aws-sdk 2.1421.0 → 2.1422.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/clients/rds.d.ts CHANGED
@@ -238,11 +238,11 @@ declare class RDS extends Service {
238
238
  */
239
239
  createEventSubscription(callback?: (err: AWSError, data: RDS.Types.CreateEventSubscriptionResult) => void): Request<RDS.Types.CreateEventSubscriptionResult, AWSError>;
240
240
  /**
241
- * Creates an Aurora global database spread across multiple Amazon Web Services Regions. The global database contains a single primary cluster with read-write capability, and a read-only secondary cluster that receives data from the primary cluster through high-speed replication performed by the Aurora storage subsystem. You can create a global database that is initially empty, and then add a primary cluster and a secondary cluster to it. Or you can specify an existing Aurora cluster during the create operation, and this cluster becomes the primary cluster of the global database. This operation applies only to Aurora DB clusters.
241
+ * Creates an Aurora global database spread across multiple Amazon Web Services Regions. The global database contains a single primary cluster with read-write capability, and a read-only secondary cluster that receives data from the primary cluster through high-speed replication performed by the Aurora storage subsystem. You can create a global database that is initially empty, and then create the primary and secondary DB clusters in the global database. Or you can specify an existing Aurora cluster during the create operation, and this cluster becomes the primary cluster of the global database. This operation applies only to Aurora DB clusters.
242
242
  */
243
243
  createGlobalCluster(params: RDS.Types.CreateGlobalClusterMessage, callback?: (err: AWSError, data: RDS.Types.CreateGlobalClusterResult) => void): Request<RDS.Types.CreateGlobalClusterResult, AWSError>;
244
244
  /**
245
- * Creates an Aurora global database spread across multiple Amazon Web Services Regions. The global database contains a single primary cluster with read-write capability, and a read-only secondary cluster that receives data from the primary cluster through high-speed replication performed by the Aurora storage subsystem. You can create a global database that is initially empty, and then add a primary cluster and a secondary cluster to it. Or you can specify an existing Aurora cluster during the create operation, and this cluster becomes the primary cluster of the global database. This operation applies only to Aurora DB clusters.
245
+ * Creates an Aurora global database spread across multiple Amazon Web Services Regions. The global database contains a single primary cluster with read-write capability, and a read-only secondary cluster that receives data from the primary cluster through high-speed replication performed by the Aurora storage subsystem. You can create a global database that is initially empty, and then create the primary and secondary DB clusters in the global database. Or you can specify an existing Aurora cluster during the create operation, and this cluster becomes the primary cluster of the global database. This operation applies only to Aurora DB clusters.
246
246
  */
247
247
  createGlobalCluster(callback?: (err: AWSError, data: RDS.Types.CreateGlobalClusterResult) => void): Request<RDS.Types.CreateGlobalClusterResult, AWSError>;
248
248
  /**
@@ -878,11 +878,11 @@ declare class RDS extends Service {
878
878
  */
879
879
  modifyEventSubscription(callback?: (err: AWSError, data: RDS.Types.ModifyEventSubscriptionResult) => void): Request<RDS.Types.ModifyEventSubscriptionResult, AWSError>;
880
880
  /**
881
- * Modify a setting for an Amazon Aurora global cluster. You can change one or more database configuration parameters by specifying these parameters and the new values in the request. For more information on Amazon Aurora, see What is Amazon Aurora? in the Amazon Aurora User Guide. This action only applies to Aurora DB clusters.
881
+ * Modifies a setting for an Amazon Aurora global cluster. You can change one or more database configuration parameters by specifying these parameters and the new values in the request. For more information on Amazon Aurora, see What is Amazon Aurora? in the Amazon Aurora User Guide. This operation only applies to Aurora global database clusters.
882
882
  */
883
883
  modifyGlobalCluster(params: RDS.Types.ModifyGlobalClusterMessage, callback?: (err: AWSError, data: RDS.Types.ModifyGlobalClusterResult) => void): Request<RDS.Types.ModifyGlobalClusterResult, AWSError>;
884
884
  /**
885
- * Modify a setting for an Amazon Aurora global cluster. You can change one or more database configuration parameters by specifying these parameters and the new values in the request. For more information on Amazon Aurora, see What is Amazon Aurora? in the Amazon Aurora User Guide. This action only applies to Aurora DB clusters.
885
+ * Modifies a setting for an Amazon Aurora global cluster. You can change one or more database configuration parameters by specifying these parameters and the new values in the request. For more information on Amazon Aurora, see What is Amazon Aurora? in the Amazon Aurora User Guide. This operation only applies to Aurora global database clusters.
886
886
  */
887
887
  modifyGlobalCluster(callback?: (err: AWSError, data: RDS.Types.ModifyGlobalClusterResult) => void): Request<RDS.Types.ModifyGlobalClusterResult, AWSError>;
888
888
  /**
@@ -3806,6 +3806,10 @@ declare namespace RDS {
3806
3806
  * The identifier of the source DB cluster if this DB instance is a read replica.
3807
3807
  */
3808
3808
  ReadReplicaSourceDBClusterIdentifier?: String;
3809
+ /**
3810
+ * The progress of the storage optimization operation as a percentage.
3811
+ */
3812
+ PercentProgress?: String;
3809
3813
  }
3810
3814
  export interface DBInstanceAutomatedBackup {
3811
3815
  /**
@@ -6519,7 +6523,7 @@ declare namespace RDS {
6519
6523
  */
6520
6524
  TdeCredentialPassword?: String;
6521
6525
  /**
6522
- * The CA certificate identifier to use for the DB instance6's server certificate. This setting doesn't apply to RDS Custom DB instances. For more information, see Using SSL/TLS to encrypt a connection to a DB instance in the Amazon RDS User Guide and Using SSL/TLS to encrypt a connection to a DB cluster in the Amazon Aurora User Guide.
6526
+ * The CA certificate identifier to use for the DB instance's server certificate. This setting doesn't apply to RDS Custom DB instances. For more information, see Using SSL/TLS to encrypt a connection to a DB instance in the Amazon RDS User Guide and Using SSL/TLS to encrypt a connection to a DB cluster in the Amazon Aurora User Guide.
6523
6527
  */
6524
6528
  CACertificateIdentifier?: String;
6525
6529
  /**
@@ -6838,23 +6842,23 @@ declare namespace RDS {
6838
6842
  }
6839
6843
  export interface ModifyGlobalClusterMessage {
6840
6844
  /**
6841
- * The DB cluster identifier for the global cluster being modified. This parameter isn't case-sensitive. Constraints: Must match the identifier of an existing global database cluster.
6845
+ * The cluster identifier for the global cluster to modify. This parameter isn't case-sensitive. Constraints: Must match the identifier of an existing global database cluster.
6842
6846
  */
6843
6847
  GlobalClusterIdentifier?: String;
6844
6848
  /**
6845
- * The new cluster identifier for the global database cluster when modifying a global database cluster. This value is stored as a lowercase string. Constraints: Must contain from 1 to 63 letters, numbers, or hyphens The first character must be a letter Can't end with a hyphen or contain two consecutive hyphens Example: my-cluster2
6849
+ * The new cluster identifier for the global database cluster. This value is stored as a lowercase string. Constraints: Must contain from 1 to 63 letters, numbers, or hyphens. The first character must be a letter. Can't end with a hyphen or contain two consecutive hyphens. Example: my-cluster2
6846
6850
  */
6847
6851
  NewGlobalClusterIdentifier?: String;
6848
6852
  /**
6849
- * Indicates if the global database cluster has deletion protection enabled. The global database cluster can't be deleted when deletion protection is enabled.
6853
+ * Specifies whether to enable deletion protection for the global database cluster. The global database cluster can't be deleted when deletion protection is enabled.
6850
6854
  */
6851
6855
  DeletionProtection?: BooleanOptional;
6852
6856
  /**
6853
- * The version number of the database engine to which you want to upgrade. Changing this parameter results in an outage. The change is applied during the next maintenance window unless ApplyImmediately is enabled. To list all of the available engine versions for aurora-mysql (for MySQL-based Aurora global databases), use the following command: aws rds describe-db-engine-versions --engine aurora-mysql --query '*[]|[?SupportsGlobalDatabases == `true`].[EngineVersion]' To list all of the available engine versions for aurora-postgresql (for PostgreSQL-based Aurora global databases), use the following command: aws rds describe-db-engine-versions --engine aurora-postgresql --query '*[]|[?SupportsGlobalDatabases == `true`].[EngineVersion]'
6857
+ * The version number of the database engine to which you want to upgrade. To list all of the available engine versions for aurora-mysql (for MySQL-based Aurora global databases), use the following command: aws rds describe-db-engine-versions --engine aurora-mysql --query '*[]|[?SupportsGlobalDatabases == `true`].[EngineVersion]' To list all of the available engine versions for aurora-postgresql (for PostgreSQL-based Aurora global databases), use the following command: aws rds describe-db-engine-versions --engine aurora-postgresql --query '*[]|[?SupportsGlobalDatabases == `true`].[EngineVersion]'
6854
6858
  */
6855
6859
  EngineVersion?: String;
6856
6860
  /**
6857
- * A value that indicates whether major version upgrades are allowed. Constraints: You must allow major version upgrades when specifying a value for the EngineVersion parameter that is a different major version than the DB cluster's current version. If you upgrade the major version of a global database, the cluster and DB instance parameter groups are set to the default parameter groups for the new version. Apply any custom parameter groups after completing the upgrade.
6861
+ * Specifies whether to allow major version upgrades. Constraints: Must be enabled if you specify a value for the EngineVersion parameter that's a different major version than the global cluster's current version. If you upgrade the major version of a global database, the cluster and DB instance parameter groups are set to the default parameter groups for the new version. Apply any custom parameter groups after completing the upgrade.
6858
6862
  */
6859
6863
  AllowMajorVersionUpgrade?: BooleanOptional;
6860
6864
  }
@@ -20532,13 +20532,13 @@ declare namespace SageMaker {
20532
20532
  */
20533
20533
  CompletionCriteria?: AutoMLJobCompletionCriteria;
20534
20534
  /**
20535
- * The name of the column used to provide the sentences to be classified. It should not be the same as the target column (Required).
20535
+ * The name of the column used to provide the sentences to be classified. It should not be the same as the target column.
20536
20536
  */
20537
- ContentColumn?: ContentColumn;
20537
+ ContentColumn: ContentColumn;
20538
20538
  /**
20539
- * The name of the column used to provide the class labels. It should not be same as the content column (Required).
20539
+ * The name of the column used to provide the class labels. It should not be same as the content column.
20540
20540
  */
20541
- TargetLabelColumn?: TargetLabelColumn;
20541
+ TargetLabelColumn: TargetLabelColumn;
20542
20542
  }
20543
20543
  export type ThingName = string;
20544
20544
  export interface TimeSeriesConfig {
@@ -777,7 +777,7 @@ declare namespace SecurityHub {
777
777
  */
778
778
  Description?: NonEmptyString;
779
779
  /**
780
- * Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding matches the criteria for multiple rules, and each rule has different actions. If the value of this field is set to true for a rule, Security Hub applies the rule action to a finding that matches the rule criteria and doesn't evaluate other rules for the finding.&#x2028; The default value of this field is false.
780
+ * Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding matches the criteria for multiple rules, and each rule has different actions. If a rule is terminal, Security Hub applies the rule action to a finding that matches the rule criteria and doesn't evaluate other rules for the finding. By default, a rule isn't terminal.
781
781
  */
782
782
  IsTerminal?: Boolean;
783
783
  /**
@@ -995,7 +995,7 @@ declare namespace SecurityHub {
995
995
  */
996
996
  Description?: NonEmptyString;
997
997
  /**
998
- * Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding matches the criteria for multiple rules, and each rule has different actions. If the value of this field is set to true for a rule, Security Hub applies the rule action to a finding that matches the rule criteria and doesn't evaluate other rules for the finding.&#x2028; The default value of this field is false.
998
+ * Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding matches the criteria for multiple rules, and each rule has different actions. If a rule is terminal, Security Hub applies the rule action to a finding that matches the rule criteria and doesn't evaluate other rules for the finding. By default, a rule isn't terminal.
999
999
  */
1000
1000
  IsTerminal?: Boolean;
1001
1001
  /**
@@ -1686,6 +1686,46 @@ declare namespace SecurityHub {
1686
1686
  */
1687
1687
  UserPoolId?: NonEmptyString;
1688
1688
  }
1689
+ export interface AwsAthenaWorkGroupConfigurationDetails {
1690
+ /**
1691
+ * The location in Amazon S3 where query and calculation results are stored and the encryption option, if any, used for query and calculation results. These are known as client-side settings. If workgroup settings override client-side settings, then the query uses the workgroup settings.
1692
+ */
1693
+ ResultConfiguration?: AwsAthenaWorkGroupConfigurationResultConfigurationDetails;
1694
+ }
1695
+ export interface AwsAthenaWorkGroupConfigurationResultConfigurationDetails {
1696
+ /**
1697
+ * Specifies the method used to encrypt the user’s data stores in the Athena workgroup.
1698
+ */
1699
+ EncryptionConfiguration?: AwsAthenaWorkGroupConfigurationResultConfigurationEncryptionConfigurationDetails;
1700
+ }
1701
+ export interface AwsAthenaWorkGroupConfigurationResultConfigurationEncryptionConfigurationDetails {
1702
+ /**
1703
+ * Indicates whether Amazon Simple Storage Service (Amazon S3) server-side encryption with Amazon S3 managed keys (SSE_S3), server-side encryption with KMS keys (SSE_KMS), or client-side encryption with KMS customer managed keys (CSE_KMS) is used.
1704
+ */
1705
+ EncryptionOption?: NonEmptyString;
1706
+ /**
1707
+ * For SSE_KMS and CSE_KMS, this is the KMS key Amazon Resource Name (ARN) or ID.
1708
+ */
1709
+ KmsKey?: NonEmptyString;
1710
+ }
1711
+ export interface AwsAthenaWorkGroupDetails {
1712
+ /**
1713
+ * The workgroup name.
1714
+ */
1715
+ Name?: NonEmptyString;
1716
+ /**
1717
+ * The workgroup description.
1718
+ */
1719
+ Description?: NonEmptyString;
1720
+ /**
1721
+ * Whether the workgroup is enabled or disabled.
1722
+ */
1723
+ State?: NonEmptyString;
1724
+ /**
1725
+ * The configuration of the workgroup, which includes the location in Amazon Simple Storage Service (Amazon S3) where query results are stored, the encryption option, if any, used for query results, whether Amazon CloudWatch metrics are enabled for the workgroup, and the limit for the amount of bytes scanned (cutoff) per query, if it is specified.
1726
+ */
1727
+ Configuration?: AwsAthenaWorkGroupConfigurationDetails;
1728
+ }
1689
1729
  export type AwsAutoScalingAutoScalingGroupAvailabilityZonesList = AwsAutoScalingAutoScalingGroupAvailabilityZonesListDetails[];
1690
1730
  export interface AwsAutoScalingAutoScalingGroupAvailabilityZonesListDetails {
1691
1731
  /**
@@ -8011,6 +8051,17 @@ declare namespace SecurityHub {
8011
8051
  Status?: NonEmptyString;
8012
8052
  }
8013
8053
  export type AwsRdsDbClusterOptionGroupMemberships = AwsRdsDbClusterOptionGroupMembership[];
8054
+ export interface AwsRdsDbClusterSnapshotDbClusterSnapshotAttribute {
8055
+ /**
8056
+ * The name of the manual DB cluster snapshot attribute. The attribute named restore refers to the list of Amazon Web Services accounts that have permission to copy or restore the manual DB cluster snapshot.
8057
+ */
8058
+ AttributeName?: NonEmptyString;
8059
+ /**
8060
+ * The value(s) for the manual DB cluster snapshot attribute. If the AttributeName field is set to restore, then this element returns a list of IDs of the Amazon Web Services accounts that are authorized to copy or restore the manual DB cluster snapshot. If a value of all is in the list, then the manual DB cluster snapshot is public and available for any Amazon Web Services account to copy or restore.
8061
+ */
8062
+ AttributeValues?: NonEmptyStringList;
8063
+ }
8064
+ export type AwsRdsDbClusterSnapshotDbClusterSnapshotAttributes = AwsRdsDbClusterSnapshotDbClusterSnapshotAttribute[];
8014
8065
  export interface AwsRdsDbClusterSnapshotDetails {
8015
8066
  /**
8016
8067
  * A list of Availability Zones where instances in the DB cluster can be created.
@@ -8084,6 +8135,10 @@ declare namespace SecurityHub {
8084
8135
  * Whether mapping of IAM accounts to database accounts is enabled.
8085
8136
  */
8086
8137
  IamDatabaseAuthenticationEnabled?: Boolean;
8138
+ /**
8139
+ * Contains the name and values of a manual DB cluster snapshot attribute.
8140
+ */
8141
+ DbClusterSnapshotAttributes?: AwsRdsDbClusterSnapshotDbClusterSnapshotAttributes;
8087
8142
  }
8088
8143
  export interface AwsRdsDbDomainMembership {
8089
8144
  /**
@@ -11496,7 +11551,7 @@ declare namespace SecurityHub {
11496
11551
  */
11497
11552
  Description: NonEmptyString;
11498
11553
  /**
11499
- * Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding matches the criteria for multiple rules, and each rule has different actions. If the value of this field is set to true for a rule, Security Hub applies the rule action to a finding that matches the rule criteria and doesn't evaluate other rules for the finding. The default value of this field is false.
11554
+ * Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding matches the criteria for multiple rules, and each rule has different actions. If a rule is terminal, Security Hub applies the rule action to a finding that matches the rule criteria and doesn't evaluate other rules for the finding. By default, a rule isn't terminal.
11500
11555
  */
11501
11556
  IsTerminal?: Boolean;
11502
11557
  /**
@@ -12671,15 +12726,15 @@ declare namespace SecurityHub {
12671
12726
  */
12672
12727
  Key?: NonEmptyString;
12673
12728
  /**
12674
- * The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there is no match.
12729
+ * The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.
12675
12730
  */
12676
12731
  Value?: NonEmptyString;
12677
12732
  /**
12678
- * The condition to apply to the key value when querying for findings with a map filter. To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the tag Department. To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that do not have the value Finance for the tag Department. EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. You cannot have both an EQUALS filter and a NOT_EQUALS filter on the same field.
12733
+ * The condition to apply to the key value when filtering Security Hub findings with a map filter. To search for values that have the filter value, use one of the following comparison operators: To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match. To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag. CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values. To search for values that don't have the filter value, use one of the following comparison operators: To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag. To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag. NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters. You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.
12679
12734
  */
12680
12735
  Comparison?: MapFilterComparison;
12681
12736
  }
12682
- export type MapFilterComparison = "EQUALS"|"NOT_EQUALS"|string;
12737
+ export type MapFilterComparison = "EQUALS"|"NOT_EQUALS"|"CONTAINS"|"NOT_CONTAINS"|string;
12683
12738
  export type MapFilterList = MapFilter[];
12684
12739
  export type MaxResults = number;
12685
12740
  export interface Member {
@@ -13515,6 +13570,10 @@ declare namespace SecurityHub {
13515
13570
  * Provides details about an Step Functions state machine, which is a workflow consisting of a series of event-driven steps.
13516
13571
  */
13517
13572
  AwsStepFunctionStateMachine?: AwsStepFunctionStateMachineDetails;
13573
+ /**
13574
+ * Provides information about an Amazon Athena workgroup. A workgroup helps you separate users, teams, applications, or workloads. It also helps you set limits on data processing and track costs.
13575
+ */
13576
+ AwsAthenaWorkGroup?: AwsAthenaWorkGroupDetails;
13518
13577
  }
13519
13578
  export type ResourceList = Resource[];
13520
13579
  export interface Result {
@@ -14278,15 +14337,15 @@ declare namespace SecurityHub {
14278
14337
  export type StatusReasonsList = StatusReason[];
14279
14338
  export interface StringFilter {
14280
14339
  /**
14281
- * The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter text, then there is no match.
14340
+ * The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.
14282
14341
  */
14283
14342
  Value?: NonEmptyString;
14284
14343
  /**
14285
- * The condition to apply to a string value when querying for findings. To search for values that contain the filter criteria value, use one of the following comparison operators: To search for values that exactly match the filter value, use EQUALS. For example, the filter ResourceType EQUALS AwsEc2SecurityGroup only matches findings that have a resource type of AwsEc2SecurityGroup. To search for values that start with the filter value, use PREFIX. For example, the filter ResourceType PREFIX AwsIam matches findings that have a resource type that starts with AwsIam. Findings with a resource type of AwsIamPolicy, AwsIamRole, or AwsIamUser would all match. EQUALS and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. To search for values that do not contain the filter criteria value, use one of the following comparison operators: To search for values that do not exactly match the filter value, use NOT_EQUALS. For example, the filter ResourceType NOT_EQUALS AwsIamPolicy matches findings that have a resource type other than AwsIamPolicy. To search for values that do not start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceType PREFIX_NOT_EQUALS AwsIam matches findings that have a resource type that does not start with AwsIam. Findings with a resource type of AwsIamPolicy, AwsIamRole, or AwsIamUser would all be excluded from the results. NOT_EQUALS and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For filters on the same field, you cannot provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter. Combining filters in this way always returns an error, even if the provided filter values would return valid results. You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, then the NOT_EQUALS or PREFIX_NOT_EQUALS filters. For example, for the following filter, Security Hub first identifies findings that have resource types that start with either AwsIAM or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface. ResourceType PREFIX AwsIam ResourceType PREFIX AwsEc2 ResourceType NOT_EQUALS AwsIamPolicy ResourceType NOT_EQUALS AwsEc2NetworkInterface
14344
+ * The condition to apply to a string value when filtering Security Hub findings. To search for values that have the filter value, use one of the following comparison operators: To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront. To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012. To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match. CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title. To search for values that don’t have the filter value, use one of the following comparison operators: To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront. To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012. To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us. NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title. You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters. You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters. For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface. ResourceType PREFIX AwsIam ResourceType PREFIX AwsEc2 ResourceType NOT_EQUALS AwsIamPolicy ResourceType NOT_EQUALS AwsEc2NetworkInterface CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.
14286
14345
  */
14287
14346
  Comparison?: StringFilterComparison;
14288
14347
  }
14289
- export type StringFilterComparison = "EQUALS"|"PREFIX"|"NOT_EQUALS"|"PREFIX_NOT_EQUALS"|string;
14348
+ export type StringFilterComparison = "EQUALS"|"PREFIX"|"NOT_EQUALS"|"PREFIX_NOT_EQUALS"|"CONTAINS"|"NOT_CONTAINS"|string;
14290
14349
  export type StringFilterList = StringFilter[];
14291
14350
  export type StringList = NonEmptyString[];
14292
14351
  export type TagKey = string;
@@ -14466,7 +14525,7 @@ declare namespace SecurityHub {
14466
14525
  */
14467
14526
  RuleName?: NonEmptyString;
14468
14527
  /**
14469
- * Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding matches the criteria for multiple rules, and each rule has different actions. If the value of this field is set to true for a rule, Security Hub applies the rule action to a finding that matches the rule criteria and doesn't evaluate other rules for the finding.&#x2028; The default value of this field is false.
14528
+ * Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding matches the criteria for multiple rules, and each rule has different actions. If a rule is terminal, Security Hub applies the rule action to a finding that matches the rule criteria and doesn't evaluate other rules for the finding. By default, a rule isn't terminal.
14470
14529
  */
14471
14530
  IsTerminal?: Boolean;
14472
14531
  /**
package/clients/sts.d.ts CHANGED
@@ -122,6 +122,10 @@ declare namespace STS {
122
122
  * The source identity specified by the principal that is calling the AssumeRole operation. You can require users to specify a source identity when they assume a role. You do this by using the sts:SourceIdentity condition key in a role trust policy. You can use source identity information in CloudTrail logs to determine who took actions with a role. You can use the aws:SourceIdentity condition key to further control access to Amazon Web Services resources based on the value of source identity. For more information about using source identity, see Monitor and control actions taken with assumed roles in the IAM User Guide. The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@-. You cannot use a value that begins with the text aws:. This prefix is reserved for Amazon Web Services internal use.
123
123
  */
124
124
  SourceIdentity?: sourceIdentityType;
125
+ /**
126
+ * Reserved for future use.
127
+ */
128
+ ProvidedContexts?: ProvidedContextsListType;
125
129
  }
126
130
  export interface AssumeRoleResponse {
127
131
  /**
@@ -215,7 +219,7 @@ declare namespace STS {
215
219
  */
216
220
  RoleSessionName: roleSessionNameType;
217
221
  /**
218
- * The OAuth 2.0 access token or OpenID Connect ID token that is provided by the identity provider. Your application must get this token by authenticating the user who is using your application with a web identity provider before the application makes an AssumeRoleWithWebIdentity call.
222
+ * The OAuth 2.0 access token or OpenID Connect ID token that is provided by the identity provider. Your application must get this token by authenticating the user who is using your application with a web identity provider before the application makes an AssumeRoleWithWebIdentity call. Only tokens with RSA algorithms (RS256) are supported.
219
223
  */
220
224
  WebIdentityToken: clientTokenType;
221
225
  /**
@@ -408,6 +412,17 @@ declare namespace STS {
408
412
  */
409
413
  arn?: arnType;
410
414
  }
415
+ export interface ProvidedContext {
416
+ /**
417
+ * Reserved for future use.
418
+ */
419
+ ProviderArn?: arnType;
420
+ /**
421
+ * Reserved for future use.
422
+ */
423
+ ContextAssertion?: contextAssertionType;
424
+ }
425
+ export type ProvidedContextsListType = ProvidedContext[];
411
426
  export type SAMLAssertionType = string;
412
427
  export type Subject = string;
413
428
  export type SubjectType = string;
@@ -427,6 +442,7 @@ declare namespace STS {
427
442
  export type arnType = string;
428
443
  export type assumedRoleIdType = string;
429
444
  export type clientTokenType = string;
445
+ export type contextAssertionType = string;
430
446
  export type dateType = Date;
431
447
  export type decodedMessageType = string;
432
448
  export type durationSecondsType = number;
@@ -29,11 +29,11 @@ declare class Transfer extends Service {
29
29
  */
30
30
  createAgreement(callback?: (err: AWSError, data: Transfer.Types.CreateAgreementResponse) => void): Request<Transfer.Types.CreateAgreementResponse, AWSError>;
31
31
  /**
32
- * Creates the connector, which captures the parameters for an outbound connection for the AS2 protocol. The connector is required for sending files to an externally hosted AS2 server. For more details about connectors, see Create AS2 connectors.
32
+ * Creates the connector, which captures the parameters for an outbound connection for the AS2 or SFTP protocol. The connector is required for sending files to an externally hosted AS2 or SFTP server. For more details about AS2 connectors, see Create AS2 connectors. You must specify exactly one configuration object: either for AS2 (As2Config) or SFTP (SftpConfig).
33
33
  */
34
34
  createConnector(params: Transfer.Types.CreateConnectorRequest, callback?: (err: AWSError, data: Transfer.Types.CreateConnectorResponse) => void): Request<Transfer.Types.CreateConnectorResponse, AWSError>;
35
35
  /**
36
- * Creates the connector, which captures the parameters for an outbound connection for the AS2 protocol. The connector is required for sending files to an externally hosted AS2 server. For more details about connectors, see Create AS2 connectors.
36
+ * Creates the connector, which captures the parameters for an outbound connection for the AS2 or SFTP protocol. The connector is required for sending files to an externally hosted AS2 or SFTP server. For more details about AS2 connectors, see Create AS2 connectors. You must specify exactly one configuration object: either for AS2 (As2Config) or SFTP (SftpConfig).
37
37
  */
38
38
  createConnector(callback?: (err: AWSError, data: Transfer.Types.CreateConnectorResponse) => void): Request<Transfer.Types.CreateConnectorResponse, AWSError>;
39
39
  /**
@@ -93,11 +93,11 @@ declare class Transfer extends Service {
93
93
  */
94
94
  deleteCertificate(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
95
95
  /**
96
- * Deletes the agreement that's specified in the provided ConnectorId.
96
+ * Deletes the connector that's specified in the provided ConnectorId.
97
97
  */
98
98
  deleteConnector(params: Transfer.Types.DeleteConnectorRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
99
99
  /**
100
- * Deletes the agreement that's specified in the provided ConnectorId.
100
+ * Deletes the connector that's specified in the provided ConnectorId.
101
101
  */
102
102
  deleteConnector(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
103
103
  /**
@@ -365,11 +365,11 @@ declare class Transfer extends Service {
365
365
  */
366
366
  sendWorkflowStepState(callback?: (err: AWSError, data: Transfer.Types.SendWorkflowStepStateResponse) => void): Request<Transfer.Types.SendWorkflowStepStateResponse, AWSError>;
367
367
  /**
368
- * Begins an outbound file transfer to a remote AS2 server. You specify the ConnectorId and the file paths for where to send the files.
368
+ * Begins a file transfer between local Amazon Web Services storage and a remote AS2 or SFTP server. For an AS2 connector, you specify the ConnectorId and one or more SendFilePaths to identify the files you want to transfer. For an SFTP connector, the file transfer can be either outbound or inbound. In both cases, you specify the ConnectorId. Depending on the direction of the transfer, you also specify the following items: If you are transferring file from a partner's SFTP server to a Transfer Family server, you specify one or more RetreiveFilePaths to identify the files you want to transfer, and a LocalDirectoryPath to specify the destination folder. If you are transferring file to a partner's SFTP server from Amazon Web Services storage, you specify one or more SendFilePaths to identify the files you want to transfer, and a RemoteDirectoryPath to specify the destination folder.
369
369
  */
370
370
  startFileTransfer(params: Transfer.Types.StartFileTransferRequest, callback?: (err: AWSError, data: Transfer.Types.StartFileTransferResponse) => void): Request<Transfer.Types.StartFileTransferResponse, AWSError>;
371
371
  /**
372
- * Begins an outbound file transfer to a remote AS2 server. You specify the ConnectorId and the file paths for where to send the files.
372
+ * Begins a file transfer between local Amazon Web Services storage and a remote AS2 or SFTP server. For an AS2 connector, you specify the ConnectorId and one or more SendFilePaths to identify the files you want to transfer. For an SFTP connector, the file transfer can be either outbound or inbound. In both cases, you specify the ConnectorId. Depending on the direction of the transfer, you also specify the following items: If you are transferring file from a partner's SFTP server to a Transfer Family server, you specify one or more RetreiveFilePaths to identify the files you want to transfer, and a LocalDirectoryPath to specify the destination folder. If you are transferring file to a partner's SFTP server from Amazon Web Services storage, you specify one or more SendFilePaths to identify the files you want to transfer, and a RemoteDirectoryPath to specify the destination folder.
373
373
  */
374
374
  startFileTransfer(callback?: (err: AWSError, data: Transfer.Types.StartFileTransferResponse) => void): Request<Transfer.Types.StartFileTransferResponse, AWSError>;
375
375
  /**
@@ -396,6 +396,14 @@ declare class Transfer extends Service {
396
396
  * Attaches a key-value pair to a resource, as identified by its Amazon Resource Name (ARN). Resources are users, servers, roles, and other entities. There is no response returned from this call.
397
397
  */
398
398
  tagResource(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
399
+ /**
400
+ * Tests whether your SFTP connector is set up successfully. We highly recommend that you call this operation to test your ability to transfer files between a Transfer Family server and a trading partner's SFTP server.
401
+ */
402
+ testConnection(params: Transfer.Types.TestConnectionRequest, callback?: (err: AWSError, data: Transfer.Types.TestConnectionResponse) => void): Request<Transfer.Types.TestConnectionResponse, AWSError>;
403
+ /**
404
+ * Tests whether your SFTP connector is set up successfully. We highly recommend that you call this operation to test your ability to transfer files between a Transfer Family server and a trading partner's SFTP server.
405
+ */
406
+ testConnection(callback?: (err: AWSError, data: Transfer.Types.TestConnectionResponse) => void): Request<Transfer.Types.TestConnectionResponse, AWSError>;
399
407
  /**
400
408
  * If the IdentityProviderType of a file transfer protocol-enabled server is AWS_DIRECTORY_SERVICE or API_Gateway, tests whether your identity provider is set up successfully. We highly recommend that you call this operation to test your authentication method as soon as you create your server. By doing so, you can troubleshoot issues with the identity provider integration to ensure that your users can successfully use the service. The ServerId and UserName parameters are required. The ServerProtocol, SourceIp, and UserPassword are all optional. Note the following: You cannot use TestIdentityProvider if the IdentityProviderType of your server is SERVICE_MANAGED. TestIdentityProvider does not work with keys: it only accepts passwords. TestIdentityProvider can test the password operation for a custom Identity Provider that handles keys and passwords. If you provide any incorrect values for any parameters, the Response field is empty. If you provide a server ID for a server that uses service-managed users, you get an error: An error occurred (InvalidRequestException) when calling the TestIdentityProvider operation: s-server-ID not configured for external auth If you enter a Server ID for the --server-id parameter that does not identify an actual Transfer server, you receive the following error: An error occurred (ResourceNotFoundException) when calling the TestIdentityProvider operation: Unknown server. It is possible your sever is in a different region. You can specify a region by adding the following: --region region-code, such as --region us-east-2 to specify a server in US East (Ohio).
401
409
  */
@@ -655,13 +663,13 @@ declare namespace Transfer {
655
663
  }
656
664
  export interface CreateConnectorRequest {
657
665
  /**
658
- * The URL of the partner's AS2 endpoint.
666
+ * The URL of the partner's AS2 or SFTP endpoint.
659
667
  */
660
668
  Url: Url;
661
669
  /**
662
- * A structure that contains the parameters for a connector object.
670
+ * A structure that contains the parameters for an AS2 connector object.
663
671
  */
664
- As2Config: As2ConnectorConfig;
672
+ As2Config?: As2ConnectorConfig;
665
673
  /**
666
674
  * With AS2, you can send files by calling StartFileTransfer and specifying the file paths in the request parameter, SendFilePaths. We use the file’s parent directory (for example, for --send-file-paths /bucket/dir/file.txt, parent directory is /bucket/dir/) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the AccessRole needs to provide read and write access to the parent directory of the file location used in the StartFileTransfer request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with StartFileTransfer. If you are using Basic authentication for your AS2 connector, the access role requires the secretsmanager:GetSecretValue permission for the secret. If the secret is encrypted using a customer-managed key instead of the Amazon Web Services managed key in Secrets Manager, then the role also needs the kms:Decrypt permission for that key.
667
675
  */
@@ -674,6 +682,10 @@ declare namespace Transfer {
674
682
  * Key-value pairs that can be used to group and search for connectors. Tags are metadata attached to connectors for any purpose.
675
683
  */
676
684
  Tags?: Tags;
685
+ /**
686
+ * A structure that contains the parameters for an SFTP connector object.
687
+ */
688
+ SftpConfig?: SftpConnectorConfig;
677
689
  }
678
690
  export interface CreateConnectorResponse {
679
691
  /**
@@ -787,7 +799,7 @@ declare namespace Transfer {
787
799
  */
788
800
  HomeDirectoryType?: HomeDirectoryType;
789
801
  /**
790
- * Logical directory mappings that specify what Amazon S3 or Amazon EFS paths and keys should be visible to your user and how you want to make them visible. You must specify the Entry and Target pair, where Entry shows how the path is made visible and Target is the actual Amazon S3 or Amazon EFS path. If you only specify a target, it is displayed as is. You also must ensure that your Identity and Access Management (IAM) role provides access to paths in Target. This value can be set only when HomeDirectoryType is set to LOGICAL. The following is an Entry and Target pair example. [ { "Entry": "/directory1", "Target": "/bucket_name/home/mydirectory" } ] In most cases, you can use this value instead of the session policy to lock your user down to the designated home directory ("chroot"). To do this, you can set Entry to / and set Target to the HomeDirectory parameter value. The following is an Entry and Target pair example for chroot. [ { "Entry": "/", "Target": "/bucket_name/home/mydirectory" } ]
802
+ * Logical directory mappings that specify what Amazon S3 or Amazon EFS paths and keys should be visible to your user and how you want to make them visible. You must specify the Entry and Target pair, where Entry shows how the path is made visible and Target is the actual Amazon S3 or Amazon EFS path. If you only specify a target, it is displayed as is. You also must ensure that your Identity and Access Management (IAM) role provides access to paths in Target. This value can be set only when HomeDirectoryType is set to LOGICAL. The following is an Entry and Target pair example. [ { "Entry": "/directory1", "Target": "/bucket_name/home/mydirectory" } ] In most cases, you can use this value instead of the session policy to lock your user down to the designated home directory ("chroot"). To do this, you can set Entry to / and set Target to the value the user should see for their home directory when they log in. The following is an Entry and Target pair example for chroot. [ { "Entry": "/", "Target": "/bucket_name/home/mydirectory" } ]
791
803
  */
792
804
  HomeDirectoryMappings?: HomeDirectoryMappings;
793
805
  /**
@@ -1292,11 +1304,11 @@ declare namespace Transfer {
1292
1304
  */
1293
1305
  ConnectorId?: ConnectorId;
1294
1306
  /**
1295
- * The URL of the partner's AS2 endpoint.
1307
+ * The URL of the partner's AS2 or SFTP endpoint.
1296
1308
  */
1297
1309
  Url?: Url;
1298
1310
  /**
1299
- * A structure that contains the parameters for a connector object.
1311
+ * A structure that contains the parameters for an AS2 connector object.
1300
1312
  */
1301
1313
  As2Config?: As2ConnectorConfig;
1302
1314
  /**
@@ -1311,6 +1323,10 @@ declare namespace Transfer {
1311
1323
  * Key-value pairs that can be used to group and search for connectors.
1312
1324
  */
1313
1325
  Tags?: Tags;
1326
+ /**
1327
+ * A structure that contains the parameters for an SFTP connector object.
1328
+ */
1329
+ SftpConfig?: SftpConnectorConfig;
1314
1330
  }
1315
1331
  export interface DescribedExecution {
1316
1332
  /**
@@ -2199,7 +2215,7 @@ declare namespace Transfer {
2199
2215
  */
2200
2216
  ConnectorId?: ConnectorId;
2201
2217
  /**
2202
- * The URL of the partner's AS2 endpoint.
2218
+ * The URL of the partner's AS2 or SFTP endpoint.
2203
2219
  */
2204
2220
  Url?: Url;
2205
2221
  }
@@ -2459,6 +2475,7 @@ declare namespace Transfer {
2459
2475
  export type S3Tags = S3Tag[];
2460
2476
  export type S3VersionId = string;
2461
2477
  export type SecondaryGids = PosixId[];
2478
+ export type SecretId = string;
2462
2479
  export type SecurityGroupId = string;
2463
2480
  export type SecurityGroupIds = SecurityGroupId[];
2464
2481
  export type SecurityPolicyName = string;
@@ -2495,6 +2512,18 @@ declare namespace Transfer {
2495
2512
  export type SessionId = string;
2496
2513
  export type SetStatOption = "DEFAULT"|"ENABLE_NO_OP"|string;
2497
2514
  export type SftpAuthenticationMethods = "PASSWORD"|"PUBLIC_KEY"|"PUBLIC_KEY_OR_PASSWORD"|"PUBLIC_KEY_AND_PASSWORD"|string;
2515
+ export interface SftpConnectorConfig {
2516
+ /**
2517
+ * The identifiers for the secrets (in Amazon Web Services Secrets Manager) that contain the SFTP user's private keys or passwords.
2518
+ */
2519
+ UserSecretId?: SecretId;
2520
+ /**
2521
+ * The public portion of the host key, or keys, that are used to authenticate the user to the external server to which you are connecting. You can use the ssh-keyscan command against the SFTP server to retrieve the necessary key. The three standard SSH public key format elements are &lt;key type&gt;, &lt;body base64&gt;, and an optional &lt;comment&gt;, with spaces between each element. For the trusted host key, Transfer Family accepts RSA and ECDSA keys. For RSA keys, the key type is ssh-rsa. For ECDSA keys, the key type is either ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, or ecdsa-sha2-nistp521, depending on the size of the key you generated.
2522
+ */
2523
+ TrustedHostKeys?: SftpConnectorTrustedHostKeyList;
2524
+ }
2525
+ export type SftpConnectorTrustedHostKey = string;
2526
+ export type SftpConnectorTrustedHostKeyList = SftpConnectorTrustedHostKey[];
2498
2527
  export type SigningAlg = "SHA256"|"SHA384"|"SHA512"|"SHA1"|"NONE"|string;
2499
2528
  export type SourceFileLocation = string;
2500
2529
  export type SourceIp = string;
@@ -2518,17 +2547,29 @@ declare namespace Transfer {
2518
2547
  export type SshPublicKeys = SshPublicKey[];
2519
2548
  export interface StartFileTransferRequest {
2520
2549
  /**
2521
- * The unique identifier for the connector.
2550
+ * The unique identifier for the connector.
2522
2551
  */
2523
2552
  ConnectorId: ConnectorId;
2524
2553
  /**
2525
- * An array of strings. Each string represents the absolute path for one outbound file transfer. For example, DOC-EXAMPLE-BUCKET/myfile.txt .
2554
+ * One or more source paths for the Transfer Family server. Each string represents a source file path for one outbound file transfer. For example, DOC-EXAMPLE-BUCKET/myfile.txt .
2555
+ */
2556
+ SendFilePaths?: FilePaths;
2557
+ /**
2558
+ * One or more source paths for the partner's SFTP server. Each string represents a source file path for one inbound file transfer.
2559
+ */
2560
+ RetrieveFilePaths?: FilePaths;
2561
+ /**
2562
+ * For an inbound transfer, the LocaDirectoryPath specifies the destination for one or more files that are transferred from the partner's SFTP server.
2563
+ */
2564
+ LocalDirectoryPath?: FilePath;
2565
+ /**
2566
+ * For an outbound transfer, the RemoteDirectoryPath specifies the destination for one or more files that are transferred to the partner's SFTP server. If you don't specify a RemoteDirectoryPath, the destination for transferred files is the SFTP user's home directory.
2526
2567
  */
2527
- SendFilePaths: FilePaths;
2568
+ RemoteDirectoryPath?: FilePath;
2528
2569
  }
2529
2570
  export interface StartFileTransferResponse {
2530
2571
  /**
2531
- * Returns the unique identifier for this file transfer.
2572
+ * Returns the unique identifier for the file transfer.
2532
2573
  */
2533
2574
  TransferId: TransferId;
2534
2575
  }
@@ -2539,6 +2580,7 @@ declare namespace Transfer {
2539
2580
  ServerId: ServerId;
2540
2581
  }
2541
2582
  export type State = "OFFLINE"|"ONLINE"|"STARTING"|"STOPPING"|"START_FAILED"|"STOP_FAILED"|string;
2583
+ export type Status = string;
2542
2584
  export type StatusCode = number;
2543
2585
  export type StepResultOutputsJson = string;
2544
2586
  export interface StopServerRequest {
@@ -2588,6 +2630,26 @@ declare namespace Transfer {
2588
2630
  }
2589
2631
  export type TagValue = string;
2590
2632
  export type Tags = Tag[];
2633
+ export interface TestConnectionRequest {
2634
+ /**
2635
+ * The unique identifier for the connector.
2636
+ */
2637
+ ConnectorId: ConnectorId;
2638
+ }
2639
+ export interface TestConnectionResponse {
2640
+ /**
2641
+ * Returns the identifier of the connector object that you are testing.
2642
+ */
2643
+ ConnectorId?: ConnectorId;
2644
+ /**
2645
+ * Returns OK for successful test, or ERROR if the test fails.
2646
+ */
2647
+ Status?: Status;
2648
+ /**
2649
+ * Returns Connection succeeded if the test is successful. Or, returns a descriptive error message if the test fails. The following list provides the details for some error messages and troubleshooting steps for each. Unable to access secrets manager: Verify that your secret name aligns with the one in Transfer Role permissions. Unknown Host/Connection failed: Verify the server URL in the connector configuration , and verify that the login credentials work successfully outside of the connector. Private key not found: Verify that the secret exists and is formatted correctly. Invalid trusted host keys: Verify that the trusted host key in the connector configuration matches the ssh-keyscan output.
2650
+ */
2651
+ StatusMessage?: Message;
2652
+ }
2591
2653
  export interface TestIdentityProviderRequest {
2592
2654
  /**
2593
2655
  * A system-assigned identifier for a specific server. That server's user authentication method is tested with a user name and password.
@@ -2751,11 +2813,11 @@ declare namespace Transfer {
2751
2813
  */
2752
2814
  ConnectorId: ConnectorId;
2753
2815
  /**
2754
- * The URL of the partner's AS2 endpoint.
2816
+ * The URL of the partner's AS2 or SFTP endpoint.
2755
2817
  */
2756
2818
  Url?: Url;
2757
2819
  /**
2758
- * A structure that contains the parameters for a connector object.
2820
+ * A structure that contains the parameters for an AS2 connector object.
2759
2821
  */
2760
2822
  As2Config?: As2ConnectorConfig;
2761
2823
  /**
@@ -2766,6 +2828,10 @@ declare namespace Transfer {
2766
2828
  * The Amazon Resource Name (ARN) of the Identity and Access Management (IAM) role that allows a connector to turn on CloudWatch logging for Amazon S3 events. When set, you can view connector activity in your CloudWatch logs.
2767
2829
  */
2768
2830
  LoggingRole?: Role;
2831
+ /**
2832
+ * A structure that contains the parameters for an SFTP connector object.
2833
+ */
2834
+ SftpConfig?: SftpConnectorConfig;
2769
2835
  }
2770
2836
  export interface UpdateConnectorResponse {
2771
2837
  /**