@pulumi/aws-native 1.31.0-alpha.1750420541 → 1.31.0-alpha.1750422093

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (117) hide show
  1. package/accessanalyzer/analyzer.d.ts +2 -2
  2. package/amplify/app.d.ts +8 -0
  3. package/amplify/app.js +2 -0
  4. package/amplify/app.js.map +1 -1
  5. package/amplify/getApp.d.ts +4 -0
  6. package/amplify/getApp.js.map +1 -1
  7. package/bedrock/getGuardrail.d.ts +1 -0
  8. package/bedrock/getGuardrail.js.map +1 -1
  9. package/bedrock/guardrail.d.ts +2 -0
  10. package/bedrock/guardrail.js +2 -0
  11. package/bedrock/guardrail.js.map +1 -1
  12. package/cleanrooms/collaboration.d.ts +4 -4
  13. package/cleanrooms/collaboration.js +0 -6
  14. package/cleanrooms/collaboration.js.map +1 -1
  15. package/connect/evaluationForm.d.ts +2 -0
  16. package/connect/evaluationForm.js +2 -0
  17. package/connect/evaluationForm.js.map +1 -1
  18. package/connect/getEvaluationForm.d.ts +1 -0
  19. package/connect/getEvaluationForm.js.map +1 -1
  20. package/customerprofiles/calculatedAttributeDefinition.d.ts +13 -0
  21. package/customerprofiles/calculatedAttributeDefinition.js +7 -1
  22. package/customerprofiles/calculatedAttributeDefinition.js.map +1 -1
  23. package/customerprofiles/getCalculatedAttributeDefinition.d.ts +5 -0
  24. package/customerprofiles/getCalculatedAttributeDefinition.js.map +1 -1
  25. package/customerprofiles/getObjectType.d.ts +8 -0
  26. package/customerprofiles/getObjectType.js.map +1 -1
  27. package/customerprofiles/objectType.d.ts +12 -0
  28. package/customerprofiles/objectType.js +4 -0
  29. package/customerprofiles/objectType.js.map +1 -1
  30. package/ec2/getTrafficMirrorFilter.d.ts +37 -0
  31. package/ec2/getTrafficMirrorFilter.js +28 -0
  32. package/ec2/getTrafficMirrorFilter.js.map +1 -0
  33. package/ec2/index.d.ts +6 -0
  34. package/ec2/index.js +11 -4
  35. package/ec2/index.js.map +1 -1
  36. package/ec2/trafficMirrorFilter.d.ts +64 -0
  37. package/ec2/trafficMirrorFilter.js +64 -0
  38. package/ec2/trafficMirrorFilter.js.map +1 -0
  39. package/inspectorv2/filter.d.ts +6 -0
  40. package/inspectorv2/filter.js +2 -0
  41. package/inspectorv2/filter.js.map +1 -1
  42. package/inspectorv2/getFilter.d.ts +3 -0
  43. package/inspectorv2/getFilter.js.map +1 -1
  44. package/mediatailor/getPlaybackConfiguration.d.ts +4 -0
  45. package/mediatailor/getPlaybackConfiguration.js.map +1 -1
  46. package/mediatailor/playbackConfiguration.d.ts +8 -0
  47. package/mediatailor/playbackConfiguration.js +2 -0
  48. package/mediatailor/playbackConfiguration.js.map +1 -1
  49. package/opsworkscm/server.d.ts +2 -2
  50. package/organizations/policy.d.ts +2 -2
  51. package/package.json +3 -3
  52. package/package.json.dev +2 -2
  53. package/rds/dbCluster.d.ts +4 -4
  54. package/rds/dbInstance.d.ts +2 -2
  55. package/rds/getDbCluster.d.ts +2 -2
  56. package/rds/getDbInstance.d.ts +1 -1
  57. package/redshiftserverless/getSnapshot.d.ts +36 -0
  58. package/redshiftserverless/getSnapshot.js +28 -0
  59. package/redshiftserverless/getSnapshot.js.map +1 -0
  60. package/redshiftserverless/index.d.ts +6 -0
  61. package/redshiftserverless/index.js +8 -1
  62. package/redshiftserverless/index.js.map +1 -1
  63. package/redshiftserverless/snapshot.d.ts +75 -0
  64. package/redshiftserverless/snapshot.js +68 -0
  65. package/redshiftserverless/snapshot.js.map +1 -0
  66. package/securityhub/aggregatorV2.d.ts +64 -0
  67. package/securityhub/aggregatorV2.js +70 -0
  68. package/securityhub/aggregatorV2.js.map +1 -0
  69. package/securityhub/automationRuleV2.d.ts +94 -0
  70. package/securityhub/automationRuleV2.js +91 -0
  71. package/securityhub/automationRuleV2.js.map +1 -0
  72. package/securityhub/getAggregatorV2.d.ts +43 -0
  73. package/securityhub/getAggregatorV2.js +28 -0
  74. package/securityhub/getAggregatorV2.js.map +1 -0
  75. package/securityhub/getAutomationRuleV2.d.ts +59 -0
  76. package/securityhub/getAutomationRuleV2.js +28 -0
  77. package/securityhub/getAutomationRuleV2.js.map +1 -0
  78. package/securityhub/getHubV2.d.ts +31 -0
  79. package/securityhub/getHubV2.js +28 -0
  80. package/securityhub/getHubV2.js.map +1 -0
  81. package/securityhub/hubV2.d.ts +44 -0
  82. package/securityhub/hubV2.js +60 -0
  83. package/securityhub/hubV2.js.map +1 -0
  84. package/securityhub/index.d.ts +18 -0
  85. package/securityhub/index.js +22 -1
  86. package/securityhub/index.js.map +1 -1
  87. package/types/enums/amplify/index.d.ts +21 -0
  88. package/types/enums/amplify/index.js +6 -1
  89. package/types/enums/amplify/index.js.map +1 -1
  90. package/types/enums/connect/index.d.ts +3 -0
  91. package/types/enums/connect/index.js +3 -0
  92. package/types/enums/connect/index.js.map +1 -1
  93. package/types/enums/connectcampaignsv2/index.d.ts +8 -0
  94. package/types/enums/connectcampaignsv2/index.js +5 -1
  95. package/types/enums/connectcampaignsv2/index.js.map +1 -1
  96. package/types/enums/customerprofiles/index.d.ts +26 -0
  97. package/types/enums/customerprofiles/index.js +15 -1
  98. package/types/enums/customerprofiles/index.js.map +1 -1
  99. package/types/enums/ec2/index.d.ts +7 -0
  100. package/types/enums/ec2/index.js +4 -1
  101. package/types/enums/ec2/index.js.map +1 -1
  102. package/types/enums/lambda/index.d.ts +0 -9
  103. package/types/enums/lambda/index.js.map +1 -1
  104. package/types/enums/organizations/index.d.ts +2 -1
  105. package/types/enums/organizations/index.js +1 -0
  106. package/types/enums/organizations/index.js.map +1 -1
  107. package/types/enums/redshiftserverless/index.d.ts +9 -0
  108. package/types/enums/redshiftserverless/index.js +9 -1
  109. package/types/enums/redshiftserverless/index.js.map +1 -1
  110. package/types/enums/securityhub/index.d.ts +136 -0
  111. package/types/enums/securityhub/index.js +89 -1
  112. package/types/enums/securityhub/index.js.map +1 -1
  113. package/types/enums/wafv2/index.d.ts +3 -0
  114. package/types/enums/wafv2/index.js.map +1 -1
  115. package/types/input.d.ts +469 -41
  116. package/types/output.d.ts +494 -41
  117. package/types/output.js.map +1 -1
package/types/output.d.ts CHANGED
@@ -61,6 +61,7 @@ export declare namespace accessanalyzer {
61
61
  * The configuration for the analyzer
62
62
  */
63
63
  interface AnalyzerConfigurationProperties {
64
+ internalAccessConfiguration?: outputs.accessanalyzer.AnalyzerInternalAccessConfiguration;
64
65
  /**
65
66
  * Specifies the configuration of an unused access analyzer for an AWS organization or account.
66
67
  */
@@ -88,6 +89,41 @@ export declare namespace accessanalyzer {
88
89
  */
89
90
  property: string;
90
91
  }
92
+ /**
93
+ * The criteria for an analysis rule for an internal access analyzer.
94
+ */
95
+ interface AnalyzerInternalAccessAnalysisRuleCriteria {
96
+ /**
97
+ * A list of AWS account IDs to apply to the internal access analysis rule criteria. Account IDs can only be applied to the analysis rule criteria for organization-level analyzers and cannot include the organization owner account.
98
+ */
99
+ accountIds?: string[];
100
+ /**
101
+ * A list of resource ARNs to apply to the internal access analysis rule criteria. The analyzer will only generate findings for resources that match these ARNs.
102
+ */
103
+ resourceArns?: string[];
104
+ /**
105
+ * A list of resource types to apply to the internal access analysis rule criteria. The analyzer will only generate findings for resources of these types.
106
+ */
107
+ resourceTypes?: string[];
108
+ }
109
+ /**
110
+ * Specifies the configuration of an internal access analyzer for an AWS organization or account. This configuration determines how the analyzer evaluates internal access within your AWS environment.
111
+ */
112
+ interface AnalyzerInternalAccessConfiguration {
113
+ /**
114
+ * Contains information about analysis rules for the internal access analyzer. Analysis rules determine which entities will generate findings based on the criteria you define when you create the rule.
115
+ */
116
+ internalAccessAnalysisRule?: outputs.accessanalyzer.AnalyzerInternalAccessConfigurationInternalAccessAnalysisRuleProperties;
117
+ }
118
+ /**
119
+ * Contains information about analysis rules for the internal access analyzer. Analysis rules determine which entities will generate findings based on the criteria you define when you create the rule.
120
+ */
121
+ interface AnalyzerInternalAccessConfigurationInternalAccessAnalysisRuleProperties {
122
+ /**
123
+ * A list of rules for the internal access analyzer containing criteria to include in analysis. Only resources that meet the rule criteria will generate findings.
124
+ */
125
+ inclusions?: outputs.accessanalyzer.AnalyzerInternalAccessAnalysisRuleCriteria[];
126
+ }
91
127
  /**
92
128
  * A key-value pair to associate with a resource.
93
129
  */
@@ -763,6 +799,24 @@ export declare namespace amplify {
763
799
  */
764
800
  value: string;
765
801
  }
802
+ interface AppJobConfig {
803
+ /**
804
+ * Specifies the size of the build instance. Amplify supports three instance sizes: `STANDARD_8GB` , `LARGE_16GB` , and `XLARGE_72GB` . If you don't specify a value, Amplify uses the `STANDARD_8GB` default.
805
+ *
806
+ * The following list describes the CPU, memory, and storage capacity for each build instance type:
807
+ *
808
+ * - **STANDARD_8GB** - - vCPUs: 4
809
+ * - Memory: 8 GiB
810
+ * - Disk space: 128 GB
811
+ * - **LARGE_16GB** - - vCPUs: 8
812
+ * - Memory: 16 GiB
813
+ * - Disk space: 128 GB
814
+ * - **XLARGE_72GB** - - vCPUs: 36
815
+ * - Memory: 72 GiB
816
+ * - Disk space: 256 GB
817
+ */
818
+ buildComputeType: enums.amplify.AppJobConfigBuildComputeType;
819
+ }
766
820
  interface BranchBackend {
767
821
  /**
768
822
  * The Amazon Resource Name (ARN) for the AWS CloudFormation stack.
@@ -12176,6 +12230,15 @@ export declare namespace bedrock {
12176
12230
  */
12177
12231
  filtersConfig: outputs.bedrock.GuardrailContextualGroundingFilterConfig[];
12178
12232
  }
12233
+ /**
12234
+ * The system-defined guardrail profile that you’re using with your guardrail
12235
+ */
12236
+ interface GuardrailCrossRegionConfig {
12237
+ /**
12238
+ * The Amazon Resource Name (ARN) of the guardrail profile
12239
+ */
12240
+ guardrailProfileArn: string;
12241
+ }
12179
12242
  /**
12180
12243
  * A managed words config.
12181
12244
  */
@@ -13951,7 +14014,7 @@ export declare namespace cleanrooms {
13951
14014
  *
13952
14015
  * *Allowed Values* : `CAN_QUERY` | `CAN_RECEIVE_RESULTS`
13953
14016
  */
13954
- memberAbilities: enums.cleanrooms.CollaborationMemberAbility[];
14017
+ memberAbilities?: enums.cleanrooms.CollaborationMemberAbility[];
13955
14018
  /**
13956
14019
  * The ML abilities granted to the collaboration member.
13957
14020
  */
@@ -18838,6 +18901,12 @@ export declare namespace connect {
18838
18901
  */
18839
18902
  requiredFields?: outputs.connect.TaskTemplateRequiredFieldInfo[];
18840
18903
  }
18904
+ interface EvaluationFormAutoEvaluationConfiguration {
18905
+ /**
18906
+ * Auto Evaluation enablement status.
18907
+ */
18908
+ enabled?: boolean;
18909
+ }
18841
18910
  /**
18842
18911
  * An item at the root level. All items must be sections.
18843
18912
  */
@@ -18864,10 +18933,11 @@ export declare namespace connect {
18864
18933
  * Information about the automation configuration in numeric questions.
18865
18934
  */
18866
18935
  interface EvaluationFormNumericQuestionAutomation {
18936
+ answerSource?: any;
18867
18937
  /**
18868
18938
  * The property value of the automation.
18869
18939
  */
18870
- propertyValue: outputs.connect.EvaluationFormNumericQuestionPropertyValueAutomation;
18940
+ propertyValue?: outputs.connect.EvaluationFormNumericQuestionPropertyValueAutomation;
18871
18941
  }
18872
18942
  /**
18873
18943
  * Information about the option range used for scoring in numeric questions.
@@ -19979,6 +20049,7 @@ export declare namespace connectcampaignsv2 {
19979
20049
  * The CommunicationLimits that apply to all channel subtypes defined in an outbound campaign.
19980
20050
  */
19981
20051
  allChannelsSubtypes?: outputs.connectcampaignsv2.CampaignCommunicationLimits;
20052
+ instanceLimitsHandling?: enums.connectcampaignsv2.CampaignInstanceLimitsHandling;
19982
20053
  }
19983
20054
  /**
19984
20055
  * Campaign communication time config
@@ -20322,6 +20393,14 @@ export declare namespace customerprofiles {
20322
20393
  * The relative time period over which data is included in the aggregation.
20323
20394
  */
20324
20395
  interface CalculatedAttributeDefinitionRange {
20396
+ /**
20397
+ * The format the timestamp field in your JSON object is specified. This value should be one of EPOCHMILLI or ISO_8601. E.g. if your object type is MyType and source JSON is {"generatedAt": {"timestamp": "2001-07-04T12:08:56.235Z"}}, then TimestampFormat should be "ISO_8601".
20398
+ */
20399
+ timestampFormat?: string;
20400
+ /**
20401
+ * An expression specifying the field in your JSON object from which the date should be parsed. The expression should follow the structure of \"{ObjectTypeName.<Location of timestamp field in JSON pointer format>}\". E.g. if your object type is MyType and source JSON is {"generatedAt": {"timestamp": "1737587945945"}}, then TimestampSource should be "{MyType.generatedAt.timestamp}".
20402
+ */
20403
+ timestampSource?: string;
20325
20404
  /**
20326
20405
  * The unit of time.
20327
20406
  */
@@ -20329,7 +20408,21 @@ export declare namespace customerprofiles {
20329
20408
  /**
20330
20409
  * The amount of time of the specified unit.
20331
20410
  */
20332
- value: number;
20411
+ value?: number;
20412
+ valueRange?: outputs.customerprofiles.CalculatedAttributeDefinitionValueRange;
20413
+ }
20414
+ /**
20415
+ * The readiness status of the calculated attribute.
20416
+ */
20417
+ interface CalculatedAttributeDefinitionReadiness {
20418
+ /**
20419
+ * Any information pertaining to the status of the calculated attribute if required.
20420
+ */
20421
+ message?: string;
20422
+ /**
20423
+ * The progress percentage for including historical data in your calculated attribute.
20424
+ */
20425
+ progressPercentage?: number;
20333
20426
  }
20334
20427
  /**
20335
20428
  * The threshold for the calculated attribute.
@@ -20344,6 +20437,19 @@ export declare namespace customerprofiles {
20344
20437
  */
20345
20438
  value: string;
20346
20439
  }
20440
+ /**
20441
+ * A structure specifying the endpoints of the relative time period over which data is included in the aggregation.
20442
+ */
20443
+ interface CalculatedAttributeDefinitionValueRange {
20444
+ /**
20445
+ * The ending point for this range. Positive numbers indicate how many days in the past data should be included, and negative numbers indicate how many days in the future.
20446
+ */
20447
+ end: number;
20448
+ /**
20449
+ * The starting point for this range. Positive numbers indicate how many days in the past data should be included, and negative numbers indicate how many days in the future.
20450
+ */
20451
+ start: number;
20452
+ }
20347
20453
  /**
20348
20454
  * Details regarding the Kinesis stream.
20349
20455
  */
@@ -20990,6 +21096,7 @@ export declare namespace customerprofiles {
20990
21096
  partyTypeString?: outputs.customerprofiles.SegmentDefinitionProfileDimension;
20991
21097
  personalEmailAddress?: outputs.customerprofiles.SegmentDefinitionProfileDimension;
20992
21098
  phoneNumber?: outputs.customerprofiles.SegmentDefinitionProfileDimension;
21099
+ profileType?: outputs.customerprofiles.SegmentDefinitionProfileTypeDimension;
20993
21100
  shippingAddress?: outputs.customerprofiles.SegmentDefinitionAddressDimension;
20994
21101
  }
20995
21102
  /**
@@ -20999,16 +21106,23 @@ export declare namespace customerprofiles {
20999
21106
  dimensionType: enums.customerprofiles.SegmentDefinitionStringDimensionType;
21000
21107
  values: string[];
21001
21108
  }
21109
+ /**
21110
+ * Specifies profile type based criteria for a segment.
21111
+ */
21112
+ interface SegmentDefinitionProfileTypeDimension {
21113
+ dimensionType: enums.customerprofiles.SegmentDefinitionProfileTypeDimensionType;
21114
+ values: enums.customerprofiles.SegmentDefinitionProfileType[];
21115
+ }
21002
21116
  /**
21003
21117
  * Defines the range to be applied to the calculated attribute definition.
21004
21118
  */
21005
21119
  interface SegmentDefinitionRangeOverride {
21006
21120
  /**
21007
- * The ending point for this overridden range.
21121
+ * The ending point for this overridden range. Positive numbers indicate how many days in the past data should be included, and negative numbers indicate how many days in the future.
21008
21122
  */
21009
21123
  end?: number;
21010
21124
  /**
21011
- * The starting point for this overridden range.
21125
+ * The starting point for this overridden range. Positive numbers indicate how many days in the past data should be included, and negative numbers indicate how many days in the future.
21012
21126
  */
21013
21127
  start: number;
21014
21128
  /**
@@ -25846,18 +25960,14 @@ export declare namespace ec2 {
25846
25960
  */
25847
25961
  throughput?: number;
25848
25962
  /**
25849
- * Specifies the Amazon EBS Provisioned Rate for Volume Initialization (volume initialization rate), in MiB/s, at which to download the snapshot blocks from Amazon S3 to the volume. This is also known as *volume initialization* . Specifying a volume initialization rate ensures that the volume is initialized at a predictable and consistent rate after creation.
25850
- *
25851
- * This parameter is supported only for volumes created from snapshots. Omit this parameter if:
25852
- *
25853
- * - You want to create the volume using fast snapshot restore. You must specify a snapshot that is enabled for fast snapshot restore. In this case, the volume is fully initialized at creation.
25854
- *
25855
- * > If you specify a snapshot that is enabled for fast snapshot restore and a volume initialization rate, the volume will be initialized at the specified rate instead of fast snapshot restore.
25856
- * - You want to create a volume that is initialized at the default rate.
25963
+ * Specifies the Amazon EBS Provisioned Rate for Volume Initialization (volume initialization rate), in MiB/s, at which to download the snapshot blocks from Amazon S3 to the volume. This is also known as *volume initialization*. Specifying a volume initialization rate ensures that the volume is initialized at a predictable and consistent rate after creation.
25964
+ * This parameter is supported only for volumes created from snapshots. Omit this parameter if:
25965
+ * + You want to create the volume using fast snapshot restore. You must specify a snapshot that is enabled for fast snapshot restore. In this case, the volume is fully initialized at creation.
25966
+ * If you specify a snapshot that is enabled for fast snapshot restore and a volume initialization rate, the volume will be initialized at the specified rate instead of fast snapshot restore.
25967
+ * + You want to create a volume that is initialized at the default rate.
25857
25968
  *
25858
- * For more information, see [Initialize Amazon EBS volumes](https://docs.aws.amazon.com/ebs/latest/userguide/initalize-volume.html) in the *Amazon EC2 User Guide* .
25859
- *
25860
- * Valid range: 100 - 300 MiB/s
25969
+ * For more information, see [Initialize Amazon EBS volumes](https://docs.aws.amazon.com/ebs/latest/userguide/initalize-volume.html) in the *Amazon EC2 User Guide*.
25970
+ * Valid range: 100 - 300 MiB/s
25861
25971
  */
25862
25972
  volumeInitializationRate?: number;
25863
25973
  /**
@@ -38377,6 +38487,9 @@ export declare namespace inspectorv2 {
38377
38487
  * Details of the AWS account IDs used to filter findings.
38378
38488
  */
38379
38489
  awsAccountId?: outputs.inspectorv2.FilterStringFilter[];
38490
+ codeVulnerabilityDetectorName?: outputs.inspectorv2.FilterStringFilter[];
38491
+ codeVulnerabilityDetectorTags?: outputs.inspectorv2.FilterStringFilter[];
38492
+ codeVulnerabilityFilePath?: outputs.inspectorv2.FilterStringFilter[];
38380
38493
  /**
38381
38494
  * Details of the component IDs used to filter findings.
38382
38495
  */
@@ -38421,6 +38534,8 @@ export declare namespace inspectorv2 {
38421
38534
  * The tags attached to the Amazon ECR container image.
38422
38535
  */
38423
38536
  ecrImageTags?: outputs.inspectorv2.FilterStringFilter[];
38537
+ epssScore?: outputs.inspectorv2.FilterNumberFilter[];
38538
+ exploitAvailable?: outputs.inspectorv2.FilterStringFilter[];
38424
38539
  /**
38425
38540
  * Details on the finding ARNs used to filter findings.
38426
38541
  */
@@ -38437,10 +38552,16 @@ export declare namespace inspectorv2 {
38437
38552
  * Details on the date and time a finding was first seen used to filter findings.
38438
38553
  */
38439
38554
  firstObservedAt?: outputs.inspectorv2.FilterDateFilter[];
38555
+ fixAvailable?: outputs.inspectorv2.FilterStringFilter[];
38440
38556
  /**
38441
38557
  * The Amazon Inspector score to filter on.
38442
38558
  */
38443
38559
  inspectorScore?: outputs.inspectorv2.FilterNumberFilter[];
38560
+ lambdaFunctionExecutionRoleArn?: outputs.inspectorv2.FilterStringFilter[];
38561
+ lambdaFunctionLastModifiedAt?: outputs.inspectorv2.FilterDateFilter[];
38562
+ lambdaFunctionLayers?: outputs.inspectorv2.FilterStringFilter[];
38563
+ lambdaFunctionName?: outputs.inspectorv2.FilterStringFilter[];
38564
+ lambdaFunctionRuntime?: outputs.inspectorv2.FilterStringFilter[];
38444
38565
  /**
38445
38566
  * Details on the date and time a finding was last seen used to filter findings.
38446
38567
  */
@@ -38514,8 +38635,10 @@ export declare namespace inspectorv2 {
38514
38635
  interface FilterPackageFilter {
38515
38636
  architecture?: outputs.inspectorv2.FilterStringFilter;
38516
38637
  epoch?: outputs.inspectorv2.FilterNumberFilter;
38638
+ filePath?: outputs.inspectorv2.FilterStringFilter;
38517
38639
  name?: outputs.inspectorv2.FilterStringFilter;
38518
38640
  release?: outputs.inspectorv2.FilterStringFilter;
38641
+ sourceLambdaLayerArn?: outputs.inspectorv2.FilterStringFilter;
38519
38642
  sourceLayerHash?: outputs.inspectorv2.FilterStringFilter;
38520
38643
  version?: outputs.inspectorv2.FilterStringFilter;
38521
38644
  }
@@ -46650,7 +46773,7 @@ export declare namespace lambda {
46650
46773
  schemaRegistryConfig?: outputs.lambda.EventSourceMappingSchemaRegistryConfig;
46651
46774
  }
46652
46775
  /**
46653
- * A configuration object that specifies the destination of an event after Lambda processes it.
46776
+ * A configuration object that specifies the destination of an event after Lambda processes it. For more information, see [Adding a destination](https://docs.aws.amazon.com/lambda/latest/dg/invocation-async-retain-records.html#invocation-async-destinations).
46654
46777
  */
46655
46778
  interface EventSourceMappingDestinationConfig {
46656
46779
  /**
@@ -46712,7 +46835,7 @@ export declare namespace lambda {
46712
46835
  metrics?: enums.lambda.EventSourceMappingMetricsConfigMetricsItem[];
46713
46836
  }
46714
46837
  /**
46715
- * A destination for events that failed processing. See [Capturing records of Lambda asynchronous invocations](https://docs.aws.amazon.com/lambda/latest/dg/invocation-async-retain-records.html) for more information.
46838
+ * A destination for events that failed processing. For more information, see [Adding a destination](https://docs.aws.amazon.com/lambda/latest/dg/invocation-async-retain-records.html#invocation-async-destinations).
46716
46839
  */
46717
46840
  interface EventSourceMappingOnFailure {
46718
46841
  /**
@@ -46745,37 +46868,16 @@ export declare namespace lambda {
46745
46868
  maximumConcurrency?: number;
46746
46869
  }
46747
46870
  interface EventSourceMappingSchemaRegistryAccessConfig {
46748
- /**
46749
- * The type of authentication Lambda uses to access your schema registry.
46750
- */
46751
46871
  type?: enums.lambda.EventSourceMappingSchemaRegistryAccessConfigType;
46752
- /**
46753
- * The URI of the secret (Secrets Manager secret ARN) to authenticate with your schema registry.
46754
- */
46755
46872
  uri?: string;
46756
46873
  }
46757
46874
  interface EventSourceMappingSchemaRegistryConfig {
46758
- /**
46759
- * An array of access configuration objects that tell Lambda how to authenticate with your schema registry.
46760
- */
46761
46875
  accessConfigs?: outputs.lambda.EventSourceMappingSchemaRegistryAccessConfig[];
46762
- /**
46763
- * The record format that Lambda delivers to your function after schema validation.
46764
- */
46765
46876
  eventRecordFormat?: enums.lambda.EventSourceMappingSchemaRegistryConfigEventRecordFormat;
46766
- /**
46767
- * The URI for your schema registry. The correct URI format depends on the type of schema registry you're using.
46768
- */
46769
46877
  schemaRegistryUri?: string;
46770
- /**
46771
- * An array of schema validation configuration objects, which tell Lambda the message attributes you want to validate and filter using your schema registry.
46772
- */
46773
46878
  schemaValidationConfigs?: outputs.lambda.EventSourceMappingSchemaValidationConfig[];
46774
46879
  }
46775
46880
  interface EventSourceMappingSchemaValidationConfig {
46776
- /**
46777
- * The attribute you want your schema registry to validate and filter for.
46778
- */
46779
46881
  attribute?: enums.lambda.EventSourceMappingSchemaValidationConfigAttribute;
46780
46882
  }
46781
46883
  /**
@@ -52034,6 +52136,16 @@ export declare namespace mediatailor {
52034
52136
  */
52035
52137
  enabled?: boolean;
52036
52138
  }
52139
+ interface PlaybackConfigurationAdsInteractionLog {
52140
+ /**
52141
+ * Indicates that MediaTailor won't emit the selected events in the logs for playback sessions that are initialized with this configuration.
52142
+ */
52143
+ excludeEventTypes?: string[];
52144
+ /**
52145
+ * Indicates that MediaTailor emits RAW_ADS_RESPONSE logs for playback sessions that are initialized with this configuration.
52146
+ */
52147
+ publishOptInEventTypes?: string[];
52148
+ }
52037
52149
  /**
52038
52150
  * The configuration for avail suppression, also known as ad suppression. For more information about ad suppression, see Ad Suppression (https://docs.aws.amazon.com/mediatailor/latest/ug/ad-behavior.html).
52039
52151
  */
@@ -52113,6 +52225,24 @@ export declare namespace mediatailor {
52113
52225
  */
52114
52226
  maxDurationSeconds?: number;
52115
52227
  }
52228
+ interface PlaybackConfigurationLogConfiguration {
52229
+ /**
52230
+ * The event types that MediaTailor emits in logs for interactions with the ADS.
52231
+ */
52232
+ adsInteractionLog?: outputs.mediatailor.PlaybackConfigurationAdsInteractionLog;
52233
+ /**
52234
+ * The method used for collecting logs from AWS Elemental MediaTailor. To configure MediaTailor to send logs directly to Amazon CloudWatch Logs, choose LEGACY_CLOUDWATCH. To configure MediaTailor to send logs to CloudWatch, which then vends the logs to your destination of choice, choose VENDED_LOGS. Supported destinations are CloudWatch Logs log group, Amazon S3 bucket, and Amazon Data Firehose stream. To use vended logs, you must configure the delivery destination in Amazon CloudWatch
52235
+ */
52236
+ enabledLoggingStrategies?: string[];
52237
+ /**
52238
+ * The event types that MediaTailor emits in logs for interactions with the origin server.
52239
+ */
52240
+ manifestServiceInteractionLog?: outputs.mediatailor.PlaybackConfigurationManifestServiceInteractionLog;
52241
+ /**
52242
+ * The percentage of session logs that MediaTailor sends to your CloudWatch Logs account. For example, if your playback configuration has 1000 sessions and percentEnabled is set to 60, MediaTailor sends logs for 600 of the sessions to CloudWatch Logs. MediaTailor decides at random which of the playback configuration sessions to send logs for. If you want to view logs for a specific session, you can use the debug log mode.
52243
+ */
52244
+ percentEnabled: number;
52245
+ }
52116
52246
  /**
52117
52247
  * The configuration for manifest processing rules. Manifest processing rules enable customization of the personalized manifests created by MediaTailor.
52118
52248
  */
@@ -52122,6 +52252,12 @@ export declare namespace mediatailor {
52122
52252
  */
52123
52253
  adMarkerPassthrough?: outputs.mediatailor.PlaybackConfigurationAdMarkerPassthrough;
52124
52254
  }
52255
+ interface PlaybackConfigurationManifestServiceInteractionLog {
52256
+ /**
52257
+ * Indicates that MediaTailor won't emit the selected events in the logs for playback sessions that are initialized with this configuration.
52258
+ */
52259
+ excludeEventTypes?: string[];
52260
+ }
52125
52261
  /**
52126
52262
  * <p>Access configuration parameters.</p>
52127
52263
  */
@@ -53364,7 +53500,7 @@ export declare namespace networkfirewall {
53364
53500
  * - You can use CA certificates that you imported into ACM, but you can't generate CA certificates with ACM.
53365
53501
  * - You can't use certificates issued by AWS Private Certificate Authority .
53366
53502
  *
53367
- * For more information about configuring certificates for outbound inspection, see [Using SSL/TLS certificates with certificates with TLS inspection configurations](https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html) in the *AWS Network Firewall Developer Guide* .
53503
+ * For more information about configuring certificates for outbound inspection, see [Using SSL/TLS certificates with TLS inspection configurations](https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html) in the *AWS Network Firewall Developer Guide* .
53368
53504
  *
53369
53505
  * For information about working with certificates in ACM, see [Importing certificates](https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html) in the *AWS Certificate Manager User Guide* .
53370
53506
  */
@@ -86139,6 +86275,18 @@ export declare namespace redshiftserverless {
86139
86275
  */
86140
86276
  snapshotRetentionPeriod?: number;
86141
86277
  }
86278
+ interface Snapshot {
86279
+ adminUsername?: string;
86280
+ kmsKeyId?: string;
86281
+ namespaceArn?: string;
86282
+ namespaceName?: string;
86283
+ ownerAccount?: string;
86284
+ retentionPeriod?: number;
86285
+ snapshotArn?: string;
86286
+ snapshotCreateTime?: string;
86287
+ snapshotName?: string;
86288
+ status?: enums.redshiftserverless.SnapshotStatus;
86289
+ }
86142
86290
  interface Workgroup {
86143
86291
  /**
86144
86292
  * The base data warehouse capacity of the workgroup in Redshift Processing Units (RPUs).
@@ -94205,6 +94353,209 @@ export declare namespace securityhub {
94205
94353
  */
94206
94354
  value: string;
94207
94355
  }
94356
+ /**
94357
+ * Allows you to configure automated responses
94358
+ */
94359
+ interface AutomationRuleV2AutomationRulesActionV2 {
94360
+ externalIntegrationConfiguration?: outputs.securityhub.AutomationRuleV2ExternalIntegrationConfiguration;
94361
+ findingFieldsUpdate?: outputs.securityhub.AutomationRuleV2AutomationRulesFindingFieldsUpdateV2;
94362
+ /**
94363
+ * The category of action to be executed by the automation rule
94364
+ */
94365
+ type: enums.securityhub.AutomationRuleV2AutomationRulesActionV2Type;
94366
+ }
94367
+ /**
94368
+ * The changes to be applied to fields in a security finding when an automation rule is triggered
94369
+ */
94370
+ interface AutomationRuleV2AutomationRulesFindingFieldsUpdateV2 {
94371
+ /**
94372
+ * Notes or contextual information for findings that are modified by the automation rule
94373
+ */
94374
+ comment?: string;
94375
+ /**
94376
+ * The severity level to be assigned to findings that match the automation rule criteria
94377
+ */
94378
+ severityId?: number;
94379
+ /**
94380
+ * The status to be applied to findings that match automation rule criteria
94381
+ */
94382
+ statusId?: number;
94383
+ }
94384
+ /**
94385
+ * Boolean filter for querying findings
94386
+ */
94387
+ interface AutomationRuleV2BooleanFilter {
94388
+ /**
94389
+ * The value of the boolean
94390
+ */
94391
+ value: boolean;
94392
+ }
94393
+ /**
94394
+ * Enables the creation of filtering criteria for security findings
94395
+ */
94396
+ interface AutomationRuleV2CompositeFilter {
94397
+ /**
94398
+ * Enables filtering based on boolean field values
94399
+ */
94400
+ booleanFilters?: outputs.securityhub.AutomationRuleV2OcsfBooleanFilter[];
94401
+ /**
94402
+ * Enables filtering based on date and timestamp fields
94403
+ */
94404
+ dateFilters?: outputs.securityhub.AutomationRuleV2OcsfDateFilter[];
94405
+ /**
94406
+ * Enables filtering based on map field value
94407
+ */
94408
+ mapFilters?: outputs.securityhub.AutomationRuleV2OcsfMapFilter[];
94409
+ /**
94410
+ * Enables filtering based on numerical field values
94411
+ */
94412
+ numberFilters?: outputs.securityhub.AutomationRuleV2OcsfNumberFilter[];
94413
+ operator?: enums.securityhub.AutomationRuleV2AllowedOperators;
94414
+ /**
94415
+ * Enables filtering based on string field values
94416
+ */
94417
+ stringFilters?: outputs.securityhub.AutomationRuleV2OcsfStringFilter[];
94418
+ }
94419
+ /**
94420
+ * Defines the parameters and conditions used to evaluate and filter security findings
94421
+ */
94422
+ interface AutomationRuleV2Criteria {
94423
+ ocsfFindingCriteria?: outputs.securityhub.AutomationRuleV2OcsfFindingFilters;
94424
+ }
94425
+ /**
94426
+ * A date filter for querying findings
94427
+ */
94428
+ interface AutomationRuleV2DateFilter {
94429
+ dateRange?: outputs.securityhub.AutomationRuleV2DateRange;
94430
+ end?: string;
94431
+ start?: string;
94432
+ }
94433
+ /**
94434
+ * A date range for the date filter
94435
+ */
94436
+ interface AutomationRuleV2DateRange {
94437
+ /**
94438
+ * A date range unit for the date filter
94439
+ */
94440
+ unit: enums.securityhub.AutomationRuleV2DateRangeUnit;
94441
+ /**
94442
+ * A date range value for the date filter
94443
+ */
94444
+ value: number;
94445
+ }
94446
+ /**
94447
+ * The settings for integrating automation rule actions with external systems or service
94448
+ */
94449
+ interface AutomationRuleV2ExternalIntegrationConfiguration {
94450
+ /**
94451
+ * The ARN of the connector that establishes the integration
94452
+ */
94453
+ connectorArn?: string;
94454
+ }
94455
+ /**
94456
+ * A map filter for filtering findings
94457
+ */
94458
+ interface AutomationRuleV2MapFilter {
94459
+ /**
94460
+ * The condition to apply to the key value when filtering findings with a map filter
94461
+ */
94462
+ comparison: enums.securityhub.AutomationRuleV2MapFilterComparison;
94463
+ /**
94464
+ * The key of the map filter
94465
+ */
94466
+ key: string;
94467
+ /**
94468
+ * The value for the key in the map filter
94469
+ */
94470
+ value: string;
94471
+ }
94472
+ /**
94473
+ * A number filter for querying findings
94474
+ */
94475
+ interface AutomationRuleV2NumberFilter {
94476
+ /**
94477
+ * The equal-to condition to be applied to a single field when querying for findings
94478
+ */
94479
+ eq?: number;
94480
+ /**
94481
+ * The greater-than-equal condition to be applied to a single field when querying for findings
94482
+ */
94483
+ gte?: number;
94484
+ /**
94485
+ * The less-than-equal condition to be applied to a single field when querying for findings
94486
+ */
94487
+ lte?: number;
94488
+ }
94489
+ /**
94490
+ * Enables filtering of security findings based on boolean field values in OCSF
94491
+ */
94492
+ interface AutomationRuleV2OcsfBooleanFilter {
94493
+ /**
94494
+ * The name of the field
94495
+ */
94496
+ fieldName: enums.securityhub.AutomationRuleV2OcsfBooleanFilterFieldName;
94497
+ filter: outputs.securityhub.AutomationRuleV2BooleanFilter;
94498
+ }
94499
+ /**
94500
+ * Enables filtering of security findings based on date and timestamp fields in OCSF
94501
+ */
94502
+ interface AutomationRuleV2OcsfDateFilter {
94503
+ /**
94504
+ * The name of the field
94505
+ */
94506
+ fieldName: enums.securityhub.AutomationRuleV2OcsfDateFilterFieldName;
94507
+ filter: outputs.securityhub.AutomationRuleV2DateFilter;
94508
+ }
94509
+ /**
94510
+ * The filtering conditions that align with OCSF standards
94511
+ */
94512
+ interface AutomationRuleV2OcsfFindingFilters {
94513
+ /**
94514
+ * Enables the creation of complex filtering conditions by combining filter
94515
+ */
94516
+ compositeFilters?: outputs.securityhub.AutomationRuleV2CompositeFilter[];
94517
+ compositeOperator?: enums.securityhub.AutomationRuleV2AllowedOperators;
94518
+ }
94519
+ /**
94520
+ * Enables filtering of security findings based on map field values in OCSF
94521
+ */
94522
+ interface AutomationRuleV2OcsfMapFilter {
94523
+ /**
94524
+ * The name of the field
94525
+ */
94526
+ fieldName: enums.securityhub.AutomationRuleV2OcsfMapFilterFieldName;
94527
+ filter: outputs.securityhub.AutomationRuleV2MapFilter;
94528
+ }
94529
+ /**
94530
+ * Enables filtering of security findings based on numerical field values in OCSF
94531
+ */
94532
+ interface AutomationRuleV2OcsfNumberFilter {
94533
+ /**
94534
+ * The name of the field
94535
+ */
94536
+ fieldName: enums.securityhub.AutomationRuleV2OcsfNumberFilterFieldName;
94537
+ filter: outputs.securityhub.AutomationRuleV2NumberFilter;
94538
+ }
94539
+ /**
94540
+ * Enables filtering of security findings based on string field values in OCSF
94541
+ */
94542
+ interface AutomationRuleV2OcsfStringFilter {
94543
+ fieldName: enums.securityhub.AutomationRuleV2OcsfStringField;
94544
+ filter: outputs.securityhub.AutomationRuleV2StringFilter;
94545
+ }
94546
+ /**
94547
+ * A string filter for filtering findings
94548
+ */
94549
+ interface AutomationRuleV2StringFilter {
94550
+ /**
94551
+ * The condition to apply to a string value when filtering findings
94552
+ */
94553
+ comparison: enums.securityhub.AutomationRuleV2StringFilterComparison;
94554
+ /**
94555
+ * The string filter value
94556
+ */
94557
+ value: string;
94558
+ }
94208
94559
  /**
94209
94560
  * Used to update information about the investigation into the finding.
94210
94561
  */
@@ -95121,7 +95472,7 @@ export declare namespace securityhub {
95121
95472
  * - `ResourceType NOT_EQUALS AwsIamPolicy`
95122
95473
  * - `ResourceType NOT_EQUALS AwsEc2NetworkInterface`
95123
95474
  *
95124
- * `CONTAINS` and `NOT_CONTAINS` operators can be used only with automation rules. For more information, see [Automation rules](https://docs.aws.amazon.com/securityhub/latest/userguide/automation-rules.html) in the *AWS Security Hub User Guide* .
95475
+ * `CONTAINS` and `NOT_CONTAINS` operators can be used only with automation rules V1. `CONTAINS_WORD` operator is only supported in `GetFindingsV2` , `GetFindingStatisticsV2` , `GetResourcesV2` , and `GetResourceStatisticsV2` APIs. For more information, see [Automation rules](https://docs.aws.amazon.com/securityhub/latest/userguide/automation-rules.html) in the *AWS Security Hub User Guide* .
95125
95476
  */
95126
95477
  comparison: enums.securityhub.InsightStringFilterComparison;
95127
95478
  /**
@@ -97330,6 +97681,10 @@ export declare namespace synthetics {
97330
97681
  environmentVariables?: {
97331
97682
  [key: string]: string;
97332
97683
  };
97684
+ /**
97685
+ * Provide ephemeralStorage available for canary in MB
97686
+ */
97687
+ ephemeralStorage?: number;
97333
97688
  /**
97334
97689
  * Provide maximum memory available for canary in MB
97335
97690
  */
@@ -98630,7 +98985,13 @@ export declare namespace wafv2 {
98630
98985
  statements: outputs.wafv2.RuleGroupStatement[];
98631
98986
  }
98632
98987
  interface RuleGroupAsnMatchStatement {
98988
+ /**
98989
+ * Contains one or more Autonomous System Numbers (ASNs). ASNs are unique identifiers assigned to large internet networks managed by organizations such as internet service providers, enterprises, universities, or government agencies.
98990
+ */
98633
98991
  asnList?: number[];
98992
+ /**
98993
+ * The configuration for inspecting IP addresses to match against an ASN in an HTTP header that you specify, instead of using the IP address that's reported by the web request origin. Commonly, this is the X-Forwarded-For (XFF) header, but you can specify any header name.
98994
+ */
98634
98995
  forwardedIpConfig?: outputs.wafv2.RuleGroupForwardedIpConfiguration;
98635
98996
  }
98636
98997
  /**
@@ -99310,6 +99671,9 @@ export declare namespace wafv2 {
99310
99671
  * Specifies a single custom aggregate key for a rate-base rule.
99311
99672
  */
99312
99673
  interface RuleGroupRateBasedStatementCustomKey {
99674
+ /**
99675
+ * Use an Autonomous System Number (ASN) derived from the request's originating or forwarded IP address as an aggregate key. Each distinct ASN contributes to the aggregation instance.
99676
+ */
99313
99677
  asn?: outputs.wafv2.RuleGroupRateLimitAsn;
99314
99678
  /**
99315
99679
  * Use the value of a cookie in the request as an aggregate key. Each distinct value in the cookie contributes to the aggregation instance. If you use a single cookie as your custom key, then each value fully defines an aggregation instance.
@@ -99639,6 +100003,11 @@ export declare namespace wafv2 {
99639
100003
  * A logical rule statement used to combine other rule statements with AND logic. You provide more than one `Statement` within the `AndStatement` .
99640
100004
  */
99641
100005
  andStatement?: outputs.wafv2.RuleGroupAndStatement;
100006
+ /**
100007
+ * A rule statement that inspects web traffic based on the Autonomous System Number (ASN) associated with the request's IP address.
100008
+ *
100009
+ * For additional details, see [ASN match rule statement](https://docs.aws.amazon.com/waf/latest/developerguide/waf-rule-statement-type-asn-match.html) in the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html) .
100010
+ */
99642
100011
  asnMatchStatement?: outputs.wafv2.RuleGroupAsnMatchStatement;
99643
100012
  /**
99644
100013
  * A rule statement that defines a string match search for AWS WAF to apply to web requests. The byte match statement provides the bytes to search for, the location in requests that you want AWS WAF to search, and other settings. The bytes to search for are typically a string that corresponds with ASCII characters. In the AWS WAF console and the developer guide, this is called a string match statement.
@@ -99838,7 +100207,13 @@ export declare namespace wafv2 {
99838
100207
  statements: outputs.wafv2.WebAclStatement[];
99839
100208
  }
99840
100209
  interface WebAclAsnMatchStatement {
100210
+ /**
100211
+ * Contains one or more Autonomous System Numbers (ASNs). ASNs are unique identifiers assigned to large internet networks managed by organizations such as internet service providers, enterprises, universities, or government agencies.
100212
+ */
99841
100213
  asnList?: number[];
100214
+ /**
100215
+ * The configuration for inspecting IP addresses to match against an ASN in an HTTP header that you specify, instead of using the IP address that's reported by the web request origin. Commonly, this is the X-Forwarded-For (XFF) header, but you can specify any header name.
100216
+ */
99842
100217
  forwardedIpConfig?: outputs.wafv2.WebAclForwardedIpConfiguration;
99843
100218
  }
99844
100219
  /**
@@ -99897,7 +100272,21 @@ export declare namespace wafv2 {
99897
100272
  * Configures how to use the AntiDDOS AWS managed rule group in the web ACL
99898
100273
  */
99899
100274
  interface WebAclAwsManagedRulesAntiDDoSRuleSet {
100275
+ /**
100276
+ * Configures the request handling that's applied by the managed rule group rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` during a distributed denial of service (DDoS) attack.
100277
+ */
99900
100278
  clientSideActionConfig: outputs.wafv2.WebAclClientSideActionConfig;
100279
+ /**
100280
+ * The sensitivity that the rule group rule `DDoSRequests` uses when matching against the DDoS suspicion labeling on a request. The managed rule group adds the labeling during DDoS events, before the `DDoSRequests` rule runs.
100281
+ *
100282
+ * The higher the sensitivity, the more levels of labeling that the rule matches:
100283
+ *
100284
+ * - Low sensitivity is less sensitive, causing the rule to match only on the most likely participants in an attack, which are the requests with the high suspicion label `awswaf:managed:aws:anti-ddos:high-suspicion-ddos-request` .
100285
+ * - Medium sensitivity causes the rule to match on the medium and high suspicion labels.
100286
+ * - High sensitivity causes the rule to match on all of the suspicion labels: low, medium, and high.
100287
+ *
100288
+ * Default: `LOW`
100289
+ */
99901
100290
  sensitivityToBlock?: enums.wafv2.WebAclSensitivityToAct;
99902
100291
  }
99903
100292
  /**
@@ -100077,14 +100466,62 @@ export declare namespace wafv2 {
100077
100466
  * Client side action config for AntiDDOS AMR.
100078
100467
  */
100079
100468
  interface WebAclClientSideAction {
100469
+ /**
100470
+ * The regular expression to match against the web request URI, used to identify requests that can't handle a silent browser challenge. When the `ClientSideAction` setting `UsageOfAction` is enabled, the managed rule group uses this setting to determine which requests to label with `awswaf:managed:aws:anti-ddos:challengeable-request` . If `UsageOfAction` is disabled, this setting has no effect and the managed rule group doesn't add the label to any requests.
100471
+ *
100472
+ * The anti-DDoS managed rule group doesn't evaluate the rules `ChallengeDDoSRequests` or `ChallengeAllDuringEvent` for web requests whose URIs match this regex. This is true regardless of whether you override the rule action for either of the rules in your web ACL configuration.
100473
+ *
100474
+ * AWS recommends using a regular expression.
100475
+ *
100476
+ * This setting is required if `UsageOfAction` is set to `ENABLED` . If required, you can provide between 1 and 5 regex objects in the array of settings.
100477
+ *
100478
+ * AWS recommends starting with the following setting. Review and update it for your application's needs:
100479
+ *
100480
+ * `\/api\/|\.(acc|avi|css|gif|jpe?g|js|mp[34]|ogg|otf|pdf|png|tiff?|ttf|webm|webp|woff2?)$`
100481
+ */
100080
100482
  exemptUriRegularExpressions?: outputs.wafv2.WebAclRegex[];
100483
+ /**
100484
+ * The sensitivity that the rule group rule `ChallengeDDoSRequests` uses when matching against the DDoS suspicion labeling on a request. The managed rule group adds the labeling during DDoS events, before the `ChallengeDDoSRequests` rule runs.
100485
+ *
100486
+ * The higher the sensitivity, the more levels of labeling that the rule matches:
100487
+ *
100488
+ * - Low sensitivity is less sensitive, causing the rule to match only on the most likely participants in an attack, which are the requests with the high suspicion label `awswaf:managed:aws:anti-ddos:high-suspicion-ddos-request` .
100489
+ * - Medium sensitivity causes the rule to match on the medium and high suspicion labels.
100490
+ * - High sensitivity causes the rule to match on all of the suspicion labels: low, medium, and high.
100491
+ *
100492
+ * Default: `HIGH`
100493
+ */
100081
100494
  sensitivity?: enums.wafv2.WebAclSensitivityToAct;
100495
+ /**
100496
+ * Determines whether to use the `AWSManagedRulesAntiDDoSRuleSet` rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` in the rule group evaluation and the related label `awswaf:managed:aws:anti-ddos:challengeable-request` .
100497
+ *
100498
+ * - If usage is enabled:
100499
+ *
100500
+ * - The managed rule group adds the label `awswaf:managed:aws:anti-ddos:challengeable-request` to any web request whose URL does *NOT* match the regular expressions provided in the `ClientSideAction` setting `ExemptUriRegularExpressions` .
100501
+ * - The two rules are evaluated against web requests for protected resources that are experiencing a DDoS attack. The two rules only apply their action to matching requests that have the label `awswaf:managed:aws:anti-ddos:challengeable-request` .
100502
+ * - If usage is disabled:
100503
+ *
100504
+ * - The managed rule group doesn't add the label `awswaf:managed:aws:anti-ddos:challengeable-request` to any web requests.
100505
+ * - The two rules are not evaluated.
100506
+ * - None of the other `ClientSideAction` settings have any effect.
100507
+ *
100508
+ * > This setting only enables or disables the use of the two anti-DDOS rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` in the anti-DDoS managed rule group.
100509
+ * >
100510
+ * > This setting doesn't alter the action setting in the two rules. To override the actions used by the rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` , enable this setting, and then override the rule actions in the usual way, in your managed rule group configuration.
100511
+ */
100082
100512
  usageOfAction: enums.wafv2.WebAclUsageOfAction;
100083
100513
  }
100084
100514
  /**
100085
100515
  * Client side action config for AntiDDOS AMR.
100086
100516
  */
100087
100517
  interface WebAclClientSideActionConfig {
100518
+ /**
100519
+ * Configuration for the use of the `AWSManagedRulesAntiDDoSRuleSet` rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` .
100520
+ *
100521
+ * > This setting isn't related to the configuration of the `Challenge` action itself. It only configures the use of the two anti-DDoS rules named here.
100522
+ *
100523
+ * You can enable or disable the use of these rules, and you can configure how to use them when they are enabled.
100524
+ */
100088
100525
  challenge: outputs.wafv2.WebAclClientSideAction;
100089
100526
  }
100090
100527
  /**
@@ -100627,6 +101064,11 @@ export declare namespace wafv2 {
100627
101064
  * For information about using the ACFP managed rule group, see [AWS WAF Fraud Control account creation fraud prevention (ACFP) rule group](https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-acfp.html) and [AWS WAF Fraud Control account creation fraud prevention (ACFP)](https://docs.aws.amazon.com/waf/latest/developerguide/waf-acfp.html) in the *AWS WAF Developer Guide* .
100628
101065
  */
100629
101066
  awsManagedRulesAcfpRuleSet?: outputs.wafv2.WebAclAwsManagedRulesAcfpRuleSet;
101067
+ /**
101068
+ * Additional configuration for using the anti-DDoS managed rule group, `AWSManagedRulesAntiDDoSRuleSet` . Use this to configure anti-DDoS behavior for the rule group.
101069
+ *
101070
+ * For information about using the anti-DDoS managed rule group, see [AWS WAF Anti-DDoS rule group](https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-anti-ddos.html) and [Distributed Denial of Service (DDoS) prevention](https://docs.aws.amazon.com/waf/latest/developerguide/waf-anti-ddos.html) in the *AWS WAF Developer Guide* .
101071
+ */
100630
101072
  awsManagedRulesAntiDDoSRuleSet?: outputs.wafv2.WebAclAwsManagedRulesAntiDDoSRuleSet;
100631
101073
  /**
100632
101074
  * Additional configuration for using the account takeover prevention (ATP) managed rule group, `AWSManagedRulesATPRuleSet` . Use this to provide login request information to the rule group. For web ACLs that protect CloudFront distributions, use this to also provide the information about how your distribution responds to login requests.
@@ -100699,6 +101141,9 @@ export declare namespace wafv2 {
100699
101141
  * Configures the options for on-source DDoS protection provided by supported resource type.
100700
101142
  */
100701
101143
  interface WebAclOnSourceDDoSProtectionConfig {
101144
+ /**
101145
+ * The level of DDoS protection that applies to web ACLs associated with Application Load Balancers. `ACTIVE_UNDER_DDOS` protection is enabled by default whenever a web ACL is associated with an Application Load Balancer. In the event that an Application Load Balancer experiences high-load conditions or suspected DDoS attacks, the `ACTIVE_UNDER_DDOS` protection automatically rate limits traffic from known low reputation sources without disrupting Application Load Balancer availability. `ALWAYS_ON` protection provides constant, always-on monitoring of known low reputation sources for suspected DDoS attacks. While this provides a higher level of protection, there may be potential impacts on legitimate traffic.
101146
+ */
100702
101147
  albLowReputationMode: enums.wafv2.WebAclOnSourceDDoSProtectionConfigAlbLowReputationMode;
100703
101148
  }
100704
101149
  interface WebAclOrStatement {
@@ -100782,6 +101227,9 @@ export declare namespace wafv2 {
100782
101227
  * Specifies a single custom aggregate key for a rate-base rule.
100783
101228
  */
100784
101229
  interface WebAclRateBasedStatementCustomKey {
101230
+ /**
101231
+ * Use an Autonomous System Number (ASN) derived from the request's originating or forwarded IP address as an aggregate key. Each distinct ASN contributes to the aggregation instance.
101232
+ */
100785
101233
  asn?: outputs.wafv2.WebAclRateLimitAsn;
100786
101234
  /**
100787
101235
  * Use the value of a cookie in the request as an aggregate key. Each distinct value in the cookie contributes to the aggregation instance. If you use a single cookie as your custom key, then each value fully defines an aggregation instance.
@@ -101389,6 +101837,11 @@ export declare namespace wafv2 {
101389
101837
  * A logical rule statement used to combine other rule statements with AND logic. You provide more than one `Statement` within the `AndStatement` .
101390
101838
  */
101391
101839
  andStatement?: outputs.wafv2.WebAclAndStatement;
101840
+ /**
101841
+ * A rule statement that inspects web traffic based on the Autonomous System Number (ASN) associated with the request's IP address.
101842
+ *
101843
+ * For additional details, see [ASN match rule statement](https://docs.aws.amazon.com/waf/latest/developerguide/waf-rule-statement-type-asn-match.html) in the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html) .
101844
+ */
101392
101845
  asnMatchStatement?: outputs.wafv2.WebAclAsnMatchStatement;
101393
101846
  /**
101394
101847
  * A rule statement that defines a string match search for AWS WAF to apply to web requests. The byte match statement provides the bytes to search for, the location in requests that you want AWS WAF to search, and other settings. The bytes to search for are typically a string that corresponds with ASCII characters. In the AWS WAF console and the developer guide, this is called a string match statement.