cdk-lambda-subminute 2.0.450 → 2.0.452
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +3 -3
- package/lib/cdk-lambda-subminute.js +3 -3
- package/node_modules/aws-sdk/README.md +1 -1
- package/node_modules/aws-sdk/apis/acm-pca-2017-08-22.waiters2.json +74 -62
- package/node_modules/aws-sdk/apis/application-signals-2024-04-15.min.json +15 -0
- package/node_modules/aws-sdk/apis/appsync-2017-07-25.min.json +4 -1
- package/node_modules/aws-sdk/apis/appsync-2017-07-25.paginators.json +60 -0
- package/node_modules/aws-sdk/apis/bedrock-runtime-2023-09-30.min.json +27 -5
- package/node_modules/aws-sdk/apis/cleanrooms-2022-02-17.min.json +1329 -202
- package/node_modules/aws-sdk/apis/cleanrooms-2022-02-17.paginators.json +18 -0
- package/node_modules/aws-sdk/apis/cleanroomsml-2023-09-06.min.json +305 -287
- package/node_modules/aws-sdk/apis/cleanroomsml-2023-09-06.waiters2.json +5 -0
- package/node_modules/aws-sdk/apis/codecommit-2015-04-13.min.json +7 -1
- package/node_modules/aws-sdk/apis/connect-2017-08-08.min.json +371 -171
- package/node_modules/aws-sdk/apis/connect-2017-08-08.paginators.json +18 -0
- package/node_modules/aws-sdk/apis/connect-contact-lens-2020-08-21.min.json +18 -1
- package/node_modules/aws-sdk/apis/datazone-2018-05-10.min.json +925 -400
- package/node_modules/aws-sdk/apis/datazone-2018-05-10.paginators.json +6 -0
- package/node_modules/aws-sdk/apis/ec2-2016-11-15.min.json +1161 -1028
- package/node_modules/aws-sdk/apis/ecr-2015-09-21.examples.json +186 -0
- package/node_modules/aws-sdk/apis/ecr-2015-09-21.min.json +177 -20
- package/node_modules/aws-sdk/apis/ecr-2015-09-21.paginators.json +9 -0
- package/node_modules/aws-sdk/apis/eks-2017-11-01.min.json +81 -63
- package/node_modules/aws-sdk/apis/elasticloadbalancingv2-2015-12-01.examples.json +33 -0
- package/node_modules/aws-sdk/apis/elasticloadbalancingv2-2015-12-01.min.json +113 -73
- package/node_modules/aws-sdk/apis/entityresolution-2018-05-10.min.json +162 -94
- package/node_modules/aws-sdk/apis/firehose-2015-08-04.min.json +226 -81
- package/node_modules/aws-sdk/apis/iotsitewise-2019-12-02.min.json +113 -98
- package/node_modules/aws-sdk/apis/ivs-2020-07-14.min.json +159 -154
- package/node_modules/aws-sdk/apis/ivschat-2020-07-14.min.json +144 -139
- package/node_modules/aws-sdk/apis/ivschat-2020-07-14.waiters2.json +5 -0
- package/node_modules/aws-sdk/apis/medialive-2017-10-14.min.json +327 -230
- package/node_modules/aws-sdk/apis/mediapackagev2-2022-12-25.min.json +0 -3
- package/node_modules/aws-sdk/apis/medical-imaging-2023-07-19.min.json +75 -35
- package/node_modules/aws-sdk/apis/metadata.json +0 -3
- package/node_modules/aws-sdk/apis/network-firewall-2020-11-12.min.json +7 -1
- package/node_modules/aws-sdk/apis/outposts-2019-12-03.min.json +11 -2
- package/node_modules/aws-sdk/apis/pinpoint-sms-voice-v2-2022-03-31.min.json +6 -0
- package/node_modules/aws-sdk/apis/redshift-serverless-2021-04-21.min.json +25 -21
- package/node_modules/aws-sdk/apis/states-2016-11-23.min.json +163 -128
- package/node_modules/aws-sdk/apis/taxsettings-2018-05-10.min.json +4 -1
- package/node_modules/aws-sdk/apis/timestream-query-2018-11-01.min.json +4 -1
- package/node_modules/aws-sdk/apis/workspaces-thin-client-2023-08-22.min.json +3 -0
- package/node_modules/aws-sdk/clients/acmpca.d.ts +12 -12
- package/node_modules/aws-sdk/clients/all.d.ts +0 -1
- package/node_modules/aws-sdk/clients/all.js +0 -1
- package/node_modules/aws-sdk/clients/applicationautoscaling.d.ts +1 -1
- package/node_modules/aws-sdk/clients/applicationsignals.d.ts +29 -20
- package/node_modules/aws-sdk/clients/bedrockruntime.d.ts +11 -8
- package/node_modules/aws-sdk/clients/cleanrooms.d.ts +1079 -16
- package/node_modules/aws-sdk/clients/cleanroomsml.d.ts +284 -257
- package/node_modules/aws-sdk/clients/cleanroomsml.js +1 -0
- package/node_modules/aws-sdk/clients/connect.d.ts +223 -6
- package/node_modules/aws-sdk/clients/connectcontactlens.d.ts +24 -3
- package/node_modules/aws-sdk/clients/datazone.d.ts +612 -64
- package/node_modules/aws-sdk/clients/dynamodb.d.ts +6 -6
- package/node_modules/aws-sdk/clients/ec2.d.ts +175 -20
- package/node_modules/aws-sdk/clients/ecr.d.ts +242 -8
- package/node_modules/aws-sdk/clients/eks.d.ts +27 -2
- package/node_modules/aws-sdk/clients/elbv2.d.ts +54 -8
- package/node_modules/aws-sdk/clients/entityresolution.d.ts +105 -22
- package/node_modules/aws-sdk/clients/firehose.d.ts +141 -0
- package/node_modules/aws-sdk/clients/iotsitewise.d.ts +37 -25
- package/node_modules/aws-sdk/clients/ivs.d.ts +229 -229
- package/node_modules/aws-sdk/clients/ivschat.d.ts +166 -166
- package/node_modules/aws-sdk/clients/ivschat.js +1 -0
- package/node_modules/aws-sdk/clients/medialive.d.ts +100 -4
- package/node_modules/aws-sdk/clients/mediapackagev2.d.ts +1 -1
- package/node_modules/aws-sdk/clients/medicalimaging.d.ts +38 -0
- package/node_modules/aws-sdk/clients/networkfirewall.d.ts +7 -7
- package/node_modules/aws-sdk/clients/outposts.d.ts +5 -0
- package/node_modules/aws-sdk/clients/pinpointsmsvoicev2.d.ts +56 -56
- package/node_modules/aws-sdk/clients/rds.d.ts +9 -9
- package/node_modules/aws-sdk/clients/redshiftserverless.d.ts +20 -3
- package/node_modules/aws-sdk/clients/sagemaker.d.ts +2 -2
- package/node_modules/aws-sdk/clients/secretsmanager.d.ts +7 -7
- package/node_modules/aws-sdk/clients/stepfunctions.d.ts +67 -9
- package/node_modules/aws-sdk/clients/timestreamquery.d.ts +1 -1
- package/node_modules/aws-sdk/clients/workspacesthinclient.d.ts +1 -1
- package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +2 -2
- package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +1835 -1858
- package/node_modules/aws-sdk/dist/aws-sdk.js +2085 -1380
- package/node_modules/aws-sdk/dist/aws-sdk.min.js +91 -91
- package/node_modules/aws-sdk/lib/config_service_placeholders.d.ts +0 -2
- package/node_modules/aws-sdk/lib/core.js +1 -1
- package/node_modules/aws-sdk/package.json +1 -1
- package/package.json +3 -3
- package/node_modules/aws-sdk/apis/mobile-2017-07-01.examples.json +0 -5
- package/node_modules/aws-sdk/apis/mobile-2017-07-01.min.json +0 -341
- package/node_modules/aws-sdk/apis/mobile-2017-07-01.paginators.json +0 -14
- package/node_modules/aws-sdk/clients/mobile.d.ts +0 -333
- package/node_modules/aws-sdk/clients/mobile.js +0 -18
@@ -640,7 +640,7 @@ declare namespace RedshiftServerless {
|
|
640
640
|
*/
|
641
641
|
namespaceName: NamespaceName;
|
642
642
|
/**
|
643
|
-
* The ARN of the IAM role to assume to run the scheduled action. This IAM role must have permission to run the Amazon Redshift Serverless API operation in the scheduled action. This IAM role must allow the Amazon Redshift scheduler to schedule creating snapshots. (Principal scheduler.redshift.amazonaws.com) to assume permissions on your behalf. For more information about the IAM role to use with the Amazon Redshift scheduler, see Using Identity-Based Policies for Amazon Redshift in the Amazon Redshift
|
643
|
+
* The ARN of the IAM role to assume to run the scheduled action. This IAM role must have permission to run the Amazon Redshift Serverless API operation in the scheduled action. This IAM role must allow the Amazon Redshift scheduler to schedule creating snapshots. (Principal scheduler.redshift.amazonaws.com) to assume permissions on your behalf. For more information about the IAM role to use with the Amazon Redshift scheduler, see Using Identity-Based Policies for Amazon Redshift in the Amazon Redshift Management Guide
|
644
644
|
*/
|
645
645
|
roleArn: IamRoleArn;
|
646
646
|
/**
|
@@ -774,6 +774,10 @@ declare namespace RedshiftServerless {
|
|
774
774
|
* The value that specifies whether to turn on enhanced virtual private cloud (VPC) routing, which forces Amazon Redshift Serverless to route traffic through your VPC instead of over the internet.
|
775
775
|
*/
|
776
776
|
enhancedVpcRouting?: Boolean;
|
777
|
+
/**
|
778
|
+
* The IP address type that the workgroup supports. Possible values are ipv4 and dualstack.
|
779
|
+
*/
|
780
|
+
ipAddressType?: IpAddressType;
|
777
781
|
/**
|
778
782
|
* The maximum data-warehouse capacity Amazon Redshift Serverless uses to serve queries. The max capacity is specified in RPUs.
|
779
783
|
*/
|
@@ -1171,6 +1175,7 @@ declare namespace RedshiftServerless {
|
|
1171
1175
|
export type IamRoleArn = string;
|
1172
1176
|
export type IamRoleArnList = IamRoleArn[];
|
1173
1177
|
export type Integer = number;
|
1178
|
+
export type IpAddressType = string;
|
1174
1179
|
export type KmsKeyId = string;
|
1175
1180
|
export interface ListCustomDomainAssociationsRequest {
|
1176
1181
|
/**
|
@@ -1543,6 +1548,10 @@ declare namespace RedshiftServerless {
|
|
1543
1548
|
* The availability Zone.
|
1544
1549
|
*/
|
1545
1550
|
availabilityZone?: String;
|
1551
|
+
/**
|
1552
|
+
* The IPv6 address of the network interface within the subnet.
|
1553
|
+
*/
|
1554
|
+
ipv6Address?: String;
|
1546
1555
|
/**
|
1547
1556
|
* The unique identifier of the network interface.
|
1548
1557
|
*/
|
@@ -1809,7 +1818,7 @@ declare namespace RedshiftServerless {
|
|
1809
1818
|
*/
|
1810
1819
|
nextInvocations?: NextInvocationsList;
|
1811
1820
|
/**
|
1812
|
-
* The ARN of the IAM role to assume to run the scheduled action. This IAM role must have permission to run the Amazon Redshift Serverless API operation in the scheduled action. This IAM role must allow the Amazon Redshift scheduler to schedule creating snapshots. (Principal scheduler.redshift.amazonaws.com) to assume permissions on your behalf. For more information about the IAM role to use with the Amazon Redshift scheduler, see Using Identity-Based Policies for Amazon Redshift in the Amazon Redshift
|
1821
|
+
* The ARN of the IAM role to assume to run the scheduled action. This IAM role must have permission to run the Amazon Redshift Serverless API operation in the scheduled action. This IAM role must allow the Amazon Redshift scheduler to schedule creating snapshots. (Principal scheduler.redshift.amazonaws.com) to assume permissions on your behalf. For more information about the IAM role to use with the Amazon Redshift scheduler, see Using Identity-Based Policies for Amazon Redshift in the Amazon Redshift Management Guide
|
1813
1822
|
*/
|
1814
1823
|
roleArn?: IamRoleArn;
|
1815
1824
|
/**
|
@@ -2177,7 +2186,7 @@ declare namespace RedshiftServerless {
|
|
2177
2186
|
*/
|
2178
2187
|
endTime?: Timestamp;
|
2179
2188
|
/**
|
2180
|
-
* The ARN of the IAM role to assume to run the scheduled action. This IAM role must have permission to run the Amazon Redshift Serverless API operation in the scheduled action. This IAM role must allow the Amazon Redshift scheduler to schedule creating snapshots (Principal scheduler.redshift.amazonaws.com) to assume permissions on your behalf. For more information about the IAM role to use with the Amazon Redshift scheduler, see Using Identity-Based Policies for Amazon Redshift in the Amazon Redshift
|
2189
|
+
* The ARN of the IAM role to assume to run the scheduled action. This IAM role must have permission to run the Amazon Redshift Serverless API operation in the scheduled action. This IAM role must allow the Amazon Redshift scheduler to schedule creating snapshots (Principal scheduler.redshift.amazonaws.com) to assume permissions on your behalf. For more information about the IAM role to use with the Amazon Redshift scheduler, see Using Identity-Based Policies for Amazon Redshift in the Amazon Redshift Management Guide
|
2181
2190
|
*/
|
2182
2191
|
roleArn?: IamRoleArn;
|
2183
2192
|
/**
|
@@ -2269,6 +2278,10 @@ declare namespace RedshiftServerless {
|
|
2269
2278
|
* The value that specifies whether to turn on enhanced virtual private cloud (VPC) routing, which forces Amazon Redshift Serverless to route traffic through your VPC.
|
2270
2279
|
*/
|
2271
2280
|
enhancedVpcRouting?: Boolean;
|
2281
|
+
/**
|
2282
|
+
* The IP address type that the workgroup supports. Possible values are ipv4 and dualstack.
|
2283
|
+
*/
|
2284
|
+
ipAddressType?: IpAddressType;
|
2272
2285
|
/**
|
2273
2286
|
* The maximum data-warehouse capacity Amazon Redshift Serverless uses to serve queries. The max capacity is specified in RPUs.
|
2274
2287
|
*/
|
@@ -2400,6 +2413,10 @@ declare namespace RedshiftServerless {
|
|
2400
2413
|
* The value that specifies whether to enable enhanced virtual private cloud (VPC) routing, which forces Amazon Redshift Serverless to route traffic through your VPC.
|
2401
2414
|
*/
|
2402
2415
|
enhancedVpcRouting?: Boolean;
|
2416
|
+
/**
|
2417
|
+
* The IP address type that the workgroup supports. Possible values are ipv4 and dualstack.
|
2418
|
+
*/
|
2419
|
+
ipAddressType?: IpAddressType;
|
2403
2420
|
/**
|
2404
2421
|
* The maximum data-warehouse capacity Amazon Redshift Serverless uses to serve queries. The max capacity is specified in RPUs.
|
2405
2422
|
*/
|
@@ -20673,7 +20673,7 @@ declare namespace SageMaker {
|
|
20673
20673
|
}
|
20674
20674
|
export type ProcessingInputs = ProcessingInput[];
|
20675
20675
|
export type ProcessingInstanceCount = number;
|
20676
|
-
export type ProcessingInstanceType = "ml.t3.medium"|"ml.t3.large"|"ml.t3.xlarge"|"ml.t3.2xlarge"|"ml.m4.xlarge"|"ml.m4.2xlarge"|"ml.m4.4xlarge"|"ml.m4.10xlarge"|"ml.m4.16xlarge"|"ml.c4.xlarge"|"ml.c4.2xlarge"|"ml.c4.4xlarge"|"ml.c4.8xlarge"|"ml.p2.xlarge"|"ml.p2.8xlarge"|"ml.p2.16xlarge"|"ml.p3.2xlarge"|"ml.p3.8xlarge"|"ml.p3.16xlarge"|"ml.c5.xlarge"|"ml.c5.2xlarge"|"ml.c5.4xlarge"|"ml.c5.9xlarge"|"ml.c5.18xlarge"|"ml.m5.large"|"ml.m5.xlarge"|"ml.m5.2xlarge"|"ml.m5.4xlarge"|"ml.m5.12xlarge"|"ml.m5.24xlarge"|"ml.r5.large"|"ml.r5.xlarge"|"ml.r5.2xlarge"|"ml.r5.4xlarge"|"ml.r5.8xlarge"|"ml.r5.12xlarge"|"ml.r5.16xlarge"|"ml.r5.24xlarge"|"ml.g4dn.xlarge"|"ml.g4dn.2xlarge"|"ml.g4dn.4xlarge"|"ml.g4dn.8xlarge"|"ml.g4dn.12xlarge"|"ml.g4dn.16xlarge"|string;
|
20676
|
+
export type ProcessingInstanceType = "ml.t3.medium"|"ml.t3.large"|"ml.t3.xlarge"|"ml.t3.2xlarge"|"ml.m4.xlarge"|"ml.m4.2xlarge"|"ml.m4.4xlarge"|"ml.m4.10xlarge"|"ml.m4.16xlarge"|"ml.c4.xlarge"|"ml.c4.2xlarge"|"ml.c4.4xlarge"|"ml.c4.8xlarge"|"ml.p2.xlarge"|"ml.p2.8xlarge"|"ml.p2.16xlarge"|"ml.p3.2xlarge"|"ml.p3.8xlarge"|"ml.p3.16xlarge"|"ml.c5.xlarge"|"ml.c5.2xlarge"|"ml.c5.4xlarge"|"ml.c5.9xlarge"|"ml.c5.18xlarge"|"ml.m5.large"|"ml.m5.xlarge"|"ml.m5.2xlarge"|"ml.m5.4xlarge"|"ml.m5.12xlarge"|"ml.m5.24xlarge"|"ml.r5.large"|"ml.r5.xlarge"|"ml.r5.2xlarge"|"ml.r5.4xlarge"|"ml.r5.8xlarge"|"ml.r5.12xlarge"|"ml.r5.16xlarge"|"ml.r5.24xlarge"|"ml.g4dn.xlarge"|"ml.g4dn.2xlarge"|"ml.g4dn.4xlarge"|"ml.g4dn.8xlarge"|"ml.g4dn.12xlarge"|"ml.g4dn.16xlarge"|"ml.g5.xlarge"|"ml.g5.2xlarge"|"ml.g5.4xlarge"|"ml.g5.8xlarge"|"ml.g5.16xlarge"|"ml.g5.12xlarge"|"ml.g5.24xlarge"|"ml.g5.48xlarge"|"ml.r5d.large"|"ml.r5d.xlarge"|"ml.r5d.2xlarge"|"ml.r5d.4xlarge"|"ml.r5d.8xlarge"|"ml.r5d.12xlarge"|"ml.r5d.16xlarge"|"ml.r5d.24xlarge"|string;
|
20677
20677
|
export interface ProcessingJob {
|
20678
20678
|
/**
|
20679
20679
|
* List of input configurations for the processing job.
|
@@ -23232,7 +23232,7 @@ declare namespace SageMaker {
|
|
23232
23232
|
}
|
23233
23233
|
export type TrainingInputMode = "Pipe"|"File"|"FastFile"|string;
|
23234
23234
|
export type TrainingInstanceCount = number;
|
23235
|
-
export type TrainingInstanceType = "ml.m4.xlarge"|"ml.m4.2xlarge"|"ml.m4.4xlarge"|"ml.m4.10xlarge"|"ml.m4.16xlarge"|"ml.g4dn.xlarge"|"ml.g4dn.2xlarge"|"ml.g4dn.4xlarge"|"ml.g4dn.8xlarge"|"ml.g4dn.12xlarge"|"ml.g4dn.16xlarge"|"ml.m5.large"|"ml.m5.xlarge"|"ml.m5.2xlarge"|"ml.m5.4xlarge"|"ml.m5.12xlarge"|"ml.m5.24xlarge"|"ml.c4.xlarge"|"ml.c4.2xlarge"|"ml.c4.4xlarge"|"ml.c4.8xlarge"|"ml.p2.xlarge"|"ml.p2.8xlarge"|"ml.p2.16xlarge"|"ml.p3.2xlarge"|"ml.p3.8xlarge"|"ml.p3.16xlarge"|"ml.p3dn.24xlarge"|"ml.p4d.24xlarge"|"ml.p4de.24xlarge"|"ml.p5.48xlarge"|"ml.c5.xlarge"|"ml.c5.2xlarge"|"ml.c5.4xlarge"|"ml.c5.9xlarge"|"ml.c5.18xlarge"|"ml.c5n.xlarge"|"ml.c5n.2xlarge"|"ml.c5n.4xlarge"|"ml.c5n.9xlarge"|"ml.c5n.18xlarge"|"ml.g5.xlarge"|"ml.g5.2xlarge"|"ml.g5.4xlarge"|"ml.g5.8xlarge"|"ml.g5.16xlarge"|"ml.g5.12xlarge"|"ml.g5.24xlarge"|"ml.g5.48xlarge"|"ml.trn1.2xlarge"|"ml.trn1.32xlarge"|"ml.trn1n.32xlarge"|"ml.m6i.large"|"ml.m6i.xlarge"|"ml.m6i.2xlarge"|"ml.m6i.4xlarge"|"ml.m6i.8xlarge"|"ml.m6i.12xlarge"|"ml.m6i.16xlarge"|"ml.m6i.24xlarge"|"ml.m6i.32xlarge"|"ml.c6i.xlarge"|"ml.c6i.2xlarge"|"ml.c6i.8xlarge"|"ml.c6i.4xlarge"|"ml.c6i.12xlarge"|"ml.c6i.16xlarge"|"ml.c6i.24xlarge"|"ml.c6i.32xlarge"|string;
|
23235
|
+
export type TrainingInstanceType = "ml.m4.xlarge"|"ml.m4.2xlarge"|"ml.m4.4xlarge"|"ml.m4.10xlarge"|"ml.m4.16xlarge"|"ml.g4dn.xlarge"|"ml.g4dn.2xlarge"|"ml.g4dn.4xlarge"|"ml.g4dn.8xlarge"|"ml.g4dn.12xlarge"|"ml.g4dn.16xlarge"|"ml.m5.large"|"ml.m5.xlarge"|"ml.m5.2xlarge"|"ml.m5.4xlarge"|"ml.m5.12xlarge"|"ml.m5.24xlarge"|"ml.c4.xlarge"|"ml.c4.2xlarge"|"ml.c4.4xlarge"|"ml.c4.8xlarge"|"ml.p2.xlarge"|"ml.p2.8xlarge"|"ml.p2.16xlarge"|"ml.p3.2xlarge"|"ml.p3.8xlarge"|"ml.p3.16xlarge"|"ml.p3dn.24xlarge"|"ml.p4d.24xlarge"|"ml.p4de.24xlarge"|"ml.p5.48xlarge"|"ml.c5.xlarge"|"ml.c5.2xlarge"|"ml.c5.4xlarge"|"ml.c5.9xlarge"|"ml.c5.18xlarge"|"ml.c5n.xlarge"|"ml.c5n.2xlarge"|"ml.c5n.4xlarge"|"ml.c5n.9xlarge"|"ml.c5n.18xlarge"|"ml.g5.xlarge"|"ml.g5.2xlarge"|"ml.g5.4xlarge"|"ml.g5.8xlarge"|"ml.g5.16xlarge"|"ml.g5.12xlarge"|"ml.g5.24xlarge"|"ml.g5.48xlarge"|"ml.trn1.2xlarge"|"ml.trn1.32xlarge"|"ml.trn1n.32xlarge"|"ml.m6i.large"|"ml.m6i.xlarge"|"ml.m6i.2xlarge"|"ml.m6i.4xlarge"|"ml.m6i.8xlarge"|"ml.m6i.12xlarge"|"ml.m6i.16xlarge"|"ml.m6i.24xlarge"|"ml.m6i.32xlarge"|"ml.c6i.xlarge"|"ml.c6i.2xlarge"|"ml.c6i.8xlarge"|"ml.c6i.4xlarge"|"ml.c6i.12xlarge"|"ml.c6i.16xlarge"|"ml.c6i.24xlarge"|"ml.c6i.32xlarge"|"ml.r5d.large"|"ml.r5d.xlarge"|"ml.r5d.2xlarge"|"ml.r5d.4xlarge"|"ml.r5d.8xlarge"|"ml.r5d.12xlarge"|"ml.r5d.16xlarge"|"ml.r5d.24xlarge"|"ml.t3.medium"|"ml.t3.large"|"ml.t3.xlarge"|"ml.t3.2xlarge"|"ml.r5.large"|"ml.r5.xlarge"|"ml.r5.2xlarge"|"ml.r5.4xlarge"|"ml.r5.8xlarge"|"ml.r5.12xlarge"|"ml.r5.16xlarge"|"ml.r5.24xlarge"|string;
|
23236
23236
|
export type TrainingInstanceTypes = TrainingInstanceType[];
|
23237
23237
|
export interface TrainingJob {
|
23238
23238
|
/**
|
@@ -28,11 +28,11 @@ declare class SecretsManager extends Service {
|
|
28
28
|
*/
|
29
29
|
cancelRotateSecret(callback?: (err: AWSError, data: SecretsManager.Types.CancelRotateSecretResponse) => void): Request<SecretsManager.Types.CancelRotateSecretResponse, AWSError>;
|
30
30
|
/**
|
31
|
-
* Creates a new secret. A secret can be a password, a set of credentials such as a user name and password, an OAuth token, or other secret information that you store in an encrypted form in Secrets Manager. The secret also includes the connection information to access a database or other service, which Secrets Manager doesn't encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information needed to manage the secret. For secrets that use managed rotation, you need to create the secret through the managing service. For more information, see Secrets Manager secrets managed by other Amazon Web Services services. For information about creating a secret in the console, see Create a secret. To create a secret, you can provide the secret value to be encrypted in either the SecretString parameter or the SecretBinary parameter, but not both. If you include SecretString or SecretBinary then Secrets Manager creates an initial secret version and automatically attaches the staging label AWSCURRENT to it. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the JSON you store in the SecretString matches the JSON structure of a database secret. If you don't specify an KMS encryption key, Secrets Manager uses the Amazon Web Services managed key aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant delay in returning the result. If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed KMS key. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:CreateSecret. If you include tags in the secret, you also need secretsmanager:TagResource. To add replica Regions, you must also have secretsmanager:ReplicateSecretToRegions. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. To encrypt the secret with a KMS key other than aws/secretsmanager, you need kms:GenerateDataKey and kms:Decrypt permission to the key.
|
31
|
+
* Creates a new secret. A secret can be a password, a set of credentials such as a user name and password, an OAuth token, or other secret information that you store in an encrypted form in Secrets Manager. The secret also includes the connection information to access a database or other service, which Secrets Manager doesn't encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information needed to manage the secret. For secrets that use managed rotation, you need to create the secret through the managing service. For more information, see Secrets Manager secrets managed by other Amazon Web Services services. For information about creating a secret in the console, see Create a secret. To create a secret, you can provide the secret value to be encrypted in either the SecretString parameter or the SecretBinary parameter, but not both. If you include SecretString or SecretBinary then Secrets Manager creates an initial secret version and automatically attaches the staging label AWSCURRENT to it. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the JSON you store in the SecretString matches the JSON structure of a database secret. If you don't specify an KMS encryption key, Secrets Manager uses the Amazon Web Services managed key aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant delay in returning the result. If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed KMS key. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:CreateSecret. If you include tags in the secret, you also need secretsmanager:TagResource. To add replica Regions, you must also have secretsmanager:ReplicateSecretToRegions. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. To encrypt the secret with a KMS key other than aws/secretsmanager, you need kms:GenerateDataKey and kms:Decrypt permission to the key. When you enter commands in a command shell, there is a risk of the command history being accessed or utilities having access to your command parameters. This is a concern if the command includes the value of a secret. Learn how to Mitigate the risks of using command-line tools to store Secrets Manager secrets.
|
32
32
|
*/
|
33
33
|
createSecret(params: SecretsManager.Types.CreateSecretRequest, callback?: (err: AWSError, data: SecretsManager.Types.CreateSecretResponse) => void): Request<SecretsManager.Types.CreateSecretResponse, AWSError>;
|
34
34
|
/**
|
35
|
-
* Creates a new secret. A secret can be a password, a set of credentials such as a user name and password, an OAuth token, or other secret information that you store in an encrypted form in Secrets Manager. The secret also includes the connection information to access a database or other service, which Secrets Manager doesn't encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information needed to manage the secret. For secrets that use managed rotation, you need to create the secret through the managing service. For more information, see Secrets Manager secrets managed by other Amazon Web Services services. For information about creating a secret in the console, see Create a secret. To create a secret, you can provide the secret value to be encrypted in either the SecretString parameter or the SecretBinary parameter, but not both. If you include SecretString or SecretBinary then Secrets Manager creates an initial secret version and automatically attaches the staging label AWSCURRENT to it. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the JSON you store in the SecretString matches the JSON structure of a database secret. If you don't specify an KMS encryption key, Secrets Manager uses the Amazon Web Services managed key aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant delay in returning the result. If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed KMS key. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:CreateSecret. If you include tags in the secret, you also need secretsmanager:TagResource. To add replica Regions, you must also have secretsmanager:ReplicateSecretToRegions. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. To encrypt the secret with a KMS key other than aws/secretsmanager, you need kms:GenerateDataKey and kms:Decrypt permission to the key.
|
35
|
+
* Creates a new secret. A secret can be a password, a set of credentials such as a user name and password, an OAuth token, or other secret information that you store in an encrypted form in Secrets Manager. The secret also includes the connection information to access a database or other service, which Secrets Manager doesn't encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information needed to manage the secret. For secrets that use managed rotation, you need to create the secret through the managing service. For more information, see Secrets Manager secrets managed by other Amazon Web Services services. For information about creating a secret in the console, see Create a secret. To create a secret, you can provide the secret value to be encrypted in either the SecretString parameter or the SecretBinary parameter, but not both. If you include SecretString or SecretBinary then Secrets Manager creates an initial secret version and automatically attaches the staging label AWSCURRENT to it. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the JSON you store in the SecretString matches the JSON structure of a database secret. If you don't specify an KMS encryption key, Secrets Manager uses the Amazon Web Services managed key aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant delay in returning the result. If the secret is in a different Amazon Web Services account from the credentials calling the API, then you can't use aws/secretsmanager to encrypt the secret, and you must create and use a customer managed KMS key. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:CreateSecret. If you include tags in the secret, you also need secretsmanager:TagResource. To add replica Regions, you must also have secretsmanager:ReplicateSecretToRegions. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. To encrypt the secret with a KMS key other than aws/secretsmanager, you need kms:GenerateDataKey and kms:Decrypt permission to the key. When you enter commands in a command shell, there is a risk of the command history being accessed or utilities having access to your command parameters. This is a concern if the command includes the value of a secret. Learn how to Mitigate the risks of using command-line tools to store Secrets Manager secrets.
|
36
36
|
*/
|
37
37
|
createSecret(callback?: (err: AWSError, data: SecretsManager.Types.CreateSecretResponse) => void): Request<SecretsManager.Types.CreateSecretResponse, AWSError>;
|
38
38
|
/**
|
@@ -108,11 +108,11 @@ declare class SecretsManager extends Service {
|
|
108
108
|
*/
|
109
109
|
putResourcePolicy(callback?: (err: AWSError, data: SecretsManager.Types.PutResourcePolicyResponse) => void): Request<SecretsManager.Types.PutResourcePolicyResponse, AWSError>;
|
110
110
|
/**
|
111
|
-
* Creates a new version with a new encrypted secret value and attaches it to the secret. The version can contain a new SecretString value or a new SecretBinary value. We recommend you avoid calling PutSecretValue at a sustained rate of more than once every 10 minutes. When you update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you call PutSecretValue more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. You can specify the staging labels to attach to the new version in VersionStages. If you don't include VersionStages, then Secrets Manager automatically moves the staging label AWSCURRENT to this version. If this operation creates the first version for the secret, then Secrets Manager automatically attaches the staging label AWSCURRENT to it. If this operation moves the staging label AWSCURRENT from another version to this version, then Secrets Manager also automatically moves the staging label AWSPREVIOUS to the version that AWSCURRENT was removed from. This operation is idempotent. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, and you specify the same secret data, the operation succeeds but does nothing. However, if the secret data is different, then the operation fails because you can't modify an existing version; you can only create new ones. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary, SecretString, or RotationToken because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:PutSecretValue. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager.
|
111
|
+
* Creates a new version with a new encrypted secret value and attaches it to the secret. The version can contain a new SecretString value or a new SecretBinary value. We recommend you avoid calling PutSecretValue at a sustained rate of more than once every 10 minutes. When you update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you call PutSecretValue more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. You can specify the staging labels to attach to the new version in VersionStages. If you don't include VersionStages, then Secrets Manager automatically moves the staging label AWSCURRENT to this version. If this operation creates the first version for the secret, then Secrets Manager automatically attaches the staging label AWSCURRENT to it. If this operation moves the staging label AWSCURRENT from another version to this version, then Secrets Manager also automatically moves the staging label AWSPREVIOUS to the version that AWSCURRENT was removed from. This operation is idempotent. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, and you specify the same secret data, the operation succeeds but does nothing. However, if the secret data is different, then the operation fails because you can't modify an existing version; you can only create new ones. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary, SecretString, or RotationToken because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:PutSecretValue. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. When you enter commands in a command shell, there is a risk of the command history being accessed or utilities having access to your command parameters. This is a concern if the command includes the value of a secret. Learn how to Mitigate the risks of using command-line tools to store Secrets Manager secrets.
|
112
112
|
*/
|
113
113
|
putSecretValue(params: SecretsManager.Types.PutSecretValueRequest, callback?: (err: AWSError, data: SecretsManager.Types.PutSecretValueResponse) => void): Request<SecretsManager.Types.PutSecretValueResponse, AWSError>;
|
114
114
|
/**
|
115
|
-
* Creates a new version with a new encrypted secret value and attaches it to the secret. The version can contain a new SecretString value or a new SecretBinary value. We recommend you avoid calling PutSecretValue at a sustained rate of more than once every 10 minutes. When you update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you call PutSecretValue more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. You can specify the staging labels to attach to the new version in VersionStages. If you don't include VersionStages, then Secrets Manager automatically moves the staging label AWSCURRENT to this version. If this operation creates the first version for the secret, then Secrets Manager automatically attaches the staging label AWSCURRENT to it. If this operation moves the staging label AWSCURRENT from another version to this version, then Secrets Manager also automatically moves the staging label AWSPREVIOUS to the version that AWSCURRENT was removed from. This operation is idempotent. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, and you specify the same secret data, the operation succeeds but does nothing. However, if the secret data is different, then the operation fails because you can't modify an existing version; you can only create new ones. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary, SecretString, or RotationToken because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:PutSecretValue. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager.
|
115
|
+
* Creates a new version with a new encrypted secret value and attaches it to the secret. The version can contain a new SecretString value or a new SecretBinary value. We recommend you avoid calling PutSecretValue at a sustained rate of more than once every 10 minutes. When you update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you call PutSecretValue more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. You can specify the staging labels to attach to the new version in VersionStages. If you don't include VersionStages, then Secrets Manager automatically moves the staging label AWSCURRENT to this version. If this operation creates the first version for the secret, then Secrets Manager automatically attaches the staging label AWSCURRENT to it. If this operation moves the staging label AWSCURRENT from another version to this version, then Secrets Manager also automatically moves the staging label AWSPREVIOUS to the version that AWSCURRENT was removed from. This operation is idempotent. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, and you specify the same secret data, the operation succeeds but does nothing. However, if the secret data is different, then the operation fails because you can't modify an existing version; you can only create new ones. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary, SecretString, or RotationToken because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:PutSecretValue. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. When you enter commands in a command shell, there is a risk of the command history being accessed or utilities having access to your command parameters. This is a concern if the command includes the value of a secret. Learn how to Mitigate the risks of using command-line tools to store Secrets Manager secrets.
|
116
116
|
*/
|
117
117
|
putSecretValue(callback?: (err: AWSError, data: SecretsManager.Types.PutSecretValueResponse) => void): Request<SecretsManager.Types.PutSecretValueResponse, AWSError>;
|
118
118
|
/**
|
@@ -172,11 +172,11 @@ declare class SecretsManager extends Service {
|
|
172
172
|
*/
|
173
173
|
untagResource(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
174
174
|
/**
|
175
|
-
* Modifies the details of a secret, including metadata and the secret value. To change the secret value, you can also use PutSecretValue. To change the rotation configuration of a secret, use RotateSecret instead. To change a secret so that it is managed by another service, you need to recreate the secret in that service. See Secrets Manager secrets managed by other Amazon Web Services services. We recommend you avoid calling UpdateSecret at a sustained rate of more than once every 10 minutes. When you call UpdateSecret to update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you update the secret value more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. If you include SecretString or SecretBinary to create a new secret version, Secrets Manager automatically moves the staging label AWSCURRENT to the new version. Then it attaches the label AWSPREVIOUS to the version that AWSCURRENT was removed from. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, the operation results in an error. You can't modify an existing version, you can only create a new version. To remove a version, remove all staging labels from it. See UpdateSecretVersionStage. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:UpdateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. If you use a customer managed key, you must also have kms:GenerateDataKey, kms:Encrypt, and kms:Decrypt permissions on the key. If you change the KMS key and you don't have kms:Encrypt permission to the new key, Secrets Manager does not re-
|
175
|
+
* Modifies the details of a secret, including metadata and the secret value. To change the secret value, you can also use PutSecretValue. To change the rotation configuration of a secret, use RotateSecret instead. To change a secret so that it is managed by another service, you need to recreate the secret in that service. See Secrets Manager secrets managed by other Amazon Web Services services. We recommend you avoid calling UpdateSecret at a sustained rate of more than once every 10 minutes. When you call UpdateSecret to update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you update the secret value more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. If you include SecretString or SecretBinary to create a new secret version, Secrets Manager automatically moves the staging label AWSCURRENT to the new version. Then it attaches the label AWSPREVIOUS to the version that AWSCURRENT was removed from. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, the operation results in an error. You can't modify an existing version, you can only create a new version. To remove a version, remove all staging labels from it. See UpdateSecretVersionStage. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:UpdateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. If you use a customer managed key, you must also have kms:GenerateDataKey, kms:Encrypt, and kms:Decrypt permissions on the key. If you change the KMS key and you don't have kms:Encrypt permission to the new key, Secrets Manager does not re-encrypt existing secret versions with the new key. For more information, see Secret encryption and decryption. When you enter commands in a command shell, there is a risk of the command history being accessed or utilities having access to your command parameters. This is a concern if the command includes the value of a secret. Learn how to Mitigate the risks of using command-line tools to store Secrets Manager secrets.
|
176
176
|
*/
|
177
177
|
updateSecret(params: SecretsManager.Types.UpdateSecretRequest, callback?: (err: AWSError, data: SecretsManager.Types.UpdateSecretResponse) => void): Request<SecretsManager.Types.UpdateSecretResponse, AWSError>;
|
178
178
|
/**
|
179
|
-
* Modifies the details of a secret, including metadata and the secret value. To change the secret value, you can also use PutSecretValue. To change the rotation configuration of a secret, use RotateSecret instead. To change a secret so that it is managed by another service, you need to recreate the secret in that service. See Secrets Manager secrets managed by other Amazon Web Services services. We recommend you avoid calling UpdateSecret at a sustained rate of more than once every 10 minutes. When you call UpdateSecret to update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you update the secret value more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. If you include SecretString or SecretBinary to create a new secret version, Secrets Manager automatically moves the staging label AWSCURRENT to the new version. Then it attaches the label AWSPREVIOUS to the version that AWSCURRENT was removed from. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, the operation results in an error. You can't modify an existing version, you can only create a new version. To remove a version, remove all staging labels from it. See UpdateSecretVersionStage. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:UpdateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. If you use a customer managed key, you must also have kms:GenerateDataKey, kms:Encrypt, and kms:Decrypt permissions on the key. If you change the KMS key and you don't have kms:Encrypt permission to the new key, Secrets Manager does not re-
|
179
|
+
* Modifies the details of a secret, including metadata and the secret value. To change the secret value, you can also use PutSecretValue. To change the rotation configuration of a secret, use RotateSecret instead. To change a secret so that it is managed by another service, you need to recreate the secret in that service. See Secrets Manager secrets managed by other Amazon Web Services services. We recommend you avoid calling UpdateSecret at a sustained rate of more than once every 10 minutes. When you call UpdateSecret to update the secret value, Secrets Manager creates a new version of the secret. Secrets Manager removes outdated versions when there are more than 100, but it does not remove versions created less than 24 hours ago. If you update the secret value more than once every 10 minutes, you create more versions than Secrets Manager removes, and you will reach the quota for secret versions. If you include SecretString or SecretBinary to create a new secret version, Secrets Manager automatically moves the staging label AWSCURRENT to the new version. Then it attaches the label AWSPREVIOUS to the version that AWSCURRENT was removed from. If you call this operation with a ClientRequestToken that matches an existing version's VersionId, the operation results in an error. You can't modify an existing version, you can only create a new version. To remove a version, remove all staging labels from it. See UpdateSecretVersionStage. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters except SecretBinary or SecretString because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:UpdateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. If you use a customer managed key, you must also have kms:GenerateDataKey, kms:Encrypt, and kms:Decrypt permissions on the key. If you change the KMS key and you don't have kms:Encrypt permission to the new key, Secrets Manager does not re-encrypt existing secret versions with the new key. For more information, see Secret encryption and decryption. When you enter commands in a command shell, there is a risk of the command history being accessed or utilities having access to your command parameters. This is a concern if the command includes the value of a secret. Learn how to Mitigate the risks of using command-line tools to store Secrets Manager secrets.
|
180
180
|
*/
|
181
181
|
updateSecret(callback?: (err: AWSError, data: SecretsManager.Types.UpdateSecretResponse) => void): Request<SecretsManager.Types.UpdateSecretResponse, AWSError>;
|
182
182
|
/**
|
@@ -1079,7 +1079,7 @@ declare namespace SecretsManager {
|
|
1079
1079
|
*/
|
1080
1080
|
Description?: DescriptionType;
|
1081
1081
|
/**
|
1082
|
-
* The ARN, key ID, or alias of the KMS key that Secrets Manager uses to encrypt new secret versions as well as any existing versions with the staging labels AWSCURRENT, AWSPENDING, or AWSPREVIOUS. If you don't have kms:Encrypt permission to the new key, Secrets Manager does not re-
|
1082
|
+
* The ARN, key ID, or alias of the KMS key that Secrets Manager uses to encrypt new secret versions as well as any existing versions with the staging labels AWSCURRENT, AWSPENDING, or AWSPREVIOUS. If you don't have kms:Encrypt permission to the new key, Secrets Manager does not re-encrypt existing secret versions with the new key. For more information about versions and staging labels, see Concepts: Version. A key alias is always prefixed by alias/, for example alias/aws/secretsmanager. For more information, see About aliases. If you set this to an empty string, Secrets Manager uses the Amazon Web Services managed key aws/secretsmanager. If this key doesn't already exist in your account, then Secrets Manager creates it for you automatically. All users and roles in the Amazon Web Services account automatically have access to use aws/secretsmanager. Creating aws/secretsmanager can result in a one-time significant delay in returning the result. You can only use the Amazon Web Services managed key aws/secretsmanager if you call this operation using credentials from the same Amazon Web Services account that owns the secret. If the secret is in a different account, then you must use a customer managed key and provide the ARN of that KMS key in this field. The user making the call must have permissions to both the secret and the KMS key in their respective accounts.
|
1083
1083
|
*/
|
1084
1084
|
KmsKeyId?: KmsKeyIdType;
|
1085
1085
|
/**
|
@@ -20,11 +20,11 @@ declare class StepFunctions extends Service {
|
|
20
20
|
*/
|
21
21
|
createActivity(callback?: (err: AWSError, data: StepFunctions.Types.CreateActivityOutput) => void): Request<StepFunctions.Types.CreateActivityOutput, AWSError>;
|
22
22
|
/**
|
23
|
-
* Creates a state machine. A state machine consists of a collection of states that can do work (Task states), determine to which states to transition next (Choice states), stop an execution with an error (Fail states), and so on. State machines are specified using a JSON-based, structured language. For more information, see Amazon States Language in the Step Functions User Guide. If you set the publish parameter of this API action to true, it publishes version 1 as the first revision of the state machine. This operation is eventually consistent. The results are best effort and may not reflect very recent updates and changes. CreateStateMachine is an idempotent API. Subsequent requests won’t create a duplicate resource if it was already created. CreateStateMachine's idempotency check is based on the state machine name, definition, type, LoggingConfiguration, and
|
23
|
+
* Creates a state machine. A state machine consists of a collection of states that can do work (Task states), determine to which states to transition next (Choice states), stop an execution with an error (Fail states), and so on. State machines are specified using a JSON-based, structured language. For more information, see Amazon States Language in the Step Functions User Guide. If you set the publish parameter of this API action to true, it publishes version 1 as the first revision of the state machine. For additional control over security, you can encrypt your data using a customer-managed key for Step Functions state machines. You can configure a symmetric KMS key and data key reuse period when creating or updating a State Machine. The execution history and state machine definition will be encrypted with the key applied to the State Machine. This operation is eventually consistent. The results are best effort and may not reflect very recent updates and changes. CreateStateMachine is an idempotent API. Subsequent requests won’t create a duplicate resource if it was already created. CreateStateMachine's idempotency check is based on the state machine name, definition, type, LoggingConfiguration, TracingConfiguration, and EncryptionConfiguration The check is also based on the publish and versionDescription parameters. If a following request has a different roleArn or tags, Step Functions will ignore these differences and treat it as an idempotent request of the previous. In this case, roleArn and tags will not be updated, even if they are different.
|
24
24
|
*/
|
25
25
|
createStateMachine(params: StepFunctions.Types.CreateStateMachineInput, callback?: (err: AWSError, data: StepFunctions.Types.CreateStateMachineOutput) => void): Request<StepFunctions.Types.CreateStateMachineOutput, AWSError>;
|
26
26
|
/**
|
27
|
-
* Creates a state machine. A state machine consists of a collection of states that can do work (Task states), determine to which states to transition next (Choice states), stop an execution with an error (Fail states), and so on. State machines are specified using a JSON-based, structured language. For more information, see Amazon States Language in the Step Functions User Guide. If you set the publish parameter of this API action to true, it publishes version 1 as the first revision of the state machine. This operation is eventually consistent. The results are best effort and may not reflect very recent updates and changes. CreateStateMachine is an idempotent API. Subsequent requests won’t create a duplicate resource if it was already created. CreateStateMachine's idempotency check is based on the state machine name, definition, type, LoggingConfiguration, and
|
27
|
+
* Creates a state machine. A state machine consists of a collection of states that can do work (Task states), determine to which states to transition next (Choice states), stop an execution with an error (Fail states), and so on. State machines are specified using a JSON-based, structured language. For more information, see Amazon States Language in the Step Functions User Guide. If you set the publish parameter of this API action to true, it publishes version 1 as the first revision of the state machine. For additional control over security, you can encrypt your data using a customer-managed key for Step Functions state machines. You can configure a symmetric KMS key and data key reuse period when creating or updating a State Machine. The execution history and state machine definition will be encrypted with the key applied to the State Machine. This operation is eventually consistent. The results are best effort and may not reflect very recent updates and changes. CreateStateMachine is an idempotent API. Subsequent requests won’t create a duplicate resource if it was already created. CreateStateMachine's idempotency check is based on the state machine name, definition, type, LoggingConfiguration, TracingConfiguration, and EncryptionConfiguration The check is also based on the publish and versionDescription parameters. If a following request has a different roleArn or tags, Step Functions will ignore these differences and treat it as an idempotent request of the previous. In this case, roleArn and tags will not be updated, even if they are different.
|
28
28
|
*/
|
29
29
|
createStateMachine(callback?: (err: AWSError, data: StepFunctions.Types.CreateStateMachineOutput) => void): Request<StepFunctions.Types.CreateStateMachineOutput, AWSError>;
|
30
30
|
/**
|
@@ -204,11 +204,11 @@ declare class StepFunctions extends Service {
|
|
204
204
|
*/
|
205
205
|
redriveExecution(callback?: (err: AWSError, data: StepFunctions.Types.RedriveExecutionOutput) => void): Request<StepFunctions.Types.RedriveExecutionOutput, AWSError>;
|
206
206
|
/**
|
207
|
-
* Used by activity workers, Task states using the callback pattern, and optionally Task states using the job run pattern to report that the task identified by the taskToken failed.
|
207
|
+
* Used by activity workers, Task states using the callback pattern, and optionally Task states using the job run pattern to report that the task identified by the taskToken failed. For an execution with encryption enabled, Step Functions will encrypt the error and cause fields using the KMS key for the execution role. A caller can mark a task as fail without using any KMS permissions in the execution role if the caller provides a null value for both error and cause fields because no data needs to be encrypted.
|
208
208
|
*/
|
209
209
|
sendTaskFailure(params: StepFunctions.Types.SendTaskFailureInput, callback?: (err: AWSError, data: StepFunctions.Types.SendTaskFailureOutput) => void): Request<StepFunctions.Types.SendTaskFailureOutput, AWSError>;
|
210
210
|
/**
|
211
|
-
* Used by activity workers, Task states using the callback pattern, and optionally Task states using the job run pattern to report that the task identified by the taskToken failed.
|
211
|
+
* Used by activity workers, Task states using the callback pattern, and optionally Task states using the job run pattern to report that the task identified by the taskToken failed. For an execution with encryption enabled, Step Functions will encrypt the error and cause fields using the KMS key for the execution role. A caller can mark a task as fail without using any KMS permissions in the execution role if the caller provides a null value for both error and cause fields because no data needs to be encrypted.
|
212
212
|
*/
|
213
213
|
sendTaskFailure(callback?: (err: AWSError, data: StepFunctions.Types.SendTaskFailureOutput) => void): Request<StepFunctions.Types.SendTaskFailureOutput, AWSError>;
|
214
214
|
/**
|
@@ -244,11 +244,11 @@ declare class StepFunctions extends Service {
|
|
244
244
|
*/
|
245
245
|
startSyncExecution(callback?: (err: AWSError, data: StepFunctions.Types.StartSyncExecutionOutput) => void): Request<StepFunctions.Types.StartSyncExecutionOutput, AWSError>;
|
246
246
|
/**
|
247
|
-
* Stops an execution. This API action is not supported by EXPRESS state machines.
|
247
|
+
* Stops an execution. This API action is not supported by EXPRESS state machines. For an execution with encryption enabled, Step Functions will encrypt the error and cause fields using the KMS key for the execution role. A caller can stop an execution without using any KMS permissions in the execution role if the caller provides a null value for both error and cause fields because no data needs to be encrypted.
|
248
248
|
*/
|
249
249
|
stopExecution(params: StepFunctions.Types.StopExecutionInput, callback?: (err: AWSError, data: StepFunctions.Types.StopExecutionOutput) => void): Request<StepFunctions.Types.StopExecutionOutput, AWSError>;
|
250
250
|
/**
|
251
|
-
* Stops an execution. This API action is not supported by EXPRESS state machines.
|
251
|
+
* Stops an execution. This API action is not supported by EXPRESS state machines. For an execution with encryption enabled, Step Functions will encrypt the error and cause fields using the KMS key for the execution role. A caller can stop an execution without using any KMS permissions in the execution role if the caller provides a null value for both error and cause fields because no data needs to be encrypted.
|
252
252
|
*/
|
253
253
|
stopExecution(callback?: (err: AWSError, data: StepFunctions.Types.StopExecutionOutput) => void): Request<StepFunctions.Types.StopExecutionOutput, AWSError>;
|
254
254
|
/**
|
@@ -284,11 +284,11 @@ declare class StepFunctions extends Service {
|
|
284
284
|
*/
|
285
285
|
updateMapRun(callback?: (err: AWSError, data: StepFunctions.Types.UpdateMapRunOutput) => void): Request<StepFunctions.Types.UpdateMapRunOutput, AWSError>;
|
286
286
|
/**
|
287
|
-
* Updates an existing state machine by modifying its definition, roleArn, or
|
287
|
+
* Updates an existing state machine by modifying its definition, roleArn, loggingConfiguration, or EncryptionConfiguration. Running executions will continue to use the previous definition and roleArn. You must include at least one of definition or roleArn or you will receive a MissingRequiredParameter error. A qualified state machine ARN refers to a Distributed Map state defined within a state machine. For example, the qualified state machine ARN arn:partition:states:region:account-id:stateMachine:stateMachineName/mapStateLabel refers to a Distributed Map state with a label mapStateLabel in the state machine named stateMachineName. A qualified state machine ARN can either refer to a Distributed Map state defined within a state machine, a version ARN, or an alias ARN. The following are some examples of qualified and unqualified state machine ARNs: The following qualified state machine ARN refers to a Distributed Map state with a label mapStateLabel in a state machine named myStateMachine. arn:partition:states:region:account-id:stateMachine:myStateMachine/mapStateLabel If you provide a qualified state machine ARN that refers to a Distributed Map state, the request fails with ValidationException. The following qualified state machine ARN refers to an alias named PROD. arn:<partition>:states:<region>:<account-id>:stateMachine:<myStateMachine:PROD> If you provide a qualified state machine ARN that refers to a version ARN or an alias ARN, the request starts execution for that version or alias. The following unqualified state machine ARN refers to a state machine named myStateMachine. arn:<partition>:states:<region>:<account-id>:stateMachine:<myStateMachine> After you update your state machine, you can set the publish parameter to true in the same action to publish a new version. This way, you can opt-in to strict versioning of your state machine. Step Functions assigns monotonically increasing integers for state machine versions, starting at version number 1. All StartExecution calls within a few seconds use the updated definition and roleArn. Executions started immediately after you call UpdateStateMachine may use the previous state machine definition and roleArn.
|
288
288
|
*/
|
289
289
|
updateStateMachine(params: StepFunctions.Types.UpdateStateMachineInput, callback?: (err: AWSError, data: StepFunctions.Types.UpdateStateMachineOutput) => void): Request<StepFunctions.Types.UpdateStateMachineOutput, AWSError>;
|
290
290
|
/**
|
291
|
-
* Updates an existing state machine by modifying its definition, roleArn, or
|
291
|
+
* Updates an existing state machine by modifying its definition, roleArn, loggingConfiguration, or EncryptionConfiguration. Running executions will continue to use the previous definition and roleArn. You must include at least one of definition or roleArn or you will receive a MissingRequiredParameter error. A qualified state machine ARN refers to a Distributed Map state defined within a state machine. For example, the qualified state machine ARN arn:partition:states:region:account-id:stateMachine:stateMachineName/mapStateLabel refers to a Distributed Map state with a label mapStateLabel in the state machine named stateMachineName. A qualified state machine ARN can either refer to a Distributed Map state defined within a state machine, a version ARN, or an alias ARN. The following are some examples of qualified and unqualified state machine ARNs: The following qualified state machine ARN refers to a Distributed Map state with a label mapStateLabel in a state machine named myStateMachine. arn:partition:states:region:account-id:stateMachine:myStateMachine/mapStateLabel If you provide a qualified state machine ARN that refers to a Distributed Map state, the request fails with ValidationException. The following qualified state machine ARN refers to an alias named PROD. arn:<partition>:states:<region>:<account-id>:stateMachine:<myStateMachine:PROD> If you provide a qualified state machine ARN that refers to a version ARN or an alias ARN, the request starts execution for that version or alias. The following unqualified state machine ARN refers to a state machine named myStateMachine. arn:<partition>:states:<region>:<account-id>:stateMachine:<myStateMachine> After you update your state machine, you can set the publish parameter to true in the same action to publish a new version. This way, you can opt-in to strict versioning of your state machine. Step Functions assigns monotonically increasing integers for state machine versions, starting at version number 1. All StartExecution calls within a few seconds use the updated definition and roleArn. Executions started immediately after you call UpdateStateMachine may use the previous state machine definition and roleArn.
|
292
292
|
*/
|
293
293
|
updateStateMachine(callback?: (err: AWSError, data: StepFunctions.Types.UpdateStateMachineOutput) => void): Request<StepFunctions.Types.UpdateStateMachineOutput, AWSError>;
|
294
294
|
/**
|
@@ -430,6 +430,10 @@ declare namespace StepFunctions {
|
|
430
430
|
* The list of tags to add to a resource. An array of key-value pairs. For more information, see Using Cost Allocation Tags in the Amazon Web Services Billing and Cost Management User Guide, and Controlling Access Using IAM Tags. Tags may only contain Unicode letters, digits, white space, or these symbols: _ . : / = + - @.
|
431
431
|
*/
|
432
432
|
tags?: TagList;
|
433
|
+
/**
|
434
|
+
* Settings to configure server-side encryption.
|
435
|
+
*/
|
436
|
+
encryptionConfiguration?: EncryptionConfiguration;
|
433
437
|
}
|
434
438
|
export interface CreateActivityOutput {
|
435
439
|
/**
|
@@ -502,6 +506,10 @@ declare namespace StepFunctions {
|
|
502
506
|
* Sets description about the state machine version. You can only set the description if the publish parameter is set to true. Otherwise, if you set versionDescription, but publish to false, this API action throws ValidationException.
|
503
507
|
*/
|
504
508
|
versionDescription?: VersionDescription;
|
509
|
+
/**
|
510
|
+
* Settings to configure server-side encryption.
|
511
|
+
*/
|
512
|
+
encryptionConfiguration?: EncryptionConfiguration;
|
505
513
|
}
|
506
514
|
export interface CreateStateMachineOutput {
|
507
515
|
/**
|
@@ -569,12 +577,20 @@ declare namespace StepFunctions {
|
|
569
577
|
* The date the activity is created.
|
570
578
|
*/
|
571
579
|
creationDate: Timestamp;
|
580
|
+
/**
|
581
|
+
* Settings for configured server-side encryption.
|
582
|
+
*/
|
583
|
+
encryptionConfiguration?: EncryptionConfiguration;
|
572
584
|
}
|
573
585
|
export interface DescribeExecutionInput {
|
574
586
|
/**
|
575
587
|
* The Amazon Resource Name (ARN) of the execution to describe.
|
576
588
|
*/
|
577
589
|
executionArn: Arn;
|
590
|
+
/**
|
591
|
+
* If your state machine definition is encrypted with a KMS key, callers must have kms:Decrypt permission to decrypt the definition. Alternatively, you can call DescribeStateMachine API with includedData = METADATA_ONLY to get a successful response without the encrypted definition.
|
592
|
+
*/
|
593
|
+
includedData?: IncludedData;
|
578
594
|
}
|
579
595
|
export interface DescribeExecutionOutput {
|
580
596
|
/**
|
@@ -745,6 +761,10 @@ declare namespace StepFunctions {
|
|
745
761
|
* The Amazon Resource Name (ARN) of the execution you want state machine information for.
|
746
762
|
*/
|
747
763
|
executionArn: Arn;
|
764
|
+
/**
|
765
|
+
* If your state machine definition is encrypted with a KMS key, callers must have kms:Decrypt permission to decrypt the definition. Alternatively, you can call the API with includedData = METADATA_ONLY to get a successful response without the encrypted definition.
|
766
|
+
*/
|
767
|
+
includedData?: IncludedData;
|
748
768
|
}
|
749
769
|
export interface DescribeStateMachineForExecutionOutput {
|
750
770
|
/**
|
@@ -784,12 +804,20 @@ declare namespace StepFunctions {
|
|
784
804
|
* The revision identifier for the state machine. The first revision ID when you create the state machine is null. Use the state machine revisionId parameter to compare the revision of a state machine with the configuration of the state machine used for executions without performing a diff of the properties, such as definition and roleArn.
|
785
805
|
*/
|
786
806
|
revisionId?: RevisionId;
|
807
|
+
/**
|
808
|
+
* Settings to configure server-side encryption.
|
809
|
+
*/
|
810
|
+
encryptionConfiguration?: EncryptionConfiguration;
|
787
811
|
}
|
788
812
|
export interface DescribeStateMachineInput {
|
789
813
|
/**
|
790
814
|
* The Amazon Resource Name (ARN) of the state machine for which you want the information. If you specify a state machine version ARN, this API returns details about that version. The version ARN is a combination of state machine ARN and the version number separated by a colon (:). For example, stateMachineARN:1.
|
791
815
|
*/
|
792
816
|
stateMachineArn: Arn;
|
817
|
+
/**
|
818
|
+
* If your state machine definition is encrypted with a KMS key, callers must have kms:Decrypt permission to decrypt the definition. Alternatively, you can call the API with includedData = METADATA_ONLY to get a successful response without the encrypted definition. When calling a labelled ARN for an encrypted state machine, the includedData = METADATA_ONLY parameter will not apply because Step Functions needs to decrypt the entire state machine definition to get the Distributed Map state’s definition. In this case, the API caller needs to have kms:Decrypt permission.
|
819
|
+
*/
|
820
|
+
includedData?: IncludedData;
|
793
821
|
}
|
794
822
|
export interface DescribeStateMachineOutput {
|
795
823
|
/**
|
@@ -805,7 +833,7 @@ declare namespace StepFunctions {
|
|
805
833
|
*/
|
806
834
|
status?: StateMachineStatus;
|
807
835
|
/**
|
808
|
-
* The Amazon States Language definition of the state machine. See Amazon States Language.
|
836
|
+
* The Amazon States Language definition of the state machine. See Amazon States Language. If called with includedData = METADATA_ONLY, the returned definition will be {}.
|
809
837
|
*/
|
810
838
|
definition: Definition;
|
811
839
|
/**
|
@@ -837,8 +865,27 @@ declare namespace StepFunctions {
|
|
837
865
|
* The description of the state machine version.
|
838
866
|
*/
|
839
867
|
description?: VersionDescription;
|
868
|
+
/**
|
869
|
+
* Settings to configure server-side encryption.
|
870
|
+
*/
|
871
|
+
encryptionConfiguration?: EncryptionConfiguration;
|
840
872
|
}
|
841
873
|
export type Enabled = boolean;
|
874
|
+
export interface EncryptionConfiguration {
|
875
|
+
/**
|
876
|
+
* An alias, alias ARN, key ID, or key ARN of a symmetric encryption KMS key to encrypt data. To specify a KMS key in a different Amazon Web Services account, you must use the key ARN or alias ARN.
|
877
|
+
*/
|
878
|
+
kmsKeyId?: KmsKeyId;
|
879
|
+
/**
|
880
|
+
* Maximum duration that Step Functions will reuse data keys. When the period expires, Step Functions will call GenerateDataKey. Only applies to customer managed keys.
|
881
|
+
*/
|
882
|
+
kmsDataKeyReusePeriodSeconds?: KmsDataKeyReusePeriodSeconds;
|
883
|
+
/**
|
884
|
+
* Encryption type
|
885
|
+
*/
|
886
|
+
type: EncryptionType;
|
887
|
+
}
|
888
|
+
export type EncryptionType = "AWS_OWNED_KEY"|"CUSTOMER_MANAGED_KMS_KEY"|string;
|
842
889
|
export type EventId = number;
|
843
890
|
export interface ExecutionAbortedEventDetails {
|
844
891
|
/**
|
@@ -1145,6 +1192,7 @@ declare namespace StepFunctions {
|
|
1145
1192
|
export type Identity = string;
|
1146
1193
|
export type IncludeExecutionData = boolean;
|
1147
1194
|
export type IncludeExecutionDataGetExecutionHistory = boolean;
|
1195
|
+
export type IncludedData = "ALL_DATA"|"METADATA_ONLY"|string;
|
1148
1196
|
export interface InspectionData {
|
1149
1197
|
/**
|
1150
1198
|
* The raw state input.
|
@@ -1224,6 +1272,8 @@ declare namespace StepFunctions {
|
|
1224
1272
|
body?: HTTPBody;
|
1225
1273
|
}
|
1226
1274
|
export type InspectionLevel = "INFO"|"DEBUG"|"TRACE"|string;
|
1275
|
+
export type KmsDataKeyReusePeriodSeconds = number;
|
1276
|
+
export type KmsKeyId = string;
|
1227
1277
|
export interface LambdaFunctionFailedEventDetails {
|
1228
1278
|
/**
|
1229
1279
|
* The error code of the failure.
|
@@ -1774,6 +1824,10 @@ declare namespace StepFunctions {
|
|
1774
1824
|
* Passes the X-Ray trace header. The trace header can also be passed in the request payload.
|
1775
1825
|
*/
|
1776
1826
|
traceHeader?: TraceHeader;
|
1827
|
+
/**
|
1828
|
+
* If your state machine definition is encrypted with a KMS key, callers must have kms:Decrypt permission to decrypt the definition. Alternatively, you can call the API with includedData = METADATA_ONLY to get a successful response without the encrypted definition.
|
1829
|
+
*/
|
1830
|
+
includedData?: IncludedData;
|
1777
1831
|
}
|
1778
1832
|
export interface StartSyncExecutionOutput {
|
1779
1833
|
/**
|
@@ -2245,6 +2299,10 @@ declare namespace StepFunctions {
|
|
2245
2299
|
* An optional description of the state machine version to publish. You can only specify the versionDescription parameter if you've set publish to true.
|
2246
2300
|
*/
|
2247
2301
|
versionDescription?: VersionDescription;
|
2302
|
+
/**
|
2303
|
+
* Settings to configure server-side encryption.
|
2304
|
+
*/
|
2305
|
+
encryptionConfiguration?: EncryptionConfiguration;
|
2248
2306
|
}
|
2249
2307
|
export interface UpdateStateMachineOutput {
|
2250
2308
|
/**
|
@@ -875,7 +875,7 @@ declare namespace TimestreamQuery {
|
|
875
875
|
*/
|
876
876
|
MaxQueryTCU?: MaxQueryCapacity;
|
877
877
|
/**
|
878
|
-
* The pricing model for queries in an account.
|
878
|
+
* The pricing model for queries in an account. The QueryPricingModel parameter is used by several Timestream operations; however, the UpdateAccountSettings API operation doesn't recognize any values other than COMPUTE_UNITS.
|
879
879
|
*/
|
880
880
|
QueryPricingModel?: QueryPricingModel;
|
881
881
|
}
|
@@ -475,7 +475,7 @@ declare namespace WorkSpacesThinClient {
|
|
475
475
|
*/
|
476
476
|
tags?: TagsMap;
|
477
477
|
/**
|
478
|
-
*
|
478
|
+
* The tag keys and optional values for the newly created devices for this environment.
|
479
479
|
*/
|
480
480
|
deviceCreationTags?: DeviceCreationTagsMap;
|
481
481
|
}
|