aws-sdk 2.1002.0 → 2.1006.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +27 -1
- package/README.md +1 -1
- package/apis/backup-2018-11-15.min.json +109 -38
- package/apis/chime-2018-05-01.min.json +263 -197
- package/apis/ec2-2016-11-15.min.json +235 -233
- package/apis/elasticloadbalancingv2-2015-12-01.min.json +26 -24
- package/apis/firehose-2015-08-04.min.json +198 -82
- package/apis/frauddetector-2019-11-15.min.json +358 -75
- package/apis/frauddetector-2019-11-15.paginators.json +5 -0
- package/apis/grafana-2020-08-18.examples.json +5 -0
- package/apis/grafana-2020-08-18.min.json +728 -0
- package/apis/grafana-2020-08-18.paginators.json +16 -0
- package/apis/kendra-2019-02-03.min.json +45 -38
- package/apis/mediaconvert-2017-08-29.min.json +77 -0
- package/apis/medialive-2017-10-14.min.json +297 -227
- package/apis/mediatailor-2018-04-23.min.json +288 -75
- package/apis/mediatailor-2018-04-23.paginators.json +6 -0
- package/apis/metadata.json +3 -0
- package/apis/models.lex.v2-2020-08-07.min.json +182 -118
- package/apis/securityhub-2018-10-26.min.json +634 -259
- package/clients/all.d.ts +1 -0
- package/clients/all.js +2 -1
- package/clients/backup.d.ts +72 -0
- package/clients/chime.d.ts +83 -3
- package/clients/ec2.d.ts +99 -94
- package/clients/ecs.d.ts +4 -4
- package/clients/elbv2.d.ts +10 -1
- package/clients/firehose.d.ts +62 -0
- package/clients/frauddetector.d.ts +434 -26
- package/clients/grafana.d.ts +718 -0
- package/clients/grafana.js +18 -0
- package/clients/kendra.d.ts +30 -1
- package/clients/lexmodelsv2.d.ts +72 -10
- package/clients/lexruntimev2.d.ts +7 -7
- package/clients/mediaconvert.d.ts +63 -0
- package/clients/medialive.d.ts +76 -5
- package/clients/mediatailor.d.ts +224 -0
- package/clients/secretsmanager.d.ts +27 -27
- package/clients/securityhub.d.ts +668 -11
- package/dist/aws-sdk-core-react-native.js +2 -2
- package/dist/aws-sdk-react-native.js +55 -18
- package/dist/aws-sdk.js +465 -342
- package/dist/aws-sdk.min.js +64 -64
- package/lib/config_service_placeholders.d.ts +2 -0
- package/lib/core.js +1 -1
- package/package.json +1 -1
package/clients/securityhub.d.ts
CHANGED
|
@@ -76,11 +76,11 @@ declare class SecurityHub extends Service {
|
|
|
76
76
|
*/
|
|
77
77
|
createInsight(callback?: (err: AWSError, data: SecurityHub.Types.CreateInsightResponse) => void): Request<SecurityHub.Types.CreateInsightResponse, AWSError>;
|
|
78
78
|
/**
|
|
79
|
-
* Creates a member association in Security Hub between the specified accounts and the account used to make the request, which is the administrator account. If you are integrated with Organizations, then the administrator account is designated by the organization management account. CreateMembers is always used to add accounts that are not organization members. For accounts that are managed using Organizations, CreateMembers is only used in the following cases: Security Hub is not configured to automatically add new organization accounts. The account was disassociated or deleted in Security Hub. This action can only be used by an account that has Security Hub enabled. To enable Security Hub, you can use the EnableSecurityHub operation. For accounts that are not organization members, you create the account association and then send an invitation to the member account. To send the invitation, you use the InviteMembers operation. If the account owner accepts the invitation, the account becomes a member account in Security Hub. Accounts that are managed using Organizations do not receive an invitation. They automatically become a member account in Security Hub,
|
|
79
|
+
* Creates a member association in Security Hub between the specified accounts and the account used to make the request, which is the administrator account. If you are integrated with Organizations, then the administrator account is designated by the organization management account. CreateMembers is always used to add accounts that are not organization members. For accounts that are managed using Organizations, CreateMembers is only used in the following cases: Security Hub is not configured to automatically add new organization accounts. The account was disassociated or deleted in Security Hub. This action can only be used by an account that has Security Hub enabled. To enable Security Hub, you can use the EnableSecurityHub operation. For accounts that are not organization members, you create the account association and then send an invitation to the member account. To send the invitation, you use the InviteMembers operation. If the account owner accepts the invitation, the account becomes a member account in Security Hub. Accounts that are managed using Organizations do not receive an invitation. They automatically become a member account in Security Hub. If the organization account does not have Security Hub enabled, then Security Hub and the default standards are automatically enabled. Note that Security Hub cannot be enabled automatically for the organization management account. The organization management account must enable Security Hub before the administrator account enables it as a member account. For organization accounts that already have Security Hub enabled, Security Hub does not make any other changes to those accounts. It does not change their enabled standards or controls. A permissions policy is added that permits the administrator account to view the findings generated in the member account. To remove the association between the administrator and member accounts, use the DisassociateFromMasterAccount or DisassociateMembers operation.
|
|
80
80
|
*/
|
|
81
81
|
createMembers(params: SecurityHub.Types.CreateMembersRequest, callback?: (err: AWSError, data: SecurityHub.Types.CreateMembersResponse) => void): Request<SecurityHub.Types.CreateMembersResponse, AWSError>;
|
|
82
82
|
/**
|
|
83
|
-
* Creates a member association in Security Hub between the specified accounts and the account used to make the request, which is the administrator account. If you are integrated with Organizations, then the administrator account is designated by the organization management account. CreateMembers is always used to add accounts that are not organization members. For accounts that are managed using Organizations, CreateMembers is only used in the following cases: Security Hub is not configured to automatically add new organization accounts. The account was disassociated or deleted in Security Hub. This action can only be used by an account that has Security Hub enabled. To enable Security Hub, you can use the EnableSecurityHub operation. For accounts that are not organization members, you create the account association and then send an invitation to the member account. To send the invitation, you use the InviteMembers operation. If the account owner accepts the invitation, the account becomes a member account in Security Hub. Accounts that are managed using Organizations do not receive an invitation. They automatically become a member account in Security Hub,
|
|
83
|
+
* Creates a member association in Security Hub between the specified accounts and the account used to make the request, which is the administrator account. If you are integrated with Organizations, then the administrator account is designated by the organization management account. CreateMembers is always used to add accounts that are not organization members. For accounts that are managed using Organizations, CreateMembers is only used in the following cases: Security Hub is not configured to automatically add new organization accounts. The account was disassociated or deleted in Security Hub. This action can only be used by an account that has Security Hub enabled. To enable Security Hub, you can use the EnableSecurityHub operation. For accounts that are not organization members, you create the account association and then send an invitation to the member account. To send the invitation, you use the InviteMembers operation. If the account owner accepts the invitation, the account becomes a member account in Security Hub. Accounts that are managed using Organizations do not receive an invitation. They automatically become a member account in Security Hub. If the organization account does not have Security Hub enabled, then Security Hub and the default standards are automatically enabled. Note that Security Hub cannot be enabled automatically for the organization management account. The organization management account must enable Security Hub before the administrator account enables it as a member account. For organization accounts that already have Security Hub enabled, Security Hub does not make any other changes to those accounts. It does not change their enabled standards or controls. A permissions policy is added that permits the administrator account to view the findings generated in the member account. To remove the association between the administrator and member accounts, use the DisassociateFromMasterAccount or DisassociateMembers operation.
|
|
84
84
|
*/
|
|
85
85
|
createMembers(callback?: (err: AWSError, data: SecurityHub.Types.CreateMembersResponse) => void): Request<SecurityHub.Types.CreateMembersResponse, AWSError>;
|
|
86
86
|
/**
|
|
@@ -1306,6 +1306,10 @@ declare namespace SecurityHub {
|
|
|
1306
1306
|
* Provides information about the origin groups in the distribution.
|
|
1307
1307
|
*/
|
|
1308
1308
|
OriginGroups?: AwsCloudFrontDistributionOriginGroups;
|
|
1309
|
+
/**
|
|
1310
|
+
* Provides information about the TLS/SSL configuration that the distribution uses to communicate with viewers.
|
|
1311
|
+
*/
|
|
1312
|
+
ViewerCertificate?: AwsCloudFrontDistributionViewerCertificate;
|
|
1309
1313
|
/**
|
|
1310
1314
|
* Indicates the current status of the distribution.
|
|
1311
1315
|
*/
|
|
@@ -1394,6 +1398,36 @@ declare namespace SecurityHub {
|
|
|
1394
1398
|
*/
|
|
1395
1399
|
Items?: AwsCloudFrontDistributionOriginItemList;
|
|
1396
1400
|
}
|
|
1401
|
+
export interface AwsCloudFrontDistributionViewerCertificate {
|
|
1402
|
+
/**
|
|
1403
|
+
* The ARN of the ACM certificate. Used if the certificate is stored in ACM. If you provide an ACM certificate ARN, you must also provide MinimumCertificateVersion and SslSupportMethod.
|
|
1404
|
+
*/
|
|
1405
|
+
AcmCertificateArn?: NonEmptyString;
|
|
1406
|
+
/**
|
|
1407
|
+
* The identifier of the certificate. Note that in CloudFront, this attribute is deprecated.
|
|
1408
|
+
*/
|
|
1409
|
+
Certificate?: NonEmptyString;
|
|
1410
|
+
/**
|
|
1411
|
+
* The source of the certificate identified by Certificate. Note that in CloudFront, this attribute is deprecated.
|
|
1412
|
+
*/
|
|
1413
|
+
CertificateSource?: NonEmptyString;
|
|
1414
|
+
/**
|
|
1415
|
+
* Whether the distribution uses the CloudFront domain name. If set to false, then you provide either AcmCertificateArn or IamCertificateId.
|
|
1416
|
+
*/
|
|
1417
|
+
CloudFrontDefaultCertificate?: Boolean;
|
|
1418
|
+
/**
|
|
1419
|
+
* The identifier of the IAM certificate. Used if the certificate is stored in IAM. If you provide IamCertificateId, then you also must provide MinimumProtocolVersion and SslSupportMethod.
|
|
1420
|
+
*/
|
|
1421
|
+
IamCertificateId?: NonEmptyString;
|
|
1422
|
+
/**
|
|
1423
|
+
* The security policy that CloudFront uses for HTTPS connections with viewers. If SslSupportMethod is sni-only, then MinimumProtocolVersion must be TLSv1 or higher.
|
|
1424
|
+
*/
|
|
1425
|
+
MinimumProtocolVersion?: NonEmptyString;
|
|
1426
|
+
/**
|
|
1427
|
+
* The viewers that the distribution accepts HTTPS connections from.
|
|
1428
|
+
*/
|
|
1429
|
+
SslSupportMethod?: NonEmptyString;
|
|
1430
|
+
}
|
|
1397
1431
|
export interface AwsCloudTrailTrailDetails {
|
|
1398
1432
|
/**
|
|
1399
1433
|
* The ARN of the log group that CloudTrail logs are delivered to.
|
|
@@ -1456,11 +1490,54 @@ declare namespace SecurityHub {
|
|
|
1456
1490
|
*/
|
|
1457
1491
|
TrailArn?: NonEmptyString;
|
|
1458
1492
|
}
|
|
1493
|
+
export interface AwsCodeBuildProjectArtifactsDetails {
|
|
1494
|
+
/**
|
|
1495
|
+
* An identifier for the artifact definition.
|
|
1496
|
+
*/
|
|
1497
|
+
ArtifactIdentifier?: NonEmptyString;
|
|
1498
|
+
/**
|
|
1499
|
+
* Indicates whether to disable encryption on the artifact. Only valid when Type is S3.
|
|
1500
|
+
*/
|
|
1501
|
+
EncryptionDisabled?: Boolean;
|
|
1502
|
+
/**
|
|
1503
|
+
* Only used when Type is S3. The name of the S3 bucket where the artifact is located.
|
|
1504
|
+
*/
|
|
1505
|
+
Location?: NonEmptyString;
|
|
1506
|
+
/**
|
|
1507
|
+
* Only used when Type is S3. The name of the artifact. Used with NamepaceType and Path to determine the pattern for storing the artifact.
|
|
1508
|
+
*/
|
|
1509
|
+
Name?: NonEmptyString;
|
|
1510
|
+
/**
|
|
1511
|
+
* Only used when Type is S3. The value to use for the namespace. Used with Name and Path to determine the pattern for storing the artifact.
|
|
1512
|
+
*/
|
|
1513
|
+
NamespaceType?: NonEmptyString;
|
|
1514
|
+
/**
|
|
1515
|
+
* Whether the name specified in the buildspec file overrides the artifact name.
|
|
1516
|
+
*/
|
|
1517
|
+
OverrideArtifactName?: Boolean;
|
|
1518
|
+
/**
|
|
1519
|
+
* Only used when Type is S3. The type of output artifact to create.
|
|
1520
|
+
*/
|
|
1521
|
+
Packaging?: NonEmptyString;
|
|
1522
|
+
/**
|
|
1523
|
+
* Only used when Type is S3. The path to the artifact. Used with Name and NamespaceType to determine the pattern for storing the artifact.
|
|
1524
|
+
*/
|
|
1525
|
+
Path?: NonEmptyString;
|
|
1526
|
+
/**
|
|
1527
|
+
* The type of build artifact.
|
|
1528
|
+
*/
|
|
1529
|
+
Type?: NonEmptyString;
|
|
1530
|
+
}
|
|
1531
|
+
export type AwsCodeBuildProjectArtifactsList = AwsCodeBuildProjectArtifactsDetails[];
|
|
1459
1532
|
export interface AwsCodeBuildProjectDetails {
|
|
1460
1533
|
/**
|
|
1461
1534
|
* The KMS key used to encrypt the build output artifacts. You can specify either the ARN of the KMS key or, if available, the KMS key alias (using the format alias/alias-name).
|
|
1462
1535
|
*/
|
|
1463
1536
|
EncryptionKey?: NonEmptyString;
|
|
1537
|
+
/**
|
|
1538
|
+
* Information about the build artifacts for the CodeBuild project.
|
|
1539
|
+
*/
|
|
1540
|
+
Artifacts?: AwsCodeBuildProjectArtifactsList;
|
|
1464
1541
|
/**
|
|
1465
1542
|
* Information about the build environment for this build project.
|
|
1466
1543
|
*/
|
|
@@ -1477,6 +1554,10 @@ declare namespace SecurityHub {
|
|
|
1477
1554
|
* The ARN of the IAM role that enables CodeBuild to interact with dependent Amazon Web Services services on behalf of the Amazon Web Services account.
|
|
1478
1555
|
*/
|
|
1479
1556
|
ServiceRole?: NonEmptyString;
|
|
1557
|
+
/**
|
|
1558
|
+
* Information about logs for the build project.
|
|
1559
|
+
*/
|
|
1560
|
+
LogsConfig?: AwsCodeBuildProjectLogsConfigDetails;
|
|
1480
1561
|
/**
|
|
1481
1562
|
* Information about the VPC configuration that CodeBuild accesses.
|
|
1482
1563
|
*/
|
|
@@ -1487,6 +1568,14 @@ declare namespace SecurityHub {
|
|
|
1487
1568
|
* The certificate to use with this build project.
|
|
1488
1569
|
*/
|
|
1489
1570
|
Certificate?: NonEmptyString;
|
|
1571
|
+
/**
|
|
1572
|
+
* A set of environment variables to make available to builds for the build project.
|
|
1573
|
+
*/
|
|
1574
|
+
EnvironmentVariables?: AwsCodeBuildProjectEnvironmentEnvironmentVariablesList;
|
|
1575
|
+
/**
|
|
1576
|
+
* Whether to allow the Docker daemon to run inside a Docker container. Set to true if the build project is used to build Docker images.
|
|
1577
|
+
*/
|
|
1578
|
+
PrivilegedMode?: Boolean;
|
|
1490
1579
|
/**
|
|
1491
1580
|
* The type of credentials CodeBuild uses to pull images in your build. Valid values: CODEBUILD specifies that CodeBuild uses its own credentials. This requires that you modify your ECR repository policy to trust the CodeBuild service principal. SERVICE_ROLE specifies that CodeBuild uses your build project's service role. When you use a cross-account or private registry image, you must use SERVICE_ROLE credentials. When you use an CodeBuild curated image, you must use CODEBUILD credentials.
|
|
1492
1581
|
*/
|
|
@@ -1500,6 +1589,21 @@ declare namespace SecurityHub {
|
|
|
1500
1589
|
*/
|
|
1501
1590
|
Type?: NonEmptyString;
|
|
1502
1591
|
}
|
|
1592
|
+
export interface AwsCodeBuildProjectEnvironmentEnvironmentVariablesDetails {
|
|
1593
|
+
/**
|
|
1594
|
+
* The name of the environment variable.
|
|
1595
|
+
*/
|
|
1596
|
+
Name?: NonEmptyString;
|
|
1597
|
+
/**
|
|
1598
|
+
* The type of environment variable.
|
|
1599
|
+
*/
|
|
1600
|
+
Type?: NonEmptyString;
|
|
1601
|
+
/**
|
|
1602
|
+
* The value of the environment variable.
|
|
1603
|
+
*/
|
|
1604
|
+
Value?: NonEmptyString;
|
|
1605
|
+
}
|
|
1606
|
+
export type AwsCodeBuildProjectEnvironmentEnvironmentVariablesList = AwsCodeBuildProjectEnvironmentEnvironmentVariablesDetails[];
|
|
1503
1607
|
export interface AwsCodeBuildProjectEnvironmentRegistryCredential {
|
|
1504
1608
|
/**
|
|
1505
1609
|
* The ARN or name of credentials created using Secrets Manager. The credential can use the name of the credentials only if they exist in your current Amazon Web Services Region.
|
|
@@ -1510,6 +1614,44 @@ declare namespace SecurityHub {
|
|
|
1510
1614
|
*/
|
|
1511
1615
|
CredentialProvider?: NonEmptyString;
|
|
1512
1616
|
}
|
|
1617
|
+
export interface AwsCodeBuildProjectLogsConfigCloudWatchLogsDetails {
|
|
1618
|
+
/**
|
|
1619
|
+
* The group name of the logs in CloudWatch Logs.
|
|
1620
|
+
*/
|
|
1621
|
+
GroupName?: NonEmptyString;
|
|
1622
|
+
/**
|
|
1623
|
+
* The current status of the logs in CloudWatch Logs for a build project.
|
|
1624
|
+
*/
|
|
1625
|
+
Status?: NonEmptyString;
|
|
1626
|
+
/**
|
|
1627
|
+
* The prefix of the stream name of the CloudWatch Logs.
|
|
1628
|
+
*/
|
|
1629
|
+
StreamName?: NonEmptyString;
|
|
1630
|
+
}
|
|
1631
|
+
export interface AwsCodeBuildProjectLogsConfigDetails {
|
|
1632
|
+
/**
|
|
1633
|
+
* Information about CloudWatch Logs for the build project.
|
|
1634
|
+
*/
|
|
1635
|
+
CloudWatchLogs?: AwsCodeBuildProjectLogsConfigCloudWatchLogsDetails;
|
|
1636
|
+
/**
|
|
1637
|
+
* Information about logs built to an S3 bucket for a build project.
|
|
1638
|
+
*/
|
|
1639
|
+
S3Logs?: AwsCodeBuildProjectLogsConfigS3LogsDetails;
|
|
1640
|
+
}
|
|
1641
|
+
export interface AwsCodeBuildProjectLogsConfigS3LogsDetails {
|
|
1642
|
+
/**
|
|
1643
|
+
* Whether to disable encryption of the S3 build log output.
|
|
1644
|
+
*/
|
|
1645
|
+
EncryptionDisabled?: Boolean;
|
|
1646
|
+
/**
|
|
1647
|
+
* The ARN of the S3 bucket and the path prefix for S3 logs.
|
|
1648
|
+
*/
|
|
1649
|
+
Location?: NonEmptyString;
|
|
1650
|
+
/**
|
|
1651
|
+
* The current status of the S3 build logs.
|
|
1652
|
+
*/
|
|
1653
|
+
Status?: NonEmptyString;
|
|
1654
|
+
}
|
|
1513
1655
|
export interface AwsCodeBuildProjectSource {
|
|
1514
1656
|
/**
|
|
1515
1657
|
* The type of repository that contains the source code to be built. Valid values are: BITBUCKET - The source code is in a Bitbucket repository. CODECOMMIT - The source code is in an CodeCommit repository. CODEPIPELINE - The source code settings are specified in the source action of a pipeline in CodePipeline. GITHUB - The source code is in a GitHub repository. GITHUB_ENTERPRISE - The source code is in a GitHub Enterprise repository. NO_SOURCE - The project does not have input source code. S3 - The source code is in an S3 input bucket.
|
|
@@ -2344,6 +2486,59 @@ declare namespace SecurityHub {
|
|
|
2344
2486
|
*/
|
|
2345
2487
|
State?: NonEmptyString;
|
|
2346
2488
|
}
|
|
2489
|
+
export interface AwsEc2VpcEndpointServiceDetails {
|
|
2490
|
+
/**
|
|
2491
|
+
* Whether requests from other Amazon Web Services accounts to create an endpoint to the service must first be accepted.
|
|
2492
|
+
*/
|
|
2493
|
+
AcceptanceRequired?: Boolean;
|
|
2494
|
+
/**
|
|
2495
|
+
* The Availability Zones where the service is available.
|
|
2496
|
+
*/
|
|
2497
|
+
AvailabilityZones?: NonEmptyStringList;
|
|
2498
|
+
/**
|
|
2499
|
+
* The DNS names for the service.
|
|
2500
|
+
*/
|
|
2501
|
+
BaseEndpointDnsNames?: NonEmptyStringList;
|
|
2502
|
+
/**
|
|
2503
|
+
* Whether the service manages its VPC endpoints.
|
|
2504
|
+
*/
|
|
2505
|
+
ManagesVpcEndpoints?: Boolean;
|
|
2506
|
+
/**
|
|
2507
|
+
* The ARNs of the Gateway Load Balancers for the service.
|
|
2508
|
+
*/
|
|
2509
|
+
GatewayLoadBalancerArns?: NonEmptyStringList;
|
|
2510
|
+
/**
|
|
2511
|
+
* The ARNs of the Network Load Balancers for the service.
|
|
2512
|
+
*/
|
|
2513
|
+
NetworkLoadBalancerArns?: NonEmptyStringList;
|
|
2514
|
+
/**
|
|
2515
|
+
* The private DNS name for the service.
|
|
2516
|
+
*/
|
|
2517
|
+
PrivateDnsName?: NonEmptyString;
|
|
2518
|
+
/**
|
|
2519
|
+
* The identifier of the service.
|
|
2520
|
+
*/
|
|
2521
|
+
ServiceId?: NonEmptyString;
|
|
2522
|
+
/**
|
|
2523
|
+
* The name of the service.
|
|
2524
|
+
*/
|
|
2525
|
+
ServiceName?: NonEmptyString;
|
|
2526
|
+
/**
|
|
2527
|
+
* The current state of the service.
|
|
2528
|
+
*/
|
|
2529
|
+
ServiceState?: NonEmptyString;
|
|
2530
|
+
/**
|
|
2531
|
+
* The types for the service.
|
|
2532
|
+
*/
|
|
2533
|
+
ServiceType?: AwsEc2VpcEndpointServiceServiceTypeList;
|
|
2534
|
+
}
|
|
2535
|
+
export interface AwsEc2VpcEndpointServiceServiceTypeDetails {
|
|
2536
|
+
/**
|
|
2537
|
+
* The type of service.
|
|
2538
|
+
*/
|
|
2539
|
+
ServiceType?: NonEmptyString;
|
|
2540
|
+
}
|
|
2541
|
+
export type AwsEc2VpcEndpointServiceServiceTypeList = AwsEc2VpcEndpointServiceServiceTypeDetails[];
|
|
2347
2542
|
export interface AwsEc2VpnConnectionDetails {
|
|
2348
2543
|
/**
|
|
2349
2544
|
* The identifier of the VPN connection.
|
|
@@ -2531,6 +2726,48 @@ declare namespace SecurityHub {
|
|
|
2531
2726
|
*/
|
|
2532
2727
|
ImagePublishedAt?: NonEmptyString;
|
|
2533
2728
|
}
|
|
2729
|
+
export interface AwsEcrRepositoryDetails {
|
|
2730
|
+
/**
|
|
2731
|
+
* The ARN of the repository.
|
|
2732
|
+
*/
|
|
2733
|
+
Arn?: NonEmptyString;
|
|
2734
|
+
/**
|
|
2735
|
+
* The image scanning configuration for a repository.
|
|
2736
|
+
*/
|
|
2737
|
+
ImageScanningConfiguration?: AwsEcrRepositoryImageScanningConfigurationDetails;
|
|
2738
|
+
/**
|
|
2739
|
+
* The tag mutability setting for the repository.
|
|
2740
|
+
*/
|
|
2741
|
+
ImageTagMutability?: NonEmptyString;
|
|
2742
|
+
/**
|
|
2743
|
+
* Information about the lifecycle policy for the repository.
|
|
2744
|
+
*/
|
|
2745
|
+
LifecyclePolicy?: AwsEcrRepositoryLifecyclePolicyDetails;
|
|
2746
|
+
/**
|
|
2747
|
+
* The name of the repository.
|
|
2748
|
+
*/
|
|
2749
|
+
RepositoryName?: NonEmptyString;
|
|
2750
|
+
/**
|
|
2751
|
+
* The text of the repository policy.
|
|
2752
|
+
*/
|
|
2753
|
+
RepositoryPolicyText?: NonEmptyString;
|
|
2754
|
+
}
|
|
2755
|
+
export interface AwsEcrRepositoryImageScanningConfigurationDetails {
|
|
2756
|
+
/**
|
|
2757
|
+
* Whether to scan images after they are pushed to a repository.
|
|
2758
|
+
*/
|
|
2759
|
+
ScanOnPush?: Boolean;
|
|
2760
|
+
}
|
|
2761
|
+
export interface AwsEcrRepositoryLifecyclePolicyDetails {
|
|
2762
|
+
/**
|
|
2763
|
+
* The text of the lifecycle policy.
|
|
2764
|
+
*/
|
|
2765
|
+
LifecyclePolicyText?: NonEmptyString;
|
|
2766
|
+
/**
|
|
2767
|
+
* The Amazon Web Services account identifier that is associated with the registry that contains the repository.
|
|
2768
|
+
*/
|
|
2769
|
+
RegistryId?: NonEmptyString;
|
|
2770
|
+
}
|
|
2534
2771
|
export interface AwsEcsClusterClusterSettingsDetails {
|
|
2535
2772
|
/**
|
|
2536
2773
|
* The name of the setting.
|
|
@@ -3441,6 +3678,71 @@ declare namespace SecurityHub {
|
|
|
3441
3678
|
SourcePath?: NonEmptyString;
|
|
3442
3679
|
}
|
|
3443
3680
|
export type AwsEcsTaskDefinitionVolumesList = AwsEcsTaskDefinitionVolumesDetails[];
|
|
3681
|
+
export interface AwsEksClusterDetails {
|
|
3682
|
+
/**
|
|
3683
|
+
* The ARN of the cluster.
|
|
3684
|
+
*/
|
|
3685
|
+
Arn?: NonEmptyString;
|
|
3686
|
+
/**
|
|
3687
|
+
* The certificate authority data for the cluster.
|
|
3688
|
+
*/
|
|
3689
|
+
CertificateAuthorityData?: NonEmptyString;
|
|
3690
|
+
/**
|
|
3691
|
+
* The status of the cluster.
|
|
3692
|
+
*/
|
|
3693
|
+
ClusterStatus?: NonEmptyString;
|
|
3694
|
+
/**
|
|
3695
|
+
* The endpoint for the Amazon EKS API server.
|
|
3696
|
+
*/
|
|
3697
|
+
Endpoint?: NonEmptyString;
|
|
3698
|
+
/**
|
|
3699
|
+
* The name of the cluster.
|
|
3700
|
+
*/
|
|
3701
|
+
Name?: NonEmptyString;
|
|
3702
|
+
/**
|
|
3703
|
+
* The VPC configuration used by the cluster control plane.
|
|
3704
|
+
*/
|
|
3705
|
+
ResourcesVpcConfig?: AwsEksClusterResourcesVpcConfigDetails;
|
|
3706
|
+
/**
|
|
3707
|
+
* The ARN of the IAM role that provides permissions for the Amazon EKS control plane to make calls to Amazon Web Services API operations on your behalf.
|
|
3708
|
+
*/
|
|
3709
|
+
RoleArn?: NonEmptyString;
|
|
3710
|
+
/**
|
|
3711
|
+
* The Amazon EKS server version for the cluster.
|
|
3712
|
+
*/
|
|
3713
|
+
Version?: NonEmptyString;
|
|
3714
|
+
/**
|
|
3715
|
+
* The logging configuration for the cluster.
|
|
3716
|
+
*/
|
|
3717
|
+
Logging?: AwsEksClusterLoggingDetails;
|
|
3718
|
+
}
|
|
3719
|
+
export interface AwsEksClusterLoggingClusterLoggingDetails {
|
|
3720
|
+
/**
|
|
3721
|
+
* Whether the logging types that are listed in Types are enabled.
|
|
3722
|
+
*/
|
|
3723
|
+
Enabled?: Boolean;
|
|
3724
|
+
/**
|
|
3725
|
+
* A list of logging types.
|
|
3726
|
+
*/
|
|
3727
|
+
Types?: NonEmptyStringList;
|
|
3728
|
+
}
|
|
3729
|
+
export type AwsEksClusterLoggingClusterLoggingList = AwsEksClusterLoggingClusterLoggingDetails[];
|
|
3730
|
+
export interface AwsEksClusterLoggingDetails {
|
|
3731
|
+
/**
|
|
3732
|
+
* Cluster logging configurations.
|
|
3733
|
+
*/
|
|
3734
|
+
ClusterLogging?: AwsEksClusterLoggingClusterLoggingList;
|
|
3735
|
+
}
|
|
3736
|
+
export interface AwsEksClusterResourcesVpcConfigDetails {
|
|
3737
|
+
/**
|
|
3738
|
+
* The security groups that are associated with the cross-account elastic network interfaces that are used to allow communication between your nodes and the Amazon EKS control plane.
|
|
3739
|
+
*/
|
|
3740
|
+
SecurityGroupIds?: NonEmptyStringList;
|
|
3741
|
+
/**
|
|
3742
|
+
* The subnets that are associated with the cluster.
|
|
3743
|
+
*/
|
|
3744
|
+
SubnetIds?: NonEmptyStringList;
|
|
3745
|
+
}
|
|
3444
3746
|
export interface AwsElasticBeanstalkEnvironmentDetails {
|
|
3445
3747
|
/**
|
|
3446
3748
|
* The name of the application that is associated with the environment.
|
|
@@ -3577,11 +3879,11 @@ declare namespace SecurityHub {
|
|
|
3577
3879
|
*/
|
|
3578
3880
|
Endpoints?: FieldMap;
|
|
3579
3881
|
/**
|
|
3580
|
-
*
|
|
3882
|
+
* OpenSearch version.
|
|
3581
3883
|
*/
|
|
3582
3884
|
ElasticsearchVersion?: NonEmptyString;
|
|
3583
3885
|
/**
|
|
3584
|
-
* Information about an
|
|
3886
|
+
* Information about an OpenSearch cluster configuration.
|
|
3585
3887
|
*/
|
|
3586
3888
|
ElasticsearchClusterConfig?: AwsElasticsearchDomainElasticsearchClusterConfigDetails;
|
|
3587
3889
|
/**
|
|
@@ -3601,7 +3903,7 @@ declare namespace SecurityHub {
|
|
|
3601
3903
|
*/
|
|
3602
3904
|
ServiceSoftwareOptions?: AwsElasticsearchDomainServiceSoftwareOptions;
|
|
3603
3905
|
/**
|
|
3604
|
-
* Information that
|
|
3906
|
+
* Information that OpenSearch derives based on VPCOptions for the domain.
|
|
3605
3907
|
*/
|
|
3606
3908
|
VPCOptions?: AwsElasticsearchDomainVPCOptions;
|
|
3607
3909
|
}
|
|
@@ -3611,7 +3913,7 @@ declare namespace SecurityHub {
|
|
|
3611
3913
|
*/
|
|
3612
3914
|
EnforceHTTPS?: Boolean;
|
|
3613
3915
|
/**
|
|
3614
|
-
* The TLS security policy to apply to the HTTPS endpoint of the
|
|
3916
|
+
* The TLS security policy to apply to the HTTPS endpoint of the OpenSearch domain. Valid values: Policy-Min-TLS-1-0-2019-07, which supports TLSv1.0 and higher Policy-Min-TLS-1-2-2019-07, which only supports TLSv1.2
|
|
3615
3917
|
*/
|
|
3616
3918
|
TLSSecurityPolicy?: NonEmptyString;
|
|
3617
3919
|
}
|
|
@@ -3641,7 +3943,7 @@ declare namespace SecurityHub {
|
|
|
3641
3943
|
*/
|
|
3642
3944
|
ZoneAwarenessConfig?: AwsElasticsearchDomainElasticsearchClusterConfigZoneAwarenessConfigDetails;
|
|
3643
3945
|
/**
|
|
3644
|
-
* Whether to enable zone awareness for the Elasticsearch domain. When zone awareness is enabled,
|
|
3946
|
+
* Whether to enable zone awareness for the Elasticsearch domain. When zone awareness is enabled, OpenSearch allocates the cluster's nodes and replica index shards across Availability Zones in the same Region. This prevents data loss and minimizes downtime if a node or data center fails.
|
|
3645
3947
|
*/
|
|
3646
3948
|
ZoneAwarenessEnabled?: Boolean;
|
|
3647
3949
|
}
|
|
@@ -3663,11 +3965,11 @@ declare namespace SecurityHub {
|
|
|
3663
3965
|
}
|
|
3664
3966
|
export interface AwsElasticsearchDomainLogPublishingOptions {
|
|
3665
3967
|
/**
|
|
3666
|
-
* Configures the
|
|
3968
|
+
* Configures the OpenSearch index logs publishing.
|
|
3667
3969
|
*/
|
|
3668
3970
|
IndexSlowLogs?: AwsElasticsearchDomainLogPublishingOptionsLogConfig;
|
|
3669
3971
|
/**
|
|
3670
|
-
* Configures the
|
|
3972
|
+
* Configures the OpenSearch search slow log publishing.
|
|
3671
3973
|
*/
|
|
3672
3974
|
SearchSlowLogs?: AwsElasticsearchDomainLogPublishingOptionsLogConfig;
|
|
3673
3975
|
AuditLogs?: AwsElasticsearchDomainLogPublishingOptionsLogConfig;
|
|
@@ -3690,7 +3992,7 @@ declare namespace SecurityHub {
|
|
|
3690
3992
|
}
|
|
3691
3993
|
export interface AwsElasticsearchDomainServiceSoftwareOptions {
|
|
3692
3994
|
/**
|
|
3693
|
-
* The epoch time when the deployment window closes for required updates. After this time, Amazon
|
|
3995
|
+
* The epoch time when the deployment window closes for required updates. After this time, Amazon OpenSearch Service schedules the software upgrade automatically.
|
|
3694
3996
|
*/
|
|
3695
3997
|
AutomatedUpdateDate?: NonEmptyString;
|
|
3696
3998
|
/**
|
|
@@ -3983,6 +4285,17 @@ declare namespace SecurityHub {
|
|
|
3983
4285
|
*/
|
|
3984
4286
|
OwnerAlias?: NonEmptyString;
|
|
3985
4287
|
}
|
|
4288
|
+
export interface AwsElbv2LoadBalancerAttribute {
|
|
4289
|
+
/**
|
|
4290
|
+
* The name of the load balancer attribute.
|
|
4291
|
+
*/
|
|
4292
|
+
Key?: NonEmptyString;
|
|
4293
|
+
/**
|
|
4294
|
+
* The value of the load balancer attribute.
|
|
4295
|
+
*/
|
|
4296
|
+
Value?: NonEmptyString;
|
|
4297
|
+
}
|
|
4298
|
+
export type AwsElbv2LoadBalancerAttributes = AwsElbv2LoadBalancerAttribute[];
|
|
3986
4299
|
export interface AwsElbv2LoadBalancerDetails {
|
|
3987
4300
|
/**
|
|
3988
4301
|
* The Availability Zones for the load balancer.
|
|
@@ -4024,6 +4337,10 @@ declare namespace SecurityHub {
|
|
|
4024
4337
|
* The ID of the VPC for the load balancer.
|
|
4025
4338
|
*/
|
|
4026
4339
|
VpcId?: NonEmptyString;
|
|
4340
|
+
/**
|
|
4341
|
+
* Attributes of the load balancer.
|
|
4342
|
+
*/
|
|
4343
|
+
LoadBalancerAttributes?: AwsElbv2LoadBalancerAttributes;
|
|
4027
4344
|
}
|
|
4028
4345
|
export interface AwsIamAccessKeyDetails {
|
|
4029
4346
|
/**
|
|
@@ -4561,6 +4878,218 @@ declare namespace SecurityHub {
|
|
|
4561
4878
|
CreatedDate?: NonEmptyString;
|
|
4562
4879
|
}
|
|
4563
4880
|
export type AwsLambdaLayerVersionNumber = number;
|
|
4881
|
+
export interface AwsOpenSearchServiceDomainClusterConfigDetails {
|
|
4882
|
+
/**
|
|
4883
|
+
* The number of data nodes to use in the OpenSearch domain.
|
|
4884
|
+
*/
|
|
4885
|
+
InstanceCount?: Integer;
|
|
4886
|
+
/**
|
|
4887
|
+
* Whether UltraWarm is enabled.
|
|
4888
|
+
*/
|
|
4889
|
+
WarmEnabled?: Boolean;
|
|
4890
|
+
/**
|
|
4891
|
+
* The number of UltraWarm instances.
|
|
4892
|
+
*/
|
|
4893
|
+
WarmCount?: Integer;
|
|
4894
|
+
/**
|
|
4895
|
+
* Whether to use a dedicated master node for the OpenSearch domain. A dedicated master node performs cluster management tasks, but does not hold data or respond to data upload requests.
|
|
4896
|
+
*/
|
|
4897
|
+
DedicatedMasterEnabled?: Boolean;
|
|
4898
|
+
/**
|
|
4899
|
+
* Configuration options for zone awareness. Provided if ZoneAwarenessEnabled is true.
|
|
4900
|
+
*/
|
|
4901
|
+
ZoneAwarenessConfig?: AwsOpenSearchServiceDomainClusterConfigZoneAwarenessConfigDetails;
|
|
4902
|
+
/**
|
|
4903
|
+
* The number of instances to use for the master node. If this attribute is specified, then DedicatedMasterEnabled must be true.
|
|
4904
|
+
*/
|
|
4905
|
+
DedicatedMasterCount?: Integer;
|
|
4906
|
+
/**
|
|
4907
|
+
* The instance type for your data nodes.
|
|
4908
|
+
*/
|
|
4909
|
+
InstanceType?: NonEmptyString;
|
|
4910
|
+
/**
|
|
4911
|
+
* The type of UltraWarm instance.
|
|
4912
|
+
*/
|
|
4913
|
+
WarmType?: NonEmptyString;
|
|
4914
|
+
/**
|
|
4915
|
+
* Whether to enable zone awareness for the OpenSearch domain. When zone awareness is enabled, OpenSearch Service allocates the cluster's nodes and replica index shards across Availability Zones (AZs) in the same Region. This prevents data loss and minimizes downtime if a node or data center fails.
|
|
4916
|
+
*/
|
|
4917
|
+
ZoneAwarenessEnabled?: Boolean;
|
|
4918
|
+
/**
|
|
4919
|
+
* The hardware configuration of the computer that hosts the dedicated master node. If this attribute is specified, then DedicatedMasterEnabled must be true.
|
|
4920
|
+
*/
|
|
4921
|
+
DedicatedMasterType?: NonEmptyString;
|
|
4922
|
+
}
|
|
4923
|
+
export interface AwsOpenSearchServiceDomainClusterConfigZoneAwarenessConfigDetails {
|
|
4924
|
+
/**
|
|
4925
|
+
* The number of Availability Zones that the domain uses. Valid values are 2 and 3. The default is 2.
|
|
4926
|
+
*/
|
|
4927
|
+
AvailabilityZoneCount?: Integer;
|
|
4928
|
+
}
|
|
4929
|
+
export interface AwsOpenSearchServiceDomainDetails {
|
|
4930
|
+
/**
|
|
4931
|
+
* The ARN of the OpenSearch Service domain.
|
|
4932
|
+
*/
|
|
4933
|
+
Arn?: NonEmptyString;
|
|
4934
|
+
/**
|
|
4935
|
+
* IAM policy document that specifies the access policies for the OpenSearch Service domain.
|
|
4936
|
+
*/
|
|
4937
|
+
AccessPolicies?: NonEmptyString;
|
|
4938
|
+
/**
|
|
4939
|
+
* The name of the endpoint.
|
|
4940
|
+
*/
|
|
4941
|
+
DomainName?: NonEmptyString;
|
|
4942
|
+
/**
|
|
4943
|
+
* The identifier of the domain.
|
|
4944
|
+
*/
|
|
4945
|
+
Id?: NonEmptyString;
|
|
4946
|
+
/**
|
|
4947
|
+
* The domain endpoint.
|
|
4948
|
+
*/
|
|
4949
|
+
DomainEndpoint?: NonEmptyString;
|
|
4950
|
+
/**
|
|
4951
|
+
* The version of the domain engine.
|
|
4952
|
+
*/
|
|
4953
|
+
EngineVersion?: NonEmptyString;
|
|
4954
|
+
/**
|
|
4955
|
+
* Details about the configuration for encryption at rest.
|
|
4956
|
+
*/
|
|
4957
|
+
EncryptionAtRestOptions?: AwsOpenSearchServiceDomainEncryptionAtRestOptionsDetails;
|
|
4958
|
+
/**
|
|
4959
|
+
* Details about the configuration for node-to-node encryption.
|
|
4960
|
+
*/
|
|
4961
|
+
NodeToNodeEncryptionOptions?: AwsOpenSearchServiceDomainNodeToNodeEncryptionOptionsDetails;
|
|
4962
|
+
/**
|
|
4963
|
+
* Information about the status of a domain relative to the latest service software.
|
|
4964
|
+
*/
|
|
4965
|
+
ServiceSoftwareOptions?: AwsOpenSearchServiceDomainServiceSoftwareOptionsDetails;
|
|
4966
|
+
/**
|
|
4967
|
+
* Details about the configuration of an OpenSearch cluster.
|
|
4968
|
+
*/
|
|
4969
|
+
ClusterConfig?: AwsOpenSearchServiceDomainClusterConfigDetails;
|
|
4970
|
+
/**
|
|
4971
|
+
* Additional options for the domain endpoint.
|
|
4972
|
+
*/
|
|
4973
|
+
DomainEndpointOptions?: AwsOpenSearchServiceDomainDomainEndpointOptionsDetails;
|
|
4974
|
+
/**
|
|
4975
|
+
* Information that OpenSearch Service derives based on VPCOptions for the domain.
|
|
4976
|
+
*/
|
|
4977
|
+
VpcOptions?: AwsOpenSearchServiceDomainVpcOptionsDetails;
|
|
4978
|
+
/**
|
|
4979
|
+
* Configures the CloudWatch Logs to publish for the OpenSearch domain.
|
|
4980
|
+
*/
|
|
4981
|
+
LogPublishingOptions?: AwsOpenSearchServiceDomainLogPublishingOptionsDetails;
|
|
4982
|
+
/**
|
|
4983
|
+
* The domain endpoints. Used if the OpenSearch domain resides in a VPC. This is a map of key-value pairs. The key is always vpc. The value is the endpoint.
|
|
4984
|
+
*/
|
|
4985
|
+
DomainEndpoints?: FieldMap;
|
|
4986
|
+
}
|
|
4987
|
+
export interface AwsOpenSearchServiceDomainDomainEndpointOptionsDetails {
|
|
4988
|
+
/**
|
|
4989
|
+
* The ARN for the security certificate. The certificate is managed in ACM.
|
|
4990
|
+
*/
|
|
4991
|
+
CustomEndpointCertificateArn?: NonEmptyString;
|
|
4992
|
+
/**
|
|
4993
|
+
* Whether to enable a custom endpoint for the domain.
|
|
4994
|
+
*/
|
|
4995
|
+
CustomEndpointEnabled?: Boolean;
|
|
4996
|
+
/**
|
|
4997
|
+
* Whether to require that all traffic to the domain arrive over HTTPS.
|
|
4998
|
+
*/
|
|
4999
|
+
EnforceHTTPS?: Boolean;
|
|
5000
|
+
/**
|
|
5001
|
+
* The fully qualified URL for the custom endpoint.
|
|
5002
|
+
*/
|
|
5003
|
+
CustomEndpoint?: NonEmptyString;
|
|
5004
|
+
/**
|
|
5005
|
+
* The TLS security policy to apply to the HTTPS endpoint of the OpenSearch domain.
|
|
5006
|
+
*/
|
|
5007
|
+
TLSSecurityPolicy?: NonEmptyString;
|
|
5008
|
+
}
|
|
5009
|
+
export interface AwsOpenSearchServiceDomainEncryptionAtRestOptionsDetails {
|
|
5010
|
+
/**
|
|
5011
|
+
* Whether encryption at rest is enabled.
|
|
5012
|
+
*/
|
|
5013
|
+
Enabled?: Boolean;
|
|
5014
|
+
/**
|
|
5015
|
+
* The KMS key ID.
|
|
5016
|
+
*/
|
|
5017
|
+
KmsKeyId?: NonEmptyString;
|
|
5018
|
+
}
|
|
5019
|
+
export interface AwsOpenSearchServiceDomainLogPublishingOption {
|
|
5020
|
+
/**
|
|
5021
|
+
* The ARN of the CloudWatch Logs group to publish the logs to.
|
|
5022
|
+
*/
|
|
5023
|
+
CloudWatchLogsLogGroupArn?: NonEmptyString;
|
|
5024
|
+
/**
|
|
5025
|
+
* Whether the log publishing is enabled.
|
|
5026
|
+
*/
|
|
5027
|
+
Enabled?: Boolean;
|
|
5028
|
+
}
|
|
5029
|
+
export interface AwsOpenSearchServiceDomainLogPublishingOptionsDetails {
|
|
5030
|
+
/**
|
|
5031
|
+
* Configures the OpenSearch index logs publishing.
|
|
5032
|
+
*/
|
|
5033
|
+
IndexSlowLogs?: AwsOpenSearchServiceDomainLogPublishingOption;
|
|
5034
|
+
/**
|
|
5035
|
+
* Configures the OpenSearch search slow log publishing.
|
|
5036
|
+
*/
|
|
5037
|
+
SearchSlowLogs?: AwsOpenSearchServiceDomainLogPublishingOption;
|
|
5038
|
+
/**
|
|
5039
|
+
* Configures the OpenSearch audit logs publishing.
|
|
5040
|
+
*/
|
|
5041
|
+
AuditLogs?: AwsOpenSearchServiceDomainLogPublishingOption;
|
|
5042
|
+
}
|
|
5043
|
+
export interface AwsOpenSearchServiceDomainNodeToNodeEncryptionOptionsDetails {
|
|
5044
|
+
/**
|
|
5045
|
+
* Whether node-to-node encryption is enabled.
|
|
5046
|
+
*/
|
|
5047
|
+
Enabled?: Boolean;
|
|
5048
|
+
}
|
|
5049
|
+
export interface AwsOpenSearchServiceDomainServiceSoftwareOptionsDetails {
|
|
5050
|
+
/**
|
|
5051
|
+
* The epoch time when the deployment window closes for required updates. After this time, OpenSearch Service schedules the software upgrade automatically.
|
|
5052
|
+
*/
|
|
5053
|
+
AutomatedUpdateDate?: NonEmptyString;
|
|
5054
|
+
/**
|
|
5055
|
+
* Whether a request to update the domain can be canceled.
|
|
5056
|
+
*/
|
|
5057
|
+
Cancellable?: Boolean;
|
|
5058
|
+
/**
|
|
5059
|
+
* The version of the service software that is currently installed on the domain.
|
|
5060
|
+
*/
|
|
5061
|
+
CurrentVersion?: NonEmptyString;
|
|
5062
|
+
/**
|
|
5063
|
+
* A more detailed description of the service software status.
|
|
5064
|
+
*/
|
|
5065
|
+
Description?: NonEmptyString;
|
|
5066
|
+
/**
|
|
5067
|
+
* The most recent version of the service software.
|
|
5068
|
+
*/
|
|
5069
|
+
NewVersion?: NonEmptyString;
|
|
5070
|
+
/**
|
|
5071
|
+
* Whether a service software update is available for the domain.
|
|
5072
|
+
*/
|
|
5073
|
+
UpdateAvailable?: Boolean;
|
|
5074
|
+
/**
|
|
5075
|
+
* The status of the service software update.
|
|
5076
|
+
*/
|
|
5077
|
+
UpdateStatus?: NonEmptyString;
|
|
5078
|
+
/**
|
|
5079
|
+
* Whether the service software update is optional.
|
|
5080
|
+
*/
|
|
5081
|
+
OptionalDeployment?: Boolean;
|
|
5082
|
+
}
|
|
5083
|
+
export interface AwsOpenSearchServiceDomainVpcOptionsDetails {
|
|
5084
|
+
/**
|
|
5085
|
+
* The list of security group IDs that are associated with the VPC endpoints for the domain.
|
|
5086
|
+
*/
|
|
5087
|
+
SecurityGroupIds?: NonEmptyStringList;
|
|
5088
|
+
/**
|
|
5089
|
+
* A list of subnet IDs that are associated with the VPC endpoints for the domain.
|
|
5090
|
+
*/
|
|
5091
|
+
SubnetIds?: NonEmptyStringList;
|
|
5092
|
+
}
|
|
4564
5093
|
export interface AwsRdsDbClusterAssociatedRole {
|
|
4565
5094
|
/**
|
|
4566
5095
|
* The ARN of the IAM role.
|
|
@@ -6007,6 +6536,10 @@ declare namespace SecurityHub {
|
|
|
6007
6536
|
* The display name of the owner of the S3 bucket.
|
|
6008
6537
|
*/
|
|
6009
6538
|
OwnerName?: NonEmptyString;
|
|
6539
|
+
/**
|
|
6540
|
+
* The Amazon Web Services account identifier of the account that owns the S3 bucket.
|
|
6541
|
+
*/
|
|
6542
|
+
OwnerAccountId?: NonEmptyString;
|
|
6010
6543
|
/**
|
|
6011
6544
|
* Indicates when the S3 bucket was created. Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.
|
|
6012
6545
|
*/
|
|
@@ -6941,6 +7474,88 @@ declare namespace SecurityHub {
|
|
|
6941
7474
|
*/
|
|
6942
7475
|
Patch?: AwsSsmPatch;
|
|
6943
7476
|
}
|
|
7477
|
+
export interface AwsWafRateBasedRuleDetails {
|
|
7478
|
+
/**
|
|
7479
|
+
* The name of the metrics for the rate-based rule.
|
|
7480
|
+
*/
|
|
7481
|
+
MetricName?: NonEmptyString;
|
|
7482
|
+
/**
|
|
7483
|
+
* The name of the rate-based rule.
|
|
7484
|
+
*/
|
|
7485
|
+
Name?: NonEmptyString;
|
|
7486
|
+
/**
|
|
7487
|
+
* The field that WAF uses to determine whether requests are likely arriving from single source and are subject to rate monitoring.
|
|
7488
|
+
*/
|
|
7489
|
+
RateKey?: NonEmptyString;
|
|
7490
|
+
/**
|
|
7491
|
+
* The maximum number of requests that have an identical value for the field specified in RateKey that are allowed within a five-minute period. If the number of requests exceeds RateLimit and the other predicates specified in the rule are met, WAF triggers the action for the rule.
|
|
7492
|
+
*/
|
|
7493
|
+
RateLimit?: Long;
|
|
7494
|
+
/**
|
|
7495
|
+
* The unique identifier for the rate-based rule.
|
|
7496
|
+
*/
|
|
7497
|
+
RuleId?: NonEmptyString;
|
|
7498
|
+
/**
|
|
7499
|
+
* The predicates to include in the rate-based rule.
|
|
7500
|
+
*/
|
|
7501
|
+
MatchPredicates?: AwsWafRateBasedRuleMatchPredicateList;
|
|
7502
|
+
}
|
|
7503
|
+
export interface AwsWafRateBasedRuleMatchPredicate {
|
|
7504
|
+
/**
|
|
7505
|
+
* The unique identifier for the predicate.
|
|
7506
|
+
*/
|
|
7507
|
+
DataId?: NonEmptyString;
|
|
7508
|
+
/**
|
|
7509
|
+
* If set to true, then the rule actions are performed on requests that match the predicate settings. If set to false, then the rule actions are performed on all requests except those that match the predicate settings.
|
|
7510
|
+
*/
|
|
7511
|
+
Negated?: Boolean;
|
|
7512
|
+
/**
|
|
7513
|
+
* The type of predicate.
|
|
7514
|
+
*/
|
|
7515
|
+
Type?: NonEmptyString;
|
|
7516
|
+
}
|
|
7517
|
+
export type AwsWafRateBasedRuleMatchPredicateList = AwsWafRateBasedRuleMatchPredicate[];
|
|
7518
|
+
export interface AwsWafRegionalRateBasedRuleDetails {
|
|
7519
|
+
/**
|
|
7520
|
+
* The name of the metrics for the rate-based rule.
|
|
7521
|
+
*/
|
|
7522
|
+
MetricName?: NonEmptyString;
|
|
7523
|
+
/**
|
|
7524
|
+
* The name of the rate-based rule.
|
|
7525
|
+
*/
|
|
7526
|
+
Name?: NonEmptyString;
|
|
7527
|
+
/**
|
|
7528
|
+
* The field that WAF uses to determine whether requests are likely arriving from single source and are subject to rate monitoring.
|
|
7529
|
+
*/
|
|
7530
|
+
RateKey?: NonEmptyString;
|
|
7531
|
+
/**
|
|
7532
|
+
* The maximum number of requests that have an identical value for the field specified in RateKey that are allowed within a five-minute period. If the number of requests exceeds RateLimit and the other predicates specified in the rule are met, WAF triggers the action for the rule.
|
|
7533
|
+
*/
|
|
7534
|
+
RateLimit?: Long;
|
|
7535
|
+
/**
|
|
7536
|
+
* The unique identifier for the rate-based rule.
|
|
7537
|
+
*/
|
|
7538
|
+
RuleId?: NonEmptyString;
|
|
7539
|
+
/**
|
|
7540
|
+
* The predicates to include in the rate-based rule.
|
|
7541
|
+
*/
|
|
7542
|
+
MatchPredicates?: AwsWafRegionalRateBasedRuleMatchPredicateList;
|
|
7543
|
+
}
|
|
7544
|
+
export interface AwsWafRegionalRateBasedRuleMatchPredicate {
|
|
7545
|
+
/**
|
|
7546
|
+
* The unique identifier for the predicate.
|
|
7547
|
+
*/
|
|
7548
|
+
DataId?: NonEmptyString;
|
|
7549
|
+
/**
|
|
7550
|
+
* If set to true, then the rule actions are performed on requests that match the predicate settings. If set to false, then the rule actions are performed on all requests except those that match the predicate settings.
|
|
7551
|
+
*/
|
|
7552
|
+
Negated?: Boolean;
|
|
7553
|
+
/**
|
|
7554
|
+
* The type of predicate.
|
|
7555
|
+
*/
|
|
7556
|
+
Type?: NonEmptyString;
|
|
7557
|
+
}
|
|
7558
|
+
export type AwsWafRegionalRateBasedRuleMatchPredicateList = AwsWafRegionalRateBasedRuleMatchPredicate[];
|
|
6944
7559
|
export interface AwsWafWebAclDetails {
|
|
6945
7560
|
/**
|
|
6946
7561
|
* A friendly name or description of the WebACL. You can't change the name of a WebACL after you create it.
|
|
@@ -6986,6 +7601,20 @@ declare namespace SecurityHub {
|
|
|
6986
7601
|
Type?: NonEmptyString;
|
|
6987
7602
|
}
|
|
6988
7603
|
export type AwsWafWebAclRuleList = AwsWafWebAclRule[];
|
|
7604
|
+
export interface AwsXrayEncryptionConfigDetails {
|
|
7605
|
+
/**
|
|
7606
|
+
* The identifier of the KMS key that is used for encryption. Provided if Type is KMS.
|
|
7607
|
+
*/
|
|
7608
|
+
KeyId?: NonEmptyString;
|
|
7609
|
+
/**
|
|
7610
|
+
* The current status of the encryption configuration. When Status is UPDATING, X-Ray might use both the old and new encryption.
|
|
7611
|
+
*/
|
|
7612
|
+
Status?: NonEmptyString;
|
|
7613
|
+
/**
|
|
7614
|
+
* The type of encryption. KMS indicates that the encryption uses KMS keys. NONE indicates to use the default encryption.
|
|
7615
|
+
*/
|
|
7616
|
+
Type?: NonEmptyString;
|
|
7617
|
+
}
|
|
6989
7618
|
export interface BatchDisableStandardsRequest {
|
|
6990
7619
|
/**
|
|
6991
7620
|
* The ARNs of the standards subscriptions to disable.
|
|
@@ -8775,9 +9404,37 @@ declare namespace SecurityHub {
|
|
|
8775
9404
|
*/
|
|
8776
9405
|
AwsEc2VpnConnection?: AwsEc2VpnConnectionDetails;
|
|
8777
9406
|
/**
|
|
8778
|
-
*
|
|
9407
|
+
* Information about an Amazon ECR image.
|
|
8779
9408
|
*/
|
|
8780
9409
|
AwsEcrContainerImage?: AwsEcrContainerImageDetails;
|
|
9410
|
+
/**
|
|
9411
|
+
* Details about an Amazon OpenSearch Service domain.
|
|
9412
|
+
*/
|
|
9413
|
+
AwsOpenSearchServiceDomain?: AwsOpenSearchServiceDomainDetails;
|
|
9414
|
+
/**
|
|
9415
|
+
* Details about the service configuration for a VPC endpoint service.
|
|
9416
|
+
*/
|
|
9417
|
+
AwsEc2VpcEndpointService?: AwsEc2VpcEndpointServiceDetails;
|
|
9418
|
+
/**
|
|
9419
|
+
* Information about the encryption configuration for X-Ray.
|
|
9420
|
+
*/
|
|
9421
|
+
AwsXrayEncryptionConfig?: AwsXrayEncryptionConfigDetails;
|
|
9422
|
+
/**
|
|
9423
|
+
* Details about a rate-based rule for global resources.
|
|
9424
|
+
*/
|
|
9425
|
+
AwsWafRateBasedRule?: AwsWafRateBasedRuleDetails;
|
|
9426
|
+
/**
|
|
9427
|
+
* Details about a rate-based rule for Regional resources.
|
|
9428
|
+
*/
|
|
9429
|
+
AwsWafRegionalRateBasedRule?: AwsWafRegionalRateBasedRuleDetails;
|
|
9430
|
+
/**
|
|
9431
|
+
* Information about an Amazon Elastic Container Registry repository.
|
|
9432
|
+
*/
|
|
9433
|
+
AwsEcrRepository?: AwsEcrRepositoryDetails;
|
|
9434
|
+
/**
|
|
9435
|
+
* Details about an Amazon EKS cluster.
|
|
9436
|
+
*/
|
|
9437
|
+
AwsEksCluster?: AwsEksClusterDetails;
|
|
8781
9438
|
}
|
|
8782
9439
|
export type ResourceList = Resource[];
|
|
8783
9440
|
export interface Result {
|