cdk-lambda-subminute 2.0.451 → 2.0.452
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +3 -3
- package/lib/cdk-lambda-subminute.js +3 -3
- package/node_modules/aws-sdk/README.md +1 -1
- package/node_modules/aws-sdk/apis/application-signals-2024-04-15.min.json +15 -0
- package/node_modules/aws-sdk/apis/bedrock-runtime-2023-09-30.min.json +27 -5
- package/node_modules/aws-sdk/apis/codecommit-2015-04-13.min.json +7 -1
- package/node_modules/aws-sdk/apis/datazone-2018-05-10.min.json +68 -32
- package/node_modules/aws-sdk/apis/ecr-2015-09-21.examples.json +186 -0
- package/node_modules/aws-sdk/apis/ecr-2015-09-21.min.json +177 -20
- package/node_modules/aws-sdk/apis/ecr-2015-09-21.paginators.json +9 -0
- package/node_modules/aws-sdk/apis/eks-2017-11-01.min.json +81 -63
- package/node_modules/aws-sdk/apis/elasticloadbalancingv2-2015-12-01.examples.json +33 -0
- package/node_modules/aws-sdk/apis/elasticloadbalancingv2-2015-12-01.min.json +113 -73
- package/node_modules/aws-sdk/apis/network-firewall-2020-11-12.min.json +7 -1
- package/node_modules/aws-sdk/apis/outposts-2019-12-03.min.json +11 -2
- package/node_modules/aws-sdk/apis/states-2016-11-23.min.json +163 -128
- package/node_modules/aws-sdk/clients/applicationautoscaling.d.ts +1 -1
- package/node_modules/aws-sdk/clients/applicationsignals.d.ts +29 -20
- package/node_modules/aws-sdk/clients/bedrockruntime.d.ts +11 -8
- package/node_modules/aws-sdk/clients/datazone.d.ts +36 -0
- package/node_modules/aws-sdk/clients/ec2.d.ts +4 -4
- package/node_modules/aws-sdk/clients/ecr.d.ts +242 -8
- package/node_modules/aws-sdk/clients/eks.d.ts +27 -2
- package/node_modules/aws-sdk/clients/elbv2.d.ts +54 -8
- package/node_modules/aws-sdk/clients/networkfirewall.d.ts +7 -7
- package/node_modules/aws-sdk/clients/outposts.d.ts +5 -0
- package/node_modules/aws-sdk/clients/stepfunctions.d.ts +67 -9
- package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +1 -1
- package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +12 -12
- package/node_modules/aws-sdk/dist/aws-sdk.js +309 -97
- package/node_modules/aws-sdk/dist/aws-sdk.min.js +80 -80
- package/node_modules/aws-sdk/lib/core.js +1 -1
- package/node_modules/aws-sdk/package.json +1 -1
- package/package.json +2 -2
@@ -52,11 +52,11 @@ declare class NetworkFirewall extends Service {
|
|
52
52
|
*/
|
53
53
|
createRuleGroup(callback?: (err: AWSError, data: NetworkFirewall.Types.CreateRuleGroupResponse) => void): Request<NetworkFirewall.Types.CreateRuleGroupResponse, AWSError>;
|
54
54
|
/**
|
55
|
-
* Creates an Network Firewall TLS inspection configuration.
|
55
|
+
* Creates an Network Firewall TLS inspection configuration. Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using ACM, create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
56
56
|
*/
|
57
57
|
createTLSInspectionConfiguration(params: NetworkFirewall.Types.CreateTLSInspectionConfigurationRequest, callback?: (err: AWSError, data: NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse, AWSError>;
|
58
58
|
/**
|
59
|
-
* Creates an Network Firewall TLS inspection configuration.
|
59
|
+
* Creates an Network Firewall TLS inspection configuration. Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using ACM, create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. To update the settings for a TLS inspection configuration, use UpdateTLSInspectionConfiguration. To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, ListTagsForResource, TagResource, and UntagResource. To retrieve information about TLS inspection configurations, use ListTLSInspectionConfigurations and DescribeTLSInspectionConfiguration. For more information about TLS inspection configurations, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
60
60
|
*/
|
61
61
|
createTLSInspectionConfiguration(callback?: (err: AWSError, data: NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse) => void): Request<NetworkFirewall.Types.CreateTLSInspectionConfigurationResponse, AWSError>;
|
62
62
|
/**
|
@@ -1305,22 +1305,22 @@ declare namespace NetworkFirewall {
|
|
1305
1305
|
}
|
1306
1306
|
export interface LogDestinationConfig {
|
1307
1307
|
/**
|
1308
|
-
* The type of log to
|
1308
|
+
* The type of log to record. You can record the following types of logs from your Network Firewall stateful engine. ALERT - Logs for traffic that matches your stateful rules and that have an action that sends an alert. A stateful rule sends alerts for the rule actions DROP, ALERT, and REJECT. For more information, see StatefulRule. FLOW - Standard network traffic flow logs. The stateful rules engine records flow logs for all network traffic that it receives. Each flow log record captures the network flow for a specific standard stateless rule group. TLS - Logs for events that are related to TLS inspection. For more information, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
|
1309
1309
|
*/
|
1310
1310
|
LogType: LogType;
|
1311
1311
|
/**
|
1312
|
-
* The type of storage destination to send these logs to. You can send logs to an Amazon S3 bucket, a CloudWatch log group, or a
|
1312
|
+
* The type of storage destination to send these logs to. You can send logs to an Amazon S3 bucket, a CloudWatch log group, or a Firehose delivery stream.
|
1313
1313
|
*/
|
1314
1314
|
LogDestinationType: LogDestinationType;
|
1315
1315
|
/**
|
1316
|
-
* The named location for the logs, provided in a key:value mapping that is specific to the chosen destination type. For an Amazon S3 bucket, provide the name of the bucket, with key bucketName, and optionally provide a prefix, with key prefix.
|
1316
|
+
* The named location for the logs, provided in a key:value mapping that is specific to the chosen destination type. For an Amazon S3 bucket, provide the name of the bucket, with key bucketName, and optionally provide a prefix, with key prefix. The following example specifies an Amazon S3 bucket named DOC-EXAMPLE-BUCKET and the prefix alerts: "LogDestination": { "bucketName": "DOC-EXAMPLE-BUCKET", "prefix": "alerts" } For a CloudWatch log group, provide the name of the CloudWatch log group, with key logGroup. The following example specifies a log group named alert-log-group: "LogDestination": { "logGroup": "alert-log-group" } For a Firehose delivery stream, provide the name of the delivery stream, with key deliveryStream. The following example specifies a delivery stream named alert-delivery-stream: "LogDestination": { "deliveryStream": "alert-delivery-stream" }
|
1317
1317
|
*/
|
1318
1318
|
LogDestination: LogDestinationMap;
|
1319
1319
|
}
|
1320
1320
|
export type LogDestinationConfigs = LogDestinationConfig[];
|
1321
1321
|
export type LogDestinationMap = {[key: string]: HashMapValue};
|
1322
1322
|
export type LogDestinationType = "S3"|"CloudWatchLogs"|"KinesisDataFirehose"|string;
|
1323
|
-
export type LogType = "ALERT"|"FLOW"|string;
|
1323
|
+
export type LogType = "ALERT"|"FLOW"|"TLS"|string;
|
1324
1324
|
export interface LoggingConfiguration {
|
1325
1325
|
/**
|
1326
1326
|
* Defines the logging destinations for the logs for a firewall. Network Firewall generates logs for stateful rule groups.
|
@@ -1666,7 +1666,7 @@ declare namespace NetworkFirewall {
|
|
1666
1666
|
}
|
1667
1667
|
export interface StatefulRule {
|
1668
1668
|
/**
|
1669
|
-
* Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. The actions for a stateful rule are defined as follows: PASS - Permits the packets to go to the intended destination. DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. ALERT - Sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with ALERT action, verify in the logs that the rule is filtering as you want, then change the action to DROP.
|
1669
|
+
* Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. The actions for a stateful rule are defined as follows: PASS - Permits the packets to go to the intended destination. DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. ALERT - Sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration. You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with ALERT action, verify in the logs that the rule is filtering as you want, then change the action to DROP. REJECT - Drops traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and an RST bit contained in the TCP header flags. REJECT is available only for TCP traffic. This option doesn't support FTP or IMAP protocols.
|
1670
1670
|
*/
|
1671
1671
|
Action: StatefulAction;
|
1672
1672
|
/**
|
@@ -790,6 +790,10 @@ declare namespace Outposts {
|
|
790
790
|
export type InstanceTypeCount = number;
|
791
791
|
export interface InstanceTypeItem {
|
792
792
|
InstanceType?: InstanceType;
|
793
|
+
/**
|
794
|
+
* The number of default VCPUs in an instance type.
|
795
|
+
*/
|
796
|
+
VCPUs?: VCPUCount;
|
793
797
|
}
|
794
798
|
export type InstanceTypeListDefinition = InstanceTypeItem[];
|
795
799
|
export type InstanceTypeName = string;
|
@@ -1424,6 +1428,7 @@ declare namespace Outposts {
|
|
1424
1428
|
}
|
1425
1429
|
export type UplinkCount = "UPLINK_COUNT_1"|"UPLINK_COUNT_2"|"UPLINK_COUNT_3"|"UPLINK_COUNT_4"|"UPLINK_COUNT_5"|"UPLINK_COUNT_6"|"UPLINK_COUNT_7"|"UPLINK_COUNT_8"|"UPLINK_COUNT_12"|"UPLINK_COUNT_16"|string;
|
1426
1430
|
export type UplinkGbps = "UPLINK_1G"|"UPLINK_10G"|"UPLINK_40G"|"UPLINK_100G"|string;
|
1431
|
+
export type VCPUCount = number;
|
1427
1432
|
export type WireGuardPublicKey = string;
|
1428
1433
|
export type outpostListDefinition = Outpost[];
|
1429
1434
|
export type siteListDefinition = Site[];
|
@@ -20,11 +20,11 @@ declare class StepFunctions extends Service {
|
|
20
20
|
*/
|
21
21
|
createActivity(callback?: (err: AWSError, data: StepFunctions.Types.CreateActivityOutput) => void): Request<StepFunctions.Types.CreateActivityOutput, AWSError>;
|
22
22
|
/**
|
23
|
-
* Creates a state machine. A state machine consists of a collection of states that can do work (Task states), determine to which states to transition next (Choice states), stop an execution with an error (Fail states), and so on. State machines are specified using a JSON-based, structured language. For more information, see Amazon States Language in the Step Functions User Guide. If you set the publish parameter of this API action to true, it publishes version 1 as the first revision of the state machine. This operation is eventually consistent. The results are best effort and may not reflect very recent updates and changes. CreateStateMachine is an idempotent API. Subsequent requests won’t create a duplicate resource if it was already created. CreateStateMachine's idempotency check is based on the state machine name, definition, type, LoggingConfiguration, and
|
23
|
+
* Creates a state machine. A state machine consists of a collection of states that can do work (Task states), determine to which states to transition next (Choice states), stop an execution with an error (Fail states), and so on. State machines are specified using a JSON-based, structured language. For more information, see Amazon States Language in the Step Functions User Guide. If you set the publish parameter of this API action to true, it publishes version 1 as the first revision of the state machine. For additional control over security, you can encrypt your data using a customer-managed key for Step Functions state machines. You can configure a symmetric KMS key and data key reuse period when creating or updating a State Machine. The execution history and state machine definition will be encrypted with the key applied to the State Machine. This operation is eventually consistent. The results are best effort and may not reflect very recent updates and changes. CreateStateMachine is an idempotent API. Subsequent requests won’t create a duplicate resource if it was already created. CreateStateMachine's idempotency check is based on the state machine name, definition, type, LoggingConfiguration, TracingConfiguration, and EncryptionConfiguration The check is also based on the publish and versionDescription parameters. If a following request has a different roleArn or tags, Step Functions will ignore these differences and treat it as an idempotent request of the previous. In this case, roleArn and tags will not be updated, even if they are different.
|
24
24
|
*/
|
25
25
|
createStateMachine(params: StepFunctions.Types.CreateStateMachineInput, callback?: (err: AWSError, data: StepFunctions.Types.CreateStateMachineOutput) => void): Request<StepFunctions.Types.CreateStateMachineOutput, AWSError>;
|
26
26
|
/**
|
27
|
-
* Creates a state machine. A state machine consists of a collection of states that can do work (Task states), determine to which states to transition next (Choice states), stop an execution with an error (Fail states), and so on. State machines are specified using a JSON-based, structured language. For more information, see Amazon States Language in the Step Functions User Guide. If you set the publish parameter of this API action to true, it publishes version 1 as the first revision of the state machine. This operation is eventually consistent. The results are best effort and may not reflect very recent updates and changes. CreateStateMachine is an idempotent API. Subsequent requests won’t create a duplicate resource if it was already created. CreateStateMachine's idempotency check is based on the state machine name, definition, type, LoggingConfiguration, and
|
27
|
+
* Creates a state machine. A state machine consists of a collection of states that can do work (Task states), determine to which states to transition next (Choice states), stop an execution with an error (Fail states), and so on. State machines are specified using a JSON-based, structured language. For more information, see Amazon States Language in the Step Functions User Guide. If you set the publish parameter of this API action to true, it publishes version 1 as the first revision of the state machine. For additional control over security, you can encrypt your data using a customer-managed key for Step Functions state machines. You can configure a symmetric KMS key and data key reuse period when creating or updating a State Machine. The execution history and state machine definition will be encrypted with the key applied to the State Machine. This operation is eventually consistent. The results are best effort and may not reflect very recent updates and changes. CreateStateMachine is an idempotent API. Subsequent requests won’t create a duplicate resource if it was already created. CreateStateMachine's idempotency check is based on the state machine name, definition, type, LoggingConfiguration, TracingConfiguration, and EncryptionConfiguration The check is also based on the publish and versionDescription parameters. If a following request has a different roleArn or tags, Step Functions will ignore these differences and treat it as an idempotent request of the previous. In this case, roleArn and tags will not be updated, even if they are different.
|
28
28
|
*/
|
29
29
|
createStateMachine(callback?: (err: AWSError, data: StepFunctions.Types.CreateStateMachineOutput) => void): Request<StepFunctions.Types.CreateStateMachineOutput, AWSError>;
|
30
30
|
/**
|
@@ -204,11 +204,11 @@ declare class StepFunctions extends Service {
|
|
204
204
|
*/
|
205
205
|
redriveExecution(callback?: (err: AWSError, data: StepFunctions.Types.RedriveExecutionOutput) => void): Request<StepFunctions.Types.RedriveExecutionOutput, AWSError>;
|
206
206
|
/**
|
207
|
-
* Used by activity workers, Task states using the callback pattern, and optionally Task states using the job run pattern to report that the task identified by the taskToken failed.
|
207
|
+
* Used by activity workers, Task states using the callback pattern, and optionally Task states using the job run pattern to report that the task identified by the taskToken failed. For an execution with encryption enabled, Step Functions will encrypt the error and cause fields using the KMS key for the execution role. A caller can mark a task as fail without using any KMS permissions in the execution role if the caller provides a null value for both error and cause fields because no data needs to be encrypted.
|
208
208
|
*/
|
209
209
|
sendTaskFailure(params: StepFunctions.Types.SendTaskFailureInput, callback?: (err: AWSError, data: StepFunctions.Types.SendTaskFailureOutput) => void): Request<StepFunctions.Types.SendTaskFailureOutput, AWSError>;
|
210
210
|
/**
|
211
|
-
* Used by activity workers, Task states using the callback pattern, and optionally Task states using the job run pattern to report that the task identified by the taskToken failed.
|
211
|
+
* Used by activity workers, Task states using the callback pattern, and optionally Task states using the job run pattern to report that the task identified by the taskToken failed. For an execution with encryption enabled, Step Functions will encrypt the error and cause fields using the KMS key for the execution role. A caller can mark a task as fail without using any KMS permissions in the execution role if the caller provides a null value for both error and cause fields because no data needs to be encrypted.
|
212
212
|
*/
|
213
213
|
sendTaskFailure(callback?: (err: AWSError, data: StepFunctions.Types.SendTaskFailureOutput) => void): Request<StepFunctions.Types.SendTaskFailureOutput, AWSError>;
|
214
214
|
/**
|
@@ -244,11 +244,11 @@ declare class StepFunctions extends Service {
|
|
244
244
|
*/
|
245
245
|
startSyncExecution(callback?: (err: AWSError, data: StepFunctions.Types.StartSyncExecutionOutput) => void): Request<StepFunctions.Types.StartSyncExecutionOutput, AWSError>;
|
246
246
|
/**
|
247
|
-
* Stops an execution. This API action is not supported by EXPRESS state machines.
|
247
|
+
* Stops an execution. This API action is not supported by EXPRESS state machines. For an execution with encryption enabled, Step Functions will encrypt the error and cause fields using the KMS key for the execution role. A caller can stop an execution without using any KMS permissions in the execution role if the caller provides a null value for both error and cause fields because no data needs to be encrypted.
|
248
248
|
*/
|
249
249
|
stopExecution(params: StepFunctions.Types.StopExecutionInput, callback?: (err: AWSError, data: StepFunctions.Types.StopExecutionOutput) => void): Request<StepFunctions.Types.StopExecutionOutput, AWSError>;
|
250
250
|
/**
|
251
|
-
* Stops an execution. This API action is not supported by EXPRESS state machines.
|
251
|
+
* Stops an execution. This API action is not supported by EXPRESS state machines. For an execution with encryption enabled, Step Functions will encrypt the error and cause fields using the KMS key for the execution role. A caller can stop an execution without using any KMS permissions in the execution role if the caller provides a null value for both error and cause fields because no data needs to be encrypted.
|
252
252
|
*/
|
253
253
|
stopExecution(callback?: (err: AWSError, data: StepFunctions.Types.StopExecutionOutput) => void): Request<StepFunctions.Types.StopExecutionOutput, AWSError>;
|
254
254
|
/**
|
@@ -284,11 +284,11 @@ declare class StepFunctions extends Service {
|
|
284
284
|
*/
|
285
285
|
updateMapRun(callback?: (err: AWSError, data: StepFunctions.Types.UpdateMapRunOutput) => void): Request<StepFunctions.Types.UpdateMapRunOutput, AWSError>;
|
286
286
|
/**
|
287
|
-
* Updates an existing state machine by modifying its definition, roleArn, or
|
287
|
+
* Updates an existing state machine by modifying its definition, roleArn, loggingConfiguration, or EncryptionConfiguration. Running executions will continue to use the previous definition and roleArn. You must include at least one of definition or roleArn or you will receive a MissingRequiredParameter error. A qualified state machine ARN refers to a Distributed Map state defined within a state machine. For example, the qualified state machine ARN arn:partition:states:region:account-id:stateMachine:stateMachineName/mapStateLabel refers to a Distributed Map state with a label mapStateLabel in the state machine named stateMachineName. A qualified state machine ARN can either refer to a Distributed Map state defined within a state machine, a version ARN, or an alias ARN. The following are some examples of qualified and unqualified state machine ARNs: The following qualified state machine ARN refers to a Distributed Map state with a label mapStateLabel in a state machine named myStateMachine. arn:partition:states:region:account-id:stateMachine:myStateMachine/mapStateLabel If you provide a qualified state machine ARN that refers to a Distributed Map state, the request fails with ValidationException. The following qualified state machine ARN refers to an alias named PROD. arn:<partition>:states:<region>:<account-id>:stateMachine:<myStateMachine:PROD> If you provide a qualified state machine ARN that refers to a version ARN or an alias ARN, the request starts execution for that version or alias. The following unqualified state machine ARN refers to a state machine named myStateMachine. arn:<partition>:states:<region>:<account-id>:stateMachine:<myStateMachine> After you update your state machine, you can set the publish parameter to true in the same action to publish a new version. This way, you can opt-in to strict versioning of your state machine. Step Functions assigns monotonically increasing integers for state machine versions, starting at version number 1. All StartExecution calls within a few seconds use the updated definition and roleArn. Executions started immediately after you call UpdateStateMachine may use the previous state machine definition and roleArn.
|
288
288
|
*/
|
289
289
|
updateStateMachine(params: StepFunctions.Types.UpdateStateMachineInput, callback?: (err: AWSError, data: StepFunctions.Types.UpdateStateMachineOutput) => void): Request<StepFunctions.Types.UpdateStateMachineOutput, AWSError>;
|
290
290
|
/**
|
291
|
-
* Updates an existing state machine by modifying its definition, roleArn, or
|
291
|
+
* Updates an existing state machine by modifying its definition, roleArn, loggingConfiguration, or EncryptionConfiguration. Running executions will continue to use the previous definition and roleArn. You must include at least one of definition or roleArn or you will receive a MissingRequiredParameter error. A qualified state machine ARN refers to a Distributed Map state defined within a state machine. For example, the qualified state machine ARN arn:partition:states:region:account-id:stateMachine:stateMachineName/mapStateLabel refers to a Distributed Map state with a label mapStateLabel in the state machine named stateMachineName. A qualified state machine ARN can either refer to a Distributed Map state defined within a state machine, a version ARN, or an alias ARN. The following are some examples of qualified and unqualified state machine ARNs: The following qualified state machine ARN refers to a Distributed Map state with a label mapStateLabel in a state machine named myStateMachine. arn:partition:states:region:account-id:stateMachine:myStateMachine/mapStateLabel If you provide a qualified state machine ARN that refers to a Distributed Map state, the request fails with ValidationException. The following qualified state machine ARN refers to an alias named PROD. arn:<partition>:states:<region>:<account-id>:stateMachine:<myStateMachine:PROD> If you provide a qualified state machine ARN that refers to a version ARN or an alias ARN, the request starts execution for that version or alias. The following unqualified state machine ARN refers to a state machine named myStateMachine. arn:<partition>:states:<region>:<account-id>:stateMachine:<myStateMachine> After you update your state machine, you can set the publish parameter to true in the same action to publish a new version. This way, you can opt-in to strict versioning of your state machine. Step Functions assigns monotonically increasing integers for state machine versions, starting at version number 1. All StartExecution calls within a few seconds use the updated definition and roleArn. Executions started immediately after you call UpdateStateMachine may use the previous state machine definition and roleArn.
|
292
292
|
*/
|
293
293
|
updateStateMachine(callback?: (err: AWSError, data: StepFunctions.Types.UpdateStateMachineOutput) => void): Request<StepFunctions.Types.UpdateStateMachineOutput, AWSError>;
|
294
294
|
/**
|
@@ -430,6 +430,10 @@ declare namespace StepFunctions {
|
|
430
430
|
* The list of tags to add to a resource. An array of key-value pairs. For more information, see Using Cost Allocation Tags in the Amazon Web Services Billing and Cost Management User Guide, and Controlling Access Using IAM Tags. Tags may only contain Unicode letters, digits, white space, or these symbols: _ . : / = + - @.
|
431
431
|
*/
|
432
432
|
tags?: TagList;
|
433
|
+
/**
|
434
|
+
* Settings to configure server-side encryption.
|
435
|
+
*/
|
436
|
+
encryptionConfiguration?: EncryptionConfiguration;
|
433
437
|
}
|
434
438
|
export interface CreateActivityOutput {
|
435
439
|
/**
|
@@ -502,6 +506,10 @@ declare namespace StepFunctions {
|
|
502
506
|
* Sets description about the state machine version. You can only set the description if the publish parameter is set to true. Otherwise, if you set versionDescription, but publish to false, this API action throws ValidationException.
|
503
507
|
*/
|
504
508
|
versionDescription?: VersionDescription;
|
509
|
+
/**
|
510
|
+
* Settings to configure server-side encryption.
|
511
|
+
*/
|
512
|
+
encryptionConfiguration?: EncryptionConfiguration;
|
505
513
|
}
|
506
514
|
export interface CreateStateMachineOutput {
|
507
515
|
/**
|
@@ -569,12 +577,20 @@ declare namespace StepFunctions {
|
|
569
577
|
* The date the activity is created.
|
570
578
|
*/
|
571
579
|
creationDate: Timestamp;
|
580
|
+
/**
|
581
|
+
* Settings for configured server-side encryption.
|
582
|
+
*/
|
583
|
+
encryptionConfiguration?: EncryptionConfiguration;
|
572
584
|
}
|
573
585
|
export interface DescribeExecutionInput {
|
574
586
|
/**
|
575
587
|
* The Amazon Resource Name (ARN) of the execution to describe.
|
576
588
|
*/
|
577
589
|
executionArn: Arn;
|
590
|
+
/**
|
591
|
+
* If your state machine definition is encrypted with a KMS key, callers must have kms:Decrypt permission to decrypt the definition. Alternatively, you can call DescribeStateMachine API with includedData = METADATA_ONLY to get a successful response without the encrypted definition.
|
592
|
+
*/
|
593
|
+
includedData?: IncludedData;
|
578
594
|
}
|
579
595
|
export interface DescribeExecutionOutput {
|
580
596
|
/**
|
@@ -745,6 +761,10 @@ declare namespace StepFunctions {
|
|
745
761
|
* The Amazon Resource Name (ARN) of the execution you want state machine information for.
|
746
762
|
*/
|
747
763
|
executionArn: Arn;
|
764
|
+
/**
|
765
|
+
* If your state machine definition is encrypted with a KMS key, callers must have kms:Decrypt permission to decrypt the definition. Alternatively, you can call the API with includedData = METADATA_ONLY to get a successful response without the encrypted definition.
|
766
|
+
*/
|
767
|
+
includedData?: IncludedData;
|
748
768
|
}
|
749
769
|
export interface DescribeStateMachineForExecutionOutput {
|
750
770
|
/**
|
@@ -784,12 +804,20 @@ declare namespace StepFunctions {
|
|
784
804
|
* The revision identifier for the state machine. The first revision ID when you create the state machine is null. Use the state machine revisionId parameter to compare the revision of a state machine with the configuration of the state machine used for executions without performing a diff of the properties, such as definition and roleArn.
|
785
805
|
*/
|
786
806
|
revisionId?: RevisionId;
|
807
|
+
/**
|
808
|
+
* Settings to configure server-side encryption.
|
809
|
+
*/
|
810
|
+
encryptionConfiguration?: EncryptionConfiguration;
|
787
811
|
}
|
788
812
|
export interface DescribeStateMachineInput {
|
789
813
|
/**
|
790
814
|
* The Amazon Resource Name (ARN) of the state machine for which you want the information. If you specify a state machine version ARN, this API returns details about that version. The version ARN is a combination of state machine ARN and the version number separated by a colon (:). For example, stateMachineARN:1.
|
791
815
|
*/
|
792
816
|
stateMachineArn: Arn;
|
817
|
+
/**
|
818
|
+
* If your state machine definition is encrypted with a KMS key, callers must have kms:Decrypt permission to decrypt the definition. Alternatively, you can call the API with includedData = METADATA_ONLY to get a successful response without the encrypted definition. When calling a labelled ARN for an encrypted state machine, the includedData = METADATA_ONLY parameter will not apply because Step Functions needs to decrypt the entire state machine definition to get the Distributed Map state’s definition. In this case, the API caller needs to have kms:Decrypt permission.
|
819
|
+
*/
|
820
|
+
includedData?: IncludedData;
|
793
821
|
}
|
794
822
|
export interface DescribeStateMachineOutput {
|
795
823
|
/**
|
@@ -805,7 +833,7 @@ declare namespace StepFunctions {
|
|
805
833
|
*/
|
806
834
|
status?: StateMachineStatus;
|
807
835
|
/**
|
808
|
-
* The Amazon States Language definition of the state machine. See Amazon States Language.
|
836
|
+
* The Amazon States Language definition of the state machine. See Amazon States Language. If called with includedData = METADATA_ONLY, the returned definition will be {}.
|
809
837
|
*/
|
810
838
|
definition: Definition;
|
811
839
|
/**
|
@@ -837,8 +865,27 @@ declare namespace StepFunctions {
|
|
837
865
|
* The description of the state machine version.
|
838
866
|
*/
|
839
867
|
description?: VersionDescription;
|
868
|
+
/**
|
869
|
+
* Settings to configure server-side encryption.
|
870
|
+
*/
|
871
|
+
encryptionConfiguration?: EncryptionConfiguration;
|
840
872
|
}
|
841
873
|
export type Enabled = boolean;
|
874
|
+
export interface EncryptionConfiguration {
|
875
|
+
/**
|
876
|
+
* An alias, alias ARN, key ID, or key ARN of a symmetric encryption KMS key to encrypt data. To specify a KMS key in a different Amazon Web Services account, you must use the key ARN or alias ARN.
|
877
|
+
*/
|
878
|
+
kmsKeyId?: KmsKeyId;
|
879
|
+
/**
|
880
|
+
* Maximum duration that Step Functions will reuse data keys. When the period expires, Step Functions will call GenerateDataKey. Only applies to customer managed keys.
|
881
|
+
*/
|
882
|
+
kmsDataKeyReusePeriodSeconds?: KmsDataKeyReusePeriodSeconds;
|
883
|
+
/**
|
884
|
+
* Encryption type
|
885
|
+
*/
|
886
|
+
type: EncryptionType;
|
887
|
+
}
|
888
|
+
export type EncryptionType = "AWS_OWNED_KEY"|"CUSTOMER_MANAGED_KMS_KEY"|string;
|
842
889
|
export type EventId = number;
|
843
890
|
export interface ExecutionAbortedEventDetails {
|
844
891
|
/**
|
@@ -1145,6 +1192,7 @@ declare namespace StepFunctions {
|
|
1145
1192
|
export type Identity = string;
|
1146
1193
|
export type IncludeExecutionData = boolean;
|
1147
1194
|
export type IncludeExecutionDataGetExecutionHistory = boolean;
|
1195
|
+
export type IncludedData = "ALL_DATA"|"METADATA_ONLY"|string;
|
1148
1196
|
export interface InspectionData {
|
1149
1197
|
/**
|
1150
1198
|
* The raw state input.
|
@@ -1224,6 +1272,8 @@ declare namespace StepFunctions {
|
|
1224
1272
|
body?: HTTPBody;
|
1225
1273
|
}
|
1226
1274
|
export type InspectionLevel = "INFO"|"DEBUG"|"TRACE"|string;
|
1275
|
+
export type KmsDataKeyReusePeriodSeconds = number;
|
1276
|
+
export type KmsKeyId = string;
|
1227
1277
|
export interface LambdaFunctionFailedEventDetails {
|
1228
1278
|
/**
|
1229
1279
|
* The error code of the failure.
|
@@ -1774,6 +1824,10 @@ declare namespace StepFunctions {
|
|
1774
1824
|
* Passes the X-Ray trace header. The trace header can also be passed in the request payload.
|
1775
1825
|
*/
|
1776
1826
|
traceHeader?: TraceHeader;
|
1827
|
+
/**
|
1828
|
+
* If your state machine definition is encrypted with a KMS key, callers must have kms:Decrypt permission to decrypt the definition. Alternatively, you can call the API with includedData = METADATA_ONLY to get a successful response without the encrypted definition.
|
1829
|
+
*/
|
1830
|
+
includedData?: IncludedData;
|
1777
1831
|
}
|
1778
1832
|
export interface StartSyncExecutionOutput {
|
1779
1833
|
/**
|
@@ -2245,6 +2299,10 @@ declare namespace StepFunctions {
|
|
2245
2299
|
* An optional description of the state machine version to publish. You can only specify the versionDescription parameter if you've set publish to true.
|
2246
2300
|
*/
|
2247
2301
|
versionDescription?: VersionDescription;
|
2302
|
+
/**
|
2303
|
+
* Settings to configure server-side encryption.
|
2304
|
+
*/
|
2305
|
+
encryptionConfiguration?: EncryptionConfiguration;
|
2248
2306
|
}
|
2249
2307
|
export interface UpdateStateMachineOutput {
|
2250
2308
|
/**
|