cdk-lambda-subminute 2.0.286 → 2.0.288

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (39) hide show
  1. package/.jsii +3 -3
  2. package/lib/cdk-lambda-subminute.js +3 -3
  3. package/node_modules/aws-sdk/CHANGELOG.md +16 -1
  4. package/node_modules/aws-sdk/README.md +1 -1
  5. package/node_modules/aws-sdk/apis/apprunner-2020-05-15.min.json +35 -34
  6. package/node_modules/aws-sdk/apis/connect-2017-08-08.min.json +310 -277
  7. package/node_modules/aws-sdk/apis/gamelift-2015-10-01.min.json +283 -227
  8. package/node_modules/aws-sdk/apis/glue-2017-03-31.min.json +359 -318
  9. package/node_modules/aws-sdk/apis/iotwireless-2020-11-22.min.json +1 -0
  10. package/node_modules/aws-sdk/apis/launch-wizard-2018-05-10.examples.json +5 -0
  11. package/node_modules/aws-sdk/apis/launch-wizard-2018-05-10.min.json +312 -0
  12. package/node_modules/aws-sdk/apis/launch-wizard-2018-05-10.paginators.json +28 -0
  13. package/node_modules/aws-sdk/apis/metadata.json +4 -0
  14. package/node_modules/aws-sdk/apis/network-firewall-2020-11-12.min.json +40 -17
  15. package/node_modules/aws-sdk/apis/quicksight-2018-04-01.min.json +353 -325
  16. package/node_modules/aws-sdk/clients/all.d.ts +1 -0
  17. package/node_modules/aws-sdk/clients/all.js +2 -1
  18. package/node_modules/aws-sdk/clients/apprunner.d.ts +5 -0
  19. package/node_modules/aws-sdk/clients/configservice.d.ts +1 -1
  20. package/node_modules/aws-sdk/clients/connect.d.ts +37 -1
  21. package/node_modules/aws-sdk/clients/gamelift.d.ts +33 -22
  22. package/node_modules/aws-sdk/clients/glue.d.ts +45 -0
  23. package/node_modules/aws-sdk/clients/iotwireless.d.ts +8 -4
  24. package/node_modules/aws-sdk/clients/launchwizard.d.ts +450 -0
  25. package/node_modules/aws-sdk/clients/launchwizard.js +18 -0
  26. package/node_modules/aws-sdk/clients/networkfirewall.d.ts +44 -11
  27. package/node_modules/aws-sdk/clients/quicksight.d.ts +41 -2
  28. package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +2 -2
  29. package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +48 -11
  30. package/node_modules/aws-sdk/dist/aws-sdk.js +600 -507
  31. package/node_modules/aws-sdk/dist/aws-sdk.min.js +81 -81
  32. package/node_modules/aws-sdk/lib/config_service_placeholders.d.ts +2 -0
  33. package/node_modules/aws-sdk/lib/core.js +1 -1
  34. package/node_modules/aws-sdk/lib/credentials/ec2_metadata_credentials.d.ts +14 -0
  35. package/node_modules/aws-sdk/lib/credentials/ec2_metadata_credentials.js +1 -0
  36. package/node_modules/aws-sdk/lib/metadata_service.d.ts +16 -1
  37. package/node_modules/aws-sdk/lib/metadata_service.js +36 -0
  38. package/node_modules/aws-sdk/package.json +1 -1
  39. package/package.json +3 -3
@@ -0,0 +1,450 @@
1
+ import {Request} from '../lib/request';
2
+ import {Response} from '../lib/response';
3
+ import {AWSError} from '../lib/error';
4
+ import {Service} from '../lib/service';
5
+ import {ServiceConfigurationOptions} from '../lib/service';
6
+ import {ConfigBase as Config} from '../lib/config-base';
7
+ interface Blob {}
8
+ declare class LaunchWizard extends Service {
9
+ /**
10
+ * Constructs a service object. This object has one method for each API operation.
11
+ */
12
+ constructor(options?: LaunchWizard.Types.ClientConfiguration)
13
+ config: Config & LaunchWizard.Types.ClientConfiguration;
14
+ /**
15
+ * Creates a deployment for the given workload. Deployments created by this operation are not available in the Launch Wizard console to use the Clone deployment action on.
16
+ */
17
+ createDeployment(params: LaunchWizard.Types.CreateDeploymentInput, callback?: (err: AWSError, data: LaunchWizard.Types.CreateDeploymentOutput) => void): Request<LaunchWizard.Types.CreateDeploymentOutput, AWSError>;
18
+ /**
19
+ * Creates a deployment for the given workload. Deployments created by this operation are not available in the Launch Wizard console to use the Clone deployment action on.
20
+ */
21
+ createDeployment(callback?: (err: AWSError, data: LaunchWizard.Types.CreateDeploymentOutput) => void): Request<LaunchWizard.Types.CreateDeploymentOutput, AWSError>;
22
+ /**
23
+ * Deletes a deployment.
24
+ */
25
+ deleteDeployment(params: LaunchWizard.Types.DeleteDeploymentInput, callback?: (err: AWSError, data: LaunchWizard.Types.DeleteDeploymentOutput) => void): Request<LaunchWizard.Types.DeleteDeploymentOutput, AWSError>;
26
+ /**
27
+ * Deletes a deployment.
28
+ */
29
+ deleteDeployment(callback?: (err: AWSError, data: LaunchWizard.Types.DeleteDeploymentOutput) => void): Request<LaunchWizard.Types.DeleteDeploymentOutput, AWSError>;
30
+ /**
31
+ * Returns information about the deployment.
32
+ */
33
+ getDeployment(params: LaunchWizard.Types.GetDeploymentInput, callback?: (err: AWSError, data: LaunchWizard.Types.GetDeploymentOutput) => void): Request<LaunchWizard.Types.GetDeploymentOutput, AWSError>;
34
+ /**
35
+ * Returns information about the deployment.
36
+ */
37
+ getDeployment(callback?: (err: AWSError, data: LaunchWizard.Types.GetDeploymentOutput) => void): Request<LaunchWizard.Types.GetDeploymentOutput, AWSError>;
38
+ /**
39
+ * Returns information about a workload.
40
+ */
41
+ getWorkload(params: LaunchWizard.Types.GetWorkloadInput, callback?: (err: AWSError, data: LaunchWizard.Types.GetWorkloadOutput) => void): Request<LaunchWizard.Types.GetWorkloadOutput, AWSError>;
42
+ /**
43
+ * Returns information about a workload.
44
+ */
45
+ getWorkload(callback?: (err: AWSError, data: LaunchWizard.Types.GetWorkloadOutput) => void): Request<LaunchWizard.Types.GetWorkloadOutput, AWSError>;
46
+ /**
47
+ * Lists the events of a deployment.
48
+ */
49
+ listDeploymentEvents(params: LaunchWizard.Types.ListDeploymentEventsInput, callback?: (err: AWSError, data: LaunchWizard.Types.ListDeploymentEventsOutput) => void): Request<LaunchWizard.Types.ListDeploymentEventsOutput, AWSError>;
50
+ /**
51
+ * Lists the events of a deployment.
52
+ */
53
+ listDeploymentEvents(callback?: (err: AWSError, data: LaunchWizard.Types.ListDeploymentEventsOutput) => void): Request<LaunchWizard.Types.ListDeploymentEventsOutput, AWSError>;
54
+ /**
55
+ * Lists the deployments that have been created.
56
+ */
57
+ listDeployments(params: LaunchWizard.Types.ListDeploymentsInput, callback?: (err: AWSError, data: LaunchWizard.Types.ListDeploymentsOutput) => void): Request<LaunchWizard.Types.ListDeploymentsOutput, AWSError>;
58
+ /**
59
+ * Lists the deployments that have been created.
60
+ */
61
+ listDeployments(callback?: (err: AWSError, data: LaunchWizard.Types.ListDeploymentsOutput) => void): Request<LaunchWizard.Types.ListDeploymentsOutput, AWSError>;
62
+ /**
63
+ * Lists the workload deployment patterns.
64
+ */
65
+ listWorkloadDeploymentPatterns(params: LaunchWizard.Types.ListWorkloadDeploymentPatternsInput, callback?: (err: AWSError, data: LaunchWizard.Types.ListWorkloadDeploymentPatternsOutput) => void): Request<LaunchWizard.Types.ListWorkloadDeploymentPatternsOutput, AWSError>;
66
+ /**
67
+ * Lists the workload deployment patterns.
68
+ */
69
+ listWorkloadDeploymentPatterns(callback?: (err: AWSError, data: LaunchWizard.Types.ListWorkloadDeploymentPatternsOutput) => void): Request<LaunchWizard.Types.ListWorkloadDeploymentPatternsOutput, AWSError>;
70
+ /**
71
+ * Lists the workloads.
72
+ */
73
+ listWorkloads(params: LaunchWizard.Types.ListWorkloadsInput, callback?: (err: AWSError, data: LaunchWizard.Types.ListWorkloadsOutput) => void): Request<LaunchWizard.Types.ListWorkloadsOutput, AWSError>;
74
+ /**
75
+ * Lists the workloads.
76
+ */
77
+ listWorkloads(callback?: (err: AWSError, data: LaunchWizard.Types.ListWorkloadsOutput) => void): Request<LaunchWizard.Types.ListWorkloadsOutput, AWSError>;
78
+ }
79
+ declare namespace LaunchWizard {
80
+ export type Boolean = boolean;
81
+ export interface CreateDeploymentInput {
82
+ /**
83
+ * The name of the deployment pattern supported by a given workload. You can use the ListWorkloadDeploymentPatterns operation to discover supported values for this parameter.
84
+ */
85
+ deploymentPatternName: DeploymentPatternName;
86
+ /**
87
+ * Checks whether you have the required permissions for the action, without actually making the request, and provides an error response. If you have the required permissions, the error response is DryRunOperation. Otherwise, it is UnauthorizedOperation.
88
+ */
89
+ dryRun?: Boolean;
90
+ /**
91
+ * The name of the deployment.
92
+ */
93
+ name: DeploymentName;
94
+ /**
95
+ * The settings specified for the deployment. For more information on the specifications required for creating a deployment, see Workload specifications.
96
+ */
97
+ specifications: DeploymentSpecifications;
98
+ /**
99
+ * The name of the workload. You can use the ListWorkloadDeploymentPatterns operation to discover supported values for this parameter.
100
+ */
101
+ workloadName: WorkloadName;
102
+ }
103
+ export interface CreateDeploymentOutput {
104
+ /**
105
+ * The ID of the deployment.
106
+ */
107
+ deploymentId?: DeploymentId;
108
+ }
109
+ export interface DeleteDeploymentInput {
110
+ /**
111
+ * The ID of the deployment.
112
+ */
113
+ deploymentId: DeploymentId;
114
+ }
115
+ export interface DeleteDeploymentOutput {
116
+ /**
117
+ * The status of the deployment.
118
+ */
119
+ status?: DeploymentStatus;
120
+ /**
121
+ * The reason for the deployment status.
122
+ */
123
+ statusReason?: String;
124
+ }
125
+ export interface DeploymentData {
126
+ /**
127
+ * The time the deployment was created.
128
+ */
129
+ createdAt?: Timestamp;
130
+ /**
131
+ * The time the deployment was deleted.
132
+ */
133
+ deletedAt?: Timestamp;
134
+ /**
135
+ * The ID of the deployment.
136
+ */
137
+ id?: DeploymentId;
138
+ /**
139
+ * The name of the deployment.
140
+ */
141
+ name?: String;
142
+ /**
143
+ * The pattern name of the deployment.
144
+ */
145
+ patternName?: DeploymentPatternName;
146
+ /**
147
+ * The resource group of the deployment.
148
+ */
149
+ resourceGroup?: String;
150
+ /**
151
+ * The specifications of the deployment. For more information on specifications for each deployment, see Workload specifications.
152
+ */
153
+ specifications?: DeploymentSpecifications;
154
+ /**
155
+ * The status of the deployment.
156
+ */
157
+ status?: DeploymentStatus;
158
+ /**
159
+ * The name of the workload.
160
+ */
161
+ workloadName?: WorkloadName;
162
+ }
163
+ export interface DeploymentDataSummary {
164
+ /**
165
+ * The time the deployment was created.
166
+ */
167
+ createdAt?: Timestamp;
168
+ /**
169
+ * The ID of the deployment.
170
+ */
171
+ id?: DeploymentId;
172
+ /**
173
+ * The name of the deployment
174
+ */
175
+ name?: String;
176
+ /**
177
+ * The name of the workload deployment pattern.
178
+ */
179
+ patternName?: DeploymentPatternName;
180
+ /**
181
+ * The status of the deployment.
182
+ */
183
+ status?: DeploymentStatus;
184
+ /**
185
+ * The name of the workload.
186
+ */
187
+ workloadName?: WorkloadName;
188
+ }
189
+ export type DeploymentDataSummaryList = DeploymentDataSummary[];
190
+ export interface DeploymentEventDataSummary {
191
+ /**
192
+ * The description of the deployment event.
193
+ */
194
+ description?: String;
195
+ /**
196
+ * The name of the deployment event.
197
+ */
198
+ name?: String;
199
+ /**
200
+ * The status of the deployment event.
201
+ */
202
+ status?: EventStatus;
203
+ /**
204
+ * The reason of the deployment event status.
205
+ */
206
+ statusReason?: String;
207
+ /**
208
+ * The timestamp of the deployment event.
209
+ */
210
+ timestamp?: Timestamp;
211
+ }
212
+ export type DeploymentEventDataSummaryList = DeploymentEventDataSummary[];
213
+ export interface DeploymentFilter {
214
+ /**
215
+ * The name of the filter. Filter names are case-sensitive.
216
+ */
217
+ name?: DeploymentFilterKey;
218
+ /**
219
+ * The filter values. Filter values are case-sensitive. If you specify multiple values for a filter, the values are joined with an OR, and the request returns all results that match any of the specified values.
220
+ */
221
+ values?: DeploymentFilterValues;
222
+ }
223
+ export type DeploymentFilterKey = "WORKLOAD_NAME"|"DEPLOYMENT_STATUS"|string;
224
+ export type DeploymentFilterList = DeploymentFilter[];
225
+ export type DeploymentFilterValues = DeploymentFilterValuesMemberString[];
226
+ export type DeploymentFilterValuesMemberString = string;
227
+ export type DeploymentId = string;
228
+ export type DeploymentName = string;
229
+ export type DeploymentPatternName = string;
230
+ export type DeploymentSpecifications = {[key: string]: ValueString};
231
+ export type DeploymentStatus = "COMPLETED"|"CREATING"|"DELETE_IN_PROGRESS"|"DELETE_INITIATING"|"DELETE_FAILED"|"DELETED"|"FAILED"|"IN_PROGRESS"|"VALIDATING"|string;
232
+ export type EventStatus = "CANCELED"|"CANCELING"|"COMPLETED"|"CREATED"|"FAILED"|"IN_PROGRESS"|"PENDING"|"TIMED_OUT"|string;
233
+ export interface GetDeploymentInput {
234
+ /**
235
+ * The ID of the deployment.
236
+ */
237
+ deploymentId: DeploymentId;
238
+ }
239
+ export interface GetDeploymentOutput {
240
+ /**
241
+ * An object that details the deployment.
242
+ */
243
+ deployment?: DeploymentData;
244
+ }
245
+ export interface GetWorkloadInput {
246
+ /**
247
+ * The name of the workload.
248
+ */
249
+ workloadName: WorkloadName;
250
+ }
251
+ export interface GetWorkloadOutput {
252
+ /**
253
+ * Information about the workload.
254
+ */
255
+ workload?: WorkloadData;
256
+ }
257
+ export type KeyString = string;
258
+ export interface ListDeploymentEventsInput {
259
+ /**
260
+ * The ID of the deployment.
261
+ */
262
+ deploymentId: DeploymentId;
263
+ /**
264
+ * The maximum number of items to return for this request. To get the next page of items, make another request with the token returned in the output.
265
+ */
266
+ maxResults?: MaxDeploymentEventResults;
267
+ /**
268
+ * The token returned from a previous paginated request. Pagination continues from the end of the items returned by the previous request.
269
+ */
270
+ nextToken?: NextToken;
271
+ }
272
+ export interface ListDeploymentEventsOutput {
273
+ /**
274
+ * Lists the deployment events.
275
+ */
276
+ deploymentEvents?: DeploymentEventDataSummaryList;
277
+ /**
278
+ * The token to include in another request to get the next page of items. This value is null when there are no more items to return.
279
+ */
280
+ nextToken?: NextToken;
281
+ }
282
+ export interface ListDeploymentsInput {
283
+ /**
284
+ * Filters to scope the results. The following filters are supported: WORKLOAD_NAME DEPLOYMENT_STATUS
285
+ */
286
+ filters?: DeploymentFilterList;
287
+ /**
288
+ * The maximum number of items to return for this request. To get the next page of items, make another request with the token returned in the output.
289
+ */
290
+ maxResults?: MaxDeploymentResults;
291
+ /**
292
+ * The token returned from a previous paginated request. Pagination continues from the end of the items returned by the previous request.
293
+ */
294
+ nextToken?: NextToken;
295
+ }
296
+ export interface ListDeploymentsOutput {
297
+ /**
298
+ * Lists the deployments.
299
+ */
300
+ deployments?: DeploymentDataSummaryList;
301
+ /**
302
+ * The token to include in another request to get the next page of items. This value is null when there are no more items to return.
303
+ */
304
+ nextToken?: NextToken;
305
+ }
306
+ export interface ListWorkloadDeploymentPatternsInput {
307
+ /**
308
+ * The maximum number of items to return for this request. To get the next page of items, make another request with the token returned in the output.
309
+ */
310
+ maxResults?: MaxWorkloadDeploymentPatternResults;
311
+ /**
312
+ * The token returned from a previous paginated request. Pagination continues from the end of the items returned by the previous request.
313
+ */
314
+ nextToken?: NextToken;
315
+ /**
316
+ * The name of the workload.
317
+ */
318
+ workloadName: WorkloadName;
319
+ }
320
+ export interface ListWorkloadDeploymentPatternsOutput {
321
+ /**
322
+ * The token to include in another request to get the next page of items. This value is null when there are no more items to return.
323
+ */
324
+ nextToken?: NextToken;
325
+ /**
326
+ * Describes the workload deployment patterns.
327
+ */
328
+ workloadDeploymentPatterns?: WorkloadDeploymentPatternDataSummaryList;
329
+ }
330
+ export interface ListWorkloadsInput {
331
+ /**
332
+ * The maximum number of items to return for this request. To get the next page of items, make another request with the token returned in the output.
333
+ */
334
+ maxResults?: MaxWorkloadResults;
335
+ /**
336
+ * The token returned from a previous paginated request. Pagination continues from the end of the items returned by the previous request.
337
+ */
338
+ nextToken?: NextToken;
339
+ }
340
+ export interface ListWorkloadsOutput {
341
+ /**
342
+ * The token to include in another request to get the next page of items. This value is null when there are no more items to return.
343
+ */
344
+ nextToken?: NextToken;
345
+ /**
346
+ * Information about the workloads.
347
+ */
348
+ workloads?: WorkloadDataSummaryList;
349
+ }
350
+ export type MaxDeploymentEventResults = number;
351
+ export type MaxDeploymentResults = number;
352
+ export type MaxWorkloadDeploymentPatternResults = number;
353
+ export type MaxWorkloadResults = number;
354
+ export type NextToken = string;
355
+ export type String = string;
356
+ export type Timestamp = Date;
357
+ export type ValueString = string;
358
+ export interface WorkloadData {
359
+ /**
360
+ * The description of a workload.
361
+ */
362
+ description?: String;
363
+ /**
364
+ * The display name of a workload.
365
+ */
366
+ displayName?: String;
367
+ /**
368
+ * The URL of a workload document.
369
+ */
370
+ documentationUrl?: String;
371
+ /**
372
+ * The URL of a workload icon.
373
+ */
374
+ iconUrl?: String;
375
+ /**
376
+ * The status of a workload.
377
+ */
378
+ status?: WorkloadStatus;
379
+ /**
380
+ * The message about a workload's status.
381
+ */
382
+ statusMessage?: String;
383
+ /**
384
+ * The name of the workload.
385
+ */
386
+ workloadName?: WorkloadName;
387
+ }
388
+ export interface WorkloadDataSummary {
389
+ /**
390
+ * The display name of the workload data.
391
+ */
392
+ displayName?: String;
393
+ /**
394
+ * The name of the workload.
395
+ */
396
+ workloadName?: WorkloadName;
397
+ }
398
+ export type WorkloadDataSummaryList = WorkloadDataSummary[];
399
+ export interface WorkloadDeploymentPatternDataSummary {
400
+ /**
401
+ * The name of a workload deployment pattern.
402
+ */
403
+ deploymentPatternName?: DeploymentPatternName;
404
+ /**
405
+ * The description of a workload deployment pattern.
406
+ */
407
+ description?: String;
408
+ /**
409
+ * The display name of a workload deployment pattern.
410
+ */
411
+ displayName?: String;
412
+ /**
413
+ * The status of a workload deployment pattern.
414
+ */
415
+ status?: WorkloadDeploymentPatternStatus;
416
+ /**
417
+ * A message about a workload deployment pattern's status.
418
+ */
419
+ statusMessage?: String;
420
+ /**
421
+ * The name of the workload.
422
+ */
423
+ workloadName?: WorkloadName;
424
+ /**
425
+ * The name of the workload deployment pattern version.
426
+ */
427
+ workloadVersionName?: WorkloadVersionName;
428
+ }
429
+ export type WorkloadDeploymentPatternDataSummaryList = WorkloadDeploymentPatternDataSummary[];
430
+ export type WorkloadDeploymentPatternStatus = "ACTIVE"|"INACTIVE"|"DISABLED"|"DELETED"|string;
431
+ export type WorkloadName = string;
432
+ export type WorkloadStatus = "ACTIVE"|"INACTIVE"|"DISABLED"|"DELETED"|string;
433
+ export type WorkloadVersionName = string;
434
+ /**
435
+ * A string in YYYY-MM-DD format that represents the latest possible API version that can be used in this service. Specify 'latest' to use the latest possible version.
436
+ */
437
+ export type apiVersion = "2018-05-10"|"latest"|string;
438
+ export interface ClientApiVersions {
439
+ /**
440
+ * A string in YYYY-MM-DD format that represents the latest possible API version that can be used in this service. Specify 'latest' to use the latest possible version.
441
+ */
442
+ apiVersion?: apiVersion;
443
+ }
444
+ export type ClientConfiguration = ServiceConfigurationOptions & ClientApiVersions;
445
+ /**
446
+ * Contains interfaces for use with the LaunchWizard client.
447
+ */
448
+ export import Types = LaunchWizard;
449
+ }
450
+ export = LaunchWizard;
@@ -0,0 +1,18 @@
1
+ require('../lib/node_loader');
2
+ var AWS = require('../lib/core');
3
+ var Service = AWS.Service;
4
+ var apiLoader = AWS.apiLoader;
5
+
6
+ apiLoader.services['launchwizard'] = {};
7
+ AWS.LaunchWizard = Service.defineService('launchwizard', ['2018-05-10']);
8
+ Object.defineProperty(apiLoader.services['launchwizard'], '2018-05-10', {
9
+ get: function get() {
10
+ var model = require('../apis/launch-wizard-2018-05-10.min.json');
11
+ model.paginators = require('../apis/launch-wizard-2018-05-10.paginators.json').pagination;
12
+ return model;
13
+ },
14
+ enumerable: true,
15
+ configurable: true
16
+ });
17
+
18
+ module.exports = AWS.LaunchWizard;
@@ -52,11 +52,11 @@ declare class NetworkFirewall extends Service {
52
52
  */
53
53
  createRuleGroup(callback?: (err: AWSError, data: NetworkFirewall.Types.CreateRuleGroupResponse) => void): Request<NetworkFirewall.Types.CreateRuleGroupResponse, AWSError>;
54
54
  /**
55
- * Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains the Certificate Manager certificate associations that Network Firewall uses to decrypt and re-encrypt traffic traveling through your firewall. After you create a TLS inspection configuration, you can associate it with a new firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
55
+ * Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains Certificate Manager certificate associations between and the scope configurations that Network Firewall uses to decrypt and re-encrypt traffic traveling through your firewall. After you create a TLS inspection configuration, you can associate it with a new firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
56
56
  */
57
57
  createTLSInspectionConfiguration(params: NetworkFirewall.Types.CreateTLSInspectionConfigurationRequest, callback?: (err: AWSError, data: NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse, AWSError>;
58
58
  /**
59
- * Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains the Certificate Manager certificate associations that Network Firewall uses to decrypt and re-encrypt traffic traveling through your firewall. After you create a TLS inspection configuration, you can associate it with a new firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
59
+ * Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains Certificate Manager certificate associations between and the scope configurations that Network Firewall uses to decrypt and re-encrypt traffic traveling through your firewall. After you create a TLS inspection configuration, you can associate it with a new firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
60
60
  */
61
61
  createTLSInspectionConfiguration(callback?: (err: AWSError, data: NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse, AWSError>;
62
62
  /**
@@ -316,6 +316,21 @@ declare namespace NetworkFirewall {
316
316
  }
317
317
  export type AddressDefinition = string;
318
318
  export type Addresses = Address[];
319
+ export interface AnalysisResult {
320
+ /**
321
+ * The priority number of the stateless rules identified in the analysis.
322
+ */
323
+ IdentifiedRuleIds?: RuleIdList;
324
+ /**
325
+ * The types of rule configurations that Network Firewall analyzes your rule groups for. Network Firewall analyzes stateless rule groups for the following types of rule configurations: STATELESS_RULE_FORWARDING_ASYMMETRICALLY Cause: One or more stateless rules with the action pass or forward are forwarding traffic asymmetrically. Specifically, the rule's set of source IP addresses or their associated port numbers, don't match the set of destination IP addresses or their associated port numbers. To mitigate: Make sure that there's an existing return path. For example, if the rule allows traffic from source 10.1.0.0/24 to destination 20.1.0.0/24, you should allow return traffic from source 20.1.0.0/24 to destination 10.1.0.0/24. STATELESS_RULE_CONTAINS_TCP_FLAGS Cause: At least one stateless rule with the action pass orforward contains TCP flags that are inconsistent in the forward and return directions. To mitigate: Prevent asymmetric routing issues caused by TCP flags by following these actions: Remove unnecessary TCP flag inspections from the rules. If you need to inspect TCP flags, check that the rules correctly account for changes in TCP flags throughout the TCP connection cycle, for example SYN and ACK flags used in a 3-way TCP handshake.
326
+ */
327
+ IdentifiedType?: IdentifiedType;
328
+ /**
329
+ * Provides analysis details for the identified rule.
330
+ */
331
+ AnalysisDetail?: CollectionMember_String;
332
+ }
333
+ export type AnalysisResultList = AnalysisResult[];
319
334
  export interface AssociateFirewallPolicyRequest {
320
335
  /**
321
336
  * An optional token that you can use for optimistic locking. Network Firewall returns a token to your requests that access the firewall. The token marks the state of the firewall resource at the time of the request. To make an unconditional change to the firewall, omit the token in your update request. Without the token, Network Firewall performs your updates regardless of whether the firewall has changed since you last retrieved it. To make a conditional change to the firewall, provide the token in your update request. Network Firewall uses the token to ensure that the firewall hasn't changed since you last retrieved it. If it has changed, the operation fails with an InvalidTokenException. If this happens, retrieve the firewall again to get a current copy of it with a new token. Reapply your changes as needed, then try the operation again using the new token.
@@ -435,11 +450,11 @@ declare namespace NetworkFirewall {
435
450
  export type Certificates = TlsCertificateData[];
436
451
  export interface CheckCertificateRevocationStatusActions {
437
452
  /**
438
- * Configures how Network Firewall processes traffic when it determines that the certificate presented by the server in the SSL/TLS connection has a revoked status. PASS - Allow the connection to continue, and pass subsequent packets to the stateful engine for inspection. DROP - Network Firewall fails closed and drops all subsequent traffic. REJECT - Network Firewall sends a TCP reject packet back to your client so that the client can immediately establish a new session. Network Firewall then fails closed and drops all subsequent traffic. REJECT is available only for TCP traffic.
453
+ * Configures how Network Firewall processes traffic when it determines that the certificate presented by the server in the SSL/TLS connection has a revoked status. PASS - Allow the connection to continue, and pass subsequent packets to the stateful engine for inspection. DROP - Network Firewall closes the connection and drops subsequent packets for that connection. REJECT - Network Firewall sends a TCP reject packet back to your client. The service closes the connection and drops subsequent packets for that connection. REJECT is available only for TCP traffic.
439
454
  */
440
455
  RevokedStatusAction?: RevocationCheckAction;
441
456
  /**
442
- * Configures how Network Firewall processes traffic when it determines that the certificate presented by the server in the SSL/TLS connection has an unknown status, or a status that cannot be determined for any other reason, including when the service is unable to connect to the OCSP and CRL endpoints for the certificate. PASS - Allow the connection to continue, and pass subsequent packets to the stateful engine for inspection. DROP - Network Firewall fails closed and drops all subsequent traffic. REJECT - Network Firewall sends a TCP reject packet back to your client so that the client can immediately establish a new session. Network Firewall then fails closed and drops all subsequent traffic. REJECT is available only for TCP traffic.
457
+ * Configures how Network Firewall processes traffic when it determines that the certificate presented by the server in the SSL/TLS connection has an unknown status, or a status that cannot be determined for any other reason, including when the service is unable to connect to the OCSP and CRL endpoints for the certificate. PASS - Allow the connection to continue, and pass subsequent packets to the stateful engine for inspection. DROP - Network Firewall closes the connection and drops subsequent packets for that connection. REJECT - Network Firewall sends a TCP reject packet back to your client. The service closes the connection and drops subsequent packets for that connection. REJECT is available only for TCP traffic.
443
458
  */
444
459
  UnknownStatusAction?: RevocationCheckAction;
445
460
  }
@@ -574,6 +589,10 @@ declare namespace NetworkFirewall {
574
589
  * A complex type that contains metadata about the rule group that your own rule group is copied from. You can use the metadata to keep track of updates made to the originating rule group.
575
590
  */
576
591
  SourceMetadata?: SourceMetadata;
592
+ /**
593
+ * Indicates whether you want Network Firewall to analyze the stateless rules in the rule group for rule behavior such as asymmetric routing. If set to TRUE, Network Firewall runs the analysis and then creates the rule group for you. To run the stateless rule group analyzer without creating the rule group, set DryRun to TRUE.
594
+ */
595
+ AnalyzeRuleGroup?: Boolean;
577
596
  }
578
597
  export interface CreateRuleGroupResponse {
579
598
  /**
@@ -830,6 +849,10 @@ declare namespace NetworkFirewall {
830
849
  * Indicates whether the rule group is stateless or stateful. If the rule group is stateless, it contains stateless rules. If it is stateful, it contains stateful rules. This setting is required for requests that do not include the RuleGroupARN.
831
850
  */
832
851
  Type?: RuleGroupType;
852
+ /**
853
+ * Indicates whether you want Network Firewall to analyze the stateless rules in the rule group for rule behavior such as asymmetric routing. If set to TRUE, Network Firewall runs the analysis.
854
+ */
855
+ AnalyzeRuleGroup?: Boolean;
833
856
  }
834
857
  export interface DescribeRuleGroupResponse {
835
858
  /**
@@ -1156,6 +1179,7 @@ declare namespace NetworkFirewall {
1156
1179
  export type IPSetReferenceMap = {[key: string]: IPSetReference};
1157
1180
  export type IPSetReferenceName = string;
1158
1181
  export type IPSets = {[key: string]: IPSet};
1182
+ export type IdentifiedType = "STATELESS_RULE_FORWARDING_ASYMMETRICALLY"|"STATELESS_RULE_CONTAINS_TCP_FLAGS"|string;
1159
1183
  export type KeyId = string;
1160
1184
  export type Keyword = string;
1161
1185
  export type LastUpdateTime = Date;
@@ -1430,7 +1454,7 @@ declare namespace NetworkFirewall {
1430
1454
  */
1431
1455
  RulesSource: RulesSource;
1432
1456
  /**
1433
- * Additional options governing how Network Firewall handles stateful rules. The policies where you use your stateful rule group must have stateful rule options settings that are compatible with these settings.
1457
+ * Additional options governing how Network Firewall handles stateful rules. The policies where you use your stateful rule group must have stateful rule options settings that are compatible with these settings. Some limitations apply; for more information, see Strict evaluation order in the Network Firewall Developer Guide.
1434
1458
  */
1435
1459
  StatefulRuleOptions?: StatefulRuleOptions;
1436
1460
  }
@@ -1501,9 +1525,14 @@ declare namespace NetworkFirewall {
1501
1525
  * The last time that the rule group was changed.
1502
1526
  */
1503
1527
  LastModifiedTime?: LastUpdateTime;
1528
+ /**
1529
+ * The list of analysis results for AnalyzeRuleGroup. If you set AnalyzeRuleGroup to TRUE in CreateRuleGroup, UpdateRuleGroup, or DescribeRuleGroup, Network Firewall analyzes the rule group and identifies the rules that might adversely effect your firewall's functionality. For example, if Network Firewall detects a rule that's routing traffic asymmetrically, which impacts the service's ability to properly process traffic, the service includes the rule in the list of analysis results.
1530
+ */
1531
+ AnalysisResults?: AnalysisResultList;
1504
1532
  }
1505
1533
  export type RuleGroupType = "STATELESS"|"STATEFUL"|string;
1506
1534
  export type RuleGroups = RuleGroupMetadata[];
1535
+ export type RuleIdList = CollectionMember_String[];
1507
1536
  export interface RuleOption {
1508
1537
  /**
1509
1538
  * The keyword for the Suricata compatible rule option. You must include a sid (signature ID), and can optionally include other keywords. For information about Suricata compatible keywords, see Rule options in the Suricata documentation.
@@ -1530,7 +1559,7 @@ declare namespace NetworkFirewall {
1530
1559
  }
1531
1560
  export interface RulesSource {
1532
1561
  /**
1533
- * Stateful inspection criteria, provided in Suricata compatible intrusion prevention system (IPS) rules. Suricata is an open-source network IPS that includes a standard rule-based language for network traffic inspection. These rules contain the inspection criteria and the action to take for traffic that matches the criteria, so this type of rule group doesn't have a separate action setting.
1562
+ * Stateful inspection criteria, provided in Suricata compatible rules. Suricata is an open-source threat detection framework that includes a standard rule-based language for network traffic inspection. These rules contain the inspection criteria and the action to take for traffic that matches the criteria, so this type of rule group doesn't have a separate action setting. You can't use the priority keyword if the RuleOrder option in StatefulRuleOptions is set to STRICT_ORDER.
1534
1563
  */
1535
1564
  RulesString?: RulesString;
1536
1565
  /**
@@ -1569,7 +1598,7 @@ declare namespace NetworkFirewall {
1569
1598
  }
1570
1599
  export interface ServerCertificateConfiguration {
1571
1600
  /**
1572
- * The list of a server certificate configuration's Certificate Manager certificates, used for inbound SSL/TLS inspection.
1601
+ * The list of server certificates to use for inbound SSL/TLS inspection.
1573
1602
  */
1574
1603
  ServerCertificates?: ServerCertificates;
1575
1604
  /**
@@ -1577,11 +1606,11 @@ declare namespace NetworkFirewall {
1577
1606
  */
1578
1607
  Scopes?: ServerCertificateScopes;
1579
1608
  /**
1580
- * The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate configured in Certificate Manager (ACM) to use for outbound SSL/TLS inspection. The following limitations apply: You can use CA certificates that you imported into ACM, but you can't generate CA certificates with ACM. You can't use certificates issued by Private Certificate Authority. For more information about the certificate requirements for outbound inspection, see Requirements for using SSL/TLS certificates with TLS inspection configurations in the Network Firewall Developer Guide. For information about working with certificates in ACM, see Importing certificates in the Certificate Manager User Guide.
1609
+ * The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within Certificate Manager (ACM) to use for outbound SSL/TLS inspection. The following limitations apply: You can use CA certificates that you imported into ACM, but you can't generate CA certificates with ACM. You can't use certificates issued by Private Certificate Authority. For more information about configuring certificates for outbound inspection, see Using SSL/TLS certificates with certificates with TLS inspection configurations in the Network Firewall Developer Guide. For information about working with certificates in ACM, see Importing certificates in the Certificate Manager User Guide.
1581
1610
  */
1582
1611
  CertificateAuthorityArn?: ResourceArn;
1583
1612
  /**
1584
- * When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status. If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To use this option, you must specify a CertificateAuthorityArn in ServerCertificateConfiguration.
1613
+ * When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status. If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a CertificateAuthorityArn in ServerCertificateConfiguration.
1585
1614
  */
1586
1615
  CheckCertificateRevocationStatus?: CheckCertificateRevocationStatusActions;
1587
1616
  }
@@ -1627,7 +1656,7 @@ declare namespace NetworkFirewall {
1627
1656
  export type StatefulActions = CollectionMember_String[];
1628
1657
  export interface StatefulEngineOptions {
1629
1658
  /**
1630
- * Indicates how to manage the order of stateful rule evaluation for the policy. DEFAULT_ACTION_ORDER is the default behavior. Stateful rules are provided to the rule engine as Suricata compatible strings, and Suricata evaluates them based on certain settings. For more information, see Evaluation order for stateful rules in the Network Firewall Developer Guide.
1659
+ * Indicates how to manage the order of stateful rule evaluation for the policy. STRICT_ORDER is the default and recommended option. With STRICT_ORDER, provide your rules in the order that you want them to be evaluated. You can then choose one or more default actions for packets that don't match any rules. Choose STRICT_ORDER to have the stateful rules engine determine the evaluation order of your rules. The default action for this rule order is PASS, followed by DROP, REJECT, and ALERT actions. Stateful rules are provided to the rule engine as Suricata compatible strings, and Suricata evaluates them based on your settings. For more information, see Evaluation order for stateful rules in the Network Firewall Developer Guide.
1631
1660
  */
1632
1661
  RuleOrder?: RuleOrder;
1633
1662
  /**
@@ -1637,7 +1666,7 @@ declare namespace NetworkFirewall {
1637
1666
  }
1638
1667
  export interface StatefulRule {
1639
1668
  /**
1640
- * Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. The actions for a stateful rule are defined as follows: PASS - Permits the packets to go to the intended destination. DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. ALERT - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with ALERT action, verify in the logs that the rule is filtering as you want, then change the action to DROP.
1669
+ * Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. The actions for a stateful rule are defined as follows: PASS - Permits the packets to go to the intended destination. DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. ALERT - Sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with ALERT action, verify in the logs that the rule is filtering as you want, then change the action to DROP.
1641
1670
  */
1642
1671
  Action: StatefulAction;
1643
1672
  /**
@@ -2113,6 +2142,10 @@ declare namespace NetworkFirewall {
2113
2142
  * A complex type that contains metadata about the rule group that your own rule group is copied from. You can use the metadata to keep track of updates made to the originating rule group.
2114
2143
  */
2115
2144
  SourceMetadata?: SourceMetadata;
2145
+ /**
2146
+ * Indicates whether you want Network Firewall to analyze the stateless rules in the rule group for rule behavior such as asymmetric routing. If set to TRUE, Network Firewall runs the analysis and then updates the rule group for you. To run the stateless rule group analyzer without updating the rule group, set DryRun to TRUE.
2147
+ */
2148
+ AnalyzeRuleGroup?: Boolean;
2116
2149
  }
2117
2150
  export interface UpdateRuleGroupResponse {
2118
2151
  /**