Skip to content

Commit a70e690

Browse files
author
awstools
committed
Updates SDK to v2.911.0
1 parent 9f08ff2 commit a70e690

20 files changed

+1241
-181
lines changed

.changes/2.911.0.json

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
[
2+
{
3+
"type": "feature",
4+
"category": "LexModelsV2",
5+
"description": "Customers can now use resource-based policies to control access to their Lex V2 bots. This release adds APIs to attach and manage permissions for a bot or a bot alias. For details, see: https://docs.aws.amazon.com/lexv2/latest/dg/security_iam_service-with-iam.html"
6+
},
7+
{
8+
"type": "feature",
9+
"category": "Personalize",
10+
"description": "Added new API to stop a solution version creation that is pending or in progress for Amazon Personalize"
11+
},
12+
{
13+
"type": "feature",
14+
"category": "QuickSight",
15+
"description": "Add ARN based Row Level Security support to CreateDataSet/UpdateDataSet APIs."
16+
}
17+
]

CHANGELOG.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,12 @@
11
# Changelog for AWS SDK for JavaScript
2-
<!--LATEST=2.910.0-->
2+
<!--LATEST=2.911.0-->
33
<!--ENTRYINSERT-->
44

5+
## 2.911.0
6+
* feature: LexModelsV2: Customers can now use resource-based policies to control access to their Lex V2 bots. This release adds APIs to attach and manage permissions for a bot or a bot alias. For details, see: https://docs.aws.amazon.com/lexv2/latest/dg/security_iam_service-with-iam.html
7+
* feature: Personalize: Added new API to stop a solution version creation that is pending or in progress for Amazon Personalize
8+
* feature: QuickSight: Add ARN based Row Level Security support to CreateDataSet/UpdateDataSet APIs.
9+
510
## 2.910.0
611
* feature: AutoScaling: With this release, customers can easily use Predictive Scaling as a policy directly through Amazon EC2 Auto Scaling configurations to proactively scale their applications ahead of predicted demand.
712
* feature: EKS: Update the EKS AddonActive waiter.

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ For release notes, see the [CHANGELOG](https://github.com/aws/aws-sdk-js/blob/ma
2929
To use the SDK in the browser, simply add the following script tag to your
3030
HTML pages:
3131

32-
<script src="https://sdk.amazonaws.com/js/aws-sdk-2.910.0.min.js"></script>
32+
<script src="https://sdk.amazonaws.com/js/aws-sdk-2.911.0.min.js"></script>
3333

3434
You can also build a custom browser SDK with your specified set of AWS services.
3535
This can allow you to reduce the SDK's size, specify different API versions of

apis/iam-2010-05-08.normal.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -377,7 +377,7 @@
377377
"shape": "ServiceFailureException"
378378
}
379379
],
380-
"documentation": "<p>Creates an IAM entity to describe an identity provider (IdP) that supports <a href=\"http://openid.net/connect/\">OpenID Connect (OIDC)</a>.</p> <p>The OIDC provider that you create with this operation can be used as a principal in a role's trust policy. Such a policy establishes a trust relationship between AWS and the OIDC provider.</p> <p>When you create the IAM OIDC provider, you specify the following:</p> <ul> <li> <p>The URL of the OIDC identity provider (IdP) to trust</p> </li> <li> <p>A list of client IDs (also known as audiences) that identify the application or applications that are allowed to authenticate using the OIDC provider</p> </li> <li> <p>A list of thumbprints of one or more server certificates that the IdP uses</p> </li> </ul> <p>You get all of this information from the OIDC IdP that you want to use to access AWS.</p> <note> <p>The trust for the OIDC provider is derived from the IAM provider that this operation creates. Therefore, it is best to limit access to the <a>CreateOpenIDConnectProvider</a> operation to highly privileged users.</p> </note>"
380+
"documentation": "<p>Creates an IAM entity to describe an identity provider (IdP) that supports <a href=\"http://openid.net/connect/\">OpenID Connect (OIDC)</a>.</p> <p>The OIDC provider that you create with this operation can be used as a principal in a role's trust policy. Such a policy establishes a trust relationship between AWS and the OIDC provider.</p> <p>If you are using an OIDC identity provider from Google, Facebook, or Amazon Cognito, you don't need to create a separate IAM identity provider. These OIDC identity providers are already built-in to AWS and are available for your use. Instead, you can move directly to creating new roles using your identity provider. To learn more, see <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_oidc.html\">Creating a role for web identity or OpenID connect federation</a> in the <i>IAM User Guide</i>.</p> <p>When you create the IAM OIDC provider, you specify the following:</p> <ul> <li> <p>The URL of the OIDC identity provider (IdP) to trust</p> </li> <li> <p>A list of client IDs (also known as audiences) that identify the application or applications that are allowed to authenticate using the OIDC provider</p> </li> <li> <p>A list of thumbprints of one or more server certificates that the IdP uses</p> </li> </ul> <p>You get all of this information from the OIDC IdP that you want to use to access AWS.</p> <note> <p>The trust for the OIDC provider is derived from the IAM provider that this operation creates. Therefore, it is best to limit access to the <a>CreateOpenIDConnectProvider</a> operation to highly privileged users.</p> </note>"
381381
},
382382
"CreatePolicy": {
383383
"name": "CreatePolicy",

0 commit comments

Comments
 (0)