Skip to content

Commit

Permalink
Updates SDK to v2.911.0
Browse files Browse the repository at this point in the history
  • Loading branch information
awstools committed May 20, 2021
1 parent 9f08ff2 commit a70e690
Show file tree
Hide file tree
Showing 20 changed files with 1,241 additions and 181 deletions.
17 changes: 17 additions & 0 deletions .changes/2.911.0.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
[
{
"type": "feature",
"category": "LexModelsV2",
"description": "Customers can now use resource-based policies to control access to their Lex V2 bots. This release adds APIs to attach and manage permissions for a bot or a bot alias. For details, see: https://docs.aws.amazon.com/lexv2/latest/dg/security_iam_service-with-iam.html"
},
{
"type": "feature",
"category": "Personalize",
"description": "Added new API to stop a solution version creation that is pending or in progress for Amazon Personalize"
},
{
"type": "feature",
"category": "QuickSight",
"description": "Add ARN based Row Level Security support to CreateDataSet/UpdateDataSet APIs."
}
]
7 changes: 6 additions & 1 deletion CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,12 @@
# Changelog for AWS SDK for JavaScript
<!--LATEST=2.910.0-->
<!--LATEST=2.911.0-->
<!--ENTRYINSERT-->

## 2.911.0
* feature: LexModelsV2: Customers can now use resource-based policies to control access to their Lex V2 bots. This release adds APIs to attach and manage permissions for a bot or a bot alias. For details, see: https://docs.aws.amazon.com/lexv2/latest/dg/security_iam_service-with-iam.html
* feature: Personalize: Added new API to stop a solution version creation that is pending or in progress for Amazon Personalize
* feature: QuickSight: Add ARN based Row Level Security support to CreateDataSet/UpdateDataSet APIs.

## 2.910.0
* feature: AutoScaling: With this release, customers can easily use Predictive Scaling as a policy directly through Amazon EC2 Auto Scaling configurations to proactively scale their applications ahead of predicted demand.
* feature: EKS: Update the EKS AddonActive waiter.
Expand Down
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ For release notes, see the [CHANGELOG](https://github.com/aws/aws-sdk-js/blob/ma
To use the SDK in the browser, simply add the following script tag to your
HTML pages:

<script src="https://sdk.amazonaws.com/js/aws-sdk-2.910.0.min.js"></script>
<script src="https://sdk.amazonaws.com/js/aws-sdk-2.911.0.min.js"></script>

You can also build a custom browser SDK with your specified set of AWS services.
This can allow you to reduce the SDK's size, specify different API versions of
Expand Down
2 changes: 1 addition & 1 deletion apis/iam-2010-05-08.normal.json
Original file line number Diff line number Diff line change
Expand Up @@ -377,7 +377,7 @@
"shape": "ServiceFailureException"
}
],
"documentation": "<p>Creates an IAM entity to describe an identity provider (IdP) that supports <a href=\"http://openid.net/connect/\">OpenID Connect (OIDC)</a>.</p> <p>The OIDC provider that you create with this operation can be used as a principal in a role's trust policy. Such a policy establishes a trust relationship between AWS and the OIDC provider.</p> <p>When you create the IAM OIDC provider, you specify the following:</p> <ul> <li> <p>The URL of the OIDC identity provider (IdP) to trust</p> </li> <li> <p>A list of client IDs (also known as audiences) that identify the application or applications that are allowed to authenticate using the OIDC provider</p> </li> <li> <p>A list of thumbprints of one or more server certificates that the IdP uses</p> </li> </ul> <p>You get all of this information from the OIDC IdP that you want to use to access AWS.</p> <note> <p>The trust for the OIDC provider is derived from the IAM provider that this operation creates. Therefore, it is best to limit access to the <a>CreateOpenIDConnectProvider</a> operation to highly privileged users.</p> </note>"
"documentation": "<p>Creates an IAM entity to describe an identity provider (IdP) that supports <a href=\"http://openid.net/connect/\">OpenID Connect (OIDC)</a>.</p> <p>The OIDC provider that you create with this operation can be used as a principal in a role's trust policy. Such a policy establishes a trust relationship between AWS and the OIDC provider.</p> <p>If you are using an OIDC identity provider from Google, Facebook, or Amazon Cognito, you don't need to create a separate IAM identity provider. These OIDC identity providers are already built-in to AWS and are available for your use. Instead, you can move directly to creating new roles using your identity provider. To learn more, see <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_oidc.html\">Creating a role for web identity or OpenID connect federation</a> in the <i>IAM User Guide</i>.</p> <p>When you create the IAM OIDC provider, you specify the following:</p> <ul> <li> <p>The URL of the OIDC identity provider (IdP) to trust</p> </li> <li> <p>A list of client IDs (also known as audiences) that identify the application or applications that are allowed to authenticate using the OIDC provider</p> </li> <li> <p>A list of thumbprints of one or more server certificates that the IdP uses</p> </li> </ul> <p>You get all of this information from the OIDC IdP that you want to use to access AWS.</p> <note> <p>The trust for the OIDC provider is derived from the IAM provider that this operation creates. Therefore, it is best to limit access to the <a>CreateOpenIDConnectProvider</a> operation to highly privileged users.</p> </note>"
},
"CreatePolicy": {
"name": "CreatePolicy",
Expand Down
Loading

0 comments on commit a70e690

Please sign in to comment.