aws-sdk 2.987.0 → 2.991.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (46) hide show
  1. package/CHANGELOG.md +25 -1
  2. package/README.md +1 -1
  3. package/apis/chime-2018-05-01.min.json +148 -139
  4. package/apis/comprehend-2017-11-27.min.json +114 -97
  5. package/apis/dms-2016-01-01.min.json +3 -0
  6. package/apis/ec2-2016-11-15.min.json +48 -48
  7. package/apis/es-2015-01-01.min.json +14 -4
  8. package/apis/iot-2015-05-28.min.json +136 -119
  9. package/apis/kafkaconnect-2021-09-14.examples.json +5 -0
  10. package/apis/kafkaconnect-2021-09-14.min.json +960 -0
  11. package/apis/kafkaconnect-2021-09-14.paginators.json +22 -0
  12. package/apis/macie2-2020-01-01.min.json +159 -108
  13. package/apis/metadata.json +3 -0
  14. package/apis/opensearch-2021-01-01.min.json +14 -4
  15. package/apis/pinpoint-2016-12-01.min.json +719 -329
  16. package/apis/robomaker-2018-06-29.min.json +138 -86
  17. package/apis/s3-2006-03-01.examples.json +145 -145
  18. package/apis/s3-2006-03-01.min.json +80 -78
  19. package/apis/sagemaker-2017-07-24.min.json +71 -22
  20. package/apis/transcribe-2017-10-26.min.json +30 -6
  21. package/apis/wafv2-2019-07-29.min.json +1 -0
  22. package/clients/all.d.ts +1 -0
  23. package/clients/all.js +2 -1
  24. package/clients/chime.d.ts +10 -5
  25. package/clients/comprehend.d.ts +35 -0
  26. package/clients/dms.d.ts +14 -10
  27. package/clients/ec2.d.ts +73 -73
  28. package/clients/es.d.ts +18 -3
  29. package/clients/iot.d.ts +28 -2
  30. package/clients/kafkaconnect.d.ts +1132 -0
  31. package/clients/kafkaconnect.js +18 -0
  32. package/clients/macie2.d.ts +75 -23
  33. package/clients/opensearch.d.ts +22 -1
  34. package/clients/pinpoint.d.ts +408 -4
  35. package/clients/robomaker.d.ts +85 -4
  36. package/clients/s3.d.ts +53 -44
  37. package/clients/sagemaker.d.ts +90 -17
  38. package/clients/transcribeservice.d.ts +27 -0
  39. package/clients/wafv2.d.ts +22 -18
  40. package/dist/aws-sdk-core-react-native.js +2 -2
  41. package/dist/aws-sdk-react-native.js +55 -18
  42. package/dist/aws-sdk.js +384 -345
  43. package/dist/aws-sdk.min.js +72 -72
  44. package/lib/config_service_placeholders.d.ts +2 -0
  45. package/lib/core.js +1 -1
  46. package/package.json +1 -1
@@ -125,11 +125,11 @@ declare class SageMaker extends Service {
125
125
  */
126
126
  createDeviceFleet(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
127
127
  /**
128
- * Creates a Domain used by Amazon SageMaker Studio. A domain consists of an associated Amazon Elastic File System (EFS) volume, a list of authorized users, and a variety of security, application, policy, and Amazon Virtual Private Cloud (VPC) configurations. An Amazon Web Services account is limited to one domain per region. Users within a domain can share notebook files and other artifacts with each other. EFS storage When a domain is created, an EFS volume is created for use by all of the users within the domain. Each user receives a private home directory within the EFS volume for notebooks, Git repositories, and data files. SageMaker uses the Amazon Web Services Key Management Service (Amazon Web Services KMS) to encrypt the EFS volume attached to the domain with an Amazon Web Services managed customer master key (CMK) by default. For more control, you can specify a customer managed CMK. For more information, see Protect Data at Rest Using Encryption. VPC configuration All SageMaker Studio traffic between the domain and the EFS volume is through the specified VPC and subnets. For other Studio traffic, you can specify the AppNetworkAccessType parameter. AppNetworkAccessType corresponds to the network access type that you choose when you onboard to Studio. The following options are available: PublicInternetOnly - Non-EFS traffic goes through a VPC managed by Amazon SageMaker, which allows internet access. This is the default value. VpcOnly - All Studio traffic is through the specified VPC and subnets. Internet access is disabled by default. To allow internet access, you must specify a NAT gateway. When internet access is disabled, you won't be able to run a Studio notebook or to train or host models unless your VPC has an interface endpoint to the SageMaker API and runtime or a NAT gateway and your security groups allow outbound connections. NFS traffic over TCP on port 2049 needs to be allowed in both inbound and outbound rules in order to launch a SageMaker Studio app successfully. For more information, see Connect SageMaker Studio Notebooks to Resources in a VPC.
128
+ * Creates a Domain used by Amazon SageMaker Studio. A domain consists of an associated Amazon Elastic File System (EFS) volume, a list of authorized users, and a variety of security, application, policy, and Amazon Virtual Private Cloud (VPC) configurations. An Amazon Web Services account is limited to one domain per region. Users within a domain can share notebook files and other artifacts with each other. EFS storage When a domain is created, an EFS volume is created for use by all of the users within the domain. Each user receives a private home directory within the EFS volume for notebooks, Git repositories, and data files. SageMaker uses the Amazon Web Services Key Management Service (Amazon Web Services KMS) to encrypt the EFS volume attached to the domain with an Amazon Web Services managed key by default. For more control, you can specify a customer managed key. For more information, see Protect Data at Rest Using Encryption. VPC configuration All SageMaker Studio traffic between the domain and the EFS volume is through the specified VPC and subnets. For other Studio traffic, you can specify the AppNetworkAccessType parameter. AppNetworkAccessType corresponds to the network access type that you choose when you onboard to Studio. The following options are available: PublicInternetOnly - Non-EFS traffic goes through a VPC managed by Amazon SageMaker, which allows internet access. This is the default value. VpcOnly - All Studio traffic is through the specified VPC and subnets. Internet access is disabled by default. To allow internet access, you must specify a NAT gateway. When internet access is disabled, you won't be able to run a Studio notebook or to train or host models unless your VPC has an interface endpoint to the SageMaker API and runtime or a NAT gateway and your security groups allow outbound connections. NFS traffic over TCP on port 2049 needs to be allowed in both inbound and outbound rules in order to launch a SageMaker Studio app successfully. For more information, see Connect SageMaker Studio Notebooks to Resources in a VPC.
129
129
  */
130
130
  createDomain(params: SageMaker.Types.CreateDomainRequest, callback?: (err: AWSError, data: SageMaker.Types.CreateDomainResponse) => void): Request<SageMaker.Types.CreateDomainResponse, AWSError>;
131
131
  /**
132
- * Creates a Domain used by Amazon SageMaker Studio. A domain consists of an associated Amazon Elastic File System (EFS) volume, a list of authorized users, and a variety of security, application, policy, and Amazon Virtual Private Cloud (VPC) configurations. An Amazon Web Services account is limited to one domain per region. Users within a domain can share notebook files and other artifacts with each other. EFS storage When a domain is created, an EFS volume is created for use by all of the users within the domain. Each user receives a private home directory within the EFS volume for notebooks, Git repositories, and data files. SageMaker uses the Amazon Web Services Key Management Service (Amazon Web Services KMS) to encrypt the EFS volume attached to the domain with an Amazon Web Services managed customer master key (CMK) by default. For more control, you can specify a customer managed CMK. For more information, see Protect Data at Rest Using Encryption. VPC configuration All SageMaker Studio traffic between the domain and the EFS volume is through the specified VPC and subnets. For other Studio traffic, you can specify the AppNetworkAccessType parameter. AppNetworkAccessType corresponds to the network access type that you choose when you onboard to Studio. The following options are available: PublicInternetOnly - Non-EFS traffic goes through a VPC managed by Amazon SageMaker, which allows internet access. This is the default value. VpcOnly - All Studio traffic is through the specified VPC and subnets. Internet access is disabled by default. To allow internet access, you must specify a NAT gateway. When internet access is disabled, you won't be able to run a Studio notebook or to train or host models unless your VPC has an interface endpoint to the SageMaker API and runtime or a NAT gateway and your security groups allow outbound connections. NFS traffic over TCP on port 2049 needs to be allowed in both inbound and outbound rules in order to launch a SageMaker Studio app successfully. For more information, see Connect SageMaker Studio Notebooks to Resources in a VPC.
132
+ * Creates a Domain used by Amazon SageMaker Studio. A domain consists of an associated Amazon Elastic File System (EFS) volume, a list of authorized users, and a variety of security, application, policy, and Amazon Virtual Private Cloud (VPC) configurations. An Amazon Web Services account is limited to one domain per region. Users within a domain can share notebook files and other artifacts with each other. EFS storage When a domain is created, an EFS volume is created for use by all of the users within the domain. Each user receives a private home directory within the EFS volume for notebooks, Git repositories, and data files. SageMaker uses the Amazon Web Services Key Management Service (Amazon Web Services KMS) to encrypt the EFS volume attached to the domain with an Amazon Web Services managed key by default. For more control, you can specify a customer managed key. For more information, see Protect Data at Rest Using Encryption. VPC configuration All SageMaker Studio traffic between the domain and the EFS volume is through the specified VPC and subnets. For other Studio traffic, you can specify the AppNetworkAccessType parameter. AppNetworkAccessType corresponds to the network access type that you choose when you onboard to Studio. The following options are available: PublicInternetOnly - Non-EFS traffic goes through a VPC managed by Amazon SageMaker, which allows internet access. This is the default value. VpcOnly - All Studio traffic is through the specified VPC and subnets. Internet access is disabled by default. To allow internet access, you must specify a NAT gateway. When internet access is disabled, you won't be able to run a Studio notebook or to train or host models unless your VPC has an interface endpoint to the SageMaker API and runtime or a NAT gateway and your security groups allow outbound connections. NFS traffic over TCP on port 2049 needs to be allowed in both inbound and outbound rules in order to launch a SageMaker Studio app successfully. For more information, see Connect SageMaker Studio Notebooks to Resources in a VPC.
133
133
  */
134
134
  createDomain(callback?: (err: AWSError, data: SageMaker.Types.CreateDomainResponse) => void): Request<SageMaker.Types.CreateDomainResponse, AWSError>;
135
135
  /**
@@ -1596,6 +1596,14 @@ declare class SageMaker extends Service {
1596
1596
  * Renders the UI template so that you can preview the worker's experience.
1597
1597
  */
1598
1598
  renderUiTemplate(callback?: (err: AWSError, data: SageMaker.Types.RenderUiTemplateResponse) => void): Request<SageMaker.Types.RenderUiTemplateResponse, AWSError>;
1599
+ /**
1600
+ * Retry the execution of the pipeline.
1601
+ */
1602
+ retryPipelineExecution(params: SageMaker.Types.RetryPipelineExecutionRequest, callback?: (err: AWSError, data: SageMaker.Types.RetryPipelineExecutionResponse) => void): Request<SageMaker.Types.RetryPipelineExecutionResponse, AWSError>;
1603
+ /**
1604
+ * Retry the execution of the pipeline.
1605
+ */
1606
+ retryPipelineExecution(callback?: (err: AWSError, data: SageMaker.Types.RetryPipelineExecutionResponse) => void): Request<SageMaker.Types.RetryPipelineExecutionResponse, AWSError>;
1599
1607
  /**
1600
1608
  * Finds Amazon SageMaker resources that match a search query. Matching resources are returned as a list of SearchRecord objects in the response. You can sort the search results by any resource property in a ascending or descending order. You can query against the following value types: numeric, text, Boolean, and timestamp.
1601
1609
  */
@@ -3561,7 +3569,7 @@ declare namespace SageMaker {
3561
3569
  */
3562
3570
  HomeEfsFileSystemKmsKeyId?: KmsKeyId;
3563
3571
  /**
3564
- * SageMaker uses Amazon Web Services KMS to encrypt the EFS volume attached to the domain with an Amazon Web Services managed customer master key (CMK) by default. For more control, specify a customer managed CMK.
3572
+ * SageMaker uses Amazon Web Services KMS to encrypt the EFS volume attached to the domain with an Amazon Web Services managed key by default. For more control, specify a customer managed key.
3565
3573
  */
3566
3574
  KmsKeyId?: KmsKeyId;
3567
3575
  }
@@ -3601,7 +3609,7 @@ declare namespace SageMaker {
3601
3609
  */
3602
3610
  OutputConfig: EdgeOutputConfig;
3603
3611
  /**
3604
- * The CMK to use when encrypting the EBS volume the edge packaging job runs on.
3612
+ * The Amazon Web Services KMS key to use when encrypting the EBS volume the edge packaging job runs on.
3605
3613
  */
3606
3614
  ResourceKey?: KmsKeyId;
3607
3615
  /**
@@ -6005,7 +6013,7 @@ declare namespace SageMaker {
6005
6013
  */
6006
6014
  VpcId?: VpcId;
6007
6015
  /**
6008
- * The Amazon Web Services KMS customer managed CMK used to encrypt the EFS volume attached to the domain.
6016
+ * The Amazon Web Services KMS customer managed key used to encrypt the EFS volume attached to the domain.
6009
6017
  */
6010
6018
  KmsKeyId?: KmsKeyId;
6011
6019
  }
@@ -6045,7 +6053,7 @@ declare namespace SageMaker {
6045
6053
  */
6046
6054
  OutputConfig?: EdgeOutputConfig;
6047
6055
  /**
6048
- * The CMK to use when encrypting the EBS volume the job run on.
6056
+ * The Amazon Web Services KMS key to use when encrypting the EBS volume the job run on.
6049
6057
  */
6050
6058
  ResourceKey?: KmsKeyId;
6051
6059
  /**
@@ -7594,7 +7602,7 @@ declare namespace SageMaker {
7594
7602
  */
7595
7603
  CreationTime?: Timestamp;
7596
7604
  /**
7597
- * Who created the component.
7605
+ * Who created the trial component.
7598
7606
  */
7599
7607
  CreatedBy?: UserContext;
7600
7608
  /**
@@ -8222,6 +8230,9 @@ declare namespace SageMaker {
8222
8230
  * When the experiment was created.
8223
8231
  */
8224
8232
  CreationTime?: Timestamp;
8233
+ /**
8234
+ * Who created the experiment.
8235
+ */
8225
8236
  CreatedBy?: UserContext;
8226
8237
  /**
8227
8238
  * When the experiment was last modified.
@@ -9204,7 +9215,7 @@ declare namespace SageMaker {
9204
9215
  */
9205
9216
  CustomImages?: CustomImages;
9206
9217
  /**
9207
- * The Amazon Resource Name (ARN) of the Lifecycle Configurations attached to the KernelGatewayApp.
9218
+ * The Amazon Resource Name (ARN) of the Lifecycle Configurations attached to the the user profile or domain.
9208
9219
  */
9209
9220
  LifecycleConfigArns?: LifecycleConfigArns;
9210
9221
  }
@@ -9365,7 +9376,7 @@ declare namespace SageMaker {
9365
9376
  }
9366
9377
  export interface LabelingJobResourceConfig {
9367
9378
  /**
9368
- * The Amazon Web Services Key Management Service (Amazon Web Services KMS) key that Amazon SageMaker uses to encrypt data on the storage volume attached to the ML compute instance(s) that run the training and inference jobs used for automated data labeling. You can only specify a VolumeKmsKeyId when you create a labeling job with automated data labeling enabled using the API operation CreateLabelingJob. You cannot specify an Amazon Web Services KMS customer managed CMK to encrypt the storage volume used for automated data labeling model training and inference when you create a labeling job using the console. To learn more, see Output Data and Storage Volume Encryption. The VolumeKmsKeyId can be any of the following formats: KMS Key ID "1234abcd-12ab-34cd-56ef-1234567890ab" Amazon Resource Name (ARN) of a KMS Key "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
9379
+ * The Amazon Web Services Key Management Service (Amazon Web Services KMS) key that Amazon SageMaker uses to encrypt data on the storage volume attached to the ML compute instance(s) that run the training and inference jobs used for automated data labeling. You can only specify a VolumeKmsKeyId when you create a labeling job with automated data labeling enabled using the API operation CreateLabelingJob. You cannot specify an Amazon Web Services KMS key to encrypt the storage volume used for automated data labeling model training and inference when you create a labeling job using the console. To learn more, see Output Data and Storage Volume Encryption. The VolumeKmsKeyId can be any of the following formats: KMS Key ID "1234abcd-12ab-34cd-56ef-1234567890ab" Amazon Resource Name (ARN) of a KMS Key "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
9369
9380
  */
9370
9381
  VolumeKmsKeyId?: KmsKeyId;
9371
9382
  }
@@ -10893,7 +10904,7 @@ declare namespace SageMaker {
10893
10904
  */
10894
10905
  MaxResults?: MaxResults;
10895
10906
  /**
10896
- * A string in the training job name. This filter returns only models in the training job whose name contains the specified string.
10907
+ * A string in the model name. This filter returns only models whose name contains the specified string.
10897
10908
  */
10898
10909
  NameContains?: ModelNameContains;
10899
10910
  /**
@@ -12993,7 +13004,7 @@ declare namespace SageMaker {
12993
13004
  }
12994
13005
  export interface OutputDataConfig {
12995
13006
  /**
12996
- * The Amazon Web Services Key Management Service (Amazon Web Services KMS) key that Amazon SageMaker uses to encrypt the model artifacts at rest using Amazon S3 server-side encryption. The KmsKeyId can be any of the following formats: // KMS Key ID "1234abcd-12ab-34cd-56ef-1234567890ab" // Amazon Resource Name (ARN) of a KMS Key "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab" // KMS Key Alias "alias/ExampleAlias" // Amazon Resource Name (ARN) of a KMS Key Alias "arn:aws:kms:us-west-2:111122223333:alias/ExampleAlias" If you use a KMS key ID or an alias of your master key, the Amazon SageMaker execution role must include permissions to call kms:Encrypt. If you don't provide a KMS key ID, Amazon SageMaker uses the default KMS key for Amazon S3 for your role's account. Amazon SageMaker uses server-side encryption with KMS-managed keys for OutputDataConfig. If you use a bucket policy with an s3:PutObject permission that only allows objects with server-side encryption, set the condition key of s3:x-amz-server-side-encryption to "aws:kms". For more information, see KMS-Managed Encryption Keys in the Amazon Simple Storage Service Developer Guide. The KMS key policy must grant permission to the IAM role that you specify in your CreateTrainingJob, CreateTransformJob, or CreateHyperParameterTuningJob requests. For more information, see Using Key Policies in Amazon Web Services KMS in the Amazon Web Services Key Management Service Developer Guide.
13007
+ * The Amazon Web Services Key Management Service (Amazon Web Services KMS) key that Amazon SageMaker uses to encrypt the model artifacts at rest using Amazon S3 server-side encryption. The KmsKeyId can be any of the following formats: // KMS Key ID "1234abcd-12ab-34cd-56ef-1234567890ab" // Amazon Resource Name (ARN) of a KMS Key "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab" // KMS Key Alias "alias/ExampleAlias" // Amazon Resource Name (ARN) of a KMS Key Alias "arn:aws:kms:us-west-2:111122223333:alias/ExampleAlias" If you use a KMS key ID or an alias of your KMS key, the Amazon SageMaker execution role must include permissions to call kms:Encrypt. If you don't provide a KMS key ID, Amazon SageMaker uses the default KMS key for Amazon S3 for your role's account. Amazon SageMaker uses server-side encryption with KMS-managed keys for OutputDataConfig. If you use a bucket policy with an s3:PutObject permission that only allows objects with server-side encryption, set the condition key of s3:x-amz-server-side-encryption to "aws:kms". For more information, see KMS-Managed Encryption Keys in the Amazon Simple Storage Service Developer Guide. The KMS key policy must grant permission to the IAM role that you specify in your CreateTrainingJob, CreateTransformJob, or CreateHyperParameterTuningJob requests. For more information, see Using Key Policies in Amazon Web Services KMS in the Amazon Web Services Key Management Service Developer Guide.
12997
13008
  */
12998
13009
  KmsKeyId?: KmsKeyId;
12999
13010
  /**
@@ -13605,7 +13616,7 @@ declare namespace SageMaker {
13605
13616
  */
13606
13617
  DestinationS3Uri: DestinationS3Uri;
13607
13618
  /**
13608
- * The Amazon Web Services Key Management Service (Amazon Web Services KMS) key that Amazon SageMaker uses to encrypt the core dump data at rest using Amazon S3 server-side encryption. The KmsKeyId can be any of the following formats: // KMS Key ID "1234abcd-12ab-34cd-56ef-1234567890ab" // Amazon Resource Name (ARN) of a KMS Key "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab" // KMS Key Alias "alias/ExampleAlias" // Amazon Resource Name (ARN) of a KMS Key Alias "arn:aws:kms:us-west-2:111122223333:alias/ExampleAlias" If you use a KMS key ID or an alias of your master key, the Amazon SageMaker execution role must include permissions to call kms:Encrypt. If you don't provide a KMS key ID, Amazon SageMaker uses the default KMS key for Amazon S3 for your role's account. Amazon SageMaker uses server-side encryption with KMS-managed keys for OutputDataConfig. If you use a bucket policy with an s3:PutObject permission that only allows objects with server-side encryption, set the condition key of s3:x-amz-server-side-encryption to "aws:kms". For more information, see KMS-Managed Encryption Keys in the Amazon Simple Storage Service Developer Guide. The KMS key policy must grant permission to the IAM role that you specify in your CreateEndpoint and UpdateEndpoint requests. For more information, see Using Key Policies in Amazon Web Services KMS in the Amazon Web Services Key Management Service Developer Guide.
13619
+ * The Amazon Web Services Key Management Service (Amazon Web Services KMS) key that Amazon SageMaker uses to encrypt the core dump data at rest using Amazon S3 server-side encryption. The KmsKeyId can be any of the following formats: // KMS Key ID "1234abcd-12ab-34cd-56ef-1234567890ab" // Amazon Resource Name (ARN) of a KMS Key "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab" // KMS Key Alias "alias/ExampleAlias" // Amazon Resource Name (ARN) of a KMS Key Alias "arn:aws:kms:us-west-2:111122223333:alias/ExampleAlias" If you use a KMS key ID or an alias of your KMS key, the Amazon SageMaker execution role must include permissions to call kms:Encrypt. If you don't provide a KMS key ID, Amazon SageMaker uses the default KMS key for Amazon S3 for your role's account. Amazon SageMaker uses server-side encryption with KMS-managed keys for OutputDataConfig. If you use a bucket policy with an s3:PutObject permission that only allows objects with server-side encryption, set the condition key of s3:x-amz-server-side-encryption to "aws:kms". For more information, see KMS-Managed Encryption Keys in the Amazon Simple Storage Service Developer Guide. The KMS key policy must grant permission to the IAM role that you specify in your CreateEndpoint and UpdateEndpoint requests. For more information, see Using Key Policies in Amazon Web Services KMS in the Amazon Web Services Key Management Service Developer Guide.
13609
13620
  */
13610
13621
  KmsKeyId?: KmsKeyId;
13611
13622
  }
@@ -13727,6 +13738,42 @@ declare namespace SageMaker {
13727
13738
  export type ProfilingIntervalInMilliseconds = number;
13728
13739
  export type ProfilingParameters = {[key: string]: ConfigValue};
13729
13740
  export type ProfilingStatus = "Enabled"|"Disabled"|string;
13741
+ export interface Project {
13742
+ /**
13743
+ * The Amazon Resource Name (ARN) of the project.
13744
+ */
13745
+ ProjectArn?: ProjectArn;
13746
+ /**
13747
+ * The name of the project.
13748
+ */
13749
+ ProjectName?: ProjectEntityName;
13750
+ /**
13751
+ * The ID of the project.
13752
+ */
13753
+ ProjectId?: ProjectId;
13754
+ /**
13755
+ * The description of the project.
13756
+ */
13757
+ ProjectDescription?: EntityDescription;
13758
+ ServiceCatalogProvisioningDetails?: ServiceCatalogProvisioningDetails;
13759
+ ServiceCatalogProvisionedProductDetails?: ServiceCatalogProvisionedProductDetails;
13760
+ /**
13761
+ * The status of the project.
13762
+ */
13763
+ ProjectStatus?: ProjectStatus;
13764
+ /**
13765
+ * Who created the project.
13766
+ */
13767
+ CreatedBy?: UserContext;
13768
+ /**
13769
+ * A timestamp specifying when the project was created.
13770
+ */
13771
+ CreationTime?: Timestamp;
13772
+ /**
13773
+ * An array of key-value pairs. You can use tags to categorize your Amazon Web Services resources in different ways, for example, by purpose, owner, or environment. For more information, see Tagging Amazon Web Services Resources.
13774
+ */
13775
+ Tags?: TagList;
13776
+ }
13730
13777
  export type ProjectArn = string;
13731
13778
  export type ProjectEntityName = string;
13732
13779
  export type ProjectId = string;
@@ -13964,11 +14011,11 @@ declare namespace SageMaker {
13964
14011
  */
13965
14012
  InstanceType?: AppInstanceType;
13966
14013
  /**
13967
- * The Amazon Resource Name (ARN) of the Lifecycle Configurations attached to the Resource.
14014
+ * The Amazon Resource Name (ARN) of the Lifecycle Configuration attached to the Resource.
13968
14015
  */
13969
14016
  LifecycleConfigArn?: StudioLifecycleConfigArn;
13970
14017
  }
13971
- export type ResourceType = "TrainingJob"|"Experiment"|"ExperimentTrial"|"ExperimentTrialComponent"|"Endpoint"|"ModelPackage"|"ModelPackageGroup"|"Pipeline"|"PipelineExecution"|"FeatureGroup"|string;
14018
+ export type ResourceType = "TrainingJob"|"Experiment"|"ExperimentTrial"|"ExperimentTrialComponent"|"Endpoint"|"ModelPackage"|"ModelPackageGroup"|"Pipeline"|"PipelineExecution"|"FeatureGroup"|"Project"|string;
13972
14019
  export type ResponseMIMEType = string;
13973
14020
  export type ResponseMIMETypes = ResponseMIMEType[];
13974
14021
  export interface RetentionPolicy {
@@ -13978,6 +14025,22 @@ declare namespace SageMaker {
13978
14025
  HomeEfsFileSystem?: RetentionType;
13979
14026
  }
13980
14027
  export type RetentionType = "Retain"|"Delete"|string;
14028
+ export interface RetryPipelineExecutionRequest {
14029
+ /**
14030
+ * The Amazon Resource Name (ARN) of the pipeline execution.
14031
+ */
14032
+ PipelineExecutionArn: PipelineExecutionArn;
14033
+ /**
14034
+ * A unique, case-sensitive identifier that you provide to ensure the idempotency of the operation. An idempotent operation completes no more than once.
14035
+ */
14036
+ ClientRequestToken: IdempotencyToken;
14037
+ }
14038
+ export interface RetryPipelineExecutionResponse {
14039
+ /**
14040
+ * The Amazon Resource Name (ARN) of the pipeline execution.
14041
+ */
14042
+ PipelineExecutionArn?: PipelineExecutionArn;
14043
+ }
13981
14044
  export interface RetryStrategy {
13982
14045
  /**
13983
14046
  * The number of times to retry the job. When the job is retried, it's SecondaryStatus is changed to STARTING.
@@ -14076,6 +14139,10 @@ declare namespace SageMaker {
14076
14139
  Pipeline?: Pipeline;
14077
14140
  PipelineExecution?: PipelineExecution;
14078
14141
  FeatureGroup?: FeatureGroup;
14142
+ /**
14143
+ * The properties of a project.
14144
+ */
14145
+ Project?: Project;
14079
14146
  }
14080
14147
  export interface SearchRequest {
14081
14148
  /**
@@ -14298,7 +14365,7 @@ declare namespace SageMaker {
14298
14365
  */
14299
14366
  PipelineExecutionDescription?: PipelineExecutionDescription;
14300
14367
  /**
14301
- * A unique, case-sensitive identifier that you provide to ensure the idempotency of the operation. An idempotent operation completes no more than one time.
14368
+ * A unique, case-sensitive identifier that you provide to ensure the idempotency of the operation. An idempotent operation completes no more than once.
14302
14369
  */
14303
14370
  ClientRequestToken: IdempotencyToken;
14304
14371
  }
@@ -14360,7 +14427,7 @@ declare namespace SageMaker {
14360
14427
  */
14361
14428
  PipelineExecutionArn: PipelineExecutionArn;
14362
14429
  /**
14363
- * A unique, case-sensitive identifier that you provide to ensure the idempotency of the operation. An idempotent operation completes no more than one time.
14430
+ * A unique, case-sensitive identifier that you provide to ensure the idempotency of the operation. An idempotent operation completes no more than once.
14364
14431
  */
14365
14432
  ClientRequestToken: IdempotencyToken;
14366
14433
  }
@@ -15045,6 +15112,9 @@ declare namespace SageMaker {
15045
15112
  * When the trial was created.
15046
15113
  */
15047
15114
  CreationTime?: Timestamp;
15115
+ /**
15116
+ * Who created the trial.
15117
+ */
15048
15118
  CreatedBy?: UserContext;
15049
15119
  /**
15050
15120
  * Who last modified the trial.
@@ -15092,6 +15162,9 @@ declare namespace SageMaker {
15092
15162
  * When the component was created.
15093
15163
  */
15094
15164
  CreationTime?: Timestamp;
15165
+ /**
15166
+ * Who created the trial component.
15167
+ */
15095
15168
  CreatedBy?: UserContext;
15096
15169
  /**
15097
15170
  * When the component was last modified.
@@ -15283,7 +15356,7 @@ declare namespace SageMaker {
15283
15356
  */
15284
15357
  CreationTime?: Timestamp;
15285
15358
  /**
15286
- * Who created the component.
15359
+ * Who created the trial component.
15287
15360
  */
15288
15361
  CreatedBy?: UserContext;
15289
15362
  /**
@@ -1667,6 +1667,10 @@ declare namespace TranscribeService {
1667
1667
  * An object containing a list of languages that might be present in your collection of audio files. Automatic language identification chooses a language that best matches the source audio from that list. To transcribe speech in Modern Standard Arabic (ar-SA), your audio or video file must be encoded at a sample rate of 16,000 Hz or higher.
1668
1668
  */
1669
1669
  LanguageOptions?: LanguageOptions;
1670
+ /**
1671
+ * Add subtitles to your batch transcription job.
1672
+ */
1673
+ Subtitles?: Subtitles;
1670
1674
  /**
1671
1675
  * Add tags to an Amazon Transcribe transcription job.
1672
1676
  */
@@ -1679,6 +1683,25 @@ declare namespace TranscribeService {
1679
1683
  TranscriptionJob?: TranscriptionJob;
1680
1684
  }
1681
1685
  export type StringTargetList = NonEmptyString[];
1686
+ export type SubtitleFileUris = Uri[];
1687
+ export type SubtitleFormat = "vtt"|"srt"|string;
1688
+ export type SubtitleFormats = SubtitleFormat[];
1689
+ export interface Subtitles {
1690
+ /**
1691
+ * Specify the output format for your subtitle file.
1692
+ */
1693
+ Formats?: SubtitleFormats;
1694
+ }
1695
+ export interface SubtitlesOutput {
1696
+ /**
1697
+ * Specify the output format for your subtitle file; if you select both SRT and VTT formats, two output files are genereated.
1698
+ */
1699
+ Formats?: SubtitleFormats;
1700
+ /**
1701
+ * Choose the output location for your subtitle file. This location must be an S3 bucket.
1702
+ */
1703
+ SubtitleFileUris?: SubtitleFileUris;
1704
+ }
1682
1705
  export interface Tag {
1683
1706
  /**
1684
1707
  * The first part of a key:value pair that forms a tag associated with a given resource. For example, in the tag ‘Department’:’Sales’, the key is 'Department'.
@@ -1821,6 +1844,10 @@ declare namespace TranscribeService {
1821
1844
  * A key:value pair assigned to a given transcription job.
1822
1845
  */
1823
1846
  Tags?: TagList;
1847
+ /**
1848
+ * Generate subtitles for your batch transcription job.
1849
+ */
1850
+ Subtitles?: SubtitlesOutput;
1824
1851
  }
1825
1852
  export type TranscriptionJobName = string;
1826
1853
  export type TranscriptionJobStatus = "QUEUED"|"IN_PROGRESS"|"FAILED"|"COMPLETED"|string;
@@ -148,11 +148,11 @@ declare class WAFV2 extends Service {
148
148
  */
149
149
  getLoggingConfiguration(callback?: (err: AWSError, data: WAFV2.Types.GetLoggingConfigurationResponse) => void): Request<WAFV2.Types.GetLoggingConfigurationResponse, AWSError>;
150
150
  /**
151
- * Retrieves the specified managed rule set. This is intended for use only by vendors of managed rule sets. Vendors are Amazon Web Services and Marketplace sellers. Vendors, you can use the managed rule set APIs to provide controlled rollout of your versioned managed rule group offerings for your customers. The APIs are ListManagedRuleSets, GetManagedRuleSet, PutManagedRuleSetVersions, and UpdateManagedRuleSetVersionExpiryDate.
151
+ * Retrieves the specified managed rule set. This is intended for use only by vendors of managed rule sets. Vendors are Amazon Web Services and Amazon Web Services Marketplace sellers. Vendors, you can use the managed rule set APIs to provide controlled rollout of your versioned managed rule group offerings for your customers. The APIs are ListManagedRuleSets, GetManagedRuleSet, PutManagedRuleSetVersions, and UpdateManagedRuleSetVersionExpiryDate.
152
152
  */
153
153
  getManagedRuleSet(params: WAFV2.Types.GetManagedRuleSetRequest, callback?: (err: AWSError, data: WAFV2.Types.GetManagedRuleSetResponse) => void): Request<WAFV2.Types.GetManagedRuleSetResponse, AWSError>;
154
154
  /**
155
- * Retrieves the specified managed rule set. This is intended for use only by vendors of managed rule sets. Vendors are Amazon Web Services and Marketplace sellers. Vendors, you can use the managed rule set APIs to provide controlled rollout of your versioned managed rule group offerings for your customers. The APIs are ListManagedRuleSets, GetManagedRuleSet, PutManagedRuleSetVersions, and UpdateManagedRuleSetVersionExpiryDate.
155
+ * Retrieves the specified managed rule set. This is intended for use only by vendors of managed rule sets. Vendors are Amazon Web Services and Amazon Web Services Marketplace sellers. Vendors, you can use the managed rule set APIs to provide controlled rollout of your versioned managed rule group offerings for your customers. The APIs are ListManagedRuleSets, GetManagedRuleSet, PutManagedRuleSetVersions, and UpdateManagedRuleSetVersionExpiryDate.
156
156
  */
157
157
  getManagedRuleSet(callback?: (err: AWSError, data: WAFV2.Types.GetManagedRuleSetResponse) => void): Request<WAFV2.Types.GetManagedRuleSetResponse, AWSError>;
158
158
  /**
@@ -164,11 +164,11 @@ declare class WAFV2 extends Service {
164
164
  */
165
165
  getPermissionPolicy(callback?: (err: AWSError, data: WAFV2.Types.GetPermissionPolicyResponse) => void): Request<WAFV2.Types.GetPermissionPolicyResponse, AWSError>;
166
166
  /**
167
- * Retrieves the keys that are currently blocked by a rate-based rule. The maximum number of managed keys that can be blocked for a single rate-based rule is 10,000. If more than 10,000 addresses exceed the rate limit, those with the highest rates are blocked.
167
+ * Retrieves the keys that are currently blocked by a rate-based rule instance. The maximum number of managed keys that can be blocked for a single rate-based rule instance is 10,000. If more than 10,000 addresses exceed the rate limit, those with the highest rates are blocked. For a rate-based rule that you've defined inside a rule group, provide the name of the rule group reference statement in your request, in addition to the rate-based rule name and the web ACL name. WAF monitors web requests and manages keys independently for each unique combination of web ACL, optional rule group, and rate-based rule. For example, if you define a rate-based rule inside a rule group, and then use the rule group in a web ACL, WAF monitors web requests and manages keys for that web ACL, rule group reference statement, and rate-based rule instance. If you use the same rule group in a second web ACL, WAF monitors web requests and manages keys for this second usage completely independent of your first.
168
168
  */
169
169
  getRateBasedStatementManagedKeys(params: WAFV2.Types.GetRateBasedStatementManagedKeysRequest, callback?: (err: AWSError, data: WAFV2.Types.GetRateBasedStatementManagedKeysResponse) => void): Request<WAFV2.Types.GetRateBasedStatementManagedKeysResponse, AWSError>;
170
170
  /**
171
- * Retrieves the keys that are currently blocked by a rate-based rule. The maximum number of managed keys that can be blocked for a single rate-based rule is 10,000. If more than 10,000 addresses exceed the rate limit, those with the highest rates are blocked.
171
+ * Retrieves the keys that are currently blocked by a rate-based rule instance. The maximum number of managed keys that can be blocked for a single rate-based rule instance is 10,000. If more than 10,000 addresses exceed the rate limit, those with the highest rates are blocked. For a rate-based rule that you've defined inside a rule group, provide the name of the rule group reference statement in your request, in addition to the rate-based rule name and the web ACL name. WAF monitors web requests and manages keys independently for each unique combination of web ACL, optional rule group, and rate-based rule. For example, if you define a rate-based rule inside a rule group, and then use the rule group in a web ACL, WAF monitors web requests and manages keys for that web ACL, rule group reference statement, and rate-based rule instance. If you use the same rule group in a second web ACL, WAF monitors web requests and manages keys for this second usage completely independent of your first.
172
172
  */
173
173
  getRateBasedStatementManagedKeys(callback?: (err: AWSError, data: WAFV2.Types.GetRateBasedStatementManagedKeysResponse) => void): Request<WAFV2.Types.GetRateBasedStatementManagedKeysResponse, AWSError>;
174
174
  /**
@@ -220,11 +220,11 @@ declare class WAFV2 extends Service {
220
220
  */
221
221
  listAvailableManagedRuleGroupVersions(callback?: (err: AWSError, data: WAFV2.Types.ListAvailableManagedRuleGroupVersionsResponse) => void): Request<WAFV2.Types.ListAvailableManagedRuleGroupVersionsResponse, AWSError>;
222
222
  /**
223
- * Retrieves an array of managed rule groups that are available for you to use. This list includes all Amazon Web Services Managed Rules rule groups and all of the Marketplace managed rule groups that you're subscribed to.
223
+ * Retrieves an array of managed rule groups that are available for you to use. This list includes all Amazon Web Services Managed Rules rule groups and all of the Amazon Web Services Marketplace managed rule groups that you're subscribed to.
224
224
  */
225
225
  listAvailableManagedRuleGroups(params: WAFV2.Types.ListAvailableManagedRuleGroupsRequest, callback?: (err: AWSError, data: WAFV2.Types.ListAvailableManagedRuleGroupsResponse) => void): Request<WAFV2.Types.ListAvailableManagedRuleGroupsResponse, AWSError>;
226
226
  /**
227
- * Retrieves an array of managed rule groups that are available for you to use. This list includes all Amazon Web Services Managed Rules rule groups and all of the Marketplace managed rule groups that you're subscribed to.
227
+ * Retrieves an array of managed rule groups that are available for you to use. This list includes all Amazon Web Services Managed Rules rule groups and all of the Amazon Web Services Marketplace managed rule groups that you're subscribed to.
228
228
  */
229
229
  listAvailableManagedRuleGroups(callback?: (err: AWSError, data: WAFV2.Types.ListAvailableManagedRuleGroupsResponse) => void): Request<WAFV2.Types.ListAvailableManagedRuleGroupsResponse, AWSError>;
230
230
  /**
@@ -244,11 +244,11 @@ declare class WAFV2 extends Service {
244
244
  */
245
245
  listLoggingConfigurations(callback?: (err: AWSError, data: WAFV2.Types.ListLoggingConfigurationsResponse) => void): Request<WAFV2.Types.ListLoggingConfigurationsResponse, AWSError>;
246
246
  /**
247
- * Retrieves the managed rule sets that you own. This is intended for use only by vendors of managed rule sets. Vendors are Amazon Web Services and Marketplace sellers. Vendors, you can use the managed rule set APIs to provide controlled rollout of your versioned managed rule group offerings for your customers. The APIs are ListManagedRuleSets, GetManagedRuleSet, PutManagedRuleSetVersions, and UpdateManagedRuleSetVersionExpiryDate.
247
+ * Retrieves the managed rule sets that you own. This is intended for use only by vendors of managed rule sets. Vendors are Amazon Web Services and Amazon Web Services Marketplace sellers. Vendors, you can use the managed rule set APIs to provide controlled rollout of your versioned managed rule group offerings for your customers. The APIs are ListManagedRuleSets, GetManagedRuleSet, PutManagedRuleSetVersions, and UpdateManagedRuleSetVersionExpiryDate.
248
248
  */
249
249
  listManagedRuleSets(params: WAFV2.Types.ListManagedRuleSetsRequest, callback?: (err: AWSError, data: WAFV2.Types.ListManagedRuleSetsResponse) => void): Request<WAFV2.Types.ListManagedRuleSetsResponse, AWSError>;
250
250
  /**
251
- * Retrieves the managed rule sets that you own. This is intended for use only by vendors of managed rule sets. Vendors are Amazon Web Services and Marketplace sellers. Vendors, you can use the managed rule set APIs to provide controlled rollout of your versioned managed rule group offerings for your customers. The APIs are ListManagedRuleSets, GetManagedRuleSet, PutManagedRuleSetVersions, and UpdateManagedRuleSetVersionExpiryDate.
251
+ * Retrieves the managed rule sets that you own. This is intended for use only by vendors of managed rule sets. Vendors are Amazon Web Services and Amazon Web Services Marketplace sellers. Vendors, you can use the managed rule set APIs to provide controlled rollout of your versioned managed rule group offerings for your customers. The APIs are ListManagedRuleSets, GetManagedRuleSet, PutManagedRuleSetVersions, and UpdateManagedRuleSetVersionExpiryDate.
252
252
  */
253
253
  listManagedRuleSets(callback?: (err: AWSError, data: WAFV2.Types.ListManagedRuleSetsResponse) => void): Request<WAFV2.Types.ListManagedRuleSetsResponse, AWSError>;
254
254
  /**
@@ -300,11 +300,11 @@ declare class WAFV2 extends Service {
300
300
  */
301
301
  putLoggingConfiguration(callback?: (err: AWSError, data: WAFV2.Types.PutLoggingConfigurationResponse) => void): Request<WAFV2.Types.PutLoggingConfigurationResponse, AWSError>;
302
302
  /**
303
- * Defines the versions of your managed rule set that you are offering to the customers. Customers see your offerings as managed rule groups with versioning. This is intended for use only by vendors of managed rule sets. Vendors are Amazon Web Services and Marketplace sellers. Vendors, you can use the managed rule set APIs to provide controlled rollout of your versioned managed rule group offerings for your customers. The APIs are ListManagedRuleSets, GetManagedRuleSet, PutManagedRuleSetVersions, and UpdateManagedRuleSetVersionExpiryDate. Customers retrieve their managed rule group list by calling ListAvailableManagedRuleGroups. The name that you provide here for your managed rule set is the name the customer sees for the corresponding managed rule group. Customers can retrieve the available versions for a managed rule group by calling ListAvailableManagedRuleGroupVersions. You provide a rule group specification for each version. For each managed rule set, you must specify a version that you recommend using. To initiate the expiration of a managed rule group version, use UpdateManagedRuleSetVersionExpiryDate.
303
+ * Defines the versions of your managed rule set that you are offering to the customers. Customers see your offerings as managed rule groups with versioning. This is intended for use only by vendors of managed rule sets. Vendors are Amazon Web Services and Amazon Web Services Marketplace sellers. Vendors, you can use the managed rule set APIs to provide controlled rollout of your versioned managed rule group offerings for your customers. The APIs are ListManagedRuleSets, GetManagedRuleSet, PutManagedRuleSetVersions, and UpdateManagedRuleSetVersionExpiryDate. Customers retrieve their managed rule group list by calling ListAvailableManagedRuleGroups. The name that you provide here for your managed rule set is the name the customer sees for the corresponding managed rule group. Customers can retrieve the available versions for a managed rule group by calling ListAvailableManagedRuleGroupVersions. You provide a rule group specification for each version. For each managed rule set, you must specify a version that you recommend using. To initiate the expiration of a managed rule group version, use UpdateManagedRuleSetVersionExpiryDate.
304
304
  */
305
305
  putManagedRuleSetVersions(params: WAFV2.Types.PutManagedRuleSetVersionsRequest, callback?: (err: AWSError, data: WAFV2.Types.PutManagedRuleSetVersionsResponse) => void): Request<WAFV2.Types.PutManagedRuleSetVersionsResponse, AWSError>;
306
306
  /**
307
- * Defines the versions of your managed rule set that you are offering to the customers. Customers see your offerings as managed rule groups with versioning. This is intended for use only by vendors of managed rule sets. Vendors are Amazon Web Services and Marketplace sellers. Vendors, you can use the managed rule set APIs to provide controlled rollout of your versioned managed rule group offerings for your customers. The APIs are ListManagedRuleSets, GetManagedRuleSet, PutManagedRuleSetVersions, and UpdateManagedRuleSetVersionExpiryDate. Customers retrieve their managed rule group list by calling ListAvailableManagedRuleGroups. The name that you provide here for your managed rule set is the name the customer sees for the corresponding managed rule group. Customers can retrieve the available versions for a managed rule group by calling ListAvailableManagedRuleGroupVersions. You provide a rule group specification for each version. For each managed rule set, you must specify a version that you recommend using. To initiate the expiration of a managed rule group version, use UpdateManagedRuleSetVersionExpiryDate.
307
+ * Defines the versions of your managed rule set that you are offering to the customers. Customers see your offerings as managed rule groups with versioning. This is intended for use only by vendors of managed rule sets. Vendors are Amazon Web Services and Amazon Web Services Marketplace sellers. Vendors, you can use the managed rule set APIs to provide controlled rollout of your versioned managed rule group offerings for your customers. The APIs are ListManagedRuleSets, GetManagedRuleSet, PutManagedRuleSetVersions, and UpdateManagedRuleSetVersionExpiryDate. Customers retrieve their managed rule group list by calling ListAvailableManagedRuleGroups. The name that you provide here for your managed rule set is the name the customer sees for the corresponding managed rule group. Customers can retrieve the available versions for a managed rule group by calling ListAvailableManagedRuleGroupVersions. You provide a rule group specification for each version. For each managed rule set, you must specify a version that you recommend using. To initiate the expiration of a managed rule group version, use UpdateManagedRuleSetVersionExpiryDate.
308
308
  */
309
309
  putManagedRuleSetVersions(callback?: (err: AWSError, data: WAFV2.Types.PutManagedRuleSetVersionsResponse) => void): Request<WAFV2.Types.PutManagedRuleSetVersionsResponse, AWSError>;
310
310
  /**
@@ -340,11 +340,11 @@ declare class WAFV2 extends Service {
340
340
  */
341
341
  updateIPSet(callback?: (err: AWSError, data: WAFV2.Types.UpdateIPSetResponse) => void): Request<WAFV2.Types.UpdateIPSetResponse, AWSError>;
342
342
  /**
343
- * Updates the expiration information for your managed rule set. Use this to initiate the expiration of a managed rule group version. After you initiate expiration for a version, WAF excludes it from the reponse to ListAvailableManagedRuleGroupVersions for the managed rule group. This is intended for use only by vendors of managed rule sets. Vendors are Amazon Web Services and Marketplace sellers. Vendors, you can use the managed rule set APIs to provide controlled rollout of your versioned managed rule group offerings for your customers. The APIs are ListManagedRuleSets, GetManagedRuleSet, PutManagedRuleSetVersions, and UpdateManagedRuleSetVersionExpiryDate.
343
+ * Updates the expiration information for your managed rule set. Use this to initiate the expiration of a managed rule group version. After you initiate expiration for a version, WAF excludes it from the reponse to ListAvailableManagedRuleGroupVersions for the managed rule group. This is intended for use only by vendors of managed rule sets. Vendors are Amazon Web Services and Amazon Web Services Marketplace sellers. Vendors, you can use the managed rule set APIs to provide controlled rollout of your versioned managed rule group offerings for your customers. The APIs are ListManagedRuleSets, GetManagedRuleSet, PutManagedRuleSetVersions, and UpdateManagedRuleSetVersionExpiryDate.
344
344
  */
345
345
  updateManagedRuleSetVersionExpiryDate(params: WAFV2.Types.UpdateManagedRuleSetVersionExpiryDateRequest, callback?: (err: AWSError, data: WAFV2.Types.UpdateManagedRuleSetVersionExpiryDateResponse) => void): Request<WAFV2.Types.UpdateManagedRuleSetVersionExpiryDateResponse, AWSError>;
346
346
  /**
347
- * Updates the expiration information for your managed rule set. Use this to initiate the expiration of a managed rule group version. After you initiate expiration for a version, WAF excludes it from the reponse to ListAvailableManagedRuleGroupVersions for the managed rule group. This is intended for use only by vendors of managed rule sets. Vendors are Amazon Web Services and Marketplace sellers. Vendors, you can use the managed rule set APIs to provide controlled rollout of your versioned managed rule group offerings for your customers. The APIs are ListManagedRuleSets, GetManagedRuleSet, PutManagedRuleSetVersions, and UpdateManagedRuleSetVersionExpiryDate.
347
+ * Updates the expiration information for your managed rule set. Use this to initiate the expiration of a managed rule group version. After you initiate expiration for a version, WAF excludes it from the reponse to ListAvailableManagedRuleGroupVersions for the managed rule group. This is intended for use only by vendors of managed rule sets. Vendors are Amazon Web Services and Amazon Web Services Marketplace sellers. Vendors, you can use the managed rule set APIs to provide controlled rollout of your versioned managed rule group offerings for your customers. The APIs are ListManagedRuleSets, GetManagedRuleSet, PutManagedRuleSetVersions, and UpdateManagedRuleSetVersionExpiryDate.
348
348
  */
349
349
  updateManagedRuleSetVersionExpiryDate(callback?: (err: AWSError, data: WAFV2.Types.UpdateManagedRuleSetVersionExpiryDateResponse) => void): Request<WAFV2.Types.UpdateManagedRuleSetVersionExpiryDateResponse, AWSError>;
350
350
  /**
@@ -930,7 +930,7 @@ declare namespace WAFV2 {
930
930
  */
931
931
  ManagedRuleGroupStatement?: ManagedRuleGroupStatement;
932
932
  /**
933
- * A rule statement used to run the rules that are defined in a RuleGroup. To use this, create a rule group with your rules, then provide the ARN of the rule group in this statement. You cannot nest a RuleGroupReferenceStatement, for example for use inside a NotStatement or OrStatement. It can only be referenced as a top-level statement within a rule.
933
+ * A rule statement used to run the rules that are defined in a RuleGroup. To use this, create a rule group with your rules, then provide the ARN of the rule group in this statement. You cannot nest a RuleGroupReferenceStatement, for example for use inside a NotStatement or OrStatement. You can only use a rule group reference statement at the top level inside a web ACL.
934
934
  */
935
935
  RuleGroupReferenceStatement?: RuleGroupReferenceStatement;
936
936
  }
@@ -1042,7 +1042,11 @@ declare namespace WAFV2 {
1042
1042
  */
1043
1043
  WebACLId: EntityId;
1044
1044
  /**
1045
- * The name of the rate-based rule to get the keys for.
1045
+ * The name of the rule group reference statement in your web ACL. This is required only when you have the rate-based rule nested inside a rule group.
1046
+ */
1047
+ RuleGroupRuleName?: EntityName;
1048
+ /**
1049
+ * The name of the rate-based rule to get the keys for. If you have the rule defined inside a rule group that you're using in your web ACL, also provide the name of the rule group reference statement in the request parameter RuleGroupRuleName.
1046
1050
  */
1047
1051
  RuleName: EntityName;
1048
1052
  }
@@ -1611,7 +1615,7 @@ declare namespace WAFV2 {
1611
1615
  */
1612
1616
  LogDestinationConfigs: LogDestinationConfigs;
1613
1617
  /**
1614
- * The parts of the request that you want to keep out of the logs. For example, if you redact the HEADER field, the HEADER field in the firehose will be xxx. You must use one of the following values: URI, QUERY_STRING, HEADER, or METHOD.
1618
+ * The parts of the request that you want to keep out of the logs. For example, if you redact the SingleHeader field, the HEADER field in the firehose will be xxx. You can specify only the following fields for redaction: UriPath, QueryString, SingleHeader, Method, and JsonBody.
1615
1619
  */
1616
1620
  RedactedFields?: RedactedFields;
1617
1621
  /**
@@ -1667,7 +1671,7 @@ declare namespace WAFV2 {
1667
1671
  */
1668
1672
  Name?: EntityName;
1669
1673
  /**
1670
- * The description of the managed rule group, provided by Amazon Web Services Managed Rules or the Marketplace seller who manages it.
1674
+ * The description of the managed rule group, provided by Amazon Web Services Managed Rules or the Amazon Web Services Marketplace seller who manages it.
1671
1675
  */
1672
1676
  Description?: EntityDescription;
1673
1677
  }
@@ -2197,7 +2201,7 @@ declare namespace WAFV2 {
2197
2201
  */
2198
2202
  GeoMatchStatement?: GeoMatchStatement;
2199
2203
  /**
2200
- * A rule statement used to run the rules that are defined in a RuleGroup. To use this, create a rule group with your rules, then provide the ARN of the rule group in this statement. You cannot nest a RuleGroupReferenceStatement, for example for use inside a NotStatement or OrStatement. It can only be referenced as a top-level statement within a rule.
2204
+ * A rule statement used to run the rules that are defined in a RuleGroup. To use this, create a rule group with your rules, then provide the ARN of the rule group in this statement. You cannot nest a RuleGroupReferenceStatement, for example for use inside a NotStatement or OrStatement. You can only use a rule group reference statement at the top level inside a web ACL.
2201
2205
  */
2202
2206
  RuleGroupReferenceStatement?: RuleGroupReferenceStatement;
2203
2207
  /**
@@ -2209,7 +2213,7 @@ declare namespace WAFV2 {
2209
2213
  */
2210
2214
  RegexPatternSetReferenceStatement?: RegexPatternSetReferenceStatement;
2211
2215
  /**
2212
- * A rate-based rule tracks the rate of requests for each originating IP address, and triggers the rule action when the rate exceeds a limit that you specify on the number of requests in any 5-minute time span. You can use this to put a temporary block on requests from an IP address that is sending excessive requests. When the rule action triggers, WAF blocks additional requests from the IP address until the request rate falls below the limit. You can optionally nest another statement inside the rate-based statement, to narrow the scope of the rule so that it only counts requests that match the nested statement. For example, based on recent requests that you have seen from an attacker, you might create a rate-based rule with a nested AND rule statement that contains the following nested statements: An IP match statement with an IP set that specified the address 192.0.2.44. A string match statement that searches in the User-Agent header for the string BadBot. In this rate-based rule, you also define a rate limit. For this example, the rate limit is 1,000. Requests that meet both of the conditions in the statements are counted. If the count exceeds 1,000 requests per five minutes, the rule action triggers. Requests that do not meet both conditions are not counted towards the rate limit and are not affected by this rule. You cannot nest a RateBasedStatement, for example for use inside a NotStatement or OrStatement. It can only be referenced as a top-level statement within a rule.
2216
+ * A rate-based rule tracks the rate of requests for each originating IP address, and triggers the rule action when the rate exceeds a limit that you specify on the number of requests in any 5-minute time span. You can use this to put a temporary block on requests from an IP address that is sending excessive requests. WAF tracks and manages web requests separately for each instance of a rate-based rule that you use. For example, if you provide the same rate-based rule settings in two web ACLs, each of the two rule statements represents a separate instance of the rate-based rule and gets its own tracking and management by WAF. If you define a rate-based rule inside a rule group, and then use that rule group in multiple places, each use creates a separate instance of the rate-based rule that gets its own tracking and management by WAF. When the rule action triggers, WAF blocks additional requests from the IP address until the request rate falls below the limit. You can optionally nest another statement inside the rate-based statement, to narrow the scope of the rule so that it only counts requests that match the nested statement. For example, based on recent requests that you have seen from an attacker, you might create a rate-based rule with a nested AND rule statement that contains the following nested statements: An IP match statement with an IP set that specified the address 192.0.2.44. A string match statement that searches in the User-Agent header for the string BadBot. In this rate-based rule, you also define a rate limit. For this example, the rate limit is 1,000. Requests that meet both of the conditions in the statements are counted. If the count exceeds 1,000 requests per five minutes, the rule action triggers. Requests that do not meet both conditions are not counted towards the rate limit and are not affected by this rule. You cannot nest a RateBasedStatement inside another statement, for example inside a NotStatement or OrStatement. You can define a RateBasedStatement inside a web ACL and inside a rule group.
2213
2217
  */
2214
2218
  RateBasedStatement?: RateBasedStatement;
2215
2219
  /**