cdk-docker-image-deployment 0.0.54 → 0.0.56
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +3 -3
- package/lib/destination.js +1 -1
- package/lib/docker-image-deployment.js +1 -1
- package/lib/source.js +1 -1
- package/node_modules/aws-sdk/CHANGELOG.md +17 -1
- package/node_modules/aws-sdk/README.md +1 -1
- package/node_modules/aws-sdk/apis/appstream-2016-12-01.min.json +112 -96
- package/node_modules/aws-sdk/apis/cloudformation-2010-05-15.min.json +40 -11
- package/node_modules/aws-sdk/apis/ec2-2016-11-15.min.json +14 -0
- package/node_modules/aws-sdk/apis/fms-2018-01-01.min.json +49 -43
- package/node_modules/aws-sdk/apis/glue-2017-03-31.min.json +217 -195
- package/node_modules/aws-sdk/apis/mediatailor-2018-04-23.min.json +107 -72
- package/node_modules/aws-sdk/apis/sagemaker-2017-07-24.min.json +293 -285
- package/node_modules/aws-sdk/apis/wafv2-2019-07-29.min.json +251 -163
- package/node_modules/aws-sdk/clients/apprunner.d.ts +1 -1
- package/node_modules/aws-sdk/clients/appstream.d.ts +28 -5
- package/node_modules/aws-sdk/clients/cloud9.d.ts +3 -3
- package/node_modules/aws-sdk/clients/cloudformation.d.ts +45 -5
- package/node_modules/aws-sdk/clients/ec2.d.ts +23 -3
- package/node_modules/aws-sdk/clients/fms.d.ts +12 -1
- package/node_modules/aws-sdk/clients/glue.d.ts +25 -0
- package/node_modules/aws-sdk/clients/mediatailor.d.ts +48 -1
- package/node_modules/aws-sdk/clients/redshift.d.ts +2 -2
- package/node_modules/aws-sdk/clients/sagemaker.d.ts +14 -2
- package/node_modules/aws-sdk/clients/wafv2.d.ts +118 -20
- package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +1 -1
- package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +9 -9
- package/node_modules/aws-sdk/dist/aws-sdk.js +57 -14
- package/node_modules/aws-sdk/dist/aws-sdk.min.js +92 -92
- package/node_modules/aws-sdk/lib/core.js +1 -1
- package/node_modules/aws-sdk/package.json +1 -1
- package/package.json +4 -4
|
@@ -1181,7 +1181,7 @@ declare namespace AppRunner {
|
|
|
1181
1181
|
OperationId?: UUID;
|
|
1182
1182
|
}
|
|
1183
1183
|
export type RoleArn = string;
|
|
1184
|
-
export type Runtime = "PYTHON_3"|"NODEJS_12"|"NODEJS_14"|"CORRETTO_8"|"CORRETTO_11"|"NODEJS_16"|string;
|
|
1184
|
+
export type Runtime = "PYTHON_3"|"NODEJS_12"|"NODEJS_14"|"CORRETTO_8"|"CORRETTO_11"|"NODEJS_16"|"GO_1"|"DOTNET_6"|"PHP_81"|"RUBY_31"|string;
|
|
1185
1185
|
export type RuntimeEnvironmentVariables = {[key: string]: RuntimeEnvironmentVariablesValue};
|
|
1186
1186
|
export type RuntimeEnvironmentVariablesKey = string;
|
|
1187
1187
|
export type RuntimeEnvironmentVariablesValue = string;
|
|
@@ -93,11 +93,11 @@ declare class AppStream extends Service {
|
|
|
93
93
|
*/
|
|
94
94
|
createEntitlement(callback?: (err: AWSError, data: AppStream.Types.CreateEntitlementResult) => void): Request<AppStream.Types.CreateEntitlementResult, AWSError>;
|
|
95
95
|
/**
|
|
96
|
-
* Creates a fleet. A fleet consists of streaming instances that
|
|
96
|
+
* Creates a fleet. A fleet consists of streaming instances that your users access for their applications and desktops.
|
|
97
97
|
*/
|
|
98
98
|
createFleet(params: AppStream.Types.CreateFleetRequest, callback?: (err: AWSError, data: AppStream.Types.CreateFleetResult) => void): Request<AppStream.Types.CreateFleetResult, AWSError>;
|
|
99
99
|
/**
|
|
100
|
-
* Creates a fleet. A fleet consists of streaming instances that
|
|
100
|
+
* Creates a fleet. A fleet consists of streaming instances that your users access for their applications and desktops.
|
|
101
101
|
*/
|
|
102
102
|
createFleet(callback?: (err: AWSError, data: AppStream.Types.CreateFleetResult) => void): Request<AppStream.Types.CreateFleetResult, AWSError>;
|
|
103
103
|
/**
|
|
@@ -744,7 +744,7 @@ declare namespace AppStream {
|
|
|
744
744
|
}
|
|
745
745
|
export interface AssociateFleetResult {
|
|
746
746
|
}
|
|
747
|
-
export type AuthenticationType = "API"|"SAML"|"USERPOOL"|string;
|
|
747
|
+
export type AuthenticationType = "API"|"SAML"|"USERPOOL"|"AWS_AD"|string;
|
|
748
748
|
export type AwsAccountId = string;
|
|
749
749
|
export type AwsAccountIdList = AwsAccountId[];
|
|
750
750
|
export interface BatchAssociateUserStackRequest {
|
|
@@ -773,6 +773,17 @@ declare namespace AppStream {
|
|
|
773
773
|
}
|
|
774
774
|
export type Boolean = boolean;
|
|
775
775
|
export type BooleanObject = boolean;
|
|
776
|
+
export interface CertificateBasedAuthProperties {
|
|
777
|
+
/**
|
|
778
|
+
* The status of the certificate-based authentication properties.
|
|
779
|
+
*/
|
|
780
|
+
Status?: CertificateBasedAuthStatus;
|
|
781
|
+
/**
|
|
782
|
+
* The ARN of the AWS Certificate Manager Private CA resource.
|
|
783
|
+
*/
|
|
784
|
+
CertificateAuthorityArn?: Arn;
|
|
785
|
+
}
|
|
786
|
+
export type CertificateBasedAuthStatus = "DISABLED"|"ENABLED"|"ENABLED_NO_DIRECTORY_LOGIN_FALLBACK"|string;
|
|
776
787
|
export interface ComputeCapacity {
|
|
777
788
|
/**
|
|
778
789
|
* The desired number of streaming instances.
|
|
@@ -915,6 +926,10 @@ declare namespace AppStream {
|
|
|
915
926
|
* The credentials for the service account used by the fleet or image builder to connect to the directory.
|
|
916
927
|
*/
|
|
917
928
|
ServiceAccountCredentials?: ServiceAccountCredentials;
|
|
929
|
+
/**
|
|
930
|
+
* The certificate-based authentication properties used to authenticate SAML 2.0 Identity Provider (IdP) user identities to Active Directory domain-joined streaming instances. Fallback is turned on by default when certificate-based authentication is Enabled . Fallback allows users to log in using their AD domain password if certificate-based authentication is unsuccessful, or to unlock a desktop lock screen. Enabled_no_directory_login_fallback enables certificate-based authentication, but does not allow users to log in using their AD domain password. Users will be disconnected to re-authenticate using certificates.
|
|
931
|
+
*/
|
|
932
|
+
CertificateBasedAuthProperties?: CertificateBasedAuthProperties;
|
|
918
933
|
}
|
|
919
934
|
export interface CreateDirectoryConfigResult {
|
|
920
935
|
/**
|
|
@@ -964,7 +979,7 @@ declare namespace AppStream {
|
|
|
964
979
|
*/
|
|
965
980
|
ImageArn?: Arn;
|
|
966
981
|
/**
|
|
967
|
-
* The instance type to use when launching fleet instances. The following instance types are available: stream.standard.small stream.standard.medium stream.standard.large stream.compute.large stream.compute.xlarge stream.compute.2xlarge stream.compute.4xlarge stream.compute.8xlarge stream.memory.large stream.memory.xlarge stream.memory.2xlarge stream.memory.4xlarge stream.memory.8xlarge stream.memory.z1d.large stream.memory.z1d.xlarge stream.memory.z1d.2xlarge stream.memory.z1d.3xlarge stream.memory.z1d.6xlarge stream.memory.z1d.12xlarge stream.graphics-design.large stream.graphics-design.xlarge stream.graphics-design.2xlarge stream.graphics-design.4xlarge stream.graphics-desktop.2xlarge stream.graphics.g4dn.xlarge stream.graphics.g4dn.2xlarge stream.graphics.g4dn.4xlarge stream.graphics.g4dn.8xlarge stream.graphics.g4dn.12xlarge stream.graphics.g4dn.16xlarge stream.graphics-pro.4xlarge stream.graphics-pro.8xlarge stream.graphics-pro.16xlarge The following instance types are available for Elastic fleets: stream.standard.small stream.standard.medium
|
|
982
|
+
* The instance type to use when launching fleet instances. The following instance types are available: stream.standard.small stream.standard.medium stream.standard.large stream.standard.xlarge stream.standard.2xlarge stream.compute.large stream.compute.xlarge stream.compute.2xlarge stream.compute.4xlarge stream.compute.8xlarge stream.memory.large stream.memory.xlarge stream.memory.2xlarge stream.memory.4xlarge stream.memory.8xlarge stream.memory.z1d.large stream.memory.z1d.xlarge stream.memory.z1d.2xlarge stream.memory.z1d.3xlarge stream.memory.z1d.6xlarge stream.memory.z1d.12xlarge stream.graphics-design.large stream.graphics-design.xlarge stream.graphics-design.2xlarge stream.graphics-design.4xlarge stream.graphics-desktop.2xlarge stream.graphics.g4dn.xlarge stream.graphics.g4dn.2xlarge stream.graphics.g4dn.4xlarge stream.graphics.g4dn.8xlarge stream.graphics.g4dn.12xlarge stream.graphics.g4dn.16xlarge stream.graphics-pro.4xlarge stream.graphics-pro.8xlarge stream.graphics-pro.16xlarge The following instance types are available for Elastic fleets: stream.standard.small stream.standard.medium stream.standard.large stream.standard.xlarge stream.standard.2xlarge
|
|
968
983
|
*/
|
|
969
984
|
InstanceType: String;
|
|
970
985
|
/**
|
|
@@ -1774,6 +1789,10 @@ declare namespace AppStream {
|
|
|
1774
1789
|
* The time the directory configuration was created.
|
|
1775
1790
|
*/
|
|
1776
1791
|
CreatedTime?: Timestamp;
|
|
1792
|
+
/**
|
|
1793
|
+
* The certificate-based authentication properties used to authenticate SAML 2.0 Identity Provider (IdP) user identities to Active Directory domain-joined streaming instances. Fallback is turned on by default when certificate-based authentication is Enabled . Fallback allows users to log in using their AD domain password if certificate-based authentication is unsuccessful, or to unlock a desktop lock screen. Enabled_no_directory_login_fallback enables certificate-based authentication, but does not allow users to log in using their AD domain password. Users will be disconnected to re-authenticate using certificates.
|
|
1794
|
+
*/
|
|
1795
|
+
CertificateBasedAuthProperties?: CertificateBasedAuthProperties;
|
|
1777
1796
|
}
|
|
1778
1797
|
export type DirectoryConfigList = DirectoryConfig[];
|
|
1779
1798
|
export type DirectoryName = string;
|
|
@@ -2663,6 +2682,10 @@ declare namespace AppStream {
|
|
|
2663
2682
|
* The credentials for the service account used by the fleet or image builder to connect to the directory.
|
|
2664
2683
|
*/
|
|
2665
2684
|
ServiceAccountCredentials?: ServiceAccountCredentials;
|
|
2685
|
+
/**
|
|
2686
|
+
* The certificate-based authentication properties used to authenticate SAML 2.0 Identity Provider (IdP) user identities to Active Directory domain-joined streaming instances. Fallback is turned on by default when certificate-based authentication is Enabled . Fallback allows users to log in using their AD domain password if certificate-based authentication is unsuccessful, or to unlock a desktop lock screen. Enabled_no_directory_login_fallback enables certificate-based authentication, but does not allow users to log in using their AD domain password. Users will be disconnected to re-authenticate using certificates.
|
|
2687
|
+
*/
|
|
2688
|
+
CertificateBasedAuthProperties?: CertificateBasedAuthProperties;
|
|
2666
2689
|
}
|
|
2667
2690
|
export interface UpdateDirectoryConfigResult {
|
|
2668
2691
|
/**
|
|
@@ -2712,7 +2735,7 @@ declare namespace AppStream {
|
|
|
2712
2735
|
*/
|
|
2713
2736
|
Name?: String;
|
|
2714
2737
|
/**
|
|
2715
|
-
* The instance type to use when launching fleet instances. The following instance types are available: stream.standard.small stream.standard.medium stream.standard.large stream.compute.large stream.compute.xlarge stream.compute.2xlarge stream.compute.4xlarge stream.compute.8xlarge stream.memory.large stream.memory.xlarge stream.memory.2xlarge stream.memory.4xlarge stream.memory.8xlarge stream.memory.z1d.large stream.memory.z1d.xlarge stream.memory.z1d.2xlarge stream.memory.z1d.3xlarge stream.memory.z1d.6xlarge stream.memory.z1d.12xlarge stream.graphics-design.large stream.graphics-design.xlarge stream.graphics-design.2xlarge stream.graphics-design.4xlarge stream.graphics-desktop.2xlarge stream.graphics.g4dn.xlarge stream.graphics.g4dn.2xlarge stream.graphics.g4dn.4xlarge stream.graphics.g4dn.8xlarge stream.graphics.g4dn.12xlarge stream.graphics.g4dn.16xlarge stream.graphics-pro.4xlarge stream.graphics-pro.8xlarge stream.graphics-pro.16xlarge The following instance types are available for Elastic fleets: stream.standard.small stream.standard.medium
|
|
2738
|
+
* The instance type to use when launching fleet instances. The following instance types are available: stream.standard.small stream.standard.medium stream.standard.large stream.standard.xlarge stream.standard.2xlarge stream.compute.large stream.compute.xlarge stream.compute.2xlarge stream.compute.4xlarge stream.compute.8xlarge stream.memory.large stream.memory.xlarge stream.memory.2xlarge stream.memory.4xlarge stream.memory.8xlarge stream.memory.z1d.large stream.memory.z1d.xlarge stream.memory.z1d.2xlarge stream.memory.z1d.3xlarge stream.memory.z1d.6xlarge stream.memory.z1d.12xlarge stream.graphics-design.large stream.graphics-design.xlarge stream.graphics-design.2xlarge stream.graphics-design.4xlarge stream.graphics-desktop.2xlarge stream.graphics.g4dn.xlarge stream.graphics.g4dn.2xlarge stream.graphics.g4dn.4xlarge stream.graphics.g4dn.8xlarge stream.graphics.g4dn.12xlarge stream.graphics.g4dn.16xlarge stream.graphics-pro.4xlarge stream.graphics-pro.8xlarge stream.graphics-pro.16xlarge The following instance types are available for Elastic fleets: stream.standard.small stream.standard.medium stream.standard.large stream.standard.xlarge stream.standard.2xlarge
|
|
2716
2739
|
*/
|
|
2717
2740
|
InstanceType?: String;
|
|
2718
2741
|
/**
|
|
@@ -36,11 +36,11 @@ declare class Cloud9 extends Service {
|
|
|
36
36
|
*/
|
|
37
37
|
deleteEnvironment(callback?: (err: AWSError, data: Cloud9.Types.DeleteEnvironmentResult) => void): Request<Cloud9.Types.DeleteEnvironmentResult, AWSError>;
|
|
38
38
|
/**
|
|
39
|
-
* Deletes an environment member from
|
|
39
|
+
* Deletes an environment member from a development environment.
|
|
40
40
|
*/
|
|
41
41
|
deleteEnvironmentMembership(params: Cloud9.Types.DeleteEnvironmentMembershipRequest, callback?: (err: AWSError, data: Cloud9.Types.DeleteEnvironmentMembershipResult) => void): Request<Cloud9.Types.DeleteEnvironmentMembershipResult, AWSError>;
|
|
42
42
|
/**
|
|
43
|
-
* Deletes an environment member from
|
|
43
|
+
* Deletes an environment member from a development environment.
|
|
44
44
|
*/
|
|
45
45
|
deleteEnvironmentMembership(callback?: (err: AWSError, data: Cloud9.Types.DeleteEnvironmentMembershipResult) => void): Request<Cloud9.Types.DeleteEnvironmentMembershipResult, AWSError>;
|
|
46
46
|
/**
|
|
@@ -143,7 +143,7 @@ declare namespace Cloud9 {
|
|
|
143
143
|
*/
|
|
144
144
|
subnetId?: SubnetId;
|
|
145
145
|
/**
|
|
146
|
-
* The identifier for the Amazon Machine Image (AMI) that's used to create the EC2 instance. To choose an AMI for the instance, you must specify a valid AMI alias or a valid Amazon EC2 Systems Manager (SSM) path. The default AMI is used if the parameter isn't explicitly assigned a value in the request.
|
|
146
|
+
* The identifier for the Amazon Machine Image (AMI) that's used to create the EC2 instance. To choose an AMI for the instance, you must specify a valid AMI alias or a valid Amazon EC2 Systems Manager (SSM) path. The default Amazon Linux AMI is currently used if the parameter isn't explicitly assigned a value in the request. In the future the parameter for Amazon Linux will no longer be available when you specify an AMI for your instance. Amazon Linux 2 will then become the default AMI, which is used to launch your instance if no parameter is explicitly defined. AMI aliases Amazon Linux (default): amazonlinux-1-x86_64 Amazon Linux 2: amazonlinux-2-x86_64 Ubuntu 18.04: ubuntu-18.04-x86_64 SSM paths Amazon Linux (default): resolve:ssm:/aws/service/cloud9/amis/amazonlinux-1-x86_64 Amazon Linux 2: resolve:ssm:/aws/service/cloud9/amis/amazonlinux-2-x86_64 Ubuntu 18.04: resolve:ssm:/aws/service/cloud9/amis/ubuntu-18.04-x86_64
|
|
147
147
|
*/
|
|
148
148
|
imageId?: ImageId;
|
|
149
149
|
/**
|
|
@@ -493,11 +493,11 @@ declare class CloudFormation extends Service {
|
|
|
493
493
|
*/
|
|
494
494
|
stopStackSetOperation(callback?: (err: AWSError, data: CloudFormation.Types.StopStackSetOperationOutput) => void): Request<CloudFormation.Types.StopStackSetOperationOutput, AWSError>;
|
|
495
495
|
/**
|
|
496
|
-
* Tests a registered extension to make sure it meets all necessary requirements for being published in the CloudFormation registry. For resource types, this includes passing all contracts tests defined for the type. For modules, this includes determining if the module's model meets all necessary requirements. For more information, see Testing your public extension prior to publishing in the CloudFormation CLI User Guide. If you don't specify a version, CloudFormation uses the default version of the extension in your account and region for testing. To perform testing, CloudFormation assumes the execution role specified when the type was registered. For more information, see RegisterType. Once you've initiated testing on an extension using TestType, you can
|
|
496
|
+
* Tests a registered extension to make sure it meets all necessary requirements for being published in the CloudFormation registry. For resource types, this includes passing all contracts tests defined for the type. For modules, this includes determining if the module's model meets all necessary requirements. For more information, see Testing your public extension prior to publishing in the CloudFormation CLI User Guide. If you don't specify a version, CloudFormation uses the default version of the extension in your account and region for testing. To perform testing, CloudFormation assumes the execution role specified when the type was registered. For more information, see RegisterType. Once you've initiated testing on an extension using TestType, you can pass the returned TypeVersionArn into DescribeType to monitor the current test status and test status description for the extension. An extension must have a test status of PASSED before it can be published. For more information, see Publishing extensions to make them available for public use in the CloudFormation CLI User Guide.
|
|
497
497
|
*/
|
|
498
498
|
testType(params: CloudFormation.Types.TestTypeInput, callback?: (err: AWSError, data: CloudFormation.Types.TestTypeOutput) => void): Request<CloudFormation.Types.TestTypeOutput, AWSError>;
|
|
499
499
|
/**
|
|
500
|
-
* Tests a registered extension to make sure it meets all necessary requirements for being published in the CloudFormation registry. For resource types, this includes passing all contracts tests defined for the type. For modules, this includes determining if the module's model meets all necessary requirements. For more information, see Testing your public extension prior to publishing in the CloudFormation CLI User Guide. If you don't specify a version, CloudFormation uses the default version of the extension in your account and region for testing. To perform testing, CloudFormation assumes the execution role specified when the type was registered. For more information, see RegisterType. Once you've initiated testing on an extension using TestType, you can
|
|
500
|
+
* Tests a registered extension to make sure it meets all necessary requirements for being published in the CloudFormation registry. For resource types, this includes passing all contracts tests defined for the type. For modules, this includes determining if the module's model meets all necessary requirements. For more information, see Testing your public extension prior to publishing in the CloudFormation CLI User Guide. If you don't specify a version, CloudFormation uses the default version of the extension in your account and region for testing. To perform testing, CloudFormation assumes the execution role specified when the type was registered. For more information, see RegisterType. Once you've initiated testing on an extension using TestType, you can pass the returned TypeVersionArn into DescribeType to monitor the current test status and test status description for the extension. An extension must have a test status of PASSED before it can be published. For more information, see Publishing extensions to make them available for public use in the CloudFormation CLI User Guide.
|
|
501
501
|
*/
|
|
502
502
|
testType(callback?: (err: AWSError, data: CloudFormation.Types.TestTypeOutput) => void): Request<CloudFormation.Types.TestTypeOutput, AWSError>;
|
|
503
503
|
/**
|
|
@@ -1273,7 +1273,7 @@ declare namespace CloudFormation {
|
|
|
1273
1273
|
*/
|
|
1274
1274
|
OrganizationalUnitIds?: OrganizationalUnitIdList;
|
|
1275
1275
|
/**
|
|
1276
|
-
* Limit deployment targets to individual accounts or include additional accounts with provided OUs. The following is a list of possible values for the AccountFilterType operation. INTERSECTION: StackSets deploys to the accounts specified in Accounts parameter. DIFFERENCE: StackSets excludes the accounts specified in Accounts parameter. This enables user to avoid certain accounts within an OU such as suspended accounts. UNION:
|
|
1276
|
+
* Limit deployment targets to individual accounts or include additional accounts with provided OUs. The following is a list of possible values for the AccountFilterType operation. INTERSECTION: StackSets deploys to the accounts specified in Accounts parameter. DIFFERENCE: StackSets excludes the accounts specified in Accounts parameter. This enables user to avoid certain accounts within an OU such as suspended accounts. UNION: StackSets includes additional accounts deployment targets. This is the default value if AccountFilterType is not provided. This enables user to update an entire OU and individual accounts from a different OU in one request, which used to be two separate requests. NONE: Deploys to all the accounts in specified organizational units (OU).
|
|
1277
1277
|
*/
|
|
1278
1278
|
AccountFilterType?: AccountFilterType;
|
|
1279
1279
|
}
|
|
@@ -2185,7 +2185,7 @@ declare namespace CloudFormation {
|
|
|
2185
2185
|
*/
|
|
2186
2186
|
MaxResults?: MaxResults;
|
|
2187
2187
|
/**
|
|
2188
|
-
* The
|
|
2188
|
+
* The filter to apply to stack instances
|
|
2189
2189
|
*/
|
|
2190
2190
|
Filters?: StackInstanceFilters;
|
|
2191
2191
|
/**
|
|
@@ -2252,6 +2252,10 @@ declare namespace CloudFormation {
|
|
|
2252
2252
|
* [Service-managed permissions] Specifies whether you are acting as an account administrator in the organization's management account or as a delegated administrator in a member account. By default, SELF is specified. Use SELF for stack sets with self-managed permissions. If you are signed in to the management account, specify SELF. If you are signed in to a delegated administrator account, specify DELEGATED_ADMIN. Your Amazon Web Services account must be registered as a delegated administrator in the management account. For more information, see Register a delegated administrator in the CloudFormation User Guide.
|
|
2253
2253
|
*/
|
|
2254
2254
|
CallAs?: CallAs;
|
|
2255
|
+
/**
|
|
2256
|
+
* The filter to apply to operation results.
|
|
2257
|
+
*/
|
|
2258
|
+
Filters?: OperationResultFilters;
|
|
2255
2259
|
}
|
|
2256
2260
|
export interface ListStackSetOperationResultsOutput {
|
|
2257
2261
|
/**
|
|
@@ -2497,6 +2501,19 @@ declare namespace CloudFormation {
|
|
|
2497
2501
|
export type NotificationARN = string;
|
|
2498
2502
|
export type NotificationARNs = NotificationARN[];
|
|
2499
2503
|
export type OnFailure = "DO_NOTHING"|"ROLLBACK"|"DELETE"|string;
|
|
2504
|
+
export interface OperationResultFilter {
|
|
2505
|
+
/**
|
|
2506
|
+
* The type of filter to apply.
|
|
2507
|
+
*/
|
|
2508
|
+
Name?: OperationResultFilterName;
|
|
2509
|
+
/**
|
|
2510
|
+
* The value to filter by.
|
|
2511
|
+
*/
|
|
2512
|
+
Values?: OperationResultFilterValues;
|
|
2513
|
+
}
|
|
2514
|
+
export type OperationResultFilterName = "OPERATION_RESULT_STATUS"|string;
|
|
2515
|
+
export type OperationResultFilterValues = string;
|
|
2516
|
+
export type OperationResultFilters = OperationResultFilter[];
|
|
2500
2517
|
export type OperationStatus = "PENDING"|"IN_PROGRESS"|"SUCCESS"|"FAILED"|string;
|
|
2501
2518
|
export type OptionalSecureUrl = string;
|
|
2502
2519
|
export type OrganizationalUnitId = string;
|
|
@@ -3229,6 +3246,10 @@ declare namespace CloudFormation {
|
|
|
3229
3246
|
* Most recent time when CloudFormation performed a drift detection operation on the stack instance. This value will be NULL for any stack instance on which drift detection hasn't yet been performed.
|
|
3230
3247
|
*/
|
|
3231
3248
|
LastDriftCheckTimestamp?: Timestamp;
|
|
3249
|
+
/**
|
|
3250
|
+
* The last unique ID of a StackSet operation performed on a stack instance.
|
|
3251
|
+
*/
|
|
3252
|
+
LastOperationId?: ClientRequestToken;
|
|
3232
3253
|
}
|
|
3233
3254
|
export interface StackInstanceComprehensiveStatus {
|
|
3234
3255
|
/**
|
|
@@ -3247,7 +3268,7 @@ declare namespace CloudFormation {
|
|
|
3247
3268
|
*/
|
|
3248
3269
|
Values?: StackInstanceFilterValues;
|
|
3249
3270
|
}
|
|
3250
|
-
export type StackInstanceFilterName = "DETAILED_STATUS"|string;
|
|
3271
|
+
export type StackInstanceFilterName = "DETAILED_STATUS"|"LAST_OPERATION_ID"|string;
|
|
3251
3272
|
export type StackInstanceFilterValues = string;
|
|
3252
3273
|
export type StackInstanceFilters = StackInstanceFilter[];
|
|
3253
3274
|
export type StackInstanceStatus = "CURRENT"|"OUTDATED"|"INOPERABLE"|string;
|
|
@@ -3293,6 +3314,10 @@ declare namespace CloudFormation {
|
|
|
3293
3314
|
* Most recent time when CloudFormation performed a drift detection operation on the stack instance. This value will be NULL for any stack instance on which drift detection hasn't yet been performed.
|
|
3294
3315
|
*/
|
|
3295
3316
|
LastDriftCheckTimestamp?: Timestamp;
|
|
3317
|
+
/**
|
|
3318
|
+
* The last unique ID of a StackSet operation performed on a stack instance.
|
|
3319
|
+
*/
|
|
3320
|
+
LastOperationId?: ClientRequestToken;
|
|
3296
3321
|
}
|
|
3297
3322
|
export type StackName = string;
|
|
3298
3323
|
export type StackNameOrId = string;
|
|
@@ -3660,6 +3685,10 @@ declare namespace CloudFormation {
|
|
|
3660
3685
|
* The status of the operation in details.
|
|
3661
3686
|
*/
|
|
3662
3687
|
StatusReason?: StackSetOperationStatusReason;
|
|
3688
|
+
/**
|
|
3689
|
+
* Detailed information about the StackSet operation.
|
|
3690
|
+
*/
|
|
3691
|
+
StatusDetails?: StackSetOperationStatusDetails;
|
|
3663
3692
|
}
|
|
3664
3693
|
export type StackSetOperationAction = "CREATE"|"UPDATE"|"DELETE"|"DETECT_DRIFT"|string;
|
|
3665
3694
|
export interface StackSetOperationPreferences {
|
|
@@ -3717,6 +3746,12 @@ declare namespace CloudFormation {
|
|
|
3717
3746
|
OrganizationalUnitId?: OrganizationalUnitId;
|
|
3718
3747
|
}
|
|
3719
3748
|
export type StackSetOperationStatus = "RUNNING"|"SUCCEEDED"|"FAILED"|"STOPPING"|"STOPPED"|"QUEUED"|string;
|
|
3749
|
+
export interface StackSetOperationStatusDetails {
|
|
3750
|
+
/**
|
|
3751
|
+
* The number of stack instances for which the StackSet operation failed.
|
|
3752
|
+
*/
|
|
3753
|
+
FailedStackInstancesCount?: FailedStackInstancesCount;
|
|
3754
|
+
}
|
|
3720
3755
|
export type StackSetOperationStatusReason = string;
|
|
3721
3756
|
export type StackSetOperationSummaries = StackSetOperationSummary[];
|
|
3722
3757
|
export interface StackSetOperationSummary {
|
|
@@ -3744,6 +3779,11 @@ declare namespace CloudFormation {
|
|
|
3744
3779
|
* The status of the operation in details.
|
|
3745
3780
|
*/
|
|
3746
3781
|
StatusReason?: StackSetOperationStatusReason;
|
|
3782
|
+
/**
|
|
3783
|
+
* Detailed information about the stack set operation.
|
|
3784
|
+
*/
|
|
3785
|
+
StatusDetails?: StackSetOperationStatusDetails;
|
|
3786
|
+
OperationPreferences?: StackSetOperationPreferences;
|
|
3747
3787
|
}
|
|
3748
3788
|
export type StackSetStatus = "ACTIVE"|"DELETED"|string;
|
|
3749
3789
|
export type StackSetSummaries = StackSetSummary[];
|
|
@@ -709,11 +709,11 @@ declare class EC2 extends Service {
|
|
|
709
709
|
*/
|
|
710
710
|
createPublicIpv4Pool(callback?: (err: AWSError, data: EC2.Types.CreatePublicIpv4PoolResult) => void): Request<EC2.Types.CreatePublicIpv4PoolResult, AWSError>;
|
|
711
711
|
/**
|
|
712
|
-
*
|
|
712
|
+
* Replaces the EBS-backed root volume for a running instance with a new volume that is restored to the original root volume's launch state, that is restored to a specific snapshot taken from the original root volume, or that is restored from an AMI that has the same key characteristics as that of the instance. For more information, see Replace a root volume in the Amazon Elastic Compute Cloud User Guide.
|
|
713
713
|
*/
|
|
714
714
|
createReplaceRootVolumeTask(params: EC2.Types.CreateReplaceRootVolumeTaskRequest, callback?: (err: AWSError, data: EC2.Types.CreateReplaceRootVolumeTaskResult) => void): Request<EC2.Types.CreateReplaceRootVolumeTaskResult, AWSError>;
|
|
715
715
|
/**
|
|
716
|
-
*
|
|
716
|
+
* Replaces the EBS-backed root volume for a running instance with a new volume that is restored to the original root volume's launch state, that is restored to a specific snapshot taken from the original root volume, or that is restored from an AMI that has the same key characteristics as that of the instance. For more information, see Replace a root volume in the Amazon Elastic Compute Cloud User Guide.
|
|
717
717
|
*/
|
|
718
718
|
createReplaceRootVolumeTask(callback?: (err: AWSError, data: EC2.Types.CreateReplaceRootVolumeTaskResult) => void): Request<EC2.Types.CreateReplaceRootVolumeTaskResult, AWSError>;
|
|
719
719
|
/**
|
|
@@ -9146,7 +9146,7 @@ declare namespace EC2 {
|
|
|
9146
9146
|
*/
|
|
9147
9147
|
InstanceId: InstanceId;
|
|
9148
9148
|
/**
|
|
9149
|
-
* The ID of the snapshot from which to restore the replacement root volume. If you want to restore the volume to the initial launch state, omit this parameter.
|
|
9149
|
+
* The ID of the snapshot from which to restore the replacement root volume. The specified snapshot must be a snapshot that you previously created from the original root volume. If you want to restore the replacement root volume to the initial launch state, or if you want to restore the replacement root volume from an AMI, omit this parameter.
|
|
9150
9150
|
*/
|
|
9151
9151
|
SnapshotId?: SnapshotId;
|
|
9152
9152
|
/**
|
|
@@ -9161,6 +9161,14 @@ declare namespace EC2 {
|
|
|
9161
9161
|
* The tags to apply to the root volume replacement task.
|
|
9162
9162
|
*/
|
|
9163
9163
|
TagSpecifications?: TagSpecificationList;
|
|
9164
|
+
/**
|
|
9165
|
+
* The ID of the AMI to use to restore the root volume. The specified AMI must have the same product code, billing information, architecture type, and virtualization type as that of the instance. If you want to restore the replacement volume from a specific snapshot, or if you want to restore it to its launch state, omit this parameter.
|
|
9166
|
+
*/
|
|
9167
|
+
ImageId?: ImageId;
|
|
9168
|
+
/**
|
|
9169
|
+
* Indicates whether to automatically delete the original root volume after the root volume replacement task completes. To delete the original root volume, specify true. If you choose to keep the original root volume after the replacement task completes, you must manually delete it when you no longer need it.
|
|
9170
|
+
*/
|
|
9171
|
+
DeleteReplacedRootVolume?: Boolean;
|
|
9164
9172
|
}
|
|
9165
9173
|
export interface CreateReplaceRootVolumeTaskResult {
|
|
9166
9174
|
/**
|
|
@@ -28241,6 +28249,18 @@ declare namespace EC2 {
|
|
|
28241
28249
|
* The tags assigned to the task.
|
|
28242
28250
|
*/
|
|
28243
28251
|
Tags?: TagList;
|
|
28252
|
+
/**
|
|
28253
|
+
* The ID of the AMI used to create the replacement root volume.
|
|
28254
|
+
*/
|
|
28255
|
+
ImageId?: ImageId;
|
|
28256
|
+
/**
|
|
28257
|
+
* The ID of the snapshot used to create the replacement root volume.
|
|
28258
|
+
*/
|
|
28259
|
+
SnapshotId?: SnapshotId;
|
|
28260
|
+
/**
|
|
28261
|
+
* Indicates whether the original root volume is to be deleted after the root volume replacement task completes.
|
|
28262
|
+
*/
|
|
28263
|
+
DeleteReplacedRootVolume?: Boolean;
|
|
28244
28264
|
}
|
|
28245
28265
|
export type ReplaceRootVolumeTaskId = string;
|
|
28246
28266
|
export type ReplaceRootVolumeTaskIds = ReplaceRootVolumeTaskId[];
|
|
@@ -1287,6 +1287,7 @@ declare namespace FMS {
|
|
|
1287
1287
|
*/
|
|
1288
1288
|
TargetViolationReason?: TargetViolationReason;
|
|
1289
1289
|
}
|
|
1290
|
+
export type NetworkFirewallOverrideAction = "DROP_TO_ALERT"|string;
|
|
1290
1291
|
export interface NetworkFirewallPolicy {
|
|
1291
1292
|
/**
|
|
1292
1293
|
* Defines the deployment model to use for the firewall policy. To use a distributed model, set PolicyOption to NULL.
|
|
@@ -1338,6 +1339,12 @@ declare namespace FMS {
|
|
|
1338
1339
|
ExpectedPolicyDescription?: NetworkFirewallPolicyDescription;
|
|
1339
1340
|
}
|
|
1340
1341
|
export type NetworkFirewallResourceName = string;
|
|
1342
|
+
export interface NetworkFirewallStatefulRuleGroupOverride {
|
|
1343
|
+
/**
|
|
1344
|
+
* The action that changes the rule group from DROP to ALERT. This only applies to managed rule groups.
|
|
1345
|
+
*/
|
|
1346
|
+
Action?: NetworkFirewallOverrideAction;
|
|
1347
|
+
}
|
|
1341
1348
|
export interface NetworkFirewallUnexpectedFirewallRoutesViolation {
|
|
1342
1349
|
/**
|
|
1343
1350
|
* The subnet ID for the firewall.
|
|
@@ -1982,7 +1989,7 @@ declare namespace FMS {
|
|
|
1982
1989
|
*/
|
|
1983
1990
|
Type: SecurityServiceType;
|
|
1984
1991
|
/**
|
|
1985
|
-
* Details about the service that are specific to the service type, in JSON format. Example: DNS_FIREWALL "{\"type\":\"DNS_FIREWALL\",\"preProcessRuleGroups\":[{\"ruleGroupId\":\"rslvr-frg-1\",\"priority\":10}],\"postProcessRuleGroups\":[{\"ruleGroupId\":\"rslvr-frg-2\",\"priority\":9911}]}" Valid values for preProcessRuleGroups are between 1 and 99. Valid values for postProcessRuleGroups are between 9901 and 10000. Example: NETWORK_FIREWALL - Centralized deployment model "{\"type\":\"NETWORK_FIREWALL\",\"awsNetworkFirewallConfig\":{\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",\"priority\":1}],\"networkFirewallStatelessDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessFragmentDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessCustomActions\":[{\"actionName\":\"customActionName\",\"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"metricdimensionvalue\"}]}}}],\"networkFirewallStatefulRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\"}],\"networkFirewallLoggingConfiguration\":{\"logDestinationConfigs\":[{\"logDestinationType\":\"S3\",\"logType\":\"ALERT\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}},{\"logDestinationType\":\"S3\",\"logType\":\"FLOW\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}}],\"overrideExistingConfig\":true}},\"firewallDeploymentModel\":{\"centralizedFirewallDeploymentModel\":{\"centralizedFirewallOrchestrationConfig\":{\"inspectionVpcIds\":[{\"resourceId\":\"vpc-1234\",\"accountId\":\"123456789011\"}],\"firewallCreationConfig\":{\"endpointLocation\":{\"availabilityZoneConfigList\":[{\"availabilityZoneId\":null,\"availabilityZoneName\":\"us-east-1a\",\"allowedIPV4CidrList\":[\"10.0.0.0/28\"]}]}},\"allowedIPV4CidrList\":[]}}}}" To use the centralized deployment model, you must set PolicyOption to CENTRALIZED. Example: NETWORK_FIREWALL - Distributed deployment model with automatic Availability Zone configuration "{\"type\":\"NETWORK_FIREWALL\",\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",\"priority\":1}],\"networkFirewallStatelessDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessFragmentDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessCustomActions\":[{\"actionName\":\"customActionName\",\"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"metricdimensionvalue\"}]}}}],\"networkFirewallStatefulRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\"}],\"networkFirewallOrchestrationConfig\":{\"singleFirewallEndpointPerVPC\":false,\"allowedIPV4CidrList\":[\"10.0.0.0/28\",\"192.168.0.0/28\"],\"routeManagementAction\":\"OFF\"},\"networkFirewallLoggingConfiguration\":{\"logDestinationConfigs\":[{\"logDestinationType\":\"S3\",\"logType\":\"ALERT\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}},{\"logDestinationType\":\"S3\",\"logType\":\"FLOW\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}}],\"overrideExistingConfig\":true}}" With automatic Availbility Zone configuration, Firewall Manager chooses which Availability Zones to create the endpoints in. To use the distributed deployment model, you must set PolicyOption to NULL. Example: NETWORK_FIREWALL - Distributed deployment model with automatic Availability Zone configuration and route management "{\"type\":\"NETWORK_FIREWALL\",\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",\"priority\":1}],\"networkFirewallStatelessDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessFragmentDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessCustomActions\":[{\"actionName\":\"customActionName\",\"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"metricdimensionvalue\"}]}}}],\"networkFirewallStatefulRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\"}],\"networkFirewallOrchestrationConfig\":{\"singleFirewallEndpointPerVPC\":false,\"allowedIPV4CidrList\":[\"10.0.0.0/28\",\"192.168.0.0/28\"],\"routeManagementAction\":\"MONITOR\",\"routeManagementTargetTypes\":[\"InternetGateway\"]},\"networkFirewallLoggingConfiguration\":{\"logDestinationConfigs\":[{\"logDestinationType\":\"S3\",\"logType\":\"ALERT\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}},{\"logDestinationType\":\"S3\",\"logType\": \"FLOW\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}}],\"overrideExistingConfig\":true}}" To use the distributed deployment model, you must set PolicyOption to NULL. Example: NETWORK_FIREWALL - Distributed deployment model with custom Availability Zone configuration "{\"type\":\"NETWORK_FIREWALL\",\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",\"priority\":1}],\"networkFirewallStatelessDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessFragmentDefaultActions\":[\"aws:forward_to_sfe\",\"fragmentcustomactionname\"],\"networkFirewallStatelessCustomActions\":[{\"actionName\":\"customActionName\", \"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"metricdimensionvalue\"}]}}},{\"actionName\":\"fragmentcustomactionname\",\"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"fragmentmetricdimensionvalue\"}]}}}],\"networkFirewallStatefulRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\"}],\"networkFirewallOrchestrationConfig\":{\"firewallCreationConfig\":{ \"endpointLocation\":{\"availabilityZoneConfigList\":[{\"availabilityZoneName\":\"us-east-1a\",\"allowedIPV4CidrList\":[\"10.0.0.0/28\"]},{\"availabilityZoneName\":\"us-east-1b\",\"allowedIPV4CidrList\":[ \"10.0.0.0/28\"]}]} },\"singleFirewallEndpointPerVPC\":false,\"allowedIPV4CidrList\":null,\"routeManagementAction\":\"OFF\",\"networkFirewallLoggingConfiguration\":{\"logDestinationConfigs\":[{\"logDestinationType\":\"S3\",\"logType\":\"ALERT\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}},{\"logDestinationType\":\"S3\",\"logType\":\"FLOW\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}}],\"overrideExistingConfig\":boolean}}" With custom Availability Zone configuration, you define which specific Availability Zones to create endpoints in by configuring firewallCreationConfig. To configure the Availability Zones in firewallCreationConfig, specify either the availabilityZoneName or availabilityZoneId parameter, not both parameters. To use the distributed deployment model, you must set PolicyOption to NULL. Example: NETWORK_FIREWALL - Distributed deployment model with custom Availability Zone configuration and route management "{\"type\":\"NETWORK_FIREWALL\",\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",\"priority\":1}],\"networkFirewallStatelessDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessFragmentDefaultActions\":[\"aws:forward_to_sfe\",\"fragmentcustomactionname\"],\"networkFirewallStatelessCustomActions\":[{\"actionName\":\"customActionName\",\"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"metricdimensionvalue\"}]}}},{\"actionName\":\"fragmentcustomactionname\",\"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"fragmentmetricdimensionvalue\"}]}}}],\"networkFirewallStatefulRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\"}],\"networkFirewallOrchestrationConfig\":{\"firewallCreationConfig\":{\"endpointLocation\":{\"availabilityZoneConfigList\":[{\"availabilityZoneName\":\"us-east-1a\",\"allowedIPV4CidrList\":[\"10.0.0.0/28\"]},{\"availabilityZoneName\":\"us-east-1b\",\"allowedIPV4CidrList\":[\"10.0.0.0/28\"]}]}},\"singleFirewallEndpointPerVPC\":false,\"allowedIPV4CidrList\":null,\"routeManagementAction\":\"MONITOR\",\"routeManagementTargetTypes\":[\"InternetGateway\"],\"routeManagementConfig\":{\"allowCrossAZTrafficIfNoEndpoint\":true}},\"networkFirewallLoggingConfiguration\":{\"logDestinationConfigs\":[{\"logDestinationType\":\"S3\",\"logType\":\"ALERT\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}},{\"logDestinationType\":\"S3\",\"logType\":\"FLOW\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}}],\"overrideExistingConfig\":boolean}}" To use the distributed deployment model, you must set PolicyOption to NULL. Example: THIRD_PARTY_FIREWALL "{ "type":"THIRD_PARTY_FIREWALL", "thirdPartyFirewall":"PALO_ALTO_NETWORKS_CLOUD_NGFW", "thirdPartyFirewallConfig":{ "thirdPartyFirewallPolicyList":["global-1"] }, "firewallDeploymentModel":{ "distributedFirewallDeploymentModel":{ "distributedFirewallOrchestrationConfig":{ "firewallCreationConfig":{ "endpointLocation":{ "availabilityZoneConfigList":[ { "availabilityZoneName":"${AvailabilityZone}" } ] } }, "allowedIPV4CidrList":[ ] } } } }" Specification for SHIELD_ADVANCED for Amazon CloudFront distributions "{\"type\":\"SHIELD_ADVANCED\",\"automaticResponseConfiguration\": {\"automaticResponseStatus\":\"ENABLED|IGNORED|DISABLED\", \"automaticResponseAction\":\"BLOCK|COUNT\"}, \"overrideCustomerWebaclClassic\":true|false}" For example: "{\"type\":\"SHIELD_ADVANCED\",\"automaticResponseConfiguration\": {\"automaticResponseStatus\":\"ENABLED\", \"automaticResponseAction\":\"COUNT\"}}" The default value for automaticResponseStatus is IGNORED. The value for automaticResponseAction is only required when automaticResponseStatus is set to ENABLED. The default value for overrideCustomerWebaclClassic is false. For other resource types that you can protect with a Shield Advanced policy, this ManagedServiceData configuration is an empty string. Example: WAFV2 "{\"type\":\"WAFV2\",\"preProcessRuleGroups\":[{\"ruleGroupArn\":null,\"overrideAction\":{\"type\":\"NONE\"},\"managedRuleGroupIdentifier\":{\"version\":null,\"vendorName\":\"AWS\",\"managedRuleGroupName\":\"AWSManagedRulesAmazonIpReputationList\"},\"ruleGroupType\":\"ManagedRuleGroup\",\"excludeRules\":[{\"name\":\"NoUserAgent_HEADER\"}]}],\"postProcessRuleGroups\":[],\"defaultAction\":{\"type\":\"ALLOW\"},\"overrideCustomerWebACLAssociation\":false,\"loggingConfiguration\":{\"logDestinationConfigs\":[\"arn:aws:firehose:us-west-2:12345678912:deliverystream/aws-waf-logs-fms-admin-destination\"],\"redactedFields\":[{\"redactedFieldType\":\"SingleHeader\",\"redactedFieldValue\":\"Cookies\"},{\"redactedFieldType\":\"Method\"}]}}" In the loggingConfiguration, you can specify one logDestinationConfigs, you can optionally provide up to 20 redactedFields, and the RedactedFieldType must be one of URI, QUERY_STRING, HEADER, or METHOD. Example: WAF Classic "{\"type\": \"WAF\", \"ruleGroups\": [{\"id\":\"12345678-1bcd-9012-efga-0987654321ab\", \"overrideAction\" : {\"type\": \"COUNT\"}}], \"defaultAction\": {\"type\": \"BLOCK\"}}" Example: WAFV2 - Firewall Manager support for WAF managed rule group versioning "{\"type\":\"WAFV2\",\"preProcessRuleGroups\":[{\"ruleGroupArn\":null,\"overrideAction\":{\"type\":\"NONE\"},\"managedRuleGroupIdentifier\":{\"versionEnabled\":true,\"version\":\"Version_2.0\",\"vendorName\":\"AWS\",\"managedRuleGroupName\":\"AWSManagedRulesCommonRuleSet\"},\"ruleGroupType\":\"ManagedRuleGroup\",\"excludeRules\":[{\"name\":\"NoUserAgent_HEADER\"}]}],\"postProcessRuleGroups\":[],\"defaultAction\":{\"type\":\"ALLOW\"},\"overrideCustomerWebACLAssociation\":false,\"loggingConfiguration\":{\"logDestinationConfigs\":[\"arn:aws:firehose:us-west-2:12345678912:deliverystream/aws-waf-logs-fms-admin-destination\"],\"redactedFields\":[{\"redactedFieldType\":\"SingleHeader\",\"redactedFieldValue\":\"Cookies\"},{\"redactedFieldType\":\"Method\"}]}}" To use a specific version of a WAF managed rule group in your Firewall Manager policy, you must set versionEnabled to true, and set version to the version you'd like to use. If you don't set versionEnabled to true, or if you omit versionEnabled, then Firewall Manager uses the default version of the WAF managed rule group. Example: SECURITY_GROUPS_COMMON "{\"type\":\"SECURITY_GROUPS_COMMON\",\"revertManualSecurityGroupChanges\":false,\"exclusiveResourceSecurityGroupManagement\":false, \"applyToAllEC2InstanceENIs\":false,\"securityGroups\":[{\"id\":\" sg-000e55995d61a06bd\"}]}" Example: SECURITY_GROUPS_COMMON - Security group tag distribution ""{\"type\":\"SECURITY_GROUPS_COMMON\",\"securityGroups\":[{\"id\":\"sg-000e55995d61a06bd\"}],\"revertManualSecurityGroupChanges\":true,\"exclusiveResourceSecurityGroupManagement\":false,\"applyToAllEC2InstanceENIs\":false,\"includeSharedVPC\":false,\"enableTagDistribution\":true}"" Firewall Manager automatically distributes tags from the primary group to the security groups created by this policy. To use security group tag distribution, you must also set revertManualSecurityGroupChanges to true, otherwise Firewall Manager won't be able to create the policy. When you enable revertManualSecurityGroupChanges, Firewall Manager identifies and reports when the security groups created by this policy become non-compliant. Firewall Manager won't distrubute system tags added by Amazon Web Services services into the replica security groups. System tags begin with the aws: prefix. Example: Shared VPCs. Apply the preceding policy to resources in shared VPCs as well as to those in VPCs that the account owns "{\"type\":\"SECURITY_GROUPS_COMMON\",\"revertManualSecurityGroupChanges\":false,\"exclusiveResourceSecurityGroupManagement\":false, \"applyToAllEC2InstanceENIs\":false,\"includeSharedVPC\":true,\"securityGroups\":[{\"id\":\" sg-000e55995d61a06bd\"}]}" Example: SECURITY_GROUPS_CONTENT_AUDIT "{\"type\":\"SECURITY_GROUPS_CONTENT_AUDIT\",\"securityGroups\":[{\"id\":\"sg-000e55995d61a06bd\"}],\"securityGroupAction\":{\"type\":\"ALLOW\"}}" The security group action for content audit can be ALLOW or DENY. For ALLOW, all in-scope security group rules must be within the allowed range of the policy's security group rules. For DENY, all in-scope security group rules must not contain a value or a range that matches a rule value or range in the policy security group. Example: SECURITY_GROUPS_USAGE_AUDIT "{\"type\":\"SECURITY_GROUPS_USAGE_AUDIT\",\"deleteUnusedSecurityGroups\":true,\"coalesceRedundantSecurityGroups\":true}"
|
|
1992
|
+
* Details about the service that are specific to the service type, in JSON format. Example: DNS_FIREWALL "{\"type\":\"DNS_FIREWALL\",\"preProcessRuleGroups\":[{\"ruleGroupId\":\"rslvr-frg-1\",\"priority\":10}],\"postProcessRuleGroups\":[{\"ruleGroupId\":\"rslvr-frg-2\",\"priority\":9911}]}" Valid values for preProcessRuleGroups are between 1 and 99. Valid values for postProcessRuleGroups are between 9901 and 10000. Example: NETWORK_FIREWALL - Centralized deployment model "{\"type\":\"NETWORK_FIREWALL\",\"awsNetworkFirewallConfig\":{\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",\"priority\":1}],\"networkFirewallStatelessDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessFragmentDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessCustomActions\":[{\"actionName\":\"customActionName\",\"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"metricdimensionvalue\"}]}}}],\"networkFirewallStatefulRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\"}],\"networkFirewallLoggingConfiguration\":{\"logDestinationConfigs\":[{\"logDestinationType\":\"S3\",\"logType\":\"ALERT\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}},{\"logDestinationType\":\"S3\",\"logType\":\"FLOW\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}}],\"overrideExistingConfig\":true}},\"firewallDeploymentModel\":{\"centralizedFirewallDeploymentModel\":{\"centralizedFirewallOrchestrationConfig\":{\"inspectionVpcIds\":[{\"resourceId\":\"vpc-1234\",\"accountId\":\"123456789011\"}],\"firewallCreationConfig\":{\"endpointLocation\":{\"availabilityZoneConfigList\":[{\"availabilityZoneId\":null,\"availabilityZoneName\":\"us-east-1a\",\"allowedIPV4CidrList\":[\"10.0.0.0/28\"]}]}},\"allowedIPV4CidrList\":[]}}}}" To use the centralized deployment model, you must set PolicyOption to CENTRALIZED. Example: NETWORK_FIREWALL - Distributed deployment model with automatic Availability Zone configuration "{\"type\":\"NETWORK_FIREWALL\",\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",\"priority\":1}],\"networkFirewallStatelessDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessFragmentDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessCustomActions\":[{\"actionName\":\"customActionName\",\"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"metricdimensionvalue\"}]}}}],\"networkFirewallStatefulRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\"}],\"networkFirewallOrchestrationConfig\":{\"singleFirewallEndpointPerVPC\":false,\"allowedIPV4CidrList\":[\"10.0.0.0/28\",\"192.168.0.0/28\"],\"routeManagementAction\":\"OFF\"},\"networkFirewallLoggingConfiguration\":{\"logDestinationConfigs\":[{\"logDestinationType\":\"S3\",\"logType\":\"ALERT\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}},{\"logDestinationType\":\"S3\",\"logType\":\"FLOW\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}}],\"overrideExistingConfig\":true}}" With automatic Availbility Zone configuration, Firewall Manager chooses which Availability Zones to create the endpoints in. To use the distributed deployment model, you must set PolicyOption to NULL. Example: NETWORK_FIREWALL - Distributed deployment model with automatic Availability Zone configuration and route management "{\"type\":\"NETWORK_FIREWALL\",\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",\"priority\":1}],\"networkFirewallStatelessDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessFragmentDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessCustomActions\":[{\"actionName\":\"customActionName\",\"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"metricdimensionvalue\"}]}}}],\"networkFirewallStatefulRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\"}],\"networkFirewallOrchestrationConfig\":{\"singleFirewallEndpointPerVPC\":false,\"allowedIPV4CidrList\":[\"10.0.0.0/28\",\"192.168.0.0/28\"],\"routeManagementAction\":\"MONITOR\",\"routeManagementTargetTypes\":[\"InternetGateway\"]},\"networkFirewallLoggingConfiguration\":{\"logDestinationConfigs\":[{\"logDestinationType\":\"S3\",\"logType\":\"ALERT\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}},{\"logDestinationType\":\"S3\",\"logType\": \"FLOW\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}}],\"overrideExistingConfig\":true}}" To use the distributed deployment model, you must set PolicyOption to NULL. Example: NETWORK_FIREWALL - Distributed deployment model with custom Availability Zone configuration "{\"type\":\"NETWORK_FIREWALL\",\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",\"priority\":1}],\"networkFirewallStatelessDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessFragmentDefaultActions\":[\"aws:forward_to_sfe\",\"fragmentcustomactionname\"],\"networkFirewallStatelessCustomActions\":[{\"actionName\":\"customActionName\", \"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"metricdimensionvalue\"}]}}},{\"actionName\":\"fragmentcustomactionname\",\"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"fragmentmetricdimensionvalue\"}]}}}],\"networkFirewallStatefulRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\"}],\"networkFirewallOrchestrationConfig\":{\"firewallCreationConfig\":{ \"endpointLocation\":{\"availabilityZoneConfigList\":[{\"availabilityZoneName\":\"us-east-1a\",\"allowedIPV4CidrList\":[\"10.0.0.0/28\"]},{\"availabilityZoneName\":\"us-east-1b\",\"allowedIPV4CidrList\":[ \"10.0.0.0/28\"]}]} },\"singleFirewallEndpointPerVPC\":false,\"allowedIPV4CidrList\":null,\"routeManagementAction\":\"OFF\",\"networkFirewallLoggingConfiguration\":{\"logDestinationConfigs\":[{\"logDestinationType\":\"S3\",\"logType\":\"ALERT\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}},{\"logDestinationType\":\"S3\",\"logType\":\"FLOW\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}}],\"overrideExistingConfig\":boolean}}" With custom Availability Zone configuration, you define which specific Availability Zones to create endpoints in by configuring firewallCreationConfig. To configure the Availability Zones in firewallCreationConfig, specify either the availabilityZoneName or availabilityZoneId parameter, not both parameters. To use the distributed deployment model, you must set PolicyOption to NULL. Example: NETWORK_FIREWALL - Distributed deployment model with custom Availability Zone configuration and route management "{\"type\":\"NETWORK_FIREWALL\",\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",\"priority\":1}],\"networkFirewallStatelessDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessFragmentDefaultActions\":[\"aws:forward_to_sfe\",\"fragmentcustomactionname\"],\"networkFirewallStatelessCustomActions\":[{\"actionName\":\"customActionName\",\"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"metricdimensionvalue\"}]}}},{\"actionName\":\"fragmentcustomactionname\",\"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"fragmentmetricdimensionvalue\"}]}}}],\"networkFirewallStatefulRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\"}],\"networkFirewallOrchestrationConfig\":{\"firewallCreationConfig\":{\"endpointLocation\":{\"availabilityZoneConfigList\":[{\"availabilityZoneName\":\"us-east-1a\",\"allowedIPV4CidrList\":[\"10.0.0.0/28\"]},{\"availabilityZoneName\":\"us-east-1b\",\"allowedIPV4CidrList\":[\"10.0.0.0/28\"]}]}},\"singleFirewallEndpointPerVPC\":false,\"allowedIPV4CidrList\":null,\"routeManagementAction\":\"MONITOR\",\"routeManagementTargetTypes\":[\"InternetGateway\"],\"routeManagementConfig\":{\"allowCrossAZTrafficIfNoEndpoint\":true}},\"networkFirewallLoggingConfiguration\":{\"logDestinationConfigs\":[{\"logDestinationType\":\"S3\",\"logType\":\"ALERT\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}},{\"logDestinationType\":\"S3\",\"logType\":\"FLOW\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}}],\"overrideExistingConfig\":boolean}}" To use the distributed deployment model, you must set PolicyOption to NULL. Example: THIRD_PARTY_FIREWALL "{ "type":"THIRD_PARTY_FIREWALL", "thirdPartyFirewall":"PALO_ALTO_NETWORKS_CLOUD_NGFW", "thirdPartyFirewallConfig":{ "thirdPartyFirewallPolicyList":["global-1"] }, "firewallDeploymentModel":{ "distributedFirewallDeploymentModel":{ "distributedFirewallOrchestrationConfig":{ "firewallCreationConfig":{ "endpointLocation":{ "availabilityZoneConfigList":[ { "availabilityZoneName":"${AvailabilityZone}" } ] } }, "allowedIPV4CidrList":[ ] } } } }" Example: SECURITY_GROUPS_COMMON "{\"type\":\"SECURITY_GROUPS_COMMON\",\"revertManualSecurityGroupChanges\":false,\"exclusiveResourceSecurityGroupManagement\":false, \"applyToAllEC2InstanceENIs\":false,\"securityGroups\":[{\"id\":\" sg-000e55995d61a06bd\"}]}" Example: SECURITY_GROUPS_COMMON - Security group tag distribution ""{\"type\":\"SECURITY_GROUPS_COMMON\",\"securityGroups\":[{\"id\":\"sg-000e55995d61a06bd\"}],\"revertManualSecurityGroupChanges\":true,\"exclusiveResourceSecurityGroupManagement\":false,\"applyToAllEC2InstanceENIs\":false,\"includeSharedVPC\":false,\"enableTagDistribution\":true}"" Firewall Manager automatically distributes tags from the primary group to the security groups created by this policy. To use security group tag distribution, you must also set revertManualSecurityGroupChanges to true, otherwise Firewall Manager won't be able to create the policy. When you enable revertManualSecurityGroupChanges, Firewall Manager identifies and reports when the security groups created by this policy become non-compliant. Firewall Manager won't distrubute system tags added by Amazon Web Services services into the replica security groups. System tags begin with the aws: prefix. Example: Shared VPCs. Apply the preceding policy to resources in shared VPCs as well as to those in VPCs that the account owns "{\"type\":\"SECURITY_GROUPS_COMMON\",\"revertManualSecurityGroupChanges\":false,\"exclusiveResourceSecurityGroupManagement\":false, \"applyToAllEC2InstanceENIs\":false,\"includeSharedVPC\":true,\"securityGroups\":[{\"id\":\" sg-000e55995d61a06bd\"}]}" Example: SECURITY_GROUPS_CONTENT_AUDIT "{\"type\":\"SECURITY_GROUPS_CONTENT_AUDIT\",\"securityGroups\":[{\"id\":\"sg-000e55995d61a06bd\"}],\"securityGroupAction\":{\"type\":\"ALLOW\"}}" The security group action for content audit can be ALLOW or DENY. For ALLOW, all in-scope security group rules must be within the allowed range of the policy's security group rules. For DENY, all in-scope security group rules must not contain a value or a range that matches a rule value or range in the policy security group. Example: SECURITY_GROUPS_USAGE_AUDIT "{\"type\":\"SECURITY_GROUPS_USAGE_AUDIT\",\"deleteUnusedSecurityGroups\":true,\"coalesceRedundantSecurityGroups\":true}" Specification for SHIELD_ADVANCED for Amazon CloudFront distributions "{\"type\":\"SHIELD_ADVANCED\",\"automaticResponseConfiguration\": {\"automaticResponseStatus\":\"ENABLED|IGNORED|DISABLED\", \"automaticResponseAction\":\"BLOCK|COUNT\"}, \"overrideCustomerWebaclClassic\":true|false}" For example: "{\"type\":\"SHIELD_ADVANCED\",\"automaticResponseConfiguration\": {\"automaticResponseStatus\":\"ENABLED\", \"automaticResponseAction\":\"COUNT\"}}" The default value for automaticResponseStatus is IGNORED. The value for automaticResponseAction is only required when automaticResponseStatus is set to ENABLED. The default value for overrideCustomerWebaclClassic is false. For other resource types that you can protect with a Shield Advanced policy, this ManagedServiceData configuration is an empty string. Example: WAFV2 "{\"type\":\"WAFV2\",\"preProcessRuleGroups\":[{\"ruleGroupArn\":null,\"overrideAction\":{\"type\":\"NONE\"},\"managedRuleGroupIdentifier\":{\"version\":null,\"vendorName\":\"AWS\",\"managedRuleGroupName\":\"AWSManagedRulesAmazonIpReputationList\"},\"ruleGroupType\":\"ManagedRuleGroup\",\"excludeRules\":[{\"name\":\"NoUserAgent_HEADER\"}]}],\"postProcessRuleGroups\":[],\"defaultAction\":{\"type\":\"ALLOW\"},\"overrideCustomerWebACLAssociation\":false,\"loggingConfiguration\":{\"logDestinationConfigs\":[\"arn:aws:firehose:us-west-2:12345678912:deliverystream/aws-waf-logs-fms-admin-destination\"],\"redactedFields\":[{\"redactedFieldType\":\"SingleHeader\",\"redactedFieldValue\":\"Cookies\"},{\"redactedFieldType\":\"Method\"}]}}" In the loggingConfiguration, you can specify one logDestinationConfigs, you can optionally provide up to 20 redactedFields, and the RedactedFieldType must be one of URI, QUERY_STRING, HEADER, or METHOD. Example: WAFV2 - Firewall Manager support for WAF managed rule group versioning "{\"type\":\"WAFV2\",\"preProcessRuleGroups\":[{\"ruleGroupArn\":null,\"overrideAction\":{\"type\":\"NONE\"},\"managedRuleGroupIdentifier\":{\"versionEnabled\":true,\"version\":\"Version_2.0\",\"vendorName\":\"AWS\",\"managedRuleGroupName\":\"AWSManagedRulesCommonRuleSet\"},\"ruleGroupType\":\"ManagedRuleGroup\",\"excludeRules\":[{\"name\":\"NoUserAgent_HEADER\"}]}],\"postProcessRuleGroups\":[],\"defaultAction\":{\"type\":\"ALLOW\"},\"overrideCustomerWebACLAssociation\":false,\"loggingConfiguration\":{\"logDestinationConfigs\":[\"arn:aws:firehose:us-west-2:12345678912:deliverystream/aws-waf-logs-fms-admin-destination\"],\"redactedFields\":[{\"redactedFieldType\":\"SingleHeader\",\"redactedFieldValue\":\"Cookies\"},{\"redactedFieldType\":\"Method\"}]}}" To use a specific version of a WAF managed rule group in your Firewall Manager policy, you must set versionEnabled to true, and set version to the version you'd like to use. If you don't set versionEnabled to true, or if you omit versionEnabled, then Firewall Manager uses the default version of the WAF managed rule group. Example: WAF Classic "{\"type\": \"WAF\", \"ruleGroups\": [{\"id\":\"12345678-1bcd-9012-efga-0987654321ab\", \"overrideAction\" : {\"type\": \"COUNT\"}}], \"defaultAction\": {\"type\": \"BLOCK\"}}"
|
|
1986
1993
|
*/
|
|
1987
1994
|
ManagedServiceData?: ManagedServiceData;
|
|
1988
1995
|
/**
|
|
@@ -2010,6 +2017,10 @@ declare namespace FMS {
|
|
|
2010
2017
|
* An integer setting that indicates the order in which to run the stateful rule groups in a single Network Firewall firewall policy. This setting only applies to firewall policies that specify the STRICT_ORDER rule order in the stateful engine options settings. Network Firewall evalutes each stateful rule group against a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy. For information about You can change the priority settings of your rule groups at any time. To make it easier to insert rule groups later, number them so there's a wide range in between, for example use 100, 200, and so on.
|
|
2011
2018
|
*/
|
|
2012
2019
|
Priority?: PriorityNumber;
|
|
2020
|
+
/**
|
|
2021
|
+
* The action that allows the policy owner to override the behavior of the rule group within a policy.
|
|
2022
|
+
*/
|
|
2023
|
+
Override?: NetworkFirewallStatefulRuleGroupOverride;
|
|
2013
2024
|
}
|
|
2014
2025
|
export type StatefulRuleGroupList = StatefulRuleGroup[];
|
|
2015
2026
|
export interface StatelessRuleGroup {
|
|
@@ -3281,6 +3281,14 @@ declare namespace Glue {
|
|
|
3281
3281
|
* Enables the processing of files that contain only one column.
|
|
3282
3282
|
*/
|
|
3283
3283
|
AllowSingleColumn?: NullableBoolean;
|
|
3284
|
+
/**
|
|
3285
|
+
* Enables the configuration of custom datatypes.
|
|
3286
|
+
*/
|
|
3287
|
+
CustomDatatypeConfigured?: NullableBoolean;
|
|
3288
|
+
/**
|
|
3289
|
+
* Creates a list of supported custom datatypes.
|
|
3290
|
+
*/
|
|
3291
|
+
CustomDatatypes?: CustomDatatypes;
|
|
3284
3292
|
}
|
|
3285
3293
|
export interface CreateCustomEntityTypeRequest {
|
|
3286
3294
|
/**
|
|
@@ -4087,6 +4095,14 @@ declare namespace Glue {
|
|
|
4087
4095
|
* Enables the processing of files that contain only one column.
|
|
4088
4096
|
*/
|
|
4089
4097
|
AllowSingleColumn?: NullableBoolean;
|
|
4098
|
+
/**
|
|
4099
|
+
* Enables the custom datatype to be configured.
|
|
4100
|
+
*/
|
|
4101
|
+
CustomDatatypeConfigured?: NullableBoolean;
|
|
4102
|
+
/**
|
|
4103
|
+
* A list of custom datatypes including "BINARY", "BOOLEAN", "DATE", "DECIMAL", "DOUBLE", "FLOAT", "INT", "LONG", "SHORT", "STRING", "TIMESTAMP".
|
|
4104
|
+
*/
|
|
4105
|
+
CustomDatatypes?: CustomDatatypes;
|
|
4090
4106
|
}
|
|
4091
4107
|
export type CsvColumnDelimiter = string;
|
|
4092
4108
|
export type CsvHeader = NameString[];
|
|
@@ -4114,6 +4130,7 @@ declare namespace Glue {
|
|
|
4114
4130
|
*/
|
|
4115
4131
|
OutputSchemas?: GlueSchemas;
|
|
4116
4132
|
}
|
|
4133
|
+
export type CustomDatatypes = NameString[];
|
|
4117
4134
|
export interface CustomEntityType {
|
|
4118
4135
|
/**
|
|
4119
4136
|
* A name for the custom pattern that allows it to be retrieved or deleted later. This name must be unique per Amazon Web Services account.
|
|
@@ -11029,6 +11046,14 @@ declare namespace Glue {
|
|
|
11029
11046
|
* Enables the processing of files that contain only one column.
|
|
11030
11047
|
*/
|
|
11031
11048
|
AllowSingleColumn?: NullableBoolean;
|
|
11049
|
+
/**
|
|
11050
|
+
* Specifies the configuration of custom datatypes.
|
|
11051
|
+
*/
|
|
11052
|
+
CustomDatatypeConfigured?: NullableBoolean;
|
|
11053
|
+
/**
|
|
11054
|
+
* Specifies a list of supported custom datatypes.
|
|
11055
|
+
*/
|
|
11056
|
+
CustomDatatypes?: CustomDatatypes;
|
|
11032
11057
|
}
|
|
11033
11058
|
export interface UpdateDatabaseRequest {
|
|
11034
11059
|
/**
|
|
@@ -377,6 +377,10 @@ declare namespace MediaTailor {
|
|
|
377
377
|
* This defines the SCTE-35 splice_insert() message inserted around the ad. For information about using splice_insert(), see the SCTE-35 specficiaiton, section 9.7.3.1.
|
|
378
378
|
*/
|
|
379
379
|
SpliceInsertMessage?: SpliceInsertMessage;
|
|
380
|
+
/**
|
|
381
|
+
* Defines the SCTE-35 time_signal message inserted around the ad. Programs on a channel's schedule can be configured with one or more ad breaks. You can attach a splice_insert SCTE-35 message to the ad break. This message provides basic metadata about the ad break. See section 9.7.4 of the 2022 SCTE-35 specification for more information.
|
|
382
|
+
*/
|
|
383
|
+
TimeSignalMessage?: TimeSignalMessage;
|
|
380
384
|
}
|
|
381
385
|
export interface AdMarkerPassthrough {
|
|
382
386
|
/**
|
|
@@ -1396,6 +1400,7 @@ declare namespace MediaTailor {
|
|
|
1396
1400
|
Type: Type;
|
|
1397
1401
|
}
|
|
1398
1402
|
export type HttpPackageConfigurations = HttpPackageConfiguration[];
|
|
1403
|
+
export type Integer = number;
|
|
1399
1404
|
export interface ListAlertsRequest {
|
|
1400
1405
|
/**
|
|
1401
1406
|
* The maximum number of alerts that you want MediaTailor to return in response to the current request. If there are more than MaxResults alerts, use the value of NextToken in the response to get the next page of results.
|
|
@@ -1621,7 +1626,7 @@ declare namespace MediaTailor {
|
|
|
1621
1626
|
AdMarkerPassthrough?: AdMarkerPassthrough;
|
|
1622
1627
|
}
|
|
1623
1628
|
export type MaxResults = number;
|
|
1624
|
-
export type MessageType = "SPLICE_INSERT"|string;
|
|
1629
|
+
export type MessageType = "SPLICE_INSERT"|"TIME_SIGNAL"|string;
|
|
1625
1630
|
export type Mode = "OFF"|"BEHIND_LIVE_EDGE"|string;
|
|
1626
1631
|
export type Operator = "EQUALS"|string;
|
|
1627
1632
|
export type OriginManifestType = "SINGLE_PERIOD"|"MULTI_PERIOD"|string;
|
|
@@ -2040,6 +2045,41 @@ declare namespace MediaTailor {
|
|
|
2040
2045
|
*/
|
|
2041
2046
|
Name?: __string;
|
|
2042
2047
|
}
|
|
2048
|
+
export interface SegmentationDescriptor {
|
|
2049
|
+
/**
|
|
2050
|
+
* The segment number to assign to the segmentation_descriptor.segment_num message, as defined in section 10.3.3.1 of the 2022 SCTE-35 specification Values must be between 0 and 256, inclusive. The default value is 0.
|
|
2051
|
+
*/
|
|
2052
|
+
SegmentNum?: Integer;
|
|
2053
|
+
/**
|
|
2054
|
+
* The Event Identifier to assign to the segmentation_descriptor.segmentation_event_id message, as defined in section 10.3.3.1 of the 2022 SCTE-35 specification. The default value is 1.
|
|
2055
|
+
*/
|
|
2056
|
+
SegmentationEventId?: Integer;
|
|
2057
|
+
/**
|
|
2058
|
+
* The Type Identifier to assign to the segmentation_descriptor.segmentation_type_id message, as defined in section 10.3.3.1 of the 2022 SCTE-35 specification. Values must be between 0 and 256, inclusive. The default value is 48.
|
|
2059
|
+
*/
|
|
2060
|
+
SegmentationTypeId?: Integer;
|
|
2061
|
+
/**
|
|
2062
|
+
* The Upid to assign to the segmentation_descriptor.segmentation_upid message, as defined in section 10.3.3.1 of the 2022 SCTE-35 specification. The value must be a hexadecimal string containing only the characters 0 though 9 and A through F. The default value is "" (an empty string).
|
|
2063
|
+
*/
|
|
2064
|
+
SegmentationUpid?: String;
|
|
2065
|
+
/**
|
|
2066
|
+
* The Upid Type to assign to the segmentation_descriptor.segmentation_upid_type message, as defined in section 10.3.3.1 of the 2022 SCTE-35 specification. Values must be between 0 and 256, inclusive. The default value is 14.
|
|
2067
|
+
*/
|
|
2068
|
+
SegmentationUpidType?: Integer;
|
|
2069
|
+
/**
|
|
2070
|
+
* The number of segments expected, which is assigned to the segmentation_descriptor.segments_expectedS message, as defined in section 10.3.3.1 of the 2022 SCTE-35 specification Values must be between 0 and 256, inclusive. The default value is 0.
|
|
2071
|
+
*/
|
|
2072
|
+
SegmentsExpected?: Integer;
|
|
2073
|
+
/**
|
|
2074
|
+
* The sub-segment number to assign to the segmentation_descriptor.sub_segment_num message, as defined in section 10.3.3.1 of the 2022 SCTE-35 specification. Values must be between 0 and 256, inclusive. The defualt value is null.
|
|
2075
|
+
*/
|
|
2076
|
+
SubSegmentNum?: Integer;
|
|
2077
|
+
/**
|
|
2078
|
+
* The number of sub-segments expected, which is assigned to the segmentation_descriptor.sub_segments_expected message, as defined in section 10.3.3.1 of the 2022 SCTE-35 specification. Values must be between 0 and 256, inclusive. The default value is null.
|
|
2079
|
+
*/
|
|
2080
|
+
SubSegmentsExpected?: Integer;
|
|
2081
|
+
}
|
|
2082
|
+
export type SegmentationDescriptorList = SegmentationDescriptor[];
|
|
2043
2083
|
export interface SlateSource {
|
|
2044
2084
|
/**
|
|
2045
2085
|
* The name of the source location where the slate VOD source is stored.
|
|
@@ -2122,6 +2162,7 @@ declare namespace MediaTailor {
|
|
|
2122
2162
|
}
|
|
2123
2163
|
export interface StopChannelResponse {
|
|
2124
2164
|
}
|
|
2165
|
+
export type String = string;
|
|
2125
2166
|
export interface TagResourceRequest {
|
|
2126
2167
|
/**
|
|
2127
2168
|
* The Amazon Resource Name (ARN) associated with the resource.
|
|
@@ -2133,6 +2174,12 @@ declare namespace MediaTailor {
|
|
|
2133
2174
|
Tags: __mapOf__string;
|
|
2134
2175
|
}
|
|
2135
2176
|
export type Tier = "BASIC"|"STANDARD"|string;
|
|
2177
|
+
export interface TimeSignalMessage {
|
|
2178
|
+
/**
|
|
2179
|
+
* The configurations for the SCTE-35 segmentation_descriptor message(s) sent with the time_signal message.
|
|
2180
|
+
*/
|
|
2181
|
+
SegmentationDescriptors?: SegmentationDescriptorList;
|
|
2182
|
+
}
|
|
2136
2183
|
export interface Transition {
|
|
2137
2184
|
/**
|
|
2138
2185
|
* The duration of the live program in seconds.
|
|
@@ -1870,7 +1870,7 @@ declare namespace Redshift {
|
|
|
1870
1870
|
*/
|
|
1871
1871
|
HsmConfigurationIdentifier?: String;
|
|
1872
1872
|
/**
|
|
1873
|
-
* The Elastic IP (EIP) address for the cluster. Constraints: The cluster must be provisioned in EC2-VPC and publicly-accessible through an Internet gateway. For more information about provisioning clusters in EC2-VPC, go to Supported Platforms to Launch Your Cluster in the Amazon Redshift Cluster Management Guide.
|
|
1873
|
+
* The Elastic IP (EIP) address for the cluster. Constraints: The cluster must be provisioned in EC2-VPC and publicly-accessible through an Internet gateway. Don't specify the Elastic IP address for a publicly accessible cluster with availability zone relocation turned on. For more information about provisioning clusters in EC2-VPC, go to Supported Platforms to Launch Your Cluster in the Amazon Redshift Cluster Management Guide.
|
|
1874
1874
|
*/
|
|
1875
1875
|
ElasticIp?: String;
|
|
1876
1876
|
/**
|
|
@@ -4864,7 +4864,7 @@ declare namespace Redshift {
|
|
|
4864
4864
|
*/
|
|
4865
4865
|
HsmConfigurationIdentifier?: String;
|
|
4866
4866
|
/**
|
|
4867
|
-
* The
|
|
4867
|
+
* The Elastic IP (EIP) address for the cluster. Don't specify the Elastic IP address for a publicly accessible cluster with availability zone relocation turned on.
|
|
4868
4868
|
*/
|
|
4869
4869
|
ElasticIp?: String;
|
|
4870
4870
|
/**
|