@propulsionworks/cloudformation 0.1.10 → 0.1.12
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/out/exports/resources.generated/aws-amazonmq-broker.d.ts +0 -1
- package/out/exports/resources.generated/aws-amplify-app.d.ts +2 -2
- package/out/exports/resources.generated/aws-apigateway-domainname.d.ts +7 -1
- package/out/exports/resources.generated/aws-apigateway-domainnamev2.d.ts +6 -0
- package/out/exports/resources.generated/aws-apigateway-method.d.ts +1 -1
- package/out/exports/resources.generated/aws-apigatewayv2-domainname.d.ts +6 -0
- package/out/exports/resources.generated/aws-apigatewayv2-routingrule.d.ts +134 -0
- package/out/exports/resources.generated/aws-appsync-apicache.d.ts +4 -0
- package/out/exports/resources.generated/aws-athena-workgroup.d.ts +37 -0
- package/out/exports/resources.generated/aws-autoscaling-autoscalinggroup.d.ts +7 -6
- package/out/exports/resources.generated/aws-autoscaling-launchconfiguration.d.ts +8 -8
- package/out/exports/resources.generated/aws-bedrock-flow.d.ts +243 -1
- package/out/exports/resources.generated/aws-cloudtrail-eventdatastore.d.ts +26 -0
- package/out/exports/resources.generated/aws-cloudwatch-insightrule.d.ts +1 -0
- package/out/exports/resources.generated/aws-connect-emailaddress.d.ts +1 -1
- package/out/exports/resources.generated/aws-connect-queue.d.ts +1 -1
- package/out/exports/resources.generated/aws-customerprofiles-calculatedattributedefinition.d.ts +50 -1
- package/out/exports/resources.generated/aws-customerprofiles-objecttype.d.ts +13 -1
- package/out/exports/resources.generated/aws-customerprofiles-segmentdefinition.d.ts +4 -4
- package/out/exports/resources.generated/aws-datasync-locationazureblob.d.ts +25 -13
- package/out/exports/resources.generated/aws-datasync-locationobjectstorage.d.ts +26 -10
- package/out/exports/resources.generated/aws-datasync-locationsmb.d.ts +5 -19
- package/out/exports/resources.generated/aws-datasync-task.d.ts +11 -20
- package/out/exports/resources.generated/aws-datazone-projectprofile.d.ts +9 -0
- package/out/exports/resources.generated/aws-deadline-fleet.d.ts +6 -0
- package/out/exports/resources.generated/aws-dsql-cluster.d.ts +29 -10
- package/out/exports/resources.generated/aws-ec2-ec2fleet.d.ts +113 -0
- package/out/exports/resources.generated/aws-ec2-egressonlyinternetgateway.d.ts +6 -1
- package/out/exports/resources.generated/aws-ec2-trafficmirrorfilter.d.ts +0 -1
- package/out/exports/resources.generated/aws-ecs-taskdefinition.d.ts +1 -1
- package/out/exports/resources.generated/aws-efs-mounttarget.d.ts +15 -3
- package/out/exports/resources.generated/aws-eks-addon.d.ts +3 -3
- package/out/exports/resources.generated/aws-eks-cluster.d.ts +14 -12
- package/out/exports/resources.generated/aws-eks-podidentityassociation.d.ts +24 -2
- package/out/exports/resources.generated/aws-elasticloadbalancingv2-targetgroup.d.ts +1 -1
- package/out/exports/resources.generated/aws-emr-cluster.d.ts +2 -0
- package/out/exports/resources.generated/aws-entityresolution-matchingworkflow.d.ts +15 -5
- package/out/exports/resources.generated/aws-evs-environment.d.ts +251 -0
- package/out/exports/resources.generated/aws-fis-experimenttemplate.d.ts +1 -1
- package/out/exports/resources.generated/aws-fsx-filesystem.d.ts +4 -4
- package/out/exports/resources.generated/aws-kms-key.d.ts +1 -1
- package/out/exports/resources.generated/aws-lambda-eventinvokeconfig.d.ts +4 -2
- package/out/exports/resources.generated/aws-lambda-eventsourcemapping.d.ts +67 -3
- package/out/exports/resources.generated/aws-lightsail-instancesnapshot.d.ts +9 -9
- package/out/exports/resources.generated/aws-msk-cluster.d.ts +15 -1
- package/out/exports/resources.generated/aws-mwaa-environment.d.ts +10 -0
- package/out/exports/resources.generated/aws-networkfirewall-loggingconfiguration.d.ts +4 -0
- package/out/exports/resources.generated/aws-networkfirewall-vpcendpointassociation.d.ts +100 -0
- package/out/exports/resources.generated/aws-opsworkscm-server.d.ts +7 -35
- package/out/exports/resources.generated/aws-rds-dbproxytargetgroup.d.ts +4 -4
- package/out/exports/resources.generated/aws-rds-dbshardgroup.d.ts +4 -4
- package/out/exports/resources.generated/aws-s3-bucket.d.ts +1 -1
- package/out/exports/resources.generated/aws-sagemaker-domain.d.ts +65 -0
- package/out/exports/resources.generated/aws-transfer-user.d.ts +1 -1
- package/out/exports/resources.generated/aws-verifiedpermissions-policystore.d.ts +7 -0
- package/out/exports/resources.generated/aws-wafv2-rulegroup.d.ts +23 -1
- package/out/exports/resources.generated/aws-wafv2-webacl.d.ts +114 -3
- package/package.json +1 -1
|
@@ -97,6 +97,11 @@ export type WAFv2WebACLProps = {
|
|
|
97
97
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-wafv2-webacl.html#cfn-wafv2-webacl-name}
|
|
98
98
|
*/
|
|
99
99
|
Name?: string | undefined;
|
|
100
|
+
/**
|
|
101
|
+
* Configures the level of DDoS protection that applies to web ACLs associated with Application Load Balancers.
|
|
102
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-wafv2-webacl.html#cfn-wafv2-webacl-onsourceddosprotectionconfig}
|
|
103
|
+
*/
|
|
104
|
+
OnSourceDDoSProtectionConfig?: OnSourceDDoSProtectionConfig | undefined;
|
|
100
105
|
/**
|
|
101
106
|
* The rule statements used to identify the web requests that you want to manage. Each rule includes one top-level statement that AWS WAF uses to identify matching web requests, and parameters that govern how AWS WAF handles them.
|
|
102
107
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-wafv2-webacl.html#cfn-wafv2-webacl-rules}
|
|
@@ -163,6 +168,8 @@ export type WAFv2WebACLAttribs = {
|
|
|
163
168
|
};
|
|
164
169
|
/**
|
|
165
170
|
* Details for your use of the account creation fraud prevention managed rule group, `AWSManagedRulesACFPRuleSet` . This configuration is used in `ManagedRuleGroupConfig` .
|
|
171
|
+
*
|
|
172
|
+
* For additional information about this and the other intelligent threat mitigation rule groups, see [Intelligent threat mitigation in AWS WAF](https://docs.aws.amazon.com/waf/latest/developerguide/waf-managed-protections) and [AWS Managed Rules rule groups list](https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-list) in the *AWS WAF Developer Guide* .
|
|
166
173
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-awsmanagedrulesacfpruleset.html}
|
|
167
174
|
*/
|
|
168
175
|
export type AWSManagedRulesACFPRuleSet = {
|
|
@@ -204,6 +211,8 @@ export type AWSManagedRulesACFPRuleSet = {
|
|
|
204
211
|
};
|
|
205
212
|
/**
|
|
206
213
|
* Details for your use of the account takeover prevention managed rule group, `AWSManagedRulesATPRuleSet` . This configuration is used in `ManagedRuleGroupConfig` .
|
|
214
|
+
*
|
|
215
|
+
* For additional information about this and the other intelligent threat mitigation rule groups, see [Intelligent threat mitigation in AWS WAF](https://docs.aws.amazon.com/waf/latest/developerguide/waf-managed-protections) and [AWS Managed Rules rule groups list](https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-list) in the *AWS WAF Developer Guide* .
|
|
207
216
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-awsmanagedrulesatpruleset.html}
|
|
208
217
|
*/
|
|
209
218
|
export type AWSManagedRulesATPRuleSet = {
|
|
@@ -234,8 +243,25 @@ export type AWSManagedRulesATPRuleSet = {
|
|
|
234
243
|
*/
|
|
235
244
|
ResponseInspection?: ResponseInspection | undefined;
|
|
236
245
|
};
|
|
246
|
+
/**
|
|
247
|
+
* Configures how to use the AntiDDOS AWS managed rule group in the web ACL
|
|
248
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-awsmanagedrulesantiddosruleset.html}
|
|
249
|
+
*/
|
|
250
|
+
export type AWSManagedRulesAntiDDoSRuleSet = {
|
|
251
|
+
/**
|
|
252
|
+
* Client side action config for AntiDDOS AMR.
|
|
253
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-awsmanagedrulesantiddosruleset.html#cfn-wafv2-webacl-awsmanagedrulesantiddosruleset-clientsideactionconfig}
|
|
254
|
+
*/
|
|
255
|
+
ClientSideActionConfig: ClientSideActionConfig;
|
|
256
|
+
/**
|
|
257
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-awsmanagedrulesantiddosruleset.html#cfn-wafv2-webacl-awsmanagedrulesantiddosruleset-sensitivitytoblock}
|
|
258
|
+
*/
|
|
259
|
+
SensitivityToBlock?: SensitivityToAct | undefined;
|
|
260
|
+
};
|
|
237
261
|
/**
|
|
238
262
|
* Details for your use of the Bot Control managed rule group, `AWSManagedRulesBotControlRuleSet` . This configuration is used in `ManagedRuleGroupConfig` .
|
|
263
|
+
*
|
|
264
|
+
* For additional information about this and the other intelligent threat mitigation rule groups, see [Intelligent threat mitigation in AWS WAF](https://docs.aws.amazon.com/waf/latest/developerguide/waf-managed-protections) and [AWS Managed Rules rule groups list](https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-list) in the *AWS WAF Developer Guide* .
|
|
239
265
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-awsmanagedrulesbotcontrolruleset.html}
|
|
240
266
|
*/
|
|
241
267
|
export type AWSManagedRulesBotControlRuleSet = {
|
|
@@ -283,6 +309,19 @@ export type AndStatement = {
|
|
|
283
309
|
*/
|
|
284
310
|
Statements: Statement[];
|
|
285
311
|
};
|
|
312
|
+
/**
|
|
313
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-asnmatchstatement.html}
|
|
314
|
+
*/
|
|
315
|
+
export type AsnMatchStatement = {
|
|
316
|
+
/**
|
|
317
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-asnmatchstatement.html#cfn-wafv2-webacl-asnmatchstatement-asnlist}
|
|
318
|
+
*/
|
|
319
|
+
AsnList?: number[] | undefined;
|
|
320
|
+
/**
|
|
321
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-asnmatchstatement.html#cfn-wafv2-webacl-asnmatchstatement-forwardedipconfig}
|
|
322
|
+
*/
|
|
323
|
+
ForwardedIPConfig?: ForwardedIPConfiguration | undefined;
|
|
324
|
+
};
|
|
286
325
|
/**
|
|
287
326
|
* Specifies custom configurations for the associations between the web ACL and protected resources.
|
|
288
327
|
*
|
|
@@ -497,6 +536,35 @@ export type ChallengeConfig = {
|
|
|
497
536
|
*/
|
|
498
537
|
ImmunityTimeProperty?: ImmunityTimeProperty | undefined;
|
|
499
538
|
};
|
|
539
|
+
/**
|
|
540
|
+
* Client side action config for AntiDDOS AMR.
|
|
541
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-clientsideaction.html}
|
|
542
|
+
*/
|
|
543
|
+
export type ClientSideAction = {
|
|
544
|
+
/**
|
|
545
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-clientsideaction.html#cfn-wafv2-webacl-clientsideaction-exempturiregularexpressions}
|
|
546
|
+
*/
|
|
547
|
+
ExemptUriRegularExpressions?: Regex[] | undefined;
|
|
548
|
+
/**
|
|
549
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-clientsideaction.html#cfn-wafv2-webacl-clientsideaction-sensitivity}
|
|
550
|
+
*/
|
|
551
|
+
Sensitivity?: SensitivityToAct | undefined;
|
|
552
|
+
/**
|
|
553
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-clientsideaction.html#cfn-wafv2-webacl-clientsideaction-usageofaction}
|
|
554
|
+
*/
|
|
555
|
+
UsageOfAction: UsageOfAction;
|
|
556
|
+
};
|
|
557
|
+
/**
|
|
558
|
+
* Client side action config for AntiDDOS AMR.
|
|
559
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-clientsideactionconfig.html}
|
|
560
|
+
*/
|
|
561
|
+
export type ClientSideActionConfig = {
|
|
562
|
+
/**
|
|
563
|
+
* Client side action config for AntiDDOS AMR.
|
|
564
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-clientsideactionconfig.html#cfn-wafv2-webacl-clientsideactionconfig-challenge}
|
|
565
|
+
*/
|
|
566
|
+
Challenge: ClientSideAction;
|
|
567
|
+
};
|
|
500
568
|
/**
|
|
501
569
|
* The filter to use to identify the subset of cookies to inspect in a web request.
|
|
502
570
|
*
|
|
@@ -902,7 +970,7 @@ export type FieldToProtect = {
|
|
|
902
970
|
*
|
|
903
971
|
* > If the specified header isn't present in the request, AWS WAF doesn't apply the rule to the web request at all.
|
|
904
972
|
*
|
|
905
|
-
* This configuration is used for `GeoMatchStatement` and `RateBasedStatement` . For `IPSetReferenceStatement` , use `IPSetForwardedIPConfig` instead.
|
|
973
|
+
* This configuration is used for `GeoMatchStatement` , `AsnMatchStatement` , and `RateBasedStatement` . For `IPSetReferenceStatement` , use `IPSetForwardedIPConfig` instead.
|
|
906
974
|
*
|
|
907
975
|
* AWS WAF only evaluates the first IP address found in the specified HTTP header.
|
|
908
976
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-forwardedipconfiguration.html}
|
|
@@ -1298,6 +1366,11 @@ export type ManagedRuleGroupConfig = {
|
|
|
1298
1366
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-managedrulegroupconfig.html#cfn-wafv2-webacl-managedrulegroupconfig-awsmanagedrulesatpruleset}
|
|
1299
1367
|
*/
|
|
1300
1368
|
AWSManagedRulesATPRuleSet?: AWSManagedRulesATPRuleSet | undefined;
|
|
1369
|
+
/**
|
|
1370
|
+
* Configures how to use the AntiDDOS AWS managed rule group in the web ACL
|
|
1371
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-managedrulegroupconfig.html#cfn-wafv2-webacl-managedrulegroupconfig-awsmanagedrulesantiddosruleset}
|
|
1372
|
+
*/
|
|
1373
|
+
AWSManagedRulesAntiDDoSRuleSet?: AWSManagedRulesAntiDDoSRuleSet | undefined;
|
|
1301
1374
|
/**
|
|
1302
1375
|
* Additional configuration for using the Bot Control managed rule group. Use this to specify the inspection level that you want to use. For information about using the Bot Control managed rule group, see [AWS WAF Bot Control rule group](https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-bot.html) and [AWS WAF Bot Control](https://docs.aws.amazon.com/waf/latest/developerguide/waf-bot-control.html) in the *AWS WAF Developer Guide* .
|
|
1303
1376
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-managedrulegroupconfig.html#cfn-wafv2-webacl-managedrulegroupconfig-awsmanagedrulesbotcontrolruleset}
|
|
@@ -1349,6 +1422,7 @@ export type ManagedRuleGroupStatement = {
|
|
|
1349
1422
|
* The rule groups used for intelligent threat mitigation require additional configuration:
|
|
1350
1423
|
*
|
|
1351
1424
|
* - Use the `AWSManagedRulesACFPRuleSet` configuration object to configure the account creation fraud prevention managed rule group. The configuration includes the registration and sign-up pages of your application and the locations in the account creation request payload of data, such as the user email and phone number fields.
|
|
1425
|
+
* - Use the `AWSManagedRulesAntiDDoSRuleSet` configuration object to configure the anti-DDoS managed rule group. The configuration includes the sensitivity levels to use in the rules that typically block and challenge requests that might be participating in DDoS attacks and the specification to use to indicate whether a request can handle a silent browser challenge.
|
|
1352
1426
|
* - Use the `AWSManagedRulesATPRuleSet` configuration object to configure the account takeover prevention managed rule group. The configuration includes the sign-in page of your application and the locations in the login request payload of data such as the username and password.
|
|
1353
1427
|
* - Use the `AWSManagedRulesBotControlRuleSet` configuration object to configure the protection level that you want the Bot Control rule group to use.
|
|
1354
1428
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-managedrulegroupstatement.html#cfn-wafv2-webacl-managedrulegroupstatement-managedrulegroupconfigs}
|
|
@@ -1362,7 +1436,7 @@ export type ManagedRuleGroupStatement = {
|
|
|
1362
1436
|
/**
|
|
1363
1437
|
* Action settings to use in the place of the rule actions that are configured inside the rule group. You specify one override for each rule whose action you want to change.
|
|
1364
1438
|
*
|
|
1365
|
-
* >
|
|
1439
|
+
* > Verify the rule names in your overrides carefully. With managed rule groups, AWS WAF silently ignores any override that uses an invalid rule name. With customer-owned rule groups, invalid rule names in your overrides will cause web ACL updates to fail. An invalid rule name is any name that doesn't exactly match the case-sensitive name of an existing rule in the rule group.
|
|
1366
1440
|
*
|
|
1367
1441
|
* You can use overrides for testing, for example you can override all of rule actions to `Count` and then monitor the resulting count metrics to understand how the rule group would handle your web traffic. You can also permanently override some or all actions, to modify how the rule group manages your web traffic.
|
|
1368
1442
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-managedrulegroupstatement.html#cfn-wafv2-webacl-managedrulegroupstatement-ruleactionoverrides}
|
|
@@ -1403,6 +1477,16 @@ export type NotStatement = {
|
|
|
1403
1477
|
*/
|
|
1404
1478
|
Statement: Statement;
|
|
1405
1479
|
};
|
|
1480
|
+
/**
|
|
1481
|
+
* Configures the options for on-source DDoS protection provided by supported resource type.
|
|
1482
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-onsourceddosprotectionconfig.html}
|
|
1483
|
+
*/
|
|
1484
|
+
export type OnSourceDDoSProtectionConfig = {
|
|
1485
|
+
/**
|
|
1486
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-onsourceddosprotectionconfig.html#cfn-wafv2-webacl-onsourceddosprotectionconfig-alblowreputationmode}
|
|
1487
|
+
*/
|
|
1488
|
+
ALBLowReputationMode: "ACTIVE_UNDER_DDOS" | "ALWAYS_ON";
|
|
1489
|
+
};
|
|
1406
1490
|
/**
|
|
1407
1491
|
* A logical rule statement used to combine other rule statements with OR logic. You provide more than one `Statement` within the `OrStatement` .
|
|
1408
1492
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-orstatement.html}
|
|
@@ -1562,6 +1646,11 @@ export type RateBasedStatement = {
|
|
|
1562
1646
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-ratebasedstatementcustomkey.html}
|
|
1563
1647
|
*/
|
|
1564
1648
|
export type RateBasedStatementCustomKey = {
|
|
1649
|
+
/**
|
|
1650
|
+
* Specifies the request's ASN as an aggregate key for a rate-based rule.
|
|
1651
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-ratebasedstatementcustomkey.html#cfn-wafv2-webacl-ratebasedstatementcustomkey-asn}
|
|
1652
|
+
*/
|
|
1653
|
+
ASN?: Record<string, unknown> | undefined;
|
|
1565
1654
|
/**
|
|
1566
1655
|
* Use the value of a cookie in the request as an aggregate key. Each distinct value in the cookie contributes to the aggregation instance. If you use a single cookie as your custom key, then each value fully defines an aggregation instance.
|
|
1567
1656
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-ratebasedstatementcustomkey.html#cfn-wafv2-webacl-ratebasedstatementcustomkey-cookie}
|
|
@@ -1755,6 +1844,16 @@ export type RateLimitUriPath = {
|
|
|
1755
1844
|
*/
|
|
1756
1845
|
TextTransformations: TextTransformation[];
|
|
1757
1846
|
};
|
|
1847
|
+
/**
|
|
1848
|
+
* Regex
|
|
1849
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-regex.html}
|
|
1850
|
+
*/
|
|
1851
|
+
export type Regex = {
|
|
1852
|
+
/**
|
|
1853
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-regex.html#cfn-wafv2-webacl-regex-regexstring}
|
|
1854
|
+
*/
|
|
1855
|
+
RegexString?: string | undefined;
|
|
1856
|
+
};
|
|
1758
1857
|
/**
|
|
1759
1858
|
* A rule statement used to search web request components for a match against a single regular expression.
|
|
1760
1859
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-regexmatchstatement.html}
|
|
@@ -2267,7 +2366,7 @@ export type RuleGroupReferenceStatement = {
|
|
|
2267
2366
|
/**
|
|
2268
2367
|
* Action settings to use in the place of the rule actions that are configured inside the rule group. You specify one override for each rule whose action you want to change.
|
|
2269
2368
|
*
|
|
2270
|
-
* >
|
|
2369
|
+
* > Verify the rule names in your overrides carefully. With managed rule groups, AWS WAF silently ignores any override that uses an invalid rule name. With customer-owned rule groups, invalid rule names in your overrides will cause web ACL updates to fail. An invalid rule name is any name that doesn't exactly match the case-sensitive name of an existing rule in the rule group.
|
|
2271
2370
|
*
|
|
2272
2371
|
* You can use overrides for testing, for example you can override all of rule actions to `Count` and then monitor the resulting count metrics to understand how the rule group would handle your web traffic. You can also permanently override some or all actions, to modify how the rule group manages your web traffic.
|
|
2273
2372
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-rulegroupreferencestatement.html#cfn-wafv2-webacl-rulegroupreferencestatement-ruleactionoverrides}
|
|
@@ -2284,6 +2383,10 @@ export type Scope = "CLOUDFRONT" | "REGIONAL";
|
|
|
2284
2383
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-sensitivitylevel.html}
|
|
2285
2384
|
*/
|
|
2286
2385
|
export type SensitivityLevel = "LOW" | "HIGH";
|
|
2386
|
+
/**
|
|
2387
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-sensitivitytoact.html}
|
|
2388
|
+
*/
|
|
2389
|
+
export type SensitivityToAct = "LOW" | "MEDIUM" | "HIGH";
|
|
2287
2390
|
/**
|
|
2288
2391
|
* A rule statement that compares a number of bytes against the size of a request component, using a comparison operator, such as greater than (>) or less than (<). For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes.
|
|
2289
2392
|
*
|
|
@@ -2357,6 +2460,10 @@ export type Statement = {
|
|
|
2357
2460
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-statement.html#cfn-wafv2-webacl-statement-andstatement}
|
|
2358
2461
|
*/
|
|
2359
2462
|
AndStatement?: AndStatement | undefined;
|
|
2463
|
+
/**
|
|
2464
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-statement.html#cfn-wafv2-webacl-statement-asnmatchstatement}
|
|
2465
|
+
*/
|
|
2466
|
+
AsnMatchStatement?: AsnMatchStatement | undefined;
|
|
2360
2467
|
/**
|
|
2361
2468
|
* A rule statement that defines a string match search for AWS WAF to apply to web requests. The byte match statement provides the bytes to search for, the location in requests that you want AWS WAF to search, and other settings. The bytes to search for are typically a string that corresponds with ASCII characters. In the AWS WAF console and the developer guide, this is called a string match statement.
|
|
2362
2469
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-statement.html#cfn-wafv2-webacl-statement-bytematchstatement}
|
|
@@ -2542,6 +2649,10 @@ export type UriFragment = {
|
|
|
2542
2649
|
*/
|
|
2543
2650
|
FallbackBehavior?: "MATCH" | "NO_MATCH" | undefined;
|
|
2544
2651
|
};
|
|
2652
|
+
/**
|
|
2653
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-usageofaction.html}
|
|
2654
|
+
*/
|
|
2655
|
+
export type UsageOfAction = "ENABLED" | "DISABLED";
|
|
2545
2656
|
/**
|
|
2546
2657
|
* Defines and enables Amazon CloudWatch metrics and web request sample collection.
|
|
2547
2658
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-visibilityconfig.html}
|