aws-sdk 2.1433.0 → 2.1434.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +7 -1
- package/README.md +1 -1
- package/apis/connect-2017-08-08.min.json +472 -314
- package/apis/connect-2017-08-08.paginators.json +6 -0
- package/apis/elasticloadbalancingv2-2015-12-01.min.json +49 -46
- package/apis/omics-2022-11-28.min.json +10 -8
- package/clients/cloudtrail.d.ts +4 -4
- package/clients/connect.d.ts +141 -7
- package/clients/elbv2.d.ts +23 -9
- package/clients/omics.d.ts +11 -2
- package/clients/transfer.d.ts +11 -11
- package/dist/aws-sdk-core-react-native.js +1 -1
- package/dist/aws-sdk-react-native.js +5 -5
- package/dist/aws-sdk.js +530 -363
- package/dist/aws-sdk.min.js +81 -81
- package/lib/core.js +1 -1
- package/package.json +1 -1
@@ -198,6 +198,12 @@
|
|
198
198
|
"output_token": "NextToken",
|
199
199
|
"result_key": "TaskTemplates"
|
200
200
|
},
|
201
|
+
"ListTrafficDistributionGroupUsers": {
|
202
|
+
"input_token": "NextToken",
|
203
|
+
"limit_key": "MaxResults",
|
204
|
+
"output_token": "NextToken",
|
205
|
+
"result_key": "TrafficDistributionGroupUserSummaryList"
|
206
|
+
},
|
201
207
|
"ListTrafficDistributionGroups": {
|
202
208
|
"input_token": "NextToken",
|
203
209
|
"limit_key": "MaxResults",
|
@@ -144,7 +144,7 @@
|
|
144
144
|
"members": {
|
145
145
|
"ListenerArn": {},
|
146
146
|
"Conditions": {
|
147
|
-
"shape": "
|
147
|
+
"shape": "S31"
|
148
148
|
},
|
149
149
|
"Priority": {
|
150
150
|
"type": "integer"
|
@@ -162,7 +162,7 @@
|
|
162
162
|
"type": "structure",
|
163
163
|
"members": {
|
164
164
|
"Rules": {
|
165
|
-
"shape": "
|
165
|
+
"shape": "S3h"
|
166
166
|
}
|
167
167
|
}
|
168
168
|
}
|
@@ -200,7 +200,7 @@
|
|
200
200
|
"type": "integer"
|
201
201
|
},
|
202
202
|
"Matcher": {
|
203
|
-
"shape": "
|
203
|
+
"shape": "S3v"
|
204
204
|
},
|
205
205
|
"TargetType": {},
|
206
206
|
"Tags": {
|
@@ -214,7 +214,7 @@
|
|
214
214
|
"type": "structure",
|
215
215
|
"members": {
|
216
216
|
"TargetGroups": {
|
217
|
-
"shape": "
|
217
|
+
"shape": "S41"
|
218
218
|
}
|
219
219
|
}
|
220
220
|
}
|
@@ -293,7 +293,7 @@
|
|
293
293
|
"members": {
|
294
294
|
"TargetGroupArn": {},
|
295
295
|
"Targets": {
|
296
|
-
"shape": "
|
296
|
+
"shape": "S4d"
|
297
297
|
}
|
298
298
|
}
|
299
299
|
},
|
@@ -397,7 +397,7 @@
|
|
397
397
|
"type": "structure",
|
398
398
|
"members": {
|
399
399
|
"Attributes": {
|
400
|
-
"shape": "
|
400
|
+
"shape": "S4w"
|
401
401
|
}
|
402
402
|
}
|
403
403
|
}
|
@@ -407,7 +407,7 @@
|
|
407
407
|
"type": "structure",
|
408
408
|
"members": {
|
409
409
|
"LoadBalancerArns": {
|
410
|
-
"shape": "
|
410
|
+
"shape": "S43"
|
411
411
|
},
|
412
412
|
"Names": {
|
413
413
|
"type": "list",
|
@@ -450,7 +450,7 @@
|
|
450
450
|
"type": "structure",
|
451
451
|
"members": {
|
452
452
|
"Rules": {
|
453
|
-
"shape": "
|
453
|
+
"shape": "S3h"
|
454
454
|
},
|
455
455
|
"NextMarker": {}
|
456
456
|
}
|
@@ -498,7 +498,7 @@
|
|
498
498
|
},
|
499
499
|
"Name": {},
|
500
500
|
"SupportedLoadBalancerTypes": {
|
501
|
-
"shape": "
|
501
|
+
"shape": "S34"
|
502
502
|
}
|
503
503
|
}
|
504
504
|
}
|
@@ -553,7 +553,7 @@
|
|
553
553
|
"type": "structure",
|
554
554
|
"members": {
|
555
555
|
"Attributes": {
|
556
|
-
"shape": "
|
556
|
+
"shape": "S5n"
|
557
557
|
}
|
558
558
|
}
|
559
559
|
}
|
@@ -582,7 +582,7 @@
|
|
582
582
|
"type": "structure",
|
583
583
|
"members": {
|
584
584
|
"TargetGroups": {
|
585
|
-
"shape": "
|
585
|
+
"shape": "S41"
|
586
586
|
},
|
587
587
|
"NextMarker": {}
|
588
588
|
}
|
@@ -597,7 +597,7 @@
|
|
597
597
|
"members": {
|
598
598
|
"TargetGroupArn": {},
|
599
599
|
"Targets": {
|
600
|
-
"shape": "
|
600
|
+
"shape": "S4d"
|
601
601
|
}
|
602
602
|
}
|
603
603
|
},
|
@@ -611,7 +611,7 @@
|
|
611
611
|
"type": "structure",
|
612
612
|
"members": {
|
613
613
|
"Target": {
|
614
|
-
"shape": "
|
614
|
+
"shape": "S4e"
|
615
615
|
},
|
616
616
|
"HealthCheckPort": {},
|
617
617
|
"TargetHealth": {
|
@@ -672,7 +672,7 @@
|
|
672
672
|
"members": {
|
673
673
|
"LoadBalancerArn": {},
|
674
674
|
"Attributes": {
|
675
|
-
"shape": "
|
675
|
+
"shape": "S4w"
|
676
676
|
}
|
677
677
|
}
|
678
678
|
},
|
@@ -681,7 +681,7 @@
|
|
681
681
|
"type": "structure",
|
682
682
|
"members": {
|
683
683
|
"Attributes": {
|
684
|
-
"shape": "
|
684
|
+
"shape": "S4w"
|
685
685
|
}
|
686
686
|
}
|
687
687
|
}
|
@@ -695,7 +695,7 @@
|
|
695
695
|
"members": {
|
696
696
|
"RuleArn": {},
|
697
697
|
"Conditions": {
|
698
|
-
"shape": "
|
698
|
+
"shape": "S31"
|
699
699
|
},
|
700
700
|
"Actions": {
|
701
701
|
"shape": "Sl"
|
@@ -707,7 +707,7 @@
|
|
707
707
|
"type": "structure",
|
708
708
|
"members": {
|
709
709
|
"Rules": {
|
710
|
-
"shape": "
|
710
|
+
"shape": "S3h"
|
711
711
|
}
|
712
712
|
}
|
713
713
|
}
|
@@ -739,7 +739,7 @@
|
|
739
739
|
"type": "integer"
|
740
740
|
},
|
741
741
|
"Matcher": {
|
742
|
-
"shape": "
|
742
|
+
"shape": "S3v"
|
743
743
|
}
|
744
744
|
}
|
745
745
|
},
|
@@ -748,7 +748,7 @@
|
|
748
748
|
"type": "structure",
|
749
749
|
"members": {
|
750
750
|
"TargetGroups": {
|
751
|
-
"shape": "
|
751
|
+
"shape": "S41"
|
752
752
|
}
|
753
753
|
}
|
754
754
|
}
|
@@ -763,7 +763,7 @@
|
|
763
763
|
"members": {
|
764
764
|
"TargetGroupArn": {},
|
765
765
|
"Attributes": {
|
766
|
-
"shape": "
|
766
|
+
"shape": "S5n"
|
767
767
|
}
|
768
768
|
}
|
769
769
|
},
|
@@ -772,7 +772,7 @@
|
|
772
772
|
"type": "structure",
|
773
773
|
"members": {
|
774
774
|
"Attributes": {
|
775
|
-
"shape": "
|
775
|
+
"shape": "S5n"
|
776
776
|
}
|
777
777
|
}
|
778
778
|
}
|
@@ -787,7 +787,7 @@
|
|
787
787
|
"members": {
|
788
788
|
"TargetGroupArn": {},
|
789
789
|
"Targets": {
|
790
|
-
"shape": "
|
790
|
+
"shape": "S4d"
|
791
791
|
}
|
792
792
|
}
|
793
793
|
},
|
@@ -886,7 +886,7 @@
|
|
886
886
|
"type": "structure",
|
887
887
|
"members": {
|
888
888
|
"Rules": {
|
889
|
-
"shape": "
|
889
|
+
"shape": "S3h"
|
890
890
|
}
|
891
891
|
}
|
892
892
|
}
|
@@ -902,7 +902,8 @@
|
|
902
902
|
"LoadBalancerArn": {},
|
903
903
|
"SecurityGroups": {
|
904
904
|
"shape": "S2c"
|
905
|
-
}
|
905
|
+
},
|
906
|
+
"EnforceSecurityGroupInboundRulesOnPrivateLinkTraffic": {}
|
906
907
|
}
|
907
908
|
},
|
908
909
|
"output": {
|
@@ -911,7 +912,8 @@
|
|
911
912
|
"members": {
|
912
913
|
"SecurityGroupIds": {
|
913
914
|
"shape": "S2c"
|
914
|
-
}
|
915
|
+
},
|
916
|
+
"EnforceSecurityGroupInboundRulesOnPrivateLinkTraffic": {}
|
915
917
|
}
|
916
918
|
}
|
917
919
|
},
|
@@ -1176,7 +1178,8 @@
|
|
1176
1178
|
"shape": "S2c"
|
1177
1179
|
},
|
1178
1180
|
"IpAddressType": {},
|
1179
|
-
"CustomerOwnedIpv4Pool": {}
|
1181
|
+
"CustomerOwnedIpv4Pool": {},
|
1182
|
+
"EnforceSecurityGroupInboundRulesOnPrivateLinkTraffic": {}
|
1180
1183
|
}
|
1181
1184
|
}
|
1182
1185
|
},
|
@@ -1203,20 +1206,20 @@
|
|
1203
1206
|
}
|
1204
1207
|
}
|
1205
1208
|
},
|
1206
|
-
"
|
1209
|
+
"S31": {
|
1207
1210
|
"type": "list",
|
1208
1211
|
"member": {
|
1209
1212
|
"type": "structure",
|
1210
1213
|
"members": {
|
1211
1214
|
"Field": {},
|
1212
1215
|
"Values": {
|
1213
|
-
"shape": "
|
1216
|
+
"shape": "S34"
|
1214
1217
|
},
|
1215
1218
|
"HostHeaderConfig": {
|
1216
1219
|
"type": "structure",
|
1217
1220
|
"members": {
|
1218
1221
|
"Values": {
|
1219
|
-
"shape": "
|
1222
|
+
"shape": "S34"
|
1220
1223
|
}
|
1221
1224
|
}
|
1222
1225
|
},
|
@@ -1224,7 +1227,7 @@
|
|
1224
1227
|
"type": "structure",
|
1225
1228
|
"members": {
|
1226
1229
|
"Values": {
|
1227
|
-
"shape": "
|
1230
|
+
"shape": "S34"
|
1228
1231
|
}
|
1229
1232
|
}
|
1230
1233
|
},
|
@@ -1233,7 +1236,7 @@
|
|
1233
1236
|
"members": {
|
1234
1237
|
"HttpHeaderName": {},
|
1235
1238
|
"Values": {
|
1236
|
-
"shape": "
|
1239
|
+
"shape": "S34"
|
1237
1240
|
}
|
1238
1241
|
}
|
1239
1242
|
},
|
@@ -1256,7 +1259,7 @@
|
|
1256
1259
|
"type": "structure",
|
1257
1260
|
"members": {
|
1258
1261
|
"Values": {
|
1259
|
-
"shape": "
|
1262
|
+
"shape": "S34"
|
1260
1263
|
}
|
1261
1264
|
}
|
1262
1265
|
},
|
@@ -1264,18 +1267,18 @@
|
|
1264
1267
|
"type": "structure",
|
1265
1268
|
"members": {
|
1266
1269
|
"Values": {
|
1267
|
-
"shape": "
|
1270
|
+
"shape": "S34"
|
1268
1271
|
}
|
1269
1272
|
}
|
1270
1273
|
}
|
1271
1274
|
}
|
1272
1275
|
}
|
1273
1276
|
},
|
1274
|
-
"
|
1277
|
+
"S34": {
|
1275
1278
|
"type": "list",
|
1276
1279
|
"member": {}
|
1277
1280
|
},
|
1278
|
-
"
|
1281
|
+
"S3h": {
|
1279
1282
|
"type": "list",
|
1280
1283
|
"member": {
|
1281
1284
|
"type": "structure",
|
@@ -1283,7 +1286,7 @@
|
|
1283
1286
|
"RuleArn": {},
|
1284
1287
|
"Priority": {},
|
1285
1288
|
"Conditions": {
|
1286
|
-
"shape": "
|
1289
|
+
"shape": "S31"
|
1287
1290
|
},
|
1288
1291
|
"Actions": {
|
1289
1292
|
"shape": "Sl"
|
@@ -1294,14 +1297,14 @@
|
|
1294
1297
|
}
|
1295
1298
|
}
|
1296
1299
|
},
|
1297
|
-
"
|
1300
|
+
"S3v": {
|
1298
1301
|
"type": "structure",
|
1299
1302
|
"members": {
|
1300
1303
|
"HttpCode": {},
|
1301
1304
|
"GrpcCode": {}
|
1302
1305
|
}
|
1303
1306
|
},
|
1304
|
-
"
|
1307
|
+
"S41": {
|
1305
1308
|
"type": "list",
|
1306
1309
|
"member": {
|
1307
1310
|
"type": "structure",
|
@@ -1332,10 +1335,10 @@
|
|
1332
1335
|
},
|
1333
1336
|
"HealthCheckPath": {},
|
1334
1337
|
"Matcher": {
|
1335
|
-
"shape": "
|
1338
|
+
"shape": "S3v"
|
1336
1339
|
},
|
1337
1340
|
"LoadBalancerArns": {
|
1338
|
-
"shape": "
|
1341
|
+
"shape": "S43"
|
1339
1342
|
},
|
1340
1343
|
"TargetType": {},
|
1341
1344
|
"ProtocolVersion": {},
|
@@ -1343,17 +1346,17 @@
|
|
1343
1346
|
}
|
1344
1347
|
}
|
1345
1348
|
},
|
1346
|
-
"
|
1349
|
+
"S43": {
|
1347
1350
|
"type": "list",
|
1348
1351
|
"member": {}
|
1349
1352
|
},
|
1350
|
-
"
|
1353
|
+
"S4d": {
|
1351
1354
|
"type": "list",
|
1352
1355
|
"member": {
|
1353
|
-
"shape": "
|
1356
|
+
"shape": "S4e"
|
1354
1357
|
}
|
1355
1358
|
},
|
1356
|
-
"
|
1359
|
+
"S4e": {
|
1357
1360
|
"type": "structure",
|
1358
1361
|
"required": [
|
1359
1362
|
"Id"
|
@@ -1366,7 +1369,7 @@
|
|
1366
1369
|
"AvailabilityZone": {}
|
1367
1370
|
}
|
1368
1371
|
},
|
1369
|
-
"
|
1372
|
+
"S4w": {
|
1370
1373
|
"type": "list",
|
1371
1374
|
"member": {
|
1372
1375
|
"type": "structure",
|
@@ -1376,7 +1379,7 @@
|
|
1376
1379
|
}
|
1377
1380
|
}
|
1378
1381
|
},
|
1379
|
-
"
|
1382
|
+
"S5n": {
|
1380
1383
|
"type": "list",
|
1381
1384
|
"member": {
|
1382
1385
|
"type": "structure",
|
@@ -1714,7 +1714,8 @@
|
|
1714
1714
|
"logStream": {},
|
1715
1715
|
"gpus": {
|
1716
1716
|
"type": "integer"
|
1717
|
-
}
|
1717
|
+
},
|
1718
|
+
"instanceType": {}
|
1718
1719
|
}
|
1719
1720
|
},
|
1720
1721
|
"authtype": "v4",
|
@@ -1954,14 +1955,14 @@
|
|
1954
1955
|
"type": "integer"
|
1955
1956
|
},
|
1956
1957
|
"creationTime": {
|
1957
|
-
"shape": "
|
1958
|
+
"shape": "S7e"
|
1958
1959
|
},
|
1959
1960
|
"statusMessage": {},
|
1960
1961
|
"tags": {
|
1961
1962
|
"shape": "Su"
|
1962
1963
|
},
|
1963
1964
|
"metadata": {
|
1964
|
-
"shape": "
|
1965
|
+
"shape": "S7g"
|
1965
1966
|
},
|
1966
1967
|
"accelerators": {}
|
1967
1968
|
}
|
@@ -2940,7 +2941,8 @@
|
|
2940
2941
|
},
|
2941
2942
|
"gpus": {
|
2942
2943
|
"type": "integer"
|
2943
|
-
}
|
2944
|
+
},
|
2945
|
+
"instanceType": {}
|
2944
2946
|
}
|
2945
2947
|
}
|
2946
2948
|
},
|
@@ -3327,10 +3329,10 @@
|
|
3327
3329
|
"type": {},
|
3328
3330
|
"digest": {},
|
3329
3331
|
"creationTime": {
|
3330
|
-
"shape": "
|
3332
|
+
"shape": "S7e"
|
3331
3333
|
},
|
3332
3334
|
"metadata": {
|
3333
|
-
"shape": "
|
3335
|
+
"shape": "S7g"
|
3334
3336
|
}
|
3335
3337
|
}
|
3336
3338
|
}
|
@@ -4209,11 +4211,11 @@
|
|
4209
4211
|
"type": "timestamp",
|
4210
4212
|
"timestampFormat": "iso8601"
|
4211
4213
|
},
|
4212
|
-
"
|
4214
|
+
"S7e": {
|
4213
4215
|
"type": "timestamp",
|
4214
4216
|
"timestampFormat": "iso8601"
|
4215
4217
|
},
|
4216
|
-
"
|
4218
|
+
"S7g": {
|
4217
4219
|
"type": "map",
|
4218
4220
|
"key": {},
|
4219
4221
|
"value": {}
|
package/clients/cloudtrail.d.ts
CHANGED
@@ -407,7 +407,7 @@ declare namespace CloudTrail {
|
|
407
407
|
export type AdvancedEventSelectors = AdvancedEventSelector[];
|
408
408
|
export interface AdvancedFieldSelector {
|
409
409
|
/**
|
410
|
-
* A field in a CloudTrail event record on which to filter events to be logged. For event data stores for Config configuration items, Audit Manager evidence, or non-Amazon Web Services events, the field is used only for selecting events as filtering is not supported. For CloudTrail event records, supported fields include readOnly, eventCategory, eventSource (for management events), eventName, resources.type, and resources.ARN. For event data stores for Config configuration items, Audit Manager evidence, or non-Amazon Web Services events, the only supported field is eventCategory. readOnly - Optional. Can be set to Equals a value of true or false. If you do not add this field, CloudTrail logs both read and write events. A value of true logs only read events. A value of false logs only write events. eventSource - For filtering management events only. This can be set only to NotEquals kms.amazonaws.com. eventName - Can use any operator. You can use it to filter in or filter out any data event logged to CloudTrail, such as PutBucket or GetSnapshotBlock. You can have multiple values for this field, separated by commas. eventCategory - This is required and must be set to Equals. For CloudTrail event records, the value must be Management or Data. For Config configuration items, the value must be ConfigurationItem. For Audit Manager evidence, the value must be Evidence. For non-Amazon Web Services events, the value must be ActivityAuditLog. resources.type - This field is required for CloudTrail data events. resources.type can only use the Equals operator, and the value can be one of the following: AWS::DynamoDB::Table AWS::Lambda::Function AWS::S3::Object AWS::CloudTrail::Channel AWS::CodeWhisperer::Profile AWS::Cognito::IdentityPool AWS::DynamoDB::Stream AWS::EC2::Snapshot AWS::EMRWAL::Workspace AWS::FinSpace::Environment AWS::Glue::Table AWS::GuardDuty::Detector AWS::KendraRanking::ExecutionPlan AWS::ManagedBlockchain::Node AWS::SageMaker::ExperimentTrialComponent AWS::SageMaker::FeatureGroup AWS::S3::AccessPoint AWS::S3ObjectLambda::AccessPoint AWS::S3Outposts::Object You can have only one resources.type field per selector. To log data events on more than one resource type, add another selector. resources.ARN - You can use any operator with resources.ARN, but if you use Equals or NotEquals, the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. For example, if resources.type equals AWS::S3::Object, the ARN must be in one of the following formats. To log all data events for all objects in a specific S3 bucket, use the StartsWith operator, and include only the bucket ARN as the matching value. The trailing slash is intentional; do not exclude it. Replace the text between less than and greater than symbols (<>) with resource-specific information. arn:<partition>:s3:::<bucket_name>/ arn:<partition>:s3:::<bucket_name>/<object_path>/ When resources.type equals AWS::DynamoDB::Table, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:dynamodb:<region>:<account_ID>:table/<table_name> When resources.type equals AWS::Lambda::Function, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:lambda:<region>:<account_ID>:function:<function_name> When resources.type equals AWS::CloudTrail::Channel, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:cloudtrail:<region>:<account_ID>:channel/<channel_UUID> When resources.type equals AWS::CodeWhisperer::Profile, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:codewhisperer:<region>:<account_ID>:profile/<profile_ID> When resources.type equals AWS::Cognito::IdentityPool, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:cognito-identity:<region>:<account_ID>:identitypool/<identity_pool_ID> When resources.type equals AWS::DynamoDB::Stream, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:dynamodb:<region>:<account_ID>:table/<table_name>/stream/<date_time> When resources.type equals AWS::EC2::Snapshot, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:ec2:<region>::snapshot/<snapshot_ID> When resources.type equals AWS::EMRWAL::Workspace, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:emrwal:<region>::workspace/<workspace_name> When resources.type equals AWS::FinSpace::Environment, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:finspace:<region>:<account_ID>:environment/<environment_ID> When resources.type equals AWS::Glue::Table, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:glue:<region>:<account_ID>:table/<database_name>/<table_name> When resources.type equals AWS::GuardDuty::Detector, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:guardduty:<region>:<account_ID>:detector/<detector_ID> When resources.type equals AWS::KendraRanking::ExecutionPlan, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:kendra-ranking:<region>:<account_ID>:rescore-execution-plan/<rescore_execution_plan_ID> When resources.type equals AWS::ManagedBlockchain::Node, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:managedblockchain:<region>:<account_ID>:nodes/<node_ID> When resources.type equals AWS::SageMaker::ExperimentTrialComponent, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:sagemaker:<region>:<account_ID>:experiment-trial-component/<experiment_trial_component_name> When resources.type equals AWS::SageMaker::FeatureGroup, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:sagemaker:<region>:<account_ID>:feature-group/<feature_group_name> When resources.type equals AWS::S3::AccessPoint, and the operator is set to Equals or NotEquals, the ARN must be in one of the following formats. To log events on all objects in an S3 access point, we recommend that you use only the access point ARN, don’t include the object path, and use the StartsWith or NotStartsWith operators. arn:<partition>:s3:<region>:<account_ID>:accesspoint/<access_point_name> arn:<partition>:s3:<region>:<account_ID>:accesspoint/<access_point_name>/object/<object_path> When resources.type equals AWS::S3ObjectLambda::AccessPoint, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:s3-object-lambda:<region>:<account_ID>:accesspoint/<access_point_name> When resources.type equals AWS::S3Outposts::Object, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:s3-outposts:<region>:<account_ID>:<object_path>
|
410
|
+
* A field in a CloudTrail event record on which to filter events to be logged. For event data stores for Config configuration items, Audit Manager evidence, or non-Amazon Web Services events, the field is used only for selecting events as filtering is not supported. For CloudTrail event records, supported fields include readOnly, eventCategory, eventSource (for management events), eventName, resources.type, and resources.ARN. For event data stores for Config configuration items, Audit Manager evidence, or non-Amazon Web Services events, the only supported field is eventCategory. readOnly - Optional. Can be set to Equals a value of true or false. If you do not add this field, CloudTrail logs both read and write events. A value of true logs only read events. A value of false logs only write events. eventSource - For filtering management events only. This can be set only to NotEquals kms.amazonaws.com. eventName - Can use any operator. You can use it to filter in or filter out any data event logged to CloudTrail, such as PutBucket or GetSnapshotBlock. You can have multiple values for this field, separated by commas. eventCategory - This is required and must be set to Equals. For CloudTrail event records, the value must be Management or Data. For Config configuration items, the value must be ConfigurationItem. For Audit Manager evidence, the value must be Evidence. For non-Amazon Web Services events, the value must be ActivityAuditLog. resources.type - This field is required for CloudTrail data events. resources.type can only use the Equals operator, and the value can be one of the following: AWS::DynamoDB::Table AWS::Lambda::Function AWS::S3::Object AWS::CloudTrail::Channel AWS::CodeWhisperer::Profile AWS::Cognito::IdentityPool AWS::DynamoDB::Stream AWS::EC2::Snapshot AWS::EMRWAL::Workspace AWS::FinSpace::Environment AWS::Glue::Table AWS::GuardDuty::Detector AWS::KendraRanking::ExecutionPlan AWS::ManagedBlockchain::Network AWS::ManagedBlockchain::Node AWS::MedicalImaging::Datastore AWS::SageMaker::ExperimentTrialComponent AWS::SageMaker::FeatureGroup AWS::S3::AccessPoint AWS::S3ObjectLambda::AccessPoint AWS::S3Outposts::Object AWS::SSMMessages::ControlChannel AWS::VerifiedPermissions::PolicyStore You can have only one resources.type field per selector. To log data events on more than one resource type, add another selector. resources.ARN - You can use any operator with resources.ARN, but if you use Equals or NotEquals, the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. For example, if resources.type equals AWS::S3::Object, the ARN must be in one of the following formats. To log all data events for all objects in a specific S3 bucket, use the StartsWith operator, and include only the bucket ARN as the matching value. The trailing slash is intentional; do not exclude it. Replace the text between less than and greater than symbols (<>) with resource-specific information. arn:<partition>:s3:::<bucket_name>/ arn:<partition>:s3:::<bucket_name>/<object_path>/ When resources.type equals AWS::DynamoDB::Table, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:dynamodb:<region>:<account_ID>:table/<table_name> When resources.type equals AWS::Lambda::Function, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:lambda:<region>:<account_ID>:function:<function_name> When resources.type equals AWS::CloudTrail::Channel, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:cloudtrail:<region>:<account_ID>:channel/<channel_UUID> When resources.type equals AWS::CodeWhisperer::Profile, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:codewhisperer:<region>:<account_ID>:profile/<profile_ID> When resources.type equals AWS::Cognito::IdentityPool, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:cognito-identity:<region>:<account_ID>:identitypool/<identity_pool_ID> When resources.type equals AWS::DynamoDB::Stream, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:dynamodb:<region>:<account_ID>:table/<table_name>/stream/<date_time> When resources.type equals AWS::EC2::Snapshot, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:ec2:<region>::snapshot/<snapshot_ID> When resources.type equals AWS::EMRWAL::Workspace, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:emrwal:<region>::workspace/<workspace_name> When resources.type equals AWS::FinSpace::Environment, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:finspace:<region>:<account_ID>:environment/<environment_ID> When resources.type equals AWS::Glue::Table, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:glue:<region>:<account_ID>:table/<database_name>/<table_name> When resources.type equals AWS::GuardDuty::Detector, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:guardduty:<region>:<account_ID>:detector/<detector_ID> When resources.type equals AWS::KendraRanking::ExecutionPlan, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:kendra-ranking:<region>:<account_ID>:rescore-execution-plan/<rescore_execution_plan_ID> When resources.type equals AWS::ManagedBlockchain::Network, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:managedblockchain:::networks/<network_name> When resources.type equals AWS::ManagedBlockchain::Node, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:managedblockchain:<region>:<account_ID>:nodes/<node_ID> When resources.type equals AWS::MedicalImaging::Datastore, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:medical-imaging:<region>:<account_ID>:datastore/<data_store_ID> When resources.type equals AWS::SageMaker::ExperimentTrialComponent, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:sagemaker:<region>:<account_ID>:experiment-trial-component/<experiment_trial_component_name> When resources.type equals AWS::SageMaker::FeatureGroup, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:sagemaker:<region>:<account_ID>:feature-group/<feature_group_name> When resources.type equals AWS::S3::AccessPoint, and the operator is set to Equals or NotEquals, the ARN must be in one of the following formats. To log events on all objects in an S3 access point, we recommend that you use only the access point ARN, don’t include the object path, and use the StartsWith or NotStartsWith operators. arn:<partition>:s3:<region>:<account_ID>:accesspoint/<access_point_name> arn:<partition>:s3:<region>:<account_ID>:accesspoint/<access_point_name>/object/<object_path> When resources.type equals AWS::S3ObjectLambda::AccessPoint, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:s3-object-lambda:<region>:<account_ID>:accesspoint/<access_point_name> When resources.type equals AWS::S3Outposts::Object, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:s3-outposts:<region>:<account_ID>:<object_path> When resources.type equals AWS::SSMMessages::ControlChannel, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:ssmmessages:<region>:<account_ID>:control-channel/<channel_ID> When resources.type equals AWS::VerifiedPermissions::PolicyStore, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:verifiedpermissions:<region>:<account_ID>:policy-store/<policy_store_UUID>
|
411
411
|
*/
|
412
412
|
Field: SelectorField;
|
413
413
|
/**
|
@@ -523,7 +523,7 @@ declare namespace CloudTrail {
|
|
523
523
|
*/
|
524
524
|
OrganizationEnabled?: Boolean;
|
525
525
|
/**
|
526
|
-
* The retention period of the event data store, in days. You can set a retention period of up to 2557 days, the equivalent of seven years.
|
526
|
+
* The retention period of the event data store, in days. You can set a retention period of up to 2557 days, the equivalent of seven years. CloudTrail Lake determines whether to retain an event by checking if the eventTime of the event is within the specified retention period. For example, if you set a retention period of 90 days, CloudTrail will remove events when the eventTime is older than 90 days. If you plan to copy trail events to this event data store, we recommend that you consider both the age of the events that you want to copy as well as how long you want to keep the copied events in your event data store. For example, if you copy trail events that are 5 years old and specify a retention period of 7 years, the event data store will retain those events for two years.
|
527
527
|
*/
|
528
528
|
RetentionPeriod?: RetentionPeriod;
|
529
529
|
/**
|
@@ -690,7 +690,7 @@ declare namespace CloudTrail {
|
|
690
690
|
}
|
691
691
|
export interface DataResource {
|
692
692
|
/**
|
693
|
-
* The resource type in which you want to log data events. You can specify the following basic event selector resource types: AWS::DynamoDB::Table AWS::Lambda::Function AWS::S3::Object The following resource types are also available through advanced event selectors. Basic event selector resource types are valid in advanced event selectors, but advanced event selector resource types are not valid in basic event selectors. For more information, see AdvancedFieldSelector. AWS::CloudTrail::Channel AWS::CodeWhisperer::Profile AWS::Cognito::IdentityPool AWS::DynamoDB::Stream AWS::EC2::Snapshot AWS::EMRWAL::Workspace AWS::FinSpace::Environment AWS::Glue::Table AWS::GuardDuty::Detector AWS::KendraRanking::ExecutionPlan AWS::ManagedBlockchain::Node AWS::SageMaker::ExperimentTrialComponent AWS::SageMaker::FeatureGroup AWS::S3::AccessPoint AWS::S3ObjectLambda::AccessPoint AWS::S3Outposts::Object
|
693
|
+
* The resource type in which you want to log data events. You can specify the following basic event selector resource types: AWS::DynamoDB::Table AWS::Lambda::Function AWS::S3::Object The following resource types are also available through advanced event selectors. Basic event selector resource types are valid in advanced event selectors, but advanced event selector resource types are not valid in basic event selectors. For more information, see AdvancedFieldSelector. AWS::CloudTrail::Channel AWS::CodeWhisperer::Profile AWS::Cognito::IdentityPool AWS::DynamoDB::Stream AWS::EC2::Snapshot AWS::EMRWAL::Workspace AWS::FinSpace::Environment AWS::Glue::Table AWS::GuardDuty::Detector AWS::KendraRanking::ExecutionPlan AWS::ManagedBlockchain::Network AWS::ManagedBlockchain::Node AWS::MedicalImaging::Datastore AWS::SageMaker::ExperimentTrialComponent AWS::SageMaker::FeatureGroup AWS::S3::AccessPoint AWS::S3ObjectLambda::AccessPoint AWS::S3Outposts::Object AWS::SSMMessages::ControlChannel AWS::VerifiedPermissions::PolicyStore
|
694
694
|
*/
|
695
695
|
Type?: String;
|
696
696
|
/**
|
@@ -2169,7 +2169,7 @@ declare namespace CloudTrail {
|
|
2169
2169
|
*/
|
2170
2170
|
OrganizationEnabled?: Boolean;
|
2171
2171
|
/**
|
2172
|
-
* The retention period, in days.
|
2172
|
+
* The retention period of the event data store, in days. You can set a retention period of up to 2557 days, the equivalent of seven years. CloudTrail Lake determines whether to retain an event by checking if the eventTime of the event is within the specified retention period. For example, if you set a retention period of 90 days, CloudTrail will remove events when the eventTime is older than 90 days. If you decrease the retention period of an event data store, CloudTrail will remove any events with an eventTime older than the new retention period. For example, if the previous retention period was 365 days and you decrease it to 100 days, CloudTrail will remove events with an eventTime older than 100 days.
|
2173
2173
|
*/
|
2174
2174
|
RetentionPeriod?: RetentionPeriod;
|
2175
2175
|
/**
|