aws-sdk 2.740.0 → 2.741.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/clients/ec2.d.ts CHANGED
@@ -373,11 +373,11 @@ declare class EC2 extends Service {
373
373
  */
374
374
  createClientVpnRoute(callback?: (err: AWSError, data: EC2.Types.CreateClientVpnRouteResult) => void): Request<EC2.Types.CreateClientVpnRouteResult, AWSError>;
375
375
  /**
376
- * Provides information to AWS about your VPN customer gateway device. The customer gateway is the appliance at your end of the VPN connection. (The device on the AWS side of the VPN connection is the virtual private gateway.) You must provide the Internet-routable IP address of the customer gateway's external interface. The IP address must be static and can be behind a device performing network address translation (NAT). For devices that use Border Gateway Protocol (BGP), you can also provide the device's BGP Autonomous System Number (ASN). You can use an existing ASN assigned to your network. If you don't have an ASN already, you can use a private ASN (in the 64512 - 65534 range). Amazon EC2 supports all 2-byte ASN numbers in the range of 1 - 65534, with the exception of 7224, which is reserved in the us-east-1 Region, and 9059, which is reserved in the eu-west-1 Region. For more information, see AWS Site-to-Site VPN in the AWS Site-to-Site VPN User Guide. To create more than one customer gateway with the same VPN type, IP address, and BGP ASN, specify a unique device name for each customer gateway. Identical requests return information about the existing customer gateway and do not create new customer gateways.
376
+ * Provides information to AWS about your VPN customer gateway device. The customer gateway is the appliance at your end of the VPN connection. (The device on the AWS side of the VPN connection is the virtual private gateway.) You must provide the internet-routable IP address of the customer gateway's external interface. The IP address must be static and can be behind a device performing network address translation (NAT). For devices that use Border Gateway Protocol (BGP), you can also provide the device's BGP Autonomous System Number (ASN). You can use an existing ASN assigned to your network. If you don't have an ASN already, you can use a private ASN (in the 64512 - 65534 range). Amazon EC2 supports all 4-byte ASN numbers in the range of 1 - 2147483647, with the exception of the following: 7224 - reserved in the us-east-1 Region 9059 - reserved in the eu-west-1 Region 17943 - reserved in the ap-southeast-1 Region 10124 - reserved in the ap-northeast-1 Region For more information, see AWS Site-to-Site VPN in the AWS Site-to-Site VPN User Guide. To create more than one customer gateway with the same VPN type, IP address, and BGP ASN, specify a unique device name for each customer gateway. Identical requests return information about the existing customer gateway and do not create new customer gateways.
377
377
  */
378
378
  createCustomerGateway(params: EC2.Types.CreateCustomerGatewayRequest, callback?: (err: AWSError, data: EC2.Types.CreateCustomerGatewayResult) => void): Request<EC2.Types.CreateCustomerGatewayResult, AWSError>;
379
379
  /**
380
- * Provides information to AWS about your VPN customer gateway device. The customer gateway is the appliance at your end of the VPN connection. (The device on the AWS side of the VPN connection is the virtual private gateway.) You must provide the Internet-routable IP address of the customer gateway's external interface. The IP address must be static and can be behind a device performing network address translation (NAT). For devices that use Border Gateway Protocol (BGP), you can also provide the device's BGP Autonomous System Number (ASN). You can use an existing ASN assigned to your network. If you don't have an ASN already, you can use a private ASN (in the 64512 - 65534 range). Amazon EC2 supports all 2-byte ASN numbers in the range of 1 - 65534, with the exception of 7224, which is reserved in the us-east-1 Region, and 9059, which is reserved in the eu-west-1 Region. For more information, see AWS Site-to-Site VPN in the AWS Site-to-Site VPN User Guide. To create more than one customer gateway with the same VPN type, IP address, and BGP ASN, specify a unique device name for each customer gateway. Identical requests return information about the existing customer gateway and do not create new customer gateways.
380
+ * Provides information to AWS about your VPN customer gateway device. The customer gateway is the appliance at your end of the VPN connection. (The device on the AWS side of the VPN connection is the virtual private gateway.) You must provide the internet-routable IP address of the customer gateway's external interface. The IP address must be static and can be behind a device performing network address translation (NAT). For devices that use Border Gateway Protocol (BGP), you can also provide the device's BGP Autonomous System Number (ASN). You can use an existing ASN assigned to your network. If you don't have an ASN already, you can use a private ASN (in the 64512 - 65534 range). Amazon EC2 supports all 4-byte ASN numbers in the range of 1 - 2147483647, with the exception of the following: 7224 - reserved in the us-east-1 Region 9059 - reserved in the eu-west-1 Region 17943 - reserved in the ap-southeast-1 Region 10124 - reserved in the ap-northeast-1 Region For more information, see AWS Site-to-Site VPN in the AWS Site-to-Site VPN User Guide. To create more than one customer gateway with the same VPN type, IP address, and BGP ASN, specify a unique device name for each customer gateway. Identical requests return information about the existing customer gateway and do not create new customer gateways.
381
381
  */
382
382
  createCustomerGateway(callback?: (err: AWSError, data: EC2.Types.CreateCustomerGatewayResult) => void): Request<EC2.Types.CreateCustomerGatewayResult, AWSError>;
383
383
  /**
@@ -2916,6 +2916,14 @@ declare class EC2 extends Service {
2916
2916
  * Modifies the customer gateway or the target gateway of an AWS Site-to-Site VPN connection. To modify the target gateway, the following migration options are available: An existing virtual private gateway to a new virtual private gateway An existing virtual private gateway to a transit gateway An existing transit gateway to a new transit gateway An existing transit gateway to a virtual private gateway Before you perform the migration to the new gateway, you must configure the new gateway. Use CreateVpnGateway to create a virtual private gateway, or CreateTransitGateway to create a transit gateway. This step is required when you migrate from a virtual private gateway with static routes to a transit gateway. You must delete the static routes before you migrate to the new gateway. Keep a copy of the static route before you delete it. You will need to add back these routes to the transit gateway after the VPN connection migration is complete. After you migrate to the new gateway, you might need to modify your VPC route table. Use CreateRoute and DeleteRoute to make the changes described in VPN Gateway Target Modification Required VPC Route Table Updates in the AWS Site-to-Site VPN User Guide. When the new gateway is a transit gateway, modify the transit gateway route table to allow traffic between the VPC and the AWS Site-to-Site VPN connection. Use CreateTransitGatewayRoute to add the routes. If you deleted VPN static routes, you must add the static routes to the transit gateway route table. After you perform this operation, the AWS VPN endpoint's IP addresses on the AWS side and the tunnel options remain intact. Your AWS Site-to-Site VPN connection will be temporarily unavailable for a brief period while we provision the new endpoints.
2917
2917
  */
2918
2918
  modifyVpnConnection(callback?: (err: AWSError, data: EC2.Types.ModifyVpnConnectionResult) => void): Request<EC2.Types.ModifyVpnConnectionResult, AWSError>;
2919
+ /**
2920
+ * Modifies the connection options for your Site-to-Site VPN VPN connection. When you modify the VPN connection options, the VPN endpoint IP addresses on the AWS side do not change, and the tunnel options do not change. Your VPN connection will be temporarily unavailable for a brief period while the VPN connection is updated.
2921
+ */
2922
+ modifyVpnConnectionOptions(params: EC2.Types.ModifyVpnConnectionOptionsRequest, callback?: (err: AWSError, data: EC2.Types.ModifyVpnConnectionOptionsResult) => void): Request<EC2.Types.ModifyVpnConnectionOptionsResult, AWSError>;
2923
+ /**
2924
+ * Modifies the connection options for your Site-to-Site VPN VPN connection. When you modify the VPN connection options, the VPN endpoint IP addresses on the AWS side do not change, and the tunnel options do not change. Your VPN connection will be temporarily unavailable for a brief period while the VPN connection is updated.
2925
+ */
2926
+ modifyVpnConnectionOptions(callback?: (err: AWSError, data: EC2.Types.ModifyVpnConnectionOptionsResult) => void): Request<EC2.Types.ModifyVpnConnectionOptionsResult, AWSError>;
2919
2927
  /**
2920
2928
  * Modifies the VPN tunnel endpoint certificate.
2921
2929
  */
@@ -18913,6 +18921,35 @@ declare namespace EC2 {
18913
18921
  */
18914
18922
  ReturnValue?: Boolean;
18915
18923
  }
18924
+ export interface ModifyVpnConnectionOptionsRequest {
18925
+ /**
18926
+ * The ID of the Site-to-Site VPN VPN connection.
18927
+ */
18928
+ VpnConnectionId: VpnConnectionId;
18929
+ /**
18930
+ * The IPv4 CIDR on the customer gateway (on-premises) side of the VPN connection. Default: 0.0.0.0/0
18931
+ */
18932
+ LocalIpv4NetworkCidr?: String;
18933
+ /**
18934
+ * The IPv4 CIDR on the AWS side of the VPN connection. Default: 0.0.0.0/0
18935
+ */
18936
+ RemoteIpv4NetworkCidr?: String;
18937
+ /**
18938
+ * The IPv6 CIDR on the customer gateway (on-premises) side of the VPN connection. Default: ::/0
18939
+ */
18940
+ LocalIpv6NetworkCidr?: String;
18941
+ /**
18942
+ * The IPv6 CIDR on the AWS side of the VPN connection. Default: ::/0
18943
+ */
18944
+ RemoteIpv6NetworkCidr?: String;
18945
+ /**
18946
+ * Checks whether you have the required permissions for the action, without actually making the request, and provides an error response. If you have the required permissions, the error response is DryRunOperation. Otherwise, it is UnauthorizedOperation.
18947
+ */
18948
+ DryRun?: Boolean;
18949
+ }
18950
+ export interface ModifyVpnConnectionOptionsResult {
18951
+ VpnConnection?: VpnConnection;
18952
+ }
18916
18953
  export interface ModifyVpnConnectionRequest {
18917
18954
  /**
18918
18955
  * The ID of the VPN connection.
@@ -19013,6 +19050,10 @@ declare namespace EC2 {
19013
19050
  * The number of seconds after which a DPD timeout occurs. Constraints: A value between 0 and 30. Default: 30
19014
19051
  */
19015
19052
  DPDTimeoutSeconds?: Integer;
19053
+ /**
19054
+ * The action to take after DPD timeout occurs. Specify restart to restart the IKE initiation. Specify clear to end the IKE session. Valid Values: clear | none | restart Default: clear
19055
+ */
19056
+ DPDTimeoutAction?: String;
19016
19057
  /**
19017
19058
  * One or more encryption algorithms that are permitted for the VPN tunnel for phase 1 IKE negotiations. Valid values: AES128 | AES256 | AES128-GCM-16 | AES256-GCM-16
19018
19059
  */
@@ -19041,6 +19082,10 @@ declare namespace EC2 {
19041
19082
  * The IKE versions that are permitted for the VPN tunnel. Valid values: ikev1 | ikev2
19042
19083
  */
19043
19084
  IKEVersions?: IKEVersionsRequestList;
19085
+ /**
19086
+ * The action to take when the establishing the tunnel for the VPN connection. By default, your customer gateway device must initiate the IKE negotiation and bring up the tunnel. Specify start for AWS to initiate the IKE negotiation. Valid Values: add | start Default: add
19087
+ */
19088
+ StartupAction?: String;
19044
19089
  }
19045
19090
  export interface MonitorInstancesRequest {
19046
19091
  /**
@@ -24736,6 +24781,10 @@ declare namespace EC2 {
24736
24781
  * The number of seconds after which a DPD timeout occurs.
24737
24782
  */
24738
24783
  DpdTimeoutSeconds?: Integer;
24784
+ /**
24785
+ * The action to take after a DPD timeout occurs.
24786
+ */
24787
+ DpdTimeoutAction?: String;
24739
24788
  /**
24740
24789
  * The permitted encryption algorithms for the VPN tunnel for phase 1 IKE negotiations.
24741
24790
  */
@@ -24764,6 +24813,10 @@ declare namespace EC2 {
24764
24813
  * The IKE versions that are permitted for the VPN tunnel.
24765
24814
  */
24766
24815
  IkeVersions?: IKEVersionsList;
24816
+ /**
24817
+ * The action to take when the establishing the VPN tunnels for a VPN connection.
24818
+ */
24819
+ StartupAction?: String;
24767
24820
  }
24768
24821
  export type TunnelOptionsList = TunnelOption[];
24769
24822
  export interface UnassignIpv6AddressesRequest {
@@ -25685,6 +25738,22 @@ declare namespace EC2 {
25685
25738
  * Indicates whether the VPN connection uses static routes only. Static routes must be used for devices that don't support BGP.
25686
25739
  */
25687
25740
  StaticRoutesOnly?: Boolean;
25741
+ /**
25742
+ * The IPv4 CIDR on the customer gateway (on-premises) side of the VPN connection.
25743
+ */
25744
+ LocalIpv4NetworkCidr?: String;
25745
+ /**
25746
+ * The IPv4 CIDR on the AWS side of the VPN connection.
25747
+ */
25748
+ RemoteIpv4NetworkCidr?: String;
25749
+ /**
25750
+ * The IPv6 CIDR on the customer gateway (on-premises) side of the VPN connection.
25751
+ */
25752
+ LocalIpv6NetworkCidr?: String;
25753
+ /**
25754
+ * The IPv6 CIDR on the AWS side of the VPN connection.
25755
+ */
25756
+ RemoteIpv6NetworkCidr?: String;
25688
25757
  /**
25689
25758
  * Indicates whether the VPN tunnels process IPv4 or IPv6 traffic.
25690
25759
  */
@@ -25711,6 +25780,22 @@ declare namespace EC2 {
25711
25780
  * The tunnel options for the VPN connection.
25712
25781
  */
25713
25782
  TunnelOptions?: VpnTunnelOptionsSpecificationsList;
25783
+ /**
25784
+ * The IPv4 CIDR on the customer gateway (on-premises) side of the VPN connection. Default: 0.0.0.0/0
25785
+ */
25786
+ LocalIpv4NetworkCidr?: String;
25787
+ /**
25788
+ * The IPv4 CIDR on the AWS side of the VPN connection. Default: 0.0.0.0/0
25789
+ */
25790
+ RemoteIpv4NetworkCidr?: String;
25791
+ /**
25792
+ * The IPv6 CIDR on the customer gateway (on-premises) side of the VPN connection. Default: ::/0
25793
+ */
25794
+ LocalIpv6NetworkCidr?: String;
25795
+ /**
25796
+ * The IPv6 CIDR on the AWS side of the VPN connection. Default: ::/0
25797
+ */
25798
+ RemoteIpv6NetworkCidr?: String;
25714
25799
  }
25715
25800
  export type VpnEcmpSupportValue = "enable"|"disable"|string;
25716
25801
  export interface VpnGateway {
@@ -25801,6 +25886,10 @@ declare namespace EC2 {
25801
25886
  * The number of seconds after which a DPD timeout occurs. Constraints: A value between 0 and 30. Default: 30
25802
25887
  */
25803
25888
  DPDTimeoutSeconds?: Integer;
25889
+ /**
25890
+ * The action to take after DPD timeout occurs. Specify restart to restart the IKE initiation. Specify clear to end the IKE session. Valid Values: clear | none | restart Default: clear
25891
+ */
25892
+ DPDTimeoutAction?: String;
25804
25893
  /**
25805
25894
  * One or more encryption algorithms that are permitted for the VPN tunnel for phase 1 IKE negotiations. Valid values: AES128 | AES256 | AES128-GCM-16 | AES256-GCM-16
25806
25895
  */
@@ -25829,6 +25918,10 @@ declare namespace EC2 {
25829
25918
  * The IKE versions that are permitted for the VPN tunnel. Valid values: ikev1 | ikev2
25830
25919
  */
25831
25920
  IKEVersions?: IKEVersionsRequestList;
25921
+ /**
25922
+ * The action to take when the establishing the tunnel for the VPN connection. By default, your customer gateway device must initiate the IKE negotiation and bring up the tunnel. Specify start for AWS to initiate the IKE negotiation. Valid Values: add | start Default: add
25923
+ */
25924
+ StartupAction?: String;
25832
25925
  }
25833
25926
  export type VpnTunnelOptionsSpecificationsList = VpnTunnelOptionsSpecification[];
25834
25927
  export interface WithdrawByoipCidrRequest {