aws-sdk 2.1446.0 → 2.1448.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (43) hide show
  1. package/CHANGELOG.md +17 -1
  2. package/README.md +1 -1
  3. package/apis/appflow-2020-08-23.min.json +115 -87
  4. package/apis/auditmanager-2017-07-25.min.json +238 -63
  5. package/apis/cleanrooms-2022-02-17.min.json +70 -31
  6. package/apis/cognito-idp-2016-04-18.examples.json +849 -0
  7. package/apis/cognito-idp-2016-04-18.min.json +64 -24
  8. package/apis/datasync-2018-11-09.min.json +97 -14
  9. package/apis/metadata.json +7 -0
  10. package/apis/neptunedata-2023-08-01.examples.json +5 -0
  11. package/apis/neptunedata-2023-08-01.min.json +1923 -0
  12. package/apis/neptunedata-2023-08-01.paginators.json +4 -0
  13. package/apis/omics-2022-11-28.min.json +23 -21
  14. package/apis/pca-connector-ad-2018-05-10.examples.json +5 -0
  15. package/apis/pca-connector-ad-2018-05-10.min.json +1465 -0
  16. package/apis/pca-connector-ad-2018-05-10.paginators.json +34 -0
  17. package/apis/sagemaker-2017-07-24.min.json +739 -728
  18. package/apis/sesv2-2019-09-27.examples.json +244 -0
  19. package/apis/sesv2-2019-09-27.min.json +491 -153
  20. package/apis/sesv2-2019-09-27.paginators.json +5 -0
  21. package/clients/all.d.ts +2 -0
  22. package/clients/all.js +3 -1
  23. package/clients/appflow.d.ts +30 -0
  24. package/clients/apprunner.d.ts +5 -5
  25. package/clients/cleanrooms.d.ts +41 -5
  26. package/clients/cognitoidentityserviceprovider.d.ts +5 -5
  27. package/clients/datasync.d.ts +144 -21
  28. package/clients/fsx.d.ts +28 -28
  29. package/clients/neptunedata.d.ts +1976 -0
  30. package/clients/neptunedata.js +18 -0
  31. package/clients/networkfirewall.d.ts +9 -9
  32. package/clients/omics.d.ts +13 -4
  33. package/clients/pcaconnectorad.d.ts +1606 -0
  34. package/clients/pcaconnectorad.js +18 -0
  35. package/clients/sagemaker.d.ts +21 -1
  36. package/clients/sesv2.d.ts +374 -3
  37. package/dist/aws-sdk-core-react-native.js +2 -2
  38. package/dist/aws-sdk-react-native.js +87 -13
  39. package/dist/aws-sdk.js +74 -27
  40. package/dist/aws-sdk.min.js +85 -85
  41. package/lib/config_service_placeholders.d.ts +4 -0
  42. package/lib/core.js +1 -1
  43. package/package.json +1 -1
@@ -0,0 +1,18 @@
1
+ require('../lib/node_loader');
2
+ var AWS = require('../lib/core');
3
+ var Service = AWS.Service;
4
+ var apiLoader = AWS.apiLoader;
5
+
6
+ apiLoader.services['neptunedata'] = {};
7
+ AWS.Neptunedata = Service.defineService('neptunedata', ['2023-08-01']);
8
+ Object.defineProperty(apiLoader.services['neptunedata'], '2023-08-01', {
9
+ get: function get() {
10
+ var model = require('../apis/neptunedata-2023-08-01.min.json');
11
+ model.paginators = require('../apis/neptunedata-2023-08-01.paginators.json').pagination;
12
+ return model;
13
+ },
14
+ enumerable: true,
15
+ configurable: true
16
+ });
17
+
18
+ module.exports = AWS.Neptunedata;
@@ -52,11 +52,11 @@ declare class NetworkFirewall extends Service {
52
52
  */
53
53
  createRuleGroup(callback?: (err: AWSError, data: NetworkFirewall.Types.CreateRuleGroupResponse) => void): Request<NetworkFirewall.Types.CreateRuleGroupResponse, AWSError>;
54
54
  /**
55
- * Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains the Certificate Manager certificate references that Network Firewall uses to decrypt and re-encrypt inbound traffic. After you create a TLS inspection configuration, you associate it with a firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
55
+ * Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains the Certificate Manager certificate references that Network Firewall uses to decrypt and re-encrypt inbound traffic. After you create a TLS inspection configuration, you associate it with a new firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
56
56
  */
57
57
  createTLSInspectionConfiguration(params: NetworkFirewall.Types.CreateTLSInspectionConfigurationRequest, callback?: (err: AWSError, data: NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse, AWSError>;
58
58
  /**
59
- * Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains the Certificate Manager certificate references that Network Firewall uses to decrypt and re-encrypt inbound traffic. After you create a TLS inspection configuration, you associate it with a firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
59
+ * Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains the Certificate Manager certificate references that Network Firewall uses to decrypt and re-encrypt inbound traffic. After you create a TLS inspection configuration, you associate it with a new firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
60
60
  */
61
61
  createTLSInspectionConfiguration(callback?: (err: AWSError, data: NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse, AWSError>;
62
62
  /**
@@ -581,7 +581,7 @@ declare namespace NetworkFirewall {
581
581
  */
582
582
  TLSInspectionConfigurationName: ResourceName;
583
583
  /**
584
- * The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
584
+ * The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
585
585
  */
586
586
  TLSInspectionConfiguration: TLSInspectionConfiguration;
587
587
  /**
@@ -851,7 +851,7 @@ declare namespace NetworkFirewall {
851
851
  */
852
852
  UpdateToken: UpdateToken;
853
853
  /**
854
- * The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
854
+ * The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
855
855
  */
856
856
  TLSInspectionConfiguration?: TLSInspectionConfiguration;
857
857
  /**
@@ -1495,11 +1495,11 @@ declare namespace NetworkFirewall {
1495
1495
  export type RuleGroups = RuleGroupMetadata[];
1496
1496
  export interface RuleOption {
1497
1497
  /**
1498
- *
1498
+ * The keyword for the Suricata compatible rule option. You must include a sid (signature ID), and can optionally include other keywords. For information about Suricata compatible keywords, see Rule options in the Suricata documentation.
1499
1499
  */
1500
1500
  Keyword: Keyword;
1501
1501
  /**
1502
- *
1502
+ * The settings of the Suricata compatible rule option. Rule options have zero or more setting values, and the number of possible and required settings depends on the Keyword. For more information about the settings for specific options, see Rule options.
1503
1503
  */
1504
1504
  Settings?: Settings;
1505
1505
  }
@@ -1618,7 +1618,7 @@ declare namespace NetworkFirewall {
1618
1618
  }
1619
1619
  export interface StatefulRule {
1620
1620
  /**
1621
- * Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. The actions for a stateful rule are defined as follows: PASS - Permits the packets to go to the intended destination. DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. ALERT - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with ALERT action, verify in the logs that the rule is filtering as you want, then change the action to DROP. REJECT - Drops TCP traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a RST bit contained in the TCP header flags. Also sends an alert log mesage if alert logging is configured in the Firewall LoggingConfiguration. REJECT isn't currently available for use with IMAP and FTP protocols.
1621
+ * Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. The actions for a stateful rule are defined as follows: PASS - Permits the packets to go to the intended destination. DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. ALERT - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with ALERT action, verify in the logs that the rule is filtering as you want, then change the action to DROP.
1622
1622
  */
1623
1623
  Action: StatefulAction;
1624
1624
  /**
@@ -2001,7 +2001,7 @@ declare namespace NetworkFirewall {
2001
2001
  */
2002
2002
  FirewallPolicyName?: ResourceName;
2003
2003
  /**
2004
- * The updated firewall policy to use for the firewall.
2004
+ * The updated firewall policy to use for the firewall. You can't add or remove a TLSInspectionConfiguration after you create a firewall policy. However, you can replace an existing TLS inspection configuration with another TLSInspectionConfiguration.
2005
2005
  */
2006
2006
  FirewallPolicy: FirewallPolicy;
2007
2007
  /**
@@ -2150,7 +2150,7 @@ declare namespace NetworkFirewall {
2150
2150
  */
2151
2151
  TLSInspectionConfigurationName?: ResourceName;
2152
2152
  /**
2153
- * The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
2153
+ * The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
2154
2154
  */
2155
2155
  TLSInspectionConfiguration: TLSInspectionConfiguration;
2156
2156
  /**
@@ -590,11 +590,11 @@ declare class Omics extends Service {
590
590
  */
591
591
  startReferenceImportJob(callback?: (err: AWSError, data: Omics.Types.StartReferenceImportJobResponse) => void): Request<Omics.Types.StartReferenceImportJobResponse, AWSError>;
592
592
  /**
593
- * Starts a run.
593
+ * Starts a workflow run. To duplicate a run, specify the run's ID and a role ARN. The remaining parameters are copied from the previous run. The total number of runs in your account is subject to a quota per Region. To avoid needing to delete runs manually, you can set the retention mode to REMOVE. Runs with this setting are deleted automatically when the run quoata is exceeded.
594
594
  */
595
595
  startRun(params: Omics.Types.StartRunRequest, callback?: (err: AWSError, data: Omics.Types.StartRunResponse) => void): Request<Omics.Types.StartRunResponse, AWSError>;
596
596
  /**
597
- * Starts a run.
597
+ * Starts a workflow run. To duplicate a run, specify the run's ID and a role ARN. The remaining parameters are copied from the previous run. The total number of runs in your account is subject to a quota per Region. To avoid needing to delete runs manually, you can set the retention mode to REMOVE. Runs with this setting are deleted automatically when the run quoata is exceeded.
598
598
  */
599
599
  startRun(callback?: (err: AWSError, data: Omics.Types.StartRunResponse) => void): Request<Omics.Types.StartRunResponse, AWSError>;
600
600
  /**
@@ -2574,6 +2574,10 @@ declare namespace Omics {
2574
2574
  * The computational accelerator used to run the workflow.
2575
2575
  */
2576
2576
  accelerators?: Accelerators;
2577
+ /**
2578
+ * The run's retention mode.
2579
+ */
2580
+ retentionMode?: RunRetentionMode;
2577
2581
  }
2578
2582
  export type GetRunResponsePriorityInteger = number;
2579
2583
  export type GetRunResponseStorageCapacityInteger = number;
@@ -4185,6 +4189,7 @@ declare namespace Omics {
4185
4189
  export type RunResourceDigest = string;
4186
4190
  export type RunResourceDigestKey = string;
4187
4191
  export type RunResourceDigests = {[key: string]: RunResourceDigest};
4192
+ export type RunRetentionMode = "RETAIN"|"REMOVE"|string;
4188
4193
  export type RunRoleArn = string;
4189
4194
  export type RunStartedBy = string;
4190
4195
  export type RunStatus = "PENDING"|"STARTING"|"RUNNING"|"STOPPING"|"COMPLETED"|"DELETED"|"CANCELLED"|"FAILED"|string;
@@ -4590,11 +4595,11 @@ declare namespace Omics {
4590
4595
  */
4591
4596
  workflowId?: WorkflowId;
4592
4597
  /**
4593
- * The run's workflows type.
4598
+ * The run's workflow type.
4594
4599
  */
4595
4600
  workflowType?: WorkflowType;
4596
4601
  /**
4597
- * The run's ID.
4602
+ * The ID of a run to duplicate.
4598
4603
  */
4599
4604
  runId?: RunId;
4600
4605
  /**
@@ -4637,6 +4642,10 @@ declare namespace Omics {
4637
4642
  * To ensure that requests don't run multiple times, specify a unique ID for each request.
4638
4643
  */
4639
4644
  requestId: RunRequestId;
4645
+ /**
4646
+ * The retention mode for the run.
4647
+ */
4648
+ retentionMode?: RunRetentionMode;
4640
4649
  }
4641
4650
  export type StartRunRequestPriorityInteger = number;
4642
4651
  export type StartRunRequestStorageCapacityInteger = number;