@pulumi/aws-native 1.30.0-alpha.1749819116 → 1.30.0-alpha.1750076003
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/appstream/getAppBlock.d.ts +5 -0
- package/appstream/getAppBlock.js.map +1 -1
- package/appstream/getAppBlockBuilder.d.ts +4 -0
- package/appstream/getAppBlockBuilder.js.map +1 -1
- package/appstream/getApplication.d.ts +4 -0
- package/appstream/getApplication.js.map +1 -1
- package/ec2/egressOnlyInternetGateway.d.ts +10 -0
- package/ec2/egressOnlyInternetGateway.js +2 -0
- package/ec2/egressOnlyInternetGateway.js.map +1 -1
- package/ec2/getEgressOnlyInternetGateway.d.ts +5 -0
- package/ec2/getEgressOnlyInternetGateway.js.map +1 -1
- package/ec2/getSubnet.d.ts +2 -1
- package/ec2/getSubnet.js.map +1 -1
- package/ec2/subnet.d.ts +3 -2
- package/ec2/subnet.js +2 -0
- package/ec2/subnet.js.map +1 -1
- package/efs/mountTarget.d.ts +16 -0
- package/efs/mountTarget.js.map +1 -1
- package/entityresolution/getMatchingWorkflow.d.ts +3 -1
- package/entityresolution/getMatchingWorkflow.js.map +1 -1
- package/entityresolution/matchingWorkflow.d.ts +6 -2
- package/entityresolution/matchingWorkflow.js.map +1 -1
- package/evs/environment.d.ts +90 -0
- package/evs/environment.js.map +1 -1
- package/evs/getEnvironment.d.ts +34 -0
- package/evs/getEnvironment.js.map +1 -1
- package/lambda/eventSourceMapping.d.ts +46 -46
- package/lambda/eventSourceMapping.js +1 -1
- package/lambda/eventSourceMapping.js.map +1 -1
- package/lambda/getEventSourceMapping.d.ts +22 -14
- package/lambda/getEventSourceMapping.js.map +1 -1
- package/mwaa/environment.d.ts +2 -0
- package/mwaa/environment.js +2 -0
- package/mwaa/environment.js.map +1 -1
- package/opsworkscm/getServer.d.ts +9 -4
- package/opsworkscm/getServer.js.map +1 -1
- package/opsworkscm/server.d.ts +9 -2
- package/opsworkscm/server.js +2 -2
- package/opsworkscm/server.js.map +1 -1
- package/package.json +3 -3
- package/package.json.dev +2 -2
- package/types/enums/efs/index.d.ts +5 -0
- package/types/enums/entityresolution/index.d.ts +3 -1
- package/types/enums/entityresolution/index.js.map +1 -1
- package/types/enums/evs/index.d.ts +16 -0
- package/types/enums/evs/index.js.map +1 -1
- package/types/enums/kms/index.d.ts +3 -0
- package/types/enums/kms/index.js +3 -0
- package/types/enums/kms/index.js.map +1 -1
- package/types/enums/lambda/index.d.ts +34 -9
- package/types/enums/lambda/index.js +14 -1
- package/types/enums/lambda/index.js.map +1 -1
- package/types/enums/mwaa/index.d.ts +8 -0
- package/types/enums/mwaa/index.js +5 -1
- package/types/enums/mwaa/index.js.map +1 -1
- package/types/enums/sagemaker/index.d.ts +13 -0
- package/types/enums/sagemaker/index.js +7 -3
- package/types/enums/sagemaker/index.js.map +1 -1
- package/types/enums/wafv2/index.d.ts +16 -0
- package/types/enums/wafv2/index.js +15 -2
- package/types/enums/wafv2/index.js.map +1 -1
- package/types/input.d.ts +288 -16
- package/types/output.d.ts +313 -16
- package/types/output.js.map +1 -1
- package/wafv2/getWebAcl.d.ts +2 -2
- package/wafv2/webAcl.d.ts +4 -4
package/types/output.d.ts
CHANGED
|
@@ -6268,6 +6268,10 @@ export declare namespace athena {
|
|
|
6268
6268
|
* Role used to access user resources in an Athena for Apache Spark session. This property applies only to Spark-enabled workgroups in Athena.
|
|
6269
6269
|
*/
|
|
6270
6270
|
executionRole?: string;
|
|
6271
|
+
/**
|
|
6272
|
+
* The configuration for storing results in Athena owned storage, which includes whether this feature is enabled; whether encryption configuration, if any, is used for encrypting query results.
|
|
6273
|
+
*/
|
|
6274
|
+
managedQueryResultsConfiguration?: outputs.athena.WorkGroupManagedQueryResultsConfiguration;
|
|
6271
6275
|
/**
|
|
6272
6276
|
* Indicates that the Amazon CloudWatch metrics are enabled for the workgroup.
|
|
6273
6277
|
*/
|
|
@@ -6291,6 +6295,7 @@ export declare namespace athena {
|
|
|
6291
6295
|
enforceWorkGroupConfiguration?: boolean;
|
|
6292
6296
|
engineVersion?: outputs.athena.WorkGroupEngineVersion;
|
|
6293
6297
|
executionRole?: string;
|
|
6298
|
+
managedQueryResultsConfiguration?: outputs.athena.WorkGroupManagedQueryResultsConfiguration;
|
|
6294
6299
|
publishCloudWatchMetricsEnabled?: boolean;
|
|
6295
6300
|
removeBytesScannedCutoffPerQuery?: boolean;
|
|
6296
6301
|
removeCustomerContentEncryptionConfiguration?: boolean;
|
|
@@ -6334,6 +6339,25 @@ export declare namespace athena {
|
|
|
6334
6339
|
*/
|
|
6335
6340
|
selectedEngineVersion?: string;
|
|
6336
6341
|
}
|
|
6342
|
+
/**
|
|
6343
|
+
* The configuration for the managed query results and encryption option. ResultConfiguration and ManagedQueryResultsConfiguration cannot be set at the same time
|
|
6344
|
+
*/
|
|
6345
|
+
interface WorkGroupManagedQueryResultsConfiguration {
|
|
6346
|
+
/**
|
|
6347
|
+
* If set to true, allows you to store query results in Athena owned storage. If set to false, workgroup member stores query results in location specified under `ResultConfiguration$OutputLocation` . The default is false. A workgroup cannot have the `ResultConfiguration$OutputLocation` parameter when you set this field to true.
|
|
6348
|
+
*/
|
|
6349
|
+
enabled?: boolean;
|
|
6350
|
+
/**
|
|
6351
|
+
* If you encrypt query and calculation results in Athena owned storage, this field indicates the encryption option (for example, SSE_KMS or CSE_KMS) and key information.
|
|
6352
|
+
*/
|
|
6353
|
+
encryptionConfiguration?: outputs.athena.WorkGroupManagedStorageEncryptionConfiguration;
|
|
6354
|
+
}
|
|
6355
|
+
/**
|
|
6356
|
+
* Indicates the encryption configuration for Athena Managed Storage. If not setting this field, Managed Storage will encrypt the query results with Athena's encryption key
|
|
6357
|
+
*/
|
|
6358
|
+
interface WorkGroupManagedStorageEncryptionConfiguration {
|
|
6359
|
+
kmsKey?: string;
|
|
6360
|
+
}
|
|
6337
6361
|
/**
|
|
6338
6362
|
* The location in Amazon S3 where query results are stored and the encryption option, if any, used for query results. These are known as "client-side settings". If workgroup settings override client-side settings, then the query uses the workgroup settings.
|
|
6339
6363
|
*/
|
|
@@ -23922,7 +23946,7 @@ export declare namespace dynamodb {
|
|
|
23922
23946
|
*/
|
|
23923
23947
|
keySchema: outputs.dynamodb.TableKeySchema[];
|
|
23924
23948
|
/**
|
|
23925
|
-
* The maximum number of read and write units for the specified global secondary index. If you use this parameter, you must specify ``MaxReadRequestUnits``, ``MaxWriteRequestUnits``, or both.
|
|
23949
|
+
* The maximum number of read and write units for the specified global secondary index. If you use this parameter, you must specify ``MaxReadRequestUnits``, ``MaxWriteRequestUnits``, or both. You must use either ``OnDemandThroughput`` or ``ProvisionedThroughput`` based on your table's capacity mode.
|
|
23926
23950
|
*/
|
|
23927
23951
|
onDemandThroughput?: outputs.dynamodb.TableOnDemandThroughput;
|
|
23928
23952
|
/**
|
|
@@ -23930,7 +23954,7 @@ export declare namespace dynamodb {
|
|
|
23930
23954
|
*/
|
|
23931
23955
|
projection: outputs.dynamodb.TableProjection;
|
|
23932
23956
|
/**
|
|
23933
|
-
* Represents the provisioned throughput settings for the specified global secondary index.
|
|
23957
|
+
* Represents the provisioned throughput settings for the specified global secondary index. You must use either ``OnDemandThroughput`` or ``ProvisionedThroughput`` based on your table's capacity mode.
|
|
23934
23958
|
* For current minimum and maximum provisioned throughput values, see [Service, Account, and Table Quotas](https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/Limits.html) in the *Amazon DynamoDB Developer Guide*.
|
|
23935
23959
|
*/
|
|
23936
23960
|
provisionedThroughput?: outputs.dynamodb.TableProvisionedThroughput;
|
|
@@ -24188,6 +24212,12 @@ export declare namespace dynamodb {
|
|
|
24188
24212
|
}
|
|
24189
24213
|
}
|
|
24190
24214
|
export declare namespace ec2 {
|
|
24215
|
+
interface BlockPublicAccessStatesProperties {
|
|
24216
|
+
/**
|
|
24217
|
+
* The mode of VPC BPA. Options here are off, block-bidirectional, block-ingress
|
|
24218
|
+
*/
|
|
24219
|
+
internetGatewayBlockMode?: string;
|
|
24220
|
+
}
|
|
24191
24221
|
interface CapacityReservationCapacityAllocation {
|
|
24192
24222
|
/**
|
|
24193
24223
|
* The usage type. `used` indicates that the instance capacity is in use by instances that are running in the Capacity Reservation.
|
|
@@ -32927,7 +32957,9 @@ export declare namespace entityresolution {
|
|
|
32927
32957
|
}
|
|
32928
32958
|
interface MatchingWorkflowIncrementalRunConfig {
|
|
32929
32959
|
/**
|
|
32930
|
-
* The type of incremental run.
|
|
32960
|
+
* The type of incremental run. The only valid value is `IMMEDIATE` . This appears as "Automatic" in the console.
|
|
32961
|
+
*
|
|
32962
|
+
* > For workflows where `resolutionType` is `ML_MATCHING` , incremental processing is not supported.
|
|
32931
32963
|
*/
|
|
32932
32964
|
incrementalRunType: enums.entityresolution.MatchingWorkflowIncrementalRunConfigIncrementalRunType;
|
|
32933
32965
|
}
|
|
@@ -33886,61 +33918,178 @@ export declare namespace evidently {
|
|
|
33886
33918
|
}
|
|
33887
33919
|
}
|
|
33888
33920
|
export declare namespace evs {
|
|
33921
|
+
/**
|
|
33922
|
+
* The connectivity configuration for the environment. Amazon EVS requires that you specify two route server peer IDs. During environment creation, the route server endpoints peer with the NSX uplink VLAN for connectivity to the NSX overlay network.
|
|
33923
|
+
*/
|
|
33889
33924
|
interface ConnectivityInfoProperties {
|
|
33925
|
+
/**
|
|
33926
|
+
* The unique IDs for private route server peers.
|
|
33927
|
+
*/
|
|
33890
33928
|
privateRouteServerPeerings: string[];
|
|
33891
33929
|
}
|
|
33892
33930
|
interface EnvironmentCheck {
|
|
33931
|
+
/**
|
|
33932
|
+
* The time when environment health began to be impaired.
|
|
33933
|
+
*/
|
|
33893
33934
|
impairedSince?: string;
|
|
33935
|
+
/**
|
|
33936
|
+
* The check result.
|
|
33937
|
+
*/
|
|
33894
33938
|
result: enums.evs.EnvironmentCheckResult;
|
|
33939
|
+
/**
|
|
33940
|
+
* The check type. Amazon EVS performs the following checks.
|
|
33941
|
+
*
|
|
33942
|
+
* - `KEY_REUSE` : checks that the VCF license key is not used by another Amazon EVS environment. This check fails if a used license is added to the environment.
|
|
33943
|
+
* - `KEY_COVERAGE` : checks that your VCF license key allocates sufficient vCPU cores for all deployed hosts. The check fails when any assigned hosts in the EVS environment are not covered by license keys, or when any unassigned hosts cannot be covered by available vCPU cores in keys.
|
|
33944
|
+
* - `REACHABILITY` : checks that the Amazon EVS control plane has a persistent connection to SDDC Manager. If Amazon EVS cannot reach the environment, this check fails.
|
|
33945
|
+
* - `HOST_COUNT` : Checks that your environment has a minimum of 4 hosts, which is a requirement for VCF 5.2.1.
|
|
33946
|
+
*
|
|
33947
|
+
* If this check fails, you will need to add hosts so that your environment meets this minimum requirement. Amazon EVS only supports environments with 4-16 hosts.
|
|
33948
|
+
*/
|
|
33895
33949
|
type: enums.evs.EnvironmentCheckType;
|
|
33896
33950
|
}
|
|
33897
33951
|
interface EnvironmentHostInfoForCreate {
|
|
33952
|
+
/**
|
|
33953
|
+
* The unique ID of the Amazon EC2 Dedicated Host.
|
|
33954
|
+
*/
|
|
33898
33955
|
dedicatedHostId?: string;
|
|
33956
|
+
/**
|
|
33957
|
+
* The DNS hostname of the host. DNS hostnames for hosts must be unique across Amazon EVS environments and within VCF.
|
|
33958
|
+
*/
|
|
33899
33959
|
hostName: string;
|
|
33960
|
+
/**
|
|
33961
|
+
* The EC2 instance type that represents the host.
|
|
33962
|
+
*/
|
|
33900
33963
|
instanceType: enums.evs.EnvironmentHostInfoForCreateInstanceType;
|
|
33964
|
+
/**
|
|
33965
|
+
* The name of the SSH key that is used to access the host.
|
|
33966
|
+
*/
|
|
33901
33967
|
keyName: string;
|
|
33968
|
+
/**
|
|
33969
|
+
* The unique ID of the placement group where the host is placed.
|
|
33970
|
+
*/
|
|
33902
33971
|
placementGroupId?: string;
|
|
33903
33972
|
}
|
|
33904
33973
|
interface EnvironmentInitialVlanInfo {
|
|
33974
|
+
/**
|
|
33975
|
+
* The CIDR block that you provide to create an Amazon EVS VLAN subnet. Amazon EVS VLAN subnets have a minimum CIDR block size of /28 and a maximum size of /24. Amazon EVS VLAN subnet CIDR blocks must not overlap with other subnets in the VPC.
|
|
33976
|
+
*/
|
|
33905
33977
|
cidr: string;
|
|
33906
33978
|
}
|
|
33907
33979
|
interface EnvironmentSecret {
|
|
33980
|
+
/**
|
|
33981
|
+
* The Amazon Resource Name (ARN) of the secret.
|
|
33982
|
+
*/
|
|
33908
33983
|
secretArn?: string;
|
|
33909
33984
|
}
|
|
33910
33985
|
/**
|
|
33911
33986
|
* The initial Vlan configuration only required upon creation. Modification after creation will have no effect
|
|
33912
33987
|
*/
|
|
33913
33988
|
interface InitialVlansProperties {
|
|
33989
|
+
/**
|
|
33990
|
+
* The edge VTEP VLAN subnet. This VLAN subnet manages traffic flowing between the internal network and external networks, including internet access and other site connections.
|
|
33991
|
+
*/
|
|
33914
33992
|
edgeVTep: outputs.evs.EnvironmentInitialVlanInfo;
|
|
33993
|
+
/**
|
|
33994
|
+
* An additional VLAN subnet that can be used to extend VCF capabilities once configured. For example, you can configure an expansion VLAN subnet to use NSX Federation for centralized management and synchronization of multiple NSX deployments across different locations.
|
|
33995
|
+
*/
|
|
33915
33996
|
expansionVlan1: outputs.evs.EnvironmentInitialVlanInfo;
|
|
33997
|
+
/**
|
|
33998
|
+
* An additional VLAN subnet that can be used to extend VCF capabilities once configured. For example, you can configure an expansion VLAN subnet to use NSX Federation for centralized management and synchronization of multiple NSX deployments across different locations.
|
|
33999
|
+
*/
|
|
33916
34000
|
expansionVlan2: outputs.evs.EnvironmentInitialVlanInfo;
|
|
34001
|
+
/**
|
|
34002
|
+
* The HCX VLAN subnet. This VLAN subnet allows the HCX Interconnnect (IX) and HCX Network Extension (NE) to reach their peers and enable HCX Service Mesh creation.
|
|
34003
|
+
*/
|
|
33917
34004
|
hcx: outputs.evs.EnvironmentInitialVlanInfo;
|
|
34005
|
+
/**
|
|
34006
|
+
* The NSX uplink VLAN subnet. This VLAN subnet allows connectivity to the NSX overlay network.
|
|
34007
|
+
*/
|
|
33918
34008
|
nsxUpLink: outputs.evs.EnvironmentInitialVlanInfo;
|
|
34009
|
+
/**
|
|
34010
|
+
* The vMotion VLAN subnet. This VLAN subnet carries traffic for vSphere vMotion.
|
|
34011
|
+
*/
|
|
33919
34012
|
vMotion: outputs.evs.EnvironmentInitialVlanInfo;
|
|
34013
|
+
/**
|
|
34014
|
+
* The vSAN VLAN subnet. This VLAN subnet carries the communication between ESXi hosts to implement a vSAN shared storage pool.
|
|
34015
|
+
*/
|
|
33920
34016
|
vSan: outputs.evs.EnvironmentInitialVlanInfo;
|
|
34017
|
+
/**
|
|
34018
|
+
* The VTEP VLAN subnet. This VLAN subnet handles internal network traffic between virtual machines within a VCF instance.
|
|
34019
|
+
*/
|
|
33921
34020
|
vTep: outputs.evs.EnvironmentInitialVlanInfo;
|
|
34021
|
+
/**
|
|
34022
|
+
* The VM management VLAN subnet. This VLAN subnet carries traffic for vSphere virtual machines.
|
|
34023
|
+
*/
|
|
33922
34024
|
vmManagement: outputs.evs.EnvironmentInitialVlanInfo;
|
|
34025
|
+
/**
|
|
34026
|
+
* The host VMkernel management VLAN subnet. This VLAN subnet carries traffic for managing ESXi hosts and communicating with VMware vCenter Server.
|
|
34027
|
+
*/
|
|
33923
34028
|
vmkManagement: outputs.evs.EnvironmentInitialVlanInfo;
|
|
33924
34029
|
}
|
|
33925
34030
|
/**
|
|
33926
34031
|
* The license information for an EVS environment
|
|
33927
34032
|
*/
|
|
33928
34033
|
interface LicenseInfoProperties {
|
|
34034
|
+
/**
|
|
34035
|
+
* The VCF solution key. This license unlocks VMware VCF product features, including vSphere, NSX, SDDC Manager, and vCenter Server.
|
|
34036
|
+
*/
|
|
33929
34037
|
solutionKey: string;
|
|
34038
|
+
/**
|
|
34039
|
+
* The VSAN license key. This license unlocks vSAN features.
|
|
34040
|
+
*/
|
|
33930
34041
|
vsanKey: string;
|
|
33931
34042
|
}
|
|
34043
|
+
/**
|
|
34044
|
+
* The security groups that allow traffic between the Amazon EVS control plane and your VPC for service access. If a security group is not specified, Amazon EVS uses the default security group in your account for service access.
|
|
34045
|
+
*/
|
|
33932
34046
|
interface ServiceAccessSecurityGroupsProperties {
|
|
34047
|
+
/**
|
|
34048
|
+
* The security groups that allow service access.
|
|
34049
|
+
*/
|
|
33933
34050
|
securityGroups?: string[];
|
|
33934
34051
|
}
|
|
34052
|
+
/**
|
|
34053
|
+
* The DNS hostnames to be used by the VCF management appliances in your environment.
|
|
34054
|
+
*
|
|
34055
|
+
* For environment creation to be successful, each hostname entry must resolve to a domain name that you've registered in your DNS service of choice and configured in the DHCP option set of your VPC. DNS hostnames cannot be changed after environment creation has started.
|
|
34056
|
+
*/
|
|
33935
34057
|
interface VcfHostnamesProperties {
|
|
34058
|
+
/**
|
|
34059
|
+
* The hostname for VMware Cloud Builder.
|
|
34060
|
+
*/
|
|
33936
34061
|
cloudBuilder: string;
|
|
34062
|
+
/**
|
|
34063
|
+
* The VMware NSX hostname.
|
|
34064
|
+
*/
|
|
33937
34065
|
nsx: string;
|
|
34066
|
+
/**
|
|
34067
|
+
* The hostname for the first NSX Edge node.
|
|
34068
|
+
*/
|
|
33938
34069
|
nsxEdge1: string;
|
|
34070
|
+
/**
|
|
34071
|
+
* The hostname for the second NSX Edge node.
|
|
34072
|
+
*/
|
|
33939
34073
|
nsxEdge2: string;
|
|
34074
|
+
/**
|
|
34075
|
+
* The hostname for the first VMware NSX Manager virtual machine (VM).
|
|
34076
|
+
*/
|
|
33940
34077
|
nsxManager1: string;
|
|
34078
|
+
/**
|
|
34079
|
+
* The hostname for the second VMware NSX Manager virtual machine (VM).
|
|
34080
|
+
*/
|
|
33941
34081
|
nsxManager2: string;
|
|
34082
|
+
/**
|
|
34083
|
+
* The hostname for the third VMware NSX Manager virtual machine (VM).
|
|
34084
|
+
*/
|
|
33942
34085
|
nsxManager3: string;
|
|
34086
|
+
/**
|
|
34087
|
+
* The hostname for SDDC Manager.
|
|
34088
|
+
*/
|
|
33943
34089
|
sddcManager: string;
|
|
34090
|
+
/**
|
|
34091
|
+
* The VMware vCenter hostname.
|
|
34092
|
+
*/
|
|
33944
34093
|
vCenter: string;
|
|
33945
34094
|
}
|
|
33946
34095
|
}
|
|
@@ -46498,6 +46647,7 @@ export declare namespace lambda {
|
|
|
46498
46647
|
* The identifier for the Kafka consumer group to join. The consumer group ID must be unique among all your Kafka event sources. After creating a Kafka event source mapping with the consumer group ID specified, you cannot update this value. For more information, see [Customizable consumer group ID](https://docs.aws.amazon.com/lambda/latest/dg/with-msk.html#services-msk-consumer-group-id).
|
|
46499
46648
|
*/
|
|
46500
46649
|
consumerGroupId?: string;
|
|
46650
|
+
schemaRegistryConfig?: outputs.lambda.EventSourceMappingSchemaRegistryConfig;
|
|
46501
46651
|
}
|
|
46502
46652
|
/**
|
|
46503
46653
|
* A configuration object that specifies the destination of an event after Lambda processes it.
|
|
@@ -46562,7 +46712,7 @@ export declare namespace lambda {
|
|
|
46562
46712
|
metrics?: enums.lambda.EventSourceMappingMetricsConfigMetricsItem[];
|
|
46563
46713
|
}
|
|
46564
46714
|
/**
|
|
46565
|
-
* A destination for events that failed processing.
|
|
46715
|
+
* A destination for events that failed processing. See [Capturing records of Lambda asynchronous invocations](https://docs.aws.amazon.com/lambda/latest/dg/invocation-async-retain-records.html) for more information.
|
|
46566
46716
|
*/
|
|
46567
46717
|
interface EventSourceMappingOnFailure {
|
|
46568
46718
|
/**
|
|
@@ -46594,6 +46744,40 @@ export declare namespace lambda {
|
|
|
46594
46744
|
*/
|
|
46595
46745
|
maximumConcurrency?: number;
|
|
46596
46746
|
}
|
|
46747
|
+
interface EventSourceMappingSchemaRegistryAccessConfig {
|
|
46748
|
+
/**
|
|
46749
|
+
* The type of authentication Lambda uses to access your schema registry.
|
|
46750
|
+
*/
|
|
46751
|
+
type?: enums.lambda.EventSourceMappingSchemaRegistryAccessConfigType;
|
|
46752
|
+
/**
|
|
46753
|
+
* The URI of the secret (Secrets Manager secret ARN) to authenticate with your schema registry.
|
|
46754
|
+
*/
|
|
46755
|
+
uri?: string;
|
|
46756
|
+
}
|
|
46757
|
+
interface EventSourceMappingSchemaRegistryConfig {
|
|
46758
|
+
/**
|
|
46759
|
+
* An array of access configuration objects that tell Lambda how to authenticate with your schema registry.
|
|
46760
|
+
*/
|
|
46761
|
+
accessConfigs?: outputs.lambda.EventSourceMappingSchemaRegistryAccessConfig[];
|
|
46762
|
+
/**
|
|
46763
|
+
* The record format that Lambda delivers to your function after schema validation.
|
|
46764
|
+
*/
|
|
46765
|
+
eventRecordFormat?: enums.lambda.EventSourceMappingSchemaRegistryConfigEventRecordFormat;
|
|
46766
|
+
/**
|
|
46767
|
+
* The URI for your schema registry. The correct URI format depends on the type of schema registry you're using.
|
|
46768
|
+
*/
|
|
46769
|
+
schemaRegistryUri?: string;
|
|
46770
|
+
/**
|
|
46771
|
+
* An array of schema validation configuration objects, which tell Lambda the message attributes you want to validate and filter using your schema registry.
|
|
46772
|
+
*/
|
|
46773
|
+
schemaValidationConfigs?: outputs.lambda.EventSourceMappingSchemaValidationConfig[];
|
|
46774
|
+
}
|
|
46775
|
+
interface EventSourceMappingSchemaValidationConfig {
|
|
46776
|
+
/**
|
|
46777
|
+
* The attribute you want your schema registry to validate and filter for.
|
|
46778
|
+
*/
|
|
46779
|
+
attribute?: enums.lambda.EventSourceMappingSchemaValidationConfigAttribute;
|
|
46780
|
+
}
|
|
46597
46781
|
/**
|
|
46598
46782
|
* The self-managed Apache Kafka cluster for your event source.
|
|
46599
46783
|
*/
|
|
@@ -46608,9 +46792,10 @@ export declare namespace lambda {
|
|
|
46608
46792
|
*/
|
|
46609
46793
|
interface EventSourceMappingSelfManagedKafkaEventSourceConfig {
|
|
46610
46794
|
/**
|
|
46611
|
-
* The identifier for the Kafka consumer group to join. The consumer group ID must be unique among all your Kafka event sources. After creating a Kafka event source mapping with the consumer group ID specified, you cannot update this value. For more information, see [Customizable consumer group ID](https://docs.aws.amazon.com/lambda/latest/dg/with-
|
|
46795
|
+
* The identifier for the Kafka consumer group to join. The consumer group ID must be unique among all your Kafka event sources. After creating a Kafka event source mapping with the consumer group ID specified, you cannot update this value. For more information, see [Customizable consumer group ID](https://docs.aws.amazon.com/lambda/latest/dg/with-kafka-process.html#services-smaa-topic-add).
|
|
46612
46796
|
*/
|
|
46613
46797
|
consumerGroupId?: string;
|
|
46798
|
+
schemaRegistryConfig?: outputs.lambda.EventSourceMappingSchemaRegistryConfig;
|
|
46614
46799
|
}
|
|
46615
46800
|
/**
|
|
46616
46801
|
* An array of the authentication protocol, VPC components, or virtual host to secure and define your event source.
|
|
@@ -46618,15 +46803,15 @@ export declare namespace lambda {
|
|
|
46618
46803
|
interface EventSourceMappingSourceAccessConfiguration {
|
|
46619
46804
|
/**
|
|
46620
46805
|
* The type of authentication protocol, VPC components, or virtual host for your event source. For example: ``"Type":"SASL_SCRAM_512_AUTH"``.
|
|
46621
|
-
* +
|
|
46622
|
-
* +
|
|
46623
|
-
* +
|
|
46624
|
-
* +
|
|
46625
|
-
* +
|
|
46626
|
-
* +
|
|
46627
|
-
* +
|
|
46628
|
-
* +
|
|
46629
|
-
* +
|
|
46806
|
+
* + ``BASIC_AUTH`` – (Amazon MQ) The ASMlong secret that stores your broker credentials.
|
|
46807
|
+
* + ``BASIC_AUTH`` – (Self-managed Apache Kafka) The Secrets Manager ARN of your secret key used for SASL/PLAIN authentication of your Apache Kafka brokers.
|
|
46808
|
+
* + ``VPC_SUBNET`` – (Self-managed Apache Kafka) The subnets associated with your VPC. Lambda connects to these subnets to fetch data from your self-managed Apache Kafka cluster.
|
|
46809
|
+
* + ``VPC_SECURITY_GROUP`` – (Self-managed Apache Kafka) The VPC security group used to manage access to your self-managed Apache Kafka brokers.
|
|
46810
|
+
* + ``SASL_SCRAM_256_AUTH`` – (Self-managed Apache Kafka) The Secrets Manager ARN of your secret key used for SASL SCRAM-256 authentication of your self-managed Apache Kafka brokers.
|
|
46811
|
+
* + ``SASL_SCRAM_512_AUTH`` – (Amazon MSK, Self-managed Apache Kafka) The Secrets Manager ARN of your secret key used for SASL SCRAM-512 authentication of your self-managed Apache Kafka brokers.
|
|
46812
|
+
* + ``VIRTUAL_HOST`` –- (RabbitMQ) The name of the virtual host in your RabbitMQ broker. Lambda uses this RabbitMQ host as the event source. This property cannot be specified in an UpdateEventSourceMapping API call.
|
|
46813
|
+
* + ``CLIENT_CERTIFICATE_TLS_AUTH`` – (Amazon MSK, self-managed Apache Kafka) The Secrets Manager ARN of your secret key containing the certificate chain (X.509 PEM), private key (PKCS#8 PEM), and private key password (optional) used for mutual TLS authentication of your MSK/Apache Kafka brokers.
|
|
46814
|
+
* + ``SERVER_ROOT_CA_CERTIFICATE`` – (Self-managed Apache Kafka) The Secrets Manager ARN of your secret key containing the root CA certificate (X.509 PEM) used for TLS encryption of your Apache Kafka brokers.
|
|
46630
46815
|
*/
|
|
46631
46816
|
type?: enums.lambda.EventSourceMappingSourceAccessConfigurationType;
|
|
46632
46817
|
/**
|
|
@@ -52085,7 +52270,21 @@ export declare namespace msk {
|
|
|
52085
52270
|
*/
|
|
52086
52271
|
connectivityInfo?: outputs.msk.ClusterConnectivityInfo;
|
|
52087
52272
|
/**
|
|
52088
|
-
* The type of Amazon EC2 instances to use for brokers.
|
|
52273
|
+
* The type of Amazon EC2 instances to use for brokers. Depending on the [broker type](https://docs.aws.amazon.com/msk/latest/developerguide/broker-instance-types.html) , Amazon MSK supports the following broker sizes:
|
|
52274
|
+
*
|
|
52275
|
+
* *Standard broker sizes*
|
|
52276
|
+
*
|
|
52277
|
+
* - kafka.t3.small
|
|
52278
|
+
*
|
|
52279
|
+
* > You can't select the kafka.t3.small instance type when the metadata mode is KRaft.
|
|
52280
|
+
* - kafka.m5.large, kafka.m5.xlarge, kafka.m5.2xlarge, kafka.m5.4xlarge, kafka.m5.8xlarge, kafka.m5.12xlarge, kafka.m5.16xlarge, kafka.m5.24xlarge
|
|
52281
|
+
* - kafka.m7g.large, kafka.m7g.xlarge, kafka.m7g.2xlarge, kafka.m7g.4xlarge, kafka.m7g.8xlarge, kafka.m7g.12xlarge, kafka.m7g.16xlarge
|
|
52282
|
+
*
|
|
52283
|
+
* *Express broker sizes*
|
|
52284
|
+
*
|
|
52285
|
+
* - express.m7g.large, express.m7g.xlarge, express.m7g.2xlarge, express.m7g.4xlarge, express.m7g.8xlarge, express.m7g.12xlarge, express.m7g.16xlarge
|
|
52286
|
+
*
|
|
52287
|
+
* > Some broker sizes might not be available in certian AWS Regions. See the updated [Pricing tools](https://docs.aws.amazon.com/msk/pricing/) section on the Amazon MSK pricing page for the latest list of available instances by Region.
|
|
52089
52288
|
*/
|
|
52090
52289
|
instanceType: string;
|
|
52091
52290
|
/**
|
|
@@ -88054,7 +88253,7 @@ export declare namespace s3 {
|
|
|
88054
88253
|
*/
|
|
88055
88254
|
httpErrorCodeReturnedEquals?: string;
|
|
88056
88255
|
/**
|
|
88057
|
-
* The object key name prefix when the redirect is applied. For example, to redirect requests for ``ExamplePage.html``, the key prefix will be ``ExamplePage.html``. To redirect request for all pages with the prefix ``docs/``, the key prefix will be
|
|
88256
|
+
* The object key name prefix when the redirect is applied. For example, to redirect requests for ``ExamplePage.html``, the key prefix will be ``ExamplePage.html``. To redirect request for all pages with the prefix ``docs/``, the key prefix will be ``docs/``, which identifies all objects in the docs/ folder.
|
|
88058
88257
|
* Required when the parent element ``Condition`` is specified and sibling ``HttpErrorCodeReturnedEquals`` is not specified. If both conditions are specified, both must be true for the redirect to be applied.
|
|
88059
88258
|
*/
|
|
88060
88259
|
keyPrefixEquals?: string;
|
|
@@ -89922,6 +90121,10 @@ export declare namespace sagemaker {
|
|
|
89922
90121
|
* The security groups for the Amazon Virtual Private Cloud that the Domain uses for communication between Domain-level apps and user apps.
|
|
89923
90122
|
*/
|
|
89924
90123
|
securityGroupIds?: string[];
|
|
90124
|
+
/**
|
|
90125
|
+
* The settings that apply to an SageMaker AI domain when you use it in Amazon SageMaker Unified Studio.
|
|
90126
|
+
*/
|
|
90127
|
+
unifiedStudioSettings?: outputs.sagemaker.DomainUnifiedStudioSettings;
|
|
89925
90128
|
}
|
|
89926
90129
|
/**
|
|
89927
90130
|
* Specifies options when sharing an Amazon SageMaker Studio notebook. These settings are specified as part of DefaultUserSettings when the CreateDomain API is called, and as part of UserSettings when the CreateUserProfile API is called.
|
|
@@ -89961,6 +90164,44 @@ export declare namespace sagemaker {
|
|
|
89961
90164
|
*/
|
|
89962
90165
|
hiddenSageMakerImageVersionAliases?: outputs.sagemaker.DomainHiddenSageMakerImage[];
|
|
89963
90166
|
}
|
|
90167
|
+
/**
|
|
90168
|
+
* A collection of settings that apply to an Amazon SageMaker AI domain when you use it in Amazon SageMaker Unified Studio.
|
|
90169
|
+
*/
|
|
90170
|
+
interface DomainUnifiedStudioSettings {
|
|
90171
|
+
/**
|
|
90172
|
+
* The ID of the AWS account that has the Amazon SageMaker Unified Studio domain. The default value, if you don't specify an ID, is the ID of the account that has the Amazon SageMaker AI domain.
|
|
90173
|
+
*/
|
|
90174
|
+
domainAccountId?: string;
|
|
90175
|
+
/**
|
|
90176
|
+
* The ID of the Amazon SageMaker Unified Studio domain associated with this domain.
|
|
90177
|
+
*/
|
|
90178
|
+
domainId?: string;
|
|
90179
|
+
/**
|
|
90180
|
+
* The AWS Region where the domain is located in Amazon SageMaker Unified Studio. The default value, if you don't specify a Region, is the Region where the Amazon SageMaker AI domain is located.
|
|
90181
|
+
*/
|
|
90182
|
+
domainRegion?: string;
|
|
90183
|
+
/**
|
|
90184
|
+
* The ID of the environment that Amazon SageMaker Unified Studio associates with the domain.
|
|
90185
|
+
*/
|
|
90186
|
+
environmentId?: string;
|
|
90187
|
+
/**
|
|
90188
|
+
* The ID of the Amazon SageMaker Unified Studio project that corresponds to the domain.
|
|
90189
|
+
*/
|
|
90190
|
+
projectId?: string;
|
|
90191
|
+
/**
|
|
90192
|
+
* The location where Amazon S3 stores temporary execution data and other artifacts for the project that corresponds to the domain.
|
|
90193
|
+
*/
|
|
90194
|
+
projectS3Path?: string;
|
|
90195
|
+
/**
|
|
90196
|
+
* Sets whether you can access the domain in Amazon SageMaker Studio:
|
|
90197
|
+
*
|
|
90198
|
+
* ENABLED
|
|
90199
|
+
* You can access the domain in Amazon SageMaker Studio. If you migrate the domain to Amazon SageMaker Unified Studio, you can access it in both studio interfaces.
|
|
90200
|
+
* DISABLED
|
|
90201
|
+
* You can't access the domain in Amazon SageMaker Studio. If you migrate the domain to Amazon SageMaker Unified Studio, you can access it only in that studio interface.
|
|
90202
|
+
*/
|
|
90203
|
+
studioWebPortalAccess?: enums.sagemaker.DomainUnifiedStudioSettingsStudioWebPortalAccess;
|
|
90204
|
+
}
|
|
89964
90205
|
/**
|
|
89965
90206
|
* A collection of settings that apply to users of Amazon SageMaker Studio. These settings are specified when the CreateUserProfile API is called, and as DefaultUserSettings when the CreateDomain API is called.
|
|
89966
90207
|
*/
|
|
@@ -98388,6 +98629,10 @@ export declare namespace wafv2 {
|
|
|
98388
98629
|
*/
|
|
98389
98630
|
statements: outputs.wafv2.RuleGroupStatement[];
|
|
98390
98631
|
}
|
|
98632
|
+
interface RuleGroupAsnMatchStatement {
|
|
98633
|
+
asnList?: number[];
|
|
98634
|
+
forwardedIpConfig?: outputs.wafv2.RuleGroupForwardedIpConfiguration;
|
|
98635
|
+
}
|
|
98391
98636
|
/**
|
|
98392
98637
|
* Block traffic towards application.
|
|
98393
98638
|
*/
|
|
@@ -99065,6 +99310,7 @@ export declare namespace wafv2 {
|
|
|
99065
99310
|
* Specifies a single custom aggregate key for a rate-base rule.
|
|
99066
99311
|
*/
|
|
99067
99312
|
interface RuleGroupRateBasedStatementCustomKey {
|
|
99313
|
+
asn?: outputs.wafv2.RuleGroupRateLimitAsn;
|
|
99068
99314
|
/**
|
|
99069
99315
|
* Use the value of a cookie in the request as an aggregate key. Each distinct value in the cookie contributes to the aggregation instance. If you use a single cookie as your custom key, then each value fully defines an aggregation instance.
|
|
99070
99316
|
*/
|
|
@@ -99120,6 +99366,11 @@ export declare namespace wafv2 {
|
|
|
99120
99366
|
*/
|
|
99121
99367
|
uriPath?: outputs.wafv2.RuleGroupRateLimitUriPath;
|
|
99122
99368
|
}
|
|
99369
|
+
/**
|
|
99370
|
+
* Specifies the request's ASN as an aggregate key for a rate-based rule.
|
|
99371
|
+
*/
|
|
99372
|
+
interface RuleGroupRateLimitAsn {
|
|
99373
|
+
}
|
|
99123
99374
|
/**
|
|
99124
99375
|
* Specifies a cookie as an aggregate key for a rate-based rule.
|
|
99125
99376
|
*/
|
|
@@ -99388,6 +99639,7 @@ export declare namespace wafv2 {
|
|
|
99388
99639
|
* A logical rule statement used to combine other rule statements with AND logic. You provide more than one `Statement` within the `AndStatement` .
|
|
99389
99640
|
*/
|
|
99390
99641
|
andStatement?: outputs.wafv2.RuleGroupAndStatement;
|
|
99642
|
+
asnMatchStatement?: outputs.wafv2.RuleGroupAsnMatchStatement;
|
|
99391
99643
|
/**
|
|
99392
99644
|
* A rule statement that defines a string match search for AWS WAF to apply to web requests. The byte match statement provides the bytes to search for, the location in requests that you want AWS WAF to search, and other settings. The bytes to search for are typically a string that corresponds with ASCII characters. In the AWS WAF console and the developer guide, this is called a string match statement.
|
|
99393
99645
|
*/
|
|
@@ -99585,6 +99837,10 @@ export declare namespace wafv2 {
|
|
|
99585
99837
|
*/
|
|
99586
99838
|
statements: outputs.wafv2.WebAclStatement[];
|
|
99587
99839
|
}
|
|
99840
|
+
interface WebAclAsnMatchStatement {
|
|
99841
|
+
asnList?: number[];
|
|
99842
|
+
forwardedIpConfig?: outputs.wafv2.WebAclForwardedIpConfiguration;
|
|
99843
|
+
}
|
|
99588
99844
|
/**
|
|
99589
99845
|
* AssociationConfig for body inspection
|
|
99590
99846
|
*/
|
|
@@ -99637,6 +99893,13 @@ export declare namespace wafv2 {
|
|
|
99637
99893
|
*/
|
|
99638
99894
|
responseInspection?: outputs.wafv2.WebAclResponseInspection;
|
|
99639
99895
|
}
|
|
99896
|
+
/**
|
|
99897
|
+
* Configures how to use the AntiDDOS AWS managed rule group in the web ACL
|
|
99898
|
+
*/
|
|
99899
|
+
interface WebAclAwsManagedRulesAntiDDoSRuleSet {
|
|
99900
|
+
clientSideActionConfig: outputs.wafv2.WebAclClientSideActionConfig;
|
|
99901
|
+
sensitivityToBlock?: enums.wafv2.WebAclSensitivityToAct;
|
|
99902
|
+
}
|
|
99640
99903
|
/**
|
|
99641
99904
|
* Configures how to use the Account Takeover Prevention managed rule group in the web ACL
|
|
99642
99905
|
*/
|
|
@@ -99810,6 +100073,20 @@ export declare namespace wafv2 {
|
|
|
99810
100073
|
*/
|
|
99811
100074
|
immunityTimeProperty?: outputs.wafv2.WebAclImmunityTimeProperty;
|
|
99812
100075
|
}
|
|
100076
|
+
/**
|
|
100077
|
+
* Client side action config for AntiDDOS AMR.
|
|
100078
|
+
*/
|
|
100079
|
+
interface WebAclClientSideAction {
|
|
100080
|
+
exemptUriRegularExpressions?: outputs.wafv2.WebAclRegex[];
|
|
100081
|
+
sensitivity?: enums.wafv2.WebAclSensitivityToAct;
|
|
100082
|
+
usageOfAction: enums.wafv2.WebAclUsageOfAction;
|
|
100083
|
+
}
|
|
100084
|
+
/**
|
|
100085
|
+
* Client side action config for AntiDDOS AMR.
|
|
100086
|
+
*/
|
|
100087
|
+
interface WebAclClientSideActionConfig {
|
|
100088
|
+
challenge: outputs.wafv2.WebAclClientSideAction;
|
|
100089
|
+
}
|
|
99813
100090
|
/**
|
|
99814
100091
|
* The pattern to look for in the request cookies.
|
|
99815
100092
|
*/
|
|
@@ -100350,6 +100627,7 @@ export declare namespace wafv2 {
|
|
|
100350
100627
|
* For information about using the ACFP managed rule group, see [AWS WAF Fraud Control account creation fraud prevention (ACFP) rule group](https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-acfp.html) and [AWS WAF Fraud Control account creation fraud prevention (ACFP)](https://docs.aws.amazon.com/waf/latest/developerguide/waf-acfp.html) in the *AWS WAF Developer Guide* .
|
|
100351
100628
|
*/
|
|
100352
100629
|
awsManagedRulesAcfpRuleSet?: outputs.wafv2.WebAclAwsManagedRulesAcfpRuleSet;
|
|
100630
|
+
awsManagedRulesAntiDDoSRuleSet?: outputs.wafv2.WebAclAwsManagedRulesAntiDDoSRuleSet;
|
|
100353
100631
|
/**
|
|
100354
100632
|
* Additional configuration for using the account takeover prevention (ATP) managed rule group, `AWSManagedRulesATPRuleSet` . Use this to provide login request information to the rule group. For web ACLs that protect CloudFront distributions, use this to also provide the information about how your distribution responds to login requests.
|
|
100355
100633
|
*
|
|
@@ -100417,6 +100695,12 @@ export declare namespace wafv2 {
|
|
|
100417
100695
|
*/
|
|
100418
100696
|
statement: outputs.wafv2.WebAclStatement;
|
|
100419
100697
|
}
|
|
100698
|
+
/**
|
|
100699
|
+
* Configures the options for on-source DDoS protection provided by supported resource type.
|
|
100700
|
+
*/
|
|
100701
|
+
interface WebAclOnSourceDDoSProtectionConfig {
|
|
100702
|
+
albLowReputationMode: enums.wafv2.WebAclOnSourceDDoSProtectionConfigAlbLowReputationMode;
|
|
100703
|
+
}
|
|
100420
100704
|
interface WebAclOrStatement {
|
|
100421
100705
|
/**
|
|
100422
100706
|
* The statements to combine with OR logic. You can use any statements that can be nested.
|
|
@@ -100498,6 +100782,7 @@ export declare namespace wafv2 {
|
|
|
100498
100782
|
* Specifies a single custom aggregate key for a rate-base rule.
|
|
100499
100783
|
*/
|
|
100500
100784
|
interface WebAclRateBasedStatementCustomKey {
|
|
100785
|
+
asn?: outputs.wafv2.WebAclRateLimitAsn;
|
|
100501
100786
|
/**
|
|
100502
100787
|
* Use the value of a cookie in the request as an aggregate key. Each distinct value in the cookie contributes to the aggregation instance. If you use a single cookie as your custom key, then each value fully defines an aggregation instance.
|
|
100503
100788
|
*/
|
|
@@ -100553,6 +100838,11 @@ export declare namespace wafv2 {
|
|
|
100553
100838
|
*/
|
|
100554
100839
|
uriPath?: outputs.wafv2.WebAclRateLimitUriPath;
|
|
100555
100840
|
}
|
|
100841
|
+
/**
|
|
100842
|
+
* Specifies the request's ASN as an aggregate key for a rate-based rule.
|
|
100843
|
+
*/
|
|
100844
|
+
interface WebAclRateLimitAsn {
|
|
100845
|
+
}
|
|
100556
100846
|
/**
|
|
100557
100847
|
* Specifies a cookie as an aggregate key for a rate-based rule.
|
|
100558
100848
|
*/
|
|
@@ -100662,6 +100952,12 @@ export declare namespace wafv2 {
|
|
|
100662
100952
|
*/
|
|
100663
100953
|
textTransformations: outputs.wafv2.WebAclTextTransformation[];
|
|
100664
100954
|
}
|
|
100955
|
+
/**
|
|
100956
|
+
* Regex
|
|
100957
|
+
*/
|
|
100958
|
+
interface WebAclRegex {
|
|
100959
|
+
regexString?: string;
|
|
100960
|
+
}
|
|
100665
100961
|
interface WebAclRegexMatchStatement {
|
|
100666
100962
|
/**
|
|
100667
100963
|
* The part of the web request that you want AWS WAF to inspect.
|
|
@@ -101093,6 +101389,7 @@ export declare namespace wafv2 {
|
|
|
101093
101389
|
* A logical rule statement used to combine other rule statements with AND logic. You provide more than one `Statement` within the `AndStatement` .
|
|
101094
101390
|
*/
|
|
101095
101391
|
andStatement?: outputs.wafv2.WebAclAndStatement;
|
|
101392
|
+
asnMatchStatement?: outputs.wafv2.WebAclAsnMatchStatement;
|
|
101096
101393
|
/**
|
|
101097
101394
|
* A rule statement that defines a string match search for AWS WAF to apply to web requests. The byte match statement provides the bytes to search for, the location in requests that you want AWS WAF to search, and other settings. The bytes to search for are typically a string that corresponds with ASCII characters. In the AWS WAF console and the developer guide, this is called a string match statement.
|
|
101098
101395
|
*/
|
package/types/output.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"output.js","sourceRoot":"","sources":["../../types/output.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;
|
|
1
|
+
{"version":3,"file":"output.js","sourceRoot":"","sources":["../../types/output.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAkxmBjF,IAAiB,MAAM,CAgHtB;AAhHD,WAAiB,MAAM;IAoDnB;;OAEG;IACH,SAAgB,yBAAyB,CAAC,GAAe;;QACrD,uCACO,GAAG,KACN,qBAAqB,EAAE,MAAA,CAAC,GAAG,CAAC,qBAAqB,CAAC,mCAAI,CAAC,IACzD;IACN,CAAC;IALe,gCAAyB,4BAKxC,CAAA;AAoDL,CAAC,EAhHgB,MAAM,GAAN,cAAM,KAAN,cAAM,QAgHtB"}
|
package/wafv2/getWebAcl.d.ts
CHANGED
|
@@ -87,9 +87,9 @@ export interface GetWebAclResult {
|
|
|
87
87
|
*/
|
|
88
88
|
readonly labelNamespace?: string;
|
|
89
89
|
/**
|
|
90
|
-
*
|
|
90
|
+
* Configures the level of DDoS protection that applies to web ACLs associated with Application Load Balancers.
|
|
91
91
|
*/
|
|
92
|
-
readonly onSourceDDoSProtectionConfig?:
|
|
92
|
+
readonly onSourceDDoSProtectionConfig?: outputs.wafv2.WebAclOnSourceDDoSProtectionConfig;
|
|
93
93
|
/**
|
|
94
94
|
* Collection of Rules.
|
|
95
95
|
*/
|
package/wafv2/webAcl.d.ts
CHANGED
|
@@ -87,9 +87,9 @@ export declare class WebAcl extends pulumi.CustomResource {
|
|
|
87
87
|
*/
|
|
88
88
|
readonly name: pulumi.Output<string | undefined>;
|
|
89
89
|
/**
|
|
90
|
-
*
|
|
90
|
+
* Configures the level of DDoS protection that applies to web ACLs associated with Application Load Balancers.
|
|
91
91
|
*/
|
|
92
|
-
readonly onSourceDDoSProtectionConfig: pulumi.Output<
|
|
92
|
+
readonly onSourceDDoSProtectionConfig: pulumi.Output<outputs.wafv2.WebAclOnSourceDDoSProtectionConfig | undefined>;
|
|
93
93
|
/**
|
|
94
94
|
* Collection of Rules.
|
|
95
95
|
*/
|
|
@@ -174,9 +174,9 @@ export interface WebAclArgs {
|
|
|
174
174
|
*/
|
|
175
175
|
name?: pulumi.Input<string>;
|
|
176
176
|
/**
|
|
177
|
-
*
|
|
177
|
+
* Configures the level of DDoS protection that applies to web ACLs associated with Application Load Balancers.
|
|
178
178
|
*/
|
|
179
|
-
onSourceDDoSProtectionConfig?:
|
|
179
|
+
onSourceDDoSProtectionConfig?: pulumi.Input<inputs.wafv2.WebAclOnSourceDDoSProtectionConfigArgs>;
|
|
180
180
|
/**
|
|
181
181
|
* Collection of Rules.
|
|
182
182
|
*/
|