@pulumi/aws 7.0.0-alpha.1 → 7.0.0-alpha.1752855061

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (247) hide show
  1. package/accessanalyzer/analyzer.d.ts +54 -7
  2. package/accessanalyzer/analyzer.js +48 -1
  3. package/accessanalyzer/analyzer.js.map +1 -1
  4. package/amp/index.d.ts +3 -0
  5. package/amp/index.js +6 -1
  6. package/amp/index.js.map +1 -1
  7. package/amp/queryLoggingConfiguration.d.ts +107 -0
  8. package/amp/queryLoggingConfiguration.js +82 -0
  9. package/amp/queryLoggingConfiguration.js.map +1 -0
  10. package/amplify/app.d.ts +26 -0
  11. package/amplify/app.js +16 -0
  12. package/amplify/app.js.map +1 -1
  13. package/amplify/branch.d.ts +12 -0
  14. package/amplify/branch.js +2 -0
  15. package/amplify/branch.js.map +1 -1
  16. package/bedrock/agentAgent.d.ts +2 -2
  17. package/bedrock/agentAgent.js +2 -2
  18. package/bedrock/agentAgentCollaborator.d.ts +4 -4
  19. package/bedrock/agentAgentCollaborator.js +4 -4
  20. package/cloudfront/distribution.d.ts +12 -0
  21. package/cloudfront/distribution.js +2 -0
  22. package/cloudfront/distribution.js.map +1 -1
  23. package/cloudfront/getDistribution.d.ts +4 -0
  24. package/cloudfront/getDistribution.js.map +1 -1
  25. package/cloudtrail/trail.d.ts +2 -2
  26. package/cloudtrail/trail.js +2 -2
  27. package/cloudwatch/eventArchive.d.ts +91 -15
  28. package/cloudwatch/eventArchive.js +67 -1
  29. package/cloudwatch/eventArchive.js.map +1 -1
  30. package/cloudwatch/logGroup.d.ts +6 -6
  31. package/codeartifact/domainPermissions.d.ts +1 -1
  32. package/codeartifact/domainPermissions.js +0 -3
  33. package/codeartifact/domainPermissions.js.map +1 -1
  34. package/connect/botAssociation.d.ts +1 -1
  35. package/connect/botAssociation.js +1 -1
  36. package/controltower/controlTowerControl.d.ts +1 -1
  37. package/controltower/controlTowerControl.js +1 -1
  38. package/cur/reportDefinition.d.ts +3 -3
  39. package/datasync/agent.d.ts +1 -1
  40. package/datasync/agent.js +1 -1
  41. package/dynamodb/table.d.ts +36 -1
  42. package/dynamodb/table.js +36 -1
  43. package/dynamodb/table.js.map +1 -1
  44. package/dynamodb/tag.d.ts +1 -1
  45. package/dynamodb/tag.js +1 -1
  46. package/ec2/getManagedPrefixList.d.ts +2 -2
  47. package/ec2/getManagedPrefixList.js +2 -2
  48. package/ec2/securityGroupRule.d.ts +1 -1
  49. package/ec2/securityGroupRule.js +1 -1
  50. package/ec2/vpc.d.ts +2 -2
  51. package/ec2/vpc.js +2 -2
  52. package/ec2/vpcIpam.d.ts +1 -1
  53. package/ec2/vpcIpam.js +1 -1
  54. package/ec2/vpcIpamPool.d.ts +4 -4
  55. package/ec2/vpcIpamPool.js +4 -4
  56. package/ec2/vpcIpamPoolCidr.d.ts +3 -3
  57. package/ec2/vpcIpamPoolCidr.js +3 -3
  58. package/ec2/vpcIpamPoolCidrAllocation.d.ts +4 -4
  59. package/ec2/vpcIpamPoolCidrAllocation.js +4 -4
  60. package/ec2/vpcIpamPreviewNextCidr.d.ts +2 -2
  61. package/ec2/vpcIpamPreviewNextCidr.js +2 -2
  62. package/ec2/vpcIpamResourceDiscovery.d.ts +1 -1
  63. package/ec2/vpcIpamResourceDiscovery.js +1 -1
  64. package/ec2/vpcIpamScope.d.ts +1 -1
  65. package/ec2/vpcIpamScope.js +1 -1
  66. package/ecr/index.d.ts +1 -0
  67. package/ecr/index.js +1 -0
  68. package/ecr/index.js.map +1 -1
  69. package/ecr/lifecyclePolicyDocument.d.ts +5 -0
  70. package/ecr/lifecyclePolicyDocument.js +3 -0
  71. package/ecr/lifecyclePolicyDocument.js.map +1 -0
  72. package/ecr/registryPolicy.d.ts +1 -1
  73. package/ecr/registryPolicy.js +1 -1
  74. package/eks/cluster.d.ts +2 -4
  75. package/eks/cluster.js +0 -2
  76. package/eks/cluster.js.map +1 -1
  77. package/eks/podIdentityAssociation.d.ts +32 -0
  78. package/eks/podIdentityAssociation.js +6 -0
  79. package/eks/podIdentityAssociation.js.map +1 -1
  80. package/elasticsearch/domain.d.ts +2 -2
  81. package/elasticsearch/domain.js +2 -2
  82. package/emr/cluster.d.ts +12 -0
  83. package/emr/cluster.js +2 -0
  84. package/emr/cluster.js.map +1 -1
  85. package/fms/policy.d.ts +12 -0
  86. package/fms/policy.js +2 -0
  87. package/fms/policy.js.map +1 -1
  88. package/getRegion.d.ts +2 -2
  89. package/getService.d.ts +2 -2
  90. package/getService.js +2 -2
  91. package/glue/job.d.ts +12 -0
  92. package/glue/job.js +2 -0
  93. package/glue/job.js.map +1 -1
  94. package/glue/resourcePolicy.d.ts +1 -1
  95. package/glue/resourcePolicy.js +1 -1
  96. package/guardduty/detectorFeature.d.ts +21 -0
  97. package/guardduty/detectorFeature.js +21 -0
  98. package/guardduty/detectorFeature.js.map +1 -1
  99. package/guardduty/memberDetectorFeature.d.ts +1 -11
  100. package/guardduty/memberDetectorFeature.js +1 -11
  101. package/guardduty/memberDetectorFeature.js.map +1 -1
  102. package/guardduty/publishingDestination.d.ts +2 -2
  103. package/guardduty/publishingDestination.js +2 -2
  104. package/iam/documents.d.ts +5 -0
  105. package/iam/rolePolicy.d.ts +21 -15
  106. package/iam/rolePolicy.js.map +1 -1
  107. package/imagebuilder/imageRecipe.d.ts +1 -1
  108. package/imagebuilder/imageRecipe.js +1 -1
  109. package/kinesis/firehoseDeliveryStream.d.ts +1 -1
  110. package/kinesis/firehoseDeliveryStream.js +1 -1
  111. package/kinesis/getStreamConsumer.d.ts +9 -0
  112. package/kinesis/getStreamConsumer.js +2 -0
  113. package/kinesis/getStreamConsumer.js.map +1 -1
  114. package/kinesis/streamConsumer.d.ts +15 -0
  115. package/kinesis/streamConsumer.js +4 -0
  116. package/kinesis/streamConsumer.js.map +1 -1
  117. package/kms/getKey.d.ts +1 -1
  118. package/kms/key.d.ts +3 -3
  119. package/lightsail/instancePublicPorts.d.ts +6 -6
  120. package/macie/findingsFilter.d.ts +1 -1
  121. package/macie/findingsFilter.js +1 -1
  122. package/mediastore/containerPolicy.d.ts +1 -1
  123. package/mediastore/containerPolicy.js +1 -1
  124. package/networkfirewall/firewallPolicy.d.ts +51 -2
  125. package/networkfirewall/firewallPolicy.js +51 -2
  126. package/networkfirewall/firewallPolicy.js.map +1 -1
  127. package/networkmanager/dxGatewayAttachment.d.ts +1 -1
  128. package/networkmanager/dxGatewayAttachment.js +1 -1
  129. package/opensearch/domain.d.ts +2 -2
  130. package/opensearch/domain.js +2 -2
  131. package/opensearch/inboundConnectionAccepter.d.ts +2 -2
  132. package/opensearch/inboundConnectionAccepter.js +2 -2
  133. package/opensearch/outboundConnection.d.ts +2 -2
  134. package/opensearch/outboundConnection.js +2 -2
  135. package/opensearchingest/pipeline.d.ts +1 -1
  136. package/opensearchingest/pipeline.js +1 -1
  137. package/package.json +2 -2
  138. package/quicksight/dataSource.d.ts +1 -1
  139. package/quicksight/dataSource.js +1 -1
  140. package/rbin/rule.d.ts +52 -17
  141. package/rbin/rule.js +26 -1
  142. package/rbin/rule.js.map +1 -1
  143. package/route53/getTrafficPolicyDocument.d.ts +4 -4
  144. package/route53/getTrafficPolicyDocument.js +4 -4
  145. package/route53/profilesResourceAssociation.d.ts +1 -1
  146. package/s3/bucket.d.ts +5 -4
  147. package/s3/bucketAccelerateConfiguration.js +1 -1
  148. package/s3/bucketAccelerateConfiguration.js.map +1 -1
  149. package/s3/bucketAccelerateConfigurationV2.d.ts +122 -0
  150. package/s3/bucketAccelerateConfigurationV2.js +103 -0
  151. package/s3/bucketAccelerateConfigurationV2.js.map +1 -0
  152. package/s3/bucketAcl.js +1 -1
  153. package/s3/bucketAcl.js.map +1 -1
  154. package/s3/bucketAclV2.d.ts +241 -0
  155. package/s3/bucketAclV2.js +207 -0
  156. package/s3/bucketAclV2.js.map +1 -0
  157. package/s3/bucketCorsConfiguration.js +1 -1
  158. package/s3/bucketCorsConfiguration.js.map +1 -1
  159. package/s3/bucketCorsConfigurationV2.d.ts +141 -0
  160. package/s3/bucketCorsConfigurationV2.js +120 -0
  161. package/s3/bucketCorsConfigurationV2.js.map +1 -0
  162. package/s3/bucketLifecycleConfiguration.js +1 -1
  163. package/s3/bucketLifecycleConfiguration.js.map +1 -1
  164. package/s3/bucketLifecycleConfigurationV2.d.ts +437 -0
  165. package/s3/bucketLifecycleConfigurationV2.js +402 -0
  166. package/s3/bucketLifecycleConfigurationV2.js.map +1 -0
  167. package/s3/bucketLogging.js +1 -1
  168. package/s3/bucketLogging.js.map +1 -1
  169. package/s3/bucketLoggingV2.d.ts +174 -0
  170. package/s3/bucketLoggingV2.js +126 -0
  171. package/s3/bucketLoggingV2.js.map +1 -0
  172. package/s3/bucketObjectLockConfiguration.js +1 -1
  173. package/s3/bucketObjectLockConfiguration.js.map +1 -1
  174. package/s3/bucketObjectLockConfigurationV2.d.ts +164 -0
  175. package/s3/bucketObjectLockConfigurationV2.js +119 -0
  176. package/s3/bucketObjectLockConfigurationV2.js.map +1 -0
  177. package/s3/bucketPolicy.d.ts +2 -0
  178. package/s3/bucketPolicy.js +2 -0
  179. package/s3/bucketPolicy.js.map +1 -1
  180. package/s3/bucketRequestPaymentConfiguration.js +1 -1
  181. package/s3/bucketRequestPaymentConfiguration.js.map +1 -1
  182. package/s3/bucketRequestPaymentConfigurationV2.d.ts +123 -0
  183. package/s3/bucketRequestPaymentConfigurationV2.js +104 -0
  184. package/s3/bucketRequestPaymentConfigurationV2.js.map +1 -0
  185. package/s3/bucketServerSideEncryptionConfiguration.js +1 -1
  186. package/s3/bucketServerSideEncryptionConfiguration.js.map +1 -1
  187. package/s3/bucketServerSideEncryptionConfigurationV2.d.ts +133 -0
  188. package/s3/bucketServerSideEncryptionConfigurationV2.js +112 -0
  189. package/s3/bucketServerSideEncryptionConfigurationV2.js.map +1 -0
  190. package/s3/bucketV2.d.ts +518 -0
  191. package/s3/bucketV2.js +138 -0
  192. package/s3/bucketV2.js.map +1 -0
  193. package/s3/bucketVersioning.js +1 -1
  194. package/s3/bucketVersioning.js.map +1 -1
  195. package/s3/bucketVersioningV2.d.ts +195 -0
  196. package/s3/bucketVersioningV2.js +164 -0
  197. package/s3/bucketVersioningV2.js.map +1 -0
  198. package/s3/bucketWebsiteConfiguration.js +1 -1
  199. package/s3/bucketWebsiteConfiguration.js.map +1 -1
  200. package/s3/bucketWebsiteConfigurationV2.d.ts +231 -0
  201. package/s3/bucketWebsiteConfigurationV2.js +152 -0
  202. package/s3/bucketWebsiteConfigurationV2.js.map +1 -0
  203. package/s3/directoryBucket.d.ts +30 -0
  204. package/s3/directoryBucket.js +4 -0
  205. package/s3/directoryBucket.js.map +1 -1
  206. package/s3/index.d.ts +33 -0
  207. package/s3/index.js +57 -1
  208. package/s3/index.js.map +1 -1
  209. package/s3tables/table.d.ts +62 -0
  210. package/s3tables/table.js +49 -0
  211. package/s3tables/table.js.map +1 -1
  212. package/sagemaker/flowDefinition.d.ts +1 -1
  213. package/sagemaker/flowDefinition.js +1 -1
  214. package/securityhub/productSubscription.d.ts +1 -1
  215. package/securityhub/productSubscription.js +1 -1
  216. package/securityhub/standardsSubscription.d.ts +1 -1
  217. package/securityhub/standardsSubscription.js +1 -1
  218. package/serverlessrepository/cloudFormationStack.d.ts +1 -1
  219. package/serverlessrepository/cloudFormationStack.js +1 -1
  220. package/shield/drtAccessLogBucketAssociation.d.ts +1 -1
  221. package/shield/drtAccessLogBucketAssociation.js +1 -1
  222. package/shield/protection.d.ts +1 -1
  223. package/shield/protection.js +1 -1
  224. package/shield/protectionGroup.d.ts +2 -2
  225. package/shield/protectionGroup.js +2 -2
  226. package/shield/protectionHealthCheckAssociation.d.ts +1 -1
  227. package/shield/protectionHealthCheckAssociation.js +1 -1
  228. package/ssm/parameter.d.ts +1 -1
  229. package/ssm/quicksetupConfigurationManager.d.ts +2 -2
  230. package/ssm/quicksetupConfigurationManager.js +2 -2
  231. package/ssoadmin/applicationAccessScope.d.ts +1 -1
  232. package/ssoadmin/applicationAccessScope.js +1 -1
  233. package/ssoadmin/applicationAssignment.d.ts +2 -2
  234. package/ssoadmin/applicationAssignment.js +2 -2
  235. package/ssoadmin/applicationAssignmentConfiguration.d.ts +1 -1
  236. package/ssoadmin/applicationAssignmentConfiguration.js +1 -1
  237. package/ssoadmin/getApplicationAssignments.d.ts +2 -2
  238. package/ssoadmin/getApplicationAssignments.js +2 -2
  239. package/types/enums/index.d.ts +1 -0
  240. package/types/enums/index.js +1 -0
  241. package/types/enums/index.js.map +1 -1
  242. package/types/input.d.ts +977 -34
  243. package/types/input.js +1 -20
  244. package/types/input.js.map +1 -1
  245. package/types/output.d.ts +971 -35
  246. package/types/output.js +1 -20
  247. package/types/output.js.map +1 -1
package/types/output.d.ts CHANGED
@@ -32,33 +32,63 @@ export interface GetRegionsFilter {
32
32
  export declare namespace accessanalyzer {
33
33
  interface AnalyzerConfiguration {
34
34
  /**
35
- * A block that specifies the configuration of an unused access analyzer for an AWS organization or account. Documented below
35
+ * Specifies the configuration of an internal access analyzer for an AWS organization or account. This configuration determines how the analyzer evaluates access within your AWS environment. See `internalAccess` Block for details.
36
+ */
37
+ internalAccess?: outputs.accessanalyzer.AnalyzerConfigurationInternalAccess;
38
+ /**
39
+ * Specifies the configuration of an unused access analyzer for an AWS organization or account. See `unusedAccess` Block for details.
36
40
  */
37
41
  unusedAccess?: outputs.accessanalyzer.AnalyzerConfigurationUnusedAccess;
38
42
  }
43
+ interface AnalyzerConfigurationInternalAccess {
44
+ /**
45
+ * Information about analysis rules for the internal access analyzer. These rules determine which resources and access patterns will be analyzed. See `analysisRule` Block for Internal Access Analyzer for details.
46
+ */
47
+ analysisRule?: outputs.accessanalyzer.AnalyzerConfigurationInternalAccessAnalysisRule;
48
+ }
49
+ interface AnalyzerConfigurationInternalAccessAnalysisRule {
50
+ /**
51
+ * List of rules for the internal access analyzer containing criteria to include in analysis. Only resources that meet the rule criteria will generate findings. See `inclusion` Block for details.
52
+ */
53
+ inclusions?: outputs.accessanalyzer.AnalyzerConfigurationInternalAccessAnalysisRuleInclusion[];
54
+ }
55
+ interface AnalyzerConfigurationInternalAccessAnalysisRuleInclusion {
56
+ /**
57
+ * List of AWS account IDs to apply to the internal access analysis rule criteria. Account IDs can only be applied to the analysis rule criteria for organization-level analyzers.
58
+ */
59
+ accountIds?: string[];
60
+ /**
61
+ * List of resource ARNs to apply to the internal access analysis rule criteria. The analyzer will only generate findings for resources that match these ARNs.
62
+ */
63
+ resourceArns?: string[];
64
+ /**
65
+ * List of resource types to apply to the internal access analysis rule criteria. The analyzer will only generate findings for resources of these types. Refer to [InternalAccessAnalysisRuleCriteria](https://docs.aws.amazon.com/access-analyzer/latest/APIReference/API_InternalAccessAnalysisRuleCriteria.html) in the AWS IAM Access Analyzer API Reference for valid values.
66
+ */
67
+ resourceTypes?: string[];
68
+ }
39
69
  interface AnalyzerConfigurationUnusedAccess {
40
70
  /**
41
- * A block for analysis rules. Documented below
71
+ * Information about analysis rules for the analyzer. Analysis rules determine which entities will generate findings based on the criteria you define when you create the rule. See `analysisRule` Block for Unused Access Analyzer for details.
42
72
  */
43
73
  analysisRule?: outputs.accessanalyzer.AnalyzerConfigurationUnusedAccessAnalysisRule;
44
74
  /**
45
- * The specified access age in days for which to generate findings for unused access.
75
+ * Specified access age in days for which to generate findings for unused access.
46
76
  */
47
77
  unusedAccessAge?: number;
48
78
  }
49
79
  interface AnalyzerConfigurationUnusedAccessAnalysisRule {
50
80
  /**
51
- * A block for the analyzer rules containing criteria to exclude from analysis. Documented below
81
+ * List of rules for the analyzer containing criteria to exclude from analysis. Entities that meet the rule criteria will not generate findings. See `exclusion` Block for details.
52
82
  */
53
83
  exclusions?: outputs.accessanalyzer.AnalyzerConfigurationUnusedAccessAnalysisRuleExclusion[];
54
84
  }
55
85
  interface AnalyzerConfigurationUnusedAccessAnalysisRuleExclusion {
56
86
  /**
57
- * A list of account IDs to exclude from the analysis.
87
+ * List of AWS account IDs to apply to the analysis rule criteria. The accounts cannot include the organization analyzer owner account. Account IDs can only be applied to the analysis rule criteria for organization-level analyzers.
58
88
  */
59
89
  accountIds?: string[];
60
90
  /**
61
- * A list of key-value pairs for resource tags to exclude from the analysis.
91
+ * List of key-value pairs for resource tags to exclude from the analysis.
62
92
  */
63
93
  resourceTags?: {
64
94
  [key: string]: string;
@@ -1068,6 +1098,42 @@ export declare namespace alb {
1068
1098
  }
1069
1099
  }
1070
1100
  export declare namespace amp {
1101
+ interface QueryLoggingConfigurationDestination {
1102
+ /**
1103
+ * Configuration block for CloudWatch Logs destination. See `cloudwatchLogs`.
1104
+ */
1105
+ cloudwatchLogs?: outputs.amp.QueryLoggingConfigurationDestinationCloudwatchLogs;
1106
+ /**
1107
+ * A list of filter configurations that specify which logs should be sent to the destination. See `filters`.
1108
+ */
1109
+ filters?: outputs.amp.QueryLoggingConfigurationDestinationFilters;
1110
+ }
1111
+ interface QueryLoggingConfigurationDestinationCloudwatchLogs {
1112
+ /**
1113
+ * The ARN of the CloudWatch log group to which query logs will be sent.
1114
+ */
1115
+ logGroupArn: string;
1116
+ }
1117
+ interface QueryLoggingConfigurationDestinationFilters {
1118
+ /**
1119
+ * The Query Samples Processed (QSP) threshold above which queries will be logged. Queries processing more samples than this threshold will be captured in logs.
1120
+ */
1121
+ qspThreshold: number;
1122
+ }
1123
+ interface QueryLoggingConfigurationTimeouts {
1124
+ /**
1125
+ * A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as "30s" or "2h45m". Valid time units are "s" (seconds), "m" (minutes), "h" (hours).
1126
+ */
1127
+ create?: string;
1128
+ /**
1129
+ * A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as "30s" or "2h45m". Valid time units are "s" (seconds), "m" (minutes), "h" (hours). Setting a timeout for a Delete operation is only applicable if changes are saved into state before the destroy operation occurs.
1130
+ */
1131
+ delete?: string;
1132
+ /**
1133
+ * A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as "30s" or "2h45m". Valid time units are "s" (seconds), "m" (minutes), "h" (hours).
1134
+ */
1135
+ update?: string;
1136
+ }
1071
1137
  interface ScraperDestination {
1072
1138
  /**
1073
1139
  * Configuration block for an Amazon Managed Prometheus workspace destination. See `amp`.
@@ -1225,6 +1291,12 @@ export declare namespace amplify {
1225
1291
  */
1226
1292
  target: string;
1227
1293
  }
1294
+ interface AppJobConfig {
1295
+ /**
1296
+ * Size of the build instance. Valid values: `STANDARD_8GB`, `LARGE_16GB`, and `XLARGE_72GB`. Default: `STANDARD_8GB`.
1297
+ */
1298
+ buildComputeType: string;
1299
+ }
1228
1300
  interface AppProductionBranch {
1229
1301
  /**
1230
1302
  * Branch name for the production branch.
@@ -16159,6 +16231,10 @@ export declare namespace codebuild {
16159
16231
  * the [CodeBuild User Guide](https://docs.aws.amazon.com/codebuild/latest/userguide/build-env-ref-compute-types.html).
16160
16232
  */
16161
16233
  computeType: string;
16234
+ /**
16235
+ * Configuration block. Detailed below.
16236
+ */
16237
+ dockerServer?: outputs.codebuild.ProjectEnvironmentDockerServer;
16162
16238
  /**
16163
16239
  * Configuration block. Detailed below.
16164
16240
  */
@@ -16198,6 +16274,16 @@ export declare namespace codebuild {
16198
16274
  */
16199
16275
  type: string;
16200
16276
  }
16277
+ interface ProjectEnvironmentDockerServer {
16278
+ /**
16279
+ * Compute type for the Docker server. Valid values: `BUILD_GENERAL1_SMALL`, `BUILD_GENERAL1_MEDIUM`, `BUILD_GENERAL1_LARGE`, `BUILD_GENERAL1_XLARGE`, and `BUILD_GENERAL1_2XLARGE`.
16280
+ */
16281
+ computeType: string;
16282
+ /**
16283
+ * List of security group IDs to assign to the Docker server.
16284
+ */
16285
+ securityGroupIds?: string[];
16286
+ }
16201
16287
  interface ProjectEnvironmentEnvironmentVariable {
16202
16288
  /**
16203
16289
  * Environment variable's name or key.
@@ -25575,6 +25661,10 @@ export declare namespace dynamodb {
25575
25661
  * ARN of the table
25576
25662
  */
25577
25663
  arn: string;
25664
+ /**
25665
+ * Whether this global table will be using `STRONG` consistency mode or `EVENTUAL` consistency mode. Default value is `EVENTUAL`.
25666
+ */
25667
+ consistencyMode?: string;
25578
25668
  /**
25579
25669
  * ARN of the CMK that should be used for the AWS KMS encryption.
25580
25670
  * This argument should only be used if the key is different from the default KMS-managed DynamoDB key, `alias/aws/dynamodb`.
@@ -30707,7 +30797,7 @@ export declare namespace ec2 {
30707
30797
  /**
30708
30798
  * Description of this egress rule.
30709
30799
  */
30710
- description: string;
30800
+ description?: string;
30711
30801
  /**
30712
30802
  * Start port (or ICMP type number if protocol is `icmp`)
30713
30803
  */
@@ -30741,10 +30831,6 @@ export declare namespace ec2 {
30741
30831
  */
30742
30832
  toPort: number;
30743
30833
  }
30744
- /**
30745
- * securityGroupEgressProvideDefaults sets the appropriate defaults for SecurityGroupEgress
30746
- */
30747
- function securityGroupEgressProvideDefaults(val: SecurityGroupEgress): SecurityGroupEgress;
30748
30834
  interface SecurityGroupIngress {
30749
30835
  /**
30750
30836
  * List of CIDR blocks.
@@ -30753,7 +30839,7 @@ export declare namespace ec2 {
30753
30839
  /**
30754
30840
  * Description of this ingress rule.
30755
30841
  */
30756
- description: string;
30842
+ description?: string;
30757
30843
  /**
30758
30844
  * Start port (or ICMP type number if protocol is `icmp` or `icmpv6`).
30759
30845
  */
@@ -30787,10 +30873,6 @@ export declare namespace ec2 {
30787
30873
  */
30788
30874
  toPort: number;
30789
30875
  }
30790
- /**
30791
- * securityGroupIngressProvideDefaults sets the appropriate defaults for SecurityGroupIngress
30792
- */
30793
- function securityGroupIngressProvideDefaults(val: SecurityGroupIngress): SecurityGroupIngress;
30794
30876
  interface SpotFleetRequestLaunchSpecification {
30795
30877
  ami: string;
30796
30878
  associatePublicIpAddress?: boolean;
@@ -60991,25 +61073,23 @@ export declare namespace lightsail {
60991
61073
  */
60992
61074
  cidrListAliases: string[];
60993
61075
  /**
60994
- * Set of CIDR blocks.
61076
+ * Set of IPv4 addresses or ranges of IPv4 addresses (in CIDR notation) that are allowed to connect to an instance through the ports, and the protocol.
60995
61077
  */
60996
61078
  cidrs: string[];
60997
61079
  /**
60998
- * First port in a range of open ports on an instance.
61080
+ * First port in a range of open ports on an instance. See [PortInfo](https://docs.aws.amazon.com/lightsail/2016-11-28/api-reference/API_PortInfo.html) for details.
60999
61081
  */
61000
61082
  fromPort: number;
61001
61083
  /**
61002
- * Set of IPv6 CIDR blocks.
61084
+ * Set of IPv6 addresses or ranges of IPv6 addresses (in CIDR notation) that are allowed to connect to an instance through the ports, and the protocol.
61003
61085
  */
61004
61086
  ipv6Cidrs: string[];
61005
61087
  /**
61006
- * IP protocol name. Valid values: `tcp`, `all`, `udp`, `icmp`.
61088
+ * IP protocol name. Valid values: `tcp`, `all`, `udp`, `icmp`, `icmpv6`. See [PortInfo](https://docs.aws.amazon.com/lightsail/2016-11-28/api-reference/API_PortInfo.html) for details.
61007
61089
  */
61008
61090
  protocol: string;
61009
61091
  /**
61010
- * Last port in a range of open ports on an instance.
61011
- *
61012
- * The following arguments are optional:
61092
+ * Last port in a range of open ports on an instance. See [PortInfo](https://docs.aws.amazon.com/lightsail/2016-11-28/api-reference/API_PortInfo.html) for details.
61013
61093
  */
61014
61094
  toPort: number;
61015
61095
  }
@@ -65409,6 +65489,12 @@ export declare namespace networkfirewall {
65409
65489
  tcpIdleTimeoutSeconds?: number;
65410
65490
  }
65411
65491
  interface FirewallPolicyFirewallPolicyStatefulRuleGroupReference {
65492
+ /**
65493
+ * Whether to enable deep threat inspection, which allows AWS to analyze service logs of network traffic processed by these rule groups to identify threat indicators across customers. AWS will use these threat indicators to improve the active threat defense managed rule groups and protect the security of AWS customers and services. This only applies to active threat defense maanaged rule groups.
65494
+ *
65495
+ * For details, refer to [AWS active threat defense for AWS Network Firewall](https://docs.aws.amazon.com/network-firewall/latest/developerguide/aws-managed-rule-groups-atd.html) in the AWS Network Firewall Developer Guide.
65496
+ */
65497
+ deepThreatInspection: string;
65412
65498
  /**
65413
65499
  * Configuration block for override values
65414
65500
  */
@@ -65574,6 +65660,7 @@ export declare namespace networkfirewall {
65574
65660
  streamExceptionPolicy: string;
65575
65661
  }
65576
65662
  interface GetFirewallPolicyFirewallPolicyStatefulRuleGroupReference {
65663
+ deepThreatInspection: string;
65577
65664
  overrides?: outputs.networkfirewall.GetFirewallPolicyFirewallPolicyStatefulRuleGroupReferenceOverride[];
65578
65665
  priority: number;
65579
65666
  resourceArn: string;
@@ -66262,6 +66349,10 @@ export declare namespace networkmanager {
66262
66349
  * List of strings containing Autonomous System Numbers (ASNs) to assign to Core Network Edges. By default, the core network automatically assigns an ASN for each Core Network Edge but you can optionally define the ASN in the edge-locations for each Region. The ASN uses an array of integer ranges only from `64512` to `65534` and `4200000000` to `4294967294` expressed as a string like `"64512-65534"`. No other ASN ranges can be used.
66263
66350
  */
66264
66351
  asnRanges: string[];
66352
+ /**
66353
+ * Indicates whether DNS resolution is enabled for the core network. The value can be either `true` or `false`. When set to `true`, DNS resolution is enabled for VPCs attached to the core network, allowing resources in different VPCs to resolve each other's domain names. The default is `true`.
66354
+ */
66355
+ dnsSupport?: boolean;
66265
66356
  /**
66266
66357
  * A block value of AWS Region locations where you're creating Core Network Edges. Detailed below.
66267
66358
  */
@@ -66270,6 +66361,10 @@ export declare namespace networkmanager {
66270
66361
  * The Classless Inter-Domain Routing (CIDR) block range used to create tunnels for AWS Transit Gateway Connect. The format is standard AWS CIDR range (for example, `10.0.1.0/24`). You can optionally define the inside CIDR in the Core Network Edges section per Region. The minimum is a `/24` for IPv4 or `/64` for IPv6. You can provide multiple `/24` subnets or a larger CIDR range. If you define a larger CIDR range, new Core Network Edges will be automatically assigned `/24` and `/64` subnets from the larger CIDR. an Inside CIDR block is required for attaching Connect attachments to a Core Network Edge.
66271
66362
  */
66272
66363
  insideCidrBlocks?: string[];
66364
+ /**
66365
+ * — (Optional) Indicates whether security group referencing is enabled for the core network. The value can be either `true` or `false`. When set to `true`, security groups in one VPC can reference security groups in another VPC attached to the core network, enabling more flexible security configurations across your network. The default is `false`.
66366
+ */
66367
+ securityGroupReferencingSupport?: boolean;
66273
66368
  /**
66274
66369
  * Indicates whether the core network forwards traffic over multiple equal-cost routes using VPN. The value can be either `true` or `false`. The default is `true`.
66275
66370
  */
@@ -70496,6 +70591,18 @@ export declare namespace ram {
70496
70591
  }
70497
70592
  }
70498
70593
  export declare namespace rbin {
70594
+ interface RuleExcludeResourceTag {
70595
+ /**
70596
+ * Tag key.
70597
+ *
70598
+ * The following argument is optional:
70599
+ */
70600
+ resourceTagKey: string;
70601
+ /**
70602
+ * Tag value.
70603
+ */
70604
+ resourceTagValue?: string;
70605
+ }
70499
70606
  interface RuleLockConfiguration {
70500
70607
  /**
70501
70608
  * Information about the retention rule unlock delay. See `unlockDelay` below.
@@ -70504,33 +70611,33 @@ export declare namespace rbin {
70504
70611
  }
70505
70612
  interface RuleLockConfigurationUnlockDelay {
70506
70613
  /**
70507
- * The unit of time in which to measure the unlock delay. Currently, the unlock delay can be measure only in days.
70614
+ * Unit of time in which to measure the unlock delay. Currently, the unlock delay can be measure only in days.
70508
70615
  */
70509
70616
  unlockDelayUnit: string;
70510
70617
  /**
70511
- * The unlock delay period, measured in the unit specified for UnlockDelayUnit.
70618
+ * Unlock delay period, measured in the unit specified for UnlockDelayUnit.
70512
70619
  */
70513
70620
  unlockDelayValue: number;
70514
70621
  }
70515
70622
  interface RuleResourceTag {
70516
70623
  /**
70517
- * The tag key.
70624
+ * Tag key.
70518
70625
  *
70519
70626
  * The following argument is optional:
70520
70627
  */
70521
70628
  resourceTagKey: string;
70522
70629
  /**
70523
- * The tag value.
70630
+ * Tag value.
70524
70631
  */
70525
70632
  resourceTagValue?: string;
70526
70633
  }
70527
70634
  interface RuleRetentionPeriod {
70528
70635
  /**
70529
- * The unit of time in which the retention period is measured. Currently, only DAYS is supported.
70636
+ * Unit of time in which the retention period is measured. Currently, only DAYS is supported.
70530
70637
  */
70531
70638
  retentionPeriodUnit: string;
70532
70639
  /**
70533
- * The period value for which the retention rule is to retain resources. The period is measured using the unit specified for RetentionPeriodUnit.
70640
+ * Period value for which the retention rule is to retain resources. The period is measured using the unit specified for RetentionPeriodUnit.
70534
70641
  */
70535
70642
  retentionPeriodValue: number;
70536
70643
  }
@@ -73223,6 +73330,58 @@ export declare namespace s3 {
73223
73330
  */
73224
73331
  id: string;
73225
73332
  }
73333
+ interface BucketAclV2AccessControlPolicy {
73334
+ /**
73335
+ * Set of `grant` configuration blocks. See below.
73336
+ */
73337
+ grants?: outputs.s3.BucketAclV2AccessControlPolicyGrant[];
73338
+ /**
73339
+ * Configuration block for the bucket owner's display name and ID. See below.
73340
+ */
73341
+ owner: outputs.s3.BucketAclV2AccessControlPolicyOwner;
73342
+ }
73343
+ interface BucketAclV2AccessControlPolicyGrant {
73344
+ /**
73345
+ * Configuration block for the person being granted permissions. See below.
73346
+ */
73347
+ grantee?: outputs.s3.BucketAclV2AccessControlPolicyGrantGrantee;
73348
+ /**
73349
+ * Logging permissions assigned to the grantee for the bucket. Valid values: `FULL_CONTROL`, `WRITE`, `WRITE_ACP`, `READ`, `READ_ACP`. See [What permissions can I grant?](https://docs.aws.amazon.com/AmazonS3/latest/userguide/acl-overview.html#permissions) for more details about what each permission means in the context of buckets.
73350
+ */
73351
+ permission: string;
73352
+ }
73353
+ interface BucketAclV2AccessControlPolicyGrantGrantee {
73354
+ /**
73355
+ * Display name of the owner.
73356
+ */
73357
+ displayName: string;
73358
+ /**
73359
+ * Email address of the grantee. See [Regions and Endpoints](https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region) for supported AWS regions where this argument can be specified.
73360
+ */
73361
+ emailAddress?: string;
73362
+ /**
73363
+ * Canonical user ID of the grantee.
73364
+ */
73365
+ id?: string;
73366
+ /**
73367
+ * Type of grantee. Valid values: `CanonicalUser`, `AmazonCustomerByEmail`, `Group`.
73368
+ */
73369
+ type: string;
73370
+ /**
73371
+ * URI of the grantee group.
73372
+ */
73373
+ uri?: string;
73374
+ }
73375
+ interface BucketAclV2AccessControlPolicyOwner {
73376
+ /**
73377
+ * Display name of the owner.
73378
+ */
73379
+ displayName: string;
73380
+ /**
73381
+ * ID of the owner.
73382
+ */
73383
+ id: string;
73384
+ }
73226
73385
  interface BucketCorsConfigurationCorsRule {
73227
73386
  /**
73228
73387
  * Set of Headers that are specified in the `Access-Control-Request-Headers` header.
@@ -73249,6 +73408,32 @@ export declare namespace s3 {
73249
73408
  */
73250
73409
  maxAgeSeconds?: number;
73251
73410
  }
73411
+ interface BucketCorsConfigurationV2CorsRule {
73412
+ /**
73413
+ * Set of Headers that are specified in the `Access-Control-Request-Headers` header.
73414
+ */
73415
+ allowedHeaders?: string[];
73416
+ /**
73417
+ * Set of HTTP methods that you allow the origin to execute. Valid values are `GET`, `PUT`, `HEAD`, `POST`, and `DELETE`.
73418
+ */
73419
+ allowedMethods: string[];
73420
+ /**
73421
+ * Set of origins you want customers to be able to access the bucket from.
73422
+ */
73423
+ allowedOrigins: string[];
73424
+ /**
73425
+ * Set of headers in the response that you want customers to be able to access from their applications (for example, from a JavaScript `XMLHttpRequest` object).
73426
+ */
73427
+ exposeHeaders?: string[];
73428
+ /**
73429
+ * Unique identifier for the rule. The value cannot be longer than 255 characters.
73430
+ */
73431
+ id?: string;
73432
+ /**
73433
+ * Time in seconds that your browser is to cache the preflight response for the specified resource.
73434
+ */
73435
+ maxAgeSeconds?: number;
73436
+ }
73252
73437
  interface BucketCorsRule {
73253
73438
  /**
73254
73439
  * List of headers allowed.
@@ -73480,6 +73665,175 @@ export declare namespace s3 {
73480
73665
  */
73481
73666
  update?: string;
73482
73667
  }
73668
+ interface BucketLifecycleConfigurationV2Rule {
73669
+ /**
73670
+ * Configuration block that specifies the days since the initiation of an incomplete multipart upload that Amazon S3 will wait before permanently removing all parts of the upload. See below.
73671
+ */
73672
+ abortIncompleteMultipartUpload?: outputs.s3.BucketLifecycleConfigurationV2RuleAbortIncompleteMultipartUpload;
73673
+ /**
73674
+ * Configuration block that specifies the expiration for the lifecycle of the object in the form of date, days and, whether the object has a delete marker. See below.
73675
+ */
73676
+ expiration?: outputs.s3.BucketLifecycleConfigurationV2RuleExpiration;
73677
+ /**
73678
+ * Configuration block used to identify objects that a Lifecycle Rule applies to.
73679
+ * See below.
73680
+ * If not specified, the `rule` will default to using `prefix`.
73681
+ * One of `filter` or `prefix` should be specified.
73682
+ */
73683
+ filter?: outputs.s3.BucketLifecycleConfigurationV2RuleFilter;
73684
+ /**
73685
+ * Unique identifier for the rule. The value cannot be longer than 255 characters.
73686
+ */
73687
+ id: string;
73688
+ /**
73689
+ * Configuration block that specifies when noncurrent object versions expire. See below.
73690
+ */
73691
+ noncurrentVersionExpiration?: outputs.s3.BucketLifecycleConfigurationV2RuleNoncurrentVersionExpiration;
73692
+ /**
73693
+ * Set of configuration blocks that specify the transition rule for the lifecycle rule that describes when noncurrent objects transition to a specific storage class. See below.
73694
+ */
73695
+ noncurrentVersionTransitions?: outputs.s3.BucketLifecycleConfigurationV2RuleNoncurrentVersionTransition[];
73696
+ /**
73697
+ * **DEPRECATED** Use `filter` instead.
73698
+ * This has been deprecated by Amazon S3.
73699
+ * Prefix identifying one or more objects to which the rule applies.
73700
+ * Defaults to an empty string (`""`) if `filter` is not specified.
73701
+ * One of `prefix` or `filter` should be specified.
73702
+ *
73703
+ * @deprecated Specify a prefix using 'filter' instead
73704
+ */
73705
+ prefix: string;
73706
+ /**
73707
+ * Whether the rule is currently being applied. Valid values: `Enabled` or `Disabled`.
73708
+ */
73709
+ status: string;
73710
+ /**
73711
+ * Set of configuration blocks that specify when an Amazon S3 object transitions to a specified storage class. See below.
73712
+ */
73713
+ transitions?: outputs.s3.BucketLifecycleConfigurationV2RuleTransition[];
73714
+ }
73715
+ interface BucketLifecycleConfigurationV2RuleAbortIncompleteMultipartUpload {
73716
+ /**
73717
+ * Number of days after which Amazon S3 aborts an incomplete multipart upload.
73718
+ */
73719
+ daysAfterInitiation?: number;
73720
+ }
73721
+ interface BucketLifecycleConfigurationV2RuleExpiration {
73722
+ /**
73723
+ * Date the object is to be moved or deleted. The date value must be in [RFC3339 full-date format](https://datatracker.ietf.org/doc/html/rfc3339#section-5.6) e.g. `2023-08-22`.
73724
+ */
73725
+ date?: string;
73726
+ /**
73727
+ * Lifetime, in days, of the objects that are subject to the rule. The value must be a non-zero positive integer.
73728
+ */
73729
+ days: number;
73730
+ /**
73731
+ * Indicates whether Amazon S3 will remove a delete marker with no noncurrent versions. If set to `true`, the delete marker will be expired; if set to `false` the policy takes no action.
73732
+ */
73733
+ expiredObjectDeleteMarker: boolean;
73734
+ }
73735
+ interface BucketLifecycleConfigurationV2RuleFilter {
73736
+ /**
73737
+ * Configuration block used to apply a logical `AND` to two or more predicates. See below. The Lifecycle Rule will apply to any object matching all the predicates configured inside the `and` block.
73738
+ */
73739
+ and?: outputs.s3.BucketLifecycleConfigurationV2RuleFilterAnd;
73740
+ /**
73741
+ * Minimum object size (in bytes) to which the rule applies.
73742
+ */
73743
+ objectSizeGreaterThan: number;
73744
+ /**
73745
+ * Maximum object size (in bytes) to which the rule applies.
73746
+ */
73747
+ objectSizeLessThan: number;
73748
+ /**
73749
+ * Prefix identifying one or more objects to which the rule applies. Defaults to an empty string (`""`) if not specified.
73750
+ */
73751
+ prefix: string;
73752
+ /**
73753
+ * Configuration block for specifying a tag key and value. See below.
73754
+ */
73755
+ tag?: outputs.s3.BucketLifecycleConfigurationV2RuleFilterTag;
73756
+ }
73757
+ interface BucketLifecycleConfigurationV2RuleFilterAnd {
73758
+ /**
73759
+ * Minimum object size to which the rule applies. Value must be at least `0` if specified. Defaults to 128000 (128 KB) for all `storageClass` values unless `transitionDefaultMinimumObjectSize` specifies otherwise.
73760
+ */
73761
+ objectSizeGreaterThan: number;
73762
+ /**
73763
+ * Maximum object size to which the rule applies. Value must be at least `1` if specified.
73764
+ */
73765
+ objectSizeLessThan: number;
73766
+ /**
73767
+ * Prefix identifying one or more objects to which the rule applies.
73768
+ */
73769
+ prefix: string;
73770
+ /**
73771
+ * Key-value map of resource tags.
73772
+ * All of these tags must exist in the object's tag set in order for the rule to apply.
73773
+ * If set, must contain at least one key-value pair.
73774
+ */
73775
+ tags?: {
73776
+ [key: string]: string;
73777
+ };
73778
+ }
73779
+ interface BucketLifecycleConfigurationV2RuleFilterTag {
73780
+ /**
73781
+ * Name of the object key.
73782
+ */
73783
+ key: string;
73784
+ /**
73785
+ * Value of the tag.
73786
+ */
73787
+ value: string;
73788
+ }
73789
+ interface BucketLifecycleConfigurationV2RuleNoncurrentVersionExpiration {
73790
+ /**
73791
+ * Number of noncurrent versions Amazon S3 will retain. Must be a non-zero positive integer.
73792
+ */
73793
+ newerNoncurrentVersions: number;
73794
+ /**
73795
+ * Number of days an object is noncurrent before Amazon S3 can perform the associated action. Must be a positive integer.
73796
+ */
73797
+ noncurrentDays: number;
73798
+ }
73799
+ interface BucketLifecycleConfigurationV2RuleNoncurrentVersionTransition {
73800
+ /**
73801
+ * Number of noncurrent versions Amazon S3 will retain. Must be a non-zero positive integer.
73802
+ */
73803
+ newerNoncurrentVersions: number;
73804
+ /**
73805
+ * Number of days an object is noncurrent before Amazon S3 can perform the associated action.
73806
+ */
73807
+ noncurrentDays: number;
73808
+ /**
73809
+ * Class of storage used to store the object. Valid Values: `GLACIER`, `STANDARD_IA`, `ONEZONE_IA`, `INTELLIGENT_TIERING`, `DEEP_ARCHIVE`, `GLACIER_IR`.
73810
+ */
73811
+ storageClass: string;
73812
+ }
73813
+ interface BucketLifecycleConfigurationV2RuleTransition {
73814
+ /**
73815
+ * Date objects are transitioned to the specified storage class. The date value must be in [RFC3339 full-date format](https://datatracker.ietf.org/doc/html/rfc3339#section-5.6) e.g. `2023-08-22`.
73816
+ */
73817
+ date?: string;
73818
+ /**
73819
+ * Number of days after creation when objects are transitioned to the specified storage class. The value must be a positive integer. If both `days` and `date` are not specified, defaults to `0`. Valid values depend on `storageClass`, see [Transition objects using Amazon S3 Lifecycle](https://docs.aws.amazon.com/AmazonS3/latest/userguide/lifecycle-transition-general-considerations.html) for more details.
73820
+ */
73821
+ days: number;
73822
+ /**
73823
+ * Class of storage used to store the object. Valid Values: `GLACIER`, `STANDARD_IA`, `ONEZONE_IA`, `INTELLIGENT_TIERING`, `DEEP_ARCHIVE`, `GLACIER_IR`.
73824
+ */
73825
+ storageClass: string;
73826
+ }
73827
+ interface BucketLifecycleConfigurationV2Timeouts {
73828
+ /**
73829
+ * A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as "30s" or "2h45m". Valid time units are "s" (seconds), "m" (minutes), "h" (hours).
73830
+ */
73831
+ create?: string;
73832
+ /**
73833
+ * A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as "30s" or "2h45m". Valid time units are "s" (seconds), "m" (minutes), "h" (hours).
73834
+ */
73835
+ update?: string;
73836
+ }
73483
73837
  interface BucketLifecycleRule {
73484
73838
  /**
73485
73839
  * Specifies the number of days after initiating a multipart upload when the multipart upload must be completed.
@@ -73621,6 +73975,53 @@ export declare namespace s3 {
73621
73975
  }
73622
73976
  interface BucketLoggingTargetObjectKeyFormatSimplePrefix {
73623
73977
  }
73978
+ interface BucketLoggingV2TargetGrant {
73979
+ /**
73980
+ * Configuration block for the person being granted permissions. See below.
73981
+ */
73982
+ grantee: outputs.s3.BucketLoggingV2TargetGrantGrantee;
73983
+ /**
73984
+ * Logging permissions assigned to the grantee for the bucket. Valid values: `FULL_CONTROL`, `READ`, `WRITE`.
73985
+ */
73986
+ permission: string;
73987
+ }
73988
+ interface BucketLoggingV2TargetGrantGrantee {
73989
+ displayName: string;
73990
+ /**
73991
+ * Email address of the grantee. See [Regions and Endpoints](https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region) for supported AWS regions where this argument can be specified.
73992
+ */
73993
+ emailAddress?: string;
73994
+ /**
73995
+ * Canonical user ID of the grantee.
73996
+ */
73997
+ id?: string;
73998
+ /**
73999
+ * Type of grantee. Valid values: `CanonicalUser`, `AmazonCustomerByEmail`, `Group`.
74000
+ */
74001
+ type: string;
74002
+ /**
74003
+ * URI of the grantee group.
74004
+ */
74005
+ uri?: string;
74006
+ }
74007
+ interface BucketLoggingV2TargetObjectKeyFormat {
74008
+ /**
74009
+ * Partitioned S3 key for log objects. See below.
74010
+ */
74011
+ partitionedPrefix?: outputs.s3.BucketLoggingV2TargetObjectKeyFormatPartitionedPrefix;
74012
+ /**
74013
+ * Use the simple format for S3 keys for log objects. To use, set `simplePrefix {}`.
74014
+ */
74015
+ simplePrefix?: outputs.s3.BucketLoggingV2TargetObjectKeyFormatSimplePrefix;
74016
+ }
74017
+ interface BucketLoggingV2TargetObjectKeyFormatPartitionedPrefix {
74018
+ /**
74019
+ * Specifies the partition date source for the partitioned prefix. Valid values: `EventTime`, `DeliveryTime`.
74020
+ */
74021
+ partitionDateSource: string;
74022
+ }
74023
+ interface BucketLoggingV2TargetObjectKeyFormatSimplePrefix {
74024
+ }
73624
74025
  interface BucketMetricFilter {
73625
74026
  /**
73626
74027
  * S3 Access Point ARN for filtering (singular).
@@ -73737,6 +74138,26 @@ export declare namespace s3 {
73737
74138
  */
73738
74139
  years?: number;
73739
74140
  }
74141
+ interface BucketObjectLockConfigurationV2Rule {
74142
+ /**
74143
+ * Configuration block for specifying the default Object Lock retention settings for new objects placed in the specified bucket. See below.
74144
+ */
74145
+ defaultRetention: outputs.s3.BucketObjectLockConfigurationV2RuleDefaultRetention;
74146
+ }
74147
+ interface BucketObjectLockConfigurationV2RuleDefaultRetention {
74148
+ /**
74149
+ * Number of days that you want to specify for the default retention period.
74150
+ */
74151
+ days?: number;
74152
+ /**
74153
+ * Default Object Lock retention mode you want to apply to new objects placed in the specified bucket. Valid values: `COMPLIANCE`, `GOVERNANCE`.
74154
+ */
74155
+ mode?: string;
74156
+ /**
74157
+ * Number of years that you want to specify for the default retention period.
74158
+ */
74159
+ years?: number;
74160
+ }
73740
74161
  interface BucketObjectv2OverrideProvider {
73741
74162
  /**
73742
74163
  * Override the provider `defaultTags` configuration block.
@@ -74097,6 +74518,376 @@ export declare namespace s3 {
74097
74518
  */
74098
74519
  sseAlgorithm: string;
74099
74520
  }
74521
+ interface BucketServerSideEncryptionConfigurationV2Rule {
74522
+ /**
74523
+ * Single object for setting server-side encryption by default. See below.
74524
+ */
74525
+ applyServerSideEncryptionByDefault?: outputs.s3.BucketServerSideEncryptionConfigurationV2RuleApplyServerSideEncryptionByDefault;
74526
+ /**
74527
+ * Whether or not to use [Amazon S3 Bucket Keys](https://docs.aws.amazon.com/AmazonS3/latest/dev/bucket-key.html) for SSE-KMS.
74528
+ */
74529
+ bucketKeyEnabled?: boolean;
74530
+ }
74531
+ interface BucketServerSideEncryptionConfigurationV2RuleApplyServerSideEncryptionByDefault {
74532
+ /**
74533
+ * AWS KMS master key ID used for the SSE-KMS encryption. This can only be used when you set the value of `sseAlgorithm` as `aws:kms`. The default `aws/s3` AWS KMS master key is used if this element is absent while the `sseAlgorithm` is `aws:kms`.
74534
+ */
74535
+ kmsMasterKeyId?: string;
74536
+ /**
74537
+ * Server-side encryption algorithm to use. Valid values are `AES256`, `aws:kms`, and `aws:kms:dsse`
74538
+ */
74539
+ sseAlgorithm: string;
74540
+ }
74541
+ interface BucketV2CorsRule {
74542
+ /**
74543
+ * List of headers allowed.
74544
+ */
74545
+ allowedHeaders?: string[];
74546
+ /**
74547
+ * One or more HTTP methods that you allow the origin to execute. Can be `GET`, `PUT`, `POST`, `DELETE` or `HEAD`.
74548
+ */
74549
+ allowedMethods: string[];
74550
+ /**
74551
+ * One or more origins you want customers to be able to access the bucket from.
74552
+ */
74553
+ allowedOrigins: string[];
74554
+ /**
74555
+ * One or more headers in the response that you want customers to be able to access from their applications (for example, from a JavaScript `XMLHttpRequest` object).
74556
+ */
74557
+ exposeHeaders?: string[];
74558
+ /**
74559
+ * Specifies time in seconds that browser can cache the response for a preflight request.
74560
+ */
74561
+ maxAgeSeconds?: number;
74562
+ }
74563
+ interface BucketV2Grant {
74564
+ /**
74565
+ * Canonical user id to grant for. Used only when `type` is `CanonicalUser`.
74566
+ */
74567
+ id?: string;
74568
+ /**
74569
+ * List of permissions to apply for grantee. Valid values are `READ`, `WRITE`, `READ_ACP`, `WRITE_ACP`, `FULL_CONTROL`.
74570
+ */
74571
+ permissions: string[];
74572
+ /**
74573
+ * Type of grantee to apply for. Valid values are `CanonicalUser` and `Group`. `AmazonCustomerByEmail` is not supported.
74574
+ */
74575
+ type: string;
74576
+ /**
74577
+ * Uri address to grant for. Used only when `type` is `Group`.
74578
+ */
74579
+ uri?: string;
74580
+ }
74581
+ interface BucketV2LifecycleRule {
74582
+ /**
74583
+ * Specifies the number of days after initiating a multipart upload when the multipart upload must be completed.
74584
+ */
74585
+ abortIncompleteMultipartUploadDays?: number;
74586
+ /**
74587
+ * Specifies lifecycle rule status.
74588
+ */
74589
+ enabled: boolean;
74590
+ /**
74591
+ * Specifies a period in the object's expire. See Expiration below for details.
74592
+ */
74593
+ expirations?: outputs.s3.BucketV2LifecycleRuleExpiration[];
74594
+ /**
74595
+ * Unique identifier for the rule. Must be less than or equal to 255 characters in length.
74596
+ */
74597
+ id: string;
74598
+ /**
74599
+ * Specifies when noncurrent object versions expire. See Noncurrent Version Expiration below for details.
74600
+ */
74601
+ noncurrentVersionExpirations?: outputs.s3.BucketV2LifecycleRuleNoncurrentVersionExpiration[];
74602
+ /**
74603
+ * Specifies when noncurrent object versions transitions. See Noncurrent Version Transition below for details.
74604
+ */
74605
+ noncurrentVersionTransitions?: outputs.s3.BucketV2LifecycleRuleNoncurrentVersionTransition[];
74606
+ /**
74607
+ * Object key prefix identifying one or more objects to which the rule applies.
74608
+ */
74609
+ prefix?: string;
74610
+ /**
74611
+ * Specifies object tags key and value.
74612
+ */
74613
+ tags?: {
74614
+ [key: string]: string;
74615
+ };
74616
+ /**
74617
+ * Specifies a period in the object's transitions. See Transition below for details.
74618
+ */
74619
+ transitions?: outputs.s3.BucketV2LifecycleRuleTransition[];
74620
+ }
74621
+ interface BucketV2LifecycleRuleExpiration {
74622
+ /**
74623
+ * Specifies the date after which you want the corresponding action to take effect.
74624
+ */
74625
+ date?: string;
74626
+ /**
74627
+ * Specifies the number of days after object creation when the specific rule action takes effect.
74628
+ */
74629
+ days?: number;
74630
+ /**
74631
+ * On a versioned bucket (versioning-enabled or versioning-suspended bucket), you can add this element in the lifecycle configuration to direct Amazon S3 to delete expired object delete markers. This cannot be specified with Days or Date in a Lifecycle Expiration Policy.
74632
+ */
74633
+ expiredObjectDeleteMarker?: boolean;
74634
+ }
74635
+ interface BucketV2LifecycleRuleNoncurrentVersionExpiration {
74636
+ /**
74637
+ * Specifies the number of days noncurrent object versions expire.
74638
+ */
74639
+ days?: number;
74640
+ }
74641
+ interface BucketV2LifecycleRuleNoncurrentVersionTransition {
74642
+ /**
74643
+ * Specifies the number of days noncurrent object versions transition.
74644
+ */
74645
+ days?: number;
74646
+ /**
74647
+ * Specifies the Amazon S3 [storage class](https://docs.aws.amazon.com/AmazonS3/latest/API/API_Transition.html#AmazonS3-Type-Transition-StorageClass) to which you want the object to transition.
74648
+ */
74649
+ storageClass: string;
74650
+ }
74651
+ interface BucketV2LifecycleRuleTransition {
74652
+ /**
74653
+ * Specifies the date after which you want the corresponding action to take effect.
74654
+ */
74655
+ date?: string;
74656
+ /**
74657
+ * Specifies the number of days after object creation when the specific rule action takes effect.
74658
+ */
74659
+ days?: number;
74660
+ /**
74661
+ * Specifies the Amazon S3 [storage class](https://docs.aws.amazon.com/AmazonS3/latest/API/API_Transition.html#AmazonS3-Type-Transition-StorageClass) to which you want the object to transition.
74662
+ */
74663
+ storageClass: string;
74664
+ }
74665
+ interface BucketV2Logging {
74666
+ /**
74667
+ * Name of the bucket that will receive the log objects.
74668
+ */
74669
+ targetBucket: string;
74670
+ /**
74671
+ * To specify a key prefix for log objects.
74672
+ */
74673
+ targetPrefix?: string;
74674
+ }
74675
+ interface BucketV2ObjectLockConfiguration {
74676
+ /**
74677
+ * Indicates whether this bucket has an Object Lock configuration enabled. Valid values are `true` or `false`. This argument is not supported in all regions or partitions.
74678
+ *
74679
+ * @deprecated object_lock_enabled is deprecated. Use the top-level parameter objectLockEnabled instead.
74680
+ */
74681
+ objectLockEnabled?: string;
74682
+ /**
74683
+ * Object Lock rule in place for this bucket (documented below).
74684
+ *
74685
+ * @deprecated rule is deprecated. Use the aws.s3.BucketObjectLockConfiguration resource instead.
74686
+ */
74687
+ rules?: outputs.s3.BucketV2ObjectLockConfigurationRule[];
74688
+ }
74689
+ interface BucketV2ObjectLockConfigurationRule {
74690
+ /**
74691
+ * Default retention period that you want to apply to new objects placed in this bucket (documented below).
74692
+ */
74693
+ defaultRetentions: outputs.s3.BucketV2ObjectLockConfigurationRuleDefaultRetention[];
74694
+ }
74695
+ interface BucketV2ObjectLockConfigurationRuleDefaultRetention {
74696
+ /**
74697
+ * Number of days that you want to specify for the default retention period.
74698
+ */
74699
+ days?: number;
74700
+ /**
74701
+ * Default Object Lock retention mode you want to apply to new objects placed in this bucket. Valid values are `GOVERNANCE` and `COMPLIANCE`.
74702
+ */
74703
+ mode: string;
74704
+ /**
74705
+ * Number of years that you want to specify for the default retention period.
74706
+ */
74707
+ years?: number;
74708
+ }
74709
+ interface BucketV2ReplicationConfiguration {
74710
+ /**
74711
+ * ARN of the IAM role for Amazon S3 to assume when replicating the objects.
74712
+ */
74713
+ role: string;
74714
+ /**
74715
+ * Specifies the rules managing the replication (documented below).
74716
+ */
74717
+ rules: outputs.s3.BucketV2ReplicationConfigurationRule[];
74718
+ }
74719
+ interface BucketV2ReplicationConfigurationRule {
74720
+ /**
74721
+ * Whether delete markers are replicated. The only valid value is `Enabled`. To disable, omit this argument. This argument is only valid with V2 replication configurations (i.e., when `filter` is used).
74722
+ */
74723
+ deleteMarkerReplicationStatus?: string;
74724
+ /**
74725
+ * Specifies the destination for the rule (documented below).
74726
+ */
74727
+ destinations: outputs.s3.BucketV2ReplicationConfigurationRuleDestination[];
74728
+ /**
74729
+ * Filter that identifies subset of objects to which the replication rule applies (documented below).
74730
+ */
74731
+ filters?: outputs.s3.BucketV2ReplicationConfigurationRuleFilter[];
74732
+ /**
74733
+ * Unique identifier for the rule. Must be less than or equal to 255 characters in length.
74734
+ */
74735
+ id?: string;
74736
+ /**
74737
+ * Object keyname prefix identifying one or more objects to which the rule applies. Must be less than or equal to 1024 characters in length.
74738
+ */
74739
+ prefix?: string;
74740
+ /**
74741
+ * Priority associated with the rule. Priority should only be set if `filter` is configured. If not provided, defaults to `0`. Priority must be unique between multiple rules.
74742
+ */
74743
+ priority?: number;
74744
+ /**
74745
+ * Specifies special object selection criteria (documented below).
74746
+ */
74747
+ sourceSelectionCriterias?: outputs.s3.BucketV2ReplicationConfigurationRuleSourceSelectionCriteria[];
74748
+ /**
74749
+ * Status of the rule. Either `Enabled` or `Disabled`. The rule is ignored if status is not Enabled.
74750
+ */
74751
+ status: string;
74752
+ }
74753
+ interface BucketV2ReplicationConfigurationRuleDestination {
74754
+ /**
74755
+ * Specifies the overrides to use for object owners on replication (documented below). Must be used in conjunction with `accountId` owner override configuration.
74756
+ */
74757
+ accessControlTranslations?: outputs.s3.BucketV2ReplicationConfigurationRuleDestinationAccessControlTranslation[];
74758
+ /**
74759
+ * Account ID to use for overriding the object owner on replication. Must be used in conjunction with `accessControlTranslation` override configuration.
74760
+ */
74761
+ accountId?: string;
74762
+ /**
74763
+ * ARN of the S3 bucket where you want Amazon S3 to store replicas of the object identified by the rule.
74764
+ */
74765
+ bucket: string;
74766
+ /**
74767
+ * Enables replication metrics (required for S3 RTC) (documented below).
74768
+ */
74769
+ metrics?: outputs.s3.BucketV2ReplicationConfigurationRuleDestinationMetric[];
74770
+ /**
74771
+ * Destination KMS encryption key ARN for SSE-KMS replication. Must be used in conjunction with
74772
+ * `sseKmsEncryptedObjects` source selection criteria.
74773
+ */
74774
+ replicaKmsKeyId?: string;
74775
+ /**
74776
+ * Enables S3 Replication Time Control (S3 RTC) (documented below).
74777
+ */
74778
+ replicationTimes?: outputs.s3.BucketV2ReplicationConfigurationRuleDestinationReplicationTime[];
74779
+ /**
74780
+ * The [storage class](https://docs.aws.amazon.com/AmazonS3/latest/API/API_Destination.html#AmazonS3-Type-Destination-StorageClass) used to store the object. By default, Amazon S3 uses the storage class of the source object to create the object replica.
74781
+ */
74782
+ storageClass?: string;
74783
+ }
74784
+ interface BucketV2ReplicationConfigurationRuleDestinationAccessControlTranslation {
74785
+ /**
74786
+ * Specifies the replica ownership. For default and valid values, see [PUT bucket replication](https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketReplication.html) in the Amazon S3 API Reference. The only valid value is `Destination`.
74787
+ */
74788
+ owner: string;
74789
+ }
74790
+ interface BucketV2ReplicationConfigurationRuleDestinationMetric {
74791
+ /**
74792
+ * Threshold within which objects are to be replicated. The only valid value is `15`.
74793
+ */
74794
+ minutes?: number;
74795
+ /**
74796
+ * Status of replication metrics. Either `Enabled` or `Disabled`.
74797
+ */
74798
+ status?: string;
74799
+ }
74800
+ interface BucketV2ReplicationConfigurationRuleDestinationReplicationTime {
74801
+ /**
74802
+ * Threshold within which objects are to be replicated. The only valid value is `15`.
74803
+ */
74804
+ minutes?: number;
74805
+ /**
74806
+ * Status of RTC. Either `Enabled` or `Disabled`.
74807
+ */
74808
+ status?: string;
74809
+ }
74810
+ interface BucketV2ReplicationConfigurationRuleFilter {
74811
+ /**
74812
+ * Object keyname prefix that identifies subset of objects to which the rule applies. Must be less than or equal to 1024 characters in length.
74813
+ */
74814
+ prefix?: string;
74815
+ /**
74816
+ * A map of tags that identifies subset of objects to which the rule applies.
74817
+ * The rule applies only to objects having all the tags in its tagset.
74818
+ */
74819
+ tags?: {
74820
+ [key: string]: string;
74821
+ };
74822
+ }
74823
+ interface BucketV2ReplicationConfigurationRuleSourceSelectionCriteria {
74824
+ /**
74825
+ * Match SSE-KMS encrypted objects (documented below). If specified, `replicaKmsKeyId`
74826
+ * in `destination` must be specified as well.
74827
+ */
74828
+ sseKmsEncryptedObjects?: outputs.s3.BucketV2ReplicationConfigurationRuleSourceSelectionCriteriaSseKmsEncryptedObject[];
74829
+ }
74830
+ interface BucketV2ReplicationConfigurationRuleSourceSelectionCriteriaSseKmsEncryptedObject {
74831
+ /**
74832
+ * Boolean which indicates if this criteria is enabled.
74833
+ */
74834
+ enabled: boolean;
74835
+ }
74836
+ interface BucketV2ServerSideEncryptionConfiguration {
74837
+ /**
74838
+ * Single object for server-side encryption by default configuration. (documented below)
74839
+ */
74840
+ rules: outputs.s3.BucketV2ServerSideEncryptionConfigurationRule[];
74841
+ }
74842
+ interface BucketV2ServerSideEncryptionConfigurationRule {
74843
+ /**
74844
+ * Single object for setting server-side encryption by default. (documented below)
74845
+ */
74846
+ applyServerSideEncryptionByDefaults: outputs.s3.BucketV2ServerSideEncryptionConfigurationRuleApplyServerSideEncryptionByDefault[];
74847
+ /**
74848
+ * Whether or not to use [Amazon S3 Bucket Keys](https://docs.aws.amazon.com/AmazonS3/latest/dev/bucket-key.html) for SSE-KMS.
74849
+ */
74850
+ bucketKeyEnabled?: boolean;
74851
+ }
74852
+ interface BucketV2ServerSideEncryptionConfigurationRuleApplyServerSideEncryptionByDefault {
74853
+ /**
74854
+ * AWS KMS master key ID used for the SSE-KMS encryption. This can only be used when you set the value of `sseAlgorithm` as `aws:kms`. The default `aws/s3` AWS KMS master key is used if this element is absent while the `sseAlgorithm` is `aws:kms`.
74855
+ */
74856
+ kmsMasterKeyId?: string;
74857
+ /**
74858
+ * Server-side encryption algorithm to use. Valid values are `AES256` and `aws:kms`
74859
+ */
74860
+ sseAlgorithm: string;
74861
+ }
74862
+ interface BucketV2Versioning {
74863
+ /**
74864
+ * Enable versioning. Once you version-enable a bucket, it can never return to an unversioned state. You can, however, suspend versioning on that bucket.
74865
+ */
74866
+ enabled?: boolean;
74867
+ /**
74868
+ * Enable MFA delete for either `Change the versioning state of your bucket` or `Permanently delete an object version`. Default is `false`. This cannot be used to toggle this setting but is available to allow managed buckets to reflect the state in AWS
74869
+ */
74870
+ mfaDelete?: boolean;
74871
+ }
74872
+ interface BucketV2Website {
74873
+ /**
74874
+ * Absolute path to the document to return in case of a 4XX error.
74875
+ */
74876
+ errorDocument?: string;
74877
+ /**
74878
+ * Amazon S3 returns this index document when requests are made to the root domain or any of the subfolders.
74879
+ */
74880
+ indexDocument?: string;
74881
+ /**
74882
+ * Hostname to redirect all website requests for this bucket to. Hostname can optionally be prefixed with a protocol (`http://` or `https://`) to use when redirecting requests. The default is the protocol that is used in the original request.
74883
+ */
74884
+ redirectAllRequestsTo?: string;
74885
+ /**
74886
+ * JSON array containing [routing rules](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-s3-websiteconfiguration-routingrules.html)
74887
+ * describing redirect behavior and when redirects are applied.
74888
+ */
74889
+ routingRules?: string;
74890
+ }
74100
74891
  interface BucketVersioning {
74101
74892
  /**
74102
74893
  * Enable versioning. Once you version-enable a bucket, it can never return to an unversioned state. You can, however, suspend versioning on that bucket.
@@ -74107,6 +74898,16 @@ export declare namespace s3 {
74107
74898
  */
74108
74899
  mfaDelete?: boolean;
74109
74900
  }
74901
+ interface BucketVersioningV2VersioningConfiguration {
74902
+ /**
74903
+ * Specifies whether MFA delete is enabled in the bucket versioning configuration. Valid values: `Enabled` or `Disabled`.
74904
+ */
74905
+ mfaDelete: string;
74906
+ /**
74907
+ * Versioning state of the bucket. Valid values: `Enabled`, `Suspended`, or `Disabled`. `Disabled` should only be used when creating or importing resources that correspond to unversioned S3 buckets.
74908
+ */
74909
+ status: string;
74910
+ }
74110
74911
  interface BucketVersioningVersioningConfiguration {
74111
74912
  /**
74112
74913
  * Specifies whether MFA delete is enabled in the bucket versioning configuration. Valid values: `Enabled` or `Disabled`.
@@ -74202,6 +75003,72 @@ export declare namespace s3 {
74202
75003
  */
74203
75004
  replaceKeyWith?: string;
74204
75005
  }
75006
+ interface BucketWebsiteConfigurationV2ErrorDocument {
75007
+ /**
75008
+ * Object key name to use when a 4XX class error occurs.
75009
+ */
75010
+ key: string;
75011
+ }
75012
+ interface BucketWebsiteConfigurationV2IndexDocument {
75013
+ /**
75014
+ * Suffix that is appended to a request that is for a directory on the website endpoint.
75015
+ * For example, if the suffix is `index.html` and you make a request to `samplebucket/images/`, the data that is returned will be for the object with the key name `images/index.html`.
75016
+ * The suffix must not be empty and must not include a slash character.
75017
+ */
75018
+ suffix: string;
75019
+ }
75020
+ interface BucketWebsiteConfigurationV2RedirectAllRequestsTo {
75021
+ /**
75022
+ * Name of the host where requests are redirected.
75023
+ */
75024
+ hostName: string;
75025
+ /**
75026
+ * Protocol to use when redirecting requests. The default is the protocol that is used in the original request. Valid values: `http`, `https`.
75027
+ */
75028
+ protocol?: string;
75029
+ }
75030
+ interface BucketWebsiteConfigurationV2RoutingRule {
75031
+ /**
75032
+ * Configuration block for describing a condition that must be met for the specified redirect to apply. See below.
75033
+ */
75034
+ condition?: outputs.s3.BucketWebsiteConfigurationV2RoutingRuleCondition;
75035
+ /**
75036
+ * Configuration block for redirect information. See below.
75037
+ */
75038
+ redirect: outputs.s3.BucketWebsiteConfigurationV2RoutingRuleRedirect;
75039
+ }
75040
+ interface BucketWebsiteConfigurationV2RoutingRuleCondition {
75041
+ /**
75042
+ * HTTP error code when the redirect is applied. If specified with `keyPrefixEquals`, then both must be true for the redirect to be applied.
75043
+ */
75044
+ httpErrorCodeReturnedEquals?: string;
75045
+ /**
75046
+ * Object key name prefix when the redirect is applied. If specified with `httpErrorCodeReturnedEquals`, then both must be true for the redirect to be applied.
75047
+ */
75048
+ keyPrefixEquals?: string;
75049
+ }
75050
+ interface BucketWebsiteConfigurationV2RoutingRuleRedirect {
75051
+ /**
75052
+ * Host name to use in the redirect request.
75053
+ */
75054
+ hostName?: string;
75055
+ /**
75056
+ * HTTP redirect code to use on the response.
75057
+ */
75058
+ httpRedirectCode?: string;
75059
+ /**
75060
+ * Protocol to use when redirecting requests. The default is the protocol that is used in the original request. Valid values: `http`, `https`.
75061
+ */
75062
+ protocol?: string;
75063
+ /**
75064
+ * Object key prefix to use in the redirect request. For example, to redirect requests for all pages with prefix `docs/` (objects in the `docs/` folder) to `documents/`, you can set a `condition` block with `keyPrefixEquals` set to `docs/` and in the `redirect` set `replaceKeyPrefixWith` to `/documents`.
75065
+ */
75066
+ replaceKeyPrefixWith?: string;
75067
+ /**
75068
+ * Specific object key to use in the redirect request. For example, redirect request to `error.html`.
75069
+ */
75070
+ replaceKeyWith?: string;
75071
+ }
74205
75072
  interface DirectoryBucketLocation {
74206
75073
  /**
74207
75074
  * [Availability Zone ID](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-regions-availability-zones.html#az-ids) or Local Zone ID.
@@ -74858,6 +75725,41 @@ export declare namespace s3tables {
74858
75725
  */
74859
75726
  minSnapshotsToKeep: number;
74860
75727
  }
75728
+ interface TableMetadata {
75729
+ /**
75730
+ * Contains details about the metadata for an Iceberg table. This block defines the schema structure for the Apache Iceberg table format.
75731
+ * See `iceberg` below.
75732
+ */
75733
+ iceberg: outputs.s3tables.TableMetadataIceberg;
75734
+ }
75735
+ interface TableMetadataIceberg {
75736
+ /**
75737
+ * Schema configuration for the Iceberg table.
75738
+ * See `schema` below.
75739
+ */
75740
+ schema: outputs.s3tables.TableMetadataIcebergSchema;
75741
+ }
75742
+ interface TableMetadataIcebergSchema {
75743
+ /**
75744
+ * List of schema fields for the Iceberg table. Each field defines a column in the table schema.
75745
+ * See `field` below.
75746
+ */
75747
+ fields?: outputs.s3tables.TableMetadataIcebergSchemaField[];
75748
+ }
75749
+ interface TableMetadataIcebergSchemaField {
75750
+ /**
75751
+ * The name of the field.
75752
+ */
75753
+ name: string;
75754
+ /**
75755
+ * A Boolean value that specifies whether values are required for each row in this field. Defaults to `false`.
75756
+ */
75757
+ required: boolean;
75758
+ /**
75759
+ * The field type. S3 Tables supports all Apache Iceberg primitive types including: `boolean`, `int`, `long`, `float`, `double`, `decimal(precision,scale)`, `date`, `time`, `timestamp`, `timestamptz`, `string`, `uuid`, `fixed(length)`, `binary`.
75760
+ */
75761
+ type: string;
75762
+ }
74861
75763
  }
74862
75764
  export declare namespace sagemaker {
74863
75765
  interface AppImageConfigCodeEditorAppImageConfig {
@@ -89464,6 +90366,10 @@ export declare namespace wafv2 {
89464
90366
  * Additional configuration for using the Account Creation Fraud Prevention managed rule group. Use this to specify information such as the registration page of your application and the type of content to accept or reject from the client.
89465
90367
  */
89466
90368
  awsManagedRulesAcfpRuleSet?: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAcfpRuleSet;
90369
+ /**
90370
+ * Configuration for using the anti-DDoS managed rule group. See `awsManagedRulesAntiDdosRuleSet` for more details.
90371
+ */
90372
+ awsManagedRulesAntiDdosRuleSet?: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSet;
89467
90373
  /**
89468
90374
  * Additional configuration for using the Account Takeover Protection managed rule group. Use this to specify information such as the sign-in page of your application and the type of content to accept or reject from the client.
89469
90375
  */
@@ -89633,6 +90539,42 @@ export declare namespace wafv2 {
89633
90539
  */
89634
90540
  successCodes: number[];
89635
90541
  }
90542
+ interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSet {
90543
+ /**
90544
+ * Configuration for the request handling that's applied by the managed rule group rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` during a distributed denial of service (DDoS) attack. See `clientSideActionConfig` for more details.
90545
+ */
90546
+ clientSideActionConfig: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfig;
90547
+ /**
90548
+ * Sensitivity that the rule group rule DDoSRequests uses when matching against the DDoS suspicion labeling on a request. Valid values are `LOW` (Default), `MEDIUM`, and `HIGH`.
90549
+ */
90550
+ sensitivityToBlock?: string;
90551
+ }
90552
+ interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfig {
90553
+ /**
90554
+ * Configuration for the use of the `AWSManagedRulesAntiDDoSRuleSet` rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests`.
90555
+ */
90556
+ challenge: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfigChallenge;
90557
+ }
90558
+ interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfigChallenge {
90559
+ /**
90560
+ * Block for the list of the regular expressions to match against the web request URI, used to identify requests that can't handle a silent browser challenge.
90561
+ */
90562
+ exemptUriRegularExpressions?: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfigChallengeExemptUriRegularExpression[];
90563
+ /**
90564
+ * Sensitivity that the rule group rule ChallengeDDoSRequests uses when matching against the DDoS suspicion labeling on a request. Valid values are `LOW`, `MEDIUM` and `HIGH` (Default).
90565
+ */
90566
+ sensitivity?: string;
90567
+ /**
90568
+ * Configuration whether to use the `AWSManagedRulesAntiDDoSRuleSet` rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` in the rule group evaluation. Valid values are `ENABLED` and `DISABLED`.
90569
+ */
90570
+ usageOfAction: string;
90571
+ }
90572
+ interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfigChallengeExemptUriRegularExpression {
90573
+ /**
90574
+ * Regular expression string.
90575
+ */
90576
+ regexString?: string;
90577
+ }
89636
90578
  interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAtpRuleSet {
89637
90579
  /**
89638
90580
  * Whether or not to allow the use of regular expressions in the login page path.
@@ -89782,9 +90724,6 @@ export declare namespace wafv2 {
89782
90724
  * Instructs AWS WAF to run a Captcha check against the web request. See `captcha` below for details.
89783
90725
  */
89784
90726
  captcha?: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementRuleActionOverrideActionToUseCaptcha;
89785
- /**
89786
- * Instructs AWS WAF to run a check against the request to verify that the request is coming from a legitimate client session. See `challenge` below for details.
89787
- */
89788
90727
  challenge?: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementRuleActionOverrideActionToUseChallenge;
89789
90728
  count?: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementRuleActionOverrideActionToUseCount;
89790
90729
  }
@@ -93427,9 +94366,6 @@ export declare namespace wafv2 {
93427
94366
  * Instructs AWS WAF to run a Captcha check against the web request. See `captcha` below for details.
93428
94367
  */
93429
94368
  captcha?: outputs.wafv2.WebAclRuleStatementRuleGroupReferenceStatementRuleActionOverrideActionToUseCaptcha;
93430
- /**
93431
- * Instructs AWS WAF to run a check against the request to verify that the request is coming from a legitimate client session. See `challenge` below for details.
93432
- */
93433
94369
  challenge?: outputs.wafv2.WebAclRuleStatementRuleGroupReferenceStatementRuleActionOverrideActionToUseChallenge;
93434
94370
  count?: outputs.wafv2.WebAclRuleStatementRuleGroupReferenceStatementRuleActionOverrideActionToUseCount;
93435
94371
  }