Skip to content

Commit

Permalink
Updates SDK to v2.1241.0
Browse files Browse the repository at this point in the history
  • Loading branch information
awstools committed Oct 26, 2022
1 parent 1e066c4 commit 2cdb837
Show file tree
Hide file tree
Showing 21 changed files with 596 additions and 184 deletions.
17 changes: 17 additions & 0 deletions .changes/2.1241.0.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
[
{
"type": "feature",
"category": "Kafka",
"description": "This release adds support for Tiered Storage. UpdateStorage allows you to control the Storage Mode for supported storage tiers."
},
{
"type": "feature",
"category": "Neptune",
"description": "Added a new cluster-level attribute to set the capacity range for Neptune Serverless instances."
},
{
"type": "feature",
"category": "SageMaker",
"description": "Amazon SageMaker Automatic Model Tuning now supports specifying Grid Search strategy for tuning jobs, which evaluates all hyperparameter combinations exhaustively based on the categorical hyperparameters provided."
}
]
7 changes: 6 additions & 1 deletion CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,12 @@
# Changelog for AWS SDK for JavaScript
<!--LATEST=2.1240.0-->
<!--LATEST=2.1241.0-->
<!--ENTRYINSERT-->

## 2.1241.0
* feature: Kafka: This release adds support for Tiered Storage. UpdateStorage allows you to control the Storage Mode for supported storage tiers.
* feature: Neptune: Added a new cluster-level attribute to set the capacity range for Neptune Serverless instances.
* feature: SageMaker: Amazon SageMaker Automatic Model Tuning now supports specifying Grid Search strategy for tuning jobs, which evaluates all hyperparameter combinations exhaustively based on the categorical hyperparameters provided.

## 2.1240.0
* bugfix: AWSQueryCompatible: Read trait from metadata
* feature: AccessAnalyzer: This release adds support for six new resource types in IAM Access Analyzer to help you easily identify public and cross-account access to your AWS resources. Updated service API, documentation, and paginators.
Expand Down
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ For release notes, see the [CHANGELOG](https://github.com/aws/aws-sdk-js/blob/ma
To use the SDK in the browser, simply add the following script tag to your
HTML pages:

<script src="https://sdk.amazonaws.com/js/aws-sdk-2.1240.0.min.js"></script>
<script src="https://sdk.amazonaws.com/js/aws-sdk-2.1241.0.min.js"></script>

You can also build a custom browser SDK with your specified set of AWS services.
This can allow you to reduce the SDK's size, specify different API versions of
Expand Down
2 changes: 1 addition & 1 deletion apis/iam-2010-05-08.normal.json
Original file line number Diff line number Diff line change
Expand Up @@ -4538,7 +4538,7 @@
},
"MaxSessionDuration": {
"shape": "roleMaxSessionDurationType",
"documentation": "<p>The maximum session duration (in seconds) that you want to set for the specified role. If you do not specify a value for this setting, the default value of one hour is applied. This setting can have a value from 1 hour to 12 hours.</p> <p>Anyone who assumes the role from the or API can use the <code>DurationSeconds</code> API parameter or the <code>duration-seconds</code> CLI parameter to request a longer session. The <code>MaxSessionDuration</code> setting determines the maximum duration that can be requested using the <code>DurationSeconds</code> parameter. If users don't specify a value for the <code>DurationSeconds</code> parameter, their security credentials are valid for one hour by default. This applies when you use the <code>AssumeRole*</code> API operations or the <code>assume-role*</code> CLI operations but does not apply when you use those operations to create a console URL. For more information, see <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html\">Using IAM roles</a> in the <i>IAM User Guide</i>.</p>"
"documentation": "<p>The maximum session duration (in seconds) that you want to set for the specified role. If you do not specify a value for this setting, the default value of one hour is applied. This setting can have a value from 1 hour to 12 hours.</p> <p>Anyone who assumes the role from the CLI or API can use the <code>DurationSeconds</code> API parameter or the <code>duration-seconds</code> CLI parameter to request a longer session. The <code>MaxSessionDuration</code> setting determines the maximum duration that can be requested using the <code>DurationSeconds</code> parameter. If users don't specify a value for the <code>DurationSeconds</code> parameter, their security credentials are valid for one hour by default. This applies when you use the <code>AssumeRole*</code> API operations or the <code>assume-role*</code> CLI operations but does not apply when you use those operations to create a console URL. For more information, see <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html\">Using IAM roles</a> in the <i>IAM User Guide</i>.</p>"
},
"PermissionsBoundary": {
"shape": "arnType",
Expand Down
Loading

0 comments on commit 2cdb837

Please sign in to comment.