Skip to content

Commit

Permalink
Updates SDK to v2.15.0
Browse files Browse the repository at this point in the history
  • Loading branch information
awstools committed Feb 16, 2017
1 parent d911f8d commit 5eec2b1
Show file tree
Hide file tree
Showing 18 changed files with 494 additions and 439 deletions.
12 changes: 12 additions & 0 deletions .changes/2.15.0.json
@@ -0,0 +1,12 @@
[
{
"type": "feature",
"category": "CognitoIdentity",
"description": "Allows createIdentityPool and updateIdentityPool API to set server side token check value on identity pool."
},
{
"type": "feature",
"category": "ConfigService",
"description": "AWS Config now supports a new test mode for the PutEvaluations API. Set the TestMode parameter to true in your custom rule to verify whether your AWS Lambda function will deliver evaluation results to AWS Config. No updates occur to your existing evaluations, and evaluation results are not sent to AWS Config."
}
]
6 changes: 5 additions & 1 deletion CHANGELOG.md
@@ -1,7 +1,11 @@
# Changelog for AWS SDK for JavaScript
<!--LATEST=2.14.0-->
<!--LATEST=2.15.0-->
<!--ENTRYINSERT-->

## 2.15.0
* feature: CognitoIdentity: Allows createIdentityPool and updateIdentityPool API to set server side token check value on identity pool.
* feature: ConfigService: AWS Config now supports a new test mode for the PutEvaluations API. Set the TestMode parameter to true in your custom rule to verify whether your AWS Lambda function will deliver evaluation results to AWS Config. No updates occur to your existing evaluations, and evaluation results are not sent to AWS Config.

## 2.14.0
* feature: KMS: This release of AWS Key Management Service introduces the ability to tag keys. Tagging keys can help you organize your keys and track your KMS costs in the cost allocation report. This release also increases the maximum length of a key ID to accommodate ARNs that include a long key alias.

Expand Down
2 changes: 1 addition & 1 deletion README.md
Expand Up @@ -24,7 +24,7 @@ to work with the new major version.
To use the SDK in the browser, simply add the following script tag to your
HTML pages:

<script src="https://sdk.amazonaws.com/js/aws-sdk-2.14.0.min.js"></script>
<script src="https://sdk.amazonaws.com/js/aws-sdk-2.15.0.min.js"></script>

You can also build a custom browser SDK with your specified set of AWS services.
This can allow you to reduce the SDK's size, specify different API versions of
Expand Down
57 changes: 30 additions & 27 deletions apis/cognito-identity-2014-06-30.min.json
Expand Up @@ -34,12 +34,12 @@
"shape": "Sa"
},
"SamlProviderARNs": {
"shape": "Se"
"shape": "Sf"
}
}
},
"output": {
"shape": "Sf"
"shape": "Sg"
}
},
"DeleteIdentities": {
Expand Down Expand Up @@ -93,7 +93,7 @@
}
},
"output": {
"shape": "Sq"
"shape": "Sr"
}
},
"DescribeIdentityPool": {
Expand All @@ -107,7 +107,7 @@
}
},
"output": {
"shape": "Sf"
"shape": "Sg"
}
},
"GetCredentialsForIdentity": {
Expand All @@ -119,7 +119,7 @@
"members": {
"IdentityId": {},
"Logins": {
"shape": "Sv"
"shape": "Sw"
},
"CustomRoleArn": {}
}
Expand Down Expand Up @@ -152,7 +152,7 @@
"AccountId": {},
"IdentityPoolId": {},
"Logins": {
"shape": "Sv"
"shape": "Sw"
}
}
},
Expand All @@ -178,10 +178,10 @@
"members": {
"IdentityPoolId": {},
"Roles": {
"shape": "S17"
"shape": "S18"
},
"RoleMappings": {
"shape": "S19"
"shape": "S1a"
}
}
}
Expand All @@ -195,7 +195,7 @@
"members": {
"IdentityId": {},
"Logins": {
"shape": "Sv"
"shape": "Sw"
}
}
},
Expand All @@ -218,7 +218,7 @@
"IdentityPoolId": {},
"IdentityId": {},
"Logins": {
"shape": "Sv"
"shape": "Sw"
},
"TokenDuration": {
"type": "long"
Expand Down Expand Up @@ -258,7 +258,7 @@
"Identities": {
"type": "list",
"member": {
"shape": "Sq"
"shape": "Sr"
}
},
"NextToken": {}
Expand Down Expand Up @@ -356,10 +356,10 @@
"members": {
"IdentityPoolId": {},
"Roles": {
"shape": "S17"
"shape": "S18"
},
"RoleMappings": {
"shape": "S19"
"shape": "S1a"
}
}
}
Expand Down Expand Up @@ -392,20 +392,20 @@
"members": {
"IdentityId": {},
"Logins": {
"shape": "Sv"
"shape": "Sw"
},
"LoginsToRemove": {
"shape": "Sr"
"shape": "Ss"
}
}
}
},
"UpdateIdentityPool": {
"input": {
"shape": "Sf"
"shape": "Sg"
},
"output": {
"shape": "Sf"
"shape": "Sg"
}
}
},
Expand All @@ -425,15 +425,18 @@
"type": "structure",
"members": {
"ProviderName": {},
"ClientId": {}
"ClientId": {},
"ServerSideTokenCheck": {
"type": "boolean"
}
}
}
},
"Se": {
"Sf": {
"type": "list",
"member": {}
},
"Sf": {
"Sg": {
"type": "structure",
"required": [
"IdentityPoolId",
Expand All @@ -457,16 +460,16 @@
"shape": "Sa"
},
"SamlProviderARNs": {
"shape": "Se"
"shape": "Sf"
}
}
},
"Sq": {
"Sr": {
"type": "structure",
"members": {
"IdentityId": {},
"Logins": {
"shape": "Sr"
"shape": "Ss"
},
"CreationDate": {
"type": "timestamp"
Expand All @@ -476,21 +479,21 @@
}
}
},
"Sr": {
"Ss": {
"type": "list",
"member": {}
},
"Sv": {
"Sw": {
"type": "map",
"key": {},
"value": {}
},
"S17": {
"S18": {
"type": "map",
"key": {},
"value": {}
},
"S19": {
"S1a": {
"type": "map",
"key": {},
"value": {
Expand Down
6 changes: 6 additions & 0 deletions apis/cognito-identity-2014-06-30.normal.json
Expand Up @@ -374,6 +374,11 @@
"ClientId":{
"shape":"CognitoIdentityProviderClientId",
"documentation":"<p>The client ID for the Amazon Cognito Identity User Pool.</p>"
},
"ServerSideTokenCheck":{
"shape":"CognitoIdentityProviderTokenCheck",
"documentation":"<p>TRUE if server-side token validation is enabled for the identity provider’s token.</p>",
"box":true
}
},
"documentation":"<p>A provider representing an Amazon Cognito Identity User Pool and its client ID.</p>"
Expand All @@ -394,6 +399,7 @@
"min":1,
"pattern":"[\\w._:/-]+"
},
"CognitoIdentityProviderTokenCheck":{"type":"boolean"},
"ConcurrentModificationException":{
"type":"structure",
"members":{
Expand Down
4 changes: 4 additions & 0 deletions apis/cognito-identity-2014-06-30.paginators.json
@@ -0,0 +1,4 @@
{
"pagination": {
}
}
5 changes: 4 additions & 1 deletion apis/config-2014-11-12.min.json
Expand Up @@ -605,7 +605,10 @@
"Evaluations": {
"shape": "S3t"
},
"ResultToken": {}
"ResultToken": {},
"TestMode": {
"type": "boolean"
}
}
},
"output": {
Expand Down
6 changes: 5 additions & 1 deletion apis/config-2014-11-12.normal.json
Expand Up @@ -1548,7 +1548,7 @@
"type":"structure",
"members":{
},
"documentation":"<p>The speNexcified token is invalid.</p>",
"documentation":"<p>The specified <code>ResultToken</code> is invalid.</p>",
"exception":true
},
"InvalidRoleException":{
Expand Down Expand Up @@ -1784,6 +1784,10 @@
"ResultToken":{
"shape":"String",
"documentation":"<p>An encrypted token that associates an evaluation with an AWS Config rule. Identifies the rule and the event that triggered the evaluation</p>"
},
"TestMode":{
"shape":"Boolean",
"documentation":"<p>Use this parameter to specify a test run for <code>PutEvaluations</code>. You can verify whether your AWS Lambda function will deliver evaluation results to AWS Config. No updates occur to your existing evaluations, and evaluation results are not sent to AWS Config.</p> <note> <p>When <code>TestMode</code> is <code>true</code>, <code>PutEvaluations</code> doesn't require a valid value for the <code>ResultToken</code> parameter, but the value cannot be null.</p> </note>"
}
},
"documentation":"<p/>"
Expand Down
5 changes: 5 additions & 0 deletions clients/cognitoidentity.d.ts
Expand Up @@ -172,10 +172,15 @@ declare namespace CognitoIdentity {
* The client ID for the Amazon Cognito Identity User Pool.
*/
ClientId?: CognitoIdentityProviderClientId;
/**
* TRUE if server-side token validation is enabled for the identity provider’s token.
*/
ServerSideTokenCheck?: CognitoIdentityProviderTokenCheck;
}
export type CognitoIdentityProviderClientId = string;
export type CognitoIdentityProviderList = CognitoIdentityProvider[];
export type CognitoIdentityProviderName = string;
export type CognitoIdentityProviderTokenCheck = boolean;
export interface CreateIdentityPoolInput {
/**
* A string that you provide.
Expand Down
1 change: 1 addition & 0 deletions clients/cognitoidentity.js
Expand Up @@ -9,6 +9,7 @@ require('../lib/services/cognitoidentity');
Object.defineProperty(apiLoader.services['cognitoidentity'], '2014-06-30', {
get: function get() {
var model = require('../apis/cognito-identity-2014-06-30.min.json');
model.paginators = require('../apis/cognito-identity-2014-06-30.paginators.json').pagination;
return model;
},
enumerable: true,
Expand Down
4 changes: 4 additions & 0 deletions clients/configservice.d.ts
Expand Up @@ -1057,6 +1057,10 @@ declare namespace ConfigService {
* An encrypted token that associates an evaluation with an AWS Config rule. Identifies the rule and the event that triggered the evaluation
*/
ResultToken: String;
/**
* Use this parameter to specify a test run for PutEvaluations. You can verify whether your AWS Lambda function will deliver evaluation results to AWS Config. No updates occur to your existing evaluations, and evaluation results are not sent to AWS Config. When TestMode is true, PutEvaluations doesn't require a valid value for the ResultToken parameter, but the value cannot be null.
*/
TestMode?: Boolean;
}
export interface PutEvaluationsResponse {
/**
Expand Down

0 comments on commit 5eec2b1

Please sign in to comment.