aws-sdk 2.1385.0 → 2.1387.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -814,7 +814,7 @@
814
814
  "members": {
815
815
  "DataSource": {},
816
816
  "DataSourceConfiguration": {
817
- "shape": "S3k"
817
+ "shape": "S3l"
818
818
  },
819
819
  "Description": {},
820
820
  "IndexName": {},
@@ -1304,7 +1304,7 @@
1304
1304
  },
1305
1305
  "DataSource": {},
1306
1306
  "DataSourceConfiguration": {
1307
- "shape": "S3k"
1307
+ "shape": "S3l"
1308
1308
  },
1309
1309
  "Description": {},
1310
1310
  "IndexArn": {},
@@ -1855,7 +1855,7 @@
1855
1855
  ],
1856
1856
  "members": {
1857
1857
  "Place": {
1858
- "shape": "S58"
1858
+ "shape": "S59"
1859
1859
  }
1860
1860
  }
1861
1861
  },
@@ -2485,7 +2485,7 @@
2485
2485
  "type": "double"
2486
2486
  },
2487
2487
  "Place": {
2488
- "shape": "S58"
2488
+ "shape": "S59"
2489
2489
  },
2490
2490
  "PlaceId": {}
2491
2491
  }
@@ -2533,7 +2533,7 @@
2533
2533
  "shape": "S2g"
2534
2534
  },
2535
2535
  "FilterCountries": {
2536
- "shape": "S6y"
2536
+ "shape": "S6z"
2537
2537
  },
2538
2538
  "IndexName": {
2539
2539
  "location": "uri",
@@ -2584,14 +2584,14 @@
2584
2584
  "shape": "S2g"
2585
2585
  },
2586
2586
  "FilterCountries": {
2587
- "shape": "S6y"
2587
+ "shape": "S6z"
2588
2588
  },
2589
2589
  "Language": {},
2590
2590
  "MaxResults": {
2591
2591
  "type": "integer"
2592
2592
  },
2593
2593
  "Text": {
2594
- "shape": "S76"
2594
+ "shape": "S77"
2595
2595
  }
2596
2596
  }
2597
2597
  }
@@ -2620,7 +2620,7 @@
2620
2620
  "shape": "S2g"
2621
2621
  },
2622
2622
  "FilterCountries": {
2623
- "shape": "S6y"
2623
+ "shape": "S6z"
2624
2624
  },
2625
2625
  "IndexName": {
2626
2626
  "location": "uri",
@@ -2655,7 +2655,7 @@
2655
2655
  "type": "double"
2656
2656
  },
2657
2657
  "Place": {
2658
- "shape": "S58"
2658
+ "shape": "S59"
2659
2659
  },
2660
2660
  "PlaceId": {},
2661
2661
  "Relevance": {
@@ -2679,7 +2679,7 @@
2679
2679
  "shape": "S2g"
2680
2680
  },
2681
2681
  "FilterCountries": {
2682
- "shape": "S6y"
2682
+ "shape": "S6z"
2683
2683
  },
2684
2684
  "Language": {},
2685
2685
  "MaxResults": {
@@ -2689,7 +2689,7 @@
2689
2689
  "shape": "S2g"
2690
2690
  },
2691
2691
  "Text": {
2692
- "shape": "S76"
2692
+ "shape": "S77"
2693
2693
  }
2694
2694
  }
2695
2695
  }
@@ -2872,6 +2872,12 @@
2872
2872
  "MapName"
2873
2873
  ],
2874
2874
  "members": {
2875
+ "ConfigurationUpdate": {
2876
+ "type": "structure",
2877
+ "members": {
2878
+ "PoliticalView": {}
2879
+ }
2880
+ },
2875
2881
  "Description": {},
2876
2882
  "MapName": {
2877
2883
  "location": "uri",
@@ -2916,7 +2922,7 @@
2916
2922
  ],
2917
2923
  "members": {
2918
2924
  "DataSourceConfiguration": {
2919
- "shape": "S3k"
2925
+ "shape": "S3l"
2920
2926
  },
2921
2927
  "Description": {},
2922
2928
  "IndexName": {
@@ -3248,16 +3254,17 @@
3248
3254
  "Style"
3249
3255
  ],
3250
3256
  "members": {
3257
+ "PoliticalView": {},
3251
3258
  "Style": {}
3252
3259
  }
3253
3260
  },
3254
- "S3k": {
3261
+ "S3l": {
3255
3262
  "type": "structure",
3256
3263
  "members": {
3257
3264
  "IntendedUse": {}
3258
3265
  }
3259
3266
  },
3260
- "S58": {
3267
+ "S59": {
3261
3268
  "type": "structure",
3262
3269
  "required": [
3263
3270
  "Geometry"
@@ -3299,11 +3306,11 @@
3299
3306
  "UnitType": {}
3300
3307
  }
3301
3308
  },
3302
- "S6y": {
3309
+ "S6z": {
3303
3310
  "type": "list",
3304
3311
  "member": {}
3305
3312
  },
3306
- "S76": {
3313
+ "S77": {
3307
3314
  "type": "string",
3308
3315
  "sensitive": true
3309
3316
  }
@@ -375,7 +375,7 @@
375
375
  "datasetGroupArn": {},
376
376
  "eventType": {},
377
377
  "solutionConfig": {
378
- "shape": "S1t"
378
+ "shape": "S1x"
379
379
  },
380
380
  "tags": {
381
381
  "shape": "Sf"
@@ -595,7 +595,7 @@
595
595
  "members": {
596
596
  "name": {},
597
597
  "values": {
598
- "shape": "S2c"
598
+ "shape": "S2g"
599
599
  },
600
600
  "isTunable": {
601
601
  "type": "boolean"
@@ -1146,7 +1146,7 @@
1146
1146
  }
1147
1147
  },
1148
1148
  "modelMetrics": {
1149
- "shape": "S4o"
1149
+ "shape": "S4s"
1150
1150
  }
1151
1151
  }
1152
1152
  }
@@ -1214,7 +1214,7 @@
1214
1214
  "datasetGroupArn": {},
1215
1215
  "eventType": {},
1216
1216
  "solutionConfig": {
1217
- "shape": "S1t"
1217
+ "shape": "S1x"
1218
1218
  },
1219
1219
  "autoMLResult": {
1220
1220
  "type": "structure",
@@ -1230,7 +1230,7 @@
1230
1230
  "type": "timestamp"
1231
1231
  },
1232
1232
  "latestSolutionVersion": {
1233
- "shape": "S4y"
1233
+ "shape": "S52"
1234
1234
  }
1235
1235
  }
1236
1236
  }
@@ -1267,7 +1267,7 @@
1267
1267
  "eventType": {},
1268
1268
  "datasetGroupArn": {},
1269
1269
  "solutionConfig": {
1270
- "shape": "S1t"
1270
+ "shape": "S1x"
1271
1271
  },
1272
1272
  "trainingHours": {
1273
1273
  "type": "double"
@@ -1310,7 +1310,7 @@
1310
1310
  "members": {
1311
1311
  "solutionVersionArn": {},
1312
1312
  "metrics": {
1313
- "shape": "S4o"
1313
+ "shape": "S4s"
1314
1314
  }
1315
1315
  }
1316
1316
  }
@@ -1841,7 +1841,7 @@
1841
1841
  "solutionVersions": {
1842
1842
  "type": "list",
1843
1843
  "member": {
1844
- "shape": "S4y"
1844
+ "shape": "S52"
1845
1845
  }
1846
1846
  },
1847
1847
  "nextToken": {}
@@ -2211,10 +2211,26 @@
2211
2211
  },
2212
2212
  "minRecommendationRequestsPerSecond": {
2213
2213
  "type": "integer"
2214
+ },
2215
+ "trainingDataConfig": {
2216
+ "shape": "S1n"
2217
+ }
2218
+ }
2219
+ },
2220
+ "S1n": {
2221
+ "type": "structure",
2222
+ "members": {
2223
+ "excludedDatasetColumns": {
2224
+ "type": "map",
2225
+ "key": {},
2226
+ "value": {
2227
+ "type": "list",
2228
+ "member": {}
2229
+ }
2214
2230
  }
2215
2231
  }
2216
2232
  },
2217
- "S1t": {
2233
+ "S1x": {
2218
2234
  "type": "structure",
2219
2235
  "members": {
2220
2236
  "eventValueThreshold": {},
@@ -2276,7 +2292,7 @@
2276
2292
  "members": {
2277
2293
  "name": {},
2278
2294
  "values": {
2279
- "shape": "S2c"
2295
+ "shape": "S2g"
2280
2296
  }
2281
2297
  }
2282
2298
  }
@@ -2309,21 +2325,24 @@
2309
2325
  "itemAttribute": {},
2310
2326
  "objectiveSensitivity": {}
2311
2327
  }
2328
+ },
2329
+ "trainingDataConfig": {
2330
+ "shape": "S1n"
2312
2331
  }
2313
2332
  }
2314
2333
  },
2315
- "S2c": {
2334
+ "S2g": {
2316
2335
  "type": "list",
2317
2336
  "member": {}
2318
2337
  },
2319
- "S4o": {
2338
+ "S4s": {
2320
2339
  "type": "map",
2321
2340
  "key": {},
2322
2341
  "value": {
2323
2342
  "type": "double"
2324
2343
  }
2325
2344
  },
2326
- "S4y": {
2345
+ "S52": {
2327
2346
  "type": "structure",
2328
2347
  "members": {
2329
2348
  "solutionVersionArn": {},
@@ -73,9 +73,103 @@
73
73
  "output": {
74
74
  }
75
75
  },
76
- "description": "The following example imports findings from a third party provider to Security Hub.",
77
- "id": "to-import-security-findings-from-a-third-party-provider-to-security-hub-1675090935260",
78
- "title": "To import security findings from a third party provider to Security Hub"
76
+ "description": "The following example enables the security standard specified by the StandardArn. You can use this operation to enable one or more Security Hub standards.",
77
+ "id": "to-enable-security-standards-1683233792239",
78
+ "title": "To enable security standards"
79
+ }
80
+ ],
81
+ "BatchGetSecurityControls": [
82
+ {
83
+ "input": {
84
+ "SecurityControlIds": [
85
+ "ACM.1",
86
+ "APIGateway.1"
87
+ ]
88
+ },
89
+ "output": {
90
+ "SecurityControls": [
91
+ {
92
+ "Description": "This AWS control checks whether ACM Certificates in your account are marked for expiration within a specified time period. Certificates provided by ACM are automatically renewed. ACM does not automatically renew certificates that you import.",
93
+ "RemediationUrl": "https://docs.aws.amazon.com/console/securityhub/ACM.1/remediation",
94
+ "SecurityControlArn": "arn:aws:securityhub:us-west-2:123456789012:security-control/ACM.1",
95
+ "SecurityControlId": "ACM.1",
96
+ "SecurityControlStatus": "ENABLED",
97
+ "SeverityRating": "MEDIUM",
98
+ "Title": "Imported and ACM-issued certificates should be renewed after a specified time period"
99
+ },
100
+ {
101
+ "Description": "This control checks whether all stages of Amazon API Gateway REST and WebSocket APIs have logging enabled. The control fails if logging is not enabled for all methods of a stage or if loggingLevel is neither ERROR nor INFO.",
102
+ "RemediationUrl": "https://docs.aws.amazon.com/console/securityhub/APIGateway.1/remediation",
103
+ "SecurityControlArn": "arn:aws:securityhub:us-west-2:123456789012:security-control/APIGateway.1",
104
+ "SecurityControlId": "APIGateway.1",
105
+ "SecurityControlStatus": "ENABLED",
106
+ "SeverityRating": "MEDIUM",
107
+ "Title": "API Gateway REST and WebSocket API execution logging should be enabled"
108
+ }
109
+ ]
110
+ },
111
+ "comments": {
112
+ "input": {
113
+ },
114
+ "output": {
115
+ }
116
+ },
117
+ "description": "The following example gets details for the specified controls in the current AWS account and AWS Region.",
118
+ "id": "to-get-security-control-details--1683234478355",
119
+ "title": "To get security control details "
120
+ }
121
+ ],
122
+ "BatchGetStandardsControlAssociations": [
123
+ {
124
+ "input": {
125
+ "StandardsControlAssociationIds": [
126
+ {
127
+ "SecurityControlId": "CloudTrail.1",
128
+ "StandardsArn": "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0"
129
+ },
130
+ {
131
+ "SecurityControlId": "CloudWatch.12",
132
+ "StandardsArn": "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0"
133
+ }
134
+ ]
135
+ },
136
+ "output": {
137
+ "StandardsControlAssociationDetails": [
138
+ {
139
+ "AssociationStatus": "ENABLED",
140
+ "RelatedRequirements": [
141
+ "CIS AWS Foundations 2.1"
142
+ ],
143
+ "SecurityControlArn": "arn:aws:securityhub:us-west-2:110479873537:security-control/CloudTrail.1",
144
+ "SecurityControlId": "CloudTrail.1",
145
+ "StandardsArn": "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0",
146
+ "StandardsControlDescription": "AWS CloudTrail is a web service that records AWS API calls for your account and delivers log files to you. The recorded information includes the identity of the API caller, the time of the API call, the source IP address of the API caller, the request parameters, and the response elements returned by the AWS service.",
147
+ "StandardsControlTitle": "Ensure CloudTrail is enabled in all regions",
148
+ "UpdatedAt": "2022-01-13T18:52:29.539000+00:00"
149
+ },
150
+ {
151
+ "AssociationStatus": "ENABLED",
152
+ "RelatedRequirements": [
153
+ "CIS AWS Foundations 3.12"
154
+ ],
155
+ "SecurityControlArn": "arn:aws:securityhub:us-west-2:110479873537:security-control/CloudWatch.12",
156
+ "SecurityControlId": "CloudWatch.12",
157
+ "StandardsArn": "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0",
158
+ "StandardsControlDescription": "Real-time monitoring of API calls can be achieved by directing CloudTrail Logs to CloudWatch Logs and establishing corresponding metric filters and alarms. Network gateways are required to send/receive traffic to a destination outside of a VPC. It is recommended that a metric filter and alarm be established for changes to network gateways.",
159
+ "StandardsControlTitle": "Ensure a log metric filter and alarm exist for changes to network gateways",
160
+ "UpdatedAt": "2022-01-13T18:52:29.686000+00:00"
161
+ }
162
+ ]
163
+ },
164
+ "comments": {
165
+ "input": {
166
+ },
167
+ "output": {
168
+ }
169
+ },
170
+ "description": "The following example retrieves the enablement status of the specified controls in the specified standards.",
171
+ "id": "to-get-enablement-status-of-a-batch-of-controls-1683301618357",
172
+ "title": "To get enablement status of a batch of controls"
79
173
  }
80
174
  ],
81
175
  "BatchImportFindings": [
@@ -195,6 +289,49 @@
195
289
  "title": "To update Security Hub findings"
196
290
  }
197
291
  ],
292
+ "BatchUpdateStandardsControlAssociations": [
293
+ {
294
+ "input": {
295
+ "StandardsControlAssociationUpdates": [
296
+ {
297
+ "AssociationStatus": "DISABLED",
298
+ "SecurityControlId": "CloudTrail.1",
299
+ "StandardsArn": "arn:aws:securityhub:::ruleset/sample-standard/v/1.1.0",
300
+ "UpdatedReason": "Not relevant to environment"
301
+ },
302
+ {
303
+ "AssociationStatus": "DISABLED",
304
+ "SecurityControlId": "CloudWatch.12",
305
+ "StandardsArn": "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0",
306
+ "UpdatedReason": "Not relevant to environment"
307
+ }
308
+ ]
309
+ },
310
+ "output": {
311
+ "UnprocessedAssociationUpdates": [
312
+ {
313
+ "ErrorCode": "INVALID_INPUT",
314
+ "ErrorReason": "Invalid Standards Arn: 'arn:aws:securityhub:::ruleset/sample-standard/v/1.1.0'",
315
+ "StandardsControlAssociationUpdate": {
316
+ "AssociationStatus": "DISABLED",
317
+ "SecurityControlId": "CloudTrail.1",
318
+ "StandardsArn": "arn:aws:securityhub:::ruleset/sample-standard/v/1.1.0",
319
+ "UpdatedReason": "Test Reason"
320
+ }
321
+ }
322
+ ]
323
+ },
324
+ "comments": {
325
+ "input": {
326
+ },
327
+ "output": {
328
+ }
329
+ },
330
+ "description": "The following example disables CloudWatch.12 in CIS AWS Foundations Benchmark v1.2.0. The example returns an error for CloudTrail.1 because an invalid standard ARN is provided.",
331
+ "id": "to-update-enablement-status-of-a-batch-of-controls-1683300378416",
332
+ "title": "To update enablement status of a batch of controls"
333
+ }
334
+ ],
198
335
  "CreateActionTarget": [
199
336
  {
200
337
  "input": {