cdk-lambda-subminute 2.0.304 → 2.0.305

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -695,6 +695,10 @@ declare namespace DocDB {
695
695
  * The cluster identifier of the new global cluster.
696
696
  */
697
697
  GlobalClusterIdentifier?: GlobalClusterIdentifier;
698
+ /**
699
+ * The storage type to associate with the DB cluster. For information on storage types for Amazon DocumentDB clusters, see Cluster storage configurations in the Amazon DocumentDB Developer Guide. Valid values for storage type - standard | iopt1 Default value is standard When you create a DocumentDB DB cluster with the storage type set to iopt1, the storage type is returned in the response. The storage type isn't returned when you set it to standard.
700
+ */
701
+ StorageType?: String;
698
702
  }
699
703
  export interface CreateDBClusterParameterGroupMessage {
700
704
  /**
@@ -1010,6 +1014,10 @@ declare namespace DocDB {
1010
1014
  * Specifies whether this cluster can be deleted. If DeletionProtection is enabled, the cluster cannot be deleted unless it is modified and DeletionProtection is disabled. DeletionProtection protects clusters from being accidentally deleted.
1011
1015
  */
1012
1016
  DeletionProtection?: Boolean;
1017
+ /**
1018
+ * Storage type associated with your cluster Storage type associated with your cluster For information on storage types for Amazon DocumentDB clusters, see Cluster storage configurations in the Amazon DocumentDB Developer Guide. Valid values for storage type - standard | iopt1 Default value is standard
1019
+ */
1020
+ StorageType?: String;
1013
1021
  }
1014
1022
  export type DBClusterList = DBCluster[];
1015
1023
  export interface DBClusterMember {
@@ -1166,6 +1174,10 @@ declare namespace DocDB {
1166
1174
  * If the cluster snapshot was copied from a source cluster snapshot, the ARN for the source cluster snapshot; otherwise, a null value.
1167
1175
  */
1168
1176
  SourceDBClusterSnapshotArn?: String;
1177
+ /**
1178
+ * Storage type associated with your cluster snapshot For information on storage types for Amazon DocumentDB clusters, see Cluster storage configurations in the Amazon DocumentDB Developer Guide. Valid values for storage type - standard | iopt1 Default value is standard
1179
+ */
1180
+ StorageType?: String;
1169
1181
  }
1170
1182
  export interface DBClusterSnapshotAttribute {
1171
1183
  /**
@@ -2149,6 +2161,10 @@ declare namespace DocDB {
2149
2161
  * Specifies whether this cluster can be deleted. If DeletionProtection is enabled, the cluster cannot be deleted unless it is modified and DeletionProtection is disabled. DeletionProtection protects clusters from being accidentally deleted.
2150
2162
  */
2151
2163
  DeletionProtection?: BooleanOptional;
2164
+ /**
2165
+ * The storage type to associate with the DB cluster. For information on storage types for Amazon DocumentDB clusters, see Cluster storage configurations in the Amazon DocumentDB Developer Guide. Valid values for storage type - standard | iopt1 Default value is standard
2166
+ */
2167
+ StorageType?: String;
2152
2168
  }
2153
2169
  export interface ModifyDBClusterParameterGroupMessage {
2154
2170
  /**
@@ -2321,6 +2337,10 @@ declare namespace DocDB {
2321
2337
  * Indicates whether an instance is in a virtual private cloud (VPC).
2322
2338
  */
2323
2339
  Vpc?: Boolean;
2340
+ /**
2341
+ * The storage type to associate with the DB cluster
2342
+ */
2343
+ StorageType?: String;
2324
2344
  }
2325
2345
  export type OrderableDBInstanceOptionsList = OrderableDBInstanceOption[];
2326
2346
  export interface OrderableDBInstanceOptionsMessage {
@@ -2610,6 +2630,10 @@ declare namespace DocDB {
2610
2630
  * The name of the DB cluster parameter group to associate with this DB cluster. Type: String.       Required: No. If this argument is omitted, the default DB cluster parameter group is used. If supplied, must match the name of an existing default DB cluster parameter group. The string must consist of from 1 to 255 letters, numbers or hyphens. Its first character must be a letter, and it cannot end with a hyphen or contain two consecutive hyphens.
2611
2631
  */
2612
2632
  DBClusterParameterGroupName?: String;
2633
+ /**
2634
+ * The storage type to associate with the DB cluster. For information on storage types for Amazon DocumentDB clusters, see Cluster storage configurations in the Amazon DocumentDB Developer Guide. Valid values for storage type - standard | iopt1 Default value is standard
2635
+ */
2636
+ StorageType?: String;
2613
2637
  }
2614
2638
  export interface RestoreDBClusterFromSnapshotResult {
2615
2639
  DBCluster?: DBCluster;
@@ -2663,6 +2687,10 @@ declare namespace DocDB {
2663
2687
  * Specifies whether this cluster can be deleted. If DeletionProtection is enabled, the cluster cannot be deleted unless it is modified and DeletionProtection is disabled. DeletionProtection protects clusters from being accidentally deleted.
2664
2688
  */
2665
2689
  DeletionProtection?: BooleanOptional;
2690
+ /**
2691
+ * The storage type to associate with the DB cluster. For information on storage types for Amazon DocumentDB clusters, see Cluster storage configurations in the Amazon DocumentDB Developer Guide. Valid values for storage type - standard | iopt1 Default value is standard
2692
+ */
2693
+ StorageType?: String;
2666
2694
  }
2667
2695
  export interface RestoreDBClusterToPointInTimeResult {
2668
2696
  DBCluster?: DBCluster;
@@ -317,11 +317,11 @@ declare class EC2 extends Service {
317
317
  */
318
318
  authorizeClientVpnIngress(callback?: (err: AWSError, data: EC2.Types.AuthorizeClientVpnIngressResult) => void): Request<EC2.Types.AuthorizeClientVpnIngressResult, AWSError>;
319
319
  /**
320
- * Adds the specified outbound (egress) rules to a security group for use with a VPC. An outbound rule permits instances to send traffic to the specified IPv4 or IPv6 CIDR address ranges, or to the instances that are associated with the specified source security groups. When specifying an outbound rule for your security group in a VPC, the IpPermissions must include a destination for the traffic. You specify a protocol for each rule (for example, TCP). For the TCP and UDP protocols, you must also specify the destination port or port range. For the ICMP protocol, you must also specify the ICMP type and code. You can use -1 for the type or code to mean all types or all codes. Rule changes are propagated to affected instances as quickly as possible. However, a small delay might occur. For information about VPC security group quotas, see Amazon VPC quotas.
320
+ * Adds the specified outbound (egress) rules to a security group for use with a VPC. An outbound rule permits instances to send traffic to the specified IPv4 or IPv6 CIDR address ranges, or to the instances that are associated with the specified source security groups. When specifying an outbound rule for your security group in a VPC, the IpPermissions must include a destination for the traffic. You specify a protocol for each rule (for example, TCP). For the TCP and UDP protocols, you must also specify the destination port or port range. For the ICMP protocol, you must also specify the ICMP type and code. You can use -1 for the type or code to mean all types or all codes. Rule changes are propagated to affected instances as quickly as possible. However, a small delay might occur. For information about VPC security group quotas, see Amazon VPC quotas. If you want to reference a security group across VPCs attached to a transit gateway using the security group referencing feature, note that you can only reference security groups for ingress rules. You cannot reference a security group for egress rules.
321
321
  */
322
322
  authorizeSecurityGroupEgress(params: EC2.Types.AuthorizeSecurityGroupEgressRequest, callback?: (err: AWSError, data: EC2.Types.AuthorizeSecurityGroupEgressResult) => void): Request<EC2.Types.AuthorizeSecurityGroupEgressResult, AWSError>;
323
323
  /**
324
- * Adds the specified outbound (egress) rules to a security group for use with a VPC. An outbound rule permits instances to send traffic to the specified IPv4 or IPv6 CIDR address ranges, or to the instances that are associated with the specified source security groups. When specifying an outbound rule for your security group in a VPC, the IpPermissions must include a destination for the traffic. You specify a protocol for each rule (for example, TCP). For the TCP and UDP protocols, you must also specify the destination port or port range. For the ICMP protocol, you must also specify the ICMP type and code. You can use -1 for the type or code to mean all types or all codes. Rule changes are propagated to affected instances as quickly as possible. However, a small delay might occur. For information about VPC security group quotas, see Amazon VPC quotas.
324
+ * Adds the specified outbound (egress) rules to a security group for use with a VPC. An outbound rule permits instances to send traffic to the specified IPv4 or IPv6 CIDR address ranges, or to the instances that are associated with the specified source security groups. When specifying an outbound rule for your security group in a VPC, the IpPermissions must include a destination for the traffic. You specify a protocol for each rule (for example, TCP). For the TCP and UDP protocols, you must also specify the destination port or port range. For the ICMP protocol, you must also specify the ICMP type and code. You can use -1 for the type or code to mean all types or all codes. Rule changes are propagated to affected instances as quickly as possible. However, a small delay might occur. For information about VPC security group quotas, see Amazon VPC quotas. If you want to reference a security group across VPCs attached to a transit gateway using the security group referencing feature, note that you can only reference security groups for ingress rules. You cannot reference a security group for egress rules.
325
325
  */
326
326
  authorizeSecurityGroupEgress(callback?: (err: AWSError, data: EC2.Types.AuthorizeSecurityGroupEgressResult) => void): Request<EC2.Types.AuthorizeSecurityGroupEgressResult, AWSError>;
327
327
  /**
@@ -2541,11 +2541,11 @@ declare class EC2 extends Service {
2541
2541
  */
2542
2542
  describeScheduledInstances(callback?: (err: AWSError, data: EC2.Types.DescribeScheduledInstancesResult) => void): Request<EC2.Types.DescribeScheduledInstancesResult, AWSError>;
2543
2543
  /**
2544
- * Describes the VPCs on the other side of a VPC peering connection that are referencing the security groups you've specified in this request.
2544
+ * Describes the VPCs on the other side of a VPC peering connection or the VPCs attached to a transit gateway that are referencing the security groups you've specified in this request.
2545
2545
  */
2546
2546
  describeSecurityGroupReferences(params: EC2.Types.DescribeSecurityGroupReferencesRequest, callback?: (err: AWSError, data: EC2.Types.DescribeSecurityGroupReferencesResult) => void): Request<EC2.Types.DescribeSecurityGroupReferencesResult, AWSError>;
2547
2547
  /**
2548
- * Describes the VPCs on the other side of a VPC peering connection that are referencing the security groups you've specified in this request.
2548
+ * Describes the VPCs on the other side of a VPC peering connection or the VPCs attached to a transit gateway that are referencing the security groups you've specified in this request.
2549
2549
  */
2550
2550
  describeSecurityGroupReferences(callback?: (err: AWSError, data: EC2.Types.DescribeSecurityGroupReferencesResult) => void): Request<EC2.Types.DescribeSecurityGroupReferencesResult, AWSError>;
2551
2551
  /**
@@ -2637,11 +2637,11 @@ declare class EC2 extends Service {
2637
2637
  */
2638
2638
  describeSpotPriceHistory(callback?: (err: AWSError, data: EC2.Types.DescribeSpotPriceHistoryResult) => void): Request<EC2.Types.DescribeSpotPriceHistoryResult, AWSError>;
2639
2639
  /**
2640
- * Describes the stale security group rules for security groups in a specified VPC. Rules are stale when they reference a deleted security group in the same VPC or in a peer VPC, or if they reference a security group in a peer VPC for which the VPC peering connection has been deleted.
2640
+ * Describes the stale security group rules for security groups in a specified VPC. Rules are stale when they reference a deleted security group in the same VPC, peered VPC, or in separate VPCs attached to a transit gateway (with security group referencing support enabled). Rules can also be stale if they reference a security group in a peer VPC for which the VPC peering connection has been deleted or if they reference a security group in a VPC that has been detached from a transit gateway.
2641
2641
  */
2642
2642
  describeStaleSecurityGroups(params: EC2.Types.DescribeStaleSecurityGroupsRequest, callback?: (err: AWSError, data: EC2.Types.DescribeStaleSecurityGroupsResult) => void): Request<EC2.Types.DescribeStaleSecurityGroupsResult, AWSError>;
2643
2643
  /**
2644
- * Describes the stale security group rules for security groups in a specified VPC. Rules are stale when they reference a deleted security group in the same VPC or in a peer VPC, or if they reference a security group in a peer VPC for which the VPC peering connection has been deleted.
2644
+ * Describes the stale security group rules for security groups in a specified VPC. Rules are stale when they reference a deleted security group in the same VPC, peered VPC, or in separate VPCs attached to a transit gateway (with security group referencing support enabled). Rules can also be stale if they reference a security group in a peer VPC for which the VPC peering connection has been deleted or if they reference a security group in a VPC that has been detached from a transit gateway.
2645
2645
  */
2646
2646
  describeStaleSecurityGroups(callback?: (err: AWSError, data: EC2.Types.DescribeStaleSecurityGroupsResult) => void): Request<EC2.Types.DescribeStaleSecurityGroupsResult, AWSError>;
2647
2647
  /**
@@ -11247,6 +11247,10 @@ declare namespace EC2 {
11247
11247
  * Enable or disable DNS support. The default is enable.
11248
11248
  */
11249
11249
  DnsSupport?: DnsSupportValue;
11250
+ /**
11251
+ * Enables you to reference a security group across VPCs attached to a transit gateway (TGW). Use this option to simplify security group management and control of instance-to-instance traffic across VPCs that are connected by transit gateway. You can also use this option to migrate from VPC peering (which was the only option that supported security group referencing) to transit gateways (which now also support security group referencing). This option is disabled by default and there are no additional costs to use this feature. If you don't enable or disable SecurityGroupReferencingSupport in the request, the attachment will inherit the security group referencing support setting on the transit gateway. For important information about this feature, see Create a transit gateway attachment to a VPC in the Amazon Web Services Transit Gateway Guide.
11252
+ */
11253
+ SecurityGroupReferencingSupport?: SecurityGroupReferencingSupportValue;
11250
11254
  /**
11251
11255
  * Enable or disable IPv6 support. The default is disable.
11252
11256
  */
@@ -29099,6 +29103,10 @@ declare namespace EC2 {
29099
29103
  * Enable or disable DNS support.
29100
29104
  */
29101
29105
  DnsSupport?: DnsSupportValue;
29106
+ /**
29107
+ * Enables you to reference a security group across VPCs attached to a transit gateway (TGW). Use this option to simplify security group management and control of instance-to-instance traffic across VPCs that are connected by transit gateway. You can also use this option to migrate from VPC peering (which was the only option that supported security group referencing) to transit gateways (which now also support security group referencing). This option is disabled by default and there are no additional costs to use this feature. For important information about this feature, see Create a transit gateway in the Amazon Web Services Transit Gateway Guide.
29108
+ */
29109
+ SecurityGroupReferencingSupport?: SecurityGroupReferencingSupportValue;
29102
29110
  /**
29103
29111
  * Enable or disable automatic acceptance of attachment requests.
29104
29112
  */
@@ -29203,6 +29211,10 @@ declare namespace EC2 {
29203
29211
  * Enable or disable DNS support. The default is enable.
29204
29212
  */
29205
29213
  DnsSupport?: DnsSupportValue;
29214
+ /**
29215
+ * Enables you to reference a security group across VPCs attached to a transit gateway (TGW). Use this option to simplify security group management and control of instance-to-instance traffic across VPCs that are connected by transit gateway. You can also use this option to migrate from VPC peering (which was the only option that supported security group referencing) to transit gateways (which now also support security group referencing). This option is disabled by default and there are no additional costs to use this feature. For important information about this feature, see Create a transit gateway attachment to a VPC in the Amazon Web Services Transit Gateway Guide.
29216
+ */
29217
+ SecurityGroupReferencingSupport?: SecurityGroupReferencingSupportValue;
29206
29218
  /**
29207
29219
  * Enable or disable IPv6 support. The default is enable.
29208
29220
  */
@@ -32103,7 +32115,7 @@ declare namespace EC2 {
32103
32115
  */
32104
32116
  VpcId?: String;
32105
32117
  /**
32106
- * The ID of the VPC peering connection.
32118
+ * The ID of the VPC peering connection (if applicable).
32107
32119
  */
32108
32120
  VpcPeeringConnectionId?: String;
32109
32121
  }
@@ -34913,11 +34925,16 @@ declare namespace EC2 {
34913
34925
  */
34914
34926
  ReferencingVpcId?: String;
34915
34927
  /**
34916
- * The ID of the VPC peering connection.
34928
+ * The ID of the VPC peering connection (if applicable). For more information about security group referencing for peering connections, see Update your security groups to reference peer security groups in the VPC Peering Guide.
34917
34929
  */
34918
34930
  VpcPeeringConnectionId?: String;
34931
+ /**
34932
+ * The ID of the transit gateway (if applicable). For more information about security group referencing for transit gateways, see Create a transit gateway attachment to a VPC in the Amazon Web Services Transit Gateway Guide.
34933
+ */
34934
+ TransitGatewayId?: String;
34919
34935
  }
34920
34936
  export type SecurityGroupReferences = SecurityGroupReference[];
34937
+ export type SecurityGroupReferencingSupportValue = "enable"|"disable"|string;
34921
34938
  export interface SecurityGroupRule {
34922
34939
  /**
34923
34940
  * The ID of the security group rule.
@@ -37434,6 +37451,10 @@ declare namespace EC2 {
37434
37451
  * Indicates whether DNS support is enabled.
37435
37452
  */
37436
37453
  DnsSupport?: DnsSupportValue;
37454
+ /**
37455
+ * Enables you to reference a security group across VPCs attached to a transit gateway (TGW). Use this option to simplify security group management and control of instance-to-instance traffic across VPCs that are connected by transit gateway. You can also use this option to migrate from VPC peering (which was the only option that supported security group referencing) to transit gateways (which now also support security group referencing). This option is disabled by default and there are no additional costs to use this feature. For important information about this feature, see Create a transit gateway in the Amazon Web Services Transit Gateway Guide.
37456
+ */
37457
+ SecurityGroupReferencingSupport?: SecurityGroupReferencingSupportValue;
37437
37458
  /**
37438
37459
  * Indicates whether multicast is enabled on the transit gateway
37439
37460
  */
@@ -37678,6 +37699,10 @@ declare namespace EC2 {
37678
37699
  * Enable or disable DNS support. Enabled by default.
37679
37700
  */
37680
37701
  DnsSupport?: DnsSupportValue;
37702
+ /**
37703
+ * Enables you to reference a security group across VPCs attached to a transit gateway (TGW). Use this option to simplify security group management and control of instance-to-instance traffic across VPCs that are connected by transit gateway. You can also use this option to migrate from VPC peering (which was the only option that supported security group referencing) to transit gateways (which now also support security group referencing). This option is disabled by default and there are no additional costs to use this feature. For important information about this feature, see Create a transit gateway in the Amazon Web Services Transit Gateway Guide.
37704
+ */
37705
+ SecurityGroupReferencingSupport?: SecurityGroupReferencingSupportValue;
37681
37706
  /**
37682
37707
  * Indicates whether multicast is enabled on the transit gateway
37683
37708
  */
@@ -37934,6 +37959,10 @@ declare namespace EC2 {
37934
37959
  * Indicates whether DNS support is enabled.
37935
37960
  */
37936
37961
  DnsSupport?: DnsSupportValue;
37962
+ /**
37963
+ * For important information about this feature, see Create a transit gateway attachment to a VPC in the Amazon Web Services Transit Gateway Guide.
37964
+ */
37965
+ SecurityGroupReferencingSupport?: SecurityGroupReferencingSupportValue;
37937
37966
  /**
37938
37967
  * Indicates whether IPv6 support is disabled.
37939
37968
  */
@@ -83,7 +83,7 @@ return /******/ (function(modules) { // webpackBootstrap
83
83
  /**
84
84
  * @constant
85
85
  */
86
- VERSION: '2.1499.0',
86
+ VERSION: '2.1500.0',
87
87
 
88
88
  /**
89
89
  * @api private