cdk-docker-image-deployment 0.0.166 → 0.0.167
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +3 -3
- package/lib/destination.js +1 -1
- package/lib/docker-image-deployment.js +1 -1
- package/lib/source.js +1 -1
- package/node_modules/aws-sdk/CHANGELOG.md +5 -1
- package/node_modules/aws-sdk/README.md +1 -1
- package/node_modules/aws-sdk/apis/elasticmapreduce-2009-03-31.min.json +147 -111
- package/node_modules/aws-sdk/apis/grafana-2020-08-18.min.json +70 -41
- package/node_modules/aws-sdk/clients/emr.d.ts +39 -5
- package/node_modules/aws-sdk/clients/grafana.d.ts +34 -4
- package/node_modules/aws-sdk/clients/wafv2.d.ts +2 -2
- package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +1 -1
- package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +3 -3
- package/node_modules/aws-sdk/dist/aws-sdk.js +150 -114
- package/node_modules/aws-sdk/dist/aws-sdk.min.js +55 -55
- package/node_modules/aws-sdk/lib/core.js +1 -1
- package/node_modules/aws-sdk/package.json +1 -1
- package/package.json +4 -4
|
@@ -69,16 +69,19 @@
|
|
|
69
69
|
"configuration": {
|
|
70
70
|
"jsonvalue": true
|
|
71
71
|
},
|
|
72
|
+
"networkAccessControl": {
|
|
73
|
+
"shape": "Sj"
|
|
74
|
+
},
|
|
72
75
|
"organizationRoleName": {
|
|
73
|
-
"shape": "
|
|
76
|
+
"shape": "Sq"
|
|
74
77
|
},
|
|
75
78
|
"permissionType": {},
|
|
76
79
|
"stackSetName": {},
|
|
77
80
|
"tags": {
|
|
78
|
-
"shape": "
|
|
81
|
+
"shape": "Sw"
|
|
79
82
|
},
|
|
80
83
|
"vpcConfiguration": {
|
|
81
|
-
"shape": "
|
|
84
|
+
"shape": "Sz"
|
|
82
85
|
},
|
|
83
86
|
"workspaceDataSources": {
|
|
84
87
|
"shape": "Sc"
|
|
@@ -90,13 +93,13 @@
|
|
|
90
93
|
"shape": "Si"
|
|
91
94
|
},
|
|
92
95
|
"workspaceNotificationDestinations": {
|
|
93
|
-
"shape": "
|
|
96
|
+
"shape": "So"
|
|
94
97
|
},
|
|
95
98
|
"workspaceOrganizationalUnits": {
|
|
96
|
-
"shape": "
|
|
99
|
+
"shape": "Sr"
|
|
97
100
|
},
|
|
98
101
|
"workspaceRoleArn": {
|
|
99
|
-
"shape": "
|
|
102
|
+
"shape": "S14"
|
|
100
103
|
}
|
|
101
104
|
}
|
|
102
105
|
},
|
|
@@ -276,7 +279,7 @@
|
|
|
276
279
|
],
|
|
277
280
|
"members": {
|
|
278
281
|
"authentication": {
|
|
279
|
-
"shape": "
|
|
282
|
+
"shape": "S1n"
|
|
280
283
|
}
|
|
281
284
|
}
|
|
282
285
|
}
|
|
@@ -403,7 +406,7 @@
|
|
|
403
406
|
"members": {
|
|
404
407
|
"role": {},
|
|
405
408
|
"user": {
|
|
406
|
-
"shape": "
|
|
409
|
+
"shape": "S2f"
|
|
407
410
|
}
|
|
408
411
|
}
|
|
409
412
|
}
|
|
@@ -433,7 +436,7 @@
|
|
|
433
436
|
"type": "structure",
|
|
434
437
|
"members": {
|
|
435
438
|
"tags": {
|
|
436
|
-
"shape": "
|
|
439
|
+
"shape": "Sw"
|
|
437
440
|
}
|
|
438
441
|
}
|
|
439
442
|
}
|
|
@@ -498,11 +501,11 @@
|
|
|
498
501
|
"shape": "Si"
|
|
499
502
|
},
|
|
500
503
|
"notificationDestinations": {
|
|
501
|
-
"shape": "
|
|
504
|
+
"shape": "So"
|
|
502
505
|
},
|
|
503
506
|
"status": {},
|
|
504
507
|
"tags": {
|
|
505
|
-
"shape": "
|
|
508
|
+
"shape": "Sw"
|
|
506
509
|
}
|
|
507
510
|
}
|
|
508
511
|
}
|
|
@@ -527,7 +530,7 @@
|
|
|
527
530
|
"locationName": "resourceArn"
|
|
528
531
|
},
|
|
529
532
|
"tags": {
|
|
530
|
-
"shape": "
|
|
533
|
+
"shape": "Sw"
|
|
531
534
|
}
|
|
532
535
|
}
|
|
533
536
|
},
|
|
@@ -583,7 +586,7 @@
|
|
|
583
586
|
"updateInstructionBatch": {
|
|
584
587
|
"type": "list",
|
|
585
588
|
"member": {
|
|
586
|
-
"shape": "
|
|
589
|
+
"shape": "S2u"
|
|
587
590
|
}
|
|
588
591
|
},
|
|
589
592
|
"workspaceId": {
|
|
@@ -609,7 +612,7 @@
|
|
|
609
612
|
],
|
|
610
613
|
"members": {
|
|
611
614
|
"causedBy": {
|
|
612
|
-
"shape": "
|
|
615
|
+
"shape": "S2u"
|
|
613
616
|
},
|
|
614
617
|
"code": {
|
|
615
618
|
"type": "integer"
|
|
@@ -634,16 +637,22 @@
|
|
|
634
637
|
],
|
|
635
638
|
"members": {
|
|
636
639
|
"accountAccessType": {},
|
|
640
|
+
"networkAccessControl": {
|
|
641
|
+
"shape": "Sj"
|
|
642
|
+
},
|
|
637
643
|
"organizationRoleName": {
|
|
638
|
-
"shape": "
|
|
644
|
+
"shape": "Sq"
|
|
639
645
|
},
|
|
640
646
|
"permissionType": {},
|
|
647
|
+
"removeNetworkAccessConfiguration": {
|
|
648
|
+
"type": "boolean"
|
|
649
|
+
},
|
|
641
650
|
"removeVpcConfiguration": {
|
|
642
651
|
"type": "boolean"
|
|
643
652
|
},
|
|
644
653
|
"stackSetName": {},
|
|
645
654
|
"vpcConfiguration": {
|
|
646
|
-
"shape": "
|
|
655
|
+
"shape": "Sz"
|
|
647
656
|
},
|
|
648
657
|
"workspaceDataSources": {
|
|
649
658
|
"shape": "Sc"
|
|
@@ -659,13 +668,13 @@
|
|
|
659
668
|
"shape": "Si"
|
|
660
669
|
},
|
|
661
670
|
"workspaceNotificationDestinations": {
|
|
662
|
-
"shape": "
|
|
671
|
+
"shape": "So"
|
|
663
672
|
},
|
|
664
673
|
"workspaceOrganizationalUnits": {
|
|
665
|
-
"shape": "
|
|
674
|
+
"shape": "Sr"
|
|
666
675
|
},
|
|
667
676
|
"workspaceRoleArn": {
|
|
668
|
-
"shape": "
|
|
677
|
+
"shape": "S14"
|
|
669
678
|
}
|
|
670
679
|
}
|
|
671
680
|
},
|
|
@@ -697,7 +706,7 @@
|
|
|
697
706
|
"shape": "S8"
|
|
698
707
|
},
|
|
699
708
|
"samlConfiguration": {
|
|
700
|
-
"shape": "
|
|
709
|
+
"shape": "S1r"
|
|
701
710
|
},
|
|
702
711
|
"workspaceId": {
|
|
703
712
|
"location": "uri",
|
|
@@ -712,7 +721,7 @@
|
|
|
712
721
|
],
|
|
713
722
|
"members": {
|
|
714
723
|
"authentication": {
|
|
715
|
-
"shape": "
|
|
724
|
+
"shape": "S1n"
|
|
716
725
|
}
|
|
717
726
|
}
|
|
718
727
|
}
|
|
@@ -791,26 +800,29 @@
|
|
|
791
800
|
"name": {
|
|
792
801
|
"shape": "Si"
|
|
793
802
|
},
|
|
794
|
-
"
|
|
803
|
+
"networkAccessControl": {
|
|
795
804
|
"shape": "Sj"
|
|
796
805
|
},
|
|
806
|
+
"notificationDestinations": {
|
|
807
|
+
"shape": "So"
|
|
808
|
+
},
|
|
797
809
|
"organizationRoleName": {
|
|
798
|
-
"shape": "
|
|
810
|
+
"shape": "Sq"
|
|
799
811
|
},
|
|
800
812
|
"organizationalUnits": {
|
|
801
|
-
"shape": "
|
|
813
|
+
"shape": "Sr"
|
|
802
814
|
},
|
|
803
815
|
"permissionType": {},
|
|
804
816
|
"stackSetName": {},
|
|
805
817
|
"status": {},
|
|
806
818
|
"tags": {
|
|
807
|
-
"shape": "
|
|
819
|
+
"shape": "Sw"
|
|
808
820
|
},
|
|
809
821
|
"vpcConfiguration": {
|
|
810
|
-
"shape": "
|
|
822
|
+
"shape": "Sz"
|
|
811
823
|
},
|
|
812
824
|
"workspaceRoleArn": {
|
|
813
|
-
"shape": "
|
|
825
|
+
"shape": "S14"
|
|
814
826
|
}
|
|
815
827
|
}
|
|
816
828
|
},
|
|
@@ -843,24 +855,41 @@
|
|
|
843
855
|
"sensitive": true
|
|
844
856
|
},
|
|
845
857
|
"Sj": {
|
|
858
|
+
"type": "structure",
|
|
859
|
+
"required": [
|
|
860
|
+
"prefixListIds",
|
|
861
|
+
"vpceIds"
|
|
862
|
+
],
|
|
863
|
+
"members": {
|
|
864
|
+
"prefixListIds": {
|
|
865
|
+
"type": "list",
|
|
866
|
+
"member": {}
|
|
867
|
+
},
|
|
868
|
+
"vpceIds": {
|
|
869
|
+
"type": "list",
|
|
870
|
+
"member": {}
|
|
871
|
+
}
|
|
872
|
+
}
|
|
873
|
+
},
|
|
874
|
+
"So": {
|
|
846
875
|
"type": "list",
|
|
847
876
|
"member": {}
|
|
848
877
|
},
|
|
849
|
-
"
|
|
878
|
+
"Sq": {
|
|
850
879
|
"type": "string",
|
|
851
880
|
"sensitive": true
|
|
852
881
|
},
|
|
853
|
-
"
|
|
882
|
+
"Sr": {
|
|
854
883
|
"type": "list",
|
|
855
884
|
"member": {},
|
|
856
885
|
"sensitive": true
|
|
857
886
|
},
|
|
858
|
-
"
|
|
887
|
+
"Sw": {
|
|
859
888
|
"type": "map",
|
|
860
889
|
"key": {},
|
|
861
890
|
"value": {}
|
|
862
891
|
},
|
|
863
|
-
"
|
|
892
|
+
"Sz": {
|
|
864
893
|
"type": "structure",
|
|
865
894
|
"required": [
|
|
866
895
|
"securityGroupIds",
|
|
@@ -877,11 +906,11 @@
|
|
|
877
906
|
}
|
|
878
907
|
}
|
|
879
908
|
},
|
|
880
|
-
"
|
|
909
|
+
"S14": {
|
|
881
910
|
"type": "string",
|
|
882
911
|
"sensitive": true
|
|
883
912
|
},
|
|
884
|
-
"
|
|
913
|
+
"S1n": {
|
|
885
914
|
"type": "structure",
|
|
886
915
|
"required": [
|
|
887
916
|
"providers"
|
|
@@ -903,14 +932,14 @@
|
|
|
903
932
|
],
|
|
904
933
|
"members": {
|
|
905
934
|
"configuration": {
|
|
906
|
-
"shape": "
|
|
935
|
+
"shape": "S1r"
|
|
907
936
|
},
|
|
908
937
|
"status": {}
|
|
909
938
|
}
|
|
910
939
|
}
|
|
911
940
|
}
|
|
912
941
|
},
|
|
913
|
-
"
|
|
942
|
+
"S1r": {
|
|
914
943
|
"type": "structure",
|
|
915
944
|
"required": [
|
|
916
945
|
"idpMetadata"
|
|
@@ -946,20 +975,20 @@
|
|
|
946
975
|
"type": "structure",
|
|
947
976
|
"members": {
|
|
948
977
|
"admin": {
|
|
949
|
-
"shape": "
|
|
978
|
+
"shape": "S20"
|
|
950
979
|
},
|
|
951
980
|
"editor": {
|
|
952
|
-
"shape": "
|
|
981
|
+
"shape": "S20"
|
|
953
982
|
}
|
|
954
983
|
}
|
|
955
984
|
}
|
|
956
985
|
}
|
|
957
986
|
},
|
|
958
|
-
"
|
|
987
|
+
"S20": {
|
|
959
988
|
"type": "list",
|
|
960
989
|
"member": {}
|
|
961
990
|
},
|
|
962
|
-
"
|
|
991
|
+
"S2f": {
|
|
963
992
|
"type": "structure",
|
|
964
993
|
"required": [
|
|
965
994
|
"id",
|
|
@@ -970,7 +999,7 @@
|
|
|
970
999
|
"type": {}
|
|
971
1000
|
}
|
|
972
1001
|
},
|
|
973
|
-
"
|
|
1002
|
+
"S2u": {
|
|
974
1003
|
"type": "structure",
|
|
975
1004
|
"required": [
|
|
976
1005
|
"action",
|
|
@@ -983,7 +1012,7 @@
|
|
|
983
1012
|
"users": {
|
|
984
1013
|
"type": "list",
|
|
985
1014
|
"member": {
|
|
986
|
-
"shape": "
|
|
1015
|
+
"shape": "S2f"
|
|
987
1016
|
}
|
|
988
1017
|
}
|
|
989
1018
|
}
|
|
@@ -173,11 +173,11 @@ declare class EMR extends Service {
|
|
|
173
173
|
*/
|
|
174
174
|
getBlockPublicAccessConfiguration(callback?: (err: AWSError, data: EMR.Types.GetBlockPublicAccessConfigurationOutput) => void): Request<EMR.Types.GetBlockPublicAccessConfigurationOutput, AWSError>;
|
|
175
175
|
/**
|
|
176
|
-
* Provides
|
|
176
|
+
* Provides temporary, HTTP basic credentials that are associated with a given runtime IAM role and used by a cluster with fine-grained access control activated. You can use these credentials to connect to cluster endpoints that support username and password authentication.
|
|
177
177
|
*/
|
|
178
178
|
getClusterSessionCredentials(params: EMR.Types.GetClusterSessionCredentialsInput, callback?: (err: AWSError, data: EMR.Types.GetClusterSessionCredentialsOutput) => void): Request<EMR.Types.GetClusterSessionCredentialsOutput, AWSError>;
|
|
179
179
|
/**
|
|
180
|
-
* Provides
|
|
180
|
+
* Provides temporary, HTTP basic credentials that are associated with a given runtime IAM role and used by a cluster with fine-grained access control activated. You can use these credentials to connect to cluster endpoints that support username and password authentication.
|
|
181
181
|
*/
|
|
182
182
|
getClusterSessionCredentials(callback?: (err: AWSError, data: EMR.Types.GetClusterSessionCredentialsOutput) => void): Request<EMR.Types.GetClusterSessionCredentialsOutput, AWSError>;
|
|
183
183
|
/**
|
|
@@ -1409,7 +1409,7 @@ declare namespace EMR {
|
|
|
1409
1409
|
}
|
|
1410
1410
|
export interface GetClusterSessionCredentialsOutput {
|
|
1411
1411
|
/**
|
|
1412
|
-
* The credentials that you can use to connect to cluster endpoints that support username
|
|
1412
|
+
* The credentials that you can use to connect to cluster endpoints that support username and password authentication.
|
|
1413
1413
|
*/
|
|
1414
1414
|
Credentials?: Credentials;
|
|
1415
1415
|
/**
|
|
@@ -1582,6 +1582,10 @@ declare namespace EMR {
|
|
|
1582
1582
|
* Describes the launch specification for an instance fleet.
|
|
1583
1583
|
*/
|
|
1584
1584
|
LaunchSpecifications?: InstanceFleetProvisioningSpecifications;
|
|
1585
|
+
/**
|
|
1586
|
+
* The resize specification for the instance fleet.
|
|
1587
|
+
*/
|
|
1588
|
+
ResizeSpecifications?: InstanceFleetResizingSpecifications;
|
|
1585
1589
|
}
|
|
1586
1590
|
export interface InstanceFleetConfig {
|
|
1587
1591
|
/**
|
|
@@ -1608,6 +1612,10 @@ declare namespace EMR {
|
|
|
1608
1612
|
* The launch specification for the instance fleet.
|
|
1609
1613
|
*/
|
|
1610
1614
|
LaunchSpecifications?: InstanceFleetProvisioningSpecifications;
|
|
1615
|
+
/**
|
|
1616
|
+
* The resize specification for the instance fleet.
|
|
1617
|
+
*/
|
|
1618
|
+
ResizeSpecifications?: InstanceFleetResizingSpecifications;
|
|
1611
1619
|
}
|
|
1612
1620
|
export type InstanceFleetConfigList = InstanceFleetConfig[];
|
|
1613
1621
|
export type InstanceFleetId = string;
|
|
@@ -1625,10 +1633,14 @@ declare namespace EMR {
|
|
|
1625
1633
|
* The target capacity of Spot units for the instance fleet. For more information, see InstanceFleetConfig$TargetSpotCapacity.
|
|
1626
1634
|
*/
|
|
1627
1635
|
TargetSpotCapacity?: WholeNumber;
|
|
1636
|
+
/**
|
|
1637
|
+
* The resize specification for the instance fleet.
|
|
1638
|
+
*/
|
|
1639
|
+
ResizeSpecifications?: InstanceFleetResizingSpecifications;
|
|
1628
1640
|
}
|
|
1629
1641
|
export interface InstanceFleetProvisioningSpecifications {
|
|
1630
1642
|
/**
|
|
1631
|
-
* The launch specification for Spot
|
|
1643
|
+
* The launch specification for Spot instances in the fleet, which determines the defined duration, provisioning timeout behavior, and allocation strategy.
|
|
1632
1644
|
*/
|
|
1633
1645
|
SpotSpecification?: SpotProvisioningSpecification;
|
|
1634
1646
|
/**
|
|
@@ -1636,6 +1648,16 @@ declare namespace EMR {
|
|
|
1636
1648
|
*/
|
|
1637
1649
|
OnDemandSpecification?: OnDemandProvisioningSpecification;
|
|
1638
1650
|
}
|
|
1651
|
+
export interface InstanceFleetResizingSpecifications {
|
|
1652
|
+
/**
|
|
1653
|
+
* The resize specification for Spot Instances in the instance fleet, which contains the resize timeout period.
|
|
1654
|
+
*/
|
|
1655
|
+
SpotResizeSpecification?: SpotResizingSpecification;
|
|
1656
|
+
/**
|
|
1657
|
+
* The resize specification for On-Demand Instances in the instance fleet, which contains the resize timeout period.
|
|
1658
|
+
*/
|
|
1659
|
+
OnDemandResizeSpecification?: OnDemandResizingSpecification;
|
|
1660
|
+
}
|
|
1639
1661
|
export type InstanceFleetState = "PROVISIONING"|"BOOTSTRAPPING"|"RUNNING"|"RESIZING"|"SUSPENDED"|"TERMINATING"|"TERMINATED"|string;
|
|
1640
1662
|
export interface InstanceFleetStateChangeReason {
|
|
1641
1663
|
/**
|
|
@@ -2746,6 +2768,12 @@ declare namespace EMR {
|
|
|
2746
2768
|
*/
|
|
2747
2769
|
CapacityReservationOptions?: OnDemandCapacityReservationOptions;
|
|
2748
2770
|
}
|
|
2771
|
+
export interface OnDemandResizingSpecification {
|
|
2772
|
+
/**
|
|
2773
|
+
* On-Demand resize timeout in minutes. If On-Demand Instances are not provisioned within this time, the resize workflow stops. The minimum value is 5 minutes, and the maximum value is 10,080 minutes (7 days). The timeout applies to all resize workflows on the Instance Fleet. The resize could be triggered by Amazon EMR Managed Scaling or by the customer (via Amazon EMR Console, Amazon EMR CLI modify-instance-fleet or Amazon EMR SDK ModifyInstanceFleet API) or by Amazon EMR due to Amazon EC2 Spot Reclamation.
|
|
2774
|
+
*/
|
|
2775
|
+
TimeoutDurationMinutes: WholeNumber;
|
|
2776
|
+
}
|
|
2749
2777
|
export type OptionalArnType = string;
|
|
2750
2778
|
export interface PlacementGroupConfig {
|
|
2751
2779
|
/**
|
|
@@ -3206,7 +3234,7 @@ declare namespace EMR {
|
|
|
3206
3234
|
export type SpotProvisioningAllocationStrategy = "capacity-optimized"|string;
|
|
3207
3235
|
export interface SpotProvisioningSpecification {
|
|
3208
3236
|
/**
|
|
3209
|
-
* The
|
|
3237
|
+
* The Spot provisioning timeout period in minutes. If Spot Instances are not provisioned within this time period, the TimeOutAction is taken. Minimum value is 5 and maximum value is 1440. The timeout applies only during initial provisioning, when the cluster is first created.
|
|
3210
3238
|
*/
|
|
3211
3239
|
TimeoutDurationMinutes: WholeNumber;
|
|
3212
3240
|
/**
|
|
@@ -3223,6 +3251,12 @@ declare namespace EMR {
|
|
|
3223
3251
|
AllocationStrategy?: SpotProvisioningAllocationStrategy;
|
|
3224
3252
|
}
|
|
3225
3253
|
export type SpotProvisioningTimeoutAction = "SWITCH_TO_ON_DEMAND"|"TERMINATE_CLUSTER"|string;
|
|
3254
|
+
export interface SpotResizingSpecification {
|
|
3255
|
+
/**
|
|
3256
|
+
* Spot resize timeout in minutes. If Spot Instances are not provisioned within this time, the resize workflow will stop provisioning of Spot instances. Minimum value is 5 minutes and maximum value is 10,080 minutes (7 days). The timeout applies to all resize workflows on the Instance Fleet. The resize could be triggered by Amazon EMR Managed Scaling or by the customer (via Amazon EMR Console, Amazon EMR CLI modify-instance-fleet or Amazon EMR SDK ModifyInstanceFleet API) or by Amazon EMR due to Amazon EC2 Spot Reclamation.
|
|
3257
|
+
*/
|
|
3258
|
+
TimeoutDurationMinutes: WholeNumber;
|
|
3259
|
+
}
|
|
3226
3260
|
export interface StartNotebookExecutionInput {
|
|
3227
3261
|
/**
|
|
3228
3262
|
* The unique identifier of the EMR Notebook to use for notebook execution.
|
|
@@ -289,6 +289,10 @@ declare namespace Grafana {
|
|
|
289
289
|
* The configuration string for the workspace that you create. For more information about the format and configuration options available, see Working in your Grafana workspace.
|
|
290
290
|
*/
|
|
291
291
|
configuration?: OverridableConfigurationJson;
|
|
292
|
+
/**
|
|
293
|
+
* Configuration for network access to your workspace. When this is configured, only listed IP addresses and VPC endpoints will be able to access your workspace. Standard Grafana authentication and authorization will still be required. If this is not configured, or is removed, then all IP addresses and VPC endpoints will be allowed. Standard Grafana authentication and authorization will still be required.
|
|
294
|
+
*/
|
|
295
|
+
networkAccessControl?: NetworkAccessConfiguration;
|
|
292
296
|
/**
|
|
293
297
|
* The name of an IAM role that already exists to use with Organizations to access Amazon Web Services data sources and notification channels in other accounts in an organization.
|
|
294
298
|
*/
|
|
@@ -513,6 +517,16 @@ declare namespace Grafana {
|
|
|
513
517
|
workspaces: WorkspaceList;
|
|
514
518
|
}
|
|
515
519
|
export type LoginValidityDuration = number;
|
|
520
|
+
export interface NetworkAccessConfiguration {
|
|
521
|
+
/**
|
|
522
|
+
* An array of prefix list IDs. A prefix list is a list of CIDR ranges of IP addresses. The IP addresses specified are allowed to access your workspace. If the list is not included in the configuration then no IP addresses will be allowed to access the workspace. You create a prefix list using the Amazon VPC console. Prefix list IDs have the format pl-1a2b3c4d . For more information about prefix lists, see Group CIDR blocks using managed prefix listsin the Amazon Virtual Private Cloud User Guide.
|
|
523
|
+
*/
|
|
524
|
+
prefixListIds: PrefixListIds;
|
|
525
|
+
/**
|
|
526
|
+
* An array of Amazon VPC endpoint IDs for the workspace. You can create VPC endpoints to your Amazon Managed Grafana workspace for access from within a VPC. If a NetworkAccessConfiguration is specified then only VPC endpoints specified here will be allowed to access the workspace. VPC endpoint IDs have the format vpce-1a2b3c4d . For more information about creating an interface VPC endpoint, see Interface VPC endpoints in the Amazon Managed Grafana User Guide. The only VPC endpoints that can be specified here are interface VPC endpoints for Grafana workspaces (using the com.amazonaws.[region].grafana-workspace service endpoint). Other VPC endpoints will be ignored.
|
|
527
|
+
*/
|
|
528
|
+
vpceIds: VpceIds;
|
|
529
|
+
}
|
|
516
530
|
export type NotificationDestinationType = "SNS"|string;
|
|
517
531
|
export type NotificationDestinationsList = NotificationDestinationType[];
|
|
518
532
|
export type OrganizationRoleName = string;
|
|
@@ -532,6 +546,8 @@ declare namespace Grafana {
|
|
|
532
546
|
}
|
|
533
547
|
export type PermissionEntryList = PermissionEntry[];
|
|
534
548
|
export type PermissionType = "CUSTOMER_MANAGED"|"SERVICE_MANAGED"|string;
|
|
549
|
+
export type PrefixListId = string;
|
|
550
|
+
export type PrefixListIds = PrefixListId[];
|
|
535
551
|
export type Role = "ADMIN"|"EDITOR"|"VIEWER"|string;
|
|
536
552
|
export type RoleValue = string;
|
|
537
553
|
export type RoleValueList = RoleValue[];
|
|
@@ -700,14 +716,22 @@ declare namespace Grafana {
|
|
|
700
716
|
* Specifies whether the workspace can access Amazon Web Services resources in this Amazon Web Services account only, or whether it can also access Amazon Web Services resources in other accounts in the same organization. If you specify ORGANIZATION, you must specify which organizational units the workspace can access in the workspaceOrganizationalUnits parameter.
|
|
701
717
|
*/
|
|
702
718
|
accountAccessType?: AccountAccessType;
|
|
719
|
+
/**
|
|
720
|
+
* The configuration settings for network access to your workspace. When this is configured, only listed IP addresses and VPC endpoints will be able to access your workspace. Standard Grafana authentication and authorization will still be required. If this is not configured, or is removed, then all IP addresses and VPC endpoints will be allowed. Standard Grafana authentication and authorization will still be required.
|
|
721
|
+
*/
|
|
722
|
+
networkAccessControl?: NetworkAccessConfiguration;
|
|
703
723
|
/**
|
|
704
724
|
* The name of an IAM role that already exists to use to access resources through Organizations.
|
|
705
725
|
*/
|
|
706
726
|
organizationRoleName?: OrganizationRoleName;
|
|
707
727
|
/**
|
|
708
|
-
* If you specify
|
|
728
|
+
* If you specify SERVICE_MANAGED, Amazon Managed Grafana automatically creates the IAM roles and provisions the permissions that the workspace needs to use Amazon Web Services data sources and notification channels. If you specify CUSTOMER_MANAGED, you will manage those roles and permissions yourself. If you are creating this workspace in a member account of an organization and that account is not a delegated administrator account, and you want the workspace to access data sources in other Amazon Web Services accounts in the organization, you must choose CUSTOMER_MANAGED. For more information, see Amazon Managed Grafana permissions and policies for Amazon Web Services data sources and notification channels
|
|
709
729
|
*/
|
|
710
730
|
permissionType?: PermissionType;
|
|
731
|
+
/**
|
|
732
|
+
* Whether to remove the network access configuration from the workspace. Setting this to true and providing a networkAccessControl to set will return an error. If you remove this configuration by setting this to true, then all IP addresses and VPC endpoints will be allowed. Standard Grafana authentication and authorization will still be required.
|
|
733
|
+
*/
|
|
734
|
+
removeNetworkAccessConfiguration?: Boolean;
|
|
711
735
|
/**
|
|
712
736
|
* Whether to remove the VPC configuration from the workspace. Setting this to true and providing a vpcConfiguration to set will return an error.
|
|
713
737
|
*/
|
|
@@ -769,14 +793,16 @@ declare namespace Grafana {
|
|
|
769
793
|
export type UserType = "SSO_USER"|"SSO_GROUP"|string;
|
|
770
794
|
export interface VpcConfiguration {
|
|
771
795
|
/**
|
|
772
|
-
* The list of Amazon EC2 security group IDs attached to the Amazon VPC for your Grafana workspace to connect.
|
|
796
|
+
* The list of Amazon EC2 security group IDs attached to the Amazon VPC for your Grafana workspace to connect. Duplicates not allowed.
|
|
773
797
|
*/
|
|
774
798
|
securityGroupIds: SecurityGroupIds;
|
|
775
799
|
/**
|
|
776
|
-
* The list of Amazon EC2 subnet IDs created in the Amazon VPC for your Grafana workspace to connect.
|
|
800
|
+
* The list of Amazon EC2 subnet IDs created in the Amazon VPC for your Grafana workspace to connect. Duplicates not allowed.
|
|
777
801
|
*/
|
|
778
802
|
subnetIds: SubnetIds;
|
|
779
803
|
}
|
|
804
|
+
export type VpceId = string;
|
|
805
|
+
export type VpceIds = VpceId[];
|
|
780
806
|
export interface WorkspaceDescription {
|
|
781
807
|
/**
|
|
782
808
|
* Specifies whether the workspace can access Amazon Web Services resources in this Amazon Web Services account only, or whether it can also access Amazon Web Services resources in other accounts in the same organization. If this is ORGANIZATION, the workspaceOrganizationalUnits parameter specifies which organizational units the workspace can access.
|
|
@@ -834,6 +860,10 @@ declare namespace Grafana {
|
|
|
834
860
|
* The name of the workspace.
|
|
835
861
|
*/
|
|
836
862
|
name?: WorkspaceName;
|
|
863
|
+
/**
|
|
864
|
+
* The configuration settings for network access to your workspace.
|
|
865
|
+
*/
|
|
866
|
+
networkAccessControl?: NetworkAccessConfiguration;
|
|
837
867
|
/**
|
|
838
868
|
* The Amazon Web Services notification channels that Amazon Managed Grafana can automatically create IAM roles and permissions for, to allow Amazon Managed Grafana to use these channels.
|
|
839
869
|
*/
|
|
@@ -847,7 +877,7 @@ declare namespace Grafana {
|
|
|
847
877
|
*/
|
|
848
878
|
organizationalUnits?: OrganizationalUnitList;
|
|
849
879
|
/**
|
|
850
|
-
* If this is
|
|
880
|
+
* If this is SERVICE_MANAGED, Amazon Managed Grafana automatically creates the IAM roles and provisions the permissions that the workspace needs to use Amazon Web Services data sources and notification channels. If this is CUSTOMER_MANAGED, you manage those roles and permissions yourself. If you are creating this workspace in a member account of an organization and that account is not a delegated administrator account, and you want the workspace to access data sources in other Amazon Web Services accounts in the organization, you must choose CUSTOMER_MANAGED. For more information, see Amazon Managed Grafana permissions and policies for Amazon Web Services data sources and notification channels
|
|
851
881
|
*/
|
|
852
882
|
permissionType?: PermissionType;
|
|
853
883
|
/**
|
|
@@ -407,7 +407,7 @@ declare namespace WAFV2 {
|
|
|
407
407
|
*/
|
|
408
408
|
RequestInspection?: RequestInspection;
|
|
409
409
|
/**
|
|
410
|
-
* The criteria for inspecting responses to login requests, used by the ATP rule group to track login failure rates. The ATP rule group evaluates the responses that your protected resources send back to client login attempts, keeping count of successful and failed attempts from each IP address and client session. Using this information, the rule group labels and mitigates requests from client sessions and IP addresses that submit too many failed login attempts in a short amount of time. Response inspection is available only in web ACLs that protect Amazon CloudFront distributions.
|
|
410
|
+
* The criteria for inspecting responses to login requests, used by the ATP rule group to track login failure rates. The ATP rule group evaluates the responses that your protected resources send back to client login attempts, keeping count of successful and failed attempts from each IP address and client session. Using this information, the rule group labels and mitigates requests from client sessions and IP addresses that submit too many failed login attempts in a short amount of time. Response inspection is available only in web ACLs that protect Amazon CloudFront distributions. For regional web ACLs in Region US East (N. Virginia) us-east-1, it's possible to configure response inspection through the APIs, but ATP response inspection will not be enabled. You can only use the response inspection capabilities of the ATP managed rule group in web ACLs that protect CloudFront distributions.
|
|
411
411
|
*/
|
|
412
412
|
ResponseInspection?: ResponseInspection;
|
|
413
413
|
}
|
|
@@ -1919,7 +1919,7 @@ declare namespace WAFV2 {
|
|
|
1919
1919
|
*/
|
|
1920
1920
|
AWSManagedRulesBotControlRuleSet?: AWSManagedRulesBotControlRuleSet;
|
|
1921
1921
|
/**
|
|
1922
|
-
* Additional configuration for using the account takeover prevention (ATP) managed rule group, AWSManagedRulesATPRuleSet. Use this to provide login request information to the rule group. For web ACLs that protect CloudFront distributions, use this to also provide the information about how your distribution responds to login requests. This configuration replaces the individual configuration fields in ManagedRuleGroupConfig and provides additional feature configuration. For information about using the ATP managed rule group, see WAF Fraud Control account takeover prevention (ATP) rule group and WAF Fraud Control account takeover prevention (ATP) in the WAF Developer Guide.
|
|
1922
|
+
* Additional configuration for using the account takeover prevention (ATP) managed rule group, AWSManagedRulesATPRuleSet. Use this to provide login request information to the rule group. For web ACLs that protect CloudFront distributions, use this to also provide the information about how your distribution responds to login requests. For regional web ACLs in Region US East (N. Virginia) us-east-1, it's possible to configure response inspection through the APIs, but ATP response inspection will not be enabled. You can only use the response inspection capabilities of the ATP managed rule group in web ACLs that protect CloudFront distributions. This configuration replaces the individual configuration fields in ManagedRuleGroupConfig and provides additional feature configuration. For information about using the ATP managed rule group, see WAF Fraud Control account takeover prevention (ATP) rule group and WAF Fraud Control account takeover prevention (ATP) in the WAF Developer Guide.
|
|
1923
1923
|
*/
|
|
1924
1924
|
AWSManagedRulesATPRuleSet?: AWSManagedRulesATPRuleSet;
|
|
1925
1925
|
}
|