@pulumi/aws 6.69.0-alpha.1739293705 → 6.69.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (80) hide show
  1. package/apigateway/method.d.ts +1 -1
  2. package/apigateway/method.js +1 -1
  3. package/batch/getComputeEnvironment.d.ts +2 -2
  4. package/batch/getComputeEnvironment.js +2 -2
  5. package/batch/getJobQueue.d.ts +2 -2
  6. package/batch/getJobQueue.js +2 -2
  7. package/cloudtrail/trail.d.ts +9 -9
  8. package/cloudtrail/trail.js +6 -6
  9. package/cloudwatch/logResourcePolicy.d.ts +2 -2
  10. package/cloudwatch/logResourcePolicy.js +2 -2
  11. package/controltower/getControls.d.ts +2 -2
  12. package/controltower/getControls.js +2 -2
  13. package/directoryservice/logService.d.ts +1 -1
  14. package/directoryservice/logService.js +1 -1
  15. package/directoryservice/serviceRegion.d.ts +1 -1
  16. package/directoryservice/serviceRegion.js +1 -1
  17. package/ec2/getInternetGateway.d.ts +2 -2
  18. package/ec2/getInternetGateway.js +2 -2
  19. package/ec2/getLaunchTemplate.d.ts +2 -2
  20. package/ec2/getLaunchTemplate.js +2 -2
  21. package/ec2/getNatGateway.d.ts +4 -4
  22. package/ec2/getNatGateway.js +4 -4
  23. package/ec2/getRoute.d.ts +2 -2
  24. package/ec2/getRoute.js +2 -2
  25. package/ec2/getSpotDatafeedSubscription.d.ts +2 -2
  26. package/ec2/getSpotDatafeedSubscription.js +2 -2
  27. package/ec2/instance.d.ts +2 -2
  28. package/ec2/instance.js +2 -2
  29. package/ec2/securityGroup.d.ts +1 -1
  30. package/ec2/securityGroup.js +1 -1
  31. package/ecs/getCluster.d.ts +2 -2
  32. package/ecs/getCluster.js +2 -2
  33. package/ecs/getContainerDefinition.d.ts +2 -2
  34. package/ecs/getContainerDefinition.js +2 -2
  35. package/eks/getAddonVersion.d.ts +2 -2
  36. package/eks/getAddonVersion.js +2 -2
  37. package/fms/policy.d.ts +9 -9
  38. package/glue/resourcePolicy.d.ts +1 -1
  39. package/glue/resourcePolicy.js +1 -1
  40. package/iam/getServerCertificate.d.ts +2 -2
  41. package/iam/getServerCertificate.js +2 -2
  42. package/kinesis/firehoseDeliveryStream.d.ts +1 -1
  43. package/kinesis/firehoseDeliveryStream.js +1 -1
  44. package/lightsail/containerService.d.ts +1 -1
  45. package/lightsail/containerService.js +1 -1
  46. package/package.json +2 -2
  47. package/rds/cluster.d.ts +24 -0
  48. package/rds/cluster.js +4 -0
  49. package/rds/cluster.js.map +1 -1
  50. package/rds/getCluster.d.ts +2 -0
  51. package/rds/getCluster.js.map +1 -1
  52. package/rds/instance.d.ts +3 -3
  53. package/rds/instance.js +3 -3
  54. package/route53/queryLog.d.ts +1 -1
  55. package/route53/queryLog.js +1 -1
  56. package/route53/record.d.ts +23 -0
  57. package/route53/record.js +23 -0
  58. package/route53/record.js.map +1 -1
  59. package/s3/bucketLifecycleConfigurationV2.d.ts +7 -4
  60. package/s3/bucketLifecycleConfigurationV2.js +3 -4
  61. package/s3/bucketLifecycleConfigurationV2.js.map +1 -1
  62. package/secretsmanager/getSecret.d.ts +4 -4
  63. package/secretsmanager/getSecret.js +4 -4
  64. package/secretsmanager/getSecretVersion.d.ts +4 -4
  65. package/secretsmanager/getSecretVersion.js +4 -4
  66. package/sesv2/configurationSetEventDestination.d.ts +1 -1
  67. package/sesv2/configurationSetEventDestination.js +1 -1
  68. package/sns/topicSubscription.d.ts +2 -2
  69. package/sns/topicSubscription.js +2 -2
  70. package/sqs/queue.d.ts +50 -46
  71. package/sqs/queue.js +4 -0
  72. package/sqs/queue.js.map +1 -1
  73. package/sqs/queuePolicy.d.ts +40 -14
  74. package/sqs/queuePolicy.js +37 -2
  75. package/sqs/queuePolicy.js.map +1 -1
  76. package/types/input.d.ts +148 -10
  77. package/types/input.js.map +1 -1
  78. package/types/output.d.ts +157 -19
  79. package/types/output.js.map +1 -1
  80. package/wafv2/webAcl.d.ts +3 -3
package/types/output.d.ts CHANGED
@@ -9359,7 +9359,7 @@ export declare namespace backup {
9359
9359
  */
9360
9360
  key: string;
9361
9361
  /**
9362
- * An operation, such as `StringEquals`, that is applied to a key-value pair used to filter resources in a selection.
9362
+ * An operation, such as `STRINGEQUALS`, that is applied to a key-value pair used to filter resources in a selection.
9363
9363
  */
9364
9364
  type: string;
9365
9365
  /**
@@ -35439,21 +35439,149 @@ export declare namespace fms {
35439
35439
  */
35440
35440
  managedServiceData?: string;
35441
35441
  /**
35442
- * Contains the Network Firewall firewall policy options to configure a centralized deployment model. Documented below.
35442
+ * Contains the Network Firewall firewall policy options to configure a centralized deployment model. See the `policyOption` block.
35443
35443
  */
35444
35444
  policyOption?: outputs.fms.PolicySecurityServicePolicyDataPolicyOption;
35445
35445
  /**
35446
- * The service that the policy is using to protect the resources. For the current list of supported types, please refer to the [AWS Firewall Manager SecurityServicePolicyData API Type Reference](https://docs.aws.amazon.com/fms/2018-01-01/APIReference/API_SecurityServicePolicyData.html#fms-Type-SecurityServicePolicyData-Type).
35446
+ * An integer value containing ICMP type.
35447
35447
  */
35448
35448
  type: string;
35449
35449
  }
35450
35450
  interface PolicySecurityServicePolicyDataPolicyOption {
35451
35451
  /**
35452
- * Defines the deployment model to use for the firewall policy. Documented below.
35452
+ * Defines NACL rules across accounts in their AWS Organization. See the `networkAclCommonPolicy` block.
35453
+ */
35454
+ networkAclCommonPolicy?: outputs.fms.PolicySecurityServicePolicyDataPolicyOptionNetworkAclCommonPolicy;
35455
+ /**
35456
+ * Defines the deployment model to use for the firewall policy. See the `networkFirewallPolicy` block.
35453
35457
  */
35454
35458
  networkFirewallPolicy?: outputs.fms.PolicySecurityServicePolicyDataPolicyOptionNetworkFirewallPolicy;
35455
35459
  thirdPartyFirewallPolicy?: outputs.fms.PolicySecurityServicePolicyDataPolicyOptionThirdPartyFirewallPolicy;
35456
35460
  }
35461
+ interface PolicySecurityServicePolicyDataPolicyOptionNetworkAclCommonPolicy {
35462
+ /**
35463
+ * Defines NACL entries for Network ACL policy. See the `networkAclEntrySet` block.
35464
+ */
35465
+ networkAclEntrySet?: outputs.fms.PolicySecurityServicePolicyDataPolicyOptionNetworkAclCommonPolicyNetworkAclEntrySet;
35466
+ }
35467
+ interface PolicySecurityServicePolicyDataPolicyOptionNetworkAclCommonPolicyNetworkAclEntrySet {
35468
+ /**
35469
+ * The rules that you want to run first in the Firewall Manager managed network ACLs. Firewall manager creates entries with ID value between 1 and 5000. See the `firstEntry` block.
35470
+ */
35471
+ firstEntries?: outputs.fms.PolicySecurityServicePolicyDataPolicyOptionNetworkAclCommonPolicyNetworkAclEntrySetFirstEntry[];
35472
+ /**
35473
+ * A boolean value, if true Firewall Manager uses this setting when it finds policy violations that involve conflicts between the custom entries and the policy entries. If false Firewall Manager marks the network ACL as noncompliant and does not try to remediate.
35474
+ */
35475
+ forceRemediateForFirstEntries: boolean;
35476
+ /**
35477
+ * A boolean value, if true Firewall Manager uses this setting when it finds policy violations that involve conflicts between the custom entries and the policy entries. If false Firewall Manager marks the network ACL as noncompliant and does not try to remediate.
35478
+ */
35479
+ forceRemediateForLastEntries: boolean;
35480
+ /**
35481
+ * The rules that you want to run last in the Firewall Manager managed network ACLs. Firewall manager creates entries with ID value between 32000 and 32766. See the `lastEntry` block.
35482
+ */
35483
+ lastEntries?: outputs.fms.PolicySecurityServicePolicyDataPolicyOptionNetworkAclCommonPolicyNetworkAclEntrySetLastEntry[];
35484
+ }
35485
+ interface PolicySecurityServicePolicyDataPolicyOptionNetworkAclCommonPolicyNetworkAclEntrySetFirstEntry {
35486
+ /**
35487
+ * A string value containing the IPv4 network range to allow or deny, in CIDR notation.
35488
+ */
35489
+ cidrBlock?: string;
35490
+ /**
35491
+ * A boolean value, if true Firewall Manager creates egress rule. If false Firewall Manager creates ingress rule.
35492
+ */
35493
+ egress: boolean;
35494
+ /**
35495
+ * A configuration block for ICMP protocol: The ICMP type and code. See the `icmpTypeCode` block.
35496
+ */
35497
+ icmpTypeCodes?: outputs.fms.PolicySecurityServicePolicyDataPolicyOptionNetworkAclCommonPolicyNetworkAclEntrySetFirstEntryIcmpTypeCode[];
35498
+ /**
35499
+ * A string value containing the IPv6 network range to allow or deny, in CIDR notation.
35500
+ */
35501
+ ipv6CidrBlock?: string;
35502
+ /**
35503
+ * A configuration block for PortRange. See the `portRange` block.
35504
+ */
35505
+ portRanges?: outputs.fms.PolicySecurityServicePolicyDataPolicyOptionNetworkAclCommonPolicyNetworkAclEntrySetFirstEntryPortRange[];
35506
+ /**
35507
+ * The protocol number. A value of "-1" means all protocols.
35508
+ */
35509
+ protocol: string;
35510
+ /**
35511
+ * A string value that indicates whether to allow or deny the traffic that matches the rule. Valid values: `allow`, `deny`.
35512
+ */
35513
+ ruleAction: string;
35514
+ }
35515
+ interface PolicySecurityServicePolicyDataPolicyOptionNetworkAclCommonPolicyNetworkAclEntrySetFirstEntryIcmpTypeCode {
35516
+ /**
35517
+ * An integer value containing ICMP code.
35518
+ */
35519
+ code?: number;
35520
+ /**
35521
+ * An integer value containing ICMP type.
35522
+ */
35523
+ type?: number;
35524
+ }
35525
+ interface PolicySecurityServicePolicyDataPolicyOptionNetworkAclCommonPolicyNetworkAclEntrySetFirstEntryPortRange {
35526
+ /**
35527
+ * The beginning port number of the range.
35528
+ */
35529
+ from?: number;
35530
+ /**
35531
+ * The ending port number of the range.
35532
+ */
35533
+ to?: number;
35534
+ }
35535
+ interface PolicySecurityServicePolicyDataPolicyOptionNetworkAclCommonPolicyNetworkAclEntrySetLastEntry {
35536
+ /**
35537
+ * A string value containing the IPv4 network range to allow or deny, in CIDR notation.
35538
+ */
35539
+ cidrBlock?: string;
35540
+ /**
35541
+ * A boolean value, if true Firewall Manager creates egress rule. If false Firewall Manager creates ingress rule.
35542
+ */
35543
+ egress: boolean;
35544
+ /**
35545
+ * A configuration block for ICMP protocol: The ICMP type and code. See the `icmpTypeCode` block.
35546
+ */
35547
+ icmpTypeCodes?: outputs.fms.PolicySecurityServicePolicyDataPolicyOptionNetworkAclCommonPolicyNetworkAclEntrySetLastEntryIcmpTypeCode[];
35548
+ /**
35549
+ * A string value containing the IPv6 network range to allow or deny, in CIDR notation.
35550
+ */
35551
+ ipv6CidrBlock?: string;
35552
+ /**
35553
+ * A configuration block for PortRange. See the `portRange` block.
35554
+ */
35555
+ portRanges?: outputs.fms.PolicySecurityServicePolicyDataPolicyOptionNetworkAclCommonPolicyNetworkAclEntrySetLastEntryPortRange[];
35556
+ /**
35557
+ * The protocol number. A value of "-1" means all protocols.
35558
+ */
35559
+ protocol: string;
35560
+ /**
35561
+ * A string value that indicates whether to allow or deny the traffic that matches the rule. Valid values: `allow`, `deny`.
35562
+ */
35563
+ ruleAction: string;
35564
+ }
35565
+ interface PolicySecurityServicePolicyDataPolicyOptionNetworkAclCommonPolicyNetworkAclEntrySetLastEntryIcmpTypeCode {
35566
+ /**
35567
+ * An integer value containing ICMP code.
35568
+ */
35569
+ code?: number;
35570
+ /**
35571
+ * An integer value containing ICMP type.
35572
+ */
35573
+ type?: number;
35574
+ }
35575
+ interface PolicySecurityServicePolicyDataPolicyOptionNetworkAclCommonPolicyNetworkAclEntrySetLastEntryPortRange {
35576
+ /**
35577
+ * The beginning port number of the range.
35578
+ */
35579
+ from?: number;
35580
+ /**
35581
+ * The ending port number of the range.
35582
+ */
35583
+ to?: number;
35584
+ }
35457
35585
  interface PolicySecurityServicePolicyDataPolicyOptionNetworkFirewallPolicy {
35458
35586
  /**
35459
35587
  * Defines the deployment model to use for the third-party firewall policy. Valid values are `CENTRALIZED` and `DISTRIBUTED`.
@@ -70208,11 +70336,11 @@ export declare namespace route53 {
70208
70336
  */
70209
70337
  evaluateTargetHealth: boolean;
70210
70338
  /**
70211
- * DNS domain name for a CloudFront distribution, S3 bucket, ELB, or another resource record set in this hosted zone.
70339
+ * DNS domain name for a CloudFront distribution, S3 bucket, ELB, AWS Global Accelerator, or another resource record set in this hosted zone.
70212
70340
  */
70213
70341
  name: string;
70214
70342
  /**
70215
- * Hosted zone ID for a CloudFront distribution, S3 bucket, ELB, or Route 53 hosted zone. See `resource_elb.zone_id` for example.
70343
+ * Hosted zone ID for a CloudFront distribution, S3 bucket, ELB, AWS Global Accelerator, or Route 53 hosted zone. See `resource_elb.zone_id` for example.
70216
70344
  */
70217
70345
  zoneId: string;
70218
70346
  }
@@ -71286,7 +71414,7 @@ export declare namespace s3 {
71286
71414
  *
71287
71415
  * @deprecated Use filter instead
71288
71416
  */
71289
- prefix?: string;
71417
+ prefix: string;
71290
71418
  /**
71291
71419
  * Whether the rule is currently being applied. Valid values: `Enabled` or `Disabled`.
71292
71420
  */
@@ -71310,7 +71438,7 @@ export declare namespace s3 {
71310
71438
  /**
71311
71439
  * Lifetime, in days, of the objects that are subject to the rule. The value must be a non-zero positive integer.
71312
71440
  */
71313
- days?: number;
71441
+ days: number;
71314
71442
  /**
71315
71443
  * Indicates whether Amazon S3 will remove a delete marker with no noncurrent versions. If set to `true`, the delete marker will be expired; if set to `false` the policy takes no action.
71316
71444
  */
@@ -71324,15 +71452,15 @@ export declare namespace s3 {
71324
71452
  /**
71325
71453
  * Minimum object size (in bytes) to which the rule applies.
71326
71454
  */
71327
- objectSizeGreaterThan?: string;
71455
+ objectSizeGreaterThan: number;
71328
71456
  /**
71329
71457
  * Maximum object size (in bytes) to which the rule applies.
71330
71458
  */
71331
- objectSizeLessThan?: string;
71459
+ objectSizeLessThan: number;
71332
71460
  /**
71333
71461
  * Prefix identifying one or more objects to which the rule applies. Defaults to an empty string (`""`) if not specified.
71334
71462
  */
71335
- prefix?: string;
71463
+ prefix: string;
71336
71464
  /**
71337
71465
  * Configuration block for specifying a tag key and value. See below.
71338
71466
  */
@@ -71342,15 +71470,15 @@ export declare namespace s3 {
71342
71470
  /**
71343
71471
  * Minimum object size to which the rule applies. Value must be at least `0` if specified. Defaults to 128000 (128 KB) for all `storageClass` values unless `transitionDefaultMinimumObjectSize` specifies otherwise.
71344
71472
  */
71345
- objectSizeGreaterThan?: number;
71473
+ objectSizeGreaterThan: number;
71346
71474
  /**
71347
71475
  * Maximum object size to which the rule applies. Value must be at least `1` if specified.
71348
71476
  */
71349
- objectSizeLessThan?: number;
71477
+ objectSizeLessThan: number;
71350
71478
  /**
71351
71479
  * Prefix identifying one or more objects to which the rule applies.
71352
71480
  */
71353
- prefix?: string;
71481
+ prefix: string;
71354
71482
  /**
71355
71483
  * Key-value map of resource tags. All of these tags must exist in the object's tag set in order for the rule to apply.
71356
71484
  */
@@ -71372,21 +71500,21 @@ export declare namespace s3 {
71372
71500
  /**
71373
71501
  * Number of noncurrent versions Amazon S3 will retain. Must be a non-zero positive integer.
71374
71502
  */
71375
- newerNoncurrentVersions?: string;
71503
+ newerNoncurrentVersions: number;
71376
71504
  /**
71377
71505
  * Number of days an object is noncurrent before Amazon S3 can perform the associated action. Must be a positive integer.
71378
71506
  */
71379
- noncurrentDays?: number;
71507
+ noncurrentDays: number;
71380
71508
  }
71381
71509
  interface BucketLifecycleConfigurationV2RuleNoncurrentVersionTransition {
71382
71510
  /**
71383
71511
  * Number of noncurrent versions Amazon S3 will retain. Must be a non-zero positive integer.
71384
71512
  */
71385
- newerNoncurrentVersions?: string;
71513
+ newerNoncurrentVersions: number;
71386
71514
  /**
71387
71515
  * Number of days an object is noncurrent before Amazon S3 can perform the associated action.
71388
71516
  */
71389
- noncurrentDays?: number;
71517
+ noncurrentDays: number;
71390
71518
  /**
71391
71519
  * Class of storage used to store the object. Valid Values: `GLACIER`, `STANDARD_IA`, `ONEZONE_IA`, `INTELLIGENT_TIERING`, `DEEP_ARCHIVE`, `GLACIER_IR`.
71392
71520
  */
@@ -71400,12 +71528,22 @@ export declare namespace s3 {
71400
71528
  /**
71401
71529
  * Number of days after creation when objects are transitioned to the specified storage class. The value must be a positive integer. If both `days` and `date` are not specified, defaults to `0`. Valid values depend on `storageClass`, see [Transition objects using Amazon S3 Lifecycle](https://docs.aws.amazon.com/AmazonS3/latest/userguide/lifecycle-transition-general-considerations.html) for more details.
71402
71530
  */
71403
- days?: number;
71531
+ days: number;
71404
71532
  /**
71405
71533
  * Class of storage used to store the object. Valid Values: `GLACIER`, `STANDARD_IA`, `ONEZONE_IA`, `INTELLIGENT_TIERING`, `DEEP_ARCHIVE`, `GLACIER_IR`.
71406
71534
  */
71407
71535
  storageClass: string;
71408
71536
  }
71537
+ interface BucketLifecycleConfigurationV2Timeouts {
71538
+ /**
71539
+ * A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as "30s" or "2h45m". Valid time units are "s" (seconds), "m" (minutes), "h" (hours).
71540
+ */
71541
+ create?: string;
71542
+ /**
71543
+ * A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as "30s" or "2h45m". Valid time units are "s" (seconds), "m" (minutes), "h" (hours).
71544
+ */
71545
+ update?: string;
71546
+ }
71409
71547
  interface BucketLifecycleRule {
71410
71548
  /**
71411
71549
  * Specifies the number of days after initiating a multipart upload when the multipart upload must be completed.
@@ -1 +1 @@
1
- {"version":3,"file":"output.js","sourceRoot":"","sources":["../../types/output.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AA+pwEjF,IAAiB,GAAG,CA6bnB;AA7bD,WAAiB,GAAG;IA4XhB;;OAEG;IACH,SAAgB,sCAAsC,CAAC,GAA4B;;QAC/E,uCACO,GAAG,KACN,WAAW,EAAE,MAAA,CAAC,GAAG,CAAC,WAAW,CAAC,mCAAI,WAAW,IAC/C;IACN,CAAC;IALe,0CAAsC,yCAKrD,CAAA;AAyDL,CAAC,EA7bgB,GAAG,GAAH,WAAG,KAAH,WAAG,QA6bnB"}
1
+ {"version":3,"file":"output.js","sourceRoot":"","sources":["../../types/output.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAuywEjF,IAAiB,GAAG,CA6bnB;AA7bD,WAAiB,GAAG;IA4XhB;;OAEG;IACH,SAAgB,sCAAsC,CAAC,GAA4B;;QAC/E,uCACO,GAAG,KACN,WAAW,EAAE,MAAA,CAAC,GAAG,CAAC,WAAW,CAAC,mCAAI,WAAW,IAC/C;IACN,CAAC;IALe,0CAAsC,yCAKrD,CAAA;AAyDL,CAAC,EA7bgB,GAAG,GAAH,WAAG,KAAH,WAAG,QA6bnB"}
package/wafv2/webAcl.d.ts CHANGED
@@ -59,7 +59,7 @@ export declare class WebAcl extends pulumi.CustomResource {
59
59
  */
60
60
  readonly name: pulumi.Output<string>;
61
61
  /**
62
- * Raw JSON string to allow more than three nested statements. Conflicts with `rule` attribute. This is for advanced use cases where more than 3 levels of nested statements are required. **There is no drift detection at this time**. If you use this attribute instead of `rule`, you will be foregoing drift detection. See the AWS [documentation](https://docs.aws.amazon.com/waf/latest/APIReference/API_CreateWebACL.html) for the JSON structure.
62
+ * Raw JSON string to allow more than three nested statements. Conflicts with `rule` attribute. This is for advanced use cases where more than 3 levels of nested statements are required. **There is no drift detection at this time**. If you use this attribute instead of `rule`, you will be foregoing drift detection. Additionally, importing an existing web ACL into a configuration with `ruleJson` set will result in a one time in-place update as the remote rule configuration is initially written to the `rule` attribute. See the AWS [documentation](https://docs.aws.amazon.com/waf/latest/APIReference/API_CreateWebACL.html) for the JSON structure.
63
63
  */
64
64
  readonly ruleJson: pulumi.Output<string | undefined>;
65
65
  /**
@@ -147,7 +147,7 @@ export interface WebAclState {
147
147
  */
148
148
  name?: pulumi.Input<string>;
149
149
  /**
150
- * Raw JSON string to allow more than three nested statements. Conflicts with `rule` attribute. This is for advanced use cases where more than 3 levels of nested statements are required. **There is no drift detection at this time**. If you use this attribute instead of `rule`, you will be foregoing drift detection. See the AWS [documentation](https://docs.aws.amazon.com/waf/latest/APIReference/API_CreateWebACL.html) for the JSON structure.
150
+ * Raw JSON string to allow more than three nested statements. Conflicts with `rule` attribute. This is for advanced use cases where more than 3 levels of nested statements are required. **There is no drift detection at this time**. If you use this attribute instead of `rule`, you will be foregoing drift detection. Additionally, importing an existing web ACL into a configuration with `ruleJson` set will result in a one time in-place update as the remote rule configuration is initially written to the `rule` attribute. See the AWS [documentation](https://docs.aws.amazon.com/waf/latest/APIReference/API_CreateWebACL.html) for the JSON structure.
151
151
  */
152
152
  ruleJson?: pulumi.Input<string>;
153
153
  /**
@@ -214,7 +214,7 @@ export interface WebAclArgs {
214
214
  */
215
215
  name?: pulumi.Input<string>;
216
216
  /**
217
- * Raw JSON string to allow more than three nested statements. Conflicts with `rule` attribute. This is for advanced use cases where more than 3 levels of nested statements are required. **There is no drift detection at this time**. If you use this attribute instead of `rule`, you will be foregoing drift detection. See the AWS [documentation](https://docs.aws.amazon.com/waf/latest/APIReference/API_CreateWebACL.html) for the JSON structure.
217
+ * Raw JSON string to allow more than three nested statements. Conflicts with `rule` attribute. This is for advanced use cases where more than 3 levels of nested statements are required. **There is no drift detection at this time**. If you use this attribute instead of `rule`, you will be foregoing drift detection. Additionally, importing an existing web ACL into a configuration with `ruleJson` set will result in a one time in-place update as the remote rule configuration is initially written to the `rule` attribute. See the AWS [documentation](https://docs.aws.amazon.com/waf/latest/APIReference/API_CreateWebACL.html) for the JSON structure.
218
218
  */
219
219
  ruleJson?: pulumi.Input<string>;
220
220
  /**