Skip to content

Commit

Permalink
Updates SDK to v2.491.0
Browse files Browse the repository at this point in the history
  • Loading branch information
awstools committed Jul 10, 2019
1 parent d05c0ca commit b3f84c4
Show file tree
Hide file tree
Showing 17 changed files with 2,872 additions and 2,336 deletions.
12 changes: 12 additions & 0 deletions .changes/2.491.0.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
[
{
"type": "feature",
"category": "QuickSight",
"description": "Amazon QuickSight now supports embedding dashboards for all non-federated QuickSight users. This includes IAM users, AD users and users from the QuickSight user pool. The get-dashboard-embed-url API accepts QUICKSIGHT as identity type with a user ARN to authenticate the embeddable dashboard viewer as a non-federated user."
},
{
"type": "feature",
"category": "ServiceCatalog",
"description": "This release adds support for Parameters in ExecuteProvisionedProductServiceAction and adds functionality to get the default parameter values for a Self-Service Action execution against a Provisioned Product via DescribeServiceActionExecutionParameters"
}
]
6 changes: 5 additions & 1 deletion CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,11 @@
# Changelog for AWS SDK for JavaScript
<!--LATEST=2.490.0-->
<!--LATEST=2.491.0-->
<!--ENTRYINSERT-->

## 2.491.0
* feature: QuickSight: Amazon QuickSight now supports embedding dashboards for all non-federated QuickSight users. This includes IAM users, AD users and users from the QuickSight user pool. The get-dashboard-embed-url API accepts QUICKSIGHT as identity type with a user ARN to authenticate the embeddable dashboard viewer as a non-federated user.
* feature: ServiceCatalog: This release adds support for Parameters in ExecuteProvisionedProductServiceAction and adds functionality to get the default parameter values for a Self-Service Action execution against a Provisioned Product via DescribeServiceActionExecutionParameters

## 2.490.0
* feature: Amplify: This release adds webhook APIs and manual deployment APIs for AWS Amplify Console.
* feature: CloudWatch: This release adds three new APIs (PutAnomalyDetector, DeleteAnomalyDetector, and DescribeAnomalyDetectors) to support the new feature, CloudWatch Anomaly Detection. In addition, PutMetricAlarm and DescribeAlarms APIs are updated to support management of Anomaly Detection based alarms.
Expand Down
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ version.
To use the SDK in the browser, simply add the following script tag to your
HTML pages:

<script src="https://sdk.amazonaws.com/js/aws-sdk-2.490.0.min.js"></script>
<script src="https://sdk.amazonaws.com/js/aws-sdk-2.491.0.min.js"></script>

You can also build a custom browser SDK with your specified set of AWS services.
This can allow you to reduce the SDK's size, specify different API versions of
Expand Down
4,635 changes: 2,459 additions & 2,176 deletions apis/glacier-2012-06-01.normal.json

Large diffs are not rendered by default.

4 changes: 4 additions & 0 deletions apis/quicksight-2018-04-01.min.json
Original file line number Diff line number Diff line change
Expand Up @@ -373,6 +373,10 @@
"location": "querystring",
"locationName": "reset-disabled",
"type": "boolean"
},
"UserArn": {
"location": "querystring",
"locationName": "user-arn"
}
}
},
Expand Down
15 changes: 11 additions & 4 deletions apis/quicksight-2018-04-01.normal.json
Original file line number Diff line number Diff line change
Expand Up @@ -231,7 +231,7 @@
"shape": "ResourceUnavailableException"
}
],
"documentation": "<p>Deletes a user after locating the user by its principal ID.</p>"
"documentation": "<p>Deletes a user identified by its principal ID. </p> <p>The permission resource is <code>arn:aws:quicksight:us-east-1:<i>&lt;aws-account-id&gt;</i>:user/default/<i>&lt;user-name&gt; </i> </code>.</p> <p> <b>CLI Sample:</b> </p> <p> <code>aws quicksight delete-user-by-principal-id --aws-account-id=111122223333 --namespace=default --principal-id=ABCDEFJA26JLI7EUUOEHS </code> </p>"
},
"DescribeGroup": {
"name": "DescribeGroup",
Expand Down Expand Up @@ -858,7 +858,8 @@
"location": "uri",
"locationName": "Namespace"
}
}
},
"documentation": "<p/>"
},
"DeleteUserByPrincipalIdResponse": {
"type": "structure",
Expand Down Expand Up @@ -1055,6 +1056,12 @@
"documentation": "<p>Remove the reset button on embedded dashboard. The default is FALSE, which allows the reset button.</p>",
"location": "querystring",
"locationName": "reset-disabled"
},
"UserArn": {
"shape": "Arn",
"documentation": "<p>The Amazon QuickSight user's ARN, for use with <code>QUICKSIGHT</code> identity type. You can use this for any of the following:</p> <ul> <li> <p>Amazon QuickSight users in your account (readers, authors, or admins)</p> </li> <li> <p>AD users</p> </li> <li> <p>Invited non-federated users</p> </li> <li> <p>Federated IAM users</p> </li> <li> <p>Federated IAM role-based sessions</p> </li> </ul>",
"location": "querystring",
"locationName": "user-arn"
}
}
},
Expand Down Expand Up @@ -1387,7 +1394,7 @@
},
"MaxResults": {
"type": "integer",
"max": 100000,
"max": 100,
"min": 1
},
"Namespace": {
Expand Down Expand Up @@ -1422,7 +1429,7 @@
},
"SessionName": {
"shape": "RoleSessionName",
"documentation": "<p>The name of the session with the assumed IAM role. By using this parameter, you can register multiple users with the same IAM role, provided that each has a different session name. For more information on assuming IAM roles, see <a href=\"https://docs.aws.amazon.com/cli/latest/reference/sts/assume-role.html\"> <code>assume-role</code> </a> in the <i>AWS CLI Reference.</i> </p>"
"documentation": "<p>You need to use this parameter only when you register one or more users using an assumed IAM role. You don't need to provide the session name for other scenarios, for example when you are registering an IAM user or an Amazon QuickSight user. You can register multiple users using the same IAM role if each user has a different session name. For more information on assuming IAM roles, see <a href=\"https://docs.aws.amazon.com/cli/latest/reference/sts/assume-role.html\"> <code>assume-role</code> </a> in the <i>AWS CLI Reference.</i> </p>"
},
"AwsAccountId": {
"shape": "AwsAccountId",
Expand Down
87 changes: 65 additions & 22 deletions apis/servicecatalog-2015-12-10.min.json
Original file line number Diff line number Diff line change
Expand Up @@ -1093,6 +1093,38 @@
}
}
},
"DescribeServiceActionExecutionParameters": {
"input": {
"type": "structure",
"required": [
"ProvisionedProductId",
"ServiceActionId"
],
"members": {
"ProvisionedProductId": {},
"ServiceActionId": {},
"AcceptLanguage": {}
}
},
"output": {
"type": "structure",
"members": {
"ServiceActionParameters": {
"type": "list",
"member": {
"type": "structure",
"members": {
"Name": {},
"Type": {},
"DefaultValues": {
"shape": "S77"
}
}
}
}
}
}
},
"DescribeTagOption": {
"input": {
"type": "structure",
Expand Down Expand Up @@ -1260,7 +1292,14 @@
"ExecuteToken": {
"idempotencyToken": true
},
"AcceptLanguage": {}
"AcceptLanguage": {},
"Parameters": {
"type": "map",
"key": {},
"value": {
"shape": "S77"
}
}
}
},
"output": {
Expand Down Expand Up @@ -1300,7 +1339,7 @@
"type": "structure",
"members": {
"PortfolioDetails": {
"shape": "S7q"
"shape": "S7z"
},
"NextPageToken": {}
}
Expand Down Expand Up @@ -1465,7 +1504,7 @@
"type": "structure",
"members": {
"PortfolioDetails": {
"shape": "S7q"
"shape": "S7z"
},
"NextPageToken": {}
}
Expand All @@ -1490,7 +1529,7 @@
"type": "structure",
"members": {
"PortfolioDetails": {
"shape": "S7q"
"shape": "S7z"
},
"NextPageToken": {}
}
Expand Down Expand Up @@ -1539,7 +1578,7 @@
},
"PageToken": {},
"AccessLevelFilter": {
"shape": "S8g"
"shape": "S8p"
}
}
},
Expand Down Expand Up @@ -1630,7 +1669,7 @@
"members": {
"AcceptLanguage": {},
"AccessLevelFilter": {
"shape": "S8g"
"shape": "S8p"
},
"SearchFilter": {
"type": "structure",
Expand Down Expand Up @@ -1710,7 +1749,7 @@
"type": "structure",
"members": {
"ServiceActionSummaries": {
"shape": "S9b"
"shape": "S9k"
},
"NextPageToken": {}
}
Expand All @@ -1737,7 +1776,7 @@
"type": "structure",
"members": {
"ServiceActionSummaries": {
"shape": "S9b"
"shape": "S9k"
},
"NextPageToken": {}
}
Expand Down Expand Up @@ -1897,7 +1936,7 @@
"members": {
"AcceptLanguage": {},
"AccessLevelFilter": {
"shape": "S8g"
"shape": "S8p"
},
"PageSize": {
"type": "integer"
Expand All @@ -1924,7 +1963,7 @@
"members": {
"AcceptLanguage": {},
"Filters": {
"shape": "Sa1"
"shape": "Saa"
},
"PageSize": {
"type": "integer"
Expand Down Expand Up @@ -1970,7 +2009,7 @@
"AcceptLanguage": {},
"PortfolioId": {},
"Filters": {
"shape": "Sa1"
"shape": "Saa"
},
"SortBy": {},
"SortOrder": {},
Expand Down Expand Up @@ -2000,7 +2039,7 @@
"members": {
"AcceptLanguage": {},
"AccessLevelFilter": {
"shape": "S8g"
"shape": "S8p"
},
"Filters": {
"type": "map",
Expand Down Expand Up @@ -2122,7 +2161,7 @@
"shape": "S1i"
},
"RemoveTags": {
"shape": "Sb2"
"shape": "Sbb"
}
}
},
Expand Down Expand Up @@ -2158,7 +2197,7 @@
"shape": "S1i"
},
"RemoveTags": {
"shape": "Sb2"
"shape": "Sbb"
}
}
},
Expand Down Expand Up @@ -2243,7 +2282,7 @@
"AcceptLanguage": {},
"ProvisionedProductId": {},
"ProvisionedProductProperties": {
"shape": "Sbb"
"shape": "Sbk"
},
"IdempotencyToken": {
"idempotencyToken": true
Expand All @@ -2255,7 +2294,7 @@
"members": {
"ProvisionedProductId": {},
"ProvisionedProductProperties": {
"shape": "Sbb"
"shape": "Sbk"
},
"RecordId": {},
"Status": {}
Expand Down Expand Up @@ -2656,38 +2695,42 @@
}
}
},
"S7q": {
"S77": {
"type": "list",
"member": {}
},
"S7z": {
"type": "list",
"member": {
"shape": "S1n"
}
},
"S8g": {
"S8p": {
"type": "structure",
"members": {
"Key": {},
"Value": {}
}
},
"S9b": {
"S9k": {
"type": "list",
"member": {
"shape": "S37"
}
},
"Sa1": {
"Saa": {
"type": "map",
"key": {},
"value": {
"type": "list",
"member": {}
}
},
"Sb2": {
"Sbb": {
"type": "list",
"member": {}
},
"Sbb": {
"Sbk": {
"type": "map",
"key": {},
"value": {}
Expand Down
Loading

0 comments on commit b3f84c4

Please sign in to comment.