@aws-sdk/client-route53-recovery-control-config 3.236.0 → 3.240.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,7 +1,7 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
3
  exports.ruleSet = void 0;
4
- const q = "required", r = "fn", s = "argv", t = "ref";
5
- const a = "PartitionResult", b = "tree", c = "error", d = "endpoint", e = { [q]: false, "type": "String" }, f = { [q]: true, "default": false, "type": "Boolean" }, g = { [t]: "Region" }, h = { [t]: "Endpoint" }, i = { [r]: "booleanEquals", [s]: [{ [t]: "UseFIPS" }, true] }, j = { [r]: "booleanEquals", [s]: [{ [t]: "UseDualStack" }, true] }, k = {}, l = { [r]: "booleanEquals", [s]: [true, { [r]: "getAttr", [s]: [{ [t]: a }, "supportsFIPS"] }] }, m = { [r]: "booleanEquals", [s]: [true, { [r]: "getAttr", [s]: [{ [t]: a }, "supportsDualStack"] }] }, n = [h], o = [i], p = [j];
6
- const _data = { version: "1.0", parameters: { Region: e, UseDualStack: f, UseFIPS: f, Endpoint: e }, rules: [{ conditions: [{ [r]: "aws.partition", [s]: [g], assign: a }], type: b, rules: [{ conditions: [{ [r]: "isSet", [s]: n }, { [r]: "parseURL", [s]: n, assign: "url" }], type: b, rules: [{ conditions: o, error: "Invalid Configuration: FIPS and custom endpoint are not supported", type: c }, { type: b, rules: [{ conditions: p, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", type: c }, { endpoint: { url: h, properties: k, headers: k }, type: d }] }] }, { conditions: [i, j], type: b, rules: [{ conditions: [l, m], type: b, rules: [{ endpoint: { url: "https://route53-recovery-control-config-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: k, headers: k }, type: d }] }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", type: c }] }, { conditions: o, type: b, rules: [{ conditions: [l], type: b, rules: [{ type: b, rules: [{ endpoint: { url: "https://route53-recovery-control-config-fips.{Region}.{PartitionResult#dnsSuffix}", properties: k, headers: k }, type: d }] }] }, { error: "FIPS is enabled but this partition does not support FIPS", type: c }] }, { conditions: p, type: b, rules: [{ conditions: [m], type: b, rules: [{ endpoint: { url: "https://route53-recovery-control-config.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: k, headers: k }, type: d }] }, { error: "DualStack is enabled but this partition does not support DualStack", type: c }] }, { type: b, rules: [{ conditions: [{ [r]: "stringEquals", [s]: [g, "aws-global"] }], endpoint: { url: "https://route53-recovery-control-config.us-west-2.amazonaws.com", properties: { authSchemes: [{ name: "sigv4", signingName: "route53-recovery-control-config", signingRegion: "us-west-2" }] }, headers: k }, type: d }, { endpoint: { url: "https://route53-recovery-control-config.{Region}.{PartitionResult#dnsSuffix}", properties: k, headers: k }, type: d }] }] }] };
4
+ const r = "fn", s = "argv", t = "ref";
5
+ const a = true, b = false, c = "String", d = "PartitionResult", e = "tree", f = "error", g = "endpoint", h = { "required": true, "default": false, "type": "Boolean" }, i = { [t]: "Region" }, j = { [t]: "Endpoint" }, k = { [r]: "booleanEquals", [s]: [{ [t]: "UseFIPS" }, true] }, l = { [r]: "booleanEquals", [s]: [{ [t]: "UseDualStack" }, true] }, m = {}, n = { [r]: "booleanEquals", [s]: [true, { [r]: "getAttr", [s]: [{ [t]: d }, "supportsFIPS"] }] }, o = { [r]: "booleanEquals", [s]: [true, { [r]: "getAttr", [s]: [{ [t]: d }, "supportsDualStack"] }] }, p = [k], q = [l];
6
+ const _data = { version: "1.0", parameters: { Region: { required: a, type: c }, UseDualStack: h, UseFIPS: h, Endpoint: { required: b, type: c } }, rules: [{ conditions: [{ [r]: "aws.partition", [s]: [i], assign: d }], type: e, rules: [{ conditions: [{ [r]: "isSet", [s]: [j] }], type: e, rules: [{ conditions: p, error: "Invalid Configuration: FIPS and custom endpoint are not supported", type: f }, { type: e, rules: [{ conditions: q, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", type: f }, { endpoint: { url: j, properties: m, headers: m }, type: g }] }] }, { conditions: [k, l], type: e, rules: [{ conditions: [n, o], type: e, rules: [{ endpoint: { url: "https://route53-recovery-control-config-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: m, headers: m }, type: g }] }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", type: f }] }, { conditions: p, type: e, rules: [{ conditions: [n], type: e, rules: [{ type: e, rules: [{ endpoint: { url: "https://route53-recovery-control-config-fips.{Region}.{PartitionResult#dnsSuffix}", properties: m, headers: m }, type: g }] }] }, { error: "FIPS is enabled but this partition does not support FIPS", type: f }] }, { conditions: q, type: e, rules: [{ conditions: [o], type: e, rules: [{ endpoint: { url: "https://route53-recovery-control-config.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: m, headers: m }, type: g }] }, { error: "DualStack is enabled but this partition does not support DualStack", type: f }] }, { type: e, rules: [{ conditions: [{ [r]: "stringEquals", [s]: [i, "aws-global"] }], endpoint: { url: "https://route53-recovery-control-config.us-west-2.amazonaws.com", properties: { authSchemes: [{ name: "sigv4", signingRegion: "us-west-2", signingName: "route53-recovery-control-config" }] }, headers: m }, type: g }, { endpoint: { url: "https://route53-recovery-control-config.{Region}.{PartitionResult#dnsSuffix}", properties: m, headers: m }, type: g }] }] }] };
7
7
  exports.ruleSet = _data;
@@ -1,4 +1,4 @@
1
- const q = "required", r = "fn", s = "argv", t = "ref";
2
- const a = "PartitionResult", b = "tree", c = "error", d = "endpoint", e = { [q]: false, "type": "String" }, f = { [q]: true, "default": false, "type": "Boolean" }, g = { [t]: "Region" }, h = { [t]: "Endpoint" }, i = { [r]: "booleanEquals", [s]: [{ [t]: "UseFIPS" }, true] }, j = { [r]: "booleanEquals", [s]: [{ [t]: "UseDualStack" }, true] }, k = {}, l = { [r]: "booleanEquals", [s]: [true, { [r]: "getAttr", [s]: [{ [t]: a }, "supportsFIPS"] }] }, m = { [r]: "booleanEquals", [s]: [true, { [r]: "getAttr", [s]: [{ [t]: a }, "supportsDualStack"] }] }, n = [h], o = [i], p = [j];
3
- const _data = { version: "1.0", parameters: { Region: e, UseDualStack: f, UseFIPS: f, Endpoint: e }, rules: [{ conditions: [{ [r]: "aws.partition", [s]: [g], assign: a }], type: b, rules: [{ conditions: [{ [r]: "isSet", [s]: n }, { [r]: "parseURL", [s]: n, assign: "url" }], type: b, rules: [{ conditions: o, error: "Invalid Configuration: FIPS and custom endpoint are not supported", type: c }, { type: b, rules: [{ conditions: p, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", type: c }, { endpoint: { url: h, properties: k, headers: k }, type: d }] }] }, { conditions: [i, j], type: b, rules: [{ conditions: [l, m], type: b, rules: [{ endpoint: { url: "https://route53-recovery-control-config-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: k, headers: k }, type: d }] }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", type: c }] }, { conditions: o, type: b, rules: [{ conditions: [l], type: b, rules: [{ type: b, rules: [{ endpoint: { url: "https://route53-recovery-control-config-fips.{Region}.{PartitionResult#dnsSuffix}", properties: k, headers: k }, type: d }] }] }, { error: "FIPS is enabled but this partition does not support FIPS", type: c }] }, { conditions: p, type: b, rules: [{ conditions: [m], type: b, rules: [{ endpoint: { url: "https://route53-recovery-control-config.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: k, headers: k }, type: d }] }, { error: "DualStack is enabled but this partition does not support DualStack", type: c }] }, { type: b, rules: [{ conditions: [{ [r]: "stringEquals", [s]: [g, "aws-global"] }], endpoint: { url: "https://route53-recovery-control-config.us-west-2.amazonaws.com", properties: { authSchemes: [{ name: "sigv4", signingName: "route53-recovery-control-config", signingRegion: "us-west-2" }] }, headers: k }, type: d }, { endpoint: { url: "https://route53-recovery-control-config.{Region}.{PartitionResult#dnsSuffix}", properties: k, headers: k }, type: d }] }] }] };
1
+ const r = "fn", s = "argv", t = "ref";
2
+ const a = true, b = false, c = "String", d = "PartitionResult", e = "tree", f = "error", g = "endpoint", h = { "required": true, "default": false, "type": "Boolean" }, i = { [t]: "Region" }, j = { [t]: "Endpoint" }, k = { [r]: "booleanEquals", [s]: [{ [t]: "UseFIPS" }, true] }, l = { [r]: "booleanEquals", [s]: [{ [t]: "UseDualStack" }, true] }, m = {}, n = { [r]: "booleanEquals", [s]: [true, { [r]: "getAttr", [s]: [{ [t]: d }, "supportsFIPS"] }] }, o = { [r]: "booleanEquals", [s]: [true, { [r]: "getAttr", [s]: [{ [t]: d }, "supportsDualStack"] }] }, p = [k], q = [l];
3
+ const _data = { version: "1.0", parameters: { Region: { required: a, type: c }, UseDualStack: h, UseFIPS: h, Endpoint: { required: b, type: c } }, rules: [{ conditions: [{ [r]: "aws.partition", [s]: [i], assign: d }], type: e, rules: [{ conditions: [{ [r]: "isSet", [s]: [j] }], type: e, rules: [{ conditions: p, error: "Invalid Configuration: FIPS and custom endpoint are not supported", type: f }, { type: e, rules: [{ conditions: q, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", type: f }, { endpoint: { url: j, properties: m, headers: m }, type: g }] }] }, { conditions: [k, l], type: e, rules: [{ conditions: [n, o], type: e, rules: [{ endpoint: { url: "https://route53-recovery-control-config-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: m, headers: m }, type: g }] }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", type: f }] }, { conditions: p, type: e, rules: [{ conditions: [n], type: e, rules: [{ type: e, rules: [{ endpoint: { url: "https://route53-recovery-control-config-fips.{Region}.{PartitionResult#dnsSuffix}", properties: m, headers: m }, type: g }] }] }, { error: "FIPS is enabled but this partition does not support FIPS", type: f }] }, { conditions: q, type: e, rules: [{ conditions: [o], type: e, rules: [{ endpoint: { url: "https://route53-recovery-control-config.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: m, headers: m }, type: g }] }, { error: "DualStack is enabled but this partition does not support DualStack", type: f }] }, { type: e, rules: [{ conditions: [{ [r]: "stringEquals", [s]: [i, "aws-global"] }], endpoint: { url: "https://route53-recovery-control-config.us-west-2.amazonaws.com", properties: { authSchemes: [{ name: "sigv4", signingRegion: "us-west-2", signingName: "route53-recovery-control-config" }] }, headers: m }, type: g }, { endpoint: { url: "https://route53-recovery-control-config.{Region}.{PartitionResult#dnsSuffix}", properties: m, headers: m }, type: g }] }] }] };
4
4
  export const ruleSet = _data;
@@ -46,7 +46,7 @@ export declare class Route53RecoveryControlConfig extends Route53RecoveryControl
46
46
  createRoutingControl(args: CreateRoutingControlCommandInput, cb: (err: any, data?: CreateRoutingControlCommandOutput) => void): void;
47
47
  createRoutingControl(args: CreateRoutingControlCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: CreateRoutingControlCommandOutput) => void): void;
48
48
  /**
49
- * <p>Creates a safety rule in a control panel. Safety rules let you add safeguards around changing routing control states, and for enabling and disabling routing controls, to help prevent unexpected outcomes.</p> <p>There are two types of safety rules: assertion rules and gating rules.</p> <p>Assertion rule: An assertion rule enforces that, when you change a routing control state, that a certain criteria is met. For example, the criteria might be that at least one routing control state is On after the transation so that traffic continues to flow to at least one cell for the application. This ensures that you avoid a fail-open scenario.</p> <p>Gating rule: A gating rule lets you configure a gating routing control as an overall "on/off" switch for a group of routing controls. Or, you can configure more complex gating scenarios, for example by configuring multiple gating routing controls.</p> <p>For more information, see <a href="https://docs.aws.amazon.com/r53recovery/latest/dg/routing-control.safety-rules.html">Safety rules</a> in the Amazon Route 53 Application Recovery Controller Developer Guide.</p>
49
+ * <p>Creates a safety rule in a control panel. Safety rules let you add safeguards around changing routing control states, and for enabling and disabling routing controls, to help prevent unexpected outcomes.</p> <p>There are two types of safety rules: assertion rules and gating rules.</p> <p>Assertion rule: An assertion rule enforces that, when you change a routing control state, that a certain criteria is met. For example, the criteria might be that at least one routing control state is On after the transaction so that traffic continues to flow to at least one cell for the application. This ensures that you avoid a fail-open scenario.</p> <p>Gating rule: A gating rule lets you configure a gating routing control as an overall "on/off" switch for a group of routing controls. Or, you can configure more complex gating scenarios, for example by configuring multiple gating routing controls.</p> <p>For more information, see <a href="https://docs.aws.amazon.com/r53recovery/latest/dg/routing-control.safety-rules.html">Safety rules</a> in the Amazon Route 53 Application Recovery Controller Developer Guide.</p>
50
50
  */
51
51
  createSafetyRule(args: CreateSafetyRuleCommandInput, options?: __HttpHandlerOptions): Promise<CreateSafetyRuleCommandOutput>;
52
52
  createSafetyRule(args: CreateSafetyRuleCommandInput, cb: (err: any, data?: CreateSafetyRuleCommandOutput) => void): void;
@@ -8,7 +8,7 @@ export interface CreateSafetyRuleCommandInput extends CreateSafetyRuleRequest {
8
8
  export interface CreateSafetyRuleCommandOutput extends CreateSafetyRuleResponse, __MetadataBearer {
9
9
  }
10
10
  /**
11
- * <p>Creates a safety rule in a control panel. Safety rules let you add safeguards around changing routing control states, and for enabling and disabling routing controls, to help prevent unexpected outcomes.</p> <p>There are two types of safety rules: assertion rules and gating rules.</p> <p>Assertion rule: An assertion rule enforces that, when you change a routing control state, that a certain criteria is met. For example, the criteria might be that at least one routing control state is On after the transation so that traffic continues to flow to at least one cell for the application. This ensures that you avoid a fail-open scenario.</p> <p>Gating rule: A gating rule lets you configure a gating routing control as an overall "on/off" switch for a group of routing controls. Or, you can configure more complex gating scenarios, for example by configuring multiple gating routing controls.</p> <p>For more information, see <a href="https://docs.aws.amazon.com/r53recovery/latest/dg/routing-control.safety-rules.html">Safety rules</a> in the Amazon Route 53 Application Recovery Controller Developer Guide.</p>
11
+ * <p>Creates a safety rule in a control panel. Safety rules let you add safeguards around changing routing control states, and for enabling and disabling routing controls, to help prevent unexpected outcomes.</p> <p>There are two types of safety rules: assertion rules and gating rules.</p> <p>Assertion rule: An assertion rule enforces that, when you change a routing control state, that a certain criteria is met. For example, the criteria might be that at least one routing control state is On after the transaction so that traffic continues to flow to at least one cell for the application. This ensures that you avoid a fail-open scenario.</p> <p>Gating rule: A gating rule lets you configure a gating routing control as an overall "on/off" switch for a group of routing controls. Or, you can configure more complex gating scenarios, for example by configuring multiple gating routing controls.</p> <p>For more information, see <a href="https://docs.aws.amazon.com/r53recovery/latest/dg/routing-control.safety-rules.html">Safety rules</a> in the Amazon Route 53 Application Recovery Controller Developer Guide.</p>
12
12
  * @example
13
13
  * Use a bare-bones client and the command you need to make an API call.
14
14
  * ```javascript
@@ -12,7 +12,7 @@ export declare const resolveClientEndpointParameters: <T>(options: T & ClientInp
12
12
  defaultSigningName: string;
13
13
  };
14
14
  export interface EndpointParameters extends __EndpointParameters {
15
- Region?: string;
15
+ Region: string;
16
16
  UseDualStack?: boolean;
17
17
  UseFIPS?: boolean;
18
18
  Endpoint?: string;
@@ -112,7 +112,7 @@ export interface RuleConfig {
112
112
  Type: RuleType | string | undefined;
113
113
  }
114
114
  /**
115
- * <p>An assertion rule enforces that, when you change a routing control state, that the criteria that you set in the rule configuration is met. Otherwise, the change to the routing control is not accepted. For example, the criteria might be that at least one routing control state is On after the transation so that traffic continues to flow to at least one cell for the application. This ensures that you avoid a fail-open scenario.</p>
115
+ * <p>An assertion rule enforces that, when you change a routing control state, that the criteria that you set in the rule configuration is met. Otherwise, the change to the routing control is not accepted. For example, the criteria might be that at least one routing control state is On after the transaction so that traffic continues to flow to at least one cell for the application. This ensures that you avoid a fail-open scenario.</p>
116
116
  */
117
117
  export interface AssertionRule {
118
118
  /**
@@ -128,7 +128,7 @@ export interface AssertionRule {
128
128
  */
129
129
  Name: string | undefined;
130
130
  /**
131
- * <p>The criteria that you set for specific assertion routing controls (AssertedControls) that designate how many routing control states must be ON as the result of a transaction. For example, if you have three assertion routing controls, you might specify atleast 2 for your rule configuration. This means that at least two assertion routing control states must be ON, so that at least two Amazon Web Services Regions have traffic flowing to them.</p>
131
+ * <p>The criteria that you set for specific assertion routing controls (AssertedControls) that designate how many routing control states must be ON as the result of a transaction. For example, if you have three assertion routing controls, you might specify ATLEAST 2 for your rule configuration. This means that at least two assertion routing control states must be ON, so that at least two Amazon Web Services Regions have traffic flowing to them.</p>
132
132
  */
133
133
  RuleConfig: RuleConfig | undefined;
134
134
  /**
@@ -145,7 +145,7 @@ export interface AssertionRule {
145
145
  WaitPeriodMs: number | undefined;
146
146
  }
147
147
  /**
148
- * <p>A gating rule verifies that a gating routing control or set of gating rounting controls, evaluates as true, based on a rule configuration that you specify, which allows a set of routing control state changes to complete.</p> <p>For example, if you specify one gating routing control and you set the Type in the rule configuration to OR, that indicates that you must set the gating routing control to On for the rule to evaluate as true; that is, for the gating control "switch" to be "On". When you do that, then you can update the routing control states for the target routing controls that you specify in the gating rule.</p>
148
+ * <p>A gating rule verifies that a gating routing control or set of gating routing controls, evaluates as true, based on a rule configuration that you specify, which allows a set of routing control state changes to complete.</p> <p>For example, if you specify one gating routing control and you set the Type in the rule configuration to OR, that indicates that you must set the gating routing control to On for the rule to evaluate as true; that is, for the gating control "switch" to be "On". When you do that, then you can update the routing control states for the target routing controls that you specify in the gating rule.</p>
149
149
  */
150
150
  export interface GatingRule {
151
151
  /**
@@ -161,7 +161,7 @@ export interface GatingRule {
161
161
  */
162
162
  Name: string | undefined;
163
163
  /**
164
- * <p>The criteria that you set for gating routing controls that designates how many of the routing control states must be ON to allow you to update target routing control states.</p>
164
+ * <p>The criteria that you set for gating routing controls that designate how many of the routing control states must be ON to allow you to update target routing control states.</p>
165
165
  */
166
166
  RuleConfig: RuleConfig | undefined;
167
167
  /**
@@ -173,7 +173,7 @@ export interface GatingRule {
173
173
  */
174
174
  Status: Status | string | undefined;
175
175
  /**
176
- * <p>An array of target routing control Amazon Resource Names (ARNs) for which the states can only be updated if the rule configuration that you specify evaluates to true for the gating routing control. As a simple example, if you have a single gating control, it acts as an overall "on/off" switch for a set of target routing controls. You can use this to manually override automated fail over, for example.</p>
176
+ * <p>An array of target routing control Amazon Resource Names (ARNs) for which the states can only be updated if the rule configuration that you specify evaluates to true for the gating routing control. As a simple example, if you have a single gating control, it acts as an overall "on/off" switch for a set of target routing controls. You can use this to manually override automated failover, for example.</p>
177
177
  */
178
178
  TargetControls: string[] | undefined;
179
179
  /**
@@ -186,11 +186,11 @@ export interface GatingRule {
186
186
  */
187
187
  export interface Rule {
188
188
  /**
189
- * <p>An assertion rule enforces that, when a routing control state is changed, the criteria set by the rule configuration is met. Otherwise, the change to the routing control state is not accepted. For example, the criteria might be that at least one routing control state is On after the transation so that traffic continues to flow to at least one cell for the application. This ensures that you avoid a fail-open scenario.</p>
189
+ * <p>An assertion rule enforces that, when a routing control state is changed, the criteria set by the rule configuration is met. Otherwise, the change to the routing control state is not accepted. For example, the criteria might be that at least one routing control state is On after the transaction so that traffic continues to flow to at least one cell for the application. This ensures that you avoid a fail-open scenario.</p>
190
190
  */
191
191
  ASSERTION?: AssertionRule;
192
192
  /**
193
- * <p>A gating rule verifies that a gating routing control or set of gating rounting controls, evaluates as true, based on a rule configuration that you specify, which allows a set of routing control state changes to complete.</p> <p>For example, if you specify one gating routing control and you set the Type in the rule configuration to OR, that indicates that you must set the gating routing control to On for the rule to evaluate as true; that is, for the gating control "switch" to be "On". When you do that, then you can update the routing control states for the target routing controls that you specify in the gating rule.</p>
193
+ * <p>A gating rule verifies that a gating routing control or set of gating routing controls, evaluates as true, based on a rule configuration that you specify, which allows a set of routing control state changes to complete.</p> <p>For example, if you specify one gating routing control and you set the Type in the rule configuration to OR, that indicates that you must set the gating routing control to On for the rule to evaluate as true; that is, for the gating control "switch" to be "On". When you do that, then you can update the routing control states for the target routing controls that you specify in the gating rule.</p>
194
194
  */
195
195
  GATING?: GatingRule;
196
196
  }
@@ -271,7 +271,7 @@ export declare class InternalServerException extends __BaseException {
271
271
  constructor(opts: __ExceptionOptionType<InternalServerException, __BaseException>);
272
272
  }
273
273
  /**
274
- * <p>404 response - MalformedQueryString. The query string contains a syntax error or resource not found..</p>
274
+ * <p>404 response - MalformedQueryString. The query string contains a syntax error or resource not found.</p>
275
275
  */
276
276
  export declare class ResourceNotFoundException extends __BaseException {
277
277
  readonly name: "ResourceNotFoundException";
@@ -389,7 +389,7 @@ export interface NewAssertionRule {
389
389
  */
390
390
  Name: string | undefined;
391
391
  /**
392
- * <p>The criteria that you set for specific assertion controls (routing controls) that designate how many control states must be ON as the result of a transaction. For example, if you have three assertion controls, you might specify ATLEAST 2for your rule configuration. This means that at least two assertion controls must be ON, so that at least two Amazon Web Services Regions have traffic flowing to them.</p>
392
+ * <p>The criteria that you set for specific assertion controls (routing controls) that designate how many control states must be ON as the result of a transaction. For example, if you have three assertion controls, you might specify ATLEAST 2 for your rule configuration. This means that at least two assertion controls must be ON, so that at least two Amazon Web Services Regions have traffic flowing to them.</p>
393
393
  */
394
394
  RuleConfig: RuleConfig | undefined;
395
395
  /**
@@ -414,11 +414,11 @@ export interface NewGatingRule {
414
414
  */
415
415
  Name: string | undefined;
416
416
  /**
417
- * <p>The criteria that you set for specific gating controls (routing controls) that designates how many control states must be ON to allow you to change (set or unset) the target control states.</p>
417
+ * <p>The criteria that you set for specific gating controls (routing controls) that designate how many control states must be ON to allow you to change (set or unset) the target control states.</p>
418
418
  */
419
419
  RuleConfig: RuleConfig | undefined;
420
420
  /**
421
- * <p>Routing controls that can only be set or unset if the specified RuleConfig evaluates to true for the specified GatingControls. For example, say you have three gating controls, one for each of three Amazon Web Services Regions. Now you specify AtLeast 2 as your RuleConfig. With these settings, you can only change (set or unset) the routing controls that you have specified as TargetControls if that rule evaluates to true.</p> <p>In other words, your ability to change the routing controls that you have specified as TargetControls is gated by the rule that you set for the routing controls in GatingControls.</p>
421
+ * <p>Routing controls that can only be set or unset if the specified RuleConfig evaluates to true for the specified GatingControls. For example, say you have three gating controls, one for each of three Amazon Web Services Regions. Now you specify ATLEAST 2 as your RuleConfig. With these settings, you can only change (set or unset) the routing controls that you have specified as TargetControls if that rule evaluates to true.</p> <p>In other words, your ability to change the routing controls that you have specified as TargetControls is gated by the rule that you set for the routing controls in GatingControls.</p>
422
422
  */
423
423
  TargetControls: string[] | undefined;
424
424
  /**
@@ -27,7 +27,7 @@ export declare const resolveClientEndpointParameters: <T>(
27
27
  defaultSigningName: string;
28
28
  };
29
29
  export interface EndpointParameters extends __EndpointParameters {
30
- Region?: string;
30
+ Region: string;
31
31
  UseDualStack?: boolean;
32
32
  UseFIPS?: boolean;
33
33
  Endpoint?: string;
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-route53-recovery-control-config",
3
3
  "description": "AWS SDK for JavaScript Route53 Recovery Control Config Client for Node.js, Browser and React Native",
4
- "version": "3.236.0",
4
+ "version": "3.240.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
7
7
  "build:cjs": "tsc -p tsconfig.cjs.json",
@@ -10,7 +10,8 @@
10
10
  "build:include:deps": "lerna run --scope $npm_package_name --include-dependencies build",
11
11
  "build:types": "tsc -p tsconfig.types.json",
12
12
  "build:types:downlevel": "downlevel-dts dist-types dist-types/ts3.4",
13
- "clean": "rimraf ./dist-* && rimraf *.tsbuildinfo"
13
+ "clean": "rimraf ./dist-* && rimraf *.tsbuildinfo",
14
+ "generate:client": "(cd ../../ && yarn generate-clients -g ./codegen/sdk-codegen/aws-models/route53-recovery-control-config.json --keepFiles)"
14
15
  },
15
16
  "main": "./dist-cjs/index.js",
16
17
  "types": "./dist-types/index.d.ts",
@@ -19,9 +20,9 @@
19
20
  "dependencies": {
20
21
  "@aws-crypto/sha256-browser": "2.0.0",
21
22
  "@aws-crypto/sha256-js": "2.0.0",
22
- "@aws-sdk/client-sts": "3.236.0",
23
+ "@aws-sdk/client-sts": "3.238.0",
23
24
  "@aws-sdk/config-resolver": "3.234.0",
24
- "@aws-sdk/credential-provider-node": "3.236.0",
25
+ "@aws-sdk/credential-provider-node": "3.238.0",
25
26
  "@aws-sdk/fetch-http-handler": "3.226.0",
26
27
  "@aws-sdk/hash-node": "3.226.0",
27
28
  "@aws-sdk/invalid-dependency": "3.226.0",