cdk-lambda-subminute 2.0.285 → 2.0.287

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (33) hide show
  1. package/.jsii +3 -3
  2. package/lib/cdk-lambda-subminute.js +3 -3
  3. package/node_modules/aws-sdk/CHANGELOG.md +16 -1
  4. package/node_modules/aws-sdk/README.md +1 -1
  5. package/node_modules/aws-sdk/apis/apprunner-2020-05-15.min.json +35 -34
  6. package/node_modules/aws-sdk/apis/connect-2017-08-08.min.json +503 -365
  7. package/node_modules/aws-sdk/apis/connect-2017-08-08.paginators.json +16 -0
  8. package/node_modules/aws-sdk/apis/gamelift-2015-10-01.min.json +283 -227
  9. package/node_modules/aws-sdk/apis/globalaccelerator-2018-08-08.min.json +251 -49
  10. package/node_modules/aws-sdk/apis/globalaccelerator-2018-08-08.paginators.json +12 -0
  11. package/node_modules/aws-sdk/apis/glue-2017-03-31.min.json +359 -318
  12. package/node_modules/aws-sdk/apis/network-firewall-2020-11-12.min.json +40 -17
  13. package/node_modules/aws-sdk/apis/quicksight-2018-04-01.min.json +353 -325
  14. package/node_modules/aws-sdk/apis/rds-2014-10-31.min.json +228 -206
  15. package/node_modules/aws-sdk/apis/redshift-2012-12-01.min.json +187 -145
  16. package/node_modules/aws-sdk/apis/sagemaker-2017-07-24.min.json +3 -0
  17. package/node_modules/aws-sdk/clients/apprunner.d.ts +5 -0
  18. package/node_modules/aws-sdk/clients/connect.d.ts +248 -6
  19. package/node_modules/aws-sdk/clients/gamelift.d.ts +33 -22
  20. package/node_modules/aws-sdk/clients/globalaccelerator.d.ts +254 -2
  21. package/node_modules/aws-sdk/clients/glue.d.ts +45 -0
  22. package/node_modules/aws-sdk/clients/networkfirewall.d.ts +44 -11
  23. package/node_modules/aws-sdk/clients/quicksight.d.ts +41 -2
  24. package/node_modules/aws-sdk/clients/rds.d.ts +30 -0
  25. package/node_modules/aws-sdk/clients/redshift.d.ts +47 -0
  26. package/node_modules/aws-sdk/clients/sagemaker.d.ts +1 -0
  27. package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +1 -1
  28. package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +13 -13
  29. package/node_modules/aws-sdk/dist/aws-sdk.js +1220 -946
  30. package/node_modules/aws-sdk/dist/aws-sdk.min.js +81 -81
  31. package/node_modules/aws-sdk/lib/core.js +1 -1
  32. package/node_modules/aws-sdk/package.json +1 -1
  33. package/package.json +3 -3
@@ -3012,6 +3012,14 @@ declare namespace Glue {
3012
3012
  * Specifies a target that writes to a Snowflake data source.
3013
3013
  */
3014
3014
  SnowflakeTarget?: SnowflakeTarget;
3015
+ /**
3016
+ * Specifies a source generated with standard connection options.
3017
+ */
3018
+ ConnectorDataSource?: ConnectorDataSource;
3019
+ /**
3020
+ * Specifies a target generated with standard connection options.
3021
+ */
3022
+ ConnectorDataTarget?: ConnectorDataTarget;
3015
3023
  }
3016
3024
  export type CodeGenConfigurationNodes = {[key: string]: CodeGenConfigurationNode};
3017
3025
  export interface CodeGenEdge {
@@ -3315,6 +3323,43 @@ declare namespace Glue {
3315
3323
  */
3316
3324
  Connections?: OrchestrationStringList;
3317
3325
  }
3326
+ export interface ConnectorDataSource {
3327
+ /**
3328
+ * The name of this source node.
3329
+ */
3330
+ Name: NodeName;
3331
+ /**
3332
+ * The connectionType, as provided to the underlying Glue library. This node type supports the following connection types: bigquery
3333
+ */
3334
+ ConnectionType: EnclosedInStringProperty;
3335
+ /**
3336
+ * A map specifying connection options for the node. You can find standard connection options for the corresponding connection type in the Connection parameters section of the Glue documentation.
3337
+ */
3338
+ Data: ConnectorOptions;
3339
+ /**
3340
+ * Specifies the data schema for this source.
3341
+ */
3342
+ OutputSchemas?: GlueSchemas;
3343
+ }
3344
+ export interface ConnectorDataTarget {
3345
+ /**
3346
+ * The name of this target node.
3347
+ */
3348
+ Name: NodeName;
3349
+ /**
3350
+ * The connectionType, as provided to the underlying Glue library. This node type supports the following connection types: bigquery
3351
+ */
3352
+ ConnectionType: EnclosedInStringProperty;
3353
+ /**
3354
+ * A map specifying connection options for the node. You can find standard connection options for the corresponding connection type in the Connection parameters section of the Glue documentation.
3355
+ */
3356
+ Data: ConnectorOptions;
3357
+ /**
3358
+ * The nodes that are inputs to the data target.
3359
+ */
3360
+ Inputs?: OneInput;
3361
+ }
3362
+ export type ConnectorOptions = {[key: string]: GenericString};
3318
3363
  export type ContextWords = NameString[];
3319
3364
  export interface Crawl {
3320
3365
  /**
@@ -52,11 +52,11 @@ declare class NetworkFirewall extends Service {
52
52
  */
53
53
  createRuleGroup(callback?: (err: AWSError, data: NetworkFirewall.Types.CreateRuleGroupResponse) => void): Request<NetworkFirewall.Types.CreateRuleGroupResponse, AWSError>;
54
54
  /**
55
- * Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains the Certificate Manager certificate associations that Network Firewall uses to decrypt and re-encrypt traffic traveling through your firewall. After you create a TLS inspection configuration, you can associate it with a new firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
55
+ * Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains Certificate Manager certificate associations between and the scope configurations that Network Firewall uses to decrypt and re-encrypt traffic traveling through your firewall. After you create a TLS inspection configuration, you can associate it with a new firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
56
56
  */
57
57
  createTLSInspectionConfiguration(params: NetworkFirewall.Types.CreateTLSInspectionConfigurationRequest, callback?: (err: AWSError, data: NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse, AWSError>;
58
58
  /**
59
- * Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains the Certificate Manager certificate associations that Network Firewall uses to decrypt and re-encrypt traffic traveling through your firewall. After you create a TLS inspection configuration, you can associate it with a new firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
59
+ * Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains Certificate Manager certificate associations between and the scope configurations that Network Firewall uses to decrypt and re-encrypt traffic traveling through your firewall. After you create a TLS inspection configuration, you can associate it with a new firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
60
60
  */
61
61
  createTLSInspectionConfiguration(callback?: (err: AWSError, data: NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse, AWSError>;
62
62
  /**
@@ -316,6 +316,21 @@ declare namespace NetworkFirewall {
316
316
  }
317
317
  export type AddressDefinition = string;
318
318
  export type Addresses = Address[];
319
+ export interface AnalysisResult {
320
+ /**
321
+ * The priority number of the stateless rules identified in the analysis.
322
+ */
323
+ IdentifiedRuleIds?: RuleIdList;
324
+ /**
325
+ * The types of rule configurations that Network Firewall analyzes your rule groups for. Network Firewall analyzes stateless rule groups for the following types of rule configurations: STATELESS_RULE_FORWARDING_ASYMMETRICALLY Cause: One or more stateless rules with the action pass or forward are forwarding traffic asymmetrically. Specifically, the rule's set of source IP addresses or their associated port numbers, don't match the set of destination IP addresses or their associated port numbers. To mitigate: Make sure that there's an existing return path. For example, if the rule allows traffic from source 10.1.0.0/24 to destination 20.1.0.0/24, you should allow return traffic from source 20.1.0.0/24 to destination 10.1.0.0/24. STATELESS_RULE_CONTAINS_TCP_FLAGS Cause: At least one stateless rule with the action pass orforward contains TCP flags that are inconsistent in the forward and return directions. To mitigate: Prevent asymmetric routing issues caused by TCP flags by following these actions: Remove unnecessary TCP flag inspections from the rules. If you need to inspect TCP flags, check that the rules correctly account for changes in TCP flags throughout the TCP connection cycle, for example SYN and ACK flags used in a 3-way TCP handshake.
326
+ */
327
+ IdentifiedType?: IdentifiedType;
328
+ /**
329
+ * Provides analysis details for the identified rule.
330
+ */
331
+ AnalysisDetail?: CollectionMember_String;
332
+ }
333
+ export type AnalysisResultList = AnalysisResult[];
319
334
  export interface AssociateFirewallPolicyRequest {
320
335
  /**
321
336
  * An optional token that you can use for optimistic locking. Network Firewall returns a token to your requests that access the firewall. The token marks the state of the firewall resource at the time of the request. To make an unconditional change to the firewall, omit the token in your update request. Without the token, Network Firewall performs your updates regardless of whether the firewall has changed since you last retrieved it. To make a conditional change to the firewall, provide the token in your update request. Network Firewall uses the token to ensure that the firewall hasn't changed since you last retrieved it. If it has changed, the operation fails with an InvalidTokenException. If this happens, retrieve the firewall again to get a current copy of it with a new token. Reapply your changes as needed, then try the operation again using the new token.
@@ -435,11 +450,11 @@ declare namespace NetworkFirewall {
435
450
  export type Certificates = TlsCertificateData[];
436
451
  export interface CheckCertificateRevocationStatusActions {
437
452
  /**
438
- * Configures how Network Firewall processes traffic when it determines that the certificate presented by the server in the SSL/TLS connection has a revoked status. PASS - Allow the connection to continue, and pass subsequent packets to the stateful engine for inspection. DROP - Network Firewall fails closed and drops all subsequent traffic. REJECT - Network Firewall sends a TCP reject packet back to your client so that the client can immediately establish a new session. Network Firewall then fails closed and drops all subsequent traffic. REJECT is available only for TCP traffic.
453
+ * Configures how Network Firewall processes traffic when it determines that the certificate presented by the server in the SSL/TLS connection has a revoked status. PASS - Allow the connection to continue, and pass subsequent packets to the stateful engine for inspection. DROP - Network Firewall closes the connection and drops subsequent packets for that connection. REJECT - Network Firewall sends a TCP reject packet back to your client. The service closes the connection and drops subsequent packets for that connection. REJECT is available only for TCP traffic.
439
454
  */
440
455
  RevokedStatusAction?: RevocationCheckAction;
441
456
  /**
442
- * Configures how Network Firewall processes traffic when it determines that the certificate presented by the server in the SSL/TLS connection has an unknown status, or a status that cannot be determined for any other reason, including when the service is unable to connect to the OCSP and CRL endpoints for the certificate. PASS - Allow the connection to continue, and pass subsequent packets to the stateful engine for inspection. DROP - Network Firewall fails closed and drops all subsequent traffic. REJECT - Network Firewall sends a TCP reject packet back to your client so that the client can immediately establish a new session. Network Firewall then fails closed and drops all subsequent traffic. REJECT is available only for TCP traffic.
457
+ * Configures how Network Firewall processes traffic when it determines that the certificate presented by the server in the SSL/TLS connection has an unknown status, or a status that cannot be determined for any other reason, including when the service is unable to connect to the OCSP and CRL endpoints for the certificate. PASS - Allow the connection to continue, and pass subsequent packets to the stateful engine for inspection. DROP - Network Firewall closes the connection and drops subsequent packets for that connection. REJECT - Network Firewall sends a TCP reject packet back to your client. The service closes the connection and drops subsequent packets for that connection. REJECT is available only for TCP traffic.
443
458
  */
444
459
  UnknownStatusAction?: RevocationCheckAction;
445
460
  }
@@ -574,6 +589,10 @@ declare namespace NetworkFirewall {
574
589
  * A complex type that contains metadata about the rule group that your own rule group is copied from. You can use the metadata to keep track of updates made to the originating rule group.
575
590
  */
576
591
  SourceMetadata?: SourceMetadata;
592
+ /**
593
+ * Indicates whether you want Network Firewall to analyze the stateless rules in the rule group for rule behavior such as asymmetric routing. If set to TRUE, Network Firewall runs the analysis and then creates the rule group for you. To run the stateless rule group analyzer without creating the rule group, set DryRun to TRUE.
594
+ */
595
+ AnalyzeRuleGroup?: Boolean;
577
596
  }
578
597
  export interface CreateRuleGroupResponse {
579
598
  /**
@@ -830,6 +849,10 @@ declare namespace NetworkFirewall {
830
849
  * Indicates whether the rule group is stateless or stateful. If the rule group is stateless, it contains stateless rules. If it is stateful, it contains stateful rules. This setting is required for requests that do not include the RuleGroupARN.
831
850
  */
832
851
  Type?: RuleGroupType;
852
+ /**
853
+ * Indicates whether you want Network Firewall to analyze the stateless rules in the rule group for rule behavior such as asymmetric routing. If set to TRUE, Network Firewall runs the analysis.
854
+ */
855
+ AnalyzeRuleGroup?: Boolean;
833
856
  }
834
857
  export interface DescribeRuleGroupResponse {
835
858
  /**
@@ -1156,6 +1179,7 @@ declare namespace NetworkFirewall {
1156
1179
  export type IPSetReferenceMap = {[key: string]: IPSetReference};
1157
1180
  export type IPSetReferenceName = string;
1158
1181
  export type IPSets = {[key: string]: IPSet};
1182
+ export type IdentifiedType = "STATELESS_RULE_FORWARDING_ASYMMETRICALLY"|"STATELESS_RULE_CONTAINS_TCP_FLAGS"|string;
1159
1183
  export type KeyId = string;
1160
1184
  export type Keyword = string;
1161
1185
  export type LastUpdateTime = Date;
@@ -1430,7 +1454,7 @@ declare namespace NetworkFirewall {
1430
1454
  */
1431
1455
  RulesSource: RulesSource;
1432
1456
  /**
1433
- * Additional options governing how Network Firewall handles stateful rules. The policies where you use your stateful rule group must have stateful rule options settings that are compatible with these settings.
1457
+ * Additional options governing how Network Firewall handles stateful rules. The policies where you use your stateful rule group must have stateful rule options settings that are compatible with these settings. Some limitations apply; for more information, see Strict evaluation order in the Network Firewall Developer Guide.
1434
1458
  */
1435
1459
  StatefulRuleOptions?: StatefulRuleOptions;
1436
1460
  }
@@ -1501,9 +1525,14 @@ declare namespace NetworkFirewall {
1501
1525
  * The last time that the rule group was changed.
1502
1526
  */
1503
1527
  LastModifiedTime?: LastUpdateTime;
1528
+ /**
1529
+ * The list of analysis results for AnalyzeRuleGroup. If you set AnalyzeRuleGroup to TRUE in CreateRuleGroup, UpdateRuleGroup, or DescribeRuleGroup, Network Firewall analyzes the rule group and identifies the rules that might adversely effect your firewall's functionality. For example, if Network Firewall detects a rule that's routing traffic asymmetrically, which impacts the service's ability to properly process traffic, the service includes the rule in the list of analysis results.
1530
+ */
1531
+ AnalysisResults?: AnalysisResultList;
1504
1532
  }
1505
1533
  export type RuleGroupType = "STATELESS"|"STATEFUL"|string;
1506
1534
  export type RuleGroups = RuleGroupMetadata[];
1535
+ export type RuleIdList = CollectionMember_String[];
1507
1536
  export interface RuleOption {
1508
1537
  /**
1509
1538
  * The keyword for the Suricata compatible rule option. You must include a sid (signature ID), and can optionally include other keywords. For information about Suricata compatible keywords, see Rule options in the Suricata documentation.
@@ -1530,7 +1559,7 @@ declare namespace NetworkFirewall {
1530
1559
  }
1531
1560
  export interface RulesSource {
1532
1561
  /**
1533
- * Stateful inspection criteria, provided in Suricata compatible intrusion prevention system (IPS) rules. Suricata is an open-source network IPS that includes a standard rule-based language for network traffic inspection. These rules contain the inspection criteria and the action to take for traffic that matches the criteria, so this type of rule group doesn't have a separate action setting.
1562
+ * Stateful inspection criteria, provided in Suricata compatible rules. Suricata is an open-source threat detection framework that includes a standard rule-based language for network traffic inspection. These rules contain the inspection criteria and the action to take for traffic that matches the criteria, so this type of rule group doesn't have a separate action setting. You can't use the priority keyword if the RuleOrder option in StatefulRuleOptions is set to STRICT_ORDER.
1534
1563
  */
1535
1564
  RulesString?: RulesString;
1536
1565
  /**
@@ -1569,7 +1598,7 @@ declare namespace NetworkFirewall {
1569
1598
  }
1570
1599
  export interface ServerCertificateConfiguration {
1571
1600
  /**
1572
- * The list of a server certificate configuration's Certificate Manager certificates, used for inbound SSL/TLS inspection.
1601
+ * The list of server certificates to use for inbound SSL/TLS inspection.
1573
1602
  */
1574
1603
  ServerCertificates?: ServerCertificates;
1575
1604
  /**
@@ -1577,11 +1606,11 @@ declare namespace NetworkFirewall {
1577
1606
  */
1578
1607
  Scopes?: ServerCertificateScopes;
1579
1608
  /**
1580
- * The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate configured in Certificate Manager (ACM) to use for outbound SSL/TLS inspection. The following limitations apply: You can use CA certificates that you imported into ACM, but you can't generate CA certificates with ACM. You can't use certificates issued by Private Certificate Authority. For more information about the certificate requirements for outbound inspection, see Requirements for using SSL/TLS certificates with TLS inspection configurations in the Network Firewall Developer Guide. For information about working with certificates in ACM, see Importing certificates in the Certificate Manager User Guide.
1609
+ * The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within Certificate Manager (ACM) to use for outbound SSL/TLS inspection. The following limitations apply: You can use CA certificates that you imported into ACM, but you can't generate CA certificates with ACM. You can't use certificates issued by Private Certificate Authority. For more information about configuring certificates for outbound inspection, see Using SSL/TLS certificates with certificates with TLS inspection configurations in the Network Firewall Developer Guide. For information about working with certificates in ACM, see Importing certificates in the Certificate Manager User Guide.
1581
1610
  */
1582
1611
  CertificateAuthorityArn?: ResourceArn;
1583
1612
  /**
1584
- * When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status. If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To use this option, you must specify a CertificateAuthorityArn in ServerCertificateConfiguration.
1613
+ * When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status. If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a CertificateAuthorityArn in ServerCertificateConfiguration.
1585
1614
  */
1586
1615
  CheckCertificateRevocationStatus?: CheckCertificateRevocationStatusActions;
1587
1616
  }
@@ -1627,7 +1656,7 @@ declare namespace NetworkFirewall {
1627
1656
  export type StatefulActions = CollectionMember_String[];
1628
1657
  export interface StatefulEngineOptions {
1629
1658
  /**
1630
- * Indicates how to manage the order of stateful rule evaluation for the policy. DEFAULT_ACTION_ORDER is the default behavior. Stateful rules are provided to the rule engine as Suricata compatible strings, and Suricata evaluates them based on certain settings. For more information, see Evaluation order for stateful rules in the Network Firewall Developer Guide.
1659
+ * Indicates how to manage the order of stateful rule evaluation for the policy. STRICT_ORDER is the default and recommended option. With STRICT_ORDER, provide your rules in the order that you want them to be evaluated. You can then choose one or more default actions for packets that don't match any rules. Choose STRICT_ORDER to have the stateful rules engine determine the evaluation order of your rules. The default action for this rule order is PASS, followed by DROP, REJECT, and ALERT actions. Stateful rules are provided to the rule engine as Suricata compatible strings, and Suricata evaluates them based on your settings. For more information, see Evaluation order for stateful rules in the Network Firewall Developer Guide.
1631
1660
  */
1632
1661
  RuleOrder?: RuleOrder;
1633
1662
  /**
@@ -1637,7 +1666,7 @@ declare namespace NetworkFirewall {
1637
1666
  }
1638
1667
  export interface StatefulRule {
1639
1668
  /**
1640
- * Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. The actions for a stateful rule are defined as follows: PASS - Permits the packets to go to the intended destination. DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. ALERT - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with ALERT action, verify in the logs that the rule is filtering as you want, then change the action to DROP.
1669
+ * Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. The actions for a stateful rule are defined as follows: PASS - Permits the packets to go to the intended destination. DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. ALERT - Sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with ALERT action, verify in the logs that the rule is filtering as you want, then change the action to DROP.
1641
1670
  */
1642
1671
  Action: StatefulAction;
1643
1672
  /**
@@ -2113,6 +2142,10 @@ declare namespace NetworkFirewall {
2113
2142
  * A complex type that contains metadata about the rule group that your own rule group is copied from. You can use the metadata to keep track of updates made to the originating rule group.
2114
2143
  */
2115
2144
  SourceMetadata?: SourceMetadata;
2145
+ /**
2146
+ * Indicates whether you want Network Firewall to analyze the stateless rules in the rule group for rule behavior such as asymmetric routing. If set to TRUE, Network Firewall runs the analysis and then updates the rule group for you. To run the stateless rule group analyzer without updating the rule group, set DryRun to TRUE.
2147
+ */
2148
+ AnalyzeRuleGroup?: Boolean;
2116
2149
  }
2117
2150
  export interface UpdateRuleGroupResponse {
2118
2151
  /**
@@ -1473,6 +1473,7 @@ declare namespace QuickSight {
1473
1473
  * A list of the associated sheets with the unique identifier and name of each sheet.
1474
1474
  */
1475
1475
  Sheets?: SheetList;
1476
+ Options?: AssetOptions;
1476
1477
  }
1477
1478
  export interface AnalysisDefaults {
1478
1479
  /**
@@ -1506,6 +1507,10 @@ declare namespace QuickSight {
1506
1507
  */
1507
1508
  ColumnConfigurations?: ColumnConfigurationList;
1508
1509
  AnalysisDefaults?: AnalysisDefaults;
1510
+ /**
1511
+ * An array of option definitions for an analysis.
1512
+ */
1513
+ Options?: AssetOptions;
1509
1514
  }
1510
1515
  export interface AnalysisError {
1511
1516
  /**
@@ -2074,6 +2079,16 @@ declare namespace QuickSight {
2074
2079
  S3Uri?: S3Uri;
2075
2080
  }
2076
2081
  export type AssetBundleResourceArns = Arn[];
2082
+ export interface AssetOptions {
2083
+ /**
2084
+ * Determines the timezone for the analysis.
2085
+ */
2086
+ Timezone?: String;
2087
+ /**
2088
+ * Determines the week start day for an analysis.
2089
+ */
2090
+ WeekStart?: DayOfTheWeek;
2091
+ }
2077
2092
  export type AssignmentStatus = "ENABLED"|"DRAFT"|"DISABLED"|string;
2078
2093
  export interface AthenaParameters {
2079
2094
  /**
@@ -2675,6 +2690,10 @@ declare namespace QuickSight {
2675
2690
  * New column data type.
2676
2691
  */
2677
2692
  NewColumnType: ColumnDataType;
2693
+ /**
2694
+ * The sub data type of the new column. Sub types are only available for decimal columns that are part of a SPICE dataset.
2695
+ */
2696
+ SubType?: ColumnDataSubType;
2678
2697
  /**
2679
2698
  * When casting a column from string to datetime type, you can supply a string in a format supported by Amazon QuickSight to denote the source data format.
2680
2699
  */
@@ -2849,6 +2868,7 @@ declare namespace QuickSight {
2849
2868
  }
2850
2869
  export type ColumnConfigurationList = ColumnConfiguration[];
2851
2870
  export type ColumnDataRole = "DIMENSION"|"MEASURE"|string;
2871
+ export type ColumnDataSubType = "FLOAT"|"FIXED"|string;
2852
2872
  export type ColumnDataType = "STRING"|"INTEGER"|"DECIMAL"|"DATETIME"|string;
2853
2873
  export interface ColumnDescription {
2854
2874
  /**
@@ -4811,6 +4831,7 @@ declare namespace QuickSight {
4811
4831
  * A list of the associated sheets with the unique identifier and name of each sheet.
4812
4832
  */
4813
4833
  Sheets?: SheetList;
4834
+ Options?: AssetOptions;
4814
4835
  }
4815
4836
  export interface DashboardVersionDefinition {
4816
4837
  /**
@@ -4838,6 +4859,10 @@ declare namespace QuickSight {
4838
4859
  */
4839
4860
  ColumnConfigurations?: ColumnConfigurationList;
4840
4861
  AnalysisDefaults?: AnalysisDefaults;
4862
+ /**
4863
+ * An array of option definitions for a dashboard.
4864
+ */
4865
+ Options?: AssetOptions;
4841
4866
  }
4842
4867
  export interface DashboardVersionSummary {
4843
4868
  /**
@@ -5760,6 +5785,7 @@ declare namespace QuickSight {
5760
5785
  CustomValue?: SensitiveTimestamp;
5761
5786
  }
5762
5787
  export type DayOfMonth = string;
5788
+ export type DayOfTheWeek = "SUNDAY"|"MONDAY"|"TUESDAY"|"WEDNESDAY"|"THURSDAY"|"FRIDAY"|"SATURDAY"|string;
5763
5789
  export type DayOfWeek = "SUNDAY"|"MONDAY"|"TUESDAY"|"WEDNESDAY"|"THURSDAY"|"FRIDAY"|"SATURDAY"|string;
5764
5790
  export type DbUsername = string;
5765
5791
  export interface DecimalDatasetParameter {
@@ -10086,6 +10112,10 @@ declare namespace QuickSight {
10086
10112
  * The data type of the column.
10087
10113
  */
10088
10114
  Type: InputColumnDataType;
10115
+ /**
10116
+ * The sub data type of the column. Sub types are only available for decimal columns that are part of a SPICE dataset.
10117
+ */
10118
+ SubType?: ColumnDataSubType;
10089
10119
  }
10090
10120
  export type InputColumnDataType = "STRING"|"INTEGER"|"DECIMAL"|"DATETIME"|"BIT"|"BOOLEAN"|"JSON"|string;
10091
10121
  export type InputColumnList = InputColumn[];
@@ -12321,7 +12351,7 @@ declare namespace QuickSight {
12321
12351
  export type OtherCategories = "INCLUDE"|"EXCLUDE"|string;
12322
12352
  export interface OutputColumn {
12323
12353
  /**
12324
- * A display name for the dataset.
12354
+ * The display name of the column..
12325
12355
  */
12326
12356
  Name?: ColumnName;
12327
12357
  /**
@@ -12329,9 +12359,13 @@ declare namespace QuickSight {
12329
12359
  */
12330
12360
  Description?: ColumnDescriptiveText;
12331
12361
  /**
12332
- * The type.
12362
+ * The data type of the column.
12333
12363
  */
12334
12364
  Type?: ColumnDataType;
12365
+ /**
12366
+ * The sub data type of the column.
12367
+ */
12368
+ SubType?: ColumnDataSubType;
12335
12369
  }
12336
12370
  export type OutputColumnList = OutputColumn[];
12337
12371
  export interface OverrideDatasetParameterOperation {
@@ -15992,6 +16026,7 @@ declare namespace QuickSight {
15992
16026
  * A list of the associated sheets with the unique identifier and name of each sheet.
15993
16027
  */
15994
16028
  Sheets?: SheetList;
16029
+ Options?: AssetOptions;
15995
16030
  }
15996
16031
  export interface TemplateVersionDefinition {
15997
16032
  /**
@@ -16019,6 +16054,10 @@ declare namespace QuickSight {
16019
16054
  */
16020
16055
  ColumnConfigurations?: ColumnConfigurationList;
16021
16056
  AnalysisDefaults?: AnalysisDefaults;
16057
+ /**
16058
+ * An array of option definitions for a template.
16059
+ */
16060
+ Options?: AssetOptions;
16022
16061
  }
16023
16062
  export interface TemplateVersionSummary {
16024
16063
  /**
@@ -1601,6 +1601,10 @@ declare namespace RDS {
1601
1601
  * The allocated storage size in gibibytes (GiB) for all database engines except Amazon Aurora. For Aurora, AllocatedStorage always returns 1, because Aurora DB cluster storage size isn't fixed, but instead automatically adjusts as needed.
1602
1602
  */
1603
1603
  AllocatedStorage?: IntegerOptional;
1604
+ /**
1605
+ * Reserved for future use.
1606
+ */
1607
+ RdsCustomClusterConfiguration?: RdsCustomClusterConfiguration;
1604
1608
  /**
1605
1609
  * The Provisioned IOPS (I/O operations per second) value. This setting is only for non-Aurora Multi-AZ DB clusters.
1606
1610
  */
@@ -1991,6 +1995,10 @@ declare namespace RDS {
1991
1995
  * For DB clusters in serverless DB engine mode, the scaling properties of the DB cluster. Valid for Cluster Type: Aurora DB clusters only
1992
1996
  */
1993
1997
  ScalingConfiguration?: ScalingConfiguration;
1998
+ /**
1999
+ * Reserved for future use.
2000
+ */
2001
+ RdsCustomClusterConfiguration?: RdsCustomClusterConfiguration;
1994
2002
  /**
1995
2003
  * Specifies whether the DB cluster has deletion protection enabled. The database can't be deleted when deletion protection is enabled. By default, deletion protection isn't enabled. Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters
1996
2004
  */
@@ -3010,6 +3018,10 @@ declare namespace RDS {
3010
3018
  */
3011
3019
  EngineMode?: String;
3012
3020
  ScalingConfigurationInfo?: ScalingConfigurationInfo;
3021
+ /**
3022
+ * Reserved for future use.
3023
+ */
3024
+ RdsCustomClusterConfiguration?: RdsCustomClusterConfiguration;
3013
3025
  /**
3014
3026
  * Indicates whether the DB cluster has deletion protection enabled. The database can't be deleted when deletion protection is enabled.
3015
3027
  */
@@ -8012,6 +8024,16 @@ declare namespace RDS {
8012
8024
  Step?: IntegerOptional;
8013
8025
  }
8014
8026
  export type RangeList = Range[];
8027
+ export interface RdsCustomClusterConfiguration {
8028
+ /**
8029
+ * Reserved for future use.
8030
+ */
8031
+ InterconnectSubnetId?: String;
8032
+ /**
8033
+ * Reserved for future use.
8034
+ */
8035
+ TransitGatewayMulticastDomainId?: String;
8036
+ }
8015
8037
  export type ReadReplicaDBClusterIdentifierList = String[];
8016
8038
  export type ReadReplicaDBInstanceIdentifierList = String[];
8017
8039
  export type ReadReplicaIdentifierList = String[];
@@ -8559,6 +8581,10 @@ declare namespace RDS {
8559
8581
  * The network type of the DB cluster. Valid Values: IPV4 DUAL The network type is determined by the DBSubnetGroup specified for the DB cluster. A DBSubnetGroup can support only the IPv4 protocol or the IPv4 and the IPv6 protocols (DUAL). For more information, see Working with a DB instance in a VPC in the Amazon Aurora User Guide. Valid for: Aurora DB clusters only
8560
8582
  */
8561
8583
  NetworkType?: String;
8584
+ /**
8585
+ * Reserved for future use.
8586
+ */
8587
+ RdsCustomClusterConfiguration?: RdsCustomClusterConfiguration;
8562
8588
  }
8563
8589
  export interface RestoreDBClusterFromSnapshotResult {
8564
8590
  DBCluster?: DBCluster;
@@ -8670,6 +8696,10 @@ declare namespace RDS {
8670
8696
  * The resource ID of the source DB cluster from which to restore.
8671
8697
  */
8672
8698
  SourceDbClusterResourceId?: String;
8699
+ /**
8700
+ * Reserved for future use.
8701
+ */
8702
+ RdsCustomClusterConfiguration?: RdsCustomClusterConfiguration;
8673
8703
  }
8674
8704
  export interface RestoreDBClusterToPointInTimeResult {
8675
8705
  DBCluster?: DBCluster;
@@ -728,6 +728,14 @@ declare class Redshift extends Service {
728
728
  * Enables the automatic copy of snapshots from one region to another region for a specified cluster.
729
729
  */
730
730
  enableSnapshotCopy(callback?: (err: AWSError, data: Redshift.Types.EnableSnapshotCopyResult) => void): Request<Redshift.Types.EnableSnapshotCopyResult, AWSError>;
731
+ /**
732
+ * Fails over the primary compute unit of the specified Multi-AZ cluster to another Availability Zone.
733
+ */
734
+ failoverPrimaryCompute(params: Redshift.Types.FailoverPrimaryComputeInputMessage, callback?: (err: AWSError, data: Redshift.Types.FailoverPrimaryComputeResult) => void): Request<Redshift.Types.FailoverPrimaryComputeResult, AWSError>;
735
+ /**
736
+ * Fails over the primary compute unit of the specified Multi-AZ cluster to another Availability Zone.
737
+ */
738
+ failoverPrimaryCompute(callback?: (err: AWSError, data: Redshift.Types.FailoverPrimaryComputeResult) => void): Request<Redshift.Types.FailoverPrimaryComputeResult, AWSError>;
731
739
  /**
732
740
  * Returns a database user name and temporary password with temporary authorization to log on to an Amazon Redshift database. The action returns the database user name prefixed with IAM: if AutoCreate is False or IAMA: if AutoCreate is True. You can optionally specify one or more database user groups that the user will join at log on. By default, the temporary credentials expire in 900 seconds. You can optionally specify a duration between 900 seconds (15 minutes) and 3600 seconds (60 minutes). For more information, see Using IAM Authentication to Generate Database User Credentials in the Amazon Redshift Cluster Management Guide. The Identity and Access Management (IAM) user or role that runs GetClusterCredentials must have an IAM policy attached that allows access to all necessary actions and resources. For more information about permissions, see Resource Policies for GetClusterCredentials in the Amazon Redshift Cluster Management Guide. If the DbGroups parameter is specified, the IAM policy must allow the redshift:JoinGroup action with access to the listed dbgroups. In addition, if the AutoCreate parameter is set to True, then the policy must include the redshift:CreateClusterUser permission. If the DbName parameter is specified, the IAM policy must allow access to the resource dbname for the specified database name.
733
741
  */
@@ -1541,6 +1549,14 @@ declare namespace Redshift {
1541
1549
  * The IP address type for the cluster. Possible values are ipv4 and dualstack.
1542
1550
  */
1543
1551
  IpAddressType?: String;
1552
+ /**
1553
+ * A boolean value that, if true, indicates that the cluster is deployed in two Availability Zones.
1554
+ */
1555
+ MultiAZ?: String;
1556
+ /**
1557
+ * The secondary compute unit of a cluster, if Multi-AZ deployment is turned on.
1558
+ */
1559
+ MultiAZSecondary?: SecondaryClusterInfo;
1544
1560
  }
1545
1561
  export interface ClusterAssociatedToSchedule {
1546
1562
  /**
@@ -2047,6 +2063,10 @@ declare namespace Redshift {
2047
2063
  * The IP address types that the cluster supports. Possible values are ipv4 and dualstack.
2048
2064
  */
2049
2065
  IpAddressType?: String;
2066
+ /**
2067
+ * If true, Amazon Redshift will deploy the cluster in two Availability Zones (AZ).
2068
+ */
2069
+ MultiAZ?: BooleanOptional;
2050
2070
  }
2051
2071
  export interface CreateClusterParameterGroupMessage {
2052
2072
  /**
@@ -3834,6 +3854,15 @@ declare namespace Redshift {
3834
3854
  */
3835
3855
  Events?: EventList;
3836
3856
  }
3857
+ export interface FailoverPrimaryComputeInputMessage {
3858
+ /**
3859
+ * The unique identifier of the cluster for which the primary compute unit will be failed over to another Availability Zone.
3860
+ */
3861
+ ClusterIdentifier: String;
3862
+ }
3863
+ export interface FailoverPrimaryComputeResult {
3864
+ Cluster?: Cluster;
3865
+ }
3837
3866
  export interface GetClusterCredentialsMessage {
3838
3867
  /**
3839
3868
  * The name of a database user. If a user name matching DbUser exists in the database, the temporary user credentials have the same permissions as the existing user. If DbUser doesn't exist in the database and Autocreate is True, a new user is created using the value for DbUser with PUBLIC permissions. If a database user matching the value for DbUser doesn't exist and Autocreate is False, then the command succeeds but the connection attempt will fail because the user doesn't exist in the database. For more information, see CREATE USER in the Amazon Redshift Database Developer Guide. Constraints: Must be 1 to 64 alphanumeric characters or hyphens. The user name can't be PUBLIC. Must contain uppercase or lowercase letters, numbers, underscore, plus sign, period (dot), at symbol (@), or hyphen. First character must be a letter. Must not contain a colon ( : ) or slash ( / ). Cannot be a reserved word. A list of reserved words can be found in Reserved Words in the Amazon Redshift Database Developer Guide.
@@ -4356,6 +4385,10 @@ declare namespace Redshift {
4356
4385
  * The IP address types that the cluster supports. Possible values are ipv4 and dualstack.
4357
4386
  */
4358
4387
  IpAddressType?: String;
4388
+ /**
4389
+ * If true and the cluster is currently only deployed in a single Availability Zone, the cluster will be modified to be deployed in two Availability Zones.
4390
+ */
4391
+ MultiAZ?: BooleanOptional;
4359
4392
  }
4360
4393
  export interface ModifyClusterParameterGroupMessage {
4361
4394
  /**
@@ -5323,6 +5356,10 @@ declare namespace Redshift {
5323
5356
  * The IP address type for the cluster. Possible values are ipv4 and dualstack.
5324
5357
  */
5325
5358
  IpAddressType?: String;
5359
+ /**
5360
+ * If true, the snapshot will be restored to a cluster deployed in two Availability Zones.
5361
+ */
5362
+ MultiAZ?: BooleanOptional;
5326
5363
  }
5327
5364
  export interface RestoreFromClusterSnapshotResult {
5328
5365
  Cluster?: Cluster;
@@ -5568,6 +5605,16 @@ declare namespace Redshift {
5568
5605
  ScheduledActions?: ScheduledActionList;
5569
5606
  }
5570
5607
  export type ScheduledSnapshotTimeList = TStamp[];
5608
+ export interface SecondaryClusterInfo {
5609
+ /**
5610
+ * The name of the Availability Zone in which the secondary compute unit of the cluster is located.
5611
+ */
5612
+ AvailabilityZone?: String;
5613
+ /**
5614
+ * The nodes in the secondary compute unit.
5615
+ */
5616
+ ClusterNodes?: ClusterNodesList;
5617
+ }
5571
5618
  export type SensitiveString = string;
5572
5619
  export interface Snapshot {
5573
5620
  /**
@@ -16867,6 +16867,7 @@ declare namespace SageMaker {
16867
16867
  */
16868
16868
  MonitoringAlertSummaries?: MonitoringAlertSummaryList;
16869
16869
  LastMonitoringExecutionSummary?: MonitoringExecutionSummary;
16870
+ BatchTransformInput?: BatchTransformInput;
16870
16871
  }
16871
16872
  export type ModelDashboardMonitoringSchedules = ModelDashboardMonitoringSchedule[];
16872
16873
  export interface ModelDataQuality {
@@ -83,7 +83,7 @@ return /******/ (function(modules) { // webpackBootstrap
83
83
  /**
84
84
  * @constant
85
85
  */
86
- VERSION: '2.1485.0',
86
+ VERSION: '2.1487.0',
87
87
 
88
88
  /**
89
89
  * @api private