Skip to content

Commit 2cdb837

Browse files
author
awstools
committed
Updates SDK to v2.1241.0
1 parent 1e066c4 commit 2cdb837

21 files changed

+596
-184
lines changed

.changes/2.1241.0.json

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
[
2+
{
3+
"type": "feature",
4+
"category": "Kafka",
5+
"description": "This release adds support for Tiered Storage. UpdateStorage allows you to control the Storage Mode for supported storage tiers."
6+
},
7+
{
8+
"type": "feature",
9+
"category": "Neptune",
10+
"description": "Added a new cluster-level attribute to set the capacity range for Neptune Serverless instances."
11+
},
12+
{
13+
"type": "feature",
14+
"category": "SageMaker",
15+
"description": "Amazon SageMaker Automatic Model Tuning now supports specifying Grid Search strategy for tuning jobs, which evaluates all hyperparameter combinations exhaustively based on the categorical hyperparameters provided."
16+
}
17+
]

CHANGELOG.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,12 @@
11
# Changelog for AWS SDK for JavaScript
2-
<!--LATEST=2.1240.0-->
2+
<!--LATEST=2.1241.0-->
33
<!--ENTRYINSERT-->
44

5+
## 2.1241.0
6+
* feature: Kafka: This release adds support for Tiered Storage. UpdateStorage allows you to control the Storage Mode for supported storage tiers.
7+
* feature: Neptune: Added a new cluster-level attribute to set the capacity range for Neptune Serverless instances.
8+
* feature: SageMaker: Amazon SageMaker Automatic Model Tuning now supports specifying Grid Search strategy for tuning jobs, which evaluates all hyperparameter combinations exhaustively based on the categorical hyperparameters provided.
9+
510
## 2.1240.0
611
* bugfix: AWSQueryCompatible: Read trait from metadata
712
* feature: AccessAnalyzer: This release adds support for six new resource types in IAM Access Analyzer to help you easily identify public and cross-account access to your AWS resources. Updated service API, documentation, and paginators.

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ For release notes, see the [CHANGELOG](https://github.com/aws/aws-sdk-js/blob/ma
2929
To use the SDK in the browser, simply add the following script tag to your
3030
HTML pages:
3131

32-
<script src="https://sdk.amazonaws.com/js/aws-sdk-2.1240.0.min.js"></script>
32+
<script src="https://sdk.amazonaws.com/js/aws-sdk-2.1241.0.min.js"></script>
3333

3434
You can also build a custom browser SDK with your specified set of AWS services.
3535
This can allow you to reduce the SDK's size, specify different API versions of

apis/iam-2010-05-08.normal.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4538,7 +4538,7 @@
45384538
},
45394539
"MaxSessionDuration": {
45404540
"shape": "roleMaxSessionDurationType",
4541-
"documentation": "<p>The maximum session duration (in seconds) that you want to set for the specified role. If you do not specify a value for this setting, the default value of one hour is applied. This setting can have a value from 1 hour to 12 hours.</p> <p>Anyone who assumes the role from the or API can use the <code>DurationSeconds</code> API parameter or the <code>duration-seconds</code> CLI parameter to request a longer session. The <code>MaxSessionDuration</code> setting determines the maximum duration that can be requested using the <code>DurationSeconds</code> parameter. If users don't specify a value for the <code>DurationSeconds</code> parameter, their security credentials are valid for one hour by default. This applies when you use the <code>AssumeRole*</code> API operations or the <code>assume-role*</code> CLI operations but does not apply when you use those operations to create a console URL. For more information, see <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html\">Using IAM roles</a> in the <i>IAM User Guide</i>.</p>"
4541+
"documentation": "<p>The maximum session duration (in seconds) that you want to set for the specified role. If you do not specify a value for this setting, the default value of one hour is applied. This setting can have a value from 1 hour to 12 hours.</p> <p>Anyone who assumes the role from the CLI or API can use the <code>DurationSeconds</code> API parameter or the <code>duration-seconds</code> CLI parameter to request a longer session. The <code>MaxSessionDuration</code> setting determines the maximum duration that can be requested using the <code>DurationSeconds</code> parameter. If users don't specify a value for the <code>DurationSeconds</code> parameter, their security credentials are valid for one hour by default. This applies when you use the <code>AssumeRole*</code> API operations or the <code>assume-role*</code> CLI operations but does not apply when you use those operations to create a console URL. For more information, see <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html\">Using IAM roles</a> in the <i>IAM User Guide</i>.</p>"
45424542
},
45434543
"PermissionsBoundary": {
45444544
"shape": "arnType",

0 commit comments

Comments
 (0)