aws-sdk 2.1345.0 → 2.1347.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (54) hide show
  1. package/CHANGELOG.md +23 -1
  2. package/README.md +1 -1
  3. package/apis/autoscaling-2011-01-01.examples.json +72 -0
  4. package/apis/autoscaling-2011-01-01.min.json +13 -5
  5. package/apis/autoscaling-2011-01-01.paginators.json +5 -0
  6. package/apis/batch-2016-08-10.min.json +4 -1
  7. package/apis/compute-optimizer-2019-11-01.min.json +15 -11
  8. package/apis/drs-2020-02-26.min.json +21 -2
  9. package/apis/ec2-2016-11-15.min.json +754 -660
  10. package/apis/elasticmapreduce-2009-03-31.min.json +82 -66
  11. package/apis/glue-2017-03-31.min.json +0 -1
  12. package/apis/guardduty-2017-11-28.min.json +590 -111
  13. package/apis/guardduty-2017-11-28.paginators.json +6 -0
  14. package/apis/imagebuilder-2019-12-02.min.json +546 -75
  15. package/apis/imagebuilder-2019-12-02.paginators.json +23 -0
  16. package/apis/ivs-2020-07-14.min.json +58 -46
  17. package/apis/kendra-2019-02-03.min.json +494 -240
  18. package/apis/metadata.json +4 -0
  19. package/apis/network-firewall-2020-11-12.min.json +238 -9
  20. package/apis/network-firewall-2020-11-12.paginators.json +6 -0
  21. package/apis/rds-2014-10-31.min.json +4 -3
  22. package/apis/sagemaker-geospatial-2020-05-27.min.json +135 -107
  23. package/apis/vpc-lattice-2022-11-30.examples.json +5 -0
  24. package/apis/vpc-lattice-2022-11-30.min.json +2363 -0
  25. package/apis/vpc-lattice-2022-11-30.paginators.json +58 -0
  26. package/apis/wellarchitected-2020-03-31.min.json +125 -21
  27. package/apis/wellarchitected-2020-03-31.paginators.json +5 -0
  28. package/clients/all.d.ts +1 -0
  29. package/clients/all.js +2 -1
  30. package/clients/autoscaling.d.ts +63 -36
  31. package/clients/batch.d.ts +13 -0
  32. package/clients/computeoptimizer.d.ts +13 -3
  33. package/clients/drs.d.ts +25 -5
  34. package/clients/ec2.d.ts +112 -1
  35. package/clients/emr.d.ts +20 -0
  36. package/clients/glue.d.ts +0 -4
  37. package/clients/guardduty.d.ts +491 -8
  38. package/clients/imagebuilder.d.ts +931 -128
  39. package/clients/ivs.d.ts +17 -0
  40. package/clients/kendra.d.ts +424 -75
  41. package/clients/networkfirewall.d.ts +289 -0
  42. package/clients/opensearchserverless.d.ts +6 -6
  43. package/clients/rds.d.ts +25 -17
  44. package/clients/sagemakergeospatial.d.ts +183 -147
  45. package/clients/vpclattice.d.ts +2772 -0
  46. package/clients/vpclattice.js +18 -0
  47. package/clients/wellarchitected.d.ts +125 -34
  48. package/dist/aws-sdk-core-react-native.js +2 -2
  49. package/dist/aws-sdk-react-native.js +61 -24
  50. package/dist/aws-sdk.js +865 -737
  51. package/dist/aws-sdk.min.js +97 -96
  52. package/lib/config_service_placeholders.d.ts +2 -0
  53. package/lib/core.js +1 -1
  54. package/package.json +1 -1
@@ -51,6 +51,14 @@ declare class NetworkFirewall extends Service {
51
51
  * Creates the specified stateless or stateful rule group, which includes the rules for network traffic inspection, a capacity setting, and tags. You provide your rule group specification in your request using either RuleGroup or Rules.
52
52
  */
53
53
  createRuleGroup(callback?: (err: AWSError, data: NetworkFirewall.Types.CreateRuleGroupResponse) => void): Request<NetworkFirewall.Types.CreateRuleGroupResponse, AWSError>;
54
+ /**
55
+ * Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains the Certificate Manager certificate references that Network Firewall uses to decrypt and re-encrypt inbound traffic. After you create a TLS inspection configuration, you associate it with a firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
56
+ */
57
+ createTLSInspectionConfiguration(params: NetworkFirewall.Types.CreateTLSInspectionConfigurationRequest, callback?: (err: AWSError, data: NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse, AWSError>;
58
+ /**
59
+ * Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains the Certificate Manager certificate references that Network Firewall uses to decrypt and re-encrypt inbound traffic. After you create a TLS inspection configuration, you associate it with a firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
60
+ */
61
+ createTLSInspectionConfiguration(callback?: (err: AWSError, data: NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse, AWSError>;
54
62
  /**
55
63
  * Deletes the specified Firewall and its FirewallStatus. This operation requires the firewall's DeleteProtection flag to be FALSE. You can't revert this operation. You can check whether a firewall is in use by reviewing the route tables for the Availability Zones where you have firewall subnet mappings. Retrieve the subnet mappings by calling DescribeFirewall. You define and update the route tables through Amazon VPC. As needed, update the route tables for the zones to remove the firewall endpoints. When the route tables no longer use the firewall endpoints, you can remove the firewall safely. To delete a firewall, remove the delete protection if you need to using UpdateFirewallDeleteProtection, then delete the firewall by calling DeleteFirewall.
56
64
  */
@@ -83,6 +91,14 @@ declare class NetworkFirewall extends Service {
83
91
  * Deletes the specified RuleGroup.
84
92
  */
85
93
  deleteRuleGroup(callback?: (err: AWSError, data: NetworkFirewall.Types.DeleteRuleGroupResponse) => void): Request<NetworkFirewall.Types.DeleteRuleGroupResponse, AWSError>;
94
+ /**
95
+ * Deletes the specified TLSInspectionConfiguration.
96
+ */
97
+ deleteTLSInspectionConfiguration(params: NetworkFirewall.Types.DeleteTLSInspectionConfigurationRequest, callback?: (err: AWSError, data: NetworkFirewall.Types.DeleteTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.DeleteTLSInspectionConfigurationResponse, AWSError>;
98
+ /**
99
+ * Deletes the specified TLSInspectionConfiguration.
100
+ */
101
+ deleteTLSInspectionConfiguration(callback?: (err: AWSError, data: NetworkFirewall.Types.DeleteTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.DeleteTLSInspectionConfigurationResponse, AWSError>;
86
102
  /**
87
103
  * Returns the data objects for the specified firewall.
88
104
  */
@@ -131,6 +147,14 @@ declare class NetworkFirewall extends Service {
131
147
  * High-level information about a rule group, returned by operations like create and describe. You can use the information provided in the metadata to retrieve and manage a rule group. You can retrieve all objects for a rule group by calling DescribeRuleGroup.
132
148
  */
133
149
  describeRuleGroupMetadata(callback?: (err: AWSError, data: NetworkFirewall.Types.DescribeRuleGroupMetadataResponse) => void): Request<NetworkFirewall.Types.DescribeRuleGroupMetadataResponse, AWSError>;
150
+ /**
151
+ * Returns the data objects for the specified TLS inspection configuration.
152
+ */
153
+ describeTLSInspectionConfiguration(params: NetworkFirewall.Types.DescribeTLSInspectionConfigurationRequest, callback?: (err: AWSError, data: NetworkFirewall.Types.DescribeTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.DescribeTLSInspectionConfigurationResponse, AWSError>;
154
+ /**
155
+ * Returns the data objects for the specified TLS inspection configuration.
156
+ */
157
+ describeTLSInspectionConfiguration(callback?: (err: AWSError, data: NetworkFirewall.Types.DescribeTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.DescribeTLSInspectionConfigurationResponse, AWSError>;
134
158
  /**
135
159
  * Removes the specified subnet associations from the firewall. This removes the firewall endpoints from the subnets and removes any network filtering protections that the endpoints were providing.
136
160
  */
@@ -163,6 +187,14 @@ declare class NetworkFirewall extends Service {
163
187
  * Retrieves the metadata for the rule groups that you have defined. Depending on your setting for max results and the number of rule groups, a single call might not return the full list.
164
188
  */
165
189
  listRuleGroups(callback?: (err: AWSError, data: NetworkFirewall.Types.ListRuleGroupsResponse) => void): Request<NetworkFirewall.Types.ListRuleGroupsResponse, AWSError>;
190
+ /**
191
+ * Retrieves the metadata for the TLS inspection configurations that you have defined. Depending on your setting for max results and the number of TLS inspection configurations, a single call might not return the full list.
192
+ */
193
+ listTLSInspectionConfigurations(params: NetworkFirewall.Types.ListTLSInspectionConfigurationsRequest, callback?: (err: AWSError, data: NetworkFirewall.Types.ListTLSInspectionConfigurationsResponse) => void): Request<NetworkFirewall.Types.ListTLSInspectionConfigurationsResponse, AWSError>;
194
+ /**
195
+ * Retrieves the metadata for the TLS inspection configurations that you have defined. Depending on your setting for max results and the number of TLS inspection configurations, a single call might not return the full list.
196
+ */
197
+ listTLSInspectionConfigurations(callback?: (err: AWSError, data: NetworkFirewall.Types.ListTLSInspectionConfigurationsResponse) => void): Request<NetworkFirewall.Types.ListTLSInspectionConfigurationsResponse, AWSError>;
166
198
  /**
167
199
  * Retrieves the tags associated with the specified resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to "customer" and the value to the customer name or ID. You can specify one or more tags to add to each Amazon Web Services resource, up to 50 tags for a resource. You can tag the Amazon Web Services resources that you manage through Network Firewall: firewalls, firewall policies, and rule groups.
168
200
  */
@@ -259,6 +291,14 @@ declare class NetworkFirewall extends Service {
259
291
  *
260
292
  */
261
293
  updateSubnetChangeProtection(callback?: (err: AWSError, data: NetworkFirewall.Types.UpdateSubnetChangeProtectionResponse) => void): Request<NetworkFirewall.Types.UpdateSubnetChangeProtectionResponse, AWSError>;
294
+ /**
295
+ * Updates the TLS inspection configuration settings for the specified TLS inspection configuration. You use a TLS inspection configuration by reference in one or more firewall policies. When you modify a TLS inspection configuration, you modify all firewall policies that use the TLS inspection configuration. To update a TLS inspection configuration, first call DescribeTLSInspectionConfiguration to retrieve the current TLSInspectionConfiguration object, update the object as needed, and then provide the updated object to this call.
296
+ */
297
+ updateTLSInspectionConfiguration(params: NetworkFirewall.Types.UpdateTLSInspectionConfigurationRequest, callback?: (err: AWSError, data: NetworkFirewall.Types.UpdateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.UpdateTLSInspectionConfigurationResponse, AWSError>;
298
+ /**
299
+ * Updates the TLS inspection configuration settings for the specified TLS inspection configuration. You use a TLS inspection configuration by reference in one or more firewall policies. When you modify a TLS inspection configuration, you modify all firewall policies that use the TLS inspection configuration. To update a TLS inspection configuration, first call DescribeTLSInspectionConfiguration to retrieve the current TLSInspectionConfiguration object, update the object as needed, and then provide the updated object to this call.
300
+ */
301
+ updateTLSInspectionConfiguration(callback?: (err: AWSError, data: NetworkFirewall.Types.UpdateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.UpdateTLSInspectionConfigurationResponse, AWSError>;
262
302
  }
263
303
  declare namespace NetworkFirewall {
264
304
  export interface ActionDefinition {
@@ -392,6 +432,7 @@ declare namespace NetworkFirewall {
392
432
  */
393
433
  CIDRs?: CIDRSummary;
394
434
  }
435
+ export type Certificates = TlsCertificateData[];
395
436
  export type CollectionMember_String = string;
396
437
  export type ConfigurationSyncState = "PENDING"|"IN_SYNC"|"CAPACITY_CONSTRAINED"|string;
397
438
  export interface CreateFirewallPolicyRequest {
@@ -534,6 +575,35 @@ declare namespace NetworkFirewall {
534
575
  */
535
576
  RuleGroupResponse: RuleGroupResponse;
536
577
  }
578
+ export interface CreateTLSInspectionConfigurationRequest {
579
+ /**
580
+ * The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.
581
+ */
582
+ TLSInspectionConfigurationName: ResourceName;
583
+ /**
584
+ * The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
585
+ */
586
+ TLSInspectionConfiguration: TLSInspectionConfiguration;
587
+ /**
588
+ * A description of the TLS inspection configuration.
589
+ */
590
+ Description?: Description;
591
+ /**
592
+ * The key:value pairs to associate with the resource.
593
+ */
594
+ Tags?: TagList;
595
+ EncryptionConfiguration?: EncryptionConfiguration;
596
+ }
597
+ export interface CreateTLSInspectionConfigurationResponse {
598
+ /**
599
+ * A token used for optimistic locking. Network Firewall returns a token to your requests that access the TLS inspection configuration. The token marks the state of the TLS inspection configuration resource at the time of the request. To make changes to the TLS inspection configuration, you provide the token in your request. Network Firewall uses the token to ensure that the TLS inspection configuration hasn't changed since you last retrieved it. If it has changed, the operation fails with an InvalidTokenException. If this happens, retrieve the TLS inspection configuration again to get a current copy of it with a current token. Reapply your changes as needed, then try the operation again using the new token.
600
+ */
601
+ UpdateToken: UpdateToken;
602
+ /**
603
+ * The high-level properties of a TLS inspection configuration. This, along with the TLSInspectionConfiguration, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration.
604
+ */
605
+ TLSInspectionConfigurationResponse: TLSInspectionConfigurationResponse;
606
+ }
537
607
  export interface CustomAction {
538
608
  /**
539
609
  * The descriptive name of the custom action. You can't change the name of a custom action after you create it.
@@ -603,6 +673,22 @@ declare namespace NetworkFirewall {
603
673
  */
604
674
  RuleGroupResponse: RuleGroupResponse;
605
675
  }
676
+ export interface DeleteTLSInspectionConfigurationRequest {
677
+ /**
678
+ * The Amazon Resource Name (ARN) of the TLS inspection configuration. You must specify the ARN or the name, and you can specify both.
679
+ */
680
+ TLSInspectionConfigurationArn?: ResourceArn;
681
+ /**
682
+ * The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it. You must specify the ARN or the name, and you can specify both.
683
+ */
684
+ TLSInspectionConfigurationName?: ResourceName;
685
+ }
686
+ export interface DeleteTLSInspectionConfigurationResponse {
687
+ /**
688
+ * The high-level properties of a TLS inspection configuration. This, along with the TLSInspectionConfiguration, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration.
689
+ */
690
+ TLSInspectionConfigurationResponse: TLSInspectionConfigurationResponse;
691
+ }
606
692
  export interface DescribeFirewallPolicyRequest {
607
693
  /**
608
694
  * The descriptive name of the firewall policy. You can't change the name of a firewall policy after you create it. You must specify the ARN or the name, and you can specify both.
@@ -749,6 +835,30 @@ declare namespace NetworkFirewall {
749
835
  */
750
836
  RuleGroupResponse: RuleGroupResponse;
751
837
  }
838
+ export interface DescribeTLSInspectionConfigurationRequest {
839
+ /**
840
+ * The Amazon Resource Name (ARN) of the TLS inspection configuration. You must specify the ARN or the name, and you can specify both.
841
+ */
842
+ TLSInspectionConfigurationArn?: ResourceArn;
843
+ /**
844
+ * The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it. You must specify the ARN or the name, and you can specify both.
845
+ */
846
+ TLSInspectionConfigurationName?: ResourceName;
847
+ }
848
+ export interface DescribeTLSInspectionConfigurationResponse {
849
+ /**
850
+ * A token used for optimistic locking. Network Firewall returns a token to your requests that access the TLS inspection configuration. The token marks the state of the TLS inspection configuration resource at the time of the request. To make changes to the TLS inspection configuration, you provide the token in your request. Network Firewall uses the token to ensure that the TLS inspection configuration hasn't changed since you last retrieved it. If it has changed, the operation fails with an InvalidTokenException. If this happens, retrieve the TLS inspection configuration again to get a current copy of it with a current token. Reapply your changes as needed, then try the operation again using the new token.
851
+ */
852
+ UpdateToken: UpdateToken;
853
+ /**
854
+ * The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
855
+ */
856
+ TLSInspectionConfiguration?: TLSInspectionConfiguration;
857
+ /**
858
+ * The high-level properties of a TLS inspection configuration. This, along with the TLSInspectionConfiguration, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration.
859
+ */
860
+ TLSInspectionConfigurationResponse: TLSInspectionConfigurationResponse;
861
+ }
752
862
  export type Description = string;
753
863
  export type Destination = string;
754
864
  export interface Dimension {
@@ -897,6 +1007,10 @@ declare namespace NetworkFirewall {
897
1007
  * Additional options governing how Network Firewall handles stateful rules. The stateful rule groups that you use in your policy must have stateful rule options settings that are compatible with these settings.
898
1008
  */
899
1009
  StatefulEngineOptions?: StatefulEngineOptions;
1010
+ /**
1011
+ * The Amazon Resource Name (ARN) of the TLS inspection configuration.
1012
+ */
1013
+ TLSInspectionConfigurationArn?: ResourceArn;
900
1014
  }
901
1015
  export interface FirewallPolicyMetadata {
902
1016
  /**
@@ -1107,6 +1221,26 @@ declare namespace NetworkFirewall {
1107
1221
  */
1108
1222
  RuleGroups?: RuleGroups;
1109
1223
  }
1224
+ export interface ListTLSInspectionConfigurationsRequest {
1225
+ /**
1226
+ * When you request a list of objects with a MaxResults setting, if the number of objects that are still available for retrieval exceeds the maximum you requested, Network Firewall returns a NextToken value in the response. To retrieve the next batch of objects, use the token returned from the prior request in your next request.
1227
+ */
1228
+ NextToken?: PaginationToken;
1229
+ /**
1230
+ * The maximum number of objects that you want Network Firewall to return for this request. If more objects are available, in the response, Network Firewall provides a NextToken value that you can use in a subsequent call to get the next batch of objects.
1231
+ */
1232
+ MaxResults?: PaginationMaxResults;
1233
+ }
1234
+ export interface ListTLSInspectionConfigurationsResponse {
1235
+ /**
1236
+ * When you request a list of objects with a MaxResults setting, if the number of objects that are still available for retrieval exceeds the maximum you requested, Network Firewall returns a NextToken value in the response. To retrieve the next batch of objects, use the token returned from the prior request in your next request.
1237
+ */
1238
+ NextToken?: PaginationToken;
1239
+ /**
1240
+ * The TLS inspection configuration metadata objects that you've defined. Depending on your setting for max results and the number of TLS inspection configurations, this might not be the full list.
1241
+ */
1242
+ TLSInspectionConfigurations?: TLSInspectionConfigurations;
1243
+ }
1110
1244
  export interface ListTagsForResourceRequest {
1111
1245
  /**
1112
1246
  * When you request a list of objects with a MaxResults setting, if the number of objects that are still available for retrieval exceeds the maximum you requested, Network Firewall returns a NextToken value in the response. To retrieve the next batch of objects, use the token returned from the prior request in your next request.
@@ -1406,6 +1540,47 @@ declare namespace NetworkFirewall {
1406
1540
  GeneratedRulesType: GeneratedRulesType;
1407
1541
  }
1408
1542
  export type RulesString = string;
1543
+ export interface ServerCertificate {
1544
+ /**
1545
+ * The Amazon Resource Name (ARN) of the Certificate Manager SSL/TLS server certificate.
1546
+ */
1547
+ ResourceArn?: ResourceArn;
1548
+ }
1549
+ export interface ServerCertificateConfiguration {
1550
+ /**
1551
+ * The list of a server certificate configuration's Certificate Manager SSL/TLS certificates.
1552
+ */
1553
+ ServerCertificates?: ServerCertificates;
1554
+ /**
1555
+ * A list of a server certificate configuration's scopes.
1556
+ */
1557
+ Scopes?: ServerCertificateScopes;
1558
+ }
1559
+ export type ServerCertificateConfigurations = ServerCertificateConfiguration[];
1560
+ export interface ServerCertificateScope {
1561
+ /**
1562
+ * The source IP addresses and address ranges to decrypt for inspection, in CIDR notation. If not specified, this matches with any source address.
1563
+ */
1564
+ Sources?: Addresses;
1565
+ /**
1566
+ * The destination IP addresses and address ranges to decrypt for inspection, in CIDR notation. If not specified, this matches with any destination address.
1567
+ */
1568
+ Destinations?: Addresses;
1569
+ /**
1570
+ * The source ports to decrypt for inspection, in Transmission Control Protocol (TCP) format. If not specified, this matches with any source port. You can specify individual ports, for example 1994, and you can specify port ranges, such as 1990:1994.
1571
+ */
1572
+ SourcePorts?: PortRanges;
1573
+ /**
1574
+ * The destination ports to decrypt for inspection, in Transmission Control Protocol (TCP) format. If not specified, this matches with any destination port. You can specify individual ports, for example 1994, and you can specify port ranges, such as 1990:1994.
1575
+ */
1576
+ DestinationPorts?: PortRanges;
1577
+ /**
1578
+ * The protocols to decrypt for inspection, specified using each protocol's assigned internet protocol number (IANA). Network Firewall currently supports only TCP.
1579
+ */
1580
+ Protocols?: ProtocolNumbers;
1581
+ }
1582
+ export type ServerCertificateScopes = ServerCertificateScope[];
1583
+ export type ServerCertificates = ServerCertificate[];
1409
1584
  export type Setting = string;
1410
1585
  export type Settings = Setting[];
1411
1586
  export type Source = string;
@@ -1509,6 +1684,7 @@ declare namespace NetworkFirewall {
1509
1684
  CustomActions?: CustomActions;
1510
1685
  }
1511
1686
  export type StatusMessage = string;
1687
+ export type StatusReason = string;
1512
1688
  export type StreamExceptionPolicy = "DROP"|"CONTINUE"|string;
1513
1689
  export interface SubnetMapping {
1514
1690
  /**
@@ -1545,6 +1721,65 @@ declare namespace NetworkFirewall {
1545
1721
  Masks?: Flags;
1546
1722
  }
1547
1723
  export type TCPFlags = TCPFlagField[];
1724
+ export interface TLSInspectionConfiguration {
1725
+ /**
1726
+ * Lists the server certificate configurations that are associated with the TLS configuration.
1727
+ */
1728
+ ServerCertificateConfigurations?: ServerCertificateConfigurations;
1729
+ }
1730
+ export interface TLSInspectionConfigurationMetadata {
1731
+ /**
1732
+ * The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.
1733
+ */
1734
+ Name?: ResourceName;
1735
+ /**
1736
+ * The Amazon Resource Name (ARN) of the TLS inspection configuration.
1737
+ */
1738
+ Arn?: ResourceArn;
1739
+ }
1740
+ export interface TLSInspectionConfigurationResponse {
1741
+ /**
1742
+ * The Amazon Resource Name (ARN) of the TLS inspection configuration.
1743
+ */
1744
+ TLSInspectionConfigurationArn: ResourceArn;
1745
+ /**
1746
+ * The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.
1747
+ */
1748
+ TLSInspectionConfigurationName: ResourceName;
1749
+ /**
1750
+ * A unique identifier for the TLS inspection configuration. This ID is returned in the responses to create and list commands. You provide it to operations such as update and delete.
1751
+ */
1752
+ TLSInspectionConfigurationId: ResourceId;
1753
+ /**
1754
+ * Detailed information about the current status of a TLSInspectionConfiguration. You can retrieve this for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration and providing the TLS inspection configuration name and ARN.
1755
+ */
1756
+ TLSInspectionConfigurationStatus?: ResourceStatus;
1757
+ /**
1758
+ * A description of the TLS inspection configuration.
1759
+ */
1760
+ Description?: Description;
1761
+ /**
1762
+ * The key:value pairs to associate with the resource.
1763
+ */
1764
+ Tags?: TagList;
1765
+ /**
1766
+ * The last time that the TLS inspection configuration was changed.
1767
+ */
1768
+ LastModifiedTime?: LastUpdateTime;
1769
+ /**
1770
+ * The number of firewall policies that use this TLS inspection configuration.
1771
+ */
1772
+ NumberOfAssociations?: NumberOfAssociations;
1773
+ /**
1774
+ * A complex type that contains the Amazon Web Services KMS encryption configuration settings for your TLS inspection configuration.
1775
+ */
1776
+ EncryptionConfiguration?: EncryptionConfiguration;
1777
+ /**
1778
+ * A list of the certificates associated with the TLS inspection configuration.
1779
+ */
1780
+ Certificates?: Certificates;
1781
+ }
1782
+ export type TLSInspectionConfigurations = TLSInspectionConfigurationMetadata[];
1548
1783
  export interface Tag {
1549
1784
  /**
1550
1785
  * The part of the key:value pair that defines a tag. You can use a tag key to describe a category of information, such as "customer." Tag keys are case-sensitive.
@@ -1574,6 +1809,24 @@ declare namespace NetworkFirewall {
1574
1809
  export type TagsPaginationMaxResults = number;
1575
1810
  export type TargetType = "TLS_SNI"|"HTTP_HOST"|string;
1576
1811
  export type TargetTypes = TargetType[];
1812
+ export interface TlsCertificateData {
1813
+ /**
1814
+ * The Amazon Resource Name (ARN) of the certificate.
1815
+ */
1816
+ CertificateArn?: ResourceArn;
1817
+ /**
1818
+ * The serial number of the certificate.
1819
+ */
1820
+ CertificateSerial?: CollectionMember_String;
1821
+ /**
1822
+ * The status of the certificate.
1823
+ */
1824
+ Status?: CollectionMember_String;
1825
+ /**
1826
+ * Contains details about the certificate status, including information about certificate errors.
1827
+ */
1828
+ StatusMessage?: StatusReason;
1829
+ }
1577
1830
  export interface UntagResourceRequest {
1578
1831
  /**
1579
1832
  * The Amazon Resource Name (ARN) of the resource.
@@ -1877,6 +2130,42 @@ declare namespace NetworkFirewall {
1877
2130
  */
1878
2131
  SubnetChangeProtection?: Boolean;
1879
2132
  }
2133
+ export interface UpdateTLSInspectionConfigurationRequest {
2134
+ /**
2135
+ * The Amazon Resource Name (ARN) of the TLS inspection configuration.
2136
+ */
2137
+ TLSInspectionConfigurationArn?: ResourceArn;
2138
+ /**
2139
+ * The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.
2140
+ */
2141
+ TLSInspectionConfigurationName?: ResourceName;
2142
+ /**
2143
+ * The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
2144
+ */
2145
+ TLSInspectionConfiguration: TLSInspectionConfiguration;
2146
+ /**
2147
+ * A description of the TLS inspection configuration.
2148
+ */
2149
+ Description?: Description;
2150
+ /**
2151
+ * A complex type that contains the Amazon Web Services KMS encryption configuration settings for your TLS inspection configuration.
2152
+ */
2153
+ EncryptionConfiguration?: EncryptionConfiguration;
2154
+ /**
2155
+ * A token used for optimistic locking. Network Firewall returns a token to your requests that access the TLS inspection configuration. The token marks the state of the TLS inspection configuration resource at the time of the request. To make changes to the TLS inspection configuration, you provide the token in your request. Network Firewall uses the token to ensure that the TLS inspection configuration hasn't changed since you last retrieved it. If it has changed, the operation fails with an InvalidTokenException. If this happens, retrieve the TLS inspection configuration again to get a current copy of it with a current token. Reapply your changes as needed, then try the operation again using the new token.
2156
+ */
2157
+ UpdateToken: UpdateToken;
2158
+ }
2159
+ export interface UpdateTLSInspectionConfigurationResponse {
2160
+ /**
2161
+ * A token used for optimistic locking. Network Firewall returns a token to your requests that access the TLS inspection configuration. The token marks the state of the TLS inspection configuration resource at the time of the request. To make changes to the TLS inspection configuration, you provide the token in your request. Network Firewall uses the token to ensure that the TLS inspection configuration hasn't changed since you last retrieved it. If it has changed, the operation fails with an InvalidTokenException. If this happens, retrieve the TLS inspection configuration again to get a current copy of it with a current token. Reapply your changes as needed, then try the operation again using the new token.
2162
+ */
2163
+ UpdateToken: UpdateToken;
2164
+ /**
2165
+ * The high-level properties of a TLS inspection configuration. This, along with the TLSInspectionConfiguration, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration.
2166
+ */
2167
+ TLSInspectionConfigurationResponse: TLSInspectionConfigurationResponse;
2168
+ }
1880
2169
  export type UpdateToken = string;
1881
2170
  export type VariableDefinition = string;
1882
2171
  export type VariableDefinitionList = VariableDefinition[];
@@ -220,11 +220,11 @@ declare class OpenSearchServerless extends Service {
220
220
  */
221
221
  updateAccessPolicy(callback?: (err: AWSError, data: OpenSearchServerless.Types.UpdateAccessPolicyResponse) => void): Request<OpenSearchServerless.Types.UpdateAccessPolicyResponse, AWSError>;
222
222
  /**
223
- * Update the OpenSearch Serverless settings for the current Amazon Web Services account. For more information, see Autoscaling.
223
+ * Update the OpenSearch Serverless settings for the current Amazon Web Services account. For more information, see Managing capacity limits for Amazon OpenSearch Serverless.
224
224
  */
225
225
  updateAccountSettings(params: OpenSearchServerless.Types.UpdateAccountSettingsRequest, callback?: (err: AWSError, data: OpenSearchServerless.Types.UpdateAccountSettingsResponse) => void): Request<OpenSearchServerless.Types.UpdateAccountSettingsResponse, AWSError>;
226
226
  /**
227
- * Update the OpenSearch Serverless settings for the current Amazon Web Services account. For more information, see Autoscaling.
227
+ * Update the OpenSearch Serverless settings for the current Amazon Web Services account. For more information, see Managing capacity limits for Amazon OpenSearch Serverless.
228
228
  */
229
229
  updateAccountSettings(callback?: (err: AWSError, data: OpenSearchServerless.Types.UpdateAccountSettingsResponse) => void): Request<OpenSearchServerless.Types.UpdateAccountSettingsResponse, AWSError>;
230
230
  /**
@@ -588,7 +588,7 @@ declare namespace OpenSearchServerless {
588
588
  */
589
589
  name: ConfigName;
590
590
  /**
591
- * Describes SAML options in in the form of a key-value map.
591
+ * Describes SAML options in in the form of a key-value map. This field is required if you specify saml for the type parameter.
592
592
  */
593
593
  samlOptions?: SamlConfigOptions;
594
594
  /**
@@ -861,7 +861,7 @@ declare namespace OpenSearchServerless {
861
861
  */
862
862
  nextToken?: String;
863
863
  /**
864
- * Resource filters (can be collection or indexes) that policies can apply to.
864
+ * Resource filters (can be collections or indexes) that policies can apply to.
865
865
  */
866
866
  resource?: ListAccessPoliciesRequestResourceList;
867
867
  /**
@@ -1014,7 +1014,7 @@ declare namespace OpenSearchServerless {
1014
1014
  */
1015
1015
  metadata: samlMetadata;
1016
1016
  /**
1017
- * The session timeout, in minutes. Minimum is 15 minutes and maximum is 1440 minutes (24 hours or 1 day). Default is 60 minutes.
1017
+ * The session timeout, in minutes. Default is 60 minutes (12 hours).
1018
1018
  */
1019
1019
  sessionTimeout?: SamlConfigOptionsSessionTimeoutInteger;
1020
1020
  /**
@@ -1440,7 +1440,7 @@ declare namespace OpenSearchServerless {
1440
1440
  */
1441
1441
  subnetIds?: SubnetIds;
1442
1442
  /**
1443
- * The ID of the VPC from which you access OpenSearch Serverless
1443
+ * The ID of the VPC from which you access OpenSearch Serverless.
1444
1444
  */
1445
1445
  vpcId?: VpcId;
1446
1446
  }