cdk-lambda-subminute 2.0.470 → 2.0.472
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +4 -4
 - package/lib/cdk-lambda-subminute.js +3 -3
 - package/node_modules/aws-sdk/README.md +1 -1
 - package/node_modules/aws-sdk/apis/amplify-2017-07-25.min.json +76 -55
 - package/node_modules/aws-sdk/apis/appstream-2016-12-01.min.json +181 -44
 - package/node_modules/aws-sdk/apis/docdb-2014-10-31.min.json +31 -3
 - package/node_modules/aws-sdk/apis/ecs-2014-11-13.min.json +109 -89
 - package/node_modules/aws-sdk/apis/fis-2020-12-01.min.json +19 -5
 - package/node_modules/aws-sdk/apis/glue-2017-03-31.min.json +41 -37
 - package/node_modules/aws-sdk/apis/iam-2010-05-08.min.json +0 -1
 - package/node_modules/aws-sdk/apis/s3-2006-03-01.examples.json +92 -92
 - package/node_modules/aws-sdk/apis/s3-2006-03-01.min.json +53 -38
 - package/node_modules/aws-sdk/apis/s3-2006-03-01.paginators.json +3 -0
 - package/node_modules/aws-sdk/clients/amplify.d.ts +20 -1
 - package/node_modules/aws-sdk/clients/appstream.d.ts +200 -1
 - package/node_modules/aws-sdk/clients/codebuild.d.ts +10 -10
 - package/node_modules/aws-sdk/clients/docdb.d.ts +31 -1
 - package/node_modules/aws-sdk/clients/ecs.d.ts +75 -56
 - package/node_modules/aws-sdk/clients/fis.d.ts +21 -0
 - package/node_modules/aws-sdk/clients/glue.d.ts +6 -0
 - package/node_modules/aws-sdk/clients/iam.d.ts +7 -7
 - package/node_modules/aws-sdk/clients/s3.d.ts +43 -24
 - package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +1 -1
 - package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +15 -11
 - package/node_modules/aws-sdk/dist/aws-sdk.js +173 -132
 - package/node_modules/aws-sdk/dist/aws-sdk.min.js +59 -59
 - package/node_modules/aws-sdk/lib/core.js +1 -1
 - package/node_modules/aws-sdk/lib/services/s3.js +5 -1
 - package/node_modules/aws-sdk/package.json +1 -1
 - package/node_modules/aws-sdk/scripts/region-checker/allowlist.js +2 -1
 - package/package.json +2 -2
 
| 
         @@ -37,11 +37,11 @@ declare class ECS extends Service { 
     | 
|
| 
       37 
37 
     | 
    
         
             
               */
         
     | 
| 
       38 
38 
     | 
    
         
             
              createService(callback?: (err: AWSError, data: ECS.Types.CreateServiceResponse) => void): Request<ECS.Types.CreateServiceResponse, AWSError>;
         
     | 
| 
       39 
39 
     | 
    
         
             
              /**
         
     | 
| 
       40 
     | 
    
         
            -
               * Create a task set in the specified cluster and service. This is used when a service uses the EXTERNAL deployment controller type. For more information, see Amazon ECS deployment types in the Amazon Elastic Container Service Developer Guide.  On March 21, 2024, a change was made to resolve the task definition revision before authorization. When a task definition revision is not specified, authorization will occur using the latest revision of a task definition.  For information about the maximum number of task sets and  
     | 
| 
      
 40 
     | 
    
         
            +
               * Create a task set in the specified cluster and service. This is used when a service uses the EXTERNAL deployment controller type. For more information, see Amazon ECS deployment types in the Amazon Elastic Container Service Developer Guide.  On March 21, 2024, a change was made to resolve the task definition revision before authorization. When a task definition revision is not specified, authorization will occur using the latest revision of a task definition.  For information about the maximum number of task sets and other quotas, see Amazon ECS service quotas in the Amazon Elastic Container Service Developer Guide.
         
     | 
| 
       41 
41 
     | 
    
         
             
               */
         
     | 
| 
       42 
42 
     | 
    
         
             
              createTaskSet(params: ECS.Types.CreateTaskSetRequest, callback?: (err: AWSError, data: ECS.Types.CreateTaskSetResponse) => void): Request<ECS.Types.CreateTaskSetResponse, AWSError>;
         
     | 
| 
       43 
43 
     | 
    
         
             
              /**
         
     | 
| 
       44 
     | 
    
         
            -
               * Create a task set in the specified cluster and service. This is used when a service uses the EXTERNAL deployment controller type. For more information, see Amazon ECS deployment types in the Amazon Elastic Container Service Developer Guide.  On March 21, 2024, a change was made to resolve the task definition revision before authorization. When a task definition revision is not specified, authorization will occur using the latest revision of a task definition.  For information about the maximum number of task sets and  
     | 
| 
      
 44 
     | 
    
         
            +
               * Create a task set in the specified cluster and service. This is used when a service uses the EXTERNAL deployment controller type. For more information, see Amazon ECS deployment types in the Amazon Elastic Container Service Developer Guide.  On March 21, 2024, a change was made to resolve the task definition revision before authorization. When a task definition revision is not specified, authorization will occur using the latest revision of a task definition.  For information about the maximum number of task sets and other quotas, see Amazon ECS service quotas in the Amazon Elastic Container Service Developer Guide.
         
     | 
| 
       45 
45 
     | 
    
         
             
               */
         
     | 
| 
       46 
46 
     | 
    
         
             
              createTaskSet(callback?: (err: AWSError, data: ECS.Types.CreateTaskSetResponse) => void): Request<ECS.Types.CreateTaskSetResponse, AWSError>;
         
     | 
| 
       47 
47 
     | 
    
         
             
              /**
         
     | 
| 
         @@ -317,11 +317,11 @@ declare class ECS extends Service { 
     | 
|
| 
       317 
317 
     | 
    
         
             
               */
         
     | 
| 
       318 
318 
     | 
    
         
             
              registerContainerInstance(callback?: (err: AWSError, data: ECS.Types.RegisterContainerInstanceResponse) => void): Request<ECS.Types.RegisterContainerInstanceResponse, AWSError>;
         
     | 
| 
       319 
319 
     | 
    
         
             
              /**
         
     | 
| 
       320 
     | 
    
         
            -
               * Registers a new task definition from the supplied family and containerDefinitions. Optionally, you can add data volumes to your containers with the volumes parameter. For more information about task definition parameters and defaults, see Amazon ECS Task Definitions in the Amazon Elastic Container Service Developer Guide. You can specify a role for your task with the taskRoleArn parameter. When you specify a role for a task, its containers can then use the latest versions of the CLI or SDKs to make API requests to the Amazon Web Services services that are specified in the policy that's associated with the role. For more information, see IAM Roles for Tasks in the Amazon Elastic Container Service Developer Guide. You can specify a Docker networking mode for the containers in your task definition with the networkMode parameter.  
     | 
| 
      
 320 
     | 
    
         
            +
               * Registers a new task definition from the supplied family and containerDefinitions. Optionally, you can add data volumes to your containers with the volumes parameter. For more information about task definition parameters and defaults, see Amazon ECS Task Definitions in the Amazon Elastic Container Service Developer Guide. You can specify a role for your task with the taskRoleArn parameter. When you specify a role for a task, its containers can then use the latest versions of the CLI or SDKs to make API requests to the Amazon Web Services services that are specified in the policy that's associated with the role. For more information, see IAM Roles for Tasks in the Amazon Elastic Container Service Developer Guide. You can specify a Docker networking mode for the containers in your task definition with the networkMode parameter. If you specify the awsvpc network mode, the task is allocated an elastic network interface, and you must specify a NetworkConfiguration when you create a service or run a task with the task definition. For more information, see Task Networking in the Amazon Elastic Container Service Developer Guide.
         
     | 
| 
       321 
321 
     | 
    
         
             
               */
         
     | 
| 
       322 
322 
     | 
    
         
             
              registerTaskDefinition(params: ECS.Types.RegisterTaskDefinitionRequest, callback?: (err: AWSError, data: ECS.Types.RegisterTaskDefinitionResponse) => void): Request<ECS.Types.RegisterTaskDefinitionResponse, AWSError>;
         
     | 
| 
       323 
323 
     | 
    
         
             
              /**
         
     | 
| 
       324 
     | 
    
         
            -
               * Registers a new task definition from the supplied family and containerDefinitions. Optionally, you can add data volumes to your containers with the volumes parameter. For more information about task definition parameters and defaults, see Amazon ECS Task Definitions in the Amazon Elastic Container Service Developer Guide. You can specify a role for your task with the taskRoleArn parameter. When you specify a role for a task, its containers can then use the latest versions of the CLI or SDKs to make API requests to the Amazon Web Services services that are specified in the policy that's associated with the role. For more information, see IAM Roles for Tasks in the Amazon Elastic Container Service Developer Guide. You can specify a Docker networking mode for the containers in your task definition with the networkMode parameter.  
     | 
| 
      
 324 
     | 
    
         
            +
               * Registers a new task definition from the supplied family and containerDefinitions. Optionally, you can add data volumes to your containers with the volumes parameter. For more information about task definition parameters and defaults, see Amazon ECS Task Definitions in the Amazon Elastic Container Service Developer Guide. You can specify a role for your task with the taskRoleArn parameter. When you specify a role for a task, its containers can then use the latest versions of the CLI or SDKs to make API requests to the Amazon Web Services services that are specified in the policy that's associated with the role. For more information, see IAM Roles for Tasks in the Amazon Elastic Container Service Developer Guide. You can specify a Docker networking mode for the containers in your task definition with the networkMode parameter. If you specify the awsvpc network mode, the task is allocated an elastic network interface, and you must specify a NetworkConfiguration when you create a service or run a task with the task definition. For more information, see Task Networking in the Amazon Elastic Container Service Developer Guide.
         
     | 
| 
       325 
325 
     | 
    
         
             
               */
         
     | 
| 
       326 
326 
     | 
    
         
             
              registerTaskDefinition(callback?: (err: AWSError, data: ECS.Types.RegisterTaskDefinitionResponse) => void): Request<ECS.Types.RegisterTaskDefinitionResponse, AWSError>;
         
     | 
| 
       327 
327 
     | 
    
         
             
              /**
         
     | 
| 
         @@ -828,11 +828,11 @@ declare namespace ECS { 
     | 
|
| 
       828 
828 
     | 
    
         
             
              export type ContainerCondition = "START"|"COMPLETE"|"SUCCESS"|"HEALTHY"|string;
         
     | 
| 
       829 
829 
     | 
    
         
             
              export interface ContainerDefinition {
         
     | 
| 
       830 
830 
     | 
    
         
             
                /**
         
     | 
| 
       831 
     | 
    
         
            -
                 * The name of a container. If you're linking multiple containers together in a task definition, the name of one container can be entered in the links of another container to connect the containers. Up to 255 letters (uppercase and lowercase), numbers, underscores, and hyphens are allowed. This parameter maps to name in  
     | 
| 
      
 831 
     | 
    
         
            +
                 * The name of a container. If you're linking multiple containers together in a task definition, the name of one container can be entered in the links of another container to connect the containers. Up to 255 letters (uppercase and lowercase), numbers, underscores, and hyphens are allowed. This parameter maps to name in tthe docker create-container command and the --name option to docker run. 
         
     | 
| 
       832 
832 
     | 
    
         
             
                 */
         
     | 
| 
       833 
833 
     | 
    
         
             
                name?: String;
         
     | 
| 
       834 
834 
     | 
    
         
             
                /**
         
     | 
| 
       835 
     | 
    
         
            -
                 * The image used to start a container. This string is passed directly to the Docker daemon. By default, images in the Docker Hub registry are available. Other repositories are specified with either  repository-url/image:tag  or  repository-url/image@digest . Up to 255 letters (uppercase and lowercase), numbers, hyphens, underscores, colons, periods, forward slashes, and number signs are allowed. This parameter maps to Image in the  
     | 
| 
      
 835 
     | 
    
         
            +
                 * The image used to start a container. This string is passed directly to the Docker daemon. By default, images in the Docker Hub registry are available. Other repositories are specified with either  repository-url/image:tag  or  repository-url/image@digest . Up to 255 letters (uppercase and lowercase), numbers, hyphens, underscores, colons, periods, forward slashes, and number signs are allowed. This parameter maps to Image in the docker create-container command and the IMAGE parameter of docker run.   When a new task starts, the Amazon ECS container agent pulls the latest version of the specified image and tag for the container to use. However, subsequent updates to a repository image aren't propagated to already running tasks.   Images in Amazon ECR repositories can be specified by either using the full registry/repository:tag or registry/repository@digest. For example, 012345678910.dkr.ecr.<region-name>.amazonaws.com/<repository-name>:latest or 012345678910.dkr.ecr.<region-name>.amazonaws.com/<repository-name>@sha256:94afd1f2e64d908bc90dbca0035a5b567EXAMPLE.    Images in official repositories on Docker Hub use a single name (for example, ubuntu or mongo).   Images in other repositories on Docker Hub are qualified with an organization name (for example, amazon/amazon-ecs-agent).   Images in other online repositories are qualified further by a domain name (for example, quay.io/assemblyline/ubuntu).  
         
     | 
| 
       836 
836 
     | 
    
         
             
                 */
         
     | 
| 
       837 
837 
     | 
    
         
             
                image?: String;
         
     | 
| 
       838 
838 
     | 
    
         
             
                /**
         
     | 
| 
         @@ -840,23 +840,23 @@ declare namespace ECS { 
     | 
|
| 
       840 
840 
     | 
    
         
             
                 */
         
     | 
| 
       841 
841 
     | 
    
         
             
                repositoryCredentials?: RepositoryCredentials;
         
     | 
| 
       842 
842 
     | 
    
         
             
                /**
         
     | 
| 
       843 
     | 
    
         
            -
                 * The number of cpu units reserved for the container. This parameter maps to CpuShares in the  
     | 
| 
      
 843 
     | 
    
         
            +
                 * The number of cpu units reserved for the container. This parameter maps to CpuShares in the docker create-container commandand the --cpu-shares option to docker run. This field is optional for tasks using the Fargate launch type, and the only requirement is that the total amount of CPU reserved for all containers within a task be lower than the task-level cpu value.  You can determine the number of CPU units that are available per EC2 instance type by multiplying the vCPUs listed for that instance type on the Amazon EC2 Instances detail page by 1,024.  Linux containers share unallocated CPU units with other containers on the container instance with the same ratio as their allocated amount. For example, if you run a single-container task on a single-core instance type with 512 CPU units specified for that container, and that's the only task running on the container instance, that container could use the full 1,024 CPU unit share at any given time. However, if you launched another copy of the same task on that container instance, each task is guaranteed a minimum of 512 CPU units when needed. Moreover, each container could float to higher CPU usage if the other container was not using it. If both tasks were 100% active all of the time, they would be limited to 512 CPU units. On Linux container instances, the Docker daemon on the container instance uses the CPU value to calculate the relative CPU share ratios for running containers. The minimum valid CPU share value that the Linux kernel allows is 2, and the maximum valid CPU share value that the Linux kernel allows is 262144. However, the CPU parameter isn't required, and you can use CPU values below 2 or above 262144 in your container definitions. For CPU values below 2 (including null) or above 262144, the behavior varies based on your Amazon ECS container agent version:    Agent versions less than or equal to 1.1.0: Null and zero CPU values are passed to Docker as 0, which Docker then converts to 1,024 CPU shares. CPU values of 1 are passed to Docker as 1, which the Linux kernel converts to two CPU shares.    Agent versions greater than or equal to 1.2.0: Null, zero, and CPU values of 1 are passed to Docker as 2.    Agent versions greater than or equal to 1.84.0: CPU values greater than 256 vCPU are passed to Docker as 256, which is equivalent to 262144 CPU shares.   On Windows container instances, the CPU limit is enforced as an absolute limit, or a quota. Windows containers only have access to the specified amount of CPU that's described in the task definition. A null or zero CPU value is passed to Docker as 0, which Windows interprets as 1% of one CPU.
         
     | 
| 
       844 
844 
     | 
    
         
             
                 */
         
     | 
| 
       845 
845 
     | 
    
         
             
                cpu?: Integer;
         
     | 
| 
       846 
846 
     | 
    
         
             
                /**
         
     | 
| 
       847 
     | 
    
         
            -
                 * The amount (in MiB) of memory to present to the container. If your container attempts to exceed the memory specified here, the container is killed. The total amount of memory reserved for all containers within a task must be lower than the task memory value, if one is specified. This parameter maps to Memory in  
     | 
| 
      
 847 
     | 
    
         
            +
                 * The amount (in MiB) of memory to present to the container. If your container attempts to exceed the memory specified here, the container is killed. The total amount of memory reserved for all containers within a task must be lower than the task memory value, if one is specified. This parameter maps to Memory in thethe docker create-container command and the --memory option to docker run. If using the Fargate launch type, this parameter is optional. If using the EC2 launch type, you must specify either a task-level memory value or a container-level memory value. If you specify both a container-level memory and memoryReservation value, memory must be greater than memoryReservation. If you specify memoryReservation, then that value is subtracted from the available memory resources for the container instance where the container is placed. Otherwise, the value of memory is used. The Docker 20.10.0 or later daemon reserves a minimum of 6 MiB of memory for a container. So, don't specify less than 6 MiB of memory for your containers.  The Docker 19.03.13-ce or earlier daemon reserves a minimum of 4 MiB of memory for a container. So, don't specify less than 4 MiB of memory for your containers.
         
     | 
| 
       848 
848 
     | 
    
         
             
                 */
         
     | 
| 
       849 
849 
     | 
    
         
             
                memory?: BoxedInteger;
         
     | 
| 
       850 
850 
     | 
    
         
             
                /**
         
     | 
| 
       851 
     | 
    
         
            -
                 * The soft limit (in MiB) of memory to reserve for the container. When system memory is under heavy contention, Docker attempts to keep the container memory to this soft limit. However, your container can consume more memory when it needs to, up to either the hard limit specified with the memory parameter (if applicable), or all of the available memory on the container instance, whichever comes first. This parameter maps to MemoryReservation in the  
     | 
| 
      
 851 
     | 
    
         
            +
                 * The soft limit (in MiB) of memory to reserve for the container. When system memory is under heavy contention, Docker attempts to keep the container memory to this soft limit. However, your container can consume more memory when it needs to, up to either the hard limit specified with the memory parameter (if applicable), or all of the available memory on the container instance, whichever comes first. This parameter maps to MemoryReservation in the the docker create-container command and the --memory-reservation option to docker run. If a task-level memory value is not specified, you must specify a non-zero integer for one or both of memory or memoryReservation in a container definition. If you specify both, memory must be greater than memoryReservation. If you specify memoryReservation, then that value is subtracted from the available memory resources for the container instance where the container is placed. Otherwise, the value of memory is used. For example, if your container normally uses 128 MiB of memory, but occasionally bursts to 256 MiB of memory for short periods of time, you can set a memoryReservation of 128 MiB, and a memory hard limit of 300 MiB. This configuration would allow the container to only reserve 128 MiB of memory from the remaining resources on the container instance, but also allow the container to consume more memory resources when needed. The Docker 20.10.0 or later daemon reserves a minimum of 6 MiB of memory for a container. So, don't specify less than 6 MiB of memory for your containers.  The Docker 19.03.13-ce or earlier daemon reserves a minimum of 4 MiB of memory for a container. So, don't specify less than 4 MiB of memory for your containers.
         
     | 
| 
       852 
852 
     | 
    
         
             
                 */
         
     | 
| 
       853 
853 
     | 
    
         
             
                memoryReservation?: BoxedInteger;
         
     | 
| 
       854 
854 
     | 
    
         
             
                /**
         
     | 
| 
       855 
     | 
    
         
            -
                 * The links parameter allows containers to communicate with each other without the need for port mappings. This parameter is only supported if the network mode of a task definition is bridge. The name:internalName construct is analogous to name:alias in Docker links. Up to 255 letters (uppercase and lowercase), numbers, underscores, and hyphens are allowed 
     | 
| 
      
 855 
     | 
    
         
            +
                 * The links parameter allows containers to communicate with each other without the need for port mappings. This parameter is only supported if the network mode of a task definition is bridge. The name:internalName construct is analogous to name:alias in Docker links. Up to 255 letters (uppercase and lowercase), numbers, underscores, and hyphens are allowed.. This parameter maps to Links in the docker create-container command and the --link option to docker run.  This parameter is not supported for Windows containers.   Containers that are collocated on a single container instance may be able to communicate with each other without requiring links or host port mappings. Network isolation is achieved on the container instance using security groups and VPC settings. 
         
     | 
| 
       856 
856 
     | 
    
         
             
                 */
         
     | 
| 
       857 
857 
     | 
    
         
             
                links?: StringList;
         
     | 
| 
       858 
858 
     | 
    
         
             
                /**
         
     | 
| 
       859 
     | 
    
         
            -
                 * The list of port mappings for the container. Port mappings allow containers to access ports on the host container instance to send or receive traffic. For task definitions that use the awsvpc network mode, only specify the containerPort. The hostPort can be left blank or it must be the same value as the containerPort. Port mappings on Windows use the NetNAT gateway address rather than localhost. There's no loopback for port mappings on Windows, so you can't access a container's mapped port from the host itself.  This parameter maps to PortBindings in the  
     | 
| 
      
 859 
     | 
    
         
            +
                 * The list of port mappings for the container. Port mappings allow containers to access ports on the host container instance to send or receive traffic. For task definitions that use the awsvpc network mode, only specify the containerPort. The hostPort can be left blank or it must be the same value as the containerPort. Port mappings on Windows use the NetNAT gateway address rather than localhost. There's no loopback for port mappings on Windows, so you can't access a container's mapped port from the host itself.  This parameter maps to PortBindings in the the docker create-container command and the --publish option to docker run. If the network mode of a task definition is set to none, then you can't specify port mappings. If the network mode of a task definition is set to host, then host ports must either be undefined or they must match the container port in the port mapping.  After a task reaches the RUNNING status, manual and automatic host and container port assignments are visible in the Network Bindings section of a container description for a selected task in the Amazon ECS console. The assignments are also visible in the networkBindings section DescribeTasks responses. 
         
     | 
| 
       860 
860 
     | 
    
         
             
                 */
         
     | 
| 
       861 
861 
     | 
    
         
             
                portMappings?: PortMappingList;
         
     | 
| 
       862 
862 
     | 
    
         
             
                /**
         
     | 
| 
         @@ -864,27 +864,31 @@ declare namespace ECS { 
     | 
|
| 
       864 
864 
     | 
    
         
             
                 */
         
     | 
| 
       865 
865 
     | 
    
         
             
                essential?: BoxedBoolean;
         
     | 
| 
       866 
866 
     | 
    
         
             
                /**
         
     | 
| 
       867 
     | 
    
         
            -
                 * 
     | 
| 
      
 867 
     | 
    
         
            +
                 * The restart policy for a container. When you set up a restart policy, Amazon ECS can restart the container without needing to replace the task. For more information, see Restart individual containers in Amazon ECS tasks with container restart policies in the Amazon Elastic Container Service Developer Guide.
         
     | 
| 
      
 868 
     | 
    
         
            +
                 */
         
     | 
| 
      
 869 
     | 
    
         
            +
                restartPolicy?: ContainerRestartPolicy;
         
     | 
| 
      
 870 
     | 
    
         
            +
                /**
         
     | 
| 
      
 871 
     | 
    
         
            +
                 *  Early versions of the Amazon ECS container agent don't properly handle entryPoint parameters. If you have problems using entryPoint, update your container agent or enter your commands and arguments as command array items instead.  The entry point that's passed to the container. This parameter maps to Entrypoint in tthe docker create-container command and the --entrypoint option to docker run.
         
     | 
| 
       868 
872 
     | 
    
         
             
                 */
         
     | 
| 
       869 
873 
     | 
    
         
             
                entryPoint?: StringList;
         
     | 
| 
       870 
874 
     | 
    
         
             
                /**
         
     | 
| 
       871 
     | 
    
         
            -
                 * The command that's passed to the container. This parameter maps to Cmd in the  
     | 
| 
      
 875 
     | 
    
         
            +
                 * The command that's passed to the container. This parameter maps to Cmd in the docker create-container command and the COMMAND parameter to docker run. If there are multiple arguments, each argument is a separated string in the array.
         
     | 
| 
       872 
876 
     | 
    
         
             
                 */
         
     | 
| 
       873 
877 
     | 
    
         
             
                command?: StringList;
         
     | 
| 
       874 
878 
     | 
    
         
             
                /**
         
     | 
| 
       875 
     | 
    
         
            -
                 * The environment variables to pass to a container. This parameter maps to Env in the  
     | 
| 
      
 879 
     | 
    
         
            +
                 * The environment variables to pass to a container. This parameter maps to Env in the docker create-container command and the --env option to docker run.  We don't recommend that you use plaintext environment variables for sensitive information, such as credential data. 
         
     | 
| 
       876 
880 
     | 
    
         
             
                 */
         
     | 
| 
       877 
881 
     | 
    
         
             
                environment?: EnvironmentVariables;
         
     | 
| 
       878 
882 
     | 
    
         
             
                /**
         
     | 
| 
       879 
     | 
    
         
            -
                 * A list of files containing the environment variables to pass to a container. This parameter maps to the --env-file option to docker run. You can specify up to ten environment files. The file must have a .env file extension. Each line in an environment file contains an environment variable in VARIABLE=VALUE format. Lines beginning with # are treated as comments and are ignored.  
     | 
| 
      
 883 
     | 
    
         
            +
                 * A list of files containing the environment variables to pass to a container. This parameter maps to the --env-file option to docker run. You can specify up to ten environment files. The file must have a .env file extension. Each line in an environment file contains an environment variable in VARIABLE=VALUE format. Lines beginning with # are treated as comments and are ignored. If there are environment variables specified using the environment parameter in a container definition, they take precedence over the variables contained within an environment file. If multiple environment files are specified that contain the same variable, they're processed from the top down. We recommend that you use unique variable names. For more information, see Specifying Environment Variables in the Amazon Elastic Container Service Developer Guide.
         
     | 
| 
       880 
884 
     | 
    
         
             
                 */
         
     | 
| 
       881 
885 
     | 
    
         
             
                environmentFiles?: EnvironmentFiles;
         
     | 
| 
       882 
886 
     | 
    
         
             
                /**
         
     | 
| 
       883 
     | 
    
         
            -
                 * The mount points for data volumes in your container. This parameter maps to Volumes in the  
     | 
| 
      
 887 
     | 
    
         
            +
                 * The mount points for data volumes in your container. This parameter maps to Volumes in the the docker create-container command and the --volume option to docker run. Windows containers can mount whole directories on the same drive as $env:ProgramData. Windows containers can't mount directories on a different drive, and mount point can't be across drives.
         
     | 
| 
       884 
888 
     | 
    
         
             
                 */
         
     | 
| 
       885 
889 
     | 
    
         
             
                mountPoints?: MountPointList;
         
     | 
| 
       886 
890 
     | 
    
         
             
                /**
         
     | 
| 
       887 
     | 
    
         
            -
                 * Data volumes to mount from another container. This parameter maps to VolumesFrom in  
     | 
| 
      
 891 
     | 
    
         
            +
                 * Data volumes to mount from another container. This parameter maps to VolumesFrom in tthe docker create-container command and the --volumes-from option to docker run.
         
     | 
| 
       888 
892 
     | 
    
         
             
                 */
         
     | 
| 
       889 
893 
     | 
    
         
             
                volumesFrom?: VolumeFromList;
         
     | 
| 
       890 
894 
     | 
    
         
             
                /**
         
     | 
| 
         @@ -900,7 +904,7 @@ declare namespace ECS { 
     | 
|
| 
       900 
904 
     | 
    
         
             
                 */
         
     | 
| 
       901 
905 
     | 
    
         
             
                dependsOn?: ContainerDependencies;
         
     | 
| 
       902 
906 
     | 
    
         
             
                /**
         
     | 
| 
       903 
     | 
    
         
            -
                 * Time duration (in seconds) to wait before giving up on resolving dependencies for a container. For example, you specify two containers in a task definition with containerA having a dependency on containerB reaching a COMPLETE, SUCCESS, or HEALTHY status. If a startTimeout value is specified for containerB and it doesn't reach the desired status within that time then containerA gives up and not start. This results in the task transitioning to a STOPPED state.  When the ECS_CONTAINER_START_TIMEOUT container agent configuration variable is used, it's enforced independently from this start timeout value.  For tasks using the Fargate launch type, the task or service requires the following platforms:   Linux platform version 1.3.0 or later.   Windows platform version 1.0.0 or later.   For tasks using the EC2 launch type, your container instances require at least version 1.26.0 of the container agent to use a container start timeout value. However, we recommend using the latest container agent version. For information about checking your agent version and updating to the latest version, see Updating the Amazon ECS Container Agent in the Amazon Elastic Container Service Developer Guide. If you're using an Amazon ECS-optimized Linux AMI, your instance needs at least version 1.26.0-1 of the ecs-init package. If your container instances are launched from version 20190301 or later, then they contain the required versions of the container agent and ecs-init. For more information, see Amazon ECS-optimized Linux AMI in the Amazon Elastic Container Service Developer Guide. The valid values are 2-120 seconds.
         
     | 
| 
      
 907 
     | 
    
         
            +
                 * Time duration (in seconds) to wait before giving up on resolving dependencies for a container. For example, you specify two containers in a task definition with containerA having a dependency on containerB reaching a COMPLETE, SUCCESS, or HEALTHY status. If a startTimeout value is specified for containerB and it doesn't reach the desired status within that time then containerA gives up and not start. This results in the task transitioning to a STOPPED state.  When the ECS_CONTAINER_START_TIMEOUT container agent configuration variable is used, it's enforced independently from this start timeout value.  For tasks using the Fargate launch type, the task or service requires the following platforms:   Linux platform version 1.3.0 or later.   Windows platform version 1.0.0 or later.   For tasks using the EC2 launch type, your container instances require at least version 1.26.0 of the container agent to use a container start timeout value. However, we recommend using the latest container agent version. For information about checking your agent version and updating to the latest version, see Updating the Amazon ECS Container Agent in the Amazon Elastic Container Service Developer Guide. If you're using an Amazon ECS-optimized Linux AMI, your instance needs at least version 1.26.0-1 of the ecs-init package. If your container instances are launched from version 20190301 or later, then they contain the required versions of the container agent and ecs-init. For more information, see Amazon ECS-optimized Linux AMI in the Amazon Elastic Container Service Developer Guide. The valid values for Fargate are 2-120 seconds.
         
     | 
| 
       904 
908 
     | 
    
         
             
                 */
         
     | 
| 
       905 
909 
     | 
    
         
             
                startTimeout?: BoxedInteger;
         
     | 
| 
       906 
910 
     | 
    
         
             
                /**
         
     | 
| 
         @@ -908,71 +912,71 @@ declare namespace ECS { 
     | 
|
| 
       908 
912 
     | 
    
         
             
                 */
         
     | 
| 
       909 
913 
     | 
    
         
             
                stopTimeout?: BoxedInteger;
         
     | 
| 
       910 
914 
     | 
    
         
             
                /**
         
     | 
| 
       911 
     | 
    
         
            -
                 * The hostname to use for your container. This parameter maps to Hostname in  
     | 
| 
      
 915 
     | 
    
         
            +
                 * The hostname to use for your container. This parameter maps to Hostname in thethe docker create-container command and the --hostname option to docker run.  The hostname parameter is not supported if you're using the awsvpc network mode. 
         
     | 
| 
       912 
916 
     | 
    
         
             
                 */
         
     | 
| 
       913 
917 
     | 
    
         
             
                hostname?: String;
         
     | 
| 
       914 
918 
     | 
    
         
             
                /**
         
     | 
| 
       915 
     | 
    
         
            -
                 * The user to use inside the container. This parameter maps to User in the  
     | 
| 
      
 919 
     | 
    
         
            +
                 * The user to use inside the container. This parameter maps to User in the docker create-container command and the --user option to docker run.  When running tasks using the host network mode, don't run containers using the root user (UID 0). We recommend using a non-root user for better security.  You can specify the user using the following formats. If specifying a UID or GID, you must specify it as a positive integer.    user     user:group     uid     uid:gid     user:gid     uid:group     This parameter is not supported for Windows containers. 
         
     | 
| 
       916 
920 
     | 
    
         
             
                 */
         
     | 
| 
       917 
921 
     | 
    
         
             
                user?: String;
         
     | 
| 
       918 
922 
     | 
    
         
             
                /**
         
     | 
| 
       919 
     | 
    
         
            -
                 * The working directory to run commands inside the container in. This parameter maps to WorkingDir in the  
     | 
| 
      
 923 
     | 
    
         
            +
                 * The working directory to run commands inside the container in. This parameter maps to WorkingDir in the docker create-container command and the --workdir option to docker run.
         
     | 
| 
       920 
924 
     | 
    
         
             
                 */
         
     | 
| 
       921 
925 
     | 
    
         
             
                workingDirectory?: String;
         
     | 
| 
       922 
926 
     | 
    
         
             
                /**
         
     | 
| 
       923 
     | 
    
         
            -
                 * When this parameter is true, networking is off within the container. This parameter maps to NetworkDisabled in the  
     | 
| 
      
 927 
     | 
    
         
            +
                 * When this parameter is true, networking is off within the container. This parameter maps to NetworkDisabled in the docker create-container command.  This parameter is not supported for Windows containers. 
         
     | 
| 
       924 
928 
     | 
    
         
             
                 */
         
     | 
| 
       925 
929 
     | 
    
         
             
                disableNetworking?: BoxedBoolean;
         
     | 
| 
       926 
930 
     | 
    
         
             
                /**
         
     | 
| 
       927 
     | 
    
         
            -
                 * When this parameter is true, the container is given elevated privileges on the host container instance (similar to the root user). This parameter maps to Privileged in the  
     | 
| 
      
 931 
     | 
    
         
            +
                 * When this parameter is true, the container is given elevated privileges on the host container instance (similar to the root user). This parameter maps to Privileged in the the docker create-container command and the --privileged option to docker run  This parameter is not supported for Windows containers or tasks run on Fargate. 
         
     | 
| 
       928 
932 
     | 
    
         
             
                 */
         
     | 
| 
       929 
933 
     | 
    
         
             
                privileged?: BoxedBoolean;
         
     | 
| 
       930 
934 
     | 
    
         
             
                /**
         
     | 
| 
       931 
     | 
    
         
            -
                 * When this parameter is true, the container is given read-only access to its root file system. This parameter maps to ReadonlyRootfs in the  
     | 
| 
      
 935 
     | 
    
         
            +
                 * When this parameter is true, the container is given read-only access to its root file system. This parameter maps to ReadonlyRootfs in the docker create-container command and the --read-only option to docker run.  This parameter is not supported for Windows containers. 
         
     | 
| 
       932 
936 
     | 
    
         
             
                 */
         
     | 
| 
       933 
937 
     | 
    
         
             
                readonlyRootFilesystem?: BoxedBoolean;
         
     | 
| 
       934 
938 
     | 
    
         
             
                /**
         
     | 
| 
       935 
     | 
    
         
            -
                 * A list of DNS servers that are presented to the container. This parameter maps to Dns in the  
     | 
| 
      
 939 
     | 
    
         
            +
                 * A list of DNS servers that are presented to the container. This parameter maps to Dns in the the docker create-container command and the --dns option to docker run.  This parameter is not supported for Windows containers. 
         
     | 
| 
       936 
940 
     | 
    
         
             
                 */
         
     | 
| 
       937 
941 
     | 
    
         
             
                dnsServers?: StringList;
         
     | 
| 
       938 
942 
     | 
    
         
             
                /**
         
     | 
| 
       939 
     | 
    
         
            -
                 * A list of DNS search domains that are presented to the container. This parameter maps to DnsSearch in the  
     | 
| 
      
 943 
     | 
    
         
            +
                 * A list of DNS search domains that are presented to the container. This parameter maps to DnsSearch in the docker create-container command and the --dns-search option to docker run.  This parameter is not supported for Windows containers. 
         
     | 
| 
       940 
944 
     | 
    
         
             
                 */
         
     | 
| 
       941 
945 
     | 
    
         
             
                dnsSearchDomains?: StringList;
         
     | 
| 
       942 
946 
     | 
    
         
             
                /**
         
     | 
| 
       943 
     | 
    
         
            -
                 * A list of hostnames and IP address mappings to append to the /etc/hosts file on the container. This parameter maps to ExtraHosts in the  
     | 
| 
      
 947 
     | 
    
         
            +
                 * A list of hostnames and IP address mappings to append to the /etc/hosts file on the container. This parameter maps to ExtraHosts in the docker create-container command and the --add-host option to docker run.  This parameter isn't supported for Windows containers or tasks that use the awsvpc network mode. 
         
     | 
| 
       944 
948 
     | 
    
         
             
                 */
         
     | 
| 
       945 
949 
     | 
    
         
             
                extraHosts?: HostEntryList;
         
     | 
| 
       946 
950 
     | 
    
         
             
                /**
         
     | 
| 
       947 
     | 
    
         
            -
                 * A list of strings to provide custom configuration for multiple security systems.  
     | 
| 
      
 951 
     | 
    
         
            +
                 * A list of strings to provide custom configuration for multiple security systems. This field isn't valid for containers in tasks using the Fargate launch type. For Linux tasks on EC2, this parameter can be used to reference custom labels for SELinux and AppArmor multi-level security systems. For any tasks on EC2, this parameter can be used to reference a credential spec file that configures a container for Active Directory authentication. For more information, see Using gMSAs for Windows Containers and Using gMSAs for Linux Containers in the Amazon Elastic Container Service Developer Guide. This parameter maps to SecurityOpt in the docker create-container command and the --security-opt option to docker run.  The Amazon ECS container agent running on a container instance must register with the ECS_SELINUX_CAPABLE=true or ECS_APPARMOR_CAPABLE=true environment variables before containers placed on that instance can use these security options. For more information, see Amazon ECS Container Agent Configuration in the Amazon Elastic Container Service Developer Guide.  Valid values: "no-new-privileges" | "apparmor:PROFILE" | "label:value" | "credentialspec:CredentialSpecFilePath"
         
     | 
| 
       948 
952 
     | 
    
         
             
                 */
         
     | 
| 
       949 
953 
     | 
    
         
             
                dockerSecurityOptions?: StringList;
         
     | 
| 
       950 
954 
     | 
    
         
             
                /**
         
     | 
| 
       951 
     | 
    
         
            -
                 * When this parameter is true, you can deploy containerized applications that require stdin or a tty to be allocated. This parameter maps to OpenStdin in the  
     | 
| 
      
 955 
     | 
    
         
            +
                 * When this parameter is true, you can deploy containerized applications that require stdin or a tty to be allocated. This parameter maps to OpenStdin in the docker create-container command and the --interactive option to docker run.
         
     | 
| 
       952 
956 
     | 
    
         
             
                 */
         
     | 
| 
       953 
957 
     | 
    
         
             
                interactive?: BoxedBoolean;
         
     | 
| 
       954 
958 
     | 
    
         
             
                /**
         
     | 
| 
       955 
     | 
    
         
            -
                 * When this parameter is true, a TTY is allocated. This parameter maps to Tty in  
     | 
| 
      
 959 
     | 
    
         
            +
                 * When this parameter is true, a TTY is allocated. This parameter maps to Tty in tthe docker create-container command and the --tty option to docker run.
         
     | 
| 
       956 
960 
     | 
    
         
             
                 */
         
     | 
| 
       957 
961 
     | 
    
         
             
                pseudoTerminal?: BoxedBoolean;
         
     | 
| 
       958 
962 
     | 
    
         
             
                /**
         
     | 
| 
       959 
     | 
    
         
            -
                 * A key/value map of labels to add to the container. This parameter maps to Labels in the  
     | 
| 
      
 963 
     | 
    
         
            +
                 * A key/value map of labels to add to the container. This parameter maps to Labels in the docker create-container command and the --label option to docker run. This parameter requires version 1.18 of the Docker Remote API or greater on your container instance. To check the Docker Remote API version on your container instance, log in to your container instance and run the following command: sudo docker version --format '{{.Server.APIVersion}}' 
         
     | 
| 
       960 
964 
     | 
    
         
             
                 */
         
     | 
| 
       961 
965 
     | 
    
         
             
                dockerLabels?: DockerLabelsMap;
         
     | 
| 
       962 
966 
     | 
    
         
             
                /**
         
     | 
| 
       963 
     | 
    
         
            -
                 * A list of ulimits to set in the container. If a ulimit value is specified in a task definition, it overrides the default values set by Docker. This parameter maps to Ulimits in  
     | 
| 
      
 967 
     | 
    
         
            +
                 * A list of ulimits to set in the container. If a ulimit value is specified in a task definition, it overrides the default values set by Docker. This parameter maps to Ulimits in tthe docker create-container command and the --ulimit option to docker run. Valid naming values are displayed in the Ulimit data type. Amazon ECS tasks hosted on Fargate use the default resource limit values set by the operating system with the exception of the nofile resource limit parameter which Fargate overrides. The nofile resource limit sets a restriction on the number of open files that a container can use. The default nofile soft limit is  65535 and the default hard limit is 65535. This parameter requires version 1.18 of the Docker Remote API or greater on your container instance. To check the Docker Remote API version on your container instance, log in to your container instance and run the following command: sudo docker version --format '{{.Server.APIVersion}}'   This parameter is not supported for Windows containers. 
         
     | 
| 
       964 
968 
     | 
    
         
             
                 */
         
     | 
| 
       965 
969 
     | 
    
         
             
                ulimits?: UlimitList;
         
     | 
| 
       966 
970 
     | 
    
         
             
                /**
         
     | 
| 
       967 
     | 
    
         
            -
                 * The log configuration specification for the container. This parameter maps to LogConfig in the  
     | 
| 
      
 971 
     | 
    
         
            +
                 * The log configuration specification for the container. This parameter maps to LogConfig in the docker create-container command and the --log-driver option to docker run. By default, containers use the same logging driver that the Docker daemon uses. However the container can use a different logging driver than the Docker daemon by specifying a log driver with this parameter in the container definition. To use a different logging driver for a container, the log system must be configured properly on the container instance (or on a different log server for remote logging options).   Amazon ECS currently supports a subset of the logging drivers available to the Docker daemon (shown in the LogConfiguration data type). Additional log drivers may be available in future releases of the Amazon ECS container agent.  This parameter requires version 1.18 of the Docker Remote API or greater on your container instance. To check the Docker Remote API version on your container instance, log in to your container instance and run the following command: sudo docker version --format '{{.Server.APIVersion}}'   The Amazon ECS container agent running on a container instance must register the logging drivers available on that instance with the ECS_AVAILABLE_LOGGING_DRIVERS environment variable before containers placed on that instance can use these log configuration options. For more information, see Amazon ECS Container Agent Configuration in the Amazon Elastic Container Service Developer Guide. 
         
     | 
| 
       968 
972 
     | 
    
         
             
                 */
         
     | 
| 
       969 
973 
     | 
    
         
             
                logConfiguration?: LogConfiguration;
         
     | 
| 
       970 
974 
     | 
    
         
             
                /**
         
     | 
| 
       971 
     | 
    
         
            -
                 * The container health check command and associated configuration parameters for the container. This parameter maps to HealthCheck in the  
     | 
| 
      
 975 
     | 
    
         
            +
                 * The container health check command and associated configuration parameters for the container. This parameter maps to HealthCheck in the docker create-container command and the HEALTHCHECK parameter of docker run.
         
     | 
| 
       972 
976 
     | 
    
         
             
                 */
         
     | 
| 
       973 
977 
     | 
    
         
             
                healthCheck?: HealthCheck;
         
     | 
| 
       974 
978 
     | 
    
         
             
                /**
         
     | 
| 
       975 
     | 
    
         
            -
                 * A list of namespaced kernel parameters to set in the container. This parameter maps to Sysctls in  
     | 
| 
      
 979 
     | 
    
         
            +
                 * A list of namespaced kernel parameters to set in the container. This parameter maps to Sysctls in tthe docker create-container command and the --sysctl option to docker run. For example, you can configure net.ipv4.tcp_keepalive_time setting to maintain longer lived connections.
         
     | 
| 
       976 
980 
     | 
    
         
             
                 */
         
     | 
| 
       977 
981 
     | 
    
         
             
                systemControls?: SystemControls;
         
     | 
| 
       978 
982 
     | 
    
         
             
                /**
         
     | 
| 
         @@ -1123,6 +1127,20 @@ declare namespace ECS { 
     | 
|
| 
       1123 
1127 
     | 
    
         
             
                resourceRequirements?: ResourceRequirements;
         
     | 
| 
       1124 
1128 
     | 
    
         
             
              }
         
     | 
| 
       1125 
1129 
     | 
    
         
             
              export type ContainerOverrides = ContainerOverride[];
         
     | 
| 
      
 1130 
     | 
    
         
            +
              export interface ContainerRestartPolicy {
         
     | 
| 
      
 1131 
     | 
    
         
            +
                /**
         
     | 
| 
      
 1132 
     | 
    
         
            +
                 * Specifies whether a restart policy is enabled for the container.
         
     | 
| 
      
 1133 
     | 
    
         
            +
                 */
         
     | 
| 
      
 1134 
     | 
    
         
            +
                enabled: BoxedBoolean;
         
     | 
| 
      
 1135 
     | 
    
         
            +
                /**
         
     | 
| 
      
 1136 
     | 
    
         
            +
                 * A list of exit codes that Amazon ECS will ignore and not attempt a restart on. You can specify a maximum of 50 container exit codes. By default, Amazon ECS does not ignore any exit codes.
         
     | 
| 
      
 1137 
     | 
    
         
            +
                 */
         
     | 
| 
      
 1138 
     | 
    
         
            +
                ignoredExitCodes?: IntegerList;
         
     | 
| 
      
 1139 
     | 
    
         
            +
                /**
         
     | 
| 
      
 1140 
     | 
    
         
            +
                 * A period of time (in seconds) that the container must run for before a restart can be attempted. A container can be restarted only once every restartAttemptPeriod seconds. If a container isn't able to run for this time period and exits early, it will not be restarted. You can set a minimum restartAttemptPeriod of 60 seconds and a maximum restartAttemptPeriod of 1800 seconds. By default, a container must run for 300 seconds before it can be restarted.
         
     | 
| 
      
 1141 
     | 
    
         
            +
                 */
         
     | 
| 
      
 1142 
     | 
    
         
            +
                restartAttemptPeriod?: BoxedInteger;
         
     | 
| 
      
 1143 
     | 
    
         
            +
              }
         
     | 
| 
       1126 
1144 
     | 
    
         
             
              export interface ContainerStateChange {
         
     | 
| 
       1127 
1145 
     | 
    
         
             
                /**
         
     | 
| 
       1128 
1146 
     | 
    
         
             
                 * The name of the container.
         
     | 
| 
         @@ -1887,15 +1905,15 @@ declare namespace ECS { 
     | 
|
| 
       1887 
1905 
     | 
    
         
             
                 */
         
     | 
| 
       1888 
1906 
     | 
    
         
             
                autoprovision?: BoxedBoolean;
         
     | 
| 
       1889 
1907 
     | 
    
         
             
                /**
         
     | 
| 
       1890 
     | 
    
         
            -
                 * The Docker volume driver to use. The driver value must match the driver name provided by Docker because it is used for task placement. If the driver was installed using the Docker plugin CLI, use docker plugin ls to retrieve the driver name from your container instance. If the driver was installed using another method, use Docker plugin discovery to retrieve the driver name.  
     | 
| 
      
 1908 
     | 
    
         
            +
                 * The Docker volume driver to use. The driver value must match the driver name provided by Docker because it is used for task placement. If the driver was installed using the Docker plugin CLI, use docker plugin ls to retrieve the driver name from your container instance. If the driver was installed using another method, use Docker plugin discovery to retrieve the driver name. This parameter maps to Driver in the docker create-container command and the xxdriver option to docker volume create.
         
     | 
| 
       1891 
1909 
     | 
    
         
             
                 */
         
     | 
| 
       1892 
1910 
     | 
    
         
             
                driver?: String;
         
     | 
| 
       1893 
1911 
     | 
    
         
             
                /**
         
     | 
| 
       1894 
     | 
    
         
            -
                 * A map of Docker driver-specific options passed through. This parameter maps to DriverOpts in the  
     | 
| 
      
 1912 
     | 
    
         
            +
                 * A map of Docker driver-specific options passed through. This parameter maps to DriverOpts in the docker create-volume command and the xxopt option to docker volume create.
         
     | 
| 
       1895 
1913 
     | 
    
         
             
                 */
         
     | 
| 
       1896 
1914 
     | 
    
         
             
                driverOpts?: StringMap;
         
     | 
| 
       1897 
1915 
     | 
    
         
             
                /**
         
     | 
| 
       1898 
     | 
    
         
            -
                 * Custom metadata to add to your Docker volume. This parameter maps to Labels in the  
     | 
| 
      
 1916 
     | 
    
         
            +
                 * Custom metadata to add to your Docker volume. This parameter maps to Labels in the docker create-container command and the xxlabel option to docker volume create.
         
     | 
| 
       1899 
1917 
     | 
    
         
             
                 */
         
     | 
| 
       1900 
1918 
     | 
    
         
             
                labels?: StringMap;
         
     | 
| 
       1901 
1919 
     | 
    
         
             
              }
         
     | 
| 
         @@ -2133,7 +2151,7 @@ declare namespace ECS { 
     | 
|
| 
       2133 
2151 
     | 
    
         
             
              export type GpuIds = String[];
         
     | 
| 
       2134 
2152 
     | 
    
         
             
              export interface HealthCheck {
         
     | 
| 
       2135 
2153 
     | 
    
         
             
                /**
         
     | 
| 
       2136 
     | 
    
         
            -
                 * A string array representing the command that the container runs to determine if it is healthy. The string array must start with CMD to run the command arguments directly, or CMD-SHELL to run the command with the container's default shell.   When you use the Amazon Web Services Management Console JSON panel, the Command Line Interface, or the APIs, enclose the list of commands in double quotes and brackets.  [ "CMD-SHELL", "curl -f http://localhost/ || exit 1" ]  You don't include the double quotes and brackets when you use the Amazon Web Services Management Console.   CMD-SHELL, curl -f http://localhost/ || exit 1  An exit code of 0 indicates success, and non-zero exit code indicates failure. For more information, see HealthCheck in  
     | 
| 
      
 2154 
     | 
    
         
            +
                 * A string array representing the command that the container runs to determine if it is healthy. The string array must start with CMD to run the command arguments directly, or CMD-SHELL to run the command with the container's default shell.   When you use the Amazon Web Services Management Console JSON panel, the Command Line Interface, or the APIs, enclose the list of commands in double quotes and brackets.  [ "CMD-SHELL", "curl -f http://localhost/ || exit 1" ]  You don't include the double quotes and brackets when you use the Amazon Web Services Management Console.   CMD-SHELL, curl -f http://localhost/ || exit 1  An exit code of 0 indicates success, and non-zero exit code indicates failure. For more information, see HealthCheck in tthe docker create-container command
         
     | 
| 
       2137 
2155 
     | 
    
         
             
                 */
         
     | 
| 
       2138 
2156 
     | 
    
         
             
                command: StringList;
         
     | 
| 
       2139 
2157 
     | 
    
         
             
                /**
         
     | 
| 
         @@ -2216,14 +2234,15 @@ declare namespace ECS { 
     | 
|
| 
       2216 
2234 
     | 
    
         
             
              export type InstanceHealthCheckState = "OK"|"IMPAIRED"|"INSUFFICIENT_DATA"|"INITIALIZING"|string;
         
     | 
| 
       2217 
2235 
     | 
    
         
             
              export type InstanceHealthCheckType = "CONTAINER_RUNTIME"|string;
         
     | 
| 
       2218 
2236 
     | 
    
         
             
              export type Integer = number;
         
     | 
| 
      
 2237 
     | 
    
         
            +
              export type IntegerList = BoxedInteger[];
         
     | 
| 
       2219 
2238 
     | 
    
         
             
              export type IpcMode = "host"|"task"|"none"|string;
         
     | 
| 
       2220 
2239 
     | 
    
         
             
              export interface KernelCapabilities {
         
     | 
| 
       2221 
2240 
     | 
    
         
             
                /**
         
     | 
| 
       2222 
     | 
    
         
            -
                 * The Linux capabilities for the container that have been added to the default configuration provided by Docker. This parameter maps to CapAdd in the  
     | 
| 
      
 2241 
     | 
    
         
            +
                 * The Linux capabilities for the container that have been added to the default configuration provided by Docker. This parameter maps to CapAdd in the docker create-container command and the --cap-add option to docker run.  Tasks launched on Fargate only support adding the SYS_PTRACE kernel capability.  Valid values: "ALL" | "AUDIT_CONTROL" | "AUDIT_WRITE" | "BLOCK_SUSPEND" | "CHOWN" | "DAC_OVERRIDE" | "DAC_READ_SEARCH" | "FOWNER" | "FSETID" | "IPC_LOCK" | "IPC_OWNER" | "KILL" | "LEASE" | "LINUX_IMMUTABLE" | "MAC_ADMIN" | "MAC_OVERRIDE" | "MKNOD" | "NET_ADMIN" | "NET_BIND_SERVICE" | "NET_BROADCAST" | "NET_RAW" | "SETFCAP" | "SETGID" | "SETPCAP" | "SETUID" | "SYS_ADMIN" | "SYS_BOOT" | "SYS_CHROOT" | "SYS_MODULE" | "SYS_NICE" | "SYS_PACCT" | "SYS_PTRACE" | "SYS_RAWIO" | "SYS_RESOURCE" | "SYS_TIME" | "SYS_TTY_CONFIG" | "SYSLOG" | "WAKE_ALARM" 
         
     | 
| 
       2223 
2242 
     | 
    
         
             
                 */
         
     | 
| 
       2224 
2243 
     | 
    
         
             
                add?: StringList;
         
     | 
| 
       2225 
2244 
     | 
    
         
             
                /**
         
     | 
| 
       2226 
     | 
    
         
            -
                 * The Linux capabilities for the container that have been removed from the default configuration provided by Docker. This parameter maps to CapDrop in the  
     | 
| 
      
 2245 
     | 
    
         
            +
                 * The Linux capabilities for the container that have been removed from the default configuration provided by Docker. This parameter maps to CapDrop in the docker create-container command and the --cap-drop option to docker run. Valid values: "ALL" | "AUDIT_CONTROL" | "AUDIT_WRITE" | "BLOCK_SUSPEND" | "CHOWN" | "DAC_OVERRIDE" | "DAC_READ_SEARCH" | "FOWNER" | "FSETID" | "IPC_LOCK" | "IPC_OWNER" | "KILL" | "LEASE" | "LINUX_IMMUTABLE" | "MAC_ADMIN" | "MAC_OVERRIDE" | "MKNOD" | "NET_ADMIN" | "NET_BIND_SERVICE" | "NET_BROADCAST" | "NET_RAW" | "SETFCAP" | "SETGID" | "SETPCAP" | "SETUID" | "SYS_ADMIN" | "SYS_BOOT" | "SYS_CHROOT" | "SYS_MODULE" | "SYS_NICE" | "SYS_PACCT" | "SYS_PTRACE" | "SYS_RAWIO" | "SYS_RESOURCE" | "SYS_TIME" | "SYS_TTY_CONFIG" | "SYSLOG" | "WAKE_ALARM" 
         
     | 
| 
       2227 
2246 
     | 
    
         
             
                 */
         
     | 
| 
       2228 
2247 
     | 
    
         
             
                drop?: StringList;
         
     | 
| 
       2229 
2248 
     | 
    
         
             
              }
         
     | 
| 
         @@ -2244,7 +2263,7 @@ declare namespace ECS { 
     | 
|
| 
       2244 
2263 
     | 
    
         
             
                 */
         
     | 
| 
       2245 
2264 
     | 
    
         
             
                capabilities?: KernelCapabilities;
         
     | 
| 
       2246 
2265 
     | 
    
         
             
                /**
         
     | 
| 
       2247 
     | 
    
         
            -
                 * Any host devices to expose to the container. This parameter maps to Devices in  
     | 
| 
      
 2266 
     | 
    
         
            +
                 * Any host devices to expose to the container. This parameter maps to Devices in tthe docker create-container command and the --device option to docker run.  If you're using tasks that use the Fargate launch type, the devices parameter isn't supported. 
         
     | 
| 
       2248 
2267 
     | 
    
         
             
                 */
         
     | 
| 
       2249 
2268 
     | 
    
         
             
                devices?: DevicesList;
         
     | 
| 
       2250 
2269 
     | 
    
         
             
                /**
         
     | 
| 
         @@ -2589,7 +2608,7 @@ declare namespace ECS { 
     | 
|
| 
       2589 
2608 
     | 
    
         
             
              export type LoadBalancers = LoadBalancer[];
         
     | 
| 
       2590 
2609 
     | 
    
         
             
              export interface LogConfiguration {
         
     | 
| 
       2591 
2610 
     | 
    
         
             
                /**
         
     | 
| 
       2592 
     | 
    
         
            -
                 * The log driver to use for the container. For tasks on Fargate, the supported log drivers are awslogs, splunk, and awsfirelens. For tasks hosted on Amazon EC2 instances, the supported log drivers are awslogs, fluentd, gelf, json-file, journald,  
     | 
| 
      
 2611 
     | 
    
         
            +
                 * The log driver to use for the container. For tasks on Fargate, the supported log drivers are awslogs, splunk, and awsfirelens. For tasks hosted on Amazon EC2 instances, the supported log drivers are awslogs, fluentd, gelf, json-file, journald, syslog, splunk, and awsfirelens. For more information about using the awslogs log driver, see Send Amazon ECS logs to CloudWatch in the Amazon Elastic Container Service Developer Guide. For more information about using the awsfirelens log driver, see Send Amazon ECS logs to an Amazon Web Services service or Amazon Web Services Partner.  If you have a custom driver that isn't listed, you can fork the Amazon ECS container agent project that's available on GitHub and customize it to work with that driver. We encourage you to submit pull requests for changes that you would like to have included. However, we don't currently provide support for running modified copies of this software. 
         
     | 
| 
       2593 
2612 
     | 
    
         
             
                 */
         
     | 
| 
       2594 
2613 
     | 
    
         
             
                logDriver: LogDriver;
         
     | 
| 
       2595 
2614 
     | 
    
         
             
                /**
         
     | 
| 
         @@ -2969,11 +2988,11 @@ declare namespace ECS { 
     | 
|
| 
       2969 
2988 
     | 
    
         
             
                 */
         
     | 
| 
       2970 
2989 
     | 
    
         
             
                taskRoleArn?: String;
         
     | 
| 
       2971 
2990 
     | 
    
         
             
                /**
         
     | 
| 
       2972 
     | 
    
         
            -
                 * The Amazon Resource Name (ARN) of the task execution role that grants the Amazon ECS container agent permission to make Amazon Web Services API calls on your behalf.  
     | 
| 
      
 2991 
     | 
    
         
            +
                 * The Amazon Resource Name (ARN) of the task execution role that grants the Amazon ECS container agent permission to make Amazon Web Services API calls on your behalf. For informationabout the required IAM roles for Amazon ECS, see IAM roles for Amazon ECS in the Amazon Elastic Container Service Developer Guide.
         
     | 
| 
       2973 
2992 
     | 
    
         
             
                 */
         
     | 
| 
       2974 
2993 
     | 
    
         
             
                executionRoleArn?: String;
         
     | 
| 
       2975 
2994 
     | 
    
         
             
                /**
         
     | 
| 
       2976 
     | 
    
         
            -
                 * The Docker networking mode to use for the containers in the task. The valid values are none, bridge, awsvpc, and host. If no network mode is specified, the default is bridge. For Amazon ECS tasks on Fargate, the awsvpc network mode is required. For Amazon ECS tasks on Amazon EC2 Linux instances, any network mode can be used. For Amazon ECS tasks on Amazon EC2 Windows instances, <default> or awsvpc can be used. If the network mode is set to none, you cannot specify port mappings in your container definitions, and the tasks containers do not have external connectivity. The host and awsvpc network modes offer the highest networking performance for containers because they use the EC2 network stack instead of the virtualized network stack provided by the bridge mode. With the host and awsvpc network modes, exposed container ports are mapped directly to the corresponding host port (for the host network mode) or the attached elastic network interface port (for the awsvpc network mode), so you cannot take advantage of dynamic host port mappings.   When using the host network mode, you should not run containers using the root user (UID 0). It is considered best practice to use a non-root user.  If the network mode is awsvpc, the task is allocated an elastic network interface, and you must specify a NetworkConfiguration value when you create a service or run a task with the task definition. For more information, see Task Networking in the Amazon Elastic Container Service Developer Guide. If the network mode is host, you cannot run multiple instantiations of the same task on a single container instance when port mappings are used. 
     | 
| 
      
 2995 
     | 
    
         
            +
                 * The Docker networking mode to use for the containers in the task. The valid values are none, bridge, awsvpc, and host. If no network mode is specified, the default is bridge. For Amazon ECS tasks on Fargate, the awsvpc network mode is required. For Amazon ECS tasks on Amazon EC2 Linux instances, any network mode can be used. For Amazon ECS tasks on Amazon EC2 Windows instances, <default> or awsvpc can be used. If the network mode is set to none, you cannot specify port mappings in your container definitions, and the tasks containers do not have external connectivity. The host and awsvpc network modes offer the highest networking performance for containers because they use the EC2 network stack instead of the virtualized network stack provided by the bridge mode. With the host and awsvpc network modes, exposed container ports are mapped directly to the corresponding host port (for the host network mode) or the attached elastic network interface port (for the awsvpc network mode), so you cannot take advantage of dynamic host port mappings.   When using the host network mode, you should not run containers using the root user (UID 0). It is considered best practice to use a non-root user.  If the network mode is awsvpc, the task is allocated an elastic network interface, and you must specify a NetworkConfiguration value when you create a service or run a task with the task definition. For more information, see Task Networking in the Amazon Elastic Container Service Developer Guide. If the network mode is host, you cannot run multiple instantiations of the same task on a single container instance when port mappings are used.
         
     | 
| 
       2977 
2996 
     | 
    
         
             
                 */
         
     | 
| 
       2978 
2997 
     | 
    
         
             
                networkMode?: NetworkMode;
         
     | 
| 
       2979 
2998 
     | 
    
         
             
                /**
         
     | 
| 
         @@ -3005,11 +3024,11 @@ declare namespace ECS { 
     | 
|
| 
       3005 
3024 
     | 
    
         
             
                 */
         
     | 
| 
       3006 
3025 
     | 
    
         
             
                tags?: Tags;
         
     | 
| 
       3007 
3026 
     | 
    
         
             
                /**
         
     | 
| 
       3008 
     | 
    
         
            -
                 * The process namespace to use for the containers in the task. The valid values are host or task. On Fargate for Linux containers, the only valid value is task. For example, monitoring sidecars might need pidMode to access information about other containers running in the same task. If host is specified, all containers within the tasks that specified the host PID mode on the same container instance share the same process namespace with the host Amazon EC2 instance. If task is specified, all containers within the specified task share the same process namespace. If no value is specified, the default is a private namespace for each container.  
     | 
| 
      
 3027 
     | 
    
         
            +
                 * The process namespace to use for the containers in the task. The valid values are host or task. On Fargate for Linux containers, the only valid value is task. For example, monitoring sidecars might need pidMode to access information about other containers running in the same task. If host is specified, all containers within the tasks that specified the host PID mode on the same container instance share the same process namespace with the host Amazon EC2 instance. If task is specified, all containers within the specified task share the same process namespace. If no value is specified, the default is a private namespace for each container. If the host PID mode is used, there's a heightened risk of undesired process namespace exposure.  This parameter is not supported for Windows containers.   This parameter is only supported for tasks that are hosted on Fargate if the tasks are using platform version 1.4.0 or later (Linux). This isn't supported for Windows containers on Fargate. 
         
     | 
| 
       3009 
3028 
     | 
    
         
             
                 */
         
     | 
| 
       3010 
3029 
     | 
    
         
             
                pidMode?: PidMode;
         
     | 
| 
       3011 
3030 
     | 
    
         
             
                /**
         
     | 
| 
       3012 
     | 
    
         
            -
                 * The IPC resource namespace to use for the containers in the task. The valid values are host, task, or none. If host is specified, then all containers within the tasks that specified the host IPC mode on the same container instance share the same IPC resources with the host Amazon EC2 instance. If task is specified, all containers within the specified task share the same IPC resources. If none is specified, then IPC resources within the containers of a task are private and not shared with other containers in a task or on the container instance. If no value is specified, then the IPC resource namespace sharing depends on the Docker daemon setting on the container instance.  
     | 
| 
      
 3031 
     | 
    
         
            +
                 * The IPC resource namespace to use for the containers in the task. The valid values are host, task, or none. If host is specified, then all containers within the tasks that specified the host IPC mode on the same container instance share the same IPC resources with the host Amazon EC2 instance. If task is specified, all containers within the specified task share the same IPC resources. If none is specified, then IPC resources within the containers of a task are private and not shared with other containers in a task or on the container instance. If no value is specified, then the IPC resource namespace sharing depends on the Docker daemon setting on the container instance. If the host IPC mode is used, be aware that there is a heightened risk of undesired IPC namespace expose. If you are setting namespaced kernel parameters using systemControls for the containers in the task, the following will apply to your IPC resource namespace. For more information, see System Controls in the Amazon Elastic Container Service Developer Guide.   For tasks that use the host IPC mode, IPC namespace related systemControls are not supported.   For tasks that use the task IPC mode, IPC namespace related systemControls will apply to all containers within a task.    This parameter is not supported for Windows containers or tasks run on Fargate. 
         
     | 
| 
       3013 
3032 
     | 
    
         
             
                 */
         
     | 
| 
       3014 
3033 
     | 
    
         
             
                ipcMode?: IpcMode;
         
     | 
| 
       3015 
3034 
     | 
    
         
             
                /**
         
     | 
| 
         @@ -3143,7 +3162,7 @@ declare namespace ECS { 
     | 
|
| 
       3143 
3162 
     | 
    
         
             
                 */
         
     | 
| 
       3144 
3163 
     | 
    
         
             
                referenceId?: String;
         
     | 
| 
       3145 
3164 
     | 
    
         
             
                /**
         
     | 
| 
       3146 
     | 
    
         
            -
                 * An optional tag specified when a task is started. For example, if you automatically trigger a task to run a batch process job, you could apply a unique identifier for that job to your task with the startedBy parameter. You can then identify which tasks belong to that job by filtering the results of a ListTasks call with the startedBy value. Up to 128 letters (uppercase and lowercase), numbers, hyphens (-), and underscores (_) are allowed. If a task is started by an Amazon ECS service, then the startedBy parameter contains the deployment ID of the service that starts it.
         
     | 
| 
      
 3165 
     | 
    
         
            +
                 * An optional tag specified when a task is started. For example, if you automatically trigger a task to run a batch process job, you could apply a unique identifier for that job to your task with the startedBy parameter. You can then identify which tasks belong to that job by filtering the results of a ListTasks call with the startedBy value. Up to 128 letters (uppercase and lowercase), numbers, hyphens (-), forward slash (/), and underscores (_) are allowed. If a task is started by an Amazon ECS service, then the startedBy parameter contains the deployment ID of the service that starts it.
         
     | 
| 
       3147 
3166 
     | 
    
         
             
                 */
         
     | 
| 
       3148 
3167 
     | 
    
         
             
                startedBy?: String;
         
     | 
| 
       3149 
3168 
     | 
    
         
             
                /**
         
     | 
| 
         @@ -3165,7 +3184,7 @@ declare namespace ECS { 
     | 
|
| 
       3165 
3184 
     | 
    
         
             
              }
         
     | 
| 
       3166 
3185 
     | 
    
         
             
              export interface RunTaskResponse {
         
     | 
| 
       3167 
3186 
     | 
    
         
             
                /**
         
     | 
| 
       3168 
     | 
    
         
            -
                 * A full description of the tasks that were run. The tasks that were successfully placed on your cluster are described here. 
     | 
| 
      
 3187 
     | 
    
         
            +
                 * A full description of the tasks that were run. The tasks that were successfully placed on your cluster are described here.
         
     | 
| 
       3169 
3188 
     | 
    
         
             
                 */
         
     | 
| 
       3170 
3189 
     | 
    
         
             
                tasks?: Tasks;
         
     | 
| 
       3171 
3190 
     | 
    
         
             
                /**
         
     | 
| 
         @@ -3583,7 +3602,7 @@ declare namespace ECS { 
     | 
|
| 
       3583 
3602 
     | 
    
         
             
                 */
         
     | 
| 
       3584 
3603 
     | 
    
         
             
                referenceId?: String;
         
     | 
| 
       3585 
3604 
     | 
    
         
             
                /**
         
     | 
| 
       3586 
     | 
    
         
            -
                 * An optional tag specified when a task is started. For example, if you automatically trigger a task to run a batch process job, you could apply a unique identifier for that job to your task with the startedBy parameter. You can then identify which tasks belong to that job by filtering the results of a ListTasks call with the startedBy value. Up to 36 letters (uppercase and lowercase), numbers, hyphens (-), and underscores (_) are allowed. If a task is started by an Amazon ECS service, the startedBy parameter contains the deployment ID of the service that starts it.
         
     | 
| 
      
 3605 
     | 
    
         
            +
                 * An optional tag specified when a task is started. For example, if you automatically trigger a task to run a batch process job, you could apply a unique identifier for that job to your task with the startedBy parameter. You can then identify which tasks belong to that job by filtering the results of a ListTasks call with the startedBy value. Up to 36 letters (uppercase and lowercase), numbers, hyphens (-), forward slash (/), and underscores (_) are allowed. If a task is started by an Amazon ECS service, the startedBy parameter contains the deployment ID of the service that starts it.
         
     | 
| 
       3587 
3606 
     | 
    
         
             
                 */
         
     | 
| 
       3588 
3607 
     | 
    
         
             
                startedBy?: String;
         
     | 
| 
       3589 
3608 
     | 
    
         
             
                /**
         
     | 
| 
         @@ -3939,15 +3958,15 @@ declare namespace ECS { 
     | 
|
| 
       3939 
3958 
     | 
    
         
             
                 */
         
     | 
| 
       3940 
3959 
     | 
    
         
             
                family?: String;
         
     | 
| 
       3941 
3960 
     | 
    
         
             
                /**
         
     | 
| 
       3942 
     | 
    
         
            -
                 * The short name or full Amazon Resource Name (ARN) of the Identity and Access Management role that grants containers in the task permission to call Amazon Web Services APIs on your behalf. For  
     | 
| 
      
 3961 
     | 
    
         
            +
                 * The short name or full Amazon Resource Name (ARN) of the Identity and Access Management role that grants containers in the task permission to call Amazon Web Services APIs on your behalf. For informationabout the required IAM roles for Amazon ECS, see IAM roles for Amazon ECS in the Amazon Elastic Container Service Developer Guide.
         
     | 
| 
       3943 
3962 
     | 
    
         
             
                 */
         
     | 
| 
       3944 
3963 
     | 
    
         
             
                taskRoleArn?: String;
         
     | 
| 
       3945 
3964 
     | 
    
         
             
                /**
         
     | 
| 
       3946 
     | 
    
         
            -
                 * The Amazon Resource Name (ARN) of the task execution role that grants the Amazon ECS container agent permission to make Amazon Web Services API calls on your behalf.  
     | 
| 
      
 3965 
     | 
    
         
            +
                 * The Amazon Resource Name (ARN) of the task execution role that grants the Amazon ECS container agent permission to make Amazon Web Services API calls on your behalf. For informationabout the required IAM roles for Amazon ECS, see IAM roles for Amazon ECS in the Amazon Elastic Container Service Developer Guide.
         
     | 
| 
       3947 
3966 
     | 
    
         
             
                 */
         
     | 
| 
       3948 
3967 
     | 
    
         
             
                executionRoleArn?: String;
         
     | 
| 
       3949 
3968 
     | 
    
         
             
                /**
         
     | 
| 
       3950 
     | 
    
         
            -
                 * The Docker networking mode to use for the containers in the task. The valid values are none, bridge, awsvpc, and host. If no network mode is specified, the default is bridge. For Amazon ECS tasks on Fargate, the awsvpc network mode is required. For Amazon ECS tasks on Amazon EC2 Linux instances, any network mode can be used. For Amazon ECS tasks on Amazon EC2 Windows instances, <default> or awsvpc can be used. If the network mode is set to none, you cannot specify port mappings in your container definitions, and the tasks containers do not have external connectivity. The host and awsvpc network modes offer the highest networking performance for containers because they use the EC2 network stack instead of the virtualized network stack provided by the bridge mode. With the host and awsvpc network modes, exposed container ports are mapped directly to the corresponding host port (for the host network mode) or the attached elastic network interface port (for the awsvpc network mode), so you cannot take advantage of dynamic host port mappings.   When using the host network mode, you should not run containers using the root user (UID 0). It is considered best practice to use a non-root user.  If the network mode is awsvpc, the task is allocated an elastic network interface, and you must specify a NetworkConfiguration value when you create a service or run a task with the task definition. For more information, see Task Networking in the Amazon Elastic Container Service Developer Guide. If the network mode is host, you cannot run multiple instantiations of the same task on a single container instance when port mappings are used. 
     | 
| 
      
 3969 
     | 
    
         
            +
                 * The Docker networking mode to use for the containers in the task. The valid values are none, bridge, awsvpc, and host. If no network mode is specified, the default is bridge. For Amazon ECS tasks on Fargate, the awsvpc network mode is required. For Amazon ECS tasks on Amazon EC2 Linux instances, any network mode can be used. For Amazon ECS tasks on Amazon EC2 Windows instances, <default> or awsvpc can be used. If the network mode is set to none, you cannot specify port mappings in your container definitions, and the tasks containers do not have external connectivity. The host and awsvpc network modes offer the highest networking performance for containers because they use the EC2 network stack instead of the virtualized network stack provided by the bridge mode. With the host and awsvpc network modes, exposed container ports are mapped directly to the corresponding host port (for the host network mode) or the attached elastic network interface port (for the awsvpc network mode), so you cannot take advantage of dynamic host port mappings.   When using the host network mode, you should not run containers using the root user (UID 0). It is considered best practice to use a non-root user.  If the network mode is awsvpc, the task is allocated an elastic network interface, and you must specify a NetworkConfiguration value when you create a service or run a task with the task definition. For more information, see Task Networking in the Amazon Elastic Container Service Developer Guide. If the network mode is host, you cannot run multiple instantiations of the same task on a single container instance when port mappings are used.
         
     | 
| 
       3951 
3970 
     | 
    
         
             
                 */
         
     | 
| 
       3952 
3971 
     | 
    
         
             
                networkMode?: NetworkMode;
         
     | 
| 
       3953 
3972 
     | 
    
         
             
                /**
         
     | 
| 
         @@ -3983,7 +4002,7 @@ declare namespace ECS { 
     | 
|
| 
       3983 
4002 
     | 
    
         
             
                 */
         
     | 
| 
       3984 
4003 
     | 
    
         
             
                requiresCompatibilities?: CompatibilityList;
         
     | 
| 
       3985 
4004 
     | 
    
         
             
                /**
         
     | 
| 
       3986 
     | 
    
         
            -
                 * The number of cpu units used by the task. If you use the EC2 launch type, this field is optional. Any value can be used. If you use the Fargate launch type, this field is required. You must use one of the following values. The value that you choose determines your range of valid values for the memory parameter. The CPU units cannot be less than 1 vCPU when you use Windows containers on Fargate.   256 (.25 vCPU) - Available memory values: 512 (0.5 GB), 1024 (1 GB), 2048 (2 GB)   512 (.5 vCPU) - Available memory values: 1024 (1 GB), 2048 (2 GB), 3072 (3 GB), 4096 (4 GB)   1024 (1 vCPU) - Available memory values: 2048 (2 GB), 3072 (3 GB), 4096 (4 GB), 5120 (5 GB), 6144 (6 GB), 7168 (7 GB), 8192 (8 GB)   2048 (2 vCPU) - Available memory values: 4096 (4 GB) and 16384 (16 GB) in increments of 1024 (1 GB)   4096 (4 vCPU) - Available memory values: 8192 (8 GB) and 30720 (30 GB) in increments of 1024 (1 GB)   8192 (8 vCPU) - Available memory values: 16 GB and 60 GB in 4 GB increments This option requires Linux platform 1.4.0 or later.   16384 (16vCPU) - Available memory values: 32GB and 120 GB in 8 GB increments This option requires Linux platform 1.4.0 or later.  
         
     | 
| 
      
 4005 
     | 
    
         
            +
                 * The number of cpu units used by the task. If you use the EC2 launch type, this field is optional. Any value can be used. If you use the Fargate launch type, this field is required. You must use one of the following values. The value that you choose determines your range of valid values for the memory parameter. If you use the EC2 launch type, this field is optional. Supported values are between 128 CPU units (0.125 vCPUs) and 10240 CPU units (10 vCPUs). The CPU units cannot be less than 1 vCPU when you use Windows containers on Fargate.   256 (.25 vCPU) - Available memory values: 512 (0.5 GB), 1024 (1 GB), 2048 (2 GB)   512 (.5 vCPU) - Available memory values: 1024 (1 GB), 2048 (2 GB), 3072 (3 GB), 4096 (4 GB)   1024 (1 vCPU) - Available memory values: 2048 (2 GB), 3072 (3 GB), 4096 (4 GB), 5120 (5 GB), 6144 (6 GB), 7168 (7 GB), 8192 (8 GB)   2048 (2 vCPU) - Available memory values: 4096 (4 GB) and 16384 (16 GB) in increments of 1024 (1 GB)   4096 (4 vCPU) - Available memory values: 8192 (8 GB) and 30720 (30 GB) in increments of 1024 (1 GB)   8192 (8 vCPU) - Available memory values: 16 GB and 60 GB in 4 GB increments This option requires Linux platform 1.4.0 or later.   16384 (16vCPU) - Available memory values: 32GB and 120 GB in 8 GB increments This option requires Linux platform 1.4.0 or later.  
         
     | 
| 
       3987 
4006 
     | 
    
         
             
                 */
         
     | 
| 
       3988 
4007 
     | 
    
         
             
                cpu?: String;
         
     | 
| 
       3989 
4008 
     | 
    
         
             
                /**
         
     | 
| 
         @@ -3995,11 +4014,11 @@ declare namespace ECS { 
     | 
|
| 
       3995 
4014 
     | 
    
         
             
                 */
         
     | 
| 
       3996 
4015 
     | 
    
         
             
                inferenceAccelerators?: InferenceAccelerators;
         
     | 
| 
       3997 
4016 
     | 
    
         
             
                /**
         
     | 
| 
       3998 
     | 
    
         
            -
                 * The process namespace to use for the containers in the task. The valid values are host or task. On Fargate for Linux containers, the only valid value is task. For example, monitoring sidecars might need pidMode to access information about other containers running in the same task. If host is specified, all containers within the tasks that specified the host PID mode on the same container instance share the same process namespace with the host Amazon EC2 instance. If task is specified, all containers within the specified task share the same process namespace. If no value is specified, the default is a private namespace for each container.  
     | 
| 
      
 4017 
     | 
    
         
            +
                 * The process namespace to use for the containers in the task. The valid values are host or task. On Fargate for Linux containers, the only valid value is task. For example, monitoring sidecars might need pidMode to access information about other containers running in the same task. If host is specified, all containers within the tasks that specified the host PID mode on the same container instance share the same process namespace with the host Amazon EC2 instance. If task is specified, all containers within the specified task share the same process namespace. If no value is specified, the default is a private namespace for each container. If the host PID mode is used, there's a heightened risk of undesired process namespace exposure.  This parameter is not supported for Windows containers.   This parameter is only supported for tasks that are hosted on Fargate if the tasks are using platform version 1.4.0 or later (Linux). This isn't supported for Windows containers on Fargate. 
         
     | 
| 
       3999 
4018 
     | 
    
         
             
                 */
         
     | 
| 
       4000 
4019 
     | 
    
         
             
                pidMode?: PidMode;
         
     | 
| 
       4001 
4020 
     | 
    
         
             
                /**
         
     | 
| 
       4002 
     | 
    
         
            -
                 * The IPC resource namespace to use for the containers in the task. The valid values are host, task, or none. If host is specified, then all containers within the tasks that specified the host IPC mode on the same container instance share the same IPC resources with the host Amazon EC2 instance. If task is specified, all containers within the specified task share the same IPC resources. If none is specified, then IPC resources within the containers of a task are private and not shared with other containers in a task or on the container instance. If no value is specified, then the IPC resource namespace sharing depends on the Docker daemon setting on the container instance.  
     | 
| 
      
 4021 
     | 
    
         
            +
                 * The IPC resource namespace to use for the containers in the task. The valid values are host, task, or none. If host is specified, then all containers within the tasks that specified the host IPC mode on the same container instance share the same IPC resources with the host Amazon EC2 instance. If task is specified, all containers within the specified task share the same IPC resources. If none is specified, then IPC resources within the containers of a task are private and not shared with other containers in a task or on the container instance. If no value is specified, then the IPC resource namespace sharing depends on the Docker daemon setting on the container instance. If the host IPC mode is used, be aware that there is a heightened risk of undesired IPC namespace expose. If you are setting namespaced kernel parameters using systemControls for the containers in the task, the following will apply to your IPC resource namespace. For more information, see System Controls in the Amazon Elastic Container Service Developer Guide.   For tasks that use the host IPC mode, IPC namespace related systemControls are not supported.   For tasks that use the task IPC mode, IPC namespace related systemControls will apply to all containers within a task.    This parameter is not supported for Windows containers or tasks run on Fargate. 
         
     | 
| 
       4003 
4022 
     | 
    
         
             
                 */
         
     | 
| 
       4004 
4023 
     | 
    
         
             
                ipcMode?: IpcMode;
         
     | 
| 
       4005 
4024 
     | 
    
         
             
                /**
         
     | 
| 
         @@ -596,6 +596,23 @@ declare namespace Fis { 
     | 
|
| 
       596 
596 
     | 
    
         
             
                logGroupArn?: CloudWatchLogGroupArn;
         
     | 
| 
       597 
597 
     | 
    
         
             
              }
         
     | 
| 
       598 
598 
     | 
    
         
             
              export type ExperimentEndTime = Date;
         
     | 
| 
      
 599 
     | 
    
         
            +
              export interface ExperimentError {
         
     | 
| 
      
 600 
     | 
    
         
            +
                /**
         
     | 
| 
      
 601 
     | 
    
         
            +
                 * The Amazon Web Services Account ID where the experiment failure occurred.
         
     | 
| 
      
 602 
     | 
    
         
            +
                 */
         
     | 
| 
      
 603 
     | 
    
         
            +
                accountId?: ExperimentErrorAccountId;
         
     | 
| 
      
 604 
     | 
    
         
            +
                /**
         
     | 
| 
      
 605 
     | 
    
         
            +
                 * The error code for the failed experiment.
         
     | 
| 
      
 606 
     | 
    
         
            +
                 */
         
     | 
| 
      
 607 
     | 
    
         
            +
                code?: ExperimentErrorCode;
         
     | 
| 
      
 608 
     | 
    
         
            +
                /**
         
     | 
| 
      
 609 
     | 
    
         
            +
                 * Context for the section of the experiment template that failed.
         
     | 
| 
      
 610 
     | 
    
         
            +
                 */
         
     | 
| 
      
 611 
     | 
    
         
            +
                location?: ExperimentErrorLocation;
         
     | 
| 
      
 612 
     | 
    
         
            +
              }
         
     | 
| 
      
 613 
     | 
    
         
            +
              export type ExperimentErrorAccountId = string;
         
     | 
| 
      
 614 
     | 
    
         
            +
              export type ExperimentErrorCode = string;
         
     | 
| 
      
 615 
     | 
    
         
            +
              export type ExperimentErrorLocation = string;
         
     | 
| 
       599 
616 
     | 
    
         
             
              export type ExperimentId = string;
         
     | 
| 
       600 
617 
     | 
    
         
             
              export interface ExperimentLogConfiguration {
         
     | 
| 
       601 
618 
     | 
    
         
             
                /**
         
     | 
| 
         @@ -645,6 +662,10 @@ declare namespace Fis { 
     | 
|
| 
       645 
662 
     | 
    
         
             
                 * The reason for the state.
         
     | 
| 
       646 
663 
     | 
    
         
             
                 */
         
     | 
| 
       647 
664 
     | 
    
         
             
                reason?: ExperimentStatusReason;
         
     | 
| 
      
 665 
     | 
    
         
            +
                /**
         
     | 
| 
      
 666 
     | 
    
         
            +
                 * The error information of the experiment when the action has failed.
         
     | 
| 
      
 667 
     | 
    
         
            +
                 */
         
     | 
| 
      
 668 
     | 
    
         
            +
                error?: ExperimentError;
         
     | 
| 
       648 
669 
     | 
    
         
             
              }
         
     | 
| 
       649 
670 
     | 
    
         
             
              export type ExperimentStatus = "pending"|"initiating"|"running"|"completed"|"stopping"|"stopped"|"failed"|string;
         
     | 
| 
       650 
671 
     | 
    
         
             
              export type ExperimentStatusReason = string;
         
     | 
| 
         @@ -8485,6 +8485,10 @@ declare namespace Glue { 
     | 
|
| 
       8485 
8485 
     | 
    
         
             
                 * Specifies whether to include status details related to a request to create or update an Glue Data Catalog view.
         
     | 
| 
       8486 
8486 
     | 
    
         
             
                 */
         
     | 
| 
       8487 
8487 
     | 
    
         
             
                IncludeStatusDetails?: BooleanNullable;
         
     | 
| 
      
 8488 
     | 
    
         
            +
                /**
         
     | 
| 
      
 8489 
     | 
    
         
            +
                 *  Specifies the table fields returned by the GetTables call. This parameter doesn’t accept an empty list. The request must include NAME. The following are the valid combinations of values:    NAME - Names of all tables in the database.    NAME, TABLE_TYPE - Names of all tables and the table types.  
         
     | 
| 
      
 8490 
     | 
    
         
            +
                 */
         
     | 
| 
      
 8491 
     | 
    
         
            +
                AttributesToGet?: TableAttributesList;
         
     | 
| 
       8488 
8492 
     | 
    
         
             
              }
         
     | 
| 
       8489 
8493 
     | 
    
         
             
              export interface GetTablesResponse {
         
     | 
| 
       8490 
8494 
     | 
    
         
             
                /**
         
     | 
| 
         @@ -13870,6 +13874,8 @@ declare namespace Glue { 
     | 
|
| 
       13870 
13874 
     | 
    
         
             
                IsMultiDialectView?: NullableBoolean;
         
     | 
| 
       13871 
13875 
     | 
    
         
             
                Status?: TableStatus;
         
     | 
| 
       13872 
13876 
     | 
    
         
             
              }
         
     | 
| 
      
 13877 
     | 
    
         
            +
              export type TableAttributes = "NAME"|"TABLE_TYPE"|string;
         
     | 
| 
      
 13878 
     | 
    
         
            +
              export type TableAttributesList = TableAttributes[];
         
     | 
| 
       13873 
13879 
     | 
    
         
             
              export interface TableError {
         
     | 
| 
       13874 
13880 
     | 
    
         
             
                /**
         
     | 
| 
       13875 
13881 
     | 
    
         
             
                 * The name of the table. For Hive compatibility, this must be entirely lowercase.
         
     |