@pulumi/aws-native 1.30.0-alpha.1749822605 → 1.30.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/appstream/getAppBlock.d.ts +5 -0
- package/appstream/getAppBlock.js.map +1 -1
- package/appstream/getAppBlockBuilder.d.ts +4 -0
- package/appstream/getAppBlockBuilder.js.map +1 -1
- package/appstream/getApplication.d.ts +4 -0
- package/appstream/getApplication.js.map +1 -1
- package/ec2/egressOnlyInternetGateway.d.ts +10 -0
- package/ec2/egressOnlyInternetGateway.js +2 -0
- package/ec2/egressOnlyInternetGateway.js.map +1 -1
- package/ec2/getEgressOnlyInternetGateway.d.ts +5 -0
- package/ec2/getEgressOnlyInternetGateway.js.map +1 -1
- package/ec2/getSubnet.d.ts +2 -1
- package/ec2/getSubnet.js.map +1 -1
- package/ec2/subnet.d.ts +3 -2
- package/ec2/subnet.js +2 -0
- package/ec2/subnet.js.map +1 -1
- package/efs/mountTarget.d.ts +16 -0
- package/efs/mountTarget.js.map +1 -1
- package/entityresolution/getMatchingWorkflow.d.ts +3 -1
- package/entityresolution/getMatchingWorkflow.js.map +1 -1
- package/entityresolution/matchingWorkflow.d.ts +6 -2
- package/entityresolution/matchingWorkflow.js.map +1 -1
- package/evs/environment.d.ts +90 -0
- package/evs/environment.js.map +1 -1
- package/evs/getEnvironment.d.ts +34 -0
- package/evs/getEnvironment.js.map +1 -1
- package/lambda/eventSourceMapping.d.ts +46 -46
- package/lambda/eventSourceMapping.js +1 -1
- package/lambda/eventSourceMapping.js.map +1 -1
- package/lambda/getEventSourceMapping.d.ts +22 -14
- package/lambda/getEventSourceMapping.js.map +1 -1
- package/mwaa/environment.d.ts +2 -0
- package/mwaa/environment.js +2 -0
- package/mwaa/environment.js.map +1 -1
- package/opsworkscm/getServer.d.ts +9 -4
- package/opsworkscm/getServer.js.map +1 -1
- package/opsworkscm/server.d.ts +9 -2
- package/opsworkscm/server.js +2 -2
- package/opsworkscm/server.js.map +1 -1
- package/package.json +3 -3
- package/package.json.dev +2 -2
- package/types/enums/efs/index.d.ts +5 -0
- package/types/enums/entityresolution/index.d.ts +3 -1
- package/types/enums/entityresolution/index.js.map +1 -1
- package/types/enums/evs/index.d.ts +16 -0
- package/types/enums/evs/index.js.map +1 -1
- package/types/enums/kms/index.d.ts +3 -0
- package/types/enums/kms/index.js +3 -0
- package/types/enums/kms/index.js.map +1 -1
- package/types/enums/lambda/index.d.ts +34 -9
- package/types/enums/lambda/index.js +14 -1
- package/types/enums/lambda/index.js.map +1 -1
- package/types/enums/mwaa/index.d.ts +8 -0
- package/types/enums/mwaa/index.js +5 -1
- package/types/enums/mwaa/index.js.map +1 -1
- package/types/enums/sagemaker/index.d.ts +13 -0
- package/types/enums/sagemaker/index.js +7 -3
- package/types/enums/sagemaker/index.js.map +1 -1
- package/types/enums/wafv2/index.d.ts +16 -0
- package/types/enums/wafv2/index.js +15 -2
- package/types/enums/wafv2/index.js.map +1 -1
- package/types/input.d.ts +288 -16
- package/types/output.d.ts +313 -16
- package/types/output.js.map +1 -1
- package/wafv2/getWebAcl.d.ts +2 -2
- package/wafv2/webAcl.d.ts +4 -4
package/types/input.d.ts
CHANGED
|
@@ -6358,6 +6358,10 @@ export declare namespace athena {
|
|
|
6358
6358
|
* Role used to access user resources in an Athena for Apache Spark session. This property applies only to Spark-enabled workgroups in Athena.
|
|
6359
6359
|
*/
|
|
6360
6360
|
executionRole?: pulumi.Input<string>;
|
|
6361
|
+
/**
|
|
6362
|
+
* The configuration for storing results in Athena owned storage, which includes whether this feature is enabled; whether encryption configuration, if any, is used for encrypting query results.
|
|
6363
|
+
*/
|
|
6364
|
+
managedQueryResultsConfiguration?: pulumi.Input<inputs.athena.WorkGroupManagedQueryResultsConfigurationArgs>;
|
|
6361
6365
|
/**
|
|
6362
6366
|
* Indicates that the Amazon CloudWatch metrics are enabled for the workgroup.
|
|
6363
6367
|
*/
|
|
@@ -6381,6 +6385,7 @@ export declare namespace athena {
|
|
|
6381
6385
|
enforceWorkGroupConfiguration?: pulumi.Input<boolean>;
|
|
6382
6386
|
engineVersion?: pulumi.Input<inputs.athena.WorkGroupEngineVersionArgs>;
|
|
6383
6387
|
executionRole?: pulumi.Input<string>;
|
|
6388
|
+
managedQueryResultsConfiguration?: pulumi.Input<inputs.athena.WorkGroupManagedQueryResultsConfigurationArgs>;
|
|
6384
6389
|
publishCloudWatchMetricsEnabled?: pulumi.Input<boolean>;
|
|
6385
6390
|
removeBytesScannedCutoffPerQuery?: pulumi.Input<boolean>;
|
|
6386
6391
|
removeCustomerContentEncryptionConfiguration?: pulumi.Input<boolean>;
|
|
@@ -6424,6 +6429,25 @@ export declare namespace athena {
|
|
|
6424
6429
|
*/
|
|
6425
6430
|
selectedEngineVersion?: pulumi.Input<string>;
|
|
6426
6431
|
}
|
|
6432
|
+
/**
|
|
6433
|
+
* The configuration for the managed query results and encryption option. ResultConfiguration and ManagedQueryResultsConfiguration cannot be set at the same time
|
|
6434
|
+
*/
|
|
6435
|
+
interface WorkGroupManagedQueryResultsConfigurationArgs {
|
|
6436
|
+
/**
|
|
6437
|
+
* If set to true, allows you to store query results in Athena owned storage. If set to false, workgroup member stores query results in location specified under `ResultConfiguration$OutputLocation` . The default is false. A workgroup cannot have the `ResultConfiguration$OutputLocation` parameter when you set this field to true.
|
|
6438
|
+
*/
|
|
6439
|
+
enabled?: pulumi.Input<boolean>;
|
|
6440
|
+
/**
|
|
6441
|
+
* If you encrypt query and calculation results in Athena owned storage, this field indicates the encryption option (for example, SSE_KMS or CSE_KMS) and key information.
|
|
6442
|
+
*/
|
|
6443
|
+
encryptionConfiguration?: pulumi.Input<inputs.athena.WorkGroupManagedStorageEncryptionConfigurationArgs>;
|
|
6444
|
+
}
|
|
6445
|
+
/**
|
|
6446
|
+
* Indicates the encryption configuration for Athena Managed Storage. If not setting this field, Managed Storage will encrypt the query results with Athena's encryption key
|
|
6447
|
+
*/
|
|
6448
|
+
interface WorkGroupManagedStorageEncryptionConfigurationArgs {
|
|
6449
|
+
kmsKey?: pulumi.Input<string>;
|
|
6450
|
+
}
|
|
6427
6451
|
/**
|
|
6428
6452
|
* The location in Amazon S3 where query results are stored and the encryption option, if any, used for query results. These are known as "client-side settings". If workgroup settings override client-side settings, then the query uses the workgroup settings.
|
|
6429
6453
|
*/
|
|
@@ -22896,7 +22920,7 @@ export declare namespace dynamodb {
|
|
|
22896
22920
|
*/
|
|
22897
22921
|
keySchema: pulumi.Input<pulumi.Input<inputs.dynamodb.TableKeySchemaArgs>[]>;
|
|
22898
22922
|
/**
|
|
22899
|
-
* The maximum number of read and write units for the specified global secondary index. If you use this parameter, you must specify ``MaxReadRequestUnits``, ``MaxWriteRequestUnits``, or both.
|
|
22923
|
+
* The maximum number of read and write units for the specified global secondary index. If you use this parameter, you must specify ``MaxReadRequestUnits``, ``MaxWriteRequestUnits``, or both. You must use either ``OnDemandThroughput`` or ``ProvisionedThroughput`` based on your table's capacity mode.
|
|
22900
22924
|
*/
|
|
22901
22925
|
onDemandThroughput?: pulumi.Input<inputs.dynamodb.TableOnDemandThroughputArgs>;
|
|
22902
22926
|
/**
|
|
@@ -22904,7 +22928,7 @@ export declare namespace dynamodb {
|
|
|
22904
22928
|
*/
|
|
22905
22929
|
projection: pulumi.Input<inputs.dynamodb.TableProjectionArgs>;
|
|
22906
22930
|
/**
|
|
22907
|
-
* Represents the provisioned throughput settings for the specified global secondary index.
|
|
22931
|
+
* Represents the provisioned throughput settings for the specified global secondary index. You must use either ``OnDemandThroughput`` or ``ProvisionedThroughput`` based on your table's capacity mode.
|
|
22908
22932
|
* For current minimum and maximum provisioned throughput values, see [Service, Account, and Table Quotas](https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/Limits.html) in the *Amazon DynamoDB Developer Guide*.
|
|
22909
22933
|
*/
|
|
22910
22934
|
provisionedThroughput?: pulumi.Input<inputs.dynamodb.TableProvisionedThroughputArgs>;
|
|
@@ -31322,7 +31346,9 @@ export declare namespace entityresolution {
|
|
|
31322
31346
|
}
|
|
31323
31347
|
interface MatchingWorkflowIncrementalRunConfigArgs {
|
|
31324
31348
|
/**
|
|
31325
|
-
* The type of incremental run.
|
|
31349
|
+
* The type of incremental run. The only valid value is `IMMEDIATE` . This appears as "Automatic" in the console.
|
|
31350
|
+
*
|
|
31351
|
+
* > For workflows where `resolutionType` is `ML_MATCHING` , incremental processing is not supported.
|
|
31326
31352
|
*/
|
|
31327
31353
|
incrementalRunType: pulumi.Input<enums.entityresolution.MatchingWorkflowIncrementalRunConfigIncrementalRunType>;
|
|
31328
31354
|
}
|
|
@@ -32281,53 +32307,151 @@ export declare namespace evidently {
|
|
|
32281
32307
|
}
|
|
32282
32308
|
}
|
|
32283
32309
|
export declare namespace evs {
|
|
32310
|
+
/**
|
|
32311
|
+
* The connectivity configuration for the environment. Amazon EVS requires that you specify two route server peer IDs. During environment creation, the route server endpoints peer with the NSX uplink VLAN for connectivity to the NSX overlay network.
|
|
32312
|
+
*/
|
|
32284
32313
|
interface ConnectivityInfoPropertiesArgs {
|
|
32314
|
+
/**
|
|
32315
|
+
* The unique IDs for private route server peers.
|
|
32316
|
+
*/
|
|
32285
32317
|
privateRouteServerPeerings: pulumi.Input<pulumi.Input<string>[]>;
|
|
32286
32318
|
}
|
|
32287
32319
|
interface EnvironmentHostInfoForCreateArgs {
|
|
32320
|
+
/**
|
|
32321
|
+
* The unique ID of the Amazon EC2 Dedicated Host.
|
|
32322
|
+
*/
|
|
32288
32323
|
dedicatedHostId?: pulumi.Input<string>;
|
|
32324
|
+
/**
|
|
32325
|
+
* The DNS hostname of the host. DNS hostnames for hosts must be unique across Amazon EVS environments and within VCF.
|
|
32326
|
+
*/
|
|
32289
32327
|
hostName: pulumi.Input<string>;
|
|
32328
|
+
/**
|
|
32329
|
+
* The EC2 instance type that represents the host.
|
|
32330
|
+
*/
|
|
32290
32331
|
instanceType: pulumi.Input<enums.evs.EnvironmentHostInfoForCreateInstanceType>;
|
|
32332
|
+
/**
|
|
32333
|
+
* The name of the SSH key that is used to access the host.
|
|
32334
|
+
*/
|
|
32291
32335
|
keyName: pulumi.Input<string>;
|
|
32336
|
+
/**
|
|
32337
|
+
* The unique ID of the placement group where the host is placed.
|
|
32338
|
+
*/
|
|
32292
32339
|
placementGroupId?: pulumi.Input<string>;
|
|
32293
32340
|
}
|
|
32294
32341
|
interface EnvironmentInitialVlanInfoArgs {
|
|
32342
|
+
/**
|
|
32343
|
+
* The CIDR block that you provide to create an Amazon EVS VLAN subnet. Amazon EVS VLAN subnets have a minimum CIDR block size of /28 and a maximum size of /24. Amazon EVS VLAN subnet CIDR blocks must not overlap with other subnets in the VPC.
|
|
32344
|
+
*/
|
|
32295
32345
|
cidr: pulumi.Input<string>;
|
|
32296
32346
|
}
|
|
32297
32347
|
/**
|
|
32298
32348
|
* The initial Vlan configuration only required upon creation. Modification after creation will have no effect
|
|
32299
32349
|
*/
|
|
32300
32350
|
interface InitialVlansPropertiesArgs {
|
|
32351
|
+
/**
|
|
32352
|
+
* The edge VTEP VLAN subnet. This VLAN subnet manages traffic flowing between the internal network and external networks, including internet access and other site connections.
|
|
32353
|
+
*/
|
|
32301
32354
|
edgeVTep: pulumi.Input<inputs.evs.EnvironmentInitialVlanInfoArgs>;
|
|
32355
|
+
/**
|
|
32356
|
+
* An additional VLAN subnet that can be used to extend VCF capabilities once configured. For example, you can configure an expansion VLAN subnet to use NSX Federation for centralized management and synchronization of multiple NSX deployments across different locations.
|
|
32357
|
+
*/
|
|
32302
32358
|
expansionVlan1: pulumi.Input<inputs.evs.EnvironmentInitialVlanInfoArgs>;
|
|
32359
|
+
/**
|
|
32360
|
+
* An additional VLAN subnet that can be used to extend VCF capabilities once configured. For example, you can configure an expansion VLAN subnet to use NSX Federation for centralized management and synchronization of multiple NSX deployments across different locations.
|
|
32361
|
+
*/
|
|
32303
32362
|
expansionVlan2: pulumi.Input<inputs.evs.EnvironmentInitialVlanInfoArgs>;
|
|
32363
|
+
/**
|
|
32364
|
+
* The HCX VLAN subnet. This VLAN subnet allows the HCX Interconnnect (IX) and HCX Network Extension (NE) to reach their peers and enable HCX Service Mesh creation.
|
|
32365
|
+
*/
|
|
32304
32366
|
hcx: pulumi.Input<inputs.evs.EnvironmentInitialVlanInfoArgs>;
|
|
32367
|
+
/**
|
|
32368
|
+
* The NSX uplink VLAN subnet. This VLAN subnet allows connectivity to the NSX overlay network.
|
|
32369
|
+
*/
|
|
32305
32370
|
nsxUpLink: pulumi.Input<inputs.evs.EnvironmentInitialVlanInfoArgs>;
|
|
32371
|
+
/**
|
|
32372
|
+
* The vMotion VLAN subnet. This VLAN subnet carries traffic for vSphere vMotion.
|
|
32373
|
+
*/
|
|
32306
32374
|
vMotion: pulumi.Input<inputs.evs.EnvironmentInitialVlanInfoArgs>;
|
|
32375
|
+
/**
|
|
32376
|
+
* The vSAN VLAN subnet. This VLAN subnet carries the communication between ESXi hosts to implement a vSAN shared storage pool.
|
|
32377
|
+
*/
|
|
32307
32378
|
vSan: pulumi.Input<inputs.evs.EnvironmentInitialVlanInfoArgs>;
|
|
32379
|
+
/**
|
|
32380
|
+
* The VTEP VLAN subnet. This VLAN subnet handles internal network traffic between virtual machines within a VCF instance.
|
|
32381
|
+
*/
|
|
32308
32382
|
vTep: pulumi.Input<inputs.evs.EnvironmentInitialVlanInfoArgs>;
|
|
32383
|
+
/**
|
|
32384
|
+
* The VM management VLAN subnet. This VLAN subnet carries traffic for vSphere virtual machines.
|
|
32385
|
+
*/
|
|
32309
32386
|
vmManagement: pulumi.Input<inputs.evs.EnvironmentInitialVlanInfoArgs>;
|
|
32387
|
+
/**
|
|
32388
|
+
* The host VMkernel management VLAN subnet. This VLAN subnet carries traffic for managing ESXi hosts and communicating with VMware vCenter Server.
|
|
32389
|
+
*/
|
|
32310
32390
|
vmkManagement: pulumi.Input<inputs.evs.EnvironmentInitialVlanInfoArgs>;
|
|
32311
32391
|
}
|
|
32312
32392
|
/**
|
|
32313
32393
|
* The license information for an EVS environment
|
|
32314
32394
|
*/
|
|
32315
32395
|
interface LicenseInfoPropertiesArgs {
|
|
32396
|
+
/**
|
|
32397
|
+
* The VCF solution key. This license unlocks VMware VCF product features, including vSphere, NSX, SDDC Manager, and vCenter Server.
|
|
32398
|
+
*/
|
|
32316
32399
|
solutionKey: pulumi.Input<string>;
|
|
32400
|
+
/**
|
|
32401
|
+
* The VSAN license key. This license unlocks vSAN features.
|
|
32402
|
+
*/
|
|
32317
32403
|
vsanKey: pulumi.Input<string>;
|
|
32318
32404
|
}
|
|
32405
|
+
/**
|
|
32406
|
+
* The security groups that allow traffic between the Amazon EVS control plane and your VPC for service access. If a security group is not specified, Amazon EVS uses the default security group in your account for service access.
|
|
32407
|
+
*/
|
|
32319
32408
|
interface ServiceAccessSecurityGroupsPropertiesArgs {
|
|
32409
|
+
/**
|
|
32410
|
+
* The security groups that allow service access.
|
|
32411
|
+
*/
|
|
32320
32412
|
securityGroups?: pulumi.Input<pulumi.Input<string>[]>;
|
|
32321
32413
|
}
|
|
32414
|
+
/**
|
|
32415
|
+
* The DNS hostnames to be used by the VCF management appliances in your environment.
|
|
32416
|
+
*
|
|
32417
|
+
* For environment creation to be successful, each hostname entry must resolve to a domain name that you've registered in your DNS service of choice and configured in the DHCP option set of your VPC. DNS hostnames cannot be changed after environment creation has started.
|
|
32418
|
+
*/
|
|
32322
32419
|
interface VcfHostnamesPropertiesArgs {
|
|
32420
|
+
/**
|
|
32421
|
+
* The hostname for VMware Cloud Builder.
|
|
32422
|
+
*/
|
|
32323
32423
|
cloudBuilder: pulumi.Input<string>;
|
|
32424
|
+
/**
|
|
32425
|
+
* The VMware NSX hostname.
|
|
32426
|
+
*/
|
|
32324
32427
|
nsx: pulumi.Input<string>;
|
|
32428
|
+
/**
|
|
32429
|
+
* The hostname for the first NSX Edge node.
|
|
32430
|
+
*/
|
|
32325
32431
|
nsxEdge1: pulumi.Input<string>;
|
|
32432
|
+
/**
|
|
32433
|
+
* The hostname for the second NSX Edge node.
|
|
32434
|
+
*/
|
|
32326
32435
|
nsxEdge2: pulumi.Input<string>;
|
|
32436
|
+
/**
|
|
32437
|
+
* The hostname for the first VMware NSX Manager virtual machine (VM).
|
|
32438
|
+
*/
|
|
32327
32439
|
nsxManager1: pulumi.Input<string>;
|
|
32440
|
+
/**
|
|
32441
|
+
* The hostname for the second VMware NSX Manager virtual machine (VM).
|
|
32442
|
+
*/
|
|
32328
32443
|
nsxManager2: pulumi.Input<string>;
|
|
32444
|
+
/**
|
|
32445
|
+
* The hostname for the third VMware NSX Manager virtual machine (VM).
|
|
32446
|
+
*/
|
|
32329
32447
|
nsxManager3: pulumi.Input<string>;
|
|
32448
|
+
/**
|
|
32449
|
+
* The hostname for SDDC Manager.
|
|
32450
|
+
*/
|
|
32330
32451
|
sddcManager: pulumi.Input<string>;
|
|
32452
|
+
/**
|
|
32453
|
+
* The VMware vCenter hostname.
|
|
32454
|
+
*/
|
|
32331
32455
|
vCenter: pulumi.Input<string>;
|
|
32332
32456
|
}
|
|
32333
32457
|
}
|
|
@@ -44809,6 +44933,7 @@ export declare namespace lambda {
|
|
|
44809
44933
|
* The identifier for the Kafka consumer group to join. The consumer group ID must be unique among all your Kafka event sources. After creating a Kafka event source mapping with the consumer group ID specified, you cannot update this value. For more information, see [Customizable consumer group ID](https://docs.aws.amazon.com/lambda/latest/dg/with-msk.html#services-msk-consumer-group-id).
|
|
44810
44934
|
*/
|
|
44811
44935
|
consumerGroupId?: pulumi.Input<string>;
|
|
44936
|
+
schemaRegistryConfig?: pulumi.Input<inputs.lambda.EventSourceMappingSchemaRegistryConfigArgs>;
|
|
44812
44937
|
}
|
|
44813
44938
|
/**
|
|
44814
44939
|
* A configuration object that specifies the destination of an event after Lambda processes it.
|
|
@@ -44873,7 +44998,7 @@ export declare namespace lambda {
|
|
|
44873
44998
|
metrics?: pulumi.Input<pulumi.Input<enums.lambda.EventSourceMappingMetricsConfigMetricsItem>[]>;
|
|
44874
44999
|
}
|
|
44875
45000
|
/**
|
|
44876
|
-
* A destination for events that failed processing.
|
|
45001
|
+
* A destination for events that failed processing. See [Capturing records of Lambda asynchronous invocations](https://docs.aws.amazon.com/lambda/latest/dg/invocation-async-retain-records.html) for more information.
|
|
44877
45002
|
*/
|
|
44878
45003
|
interface EventSourceMappingOnFailureArgs {
|
|
44879
45004
|
/**
|
|
@@ -44905,6 +45030,40 @@ export declare namespace lambda {
|
|
|
44905
45030
|
*/
|
|
44906
45031
|
maximumConcurrency?: pulumi.Input<number>;
|
|
44907
45032
|
}
|
|
45033
|
+
interface EventSourceMappingSchemaRegistryAccessConfigArgs {
|
|
45034
|
+
/**
|
|
45035
|
+
* The type of authentication Lambda uses to access your schema registry.
|
|
45036
|
+
*/
|
|
45037
|
+
type?: pulumi.Input<enums.lambda.EventSourceMappingSchemaRegistryAccessConfigType>;
|
|
45038
|
+
/**
|
|
45039
|
+
* The URI of the secret (Secrets Manager secret ARN) to authenticate with your schema registry.
|
|
45040
|
+
*/
|
|
45041
|
+
uri?: pulumi.Input<string>;
|
|
45042
|
+
}
|
|
45043
|
+
interface EventSourceMappingSchemaRegistryConfigArgs {
|
|
45044
|
+
/**
|
|
45045
|
+
* An array of access configuration objects that tell Lambda how to authenticate with your schema registry.
|
|
45046
|
+
*/
|
|
45047
|
+
accessConfigs?: pulumi.Input<pulumi.Input<inputs.lambda.EventSourceMappingSchemaRegistryAccessConfigArgs>[]>;
|
|
45048
|
+
/**
|
|
45049
|
+
* The record format that Lambda delivers to your function after schema validation.
|
|
45050
|
+
*/
|
|
45051
|
+
eventRecordFormat?: pulumi.Input<enums.lambda.EventSourceMappingSchemaRegistryConfigEventRecordFormat>;
|
|
45052
|
+
/**
|
|
45053
|
+
* The URI for your schema registry. The correct URI format depends on the type of schema registry you're using.
|
|
45054
|
+
*/
|
|
45055
|
+
schemaRegistryUri?: pulumi.Input<string>;
|
|
45056
|
+
/**
|
|
45057
|
+
* An array of schema validation configuration objects, which tell Lambda the message attributes you want to validate and filter using your schema registry.
|
|
45058
|
+
*/
|
|
45059
|
+
schemaValidationConfigs?: pulumi.Input<pulumi.Input<inputs.lambda.EventSourceMappingSchemaValidationConfigArgs>[]>;
|
|
45060
|
+
}
|
|
45061
|
+
interface EventSourceMappingSchemaValidationConfigArgs {
|
|
45062
|
+
/**
|
|
45063
|
+
* The attribute you want your schema registry to validate and filter for.
|
|
45064
|
+
*/
|
|
45065
|
+
attribute?: pulumi.Input<enums.lambda.EventSourceMappingSchemaValidationConfigAttribute>;
|
|
45066
|
+
}
|
|
44908
45067
|
/**
|
|
44909
45068
|
* The self-managed Apache Kafka cluster for your event source.
|
|
44910
45069
|
*/
|
|
@@ -44919,9 +45078,10 @@ export declare namespace lambda {
|
|
|
44919
45078
|
*/
|
|
44920
45079
|
interface EventSourceMappingSelfManagedKafkaEventSourceConfigArgs {
|
|
44921
45080
|
/**
|
|
44922
|
-
* The identifier for the Kafka consumer group to join. The consumer group ID must be unique among all your Kafka event sources. After creating a Kafka event source mapping with the consumer group ID specified, you cannot update this value. For more information, see [Customizable consumer group ID](https://docs.aws.amazon.com/lambda/latest/dg/with-
|
|
45081
|
+
* The identifier for the Kafka consumer group to join. The consumer group ID must be unique among all your Kafka event sources. After creating a Kafka event source mapping with the consumer group ID specified, you cannot update this value. For more information, see [Customizable consumer group ID](https://docs.aws.amazon.com/lambda/latest/dg/with-kafka-process.html#services-smaa-topic-add).
|
|
44923
45082
|
*/
|
|
44924
45083
|
consumerGroupId?: pulumi.Input<string>;
|
|
45084
|
+
schemaRegistryConfig?: pulumi.Input<inputs.lambda.EventSourceMappingSchemaRegistryConfigArgs>;
|
|
44925
45085
|
}
|
|
44926
45086
|
/**
|
|
44927
45087
|
* An array of the authentication protocol, VPC components, or virtual host to secure and define your event source.
|
|
@@ -44929,15 +45089,15 @@ export declare namespace lambda {
|
|
|
44929
45089
|
interface EventSourceMappingSourceAccessConfigurationArgs {
|
|
44930
45090
|
/**
|
|
44931
45091
|
* The type of authentication protocol, VPC components, or virtual host for your event source. For example: ``"Type":"SASL_SCRAM_512_AUTH"``.
|
|
44932
|
-
* +
|
|
44933
|
-
* +
|
|
44934
|
-
* +
|
|
44935
|
-
* +
|
|
44936
|
-
* +
|
|
44937
|
-
* +
|
|
44938
|
-
* +
|
|
44939
|
-
* +
|
|
44940
|
-
* +
|
|
45092
|
+
* + ``BASIC_AUTH`` – (Amazon MQ) The ASMlong secret that stores your broker credentials.
|
|
45093
|
+
* + ``BASIC_AUTH`` – (Self-managed Apache Kafka) The Secrets Manager ARN of your secret key used for SASL/PLAIN authentication of your Apache Kafka brokers.
|
|
45094
|
+
* + ``VPC_SUBNET`` – (Self-managed Apache Kafka) The subnets associated with your VPC. Lambda connects to these subnets to fetch data from your self-managed Apache Kafka cluster.
|
|
45095
|
+
* + ``VPC_SECURITY_GROUP`` – (Self-managed Apache Kafka) The VPC security group used to manage access to your self-managed Apache Kafka brokers.
|
|
45096
|
+
* + ``SASL_SCRAM_256_AUTH`` – (Self-managed Apache Kafka) The Secrets Manager ARN of your secret key used for SASL SCRAM-256 authentication of your self-managed Apache Kafka brokers.
|
|
45097
|
+
* + ``SASL_SCRAM_512_AUTH`` – (Amazon MSK, Self-managed Apache Kafka) The Secrets Manager ARN of your secret key used for SASL SCRAM-512 authentication of your self-managed Apache Kafka brokers.
|
|
45098
|
+
* + ``VIRTUAL_HOST`` –- (RabbitMQ) The name of the virtual host in your RabbitMQ broker. Lambda uses this RabbitMQ host as the event source. This property cannot be specified in an UpdateEventSourceMapping API call.
|
|
45099
|
+
* + ``CLIENT_CERTIFICATE_TLS_AUTH`` – (Amazon MSK, self-managed Apache Kafka) The Secrets Manager ARN of your secret key containing the certificate chain (X.509 PEM), private key (PKCS#8 PEM), and private key password (optional) used for mutual TLS authentication of your MSK/Apache Kafka brokers.
|
|
45100
|
+
* + ``SERVER_ROOT_CA_CERTIFICATE`` – (Self-managed Apache Kafka) The Secrets Manager ARN of your secret key containing the root CA certificate (X.509 PEM) used for TLS encryption of your Apache Kafka brokers.
|
|
44941
45101
|
*/
|
|
44942
45102
|
type?: pulumi.Input<enums.lambda.EventSourceMappingSourceAccessConfigurationType>;
|
|
44943
45103
|
/**
|
|
@@ -50297,7 +50457,21 @@ export declare namespace msk {
|
|
|
50297
50457
|
*/
|
|
50298
50458
|
connectivityInfo?: pulumi.Input<inputs.msk.ClusterConnectivityInfoArgs>;
|
|
50299
50459
|
/**
|
|
50300
|
-
* The type of Amazon EC2 instances to use for brokers.
|
|
50460
|
+
* The type of Amazon EC2 instances to use for brokers. Depending on the [broker type](https://docs.aws.amazon.com/msk/latest/developerguide/broker-instance-types.html) , Amazon MSK supports the following broker sizes:
|
|
50461
|
+
*
|
|
50462
|
+
* *Standard broker sizes*
|
|
50463
|
+
*
|
|
50464
|
+
* - kafka.t3.small
|
|
50465
|
+
*
|
|
50466
|
+
* > You can't select the kafka.t3.small instance type when the metadata mode is KRaft.
|
|
50467
|
+
* - kafka.m5.large, kafka.m5.xlarge, kafka.m5.2xlarge, kafka.m5.4xlarge, kafka.m5.8xlarge, kafka.m5.12xlarge, kafka.m5.16xlarge, kafka.m5.24xlarge
|
|
50468
|
+
* - kafka.m7g.large, kafka.m7g.xlarge, kafka.m7g.2xlarge, kafka.m7g.4xlarge, kafka.m7g.8xlarge, kafka.m7g.12xlarge, kafka.m7g.16xlarge
|
|
50469
|
+
*
|
|
50470
|
+
* *Express broker sizes*
|
|
50471
|
+
*
|
|
50472
|
+
* - express.m7g.large, express.m7g.xlarge, express.m7g.2xlarge, express.m7g.4xlarge, express.m7g.8xlarge, express.m7g.12xlarge, express.m7g.16xlarge
|
|
50473
|
+
*
|
|
50474
|
+
* > Some broker sizes might not be available in certian AWS Regions. See the updated [Pricing tools](https://docs.aws.amazon.com/msk/pricing/) section on the Amazon MSK pricing page for the latest list of available instances by Region.
|
|
50301
50475
|
*/
|
|
50302
50476
|
instanceType: pulumi.Input<string>;
|
|
50303
50477
|
/**
|
|
@@ -85570,7 +85744,7 @@ export declare namespace s3 {
|
|
|
85570
85744
|
*/
|
|
85571
85745
|
httpErrorCodeReturnedEquals?: pulumi.Input<string>;
|
|
85572
85746
|
/**
|
|
85573
|
-
* The object key name prefix when the redirect is applied. For example, to redirect requests for ``ExamplePage.html``, the key prefix will be ``ExamplePage.html``. To redirect request for all pages with the prefix ``docs/``, the key prefix will be
|
|
85747
|
+
* The object key name prefix when the redirect is applied. For example, to redirect requests for ``ExamplePage.html``, the key prefix will be ``ExamplePage.html``. To redirect request for all pages with the prefix ``docs/``, the key prefix will be ``docs/``, which identifies all objects in the docs/ folder.
|
|
85574
85748
|
* Required when the parent element ``Condition`` is specified and sibling ``HttpErrorCodeReturnedEquals`` is not specified. If both conditions are specified, both must be true for the redirect to be applied.
|
|
85575
85749
|
*/
|
|
85576
85750
|
keyPrefixEquals?: pulumi.Input<string>;
|
|
@@ -87378,6 +87552,10 @@ export declare namespace sagemaker {
|
|
|
87378
87552
|
* The security groups for the Amazon Virtual Private Cloud that the Domain uses for communication between Domain-level apps and user apps.
|
|
87379
87553
|
*/
|
|
87380
87554
|
securityGroupIds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
87555
|
+
/**
|
|
87556
|
+
* The settings that apply to an SageMaker AI domain when you use it in Amazon SageMaker Unified Studio.
|
|
87557
|
+
*/
|
|
87558
|
+
unifiedStudioSettings?: pulumi.Input<inputs.sagemaker.DomainUnifiedStudioSettingsArgs>;
|
|
87381
87559
|
}
|
|
87382
87560
|
/**
|
|
87383
87561
|
* Specifies options when sharing an Amazon SageMaker Studio notebook. These settings are specified as part of DefaultUserSettings when the CreateDomain API is called, and as part of UserSettings when the CreateUserProfile API is called.
|
|
@@ -87417,6 +87595,44 @@ export declare namespace sagemaker {
|
|
|
87417
87595
|
*/
|
|
87418
87596
|
hiddenSageMakerImageVersionAliases?: pulumi.Input<pulumi.Input<inputs.sagemaker.DomainHiddenSageMakerImageArgs>[]>;
|
|
87419
87597
|
}
|
|
87598
|
+
/**
|
|
87599
|
+
* A collection of settings that apply to an Amazon SageMaker AI domain when you use it in Amazon SageMaker Unified Studio.
|
|
87600
|
+
*/
|
|
87601
|
+
interface DomainUnifiedStudioSettingsArgs {
|
|
87602
|
+
/**
|
|
87603
|
+
* The ID of the AWS account that has the Amazon SageMaker Unified Studio domain. The default value, if you don't specify an ID, is the ID of the account that has the Amazon SageMaker AI domain.
|
|
87604
|
+
*/
|
|
87605
|
+
domainAccountId?: pulumi.Input<string>;
|
|
87606
|
+
/**
|
|
87607
|
+
* The ID of the Amazon SageMaker Unified Studio domain associated with this domain.
|
|
87608
|
+
*/
|
|
87609
|
+
domainId?: pulumi.Input<string>;
|
|
87610
|
+
/**
|
|
87611
|
+
* The AWS Region where the domain is located in Amazon SageMaker Unified Studio. The default value, if you don't specify a Region, is the Region where the Amazon SageMaker AI domain is located.
|
|
87612
|
+
*/
|
|
87613
|
+
domainRegion?: pulumi.Input<string>;
|
|
87614
|
+
/**
|
|
87615
|
+
* The ID of the environment that Amazon SageMaker Unified Studio associates with the domain.
|
|
87616
|
+
*/
|
|
87617
|
+
environmentId?: pulumi.Input<string>;
|
|
87618
|
+
/**
|
|
87619
|
+
* The ID of the Amazon SageMaker Unified Studio project that corresponds to the domain.
|
|
87620
|
+
*/
|
|
87621
|
+
projectId?: pulumi.Input<string>;
|
|
87622
|
+
/**
|
|
87623
|
+
* The location where Amazon S3 stores temporary execution data and other artifacts for the project that corresponds to the domain.
|
|
87624
|
+
*/
|
|
87625
|
+
projectS3Path?: pulumi.Input<string>;
|
|
87626
|
+
/**
|
|
87627
|
+
* Sets whether you can access the domain in Amazon SageMaker Studio:
|
|
87628
|
+
*
|
|
87629
|
+
* ENABLED
|
|
87630
|
+
* You can access the domain in Amazon SageMaker Studio. If you migrate the domain to Amazon SageMaker Unified Studio, you can access it in both studio interfaces.
|
|
87631
|
+
* DISABLED
|
|
87632
|
+
* You can't access the domain in Amazon SageMaker Studio. If you migrate the domain to Amazon SageMaker Unified Studio, you can access it only in that studio interface.
|
|
87633
|
+
*/
|
|
87634
|
+
studioWebPortalAccess?: pulumi.Input<enums.sagemaker.DomainUnifiedStudioSettingsStudioWebPortalAccess>;
|
|
87635
|
+
}
|
|
87420
87636
|
/**
|
|
87421
87637
|
* A collection of settings that apply to users of Amazon SageMaker Studio. These settings are specified when the CreateUserProfile API is called, and as DefaultUserSettings when the CreateDomain API is called.
|
|
87422
87638
|
*/
|
|
@@ -95797,6 +96013,10 @@ export declare namespace wafv2 {
|
|
|
95797
96013
|
*/
|
|
95798
96014
|
statements: pulumi.Input<pulumi.Input<inputs.wafv2.RuleGroupStatementArgs>[]>;
|
|
95799
96015
|
}
|
|
96016
|
+
interface RuleGroupAsnMatchStatementArgs {
|
|
96017
|
+
asnList?: pulumi.Input<pulumi.Input<number>[]>;
|
|
96018
|
+
forwardedIpConfig?: pulumi.Input<inputs.wafv2.RuleGroupForwardedIpConfigurationArgs>;
|
|
96019
|
+
}
|
|
95800
96020
|
/**
|
|
95801
96021
|
* Block traffic towards application.
|
|
95802
96022
|
*/
|
|
@@ -96474,6 +96694,7 @@ export declare namespace wafv2 {
|
|
|
96474
96694
|
* Specifies a single custom aggregate key for a rate-base rule.
|
|
96475
96695
|
*/
|
|
96476
96696
|
interface RuleGroupRateBasedStatementCustomKeyArgs {
|
|
96697
|
+
asn?: pulumi.Input<inputs.wafv2.RuleGroupRateLimitAsnArgs>;
|
|
96477
96698
|
/**
|
|
96478
96699
|
* Use the value of a cookie in the request as an aggregate key. Each distinct value in the cookie contributes to the aggregation instance. If you use a single cookie as your custom key, then each value fully defines an aggregation instance.
|
|
96479
96700
|
*/
|
|
@@ -96529,6 +96750,11 @@ export declare namespace wafv2 {
|
|
|
96529
96750
|
*/
|
|
96530
96751
|
uriPath?: pulumi.Input<inputs.wafv2.RuleGroupRateLimitUriPathArgs>;
|
|
96531
96752
|
}
|
|
96753
|
+
/**
|
|
96754
|
+
* Specifies the request's ASN as an aggregate key for a rate-based rule.
|
|
96755
|
+
*/
|
|
96756
|
+
interface RuleGroupRateLimitAsnArgs {
|
|
96757
|
+
}
|
|
96532
96758
|
/**
|
|
96533
96759
|
* Specifies a cookie as an aggregate key for a rate-based rule.
|
|
96534
96760
|
*/
|
|
@@ -96797,6 +97023,7 @@ export declare namespace wafv2 {
|
|
|
96797
97023
|
* A logical rule statement used to combine other rule statements with AND logic. You provide more than one `Statement` within the `AndStatement` .
|
|
96798
97024
|
*/
|
|
96799
97025
|
andStatement?: pulumi.Input<inputs.wafv2.RuleGroupAndStatementArgs>;
|
|
97026
|
+
asnMatchStatement?: pulumi.Input<inputs.wafv2.RuleGroupAsnMatchStatementArgs>;
|
|
96800
97027
|
/**
|
|
96801
97028
|
* A rule statement that defines a string match search for AWS WAF to apply to web requests. The byte match statement provides the bytes to search for, the location in requests that you want AWS WAF to search, and other settings. The bytes to search for are typically a string that corresponds with ASCII characters. In the AWS WAF console and the developer guide, this is called a string match statement.
|
|
96802
97029
|
*/
|
|
@@ -96994,6 +97221,10 @@ export declare namespace wafv2 {
|
|
|
96994
97221
|
*/
|
|
96995
97222
|
statements: pulumi.Input<pulumi.Input<inputs.wafv2.WebAclStatementArgs>[]>;
|
|
96996
97223
|
}
|
|
97224
|
+
interface WebAclAsnMatchStatementArgs {
|
|
97225
|
+
asnList?: pulumi.Input<pulumi.Input<number>[]>;
|
|
97226
|
+
forwardedIpConfig?: pulumi.Input<inputs.wafv2.WebAclForwardedIpConfigurationArgs>;
|
|
97227
|
+
}
|
|
96997
97228
|
/**
|
|
96998
97229
|
* AssociationConfig for body inspection
|
|
96999
97230
|
*/
|
|
@@ -97046,6 +97277,13 @@ export declare namespace wafv2 {
|
|
|
97046
97277
|
*/
|
|
97047
97278
|
responseInspection?: pulumi.Input<inputs.wafv2.WebAclResponseInspectionArgs>;
|
|
97048
97279
|
}
|
|
97280
|
+
/**
|
|
97281
|
+
* Configures how to use the AntiDDOS AWS managed rule group in the web ACL
|
|
97282
|
+
*/
|
|
97283
|
+
interface WebAclAwsManagedRulesAntiDDoSRuleSetArgs {
|
|
97284
|
+
clientSideActionConfig: pulumi.Input<inputs.wafv2.WebAclClientSideActionConfigArgs>;
|
|
97285
|
+
sensitivityToBlock?: pulumi.Input<enums.wafv2.WebAclSensitivityToAct>;
|
|
97286
|
+
}
|
|
97049
97287
|
/**
|
|
97050
97288
|
* Configures how to use the Account Takeover Prevention managed rule group in the web ACL
|
|
97051
97289
|
*/
|
|
@@ -97219,6 +97457,20 @@ export declare namespace wafv2 {
|
|
|
97219
97457
|
*/
|
|
97220
97458
|
immunityTimeProperty?: pulumi.Input<inputs.wafv2.WebAclImmunityTimePropertyArgs>;
|
|
97221
97459
|
}
|
|
97460
|
+
/**
|
|
97461
|
+
* Client side action config for AntiDDOS AMR.
|
|
97462
|
+
*/
|
|
97463
|
+
interface WebAclClientSideActionArgs {
|
|
97464
|
+
exemptUriRegularExpressions?: pulumi.Input<pulumi.Input<inputs.wafv2.WebAclRegexArgs>[]>;
|
|
97465
|
+
sensitivity?: pulumi.Input<enums.wafv2.WebAclSensitivityToAct>;
|
|
97466
|
+
usageOfAction: pulumi.Input<enums.wafv2.WebAclUsageOfAction>;
|
|
97467
|
+
}
|
|
97468
|
+
/**
|
|
97469
|
+
* Client side action config for AntiDDOS AMR.
|
|
97470
|
+
*/
|
|
97471
|
+
interface WebAclClientSideActionConfigArgs {
|
|
97472
|
+
challenge: pulumi.Input<inputs.wafv2.WebAclClientSideActionArgs>;
|
|
97473
|
+
}
|
|
97222
97474
|
/**
|
|
97223
97475
|
* The pattern to look for in the request cookies.
|
|
97224
97476
|
*/
|
|
@@ -97759,6 +98011,7 @@ export declare namespace wafv2 {
|
|
|
97759
98011
|
* For information about using the ACFP managed rule group, see [AWS WAF Fraud Control account creation fraud prevention (ACFP) rule group](https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-acfp.html) and [AWS WAF Fraud Control account creation fraud prevention (ACFP)](https://docs.aws.amazon.com/waf/latest/developerguide/waf-acfp.html) in the *AWS WAF Developer Guide* .
|
|
97760
98012
|
*/
|
|
97761
98013
|
awsManagedRulesAcfpRuleSet?: pulumi.Input<inputs.wafv2.WebAclAwsManagedRulesAcfpRuleSetArgs>;
|
|
98014
|
+
awsManagedRulesAntiDDoSRuleSet?: pulumi.Input<inputs.wafv2.WebAclAwsManagedRulesAntiDDoSRuleSetArgs>;
|
|
97762
98015
|
/**
|
|
97763
98016
|
* Additional configuration for using the account takeover prevention (ATP) managed rule group, `AWSManagedRulesATPRuleSet` . Use this to provide login request information to the rule group. For web ACLs that protect CloudFront distributions, use this to also provide the information about how your distribution responds to login requests.
|
|
97764
98017
|
*
|
|
@@ -97826,6 +98079,12 @@ export declare namespace wafv2 {
|
|
|
97826
98079
|
*/
|
|
97827
98080
|
statement: pulumi.Input<inputs.wafv2.WebAclStatementArgs>;
|
|
97828
98081
|
}
|
|
98082
|
+
/**
|
|
98083
|
+
* Configures the options for on-source DDoS protection provided by supported resource type.
|
|
98084
|
+
*/
|
|
98085
|
+
interface WebAclOnSourceDDoSProtectionConfigArgs {
|
|
98086
|
+
albLowReputationMode: pulumi.Input<enums.wafv2.WebAclOnSourceDDoSProtectionConfigAlbLowReputationMode>;
|
|
98087
|
+
}
|
|
97829
98088
|
interface WebAclOrStatementArgs {
|
|
97830
98089
|
/**
|
|
97831
98090
|
* The statements to combine with OR logic. You can use any statements that can be nested.
|
|
@@ -97907,6 +98166,7 @@ export declare namespace wafv2 {
|
|
|
97907
98166
|
* Specifies a single custom aggregate key for a rate-base rule.
|
|
97908
98167
|
*/
|
|
97909
98168
|
interface WebAclRateBasedStatementCustomKeyArgs {
|
|
98169
|
+
asn?: pulumi.Input<inputs.wafv2.WebAclRateLimitAsnArgs>;
|
|
97910
98170
|
/**
|
|
97911
98171
|
* Use the value of a cookie in the request as an aggregate key. Each distinct value in the cookie contributes to the aggregation instance. If you use a single cookie as your custom key, then each value fully defines an aggregation instance.
|
|
97912
98172
|
*/
|
|
@@ -97962,6 +98222,11 @@ export declare namespace wafv2 {
|
|
|
97962
98222
|
*/
|
|
97963
98223
|
uriPath?: pulumi.Input<inputs.wafv2.WebAclRateLimitUriPathArgs>;
|
|
97964
98224
|
}
|
|
98225
|
+
/**
|
|
98226
|
+
* Specifies the request's ASN as an aggregate key for a rate-based rule.
|
|
98227
|
+
*/
|
|
98228
|
+
interface WebAclRateLimitAsnArgs {
|
|
98229
|
+
}
|
|
97965
98230
|
/**
|
|
97966
98231
|
* Specifies a cookie as an aggregate key for a rate-based rule.
|
|
97967
98232
|
*/
|
|
@@ -98071,6 +98336,12 @@ export declare namespace wafv2 {
|
|
|
98071
98336
|
*/
|
|
98072
98337
|
textTransformations: pulumi.Input<pulumi.Input<inputs.wafv2.WebAclTextTransformationArgs>[]>;
|
|
98073
98338
|
}
|
|
98339
|
+
/**
|
|
98340
|
+
* Regex
|
|
98341
|
+
*/
|
|
98342
|
+
interface WebAclRegexArgs {
|
|
98343
|
+
regexString?: pulumi.Input<string>;
|
|
98344
|
+
}
|
|
98074
98345
|
interface WebAclRegexMatchStatementArgs {
|
|
98075
98346
|
/**
|
|
98076
98347
|
* The part of the web request that you want AWS WAF to inspect.
|
|
@@ -98502,6 +98773,7 @@ export declare namespace wafv2 {
|
|
|
98502
98773
|
* A logical rule statement used to combine other rule statements with AND logic. You provide more than one `Statement` within the `AndStatement` .
|
|
98503
98774
|
*/
|
|
98504
98775
|
andStatement?: pulumi.Input<inputs.wafv2.WebAclAndStatementArgs>;
|
|
98776
|
+
asnMatchStatement?: pulumi.Input<inputs.wafv2.WebAclAsnMatchStatementArgs>;
|
|
98505
98777
|
/**
|
|
98506
98778
|
* A rule statement that defines a string match search for AWS WAF to apply to web requests. The byte match statement provides the bytes to search for, the location in requests that you want AWS WAF to search, and other settings. The bytes to search for are typically a string that corresponds with ASCII characters. In the AWS WAF console and the developer guide, this is called a string match statement.
|
|
98507
98779
|
*/
|