aws-sdk 2.1446.0 → 2.1448.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +17 -1
- package/README.md +1 -1
- package/apis/appflow-2020-08-23.min.json +115 -87
- package/apis/auditmanager-2017-07-25.min.json +238 -63
- package/apis/cleanrooms-2022-02-17.min.json +70 -31
- package/apis/cognito-idp-2016-04-18.examples.json +849 -0
- package/apis/cognito-idp-2016-04-18.min.json +64 -24
- package/apis/datasync-2018-11-09.min.json +97 -14
- package/apis/metadata.json +7 -0
- package/apis/neptunedata-2023-08-01.examples.json +5 -0
- package/apis/neptunedata-2023-08-01.min.json +1923 -0
- package/apis/neptunedata-2023-08-01.paginators.json +4 -0
- package/apis/omics-2022-11-28.min.json +23 -21
- package/apis/pca-connector-ad-2018-05-10.examples.json +5 -0
- package/apis/pca-connector-ad-2018-05-10.min.json +1465 -0
- package/apis/pca-connector-ad-2018-05-10.paginators.json +34 -0
- package/apis/sagemaker-2017-07-24.min.json +739 -728
- package/apis/sesv2-2019-09-27.examples.json +244 -0
- package/apis/sesv2-2019-09-27.min.json +491 -153
- package/apis/sesv2-2019-09-27.paginators.json +5 -0
- package/clients/all.d.ts +2 -0
- package/clients/all.js +3 -1
- package/clients/appflow.d.ts +30 -0
- package/clients/apprunner.d.ts +5 -5
- package/clients/cleanrooms.d.ts +41 -5
- package/clients/cognitoidentityserviceprovider.d.ts +5 -5
- package/clients/datasync.d.ts +144 -21
- package/clients/fsx.d.ts +28 -28
- package/clients/neptunedata.d.ts +1976 -0
- package/clients/neptunedata.js +18 -0
- package/clients/networkfirewall.d.ts +9 -9
- package/clients/omics.d.ts +13 -4
- package/clients/pcaconnectorad.d.ts +1606 -0
- package/clients/pcaconnectorad.js +18 -0
- package/clients/sagemaker.d.ts +21 -1
- package/clients/sesv2.d.ts +374 -3
- package/dist/aws-sdk-core-react-native.js +2 -2
- package/dist/aws-sdk-react-native.js +87 -13
- package/dist/aws-sdk.js +74 -27
- package/dist/aws-sdk.min.js +85 -85
- package/lib/config_service_placeholders.d.ts +4 -0
- package/lib/core.js +1 -1
- package/package.json +1 -1
@@ -0,0 +1,18 @@
|
|
1
|
+
require('../lib/node_loader');
|
2
|
+
var AWS = require('../lib/core');
|
3
|
+
var Service = AWS.Service;
|
4
|
+
var apiLoader = AWS.apiLoader;
|
5
|
+
|
6
|
+
apiLoader.services['neptunedata'] = {};
|
7
|
+
AWS.Neptunedata = Service.defineService('neptunedata', ['2023-08-01']);
|
8
|
+
Object.defineProperty(apiLoader.services['neptunedata'], '2023-08-01', {
|
9
|
+
get: function get() {
|
10
|
+
var model = require('../apis/neptunedata-2023-08-01.min.json');
|
11
|
+
model.paginators = require('../apis/neptunedata-2023-08-01.paginators.json').pagination;
|
12
|
+
return model;
|
13
|
+
},
|
14
|
+
enumerable: true,
|
15
|
+
configurable: true
|
16
|
+
});
|
17
|
+
|
18
|
+
module.exports = AWS.Neptunedata;
|
@@ -52,11 +52,11 @@ declare class NetworkFirewall extends Service {
|
|
52
52
|
*/
|
53
53
|
createRuleGroup(callback?: (err: AWSError, data: NetworkFirewall.Types.CreateRuleGroupResponse) => void): Request<NetworkFirewall.Types.CreateRuleGroupResponse, AWSError>;
|
54
54
|
/**
|
55
|
-
* Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains the Certificate Manager certificate references that Network Firewall uses to decrypt and re-encrypt inbound traffic. After you create a TLS inspection configuration, you associate it with a firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
55
|
+
* Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains the Certificate Manager certificate references that Network Firewall uses to decrypt and re-encrypt inbound traffic. After you create a TLS inspection configuration, you associate it with a new firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
56
56
|
*/
|
57
57
|
createTLSInspectionConfiguration(params: NetworkFirewall.Types.CreateTLSInspectionConfigurationRequest, callback?: (err: AWSError, data: NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse, AWSError>;
|
58
58
|
/**
|
59
|
-
* Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains the Certificate Manager certificate references that Network Firewall uses to decrypt and re-encrypt inbound traffic. After you create a TLS inspection configuration, you associate it with a firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
59
|
+
* Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains the Certificate Manager certificate references that Network Firewall uses to decrypt and re-encrypt inbound traffic. After you create a TLS inspection configuration, you associate it with a new firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
60
60
|
*/
|
61
61
|
createTLSInspectionConfiguration(callback?: (err: AWSError, data: NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse, AWSError>;
|
62
62
|
/**
|
@@ -581,7 +581,7 @@ declare namespace NetworkFirewall {
|
|
581
581
|
*/
|
582
582
|
TLSInspectionConfigurationName: ResourceName;
|
583
583
|
/**
|
584
|
-
* The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
584
|
+
* The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
585
585
|
*/
|
586
586
|
TLSInspectionConfiguration: TLSInspectionConfiguration;
|
587
587
|
/**
|
@@ -851,7 +851,7 @@ declare namespace NetworkFirewall {
|
|
851
851
|
*/
|
852
852
|
UpdateToken: UpdateToken;
|
853
853
|
/**
|
854
|
-
* The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
854
|
+
* The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
855
855
|
*/
|
856
856
|
TLSInspectionConfiguration?: TLSInspectionConfiguration;
|
857
857
|
/**
|
@@ -1495,11 +1495,11 @@ declare namespace NetworkFirewall {
|
|
1495
1495
|
export type RuleGroups = RuleGroupMetadata[];
|
1496
1496
|
export interface RuleOption {
|
1497
1497
|
/**
|
1498
|
-
*
|
1498
|
+
* The keyword for the Suricata compatible rule option. You must include a sid (signature ID), and can optionally include other keywords. For information about Suricata compatible keywords, see Rule options in the Suricata documentation.
|
1499
1499
|
*/
|
1500
1500
|
Keyword: Keyword;
|
1501
1501
|
/**
|
1502
|
-
*
|
1502
|
+
* The settings of the Suricata compatible rule option. Rule options have zero or more setting values, and the number of possible and required settings depends on the Keyword. For more information about the settings for specific options, see Rule options.
|
1503
1503
|
*/
|
1504
1504
|
Settings?: Settings;
|
1505
1505
|
}
|
@@ -1618,7 +1618,7 @@ declare namespace NetworkFirewall {
|
|
1618
1618
|
}
|
1619
1619
|
export interface StatefulRule {
|
1620
1620
|
/**
|
1621
|
-
* Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. The actions for a stateful rule are defined as follows: PASS - Permits the packets to go to the intended destination. DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. ALERT - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with ALERT action, verify in the logs that the rule is filtering as you want, then change the action to DROP.
|
1621
|
+
* Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. The actions for a stateful rule are defined as follows: PASS - Permits the packets to go to the intended destination. DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. ALERT - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with ALERT action, verify in the logs that the rule is filtering as you want, then change the action to DROP.
|
1622
1622
|
*/
|
1623
1623
|
Action: StatefulAction;
|
1624
1624
|
/**
|
@@ -2001,7 +2001,7 @@ declare namespace NetworkFirewall {
|
|
2001
2001
|
*/
|
2002
2002
|
FirewallPolicyName?: ResourceName;
|
2003
2003
|
/**
|
2004
|
-
* The updated firewall policy to use for the firewall.
|
2004
|
+
* The updated firewall policy to use for the firewall. You can't add or remove a TLSInspectionConfiguration after you create a firewall policy. However, you can replace an existing TLS inspection configuration with another TLSInspectionConfiguration.
|
2005
2005
|
*/
|
2006
2006
|
FirewallPolicy: FirewallPolicy;
|
2007
2007
|
/**
|
@@ -2150,7 +2150,7 @@ declare namespace NetworkFirewall {
|
|
2150
2150
|
*/
|
2151
2151
|
TLSInspectionConfigurationName?: ResourceName;
|
2152
2152
|
/**
|
2153
|
-
* The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
2153
|
+
* The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
2154
2154
|
*/
|
2155
2155
|
TLSInspectionConfiguration: TLSInspectionConfiguration;
|
2156
2156
|
/**
|
package/clients/omics.d.ts
CHANGED
@@ -590,11 +590,11 @@ declare class Omics extends Service {
|
|
590
590
|
*/
|
591
591
|
startReferenceImportJob(callback?: (err: AWSError, data: Omics.Types.StartReferenceImportJobResponse) => void): Request<Omics.Types.StartReferenceImportJobResponse, AWSError>;
|
592
592
|
/**
|
593
|
-
* Starts a run.
|
593
|
+
* Starts a workflow run. To duplicate a run, specify the run's ID and a role ARN. The remaining parameters are copied from the previous run. The total number of runs in your account is subject to a quota per Region. To avoid needing to delete runs manually, you can set the retention mode to REMOVE. Runs with this setting are deleted automatically when the run quoata is exceeded.
|
594
594
|
*/
|
595
595
|
startRun(params: Omics.Types.StartRunRequest, callback?: (err: AWSError, data: Omics.Types.StartRunResponse) => void): Request<Omics.Types.StartRunResponse, AWSError>;
|
596
596
|
/**
|
597
|
-
* Starts a run.
|
597
|
+
* Starts a workflow run. To duplicate a run, specify the run's ID and a role ARN. The remaining parameters are copied from the previous run. The total number of runs in your account is subject to a quota per Region. To avoid needing to delete runs manually, you can set the retention mode to REMOVE. Runs with this setting are deleted automatically when the run quoata is exceeded.
|
598
598
|
*/
|
599
599
|
startRun(callback?: (err: AWSError, data: Omics.Types.StartRunResponse) => void): Request<Omics.Types.StartRunResponse, AWSError>;
|
600
600
|
/**
|
@@ -2574,6 +2574,10 @@ declare namespace Omics {
|
|
2574
2574
|
* The computational accelerator used to run the workflow.
|
2575
2575
|
*/
|
2576
2576
|
accelerators?: Accelerators;
|
2577
|
+
/**
|
2578
|
+
* The run's retention mode.
|
2579
|
+
*/
|
2580
|
+
retentionMode?: RunRetentionMode;
|
2577
2581
|
}
|
2578
2582
|
export type GetRunResponsePriorityInteger = number;
|
2579
2583
|
export type GetRunResponseStorageCapacityInteger = number;
|
@@ -4185,6 +4189,7 @@ declare namespace Omics {
|
|
4185
4189
|
export type RunResourceDigest = string;
|
4186
4190
|
export type RunResourceDigestKey = string;
|
4187
4191
|
export type RunResourceDigests = {[key: string]: RunResourceDigest};
|
4192
|
+
export type RunRetentionMode = "RETAIN"|"REMOVE"|string;
|
4188
4193
|
export type RunRoleArn = string;
|
4189
4194
|
export type RunStartedBy = string;
|
4190
4195
|
export type RunStatus = "PENDING"|"STARTING"|"RUNNING"|"STOPPING"|"COMPLETED"|"DELETED"|"CANCELLED"|"FAILED"|string;
|
@@ -4590,11 +4595,11 @@ declare namespace Omics {
|
|
4590
4595
|
*/
|
4591
4596
|
workflowId?: WorkflowId;
|
4592
4597
|
/**
|
4593
|
-
* The run's
|
4598
|
+
* The run's workflow type.
|
4594
4599
|
*/
|
4595
4600
|
workflowType?: WorkflowType;
|
4596
4601
|
/**
|
4597
|
-
* The run
|
4602
|
+
* The ID of a run to duplicate.
|
4598
4603
|
*/
|
4599
4604
|
runId?: RunId;
|
4600
4605
|
/**
|
@@ -4637,6 +4642,10 @@ declare namespace Omics {
|
|
4637
4642
|
* To ensure that requests don't run multiple times, specify a unique ID for each request.
|
4638
4643
|
*/
|
4639
4644
|
requestId: RunRequestId;
|
4645
|
+
/**
|
4646
|
+
* The retention mode for the run.
|
4647
|
+
*/
|
4648
|
+
retentionMode?: RunRetentionMode;
|
4640
4649
|
}
|
4641
4650
|
export type StartRunRequestPriorityInteger = number;
|
4642
4651
|
export type StartRunRequestStorageCapacityInteger = number;
|