cdk-lambda-subminute 2.0.395 → 2.0.397
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +4 -4
- package/lib/cdk-lambda-subminute.js +3 -3
- package/node_modules/aws-sdk/README.md +8 -13
- package/node_modules/aws-sdk/apis/chatbot-2017-10-11.min.json +1 -1
- package/node_modules/aws-sdk/apis/imagebuilder-2019-12-02.min.json +6 -0
- package/node_modules/aws-sdk/apis/rds-2014-10-31.min.json +61 -50
- package/node_modules/aws-sdk/apis/sesv2-2019-09-27.min.json +117 -97
- package/node_modules/aws-sdk/apis/verifiedpermissions-2021-12-01.min.json +88 -22
- package/node_modules/aws-sdk/clients/apigateway.d.ts +1 -1
- package/node_modules/aws-sdk/clients/dynamodb.d.ts +4 -4
- package/node_modules/aws-sdk/clients/imagebuilder.d.ts +11 -3
- package/node_modules/aws-sdk/clients/mwaa.d.ts +1 -1
- package/node_modules/aws-sdk/clients/rds.d.ts +18 -8
- package/node_modules/aws-sdk/clients/redshift.d.ts +15 -15
- package/node_modules/aws-sdk/clients/sesv2.d.ts +27 -6
- package/node_modules/aws-sdk/clients/verifiedpermissions.d.ts +75 -26
- package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +1 -1
- package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +6 -6
- package/node_modules/aws-sdk/dist/aws-sdk.js +64 -53
- package/node_modules/aws-sdk/dist/aws-sdk.min.js +32 -32
- package/node_modules/aws-sdk/lib/core.js +1 -1
- package/node_modules/aws-sdk/lib/dynamodb/document_client.d.ts +2 -2
- package/node_modules/aws-sdk/package.json +3 -2
- package/node_modules/aws-sdk/scripts/warn-maintenance-mode.js +14 -0
- package/package.json +5 -5
@@ -708,11 +708,11 @@ declare class SESV2 extends Service {
|
|
708
708
|
*/
|
709
709
|
updateConfigurationSetEventDestination(callback?: (err: AWSError, data: SESV2.Types.UpdateConfigurationSetEventDestinationResponse) => void): Request<SESV2.Types.UpdateConfigurationSetEventDestinationResponse, AWSError>;
|
710
710
|
/**
|
711
|
-
* Updates a contact's preferences for a list.
|
711
|
+
* Updates a contact's preferences for a list. You must specify all existing topic preferences in the TopicPreferences object, not just the ones that need updating; otherwise, all your existing preferences will be removed.
|
712
712
|
*/
|
713
713
|
updateContact(params: SESV2.Types.UpdateContactRequest, callback?: (err: AWSError, data: SESV2.Types.UpdateContactResponse) => void): Request<SESV2.Types.UpdateContactResponse, AWSError>;
|
714
714
|
/**
|
715
|
-
* Updates a contact's preferences for a list.
|
715
|
+
* Updates a contact's preferences for a list. You must specify all existing topic preferences in the TopicPreferences object, not just the ones that need updating; otherwise, all your existing preferences will be removed.
|
716
716
|
*/
|
717
717
|
updateContact(callback?: (err: AWSError, data: SESV2.Types.UpdateContactResponse) => void): Request<SESV2.Types.UpdateContactResponse, AWSError>;
|
718
718
|
/**
|
@@ -1871,7 +1871,7 @@ declare namespace SESV2 {
|
|
1871
1871
|
*/
|
1872
1872
|
EnforcementStatus?: GeneralEnforcementStatus;
|
1873
1873
|
/**
|
1874
|
-
* Indicates whether or not your account has production access in the current Amazon Web Services Region. If the value is false, then your account is in the sandbox. When your account is in the sandbox, you can only send email to verified identities.
|
1874
|
+
* Indicates whether or not your account has production access in the current Amazon Web Services Region. If the value is false, then your account is in the sandbox. When your account is in the sandbox, you can only send email to verified identities. If the value is true, then your account has production access. When your account has production access, you can send email to any address. The sending quota and maximum sending rate for your account vary based on your specific use case.
|
1875
1875
|
*/
|
1876
1876
|
ProductionAccessEnabled?: Enabled;
|
1877
1877
|
/**
|
@@ -2913,9 +2913,26 @@ declare namespace SESV2 {
|
|
2913
2913
|
* The body of the message. You can specify an HTML version of the message, a text-only version of the message, or both.
|
2914
2914
|
*/
|
2915
2915
|
Body: Body;
|
2916
|
+
/**
|
2917
|
+
* The list of message headers that will be added to the email message.
|
2918
|
+
*/
|
2919
|
+
Headers?: MessageHeaderList;
|
2916
2920
|
}
|
2917
2921
|
export type MessageContent = string;
|
2918
2922
|
export type MessageData = string;
|
2923
|
+
export interface MessageHeader {
|
2924
|
+
/**
|
2925
|
+
* The name of the message header. The message header name has to meet the following criteria: Can contain any printable ASCII character (33 - 126) except for colon (:). Can contain no more than 126 characters.
|
2926
|
+
*/
|
2927
|
+
Name: MessageHeaderName;
|
2928
|
+
/**
|
2929
|
+
* The value of the message header. The message header value has to meet the following criteria: Can contain any printable ASCII character. Can contain no more than 870 characters.
|
2930
|
+
*/
|
2931
|
+
Value: MessageHeaderValue;
|
2932
|
+
}
|
2933
|
+
export type MessageHeaderList = MessageHeader[];
|
2934
|
+
export type MessageHeaderName = string;
|
2935
|
+
export type MessageHeaderValue = string;
|
2919
2936
|
export interface MessageInsightsDataSource {
|
2920
2937
|
/**
|
2921
2938
|
* Represents the start date for the export interval as a timestamp. The start date is inclusive.
|
@@ -3119,7 +3136,7 @@ declare namespace SESV2 {
|
|
3119
3136
|
*/
|
3120
3137
|
AdditionalContactEmailAddresses?: AdditionalContactEmailAddresses;
|
3121
3138
|
/**
|
3122
|
-
* Indicates whether or not your account should have production access in the current Amazon Web Services Region. If the value is false, then your account is in the sandbox. When your account is in the sandbox, you can only send email to verified identities.
|
3139
|
+
* Indicates whether or not your account should have production access in the current Amazon Web Services Region. If the value is false, then your account is in the sandbox. When your account is in the sandbox, you can only send email to verified identities. If the value is true, then your account has production access. When your account has production access, you can send email to any address. The sending quota and maximum sending rate for your account vary based on your specific use case.
|
3123
3140
|
*/
|
3124
3141
|
ProductionAccessEnabled?: EnabledWrapper;
|
3125
3142
|
}
|
@@ -3550,7 +3567,7 @@ declare namespace SESV2 {
|
|
3550
3567
|
*/
|
3551
3568
|
FeedbackForwardingEmailAddressIdentityArn?: AmazonResourceName;
|
3552
3569
|
/**
|
3553
|
-
* An object that contains the body of the message. You can send either a Simple message Raw message or a
|
3570
|
+
* An object that contains the body of the message. You can send either a Simple message, Raw message, or a Templated message.
|
3554
3571
|
*/
|
3555
3572
|
Content: EmailContent;
|
3556
3573
|
/**
|
@@ -3568,7 +3585,7 @@ declare namespace SESV2 {
|
|
3568
3585
|
}
|
3569
3586
|
export interface SendEmailResponse {
|
3570
3587
|
/**
|
3571
|
-
* A unique identifier for the message that is generated when the message is accepted. It's possible for Amazon SES to accept a message without sending it.
|
3588
|
+
* A unique identifier for the message that is generated when the message is accepted. It's possible for Amazon SES to accept a message without sending it. For example, this can happen when the message that you're trying to send has an attachment that contains a virus, or when you send a templated email that contains invalid personalization content.
|
3572
3589
|
*/
|
3573
3590
|
MessageId?: OutboundMessageId;
|
3574
3591
|
}
|
@@ -3707,6 +3724,10 @@ declare namespace SESV2 {
|
|
3707
3724
|
* An object that defines the values to use for message variables in the template. This object is a set of key-value pairs. Each key defines a message variable in the template. The corresponding value defines the value to use for that variable.
|
3708
3725
|
*/
|
3709
3726
|
TemplateData?: EmailTemplateData;
|
3727
|
+
/**
|
3728
|
+
* The list of message headers that will be added to the email message.
|
3729
|
+
*/
|
3730
|
+
Headers?: MessageHeaderList;
|
3710
3731
|
}
|
3711
3732
|
export type TemplateContent = string;
|
3712
3733
|
export interface TestRenderEmailTemplateRequest {
|
@@ -20,35 +20,35 @@ declare class VerifiedPermissions extends Service {
|
|
20
20
|
*/
|
21
21
|
batchIsAuthorized(callback?: (err: AWSError, data: VerifiedPermissions.Types.BatchIsAuthorizedOutput) => void): Request<VerifiedPermissions.Types.BatchIsAuthorizedOutput, AWSError>;
|
22
22
|
/**
|
23
|
-
* Creates a reference to an Amazon Cognito user pool as an external identity provider (IdP). After you create an identity source, you can use the identities provided by the IdP as proxies for the principal in authorization queries that use the IsAuthorizedWithToken operation. These identities take the form of tokens that contain claims about the user, such as IDs, attributes and group memberships. Amazon Cognito provides both identity tokens and access tokens, and Verified Permissions can use either or both. Any combination of identity and access tokens results in the same Cedar principal. Verified Permissions automatically translates the information about the identities into the standard Cedar attributes that can be evaluated by your policies. Because the Amazon Cognito identity and access tokens can contain different information, the tokens you choose to use determine which principal attributes are available to access when evaluating Cedar policies. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire. To reference a user from this identity source in your Cedar policies, use the following syntax. IdentityType::"<CognitoUserPoolIdentifier>|<CognitoClientId> Where IdentityType is the string that you provide to the PrincipalEntityType parameter for this operation. The CognitoUserPoolId and CognitoClientId are defined by the Amazon Cognito user pool. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
23
|
+
* Creates a reference to an Amazon Cognito user pool as an external identity provider (IdP). After you create an identity source, you can use the identities provided by the IdP as proxies for the principal in authorization queries that use the IsAuthorizedWithToken operation. These identities take the form of tokens that contain claims about the user, such as IDs, attributes and group memberships. Amazon Cognito provides both identity tokens and access tokens, and Verified Permissions can use either or both. Any combination of identity and access tokens results in the same Cedar principal. Verified Permissions automatically translates the information about the identities into the standard Cedar attributes that can be evaluated by your policies. Because the Amazon Cognito identity and access tokens can contain different information, the tokens you choose to use determine which principal attributes are available to access when evaluating Cedar policies. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire. To reference a user from this identity source in your Cedar policies, use the following syntax. IdentityType::"<CognitoUserPoolIdentifier>|<CognitoClientId> Where IdentityType is the string that you provide to the PrincipalEntityType parameter for this operation. The CognitoUserPoolId and CognitoClientId are defined by the Amazon Cognito user pool. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
24
24
|
*/
|
25
25
|
createIdentitySource(params: VerifiedPermissions.Types.CreateIdentitySourceInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.CreateIdentitySourceOutput) => void): Request<VerifiedPermissions.Types.CreateIdentitySourceOutput, AWSError>;
|
26
26
|
/**
|
27
|
-
* Creates a reference to an Amazon Cognito user pool as an external identity provider (IdP). After you create an identity source, you can use the identities provided by the IdP as proxies for the principal in authorization queries that use the IsAuthorizedWithToken operation. These identities take the form of tokens that contain claims about the user, such as IDs, attributes and group memberships. Amazon Cognito provides both identity tokens and access tokens, and Verified Permissions can use either or both. Any combination of identity and access tokens results in the same Cedar principal. Verified Permissions automatically translates the information about the identities into the standard Cedar attributes that can be evaluated by your policies. Because the Amazon Cognito identity and access tokens can contain different information, the tokens you choose to use determine which principal attributes are available to access when evaluating Cedar policies. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire. To reference a user from this identity source in your Cedar policies, use the following syntax. IdentityType::"<CognitoUserPoolIdentifier>|<CognitoClientId> Where IdentityType is the string that you provide to the PrincipalEntityType parameter for this operation. The CognitoUserPoolId and CognitoClientId are defined by the Amazon Cognito user pool. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
27
|
+
* Creates a reference to an Amazon Cognito user pool as an external identity provider (IdP). After you create an identity source, you can use the identities provided by the IdP as proxies for the principal in authorization queries that use the IsAuthorizedWithToken operation. These identities take the form of tokens that contain claims about the user, such as IDs, attributes and group memberships. Amazon Cognito provides both identity tokens and access tokens, and Verified Permissions can use either or both. Any combination of identity and access tokens results in the same Cedar principal. Verified Permissions automatically translates the information about the identities into the standard Cedar attributes that can be evaluated by your policies. Because the Amazon Cognito identity and access tokens can contain different information, the tokens you choose to use determine which principal attributes are available to access when evaluating Cedar policies. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire. To reference a user from this identity source in your Cedar policies, use the following syntax. IdentityType::"<CognitoUserPoolIdentifier>|<CognitoClientId> Where IdentityType is the string that you provide to the PrincipalEntityType parameter for this operation. The CognitoUserPoolId and CognitoClientId are defined by the Amazon Cognito user pool. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
28
28
|
*/
|
29
29
|
createIdentitySource(callback?: (err: AWSError, data: VerifiedPermissions.Types.CreateIdentitySourceOutput) => void): Request<VerifiedPermissions.Types.CreateIdentitySourceOutput, AWSError>;
|
30
30
|
/**
|
31
|
-
* Creates a Cedar policy and saves it in the specified policy store. You can create either a static policy or a policy linked to a policy template. To create a static policy, provide the Cedar policy text in the StaticPolicy section of the PolicyDefinition. To create a policy that is dynamically linked to a policy template, specify the policy template ID and the principal and resource to associate with this policy in the templateLinked section of the PolicyDefinition. If the policy template is ever updated, any policies linked to the policy template automatically use the updated template. Creating a policy causes it to be validated against the schema in the policy store. If the policy doesn't pass validation, the operation fails and the policy isn't stored. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
31
|
+
* Creates a Cedar policy and saves it in the specified policy store. You can create either a static policy or a policy linked to a policy template. To create a static policy, provide the Cedar policy text in the StaticPolicy section of the PolicyDefinition. To create a policy that is dynamically linked to a policy template, specify the policy template ID and the principal and resource to associate with this policy in the templateLinked section of the PolicyDefinition. If the policy template is ever updated, any policies linked to the policy template automatically use the updated template. Creating a policy causes it to be validated against the schema in the policy store. If the policy doesn't pass validation, the operation fails and the policy isn't stored. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
32
32
|
*/
|
33
33
|
createPolicy(params: VerifiedPermissions.Types.CreatePolicyInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.CreatePolicyOutput) => void): Request<VerifiedPermissions.Types.CreatePolicyOutput, AWSError>;
|
34
34
|
/**
|
35
|
-
* Creates a Cedar policy and saves it in the specified policy store. You can create either a static policy or a policy linked to a policy template. To create a static policy, provide the Cedar policy text in the StaticPolicy section of the PolicyDefinition. To create a policy that is dynamically linked to a policy template, specify the policy template ID and the principal and resource to associate with this policy in the templateLinked section of the PolicyDefinition. If the policy template is ever updated, any policies linked to the policy template automatically use the updated template. Creating a policy causes it to be validated against the schema in the policy store. If the policy doesn't pass validation, the operation fails and the policy isn't stored. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
35
|
+
* Creates a Cedar policy and saves it in the specified policy store. You can create either a static policy or a policy linked to a policy template. To create a static policy, provide the Cedar policy text in the StaticPolicy section of the PolicyDefinition. To create a policy that is dynamically linked to a policy template, specify the policy template ID and the principal and resource to associate with this policy in the templateLinked section of the PolicyDefinition. If the policy template is ever updated, any policies linked to the policy template automatically use the updated template. Creating a policy causes it to be validated against the schema in the policy store. If the policy doesn't pass validation, the operation fails and the policy isn't stored. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
36
36
|
*/
|
37
37
|
createPolicy(callback?: (err: AWSError, data: VerifiedPermissions.Types.CreatePolicyOutput) => void): Request<VerifiedPermissions.Types.CreatePolicyOutput, AWSError>;
|
38
38
|
/**
|
39
|
-
* Creates a policy store. A policy store is a container for policy resources. Although Cedar supports multiple namespaces, Verified Permissions currently supports only one namespace per policy store. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
39
|
+
* Creates a policy store. A policy store is a container for policy resources. Although Cedar supports multiple namespaces, Verified Permissions currently supports only one namespace per policy store. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
40
40
|
*/
|
41
41
|
createPolicyStore(params: VerifiedPermissions.Types.CreatePolicyStoreInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.CreatePolicyStoreOutput) => void): Request<VerifiedPermissions.Types.CreatePolicyStoreOutput, AWSError>;
|
42
42
|
/**
|
43
|
-
* Creates a policy store. A policy store is a container for policy resources. Although Cedar supports multiple namespaces, Verified Permissions currently supports only one namespace per policy store. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
43
|
+
* Creates a policy store. A policy store is a container for policy resources. Although Cedar supports multiple namespaces, Verified Permissions currently supports only one namespace per policy store. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
44
44
|
*/
|
45
45
|
createPolicyStore(callback?: (err: AWSError, data: VerifiedPermissions.Types.CreatePolicyStoreOutput) => void): Request<VerifiedPermissions.Types.CreatePolicyStoreOutput, AWSError>;
|
46
46
|
/**
|
47
|
-
* Creates a policy template. A template can use placeholders for the principal and resource. A template must be instantiated into a policy by associating it with specific principals and resources to use for the placeholders. That instantiated policy can then be considered in authorization decisions. The instantiated policy works identically to any other policy, except that it is dynamically linked to the template. If the template changes, then any policies that are linked to that template are immediately updated as well. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
47
|
+
* Creates a policy template. A template can use placeholders for the principal and resource. A template must be instantiated into a policy by associating it with specific principals and resources to use for the placeholders. That instantiated policy can then be considered in authorization decisions. The instantiated policy works identically to any other policy, except that it is dynamically linked to the template. If the template changes, then any policies that are linked to that template are immediately updated as well. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
48
48
|
*/
|
49
49
|
createPolicyTemplate(params: VerifiedPermissions.Types.CreatePolicyTemplateInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.CreatePolicyTemplateOutput) => void): Request<VerifiedPermissions.Types.CreatePolicyTemplateOutput, AWSError>;
|
50
50
|
/**
|
51
|
-
* Creates a policy template. A template can use placeholders for the principal and resource. A template must be instantiated into a policy by associating it with specific principals and resources to use for the placeholders. That instantiated policy can then be considered in authorization decisions. The instantiated policy works identically to any other policy, except that it is dynamically linked to the template. If the template changes, then any policies that are linked to that template are immediately updated as well. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
51
|
+
* Creates a policy template. A template can use placeholders for the principal and resource. A template must be instantiated into a policy by associating it with specific principals and resources to use for the placeholders. That instantiated policy can then be considered in authorization decisions. The instantiated policy works identically to any other policy, except that it is dynamically linked to the template. If the template changes, then any policies that are linked to that template are immediately updated as well. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
52
52
|
*/
|
53
53
|
createPolicyTemplate(callback?: (err: AWSError, data: VerifiedPermissions.Types.CreatePolicyTemplateOutput) => void): Request<VerifiedPermissions.Types.CreatePolicyTemplateOutput, AWSError>;
|
54
54
|
/**
|
@@ -172,43 +172,43 @@ declare class VerifiedPermissions extends Service {
|
|
172
172
|
*/
|
173
173
|
listPolicyTemplates(callback?: (err: AWSError, data: VerifiedPermissions.Types.ListPolicyTemplatesOutput) => void): Request<VerifiedPermissions.Types.ListPolicyTemplatesOutput, AWSError>;
|
174
174
|
/**
|
175
|
-
* Creates or updates the policy schema in the specified policy store. The schema is used to validate any Cedar policies and policy templates submitted to the policy store. Any changes to the schema validate only policies and templates submitted after the schema change. Existing policies and templates are not re-evaluated against the changed schema. If you later update a policy, then it is evaluated against the new schema at that time. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
175
|
+
* Creates or updates the policy schema in the specified policy store. The schema is used to validate any Cedar policies and policy templates submitted to the policy store. Any changes to the schema validate only policies and templates submitted after the schema change. Existing policies and templates are not re-evaluated against the changed schema. If you later update a policy, then it is evaluated against the new schema at that time. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
176
176
|
*/
|
177
177
|
putSchema(params: VerifiedPermissions.Types.PutSchemaInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.PutSchemaOutput) => void): Request<VerifiedPermissions.Types.PutSchemaOutput, AWSError>;
|
178
178
|
/**
|
179
|
-
* Creates or updates the policy schema in the specified policy store. The schema is used to validate any Cedar policies and policy templates submitted to the policy store. Any changes to the schema validate only policies and templates submitted after the schema change. Existing policies and templates are not re-evaluated against the changed schema. If you later update a policy, then it is evaluated against the new schema at that time. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
179
|
+
* Creates or updates the policy schema in the specified policy store. The schema is used to validate any Cedar policies and policy templates submitted to the policy store. Any changes to the schema validate only policies and templates submitted after the schema change. Existing policies and templates are not re-evaluated against the changed schema. If you later update a policy, then it is evaluated against the new schema at that time. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
180
180
|
*/
|
181
181
|
putSchema(callback?: (err: AWSError, data: VerifiedPermissions.Types.PutSchemaOutput) => void): Request<VerifiedPermissions.Types.PutSchemaOutput, AWSError>;
|
182
182
|
/**
|
183
|
-
* Updates the specified identity source to use a new identity provider (IdP) source, or to change the mapping of identities from the IdP to a different principal entity type. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
183
|
+
* Updates the specified identity source to use a new identity provider (IdP) source, or to change the mapping of identities from the IdP to a different principal entity type. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
184
184
|
*/
|
185
185
|
updateIdentitySource(params: VerifiedPermissions.Types.UpdateIdentitySourceInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdateIdentitySourceOutput) => void): Request<VerifiedPermissions.Types.UpdateIdentitySourceOutput, AWSError>;
|
186
186
|
/**
|
187
|
-
* Updates the specified identity source to use a new identity provider (IdP) source, or to change the mapping of identities from the IdP to a different principal entity type. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
187
|
+
* Updates the specified identity source to use a new identity provider (IdP) source, or to change the mapping of identities from the IdP to a different principal entity type. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
188
188
|
*/
|
189
189
|
updateIdentitySource(callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdateIdentitySourceOutput) => void): Request<VerifiedPermissions.Types.UpdateIdentitySourceOutput, AWSError>;
|
190
190
|
/**
|
191
|
-
* Modifies a Cedar static policy in the specified policy store. You can change only certain elements of the UpdatePolicyDefinition parameter. You can directly update only static policies. To change a template-linked policy, you must update the template instead, using UpdatePolicyTemplate. If policy validation is enabled in the policy store, then updating a static policy causes Verified Permissions to validate the policy against the schema in the policy store. If the updated static policy doesn't pass validation, the operation fails and the update isn't stored. When you edit a static policy,
|
191
|
+
* Modifies a Cedar static policy in the specified policy store. You can change only certain elements of the UpdatePolicyDefinition parameter. You can directly update only static policies. To change a template-linked policy, you must update the template instead, using UpdatePolicyTemplate. If policy validation is enabled in the policy store, then updating a static policy causes Verified Permissions to validate the policy against the schema in the policy store. If the updated static policy doesn't pass validation, the operation fails and the update isn't stored. When you edit a static policy, you can change only certain elements of a static policy: The action referenced by the policy. A condition clause, such as when and unless. You can't change these elements of a static policy: Changing a policy from a static policy to a template-linked policy. Changing the effect of a static policy from permit or forbid. The principal referenced by a static policy. The resource referenced by a static policy. To update a template-linked policy, you must update the template instead. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
192
192
|
*/
|
193
193
|
updatePolicy(params: VerifiedPermissions.Types.UpdatePolicyInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdatePolicyOutput) => void): Request<VerifiedPermissions.Types.UpdatePolicyOutput, AWSError>;
|
194
194
|
/**
|
195
|
-
* Modifies a Cedar static policy in the specified policy store. You can change only certain elements of the UpdatePolicyDefinition parameter. You can directly update only static policies. To change a template-linked policy, you must update the template instead, using UpdatePolicyTemplate. If policy validation is enabled in the policy store, then updating a static policy causes Verified Permissions to validate the policy against the schema in the policy store. If the updated static policy doesn't pass validation, the operation fails and the update isn't stored. When you edit a static policy,
|
195
|
+
* Modifies a Cedar static policy in the specified policy store. You can change only certain elements of the UpdatePolicyDefinition parameter. You can directly update only static policies. To change a template-linked policy, you must update the template instead, using UpdatePolicyTemplate. If policy validation is enabled in the policy store, then updating a static policy causes Verified Permissions to validate the policy against the schema in the policy store. If the updated static policy doesn't pass validation, the operation fails and the update isn't stored. When you edit a static policy, you can change only certain elements of a static policy: The action referenced by the policy. A condition clause, such as when and unless. You can't change these elements of a static policy: Changing a policy from a static policy to a template-linked policy. Changing the effect of a static policy from permit or forbid. The principal referenced by a static policy. The resource referenced by a static policy. To update a template-linked policy, you must update the template instead. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
196
196
|
*/
|
197
197
|
updatePolicy(callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdatePolicyOutput) => void): Request<VerifiedPermissions.Types.UpdatePolicyOutput, AWSError>;
|
198
198
|
/**
|
199
|
-
* Modifies the validation setting for a policy store. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
199
|
+
* Modifies the validation setting for a policy store. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
200
200
|
*/
|
201
201
|
updatePolicyStore(params: VerifiedPermissions.Types.UpdatePolicyStoreInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdatePolicyStoreOutput) => void): Request<VerifiedPermissions.Types.UpdatePolicyStoreOutput, AWSError>;
|
202
202
|
/**
|
203
|
-
* Modifies the validation setting for a policy store. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
203
|
+
* Modifies the validation setting for a policy store. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
204
204
|
*/
|
205
205
|
updatePolicyStore(callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdatePolicyStoreOutput) => void): Request<VerifiedPermissions.Types.UpdatePolicyStoreOutput, AWSError>;
|
206
206
|
/**
|
207
|
-
* Updates the specified policy template. You can update only the description and the some elements of the policyBody. Changes you make to the policy template content are immediately (within the constraints of eventual consistency) reflected in authorization decisions that involve all template-linked policies instantiated from this template. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
207
|
+
* Updates the specified policy template. You can update only the description and the some elements of the policyBody. Changes you make to the policy template content are immediately (within the constraints of eventual consistency) reflected in authorization decisions that involve all template-linked policies instantiated from this template. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
208
208
|
*/
|
209
209
|
updatePolicyTemplate(params: VerifiedPermissions.Types.UpdatePolicyTemplateInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdatePolicyTemplateOutput) => void): Request<VerifiedPermissions.Types.UpdatePolicyTemplateOutput, AWSError>;
|
210
210
|
/**
|
211
|
-
* Updates the specified policy template. You can update only the description and the some elements of the policyBody. Changes you make to the policy template content are immediately (within the constraints of eventual consistency) reflected in authorization decisions that involve all template-linked policies instantiated from this template. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
211
|
+
* Updates the specified policy template. You can update only the description and the some elements of the policyBody. Changes you make to the policy template content are immediately (within the constraints of eventual consistency) reflected in authorization decisions that involve all template-linked policies instantiated from this template. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
212
212
|
*/
|
213
213
|
updatePolicyTemplate(callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdatePolicyTemplateOutput) => void): Request<VerifiedPermissions.Types.UpdatePolicyTemplateOutput, AWSError>;
|
214
214
|
}
|
@@ -323,12 +323,52 @@ declare namespace VerifiedPermissions {
|
|
323
323
|
*/
|
324
324
|
clientIds?: ClientIds;
|
325
325
|
}
|
326
|
+
export interface CognitoUserPoolConfigurationDetail {
|
327
|
+
/**
|
328
|
+
* The Amazon Resource Name (ARN) of the Amazon Cognito user pool that contains the identities to be authorized. Example: "userPoolArn": "arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5"
|
329
|
+
*/
|
330
|
+
userPoolArn: UserPoolArn;
|
331
|
+
/**
|
332
|
+
* The unique application client IDs that are associated with the specified Amazon Cognito user pool. Example: "clientIds": ["&ExampleCogClientId;"]
|
333
|
+
*/
|
334
|
+
clientIds: ClientIds;
|
335
|
+
/**
|
336
|
+
* The OpenID Connect (OIDC) issuer ID of the Amazon Cognito user pool that contains the identities to be authorized. Example: "issuer": "https://cognito-idp.us-east-1.amazonaws.com/us-east-1_1a2b3c4d5"
|
337
|
+
*/
|
338
|
+
issuer: Issuer;
|
339
|
+
}
|
340
|
+
export interface CognitoUserPoolConfigurationItem {
|
341
|
+
/**
|
342
|
+
* The Amazon Resource Name (ARN) of the Amazon Cognito user pool that contains the identities to be authorized. Example: "userPoolArn": "arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5"
|
343
|
+
*/
|
344
|
+
userPoolArn: UserPoolArn;
|
345
|
+
/**
|
346
|
+
* The unique application client IDs that are associated with the specified Amazon Cognito user pool. Example: "clientIds": ["&ExampleCogClientId;"]
|
347
|
+
*/
|
348
|
+
clientIds: ClientIds;
|
349
|
+
/**
|
350
|
+
* The OpenID Connect (OIDC) issuer ID of the Amazon Cognito user pool that contains the identities to be authorized. Example: "issuer": "https://cognito-idp.us-east-1.amazonaws.com/us-east-1_1a2b3c4d5"
|
351
|
+
*/
|
352
|
+
issuer: Issuer;
|
353
|
+
}
|
326
354
|
export interface Configuration {
|
327
355
|
/**
|
328
356
|
* Contains configuration details of a Amazon Cognito user pool that Verified Permissions can use as a source of authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool and one or more application client IDs. Example: "configuration":{"cognitoUserPoolConfiguration":{"userPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","clientIds": ["a1b2c3d4e5f6g7h8i9j0kalbmc"]}}
|
329
357
|
*/
|
330
358
|
cognitoUserPoolConfiguration?: CognitoUserPoolConfiguration;
|
331
359
|
}
|
360
|
+
export interface ConfigurationDetail {
|
361
|
+
/**
|
362
|
+
* Contains configuration details of a Amazon Cognito user pool that Verified Permissions can use as a source of authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool and one or more application client IDs. Example: "configuration":{"cognitoUserPoolConfiguration":{"userPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","clientIds": ["a1b2c3d4e5f6g7h8i9j0kalbmc"]}}
|
363
|
+
*/
|
364
|
+
cognitoUserPoolConfiguration?: CognitoUserPoolConfigurationDetail;
|
365
|
+
}
|
366
|
+
export interface ConfigurationItem {
|
367
|
+
/**
|
368
|
+
* Contains configuration details of a Amazon Cognito user pool that Verified Permissions can use as a source of authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool and one or more application client IDs. Example: "configuration":{"cognitoUserPoolConfiguration":{"userPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","clientIds": ["a1b2c3d4e5f6g7h8i9j0kalbmc"]}}
|
369
|
+
*/
|
370
|
+
cognitoUserPoolConfiguration?: CognitoUserPoolConfigurationItem;
|
371
|
+
}
|
332
372
|
export interface ContextDefinition {
|
333
373
|
/**
|
334
374
|
* An list of attributes that are needed to successfully evaluate an authorization request. Each attribute in this array must include a map of a data type and its value. Example: "contextMap":{"<KeyName1>":{"boolean":true},"<KeyName2>":{"long":1234}}
|
@@ -338,7 +378,7 @@ declare namespace VerifiedPermissions {
|
|
338
378
|
export type ContextMap = {[key: string]: AttributeValue};
|
339
379
|
export interface CreateIdentitySourceInput {
|
340
380
|
/**
|
341
|
-
* Specifies a unique, case-sensitive ID that you provide to ensure the idempotency of the request. This lets you safely retry the request without accidentally performing the same operation a second time. Passing the same value to a later call to an operation requires that you also pass the same value for all other parameters. We recommend that you use a UUID type of value.. If you don't provide this value, then Amazon Web Services generates a random one for you. If you retry the operation with the same ClientToken, but with different parameters, the retry fails with an
|
381
|
+
* Specifies a unique, case-sensitive ID that you provide to ensure the idempotency of the request. This lets you safely retry the request without accidentally performing the same operation a second time. Passing the same value to a later call to an operation requires that you also pass the same value for all other parameters. We recommend that you use a UUID type of value.. If you don't provide this value, then Amazon Web Services generates a random one for you. If you retry the operation with the same ClientToken, but with different parameters, the retry fails with an ConflictException error. Verified Permissions recognizes a ClientToken for eight hours. After eight hours, the next request with the same parameters performs the operation again regardless of the value of ClientToken.
|
342
382
|
*/
|
343
383
|
clientToken?: IdempotencyToken;
|
344
384
|
/**
|
@@ -374,7 +414,7 @@ declare namespace VerifiedPermissions {
|
|
374
414
|
}
|
375
415
|
export interface CreatePolicyInput {
|
376
416
|
/**
|
377
|
-
* Specifies a unique, case-sensitive ID that you provide to ensure the idempotency of the request. This lets you safely retry the request without accidentally performing the same operation a second time. Passing the same value to a later call to an operation requires that you also pass the same value for all other parameters. We recommend that you use a UUID type of value.. If you don't provide this value, then Amazon Web Services generates a random one for you. If you retry the operation with the same ClientToken, but with different parameters, the retry fails with an
|
417
|
+
* Specifies a unique, case-sensitive ID that you provide to ensure the idempotency of the request. This lets you safely retry the request without accidentally performing the same operation a second time. Passing the same value to a later call to an operation requires that you also pass the same value for all other parameters. We recommend that you use a UUID type of value.. If you don't provide this value, then Amazon Web Services generates a random one for you. If you retry the operation with the same ClientToken, but with different parameters, the retry fails with an ConflictException error. Verified Permissions recognizes a ClientToken for eight hours. After eight hours, the next request with the same parameters performs the operation again regardless of the value of ClientToken.
|
378
418
|
*/
|
379
419
|
clientToken?: IdempotencyToken;
|
380
420
|
/**
|
@@ -418,7 +458,7 @@ declare namespace VerifiedPermissions {
|
|
418
458
|
}
|
419
459
|
export interface CreatePolicyStoreInput {
|
420
460
|
/**
|
421
|
-
* Specifies a unique, case-sensitive ID that you provide to ensure the idempotency of the request. This lets you safely retry the request without accidentally performing the same operation a second time. Passing the same value to a later call to an operation requires that you also pass the same value for all other parameters. We recommend that you use a UUID type of value.. If you don't provide this value, then Amazon Web Services generates a random one for you. If you retry the operation with the same ClientToken, but with different parameters, the retry fails with an
|
461
|
+
* Specifies a unique, case-sensitive ID that you provide to ensure the idempotency of the request. This lets you safely retry the request without accidentally performing the same operation a second time. Passing the same value to a later call to an operation requires that you also pass the same value for all other parameters. We recommend that you use a UUID type of value.. If you don't provide this value, then Amazon Web Services generates a random one for you. If you retry the operation with the same ClientToken, but with different parameters, the retry fails with an ConflictException error. Verified Permissions recognizes a ClientToken for eight hours. After eight hours, the next request with the same parameters performs the operation again regardless of the value of ClientToken.
|
422
462
|
*/
|
423
463
|
clientToken?: IdempotencyToken;
|
424
464
|
/**
|
@@ -450,7 +490,7 @@ declare namespace VerifiedPermissions {
|
|
450
490
|
}
|
451
491
|
export interface CreatePolicyTemplateInput {
|
452
492
|
/**
|
453
|
-
* Specifies a unique, case-sensitive ID that you provide to ensure the idempotency of the request. This lets you safely retry the request without accidentally performing the same operation a second time. Passing the same value to a later call to an operation requires that you also pass the same value for all other parameters. We recommend that you use a UUID type of value.. If you don't provide this value, then Amazon Web Services generates a random one for you. If you retry the operation with the same ClientToken, but with different parameters, the retry fails with an
|
493
|
+
* Specifies a unique, case-sensitive ID that you provide to ensure the idempotency of the request. This lets you safely retry the request without accidentally performing the same operation a second time. Passing the same value to a later call to an operation requires that you also pass the same value for all other parameters. We recommend that you use a UUID type of value.. If you don't provide this value, then Amazon Web Services generates a random one for you. If you retry the operation with the same ClientToken, but with different parameters, the retry fails with an ConflictException error. Verified Permissions recognizes a ClientToken for eight hours. After eight hours, the next request with the same parameters performs the operation again regardless of the value of ClientToken.
|
454
494
|
*/
|
455
495
|
clientToken?: IdempotencyToken;
|
456
496
|
/**
|
@@ -606,7 +646,7 @@ declare namespace VerifiedPermissions {
|
|
606
646
|
/**
|
607
647
|
* A structure that describes the configuration of the identity source.
|
608
648
|
*/
|
609
|
-
details
|
649
|
+
details?: IdentitySourceDetails;
|
610
650
|
/**
|
611
651
|
* The ID of the identity source.
|
612
652
|
*/
|
@@ -623,6 +663,10 @@ declare namespace VerifiedPermissions {
|
|
623
663
|
* The data type of principals generated for identities authenticated by this identity source.
|
624
664
|
*/
|
625
665
|
principalEntityType: PrincipalEntityType;
|
666
|
+
/**
|
667
|
+
* Contains configuration information about an identity source.
|
668
|
+
*/
|
669
|
+
configuration?: ConfigurationDetail;
|
626
670
|
}
|
627
671
|
export interface GetPolicyInput {
|
628
672
|
/**
|
@@ -799,7 +843,7 @@ declare namespace VerifiedPermissions {
|
|
799
843
|
/**
|
800
844
|
* A structure that contains the details of the associated identity provider (IdP).
|
801
845
|
*/
|
802
|
-
details
|
846
|
+
details?: IdentitySourceItemDetails;
|
803
847
|
/**
|
804
848
|
* The unique identifier of the identity source.
|
805
849
|
*/
|
@@ -816,6 +860,10 @@ declare namespace VerifiedPermissions {
|
|
816
860
|
* The Cedar entity type of the principals returned from the IdP associated with this identity source.
|
817
861
|
*/
|
818
862
|
principalEntityType: PrincipalEntityType;
|
863
|
+
/**
|
864
|
+
* Contains configuration information about an identity source.
|
865
|
+
*/
|
866
|
+
configuration?: ConfigurationItem;
|
819
867
|
}
|
820
868
|
export interface IdentitySourceItemDetails {
|
821
869
|
/**
|
@@ -882,11 +930,11 @@ declare namespace VerifiedPermissions {
|
|
882
930
|
*/
|
883
931
|
policyStoreId: PolicyStoreId;
|
884
932
|
/**
|
885
|
-
* Specifies an identity token for the principal to be authorized. This token is provided to you by the identity provider (IdP) associated with the specified identity source. You must specify either an
|
933
|
+
* Specifies an identity token for the principal to be authorized. This token is provided to you by the identity provider (IdP) associated with the specified identity source. You must specify either an accessToken, an identityToken, or both. Must be an ID token. Verified Permissions returns an error if the token_use claim in the submitted token isn't id.
|
886
934
|
*/
|
887
935
|
identityToken?: Token;
|
888
936
|
/**
|
889
|
-
* Specifies an access token for the principal to be authorized. This token is provided to you by the identity provider (IdP) associated with the specified identity source. You must specify either an
|
937
|
+
* Specifies an access token for the principal to be authorized. This token is provided to you by the identity provider (IdP) associated with the specified identity source. You must specify either an accessToken, an identityToken, or both. Must be an access token. Verified Permissions returns an error if the token_use claim in the submitted token isn't access.
|
890
938
|
*/
|
891
939
|
accessToken?: Token;
|
892
940
|
/**
|
@@ -920,6 +968,7 @@ declare namespace VerifiedPermissions {
|
|
920
968
|
*/
|
921
969
|
errors: EvaluationErrorList;
|
922
970
|
}
|
971
|
+
export type Issuer = string;
|
923
972
|
export interface ListIdentitySourcesInput {
|
924
973
|
/**
|
925
974
|
* Specifies the ID of the policy store that contains the identity sources that you want to list.
|