@pulumi/aws 7.0.0-alpha.1 → 7.0.0-alpha.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/accessanalyzer/analyzer.d.ts +54 -7
- package/accessanalyzer/analyzer.js +48 -1
- package/accessanalyzer/analyzer.js.map +1 -1
- package/amplify/app.d.ts +26 -0
- package/amplify/app.js +16 -0
- package/amplify/app.js.map +1 -1
- package/bedrock/agentAgent.d.ts +2 -2
- package/bedrock/agentAgent.js +2 -2
- package/bedrock/agentAgentCollaborator.d.ts +4 -4
- package/bedrock/agentAgentCollaborator.js +4 -4
- package/cloudtrail/trail.d.ts +2 -2
- package/cloudtrail/trail.js +2 -2
- package/cloudwatch/eventArchive.d.ts +91 -15
- package/cloudwatch/eventArchive.js +67 -1
- package/cloudwatch/eventArchive.js.map +1 -1
- package/cloudwatch/logGroup.d.ts +6 -6
- package/codeartifact/domainPermissions.d.ts +1 -1
- package/codeartifact/domainPermissions.js +0 -3
- package/codeartifact/domainPermissions.js.map +1 -1
- package/connect/botAssociation.d.ts +1 -1
- package/connect/botAssociation.js +1 -1
- package/controltower/controlTowerControl.d.ts +1 -1
- package/controltower/controlTowerControl.js +1 -1
- package/cur/reportDefinition.d.ts +3 -3
- package/datasync/agent.d.ts +1 -1
- package/datasync/agent.js +1 -1
- package/dynamodb/table.d.ts +1 -1
- package/dynamodb/table.js +1 -1
- package/dynamodb/tag.d.ts +1 -1
- package/dynamodb/tag.js +1 -1
- package/ec2/getManagedPrefixList.d.ts +2 -2
- package/ec2/getManagedPrefixList.js +2 -2
- package/ec2/securityGroupRule.d.ts +1 -1
- package/ec2/securityGroupRule.js +1 -1
- package/ec2/vpc.d.ts +2 -2
- package/ec2/vpc.js +2 -2
- package/ec2/vpcIpam.d.ts +1 -1
- package/ec2/vpcIpam.js +1 -1
- package/ec2/vpcIpamPool.d.ts +4 -4
- package/ec2/vpcIpamPool.js +4 -4
- package/ec2/vpcIpamPoolCidr.d.ts +3 -3
- package/ec2/vpcIpamPoolCidr.js +3 -3
- package/ec2/vpcIpamPoolCidrAllocation.d.ts +4 -4
- package/ec2/vpcIpamPoolCidrAllocation.js +4 -4
- package/ec2/vpcIpamPreviewNextCidr.d.ts +2 -2
- package/ec2/vpcIpamPreviewNextCidr.js +2 -2
- package/ec2/vpcIpamResourceDiscovery.d.ts +1 -1
- package/ec2/vpcIpamResourceDiscovery.js +1 -1
- package/ec2/vpcIpamScope.d.ts +1 -1
- package/ec2/vpcIpamScope.js +1 -1
- package/ecr/index.d.ts +1 -0
- package/ecr/index.js +1 -0
- package/ecr/index.js.map +1 -1
- package/ecr/lifecyclePolicyDocument.d.ts +5 -0
- package/ecr/lifecyclePolicyDocument.js +3 -0
- package/ecr/lifecyclePolicyDocument.js.map +1 -0
- package/ecr/registryPolicy.d.ts +1 -1
- package/ecr/registryPolicy.js +1 -1
- package/eks/podIdentityAssociation.d.ts +32 -0
- package/eks/podIdentityAssociation.js +6 -0
- package/eks/podIdentityAssociation.js.map +1 -1
- package/elasticsearch/domain.d.ts +2 -2
- package/elasticsearch/domain.js +2 -2
- package/emr/cluster.d.ts +12 -0
- package/emr/cluster.js +2 -0
- package/emr/cluster.js.map +1 -1
- package/fms/policy.d.ts +12 -0
- package/fms/policy.js +2 -0
- package/fms/policy.js.map +1 -1
- package/getRegion.d.ts +2 -2
- package/getService.d.ts +2 -2
- package/getService.js +2 -2
- package/glue/job.d.ts +12 -0
- package/glue/job.js +2 -0
- package/glue/job.js.map +1 -1
- package/glue/resourcePolicy.d.ts +1 -1
- package/glue/resourcePolicy.js +1 -1
- package/guardduty/detectorFeature.d.ts +21 -0
- package/guardduty/detectorFeature.js +21 -0
- package/guardduty/detectorFeature.js.map +1 -1
- package/guardduty/memberDetectorFeature.d.ts +1 -11
- package/guardduty/memberDetectorFeature.js +1 -11
- package/guardduty/memberDetectorFeature.js.map +1 -1
- package/guardduty/publishingDestination.d.ts +2 -2
- package/guardduty/publishingDestination.js +2 -2
- package/iam/documents.d.ts +5 -0
- package/imagebuilder/imageRecipe.d.ts +1 -1
- package/imagebuilder/imageRecipe.js +1 -1
- package/kinesis/firehoseDeliveryStream.d.ts +1 -1
- package/kinesis/firehoseDeliveryStream.js +1 -1
- package/kms/getKey.d.ts +1 -1
- package/kms/key.d.ts +3 -3
- package/lightsail/instancePublicPorts.d.ts +6 -6
- package/macie/findingsFilter.d.ts +1 -1
- package/macie/findingsFilter.js +1 -1
- package/mediastore/containerPolicy.d.ts +1 -1
- package/mediastore/containerPolicy.js +1 -1
- package/networkfirewall/firewallPolicy.d.ts +51 -2
- package/networkfirewall/firewallPolicy.js +51 -2
- package/networkfirewall/firewallPolicy.js.map +1 -1
- package/networkmanager/dxGatewayAttachment.d.ts +1 -1
- package/networkmanager/dxGatewayAttachment.js +1 -1
- package/opensearch/domain.d.ts +2 -2
- package/opensearch/domain.js +2 -2
- package/opensearch/inboundConnectionAccepter.d.ts +2 -2
- package/opensearch/inboundConnectionAccepter.js +2 -2
- package/opensearch/outboundConnection.d.ts +2 -2
- package/opensearch/outboundConnection.js +2 -2
- package/opensearchingest/pipeline.d.ts +1 -1
- package/opensearchingest/pipeline.js +1 -1
- package/package.json +2 -2
- package/quicksight/dataSource.d.ts +1 -1
- package/quicksight/dataSource.js +1 -1
- package/route53/getTrafficPolicyDocument.d.ts +4 -4
- package/route53/getTrafficPolicyDocument.js +4 -4
- package/s3/bucket.d.ts +5 -4
- package/s3/bucketAccelerateConfiguration.js +1 -1
- package/s3/bucketAccelerateConfiguration.js.map +1 -1
- package/s3/bucketAccelerateConfigurationV2.d.ts +122 -0
- package/s3/bucketAccelerateConfigurationV2.js +103 -0
- package/s3/bucketAccelerateConfigurationV2.js.map +1 -0
- package/s3/bucketAcl.js +1 -1
- package/s3/bucketAcl.js.map +1 -1
- package/s3/bucketAclV2.d.ts +241 -0
- package/s3/bucketAclV2.js +207 -0
- package/s3/bucketAclV2.js.map +1 -0
- package/s3/bucketCorsConfiguration.js +1 -1
- package/s3/bucketCorsConfiguration.js.map +1 -1
- package/s3/bucketCorsConfigurationV2.d.ts +141 -0
- package/s3/bucketCorsConfigurationV2.js +120 -0
- package/s3/bucketCorsConfigurationV2.js.map +1 -0
- package/s3/bucketLifecycleConfiguration.js +1 -1
- package/s3/bucketLifecycleConfiguration.js.map +1 -1
- package/s3/bucketLifecycleConfigurationV2.d.ts +437 -0
- package/s3/bucketLifecycleConfigurationV2.js +402 -0
- package/s3/bucketLifecycleConfigurationV2.js.map +1 -0
- package/s3/bucketLogging.js +1 -1
- package/s3/bucketLogging.js.map +1 -1
- package/s3/bucketLoggingV2.d.ts +174 -0
- package/s3/bucketLoggingV2.js +126 -0
- package/s3/bucketLoggingV2.js.map +1 -0
- package/s3/bucketObjectLockConfiguration.js +1 -1
- package/s3/bucketObjectLockConfiguration.js.map +1 -1
- package/s3/bucketObjectLockConfigurationV2.d.ts +164 -0
- package/s3/bucketObjectLockConfigurationV2.js +119 -0
- package/s3/bucketObjectLockConfigurationV2.js.map +1 -0
- package/s3/bucketPolicy.d.ts +2 -0
- package/s3/bucketPolicy.js +2 -0
- package/s3/bucketPolicy.js.map +1 -1
- package/s3/bucketRequestPaymentConfiguration.js +1 -1
- package/s3/bucketRequestPaymentConfiguration.js.map +1 -1
- package/s3/bucketRequestPaymentConfigurationV2.d.ts +123 -0
- package/s3/bucketRequestPaymentConfigurationV2.js +104 -0
- package/s3/bucketRequestPaymentConfigurationV2.js.map +1 -0
- package/s3/bucketServerSideEncryptionConfiguration.js +1 -1
- package/s3/bucketServerSideEncryptionConfiguration.js.map +1 -1
- package/s3/bucketServerSideEncryptionConfigurationV2.d.ts +133 -0
- package/s3/bucketServerSideEncryptionConfigurationV2.js +112 -0
- package/s3/bucketServerSideEncryptionConfigurationV2.js.map +1 -0
- package/s3/bucketV2.d.ts +518 -0
- package/s3/bucketV2.js +138 -0
- package/s3/bucketV2.js.map +1 -0
- package/s3/bucketVersioning.js +1 -1
- package/s3/bucketVersioning.js.map +1 -1
- package/s3/bucketVersioningV2.d.ts +195 -0
- package/s3/bucketVersioningV2.js +164 -0
- package/s3/bucketVersioningV2.js.map +1 -0
- package/s3/bucketWebsiteConfiguration.js +1 -1
- package/s3/bucketWebsiteConfiguration.js.map +1 -1
- package/s3/bucketWebsiteConfigurationV2.d.ts +231 -0
- package/s3/bucketWebsiteConfigurationV2.js +152 -0
- package/s3/bucketWebsiteConfigurationV2.js.map +1 -0
- package/s3/index.d.ts +33 -0
- package/s3/index.js +57 -1
- package/s3/index.js.map +1 -1
- package/s3tables/table.d.ts +62 -0
- package/s3tables/table.js +49 -0
- package/s3tables/table.js.map +1 -1
- package/sagemaker/flowDefinition.d.ts +1 -1
- package/sagemaker/flowDefinition.js +1 -1
- package/securityhub/productSubscription.d.ts +1 -1
- package/securityhub/productSubscription.js +1 -1
- package/securityhub/standardsSubscription.d.ts +1 -1
- package/securityhub/standardsSubscription.js +1 -1
- package/serverlessrepository/cloudFormationStack.d.ts +1 -1
- package/serverlessrepository/cloudFormationStack.js +1 -1
- package/shield/drtAccessLogBucketAssociation.d.ts +1 -1
- package/shield/drtAccessLogBucketAssociation.js +1 -1
- package/shield/protection.d.ts +1 -1
- package/shield/protection.js +1 -1
- package/shield/protectionGroup.d.ts +2 -2
- package/shield/protectionGroup.js +2 -2
- package/shield/protectionHealthCheckAssociation.d.ts +1 -1
- package/shield/protectionHealthCheckAssociation.js +1 -1
- package/ssm/parameter.d.ts +1 -1
- package/ssm/quicksetupConfigurationManager.d.ts +2 -2
- package/ssm/quicksetupConfigurationManager.js +2 -2
- package/types/input.d.ts +897 -20
- package/types/input.js.map +1 -1
- package/types/output.d.ts +897 -19
- package/types/output.js.map +1 -1
package/types/output.d.ts
CHANGED
|
@@ -32,33 +32,63 @@ export interface GetRegionsFilter {
|
|
|
32
32
|
export declare namespace accessanalyzer {
|
|
33
33
|
interface AnalyzerConfiguration {
|
|
34
34
|
/**
|
|
35
|
-
*
|
|
35
|
+
* Specifies the configuration of an internal access analyzer for an AWS organization or account. This configuration determines how the analyzer evaluates access within your AWS environment. See `internalAccess` Block for details.
|
|
36
|
+
*/
|
|
37
|
+
internalAccess?: outputs.accessanalyzer.AnalyzerConfigurationInternalAccess;
|
|
38
|
+
/**
|
|
39
|
+
* Specifies the configuration of an unused access analyzer for an AWS organization or account. See `unusedAccess` Block for details.
|
|
36
40
|
*/
|
|
37
41
|
unusedAccess?: outputs.accessanalyzer.AnalyzerConfigurationUnusedAccess;
|
|
38
42
|
}
|
|
43
|
+
interface AnalyzerConfigurationInternalAccess {
|
|
44
|
+
/**
|
|
45
|
+
* Information about analysis rules for the internal access analyzer. These rules determine which resources and access patterns will be analyzed. See `analysisRule` Block for Internal Access Analyzer for details.
|
|
46
|
+
*/
|
|
47
|
+
analysisRule?: outputs.accessanalyzer.AnalyzerConfigurationInternalAccessAnalysisRule;
|
|
48
|
+
}
|
|
49
|
+
interface AnalyzerConfigurationInternalAccessAnalysisRule {
|
|
50
|
+
/**
|
|
51
|
+
* List of rules for the internal access analyzer containing criteria to include in analysis. Only resources that meet the rule criteria will generate findings. See `inclusion` Block for details.
|
|
52
|
+
*/
|
|
53
|
+
inclusions?: outputs.accessanalyzer.AnalyzerConfigurationInternalAccessAnalysisRuleInclusion[];
|
|
54
|
+
}
|
|
55
|
+
interface AnalyzerConfigurationInternalAccessAnalysisRuleInclusion {
|
|
56
|
+
/**
|
|
57
|
+
* List of AWS account IDs to apply to the internal access analysis rule criteria. Account IDs can only be applied to the analysis rule criteria for organization-level analyzers.
|
|
58
|
+
*/
|
|
59
|
+
accountIds?: string[];
|
|
60
|
+
/**
|
|
61
|
+
* List of resource ARNs to apply to the internal access analysis rule criteria. The analyzer will only generate findings for resources that match these ARNs.
|
|
62
|
+
*/
|
|
63
|
+
resourceArns?: string[];
|
|
64
|
+
/**
|
|
65
|
+
* List of resource types to apply to the internal access analysis rule criteria. The analyzer will only generate findings for resources of these types. Refer to [InternalAccessAnalysisRuleCriteria](https://docs.aws.amazon.com/access-analyzer/latest/APIReference/API_InternalAccessAnalysisRuleCriteria.html) in the AWS IAM Access Analyzer API Reference for valid values.
|
|
66
|
+
*/
|
|
67
|
+
resourceTypes?: string[];
|
|
68
|
+
}
|
|
39
69
|
interface AnalyzerConfigurationUnusedAccess {
|
|
40
70
|
/**
|
|
41
|
-
*
|
|
71
|
+
* Information about analysis rules for the analyzer. Analysis rules determine which entities will generate findings based on the criteria you define when you create the rule. See `analysisRule` Block for Unused Access Analyzer for details.
|
|
42
72
|
*/
|
|
43
73
|
analysisRule?: outputs.accessanalyzer.AnalyzerConfigurationUnusedAccessAnalysisRule;
|
|
44
74
|
/**
|
|
45
|
-
*
|
|
75
|
+
* Specified access age in days for which to generate findings for unused access.
|
|
46
76
|
*/
|
|
47
77
|
unusedAccessAge?: number;
|
|
48
78
|
}
|
|
49
79
|
interface AnalyzerConfigurationUnusedAccessAnalysisRule {
|
|
50
80
|
/**
|
|
51
|
-
*
|
|
81
|
+
* List of rules for the analyzer containing criteria to exclude from analysis. Entities that meet the rule criteria will not generate findings. See `exclusion` Block for details.
|
|
52
82
|
*/
|
|
53
83
|
exclusions?: outputs.accessanalyzer.AnalyzerConfigurationUnusedAccessAnalysisRuleExclusion[];
|
|
54
84
|
}
|
|
55
85
|
interface AnalyzerConfigurationUnusedAccessAnalysisRuleExclusion {
|
|
56
86
|
/**
|
|
57
|
-
*
|
|
87
|
+
* List of AWS account IDs to apply to the analysis rule criteria. The accounts cannot include the organization analyzer owner account. Account IDs can only be applied to the analysis rule criteria for organization-level analyzers.
|
|
58
88
|
*/
|
|
59
89
|
accountIds?: string[];
|
|
60
90
|
/**
|
|
61
|
-
*
|
|
91
|
+
* List of key-value pairs for resource tags to exclude from the analysis.
|
|
62
92
|
*/
|
|
63
93
|
resourceTags?: {
|
|
64
94
|
[key: string]: string;
|
|
@@ -1225,6 +1255,12 @@ export declare namespace amplify {
|
|
|
1225
1255
|
*/
|
|
1226
1256
|
target: string;
|
|
1227
1257
|
}
|
|
1258
|
+
interface AppJobConfig {
|
|
1259
|
+
/**
|
|
1260
|
+
* Size of the build instance. Valid values: `STANDARD_8GB`, `LARGE_16GB`, and `XLARGE_72GB`. Default: `STANDARD_8GB`.
|
|
1261
|
+
*/
|
|
1262
|
+
buildComputeType: string;
|
|
1263
|
+
}
|
|
1228
1264
|
interface AppProductionBranch {
|
|
1229
1265
|
/**
|
|
1230
1266
|
* Branch name for the production branch.
|
|
@@ -16159,6 +16195,10 @@ export declare namespace codebuild {
|
|
|
16159
16195
|
* the [CodeBuild User Guide](https://docs.aws.amazon.com/codebuild/latest/userguide/build-env-ref-compute-types.html).
|
|
16160
16196
|
*/
|
|
16161
16197
|
computeType: string;
|
|
16198
|
+
/**
|
|
16199
|
+
* Configuration block. Detailed below.
|
|
16200
|
+
*/
|
|
16201
|
+
dockerServer?: outputs.codebuild.ProjectEnvironmentDockerServer;
|
|
16162
16202
|
/**
|
|
16163
16203
|
* Configuration block. Detailed below.
|
|
16164
16204
|
*/
|
|
@@ -16198,6 +16238,16 @@ export declare namespace codebuild {
|
|
|
16198
16238
|
*/
|
|
16199
16239
|
type: string;
|
|
16200
16240
|
}
|
|
16241
|
+
interface ProjectEnvironmentDockerServer {
|
|
16242
|
+
/**
|
|
16243
|
+
* Compute type for the Docker server. Valid values: `BUILD_GENERAL1_SMALL`, `BUILD_GENERAL1_MEDIUM`, `BUILD_GENERAL1_LARGE`, `BUILD_GENERAL1_XLARGE`, and `BUILD_GENERAL1_2XLARGE`.
|
|
16244
|
+
*/
|
|
16245
|
+
computeType: string;
|
|
16246
|
+
/**
|
|
16247
|
+
* List of security group IDs to assign to the Docker server.
|
|
16248
|
+
*/
|
|
16249
|
+
securityGroupIds?: string[];
|
|
16250
|
+
}
|
|
16201
16251
|
interface ProjectEnvironmentEnvironmentVariable {
|
|
16202
16252
|
/**
|
|
16203
16253
|
* Environment variable's name or key.
|
|
@@ -60991,25 +61041,23 @@ export declare namespace lightsail {
|
|
|
60991
61041
|
*/
|
|
60992
61042
|
cidrListAliases: string[];
|
|
60993
61043
|
/**
|
|
60994
|
-
* Set of CIDR
|
|
61044
|
+
* Set of IPv4 addresses or ranges of IPv4 addresses (in CIDR notation) that are allowed to connect to an instance through the ports, and the protocol.
|
|
60995
61045
|
*/
|
|
60996
61046
|
cidrs: string[];
|
|
60997
61047
|
/**
|
|
60998
|
-
* First port in a range of open ports on an instance.
|
|
61048
|
+
* First port in a range of open ports on an instance. See [PortInfo](https://docs.aws.amazon.com/lightsail/2016-11-28/api-reference/API_PortInfo.html) for details.
|
|
60999
61049
|
*/
|
|
61000
61050
|
fromPort: number;
|
|
61001
61051
|
/**
|
|
61002
|
-
* Set of IPv6 CIDR
|
|
61052
|
+
* Set of IPv6 addresses or ranges of IPv6 addresses (in CIDR notation) that are allowed to connect to an instance through the ports, and the protocol.
|
|
61003
61053
|
*/
|
|
61004
61054
|
ipv6Cidrs: string[];
|
|
61005
61055
|
/**
|
|
61006
|
-
* IP protocol name. Valid values: `tcp`, `all`, `udp`, `icmp`.
|
|
61056
|
+
* IP protocol name. Valid values: `tcp`, `all`, `udp`, `icmp`, `icmpv6`. See [PortInfo](https://docs.aws.amazon.com/lightsail/2016-11-28/api-reference/API_PortInfo.html) for details.
|
|
61007
61057
|
*/
|
|
61008
61058
|
protocol: string;
|
|
61009
61059
|
/**
|
|
61010
|
-
* Last port in a range of open ports on an instance.
|
|
61011
|
-
*
|
|
61012
|
-
* The following arguments are optional:
|
|
61060
|
+
* Last port in a range of open ports on an instance. See [PortInfo](https://docs.aws.amazon.com/lightsail/2016-11-28/api-reference/API_PortInfo.html) for details.
|
|
61013
61061
|
*/
|
|
61014
61062
|
toPort: number;
|
|
61015
61063
|
}
|
|
@@ -65409,6 +65457,12 @@ export declare namespace networkfirewall {
|
|
|
65409
65457
|
tcpIdleTimeoutSeconds?: number;
|
|
65410
65458
|
}
|
|
65411
65459
|
interface FirewallPolicyFirewallPolicyStatefulRuleGroupReference {
|
|
65460
|
+
/**
|
|
65461
|
+
* Whether to enable deep threat inspection, which allows AWS to analyze service logs of network traffic processed by these rule groups to identify threat indicators across customers. AWS will use these threat indicators to improve the active threat defense managed rule groups and protect the security of AWS customers and services. This only applies to active threat defense maanaged rule groups.
|
|
65462
|
+
*
|
|
65463
|
+
* For details, refer to [AWS active threat defense for AWS Network Firewall](https://docs.aws.amazon.com/network-firewall/latest/developerguide/aws-managed-rule-groups-atd.html) in the AWS Network Firewall Developer Guide.
|
|
65464
|
+
*/
|
|
65465
|
+
deepThreatInspection: string;
|
|
65412
65466
|
/**
|
|
65413
65467
|
* Configuration block for override values
|
|
65414
65468
|
*/
|
|
@@ -65574,6 +65628,7 @@ export declare namespace networkfirewall {
|
|
|
65574
65628
|
streamExceptionPolicy: string;
|
|
65575
65629
|
}
|
|
65576
65630
|
interface GetFirewallPolicyFirewallPolicyStatefulRuleGroupReference {
|
|
65631
|
+
deepThreatInspection: string;
|
|
65577
65632
|
overrides?: outputs.networkfirewall.GetFirewallPolicyFirewallPolicyStatefulRuleGroupReferenceOverride[];
|
|
65578
65633
|
priority: number;
|
|
65579
65634
|
resourceArn: string;
|
|
@@ -73223,6 +73278,58 @@ export declare namespace s3 {
|
|
|
73223
73278
|
*/
|
|
73224
73279
|
id: string;
|
|
73225
73280
|
}
|
|
73281
|
+
interface BucketAclV2AccessControlPolicy {
|
|
73282
|
+
/**
|
|
73283
|
+
* Set of `grant` configuration blocks. See below.
|
|
73284
|
+
*/
|
|
73285
|
+
grants?: outputs.s3.BucketAclV2AccessControlPolicyGrant[];
|
|
73286
|
+
/**
|
|
73287
|
+
* Configuration block for the bucket owner's display name and ID. See below.
|
|
73288
|
+
*/
|
|
73289
|
+
owner: outputs.s3.BucketAclV2AccessControlPolicyOwner;
|
|
73290
|
+
}
|
|
73291
|
+
interface BucketAclV2AccessControlPolicyGrant {
|
|
73292
|
+
/**
|
|
73293
|
+
* Configuration block for the person being granted permissions. See below.
|
|
73294
|
+
*/
|
|
73295
|
+
grantee?: outputs.s3.BucketAclV2AccessControlPolicyGrantGrantee;
|
|
73296
|
+
/**
|
|
73297
|
+
* Logging permissions assigned to the grantee for the bucket. Valid values: `FULL_CONTROL`, `WRITE`, `WRITE_ACP`, `READ`, `READ_ACP`. See [What permissions can I grant?](https://docs.aws.amazon.com/AmazonS3/latest/userguide/acl-overview.html#permissions) for more details about what each permission means in the context of buckets.
|
|
73298
|
+
*/
|
|
73299
|
+
permission: string;
|
|
73300
|
+
}
|
|
73301
|
+
interface BucketAclV2AccessControlPolicyGrantGrantee {
|
|
73302
|
+
/**
|
|
73303
|
+
* Display name of the owner.
|
|
73304
|
+
*/
|
|
73305
|
+
displayName: string;
|
|
73306
|
+
/**
|
|
73307
|
+
* Email address of the grantee. See [Regions and Endpoints](https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region) for supported AWS regions where this argument can be specified.
|
|
73308
|
+
*/
|
|
73309
|
+
emailAddress?: string;
|
|
73310
|
+
/**
|
|
73311
|
+
* Canonical user ID of the grantee.
|
|
73312
|
+
*/
|
|
73313
|
+
id?: string;
|
|
73314
|
+
/**
|
|
73315
|
+
* Type of grantee. Valid values: `CanonicalUser`, `AmazonCustomerByEmail`, `Group`.
|
|
73316
|
+
*/
|
|
73317
|
+
type: string;
|
|
73318
|
+
/**
|
|
73319
|
+
* URI of the grantee group.
|
|
73320
|
+
*/
|
|
73321
|
+
uri?: string;
|
|
73322
|
+
}
|
|
73323
|
+
interface BucketAclV2AccessControlPolicyOwner {
|
|
73324
|
+
/**
|
|
73325
|
+
* Display name of the owner.
|
|
73326
|
+
*/
|
|
73327
|
+
displayName: string;
|
|
73328
|
+
/**
|
|
73329
|
+
* ID of the owner.
|
|
73330
|
+
*/
|
|
73331
|
+
id: string;
|
|
73332
|
+
}
|
|
73226
73333
|
interface BucketCorsConfigurationCorsRule {
|
|
73227
73334
|
/**
|
|
73228
73335
|
* Set of Headers that are specified in the `Access-Control-Request-Headers` header.
|
|
@@ -73249,6 +73356,32 @@ export declare namespace s3 {
|
|
|
73249
73356
|
*/
|
|
73250
73357
|
maxAgeSeconds?: number;
|
|
73251
73358
|
}
|
|
73359
|
+
interface BucketCorsConfigurationV2CorsRule {
|
|
73360
|
+
/**
|
|
73361
|
+
* Set of Headers that are specified in the `Access-Control-Request-Headers` header.
|
|
73362
|
+
*/
|
|
73363
|
+
allowedHeaders?: string[];
|
|
73364
|
+
/**
|
|
73365
|
+
* Set of HTTP methods that you allow the origin to execute. Valid values are `GET`, `PUT`, `HEAD`, `POST`, and `DELETE`.
|
|
73366
|
+
*/
|
|
73367
|
+
allowedMethods: string[];
|
|
73368
|
+
/**
|
|
73369
|
+
* Set of origins you want customers to be able to access the bucket from.
|
|
73370
|
+
*/
|
|
73371
|
+
allowedOrigins: string[];
|
|
73372
|
+
/**
|
|
73373
|
+
* Set of headers in the response that you want customers to be able to access from their applications (for example, from a JavaScript `XMLHttpRequest` object).
|
|
73374
|
+
*/
|
|
73375
|
+
exposeHeaders?: string[];
|
|
73376
|
+
/**
|
|
73377
|
+
* Unique identifier for the rule. The value cannot be longer than 255 characters.
|
|
73378
|
+
*/
|
|
73379
|
+
id?: string;
|
|
73380
|
+
/**
|
|
73381
|
+
* Time in seconds that your browser is to cache the preflight response for the specified resource.
|
|
73382
|
+
*/
|
|
73383
|
+
maxAgeSeconds?: number;
|
|
73384
|
+
}
|
|
73252
73385
|
interface BucketCorsRule {
|
|
73253
73386
|
/**
|
|
73254
73387
|
* List of headers allowed.
|
|
@@ -73480,6 +73613,175 @@ export declare namespace s3 {
|
|
|
73480
73613
|
*/
|
|
73481
73614
|
update?: string;
|
|
73482
73615
|
}
|
|
73616
|
+
interface BucketLifecycleConfigurationV2Rule {
|
|
73617
|
+
/**
|
|
73618
|
+
* Configuration block that specifies the days since the initiation of an incomplete multipart upload that Amazon S3 will wait before permanently removing all parts of the upload. See below.
|
|
73619
|
+
*/
|
|
73620
|
+
abortIncompleteMultipartUpload?: outputs.s3.BucketLifecycleConfigurationV2RuleAbortIncompleteMultipartUpload;
|
|
73621
|
+
/**
|
|
73622
|
+
* Configuration block that specifies the expiration for the lifecycle of the object in the form of date, days and, whether the object has a delete marker. See below.
|
|
73623
|
+
*/
|
|
73624
|
+
expiration?: outputs.s3.BucketLifecycleConfigurationV2RuleExpiration;
|
|
73625
|
+
/**
|
|
73626
|
+
* Configuration block used to identify objects that a Lifecycle Rule applies to.
|
|
73627
|
+
* See below.
|
|
73628
|
+
* If not specified, the `rule` will default to using `prefix`.
|
|
73629
|
+
* One of `filter` or `prefix` should be specified.
|
|
73630
|
+
*/
|
|
73631
|
+
filter?: outputs.s3.BucketLifecycleConfigurationV2RuleFilter;
|
|
73632
|
+
/**
|
|
73633
|
+
* Unique identifier for the rule. The value cannot be longer than 255 characters.
|
|
73634
|
+
*/
|
|
73635
|
+
id: string;
|
|
73636
|
+
/**
|
|
73637
|
+
* Configuration block that specifies when noncurrent object versions expire. See below.
|
|
73638
|
+
*/
|
|
73639
|
+
noncurrentVersionExpiration?: outputs.s3.BucketLifecycleConfigurationV2RuleNoncurrentVersionExpiration;
|
|
73640
|
+
/**
|
|
73641
|
+
* Set of configuration blocks that specify the transition rule for the lifecycle rule that describes when noncurrent objects transition to a specific storage class. See below.
|
|
73642
|
+
*/
|
|
73643
|
+
noncurrentVersionTransitions?: outputs.s3.BucketLifecycleConfigurationV2RuleNoncurrentVersionTransition[];
|
|
73644
|
+
/**
|
|
73645
|
+
* **DEPRECATED** Use `filter` instead.
|
|
73646
|
+
* This has been deprecated by Amazon S3.
|
|
73647
|
+
* Prefix identifying one or more objects to which the rule applies.
|
|
73648
|
+
* Defaults to an empty string (`""`) if `filter` is not specified.
|
|
73649
|
+
* One of `prefix` or `filter` should be specified.
|
|
73650
|
+
*
|
|
73651
|
+
* @deprecated Specify a prefix using 'filter' instead
|
|
73652
|
+
*/
|
|
73653
|
+
prefix: string;
|
|
73654
|
+
/**
|
|
73655
|
+
* Whether the rule is currently being applied. Valid values: `Enabled` or `Disabled`.
|
|
73656
|
+
*/
|
|
73657
|
+
status: string;
|
|
73658
|
+
/**
|
|
73659
|
+
* Set of configuration blocks that specify when an Amazon S3 object transitions to a specified storage class. See below.
|
|
73660
|
+
*/
|
|
73661
|
+
transitions?: outputs.s3.BucketLifecycleConfigurationV2RuleTransition[];
|
|
73662
|
+
}
|
|
73663
|
+
interface BucketLifecycleConfigurationV2RuleAbortIncompleteMultipartUpload {
|
|
73664
|
+
/**
|
|
73665
|
+
* Number of days after which Amazon S3 aborts an incomplete multipart upload.
|
|
73666
|
+
*/
|
|
73667
|
+
daysAfterInitiation?: number;
|
|
73668
|
+
}
|
|
73669
|
+
interface BucketLifecycleConfigurationV2RuleExpiration {
|
|
73670
|
+
/**
|
|
73671
|
+
* Date the object is to be moved or deleted. The date value must be in [RFC3339 full-date format](https://datatracker.ietf.org/doc/html/rfc3339#section-5.6) e.g. `2023-08-22`.
|
|
73672
|
+
*/
|
|
73673
|
+
date?: string;
|
|
73674
|
+
/**
|
|
73675
|
+
* Lifetime, in days, of the objects that are subject to the rule. The value must be a non-zero positive integer.
|
|
73676
|
+
*/
|
|
73677
|
+
days: number;
|
|
73678
|
+
/**
|
|
73679
|
+
* Indicates whether Amazon S3 will remove a delete marker with no noncurrent versions. If set to `true`, the delete marker will be expired; if set to `false` the policy takes no action.
|
|
73680
|
+
*/
|
|
73681
|
+
expiredObjectDeleteMarker: boolean;
|
|
73682
|
+
}
|
|
73683
|
+
interface BucketLifecycleConfigurationV2RuleFilter {
|
|
73684
|
+
/**
|
|
73685
|
+
* Configuration block used to apply a logical `AND` to two or more predicates. See below. The Lifecycle Rule will apply to any object matching all the predicates configured inside the `and` block.
|
|
73686
|
+
*/
|
|
73687
|
+
and?: outputs.s3.BucketLifecycleConfigurationV2RuleFilterAnd;
|
|
73688
|
+
/**
|
|
73689
|
+
* Minimum object size (in bytes) to which the rule applies.
|
|
73690
|
+
*/
|
|
73691
|
+
objectSizeGreaterThan: number;
|
|
73692
|
+
/**
|
|
73693
|
+
* Maximum object size (in bytes) to which the rule applies.
|
|
73694
|
+
*/
|
|
73695
|
+
objectSizeLessThan: number;
|
|
73696
|
+
/**
|
|
73697
|
+
* Prefix identifying one or more objects to which the rule applies. Defaults to an empty string (`""`) if not specified.
|
|
73698
|
+
*/
|
|
73699
|
+
prefix: string;
|
|
73700
|
+
/**
|
|
73701
|
+
* Configuration block for specifying a tag key and value. See below.
|
|
73702
|
+
*/
|
|
73703
|
+
tag?: outputs.s3.BucketLifecycleConfigurationV2RuleFilterTag;
|
|
73704
|
+
}
|
|
73705
|
+
interface BucketLifecycleConfigurationV2RuleFilterAnd {
|
|
73706
|
+
/**
|
|
73707
|
+
* Minimum object size to which the rule applies. Value must be at least `0` if specified. Defaults to 128000 (128 KB) for all `storageClass` values unless `transitionDefaultMinimumObjectSize` specifies otherwise.
|
|
73708
|
+
*/
|
|
73709
|
+
objectSizeGreaterThan: number;
|
|
73710
|
+
/**
|
|
73711
|
+
* Maximum object size to which the rule applies. Value must be at least `1` if specified.
|
|
73712
|
+
*/
|
|
73713
|
+
objectSizeLessThan: number;
|
|
73714
|
+
/**
|
|
73715
|
+
* Prefix identifying one or more objects to which the rule applies.
|
|
73716
|
+
*/
|
|
73717
|
+
prefix: string;
|
|
73718
|
+
/**
|
|
73719
|
+
* Key-value map of resource tags.
|
|
73720
|
+
* All of these tags must exist in the object's tag set in order for the rule to apply.
|
|
73721
|
+
* If set, must contain at least one key-value pair.
|
|
73722
|
+
*/
|
|
73723
|
+
tags?: {
|
|
73724
|
+
[key: string]: string;
|
|
73725
|
+
};
|
|
73726
|
+
}
|
|
73727
|
+
interface BucketLifecycleConfigurationV2RuleFilterTag {
|
|
73728
|
+
/**
|
|
73729
|
+
* Name of the object key.
|
|
73730
|
+
*/
|
|
73731
|
+
key: string;
|
|
73732
|
+
/**
|
|
73733
|
+
* Value of the tag.
|
|
73734
|
+
*/
|
|
73735
|
+
value: string;
|
|
73736
|
+
}
|
|
73737
|
+
interface BucketLifecycleConfigurationV2RuleNoncurrentVersionExpiration {
|
|
73738
|
+
/**
|
|
73739
|
+
* Number of noncurrent versions Amazon S3 will retain. Must be a non-zero positive integer.
|
|
73740
|
+
*/
|
|
73741
|
+
newerNoncurrentVersions: number;
|
|
73742
|
+
/**
|
|
73743
|
+
* Number of days an object is noncurrent before Amazon S3 can perform the associated action. Must be a positive integer.
|
|
73744
|
+
*/
|
|
73745
|
+
noncurrentDays: number;
|
|
73746
|
+
}
|
|
73747
|
+
interface BucketLifecycleConfigurationV2RuleNoncurrentVersionTransition {
|
|
73748
|
+
/**
|
|
73749
|
+
* Number of noncurrent versions Amazon S3 will retain. Must be a non-zero positive integer.
|
|
73750
|
+
*/
|
|
73751
|
+
newerNoncurrentVersions: number;
|
|
73752
|
+
/**
|
|
73753
|
+
* Number of days an object is noncurrent before Amazon S3 can perform the associated action.
|
|
73754
|
+
*/
|
|
73755
|
+
noncurrentDays: number;
|
|
73756
|
+
/**
|
|
73757
|
+
* Class of storage used to store the object. Valid Values: `GLACIER`, `STANDARD_IA`, `ONEZONE_IA`, `INTELLIGENT_TIERING`, `DEEP_ARCHIVE`, `GLACIER_IR`.
|
|
73758
|
+
*/
|
|
73759
|
+
storageClass: string;
|
|
73760
|
+
}
|
|
73761
|
+
interface BucketLifecycleConfigurationV2RuleTransition {
|
|
73762
|
+
/**
|
|
73763
|
+
* Date objects are transitioned to the specified storage class. The date value must be in [RFC3339 full-date format](https://datatracker.ietf.org/doc/html/rfc3339#section-5.6) e.g. `2023-08-22`.
|
|
73764
|
+
*/
|
|
73765
|
+
date?: string;
|
|
73766
|
+
/**
|
|
73767
|
+
* Number of days after creation when objects are transitioned to the specified storage class. The value must be a positive integer. If both `days` and `date` are not specified, defaults to `0`. Valid values depend on `storageClass`, see [Transition objects using Amazon S3 Lifecycle](https://docs.aws.amazon.com/AmazonS3/latest/userguide/lifecycle-transition-general-considerations.html) for more details.
|
|
73768
|
+
*/
|
|
73769
|
+
days: number;
|
|
73770
|
+
/**
|
|
73771
|
+
* Class of storage used to store the object. Valid Values: `GLACIER`, `STANDARD_IA`, `ONEZONE_IA`, `INTELLIGENT_TIERING`, `DEEP_ARCHIVE`, `GLACIER_IR`.
|
|
73772
|
+
*/
|
|
73773
|
+
storageClass: string;
|
|
73774
|
+
}
|
|
73775
|
+
interface BucketLifecycleConfigurationV2Timeouts {
|
|
73776
|
+
/**
|
|
73777
|
+
* A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as "30s" or "2h45m". Valid time units are "s" (seconds), "m" (minutes), "h" (hours).
|
|
73778
|
+
*/
|
|
73779
|
+
create?: string;
|
|
73780
|
+
/**
|
|
73781
|
+
* A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as "30s" or "2h45m". Valid time units are "s" (seconds), "m" (minutes), "h" (hours).
|
|
73782
|
+
*/
|
|
73783
|
+
update?: string;
|
|
73784
|
+
}
|
|
73483
73785
|
interface BucketLifecycleRule {
|
|
73484
73786
|
/**
|
|
73485
73787
|
* Specifies the number of days after initiating a multipart upload when the multipart upload must be completed.
|
|
@@ -73621,6 +73923,53 @@ export declare namespace s3 {
|
|
|
73621
73923
|
}
|
|
73622
73924
|
interface BucketLoggingTargetObjectKeyFormatSimplePrefix {
|
|
73623
73925
|
}
|
|
73926
|
+
interface BucketLoggingV2TargetGrant {
|
|
73927
|
+
/**
|
|
73928
|
+
* Configuration block for the person being granted permissions. See below.
|
|
73929
|
+
*/
|
|
73930
|
+
grantee: outputs.s3.BucketLoggingV2TargetGrantGrantee;
|
|
73931
|
+
/**
|
|
73932
|
+
* Logging permissions assigned to the grantee for the bucket. Valid values: `FULL_CONTROL`, `READ`, `WRITE`.
|
|
73933
|
+
*/
|
|
73934
|
+
permission: string;
|
|
73935
|
+
}
|
|
73936
|
+
interface BucketLoggingV2TargetGrantGrantee {
|
|
73937
|
+
displayName: string;
|
|
73938
|
+
/**
|
|
73939
|
+
* Email address of the grantee. See [Regions and Endpoints](https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region) for supported AWS regions where this argument can be specified.
|
|
73940
|
+
*/
|
|
73941
|
+
emailAddress?: string;
|
|
73942
|
+
/**
|
|
73943
|
+
* Canonical user ID of the grantee.
|
|
73944
|
+
*/
|
|
73945
|
+
id?: string;
|
|
73946
|
+
/**
|
|
73947
|
+
* Type of grantee. Valid values: `CanonicalUser`, `AmazonCustomerByEmail`, `Group`.
|
|
73948
|
+
*/
|
|
73949
|
+
type: string;
|
|
73950
|
+
/**
|
|
73951
|
+
* URI of the grantee group.
|
|
73952
|
+
*/
|
|
73953
|
+
uri?: string;
|
|
73954
|
+
}
|
|
73955
|
+
interface BucketLoggingV2TargetObjectKeyFormat {
|
|
73956
|
+
/**
|
|
73957
|
+
* Partitioned S3 key for log objects. See below.
|
|
73958
|
+
*/
|
|
73959
|
+
partitionedPrefix?: outputs.s3.BucketLoggingV2TargetObjectKeyFormatPartitionedPrefix;
|
|
73960
|
+
/**
|
|
73961
|
+
* Use the simple format for S3 keys for log objects. To use, set `simplePrefix {}`.
|
|
73962
|
+
*/
|
|
73963
|
+
simplePrefix?: outputs.s3.BucketLoggingV2TargetObjectKeyFormatSimplePrefix;
|
|
73964
|
+
}
|
|
73965
|
+
interface BucketLoggingV2TargetObjectKeyFormatPartitionedPrefix {
|
|
73966
|
+
/**
|
|
73967
|
+
* Specifies the partition date source for the partitioned prefix. Valid values: `EventTime`, `DeliveryTime`.
|
|
73968
|
+
*/
|
|
73969
|
+
partitionDateSource: string;
|
|
73970
|
+
}
|
|
73971
|
+
interface BucketLoggingV2TargetObjectKeyFormatSimplePrefix {
|
|
73972
|
+
}
|
|
73624
73973
|
interface BucketMetricFilter {
|
|
73625
73974
|
/**
|
|
73626
73975
|
* S3 Access Point ARN for filtering (singular).
|
|
@@ -73737,6 +74086,26 @@ export declare namespace s3 {
|
|
|
73737
74086
|
*/
|
|
73738
74087
|
years?: number;
|
|
73739
74088
|
}
|
|
74089
|
+
interface BucketObjectLockConfigurationV2Rule {
|
|
74090
|
+
/**
|
|
74091
|
+
* Configuration block for specifying the default Object Lock retention settings for new objects placed in the specified bucket. See below.
|
|
74092
|
+
*/
|
|
74093
|
+
defaultRetention: outputs.s3.BucketObjectLockConfigurationV2RuleDefaultRetention;
|
|
74094
|
+
}
|
|
74095
|
+
interface BucketObjectLockConfigurationV2RuleDefaultRetention {
|
|
74096
|
+
/**
|
|
74097
|
+
* Number of days that you want to specify for the default retention period.
|
|
74098
|
+
*/
|
|
74099
|
+
days?: number;
|
|
74100
|
+
/**
|
|
74101
|
+
* Default Object Lock retention mode you want to apply to new objects placed in the specified bucket. Valid values: `COMPLIANCE`, `GOVERNANCE`.
|
|
74102
|
+
*/
|
|
74103
|
+
mode?: string;
|
|
74104
|
+
/**
|
|
74105
|
+
* Number of years that you want to specify for the default retention period.
|
|
74106
|
+
*/
|
|
74107
|
+
years?: number;
|
|
74108
|
+
}
|
|
73740
74109
|
interface BucketObjectv2OverrideProvider {
|
|
73741
74110
|
/**
|
|
73742
74111
|
* Override the provider `defaultTags` configuration block.
|
|
@@ -74097,6 +74466,376 @@ export declare namespace s3 {
|
|
|
74097
74466
|
*/
|
|
74098
74467
|
sseAlgorithm: string;
|
|
74099
74468
|
}
|
|
74469
|
+
interface BucketServerSideEncryptionConfigurationV2Rule {
|
|
74470
|
+
/**
|
|
74471
|
+
* Single object for setting server-side encryption by default. See below.
|
|
74472
|
+
*/
|
|
74473
|
+
applyServerSideEncryptionByDefault?: outputs.s3.BucketServerSideEncryptionConfigurationV2RuleApplyServerSideEncryptionByDefault;
|
|
74474
|
+
/**
|
|
74475
|
+
* Whether or not to use [Amazon S3 Bucket Keys](https://docs.aws.amazon.com/AmazonS3/latest/dev/bucket-key.html) for SSE-KMS.
|
|
74476
|
+
*/
|
|
74477
|
+
bucketKeyEnabled?: boolean;
|
|
74478
|
+
}
|
|
74479
|
+
interface BucketServerSideEncryptionConfigurationV2RuleApplyServerSideEncryptionByDefault {
|
|
74480
|
+
/**
|
|
74481
|
+
* AWS KMS master key ID used for the SSE-KMS encryption. This can only be used when you set the value of `sseAlgorithm` as `aws:kms`. The default `aws/s3` AWS KMS master key is used if this element is absent while the `sseAlgorithm` is `aws:kms`.
|
|
74482
|
+
*/
|
|
74483
|
+
kmsMasterKeyId?: string;
|
|
74484
|
+
/**
|
|
74485
|
+
* Server-side encryption algorithm to use. Valid values are `AES256`, `aws:kms`, and `aws:kms:dsse`
|
|
74486
|
+
*/
|
|
74487
|
+
sseAlgorithm: string;
|
|
74488
|
+
}
|
|
74489
|
+
interface BucketV2CorsRule {
|
|
74490
|
+
/**
|
|
74491
|
+
* List of headers allowed.
|
|
74492
|
+
*/
|
|
74493
|
+
allowedHeaders?: string[];
|
|
74494
|
+
/**
|
|
74495
|
+
* One or more HTTP methods that you allow the origin to execute. Can be `GET`, `PUT`, `POST`, `DELETE` or `HEAD`.
|
|
74496
|
+
*/
|
|
74497
|
+
allowedMethods: string[];
|
|
74498
|
+
/**
|
|
74499
|
+
* One or more origins you want customers to be able to access the bucket from.
|
|
74500
|
+
*/
|
|
74501
|
+
allowedOrigins: string[];
|
|
74502
|
+
/**
|
|
74503
|
+
* One or more headers in the response that you want customers to be able to access from their applications (for example, from a JavaScript `XMLHttpRequest` object).
|
|
74504
|
+
*/
|
|
74505
|
+
exposeHeaders?: string[];
|
|
74506
|
+
/**
|
|
74507
|
+
* Specifies time in seconds that browser can cache the response for a preflight request.
|
|
74508
|
+
*/
|
|
74509
|
+
maxAgeSeconds?: number;
|
|
74510
|
+
}
|
|
74511
|
+
interface BucketV2Grant {
|
|
74512
|
+
/**
|
|
74513
|
+
* Canonical user id to grant for. Used only when `type` is `CanonicalUser`.
|
|
74514
|
+
*/
|
|
74515
|
+
id?: string;
|
|
74516
|
+
/**
|
|
74517
|
+
* List of permissions to apply for grantee. Valid values are `READ`, `WRITE`, `READ_ACP`, `WRITE_ACP`, `FULL_CONTROL`.
|
|
74518
|
+
*/
|
|
74519
|
+
permissions: string[];
|
|
74520
|
+
/**
|
|
74521
|
+
* Type of grantee to apply for. Valid values are `CanonicalUser` and `Group`. `AmazonCustomerByEmail` is not supported.
|
|
74522
|
+
*/
|
|
74523
|
+
type: string;
|
|
74524
|
+
/**
|
|
74525
|
+
* Uri address to grant for. Used only when `type` is `Group`.
|
|
74526
|
+
*/
|
|
74527
|
+
uri?: string;
|
|
74528
|
+
}
|
|
74529
|
+
interface BucketV2LifecycleRule {
|
|
74530
|
+
/**
|
|
74531
|
+
* Specifies the number of days after initiating a multipart upload when the multipart upload must be completed.
|
|
74532
|
+
*/
|
|
74533
|
+
abortIncompleteMultipartUploadDays?: number;
|
|
74534
|
+
/**
|
|
74535
|
+
* Specifies lifecycle rule status.
|
|
74536
|
+
*/
|
|
74537
|
+
enabled: boolean;
|
|
74538
|
+
/**
|
|
74539
|
+
* Specifies a period in the object's expire. See Expiration below for details.
|
|
74540
|
+
*/
|
|
74541
|
+
expirations?: outputs.s3.BucketV2LifecycleRuleExpiration[];
|
|
74542
|
+
/**
|
|
74543
|
+
* Unique identifier for the rule. Must be less than or equal to 255 characters in length.
|
|
74544
|
+
*/
|
|
74545
|
+
id: string;
|
|
74546
|
+
/**
|
|
74547
|
+
* Specifies when noncurrent object versions expire. See Noncurrent Version Expiration below for details.
|
|
74548
|
+
*/
|
|
74549
|
+
noncurrentVersionExpirations?: outputs.s3.BucketV2LifecycleRuleNoncurrentVersionExpiration[];
|
|
74550
|
+
/**
|
|
74551
|
+
* Specifies when noncurrent object versions transitions. See Noncurrent Version Transition below for details.
|
|
74552
|
+
*/
|
|
74553
|
+
noncurrentVersionTransitions?: outputs.s3.BucketV2LifecycleRuleNoncurrentVersionTransition[];
|
|
74554
|
+
/**
|
|
74555
|
+
* Object key prefix identifying one or more objects to which the rule applies.
|
|
74556
|
+
*/
|
|
74557
|
+
prefix?: string;
|
|
74558
|
+
/**
|
|
74559
|
+
* Specifies object tags key and value.
|
|
74560
|
+
*/
|
|
74561
|
+
tags?: {
|
|
74562
|
+
[key: string]: string;
|
|
74563
|
+
};
|
|
74564
|
+
/**
|
|
74565
|
+
* Specifies a period in the object's transitions. See Transition below for details.
|
|
74566
|
+
*/
|
|
74567
|
+
transitions?: outputs.s3.BucketV2LifecycleRuleTransition[];
|
|
74568
|
+
}
|
|
74569
|
+
interface BucketV2LifecycleRuleExpiration {
|
|
74570
|
+
/**
|
|
74571
|
+
* Specifies the date after which you want the corresponding action to take effect.
|
|
74572
|
+
*/
|
|
74573
|
+
date?: string;
|
|
74574
|
+
/**
|
|
74575
|
+
* Specifies the number of days after object creation when the specific rule action takes effect.
|
|
74576
|
+
*/
|
|
74577
|
+
days?: number;
|
|
74578
|
+
/**
|
|
74579
|
+
* On a versioned bucket (versioning-enabled or versioning-suspended bucket), you can add this element in the lifecycle configuration to direct Amazon S3 to delete expired object delete markers. This cannot be specified with Days or Date in a Lifecycle Expiration Policy.
|
|
74580
|
+
*/
|
|
74581
|
+
expiredObjectDeleteMarker?: boolean;
|
|
74582
|
+
}
|
|
74583
|
+
interface BucketV2LifecycleRuleNoncurrentVersionExpiration {
|
|
74584
|
+
/**
|
|
74585
|
+
* Specifies the number of days noncurrent object versions expire.
|
|
74586
|
+
*/
|
|
74587
|
+
days?: number;
|
|
74588
|
+
}
|
|
74589
|
+
interface BucketV2LifecycleRuleNoncurrentVersionTransition {
|
|
74590
|
+
/**
|
|
74591
|
+
* Specifies the number of days noncurrent object versions transition.
|
|
74592
|
+
*/
|
|
74593
|
+
days?: number;
|
|
74594
|
+
/**
|
|
74595
|
+
* Specifies the Amazon S3 [storage class](https://docs.aws.amazon.com/AmazonS3/latest/API/API_Transition.html#AmazonS3-Type-Transition-StorageClass) to which you want the object to transition.
|
|
74596
|
+
*/
|
|
74597
|
+
storageClass: string;
|
|
74598
|
+
}
|
|
74599
|
+
interface BucketV2LifecycleRuleTransition {
|
|
74600
|
+
/**
|
|
74601
|
+
* Specifies the date after which you want the corresponding action to take effect.
|
|
74602
|
+
*/
|
|
74603
|
+
date?: string;
|
|
74604
|
+
/**
|
|
74605
|
+
* Specifies the number of days after object creation when the specific rule action takes effect.
|
|
74606
|
+
*/
|
|
74607
|
+
days?: number;
|
|
74608
|
+
/**
|
|
74609
|
+
* Specifies the Amazon S3 [storage class](https://docs.aws.amazon.com/AmazonS3/latest/API/API_Transition.html#AmazonS3-Type-Transition-StorageClass) to which you want the object to transition.
|
|
74610
|
+
*/
|
|
74611
|
+
storageClass: string;
|
|
74612
|
+
}
|
|
74613
|
+
interface BucketV2Logging {
|
|
74614
|
+
/**
|
|
74615
|
+
* Name of the bucket that will receive the log objects.
|
|
74616
|
+
*/
|
|
74617
|
+
targetBucket: string;
|
|
74618
|
+
/**
|
|
74619
|
+
* To specify a key prefix for log objects.
|
|
74620
|
+
*/
|
|
74621
|
+
targetPrefix?: string;
|
|
74622
|
+
}
|
|
74623
|
+
interface BucketV2ObjectLockConfiguration {
|
|
74624
|
+
/**
|
|
74625
|
+
* Indicates whether this bucket has an Object Lock configuration enabled. Valid values are `true` or `false`. This argument is not supported in all regions or partitions.
|
|
74626
|
+
*
|
|
74627
|
+
* @deprecated object_lock_enabled is deprecated. Use the top-level parameter objectLockEnabled instead.
|
|
74628
|
+
*/
|
|
74629
|
+
objectLockEnabled?: string;
|
|
74630
|
+
/**
|
|
74631
|
+
* Object Lock rule in place for this bucket (documented below).
|
|
74632
|
+
*
|
|
74633
|
+
* @deprecated rule is deprecated. Use the aws.s3.BucketObjectLockConfiguration resource instead.
|
|
74634
|
+
*/
|
|
74635
|
+
rules?: outputs.s3.BucketV2ObjectLockConfigurationRule[];
|
|
74636
|
+
}
|
|
74637
|
+
interface BucketV2ObjectLockConfigurationRule {
|
|
74638
|
+
/**
|
|
74639
|
+
* Default retention period that you want to apply to new objects placed in this bucket (documented below).
|
|
74640
|
+
*/
|
|
74641
|
+
defaultRetentions: outputs.s3.BucketV2ObjectLockConfigurationRuleDefaultRetention[];
|
|
74642
|
+
}
|
|
74643
|
+
interface BucketV2ObjectLockConfigurationRuleDefaultRetention {
|
|
74644
|
+
/**
|
|
74645
|
+
* Number of days that you want to specify for the default retention period.
|
|
74646
|
+
*/
|
|
74647
|
+
days?: number;
|
|
74648
|
+
/**
|
|
74649
|
+
* Default Object Lock retention mode you want to apply to new objects placed in this bucket. Valid values are `GOVERNANCE` and `COMPLIANCE`.
|
|
74650
|
+
*/
|
|
74651
|
+
mode: string;
|
|
74652
|
+
/**
|
|
74653
|
+
* Number of years that you want to specify for the default retention period.
|
|
74654
|
+
*/
|
|
74655
|
+
years?: number;
|
|
74656
|
+
}
|
|
74657
|
+
interface BucketV2ReplicationConfiguration {
|
|
74658
|
+
/**
|
|
74659
|
+
* ARN of the IAM role for Amazon S3 to assume when replicating the objects.
|
|
74660
|
+
*/
|
|
74661
|
+
role: string;
|
|
74662
|
+
/**
|
|
74663
|
+
* Specifies the rules managing the replication (documented below).
|
|
74664
|
+
*/
|
|
74665
|
+
rules: outputs.s3.BucketV2ReplicationConfigurationRule[];
|
|
74666
|
+
}
|
|
74667
|
+
interface BucketV2ReplicationConfigurationRule {
|
|
74668
|
+
/**
|
|
74669
|
+
* Whether delete markers are replicated. The only valid value is `Enabled`. To disable, omit this argument. This argument is only valid with V2 replication configurations (i.e., when `filter` is used).
|
|
74670
|
+
*/
|
|
74671
|
+
deleteMarkerReplicationStatus?: string;
|
|
74672
|
+
/**
|
|
74673
|
+
* Specifies the destination for the rule (documented below).
|
|
74674
|
+
*/
|
|
74675
|
+
destinations: outputs.s3.BucketV2ReplicationConfigurationRuleDestination[];
|
|
74676
|
+
/**
|
|
74677
|
+
* Filter that identifies subset of objects to which the replication rule applies (documented below).
|
|
74678
|
+
*/
|
|
74679
|
+
filters?: outputs.s3.BucketV2ReplicationConfigurationRuleFilter[];
|
|
74680
|
+
/**
|
|
74681
|
+
* Unique identifier for the rule. Must be less than or equal to 255 characters in length.
|
|
74682
|
+
*/
|
|
74683
|
+
id?: string;
|
|
74684
|
+
/**
|
|
74685
|
+
* Object keyname prefix identifying one or more objects to which the rule applies. Must be less than or equal to 1024 characters in length.
|
|
74686
|
+
*/
|
|
74687
|
+
prefix?: string;
|
|
74688
|
+
/**
|
|
74689
|
+
* Priority associated with the rule. Priority should only be set if `filter` is configured. If not provided, defaults to `0`. Priority must be unique between multiple rules.
|
|
74690
|
+
*/
|
|
74691
|
+
priority?: number;
|
|
74692
|
+
/**
|
|
74693
|
+
* Specifies special object selection criteria (documented below).
|
|
74694
|
+
*/
|
|
74695
|
+
sourceSelectionCriterias?: outputs.s3.BucketV2ReplicationConfigurationRuleSourceSelectionCriteria[];
|
|
74696
|
+
/**
|
|
74697
|
+
* Status of the rule. Either `Enabled` or `Disabled`. The rule is ignored if status is not Enabled.
|
|
74698
|
+
*/
|
|
74699
|
+
status: string;
|
|
74700
|
+
}
|
|
74701
|
+
interface BucketV2ReplicationConfigurationRuleDestination {
|
|
74702
|
+
/**
|
|
74703
|
+
* Specifies the overrides to use for object owners on replication (documented below). Must be used in conjunction with `accountId` owner override configuration.
|
|
74704
|
+
*/
|
|
74705
|
+
accessControlTranslations?: outputs.s3.BucketV2ReplicationConfigurationRuleDestinationAccessControlTranslation[];
|
|
74706
|
+
/**
|
|
74707
|
+
* Account ID to use for overriding the object owner on replication. Must be used in conjunction with `accessControlTranslation` override configuration.
|
|
74708
|
+
*/
|
|
74709
|
+
accountId?: string;
|
|
74710
|
+
/**
|
|
74711
|
+
* ARN of the S3 bucket where you want Amazon S3 to store replicas of the object identified by the rule.
|
|
74712
|
+
*/
|
|
74713
|
+
bucket: string;
|
|
74714
|
+
/**
|
|
74715
|
+
* Enables replication metrics (required for S3 RTC) (documented below).
|
|
74716
|
+
*/
|
|
74717
|
+
metrics?: outputs.s3.BucketV2ReplicationConfigurationRuleDestinationMetric[];
|
|
74718
|
+
/**
|
|
74719
|
+
* Destination KMS encryption key ARN for SSE-KMS replication. Must be used in conjunction with
|
|
74720
|
+
* `sseKmsEncryptedObjects` source selection criteria.
|
|
74721
|
+
*/
|
|
74722
|
+
replicaKmsKeyId?: string;
|
|
74723
|
+
/**
|
|
74724
|
+
* Enables S3 Replication Time Control (S3 RTC) (documented below).
|
|
74725
|
+
*/
|
|
74726
|
+
replicationTimes?: outputs.s3.BucketV2ReplicationConfigurationRuleDestinationReplicationTime[];
|
|
74727
|
+
/**
|
|
74728
|
+
* The [storage class](https://docs.aws.amazon.com/AmazonS3/latest/API/API_Destination.html#AmazonS3-Type-Destination-StorageClass) used to store the object. By default, Amazon S3 uses the storage class of the source object to create the object replica.
|
|
74729
|
+
*/
|
|
74730
|
+
storageClass?: string;
|
|
74731
|
+
}
|
|
74732
|
+
interface BucketV2ReplicationConfigurationRuleDestinationAccessControlTranslation {
|
|
74733
|
+
/**
|
|
74734
|
+
* Specifies the replica ownership. For default and valid values, see [PUT bucket replication](https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketReplication.html) in the Amazon S3 API Reference. The only valid value is `Destination`.
|
|
74735
|
+
*/
|
|
74736
|
+
owner: string;
|
|
74737
|
+
}
|
|
74738
|
+
interface BucketV2ReplicationConfigurationRuleDestinationMetric {
|
|
74739
|
+
/**
|
|
74740
|
+
* Threshold within which objects are to be replicated. The only valid value is `15`.
|
|
74741
|
+
*/
|
|
74742
|
+
minutes?: number;
|
|
74743
|
+
/**
|
|
74744
|
+
* Status of replication metrics. Either `Enabled` or `Disabled`.
|
|
74745
|
+
*/
|
|
74746
|
+
status?: string;
|
|
74747
|
+
}
|
|
74748
|
+
interface BucketV2ReplicationConfigurationRuleDestinationReplicationTime {
|
|
74749
|
+
/**
|
|
74750
|
+
* Threshold within which objects are to be replicated. The only valid value is `15`.
|
|
74751
|
+
*/
|
|
74752
|
+
minutes?: number;
|
|
74753
|
+
/**
|
|
74754
|
+
* Status of RTC. Either `Enabled` or `Disabled`.
|
|
74755
|
+
*/
|
|
74756
|
+
status?: string;
|
|
74757
|
+
}
|
|
74758
|
+
interface BucketV2ReplicationConfigurationRuleFilter {
|
|
74759
|
+
/**
|
|
74760
|
+
* Object keyname prefix that identifies subset of objects to which the rule applies. Must be less than or equal to 1024 characters in length.
|
|
74761
|
+
*/
|
|
74762
|
+
prefix?: string;
|
|
74763
|
+
/**
|
|
74764
|
+
* A map of tags that identifies subset of objects to which the rule applies.
|
|
74765
|
+
* The rule applies only to objects having all the tags in its tagset.
|
|
74766
|
+
*/
|
|
74767
|
+
tags?: {
|
|
74768
|
+
[key: string]: string;
|
|
74769
|
+
};
|
|
74770
|
+
}
|
|
74771
|
+
interface BucketV2ReplicationConfigurationRuleSourceSelectionCriteria {
|
|
74772
|
+
/**
|
|
74773
|
+
* Match SSE-KMS encrypted objects (documented below). If specified, `replicaKmsKeyId`
|
|
74774
|
+
* in `destination` must be specified as well.
|
|
74775
|
+
*/
|
|
74776
|
+
sseKmsEncryptedObjects?: outputs.s3.BucketV2ReplicationConfigurationRuleSourceSelectionCriteriaSseKmsEncryptedObject[];
|
|
74777
|
+
}
|
|
74778
|
+
interface BucketV2ReplicationConfigurationRuleSourceSelectionCriteriaSseKmsEncryptedObject {
|
|
74779
|
+
/**
|
|
74780
|
+
* Boolean which indicates if this criteria is enabled.
|
|
74781
|
+
*/
|
|
74782
|
+
enabled: boolean;
|
|
74783
|
+
}
|
|
74784
|
+
interface BucketV2ServerSideEncryptionConfiguration {
|
|
74785
|
+
/**
|
|
74786
|
+
* Single object for server-side encryption by default configuration. (documented below)
|
|
74787
|
+
*/
|
|
74788
|
+
rules: outputs.s3.BucketV2ServerSideEncryptionConfigurationRule[];
|
|
74789
|
+
}
|
|
74790
|
+
interface BucketV2ServerSideEncryptionConfigurationRule {
|
|
74791
|
+
/**
|
|
74792
|
+
* Single object for setting server-side encryption by default. (documented below)
|
|
74793
|
+
*/
|
|
74794
|
+
applyServerSideEncryptionByDefaults: outputs.s3.BucketV2ServerSideEncryptionConfigurationRuleApplyServerSideEncryptionByDefault[];
|
|
74795
|
+
/**
|
|
74796
|
+
* Whether or not to use [Amazon S3 Bucket Keys](https://docs.aws.amazon.com/AmazonS3/latest/dev/bucket-key.html) for SSE-KMS.
|
|
74797
|
+
*/
|
|
74798
|
+
bucketKeyEnabled?: boolean;
|
|
74799
|
+
}
|
|
74800
|
+
interface BucketV2ServerSideEncryptionConfigurationRuleApplyServerSideEncryptionByDefault {
|
|
74801
|
+
/**
|
|
74802
|
+
* AWS KMS master key ID used for the SSE-KMS encryption. This can only be used when you set the value of `sseAlgorithm` as `aws:kms`. The default `aws/s3` AWS KMS master key is used if this element is absent while the `sseAlgorithm` is `aws:kms`.
|
|
74803
|
+
*/
|
|
74804
|
+
kmsMasterKeyId?: string;
|
|
74805
|
+
/**
|
|
74806
|
+
* Server-side encryption algorithm to use. Valid values are `AES256` and `aws:kms`
|
|
74807
|
+
*/
|
|
74808
|
+
sseAlgorithm: string;
|
|
74809
|
+
}
|
|
74810
|
+
interface BucketV2Versioning {
|
|
74811
|
+
/**
|
|
74812
|
+
* Enable versioning. Once you version-enable a bucket, it can never return to an unversioned state. You can, however, suspend versioning on that bucket.
|
|
74813
|
+
*/
|
|
74814
|
+
enabled?: boolean;
|
|
74815
|
+
/**
|
|
74816
|
+
* Enable MFA delete for either `Change the versioning state of your bucket` or `Permanently delete an object version`. Default is `false`. This cannot be used to toggle this setting but is available to allow managed buckets to reflect the state in AWS
|
|
74817
|
+
*/
|
|
74818
|
+
mfaDelete?: boolean;
|
|
74819
|
+
}
|
|
74820
|
+
interface BucketV2Website {
|
|
74821
|
+
/**
|
|
74822
|
+
* Absolute path to the document to return in case of a 4XX error.
|
|
74823
|
+
*/
|
|
74824
|
+
errorDocument?: string;
|
|
74825
|
+
/**
|
|
74826
|
+
* Amazon S3 returns this index document when requests are made to the root domain or any of the subfolders.
|
|
74827
|
+
*/
|
|
74828
|
+
indexDocument?: string;
|
|
74829
|
+
/**
|
|
74830
|
+
* Hostname to redirect all website requests for this bucket to. Hostname can optionally be prefixed with a protocol (`http://` or `https://`) to use when redirecting requests. The default is the protocol that is used in the original request.
|
|
74831
|
+
*/
|
|
74832
|
+
redirectAllRequestsTo?: string;
|
|
74833
|
+
/**
|
|
74834
|
+
* JSON array containing [routing rules](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-s3-websiteconfiguration-routingrules.html)
|
|
74835
|
+
* describing redirect behavior and when redirects are applied.
|
|
74836
|
+
*/
|
|
74837
|
+
routingRules?: string;
|
|
74838
|
+
}
|
|
74100
74839
|
interface BucketVersioning {
|
|
74101
74840
|
/**
|
|
74102
74841
|
* Enable versioning. Once you version-enable a bucket, it can never return to an unversioned state. You can, however, suspend versioning on that bucket.
|
|
@@ -74107,6 +74846,16 @@ export declare namespace s3 {
|
|
|
74107
74846
|
*/
|
|
74108
74847
|
mfaDelete?: boolean;
|
|
74109
74848
|
}
|
|
74849
|
+
interface BucketVersioningV2VersioningConfiguration {
|
|
74850
|
+
/**
|
|
74851
|
+
* Specifies whether MFA delete is enabled in the bucket versioning configuration. Valid values: `Enabled` or `Disabled`.
|
|
74852
|
+
*/
|
|
74853
|
+
mfaDelete: string;
|
|
74854
|
+
/**
|
|
74855
|
+
* Versioning state of the bucket. Valid values: `Enabled`, `Suspended`, or `Disabled`. `Disabled` should only be used when creating or importing resources that correspond to unversioned S3 buckets.
|
|
74856
|
+
*/
|
|
74857
|
+
status: string;
|
|
74858
|
+
}
|
|
74110
74859
|
interface BucketVersioningVersioningConfiguration {
|
|
74111
74860
|
/**
|
|
74112
74861
|
* Specifies whether MFA delete is enabled in the bucket versioning configuration. Valid values: `Enabled` or `Disabled`.
|
|
@@ -74202,6 +74951,72 @@ export declare namespace s3 {
|
|
|
74202
74951
|
*/
|
|
74203
74952
|
replaceKeyWith?: string;
|
|
74204
74953
|
}
|
|
74954
|
+
interface BucketWebsiteConfigurationV2ErrorDocument {
|
|
74955
|
+
/**
|
|
74956
|
+
* Object key name to use when a 4XX class error occurs.
|
|
74957
|
+
*/
|
|
74958
|
+
key: string;
|
|
74959
|
+
}
|
|
74960
|
+
interface BucketWebsiteConfigurationV2IndexDocument {
|
|
74961
|
+
/**
|
|
74962
|
+
* Suffix that is appended to a request that is for a directory on the website endpoint.
|
|
74963
|
+
* For example, if the suffix is `index.html` and you make a request to `samplebucket/images/`, the data that is returned will be for the object with the key name `images/index.html`.
|
|
74964
|
+
* The suffix must not be empty and must not include a slash character.
|
|
74965
|
+
*/
|
|
74966
|
+
suffix: string;
|
|
74967
|
+
}
|
|
74968
|
+
interface BucketWebsiteConfigurationV2RedirectAllRequestsTo {
|
|
74969
|
+
/**
|
|
74970
|
+
* Name of the host where requests are redirected.
|
|
74971
|
+
*/
|
|
74972
|
+
hostName: string;
|
|
74973
|
+
/**
|
|
74974
|
+
* Protocol to use when redirecting requests. The default is the protocol that is used in the original request. Valid values: `http`, `https`.
|
|
74975
|
+
*/
|
|
74976
|
+
protocol?: string;
|
|
74977
|
+
}
|
|
74978
|
+
interface BucketWebsiteConfigurationV2RoutingRule {
|
|
74979
|
+
/**
|
|
74980
|
+
* Configuration block for describing a condition that must be met for the specified redirect to apply. See below.
|
|
74981
|
+
*/
|
|
74982
|
+
condition?: outputs.s3.BucketWebsiteConfigurationV2RoutingRuleCondition;
|
|
74983
|
+
/**
|
|
74984
|
+
* Configuration block for redirect information. See below.
|
|
74985
|
+
*/
|
|
74986
|
+
redirect: outputs.s3.BucketWebsiteConfigurationV2RoutingRuleRedirect;
|
|
74987
|
+
}
|
|
74988
|
+
interface BucketWebsiteConfigurationV2RoutingRuleCondition {
|
|
74989
|
+
/**
|
|
74990
|
+
* HTTP error code when the redirect is applied. If specified with `keyPrefixEquals`, then both must be true for the redirect to be applied.
|
|
74991
|
+
*/
|
|
74992
|
+
httpErrorCodeReturnedEquals?: string;
|
|
74993
|
+
/**
|
|
74994
|
+
* Object key name prefix when the redirect is applied. If specified with `httpErrorCodeReturnedEquals`, then both must be true for the redirect to be applied.
|
|
74995
|
+
*/
|
|
74996
|
+
keyPrefixEquals?: string;
|
|
74997
|
+
}
|
|
74998
|
+
interface BucketWebsiteConfigurationV2RoutingRuleRedirect {
|
|
74999
|
+
/**
|
|
75000
|
+
* Host name to use in the redirect request.
|
|
75001
|
+
*/
|
|
75002
|
+
hostName?: string;
|
|
75003
|
+
/**
|
|
75004
|
+
* HTTP redirect code to use on the response.
|
|
75005
|
+
*/
|
|
75006
|
+
httpRedirectCode?: string;
|
|
75007
|
+
/**
|
|
75008
|
+
* Protocol to use when redirecting requests. The default is the protocol that is used in the original request. Valid values: `http`, `https`.
|
|
75009
|
+
*/
|
|
75010
|
+
protocol?: string;
|
|
75011
|
+
/**
|
|
75012
|
+
* Object key prefix to use in the redirect request. For example, to redirect requests for all pages with prefix `docs/` (objects in the `docs/` folder) to `documents/`, you can set a `condition` block with `keyPrefixEquals` set to `docs/` and in the `redirect` set `replaceKeyPrefixWith` to `/documents`.
|
|
75013
|
+
*/
|
|
75014
|
+
replaceKeyPrefixWith?: string;
|
|
75015
|
+
/**
|
|
75016
|
+
* Specific object key to use in the redirect request. For example, redirect request to `error.html`.
|
|
75017
|
+
*/
|
|
75018
|
+
replaceKeyWith?: string;
|
|
75019
|
+
}
|
|
74205
75020
|
interface DirectoryBucketLocation {
|
|
74206
75021
|
/**
|
|
74207
75022
|
* [Availability Zone ID](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-regions-availability-zones.html#az-ids) or Local Zone ID.
|
|
@@ -74858,6 +75673,41 @@ export declare namespace s3tables {
|
|
|
74858
75673
|
*/
|
|
74859
75674
|
minSnapshotsToKeep: number;
|
|
74860
75675
|
}
|
|
75676
|
+
interface TableMetadata {
|
|
75677
|
+
/**
|
|
75678
|
+
* Contains details about the metadata for an Iceberg table. This block defines the schema structure for the Apache Iceberg table format.
|
|
75679
|
+
* See `iceberg` below.
|
|
75680
|
+
*/
|
|
75681
|
+
iceberg: outputs.s3tables.TableMetadataIceberg;
|
|
75682
|
+
}
|
|
75683
|
+
interface TableMetadataIceberg {
|
|
75684
|
+
/**
|
|
75685
|
+
* Schema configuration for the Iceberg table.
|
|
75686
|
+
* See `schema` below.
|
|
75687
|
+
*/
|
|
75688
|
+
schema: outputs.s3tables.TableMetadataIcebergSchema;
|
|
75689
|
+
}
|
|
75690
|
+
interface TableMetadataIcebergSchema {
|
|
75691
|
+
/**
|
|
75692
|
+
* List of schema fields for the Iceberg table. Each field defines a column in the table schema.
|
|
75693
|
+
* See `field` below.
|
|
75694
|
+
*/
|
|
75695
|
+
fields?: outputs.s3tables.TableMetadataIcebergSchemaField[];
|
|
75696
|
+
}
|
|
75697
|
+
interface TableMetadataIcebergSchemaField {
|
|
75698
|
+
/**
|
|
75699
|
+
* The name of the field.
|
|
75700
|
+
*/
|
|
75701
|
+
name: string;
|
|
75702
|
+
/**
|
|
75703
|
+
* A Boolean value that specifies whether values are required for each row in this field. Defaults to `false`.
|
|
75704
|
+
*/
|
|
75705
|
+
required: boolean;
|
|
75706
|
+
/**
|
|
75707
|
+
* The field type. S3 Tables supports all Apache Iceberg primitive types including: `boolean`, `int`, `long`, `float`, `double`, `decimal(precision,scale)`, `date`, `time`, `timestamp`, `timestamptz`, `string`, `uuid`, `fixed(length)`, `binary`.
|
|
75708
|
+
*/
|
|
75709
|
+
type: string;
|
|
75710
|
+
}
|
|
74861
75711
|
}
|
|
74862
75712
|
export declare namespace sagemaker {
|
|
74863
75713
|
interface AppImageConfigCodeEditorAppImageConfig {
|
|
@@ -89464,6 +90314,10 @@ export declare namespace wafv2 {
|
|
|
89464
90314
|
* Additional configuration for using the Account Creation Fraud Prevention managed rule group. Use this to specify information such as the registration page of your application and the type of content to accept or reject from the client.
|
|
89465
90315
|
*/
|
|
89466
90316
|
awsManagedRulesAcfpRuleSet?: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAcfpRuleSet;
|
|
90317
|
+
/**
|
|
90318
|
+
* Configuration for using the anti-DDoS managed rule group. See `awsManagedRulesAntiDdosRuleSet` for more details.
|
|
90319
|
+
*/
|
|
90320
|
+
awsManagedRulesAntiDdosRuleSet?: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSet;
|
|
89467
90321
|
/**
|
|
89468
90322
|
* Additional configuration for using the Account Takeover Protection managed rule group. Use this to specify information such as the sign-in page of your application and the type of content to accept or reject from the client.
|
|
89469
90323
|
*/
|
|
@@ -89633,6 +90487,36 @@ export declare namespace wafv2 {
|
|
|
89633
90487
|
*/
|
|
89634
90488
|
successCodes: number[];
|
|
89635
90489
|
}
|
|
90490
|
+
interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSet {
|
|
90491
|
+
/**
|
|
90492
|
+
* Configuration for the request handling that's applied by the managed rule group rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` during a distributed denial of service (DDoS) attack. See `clientSideActionConfig` for more details.
|
|
90493
|
+
*/
|
|
90494
|
+
clientSideActionConfig: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfig;
|
|
90495
|
+
/**
|
|
90496
|
+
* Sensitivity that the rule group rule DDoSRequests uses when matching against the DDoS suspicion labeling on a request. Valid values are `LOW` (Default), `MEDIUM`, and `HIGH`.
|
|
90497
|
+
*/
|
|
90498
|
+
sensitivityToBlock?: string;
|
|
90499
|
+
}
|
|
90500
|
+
interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfig {
|
|
90501
|
+
/**
|
|
90502
|
+
* Configuration for the use of the `AWSManagedRulesAntiDDoSRuleSet` rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests`.
|
|
90503
|
+
*/
|
|
90504
|
+
challenge: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfigChallenge;
|
|
90505
|
+
}
|
|
90506
|
+
interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfigChallenge {
|
|
90507
|
+
exemptUriRegularExpressions?: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfigChallengeExemptUriRegularExpression[];
|
|
90508
|
+
/**
|
|
90509
|
+
* Sensitivity that the rule group rule ChallengeDDoSRequests uses when matching against the DDoS suspicion labeling on a request. Valid values are `LOW`, `MEDIUM` and `HIGH` (Default).
|
|
90510
|
+
*/
|
|
90511
|
+
sensitivity?: string;
|
|
90512
|
+
/**
|
|
90513
|
+
* Configuration whether to use the `AWSManagedRulesAntiDDoSRuleSet` rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` in the rule group evaluation. Valid values are `ENABLED` and `DISABLED`.
|
|
90514
|
+
*/
|
|
90515
|
+
usageOfAction: string;
|
|
90516
|
+
}
|
|
90517
|
+
interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfigChallengeExemptUriRegularExpression {
|
|
90518
|
+
regexString?: string;
|
|
90519
|
+
}
|
|
89636
90520
|
interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAtpRuleSet {
|
|
89637
90521
|
/**
|
|
89638
90522
|
* Whether or not to allow the use of regular expressions in the login page path.
|
|
@@ -89782,9 +90666,6 @@ export declare namespace wafv2 {
|
|
|
89782
90666
|
* Instructs AWS WAF to run a Captcha check against the web request. See `captcha` below for details.
|
|
89783
90667
|
*/
|
|
89784
90668
|
captcha?: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementRuleActionOverrideActionToUseCaptcha;
|
|
89785
|
-
/**
|
|
89786
|
-
* Instructs AWS WAF to run a check against the request to verify that the request is coming from a legitimate client session. See `challenge` below for details.
|
|
89787
|
-
*/
|
|
89788
90669
|
challenge?: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementRuleActionOverrideActionToUseChallenge;
|
|
89789
90670
|
count?: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementRuleActionOverrideActionToUseCount;
|
|
89790
90671
|
}
|
|
@@ -93427,9 +94308,6 @@ export declare namespace wafv2 {
|
|
|
93427
94308
|
* Instructs AWS WAF to run a Captcha check against the web request. See `captcha` below for details.
|
|
93428
94309
|
*/
|
|
93429
94310
|
captcha?: outputs.wafv2.WebAclRuleStatementRuleGroupReferenceStatementRuleActionOverrideActionToUseCaptcha;
|
|
93430
|
-
/**
|
|
93431
|
-
* Instructs AWS WAF to run a check against the request to verify that the request is coming from a legitimate client session. See `challenge` below for details.
|
|
93432
|
-
*/
|
|
93433
94311
|
challenge?: outputs.wafv2.WebAclRuleStatementRuleGroupReferenceStatementRuleActionOverrideActionToUseChallenge;
|
|
93434
94312
|
count?: outputs.wafv2.WebAclRuleStatementRuleGroupReferenceStatementRuleActionOverrideActionToUseCount;
|
|
93435
94313
|
}
|