@propulsionworks/cloudformation 0.1.12 → 0.1.13

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (33) hide show
  1. package/out/exports/resources.generated/aws-accessanalyzer-analyzer.d.ts +38 -0
  2. package/out/exports/resources.generated/aws-amplify-app.d.ts +30 -0
  3. package/out/exports/resources.generated/aws-cleanrooms-collaboration.d.ts +3 -3
  4. package/out/exports/resources.generated/aws-connect-evaluationform.d.ts +20 -2
  5. package/out/exports/resources.generated/aws-customerprofiles-segmentdefinition.d.ts +30 -0
  6. package/out/exports/resources.generated/aws-datazone-projectprofile.d.ts +101 -0
  7. package/out/exports/resources.generated/aws-deadline-fleet.d.ts +2 -1
  8. package/out/exports/resources.generated/aws-ec2-trafficmirrorfilter.d.ts +7 -1
  9. package/out/exports/resources.generated/aws-ecr-repositorycreationtemplate.d.ts +1 -1
  10. package/out/exports/resources.generated/aws-ecs-service.d.ts +60 -2
  11. package/out/exports/resources.generated/aws-inspectorv2-filter.d.ts +56 -0
  12. package/out/exports/resources.generated/aws-kendra-datasource.d.ts +113 -1
  13. package/out/exports/resources.generated/aws-kms-key.d.ts +9 -2
  14. package/out/exports/resources.generated/aws-lambda-eventsourcemapping.d.ts +0 -7
  15. package/out/exports/resources.generated/aws-mediatailor-playbackconfiguration.d.ts +66 -0
  16. package/out/exports/resources.generated/aws-mpa-approvalteam.d.ts +2 -0
  17. package/out/exports/resources.generated/aws-mpa-identitysource.d.ts +2 -0
  18. package/out/exports/resources.generated/aws-networkfirewall-rulegroup.d.ts +1 -1
  19. package/out/exports/resources.generated/aws-networkfirewall-tlsinspectionconfiguration.d.ts +1 -1
  20. package/out/exports/resources.generated/aws-opsworkscm-server.d.ts +1 -0
  21. package/out/exports/resources.generated/aws-organizations-policy.d.ts +1 -1
  22. package/out/exports/resources.generated/aws-rum-appmonitor.d.ts +1 -1
  23. package/out/exports/resources.generated/aws-sagemaker-model.d.ts +2 -0
  24. package/out/exports/resources.generated/aws-sagemaker-modelpackage.d.ts +2 -0
  25. package/out/exports/resources.generated/aws-securityhub-aggregatorv2.d.ts +44 -0
  26. package/out/exports/resources.generated/aws-securityhub-automationrule.d.ts +1 -1
  27. package/out/exports/resources.generated/aws-securityhub-automationrulev2.d.ts +403 -0
  28. package/out/exports/resources.generated/aws-securityhub-hubv2.d.ts +30 -0
  29. package/out/exports/resources.generated/aws-securityhub-insight.d.ts +1 -1
  30. package/out/exports/resources.generated/aws-synthetics-canary.d.ts +5 -0
  31. package/out/exports/resources.generated/aws-wafv2-rulegroup.d.ts +9 -1
  32. package/out/exports/resources.generated/aws-wafv2-webacl.d.ts +73 -9
  33. package/package.json +1 -1
@@ -244,16 +244,29 @@ export type AWSManagedRulesATPRuleSet = {
244
244
  ResponseInspection?: ResponseInspection | undefined;
245
245
  };
246
246
  /**
247
- * Configures how to use the AntiDDOS AWS managed rule group in the web ACL
247
+ * Configures the use of the anti-DDoS managed rule group, `AWSManagedRulesAntiDDoSRuleSet` . This configuration is used in `ManagedRuleGroupConfig` .
248
+ *
249
+ * The configuration that you provide here determines whether and how the rules in the rule group are used.
250
+ *
251
+ * For additional information about this and the other intelligent threat mitigation rule groups, see [Intelligent threat mitigation in AWS WAF](https://docs.aws.amazon.com/waf/latest/developerguide/waf-managed-protections) and [AWS Managed Rules rule groups list](https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-list) in the *AWS WAF Developer Guide* .
248
252
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-awsmanagedrulesantiddosruleset.html}
249
253
  */
250
254
  export type AWSManagedRulesAntiDDoSRuleSet = {
251
255
  /**
252
- * Client side action config for AntiDDOS AMR.
256
+ * Configures the request handling that's applied by the managed rule group rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` during a distributed denial of service (DDoS) attack.
253
257
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-awsmanagedrulesantiddosruleset.html#cfn-wafv2-webacl-awsmanagedrulesantiddosruleset-clientsideactionconfig}
254
258
  */
255
259
  ClientSideActionConfig: ClientSideActionConfig;
256
260
  /**
261
+ * The sensitivity that the rule group rule `DDoSRequests` uses when matching against the DDoS suspicion labeling on a request. The managed rule group adds the labeling during DDoS events, before the `DDoSRequests` rule runs.
262
+ *
263
+ * The higher the sensitivity, the more levels of labeling that the rule matches:
264
+ *
265
+ * - Low sensitivity is less sensitive, causing the rule to match only on the most likely participants in an attack, which are the requests with the high suspicion label `awswaf:managed:aws:anti-ddos:high-suspicion-ddos-request` .
266
+ * - Medium sensitivity causes the rule to match on the medium and high suspicion labels.
267
+ * - High sensitivity causes the rule to match on all of the suspicion labels: low, medium, and high.
268
+ *
269
+ * Default: `LOW`
257
270
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-awsmanagedrulesantiddosruleset.html#cfn-wafv2-webacl-awsmanagedrulesantiddosruleset-sensitivitytoblock}
258
271
  */
259
272
  SensitivityToBlock?: SensitivityToAct | undefined;
@@ -310,14 +323,19 @@ export type AndStatement = {
310
323
  Statements: Statement[];
311
324
  };
312
325
  /**
326
+ * A rule statement that inspects web traffic based on the Autonomous System Number (ASN) associated with the request's IP address.
327
+ *
328
+ * For additional details, see [ASN match rule statement](https://docs.aws.amazon.com/waf/latest/developerguide/waf-rule-statement-type-asn-match.html) in the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html) .
313
329
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-asnmatchstatement.html}
314
330
  */
315
331
  export type AsnMatchStatement = {
316
332
  /**
333
+ * Contains one or more Autonomous System Numbers (ASNs). ASNs are unique identifiers assigned to large internet networks managed by organizations such as internet service providers, enterprises, universities, or government agencies.
317
334
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-asnmatchstatement.html#cfn-wafv2-webacl-asnmatchstatement-asnlist}
318
335
  */
319
336
  AsnList?: number[] | undefined;
320
337
  /**
338
+ * The configuration for inspecting IP addresses to match against an ASN in an HTTP header that you specify, instead of using the IP address that's reported by the web request origin. Commonly, this is the X-Forwarded-For (XFF) header, but you can specify any header name.
321
339
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-asnmatchstatement.html#cfn-wafv2-webacl-asnmatchstatement-forwardedipconfig}
322
340
  */
323
341
  ForwardedIPConfig?: ForwardedIPConfiguration | undefined;
@@ -537,30 +555,69 @@ export type ChallengeConfig = {
537
555
  ImmunityTimeProperty?: ImmunityTimeProperty | undefined;
538
556
  };
539
557
  /**
540
- * Client side action config for AntiDDOS AMR.
558
+ * This is part of the `AWSManagedRulesAntiDDoSRuleSet` `ClientSideActionConfig` configuration in `ManagedRuleGroupConfig` .
541
559
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-clientsideaction.html}
542
560
  */
543
561
  export type ClientSideAction = {
544
562
  /**
563
+ * The regular expression to match against the web request URI, used to identify requests that can't handle a silent browser challenge. When the `ClientSideAction` setting `UsageOfAction` is enabled, the managed rule group uses this setting to determine which requests to label with `awswaf:managed:aws:anti-ddos:challengeable-request` . If `UsageOfAction` is disabled, this setting has no effect and the managed rule group doesn't add the label to any requests.
564
+ *
565
+ * The anti-DDoS managed rule group doesn't evaluate the rules `ChallengeDDoSRequests` or `ChallengeAllDuringEvent` for web requests whose URIs match this regex. This is true regardless of whether you override the rule action for either of the rules in your web ACL configuration.
566
+ *
567
+ * AWS recommends using a regular expression.
568
+ *
569
+ * This setting is required if `UsageOfAction` is set to `ENABLED` . If required, you can provide between 1 and 5 regex objects in the array of settings.
570
+ *
571
+ * AWS recommends starting with the following setting. Review and update it for your application's needs:
572
+ *
573
+ * `\/api\/|\.(acc|avi|css|gif|jpe?g|js|mp[34]|ogg|otf|pdf|png|tiff?|ttf|webm|webp|woff2?)$`
545
574
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-clientsideaction.html#cfn-wafv2-webacl-clientsideaction-exempturiregularexpressions}
546
575
  */
547
576
  ExemptUriRegularExpressions?: Regex[] | undefined;
548
577
  /**
578
+ * The sensitivity that the rule group rule `ChallengeDDoSRequests` uses when matching against the DDoS suspicion labeling on a request. The managed rule group adds the labeling during DDoS events, before the `ChallengeDDoSRequests` rule runs.
579
+ *
580
+ * The higher the sensitivity, the more levels of labeling that the rule matches:
581
+ *
582
+ * - Low sensitivity is less sensitive, causing the rule to match only on the most likely participants in an attack, which are the requests with the high suspicion label `awswaf:managed:aws:anti-ddos:high-suspicion-ddos-request` .
583
+ * - Medium sensitivity causes the rule to match on the medium and high suspicion labels.
584
+ * - High sensitivity causes the rule to match on all of the suspicion labels: low, medium, and high.
585
+ *
586
+ * Default: `HIGH`
549
587
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-clientsideaction.html#cfn-wafv2-webacl-clientsideaction-sensitivity}
550
588
  */
551
589
  Sensitivity?: SensitivityToAct | undefined;
552
590
  /**
591
+ * Determines whether to use the `AWSManagedRulesAntiDDoSRuleSet` rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` in the rule group evaluation and the related label `awswaf:managed:aws:anti-ddos:challengeable-request` .
592
+ *
593
+ * - If usage is enabled:
594
+ *
595
+ * - The managed rule group adds the label `awswaf:managed:aws:anti-ddos:challengeable-request` to any web request whose URL does *NOT* match the regular expressions provided in the `ClientSideAction` setting `ExemptUriRegularExpressions` .
596
+ * - The two rules are evaluated against web requests for protected resources that are experiencing a DDoS attack. The two rules only apply their action to matching requests that have the label `awswaf:managed:aws:anti-ddos:challengeable-request` .
597
+ * - If usage is disabled:
598
+ *
599
+ * - The managed rule group doesn't add the label `awswaf:managed:aws:anti-ddos:challengeable-request` to any web requests.
600
+ * - The two rules are not evaluated.
601
+ * - None of the other `ClientSideAction` settings have any effect.
602
+ *
603
+ * > This setting only enables or disables the use of the two anti-DDOS rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` in the anti-DDoS managed rule group.
604
+ * >
605
+ * > This setting doesn't alter the action setting in the two rules. To override the actions used by the rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` , enable this setting, and then override the rule actions in the usual way, in your managed rule group configuration.
553
606
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-clientsideaction.html#cfn-wafv2-webacl-clientsideaction-usageofaction}
554
607
  */
555
608
  UsageOfAction: UsageOfAction;
556
609
  };
557
610
  /**
558
- * Client side action config for AntiDDOS AMR.
611
+ * This is part of the configuration for the managed rules `AWSManagedRulesAntiDDoSRuleSet` in `ManagedRuleGroupConfig` .
559
612
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-clientsideactionconfig.html}
560
613
  */
561
614
  export type ClientSideActionConfig = {
562
615
  /**
563
- * Client side action config for AntiDDOS AMR.
616
+ * Configuration for the use of the `AWSManagedRulesAntiDDoSRuleSet` rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` .
617
+ *
618
+ * > This setting isn't related to the configuration of the `Challenge` action itself. It only configures the use of the two anti-DDoS rules named here.
619
+ *
620
+ * You can enable or disable the use of these rules, and you can configure how to use them when they are enabled.
564
621
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-clientsideactionconfig.html#cfn-wafv2-webacl-clientsideactionconfig-challenge}
565
622
  */
566
623
  Challenge: ClientSideAction;
@@ -1367,7 +1424,9 @@ export type ManagedRuleGroupConfig = {
1367
1424
  */
1368
1425
  AWSManagedRulesATPRuleSet?: AWSManagedRulesATPRuleSet | undefined;
1369
1426
  /**
1370
- * Configures how to use the AntiDDOS AWS managed rule group in the web ACL
1427
+ * Additional configuration for using the anti-DDoS managed rule group, `AWSManagedRulesAntiDDoSRuleSet` . Use this to configure anti-DDoS behavior for the rule group.
1428
+ *
1429
+ * For information about using the anti-DDoS managed rule group, see [AWS WAF Anti-DDoS rule group](https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-anti-ddos.html) and [Distributed Denial of Service (DDoS) prevention](https://docs.aws.amazon.com/waf/latest/developerguide/waf-anti-ddos.html) in the *AWS WAF Developer Guide* .
1371
1430
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-managedrulegroupconfig.html#cfn-wafv2-webacl-managedrulegroupconfig-awsmanagedrulesantiddosruleset}
1372
1431
  */
1373
1432
  AWSManagedRulesAntiDDoSRuleSet?: AWSManagedRulesAntiDDoSRuleSet | undefined;
@@ -1478,11 +1537,12 @@ export type NotStatement = {
1478
1537
  Statement: Statement;
1479
1538
  };
1480
1539
  /**
1481
- * Configures the options for on-source DDoS protection provided by supported resource type.
1540
+ * Configures the level of DDoS protection that applies to web ACLs associated with Application Load Balancers.
1482
1541
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-onsourceddosprotectionconfig.html}
1483
1542
  */
1484
1543
  export type OnSourceDDoSProtectionConfig = {
1485
1544
  /**
1545
+ * The level of DDoS protection that applies to web ACLs associated with Application Load Balancers. `ACTIVE_UNDER_DDOS` protection is enabled by default whenever a web ACL is associated with an Application Load Balancer. In the event that an Application Load Balancer experiences high-load conditions or suspected DDoS attacks, the `ACTIVE_UNDER_DDOS` protection automatically rate limits traffic from known low reputation sources without disrupting Application Load Balancer availability. `ALWAYS_ON` protection provides constant, always-on monitoring of known low reputation sources for suspected DDoS attacks. While this provides a higher level of protection, there may be potential impacts on legitimate traffic.
1486
1546
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-onsourceddosprotectionconfig.html#cfn-wafv2-webacl-onsourceddosprotectionconfig-alblowreputationmode}
1487
1547
  */
1488
1548
  ALBLowReputationMode: "ACTIVE_UNDER_DDOS" | "ALWAYS_ON";
@@ -1647,7 +1707,7 @@ export type RateBasedStatement = {
1647
1707
  */
1648
1708
  export type RateBasedStatementCustomKey = {
1649
1709
  /**
1650
- * Specifies the request's ASN as an aggregate key for a rate-based rule.
1710
+ * Use an Autonomous System Number (ASN) derived from the request's originating or forwarded IP address as an aggregate key. Each distinct ASN contributes to the aggregation instance.
1651
1711
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-ratebasedstatementcustomkey.html#cfn-wafv2-webacl-ratebasedstatementcustomkey-asn}
1652
1712
  */
1653
1713
  ASN?: Record<string, unknown> | undefined;
@@ -1845,11 +1905,12 @@ export type RateLimitUriPath = {
1845
1905
  TextTransformations: TextTransformation[];
1846
1906
  };
1847
1907
  /**
1848
- * Regex
1908
+ * A single regular expression. This is used in a `RegexPatternSet` and also in the configuration for the AWS Managed Rules rule group `AWSManagedRulesAntiDDoSRuleSet` .
1849
1909
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-regex.html}
1850
1910
  */
1851
1911
  export type Regex = {
1852
1912
  /**
1913
+ * The string representing the regular expression.
1853
1914
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-regex.html#cfn-wafv2-webacl-regex-regexstring}
1854
1915
  */
1855
1916
  RegexString?: string | undefined;
@@ -2461,6 +2522,9 @@ export type Statement = {
2461
2522
  */
2462
2523
  AndStatement?: AndStatement | undefined;
2463
2524
  /**
2525
+ * A rule statement that inspects web traffic based on the Autonomous System Number (ASN) associated with the request's IP address.
2526
+ *
2527
+ * For additional details, see [ASN match rule statement](https://docs.aws.amazon.com/waf/latest/developerguide/waf-rule-statement-type-asn-match.html) in the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html) .
2464
2528
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-statement.html#cfn-wafv2-webacl-statement-asnmatchstatement}
2465
2529
  */
2466
2530
  AsnMatchStatement?: AsnMatchStatement | undefined;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@propulsionworks/cloudformation",
3
- "version": "0.1.12",
3
+ "version": "0.1.13",
4
4
  "author": {
5
5
  "name": "Gordon Leigh"
6
6
  },