used in the StartFileTransfer request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with StartFileTransfer. If you are using Basic authentication for your AS2 connector, the access role requires the secretsmanager:GetSecretValue permission for the secret. If the secret is encrypted using a customer-managed key instead of the Amazon Web Services managed key in Secrets Manager, then the role also needs the kms:Decrypt permission for that key. For SFTP connectors Make sure that the access role provides read and write access to the parent directory of the file location that's used in the StartFileTransfer request. Additionally, make sure that the role provides secretsmanager:GetSecretValue permission to Secrets Manager.
1232
1232
  */
1233
1233
  AccessRole?: Role;
1234
1234
  /**
@@ -1312,7 +1312,7 @@ declare namespace Transfer {
1312
1312
  */
1313
1313
  As2Config?: As2ConnectorConfig;
1314
1314
  /**
1315
- * With AS2, you can send files by calling StartFileTransfer and specifying the file paths in the request parameter, SendFilePaths. We use the file’s parent directory (for example, for --send-file-paths /bucket/dir/file.txt, parent directory is /bucket/dir/) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the AccessRole needs to provide read and write access to the parent directory of the file location used in the StartFileTransfer request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with StartFileTransfer. If you are using Basic authentication for your AS2 connector, the access role requires the secretsmanager:GetSecretValue permission for the secret. If the secret is encrypted using a customer-managed key instead of the Amazon Web Services managed key in Secrets Manager, then the role also needs the kms:Decrypt permission for that key.
1315
+ * Connectors are used to send files using either the AS2 or SFTP protocol. For the access role, provide the Amazon Resource Name (ARN) of the Identity and Access Management role to use. For AS2 connectors With AS2, you can send files by calling StartFileTransfer and specifying the file paths in the request parameter, SendFilePaths. We use the file’s parent directory (for example, for --send-file-paths /bucket/dir/file.txt, parent directory is /bucket/dir/) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the AccessRole needs to provide read and write access to the parent directory of the file location used in the StartFileTransfer request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with StartFileTransfer. If you are using Basic authentication for your AS2 connector, the access role requires the secretsmanager:GetSecretValue permission for the secret. If the secret is encrypted using a customer-managed key instead of the Amazon Web Services managed key in Secrets Manager, then the role also needs the kms:Decrypt permission for that key. For SFTP connectors Make sure that the access role provides read and write access to the parent directory of the file location that's used in the StartFileTransfer request. Additionally, make sure that the role provides secretsmanager:GetSecretValue permission to Secrets Manager.
1316
1316
  */
1317
1317
  AccessRole?: Role;
1318
1318
  /**
@@ -2514,7 +2514,7 @@ declare namespace Transfer {
2514
2514
  export type SftpAuthenticationMethods = "PASSWORD"|"PUBLIC_KEY"|"PUBLIC_KEY_OR_PASSWORD"|"PUBLIC_KEY_AND_PASSWORD"|string;
2515
2515
  export interface SftpConnectorConfig {
2516
2516
  /**
2517
- * The identifiers for the secrets (in Amazon Web Services Secrets Manager) that contain the SFTP user's private keys or passwords.
2517
+ * The identifier for the secret (in Amazon Web Services Secrets Manager) that contains the SFTP user's private key, password, or both. The identifier can be either the Amazon Resource Name (ARN) or the name of the secret.
2518
2518
  */
2519
2519
  UserSecretId?: SecretId;
2520
2520
  /**
@@ -2551,7 +2551,7 @@ declare namespace Transfer {
2551
2551
  */
2552
2552
  ConnectorId: ConnectorId;
2553
2553
  /**
2554
- * One or more source paths for the Transfer Family server. Each string represents a source file path for one outbound file transfer. For example, DOC-EXAMPLE-BUCKET/myfile.txt .
2554
+ * One or more source paths for the Amazon S3 storage. Each string represents a source file path for one outbound file transfer. For example, DOC-EXAMPLE-BUCKET/myfile.txt . Replace DOC-EXAMPLE-BUCKET with one of your actual buckets.
2555
2555
  */
2556
2556
  SendFilePaths?: FilePaths;
2557
2557
  /**
@@ -2773,7 +2773,7 @@ declare namespace Transfer {
2773
2773
  */
2774
2774
  BaseDirectory?: HomeDirectory;
2775
2775
  /**
2776
- * With AS2, you can send files by calling StartFileTransfer and specifying the file paths in the request parameter, SendFilePaths. We use the file’s parent directory (for example, for --send-file-paths /bucket/dir/file.txt, parent directory is /bucket/dir/) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the AccessRole needs to provide read and write access to the parent directory of the file location used in the StartFileTransfer request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with StartFileTransfer. If you are using Basic authentication for your AS2 connector, the access role requires the secretsmanager:GetSecretValue permission for the secret. If the secret is encrypted using a customer-managed key instead of the Amazon Web Services managed key in Secrets Manager, then the role also needs the kms:Decrypt permission for that key.
2776
+ * Connectors are used to send files using either the AS2 or SFTP protocol. For the access role, provide the Amazon Resource Name (ARN) of the Identity and Access Management role to use. For AS2 connectors With AS2, you can send files by calling StartFileTransfer and specifying the file paths in the request parameter, SendFilePaths. We use the file’s parent directory (for example, for --send-file-paths /bucket/dir/file.txt, parent directory is /bucket/dir/) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the AccessRole needs to provide read and write access to the parent directory of the file location used in the StartFileTransfer request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with StartFileTransfer. If you are using Basic authentication for your AS2 connector, the access role requires the secretsmanager:GetSecretValue permission for the secret. If the secret is encrypted using a customer-managed key instead of the Amazon Web Services managed key in Secrets Manager, then the role also needs the kms:Decrypt permission for that key. For SFTP connectors Make sure that the access role provides read and write access to the parent directory of the file location that's used in the StartFileTransfer request. Additionally, make sure that the role provides secretsmanager:GetSecretValue permission to Secrets Manager.
2777
2777
  */
2778
2778
  AccessRole?: Role;
2779
2779
  }
@@ -2821,7 +2821,7 @@ declare namespace Transfer {
2821
2821
  */
2822
2822
  As2Config?: As2ConnectorConfig;
2823
2823
  /**
2824
- * With AS2, you can send files by calling StartFileTransfer and specifying the file paths in the request parameter, SendFilePaths. We use the file’s parent directory (for example, for --send-file-paths /bucket/dir/file.txt, parent directory is /bucket/dir/) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the AccessRole needs to provide read and write access to the parent directory of the file location used in the StartFileTransfer request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with StartFileTransfer. If you are using Basic authentication for your AS2 connector, the access role requires the secretsmanager:GetSecretValue permission for the secret. If the secret is encrypted using a customer-managed key instead of the Amazon Web Services managed key in Secrets Manager, then the role also needs the kms:Decrypt permission for that key.
2824
+ * Connectors are used to send files using either the AS2 or SFTP protocol. For the access role, provide the Amazon Resource Name (ARN) of the Identity and Access Management role to use. For AS2 connectors With AS2, you can send files by calling StartFileTransfer and specifying the file paths in the request parameter, SendFilePaths. We use the file’s parent directory (for example, for --send-file-paths /bucket/dir/file.txt, parent directory is /bucket/dir/) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the AccessRole needs to provide read and write access to the parent directory of the file location used in the StartFileTransfer request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with StartFileTransfer. If you are using Basic authentication for your AS2 connector, the access role requires the secretsmanager:GetSecretValue permission for the secret. If the secret is encrypted using a customer-managed key instead of the Amazon Web Services managed key in Secrets Manager, then the role also needs the kms:Decrypt permission for that key. For SFTP connectors Make sure that the access role provides read and write access to the parent directory of the file location that's used in the StartFileTransfer request. Additionally, make sure that the role provides secretsmanager:GetSecretValue permission to Secrets Manager.
2825
2825
  */
2826
2826
  AccessRole?: Role;
2827
2827
  /**
@@ -12,35 +12,35 @@ declare class VerifiedPermissions extends Service {
12
12
  constructor(options?: VerifiedPermissions.Types.ClientConfiguration)
13
13
  config: Config & VerifiedPermissions.Types.ClientConfiguration;
14
14
  /**
15
- * Creates a reference to an Amazon Cognito user pool as an external identity provider (IdP). After you create an identity source, you can use the identities provided by the IdP as proxies for the principal in authorization queries that use the IsAuthorizedWithToken operation. These identities take the form of tokens that contain claims about the user, such as IDs, attributes and group memberships. Amazon Cognito provides both identity tokens and access tokens, and Verified Permissions can use either or both. Any combination of identity and access tokens results in the same Cedar principal. Verified Permissions automatically translates the information about the identities into the standard Cedar attributes that can be evaluated by your policies. Because the Amazon Cognito identity and access tokens can contain different information, the tokens you choose to use determine which principal attributes are available to access when evaluating Cedar policies. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire. To reference a user from this identity source in your Cedar policies, use the following syntax. IdentityType::"&lt;CognitoUserPoolIdentifier&gt;|&lt;CognitoClientId&gt; Where IdentityType is the string that you provide to the PrincipalEntityType parameter for this operation. The CognitoUserPoolId and CognitoClientId are defined by the Amazon Cognito user pool.
15
+ * Creates a reference to an Amazon Cognito user pool as an external identity provider (IdP). After you create an identity source, you can use the identities provided by the IdP as proxies for the principal in authorization queries that use the IsAuthorizedWithToken operation. These identities take the form of tokens that contain claims about the user, such as IDs, attributes and group memberships. Amazon Cognito provides both identity tokens and access tokens, and Verified Permissions can use either or both. Any combination of identity and access tokens results in the same Cedar principal. Verified Permissions automatically translates the information about the identities into the standard Cedar attributes that can be evaluated by your policies. Because the Amazon Cognito identity and access tokens can contain different information, the tokens you choose to use determine which principal attributes are available to access when evaluating Cedar policies. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire. To reference a user from this identity source in your Cedar policies, use the following syntax. IdentityType::"&lt;CognitoUserPoolIdentifier&gt;|&lt;CognitoClientId&gt; Where IdentityType is the string that you provide to the PrincipalEntityType parameter for this operation. The CognitoUserPoolId and CognitoClientId are defined by the Amazon Cognito user pool. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to be propagate through the service and be visible in the results of other Verified Permissions operations.
16
16
  */
17
17
  createIdentitySource(params: VerifiedPermissions.Types.CreateIdentitySourceInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.CreateIdentitySourceOutput) => void): Request<VerifiedPermissions.Types.CreateIdentitySourceOutput, AWSError>;
18
18
  /**
19
- * Creates a reference to an Amazon Cognito user pool as an external identity provider (IdP). After you create an identity source, you can use the identities provided by the IdP as proxies for the principal in authorization queries that use the IsAuthorizedWithToken operation. These identities take the form of tokens that contain claims about the user, such as IDs, attributes and group memberships. Amazon Cognito provides both identity tokens and access tokens, and Verified Permissions can use either or both. Any combination of identity and access tokens results in the same Cedar principal. Verified Permissions automatically translates the information about the identities into the standard Cedar attributes that can be evaluated by your policies. Because the Amazon Cognito identity and access tokens can contain different information, the tokens you choose to use determine which principal attributes are available to access when evaluating Cedar policies. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire. To reference a user from this identity source in your Cedar policies, use the following syntax. IdentityType::"&lt;CognitoUserPoolIdentifier&gt;|&lt;CognitoClientId&gt; Where IdentityType is the string that you provide to the PrincipalEntityType parameter for this operation. The CognitoUserPoolId and CognitoClientId are defined by the Amazon Cognito user pool.
19
+ * Creates a reference to an Amazon Cognito user pool as an external identity provider (IdP). After you create an identity source, you can use the identities provided by the IdP as proxies for the principal in authorization queries that use the IsAuthorizedWithToken operation. These identities take the form of tokens that contain claims about the user, such as IDs, attributes and group memberships. Amazon Cognito provides both identity tokens and access tokens, and Verified Permissions can use either or both. Any combination of identity and access tokens results in the same Cedar principal. Verified Permissions automatically translates the information about the identities into the standard Cedar attributes that can be evaluated by your policies. Because the Amazon Cognito identity and access tokens can contain different information, the tokens you choose to use determine which principal attributes are available to access when evaluating Cedar policies. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire. To reference a user from this identity source in your Cedar policies, use the following syntax. IdentityType::"&lt;CognitoUserPoolIdentifier&gt;|&lt;CognitoClientId&gt; Where IdentityType is the string that you provide to the PrincipalEntityType parameter for this operation. The CognitoUserPoolId and CognitoClientId are defined by the Amazon Cognito user pool. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to be propagate through the service and be visible in the results of other Verified Permissions operations.
20
20
  */
21
21
  createIdentitySource(callback?: (err: AWSError, data: VerifiedPermissions.Types.CreateIdentitySourceOutput) => void): Request<VerifiedPermissions.Types.CreateIdentitySourceOutput, AWSError>;
22
22
  /**
23
- * Creates a Cedar policy and saves it in the specified policy store. You can create either a static policy or a policy linked to a policy template. To create a static policy, provide the Cedar policy text in the StaticPolicy section of the PolicyDefinition. To create a policy that is dynamically linked to a policy template, specify the policy template ID and the principal and resource to associate with this policy in the templateLinked section of the PolicyDefinition. If the policy template is ever updated, any policies linked to the policy template automatically use the updated template. Creating a policy causes it to be validated against the schema in the policy store. If the policy doesn't pass validation, the operation fails and the policy isn't stored.
23
+ * Creates a Cedar policy and saves it in the specified policy store. You can create either a static policy or a policy linked to a policy template. To create a static policy, provide the Cedar policy text in the StaticPolicy section of the PolicyDefinition. To create a policy that is dynamically linked to a policy template, specify the policy template ID and the principal and resource to associate with this policy in the templateLinked section of the PolicyDefinition. If the policy template is ever updated, any policies linked to the policy template automatically use the updated template. Creating a policy causes it to be validated against the schema in the policy store. If the policy doesn't pass validation, the operation fails and the policy isn't stored. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to be propagate through the service and be visible in the results of other Verified Permissions operations.
24
24
  */
25
25
  createPolicy(params: VerifiedPermissions.Types.CreatePolicyInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.CreatePolicyOutput) => void): Request<VerifiedPermissions.Types.CreatePolicyOutput, AWSError>;
26
26
  /**
27
- * Creates a Cedar policy and saves it in the specified policy store. You can create either a static policy or a policy linked to a policy template. To create a static policy, provide the Cedar policy text in the StaticPolicy section of the PolicyDefinition. To create a policy that is dynamically linked to a policy template, specify the policy template ID and the principal and resource to associate with this policy in the templateLinked section of the PolicyDefinition. If the policy template is ever updated, any policies linked to the policy template automatically use the updated template. Creating a policy causes it to be validated against the schema in the policy store. If the policy doesn't pass validation, the operation fails and the policy isn't stored.
27
+ * Creates a Cedar policy and saves it in the specified policy store. You can create either a static policy or a policy linked to a policy template. To create a static policy, provide the Cedar policy text in the StaticPolicy section of the PolicyDefinition. To create a policy that is dynamically linked to a policy template, specify the policy template ID and the principal and resource to associate with this policy in the templateLinked section of the PolicyDefinition. If the policy template is ever updated, any policies linked to the policy template automatically use the updated template. Creating a policy causes it to be validated against the schema in the policy store. If the policy doesn't pass validation, the operation fails and the policy isn't stored. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to be propagate through the service and be visible in the results of other Verified Permissions operations.
28
28
  */
29
29
  createPolicy(callback?: (err: AWSError, data: VerifiedPermissions.Types.CreatePolicyOutput) => void): Request<VerifiedPermissions.Types.CreatePolicyOutput, AWSError>;
30
30
  /**
31
- * Creates a policy store. A policy store is a container for policy resources. Although Cedar supports multiple namespaces, Verified Permissions currently supports only one namespace per policy store.
31
+ * Creates a policy store. A policy store is a container for policy resources. Although Cedar supports multiple namespaces, Verified Permissions currently supports only one namespace per policy store. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to be propagate through the service and be visible in the results of other Verified Permissions operations.
32
32
  */
33
33
  createPolicyStore(params: VerifiedPermissions.Types.CreatePolicyStoreInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.CreatePolicyStoreOutput) => void): Request<VerifiedPermissions.Types.CreatePolicyStoreOutput, AWSError>;
34
34
  /**
35
- * Creates a policy store. A policy store is a container for policy resources. Although Cedar supports multiple namespaces, Verified Permissions currently supports only one namespace per policy store.
35
+ * Creates a policy store. A policy store is a container for policy resources. Although Cedar supports multiple namespaces, Verified Permissions currently supports only one namespace per policy store. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to be propagate through the service and be visible in the results of other Verified Permissions operations.
36
36
  */
37
37
  createPolicyStore(callback?: (err: AWSError, data: VerifiedPermissions.Types.CreatePolicyStoreOutput) => void): Request<VerifiedPermissions.Types.CreatePolicyStoreOutput, AWSError>;
38
38
  /**
39
- * Creates a policy template. A template can use placeholders for the principal and resource. A template must be instantiated into a policy by associating it with specific principals and resources to use for the placeholders. That instantiated policy can then be considered in authorization decisions. The instantiated policy works identically to any other policy, except that it is dynamically linked to the template. If the template changes, then any policies that are linked to that template are immediately updated as well.
39
+ * Creates a policy template. A template can use placeholders for the principal and resource. A template must be instantiated into a policy by associating it with specific principals and resources to use for the placeholders. That instantiated policy can then be considered in authorization decisions. The instantiated policy works identically to any other policy, except that it is dynamically linked to the template. If the template changes, then any policies that are linked to that template are immediately updated as well. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to be propagate through the service and be visible in the results of other Verified Permissions operations.
40
40
  */
41
41
  createPolicyTemplate(params: VerifiedPermissions.Types.CreatePolicyTemplateInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.CreatePolicyTemplateOutput) => void): Request<VerifiedPermissions.Types.CreatePolicyTemplateOutput, AWSError>;
42
42
  /**
43
- * Creates a policy template. A template can use placeholders for the principal and resource. A template must be instantiated into a policy by associating it with specific principals and resources to use for the placeholders. That instantiated policy can then be considered in authorization decisions. The instantiated policy works identically to any other policy, except that it is dynamically linked to the template. If the template changes, then any policies that are linked to that template are immediately updated as well.
43
+ * Creates a policy template. A template can use placeholders for the principal and resource. A template must be instantiated into a policy by associating it with specific principals and resources to use for the placeholders. That instantiated policy can then be considered in authorization decisions. The instantiated policy works identically to any other policy, except that it is dynamically linked to the template. If the template changes, then any policies that are linked to that template are immediately updated as well. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to be propagate through the service and be visible in the results of other Verified Permissions operations.
44
44
  */
45
45
  createPolicyTemplate(callback?: (err: AWSError, data: VerifiedPermissions.Types.CreatePolicyTemplateOutput) => void): Request<VerifiedPermissions.Types.CreatePolicyTemplateOutput, AWSError>;
46
46
  /**
@@ -124,11 +124,11 @@ declare class VerifiedPermissions extends Service {
124
124
  */
125
125
  isAuthorized(callback?: (err: AWSError, data: VerifiedPermissions.Types.IsAuthorizedOutput) => void): Request<VerifiedPermissions.Types.IsAuthorizedOutput, AWSError>;
126
126
  /**
127
- * Makes an authorization decision about a service request described in the parameters. The principal in this request comes from an external identity source. The information in the parameters can also define additional context that Verified Permissions can include in the evaluation. The request is evaluated against all matching policies in the specified policy store. The result of the decision is either Allow or Deny, along with a list of the policies that resulted in the decision. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire.
127
+ * Makes an authorization decision about a service request described in the parameters. The principal in this request comes from an external identity source in the form of an identity token formatted as a JSON web token (JWT). The information in the parameters can also define additional context that Verified Permissions can include in the evaluation. The request is evaluated against all matching policies in the specified policy store. The result of the decision is either Allow or Deny, along with a list of the policies that resulted in the decision. If you specify the identityToken parameter, then this operation derives the principal from that token. You must not also include that principal in the entities parameter or the operation fails and reports a conflict between the two entity sources. If you provide only an accessToken, then you can include the entity as part of the entities parameter to provide additional attributes. At this time, Verified Permissions accepts tokens from only Amazon Cognito. Verified Permissions validates each token that is specified in a request by checking its expiration date and its signature. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire.
128
128
  */
129
129
  isAuthorizedWithToken(params: VerifiedPermissions.Types.IsAuthorizedWithTokenInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.IsAuthorizedWithTokenOutput) => void): Request<VerifiedPermissions.Types.IsAuthorizedWithTokenOutput, AWSError>;
130
130
  /**
131
- * Makes an authorization decision about a service request described in the parameters. The principal in this request comes from an external identity source. The information in the parameters can also define additional context that Verified Permissions can include in the evaluation. The request is evaluated against all matching policies in the specified policy store. The result of the decision is either Allow or Deny, along with a list of the policies that resulted in the decision. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire.
131
+ * Makes an authorization decision about a service request described in the parameters. The principal in this request comes from an external identity source in the form of an identity token formatted as a JSON web token (JWT). The information in the parameters can also define additional context that Verified Permissions can include in the evaluation. The request is evaluated against all matching policies in the specified policy store. The result of the decision is either Allow or Deny, along with a list of the policies that resulted in the decision. If you specify the identityToken parameter, then this operation derives the principal from that token. You must not also include that principal in the entities parameter or the operation fails and reports a conflict between the two entity sources. If you provide only an accessToken, then you can include the entity as part of the entities parameter to provide additional attributes. At this time, Verified Permissions accepts tokens from only Amazon Cognito. Verified Permissions validates each token that is specified in a request by checking its expiration date and its signature. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire.
132
132
  */
133
133
  isAuthorizedWithToken(callback?: (err: AWSError, data: VerifiedPermissions.Types.IsAuthorizedWithTokenOutput) => void): Request<VerifiedPermissions.Types.IsAuthorizedWithTokenOutput, AWSError>;
134
134
  /**
@@ -164,43 +164,43 @@ declare class VerifiedPermissions extends Service {
164
164
  */
165
165
  listPolicyTemplates(callback?: (err: AWSError, data: VerifiedPermissions.Types.ListPolicyTemplatesOutput) => void): Request<VerifiedPermissions.Types.ListPolicyTemplatesOutput, AWSError>;
166
166
  /**
167
- * Creates or updates the policy schema in the specified policy store. The schema is used to validate any Cedar policies and policy templates submitted to the policy store. Any changes to the schema validate only policies and templates submitted after the schema change. Existing policies and templates are not re-evaluated against the changed schema. If you later update a policy, then it is evaluated against the new schema at that time.
167
+ * Creates or updates the policy schema in the specified policy store. The schema is used to validate any Cedar policies and policy templates submitted to the policy store. Any changes to the schema validate only policies and templates submitted after the schema change. Existing policies and templates are not re-evaluated against the changed schema. If you later update a policy, then it is evaluated against the new schema at that time. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to be propagate through the service and be visible in the results of other Verified Permissions operations.
168
168
  */
169
169
  putSchema(params: VerifiedPermissions.Types.PutSchemaInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.PutSchemaOutput) => void): Request<VerifiedPermissions.Types.PutSchemaOutput, AWSError>;
170
170
  /**
171
- * Creates or updates the policy schema in the specified policy store. The schema is used to validate any Cedar policies and policy templates submitted to the policy store. Any changes to the schema validate only policies and templates submitted after the schema change. Existing policies and templates are not re-evaluated against the changed schema. If you later update a policy, then it is evaluated against the new schema at that time.
171
+ * Creates or updates the policy schema in the specified policy store. The schema is used to validate any Cedar policies and policy templates submitted to the policy store. Any changes to the schema validate only policies and templates submitted after the schema change. Existing policies and templates are not re-evaluated against the changed schema. If you later update a policy, then it is evaluated against the new schema at that time. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to be propagate through the service and be visible in the results of other Verified Permissions operations.
172
172
  */
173
173
  putSchema(callback?: (err: AWSError, data: VerifiedPermissions.Types.PutSchemaOutput) => void): Request<VerifiedPermissions.Types.PutSchemaOutput, AWSError>;
174
174
  /**
175
- * Updates the specified identity source to use a new identity provider (IdP) source, or to change the mapping of identities from the IdP to a different principal entity type.
175
+ * Updates the specified identity source to use a new identity provider (IdP) source, or to change the mapping of identities from the IdP to a different principal entity type. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to be propagate through the service and be visible in the results of other Verified Permissions operations.
176
176
  */
177
177
  updateIdentitySource(params: VerifiedPermissions.Types.UpdateIdentitySourceInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdateIdentitySourceOutput) => void): Request<VerifiedPermissions.Types.UpdateIdentitySourceOutput, AWSError>;
178
178
  /**
179
- * Updates the specified identity source to use a new identity provider (IdP) source, or to change the mapping of identities from the IdP to a different principal entity type.
179
+ * Updates the specified identity source to use a new identity provider (IdP) source, or to change the mapping of identities from the IdP to a different principal entity type. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to be propagate through the service and be visible in the results of other Verified Permissions operations.
180
180
  */
181
181
  updateIdentitySource(callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdateIdentitySourceOutput) => void): Request<VerifiedPermissions.Types.UpdateIdentitySourceOutput, AWSError>;
182
182
  /**
183
- * Modifies a Cedar static policy in the specified policy store. You can change only certain elements of the UpdatePolicyDefinition parameter. You can directly update only static policies. To change a template-linked policy, you must update the template instead, using UpdatePolicyTemplate. If policy validation is enabled in the policy store, then updating a static policy causes Verified Permissions to validate the policy against the schema in the policy store. If the updated static policy doesn't pass validation, the operation fails and the update isn't stored.
183
+ * Modifies a Cedar static policy in the specified policy store. You can change only certain elements of the UpdatePolicyDefinition parameter. You can directly update only static policies. To change a template-linked policy, you must update the template instead, using UpdatePolicyTemplate. If policy validation is enabled in the policy store, then updating a static policy causes Verified Permissions to validate the policy against the schema in the policy store. If the updated static policy doesn't pass validation, the operation fails and the update isn't stored. When you edit a static policy, You can change only certain elements of a static policy: The action referenced by the policy. A condition clause, such as when and unless. You can't change these elements of a static policy: Changing a policy from a static policy to a template-linked policy. Changing the effect of a static policy from permit or forbid. The principal referenced by a static policy. The resource referenced by a static policy. To update a template-linked policy, you must update the template instead. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to be propagate through the service and be visible in the results of other Verified Permissions operations.
184
184
  */
185
185
  updatePolicy(params: VerifiedPermissions.Types.UpdatePolicyInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdatePolicyOutput) => void): Request<VerifiedPermissions.Types.UpdatePolicyOutput, AWSError>;
186
186
  /**
187
- * Modifies a Cedar static policy in the specified policy store. You can change only certain elements of the UpdatePolicyDefinition parameter. You can directly update only static policies. To change a template-linked policy, you must update the template instead, using UpdatePolicyTemplate. If policy validation is enabled in the policy store, then updating a static policy causes Verified Permissions to validate the policy against the schema in the policy store. If the updated static policy doesn't pass validation, the operation fails and the update isn't stored.
187
+ * Modifies a Cedar static policy in the specified policy store. You can change only certain elements of the UpdatePolicyDefinition parameter. You can directly update only static policies. To change a template-linked policy, you must update the template instead, using UpdatePolicyTemplate. If policy validation is enabled in the policy store, then updating a static policy causes Verified Permissions to validate the policy against the schema in the policy store. If the updated static policy doesn't pass validation, the operation fails and the update isn't stored. When you edit a static policy, You can change only certain elements of a static policy: The action referenced by the policy. A condition clause, such as when and unless. You can't change these elements of a static policy: Changing a policy from a static policy to a template-linked policy. Changing the effect of a static policy from permit or forbid. The principal referenced by a static policy. The resource referenced by a static policy. To update a template-linked policy, you must update the template instead. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to be propagate through the service and be visible in the results of other Verified Permissions operations.
188
188
  */
189
189
  updatePolicy(callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdatePolicyOutput) => void): Request<VerifiedPermissions.Types.UpdatePolicyOutput, AWSError>;
190
190
  /**
191
- * Modifies the validation setting for a policy store.
191
+ * Modifies the validation setting for a policy store. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to be propagate through the service and be visible in the results of other Verified Permissions operations.
192
192
  */
193
193
  updatePolicyStore(params: VerifiedPermissions.Types.UpdatePolicyStoreInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdatePolicyStoreOutput) => void): Request<VerifiedPermissions.Types.UpdatePolicyStoreOutput, AWSError>;
194
194
  /**
195
- * Modifies the validation setting for a policy store.
195
+ * Modifies the validation setting for a policy store. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to be propagate through the service and be visible in the results of other Verified Permissions operations.
196
196
  */
197
197
  updatePolicyStore(callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdatePolicyStoreOutput) => void): Request<VerifiedPermissions.Types.UpdatePolicyStoreOutput, AWSError>;
198
198
  /**
199
- * Updates the specified policy template. You can update only the description and the some elements of the policyBody. Changes you make to the policy template content are immediately reflected in authorization decisions that involve all template-linked policies instantiated from this template.
199
+ * Updates the specified policy template. You can update only the description and the some elements of the policyBody. Changes you make to the policy template content are immediately reflected in authorization decisions that involve all template-linked policies instantiated from this template. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to be propagate through the service and be visible in the results of other Verified Permissions operations.
200
200
  */
201
201
  updatePolicyTemplate(params: VerifiedPermissions.Types.UpdatePolicyTemplateInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdatePolicyTemplateOutput) => void): Request<VerifiedPermissions.Types.UpdatePolicyTemplateOutput, AWSError>;
202
202
  /**
203
- * Updates the specified policy template. You can update only the description and the some elements of the policyBody. Changes you make to the policy template content are immediately reflected in authorization decisions that involve all template-linked policies instantiated from this template.
203
+ * Updates the specified policy template. You can update only the description and the some elements of the policyBody. Changes you make to the policy template content are immediately reflected in authorization decisions that involve all template-linked policies instantiated from this template. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to be propagate through the service and be visible in the results of other Verified Permissions operations.
204
204
  */
205
205
  updatePolicyTemplate(callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdatePolicyTemplateOutput) => void): Request<VerifiedPermissions.Types.UpdatePolicyTemplateOutput, AWSError>;
206
206
  }
@@ -804,11 +804,11 @@ declare namespace VerifiedPermissions {
804
804
  */
805
805
  policyStoreId: PolicyStoreId;
806
806
  /**
807
- * Specifies an identity token for the principal to be authorized. This token is provided to you by the identity provider (IdP) associated with the specified identity source. You must specify either an AccessToken or an IdentityToken, but not both.
807
+ * Specifies an identity token for the principal to be authorized. This token is provided to you by the identity provider (IdP) associated with the specified identity source. You must specify either an AccessToken or an IdentityToken, or both.
808
808
  */
809
809
  identityToken?: Token;
810
810
  /**
811
- * Specifies an access token for the principal to be authorized. This token is provided to you by the identity provider (IdP) associated with the specified identity source. You must specify either an AccessToken or an IdentityToken, but not both.
811
+ * Specifies an access token for the principal to be authorized. This token is provided to you by the identity provider (IdP) associated with the specified identity source. You must specify either an AccessToken, or an IdentityToken, or both.
812
812
  */
813
813
  accessToken?: Token;
814
814
  /**
@@ -824,7 +824,7 @@ declare namespace VerifiedPermissions {
824
824
  */
825
825
  context?: ContextDefinition;
826
826
  /**
827
- * Specifies the list of resources and principals and their associated attributes that Verified Permissions can examine when evaluating the policies. You can include only principal and resource entities in this parameter; you can't include actions. You must specify actions in the schema.
827
+ * Specifies the list of resources and their associated attributes that Verified Permissions can examine when evaluating the policies. You can include only resource and action entities in this parameter; you can't include principals. The IsAuthorizedWithToken operation takes principal attributes from only the identityToken or accessToken passed to the operation. For action entities, you can include only their Identifier and EntityType.
828
828
  */
829
829
  entities?: EntitiesDefinition;
830
830
  }
@@ -852,7 +852,7 @@ declare namespace VerifiedPermissions {
852
852
  */
853
853
  nextToken?: NextToken;
854
854
  /**
855
- * Specifies the total number of results that you want included on each page of the response. If you do not include this parameter, it defaults to a value that is specific to the operation. If additional items exist beyond the number you specify, the NextToken response element is returned with a value (not null). Include the specified value as the NextToken request parameter in the next call to the operation to get the next part of the results. Note that the service might return fewer results than the maximum even when there are more results available. You should check NextToken after every operation to ensure that you receive all of the results.
855
+ * Specifies the total number of results that you want included in each response. If additional items exist beyond the number you specify, the NextToken response element is returned with a value (not null). Include the specified value as the NextToken request parameter in the next call to the operation to get the next set of results. Note that the service might return fewer results than the maximum even when there are more results available. You should check NextToken after every operation to ensure that you receive all of the results. If you do not specify this parameter, the operation defaults to 10 identity sources per response. You can specify a maximum of 200 identity sources per response.
856
856
  */
857
857
  maxResults?: ListIdentitySourcesMaxResults;
858
858
  /**
@@ -881,7 +881,7 @@ declare namespace VerifiedPermissions {
881
881
  */
882
882
  nextToken?: NextToken;
883
883
  /**
884
- * Specifies the total number of results that you want included on each page of the response. If you do not include this parameter, it defaults to a value that is specific to the operation. If additional items exist beyond the number you specify, the NextToken response element is returned with a value (not null). Include the specified value as the NextToken request parameter in the next call to the operation to get the next part of the results. Note that the service might return fewer results than the maximum even when there are more results available. You should check NextToken after every operation to ensure that you receive all of the results.
884
+ * Specifies the total number of results that you want included in each response. If additional items exist beyond the number you specify, the NextToken response element is returned with a value (not null). Include the specified value as the NextToken request parameter in the next call to the operation to get the next set of results. Note that the service might return fewer results than the maximum even when there are more results available. You should check NextToken after every operation to ensure that you receive all of the results. If you do not specify this parameter, the operation defaults to 10 policies per response. You can specify a maximum of 50 policies per response.
885
885
  */
886
886
  maxResults?: MaxResults;
887
887
  /**
@@ -905,7 +905,7 @@ declare namespace VerifiedPermissions {
905
905
  */
906
906
  nextToken?: NextToken;
907
907
  /**
908
- * Specifies the total number of results that you want included on each page of the response. If you do not include this parameter, it defaults to a value that is specific to the operation. If additional items exist beyond the number you specify, the NextToken response element is returned with a value (not null). Include the specified value as the NextToken request parameter in the next call to the operation to get the next part of the results. Note that the service might return fewer results than the maximum even when there are more results available. You should check NextToken after every operation to ensure that you receive all of the results.
908
+ * Specifies the total number of results that you want included in each response. If additional items exist beyond the number you specify, the NextToken response element is returned with a value (not null). Include the specified value as the NextToken request parameter in the next call to the operation to get the next set of results. Note that the service might return fewer results than the maximum even when there are more results available. You should check NextToken after every operation to ensure that you receive all of the results. If you do not specify this parameter, the operation defaults to 10 policy stores per response. You can specify a maximum of 50 policy stores per response.
909
909
  */
910
910
  maxResults?: MaxResults;
911
911
  }
@@ -929,7 +929,7 @@ declare namespace VerifiedPermissions {
929
929
  */
930
930
  nextToken?: NextToken;
931
931
  /**
932
- * Specifies the total number of results that you want included on each page of the response. If you do not include this parameter, it defaults to a value that is specific to the operation. If additional items exist beyond the number you specify, the NextToken response element is returned with a value (not null). Include the specified value as the NextToken request parameter in the next call to the operation to get the next part of the results. Note that the service might return fewer results than the maximum even when there are more results available. You should check NextToken after every operation to ensure that you receive all of the results.
932
+ * Specifies the total number of results that you want included in each response. If additional items exist beyond the number you specify, the NextToken response element is returned with a value (not null). Include the specified value as the NextToken request parameter in the next call to the operation to get the next set of results. Note that the service might return fewer results than the maximum even when there are more results available. You should check NextToken after every operation to ensure that you receive all of the results. If you do not specify this parameter, the operation defaults to 10 policy templates per response. You can specify a maximum of 50 policy templates per response.
933
933
  */
934
934
  maxResults?: MaxResults;
935
935
  }
@@ -620,7 +620,7 @@ declare namespace WorkSpacesWeb {
620
620
  /**
621
621
  * The ARN of the browser settings.
622
622
  */
623
- browserSettingsArn?: ARN;
623
+ browserSettingsArn: ARN;
624
624
  }
625
625
  export type BrowserType = "Chrome"|string;
626
626
  export interface Certificate {
@@ -678,6 +678,34 @@ declare namespace WorkSpacesWeb {
678
678
  export type CertificateThumbprint = string;
679
679
  export type CertificateThumbprintList = CertificateThumbprint[];
680
680
  export type ClientToken = string;
681
+ export type CookieDomain = string;
682
+ export type CookieName = string;
683
+ export type CookiePath = string;
684
+ export interface CookieSpecification {
685
+ /**
686
+ * The domain of the cookie.
687
+ */
688
+ domain: CookieDomain;
689
+ /**
690
+ * The name of the cookie.
691
+ */
692
+ name?: CookieName;
693
+ /**
694
+ * The path of the cookie.
695
+ */
696
+ path?: CookiePath;
697
+ }
698
+ export type CookieSpecifications = CookieSpecification[];
699
+ export interface CookieSynchronizationConfiguration {
700
+ /**
701
+ * The list of cookie specifications that are allowed to be synchronized to the remote browser.
702
+ */
703
+ allowlist: CookieSpecifications;
704
+ /**
705
+ * The list of cookie specifications that are blocked from being synchronized to the remote browser.
706
+ */
707
+ blocklist?: CookieSpecifications;
708
+ }
681
709
  export interface CreateBrowserSettingsRequest {
682
710
  /**
683
711
  * Additional encryption context of the browser settings.
@@ -732,7 +760,7 @@ declare namespace WorkSpacesWeb {
732
760
  /**
733
761
  * The ARN of the identity provider.
734
762
  */
735
- identityProviderArn: ARN;
763
+ identityProviderArn: SubresourceARN;
736
764
  }
737
765
  export interface CreateIpAccessSettingsRequest {
738
766
  /**
@@ -875,14 +903,26 @@ declare namespace WorkSpacesWeb {
875
903
  userAccessLoggingSettingsArn: ARN;
876
904
  }
877
905
  export interface CreateUserSettingsRequest {
906
+ /**
907
+ * The additional encryption context of the user settings.
908
+ */
909
+ additionalEncryptionContext?: EncryptionContextMap;
878
910
  /**
879
911
  * A unique, case-sensitive identifier that you provide to ensure the idempotency of the request. Idempotency ensures that an API request completes only once. With an idempotent request, if the original request completes successfully, subsequent retries with the same client token returns the result from the original successful request. If you do not specify a client token, one is automatically generated by the AWS SDK.
880
912
  */
881
913
  clientToken?: ClientToken;
914
+ /**
915
+ * The configuration that specifies which cookies should be synchronized from the end user's local browser to the remote browser.
916
+ */
917
+ cookieSynchronizationConfiguration?: CookieSynchronizationConfiguration;
882
918
  /**
883
919
  * Specifies whether the user can copy text from the streaming session to the local device.
884
920
  */
885
921
  copyAllowed: EnabledType;
922
+ /**
923
+ * The customer managed key used to encrypt sensitive information in the user settings.
924
+ */
925
+ customerManagedKey?: keyArn;
886
926
  /**
887
927
  * The amount of time that a streaming session remains active after users disconnect.
888
928
  */
@@ -930,7 +970,7 @@ declare namespace WorkSpacesWeb {
930
970
  /**
931
971
  * The ARN of the identity provider.
932
972
  */
933
- identityProviderArn: ARN;
973
+ identityProviderArn: SubresourceARN;
934
974
  }
935
975
  export interface DeleteIdentityProviderResponse {
936
976
  }
@@ -1051,7 +1091,7 @@ declare namespace WorkSpacesWeb {
1051
1091
  /**
1052
1092
  * The ARN of the identity provider.
1053
1093
  */
1054
- identityProviderArn: ARN;
1094
+ identityProviderArn: SubresourceARN;
1055
1095
  }
1056
1096
  export interface GetIdentityProviderResponse {
1057
1097
  /**
@@ -1129,7 +1169,7 @@ declare namespace WorkSpacesWeb {
1129
1169
  /**
1130
1170
  * The ARN of the trust store certificate.
1131
1171
  */
1132
- trustStoreArn?: ARN;
1172
+ trustStoreArn: ARN;
1133
1173
  }
1134
1174
  export interface GetTrustStoreRequest {
1135
1175
  /**
@@ -1171,7 +1211,7 @@ declare namespace WorkSpacesWeb {
1171
1211
  /**
1172
1212
  * The ARN of the identity provider.
1173
1213
  */
1174
- identityProviderArn: ARN;
1214
+ identityProviderArn: SubresourceARN;
1175
1215
  /**
1176
1216
  * The identity provider details. The following list describes the provider detail keys for each identity provider type. For Google and Login with Amazon: client_id client_secret authorize_scopes For Facebook: client_id client_secret authorize_scopes api_version For Sign in with Apple: client_id team_id key_id private_key authorize_scopes For OIDC providers: client_id client_secret attributes_request_method oidc_issuer authorize_scopes authorize_url if not available from discovery URL specified by oidc_issuer key token_url if not available from discovery URL specified by oidc_issuer key attributes_url if not available from discovery URL specified by oidc_issuer key jwks_uri if not available from discovery URL specified by oidc_issuer key For SAML providers: MetadataFile OR MetadataURL IDPSignout optional
1177
1217
  */
@@ -1192,7 +1232,7 @@ declare namespace WorkSpacesWeb {
1192
1232
  /**
1193
1233
  * The ARN of the identity provider.
1194
1234
  */
1195
- identityProviderArn?: ARN;
1235
+ identityProviderArn: SubresourceARN;
1196
1236
  /**
1197
1237
  * The identity provider name.
1198
1238
  */
@@ -1247,7 +1287,7 @@ declare namespace WorkSpacesWeb {
1247
1287
  /**
1248
1288
  * The ARN of IP access settings.
1249
1289
  */
1250
- ipAccessSettingsArn?: ARN;
1290
+ ipAccessSettingsArn: ARN;
1251
1291
  }
1252
1292
  export type IpRange = string;
1253
1293
  export interface IpRule {
@@ -1404,7 +1444,7 @@ declare namespace WorkSpacesWeb {
1404
1444
  /**
1405
1445
  * The ARN of the trust store.
1406
1446
  */
1407
- trustStoreArn?: ARN;
1447
+ trustStoreArn: ARN;
1408
1448
  }
1409
1449
  export interface ListTrustStoresRequest {
1410
1450
  /**
@@ -1494,7 +1534,7 @@ declare namespace WorkSpacesWeb {
1494
1534
  /**
1495
1535
  * The ARN of the network settings.
1496
1536
  */
1497
- networkSettingsArn?: ARN;
1537
+ networkSettingsArn: ARN;
1498
1538
  /**
1499
1539
  * The VPC ID of the network settings.
1500
1540
  */
@@ -1533,7 +1573,7 @@ declare namespace WorkSpacesWeb {
1533
1573
  /**
1534
1574
  * The ARN of the web portal.
1535
1575
  */
1536
- portalArn?: ARN;
1576
+ portalArn: ARN;
1537
1577
  /**
1538
1578
  * The endpoint URL of the web portal that users access in order to start streaming sessions.
1539
1579
  */
@@ -1598,7 +1638,7 @@ declare namespace WorkSpacesWeb {
1598
1638
  /**
1599
1639
  * The ARN of the web portal.
1600
1640
  */
1601
- portalArn?: ARN;
1641
+ portalArn: ARN;
1602
1642
  /**
1603
1643
  * The endpoint URL of the web portal that users access in order to start streaming sessions.
1604
1644
  */
@@ -1632,6 +1672,7 @@ declare namespace WorkSpacesWeb {
1632
1672
  export type StringType = string;
1633
1673
  export type SubnetId = string;
1634
1674
  export type SubnetIdList = SubnetId[];
1675
+ export type SubresourceARN = string;
1635
1676
  export interface Tag {
1636
1677
  /**
1637
1678
  * The key of the tag.
@@ -1671,7 +1712,7 @@ declare namespace WorkSpacesWeb {
1671
1712
  /**
1672
1713
  * The ARN of the trust store.
1673
1714
  */
1674
- trustStoreArn?: ARN;
1715
+ trustStoreArn: ARN;
1675
1716
  }
1676
1717
  export interface TrustStoreSummary {
1677
1718
  /**
@@ -1720,7 +1761,7 @@ declare namespace WorkSpacesWeb {
1720
1761
  /**
1721
1762
  * The ARN of the identity provider.
1722
1763
  */
1723
- identityProviderArn: ARN;
1764
+ identityProviderArn: SubresourceARN;
1724
1765
  /**
1725
1766
  * The details of the identity provider. The following list describes the provider detail keys for each identity provider type. For Google and Login with Amazon: client_id client_secret authorize_scopes For Facebook: client_id client_secret authorize_scopes api_version For Sign in with Apple: client_id team_id key_id private_key authorize_scopes For OIDC providers: client_id client_secret attributes_request_method oidc_issuer authorize_scopes authorize_url if not available from discovery URL specified by oidc_issuer key token_url if not available from discovery URL specified by oidc_issuer key attributes_url if not available from discovery URL specified by oidc_issuer key jwks_uri if not available from discovery URL specified by oidc_issuer key For SAML providers: MetadataFile OR MetadataURL IDPSignout (boolean) optional
1726
1767
  */
@@ -1865,6 +1906,10 @@ declare namespace WorkSpacesWeb {
1865
1906
  * A unique, case-sensitive identifier that you provide to ensure the idempotency of the request. Idempotency ensures that an API request completes only once. With an idempotent request, if the original request completes successfully, subsequent retries with the same client token return the result from the original successful request. If you do not specify a client token, one is automatically generated by the AWS SDK.
1866
1907
  */
1867
1908
  clientToken?: ClientToken;
1909
+ /**
1910
+ * The configuration that specifies which cookies should be synchronized from the end user's local browser to the remote browser. If the allowlist and blocklist are empty, the configuration becomes null.
1911
+ */
1912
+ cookieSynchronizationConfiguration?: CookieSynchronizationConfiguration;
1868
1913
  /**
1869
1914
  * Specifies whether the user can copy text from the streaming session to the local device.
1870
1915
  */
@@ -1927,13 +1972,17 @@ declare namespace WorkSpacesWeb {
1927
1972
  /**
1928
1973
  * The ARN of the user access logging settings.
1929
1974
  */
1930
- userAccessLoggingSettingsArn?: ARN;
1975
+ userAccessLoggingSettingsArn: ARN;
1931
1976
  }
1932
1977
  export interface UserSettings {
1933
1978
  /**
1934
1979
  * A list of web portal ARNs that this user settings is associated with.
1935
1980
  */
1936
1981
  associatedPortalArns?: ArnList;
1982
+ /**
1983
+ * The configuration that specifies which cookies should be synchronized from the end user's local browser to the remote browser.
1984
+ */
1985
+ cookieSynchronizationConfiguration?: CookieSynchronizationConfiguration;
1937
1986
  /**
1938
1987
  * Specifies whether the user can copy text from the streaming session to the local device.
1939
1988
  */
@@ -1969,6 +2018,10 @@ declare namespace WorkSpacesWeb {
1969
2018
  }
1970
2019
  export type UserSettingsList = UserSettingsSummary[];
1971
2020
  export interface UserSettingsSummary {
2021
+ /**
2022
+ * The configuration that specifies which cookies should be synchronized from the end user's local browser to the remote browser.
2023
+ */
2024
+ cookieSynchronizationConfiguration?: CookieSynchronizationConfiguration;
1972
2025
  /**
1973
2026
  * Specifies whether the user can copy text from the streaming session to the local device.
1974
2027
  */
@@ -2000,7 +2053,7 @@ declare namespace WorkSpacesWeb {
2000
2053
  /**
2001
2054
  * The ARN of the user settings.
2002
2055
  */
2003
- userSettingsArn?: ARN;
2056
+ userSettingsArn: ARN;
2004
2057
  }
2005
2058
  export type VpcId = string;
2006
2059
  export type keyArn = string;