cdk-lambda-subminute 2.0.450 → 2.0.452

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (92) hide show
  1. package/.jsii +3 -3
  2. package/lib/cdk-lambda-subminute.js +3 -3
  3. package/node_modules/aws-sdk/README.md +1 -1
  4. package/node_modules/aws-sdk/apis/acm-pca-2017-08-22.waiters2.json +74 -62
  5. package/node_modules/aws-sdk/apis/application-signals-2024-04-15.min.json +15 -0
  6. package/node_modules/aws-sdk/apis/appsync-2017-07-25.min.json +4 -1
  7. package/node_modules/aws-sdk/apis/appsync-2017-07-25.paginators.json +60 -0
  8. package/node_modules/aws-sdk/apis/bedrock-runtime-2023-09-30.min.json +27 -5
  9. package/node_modules/aws-sdk/apis/cleanrooms-2022-02-17.min.json +1329 -202
  10. package/node_modules/aws-sdk/apis/cleanrooms-2022-02-17.paginators.json +18 -0
  11. package/node_modules/aws-sdk/apis/cleanroomsml-2023-09-06.min.json +305 -287
  12. package/node_modules/aws-sdk/apis/cleanroomsml-2023-09-06.waiters2.json +5 -0
  13. package/node_modules/aws-sdk/apis/codecommit-2015-04-13.min.json +7 -1
  14. package/node_modules/aws-sdk/apis/connect-2017-08-08.min.json +371 -171
  15. package/node_modules/aws-sdk/apis/connect-2017-08-08.paginators.json +18 -0
  16. package/node_modules/aws-sdk/apis/connect-contact-lens-2020-08-21.min.json +18 -1
  17. package/node_modules/aws-sdk/apis/datazone-2018-05-10.min.json +925 -400
  18. package/node_modules/aws-sdk/apis/datazone-2018-05-10.paginators.json +6 -0
  19. package/node_modules/aws-sdk/apis/ec2-2016-11-15.min.json +1161 -1028
  20. package/node_modules/aws-sdk/apis/ecr-2015-09-21.examples.json +186 -0
  21. package/node_modules/aws-sdk/apis/ecr-2015-09-21.min.json +177 -20
  22. package/node_modules/aws-sdk/apis/ecr-2015-09-21.paginators.json +9 -0
  23. package/node_modules/aws-sdk/apis/eks-2017-11-01.min.json +81 -63
  24. package/node_modules/aws-sdk/apis/elasticloadbalancingv2-2015-12-01.examples.json +33 -0
  25. package/node_modules/aws-sdk/apis/elasticloadbalancingv2-2015-12-01.min.json +113 -73
  26. package/node_modules/aws-sdk/apis/entityresolution-2018-05-10.min.json +162 -94
  27. package/node_modules/aws-sdk/apis/firehose-2015-08-04.min.json +226 -81
  28. package/node_modules/aws-sdk/apis/iotsitewise-2019-12-02.min.json +113 -98
  29. package/node_modules/aws-sdk/apis/ivs-2020-07-14.min.json +159 -154
  30. package/node_modules/aws-sdk/apis/ivschat-2020-07-14.min.json +144 -139
  31. package/node_modules/aws-sdk/apis/ivschat-2020-07-14.waiters2.json +5 -0
  32. package/node_modules/aws-sdk/apis/medialive-2017-10-14.min.json +327 -230
  33. package/node_modules/aws-sdk/apis/mediapackagev2-2022-12-25.min.json +0 -3
  34. package/node_modules/aws-sdk/apis/medical-imaging-2023-07-19.min.json +75 -35
  35. package/node_modules/aws-sdk/apis/metadata.json +0 -3
  36. package/node_modules/aws-sdk/apis/network-firewall-2020-11-12.min.json +7 -1
  37. package/node_modules/aws-sdk/apis/outposts-2019-12-03.min.json +11 -2
  38. package/node_modules/aws-sdk/apis/pinpoint-sms-voice-v2-2022-03-31.min.json +6 -0
  39. package/node_modules/aws-sdk/apis/redshift-serverless-2021-04-21.min.json +25 -21
  40. package/node_modules/aws-sdk/apis/states-2016-11-23.min.json +163 -128
  41. package/node_modules/aws-sdk/apis/taxsettings-2018-05-10.min.json +4 -1
  42. package/node_modules/aws-sdk/apis/timestream-query-2018-11-01.min.json +4 -1
  43. package/node_modules/aws-sdk/apis/workspaces-thin-client-2023-08-22.min.json +3 -0
  44. package/node_modules/aws-sdk/clients/acmpca.d.ts +12 -12
  45. package/node_modules/aws-sdk/clients/all.d.ts +0 -1
  46. package/node_modules/aws-sdk/clients/all.js +0 -1
  47. package/node_modules/aws-sdk/clients/applicationautoscaling.d.ts +1 -1
  48. package/node_modules/aws-sdk/clients/applicationsignals.d.ts +29 -20
  49. package/node_modules/aws-sdk/clients/bedrockruntime.d.ts +11 -8
  50. package/node_modules/aws-sdk/clients/cleanrooms.d.ts +1079 -16
  51. package/node_modules/aws-sdk/clients/cleanroomsml.d.ts +284 -257
  52. package/node_modules/aws-sdk/clients/cleanroomsml.js +1 -0
  53. package/node_modules/aws-sdk/clients/connect.d.ts +223 -6
  54. package/node_modules/aws-sdk/clients/connectcontactlens.d.ts +24 -3
  55. package/node_modules/aws-sdk/clients/datazone.d.ts +612 -64
  56. package/node_modules/aws-sdk/clients/dynamodb.d.ts +6 -6
  57. package/node_modules/aws-sdk/clients/ec2.d.ts +175 -20
  58. package/node_modules/aws-sdk/clients/ecr.d.ts +242 -8
  59. package/node_modules/aws-sdk/clients/eks.d.ts +27 -2
  60. package/node_modules/aws-sdk/clients/elbv2.d.ts +54 -8
  61. package/node_modules/aws-sdk/clients/entityresolution.d.ts +105 -22
  62. package/node_modules/aws-sdk/clients/firehose.d.ts +141 -0
  63. package/node_modules/aws-sdk/clients/iotsitewise.d.ts +37 -25
  64. package/node_modules/aws-sdk/clients/ivs.d.ts +229 -229
  65. package/node_modules/aws-sdk/clients/ivschat.d.ts +166 -166
  66. package/node_modules/aws-sdk/clients/ivschat.js +1 -0
  67. package/node_modules/aws-sdk/clients/medialive.d.ts +100 -4
  68. package/node_modules/aws-sdk/clients/mediapackagev2.d.ts +1 -1
  69. package/node_modules/aws-sdk/clients/medicalimaging.d.ts +38 -0
  70. package/node_modules/aws-sdk/clients/networkfirewall.d.ts +7 -7
  71. package/node_modules/aws-sdk/clients/outposts.d.ts +5 -0
  72. package/node_modules/aws-sdk/clients/pinpointsmsvoicev2.d.ts +56 -56
  73. package/node_modules/aws-sdk/clients/rds.d.ts +9 -9
  74. package/node_modules/aws-sdk/clients/redshiftserverless.d.ts +20 -3
  75. package/node_modules/aws-sdk/clients/sagemaker.d.ts +2 -2
  76. package/node_modules/aws-sdk/clients/secretsmanager.d.ts +7 -7
  77. package/node_modules/aws-sdk/clients/stepfunctions.d.ts +67 -9
  78. package/node_modules/aws-sdk/clients/timestreamquery.d.ts +1 -1
  79. package/node_modules/aws-sdk/clients/workspacesthinclient.d.ts +1 -1
  80. package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +2 -2
  81. package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +1835 -1858
  82. package/node_modules/aws-sdk/dist/aws-sdk.js +2085 -1380
  83. package/node_modules/aws-sdk/dist/aws-sdk.min.js +91 -91
  84. package/node_modules/aws-sdk/lib/config_service_placeholders.d.ts +0 -2
  85. package/node_modules/aws-sdk/lib/core.js +1 -1
  86. package/node_modules/aws-sdk/package.json +1 -1
  87. package/package.json +3 -3
  88. package/node_modules/aws-sdk/apis/mobile-2017-07-01.examples.json +0 -5
  89. package/node_modules/aws-sdk/apis/mobile-2017-07-01.min.json +0 -341
  90. package/node_modules/aws-sdk/apis/mobile-2017-07-01.paginators.json +0 -14
  91. package/node_modules/aws-sdk/clients/mobile.d.ts +0 -333
  92. package/node_modules/aws-sdk/clients/mobile.js +0 -18
@@ -9,6 +9,7 @@ Object.defineProperty(apiLoader.services['ivschat'], '2020-07-14', {
9
9
  get: function get() {
10
10
  var model = require('../apis/ivschat-2020-07-14.min.json');
11
11
  model.paginators = require('../apis/ivschat-2020-07-14.paginators.json').pagination;
12
+ model.waiters = require('../apis/ivschat-2020-07-14.waiters2.json').waiters;
12
13
  return model;
13
14
  },
14
15
  enumerable: true,
@@ -1933,6 +1933,10 @@ Only specify sources for PULL type Inputs. Leave Destinations empty.
1933
1933
  Tags?: Tags;
1934
1934
  Type?: InputType;
1935
1935
  Vpc?: InputVpcRequest;
1936
+ /**
1937
+ * The settings associated with an SRT input.
1938
+ */
1939
+ SrtSettings?: SrtSettingsRequest;
1936
1940
  }
1937
1941
  export interface CreateInputResponse {
1938
1942
  Input?: Input;
@@ -2549,6 +2553,10 @@ during input switch actions. Presently, this functionality only works with MP4_F
2549
2553
  */
2550
2554
  Tags?: Tags;
2551
2555
  Type?: InputType;
2556
+ /**
2557
+ * The settings associated with an SRT input.
2558
+ */
2559
+ SrtSettings?: SrtSettings;
2552
2560
  }
2553
2561
  export interface DescribeInputSecurityGroupRequest {
2554
2562
  /**
@@ -2971,7 +2979,6 @@ provide the language to consider when translating the image-based source to text
2971
2979
  export interface Eac3AtmosSettings {
2972
2980
  /**
2973
2981
  * Average bitrate in bits/second. Valid bitrates depend on the coding mode.
2974
- // * @affectsRightSizing true
2975
2982
  */
2976
2983
  Bitrate?: __double;
2977
2984
  /**
@@ -3455,7 +3462,14 @@ EPOCH_LOCKING - MediaLive will attempt to synchronize the output of each pipelin
3455
3462
  */
3456
3463
  EntropyEncoding?: H264EntropyEncoding;
3457
3464
  /**
3458
- * Optional filters that you can apply to an encode.
3465
+ * Optional. Both filters reduce bandwidth by removing imperceptible details. You can enable one of the filters. We
3466
+ recommend that you try both filters and observe the results to decide which one to use.
3467
+
3468
+ The Temporal Filter reduces bandwidth by removing imperceptible details in the content. It combines perceptual
3469
+ filtering and motion compensated temporal filtering (MCTF). It operates independently of the compression level.
3470
+
3471
+ The Bandwidth Reduction filter is a perceptual filter located within the encoding loop. It adapts to the current
3472
+ compression level to filter imperceptible signals. This filter works only when the resolution is 1080p or lower.
3459
3473
  */
3460
3474
  FilterSettings?: H264FilterSettings;
3461
3475
  /**
@@ -3678,7 +3692,14 @@ This field is optional; when no value is specified the encoder will choose the n
3678
3692
  */
3679
3693
  ColorSpaceSettings?: H265ColorSpaceSettings;
3680
3694
  /**
3681
- * Optional filters that you can apply to an encode.
3695
+ * Optional. Both filters reduce bandwidth by removing imperceptible details. You can enable one of the filters. We
3696
+ recommend that you try both filters and observe the results to decide which one to use.
3697
+
3698
+ The Temporal Filter reduces bandwidth by removing imperceptible details in the content. It combines perceptual
3699
+ filtering and motion compensated temporal filtering (MCTF). It operates independently of the compression level.
3700
+
3701
+ The Bandwidth Reduction filter is a perceptual filter located within the encoding loop. It adapts to the current
3702
+ compression level to filter imperceptible signals. This filter works only when the resolution is 1080p or lower.
3682
3703
  */
3683
3704
  FilterSettings?: H265FilterSettings;
3684
3705
  /**
@@ -4306,6 +4327,10 @@ during input switch actions. Presently, this functionality only works with MP4_F
4306
4327
  */
4307
4328
  Tags?: Tags;
4308
4329
  Type?: InputType;
4330
+ /**
4331
+ * The settings associated with an SRT input.
4332
+ */
4333
+ SrtSettings?: SrtSettings;
4309
4334
  }
4310
4335
  export interface InputAttachment {
4311
4336
  /**
@@ -4852,7 +4877,7 @@ pulled from.
4852
4877
  UrlPath?: __listOf__string;
4853
4878
  }
4854
4879
  export type InputTimecodeSource = "ZEROBASED"|"EMBEDDED"|string;
4855
- export type InputType = "UDP_PUSH"|"RTP_PUSH"|"RTMP_PUSH"|"RTMP_PULL"|"URL_PULL"|"MP4_FILE"|"MEDIACONNECT"|"INPUT_DEVICE"|"AWS_CDI"|"TS_FILE"|string;
4880
+ export type InputType = "UDP_PUSH"|"RTP_PUSH"|"RTMP_PUSH"|"RTMP_PULL"|"URL_PULL"|"MP4_FILE"|"MEDIACONNECT"|"INPUT_DEVICE"|"AWS_CDI"|"TS_FILE"|"SRT_CALLER"|string;
4856
4881
  export interface InputVpcRequest {
4857
4882
  /**
4858
4883
  * A list of up to 5 EC2 VPC security group IDs to attach to the Input VPC network interfaces.
@@ -7524,6 +7549,10 @@ exactly two source URLs for redundancy.
7524
7549
  Only specify sources for PULL type Inputs. Leave Destinations empty.
7525
7550
  */
7526
7551
  Sources?: __listOfInputSourceRequest;
7552
+ /**
7553
+ * The settings associated with an SRT input.
7554
+ */
7555
+ SrtSettings?: SrtSettingsRequest;
7527
7556
  }
7528
7557
  export interface UpdateInputResponse {
7529
7558
  Input?: Input;
@@ -9219,6 +9248,73 @@ one destination per packager.
9219
9248
  export type __stringPatternArnMedialiveSignalMap = string;
9220
9249
  export type __stringPatternS = string;
9221
9250
  export type Scte35SegmentationScope = "ALL_OUTPUT_GROUPS"|"SCTE35_ENABLED_OUTPUT_GROUPS"|string;
9251
+ export type Algorithm = "AES128"|"AES192"|"AES256"|string;
9252
+ export interface SrtCallerDecryption {
9253
+ /**
9254
+ * The algorithm used to encrypt content.
9255
+ */
9256
+ Algorithm?: Algorithm;
9257
+ /**
9258
+ * The ARN for the secret in Secrets Manager. Someone in your organization must create a secret and provide you with its ARN. The secret holds the passphrase that MediaLive uses to decrypt the source content.
9259
+ */
9260
+ PassphraseSecretArn?: __string;
9261
+ }
9262
+ export interface SrtCallerDecryptionRequest {
9263
+ /**
9264
+ * The algorithm used to encrypt content.
9265
+ */
9266
+ Algorithm?: Algorithm;
9267
+ /**
9268
+ * The ARN for the secret in Secrets Manager. Someone in your organization must create a secret and provide you with its ARN. This secret holds the passphrase that MediaLive will use to decrypt the source content.
9269
+ */
9270
+ PassphraseSecretArn?: __string;
9271
+ }
9272
+ export interface SrtCallerSource {
9273
+ Decryption?: SrtCallerDecryption;
9274
+ /**
9275
+ * The preferred latency (in milliseconds) for implementing packet loss and recovery. Packet recovery is a key feature of SRT.
9276
+ */
9277
+ MinimumLatency?: __integer;
9278
+ /**
9279
+ * The IP address at the upstream system (the listener) that MediaLive (the caller) connects to.
9280
+ */
9281
+ SrtListenerAddress?: __string;
9282
+ /**
9283
+ * The port at the upstream system (the listener) that MediaLive (the caller) connects to.
9284
+ */
9285
+ SrtListenerPort?: __string;
9286
+ /**
9287
+ * The stream ID, if the upstream system uses this identifier.
9288
+ */
9289
+ StreamId?: __string;
9290
+ }
9291
+ export interface SrtCallerSourceRequest {
9292
+ Decryption?: SrtCallerDecryptionRequest;
9293
+ /**
9294
+ * The preferred latency (in milliseconds) for implementing packet loss and recovery. Packet recovery is a key feature of SRT. Obtain this value from the operator at the upstream system.
9295
+ */
9296
+ MinimumLatency?: __integer;
9297
+ /**
9298
+ * The IP address at the upstream system (the listener) that MediaLive (the caller) will connect to.
9299
+ */
9300
+ SrtListenerAddress?: __string;
9301
+ /**
9302
+ * The port at the upstream system (the listener) that MediaLive (the caller) will connect to.
9303
+ */
9304
+ SrtListenerPort?: __string;
9305
+ /**
9306
+ * This value is required if the upstream system uses this identifier because without it, the SRT handshake between MediaLive (the caller) and the upstream system (the listener) might fail.
9307
+ */
9308
+ StreamId?: __string;
9309
+ }
9310
+ export interface SrtSettings {
9311
+ SrtCallerSources?: __listOfSrtCallerSource;
9312
+ }
9313
+ export interface SrtSettingsRequest {
9314
+ SrtCallerSources?: __listOfSrtCallerSourceRequest;
9315
+ }
9316
+ export type __listOfSrtCallerSource = SrtCallerSource[];
9317
+ export type __listOfSrtCallerSourceRequest = SrtCallerSourceRequest[];
9222
9318
  /**
9223
9319
  * A string in YYYY-MM-DD format that represents the latest possible API version that can be used in this service. Specify 'latest' to use the latest possible version.
9224
9320
  */
@@ -676,7 +676,7 @@ declare namespace MediaPackageV2 {
676
676
  }
677
677
  export interface DeleteOriginEndpointResponse {
678
678
  }
679
- export type DrmSystem = "CLEAR_KEY_AES_128"|"FAIRPLAY"|"PLAYREADY"|"WIDEVINE"|string;
679
+ export type DrmSystem = "CLEAR_KEY_AES_128"|"FAIRPLAY"|"PLAYREADY"|"WIDEVINE"|"IRDETO"|string;
680
680
  export interface Encryption {
681
681
  /**
682
682
  * A 128-bit, 16-byte hex value represented by a 32-character string, used in conjunction with the key for encrypting content. If you don't specify a value, then MediaPackage creates the constant initialization vector (IV).
@@ -160,7 +160,9 @@ declare class MedicalImaging extends Service {
160
160
  declare namespace MedicalImaging {
161
161
  export type Arn = string;
162
162
  export type AwsAccountId = string;
163
+ export type Boolean = boolean;
163
164
  export type ClientToken = string;
165
+ export type CopiableAttributes = string;
164
166
  export interface CopyDestinationImageSet {
165
167
  /**
166
168
  * The image set identifier for the destination image set.
@@ -224,6 +226,10 @@ declare namespace MedicalImaging {
224
226
  * Copy image set information.
225
227
  */
226
228
  copyImageSetInformation: CopyImageSetInformation;
229
+ /**
230
+ * Setting this flag will force the CopyImageSet operation, even if Patient, Study, or Series level metadata are mismatched across the sourceImageSet and destinationImageSet.
231
+ */
232
+ force?: Boolean;
227
233
  }
228
234
  export interface CopyImageSetResponse {
229
235
  /**
@@ -244,6 +250,10 @@ declare namespace MedicalImaging {
244
250
  * The latest version identifier for the source image set.
245
251
  */
246
252
  latestVersionId: ImageSetExternalVersionId;
253
+ /**
254
+ * Contains MetadataCopies structure and wraps information related to specific copy use cases. For example, when copying subsets.
255
+ */
256
+ DICOMCopies?: MetadataCopies;
247
257
  }
248
258
  export interface CopySourceImageSetProperties {
249
259
  /**
@@ -723,6 +733,10 @@ declare namespace MedicalImaging {
723
733
  * The Amazon Resource Name (ARN) assigned to the image set.
724
734
  */
725
735
  imageSetArn?: Arn;
736
+ /**
737
+ * This object contains the details of any overrides used while creating a specific image set version. If an image set was copied or updated using the force flag, this object will contain the forced flag.
738
+ */
739
+ overrides?: Overrides;
726
740
  }
727
741
  export type ImageFrameId = string;
728
742
  export interface ImageFrameInformation {
@@ -767,6 +781,10 @@ declare namespace MedicalImaging {
767
781
  * The error message thrown if an image set action fails.
768
782
  */
769
783
  message?: Message;
784
+ /**
785
+ * Contains details on overrides used when creating the returned version of an image set. For example, if forced exists, the forced flag was used when creating the image set.
786
+ */
787
+ overrides?: Overrides;
770
788
  }
771
789
  export type ImageSetPropertiesList = ImageSetProperties[];
772
790
  export type ImageSetState = "ACTIVE"|"LOCKED"|"DELETED"|string;
@@ -895,14 +913,30 @@ declare namespace MedicalImaging {
895
913
  tags: TagMap;
896
914
  }
897
915
  export type Message = string;
916
+ export interface MetadataCopies {
917
+ /**
918
+ * The JSON string used to specify a subset of SOP Instances to copy from source to destination image set.
919
+ */
920
+ copiableAttributes: CopiableAttributes;
921
+ }
898
922
  export interface MetadataUpdates {
899
923
  /**
900
924
  * The object containing removableAttributes and updatableAttributes.
901
925
  */
902
926
  DICOMUpdates?: DICOMUpdates;
927
+ /**
928
+ * Specifies the previous image set version ID to revert the current image set back to. You must provide either revertToVersionId or DICOMUpdates in your request. A ValidationException error is thrown if both parameters are provided at the same time.
929
+ */
930
+ revertToVersionId?: ImageSetExternalVersionId;
903
931
  }
904
932
  export type NextToken = string;
905
933
  export type Operator = "EQUAL"|"BETWEEN"|string;
934
+ export interface Overrides {
935
+ /**
936
+ * Setting this flag will force the CopyImageSet and UpdateImageSetMetadata operations, even if Patient, Study, or Series level metadata are mismatched.
937
+ */
938
+ forced?: Boolean;
939
+ }
906
940
  export type PayloadBlob = Buffer|Uint8Array|Blob|string|Readable;
907
941
  export type RoleArn = string;
908
942
  export type S3Uri = string;
@@ -1097,6 +1131,10 @@ declare namespace MedicalImaging {
1097
1131
  * The latest image set version identifier.
1098
1132
  */
1099
1133
  latestVersionId: ImageSetExternalVersionId;
1134
+ /**
1135
+ * Setting this flag will force the UpdateImageSetMetadata operation for the following attributes: Tag.StudyInstanceUID, Tag.SeriesInstanceUID, Tag.SOPInstanceUID, and Tag.StudyID Adding, removing, or updating private tags for an individual SOP Instance
1136
+ */
1137
+ force?: Boolean;
1100
1138
  /**
1101
1139
  * Update image set metadata updates.
1102
1140
  */
@@ -52,11 +52,11 @@ declare class NetworkFirewall extends Service {
52
52
  */
53
53
  createRuleGroup(callback?: (err: AWSError, data: NetworkFirewall.Types.CreateRuleGroupResponse) => void): Request<NetworkFirewall.Types.CreateRuleGroupResponse, AWSError>;
54
54
  /**
55
- * Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains Certificate Manager certificate associations between and the scope configurations that Network Firewall uses to decrypt and re-encrypt traffic traveling through your firewall. After you create a TLS inspection configuration, you can associate it with a new firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
55
+ * Creates an Network Firewall TLS inspection configuration. Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using ACM, create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
56
56
  */
57
57
  createTLSInspectionConfiguration(params: NetworkFirewall.Types.CreateTLSInspectionConfigurationRequest, callback?: (err: AWSError, data: NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse, AWSError>;
58
58
  /**
59
- * Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains Certificate Manager certificate associations between and the scope configurations that Network Firewall uses to decrypt and re-encrypt traffic traveling through your firewall. After you create a TLS inspection configuration, you can associate it with a new firewall policy. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
59
+ * Creates an Network Firewall TLS inspection configuration. Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using ACM, create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
60
60
  */
61
61
  createTLSInspectionConfiguration(callback?: (err: AWSError, data: NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse, AWSError>;
62
62
  /**
@@ -1305,22 +1305,22 @@ declare namespace NetworkFirewall {
1305
1305
  }
1306
1306
  export interface LogDestinationConfig {
1307
1307
  /**
1308
- * The type of log to send. Alert logs report traffic that matches a StatefulRule with an action setting that sends an alert log message. Flow logs are standard network traffic flow logs.
1308
+ * The type of log to record. You can record the following types of logs from your Network Firewall stateful engine. ALERT - Logs for traffic that matches your stateful rules and that have an action that sends an alert. A stateful rule sends alerts for the rule actions DROP, ALERT, and REJECT. For more information, see StatefulRule. FLOW - Standard network traffic flow logs. The stateful rules engine records flow logs for all network traffic that it receives. Each flow log record captures the network flow for a specific standard stateless rule group. TLS - Logs for events that are related to TLS inspection. For more information, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
1309
1309
  */
1310
1310
  LogType: LogType;
1311
1311
  /**
1312
- * The type of storage destination to send these logs to. You can send logs to an Amazon S3 bucket, a CloudWatch log group, or a Kinesis Data Firehose delivery stream.
1312
+ * The type of storage destination to send these logs to. You can send logs to an Amazon S3 bucket, a CloudWatch log group, or a Firehose delivery stream.
1313
1313
  */
1314
1314
  LogDestinationType: LogDestinationType;
1315
1315
  /**
1316
- * The named location for the logs, provided in a key:value mapping that is specific to the chosen destination type. For an Amazon S3 bucket, provide the name of the bucket, with key bucketName, and optionally provide a prefix, with key prefix. The following example specifies an Amazon S3 bucket named DOC-EXAMPLE-BUCKET and the prefix alerts: "LogDestination": { "bucketName": "DOC-EXAMPLE-BUCKET", "prefix": "alerts" } For a CloudWatch log group, provide the name of the CloudWatch log group, with key logGroup. The following example specifies a log group named alert-log-group: "LogDestination": { "logGroup": "alert-log-group" } For a Kinesis Data Firehose delivery stream, provide the name of the delivery stream, with key deliveryStream. The following example specifies a delivery stream named alert-delivery-stream: "LogDestination": { "deliveryStream": "alert-delivery-stream" }
1316
+ * The named location for the logs, provided in a key:value mapping that is specific to the chosen destination type. For an Amazon S3 bucket, provide the name of the bucket, with key bucketName, and optionally provide a prefix, with key prefix. The following example specifies an Amazon S3 bucket named DOC-EXAMPLE-BUCKET and the prefix alerts: "LogDestination": { "bucketName": "DOC-EXAMPLE-BUCKET", "prefix": "alerts" } For a CloudWatch log group, provide the name of the CloudWatch log group, with key logGroup. The following example specifies a log group named alert-log-group: "LogDestination": { "logGroup": "alert-log-group" } For a Firehose delivery stream, provide the name of the delivery stream, with key deliveryStream. The following example specifies a delivery stream named alert-delivery-stream: "LogDestination": { "deliveryStream": "alert-delivery-stream" }
1317
1317
  */
1318
1318
  LogDestination: LogDestinationMap;
1319
1319
  }
1320
1320
  export type LogDestinationConfigs = LogDestinationConfig[];
1321
1321
  export type LogDestinationMap = {[key: string]: HashMapValue};
1322
1322
  export type LogDestinationType = "S3"|"CloudWatchLogs"|"KinesisDataFirehose"|string;
1323
- export type LogType = "ALERT"|"FLOW"|string;
1323
+ export type LogType = "ALERT"|"FLOW"|"TLS"|string;
1324
1324
  export interface LoggingConfiguration {
1325
1325
  /**
1326
1326
  * Defines the logging destinations for the logs for a firewall. Network Firewall generates logs for stateful rule groups.
@@ -1666,7 +1666,7 @@ declare namespace NetworkFirewall {
1666
1666
  }
1667
1667
  export interface StatefulRule {
1668
1668
  /**
1669
- * Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. The actions for a stateful rule are defined as follows: PASS - Permits the packets to go to the intended destination. DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. ALERT - Sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with ALERT action, verify in the logs that the rule is filtering as you want, then change the action to DROP.
1669
+ * Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. The actions for a stateful rule are defined as follows: PASS - Permits the packets to go to the intended destination. DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. ALERT - Sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with ALERT action, verify in the logs that the rule is filtering as you want, then change the action to DROP. REJECT - Drops traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and an RST bit contained in the TCP header flags. REJECT is available only for TCP traffic. This option doesn't support FTP or IMAP protocols.
1670
1670
  */
1671
1671
  Action: StatefulAction;
1672
1672
  /**
@@ -790,6 +790,10 @@ declare namespace Outposts {
790
790
  export type InstanceTypeCount = number;
791
791
  export interface InstanceTypeItem {
792
792
  InstanceType?: InstanceType;
793
+ /**
794
+ * The number of default VCPUs in an instance type.
795
+ */
796
+ VCPUs?: VCPUCount;
793
797
  }
794
798
  export type InstanceTypeListDefinition = InstanceTypeItem[];
795
799
  export type InstanceTypeName = string;
@@ -1424,6 +1428,7 @@ declare namespace Outposts {
1424
1428
  }
1425
1429
  export type UplinkCount = "UPLINK_COUNT_1"|"UPLINK_COUNT_2"|"UPLINK_COUNT_3"|"UPLINK_COUNT_4"|"UPLINK_COUNT_5"|"UPLINK_COUNT_6"|"UPLINK_COUNT_7"|"UPLINK_COUNT_8"|"UPLINK_COUNT_12"|"UPLINK_COUNT_16"|string;
1426
1430
  export type UplinkGbps = "UPLINK_1G"|"UPLINK_10G"|"UPLINK_40G"|"UPLINK_100G"|string;
1431
+ export type VCPUCount = number;
1427
1432
  export type WireGuardPublicKey = string;
1428
1433
  export type outpostListDefinition = Outpost[];
1429
1434
  export type siteListDefinition = Site[];