cdk-comprehend-s3olap 2.0.37 → 2.0.38
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +3 -3
- package/lib/cdk-comprehend-s3olap.js +2 -2
- package/lib/comprehend-lambdas.js +2 -2
- package/lib/iam-roles.js +4 -4
- package/node_modules/aws-sdk/CHANGELOG.md +6 -1
- package/node_modules/aws-sdk/README.md +1 -1
- package/node_modules/aws-sdk/apis/drs-2020-02-26.min.json +1 -0
- package/node_modules/aws-sdk/apis/evidently-2021-02-01.min.json +346 -70
- package/node_modules/aws-sdk/apis/evidently-2021-02-01.paginators.json +12 -0
- package/node_modules/aws-sdk/apis/wafv2-2019-07-29.min.json +121 -120
- package/node_modules/aws-sdk/clients/datasync.d.ts +16 -16
- package/node_modules/aws-sdk/clients/drs.d.ts +6 -2
- package/node_modules/aws-sdk/clients/evidently.d.ts +281 -8
- package/node_modules/aws-sdk/clients/wafv2.d.ts +26 -21
- package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +1 -1
- package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +5 -5
- package/node_modules/aws-sdk/dist/aws-sdk.js +3 -3
- package/node_modules/aws-sdk/dist/aws-sdk.min.js +2 -2
- package/node_modules/aws-sdk/lib/core.js +1 -1
- package/node_modules/aws-sdk/package.json +1 -1
- package/package.json +3 -3
@@ -364,11 +364,11 @@ declare class WAFV2 extends Service {
|
|
364
364
|
*/
|
365
365
|
updateIPSet(callback?: (err: AWSError, data: WAFV2.Types.UpdateIPSetResponse) => void): Request<WAFV2.Types.UpdateIPSetResponse, AWSError>;
|
366
366
|
/**
|
367
|
-
* Updates the expiration information for your managed rule set. Use this to initiate the expiration of a managed rule group version. After you initiate expiration for a version, WAF excludes it from the
|
367
|
+
* Updates the expiration information for your managed rule set. Use this to initiate the expiration of a managed rule group version. After you initiate expiration for a version, WAF excludes it from the response to ListAvailableManagedRuleGroupVersions for the managed rule group. This is intended for use only by vendors of managed rule sets. Vendors are Amazon Web Services and Amazon Web Services Marketplace sellers. Vendors, you can use the managed rule set APIs to provide controlled rollout of your versioned managed rule group offerings for your customers. The APIs are ListManagedRuleSets, GetManagedRuleSet, PutManagedRuleSetVersions, and UpdateManagedRuleSetVersionExpiryDate.
|
368
368
|
*/
|
369
369
|
updateManagedRuleSetVersionExpiryDate(params: WAFV2.Types.UpdateManagedRuleSetVersionExpiryDateRequest, callback?: (err: AWSError, data: WAFV2.Types.UpdateManagedRuleSetVersionExpiryDateResponse) => void): Request<WAFV2.Types.UpdateManagedRuleSetVersionExpiryDateResponse, AWSError>;
|
370
370
|
/**
|
371
|
-
* Updates the expiration information for your managed rule set. Use this to initiate the expiration of a managed rule group version. After you initiate expiration for a version, WAF excludes it from the
|
371
|
+
* Updates the expiration information for your managed rule set. Use this to initiate the expiration of a managed rule group version. After you initiate expiration for a version, WAF excludes it from the response to ListAvailableManagedRuleGroupVersions for the managed rule group. This is intended for use only by vendors of managed rule sets. Vendors are Amazon Web Services and Amazon Web Services Marketplace sellers. Vendors, you can use the managed rule set APIs to provide controlled rollout of your versioned managed rule group offerings for your customers. The APIs are ListManagedRuleSets, GetManagedRuleSet, PutManagedRuleSetVersions, and UpdateManagedRuleSetVersionExpiryDate.
|
372
372
|
*/
|
373
373
|
updateManagedRuleSetVersionExpiryDate(callback?: (err: AWSError, data: WAFV2.Types.UpdateManagedRuleSetVersionExpiryDateResponse) => void): Request<WAFV2.Types.UpdateManagedRuleSetVersionExpiryDateResponse, AWSError>;
|
374
374
|
/**
|
@@ -388,11 +388,11 @@ declare class WAFV2 extends Service {
|
|
388
388
|
*/
|
389
389
|
updateRuleGroup(callback?: (err: AWSError, data: WAFV2.Types.UpdateRuleGroupResponse) => void): Request<WAFV2.Types.UpdateRuleGroupResponse, AWSError>;
|
390
390
|
/**
|
391
|
-
* Updates the specified WebACL. While updating a web ACL, WAF provides
|
391
|
+
* Updates the specified WebACL. While updating a web ACL, WAF provides continuous coverage to the resources that you have associated with the web ACL. When you make changes to web ACLs or web ACL components, like rules and rule groups, WAF propagates the changes everywhere that the web ACL and its components are stored and used. Your changes are applied within seconds, but there might be a brief period of inconsistency when the changes have arrived in some places and not in others. So, for example, if you change a rule action setting, the action might be the old action in one area and the new action in another area. Or if you add an IP address to an IP set used in a blocking rule, the new address might briefly be blocked in one area while still allowed in another. This temporary inconsistency can occur when you first associate a web ACL with an Amazon Web Services resource and when you change a web ACL that is already associated with a resource. Generally, any inconsistencies of this type last only a few seconds. This operation completely replaces the mutable specifications that you already have for the web ACL with the ones that you provide to this call. To modify the web ACL, retrieve it by calling GetWebACL, update the settings as needed, and then provide the complete web ACL specification to this call. A web ACL defines a collection of rules to use to inspect and control web requests. Each rule has an action defined (allow, block, or count) for requests that match the statement of the rule. In the web ACL, you assign a default action to take (allow, block) for any request that does not match any of the rules. The rules in a web ACL can be a combination of the types Rule, RuleGroup, and managed rule group. You can associate a web ACL with one or more Amazon Web Services resources to protect. The resources can be an Amazon CloudFront distribution, an Amazon API Gateway REST API, an Application Load Balancer, or an AppSync GraphQL API.
|
392
392
|
*/
|
393
393
|
updateWebACL(params: WAFV2.Types.UpdateWebACLRequest, callback?: (err: AWSError, data: WAFV2.Types.UpdateWebACLResponse) => void): Request<WAFV2.Types.UpdateWebACLResponse, AWSError>;
|
394
394
|
/**
|
395
|
-
* Updates the specified WebACL. While updating a web ACL, WAF provides
|
395
|
+
* Updates the specified WebACL. While updating a web ACL, WAF provides continuous coverage to the resources that you have associated with the web ACL. When you make changes to web ACLs or web ACL components, like rules and rule groups, WAF propagates the changes everywhere that the web ACL and its components are stored and used. Your changes are applied within seconds, but there might be a brief period of inconsistency when the changes have arrived in some places and not in others. So, for example, if you change a rule action setting, the action might be the old action in one area and the new action in another area. Or if you add an IP address to an IP set used in a blocking rule, the new address might briefly be blocked in one area while still allowed in another. This temporary inconsistency can occur when you first associate a web ACL with an Amazon Web Services resource and when you change a web ACL that is already associated with a resource. Generally, any inconsistencies of this type last only a few seconds. This operation completely replaces the mutable specifications that you already have for the web ACL with the ones that you provide to this call. To modify the web ACL, retrieve it by calling GetWebACL, update the settings as needed, and then provide the complete web ACL specification to this call. A web ACL defines a collection of rules to use to inspect and control web requests. Each rule has an action defined (allow, block, or count) for requests that match the statement of the rule. In the web ACL, you assign a default action to take (allow, block) for any request that does not match any of the rules. The rules in a web ACL can be a combination of the types Rule, RuleGroup, and managed rule group. You can associate a web ACL with one or more Amazon Web Services resources to protect. The resources can be an Amazon CloudFront distribution, an Amazon API Gateway REST API, an Application Load Balancer, or an AppSync GraphQL API.
|
396
396
|
*/
|
397
397
|
updateWebACL(callback?: (err: AWSError, data: WAFV2.Types.UpdateWebACLResponse) => void): Request<WAFV2.Types.UpdateWebACLResponse, AWSError>;
|
398
398
|
}
|
@@ -453,7 +453,7 @@ declare namespace WAFV2 {
|
|
453
453
|
*/
|
454
454
|
SearchString: SearchString;
|
455
455
|
/**
|
456
|
-
* The part of the web request that you want WAF to inspect.
|
456
|
+
* The part of the web request that you want WAF to inspect.
|
457
457
|
*/
|
458
458
|
FieldToMatch: FieldToMatch;
|
459
459
|
/**
|
@@ -511,11 +511,11 @@ declare namespace WAFV2 {
|
|
511
511
|
export type ComparisonOperator = "EQ"|"NE"|"LE"|"LT"|"GE"|"GT"|string;
|
512
512
|
export interface Condition {
|
513
513
|
/**
|
514
|
-
* A single action condition.
|
514
|
+
* A single action condition. This is the action setting that a log record must contain in order to meet the condition.
|
515
515
|
*/
|
516
516
|
ActionCondition?: ActionCondition;
|
517
517
|
/**
|
518
|
-
* A single label name condition.
|
518
|
+
* A single label name condition. This is the fully qualified label name that a log record must contain in order to meet the condition. Fully qualified labels have a prefix, optional namespaces, and label name. The prefix identifies the rule group or web ACL context of the rule that added the label.
|
519
519
|
*/
|
520
520
|
LabelNameCondition?: LabelNameCondition;
|
521
521
|
}
|
@@ -538,7 +538,7 @@ declare namespace WAFV2 {
|
|
538
538
|
export type CookieNames = SingleCookieName[];
|
539
539
|
export interface Cookies {
|
540
540
|
/**
|
541
|
-
* The filter to use to identify the subset of cookies to inspect in a web request. You must specify exactly one setting: either All, IncludedCookies, or ExcludedCookies. Example JSON: "
|
541
|
+
* The filter to use to identify the subset of cookies to inspect in a web request. You must specify exactly one setting: either All, IncludedCookies, or ExcludedCookies. Example JSON: "MatchPattern": { "IncludedCookies": {"KeyToInclude1", "KeyToInclude2", "KeyToInclude3"} }
|
542
542
|
*/
|
543
543
|
MatchPattern: CookieMatchPattern;
|
544
544
|
/**
|
@@ -724,7 +724,7 @@ declare namespace WAFV2 {
|
|
724
724
|
}
|
725
725
|
export interface CustomResponse {
|
726
726
|
/**
|
727
|
-
* The HTTP status code to return to the client. For a list of status codes that you can use in your custom
|
727
|
+
* The HTTP status code to return to the client. For a list of status codes that you can use in your custom responses, see Supported status codes for custom response in the WAF Developer Guide.
|
728
728
|
*/
|
729
729
|
ResponseCode: ResponseStatusCode;
|
730
730
|
/**
|
@@ -1376,7 +1376,7 @@ declare namespace WAFV2 {
|
|
1376
1376
|
export type HeaderValue = string;
|
1377
1377
|
export interface Headers {
|
1378
1378
|
/**
|
1379
|
-
* The filter to use to identify the subset of headers to inspect in a web request. You must specify exactly one setting: either All, IncludedHeaders, or ExcludedHeaders. Example JSON: "
|
1379
|
+
* The filter to use to identify the subset of headers to inspect in a web request. You must specify exactly one setting: either All, IncludedHeaders, or ExcludedHeaders. Example JSON: "MatchPattern": { "ExcludedHeaders": {"KeyToExclude1", "KeyToExclude2"} }
|
1380
1380
|
*/
|
1381
1381
|
MatchPattern: HeaderMatchPattern;
|
1382
1382
|
/**
|
@@ -2161,7 +2161,7 @@ declare namespace WAFV2 {
|
|
2161
2161
|
*/
|
2162
2162
|
RegexString: RegexPatternString;
|
2163
2163
|
/**
|
2164
|
-
* The part of the web request that you want WAF to inspect.
|
2164
|
+
* The part of the web request that you want WAF to inspect.
|
2165
2165
|
*/
|
2166
2166
|
FieldToMatch: FieldToMatch;
|
2167
2167
|
/**
|
@@ -2197,7 +2197,7 @@ declare namespace WAFV2 {
|
|
2197
2197
|
*/
|
2198
2198
|
ARN: ResourceArn;
|
2199
2199
|
/**
|
2200
|
-
* The part of the web request that you want WAF to inspect.
|
2200
|
+
* The part of the web request that you want WAF to inspect.
|
2201
2201
|
*/
|
2202
2202
|
FieldToMatch: FieldToMatch;
|
2203
2203
|
/**
|
@@ -2435,6 +2435,7 @@ declare namespace WAFV2 {
|
|
2435
2435
|
export type SampledHTTPRequests = SampledHTTPRequest[];
|
2436
2436
|
export type Scope = "CLOUDFRONT"|"REGIONAL"|string;
|
2437
2437
|
export type SearchString = Buffer|Uint8Array|Blob|string;
|
2438
|
+
export type SensitivityLevel = "LOW"|"HIGH"|string;
|
2438
2439
|
export type SingleCookieName = string;
|
2439
2440
|
export interface SingleHeader {
|
2440
2441
|
/**
|
@@ -2451,7 +2452,7 @@ declare namespace WAFV2 {
|
|
2451
2452
|
export type Size = number;
|
2452
2453
|
export interface SizeConstraintStatement {
|
2453
2454
|
/**
|
2454
|
-
* The part of the web request that you want WAF to inspect.
|
2455
|
+
* The part of the web request that you want WAF to inspect.
|
2455
2456
|
*/
|
2456
2457
|
FieldToMatch: FieldToMatch;
|
2457
2458
|
/**
|
@@ -2470,29 +2471,33 @@ declare namespace WAFV2 {
|
|
2470
2471
|
export type SolveTimestamp = number;
|
2471
2472
|
export interface SqliMatchStatement {
|
2472
2473
|
/**
|
2473
|
-
* The part of the web request that you want WAF to inspect.
|
2474
|
+
* The part of the web request that you want WAF to inspect.
|
2474
2475
|
*/
|
2475
2476
|
FieldToMatch: FieldToMatch;
|
2476
2477
|
/**
|
2477
2478
|
* Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass detection. If you specify one or more transformations in a rule statement, WAF performs all transformations on the content of the request component identified by FieldToMatch, starting from the lowest priority setting, before inspecting the content for a match.
|
2478
2479
|
*/
|
2479
2480
|
TextTransformations: TextTransformations;
|
2481
|
+
/**
|
2482
|
+
* The sensitivity that you want WAF to use to inspect for SQL injection attacks. HIGH detects more attacks, but might generate more false positives, especially if your web requests frequently contain unusual strings. For information about identifying and mitigating false positives, see Testing and tuning in the WAF Developer Guide. LOW is generally a better choice for resources that already have other protections against SQL injection attacks or that have a low tolerance for false positives. Default: LOW
|
2483
|
+
*/
|
2484
|
+
SensitivityLevel?: SensitivityLevel;
|
2480
2485
|
}
|
2481
2486
|
export interface Statement {
|
2482
2487
|
/**
|
2483
|
-
* A rule statement that defines a string match search for WAF to apply to web requests. The byte match statement provides the bytes to search for, the location in requests that you want WAF to search, and other settings. The bytes to search for are typically a string that corresponds with ASCII characters. In the WAF console and the developer guide, this is
|
2488
|
+
* A rule statement that defines a string match search for WAF to apply to web requests. The byte match statement provides the bytes to search for, the location in requests that you want WAF to search, and other settings. The bytes to search for are typically a string that corresponds with ASCII characters. In the WAF console and the developer guide, this is called a string match statement.
|
2484
2489
|
*/
|
2485
2490
|
ByteMatchStatement?: ByteMatchStatement;
|
2486
2491
|
/**
|
2487
|
-
*
|
2492
|
+
* A rule statement that inspects for malicious SQL code. Attackers insert malicious SQL code into web requests to do things like modify your database or extract data from it.
|
2488
2493
|
*/
|
2489
2494
|
SqliMatchStatement?: SqliMatchStatement;
|
2490
2495
|
/**
|
2491
|
-
* A rule statement that
|
2496
|
+
* A rule statement that inspects for cross-site scripting (XSS) attacks. In XSS attacks, the attacker uses vulnerabilities in a benign website as a vehicle to inject malicious client-site scripts into other legitimate web browsers.
|
2492
2497
|
*/
|
2493
2498
|
XssMatchStatement?: XssMatchStatement;
|
2494
2499
|
/**
|
2495
|
-
* A rule statement that compares a number of bytes against the size of a request component, using a comparison operator, such as greater than (>) or less than (<). For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes. If you configure WAF to inspect the request body, WAF inspects only the first 8192 bytes (8 KB). If the request body for your web requests never exceeds 8192 bytes, you
|
2500
|
+
* A rule statement that compares a number of bytes against the size of a request component, using a comparison operator, such as greater than (>) or less than (<). For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes. If you configure WAF to inspect the request body, WAF inspects only the first 8192 bytes (8 KB). If the request body for your web requests never exceeds 8192 bytes, you could use a size constraint statement to block requests that have a request body greater than 8192 bytes. If you choose URI for the value of Part of the request to filter on, the slash (/) in the URI counts as one character. For example, the URI /logo.jpg is nine characters long.
|
2496
2501
|
*/
|
2497
2502
|
SizeConstraintStatement?: SizeConstraintStatement;
|
2498
2503
|
/**
|
@@ -2512,7 +2517,7 @@ declare namespace WAFV2 {
|
|
2512
2517
|
*/
|
2513
2518
|
RegexPatternSetReferenceStatement?: RegexPatternSetReferenceStatement;
|
2514
2519
|
/**
|
2515
|
-
* A rate-based rule tracks the rate of requests for each originating IP address, and triggers the rule action when the rate exceeds a limit that you specify on the number of requests in any 5-minute time span. You can use this to put a temporary block on requests from an IP address that is sending excessive requests. WAF tracks and manages web requests separately for each instance of a rate-based rule that you use. For example, if you provide the same rate-based rule settings in two web ACLs, each of the two rule statements represents a separate instance of the rate-based rule and gets its own tracking and management by WAF. If you define a rate-based rule inside a rule group, and then use that rule group in multiple places, each use creates a separate instance of the rate-based rule that gets its own tracking and management by WAF. When the rule action triggers, WAF blocks additional requests from the IP address until the request rate falls below the limit. You can optionally nest another statement inside the rate-based statement, to narrow the scope of the rule so that it only counts requests that match the nested statement. For example, based on recent requests that you have seen from an attacker, you might create a rate-based rule with a nested AND rule statement that contains the following nested statements: An IP match statement with an IP set that specified the address 192.0.2.44. A string match statement that searches in the User-Agent header for the string BadBot. In this rate-based rule, you also define a rate limit. For this example, the rate limit is 1,000. Requests that meet both of the
|
2520
|
+
* A rate-based rule tracks the rate of requests for each originating IP address, and triggers the rule action when the rate exceeds a limit that you specify on the number of requests in any 5-minute time span. You can use this to put a temporary block on requests from an IP address that is sending excessive requests. WAF tracks and manages web requests separately for each instance of a rate-based rule that you use. For example, if you provide the same rate-based rule settings in two web ACLs, each of the two rule statements represents a separate instance of the rate-based rule and gets its own tracking and management by WAF. If you define a rate-based rule inside a rule group, and then use that rule group in multiple places, each use creates a separate instance of the rate-based rule that gets its own tracking and management by WAF. When the rule action triggers, WAF blocks additional requests from the IP address until the request rate falls below the limit. You can optionally nest another statement inside the rate-based statement, to narrow the scope of the rule so that it only counts requests that match the nested statement. For example, based on recent requests that you have seen from an attacker, you might create a rate-based rule with a nested AND rule statement that contains the following nested statements: An IP match statement with an IP set that specified the address 192.0.2.44. A string match statement that searches in the User-Agent header for the string BadBot. In this rate-based rule, you also define a rate limit. For this example, the rate limit is 1,000. Requests that meet the criteria of both of the nested statements are counted. If the count exceeds 1,000 requests per five minutes, the rule action triggers. Requests that do not meet the criteria of both of the nested statements are not counted towards the rate limit and are not affected by this rule. You cannot nest a RateBasedStatement inside another statement, for example inside a NotStatement or OrStatement. You can define a RateBasedStatement inside a web ACL and inside a rule group.
|
2516
2521
|
*/
|
2517
2522
|
RateBasedStatement?: RateBasedStatement;
|
2518
2523
|
/**
|
@@ -2839,7 +2844,7 @@ declare namespace WAFV2 {
|
|
2839
2844
|
*/
|
2840
2845
|
CloudWatchMetricsEnabled: Boolean;
|
2841
2846
|
/**
|
2842
|
-
* A name of the Amazon CloudWatch metric. The name can contain only the characters: A-Z, a-z, 0-9, - (hyphen), and _ (underscore). The name can be from one to 128 characters long. It can't contain whitespace or metric names reserved for WAF, for example
|
2847
|
+
* A name of the Amazon CloudWatch metric. The name can contain only the characters: A-Z, a-z, 0-9, - (hyphen), and _ (underscore). The name can be from one to 128 characters long. It can't contain whitespace or metric names reserved for WAF, for example All and Default_Action.
|
2843
2848
|
*/
|
2844
2849
|
MetricName: MetricName;
|
2845
2850
|
}
|
@@ -2926,7 +2931,7 @@ declare namespace WAFV2 {
|
|
2926
2931
|
}
|
2927
2932
|
export interface XssMatchStatement {
|
2928
2933
|
/**
|
2929
|
-
* The part of the web request that you want WAF to inspect.
|
2934
|
+
* The part of the web request that you want WAF to inspect.
|
2930
2935
|
*/
|
2931
2936
|
FieldToMatch: FieldToMatch;
|
2932
2937
|
/**
|