cdk-docker-image-deployment 0.0.166 → 0.0.167

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -69,16 +69,19 @@
69
69
  "configuration": {
70
70
  "jsonvalue": true
71
71
  },
72
+ "networkAccessControl": {
73
+ "shape": "Sj"
74
+ },
72
75
  "organizationRoleName": {
73
- "shape": "Sl"
76
+ "shape": "Sq"
74
77
  },
75
78
  "permissionType": {},
76
79
  "stackSetName": {},
77
80
  "tags": {
78
- "shape": "Sr"
81
+ "shape": "Sw"
79
82
  },
80
83
  "vpcConfiguration": {
81
- "shape": "Su"
84
+ "shape": "Sz"
82
85
  },
83
86
  "workspaceDataSources": {
84
87
  "shape": "Sc"
@@ -90,13 +93,13 @@
90
93
  "shape": "Si"
91
94
  },
92
95
  "workspaceNotificationDestinations": {
93
- "shape": "Sj"
96
+ "shape": "So"
94
97
  },
95
98
  "workspaceOrganizationalUnits": {
96
- "shape": "Sm"
99
+ "shape": "Sr"
97
100
  },
98
101
  "workspaceRoleArn": {
99
- "shape": "Sz"
102
+ "shape": "S14"
100
103
  }
101
104
  }
102
105
  },
@@ -276,7 +279,7 @@
276
279
  ],
277
280
  "members": {
278
281
  "authentication": {
279
- "shape": "S1i"
282
+ "shape": "S1n"
280
283
  }
281
284
  }
282
285
  }
@@ -403,7 +406,7 @@
403
406
  "members": {
404
407
  "role": {},
405
408
  "user": {
406
- "shape": "S2a"
409
+ "shape": "S2f"
407
410
  }
408
411
  }
409
412
  }
@@ -433,7 +436,7 @@
433
436
  "type": "structure",
434
437
  "members": {
435
438
  "tags": {
436
- "shape": "Sr"
439
+ "shape": "Sw"
437
440
  }
438
441
  }
439
442
  }
@@ -498,11 +501,11 @@
498
501
  "shape": "Si"
499
502
  },
500
503
  "notificationDestinations": {
501
- "shape": "Sj"
504
+ "shape": "So"
502
505
  },
503
506
  "status": {},
504
507
  "tags": {
505
- "shape": "Sr"
508
+ "shape": "Sw"
506
509
  }
507
510
  }
508
511
  }
@@ -527,7 +530,7 @@
527
530
  "locationName": "resourceArn"
528
531
  },
529
532
  "tags": {
530
- "shape": "Sr"
533
+ "shape": "Sw"
531
534
  }
532
535
  }
533
536
  },
@@ -583,7 +586,7 @@
583
586
  "updateInstructionBatch": {
584
587
  "type": "list",
585
588
  "member": {
586
- "shape": "S2p"
589
+ "shape": "S2u"
587
590
  }
588
591
  },
589
592
  "workspaceId": {
@@ -609,7 +612,7 @@
609
612
  ],
610
613
  "members": {
611
614
  "causedBy": {
612
- "shape": "S2p"
615
+ "shape": "S2u"
613
616
  },
614
617
  "code": {
615
618
  "type": "integer"
@@ -634,16 +637,22 @@
634
637
  ],
635
638
  "members": {
636
639
  "accountAccessType": {},
640
+ "networkAccessControl": {
641
+ "shape": "Sj"
642
+ },
637
643
  "organizationRoleName": {
638
- "shape": "Sl"
644
+ "shape": "Sq"
639
645
  },
640
646
  "permissionType": {},
647
+ "removeNetworkAccessConfiguration": {
648
+ "type": "boolean"
649
+ },
641
650
  "removeVpcConfiguration": {
642
651
  "type": "boolean"
643
652
  },
644
653
  "stackSetName": {},
645
654
  "vpcConfiguration": {
646
- "shape": "Su"
655
+ "shape": "Sz"
647
656
  },
648
657
  "workspaceDataSources": {
649
658
  "shape": "Sc"
@@ -659,13 +668,13 @@
659
668
  "shape": "Si"
660
669
  },
661
670
  "workspaceNotificationDestinations": {
662
- "shape": "Sj"
671
+ "shape": "So"
663
672
  },
664
673
  "workspaceOrganizationalUnits": {
665
- "shape": "Sm"
674
+ "shape": "Sr"
666
675
  },
667
676
  "workspaceRoleArn": {
668
- "shape": "Sz"
677
+ "shape": "S14"
669
678
  }
670
679
  }
671
680
  },
@@ -697,7 +706,7 @@
697
706
  "shape": "S8"
698
707
  },
699
708
  "samlConfiguration": {
700
- "shape": "S1m"
709
+ "shape": "S1r"
701
710
  },
702
711
  "workspaceId": {
703
712
  "location": "uri",
@@ -712,7 +721,7 @@
712
721
  ],
713
722
  "members": {
714
723
  "authentication": {
715
- "shape": "S1i"
724
+ "shape": "S1n"
716
725
  }
717
726
  }
718
727
  }
@@ -791,26 +800,29 @@
791
800
  "name": {
792
801
  "shape": "Si"
793
802
  },
794
- "notificationDestinations": {
803
+ "networkAccessControl": {
795
804
  "shape": "Sj"
796
805
  },
806
+ "notificationDestinations": {
807
+ "shape": "So"
808
+ },
797
809
  "organizationRoleName": {
798
- "shape": "Sl"
810
+ "shape": "Sq"
799
811
  },
800
812
  "organizationalUnits": {
801
- "shape": "Sm"
813
+ "shape": "Sr"
802
814
  },
803
815
  "permissionType": {},
804
816
  "stackSetName": {},
805
817
  "status": {},
806
818
  "tags": {
807
- "shape": "Sr"
819
+ "shape": "Sw"
808
820
  },
809
821
  "vpcConfiguration": {
810
- "shape": "Su"
822
+ "shape": "Sz"
811
823
  },
812
824
  "workspaceRoleArn": {
813
- "shape": "Sz"
825
+ "shape": "S14"
814
826
  }
815
827
  }
816
828
  },
@@ -843,24 +855,41 @@
843
855
  "sensitive": true
844
856
  },
845
857
  "Sj": {
858
+ "type": "structure",
859
+ "required": [
860
+ "prefixListIds",
861
+ "vpceIds"
862
+ ],
863
+ "members": {
864
+ "prefixListIds": {
865
+ "type": "list",
866
+ "member": {}
867
+ },
868
+ "vpceIds": {
869
+ "type": "list",
870
+ "member": {}
871
+ }
872
+ }
873
+ },
874
+ "So": {
846
875
  "type": "list",
847
876
  "member": {}
848
877
  },
849
- "Sl": {
878
+ "Sq": {
850
879
  "type": "string",
851
880
  "sensitive": true
852
881
  },
853
- "Sm": {
882
+ "Sr": {
854
883
  "type": "list",
855
884
  "member": {},
856
885
  "sensitive": true
857
886
  },
858
- "Sr": {
887
+ "Sw": {
859
888
  "type": "map",
860
889
  "key": {},
861
890
  "value": {}
862
891
  },
863
- "Su": {
892
+ "Sz": {
864
893
  "type": "structure",
865
894
  "required": [
866
895
  "securityGroupIds",
@@ -877,11 +906,11 @@
877
906
  }
878
907
  }
879
908
  },
880
- "Sz": {
909
+ "S14": {
881
910
  "type": "string",
882
911
  "sensitive": true
883
912
  },
884
- "S1i": {
913
+ "S1n": {
885
914
  "type": "structure",
886
915
  "required": [
887
916
  "providers"
@@ -903,14 +932,14 @@
903
932
  ],
904
933
  "members": {
905
934
  "configuration": {
906
- "shape": "S1m"
935
+ "shape": "S1r"
907
936
  },
908
937
  "status": {}
909
938
  }
910
939
  }
911
940
  }
912
941
  },
913
- "S1m": {
942
+ "S1r": {
914
943
  "type": "structure",
915
944
  "required": [
916
945
  "idpMetadata"
@@ -946,20 +975,20 @@
946
975
  "type": "structure",
947
976
  "members": {
948
977
  "admin": {
949
- "shape": "S1v"
978
+ "shape": "S20"
950
979
  },
951
980
  "editor": {
952
- "shape": "S1v"
981
+ "shape": "S20"
953
982
  }
954
983
  }
955
984
  }
956
985
  }
957
986
  },
958
- "S1v": {
987
+ "S20": {
959
988
  "type": "list",
960
989
  "member": {}
961
990
  },
962
- "S2a": {
991
+ "S2f": {
963
992
  "type": "structure",
964
993
  "required": [
965
994
  "id",
@@ -970,7 +999,7 @@
970
999
  "type": {}
971
1000
  }
972
1001
  },
973
- "S2p": {
1002
+ "S2u": {
974
1003
  "type": "structure",
975
1004
  "required": [
976
1005
  "action",
@@ -983,7 +1012,7 @@
983
1012
  "users": {
984
1013
  "type": "list",
985
1014
  "member": {
986
- "shape": "S2a"
1015
+ "shape": "S2f"
987
1016
  }
988
1017
  }
989
1018
  }
@@ -173,11 +173,11 @@ declare class EMR extends Service {
173
173
  */
174
174
  getBlockPublicAccessConfiguration(callback?: (err: AWSError, data: EMR.Types.GetBlockPublicAccessConfigurationOutput) => void): Request<EMR.Types.GetBlockPublicAccessConfigurationOutput, AWSError>;
175
175
  /**
176
- * Provides Temporary, basic HTTP credentials that are associated with a given runtime IAM role and used by a cluster with fine-grained access control activated. You can use these credentials to connect to cluster endpoints that support username-based and password-based authentication.
176
+ * Provides temporary, HTTP basic credentials that are associated with a given runtime IAM role and used by a cluster with fine-grained access control activated. You can use these credentials to connect to cluster endpoints that support username and password authentication.
177
177
  */
178
178
  getClusterSessionCredentials(params: EMR.Types.GetClusterSessionCredentialsInput, callback?: (err: AWSError, data: EMR.Types.GetClusterSessionCredentialsOutput) => void): Request<EMR.Types.GetClusterSessionCredentialsOutput, AWSError>;
179
179
  /**
180
- * Provides Temporary, basic HTTP credentials that are associated with a given runtime IAM role and used by a cluster with fine-grained access control activated. You can use these credentials to connect to cluster endpoints that support username-based and password-based authentication.
180
+ * Provides temporary, HTTP basic credentials that are associated with a given runtime IAM role and used by a cluster with fine-grained access control activated. You can use these credentials to connect to cluster endpoints that support username and password authentication.
181
181
  */
182
182
  getClusterSessionCredentials(callback?: (err: AWSError, data: EMR.Types.GetClusterSessionCredentialsOutput) => void): Request<EMR.Types.GetClusterSessionCredentialsOutput, AWSError>;
183
183
  /**
@@ -1409,7 +1409,7 @@ declare namespace EMR {
1409
1409
  }
1410
1410
  export interface GetClusterSessionCredentialsOutput {
1411
1411
  /**
1412
- * The credentials that you can use to connect to cluster endpoints that support username-based and password-based authentication.
1412
+ * The credentials that you can use to connect to cluster endpoints that support username and password authentication.
1413
1413
  */
1414
1414
  Credentials?: Credentials;
1415
1415
  /**
@@ -1582,6 +1582,10 @@ declare namespace EMR {
1582
1582
  * Describes the launch specification for an instance fleet.
1583
1583
  */
1584
1584
  LaunchSpecifications?: InstanceFleetProvisioningSpecifications;
1585
+ /**
1586
+ * The resize specification for the instance fleet.
1587
+ */
1588
+ ResizeSpecifications?: InstanceFleetResizingSpecifications;
1585
1589
  }
1586
1590
  export interface InstanceFleetConfig {
1587
1591
  /**
@@ -1608,6 +1612,10 @@ declare namespace EMR {
1608
1612
  * The launch specification for the instance fleet.
1609
1613
  */
1610
1614
  LaunchSpecifications?: InstanceFleetProvisioningSpecifications;
1615
+ /**
1616
+ * The resize specification for the instance fleet.
1617
+ */
1618
+ ResizeSpecifications?: InstanceFleetResizingSpecifications;
1611
1619
  }
1612
1620
  export type InstanceFleetConfigList = InstanceFleetConfig[];
1613
1621
  export type InstanceFleetId = string;
@@ -1625,10 +1633,14 @@ declare namespace EMR {
1625
1633
  * The target capacity of Spot units for the instance fleet. For more information, see InstanceFleetConfig$TargetSpotCapacity.
1626
1634
  */
1627
1635
  TargetSpotCapacity?: WholeNumber;
1636
+ /**
1637
+ * The resize specification for the instance fleet.
1638
+ */
1639
+ ResizeSpecifications?: InstanceFleetResizingSpecifications;
1628
1640
  }
1629
1641
  export interface InstanceFleetProvisioningSpecifications {
1630
1642
  /**
1631
- * The launch specification for Spot Instances in the fleet, which determines the defined duration, provisioning timeout behavior, and allocation strategy.
1643
+ * The launch specification for Spot instances in the fleet, which determines the defined duration, provisioning timeout behavior, and allocation strategy.
1632
1644
  */
1633
1645
  SpotSpecification?: SpotProvisioningSpecification;
1634
1646
  /**
@@ -1636,6 +1648,16 @@ declare namespace EMR {
1636
1648
  */
1637
1649
  OnDemandSpecification?: OnDemandProvisioningSpecification;
1638
1650
  }
1651
+ export interface InstanceFleetResizingSpecifications {
1652
+ /**
1653
+ * The resize specification for Spot Instances in the instance fleet, which contains the resize timeout period.
1654
+ */
1655
+ SpotResizeSpecification?: SpotResizingSpecification;
1656
+ /**
1657
+ * The resize specification for On-Demand Instances in the instance fleet, which contains the resize timeout period.
1658
+ */
1659
+ OnDemandResizeSpecification?: OnDemandResizingSpecification;
1660
+ }
1639
1661
  export type InstanceFleetState = "PROVISIONING"|"BOOTSTRAPPING"|"RUNNING"|"RESIZING"|"SUSPENDED"|"TERMINATING"|"TERMINATED"|string;
1640
1662
  export interface InstanceFleetStateChangeReason {
1641
1663
  /**
@@ -2746,6 +2768,12 @@ declare namespace EMR {
2746
2768
  */
2747
2769
  CapacityReservationOptions?: OnDemandCapacityReservationOptions;
2748
2770
  }
2771
+ export interface OnDemandResizingSpecification {
2772
+ /**
2773
+ * On-Demand resize timeout in minutes. If On-Demand Instances are not provisioned within this time, the resize workflow stops. The minimum value is 5 minutes, and the maximum value is 10,080 minutes (7 days). The timeout applies to all resize workflows on the Instance Fleet. The resize could be triggered by Amazon EMR Managed Scaling or by the customer (via Amazon EMR Console, Amazon EMR CLI modify-instance-fleet or Amazon EMR SDK ModifyInstanceFleet API) or by Amazon EMR due to Amazon EC2 Spot Reclamation.
2774
+ */
2775
+ TimeoutDurationMinutes: WholeNumber;
2776
+ }
2749
2777
  export type OptionalArnType = string;
2750
2778
  export interface PlacementGroupConfig {
2751
2779
  /**
@@ -3206,7 +3234,7 @@ declare namespace EMR {
3206
3234
  export type SpotProvisioningAllocationStrategy = "capacity-optimized"|string;
3207
3235
  export interface SpotProvisioningSpecification {
3208
3236
  /**
3209
- * The spot provisioning timeout period in minutes. If Spot Instances are not provisioned within this time period, the TimeOutAction is taken. Minimum value is 5 and maximum value is 1440. The timeout applies only during initial provisioning, when the cluster is first created.
3237
+ * The Spot provisioning timeout period in minutes. If Spot Instances are not provisioned within this time period, the TimeOutAction is taken. Minimum value is 5 and maximum value is 1440. The timeout applies only during initial provisioning, when the cluster is first created.
3210
3238
  */
3211
3239
  TimeoutDurationMinutes: WholeNumber;
3212
3240
  /**
@@ -3223,6 +3251,12 @@ declare namespace EMR {
3223
3251
  AllocationStrategy?: SpotProvisioningAllocationStrategy;
3224
3252
  }
3225
3253
  export type SpotProvisioningTimeoutAction = "SWITCH_TO_ON_DEMAND"|"TERMINATE_CLUSTER"|string;
3254
+ export interface SpotResizingSpecification {
3255
+ /**
3256
+ * Spot resize timeout in minutes. If Spot Instances are not provisioned within this time, the resize workflow will stop provisioning of Spot instances. Minimum value is 5 minutes and maximum value is 10,080 minutes (7 days). The timeout applies to all resize workflows on the Instance Fleet. The resize could be triggered by Amazon EMR Managed Scaling or by the customer (via Amazon EMR Console, Amazon EMR CLI modify-instance-fleet or Amazon EMR SDK ModifyInstanceFleet API) or by Amazon EMR due to Amazon EC2 Spot Reclamation.
3257
+ */
3258
+ TimeoutDurationMinutes: WholeNumber;
3259
+ }
3226
3260
  export interface StartNotebookExecutionInput {
3227
3261
  /**
3228
3262
  * The unique identifier of the EMR Notebook to use for notebook execution.
@@ -289,6 +289,10 @@ declare namespace Grafana {
289
289
  * The configuration string for the workspace that you create. For more information about the format and configuration options available, see Working in your Grafana workspace.
290
290
  */
291
291
  configuration?: OverridableConfigurationJson;
292
+ /**
293
+ * Configuration for network access to your workspace. When this is configured, only listed IP addresses and VPC endpoints will be able to access your workspace. Standard Grafana authentication and authorization will still be required. If this is not configured, or is removed, then all IP addresses and VPC endpoints will be allowed. Standard Grafana authentication and authorization will still be required.
294
+ */
295
+ networkAccessControl?: NetworkAccessConfiguration;
292
296
  /**
293
297
  * The name of an IAM role that already exists to use with Organizations to access Amazon Web Services data sources and notification channels in other accounts in an organization.
294
298
  */
@@ -513,6 +517,16 @@ declare namespace Grafana {
513
517
  workspaces: WorkspaceList;
514
518
  }
515
519
  export type LoginValidityDuration = number;
520
+ export interface NetworkAccessConfiguration {
521
+ /**
522
+ * An array of prefix list IDs. A prefix list is a list of CIDR ranges of IP addresses. The IP addresses specified are allowed to access your workspace. If the list is not included in the configuration then no IP addresses will be allowed to access the workspace. You create a prefix list using the Amazon VPC console. Prefix list IDs have the format pl-1a2b3c4d . For more information about prefix lists, see Group CIDR blocks using managed prefix listsin the Amazon Virtual Private Cloud User Guide.
523
+ */
524
+ prefixListIds: PrefixListIds;
525
+ /**
526
+ * An array of Amazon VPC endpoint IDs for the workspace. You can create VPC endpoints to your Amazon Managed Grafana workspace for access from within a VPC. If a NetworkAccessConfiguration is specified then only VPC endpoints specified here will be allowed to access the workspace. VPC endpoint IDs have the format vpce-1a2b3c4d . For more information about creating an interface VPC endpoint, see Interface VPC endpoints in the Amazon Managed Grafana User Guide. The only VPC endpoints that can be specified here are interface VPC endpoints for Grafana workspaces (using the com.amazonaws.[region].grafana-workspace service endpoint). Other VPC endpoints will be ignored.
527
+ */
528
+ vpceIds: VpceIds;
529
+ }
516
530
  export type NotificationDestinationType = "SNS"|string;
517
531
  export type NotificationDestinationsList = NotificationDestinationType[];
518
532
  export type OrganizationRoleName = string;
@@ -532,6 +546,8 @@ declare namespace Grafana {
532
546
  }
533
547
  export type PermissionEntryList = PermissionEntry[];
534
548
  export type PermissionType = "CUSTOMER_MANAGED"|"SERVICE_MANAGED"|string;
549
+ export type PrefixListId = string;
550
+ export type PrefixListIds = PrefixListId[];
535
551
  export type Role = "ADMIN"|"EDITOR"|"VIEWER"|string;
536
552
  export type RoleValue = string;
537
553
  export type RoleValueList = RoleValue[];
@@ -700,14 +716,22 @@ declare namespace Grafana {
700
716
  * Specifies whether the workspace can access Amazon Web Services resources in this Amazon Web Services account only, or whether it can also access Amazon Web Services resources in other accounts in the same organization. If you specify ORGANIZATION, you must specify which organizational units the workspace can access in the workspaceOrganizationalUnits parameter.
701
717
  */
702
718
  accountAccessType?: AccountAccessType;
719
+ /**
720
+ * The configuration settings for network access to your workspace. When this is configured, only listed IP addresses and VPC endpoints will be able to access your workspace. Standard Grafana authentication and authorization will still be required. If this is not configured, or is removed, then all IP addresses and VPC endpoints will be allowed. Standard Grafana authentication and authorization will still be required.
721
+ */
722
+ networkAccessControl?: NetworkAccessConfiguration;
703
723
  /**
704
724
  * The name of an IAM role that already exists to use to access resources through Organizations.
705
725
  */
706
726
  organizationRoleName?: OrganizationRoleName;
707
727
  /**
708
- * If you specify Service Managed, Amazon Managed Grafana automatically creates the IAM roles and provisions the permissions that the workspace needs to use Amazon Web Services data sources and notification channels. If you specify CUSTOMER_MANAGED, you will manage those roles and permissions yourself. If you are creating this workspace in a member account of an organization and that account is not a delegated administrator account, and you want the workspace to access data sources in other Amazon Web Services accounts in the organization, you must choose CUSTOMER_MANAGED. For more information, see Amazon Managed Grafana permissions and policies for Amazon Web Services data sources and notification channels
728
+ * If you specify SERVICE_MANAGED, Amazon Managed Grafana automatically creates the IAM roles and provisions the permissions that the workspace needs to use Amazon Web Services data sources and notification channels. If you specify CUSTOMER_MANAGED, you will manage those roles and permissions yourself. If you are creating this workspace in a member account of an organization and that account is not a delegated administrator account, and you want the workspace to access data sources in other Amazon Web Services accounts in the organization, you must choose CUSTOMER_MANAGED. For more information, see Amazon Managed Grafana permissions and policies for Amazon Web Services data sources and notification channels
709
729
  */
710
730
  permissionType?: PermissionType;
731
+ /**
732
+ * Whether to remove the network access configuration from the workspace. Setting this to true and providing a networkAccessControl to set will return an error. If you remove this configuration by setting this to true, then all IP addresses and VPC endpoints will be allowed. Standard Grafana authentication and authorization will still be required.
733
+ */
734
+ removeNetworkAccessConfiguration?: Boolean;
711
735
  /**
712
736
  * Whether to remove the VPC configuration from the workspace. Setting this to true and providing a vpcConfiguration to set will return an error.
713
737
  */
@@ -769,14 +793,16 @@ declare namespace Grafana {
769
793
  export type UserType = "SSO_USER"|"SSO_GROUP"|string;
770
794
  export interface VpcConfiguration {
771
795
  /**
772
- * The list of Amazon EC2 security group IDs attached to the Amazon VPC for your Grafana workspace to connect.
796
+ * The list of Amazon EC2 security group IDs attached to the Amazon VPC for your Grafana workspace to connect. Duplicates not allowed.
773
797
  */
774
798
  securityGroupIds: SecurityGroupIds;
775
799
  /**
776
- * The list of Amazon EC2 subnet IDs created in the Amazon VPC for your Grafana workspace to connect.
800
+ * The list of Amazon EC2 subnet IDs created in the Amazon VPC for your Grafana workspace to connect. Duplicates not allowed.
777
801
  */
778
802
  subnetIds: SubnetIds;
779
803
  }
804
+ export type VpceId = string;
805
+ export type VpceIds = VpceId[];
780
806
  export interface WorkspaceDescription {
781
807
  /**
782
808
  * Specifies whether the workspace can access Amazon Web Services resources in this Amazon Web Services account only, or whether it can also access Amazon Web Services resources in other accounts in the same organization. If this is ORGANIZATION, the workspaceOrganizationalUnits parameter specifies which organizational units the workspace can access.
@@ -834,6 +860,10 @@ declare namespace Grafana {
834
860
  * The name of the workspace.
835
861
  */
836
862
  name?: WorkspaceName;
863
+ /**
864
+ * The configuration settings for network access to your workspace.
865
+ */
866
+ networkAccessControl?: NetworkAccessConfiguration;
837
867
  /**
838
868
  * The Amazon Web Services notification channels that Amazon Managed Grafana can automatically create IAM roles and permissions for, to allow Amazon Managed Grafana to use these channels.
839
869
  */
@@ -847,7 +877,7 @@ declare namespace Grafana {
847
877
  */
848
878
  organizationalUnits?: OrganizationalUnitList;
849
879
  /**
850
- * If this is Service Managed, Amazon Managed Grafana automatically creates the IAM roles and provisions the permissions that the workspace needs to use Amazon Web Services data sources and notification channels. If this is CUSTOMER_MANAGED, you manage those roles and permissions yourself. If you are creating this workspace in a member account of an organization and that account is not a delegated administrator account, and you want the workspace to access data sources in other Amazon Web Services accounts in the organization, you must choose CUSTOMER_MANAGED. For more information, see Amazon Managed Grafana permissions and policies for Amazon Web Services data sources and notification channels
880
+ * If this is SERVICE_MANAGED, Amazon Managed Grafana automatically creates the IAM roles and provisions the permissions that the workspace needs to use Amazon Web Services data sources and notification channels. If this is CUSTOMER_MANAGED, you manage those roles and permissions yourself. If you are creating this workspace in a member account of an organization and that account is not a delegated administrator account, and you want the workspace to access data sources in other Amazon Web Services accounts in the organization, you must choose CUSTOMER_MANAGED. For more information, see Amazon Managed Grafana permissions and policies for Amazon Web Services data sources and notification channels
851
881
  */
852
882
  permissionType?: PermissionType;
853
883
  /**
@@ -407,7 +407,7 @@ declare namespace WAFV2 {
407
407
  */
408
408
  RequestInspection?: RequestInspection;
409
409
  /**
410
- * The criteria for inspecting responses to login requests, used by the ATP rule group to track login failure rates. The ATP rule group evaluates the responses that your protected resources send back to client login attempts, keeping count of successful and failed attempts from each IP address and client session. Using this information, the rule group labels and mitigates requests from client sessions and IP addresses that submit too many failed login attempts in a short amount of time. Response inspection is available only in web ACLs that protect Amazon CloudFront distributions.
410
+ * The criteria for inspecting responses to login requests, used by the ATP rule group to track login failure rates. The ATP rule group evaluates the responses that your protected resources send back to client login attempts, keeping count of successful and failed attempts from each IP address and client session. Using this information, the rule group labels and mitigates requests from client sessions and IP addresses that submit too many failed login attempts in a short amount of time. Response inspection is available only in web ACLs that protect Amazon CloudFront distributions. For regional web ACLs in Region US East (N. Virginia) us-east-1, it's possible to configure response inspection through the APIs, but ATP response inspection will not be enabled. You can only use the response inspection capabilities of the ATP managed rule group in web ACLs that protect CloudFront distributions.
411
411
  */
412
412
  ResponseInspection?: ResponseInspection;
413
413
  }
@@ -1919,7 +1919,7 @@ declare namespace WAFV2 {
1919
1919
  */
1920
1920
  AWSManagedRulesBotControlRuleSet?: AWSManagedRulesBotControlRuleSet;
1921
1921
  /**
1922
- * Additional configuration for using the account takeover prevention (ATP) managed rule group, AWSManagedRulesATPRuleSet. Use this to provide login request information to the rule group. For web ACLs that protect CloudFront distributions, use this to also provide the information about how your distribution responds to login requests. This configuration replaces the individual configuration fields in ManagedRuleGroupConfig and provides additional feature configuration. For information about using the ATP managed rule group, see WAF Fraud Control account takeover prevention (ATP) rule group and WAF Fraud Control account takeover prevention (ATP) in the WAF Developer Guide.
1922
+ * Additional configuration for using the account takeover prevention (ATP) managed rule group, AWSManagedRulesATPRuleSet. Use this to provide login request information to the rule group. For web ACLs that protect CloudFront distributions, use this to also provide the information about how your distribution responds to login requests. For regional web ACLs in Region US East (N. Virginia) us-east-1, it's possible to configure response inspection through the APIs, but ATP response inspection will not be enabled. You can only use the response inspection capabilities of the ATP managed rule group in web ACLs that protect CloudFront distributions. This configuration replaces the individual configuration fields in ManagedRuleGroupConfig and provides additional feature configuration. For information about using the ATP managed rule group, see WAF Fraud Control account takeover prevention (ATP) rule group and WAF Fraud Control account takeover prevention (ATP) in the WAF Developer Guide.
1923
1923
  */
1924
1924
  AWSManagedRulesATPRuleSet?: AWSManagedRulesATPRuleSet;
1925
1925
  }
@@ -83,7 +83,7 @@ return /******/ (function(modules) { // webpackBootstrap
83
83
  /**
84
84
  * @constant
85
85
  */
86
- VERSION: '2.1316.0',
86
+ VERSION: '2.1317.0',
87
87
 
88
88
  /**
89
89
  * @api private