aws-sdk 2.1447.0 → 2.1449.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +27 -1
- package/README.md +1 -1
- package/apis/appflow-2020-08-23.min.json +115 -87
- package/apis/auditmanager-2017-07-25.min.json +238 -63
- package/apis/chime-sdk-media-pipelines-2021-07-15.min.json +39 -21
- package/apis/cleanrooms-2022-02-17.min.json +70 -31
- package/apis/cloudhsm-2014-05-30.min.json +60 -20
- package/apis/connectcampaigns-2021-01-30.min.json +103 -90
- package/apis/connectparticipant-2018-09-07.min.json +62 -0
- package/apis/customer-profiles-2020-08-15.min.json +269 -118
- package/apis/datasync-2018-11-09.min.json +97 -14
- package/apis/grafana-2020-08-18.min.json +2 -1
- package/apis/health-2016-08-04.min.json +116 -34
- package/apis/kafkaconnect-2021-09-14.min.json +38 -36
- package/apis/metadata.json +7 -0
- package/apis/neptunedata-2023-08-01.examples.json +5 -0
- package/apis/neptunedata-2023-08-01.min.json +1923 -0
- package/apis/neptunedata-2023-08-01.paginators.json +4 -0
- package/apis/payment-cryptography-data-2022-02-03.min.json +29 -16
- package/apis/pca-connector-ad-2018-05-10.examples.json +5 -0
- package/apis/pca-connector-ad-2018-05-10.min.json +1465 -0
- package/apis/pca-connector-ad-2018-05-10.paginators.json +34 -0
- package/apis/runtime.sagemaker-2017-05-13.min.json +104 -0
- package/apis/sagemaker-2017-07-24.min.json +739 -728
- package/clients/all.d.ts +2 -0
- package/clients/all.js +3 -1
- package/clients/appflow.d.ts +30 -0
- package/clients/apprunner.d.ts +5 -5
- package/clients/chimesdkmediapipelines.d.ts +28 -2
- package/clients/cleanrooms.d.ts +41 -5
- package/clients/cloudwatchevents.d.ts +2 -2
- package/clients/connectcampaigns.d.ts +30 -23
- package/clients/connectparticipant.d.ts +71 -2
- package/clients/customerprofiles.d.ts +56 -52
- package/clients/datasync.d.ts +144 -21
- package/clients/ecs.d.ts +14 -14
- package/clients/health.d.ts +86 -2
- package/clients/ivs.d.ts +4 -4
- package/clients/kafkaconnect.d.ts +6 -8
- package/clients/neptunedata.d.ts +1976 -0
- package/clients/neptunedata.js +18 -0
- package/clients/networkfirewall.d.ts +9 -9
- package/clients/paymentcryptographydata.d.ts +8 -6
- package/clients/pcaconnectorad.d.ts +1606 -0
- package/clients/pcaconnectorad.js +18 -0
- package/clients/sagemaker.d.ts +21 -1
- package/clients/sagemakerruntime.d.ts +86 -8
- package/dist/aws-sdk-core-react-native.js +2 -2
- package/dist/aws-sdk-react-native.js +93 -19
- package/dist/aws-sdk.js +70 -23
- package/dist/aws-sdk.min.js +89 -89
- package/lib/config_service_placeholders.d.ts +4 -0
- package/lib/core.js +1 -1
- package/package.json +1 -1
@@ -0,0 +1,18 @@
|
|
1
|
+
require('../lib/node_loader');
|
2
|
+
var AWS = require('../lib/core');
|
3
|
+
var Service = AWS.Service;
|
4
|
+
var apiLoader = AWS.apiLoader;
|
5
|
+
|
6
|
+
apiLoader.services['neptunedata'] = {};
|
7
|
+
AWS.Neptunedata = Service.defineService('neptunedata', ['2023-08-01']);
|
8
|
+
Object.defineProperty(apiLoader.services['neptunedata'], '2023-08-01', {
|
9
|
+
get: function get() {
|
10
|
+
var model = require('../apis/neptunedata-2023-08-01.min.json');
|
11
|
+
model.paginators = require('../apis/neptunedata-2023-08-01.paginators.json').pagination;
|
12
|
+
return model;
|
13
|
+
},
|
14
|
+
enumerable: true,
|
15
|
+
configurable: true
|
16
|
+
});
|
17
|
+
|
18
|
+
module.exports = AWS.Neptunedata;
|
@@ -52,11 +52,11 @@ declare class NetworkFirewall extends Service {
|
|
52
52
|
*/
|
53
53
|
createRuleGroup(callback?: (err: AWSError, data: NetworkFirewall.Types.CreateRuleGroupResponse) => void): Request<NetworkFirewall.Types.CreateRuleGroupResponse, AWSError>;
|
54
54
|
/**
|
55
|
-
* Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains the Certificate Manager certificate references that Network Firewall uses to decrypt and re-encrypt inbound traffic. After you create a TLS inspection configuration, you associate it with a firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
55
|
+
* Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains the Certificate Manager certificate references that Network Firewall uses to decrypt and re-encrypt inbound traffic. After you create a TLS inspection configuration, you associate it with a new firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
56
56
|
*/
|
57
57
|
createTLSInspectionConfiguration(params: NetworkFirewall.Types.CreateTLSInspectionConfigurationRequest, callback?: (err: AWSError, data: NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse, AWSError>;
|
58
58
|
/**
|
59
|
-
* Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains the Certificate Manager certificate references that Network Firewall uses to decrypt and re-encrypt inbound traffic. After you create a TLS inspection configuration, you associate it with a firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
59
|
+
* Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains the Certificate Manager certificate references that Network Firewall uses to decrypt and re-encrypt inbound traffic. After you create a TLS inspection configuration, you associate it with a new firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
60
60
|
*/
|
61
61
|
createTLSInspectionConfiguration(callback?: (err: AWSError, data: NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse, AWSError>;
|
62
62
|
/**
|
@@ -581,7 +581,7 @@ declare namespace NetworkFirewall {
|
|
581
581
|
*/
|
582
582
|
TLSInspectionConfigurationName: ResourceName;
|
583
583
|
/**
|
584
|
-
* The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
584
|
+
* The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
585
585
|
*/
|
586
586
|
TLSInspectionConfiguration: TLSInspectionConfiguration;
|
587
587
|
/**
|
@@ -851,7 +851,7 @@ declare namespace NetworkFirewall {
|
|
851
851
|
*/
|
852
852
|
UpdateToken: UpdateToken;
|
853
853
|
/**
|
854
|
-
* The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
854
|
+
* The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
855
855
|
*/
|
856
856
|
TLSInspectionConfiguration?: TLSInspectionConfiguration;
|
857
857
|
/**
|
@@ -1495,11 +1495,11 @@ declare namespace NetworkFirewall {
|
|
1495
1495
|
export type RuleGroups = RuleGroupMetadata[];
|
1496
1496
|
export interface RuleOption {
|
1497
1497
|
/**
|
1498
|
-
*
|
1498
|
+
* The keyword for the Suricata compatible rule option. You must include a sid (signature ID), and can optionally include other keywords. For information about Suricata compatible keywords, see Rule options in the Suricata documentation.
|
1499
1499
|
*/
|
1500
1500
|
Keyword: Keyword;
|
1501
1501
|
/**
|
1502
|
-
*
|
1502
|
+
* The settings of the Suricata compatible rule option. Rule options have zero or more setting values, and the number of possible and required settings depends on the Keyword. For more information about the settings for specific options, see Rule options.
|
1503
1503
|
*/
|
1504
1504
|
Settings?: Settings;
|
1505
1505
|
}
|
@@ -1618,7 +1618,7 @@ declare namespace NetworkFirewall {
|
|
1618
1618
|
}
|
1619
1619
|
export interface StatefulRule {
|
1620
1620
|
/**
|
1621
|
-
* Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. The actions for a stateful rule are defined as follows: PASS - Permits the packets to go to the intended destination. DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. ALERT - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with ALERT action, verify in the logs that the rule is filtering as you want, then change the action to DROP.
|
1621
|
+
* Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. The actions for a stateful rule are defined as follows: PASS - Permits the packets to go to the intended destination. DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. ALERT - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with ALERT action, verify in the logs that the rule is filtering as you want, then change the action to DROP.
|
1622
1622
|
*/
|
1623
1623
|
Action: StatefulAction;
|
1624
1624
|
/**
|
@@ -2001,7 +2001,7 @@ declare namespace NetworkFirewall {
|
|
2001
2001
|
*/
|
2002
2002
|
FirewallPolicyName?: ResourceName;
|
2003
2003
|
/**
|
2004
|
-
* The updated firewall policy to use for the firewall.
|
2004
|
+
* The updated firewall policy to use for the firewall. You can't add or remove a TLSInspectionConfiguration after you create a firewall policy. However, you can replace an existing TLS inspection configuration with another TLSInspectionConfiguration.
|
2005
2005
|
*/
|
2006
2006
|
FirewallPolicy: FirewallPolicy;
|
2007
2007
|
/**
|
@@ -2150,7 +2150,7 @@ declare namespace NetworkFirewall {
|
|
2150
2150
|
*/
|
2151
2151
|
TLSInspectionConfigurationName?: ResourceName;
|
2152
2152
|
/**
|
2153
|
-
* The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
2153
|
+
* The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
2154
2154
|
*/
|
2155
2155
|
TLSInspectionConfiguration: TLSInspectionConfiguration;
|
2156
2156
|
/**
|
@@ -390,7 +390,7 @@ declare namespace PaymentCryptographyData {
|
|
390
390
|
/**
|
391
391
|
* The key check value (KCV) of the encryption key. The KCV is used to check if all parties holding a given key have the same key or to detect that a key has changed. Amazon Web Services Payment Cryptography calculates the KCV by using standard algorithms, typically by encrypting 8 or 16 bytes or "00" or "01" and then truncating the result to the first 3 bytes, or 6 hex digits, of the resulting cryptogram.
|
392
392
|
*/
|
393
|
-
KeyCheckValue
|
393
|
+
KeyCheckValue?: KeyCheckValue;
|
394
394
|
}
|
395
395
|
export interface EncryptionDecryptionAttributes {
|
396
396
|
Asymmetric?: AsymmetricEncryptionAttributes;
|
@@ -449,7 +449,7 @@ declare namespace PaymentCryptographyData {
|
|
449
449
|
/**
|
450
450
|
* The data for which a MAC is under generation.
|
451
451
|
*/
|
452
|
-
MessageData:
|
452
|
+
MessageData: HexEvenLengthBetween2And4096;
|
453
453
|
}
|
454
454
|
export interface GenerateMacOutput {
|
455
455
|
/**
|
@@ -517,8 +517,11 @@ declare namespace PaymentCryptographyData {
|
|
517
517
|
*/
|
518
518
|
PinData: PinData;
|
519
519
|
}
|
520
|
+
export type HexEvenLengthBetween16And32 = string;
|
520
521
|
export type HexEvenLengthBetween16And4064 = string;
|
521
522
|
export type HexEvenLengthBetween16And4096 = string;
|
523
|
+
export type HexEvenLengthBetween2And4096 = string;
|
524
|
+
export type HexEvenLengthBetween4And128 = string;
|
522
525
|
export type HexLength16Or32 = string;
|
523
526
|
export type HexLengthBetween10And24 = string;
|
524
527
|
export type HexLengthBetween16And32 = string;
|
@@ -526,7 +529,6 @@ declare namespace PaymentCryptographyData {
|
|
526
529
|
export type HexLengthBetween2And1024 = string;
|
527
530
|
export type HexLengthBetween2And160 = string;
|
528
531
|
export type HexLengthBetween2And4 = string;
|
529
|
-
export type HexLengthBetween2And4096 = string;
|
530
532
|
export type HexLengthBetween2And8 = string;
|
531
533
|
export type HexLengthBetween4And128 = string;
|
532
534
|
export type HexLengthEquals1 = string;
|
@@ -898,7 +900,7 @@ declare namespace PaymentCryptographyData {
|
|
898
900
|
/**
|
899
901
|
* The encrypted PIN block data that Amazon Web Services Payment Cryptography translates.
|
900
902
|
*/
|
901
|
-
EncryptedPinBlock:
|
903
|
+
EncryptedPinBlock: HexEvenLengthBetween16And32;
|
902
904
|
/**
|
903
905
|
* The attributes and values to use for incoming DUKPT encryption key for PIN block tranlation.
|
904
906
|
*/
|
@@ -1040,7 +1042,7 @@ declare namespace PaymentCryptographyData {
|
|
1040
1042
|
/**
|
1041
1043
|
* The MAC being verified.
|
1042
1044
|
*/
|
1043
|
-
Mac:
|
1045
|
+
Mac: HexEvenLengthBetween4And128;
|
1044
1046
|
/**
|
1045
1047
|
* The length of the MAC.
|
1046
1048
|
*/
|
@@ -1048,7 +1050,7 @@ declare namespace PaymentCryptographyData {
|
|
1048
1050
|
/**
|
1049
1051
|
* The data on for which MAC is under verification.
|
1050
1052
|
*/
|
1051
|
-
MessageData:
|
1053
|
+
MessageData: HexEvenLengthBetween2And4096;
|
1052
1054
|
/**
|
1053
1055
|
* The attributes and data values to use for MAC verification within Amazon Web Services Payment Cryptography.
|
1054
1056
|
*/
|