aws-sdk 2.1503.0 → 2.1505.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (41) hide show
  1. package/CHANGELOG.md +15 -1
  2. package/README.md +1 -1
  3. package/apis/appsync-2017-07-25.min.json +141 -6
  4. package/apis/b2bi-2022-06-23.examples.json +714 -0
  5. package/apis/b2bi-2022-06-23.min.json +1095 -0
  6. package/apis/b2bi-2022-06-23.paginators.json +28 -0
  7. package/apis/backup-2018-11-15.min.json +855 -84
  8. package/apis/backup-2018-11-15.paginators.json +18 -0
  9. package/apis/controltower-2018-05-10.min.json +80 -12
  10. package/apis/elasticache-2015-02-02.min.json +481 -132
  11. package/apis/elasticache-2015-02-02.paginators.json +12 -0
  12. package/apis/elasticfilesystem-2015-02-01.min.json +66 -32
  13. package/apis/fis-2020-12-01.min.json +366 -15
  14. package/apis/fis-2020-12-01.paginators.json +10 -0
  15. package/apis/metadata.json +3 -0
  16. package/apis/securityhub-2018-10-26.examples.json +433 -8
  17. package/apis/securityhub-2018-10-26.min.json +790 -336
  18. package/apis/securityhub-2018-10-26.paginators.json +12 -0
  19. package/apis/transcribe-2017-10-26.min.json +257 -70
  20. package/apis/transcribe-2017-10-26.paginators.json +5 -0
  21. package/clients/all.d.ts +1 -0
  22. package/clients/all.js +2 -1
  23. package/clients/appsync.d.ts +169 -0
  24. package/clients/b2bi.d.ts +1388 -0
  25. package/clients/b2bi.js +18 -0
  26. package/clients/backup.d.ts +848 -45
  27. package/clients/controltower.d.ts +103 -47
  28. package/clients/efs.d.ts +42 -9
  29. package/clients/elasticache.d.ts +484 -12
  30. package/clients/fis.d.ts +383 -3
  31. package/clients/glue.d.ts +3 -3
  32. package/clients/rds.d.ts +80 -80
  33. package/clients/securityhub.d.ts +603 -13
  34. package/clients/transcribeservice.d.ts +301 -45
  35. package/dist/aws-sdk-core-react-native.js +2 -2
  36. package/dist/aws-sdk-react-native.js +54 -17
  37. package/dist/aws-sdk.js +565 -167
  38. package/dist/aws-sdk.min.js +60 -60
  39. package/lib/config_service_placeholders.d.ts +2 -0
  40. package/lib/core.js +1 -1
  41. package/package.json +1 -1
@@ -208,6 +208,57 @@
208
208
  "title": "To update one ore more automation rules"
209
209
  }
210
210
  ],
211
+ "BatchGetConfigurationPolicyAssociations": [
212
+ {
213
+ "input": {
214
+ "ConfigurationPolicyAssociationIdentifiers": [
215
+ {
216
+ "Target": {
217
+ "AccountId": "111122223333"
218
+ }
219
+ },
220
+ {
221
+ "Target": {
222
+ "RootId": "r-f6g7h8i9j0example"
223
+ }
224
+ }
225
+ ]
226
+ },
227
+ "output": {
228
+ "ConfigurationPolicyAssociations": [
229
+ {
230
+ "AssociationStatus": "SUCCESS",
231
+ "AssociationStatusMessage": "This field is only populated for a failed association",
232
+ "AssociationType": "INHERITED",
233
+ "ConfigurationPolicyId": "a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
234
+ "TargetId": "111122223333",
235
+ "TargetType": "ACCOUNT",
236
+ "UpdatedAt": "2023-01-11T06:17:17.154Z"
237
+ }
238
+ ],
239
+ "UnprocessedConfigurationPolicyAssociations": [
240
+ {
241
+ "ConfigurationPolicyAssociationIdentifiers": {
242
+ "Target": {
243
+ "RootId": "r-f6g7h8i9j0example"
244
+ }
245
+ },
246
+ "ErrorCode": "400",
247
+ "ErrorReason": "You do not have sufficient access to perform this action."
248
+ }
249
+ ]
250
+ },
251
+ "comments": {
252
+ "input": {
253
+ },
254
+ "output": {
255
+ }
256
+ },
257
+ "description": "This operation provides details about configuration associations for a batch of target accounts, organizational units, or the root.",
258
+ "id": "to-get-configuration-associations-for-a-batch-of-targets-1695178953302",
259
+ "title": "To get configuration associations for a batch of targets"
260
+ }
261
+ ],
211
262
  "BatchGetSecurityControls": [
212
263
  {
213
264
  "input": {
@@ -607,6 +658,85 @@
607
658
  "title": "To create an automation rule"
608
659
  }
609
660
  ],
661
+ "CreateConfigurationPolicy": [
662
+ {
663
+ "input": {
664
+ "ConfigurationPolicy": {
665
+ "SecurityHub": {
666
+ "EnabledStandardIdentifiers": [
667
+ "arn:aws:securityhub:us-east-1::standards/aws-foundational-security-best-practices/v/1.0.0",
668
+ "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0"
669
+ ],
670
+ "SecurityControlsConfiguration": {
671
+ "DisabledSecurityControlIdentifiers": [
672
+ "CloudWatch.1"
673
+ ],
674
+ "SecurityControlCustomParameters": [
675
+ {
676
+ "Parameters": {
677
+ "daysToExpiration": {
678
+ "Value": {
679
+ "Integer": 14
680
+ },
681
+ "ValueType": "CUSTOM"
682
+ }
683
+ },
684
+ "SecurityControlId": "ACM.1"
685
+ }
686
+ ]
687
+ },
688
+ "ServiceEnabled": true
689
+ }
690
+ },
691
+ "Description": "Configuration policy for testing FSBP and CIS",
692
+ "Name": "TestConfigurationPolicy"
693
+ },
694
+ "output": {
695
+ "Arn": "arn:aws:securityhub:us-east-1:123456789012:configuration-policy/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
696
+ "ConfigurationPolicy": {
697
+ "SecurityHub": {
698
+ "EnabledStandardIdentifiers": [
699
+ "arn:aws:securityhub:us-east-1::standards/aws-foundational-security-best-practices/v/1.0.0",
700
+ "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0"
701
+ ],
702
+ "SecurityControlsConfiguration": {
703
+ "DisabledSecurityControlIdentifiers": [
704
+ "CloudWatch.1"
705
+ ],
706
+ "SecurityControlCustomParameters": [
707
+ {
708
+ "Parameters": {
709
+ "daysToExpiration": {
710
+ "Value": {
711
+ "Integer": 14
712
+ },
713
+ "ValueType": "CUSTOM"
714
+ }
715
+ },
716
+ "SecurityControlId": "ACM.1"
717
+ }
718
+ ]
719
+ },
720
+ "ServiceEnabled": true
721
+ }
722
+ },
723
+ "CreatedAt": "2023-01-11T06:17:17.154Z",
724
+ "Description": "Configuration policy for testing FSBP and CIS",
725
+ "Id": "a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
726
+ "Name": "TestConfigurationPolicy",
727
+ "UpdatedAt": "2023-01-11T06:17:17.154Z"
728
+ },
729
+ "comments": {
730
+ "input": {
731
+ },
732
+ "output": {
733
+ }
734
+ },
735
+ "description": "This operation creates a configuration policy in Security Hub.",
736
+ "id": "to-create-a-configuration-policy-1695172470099",
737
+ "title": "To create a configuration policy"
738
+ }
739
+ ],
610
740
  "CreateFindingAggregator": [
611
741
  {
612
742
  "input": {
@@ -741,6 +871,22 @@
741
871
  "title": "To delete a custom action target"
742
872
  }
743
873
  ],
874
+ "DeleteConfigurationPolicy": [
875
+ {
876
+ "input": {
877
+ "Identifier": "arn:aws:securityhub:us-east-1:123456789012:configuration-policy/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111"
878
+ },
879
+ "comments": {
880
+ "input": {
881
+ },
882
+ "output": {
883
+ }
884
+ },
885
+ "description": "This operation deletes the specified configuration policy.",
886
+ "id": "to-delete-a-configuration-policy-1695174614062",
887
+ "title": "To delete a configuration policy"
888
+ }
889
+ ],
744
890
  "DeleteFindingAggregator": [
745
891
  {
746
892
  "input": {
@@ -877,9 +1023,13 @@
877
1023
  "input": {
878
1024
  },
879
1025
  "output": {
880
- "AutoEnable": true,
881
- "AutoEnableStandards": "DEFAULT",
882
- "MemberAccountLimitReached": true
1026
+ "AutoEnable": false,
1027
+ "AutoEnableStandards": "NONE",
1028
+ "MemberAccountLimitReached": false,
1029
+ "OrganizationConfiguration": {
1030
+ "ConfigurationType": "CENTRAL",
1031
+ "Status": "ENABLED"
1032
+ }
883
1033
  },
884
1034
  "comments": {
885
1035
  "input": {
@@ -887,9 +1037,9 @@
887
1037
  "output": {
888
1038
  }
889
1039
  },
890
- "description": "The following example returns details about the way in which AWS Organizations is configured for a Security Hub account that belongs to an organization. Only a Security Hub administrator account can call this operation.",
891
- "id": "to-get-information-about-organizations-configuration-1676059786304",
892
- "title": "To get information about Organizations configuration"
1040
+ "description": "This operation provides information about the way your organization is configured in Security Hub. Only a Security Hub administrator account can invoke this operation.",
1041
+ "id": "to-get-information-about-organization-configuration-1676059786304",
1042
+ "title": "To get information about organization configuration"
893
1043
  }
894
1044
  ],
895
1045
  "DescribeProducts": [
@@ -1178,6 +1328,84 @@
1178
1328
  "title": "To get details about the Security Hub administrator account"
1179
1329
  }
1180
1330
  ],
1331
+ "GetConfigurationPolicy": [
1332
+ {
1333
+ "input": {
1334
+ "Identifier": "arn:aws:securityhub:us-east-1:123456789012:configuration-policy/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111"
1335
+ },
1336
+ "output": {
1337
+ "Arn": "arn:aws:securityhub:us-east-1:123456789012:configuration-policy/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
1338
+ "ConfigurationPolicy": {
1339
+ "SecurityHub": {
1340
+ "EnabledStandardIdentifiers": [
1341
+ "arn:aws:securityhub:us-east-1::standards/aws-foundational-security-best-practices/v/1.0.0",
1342
+ "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0"
1343
+ ],
1344
+ "SecurityControlsConfiguration": {
1345
+ "DisabledSecurityControlIdentifiers": [
1346
+ "CloudWatch.1"
1347
+ ],
1348
+ "SecurityControlCustomParameters": [
1349
+ {
1350
+ "Parameters": {
1351
+ "daysToExpiration": {
1352
+ "Value": {
1353
+ "Integer": 14
1354
+ },
1355
+ "ValueType": "CUSTOM"
1356
+ }
1357
+ },
1358
+ "SecurityControlId": "ACM.1"
1359
+ }
1360
+ ]
1361
+ },
1362
+ "ServiceEnabled": true
1363
+ }
1364
+ },
1365
+ "CreatedAt": "2023-01-11T06:17:17.154Z",
1366
+ "Description": "Configuration policy for testing FSBP and CIS",
1367
+ "Id": "a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
1368
+ "Name": "TestConfigurationPolicy",
1369
+ "UpdatedAt": "2023-01-11T06:17:17.154Z"
1370
+ },
1371
+ "comments": {
1372
+ "input": {
1373
+ },
1374
+ "output": {
1375
+ }
1376
+ },
1377
+ "description": "This operation provides details about the specified configuration policy.",
1378
+ "id": "to-get-details-about-a-configuration-policy-1695173701103",
1379
+ "title": "To get details about a configuration policy"
1380
+ }
1381
+ ],
1382
+ "GetConfigurationPolicyAssociation": [
1383
+ {
1384
+ "input": {
1385
+ "Target": {
1386
+ "AccountId": "111122223333"
1387
+ }
1388
+ },
1389
+ "output": {
1390
+ "AssociationStatus": "FAILED",
1391
+ "AssociationStatusMessage": "Configuration Policy a1b2c3d4-5678-90ab-cdef-EXAMPLE11111 couldn’t be applied to account 111122223333 in us-east-1 Region. Retry your request.",
1392
+ "AssociationType": "INHERITED",
1393
+ "ConfigurationPolicyId": "a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
1394
+ "TargetId": "111122223333",
1395
+ "TargetType": "ACCOUNT",
1396
+ "UpdatedAt": "2023-01-11T06:17:17.154Z"
1397
+ },
1398
+ "comments": {
1399
+ "input": {
1400
+ },
1401
+ "output": {
1402
+ }
1403
+ },
1404
+ "description": "This operation provides details about configuration associations for a specific target account, organizational unit, or the root.",
1405
+ "id": "to-get-details-about-a-configuration-association-1695177816371",
1406
+ "title": "To get details about a configuration association"
1407
+ }
1408
+ ],
1181
1409
  "GetEnabledStandards": [
1182
1410
  {
1183
1411
  "input": {
@@ -1626,6 +1854,69 @@
1626
1854
  "title": "To list automation rules"
1627
1855
  }
1628
1856
  ],
1857
+ "ListConfigurationPolicies": [
1858
+ {
1859
+ "input": {
1860
+ "MaxResults": 1,
1861
+ "NextToken": "U1FsdGVkX19nBV2zoh+Gou9NgnulLJHWpn9xnG4hqSOhvw3o2JqjI86QDxdf"
1862
+ },
1863
+ "output": {
1864
+ "ConfigurationPolicySummaries": [
1865
+ {
1866
+ "Arn": "arn:aws:securityhub:us-east-1:123456789012:configuration-policy/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
1867
+ "Description": "Configuration policy for testing FSBP and CIS",
1868
+ "Id": "a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
1869
+ "Name": "TestConfigurationPolicy",
1870
+ "ServiceEnabled": true,
1871
+ "UpdatedAt": "2023-01-11T06:17:17.154Z"
1872
+ }
1873
+ ],
1874
+ "NextToken": "U1FsdGVkX19nBV2zoh+Gou9NgnulLJHWpn9xnG4hqSOfvw3o2JqjI86QDxef"
1875
+ },
1876
+ "comments": {
1877
+ "input": {
1878
+ },
1879
+ "output": {
1880
+ }
1881
+ },
1882
+ "description": "This operation provides a list of your configuration policies, including metadata for each policy.",
1883
+ "id": "to-view-a-list-of-configuration-policies-1695173268602",
1884
+ "title": "To view a list of configuration policies"
1885
+ }
1886
+ ],
1887
+ "ListConfigurationPolicyAssociations": [
1888
+ {
1889
+ "input": {
1890
+ "Filters": {
1891
+ "AssociationType": "APPLIED"
1892
+ },
1893
+ "MaxResults": 1,
1894
+ "NextToken": "U1FsdGVkX19nBV2zoh+Gou9NgnulLJHWpn9xnG4hqSOhvw3o2JqjI86QDxdf"
1895
+ },
1896
+ "output": {
1897
+ "ConfigurationPolicyAssociationSummaries": [
1898
+ {
1899
+ "AssociationStatus": "PENDING",
1900
+ "AssociationType": "APPLIED",
1901
+ "ConfigurationPolicyId": "a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
1902
+ "TargetId": "123456789012",
1903
+ "TargetType": "ACCOUNT",
1904
+ "UpdatedAt": "2023-01-11T06:17:17.154Z"
1905
+ }
1906
+ ],
1907
+ "NextToken": "U1FsdGVkX19nBV2zoh+Gou9NgnulLJHWpn9xnG4hqSOfvw3o2JqjI86QDxef"
1908
+ },
1909
+ "comments": {
1910
+ "input": {
1911
+ },
1912
+ "output": {
1913
+ }
1914
+ },
1915
+ "description": "This operation lists all of the associations between targets and configuration policies or self-managed behavior. Targets can include accounts, organizational units, or the root.",
1916
+ "id": "to-list-configuration-associations-1695177309791",
1917
+ "title": "To list configuration associations"
1918
+ }
1919
+ ],
1629
1920
  "ListEnabledProductsForImport": [
1630
1921
  {
1631
1922
  "output": {
@@ -1870,6 +2161,53 @@
1870
2161
  "title": "To get a list of tags for a resource"
1871
2162
  }
1872
2163
  ],
2164
+ "StartConfigurationPolicyAssociation": [
2165
+ {
2166
+ "input": {
2167
+ "ConfigurationPolicyIdentifier": "arn:aws:securityhub:us-east-1:123456789012:configuration-policy/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
2168
+ "Target": {
2169
+ "AccountId": "111122223333"
2170
+ }
2171
+ },
2172
+ "output": {
2173
+ "AssociationStatus": "SUCCESS",
2174
+ "AssociationStatusMessage": "This field is populated only if the association fails",
2175
+ "AssociationType": "APPLIED",
2176
+ "ConfigurationPolicyId": "a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
2177
+ "TargetId": "111122223333",
2178
+ "TargetType": "ACCOUNT",
2179
+ "UpdatedAt": "2023-01-11T06:17:17.154Z"
2180
+ },
2181
+ "comments": {
2182
+ "input": {
2183
+ },
2184
+ "output": {
2185
+ }
2186
+ },
2187
+ "description": "This operation associates a configuration policy or self-managed behavior with the target account, organizational unit, or the root.",
2188
+ "id": "to-associate-a-configuration-with-a-target-1695176455638",
2189
+ "title": "To associate a configuration with a target"
2190
+ }
2191
+ ],
2192
+ "StartConfigurationPolicyDisassociation": [
2193
+ {
2194
+ "input": {
2195
+ "ConfigurationPolicyIdentifier": "SELF_MANAGED_SECURITY_HUB",
2196
+ "Target": {
2197
+ "RootId": "r-f6g7h8i9j0example"
2198
+ }
2199
+ },
2200
+ "comments": {
2201
+ "input": {
2202
+ },
2203
+ "output": {
2204
+ }
2205
+ },
2206
+ "description": "This operation disassociates a configuration policy or self-managed behavior from the target account, organizational unit, or the root.",
2207
+ "id": "to-disassociate-a-configuration-from-a-target-1695177176748",
2208
+ "title": "To disassociate a configuration from a target"
2209
+ }
2210
+ ],
1873
2211
  "TagResource": [
1874
2212
  {
1875
2213
  "input": {
@@ -1927,6 +2265,89 @@
1927
2265
  "title": "To update the name and description of a custom action target"
1928
2266
  }
1929
2267
  ],
2268
+ "UpdateConfigurationPolicy": [
2269
+ {
2270
+ "input": {
2271
+ "ConfigurationPolicy": {
2272
+ "SecurityHub": {
2273
+ "EnabledStandardIdentifiers": [
2274
+ "arn:aws:securityhub:us-east-1::standards/aws-foundational-security-best-practices/v/1.0.0",
2275
+ "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0"
2276
+ ],
2277
+ "SecurityControlsConfiguration": {
2278
+ "DisabledSecurityControlIdentifiers": [
2279
+ "CloudWatch.1",
2280
+ "CloudWatch.2"
2281
+ ],
2282
+ "SecurityControlCustomParameters": [
2283
+ {
2284
+ "Parameters": {
2285
+ "daysToExpiration": {
2286
+ "Value": {
2287
+ "Integer": 21
2288
+ },
2289
+ "ValueType": "CUSTOM"
2290
+ }
2291
+ },
2292
+ "SecurityControlId": "ACM.1"
2293
+ }
2294
+ ]
2295
+ },
2296
+ "ServiceEnabled": true
2297
+ }
2298
+ },
2299
+ "Description": "Updated configuration policy for testing FSBP and CIS",
2300
+ "Identifier": "arn:aws:securityhub:us-east-1:123456789012:configuration-policy/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
2301
+ "Name": "TestConfigurationPolicy",
2302
+ "UpdatedReason": "Enabling ACM.2"
2303
+ },
2304
+ "output": {
2305
+ "Arn": "arn:aws:securityhub:us-east-1:123456789012:configuration-policy/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
2306
+ "ConfigurationPolicy": {
2307
+ "SecurityHub": {
2308
+ "EnabledStandardIdentifiers": [
2309
+ "arn:aws:securityhub:us-east-1::standards/aws-foundational-security-best-practices/v/1.0.0",
2310
+ "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0"
2311
+ ],
2312
+ "SecurityControlsConfiguration": {
2313
+ "DisabledSecurityControlIdentifiers": [
2314
+ "CloudWatch.1",
2315
+ "CloudWatch.2"
2316
+ ],
2317
+ "SecurityControlCustomParameters": [
2318
+ {
2319
+ "Parameters": {
2320
+ "daysToExpiration": {
2321
+ "Value": {
2322
+ "Integer": 21
2323
+ },
2324
+ "ValueType": "CUSTOM"
2325
+ }
2326
+ },
2327
+ "SecurityControlId": "ACM.1"
2328
+ }
2329
+ ]
2330
+ },
2331
+ "ServiceEnabled": true
2332
+ }
2333
+ },
2334
+ "CreatedAt": "2023-01-11T06:17:17.154Z",
2335
+ "Description": "Updated configuration policy for testing FSBP and CIS",
2336
+ "Id": "a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
2337
+ "Name": "TestConfigurationPolicy",
2338
+ "UpdatedAt": "2023-01-12T06:17:17.154Z"
2339
+ },
2340
+ "comments": {
2341
+ "input": {
2342
+ },
2343
+ "output": {
2344
+ }
2345
+ },
2346
+ "description": "This operation updates the specified configuration policy.",
2347
+ "id": "to-update-a-configuration-policy-1695174120555",
2348
+ "title": "To update a configuration policy"
2349
+ }
2350
+ ],
1930
2351
  "UpdateFindingAggregator": [
1931
2352
  {
1932
2353
  "input": {
@@ -1991,7 +2412,11 @@
1991
2412
  "UpdateOrganizationConfiguration": [
1992
2413
  {
1993
2414
  "input": {
1994
- "AutoEnable": true
2415
+ "AutoEnable": false,
2416
+ "AutoEnableStandards": "NONE",
2417
+ "OrganizationConfiguration": {
2418
+ "ConfigurationType": "CENTRAL"
2419
+ }
1995
2420
  },
1996
2421
  "comments": {
1997
2422
  "input": {
@@ -1999,7 +2424,7 @@
1999
2424
  "output": {
2000
2425
  }
2001
2426
  },
2002
- "description": "The following example updates the configuration for an organization so that Security Hub is automatically activated for new member accounts. Only the Security Hub administrator account can call this operation.",
2427
+ "description": "This operation updates the way your organization is configured in Security Hub. Only a Security Hub administrator account can invoke this operation.",
2003
2428
  "id": "to-update-organization-configuration-1678911630846",
2004
2429
  "title": "To update organization configuration"
2005
2430
  }