cdk-comprehend-s3olap 2.0.143 → 2.0.145

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (45) hide show
  1. package/.jsii +3 -3
  2. package/lib/cdk-comprehend-s3olap.js +2 -2
  3. package/lib/comprehend-lambdas.js +2 -2
  4. package/lib/iam-roles.js +4 -4
  5. package/node_modules/aws-sdk/CHANGELOG.md +22 -1
  6. package/node_modules/aws-sdk/README.md +1 -1
  7. package/node_modules/aws-sdk/apis/appsync-2017-07-25.min.json +42 -34
  8. package/node_modules/aws-sdk/apis/ec2-2016-11-15.paginators.json +6 -0
  9. package/node_modules/aws-sdk/apis/inspector2-2020-06-08.min.json +305 -133
  10. package/node_modules/aws-sdk/apis/iottwinmaker-2021-11-29.min.json +10 -3
  11. package/node_modules/aws-sdk/apis/monitoring-2010-08-01.min.json +19 -15
  12. package/node_modules/aws-sdk/apis/network-firewall-2020-11-12.min.json +79 -68
  13. package/node_modules/aws-sdk/apis/opensearch-2021-01-01.min.json +141 -27
  14. package/node_modules/aws-sdk/apis/quicksight-2018-04-01.min.json +2136 -684
  15. package/node_modules/aws-sdk/apis/quicksight-2018-04-01.paginators.json +10 -0
  16. package/node_modules/aws-sdk/apis/rekognition-2016-06-27.min.json +101 -90
  17. package/node_modules/aws-sdk/apis/s3-2006-03-01.examples.json +115 -115
  18. package/node_modules/aws-sdk/apis/securityhub-2018-10-26.examples.json +45 -0
  19. package/node_modules/aws-sdk/apis/securityhub-2018-10-26.min.json +71 -3
  20. package/node_modules/aws-sdk/apis/securityhub-2018-10-26.paginators.json +6 -0
  21. package/node_modules/aws-sdk/apis/sqs-2012-11-05.min.json +36 -103
  22. package/node_modules/aws-sdk/apis/sqs-2012-11-05.paginators.json +3 -3
  23. package/node_modules/aws-sdk/apis/wellarchitected-2020-03-31.min.json +44 -39
  24. package/node_modules/aws-sdk/clients/appsync.d.ts +15 -2
  25. package/node_modules/aws-sdk/clients/cloudwatch.d.ts +11 -6
  26. package/node_modules/aws-sdk/clients/configservice.d.ts +1 -1
  27. package/node_modules/aws-sdk/clients/connect.d.ts +11 -11
  28. package/node_modules/aws-sdk/clients/inspector2.d.ts +181 -9
  29. package/node_modules/aws-sdk/clients/iottwinmaker.d.ts +15 -0
  30. package/node_modules/aws-sdk/clients/networkfirewall.d.ts +15 -5
  31. package/node_modules/aws-sdk/clients/opensearch.d.ts +203 -16
  32. package/node_modules/aws-sdk/clients/quicksight.d.ts +1918 -96
  33. package/node_modules/aws-sdk/clients/rekognition.d.ts +22 -8
  34. package/node_modules/aws-sdk/clients/s3.d.ts +168 -168
  35. package/node_modules/aws-sdk/clients/sagemaker.d.ts +1 -1
  36. package/node_modules/aws-sdk/clients/securityhub.d.ts +102 -15
  37. package/node_modules/aws-sdk/clients/sqs.d.ts +42 -42
  38. package/node_modules/aws-sdk/clients/wellarchitected.d.ts +13 -2
  39. package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +1 -1
  40. package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +16 -16
  41. package/node_modules/aws-sdk/dist/aws-sdk.js +168 -213
  42. package/node_modules/aws-sdk/dist/aws-sdk.min.js +60 -60
  43. package/node_modules/aws-sdk/lib/core.js +1 -1
  44. package/node_modules/aws-sdk/package.json +1 -1
  45. package/package.json +5 -5
@@ -12,11 +12,11 @@ declare class Inspector2 extends Service {
12
12
  constructor(options?: Inspector2.Types.ClientConfiguration)
13
13
  config: Config & Inspector2.Types.ClientConfiguration;
14
14
  /**
15
- * Associates an Amazon Web Services account with an Amazon Inspector delegated administrator.
15
+ * Associates an Amazon Web Services account with an Amazon Inspector delegated administrator. An HTTP 200 response indicates the association was successfully started, but doesn’t indicate whether it was completed. You can check if the association completed by using ListMembers for multiple accounts or GetMembers for a single account.
16
16
  */
17
17
  associateMember(params: Inspector2.Types.AssociateMemberRequest, callback?: (err: AWSError, data: Inspector2.Types.AssociateMemberResponse) => void): Request<Inspector2.Types.AssociateMemberResponse, AWSError>;
18
18
  /**
19
- * Associates an Amazon Web Services account with an Amazon Inspector delegated administrator.
19
+ * Associates an Amazon Web Services account with an Amazon Inspector delegated administrator. An HTTP 200 response indicates the association was successfully started, but doesn’t indicate whether it was completed. You can check if the association completed by using ListMembers for multiple accounts or GetMembers for a single account.
20
20
  */
21
21
  associateMember(callback?: (err: AWSError, data: Inspector2.Types.AssociateMemberResponse) => void): Request<Inspector2.Types.AssociateMemberResponse, AWSError>;
22
22
  /**
@@ -35,6 +35,22 @@ declare class Inspector2 extends Service {
35
35
  * Gets free trial status for multiple Amazon Web Services accounts.
36
36
  */
37
37
  batchGetFreeTrialInfo(callback?: (err: AWSError, data: Inspector2.Types.BatchGetFreeTrialInfoResponse) => void): Request<Inspector2.Types.BatchGetFreeTrialInfoResponse, AWSError>;
38
+ /**
39
+ * Retrieves Amazon Inspector deep inspection activation status of multiple member accounts within your organization. You must be the delegated administrator of an organization in Amazon Inspector to use this API.
40
+ */
41
+ batchGetMemberEc2DeepInspectionStatus(params: Inspector2.Types.BatchGetMemberEc2DeepInspectionStatusRequest, callback?: (err: AWSError, data: Inspector2.Types.BatchGetMemberEc2DeepInspectionStatusResponse) => void): Request<Inspector2.Types.BatchGetMemberEc2DeepInspectionStatusResponse, AWSError>;
42
+ /**
43
+ * Retrieves Amazon Inspector deep inspection activation status of multiple member accounts within your organization. You must be the delegated administrator of an organization in Amazon Inspector to use this API.
44
+ */
45
+ batchGetMemberEc2DeepInspectionStatus(callback?: (err: AWSError, data: Inspector2.Types.BatchGetMemberEc2DeepInspectionStatusResponse) => void): Request<Inspector2.Types.BatchGetMemberEc2DeepInspectionStatusResponse, AWSError>;
46
+ /**
47
+ * Activates or deactivates Amazon Inspector deep inspection for the provided member accounts in your organization. You must be the delegated administrator of an organization in Amazon Inspector to use this API.
48
+ */
49
+ batchUpdateMemberEc2DeepInspectionStatus(params: Inspector2.Types.BatchUpdateMemberEc2DeepInspectionStatusRequest, callback?: (err: AWSError, data: Inspector2.Types.BatchUpdateMemberEc2DeepInspectionStatusResponse) => void): Request<Inspector2.Types.BatchUpdateMemberEc2DeepInspectionStatusResponse, AWSError>;
50
+ /**
51
+ * Activates or deactivates Amazon Inspector deep inspection for the provided member accounts in your organization. You must be the delegated administrator of an organization in Amazon Inspector to use this API.
52
+ */
53
+ batchUpdateMemberEc2DeepInspectionStatus(callback?: (err: AWSError, data: Inspector2.Types.BatchUpdateMemberEc2DeepInspectionStatusResponse) => void): Request<Inspector2.Types.BatchUpdateMemberEc2DeepInspectionStatusResponse, AWSError>;
38
54
  /**
39
55
  * Cancels the given findings report.
40
56
  */
@@ -52,11 +68,11 @@ declare class Inspector2 extends Service {
52
68
  */
53
69
  createFilter(callback?: (err: AWSError, data: Inspector2.Types.CreateFilterResponse) => void): Request<Inspector2.Types.CreateFilterResponse, AWSError>;
54
70
  /**
55
- * Creates a finding report.
71
+ * Creates a finding report. By default only ACTIVE findings are returned in the report. To see SUPRESSED or CLOSED findings you must specify a value for the findingStatus filter criteria.
56
72
  */
57
73
  createFindingsReport(params: Inspector2.Types.CreateFindingsReportRequest, callback?: (err: AWSError, data: Inspector2.Types.CreateFindingsReportResponse) => void): Request<Inspector2.Types.CreateFindingsReportResponse, AWSError>;
58
74
  /**
59
- * Creates a finding report.
75
+ * Creates a finding report. By default only ACTIVE findings are returned in the report. To see SUPRESSED or CLOSED findings you must specify a value for the findingStatus filter criteria.
60
76
  */
61
77
  createFindingsReport(callback?: (err: AWSError, data: Inspector2.Types.CreateFindingsReportResponse) => void): Request<Inspector2.Types.CreateFindingsReportResponse, AWSError>;
62
78
  /**
@@ -131,6 +147,14 @@ declare class Inspector2 extends Service {
131
147
  * Retrieves information about the Amazon Inspector delegated administrator for your organization.
132
148
  */
133
149
  getDelegatedAdminAccount(callback?: (err: AWSError, data: Inspector2.Types.GetDelegatedAdminAccountResponse) => void): Request<Inspector2.Types.GetDelegatedAdminAccountResponse, AWSError>;
150
+ /**
151
+ * Retrieves the activation status of Amazon Inspector deep inspection and custom paths associated with your account.
152
+ */
153
+ getEc2DeepInspectionConfiguration(params: Inspector2.Types.GetEc2DeepInspectionConfigurationRequest, callback?: (err: AWSError, data: Inspector2.Types.GetEc2DeepInspectionConfigurationResponse) => void): Request<Inspector2.Types.GetEc2DeepInspectionConfigurationResponse, AWSError>;
154
+ /**
155
+ * Retrieves the activation status of Amazon Inspector deep inspection and custom paths associated with your account.
156
+ */
157
+ getEc2DeepInspectionConfiguration(callback?: (err: AWSError, data: Inspector2.Types.GetEc2DeepInspectionConfigurationResponse) => void): Request<Inspector2.Types.GetEc2DeepInspectionConfigurationResponse, AWSError>;
134
158
  /**
135
159
  * Gets the status of a findings report.
136
160
  */
@@ -251,6 +275,14 @@ declare class Inspector2 extends Service {
251
275
  * Updates setting configurations for your Amazon Inspector account. When you use this API as an Amazon Inspector delegated administrator this updates the setting for all accounts you manage. Member accounts in an organization cannot update this setting.
252
276
  */
253
277
  updateConfiguration(callback?: (err: AWSError, data: Inspector2.Types.UpdateConfigurationResponse) => void): Request<Inspector2.Types.UpdateConfigurationResponse, AWSError>;
278
+ /**
279
+ * Activates, deactivates Amazon Inspector deep inspection, or updates custom paths for your account.
280
+ */
281
+ updateEc2DeepInspectionConfiguration(params: Inspector2.Types.UpdateEc2DeepInspectionConfigurationRequest, callback?: (err: AWSError, data: Inspector2.Types.UpdateEc2DeepInspectionConfigurationResponse) => void): Request<Inspector2.Types.UpdateEc2DeepInspectionConfigurationResponse, AWSError>;
282
+ /**
283
+ * Activates, deactivates Amazon Inspector deep inspection, or updates custom paths for your account.
284
+ */
285
+ updateEc2DeepInspectionConfiguration(callback?: (err: AWSError, data: Inspector2.Types.UpdateEc2DeepInspectionConfigurationResponse) => void): Request<Inspector2.Types.UpdateEc2DeepInspectionConfigurationResponse, AWSError>;
254
286
  /**
255
287
  * Specifies the action that is to be applied to the findings that match the filter.
256
288
  */
@@ -259,6 +291,14 @@ declare class Inspector2 extends Service {
259
291
  * Specifies the action that is to be applied to the findings that match the filter.
260
292
  */
261
293
  updateFilter(callback?: (err: AWSError, data: Inspector2.Types.UpdateFilterResponse) => void): Request<Inspector2.Types.UpdateFilterResponse, AWSError>;
294
+ /**
295
+ * Updates the Amazon Inspector deep inspection custom paths for your organization. You must be an Amazon Inspector delegated administrator to use this API.
296
+ */
297
+ updateOrgEc2DeepInspectionConfiguration(params: Inspector2.Types.UpdateOrgEc2DeepInspectionConfigurationRequest, callback?: (err: AWSError, data: Inspector2.Types.UpdateOrgEc2DeepInspectionConfigurationResponse) => void): Request<Inspector2.Types.UpdateOrgEc2DeepInspectionConfigurationResponse, AWSError>;
298
+ /**
299
+ * Updates the Amazon Inspector deep inspection custom paths for your organization. You must be an Amazon Inspector delegated administrator to use this API.
300
+ */
301
+ updateOrgEc2DeepInspectionConfiguration(callback?: (err: AWSError, data: Inspector2.Types.UpdateOrgEc2DeepInspectionConfigurationResponse) => void): Request<Inspector2.Types.UpdateOrgEc2DeepInspectionConfigurationResponse, AWSError>;
262
302
  /**
263
303
  * Updates the configurations for your Amazon Inspector organization.
264
304
  */
@@ -486,7 +526,7 @@ declare namespace Inspector2 {
486
526
  */
487
527
  ecr: Boolean;
488
528
  /**
489
- * Represents whether AWS Lambda scans are automatically enabled for new members of your Amazon Inspector organization.
529
+ * Represents whether AWS Lambda standard scans are automatically enabled for new members of your Amazon Inspector organization.
490
530
  */
491
531
  lambda?: Boolean;
492
532
  }
@@ -702,6 +742,38 @@ declare namespace Inspector2 {
702
742
  */
703
743
  failedAccounts: FreeTrialInfoErrorList;
704
744
  }
745
+ export interface BatchGetMemberEc2DeepInspectionStatusRequest {
746
+ /**
747
+ * The unique identifiers for the Amazon Web Services accounts to retrieve Amazon Inspector deep inspection activation status for. &lt;/p&gt;
748
+ */
749
+ accountIds?: AccountIdSet;
750
+ }
751
+ export interface BatchGetMemberEc2DeepInspectionStatusResponse {
752
+ /**
753
+ * An array of objects that provide details on the activation status of Amazon Inspector deep inspection for each of the requested accounts. &lt;/p&gt;
754
+ */
755
+ accountIds?: MemberAccountEc2DeepInspectionStatusStateList;
756
+ /**
757
+ * An array of objects that provide details on any accounts that failed to activate Amazon Inspector deep inspection and why. &lt;/p&gt;
758
+ */
759
+ failedAccountIds?: FailedMemberAccountEc2DeepInspectionStatusStateList;
760
+ }
761
+ export interface BatchUpdateMemberEc2DeepInspectionStatusRequest {
762
+ /**
763
+ * The unique identifiers for the Amazon Web Services accounts to change Amazon Inspector deep inspection status for.
764
+ */
765
+ accountIds: MemberAccountEc2DeepInspectionStatusList;
766
+ }
767
+ export interface BatchUpdateMemberEc2DeepInspectionStatusResponse {
768
+ /**
769
+ * An array of objects that provide details for each of the accounts that Amazon Inspector deep inspection status was successfully changed for.
770
+ */
771
+ accountIds?: MemberAccountEc2DeepInspectionStatusStateList;
772
+ /**
773
+ * An array of objects that provide details for each of the accounts that Amazon Inspector deep inspection status could not be successfully changed for.
774
+ */
775
+ failedAccountIds?: FailedMemberAccountEc2DeepInspectionStatusStateList;
776
+ }
705
777
  export type Boolean = boolean;
706
778
  export interface CancelFindingsReportRequest {
707
779
  /**
@@ -1009,7 +1081,7 @@ declare namespace Inspector2 {
1009
1081
  */
1010
1082
  bucketName: String;
1011
1083
  /**
1012
- * The prefix of the KMS key used to export findings.
1084
+ * The prefix of the Amazon S3 bucket used to export findings.
1013
1085
  */
1014
1086
  keyPrefix?: String;
1015
1087
  /**
@@ -1063,6 +1135,7 @@ declare namespace Inspector2 {
1063
1135
  accountId: AccountId;
1064
1136
  }
1065
1137
  export type Double = number;
1138
+ export type Ec2DeepInspectionStatus = "ACTIVATED"|"DEACTIVATED"|"PENDING"|"FAILED"|string;
1066
1139
  export interface Ec2InstanceAggregation {
1067
1140
  /**
1068
1141
  * The AMI IDs associated with the Amazon EC2 instances to aggregate findings for.
@@ -1255,6 +1328,21 @@ declare namespace Inspector2 {
1255
1328
  status?: Status;
1256
1329
  }
1257
1330
  export type FailedAccountList = FailedAccount[];
1331
+ export interface FailedMemberAccountEc2DeepInspectionStatusState {
1332
+ /**
1333
+ * The unique identifier for the Amazon Web Services account of the organization member that failed to activate Amazon Inspector deep inspection.
1334
+ */
1335
+ accountId: AccountId;
1336
+ /**
1337
+ * The status of EC2 scanning in the account that failed to activate Amazon Inspector deep inspection.
1338
+ */
1339
+ ec2ScanStatus?: Status;
1340
+ /**
1341
+ * The error message explaining why the account failed to activate Amazon Inspector deep inspection.
1342
+ */
1343
+ errorMessage?: NonEmptyString;
1344
+ }
1345
+ export type FailedMemberAccountEc2DeepInspectionStatusStateList = FailedMemberAccountEc2DeepInspectionStatusState[];
1258
1346
  export type FilePath = string;
1259
1347
  export interface Filter {
1260
1348
  /**
@@ -1638,6 +1726,26 @@ declare namespace Inspector2 {
1638
1726
  */
1639
1727
  delegatedAdmin?: DelegatedAdmin;
1640
1728
  }
1729
+ export interface GetEc2DeepInspectionConfigurationRequest {
1730
+ }
1731
+ export interface GetEc2DeepInspectionConfigurationResponse {
1732
+ /**
1733
+ * An error message explaining why Amazon Inspector deep inspection configurations could not be retrieved for your account.
1734
+ */
1735
+ errorMessage?: NonEmptyString;
1736
+ /**
1737
+ * The Amazon Inspector deep inspection custom paths for your organization.
1738
+ */
1739
+ orgPackagePaths?: PathList;
1740
+ /**
1741
+ * The Amazon Inspector deep inspection custom paths for your account.
1742
+ */
1743
+ packagePaths?: PathList;
1744
+ /**
1745
+ * The activation status of Amazon Inspector deep inspection in your account.
1746
+ */
1747
+ status?: Ec2DeepInspectionStatus;
1748
+ }
1641
1749
  export interface GetFindingsReportStatusRequest {
1642
1750
  /**
1643
1751
  * The ID of the report to retrieve the status of.
@@ -2165,6 +2273,32 @@ declare namespace Inspector2 {
2165
2273
  */
2166
2274
  updatedAt?: DateTimeTimestamp;
2167
2275
  }
2276
+ export interface MemberAccountEc2DeepInspectionStatus {
2277
+ /**
2278
+ * The unique identifier for the Amazon Web Services account of the organization member.
2279
+ */
2280
+ accountId: AccountId;
2281
+ /**
2282
+ * Whether Amazon Inspector deep inspection is active in the account. If TRUE Amazon Inspector deep inspection is active, if FALSE it is not active.
2283
+ */
2284
+ activateDeepInspection: Boolean;
2285
+ }
2286
+ export type MemberAccountEc2DeepInspectionStatusList = MemberAccountEc2DeepInspectionStatus[];
2287
+ export interface MemberAccountEc2DeepInspectionStatusState {
2288
+ /**
2289
+ * The unique identifier for the Amazon Web Services account of the organization member
2290
+ */
2291
+ accountId: AccountId;
2292
+ /**
2293
+ * The error message explaining why the account failed to activate Amazon Inspector deep inspection.
2294
+ */
2295
+ errorMessage?: NonEmptyString;
2296
+ /**
2297
+ * The state of Amazon Inspector deep inspection in the member account.
2298
+ */
2299
+ status?: Ec2DeepInspectionStatus;
2300
+ }
2301
+ export type MemberAccountEc2DeepInspectionStatusStateList = MemberAccountEc2DeepInspectionStatusState[];
2168
2302
  export type MemberList = Member[];
2169
2303
  export type MeteringAccountId = string;
2170
2304
  export type MonthlyCostEstimate = number;
@@ -2263,7 +2397,7 @@ declare namespace Inspector2 {
2263
2397
  version?: StringFilter;
2264
2398
  }
2265
2399
  export type PackageFilterList = PackageFilter[];
2266
- export type PackageManager = "BUNDLER"|"CARGO"|"COMPOSER"|"NPM"|"NUGET"|"PIPENV"|"POETRY"|"YARN"|"GOBINARY"|"GOMOD"|"JAR"|"OS"|"PIP"|"PYTHONPKG"|"NODEPKG"|"POM"|string;
2400
+ export type PackageManager = "BUNDLER"|"CARGO"|"COMPOSER"|"NPM"|"NUGET"|"PIPENV"|"POETRY"|"YARN"|"GOBINARY"|"GOMOD"|"JAR"|"OS"|"PIP"|"PYTHONPKG"|"NODEPKG"|"POM"|"GEMSPEC"|string;
2267
2401
  export type PackageName = string;
2268
2402
  export type PackageRelease = string;
2269
2403
  export type PackageSortBy = "CRITICAL"|"HIGH"|"ALL"|string;
@@ -2311,6 +2445,8 @@ declare namespace Inspector2 {
2311
2445
  */
2312
2446
  vulnerablePackages?: VulnerablePackageList;
2313
2447
  }
2448
+ export type Path = string;
2449
+ export type PathList = Path[];
2314
2450
  export interface Permission {
2315
2451
  /**
2316
2452
  * The operations that can be performed with the given permissions.
@@ -2480,7 +2616,7 @@ declare namespace Inspector2 {
2480
2616
  */
2481
2617
  ecr: Status;
2482
2618
  /**
2483
- * The status of Amazon Inspector scanning for AWS Lambda function resources.
2619
+ * The status of Amazon Inspector scanning for AWS Lambda function.
2484
2620
  */
2485
2621
  lambda?: Status;
2486
2622
  }
@@ -2497,7 +2633,7 @@ declare namespace Inspector2 {
2497
2633
  statusCode: ScanStatusCode;
2498
2634
  }
2499
2635
  export type ScanStatusCode = "ACTIVE"|"INACTIVE"|string;
2500
- export type ScanStatusReason = "PENDING_INITIAL_SCAN"|"ACCESS_DENIED"|"INTERNAL_ERROR"|"UNMANAGED_EC2_INSTANCE"|"UNSUPPORTED_OS"|"SCAN_ELIGIBILITY_EXPIRED"|"RESOURCE_TERMINATED"|"SUCCESSFUL"|"NO_RESOURCES_FOUND"|"IMAGE_SIZE_EXCEEDED"|"SCAN_FREQUENCY_MANUAL"|"SCAN_FREQUENCY_SCAN_ON_PUSH"|"EC2_INSTANCE_STOPPED"|"PENDING_DISABLE"|"NO_INVENTORY"|"STALE_INVENTORY"|"EXCLUDED_BY_TAG"|"UNSUPPORTED_RUNTIME"|string;
2636
+ export type ScanStatusReason = "PENDING_INITIAL_SCAN"|"ACCESS_DENIED"|"INTERNAL_ERROR"|"UNMANAGED_EC2_INSTANCE"|"UNSUPPORTED_OS"|"SCAN_ELIGIBILITY_EXPIRED"|"RESOURCE_TERMINATED"|"SUCCESSFUL"|"NO_RESOURCES_FOUND"|"IMAGE_SIZE_EXCEEDED"|"SCAN_FREQUENCY_MANUAL"|"SCAN_FREQUENCY_SCAN_ON_PUSH"|"EC2_INSTANCE_STOPPED"|"PENDING_DISABLE"|"NO_INVENTORY"|"STALE_INVENTORY"|"EXCLUDED_BY_TAG"|"UNSUPPORTED_RUNTIME"|"UNSUPPORTED_MEDIA_TYPE"|"UNSUPPORTED_CONFIG_FILE"|"DEEP_INSPECTION_PACKAGE_COLLECTION_LIMIT_EXCEEDED"|"DEEP_INSPECTION_DAILY_SSM_INVENTORY_LIMIT_EXCEEDED"|"DEEP_INSPECTION_COLLECTION_TIME_LIMIT_EXCEEDED"|"DEEP_INSPECTION_NO_INVENTORY"|string;
2501
2637
  export type ScanType = "NETWORK"|"PACKAGE"|string;
2502
2638
  export type SecurityGroupId = string;
2503
2639
  export type SecurityGroupIdList = SecurityGroupId[];
@@ -2655,6 +2791,34 @@ declare namespace Inspector2 {
2655
2791
  }
2656
2792
  export interface UpdateConfigurationResponse {
2657
2793
  }
2794
+ export interface UpdateEc2DeepInspectionConfigurationRequest {
2795
+ /**
2796
+ * Specify TRUE to activate Amazon Inspector deep inspection in your account, or FALSE to deactivate. Member accounts in an organization cannot deactivate deep inspection, instead the delegated administrator for the organization can deactivate a member account using BatchUpdateMemberEc2DeepInspectionStatus.
2797
+ */
2798
+ activateDeepInspection?: Boolean;
2799
+ /**
2800
+ * The Amazon Inspector deep inspection custom paths you are adding for your account.
2801
+ */
2802
+ packagePaths?: PathList;
2803
+ }
2804
+ export interface UpdateEc2DeepInspectionConfigurationResponse {
2805
+ /**
2806
+ * An error message explaining why new Amazon Inspector deep inspection custom paths could not be added.
2807
+ */
2808
+ errorMessage?: NonEmptyString;
2809
+ /**
2810
+ * The current Amazon Inspector deep inspection custom paths for the organization.
2811
+ */
2812
+ orgPackagePaths?: PathList;
2813
+ /**
2814
+ * The current Amazon Inspector deep inspection custom paths for your account.
2815
+ */
2816
+ packagePaths?: PathList;
2817
+ /**
2818
+ * The status of Amazon Inspector deep inspection in your account.
2819
+ */
2820
+ status?: Ec2DeepInspectionStatus;
2821
+ }
2658
2822
  export interface UpdateFilterRequest {
2659
2823
  /**
2660
2824
  * Specifies the action that is to be applied to the findings that match the filter.
@@ -2687,6 +2851,14 @@ declare namespace Inspector2 {
2687
2851
  */
2688
2852
  arn: FilterArn;
2689
2853
  }
2854
+ export interface UpdateOrgEc2DeepInspectionConfigurationRequest {
2855
+ /**
2856
+ * The Amazon Inspector deep inspection custom paths you are adding for your organization.
2857
+ */
2858
+ orgPackagePaths: PathList;
2859
+ }
2860
+ export interface UpdateOrgEc2DeepInspectionConfigurationResponse {
2861
+ }
2690
2862
  export interface UpdateOrganizationConfigurationRequest {
2691
2863
  /**
2692
2864
  * Defines which scan types are enabled automatically for new members of your Amazon Inspector organization.
@@ -1305,6 +1305,10 @@ declare namespace IoTTwinMaker {
1305
1305
  * The generated scene metadata.
1306
1306
  */
1307
1307
  generatedSceneMetadata?: GeneratedSceneMetadataMap;
1308
+ /**
1309
+ * The SceneResponse error.
1310
+ */
1311
+ error?: SceneError;
1308
1312
  }
1309
1313
  export interface GetSyncJobRequest {
1310
1314
  /**
@@ -1920,6 +1924,17 @@ declare namespace IoTTwinMaker {
1920
1924
  export type S3Url = string;
1921
1925
  export type SceneCapabilities = SceneCapability[];
1922
1926
  export type SceneCapability = string;
1927
+ export interface SceneError {
1928
+ /**
1929
+ * The SceneError code.
1930
+ */
1931
+ code?: SceneErrorCode;
1932
+ /**
1933
+ * The SceneError message.
1934
+ */
1935
+ message?: ErrorMessage;
1936
+ }
1937
+ export type SceneErrorCode = "MATTERPORT_ERROR"|string;
1923
1938
  export type SceneMetadataMap = {[key: string]: SceneMetadataValue};
1924
1939
  export type SceneMetadataValue = string;
1925
1940
  export type SceneSummaries = SceneSummary[];
@@ -402,11 +402,11 @@ declare namespace NetworkFirewall {
402
402
  */
403
403
  Status?: AttachmentStatus;
404
404
  /**
405
- * If Network Firewall fails to create or delete the firewall endpoint in the subnet, it populates this with the reason for the failure and how to resolve it. Depending on the error, it can take as many as 15 minutes to populate this field. For more information about the errors and solutions available for this field, see Troubleshooting firewall endpoint failures in the Network Firewall Developer Guide.
405
+ * If Network Firewall fails to create or delete the firewall endpoint in the subnet, it populates this with the reason for the error or failure and how to resolve it. A FAILED status indicates a non-recoverable state, and a ERROR status indicates an issue that you can fix. Depending on the error, it can take as many as 15 minutes to populate this field. For more information about the causes for failiure or errors and solutions available for this field, see Troubleshooting firewall endpoint failures in the Network Firewall Developer Guide.
406
406
  */
407
407
  StatusMessage?: StatusMessage;
408
408
  }
409
- export type AttachmentStatus = "CREATING"|"DELETING"|"SCALING"|"READY"|string;
409
+ export type AttachmentStatus = "CREATING"|"DELETING"|"FAILED"|"ERROR"|"SCALING"|"READY"|string;
410
410
  export type AvailabilityZone = string;
411
411
  export type AzSubnet = string;
412
412
  export type AzSubnets = AzSubnet[];
@@ -1011,6 +1011,10 @@ declare namespace NetworkFirewall {
1011
1011
  * The Amazon Resource Name (ARN) of the TLS inspection configuration.
1012
1012
  */
1013
1013
  TLSInspectionConfigurationArn?: ResourceArn;
1014
+ /**
1015
+ * Contains variables that you can use to override default Suricata settings in your firewall policy.
1016
+ */
1017
+ PolicyVariables?: PolicyVariables;
1014
1018
  }
1015
1019
  export interface FirewallPolicyMetadata {
1016
1020
  /**
@@ -1331,6 +1335,12 @@ declare namespace NetworkFirewall {
1331
1335
  }
1332
1336
  export type PerObjectSyncStatus = "PENDING"|"IN_SYNC"|"CAPACITY_CONSTRAINED"|string;
1333
1337
  export type PolicyString = string;
1338
+ export interface PolicyVariables {
1339
+ /**
1340
+ * The IPv4 or IPv6 addresses in CIDR notation to use for the Suricata HOME_NET variable. If your firewall uses an inspection VPC, you might want to override the HOME_NET variable with the CIDRs of your home networks. If you don't override HOME_NET with your own CIDRs, Network Firewall by default uses the CIDR of your inspection VPC.
1341
+ */
1342
+ RuleVariables?: IPSets;
1343
+ }
1334
1344
  export type Port = string;
1335
1345
  export interface PortRange {
1336
1346
  /**
@@ -1366,7 +1376,7 @@ declare namespace NetworkFirewall {
1366
1376
  */
1367
1377
  ResourceArn: ResourceArn;
1368
1378
  /**
1369
- * The IAM policy statement that lists the accounts that you want to share your rule group or firewall policy with and the operations that you want the accounts to be able to perform. For a rule group resource, you can specify the following operations in the Actions section of the statement: network-firewall:CreateFirewallPolicy network-firewall:UpdateFirewallPolicy network-firewall:ListRuleGroups For a firewall policy resource, you can specify the following operations in the Actions section of the statement: network-firewall:CreateFirewall network-firewall:UpdateFirewall network-firewall:AssociateFirewallPolicy network-firewall:ListFirewallPolicies In the Resource section of the statement, you specify the ARNs for the rule groups and firewall policies that you want to share with the account that you specified in Arn.
1379
+ * The IAM policy statement that lists the accounts that you want to share your rule group or firewall policy with and the operations that you want the accounts to be able to perform. For a rule group resource, you can specify the following operations in the Actions section of the statement: network-firewall:CreateFirewallPolicy network-firewall:UpdateFirewallPolicy network-firewall:ListRuleGroups For a firewall policy resource, you can specify the following operations in the Actions section of the statement: network-firewall:AssociateFirewallPolicy network-firewall:ListFirewallPolicies In the Resource section of the statement, you specify the ARNs for the rule groups and firewall policies that you want to share with the account that you specified in Arn.
1370
1380
  */
1371
1381
  Policy: PolicyString;
1372
1382
  }
@@ -1602,7 +1612,7 @@ declare namespace NetworkFirewall {
1602
1612
  */
1603
1613
  RuleOrder?: RuleOrder;
1604
1614
  /**
1605
- * Configures how Network Firewall processes traffic when a network connection breaks midstream. Network connections can break due to disruptions in external networks or within the firewall itself. DROP - Network Firewall fails closed and drops all subsequent traffic going to the firewall. This is the default behavior. CONTINUE - Network Firewall continues to apply rules to the subsequent traffic without context from traffic before the break. This impacts the behavior of rules that depend on this context. For example, if you have a stateful rule to drop http traffic, Network Firewall won't match the traffic for this rule because the service won't have the context from session initialization defining the application layer protocol as HTTP. However, this behavior is rule dependent—a TCP-layer rule using a flow:stateless rule would still match, as would the aws:drop_strict default action.
1615
+ * Configures how Network Firewall processes traffic when a network connection breaks midstream. Network connections can break due to disruptions in external networks or within the firewall itself. DROP - Network Firewall fails closed and drops all subsequent traffic going to the firewall. This is the default behavior. CONTINUE - Network Firewall continues to apply rules to the subsequent traffic without context from traffic before the break. This impacts the behavior of rules that depend on this context. For example, if you have a stateful rule to drop http traffic, Network Firewall won't match the traffic for this rule because the service won't have the context from session initialization defining the application layer protocol as HTTP. However, this behavior is rule dependent—a TCP-layer rule using a flow:stateless rule would still match, as would the aws:drop_strict default action. REJECT - Network Firewall fails closed and drops all subsequent traffic going to the firewall. Network Firewall also sends a TCP reject packet back to your client so that the client can immediately establish a new session. Network Firewall will have context about the new session and will apply rules to the subsequent traffic.
1606
1616
  */
1607
1617
  StreamExceptionPolicy?: StreamExceptionPolicy;
1608
1618
  }
@@ -1685,7 +1695,7 @@ declare namespace NetworkFirewall {
1685
1695
  }
1686
1696
  export type StatusMessage = string;
1687
1697
  export type StatusReason = string;
1688
- export type StreamExceptionPolicy = "DROP"|"CONTINUE"|string;
1698
+ export type StreamExceptionPolicy = "DROP"|"CONTINUE"|"REJECT"|string;
1689
1699
  export interface SubnetMapping {
1690
1700
  /**
1691
1701
  * The unique identifier for the subnet.