cdk-docker-image-deployment 0.0.75 → 0.0.77

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (85) hide show
  1. package/.jsii +3 -3
  2. package/lib/destination.js +1 -1
  3. package/lib/docker-image-deployment.js +1 -1
  4. package/lib/source.js +1 -1
  5. package/node_modules/aws-sdk/CHANGELOG.md +36 -1
  6. package/node_modules/aws-sdk/README.md +1 -1
  7. package/node_modules/aws-sdk/apis/appflow-2020-08-23.min.json +138 -47
  8. package/node_modules/aws-sdk/apis/appsync-2017-07-25.min.json +168 -68
  9. package/node_modules/aws-sdk/apis/auditmanager-2017-07-25.min.json +41 -27
  10. package/node_modules/aws-sdk/apis/{ssmsap-2018-05-10.examples.json → chime-sdk-voice-2022-08-03.examples.json} +0 -0
  11. package/node_modules/aws-sdk/apis/chime-sdk-voice-2022-08-03.min.json +2734 -0
  12. package/node_modules/aws-sdk/apis/chime-sdk-voice-2022-08-03.paginators.json +46 -0
  13. package/node_modules/aws-sdk/apis/cloudfront-2020-05-31.min.json +774 -409
  14. package/node_modules/aws-sdk/apis/connect-2017-08-08.min.json +185 -158
  15. package/node_modules/aws-sdk/apis/dms-2016-01-01.min.json +78 -55
  16. package/node_modules/aws-sdk/apis/ec2-2016-11-15.min.json +5 -1
  17. package/node_modules/aws-sdk/apis/emr-serverless-2021-07-13.min.json +20 -16
  18. package/node_modules/aws-sdk/apis/glue-2017-03-31.min.json +505 -501
  19. package/node_modules/aws-sdk/apis/iot-roborunner-2018-05-10.examples.json +5 -0
  20. package/node_modules/aws-sdk/apis/iot-roborunner-2018-05-10.min.json +923 -0
  21. package/node_modules/aws-sdk/apis/iot-roborunner-2018-05-10.paginators.json +28 -0
  22. package/node_modules/aws-sdk/apis/ivschat-2020-07-14.min.json +255 -18
  23. package/node_modules/aws-sdk/apis/ivschat-2020-07-14.paginators.json +5 -0
  24. package/node_modules/aws-sdk/apis/metadata.json +9 -0
  25. package/node_modules/aws-sdk/apis/personalize-2018-05-22.min.json +219 -25
  26. package/node_modules/aws-sdk/apis/personalize-2018-05-22.paginators.json +12 -0
  27. package/node_modules/aws-sdk/apis/quicksight-2018-04-01.min.json +321 -138
  28. package/node_modules/aws-sdk/apis/quicksight-2018-04-01.paginators.json +12 -0
  29. package/node_modules/aws-sdk/apis/rum-2018-05-10.min.json +20 -5
  30. package/node_modules/aws-sdk/apis/s3control-2018-08-20.min.json +51 -9
  31. package/node_modules/aws-sdk/apis/sagemaker-2017-07-24.min.json +263 -263
  32. package/node_modules/aws-sdk/apis/securityhub-2018-10-26.min.json +8 -2
  33. package/node_modules/aws-sdk/apis/servicecatalog-2015-12-10.min.json +183 -115
  34. package/node_modules/aws-sdk/apis/servicecatalog-appregistry-2020-06-24.min.json +54 -2
  35. package/node_modules/aws-sdk/apis/ssm-sap-2018-05-10.examples.json +5 -0
  36. package/node_modules/aws-sdk/apis/{ssmsap-2018-05-10.min.json → ssm-sap-2018-05-10.min.json} +2 -2
  37. package/node_modules/aws-sdk/apis/{ssmsap-2018-05-10.paginators.json → ssm-sap-2018-05-10.paginators.json} +0 -0
  38. package/node_modules/aws-sdk/apis/states-2016-11-23.min.json +17 -5
  39. package/node_modules/aws-sdk/apis/workspaces-2015-04-08.min.json +161 -84
  40. package/node_modules/aws-sdk/clients/all.d.ts +2 -0
  41. package/node_modules/aws-sdk/clients/all.js +2 -0
  42. package/node_modules/aws-sdk/clients/amplify.d.ts +4 -4
  43. package/node_modules/aws-sdk/clients/appflow.d.ts +125 -9
  44. package/node_modules/aws-sdk/clients/appsync.d.ts +133 -4
  45. package/node_modules/aws-sdk/clients/auditmanager.d.ts +50 -12
  46. package/node_modules/aws-sdk/clients/chimesdkvoice.d.ts +1401 -0
  47. package/node_modules/aws-sdk/clients/chimesdkvoice.js +18 -0
  48. package/node_modules/aws-sdk/clients/cloudfront.d.ts +300 -12
  49. package/node_modules/aws-sdk/clients/connect.d.ts +31 -1
  50. package/node_modules/aws-sdk/clients/dms.d.ts +51 -10
  51. package/node_modules/aws-sdk/clients/dynamodb.d.ts +7 -7
  52. package/node_modules/aws-sdk/clients/ec2.d.ts +28 -20
  53. package/node_modules/aws-sdk/clients/elbv2.d.ts +20 -20
  54. package/node_modules/aws-sdk/clients/emrserverless.d.ts +17 -0
  55. package/node_modules/aws-sdk/clients/glue.d.ts +9 -3
  56. package/node_modules/aws-sdk/clients/iotroborunner.d.ts +534 -0
  57. package/node_modules/aws-sdk/clients/iotroborunner.js +18 -0
  58. package/node_modules/aws-sdk/clients/ivschat.d.ts +322 -13
  59. package/node_modules/aws-sdk/clients/lambda.d.ts +12 -12
  60. package/node_modules/aws-sdk/clients/personalize.d.ts +267 -0
  61. package/node_modules/aws-sdk/clients/polly.d.ts +2 -2
  62. package/node_modules/aws-sdk/clients/quicksight.d.ts +230 -13
  63. package/node_modules/aws-sdk/clients/rum.d.ts +24 -5
  64. package/node_modules/aws-sdk/clients/s3control.d.ts +58 -16
  65. package/node_modules/aws-sdk/clients/sagemaker.d.ts +5 -1
  66. package/node_modules/aws-sdk/clients/secretsmanager.d.ts +7 -7
  67. package/node_modules/aws-sdk/clients/securityhub.d.ts +16 -0
  68. package/node_modules/aws-sdk/clients/servicecatalog.d.ts +141 -29
  69. package/node_modules/aws-sdk/clients/servicecatalogappregistry.d.ts +58 -7
  70. package/node_modules/aws-sdk/clients/ssmsap.d.ts +31 -31
  71. package/node_modules/aws-sdk/clients/ssmsap.js +2 -2
  72. package/node_modules/aws-sdk/clients/stepfunctions.d.ts +67 -52
  73. package/node_modules/aws-sdk/clients/sts.d.ts +18 -18
  74. package/node_modules/aws-sdk/clients/textract.d.ts +6 -6
  75. package/node_modules/aws-sdk/clients/transfer.d.ts +7 -7
  76. package/node_modules/aws-sdk/clients/workspaces.d.ts +115 -0
  77. package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +2 -2
  78. package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +106 -32
  79. package/node_modules/aws-sdk/dist/aws-sdk.js +1388 -709
  80. package/node_modules/aws-sdk/dist/aws-sdk.min.js +87 -86
  81. package/node_modules/aws-sdk/lib/config_service_placeholders.d.ts +4 -0
  82. package/node_modules/aws-sdk/lib/core.js +1 -1
  83. package/node_modules/aws-sdk/lib/dynamodb/document_client.d.ts +3 -3
  84. package/node_modules/aws-sdk/package.json +1 -1
  85. package/package.json +4 -4
@@ -309,11 +309,11 @@ declare class S3Control extends Service {
309
309
  */
310
310
  getPublicAccessBlock(callback?: (err: AWSError, data: S3Control.Types.GetPublicAccessBlockOutput) => void): Request<S3Control.Types.GetPublicAccessBlockOutput, AWSError>;
311
311
  /**
312
- * Gets the Amazon S3 Storage Lens configuration. For more information, see Assessing your storage activity and usage with Amazon S3 Storage Lens in the Amazon S3 User Guide. To use this action, you must have permission to perform the s3:GetStorageLensConfiguration action. For more information, see Setting permissions to use Amazon S3 Storage Lens in the Amazon S3 User Guide.
312
+ * Gets the Amazon S3 Storage Lens configuration. For more information, see Assessing your storage activity and usage with Amazon S3 Storage Lens in the Amazon S3 User Guide. For a complete list of S3 Storage Lens metrics, see S3 Storage Lens metrics glossary in the Amazon S3 User Guide. To use this action, you must have permission to perform the s3:GetStorageLensConfiguration action. For more information, see Setting permissions to use Amazon S3 Storage Lens in the Amazon S3 User Guide.
313
313
  */
314
314
  getStorageLensConfiguration(params: S3Control.Types.GetStorageLensConfigurationRequest, callback?: (err: AWSError, data: S3Control.Types.GetStorageLensConfigurationResult) => void): Request<S3Control.Types.GetStorageLensConfigurationResult, AWSError>;
315
315
  /**
316
- * Gets the Amazon S3 Storage Lens configuration. For more information, see Assessing your storage activity and usage with Amazon S3 Storage Lens in the Amazon S3 User Guide. To use this action, you must have permission to perform the s3:GetStorageLensConfiguration action. For more information, see Setting permissions to use Amazon S3 Storage Lens in the Amazon S3 User Guide.
316
+ * Gets the Amazon S3 Storage Lens configuration. For more information, see Assessing your storage activity and usage with Amazon S3 Storage Lens in the Amazon S3 User Guide. For a complete list of S3 Storage Lens metrics, see S3 Storage Lens metrics glossary in the Amazon S3 User Guide. To use this action, you must have permission to perform the s3:GetStorageLensConfiguration action. For more information, see Setting permissions to use Amazon S3 Storage Lens in the Amazon S3 User Guide.
317
317
  */
318
318
  getStorageLensConfiguration(callback?: (err: AWSError, data: S3Control.Types.GetStorageLensConfigurationResult) => void): Request<S3Control.Types.GetStorageLensConfigurationResult, AWSError>;
319
319
  /**
@@ -453,11 +453,11 @@ declare class S3Control extends Service {
453
453
  */
454
454
  putPublicAccessBlock(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
455
455
  /**
456
- * Puts an Amazon S3 Storage Lens configuration. For more information about S3 Storage Lens, see Working with Amazon S3 Storage Lens in the Amazon S3 User Guide. To use this action, you must have permission to perform the s3:PutStorageLensConfiguration action. For more information, see Setting permissions to use Amazon S3 Storage Lens in the Amazon S3 User Guide.
456
+ * Puts an Amazon S3 Storage Lens configuration. For more information about S3 Storage Lens, see Working with Amazon S3 Storage Lens in the Amazon S3 User Guide. For a complete list of S3 Storage Lens metrics, see S3 Storage Lens metrics glossary in the Amazon S3 User Guide. To use this action, you must have permission to perform the s3:PutStorageLensConfiguration action. For more information, see Setting permissions to use Amazon S3 Storage Lens in the Amazon S3 User Guide.
457
457
  */
458
458
  putStorageLensConfiguration(params: S3Control.Types.PutStorageLensConfigurationRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
459
459
  /**
460
- * Puts an Amazon S3 Storage Lens configuration. For more information about S3 Storage Lens, see Working with Amazon S3 Storage Lens in the Amazon S3 User Guide. To use this action, you must have permission to perform the s3:PutStorageLensConfiguration action. For more information, see Setting permissions to use Amazon S3 Storage Lens in the Amazon S3 User Guide.
460
+ * Puts an Amazon S3 Storage Lens configuration. For more information about S3 Storage Lens, see Working with Amazon S3 Storage Lens in the Amazon S3 User Guide. For a complete list of S3 Storage Lens metrics, see S3 Storage Lens metrics glossary in the Amazon S3 User Guide. To use this action, you must have permission to perform the s3:PutStorageLensConfiguration action. For more information, see Setting permissions to use Amazon S3 Storage Lens in the Amazon S3 User Guide.
461
461
  */
462
462
  putStorageLensConfiguration(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
463
463
  /**
@@ -523,17 +523,41 @@ declare namespace S3Control {
523
523
  export type AccountId = string;
524
524
  export interface AccountLevel {
525
525
  /**
526
- * A container for the S3 Storage Lens activity metrics.
526
+ * A container for S3 Storage Lens activity metrics.
527
527
  */
528
528
  ActivityMetrics?: ActivityMetrics;
529
529
  /**
530
530
  * A container for the S3 Storage Lens bucket-level configuration.
531
531
  */
532
532
  BucketLevel: BucketLevel;
533
+ /**
534
+ * A container for S3 Storage Lens advanced cost-optimization metrics.
535
+ */
536
+ AdvancedCostOptimizationMetrics?: AdvancedCostOptimizationMetrics;
537
+ /**
538
+ * A container for S3 Storage Lens advanced data-protection metrics.
539
+ */
540
+ AdvancedDataProtectionMetrics?: AdvancedDataProtectionMetrics;
541
+ /**
542
+ * A container for detailed status code metrics.
543
+ */
544
+ DetailedStatusCodesMetrics?: DetailedStatusCodesMetrics;
533
545
  }
534
546
  export interface ActivityMetrics {
535
547
  /**
536
- * A container for whether the activity metrics are enabled.
548
+ * A container that indicates whether activity metrics are enabled.
549
+ */
550
+ IsEnabled?: IsEnabled;
551
+ }
552
+ export interface AdvancedCostOptimizationMetrics {
553
+ /**
554
+ * A container that indicates whether advanced cost-optimization metrics are enabled.
555
+ */
556
+ IsEnabled?: IsEnabled;
557
+ }
558
+ export interface AdvancedDataProtectionMetrics {
559
+ /**
560
+ * A container that indicates whether advanced data-protection metrics are enabled.
537
561
  */
538
562
  IsEnabled?: IsEnabled;
539
563
  }
@@ -626,13 +650,25 @@ declare namespace S3Control {
626
650
  export type BucketCannedACL = "private"|"public-read"|"public-read-write"|"authenticated-read"|string;
627
651
  export interface BucketLevel {
628
652
  /**
629
- * A container for the bucket-level activity metrics for Amazon S3 Storage Lens
653
+ * A container for the bucket-level activity metrics for S3 Storage Lens.
630
654
  */
631
655
  ActivityMetrics?: ActivityMetrics;
632
656
  /**
633
- * A container for the bucket-level prefix-level metrics for S3 Storage Lens
657
+ * A container for the prefix-level metrics for S3 Storage Lens.
634
658
  */
635
659
  PrefixLevel?: PrefixLevel;
660
+ /**
661
+ * A container for bucket-level advanced cost-optimization metrics for S3 Storage Lens.
662
+ */
663
+ AdvancedCostOptimizationMetrics?: AdvancedCostOptimizationMetrics;
664
+ /**
665
+ * A container for bucket-level advanced data-protection metrics for S3 Storage Lens.
666
+ */
667
+ AdvancedDataProtectionMetrics?: AdvancedDataProtectionMetrics;
668
+ /**
669
+ * A container for bucket-level detailed status code metrics for S3 Storage Lens.
670
+ */
671
+ DetailedStatusCodesMetrics?: DetailedStatusCodesMetrics;
636
672
  }
637
673
  export type BucketLocationConstraint = "EU"|"eu-west-1"|"us-west-1"|"us-west-2"|"ap-south-1"|"ap-southeast-1"|"ap-southeast-2"|"ap-northeast-1"|"sa-east-1"|"cn-north-1"|"eu-central-1"|string;
638
674
  export type BucketName = string;
@@ -1024,6 +1060,12 @@ declare namespace S3Control {
1024
1060
  */
1025
1061
  AsyncOperation?: AsyncOperation;
1026
1062
  }
1063
+ export interface DetailedStatusCodesMetrics {
1064
+ /**
1065
+ * A container that indicates whether detailed status code metrics are enabled.
1066
+ */
1067
+ IsEnabled?: IsEnabled;
1068
+ }
1027
1069
  export type Endpoints = {[key: string]: NonEmptyMaxLength1024String};
1028
1070
  export interface EstablishedMultiRegionAccessPointPolicy {
1029
1071
  /**
@@ -1620,7 +1662,7 @@ declare namespace S3Control {
1620
1662
  */
1621
1663
  S3PutObjectCopy?: S3CopyObjectOperation;
1622
1664
  /**
1623
- * Directs the specified job to run a PUT Object acl call on every object in the manifest.
1665
+ * Directs the specified job to run a PutObjectAcl call on every object in the manifest.
1624
1666
  */
1625
1667
  S3PutObjectAcl?: S3SetObjectAclOperation;
1626
1668
  /**
@@ -2145,19 +2187,19 @@ declare namespace S3Control {
2145
2187
  }
2146
2188
  export interface PublicAccessBlockConfiguration {
2147
2189
  /**
2148
- * Specifies whether Amazon S3 should block public access control lists (ACLs) for buckets in this account. Setting this element to TRUE causes the following behavior: PUT Bucket acl and PUT Object acl calls fail if the specified ACL is public. PUT Object calls fail if the request includes a public ACL. PUT Bucket calls fail if the request includes a public ACL. Enabling this setting doesn't affect existing policies or ACLs. This is not supported for Amazon S3 on Outposts.
2190
+ * Specifies whether Amazon S3 should block public access control lists (ACLs) for buckets in this account. Setting this element to TRUE causes the following behavior: PutBucketAcl and PutObjectAcl calls fail if the specified ACL is public. PUT Object calls fail if the request includes a public ACL. PUT Bucket calls fail if the request includes a public ACL. Enabling this setting doesn't affect existing policies or ACLs. This property is not supported for Amazon S3 on Outposts.
2149
2191
  */
2150
2192
  BlockPublicAcls?: Setting;
2151
2193
  /**
2152
- * Specifies whether Amazon S3 should ignore public ACLs for buckets in this account. Setting this element to TRUE causes Amazon S3 to ignore all public ACLs on buckets in this account and any objects that they contain. Enabling this setting doesn't affect the persistence of any existing ACLs and doesn't prevent new public ACLs from being set. This is not supported for Amazon S3 on Outposts.
2194
+ * Specifies whether Amazon S3 should ignore public ACLs for buckets in this account. Setting this element to TRUE causes Amazon S3 to ignore all public ACLs on buckets in this account and any objects that they contain. Enabling this setting doesn't affect the persistence of any existing ACLs and doesn't prevent new public ACLs from being set. This property is not supported for Amazon S3 on Outposts.
2153
2195
  */
2154
2196
  IgnorePublicAcls?: Setting;
2155
2197
  /**
2156
- * Specifies whether Amazon S3 should block public bucket policies for buckets in this account. Setting this element to TRUE causes Amazon S3 to reject calls to PUT Bucket policy if the specified bucket policy allows public access. Enabling this setting doesn't affect existing bucket policies. This is not supported for Amazon S3 on Outposts.
2198
+ * Specifies whether Amazon S3 should block public bucket policies for buckets in this account. Setting this element to TRUE causes Amazon S3 to reject calls to PUT Bucket policy if the specified bucket policy allows public access. Enabling this setting doesn't affect existing bucket policies. This property is not supported for Amazon S3 on Outposts.
2157
2199
  */
2158
2200
  BlockPublicPolicy?: Setting;
2159
2201
  /**
2160
- * Specifies whether Amazon S3 should restrict public bucket policies for buckets in this account. Setting this element to TRUE restricts access to buckets with public policies to only Amazon Web Service principals and authorized users within this account. Enabling this setting doesn't affect previously stored bucket policies, except that public and cross-account access within any public bucket policy, including non-public delegation to specific accounts, is blocked. This is not supported for Amazon S3 on Outposts.
2202
+ * Specifies whether Amazon S3 should restrict public bucket policies for buckets in this account. Setting this element to TRUE restricts access to buckets with public policies to only Amazon Web Service principals and authorized users within this account. Enabling this setting doesn't affect previously stored bucket policies, except that public and cross-account access within any public bucket policy, including non-public delegation to specific accounts, is blocked. This property is not supported for Amazon S3 on Outposts.
2161
2203
  */
2162
2204
  RestrictPublicBuckets?: Setting;
2163
2205
  }
@@ -2459,7 +2501,7 @@ declare namespace S3Control {
2459
2501
  export type S3ContentLength = number;
2460
2502
  export interface S3CopyObjectOperation {
2461
2503
  /**
2462
- * Specifies the destination bucket ARN for the batch copy operation. For example, to copy objects to a bucket named "destinationBucket", set the TargetResource to "arn:aws:s3:::destinationBucket".
2504
+ * Specifies the destination bucket ARN for the batch copy operation. For example, to copy objects to a bucket named destinationBucket, set the TargetResource property to arn:aws:s3:::destinationBucket.
2463
2505
  */
2464
2506
  TargetResource?: S3BucketArnString;
2465
2507
  /**
@@ -2736,11 +2778,11 @@ declare namespace S3Control {
2736
2778
  export type S3StorageClass = "STANDARD"|"STANDARD_IA"|"ONEZONE_IA"|"GLACIER"|"INTELLIGENT_TIERING"|"DEEP_ARCHIVE"|"GLACIER_IR"|string;
2737
2779
  export interface S3Tag {
2738
2780
  /**
2739
- *
2781
+ * Key of the tag
2740
2782
  */
2741
2783
  Key: TagKeyString;
2742
2784
  /**
2743
- *
2785
+ * Value of the tag
2744
2786
  */
2745
2787
  Value: TagValueString;
2746
2788
  }
@@ -16062,7 +16062,7 @@ declare namespace SageMaker {
16062
16062
  /**
16063
16063
  * Path to Amazon S3 storage location for system and framework metrics.
16064
16064
  */
16065
- S3OutputPath: S3Uri;
16065
+ S3OutputPath?: S3Uri;
16066
16066
  /**
16067
16067
  * A time interval for capturing system metrics in milliseconds. Available values are 100, 200, 500, 1000 (1 second), 5000 (5 seconds), and 60000 (1 minute) milliseconds. The default value is 500 milliseconds.
16068
16068
  */
@@ -16071,6 +16071,10 @@ declare namespace SageMaker {
16071
16071
  * Configuration information for capturing framework metrics. Available key strings for different profiling options are DetailedProfilingConfig, PythonProfilingConfig, and DataLoaderProfilingConfig. The following codes are configuration structures for the ProfilingParameters parameter. To learn more about how to configure the ProfilingParameters parameter, see Use the SageMaker and Debugger Configuration API Operations to Create, Update, and Debug Your Training Job.
16072
16072
  */
16073
16073
  ProfilingParameters?: ProfilingParameters;
16074
+ /**
16075
+ * To disable system monitoring and profiling, set to True.
16076
+ */
16077
+ DisableProfiler?: DisableProfiler;
16074
16078
  }
16075
16079
  export interface ProfilerConfigForUpdate {
16076
16080
  /**
@@ -132,11 +132,11 @@ declare class SecretsManager extends Service {
132
132
  */
133
133
  restoreSecret(callback?: (err: AWSError, data: SecretsManager.Types.RestoreSecretResponse) => void): Request<SecretsManager.Types.RestoreSecretResponse, AWSError>;
134
134
  /**
135
- * Configures and starts the asynchronous process of rotating the secret. For more information about rotation, see Rotate secrets. If you include the configuration parameters, the operation sets the values for the secret and then immediately starts a rotation. If you don't include the configuration parameters, the operation starts a rotation with the values already stored in the secret. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the secret value is in the JSON structure of a database secret. In particular, if you want to use the alternating users strategy, your secret must contain the ARN of a superuser secret. To configure rotation, you also need the ARN of an Amazon Web Services Lambda function and the schedule for the rotation. The Lambda rotation function creates a new version of the secret and creates or updates the credentials on the database or service to match. After testing the new credentials, the function marks the new secret version with the staging label AWSCURRENT. Then anyone who retrieves the secret gets the new version. For more information, see How rotation works. You can create the Lambda rotation function based on the rotation function templates that Secrets Manager provides. Choose a template that matches your Rotation strategy. When rotation is successful, the AWSPENDING staging label might be attached to the same version as the AWSCURRENT version, or it might not be attached to any version. If the AWSPENDING staging label is present but not attached to the same version as AWSCURRENT, then any later invocation of RotateSecret assumes that a previous rotation request is still in progress and returns an error. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:RotateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. You also need lambda:InvokeFunction permissions on the rotation function. For more information, see Permissions for rotation.
135
+ * Configures and starts the asynchronous process of rotating the secret. For more information about rotation, see Rotate secrets. If you include the configuration parameters, the operation sets the values for the secret and then immediately starts a rotation. If you don't include the configuration parameters, the operation starts a rotation with the values already stored in the secret. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the secret value is in the JSON structure of a database secret. In particular, if you want to use the alternating users strategy, your secret must contain the ARN of a superuser secret. To configure rotation, you also need the ARN of an Amazon Web Services Lambda function and the schedule for the rotation. The Lambda rotation function creates a new version of the secret and creates or updates the credentials on the database or service to match. After testing the new credentials, the function marks the new secret version with the staging label AWSCURRENT. Then anyone who retrieves the secret gets the new version. For more information, see How rotation works. You can create the Lambda rotation function based on the rotation function templates that Secrets Manager provides. Choose a template that matches your Rotation strategy. When rotation is successful, the AWSPENDING staging label might be attached to the same version as the AWSCURRENT version, or it might not be attached to any version. If the AWSPENDING staging label is present but not attached to the same version as AWSCURRENT, then any later invocation of RotateSecret assumes that a previous rotation request is still in progress and returns an error. When rotation is unsuccessful, the AWSPENDING staging label might be attached to an empty secret version. For more information, see Troubleshoot rotation in the Secrets Manager User Guide. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:RotateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. You also need lambda:InvokeFunction permissions on the rotation function. For more information, see Permissions for rotation.
136
136
  */
137
137
  rotateSecret(params: SecretsManager.Types.RotateSecretRequest, callback?: (err: AWSError, data: SecretsManager.Types.RotateSecretResponse) => void): Request<SecretsManager.Types.RotateSecretResponse, AWSError>;
138
138
  /**
139
- * Configures and starts the asynchronous process of rotating the secret. For more information about rotation, see Rotate secrets. If you include the configuration parameters, the operation sets the values for the secret and then immediately starts a rotation. If you don't include the configuration parameters, the operation starts a rotation with the values already stored in the secret. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the secret value is in the JSON structure of a database secret. In particular, if you want to use the alternating users strategy, your secret must contain the ARN of a superuser secret. To configure rotation, you also need the ARN of an Amazon Web Services Lambda function and the schedule for the rotation. The Lambda rotation function creates a new version of the secret and creates or updates the credentials on the database or service to match. After testing the new credentials, the function marks the new secret version with the staging label AWSCURRENT. Then anyone who retrieves the secret gets the new version. For more information, see How rotation works. You can create the Lambda rotation function based on the rotation function templates that Secrets Manager provides. Choose a template that matches your Rotation strategy. When rotation is successful, the AWSPENDING staging label might be attached to the same version as the AWSCURRENT version, or it might not be attached to any version. If the AWSPENDING staging label is present but not attached to the same version as AWSCURRENT, then any later invocation of RotateSecret assumes that a previous rotation request is still in progress and returns an error. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:RotateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. You also need lambda:InvokeFunction permissions on the rotation function. For more information, see Permissions for rotation.
139
+ * Configures and starts the asynchronous process of rotating the secret. For more information about rotation, see Rotate secrets. If you include the configuration parameters, the operation sets the values for the secret and then immediately starts a rotation. If you don't include the configuration parameters, the operation starts a rotation with the values already stored in the secret. For database credentials you want to rotate, for Secrets Manager to be able to rotate the secret, you must make sure the secret value is in the JSON structure of a database secret. In particular, if you want to use the alternating users strategy, your secret must contain the ARN of a superuser secret. To configure rotation, you also need the ARN of an Amazon Web Services Lambda function and the schedule for the rotation. The Lambda rotation function creates a new version of the secret and creates or updates the credentials on the database or service to match. After testing the new credentials, the function marks the new secret version with the staging label AWSCURRENT. Then anyone who retrieves the secret gets the new version. For more information, see How rotation works. You can create the Lambda rotation function based on the rotation function templates that Secrets Manager provides. Choose a template that matches your Rotation strategy. When rotation is successful, the AWSPENDING staging label might be attached to the same version as the AWSCURRENT version, or it might not be attached to any version. If the AWSPENDING staging label is present but not attached to the same version as AWSCURRENT, then any later invocation of RotateSecret assumes that a previous rotation request is still in progress and returns an error. When rotation is unsuccessful, the AWSPENDING staging label might be attached to an empty secret version. For more information, see Troubleshoot rotation in the Secrets Manager User Guide. Secrets Manager generates a CloudTrail log entry when you call this action. Do not include sensitive information in request parameters because it might be logged. For more information, see Logging Secrets Manager events with CloudTrail. Required permissions: secretsmanager:RotateSecret. For more information, see IAM policy actions for Secrets Manager and Authentication and access control in Secrets Manager. You also need lambda:InvokeFunction permissions on the rotation function. For more information, see Permissions for rotation.
140
140
  */
141
141
  rotateSecret(callback?: (err: AWSError, data: SecretsManager.Types.RotateSecretResponse) => void): Request<SecretsManager.Types.RotateSecretResponse, AWSError>;
142
142
  /**
@@ -296,7 +296,7 @@ declare namespace SecretsManager {
296
296
  */
297
297
  RecoveryWindowInDays?: RecoveryWindowInDaysType;
298
298
  /**
299
- * Specifies whether to delete the secret without any recovery window. You can't use both this parameter and RecoveryWindowInDays in the same call. If you don't use either, then Secrets Manager defaults to a 30 day recovery window. Secrets Manager performs the actual deletion with an asynchronous background process, so there might be a short delay before the secret is permanently deleted. If you delete a secret and then immediately create a secret with the same name, use appropriate back off and retry logic. Use this parameter with caution. This parameter causes the operation to skip the normal recovery window before the permanent deletion that Secrets Manager would normally impose with the RecoveryWindowInDays parameter. If you delete a secret with the ForceDeleteWithouRecovery parameter, then you have no opportunity to recover the secret. You lose the secret permanently.
299
+ * Specifies whether to delete the secret without any recovery window. You can't use both this parameter and RecoveryWindowInDays in the same call. If you don't use either, then Secrets Manager defaults to a 30 day recovery window. Secrets Manager performs the actual deletion with an asynchronous background process, so there might be a short delay before the secret is permanently deleted. If you delete a secret and then immediately create a secret with the same name, use appropriate back off and retry logic. Use this parameter with caution. This parameter causes the operation to skip the normal recovery window before the permanent deletion that Secrets Manager would normally impose with the RecoveryWindowInDays parameter. If you delete a secret with the ForceDeleteWithoutRecovery parameter, then you have no opportunity to recover the secret. You lose the secret permanently.
300
300
  */
301
301
  ForceDeleteWithoutRecovery?: BooleanType;
302
302
  }
@@ -574,7 +574,7 @@ declare namespace SecretsManager {
574
574
  */
575
575
  Filters?: FiltersListType;
576
576
  /**
577
- * Lists secrets in the requested order.
577
+ * Secrets are listed by CreatedDate.
578
578
  */
579
579
  SortOrder?: SortOrderType;
580
580
  }
@@ -796,15 +796,15 @@ declare namespace SecretsManager {
796
796
  export type RotationLambdaARNType = string;
797
797
  export interface RotationRulesType {
798
798
  /**
799
- * The number of days between automatic scheduled rotations of the secret. You can use this value to check that your secret meets your compliance guidelines for how often secrets must be rotated. In DescribeSecret and ListSecrets, this value is calculated from the rotation schedule after every successful rotation. In RotateSecret, you can set the rotation schedule in RotationRules with AutomaticallyAfterDays or ScheduleExpression, but not both.
799
+ * The number of days between automatic scheduled rotations of the secret. You can use this value to check that your secret meets your compliance guidelines for how often secrets must be rotated. In DescribeSecret and ListSecrets, this value is calculated from the rotation schedule after every successful rotation. In RotateSecret, you can set the rotation schedule in RotationRules with AutomaticallyAfterDays or ScheduleExpression, but not both. To set a rotation schedule in hours, use ScheduleExpression.
800
800
  */
801
801
  AutomaticallyAfterDays?: AutomaticallyRotateAfterDaysType;
802
802
  /**
803
- * The length of the rotation window in hours, for example 3h for a three hour window. Secrets Manager rotates your secret at any time during this window. The window must not go into the next UTC day. If you don't specify this value, the window automatically ends at the end of the UTC day. The window begins according to the ScheduleExpression. For more information, including examples, see Schedule expressions in Secrets Manager rotation.
803
+ * The length of the rotation window in hours, for example 3h for a three hour window. Secrets Manager rotates your secret at any time during this window. The window must not extend into the next rotation window or the next UTC day. The window starts according to the ScheduleExpression. If you don't specify a Duration, for a ScheduleExpression in hours, the window automatically closes after one hour. For a ScheduleExpression in days, the window automatically closes at the end of the UTC day. For more information, including examples, see Schedule expressions in Secrets Manager rotation in the Secrets Manager Users Guide.
804
804
  */
805
805
  Duration?: DurationType;
806
806
  /**
807
- * A cron() or rate() expression that defines the schedule for rotating your secret. Secrets Manager rotation schedules use UTC time zone. Secrets Manager rate() expressions represent the interval in days that you want to rotate your secret, for example rate(10 days). If you use a rate() expression, the rotation window opens at midnight, and Secrets Manager rotates your secret any time that day after midnight. You can set a Duration to shorten the rotation window. You can use a cron() expression to create rotation schedules that are more detailed than a rotation interval. For more information, including examples, see Schedule expressions in Secrets Manager rotation. If you use a cron() expression, Secrets Manager rotates your secret any time during that day after the window opens. For example, cron(0 8 1 * ? *) represents a rotation window that occurs on the first day of every month beginning at 8:00 AM UTC. Secrets Manager rotates the secret any time that day after 8:00 AM. You can set a Duration to shorten the rotation window.
807
+ * A cron() or rate() expression that defines the schedule for rotating your secret. Secrets Manager rotation schedules use UTC time zone. Secrets Manager rotates your secret any time during a rotation window. Secrets Manager rate() expressions represent the interval in hours or days that you want to rotate your secret, for example rate(12 hours) or rate(10 days). You can rotate a secret as often as every four hours. If you use a rate() expression, the rotation window starts at midnight. For a rate in hours, the default rotation window closes after one hour. For a rate in days, the default rotation window closes at the end of the day. You can set the Duration to change the rotation window. The rotation window must not extend into the next UTC day or into the next rotation window. You can use a cron() expression to create a rotation schedule that is more detailed than a rotation interval. For more information, including examples, see Schedule expressions in Secrets Manager rotation in the Secrets Manager Users Guide. For a cron expression that represents a schedule in hours, the default rotation window closes after one hour. For a cron expression that represents a schedule in days, the default rotation window closes at the end of the day. You can set the Duration to change the rotation window. The rotation window must not extend into the next UTC day or into the next rotation window.
808
808
  */
809
809
  ScheduleExpression?: ScheduleExpressionType;
810
810
  }
@@ -5824,6 +5824,14 @@ declare namespace SecurityHub {
5824
5824
  * The version of the Lambda function.
5825
5825
  */
5826
5826
  Version?: NonEmptyString;
5827
+ /**
5828
+ * The instruction set architecture that the function uses. Valid values are x86_64 or arm64.
5829
+ */
5830
+ Architectures?: NonEmptyStringList;
5831
+ /**
5832
+ * The type of deployment package that's used to deploy the function code to Lambda. Set to Image for a container image and Zip for a .zip file archive.
5833
+ */
5834
+ PackageType?: NonEmptyString;
5827
5835
  }
5828
5836
  export interface AwsLambdaFunctionEnvironment {
5829
5837
  /**
@@ -11554,6 +11562,14 @@ declare namespace SecurityHub {
11554
11562
  * Describes the actions a customer can take to resolve the vulnerability in the software package.
11555
11563
  */
11556
11564
  Remediation?: NonEmptyString;
11565
+ /**
11566
+ * The source layer hash of the vulnerable package.
11567
+ */
11568
+ SourceLayerHash?: NonEmptyString;
11569
+ /**
11570
+ * The Amazon Resource Name (ARN) of the source layer.
11571
+ */
11572
+ SourceLayerArn?: NonEmptyString;
11557
11573
  }
11558
11574
  export type SoftwarePackageList = SoftwarePackage[];
11559
11575
  export type SortCriteria = SortCriterion[];