@propulsionworks/cloudformation 0.1.11 → 0.1.12
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/out/exports/resources.generated/aws-amplify-app.d.ts +2 -2
- package/out/exports/resources.generated/aws-apigateway-method.d.ts +1 -1
- package/out/exports/resources.generated/aws-appsync-apicache.d.ts +4 -0
- package/out/exports/resources.generated/aws-athena-workgroup.d.ts +37 -0
- package/out/exports/resources.generated/aws-bedrock-flow.d.ts +48 -21
- package/out/exports/resources.generated/aws-connect-emailaddress.d.ts +1 -1
- package/out/exports/resources.generated/aws-connect-queue.d.ts +1 -1
- package/out/exports/resources.generated/aws-customerprofiles-calculatedattributedefinition.d.ts +50 -1
- package/out/exports/resources.generated/aws-customerprofiles-objecttype.d.ts +13 -1
- package/out/exports/resources.generated/aws-customerprofiles-segmentdefinition.d.ts +4 -4
- package/out/exports/resources.generated/aws-deadline-fleet.d.ts +1 -0
- package/out/exports/resources.generated/aws-dsql-cluster.d.ts +17 -9
- package/out/exports/resources.generated/aws-ec2-ec2fleet.d.ts +55 -0
- package/out/exports/resources.generated/aws-ec2-egressonlyinternetgateway.d.ts +6 -1
- package/out/exports/resources.generated/aws-efs-mounttarget.d.ts +15 -3
- package/out/exports/resources.generated/aws-eks-addon.d.ts +3 -3
- package/out/exports/resources.generated/aws-eks-cluster.d.ts +14 -12
- package/out/exports/resources.generated/aws-eks-podidentityassociation.d.ts +24 -2
- package/out/exports/resources.generated/aws-entityresolution-matchingworkflow.d.ts +15 -5
- package/out/exports/resources.generated/aws-evs-environment.d.ts +62 -7
- package/out/exports/resources.generated/aws-fis-experimenttemplate.d.ts +1 -1
- package/out/exports/resources.generated/aws-kms-key.d.ts +1 -1
- package/out/exports/resources.generated/aws-lambda-eventinvokeconfig.d.ts +4 -2
- package/out/exports/resources.generated/aws-lambda-eventsourcemapping.d.ts +2 -2
- package/out/exports/resources.generated/aws-msk-cluster.d.ts +15 -1
- package/out/exports/resources.generated/aws-mwaa-environment.d.ts +10 -0
- package/out/exports/resources.generated/aws-networkfirewall-loggingconfiguration.d.ts +4 -0
- package/out/exports/resources.generated/aws-networkfirewall-vpcendpointassociation.d.ts +38 -6
- package/out/exports/resources.generated/aws-opsworkscm-server.d.ts +5 -5
- package/out/exports/resources.generated/aws-sagemaker-domain.d.ts +65 -0
- package/out/exports/resources.generated/aws-wafv2-rulegroup.d.ts +23 -1
- package/out/exports/resources.generated/aws-wafv2-webacl.d.ts +111 -4
- package/package.json +1 -1
|
@@ -154,22 +154,31 @@ export type BaselinePerformanceFactorsRequest = {
|
|
|
154
154
|
Cpu?: CpuPerformanceFactorRequest | undefined;
|
|
155
155
|
};
|
|
156
156
|
/**
|
|
157
|
+
* Describes a block device mapping, which defines the EBS volumes and instance store volumes to attach to an instance at launch.
|
|
157
158
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-ec2fleet-blockdevicemapping.html}
|
|
158
159
|
*/
|
|
159
160
|
export type BlockDeviceMapping = {
|
|
160
161
|
/**
|
|
162
|
+
* The device name (for example, `/dev/sdh` or `xvdh` ).
|
|
161
163
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-ec2fleet-blockdevicemapping.html#cfn-ec2-ec2fleet-blockdevicemapping-devicename}
|
|
162
164
|
*/
|
|
163
165
|
DeviceName?: string | undefined;
|
|
164
166
|
/**
|
|
167
|
+
* Parameters used to automatically set up EBS volumes when the instance is launched.
|
|
165
168
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-ec2fleet-blockdevicemapping.html#cfn-ec2-ec2fleet-blockdevicemapping-ebs}
|
|
166
169
|
*/
|
|
167
170
|
Ebs?: EbsBlockDevice | undefined;
|
|
168
171
|
/**
|
|
172
|
+
* To omit the device from the block device mapping, specify an empty string. When this property is specified, the device is removed from the block device mapping regardless of the assigned value.
|
|
169
173
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-ec2fleet-blockdevicemapping.html#cfn-ec2-ec2fleet-blockdevicemapping-nodevice}
|
|
170
174
|
*/
|
|
171
175
|
NoDevice?: string | undefined;
|
|
172
176
|
/**
|
|
177
|
+
* The virtual device name ( `ephemeral` N). Instance store volumes are numbered starting from 0. An instance type with 2 available instance store volumes can specify mappings for `ephemeral0` and `ephemeral1` . The number of available instance store volumes depends on the instance type. After you connect to the instance, you must mount the volume.
|
|
178
|
+
*
|
|
179
|
+
* NVMe instance store volumes are automatically enumerated and assigned a device name. Including them in your block device mapping has no effect.
|
|
180
|
+
*
|
|
181
|
+
* Constraints: For M3 instances, you must specify instance store volumes in the block device mapping for the instance. When you launch an M3 instance, we ignore any instance store volumes specified in the block device mapping for the AMI.
|
|
173
182
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-ec2fleet-blockdevicemapping.html#cfn-ec2-ec2fleet-blockdevicemapping-virtualname}
|
|
174
183
|
*/
|
|
175
184
|
VirtualName?: string | undefined;
|
|
@@ -233,34 +242,75 @@ export type CpuPerformanceFactorRequest = {
|
|
|
233
242
|
References?: PerformanceFactorReferenceRequest[] | undefined;
|
|
234
243
|
};
|
|
235
244
|
/**
|
|
245
|
+
* Describes a block device for an EBS volume.
|
|
236
246
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-ec2fleet-ebsblockdevice.html}
|
|
237
247
|
*/
|
|
238
248
|
export type EbsBlockDevice = {
|
|
239
249
|
/**
|
|
250
|
+
* Indicates whether the EBS volume is deleted on instance termination. For more information, see [Preserving Amazon EBS volumes on instance termination](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/terminating-instances.html#preserving-volumes-on-termination) in the *Amazon EC2 User Guide* .
|
|
240
251
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-ec2fleet-ebsblockdevice.html#cfn-ec2-ec2fleet-ebsblockdevice-deleteontermination}
|
|
241
252
|
*/
|
|
242
253
|
DeleteOnTermination?: boolean | undefined;
|
|
243
254
|
/**
|
|
255
|
+
* Indicates whether the encryption state of an EBS volume is changed while being restored from a backing snapshot. The effect of setting the encryption state to `true` depends on the volume origin (new or from a snapshot), starting encryption state, ownership, and whether encryption by default is enabled. For more information, see [Amazon EBS encryption](https://docs.aws.amazon.com/ebs/latest/userguide/ebs-encryption.html#encryption-parameters) in the *Amazon EBS User Guide* .
|
|
256
|
+
*
|
|
257
|
+
* In no case can you remove encryption from an encrypted volume.
|
|
258
|
+
*
|
|
259
|
+
* Encrypted volumes can only be attached to instances that support Amazon EBS encryption. For more information, see [Supported instance types](https://docs.aws.amazon.com/ebs/latest/userguide/ebs-encryption-requirements.html#ebs-encryption_supported_instances) .
|
|
260
|
+
*
|
|
261
|
+
* This parameter is not returned by `DescribeImageAttribute` .
|
|
262
|
+
*
|
|
263
|
+
* For `CreateImage` and `RegisterImage` , whether you can include this parameter, and the allowed values differ depending on the type of block device mapping you are creating.
|
|
264
|
+
*
|
|
265
|
+
* - If you are creating a block device mapping for a *new (empty) volume* , you can include this parameter, and specify either `true` for an encrypted volume, or `false` for an unencrypted volume. If you omit this parameter, it defaults to `false` (unencrypted).
|
|
266
|
+
* - If you are creating a block device mapping from an *existing encrypted or unencrypted snapshot* , you must omit this parameter. If you include this parameter, the request will fail, regardless of the value that you specify.
|
|
267
|
+
* - If you are creating a block device mapping from an *existing unencrypted volume* , you can include this parameter, but you must specify `false` . If you specify `true` , the request will fail. In this case, we recommend that you omit the parameter.
|
|
268
|
+
* - If you are creating a block device mapping from an *existing encrypted volume* , you can include this parameter, and specify either `true` or `false` . However, if you specify `false` , the parameter is ignored and the block device mapping is always encrypted. In this case, we recommend that you omit the parameter.
|
|
244
269
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-ec2fleet-ebsblockdevice.html#cfn-ec2-ec2fleet-ebsblockdevice-encrypted}
|
|
245
270
|
*/
|
|
246
271
|
Encrypted?: boolean | undefined;
|
|
247
272
|
/**
|
|
273
|
+
* The number of I/O operations per second (IOPS). For `gp3` , `io1` , and `io2` volumes, this represents the number of IOPS that are provisioned for the volume. For `gp2` volumes, this represents the baseline performance of the volume and the rate at which the volume accumulates I/O credits for bursting.
|
|
274
|
+
*
|
|
275
|
+
* The following are the supported values for each volume type:
|
|
276
|
+
*
|
|
277
|
+
* - `gp3` : 3,000 - 16,000 IOPS
|
|
278
|
+
* - `io1` : 100 - 64,000 IOPS
|
|
279
|
+
* - `io2` : 100 - 256,000 IOPS
|
|
280
|
+
*
|
|
281
|
+
* For `io2` volumes, you can achieve up to 256,000 IOPS on [instances built on the Nitro System](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/instance-types.html#ec2-nitro-instances) . On other instances, you can achieve performance up to 32,000 IOPS.
|
|
282
|
+
*
|
|
283
|
+
* This parameter is required for `io1` and `io2` volumes. The default for `gp3` volumes is 3,000 IOPS.
|
|
248
284
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-ec2fleet-ebsblockdevice.html#cfn-ec2-ec2fleet-ebsblockdevice-iops}
|
|
249
285
|
*/
|
|
250
286
|
Iops?: number | undefined;
|
|
251
287
|
/**
|
|
288
|
+
* Identifier (key ID, key alias, key ARN, or alias ARN) of the customer managed KMS key to use for EBS encryption.
|
|
289
|
+
*
|
|
290
|
+
* This parameter is only supported on `BlockDeviceMapping` objects called by [RunInstances](https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_RunInstances.html) , [RequestSpotFleet](https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_RequestSpotFleet.html) , and [RequestSpotInstances](https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_RequestSpotInstances.html) .
|
|
252
291
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-ec2fleet-ebsblockdevice.html#cfn-ec2-ec2fleet-ebsblockdevice-kmskeyid}
|
|
253
292
|
*/
|
|
254
293
|
KmsKeyId?: string | undefined;
|
|
255
294
|
/**
|
|
295
|
+
* The ID of the snapshot.
|
|
256
296
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-ec2fleet-ebsblockdevice.html#cfn-ec2-ec2fleet-ebsblockdevice-snapshotid}
|
|
257
297
|
*/
|
|
258
298
|
SnapshotId?: string | undefined;
|
|
259
299
|
/**
|
|
300
|
+
* The size of the volume, in GiBs. You must specify either a snapshot ID or a volume size. If you specify a snapshot, the default is the snapshot size. You can specify a volume size that is equal to or larger than the snapshot size.
|
|
301
|
+
*
|
|
302
|
+
* The following are the supported sizes for each volume type:
|
|
303
|
+
*
|
|
304
|
+
* - `gp2` and `gp3` : 1 - 16,384 GiB
|
|
305
|
+
* - `io1` : 4 - 16,384 GiB
|
|
306
|
+
* - `io2` : 4 - 65,536 GiB
|
|
307
|
+
* - `st1` and `sc1` : 125 - 16,384 GiB
|
|
308
|
+
* - `standard` : 1 - 1024 GiB
|
|
260
309
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-ec2fleet-ebsblockdevice.html#cfn-ec2-ec2fleet-ebsblockdevice-volumesize}
|
|
261
310
|
*/
|
|
262
311
|
VolumeSize?: number | undefined;
|
|
263
312
|
/**
|
|
313
|
+
* The volume type. For more information, see [Amazon EBS volume types](https://docs.aws.amazon.com/ebs/latest/userguide/ebs-volume-types.html) in the *Amazon EBS User Guide* .
|
|
264
314
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-ec2fleet-ebsblockdevice.html#cfn-ec2-ec2fleet-ebsblockdevice-volumetype}
|
|
265
315
|
*/
|
|
266
316
|
VolumeType?: "gp2" | "gp3" | "io1" | "io2" | "sc1" | "st1" | "standard" | undefined;
|
|
@@ -298,6 +348,11 @@ export type FleetLaunchTemplateOverridesRequest = {
|
|
|
298
348
|
*/
|
|
299
349
|
AvailabilityZone?: string | undefined;
|
|
300
350
|
/**
|
|
351
|
+
* The block device mappings, which define the EBS volumes and instance store volumes to attach to the instance at launch.
|
|
352
|
+
*
|
|
353
|
+
* Supported only for fleets of type `instant` .
|
|
354
|
+
*
|
|
355
|
+
* For more information, see [Block device mappings for volumes on Amazon EC2 instances](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/block-device-mapping-concepts.html) in the *Amazon EC2 User Guide* .
|
|
301
356
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-ec2fleet-fleetlaunchtemplateoverridesrequest.html#cfn-ec2-ec2fleet-fleetlaunchtemplateoverridesrequest-blockdevicemappings}
|
|
302
357
|
*/
|
|
303
358
|
BlockDeviceMappings?: BlockDeviceMapping[] | undefined;
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import type { ResourceDefinitionWithAttributes } from "../main.ts";
|
|
1
|
+
import type { ResourceDefinitionWithAttributes, Tag } from "../main.ts";
|
|
2
2
|
/**
|
|
3
3
|
* [IPv6 only] Specifies an egress-only internet gateway for your VPC. An egress-only internet gateway is used to enable outbound communication over IPv6 from instances in your VPC to the internet, and prevents hosts outside of your VPC from initiating an IPv6 connection with your instance.
|
|
4
4
|
*
|
|
@@ -13,6 +13,11 @@ export type EC2EgressOnlyInternetGateway = ResourceDefinitionWithAttributes<"AWS
|
|
|
13
13
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-ec2-egressonlyinternetgateway.html}
|
|
14
14
|
*/
|
|
15
15
|
export type EC2EgressOnlyInternetGatewayProps = {
|
|
16
|
+
/**
|
|
17
|
+
* The tags assigned to the egress-only internet gateway.
|
|
18
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-ec2-egressonlyinternetgateway.html#cfn-ec2-egressonlyinternetgateway-tags}
|
|
19
|
+
*/
|
|
20
|
+
Tags?: Tag[] | undefined;
|
|
16
21
|
/**
|
|
17
22
|
* The ID of the VPC for which to create the egress-only internet gateway.
|
|
18
23
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-ec2-egressonlyinternetgateway.html#cfn-ec2-egressonlyinternetgateway-vpcid}
|
|
@@ -15,17 +15,29 @@ export type EFSMountTargetProps = {
|
|
|
15
15
|
*/
|
|
16
16
|
FileSystemId: string;
|
|
17
17
|
/**
|
|
18
|
-
*
|
|
18
|
+
* If the `IpAddressType` for the mount target is IPv4 ( `IPV4_ONLY` or `DUAL_STACK` ), then specify the IPv4 address to use. If you do not specify an `IpAddress` , then Amazon EFS selects an unused IP address from the subnet specified for `SubnetId` .
|
|
19
19
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-efs-mounttarget.html#cfn-efs-mounttarget-ipaddress}
|
|
20
20
|
*/
|
|
21
21
|
IpAddress?: string | undefined;
|
|
22
22
|
/**
|
|
23
|
-
*
|
|
23
|
+
* The IP address type for the mount target. The possible values are `IPV4_ONLY` (only IPv4 addresses), `IPV6_ONLY` (only IPv6 addresses), and `DUAL_STACK` (dual-stack, both IPv4 and IPv6 addresses). If you don’t specify an `IpAddressType` , then `IPV4_ONLY` is used.
|
|
24
|
+
*
|
|
25
|
+
* > The `IPAddressType` must match the IP type of the subnet. Additionally, the `IPAddressType` parameter overrides the value set as the default IP address for the subnet in the VPC. For example, if the `IPAddressType` is `IPV4_ONLY` and `AssignIpv6AddressOnCreation` is `true` , then IPv4 is used for the mount target. For more information, see [Modify the IP addressing attributes of your subnet](https://docs.aws.amazon.com/vpc/latest/userguide/subnet-public-ip.html) .
|
|
26
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-efs-mounttarget.html#cfn-efs-mounttarget-ipaddresstype}
|
|
27
|
+
*/
|
|
28
|
+
IpAddressType?: "IPV4_ONLY" | "IPV6_ONLY" | "DUAL_STACK" | undefined;
|
|
29
|
+
/**
|
|
30
|
+
* If the `IPAddressType` for the mount target is IPv6 ( `IPV6_ONLY` or `DUAL_STACK` ), then specify the IPv6 address to use. If you do not specify an `Ipv6Address` , then Amazon EFS selects an unused IP address from the subnet specified for `SubnetId` .
|
|
31
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-efs-mounttarget.html#cfn-efs-mounttarget-ipv6address}
|
|
32
|
+
*/
|
|
33
|
+
Ipv6Address?: string | undefined;
|
|
34
|
+
/**
|
|
35
|
+
* VPC security group IDs, of the form `sg-xxxxxxxx` . These must be for the same VPC as the subnet specified. The maximum number of security groups depends on account quota. For more information, see [Amazon VPC Quotas](https://docs.aws.amazon.com/vpc/latest/userguide/amazon-vpc-limits.html) in the *Amazon VPC User Guide* (see the *Security Groups* table). If you don't specify a security group, then Amazon EFS uses the default security group for the subnet's VPC.
|
|
24
36
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-efs-mounttarget.html#cfn-efs-mounttarget-securitygroups}
|
|
25
37
|
*/
|
|
26
38
|
SecurityGroups: string[];
|
|
27
39
|
/**
|
|
28
|
-
* The ID of the subnet to add the mount target in. For One Zone file systems, use the subnet that is associated with the file system's Availability Zone.
|
|
40
|
+
* The ID of the subnet to add the mount target in. For One Zone file systems, use the subnet that is associated with the file system's Availability Zone. The subnet type must be the same type as the `IpAddressType` .
|
|
29
41
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-efs-mounttarget.html#cfn-efs-mounttarget-subnetid}
|
|
30
42
|
*/
|
|
31
43
|
SubnetId: string;
|
|
@@ -38,9 +38,9 @@ export type EKSAddonProps = {
|
|
|
38
38
|
*/
|
|
39
39
|
ConfigurationValues?: string | undefined;
|
|
40
40
|
/**
|
|
41
|
-
* An array of Pod Identity
|
|
41
|
+
* An array of EKS Pod Identity associations owned by the add-on. Each association maps a role to a service account in a namespace in the cluster.
|
|
42
42
|
*
|
|
43
|
-
* For more information, see [Attach an IAM Role to an Amazon EKS add-on using Pod Identity](https://docs.aws.amazon.com/eks/latest/userguide/add-ons-iam.html) in the *Amazon EKS User Guide* .
|
|
43
|
+
* For more information, see [Attach an IAM Role to an Amazon EKS add-on using EKS Pod Identity](https://docs.aws.amazon.com/eks/latest/userguide/add-ons-iam.html) in the *Amazon EKS User Guide* .
|
|
44
44
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-eks-addon.html#cfn-eks-addon-podidentityassociations}
|
|
45
45
|
*/
|
|
46
46
|
PodIdentityAssociations?: PodIdentityAssociation[] | undefined;
|
|
@@ -91,7 +91,7 @@ export type EKSAddonAttribs = {
|
|
|
91
91
|
*/
|
|
92
92
|
export type PodIdentityAssociation = {
|
|
93
93
|
/**
|
|
94
|
-
* The Amazon Resource Name (ARN) of the IAM role to associate with the service account. The EKS Pod Identity agent manages credentials to assume this role for applications in the containers in the
|
|
94
|
+
* The Amazon Resource Name (ARN) of the IAM role to associate with the service account. The EKS Pod Identity agent manages credentials to assume this role for applications in the containers in the Pods that use this service account.
|
|
95
95
|
* @pattern ^arn:aws(-cn|-us-gov|-iso(-[a-z])?)?:iam::\d{12}:(role)\/*
|
|
96
96
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-addon-podidentityassociation.html#cfn-eks-addon-podidentityassociation-rolearn}
|
|
97
97
|
*/
|
|
@@ -8,7 +8,7 @@ import type { ResourceDefinitionWithAttributes, Tag } from "../main.ts";
|
|
|
8
8
|
*
|
|
9
9
|
* Amazon EKS nodes run in your AWS account and connect to your cluster's control plane over the Kubernetes API server endpoint and a certificate file that is created for your cluster.
|
|
10
10
|
*
|
|
11
|
-
* You can use the `endpointPublicAccess` and `endpointPrivateAccess` parameters to enable or disable public and private access to your cluster's Kubernetes API server endpoint. By default, public access is enabled, and private access is disabled. For more information, see [Amazon EKS Cluster Endpoint Access Control](https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html) in the **Amazon EKS User Guide** .
|
|
11
|
+
* You can use the `endpointPublicAccess` and `endpointPrivateAccess` parameters to enable or disable public and private access to your cluster's Kubernetes API server endpoint. By default, public access is enabled, and private access is disabled. The endpoint domain name and IP address family depends on the value of the `ipFamily` for the cluster. For more information, see [Amazon EKS Cluster Endpoint Access Control](https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html) in the **Amazon EKS User Guide** .
|
|
12
12
|
*
|
|
13
13
|
* You can use the `logging` parameter to enable or disable exporting the Kubernetes control plane logs for your cluster to CloudWatch Logs. By default, cluster control plane logs aren't exported to CloudWatch Logs. For more information, see [Amazon EKS Cluster Control Plane Logs](https://docs.aws.amazon.com/eks/latest/userguide/control-plane-logs.html) in the **Amazon EKS User Guide** .
|
|
14
14
|
*
|
|
@@ -27,7 +27,7 @@ export type EKSCluster = ResourceDefinitionWithAttributes<"AWS::EKS::Cluster", E
|
|
|
27
27
|
*
|
|
28
28
|
* Amazon EKS nodes run in your AWS account and connect to your cluster's control plane over the Kubernetes API server endpoint and a certificate file that is created for your cluster.
|
|
29
29
|
*
|
|
30
|
-
* You can use the `endpointPublicAccess` and `endpointPrivateAccess` parameters to enable or disable public and private access to your cluster's Kubernetes API server endpoint. By default, public access is enabled, and private access is disabled. For more information, see [Amazon EKS Cluster Endpoint Access Control](https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html) in the **Amazon EKS User Guide** .
|
|
30
|
+
* You can use the `endpointPublicAccess` and `endpointPrivateAccess` parameters to enable or disable public and private access to your cluster's Kubernetes API server endpoint. By default, public access is enabled, and private access is disabled. The endpoint domain name and IP address family depends on the value of the `ipFamily` for the cluster. For more information, see [Amazon EKS Cluster Endpoint Access Control](https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html) in the **Amazon EKS User Guide** .
|
|
31
31
|
*
|
|
32
32
|
* You can use the `logging` parameter to enable or disable exporting the Kubernetes control plane logs for your cluster to CloudWatch Logs. By default, cluster control plane logs aren't exported to CloudWatch Logs. For more information, see [Amazon EKS Cluster Control Plane Logs](https://docs.aws.amazon.com/eks/latest/userguide/control-plane-logs.html) in the **Amazon EKS User Guide** .
|
|
33
33
|
*
|
|
@@ -45,7 +45,7 @@ export type EKSClusterProps = {
|
|
|
45
45
|
/**
|
|
46
46
|
* If you set this value to `False` when creating a cluster, the default networking add-ons will not be installed.
|
|
47
47
|
*
|
|
48
|
-
* The default networking
|
|
48
|
+
* The default networking add-ons include `vpc-cni` , `coredns` , and `kube-proxy` .
|
|
49
49
|
*
|
|
50
50
|
* Use this option when you plan to install third-party alternative add-ons or self-manage the default networking add-ons.
|
|
51
51
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-eks-cluster.html#cfn-eks-cluster-bootstrapselfmanagedaddons}
|
|
@@ -389,7 +389,7 @@ export type RemoteNetworkConfig = {
|
|
|
389
389
|
*
|
|
390
390
|
* It must satisfy the following requirements:
|
|
391
391
|
*
|
|
392
|
-
* - Each block must be within an `IPv4` RFC-1918 network range. Minimum allowed size is /
|
|
392
|
+
* - Each block must be within an `IPv4` RFC-1918 network range. Minimum allowed size is /32, maximum allowed size is /8. Publicly-routable addresses aren't supported.
|
|
393
393
|
* - Each block cannot overlap with the range of the VPC CIDR blocks for your EKS resources, or the block of the Kubernetes service IP range.
|
|
394
394
|
* - Each block must have a route to the VPC that uses the VPC CIDR blocks, not public IPs or Elastic IPs. There are many options including AWS Transit Gateway , AWS Site-to-Site VPN , or AWS Direct Connect .
|
|
395
395
|
* - Each host must allow outbound connection to the EKS cluster control plane on TCP ports `443` and `10250` .
|
|
@@ -407,7 +407,7 @@ export type RemoteNetworkConfig = {
|
|
|
407
407
|
*
|
|
408
408
|
* It must satisfy the following requirements:
|
|
409
409
|
*
|
|
410
|
-
* - Each block must be within an `IPv4` RFC-1918 network range. Minimum allowed size is /
|
|
410
|
+
* - Each block must be within an `IPv4` RFC-1918 network range. Minimum allowed size is /32, maximum allowed size is /8. Publicly-routable addresses aren't supported.
|
|
411
411
|
* - Each block cannot overlap with the range of the VPC CIDR blocks for your EKS resources, or the block of the Kubernetes service IP range.
|
|
412
412
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-cluster-remotenetworkconfig.html#cfn-eks-cluster-remotenetworkconfig-remotepodnetworks}
|
|
413
413
|
*/
|
|
@@ -422,7 +422,7 @@ export type RemoteNetworkConfig = {
|
|
|
422
422
|
*
|
|
423
423
|
* It must satisfy the following requirements:
|
|
424
424
|
*
|
|
425
|
-
* - Each block must be within an `IPv4` RFC-1918 network range. Minimum allowed size is /
|
|
425
|
+
* - Each block must be within an `IPv4` RFC-1918 network range. Minimum allowed size is /32, maximum allowed size is /8. Publicly-routable addresses aren't supported.
|
|
426
426
|
* - Each block cannot overlap with the range of the VPC CIDR blocks for your EKS resources, or the block of the Kubernetes service IP range.
|
|
427
427
|
* - Each block must have a route to the VPC that uses the VPC CIDR blocks, not public IPs or Elastic IPs. There are many options including AWS Transit Gateway , AWS Site-to-Site VPN , or AWS Direct Connect .
|
|
428
428
|
* - Each host must allow outbound connection to the EKS cluster control plane on TCP ports `443` and `10250` .
|
|
@@ -440,7 +440,7 @@ export type RemoteNodeNetwork = {
|
|
|
440
440
|
*
|
|
441
441
|
* It must satisfy the following requirements:
|
|
442
442
|
*
|
|
443
|
-
* - Each block must be within an `IPv4` RFC-1918 network range. Minimum allowed size is /
|
|
443
|
+
* - Each block must be within an `IPv4` RFC-1918 network range. Minimum allowed size is /32, maximum allowed size is /8. Publicly-routable addresses aren't supported.
|
|
444
444
|
* - Each block cannot overlap with the range of the VPC CIDR blocks for your EKS resources, or the block of the Kubernetes service IP range.
|
|
445
445
|
* - Each block must have a route to the VPC that uses the VPC CIDR blocks, not public IPs or Elastic IPs. There are many options including AWS Transit Gateway , AWS Site-to-Site VPN , or AWS Direct Connect .
|
|
446
446
|
* - Each host must allow outbound connection to the EKS cluster control plane on TCP ports `443` and `10250` .
|
|
@@ -459,7 +459,7 @@ export type RemoteNodeNetwork = {
|
|
|
459
459
|
*
|
|
460
460
|
* It must satisfy the following requirements:
|
|
461
461
|
*
|
|
462
|
-
* - Each block must be within an `IPv4` RFC-1918 network range. Minimum allowed size is /
|
|
462
|
+
* - Each block must be within an `IPv4` RFC-1918 network range. Minimum allowed size is /32, maximum allowed size is /8. Publicly-routable addresses aren't supported.
|
|
463
463
|
* - Each block cannot overlap with the range of the VPC CIDR blocks for your EKS resources, or the block of the Kubernetes service IP range.
|
|
464
464
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-cluster-remotepodnetwork.html}
|
|
465
465
|
*/
|
|
@@ -473,7 +473,7 @@ export type RemotePodNetwork = {
|
|
|
473
473
|
*
|
|
474
474
|
* It must satisfy the following requirements:
|
|
475
475
|
*
|
|
476
|
-
* - Each block must be within an `IPv4` RFC-1918 network range. Minimum allowed size is /
|
|
476
|
+
* - Each block must be within an `IPv4` RFC-1918 network range. Minimum allowed size is /32, maximum allowed size is /8. Publicly-routable addresses aren't supported.
|
|
477
477
|
* - Each block cannot overlap with the range of the VPC CIDR blocks for your EKS resources, or the block of the Kubernetes service IP range.
|
|
478
478
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-cluster-remotepodnetwork.html#cfn-eks-cluster-remotepodnetwork-cidrs}
|
|
479
479
|
*/
|
|
@@ -491,17 +491,19 @@ export type RemotePodNetwork = {
|
|
|
491
491
|
*/
|
|
492
492
|
export type ResourcesVpcConfig = {
|
|
493
493
|
/**
|
|
494
|
-
* Set this value to `true` to enable private access for your cluster's Kubernetes API server endpoint. If you enable private access, Kubernetes API requests from within your cluster's VPC use the private VPC endpoint. The default value for this parameter is `false` , which disables private access for your Kubernetes API server. If you disable private access and you have nodes or AWS Fargate pods in the cluster, then ensure that `publicAccessCidrs` includes the necessary CIDR blocks for communication with the nodes or Fargate pods. For more information, see [
|
|
494
|
+
* Set this value to `true` to enable private access for your cluster's Kubernetes API server endpoint. If you enable private access, Kubernetes API requests from within your cluster's VPC use the private VPC endpoint. The default value for this parameter is `false` , which disables private access for your Kubernetes API server. If you disable private access and you have nodes or AWS Fargate pods in the cluster, then ensure that `publicAccessCidrs` includes the necessary CIDR blocks for communication with the nodes or Fargate pods. For more information, see [Cluster API server endpoint](https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html) in the **Amazon EKS User Guide** .
|
|
495
495
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-cluster-resourcesvpcconfig.html#cfn-eks-cluster-resourcesvpcconfig-endpointprivateaccess}
|
|
496
496
|
*/
|
|
497
497
|
EndpointPrivateAccess?: boolean | undefined;
|
|
498
498
|
/**
|
|
499
|
-
* Set this value to `false` to disable public access to your cluster's Kubernetes API server endpoint. If you disable public access, your cluster's Kubernetes API server can only receive requests from within the cluster VPC. The default value for this parameter is `true` , which enables public access for your Kubernetes API server. For more information, see [
|
|
499
|
+
* Set this value to `false` to disable public access to your cluster's Kubernetes API server endpoint. If you disable public access, your cluster's Kubernetes API server can only receive requests from within the cluster VPC. The default value for this parameter is `true` , which enables public access for your Kubernetes API server. The endpoint domain name and IP address family depends on the value of the `ipFamily` for the cluster. For more information, see [Cluster API server endpoint](https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html) in the **Amazon EKS User Guide** .
|
|
500
500
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-cluster-resourcesvpcconfig.html#cfn-eks-cluster-resourcesvpcconfig-endpointpublicaccess}
|
|
501
501
|
*/
|
|
502
502
|
EndpointPublicAccess?: boolean | undefined;
|
|
503
503
|
/**
|
|
504
|
-
* The CIDR blocks that are allowed access to your cluster's public Kubernetes API server endpoint. Communication to the endpoint from addresses outside of the CIDR blocks that you specify is denied. The default value is `0.0.0.0/0` . If you've disabled private endpoint access, make sure that you specify the necessary CIDR blocks for every node and AWS Fargate `Pod` in the cluster. For more information, see [
|
|
504
|
+
* The CIDR blocks that are allowed access to your cluster's public Kubernetes API server endpoint. Communication to the endpoint from addresses outside of the CIDR blocks that you specify is denied. The default value is `0.0.0.0/0` and additionally `::/0` for dual-stack `IPv6` clusters. If you've disabled private endpoint access, make sure that you specify the necessary CIDR blocks for every node and AWS Fargate `Pod` in the cluster. For more information, see [Cluster API server endpoint](https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html) in the **Amazon EKS User Guide** .
|
|
505
|
+
*
|
|
506
|
+
* Note that the public endpoints are dual-stack for only `IPv6` clusters that are made after October 2024. You can't add `IPv6` CIDR blocks to `IPv4` clusters or `IPv6` clusters that were made before October 2024.
|
|
505
507
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-cluster-resourcesvpcconfig.html#cfn-eks-cluster-resourcesvpcconfig-publicaccesscidrs}
|
|
506
508
|
*/
|
|
507
509
|
PublicAccessCidrs?: string[] | undefined;
|
|
@@ -16,12 +16,20 @@ export type EKSPodIdentityAssociationProps = {
|
|
|
16
16
|
*/
|
|
17
17
|
ClusterName: string;
|
|
18
18
|
/**
|
|
19
|
-
* The
|
|
19
|
+
* The state of the automatic sessions tags. The value of *true* disables these tags.
|
|
20
|
+
*
|
|
21
|
+
* EKS Pod Identity adds a pre-defined set of session tags when it assumes the role. You can use these tags to author a single role that can work across resources by allowing access to AWS resources based on matching tags. By default, EKS Pod Identity attaches six tags, including tags for cluster name, namespace, and service account name. For the list of tags added by EKS Pod Identity, see [List of session tags added by EKS Pod Identity](https://docs.aws.amazon.com/eks/latest/userguide/pod-id-abac.html#pod-id-abac-tags) in the *Amazon EKS User Guide* .
|
|
22
|
+
* @minLength 1
|
|
23
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-eks-podidentityassociation.html#cfn-eks-podidentityassociation-disablesessiontags}
|
|
24
|
+
*/
|
|
25
|
+
DisableSessionTags?: boolean | undefined;
|
|
26
|
+
/**
|
|
27
|
+
* The name of the Kubernetes namespace inside the cluster to create the association in. The service account and the Pods that use the service account must be in this namespace.
|
|
20
28
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-eks-podidentityassociation.html#cfn-eks-podidentityassociation-namespace}
|
|
21
29
|
*/
|
|
22
30
|
Namespace: string;
|
|
23
31
|
/**
|
|
24
|
-
* The Amazon Resource Name (ARN) of the IAM role to associate with the service account. The EKS Pod Identity agent manages credentials to assume this role for applications in the containers in the
|
|
32
|
+
* The Amazon Resource Name (ARN) of the IAM role to associate with the service account. The EKS Pod Identity agent manages credentials to assume this role for applications in the containers in the Pods that use this service account.
|
|
25
33
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-eks-podidentityassociation.html#cfn-eks-podidentityassociation-rolearn}
|
|
26
34
|
*/
|
|
27
35
|
RoleArn: string;
|
|
@@ -45,6 +53,12 @@ export type EKSPodIdentityAssociationProps = {
|
|
|
45
53
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-eks-podidentityassociation.html#cfn-eks-podidentityassociation-tags}
|
|
46
54
|
*/
|
|
47
55
|
Tags?: Tag[] | undefined;
|
|
56
|
+
/**
|
|
57
|
+
* The Amazon Resource Name (ARN) of the target IAM role to associate with the service account. This role is assumed by using the EKS Pod Identity association role, then the credentials for this role are injected into the Pod.
|
|
58
|
+
* @minLength 1
|
|
59
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-eks-podidentityassociation.html#cfn-eks-podidentityassociation-targetrolearn}
|
|
60
|
+
*/
|
|
61
|
+
TargetRoleArn?: string | undefined;
|
|
48
62
|
};
|
|
49
63
|
/**
|
|
50
64
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-eks-podidentityassociation.html#aws-resource-eks-podidentityassociation-return-values}
|
|
@@ -61,5 +75,13 @@ export type EKSPodIdentityAssociationAttribs = {
|
|
|
61
75
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-eks-podidentityassociation.html#cfn-eks-podidentityassociation-associationid}
|
|
62
76
|
*/
|
|
63
77
|
AssociationId: string;
|
|
78
|
+
/**
|
|
79
|
+
* The unique identifier for this EKS Pod Identity association for a target IAM role. You put this value in the trust policy of the target role, in a `Condition` to match the `sts.ExternalId` . This ensures that the target role can only be assumed by this association. This prevents the *confused deputy problem* . For more information about the confused deputy problem, see [The confused deputy problem](https://docs.aws.amazon.com/IAM/latest/UserGuide/confused-deputy.html) in the *IAM User Guide* .
|
|
80
|
+
*
|
|
81
|
+
* If you want to use the same target role with multiple associations or other roles, use independent statements in the trust policy to allow `sts:AssumeRole` access from each role.
|
|
82
|
+
* @minLength 1
|
|
83
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-eks-podidentityassociation.html#cfn-eks-podidentityassociation-externalid}
|
|
84
|
+
*/
|
|
85
|
+
ExternalId: string;
|
|
64
86
|
};
|
|
65
87
|
//# sourceMappingURL=aws-eks-podidentityassociation.d.ts.map
|
|
@@ -1,11 +1,15 @@
|
|
|
1
1
|
import type { ResourceDefinitionWithAttributes, Tag } from "../main.ts";
|
|
2
2
|
/**
|
|
3
|
-
* Creates a
|
|
3
|
+
* Creates a matching workflow that defines the configuration for a data processing job. The workflow name must be unique. To modify an existing workflow, use `UpdateMatchingWorkflow` .
|
|
4
|
+
*
|
|
5
|
+
* > For workflows where `resolutionType` is ML_MATCHING, incremental processing is not supported.
|
|
4
6
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-entityresolution-matchingworkflow.html}
|
|
5
7
|
*/
|
|
6
8
|
export type EntityResolutionMatchingWorkflow = ResourceDefinitionWithAttributes<"AWS::EntityResolution::MatchingWorkflow", EntityResolutionMatchingWorkflowProps, EntityResolutionMatchingWorkflowAttribs>;
|
|
7
9
|
/**
|
|
8
|
-
* Creates a
|
|
10
|
+
* Creates a matching workflow that defines the configuration for a data processing job. The workflow name must be unique. To modify an existing workflow, use `UpdateMatchingWorkflow` .
|
|
11
|
+
*
|
|
12
|
+
* > For workflows where `resolutionType` is ML_MATCHING, incremental processing is not supported.
|
|
9
13
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-entityresolution-matchingworkflow.html}
|
|
10
14
|
*/
|
|
11
15
|
export type EntityResolutionMatchingWorkflowProps = {
|
|
@@ -15,7 +19,9 @@ export type EntityResolutionMatchingWorkflowProps = {
|
|
|
15
19
|
*/
|
|
16
20
|
Description?: string | undefined;
|
|
17
21
|
/**
|
|
18
|
-
* An object
|
|
22
|
+
* Optional. An object that defines the incremental run type. This object contains only the `incrementalRunType` field, which appears as "Automatic" in the console.
|
|
23
|
+
*
|
|
24
|
+
* > For workflows where `resolutionType` is `ML_MATCHING` , incremental processing is not supported.
|
|
19
25
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-entityresolution-matchingworkflow.html#cfn-entityresolution-matchingworkflow-incrementalrunconfig}
|
|
20
26
|
*/
|
|
21
27
|
IncrementalRunConfig?: IncrementalRunConfig | undefined;
|
|
@@ -72,12 +78,16 @@ export type EntityResolutionMatchingWorkflowAttribs = {
|
|
|
72
78
|
WorkflowArn: string;
|
|
73
79
|
};
|
|
74
80
|
/**
|
|
75
|
-
* An object
|
|
81
|
+
* Optional. An object that defines the incremental run type. This object contains only the `incrementalRunType` field, which appears as "Automatic" in the console.
|
|
82
|
+
*
|
|
83
|
+
* > For workflows where `resolutionType` is `ML_MATCHING` , incremental processing is not supported.
|
|
76
84
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-entityresolution-matchingworkflow-incrementalrunconfig.html}
|
|
77
85
|
*/
|
|
78
86
|
export type IncrementalRunConfig = {
|
|
79
87
|
/**
|
|
80
|
-
* The type of incremental run.
|
|
88
|
+
* The type of incremental run. The only valid value is `IMMEDIATE` . This appears as "Automatic" in the console.
|
|
89
|
+
*
|
|
90
|
+
* > For workflows where `resolutionType` is `ML_MATCHING` , incremental processing is not supported.
|
|
81
91
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-entityresolution-matchingworkflow-incrementalrunconfig.html#cfn-entityresolution-matchingworkflow-incrementalrunconfig-incrementalruntype}
|
|
82
92
|
*/
|
|
83
93
|
IncrementalRunType: "IMMEDIATE";
|