@pulumi/aws-native 1.31.0-alpha.1750138530 → 1.31.0-alpha.1750422093
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/accessanalyzer/analyzer.d.ts +2 -2
- package/amplify/app.d.ts +8 -0
- package/amplify/app.js +2 -0
- package/amplify/app.js.map +1 -1
- package/amplify/getApp.d.ts +4 -0
- package/amplify/getApp.js.map +1 -1
- package/bedrock/getGuardrail.d.ts +1 -0
- package/bedrock/getGuardrail.js.map +1 -1
- package/bedrock/guardrail.d.ts +2 -0
- package/bedrock/guardrail.js +2 -0
- package/bedrock/guardrail.js.map +1 -1
- package/cleanrooms/collaboration.d.ts +4 -4
- package/cleanrooms/collaboration.js +0 -6
- package/cleanrooms/collaboration.js.map +1 -1
- package/connect/evaluationForm.d.ts +2 -0
- package/connect/evaluationForm.js +2 -0
- package/connect/evaluationForm.js.map +1 -1
- package/connect/getEvaluationForm.d.ts +1 -0
- package/connect/getEvaluationForm.js.map +1 -1
- package/customerprofiles/calculatedAttributeDefinition.d.ts +13 -0
- package/customerprofiles/calculatedAttributeDefinition.js +7 -1
- package/customerprofiles/calculatedAttributeDefinition.js.map +1 -1
- package/customerprofiles/getCalculatedAttributeDefinition.d.ts +5 -0
- package/customerprofiles/getCalculatedAttributeDefinition.js.map +1 -1
- package/customerprofiles/getObjectType.d.ts +8 -0
- package/customerprofiles/getObjectType.js.map +1 -1
- package/customerprofiles/objectType.d.ts +12 -0
- package/customerprofiles/objectType.js +4 -0
- package/customerprofiles/objectType.js.map +1 -1
- package/ec2/getTrafficMirrorFilter.d.ts +37 -0
- package/ec2/getTrafficMirrorFilter.js +28 -0
- package/ec2/getTrafficMirrorFilter.js.map +1 -0
- package/ec2/index.d.ts +6 -0
- package/ec2/index.js +11 -4
- package/ec2/index.js.map +1 -1
- package/ec2/trafficMirrorFilter.d.ts +64 -0
- package/ec2/trafficMirrorFilter.js +64 -0
- package/ec2/trafficMirrorFilter.js.map +1 -0
- package/inspectorv2/filter.d.ts +6 -0
- package/inspectorv2/filter.js +2 -0
- package/inspectorv2/filter.js.map +1 -1
- package/inspectorv2/getFilter.d.ts +3 -0
- package/inspectorv2/getFilter.js.map +1 -1
- package/mediatailor/getPlaybackConfiguration.d.ts +4 -0
- package/mediatailor/getPlaybackConfiguration.js.map +1 -1
- package/mediatailor/playbackConfiguration.d.ts +8 -0
- package/mediatailor/playbackConfiguration.js +2 -0
- package/mediatailor/playbackConfiguration.js.map +1 -1
- package/opsworkscm/server.d.ts +2 -2
- package/organizations/policy.d.ts +2 -2
- package/package.json +3 -3
- package/package.json.dev +2 -2
- package/rds/dbCluster.d.ts +4 -4
- package/rds/dbInstance.d.ts +2 -2
- package/rds/getDbCluster.d.ts +2 -2
- package/rds/getDbInstance.d.ts +1 -1
- package/redshiftserverless/getSnapshot.d.ts +36 -0
- package/redshiftserverless/getSnapshot.js +28 -0
- package/redshiftserverless/getSnapshot.js.map +1 -0
- package/redshiftserverless/index.d.ts +6 -0
- package/redshiftserverless/index.js +8 -1
- package/redshiftserverless/index.js.map +1 -1
- package/redshiftserverless/snapshot.d.ts +75 -0
- package/redshiftserverless/snapshot.js +68 -0
- package/redshiftserverless/snapshot.js.map +1 -0
- package/securityhub/aggregatorV2.d.ts +64 -0
- package/securityhub/aggregatorV2.js +70 -0
- package/securityhub/aggregatorV2.js.map +1 -0
- package/securityhub/automationRuleV2.d.ts +94 -0
- package/securityhub/automationRuleV2.js +91 -0
- package/securityhub/automationRuleV2.js.map +1 -0
- package/securityhub/getAggregatorV2.d.ts +43 -0
- package/securityhub/getAggregatorV2.js +28 -0
- package/securityhub/getAggregatorV2.js.map +1 -0
- package/securityhub/getAutomationRuleV2.d.ts +59 -0
- package/securityhub/getAutomationRuleV2.js +28 -0
- package/securityhub/getAutomationRuleV2.js.map +1 -0
- package/securityhub/getHubV2.d.ts +31 -0
- package/securityhub/getHubV2.js +28 -0
- package/securityhub/getHubV2.js.map +1 -0
- package/securityhub/hubV2.d.ts +44 -0
- package/securityhub/hubV2.js +60 -0
- package/securityhub/hubV2.js.map +1 -0
- package/securityhub/index.d.ts +18 -0
- package/securityhub/index.js +22 -1
- package/securityhub/index.js.map +1 -1
- package/types/enums/amplify/index.d.ts +21 -0
- package/types/enums/amplify/index.js +6 -1
- package/types/enums/amplify/index.js.map +1 -1
- package/types/enums/connect/index.d.ts +3 -0
- package/types/enums/connect/index.js +3 -0
- package/types/enums/connect/index.js.map +1 -1
- package/types/enums/connectcampaignsv2/index.d.ts +8 -0
- package/types/enums/connectcampaignsv2/index.js +5 -1
- package/types/enums/connectcampaignsv2/index.js.map +1 -1
- package/types/enums/customerprofiles/index.d.ts +26 -0
- package/types/enums/customerprofiles/index.js +15 -1
- package/types/enums/customerprofiles/index.js.map +1 -1
- package/types/enums/ec2/index.d.ts +7 -0
- package/types/enums/ec2/index.js +4 -1
- package/types/enums/ec2/index.js.map +1 -1
- package/types/enums/lambda/index.d.ts +0 -9
- package/types/enums/lambda/index.js.map +1 -1
- package/types/enums/organizations/index.d.ts +2 -1
- package/types/enums/organizations/index.js +1 -0
- package/types/enums/organizations/index.js.map +1 -1
- package/types/enums/redshiftserverless/index.d.ts +9 -0
- package/types/enums/redshiftserverless/index.js +9 -1
- package/types/enums/redshiftserverless/index.js.map +1 -1
- package/types/enums/securityhub/index.d.ts +136 -0
- package/types/enums/securityhub/index.js +89 -1
- package/types/enums/securityhub/index.js.map +1 -1
- package/types/enums/wafv2/index.d.ts +3 -0
- package/types/enums/wafv2/index.js.map +1 -1
- package/types/input.d.ts +469 -41
- package/types/output.d.ts +494 -41
- package/types/output.js.map +1 -1
package/types/input.d.ts
CHANGED
|
@@ -184,6 +184,7 @@ export declare namespace accessanalyzer {
|
|
|
184
184
|
* The configuration for the analyzer
|
|
185
185
|
*/
|
|
186
186
|
interface AnalyzerConfigurationPropertiesArgs {
|
|
187
|
+
internalAccessConfiguration?: pulumi.Input<inputs.accessanalyzer.AnalyzerInternalAccessConfigurationArgs>;
|
|
187
188
|
/**
|
|
188
189
|
* Specifies the configuration of an unused access analyzer for an AWS organization or account.
|
|
189
190
|
*/
|
|
@@ -211,6 +212,41 @@ export declare namespace accessanalyzer {
|
|
|
211
212
|
*/
|
|
212
213
|
property: pulumi.Input<string>;
|
|
213
214
|
}
|
|
215
|
+
/**
|
|
216
|
+
* The criteria for an analysis rule for an internal access analyzer.
|
|
217
|
+
*/
|
|
218
|
+
interface AnalyzerInternalAccessAnalysisRuleCriteriaArgs {
|
|
219
|
+
/**
|
|
220
|
+
* A list of AWS account IDs to apply to the internal access analysis rule criteria. Account IDs can only be applied to the analysis rule criteria for organization-level analyzers and cannot include the organization owner account.
|
|
221
|
+
*/
|
|
222
|
+
accountIds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
223
|
+
/**
|
|
224
|
+
* A list of resource ARNs to apply to the internal access analysis rule criteria. The analyzer will only generate findings for resources that match these ARNs.
|
|
225
|
+
*/
|
|
226
|
+
resourceArns?: pulumi.Input<pulumi.Input<string>[]>;
|
|
227
|
+
/**
|
|
228
|
+
* A list of resource types to apply to the internal access analysis rule criteria. The analyzer will only generate findings for resources of these types.
|
|
229
|
+
*/
|
|
230
|
+
resourceTypes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
231
|
+
}
|
|
232
|
+
/**
|
|
233
|
+
* Specifies the configuration of an internal access analyzer for an AWS organization or account. This configuration determines how the analyzer evaluates internal access within your AWS environment.
|
|
234
|
+
*/
|
|
235
|
+
interface AnalyzerInternalAccessConfigurationArgs {
|
|
236
|
+
/**
|
|
237
|
+
* Contains information about analysis rules for the internal access analyzer. Analysis rules determine which entities will generate findings based on the criteria you define when you create the rule.
|
|
238
|
+
*/
|
|
239
|
+
internalAccessAnalysisRule?: pulumi.Input<inputs.accessanalyzer.AnalyzerInternalAccessConfigurationInternalAccessAnalysisRulePropertiesArgs>;
|
|
240
|
+
}
|
|
241
|
+
/**
|
|
242
|
+
* Contains information about analysis rules for the internal access analyzer. Analysis rules determine which entities will generate findings based on the criteria you define when you create the rule.
|
|
243
|
+
*/
|
|
244
|
+
interface AnalyzerInternalAccessConfigurationInternalAccessAnalysisRulePropertiesArgs {
|
|
245
|
+
/**
|
|
246
|
+
* A list of rules for the internal access analyzer containing criteria to include in analysis. Only resources that meet the rule criteria will generate findings.
|
|
247
|
+
*/
|
|
248
|
+
inclusions?: pulumi.Input<pulumi.Input<inputs.accessanalyzer.AnalyzerInternalAccessAnalysisRuleCriteriaArgs>[]>;
|
|
249
|
+
}
|
|
214
250
|
/**
|
|
215
251
|
* A key-value pair to associate with a resource.
|
|
216
252
|
*/
|
|
@@ -886,6 +922,24 @@ export declare namespace amplify {
|
|
|
886
922
|
*/
|
|
887
923
|
value: pulumi.Input<string>;
|
|
888
924
|
}
|
|
925
|
+
interface AppJobConfigArgs {
|
|
926
|
+
/**
|
|
927
|
+
* Specifies the size of the build instance. Amplify supports three instance sizes: `STANDARD_8GB` , `LARGE_16GB` , and `XLARGE_72GB` . If you don't specify a value, Amplify uses the `STANDARD_8GB` default.
|
|
928
|
+
*
|
|
929
|
+
* The following list describes the CPU, memory, and storage capacity for each build instance type:
|
|
930
|
+
*
|
|
931
|
+
* - **STANDARD_8GB** - - vCPUs: 4
|
|
932
|
+
* - Memory: 8 GiB
|
|
933
|
+
* - Disk space: 128 GB
|
|
934
|
+
* - **LARGE_16GB** - - vCPUs: 8
|
|
935
|
+
* - Memory: 16 GiB
|
|
936
|
+
* - Disk space: 128 GB
|
|
937
|
+
* - **XLARGE_72GB** - - vCPUs: 36
|
|
938
|
+
* - Memory: 72 GiB
|
|
939
|
+
* - Disk space: 256 GB
|
|
940
|
+
*/
|
|
941
|
+
buildComputeType: pulumi.Input<enums.amplify.AppJobConfigBuildComputeType>;
|
|
942
|
+
}
|
|
889
943
|
interface BranchBackendArgs {
|
|
890
944
|
/**
|
|
891
945
|
* The Amazon Resource Name (ARN) for the AWS CloudFormation stack.
|
|
@@ -11674,6 +11728,15 @@ export declare namespace bedrock {
|
|
|
11674
11728
|
*/
|
|
11675
11729
|
filtersConfig: pulumi.Input<pulumi.Input<inputs.bedrock.GuardrailContextualGroundingFilterConfigArgs>[]>;
|
|
11676
11730
|
}
|
|
11731
|
+
/**
|
|
11732
|
+
* The system-defined guardrail profile that you’re using with your guardrail
|
|
11733
|
+
*/
|
|
11734
|
+
interface GuardrailCrossRegionConfigArgs {
|
|
11735
|
+
/**
|
|
11736
|
+
* The Amazon Resource Name (ARN) of the guardrail profile
|
|
11737
|
+
*/
|
|
11738
|
+
guardrailProfileArn: pulumi.Input<string>;
|
|
11739
|
+
}
|
|
11677
11740
|
/**
|
|
11678
11741
|
* A managed words config.
|
|
11679
11742
|
*/
|
|
@@ -13183,7 +13246,7 @@ export declare namespace cleanrooms {
|
|
|
13183
13246
|
*
|
|
13184
13247
|
* *Allowed Values* : `CAN_QUERY` | `CAN_RECEIVE_RESULTS`
|
|
13185
13248
|
*/
|
|
13186
|
-
memberAbilities
|
|
13249
|
+
memberAbilities?: pulumi.Input<pulumi.Input<enums.cleanrooms.CollaborationMemberAbility>[]>;
|
|
13187
13250
|
/**
|
|
13188
13251
|
* The ML abilities granted to the collaboration member.
|
|
13189
13252
|
*/
|
|
@@ -17906,6 +17969,12 @@ export declare namespace connect {
|
|
|
17906
17969
|
*/
|
|
17907
17970
|
requiredFields?: pulumi.Input<pulumi.Input<inputs.connect.TaskTemplateRequiredFieldInfoArgs>[]>;
|
|
17908
17971
|
}
|
|
17972
|
+
interface EvaluationFormAutoEvaluationConfigurationArgs {
|
|
17973
|
+
/**
|
|
17974
|
+
* Auto Evaluation enablement status.
|
|
17975
|
+
*/
|
|
17976
|
+
enabled?: pulumi.Input<boolean>;
|
|
17977
|
+
}
|
|
17909
17978
|
/**
|
|
17910
17979
|
* An item at the root level. All items must be sections.
|
|
17911
17980
|
*/
|
|
@@ -17932,10 +18001,11 @@ export declare namespace connect {
|
|
|
17932
18001
|
* Information about the automation configuration in numeric questions.
|
|
17933
18002
|
*/
|
|
17934
18003
|
interface EvaluationFormNumericQuestionAutomationArgs {
|
|
18004
|
+
answerSource?: any;
|
|
17935
18005
|
/**
|
|
17936
18006
|
* The property value of the automation.
|
|
17937
18007
|
*/
|
|
17938
|
-
propertyValue
|
|
18008
|
+
propertyValue?: pulumi.Input<inputs.connect.EvaluationFormNumericQuestionPropertyValueAutomationArgs>;
|
|
17939
18009
|
}
|
|
17940
18010
|
/**
|
|
17941
18011
|
* Information about the option range used for scoring in numeric questions.
|
|
@@ -19047,6 +19117,7 @@ export declare namespace connectcampaignsv2 {
|
|
|
19047
19117
|
* The CommunicationLimits that apply to all channel subtypes defined in an outbound campaign.
|
|
19048
19118
|
*/
|
|
19049
19119
|
allChannelsSubtypes?: pulumi.Input<inputs.connectcampaignsv2.CampaignCommunicationLimitsArgs>;
|
|
19120
|
+
instanceLimitsHandling?: pulumi.Input<enums.connectcampaignsv2.CampaignInstanceLimitsHandling>;
|
|
19050
19121
|
}
|
|
19051
19122
|
/**
|
|
19052
19123
|
* Campaign communication time config
|
|
@@ -19390,6 +19461,14 @@ export declare namespace customerprofiles {
|
|
|
19390
19461
|
* The relative time period over which data is included in the aggregation.
|
|
19391
19462
|
*/
|
|
19392
19463
|
interface CalculatedAttributeDefinitionRangeArgs {
|
|
19464
|
+
/**
|
|
19465
|
+
* The format the timestamp field in your JSON object is specified. This value should be one of EPOCHMILLI or ISO_8601. E.g. if your object type is MyType and source JSON is {"generatedAt": {"timestamp": "2001-07-04T12:08:56.235Z"}}, then TimestampFormat should be "ISO_8601".
|
|
19466
|
+
*/
|
|
19467
|
+
timestampFormat?: pulumi.Input<string>;
|
|
19468
|
+
/**
|
|
19469
|
+
* An expression specifying the field in your JSON object from which the date should be parsed. The expression should follow the structure of \"{ObjectTypeName.<Location of timestamp field in JSON pointer format>}\". E.g. if your object type is MyType and source JSON is {"generatedAt": {"timestamp": "1737587945945"}}, then TimestampSource should be "{MyType.generatedAt.timestamp}".
|
|
19470
|
+
*/
|
|
19471
|
+
timestampSource?: pulumi.Input<string>;
|
|
19393
19472
|
/**
|
|
19394
19473
|
* The unit of time.
|
|
19395
19474
|
*/
|
|
@@ -19397,7 +19476,8 @@ export declare namespace customerprofiles {
|
|
|
19397
19476
|
/**
|
|
19398
19477
|
* The amount of time of the specified unit.
|
|
19399
19478
|
*/
|
|
19400
|
-
value
|
|
19479
|
+
value?: pulumi.Input<number>;
|
|
19480
|
+
valueRange?: pulumi.Input<inputs.customerprofiles.CalculatedAttributeDefinitionValueRangeArgs>;
|
|
19401
19481
|
}
|
|
19402
19482
|
/**
|
|
19403
19483
|
* The threshold for the calculated attribute.
|
|
@@ -19412,6 +19492,19 @@ export declare namespace customerprofiles {
|
|
|
19412
19492
|
*/
|
|
19413
19493
|
value: pulumi.Input<string>;
|
|
19414
19494
|
}
|
|
19495
|
+
/**
|
|
19496
|
+
* A structure specifying the endpoints of the relative time period over which data is included in the aggregation.
|
|
19497
|
+
*/
|
|
19498
|
+
interface CalculatedAttributeDefinitionValueRangeArgs {
|
|
19499
|
+
/**
|
|
19500
|
+
* The ending point for this range. Positive numbers indicate how many days in the past data should be included, and negative numbers indicate how many days in the future.
|
|
19501
|
+
*/
|
|
19502
|
+
end: pulumi.Input<number>;
|
|
19503
|
+
/**
|
|
19504
|
+
* The starting point for this range. Positive numbers indicate how many days in the past data should be included, and negative numbers indicate how many days in the future.
|
|
19505
|
+
*/
|
|
19506
|
+
start: pulumi.Input<number>;
|
|
19507
|
+
}
|
|
19415
19508
|
/**
|
|
19416
19509
|
* Configures information about the AttributeTypesSelector where the rule-based identity resolution uses to match profiles.
|
|
19417
19510
|
*/
|
|
@@ -20024,6 +20117,7 @@ export declare namespace customerprofiles {
|
|
|
20024
20117
|
partyTypeString?: pulumi.Input<inputs.customerprofiles.SegmentDefinitionProfileDimensionArgs>;
|
|
20025
20118
|
personalEmailAddress?: pulumi.Input<inputs.customerprofiles.SegmentDefinitionProfileDimensionArgs>;
|
|
20026
20119
|
phoneNumber?: pulumi.Input<inputs.customerprofiles.SegmentDefinitionProfileDimensionArgs>;
|
|
20120
|
+
profileType?: pulumi.Input<inputs.customerprofiles.SegmentDefinitionProfileTypeDimensionArgs>;
|
|
20027
20121
|
shippingAddress?: pulumi.Input<inputs.customerprofiles.SegmentDefinitionAddressDimensionArgs>;
|
|
20028
20122
|
}
|
|
20029
20123
|
/**
|
|
@@ -20033,16 +20127,23 @@ export declare namespace customerprofiles {
|
|
|
20033
20127
|
dimensionType: pulumi.Input<enums.customerprofiles.SegmentDefinitionStringDimensionType>;
|
|
20034
20128
|
values: pulumi.Input<pulumi.Input<string>[]>;
|
|
20035
20129
|
}
|
|
20130
|
+
/**
|
|
20131
|
+
* Specifies profile type based criteria for a segment.
|
|
20132
|
+
*/
|
|
20133
|
+
interface SegmentDefinitionProfileTypeDimensionArgs {
|
|
20134
|
+
dimensionType: pulumi.Input<enums.customerprofiles.SegmentDefinitionProfileTypeDimensionType>;
|
|
20135
|
+
values: pulumi.Input<pulumi.Input<enums.customerprofiles.SegmentDefinitionProfileType>[]>;
|
|
20136
|
+
}
|
|
20036
20137
|
/**
|
|
20037
20138
|
* Defines the range to be applied to the calculated attribute definition.
|
|
20038
20139
|
*/
|
|
20039
20140
|
interface SegmentDefinitionRangeOverrideArgs {
|
|
20040
20141
|
/**
|
|
20041
|
-
* The ending point for this overridden range.
|
|
20142
|
+
* The ending point for this overridden range. Positive numbers indicate how many days in the past data should be included, and negative numbers indicate how many days in the future.
|
|
20042
20143
|
*/
|
|
20043
20144
|
end?: pulumi.Input<number>;
|
|
20044
20145
|
/**
|
|
20045
|
-
* The starting point for this overridden range.
|
|
20146
|
+
* The starting point for this overridden range. Positive numbers indicate how many days in the past data should be included, and negative numbers indicate how many days in the future.
|
|
20046
20147
|
*/
|
|
20047
20148
|
start: pulumi.Input<number>;
|
|
20048
20149
|
/**
|
|
@@ -24781,18 +24882,14 @@ export declare namespace ec2 {
|
|
|
24781
24882
|
*/
|
|
24782
24883
|
throughput?: pulumi.Input<number>;
|
|
24783
24884
|
/**
|
|
24784
|
-
* Specifies the Amazon EBS Provisioned Rate for Volume Initialization (volume initialization rate), in MiB/s, at which to download the snapshot blocks from Amazon S3 to the volume. This is also known as *volume initialization
|
|
24785
|
-
*
|
|
24786
|
-
*
|
|
24787
|
-
*
|
|
24788
|
-
*
|
|
24789
|
-
*
|
|
24790
|
-
* > If you specify a snapshot that is enabled for fast snapshot restore and a volume initialization rate, the volume will be initialized at the specified rate instead of fast snapshot restore.
|
|
24791
|
-
* - You want to create a volume that is initialized at the default rate.
|
|
24885
|
+
* Specifies the Amazon EBS Provisioned Rate for Volume Initialization (volume initialization rate), in MiB/s, at which to download the snapshot blocks from Amazon S3 to the volume. This is also known as *volume initialization*. Specifying a volume initialization rate ensures that the volume is initialized at a predictable and consistent rate after creation.
|
|
24886
|
+
* This parameter is supported only for volumes created from snapshots. Omit this parameter if:
|
|
24887
|
+
* + You want to create the volume using fast snapshot restore. You must specify a snapshot that is enabled for fast snapshot restore. In this case, the volume is fully initialized at creation.
|
|
24888
|
+
* If you specify a snapshot that is enabled for fast snapshot restore and a volume initialization rate, the volume will be initialized at the specified rate instead of fast snapshot restore.
|
|
24889
|
+
* + You want to create a volume that is initialized at the default rate.
|
|
24792
24890
|
*
|
|
24793
|
-
*
|
|
24794
|
-
*
|
|
24795
|
-
* Valid range: 100 - 300 MiB/s
|
|
24891
|
+
* For more information, see [Initialize Amazon EBS volumes](https://docs.aws.amazon.com/ebs/latest/userguide/initalize-volume.html) in the *Amazon EC2 User Guide*.
|
|
24892
|
+
* Valid range: 100 - 300 MiB/s
|
|
24796
24893
|
*/
|
|
24797
24894
|
volumeInitializationRate?: pulumi.Input<number>;
|
|
24798
24895
|
/**
|
|
@@ -36707,6 +36804,9 @@ export declare namespace inspectorv2 {
|
|
|
36707
36804
|
* Details of the AWS account IDs used to filter findings.
|
|
36708
36805
|
*/
|
|
36709
36806
|
awsAccountId?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>[]>;
|
|
36807
|
+
codeVulnerabilityDetectorName?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>[]>;
|
|
36808
|
+
codeVulnerabilityDetectorTags?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>[]>;
|
|
36809
|
+
codeVulnerabilityFilePath?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>[]>;
|
|
36710
36810
|
/**
|
|
36711
36811
|
* Details of the component IDs used to filter findings.
|
|
36712
36812
|
*/
|
|
@@ -36751,6 +36851,8 @@ export declare namespace inspectorv2 {
|
|
|
36751
36851
|
* The tags attached to the Amazon ECR container image.
|
|
36752
36852
|
*/
|
|
36753
36853
|
ecrImageTags?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>[]>;
|
|
36854
|
+
epssScore?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterNumberFilterArgs>[]>;
|
|
36855
|
+
exploitAvailable?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>[]>;
|
|
36754
36856
|
/**
|
|
36755
36857
|
* Details on the finding ARNs used to filter findings.
|
|
36756
36858
|
*/
|
|
@@ -36767,10 +36869,16 @@ export declare namespace inspectorv2 {
|
|
|
36767
36869
|
* Details on the date and time a finding was first seen used to filter findings.
|
|
36768
36870
|
*/
|
|
36769
36871
|
firstObservedAt?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterDateFilterArgs>[]>;
|
|
36872
|
+
fixAvailable?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>[]>;
|
|
36770
36873
|
/**
|
|
36771
36874
|
* The Amazon Inspector score to filter on.
|
|
36772
36875
|
*/
|
|
36773
36876
|
inspectorScore?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterNumberFilterArgs>[]>;
|
|
36877
|
+
lambdaFunctionExecutionRoleArn?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>[]>;
|
|
36878
|
+
lambdaFunctionLastModifiedAt?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterDateFilterArgs>[]>;
|
|
36879
|
+
lambdaFunctionLayers?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>[]>;
|
|
36880
|
+
lambdaFunctionName?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>[]>;
|
|
36881
|
+
lambdaFunctionRuntime?: pulumi.Input<pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>[]>;
|
|
36774
36882
|
/**
|
|
36775
36883
|
* Details on the date and time a finding was last seen used to filter findings.
|
|
36776
36884
|
*/
|
|
@@ -36844,8 +36952,10 @@ export declare namespace inspectorv2 {
|
|
|
36844
36952
|
interface FilterPackageFilterArgs {
|
|
36845
36953
|
architecture?: pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>;
|
|
36846
36954
|
epoch?: pulumi.Input<inputs.inspectorv2.FilterNumberFilterArgs>;
|
|
36955
|
+
filePath?: pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>;
|
|
36847
36956
|
name?: pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>;
|
|
36848
36957
|
release?: pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>;
|
|
36958
|
+
sourceLambdaLayerArn?: pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>;
|
|
36849
36959
|
sourceLayerHash?: pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>;
|
|
36850
36960
|
version?: pulumi.Input<inputs.inspectorv2.FilterStringFilterArgs>;
|
|
36851
36961
|
}
|
|
@@ -44936,7 +45046,7 @@ export declare namespace lambda {
|
|
|
44936
45046
|
schemaRegistryConfig?: pulumi.Input<inputs.lambda.EventSourceMappingSchemaRegistryConfigArgs>;
|
|
44937
45047
|
}
|
|
44938
45048
|
/**
|
|
44939
|
-
* A configuration object that specifies the destination of an event after Lambda processes it.
|
|
45049
|
+
* A configuration object that specifies the destination of an event after Lambda processes it. For more information, see [Adding a destination](https://docs.aws.amazon.com/lambda/latest/dg/invocation-async-retain-records.html#invocation-async-destinations).
|
|
44940
45050
|
*/
|
|
44941
45051
|
interface EventSourceMappingDestinationConfigArgs {
|
|
44942
45052
|
/**
|
|
@@ -44998,7 +45108,7 @@ export declare namespace lambda {
|
|
|
44998
45108
|
metrics?: pulumi.Input<pulumi.Input<enums.lambda.EventSourceMappingMetricsConfigMetricsItem>[]>;
|
|
44999
45109
|
}
|
|
45000
45110
|
/**
|
|
45001
|
-
* A destination for events that failed processing.
|
|
45111
|
+
* A destination for events that failed processing. For more information, see [Adding a destination](https://docs.aws.amazon.com/lambda/latest/dg/invocation-async-retain-records.html#invocation-async-destinations).
|
|
45002
45112
|
*/
|
|
45003
45113
|
interface EventSourceMappingOnFailureArgs {
|
|
45004
45114
|
/**
|
|
@@ -45031,37 +45141,16 @@ export declare namespace lambda {
|
|
|
45031
45141
|
maximumConcurrency?: pulumi.Input<number>;
|
|
45032
45142
|
}
|
|
45033
45143
|
interface EventSourceMappingSchemaRegistryAccessConfigArgs {
|
|
45034
|
-
/**
|
|
45035
|
-
* The type of authentication Lambda uses to access your schema registry.
|
|
45036
|
-
*/
|
|
45037
45144
|
type?: pulumi.Input<enums.lambda.EventSourceMappingSchemaRegistryAccessConfigType>;
|
|
45038
|
-
/**
|
|
45039
|
-
* The URI of the secret (Secrets Manager secret ARN) to authenticate with your schema registry.
|
|
45040
|
-
*/
|
|
45041
45145
|
uri?: pulumi.Input<string>;
|
|
45042
45146
|
}
|
|
45043
45147
|
interface EventSourceMappingSchemaRegistryConfigArgs {
|
|
45044
|
-
/**
|
|
45045
|
-
* An array of access configuration objects that tell Lambda how to authenticate with your schema registry.
|
|
45046
|
-
*/
|
|
45047
45148
|
accessConfigs?: pulumi.Input<pulumi.Input<inputs.lambda.EventSourceMappingSchemaRegistryAccessConfigArgs>[]>;
|
|
45048
|
-
/**
|
|
45049
|
-
* The record format that Lambda delivers to your function after schema validation.
|
|
45050
|
-
*/
|
|
45051
45149
|
eventRecordFormat?: pulumi.Input<enums.lambda.EventSourceMappingSchemaRegistryConfigEventRecordFormat>;
|
|
45052
|
-
/**
|
|
45053
|
-
* The URI for your schema registry. The correct URI format depends on the type of schema registry you're using.
|
|
45054
|
-
*/
|
|
45055
45150
|
schemaRegistryUri?: pulumi.Input<string>;
|
|
45056
|
-
/**
|
|
45057
|
-
* An array of schema validation configuration objects, which tell Lambda the message attributes you want to validate and filter using your schema registry.
|
|
45058
|
-
*/
|
|
45059
45151
|
schemaValidationConfigs?: pulumi.Input<pulumi.Input<inputs.lambda.EventSourceMappingSchemaValidationConfigArgs>[]>;
|
|
45060
45152
|
}
|
|
45061
45153
|
interface EventSourceMappingSchemaValidationConfigArgs {
|
|
45062
|
-
/**
|
|
45063
|
-
* The attribute you want your schema registry to validate and filter for.
|
|
45064
|
-
*/
|
|
45065
45154
|
attribute?: pulumi.Input<enums.lambda.EventSourceMappingSchemaValidationConfigAttribute>;
|
|
45066
45155
|
}
|
|
45067
45156
|
/**
|
|
@@ -50221,6 +50310,16 @@ export declare namespace mediatailor {
|
|
|
50221
50310
|
*/
|
|
50222
50311
|
enabled?: pulumi.Input<boolean>;
|
|
50223
50312
|
}
|
|
50313
|
+
interface PlaybackConfigurationAdsInteractionLogArgs {
|
|
50314
|
+
/**
|
|
50315
|
+
* Indicates that MediaTailor won't emit the selected events in the logs for playback sessions that are initialized with this configuration.
|
|
50316
|
+
*/
|
|
50317
|
+
excludeEventTypes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
50318
|
+
/**
|
|
50319
|
+
* Indicates that MediaTailor emits RAW_ADS_RESPONSE logs for playback sessions that are initialized with this configuration.
|
|
50320
|
+
*/
|
|
50321
|
+
publishOptInEventTypes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
50322
|
+
}
|
|
50224
50323
|
/**
|
|
50225
50324
|
* The configuration for avail suppression, also known as ad suppression. For more information about ad suppression, see Ad Suppression (https://docs.aws.amazon.com/mediatailor/latest/ug/ad-behavior.html).
|
|
50226
50325
|
*/
|
|
@@ -50300,6 +50399,24 @@ export declare namespace mediatailor {
|
|
|
50300
50399
|
*/
|
|
50301
50400
|
maxDurationSeconds?: pulumi.Input<number>;
|
|
50302
50401
|
}
|
|
50402
|
+
interface PlaybackConfigurationLogConfigurationArgs {
|
|
50403
|
+
/**
|
|
50404
|
+
* The event types that MediaTailor emits in logs for interactions with the ADS.
|
|
50405
|
+
*/
|
|
50406
|
+
adsInteractionLog?: pulumi.Input<inputs.mediatailor.PlaybackConfigurationAdsInteractionLogArgs>;
|
|
50407
|
+
/**
|
|
50408
|
+
* The method used for collecting logs from AWS Elemental MediaTailor. To configure MediaTailor to send logs directly to Amazon CloudWatch Logs, choose LEGACY_CLOUDWATCH. To configure MediaTailor to send logs to CloudWatch, which then vends the logs to your destination of choice, choose VENDED_LOGS. Supported destinations are CloudWatch Logs log group, Amazon S3 bucket, and Amazon Data Firehose stream. To use vended logs, you must configure the delivery destination in Amazon CloudWatch
|
|
50409
|
+
*/
|
|
50410
|
+
enabledLoggingStrategies?: pulumi.Input<pulumi.Input<string>[]>;
|
|
50411
|
+
/**
|
|
50412
|
+
* The event types that MediaTailor emits in logs for interactions with the origin server.
|
|
50413
|
+
*/
|
|
50414
|
+
manifestServiceInteractionLog?: pulumi.Input<inputs.mediatailor.PlaybackConfigurationManifestServiceInteractionLogArgs>;
|
|
50415
|
+
/**
|
|
50416
|
+
* The percentage of session logs that MediaTailor sends to your CloudWatch Logs account. For example, if your playback configuration has 1000 sessions and percentEnabled is set to 60, MediaTailor sends logs for 600 of the sessions to CloudWatch Logs. MediaTailor decides at random which of the playback configuration sessions to send logs for. If you want to view logs for a specific session, you can use the debug log mode.
|
|
50417
|
+
*/
|
|
50418
|
+
percentEnabled: pulumi.Input<number>;
|
|
50419
|
+
}
|
|
50303
50420
|
/**
|
|
50304
50421
|
* The configuration for manifest processing rules. Manifest processing rules enable customization of the personalized manifests created by MediaTailor.
|
|
50305
50422
|
*/
|
|
@@ -50309,6 +50426,12 @@ export declare namespace mediatailor {
|
|
|
50309
50426
|
*/
|
|
50310
50427
|
adMarkerPassthrough?: pulumi.Input<inputs.mediatailor.PlaybackConfigurationAdMarkerPassthroughArgs>;
|
|
50311
50428
|
}
|
|
50429
|
+
interface PlaybackConfigurationManifestServiceInteractionLogArgs {
|
|
50430
|
+
/**
|
|
50431
|
+
* Indicates that MediaTailor won't emit the selected events in the logs for playback sessions that are initialized with this configuration.
|
|
50432
|
+
*/
|
|
50433
|
+
excludeEventTypes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
50434
|
+
}
|
|
50312
50435
|
/**
|
|
50313
50436
|
* <p>Access configuration parameters.</p>
|
|
50314
50437
|
*/
|
|
@@ -51551,7 +51674,7 @@ export declare namespace networkfirewall {
|
|
|
51551
51674
|
* - You can use CA certificates that you imported into ACM, but you can't generate CA certificates with ACM.
|
|
51552
51675
|
* - You can't use certificates issued by AWS Private Certificate Authority .
|
|
51553
51676
|
*
|
|
51554
|
-
* For more information about configuring certificates for outbound inspection, see [Using SSL/TLS certificates with
|
|
51677
|
+
* For more information about configuring certificates for outbound inspection, see [Using SSL/TLS certificates with TLS inspection configurations](https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html) in the *AWS Network Firewall Developer Guide* .
|
|
51555
51678
|
*
|
|
51556
51679
|
* For information about working with certificates in ACM, see [Importing certificates](https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html) in the *AWS Certificate Manager User Guide* .
|
|
51557
51680
|
*/
|
|
@@ -91619,6 +91742,209 @@ export declare namespace securityhub {
|
|
|
91619
91742
|
*/
|
|
91620
91743
|
value: pulumi.Input<string>;
|
|
91621
91744
|
}
|
|
91745
|
+
/**
|
|
91746
|
+
* Allows you to configure automated responses
|
|
91747
|
+
*/
|
|
91748
|
+
interface AutomationRuleV2AutomationRulesActionV2Args {
|
|
91749
|
+
externalIntegrationConfiguration?: pulumi.Input<inputs.securityhub.AutomationRuleV2ExternalIntegrationConfigurationArgs>;
|
|
91750
|
+
findingFieldsUpdate?: pulumi.Input<inputs.securityhub.AutomationRuleV2AutomationRulesFindingFieldsUpdateV2Args>;
|
|
91751
|
+
/**
|
|
91752
|
+
* The category of action to be executed by the automation rule
|
|
91753
|
+
*/
|
|
91754
|
+
type: pulumi.Input<enums.securityhub.AutomationRuleV2AutomationRulesActionV2Type>;
|
|
91755
|
+
}
|
|
91756
|
+
/**
|
|
91757
|
+
* The changes to be applied to fields in a security finding when an automation rule is triggered
|
|
91758
|
+
*/
|
|
91759
|
+
interface AutomationRuleV2AutomationRulesFindingFieldsUpdateV2Args {
|
|
91760
|
+
/**
|
|
91761
|
+
* Notes or contextual information for findings that are modified by the automation rule
|
|
91762
|
+
*/
|
|
91763
|
+
comment?: pulumi.Input<string>;
|
|
91764
|
+
/**
|
|
91765
|
+
* The severity level to be assigned to findings that match the automation rule criteria
|
|
91766
|
+
*/
|
|
91767
|
+
severityId?: pulumi.Input<number>;
|
|
91768
|
+
/**
|
|
91769
|
+
* The status to be applied to findings that match automation rule criteria
|
|
91770
|
+
*/
|
|
91771
|
+
statusId?: pulumi.Input<number>;
|
|
91772
|
+
}
|
|
91773
|
+
/**
|
|
91774
|
+
* Boolean filter for querying findings
|
|
91775
|
+
*/
|
|
91776
|
+
interface AutomationRuleV2BooleanFilterArgs {
|
|
91777
|
+
/**
|
|
91778
|
+
* The value of the boolean
|
|
91779
|
+
*/
|
|
91780
|
+
value: pulumi.Input<boolean>;
|
|
91781
|
+
}
|
|
91782
|
+
/**
|
|
91783
|
+
* Enables the creation of filtering criteria for security findings
|
|
91784
|
+
*/
|
|
91785
|
+
interface AutomationRuleV2CompositeFilterArgs {
|
|
91786
|
+
/**
|
|
91787
|
+
* Enables filtering based on boolean field values
|
|
91788
|
+
*/
|
|
91789
|
+
booleanFilters?: pulumi.Input<pulumi.Input<inputs.securityhub.AutomationRuleV2OcsfBooleanFilterArgs>[]>;
|
|
91790
|
+
/**
|
|
91791
|
+
* Enables filtering based on date and timestamp fields
|
|
91792
|
+
*/
|
|
91793
|
+
dateFilters?: pulumi.Input<pulumi.Input<inputs.securityhub.AutomationRuleV2OcsfDateFilterArgs>[]>;
|
|
91794
|
+
/**
|
|
91795
|
+
* Enables filtering based on map field value
|
|
91796
|
+
*/
|
|
91797
|
+
mapFilters?: pulumi.Input<pulumi.Input<inputs.securityhub.AutomationRuleV2OcsfMapFilterArgs>[]>;
|
|
91798
|
+
/**
|
|
91799
|
+
* Enables filtering based on numerical field values
|
|
91800
|
+
*/
|
|
91801
|
+
numberFilters?: pulumi.Input<pulumi.Input<inputs.securityhub.AutomationRuleV2OcsfNumberFilterArgs>[]>;
|
|
91802
|
+
operator?: pulumi.Input<enums.securityhub.AutomationRuleV2AllowedOperators>;
|
|
91803
|
+
/**
|
|
91804
|
+
* Enables filtering based on string field values
|
|
91805
|
+
*/
|
|
91806
|
+
stringFilters?: pulumi.Input<pulumi.Input<inputs.securityhub.AutomationRuleV2OcsfStringFilterArgs>[]>;
|
|
91807
|
+
}
|
|
91808
|
+
/**
|
|
91809
|
+
* Defines the parameters and conditions used to evaluate and filter security findings
|
|
91810
|
+
*/
|
|
91811
|
+
interface AutomationRuleV2CriteriaArgs {
|
|
91812
|
+
ocsfFindingCriteria?: pulumi.Input<inputs.securityhub.AutomationRuleV2OcsfFindingFiltersArgs>;
|
|
91813
|
+
}
|
|
91814
|
+
/**
|
|
91815
|
+
* A date filter for querying findings
|
|
91816
|
+
*/
|
|
91817
|
+
interface AutomationRuleV2DateFilterArgs {
|
|
91818
|
+
dateRange?: pulumi.Input<inputs.securityhub.AutomationRuleV2DateRangeArgs>;
|
|
91819
|
+
end?: pulumi.Input<string>;
|
|
91820
|
+
start?: pulumi.Input<string>;
|
|
91821
|
+
}
|
|
91822
|
+
/**
|
|
91823
|
+
* A date range for the date filter
|
|
91824
|
+
*/
|
|
91825
|
+
interface AutomationRuleV2DateRangeArgs {
|
|
91826
|
+
/**
|
|
91827
|
+
* A date range unit for the date filter
|
|
91828
|
+
*/
|
|
91829
|
+
unit: pulumi.Input<enums.securityhub.AutomationRuleV2DateRangeUnit>;
|
|
91830
|
+
/**
|
|
91831
|
+
* A date range value for the date filter
|
|
91832
|
+
*/
|
|
91833
|
+
value: pulumi.Input<number>;
|
|
91834
|
+
}
|
|
91835
|
+
/**
|
|
91836
|
+
* The settings for integrating automation rule actions with external systems or service
|
|
91837
|
+
*/
|
|
91838
|
+
interface AutomationRuleV2ExternalIntegrationConfigurationArgs {
|
|
91839
|
+
/**
|
|
91840
|
+
* The ARN of the connector that establishes the integration
|
|
91841
|
+
*/
|
|
91842
|
+
connectorArn?: pulumi.Input<string>;
|
|
91843
|
+
}
|
|
91844
|
+
/**
|
|
91845
|
+
* A map filter for filtering findings
|
|
91846
|
+
*/
|
|
91847
|
+
interface AutomationRuleV2MapFilterArgs {
|
|
91848
|
+
/**
|
|
91849
|
+
* The condition to apply to the key value when filtering findings with a map filter
|
|
91850
|
+
*/
|
|
91851
|
+
comparison: pulumi.Input<enums.securityhub.AutomationRuleV2MapFilterComparison>;
|
|
91852
|
+
/**
|
|
91853
|
+
* The key of the map filter
|
|
91854
|
+
*/
|
|
91855
|
+
key: pulumi.Input<string>;
|
|
91856
|
+
/**
|
|
91857
|
+
* The value for the key in the map filter
|
|
91858
|
+
*/
|
|
91859
|
+
value: pulumi.Input<string>;
|
|
91860
|
+
}
|
|
91861
|
+
/**
|
|
91862
|
+
* A number filter for querying findings
|
|
91863
|
+
*/
|
|
91864
|
+
interface AutomationRuleV2NumberFilterArgs {
|
|
91865
|
+
/**
|
|
91866
|
+
* The equal-to condition to be applied to a single field when querying for findings
|
|
91867
|
+
*/
|
|
91868
|
+
eq?: pulumi.Input<number>;
|
|
91869
|
+
/**
|
|
91870
|
+
* The greater-than-equal condition to be applied to a single field when querying for findings
|
|
91871
|
+
*/
|
|
91872
|
+
gte?: pulumi.Input<number>;
|
|
91873
|
+
/**
|
|
91874
|
+
* The less-than-equal condition to be applied to a single field when querying for findings
|
|
91875
|
+
*/
|
|
91876
|
+
lte?: pulumi.Input<number>;
|
|
91877
|
+
}
|
|
91878
|
+
/**
|
|
91879
|
+
* Enables filtering of security findings based on boolean field values in OCSF
|
|
91880
|
+
*/
|
|
91881
|
+
interface AutomationRuleV2OcsfBooleanFilterArgs {
|
|
91882
|
+
/**
|
|
91883
|
+
* The name of the field
|
|
91884
|
+
*/
|
|
91885
|
+
fieldName: pulumi.Input<enums.securityhub.AutomationRuleV2OcsfBooleanFilterFieldName>;
|
|
91886
|
+
filter: pulumi.Input<inputs.securityhub.AutomationRuleV2BooleanFilterArgs>;
|
|
91887
|
+
}
|
|
91888
|
+
/**
|
|
91889
|
+
* Enables filtering of security findings based on date and timestamp fields in OCSF
|
|
91890
|
+
*/
|
|
91891
|
+
interface AutomationRuleV2OcsfDateFilterArgs {
|
|
91892
|
+
/**
|
|
91893
|
+
* The name of the field
|
|
91894
|
+
*/
|
|
91895
|
+
fieldName: pulumi.Input<enums.securityhub.AutomationRuleV2OcsfDateFilterFieldName>;
|
|
91896
|
+
filter: pulumi.Input<inputs.securityhub.AutomationRuleV2DateFilterArgs>;
|
|
91897
|
+
}
|
|
91898
|
+
/**
|
|
91899
|
+
* The filtering conditions that align with OCSF standards
|
|
91900
|
+
*/
|
|
91901
|
+
interface AutomationRuleV2OcsfFindingFiltersArgs {
|
|
91902
|
+
/**
|
|
91903
|
+
* Enables the creation of complex filtering conditions by combining filter
|
|
91904
|
+
*/
|
|
91905
|
+
compositeFilters?: pulumi.Input<pulumi.Input<inputs.securityhub.AutomationRuleV2CompositeFilterArgs>[]>;
|
|
91906
|
+
compositeOperator?: pulumi.Input<enums.securityhub.AutomationRuleV2AllowedOperators>;
|
|
91907
|
+
}
|
|
91908
|
+
/**
|
|
91909
|
+
* Enables filtering of security findings based on map field values in OCSF
|
|
91910
|
+
*/
|
|
91911
|
+
interface AutomationRuleV2OcsfMapFilterArgs {
|
|
91912
|
+
/**
|
|
91913
|
+
* The name of the field
|
|
91914
|
+
*/
|
|
91915
|
+
fieldName: pulumi.Input<enums.securityhub.AutomationRuleV2OcsfMapFilterFieldName>;
|
|
91916
|
+
filter: pulumi.Input<inputs.securityhub.AutomationRuleV2MapFilterArgs>;
|
|
91917
|
+
}
|
|
91918
|
+
/**
|
|
91919
|
+
* Enables filtering of security findings based on numerical field values in OCSF
|
|
91920
|
+
*/
|
|
91921
|
+
interface AutomationRuleV2OcsfNumberFilterArgs {
|
|
91922
|
+
/**
|
|
91923
|
+
* The name of the field
|
|
91924
|
+
*/
|
|
91925
|
+
fieldName: pulumi.Input<enums.securityhub.AutomationRuleV2OcsfNumberFilterFieldName>;
|
|
91926
|
+
filter: pulumi.Input<inputs.securityhub.AutomationRuleV2NumberFilterArgs>;
|
|
91927
|
+
}
|
|
91928
|
+
/**
|
|
91929
|
+
* Enables filtering of security findings based on string field values in OCSF
|
|
91930
|
+
*/
|
|
91931
|
+
interface AutomationRuleV2OcsfStringFilterArgs {
|
|
91932
|
+
fieldName: pulumi.Input<enums.securityhub.AutomationRuleV2OcsfStringField>;
|
|
91933
|
+
filter: pulumi.Input<inputs.securityhub.AutomationRuleV2StringFilterArgs>;
|
|
91934
|
+
}
|
|
91935
|
+
/**
|
|
91936
|
+
* A string filter for filtering findings
|
|
91937
|
+
*/
|
|
91938
|
+
interface AutomationRuleV2StringFilterArgs {
|
|
91939
|
+
/**
|
|
91940
|
+
* The condition to apply to a string value when filtering findings
|
|
91941
|
+
*/
|
|
91942
|
+
comparison: pulumi.Input<enums.securityhub.AutomationRuleV2StringFilterComparison>;
|
|
91943
|
+
/**
|
|
91944
|
+
* The string filter value
|
|
91945
|
+
*/
|
|
91946
|
+
value: pulumi.Input<string>;
|
|
91947
|
+
}
|
|
91622
91948
|
/**
|
|
91623
91949
|
* Used to update information about the investigation into the finding.
|
|
91624
91950
|
*/
|
|
@@ -92535,7 +92861,7 @@ export declare namespace securityhub {
|
|
|
92535
92861
|
* - `ResourceType NOT_EQUALS AwsIamPolicy`
|
|
92536
92862
|
* - `ResourceType NOT_EQUALS AwsEc2NetworkInterface`
|
|
92537
92863
|
*
|
|
92538
|
-
* `CONTAINS` and `NOT_CONTAINS` operators can be used only with automation rules. For more information, see [Automation rules](https://docs.aws.amazon.com/securityhub/latest/userguide/automation-rules.html) in the *AWS Security Hub User Guide* .
|
|
92864
|
+
* `CONTAINS` and `NOT_CONTAINS` operators can be used only with automation rules V1. `CONTAINS_WORD` operator is only supported in `GetFindingsV2` , `GetFindingStatisticsV2` , `GetResourcesV2` , and `GetResourceStatisticsV2` APIs. For more information, see [Automation rules](https://docs.aws.amazon.com/securityhub/latest/userguide/automation-rules.html) in the *AWS Security Hub User Guide* .
|
|
92539
92865
|
*/
|
|
92540
92866
|
comparison: pulumi.Input<enums.securityhub.InsightStringFilterComparison>;
|
|
92541
92867
|
/**
|
|
@@ -94720,6 +95046,10 @@ export declare namespace synthetics {
|
|
|
94720
95046
|
environmentVariables?: pulumi.Input<{
|
|
94721
95047
|
[key: string]: pulumi.Input<string>;
|
|
94722
95048
|
}>;
|
|
95049
|
+
/**
|
|
95050
|
+
* Provide ephemeralStorage available for canary in MB
|
|
95051
|
+
*/
|
|
95052
|
+
ephemeralStorage?: pulumi.Input<number>;
|
|
94723
95053
|
/**
|
|
94724
95054
|
* Provide maximum memory available for canary in MB
|
|
94725
95055
|
*/
|
|
@@ -96014,7 +96344,13 @@ export declare namespace wafv2 {
|
|
|
96014
96344
|
statements: pulumi.Input<pulumi.Input<inputs.wafv2.RuleGroupStatementArgs>[]>;
|
|
96015
96345
|
}
|
|
96016
96346
|
interface RuleGroupAsnMatchStatementArgs {
|
|
96347
|
+
/**
|
|
96348
|
+
* Contains one or more Autonomous System Numbers (ASNs). ASNs are unique identifiers assigned to large internet networks managed by organizations such as internet service providers, enterprises, universities, or government agencies.
|
|
96349
|
+
*/
|
|
96017
96350
|
asnList?: pulumi.Input<pulumi.Input<number>[]>;
|
|
96351
|
+
/**
|
|
96352
|
+
* The configuration for inspecting IP addresses to match against an ASN in an HTTP header that you specify, instead of using the IP address that's reported by the web request origin. Commonly, this is the X-Forwarded-For (XFF) header, but you can specify any header name.
|
|
96353
|
+
*/
|
|
96018
96354
|
forwardedIpConfig?: pulumi.Input<inputs.wafv2.RuleGroupForwardedIpConfigurationArgs>;
|
|
96019
96355
|
}
|
|
96020
96356
|
/**
|
|
@@ -96694,6 +97030,9 @@ export declare namespace wafv2 {
|
|
|
96694
97030
|
* Specifies a single custom aggregate key for a rate-base rule.
|
|
96695
97031
|
*/
|
|
96696
97032
|
interface RuleGroupRateBasedStatementCustomKeyArgs {
|
|
97033
|
+
/**
|
|
97034
|
+
* Use an Autonomous System Number (ASN) derived from the request's originating or forwarded IP address as an aggregate key. Each distinct ASN contributes to the aggregation instance.
|
|
97035
|
+
*/
|
|
96697
97036
|
asn?: pulumi.Input<inputs.wafv2.RuleGroupRateLimitAsnArgs>;
|
|
96698
97037
|
/**
|
|
96699
97038
|
* Use the value of a cookie in the request as an aggregate key. Each distinct value in the cookie contributes to the aggregation instance. If you use a single cookie as your custom key, then each value fully defines an aggregation instance.
|
|
@@ -97023,6 +97362,11 @@ export declare namespace wafv2 {
|
|
|
97023
97362
|
* A logical rule statement used to combine other rule statements with AND logic. You provide more than one `Statement` within the `AndStatement` .
|
|
97024
97363
|
*/
|
|
97025
97364
|
andStatement?: pulumi.Input<inputs.wafv2.RuleGroupAndStatementArgs>;
|
|
97365
|
+
/**
|
|
97366
|
+
* A rule statement that inspects web traffic based on the Autonomous System Number (ASN) associated with the request's IP address.
|
|
97367
|
+
*
|
|
97368
|
+
* For additional details, see [ASN match rule statement](https://docs.aws.amazon.com/waf/latest/developerguide/waf-rule-statement-type-asn-match.html) in the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html) .
|
|
97369
|
+
*/
|
|
97026
97370
|
asnMatchStatement?: pulumi.Input<inputs.wafv2.RuleGroupAsnMatchStatementArgs>;
|
|
97027
97371
|
/**
|
|
97028
97372
|
* A rule statement that defines a string match search for AWS WAF to apply to web requests. The byte match statement provides the bytes to search for, the location in requests that you want AWS WAF to search, and other settings. The bytes to search for are typically a string that corresponds with ASCII characters. In the AWS WAF console and the developer guide, this is called a string match statement.
|
|
@@ -97222,7 +97566,13 @@ export declare namespace wafv2 {
|
|
|
97222
97566
|
statements: pulumi.Input<pulumi.Input<inputs.wafv2.WebAclStatementArgs>[]>;
|
|
97223
97567
|
}
|
|
97224
97568
|
interface WebAclAsnMatchStatementArgs {
|
|
97569
|
+
/**
|
|
97570
|
+
* Contains one or more Autonomous System Numbers (ASNs). ASNs are unique identifiers assigned to large internet networks managed by organizations such as internet service providers, enterprises, universities, or government agencies.
|
|
97571
|
+
*/
|
|
97225
97572
|
asnList?: pulumi.Input<pulumi.Input<number>[]>;
|
|
97573
|
+
/**
|
|
97574
|
+
* The configuration for inspecting IP addresses to match against an ASN in an HTTP header that you specify, instead of using the IP address that's reported by the web request origin. Commonly, this is the X-Forwarded-For (XFF) header, but you can specify any header name.
|
|
97575
|
+
*/
|
|
97226
97576
|
forwardedIpConfig?: pulumi.Input<inputs.wafv2.WebAclForwardedIpConfigurationArgs>;
|
|
97227
97577
|
}
|
|
97228
97578
|
/**
|
|
@@ -97281,7 +97631,21 @@ export declare namespace wafv2 {
|
|
|
97281
97631
|
* Configures how to use the AntiDDOS AWS managed rule group in the web ACL
|
|
97282
97632
|
*/
|
|
97283
97633
|
interface WebAclAwsManagedRulesAntiDDoSRuleSetArgs {
|
|
97634
|
+
/**
|
|
97635
|
+
* Configures the request handling that's applied by the managed rule group rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` during a distributed denial of service (DDoS) attack.
|
|
97636
|
+
*/
|
|
97284
97637
|
clientSideActionConfig: pulumi.Input<inputs.wafv2.WebAclClientSideActionConfigArgs>;
|
|
97638
|
+
/**
|
|
97639
|
+
* The sensitivity that the rule group rule `DDoSRequests` uses when matching against the DDoS suspicion labeling on a request. The managed rule group adds the labeling during DDoS events, before the `DDoSRequests` rule runs.
|
|
97640
|
+
*
|
|
97641
|
+
* The higher the sensitivity, the more levels of labeling that the rule matches:
|
|
97642
|
+
*
|
|
97643
|
+
* - Low sensitivity is less sensitive, causing the rule to match only on the most likely participants in an attack, which are the requests with the high suspicion label `awswaf:managed:aws:anti-ddos:high-suspicion-ddos-request` .
|
|
97644
|
+
* - Medium sensitivity causes the rule to match on the medium and high suspicion labels.
|
|
97645
|
+
* - High sensitivity causes the rule to match on all of the suspicion labels: low, medium, and high.
|
|
97646
|
+
*
|
|
97647
|
+
* Default: `LOW`
|
|
97648
|
+
*/
|
|
97285
97649
|
sensitivityToBlock?: pulumi.Input<enums.wafv2.WebAclSensitivityToAct>;
|
|
97286
97650
|
}
|
|
97287
97651
|
/**
|
|
@@ -97461,14 +97825,62 @@ export declare namespace wafv2 {
|
|
|
97461
97825
|
* Client side action config for AntiDDOS AMR.
|
|
97462
97826
|
*/
|
|
97463
97827
|
interface WebAclClientSideActionArgs {
|
|
97828
|
+
/**
|
|
97829
|
+
* The regular expression to match against the web request URI, used to identify requests that can't handle a silent browser challenge. When the `ClientSideAction` setting `UsageOfAction` is enabled, the managed rule group uses this setting to determine which requests to label with `awswaf:managed:aws:anti-ddos:challengeable-request` . If `UsageOfAction` is disabled, this setting has no effect and the managed rule group doesn't add the label to any requests.
|
|
97830
|
+
*
|
|
97831
|
+
* The anti-DDoS managed rule group doesn't evaluate the rules `ChallengeDDoSRequests` or `ChallengeAllDuringEvent` for web requests whose URIs match this regex. This is true regardless of whether you override the rule action for either of the rules in your web ACL configuration.
|
|
97832
|
+
*
|
|
97833
|
+
* AWS recommends using a regular expression.
|
|
97834
|
+
*
|
|
97835
|
+
* This setting is required if `UsageOfAction` is set to `ENABLED` . If required, you can provide between 1 and 5 regex objects in the array of settings.
|
|
97836
|
+
*
|
|
97837
|
+
* AWS recommends starting with the following setting. Review and update it for your application's needs:
|
|
97838
|
+
*
|
|
97839
|
+
* `\/api\/|\.(acc|avi|css|gif|jpe?g|js|mp[34]|ogg|otf|pdf|png|tiff?|ttf|webm|webp|woff2?)$`
|
|
97840
|
+
*/
|
|
97464
97841
|
exemptUriRegularExpressions?: pulumi.Input<pulumi.Input<inputs.wafv2.WebAclRegexArgs>[]>;
|
|
97842
|
+
/**
|
|
97843
|
+
* The sensitivity that the rule group rule `ChallengeDDoSRequests` uses when matching against the DDoS suspicion labeling on a request. The managed rule group adds the labeling during DDoS events, before the `ChallengeDDoSRequests` rule runs.
|
|
97844
|
+
*
|
|
97845
|
+
* The higher the sensitivity, the more levels of labeling that the rule matches:
|
|
97846
|
+
*
|
|
97847
|
+
* - Low sensitivity is less sensitive, causing the rule to match only on the most likely participants in an attack, which are the requests with the high suspicion label `awswaf:managed:aws:anti-ddos:high-suspicion-ddos-request` .
|
|
97848
|
+
* - Medium sensitivity causes the rule to match on the medium and high suspicion labels.
|
|
97849
|
+
* - High sensitivity causes the rule to match on all of the suspicion labels: low, medium, and high.
|
|
97850
|
+
*
|
|
97851
|
+
* Default: `HIGH`
|
|
97852
|
+
*/
|
|
97465
97853
|
sensitivity?: pulumi.Input<enums.wafv2.WebAclSensitivityToAct>;
|
|
97854
|
+
/**
|
|
97855
|
+
* Determines whether to use the `AWSManagedRulesAntiDDoSRuleSet` rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` in the rule group evaluation and the related label `awswaf:managed:aws:anti-ddos:challengeable-request` .
|
|
97856
|
+
*
|
|
97857
|
+
* - If usage is enabled:
|
|
97858
|
+
*
|
|
97859
|
+
* - The managed rule group adds the label `awswaf:managed:aws:anti-ddos:challengeable-request` to any web request whose URL does *NOT* match the regular expressions provided in the `ClientSideAction` setting `ExemptUriRegularExpressions` .
|
|
97860
|
+
* - The two rules are evaluated against web requests for protected resources that are experiencing a DDoS attack. The two rules only apply their action to matching requests that have the label `awswaf:managed:aws:anti-ddos:challengeable-request` .
|
|
97861
|
+
* - If usage is disabled:
|
|
97862
|
+
*
|
|
97863
|
+
* - The managed rule group doesn't add the label `awswaf:managed:aws:anti-ddos:challengeable-request` to any web requests.
|
|
97864
|
+
* - The two rules are not evaluated.
|
|
97865
|
+
* - None of the other `ClientSideAction` settings have any effect.
|
|
97866
|
+
*
|
|
97867
|
+
* > This setting only enables or disables the use of the two anti-DDOS rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` in the anti-DDoS managed rule group.
|
|
97868
|
+
* >
|
|
97869
|
+
* > This setting doesn't alter the action setting in the two rules. To override the actions used by the rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` , enable this setting, and then override the rule actions in the usual way, in your managed rule group configuration.
|
|
97870
|
+
*/
|
|
97466
97871
|
usageOfAction: pulumi.Input<enums.wafv2.WebAclUsageOfAction>;
|
|
97467
97872
|
}
|
|
97468
97873
|
/**
|
|
97469
97874
|
* Client side action config for AntiDDOS AMR.
|
|
97470
97875
|
*/
|
|
97471
97876
|
interface WebAclClientSideActionConfigArgs {
|
|
97877
|
+
/**
|
|
97878
|
+
* Configuration for the use of the `AWSManagedRulesAntiDDoSRuleSet` rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` .
|
|
97879
|
+
*
|
|
97880
|
+
* > This setting isn't related to the configuration of the `Challenge` action itself. It only configures the use of the two anti-DDoS rules named here.
|
|
97881
|
+
*
|
|
97882
|
+
* You can enable or disable the use of these rules, and you can configure how to use them when they are enabled.
|
|
97883
|
+
*/
|
|
97472
97884
|
challenge: pulumi.Input<inputs.wafv2.WebAclClientSideActionArgs>;
|
|
97473
97885
|
}
|
|
97474
97886
|
/**
|
|
@@ -98011,6 +98423,11 @@ export declare namespace wafv2 {
|
|
|
98011
98423
|
* For information about using the ACFP managed rule group, see [AWS WAF Fraud Control account creation fraud prevention (ACFP) rule group](https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-acfp.html) and [AWS WAF Fraud Control account creation fraud prevention (ACFP)](https://docs.aws.amazon.com/waf/latest/developerguide/waf-acfp.html) in the *AWS WAF Developer Guide* .
|
|
98012
98424
|
*/
|
|
98013
98425
|
awsManagedRulesAcfpRuleSet?: pulumi.Input<inputs.wafv2.WebAclAwsManagedRulesAcfpRuleSetArgs>;
|
|
98426
|
+
/**
|
|
98427
|
+
* Additional configuration for using the anti-DDoS managed rule group, `AWSManagedRulesAntiDDoSRuleSet` . Use this to configure anti-DDoS behavior for the rule group.
|
|
98428
|
+
*
|
|
98429
|
+
* For information about using the anti-DDoS managed rule group, see [AWS WAF Anti-DDoS rule group](https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-anti-ddos.html) and [Distributed Denial of Service (DDoS) prevention](https://docs.aws.amazon.com/waf/latest/developerguide/waf-anti-ddos.html) in the *AWS WAF Developer Guide* .
|
|
98430
|
+
*/
|
|
98014
98431
|
awsManagedRulesAntiDDoSRuleSet?: pulumi.Input<inputs.wafv2.WebAclAwsManagedRulesAntiDDoSRuleSetArgs>;
|
|
98015
98432
|
/**
|
|
98016
98433
|
* Additional configuration for using the account takeover prevention (ATP) managed rule group, `AWSManagedRulesATPRuleSet` . Use this to provide login request information to the rule group. For web ACLs that protect CloudFront distributions, use this to also provide the information about how your distribution responds to login requests.
|
|
@@ -98083,6 +98500,9 @@ export declare namespace wafv2 {
|
|
|
98083
98500
|
* Configures the options for on-source DDoS protection provided by supported resource type.
|
|
98084
98501
|
*/
|
|
98085
98502
|
interface WebAclOnSourceDDoSProtectionConfigArgs {
|
|
98503
|
+
/**
|
|
98504
|
+
* The level of DDoS protection that applies to web ACLs associated with Application Load Balancers. `ACTIVE_UNDER_DDOS` protection is enabled by default whenever a web ACL is associated with an Application Load Balancer. In the event that an Application Load Balancer experiences high-load conditions or suspected DDoS attacks, the `ACTIVE_UNDER_DDOS` protection automatically rate limits traffic from known low reputation sources without disrupting Application Load Balancer availability. `ALWAYS_ON` protection provides constant, always-on monitoring of known low reputation sources for suspected DDoS attacks. While this provides a higher level of protection, there may be potential impacts on legitimate traffic.
|
|
98505
|
+
*/
|
|
98086
98506
|
albLowReputationMode: pulumi.Input<enums.wafv2.WebAclOnSourceDDoSProtectionConfigAlbLowReputationMode>;
|
|
98087
98507
|
}
|
|
98088
98508
|
interface WebAclOrStatementArgs {
|
|
@@ -98166,6 +98586,9 @@ export declare namespace wafv2 {
|
|
|
98166
98586
|
* Specifies a single custom aggregate key for a rate-base rule.
|
|
98167
98587
|
*/
|
|
98168
98588
|
interface WebAclRateBasedStatementCustomKeyArgs {
|
|
98589
|
+
/**
|
|
98590
|
+
* Use an Autonomous System Number (ASN) derived from the request's originating or forwarded IP address as an aggregate key. Each distinct ASN contributes to the aggregation instance.
|
|
98591
|
+
*/
|
|
98169
98592
|
asn?: pulumi.Input<inputs.wafv2.WebAclRateLimitAsnArgs>;
|
|
98170
98593
|
/**
|
|
98171
98594
|
* Use the value of a cookie in the request as an aggregate key. Each distinct value in the cookie contributes to the aggregation instance. If you use a single cookie as your custom key, then each value fully defines an aggregation instance.
|
|
@@ -98773,6 +99196,11 @@ export declare namespace wafv2 {
|
|
|
98773
99196
|
* A logical rule statement used to combine other rule statements with AND logic. You provide more than one `Statement` within the `AndStatement` .
|
|
98774
99197
|
*/
|
|
98775
99198
|
andStatement?: pulumi.Input<inputs.wafv2.WebAclAndStatementArgs>;
|
|
99199
|
+
/**
|
|
99200
|
+
* A rule statement that inspects web traffic based on the Autonomous System Number (ASN) associated with the request's IP address.
|
|
99201
|
+
*
|
|
99202
|
+
* For additional details, see [ASN match rule statement](https://docs.aws.amazon.com/waf/latest/developerguide/waf-rule-statement-type-asn-match.html) in the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html) .
|
|
99203
|
+
*/
|
|
98776
99204
|
asnMatchStatement?: pulumi.Input<inputs.wafv2.WebAclAsnMatchStatementArgs>;
|
|
98777
99205
|
/**
|
|
98778
99206
|
* A rule statement that defines a string match search for AWS WAF to apply to web requests. The byte match statement provides the bytes to search for, the location in requests that you want AWS WAF to search, and other settings. The bytes to search for are typically a string that corresponds with ASCII characters. In the AWS WAF console and the developer guide, this is called a string match statement.
|