diff --git a/clients/client-workspaces-web/src/endpoint/ruleset.ts b/clients/client-workspaces-web/src/endpoint/ruleset.ts index 307285c2e74a..784f5dd60781 100644 --- a/clients/client-workspaces-web/src/endpoint/ruleset.ts +++ b/clients/client-workspaces-web/src/endpoint/ruleset.ts @@ -6,9 +6,9 @@ import { RuleSetObject } from "@aws-sdk/util-endpoints"; or see "smithy.rules#endpointRuleSet" in codegen/sdk-codegen/aws-models/workspaces-web.json */ -const r="fn", -s="argv", -t="ref"; +const q="fn", +r="argv", +s="ref"; const a=true, b=false, c="String", @@ -17,14 +17,13 @@ e="tree", f="error", g="endpoint", h={"required":true,"default":false,"type":"Boolean"}, -i={[t]:"Endpoint"}, -j={[r]:"booleanEquals",[s]:[{[t]:"UseFIPS"},true]}, -k={[r]:"booleanEquals",[s]:[{[t]:"UseDualStack"},true]}, +i={[s]:"Endpoint"}, +j={[q]:"booleanEquals",[r]:[{[s]:"UseFIPS"},true]}, +k={[q]:"booleanEquals",[r]:[{[s]:"UseDualStack"},true]}, l={}, -m={[r]:"booleanEquals",[s]:[true,{[r]:"getAttr",[s]:[{[t]:d},"supportsFIPS"]}]}, -n={[r]:"booleanEquals",[s]:[true,{[r]:"getAttr",[s]:[{[t]:d},"supportsDualStack"]}]}, -o=[i], -p=[j], -q=[k]; -const _data={version:"1.0",parameters:{Region:{required:a,type:c},UseDualStack:h,UseFIPS:h,Endpoint:{required:b,type:c}},rules:[{conditions:[{[r]:"aws.partition",[s]:[{[t]:"Region"}],assign:d}],type:e,rules:[{conditions:[{[r]:"isSet",[s]:o},{[r]:"parseURL",[s]:o,assign:"url"}],type:e,rules:[{conditions:p,error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:f},{type:e,rules:[{conditions:q,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:f},{endpoint:{url:i,properties:l,headers:l},type:g}]}]},{conditions:[j,k],type:e,rules:[{conditions:[m,n],type:e,rules:[{endpoint:{url:"https://workspaces-web-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:l,headers:l},type:g}]},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:f}]},{conditions:p,type:e,rules:[{conditions:[m],type:e,rules:[{type:e,rules:[{endpoint:{url:"https://workspaces-web-fips.{Region}.{PartitionResult#dnsSuffix}",properties:l,headers:l},type:g}]}]},{error:"FIPS is enabled but this partition does not support FIPS",type:f}]},{conditions:q,type:e,rules:[{conditions:[n],type:e,rules:[{endpoint:{url:"https://workspaces-web.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:l,headers:l},type:g}]},{error:"DualStack is enabled but this partition does not support DualStack",type:f}]},{endpoint:{url:"https://workspaces-web.{Region}.{PartitionResult#dnsSuffix}",properties:l,headers:l},type:g}]}]}; +m={[q]:"booleanEquals",[r]:[true,{[q]:"getAttr",[r]:[{[s]:d},"supportsFIPS"]}]}, +n={[q]:"booleanEquals",[r]:[true,{[q]:"getAttr",[r]:[{[s]:d},"supportsDualStack"]}]}, +o=[j], +p=[k]; +const _data={version:"1.0",parameters:{Region:{required:a,type:c},UseDualStack:h,UseFIPS:h,Endpoint:{required:b,type:c}},rules:[{conditions:[{[q]:"aws.partition",[r]:[{[s]:"Region"}],assign:d}],type:e,rules:[{conditions:[{[q]:"isSet",[r]:[i]}],type:e,rules:[{conditions:o,error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:f},{type:e,rules:[{conditions:p,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:f},{endpoint:{url:i,properties:l,headers:l},type:g}]}]},{conditions:[j,k],type:e,rules:[{conditions:[m,n],type:e,rules:[{endpoint:{url:"https://workspaces-web-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:l,headers:l},type:g}]},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:f}]},{conditions:o,type:e,rules:[{conditions:[m],type:e,rules:[{type:e,rules:[{endpoint:{url:"https://workspaces-web-fips.{Region}.{PartitionResult#dnsSuffix}",properties:l,headers:l},type:g}]}]},{error:"FIPS is enabled but this partition does not support FIPS",type:f}]},{conditions:p,type:e,rules:[{conditions:[n],type:e,rules:[{endpoint:{url:"https://workspaces-web.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:l,headers:l},type:g}]},{error:"DualStack is enabled but this partition does not support DualStack",type:f}]},{endpoint:{url:"https://workspaces-web.{Region}.{PartitionResult#dnsSuffix}",properties:l,headers:l},type:g}]}]}; export const ruleSet: RuleSetObject = _data; diff --git a/clients/client-workspaces-web/src/models/models_0.ts b/clients/client-workspaces-web/src/models/models_0.ts index 0bcc8581d970..ae9c7803ecb4 100644 --- a/clients/client-workspaces-web/src/models/models_0.ts +++ b/clients/client-workspaces-web/src/models/models_0.ts @@ -319,6 +319,11 @@ export interface AssociateUserSettingsResponse { userSettingsArn: string | undefined; } +export enum AuthenticationType { + IAM_IDENTITY_CENTER = "IAM_Identity_Center", + STANDARD = "Standard", +} + /** *
The tag.
*/ @@ -685,6 +690,23 @@ export interface CreatePortalRequest { * SDK. */ clientToken?: string; + + /** + *The type of authentication integration points used when signing into the web portal.
+ * Defaults to Standard
.
+ * Standard
web portals are authenticated directly through your identity
+ * provider. You need to call CreateIdentityProvider
to integrate your identity
+ * provider with your web portal. User and group access to your web portal is controlled
+ * through your identity provider.
+ * IAM_Identity_Center
web portals are authenticated through AWS IAM Identity
+ * Center (successor to AWS Single Sign-On). They provide additional features, such as
+ * IdP-initiated authentication. Identity sources (including external identity provider
+ * integration), plus user and group access to your web portal, can be configured in the IAM
+ * Identity Center.
The ARN of the user access logging settings that is associated with the web portal.
*/ userAccessLoggingSettingsArn?: string; + + /** + *The type of authentication integration points used when signing into the web portal.
+ * Defaults to Standard
.
+ * Standard
web portals are authenticated directly through your identity
+ * provider. You need to call CreateIdentityProvider
to integrate your identity
+ * provider with your web portal. User and group access to your web portal is controlled
+ * through your identity provider.
+ * IAM_Identity_Center
web portals are authenticated through AWS IAM Identity
+ * Center (successor to AWS Single Sign-On). They provide additional features, such as
+ * IdP-initiated authentication. Identity sources (including external identity provider
+ * integration), plus user and group access to your web portal, can be configured in the IAM
+ * Identity Center.
The ARN of the user access logging settings that is associated with the web portal.
*/ userAccessLoggingSettingsArn?: string; + + /** + *The type of authentication integration points used when signing into the web portal.
+ * Defaults to Standard
.
+ * Standard
web portals are authenticated directly through your identity
+ * provider. You need to call CreateIdentityProvider
to integrate your identity
+ * provider with your web portal. User and group access to your web portal is controlled
+ * through your identity provider.
+ * IAM_Identity_Center
web portals are authenticated through AWS IAM Identity
+ * Center (successor to AWS Single Sign-On). They provide additional features, such as
+ * IdP-initiated authentication. Identity sources (including external identity provider
+ * integration), plus user and group access to your web portal, can be configured in the IAM
+ * Identity Center.
The name of the web portal. This is not visible to users who log into the web portal.
*/ displayName?: string; + + /** + *The type of authentication integration points used when signing into the web portal.
+ * Defaults to Standard
.
+ * Standard
web portals are authenticated directly through your identity
+ * provider. You need to call CreateIdentityProvider
to integrate your identity
+ * provider with your web portal. User and group access to your web portal is controlled
+ * through your identity provider.
+ * IAM_Identity_Center
web portals are authenticated through AWS IAM Identity
+ * Center (successor to AWS Single Sign-On). They provide additional features, such as
+ * IdP-initiated authentication. Identity sources (including external identity provider
+ * integration), plus user and group access to your web portal, can be configured in the IAM
+ * Identity Center.
A unique, case-sensitive identifier that you provide to ensure the idempotency of the\n request. Idempotency ensures that an API request completes only once. With an idempotent\n request, if the original request completes successfully, subsequent retries with the same\n client token returns the result from the original successful request.
\nIf you do not specify a client token, one is automatically generated by the AWS\n SDK.
", "smithy.api#idempotencyToken": {} } + }, + "authenticationType": { + "target": "com.amazonaws.workspacesweb#AuthenticationType", + "traits": { + "smithy.api#documentation": "The type of authentication integration points used when signing into the web portal.\n Defaults to Standard
.
\n Standard
web portals are authenticated directly through your identity\n provider. You need to call CreateIdentityProvider
to integrate your identity\n provider with your web portal. User and group access to your web portal is controlled\n through your identity provider.
\n IAM_Identity_Center
web portals are authenticated through AWS IAM Identity\n Center (successor to AWS Single Sign-On). They provide additional features, such as\n IdP-initiated authentication. Identity sources (including external identity provider\n integration), plus user and group access to your web portal, can be configured in the IAM\n Identity Center.
The ARN of the user access logging settings that is associated with the web portal.
" } + }, + "authenticationType": { + "target": "com.amazonaws.workspacesweb#AuthenticationType", + "traits": { + "smithy.api#documentation": "The type of authentication integration points used when signing into the web portal.\n Defaults to Standard
.
\n Standard
web portals are authenticated directly through your identity\n provider. You need to call CreateIdentityProvider
to integrate your identity\n provider with your web portal. User and group access to your web portal is controlled\n through your identity provider.
\n IAM_Identity_Center
web portals are authenticated through AWS IAM Identity\n Center (successor to AWS Single Sign-On). They provide additional features, such as\n IdP-initiated authentication. Identity sources (including external identity provider\n integration), plus user and group access to your web portal, can be configured in the IAM\n Identity Center.
The ARN of the user access logging settings that is associated with the web portal.
" } + }, + "authenticationType": { + "target": "com.amazonaws.workspacesweb#AuthenticationType", + "traits": { + "smithy.api#documentation": "The type of authentication integration points used when signing into the web portal.\n Defaults to Standard
.
\n Standard
web portals are authenticated directly through your identity\n provider. You need to call CreateIdentityProvider
to integrate your identity\n provider with your web portal. User and group access to your web portal is controlled\n through your identity provider.
\n IAM_Identity_Center
web portals are authenticated through AWS IAM Identity\n Center (successor to AWS Single Sign-On). They provide additional features, such as\n IdP-initiated authentication. Identity sources (including external identity provider\n integration), plus user and group access to your web portal, can be configured in the IAM\n Identity Center.
The name of the web portal. This is not visible to users who log into the web portal.
" } + }, + "authenticationType": { + "target": "com.amazonaws.workspacesweb#AuthenticationType", + "traits": { + "smithy.api#documentation": "The type of authentication integration points used when signing into the web portal.\n Defaults to Standard
.
\n Standard
web portals are authenticated directly through your identity\n provider. You need to call CreateIdentityProvider
to integrate your identity\n provider with your web portal. User and group access to your web portal is controlled\n through your identity provider.
\n IAM_Identity_Center
web portals are authenticated through AWS IAM Identity\n Center (successor to AWS Single Sign-On). They provide additional features, such as\n IdP-initiated authentication. Identity sources (including external identity provider\n integration), plus user and group access to your web portal, can be configured in the IAM\n Identity Center.