aws-sdk 2.1663.0 → 2.1665.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (51) hide show
  1. package/README.md +1 -1
  2. package/apis/application-signals-2024-04-15.min.json +15 -0
  3. package/apis/appstream-2016-12-01.min.json +7 -1
  4. package/apis/autoscaling-2011-01-01.min.json +33 -33
  5. package/apis/bedrock-runtime-2023-09-30.min.json +27 -5
  6. package/apis/codecommit-2015-04-13.min.json +7 -1
  7. package/apis/codepipeline-2015-07-09.min.json +442 -94
  8. package/apis/codepipeline-2015-07-09.paginators.json +6 -0
  9. package/apis/datazone-2018-05-10.min.json +68 -32
  10. package/apis/ecr-2015-09-21.examples.json +186 -0
  11. package/apis/ecr-2015-09-21.min.json +177 -20
  12. package/apis/ecr-2015-09-21.paginators.json +9 -0
  13. package/apis/eks-2017-11-01.min.json +81 -63
  14. package/apis/elasticloadbalancing-2012-06-01.min.json +7 -1
  15. package/apis/elasticloadbalancingv2-2015-12-01.examples.json +33 -0
  16. package/apis/elasticloadbalancingv2-2015-12-01.min.json +113 -73
  17. package/apis/eventbridge-2015-10-07.min.json +4 -1
  18. package/apis/logs-2014-03-28.min.json +7 -1
  19. package/apis/memorydb-2021-01-01.min.json +7 -1
  20. package/apis/models.lex.v2-2020-08-07.min.json +374 -346
  21. package/apis/network-firewall-2020-11-12.min.json +7 -1
  22. package/apis/outposts-2019-12-03.min.json +11 -2
  23. package/apis/rolesanywhere-2018-05-10.min.json +16 -1
  24. package/apis/states-2016-11-23.min.json +163 -128
  25. package/apis/tnb-2008-10-21.min.json +90 -23
  26. package/clients/applicationautoscaling.d.ts +1 -1
  27. package/clients/applicationsignals.d.ts +29 -20
  28. package/clients/appstream.d.ts +8 -8
  29. package/clients/autoscaling.d.ts +4 -3
  30. package/clients/bedrockruntime.d.ts +11 -8
  31. package/clients/codepipeline.d.ts +481 -1
  32. package/clients/datazone.d.ts +36 -0
  33. package/clients/ec2.d.ts +4 -4
  34. package/clients/ecr.d.ts +242 -8
  35. package/clients/eks.d.ts +27 -2
  36. package/clients/elasticache.d.ts +196 -196
  37. package/clients/elbv2.d.ts +54 -8
  38. package/clients/lexmodelsv2.d.ts +45 -5
  39. package/clients/memorydb.d.ts +7 -7
  40. package/clients/networkfirewall.d.ts +7 -7
  41. package/clients/outposts.d.ts +5 -0
  42. package/clients/rolesanywhere.d.ts +12 -0
  43. package/clients/stepfunctions.d.ts +67 -9
  44. package/clients/tnb.d.ts +95 -18
  45. package/clients/workspaces.d.ts +7 -7
  46. package/dist/aws-sdk-core-react-native.js +1 -1
  47. package/dist/aws-sdk-react-native.js +23 -23
  48. package/dist/aws-sdk.js +804 -226
  49. package/dist/aws-sdk.min.js +94 -93
  50. package/lib/core.js +1 -1
  51. package/package.json +1 -1
@@ -100,6 +100,14 @@ declare class ELBv2 extends Service {
100
100
  * Deletes the specified rule. You can't delete the default rule.
101
101
  */
102
102
  deleteRule(callback?: (err: AWSError, data: ELBv2.Types.DeleteRuleOutput) => void): Request<ELBv2.Types.DeleteRuleOutput, AWSError>;
103
+ /**
104
+ * Deletes a shared trust store association.
105
+ */
106
+ deleteSharedTrustStoreAssociation(params: ELBv2.Types.DeleteSharedTrustStoreAssociationInput, callback?: (err: AWSError, data: ELBv2.Types.DeleteSharedTrustStoreAssociationOutput) => void): Request<ELBv2.Types.DeleteSharedTrustStoreAssociationOutput, AWSError>;
107
+ /**
108
+ * Deletes a shared trust store association.
109
+ */
110
+ deleteSharedTrustStoreAssociation(callback?: (err: AWSError, data: ELBv2.Types.DeleteSharedTrustStoreAssociationOutput) => void): Request<ELBv2.Types.DeleteSharedTrustStoreAssociationOutput, AWSError>;
103
111
  /**
104
112
  * Deletes the specified target group. You can delete a target group if it is not referenced by any actions. Deleting a target group also deletes any associated health checks. Deleting a target group does not affect its registered targets. For example, any EC2 instances continue to run until you stop or terminate them.
105
113
  */
@@ -221,21 +229,29 @@ declare class ELBv2 extends Service {
221
229
  */
222
230
  describeTrustStoreAssociations(callback?: (err: AWSError, data: ELBv2.Types.DescribeTrustStoreAssociationsOutput) => void): Request<ELBv2.Types.DescribeTrustStoreAssociationsOutput, AWSError>;
223
231
  /**
224
- * Describes the revocation files in use by the specified trust store arn, or revocation ID.
232
+ * Describes the revocation files in use by the specified trust store or revocation files.
225
233
  */
226
234
  describeTrustStoreRevocations(params: ELBv2.Types.DescribeTrustStoreRevocationsInput, callback?: (err: AWSError, data: ELBv2.Types.DescribeTrustStoreRevocationsOutput) => void): Request<ELBv2.Types.DescribeTrustStoreRevocationsOutput, AWSError>;
227
235
  /**
228
- * Describes the revocation files in use by the specified trust store arn, or revocation ID.
236
+ * Describes the revocation files in use by the specified trust store or revocation files.
229
237
  */
230
238
  describeTrustStoreRevocations(callback?: (err: AWSError, data: ELBv2.Types.DescribeTrustStoreRevocationsOutput) => void): Request<ELBv2.Types.DescribeTrustStoreRevocationsOutput, AWSError>;
231
239
  /**
232
- * Describes all trust stores for a given account by trust store arn’s or name.
240
+ * Describes all trust stores for the specified account.
233
241
  */
234
242
  describeTrustStores(params: ELBv2.Types.DescribeTrustStoresInput, callback?: (err: AWSError, data: ELBv2.Types.DescribeTrustStoresOutput) => void): Request<ELBv2.Types.DescribeTrustStoresOutput, AWSError>;
235
243
  /**
236
- * Describes all trust stores for a given account by trust store arn’s or name.
244
+ * Describes all trust stores for the specified account.
237
245
  */
238
246
  describeTrustStores(callback?: (err: AWSError, data: ELBv2.Types.DescribeTrustStoresOutput) => void): Request<ELBv2.Types.DescribeTrustStoresOutput, AWSError>;
247
+ /**
248
+ * Retrieves the resource policy for a specified resource.
249
+ */
250
+ getResourcePolicy(params: ELBv2.Types.GetResourcePolicyInput, callback?: (err: AWSError, data: ELBv2.Types.GetResourcePolicyOutput) => void): Request<ELBv2.Types.GetResourcePolicyOutput, AWSError>;
251
+ /**
252
+ * Retrieves the resource policy for a specified resource.
253
+ */
254
+ getResourcePolicy(callback?: (err: AWSError, data: ELBv2.Types.GetResourcePolicyOutput) => void): Request<ELBv2.Types.GetResourcePolicyOutput, AWSError>;
239
255
  /**
240
256
  * Retrieves the ca certificate bundle. This action returns a pre-signed S3 URI which is active for ten minutes.
241
257
  */
@@ -293,11 +309,11 @@ declare class ELBv2 extends Service {
293
309
  */
294
310
  modifyTargetGroupAttributes(callback?: (err: AWSError, data: ELBv2.Types.ModifyTargetGroupAttributesOutput) => void): Request<ELBv2.Types.ModifyTargetGroupAttributesOutput, AWSError>;
295
311
  /**
296
- * Update the ca certificate bundle for a given trust store.
312
+ * Update the ca certificate bundle for the specified trust store.
297
313
  */
298
314
  modifyTrustStore(params: ELBv2.Types.ModifyTrustStoreInput, callback?: (err: AWSError, data: ELBv2.Types.ModifyTrustStoreOutput) => void): Request<ELBv2.Types.ModifyTrustStoreOutput, AWSError>;
299
315
  /**
300
- * Update the ca certificate bundle for a given trust store.
316
+ * Update the ca certificate bundle for the specified trust store.
301
317
  */
302
318
  modifyTrustStore(callback?: (err: AWSError, data: ELBv2.Types.ModifyTrustStoreOutput) => void): Request<ELBv2.Types.ModifyTrustStoreOutput, AWSError>;
303
319
  /**
@@ -903,6 +919,18 @@ declare namespace ELBv2 {
903
919
  }
904
920
  export interface DeleteRuleOutput {
905
921
  }
922
+ export interface DeleteSharedTrustStoreAssociationInput {
923
+ /**
924
+ * The Amazon Resource Name (ARN) of the trust store.
925
+ */
926
+ TrustStoreArn: TrustStoreArn;
927
+ /**
928
+ * The Amazon Resource Name (ARN) of the resource.
929
+ */
930
+ ResourceArn: ResourceArn;
931
+ }
932
+ export interface DeleteSharedTrustStoreAssociationOutput {
933
+ }
906
934
  export interface DeleteTargetGroupInput {
907
935
  /**
908
936
  * The Amazon Resource Name (ARN) of the target group.
@@ -1165,7 +1193,7 @@ declare namespace ELBv2 {
1165
1193
  */
1166
1194
  Targets?: TargetDescriptions;
1167
1195
  /**
1168
- * Used to inclue anomaly detection information.
1196
+ * Used to include anomaly detection information.
1169
1197
  */
1170
1198
  Include?: ListOfDescribeTargetHealthIncludeOptions;
1171
1199
  }
@@ -1305,6 +1333,18 @@ declare namespace ELBv2 {
1305
1333
  */
1306
1334
  TargetGroupStickinessConfig?: TargetGroupStickinessConfig;
1307
1335
  }
1336
+ export interface GetResourcePolicyInput {
1337
+ /**
1338
+ * The Amazon Resource Name (ARN) of the resource.
1339
+ */
1340
+ ResourceArn: ResourceArn;
1341
+ }
1342
+ export interface GetResourcePolicyOutput {
1343
+ /**
1344
+ * The content of the resource policy.
1345
+ */
1346
+ Policy?: Policy;
1347
+ }
1308
1348
  export interface GetTrustStoreCaCertificatesBundleInput {
1309
1349
  /**
1310
1350
  * The Amazon Resource Name (ARN) of the trust store.
@@ -1722,6 +1762,10 @@ declare namespace ELBv2 {
1722
1762
  * Indicates whether expired client certificates are ignored.
1723
1763
  */
1724
1764
  IgnoreClientCertificateExpiry?: IgnoreClientCertificateExpiry;
1765
+ /**
1766
+ * Indicates a shared trust stores association status.
1767
+ */
1768
+ TrustStoreAssociationStatus?: TrustStoreAssociationStatusEnum;
1725
1769
  }
1726
1770
  export type Name = string;
1727
1771
  export type NumberOfCaCertificates = number;
@@ -1735,6 +1779,7 @@ declare namespace ELBv2 {
1735
1779
  */
1736
1780
  Values?: ListOfString;
1737
1781
  }
1782
+ export type Policy = string;
1738
1783
  export type Port = number;
1739
1784
  export type PrivateIPv4Address = string;
1740
1785
  export type ProtocolEnum = "HTTP"|"HTTPS"|"TCP"|"TLS"|"UDP"|"TCP_UDP"|"GENEVE"|string;
@@ -1943,7 +1988,7 @@ declare namespace ELBv2 {
1943
1988
  */
1944
1989
  LoadBalancerArn: LoadBalancerArn;
1945
1990
  /**
1946
- * Note: Internal load balancers must use the ipv4 IP address type. [Application Load Balancers] The IP address type. The possible values are ipv4 (for only IPv4 addresses), dualstack (for IPv4 and IPv6 addresses), and dualstack-without-public-ipv4 (for IPv6 only public addresses, with private IPv4 and IPv6 addresses). [Network Load Balancers] The IP address type. The possible values are ipv4 (for only IPv4 addresses) and dualstack (for IPv4 and IPv6 addresses). You can’t specify dualstack for a load balancer with a UDP or TCP_UDP listener. [Gateway Load Balancers] The IP address type. The possible values are ipv4 (for only IPv4 addresses) and dualstack (for IPv4 and IPv6 addresses).
1991
+ * Note: Internal load balancers must use the ipv4 IP address type. [Application Load Balancers] The IP address type. The possible values are ipv4 (for only IPv4 addresses), dualstack (for IPv4 and IPv6 addresses), and dualstack-without-public-ipv4 (for IPv6 only public addresses, with private IPv4 and IPv6 addresses). Note: Application Load Balancer authentication only supports IPv4 addresses when connecting to an Identity Provider (IdP) or Amazon Cognito endpoint. Without a public IPv4 address the load balancer cannot complete the authentication process, resulting in HTTP 500 errors. [Network Load Balancers] The IP address type. The possible values are ipv4 (for only IPv4 addresses) and dualstack (for IPv4 and IPv6 addresses). You can’t specify dualstack for a load balancer with a UDP or TCP_UDP listener. [Gateway Load Balancers] The IP address type. The possible values are ipv4 (for only IPv4 addresses) and dualstack (for IPv4 and IPv6 addresses).
1947
1992
  */
1948
1993
  IpAddressType: IpAddressType;
1949
1994
  }
@@ -2296,6 +2341,7 @@ declare namespace ELBv2 {
2296
2341
  ResourceArn?: TrustStoreAssociationResourceArn;
2297
2342
  }
2298
2343
  export type TrustStoreAssociationResourceArn = string;
2344
+ export type TrustStoreAssociationStatusEnum = "active"|"removed"|string;
2299
2345
  export type TrustStoreAssociations = TrustStoreAssociation[];
2300
2346
  export type TrustStoreName = string;
2301
2347
  export type TrustStoreNames = TrustStoreName[];
@@ -108,11 +108,11 @@ declare class LexModelsV2 extends Service {
108
108
  */
109
109
  createResourcePolicy(callback?: (err: AWSError, data: LexModelsV2.Types.CreateResourcePolicyResponse) => void): Request<LexModelsV2.Types.CreateResourcePolicyResponse, AWSError>;
110
110
  /**
111
- * Adds a new resource policy statement to a bot or bot alias. If a resource policy exists, the statement is added to the current resource policy. If a policy doesn't exist, a new policy is created. You can't create a resource policy statement that allows cross-account access.
111
+ * Adds a new resource policy statement to a bot or bot alias. If a resource policy exists, the statement is added to the current resource policy. If a policy doesn't exist, a new policy is created. You can't create a resource policy statement that allows cross-account access. You need to add the CreateResourcePolicy or UpdateResourcePolicy action to the bot role in order to call the API.
112
112
  */
113
113
  createResourcePolicyStatement(params: LexModelsV2.Types.CreateResourcePolicyStatementRequest, callback?: (err: AWSError, data: LexModelsV2.Types.CreateResourcePolicyStatementResponse) => void): Request<LexModelsV2.Types.CreateResourcePolicyStatementResponse, AWSError>;
114
114
  /**
115
- * Adds a new resource policy statement to a bot or bot alias. If a resource policy exists, the statement is added to the current resource policy. If a policy doesn't exist, a new policy is created. You can't create a resource policy statement that allows cross-account access.
115
+ * Adds a new resource policy statement to a bot or bot alias. If a resource policy exists, the statement is added to the current resource policy. If a policy doesn't exist, a new policy is created. You can't create a resource policy statement that allows cross-account access. You need to add the CreateResourcePolicy or UpdateResourcePolicy action to the bot role in order to call the API.
116
116
  */
117
117
  createResourcePolicyStatement(callback?: (err: AWSError, data: LexModelsV2.Types.CreateResourcePolicyStatementResponse) => void): Request<LexModelsV2.Types.CreateResourcePolicyStatementResponse, AWSError>;
118
118
  /**
@@ -228,11 +228,11 @@ declare class LexModelsV2 extends Service {
228
228
  */
229
229
  deleteResourcePolicy(callback?: (err: AWSError, data: LexModelsV2.Types.DeleteResourcePolicyResponse) => void): Request<LexModelsV2.Types.DeleteResourcePolicyResponse, AWSError>;
230
230
  /**
231
- * Deletes a policy statement from a resource policy. If you delete the last statement from a policy, the policy is deleted. If you specify a statement ID that doesn't exist in the policy, or if the bot or bot alias doesn't have a policy attached, Amazon Lex returns an exception.
231
+ * Deletes a policy statement from a resource policy. If you delete the last statement from a policy, the policy is deleted. If you specify a statement ID that doesn't exist in the policy, or if the bot or bot alias doesn't have a policy attached, Amazon Lex returns an exception. You need to add the DeleteResourcePolicy or UpdateResourcePolicy action to the bot role in order to call the API.
232
232
  */
233
233
  deleteResourcePolicyStatement(params: LexModelsV2.Types.DeleteResourcePolicyStatementRequest, callback?: (err: AWSError, data: LexModelsV2.Types.DeleteResourcePolicyStatementResponse) => void): Request<LexModelsV2.Types.DeleteResourcePolicyStatementResponse, AWSError>;
234
234
  /**
235
- * Deletes a policy statement from a resource policy. If you delete the last statement from a policy, the policy is deleted. If you specify a statement ID that doesn't exist in the policy, or if the bot or bot alias doesn't have a policy attached, Amazon Lex returns an exception.
235
+ * Deletes a policy statement from a resource policy. If you delete the last statement from a policy, the policy is deleted. If you specify a statement ID that doesn't exist in the policy, or if the bot or bot alias doesn't have a policy attached, Amazon Lex returns an exception. You need to add the DeleteResourcePolicy or UpdateResourcePolicy action to the bot role in order to call the API.
236
236
  */
237
237
  deleteResourcePolicyStatement(callback?: (err: AWSError, data: LexModelsV2.Types.DeleteResourcePolicyStatementResponse) => void): Request<LexModelsV2.Types.DeleteResourcePolicyStatementResponse, AWSError>;
238
238
  /**
@@ -1549,20 +1549,60 @@ declare namespace LexModelsV2 {
1549
1549
  */
1550
1550
  resources?: CustomVocabularyItems;
1551
1551
  }
1552
+ export interface BedrockGuardrailConfiguration {
1553
+ /**
1554
+ * The unique guardrail id for the Bedrock guardrail configuration.
1555
+ */
1556
+ identifier: BedrockGuardrailIdentifier;
1557
+ /**
1558
+ * The guardrail version for the Bedrock guardrail configuration.
1559
+ */
1560
+ version: BedrockGuardrailVersion;
1561
+ }
1562
+ export type BedrockGuardrailIdentifier = string;
1563
+ export type BedrockGuardrailVersion = string;
1552
1564
  export type BedrockKnowledgeBaseArn = string;
1553
1565
  export interface BedrockKnowledgeStoreConfiguration {
1554
1566
  /**
1555
- * The ARN of the knowledge base used.
1567
+ * The base ARN of the knowledge base used.
1556
1568
  */
1557
1569
  bedrockKnowledgeBaseArn: BedrockKnowledgeBaseArn;
1570
+ /**
1571
+ * Specifies whether to return an exact response, or to return an answer generated by the model, using the fields you specify from the database.
1572
+ */
1573
+ exactResponse?: Boolean;
1574
+ /**
1575
+ * Contains the names of the fields used for an exact response to the user.
1576
+ */
1577
+ exactResponseFields?: BedrockKnowledgeStoreExactResponseFields;
1578
+ }
1579
+ export interface BedrockKnowledgeStoreExactResponseFields {
1580
+ /**
1581
+ * The answer field used for an exact response from Bedrock Knowledge Store.
1582
+ */
1583
+ answerField?: AnswerField;
1558
1584
  }
1559
1585
  export type BedrockModelArn = string;
1586
+ export type BedrockModelCustomPrompt = string;
1560
1587
  export interface BedrockModelSpecification {
1561
1588
  /**
1562
1589
  * The ARN of the foundation model used in descriptive bot building.
1563
1590
  */
1564
1591
  modelArn: BedrockModelArn;
1592
+ /**
1593
+ * The guardrail configuration in the Bedrock model specification details.
1594
+ */
1595
+ guardrail?: BedrockGuardrailConfiguration;
1596
+ /**
1597
+ * The Bedrock trace status in the Bedrock model specification details.
1598
+ */
1599
+ traceStatus?: BedrockTraceStatus;
1600
+ /**
1601
+ * The custom prompt used in the Bedrock model specification details.
1602
+ */
1603
+ customPrompt?: BedrockModelCustomPrompt;
1565
1604
  }
1605
+ export type BedrockTraceStatus = "ENABLED"|"DISABLED"|string;
1566
1606
  export type Boolean = boolean;
1567
1607
  export interface BotAliasHistoryEvent {
1568
1608
  /**
@@ -140,11 +140,11 @@ declare class MemoryDB extends Service {
140
140
  */
141
141
  describeClusters(callback?: (err: AWSError, data: MemoryDB.Types.DescribeClustersResponse) => void): Request<MemoryDB.Types.DescribeClustersResponse, AWSError>;
142
142
  /**
143
- * Returns a list of the available Redis engine versions.
143
+ * Returns a list of the available Redis OSS engine versions.
144
144
  */
145
145
  describeEngineVersions(params: MemoryDB.Types.DescribeEngineVersionsRequest, callback?: (err: AWSError, data: MemoryDB.Types.DescribeEngineVersionsResponse) => void): Request<MemoryDB.Types.DescribeEngineVersionsResponse, AWSError>;
146
146
  /**
147
- * Returns a list of the available Redis engine versions.
147
+ * Returns a list of the available Redis OSS engine versions.
148
148
  */
149
149
  describeEngineVersions(callback?: (err: AWSError, data: MemoryDB.Types.DescribeEngineVersionsResponse) => void): Request<MemoryDB.Types.DescribeEngineVersionsResponse, AWSError>;
150
150
  /**
@@ -456,11 +456,11 @@ declare namespace MemoryDB {
456
456
  */
457
457
  NodeType?: String;
458
458
  /**
459
- * The Redis engine version used by the cluster
459
+ * The Redis OSS engine version used by the cluster
460
460
  */
461
461
  EngineVersion?: String;
462
462
  /**
463
- * The Redis engine patch version used by the cluster
463
+ * The Redis OSS engine patch version used by the cluster
464
464
  */
465
465
  EnginePatchVersion?: String;
466
466
  /**
@@ -538,7 +538,7 @@ declare namespace MemoryDB {
538
538
  */
539
539
  NodeType?: String;
540
540
  /**
541
- * The Redis engine version used by the cluster
541
+ * The Redis OSS engine version used by the cluster
542
542
  */
543
543
  EngineVersion?: String;
544
544
  /**
@@ -724,7 +724,7 @@ declare namespace MemoryDB {
724
724
  */
725
725
  ACLName: ACLName;
726
726
  /**
727
- * The version number of the Redis engine to be used for the cluster.
727
+ * The version number of the Redis OSS engine to be used for the cluster.
728
728
  */
729
729
  EngineVersion?: String;
730
730
  /**
@@ -969,7 +969,7 @@ declare namespace MemoryDB {
969
969
  }
970
970
  export interface DescribeEngineVersionsRequest {
971
971
  /**
972
- * The Redis engine version
972
+ * The Redis OSS engine version
973
973
  */
974
974
  EngineVersion?: String;
975
975
  /**
@@ -52,11 +52,11 @@ declare class NetworkFirewall extends Service {
52
52
  */
53
53
  createRuleGroup(callback?: (err: AWSError, data: NetworkFirewall.Types.CreateRuleGroupResponse) => void): Request<NetworkFirewall.Types.CreateRuleGroupResponse, AWSError>;
54
54
  /**
55
- * Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains Certificate Manager certificate associations between and the scope configurations that Network Firewall uses to decrypt and re-encrypt traffic traveling through your firewall. After you create a TLS inspection configuration, you can associate it with a new firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
55
+ * Creates an Network Firewall TLS inspection configuration. Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using ACM, create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
56
56
  */
57
57
  createTLSInspectionConfiguration(params: NetworkFirewall.Types.CreateTLSInspectionConfigurationRequest, callback?: (err: AWSError, data: NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse, AWSError>;
58
58
  /**
59
- * Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains Certificate Manager certificate associations between and the scope configurations that Network Firewall uses to decrypt and re-encrypt traffic traveling through your firewall. After you create a TLS inspection configuration, you can associate it with a new firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
59
+ * Creates an Network Firewall TLS inspection configuration. Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using ACM, create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
60
60
  */
61
61
  createTLSInspectionConfiguration(callback?: (err: AWSError, data: NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse, AWSError>;
62
62
  /**
@@ -1305,22 +1305,22 @@ declare namespace NetworkFirewall {
1305
1305
  }
1306
1306
  export interface LogDestinationConfig {
1307
1307
  /**
1308
- * The type of log to send. Alert logs report traffic that matches a StatefulRule with an action setting that sends an alert log message. Flow logs are standard network traffic flow logs.
1308
+ * The type of log to record. You can record the following types of logs from your Network Firewall stateful engine. ALERT - Logs for traffic that matches your stateful rules and that have an action that sends an alert. A stateful rule sends alerts for the rule actions DROP, ALERT, and REJECT. For more information, see StatefulRule. FLOW - Standard network traffic flow logs. The stateful rules engine records flow logs for all network traffic that it receives. Each flow log record captures the network flow for a specific standard stateless rule group. TLS - Logs for events that are related to TLS inspection. For more information, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
1309
1309
  */
1310
1310
  LogType: LogType;
1311
1311
  /**
1312
- * The type of storage destination to send these logs to. You can send logs to an Amazon S3 bucket, a CloudWatch log group, or a Kinesis Data Firehose delivery stream.
1312
+ * The type of storage destination to send these logs to. You can send logs to an Amazon S3 bucket, a CloudWatch log group, or a Firehose delivery stream.
1313
1313
  */
1314
1314
  LogDestinationType: LogDestinationType;
1315
1315
  /**
1316
- * The named location for the logs, provided in a key:value mapping that is specific to the chosen destination type. For an Amazon S3 bucket, provide the name of the bucket, with key bucketName, and optionally provide a prefix, with key prefix. The following example specifies an Amazon S3 bucket named DOC-EXAMPLE-BUCKET and the prefix alerts: "LogDestination": { "bucketName": "DOC-EXAMPLE-BUCKET", "prefix": "alerts" } For a CloudWatch log group, provide the name of the CloudWatch log group, with key logGroup. The following example specifies a log group named alert-log-group: "LogDestination": { "logGroup": "alert-log-group" } For a Kinesis Data Firehose delivery stream, provide the name of the delivery stream, with key deliveryStream. The following example specifies a delivery stream named alert-delivery-stream: "LogDestination": { "deliveryStream": "alert-delivery-stream" }
1316
+ * The named location for the logs, provided in a key:value mapping that is specific to the chosen destination type. For an Amazon S3 bucket, provide the name of the bucket, with key bucketName, and optionally provide a prefix, with key prefix. The following example specifies an Amazon S3 bucket named DOC-EXAMPLE-BUCKET and the prefix alerts: "LogDestination": { "bucketName": "DOC-EXAMPLE-BUCKET", "prefix": "alerts" } For a CloudWatch log group, provide the name of the CloudWatch log group, with key logGroup. The following example specifies a log group named alert-log-group: "LogDestination": { "logGroup": "alert-log-group" } For a Firehose delivery stream, provide the name of the delivery stream, with key deliveryStream. The following example specifies a delivery stream named alert-delivery-stream: "LogDestination": { "deliveryStream": "alert-delivery-stream" }
1317
1317
  */
1318
1318
  LogDestination: LogDestinationMap;
1319
1319
  }
1320
1320
  export type LogDestinationConfigs = LogDestinationConfig[];
1321
1321
  export type LogDestinationMap = {[key: string]: HashMapValue};
1322
1322
  export type LogDestinationType = "S3"|"CloudWatchLogs"|"KinesisDataFirehose"|string;
1323
- export type LogType = "ALERT"|"FLOW"|string;
1323
+ export type LogType = "ALERT"|"FLOW"|"TLS"|string;
1324
1324
  export interface LoggingConfiguration {
1325
1325
  /**
1326
1326
  * Defines the logging destinations for the logs for a firewall. Network Firewall generates logs for stateful rule groups.
@@ -1666,7 +1666,7 @@ declare namespace NetworkFirewall {
1666
1666
  }
1667
1667
  export interface StatefulRule {
1668
1668
  /**
1669
- * Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. The actions for a stateful rule are defined as follows: PASS - Permits the packets to go to the intended destination. DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. ALERT - Sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with ALERT action, verify in the logs that the rule is filtering as you want, then change the action to DROP.
1669
+ * Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. The actions for a stateful rule are defined as follows: PASS - Permits the packets to go to the intended destination. DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. ALERT - Sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with ALERT action, verify in the logs that the rule is filtering as you want, then change the action to DROP. REJECT - Drops traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and an RST bit contained in the TCP header flags. REJECT is available only for TCP traffic. This option doesn't support FTP or IMAP protocols.
1670
1670
  */
1671
1671
  Action: StatefulAction;
1672
1672
  /**
@@ -790,6 +790,10 @@ declare namespace Outposts {
790
790
  export type InstanceTypeCount = number;
791
791
  export interface InstanceTypeItem {
792
792
  InstanceType?: InstanceType;
793
+ /**
794
+ * The number of default VCPUs in an instance type.
795
+ */
796
+ VCPUs?: VCPUCount;
793
797
  }
794
798
  export type InstanceTypeListDefinition = InstanceTypeItem[];
795
799
  export type InstanceTypeName = string;
@@ -1424,6 +1428,7 @@ declare namespace Outposts {
1424
1428
  }
1425
1429
  export type UplinkCount = "UPLINK_COUNT_1"|"UPLINK_COUNT_2"|"UPLINK_COUNT_3"|"UPLINK_COUNT_4"|"UPLINK_COUNT_5"|"UPLINK_COUNT_6"|"UPLINK_COUNT_7"|"UPLINK_COUNT_8"|"UPLINK_COUNT_12"|"UPLINK_COUNT_16"|string;
1426
1430
  export type UplinkGbps = "UPLINK_1G"|"UPLINK_10G"|"UPLINK_40G"|"UPLINK_100G"|string;
1431
+ export type VCPUCount = number;
1427
1432
  export type WireGuardPublicKey = string;
1428
1433
  export type outpostListDefinition = Outpost[];
1429
1434
  export type siteListDefinition = Site[];
@@ -269,6 +269,10 @@ declare namespace RolesAnywhere {
269
269
  export type Boolean = boolean;
270
270
  export type CertificateField = "x509Subject"|"x509Issuer"|"x509SAN"|string;
271
271
  export interface CreateProfileRequest {
272
+ /**
273
+ * Used to determine if a custom role session name will be accepted in a temporary credential request.
274
+ */
275
+ acceptRoleSessionName?: Boolean;
272
276
  /**
273
277
  * Used to determine how long sessions vended using this profile are valid for. See the Expiration section of the CreateSession API documentation page for more details. In requests, if this value is not provided, the default value will be 3600.
274
278
  */
@@ -588,6 +592,10 @@ declare namespace RolesAnywhere {
588
592
  export type NotificationSettings = NotificationSetting[];
589
593
  export type ProfileArn = string;
590
594
  export interface ProfileDetail {
595
+ /**
596
+ * Used to determine if a custom role session name will be accepted in a temporary credential request.
597
+ */
598
+ acceptRoleSessionName?: Boolean;
591
599
  /**
592
600
  * A mapping applied to the authenticating end-entity certificate.
593
601
  */
@@ -917,6 +925,10 @@ declare namespace RolesAnywhere {
917
925
  }
918
926
  export type UpdateCrlRequestCrlDataBlob = Buffer|Uint8Array|Blob|string;
919
927
  export interface UpdateProfileRequest {
928
+ /**
929
+ * Used to determine if a custom role session name will be accepted in a temporary credential request.
930
+ */
931
+ acceptRoleSessionName?: Boolean;
920
932
  /**
921
933
  * Used to determine how long sessions vended using this profile are valid for. See the Expiration section of the CreateSession API documentation page for more details. In requests, if this value is not provided, the default value will be 3600.
922
934
  */