cdk-lambda-subminute 2.0.397 → 2.0.399

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (34) hide show
  1. package/.jsii +3 -3
  2. package/lib/cdk-lambda-subminute.js +3 -3
  3. package/node_modules/aws-sdk/README.md +4 -4
  4. package/node_modules/aws-sdk/apis/appconfig-2019-10-09.min.json +9 -1
  5. package/node_modules/aws-sdk/apis/batch-2016-08-10.min.json +187 -158
  6. package/node_modules/aws-sdk/apis/bedrock-agent-runtime-2023-07-26.min.json +252 -252
  7. package/node_modules/aws-sdk/apis/ec2-2016-11-15.min.json +9 -1
  8. package/node_modules/aws-sdk/apis/grafana-2020-08-18.min.json +82 -75
  9. package/node_modules/aws-sdk/apis/payment-cryptography-data-2022-02-03.min.json +83 -62
  10. package/node_modules/aws-sdk/apis/wafv2-2019-07-29.min.json +106 -106
  11. package/node_modules/aws-sdk/clients/appconfig.d.ts +24 -14
  12. package/node_modules/aws-sdk/clients/batch.d.ts +36 -3
  13. package/node_modules/aws-sdk/clients/bedrockagentruntime.d.ts +363 -81
  14. package/node_modules/aws-sdk/clients/cloudtrail.d.ts +2 -2
  15. package/node_modules/aws-sdk/clients/codebuild.d.ts +4 -4
  16. package/node_modules/aws-sdk/clients/cognitoidentityserviceprovider.d.ts +32 -32
  17. package/node_modules/aws-sdk/clients/ec2.d.ts +17 -9
  18. package/node_modules/aws-sdk/clients/grafana.d.ts +26 -9
  19. package/node_modules/aws-sdk/clients/guardduty.d.ts +14 -14
  20. package/node_modules/aws-sdk/clients/lambda.d.ts +46 -46
  21. package/node_modules/aws-sdk/clients/paymentcryptographydata.d.ts +68 -36
  22. package/node_modules/aws-sdk/clients/rds.d.ts +5 -5
  23. package/node_modules/aws-sdk/clients/snowball.d.ts +1 -1
  24. package/node_modules/aws-sdk/clients/transfer.d.ts +8 -8
  25. package/node_modules/aws-sdk/clients/wafv2.d.ts +14 -13
  26. package/node_modules/aws-sdk/clients/workspaces.d.ts +5 -5
  27. package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +4 -3
  28. package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +11 -10
  29. package/node_modules/aws-sdk/dist/aws-sdk.js +15 -6
  30. package/node_modules/aws-sdk/dist/aws-sdk.min.js +38 -38
  31. package/node_modules/aws-sdk/lib/core.js +1 -1
  32. package/node_modules/aws-sdk/lib/maintenance_mode_message.js +3 -2
  33. package/node_modules/aws-sdk/package.json +1 -1
  34. package/package.json +3 -3
@@ -515,7 +515,7 @@ declare namespace WAFV2 {
515
515
  /**
516
516
  * Applies only to the targeted inspection level. Determines whether to use machine learning (ML) to analyze your web traffic for bot-related activity. Machine learning is required for the Bot Control rules TGT_ML_CoordinatedActivityLow and TGT_ML_CoordinatedActivityMedium, which inspect for anomalous behavior that might indicate distributed, coordinated bot activity. For more information about this choice, see the listing for these rules in the table at Bot Control rules listing in the WAF Developer Guide. Default: TRUE
517
517
  */
518
- EnableMachineLearning?: Boolean;
518
+ EnableMachineLearning?: EnableMachineLearning;
519
519
  }
520
520
  export type Action = string;
521
521
  export interface ActionCondition {
@@ -560,10 +560,10 @@ declare namespace WAFV2 {
560
560
  }
561
561
  export interface AssociateWebACLResponse {
562
562
  }
563
- export type AssociatedResourceType = "CLOUDFRONT"|string;
563
+ export type AssociatedResourceType = "CLOUDFRONT"|"API_GATEWAY"|"COGNITO_USER_POOL"|"APP_RUNNER_SERVICE"|"VERIFIED_ACCESS_INSTANCE"|string;
564
564
  export interface AssociationConfig {
565
565
  /**
566
- * Customizes the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default size is 16 KB (16,384 bytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing.
566
+ * Customizes the maximum size of the request body that your protected CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access resources forward to WAF for inspection. The default size is 16 KB (16,384 bytes). You can change the setting for any of the available resource types. You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing. Example JSON: { "API_GATEWAY": "KB_48", "APP_RUNNER_SERVICE": "KB_32" } For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes).
567
567
  */
568
568
  RequestBody?: RequestBody;
569
569
  }
@@ -575,7 +575,7 @@ declare namespace WAFV2 {
575
575
  }
576
576
  export interface Body {
577
577
  /**
578
- * What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service only forwards the contents that are below the limit to WAF for inspection. The default limit is 8 KB (8,192 bytes) for regional resources and 16 KB (16,384 bytes) for CloudFront distributions. For CloudFront distributions, you can increase the limit in the web ACL AssociationConfig, for additional processing fees. The options for oversize handling are the following: CONTINUE - Inspect the available body contents normally, according to the rule inspection criteria. MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request. NO_MATCH - Treat the web request as not matching the rule statement. You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit. Default: CONTINUE
578
+ * What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service only forwards the contents that are within the limit to WAF for inspection. For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes). For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and you can increase the limit for each resource type in the web ACL AssociationConfig, for additional processing fees. The options for oversize handling are the following: CONTINUE - Inspect the available body contents normally, according to the rule inspection criteria. MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request. NO_MATCH - Treat the web request as not matching the rule statement. You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit. Default: CONTINUE
579
579
  */
580
580
  OversizeHandling?: OversizeHandling;
581
581
  }
@@ -881,7 +881,7 @@ declare namespace WAFV2 {
881
881
  */
882
882
  TokenDomains?: TokenDomains;
883
883
  /**
884
- * Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 bytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing.
884
+ * Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected resources forward to WAF for inspection. You can customize this setting for CloudFront, API Gateway, Amazon Cognito, App Runner, or Verified Access resources. The default setting is 16 KB (16,384 bytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing. For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes).
885
885
  */
886
886
  AssociationConfig?: AssociationConfig;
887
887
  }
@@ -1161,6 +1161,7 @@ declare namespace WAFV2 {
1161
1161
  */
1162
1162
  Identifier: FieldIdentifier;
1163
1163
  }
1164
+ export type EnableMachineLearning = boolean;
1164
1165
  export type EntityDescription = string;
1165
1166
  export type EntityId = string;
1166
1167
  export type EntityName = string;
@@ -1199,7 +1200,7 @@ declare namespace WAFV2 {
1199
1200
  */
1200
1201
  QueryString?: QueryString;
1201
1202
  /**
1202
- * Inspect the request body as plain text. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. A limited amount of the request body is forwarded to WAF for inspection by the underlying host service. For regional resources, the limit is 8 KB (8,192 bytes) and for CloudFront distributions, the limit is 16 KB (16,384 bytes). For CloudFront distributions, you can increase the limit in the web ACL's AssociationConfig, for additional processing fees. For information about how to handle oversized request bodies, see the Body object configuration.
1203
+ * Inspect the request body as plain text. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service only forwards the contents that are within the limit to WAF for inspection. For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes). For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and you can increase the limit for each resource type in the web ACL AssociationConfig, for additional processing fees. For information about how to handle oversized request bodies, see the Body object configuration.
1203
1204
  */
1204
1205
  Body?: Body;
1205
1206
  /**
@@ -1207,7 +1208,7 @@ declare namespace WAFV2 {
1207
1208
  */
1208
1209
  Method?: Method;
1209
1210
  /**
1210
- * Inspect the request body as JSON. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. A limited amount of the request body is forwarded to WAF for inspection by the underlying host service. For regional resources, the limit is 8 KB (8,192 bytes) and for CloudFront distributions, the limit is 16 KB (16,384 bytes). For CloudFront distributions, you can increase the limit in the web ACL's AssociationConfig, for additional processing fees. For information about how to handle oversized request bodies, see the JsonBody object configuration.
1211
+ * Inspect the request body as JSON. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service only forwards the contents that are within the limit to WAF for inspection. For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes). For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and you can increase the limit for each resource type in the web ACL AssociationConfig, for additional processing fees. For information about how to handle oversized request bodies, see the JsonBody object configuration.
1211
1212
  */
1212
1213
  JsonBody?: JsonBody;
1213
1214
  /**
@@ -1764,7 +1765,7 @@ declare namespace WAFV2 {
1764
1765
  */
1765
1766
  InvalidFallbackBehavior?: BodyParsingFallbackBehavior;
1766
1767
  /**
1767
- * What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service only forwards the contents that are below the limit to WAF for inspection. The default limit is 8 KB (8,192 bytes) for regional resources and 16 KB (16,384 bytes) for CloudFront distributions. For CloudFront distributions, you can increase the limit in the web ACL AssociationConfig, for additional processing fees. The options for oversize handling are the following: CONTINUE - Inspect the available body contents normally, according to the rule inspection criteria. MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request. NO_MATCH - Treat the web request as not matching the rule statement. You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit. Default: CONTINUE
1768
+ * What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service only forwards the contents that are within the limit to WAF for inspection. For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes). For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and you can increase the limit for each resource type in the web ACL AssociationConfig, for additional processing fees. The options for oversize handling are the following: CONTINUE - Inspect the available body contents normally, according to the rule inspection criteria. MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request. NO_MATCH - Treat the web request as not matching the rule statement. You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit. Default: CONTINUE
1768
1769
  */
1769
1770
  OversizeHandling?: OversizeHandling;
1770
1771
  }
@@ -2721,7 +2722,7 @@ declare namespace WAFV2 {
2721
2722
  export type RequestBody = {[key: string]: RequestBodyAssociatedResourceTypeConfig};
2722
2723
  export interface RequestBodyAssociatedResourceTypeConfig {
2723
2724
  /**
2724
- * Specifies the maximum size of the web request body component that an associated CloudFront distribution should send to WAF for inspection. This applies to statements in the web ACL that inspect the body or JSON body. Default: 16 KB (16,384 bytes)
2725
+ * Specifies the maximum size of the web request body component that an associated CloudFront, API Gateway, Amazon Cognito, App Runner, or Verified Access resource should send to WAF for inspection. This applies to statements in the web ACL that inspect the body or JSON body. Default: 16 KB (16,384 bytes)
2725
2726
  */
2726
2727
  DefaultSizeInspectionLimit: SizeInspectionLimit;
2727
2728
  }
@@ -3127,7 +3128,7 @@ declare namespace WAFV2 {
3127
3128
  */
3128
3129
  XssMatchStatement?: XssMatchStatement;
3129
3130
  /**
3130
- * A rule statement that compares a number of bytes against the size of a request component, using a comparison operator, such as greater than (>) or less than (<). For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes. If you configure WAF to inspect the request body, WAF inspects only the number of bytes of the body up to the limit for the web ACL. By default, for regional web ACLs, this limit is 8 KB (8,192 bytes) and for CloudFront web ACLs, this limit is 16 KB (16,384 bytes). For CloudFront web ACLs, you can increase the limit in the web ACL AssociationConfig, for additional fees. If you know that the request body for your web requests should never exceed the inspection limit, you could use a size constraint statement to block requests that have a larger request body size. If you choose URI for the value of Part of the request to filter on, the slash (/) in the URI counts as one character. For example, the URI /logo.jpg is nine characters long.
3131
+ * A rule statement that compares a number of bytes against the size of a request component, using a comparison operator, such as greater than (>) or less than (<). For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes. If you configure WAF to inspect the request body, WAF inspects only the number of bytes in the body up to the limit for the web ACL and protected resource type. If you know that the request body for your web requests should never exceed the inspection limit, you can use a size constraint statement to block requests that have a larger request body size. For more information about the inspection limits, see Body and JsonBody settings for the FieldToMatch data type. If you choose URI for the value of Part of the request to filter on, the slash (/) in the URI counts as one character. For example, the URI /logo.jpg is nine characters long.
3131
3132
  */
3132
3133
  SizeConstraintStatement?: SizeConstraintStatement;
3133
3134
  /**
@@ -3147,7 +3148,7 @@ declare namespace WAFV2 {
3147
3148
  */
3148
3149
  RegexPatternSetReferenceStatement?: RegexPatternSetReferenceStatement;
3149
3150
  /**
3150
- * A rate-based rule counts incoming requests and rate limits requests when they are coming at too fast a rate. The rule categorizes requests according to your aggregation criteria, collects them into aggregation instances, and counts and rate limits the requests for each instance. You can specify individual aggregation keys, like IP address or HTTP method. You can also specify aggregation key combinations, like IP address and HTTP method, or HTTP method, query argument, and cookie. Each unique set of values for the aggregation keys that you specify is a separate aggregation instance, with the value from each key contributing to the aggregation instance definition. For example, assume the rule evaluates web requests with the following IP address and HTTP method values: IP address 10.1.1.1, HTTP method POST IP address 10.1.1.1, HTTP method GET IP address 127.0.0.0, HTTP method POST IP address 10.1.1.1, HTTP method GET The rule would create different aggregation instances according to your aggregation criteria, for example: If the aggregation criteria is just the IP address, then each individual address is an aggregation instance, and WAF counts requests separately for each. The aggregation instances and request counts for our example would be the following: IP address 10.1.1.1: count 3 IP address 127.0.0.0: count 1 If the aggregation criteria is HTTP method, then each individual HTTP method is an aggregation instance. The aggregation instances and request counts for our example would be the following: HTTP method POST: count 2 HTTP method GET: count 2 If the aggregation criteria is IP address and HTTP method, then each IP address and each HTTP method would contribute to the combined aggregation instance. The aggregation instances and request counts for our example would be the following: IP address 10.1.1.1, HTTP method POST: count 1 IP address 10.1.1.1, HTTP method GET: count 2 IP address 127.0.0.0, HTTP method POST: count 1 For any n-tuple of aggregation keys, each unique combination of values for the keys defines a separate aggregation instance, which WAF counts and rate-limits individually. You can optionally nest another statement inside the rate-based statement, to narrow the scope of the rule so that it only counts and rate limits requests that match the nested statement. You can use this nested scope-down statement in conjunction with your aggregation key specifications or you can just count and rate limit all requests that match the scope-down statement, without additional aggregation. When you choose to just manage all requests that match a scope-down statement, the aggregation instance is singular for the rule. You cannot nest a RateBasedStatement inside another statement, for example inside a NotStatement or OrStatement. You can define a RateBasedStatement inside a web ACL and inside a rule group. For additional information about the options, see Rate limiting web requests using rate-based rules in the WAF Developer Guide. If you only aggregate on the individual IP address or forwarded IP address, you can retrieve the list of IP addresses that WAF is currently rate limiting for a rule through the API call GetRateBasedStatementManagedKeys. This option is not available for other aggregation configurations. WAF tracks and manages web requests separately for each instance of a rate-based rule that you use. For example, if you provide the same rate-based rule settings in two web ACLs, each of the two rule statements represents a separate instance of the rate-based rule and gets its own tracking and management by WAF. If you define a rate-based rule inside a rule group, and then use that rule group in multiple places, each use creates a separate instance of the rate-based rule that gets its own tracking and management by WAF.
3151
+ * A rate-based rule counts incoming requests and rate limits requests when they are coming at too fast a rate. The rule categorizes requests according to your aggregation criteria, collects them into aggregation instances, and counts and rate limits the requests for each instance. If you change any of these settings in a rule that's currently in use, the change resets the rule's rate limiting counts. This can pause the rule's rate limiting activities for up to a minute. You can specify individual aggregation keys, like IP address or HTTP method. You can also specify aggregation key combinations, like IP address and HTTP method, or HTTP method, query argument, and cookie. Each unique set of values for the aggregation keys that you specify is a separate aggregation instance, with the value from each key contributing to the aggregation instance definition. For example, assume the rule evaluates web requests with the following IP address and HTTP method values: IP address 10.1.1.1, HTTP method POST IP address 10.1.1.1, HTTP method GET IP address 127.0.0.0, HTTP method POST IP address 10.1.1.1, HTTP method GET The rule would create different aggregation instances according to your aggregation criteria, for example: If the aggregation criteria is just the IP address, then each individual address is an aggregation instance, and WAF counts requests separately for each. The aggregation instances and request counts for our example would be the following: IP address 10.1.1.1: count 3 IP address 127.0.0.0: count 1 If the aggregation criteria is HTTP method, then each individual HTTP method is an aggregation instance. The aggregation instances and request counts for our example would be the following: HTTP method POST: count 2 HTTP method GET: count 2 If the aggregation criteria is IP address and HTTP method, then each IP address and each HTTP method would contribute to the combined aggregation instance. The aggregation instances and request counts for our example would be the following: IP address 10.1.1.1, HTTP method POST: count 1 IP address 10.1.1.1, HTTP method GET: count 2 IP address 127.0.0.0, HTTP method POST: count 1 For any n-tuple of aggregation keys, each unique combination of values for the keys defines a separate aggregation instance, which WAF counts and rate-limits individually. You can optionally nest another statement inside the rate-based statement, to narrow the scope of the rule so that it only counts and rate limits requests that match the nested statement. You can use this nested scope-down statement in conjunction with your aggregation key specifications or you can just count and rate limit all requests that match the scope-down statement, without additional aggregation. When you choose to just manage all requests that match a scope-down statement, the aggregation instance is singular for the rule. You cannot nest a RateBasedStatement inside another statement, for example inside a NotStatement or OrStatement. You can define a RateBasedStatement inside a web ACL and inside a rule group. For additional information about the options, see Rate limiting web requests using rate-based rules in the WAF Developer Guide. If you only aggregate on the individual IP address or forwarded IP address, you can retrieve the list of IP addresses that WAF is currently rate limiting for a rule through the API call GetRateBasedStatementManagedKeys. This option is not available for other aggregation configurations. WAF tracks and manages web requests separately for each instance of a rate-based rule that you use. For example, if you provide the same rate-based rule settings in two web ACLs, each of the two rule statements represents a separate instance of the rate-based rule and gets its own tracking and management by WAF. If you define a rate-based rule inside a rule group, and then use that rule group in multiple places, each use creates a separate instance of the rate-based rule that gets its own tracking and management by WAF.
3151
3152
  */
3152
3153
  RateBasedStatement?: RateBasedStatement;
3153
3154
  /**
@@ -3450,7 +3451,7 @@ declare namespace WAFV2 {
3450
3451
  */
3451
3452
  TokenDomains?: TokenDomains;
3452
3453
  /**
3453
- * Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 bytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing.
3454
+ * Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected resources forward to WAF for inspection. You can customize this setting for CloudFront, API Gateway, Amazon Cognito, App Runner, or Verified Access resources. The default setting is 16 KB (16,384 bytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing. For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes).
3454
3455
  */
3455
3456
  AssociationConfig?: AssociationConfig;
3456
3457
  }
@@ -3561,7 +3562,7 @@ declare namespace WAFV2 {
3561
3562
  */
3562
3563
  TokenDomains?: TokenDomains;
3563
3564
  /**
3564
- * Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 bytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing.
3565
+ * Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected resources forward to WAF for inspection. You can customize this setting for CloudFront, API Gateway, Amazon Cognito, App Runner, or Verified Access resources. The default setting is 16 KB (16,384 bytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing. For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes).
3565
3566
  */
3566
3567
  AssociationConfig?: AssociationConfig;
3567
3568
  }
@@ -116,11 +116,11 @@ declare class WorkSpaces extends Service {
116
116
  */
117
117
  createWorkspaceImage(callback?: (err: AWSError, data: WorkSpaces.Types.CreateWorkspaceImageResult) => void): Request<WorkSpaces.Types.CreateWorkspaceImageResult, AWSError>;
118
118
  /**
119
- * Creates one or more WorkSpaces. This operation is asynchronous and returns before the WorkSpaces are created. The MANUAL running mode value is only supported by Amazon WorkSpaces Core. Contact your account team to be allow-listed to use this value. For more information, see Amazon WorkSpaces Core. You don't need to specify the PCOIP protocol for Linux bundles because WSP is the default protocol for those bundles.
119
+ * Creates one or more WorkSpaces. This operation is asynchronous and returns before the WorkSpaces are created. The MANUAL running mode value is only supported by Amazon WorkSpaces Core. Contact your account team to be allow-listed to use this value. For more information, see Amazon WorkSpaces Core. You don't need to specify the PCOIP protocol for Linux bundles because WSP is the default protocol for those bundles. User-decoupled WorkSpaces are only supported by Amazon WorkSpaces Core.
120
120
  */
121
121
  createWorkspaces(params: WorkSpaces.Types.CreateWorkspacesRequest, callback?: (err: AWSError, data: WorkSpaces.Types.CreateWorkspacesResult) => void): Request<WorkSpaces.Types.CreateWorkspacesResult, AWSError>;
122
122
  /**
123
- * Creates one or more WorkSpaces. This operation is asynchronous and returns before the WorkSpaces are created. The MANUAL running mode value is only supported by Amazon WorkSpaces Core. Contact your account team to be allow-listed to use this value. For more information, see Amazon WorkSpaces Core. You don't need to specify the PCOIP protocol for Linux bundles because WSP is the default protocol for those bundles.
123
+ * Creates one or more WorkSpaces. This operation is asynchronous and returns before the WorkSpaces are created. The MANUAL running mode value is only supported by Amazon WorkSpaces Core. Contact your account team to be allow-listed to use this value. For more information, see Amazon WorkSpaces Core. You don't need to specify the PCOIP protocol for Linux bundles because WSP is the default protocol for those bundles. User-decoupled WorkSpaces are only supported by Amazon WorkSpaces Core.
124
124
  */
125
125
  createWorkspaces(callback?: (err: AWSError, data: WorkSpaces.Types.CreateWorkspacesResult) => void): Request<WorkSpaces.Types.CreateWorkspacesResult, AWSError>;
126
126
  /**
@@ -492,11 +492,11 @@ declare class WorkSpaces extends Service {
492
492
  */
493
493
  modifyWorkspaceState(callback?: (err: AWSError, data: WorkSpaces.Types.ModifyWorkspaceStateResult) => void): Request<WorkSpaces.Types.ModifyWorkspaceStateResult, AWSError>;
494
494
  /**
495
- * Reboots the specified WorkSpaces. You cannot reboot a WorkSpace unless its state is AVAILABLE or UNHEALTHY. This operation is asynchronous and returns before the WorkSpaces have rebooted.
495
+ * Reboots the specified WorkSpaces. You cannot reboot a WorkSpace unless its state is AVAILABLE, UNHEALTHY, or REBOOTING. Reboot a WorkSpace in the REBOOTING state only if your WorkSpace has been stuck in the REBOOTING state for over 20 minutes. This operation is asynchronous and returns before the WorkSpaces have rebooted.
496
496
  */
497
497
  rebootWorkspaces(params: WorkSpaces.Types.RebootWorkspacesRequest, callback?: (err: AWSError, data: WorkSpaces.Types.RebootWorkspacesResult) => void): Request<WorkSpaces.Types.RebootWorkspacesResult, AWSError>;
498
498
  /**
499
- * Reboots the specified WorkSpaces. You cannot reboot a WorkSpace unless its state is AVAILABLE or UNHEALTHY. This operation is asynchronous and returns before the WorkSpaces have rebooted.
499
+ * Reboots the specified WorkSpaces. You cannot reboot a WorkSpace unless its state is AVAILABLE, UNHEALTHY, or REBOOTING. Reboot a WorkSpace in the REBOOTING state only if your WorkSpace has been stuck in the REBOOTING state for over 20 minutes. This operation is asynchronous and returns before the WorkSpaces have rebooted.
500
500
  */
501
501
  rebootWorkspaces(callback?: (err: AWSError, data: WorkSpaces.Types.RebootWorkspacesResult) => void): Request<WorkSpaces.Types.RebootWorkspacesResult, AWSError>;
502
502
  /**
@@ -2775,7 +2775,7 @@ declare namespace WorkSpaces {
2775
2775
  */
2776
2776
  IpAddress?: IpAddress;
2777
2777
  /**
2778
- * The operational state of the WorkSpace. After a WorkSpace is terminated, the TERMINATED state is returned only briefly before the WorkSpace directory metadata is cleaned up, so this state is rarely returned. To confirm that a WorkSpace is terminated, check for the WorkSpace ID by using DescribeWorkSpaces. If the WorkSpace ID isn't returned, then the WorkSpace has been successfully terminated.
2778
+ * The operational state of the WorkSpace. PENDING – The WorkSpace is in a waiting state (for example, the WorkSpace is being created). AVAILABLE – The WorkSpace is running and has passed the health checks. IMPAIRED – Refer to UNHEALTHY state. UNHEALTHY – The WorkSpace is not responding to health checks. REBOOTING – The WorkSpace is being rebooted (restarted). STARTING – The WorkSpace is starting up and health checks are being run. REBUILDING – The WorkSpace is being rebuilt. RESTORING – The WorkSpace is being restored. MAINTENANCE – The WorkSpace is undergoing scheduled maintenance by Amazon Web Services. ADMIN_MAINTENANCE – The WorkSpace is undergoing maintenance by the WorkSpaces administrator. TERMINATING – The WorkSpace is being deleted. TERMINATED – The WorkSpace has been deleted. SUSPENDED – The WorkSpace has been suspended for image creation. UPDATING – The WorkSpace is undergoing an update. STOPPING – The WorkSpace is being stopped. STOPPED – The WorkSpace has been stopped. ERROR – The WorkSpace is an error state (for example, an error occurred during startup). After a WorkSpace is terminated, the TERMINATED state is returned only briefly before the WorkSpace directory metadata is cleaned up, so this state is rarely returned. To confirm that a WorkSpace is terminated, check for the WorkSpace ID by using DescribeWorkSpaces. If the WorkSpace ID isn't returned, then the WorkSpace has been successfully terminated.
2779
2779
  */
2780
2780
  State?: WorkspaceState;
2781
2781
  /**
@@ -83,7 +83,7 @@ return /******/ (function(modules) { // webpackBootstrap
83
83
  /**
84
84
  * @constant
85
85
  */
86
- VERSION: '2.1572.0',
86
+ VERSION: '2.1574.0',
87
87
 
88
88
  /**
89
89
  * @api private
@@ -14860,9 +14860,10 @@ return /******/ (function(modules) { // webpackBootstrap
14860
14860
  /***/ (function(module, exports, __webpack_require__) {
14861
14861
 
14862
14862
  /* WEBPACK VAR INJECTION */(function(process) {var warning = [
14863
- 'We are formalizing our plans to enter AWS SDK for JavaScript (v2) into maintenance mode in 2023.\n',
14863
+ 'The AWS SDK for JavaScript (v2) will enter maintenance mode',
14864
+ 'on September 8, 2024 and reach end-of-support on September 8, 2025.\n',
14864
14865
  'Please migrate your code to use AWS SDK for JavaScript (v3).',
14865
- 'For more information, check the migration guide at https://a.co/7PzMCcy'
14866
+ 'For more information, check blog post at https://a.co/cUPnyil'
14866
14867
  ].join('\n');
14867
14868
 
14868
14869
  module.exports = {