@pulumi/aws-native 1.31.0-alpha.1750420541 → 1.31.0-alpha.1750422093
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/accessanalyzer/analyzer.d.ts +2 -2
- package/amplify/app.d.ts +8 -0
- package/amplify/app.js +2 -0
- package/amplify/app.js.map +1 -1
- package/amplify/getApp.d.ts +4 -0
- package/amplify/getApp.js.map +1 -1
- package/bedrock/getGuardrail.d.ts +1 -0
- package/bedrock/getGuardrail.js.map +1 -1
- package/bedrock/guardrail.d.ts +2 -0
- package/bedrock/guardrail.js +2 -0
- package/bedrock/guardrail.js.map +1 -1
- package/cleanrooms/collaboration.d.ts +4 -4
- package/cleanrooms/collaboration.js +0 -6
- package/cleanrooms/collaboration.js.map +1 -1
- package/connect/evaluationForm.d.ts +2 -0
- package/connect/evaluationForm.js +2 -0
- package/connect/evaluationForm.js.map +1 -1
- package/connect/getEvaluationForm.d.ts +1 -0
- package/connect/getEvaluationForm.js.map +1 -1
- package/customerprofiles/calculatedAttributeDefinition.d.ts +13 -0
- package/customerprofiles/calculatedAttributeDefinition.js +7 -1
- package/customerprofiles/calculatedAttributeDefinition.js.map +1 -1
- package/customerprofiles/getCalculatedAttributeDefinition.d.ts +5 -0
- package/customerprofiles/getCalculatedAttributeDefinition.js.map +1 -1
- package/customerprofiles/getObjectType.d.ts +8 -0
- package/customerprofiles/getObjectType.js.map +1 -1
- package/customerprofiles/objectType.d.ts +12 -0
- package/customerprofiles/objectType.js +4 -0
- package/customerprofiles/objectType.js.map +1 -1
- package/ec2/getTrafficMirrorFilter.d.ts +37 -0
- package/ec2/getTrafficMirrorFilter.js +28 -0
- package/ec2/getTrafficMirrorFilter.js.map +1 -0
- package/ec2/index.d.ts +6 -0
- package/ec2/index.js +11 -4
- package/ec2/index.js.map +1 -1
- package/ec2/trafficMirrorFilter.d.ts +64 -0
- package/ec2/trafficMirrorFilter.js +64 -0
- package/ec2/trafficMirrorFilter.js.map +1 -0
- package/inspectorv2/filter.d.ts +6 -0
- package/inspectorv2/filter.js +2 -0
- package/inspectorv2/filter.js.map +1 -1
- package/inspectorv2/getFilter.d.ts +3 -0
- package/inspectorv2/getFilter.js.map +1 -1
- package/mediatailor/getPlaybackConfiguration.d.ts +4 -0
- package/mediatailor/getPlaybackConfiguration.js.map +1 -1
- package/mediatailor/playbackConfiguration.d.ts +8 -0
- package/mediatailor/playbackConfiguration.js +2 -0
- package/mediatailor/playbackConfiguration.js.map +1 -1
- package/opsworkscm/server.d.ts +2 -2
- package/organizations/policy.d.ts +2 -2
- package/package.json +3 -3
- package/package.json.dev +2 -2
- package/rds/dbCluster.d.ts +4 -4
- package/rds/dbInstance.d.ts +2 -2
- package/rds/getDbCluster.d.ts +2 -2
- package/rds/getDbInstance.d.ts +1 -1
- package/redshiftserverless/getSnapshot.d.ts +36 -0
- package/redshiftserverless/getSnapshot.js +28 -0
- package/redshiftserverless/getSnapshot.js.map +1 -0
- package/redshiftserverless/index.d.ts +6 -0
- package/redshiftserverless/index.js +8 -1
- package/redshiftserverless/index.js.map +1 -1
- package/redshiftserverless/snapshot.d.ts +75 -0
- package/redshiftserverless/snapshot.js +68 -0
- package/redshiftserverless/snapshot.js.map +1 -0
- package/securityhub/aggregatorV2.d.ts +64 -0
- package/securityhub/aggregatorV2.js +70 -0
- package/securityhub/aggregatorV2.js.map +1 -0
- package/securityhub/automationRuleV2.d.ts +94 -0
- package/securityhub/automationRuleV2.js +91 -0
- package/securityhub/automationRuleV2.js.map +1 -0
- package/securityhub/getAggregatorV2.d.ts +43 -0
- package/securityhub/getAggregatorV2.js +28 -0
- package/securityhub/getAggregatorV2.js.map +1 -0
- package/securityhub/getAutomationRuleV2.d.ts +59 -0
- package/securityhub/getAutomationRuleV2.js +28 -0
- package/securityhub/getAutomationRuleV2.js.map +1 -0
- package/securityhub/getHubV2.d.ts +31 -0
- package/securityhub/getHubV2.js +28 -0
- package/securityhub/getHubV2.js.map +1 -0
- package/securityhub/hubV2.d.ts +44 -0
- package/securityhub/hubV2.js +60 -0
- package/securityhub/hubV2.js.map +1 -0
- package/securityhub/index.d.ts +18 -0
- package/securityhub/index.js +22 -1
- package/securityhub/index.js.map +1 -1
- package/types/enums/amplify/index.d.ts +21 -0
- package/types/enums/amplify/index.js +6 -1
- package/types/enums/amplify/index.js.map +1 -1
- package/types/enums/connect/index.d.ts +3 -0
- package/types/enums/connect/index.js +3 -0
- package/types/enums/connect/index.js.map +1 -1
- package/types/enums/connectcampaignsv2/index.d.ts +8 -0
- package/types/enums/connectcampaignsv2/index.js +5 -1
- package/types/enums/connectcampaignsv2/index.js.map +1 -1
- package/types/enums/customerprofiles/index.d.ts +26 -0
- package/types/enums/customerprofiles/index.js +15 -1
- package/types/enums/customerprofiles/index.js.map +1 -1
- package/types/enums/ec2/index.d.ts +7 -0
- package/types/enums/ec2/index.js +4 -1
- package/types/enums/ec2/index.js.map +1 -1
- package/types/enums/lambda/index.d.ts +0 -9
- package/types/enums/lambda/index.js.map +1 -1
- package/types/enums/organizations/index.d.ts +2 -1
- package/types/enums/organizations/index.js +1 -0
- package/types/enums/organizations/index.js.map +1 -1
- package/types/enums/redshiftserverless/index.d.ts +9 -0
- package/types/enums/redshiftserverless/index.js +9 -1
- package/types/enums/redshiftserverless/index.js.map +1 -1
- package/types/enums/securityhub/index.d.ts +136 -0
- package/types/enums/securityhub/index.js +89 -1
- package/types/enums/securityhub/index.js.map +1 -1
- package/types/enums/wafv2/index.d.ts +3 -0
- package/types/enums/wafv2/index.js.map +1 -1
- package/types/input.d.ts +469 -41
- package/types/output.d.ts +494 -41
- package/types/output.js.map +1 -1
package/types/output.d.ts
CHANGED
|
@@ -61,6 +61,7 @@ export declare namespace accessanalyzer {
|
|
|
61
61
|
* The configuration for the analyzer
|
|
62
62
|
*/
|
|
63
63
|
interface AnalyzerConfigurationProperties {
|
|
64
|
+
internalAccessConfiguration?: outputs.accessanalyzer.AnalyzerInternalAccessConfiguration;
|
|
64
65
|
/**
|
|
65
66
|
* Specifies the configuration of an unused access analyzer for an AWS organization or account.
|
|
66
67
|
*/
|
|
@@ -88,6 +89,41 @@ export declare namespace accessanalyzer {
|
|
|
88
89
|
*/
|
|
89
90
|
property: string;
|
|
90
91
|
}
|
|
92
|
+
/**
|
|
93
|
+
* The criteria for an analysis rule for an internal access analyzer.
|
|
94
|
+
*/
|
|
95
|
+
interface AnalyzerInternalAccessAnalysisRuleCriteria {
|
|
96
|
+
/**
|
|
97
|
+
* A list of AWS account IDs to apply to the internal access analysis rule criteria. Account IDs can only be applied to the analysis rule criteria for organization-level analyzers and cannot include the organization owner account.
|
|
98
|
+
*/
|
|
99
|
+
accountIds?: string[];
|
|
100
|
+
/**
|
|
101
|
+
* A list of resource ARNs to apply to the internal access analysis rule criteria. The analyzer will only generate findings for resources that match these ARNs.
|
|
102
|
+
*/
|
|
103
|
+
resourceArns?: string[];
|
|
104
|
+
/**
|
|
105
|
+
* A list of resource types to apply to the internal access analysis rule criteria. The analyzer will only generate findings for resources of these types.
|
|
106
|
+
*/
|
|
107
|
+
resourceTypes?: string[];
|
|
108
|
+
}
|
|
109
|
+
/**
|
|
110
|
+
* Specifies the configuration of an internal access analyzer for an AWS organization or account. This configuration determines how the analyzer evaluates internal access within your AWS environment.
|
|
111
|
+
*/
|
|
112
|
+
interface AnalyzerInternalAccessConfiguration {
|
|
113
|
+
/**
|
|
114
|
+
* Contains information about analysis rules for the internal access analyzer. Analysis rules determine which entities will generate findings based on the criteria you define when you create the rule.
|
|
115
|
+
*/
|
|
116
|
+
internalAccessAnalysisRule?: outputs.accessanalyzer.AnalyzerInternalAccessConfigurationInternalAccessAnalysisRuleProperties;
|
|
117
|
+
}
|
|
118
|
+
/**
|
|
119
|
+
* Contains information about analysis rules for the internal access analyzer. Analysis rules determine which entities will generate findings based on the criteria you define when you create the rule.
|
|
120
|
+
*/
|
|
121
|
+
interface AnalyzerInternalAccessConfigurationInternalAccessAnalysisRuleProperties {
|
|
122
|
+
/**
|
|
123
|
+
* A list of rules for the internal access analyzer containing criteria to include in analysis. Only resources that meet the rule criteria will generate findings.
|
|
124
|
+
*/
|
|
125
|
+
inclusions?: outputs.accessanalyzer.AnalyzerInternalAccessAnalysisRuleCriteria[];
|
|
126
|
+
}
|
|
91
127
|
/**
|
|
92
128
|
* A key-value pair to associate with a resource.
|
|
93
129
|
*/
|
|
@@ -763,6 +799,24 @@ export declare namespace amplify {
|
|
|
763
799
|
*/
|
|
764
800
|
value: string;
|
|
765
801
|
}
|
|
802
|
+
interface AppJobConfig {
|
|
803
|
+
/**
|
|
804
|
+
* Specifies the size of the build instance. Amplify supports three instance sizes: `STANDARD_8GB` , `LARGE_16GB` , and `XLARGE_72GB` . If you don't specify a value, Amplify uses the `STANDARD_8GB` default.
|
|
805
|
+
*
|
|
806
|
+
* The following list describes the CPU, memory, and storage capacity for each build instance type:
|
|
807
|
+
*
|
|
808
|
+
* - **STANDARD_8GB** - - vCPUs: 4
|
|
809
|
+
* - Memory: 8 GiB
|
|
810
|
+
* - Disk space: 128 GB
|
|
811
|
+
* - **LARGE_16GB** - - vCPUs: 8
|
|
812
|
+
* - Memory: 16 GiB
|
|
813
|
+
* - Disk space: 128 GB
|
|
814
|
+
* - **XLARGE_72GB** - - vCPUs: 36
|
|
815
|
+
* - Memory: 72 GiB
|
|
816
|
+
* - Disk space: 256 GB
|
|
817
|
+
*/
|
|
818
|
+
buildComputeType: enums.amplify.AppJobConfigBuildComputeType;
|
|
819
|
+
}
|
|
766
820
|
interface BranchBackend {
|
|
767
821
|
/**
|
|
768
822
|
* The Amazon Resource Name (ARN) for the AWS CloudFormation stack.
|
|
@@ -12176,6 +12230,15 @@ export declare namespace bedrock {
|
|
|
12176
12230
|
*/
|
|
12177
12231
|
filtersConfig: outputs.bedrock.GuardrailContextualGroundingFilterConfig[];
|
|
12178
12232
|
}
|
|
12233
|
+
/**
|
|
12234
|
+
* The system-defined guardrail profile that you’re using with your guardrail
|
|
12235
|
+
*/
|
|
12236
|
+
interface GuardrailCrossRegionConfig {
|
|
12237
|
+
/**
|
|
12238
|
+
* The Amazon Resource Name (ARN) of the guardrail profile
|
|
12239
|
+
*/
|
|
12240
|
+
guardrailProfileArn: string;
|
|
12241
|
+
}
|
|
12179
12242
|
/**
|
|
12180
12243
|
* A managed words config.
|
|
12181
12244
|
*/
|
|
@@ -13951,7 +14014,7 @@ export declare namespace cleanrooms {
|
|
|
13951
14014
|
*
|
|
13952
14015
|
* *Allowed Values* : `CAN_QUERY` | `CAN_RECEIVE_RESULTS`
|
|
13953
14016
|
*/
|
|
13954
|
-
memberAbilities
|
|
14017
|
+
memberAbilities?: enums.cleanrooms.CollaborationMemberAbility[];
|
|
13955
14018
|
/**
|
|
13956
14019
|
* The ML abilities granted to the collaboration member.
|
|
13957
14020
|
*/
|
|
@@ -18838,6 +18901,12 @@ export declare namespace connect {
|
|
|
18838
18901
|
*/
|
|
18839
18902
|
requiredFields?: outputs.connect.TaskTemplateRequiredFieldInfo[];
|
|
18840
18903
|
}
|
|
18904
|
+
interface EvaluationFormAutoEvaluationConfiguration {
|
|
18905
|
+
/**
|
|
18906
|
+
* Auto Evaluation enablement status.
|
|
18907
|
+
*/
|
|
18908
|
+
enabled?: boolean;
|
|
18909
|
+
}
|
|
18841
18910
|
/**
|
|
18842
18911
|
* An item at the root level. All items must be sections.
|
|
18843
18912
|
*/
|
|
@@ -18864,10 +18933,11 @@ export declare namespace connect {
|
|
|
18864
18933
|
* Information about the automation configuration in numeric questions.
|
|
18865
18934
|
*/
|
|
18866
18935
|
interface EvaluationFormNumericQuestionAutomation {
|
|
18936
|
+
answerSource?: any;
|
|
18867
18937
|
/**
|
|
18868
18938
|
* The property value of the automation.
|
|
18869
18939
|
*/
|
|
18870
|
-
propertyValue
|
|
18940
|
+
propertyValue?: outputs.connect.EvaluationFormNumericQuestionPropertyValueAutomation;
|
|
18871
18941
|
}
|
|
18872
18942
|
/**
|
|
18873
18943
|
* Information about the option range used for scoring in numeric questions.
|
|
@@ -19979,6 +20049,7 @@ export declare namespace connectcampaignsv2 {
|
|
|
19979
20049
|
* The CommunicationLimits that apply to all channel subtypes defined in an outbound campaign.
|
|
19980
20050
|
*/
|
|
19981
20051
|
allChannelsSubtypes?: outputs.connectcampaignsv2.CampaignCommunicationLimits;
|
|
20052
|
+
instanceLimitsHandling?: enums.connectcampaignsv2.CampaignInstanceLimitsHandling;
|
|
19982
20053
|
}
|
|
19983
20054
|
/**
|
|
19984
20055
|
* Campaign communication time config
|
|
@@ -20322,6 +20393,14 @@ export declare namespace customerprofiles {
|
|
|
20322
20393
|
* The relative time period over which data is included in the aggregation.
|
|
20323
20394
|
*/
|
|
20324
20395
|
interface CalculatedAttributeDefinitionRange {
|
|
20396
|
+
/**
|
|
20397
|
+
* The format the timestamp field in your JSON object is specified. This value should be one of EPOCHMILLI or ISO_8601. E.g. if your object type is MyType and source JSON is {"generatedAt": {"timestamp": "2001-07-04T12:08:56.235Z"}}, then TimestampFormat should be "ISO_8601".
|
|
20398
|
+
*/
|
|
20399
|
+
timestampFormat?: string;
|
|
20400
|
+
/**
|
|
20401
|
+
* An expression specifying the field in your JSON object from which the date should be parsed. The expression should follow the structure of \"{ObjectTypeName.<Location of timestamp field in JSON pointer format>}\". E.g. if your object type is MyType and source JSON is {"generatedAt": {"timestamp": "1737587945945"}}, then TimestampSource should be "{MyType.generatedAt.timestamp}".
|
|
20402
|
+
*/
|
|
20403
|
+
timestampSource?: string;
|
|
20325
20404
|
/**
|
|
20326
20405
|
* The unit of time.
|
|
20327
20406
|
*/
|
|
@@ -20329,7 +20408,21 @@ export declare namespace customerprofiles {
|
|
|
20329
20408
|
/**
|
|
20330
20409
|
* The amount of time of the specified unit.
|
|
20331
20410
|
*/
|
|
20332
|
-
value
|
|
20411
|
+
value?: number;
|
|
20412
|
+
valueRange?: outputs.customerprofiles.CalculatedAttributeDefinitionValueRange;
|
|
20413
|
+
}
|
|
20414
|
+
/**
|
|
20415
|
+
* The readiness status of the calculated attribute.
|
|
20416
|
+
*/
|
|
20417
|
+
interface CalculatedAttributeDefinitionReadiness {
|
|
20418
|
+
/**
|
|
20419
|
+
* Any information pertaining to the status of the calculated attribute if required.
|
|
20420
|
+
*/
|
|
20421
|
+
message?: string;
|
|
20422
|
+
/**
|
|
20423
|
+
* The progress percentage for including historical data in your calculated attribute.
|
|
20424
|
+
*/
|
|
20425
|
+
progressPercentage?: number;
|
|
20333
20426
|
}
|
|
20334
20427
|
/**
|
|
20335
20428
|
* The threshold for the calculated attribute.
|
|
@@ -20344,6 +20437,19 @@ export declare namespace customerprofiles {
|
|
|
20344
20437
|
*/
|
|
20345
20438
|
value: string;
|
|
20346
20439
|
}
|
|
20440
|
+
/**
|
|
20441
|
+
* A structure specifying the endpoints of the relative time period over which data is included in the aggregation.
|
|
20442
|
+
*/
|
|
20443
|
+
interface CalculatedAttributeDefinitionValueRange {
|
|
20444
|
+
/**
|
|
20445
|
+
* The ending point for this range. Positive numbers indicate how many days in the past data should be included, and negative numbers indicate how many days in the future.
|
|
20446
|
+
*/
|
|
20447
|
+
end: number;
|
|
20448
|
+
/**
|
|
20449
|
+
* The starting point for this range. Positive numbers indicate how many days in the past data should be included, and negative numbers indicate how many days in the future.
|
|
20450
|
+
*/
|
|
20451
|
+
start: number;
|
|
20452
|
+
}
|
|
20347
20453
|
/**
|
|
20348
20454
|
* Details regarding the Kinesis stream.
|
|
20349
20455
|
*/
|
|
@@ -20990,6 +21096,7 @@ export declare namespace customerprofiles {
|
|
|
20990
21096
|
partyTypeString?: outputs.customerprofiles.SegmentDefinitionProfileDimension;
|
|
20991
21097
|
personalEmailAddress?: outputs.customerprofiles.SegmentDefinitionProfileDimension;
|
|
20992
21098
|
phoneNumber?: outputs.customerprofiles.SegmentDefinitionProfileDimension;
|
|
21099
|
+
profileType?: outputs.customerprofiles.SegmentDefinitionProfileTypeDimension;
|
|
20993
21100
|
shippingAddress?: outputs.customerprofiles.SegmentDefinitionAddressDimension;
|
|
20994
21101
|
}
|
|
20995
21102
|
/**
|
|
@@ -20999,16 +21106,23 @@ export declare namespace customerprofiles {
|
|
|
20999
21106
|
dimensionType: enums.customerprofiles.SegmentDefinitionStringDimensionType;
|
|
21000
21107
|
values: string[];
|
|
21001
21108
|
}
|
|
21109
|
+
/**
|
|
21110
|
+
* Specifies profile type based criteria for a segment.
|
|
21111
|
+
*/
|
|
21112
|
+
interface SegmentDefinitionProfileTypeDimension {
|
|
21113
|
+
dimensionType: enums.customerprofiles.SegmentDefinitionProfileTypeDimensionType;
|
|
21114
|
+
values: enums.customerprofiles.SegmentDefinitionProfileType[];
|
|
21115
|
+
}
|
|
21002
21116
|
/**
|
|
21003
21117
|
* Defines the range to be applied to the calculated attribute definition.
|
|
21004
21118
|
*/
|
|
21005
21119
|
interface SegmentDefinitionRangeOverride {
|
|
21006
21120
|
/**
|
|
21007
|
-
* The ending point for this overridden range.
|
|
21121
|
+
* The ending point for this overridden range. Positive numbers indicate how many days in the past data should be included, and negative numbers indicate how many days in the future.
|
|
21008
21122
|
*/
|
|
21009
21123
|
end?: number;
|
|
21010
21124
|
/**
|
|
21011
|
-
* The starting point for this overridden range.
|
|
21125
|
+
* The starting point for this overridden range. Positive numbers indicate how many days in the past data should be included, and negative numbers indicate how many days in the future.
|
|
21012
21126
|
*/
|
|
21013
21127
|
start: number;
|
|
21014
21128
|
/**
|
|
@@ -25846,18 +25960,14 @@ export declare namespace ec2 {
|
|
|
25846
25960
|
*/
|
|
25847
25961
|
throughput?: number;
|
|
25848
25962
|
/**
|
|
25849
|
-
* Specifies the Amazon EBS Provisioned Rate for Volume Initialization (volume initialization rate), in MiB/s, at which to download the snapshot blocks from Amazon S3 to the volume. This is also known as *volume initialization
|
|
25850
|
-
*
|
|
25851
|
-
*
|
|
25852
|
-
*
|
|
25853
|
-
*
|
|
25854
|
-
*
|
|
25855
|
-
* > If you specify a snapshot that is enabled for fast snapshot restore and a volume initialization rate, the volume will be initialized at the specified rate instead of fast snapshot restore.
|
|
25856
|
-
* - You want to create a volume that is initialized at the default rate.
|
|
25963
|
+
* Specifies the Amazon EBS Provisioned Rate for Volume Initialization (volume initialization rate), in MiB/s, at which to download the snapshot blocks from Amazon S3 to the volume. This is also known as *volume initialization*. Specifying a volume initialization rate ensures that the volume is initialized at a predictable and consistent rate after creation.
|
|
25964
|
+
* This parameter is supported only for volumes created from snapshots. Omit this parameter if:
|
|
25965
|
+
* + You want to create the volume using fast snapshot restore. You must specify a snapshot that is enabled for fast snapshot restore. In this case, the volume is fully initialized at creation.
|
|
25966
|
+
* If you specify a snapshot that is enabled for fast snapshot restore and a volume initialization rate, the volume will be initialized at the specified rate instead of fast snapshot restore.
|
|
25967
|
+
* + You want to create a volume that is initialized at the default rate.
|
|
25857
25968
|
*
|
|
25858
|
-
*
|
|
25859
|
-
*
|
|
25860
|
-
* Valid range: 100 - 300 MiB/s
|
|
25969
|
+
* For more information, see [Initialize Amazon EBS volumes](https://docs.aws.amazon.com/ebs/latest/userguide/initalize-volume.html) in the *Amazon EC2 User Guide*.
|
|
25970
|
+
* Valid range: 100 - 300 MiB/s
|
|
25861
25971
|
*/
|
|
25862
25972
|
volumeInitializationRate?: number;
|
|
25863
25973
|
/**
|
|
@@ -38377,6 +38487,9 @@ export declare namespace inspectorv2 {
|
|
|
38377
38487
|
* Details of the AWS account IDs used to filter findings.
|
|
38378
38488
|
*/
|
|
38379
38489
|
awsAccountId?: outputs.inspectorv2.FilterStringFilter[];
|
|
38490
|
+
codeVulnerabilityDetectorName?: outputs.inspectorv2.FilterStringFilter[];
|
|
38491
|
+
codeVulnerabilityDetectorTags?: outputs.inspectorv2.FilterStringFilter[];
|
|
38492
|
+
codeVulnerabilityFilePath?: outputs.inspectorv2.FilterStringFilter[];
|
|
38380
38493
|
/**
|
|
38381
38494
|
* Details of the component IDs used to filter findings.
|
|
38382
38495
|
*/
|
|
@@ -38421,6 +38534,8 @@ export declare namespace inspectorv2 {
|
|
|
38421
38534
|
* The tags attached to the Amazon ECR container image.
|
|
38422
38535
|
*/
|
|
38423
38536
|
ecrImageTags?: outputs.inspectorv2.FilterStringFilter[];
|
|
38537
|
+
epssScore?: outputs.inspectorv2.FilterNumberFilter[];
|
|
38538
|
+
exploitAvailable?: outputs.inspectorv2.FilterStringFilter[];
|
|
38424
38539
|
/**
|
|
38425
38540
|
* Details on the finding ARNs used to filter findings.
|
|
38426
38541
|
*/
|
|
@@ -38437,10 +38552,16 @@ export declare namespace inspectorv2 {
|
|
|
38437
38552
|
* Details on the date and time a finding was first seen used to filter findings.
|
|
38438
38553
|
*/
|
|
38439
38554
|
firstObservedAt?: outputs.inspectorv2.FilterDateFilter[];
|
|
38555
|
+
fixAvailable?: outputs.inspectorv2.FilterStringFilter[];
|
|
38440
38556
|
/**
|
|
38441
38557
|
* The Amazon Inspector score to filter on.
|
|
38442
38558
|
*/
|
|
38443
38559
|
inspectorScore?: outputs.inspectorv2.FilterNumberFilter[];
|
|
38560
|
+
lambdaFunctionExecutionRoleArn?: outputs.inspectorv2.FilterStringFilter[];
|
|
38561
|
+
lambdaFunctionLastModifiedAt?: outputs.inspectorv2.FilterDateFilter[];
|
|
38562
|
+
lambdaFunctionLayers?: outputs.inspectorv2.FilterStringFilter[];
|
|
38563
|
+
lambdaFunctionName?: outputs.inspectorv2.FilterStringFilter[];
|
|
38564
|
+
lambdaFunctionRuntime?: outputs.inspectorv2.FilterStringFilter[];
|
|
38444
38565
|
/**
|
|
38445
38566
|
* Details on the date and time a finding was last seen used to filter findings.
|
|
38446
38567
|
*/
|
|
@@ -38514,8 +38635,10 @@ export declare namespace inspectorv2 {
|
|
|
38514
38635
|
interface FilterPackageFilter {
|
|
38515
38636
|
architecture?: outputs.inspectorv2.FilterStringFilter;
|
|
38516
38637
|
epoch?: outputs.inspectorv2.FilterNumberFilter;
|
|
38638
|
+
filePath?: outputs.inspectorv2.FilterStringFilter;
|
|
38517
38639
|
name?: outputs.inspectorv2.FilterStringFilter;
|
|
38518
38640
|
release?: outputs.inspectorv2.FilterStringFilter;
|
|
38641
|
+
sourceLambdaLayerArn?: outputs.inspectorv2.FilterStringFilter;
|
|
38519
38642
|
sourceLayerHash?: outputs.inspectorv2.FilterStringFilter;
|
|
38520
38643
|
version?: outputs.inspectorv2.FilterStringFilter;
|
|
38521
38644
|
}
|
|
@@ -46650,7 +46773,7 @@ export declare namespace lambda {
|
|
|
46650
46773
|
schemaRegistryConfig?: outputs.lambda.EventSourceMappingSchemaRegistryConfig;
|
|
46651
46774
|
}
|
|
46652
46775
|
/**
|
|
46653
|
-
* A configuration object that specifies the destination of an event after Lambda processes it.
|
|
46776
|
+
* A configuration object that specifies the destination of an event after Lambda processes it. For more information, see [Adding a destination](https://docs.aws.amazon.com/lambda/latest/dg/invocation-async-retain-records.html#invocation-async-destinations).
|
|
46654
46777
|
*/
|
|
46655
46778
|
interface EventSourceMappingDestinationConfig {
|
|
46656
46779
|
/**
|
|
@@ -46712,7 +46835,7 @@ export declare namespace lambda {
|
|
|
46712
46835
|
metrics?: enums.lambda.EventSourceMappingMetricsConfigMetricsItem[];
|
|
46713
46836
|
}
|
|
46714
46837
|
/**
|
|
46715
|
-
* A destination for events that failed processing.
|
|
46838
|
+
* A destination for events that failed processing. For more information, see [Adding a destination](https://docs.aws.amazon.com/lambda/latest/dg/invocation-async-retain-records.html#invocation-async-destinations).
|
|
46716
46839
|
*/
|
|
46717
46840
|
interface EventSourceMappingOnFailure {
|
|
46718
46841
|
/**
|
|
@@ -46745,37 +46868,16 @@ export declare namespace lambda {
|
|
|
46745
46868
|
maximumConcurrency?: number;
|
|
46746
46869
|
}
|
|
46747
46870
|
interface EventSourceMappingSchemaRegistryAccessConfig {
|
|
46748
|
-
/**
|
|
46749
|
-
* The type of authentication Lambda uses to access your schema registry.
|
|
46750
|
-
*/
|
|
46751
46871
|
type?: enums.lambda.EventSourceMappingSchemaRegistryAccessConfigType;
|
|
46752
|
-
/**
|
|
46753
|
-
* The URI of the secret (Secrets Manager secret ARN) to authenticate with your schema registry.
|
|
46754
|
-
*/
|
|
46755
46872
|
uri?: string;
|
|
46756
46873
|
}
|
|
46757
46874
|
interface EventSourceMappingSchemaRegistryConfig {
|
|
46758
|
-
/**
|
|
46759
|
-
* An array of access configuration objects that tell Lambda how to authenticate with your schema registry.
|
|
46760
|
-
*/
|
|
46761
46875
|
accessConfigs?: outputs.lambda.EventSourceMappingSchemaRegistryAccessConfig[];
|
|
46762
|
-
/**
|
|
46763
|
-
* The record format that Lambda delivers to your function after schema validation.
|
|
46764
|
-
*/
|
|
46765
46876
|
eventRecordFormat?: enums.lambda.EventSourceMappingSchemaRegistryConfigEventRecordFormat;
|
|
46766
|
-
/**
|
|
46767
|
-
* The URI for your schema registry. The correct URI format depends on the type of schema registry you're using.
|
|
46768
|
-
*/
|
|
46769
46877
|
schemaRegistryUri?: string;
|
|
46770
|
-
/**
|
|
46771
|
-
* An array of schema validation configuration objects, which tell Lambda the message attributes you want to validate and filter using your schema registry.
|
|
46772
|
-
*/
|
|
46773
46878
|
schemaValidationConfigs?: outputs.lambda.EventSourceMappingSchemaValidationConfig[];
|
|
46774
46879
|
}
|
|
46775
46880
|
interface EventSourceMappingSchemaValidationConfig {
|
|
46776
|
-
/**
|
|
46777
|
-
* The attribute you want your schema registry to validate and filter for.
|
|
46778
|
-
*/
|
|
46779
46881
|
attribute?: enums.lambda.EventSourceMappingSchemaValidationConfigAttribute;
|
|
46780
46882
|
}
|
|
46781
46883
|
/**
|
|
@@ -52034,6 +52136,16 @@ export declare namespace mediatailor {
|
|
|
52034
52136
|
*/
|
|
52035
52137
|
enabled?: boolean;
|
|
52036
52138
|
}
|
|
52139
|
+
interface PlaybackConfigurationAdsInteractionLog {
|
|
52140
|
+
/**
|
|
52141
|
+
* Indicates that MediaTailor won't emit the selected events in the logs for playback sessions that are initialized with this configuration.
|
|
52142
|
+
*/
|
|
52143
|
+
excludeEventTypes?: string[];
|
|
52144
|
+
/**
|
|
52145
|
+
* Indicates that MediaTailor emits RAW_ADS_RESPONSE logs for playback sessions that are initialized with this configuration.
|
|
52146
|
+
*/
|
|
52147
|
+
publishOptInEventTypes?: string[];
|
|
52148
|
+
}
|
|
52037
52149
|
/**
|
|
52038
52150
|
* The configuration for avail suppression, also known as ad suppression. For more information about ad suppression, see Ad Suppression (https://docs.aws.amazon.com/mediatailor/latest/ug/ad-behavior.html).
|
|
52039
52151
|
*/
|
|
@@ -52113,6 +52225,24 @@ export declare namespace mediatailor {
|
|
|
52113
52225
|
*/
|
|
52114
52226
|
maxDurationSeconds?: number;
|
|
52115
52227
|
}
|
|
52228
|
+
interface PlaybackConfigurationLogConfiguration {
|
|
52229
|
+
/**
|
|
52230
|
+
* The event types that MediaTailor emits in logs for interactions with the ADS.
|
|
52231
|
+
*/
|
|
52232
|
+
adsInteractionLog?: outputs.mediatailor.PlaybackConfigurationAdsInteractionLog;
|
|
52233
|
+
/**
|
|
52234
|
+
* The method used for collecting logs from AWS Elemental MediaTailor. To configure MediaTailor to send logs directly to Amazon CloudWatch Logs, choose LEGACY_CLOUDWATCH. To configure MediaTailor to send logs to CloudWatch, which then vends the logs to your destination of choice, choose VENDED_LOGS. Supported destinations are CloudWatch Logs log group, Amazon S3 bucket, and Amazon Data Firehose stream. To use vended logs, you must configure the delivery destination in Amazon CloudWatch
|
|
52235
|
+
*/
|
|
52236
|
+
enabledLoggingStrategies?: string[];
|
|
52237
|
+
/**
|
|
52238
|
+
* The event types that MediaTailor emits in logs for interactions with the origin server.
|
|
52239
|
+
*/
|
|
52240
|
+
manifestServiceInteractionLog?: outputs.mediatailor.PlaybackConfigurationManifestServiceInteractionLog;
|
|
52241
|
+
/**
|
|
52242
|
+
* The percentage of session logs that MediaTailor sends to your CloudWatch Logs account. For example, if your playback configuration has 1000 sessions and percentEnabled is set to 60, MediaTailor sends logs for 600 of the sessions to CloudWatch Logs. MediaTailor decides at random which of the playback configuration sessions to send logs for. If you want to view logs for a specific session, you can use the debug log mode.
|
|
52243
|
+
*/
|
|
52244
|
+
percentEnabled: number;
|
|
52245
|
+
}
|
|
52116
52246
|
/**
|
|
52117
52247
|
* The configuration for manifest processing rules. Manifest processing rules enable customization of the personalized manifests created by MediaTailor.
|
|
52118
52248
|
*/
|
|
@@ -52122,6 +52252,12 @@ export declare namespace mediatailor {
|
|
|
52122
52252
|
*/
|
|
52123
52253
|
adMarkerPassthrough?: outputs.mediatailor.PlaybackConfigurationAdMarkerPassthrough;
|
|
52124
52254
|
}
|
|
52255
|
+
interface PlaybackConfigurationManifestServiceInteractionLog {
|
|
52256
|
+
/**
|
|
52257
|
+
* Indicates that MediaTailor won't emit the selected events in the logs for playback sessions that are initialized with this configuration.
|
|
52258
|
+
*/
|
|
52259
|
+
excludeEventTypes?: string[];
|
|
52260
|
+
}
|
|
52125
52261
|
/**
|
|
52126
52262
|
* <p>Access configuration parameters.</p>
|
|
52127
52263
|
*/
|
|
@@ -53364,7 +53500,7 @@ export declare namespace networkfirewall {
|
|
|
53364
53500
|
* - You can use CA certificates that you imported into ACM, but you can't generate CA certificates with ACM.
|
|
53365
53501
|
* - You can't use certificates issued by AWS Private Certificate Authority .
|
|
53366
53502
|
*
|
|
53367
|
-
* For more information about configuring certificates for outbound inspection, see [Using SSL/TLS certificates with
|
|
53503
|
+
* For more information about configuring certificates for outbound inspection, see [Using SSL/TLS certificates with TLS inspection configurations](https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html) in the *AWS Network Firewall Developer Guide* .
|
|
53368
53504
|
*
|
|
53369
53505
|
* For information about working with certificates in ACM, see [Importing certificates](https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html) in the *AWS Certificate Manager User Guide* .
|
|
53370
53506
|
*/
|
|
@@ -86139,6 +86275,18 @@ export declare namespace redshiftserverless {
|
|
|
86139
86275
|
*/
|
|
86140
86276
|
snapshotRetentionPeriod?: number;
|
|
86141
86277
|
}
|
|
86278
|
+
interface Snapshot {
|
|
86279
|
+
adminUsername?: string;
|
|
86280
|
+
kmsKeyId?: string;
|
|
86281
|
+
namespaceArn?: string;
|
|
86282
|
+
namespaceName?: string;
|
|
86283
|
+
ownerAccount?: string;
|
|
86284
|
+
retentionPeriod?: number;
|
|
86285
|
+
snapshotArn?: string;
|
|
86286
|
+
snapshotCreateTime?: string;
|
|
86287
|
+
snapshotName?: string;
|
|
86288
|
+
status?: enums.redshiftserverless.SnapshotStatus;
|
|
86289
|
+
}
|
|
86142
86290
|
interface Workgroup {
|
|
86143
86291
|
/**
|
|
86144
86292
|
* The base data warehouse capacity of the workgroup in Redshift Processing Units (RPUs).
|
|
@@ -94205,6 +94353,209 @@ export declare namespace securityhub {
|
|
|
94205
94353
|
*/
|
|
94206
94354
|
value: string;
|
|
94207
94355
|
}
|
|
94356
|
+
/**
|
|
94357
|
+
* Allows you to configure automated responses
|
|
94358
|
+
*/
|
|
94359
|
+
interface AutomationRuleV2AutomationRulesActionV2 {
|
|
94360
|
+
externalIntegrationConfiguration?: outputs.securityhub.AutomationRuleV2ExternalIntegrationConfiguration;
|
|
94361
|
+
findingFieldsUpdate?: outputs.securityhub.AutomationRuleV2AutomationRulesFindingFieldsUpdateV2;
|
|
94362
|
+
/**
|
|
94363
|
+
* The category of action to be executed by the automation rule
|
|
94364
|
+
*/
|
|
94365
|
+
type: enums.securityhub.AutomationRuleV2AutomationRulesActionV2Type;
|
|
94366
|
+
}
|
|
94367
|
+
/**
|
|
94368
|
+
* The changes to be applied to fields in a security finding when an automation rule is triggered
|
|
94369
|
+
*/
|
|
94370
|
+
interface AutomationRuleV2AutomationRulesFindingFieldsUpdateV2 {
|
|
94371
|
+
/**
|
|
94372
|
+
* Notes or contextual information for findings that are modified by the automation rule
|
|
94373
|
+
*/
|
|
94374
|
+
comment?: string;
|
|
94375
|
+
/**
|
|
94376
|
+
* The severity level to be assigned to findings that match the automation rule criteria
|
|
94377
|
+
*/
|
|
94378
|
+
severityId?: number;
|
|
94379
|
+
/**
|
|
94380
|
+
* The status to be applied to findings that match automation rule criteria
|
|
94381
|
+
*/
|
|
94382
|
+
statusId?: number;
|
|
94383
|
+
}
|
|
94384
|
+
/**
|
|
94385
|
+
* Boolean filter for querying findings
|
|
94386
|
+
*/
|
|
94387
|
+
interface AutomationRuleV2BooleanFilter {
|
|
94388
|
+
/**
|
|
94389
|
+
* The value of the boolean
|
|
94390
|
+
*/
|
|
94391
|
+
value: boolean;
|
|
94392
|
+
}
|
|
94393
|
+
/**
|
|
94394
|
+
* Enables the creation of filtering criteria for security findings
|
|
94395
|
+
*/
|
|
94396
|
+
interface AutomationRuleV2CompositeFilter {
|
|
94397
|
+
/**
|
|
94398
|
+
* Enables filtering based on boolean field values
|
|
94399
|
+
*/
|
|
94400
|
+
booleanFilters?: outputs.securityhub.AutomationRuleV2OcsfBooleanFilter[];
|
|
94401
|
+
/**
|
|
94402
|
+
* Enables filtering based on date and timestamp fields
|
|
94403
|
+
*/
|
|
94404
|
+
dateFilters?: outputs.securityhub.AutomationRuleV2OcsfDateFilter[];
|
|
94405
|
+
/**
|
|
94406
|
+
* Enables filtering based on map field value
|
|
94407
|
+
*/
|
|
94408
|
+
mapFilters?: outputs.securityhub.AutomationRuleV2OcsfMapFilter[];
|
|
94409
|
+
/**
|
|
94410
|
+
* Enables filtering based on numerical field values
|
|
94411
|
+
*/
|
|
94412
|
+
numberFilters?: outputs.securityhub.AutomationRuleV2OcsfNumberFilter[];
|
|
94413
|
+
operator?: enums.securityhub.AutomationRuleV2AllowedOperators;
|
|
94414
|
+
/**
|
|
94415
|
+
* Enables filtering based on string field values
|
|
94416
|
+
*/
|
|
94417
|
+
stringFilters?: outputs.securityhub.AutomationRuleV2OcsfStringFilter[];
|
|
94418
|
+
}
|
|
94419
|
+
/**
|
|
94420
|
+
* Defines the parameters and conditions used to evaluate and filter security findings
|
|
94421
|
+
*/
|
|
94422
|
+
interface AutomationRuleV2Criteria {
|
|
94423
|
+
ocsfFindingCriteria?: outputs.securityhub.AutomationRuleV2OcsfFindingFilters;
|
|
94424
|
+
}
|
|
94425
|
+
/**
|
|
94426
|
+
* A date filter for querying findings
|
|
94427
|
+
*/
|
|
94428
|
+
interface AutomationRuleV2DateFilter {
|
|
94429
|
+
dateRange?: outputs.securityhub.AutomationRuleV2DateRange;
|
|
94430
|
+
end?: string;
|
|
94431
|
+
start?: string;
|
|
94432
|
+
}
|
|
94433
|
+
/**
|
|
94434
|
+
* A date range for the date filter
|
|
94435
|
+
*/
|
|
94436
|
+
interface AutomationRuleV2DateRange {
|
|
94437
|
+
/**
|
|
94438
|
+
* A date range unit for the date filter
|
|
94439
|
+
*/
|
|
94440
|
+
unit: enums.securityhub.AutomationRuleV2DateRangeUnit;
|
|
94441
|
+
/**
|
|
94442
|
+
* A date range value for the date filter
|
|
94443
|
+
*/
|
|
94444
|
+
value: number;
|
|
94445
|
+
}
|
|
94446
|
+
/**
|
|
94447
|
+
* The settings for integrating automation rule actions with external systems or service
|
|
94448
|
+
*/
|
|
94449
|
+
interface AutomationRuleV2ExternalIntegrationConfiguration {
|
|
94450
|
+
/**
|
|
94451
|
+
* The ARN of the connector that establishes the integration
|
|
94452
|
+
*/
|
|
94453
|
+
connectorArn?: string;
|
|
94454
|
+
}
|
|
94455
|
+
/**
|
|
94456
|
+
* A map filter for filtering findings
|
|
94457
|
+
*/
|
|
94458
|
+
interface AutomationRuleV2MapFilter {
|
|
94459
|
+
/**
|
|
94460
|
+
* The condition to apply to the key value when filtering findings with a map filter
|
|
94461
|
+
*/
|
|
94462
|
+
comparison: enums.securityhub.AutomationRuleV2MapFilterComparison;
|
|
94463
|
+
/**
|
|
94464
|
+
* The key of the map filter
|
|
94465
|
+
*/
|
|
94466
|
+
key: string;
|
|
94467
|
+
/**
|
|
94468
|
+
* The value for the key in the map filter
|
|
94469
|
+
*/
|
|
94470
|
+
value: string;
|
|
94471
|
+
}
|
|
94472
|
+
/**
|
|
94473
|
+
* A number filter for querying findings
|
|
94474
|
+
*/
|
|
94475
|
+
interface AutomationRuleV2NumberFilter {
|
|
94476
|
+
/**
|
|
94477
|
+
* The equal-to condition to be applied to a single field when querying for findings
|
|
94478
|
+
*/
|
|
94479
|
+
eq?: number;
|
|
94480
|
+
/**
|
|
94481
|
+
* The greater-than-equal condition to be applied to a single field when querying for findings
|
|
94482
|
+
*/
|
|
94483
|
+
gte?: number;
|
|
94484
|
+
/**
|
|
94485
|
+
* The less-than-equal condition to be applied to a single field when querying for findings
|
|
94486
|
+
*/
|
|
94487
|
+
lte?: number;
|
|
94488
|
+
}
|
|
94489
|
+
/**
|
|
94490
|
+
* Enables filtering of security findings based on boolean field values in OCSF
|
|
94491
|
+
*/
|
|
94492
|
+
interface AutomationRuleV2OcsfBooleanFilter {
|
|
94493
|
+
/**
|
|
94494
|
+
* The name of the field
|
|
94495
|
+
*/
|
|
94496
|
+
fieldName: enums.securityhub.AutomationRuleV2OcsfBooleanFilterFieldName;
|
|
94497
|
+
filter: outputs.securityhub.AutomationRuleV2BooleanFilter;
|
|
94498
|
+
}
|
|
94499
|
+
/**
|
|
94500
|
+
* Enables filtering of security findings based on date and timestamp fields in OCSF
|
|
94501
|
+
*/
|
|
94502
|
+
interface AutomationRuleV2OcsfDateFilter {
|
|
94503
|
+
/**
|
|
94504
|
+
* The name of the field
|
|
94505
|
+
*/
|
|
94506
|
+
fieldName: enums.securityhub.AutomationRuleV2OcsfDateFilterFieldName;
|
|
94507
|
+
filter: outputs.securityhub.AutomationRuleV2DateFilter;
|
|
94508
|
+
}
|
|
94509
|
+
/**
|
|
94510
|
+
* The filtering conditions that align with OCSF standards
|
|
94511
|
+
*/
|
|
94512
|
+
interface AutomationRuleV2OcsfFindingFilters {
|
|
94513
|
+
/**
|
|
94514
|
+
* Enables the creation of complex filtering conditions by combining filter
|
|
94515
|
+
*/
|
|
94516
|
+
compositeFilters?: outputs.securityhub.AutomationRuleV2CompositeFilter[];
|
|
94517
|
+
compositeOperator?: enums.securityhub.AutomationRuleV2AllowedOperators;
|
|
94518
|
+
}
|
|
94519
|
+
/**
|
|
94520
|
+
* Enables filtering of security findings based on map field values in OCSF
|
|
94521
|
+
*/
|
|
94522
|
+
interface AutomationRuleV2OcsfMapFilter {
|
|
94523
|
+
/**
|
|
94524
|
+
* The name of the field
|
|
94525
|
+
*/
|
|
94526
|
+
fieldName: enums.securityhub.AutomationRuleV2OcsfMapFilterFieldName;
|
|
94527
|
+
filter: outputs.securityhub.AutomationRuleV2MapFilter;
|
|
94528
|
+
}
|
|
94529
|
+
/**
|
|
94530
|
+
* Enables filtering of security findings based on numerical field values in OCSF
|
|
94531
|
+
*/
|
|
94532
|
+
interface AutomationRuleV2OcsfNumberFilter {
|
|
94533
|
+
/**
|
|
94534
|
+
* The name of the field
|
|
94535
|
+
*/
|
|
94536
|
+
fieldName: enums.securityhub.AutomationRuleV2OcsfNumberFilterFieldName;
|
|
94537
|
+
filter: outputs.securityhub.AutomationRuleV2NumberFilter;
|
|
94538
|
+
}
|
|
94539
|
+
/**
|
|
94540
|
+
* Enables filtering of security findings based on string field values in OCSF
|
|
94541
|
+
*/
|
|
94542
|
+
interface AutomationRuleV2OcsfStringFilter {
|
|
94543
|
+
fieldName: enums.securityhub.AutomationRuleV2OcsfStringField;
|
|
94544
|
+
filter: outputs.securityhub.AutomationRuleV2StringFilter;
|
|
94545
|
+
}
|
|
94546
|
+
/**
|
|
94547
|
+
* A string filter for filtering findings
|
|
94548
|
+
*/
|
|
94549
|
+
interface AutomationRuleV2StringFilter {
|
|
94550
|
+
/**
|
|
94551
|
+
* The condition to apply to a string value when filtering findings
|
|
94552
|
+
*/
|
|
94553
|
+
comparison: enums.securityhub.AutomationRuleV2StringFilterComparison;
|
|
94554
|
+
/**
|
|
94555
|
+
* The string filter value
|
|
94556
|
+
*/
|
|
94557
|
+
value: string;
|
|
94558
|
+
}
|
|
94208
94559
|
/**
|
|
94209
94560
|
* Used to update information about the investigation into the finding.
|
|
94210
94561
|
*/
|
|
@@ -95121,7 +95472,7 @@ export declare namespace securityhub {
|
|
|
95121
95472
|
* - `ResourceType NOT_EQUALS AwsIamPolicy`
|
|
95122
95473
|
* - `ResourceType NOT_EQUALS AwsEc2NetworkInterface`
|
|
95123
95474
|
*
|
|
95124
|
-
* `CONTAINS` and `NOT_CONTAINS` operators can be used only with automation rules. For more information, see [Automation rules](https://docs.aws.amazon.com/securityhub/latest/userguide/automation-rules.html) in the *AWS Security Hub User Guide* .
|
|
95475
|
+
* `CONTAINS` and `NOT_CONTAINS` operators can be used only with automation rules V1. `CONTAINS_WORD` operator is only supported in `GetFindingsV2` , `GetFindingStatisticsV2` , `GetResourcesV2` , and `GetResourceStatisticsV2` APIs. For more information, see [Automation rules](https://docs.aws.amazon.com/securityhub/latest/userguide/automation-rules.html) in the *AWS Security Hub User Guide* .
|
|
95125
95476
|
*/
|
|
95126
95477
|
comparison: enums.securityhub.InsightStringFilterComparison;
|
|
95127
95478
|
/**
|
|
@@ -97330,6 +97681,10 @@ export declare namespace synthetics {
|
|
|
97330
97681
|
environmentVariables?: {
|
|
97331
97682
|
[key: string]: string;
|
|
97332
97683
|
};
|
|
97684
|
+
/**
|
|
97685
|
+
* Provide ephemeralStorage available for canary in MB
|
|
97686
|
+
*/
|
|
97687
|
+
ephemeralStorage?: number;
|
|
97333
97688
|
/**
|
|
97334
97689
|
* Provide maximum memory available for canary in MB
|
|
97335
97690
|
*/
|
|
@@ -98630,7 +98985,13 @@ export declare namespace wafv2 {
|
|
|
98630
98985
|
statements: outputs.wafv2.RuleGroupStatement[];
|
|
98631
98986
|
}
|
|
98632
98987
|
interface RuleGroupAsnMatchStatement {
|
|
98988
|
+
/**
|
|
98989
|
+
* Contains one or more Autonomous System Numbers (ASNs). ASNs are unique identifiers assigned to large internet networks managed by organizations such as internet service providers, enterprises, universities, or government agencies.
|
|
98990
|
+
*/
|
|
98633
98991
|
asnList?: number[];
|
|
98992
|
+
/**
|
|
98993
|
+
* The configuration for inspecting IP addresses to match against an ASN in an HTTP header that you specify, instead of using the IP address that's reported by the web request origin. Commonly, this is the X-Forwarded-For (XFF) header, but you can specify any header name.
|
|
98994
|
+
*/
|
|
98634
98995
|
forwardedIpConfig?: outputs.wafv2.RuleGroupForwardedIpConfiguration;
|
|
98635
98996
|
}
|
|
98636
98997
|
/**
|
|
@@ -99310,6 +99671,9 @@ export declare namespace wafv2 {
|
|
|
99310
99671
|
* Specifies a single custom aggregate key for a rate-base rule.
|
|
99311
99672
|
*/
|
|
99312
99673
|
interface RuleGroupRateBasedStatementCustomKey {
|
|
99674
|
+
/**
|
|
99675
|
+
* Use an Autonomous System Number (ASN) derived from the request's originating or forwarded IP address as an aggregate key. Each distinct ASN contributes to the aggregation instance.
|
|
99676
|
+
*/
|
|
99313
99677
|
asn?: outputs.wafv2.RuleGroupRateLimitAsn;
|
|
99314
99678
|
/**
|
|
99315
99679
|
* Use the value of a cookie in the request as an aggregate key. Each distinct value in the cookie contributes to the aggregation instance. If you use a single cookie as your custom key, then each value fully defines an aggregation instance.
|
|
@@ -99639,6 +100003,11 @@ export declare namespace wafv2 {
|
|
|
99639
100003
|
* A logical rule statement used to combine other rule statements with AND logic. You provide more than one `Statement` within the `AndStatement` .
|
|
99640
100004
|
*/
|
|
99641
100005
|
andStatement?: outputs.wafv2.RuleGroupAndStatement;
|
|
100006
|
+
/**
|
|
100007
|
+
* A rule statement that inspects web traffic based on the Autonomous System Number (ASN) associated with the request's IP address.
|
|
100008
|
+
*
|
|
100009
|
+
* For additional details, see [ASN match rule statement](https://docs.aws.amazon.com/waf/latest/developerguide/waf-rule-statement-type-asn-match.html) in the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html) .
|
|
100010
|
+
*/
|
|
99642
100011
|
asnMatchStatement?: outputs.wafv2.RuleGroupAsnMatchStatement;
|
|
99643
100012
|
/**
|
|
99644
100013
|
* A rule statement that defines a string match search for AWS WAF to apply to web requests. The byte match statement provides the bytes to search for, the location in requests that you want AWS WAF to search, and other settings. The bytes to search for are typically a string that corresponds with ASCII characters. In the AWS WAF console and the developer guide, this is called a string match statement.
|
|
@@ -99838,7 +100207,13 @@ export declare namespace wafv2 {
|
|
|
99838
100207
|
statements: outputs.wafv2.WebAclStatement[];
|
|
99839
100208
|
}
|
|
99840
100209
|
interface WebAclAsnMatchStatement {
|
|
100210
|
+
/**
|
|
100211
|
+
* Contains one or more Autonomous System Numbers (ASNs). ASNs are unique identifiers assigned to large internet networks managed by organizations such as internet service providers, enterprises, universities, or government agencies.
|
|
100212
|
+
*/
|
|
99841
100213
|
asnList?: number[];
|
|
100214
|
+
/**
|
|
100215
|
+
* The configuration for inspecting IP addresses to match against an ASN in an HTTP header that you specify, instead of using the IP address that's reported by the web request origin. Commonly, this is the X-Forwarded-For (XFF) header, but you can specify any header name.
|
|
100216
|
+
*/
|
|
99842
100217
|
forwardedIpConfig?: outputs.wafv2.WebAclForwardedIpConfiguration;
|
|
99843
100218
|
}
|
|
99844
100219
|
/**
|
|
@@ -99897,7 +100272,21 @@ export declare namespace wafv2 {
|
|
|
99897
100272
|
* Configures how to use the AntiDDOS AWS managed rule group in the web ACL
|
|
99898
100273
|
*/
|
|
99899
100274
|
interface WebAclAwsManagedRulesAntiDDoSRuleSet {
|
|
100275
|
+
/**
|
|
100276
|
+
* Configures the request handling that's applied by the managed rule group rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` during a distributed denial of service (DDoS) attack.
|
|
100277
|
+
*/
|
|
99900
100278
|
clientSideActionConfig: outputs.wafv2.WebAclClientSideActionConfig;
|
|
100279
|
+
/**
|
|
100280
|
+
* The sensitivity that the rule group rule `DDoSRequests` uses when matching against the DDoS suspicion labeling on a request. The managed rule group adds the labeling during DDoS events, before the `DDoSRequests` rule runs.
|
|
100281
|
+
*
|
|
100282
|
+
* The higher the sensitivity, the more levels of labeling that the rule matches:
|
|
100283
|
+
*
|
|
100284
|
+
* - Low sensitivity is less sensitive, causing the rule to match only on the most likely participants in an attack, which are the requests with the high suspicion label `awswaf:managed:aws:anti-ddos:high-suspicion-ddos-request` .
|
|
100285
|
+
* - Medium sensitivity causes the rule to match on the medium and high suspicion labels.
|
|
100286
|
+
* - High sensitivity causes the rule to match on all of the suspicion labels: low, medium, and high.
|
|
100287
|
+
*
|
|
100288
|
+
* Default: `LOW`
|
|
100289
|
+
*/
|
|
99901
100290
|
sensitivityToBlock?: enums.wafv2.WebAclSensitivityToAct;
|
|
99902
100291
|
}
|
|
99903
100292
|
/**
|
|
@@ -100077,14 +100466,62 @@ export declare namespace wafv2 {
|
|
|
100077
100466
|
* Client side action config for AntiDDOS AMR.
|
|
100078
100467
|
*/
|
|
100079
100468
|
interface WebAclClientSideAction {
|
|
100469
|
+
/**
|
|
100470
|
+
* The regular expression to match against the web request URI, used to identify requests that can't handle a silent browser challenge. When the `ClientSideAction` setting `UsageOfAction` is enabled, the managed rule group uses this setting to determine which requests to label with `awswaf:managed:aws:anti-ddos:challengeable-request` . If `UsageOfAction` is disabled, this setting has no effect and the managed rule group doesn't add the label to any requests.
|
|
100471
|
+
*
|
|
100472
|
+
* The anti-DDoS managed rule group doesn't evaluate the rules `ChallengeDDoSRequests` or `ChallengeAllDuringEvent` for web requests whose URIs match this regex. This is true regardless of whether you override the rule action for either of the rules in your web ACL configuration.
|
|
100473
|
+
*
|
|
100474
|
+
* AWS recommends using a regular expression.
|
|
100475
|
+
*
|
|
100476
|
+
* This setting is required if `UsageOfAction` is set to `ENABLED` . If required, you can provide between 1 and 5 regex objects in the array of settings.
|
|
100477
|
+
*
|
|
100478
|
+
* AWS recommends starting with the following setting. Review and update it for your application's needs:
|
|
100479
|
+
*
|
|
100480
|
+
* `\/api\/|\.(acc|avi|css|gif|jpe?g|js|mp[34]|ogg|otf|pdf|png|tiff?|ttf|webm|webp|woff2?)$`
|
|
100481
|
+
*/
|
|
100080
100482
|
exemptUriRegularExpressions?: outputs.wafv2.WebAclRegex[];
|
|
100483
|
+
/**
|
|
100484
|
+
* The sensitivity that the rule group rule `ChallengeDDoSRequests` uses when matching against the DDoS suspicion labeling on a request. The managed rule group adds the labeling during DDoS events, before the `ChallengeDDoSRequests` rule runs.
|
|
100485
|
+
*
|
|
100486
|
+
* The higher the sensitivity, the more levels of labeling that the rule matches:
|
|
100487
|
+
*
|
|
100488
|
+
* - Low sensitivity is less sensitive, causing the rule to match only on the most likely participants in an attack, which are the requests with the high suspicion label `awswaf:managed:aws:anti-ddos:high-suspicion-ddos-request` .
|
|
100489
|
+
* - Medium sensitivity causes the rule to match on the medium and high suspicion labels.
|
|
100490
|
+
* - High sensitivity causes the rule to match on all of the suspicion labels: low, medium, and high.
|
|
100491
|
+
*
|
|
100492
|
+
* Default: `HIGH`
|
|
100493
|
+
*/
|
|
100081
100494
|
sensitivity?: enums.wafv2.WebAclSensitivityToAct;
|
|
100495
|
+
/**
|
|
100496
|
+
* Determines whether to use the `AWSManagedRulesAntiDDoSRuleSet` rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` in the rule group evaluation and the related label `awswaf:managed:aws:anti-ddos:challengeable-request` .
|
|
100497
|
+
*
|
|
100498
|
+
* - If usage is enabled:
|
|
100499
|
+
*
|
|
100500
|
+
* - The managed rule group adds the label `awswaf:managed:aws:anti-ddos:challengeable-request` to any web request whose URL does *NOT* match the regular expressions provided in the `ClientSideAction` setting `ExemptUriRegularExpressions` .
|
|
100501
|
+
* - The two rules are evaluated against web requests for protected resources that are experiencing a DDoS attack. The two rules only apply their action to matching requests that have the label `awswaf:managed:aws:anti-ddos:challengeable-request` .
|
|
100502
|
+
* - If usage is disabled:
|
|
100503
|
+
*
|
|
100504
|
+
* - The managed rule group doesn't add the label `awswaf:managed:aws:anti-ddos:challengeable-request` to any web requests.
|
|
100505
|
+
* - The two rules are not evaluated.
|
|
100506
|
+
* - None of the other `ClientSideAction` settings have any effect.
|
|
100507
|
+
*
|
|
100508
|
+
* > This setting only enables or disables the use of the two anti-DDOS rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` in the anti-DDoS managed rule group.
|
|
100509
|
+
* >
|
|
100510
|
+
* > This setting doesn't alter the action setting in the two rules. To override the actions used by the rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` , enable this setting, and then override the rule actions in the usual way, in your managed rule group configuration.
|
|
100511
|
+
*/
|
|
100082
100512
|
usageOfAction: enums.wafv2.WebAclUsageOfAction;
|
|
100083
100513
|
}
|
|
100084
100514
|
/**
|
|
100085
100515
|
* Client side action config for AntiDDOS AMR.
|
|
100086
100516
|
*/
|
|
100087
100517
|
interface WebAclClientSideActionConfig {
|
|
100518
|
+
/**
|
|
100519
|
+
* Configuration for the use of the `AWSManagedRulesAntiDDoSRuleSet` rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` .
|
|
100520
|
+
*
|
|
100521
|
+
* > This setting isn't related to the configuration of the `Challenge` action itself. It only configures the use of the two anti-DDoS rules named here.
|
|
100522
|
+
*
|
|
100523
|
+
* You can enable or disable the use of these rules, and you can configure how to use them when they are enabled.
|
|
100524
|
+
*/
|
|
100088
100525
|
challenge: outputs.wafv2.WebAclClientSideAction;
|
|
100089
100526
|
}
|
|
100090
100527
|
/**
|
|
@@ -100627,6 +101064,11 @@ export declare namespace wafv2 {
|
|
|
100627
101064
|
* For information about using the ACFP managed rule group, see [AWS WAF Fraud Control account creation fraud prevention (ACFP) rule group](https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-acfp.html) and [AWS WAF Fraud Control account creation fraud prevention (ACFP)](https://docs.aws.amazon.com/waf/latest/developerguide/waf-acfp.html) in the *AWS WAF Developer Guide* .
|
|
100628
101065
|
*/
|
|
100629
101066
|
awsManagedRulesAcfpRuleSet?: outputs.wafv2.WebAclAwsManagedRulesAcfpRuleSet;
|
|
101067
|
+
/**
|
|
101068
|
+
* Additional configuration for using the anti-DDoS managed rule group, `AWSManagedRulesAntiDDoSRuleSet` . Use this to configure anti-DDoS behavior for the rule group.
|
|
101069
|
+
*
|
|
101070
|
+
* For information about using the anti-DDoS managed rule group, see [AWS WAF Anti-DDoS rule group](https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-anti-ddos.html) and [Distributed Denial of Service (DDoS) prevention](https://docs.aws.amazon.com/waf/latest/developerguide/waf-anti-ddos.html) in the *AWS WAF Developer Guide* .
|
|
101071
|
+
*/
|
|
100630
101072
|
awsManagedRulesAntiDDoSRuleSet?: outputs.wafv2.WebAclAwsManagedRulesAntiDDoSRuleSet;
|
|
100631
101073
|
/**
|
|
100632
101074
|
* Additional configuration for using the account takeover prevention (ATP) managed rule group, `AWSManagedRulesATPRuleSet` . Use this to provide login request information to the rule group. For web ACLs that protect CloudFront distributions, use this to also provide the information about how your distribution responds to login requests.
|
|
@@ -100699,6 +101141,9 @@ export declare namespace wafv2 {
|
|
|
100699
101141
|
* Configures the options for on-source DDoS protection provided by supported resource type.
|
|
100700
101142
|
*/
|
|
100701
101143
|
interface WebAclOnSourceDDoSProtectionConfig {
|
|
101144
|
+
/**
|
|
101145
|
+
* The level of DDoS protection that applies to web ACLs associated with Application Load Balancers. `ACTIVE_UNDER_DDOS` protection is enabled by default whenever a web ACL is associated with an Application Load Balancer. In the event that an Application Load Balancer experiences high-load conditions or suspected DDoS attacks, the `ACTIVE_UNDER_DDOS` protection automatically rate limits traffic from known low reputation sources without disrupting Application Load Balancer availability. `ALWAYS_ON` protection provides constant, always-on monitoring of known low reputation sources for suspected DDoS attacks. While this provides a higher level of protection, there may be potential impacts on legitimate traffic.
|
|
101146
|
+
*/
|
|
100702
101147
|
albLowReputationMode: enums.wafv2.WebAclOnSourceDDoSProtectionConfigAlbLowReputationMode;
|
|
100703
101148
|
}
|
|
100704
101149
|
interface WebAclOrStatement {
|
|
@@ -100782,6 +101227,9 @@ export declare namespace wafv2 {
|
|
|
100782
101227
|
* Specifies a single custom aggregate key for a rate-base rule.
|
|
100783
101228
|
*/
|
|
100784
101229
|
interface WebAclRateBasedStatementCustomKey {
|
|
101230
|
+
/**
|
|
101231
|
+
* Use an Autonomous System Number (ASN) derived from the request's originating or forwarded IP address as an aggregate key. Each distinct ASN contributes to the aggregation instance.
|
|
101232
|
+
*/
|
|
100785
101233
|
asn?: outputs.wafv2.WebAclRateLimitAsn;
|
|
100786
101234
|
/**
|
|
100787
101235
|
* Use the value of a cookie in the request as an aggregate key. Each distinct value in the cookie contributes to the aggregation instance. If you use a single cookie as your custom key, then each value fully defines an aggregation instance.
|
|
@@ -101389,6 +101837,11 @@ export declare namespace wafv2 {
|
|
|
101389
101837
|
* A logical rule statement used to combine other rule statements with AND logic. You provide more than one `Statement` within the `AndStatement` .
|
|
101390
101838
|
*/
|
|
101391
101839
|
andStatement?: outputs.wafv2.WebAclAndStatement;
|
|
101840
|
+
/**
|
|
101841
|
+
* A rule statement that inspects web traffic based on the Autonomous System Number (ASN) associated with the request's IP address.
|
|
101842
|
+
*
|
|
101843
|
+
* For additional details, see [ASN match rule statement](https://docs.aws.amazon.com/waf/latest/developerguide/waf-rule-statement-type-asn-match.html) in the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html) .
|
|
101844
|
+
*/
|
|
101392
101845
|
asnMatchStatement?: outputs.wafv2.WebAclAsnMatchStatement;
|
|
101393
101846
|
/**
|
|
101394
101847
|
* A rule statement that defines a string match search for AWS WAF to apply to web requests. The byte match statement provides the bytes to search for, the location in requests that you want AWS WAF to search, and other settings. The bytes to search for are typically a string that corresponds with ASCII characters. In the AWS WAF console and the developer guide, this is called a string match statement.
|