Skip to content

Commit

Permalink
Updates SDK to v2.568.0
Browse files Browse the repository at this point in the history
  • Loading branch information
awstools committed Nov 8, 2019
1 parent cb222fb commit 3cb57c7
Show file tree
Hide file tree
Showing 14 changed files with 218 additions and 170 deletions.
7 changes: 7 additions & 0 deletions .changes/2.568.0.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
[
{
"type": "feature",
"category": "CognitoIdentity",
"description": "This release adds support for disabling classic flow."
}
]
5 changes: 4 additions & 1 deletion CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,10 @@
# Changelog for AWS SDK for JavaScript
<!--LATEST=2.567.0-->
<!--LATEST=2.568.0-->
<!--ENTRYINSERT-->

## 2.568.0
* feature: CognitoIdentity: This release adds support for disabling classic flow.

## 2.567.0
* feature: Comprehend: This release adds new languages (ar, hi, ko, ja, zh, zh-TW) for Amazon Comprehend's DetectSentiment, DetectEntities, DetectKeyPhrases, BatchDetectSentiment, BatchDetectEntities and BatchDetectKeyPhrases APIs
* feature: SSM: AWS Systems Manager Session Manager target length increased to 400.
Expand Down
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ version.
To use the SDK in the browser, simply add the following script tag to your
HTML pages:

<script src="https://sdk.amazonaws.com/js/aws-sdk-2.567.0.min.js"></script>
<script src="https://sdk.amazonaws.com/js/aws-sdk-2.568.0.min.js"></script>

You can also build a custom browser SDK with your specified set of AWS services.
This can allow you to reduce the SDK's size, specify different API versions of
Expand Down
92 changes: 50 additions & 42 deletions apis/cognito-identity-2014-06-30.min.json
Original file line number Diff line number Diff line change
Expand Up @@ -24,26 +24,29 @@
"AllowUnauthenticatedIdentities": {
"type": "boolean"
},
"AllowClassicFlow": {
"type": "boolean"
},
"SupportedLoginProviders": {
"shape": "S4"
"shape": "S5"
},
"DeveloperProviderName": {},
"OpenIdConnectProviderARNs": {
"shape": "S8"
"shape": "S9"
},
"CognitoIdentityProviders": {
"shape": "Sa"
"shape": "Sb"
},
"SamlProviderARNs": {
"shape": "Sf"
"shape": "Sg"
},
"IdentityPoolTags": {
"shape": "Sg"
"shape": "Sh"
}
}
},
"output": {
"shape": "Sj"
"shape": "Sk"
}
},
"DeleteIdentities": {
Expand Down Expand Up @@ -97,7 +100,7 @@
}
},
"output": {
"shape": "Su"
"shape": "Sv"
}
},
"DescribeIdentityPool": {
Expand All @@ -111,7 +114,7 @@
}
},
"output": {
"shape": "Sj"
"shape": "Sk"
}
},
"GetCredentialsForIdentity": {
Expand All @@ -123,7 +126,7 @@
"members": {
"IdentityId": {},
"Logins": {
"shape": "Sz"
"shape": "S10"
},
"CustomRoleArn": {}
}
Expand Down Expand Up @@ -156,7 +159,7 @@
"AccountId": {},
"IdentityPoolId": {},
"Logins": {
"shape": "Sz"
"shape": "S10"
}
}
},
Expand All @@ -182,10 +185,10 @@
"members": {
"IdentityPoolId": {},
"Roles": {
"shape": "S1b"
"shape": "S1c"
},
"RoleMappings": {
"shape": "S1d"
"shape": "S1e"
}
}
}
Expand All @@ -199,7 +202,7 @@
"members": {
"IdentityId": {},
"Logins": {
"shape": "Sz"
"shape": "S10"
}
}
},
Expand All @@ -222,7 +225,7 @@
"IdentityPoolId": {},
"IdentityId": {},
"Logins": {
"shape": "Sz"
"shape": "S10"
},
"TokenDuration": {
"type": "long"
Expand Down Expand Up @@ -262,7 +265,7 @@
"Identities": {
"type": "list",
"member": {
"shape": "Su"
"shape": "Sv"
}
},
"NextToken": {}
Expand Down Expand Up @@ -313,7 +316,7 @@
"type": "structure",
"members": {
"Tags": {
"shape": "Sg"
"shape": "Sh"
}
}
}
Expand Down Expand Up @@ -379,10 +382,10 @@
"members": {
"IdentityPoolId": {},
"Roles": {
"shape": "S1b"
"shape": "S1c"
},
"RoleMappings": {
"shape": "S1d"
"shape": "S1e"
}
}
}
Expand All @@ -391,12 +394,13 @@
"input": {
"type": "structure",
"required": [
"ResourceArn"
"ResourceArn",
"Tags"
],
"members": {
"ResourceArn": {},
"Tags": {
"shape": "Sg"
"shape": "Sh"
}
}
},
Expand Down Expand Up @@ -433,10 +437,10 @@
"members": {
"IdentityId": {},
"Logins": {
"shape": "Sz"
"shape": "S10"
},
"LoginsToRemove": {
"shape": "Sv"
"shape": "Sw"
}
}
}
Expand All @@ -445,7 +449,8 @@
"input": {
"type": "structure",
"required": [
"ResourceArn"
"ResourceArn",
"TagKeys"
],
"members": {
"ResourceArn": {},
Expand All @@ -462,24 +467,24 @@
},
"UpdateIdentityPool": {
"input": {
"shape": "Sj"
"shape": "Sk"
},
"output": {
"shape": "Sj"
"shape": "Sk"
}
}
},
"shapes": {
"S4": {
"S5": {
"type": "map",
"key": {},
"value": {}
},
"S8": {
"S9": {
"type": "list",
"member": {}
},
"Sa": {
"Sb": {
"type": "list",
"member": {
"type": "structure",
Expand All @@ -492,16 +497,16 @@
}
}
},
"Sf": {
"Sg": {
"type": "list",
"member": {}
},
"Sg": {
"Sh": {
"type": "map",
"key": {},
"value": {}
},
"Sj": {
"Sk": {
"type": "structure",
"required": [
"IdentityPoolId",
Expand All @@ -514,30 +519,33 @@
"AllowUnauthenticatedIdentities": {
"type": "boolean"
},
"AllowClassicFlow": {
"type": "boolean"
},
"SupportedLoginProviders": {
"shape": "S4"
"shape": "S5"
},
"DeveloperProviderName": {},
"OpenIdConnectProviderARNs": {
"shape": "S8"
"shape": "S9"
},
"CognitoIdentityProviders": {
"shape": "Sa"
"shape": "Sb"
},
"SamlProviderARNs": {
"shape": "Sf"
"shape": "Sg"
},
"IdentityPoolTags": {
"shape": "Sg"
"shape": "Sh"
}
}
},
"Su": {
"Sv": {
"type": "structure",
"members": {
"IdentityId": {},
"Logins": {
"shape": "Sv"
"shape": "Sw"
},
"CreationDate": {
"type": "timestamp"
Expand All @@ -547,21 +555,21 @@
}
}
},
"Sv": {
"Sw": {
"type": "list",
"member": {}
},
"Sz": {
"S10": {
"type": "map",
"key": {},
"value": {}
},
"S1b": {
"S1c": {
"type": "map",
"key": {},
"value": {}
},
"S1d": {
"S1e": {
"type": "map",
"key": {},
"value": {
Expand Down
23 changes: 18 additions & 5 deletions apis/cognito-identity-2014-06-30.normal.json
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@
"shape": "LimitExceededException"
}
],
"documentation": "<p>Creates a new identity pool. The identity pool is a store of user identity information that is specific to your AWS account. The limit on identity pools is 60 per account. The keys for <code>SupportedLoginProviders</code> are as follows:</p> <ul> <li> <p>Facebook: <code>graph.facebook.com</code> </p> </li> <li> <p>Google: <code>accounts.google.com</code> </p> </li> <li> <p>Amazon: <code>www.amazon.com</code> </p> </li> <li> <p>Twitter: <code>api.twitter.com</code> </p> </li> <li> <p>Digits: <code>www.digits.com</code> </p> </li> </ul> <p>You must use AWS Developer credentials to call this API.</p>"
"documentation": "<p>Creates a new identity pool. The identity pool is a store of user identity information that is specific to your AWS account. The keys for <code>SupportedLoginProviders</code> are as follows:</p> <ul> <li> <p>Facebook: <code>graph.facebook.com</code> </p> </li> <li> <p>Google: <code>accounts.google.com</code> </p> </li> <li> <p>Amazon: <code>www.amazon.com</code> </p> </li> <li> <p>Twitter: <code>api.twitter.com</code> </p> </li> <li> <p>Digits: <code>www.digits.com</code> </p> </li> </ul> <p>You must use AWS Developer credentials to call this API.</p>"
},
"DeleteIdentities": {
"name": "DeleteIdentities",
Expand Down Expand Up @@ -745,6 +745,9 @@
"max": 128,
"min": 1
},
"ClassicFlow": {
"type": "boolean"
},
"CognitoIdentityProvider": {
"type": "structure",
"members": {
Expand Down Expand Up @@ -800,6 +803,10 @@
"shape": "IdentityPoolUnauthenticated",
"documentation": "<p>TRUE if the identity pool supports unauthenticated logins.</p>"
},
"AllowClassicFlow": {
"shape": "ClassicFlow",
"documentation": "<p>Enables or disables the Basic (Classic) authentication flow. For more information, see <a href=\"https://docs.aws.amazon.com/cognito/latest/developerguide/authentication-flow.html\">Identity Pools (Federated Identities) Authentication Flow</a> in the <i>Amazon Cognito Developer Guide</i>.</p>"
},
"SupportedLoginProviders": {
"shape": "IdentityProviders",
"documentation": "<p>Optional key:value pairs mapping provider names to provider app IDs.</p>"
Expand Down Expand Up @@ -1056,7 +1063,7 @@
},
"TokenDuration": {
"shape": "TokenDuration",
"documentation": "<p>The expiration time of the token, in seconds. You can specify a custom expiration time for the token so that you can cache it. If you don't provide an expiration time, the token is valid for 15 minutes. You can exchange the token with Amazon STS for temporary AWS credentials, which are valid for a maximum of one hour. The maximum token duration you can set is 24 hours. You should take care in setting the expiration time for a token, as there are significant security implications: an attacker could use a leaked token to access your AWS resources for the token's duration.</p>"
"documentation": "<p>The expiration time of the token, in seconds. You can specify a custom expiration time for the token so that you can cache it. If you don't provide an expiration time, the token is valid for 15 minutes. You can exchange the token with Amazon STS for temporary AWS credentials, which are valid for a maximum of one hour. The maximum token duration you can set is 24 hours. You should take care in setting the expiration time for a token, as there are significant security implications: an attacker could use a leaked token to access your AWS resources for the token's duration.</p> <note> <p>Please provide for a small grace period, usually no more than 5 minutes, to account for clock skew.</p> </note>"
}
},
"documentation": "<p>Input to the <code>GetOpenIdTokenForDeveloperIdentity</code> action.</p>"
Expand Down Expand Up @@ -1171,6 +1178,10 @@
"shape": "IdentityPoolUnauthenticated",
"documentation": "<p>TRUE if the identity pool supports unauthenticated logins.</p>"
},
"AllowClassicFlow": {
"shape": "ClassicFlow",
"documentation": "<p>Enables or disables the Basic (Classic) authentication flow. For more information, see <a href=\"https://docs.aws.amazon.com/cognito/latest/developerguide/authentication-flow.html\">Identity Pools (Federated Identities) Authentication Flow</a> in the <i>Amazon Cognito Developer Guide</i>.</p>"
},
"SupportedLoginProviders": {
"shape": "IdentityProviders",
"documentation": "<p>Optional key:value pairs mapping provider names to provider app IDs.</p>"
Expand Down Expand Up @@ -1208,7 +1219,7 @@
"type": "string",
"max": 128,
"min": 1,
"pattern": "[\\w ]+"
"pattern": "[\\w\\s+=,.@-]+"
},
"IdentityPoolShortDescription": {
"type": "structure",
Expand Down Expand Up @@ -1642,7 +1653,8 @@
"TagResourceInput": {
"type": "structure",
"required": [
"ResourceArn"
"ResourceArn",
"Tags"
],
"members": {
"ResourceArn": {
Expand Down Expand Up @@ -1744,7 +1756,8 @@
"UntagResourceInput": {
"type": "structure",
"required": [
"ResourceArn"
"ResourceArn",
"TagKeys"
],
"members": {
"ResourceArn": {
Expand Down
Loading

0 comments on commit 3cb57c7

Please sign in to comment.