cdk-lambda-subminute 2.0.396 → 2.0.398
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +3 -3
- package/lib/cdk-lambda-subminute.js +3 -3
- package/node_modules/aws-sdk/README.md +11 -16
- package/node_modules/aws-sdk/apis/appconfig-2019-10-09.min.json +9 -1
- package/node_modules/aws-sdk/apis/ec2-2016-11-15.min.json +9 -1
- package/node_modules/aws-sdk/apis/grafana-2020-08-18.min.json +82 -75
- package/node_modules/aws-sdk/apis/imagebuilder-2019-12-02.min.json +6 -0
- package/node_modules/aws-sdk/apis/payment-cryptography-data-2022-02-03.min.json +83 -62
- package/node_modules/aws-sdk/apis/rds-2014-10-31.min.json +61 -50
- package/node_modules/aws-sdk/apis/verifiedpermissions-2021-12-01.min.json +88 -22
- package/node_modules/aws-sdk/apis/wafv2-2019-07-29.min.json +106 -106
- package/node_modules/aws-sdk/clients/appconfig.d.ts +24 -14
- package/node_modules/aws-sdk/clients/dynamodb.d.ts +4 -4
- package/node_modules/aws-sdk/clients/ec2.d.ts +17 -9
- package/node_modules/aws-sdk/clients/grafana.d.ts +26 -9
- package/node_modules/aws-sdk/clients/imagebuilder.d.ts +11 -3
- package/node_modules/aws-sdk/clients/lambda.d.ts +46 -46
- package/node_modules/aws-sdk/clients/mwaa.d.ts +1 -1
- package/node_modules/aws-sdk/clients/paymentcryptographydata.d.ts +68 -36
- package/node_modules/aws-sdk/clients/rds.d.ts +20 -10
- package/node_modules/aws-sdk/clients/redshift.d.ts +15 -15
- package/node_modules/aws-sdk/clients/snowball.d.ts +1 -1
- package/node_modules/aws-sdk/clients/verifiedpermissions.d.ts +75 -26
- package/node_modules/aws-sdk/clients/wafv2.d.ts +14 -13
- package/node_modules/aws-sdk/clients/workspaces.d.ts +5 -5
- package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +1 -1
- package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +9 -9
- package/node_modules/aws-sdk/dist/aws-sdk.js +73 -54
- package/node_modules/aws-sdk/dist/aws-sdk.min.js +67 -67
- package/node_modules/aws-sdk/lib/core.js +1 -1
- package/node_modules/aws-sdk/lib/dynamodb/document_client.d.ts +2 -2
- package/node_modules/aws-sdk/package.json +3 -2
- package/node_modules/aws-sdk/scripts/warn-maintenance-mode.js +14 -0
- package/package.json +3 -3
@@ -1164,7 +1164,7 @@ declare namespace Redshift {
|
|
1164
1164
|
export type AquaStatus = "enabled"|"disabled"|"applying"|string;
|
1165
1165
|
export interface AssociateDataShareConsumerMessage {
|
1166
1166
|
/**
|
1167
|
-
* The Amazon Resource Name (ARN) of the datashare that the consumer is to use
|
1167
|
+
* The Amazon Resource Name (ARN) of the datashare that the consumer is to use.
|
1168
1168
|
*/
|
1169
1169
|
DataShareArn: String;
|
1170
1170
|
/**
|
@@ -1172,7 +1172,7 @@ declare namespace Redshift {
|
|
1172
1172
|
*/
|
1173
1173
|
AssociateEntireAccount?: BooleanOptional;
|
1174
1174
|
/**
|
1175
|
-
* The Amazon Resource Name (ARN) of the consumer
|
1175
|
+
* The Amazon Resource Name (ARN) of the consumer namespace associated with the datashare.
|
1176
1176
|
*/
|
1177
1177
|
ConsumerArn?: String;
|
1178
1178
|
/**
|
@@ -1245,7 +1245,7 @@ declare namespace Redshift {
|
|
1245
1245
|
}
|
1246
1246
|
export interface AuthorizeDataShareMessage {
|
1247
1247
|
/**
|
1248
|
-
* The Amazon Resource Name (ARN) of the datashare that producers are to authorize sharing for.
|
1248
|
+
* The Amazon Resource Name (ARN) of the datashare namespace that producers are to authorize sharing for.
|
1249
1249
|
*/
|
1250
1250
|
DataShareArn: String;
|
1251
1251
|
/**
|
@@ -1281,7 +1281,7 @@ declare namespace Redshift {
|
|
1281
1281
|
*/
|
1282
1282
|
SnapshotArn?: String;
|
1283
1283
|
/**
|
1284
|
-
* The identifier of the cluster the snapshot was created from. This parameter is required
|
1284
|
+
* The identifier of the cluster the snapshot was created from. If the snapshot to access doesn't exist and the associated IAM policy doesn't allow access to all (*) snapshots - This parameter is required. Otherwise, permissions aren't available to check if the snapshot exists. If the snapshot to access exists - This parameter isn't required. Redshift can retrieve the cluster identifier and use it to validate snapshot authorization.
|
1285
1285
|
*/
|
1286
1286
|
SnapshotClusterIdentifier?: String;
|
1287
1287
|
/**
|
@@ -2032,7 +2032,7 @@ declare namespace Redshift {
|
|
2032
2032
|
*/
|
2033
2033
|
ManualSnapshotRetentionPeriod?: IntegerOptional;
|
2034
2034
|
/**
|
2035
|
-
* The port number on which the cluster accepts incoming connections. The cluster is accessible only via the JDBC and ODBC connection strings. Part of the connection string requires the port on which the cluster will listen for incoming connections. Default: 5439 Valid Values: 1150-65535
|
2035
|
+
* The port number on which the cluster accepts incoming connections. The cluster is accessible only via the JDBC and ODBC connection strings. Part of the connection string requires the port on which the cluster will listen for incoming connections. Default: 5439 Valid Values: For clusters with ra3 nodes - Select a port within the ranges 5431-5455 or 8191-8215. (If you have an existing cluster with ra3 nodes, it isn't required that you change the port to these ranges.) For clusters with ds2 or dc2 nodes - Select a port within the range 1150-65535.
|
2036
2036
|
*/
|
2037
2037
|
Port?: IntegerOptional;
|
2038
2038
|
/**
|
@@ -2526,11 +2526,11 @@ declare namespace Redshift {
|
|
2526
2526
|
}
|
2527
2527
|
export interface DataShare {
|
2528
2528
|
/**
|
2529
|
-
*
|
2529
|
+
* The Amazon Resource Name (ARN) of the datashare that the consumer is to use.
|
2530
2530
|
*/
|
2531
2531
|
DataShareArn?: String;
|
2532
2532
|
/**
|
2533
|
-
* The Amazon Resource Name (ARN) of the producer.
|
2533
|
+
* The Amazon Resource Name (ARN) of the producer namespace.
|
2534
2534
|
*/
|
2535
2535
|
ProducerArn?: String;
|
2536
2536
|
/**
|
@@ -2610,7 +2610,7 @@ declare namespace Redshift {
|
|
2610
2610
|
export type DbGroupList = String[];
|
2611
2611
|
export interface DeauthorizeDataShareMessage {
|
2612
2612
|
/**
|
2613
|
-
* The Amazon Resource Name (ARN) of the datashare to remove authorization from.
|
2613
|
+
* The namespace Amazon Resource Name (ARN) of the datashare to remove authorization from.
|
2614
2614
|
*/
|
2615
2615
|
DataShareArn: String;
|
2616
2616
|
/**
|
@@ -3036,7 +3036,7 @@ declare namespace Redshift {
|
|
3036
3036
|
}
|
3037
3037
|
export interface DescribeDataSharesForConsumerMessage {
|
3038
3038
|
/**
|
3039
|
-
* The Amazon Resource Name (ARN) of the consumer that returns in the list of datashares.
|
3039
|
+
* The Amazon Resource Name (ARN) of the consumer namespace that returns in the list of datashares.
|
3040
3040
|
*/
|
3041
3041
|
ConsumerArn?: String;
|
3042
3042
|
/**
|
@@ -3064,7 +3064,7 @@ declare namespace Redshift {
|
|
3064
3064
|
}
|
3065
3065
|
export interface DescribeDataSharesForProducerMessage {
|
3066
3066
|
/**
|
3067
|
-
* The Amazon Resource Name (ARN) of the producer that returns in the list of datashares.
|
3067
|
+
* The Amazon Resource Name (ARN) of the producer namespace that returns in the list of datashares.
|
3068
3068
|
*/
|
3069
3069
|
ProducerArn?: String;
|
3070
3070
|
/**
|
@@ -3092,7 +3092,7 @@ declare namespace Redshift {
|
|
3092
3092
|
}
|
3093
3093
|
export interface DescribeDataSharesMessage {
|
3094
3094
|
/**
|
3095
|
-
* The
|
3095
|
+
* The Amazon resource name (ARN) of the datashare to describe details of.
|
3096
3096
|
*/
|
3097
3097
|
DataShareArn?: String;
|
3098
3098
|
/**
|
@@ -3650,7 +3650,7 @@ declare namespace Redshift {
|
|
3650
3650
|
}
|
3651
3651
|
export interface DisassociateDataShareConsumerMessage {
|
3652
3652
|
/**
|
3653
|
-
* The Amazon Resource Name (ARN) of the datashare to remove association for.
|
3653
|
+
* The Amazon Resource Name (ARN) of the datashare to remove association for.
|
3654
3654
|
*/
|
3655
3655
|
DataShareArn: String;
|
3656
3656
|
/**
|
@@ -3658,7 +3658,7 @@ declare namespace Redshift {
|
|
3658
3658
|
*/
|
3659
3659
|
DisassociateEntireAccount?: BooleanOptional;
|
3660
3660
|
/**
|
3661
|
-
* The Amazon Resource Name (ARN) of the consumer that association for the datashare is removed from.
|
3661
|
+
* The Amazon Resource Name (ARN) of the consumer namespace that association for the datashare is removed from.
|
3662
3662
|
*/
|
3663
3663
|
ConsumerArn?: String;
|
3664
3664
|
/**
|
@@ -4553,7 +4553,7 @@ declare namespace Redshift {
|
|
4553
4553
|
*/
|
4554
4554
|
AvailabilityZone?: String;
|
4555
4555
|
/**
|
4556
|
-
* The option to change the port of an Amazon Redshift cluster.
|
4556
|
+
* The option to change the port of an Amazon Redshift cluster. Valid Values: For clusters with ra3 nodes - Select a port within the ranges 5431-5455 or 8191-8215. (If you have an existing cluster with ra3 nodes, it isn't required that you change the port to these ranges.) For clusters with ds2 or dc2 nodes - Select a port within the range 1150-65535.
|
4557
4557
|
*/
|
4558
4558
|
Port?: IntegerOptional;
|
4559
4559
|
/**
|
@@ -5567,7 +5567,7 @@ declare namespace Redshift {
|
|
5567
5567
|
*/
|
5568
5568
|
SnapshotClusterIdentifier?: String;
|
5569
5569
|
/**
|
5570
|
-
* The port number on which the cluster accepts connections. Default: The same port as the original cluster.
|
5570
|
+
* The port number on which the cluster accepts connections. Default: The same port as the original cluster. Valid values: For clusters with ds2 or dc2 nodes, must be within the range 1150-65535. For clusters with ra3 nodes, must be within the ranges 5431-5455 or 8191-8215.
|
5571
5571
|
*/
|
5572
5572
|
Port?: IntegerOptional;
|
5573
5573
|
/**
|
@@ -741,7 +741,7 @@ declare namespace Snowball {
|
|
741
741
|
*/
|
742
742
|
KubernetesVersion?: String;
|
743
743
|
/**
|
744
|
-
* The version of EKS Anywhere on the Snow Family device.
|
744
|
+
* The optional version of EKS Anywhere on the Snow Family device.
|
745
745
|
*/
|
746
746
|
EKSAnywhereVersion?: String;
|
747
747
|
}
|
@@ -20,35 +20,35 @@ declare class VerifiedPermissions extends Service {
|
|
20
20
|
*/
|
21
21
|
batchIsAuthorized(callback?: (err: AWSError, data: VerifiedPermissions.Types.BatchIsAuthorizedOutput) => void): Request<VerifiedPermissions.Types.BatchIsAuthorizedOutput, AWSError>;
|
22
22
|
/**
|
23
|
-
* Creates a reference to an Amazon Cognito user pool as an external identity provider (IdP). After you create an identity source, you can use the identities provided by the IdP as proxies for the principal in authorization queries that use the IsAuthorizedWithToken operation. These identities take the form of tokens that contain claims about the user, such as IDs, attributes and group memberships. Amazon Cognito provides both identity tokens and access tokens, and Verified Permissions can use either or both. Any combination of identity and access tokens results in the same Cedar principal. Verified Permissions automatically translates the information about the identities into the standard Cedar attributes that can be evaluated by your policies. Because the Amazon Cognito identity and access tokens can contain different information, the tokens you choose to use determine which principal attributes are available to access when evaluating Cedar policies. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire. To reference a user from this identity source in your Cedar policies, use the following syntax. IdentityType::"<CognitoUserPoolIdentifier>|<CognitoClientId> Where IdentityType is the string that you provide to the PrincipalEntityType parameter for this operation. The CognitoUserPoolId and CognitoClientId are defined by the Amazon Cognito user pool. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
23
|
+
* Creates a reference to an Amazon Cognito user pool as an external identity provider (IdP). After you create an identity source, you can use the identities provided by the IdP as proxies for the principal in authorization queries that use the IsAuthorizedWithToken operation. These identities take the form of tokens that contain claims about the user, such as IDs, attributes and group memberships. Amazon Cognito provides both identity tokens and access tokens, and Verified Permissions can use either or both. Any combination of identity and access tokens results in the same Cedar principal. Verified Permissions automatically translates the information about the identities into the standard Cedar attributes that can be evaluated by your policies. Because the Amazon Cognito identity and access tokens can contain different information, the tokens you choose to use determine which principal attributes are available to access when evaluating Cedar policies. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire. To reference a user from this identity source in your Cedar policies, use the following syntax. IdentityType::"<CognitoUserPoolIdentifier>|<CognitoClientId> Where IdentityType is the string that you provide to the PrincipalEntityType parameter for this operation. The CognitoUserPoolId and CognitoClientId are defined by the Amazon Cognito user pool. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
24
24
|
*/
|
25
25
|
createIdentitySource(params: VerifiedPermissions.Types.CreateIdentitySourceInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.CreateIdentitySourceOutput) => void): Request<VerifiedPermissions.Types.CreateIdentitySourceOutput, AWSError>;
|
26
26
|
/**
|
27
|
-
* Creates a reference to an Amazon Cognito user pool as an external identity provider (IdP). After you create an identity source, you can use the identities provided by the IdP as proxies for the principal in authorization queries that use the IsAuthorizedWithToken operation. These identities take the form of tokens that contain claims about the user, such as IDs, attributes and group memberships. Amazon Cognito provides both identity tokens and access tokens, and Verified Permissions can use either or both. Any combination of identity and access tokens results in the same Cedar principal. Verified Permissions automatically translates the information about the identities into the standard Cedar attributes that can be evaluated by your policies. Because the Amazon Cognito identity and access tokens can contain different information, the tokens you choose to use determine which principal attributes are available to access when evaluating Cedar policies. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire. To reference a user from this identity source in your Cedar policies, use the following syntax. IdentityType::"<CognitoUserPoolIdentifier>|<CognitoClientId> Where IdentityType is the string that you provide to the PrincipalEntityType parameter for this operation. The CognitoUserPoolId and CognitoClientId are defined by the Amazon Cognito user pool. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
27
|
+
* Creates a reference to an Amazon Cognito user pool as an external identity provider (IdP). After you create an identity source, you can use the identities provided by the IdP as proxies for the principal in authorization queries that use the IsAuthorizedWithToken operation. These identities take the form of tokens that contain claims about the user, such as IDs, attributes and group memberships. Amazon Cognito provides both identity tokens and access tokens, and Verified Permissions can use either or both. Any combination of identity and access tokens results in the same Cedar principal. Verified Permissions automatically translates the information about the identities into the standard Cedar attributes that can be evaluated by your policies. Because the Amazon Cognito identity and access tokens can contain different information, the tokens you choose to use determine which principal attributes are available to access when evaluating Cedar policies. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire. To reference a user from this identity source in your Cedar policies, use the following syntax. IdentityType::"<CognitoUserPoolIdentifier>|<CognitoClientId> Where IdentityType is the string that you provide to the PrincipalEntityType parameter for this operation. The CognitoUserPoolId and CognitoClientId are defined by the Amazon Cognito user pool. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
28
28
|
*/
|
29
29
|
createIdentitySource(callback?: (err: AWSError, data: VerifiedPermissions.Types.CreateIdentitySourceOutput) => void): Request<VerifiedPermissions.Types.CreateIdentitySourceOutput, AWSError>;
|
30
30
|
/**
|
31
|
-
* Creates a Cedar policy and saves it in the specified policy store. You can create either a static policy or a policy linked to a policy template. To create a static policy, provide the Cedar policy text in the StaticPolicy section of the PolicyDefinition. To create a policy that is dynamically linked to a policy template, specify the policy template ID and the principal and resource to associate with this policy in the templateLinked section of the PolicyDefinition. If the policy template is ever updated, any policies linked to the policy template automatically use the updated template. Creating a policy causes it to be validated against the schema in the policy store. If the policy doesn't pass validation, the operation fails and the policy isn't stored. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
31
|
+
* Creates a Cedar policy and saves it in the specified policy store. You can create either a static policy or a policy linked to a policy template. To create a static policy, provide the Cedar policy text in the StaticPolicy section of the PolicyDefinition. To create a policy that is dynamically linked to a policy template, specify the policy template ID and the principal and resource to associate with this policy in the templateLinked section of the PolicyDefinition. If the policy template is ever updated, any policies linked to the policy template automatically use the updated template. Creating a policy causes it to be validated against the schema in the policy store. If the policy doesn't pass validation, the operation fails and the policy isn't stored. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
32
32
|
*/
|
33
33
|
createPolicy(params: VerifiedPermissions.Types.CreatePolicyInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.CreatePolicyOutput) => void): Request<VerifiedPermissions.Types.CreatePolicyOutput, AWSError>;
|
34
34
|
/**
|
35
|
-
* Creates a Cedar policy and saves it in the specified policy store. You can create either a static policy or a policy linked to a policy template. To create a static policy, provide the Cedar policy text in the StaticPolicy section of the PolicyDefinition. To create a policy that is dynamically linked to a policy template, specify the policy template ID and the principal and resource to associate with this policy in the templateLinked section of the PolicyDefinition. If the policy template is ever updated, any policies linked to the policy template automatically use the updated template. Creating a policy causes it to be validated against the schema in the policy store. If the policy doesn't pass validation, the operation fails and the policy isn't stored. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
35
|
+
* Creates a Cedar policy and saves it in the specified policy store. You can create either a static policy or a policy linked to a policy template. To create a static policy, provide the Cedar policy text in the StaticPolicy section of the PolicyDefinition. To create a policy that is dynamically linked to a policy template, specify the policy template ID and the principal and resource to associate with this policy in the templateLinked section of the PolicyDefinition. If the policy template is ever updated, any policies linked to the policy template automatically use the updated template. Creating a policy causes it to be validated against the schema in the policy store. If the policy doesn't pass validation, the operation fails and the policy isn't stored. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
36
36
|
*/
|
37
37
|
createPolicy(callback?: (err: AWSError, data: VerifiedPermissions.Types.CreatePolicyOutput) => void): Request<VerifiedPermissions.Types.CreatePolicyOutput, AWSError>;
|
38
38
|
/**
|
39
|
-
* Creates a policy store. A policy store is a container for policy resources. Although Cedar supports multiple namespaces, Verified Permissions currently supports only one namespace per policy store. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
39
|
+
* Creates a policy store. A policy store is a container for policy resources. Although Cedar supports multiple namespaces, Verified Permissions currently supports only one namespace per policy store. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
40
40
|
*/
|
41
41
|
createPolicyStore(params: VerifiedPermissions.Types.CreatePolicyStoreInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.CreatePolicyStoreOutput) => void): Request<VerifiedPermissions.Types.CreatePolicyStoreOutput, AWSError>;
|
42
42
|
/**
|
43
|
-
* Creates a policy store. A policy store is a container for policy resources. Although Cedar supports multiple namespaces, Verified Permissions currently supports only one namespace per policy store. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
43
|
+
* Creates a policy store. A policy store is a container for policy resources. Although Cedar supports multiple namespaces, Verified Permissions currently supports only one namespace per policy store. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
44
44
|
*/
|
45
45
|
createPolicyStore(callback?: (err: AWSError, data: VerifiedPermissions.Types.CreatePolicyStoreOutput) => void): Request<VerifiedPermissions.Types.CreatePolicyStoreOutput, AWSError>;
|
46
46
|
/**
|
47
|
-
* Creates a policy template. A template can use placeholders for the principal and resource. A template must be instantiated into a policy by associating it with specific principals and resources to use for the placeholders. That instantiated policy can then be considered in authorization decisions. The instantiated policy works identically to any other policy, except that it is dynamically linked to the template. If the template changes, then any policies that are linked to that template are immediately updated as well. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
47
|
+
* Creates a policy template. A template can use placeholders for the principal and resource. A template must be instantiated into a policy by associating it with specific principals and resources to use for the placeholders. That instantiated policy can then be considered in authorization decisions. The instantiated policy works identically to any other policy, except that it is dynamically linked to the template. If the template changes, then any policies that are linked to that template are immediately updated as well. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
48
48
|
*/
|
49
49
|
createPolicyTemplate(params: VerifiedPermissions.Types.CreatePolicyTemplateInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.CreatePolicyTemplateOutput) => void): Request<VerifiedPermissions.Types.CreatePolicyTemplateOutput, AWSError>;
|
50
50
|
/**
|
51
|
-
* Creates a policy template. A template can use placeholders for the principal and resource. A template must be instantiated into a policy by associating it with specific principals and resources to use for the placeholders. That instantiated policy can then be considered in authorization decisions. The instantiated policy works identically to any other policy, except that it is dynamically linked to the template. If the template changes, then any policies that are linked to that template are immediately updated as well. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
51
|
+
* Creates a policy template. A template can use placeholders for the principal and resource. A template must be instantiated into a policy by associating it with specific principals and resources to use for the placeholders. That instantiated policy can then be considered in authorization decisions. The instantiated policy works identically to any other policy, except that it is dynamically linked to the template. If the template changes, then any policies that are linked to that template are immediately updated as well. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
52
52
|
*/
|
53
53
|
createPolicyTemplate(callback?: (err: AWSError, data: VerifiedPermissions.Types.CreatePolicyTemplateOutput) => void): Request<VerifiedPermissions.Types.CreatePolicyTemplateOutput, AWSError>;
|
54
54
|
/**
|
@@ -172,43 +172,43 @@ declare class VerifiedPermissions extends Service {
|
|
172
172
|
*/
|
173
173
|
listPolicyTemplates(callback?: (err: AWSError, data: VerifiedPermissions.Types.ListPolicyTemplatesOutput) => void): Request<VerifiedPermissions.Types.ListPolicyTemplatesOutput, AWSError>;
|
174
174
|
/**
|
175
|
-
* Creates or updates the policy schema in the specified policy store. The schema is used to validate any Cedar policies and policy templates submitted to the policy store. Any changes to the schema validate only policies and templates submitted after the schema change. Existing policies and templates are not re-evaluated against the changed schema. If you later update a policy, then it is evaluated against the new schema at that time. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
175
|
+
* Creates or updates the policy schema in the specified policy store. The schema is used to validate any Cedar policies and policy templates submitted to the policy store. Any changes to the schema validate only policies and templates submitted after the schema change. Existing policies and templates are not re-evaluated against the changed schema. If you later update a policy, then it is evaluated against the new schema at that time. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
176
176
|
*/
|
177
177
|
putSchema(params: VerifiedPermissions.Types.PutSchemaInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.PutSchemaOutput) => void): Request<VerifiedPermissions.Types.PutSchemaOutput, AWSError>;
|
178
178
|
/**
|
179
|
-
* Creates or updates the policy schema in the specified policy store. The schema is used to validate any Cedar policies and policy templates submitted to the policy store. Any changes to the schema validate only policies and templates submitted after the schema change. Existing policies and templates are not re-evaluated against the changed schema. If you later update a policy, then it is evaluated against the new schema at that time. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
179
|
+
* Creates or updates the policy schema in the specified policy store. The schema is used to validate any Cedar policies and policy templates submitted to the policy store. Any changes to the schema validate only policies and templates submitted after the schema change. Existing policies and templates are not re-evaluated against the changed schema. If you later update a policy, then it is evaluated against the new schema at that time. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
180
180
|
*/
|
181
181
|
putSchema(callback?: (err: AWSError, data: VerifiedPermissions.Types.PutSchemaOutput) => void): Request<VerifiedPermissions.Types.PutSchemaOutput, AWSError>;
|
182
182
|
/**
|
183
|
-
* Updates the specified identity source to use a new identity provider (IdP) source, or to change the mapping of identities from the IdP to a different principal entity type. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
183
|
+
* Updates the specified identity source to use a new identity provider (IdP) source, or to change the mapping of identities from the IdP to a different principal entity type. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
184
184
|
*/
|
185
185
|
updateIdentitySource(params: VerifiedPermissions.Types.UpdateIdentitySourceInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdateIdentitySourceOutput) => void): Request<VerifiedPermissions.Types.UpdateIdentitySourceOutput, AWSError>;
|
186
186
|
/**
|
187
|
-
* Updates the specified identity source to use a new identity provider (IdP) source, or to change the mapping of identities from the IdP to a different principal entity type. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
187
|
+
* Updates the specified identity source to use a new identity provider (IdP) source, or to change the mapping of identities from the IdP to a different principal entity type. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
188
188
|
*/
|
189
189
|
updateIdentitySource(callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdateIdentitySourceOutput) => void): Request<VerifiedPermissions.Types.UpdateIdentitySourceOutput, AWSError>;
|
190
190
|
/**
|
191
|
-
* Modifies a Cedar static policy in the specified policy store. You can change only certain elements of the UpdatePolicyDefinition parameter. You can directly update only static policies. To change a template-linked policy, you must update the template instead, using UpdatePolicyTemplate. If policy validation is enabled in the policy store, then updating a static policy causes Verified Permissions to validate the policy against the schema in the policy store. If the updated static policy doesn't pass validation, the operation fails and the update isn't stored. When you edit a static policy,
|
191
|
+
* Modifies a Cedar static policy in the specified policy store. You can change only certain elements of the UpdatePolicyDefinition parameter. You can directly update only static policies. To change a template-linked policy, you must update the template instead, using UpdatePolicyTemplate. If policy validation is enabled in the policy store, then updating a static policy causes Verified Permissions to validate the policy against the schema in the policy store. If the updated static policy doesn't pass validation, the operation fails and the update isn't stored. When you edit a static policy, you can change only certain elements of a static policy: The action referenced by the policy. A condition clause, such as when and unless. You can't change these elements of a static policy: Changing a policy from a static policy to a template-linked policy. Changing the effect of a static policy from permit or forbid. The principal referenced by a static policy. The resource referenced by a static policy. To update a template-linked policy, you must update the template instead. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
192
192
|
*/
|
193
193
|
updatePolicy(params: VerifiedPermissions.Types.UpdatePolicyInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdatePolicyOutput) => void): Request<VerifiedPermissions.Types.UpdatePolicyOutput, AWSError>;
|
194
194
|
/**
|
195
|
-
* Modifies a Cedar static policy in the specified policy store. You can change only certain elements of the UpdatePolicyDefinition parameter. You can directly update only static policies. To change a template-linked policy, you must update the template instead, using UpdatePolicyTemplate. If policy validation is enabled in the policy store, then updating a static policy causes Verified Permissions to validate the policy against the schema in the policy store. If the updated static policy doesn't pass validation, the operation fails and the update isn't stored. When you edit a static policy,
|
195
|
+
* Modifies a Cedar static policy in the specified policy store. You can change only certain elements of the UpdatePolicyDefinition parameter. You can directly update only static policies. To change a template-linked policy, you must update the template instead, using UpdatePolicyTemplate. If policy validation is enabled in the policy store, then updating a static policy causes Verified Permissions to validate the policy against the schema in the policy store. If the updated static policy doesn't pass validation, the operation fails and the update isn't stored. When you edit a static policy, you can change only certain elements of a static policy: The action referenced by the policy. A condition clause, such as when and unless. You can't change these elements of a static policy: Changing a policy from a static policy to a template-linked policy. Changing the effect of a static policy from permit or forbid. The principal referenced by a static policy. The resource referenced by a static policy. To update a template-linked policy, you must update the template instead. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
196
196
|
*/
|
197
197
|
updatePolicy(callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdatePolicyOutput) => void): Request<VerifiedPermissions.Types.UpdatePolicyOutput, AWSError>;
|
198
198
|
/**
|
199
|
-
* Modifies the validation setting for a policy store. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
199
|
+
* Modifies the validation setting for a policy store. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
200
200
|
*/
|
201
201
|
updatePolicyStore(params: VerifiedPermissions.Types.UpdatePolicyStoreInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdatePolicyStoreOutput) => void): Request<VerifiedPermissions.Types.UpdatePolicyStoreOutput, AWSError>;
|
202
202
|
/**
|
203
|
-
* Modifies the validation setting for a policy store. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
203
|
+
* Modifies the validation setting for a policy store. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
204
204
|
*/
|
205
205
|
updatePolicyStore(callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdatePolicyStoreOutput) => void): Request<VerifiedPermissions.Types.UpdatePolicyStoreOutput, AWSError>;
|
206
206
|
/**
|
207
|
-
* Updates the specified policy template. You can update only the description and the some elements of the policyBody. Changes you make to the policy template content are immediately (within the constraints of eventual consistency) reflected in authorization decisions that involve all template-linked policies instantiated from this template. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
207
|
+
* Updates the specified policy template. You can update only the description and the some elements of the policyBody. Changes you make to the policy template content are immediately (within the constraints of eventual consistency) reflected in authorization decisions that involve all template-linked policies instantiated from this template. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
208
208
|
*/
|
209
209
|
updatePolicyTemplate(params: VerifiedPermissions.Types.UpdatePolicyTemplateInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdatePolicyTemplateOutput) => void): Request<VerifiedPermissions.Types.UpdatePolicyTemplateOutput, AWSError>;
|
210
210
|
/**
|
211
|
-
* Updates the specified policy template. You can update only the description and the some elements of the policyBody. Changes you make to the policy template content are immediately (within the constraints of eventual consistency) reflected in authorization decisions that involve all template-linked policies instantiated from this template. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to
|
211
|
+
* Updates the specified policy template. You can update only the description and the some elements of the policyBody. Changes you make to the policy template content are immediately (within the constraints of eventual consistency) reflected in authorization decisions that involve all template-linked policies instantiated from this template. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
|
212
212
|
*/
|
213
213
|
updatePolicyTemplate(callback?: (err: AWSError, data: VerifiedPermissions.Types.UpdatePolicyTemplateOutput) => void): Request<VerifiedPermissions.Types.UpdatePolicyTemplateOutput, AWSError>;
|
214
214
|
}
|
@@ -323,12 +323,52 @@ declare namespace VerifiedPermissions {
|
|
323
323
|
*/
|
324
324
|
clientIds?: ClientIds;
|
325
325
|
}
|
326
|
+
export interface CognitoUserPoolConfigurationDetail {
|
327
|
+
/**
|
328
|
+
* The Amazon Resource Name (ARN) of the Amazon Cognito user pool that contains the identities to be authorized. Example: "userPoolArn": "arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5"
|
329
|
+
*/
|
330
|
+
userPoolArn: UserPoolArn;
|
331
|
+
/**
|
332
|
+
* The unique application client IDs that are associated with the specified Amazon Cognito user pool. Example: "clientIds": ["&ExampleCogClientId;"]
|
333
|
+
*/
|
334
|
+
clientIds: ClientIds;
|
335
|
+
/**
|
336
|
+
* The OpenID Connect (OIDC) issuer ID of the Amazon Cognito user pool that contains the identities to be authorized. Example: "issuer": "https://cognito-idp.us-east-1.amazonaws.com/us-east-1_1a2b3c4d5"
|
337
|
+
*/
|
338
|
+
issuer: Issuer;
|
339
|
+
}
|
340
|
+
export interface CognitoUserPoolConfigurationItem {
|
341
|
+
/**
|
342
|
+
* The Amazon Resource Name (ARN) of the Amazon Cognito user pool that contains the identities to be authorized. Example: "userPoolArn": "arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5"
|
343
|
+
*/
|
344
|
+
userPoolArn: UserPoolArn;
|
345
|
+
/**
|
346
|
+
* The unique application client IDs that are associated with the specified Amazon Cognito user pool. Example: "clientIds": ["&ExampleCogClientId;"]
|
347
|
+
*/
|
348
|
+
clientIds: ClientIds;
|
349
|
+
/**
|
350
|
+
* The OpenID Connect (OIDC) issuer ID of the Amazon Cognito user pool that contains the identities to be authorized. Example: "issuer": "https://cognito-idp.us-east-1.amazonaws.com/us-east-1_1a2b3c4d5"
|
351
|
+
*/
|
352
|
+
issuer: Issuer;
|
353
|
+
}
|
326
354
|
export interface Configuration {
|
327
355
|
/**
|
328
356
|
* Contains configuration details of a Amazon Cognito user pool that Verified Permissions can use as a source of authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool and one or more application client IDs. Example: "configuration":{"cognitoUserPoolConfiguration":{"userPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","clientIds": ["a1b2c3d4e5f6g7h8i9j0kalbmc"]}}
|
329
357
|
*/
|
330
358
|
cognitoUserPoolConfiguration?: CognitoUserPoolConfiguration;
|
331
359
|
}
|
360
|
+
export interface ConfigurationDetail {
|
361
|
+
/**
|
362
|
+
* Contains configuration details of a Amazon Cognito user pool that Verified Permissions can use as a source of authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool and one or more application client IDs. Example: "configuration":{"cognitoUserPoolConfiguration":{"userPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","clientIds": ["a1b2c3d4e5f6g7h8i9j0kalbmc"]}}
|
363
|
+
*/
|
364
|
+
cognitoUserPoolConfiguration?: CognitoUserPoolConfigurationDetail;
|
365
|
+
}
|
366
|
+
export interface ConfigurationItem {
|
367
|
+
/**
|
368
|
+
* Contains configuration details of a Amazon Cognito user pool that Verified Permissions can use as a source of authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool and one or more application client IDs. Example: "configuration":{"cognitoUserPoolConfiguration":{"userPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","clientIds": ["a1b2c3d4e5f6g7h8i9j0kalbmc"]}}
|
369
|
+
*/
|
370
|
+
cognitoUserPoolConfiguration?: CognitoUserPoolConfigurationItem;
|
371
|
+
}
|
332
372
|
export interface ContextDefinition {
|
333
373
|
/**
|
334
374
|
* An list of attributes that are needed to successfully evaluate an authorization request. Each attribute in this array must include a map of a data type and its value. Example: "contextMap":{"<KeyName1>":{"boolean":true},"<KeyName2>":{"long":1234}}
|
@@ -338,7 +378,7 @@ declare namespace VerifiedPermissions {
|
|
338
378
|
export type ContextMap = {[key: string]: AttributeValue};
|
339
379
|
export interface CreateIdentitySourceInput {
|
340
380
|
/**
|
341
|
-
* Specifies a unique, case-sensitive ID that you provide to ensure the idempotency of the request. This lets you safely retry the request without accidentally performing the same operation a second time. Passing the same value to a later call to an operation requires that you also pass the same value for all other parameters. We recommend that you use a UUID type of value.. If you don't provide this value, then Amazon Web Services generates a random one for you. If you retry the operation with the same ClientToken, but with different parameters, the retry fails with an
|
381
|
+
* Specifies a unique, case-sensitive ID that you provide to ensure the idempotency of the request. This lets you safely retry the request without accidentally performing the same operation a second time. Passing the same value to a later call to an operation requires that you also pass the same value for all other parameters. We recommend that you use a UUID type of value.. If you don't provide this value, then Amazon Web Services generates a random one for you. If you retry the operation with the same ClientToken, but with different parameters, the retry fails with an ConflictException error. Verified Permissions recognizes a ClientToken for eight hours. After eight hours, the next request with the same parameters performs the operation again regardless of the value of ClientToken.
|
342
382
|
*/
|
343
383
|
clientToken?: IdempotencyToken;
|
344
384
|
/**
|
@@ -374,7 +414,7 @@ declare namespace VerifiedPermissions {
|
|
374
414
|
}
|
375
415
|
export interface CreatePolicyInput {
|
376
416
|
/**
|
377
|
-
* Specifies a unique, case-sensitive ID that you provide to ensure the idempotency of the request. This lets you safely retry the request without accidentally performing the same operation a second time. Passing the same value to a later call to an operation requires that you also pass the same value for all other parameters. We recommend that you use a UUID type of value.. If you don't provide this value, then Amazon Web Services generates a random one for you. If you retry the operation with the same ClientToken, but with different parameters, the retry fails with an
|
417
|
+
* Specifies a unique, case-sensitive ID that you provide to ensure the idempotency of the request. This lets you safely retry the request without accidentally performing the same operation a second time. Passing the same value to a later call to an operation requires that you also pass the same value for all other parameters. We recommend that you use a UUID type of value.. If you don't provide this value, then Amazon Web Services generates a random one for you. If you retry the operation with the same ClientToken, but with different parameters, the retry fails with an ConflictException error. Verified Permissions recognizes a ClientToken for eight hours. After eight hours, the next request with the same parameters performs the operation again regardless of the value of ClientToken.
|
378
418
|
*/
|
379
419
|
clientToken?: IdempotencyToken;
|
380
420
|
/**
|
@@ -418,7 +458,7 @@ declare namespace VerifiedPermissions {
|
|
418
458
|
}
|
419
459
|
export interface CreatePolicyStoreInput {
|
420
460
|
/**
|
421
|
-
* Specifies a unique, case-sensitive ID that you provide to ensure the idempotency of the request. This lets you safely retry the request without accidentally performing the same operation a second time. Passing the same value to a later call to an operation requires that you also pass the same value for all other parameters. We recommend that you use a UUID type of value.. If you don't provide this value, then Amazon Web Services generates a random one for you. If you retry the operation with the same ClientToken, but with different parameters, the retry fails with an
|
461
|
+
* Specifies a unique, case-sensitive ID that you provide to ensure the idempotency of the request. This lets you safely retry the request without accidentally performing the same operation a second time. Passing the same value to a later call to an operation requires that you also pass the same value for all other parameters. We recommend that you use a UUID type of value.. If you don't provide this value, then Amazon Web Services generates a random one for you. If you retry the operation with the same ClientToken, but with different parameters, the retry fails with an ConflictException error. Verified Permissions recognizes a ClientToken for eight hours. After eight hours, the next request with the same parameters performs the operation again regardless of the value of ClientToken.
|
422
462
|
*/
|
423
463
|
clientToken?: IdempotencyToken;
|
424
464
|
/**
|
@@ -450,7 +490,7 @@ declare namespace VerifiedPermissions {
|
|
450
490
|
}
|
451
491
|
export interface CreatePolicyTemplateInput {
|
452
492
|
/**
|
453
|
-
* Specifies a unique, case-sensitive ID that you provide to ensure the idempotency of the request. This lets you safely retry the request without accidentally performing the same operation a second time. Passing the same value to a later call to an operation requires that you also pass the same value for all other parameters. We recommend that you use a UUID type of value.. If you don't provide this value, then Amazon Web Services generates a random one for you. If you retry the operation with the same ClientToken, but with different parameters, the retry fails with an
|
493
|
+
* Specifies a unique, case-sensitive ID that you provide to ensure the idempotency of the request. This lets you safely retry the request without accidentally performing the same operation a second time. Passing the same value to a later call to an operation requires that you also pass the same value for all other parameters. We recommend that you use a UUID type of value.. If you don't provide this value, then Amazon Web Services generates a random one for you. If you retry the operation with the same ClientToken, but with different parameters, the retry fails with an ConflictException error. Verified Permissions recognizes a ClientToken for eight hours. After eight hours, the next request with the same parameters performs the operation again regardless of the value of ClientToken.
|
454
494
|
*/
|
455
495
|
clientToken?: IdempotencyToken;
|
456
496
|
/**
|
@@ -606,7 +646,7 @@ declare namespace VerifiedPermissions {
|
|
606
646
|
/**
|
607
647
|
* A structure that describes the configuration of the identity source.
|
608
648
|
*/
|
609
|
-
details
|
649
|
+
details?: IdentitySourceDetails;
|
610
650
|
/**
|
611
651
|
* The ID of the identity source.
|
612
652
|
*/
|
@@ -623,6 +663,10 @@ declare namespace VerifiedPermissions {
|
|
623
663
|
* The data type of principals generated for identities authenticated by this identity source.
|
624
664
|
*/
|
625
665
|
principalEntityType: PrincipalEntityType;
|
666
|
+
/**
|
667
|
+
* Contains configuration information about an identity source.
|
668
|
+
*/
|
669
|
+
configuration?: ConfigurationDetail;
|
626
670
|
}
|
627
671
|
export interface GetPolicyInput {
|
628
672
|
/**
|
@@ -799,7 +843,7 @@ declare namespace VerifiedPermissions {
|
|
799
843
|
/**
|
800
844
|
* A structure that contains the details of the associated identity provider (IdP).
|
801
845
|
*/
|
802
|
-
details
|
846
|
+
details?: IdentitySourceItemDetails;
|
803
847
|
/**
|
804
848
|
* The unique identifier of the identity source.
|
805
849
|
*/
|
@@ -816,6 +860,10 @@ declare namespace VerifiedPermissions {
|
|
816
860
|
* The Cedar entity type of the principals returned from the IdP associated with this identity source.
|
817
861
|
*/
|
818
862
|
principalEntityType: PrincipalEntityType;
|
863
|
+
/**
|
864
|
+
* Contains configuration information about an identity source.
|
865
|
+
*/
|
866
|
+
configuration?: ConfigurationItem;
|
819
867
|
}
|
820
868
|
export interface IdentitySourceItemDetails {
|
821
869
|
/**
|
@@ -882,11 +930,11 @@ declare namespace VerifiedPermissions {
|
|
882
930
|
*/
|
883
931
|
policyStoreId: PolicyStoreId;
|
884
932
|
/**
|
885
|
-
* Specifies an identity token for the principal to be authorized. This token is provided to you by the identity provider (IdP) associated with the specified identity source. You must specify either an
|
933
|
+
* Specifies an identity token for the principal to be authorized. This token is provided to you by the identity provider (IdP) associated with the specified identity source. You must specify either an accessToken, an identityToken, or both. Must be an ID token. Verified Permissions returns an error if the token_use claim in the submitted token isn't id.
|
886
934
|
*/
|
887
935
|
identityToken?: Token;
|
888
936
|
/**
|
889
|
-
* Specifies an access token for the principal to be authorized. This token is provided to you by the identity provider (IdP) associated with the specified identity source. You must specify either an
|
937
|
+
* Specifies an access token for the principal to be authorized. This token is provided to you by the identity provider (IdP) associated with the specified identity source. You must specify either an accessToken, an identityToken, or both. Must be an access token. Verified Permissions returns an error if the token_use claim in the submitted token isn't access.
|
890
938
|
*/
|
891
939
|
accessToken?: Token;
|
892
940
|
/**
|
@@ -920,6 +968,7 @@ declare namespace VerifiedPermissions {
|
|
920
968
|
*/
|
921
969
|
errors: EvaluationErrorList;
|
922
970
|
}
|
971
|
+
export type Issuer = string;
|
923
972
|
export interface ListIdentitySourcesInput {
|
924
973
|
/**
|
925
974
|
* Specifies the ID of the policy store that contains the identity sources that you want to list.
|
@@ -515,7 +515,7 @@ declare namespace WAFV2 {
|
|
515
515
|
/**
|
516
516
|
* Applies only to the targeted inspection level. Determines whether to use machine learning (ML) to analyze your web traffic for bot-related activity. Machine learning is required for the Bot Control rules TGT_ML_CoordinatedActivityLow and TGT_ML_CoordinatedActivityMedium, which inspect for anomalous behavior that might indicate distributed, coordinated bot activity. For more information about this choice, see the listing for these rules in the table at Bot Control rules listing in the WAF Developer Guide. Default: TRUE
|
517
517
|
*/
|
518
|
-
EnableMachineLearning?:
|
518
|
+
EnableMachineLearning?: EnableMachineLearning;
|
519
519
|
}
|
520
520
|
export type Action = string;
|
521
521
|
export interface ActionCondition {
|
@@ -560,10 +560,10 @@ declare namespace WAFV2 {
|
|
560
560
|
}
|
561
561
|
export interface AssociateWebACLResponse {
|
562
562
|
}
|
563
|
-
export type AssociatedResourceType = "CLOUDFRONT"|string;
|
563
|
+
export type AssociatedResourceType = "CLOUDFRONT"|"API_GATEWAY"|"COGNITO_USER_POOL"|"APP_RUNNER_SERVICE"|"VERIFIED_ACCESS_INSTANCE"|string;
|
564
564
|
export interface AssociationConfig {
|
565
565
|
/**
|
566
|
-
* Customizes the maximum size of the request body that your protected CloudFront
|
566
|
+
* Customizes the maximum size of the request body that your protected CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access resources forward to WAF for inspection. The default size is 16 KB (16,384 bytes). You can change the setting for any of the available resource types. You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing. Example JSON: { "API_GATEWAY": "KB_48", "APP_RUNNER_SERVICE": "KB_32" } For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes).
|
567
567
|
*/
|
568
568
|
RequestBody?: RequestBody;
|
569
569
|
}
|
@@ -575,7 +575,7 @@ declare namespace WAFV2 {
|
|
575
575
|
}
|
576
576
|
export interface Body {
|
577
577
|
/**
|
578
|
-
* What WAF should do if the body is larger than WAF can inspect.
|
578
|
+
* What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service only forwards the contents that are within the limit to WAF for inspection. For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes). For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and you can increase the limit for each resource type in the web ACL AssociationConfig, for additional processing fees. The options for oversize handling are the following: CONTINUE - Inspect the available body contents normally, according to the rule inspection criteria. MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request. NO_MATCH - Treat the web request as not matching the rule statement. You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit. Default: CONTINUE
|
579
579
|
*/
|
580
580
|
OversizeHandling?: OversizeHandling;
|
581
581
|
}
|
@@ -881,7 +881,7 @@ declare namespace WAFV2 {
|
|
881
881
|
*/
|
882
882
|
TokenDomains?: TokenDomains;
|
883
883
|
/**
|
884
|
-
* Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected
|
884
|
+
* Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected resources forward to WAF for inspection. You can customize this setting for CloudFront, API Gateway, Amazon Cognito, App Runner, or Verified Access resources. The default setting is 16 KB (16,384 bytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing. For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes).
|
885
885
|
*/
|
886
886
|
AssociationConfig?: AssociationConfig;
|
887
887
|
}
|
@@ -1161,6 +1161,7 @@ declare namespace WAFV2 {
|
|
1161
1161
|
*/
|
1162
1162
|
Identifier: FieldIdentifier;
|
1163
1163
|
}
|
1164
|
+
export type EnableMachineLearning = boolean;
|
1164
1165
|
export type EntityDescription = string;
|
1165
1166
|
export type EntityId = string;
|
1166
1167
|
export type EntityName = string;
|
@@ -1199,7 +1200,7 @@ declare namespace WAFV2 {
|
|
1199
1200
|
*/
|
1200
1201
|
QueryString?: QueryString;
|
1201
1202
|
/**
|
1202
|
-
* Inspect the request body as plain text. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form.
|
1203
|
+
* Inspect the request body as plain text. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service only forwards the contents that are within the limit to WAF for inspection. For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes). For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and you can increase the limit for each resource type in the web ACL AssociationConfig, for additional processing fees. For information about how to handle oversized request bodies, see the Body object configuration.
|
1203
1204
|
*/
|
1204
1205
|
Body?: Body;
|
1205
1206
|
/**
|
@@ -1207,7 +1208,7 @@ declare namespace WAFV2 {
|
|
1207
1208
|
*/
|
1208
1209
|
Method?: Method;
|
1209
1210
|
/**
|
1210
|
-
* Inspect the request body as JSON. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form.
|
1211
|
+
* Inspect the request body as JSON. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service only forwards the contents that are within the limit to WAF for inspection. For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes). For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and you can increase the limit for each resource type in the web ACL AssociationConfig, for additional processing fees. For information about how to handle oversized request bodies, see the JsonBody object configuration.
|
1211
1212
|
*/
|
1212
1213
|
JsonBody?: JsonBody;
|
1213
1214
|
/**
|
@@ -1764,7 +1765,7 @@ declare namespace WAFV2 {
|
|
1764
1765
|
*/
|
1765
1766
|
InvalidFallbackBehavior?: BodyParsingFallbackBehavior;
|
1766
1767
|
/**
|
1767
|
-
* What WAF should do if the body is larger than WAF can inspect.
|
1768
|
+
* What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service only forwards the contents that are within the limit to WAF for inspection. For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes). For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and you can increase the limit for each resource type in the web ACL AssociationConfig, for additional processing fees. The options for oversize handling are the following: CONTINUE - Inspect the available body contents normally, according to the rule inspection criteria. MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request. NO_MATCH - Treat the web request as not matching the rule statement. You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit. Default: CONTINUE
|
1768
1769
|
*/
|
1769
1770
|
OversizeHandling?: OversizeHandling;
|
1770
1771
|
}
|
@@ -2721,7 +2722,7 @@ declare namespace WAFV2 {
|
|
2721
2722
|
export type RequestBody = {[key: string]: RequestBodyAssociatedResourceTypeConfig};
|
2722
2723
|
export interface RequestBodyAssociatedResourceTypeConfig {
|
2723
2724
|
/**
|
2724
|
-
* Specifies the maximum size of the web request body component that an associated CloudFront
|
2725
|
+
* Specifies the maximum size of the web request body component that an associated CloudFront, API Gateway, Amazon Cognito, App Runner, or Verified Access resource should send to WAF for inspection. This applies to statements in the web ACL that inspect the body or JSON body. Default: 16 KB (16,384 bytes)
|
2725
2726
|
*/
|
2726
2727
|
DefaultSizeInspectionLimit: SizeInspectionLimit;
|
2727
2728
|
}
|
@@ -3127,7 +3128,7 @@ declare namespace WAFV2 {
|
|
3127
3128
|
*/
|
3128
3129
|
XssMatchStatement?: XssMatchStatement;
|
3129
3130
|
/**
|
3130
|
-
* A rule statement that compares a number of bytes against the size of a request component, using a comparison operator, such as greater than (>) or less than (<). For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes. If you configure WAF to inspect the request body, WAF inspects only the number of bytes
|
3131
|
+
* A rule statement that compares a number of bytes against the size of a request component, using a comparison operator, such as greater than (>) or less than (<). For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes. If you configure WAF to inspect the request body, WAF inspects only the number of bytes in the body up to the limit for the web ACL and protected resource type. If you know that the request body for your web requests should never exceed the inspection limit, you can use a size constraint statement to block requests that have a larger request body size. For more information about the inspection limits, see Body and JsonBody settings for the FieldToMatch data type. If you choose URI for the value of Part of the request to filter on, the slash (/) in the URI counts as one character. For example, the URI /logo.jpg is nine characters long.
|
3131
3132
|
*/
|
3132
3133
|
SizeConstraintStatement?: SizeConstraintStatement;
|
3133
3134
|
/**
|
@@ -3147,7 +3148,7 @@ declare namespace WAFV2 {
|
|
3147
3148
|
*/
|
3148
3149
|
RegexPatternSetReferenceStatement?: RegexPatternSetReferenceStatement;
|
3149
3150
|
/**
|
3150
|
-
* A rate-based rule counts incoming requests and rate limits requests when they are coming at too fast a rate. The rule categorizes requests according to your aggregation criteria, collects them into aggregation instances, and counts and rate limits the requests for each instance.
|
3151
|
+
* A rate-based rule counts incoming requests and rate limits requests when they are coming at too fast a rate. The rule categorizes requests according to your aggregation criteria, collects them into aggregation instances, and counts and rate limits the requests for each instance. If you change any of these settings in a rule that's currently in use, the change resets the rule's rate limiting counts. This can pause the rule's rate limiting activities for up to a minute. You can specify individual aggregation keys, like IP address or HTTP method. You can also specify aggregation key combinations, like IP address and HTTP method, or HTTP method, query argument, and cookie. Each unique set of values for the aggregation keys that you specify is a separate aggregation instance, with the value from each key contributing to the aggregation instance definition. For example, assume the rule evaluates web requests with the following IP address and HTTP method values: IP address 10.1.1.1, HTTP method POST IP address 10.1.1.1, HTTP method GET IP address 127.0.0.0, HTTP method POST IP address 10.1.1.1, HTTP method GET The rule would create different aggregation instances according to your aggregation criteria, for example: If the aggregation criteria is just the IP address, then each individual address is an aggregation instance, and WAF counts requests separately for each. The aggregation instances and request counts for our example would be the following: IP address 10.1.1.1: count 3 IP address 127.0.0.0: count 1 If the aggregation criteria is HTTP method, then each individual HTTP method is an aggregation instance. The aggregation instances and request counts for our example would be the following: HTTP method POST: count 2 HTTP method GET: count 2 If the aggregation criteria is IP address and HTTP method, then each IP address and each HTTP method would contribute to the combined aggregation instance. The aggregation instances and request counts for our example would be the following: IP address 10.1.1.1, HTTP method POST: count 1 IP address 10.1.1.1, HTTP method GET: count 2 IP address 127.0.0.0, HTTP method POST: count 1 For any n-tuple of aggregation keys, each unique combination of values for the keys defines a separate aggregation instance, which WAF counts and rate-limits individually. You can optionally nest another statement inside the rate-based statement, to narrow the scope of the rule so that it only counts and rate limits requests that match the nested statement. You can use this nested scope-down statement in conjunction with your aggregation key specifications or you can just count and rate limit all requests that match the scope-down statement, without additional aggregation. When you choose to just manage all requests that match a scope-down statement, the aggregation instance is singular for the rule. You cannot nest a RateBasedStatement inside another statement, for example inside a NotStatement or OrStatement. You can define a RateBasedStatement inside a web ACL and inside a rule group. For additional information about the options, see Rate limiting web requests using rate-based rules in the WAF Developer Guide. If you only aggregate on the individual IP address or forwarded IP address, you can retrieve the list of IP addresses that WAF is currently rate limiting for a rule through the API call GetRateBasedStatementManagedKeys. This option is not available for other aggregation configurations. WAF tracks and manages web requests separately for each instance of a rate-based rule that you use. For example, if you provide the same rate-based rule settings in two web ACLs, each of the two rule statements represents a separate instance of the rate-based rule and gets its own tracking and management by WAF. If you define a rate-based rule inside a rule group, and then use that rule group in multiple places, each use creates a separate instance of the rate-based rule that gets its own tracking and management by WAF.
|
3151
3152
|
*/
|
3152
3153
|
RateBasedStatement?: RateBasedStatement;
|
3153
3154
|
/**
|
@@ -3450,7 +3451,7 @@ declare namespace WAFV2 {
|
|
3450
3451
|
*/
|
3451
3452
|
TokenDomains?: TokenDomains;
|
3452
3453
|
/**
|
3453
|
-
* Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected
|
3454
|
+
* Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected resources forward to WAF for inspection. You can customize this setting for CloudFront, API Gateway, Amazon Cognito, App Runner, or Verified Access resources. The default setting is 16 KB (16,384 bytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing. For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes).
|
3454
3455
|
*/
|
3455
3456
|
AssociationConfig?: AssociationConfig;
|
3456
3457
|
}
|
@@ -3561,7 +3562,7 @@ declare namespace WAFV2 {
|
|
3561
3562
|
*/
|
3562
3563
|
TokenDomains?: TokenDomains;
|
3563
3564
|
/**
|
3564
|
-
* Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected
|
3565
|
+
* Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected resources forward to WAF for inspection. You can customize this setting for CloudFront, API Gateway, Amazon Cognito, App Runner, or Verified Access resources. The default setting is 16 KB (16,384 bytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing. For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes).
|
3565
3566
|
*/
|
3566
3567
|
AssociationConfig?: AssociationConfig;
|
3567
3568
|
}
|