@propulsionworks/cloudformation 0.1.11 → 0.1.13

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (57) hide show
  1. package/out/exports/resources.generated/aws-accessanalyzer-analyzer.d.ts +38 -0
  2. package/out/exports/resources.generated/aws-amplify-app.d.ts +32 -2
  3. package/out/exports/resources.generated/aws-apigateway-method.d.ts +1 -1
  4. package/out/exports/resources.generated/aws-appsync-apicache.d.ts +4 -0
  5. package/out/exports/resources.generated/aws-athena-workgroup.d.ts +37 -0
  6. package/out/exports/resources.generated/aws-bedrock-flow.d.ts +48 -21
  7. package/out/exports/resources.generated/aws-cleanrooms-collaboration.d.ts +3 -3
  8. package/out/exports/resources.generated/aws-connect-emailaddress.d.ts +1 -1
  9. package/out/exports/resources.generated/aws-connect-evaluationform.d.ts +20 -2
  10. package/out/exports/resources.generated/aws-connect-queue.d.ts +1 -1
  11. package/out/exports/resources.generated/aws-customerprofiles-calculatedattributedefinition.d.ts +50 -1
  12. package/out/exports/resources.generated/aws-customerprofiles-objecttype.d.ts +13 -1
  13. package/out/exports/resources.generated/aws-customerprofiles-segmentdefinition.d.ts +34 -4
  14. package/out/exports/resources.generated/aws-datazone-projectprofile.d.ts +101 -0
  15. package/out/exports/resources.generated/aws-deadline-fleet.d.ts +3 -1
  16. package/out/exports/resources.generated/aws-dsql-cluster.d.ts +17 -9
  17. package/out/exports/resources.generated/aws-ec2-ec2fleet.d.ts +55 -0
  18. package/out/exports/resources.generated/aws-ec2-egressonlyinternetgateway.d.ts +6 -1
  19. package/out/exports/resources.generated/aws-ec2-trafficmirrorfilter.d.ts +7 -1
  20. package/out/exports/resources.generated/aws-ecr-repositorycreationtemplate.d.ts +1 -1
  21. package/out/exports/resources.generated/aws-ecs-service.d.ts +60 -2
  22. package/out/exports/resources.generated/aws-efs-mounttarget.d.ts +15 -3
  23. package/out/exports/resources.generated/aws-eks-addon.d.ts +3 -3
  24. package/out/exports/resources.generated/aws-eks-cluster.d.ts +14 -12
  25. package/out/exports/resources.generated/aws-eks-podidentityassociation.d.ts +24 -2
  26. package/out/exports/resources.generated/aws-entityresolution-matchingworkflow.d.ts +15 -5
  27. package/out/exports/resources.generated/aws-evs-environment.d.ts +62 -7
  28. package/out/exports/resources.generated/aws-fis-experimenttemplate.d.ts +1 -1
  29. package/out/exports/resources.generated/aws-inspectorv2-filter.d.ts +56 -0
  30. package/out/exports/resources.generated/aws-kendra-datasource.d.ts +113 -1
  31. package/out/exports/resources.generated/aws-kms-key.d.ts +10 -3
  32. package/out/exports/resources.generated/aws-lambda-eventinvokeconfig.d.ts +4 -2
  33. package/out/exports/resources.generated/aws-lambda-eventsourcemapping.d.ts +2 -9
  34. package/out/exports/resources.generated/aws-mediatailor-playbackconfiguration.d.ts +66 -0
  35. package/out/exports/resources.generated/aws-mpa-approvalteam.d.ts +2 -0
  36. package/out/exports/resources.generated/aws-mpa-identitysource.d.ts +2 -0
  37. package/out/exports/resources.generated/aws-msk-cluster.d.ts +15 -1
  38. package/out/exports/resources.generated/aws-mwaa-environment.d.ts +10 -0
  39. package/out/exports/resources.generated/aws-networkfirewall-loggingconfiguration.d.ts +4 -0
  40. package/out/exports/resources.generated/aws-networkfirewall-rulegroup.d.ts +1 -1
  41. package/out/exports/resources.generated/aws-networkfirewall-tlsinspectionconfiguration.d.ts +1 -1
  42. package/out/exports/resources.generated/aws-networkfirewall-vpcendpointassociation.d.ts +38 -6
  43. package/out/exports/resources.generated/aws-opsworkscm-server.d.ts +6 -5
  44. package/out/exports/resources.generated/aws-organizations-policy.d.ts +1 -1
  45. package/out/exports/resources.generated/aws-rum-appmonitor.d.ts +1 -1
  46. package/out/exports/resources.generated/aws-sagemaker-domain.d.ts +65 -0
  47. package/out/exports/resources.generated/aws-sagemaker-model.d.ts +2 -0
  48. package/out/exports/resources.generated/aws-sagemaker-modelpackage.d.ts +2 -0
  49. package/out/exports/resources.generated/aws-securityhub-aggregatorv2.d.ts +44 -0
  50. package/out/exports/resources.generated/aws-securityhub-automationrule.d.ts +1 -1
  51. package/out/exports/resources.generated/aws-securityhub-automationrulev2.d.ts +403 -0
  52. package/out/exports/resources.generated/aws-securityhub-hubv2.d.ts +30 -0
  53. package/out/exports/resources.generated/aws-securityhub-insight.d.ts +1 -1
  54. package/out/exports/resources.generated/aws-synthetics-canary.d.ts +5 -0
  55. package/out/exports/resources.generated/aws-wafv2-rulegroup.d.ts +31 -1
  56. package/out/exports/resources.generated/aws-wafv2-webacl.d.ts +175 -4
  57. package/package.json +1 -1
@@ -98,9 +98,10 @@ export type WAFv2WebACLProps = {
98
98
  */
99
99
  Name?: string | undefined;
100
100
  /**
101
+ * Configures the level of DDoS protection that applies to web ACLs associated with Application Load Balancers.
101
102
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-wafv2-webacl.html#cfn-wafv2-webacl-onsourceddosprotectionconfig}
102
103
  */
103
- OnSourceDDoSProtectionConfig?: unknown;
104
+ OnSourceDDoSProtectionConfig?: OnSourceDDoSProtectionConfig | undefined;
104
105
  /**
105
106
  * The rule statements used to identify the web requests that you want to manage. Each rule includes one top-level statement that AWS WAF uses to identify matching web requests, and parameters that govern how AWS WAF handles them.
106
107
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-wafv2-webacl.html#cfn-wafv2-webacl-rules}
@@ -167,6 +168,8 @@ export type WAFv2WebACLAttribs = {
167
168
  };
168
169
  /**
169
170
  * Details for your use of the account creation fraud prevention managed rule group, `AWSManagedRulesACFPRuleSet` . This configuration is used in `ManagedRuleGroupConfig` .
171
+ *
172
+ * For additional information about this and the other intelligent threat mitigation rule groups, see [Intelligent threat mitigation in AWS WAF](https://docs.aws.amazon.com/waf/latest/developerguide/waf-managed-protections) and [AWS Managed Rules rule groups list](https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-list) in the *AWS WAF Developer Guide* .
170
173
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-awsmanagedrulesacfpruleset.html}
171
174
  */
172
175
  export type AWSManagedRulesACFPRuleSet = {
@@ -208,6 +211,8 @@ export type AWSManagedRulesACFPRuleSet = {
208
211
  };
209
212
  /**
210
213
  * Details for your use of the account takeover prevention managed rule group, `AWSManagedRulesATPRuleSet` . This configuration is used in `ManagedRuleGroupConfig` .
214
+ *
215
+ * For additional information about this and the other intelligent threat mitigation rule groups, see [Intelligent threat mitigation in AWS WAF](https://docs.aws.amazon.com/waf/latest/developerguide/waf-managed-protections) and [AWS Managed Rules rule groups list](https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-list) in the *AWS WAF Developer Guide* .
211
216
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-awsmanagedrulesatpruleset.html}
212
217
  */
213
218
  export type AWSManagedRulesATPRuleSet = {
@@ -238,8 +243,38 @@ export type AWSManagedRulesATPRuleSet = {
238
243
  */
239
244
  ResponseInspection?: ResponseInspection | undefined;
240
245
  };
246
+ /**
247
+ * Configures the use of the anti-DDoS managed rule group, `AWSManagedRulesAntiDDoSRuleSet` . This configuration is used in `ManagedRuleGroupConfig` .
248
+ *
249
+ * The configuration that you provide here determines whether and how the rules in the rule group are used.
250
+ *
251
+ * For additional information about this and the other intelligent threat mitigation rule groups, see [Intelligent threat mitigation in AWS WAF](https://docs.aws.amazon.com/waf/latest/developerguide/waf-managed-protections) and [AWS Managed Rules rule groups list](https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-list) in the *AWS WAF Developer Guide* .
252
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-awsmanagedrulesantiddosruleset.html}
253
+ */
254
+ export type AWSManagedRulesAntiDDoSRuleSet = {
255
+ /**
256
+ * Configures the request handling that's applied by the managed rule group rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` during a distributed denial of service (DDoS) attack.
257
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-awsmanagedrulesantiddosruleset.html#cfn-wafv2-webacl-awsmanagedrulesantiddosruleset-clientsideactionconfig}
258
+ */
259
+ ClientSideActionConfig: ClientSideActionConfig;
260
+ /**
261
+ * The sensitivity that the rule group rule `DDoSRequests` uses when matching against the DDoS suspicion labeling on a request. The managed rule group adds the labeling during DDoS events, before the `DDoSRequests` rule runs.
262
+ *
263
+ * The higher the sensitivity, the more levels of labeling that the rule matches:
264
+ *
265
+ * - Low sensitivity is less sensitive, causing the rule to match only on the most likely participants in an attack, which are the requests with the high suspicion label `awswaf:managed:aws:anti-ddos:high-suspicion-ddos-request` .
266
+ * - Medium sensitivity causes the rule to match on the medium and high suspicion labels.
267
+ * - High sensitivity causes the rule to match on all of the suspicion labels: low, medium, and high.
268
+ *
269
+ * Default: `LOW`
270
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-awsmanagedrulesantiddosruleset.html#cfn-wafv2-webacl-awsmanagedrulesantiddosruleset-sensitivitytoblock}
271
+ */
272
+ SensitivityToBlock?: SensitivityToAct | undefined;
273
+ };
241
274
  /**
242
275
  * Details for your use of the Bot Control managed rule group, `AWSManagedRulesBotControlRuleSet` . This configuration is used in `ManagedRuleGroupConfig` .
276
+ *
277
+ * For additional information about this and the other intelligent threat mitigation rule groups, see [Intelligent threat mitigation in AWS WAF](https://docs.aws.amazon.com/waf/latest/developerguide/waf-managed-protections) and [AWS Managed Rules rule groups list](https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-list) in the *AWS WAF Developer Guide* .
243
278
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-awsmanagedrulesbotcontrolruleset.html}
244
279
  */
245
280
  export type AWSManagedRulesBotControlRuleSet = {
@@ -287,6 +322,24 @@ export type AndStatement = {
287
322
  */
288
323
  Statements: Statement[];
289
324
  };
325
+ /**
326
+ * A rule statement that inspects web traffic based on the Autonomous System Number (ASN) associated with the request's IP address.
327
+ *
328
+ * For additional details, see [ASN match rule statement](https://docs.aws.amazon.com/waf/latest/developerguide/waf-rule-statement-type-asn-match.html) in the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html) .
329
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-asnmatchstatement.html}
330
+ */
331
+ export type AsnMatchStatement = {
332
+ /**
333
+ * Contains one or more Autonomous System Numbers (ASNs). ASNs are unique identifiers assigned to large internet networks managed by organizations such as internet service providers, enterprises, universities, or government agencies.
334
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-asnmatchstatement.html#cfn-wafv2-webacl-asnmatchstatement-asnlist}
335
+ */
336
+ AsnList?: number[] | undefined;
337
+ /**
338
+ * The configuration for inspecting IP addresses to match against an ASN in an HTTP header that you specify, instead of using the IP address that's reported by the web request origin. Commonly, this is the X-Forwarded-For (XFF) header, but you can specify any header name.
339
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-asnmatchstatement.html#cfn-wafv2-webacl-asnmatchstatement-forwardedipconfig}
340
+ */
341
+ ForwardedIPConfig?: ForwardedIPConfiguration | undefined;
342
+ };
290
343
  /**
291
344
  * Specifies custom configurations for the associations between the web ACL and protected resources.
292
345
  *
@@ -501,6 +554,74 @@ export type ChallengeConfig = {
501
554
  */
502
555
  ImmunityTimeProperty?: ImmunityTimeProperty | undefined;
503
556
  };
557
+ /**
558
+ * This is part of the `AWSManagedRulesAntiDDoSRuleSet` `ClientSideActionConfig` configuration in `ManagedRuleGroupConfig` .
559
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-clientsideaction.html}
560
+ */
561
+ export type ClientSideAction = {
562
+ /**
563
+ * The regular expression to match against the web request URI, used to identify requests that can't handle a silent browser challenge. When the `ClientSideAction` setting `UsageOfAction` is enabled, the managed rule group uses this setting to determine which requests to label with `awswaf:managed:aws:anti-ddos:challengeable-request` . If `UsageOfAction` is disabled, this setting has no effect and the managed rule group doesn't add the label to any requests.
564
+ *
565
+ * The anti-DDoS managed rule group doesn't evaluate the rules `ChallengeDDoSRequests` or `ChallengeAllDuringEvent` for web requests whose URIs match this regex. This is true regardless of whether you override the rule action for either of the rules in your web ACL configuration.
566
+ *
567
+ * AWS recommends using a regular expression.
568
+ *
569
+ * This setting is required if `UsageOfAction` is set to `ENABLED` . If required, you can provide between 1 and 5 regex objects in the array of settings.
570
+ *
571
+ * AWS recommends starting with the following setting. Review and update it for your application's needs:
572
+ *
573
+ * `\/api\/|\.(acc|avi|css|gif|jpe?g|js|mp[34]|ogg|otf|pdf|png|tiff?|ttf|webm|webp|woff2?)$`
574
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-clientsideaction.html#cfn-wafv2-webacl-clientsideaction-exempturiregularexpressions}
575
+ */
576
+ ExemptUriRegularExpressions?: Regex[] | undefined;
577
+ /**
578
+ * The sensitivity that the rule group rule `ChallengeDDoSRequests` uses when matching against the DDoS suspicion labeling on a request. The managed rule group adds the labeling during DDoS events, before the `ChallengeDDoSRequests` rule runs.
579
+ *
580
+ * The higher the sensitivity, the more levels of labeling that the rule matches:
581
+ *
582
+ * - Low sensitivity is less sensitive, causing the rule to match only on the most likely participants in an attack, which are the requests with the high suspicion label `awswaf:managed:aws:anti-ddos:high-suspicion-ddos-request` .
583
+ * - Medium sensitivity causes the rule to match on the medium and high suspicion labels.
584
+ * - High sensitivity causes the rule to match on all of the suspicion labels: low, medium, and high.
585
+ *
586
+ * Default: `HIGH`
587
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-clientsideaction.html#cfn-wafv2-webacl-clientsideaction-sensitivity}
588
+ */
589
+ Sensitivity?: SensitivityToAct | undefined;
590
+ /**
591
+ * Determines whether to use the `AWSManagedRulesAntiDDoSRuleSet` rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` in the rule group evaluation and the related label `awswaf:managed:aws:anti-ddos:challengeable-request` .
592
+ *
593
+ * - If usage is enabled:
594
+ *
595
+ * - The managed rule group adds the label `awswaf:managed:aws:anti-ddos:challengeable-request` to any web request whose URL does *NOT* match the regular expressions provided in the `ClientSideAction` setting `ExemptUriRegularExpressions` .
596
+ * - The two rules are evaluated against web requests for protected resources that are experiencing a DDoS attack. The two rules only apply their action to matching requests that have the label `awswaf:managed:aws:anti-ddos:challengeable-request` .
597
+ * - If usage is disabled:
598
+ *
599
+ * - The managed rule group doesn't add the label `awswaf:managed:aws:anti-ddos:challengeable-request` to any web requests.
600
+ * - The two rules are not evaluated.
601
+ * - None of the other `ClientSideAction` settings have any effect.
602
+ *
603
+ * > This setting only enables or disables the use of the two anti-DDOS rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` in the anti-DDoS managed rule group.
604
+ * >
605
+ * > This setting doesn't alter the action setting in the two rules. To override the actions used by the rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` , enable this setting, and then override the rule actions in the usual way, in your managed rule group configuration.
606
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-clientsideaction.html#cfn-wafv2-webacl-clientsideaction-usageofaction}
607
+ */
608
+ UsageOfAction: UsageOfAction;
609
+ };
610
+ /**
611
+ * This is part of the configuration for the managed rules `AWSManagedRulesAntiDDoSRuleSet` in `ManagedRuleGroupConfig` .
612
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-clientsideactionconfig.html}
613
+ */
614
+ export type ClientSideActionConfig = {
615
+ /**
616
+ * Configuration for the use of the `AWSManagedRulesAntiDDoSRuleSet` rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` .
617
+ *
618
+ * > This setting isn't related to the configuration of the `Challenge` action itself. It only configures the use of the two anti-DDoS rules named here.
619
+ *
620
+ * You can enable or disable the use of these rules, and you can configure how to use them when they are enabled.
621
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-clientsideactionconfig.html#cfn-wafv2-webacl-clientsideactionconfig-challenge}
622
+ */
623
+ Challenge: ClientSideAction;
624
+ };
504
625
  /**
505
626
  * The filter to use to identify the subset of cookies to inspect in a web request.
506
627
  *
@@ -906,7 +1027,7 @@ export type FieldToProtect = {
906
1027
  *
907
1028
  * > If the specified header isn't present in the request, AWS WAF doesn't apply the rule to the web request at all.
908
1029
  *
909
- * This configuration is used for `GeoMatchStatement` and `RateBasedStatement` . For `IPSetReferenceStatement` , use `IPSetForwardedIPConfig` instead.
1030
+ * This configuration is used for `GeoMatchStatement` , `AsnMatchStatement` , and `RateBasedStatement` . For `IPSetReferenceStatement` , use `IPSetForwardedIPConfig` instead.
910
1031
  *
911
1032
  * AWS WAF only evaluates the first IP address found in the specified HTTP header.
912
1033
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-forwardedipconfiguration.html}
@@ -1302,6 +1423,13 @@ export type ManagedRuleGroupConfig = {
1302
1423
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-managedrulegroupconfig.html#cfn-wafv2-webacl-managedrulegroupconfig-awsmanagedrulesatpruleset}
1303
1424
  */
1304
1425
  AWSManagedRulesATPRuleSet?: AWSManagedRulesATPRuleSet | undefined;
1426
+ /**
1427
+ * Additional configuration for using the anti-DDoS managed rule group, `AWSManagedRulesAntiDDoSRuleSet` . Use this to configure anti-DDoS behavior for the rule group.
1428
+ *
1429
+ * For information about using the anti-DDoS managed rule group, see [AWS WAF Anti-DDoS rule group](https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-anti-ddos.html) and [Distributed Denial of Service (DDoS) prevention](https://docs.aws.amazon.com/waf/latest/developerguide/waf-anti-ddos.html) in the *AWS WAF Developer Guide* .
1430
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-managedrulegroupconfig.html#cfn-wafv2-webacl-managedrulegroupconfig-awsmanagedrulesantiddosruleset}
1431
+ */
1432
+ AWSManagedRulesAntiDDoSRuleSet?: AWSManagedRulesAntiDDoSRuleSet | undefined;
1305
1433
  /**
1306
1434
  * Additional configuration for using the Bot Control managed rule group. Use this to specify the inspection level that you want to use. For information about using the Bot Control managed rule group, see [AWS WAF Bot Control rule group](https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-bot.html) and [AWS WAF Bot Control](https://docs.aws.amazon.com/waf/latest/developerguide/waf-bot-control.html) in the *AWS WAF Developer Guide* .
1307
1435
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-managedrulegroupconfig.html#cfn-wafv2-webacl-managedrulegroupconfig-awsmanagedrulesbotcontrolruleset}
@@ -1353,6 +1481,7 @@ export type ManagedRuleGroupStatement = {
1353
1481
  * The rule groups used for intelligent threat mitigation require additional configuration:
1354
1482
  *
1355
1483
  * - Use the `AWSManagedRulesACFPRuleSet` configuration object to configure the account creation fraud prevention managed rule group. The configuration includes the registration and sign-up pages of your application and the locations in the account creation request payload of data, such as the user email and phone number fields.
1484
+ * - Use the `AWSManagedRulesAntiDDoSRuleSet` configuration object to configure the anti-DDoS managed rule group. The configuration includes the sensitivity levels to use in the rules that typically block and challenge requests that might be participating in DDoS attacks and the specification to use to indicate whether a request can handle a silent browser challenge.
1356
1485
  * - Use the `AWSManagedRulesATPRuleSet` configuration object to configure the account takeover prevention managed rule group. The configuration includes the sign-in page of your application and the locations in the login request payload of data such as the username and password.
1357
1486
  * - Use the `AWSManagedRulesBotControlRuleSet` configuration object to configure the protection level that you want the Bot Control rule group to use.
1358
1487
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-managedrulegroupstatement.html#cfn-wafv2-webacl-managedrulegroupstatement-managedrulegroupconfigs}
@@ -1366,7 +1495,7 @@ export type ManagedRuleGroupStatement = {
1366
1495
  /**
1367
1496
  * Action settings to use in the place of the rule actions that are configured inside the rule group. You specify one override for each rule whose action you want to change.
1368
1497
  *
1369
- * > Take care to verify the rule names in your overrides. If you provide a rule name that doesn't match the name of any rule in the rule group, AWS WAF doesn't return an error and doesn't apply the override setting.
1498
+ * > Verify the rule names in your overrides carefully. With managed rule groups, AWS WAF silently ignores any override that uses an invalid rule name. With customer-owned rule groups, invalid rule names in your overrides will cause web ACL updates to fail. An invalid rule name is any name that doesn't exactly match the case-sensitive name of an existing rule in the rule group.
1370
1499
  *
1371
1500
  * You can use overrides for testing, for example you can override all of rule actions to `Count` and then monitor the resulting count metrics to understand how the rule group would handle your web traffic. You can also permanently override some or all actions, to modify how the rule group manages your web traffic.
1372
1501
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-managedrulegroupstatement.html#cfn-wafv2-webacl-managedrulegroupstatement-ruleactionoverrides}
@@ -1407,6 +1536,17 @@ export type NotStatement = {
1407
1536
  */
1408
1537
  Statement: Statement;
1409
1538
  };
1539
+ /**
1540
+ * Configures the level of DDoS protection that applies to web ACLs associated with Application Load Balancers.
1541
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-onsourceddosprotectionconfig.html}
1542
+ */
1543
+ export type OnSourceDDoSProtectionConfig = {
1544
+ /**
1545
+ * The level of DDoS protection that applies to web ACLs associated with Application Load Balancers. `ACTIVE_UNDER_DDOS` protection is enabled by default whenever a web ACL is associated with an Application Load Balancer. In the event that an Application Load Balancer experiences high-load conditions or suspected DDoS attacks, the `ACTIVE_UNDER_DDOS` protection automatically rate limits traffic from known low reputation sources without disrupting Application Load Balancer availability. `ALWAYS_ON` protection provides constant, always-on monitoring of known low reputation sources for suspected DDoS attacks. While this provides a higher level of protection, there may be potential impacts on legitimate traffic.
1546
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-onsourceddosprotectionconfig.html#cfn-wafv2-webacl-onsourceddosprotectionconfig-alblowreputationmode}
1547
+ */
1548
+ ALBLowReputationMode: "ACTIVE_UNDER_DDOS" | "ALWAYS_ON";
1549
+ };
1410
1550
  /**
1411
1551
  * A logical rule statement used to combine other rule statements with OR logic. You provide more than one `Statement` within the `OrStatement` .
1412
1552
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-orstatement.html}
@@ -1566,6 +1706,11 @@ export type RateBasedStatement = {
1566
1706
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-ratebasedstatementcustomkey.html}
1567
1707
  */
1568
1708
  export type RateBasedStatementCustomKey = {
1709
+ /**
1710
+ * Use an Autonomous System Number (ASN) derived from the request's originating or forwarded IP address as an aggregate key. Each distinct ASN contributes to the aggregation instance.
1711
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-ratebasedstatementcustomkey.html#cfn-wafv2-webacl-ratebasedstatementcustomkey-asn}
1712
+ */
1713
+ ASN?: Record<string, unknown> | undefined;
1569
1714
  /**
1570
1715
  * Use the value of a cookie in the request as an aggregate key. Each distinct value in the cookie contributes to the aggregation instance. If you use a single cookie as your custom key, then each value fully defines an aggregation instance.
1571
1716
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-ratebasedstatementcustomkey.html#cfn-wafv2-webacl-ratebasedstatementcustomkey-cookie}
@@ -1759,6 +1904,17 @@ export type RateLimitUriPath = {
1759
1904
  */
1760
1905
  TextTransformations: TextTransformation[];
1761
1906
  };
1907
+ /**
1908
+ * A single regular expression. This is used in a `RegexPatternSet` and also in the configuration for the AWS Managed Rules rule group `AWSManagedRulesAntiDDoSRuleSet` .
1909
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-regex.html}
1910
+ */
1911
+ export type Regex = {
1912
+ /**
1913
+ * The string representing the regular expression.
1914
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-regex.html#cfn-wafv2-webacl-regex-regexstring}
1915
+ */
1916
+ RegexString?: string | undefined;
1917
+ };
1762
1918
  /**
1763
1919
  * A rule statement used to search web request components for a match against a single regular expression.
1764
1920
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-regexmatchstatement.html}
@@ -2271,7 +2427,7 @@ export type RuleGroupReferenceStatement = {
2271
2427
  /**
2272
2428
  * Action settings to use in the place of the rule actions that are configured inside the rule group. You specify one override for each rule whose action you want to change.
2273
2429
  *
2274
- * > Take care to verify the rule names in your overrides. If you provide a rule name that doesn't match the name of any rule in the rule group, AWS WAF doesn't return an error and doesn't apply the override setting.
2430
+ * > Verify the rule names in your overrides carefully. With managed rule groups, AWS WAF silently ignores any override that uses an invalid rule name. With customer-owned rule groups, invalid rule names in your overrides will cause web ACL updates to fail. An invalid rule name is any name that doesn't exactly match the case-sensitive name of an existing rule in the rule group.
2275
2431
  *
2276
2432
  * You can use overrides for testing, for example you can override all of rule actions to `Count` and then monitor the resulting count metrics to understand how the rule group would handle your web traffic. You can also permanently override some or all actions, to modify how the rule group manages your web traffic.
2277
2433
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-rulegroupreferencestatement.html#cfn-wafv2-webacl-rulegroupreferencestatement-ruleactionoverrides}
@@ -2288,6 +2444,10 @@ export type Scope = "CLOUDFRONT" | "REGIONAL";
2288
2444
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-sensitivitylevel.html}
2289
2445
  */
2290
2446
  export type SensitivityLevel = "LOW" | "HIGH";
2447
+ /**
2448
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-sensitivitytoact.html}
2449
+ */
2450
+ export type SensitivityToAct = "LOW" | "MEDIUM" | "HIGH";
2291
2451
  /**
2292
2452
  * A rule statement that compares a number of bytes against the size of a request component, using a comparison operator, such as greater than (>) or less than (<). For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes.
2293
2453
  *
@@ -2361,6 +2521,13 @@ export type Statement = {
2361
2521
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-statement.html#cfn-wafv2-webacl-statement-andstatement}
2362
2522
  */
2363
2523
  AndStatement?: AndStatement | undefined;
2524
+ /**
2525
+ * A rule statement that inspects web traffic based on the Autonomous System Number (ASN) associated with the request's IP address.
2526
+ *
2527
+ * For additional details, see [ASN match rule statement](https://docs.aws.amazon.com/waf/latest/developerguide/waf-rule-statement-type-asn-match.html) in the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html) .
2528
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-statement.html#cfn-wafv2-webacl-statement-asnmatchstatement}
2529
+ */
2530
+ AsnMatchStatement?: AsnMatchStatement | undefined;
2364
2531
  /**
2365
2532
  * A rule statement that defines a string match search for AWS WAF to apply to web requests. The byte match statement provides the bytes to search for, the location in requests that you want AWS WAF to search, and other settings. The bytes to search for are typically a string that corresponds with ASCII characters. In the AWS WAF console and the developer guide, this is called a string match statement.
2366
2533
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-statement.html#cfn-wafv2-webacl-statement-bytematchstatement}
@@ -2546,6 +2713,10 @@ export type UriFragment = {
2546
2713
  */
2547
2714
  FallbackBehavior?: "MATCH" | "NO_MATCH" | undefined;
2548
2715
  };
2716
+ /**
2717
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-usageofaction.html}
2718
+ */
2719
+ export type UsageOfAction = "ENABLED" | "DISABLED";
2549
2720
  /**
2550
2721
  * Defines and enables Amazon CloudWatch metrics and web request sample collection.
2551
2722
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-visibilityconfig.html}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@propulsionworks/cloudformation",
3
- "version": "0.1.11",
3
+ "version": "0.1.13",
4
4
  "author": {
5
5
  "name": "Gordon Leigh"
6
6
  },