@propulsionworks/cloudformation 0.1.36 → 0.1.37
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/out/exports/resources.generated/aws-athena-workgroup.d.ts +14 -5
- package/out/exports/resources.generated/aws-bedrock-guardrail.d.ts +2 -2
- package/out/exports/resources.generated/aws-bedrock-knowledgebase.d.ts +7 -0
- package/out/exports/resources.generated/aws-cassandra-table.d.ts +1 -0
- package/out/exports/resources.generated/aws-cloudfront-connectionfunction.d.ts +20 -2
- package/out/exports/resources.generated/aws-cloudfront-distribution.d.ts +63 -0
- package/out/exports/resources.generated/aws-cloudfront-truststore.d.ts +101 -0
- package/out/exports/resources.generated/aws-cloudtrail-eventdatastore.d.ts +1 -1
- package/out/exports/resources.generated/aws-cloudtrail-trail.d.ts +8 -5
- package/out/exports/resources.generated/aws-cognito-terms.d.ts +33 -2
- package/out/exports/resources.generated/aws-customerprofiles-segmentdefinition.d.ts +14 -2
- package/out/exports/resources.generated/aws-deadline-fleet.d.ts +12 -16
- package/out/exports/resources.generated/aws-deadline-monitor.d.ts +3 -3
- package/out/exports/resources.generated/aws-directoryservice-microsoftad.d.ts +2 -2
- package/out/exports/resources.generated/aws-directoryservice-simplead.d.ts +2 -2
- package/out/exports/resources.generated/aws-ec2-capacityreservation.d.ts +1 -1
- package/out/exports/resources.generated/aws-ec2-ipamscope.d.ts +1 -1
- package/out/exports/resources.generated/aws-ec2-natgateway.d.ts +31 -0
- package/out/exports/resources.generated/aws-ec2-transitgatewaymeteringpolicy.d.ts +8 -5
- package/out/exports/resources.generated/aws-ec2-transitgatewaymeteringpolicyentry.d.ts +10 -8
- package/out/exports/resources.generated/aws-ec2-volume.d.ts +136 -67
- package/out/exports/resources.generated/aws-ec2-vpcencryptioncontrol.d.ts +36 -14
- package/out/exports/resources.generated/aws-ec2-vpnconnection.d.ts +7 -0
- package/out/exports/resources.generated/aws-ecr-pulltimeupdateexclusion.d.ts +3 -0
- package/out/exports/resources.generated/aws-ecr-signingconfiguration.d.ts +16 -5
- package/out/exports/resources.generated/aws-ecs-capacityprovider.d.ts +1 -1
- package/out/exports/resources.generated/aws-ecs-expressgatewayservice.d.ts +67 -0
- package/out/exports/resources.generated/aws-ecs-service.d.ts +2 -0
- package/out/exports/resources.generated/aws-eks-capability.d.ts +189 -0
- package/out/exports/resources.generated/aws-eks-cluster.d.ts +4 -3
- package/out/exports/resources.generated/aws-elasticloadbalancingv2-listener.d.ts +6 -1
- package/out/exports/resources.generated/aws-elasticloadbalancingv2-listenerrule.d.ts +5 -0
- package/out/exports/resources.generated/aws-elasticloadbalancingv2-loadbalancer.d.ts +3 -0
- package/out/exports/resources.generated/aws-elasticloadbalancingv2-targetgroup.d.ts +10 -8
- package/out/exports/resources.generated/aws-events-rule.d.ts +1 -1
- package/out/exports/resources.generated/aws-fsx-filesystem.d.ts +8 -0
- package/out/exports/resources.generated/aws-fsx-storagevirtualmachine.d.ts +8 -0
- package/out/exports/resources.generated/aws-gamelift-containergroupdefinition.d.ts +1 -1
- package/out/exports/resources.generated/aws-gamelift-fleet.d.ts +3 -3
- package/out/exports/resources.generated/aws-glue-connection.d.ts +0 -30
- package/out/exports/resources.generated/aws-iam-samlprovider.d.ts +4 -4
- package/out/exports/resources.generated/aws-iam-user.d.ts +3 -3
- package/out/exports/resources.generated/aws-kinesisvideo-stream.d.ts +8 -3
- package/out/exports/resources.generated/aws-lambda-capacityprovider.d.ts +179 -0
- package/out/exports/resources.generated/aws-lambda-eventinvokeconfig.d.ts +3 -3
- package/out/exports/resources.generated/aws-lambda-eventsourcemapping.d.ts +6 -5
- package/out/exports/resources.generated/aws-lambda-function.d.ts +71 -2
- package/out/exports/resources.generated/aws-lambda-version.d.ts +23 -0
- package/out/exports/resources.generated/aws-organizations-policy.d.ts +5 -1
- package/out/exports/resources.generated/aws-pcs-cluster.d.ts +7 -6
- package/out/exports/resources.generated/aws-rbin-rule.d.ts +10 -3
- package/out/exports/resources.generated/aws-route53-recordset.d.ts +4 -4
- package/out/exports/resources.generated/aws-route53-recordsetgroup.d.ts +4 -4
- package/out/exports/resources.generated/aws-rtbfabric-outboundexternallink.d.ts +128 -0
- package/out/exports/resources.generated/aws-s3-accesspoint.d.ts +1 -1
- package/out/exports/resources.generated/aws-s3-bucket.d.ts +19 -2
- package/out/exports/resources.generated/aws-s3objectlambda-accesspoint.d.ts +0 -6
- package/out/exports/resources.generated/aws-s3objectlambda-accesspointpolicy.d.ts +0 -2
- package/out/exports/resources.generated/aws-sagemaker-cluster.d.ts +10 -4
- package/out/exports/resources.generated/aws-secretsmanager-rotationschedule.d.ts +3 -3
- package/out/exports/resources.generated/aws-secretsmanager-secret.d.ts +1 -0
- package/out/exports/resources.generated/aws-securityhub-automationrulev2.d.ts +2 -2
- package/out/exports/resources.generated/aws-sso-application.d.ts +2 -2
- package/out/exports/resources.generated/aws-transfer-webapp.d.ts +6 -2
- package/package.json +1 -1
|
@@ -0,0 +1,189 @@
|
|
|
1
|
+
import type { ResourceDefinitionWithAttributes, Tag } from "../main.ts";
|
|
2
|
+
/**
|
|
3
|
+
* Resource Type definition for EKS Capability.
|
|
4
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-eks-capability.html}
|
|
5
|
+
*/
|
|
6
|
+
export type EKSCapability = ResourceDefinitionWithAttributes<"AWS::EKS::Capability", EKSCapabilityProps, EKSCapabilityAttribs>;
|
|
7
|
+
/**
|
|
8
|
+
* Resource Type definition for EKS Capability.
|
|
9
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-eks-capability.html}
|
|
10
|
+
*/
|
|
11
|
+
export type EKSCapabilityProps = {
|
|
12
|
+
/**
|
|
13
|
+
* A unique name for the capability. The name must be unique within your cluster and can contain alphanumeric characters, hyphens, and underscores.
|
|
14
|
+
* @minLength 1
|
|
15
|
+
* @maxLength 100
|
|
16
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-eks-capability.html#cfn-eks-capability-capabilityname}
|
|
17
|
+
*/
|
|
18
|
+
CapabilityName: string;
|
|
19
|
+
/**
|
|
20
|
+
* The name of the EKS cluster where you want to create the capability.
|
|
21
|
+
* @minLength 1
|
|
22
|
+
* @maxLength 100
|
|
23
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-eks-capability.html#cfn-eks-capability-clustername}
|
|
24
|
+
*/
|
|
25
|
+
ClusterName: string;
|
|
26
|
+
/**
|
|
27
|
+
* Configuration settings for a capability. The structure of this object varies depending on the capability type.
|
|
28
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-eks-capability.html#cfn-eks-capability-configuration}
|
|
29
|
+
*/
|
|
30
|
+
Configuration?: CapabilityConfiguration | undefined;
|
|
31
|
+
/**
|
|
32
|
+
* Specifies how Kubernetes resources managed by the capability should be handled when the capability is deleted. Currently, the only supported value is RETAIN which retains all Kubernetes resources managed by the capability when the capability is deleted.
|
|
33
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-eks-capability.html#cfn-eks-capability-deletepropagationpolicy}
|
|
34
|
+
*/
|
|
35
|
+
DeletePropagationPolicy: "RETAIN";
|
|
36
|
+
/**
|
|
37
|
+
* The Amazon Resource Name (ARN) of the IAM role that the capability uses to interact with AWS services. This role must have a trust policy that allows the EKS service principal to assume it, and it must have the necessary permissions for the capability type you're creating.
|
|
38
|
+
* @pattern ^arn:aws[a-z-]*:iam::[0-9]+:role/[a-zA-Z0-9+=,.@_-]+$
|
|
39
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-eks-capability.html#cfn-eks-capability-rolearn}
|
|
40
|
+
*/
|
|
41
|
+
RoleArn: string;
|
|
42
|
+
/**
|
|
43
|
+
* An array of key-value pairs to apply to this resource.
|
|
44
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-eks-capability.html#cfn-eks-capability-tags}
|
|
45
|
+
*/
|
|
46
|
+
Tags?: Tag[] | undefined;
|
|
47
|
+
/**
|
|
48
|
+
* The type of capability to create. Valid values are: ACK (AWS Controllers for Kubernetes, which lets you manage AWS resources directly from Kubernetes), ARGOCD (Argo CD for GitOps-based continuous delivery), or KRO (Kube Resource Orchestrator for composing and managing custom Kubernetes resources).
|
|
49
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-eks-capability.html#cfn-eks-capability-type}
|
|
50
|
+
*/
|
|
51
|
+
Type: "ARGOCD" | "ACK" | "KRO";
|
|
52
|
+
};
|
|
53
|
+
/**
|
|
54
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-eks-capability.html#aws-resource-eks-capability-return-values}
|
|
55
|
+
*/
|
|
56
|
+
export type EKSCapabilityAttribs = {
|
|
57
|
+
/**
|
|
58
|
+
* The Amazon Resource Name (ARN) of the capability.
|
|
59
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-eks-capability.html#cfn-eks-capability-arn}
|
|
60
|
+
*/
|
|
61
|
+
Arn: string;
|
|
62
|
+
/**
|
|
63
|
+
* The ARN of the managed application created in IAM Identity Center for this Argo CD capability. This application is automatically created and managed by EKS.
|
|
64
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-capability-awsidc.html#cfn-eks-capability-awsidc-idcmanagedapplicationarn}
|
|
65
|
+
*/
|
|
66
|
+
"Configuration.ArgoCd.AwsIdc.IdcManagedApplicationArn": string;
|
|
67
|
+
/**
|
|
68
|
+
* The URL of the Argo CD server. Use this URL to access the Argo CD web interface and API.
|
|
69
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-capability-argocd.html#cfn-eks-capability-argocd-serverurl}
|
|
70
|
+
*/
|
|
71
|
+
"Configuration.ArgoCd.ServerUrl": string;
|
|
72
|
+
/**
|
|
73
|
+
* The Unix epoch timestamp in seconds for when the capability was created.
|
|
74
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-eks-capability.html#cfn-eks-capability-createdat}
|
|
75
|
+
*/
|
|
76
|
+
CreatedAt: string;
|
|
77
|
+
/**
|
|
78
|
+
* The Unix epoch timestamp in seconds for when the capability was last modified.
|
|
79
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-eks-capability.html#cfn-eks-capability-modifiedat}
|
|
80
|
+
*/
|
|
81
|
+
ModifiedAt: string;
|
|
82
|
+
/**
|
|
83
|
+
* The current status of the capability. Valid values include: CREATING (the capability is being created), ACTIVE (the capability is running and available), UPDATING (the capability is being updated), DELETING (the capability is being deleted), CREATE_FAILED (the capability creation failed), UPDATE_FAILED (the capability update failed), or DELETE_FAILED (the capability deletion failed).
|
|
84
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-eks-capability.html#cfn-eks-capability-status}
|
|
85
|
+
*/
|
|
86
|
+
Status: string;
|
|
87
|
+
/**
|
|
88
|
+
* The version of the capability software that is currently running.
|
|
89
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-eks-capability.html#cfn-eks-capability-version}
|
|
90
|
+
*/
|
|
91
|
+
Version: string;
|
|
92
|
+
};
|
|
93
|
+
/**
|
|
94
|
+
* Configuration settings for an Argo CD capability. This includes the Kubernetes namespace, IAM Identity Center integration, RBAC role mappings, and network access configuration.
|
|
95
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-capability-argocd.html}
|
|
96
|
+
*/
|
|
97
|
+
export type ArgoCd = {
|
|
98
|
+
/**
|
|
99
|
+
* Configuration for integrating Argo CD with IAM Identity Center. This allows you to use your organization's identity provider for authentication to Argo CD.
|
|
100
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-capability-argocd.html#cfn-eks-capability-argocd-awsidc}
|
|
101
|
+
*/
|
|
102
|
+
AwsIdc: AwsIdc;
|
|
103
|
+
/**
|
|
104
|
+
* The Kubernetes namespace where Argo CD resources will be created. If not specified, the default namespace is used.
|
|
105
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-capability-argocd.html#cfn-eks-capability-argocd-namespace}
|
|
106
|
+
*/
|
|
107
|
+
Namespace?: string | undefined;
|
|
108
|
+
/**
|
|
109
|
+
* Configuration for network access to the Argo CD capability's managed API server endpoint. By default, the Argo CD server is accessible via a public endpoint. You can optionally specify one or more VPC endpoint IDs to enable private connectivity from your VPCs.
|
|
110
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-capability-argocd.html#cfn-eks-capability-argocd-networkaccess}
|
|
111
|
+
*/
|
|
112
|
+
NetworkAccess?: NetworkAccess | undefined;
|
|
113
|
+
/**
|
|
114
|
+
* A list of role mappings that define which IAM Identity Center users or groups have which Argo CD roles. Each mapping associates an Argo CD role (ADMIN, EDITOR, or VIEWER) with one or more IAM Identity Center identities.
|
|
115
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-capability-argocd.html#cfn-eks-capability-argocd-rbacrolemappings}
|
|
116
|
+
*/
|
|
117
|
+
RbacRoleMappings?: ArgoCdRoleMapping[] | undefined;
|
|
118
|
+
};
|
|
119
|
+
/**
|
|
120
|
+
* A mapping between an Argo CD role and IAM Identity Center identities. This defines which users or groups have specific permissions in Argo CD.
|
|
121
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-capability-argocdrolemapping.html}
|
|
122
|
+
*/
|
|
123
|
+
export type ArgoCdRoleMapping = {
|
|
124
|
+
/**
|
|
125
|
+
* A list of IAM Identity Center identities (users or groups) that should be assigned this Argo CD role.
|
|
126
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-capability-argocdrolemapping.html#cfn-eks-capability-argocdrolemapping-identities}
|
|
127
|
+
*/
|
|
128
|
+
Identities: SsoIdentity[];
|
|
129
|
+
/**
|
|
130
|
+
* The Argo CD role to assign. Valid values are: ADMIN (full administrative access to Argo CD), EDITOR (edit access to Argo CD resources), or VIEWER (read-only access to Argo CD resources).
|
|
131
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-capability-argocdrolemapping.html#cfn-eks-capability-argocdrolemapping-role}
|
|
132
|
+
*/
|
|
133
|
+
Role: "ADMIN" | "EDITOR" | "VIEWER";
|
|
134
|
+
};
|
|
135
|
+
/**
|
|
136
|
+
* Configuration for integrating Argo CD with IAM Identity Center. This allows you to use your organization's identity provider for authentication to Argo CD.
|
|
137
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-capability-awsidc.html}
|
|
138
|
+
*/
|
|
139
|
+
export type AwsIdc = {
|
|
140
|
+
/**
|
|
141
|
+
* The ARN of the IAM Identity Center instance to use for authentication.
|
|
142
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-capability-awsidc.html#cfn-eks-capability-awsidc-idcinstancearn}
|
|
143
|
+
*/
|
|
144
|
+
IdcInstanceArn: string;
|
|
145
|
+
/**
|
|
146
|
+
* The Region where your IAM Identity Center instance is located.
|
|
147
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-capability-awsidc.html#cfn-eks-capability-awsidc-idcregion}
|
|
148
|
+
*/
|
|
149
|
+
IdcRegion?: string | undefined;
|
|
150
|
+
};
|
|
151
|
+
/**
|
|
152
|
+
* Configuration settings for a capability. The structure of this object varies depending on the capability type.
|
|
153
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-capability-capabilityconfiguration.html}
|
|
154
|
+
*/
|
|
155
|
+
export type CapabilityConfiguration = {
|
|
156
|
+
/**
|
|
157
|
+
* Configuration settings for an Argo CD capability. This includes the Kubernetes namespace, IAM Identity Center integration, RBAC role mappings, and network access configuration.
|
|
158
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-capability-capabilityconfiguration.html#cfn-eks-capability-capabilityconfiguration-argocd}
|
|
159
|
+
*/
|
|
160
|
+
ArgoCd?: ArgoCd | undefined;
|
|
161
|
+
};
|
|
162
|
+
/**
|
|
163
|
+
* Configuration for network access to the Argo CD capability's managed API server endpoint. By default, the Argo CD server is accessible via a public endpoint. You can optionally specify one or more VPC endpoint IDs to enable private connectivity from your VPCs.
|
|
164
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-capability-networkaccess.html}
|
|
165
|
+
*/
|
|
166
|
+
export type NetworkAccess = {
|
|
167
|
+
/**
|
|
168
|
+
* A list of VPC endpoint IDs to associate with the managed Argo CD API server endpoint. Each VPC endpoint provides private connectivity from a specific VPC to the Argo CD server. You can specify multiple VPC endpoint IDs to enable access from multiple VPCs.
|
|
169
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-capability-networkaccess.html#cfn-eks-capability-networkaccess-vpceids}
|
|
170
|
+
*/
|
|
171
|
+
VpceIds?: string[] | undefined;
|
|
172
|
+
};
|
|
173
|
+
/**
|
|
174
|
+
* An IAM Identity Center identity (user or group) that can be assigned permissions in a capability.
|
|
175
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-capability-ssoidentity.html}
|
|
176
|
+
*/
|
|
177
|
+
export type SsoIdentity = {
|
|
178
|
+
/**
|
|
179
|
+
* The unique identifier of the IAM Identity Center user or group.
|
|
180
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-capability-ssoidentity.html#cfn-eks-capability-ssoidentity-id}
|
|
181
|
+
*/
|
|
182
|
+
Id: string;
|
|
183
|
+
/**
|
|
184
|
+
* The type of identity. Valid values are SSO_USER or SSO_GROUP.
|
|
185
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-capability-ssoidentity.html#cfn-eks-capability-ssoidentity-type}
|
|
186
|
+
*/
|
|
187
|
+
Type: "SSO_USER" | "SSO_GROUP";
|
|
188
|
+
};
|
|
189
|
+
//# sourceMappingURL=aws-eks-capability.d.ts.map
|
|
@@ -57,6 +57,7 @@ export type EKSClusterProps = {
|
|
|
57
57
|
*/
|
|
58
58
|
ComputeConfig?: ComputeConfig | undefined;
|
|
59
59
|
/**
|
|
60
|
+
* The control plane scaling tier configuration. For more information, see EKS Provisioned Control Plane in the Amazon EKS User Guide.
|
|
60
61
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-eks-cluster.html#cfn-eks-cluster-controlplanescalingconfig}
|
|
61
62
|
*/
|
|
62
63
|
ControlPlaneScalingConfig?: ControlPlaneScalingConfig | undefined;
|
|
@@ -202,7 +203,7 @@ export type EKSClusterAttribs = {
|
|
|
202
203
|
*/
|
|
203
204
|
export type AccessConfig = {
|
|
204
205
|
/**
|
|
205
|
-
* The desired authentication mode for the cluster. If you create a cluster by using the EKS API, AWS SDKs, or AWS CloudFormation , the default is `CONFIG_MAP` . If you create the cluster by using the
|
|
206
|
+
* The desired authentication mode for the cluster. If you create a cluster by using the EKS API, AWS SDKs, or AWS CloudFormation , the default is `CONFIG_MAP` . If you create the cluster by using the AWS Management Console , the default value is `API_AND_CONFIG_MAP` .
|
|
206
207
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-cluster-accessconfig.html#cfn-eks-cluster-accessconfig-authenticationmode}
|
|
207
208
|
*/
|
|
208
209
|
AuthenticationMode?: "CONFIG_MAP" | "API_AND_CONFIG_MAP" | "API" | undefined;
|
|
@@ -271,12 +272,12 @@ export type ControlPlanePlacement = {
|
|
|
271
272
|
GroupName?: string | undefined;
|
|
272
273
|
};
|
|
273
274
|
/**
|
|
274
|
-
*
|
|
275
|
+
* The control plane scaling tier configuration. For more information, see EKS Provisioned Control Plane in the Amazon EKS User Guide.
|
|
275
276
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-cluster-controlplanescalingconfig.html}
|
|
276
277
|
*/
|
|
277
278
|
export type ControlPlaneScalingConfig = {
|
|
278
279
|
/**
|
|
279
|
-
* The scaling tier
|
|
280
|
+
* The control plane scaling tier configuration. Available options are `standard` , `tier-xl` , `tier-2xl` , or `tier-4xl` . For more information, see EKS Provisioned Control Plane in the Amazon EKS User Guide.
|
|
280
281
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-eks-cluster-controlplanescalingconfig.html#cfn-eks-cluster-controlplanescalingconfig-tier}
|
|
281
282
|
*/
|
|
282
283
|
Tier?: "standard" | "tier-xl" | "tier-2xl" | "tier-4xl" | undefined;
|
|
@@ -51,7 +51,7 @@ export type ElasticLoadBalancingV2ListenerProps = {
|
|
|
51
51
|
*/
|
|
52
52
|
Port?: number | undefined;
|
|
53
53
|
/**
|
|
54
|
-
* The protocol for connections from clients to the load balancer. For Application Load Balancers, the supported protocols are HTTP and HTTPS. For Network Load Balancers, the supported protocols are TCP, TLS, UDP, and
|
|
54
|
+
* The protocol for connections from clients to the load balancer. For Application Load Balancers, the supported protocols are HTTP and HTTPS. For Network Load Balancers, the supported protocols are TCP, TLS, UDP, TCP_UDP, QUIC, and TCP_QUIC. You can’t specify the UDP, TCP_UDP, QUIC, or TCP_QUIC protocol if dual-stack mode is enabled. You can't specify a protocol for a Gateway Load Balancer.
|
|
55
55
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-elasticloadbalancingv2-listener.html#cfn-elasticloadbalancingv2-listener-protocol}
|
|
56
56
|
*/
|
|
57
57
|
Protocol?: string | undefined;
|
|
@@ -101,6 +101,7 @@ export type Action = {
|
|
|
101
101
|
*/
|
|
102
102
|
ForwardConfig?: ForwardConfig | undefined;
|
|
103
103
|
/**
|
|
104
|
+
* [HTTPS listeners] Information for validating JWT access tokens in client requests. Specify only when `Type` is `jwt-validation` .
|
|
104
105
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-elasticloadbalancingv2-listener-action.html#cfn-elasticloadbalancingv2-listener-action-jwtvalidationconfig}
|
|
105
106
|
*/
|
|
106
107
|
JwtValidationConfig?: JwtValidationConfig | undefined;
|
|
@@ -369,18 +370,22 @@ export type ForwardConfig = {
|
|
|
369
370
|
TargetGroups?: TargetGroupTuple[] | undefined;
|
|
370
371
|
};
|
|
371
372
|
/**
|
|
373
|
+
* Information about an additional claim to validate.
|
|
372
374
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-elasticloadbalancingv2-listener-jwtvalidationactionadditionalclaim.html}
|
|
373
375
|
*/
|
|
374
376
|
export type JwtValidationActionAdditionalClaim = {
|
|
375
377
|
/**
|
|
378
|
+
* The format of the claim value.
|
|
376
379
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-elasticloadbalancingv2-listener-jwtvalidationactionadditionalclaim.html#cfn-elasticloadbalancingv2-listener-jwtvalidationactionadditionalclaim-format}
|
|
377
380
|
*/
|
|
378
381
|
Format: string;
|
|
379
382
|
/**
|
|
383
|
+
* The name of the claim. You can't specify `exp` , `iss` , `nbf` , or `iat` because we validate them by default.
|
|
380
384
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-elasticloadbalancingv2-listener-jwtvalidationactionadditionalclaim.html#cfn-elasticloadbalancingv2-listener-jwtvalidationactionadditionalclaim-name}
|
|
381
385
|
*/
|
|
382
386
|
Name: string;
|
|
383
387
|
/**
|
|
388
|
+
* The claim value. The maximum size of the list is 10. Each value can be up to 256 characters in length. If the format is `space-separated-values` , the values can't include spaces.
|
|
384
389
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-elasticloadbalancingv2-listener-jwtvalidationactionadditionalclaim.html#cfn-elasticloadbalancingv2-listener-jwtvalidationactionadditionalclaim-values}
|
|
385
390
|
*/
|
|
386
391
|
Values: string[];
|
|
@@ -87,6 +87,7 @@ export type Action = {
|
|
|
87
87
|
*/
|
|
88
88
|
ForwardConfig?: ForwardConfig | undefined;
|
|
89
89
|
/**
|
|
90
|
+
* [HTTPS listeners] Information for validating JWT access tokens in client requests. Specify only when `Type` is `jwt-validation` .
|
|
90
91
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-elasticloadbalancingv2-listenerrule-action.html#cfn-elasticloadbalancingv2-listenerrule-action-jwtvalidationconfig}
|
|
91
92
|
*/
|
|
92
93
|
JwtValidationConfig?: JwtValidationConfig | undefined;
|
|
@@ -402,18 +403,22 @@ export type HttpRequestMethodConfig = {
|
|
|
402
403
|
Values?: string[] | undefined;
|
|
403
404
|
};
|
|
404
405
|
/**
|
|
406
|
+
* Information about an additional claim to validate.
|
|
405
407
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-elasticloadbalancingv2-listenerrule-jwtvalidationactionadditionalclaim.html}
|
|
406
408
|
*/
|
|
407
409
|
export type JwtValidationActionAdditionalClaim = {
|
|
408
410
|
/**
|
|
411
|
+
* The format of the claim value.
|
|
409
412
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-elasticloadbalancingv2-listenerrule-jwtvalidationactionadditionalclaim.html#cfn-elasticloadbalancingv2-listenerrule-jwtvalidationactionadditionalclaim-format}
|
|
410
413
|
*/
|
|
411
414
|
Format: string;
|
|
412
415
|
/**
|
|
416
|
+
* The name of the claim. You can't specify `exp` , `iss` , `nbf` , or `iat` because we validate them by default.
|
|
413
417
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-elasticloadbalancingv2-listenerrule-jwtvalidationactionadditionalclaim.html#cfn-elasticloadbalancingv2-listenerrule-jwtvalidationactionadditionalclaim-name}
|
|
414
418
|
*/
|
|
415
419
|
Name: string;
|
|
416
420
|
/**
|
|
421
|
+
* The claim value. The maximum size of the list is 10. Each value can be up to 256 characters in length. If the format is `space-separated-values` , the values can't include spaces.
|
|
417
422
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-elasticloadbalancingv2-listenerrule-jwtvalidationactionadditionalclaim.html#cfn-elasticloadbalancingv2-listenerrule-jwtvalidationactionadditionalclaim-values}
|
|
418
423
|
*/
|
|
419
424
|
Values: string[];
|
|
@@ -178,6 +178,9 @@ export type LoadBalancerAttribute = {
|
|
|
178
178
|
* - `connection_logs.s3.enabled` - Indicates whether connection logs are enabled. The value is `true` or `false` . The default is `false` .
|
|
179
179
|
* - `connection_logs.s3.bucket` - The name of the S3 bucket for the connection logs. This attribute is required if connection logs are enabled. The bucket must exist in the same region as the load balancer and have a bucket policy that grants Elastic Load Balancing permissions to write to the bucket.
|
|
180
180
|
* - `connection_logs.s3.prefix` - The prefix for the location in the S3 bucket for the connection logs.
|
|
181
|
+
* - `health_check_logs.s3.enabled` - Indicates whether health check logs are enabled. The value is `true` or `false` . The default is `false` .
|
|
182
|
+
* - `health_check_logs.s3.bucket` - The name of the S3 bucket for the health check logs. This attribute is required if health check logs are enabled. The bucket must exist in the same region as the load balancer and have a bucket policy that grants Elastic Load Balancing permissions to write to the bucket.
|
|
183
|
+
* - `health_check_logs.s3.prefix` - The prefix for the location in the S3 bucket for the health check logs.
|
|
181
184
|
* - `routing.http.desync_mitigation_mode` - Determines how the load balancer handles requests that might pose a security risk to your application. The possible values are `monitor` , `defensive` , and `strictest` . The default is `defensive` .
|
|
182
185
|
* - `routing.http.drop_invalid_header_fields.enabled` - Indicates whether HTTP headers with invalid header fields are removed by the load balancer ( `true` ) or routed to targets ( `false` ). The default is `false` .
|
|
183
186
|
* - `routing.http.preserve_host_header.enabled` - Indicates whether the Application Load Balancer should preserve the `Host` header in the HTTP request and send it to the target without any change. The possible values are `true` and `false` . The default is `false` .
|
|
@@ -19,7 +19,7 @@ export type ElasticLoadBalancingV2TargetGroupProps = {
|
|
|
19
19
|
*/
|
|
20
20
|
HealthCheckEnabled?: boolean | undefined;
|
|
21
21
|
/**
|
|
22
|
-
* The approximate amount of time, in seconds, between health checks of an individual target. The range is 5-300. If the target group protocol is TCP, TLS, UDP, TCP_UDP, HTTP or HTTPS, the default is 30 seconds. If the target group protocol is GENEVE, the default is 10 seconds. If the target type is `lambda` , the default is 35 seconds.
|
|
22
|
+
* The approximate amount of time, in seconds, between health checks of an individual target. The range is 5-300. If the target group protocol is TCP, TLS, UDP, TCP_UDP, QUIC, TCP_QUIC, HTTP or HTTPS, the default is 30 seconds. If the target group protocol is GENEVE, the default is 10 seconds. If the target type is `lambda` , the default is 35 seconds.
|
|
23
23
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-elasticloadbalancingv2-targetgroup.html#cfn-elasticloadbalancingv2-targetgroup-healthcheckintervalseconds}
|
|
24
24
|
*/
|
|
25
25
|
HealthCheckIntervalSeconds?: number | undefined;
|
|
@@ -33,12 +33,12 @@ export type ElasticLoadBalancingV2TargetGroupProps = {
|
|
|
33
33
|
*/
|
|
34
34
|
HealthCheckPath?: string | undefined;
|
|
35
35
|
/**
|
|
36
|
-
* The port the load balancer uses when performing health checks on targets. If the protocol is HTTP, HTTPS, TCP, TLS, UDP,
|
|
36
|
+
* The port the load balancer uses when performing health checks on targets. If the protocol is HTTP, HTTPS, TCP, TLS, UDP, TCP_UDP, QUIC, or TCP_QUIC the default is `traffic-port` , which is the port on which each target receives traffic from the load balancer. If the protocol is GENEVE, the default is port 80.
|
|
37
37
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-elasticloadbalancingv2-targetgroup.html#cfn-elasticloadbalancingv2-targetgroup-healthcheckport}
|
|
38
38
|
*/
|
|
39
39
|
HealthCheckPort?: string | undefined;
|
|
40
40
|
/**
|
|
41
|
-
* The protocol the load balancer uses when performing health checks on targets. For Application Load Balancers, the default is HTTP. For Network Load Balancers and Gateway Load Balancers, the default is TCP. The TCP protocol is not supported for health checks if the protocol of the target group is HTTP or HTTPS. The GENEVE, TLS, UDP, and
|
|
41
|
+
* The protocol the load balancer uses when performing health checks on targets. For Application Load Balancers, the default is HTTP. For Network Load Balancers and Gateway Load Balancers, the default is TCP. The TCP protocol is not supported for health checks if the protocol of the target group is HTTP or HTTPS. The GENEVE, TLS, UDP, TCP_UDP, QUIC, and TCP_QUIC protocols are not supported for health checks.
|
|
42
42
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-elasticloadbalancingv2-targetgroup.html#cfn-elasticloadbalancingv2-targetgroup-healthcheckprotocol}
|
|
43
43
|
*/
|
|
44
44
|
HealthCheckProtocol?: string | undefined;
|
|
@@ -58,7 +58,7 @@ export type ElasticLoadBalancingV2TargetGroupProps = {
|
|
|
58
58
|
*/
|
|
59
59
|
IpAddressType?: string | undefined;
|
|
60
60
|
/**
|
|
61
|
-
* [HTTP/HTTPS health checks] The HTTP or gRPC codes to use when checking for a successful response from a target. For target groups with a protocol of TCP, TCP_UDP, UDP or TLS the range is 200-599. For target groups with a protocol of HTTP or HTTPS, the range is 200-499. For target groups with a protocol of GENEVE, the range is 200-399.
|
|
61
|
+
* [HTTP/HTTPS health checks] The HTTP or gRPC codes to use when checking for a successful response from a target. For target groups with a protocol of TCP, TCP_UDP, UDP, QUIC, TCP_QUIC, or TLS the range is 200-599. For target groups with a protocol of HTTP or HTTPS, the range is 200-499. For target groups with a protocol of GENEVE, the range is 200-399.
|
|
62
62
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-elasticloadbalancingv2-targetgroup.html#cfn-elasticloadbalancingv2-targetgroup-matcher}
|
|
63
63
|
*/
|
|
64
64
|
Matcher?: Matcher | undefined;
|
|
@@ -75,7 +75,7 @@ export type ElasticLoadBalancingV2TargetGroupProps = {
|
|
|
75
75
|
*/
|
|
76
76
|
Port?: number | undefined;
|
|
77
77
|
/**
|
|
78
|
-
* The protocol to use for routing traffic to the targets. For Application Load Balancers, the supported protocols are HTTP and HTTPS. For Network Load Balancers, the supported protocols are TCP, TLS, UDP, or
|
|
78
|
+
* The protocol to use for routing traffic to the targets. For Application Load Balancers, the supported protocols are HTTP and HTTPS. For Network Load Balancers, the supported protocols are TCP, TLS, UDP, TCP_UDP, QUIC, or TCP_QUIC. For Gateway Load Balancers, the supported protocol is GENEVE. A TCP_UDP listener must be associated with a TCP_UDP target group. A TCP_QUIC listener must be associated with a TCP_QUIC target group. If the target is a Lambda function, this parameter does not apply.
|
|
79
79
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-elasticloadbalancingv2-targetgroup.html#cfn-elasticloadbalancingv2-targetgroup-protocol}
|
|
80
80
|
*/
|
|
81
81
|
Protocol?: string | undefined;
|
|
@@ -90,7 +90,7 @@ export type ElasticLoadBalancingV2TargetGroupProps = {
|
|
|
90
90
|
*/
|
|
91
91
|
Tags?: Tag[] | undefined;
|
|
92
92
|
/**
|
|
93
|
-
* The port
|
|
93
|
+
* The port on which the target control agent and application load balancer exchange management traffic for the target optimizer feature.
|
|
94
94
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-elasticloadbalancingv2-targetgroup.html#cfn-elasticloadbalancingv2-targetgroup-targetcontrolport}
|
|
95
95
|
*/
|
|
96
96
|
TargetControlPort?: number | undefined;
|
|
@@ -115,7 +115,7 @@ export type ElasticLoadBalancingV2TargetGroupProps = {
|
|
|
115
115
|
*/
|
|
116
116
|
Targets?: TargetDescription[] | undefined;
|
|
117
117
|
/**
|
|
118
|
-
* The number of consecutive health check failures required before considering a target unhealthy. The range is 2-10. If the target group protocol is TCP, TCP_UDP, UDP, TLS, HTTP or HTTPS, the default is 2. For target groups with a protocol of GENEVE, the default is 2. If the target type is `lambda` , the default is 5.
|
|
118
|
+
* The number of consecutive health check failures required before considering a target unhealthy. The range is 2-10. If the target group protocol is TCP, TCP_UDP, UDP, TLS, QUIC, TCP_QUIC, HTTP or HTTPS, the default is 2. For target groups with a protocol of GENEVE, the default is 2. If the target type is `lambda` , the default is 5.
|
|
119
119
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-elasticloadbalancingv2-targetgroup.html#cfn-elasticloadbalancingv2-targetgroup-unhealthythresholdcount}
|
|
120
120
|
*/
|
|
121
121
|
UnhealthyThresholdCount?: number | undefined;
|
|
@@ -203,7 +203,9 @@ export type TargetDescription = {
|
|
|
203
203
|
*/
|
|
204
204
|
Port?: number | undefined;
|
|
205
205
|
/**
|
|
206
|
-
* The
|
|
206
|
+
* The server ID for the targets. This value is required if the protocol is `QUIC` or `TCP_QUIC` and can't be used with other protocols.
|
|
207
|
+
*
|
|
208
|
+
* The ID consists of the `0x` prefix followed by 16 hexadecimal characters. Any letters must be lowercase. The value must be unique at the listener level. You can't modify the server ID for a registered target. You must deregister the target and then provide a new server ID when you register the target again.
|
|
207
209
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-elasticloadbalancingv2-targetgroup-targetdescription.html#cfn-elasticloadbalancingv2-targetgroup-targetdescription-quicserverid}
|
|
208
210
|
*/
|
|
209
211
|
QuicServerId?: string | undefined;
|
|
@@ -108,7 +108,7 @@ export type EventsRuleProps = {
|
|
|
108
108
|
*
|
|
109
109
|
* For a list of services you can configure as targets for events, see [EventBridge targets](https://docs.aws.amazon.com/eventbridge/latest/userguide/eb-targets.html) in the **Amazon EventBridge User Guide** .
|
|
110
110
|
*
|
|
111
|
-
* Creating rules with built-in targets is supported only in the
|
|
111
|
+
* Creating rules with built-in targets is supported only in the AWS Management Console . The built-in targets are:
|
|
112
112
|
*
|
|
113
113
|
* - `Amazon EBS CreateSnapshot API call`
|
|
114
114
|
* - `Amazon EC2 RebootInstances API call`
|
|
@@ -712,6 +712,14 @@ export type SelfManagedActiveDirectoryConfiguration = {
|
|
|
712
712
|
*/
|
|
713
713
|
DnsIps?: string[] | undefined;
|
|
714
714
|
/**
|
|
715
|
+
* The Amazon Resource Name (ARN) of the AWS Secrets Manager secret containing the self-managed Active Directory domain join service account credentials. When provided, Amazon FSx uses the credentials stored in this secret to join the file system to your self-managed Active Directory domain.
|
|
716
|
+
*
|
|
717
|
+
* The secret must contain two key-value pairs:
|
|
718
|
+
*
|
|
719
|
+
* - `CUSTOMER_MANAGED_ACTIVE_DIRECTORY_USERNAME` - The username for the service account
|
|
720
|
+
* - `CUSTOMER_MANAGED_ACTIVE_DIRECTORY_PASSWORD` - The password for the service account
|
|
721
|
+
*
|
|
722
|
+
* For more information, see [Using Amazon FSx for Windows with your self-managed Microsoft Active Directory](https://docs.aws.amazon.com/fsx/latest/WindowsGuide/self-manage-prereqs.html) or [Using Amazon FSx for ONTAP with your self-managed Microsoft Active Directory](https://docs.aws.amazon.com/fsx/latest/ONTAPGuide/self-manage-prereqs.html) .
|
|
715
723
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-fsx-filesystem-selfmanagedactivedirectoryconfiguration.html#cfn-fsx-filesystem-selfmanagedactivedirectoryconfiguration-domainjoinserviceaccountsecret}
|
|
716
724
|
*/
|
|
717
725
|
DomainJoinServiceAccountSecret?: string | undefined;
|
|
@@ -97,6 +97,14 @@ export type SelfManagedActiveDirectoryConfiguration = {
|
|
|
97
97
|
*/
|
|
98
98
|
DnsIps?: string[] | undefined;
|
|
99
99
|
/**
|
|
100
|
+
* The Amazon Resource Name (ARN) of the AWS Secrets Manager secret containing the self-managed Active Directory domain join service account credentials. When provided, Amazon FSx uses the credentials stored in this secret to join the file system to your self-managed Active Directory domain.
|
|
101
|
+
*
|
|
102
|
+
* The secret must contain two key-value pairs:
|
|
103
|
+
*
|
|
104
|
+
* - `CUSTOMER_MANAGED_ACTIVE_DIRECTORY_USERNAME` - The username for the service account
|
|
105
|
+
* - `CUSTOMER_MANAGED_ACTIVE_DIRECTORY_PASSWORD` - The password for the service account
|
|
106
|
+
*
|
|
107
|
+
* For more information, see [Using Amazon FSx for Windows with your self-managed Microsoft Active Directory](https://docs.aws.amazon.com/fsx/latest/WindowsGuide/self-manage-prereqs.html) or [Using Amazon FSx for ONTAP with your self-managed Microsoft Active Directory](https://docs.aws.amazon.com/fsx/latest/ONTAPGuide/self-manage-prereqs.html) .
|
|
100
108
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-fsx-storagevirtualmachine-selfmanagedactivedirectoryconfiguration.html#cfn-fsx-storagevirtualmachine-selfmanagedactivedirectoryconfiguration-domainjoinserviceaccountsecret}
|
|
101
109
|
*/
|
|
102
110
|
DomainJoinServiceAccountSecret?: string | undefined;
|
|
@@ -38,7 +38,7 @@ export type GameLiftContainerGroupDefinitionProps = {
|
|
|
38
38
|
/**
|
|
39
39
|
* The platform that all containers in the container group definition run on.
|
|
40
40
|
*
|
|
41
|
-
* > Amazon Linux 2 (AL2) will reach end of support on 6/30/
|
|
41
|
+
* > Amazon Linux 2 (AL2) will reach end of support on 6/30/2026. See more details in the [Amazon Linux 2 FAQs](https://docs.aws.amazon.com/amazon-linux-2/faqs/) . For game servers that are hosted on AL2 and use server SDK version 4.x for Amazon GameLift Servers, first update the game server build to server SDK 5.x, and then deploy to AL2023 instances. See [Migrate to server SDK version 5.](https://docs.aws.amazon.com/gamelift/latest/developerguide/reference-serversdk5-migration.html)
|
|
42
42
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-gamelift-containergroupdefinition.html#cfn-gamelift-containergroupdefinition-operatingsystem}
|
|
43
43
|
*/
|
|
44
44
|
OperatingSystem: "AMAZON_LINUX_2023";
|
|
@@ -74,7 +74,7 @@ export type GameLiftFleetProps = {
|
|
|
74
74
|
*/
|
|
75
75
|
FleetType?: "ON_DEMAND" | "SPOT" | undefined;
|
|
76
76
|
/**
|
|
77
|
-
* A unique identifier for an IAM role that manages access to your AWS services. With an instance role ARN set, any application that runs on an instance in this fleet can assume the role, including install scripts, server processes, and daemons (background processes). Create a role or look up a role's ARN by using the [IAM dashboard](https://docs.aws.amazon.com/iam/) in the
|
|
77
|
+
* A unique identifier for an IAM role that manages access to your AWS services. With an instance role ARN set, any application that runs on an instance in this fleet can assume the role, including install scripts, server processes, and daemons (background processes). Create a role or look up a role's ARN by using the [IAM dashboard](https://docs.aws.amazon.com/iam/) in the AWS Management Console . Learn more about using on-box credentials for your game servers at [Access external resources from a game server](https://docs.aws.amazon.com/gamelift/latest/developerguide/gamelift-sdk-server-resources.html) . This attribute is used with fleets where `ComputeType` is `EC2` .
|
|
78
78
|
* @minLength 1
|
|
79
79
|
* @pattern ^arn:aws(-.*)?:[a-z-]+:(([a-z]+-)+[0-9])?:([0-9]{12})?:[^.]+$
|
|
80
80
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-gamelift-fleet.html#cfn-gamelift-fleet-instancerolearn}
|
|
@@ -128,7 +128,7 @@ export type GameLiftFleetProps = {
|
|
|
128
128
|
*/
|
|
129
129
|
NewGameSessionProtectionPolicy?: "FullProtection" | "NoProtection" | undefined;
|
|
130
130
|
/**
|
|
131
|
-
* Used when peering your Amazon GameLift Servers fleet with a VPC, the unique identifier for the AWS account that owns the VPC. You can find your account ID in the
|
|
131
|
+
* Used when peering your Amazon GameLift Servers fleet with a VPC, the unique identifier for the AWS account that owns the VPC. You can find your account ID in the AWS Management Console under account settings.
|
|
132
132
|
* @minLength 1
|
|
133
133
|
* @maxLength 1024
|
|
134
134
|
* @pattern ^[0-9]{12}$
|
|
@@ -136,7 +136,7 @@ export type GameLiftFleetProps = {
|
|
|
136
136
|
*/
|
|
137
137
|
PeerVpcAwsAccountId?: string | undefined;
|
|
138
138
|
/**
|
|
139
|
-
* A unique identifier for a VPC with resources to be accessed by your Amazon GameLift Servers fleet. The VPC must be in the same Region as your fleet. To look up a VPC ID, use the [VPC Dashboard](https://docs.aws.amazon.com/vpc/) in the
|
|
139
|
+
* A unique identifier for a VPC with resources to be accessed by your Amazon GameLift Servers fleet. The VPC must be in the same Region as your fleet. To look up a VPC ID, use the [VPC Dashboard](https://docs.aws.amazon.com/vpc/) in the AWS Management Console . Learn more about VPC peering in [VPC Peering with Amazon GameLift Servers Fleets](https://docs.aws.amazon.com/gamelift/latest/developerguide/vpc-peering.html) .
|
|
140
140
|
* @minLength 1
|
|
141
141
|
* @maxLength 1024
|
|
142
142
|
* @pattern ^vpc-\S+
|
|
@@ -176,40 +176,10 @@ export type ConnectionInput = {
|
|
|
176
176
|
* - `SAPODATA` - Designates a connection to SAP OData.
|
|
177
177
|
* - `SERVICENOW` - Designates a connection to ServiceNow.
|
|
178
178
|
* - `SLACK` - Designates a connection to Slack.
|
|
179
|
-
* - `SNOWFLAKE` - Designates a connection to Snowflake.
|
|
180
179
|
* - `SNAPCHATADS` - Designates a connection to Snapchat Ads.
|
|
181
180
|
* - `STRIPE` - Designates a connection to Stripe.
|
|
182
181
|
* - `ZENDESK` - Designates a connection to Zendesk.
|
|
183
182
|
* - `ZOHOCRM` - Designates a connection to Zoho CRM.
|
|
184
|
-
* - `ADOBEANALYTICS` - Designates a connection to Adobe Analytics.
|
|
185
|
-
* - `LINKEDIN` - Designates a connection to LinkedIn.
|
|
186
|
-
* - `MIXPANEL` - Designates a connection to Mixpanel.
|
|
187
|
-
* - `ASANA` - Designates a connection to Asana.
|
|
188
|
-
* - `SMARTSHEET` - Designates a connection to Smartsheet.
|
|
189
|
-
* - `DATADOG` - Designates a connection to Datadog.
|
|
190
|
-
* - `WOOCOMMERCE` - Designates a connection to WooCommerce.
|
|
191
|
-
* - `PAYPAL` - Designates a connection to PayPal.
|
|
192
|
-
* - `QUICKBOOKS` - Designates a connection to QuickBooks.
|
|
193
|
-
* - `FACEBOOKPAGEINSIGHTS` - Designates a connection to Facebook Page Insights.
|
|
194
|
-
* - `FRESHDESK` - Designates a connection to Freshdesk.
|
|
195
|
-
* - `TWILIO` - Designates a connection to Twilio.
|
|
196
|
-
* - `DOCUSIGNMONITOR` - Designates a connection to DocuSign Monitor.
|
|
197
|
-
* - `FRESHSALES` - Designates a connection to Freshsales.
|
|
198
|
-
* - `ZOOM` - Designates a connection to Zoom.
|
|
199
|
-
* - `GOOGLESEARCHCONSOLE` - Designates a connection to Google Search Console.
|
|
200
|
-
* - `SALESFORCECOMMERCECLOUD` - Designates a connection to Salesforce Commerce Cloud.
|
|
201
|
-
* - `SAPCONCUR` - Designates a connection to SAP Concur.
|
|
202
|
-
* - `DYNATRACE` - Designates a connection to Dynatrace.
|
|
203
|
-
* - `MICROSOFTDYNAMIC365FINANCEANDOPS` - Designates a connection to Microsoft Dynamics 365 Finance and Operations.
|
|
204
|
-
* - `MICROSOFTTEAMS` - Designates a connection to Microsoft Teams.
|
|
205
|
-
* - `BLACKBAUDRAISEREDGENXT` - Designates a connection to Blackbaud Raiser's Edge NXT.
|
|
206
|
-
* - `MAILCHIMP` - Designates a connection to Mailchimp.
|
|
207
|
-
* - `GITLAB` - Designates a connection to GitLab.
|
|
208
|
-
* - `PENDO` - Designates a connection to Pendo.
|
|
209
|
-
* - `PRODUCTBOARD` - Designates a connection to Productboard.
|
|
210
|
-
* - `CIRCLECI` - Designates a connection to CircleCI.
|
|
211
|
-
* - `PIPEDIVE` - Designates a connection to Pipedrive.
|
|
212
|
-
* - `SENDGRID` - Designates a connection to SendGrid.
|
|
213
183
|
*
|
|
214
184
|
* For more information on the connection parameters needed for a particular connector, see the documentation for the connector in [Adding an AWS Glue connection](https://docs.aws.amazon.com/glue/latest/dg/console-connections.html) in the AWS Glue User Guide.
|
|
215
185
|
*
|
|
@@ -2,26 +2,26 @@ import type { ResourceDefinitionWithAttributes, Tag } from "../main.ts";
|
|
|
2
2
|
/**
|
|
3
3
|
* Creates an IAM resource that describes an identity provider (IdP) that supports SAML 2.0.
|
|
4
4
|
*
|
|
5
|
-
* The SAML provider resource that you create with this operation can be used as a principal in an IAM role's trust policy. Such a policy can enable federated users who sign in using the SAML IdP to assume the role. You can create an IAM role that supports Web-based single sign-on (SSO) to the
|
|
5
|
+
* The SAML provider resource that you create with this operation can be used as a principal in an IAM role's trust policy. Such a policy can enable federated users who sign in using the SAML IdP to assume the role. You can create an IAM role that supports Web-based single sign-on (SSO) to the AWS Management Console or one that supports API access to AWS .
|
|
6
6
|
*
|
|
7
7
|
* When you create the SAML provider resource, you upload a SAML metadata document that you get from your IdP. That document includes the issuer's name, expiration information, and keys that can be used to validate the SAML authentication response (assertions) that the IdP sends. You must generate the metadata document using the identity management software that is used as your organization's IdP.
|
|
8
8
|
*
|
|
9
9
|
* > This operation requires [Signature Version 4](https://docs.aws.amazon.com/general/latest/gr/signature-version-4.html) .
|
|
10
10
|
*
|
|
11
|
-
* For more information, see [Enabling SAML 2.0 federated users to access the
|
|
11
|
+
* For more information, see [Enabling SAML 2.0 federated users to access the AWS Management Console](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_enable-console-saml.html) and [About SAML 2.0-based federation](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_saml.html) in the *IAM User Guide* .
|
|
12
12
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-samlprovider.html}
|
|
13
13
|
*/
|
|
14
14
|
export type IAMSAMLProvider = ResourceDefinitionWithAttributes<"AWS::IAM::SAMLProvider", IAMSAMLProviderProps, IAMSAMLProviderAttribs>;
|
|
15
15
|
/**
|
|
16
16
|
* Creates an IAM resource that describes an identity provider (IdP) that supports SAML 2.0.
|
|
17
17
|
*
|
|
18
|
-
* The SAML provider resource that you create with this operation can be used as a principal in an IAM role's trust policy. Such a policy can enable federated users who sign in using the SAML IdP to assume the role. You can create an IAM role that supports Web-based single sign-on (SSO) to the
|
|
18
|
+
* The SAML provider resource that you create with this operation can be used as a principal in an IAM role's trust policy. Such a policy can enable federated users who sign in using the SAML IdP to assume the role. You can create an IAM role that supports Web-based single sign-on (SSO) to the AWS Management Console or one that supports API access to AWS .
|
|
19
19
|
*
|
|
20
20
|
* When you create the SAML provider resource, you upload a SAML metadata document that you get from your IdP. That document includes the issuer's name, expiration information, and keys that can be used to validate the SAML authentication response (assertions) that the IdP sends. You must generate the metadata document using the identity management software that is used as your organization's IdP.
|
|
21
21
|
*
|
|
22
22
|
* > This operation requires [Signature Version 4](https://docs.aws.amazon.com/general/latest/gr/signature-version-4.html) .
|
|
23
23
|
*
|
|
24
|
-
* For more information, see [Enabling SAML 2.0 federated users to access the
|
|
24
|
+
* For more information, see [Enabling SAML 2.0 federated users to access the AWS Management Console](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_enable-console-saml.html) and [About SAML 2.0-based federation](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_saml.html) in the *IAM User Guide* .
|
|
25
25
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-samlprovider.html}
|
|
26
26
|
*/
|
|
27
27
|
export type IAMSAMLProviderProps = {
|
|
@@ -19,9 +19,9 @@ export type IAMUserProps = {
|
|
|
19
19
|
*/
|
|
20
20
|
Groups?: string[] | undefined;
|
|
21
21
|
/**
|
|
22
|
-
* Creates a password for the specified IAM user. A password allows an IAM user to access AWS services through the
|
|
22
|
+
* Creates a password for the specified IAM user. A password allows an IAM user to access AWS services through the AWS Management Console .
|
|
23
23
|
*
|
|
24
|
-
* You can use the AWS CLI , the AWS API, or the *Users* page in the IAM console to create a password for any IAM user. Use [ChangePassword](https://docs.aws.amazon.com/IAM/latest/APIReference/API_ChangePassword.html) to update your own existing password in the *My Security Credentials* page in the
|
|
24
|
+
* You can use the AWS CLI , the AWS API, or the *Users* page in the IAM console to create a password for any IAM user. Use [ChangePassword](https://docs.aws.amazon.com/IAM/latest/APIReference/API_ChangePassword.html) to update your own existing password in the *My Security Credentials* page in the AWS Management Console .
|
|
25
25
|
*
|
|
26
26
|
* For more information about managing passwords, see [Managing passwords](https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_ManagingLogins.html) in the *IAM User Guide* .
|
|
27
27
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-user.html#cfn-iam-user-loginprofile}
|
|
@@ -93,7 +93,7 @@ export type IAMUserAttribs = {
|
|
|
93
93
|
Arn: string;
|
|
94
94
|
};
|
|
95
95
|
/**
|
|
96
|
-
* Creates a password for the specified user, giving the user the ability to access AWS services through the
|
|
96
|
+
* Creates a password for the specified user, giving the user the ability to access AWS services through the AWS Management Console . For more information about managing passwords, see [Managing Passwords](https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_ManagingLogins.html) in the *IAM User Guide* .
|
|
97
97
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user-loginprofile.html}
|
|
98
98
|
*/
|
|
99
99
|
export type LoginProfile = {
|
|
@@ -65,7 +65,7 @@ export type KinesisVideoStreamProps = {
|
|
|
65
65
|
*/
|
|
66
66
|
Name?: string | undefined;
|
|
67
67
|
/**
|
|
68
|
-
*
|
|
68
|
+
* The configuration for stream storage, including the default storage tier for stream data. This configuration determines how stream data is stored and accessed, with different tiers offering varying levels of performance and cost optimization.
|
|
69
69
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-kinesisvideo-stream.html#cfn-kinesisvideo-stream-streamstorageconfiguration}
|
|
70
70
|
*/
|
|
71
71
|
StreamStorageConfiguration?: StreamStorageConfiguration | undefined;
|
|
@@ -88,12 +88,17 @@ export type KinesisVideoStreamAttribs = {
|
|
|
88
88
|
Arn: string;
|
|
89
89
|
};
|
|
90
90
|
/**
|
|
91
|
-
*
|
|
91
|
+
* The configuration for stream storage, including the default storage tier for stream data. This configuration determines how stream data is stored and accessed, with different tiers offering varying levels of performance and cost optimization.
|
|
92
92
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-kinesisvideo-stream-streamstorageconfiguration.html}
|
|
93
93
|
*/
|
|
94
94
|
export type StreamStorageConfiguration = {
|
|
95
95
|
/**
|
|
96
|
-
* The storage tier for the
|
|
96
|
+
* The default storage tier for the stream data. This setting determines the storage class used for stream data, affecting both performance characteristics and storage costs.
|
|
97
|
+
*
|
|
98
|
+
* Available storage tiers:
|
|
99
|
+
*
|
|
100
|
+
* - `HOT` - Optimized for frequent access with the lowest latency and highest performance. Ideal for real-time applications and frequently accessed data.
|
|
101
|
+
* - `WARM` - Balanced performance and cost for moderately accessed data. Suitable for data that is accessed regularly but not continuously.
|
|
97
102
|
* @default "HOT"
|
|
98
103
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-kinesisvideo-stream-streamstorageconfiguration.html#cfn-kinesisvideo-stream-streamstorageconfiguration-defaultstoragetier}
|
|
99
104
|
*/
|