aws-sdk 2.1420.0 → 2.1422.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (45) hide show
  1. package/CHANGELOG.md +23 -1
  2. package/README.md +1 -1
  3. package/apis/billingconductor-2021-07-30.min.json +96 -68
  4. package/apis/ce-2017-10-25.min.json +80 -16
  5. package/apis/chime-sdk-media-pipelines-2021-07-15.min.json +118 -72
  6. package/apis/cloudformation-2010-05-15.min.json +100 -30
  7. package/apis/customer-profiles-2020-08-15.min.json +253 -57
  8. package/apis/datasync-2018-11-09.min.json +198 -102
  9. package/apis/ec2-2016-11-15.min.json +300 -278
  10. package/apis/emr-serverless-2021-07-13.min.json +25 -3
  11. package/apis/glue-2017-03-31.min.json +344 -319
  12. package/apis/quicksight-2018-04-01.min.json +1341 -994
  13. package/apis/quicksight-2018-04-01.paginators.json +42 -0
  14. package/apis/rds-2014-10-31.min.json +2 -1
  15. package/apis/sagemaker-2017-07-24.min.json +4 -0
  16. package/apis/securityhub-2018-10-26.min.json +145 -108
  17. package/apis/sts-2011-06-15.min.json +21 -11
  18. package/apis/transfer-2018-11-05.min.json +117 -73
  19. package/apis/wisdom-2020-10-19.min.json +77 -59
  20. package/clients/apigatewayv2.d.ts +6 -6
  21. package/clients/billingconductor.d.ts +102 -69
  22. package/clients/chimesdkmediapipelines.d.ts +117 -3
  23. package/clients/cloudformation.d.ts +88 -1
  24. package/clients/costexplorer.d.ts +169 -8
  25. package/clients/customerprofiles.d.ts +204 -4
  26. package/clients/datasync.d.ts +171 -27
  27. package/clients/dynamodb.d.ts +4 -4
  28. package/clients/ec2.d.ts +27 -1
  29. package/clients/emrserverless.d.ts +33 -2
  30. package/clients/glue.d.ts +29 -0
  31. package/clients/lambda.d.ts +1 -1
  32. package/clients/quicksight.d.ts +389 -0
  33. package/clients/rds.d.ts +14 -10
  34. package/clients/sagemaker.d.ts +4 -4
  35. package/clients/securityhub.d.ts +69 -10
  36. package/clients/sts.d.ts +17 -1
  37. package/clients/transfer.d.ts +85 -19
  38. package/clients/wisdom.d.ts +24 -0
  39. package/dist/aws-sdk-core-react-native.js +1 -1
  40. package/dist/aws-sdk-react-native.js +18 -18
  41. package/dist/aws-sdk.js +506 -339
  42. package/dist/aws-sdk.min.js +98 -98
  43. package/lib/core.js +1 -1
  44. package/lib/dynamodb/document_client.d.ts +2 -2
  45. package/package.json +1 -1
@@ -777,7 +777,7 @@ declare namespace SecurityHub {
777
777
  */
778
778
  Description?: NonEmptyString;
779
779
  /**
780
- * Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding matches the criteria for multiple rules, and each rule has different actions. If the value of this field is set to true for a rule, Security Hub applies the rule action to a finding that matches the rule criteria and doesn't evaluate other rules for the finding.
 The default value of this field is false.
780
+ * Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding matches the criteria for multiple rules, and each rule has different actions. If a rule is terminal, Security Hub applies the rule action to a finding that matches the rule criteria and doesn't evaluate other rules for the finding. By default, a rule isn't terminal.
781
781
  */
782
782
  IsTerminal?: Boolean;
783
783
  /**
@@ -995,7 +995,7 @@ declare namespace SecurityHub {
995
995
  */
996
996
  Description?: NonEmptyString;
997
997
  /**
998
- * Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding matches the criteria for multiple rules, and each rule has different actions. If the value of this field is set to true for a rule, Security Hub applies the rule action to a finding that matches the rule criteria and doesn't evaluate other rules for the finding.
 The default value of this field is false.
998
+ * Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding matches the criteria for multiple rules, and each rule has different actions. If a rule is terminal, Security Hub applies the rule action to a finding that matches the rule criteria and doesn't evaluate other rules for the finding. By default, a rule isn't terminal.
999
999
  */
1000
1000
  IsTerminal?: Boolean;
1001
1001
  /**
@@ -1686,6 +1686,46 @@ declare namespace SecurityHub {
1686
1686
  */
1687
1687
  UserPoolId?: NonEmptyString;
1688
1688
  }
1689
+ export interface AwsAthenaWorkGroupConfigurationDetails {
1690
+ /**
1691
+ * The location in Amazon S3 where query and calculation results are stored and the encryption option, if any, used for query and calculation results. These are known as client-side settings. If workgroup settings override client-side settings, then the query uses the workgroup settings.
1692
+ */
1693
+ ResultConfiguration?: AwsAthenaWorkGroupConfigurationResultConfigurationDetails;
1694
+ }
1695
+ export interface AwsAthenaWorkGroupConfigurationResultConfigurationDetails {
1696
+ /**
1697
+ * Specifies the method used to encrypt the user’s data stores in the Athena workgroup.
1698
+ */
1699
+ EncryptionConfiguration?: AwsAthenaWorkGroupConfigurationResultConfigurationEncryptionConfigurationDetails;
1700
+ }
1701
+ export interface AwsAthenaWorkGroupConfigurationResultConfigurationEncryptionConfigurationDetails {
1702
+ /**
1703
+ * Indicates whether Amazon Simple Storage Service (Amazon S3) server-side encryption with Amazon S3 managed keys (SSE_S3), server-side encryption with KMS keys (SSE_KMS), or client-side encryption with KMS customer managed keys (CSE_KMS) is used.
1704
+ */
1705
+ EncryptionOption?: NonEmptyString;
1706
+ /**
1707
+ * For SSE_KMS and CSE_KMS, this is the KMS key Amazon Resource Name (ARN) or ID.
1708
+ */
1709
+ KmsKey?: NonEmptyString;
1710
+ }
1711
+ export interface AwsAthenaWorkGroupDetails {
1712
+ /**
1713
+ * The workgroup name.
1714
+ */
1715
+ Name?: NonEmptyString;
1716
+ /**
1717
+ * The workgroup description.
1718
+ */
1719
+ Description?: NonEmptyString;
1720
+ /**
1721
+ * Whether the workgroup is enabled or disabled.
1722
+ */
1723
+ State?: NonEmptyString;
1724
+ /**
1725
+ * The configuration of the workgroup, which includes the location in Amazon Simple Storage Service (Amazon S3) where query results are stored, the encryption option, if any, used for query results, whether Amazon CloudWatch metrics are enabled for the workgroup, and the limit for the amount of bytes scanned (cutoff) per query, if it is specified.
1726
+ */
1727
+ Configuration?: AwsAthenaWorkGroupConfigurationDetails;
1728
+ }
1689
1729
  export type AwsAutoScalingAutoScalingGroupAvailabilityZonesList = AwsAutoScalingAutoScalingGroupAvailabilityZonesListDetails[];
1690
1730
  export interface AwsAutoScalingAutoScalingGroupAvailabilityZonesListDetails {
1691
1731
  /**
@@ -8011,6 +8051,17 @@ declare namespace SecurityHub {
8011
8051
  Status?: NonEmptyString;
8012
8052
  }
8013
8053
  export type AwsRdsDbClusterOptionGroupMemberships = AwsRdsDbClusterOptionGroupMembership[];
8054
+ export interface AwsRdsDbClusterSnapshotDbClusterSnapshotAttribute {
8055
+ /**
8056
+ * The name of the manual DB cluster snapshot attribute. The attribute named restore refers to the list of Amazon Web Services accounts that have permission to copy or restore the manual DB cluster snapshot.
8057
+ */
8058
+ AttributeName?: NonEmptyString;
8059
+ /**
8060
+ * The value(s) for the manual DB cluster snapshot attribute. If the AttributeName field is set to restore, then this element returns a list of IDs of the Amazon Web Services accounts that are authorized to copy or restore the manual DB cluster snapshot. If a value of all is in the list, then the manual DB cluster snapshot is public and available for any Amazon Web Services account to copy or restore.
8061
+ */
8062
+ AttributeValues?: NonEmptyStringList;
8063
+ }
8064
+ export type AwsRdsDbClusterSnapshotDbClusterSnapshotAttributes = AwsRdsDbClusterSnapshotDbClusterSnapshotAttribute[];
8014
8065
  export interface AwsRdsDbClusterSnapshotDetails {
8015
8066
  /**
8016
8067
  * A list of Availability Zones where instances in the DB cluster can be created.
@@ -8084,6 +8135,10 @@ declare namespace SecurityHub {
8084
8135
  * Whether mapping of IAM accounts to database accounts is enabled.
8085
8136
  */
8086
8137
  IamDatabaseAuthenticationEnabled?: Boolean;
8138
+ /**
8139
+ * Contains the name and values of a manual DB cluster snapshot attribute.
8140
+ */
8141
+ DbClusterSnapshotAttributes?: AwsRdsDbClusterSnapshotDbClusterSnapshotAttributes;
8087
8142
  }
8088
8143
  export interface AwsRdsDbDomainMembership {
8089
8144
  /**
@@ -11496,7 +11551,7 @@ declare namespace SecurityHub {
11496
11551
  */
11497
11552
  Description: NonEmptyString;
11498
11553
  /**
11499
- * Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding matches the criteria for multiple rules, and each rule has different actions. If the value of this field is set to true for a rule, Security Hub applies the rule action to a finding that matches the rule criteria and doesn't evaluate other rules for the finding. The default value of this field is false.
11554
+ * Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding matches the criteria for multiple rules, and each rule has different actions. If a rule is terminal, Security Hub applies the rule action to a finding that matches the rule criteria and doesn't evaluate other rules for the finding. By default, a rule isn't terminal.
11500
11555
  */
11501
11556
  IsTerminal?: Boolean;
11502
11557
  /**
@@ -12671,15 +12726,15 @@ declare namespace SecurityHub {
12671
12726
  */
12672
12727
  Key?: NonEmptyString;
12673
12728
  /**
12674
- * The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there is no match.
12729
+ * The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.
12675
12730
  */
12676
12731
  Value?: NonEmptyString;
12677
12732
  /**
12678
- * The condition to apply to the key value when querying for findings with a map filter. To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the tag Department. To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that do not have the value Finance for the tag Department. EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. You cannot have both an EQUALS filter and a NOT_EQUALS filter on the same field.
12733
+ * The condition to apply to the key value when filtering Security Hub findings with a map filter. To search for values that have the filter value, use one of the following comparison operators: To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match. To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag. CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values. To search for values that don't have the filter value, use one of the following comparison operators: To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag. To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag. NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters. You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.
12679
12734
  */
12680
12735
  Comparison?: MapFilterComparison;
12681
12736
  }
12682
- export type MapFilterComparison = "EQUALS"|"NOT_EQUALS"|string;
12737
+ export type MapFilterComparison = "EQUALS"|"NOT_EQUALS"|"CONTAINS"|"NOT_CONTAINS"|string;
12683
12738
  export type MapFilterList = MapFilter[];
12684
12739
  export type MaxResults = number;
12685
12740
  export interface Member {
@@ -13515,6 +13570,10 @@ declare namespace SecurityHub {
13515
13570
  * Provides details about an Step Functions state machine, which is a workflow consisting of a series of event-driven steps.
13516
13571
  */
13517
13572
  AwsStepFunctionStateMachine?: AwsStepFunctionStateMachineDetails;
13573
+ /**
13574
+ * Provides information about an Amazon Athena workgroup. A workgroup helps you separate users, teams, applications, or workloads. It also helps you set limits on data processing and track costs.
13575
+ */
13576
+ AwsAthenaWorkGroup?: AwsAthenaWorkGroupDetails;
13518
13577
  }
13519
13578
  export type ResourceList = Resource[];
13520
13579
  export interface Result {
@@ -14278,15 +14337,15 @@ declare namespace SecurityHub {
14278
14337
  export type StatusReasonsList = StatusReason[];
14279
14338
  export interface StringFilter {
14280
14339
  /**
14281
- * The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter text, then there is no match.
14340
+ * The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.
14282
14341
  */
14283
14342
  Value?: NonEmptyString;
14284
14343
  /**
14285
- * The condition to apply to a string value when querying for findings. To search for values that contain the filter criteria value, use one of the following comparison operators: To search for values that exactly match the filter value, use EQUALS. For example, the filter ResourceType EQUALS AwsEc2SecurityGroup only matches findings that have a resource type of AwsEc2SecurityGroup. To search for values that start with the filter value, use PREFIX. For example, the filter ResourceType PREFIX AwsIam matches findings that have a resource type that starts with AwsIam. Findings with a resource type of AwsIamPolicy, AwsIamRole, or AwsIamUser would all match. EQUALS and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. To search for values that do not contain the filter criteria value, use one of the following comparison operators: To search for values that do not exactly match the filter value, use NOT_EQUALS. For example, the filter ResourceType NOT_EQUALS AwsIamPolicy matches findings that have a resource type other than AwsIamPolicy. To search for values that do not start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceType PREFIX_NOT_EQUALS AwsIam matches findings that have a resource type that does not start with AwsIam. Findings with a resource type of AwsIamPolicy, AwsIamRole, or AwsIamUser would all be excluded from the results. NOT_EQUALS and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For filters on the same field, you cannot provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter. Combining filters in this way always returns an error, even if the provided filter values would return valid results. You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, then the NOT_EQUALS or PREFIX_NOT_EQUALS filters. For example, for the following filter, Security Hub first identifies findings that have resource types that start with either AwsIAM or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface. ResourceType PREFIX AwsIam ResourceType PREFIX AwsEc2 ResourceType NOT_EQUALS AwsIamPolicy ResourceType NOT_EQUALS AwsEc2NetworkInterface
14344
+ * The condition to apply to a string value when filtering Security Hub findings. To search for values that have the filter value, use one of the following comparison operators: To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront. To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012. To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match. CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title. To search for values that don’t have the filter value, use one of the following comparison operators: To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront. To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012. To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us. NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title. You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters. You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters. For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface. ResourceType PREFIX AwsIam ResourceType PREFIX AwsEc2 ResourceType NOT_EQUALS AwsIamPolicy ResourceType NOT_EQUALS AwsEc2NetworkInterface CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.
14286
14345
  */
14287
14346
  Comparison?: StringFilterComparison;
14288
14347
  }
14289
- export type StringFilterComparison = "EQUALS"|"PREFIX"|"NOT_EQUALS"|"PREFIX_NOT_EQUALS"|string;
14348
+ export type StringFilterComparison = "EQUALS"|"PREFIX"|"NOT_EQUALS"|"PREFIX_NOT_EQUALS"|"CONTAINS"|"NOT_CONTAINS"|string;
14290
14349
  export type StringFilterList = StringFilter[];
14291
14350
  export type StringList = NonEmptyString[];
14292
14351
  export type TagKey = string;
@@ -14466,7 +14525,7 @@ declare namespace SecurityHub {
14466
14525
  */
14467
14526
  RuleName?: NonEmptyString;
14468
14527
  /**
14469
- * Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding matches the criteria for multiple rules, and each rule has different actions. If the value of this field is set to true for a rule, Security Hub applies the rule action to a finding that matches the rule criteria and doesn't evaluate other rules for the finding.
 The default value of this field is false.
14528
+ * Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding matches the criteria for multiple rules, and each rule has different actions. If a rule is terminal, Security Hub applies the rule action to a finding that matches the rule criteria and doesn't evaluate other rules for the finding. By default, a rule isn't terminal.
14470
14529
  */
14471
14530
  IsTerminal?: Boolean;
14472
14531
  /**
package/clients/sts.d.ts CHANGED
@@ -122,6 +122,10 @@ declare namespace STS {
122
122
  * The source identity specified by the principal that is calling the AssumeRole operation. You can require users to specify a source identity when they assume a role. You do this by using the sts:SourceIdentity condition key in a role trust policy. You can use source identity information in CloudTrail logs to determine who took actions with a role. You can use the aws:SourceIdentity condition key to further control access to Amazon Web Services resources based on the value of source identity. For more information about using source identity, see Monitor and control actions taken with assumed roles in the IAM User Guide. The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@-. You cannot use a value that begins with the text aws:. This prefix is reserved for Amazon Web Services internal use.
123
123
  */
124
124
  SourceIdentity?: sourceIdentityType;
125
+ /**
126
+ * Reserved for future use.
127
+ */
128
+ ProvidedContexts?: ProvidedContextsListType;
125
129
  }
126
130
  export interface AssumeRoleResponse {
127
131
  /**
@@ -215,7 +219,7 @@ declare namespace STS {
215
219
  */
216
220
  RoleSessionName: roleSessionNameType;
217
221
  /**
218
- * The OAuth 2.0 access token or OpenID Connect ID token that is provided by the identity provider. Your application must get this token by authenticating the user who is using your application with a web identity provider before the application makes an AssumeRoleWithWebIdentity call.
222
+ * The OAuth 2.0 access token or OpenID Connect ID token that is provided by the identity provider. Your application must get this token by authenticating the user who is using your application with a web identity provider before the application makes an AssumeRoleWithWebIdentity call. Only tokens with RSA algorithms (RS256) are supported.
219
223
  */
220
224
  WebIdentityToken: clientTokenType;
221
225
  /**
@@ -408,6 +412,17 @@ declare namespace STS {
408
412
  */
409
413
  arn?: arnType;
410
414
  }
415
+ export interface ProvidedContext {
416
+ /**
417
+ * Reserved for future use.
418
+ */
419
+ ProviderArn?: arnType;
420
+ /**
421
+ * Reserved for future use.
422
+ */
423
+ ContextAssertion?: contextAssertionType;
424
+ }
425
+ export type ProvidedContextsListType = ProvidedContext[];
411
426
  export type SAMLAssertionType = string;
412
427
  export type Subject = string;
413
428
  export type SubjectType = string;
@@ -427,6 +442,7 @@ declare namespace STS {
427
442
  export type arnType = string;
428
443
  export type assumedRoleIdType = string;
429
444
  export type clientTokenType = string;
445
+ export type contextAssertionType = string;
430
446
  export type dateType = Date;
431
447
  export type decodedMessageType = string;
432
448
  export type durationSecondsType = number;
@@ -29,11 +29,11 @@ declare class Transfer extends Service {
29
29
  */
30
30
  createAgreement(callback?: (err: AWSError, data: Transfer.Types.CreateAgreementResponse) => void): Request<Transfer.Types.CreateAgreementResponse, AWSError>;
31
31
  /**
32
- * Creates the connector, which captures the parameters for an outbound connection for the AS2 protocol. The connector is required for sending files to an externally hosted AS2 server. For more details about connectors, see Create AS2 connectors.
32
+ * Creates the connector, which captures the parameters for an outbound connection for the AS2 or SFTP protocol. The connector is required for sending files to an externally hosted AS2 or SFTP server. For more details about AS2 connectors, see Create AS2 connectors. You must specify exactly one configuration object: either for AS2 (As2Config) or SFTP (SftpConfig).
33
33
  */
34
34
  createConnector(params: Transfer.Types.CreateConnectorRequest, callback?: (err: AWSError, data: Transfer.Types.CreateConnectorResponse) => void): Request<Transfer.Types.CreateConnectorResponse, AWSError>;
35
35
  /**
36
- * Creates the connector, which captures the parameters for an outbound connection for the AS2 protocol. The connector is required for sending files to an externally hosted AS2 server. For more details about connectors, see Create AS2 connectors.
36
+ * Creates the connector, which captures the parameters for an outbound connection for the AS2 or SFTP protocol. The connector is required for sending files to an externally hosted AS2 or SFTP server. For more details about AS2 connectors, see Create AS2 connectors. You must specify exactly one configuration object: either for AS2 (As2Config) or SFTP (SftpConfig).
37
37
  */
38
38
  createConnector(callback?: (err: AWSError, data: Transfer.Types.CreateConnectorResponse) => void): Request<Transfer.Types.CreateConnectorResponse, AWSError>;
39
39
  /**
@@ -93,11 +93,11 @@ declare class Transfer extends Service {
93
93
  */
94
94
  deleteCertificate(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
95
95
  /**
96
- * Deletes the agreement that's specified in the provided ConnectorId.
96
+ * Deletes the connector that's specified in the provided ConnectorId.
97
97
  */
98
98
  deleteConnector(params: Transfer.Types.DeleteConnectorRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
99
99
  /**
100
- * Deletes the agreement that's specified in the provided ConnectorId.
100
+ * Deletes the connector that's specified in the provided ConnectorId.
101
101
  */
102
102
  deleteConnector(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
103
103
  /**
@@ -365,11 +365,11 @@ declare class Transfer extends Service {
365
365
  */
366
366
  sendWorkflowStepState(callback?: (err: AWSError, data: Transfer.Types.SendWorkflowStepStateResponse) => void): Request<Transfer.Types.SendWorkflowStepStateResponse, AWSError>;
367
367
  /**
368
- * Begins an outbound file transfer to a remote AS2 server. You specify the ConnectorId and the file paths for where to send the files.
368
+ * Begins a file transfer between local Amazon Web Services storage and a remote AS2 or SFTP server. For an AS2 connector, you specify the ConnectorId and one or more SendFilePaths to identify the files you want to transfer. For an SFTP connector, the file transfer can be either outbound or inbound. In both cases, you specify the ConnectorId. Depending on the direction of the transfer, you also specify the following items: If you are transferring file from a partner's SFTP server to a Transfer Family server, you specify one or more RetreiveFilePaths to identify the files you want to transfer, and a LocalDirectoryPath to specify the destination folder. If you are transferring file to a partner's SFTP server from Amazon Web Services storage, you specify one or more SendFilePaths to identify the files you want to transfer, and a RemoteDirectoryPath to specify the destination folder.
369
369
  */
370
370
  startFileTransfer(params: Transfer.Types.StartFileTransferRequest, callback?: (err: AWSError, data: Transfer.Types.StartFileTransferResponse) => void): Request<Transfer.Types.StartFileTransferResponse, AWSError>;
371
371
  /**
372
- * Begins an outbound file transfer to a remote AS2 server. You specify the ConnectorId and the file paths for where to send the files.
372
+ * Begins a file transfer between local Amazon Web Services storage and a remote AS2 or SFTP server. For an AS2 connector, you specify the ConnectorId and one or more SendFilePaths to identify the files you want to transfer. For an SFTP connector, the file transfer can be either outbound or inbound. In both cases, you specify the ConnectorId. Depending on the direction of the transfer, you also specify the following items: If you are transferring file from a partner's SFTP server to a Transfer Family server, you specify one or more RetreiveFilePaths to identify the files you want to transfer, and a LocalDirectoryPath to specify the destination folder. If you are transferring file to a partner's SFTP server from Amazon Web Services storage, you specify one or more SendFilePaths to identify the files you want to transfer, and a RemoteDirectoryPath to specify the destination folder.
373
373
  */
374
374
  startFileTransfer(callback?: (err: AWSError, data: Transfer.Types.StartFileTransferResponse) => void): Request<Transfer.Types.StartFileTransferResponse, AWSError>;
375
375
  /**
@@ -396,6 +396,14 @@ declare class Transfer extends Service {
396
396
  * Attaches a key-value pair to a resource, as identified by its Amazon Resource Name (ARN). Resources are users, servers, roles, and other entities. There is no response returned from this call.
397
397
  */
398
398
  tagResource(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
399
+ /**
400
+ * Tests whether your SFTP connector is set up successfully. We highly recommend that you call this operation to test your ability to transfer files between a Transfer Family server and a trading partner's SFTP server.
401
+ */
402
+ testConnection(params: Transfer.Types.TestConnectionRequest, callback?: (err: AWSError, data: Transfer.Types.TestConnectionResponse) => void): Request<Transfer.Types.TestConnectionResponse, AWSError>;
403
+ /**
404
+ * Tests whether your SFTP connector is set up successfully. We highly recommend that you call this operation to test your ability to transfer files between a Transfer Family server and a trading partner's SFTP server.
405
+ */
406
+ testConnection(callback?: (err: AWSError, data: Transfer.Types.TestConnectionResponse) => void): Request<Transfer.Types.TestConnectionResponse, AWSError>;
399
407
  /**
400
408
  * If the IdentityProviderType of a file transfer protocol-enabled server is AWS_DIRECTORY_SERVICE or API_Gateway, tests whether your identity provider is set up successfully. We highly recommend that you call this operation to test your authentication method as soon as you create your server. By doing so, you can troubleshoot issues with the identity provider integration to ensure that your users can successfully use the service. The ServerId and UserName parameters are required. The ServerProtocol, SourceIp, and UserPassword are all optional. Note the following: You cannot use TestIdentityProvider if the IdentityProviderType of your server is SERVICE_MANAGED. TestIdentityProvider does not work with keys: it only accepts passwords. TestIdentityProvider can test the password operation for a custom Identity Provider that handles keys and passwords. If you provide any incorrect values for any parameters, the Response field is empty. If you provide a server ID for a server that uses service-managed users, you get an error: An error occurred (InvalidRequestException) when calling the TestIdentityProvider operation: s-server-ID not configured for external auth If you enter a Server ID for the --server-id parameter that does not identify an actual Transfer server, you receive the following error: An error occurred (ResourceNotFoundException) when calling the TestIdentityProvider operation: Unknown server. It is possible your sever is in a different region. You can specify a region by adding the following: --region region-code, such as --region us-east-2 to specify a server in US East (Ohio).
401
409
  */
@@ -655,13 +663,13 @@ declare namespace Transfer {
655
663
  }
656
664
  export interface CreateConnectorRequest {
657
665
  /**
658
- * The URL of the partner's AS2 endpoint.
666
+ * The URL of the partner's AS2 or SFTP endpoint.
659
667
  */
660
668
  Url: Url;
661
669
  /**
662
- * A structure that contains the parameters for a connector object.
670
+ * A structure that contains the parameters for an AS2 connector object.
663
671
  */
664
- As2Config: As2ConnectorConfig;
672
+ As2Config?: As2ConnectorConfig;
665
673
  /**
666
674
  * With AS2, you can send files by calling StartFileTransfer and specifying the file paths in the request parameter, SendFilePaths. We use the file’s parent directory (for example, for --send-file-paths /bucket/dir/file.txt, parent directory is /bucket/dir/) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the AccessRole needs to provide read and write access to the parent directory of the file location used in the StartFileTransfer request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with StartFileTransfer. If you are using Basic authentication for your AS2 connector, the access role requires the secretsmanager:GetSecretValue permission for the secret. If the secret is encrypted using a customer-managed key instead of the Amazon Web Services managed key in Secrets Manager, then the role also needs the kms:Decrypt permission for that key.
667
675
  */
@@ -674,6 +682,10 @@ declare namespace Transfer {
674
682
  * Key-value pairs that can be used to group and search for connectors. Tags are metadata attached to connectors for any purpose.
675
683
  */
676
684
  Tags?: Tags;
685
+ /**
686
+ * A structure that contains the parameters for an SFTP connector object.
687
+ */
688
+ SftpConfig?: SftpConnectorConfig;
677
689
  }
678
690
  export interface CreateConnectorResponse {
679
691
  /**
@@ -787,7 +799,7 @@ declare namespace Transfer {
787
799
  */
788
800
  HomeDirectoryType?: HomeDirectoryType;
789
801
  /**
790
- * Logical directory mappings that specify what Amazon S3 or Amazon EFS paths and keys should be visible to your user and how you want to make them visible. You must specify the Entry and Target pair, where Entry shows how the path is made visible and Target is the actual Amazon S3 or Amazon EFS path. If you only specify a target, it is displayed as is. You also must ensure that your Identity and Access Management (IAM) role provides access to paths in Target. This value can be set only when HomeDirectoryType is set to LOGICAL. The following is an Entry and Target pair example. [ { "Entry": "/directory1", "Target": "/bucket_name/home/mydirectory" } ] In most cases, you can use this value instead of the session policy to lock your user down to the designated home directory ("chroot"). To do this, you can set Entry to / and set Target to the HomeDirectory parameter value. The following is an Entry and Target pair example for chroot. [ { "Entry": "/", "Target": "/bucket_name/home/mydirectory" } ]
802
+ * Logical directory mappings that specify what Amazon S3 or Amazon EFS paths and keys should be visible to your user and how you want to make them visible. You must specify the Entry and Target pair, where Entry shows how the path is made visible and Target is the actual Amazon S3 or Amazon EFS path. If you only specify a target, it is displayed as is. You also must ensure that your Identity and Access Management (IAM) role provides access to paths in Target. This value can be set only when HomeDirectoryType is set to LOGICAL. The following is an Entry and Target pair example. [ { "Entry": "/directory1", "Target": "/bucket_name/home/mydirectory" } ] In most cases, you can use this value instead of the session policy to lock your user down to the designated home directory ("chroot"). To do this, you can set Entry to / and set Target to the value the user should see for their home directory when they log in. The following is an Entry and Target pair example for chroot. [ { "Entry": "/", "Target": "/bucket_name/home/mydirectory" } ]
791
803
  */
792
804
  HomeDirectoryMappings?: HomeDirectoryMappings;
793
805
  /**
@@ -1292,11 +1304,11 @@ declare namespace Transfer {
1292
1304
  */
1293
1305
  ConnectorId?: ConnectorId;
1294
1306
  /**
1295
- * The URL of the partner's AS2 endpoint.
1307
+ * The URL of the partner's AS2 or SFTP endpoint.
1296
1308
  */
1297
1309
  Url?: Url;
1298
1310
  /**
1299
- * A structure that contains the parameters for a connector object.
1311
+ * A structure that contains the parameters for an AS2 connector object.
1300
1312
  */
1301
1313
  As2Config?: As2ConnectorConfig;
1302
1314
  /**
@@ -1311,6 +1323,10 @@ declare namespace Transfer {
1311
1323
  * Key-value pairs that can be used to group and search for connectors.
1312
1324
  */
1313
1325
  Tags?: Tags;
1326
+ /**
1327
+ * A structure that contains the parameters for an SFTP connector object.
1328
+ */
1329
+ SftpConfig?: SftpConnectorConfig;
1314
1330
  }
1315
1331
  export interface DescribedExecution {
1316
1332
  /**
@@ -2199,7 +2215,7 @@ declare namespace Transfer {
2199
2215
  */
2200
2216
  ConnectorId?: ConnectorId;
2201
2217
  /**
2202
- * The URL of the partner's AS2 endpoint.
2218
+ * The URL of the partner's AS2 or SFTP endpoint.
2203
2219
  */
2204
2220
  Url?: Url;
2205
2221
  }
@@ -2459,6 +2475,7 @@ declare namespace Transfer {
2459
2475
  export type S3Tags = S3Tag[];
2460
2476
  export type S3VersionId = string;
2461
2477
  export type SecondaryGids = PosixId[];
2478
+ export type SecretId = string;
2462
2479
  export type SecurityGroupId = string;
2463
2480
  export type SecurityGroupIds = SecurityGroupId[];
2464
2481
  export type SecurityPolicyName = string;
@@ -2495,6 +2512,18 @@ declare namespace Transfer {
2495
2512
  export type SessionId = string;
2496
2513
  export type SetStatOption = "DEFAULT"|"ENABLE_NO_OP"|string;
2497
2514
  export type SftpAuthenticationMethods = "PASSWORD"|"PUBLIC_KEY"|"PUBLIC_KEY_OR_PASSWORD"|"PUBLIC_KEY_AND_PASSWORD"|string;
2515
+ export interface SftpConnectorConfig {
2516
+ /**
2517
+ * The identifiers for the secrets (in Amazon Web Services Secrets Manager) that contain the SFTP user's private keys or passwords.
2518
+ */
2519
+ UserSecretId?: SecretId;
2520
+ /**
2521
+ * The public portion of the host key, or keys, that are used to authenticate the user to the external server to which you are connecting. You can use the ssh-keyscan command against the SFTP server to retrieve the necessary key. The three standard SSH public key format elements are &lt;key type&gt;, &lt;body base64&gt;, and an optional &lt;comment&gt;, with spaces between each element. For the trusted host key, Transfer Family accepts RSA and ECDSA keys. For RSA keys, the key type is ssh-rsa. For ECDSA keys, the key type is either ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, or ecdsa-sha2-nistp521, depending on the size of the key you generated.
2522
+ */
2523
+ TrustedHostKeys?: SftpConnectorTrustedHostKeyList;
2524
+ }
2525
+ export type SftpConnectorTrustedHostKey = string;
2526
+ export type SftpConnectorTrustedHostKeyList = SftpConnectorTrustedHostKey[];
2498
2527
  export type SigningAlg = "SHA256"|"SHA384"|"SHA512"|"SHA1"|"NONE"|string;
2499
2528
  export type SourceFileLocation = string;
2500
2529
  export type SourceIp = string;
@@ -2518,17 +2547,29 @@ declare namespace Transfer {
2518
2547
  export type SshPublicKeys = SshPublicKey[];
2519
2548
  export interface StartFileTransferRequest {
2520
2549
  /**
2521
- * The unique identifier for the connector.
2550
+ * The unique identifier for the connector.
2522
2551
  */
2523
2552
  ConnectorId: ConnectorId;
2524
2553
  /**
2525
- * An array of strings. Each string represents the absolute path for one outbound file transfer. For example, DOC-EXAMPLE-BUCKET/myfile.txt .
2554
+ * One or more source paths for the Transfer Family server. Each string represents a source file path for one outbound file transfer. For example, DOC-EXAMPLE-BUCKET/myfile.txt .
2555
+ */
2556
+ SendFilePaths?: FilePaths;
2557
+ /**
2558
+ * One or more source paths for the partner's SFTP server. Each string represents a source file path for one inbound file transfer.
2559
+ */
2560
+ RetrieveFilePaths?: FilePaths;
2561
+ /**
2562
+ * For an inbound transfer, the LocaDirectoryPath specifies the destination for one or more files that are transferred from the partner's SFTP server.
2563
+ */
2564
+ LocalDirectoryPath?: FilePath;
2565
+ /**
2566
+ * For an outbound transfer, the RemoteDirectoryPath specifies the destination for one or more files that are transferred to the partner's SFTP server. If you don't specify a RemoteDirectoryPath, the destination for transferred files is the SFTP user's home directory.
2526
2567
  */
2527
- SendFilePaths: FilePaths;
2568
+ RemoteDirectoryPath?: FilePath;
2528
2569
  }
2529
2570
  export interface StartFileTransferResponse {
2530
2571
  /**
2531
- * Returns the unique identifier for this file transfer.
2572
+ * Returns the unique identifier for the file transfer.
2532
2573
  */
2533
2574
  TransferId: TransferId;
2534
2575
  }
@@ -2539,6 +2580,7 @@ declare namespace Transfer {
2539
2580
  ServerId: ServerId;
2540
2581
  }
2541
2582
  export type State = "OFFLINE"|"ONLINE"|"STARTING"|"STOPPING"|"START_FAILED"|"STOP_FAILED"|string;
2583
+ export type Status = string;
2542
2584
  export type StatusCode = number;
2543
2585
  export type StepResultOutputsJson = string;
2544
2586
  export interface StopServerRequest {
@@ -2588,6 +2630,26 @@ declare namespace Transfer {
2588
2630
  }
2589
2631
  export type TagValue = string;
2590
2632
  export type Tags = Tag[];
2633
+ export interface TestConnectionRequest {
2634
+ /**
2635
+ * The unique identifier for the connector.
2636
+ */
2637
+ ConnectorId: ConnectorId;
2638
+ }
2639
+ export interface TestConnectionResponse {
2640
+ /**
2641
+ * Returns the identifier of the connector object that you are testing.
2642
+ */
2643
+ ConnectorId?: ConnectorId;
2644
+ /**
2645
+ * Returns OK for successful test, or ERROR if the test fails.
2646
+ */
2647
+ Status?: Status;
2648
+ /**
2649
+ * Returns Connection succeeded if the test is successful. Or, returns a descriptive error message if the test fails. The following list provides the details for some error messages and troubleshooting steps for each. Unable to access secrets manager: Verify that your secret name aligns with the one in Transfer Role permissions. Unknown Host/Connection failed: Verify the server URL in the connector configuration , and verify that the login credentials work successfully outside of the connector. Private key not found: Verify that the secret exists and is formatted correctly. Invalid trusted host keys: Verify that the trusted host key in the connector configuration matches the ssh-keyscan output.
2650
+ */
2651
+ StatusMessage?: Message;
2652
+ }
2591
2653
  export interface TestIdentityProviderRequest {
2592
2654
  /**
2593
2655
  * A system-assigned identifier for a specific server. That server's user authentication method is tested with a user name and password.
@@ -2751,11 +2813,11 @@ declare namespace Transfer {
2751
2813
  */
2752
2814
  ConnectorId: ConnectorId;
2753
2815
  /**
2754
- * The URL of the partner's AS2 endpoint.
2816
+ * The URL of the partner's AS2 or SFTP endpoint.
2755
2817
  */
2756
2818
  Url?: Url;
2757
2819
  /**
2758
- * A structure that contains the parameters for a connector object.
2820
+ * A structure that contains the parameters for an AS2 connector object.
2759
2821
  */
2760
2822
  As2Config?: As2ConnectorConfig;
2761
2823
  /**
@@ -2766,6 +2828,10 @@ declare namespace Transfer {
2766
2828
  * The Amazon Resource Name (ARN) of the Identity and Access Management (IAM) role that allows a connector to turn on CloudWatch logging for Amazon S3 events. When set, you can view connector activity in your CloudWatch logs.
2767
2829
  */
2768
2830
  LoggingRole?: Role;
2831
+ /**
2832
+ * A structure that contains the parameters for an SFTP connector object.
2833
+ */
2834
+ SftpConfig?: SftpConnectorConfig;
2769
2835
  }
2770
2836
  export interface UpdateConnectorResponse {
2771
2837
  /**
@@ -358,6 +358,10 @@ declare namespace Wisdom {
358
358
  * The description.
359
359
  */
360
360
  description?: Description;
361
+ /**
362
+ * The configuration information for the Wisdom assistant integration.
363
+ */
364
+ integrationConfiguration?: AssistantIntegrationConfiguration;
361
365
  /**
362
366
  * The name.
363
367
  */
@@ -379,6 +383,12 @@ declare namespace Wisdom {
379
383
  */
380
384
  type: AssistantType;
381
385
  }
386
+ export interface AssistantIntegrationConfiguration {
387
+ /**
388
+ * The Amazon Resource Name (ARN) of the integrated Amazon SNS topic used for streaming chat messages.
389
+ */
390
+ topicIntegrationArn?: GenericArn;
391
+ }
382
392
  export type AssistantList = AssistantSummary[];
383
393
  export type AssistantStatus = "CREATE_IN_PROGRESS"|"CREATE_FAILED"|"ACTIVE"|"DELETE_IN_PROGRESS"|"DELETE_FAILED"|"DELETED"|string;
384
394
  export interface AssistantSummary {
@@ -394,6 +404,10 @@ declare namespace Wisdom {
394
404
  * The description of the assistant.
395
405
  */
396
406
  description?: Description;
407
+ /**
408
+ * The configuration information for the Wisdom assistant integration.
409
+ */
410
+ integrationConfiguration?: AssistantIntegrationConfiguration;
397
411
  /**
398
412
  * The name of the assistant.
399
413
  */
@@ -1364,6 +1378,10 @@ declare namespace Wisdom {
1364
1378
  * The description of the session.
1365
1379
  */
1366
1380
  description?: Description;
1381
+ /**
1382
+ * The configuration information for the session integration.
1383
+ */
1384
+ integrationConfiguration?: SessionIntegrationConfiguration;
1367
1385
  /**
1368
1386
  * The name of the session.
1369
1387
  */
@@ -1381,6 +1399,12 @@ declare namespace Wisdom {
1381
1399
  */
1382
1400
  tags?: Tags;
1383
1401
  }
1402
+ export interface SessionIntegrationConfiguration {
1403
+ /**
1404
+ * The Amazon Resource Name (ARN) of the integrated Amazon SNS topic used for streaming chat messages.
1405
+ */
1406
+ topicIntegrationArn?: GenericArn;
1407
+ }
1384
1408
  export type SessionSummaries = SessionSummary[];
1385
1409
  export interface SessionSummary {
1386
1410
  /**
@@ -83,7 +83,7 @@ return /******/ (function(modules) { // webpackBootstrap
83
83
  /**
84
84
  * @constant
85
85
  */
86
- VERSION: '2.1420.0',
86
+ VERSION: '2.1422.0',
87
87
 
88
88
  /**
89
89
  * @api private