aws-sdk 2.1346.0 → 2.1347.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +19 -1
- package/README.md +1 -1
- package/apis/autoscaling-2011-01-01.examples.json +72 -0
- package/apis/autoscaling-2011-01-01.min.json +13 -5
- package/apis/autoscaling-2011-01-01.paginators.json +5 -0
- package/apis/batch-2016-08-10.min.json +4 -1
- package/apis/compute-optimizer-2019-11-01.min.json +15 -11
- package/apis/drs-2020-02-26.min.json +21 -2
- package/apis/ec2-2016-11-15.min.json +754 -660
- package/apis/elasticmapreduce-2009-03-31.min.json +82 -66
- package/apis/glue-2017-03-31.min.json +0 -1
- package/apis/guardduty-2017-11-28.min.json +590 -111
- package/apis/guardduty-2017-11-28.paginators.json +6 -0
- package/apis/imagebuilder-2019-12-02.min.json +546 -75
- package/apis/imagebuilder-2019-12-02.paginators.json +23 -0
- package/apis/ivs-2020-07-14.min.json +58 -46
- package/apis/kendra-2019-02-03.min.json +494 -240
- package/apis/metadata.json +4 -0
- package/apis/network-firewall-2020-11-12.min.json +238 -9
- package/apis/network-firewall-2020-11-12.paginators.json +6 -0
- package/apis/sagemaker-geospatial-2020-05-27.min.json +135 -107
- package/apis/vpc-lattice-2022-11-30.examples.json +5 -0
- package/apis/vpc-lattice-2022-11-30.min.json +2363 -0
- package/apis/vpc-lattice-2022-11-30.paginators.json +58 -0
- package/apis/wellarchitected-2020-03-31.min.json +125 -21
- package/apis/wellarchitected-2020-03-31.paginators.json +5 -0
- package/clients/all.d.ts +1 -0
- package/clients/all.js +2 -1
- package/clients/autoscaling.d.ts +63 -36
- package/clients/batch.d.ts +13 -0
- package/clients/computeoptimizer.d.ts +13 -3
- package/clients/drs.d.ts +25 -5
- package/clients/ec2.d.ts +112 -1
- package/clients/emr.d.ts +20 -0
- package/clients/glue.d.ts +0 -4
- package/clients/guardduty.d.ts +491 -8
- package/clients/imagebuilder.d.ts +931 -128
- package/clients/ivs.d.ts +17 -0
- package/clients/kendra.d.ts +424 -75
- package/clients/networkfirewall.d.ts +289 -0
- package/clients/sagemakergeospatial.d.ts +183 -147
- package/clients/vpclattice.d.ts +2772 -0
- package/clients/vpclattice.js +18 -0
- package/clients/wellarchitected.d.ts +125 -34
- package/dist/aws-sdk-core-react-native.js +2 -2
- package/dist/aws-sdk-react-native.js +60 -23
- package/dist/aws-sdk.js +861 -734
- package/dist/aws-sdk.min.js +97 -96
- package/lib/config_service_placeholders.d.ts +2 -0
- package/lib/core.js +1 -1
- package/package.json +1 -1
|
@@ -51,6 +51,14 @@ declare class NetworkFirewall extends Service {
|
|
|
51
51
|
* Creates the specified stateless or stateful rule group, which includes the rules for network traffic inspection, a capacity setting, and tags. You provide your rule group specification in your request using either RuleGroup or Rules.
|
|
52
52
|
*/
|
|
53
53
|
createRuleGroup(callback?: (err: AWSError, data: NetworkFirewall.Types.CreateRuleGroupResponse) => void): Request<NetworkFirewall.Types.CreateRuleGroupResponse, AWSError>;
|
|
54
|
+
/**
|
|
55
|
+
* Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains the Certificate Manager certificate references that Network Firewall uses to decrypt and re-encrypt inbound traffic. After you create a TLS inspection configuration, you associate it with a firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
|
56
|
+
*/
|
|
57
|
+
createTLSInspectionConfiguration(params: NetworkFirewall.Types.CreateTLSInspectionConfigurationRequest, callback?: (err: AWSError, data: NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse, AWSError>;
|
|
58
|
+
/**
|
|
59
|
+
* Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains the Certificate Manager certificate references that Network Firewall uses to decrypt and re-encrypt inbound traffic. After you create a TLS inspection configuration, you associate it with a firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
|
60
|
+
*/
|
|
61
|
+
createTLSInspectionConfiguration(callback?: (err: AWSError, data: NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse, AWSError>;
|
|
54
62
|
/**
|
|
55
63
|
* Deletes the specified Firewall and its FirewallStatus. This operation requires the firewall's DeleteProtection flag to be FALSE. You can't revert this operation. You can check whether a firewall is in use by reviewing the route tables for the Availability Zones where you have firewall subnet mappings. Retrieve the subnet mappings by calling DescribeFirewall. You define and update the route tables through Amazon VPC. As needed, update the route tables for the zones to remove the firewall endpoints. When the route tables no longer use the firewall endpoints, you can remove the firewall safely. To delete a firewall, remove the delete protection if you need to using UpdateFirewallDeleteProtection, then delete the firewall by calling DeleteFirewall.
|
|
56
64
|
*/
|
|
@@ -83,6 +91,14 @@ declare class NetworkFirewall extends Service {
|
|
|
83
91
|
* Deletes the specified RuleGroup.
|
|
84
92
|
*/
|
|
85
93
|
deleteRuleGroup(callback?: (err: AWSError, data: NetworkFirewall.Types.DeleteRuleGroupResponse) => void): Request<NetworkFirewall.Types.DeleteRuleGroupResponse, AWSError>;
|
|
94
|
+
/**
|
|
95
|
+
* Deletes the specified TLSInspectionConfiguration.
|
|
96
|
+
*/
|
|
97
|
+
deleteTLSInspectionConfiguration(params: NetworkFirewall.Types.DeleteTLSInspectionConfigurationRequest, callback?: (err: AWSError, data: NetworkFirewall.Types.DeleteTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.DeleteTLSInspectionConfigurationResponse, AWSError>;
|
|
98
|
+
/**
|
|
99
|
+
* Deletes the specified TLSInspectionConfiguration.
|
|
100
|
+
*/
|
|
101
|
+
deleteTLSInspectionConfiguration(callback?: (err: AWSError, data: NetworkFirewall.Types.DeleteTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.DeleteTLSInspectionConfigurationResponse, AWSError>;
|
|
86
102
|
/**
|
|
87
103
|
* Returns the data objects for the specified firewall.
|
|
88
104
|
*/
|
|
@@ -131,6 +147,14 @@ declare class NetworkFirewall extends Service {
|
|
|
131
147
|
* High-level information about a rule group, returned by operations like create and describe. You can use the information provided in the metadata to retrieve and manage a rule group. You can retrieve all objects for a rule group by calling DescribeRuleGroup.
|
|
132
148
|
*/
|
|
133
149
|
describeRuleGroupMetadata(callback?: (err: AWSError, data: NetworkFirewall.Types.DescribeRuleGroupMetadataResponse) => void): Request<NetworkFirewall.Types.DescribeRuleGroupMetadataResponse, AWSError>;
|
|
150
|
+
/**
|
|
151
|
+
* Returns the data objects for the specified TLS inspection configuration.
|
|
152
|
+
*/
|
|
153
|
+
describeTLSInspectionConfiguration(params: NetworkFirewall.Types.DescribeTLSInspectionConfigurationRequest, callback?: (err: AWSError, data: NetworkFirewall.Types.DescribeTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.DescribeTLSInspectionConfigurationResponse, AWSError>;
|
|
154
|
+
/**
|
|
155
|
+
* Returns the data objects for the specified TLS inspection configuration.
|
|
156
|
+
*/
|
|
157
|
+
describeTLSInspectionConfiguration(callback?: (err: AWSError, data: NetworkFirewall.Types.DescribeTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.DescribeTLSInspectionConfigurationResponse, AWSError>;
|
|
134
158
|
/**
|
|
135
159
|
* Removes the specified subnet associations from the firewall. This removes the firewall endpoints from the subnets and removes any network filtering protections that the endpoints were providing.
|
|
136
160
|
*/
|
|
@@ -163,6 +187,14 @@ declare class NetworkFirewall extends Service {
|
|
|
163
187
|
* Retrieves the metadata for the rule groups that you have defined. Depending on your setting for max results and the number of rule groups, a single call might not return the full list.
|
|
164
188
|
*/
|
|
165
189
|
listRuleGroups(callback?: (err: AWSError, data: NetworkFirewall.Types.ListRuleGroupsResponse) => void): Request<NetworkFirewall.Types.ListRuleGroupsResponse, AWSError>;
|
|
190
|
+
/**
|
|
191
|
+
* Retrieves the metadata for the TLS inspection configurations that you have defined. Depending on your setting for max results and the number of TLS inspection configurations, a single call might not return the full list.
|
|
192
|
+
*/
|
|
193
|
+
listTLSInspectionConfigurations(params: NetworkFirewall.Types.ListTLSInspectionConfigurationsRequest, callback?: (err: AWSError, data: NetworkFirewall.Types.ListTLSInspectionConfigurationsResponse) => void): Request<NetworkFirewall.Types.ListTLSInspectionConfigurationsResponse, AWSError>;
|
|
194
|
+
/**
|
|
195
|
+
* Retrieves the metadata for the TLS inspection configurations that you have defined. Depending on your setting for max results and the number of TLS inspection configurations, a single call might not return the full list.
|
|
196
|
+
*/
|
|
197
|
+
listTLSInspectionConfigurations(callback?: (err: AWSError, data: NetworkFirewall.Types.ListTLSInspectionConfigurationsResponse) => void): Request<NetworkFirewall.Types.ListTLSInspectionConfigurationsResponse, AWSError>;
|
|
166
198
|
/**
|
|
167
199
|
* Retrieves the tags associated with the specified resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to "customer" and the value to the customer name or ID. You can specify one or more tags to add to each Amazon Web Services resource, up to 50 tags for a resource. You can tag the Amazon Web Services resources that you manage through Network Firewall: firewalls, firewall policies, and rule groups.
|
|
168
200
|
*/
|
|
@@ -259,6 +291,14 @@ declare class NetworkFirewall extends Service {
|
|
|
259
291
|
*
|
|
260
292
|
*/
|
|
261
293
|
updateSubnetChangeProtection(callback?: (err: AWSError, data: NetworkFirewall.Types.UpdateSubnetChangeProtectionResponse) => void): Request<NetworkFirewall.Types.UpdateSubnetChangeProtectionResponse, AWSError>;
|
|
294
|
+
/**
|
|
295
|
+
* Updates the TLS inspection configuration settings for the specified TLS inspection configuration. You use a TLS inspection configuration by reference in one or more firewall policies. When you modify a TLS inspection configuration, you modify all firewall policies that use the TLS inspection configuration. To update a TLS inspection configuration, first call DescribeTLSInspectionConfiguration to retrieve the current TLSInspectionConfiguration object, update the object as needed, and then provide the updated object to this call.
|
|
296
|
+
*/
|
|
297
|
+
updateTLSInspectionConfiguration(params: NetworkFirewall.Types.UpdateTLSInspectionConfigurationRequest, callback?: (err: AWSError, data: NetworkFirewall.Types.UpdateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.UpdateTLSInspectionConfigurationResponse, AWSError>;
|
|
298
|
+
/**
|
|
299
|
+
* Updates the TLS inspection configuration settings for the specified TLS inspection configuration. You use a TLS inspection configuration by reference in one or more firewall policies. When you modify a TLS inspection configuration, you modify all firewall policies that use the TLS inspection configuration. To update a TLS inspection configuration, first call DescribeTLSInspectionConfiguration to retrieve the current TLSInspectionConfiguration object, update the object as needed, and then provide the updated object to this call.
|
|
300
|
+
*/
|
|
301
|
+
updateTLSInspectionConfiguration(callback?: (err: AWSError, data: NetworkFirewall.Types.UpdateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.UpdateTLSInspectionConfigurationResponse, AWSError>;
|
|
262
302
|
}
|
|
263
303
|
declare namespace NetworkFirewall {
|
|
264
304
|
export interface ActionDefinition {
|
|
@@ -392,6 +432,7 @@ declare namespace NetworkFirewall {
|
|
|
392
432
|
*/
|
|
393
433
|
CIDRs?: CIDRSummary;
|
|
394
434
|
}
|
|
435
|
+
export type Certificates = TlsCertificateData[];
|
|
395
436
|
export type CollectionMember_String = string;
|
|
396
437
|
export type ConfigurationSyncState = "PENDING"|"IN_SYNC"|"CAPACITY_CONSTRAINED"|string;
|
|
397
438
|
export interface CreateFirewallPolicyRequest {
|
|
@@ -534,6 +575,35 @@ declare namespace NetworkFirewall {
|
|
|
534
575
|
*/
|
|
535
576
|
RuleGroupResponse: RuleGroupResponse;
|
|
536
577
|
}
|
|
578
|
+
export interface CreateTLSInspectionConfigurationRequest {
|
|
579
|
+
/**
|
|
580
|
+
* The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.
|
|
581
|
+
*/
|
|
582
|
+
TLSInspectionConfigurationName: ResourceName;
|
|
583
|
+
/**
|
|
584
|
+
* The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
|
585
|
+
*/
|
|
586
|
+
TLSInspectionConfiguration: TLSInspectionConfiguration;
|
|
587
|
+
/**
|
|
588
|
+
* A description of the TLS inspection configuration.
|
|
589
|
+
*/
|
|
590
|
+
Description?: Description;
|
|
591
|
+
/**
|
|
592
|
+
* The key:value pairs to associate with the resource.
|
|
593
|
+
*/
|
|
594
|
+
Tags?: TagList;
|
|
595
|
+
EncryptionConfiguration?: EncryptionConfiguration;
|
|
596
|
+
}
|
|
597
|
+
export interface CreateTLSInspectionConfigurationResponse {
|
|
598
|
+
/**
|
|
599
|
+
* A token used for optimistic locking. Network Firewall returns a token to your requests that access the TLS inspection configuration. The token marks the state of the TLS inspection configuration resource at the time of the request. To make changes to the TLS inspection configuration, you provide the token in your request. Network Firewall uses the token to ensure that the TLS inspection configuration hasn't changed since you last retrieved it. If it has changed, the operation fails with an InvalidTokenException. If this happens, retrieve the TLS inspection configuration again to get a current copy of it with a current token. Reapply your changes as needed, then try the operation again using the new token.
|
|
600
|
+
*/
|
|
601
|
+
UpdateToken: UpdateToken;
|
|
602
|
+
/**
|
|
603
|
+
* The high-level properties of a TLS inspection configuration. This, along with the TLSInspectionConfiguration, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration.
|
|
604
|
+
*/
|
|
605
|
+
TLSInspectionConfigurationResponse: TLSInspectionConfigurationResponse;
|
|
606
|
+
}
|
|
537
607
|
export interface CustomAction {
|
|
538
608
|
/**
|
|
539
609
|
* The descriptive name of the custom action. You can't change the name of a custom action after you create it.
|
|
@@ -603,6 +673,22 @@ declare namespace NetworkFirewall {
|
|
|
603
673
|
*/
|
|
604
674
|
RuleGroupResponse: RuleGroupResponse;
|
|
605
675
|
}
|
|
676
|
+
export interface DeleteTLSInspectionConfigurationRequest {
|
|
677
|
+
/**
|
|
678
|
+
* The Amazon Resource Name (ARN) of the TLS inspection configuration. You must specify the ARN or the name, and you can specify both.
|
|
679
|
+
*/
|
|
680
|
+
TLSInspectionConfigurationArn?: ResourceArn;
|
|
681
|
+
/**
|
|
682
|
+
* The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it. You must specify the ARN or the name, and you can specify both.
|
|
683
|
+
*/
|
|
684
|
+
TLSInspectionConfigurationName?: ResourceName;
|
|
685
|
+
}
|
|
686
|
+
export interface DeleteTLSInspectionConfigurationResponse {
|
|
687
|
+
/**
|
|
688
|
+
* The high-level properties of a TLS inspection configuration. This, along with the TLSInspectionConfiguration, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration.
|
|
689
|
+
*/
|
|
690
|
+
TLSInspectionConfigurationResponse: TLSInspectionConfigurationResponse;
|
|
691
|
+
}
|
|
606
692
|
export interface DescribeFirewallPolicyRequest {
|
|
607
693
|
/**
|
|
608
694
|
* The descriptive name of the firewall policy. You can't change the name of a firewall policy after you create it. You must specify the ARN or the name, and you can specify both.
|
|
@@ -749,6 +835,30 @@ declare namespace NetworkFirewall {
|
|
|
749
835
|
*/
|
|
750
836
|
RuleGroupResponse: RuleGroupResponse;
|
|
751
837
|
}
|
|
838
|
+
export interface DescribeTLSInspectionConfigurationRequest {
|
|
839
|
+
/**
|
|
840
|
+
* The Amazon Resource Name (ARN) of the TLS inspection configuration. You must specify the ARN or the name, and you can specify both.
|
|
841
|
+
*/
|
|
842
|
+
TLSInspectionConfigurationArn?: ResourceArn;
|
|
843
|
+
/**
|
|
844
|
+
* The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it. You must specify the ARN or the name, and you can specify both.
|
|
845
|
+
*/
|
|
846
|
+
TLSInspectionConfigurationName?: ResourceName;
|
|
847
|
+
}
|
|
848
|
+
export interface DescribeTLSInspectionConfigurationResponse {
|
|
849
|
+
/**
|
|
850
|
+
* A token used for optimistic locking. Network Firewall returns a token to your requests that access the TLS inspection configuration. The token marks the state of the TLS inspection configuration resource at the time of the request. To make changes to the TLS inspection configuration, you provide the token in your request. Network Firewall uses the token to ensure that the TLS inspection configuration hasn't changed since you last retrieved it. If it has changed, the operation fails with an InvalidTokenException. If this happens, retrieve the TLS inspection configuration again to get a current copy of it with a current token. Reapply your changes as needed, then try the operation again using the new token.
|
|
851
|
+
*/
|
|
852
|
+
UpdateToken: UpdateToken;
|
|
853
|
+
/**
|
|
854
|
+
* The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
|
855
|
+
*/
|
|
856
|
+
TLSInspectionConfiguration?: TLSInspectionConfiguration;
|
|
857
|
+
/**
|
|
858
|
+
* The high-level properties of a TLS inspection configuration. This, along with the TLSInspectionConfiguration, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration.
|
|
859
|
+
*/
|
|
860
|
+
TLSInspectionConfigurationResponse: TLSInspectionConfigurationResponse;
|
|
861
|
+
}
|
|
752
862
|
export type Description = string;
|
|
753
863
|
export type Destination = string;
|
|
754
864
|
export interface Dimension {
|
|
@@ -897,6 +1007,10 @@ declare namespace NetworkFirewall {
|
|
|
897
1007
|
* Additional options governing how Network Firewall handles stateful rules. The stateful rule groups that you use in your policy must have stateful rule options settings that are compatible with these settings.
|
|
898
1008
|
*/
|
|
899
1009
|
StatefulEngineOptions?: StatefulEngineOptions;
|
|
1010
|
+
/**
|
|
1011
|
+
* The Amazon Resource Name (ARN) of the TLS inspection configuration.
|
|
1012
|
+
*/
|
|
1013
|
+
TLSInspectionConfigurationArn?: ResourceArn;
|
|
900
1014
|
}
|
|
901
1015
|
export interface FirewallPolicyMetadata {
|
|
902
1016
|
/**
|
|
@@ -1107,6 +1221,26 @@ declare namespace NetworkFirewall {
|
|
|
1107
1221
|
*/
|
|
1108
1222
|
RuleGroups?: RuleGroups;
|
|
1109
1223
|
}
|
|
1224
|
+
export interface ListTLSInspectionConfigurationsRequest {
|
|
1225
|
+
/**
|
|
1226
|
+
* When you request a list of objects with a MaxResults setting, if the number of objects that are still available for retrieval exceeds the maximum you requested, Network Firewall returns a NextToken value in the response. To retrieve the next batch of objects, use the token returned from the prior request in your next request.
|
|
1227
|
+
*/
|
|
1228
|
+
NextToken?: PaginationToken;
|
|
1229
|
+
/**
|
|
1230
|
+
* The maximum number of objects that you want Network Firewall to return for this request. If more objects are available, in the response, Network Firewall provides a NextToken value that you can use in a subsequent call to get the next batch of objects.
|
|
1231
|
+
*/
|
|
1232
|
+
MaxResults?: PaginationMaxResults;
|
|
1233
|
+
}
|
|
1234
|
+
export interface ListTLSInspectionConfigurationsResponse {
|
|
1235
|
+
/**
|
|
1236
|
+
* When you request a list of objects with a MaxResults setting, if the number of objects that are still available for retrieval exceeds the maximum you requested, Network Firewall returns a NextToken value in the response. To retrieve the next batch of objects, use the token returned from the prior request in your next request.
|
|
1237
|
+
*/
|
|
1238
|
+
NextToken?: PaginationToken;
|
|
1239
|
+
/**
|
|
1240
|
+
* The TLS inspection configuration metadata objects that you've defined. Depending on your setting for max results and the number of TLS inspection configurations, this might not be the full list.
|
|
1241
|
+
*/
|
|
1242
|
+
TLSInspectionConfigurations?: TLSInspectionConfigurations;
|
|
1243
|
+
}
|
|
1110
1244
|
export interface ListTagsForResourceRequest {
|
|
1111
1245
|
/**
|
|
1112
1246
|
* When you request a list of objects with a MaxResults setting, if the number of objects that are still available for retrieval exceeds the maximum you requested, Network Firewall returns a NextToken value in the response. To retrieve the next batch of objects, use the token returned from the prior request in your next request.
|
|
@@ -1406,6 +1540,47 @@ declare namespace NetworkFirewall {
|
|
|
1406
1540
|
GeneratedRulesType: GeneratedRulesType;
|
|
1407
1541
|
}
|
|
1408
1542
|
export type RulesString = string;
|
|
1543
|
+
export interface ServerCertificate {
|
|
1544
|
+
/**
|
|
1545
|
+
* The Amazon Resource Name (ARN) of the Certificate Manager SSL/TLS server certificate.
|
|
1546
|
+
*/
|
|
1547
|
+
ResourceArn?: ResourceArn;
|
|
1548
|
+
}
|
|
1549
|
+
export interface ServerCertificateConfiguration {
|
|
1550
|
+
/**
|
|
1551
|
+
* The list of a server certificate configuration's Certificate Manager SSL/TLS certificates.
|
|
1552
|
+
*/
|
|
1553
|
+
ServerCertificates?: ServerCertificates;
|
|
1554
|
+
/**
|
|
1555
|
+
* A list of a server certificate configuration's scopes.
|
|
1556
|
+
*/
|
|
1557
|
+
Scopes?: ServerCertificateScopes;
|
|
1558
|
+
}
|
|
1559
|
+
export type ServerCertificateConfigurations = ServerCertificateConfiguration[];
|
|
1560
|
+
export interface ServerCertificateScope {
|
|
1561
|
+
/**
|
|
1562
|
+
* The source IP addresses and address ranges to decrypt for inspection, in CIDR notation. If not specified, this matches with any source address.
|
|
1563
|
+
*/
|
|
1564
|
+
Sources?: Addresses;
|
|
1565
|
+
/**
|
|
1566
|
+
* The destination IP addresses and address ranges to decrypt for inspection, in CIDR notation. If not specified, this matches with any destination address.
|
|
1567
|
+
*/
|
|
1568
|
+
Destinations?: Addresses;
|
|
1569
|
+
/**
|
|
1570
|
+
* The source ports to decrypt for inspection, in Transmission Control Protocol (TCP) format. If not specified, this matches with any source port. You can specify individual ports, for example 1994, and you can specify port ranges, such as 1990:1994.
|
|
1571
|
+
*/
|
|
1572
|
+
SourcePorts?: PortRanges;
|
|
1573
|
+
/**
|
|
1574
|
+
* The destination ports to decrypt for inspection, in Transmission Control Protocol (TCP) format. If not specified, this matches with any destination port. You can specify individual ports, for example 1994, and you can specify port ranges, such as 1990:1994.
|
|
1575
|
+
*/
|
|
1576
|
+
DestinationPorts?: PortRanges;
|
|
1577
|
+
/**
|
|
1578
|
+
* The protocols to decrypt for inspection, specified using each protocol's assigned internet protocol number (IANA). Network Firewall currently supports only TCP.
|
|
1579
|
+
*/
|
|
1580
|
+
Protocols?: ProtocolNumbers;
|
|
1581
|
+
}
|
|
1582
|
+
export type ServerCertificateScopes = ServerCertificateScope[];
|
|
1583
|
+
export type ServerCertificates = ServerCertificate[];
|
|
1409
1584
|
export type Setting = string;
|
|
1410
1585
|
export type Settings = Setting[];
|
|
1411
1586
|
export type Source = string;
|
|
@@ -1509,6 +1684,7 @@ declare namespace NetworkFirewall {
|
|
|
1509
1684
|
CustomActions?: CustomActions;
|
|
1510
1685
|
}
|
|
1511
1686
|
export type StatusMessage = string;
|
|
1687
|
+
export type StatusReason = string;
|
|
1512
1688
|
export type StreamExceptionPolicy = "DROP"|"CONTINUE"|string;
|
|
1513
1689
|
export interface SubnetMapping {
|
|
1514
1690
|
/**
|
|
@@ -1545,6 +1721,65 @@ declare namespace NetworkFirewall {
|
|
|
1545
1721
|
Masks?: Flags;
|
|
1546
1722
|
}
|
|
1547
1723
|
export type TCPFlags = TCPFlagField[];
|
|
1724
|
+
export interface TLSInspectionConfiguration {
|
|
1725
|
+
/**
|
|
1726
|
+
* Lists the server certificate configurations that are associated with the TLS configuration.
|
|
1727
|
+
*/
|
|
1728
|
+
ServerCertificateConfigurations?: ServerCertificateConfigurations;
|
|
1729
|
+
}
|
|
1730
|
+
export interface TLSInspectionConfigurationMetadata {
|
|
1731
|
+
/**
|
|
1732
|
+
* The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.
|
|
1733
|
+
*/
|
|
1734
|
+
Name?: ResourceName;
|
|
1735
|
+
/**
|
|
1736
|
+
* The Amazon Resource Name (ARN) of the TLS inspection configuration.
|
|
1737
|
+
*/
|
|
1738
|
+
Arn?: ResourceArn;
|
|
1739
|
+
}
|
|
1740
|
+
export interface TLSInspectionConfigurationResponse {
|
|
1741
|
+
/**
|
|
1742
|
+
* The Amazon Resource Name (ARN) of the TLS inspection configuration.
|
|
1743
|
+
*/
|
|
1744
|
+
TLSInspectionConfigurationArn: ResourceArn;
|
|
1745
|
+
/**
|
|
1746
|
+
* The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.
|
|
1747
|
+
*/
|
|
1748
|
+
TLSInspectionConfigurationName: ResourceName;
|
|
1749
|
+
/**
|
|
1750
|
+
* A unique identifier for the TLS inspection configuration. This ID is returned in the responses to create and list commands. You provide it to operations such as update and delete.
|
|
1751
|
+
*/
|
|
1752
|
+
TLSInspectionConfigurationId: ResourceId;
|
|
1753
|
+
/**
|
|
1754
|
+
* Detailed information about the current status of a TLSInspectionConfiguration. You can retrieve this for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration and providing the TLS inspection configuration name and ARN.
|
|
1755
|
+
*/
|
|
1756
|
+
TLSInspectionConfigurationStatus?: ResourceStatus;
|
|
1757
|
+
/**
|
|
1758
|
+
* A description of the TLS inspection configuration.
|
|
1759
|
+
*/
|
|
1760
|
+
Description?: Description;
|
|
1761
|
+
/**
|
|
1762
|
+
* The key:value pairs to associate with the resource.
|
|
1763
|
+
*/
|
|
1764
|
+
Tags?: TagList;
|
|
1765
|
+
/**
|
|
1766
|
+
* The last time that the TLS inspection configuration was changed.
|
|
1767
|
+
*/
|
|
1768
|
+
LastModifiedTime?: LastUpdateTime;
|
|
1769
|
+
/**
|
|
1770
|
+
* The number of firewall policies that use this TLS inspection configuration.
|
|
1771
|
+
*/
|
|
1772
|
+
NumberOfAssociations?: NumberOfAssociations;
|
|
1773
|
+
/**
|
|
1774
|
+
* A complex type that contains the Amazon Web Services KMS encryption configuration settings for your TLS inspection configuration.
|
|
1775
|
+
*/
|
|
1776
|
+
EncryptionConfiguration?: EncryptionConfiguration;
|
|
1777
|
+
/**
|
|
1778
|
+
* A list of the certificates associated with the TLS inspection configuration.
|
|
1779
|
+
*/
|
|
1780
|
+
Certificates?: Certificates;
|
|
1781
|
+
}
|
|
1782
|
+
export type TLSInspectionConfigurations = TLSInspectionConfigurationMetadata[];
|
|
1548
1783
|
export interface Tag {
|
|
1549
1784
|
/**
|
|
1550
1785
|
* The part of the key:value pair that defines a tag. You can use a tag key to describe a category of information, such as "customer." Tag keys are case-sensitive.
|
|
@@ -1574,6 +1809,24 @@ declare namespace NetworkFirewall {
|
|
|
1574
1809
|
export type TagsPaginationMaxResults = number;
|
|
1575
1810
|
export type TargetType = "TLS_SNI"|"HTTP_HOST"|string;
|
|
1576
1811
|
export type TargetTypes = TargetType[];
|
|
1812
|
+
export interface TlsCertificateData {
|
|
1813
|
+
/**
|
|
1814
|
+
* The Amazon Resource Name (ARN) of the certificate.
|
|
1815
|
+
*/
|
|
1816
|
+
CertificateArn?: ResourceArn;
|
|
1817
|
+
/**
|
|
1818
|
+
* The serial number of the certificate.
|
|
1819
|
+
*/
|
|
1820
|
+
CertificateSerial?: CollectionMember_String;
|
|
1821
|
+
/**
|
|
1822
|
+
* The status of the certificate.
|
|
1823
|
+
*/
|
|
1824
|
+
Status?: CollectionMember_String;
|
|
1825
|
+
/**
|
|
1826
|
+
* Contains details about the certificate status, including information about certificate errors.
|
|
1827
|
+
*/
|
|
1828
|
+
StatusMessage?: StatusReason;
|
|
1829
|
+
}
|
|
1577
1830
|
export interface UntagResourceRequest {
|
|
1578
1831
|
/**
|
|
1579
1832
|
* The Amazon Resource Name (ARN) of the resource.
|
|
@@ -1877,6 +2130,42 @@ declare namespace NetworkFirewall {
|
|
|
1877
2130
|
*/
|
|
1878
2131
|
SubnetChangeProtection?: Boolean;
|
|
1879
2132
|
}
|
|
2133
|
+
export interface UpdateTLSInspectionConfigurationRequest {
|
|
2134
|
+
/**
|
|
2135
|
+
* The Amazon Resource Name (ARN) of the TLS inspection configuration.
|
|
2136
|
+
*/
|
|
2137
|
+
TLSInspectionConfigurationArn?: ResourceArn;
|
|
2138
|
+
/**
|
|
2139
|
+
* The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.
|
|
2140
|
+
*/
|
|
2141
|
+
TLSInspectionConfigurationName?: ResourceName;
|
|
2142
|
+
/**
|
|
2143
|
+
* The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
|
2144
|
+
*/
|
|
2145
|
+
TLSInspectionConfiguration: TLSInspectionConfiguration;
|
|
2146
|
+
/**
|
|
2147
|
+
* A description of the TLS inspection configuration.
|
|
2148
|
+
*/
|
|
2149
|
+
Description?: Description;
|
|
2150
|
+
/**
|
|
2151
|
+
* A complex type that contains the Amazon Web Services KMS encryption configuration settings for your TLS inspection configuration.
|
|
2152
|
+
*/
|
|
2153
|
+
EncryptionConfiguration?: EncryptionConfiguration;
|
|
2154
|
+
/**
|
|
2155
|
+
* A token used for optimistic locking. Network Firewall returns a token to your requests that access the TLS inspection configuration. The token marks the state of the TLS inspection configuration resource at the time of the request. To make changes to the TLS inspection configuration, you provide the token in your request. Network Firewall uses the token to ensure that the TLS inspection configuration hasn't changed since you last retrieved it. If it has changed, the operation fails with an InvalidTokenException. If this happens, retrieve the TLS inspection configuration again to get a current copy of it with a current token. Reapply your changes as needed, then try the operation again using the new token.
|
|
2156
|
+
*/
|
|
2157
|
+
UpdateToken: UpdateToken;
|
|
2158
|
+
}
|
|
2159
|
+
export interface UpdateTLSInspectionConfigurationResponse {
|
|
2160
|
+
/**
|
|
2161
|
+
* A token used for optimistic locking. Network Firewall returns a token to your requests that access the TLS inspection configuration. The token marks the state of the TLS inspection configuration resource at the time of the request. To make changes to the TLS inspection configuration, you provide the token in your request. Network Firewall uses the token to ensure that the TLS inspection configuration hasn't changed since you last retrieved it. If it has changed, the operation fails with an InvalidTokenException. If this happens, retrieve the TLS inspection configuration again to get a current copy of it with a current token. Reapply your changes as needed, then try the operation again using the new token.
|
|
2162
|
+
*/
|
|
2163
|
+
UpdateToken: UpdateToken;
|
|
2164
|
+
/**
|
|
2165
|
+
* The high-level properties of a TLS inspection configuration. This, along with the TLSInspectionConfiguration, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration.
|
|
2166
|
+
*/
|
|
2167
|
+
TLSInspectionConfigurationResponse: TLSInspectionConfigurationResponse;
|
|
2168
|
+
}
|
|
1880
2169
|
export type UpdateToken = string;
|
|
1881
2170
|
export type VariableDefinition = string;
|
|
1882
2171
|
export type VariableDefinitionList = VariableDefinition[];
|