@pulumi/aws-native 1.31.0-alpha.1750138530 → 1.31.0-alpha.1750422093

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (117) hide show
  1. package/accessanalyzer/analyzer.d.ts +2 -2
  2. package/amplify/app.d.ts +8 -0
  3. package/amplify/app.js +2 -0
  4. package/amplify/app.js.map +1 -1
  5. package/amplify/getApp.d.ts +4 -0
  6. package/amplify/getApp.js.map +1 -1
  7. package/bedrock/getGuardrail.d.ts +1 -0
  8. package/bedrock/getGuardrail.js.map +1 -1
  9. package/bedrock/guardrail.d.ts +2 -0
  10. package/bedrock/guardrail.js +2 -0
  11. package/bedrock/guardrail.js.map +1 -1
  12. package/cleanrooms/collaboration.d.ts +4 -4
  13. package/cleanrooms/collaboration.js +0 -6
  14. package/cleanrooms/collaboration.js.map +1 -1
  15. package/connect/evaluationForm.d.ts +2 -0
  16. package/connect/evaluationForm.js +2 -0
  17. package/connect/evaluationForm.js.map +1 -1
  18. package/connect/getEvaluationForm.d.ts +1 -0
  19. package/connect/getEvaluationForm.js.map +1 -1
  20. package/customerprofiles/calculatedAttributeDefinition.d.ts +13 -0
  21. package/customerprofiles/calculatedAttributeDefinition.js +7 -1
  22. package/customerprofiles/calculatedAttributeDefinition.js.map +1 -1
  23. package/customerprofiles/getCalculatedAttributeDefinition.d.ts +5 -0
  24. package/customerprofiles/getCalculatedAttributeDefinition.js.map +1 -1
  25. package/customerprofiles/getObjectType.d.ts +8 -0
  26. package/customerprofiles/getObjectType.js.map +1 -1
  27. package/customerprofiles/objectType.d.ts +12 -0
  28. package/customerprofiles/objectType.js +4 -0
  29. package/customerprofiles/objectType.js.map +1 -1
  30. package/ec2/getTrafficMirrorFilter.d.ts +37 -0
  31. package/ec2/getTrafficMirrorFilter.js +28 -0
  32. package/ec2/getTrafficMirrorFilter.js.map +1 -0
  33. package/ec2/index.d.ts +6 -0
  34. package/ec2/index.js +11 -4
  35. package/ec2/index.js.map +1 -1
  36. package/ec2/trafficMirrorFilter.d.ts +64 -0
  37. package/ec2/trafficMirrorFilter.js +64 -0
  38. package/ec2/trafficMirrorFilter.js.map +1 -0
  39. package/inspectorv2/filter.d.ts +6 -0
  40. package/inspectorv2/filter.js +2 -0
  41. package/inspectorv2/filter.js.map +1 -1
  42. package/inspectorv2/getFilter.d.ts +3 -0
  43. package/inspectorv2/getFilter.js.map +1 -1
  44. package/mediatailor/getPlaybackConfiguration.d.ts +4 -0
  45. package/mediatailor/getPlaybackConfiguration.js.map +1 -1
  46. package/mediatailor/playbackConfiguration.d.ts +8 -0
  47. package/mediatailor/playbackConfiguration.js +2 -0
  48. package/mediatailor/playbackConfiguration.js.map +1 -1
  49. package/opsworkscm/server.d.ts +2 -2
  50. package/organizations/policy.d.ts +2 -2
  51. package/package.json +3 -3
  52. package/package.json.dev +2 -2
  53. package/rds/dbCluster.d.ts +4 -4
  54. package/rds/dbInstance.d.ts +2 -2
  55. package/rds/getDbCluster.d.ts +2 -2
  56. package/rds/getDbInstance.d.ts +1 -1
  57. package/redshiftserverless/getSnapshot.d.ts +36 -0
  58. package/redshiftserverless/getSnapshot.js +28 -0
  59. package/redshiftserverless/getSnapshot.js.map +1 -0
  60. package/redshiftserverless/index.d.ts +6 -0
  61. package/redshiftserverless/index.js +8 -1
  62. package/redshiftserverless/index.js.map +1 -1
  63. package/redshiftserverless/snapshot.d.ts +75 -0
  64. package/redshiftserverless/snapshot.js +68 -0
  65. package/redshiftserverless/snapshot.js.map +1 -0
  66. package/securityhub/aggregatorV2.d.ts +64 -0
  67. package/securityhub/aggregatorV2.js +70 -0
  68. package/securityhub/aggregatorV2.js.map +1 -0
  69. package/securityhub/automationRuleV2.d.ts +94 -0
  70. package/securityhub/automationRuleV2.js +91 -0
  71. package/securityhub/automationRuleV2.js.map +1 -0
  72. package/securityhub/getAggregatorV2.d.ts +43 -0
  73. package/securityhub/getAggregatorV2.js +28 -0
  74. package/securityhub/getAggregatorV2.js.map +1 -0
  75. package/securityhub/getAutomationRuleV2.d.ts +59 -0
  76. package/securityhub/getAutomationRuleV2.js +28 -0
  77. package/securityhub/getAutomationRuleV2.js.map +1 -0
  78. package/securityhub/getHubV2.d.ts +31 -0
  79. package/securityhub/getHubV2.js +28 -0
  80. package/securityhub/getHubV2.js.map +1 -0
  81. package/securityhub/hubV2.d.ts +44 -0
  82. package/securityhub/hubV2.js +60 -0
  83. package/securityhub/hubV2.js.map +1 -0
  84. package/securityhub/index.d.ts +18 -0
  85. package/securityhub/index.js +22 -1
  86. package/securityhub/index.js.map +1 -1
  87. package/types/enums/amplify/index.d.ts +21 -0
  88. package/types/enums/amplify/index.js +6 -1
  89. package/types/enums/amplify/index.js.map +1 -1
  90. package/types/enums/connect/index.d.ts +3 -0
  91. package/types/enums/connect/index.js +3 -0
  92. package/types/enums/connect/index.js.map +1 -1
  93. package/types/enums/connectcampaignsv2/index.d.ts +8 -0
  94. package/types/enums/connectcampaignsv2/index.js +5 -1
  95. package/types/enums/connectcampaignsv2/index.js.map +1 -1
  96. package/types/enums/customerprofiles/index.d.ts +26 -0
  97. package/types/enums/customerprofiles/index.js +15 -1
  98. package/types/enums/customerprofiles/index.js.map +1 -1
  99. package/types/enums/ec2/index.d.ts +7 -0
  100. package/types/enums/ec2/index.js +4 -1
  101. package/types/enums/ec2/index.js.map +1 -1
  102. package/types/enums/lambda/index.d.ts +0 -9
  103. package/types/enums/lambda/index.js.map +1 -1
  104. package/types/enums/organizations/index.d.ts +2 -1
  105. package/types/enums/organizations/index.js +1 -0
  106. package/types/enums/organizations/index.js.map +1 -1
  107. package/types/enums/redshiftserverless/index.d.ts +9 -0
  108. package/types/enums/redshiftserverless/index.js +9 -1
  109. package/types/enums/redshiftserverless/index.js.map +1 -1
  110. package/types/enums/securityhub/index.d.ts +136 -0
  111. package/types/enums/securityhub/index.js +89 -1
  112. package/types/enums/securityhub/index.js.map +1 -1
  113. package/types/enums/wafv2/index.d.ts +3 -0
  114. package/types/enums/wafv2/index.js.map +1 -1
  115. package/types/input.d.ts +469 -41
  116. package/types/output.d.ts +494 -41
  117. package/types/output.js.map +1 -1
package/types/input.d.ts CHANGED
@@ -184,6 +184,7 @@ export declare namespace accessanalyzer {
184
184
  * The configuration for the analyzer
185
185
  */
186
186
  interface AnalyzerConfigurationPropertiesArgs {
187
+ internalAccessConfiguration?: pulumi.Input<inputs.accessanalyzer.AnalyzerInternalAccessConfigurationArgs>;
187
188
  /**
188
189
  * Specifies the configuration of an unused access analyzer for an AWS organization or account.
189
190
  */
@@ -211,6 +212,41 @@ export declare namespace accessanalyzer {
211
212
  */
212
213
  property: pulumi.Input<string>;
213
214
  }
215
+ /**
216
+ * The criteria for an analysis rule for an internal access analyzer.
217
+ */
218
+ interface AnalyzerInternalAccessAnalysisRuleCriteriaArgs {
219
+ /**
220
+ * A list of AWS account IDs to apply to the internal access analysis rule criteria. Account IDs can only be applied to the analysis rule criteria for organization-level analyzers and cannot include the organization owner account.
221
+ */
222
+ accountIds?: pulumi.Input<pulumi.Input<string>[]>;
223
+ /**
224
+ * A list of resource ARNs to apply to the internal access analysis rule criteria. The analyzer will only generate findings for resources that match these ARNs.
225
+ */
226
+ resourceArns?: pulumi.Input<pulumi.Input<string>[]>;
227
+ /**
228
+ * A list of resource types to apply to the internal access analysis rule criteria. The analyzer will only generate findings for resources of these types.
229
+ */
230
+ resourceTypes?: pulumi.Input<pulumi.Input<string>[]>;
231
+ }
232
+ /**
233
+ * Specifies the configuration of an internal access analyzer for an AWS organization or account. This configuration determines how the analyzer evaluates internal access within your AWS environment.
234
+ */
235
+ interface AnalyzerInternalAccessConfigurationArgs {
236
+ /**
237
+ * Contains information about analysis rules for the internal access analyzer. Analysis rules determine which entities will generate findings based on the criteria you define when you create the rule.
238
+ */
239
+ internalAccessAnalysisRule?: pulumi.Input<inputs.accessanalyzer.AnalyzerInternalAccessConfigurationInternalAccessAnalysisRulePropertiesArgs>;
240
+ }
241
+ /**
242
+ * Contains information about analysis rules for the internal access analyzer. Analysis rules determine which entities will generate findings based on the criteria you define when you create the rule.
243
+ */
244
+ interface AnalyzerInternalAccessConfigurationInternalAccessAnalysisRulePropertiesArgs {
245
+ /**
246
+ * A list of rules for the internal access analyzer containing criteria to include in analysis. Only resources that meet the rule criteria will generate findings.
247
+ */
248
+ inclusions?: pulumi.Input<pulumi.Input<inputs.accessanalyzer.AnalyzerInternalAccessAnalysisRuleCriteriaArgs>[]>;
249
+ }
214
250
  /**
215
251
  * A key-value pair to associate with a resource.
216
252
  */
@@ -886,6 +922,24 @@ export declare namespace amplify {
886
922
  */
887
923
  value: pulumi.Input<string>;
888
924
  }
925
+ interface AppJobConfigArgs {
926
+ /**
927
+ * Specifies the size of the build instance. Amplify supports three instance sizes: `STANDARD_8GB` , `LARGE_16GB` , and `XLARGE_72GB` . If you don't specify a value, Amplify uses the `STANDARD_8GB` default.
928
+ *
929
+ * The following list describes the CPU, memory, and storage capacity for each build instance type:
930
+ *
931
+ * - **STANDARD_8GB** - - vCPUs: 4
932
+ * - Memory: 8 GiB
933
+ * - Disk space: 128 GB
934
+ * - **LARGE_16GB** - - vCPUs: 8
935
+ * - Memory: 16 GiB
936
+ * - Disk space: 128 GB
937
+ * - **XLARGE_72GB** - - vCPUs: 36
938
+ * - Memory: 72 GiB
939
+ * - Disk space: 256 GB
940
+ */
941
+ buildComputeType: pulumi.Input<enums.amplify.AppJobConfigBuildComputeType>;
942
+ }
889
943
  interface BranchBackendArgs {
890
944
  /**
891
945
  * The Amazon Resource Name (ARN) for the AWS CloudFormation stack.
@@ -11674,6 +11728,15 @@ export declare namespace bedrock {
11674
11728
  */
11675
11729
  filtersConfig: pulumi.Input<pulumi.Input<inputs.bedrock.GuardrailContextualGroundingFilterConfigArgs>[]>;
11676
11730
  }
11731
+ /**
11732
+ * The system-defined guardrail profile that you’re using with your guardrail
11733
+ */
11734
+ interface GuardrailCrossRegionConfigArgs {
11735
+ /**
11736
+ * The Amazon Resource Name (ARN) of the guardrail profile
11737
+ */
11738
+ guardrailProfileArn: pulumi.Input<string>;
11739
+ }
11677
11740
  /**
11678
11741
  * A managed words config.
11679
11742
  */
@@ -13183,7 +13246,7 @@ export declare namespace cleanrooms {
13183
13246
  *
13184
13247
  * *Allowed Values* : `CAN_QUERY` | `CAN_RECEIVE_RESULTS`
13185
13248
  */
13186
- memberAbilities: pulumi.Input<pulumi.Input<enums.cleanrooms.CollaborationMemberAbility>[]>;
13249
+ memberAbilities?: pulumi.Input<pulumi.Input<enums.cleanrooms.CollaborationMemberAbility>[]>;
13187
13250
  /**
13188
13251
  * The ML abilities granted to the collaboration member.
13189
13252
  */
@@ -17906,6 +17969,12 @@ export declare namespace connect {
17906
17969
  */
17907
17970
  requiredFields?: pulumi.Input<pulumi.Input<inputs.connect.TaskTemplateRequiredFieldInfoArgs>[]>;
17908
17971
  }
17972
+ interface EvaluationFormAutoEvaluationConfigurationArgs {
17973
+ /**
17974
+ * Auto Evaluation enablement status.
17975
+ */
17976
+ enabled?: pulumi.Input<boolean>;
17977
+ }
17909
17978
  /**
17910
17979
  * An item at the root level. All items must be sections.
17911
17980
  */
@@ -17932,10 +18001,11 @@ export declare namespace connect {
17932
18001
  * Information about the automation configuration in numeric questions.
17933
18002
  */
17934
18003
  interface EvaluationFormNumericQuestionAutomationArgs {
18004
+ answerSource?: any;
17935
18005
  /**
17936
18006
  * The property value of the automation.
17937
18007
  */
17938
- propertyValue: pulumi.Input<inputs.connect.EvaluationFormNumericQuestionPropertyValueAutomationArgs>;
18008
+ propertyValue?: pulumi.Input<inputs.connect.EvaluationFormNumericQuestionPropertyValueAutomationArgs>;
17939
18009
  }
17940
18010
  /**
17941
18011
  * Information about the option range used for scoring in numeric questions.
@@ -19047,6 +19117,7 @@ export declare namespace connectcampaignsv2 {
19047
19117
  * The CommunicationLimits that apply to all channel subtypes defined in an outbound campaign.
19048
19118
  */
19049
19119
  allChannelsSubtypes?: pulumi.Input<inputs.connectcampaignsv2.CampaignCommunicationLimitsArgs>;
19120
+ instanceLimitsHandling?: pulumi.Input<enums.connectcampaignsv2.CampaignInstanceLimitsHandling>;
19050
19121
  }
19051
19122
  /**
19052
19123
  * Campaign communication time config
@@ -19390,6 +19461,14 @@ export declare namespace customerprofiles {
19390
19461
  * The relative time period over which data is included in the aggregation.
19391
19462
  */
19392
19463
  interface CalculatedAttributeDefinitionRangeArgs {
19464
+ /**
19465
+ * The format the timestamp field in your JSON object is specified. This value should be one of EPOCHMILLI or ISO_8601. E.g. if your object type is MyType and source JSON is {"generatedAt": {"timestamp": "2001-07-04T12:08:56.235Z"}}, then TimestampFormat should be "ISO_8601".
19466
+ */
19467
+ timestampFormat?: pulumi.Input<string>;
19468
+ /**
19469
+ * An expression specifying the field in your JSON object from which the date should be parsed. The expression should follow the structure of \"{ObjectTypeName.<Location of timestamp field in JSON pointer format>}\". E.g. if your object type is MyType and source JSON is {"generatedAt": {"timestamp": "1737587945945"}}, then TimestampSource should be "{MyType.generatedAt.timestamp}".
19470
+ */
19471
+ timestampSource?: pulumi.Input<string>;
19393
19472
  /**
19394
19473
  * The unit of time.
19395
19474
  */
@@ -19397,7 +19476,8 @@ export declare namespace customerprofiles {
19397
19476
  /**
19398
19477
  * The amount of time of the specified unit.
19399
19478
  */
19400
- value: pulumi.Input<number>;
19479
+ value?: pulumi.Input<number>;
19480
+ valueRange?: pulumi.Input<inputs.customerprofiles.CalculatedAttributeDefinitionValueRangeArgs>;
19401
19481
  }
19402
19482
  /**
19403
19483
  * The threshold for the calculated attribute.
@@ -19412,6 +19492,19 @@ export declare namespace customerprofiles {
19412
19492
  */
19413
19493
  value: pulumi.Input<string>;
19414
19494
  }
19495
+ /**
19496
+ * A structure specifying the endpoints of the relative time period over which data is included in the aggregation.
19497
+ */
19498
+ interface CalculatedAttributeDefinitionValueRangeArgs {
19499
+ /**
19500
+ * The ending point for this range. Positive numbers indicate how many days in the past data should be included, and negative numbers indicate how many days in the future.
19501
+ */
19502
+ end: pulumi.Input<number>;
19503
+ /**
19504
+ * The starting point for this range. Positive numbers indicate how many days in the past data should be included, and negative numbers indicate how many days in the future.
19505
+ */
19506
+ start: pulumi.Input<number>;
19507
+ }
19415
19508
  /**
19416
19509
  * Configures information about the AttributeTypesSelector where the rule-based identity resolution uses to match profiles.
19417
19510
  */
@@ -20024,6 +20117,7 @@ export declare namespace customerprofiles {
20024
20117
  partyTypeString?: pulumi.Input<inputs.customerprofiles.SegmentDefinitionProfileDimensionArgs>;
20025
20118
  personalEmailAddress?: pulumi.Input<inputs.customerprofiles.SegmentDefinitionProfileDimensionArgs>;
20026
20119
  phoneNumber?: pulumi.Input<inputs.customerprofiles.SegmentDefinitionProfileDimensionArgs>;
20120
+ profileType?: pulumi.Input<inputs.customerprofiles.SegmentDefinitionProfileTypeDimensionArgs>;
20027
20121
  shippingAddress?: pulumi.Input<inputs.customerprofiles.SegmentDefinitionAddressDimensionArgs>;
20028
20122
  }
20029
20123
  /**
@@ -20033,16 +20127,23 @@ export declare namespace customerprofiles {
20033
20127
  dimensionType: pulumi.Input<enums.customerprofiles.SegmentDefinitionStringDimensionType>;
20034
20128
  values: pulumi.Input<pulumi.Input<string>[]>;
20035
20129
  }
20130
+ /**
20131
+ * Specifies profile type based criteria for a segment.
20132
+ */
20133
+ interface SegmentDefinitionProfileTypeDimensionArgs {
20134
+ dimensionType: pulumi.Input<enums.customerprofiles.SegmentDefinitionProfileTypeDimensionType>;
20135
+ values: pulumi.Input<pulumi.Input<enums.customerprofiles.SegmentDefinitionProfileType>[]>;
20136
+ }
20036
20137
  /**
20037
20138
  * Defines the range to be applied to the calculated attribute definition.
20038
20139
  */
20039
20140
  interface SegmentDefinitionRangeOverrideArgs {
20040
20141
  /**
20041
- * The ending point for this overridden range.
20142
+ * The ending point for this overridden range. Positive numbers indicate how many days in the past data should be included, and negative numbers indicate how many days in the future.
20042
20143
  */
20043
20144
  end?: pulumi.Input<number>;
20044
20145
  /**
20045
- * The starting point for this overridden range.
20146
+ * The starting point for this overridden range. Positive numbers indicate how many days in the past data should be included, and negative numbers indicate how many days in the future.
20046
20147
  */
20047
20148
  start: pulumi.Input<number>;
20048
20149
  /**
@@ -24781,18 +24882,14 @@ export declare namespace ec2 {
24781
24882
  */
24782
24883
  throughput?: pulumi.Input<number>;
24783
24884
  /**
24784
- * Specifies the Amazon EBS Provisioned Rate for Volume Initialization (volume initialization rate), in MiB/s, at which to download the snapshot blocks from Amazon S3 to the volume. This is also known as *volume initialization* . Specifying a volume initialization rate ensures that the volume is initialized at a predictable and consistent rate after creation.
24785
- *
24786
- * This parameter is supported only for volumes created from snapshots. Omit this parameter if:
24787
- *
24788
- * - You want to create the volume using fast snapshot restore. You must specify a snapshot that is enabled for fast snapshot restore. In this case, the volume is fully initialized at creation.
24789
- *
24790
- * > If you specify a snapshot that is enabled for fast snapshot restore and a volume initialization rate, the volume will be initialized at the specified rate instead of fast snapshot restore.
24791
- * - You want to create a volume that is initialized at the default rate.
24885
+ * Specifies the Amazon EBS Provisioned Rate for Volume Initialization (volume initialization rate), in MiB/s, at which to download the snapshot blocks from Amazon S3 to the volume. This is also known as *volume initialization*. Specifying a volume initialization rate ensures that the volume is initialized at a predictable and consistent rate after creation.
24886
+ * This parameter is supported only for volumes created from snapshots. Omit this parameter if:
24887
+ * + You want to create the volume using fast snapshot restore. You must specify a snapshot that is enabled for fast snapshot restore. In this case, the volume is fully initialized at creation.
24888
+ * If you specify a snapshot that is enabled for fast snapshot restore and a volume initialization rate, the volume will be initialized at the specified rate instead of fast snapshot restore.
24889
+ * + You want to create a volume that is initialized at the default rate.
24792
24890
  *
24793
- * For more information, see [Initialize Amazon EBS volumes](https://docs.aws.amazon.com/ebs/latest/userguide/initalize-volume.html) in the *Amazon EC2 User Guide* .
24794
- *
24795
- * Valid range: 100 - 300 MiB/s
24891
+ * For more information, see [Initialize Amazon EBS volumes](https://docs.aws.amazon.com/ebs/latest/userguide/initalize-volume.html) in the *Amazon EC2 User Guide*.
24892
+ * Valid range: 100 - 300 MiB/s
24796
24893
  */
24797
24894
  volumeInitializationRate?: pulumi.Input<number>;
24798
24895
  /**
@@ -36707,6 +36804,9 @@ export declare namespace inspectorv2 {
36707
36804
  * Details of the AWS account IDs used to filter findings.
36708
36805
  */
36709
36806
  awsAccountId?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>[]>;
36807
+ codeVulnerabilityDetectorName?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>[]>;
36808
+ codeVulnerabilityDetectorTags?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>[]>;
36809
+ codeVulnerabilityFilePath?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>[]>;
36710
36810
  /**
36711
36811
  * Details of the component IDs used to filter findings.
36712
36812
  */
@@ -36751,6 +36851,8 @@ export declare namespace inspectorv2 {
36751
36851
  * The tags attached to the Amazon ECR container image.
36752
36852
  */
36753
36853
  ecrImageTags?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>[]>;
36854
+ epssScore?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterNumberFilterArgs>[]>;
36855
+ exploitAvailable?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>[]>;
36754
36856
  /**
36755
36857
  * Details on the finding ARNs used to filter findings.
36756
36858
  */
@@ -36767,10 +36869,16 @@ export declare namespace inspectorv2 {
36767
36869
  * Details on the date and time a finding was first seen used to filter findings.
36768
36870
  */
36769
36871
  firstObservedAt?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterDateFilterArgs>[]>;
36872
+ fixAvailable?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>[]>;
36770
36873
  /**
36771
36874
  * The Amazon Inspector score to filter on.
36772
36875
  */
36773
36876
  inspectorScore?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterNumberFilterArgs>[]>;
36877
+ lambdaFunctionExecutionRoleArn?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>[]>;
36878
+ lambdaFunctionLastModifiedAt?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterDateFilterArgs>[]>;
36879
+ lambdaFunctionLayers?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>[]>;
36880
+ lambdaFunctionName?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>[]>;
36881
+ lambdaFunctionRuntime?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>[]>;
36774
36882
  /**
36775
36883
  * Details on the date and time a finding was last seen used to filter findings.
36776
36884
  */
@@ -36844,8 +36952,10 @@ export declare namespace inspectorv2 {
36844
36952
  interface FilterPackageFilterArgs {
36845
36953
  architecture?: pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>;
36846
36954
  epoch?: pulumi.Input<inputs.inspectorv2.FilterNumberFilterArgs>;
36955
+ filePath?: pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>;
36847
36956
  name?: pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>;
36848
36957
  release?: pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>;
36958
+ sourceLambdaLayerArn?: pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>;
36849
36959
  sourceLayerHash?: pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>;
36850
36960
  version?: pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>;
36851
36961
  }
@@ -44936,7 +45046,7 @@ export declare namespace lambda {
44936
45046
  schemaRegistryConfig?: pulumi.Input<inputs.lambda.EventSourceMappingSchemaRegistryConfigArgs>;
44937
45047
  }
44938
45048
  /**
44939
- * A configuration object that specifies the destination of an event after Lambda processes it.
45049
+ * A configuration object that specifies the destination of an event after Lambda processes it. For more information, see [Adding a destination](https://docs.aws.amazon.com/lambda/latest/dg/invocation-async-retain-records.html#invocation-async-destinations).
44940
45050
  */
44941
45051
  interface EventSourceMappingDestinationConfigArgs {
44942
45052
  /**
@@ -44998,7 +45108,7 @@ export declare namespace lambda {
44998
45108
  metrics?: pulumi.Input<pulumi.Input<enums.lambda.EventSourceMappingMetricsConfigMetricsItem>[]>;
44999
45109
  }
45000
45110
  /**
45001
- * A destination for events that failed processing. See [Capturing records of Lambda asynchronous invocations](https://docs.aws.amazon.com/lambda/latest/dg/invocation-async-retain-records.html) for more information.
45111
+ * A destination for events that failed processing. For more information, see [Adding a destination](https://docs.aws.amazon.com/lambda/latest/dg/invocation-async-retain-records.html#invocation-async-destinations).
45002
45112
  */
45003
45113
  interface EventSourceMappingOnFailureArgs {
45004
45114
  /**
@@ -45031,37 +45141,16 @@ export declare namespace lambda {
45031
45141
  maximumConcurrency?: pulumi.Input<number>;
45032
45142
  }
45033
45143
  interface EventSourceMappingSchemaRegistryAccessConfigArgs {
45034
- /**
45035
- * The type of authentication Lambda uses to access your schema registry.
45036
- */
45037
45144
  type?: pulumi.Input<enums.lambda.EventSourceMappingSchemaRegistryAccessConfigType>;
45038
- /**
45039
- * The URI of the secret (Secrets Manager secret ARN) to authenticate with your schema registry.
45040
- */
45041
45145
  uri?: pulumi.Input<string>;
45042
45146
  }
45043
45147
  interface EventSourceMappingSchemaRegistryConfigArgs {
45044
- /**
45045
- * An array of access configuration objects that tell Lambda how to authenticate with your schema registry.
45046
- */
45047
45148
  accessConfigs?: pulumi.Input<pulumi.Input<inputs.lambda.EventSourceMappingSchemaRegistryAccessConfigArgs>[]>;
45048
- /**
45049
- * The record format that Lambda delivers to your function after schema validation.
45050
- */
45051
45149
  eventRecordFormat?: pulumi.Input<enums.lambda.EventSourceMappingSchemaRegistryConfigEventRecordFormat>;
45052
- /**
45053
- * The URI for your schema registry. The correct URI format depends on the type of schema registry you're using.
45054
- */
45055
45150
  schemaRegistryUri?: pulumi.Input<string>;
45056
- /**
45057
- * An array of schema validation configuration objects, which tell Lambda the message attributes you want to validate and filter using your schema registry.
45058
- */
45059
45151
  schemaValidationConfigs?: pulumi.Input<pulumi.Input<inputs.lambda.EventSourceMappingSchemaValidationConfigArgs>[]>;
45060
45152
  }
45061
45153
  interface EventSourceMappingSchemaValidationConfigArgs {
45062
- /**
45063
- * The attribute you want your schema registry to validate and filter for.
45064
- */
45065
45154
  attribute?: pulumi.Input<enums.lambda.EventSourceMappingSchemaValidationConfigAttribute>;
45066
45155
  }
45067
45156
  /**
@@ -50221,6 +50310,16 @@ export declare namespace mediatailor {
50221
50310
  */
50222
50311
  enabled?: pulumi.Input<boolean>;
50223
50312
  }
50313
+ interface PlaybackConfigurationAdsInteractionLogArgs {
50314
+ /**
50315
+ * Indicates that MediaTailor won't emit the selected events in the logs for playback sessions that are initialized with this configuration.
50316
+ */
50317
+ excludeEventTypes?: pulumi.Input<pulumi.Input<string>[]>;
50318
+ /**
50319
+ * Indicates that MediaTailor emits RAW_ADS_RESPONSE logs for playback sessions that are initialized with this configuration.
50320
+ */
50321
+ publishOptInEventTypes?: pulumi.Input<pulumi.Input<string>[]>;
50322
+ }
50224
50323
  /**
50225
50324
  * The configuration for avail suppression, also known as ad suppression. For more information about ad suppression, see Ad Suppression (https://docs.aws.amazon.com/mediatailor/latest/ug/ad-behavior.html).
50226
50325
  */
@@ -50300,6 +50399,24 @@ export declare namespace mediatailor {
50300
50399
  */
50301
50400
  maxDurationSeconds?: pulumi.Input<number>;
50302
50401
  }
50402
+ interface PlaybackConfigurationLogConfigurationArgs {
50403
+ /**
50404
+ * The event types that MediaTailor emits in logs for interactions with the ADS.
50405
+ */
50406
+ adsInteractionLog?: pulumi.Input<inputs.mediatailor.PlaybackConfigurationAdsInteractionLogArgs>;
50407
+ /**
50408
+ * The method used for collecting logs from AWS Elemental MediaTailor. To configure MediaTailor to send logs directly to Amazon CloudWatch Logs, choose LEGACY_CLOUDWATCH. To configure MediaTailor to send logs to CloudWatch, which then vends the logs to your destination of choice, choose VENDED_LOGS. Supported destinations are CloudWatch Logs log group, Amazon S3 bucket, and Amazon Data Firehose stream. To use vended logs, you must configure the delivery destination in Amazon CloudWatch
50409
+ */
50410
+ enabledLoggingStrategies?: pulumi.Input<pulumi.Input<string>[]>;
50411
+ /**
50412
+ * The event types that MediaTailor emits in logs for interactions with the origin server.
50413
+ */
50414
+ manifestServiceInteractionLog?: pulumi.Input<inputs.mediatailor.PlaybackConfigurationManifestServiceInteractionLogArgs>;
50415
+ /**
50416
+ * The percentage of session logs that MediaTailor sends to your CloudWatch Logs account. For example, if your playback configuration has 1000 sessions and percentEnabled is set to 60, MediaTailor sends logs for 600 of the sessions to CloudWatch Logs. MediaTailor decides at random which of the playback configuration sessions to send logs for. If you want to view logs for a specific session, you can use the debug log mode.
50417
+ */
50418
+ percentEnabled: pulumi.Input<number>;
50419
+ }
50303
50420
  /**
50304
50421
  * The configuration for manifest processing rules. Manifest processing rules enable customization of the personalized manifests created by MediaTailor.
50305
50422
  */
@@ -50309,6 +50426,12 @@ export declare namespace mediatailor {
50309
50426
  */
50310
50427
  adMarkerPassthrough?: pulumi.Input<inputs.mediatailor.PlaybackConfigurationAdMarkerPassthroughArgs>;
50311
50428
  }
50429
+ interface PlaybackConfigurationManifestServiceInteractionLogArgs {
50430
+ /**
50431
+ * Indicates that MediaTailor won't emit the selected events in the logs for playback sessions that are initialized with this configuration.
50432
+ */
50433
+ excludeEventTypes?: pulumi.Input<pulumi.Input<string>[]>;
50434
+ }
50312
50435
  /**
50313
50436
  * <p>Access configuration parameters.</p>
50314
50437
  */
@@ -51551,7 +51674,7 @@ export declare namespace networkfirewall {
51551
51674
  * - You can use CA certificates that you imported into ACM, but you can't generate CA certificates with ACM.
51552
51675
  * - You can't use certificates issued by AWS Private Certificate Authority .
51553
51676
  *
51554
- * For more information about configuring certificates for outbound inspection, see [Using SSL/TLS certificates with certificates with TLS inspection configurations](https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html) in the *AWS Network Firewall Developer Guide* .
51677
+ * For more information about configuring certificates for outbound inspection, see [Using SSL/TLS certificates with TLS inspection configurations](https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html) in the *AWS Network Firewall Developer Guide* .
51555
51678
  *
51556
51679
  * For information about working with certificates in ACM, see [Importing certificates](https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html) in the *AWS Certificate Manager User Guide* .
51557
51680
  */
@@ -91619,6 +91742,209 @@ export declare namespace securityhub {
91619
91742
  */
91620
91743
  value: pulumi.Input<string>;
91621
91744
  }
91745
+ /**
91746
+ * Allows you to configure automated responses
91747
+ */
91748
+ interface AutomationRuleV2AutomationRulesActionV2Args {
91749
+ externalIntegrationConfiguration?: pulumi.Input<inputs.securityhub.AutomationRuleV2ExternalIntegrationConfigurationArgs>;
91750
+ findingFieldsUpdate?: pulumi.Input<inputs.securityhub.AutomationRuleV2AutomationRulesFindingFieldsUpdateV2Args>;
91751
+ /**
91752
+ * The category of action to be executed by the automation rule
91753
+ */
91754
+ type: pulumi.Input<enums.securityhub.AutomationRuleV2AutomationRulesActionV2Type>;
91755
+ }
91756
+ /**
91757
+ * The changes to be applied to fields in a security finding when an automation rule is triggered
91758
+ */
91759
+ interface AutomationRuleV2AutomationRulesFindingFieldsUpdateV2Args {
91760
+ /**
91761
+ * Notes or contextual information for findings that are modified by the automation rule
91762
+ */
91763
+ comment?: pulumi.Input<string>;
91764
+ /**
91765
+ * The severity level to be assigned to findings that match the automation rule criteria
91766
+ */
91767
+ severityId?: pulumi.Input<number>;
91768
+ /**
91769
+ * The status to be applied to findings that match automation rule criteria
91770
+ */
91771
+ statusId?: pulumi.Input<number>;
91772
+ }
91773
+ /**
91774
+ * Boolean filter for querying findings
91775
+ */
91776
+ interface AutomationRuleV2BooleanFilterArgs {
91777
+ /**
91778
+ * The value of the boolean
91779
+ */
91780
+ value: pulumi.Input<boolean>;
91781
+ }
91782
+ /**
91783
+ * Enables the creation of filtering criteria for security findings
91784
+ */
91785
+ interface AutomationRuleV2CompositeFilterArgs {
91786
+ /**
91787
+ * Enables filtering based on boolean field values
91788
+ */
91789
+ booleanFilters?: pulumi.Input<pulumi.Input<inputs.securityhub.AutomationRuleV2OcsfBooleanFilterArgs>[]>;
91790
+ /**
91791
+ * Enables filtering based on date and timestamp fields
91792
+ */
91793
+ dateFilters?: pulumi.Input<pulumi.Input<inputs.securityhub.AutomationRuleV2OcsfDateFilterArgs>[]>;
91794
+ /**
91795
+ * Enables filtering based on map field value
91796
+ */
91797
+ mapFilters?: pulumi.Input<pulumi.Input<inputs.securityhub.AutomationRuleV2OcsfMapFilterArgs>[]>;
91798
+ /**
91799
+ * Enables filtering based on numerical field values
91800
+ */
91801
+ numberFilters?: pulumi.Input<pulumi.Input<inputs.securityhub.AutomationRuleV2OcsfNumberFilterArgs>[]>;
91802
+ operator?: pulumi.Input<enums.securityhub.AutomationRuleV2AllowedOperators>;
91803
+ /**
91804
+ * Enables filtering based on string field values
91805
+ */
91806
+ stringFilters?: pulumi.Input<pulumi.Input<inputs.securityhub.AutomationRuleV2OcsfStringFilterArgs>[]>;
91807
+ }
91808
+ /**
91809
+ * Defines the parameters and conditions used to evaluate and filter security findings
91810
+ */
91811
+ interface AutomationRuleV2CriteriaArgs {
91812
+ ocsfFindingCriteria?: pulumi.Input<inputs.securityhub.AutomationRuleV2OcsfFindingFiltersArgs>;
91813
+ }
91814
+ /**
91815
+ * A date filter for querying findings
91816
+ */
91817
+ interface AutomationRuleV2DateFilterArgs {
91818
+ dateRange?: pulumi.Input<inputs.securityhub.AutomationRuleV2DateRangeArgs>;
91819
+ end?: pulumi.Input<string>;
91820
+ start?: pulumi.Input<string>;
91821
+ }
91822
+ /**
91823
+ * A date range for the date filter
91824
+ */
91825
+ interface AutomationRuleV2DateRangeArgs {
91826
+ /**
91827
+ * A date range unit for the date filter
91828
+ */
91829
+ unit: pulumi.Input<enums.securityhub.AutomationRuleV2DateRangeUnit>;
91830
+ /**
91831
+ * A date range value for the date filter
91832
+ */
91833
+ value: pulumi.Input<number>;
91834
+ }
91835
+ /**
91836
+ * The settings for integrating automation rule actions with external systems or service
91837
+ */
91838
+ interface AutomationRuleV2ExternalIntegrationConfigurationArgs {
91839
+ /**
91840
+ * The ARN of the connector that establishes the integration
91841
+ */
91842
+ connectorArn?: pulumi.Input<string>;
91843
+ }
91844
+ /**
91845
+ * A map filter for filtering findings
91846
+ */
91847
+ interface AutomationRuleV2MapFilterArgs {
91848
+ /**
91849
+ * The condition to apply to the key value when filtering findings with a map filter
91850
+ */
91851
+ comparison: pulumi.Input<enums.securityhub.AutomationRuleV2MapFilterComparison>;
91852
+ /**
91853
+ * The key of the map filter
91854
+ */
91855
+ key: pulumi.Input<string>;
91856
+ /**
91857
+ * The value for the key in the map filter
91858
+ */
91859
+ value: pulumi.Input<string>;
91860
+ }
91861
+ /**
91862
+ * A number filter for querying findings
91863
+ */
91864
+ interface AutomationRuleV2NumberFilterArgs {
91865
+ /**
91866
+ * The equal-to condition to be applied to a single field when querying for findings
91867
+ */
91868
+ eq?: pulumi.Input<number>;
91869
+ /**
91870
+ * The greater-than-equal condition to be applied to a single field when querying for findings
91871
+ */
91872
+ gte?: pulumi.Input<number>;
91873
+ /**
91874
+ * The less-than-equal condition to be applied to a single field when querying for findings
91875
+ */
91876
+ lte?: pulumi.Input<number>;
91877
+ }
91878
+ /**
91879
+ * Enables filtering of security findings based on boolean field values in OCSF
91880
+ */
91881
+ interface AutomationRuleV2OcsfBooleanFilterArgs {
91882
+ /**
91883
+ * The name of the field
91884
+ */
91885
+ fieldName: pulumi.Input<enums.securityhub.AutomationRuleV2OcsfBooleanFilterFieldName>;
91886
+ filter: pulumi.Input<inputs.securityhub.AutomationRuleV2BooleanFilterArgs>;
91887
+ }
91888
+ /**
91889
+ * Enables filtering of security findings based on date and timestamp fields in OCSF
91890
+ */
91891
+ interface AutomationRuleV2OcsfDateFilterArgs {
91892
+ /**
91893
+ * The name of the field
91894
+ */
91895
+ fieldName: pulumi.Input<enums.securityhub.AutomationRuleV2OcsfDateFilterFieldName>;
91896
+ filter: pulumi.Input<inputs.securityhub.AutomationRuleV2DateFilterArgs>;
91897
+ }
91898
+ /**
91899
+ * The filtering conditions that align with OCSF standards
91900
+ */
91901
+ interface AutomationRuleV2OcsfFindingFiltersArgs {
91902
+ /**
91903
+ * Enables the creation of complex filtering conditions by combining filter
91904
+ */
91905
+ compositeFilters?: pulumi.Input<pulumi.Input<inputs.securityhub.AutomationRuleV2CompositeFilterArgs>[]>;
91906
+ compositeOperator?: pulumi.Input<enums.securityhub.AutomationRuleV2AllowedOperators>;
91907
+ }
91908
+ /**
91909
+ * Enables filtering of security findings based on map field values in OCSF
91910
+ */
91911
+ interface AutomationRuleV2OcsfMapFilterArgs {
91912
+ /**
91913
+ * The name of the field
91914
+ */
91915
+ fieldName: pulumi.Input<enums.securityhub.AutomationRuleV2OcsfMapFilterFieldName>;
91916
+ filter: pulumi.Input<inputs.securityhub.AutomationRuleV2MapFilterArgs>;
91917
+ }
91918
+ /**
91919
+ * Enables filtering of security findings based on numerical field values in OCSF
91920
+ */
91921
+ interface AutomationRuleV2OcsfNumberFilterArgs {
91922
+ /**
91923
+ * The name of the field
91924
+ */
91925
+ fieldName: pulumi.Input<enums.securityhub.AutomationRuleV2OcsfNumberFilterFieldName>;
91926
+ filter: pulumi.Input<inputs.securityhub.AutomationRuleV2NumberFilterArgs>;
91927
+ }
91928
+ /**
91929
+ * Enables filtering of security findings based on string field values in OCSF
91930
+ */
91931
+ interface AutomationRuleV2OcsfStringFilterArgs {
91932
+ fieldName: pulumi.Input<enums.securityhub.AutomationRuleV2OcsfStringField>;
91933
+ filter: pulumi.Input<inputs.securityhub.AutomationRuleV2StringFilterArgs>;
91934
+ }
91935
+ /**
91936
+ * A string filter for filtering findings
91937
+ */
91938
+ interface AutomationRuleV2StringFilterArgs {
91939
+ /**
91940
+ * The condition to apply to a string value when filtering findings
91941
+ */
91942
+ comparison: pulumi.Input<enums.securityhub.AutomationRuleV2StringFilterComparison>;
91943
+ /**
91944
+ * The string filter value
91945
+ */
91946
+ value: pulumi.Input<string>;
91947
+ }
91622
91948
  /**
91623
91949
  * Used to update information about the investigation into the finding.
91624
91950
  */
@@ -92535,7 +92861,7 @@ export declare namespace securityhub {
92535
92861
  * - `ResourceType NOT_EQUALS AwsIamPolicy`
92536
92862
  * - `ResourceType NOT_EQUALS AwsEc2NetworkInterface`
92537
92863
  *
92538
- * `CONTAINS` and `NOT_CONTAINS` operators can be used only with automation rules. For more information, see [Automation rules](https://docs.aws.amazon.com/securityhub/latest/userguide/automation-rules.html) in the *AWS Security Hub User Guide* .
92864
+ * `CONTAINS` and `NOT_CONTAINS` operators can be used only with automation rules V1. `CONTAINS_WORD` operator is only supported in `GetFindingsV2` , `GetFindingStatisticsV2` , `GetResourcesV2` , and `GetResourceStatisticsV2` APIs. For more information, see [Automation rules](https://docs.aws.amazon.com/securityhub/latest/userguide/automation-rules.html) in the *AWS Security Hub User Guide* .
92539
92865
  */
92540
92866
  comparison: pulumi.Input<enums.securityhub.InsightStringFilterComparison>;
92541
92867
  /**
@@ -94720,6 +95046,10 @@ export declare namespace synthetics {
94720
95046
  environmentVariables?: pulumi.Input<{
94721
95047
  [key: string]: pulumi.Input<string>;
94722
95048
  }>;
95049
+ /**
95050
+ * Provide ephemeralStorage available for canary in MB
95051
+ */
95052
+ ephemeralStorage?: pulumi.Input<number>;
94723
95053
  /**
94724
95054
  * Provide maximum memory available for canary in MB
94725
95055
  */
@@ -96014,7 +96344,13 @@ export declare namespace wafv2 {
96014
96344
  statements: pulumi.Input<pulumi.Input<inputs.wafv2.RuleGroupStatementArgs>[]>;
96015
96345
  }
96016
96346
  interface RuleGroupAsnMatchStatementArgs {
96347
+ /**
96348
+ * Contains one or more Autonomous System Numbers (ASNs). ASNs are unique identifiers assigned to large internet networks managed by organizations such as internet service providers, enterprises, universities, or government agencies.
96349
+ */
96017
96350
  asnList?: pulumi.Input<pulumi.Input<number>[]>;
96351
+ /**
96352
+ * The configuration for inspecting IP addresses to match against an ASN in an HTTP header that you specify, instead of using the IP address that's reported by the web request origin. Commonly, this is the X-Forwarded-For (XFF) header, but you can specify any header name.
96353
+ */
96018
96354
  forwardedIpConfig?: pulumi.Input<inputs.wafv2.RuleGroupForwardedIpConfigurationArgs>;
96019
96355
  }
96020
96356
  /**
@@ -96694,6 +97030,9 @@ export declare namespace wafv2 {
96694
97030
  * Specifies a single custom aggregate key for a rate-base rule.
96695
97031
  */
96696
97032
  interface RuleGroupRateBasedStatementCustomKeyArgs {
97033
+ /**
97034
+ * Use an Autonomous System Number (ASN) derived from the request's originating or forwarded IP address as an aggregate key. Each distinct ASN contributes to the aggregation instance.
97035
+ */
96697
97036
  asn?: pulumi.Input<inputs.wafv2.RuleGroupRateLimitAsnArgs>;
96698
97037
  /**
96699
97038
  * Use the value of a cookie in the request as an aggregate key. Each distinct value in the cookie contributes to the aggregation instance. If you use a single cookie as your custom key, then each value fully defines an aggregation instance.
@@ -97023,6 +97362,11 @@ export declare namespace wafv2 {
97023
97362
  * A logical rule statement used to combine other rule statements with AND logic. You provide more than one `Statement` within the `AndStatement` .
97024
97363
  */
97025
97364
  andStatement?: pulumi.Input<inputs.wafv2.RuleGroupAndStatementArgs>;
97365
+ /**
97366
+ * A rule statement that inspects web traffic based on the Autonomous System Number (ASN) associated with the request's IP address.
97367
+ *
97368
+ * For additional details, see [ASN match rule statement](https://docs.aws.amazon.com/waf/latest/developerguide/waf-rule-statement-type-asn-match.html) in the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html) .
97369
+ */
97026
97370
  asnMatchStatement?: pulumi.Input<inputs.wafv2.RuleGroupAsnMatchStatementArgs>;
97027
97371
  /**
97028
97372
  * A rule statement that defines a string match search for AWS WAF to apply to web requests. The byte match statement provides the bytes to search for, the location in requests that you want AWS WAF to search, and other settings. The bytes to search for are typically a string that corresponds with ASCII characters. In the AWS WAF console and the developer guide, this is called a string match statement.
@@ -97222,7 +97566,13 @@ export declare namespace wafv2 {
97222
97566
  statements: pulumi.Input<pulumi.Input<inputs.wafv2.WebAclStatementArgs>[]>;
97223
97567
  }
97224
97568
  interface WebAclAsnMatchStatementArgs {
97569
+ /**
97570
+ * Contains one or more Autonomous System Numbers (ASNs). ASNs are unique identifiers assigned to large internet networks managed by organizations such as internet service providers, enterprises, universities, or government agencies.
97571
+ */
97225
97572
  asnList?: pulumi.Input<pulumi.Input<number>[]>;
97573
+ /**
97574
+ * The configuration for inspecting IP addresses to match against an ASN in an HTTP header that you specify, instead of using the IP address that's reported by the web request origin. Commonly, this is the X-Forwarded-For (XFF) header, but you can specify any header name.
97575
+ */
97226
97576
  forwardedIpConfig?: pulumi.Input<inputs.wafv2.WebAclForwardedIpConfigurationArgs>;
97227
97577
  }
97228
97578
  /**
@@ -97281,7 +97631,21 @@ export declare namespace wafv2 {
97281
97631
  * Configures how to use the AntiDDOS AWS managed rule group in the web ACL
97282
97632
  */
97283
97633
  interface WebAclAwsManagedRulesAntiDDoSRuleSetArgs {
97634
+ /**
97635
+ * Configures the request handling that's applied by the managed rule group rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` during a distributed denial of service (DDoS) attack.
97636
+ */
97284
97637
  clientSideActionConfig: pulumi.Input<inputs.wafv2.WebAclClientSideActionConfigArgs>;
97638
+ /**
97639
+ * The sensitivity that the rule group rule `DDoSRequests` uses when matching against the DDoS suspicion labeling on a request. The managed rule group adds the labeling during DDoS events, before the `DDoSRequests` rule runs.
97640
+ *
97641
+ * The higher the sensitivity, the more levels of labeling that the rule matches:
97642
+ *
97643
+ * - Low sensitivity is less sensitive, causing the rule to match only on the most likely participants in an attack, which are the requests with the high suspicion label `awswaf:managed:aws:anti-ddos:high-suspicion-ddos-request` .
97644
+ * - Medium sensitivity causes the rule to match on the medium and high suspicion labels.
97645
+ * - High sensitivity causes the rule to match on all of the suspicion labels: low, medium, and high.
97646
+ *
97647
+ * Default: `LOW`
97648
+ */
97285
97649
  sensitivityToBlock?: pulumi.Input<enums.wafv2.WebAclSensitivityToAct>;
97286
97650
  }
97287
97651
  /**
@@ -97461,14 +97825,62 @@ export declare namespace wafv2 {
97461
97825
  * Client side action config for AntiDDOS AMR.
97462
97826
  */
97463
97827
  interface WebAclClientSideActionArgs {
97828
+ /**
97829
+ * The regular expression to match against the web request URI, used to identify requests that can't handle a silent browser challenge. When the `ClientSideAction` setting `UsageOfAction` is enabled, the managed rule group uses this setting to determine which requests to label with `awswaf:managed:aws:anti-ddos:challengeable-request` . If `UsageOfAction` is disabled, this setting has no effect and the managed rule group doesn't add the label to any requests.
97830
+ *
97831
+ * The anti-DDoS managed rule group doesn't evaluate the rules `ChallengeDDoSRequests` or `ChallengeAllDuringEvent` for web requests whose URIs match this regex. This is true regardless of whether you override the rule action for either of the rules in your web ACL configuration.
97832
+ *
97833
+ * AWS recommends using a regular expression.
97834
+ *
97835
+ * This setting is required if `UsageOfAction` is set to `ENABLED` . If required, you can provide between 1 and 5 regex objects in the array of settings.
97836
+ *
97837
+ * AWS recommends starting with the following setting. Review and update it for your application's needs:
97838
+ *
97839
+ * `\/api\/|\.(acc|avi|css|gif|jpe?g|js|mp[34]|ogg|otf|pdf|png|tiff?|ttf|webm|webp|woff2?)$`
97840
+ */
97464
97841
  exemptUriRegularExpressions?: pulumi.Input<pulumi.Input<inputs.wafv2.WebAclRegexArgs>[]>;
97842
+ /**
97843
+ * The sensitivity that the rule group rule `ChallengeDDoSRequests` uses when matching against the DDoS suspicion labeling on a request. The managed rule group adds the labeling during DDoS events, before the `ChallengeDDoSRequests` rule runs.
97844
+ *
97845
+ * The higher the sensitivity, the more levels of labeling that the rule matches:
97846
+ *
97847
+ * - Low sensitivity is less sensitive, causing the rule to match only on the most likely participants in an attack, which are the requests with the high suspicion label `awswaf:managed:aws:anti-ddos:high-suspicion-ddos-request` .
97848
+ * - Medium sensitivity causes the rule to match on the medium and high suspicion labels.
97849
+ * - High sensitivity causes the rule to match on all of the suspicion labels: low, medium, and high.
97850
+ *
97851
+ * Default: `HIGH`
97852
+ */
97465
97853
  sensitivity?: pulumi.Input<enums.wafv2.WebAclSensitivityToAct>;
97854
+ /**
97855
+ * Determines whether to use the `AWSManagedRulesAntiDDoSRuleSet` rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` in the rule group evaluation and the related label `awswaf:managed:aws:anti-ddos:challengeable-request` .
97856
+ *
97857
+ * - If usage is enabled:
97858
+ *
97859
+ * - The managed rule group adds the label `awswaf:managed:aws:anti-ddos:challengeable-request` to any web request whose URL does *NOT* match the regular expressions provided in the `ClientSideAction` setting `ExemptUriRegularExpressions` .
97860
+ * - The two rules are evaluated against web requests for protected resources that are experiencing a DDoS attack. The two rules only apply their action to matching requests that have the label `awswaf:managed:aws:anti-ddos:challengeable-request` .
97861
+ * - If usage is disabled:
97862
+ *
97863
+ * - The managed rule group doesn't add the label `awswaf:managed:aws:anti-ddos:challengeable-request` to any web requests.
97864
+ * - The two rules are not evaluated.
97865
+ * - None of the other `ClientSideAction` settings have any effect.
97866
+ *
97867
+ * > This setting only enables or disables the use of the two anti-DDOS rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` in the anti-DDoS managed rule group.
97868
+ * >
97869
+ * > This setting doesn't alter the action setting in the two rules. To override the actions used by the rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` , enable this setting, and then override the rule actions in the usual way, in your managed rule group configuration.
97870
+ */
97466
97871
  usageOfAction: pulumi.Input<enums.wafv2.WebAclUsageOfAction>;
97467
97872
  }
97468
97873
  /**
97469
97874
  * Client side action config for AntiDDOS AMR.
97470
97875
  */
97471
97876
  interface WebAclClientSideActionConfigArgs {
97877
+ /**
97878
+ * Configuration for the use of the `AWSManagedRulesAntiDDoSRuleSet` rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` .
97879
+ *
97880
+ * > This setting isn't related to the configuration of the `Challenge` action itself. It only configures the use of the two anti-DDoS rules named here.
97881
+ *
97882
+ * You can enable or disable the use of these rules, and you can configure how to use them when they are enabled.
97883
+ */
97472
97884
  challenge: pulumi.Input<inputs.wafv2.WebAclClientSideActionArgs>;
97473
97885
  }
97474
97886
  /**
@@ -98011,6 +98423,11 @@ export declare namespace wafv2 {
98011
98423
  * For information about using the ACFP managed rule group, see [AWS WAF Fraud Control account creation fraud prevention (ACFP) rule group](https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-acfp.html) and [AWS WAF Fraud Control account creation fraud prevention (ACFP)](https://docs.aws.amazon.com/waf/latest/developerguide/waf-acfp.html) in the *AWS WAF Developer Guide* .
98012
98424
  */
98013
98425
  awsManagedRulesAcfpRuleSet?: pulumi.Input<inputs.wafv2.WebAclAwsManagedRulesAcfpRuleSetArgs>;
98426
+ /**
98427
+ * Additional configuration for using the anti-DDoS managed rule group, `AWSManagedRulesAntiDDoSRuleSet` . Use this to configure anti-DDoS behavior for the rule group.
98428
+ *
98429
+ * For information about using the anti-DDoS managed rule group, see [AWS WAF Anti-DDoS rule group](https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-anti-ddos.html) and [Distributed Denial of Service (DDoS) prevention](https://docs.aws.amazon.com/waf/latest/developerguide/waf-anti-ddos.html) in the *AWS WAF Developer Guide* .
98430
+ */
98014
98431
  awsManagedRulesAntiDDoSRuleSet?: pulumi.Input<inputs.wafv2.WebAclAwsManagedRulesAntiDDoSRuleSetArgs>;
98015
98432
  /**
98016
98433
  * Additional configuration for using the account takeover prevention (ATP) managed rule group, `AWSManagedRulesATPRuleSet` . Use this to provide login request information to the rule group. For web ACLs that protect CloudFront distributions, use this to also provide the information about how your distribution responds to login requests.
@@ -98083,6 +98500,9 @@ export declare namespace wafv2 {
98083
98500
  * Configures the options for on-source DDoS protection provided by supported resource type.
98084
98501
  */
98085
98502
  interface WebAclOnSourceDDoSProtectionConfigArgs {
98503
+ /**
98504
+ * The level of DDoS protection that applies to web ACLs associated with Application Load Balancers. `ACTIVE_UNDER_DDOS` protection is enabled by default whenever a web ACL is associated with an Application Load Balancer. In the event that an Application Load Balancer experiences high-load conditions or suspected DDoS attacks, the `ACTIVE_UNDER_DDOS` protection automatically rate limits traffic from known low reputation sources without disrupting Application Load Balancer availability. `ALWAYS_ON` protection provides constant, always-on monitoring of known low reputation sources for suspected DDoS attacks. While this provides a higher level of protection, there may be potential impacts on legitimate traffic.
98505
+ */
98086
98506
  albLowReputationMode: pulumi.Input<enums.wafv2.WebAclOnSourceDDoSProtectionConfigAlbLowReputationMode>;
98087
98507
  }
98088
98508
  interface WebAclOrStatementArgs {
@@ -98166,6 +98586,9 @@ export declare namespace wafv2 {
98166
98586
  * Specifies a single custom aggregate key for a rate-base rule.
98167
98587
  */
98168
98588
  interface WebAclRateBasedStatementCustomKeyArgs {
98589
+ /**
98590
+ * Use an Autonomous System Number (ASN) derived from the request's originating or forwarded IP address as an aggregate key. Each distinct ASN contributes to the aggregation instance.
98591
+ */
98169
98592
  asn?: pulumi.Input<inputs.wafv2.WebAclRateLimitAsnArgs>;
98170
98593
  /**
98171
98594
  * Use the value of a cookie in the request as an aggregate key. Each distinct value in the cookie contributes to the aggregation instance. If you use a single cookie as your custom key, then each value fully defines an aggregation instance.
@@ -98773,6 +99196,11 @@ export declare namespace wafv2 {
98773
99196
  * A logical rule statement used to combine other rule statements with AND logic. You provide more than one `Statement` within the `AndStatement` .
98774
99197
  */
98775
99198
  andStatement?: pulumi.Input<inputs.wafv2.WebAclAndStatementArgs>;
99199
+ /**
99200
+ * A rule statement that inspects web traffic based on the Autonomous System Number (ASN) associated with the request's IP address.
99201
+ *
99202
+ * For additional details, see [ASN match rule statement](https://docs.aws.amazon.com/waf/latest/developerguide/waf-rule-statement-type-asn-match.html) in the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html) .
99203
+ */
98776
99204
  asnMatchStatement?: pulumi.Input<inputs.wafv2.WebAclAsnMatchStatementArgs>;
98777
99205
  /**
98778
99206
  * A rule statement that defines a string match search for AWS WAF to apply to web requests. The byte match statement provides the bytes to search for, the location in requests that you want AWS WAF to search, and other settings. The bytes to search for are typically a string that corresponds with ASCII characters. In the AWS WAF console and the developer guide, this is called a string match statement.