cdk-lambda-subminute 2.0.286 → 2.0.288
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +3 -3
- package/lib/cdk-lambda-subminute.js +3 -3
- package/node_modules/aws-sdk/CHANGELOG.md +16 -1
- package/node_modules/aws-sdk/README.md +1 -1
- package/node_modules/aws-sdk/apis/apprunner-2020-05-15.min.json +35 -34
- package/node_modules/aws-sdk/apis/connect-2017-08-08.min.json +310 -277
- package/node_modules/aws-sdk/apis/gamelift-2015-10-01.min.json +283 -227
- package/node_modules/aws-sdk/apis/glue-2017-03-31.min.json +359 -318
- package/node_modules/aws-sdk/apis/iotwireless-2020-11-22.min.json +1 -0
- package/node_modules/aws-sdk/apis/launch-wizard-2018-05-10.examples.json +5 -0
- package/node_modules/aws-sdk/apis/launch-wizard-2018-05-10.min.json +312 -0
- package/node_modules/aws-sdk/apis/launch-wizard-2018-05-10.paginators.json +28 -0
- package/node_modules/aws-sdk/apis/metadata.json +4 -0
- package/node_modules/aws-sdk/apis/network-firewall-2020-11-12.min.json +40 -17
- package/node_modules/aws-sdk/apis/quicksight-2018-04-01.min.json +353 -325
- package/node_modules/aws-sdk/clients/all.d.ts +1 -0
- package/node_modules/aws-sdk/clients/all.js +2 -1
- package/node_modules/aws-sdk/clients/apprunner.d.ts +5 -0
- package/node_modules/aws-sdk/clients/configservice.d.ts +1 -1
- package/node_modules/aws-sdk/clients/connect.d.ts +37 -1
- package/node_modules/aws-sdk/clients/gamelift.d.ts +33 -22
- package/node_modules/aws-sdk/clients/glue.d.ts +45 -0
- package/node_modules/aws-sdk/clients/iotwireless.d.ts +8 -4
- package/node_modules/aws-sdk/clients/launchwizard.d.ts +450 -0
- package/node_modules/aws-sdk/clients/launchwizard.js +18 -0
- package/node_modules/aws-sdk/clients/networkfirewall.d.ts +44 -11
- package/node_modules/aws-sdk/clients/quicksight.d.ts +41 -2
- package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +2 -2
- package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +48 -11
- package/node_modules/aws-sdk/dist/aws-sdk.js +600 -507
- package/node_modules/aws-sdk/dist/aws-sdk.min.js +81 -81
- package/node_modules/aws-sdk/lib/config_service_placeholders.d.ts +2 -0
- package/node_modules/aws-sdk/lib/core.js +1 -1
- package/node_modules/aws-sdk/lib/credentials/ec2_metadata_credentials.d.ts +14 -0
- package/node_modules/aws-sdk/lib/credentials/ec2_metadata_credentials.js +1 -0
- package/node_modules/aws-sdk/lib/metadata_service.d.ts +16 -1
- package/node_modules/aws-sdk/lib/metadata_service.js +36 -0
- package/node_modules/aws-sdk/package.json +1 -1
- package/package.json +3 -3
@@ -0,0 +1,450 @@
|
|
1
|
+
import {Request} from '../lib/request';
|
2
|
+
import {Response} from '../lib/response';
|
3
|
+
import {AWSError} from '../lib/error';
|
4
|
+
import {Service} from '../lib/service';
|
5
|
+
import {ServiceConfigurationOptions} from '../lib/service';
|
6
|
+
import {ConfigBase as Config} from '../lib/config-base';
|
7
|
+
interface Blob {}
|
8
|
+
declare class LaunchWizard extends Service {
|
9
|
+
/**
|
10
|
+
* Constructs a service object. This object has one method for each API operation.
|
11
|
+
*/
|
12
|
+
constructor(options?: LaunchWizard.Types.ClientConfiguration)
|
13
|
+
config: Config & LaunchWizard.Types.ClientConfiguration;
|
14
|
+
/**
|
15
|
+
* Creates a deployment for the given workload. Deployments created by this operation are not available in the Launch Wizard console to use the Clone deployment action on.
|
16
|
+
*/
|
17
|
+
createDeployment(params: LaunchWizard.Types.CreateDeploymentInput, callback?: (err: AWSError, data: LaunchWizard.Types.CreateDeploymentOutput) => void): Request<LaunchWizard.Types.CreateDeploymentOutput, AWSError>;
|
18
|
+
/**
|
19
|
+
* Creates a deployment for the given workload. Deployments created by this operation are not available in the Launch Wizard console to use the Clone deployment action on.
|
20
|
+
*/
|
21
|
+
createDeployment(callback?: (err: AWSError, data: LaunchWizard.Types.CreateDeploymentOutput) => void): Request<LaunchWizard.Types.CreateDeploymentOutput, AWSError>;
|
22
|
+
/**
|
23
|
+
* Deletes a deployment.
|
24
|
+
*/
|
25
|
+
deleteDeployment(params: LaunchWizard.Types.DeleteDeploymentInput, callback?: (err: AWSError, data: LaunchWizard.Types.DeleteDeploymentOutput) => void): Request<LaunchWizard.Types.DeleteDeploymentOutput, AWSError>;
|
26
|
+
/**
|
27
|
+
* Deletes a deployment.
|
28
|
+
*/
|
29
|
+
deleteDeployment(callback?: (err: AWSError, data: LaunchWizard.Types.DeleteDeploymentOutput) => void): Request<LaunchWizard.Types.DeleteDeploymentOutput, AWSError>;
|
30
|
+
/**
|
31
|
+
* Returns information about the deployment.
|
32
|
+
*/
|
33
|
+
getDeployment(params: LaunchWizard.Types.GetDeploymentInput, callback?: (err: AWSError, data: LaunchWizard.Types.GetDeploymentOutput) => void): Request<LaunchWizard.Types.GetDeploymentOutput, AWSError>;
|
34
|
+
/**
|
35
|
+
* Returns information about the deployment.
|
36
|
+
*/
|
37
|
+
getDeployment(callback?: (err: AWSError, data: LaunchWizard.Types.GetDeploymentOutput) => void): Request<LaunchWizard.Types.GetDeploymentOutput, AWSError>;
|
38
|
+
/**
|
39
|
+
* Returns information about a workload.
|
40
|
+
*/
|
41
|
+
getWorkload(params: LaunchWizard.Types.GetWorkloadInput, callback?: (err: AWSError, data: LaunchWizard.Types.GetWorkloadOutput) => void): Request<LaunchWizard.Types.GetWorkloadOutput, AWSError>;
|
42
|
+
/**
|
43
|
+
* Returns information about a workload.
|
44
|
+
*/
|
45
|
+
getWorkload(callback?: (err: AWSError, data: LaunchWizard.Types.GetWorkloadOutput) => void): Request<LaunchWizard.Types.GetWorkloadOutput, AWSError>;
|
46
|
+
/**
|
47
|
+
* Lists the events of a deployment.
|
48
|
+
*/
|
49
|
+
listDeploymentEvents(params: LaunchWizard.Types.ListDeploymentEventsInput, callback?: (err: AWSError, data: LaunchWizard.Types.ListDeploymentEventsOutput) => void): Request<LaunchWizard.Types.ListDeploymentEventsOutput, AWSError>;
|
50
|
+
/**
|
51
|
+
* Lists the events of a deployment.
|
52
|
+
*/
|
53
|
+
listDeploymentEvents(callback?: (err: AWSError, data: LaunchWizard.Types.ListDeploymentEventsOutput) => void): Request<LaunchWizard.Types.ListDeploymentEventsOutput, AWSError>;
|
54
|
+
/**
|
55
|
+
* Lists the deployments that have been created.
|
56
|
+
*/
|
57
|
+
listDeployments(params: LaunchWizard.Types.ListDeploymentsInput, callback?: (err: AWSError, data: LaunchWizard.Types.ListDeploymentsOutput) => void): Request<LaunchWizard.Types.ListDeploymentsOutput, AWSError>;
|
58
|
+
/**
|
59
|
+
* Lists the deployments that have been created.
|
60
|
+
*/
|
61
|
+
listDeployments(callback?: (err: AWSError, data: LaunchWizard.Types.ListDeploymentsOutput) => void): Request<LaunchWizard.Types.ListDeploymentsOutput, AWSError>;
|
62
|
+
/**
|
63
|
+
* Lists the workload deployment patterns.
|
64
|
+
*/
|
65
|
+
listWorkloadDeploymentPatterns(params: LaunchWizard.Types.ListWorkloadDeploymentPatternsInput, callback?: (err: AWSError, data: LaunchWizard.Types.ListWorkloadDeploymentPatternsOutput) => void): Request<LaunchWizard.Types.ListWorkloadDeploymentPatternsOutput, AWSError>;
|
66
|
+
/**
|
67
|
+
* Lists the workload deployment patterns.
|
68
|
+
*/
|
69
|
+
listWorkloadDeploymentPatterns(callback?: (err: AWSError, data: LaunchWizard.Types.ListWorkloadDeploymentPatternsOutput) => void): Request<LaunchWizard.Types.ListWorkloadDeploymentPatternsOutput, AWSError>;
|
70
|
+
/**
|
71
|
+
* Lists the workloads.
|
72
|
+
*/
|
73
|
+
listWorkloads(params: LaunchWizard.Types.ListWorkloadsInput, callback?: (err: AWSError, data: LaunchWizard.Types.ListWorkloadsOutput) => void): Request<LaunchWizard.Types.ListWorkloadsOutput, AWSError>;
|
74
|
+
/**
|
75
|
+
* Lists the workloads.
|
76
|
+
*/
|
77
|
+
listWorkloads(callback?: (err: AWSError, data: LaunchWizard.Types.ListWorkloadsOutput) => void): Request<LaunchWizard.Types.ListWorkloadsOutput, AWSError>;
|
78
|
+
}
|
79
|
+
declare namespace LaunchWizard {
|
80
|
+
export type Boolean = boolean;
|
81
|
+
export interface CreateDeploymentInput {
|
82
|
+
/**
|
83
|
+
* The name of the deployment pattern supported by a given workload. You can use the ListWorkloadDeploymentPatterns operation to discover supported values for this parameter.
|
84
|
+
*/
|
85
|
+
deploymentPatternName: DeploymentPatternName;
|
86
|
+
/**
|
87
|
+
* Checks whether you have the required permissions for the action, without actually making the request, and provides an error response. If you have the required permissions, the error response is DryRunOperation. Otherwise, it is UnauthorizedOperation.
|
88
|
+
*/
|
89
|
+
dryRun?: Boolean;
|
90
|
+
/**
|
91
|
+
* The name of the deployment.
|
92
|
+
*/
|
93
|
+
name: DeploymentName;
|
94
|
+
/**
|
95
|
+
* The settings specified for the deployment. For more information on the specifications required for creating a deployment, see Workload specifications.
|
96
|
+
*/
|
97
|
+
specifications: DeploymentSpecifications;
|
98
|
+
/**
|
99
|
+
* The name of the workload. You can use the ListWorkloadDeploymentPatterns operation to discover supported values for this parameter.
|
100
|
+
*/
|
101
|
+
workloadName: WorkloadName;
|
102
|
+
}
|
103
|
+
export interface CreateDeploymentOutput {
|
104
|
+
/**
|
105
|
+
* The ID of the deployment.
|
106
|
+
*/
|
107
|
+
deploymentId?: DeploymentId;
|
108
|
+
}
|
109
|
+
export interface DeleteDeploymentInput {
|
110
|
+
/**
|
111
|
+
* The ID of the deployment.
|
112
|
+
*/
|
113
|
+
deploymentId: DeploymentId;
|
114
|
+
}
|
115
|
+
export interface DeleteDeploymentOutput {
|
116
|
+
/**
|
117
|
+
* The status of the deployment.
|
118
|
+
*/
|
119
|
+
status?: DeploymentStatus;
|
120
|
+
/**
|
121
|
+
* The reason for the deployment status.
|
122
|
+
*/
|
123
|
+
statusReason?: String;
|
124
|
+
}
|
125
|
+
export interface DeploymentData {
|
126
|
+
/**
|
127
|
+
* The time the deployment was created.
|
128
|
+
*/
|
129
|
+
createdAt?: Timestamp;
|
130
|
+
/**
|
131
|
+
* The time the deployment was deleted.
|
132
|
+
*/
|
133
|
+
deletedAt?: Timestamp;
|
134
|
+
/**
|
135
|
+
* The ID of the deployment.
|
136
|
+
*/
|
137
|
+
id?: DeploymentId;
|
138
|
+
/**
|
139
|
+
* The name of the deployment.
|
140
|
+
*/
|
141
|
+
name?: String;
|
142
|
+
/**
|
143
|
+
* The pattern name of the deployment.
|
144
|
+
*/
|
145
|
+
patternName?: DeploymentPatternName;
|
146
|
+
/**
|
147
|
+
* The resource group of the deployment.
|
148
|
+
*/
|
149
|
+
resourceGroup?: String;
|
150
|
+
/**
|
151
|
+
* The specifications of the deployment. For more information on specifications for each deployment, see Workload specifications.
|
152
|
+
*/
|
153
|
+
specifications?: DeploymentSpecifications;
|
154
|
+
/**
|
155
|
+
* The status of the deployment.
|
156
|
+
*/
|
157
|
+
status?: DeploymentStatus;
|
158
|
+
/**
|
159
|
+
* The name of the workload.
|
160
|
+
*/
|
161
|
+
workloadName?: WorkloadName;
|
162
|
+
}
|
163
|
+
export interface DeploymentDataSummary {
|
164
|
+
/**
|
165
|
+
* The time the deployment was created.
|
166
|
+
*/
|
167
|
+
createdAt?: Timestamp;
|
168
|
+
/**
|
169
|
+
* The ID of the deployment.
|
170
|
+
*/
|
171
|
+
id?: DeploymentId;
|
172
|
+
/**
|
173
|
+
* The name of the deployment
|
174
|
+
*/
|
175
|
+
name?: String;
|
176
|
+
/**
|
177
|
+
* The name of the workload deployment pattern.
|
178
|
+
*/
|
179
|
+
patternName?: DeploymentPatternName;
|
180
|
+
/**
|
181
|
+
* The status of the deployment.
|
182
|
+
*/
|
183
|
+
status?: DeploymentStatus;
|
184
|
+
/**
|
185
|
+
* The name of the workload.
|
186
|
+
*/
|
187
|
+
workloadName?: WorkloadName;
|
188
|
+
}
|
189
|
+
export type DeploymentDataSummaryList = DeploymentDataSummary[];
|
190
|
+
export interface DeploymentEventDataSummary {
|
191
|
+
/**
|
192
|
+
* The description of the deployment event.
|
193
|
+
*/
|
194
|
+
description?: String;
|
195
|
+
/**
|
196
|
+
* The name of the deployment event.
|
197
|
+
*/
|
198
|
+
name?: String;
|
199
|
+
/**
|
200
|
+
* The status of the deployment event.
|
201
|
+
*/
|
202
|
+
status?: EventStatus;
|
203
|
+
/**
|
204
|
+
* The reason of the deployment event status.
|
205
|
+
*/
|
206
|
+
statusReason?: String;
|
207
|
+
/**
|
208
|
+
* The timestamp of the deployment event.
|
209
|
+
*/
|
210
|
+
timestamp?: Timestamp;
|
211
|
+
}
|
212
|
+
export type DeploymentEventDataSummaryList = DeploymentEventDataSummary[];
|
213
|
+
export interface DeploymentFilter {
|
214
|
+
/**
|
215
|
+
* The name of the filter. Filter names are case-sensitive.
|
216
|
+
*/
|
217
|
+
name?: DeploymentFilterKey;
|
218
|
+
/**
|
219
|
+
* The filter values. Filter values are case-sensitive. If you specify multiple values for a filter, the values are joined with an OR, and the request returns all results that match any of the specified values.
|
220
|
+
*/
|
221
|
+
values?: DeploymentFilterValues;
|
222
|
+
}
|
223
|
+
export type DeploymentFilterKey = "WORKLOAD_NAME"|"DEPLOYMENT_STATUS"|string;
|
224
|
+
export type DeploymentFilterList = DeploymentFilter[];
|
225
|
+
export type DeploymentFilterValues = DeploymentFilterValuesMemberString[];
|
226
|
+
export type DeploymentFilterValuesMemberString = string;
|
227
|
+
export type DeploymentId = string;
|
228
|
+
export type DeploymentName = string;
|
229
|
+
export type DeploymentPatternName = string;
|
230
|
+
export type DeploymentSpecifications = {[key: string]: ValueString};
|
231
|
+
export type DeploymentStatus = "COMPLETED"|"CREATING"|"DELETE_IN_PROGRESS"|"DELETE_INITIATING"|"DELETE_FAILED"|"DELETED"|"FAILED"|"IN_PROGRESS"|"VALIDATING"|string;
|
232
|
+
export type EventStatus = "CANCELED"|"CANCELING"|"COMPLETED"|"CREATED"|"FAILED"|"IN_PROGRESS"|"PENDING"|"TIMED_OUT"|string;
|
233
|
+
export interface GetDeploymentInput {
|
234
|
+
/**
|
235
|
+
* The ID of the deployment.
|
236
|
+
*/
|
237
|
+
deploymentId: DeploymentId;
|
238
|
+
}
|
239
|
+
export interface GetDeploymentOutput {
|
240
|
+
/**
|
241
|
+
* An object that details the deployment.
|
242
|
+
*/
|
243
|
+
deployment?: DeploymentData;
|
244
|
+
}
|
245
|
+
export interface GetWorkloadInput {
|
246
|
+
/**
|
247
|
+
* The name of the workload.
|
248
|
+
*/
|
249
|
+
workloadName: WorkloadName;
|
250
|
+
}
|
251
|
+
export interface GetWorkloadOutput {
|
252
|
+
/**
|
253
|
+
* Information about the workload.
|
254
|
+
*/
|
255
|
+
workload?: WorkloadData;
|
256
|
+
}
|
257
|
+
export type KeyString = string;
|
258
|
+
export interface ListDeploymentEventsInput {
|
259
|
+
/**
|
260
|
+
* The ID of the deployment.
|
261
|
+
*/
|
262
|
+
deploymentId: DeploymentId;
|
263
|
+
/**
|
264
|
+
* The maximum number of items to return for this request. To get the next page of items, make another request with the token returned in the output.
|
265
|
+
*/
|
266
|
+
maxResults?: MaxDeploymentEventResults;
|
267
|
+
/**
|
268
|
+
* The token returned from a previous paginated request. Pagination continues from the end of the items returned by the previous request.
|
269
|
+
*/
|
270
|
+
nextToken?: NextToken;
|
271
|
+
}
|
272
|
+
export interface ListDeploymentEventsOutput {
|
273
|
+
/**
|
274
|
+
* Lists the deployment events.
|
275
|
+
*/
|
276
|
+
deploymentEvents?: DeploymentEventDataSummaryList;
|
277
|
+
/**
|
278
|
+
* The token to include in another request to get the next page of items. This value is null when there are no more items to return.
|
279
|
+
*/
|
280
|
+
nextToken?: NextToken;
|
281
|
+
}
|
282
|
+
export interface ListDeploymentsInput {
|
283
|
+
/**
|
284
|
+
* Filters to scope the results. The following filters are supported: WORKLOAD_NAME DEPLOYMENT_STATUS
|
285
|
+
*/
|
286
|
+
filters?: DeploymentFilterList;
|
287
|
+
/**
|
288
|
+
* The maximum number of items to return for this request. To get the next page of items, make another request with the token returned in the output.
|
289
|
+
*/
|
290
|
+
maxResults?: MaxDeploymentResults;
|
291
|
+
/**
|
292
|
+
* The token returned from a previous paginated request. Pagination continues from the end of the items returned by the previous request.
|
293
|
+
*/
|
294
|
+
nextToken?: NextToken;
|
295
|
+
}
|
296
|
+
export interface ListDeploymentsOutput {
|
297
|
+
/**
|
298
|
+
* Lists the deployments.
|
299
|
+
*/
|
300
|
+
deployments?: DeploymentDataSummaryList;
|
301
|
+
/**
|
302
|
+
* The token to include in another request to get the next page of items. This value is null when there are no more items to return.
|
303
|
+
*/
|
304
|
+
nextToken?: NextToken;
|
305
|
+
}
|
306
|
+
export interface ListWorkloadDeploymentPatternsInput {
|
307
|
+
/**
|
308
|
+
* The maximum number of items to return for this request. To get the next page of items, make another request with the token returned in the output.
|
309
|
+
*/
|
310
|
+
maxResults?: MaxWorkloadDeploymentPatternResults;
|
311
|
+
/**
|
312
|
+
* The token returned from a previous paginated request. Pagination continues from the end of the items returned by the previous request.
|
313
|
+
*/
|
314
|
+
nextToken?: NextToken;
|
315
|
+
/**
|
316
|
+
* The name of the workload.
|
317
|
+
*/
|
318
|
+
workloadName: WorkloadName;
|
319
|
+
}
|
320
|
+
export interface ListWorkloadDeploymentPatternsOutput {
|
321
|
+
/**
|
322
|
+
* The token to include in another request to get the next page of items. This value is null when there are no more items to return.
|
323
|
+
*/
|
324
|
+
nextToken?: NextToken;
|
325
|
+
/**
|
326
|
+
* Describes the workload deployment patterns.
|
327
|
+
*/
|
328
|
+
workloadDeploymentPatterns?: WorkloadDeploymentPatternDataSummaryList;
|
329
|
+
}
|
330
|
+
export interface ListWorkloadsInput {
|
331
|
+
/**
|
332
|
+
* The maximum number of items to return for this request. To get the next page of items, make another request with the token returned in the output.
|
333
|
+
*/
|
334
|
+
maxResults?: MaxWorkloadResults;
|
335
|
+
/**
|
336
|
+
* The token returned from a previous paginated request. Pagination continues from the end of the items returned by the previous request.
|
337
|
+
*/
|
338
|
+
nextToken?: NextToken;
|
339
|
+
}
|
340
|
+
export interface ListWorkloadsOutput {
|
341
|
+
/**
|
342
|
+
* The token to include in another request to get the next page of items. This value is null when there are no more items to return.
|
343
|
+
*/
|
344
|
+
nextToken?: NextToken;
|
345
|
+
/**
|
346
|
+
* Information about the workloads.
|
347
|
+
*/
|
348
|
+
workloads?: WorkloadDataSummaryList;
|
349
|
+
}
|
350
|
+
export type MaxDeploymentEventResults = number;
|
351
|
+
export type MaxDeploymentResults = number;
|
352
|
+
export type MaxWorkloadDeploymentPatternResults = number;
|
353
|
+
export type MaxWorkloadResults = number;
|
354
|
+
export type NextToken = string;
|
355
|
+
export type String = string;
|
356
|
+
export type Timestamp = Date;
|
357
|
+
export type ValueString = string;
|
358
|
+
export interface WorkloadData {
|
359
|
+
/**
|
360
|
+
* The description of a workload.
|
361
|
+
*/
|
362
|
+
description?: String;
|
363
|
+
/**
|
364
|
+
* The display name of a workload.
|
365
|
+
*/
|
366
|
+
displayName?: String;
|
367
|
+
/**
|
368
|
+
* The URL of a workload document.
|
369
|
+
*/
|
370
|
+
documentationUrl?: String;
|
371
|
+
/**
|
372
|
+
* The URL of a workload icon.
|
373
|
+
*/
|
374
|
+
iconUrl?: String;
|
375
|
+
/**
|
376
|
+
* The status of a workload.
|
377
|
+
*/
|
378
|
+
status?: WorkloadStatus;
|
379
|
+
/**
|
380
|
+
* The message about a workload's status.
|
381
|
+
*/
|
382
|
+
statusMessage?: String;
|
383
|
+
/**
|
384
|
+
* The name of the workload.
|
385
|
+
*/
|
386
|
+
workloadName?: WorkloadName;
|
387
|
+
}
|
388
|
+
export interface WorkloadDataSummary {
|
389
|
+
/**
|
390
|
+
* The display name of the workload data.
|
391
|
+
*/
|
392
|
+
displayName?: String;
|
393
|
+
/**
|
394
|
+
* The name of the workload.
|
395
|
+
*/
|
396
|
+
workloadName?: WorkloadName;
|
397
|
+
}
|
398
|
+
export type WorkloadDataSummaryList = WorkloadDataSummary[];
|
399
|
+
export interface WorkloadDeploymentPatternDataSummary {
|
400
|
+
/**
|
401
|
+
* The name of a workload deployment pattern.
|
402
|
+
*/
|
403
|
+
deploymentPatternName?: DeploymentPatternName;
|
404
|
+
/**
|
405
|
+
* The description of a workload deployment pattern.
|
406
|
+
*/
|
407
|
+
description?: String;
|
408
|
+
/**
|
409
|
+
* The display name of a workload deployment pattern.
|
410
|
+
*/
|
411
|
+
displayName?: String;
|
412
|
+
/**
|
413
|
+
* The status of a workload deployment pattern.
|
414
|
+
*/
|
415
|
+
status?: WorkloadDeploymentPatternStatus;
|
416
|
+
/**
|
417
|
+
* A message about a workload deployment pattern's status.
|
418
|
+
*/
|
419
|
+
statusMessage?: String;
|
420
|
+
/**
|
421
|
+
* The name of the workload.
|
422
|
+
*/
|
423
|
+
workloadName?: WorkloadName;
|
424
|
+
/**
|
425
|
+
* The name of the workload deployment pattern version.
|
426
|
+
*/
|
427
|
+
workloadVersionName?: WorkloadVersionName;
|
428
|
+
}
|
429
|
+
export type WorkloadDeploymentPatternDataSummaryList = WorkloadDeploymentPatternDataSummary[];
|
430
|
+
export type WorkloadDeploymentPatternStatus = "ACTIVE"|"INACTIVE"|"DISABLED"|"DELETED"|string;
|
431
|
+
export type WorkloadName = string;
|
432
|
+
export type WorkloadStatus = "ACTIVE"|"INACTIVE"|"DISABLED"|"DELETED"|string;
|
433
|
+
export type WorkloadVersionName = string;
|
434
|
+
/**
|
435
|
+
* A string in YYYY-MM-DD format that represents the latest possible API version that can be used in this service. Specify 'latest' to use the latest possible version.
|
436
|
+
*/
|
437
|
+
export type apiVersion = "2018-05-10"|"latest"|string;
|
438
|
+
export interface ClientApiVersions {
|
439
|
+
/**
|
440
|
+
* A string in YYYY-MM-DD format that represents the latest possible API version that can be used in this service. Specify 'latest' to use the latest possible version.
|
441
|
+
*/
|
442
|
+
apiVersion?: apiVersion;
|
443
|
+
}
|
444
|
+
export type ClientConfiguration = ServiceConfigurationOptions & ClientApiVersions;
|
445
|
+
/**
|
446
|
+
* Contains interfaces for use with the LaunchWizard client.
|
447
|
+
*/
|
448
|
+
export import Types = LaunchWizard;
|
449
|
+
}
|
450
|
+
export = LaunchWizard;
|
@@ -0,0 +1,18 @@
|
|
1
|
+
require('../lib/node_loader');
|
2
|
+
var AWS = require('../lib/core');
|
3
|
+
var Service = AWS.Service;
|
4
|
+
var apiLoader = AWS.apiLoader;
|
5
|
+
|
6
|
+
apiLoader.services['launchwizard'] = {};
|
7
|
+
AWS.LaunchWizard = Service.defineService('launchwizard', ['2018-05-10']);
|
8
|
+
Object.defineProperty(apiLoader.services['launchwizard'], '2018-05-10', {
|
9
|
+
get: function get() {
|
10
|
+
var model = require('../apis/launch-wizard-2018-05-10.min.json');
|
11
|
+
model.paginators = require('../apis/launch-wizard-2018-05-10.paginators.json').pagination;
|
12
|
+
return model;
|
13
|
+
},
|
14
|
+
enumerable: true,
|
15
|
+
configurable: true
|
16
|
+
});
|
17
|
+
|
18
|
+
module.exports = AWS.LaunchWizard;
|
@@ -52,11 +52,11 @@ declare class NetworkFirewall extends Service {
|
|
52
52
|
*/
|
53
53
|
createRuleGroup(callback?: (err: AWSError, data: NetworkFirewall.Types.CreateRuleGroupResponse) => void): Request<NetworkFirewall.Types.CreateRuleGroupResponse, AWSError>;
|
54
54
|
/**
|
55
|
-
* Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains
|
55
|
+
* Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains Certificate Manager certificate associations between and the scope configurations that Network Firewall uses to decrypt and re-encrypt traffic traveling through your firewall. After you create a TLS inspection configuration, you can associate it with a new firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
56
56
|
*/
|
57
57
|
createTLSInspectionConfiguration(params: NetworkFirewall.Types.CreateTLSInspectionConfigurationRequest, callback?: (err: AWSError, data: NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse, AWSError>;
|
58
58
|
/**
|
59
|
-
* Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains
|
59
|
+
* Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains Certificate Manager certificate associations between and the scope configurations that Network Firewall uses to decrypt and re-encrypt traffic traveling through your firewall. After you create a TLS inspection configuration, you can associate it with a new firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
60
60
|
*/
|
61
61
|
createTLSInspectionConfiguration(callback?: (err: AWSError, data: NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse, AWSError>;
|
62
62
|
/**
|
@@ -316,6 +316,21 @@ declare namespace NetworkFirewall {
|
|
316
316
|
}
|
317
317
|
export type AddressDefinition = string;
|
318
318
|
export type Addresses = Address[];
|
319
|
+
export interface AnalysisResult {
|
320
|
+
/**
|
321
|
+
* The priority number of the stateless rules identified in the analysis.
|
322
|
+
*/
|
323
|
+
IdentifiedRuleIds?: RuleIdList;
|
324
|
+
/**
|
325
|
+
* The types of rule configurations that Network Firewall analyzes your rule groups for. Network Firewall analyzes stateless rule groups for the following types of rule configurations: STATELESS_RULE_FORWARDING_ASYMMETRICALLY Cause: One or more stateless rules with the action pass or forward are forwarding traffic asymmetrically. Specifically, the rule's set of source IP addresses or their associated port numbers, don't match the set of destination IP addresses or their associated port numbers. To mitigate: Make sure that there's an existing return path. For example, if the rule allows traffic from source 10.1.0.0/24 to destination 20.1.0.0/24, you should allow return traffic from source 20.1.0.0/24 to destination 10.1.0.0/24. STATELESS_RULE_CONTAINS_TCP_FLAGS Cause: At least one stateless rule with the action pass orforward contains TCP flags that are inconsistent in the forward and return directions. To mitigate: Prevent asymmetric routing issues caused by TCP flags by following these actions: Remove unnecessary TCP flag inspections from the rules. If you need to inspect TCP flags, check that the rules correctly account for changes in TCP flags throughout the TCP connection cycle, for example SYN and ACK flags used in a 3-way TCP handshake.
|
326
|
+
*/
|
327
|
+
IdentifiedType?: IdentifiedType;
|
328
|
+
/**
|
329
|
+
* Provides analysis details for the identified rule.
|
330
|
+
*/
|
331
|
+
AnalysisDetail?: CollectionMember_String;
|
332
|
+
}
|
333
|
+
export type AnalysisResultList = AnalysisResult[];
|
319
334
|
export interface AssociateFirewallPolicyRequest {
|
320
335
|
/**
|
321
336
|
* An optional token that you can use for optimistic locking. Network Firewall returns a token to your requests that access the firewall. The token marks the state of the firewall resource at the time of the request. To make an unconditional change to the firewall, omit the token in your update request. Without the token, Network Firewall performs your updates regardless of whether the firewall has changed since you last retrieved it. To make a conditional change to the firewall, provide the token in your update request. Network Firewall uses the token to ensure that the firewall hasn't changed since you last retrieved it. If it has changed, the operation fails with an InvalidTokenException. If this happens, retrieve the firewall again to get a current copy of it with a new token. Reapply your changes as needed, then try the operation again using the new token.
|
@@ -435,11 +450,11 @@ declare namespace NetworkFirewall {
|
|
435
450
|
export type Certificates = TlsCertificateData[];
|
436
451
|
export interface CheckCertificateRevocationStatusActions {
|
437
452
|
/**
|
438
|
-
* Configures how Network Firewall processes traffic when it determines that the certificate presented by the server in the SSL/TLS connection has a revoked status. PASS - Allow the connection to continue, and pass subsequent packets to the stateful engine for inspection. DROP - Network Firewall
|
453
|
+
* Configures how Network Firewall processes traffic when it determines that the certificate presented by the server in the SSL/TLS connection has a revoked status. PASS - Allow the connection to continue, and pass subsequent packets to the stateful engine for inspection. DROP - Network Firewall closes the connection and drops subsequent packets for that connection. REJECT - Network Firewall sends a TCP reject packet back to your client. The service closes the connection and drops subsequent packets for that connection. REJECT is available only for TCP traffic.
|
439
454
|
*/
|
440
455
|
RevokedStatusAction?: RevocationCheckAction;
|
441
456
|
/**
|
442
|
-
* Configures how Network Firewall processes traffic when it determines that the certificate presented by the server in the SSL/TLS connection has an unknown status, or a status that cannot be determined for any other reason, including when the service is unable to connect to the OCSP and CRL endpoints for the certificate. PASS - Allow the connection to continue, and pass subsequent packets to the stateful engine for inspection. DROP - Network Firewall
|
457
|
+
* Configures how Network Firewall processes traffic when it determines that the certificate presented by the server in the SSL/TLS connection has an unknown status, or a status that cannot be determined for any other reason, including when the service is unable to connect to the OCSP and CRL endpoints for the certificate. PASS - Allow the connection to continue, and pass subsequent packets to the stateful engine for inspection. DROP - Network Firewall closes the connection and drops subsequent packets for that connection. REJECT - Network Firewall sends a TCP reject packet back to your client. The service closes the connection and drops subsequent packets for that connection. REJECT is available only for TCP traffic.
|
443
458
|
*/
|
444
459
|
UnknownStatusAction?: RevocationCheckAction;
|
445
460
|
}
|
@@ -574,6 +589,10 @@ declare namespace NetworkFirewall {
|
|
574
589
|
* A complex type that contains metadata about the rule group that your own rule group is copied from. You can use the metadata to keep track of updates made to the originating rule group.
|
575
590
|
*/
|
576
591
|
SourceMetadata?: SourceMetadata;
|
592
|
+
/**
|
593
|
+
* Indicates whether you want Network Firewall to analyze the stateless rules in the rule group for rule behavior such as asymmetric routing. If set to TRUE, Network Firewall runs the analysis and then creates the rule group for you. To run the stateless rule group analyzer without creating the rule group, set DryRun to TRUE.
|
594
|
+
*/
|
595
|
+
AnalyzeRuleGroup?: Boolean;
|
577
596
|
}
|
578
597
|
export interface CreateRuleGroupResponse {
|
579
598
|
/**
|
@@ -830,6 +849,10 @@ declare namespace NetworkFirewall {
|
|
830
849
|
* Indicates whether the rule group is stateless or stateful. If the rule group is stateless, it contains stateless rules. If it is stateful, it contains stateful rules. This setting is required for requests that do not include the RuleGroupARN.
|
831
850
|
*/
|
832
851
|
Type?: RuleGroupType;
|
852
|
+
/**
|
853
|
+
* Indicates whether you want Network Firewall to analyze the stateless rules in the rule group for rule behavior such as asymmetric routing. If set to TRUE, Network Firewall runs the analysis.
|
854
|
+
*/
|
855
|
+
AnalyzeRuleGroup?: Boolean;
|
833
856
|
}
|
834
857
|
export interface DescribeRuleGroupResponse {
|
835
858
|
/**
|
@@ -1156,6 +1179,7 @@ declare namespace NetworkFirewall {
|
|
1156
1179
|
export type IPSetReferenceMap = {[key: string]: IPSetReference};
|
1157
1180
|
export type IPSetReferenceName = string;
|
1158
1181
|
export type IPSets = {[key: string]: IPSet};
|
1182
|
+
export type IdentifiedType = "STATELESS_RULE_FORWARDING_ASYMMETRICALLY"|"STATELESS_RULE_CONTAINS_TCP_FLAGS"|string;
|
1159
1183
|
export type KeyId = string;
|
1160
1184
|
export type Keyword = string;
|
1161
1185
|
export type LastUpdateTime = Date;
|
@@ -1430,7 +1454,7 @@ declare namespace NetworkFirewall {
|
|
1430
1454
|
*/
|
1431
1455
|
RulesSource: RulesSource;
|
1432
1456
|
/**
|
1433
|
-
* Additional options governing how Network Firewall handles stateful rules. The policies where you use your stateful rule group must have stateful rule options settings that are compatible with these settings.
|
1457
|
+
* Additional options governing how Network Firewall handles stateful rules. The policies where you use your stateful rule group must have stateful rule options settings that are compatible with these settings. Some limitations apply; for more information, see Strict evaluation order in the Network Firewall Developer Guide.
|
1434
1458
|
*/
|
1435
1459
|
StatefulRuleOptions?: StatefulRuleOptions;
|
1436
1460
|
}
|
@@ -1501,9 +1525,14 @@ declare namespace NetworkFirewall {
|
|
1501
1525
|
* The last time that the rule group was changed.
|
1502
1526
|
*/
|
1503
1527
|
LastModifiedTime?: LastUpdateTime;
|
1528
|
+
/**
|
1529
|
+
* The list of analysis results for AnalyzeRuleGroup. If you set AnalyzeRuleGroup to TRUE in CreateRuleGroup, UpdateRuleGroup, or DescribeRuleGroup, Network Firewall analyzes the rule group and identifies the rules that might adversely effect your firewall's functionality. For example, if Network Firewall detects a rule that's routing traffic asymmetrically, which impacts the service's ability to properly process traffic, the service includes the rule in the list of analysis results.
|
1530
|
+
*/
|
1531
|
+
AnalysisResults?: AnalysisResultList;
|
1504
1532
|
}
|
1505
1533
|
export type RuleGroupType = "STATELESS"|"STATEFUL"|string;
|
1506
1534
|
export type RuleGroups = RuleGroupMetadata[];
|
1535
|
+
export type RuleIdList = CollectionMember_String[];
|
1507
1536
|
export interface RuleOption {
|
1508
1537
|
/**
|
1509
1538
|
* The keyword for the Suricata compatible rule option. You must include a sid (signature ID), and can optionally include other keywords. For information about Suricata compatible keywords, see Rule options in the Suricata documentation.
|
@@ -1530,7 +1559,7 @@ declare namespace NetworkFirewall {
|
|
1530
1559
|
}
|
1531
1560
|
export interface RulesSource {
|
1532
1561
|
/**
|
1533
|
-
* Stateful inspection criteria, provided in Suricata compatible
|
1562
|
+
* Stateful inspection criteria, provided in Suricata compatible rules. Suricata is an open-source threat detection framework that includes a standard rule-based language for network traffic inspection. These rules contain the inspection criteria and the action to take for traffic that matches the criteria, so this type of rule group doesn't have a separate action setting. You can't use the priority keyword if the RuleOrder option in StatefulRuleOptions is set to STRICT_ORDER.
|
1534
1563
|
*/
|
1535
1564
|
RulesString?: RulesString;
|
1536
1565
|
/**
|
@@ -1569,7 +1598,7 @@ declare namespace NetworkFirewall {
|
|
1569
1598
|
}
|
1570
1599
|
export interface ServerCertificateConfiguration {
|
1571
1600
|
/**
|
1572
|
-
* The list of
|
1601
|
+
* The list of server certificates to use for inbound SSL/TLS inspection.
|
1573
1602
|
*/
|
1574
1603
|
ServerCertificates?: ServerCertificates;
|
1575
1604
|
/**
|
@@ -1577,11 +1606,11 @@ declare namespace NetworkFirewall {
|
|
1577
1606
|
*/
|
1578
1607
|
Scopes?: ServerCertificateScopes;
|
1579
1608
|
/**
|
1580
|
-
* The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate
|
1609
|
+
* The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within Certificate Manager (ACM) to use for outbound SSL/TLS inspection. The following limitations apply: You can use CA certificates that you imported into ACM, but you can't generate CA certificates with ACM. You can't use certificates issued by Private Certificate Authority. For more information about configuring certificates for outbound inspection, see Using SSL/TLS certificates with certificates with TLS inspection configurations in the Network Firewall Developer Guide. For information about working with certificates in ACM, see Importing certificates in the Certificate Manager User Guide.
|
1581
1610
|
*/
|
1582
1611
|
CertificateAuthorityArn?: ResourceArn;
|
1583
1612
|
/**
|
1584
|
-
* When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status. If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To
|
1613
|
+
* When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status. If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a CertificateAuthorityArn in ServerCertificateConfiguration.
|
1585
1614
|
*/
|
1586
1615
|
CheckCertificateRevocationStatus?: CheckCertificateRevocationStatusActions;
|
1587
1616
|
}
|
@@ -1627,7 +1656,7 @@ declare namespace NetworkFirewall {
|
|
1627
1656
|
export type StatefulActions = CollectionMember_String[];
|
1628
1657
|
export interface StatefulEngineOptions {
|
1629
1658
|
/**
|
1630
|
-
* Indicates how to manage the order of stateful rule evaluation for the policy.
|
1659
|
+
* Indicates how to manage the order of stateful rule evaluation for the policy. STRICT_ORDER is the default and recommended option. With STRICT_ORDER, provide your rules in the order that you want them to be evaluated. You can then choose one or more default actions for packets that don't match any rules. Choose STRICT_ORDER to have the stateful rules engine determine the evaluation order of your rules. The default action for this rule order is PASS, followed by DROP, REJECT, and ALERT actions. Stateful rules are provided to the rule engine as Suricata compatible strings, and Suricata evaluates them based on your settings. For more information, see Evaluation order for stateful rules in the Network Firewall Developer Guide.
|
1631
1660
|
*/
|
1632
1661
|
RuleOrder?: RuleOrder;
|
1633
1662
|
/**
|
@@ -1637,7 +1666,7 @@ declare namespace NetworkFirewall {
|
|
1637
1666
|
}
|
1638
1667
|
export interface StatefulRule {
|
1639
1668
|
/**
|
1640
|
-
* Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. The actions for a stateful rule are defined as follows: PASS - Permits the packets to go to the intended destination. DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. ALERT -
|
1669
|
+
* Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. The actions for a stateful rule are defined as follows: PASS - Permits the packets to go to the intended destination. DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. ALERT - Sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with ALERT action, verify in the logs that the rule is filtering as you want, then change the action to DROP.
|
1641
1670
|
*/
|
1642
1671
|
Action: StatefulAction;
|
1643
1672
|
/**
|
@@ -2113,6 +2142,10 @@ declare namespace NetworkFirewall {
|
|
2113
2142
|
* A complex type that contains metadata about the rule group that your own rule group is copied from. You can use the metadata to keep track of updates made to the originating rule group.
|
2114
2143
|
*/
|
2115
2144
|
SourceMetadata?: SourceMetadata;
|
2145
|
+
/**
|
2146
|
+
* Indicates whether you want Network Firewall to analyze the stateless rules in the rule group for rule behavior such as asymmetric routing. If set to TRUE, Network Firewall runs the analysis and then updates the rule group for you. To run the stateless rule group analyzer without updating the rule group, set DryRun to TRUE.
|
2147
|
+
*/
|
2148
|
+
AnalyzeRuleGroup?: Boolean;
|
2116
2149
|
}
|
2117
2150
|
export interface UpdateRuleGroupResponse {
|
2118
2151
|
/**
|