cdk-lambda-subminute 2.0.409 → 2.0.410

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -200,11 +200,11 @@
200
200
  "input": {
201
201
  "type": "structure",
202
202
  "required": [
203
- "transactionHash",
204
203
  "network"
205
204
  ],
206
205
  "members": {
207
206
  "transactionHash": {},
207
+ "transactionId": {},
208
208
  "network": {}
209
209
  }
210
210
  },
@@ -364,7 +364,7 @@
364
364
  }
365
365
  },
366
366
  "confirmationStatusFilter": {
367
- "shape": "S1b"
367
+ "shape": "S1c"
368
368
  },
369
369
  "sort": {
370
370
  "type": "structure",
@@ -386,7 +386,7 @@
386
386
  ],
387
387
  "members": {
388
388
  "events": {
389
- "shape": "S1i"
389
+ "shape": "S1j"
390
390
  },
391
391
  "nextToken": {}
392
392
  }
@@ -491,7 +491,7 @@
491
491
  ],
492
492
  "members": {
493
493
  "events": {
494
- "shape": "S1i"
494
+ "shape": "S1j"
495
495
  },
496
496
  "nextToken": {}
497
497
  }
@@ -529,7 +529,7 @@
529
529
  "type": "integer"
530
530
  },
531
531
  "confirmationStatusFilter": {
532
- "shape": "S1b"
532
+ "shape": "S1c"
533
533
  }
534
534
  }
535
535
  },
@@ -550,6 +550,7 @@
550
550
  ],
551
551
  "members": {
552
552
  "transactionHash": {},
553
+ "transactionId": {},
553
554
  "network": {},
554
555
  "transactionTimestamp": {
555
556
  "type": "timestamp"
@@ -603,7 +604,7 @@
603
604
  "contractAddress": {}
604
605
  }
605
606
  },
606
- "S1b": {
607
+ "S1c": {
607
608
  "type": "structure",
608
609
  "required": [
609
610
  "include"
@@ -615,7 +616,7 @@
615
616
  }
616
617
  }
617
618
  },
618
- "S1i": {
619
+ "S1j": {
619
620
  "type": "list",
620
621
  "member": {
621
622
  "type": "structure",
@@ -193,7 +193,8 @@
193
193
  },
194
194
  "tags": {
195
195
  "shape": "S6"
196
- }
196
+ },
197
+ "returnableUntil": {}
197
198
  }
198
199
  }
199
200
  },
@@ -416,6 +417,29 @@
416
417
  }
417
418
  }
418
419
  },
420
+ "ReturnSavingsPlan": {
421
+ "http": {
422
+ "requestUri": "/ReturnSavingsPlan"
423
+ },
424
+ "input": {
425
+ "type": "structure",
426
+ "required": [
427
+ "savingsPlanId"
428
+ ],
429
+ "members": {
430
+ "savingsPlanId": {},
431
+ "clientToken": {
432
+ "idempotencyToken": true
433
+ }
434
+ }
435
+ },
436
+ "output": {
437
+ "type": "structure",
438
+ "members": {
439
+ "savingsPlanId": {}
440
+ }
441
+ }
442
+ },
419
443
  "TagResource": {
420
444
  "http": {
421
445
  "requestUri": "/TagResource"
@@ -710,6 +710,14 @@ declare namespace AccessAnalyzer {
710
710
  * The access control configuration is for an Amazon S3 directory bucket.
711
711
  */
712
712
  s3ExpressDirectoryBucket?: S3ExpressDirectoryBucketConfiguration;
713
+ /**
714
+ * The access control configuration is for a DynamoDB stream.
715
+ */
716
+ dynamodbStream?: DynamodbStreamConfiguration;
717
+ /**
718
+ * The access control configuration is for a DynamoDB table or index.
719
+ */
720
+ dynamodbTable?: DynamodbTableConfiguration;
713
721
  }
714
722
  export type ConfigurationsMap = {[key: string]: Configuration};
715
723
  export type ConfigurationsMapKey = string;
@@ -825,6 +833,20 @@ declare namespace AccessAnalyzer {
825
833
  */
826
834
  clientToken?: String;
827
835
  }
836
+ export interface DynamodbStreamConfiguration {
837
+ /**
838
+ * The proposed resource policy defining who can access or manage the DynamoDB stream.
839
+ */
840
+ streamPolicy?: DynamodbStreamPolicy;
841
+ }
842
+ export type DynamodbStreamPolicy = string;
843
+ export interface DynamodbTableConfiguration {
844
+ /**
845
+ * The proposed resource policy defining who can access or manage the DynamoDB table.
846
+ */
847
+ tablePolicy?: DynamodbTablePolicy;
848
+ }
849
+ export type DynamodbTablePolicy = string;
828
850
  export type EbsGroup = string;
829
851
  export type EbsGroupList = EbsGroup[];
830
852
  export interface EbsSnapshotConfiguration {
@@ -1776,7 +1798,7 @@ declare namespace AccessAnalyzer {
1776
1798
  export type ReasonSummaryList = ReasonSummary[];
1777
1799
  export type RegionList = String[];
1778
1800
  export type ResourceArn = string;
1779
- export type ResourceType = "AWS::S3::Bucket"|"AWS::IAM::Role"|"AWS::SQS::Queue"|"AWS::Lambda::Function"|"AWS::Lambda::LayerVersion"|"AWS::KMS::Key"|"AWS::SecretsManager::Secret"|"AWS::EFS::FileSystem"|"AWS::EC2::Snapshot"|"AWS::ECR::Repository"|"AWS::RDS::DBSnapshot"|"AWS::RDS::DBClusterSnapshot"|"AWS::SNS::Topic"|"AWS::S3Express::DirectoryBucket"|string;
1801
+ export type ResourceType = "AWS::S3::Bucket"|"AWS::IAM::Role"|"AWS::SQS::Queue"|"AWS::Lambda::Function"|"AWS::Lambda::LayerVersion"|"AWS::KMS::Key"|"AWS::SecretsManager::Secret"|"AWS::EFS::FileSystem"|"AWS::EC2::Snapshot"|"AWS::ECR::Repository"|"AWS::RDS::DBSnapshot"|"AWS::RDS::DBClusterSnapshot"|"AWS::SNS::Topic"|"AWS::S3Express::DirectoryBucket"|"AWS::DynamoDB::Table"|"AWS::DynamoDB::Stream"|string;
1780
1802
  export type RetiringPrincipal = string;
1781
1803
  export type RoleArn = string;
1782
1804
  export interface S3AccessPointConfiguration {
@@ -2141,7 +2163,7 @@ declare namespace AccessAnalyzer {
2141
2163
  */
2142
2164
  validatePolicyResourceType?: ValidatePolicyResourceType;
2143
2165
  }
2144
- export type ValidatePolicyResourceType = "AWS::S3::Bucket"|"AWS::S3::AccessPoint"|"AWS::S3::MultiRegionAccessPoint"|"AWS::S3ObjectLambda::AccessPoint"|"AWS::IAM::AssumeRolePolicyDocument"|string;
2166
+ export type ValidatePolicyResourceType = "AWS::S3::Bucket"|"AWS::S3::AccessPoint"|"AWS::S3::MultiRegionAccessPoint"|"AWS::S3ObjectLambda::AccessPoint"|"AWS::IAM::AssumeRolePolicyDocument"|"AWS::DynamoDB::Table"|string;
2145
2167
  export interface ValidatePolicyResponse {
2146
2168
  /**
2147
2169
  * The list of findings in a policy returned by IAM Access Analyzer based on its suite of policy checks.
@@ -3239,7 +3239,7 @@ declare namespace CodeBuild {
3239
3239
  export type WebhookBuildType = "BUILD"|"BUILD_BATCH"|string;
3240
3240
  export interface WebhookFilter {
3241
3241
  /**
3242
- * The type of webhook filter. There are six webhook filter types: EVENT, ACTOR_ACCOUNT_ID, HEAD_REF, BASE_REF, FILE_PATH, and COMMIT_MESSAGE. EVENT A webhook event triggers a build when the provided pattern matches one of six event types: PUSH, PULL_REQUEST_CREATED, PULL_REQUEST_UPDATED, PULL_REQUEST_CLOSED, PULL_REQUEST_REOPENED, and PULL_REQUEST_MERGED. The EVENT patterns are specified as a comma-separated string. For example, PUSH, PULL_REQUEST_CREATED, PULL_REQUEST_UPDATED filters all push, pull request created, and pull request updated events. The PULL_REQUEST_REOPENED works with GitHub and GitHub Enterprise only. ACTOR_ACCOUNT_ID A webhook event triggers a build when a GitHub, GitHub Enterprise, or Bitbucket account ID matches the regular expression pattern. HEAD_REF A webhook event triggers a build when the head reference matches the regular expression pattern. For example, refs/heads/branch-name and refs/tags/tag-name. Works with GitHub and GitHub Enterprise push, GitHub and GitHub Enterprise pull request, Bitbucket push, and Bitbucket pull request events. BASE_REF A webhook event triggers a build when the base reference matches the regular expression pattern. For example, refs/heads/branch-name. Works with pull request events only. FILE_PATH A webhook triggers a build when the path of a changed file matches the regular expression pattern. Works with GitHub and Bitbucket events push and pull requests events. Also works with GitHub Enterprise push events, but does not work with GitHub Enterprise pull request events. COMMIT_MESSAGE A webhook triggers a build when the head commit message matches the regular expression pattern. Works with GitHub and Bitbucket events push and pull requests events. Also works with GitHub Enterprise push events, but does not work with GitHub Enterprise pull request events.
3242
+ * The type of webhook filter. There are eight webhook filter types: EVENT, ACTOR_ACCOUNT_ID, HEAD_REF, BASE_REF, FILE_PATH, COMMIT_MESSAGE, TAG_NAME, and RELEASE_NAME. EVENT A webhook event triggers a build when the provided pattern matches one of eight event types: PUSH, PULL_REQUEST_CREATED, PULL_REQUEST_UPDATED, PULL_REQUEST_CLOSED, PULL_REQUEST_REOPENED, PULL_REQUEST_MERGED, RELEASED, and PRERELEASED. The EVENT patterns are specified as a comma-separated string. For example, PUSH, PULL_REQUEST_CREATED, PULL_REQUEST_UPDATED filters all push, pull request created, and pull request updated events. The PULL_REQUEST_REOPENED works with GitHub and GitHub Enterprise only. The RELEASED and PRERELEASED work with GitHub only. ACTOR_ACCOUNT_ID A webhook event triggers a build when a GitHub, GitHub Enterprise, or Bitbucket account ID matches the regular expression pattern. HEAD_REF A webhook event triggers a build when the head reference matches the regular expression pattern. For example, refs/heads/branch-name and refs/tags/tag-name. Works with GitHub and GitHub Enterprise push, GitHub and GitHub Enterprise pull request, Bitbucket push, and Bitbucket pull request events. BASE_REF A webhook event triggers a build when the base reference matches the regular expression pattern. For example, refs/heads/branch-name. Works with pull request events only. FILE_PATH A webhook triggers a build when the path of a changed file matches the regular expression pattern. Works with GitHub and Bitbucket events push and pull requests events. Also works with GitHub Enterprise push events, but does not work with GitHub Enterprise pull request events. COMMIT_MESSAGE A webhook triggers a build when the head commit message matches the regular expression pattern. Works with GitHub and Bitbucket events push and pull requests events. Also works with GitHub Enterprise push events, but does not work with GitHub Enterprise pull request events. TAG_NAME A webhook triggers a build when the tag name of the release matches the regular expression pattern. Works with RELEASED and PRERELEASED events only. RELEASE_NAME A webhook triggers a build when the release name matches the regular expression pattern. Works with RELEASED and PRERELEASED events only.
3243
3243
  */
3244
3244
  type: WebhookFilterType;
3245
3245
  /**
@@ -2318,7 +2318,7 @@ declare namespace Connect {
2318
2318
  */
2319
2319
  InstanceId: InstanceId;
2320
2320
  /**
2321
- * A valid resource type.
2321
+ * A valid resource type. To enable streaming for real-time analysis of contacts, use the following types: For chat contacts, use REAL_TIME_CONTACT_ANALYSIS_CHAT_SEGMENTS. For voice contacts, use REAL_TIME_CONTACT_ANALYSIS_VOICE_SEGMENTS. REAL_TIME_CONTACT_ANALYSIS_SEGMENTS is deprecated, but it is still supported and will apply only to VOICE channel contacts. Use REAL_TIME_CONTACT_ANALYSIS_VOICE_SEGMENTS for voice contacts moving forward. If you have previously associated a stream with REAL_TIME_CONTACT_ANALYSIS_SEGMENTS, no action is needed to update the stream to REAL_TIME_CONTACT_ANALYSIS_VOICE_SEGMENTS.
2322
2322
  */
2323
2323
  ResourceType: InstanceStorageResourceType;
2324
2324
  /**
@@ -6490,7 +6490,7 @@ declare namespace Connect {
6490
6490
  KinesisFirehoseConfig?: KinesisFirehoseConfig;
6491
6491
  }
6492
6492
  export type InstanceStorageConfigs = InstanceStorageConfig[];
6493
- export type InstanceStorageResourceType = "CHAT_TRANSCRIPTS"|"CALL_RECORDINGS"|"SCHEDULED_REPORTS"|"MEDIA_STREAMS"|"CONTACT_TRACE_RECORDS"|"AGENT_EVENTS"|"REAL_TIME_CONTACT_ANALYSIS_SEGMENTS"|"ATTACHMENTS"|"CONTACT_EVALUATIONS"|"SCREEN_RECORDINGS"|string;
6493
+ export type InstanceStorageResourceType = "CHAT_TRANSCRIPTS"|"CALL_RECORDINGS"|"SCHEDULED_REPORTS"|"MEDIA_STREAMS"|"CONTACT_TRACE_RECORDS"|"AGENT_EVENTS"|"REAL_TIME_CONTACT_ANALYSIS_SEGMENTS"|"ATTACHMENTS"|"CONTACT_EVALUATIONS"|"SCREEN_RECORDINGS"|"REAL_TIME_CONTACT_ANALYSIS_CHAT_SEGMENTS"|"REAL_TIME_CONTACT_ANALYSIS_VOICE_SEGMENTS"|string;
6494
6494
  export interface InstanceSummary {
6495
6495
  /**
6496
6496
  * The identifier of the instance.