cdk-comprehend-s3olap 2.0.43 → 2.0.46
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +3 -3
- package/lib/cdk-comprehend-s3olap.js +2 -2
- package/lib/comprehend-lambdas.js +2 -2
- package/lib/iam-roles.js +4 -4
- package/node_modules/aws-sdk/CHANGELOG.md +19 -1
- package/node_modules/aws-sdk/README.md +1 -1
- package/node_modules/aws-sdk/apis/account-2021-02-01.min.json +101 -0
- package/node_modules/aws-sdk/apis/athena-2017-05-18.min.json +117 -6
- package/node_modules/aws-sdk/apis/athena-2017-05-18.paginators.json +5 -0
- package/node_modules/aws-sdk/apis/docdb-2014-10-31.min.json +11 -0
- package/node_modules/aws-sdk/apis/frauddetector-2019-11-15.min.json +249 -94
- package/node_modules/aws-sdk/apis/iotdeviceadvisor-2020-09-18.min.json +33 -12
- package/node_modules/aws-sdk/apis/iotsitewise-2019-12-02.min.json +260 -59
- package/node_modules/aws-sdk/apis/iotsitewise-2019-12-02.paginators.json +6 -0
- package/node_modules/aws-sdk/apis/kendra-2019-02-03.min.json +73 -72
- package/node_modules/aws-sdk/apis/medialive-2017-10-14.min.json +50 -3
- package/node_modules/aws-sdk/apis/monitoring-2010-08-01.min.json +54 -29
- package/node_modules/aws-sdk/apis/network-firewall-2020-11-12.min.json +91 -48
- package/node_modules/aws-sdk/apis/rds-2014-10-31.min.json +143 -119
- package/node_modules/aws-sdk/apis/transcribe-2017-10-26.min.json +2 -1
- package/node_modules/aws-sdk/clients/account.d.ts +104 -6
- package/node_modules/aws-sdk/clients/athena.d.ts +127 -0
- package/node_modules/aws-sdk/clients/cloudwatch.d.ts +40 -1
- package/node_modules/aws-sdk/clients/dms.d.ts +2 -2
- package/node_modules/aws-sdk/clients/docdb.d.ts +20 -0
- package/node_modules/aws-sdk/clients/ec2.d.ts +1 -1
- package/node_modules/aws-sdk/clients/frauddetector.d.ts +176 -5
- package/node_modules/aws-sdk/clients/iotdeviceadvisor.d.ts +49 -0
- package/node_modules/aws-sdk/clients/iotsitewise.d.ts +192 -0
- package/node_modules/aws-sdk/clients/kendra.d.ts +12 -7
- package/node_modules/aws-sdk/clients/medialive.d.ts +37 -0
- package/node_modules/aws-sdk/clients/networkfirewall.d.ts +53 -2
- package/node_modules/aws-sdk/clients/rds.d.ts +137 -87
- package/node_modules/aws-sdk/clients/transcribeservice.d.ts +2 -2
- package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +1 -1
- package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +15 -15
- package/node_modules/aws-sdk/dist/aws-sdk.js +322 -157
- package/node_modules/aws-sdk/dist/aws-sdk.min.js +93 -93
- package/node_modules/aws-sdk/lib/core.js +1 -1
- package/node_modules/aws-sdk/package.json +1 -1
- package/package.json +3 -3
@@ -60,11 +60,11 @@ declare class Kendra extends Service {
|
|
60
60
|
*/
|
61
61
|
clearQuerySuggestions(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
62
62
|
/**
|
63
|
-
* Creates an access configuration for your documents. This includes user and group access information for your documents. This is useful for user context filtering, where search results are filtered based on the user or their group access to documents. You can use this to re-configure your existing document level access control without indexing all of your documents again. For example, your index contains top-secret company documents that only certain employees or users should access. One of these users leaves the company or switches to a team that should be blocked from
|
63
|
+
* Creates an access configuration for your documents. This includes user and group access information for your documents. This is useful for user context filtering, where search results are filtered based on the user or their group access to documents. You can use this to re-configure your existing document level access control without indexing all of your documents again. For example, your index contains top-secret company documents that only certain employees or users should access. One of these users leaves the company or switches to a team that should be blocked from accessing top-secret documents. The user still has access to top-secret documents because the user had access when your documents were previously indexed. You can create a specific access control configuration for the user with deny access. You can later update the access control configuration to allow access if the user returns to the company and re-joins the 'top-secret' team. You can re-configure access control for your documents as circumstances change. To apply your access control configuration to certain documents, you call the BatchPutDocument API with the AccessControlConfigurationId included in the Document object. If you use an S3 bucket as a data source, you update the .metadata.json with the AccessControlConfigurationId and synchronize your data source. Amazon Kendra currently only supports access control configuration for S3 data sources and documents indexed using the BatchPutDocument API.
|
64
64
|
*/
|
65
65
|
createAccessControlConfiguration(params: Kendra.Types.CreateAccessControlConfigurationRequest, callback?: (err: AWSError, data: Kendra.Types.CreateAccessControlConfigurationResponse) => void): Request<Kendra.Types.CreateAccessControlConfigurationResponse, AWSError>;
|
66
66
|
/**
|
67
|
-
* Creates an access configuration for your documents. This includes user and group access information for your documents. This is useful for user context filtering, where search results are filtered based on the user or their group access to documents. You can use this to re-configure your existing document level access control without indexing all of your documents again. For example, your index contains top-secret company documents that only certain employees or users should access. One of these users leaves the company or switches to a team that should be blocked from
|
67
|
+
* Creates an access configuration for your documents. This includes user and group access information for your documents. This is useful for user context filtering, where search results are filtered based on the user or their group access to documents. You can use this to re-configure your existing document level access control without indexing all of your documents again. For example, your index contains top-secret company documents that only certain employees or users should access. One of these users leaves the company or switches to a team that should be blocked from accessing top-secret documents. The user still has access to top-secret documents because the user had access when your documents were previously indexed. You can create a specific access control configuration for the user with deny access. You can later update the access control configuration to allow access if the user returns to the company and re-joins the 'top-secret' team. You can re-configure access control for your documents as circumstances change. To apply your access control configuration to certain documents, you call the BatchPutDocument API with the AccessControlConfigurationId included in the Document object. If you use an S3 bucket as a data source, you update the .metadata.json with the AccessControlConfigurationId and synchronize your data source. Amazon Kendra currently only supports access control configuration for S3 data sources and documents indexed using the BatchPutDocument API.
|
68
68
|
*/
|
69
69
|
createAccessControlConfiguration(callback?: (err: AWSError, data: Kendra.Types.CreateAccessControlConfigurationResponse) => void): Request<Kendra.Types.CreateAccessControlConfigurationResponse, AWSError>;
|
70
70
|
/**
|
@@ -436,11 +436,11 @@ declare class Kendra extends Service {
|
|
436
436
|
*/
|
437
437
|
untagResource(callback?: (err: AWSError, data: Kendra.Types.UntagResourceResponse) => void): Request<Kendra.Types.UntagResourceResponse, AWSError>;
|
438
438
|
/**
|
439
|
-
* Updates an access control configuration for your documents in an index. This includes user and group access information for your documents. This is useful for user context filtering, where search results are filtered based on the user or their group access to documents. You can update an access control configuration you created without indexing all of your documents again. For example, your index contains top-secret company documents that only certain employees or users should access. You created an 'allow' access control configuration for one user who recently joined the 'top-secret' team, switching from a team with 'deny' access to top-secret documents. However, the user suddenly returns to their previous team and should no longer have access to top secret documents. You can update the access control configuration to re-configure access control for your documents as circumstances change. You call the BatchPutDocument API to apply the updated access control configuration, with the AccessControlConfigurationId included in the Document object. If you use an S3 bucket as a data source, you synchronize your data source to apply the
|
439
|
+
* Updates an access control configuration for your documents in an index. This includes user and group access information for your documents. This is useful for user context filtering, where search results are filtered based on the user or their group access to documents. You can update an access control configuration you created without indexing all of your documents again. For example, your index contains top-secret company documents that only certain employees or users should access. You created an 'allow' access control configuration for one user who recently joined the 'top-secret' team, switching from a team with 'deny' access to top-secret documents. However, the user suddenly returns to their previous team and should no longer have access to top secret documents. You can update the access control configuration to re-configure access control for your documents as circumstances change. You call the BatchPutDocument API to apply the updated access control configuration, with the AccessControlConfigurationId included in the Document object. If you use an S3 bucket as a data source, you synchronize your data source to apply the AccessControlConfigurationId in the .metadata.json file. Amazon Kendra currently only supports access control configuration for S3 data sources and documents indexed using the BatchPutDocument API.
|
440
440
|
*/
|
441
441
|
updateAccessControlConfiguration(params: Kendra.Types.UpdateAccessControlConfigurationRequest, callback?: (err: AWSError, data: Kendra.Types.UpdateAccessControlConfigurationResponse) => void): Request<Kendra.Types.UpdateAccessControlConfigurationResponse, AWSError>;
|
442
442
|
/**
|
443
|
-
* Updates an access control configuration for your documents in an index. This includes user and group access information for your documents. This is useful for user context filtering, where search results are filtered based on the user or their group access to documents. You can update an access control configuration you created without indexing all of your documents again. For example, your index contains top-secret company documents that only certain employees or users should access. You created an 'allow' access control configuration for one user who recently joined the 'top-secret' team, switching from a team with 'deny' access to top-secret documents. However, the user suddenly returns to their previous team and should no longer have access to top secret documents. You can update the access control configuration to re-configure access control for your documents as circumstances change. You call the BatchPutDocument API to apply the updated access control configuration, with the AccessControlConfigurationId included in the Document object. If you use an S3 bucket as a data source, you synchronize your data source to apply the
|
443
|
+
* Updates an access control configuration for your documents in an index. This includes user and group access information for your documents. This is useful for user context filtering, where search results are filtered based on the user or their group access to documents. You can update an access control configuration you created without indexing all of your documents again. For example, your index contains top-secret company documents that only certain employees or users should access. You created an 'allow' access control configuration for one user who recently joined the 'top-secret' team, switching from a team with 'deny' access to top-secret documents. However, the user suddenly returns to their previous team and should no longer have access to top secret documents. You can update the access control configuration to re-configure access control for your documents as circumstances change. You call the BatchPutDocument API to apply the updated access control configuration, with the AccessControlConfigurationId included in the Document object. If you use an S3 bucket as a data source, you synchronize your data source to apply the AccessControlConfigurationId in the .metadata.json file. Amazon Kendra currently only supports access control configuration for S3 data sources and documents indexed using the BatchPutDocument API.
|
444
444
|
*/
|
445
445
|
updateAccessControlConfiguration(callback?: (err: AWSError, data: Kendra.Types.UpdateAccessControlConfigurationResponse) => void): Request<Kendra.Types.UpdateAccessControlConfigurationResponse, AWSError>;
|
446
446
|
/**
|
@@ -3165,7 +3165,7 @@ declare namespace Kendra {
|
|
3165
3165
|
*/
|
3166
3166
|
IndexId: IndexId;
|
3167
3167
|
/**
|
3168
|
-
* If the previous response was incomplete (because there
|
3168
|
+
* If the previous response was incomplete (because there's more data to retrieve), Amazon Kendra returns a pagination token in the response. You can use this pagination token to retrieve the next set of access control configurations.
|
3169
3169
|
*/
|
3170
3170
|
NextToken?: String;
|
3171
3171
|
/**
|
@@ -3175,7 +3175,7 @@ declare namespace Kendra {
|
|
3175
3175
|
}
|
3176
3176
|
export interface ListAccessControlConfigurationsResponse {
|
3177
3177
|
/**
|
3178
|
-
* If the response is truncated, Amazon Kendra returns this token
|
3178
|
+
* If the response is truncated, Amazon Kendra returns this token, which you can use in the subsequent request to retrieve the next set of access control configurations.
|
3179
3179
|
*/
|
3180
3180
|
NextToken?: String;
|
3181
3181
|
/**
|
@@ -4218,7 +4218,7 @@ declare namespace Kendra {
|
|
4218
4218
|
*/
|
4219
4219
|
Urls: SharePointUrlList;
|
4220
4220
|
/**
|
4221
|
-
* The Amazon Resource Name (ARN) of an Secrets Manager secret that contains the user name and password required to connect to the SharePoint instance. If you use SharePoint Server, you also need to provide the sever domain name as part of the credentials. For more information, see Using a Microsoft SharePoint Data Source.
|
4221
|
+
* The Amazon Resource Name (ARN) of an Secrets Manager secret that contains the user name and password required to connect to the SharePoint instance. If you use SharePoint Server, you also need to provide the sever domain name as part of the credentials. For more information, see Using a Microsoft SharePoint Data Source. You can also provide OAuth authentication credentials of user name, password, client ID, and client secret. For more information, see Authentication for a SharePoint data source.
|
4222
4222
|
*/
|
4223
4223
|
SecretArn: SecretArn;
|
4224
4224
|
/**
|
@@ -4257,7 +4257,12 @@ declare namespace Kendra {
|
|
4257
4257
|
* The path to the SSL certificate stored in an Amazon S3 bucket. You use this to connect to SharePoint.
|
4258
4258
|
*/
|
4259
4259
|
SslCertificateS3Path?: S3Path;
|
4260
|
+
/**
|
4261
|
+
* Whether you want to connect to SharePoint using basic authentication of user name and password, or OAuth authentication of user name, password, client ID, and client secret. You can use OAuth authentication for SharePoint Online.
|
4262
|
+
*/
|
4263
|
+
AuthenticationType?: SharePointOnlineAuthenticationType;
|
4260
4264
|
}
|
4265
|
+
export type SharePointOnlineAuthenticationType = "HTTP_BASIC"|"OAUTH2"|string;
|
4261
4266
|
export type SharePointUrlList = Url[];
|
4262
4267
|
export type SharePointVersion = "SHAREPOINT_2013"|"SHAREPOINT_2016"|"SHAREPOINT_ONLINE"|string;
|
4263
4268
|
export type SharedDriveId = string;
|
@@ -357,6 +357,14 @@ declare class MediaLive extends Service {
|
|
357
357
|
* Purchase an offering and create a reservation.
|
358
358
|
*/
|
359
359
|
purchaseOffering(callback?: (err: AWSError, data: MediaLive.Types.PurchaseOfferingResponse) => void): Request<MediaLive.Types.PurchaseOfferingResponse, AWSError>;
|
360
|
+
/**
|
361
|
+
* Send a reboot command to the specified input device. The device will begin rebooting within a few seconds of sending the command. When the reboot is complete, the device’s connection status will change to connected.
|
362
|
+
*/
|
363
|
+
rebootInputDevice(params: MediaLive.Types.RebootInputDeviceRequest, callback?: (err: AWSError, data: MediaLive.Types.RebootInputDeviceResponse) => void): Request<MediaLive.Types.RebootInputDeviceResponse, AWSError>;
|
364
|
+
/**
|
365
|
+
* Send a reboot command to the specified input device. The device will begin rebooting within a few seconds of sending the command. When the reboot is complete, the device’s connection status will change to connected.
|
366
|
+
*/
|
367
|
+
rebootInputDevice(callback?: (err: AWSError, data: MediaLive.Types.RebootInputDeviceResponse) => void): Request<MediaLive.Types.RebootInputDeviceResponse, AWSError>;
|
360
368
|
/**
|
361
369
|
* Reject the transfer of the specified input device to your AWS account.
|
362
370
|
*/
|
@@ -373,6 +381,14 @@ declare class MediaLive extends Service {
|
|
373
381
|
* Starts an existing channel
|
374
382
|
*/
|
375
383
|
startChannel(callback?: (err: AWSError, data: MediaLive.Types.StartChannelResponse) => void): Request<MediaLive.Types.StartChannelResponse, AWSError>;
|
384
|
+
/**
|
385
|
+
* Start a maintenance window for the specified input device. Starting a maintenance window will give the device up to two hours to install software. If the device was streaming prior to the maintenance, it will resume streaming when the software is fully installed. Devices automatically install updates while they are powered on and their MediaLive channels are stopped. A maintenance window allows you to update a device without having to stop MediaLive channels that use the device. The device must remain powered on and connected to the internet for the duration of the maintenance.
|
386
|
+
*/
|
387
|
+
startInputDeviceMaintenanceWindow(params: MediaLive.Types.StartInputDeviceMaintenanceWindowRequest, callback?: (err: AWSError, data: MediaLive.Types.StartInputDeviceMaintenanceWindowResponse) => void): Request<MediaLive.Types.StartInputDeviceMaintenanceWindowResponse, AWSError>;
|
388
|
+
/**
|
389
|
+
* Start a maintenance window for the specified input device. Starting a maintenance window will give the device up to two hours to install software. If the device was streaming prior to the maintenance, it will resume streaming when the software is fully installed. Devices automatically install updates while they are powered on and their MediaLive channels are stopped. A maintenance window allows you to update a device without having to stop MediaLive channels that use the device. The device must remain powered on and connected to the internet for the duration of the maintenance.
|
390
|
+
*/
|
391
|
+
startInputDeviceMaintenanceWindow(callback?: (err: AWSError, data: MediaLive.Types.StartInputDeviceMaintenanceWindowResponse) => void): Request<MediaLive.Types.StartInputDeviceMaintenanceWindowResponse, AWSError>;
|
376
392
|
/**
|
377
393
|
* Start (run) the multiplex. Starting the multiplex does not start the channels. You must explicitly start each channel.
|
378
394
|
*/
|
@@ -5590,6 +5606,19 @@ When this field is defined, ConstantBitrate must be undefined.
|
|
5590
5606
|
}
|
5591
5607
|
export interface RawSettings {
|
5592
5608
|
}
|
5609
|
+
export type RebootInputDeviceForce = "NO"|"YES"|string;
|
5610
|
+
export interface RebootInputDeviceRequest {
|
5611
|
+
/**
|
5612
|
+
* Force a reboot of an input device. If the device is streaming, it will stop streaming and begin rebooting within a few seconds of sending the command. If the device was streaming prior to the reboot, the device will resume streaming when the reboot completes.
|
5613
|
+
*/
|
5614
|
+
Force?: RebootInputDeviceForce;
|
5615
|
+
/**
|
5616
|
+
* The unique ID of the input device to reboot. For example, hd-123456789abcdef.
|
5617
|
+
*/
|
5618
|
+
InputDeviceId: __string;
|
5619
|
+
}
|
5620
|
+
export interface RebootInputDeviceResponse {
|
5621
|
+
}
|
5593
5622
|
export interface Rec601Settings {
|
5594
5623
|
}
|
5595
5624
|
export interface Rec709Settings {
|
@@ -6145,6 +6174,14 @@ one destination per packager.
|
|
6145
6174
|
*/
|
6146
6175
|
Vpc?: VpcOutputSettingsDescription;
|
6147
6176
|
}
|
6177
|
+
export interface StartInputDeviceMaintenanceWindowRequest {
|
6178
|
+
/**
|
6179
|
+
* The unique ID of the input device to start a maintenance window for. For example, hd-123456789abcdef.
|
6180
|
+
*/
|
6181
|
+
InputDeviceId: __string;
|
6182
|
+
}
|
6183
|
+
export interface StartInputDeviceMaintenanceWindowResponse {
|
6184
|
+
}
|
6148
6185
|
export interface StartMultiplexRequest {
|
6149
6186
|
/**
|
6150
6187
|
* The ID of the multiplex.
|
@@ -367,8 +367,29 @@ declare namespace NetworkFirewall {
|
|
367
367
|
export type AzSubnet = string;
|
368
368
|
export type AzSubnets = AzSubnet[];
|
369
369
|
export type Boolean = boolean;
|
370
|
+
export type CIDRCount = number;
|
371
|
+
export interface CIDRSummary {
|
372
|
+
/**
|
373
|
+
* The number of CIDR blocks available for use by the IP set references in a firewall.
|
374
|
+
*/
|
375
|
+
AvailableCIDRCount?: CIDRCount;
|
376
|
+
/**
|
377
|
+
* The number of CIDR blocks used by the IP set references in a firewall.
|
378
|
+
*/
|
379
|
+
UtilizedCIDRCount?: CIDRCount;
|
380
|
+
/**
|
381
|
+
* The list of the IP set references used by a firewall.
|
382
|
+
*/
|
383
|
+
IPSetReferences?: IPSetMetadataMap;
|
384
|
+
}
|
385
|
+
export interface CapacityUsageSummary {
|
386
|
+
/**
|
387
|
+
* Describes the capacity usage of the CIDR blocks used by the IP set references in a firewall.
|
388
|
+
*/
|
389
|
+
CIDRs?: CIDRSummary;
|
390
|
+
}
|
370
391
|
export type CollectionMember_String = string;
|
371
|
-
export type ConfigurationSyncState = "PENDING"|"IN_SYNC"|string;
|
392
|
+
export type ConfigurationSyncState = "PENDING"|"IN_SYNC"|"CAPACITY_CONSTRAINED"|string;
|
372
393
|
export interface CreateFirewallPolicyRequest {
|
373
394
|
/**
|
374
395
|
* The descriptive name of the firewall policy. You can't change the name of a firewall policy after you create it.
|
@@ -942,6 +963,10 @@ declare namespace NetworkFirewall {
|
|
942
963
|
* The subnets that you've configured for use by the Network Firewall firewall. This contains one array element per Availability Zone where you've configured a subnet. These objects provide details of the information that is summarized in the ConfigurationSyncStateSummary and Status, broken down by zone and configuration object.
|
943
964
|
*/
|
944
965
|
SyncStates?: SyncStates;
|
966
|
+
/**
|
967
|
+
* Describes the capacity usage of the resources contained in a firewall's reference sets. Network Firewall calclulates the capacity usage by taking an aggregated count of all of the resources used by all of the reference sets in a firewall.
|
968
|
+
*/
|
969
|
+
CapacityUsageSummary?: CapacityUsageSummary;
|
945
970
|
}
|
946
971
|
export type FirewallStatusValue = "PROVISIONING"|"DELETING"|"READY"|string;
|
947
972
|
export type Firewalls = FirewallMetadata[];
|
@@ -981,6 +1006,22 @@ declare namespace NetworkFirewall {
|
|
981
1006
|
*/
|
982
1007
|
Definition: VariableDefinitionList;
|
983
1008
|
}
|
1009
|
+
export type IPSetArn = string;
|
1010
|
+
export interface IPSetMetadata {
|
1011
|
+
/**
|
1012
|
+
* Describes the total number of CIDR blocks currently in use by the IP set references in a firewall. To determine how many CIDR blocks are available for you to use in a firewall, you can call AvailableCIDRCount.
|
1013
|
+
*/
|
1014
|
+
ResolvedCIDRCount?: CIDRCount;
|
1015
|
+
}
|
1016
|
+
export type IPSetMetadataMap = {[key: string]: IPSetMetadata};
|
1017
|
+
export interface IPSetReference {
|
1018
|
+
/**
|
1019
|
+
* The Amazon Resource Name (ARN) of the resource that you are referencing in your rule group.
|
1020
|
+
*/
|
1021
|
+
ReferenceArn?: ResourceArn;
|
1022
|
+
}
|
1023
|
+
export type IPSetReferenceMap = {[key: string]: IPSetReference};
|
1024
|
+
export type IPSetReferenceName = string;
|
984
1025
|
export type IPSets = {[key: string]: IPSet};
|
985
1026
|
export type KeyId = string;
|
986
1027
|
export type Keyword = string;
|
@@ -1149,7 +1190,7 @@ declare namespace NetworkFirewall {
|
|
1149
1190
|
*/
|
1150
1191
|
UpdateToken?: UpdateToken;
|
1151
1192
|
}
|
1152
|
-
export type PerObjectSyncStatus = "PENDING"|"IN_SYNC"|string;
|
1193
|
+
export type PerObjectSyncStatus = "PENDING"|"IN_SYNC"|"CAPACITY_CONSTRAINED"|string;
|
1153
1194
|
export type PolicyString = string;
|
1154
1195
|
export type Port = string;
|
1155
1196
|
export interface PortRange {
|
@@ -1192,6 +1233,12 @@ declare namespace NetworkFirewall {
|
|
1192
1233
|
}
|
1193
1234
|
export interface PutResourcePolicyResponse {
|
1194
1235
|
}
|
1236
|
+
export interface ReferenceSets {
|
1237
|
+
/**
|
1238
|
+
* The list of IP set references.
|
1239
|
+
*/
|
1240
|
+
IPSetReferences?: IPSetReferenceMap;
|
1241
|
+
}
|
1195
1242
|
export type ResourceArn = string;
|
1196
1243
|
export type ResourceId = string;
|
1197
1244
|
export type ResourceManagedStatus = "MANAGED"|"ACCOUNT"|string;
|
@@ -1214,6 +1261,10 @@ declare namespace NetworkFirewall {
|
|
1214
1261
|
* Settings that are available for use in the rules in the rule group. You can only use these for stateful rule groups.
|
1215
1262
|
*/
|
1216
1263
|
RuleVariables?: RuleVariables;
|
1264
|
+
/**
|
1265
|
+
* The list of a rule group's reference sets.
|
1266
|
+
*/
|
1267
|
+
ReferenceSets?: ReferenceSets;
|
1217
1268
|
/**
|
1218
1269
|
* The stateful rules or stateless rules for the rule group.
|
1219
1270
|
*/
|