aws-sdk 2.1481.0 → 2.1482.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,45 +1,37 @@
1
1
  {
2
- "version": 2,
3
- "waiters": {
4
- "ServerOffline": {
5
- "acceptors": [
6
- {
7
- "argument": "Server.State",
8
- "expected": "OFFLINE",
9
- "matcher": "path",
10
- "state": "success"
11
- },
12
- {
13
- "argument": "Server.State",
14
- "expected": "STOP_FAILED",
15
- "matcher": "path",
16
- "state": "failure"
17
- }
18
- ],
19
- "delay": 30,
20
- "maxAttempts": 120,
21
- "operation": "DescribeServer",
22
- "type": "api"
2
+ "version" : 2,
3
+ "waiters" : {
4
+ "ServerOffline" : {
5
+ "delay" : 30,
6
+ "maxAttempts" : 120,
7
+ "operation" : "DescribeServer",
8
+ "acceptors" : [ {
9
+ "matcher" : "path",
10
+ "argument" : "Server.State",
11
+ "state" : "success",
12
+ "expected" : "OFFLINE"
13
+ }, {
14
+ "matcher" : "path",
15
+ "argument" : "Server.State",
16
+ "state" : "failure",
17
+ "expected" : "STOP_FAILED"
18
+ } ]
23
19
  },
24
- "ServerOnline": {
25
- "acceptors": [
26
- {
27
- "argument": "Server.State",
28
- "expected": "ONLINE",
29
- "matcher": "path",
30
- "state": "success"
31
- },
32
- {
33
- "argument": "Server.State",
34
- "expected": "START_FAILED",
35
- "matcher": "path",
36
- "state": "failure"
37
- }
38
- ],
39
- "delay": 30,
40
- "maxAttempts": 120,
41
- "operation": "DescribeServer",
42
- "type": "api"
20
+ "ServerOnline" : {
21
+ "delay" : 30,
22
+ "maxAttempts" : 120,
23
+ "operation" : "DescribeServer",
24
+ "acceptors" : [ {
25
+ "matcher" : "path",
26
+ "argument" : "Server.State",
27
+ "state" : "success",
28
+ "expected" : "ONLINE"
29
+ }, {
30
+ "matcher" : "path",
31
+ "argument" : "Server.State",
32
+ "state" : "failure",
33
+ "expected" : "START_FAILED"
34
+ } ]
43
35
  }
44
36
  }
45
- }
37
+ }
@@ -986,7 +986,11 @@ declare namespace AppStream {
986
986
  /**
987
987
  * The desired number of streaming instances.
988
988
  */
989
- DesiredInstances: Integer;
989
+ DesiredInstances?: Integer;
990
+ /**
991
+ * The desired number of user sessions for a multi-session fleet. This is not allowed for single-session fleets. When you create a fleet, you must set either the DesiredSessions or DesiredInstances attribute, based on the type of fleet you create. You can’t define both attributes or leave both attributes blank.
992
+ */
993
+ DesiredSessions?: Integer;
990
994
  }
991
995
  export interface ComputeCapacityStatus {
992
996
  /**
@@ -1005,6 +1009,22 @@ declare namespace AppStream {
1005
1009
  * The number of currently available instances that can be used to stream sessions.
1006
1010
  */
1007
1011
  Available?: Integer;
1012
+ /**
1013
+ * The total number of sessions slots that are either running or pending. This represents the total number of concurrent streaming sessions your fleet can support in a steady state. DesiredUserSessionCapacity = ActualUserSessionCapacity + PendingUserSessionCapacity This only applies to multi-session fleets.
1014
+ */
1015
+ DesiredUserSessions?: Integer;
1016
+ /**
1017
+ * The number of idle session slots currently available for user sessions. AvailableUserSessionCapacity = ActualUserSessionCapacity - ActiveUserSessions This only applies to multi-session fleets.
1018
+ */
1019
+ AvailableUserSessions?: Integer;
1020
+ /**
1021
+ * The number of user sessions currently being used for streaming sessions. This only applies to multi-session fleets.
1022
+ */
1023
+ ActiveUserSessions?: Integer;
1024
+ /**
1025
+ * The total number of session slots that are available for streaming or are currently streaming. ActualUserSessionCapacity = AvailableUserSessionCapacity + ActiveUserSessions This only applies to multi-session fleets.
1026
+ */
1027
+ ActualUserSessions?: Integer;
1008
1028
  }
1009
1029
  export interface CopyImageRequest {
1010
1030
  /**
@@ -1266,7 +1286,7 @@ declare namespace AppStream {
1266
1286
  */
1267
1287
  VpcConfig?: VpcConfig;
1268
1288
  /**
1269
- * The maximum amount of time that a streaming session can remain active, in seconds. If users are still connected to a streaming instance five minutes before this limit is reached, they are prompted to save any open documents before being disconnected. After this time elapses, the instance is terminated and replaced by a new instance. Specify a value between 600 and 360000.
1289
+ * The maximum amount of time that a streaming session can remain active, in seconds. If users are still connected to a streaming instance five minutes before this limit is reached, they are prompted to save any open documents before being disconnected. After this time elapses, the instance is terminated and replaced by a new instance. Specify a value between 600 and 432000.
1270
1290
  */
1271
1291
  MaxUserDurationInSeconds?: Integer;
1272
1292
  /**
@@ -1321,6 +1341,10 @@ declare namespace AppStream {
1321
1341
  * The S3 location of the session scripts configuration zip file. This only applies to Elastic fleets.
1322
1342
  */
1323
1343
  SessionScriptS3Location?: S3Location;
1344
+ /**
1345
+ * The maximum number of user sessions on an instance. This only applies to multi-session fleets.
1346
+ */
1347
+ MaxSessionsPerInstance?: Integer;
1324
1348
  }
1325
1349
  export interface CreateFleetResult {
1326
1350
  /**
@@ -1974,11 +1998,11 @@ declare namespace AppStream {
1974
1998
  /**
1975
1999
  * The name of the stack. This value is case-sensitive.
1976
2000
  */
1977
- StackName: String;
2001
+ StackName: Name;
1978
2002
  /**
1979
2003
  * The name of the fleet. This value is case-sensitive.
1980
2004
  */
1981
- FleetName: String;
2005
+ FleetName: Name;
1982
2006
  /**
1983
2007
  * The user identifier (ID). If you specify a user ID, you must also specify the authentication type.
1984
2008
  */
@@ -1995,6 +2019,10 @@ declare namespace AppStream {
1995
2019
  * The authentication method. Specify API for a user authenticated using a streaming URL or SAML for a SAML federated user. The default is to authenticate users using a streaming URL.
1996
2020
  */
1997
2021
  AuthenticationType?: AuthenticationType;
2022
+ /**
2023
+ * The identifier for the instance hosting the session.
2024
+ */
2025
+ InstanceId?: String;
1998
2026
  }
1999
2027
  export interface DescribeSessionsResult {
2000
2028
  /**
@@ -2385,8 +2413,12 @@ declare namespace AppStream {
2385
2413
  * The S3 location of the session scripts configuration zip file. This only applies to Elastic fleets.
2386
2414
  */
2387
2415
  SessionScriptS3Location?: S3Location;
2416
+ /**
2417
+ * The maximum number of user sessions on an instance. This only applies to multi-session fleets.
2418
+ */
2419
+ MaxSessionsPerInstance?: Integer;
2388
2420
  }
2389
- export type FleetAttribute = "VPC_CONFIGURATION"|"VPC_CONFIGURATION_SECURITY_GROUP_IDS"|"DOMAIN_JOIN_INFO"|"IAM_ROLE_ARN"|"USB_DEVICE_FILTER_STRINGS"|"SESSION_SCRIPT_S3_LOCATION"|string;
2421
+ export type FleetAttribute = "VPC_CONFIGURATION"|"VPC_CONFIGURATION_SECURITY_GROUP_IDS"|"DOMAIN_JOIN_INFO"|"IAM_ROLE_ARN"|"USB_DEVICE_FILTER_STRINGS"|"SESSION_SCRIPT_S3_LOCATION"|"MAX_SESSIONS_PER_INSTANCE"|string;
2390
2422
  export type FleetAttributes = FleetAttribute[];
2391
2423
  export interface FleetError {
2392
2424
  /**
@@ -2794,6 +2826,10 @@ declare namespace AppStream {
2794
2826
  * The network details for the streaming session.
2795
2827
  */
2796
2828
  NetworkAccessConfiguration?: NetworkAccessConfiguration;
2829
+ /**
2830
+ * The identifier for the instance hosting the session.
2831
+ */
2832
+ InstanceId?: String;
2797
2833
  }
2798
2834
  export type SessionConnectionState = "CONNECTED"|"NOT_CONNECTED"|string;
2799
2835
  export type SessionList = Session[];
@@ -3151,7 +3187,7 @@ declare namespace AppStream {
3151
3187
  /**
3152
3188
  * A unique name for the fleet.
3153
3189
  */
3154
- Name?: String;
3190
+ Name?: Name;
3155
3191
  /**
3156
3192
  * The instance type to use when launching fleet instances. The following instance types are available: stream.standard.small stream.standard.medium stream.standard.large stream.standard.xlarge stream.standard.2xlarge stream.compute.large stream.compute.xlarge stream.compute.2xlarge stream.compute.4xlarge stream.compute.8xlarge stream.memory.large stream.memory.xlarge stream.memory.2xlarge stream.memory.4xlarge stream.memory.8xlarge stream.memory.z1d.large stream.memory.z1d.xlarge stream.memory.z1d.2xlarge stream.memory.z1d.3xlarge stream.memory.z1d.6xlarge stream.memory.z1d.12xlarge stream.graphics-design.large stream.graphics-design.xlarge stream.graphics-design.2xlarge stream.graphics-design.4xlarge stream.graphics-desktop.2xlarge stream.graphics.g4dn.xlarge stream.graphics.g4dn.2xlarge stream.graphics.g4dn.4xlarge stream.graphics.g4dn.8xlarge stream.graphics.g4dn.12xlarge stream.graphics.g4dn.16xlarge stream.graphics-pro.4xlarge stream.graphics-pro.8xlarge stream.graphics-pro.16xlarge The following instance types are available for Elastic fleets: stream.standard.small stream.standard.medium stream.standard.large stream.standard.xlarge stream.standard.2xlarge
3157
3193
  */
@@ -3224,6 +3260,10 @@ declare namespace AppStream {
3224
3260
  * The S3 location of the session scripts configuration zip file. This only applies to Elastic fleets.
3225
3261
  */
3226
3262
  SessionScriptS3Location?: S3Location;
3263
+ /**
3264
+ * The maximum number of user sessions on an instance. This only applies to multi-session fleets.
3265
+ */
3266
+ MaxSessionsPerInstance?: Integer;
3227
3267
  }
3228
3268
  export interface UpdateFleetResult {
3229
3269
  /**
package/clients/ec2.d.ts CHANGED
@@ -3572,6 +3572,14 @@ declare class EC2 extends Service {
3572
3572
  * Returns a quote and exchange information for exchanging one or more specified Convertible Reserved Instances for a new Convertible Reserved Instance. If the exchange cannot be performed, the reason is returned in the response. Use AcceptReservedInstancesExchangeQuote to perform the exchange.
3573
3573
  */
3574
3574
  getReservedInstancesExchangeQuote(callback?: (err: AWSError, data: EC2.Types.GetReservedInstancesExchangeQuoteResult) => void): Request<EC2.Types.GetReservedInstancesExchangeQuoteResult, AWSError>;
3575
+ /**
3576
+ * Gets security groups that can be associated by the Amazon Web Services account making the request with network interfaces in the specified VPC.
3577
+ */
3578
+ getSecurityGroupsForVpc(params: EC2.Types.GetSecurityGroupsForVpcRequest, callback?: (err: AWSError, data: EC2.Types.GetSecurityGroupsForVpcResult) => void): Request<EC2.Types.GetSecurityGroupsForVpcResult, AWSError>;
3579
+ /**
3580
+ * Gets security groups that can be associated by the Amazon Web Services account making the request with network interfaces in the specified VPC.
3581
+ */
3582
+ getSecurityGroupsForVpc(callback?: (err: AWSError, data: EC2.Types.GetSecurityGroupsForVpcResult) => void): Request<EC2.Types.GetSecurityGroupsForVpcResult, AWSError>;
3575
3583
  /**
3576
3584
  * Retrieves the access status of your account to the EC2 serial console of all instances. By default, access to the EC2 serial console is disabled for your account. For more information, see Manage account access to the EC2 serial console in the Amazon EC2 User Guide.
3577
3585
  */
@@ -21454,6 +21462,39 @@ declare namespace EC2 {
21454
21462
  */
21455
21463
  ValidationFailureReason?: String;
21456
21464
  }
21465
+ export interface GetSecurityGroupsForVpcRequest {
21466
+ /**
21467
+ * The VPC ID where the security group can be used.
21468
+ */
21469
+ VpcId: VpcId;
21470
+ /**
21471
+ * The token returned from a previous paginated request. Pagination continues from the end of the items returned by the previous request.
21472
+ */
21473
+ NextToken?: String;
21474
+ /**
21475
+ * The maximum number of items to return for this request. To get the next page of items, make another request with the token returned in the output. For more information, see Pagination.
21476
+ */
21477
+ MaxResults?: GetSecurityGroupsForVpcRequestMaxResults;
21478
+ /**
21479
+ * The filters. If using multiple filters, the results include security groups which match all filters. group-id: The security group ID. description: The security group's description. group-name: The security group name. owner-id: The security group owner ID. primary-vpc-id: The VPC ID in which the security group was created.
21480
+ */
21481
+ Filters?: FilterList;
21482
+ /**
21483
+ * Checks whether you have the required permissions for the action, without actually making the request, and provides an error response. If you have the required permissions, the error response is DryRunOperation. Otherwise, it is UnauthorizedOperation.
21484
+ */
21485
+ DryRun?: Boolean;
21486
+ }
21487
+ export type GetSecurityGroupsForVpcRequestMaxResults = number;
21488
+ export interface GetSecurityGroupsForVpcResult {
21489
+ /**
21490
+ * The token to include in another request to get the next page of items. This value is null when there are no more items to return.
21491
+ */
21492
+ NextToken?: String;
21493
+ /**
21494
+ * The security group that can be used by interfaces in the VPC.
21495
+ */
21496
+ SecurityGroupForVpcs?: SecurityGroupForVpcList;
21497
+ }
21457
21498
  export interface GetSerialConsoleAccessStatusRequest {
21458
21499
  /**
21459
21500
  * Checks whether you have the required permissions for the action, without actually making the request, and provides an error response. If you have the required permissions, the error response is DryRunOperation. Otherwise, it is UnauthorizedOperation.
@@ -33758,6 +33799,33 @@ declare namespace EC2 {
33758
33799
  */
33759
33800
  VpcId?: String;
33760
33801
  }
33802
+ export interface SecurityGroupForVpc {
33803
+ /**
33804
+ * The security group's description.
33805
+ */
33806
+ Description?: String;
33807
+ /**
33808
+ * The security group name.
33809
+ */
33810
+ GroupName?: String;
33811
+ /**
33812
+ * The security group owner ID.
33813
+ */
33814
+ OwnerId?: String;
33815
+ /**
33816
+ * The security group ID.
33817
+ */
33818
+ GroupId?: String;
33819
+ /**
33820
+ * The security group tags.
33821
+ */
33822
+ Tags?: TagList;
33823
+ /**
33824
+ * The VPC ID in which the security group was created.
33825
+ */
33826
+ PrimaryVpcId?: String;
33827
+ }
33828
+ export type SecurityGroupForVpcList = SecurityGroupForVpc[];
33761
33829
  export type SecurityGroupId = string;
33762
33830
  export type SecurityGroupIdList = SecurityGroupId[];
33763
33831
  export type SecurityGroupIdSet = SecurityGroupId[];
@@ -52,11 +52,11 @@ declare class NetworkFirewall extends Service {
52
52
  */
53
53
  createRuleGroup(callback?: (err: AWSError, data: NetworkFirewall.Types.CreateRuleGroupResponse) => void): Request<NetworkFirewall.Types.CreateRuleGroupResponse, AWSError>;
54
54
  /**
55
- * Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains the Certificate Manager certificate references that Network Firewall uses to decrypt and re-encrypt inbound traffic. After you create a TLS inspection configuration, you associate it with a new firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
55
+ * Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains the Certificate Manager certificate associations that Network Firewall uses to decrypt and re-encrypt traffic traveling through your firewall. After you create a TLS inspection configuration, you can associate it with a new firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
56
56
  */
57
57
  createTLSInspectionConfiguration(params: NetworkFirewall.Types.CreateTLSInspectionConfigurationRequest, callback?: (err: AWSError, data: NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse, AWSError>;
58
58
  /**
59
- * Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains the Certificate Manager certificate references that Network Firewall uses to decrypt and re-encrypt inbound traffic. After you create a TLS inspection configuration, you associate it with a new firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
59
+ * Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains the Certificate Manager certificate associations that Network Firewall uses to decrypt and re-encrypt traffic traveling through your firewall. After you create a TLS inspection configuration, you can associate it with a new firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
60
60
  */
61
61
  createTLSInspectionConfiguration(callback?: (err: AWSError, data: NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse, AWSError>;
62
62
  /**
@@ -292,11 +292,11 @@ declare class NetworkFirewall extends Service {
292
292
  */
293
293
  updateSubnetChangeProtection(callback?: (err: AWSError, data: NetworkFirewall.Types.UpdateSubnetChangeProtectionResponse) => void): Request<NetworkFirewall.Types.UpdateSubnetChangeProtectionResponse, AWSError>;
294
294
  /**
295
- * Updates the TLS inspection configuration settings for the specified TLS inspection configuration. You use a TLS inspection configuration by reference in one or more firewall policies. When you modify a TLS inspection configuration, you modify all firewall policies that use the TLS inspection configuration. To update a TLS inspection configuration, first call DescribeTLSInspectionConfiguration to retrieve the current TLSInspectionConfiguration object, update the object as needed, and then provide the updated object to this call.
295
+ * Updates the TLS inspection configuration settings for the specified TLS inspection configuration. You use a TLS inspection configuration by referencing it in one or more firewall policies. When you modify a TLS inspection configuration, you modify all firewall policies that use the TLS inspection configuration. To update a TLS inspection configuration, first call DescribeTLSInspectionConfiguration to retrieve the current TLSInspectionConfiguration object, update the object as needed, and then provide the updated object to this call.
296
296
  */
297
297
  updateTLSInspectionConfiguration(params: NetworkFirewall.Types.UpdateTLSInspectionConfigurationRequest, callback?: (err: AWSError, data: NetworkFirewall.Types.UpdateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.UpdateTLSInspectionConfigurationResponse, AWSError>;
298
298
  /**
299
- * Updates the TLS inspection configuration settings for the specified TLS inspection configuration. You use a TLS inspection configuration by reference in one or more firewall policies. When you modify a TLS inspection configuration, you modify all firewall policies that use the TLS inspection configuration. To update a TLS inspection configuration, first call DescribeTLSInspectionConfiguration to retrieve the current TLSInspectionConfiguration object, update the object as needed, and then provide the updated object to this call.
299
+ * Updates the TLS inspection configuration settings for the specified TLS inspection configuration. You use a TLS inspection configuration by referencing it in one or more firewall policies. When you modify a TLS inspection configuration, you modify all firewall policies that use the TLS inspection configuration. To update a TLS inspection configuration, first call DescribeTLSInspectionConfiguration to retrieve the current TLSInspectionConfiguration object, update the object as needed, and then provide the updated object to this call.
300
300
  */
301
301
  updateTLSInspectionConfiguration(callback?: (err: AWSError, data: NetworkFirewall.Types.UpdateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.UpdateTLSInspectionConfigurationResponse, AWSError>;
302
302
  }
@@ -433,6 +433,16 @@ declare namespace NetworkFirewall {
433
433
  CIDRs?: CIDRSummary;
434
434
  }
435
435
  export type Certificates = TlsCertificateData[];
436
+ export interface CheckCertificateRevocationStatusActions {
437
+ /**
438
+ * Configures how Network Firewall processes traffic when it determines that the certificate presented by the server in the SSL/TLS connection has a revoked status. PASS - Allow the connection to continue, and pass subsequent packets to the stateful engine for inspection. DROP - Network Firewall fails closed and drops all subsequent traffic. REJECT - Network Firewall sends a TCP reject packet back to your client so that the client can immediately establish a new session. Network Firewall then fails closed and drops all subsequent traffic. REJECT is available only for TCP traffic.
439
+ */
440
+ RevokedStatusAction?: RevocationCheckAction;
441
+ /**
442
+ * Configures how Network Firewall processes traffic when it determines that the certificate presented by the server in the SSL/TLS connection has an unknown status, or a status that cannot be determined for any other reason, including when the service is unable to connect to the OCSP and CRL endpoints for the certificate. PASS - Allow the connection to continue, and pass subsequent packets to the stateful engine for inspection. DROP - Network Firewall fails closed and drops all subsequent traffic. REJECT - Network Firewall sends a TCP reject packet back to your client so that the client can immediately establish a new session. Network Firewall then fails closed and drops all subsequent traffic. REJECT is available only for TCP traffic.
443
+ */
444
+ UnknownStatusAction?: RevocationCheckAction;
445
+ }
436
446
  export type CollectionMember_String = string;
437
447
  export type ConfigurationSyncState = "PENDING"|"IN_SYNC"|"CAPACITY_CONSTRAINED"|string;
438
448
  export interface CreateFirewallPolicyRequest {
@@ -581,7 +591,7 @@ declare namespace NetworkFirewall {
581
591
  */
582
592
  TLSInspectionConfigurationName: ResourceName;
583
593
  /**
584
- * The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
594
+ * The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect the traffic traveling through your firewalls. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
585
595
  */
586
596
  TLSInspectionConfiguration: TLSInspectionConfiguration;
587
597
  /**
@@ -851,7 +861,7 @@ declare namespace NetworkFirewall {
851
861
  */
852
862
  UpdateToken: UpdateToken;
853
863
  /**
854
- * The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
864
+ * The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect the traffic traveling through your firewalls. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
855
865
  */
856
866
  TLSInspectionConfiguration?: TLSInspectionConfiguration;
857
867
  /**
@@ -1393,7 +1403,8 @@ declare namespace NetworkFirewall {
1393
1403
  export type ResourceManagedStatus = "MANAGED"|"ACCOUNT"|string;
1394
1404
  export type ResourceManagedType = "AWS_MANAGED_THREAT_SIGNATURES"|"AWS_MANAGED_DOMAIN_LISTS"|string;
1395
1405
  export type ResourceName = string;
1396
- export type ResourceStatus = "ACTIVE"|"DELETING"|string;
1406
+ export type ResourceStatus = "ACTIVE"|"DELETING"|"ERROR"|string;
1407
+ export type RevocationCheckAction = "PASS"|"DROP"|"REJECT"|string;
1397
1408
  export type RuleCapacity = number;
1398
1409
  export interface RuleDefinition {
1399
1410
  /**
@@ -1552,19 +1563,27 @@ declare namespace NetworkFirewall {
1552
1563
  export type RulesString = string;
1553
1564
  export interface ServerCertificate {
1554
1565
  /**
1555
- * The Amazon Resource Name (ARN) of the Certificate Manager SSL/TLS server certificate.
1566
+ * The Amazon Resource Name (ARN) of the Certificate Manager SSL/TLS server certificate that's used for inbound SSL/TLS inspection.
1556
1567
  */
1557
1568
  ResourceArn?: ResourceArn;
1558
1569
  }
1559
1570
  export interface ServerCertificateConfiguration {
1560
1571
  /**
1561
- * The list of a server certificate configuration's Certificate Manager SSL/TLS certificates.
1572
+ * The list of a server certificate configuration's Certificate Manager certificates, used for inbound SSL/TLS inspection.
1562
1573
  */
1563
1574
  ServerCertificates?: ServerCertificates;
1564
1575
  /**
1565
- * A list of a server certificate configuration's scopes.
1576
+ * A list of scopes.
1566
1577
  */
1567
1578
  Scopes?: ServerCertificateScopes;
1579
+ /**
1580
+ * The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate configured in Certificate Manager (ACM) to use for outbound SSL/TLS inspection. The following limitations apply: You can use CA certificates that you imported into ACM, but you can't generate CA certificates with ACM. You can't use certificates issued by Private Certificate Authority. For more information about the certificate requirements for outbound inspection, see Requirements for using SSL/TLS certificates with TLS inspection configurations in the Network Firewall Developer Guide. For information about working with certificates in ACM, see Importing certificates in the Certificate Manager User Guide.
1581
+ */
1582
+ CertificateAuthorityArn?: ResourceArn;
1583
+ /**
1584
+ * When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status. If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To use this option, you must specify a CertificateAuthorityArn in ServerCertificateConfiguration.
1585
+ */
1586
+ CheckCertificateRevocationStatus?: CheckCertificateRevocationStatusActions;
1568
1587
  }
1569
1588
  export type ServerCertificateConfigurations = ServerCertificateConfiguration[];
1570
1589
  export interface ServerCertificateScope {
@@ -1788,6 +1807,7 @@ declare namespace NetworkFirewall {
1788
1807
  * A list of the certificates associated with the TLS inspection configuration.
1789
1808
  */
1790
1809
  Certificates?: Certificates;
1810
+ CertificateAuthority?: TlsCertificateData;
1791
1811
  }
1792
1812
  export type TLSInspectionConfigurations = TLSInspectionConfigurationMetadata[];
1793
1813
  export interface Tag {
@@ -2150,7 +2170,7 @@ declare namespace NetworkFirewall {
2150
2170
  */
2151
2171
  TLSInspectionConfigurationName?: ResourceName;
2152
2172
  /**
2153
- * The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Decrypting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
2173
+ * The object that defines a TLS inspection configuration. This, along with TLSInspectionConfigurationResponse, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling DescribeTLSInspectionConfiguration. Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination. To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect the traffic traveling through your firewalls. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
2154
2174
  */
2155
2175
  TLSInspectionConfiguration: TLSInspectionConfiguration;
2156
2176
  /**
@@ -260,11 +260,11 @@ declare class OpenSearch extends Service {
260
260
  */
261
261
  getCompatibleVersions(callback?: (err: AWSError, data: OpenSearch.Types.GetCompatibleVersionsResponse) => void): Request<OpenSearch.Types.GetCompatibleVersionsResponse, AWSError>;
262
262
  /**
263
- * Get the status of the maintenance action.
263
+ * The status of the maintenance action.
264
264
  */
265
265
  getDomainMaintenanceStatus(params: OpenSearch.Types.GetDomainMaintenanceStatusRequest, callback?: (err: AWSError, data: OpenSearch.Types.GetDomainMaintenanceStatusResponse) => void): Request<OpenSearch.Types.GetDomainMaintenanceStatusResponse, AWSError>;
266
266
  /**
267
- * Get the status of the maintenance action.
267
+ * The status of the maintenance action.
268
268
  */
269
269
  getDomainMaintenanceStatus(callback?: (err: AWSError, data: OpenSearch.Types.GetDomainMaintenanceStatusResponse) => void): Request<OpenSearch.Types.GetDomainMaintenanceStatusResponse, AWSError>;
270
270
  /**
@@ -292,11 +292,11 @@ declare class OpenSearch extends Service {
292
292
  */
293
293
  getUpgradeStatus(callback?: (err: AWSError, data: OpenSearch.Types.GetUpgradeStatusResponse) => void): Request<OpenSearch.Types.GetUpgradeStatusResponse, AWSError>;
294
294
  /**
295
- * Get the list of the maintenance action.
295
+ * A list of maintenance actions for the domain.
296
296
  */
297
297
  listDomainMaintenances(params: OpenSearch.Types.ListDomainMaintenancesRequest, callback?: (err: AWSError, data: OpenSearch.Types.ListDomainMaintenancesResponse) => void): Request<OpenSearch.Types.ListDomainMaintenancesResponse, AWSError>;
298
298
  /**
299
- * Get the list of the maintenance action.
299
+ * A list of maintenance actions for the domain.
300
300
  */
301
301
  listDomainMaintenances(callback?: (err: AWSError, data: OpenSearch.Types.ListDomainMaintenancesResponse) => void): Request<OpenSearch.Types.ListDomainMaintenancesResponse, AWSError>;
302
302
  /**
@@ -412,11 +412,11 @@ declare class OpenSearch extends Service {
412
412
  */
413
413
  revokeVpcEndpointAccess(callback?: (err: AWSError, data: OpenSearch.Types.RevokeVpcEndpointAccessResponse) => void): Request<OpenSearch.Types.RevokeVpcEndpointAccessResponse, AWSError>;
414
414
  /**
415
- * Starts the node maintenance (Node restart, Node reboot, Opensearch/Elasticsearch process restart, Dashboard/kibana restart) on the data node.
415
+ * Starts the node maintenance process on the data node. These processes can include a node reboot, an Opensearch or Elasticsearch process restart, or a Dashboard or Kibana restart.
416
416
  */
417
417
  startDomainMaintenance(params: OpenSearch.Types.StartDomainMaintenanceRequest, callback?: (err: AWSError, data: OpenSearch.Types.StartDomainMaintenanceResponse) => void): Request<OpenSearch.Types.StartDomainMaintenanceResponse, AWSError>;
418
418
  /**
419
- * Starts the node maintenance (Node restart, Node reboot, Opensearch/Elasticsearch process restart, Dashboard/kibana restart) on the data node.
419
+ * Starts the node maintenance process on the data node. These processes can include a node reboot, an Opensearch or Elasticsearch process restart, or a Dashboard or Kibana restart.
420
420
  */
421
421
  startDomainMaintenance(callback?: (err: AWSError, data: OpenSearch.Types.StartDomainMaintenanceResponse) => void): Request<OpenSearch.Types.StartDomainMaintenanceResponse, AWSError>;
422
422
  /**
@@ -1004,6 +1004,10 @@ declare namespace OpenSearch {
1004
1004
  * Identity and Access Management (IAM) policy document specifying the access policies for the new domain.
1005
1005
  */
1006
1006
  AccessPolicies?: PolicyDocument;
1007
+ /**
1008
+ * The type of IP addresses supported by the endpoint for the domain.
1009
+ */
1010
+ IPAddressType?: IPAddressType;
1007
1011
  /**
1008
1012
  * DEPRECATED. Container for the parameters required to configure automated snapshots of domain indexes.
1009
1013
  */
@@ -1611,6 +1615,10 @@ declare namespace OpenSearch {
1611
1615
  * Specifies the access policies for the domain.
1612
1616
  */
1613
1617
  AccessPolicies?: AccessPoliciesStatus;
1618
+ /**
1619
+ * The type of IP addresses supported by the endpoint for the domain.
1620
+ */
1621
+ IPAddressType?: IPAddressTypeStatus;
1614
1622
  /**
1615
1623
  * DEPRECATED. Container for parameters required to configure automated snapshots of domain indexes.
1616
1624
  */
@@ -1717,7 +1725,7 @@ declare namespace OpenSearch {
1717
1725
  }
1718
1726
  export interface DomainMaintenanceDetails {
1719
1727
  /**
1720
- * Id of the requested action.
1728
+ * The ID of the requested action.
1721
1729
  */
1722
1730
  MaintenanceId?: RequestId;
1723
1731
  /**
@@ -1729,7 +1737,7 @@ declare namespace OpenSearch {
1729
1737
  */
1730
1738
  Action?: MaintenanceType;
1731
1739
  /**
1732
- * Id of the data node.
1740
+ * The ID of the data node.
1733
1741
  */
1734
1742
  NodeId?: NodeId;
1735
1743
  /**
@@ -1737,15 +1745,15 @@ declare namespace OpenSearch {
1737
1745
  */
1738
1746
  Status?: MaintenanceStatus;
1739
1747
  /**
1740
- * The status message of the action.
1748
+ * The status message for the action.
1741
1749
  */
1742
1750
  StatusMessage?: MaintenanceStatusMessage;
1743
1751
  /**
1744
- * Contains time at which action created.
1752
+ * The time at which the action was created.
1745
1753
  */
1746
1754
  CreatedAt?: UpdateTimestamp;
1747
1755
  /**
1748
- * Contains time at which action updated.
1756
+ * The time at which the action was updated.
1749
1757
  */
1750
1758
  UpdatedAt?: UpdateTimestamp;
1751
1759
  }
@@ -1854,6 +1862,7 @@ declare namespace OpenSearch {
1854
1862
  * Domain-specific endpoint used to submit index, search, and data upload requests to the domain.
1855
1863
  */
1856
1864
  Endpoint?: ServiceUrl;
1865
+ EndpointV2?: ServiceUrl;
1857
1866
  /**
1858
1867
  * The key-value pair that exists if the OpenSearch Service domain uses VPC endpoints.. Example key, value: 'vpc','vpc-endpoint-h2dsd34efgyghrtguk5gt6j2foh4.us-east-1.es.amazonaws.com'.
1859
1868
  */
@@ -1882,6 +1891,10 @@ declare namespace OpenSearch {
1882
1891
  * Identity and Access Management (IAM) policy document specifying the access policies for the domain.
1883
1892
  */
1884
1893
  AccessPolicies?: PolicyDocument;
1894
+ /**
1895
+ * The type of IP addresses supported by the endpoint for the domain.
1896
+ */
1897
+ IPAddressType?: IPAddressType;
1885
1898
  /**
1886
1899
  * DEPRECATED. Container for parameters required to configure automated snapshots of domain indexes.
1887
1900
  */
@@ -2091,33 +2104,33 @@ declare namespace OpenSearch {
2091
2104
  */
2092
2105
  DomainName: DomainName;
2093
2106
  /**
2094
- * The request id of the maintenance action.
2107
+ * The request ID of the maintenance action.
2095
2108
  */
2096
2109
  MaintenanceId: RequestId;
2097
2110
  }
2098
2111
  export interface GetDomainMaintenanceStatusResponse {
2099
2112
  /**
2100
- * Contains status of the maintenance action.
2113
+ * The status of the maintenance action.
2101
2114
  */
2102
2115
  Status?: MaintenanceStatus;
2103
2116
  /**
2104
- * Contains status message of the maintenance action.
2117
+ * The status message of the maintenance action.
2105
2118
  */
2106
2119
  StatusMessage?: MaintenanceStatusMessage;
2107
2120
  /**
2108
- * Contains node id of maintenance action.
2121
+ * The node ID of the maintenance action.
2109
2122
  */
2110
2123
  NodeId?: NodeId;
2111
2124
  /**
2112
- * Contains action name.
2125
+ * The action name.
2113
2126
  */
2114
2127
  Action?: MaintenanceType;
2115
2128
  /**
2116
- * Contains time at which action created.
2129
+ * The time at which the action was created.
2117
2130
  */
2118
2131
  CreatedAt?: UpdateTimestamp;
2119
2132
  /**
2120
- * Contains time at which action updated.
2133
+ * The time at which the action was updated.
2121
2134
  */
2122
2135
  UpdatedAt?: UpdateTimestamp;
2123
2136
  }
@@ -2193,6 +2206,14 @@ declare namespace OpenSearch {
2193
2206
  */
2194
2207
  UpgradeName?: UpgradeName;
2195
2208
  }
2209
+ export type IPAddressType = "ipv4"|"dualstack"|string;
2210
+ export interface IPAddressTypeStatus {
2211
+ /**
2212
+ * The IP address options for the domain.
2213
+ */
2214
+ Options: IPAddressType;
2215
+ Status: OptionStatus;
2216
+ }
2196
2217
  export type IdentityPoolId = string;
2197
2218
  export interface InboundConnection {
2198
2219
  /**
@@ -2325,13 +2346,13 @@ declare namespace OpenSearch {
2325
2346
  */
2326
2347
  MaxResults?: MaxResults;
2327
2348
  /**
2328
- * If your initial ListDomainMaintenances operation returns a nextToken, you can include the returned nextToken in subsequent ListDomainMaintenances operations, which returns results in the next page.
2349
+ * If your initial ListDomainMaintenances operation returns a nextToken, include the returned nextToken in subsequent ListDomainMaintenances operations, which returns results in the next page.
2329
2350
  */
2330
2351
  NextToken?: NextToken;
2331
2352
  }
2332
2353
  export interface ListDomainMaintenancesResponse {
2333
2354
  /**
2334
- * List of the submitted maintenance actions.
2355
+ * A list of the submitted maintenance actions.
2335
2356
  */
2336
2357
  DomainMaintenances?: DomainMaintenanceList;
2337
2358
  /**
@@ -3199,13 +3220,13 @@ declare namespace OpenSearch {
3199
3220
  */
3200
3221
  Action: MaintenanceType;
3201
3222
  /**
3202
- * Id of the data node.
3223
+ * The ID of the data node.
3203
3224
  */
3204
3225
  NodeId?: NodeId;
3205
3226
  }
3206
3227
  export interface StartDomainMaintenanceResponse {
3207
3228
  /**
3208
- * Contains request id of requested action.
3229
+ * The request ID of requested action.
3209
3230
  */
3210
3231
  MaintenanceId?: RequestId;
3211
3232
  }
@@ -3313,6 +3334,10 @@ declare namespace OpenSearch {
3313
3334
  * Identity and Access Management (IAM) access policy as a JSON-formatted string.
3314
3335
  */
3315
3336
  AccessPolicies?: PolicyDocument;
3337
+ /**
3338
+ * The type of IP addresses supported by the endpoint for the domain.
3339
+ */
3340
+ IPAddressType?: IPAddressType;
3316
3341
  /**
3317
3342
  * Options to publish OpenSearch logs to Amazon CloudWatch Logs.
3318
3343
  */