cdk-lambda-subminute 2.0.285 → 2.0.287
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +3 -3
- package/lib/cdk-lambda-subminute.js +3 -3
- package/node_modules/aws-sdk/CHANGELOG.md +16 -1
- package/node_modules/aws-sdk/README.md +1 -1
- package/node_modules/aws-sdk/apis/apprunner-2020-05-15.min.json +35 -34
- package/node_modules/aws-sdk/apis/connect-2017-08-08.min.json +503 -365
- package/node_modules/aws-sdk/apis/connect-2017-08-08.paginators.json +16 -0
- package/node_modules/aws-sdk/apis/gamelift-2015-10-01.min.json +283 -227
- package/node_modules/aws-sdk/apis/globalaccelerator-2018-08-08.min.json +251 -49
- package/node_modules/aws-sdk/apis/globalaccelerator-2018-08-08.paginators.json +12 -0
- package/node_modules/aws-sdk/apis/glue-2017-03-31.min.json +359 -318
- package/node_modules/aws-sdk/apis/network-firewall-2020-11-12.min.json +40 -17
- package/node_modules/aws-sdk/apis/quicksight-2018-04-01.min.json +353 -325
- package/node_modules/aws-sdk/apis/rds-2014-10-31.min.json +228 -206
- package/node_modules/aws-sdk/apis/redshift-2012-12-01.min.json +187 -145
- package/node_modules/aws-sdk/apis/sagemaker-2017-07-24.min.json +3 -0
- package/node_modules/aws-sdk/clients/apprunner.d.ts +5 -0
- package/node_modules/aws-sdk/clients/connect.d.ts +248 -6
- package/node_modules/aws-sdk/clients/gamelift.d.ts +33 -22
- package/node_modules/aws-sdk/clients/globalaccelerator.d.ts +254 -2
- package/node_modules/aws-sdk/clients/glue.d.ts +45 -0
- package/node_modules/aws-sdk/clients/networkfirewall.d.ts +44 -11
- package/node_modules/aws-sdk/clients/quicksight.d.ts +41 -2
- package/node_modules/aws-sdk/clients/rds.d.ts +30 -0
- package/node_modules/aws-sdk/clients/redshift.d.ts +47 -0
- package/node_modules/aws-sdk/clients/sagemaker.d.ts +1 -0
- package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +1 -1
- package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +13 -13
- package/node_modules/aws-sdk/dist/aws-sdk.js +1220 -946
- package/node_modules/aws-sdk/dist/aws-sdk.min.js +81 -81
- package/node_modules/aws-sdk/lib/core.js +1 -1
- package/node_modules/aws-sdk/package.json +1 -1
- package/package.json +3 -3
@@ -3012,6 +3012,14 @@ declare namespace Glue {
|
|
3012
3012
|
* Specifies a target that writes to a Snowflake data source.
|
3013
3013
|
*/
|
3014
3014
|
SnowflakeTarget?: SnowflakeTarget;
|
3015
|
+
/**
|
3016
|
+
* Specifies a source generated with standard connection options.
|
3017
|
+
*/
|
3018
|
+
ConnectorDataSource?: ConnectorDataSource;
|
3019
|
+
/**
|
3020
|
+
* Specifies a target generated with standard connection options.
|
3021
|
+
*/
|
3022
|
+
ConnectorDataTarget?: ConnectorDataTarget;
|
3015
3023
|
}
|
3016
3024
|
export type CodeGenConfigurationNodes = {[key: string]: CodeGenConfigurationNode};
|
3017
3025
|
export interface CodeGenEdge {
|
@@ -3315,6 +3323,43 @@ declare namespace Glue {
|
|
3315
3323
|
*/
|
3316
3324
|
Connections?: OrchestrationStringList;
|
3317
3325
|
}
|
3326
|
+
export interface ConnectorDataSource {
|
3327
|
+
/**
|
3328
|
+
* The name of this source node.
|
3329
|
+
*/
|
3330
|
+
Name: NodeName;
|
3331
|
+
/**
|
3332
|
+
* The connectionType, as provided to the underlying Glue library. This node type supports the following connection types: bigquery
|
3333
|
+
*/
|
3334
|
+
ConnectionType: EnclosedInStringProperty;
|
3335
|
+
/**
|
3336
|
+
* A map specifying connection options for the node. You can find standard connection options for the corresponding connection type in the Connection parameters section of the Glue documentation.
|
3337
|
+
*/
|
3338
|
+
Data: ConnectorOptions;
|
3339
|
+
/**
|
3340
|
+
* Specifies the data schema for this source.
|
3341
|
+
*/
|
3342
|
+
OutputSchemas?: GlueSchemas;
|
3343
|
+
}
|
3344
|
+
export interface ConnectorDataTarget {
|
3345
|
+
/**
|
3346
|
+
* The name of this target node.
|
3347
|
+
*/
|
3348
|
+
Name: NodeName;
|
3349
|
+
/**
|
3350
|
+
* The connectionType, as provided to the underlying Glue library. This node type supports the following connection types: bigquery
|
3351
|
+
*/
|
3352
|
+
ConnectionType: EnclosedInStringProperty;
|
3353
|
+
/**
|
3354
|
+
* A map specifying connection options for the node. You can find standard connection options for the corresponding connection type in the Connection parameters section of the Glue documentation.
|
3355
|
+
*/
|
3356
|
+
Data: ConnectorOptions;
|
3357
|
+
/**
|
3358
|
+
* The nodes that are inputs to the data target.
|
3359
|
+
*/
|
3360
|
+
Inputs?: OneInput;
|
3361
|
+
}
|
3362
|
+
export type ConnectorOptions = {[key: string]: GenericString};
|
3318
3363
|
export type ContextWords = NameString[];
|
3319
3364
|
export interface Crawl {
|
3320
3365
|
/**
|
@@ -52,11 +52,11 @@ declare class NetworkFirewall extends Service {
|
|
52
52
|
*/
|
53
53
|
createRuleGroup(callback?: (err: AWSError, data: NetworkFirewall.Types.CreateRuleGroupResponse) => void): Request<NetworkFirewall.Types.CreateRuleGroupResponse, AWSError>;
|
54
54
|
/**
|
55
|
-
* Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains
|
55
|
+
* Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains Certificate Manager certificate associations between and the scope configurations that Network Firewall uses to decrypt and re-encrypt traffic traveling through your firewall. After you create a TLS inspection configuration, you can associate it with a new firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
56
56
|
*/
|
57
57
|
createTLSInspectionConfiguration(params: NetworkFirewall.Types.CreateTLSInspectionConfigurationRequest, callback?: (err: AWSError, data: NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse, AWSError>;
|
58
58
|
/**
|
59
|
-
* Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains
|
59
|
+
* Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains Certificate Manager certificate associations between and the scope configurations that Network Firewall uses to decrypt and re-encrypt traffic traveling through your firewall. After you create a TLS inspection configuration, you can associate it with a new firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
60
60
|
*/
|
61
61
|
createTLSInspectionConfiguration(callback?: (err: AWSError, data: NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse, AWSError>;
|
62
62
|
/**
|
@@ -316,6 +316,21 @@ declare namespace NetworkFirewall {
|
|
316
316
|
}
|
317
317
|
export type AddressDefinition = string;
|
318
318
|
export type Addresses = Address[];
|
319
|
+
export interface AnalysisResult {
|
320
|
+
/**
|
321
|
+
* The priority number of the stateless rules identified in the analysis.
|
322
|
+
*/
|
323
|
+
IdentifiedRuleIds?: RuleIdList;
|
324
|
+
/**
|
325
|
+
* The types of rule configurations that Network Firewall analyzes your rule groups for. Network Firewall analyzes stateless rule groups for the following types of rule configurations: STATELESS_RULE_FORWARDING_ASYMMETRICALLY Cause: One or more stateless rules with the action pass or forward are forwarding traffic asymmetrically. Specifically, the rule's set of source IP addresses or their associated port numbers, don't match the set of destination IP addresses or their associated port numbers. To mitigate: Make sure that there's an existing return path. For example, if the rule allows traffic from source 10.1.0.0/24 to destination 20.1.0.0/24, you should allow return traffic from source 20.1.0.0/24 to destination 10.1.0.0/24. STATELESS_RULE_CONTAINS_TCP_FLAGS Cause: At least one stateless rule with the action pass orforward contains TCP flags that are inconsistent in the forward and return directions. To mitigate: Prevent asymmetric routing issues caused by TCP flags by following these actions: Remove unnecessary TCP flag inspections from the rules. If you need to inspect TCP flags, check that the rules correctly account for changes in TCP flags throughout the TCP connection cycle, for example SYN and ACK flags used in a 3-way TCP handshake.
|
326
|
+
*/
|
327
|
+
IdentifiedType?: IdentifiedType;
|
328
|
+
/**
|
329
|
+
* Provides analysis details for the identified rule.
|
330
|
+
*/
|
331
|
+
AnalysisDetail?: CollectionMember_String;
|
332
|
+
}
|
333
|
+
export type AnalysisResultList = AnalysisResult[];
|
319
334
|
export interface AssociateFirewallPolicyRequest {
|
320
335
|
/**
|
321
336
|
* An optional token that you can use for optimistic locking. Network Firewall returns a token to your requests that access the firewall. The token marks the state of the firewall resource at the time of the request. To make an unconditional change to the firewall, omit the token in your update request. Without the token, Network Firewall performs your updates regardless of whether the firewall has changed since you last retrieved it. To make a conditional change to the firewall, provide the token in your update request. Network Firewall uses the token to ensure that the firewall hasn't changed since you last retrieved it. If it has changed, the operation fails with an InvalidTokenException. If this happens, retrieve the firewall again to get a current copy of it with a new token. Reapply your changes as needed, then try the operation again using the new token.
|
@@ -435,11 +450,11 @@ declare namespace NetworkFirewall {
|
|
435
450
|
export type Certificates = TlsCertificateData[];
|
436
451
|
export interface CheckCertificateRevocationStatusActions {
|
437
452
|
/**
|
438
|
-
* Configures how Network Firewall processes traffic when it determines that the certificate presented by the server in the SSL/TLS connection has a revoked status. PASS - Allow the connection to continue, and pass subsequent packets to the stateful engine for inspection. DROP - Network Firewall
|
453
|
+
* Configures how Network Firewall processes traffic when it determines that the certificate presented by the server in the SSL/TLS connection has a revoked status. PASS - Allow the connection to continue, and pass subsequent packets to the stateful engine for inspection. DROP - Network Firewall closes the connection and drops subsequent packets for that connection. REJECT - Network Firewall sends a TCP reject packet back to your client. The service closes the connection and drops subsequent packets for that connection. REJECT is available only for TCP traffic.
|
439
454
|
*/
|
440
455
|
RevokedStatusAction?: RevocationCheckAction;
|
441
456
|
/**
|
442
|
-
* Configures how Network Firewall processes traffic when it determines that the certificate presented by the server in the SSL/TLS connection has an unknown status, or a status that cannot be determined for any other reason, including when the service is unable to connect to the OCSP and CRL endpoints for the certificate. PASS - Allow the connection to continue, and pass subsequent packets to the stateful engine for inspection. DROP - Network Firewall
|
457
|
+
* Configures how Network Firewall processes traffic when it determines that the certificate presented by the server in the SSL/TLS connection has an unknown status, or a status that cannot be determined for any other reason, including when the service is unable to connect to the OCSP and CRL endpoints for the certificate. PASS - Allow the connection to continue, and pass subsequent packets to the stateful engine for inspection. DROP - Network Firewall closes the connection and drops subsequent packets for that connection. REJECT - Network Firewall sends a TCP reject packet back to your client. The service closes the connection and drops subsequent packets for that connection. REJECT is available only for TCP traffic.
|
443
458
|
*/
|
444
459
|
UnknownStatusAction?: RevocationCheckAction;
|
445
460
|
}
|
@@ -574,6 +589,10 @@ declare namespace NetworkFirewall {
|
|
574
589
|
* A complex type that contains metadata about the rule group that your own rule group is copied from. You can use the metadata to keep track of updates made to the originating rule group.
|
575
590
|
*/
|
576
591
|
SourceMetadata?: SourceMetadata;
|
592
|
+
/**
|
593
|
+
* Indicates whether you want Network Firewall to analyze the stateless rules in the rule group for rule behavior such as asymmetric routing. If set to TRUE, Network Firewall runs the analysis and then creates the rule group for you. To run the stateless rule group analyzer without creating the rule group, set DryRun to TRUE.
|
594
|
+
*/
|
595
|
+
AnalyzeRuleGroup?: Boolean;
|
577
596
|
}
|
578
597
|
export interface CreateRuleGroupResponse {
|
579
598
|
/**
|
@@ -830,6 +849,10 @@ declare namespace NetworkFirewall {
|
|
830
849
|
* Indicates whether the rule group is stateless or stateful. If the rule group is stateless, it contains stateless rules. If it is stateful, it contains stateful rules. This setting is required for requests that do not include the RuleGroupARN.
|
831
850
|
*/
|
832
851
|
Type?: RuleGroupType;
|
852
|
+
/**
|
853
|
+
* Indicates whether you want Network Firewall to analyze the stateless rules in the rule group for rule behavior such as asymmetric routing. If set to TRUE, Network Firewall runs the analysis.
|
854
|
+
*/
|
855
|
+
AnalyzeRuleGroup?: Boolean;
|
833
856
|
}
|
834
857
|
export interface DescribeRuleGroupResponse {
|
835
858
|
/**
|
@@ -1156,6 +1179,7 @@ declare namespace NetworkFirewall {
|
|
1156
1179
|
export type IPSetReferenceMap = {[key: string]: IPSetReference};
|
1157
1180
|
export type IPSetReferenceName = string;
|
1158
1181
|
export type IPSets = {[key: string]: IPSet};
|
1182
|
+
export type IdentifiedType = "STATELESS_RULE_FORWARDING_ASYMMETRICALLY"|"STATELESS_RULE_CONTAINS_TCP_FLAGS"|string;
|
1159
1183
|
export type KeyId = string;
|
1160
1184
|
export type Keyword = string;
|
1161
1185
|
export type LastUpdateTime = Date;
|
@@ -1430,7 +1454,7 @@ declare namespace NetworkFirewall {
|
|
1430
1454
|
*/
|
1431
1455
|
RulesSource: RulesSource;
|
1432
1456
|
/**
|
1433
|
-
* Additional options governing how Network Firewall handles stateful rules. The policies where you use your stateful rule group must have stateful rule options settings that are compatible with these settings.
|
1457
|
+
* Additional options governing how Network Firewall handles stateful rules. The policies where you use your stateful rule group must have stateful rule options settings that are compatible with these settings. Some limitations apply; for more information, see Strict evaluation order in the Network Firewall Developer Guide.
|
1434
1458
|
*/
|
1435
1459
|
StatefulRuleOptions?: StatefulRuleOptions;
|
1436
1460
|
}
|
@@ -1501,9 +1525,14 @@ declare namespace NetworkFirewall {
|
|
1501
1525
|
* The last time that the rule group was changed.
|
1502
1526
|
*/
|
1503
1527
|
LastModifiedTime?: LastUpdateTime;
|
1528
|
+
/**
|
1529
|
+
* The list of analysis results for AnalyzeRuleGroup. If you set AnalyzeRuleGroup to TRUE in CreateRuleGroup, UpdateRuleGroup, or DescribeRuleGroup, Network Firewall analyzes the rule group and identifies the rules that might adversely effect your firewall's functionality. For example, if Network Firewall detects a rule that's routing traffic asymmetrically, which impacts the service's ability to properly process traffic, the service includes the rule in the list of analysis results.
|
1530
|
+
*/
|
1531
|
+
AnalysisResults?: AnalysisResultList;
|
1504
1532
|
}
|
1505
1533
|
export type RuleGroupType = "STATELESS"|"STATEFUL"|string;
|
1506
1534
|
export type RuleGroups = RuleGroupMetadata[];
|
1535
|
+
export type RuleIdList = CollectionMember_String[];
|
1507
1536
|
export interface RuleOption {
|
1508
1537
|
/**
|
1509
1538
|
* The keyword for the Suricata compatible rule option. You must include a sid (signature ID), and can optionally include other keywords. For information about Suricata compatible keywords, see Rule options in the Suricata documentation.
|
@@ -1530,7 +1559,7 @@ declare namespace NetworkFirewall {
|
|
1530
1559
|
}
|
1531
1560
|
export interface RulesSource {
|
1532
1561
|
/**
|
1533
|
-
* Stateful inspection criteria, provided in Suricata compatible
|
1562
|
+
* Stateful inspection criteria, provided in Suricata compatible rules. Suricata is an open-source threat detection framework that includes a standard rule-based language for network traffic inspection. These rules contain the inspection criteria and the action to take for traffic that matches the criteria, so this type of rule group doesn't have a separate action setting. You can't use the priority keyword if the RuleOrder option in StatefulRuleOptions is set to STRICT_ORDER.
|
1534
1563
|
*/
|
1535
1564
|
RulesString?: RulesString;
|
1536
1565
|
/**
|
@@ -1569,7 +1598,7 @@ declare namespace NetworkFirewall {
|
|
1569
1598
|
}
|
1570
1599
|
export interface ServerCertificateConfiguration {
|
1571
1600
|
/**
|
1572
|
-
* The list of
|
1601
|
+
* The list of server certificates to use for inbound SSL/TLS inspection.
|
1573
1602
|
*/
|
1574
1603
|
ServerCertificates?: ServerCertificates;
|
1575
1604
|
/**
|
@@ -1577,11 +1606,11 @@ declare namespace NetworkFirewall {
|
|
1577
1606
|
*/
|
1578
1607
|
Scopes?: ServerCertificateScopes;
|
1579
1608
|
/**
|
1580
|
-
* The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate
|
1609
|
+
* The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within Certificate Manager (ACM) to use for outbound SSL/TLS inspection. The following limitations apply: You can use CA certificates that you imported into ACM, but you can't generate CA certificates with ACM. You can't use certificates issued by Private Certificate Authority. For more information about configuring certificates for outbound inspection, see Using SSL/TLS certificates with certificates with TLS inspection configurations in the Network Firewall Developer Guide. For information about working with certificates in ACM, see Importing certificates in the Certificate Manager User Guide.
|
1581
1610
|
*/
|
1582
1611
|
CertificateAuthorityArn?: ResourceArn;
|
1583
1612
|
/**
|
1584
|
-
* When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status. If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To
|
1613
|
+
* When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status. If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a CertificateAuthorityArn in ServerCertificateConfiguration.
|
1585
1614
|
*/
|
1586
1615
|
CheckCertificateRevocationStatus?: CheckCertificateRevocationStatusActions;
|
1587
1616
|
}
|
@@ -1627,7 +1656,7 @@ declare namespace NetworkFirewall {
|
|
1627
1656
|
export type StatefulActions = CollectionMember_String[];
|
1628
1657
|
export interface StatefulEngineOptions {
|
1629
1658
|
/**
|
1630
|
-
* Indicates how to manage the order of stateful rule evaluation for the policy.
|
1659
|
+
* Indicates how to manage the order of stateful rule evaluation for the policy. STRICT_ORDER is the default and recommended option. With STRICT_ORDER, provide your rules in the order that you want them to be evaluated. You can then choose one or more default actions for packets that don't match any rules. Choose STRICT_ORDER to have the stateful rules engine determine the evaluation order of your rules. The default action for this rule order is PASS, followed by DROP, REJECT, and ALERT actions. Stateful rules are provided to the rule engine as Suricata compatible strings, and Suricata evaluates them based on your settings. For more information, see Evaluation order for stateful rules in the Network Firewall Developer Guide.
|
1631
1660
|
*/
|
1632
1661
|
RuleOrder?: RuleOrder;
|
1633
1662
|
/**
|
@@ -1637,7 +1666,7 @@ declare namespace NetworkFirewall {
|
|
1637
1666
|
}
|
1638
1667
|
export interface StatefulRule {
|
1639
1668
|
/**
|
1640
|
-
* Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. The actions for a stateful rule are defined as follows: PASS - Permits the packets to go to the intended destination. DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. ALERT -
|
1669
|
+
* Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. The actions for a stateful rule are defined as follows: PASS - Permits the packets to go to the intended destination. DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. ALERT - Sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with ALERT action, verify in the logs that the rule is filtering as you want, then change the action to DROP.
|
1641
1670
|
*/
|
1642
1671
|
Action: StatefulAction;
|
1643
1672
|
/**
|
@@ -2113,6 +2142,10 @@ declare namespace NetworkFirewall {
|
|
2113
2142
|
* A complex type that contains metadata about the rule group that your own rule group is copied from. You can use the metadata to keep track of updates made to the originating rule group.
|
2114
2143
|
*/
|
2115
2144
|
SourceMetadata?: SourceMetadata;
|
2145
|
+
/**
|
2146
|
+
* Indicates whether you want Network Firewall to analyze the stateless rules in the rule group for rule behavior such as asymmetric routing. If set to TRUE, Network Firewall runs the analysis and then updates the rule group for you. To run the stateless rule group analyzer without updating the rule group, set DryRun to TRUE.
|
2147
|
+
*/
|
2148
|
+
AnalyzeRuleGroup?: Boolean;
|
2116
2149
|
}
|
2117
2150
|
export interface UpdateRuleGroupResponse {
|
2118
2151
|
/**
|
@@ -1473,6 +1473,7 @@ declare namespace QuickSight {
|
|
1473
1473
|
* A list of the associated sheets with the unique identifier and name of each sheet.
|
1474
1474
|
*/
|
1475
1475
|
Sheets?: SheetList;
|
1476
|
+
Options?: AssetOptions;
|
1476
1477
|
}
|
1477
1478
|
export interface AnalysisDefaults {
|
1478
1479
|
/**
|
@@ -1506,6 +1507,10 @@ declare namespace QuickSight {
|
|
1506
1507
|
*/
|
1507
1508
|
ColumnConfigurations?: ColumnConfigurationList;
|
1508
1509
|
AnalysisDefaults?: AnalysisDefaults;
|
1510
|
+
/**
|
1511
|
+
* An array of option definitions for an analysis.
|
1512
|
+
*/
|
1513
|
+
Options?: AssetOptions;
|
1509
1514
|
}
|
1510
1515
|
export interface AnalysisError {
|
1511
1516
|
/**
|
@@ -2074,6 +2079,16 @@ declare namespace QuickSight {
|
|
2074
2079
|
S3Uri?: S3Uri;
|
2075
2080
|
}
|
2076
2081
|
export type AssetBundleResourceArns = Arn[];
|
2082
|
+
export interface AssetOptions {
|
2083
|
+
/**
|
2084
|
+
* Determines the timezone for the analysis.
|
2085
|
+
*/
|
2086
|
+
Timezone?: String;
|
2087
|
+
/**
|
2088
|
+
* Determines the week start day for an analysis.
|
2089
|
+
*/
|
2090
|
+
WeekStart?: DayOfTheWeek;
|
2091
|
+
}
|
2077
2092
|
export type AssignmentStatus = "ENABLED"|"DRAFT"|"DISABLED"|string;
|
2078
2093
|
export interface AthenaParameters {
|
2079
2094
|
/**
|
@@ -2675,6 +2690,10 @@ declare namespace QuickSight {
|
|
2675
2690
|
* New column data type.
|
2676
2691
|
*/
|
2677
2692
|
NewColumnType: ColumnDataType;
|
2693
|
+
/**
|
2694
|
+
* The sub data type of the new column. Sub types are only available for decimal columns that are part of a SPICE dataset.
|
2695
|
+
*/
|
2696
|
+
SubType?: ColumnDataSubType;
|
2678
2697
|
/**
|
2679
2698
|
* When casting a column from string to datetime type, you can supply a string in a format supported by Amazon QuickSight to denote the source data format.
|
2680
2699
|
*/
|
@@ -2849,6 +2868,7 @@ declare namespace QuickSight {
|
|
2849
2868
|
}
|
2850
2869
|
export type ColumnConfigurationList = ColumnConfiguration[];
|
2851
2870
|
export type ColumnDataRole = "DIMENSION"|"MEASURE"|string;
|
2871
|
+
export type ColumnDataSubType = "FLOAT"|"FIXED"|string;
|
2852
2872
|
export type ColumnDataType = "STRING"|"INTEGER"|"DECIMAL"|"DATETIME"|string;
|
2853
2873
|
export interface ColumnDescription {
|
2854
2874
|
/**
|
@@ -4811,6 +4831,7 @@ declare namespace QuickSight {
|
|
4811
4831
|
* A list of the associated sheets with the unique identifier and name of each sheet.
|
4812
4832
|
*/
|
4813
4833
|
Sheets?: SheetList;
|
4834
|
+
Options?: AssetOptions;
|
4814
4835
|
}
|
4815
4836
|
export interface DashboardVersionDefinition {
|
4816
4837
|
/**
|
@@ -4838,6 +4859,10 @@ declare namespace QuickSight {
|
|
4838
4859
|
*/
|
4839
4860
|
ColumnConfigurations?: ColumnConfigurationList;
|
4840
4861
|
AnalysisDefaults?: AnalysisDefaults;
|
4862
|
+
/**
|
4863
|
+
* An array of option definitions for a dashboard.
|
4864
|
+
*/
|
4865
|
+
Options?: AssetOptions;
|
4841
4866
|
}
|
4842
4867
|
export interface DashboardVersionSummary {
|
4843
4868
|
/**
|
@@ -5760,6 +5785,7 @@ declare namespace QuickSight {
|
|
5760
5785
|
CustomValue?: SensitiveTimestamp;
|
5761
5786
|
}
|
5762
5787
|
export type DayOfMonth = string;
|
5788
|
+
export type DayOfTheWeek = "SUNDAY"|"MONDAY"|"TUESDAY"|"WEDNESDAY"|"THURSDAY"|"FRIDAY"|"SATURDAY"|string;
|
5763
5789
|
export type DayOfWeek = "SUNDAY"|"MONDAY"|"TUESDAY"|"WEDNESDAY"|"THURSDAY"|"FRIDAY"|"SATURDAY"|string;
|
5764
5790
|
export type DbUsername = string;
|
5765
5791
|
export interface DecimalDatasetParameter {
|
@@ -10086,6 +10112,10 @@ declare namespace QuickSight {
|
|
10086
10112
|
* The data type of the column.
|
10087
10113
|
*/
|
10088
10114
|
Type: InputColumnDataType;
|
10115
|
+
/**
|
10116
|
+
* The sub data type of the column. Sub types are only available for decimal columns that are part of a SPICE dataset.
|
10117
|
+
*/
|
10118
|
+
SubType?: ColumnDataSubType;
|
10089
10119
|
}
|
10090
10120
|
export type InputColumnDataType = "STRING"|"INTEGER"|"DECIMAL"|"DATETIME"|"BIT"|"BOOLEAN"|"JSON"|string;
|
10091
10121
|
export type InputColumnList = InputColumn[];
|
@@ -12321,7 +12351,7 @@ declare namespace QuickSight {
|
|
12321
12351
|
export type OtherCategories = "INCLUDE"|"EXCLUDE"|string;
|
12322
12352
|
export interface OutputColumn {
|
12323
12353
|
/**
|
12324
|
-
*
|
12354
|
+
* The display name of the column..
|
12325
12355
|
*/
|
12326
12356
|
Name?: ColumnName;
|
12327
12357
|
/**
|
@@ -12329,9 +12359,13 @@ declare namespace QuickSight {
|
|
12329
12359
|
*/
|
12330
12360
|
Description?: ColumnDescriptiveText;
|
12331
12361
|
/**
|
12332
|
-
* The type.
|
12362
|
+
* The data type of the column.
|
12333
12363
|
*/
|
12334
12364
|
Type?: ColumnDataType;
|
12365
|
+
/**
|
12366
|
+
* The sub data type of the column.
|
12367
|
+
*/
|
12368
|
+
SubType?: ColumnDataSubType;
|
12335
12369
|
}
|
12336
12370
|
export type OutputColumnList = OutputColumn[];
|
12337
12371
|
export interface OverrideDatasetParameterOperation {
|
@@ -15992,6 +16026,7 @@ declare namespace QuickSight {
|
|
15992
16026
|
* A list of the associated sheets with the unique identifier and name of each sheet.
|
15993
16027
|
*/
|
15994
16028
|
Sheets?: SheetList;
|
16029
|
+
Options?: AssetOptions;
|
15995
16030
|
}
|
15996
16031
|
export interface TemplateVersionDefinition {
|
15997
16032
|
/**
|
@@ -16019,6 +16054,10 @@ declare namespace QuickSight {
|
|
16019
16054
|
*/
|
16020
16055
|
ColumnConfigurations?: ColumnConfigurationList;
|
16021
16056
|
AnalysisDefaults?: AnalysisDefaults;
|
16057
|
+
/**
|
16058
|
+
* An array of option definitions for a template.
|
16059
|
+
*/
|
16060
|
+
Options?: AssetOptions;
|
16022
16061
|
}
|
16023
16062
|
export interface TemplateVersionSummary {
|
16024
16063
|
/**
|
@@ -1601,6 +1601,10 @@ declare namespace RDS {
|
|
1601
1601
|
* The allocated storage size in gibibytes (GiB) for all database engines except Amazon Aurora. For Aurora, AllocatedStorage always returns 1, because Aurora DB cluster storage size isn't fixed, but instead automatically adjusts as needed.
|
1602
1602
|
*/
|
1603
1603
|
AllocatedStorage?: IntegerOptional;
|
1604
|
+
/**
|
1605
|
+
* Reserved for future use.
|
1606
|
+
*/
|
1607
|
+
RdsCustomClusterConfiguration?: RdsCustomClusterConfiguration;
|
1604
1608
|
/**
|
1605
1609
|
* The Provisioned IOPS (I/O operations per second) value. This setting is only for non-Aurora Multi-AZ DB clusters.
|
1606
1610
|
*/
|
@@ -1991,6 +1995,10 @@ declare namespace RDS {
|
|
1991
1995
|
* For DB clusters in serverless DB engine mode, the scaling properties of the DB cluster. Valid for Cluster Type: Aurora DB clusters only
|
1992
1996
|
*/
|
1993
1997
|
ScalingConfiguration?: ScalingConfiguration;
|
1998
|
+
/**
|
1999
|
+
* Reserved for future use.
|
2000
|
+
*/
|
2001
|
+
RdsCustomClusterConfiguration?: RdsCustomClusterConfiguration;
|
1994
2002
|
/**
|
1995
2003
|
* Specifies whether the DB cluster has deletion protection enabled. The database can't be deleted when deletion protection is enabled. By default, deletion protection isn't enabled. Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters
|
1996
2004
|
*/
|
@@ -3010,6 +3018,10 @@ declare namespace RDS {
|
|
3010
3018
|
*/
|
3011
3019
|
EngineMode?: String;
|
3012
3020
|
ScalingConfigurationInfo?: ScalingConfigurationInfo;
|
3021
|
+
/**
|
3022
|
+
* Reserved for future use.
|
3023
|
+
*/
|
3024
|
+
RdsCustomClusterConfiguration?: RdsCustomClusterConfiguration;
|
3013
3025
|
/**
|
3014
3026
|
* Indicates whether the DB cluster has deletion protection enabled. The database can't be deleted when deletion protection is enabled.
|
3015
3027
|
*/
|
@@ -8012,6 +8024,16 @@ declare namespace RDS {
|
|
8012
8024
|
Step?: IntegerOptional;
|
8013
8025
|
}
|
8014
8026
|
export type RangeList = Range[];
|
8027
|
+
export interface RdsCustomClusterConfiguration {
|
8028
|
+
/**
|
8029
|
+
* Reserved for future use.
|
8030
|
+
*/
|
8031
|
+
InterconnectSubnetId?: String;
|
8032
|
+
/**
|
8033
|
+
* Reserved for future use.
|
8034
|
+
*/
|
8035
|
+
TransitGatewayMulticastDomainId?: String;
|
8036
|
+
}
|
8015
8037
|
export type ReadReplicaDBClusterIdentifierList = String[];
|
8016
8038
|
export type ReadReplicaDBInstanceIdentifierList = String[];
|
8017
8039
|
export type ReadReplicaIdentifierList = String[];
|
@@ -8559,6 +8581,10 @@ declare namespace RDS {
|
|
8559
8581
|
* The network type of the DB cluster. Valid Values: IPV4 DUAL The network type is determined by the DBSubnetGroup specified for the DB cluster. A DBSubnetGroup can support only the IPv4 protocol or the IPv4 and the IPv6 protocols (DUAL). For more information, see Working with a DB instance in a VPC in the Amazon Aurora User Guide. Valid for: Aurora DB clusters only
|
8560
8582
|
*/
|
8561
8583
|
NetworkType?: String;
|
8584
|
+
/**
|
8585
|
+
* Reserved for future use.
|
8586
|
+
*/
|
8587
|
+
RdsCustomClusterConfiguration?: RdsCustomClusterConfiguration;
|
8562
8588
|
}
|
8563
8589
|
export interface RestoreDBClusterFromSnapshotResult {
|
8564
8590
|
DBCluster?: DBCluster;
|
@@ -8670,6 +8696,10 @@ declare namespace RDS {
|
|
8670
8696
|
* The resource ID of the source DB cluster from which to restore.
|
8671
8697
|
*/
|
8672
8698
|
SourceDbClusterResourceId?: String;
|
8699
|
+
/**
|
8700
|
+
* Reserved for future use.
|
8701
|
+
*/
|
8702
|
+
RdsCustomClusterConfiguration?: RdsCustomClusterConfiguration;
|
8673
8703
|
}
|
8674
8704
|
export interface RestoreDBClusterToPointInTimeResult {
|
8675
8705
|
DBCluster?: DBCluster;
|
@@ -728,6 +728,14 @@ declare class Redshift extends Service {
|
|
728
728
|
* Enables the automatic copy of snapshots from one region to another region for a specified cluster.
|
729
729
|
*/
|
730
730
|
enableSnapshotCopy(callback?: (err: AWSError, data: Redshift.Types.EnableSnapshotCopyResult) => void): Request<Redshift.Types.EnableSnapshotCopyResult, AWSError>;
|
731
|
+
/**
|
732
|
+
* Fails over the primary compute unit of the specified Multi-AZ cluster to another Availability Zone.
|
733
|
+
*/
|
734
|
+
failoverPrimaryCompute(params: Redshift.Types.FailoverPrimaryComputeInputMessage, callback?: (err: AWSError, data: Redshift.Types.FailoverPrimaryComputeResult) => void): Request<Redshift.Types.FailoverPrimaryComputeResult, AWSError>;
|
735
|
+
/**
|
736
|
+
* Fails over the primary compute unit of the specified Multi-AZ cluster to another Availability Zone.
|
737
|
+
*/
|
738
|
+
failoverPrimaryCompute(callback?: (err: AWSError, data: Redshift.Types.FailoverPrimaryComputeResult) => void): Request<Redshift.Types.FailoverPrimaryComputeResult, AWSError>;
|
731
739
|
/**
|
732
740
|
* Returns a database user name and temporary password with temporary authorization to log on to an Amazon Redshift database. The action returns the database user name prefixed with IAM: if AutoCreate is False or IAMA: if AutoCreate is True. You can optionally specify one or more database user groups that the user will join at log on. By default, the temporary credentials expire in 900 seconds. You can optionally specify a duration between 900 seconds (15 minutes) and 3600 seconds (60 minutes). For more information, see Using IAM Authentication to Generate Database User Credentials in the Amazon Redshift Cluster Management Guide. The Identity and Access Management (IAM) user or role that runs GetClusterCredentials must have an IAM policy attached that allows access to all necessary actions and resources. For more information about permissions, see Resource Policies for GetClusterCredentials in the Amazon Redshift Cluster Management Guide. If the DbGroups parameter is specified, the IAM policy must allow the redshift:JoinGroup action with access to the listed dbgroups. In addition, if the AutoCreate parameter is set to True, then the policy must include the redshift:CreateClusterUser permission. If the DbName parameter is specified, the IAM policy must allow access to the resource dbname for the specified database name.
|
733
741
|
*/
|
@@ -1541,6 +1549,14 @@ declare namespace Redshift {
|
|
1541
1549
|
* The IP address type for the cluster. Possible values are ipv4 and dualstack.
|
1542
1550
|
*/
|
1543
1551
|
IpAddressType?: String;
|
1552
|
+
/**
|
1553
|
+
* A boolean value that, if true, indicates that the cluster is deployed in two Availability Zones.
|
1554
|
+
*/
|
1555
|
+
MultiAZ?: String;
|
1556
|
+
/**
|
1557
|
+
* The secondary compute unit of a cluster, if Multi-AZ deployment is turned on.
|
1558
|
+
*/
|
1559
|
+
MultiAZSecondary?: SecondaryClusterInfo;
|
1544
1560
|
}
|
1545
1561
|
export interface ClusterAssociatedToSchedule {
|
1546
1562
|
/**
|
@@ -2047,6 +2063,10 @@ declare namespace Redshift {
|
|
2047
2063
|
* The IP address types that the cluster supports. Possible values are ipv4 and dualstack.
|
2048
2064
|
*/
|
2049
2065
|
IpAddressType?: String;
|
2066
|
+
/**
|
2067
|
+
* If true, Amazon Redshift will deploy the cluster in two Availability Zones (AZ).
|
2068
|
+
*/
|
2069
|
+
MultiAZ?: BooleanOptional;
|
2050
2070
|
}
|
2051
2071
|
export interface CreateClusterParameterGroupMessage {
|
2052
2072
|
/**
|
@@ -3834,6 +3854,15 @@ declare namespace Redshift {
|
|
3834
3854
|
*/
|
3835
3855
|
Events?: EventList;
|
3836
3856
|
}
|
3857
|
+
export interface FailoverPrimaryComputeInputMessage {
|
3858
|
+
/**
|
3859
|
+
* The unique identifier of the cluster for which the primary compute unit will be failed over to another Availability Zone.
|
3860
|
+
*/
|
3861
|
+
ClusterIdentifier: String;
|
3862
|
+
}
|
3863
|
+
export interface FailoverPrimaryComputeResult {
|
3864
|
+
Cluster?: Cluster;
|
3865
|
+
}
|
3837
3866
|
export interface GetClusterCredentialsMessage {
|
3838
3867
|
/**
|
3839
3868
|
* The name of a database user. If a user name matching DbUser exists in the database, the temporary user credentials have the same permissions as the existing user. If DbUser doesn't exist in the database and Autocreate is True, a new user is created using the value for DbUser with PUBLIC permissions. If a database user matching the value for DbUser doesn't exist and Autocreate is False, then the command succeeds but the connection attempt will fail because the user doesn't exist in the database. For more information, see CREATE USER in the Amazon Redshift Database Developer Guide. Constraints: Must be 1 to 64 alphanumeric characters or hyphens. The user name can't be PUBLIC. Must contain uppercase or lowercase letters, numbers, underscore, plus sign, period (dot), at symbol (@), or hyphen. First character must be a letter. Must not contain a colon ( : ) or slash ( / ). Cannot be a reserved word. A list of reserved words can be found in Reserved Words in the Amazon Redshift Database Developer Guide.
|
@@ -4356,6 +4385,10 @@ declare namespace Redshift {
|
|
4356
4385
|
* The IP address types that the cluster supports. Possible values are ipv4 and dualstack.
|
4357
4386
|
*/
|
4358
4387
|
IpAddressType?: String;
|
4388
|
+
/**
|
4389
|
+
* If true and the cluster is currently only deployed in a single Availability Zone, the cluster will be modified to be deployed in two Availability Zones.
|
4390
|
+
*/
|
4391
|
+
MultiAZ?: BooleanOptional;
|
4359
4392
|
}
|
4360
4393
|
export interface ModifyClusterParameterGroupMessage {
|
4361
4394
|
/**
|
@@ -5323,6 +5356,10 @@ declare namespace Redshift {
|
|
5323
5356
|
* The IP address type for the cluster. Possible values are ipv4 and dualstack.
|
5324
5357
|
*/
|
5325
5358
|
IpAddressType?: String;
|
5359
|
+
/**
|
5360
|
+
* If true, the snapshot will be restored to a cluster deployed in two Availability Zones.
|
5361
|
+
*/
|
5362
|
+
MultiAZ?: BooleanOptional;
|
5326
5363
|
}
|
5327
5364
|
export interface RestoreFromClusterSnapshotResult {
|
5328
5365
|
Cluster?: Cluster;
|
@@ -5568,6 +5605,16 @@ declare namespace Redshift {
|
|
5568
5605
|
ScheduledActions?: ScheduledActionList;
|
5569
5606
|
}
|
5570
5607
|
export type ScheduledSnapshotTimeList = TStamp[];
|
5608
|
+
export interface SecondaryClusterInfo {
|
5609
|
+
/**
|
5610
|
+
* The name of the Availability Zone in which the secondary compute unit of the cluster is located.
|
5611
|
+
*/
|
5612
|
+
AvailabilityZone?: String;
|
5613
|
+
/**
|
5614
|
+
* The nodes in the secondary compute unit.
|
5615
|
+
*/
|
5616
|
+
ClusterNodes?: ClusterNodesList;
|
5617
|
+
}
|
5571
5618
|
export type SensitiveString = string;
|
5572
5619
|
export interface Snapshot {
|
5573
5620
|
/**
|
@@ -16867,6 +16867,7 @@ declare namespace SageMaker {
|
|
16867
16867
|
*/
|
16868
16868
|
MonitoringAlertSummaries?: MonitoringAlertSummaryList;
|
16869
16869
|
LastMonitoringExecutionSummary?: MonitoringExecutionSummary;
|
16870
|
+
BatchTransformInput?: BatchTransformInput;
|
16870
16871
|
}
|
16871
16872
|
export type ModelDashboardMonitoringSchedules = ModelDashboardMonitoringSchedule[];
|
16872
16873
|
export interface ModelDataQuality {
|