@pulumi/aws 7.0.0-alpha.2 → 7.0.0-alpha.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (138) hide show
  1. package/accessanalyzer/analyzer.d.ts +54 -7
  2. package/accessanalyzer/analyzer.js +48 -1
  3. package/accessanalyzer/analyzer.js.map +1 -1
  4. package/amplify/app.d.ts +26 -0
  5. package/amplify/app.js +16 -0
  6. package/amplify/app.js.map +1 -1
  7. package/bedrock/agentAgent.d.ts +2 -2
  8. package/bedrock/agentAgent.js +2 -2
  9. package/bedrock/agentAgentCollaborator.d.ts +4 -4
  10. package/bedrock/agentAgentCollaborator.js +4 -4
  11. package/cloudtrail/trail.d.ts +2 -2
  12. package/cloudtrail/trail.js +2 -2
  13. package/cloudwatch/eventArchive.d.ts +91 -15
  14. package/cloudwatch/eventArchive.js +67 -1
  15. package/cloudwatch/eventArchive.js.map +1 -1
  16. package/cloudwatch/logGroup.d.ts +6 -6
  17. package/codeartifact/domainPermissions.d.ts +1 -1
  18. package/codeartifact/domainPermissions.js +0 -3
  19. package/codeartifact/domainPermissions.js.map +1 -1
  20. package/connect/botAssociation.d.ts +1 -1
  21. package/connect/botAssociation.js +1 -1
  22. package/controltower/controlTowerControl.d.ts +1 -1
  23. package/controltower/controlTowerControl.js +1 -1
  24. package/cur/reportDefinition.d.ts +3 -3
  25. package/datasync/agent.d.ts +1 -1
  26. package/datasync/agent.js +1 -1
  27. package/dynamodb/table.d.ts +1 -1
  28. package/dynamodb/table.js +1 -1
  29. package/dynamodb/tag.d.ts +1 -1
  30. package/dynamodb/tag.js +1 -1
  31. package/ec2/getManagedPrefixList.d.ts +2 -2
  32. package/ec2/getManagedPrefixList.js +2 -2
  33. package/ec2/securityGroupRule.d.ts +1 -1
  34. package/ec2/securityGroupRule.js +1 -1
  35. package/ec2/vpc.d.ts +2 -2
  36. package/ec2/vpc.js +2 -2
  37. package/ec2/vpcIpam.d.ts +1 -1
  38. package/ec2/vpcIpam.js +1 -1
  39. package/ec2/vpcIpamPool.d.ts +4 -4
  40. package/ec2/vpcIpamPool.js +4 -4
  41. package/ec2/vpcIpamPoolCidr.d.ts +3 -3
  42. package/ec2/vpcIpamPoolCidr.js +3 -3
  43. package/ec2/vpcIpamPoolCidrAllocation.d.ts +4 -4
  44. package/ec2/vpcIpamPoolCidrAllocation.js +4 -4
  45. package/ec2/vpcIpamPreviewNextCidr.d.ts +2 -2
  46. package/ec2/vpcIpamPreviewNextCidr.js +2 -2
  47. package/ec2/vpcIpamResourceDiscovery.d.ts +1 -1
  48. package/ec2/vpcIpamResourceDiscovery.js +1 -1
  49. package/ec2/vpcIpamScope.d.ts +1 -1
  50. package/ec2/vpcIpamScope.js +1 -1
  51. package/ecr/registryPolicy.d.ts +1 -1
  52. package/ecr/registryPolicy.js +1 -1
  53. package/eks/podIdentityAssociation.d.ts +32 -0
  54. package/eks/podIdentityAssociation.js +6 -0
  55. package/eks/podIdentityAssociation.js.map +1 -1
  56. package/elasticsearch/domain.d.ts +2 -2
  57. package/elasticsearch/domain.js +2 -2
  58. package/emr/cluster.d.ts +12 -0
  59. package/emr/cluster.js +2 -0
  60. package/emr/cluster.js.map +1 -1
  61. package/fms/policy.d.ts +12 -0
  62. package/fms/policy.js +2 -0
  63. package/fms/policy.js.map +1 -1
  64. package/getRegion.d.ts +2 -2
  65. package/getService.d.ts +2 -2
  66. package/getService.js +2 -2
  67. package/glue/job.d.ts +12 -0
  68. package/glue/job.js +2 -0
  69. package/glue/job.js.map +1 -1
  70. package/glue/resourcePolicy.d.ts +1 -1
  71. package/glue/resourcePolicy.js +1 -1
  72. package/guardduty/detectorFeature.d.ts +21 -0
  73. package/guardduty/detectorFeature.js +21 -0
  74. package/guardduty/detectorFeature.js.map +1 -1
  75. package/guardduty/memberDetectorFeature.d.ts +1 -11
  76. package/guardduty/memberDetectorFeature.js +1 -11
  77. package/guardduty/memberDetectorFeature.js.map +1 -1
  78. package/guardduty/publishingDestination.d.ts +2 -2
  79. package/guardduty/publishingDestination.js +2 -2
  80. package/imagebuilder/imageRecipe.d.ts +1 -1
  81. package/imagebuilder/imageRecipe.js +1 -1
  82. package/kinesis/firehoseDeliveryStream.d.ts +1 -1
  83. package/kinesis/firehoseDeliveryStream.js +1 -1
  84. package/kms/getKey.d.ts +1 -1
  85. package/kms/key.d.ts +3 -3
  86. package/lightsail/instancePublicPorts.d.ts +6 -6
  87. package/macie/findingsFilter.d.ts +1 -1
  88. package/macie/findingsFilter.js +1 -1
  89. package/mediastore/containerPolicy.d.ts +1 -1
  90. package/mediastore/containerPolicy.js +1 -1
  91. package/networkfirewall/firewallPolicy.d.ts +51 -2
  92. package/networkfirewall/firewallPolicy.js +51 -2
  93. package/networkfirewall/firewallPolicy.js.map +1 -1
  94. package/networkmanager/dxGatewayAttachment.d.ts +1 -1
  95. package/networkmanager/dxGatewayAttachment.js +1 -1
  96. package/opensearch/domain.d.ts +2 -2
  97. package/opensearch/domain.js +2 -2
  98. package/opensearch/inboundConnectionAccepter.d.ts +2 -2
  99. package/opensearch/inboundConnectionAccepter.js +2 -2
  100. package/opensearch/outboundConnection.d.ts +2 -2
  101. package/opensearch/outboundConnection.js +2 -2
  102. package/opensearchingest/pipeline.d.ts +1 -1
  103. package/opensearchingest/pipeline.js +1 -1
  104. package/package.json +2 -2
  105. package/quicksight/dataSource.d.ts +1 -1
  106. package/quicksight/dataSource.js +1 -1
  107. package/route53/getTrafficPolicyDocument.d.ts +4 -4
  108. package/route53/getTrafficPolicyDocument.js +4 -4
  109. package/s3/bucket.d.ts +5 -4
  110. package/s3/bucketPolicy.d.ts +2 -0
  111. package/s3/bucketPolicy.js +2 -0
  112. package/s3/bucketPolicy.js.map +1 -1
  113. package/s3tables/table.d.ts +62 -0
  114. package/s3tables/table.js +49 -0
  115. package/s3tables/table.js.map +1 -1
  116. package/sagemaker/flowDefinition.d.ts +1 -1
  117. package/sagemaker/flowDefinition.js +1 -1
  118. package/securityhub/productSubscription.d.ts +1 -1
  119. package/securityhub/productSubscription.js +1 -1
  120. package/securityhub/standardsSubscription.d.ts +1 -1
  121. package/securityhub/standardsSubscription.js +1 -1
  122. package/serverlessrepository/cloudFormationStack.d.ts +1 -1
  123. package/serverlessrepository/cloudFormationStack.js +1 -1
  124. package/shield/drtAccessLogBucketAssociation.d.ts +1 -1
  125. package/shield/drtAccessLogBucketAssociation.js +1 -1
  126. package/shield/protection.d.ts +1 -1
  127. package/shield/protection.js +1 -1
  128. package/shield/protectionGroup.d.ts +2 -2
  129. package/shield/protectionGroup.js +2 -2
  130. package/shield/protectionHealthCheckAssociation.d.ts +1 -1
  131. package/shield/protectionHealthCheckAssociation.js +1 -1
  132. package/ssm/parameter.d.ts +1 -1
  133. package/ssm/quicksetupConfigurationManager.d.ts +2 -2
  134. package/ssm/quicksetupConfigurationManager.js +2 -2
  135. package/types/input.d.ts +137 -20
  136. package/types/input.js.map +1 -1
  137. package/types/output.d.ts +137 -19
  138. package/types/output.js.map +1 -1
@@ -1 +1 @@
1
- {"version":3,"file":"detectorFeature.js","sourceRoot":"","sources":["../../guardduty/detectorFeature.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAIzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IACtD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;IA+BD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,UAAU,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvD,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;;AAnFL,0CAoFC;AAtEG,gBAAgB;AACO,4BAAY,GAAG,+CAA+C,CAAC"}
1
+ {"version":3,"file":"detectorFeature.js","sourceRoot":"","sources":["../../guardduty/detectorFeature.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAIzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2CG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IACtD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;IA+BD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,UAAU,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvD,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;;AAnFL,0CAoFC;AAtEG,gBAAgB;AACO,4BAAY,GAAG,+CAA+C,CAAC"}
@@ -16,18 +16,8 @@ import * as outputs from "../types/output";
16
16
  * const runtimeMonitoring = new aws.guardduty.MemberDetectorFeature("runtime_monitoring", {
17
17
  * detectorId: example.id,
18
18
  * accountId: "123456789012",
19
- * name: "RUNTIME_MONITORING",
19
+ * name: "S3_DATA_EVENTS",
20
20
  * status: "ENABLED",
21
- * additionalConfigurations: [
22
- * {
23
- * name: "EKS_ADDON_MANAGEMENT",
24
- * status: "ENABLED",
25
- * },
26
- * {
27
- * name: "ECS_FARGATE_AGENT_MANAGEMENT",
28
- * status: "ENABLED",
29
- * },
30
- * ],
31
21
  * });
32
22
  * ```
33
23
  */
@@ -20,18 +20,8 @@ const utilities = require("../utilities");
20
20
  * const runtimeMonitoring = new aws.guardduty.MemberDetectorFeature("runtime_monitoring", {
21
21
  * detectorId: example.id,
22
22
  * accountId: "123456789012",
23
- * name: "RUNTIME_MONITORING",
23
+ * name: "S3_DATA_EVENTS",
24
24
  * status: "ENABLED",
25
- * additionalConfigurations: [
26
- * {
27
- * name: "EKS_ADDON_MANAGEMENT",
28
- * status: "ENABLED",
29
- * },
30
- * {
31
- * name: "ECS_FARGATE_AGENT_MANAGEMENT",
32
- * status: "ENABLED",
33
- * },
34
- * ],
35
25
  * });
36
26
  * ```
37
27
  */
@@ -1 +1 @@
1
- {"version":3,"file":"memberDetectorFeature.js","sourceRoot":"","sources":["../../guardduty/memberDetectorFeature.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAIzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6BG;AACH,MAAa,qBAAsB,SAAQ,MAAM,CAAC,cAAc;IAC5D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAkC,EAAE,IAAmC;QAChI,OAAO,IAAI,qBAAqB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC5E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,qBAAqB,CAAC,YAAY,CAAC;IACtE,CAAC;IAmCD,YAAY,IAAY,EAAE,WAAoE,EAAE,IAAmC;QAC/H,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAqD,CAAC;YACpE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAAoD,CAAC;YAClE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,UAAU,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvD,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,qBAAqB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC1E,CAAC;;AA5FL,sDA6FC;AA/EG,gBAAgB;AACO,kCAAY,GAAG,2DAA2D,CAAC"}
1
+ {"version":3,"file":"memberDetectorFeature.js","sourceRoot":"","sources":["../../guardduty/memberDetectorFeature.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAIzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;GAmBG;AACH,MAAa,qBAAsB,SAAQ,MAAM,CAAC,cAAc;IAC5D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAkC,EAAE,IAAmC;QAChI,OAAO,IAAI,qBAAqB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC5E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,qBAAqB,CAAC,YAAY,CAAC;IACtE,CAAC;IAmCD,YAAY,IAAY,EAAE,WAAoE,EAAE,IAAmC;QAC/H,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAqD,CAAC;YACpE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAAoD,CAAC;YAClE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,UAAU,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvD,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,qBAAqB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC1E,CAAC;;AA5FL,sDA6FC;AA/EG,gBAAgB;AACO,kCAAY,GAAG,2DAA2D,CAAC"}
@@ -41,7 +41,7 @@ import * as pulumi from "@pulumi/pulumi";
41
41
  * {
42
42
  * sid: "Allow GuardDuty to encrypt findings",
43
43
  * actions: ["kms:GenerateDataKey"],
44
- * resources: [`arn:aws:kms:${currentGetRegion.name}:${current.accountId}:key/*`],
44
+ * resources: [`arn:aws:kms:${currentGetRegion.region}:${current.accountId}:key/*`],
45
45
  * principals: [{
46
46
  * type: "Service",
47
47
  * identifiers: ["guardduty.amazonaws.com"],
@@ -50,7 +50,7 @@ import * as pulumi from "@pulumi/pulumi";
50
50
  * {
51
51
  * sid: "Allow all users to modify/delete key (test only)",
52
52
  * actions: ["kms:*"],
53
- * resources: [`arn:aws:kms:${currentGetRegion1.name}:${current1.accountId}:key/*`],
53
+ * resources: [`arn:aws:kms:${currentGetRegion1.region}:${current1.accountId}:key/*`],
54
54
  * principals: [{
55
55
  * type: "AWS",
56
56
  * identifiers: [`arn:aws:iam::${current2.accountId}:root`],
@@ -47,7 +47,7 @@ const utilities = require("../utilities");
47
47
  * {
48
48
  * sid: "Allow GuardDuty to encrypt findings",
49
49
  * actions: ["kms:GenerateDataKey"],
50
- * resources: [`arn:aws:kms:${currentGetRegion.name}:${current.accountId}:key/*`],
50
+ * resources: [`arn:aws:kms:${currentGetRegion.region}:${current.accountId}:key/*`],
51
51
  * principals: [{
52
52
  * type: "Service",
53
53
  * identifiers: ["guardduty.amazonaws.com"],
@@ -56,7 +56,7 @@ const utilities = require("../utilities");
56
56
  * {
57
57
  * sid: "Allow all users to modify/delete key (test only)",
58
58
  * actions: ["kms:*"],
59
- * resources: [`arn:aws:kms:${currentGetRegion1.name}:${current1.accountId}:key/*`],
59
+ * resources: [`arn:aws:kms:${currentGetRegion1.region}:${current1.accountId}:key/*`],
60
60
  * principals: [{
61
61
  * type: "AWS",
62
62
  * identifiers: [`arn:aws:iam::${current2.accountId}:root`],
@@ -33,7 +33,7 @@ import * as outputs from "../types/output";
33
33
  * ],
34
34
  * }],
35
35
  * name: "example",
36
- * parentImage: `arn:${current.partition}:imagebuilder:${currentAwsRegion.name}:aws:image/amazon-linux-2-x86/x.x.x`,
36
+ * parentImage: `arn:${current.partition}:imagebuilder:${currentAwsRegion.region}:aws:image/amazon-linux-2-x86/x.x.x`,
37
37
  * version: "1.0.0",
38
38
  * });
39
39
  * ```
@@ -37,7 +37,7 @@ const utilities = require("../utilities");
37
37
  * ],
38
38
  * }],
39
39
  * name: "example",
40
- * parentImage: `arn:${current.partition}:imagebuilder:${currentAwsRegion.name}:aws:image/amazon-linux-2-x86/x.x.x`,
40
+ * parentImage: `arn:${current.partition}:imagebuilder:${currentAwsRegion.region}:aws:image/amazon-linux-2-x86/x.x.x`,
41
41
  * version: "1.0.0",
42
42
  * });
43
43
  * ```
@@ -524,7 +524,7 @@ import * as outputs from "../types/output";
524
524
  * destination: "iceberg",
525
525
  * icebergConfiguration: {
526
526
  * roleArn: firehoseRole.arn,
527
- * catalogArn: Promise.all([currentGetPartition, currentGetRegion, current]).then(([currentGetPartition, currentGetRegion, current]) => `arn:${currentGetPartition.partition}:glue:${currentGetRegion.name}:${current.accountId}:catalog`),
527
+ * catalogArn: Promise.all([currentGetPartition, currentGetRegion, current]).then(([currentGetPartition, currentGetRegion, current]) => `arn:${currentGetPartition.partition}:glue:${currentGetRegion.region}:${current.accountId}:catalog`),
528
528
  * bufferingSize: 10,
529
529
  * bufferingInterval: 400,
530
530
  * s3Configuration: {
@@ -528,7 +528,7 @@ const utilities = require("../utilities");
528
528
  * destination: "iceberg",
529
529
  * icebergConfiguration: {
530
530
  * roleArn: firehoseRole.arn,
531
- * catalogArn: Promise.all([currentGetPartition, currentGetRegion, current]).then(([currentGetPartition, currentGetRegion, current]) => `arn:${currentGetPartition.partition}:glue:${currentGetRegion.name}:${current.accountId}:catalog`),
531
+ * catalogArn: Promise.all([currentGetPartition, currentGetRegion, current]).then(([currentGetPartition, currentGetRegion, current]) => `arn:${currentGetPartition.partition}:glue:${currentGetRegion.region}:${current.accountId}:catalog`),
532
532
  * bufferingSize: 10,
533
533
  * bufferingInterval: 400,
534
534
  * s3Configuration: {
package/kms/getKey.d.ts CHANGED
@@ -73,7 +73,7 @@ export interface GetKeyResult {
73
73
  */
74
74
  readonly customKeyStoreId: string;
75
75
  /**
76
- * Specifies whether the key contains a symmetric key or an asymmetric key pair and the encryption algorithms or signing algorithms that the key supports
76
+ * See `keySpec`.
77
77
  */
78
78
  readonly customerMasterKeySpec: string;
79
79
  /**
package/kms/key.d.ts CHANGED
@@ -346,7 +346,7 @@ export declare class Key extends pulumi.CustomResource {
346
346
  readonly customKeyStoreId: pulumi.Output<string | undefined>;
347
347
  /**
348
348
  * Specifies whether the key contains a symmetric key or an asymmetric key pair and the encryption algorithms or signing algorithms that the key supports.
349
- * Valid values: `SYMMETRIC_DEFAULT`, `RSA_2048`, `RSA_3072`, `RSA_4096`, `HMAC_256`, `ECC_NIST_P256`, `ECC_NIST_P384`, `ECC_NIST_P521`, or `ECC_SECG_P256K1`. Defaults to `SYMMETRIC_DEFAULT`. For help with choosing a key spec, see the [AWS KMS Developer Guide](https://docs.aws.amazon.com/kms/latest/developerguide/symm-asymm-choose.html).
349
+ * Valid values: `SYMMETRIC_DEFAULT`, `RSA_2048`, `RSA_3072`, `RSA_4096`, `HMAC_224`, `HMAC_256`, `HMAC_384`, `HMAC_512`, `ECC_NIST_P256`, `ECC_NIST_P384`, `ECC_NIST_P521`, `ECC_SECG_P256K1`, `ML_DSA_44`, `ML_DSA_65`, `ML_DSA_87`, or `SM2` (China Regions only). Defaults to `SYMMETRIC_DEFAULT`. For help with choosing a key spec, see the [AWS KMS Developer Guide](https://docs.aws.amazon.com/kms/latest/developerguide/symm-asymm-choose.html).
350
350
  */
351
351
  readonly customerMasterKeySpec: pulumi.Output<string | undefined>;
352
352
  /**
@@ -440,7 +440,7 @@ export interface KeyState {
440
440
  customKeyStoreId?: pulumi.Input<string>;
441
441
  /**
442
442
  * Specifies whether the key contains a symmetric key or an asymmetric key pair and the encryption algorithms or signing algorithms that the key supports.
443
- * Valid values: `SYMMETRIC_DEFAULT`, `RSA_2048`, `RSA_3072`, `RSA_4096`, `HMAC_256`, `ECC_NIST_P256`, `ECC_NIST_P384`, `ECC_NIST_P521`, or `ECC_SECG_P256K1`. Defaults to `SYMMETRIC_DEFAULT`. For help with choosing a key spec, see the [AWS KMS Developer Guide](https://docs.aws.amazon.com/kms/latest/developerguide/symm-asymm-choose.html).
443
+ * Valid values: `SYMMETRIC_DEFAULT`, `RSA_2048`, `RSA_3072`, `RSA_4096`, `HMAC_224`, `HMAC_256`, `HMAC_384`, `HMAC_512`, `ECC_NIST_P256`, `ECC_NIST_P384`, `ECC_NIST_P521`, `ECC_SECG_P256K1`, `ML_DSA_44`, `ML_DSA_65`, `ML_DSA_87`, or `SM2` (China Regions only). Defaults to `SYMMETRIC_DEFAULT`. For help with choosing a key spec, see the [AWS KMS Developer Guide](https://docs.aws.amazon.com/kms/latest/developerguide/symm-asymm-choose.html).
444
444
  */
445
445
  customerMasterKeySpec?: pulumi.Input<string>;
446
446
  /**
@@ -522,7 +522,7 @@ export interface KeyArgs {
522
522
  customKeyStoreId?: pulumi.Input<string>;
523
523
  /**
524
524
  * Specifies whether the key contains a symmetric key or an asymmetric key pair and the encryption algorithms or signing algorithms that the key supports.
525
- * Valid values: `SYMMETRIC_DEFAULT`, `RSA_2048`, `RSA_3072`, `RSA_4096`, `HMAC_256`, `ECC_NIST_P256`, `ECC_NIST_P384`, `ECC_NIST_P521`, or `ECC_SECG_P256K1`. Defaults to `SYMMETRIC_DEFAULT`. For help with choosing a key spec, see the [AWS KMS Developer Guide](https://docs.aws.amazon.com/kms/latest/developerguide/symm-asymm-choose.html).
525
+ * Valid values: `SYMMETRIC_DEFAULT`, `RSA_2048`, `RSA_3072`, `RSA_4096`, `HMAC_224`, `HMAC_256`, `HMAC_384`, `HMAC_512`, `ECC_NIST_P256`, `ECC_NIST_P384`, `ECC_NIST_P521`, `ECC_SECG_P256K1`, `ML_DSA_44`, `ML_DSA_65`, `ML_DSA_87`, or `SM2` (China Regions only). Defaults to `SYMMETRIC_DEFAULT`. For help with choosing a key spec, see the [AWS KMS Developer Guide](https://docs.aws.amazon.com/kms/latest/developerguide/symm-asymm-choose.html).
526
526
  */
527
527
  customerMasterKeySpec?: pulumi.Input<string>;
528
528
  /**
@@ -62,11 +62,11 @@ export declare class InstancePublicPorts extends pulumi.CustomResource {
62
62
  */
63
63
  static isInstance(obj: any): obj is InstancePublicPorts;
64
64
  /**
65
- * Name of the Lightsail Instance.
65
+ * Name of the instance for which to open ports.
66
66
  */
67
67
  readonly instanceName: pulumi.Output<string>;
68
68
  /**
69
- * Configuration block with port information. AWS closes all currently open ports that are not included in the `portInfo`. See below.
69
+ * Descriptor of the ports to open for the specified instance. AWS closes all currently open ports that are not included in this argument. See `portInfo` Block for details.
70
70
  *
71
71
  * The following arguments are optional:
72
72
  */
@@ -89,11 +89,11 @@ export declare class InstancePublicPorts extends pulumi.CustomResource {
89
89
  */
90
90
  export interface InstancePublicPortsState {
91
91
  /**
92
- * Name of the Lightsail Instance.
92
+ * Name of the instance for which to open ports.
93
93
  */
94
94
  instanceName?: pulumi.Input<string>;
95
95
  /**
96
- * Configuration block with port information. AWS closes all currently open ports that are not included in the `portInfo`. See below.
96
+ * Descriptor of the ports to open for the specified instance. AWS closes all currently open ports that are not included in this argument. See `portInfo` Block for details.
97
97
  *
98
98
  * The following arguments are optional:
99
99
  */
@@ -108,11 +108,11 @@ export interface InstancePublicPortsState {
108
108
  */
109
109
  export interface InstancePublicPortsArgs {
110
110
  /**
111
- * Name of the Lightsail Instance.
111
+ * Name of the instance for which to open ports.
112
112
  */
113
113
  instanceName: pulumi.Input<string>;
114
114
  /**
115
- * Configuration block with port information. AWS closes all currently open ports that are not included in the `portInfo`. See below.
115
+ * Descriptor of the ports to open for the specified instance. AWS closes all currently open ports that are not included in this argument. See `portInfo` Block for details.
116
116
  *
117
117
  * The following arguments are optional:
118
118
  */
@@ -19,7 +19,7 @@ import * as outputs from "../types/output";
19
19
  * findingCriteria: {
20
20
  * criterions: [{
21
21
  * field: "region",
22
- * eqs: [current.name],
22
+ * eqs: [current.region],
23
23
  * }],
24
24
  * },
25
25
  * }, {
@@ -23,7 +23,7 @@ const utilities = require("../utilities");
23
23
  * findingCriteria: {
24
24
  * criterions: [{
25
25
  * field: "region",
26
- * eqs: [current.name],
26
+ * eqs: [current.region],
27
27
  * }],
28
28
  * },
29
29
  * }, {
@@ -18,7 +18,7 @@ import * as pulumi from "@pulumi/pulumi";
18
18
  * identifiers: [currentGetCallerIdentity.then(currentGetCallerIdentity => `arn:aws:iam::${currentGetCallerIdentity.accountId}:root`)],
19
19
  * }],
20
20
  * actions: ["mediastore:*"],
21
- * resources: [pulumi.all([current, currentGetCallerIdentity, exampleContainer.name]).apply(([current, currentGetCallerIdentity, name]) => `arn:aws:mediastore:${current.name}:${currentGetCallerIdentity.accountId}:container/${name}/*`)],
21
+ * resources: [pulumi.all([current, currentGetCallerIdentity, exampleContainer.name]).apply(([current, currentGetCallerIdentity, name]) => `arn:aws:mediastore:${current.region}:${currentGetCallerIdentity.accountId}:container/${name}/*`)],
22
22
  * conditions: [{
23
23
  * test: "Bool",
24
24
  * variable: "aws:SecureTransport",
@@ -24,7 +24,7 @@ const utilities = require("../utilities");
24
24
  * identifiers: [currentGetCallerIdentity.then(currentGetCallerIdentity => `arn:aws:iam::${currentGetCallerIdentity.accountId}:root`)],
25
25
  * }],
26
26
  * actions: ["mediastore:*"],
27
- * resources: [pulumi.all([current, currentGetCallerIdentity, exampleContainer.name]).apply(([current, currentGetCallerIdentity, name]) => `arn:aws:mediastore:${current.name}:${currentGetCallerIdentity.accountId}:container/${name}/*`)],
27
+ * resources: [pulumi.all([current, currentGetCallerIdentity, exampleContainer.name]).apply(([current, currentGetCallerIdentity, name]) => `arn:aws:mediastore:${current.region}:${currentGetCallerIdentity.accountId}:container/${name}/*`)],
28
28
  * conditions: [{
29
29
  * test: "Bool",
30
30
  * variable: "aws:SecureTransport",
@@ -10,6 +10,9 @@ import * as outputs from "../types/output";
10
10
  * import * as pulumi from "@pulumi/pulumi";
11
11
  * import * as aws from "@pulumi/aws";
12
12
  *
13
+ * const current = aws.getRegion({});
14
+ * const currentGetPartition = aws.getPartition({});
15
+ * const currentGetCallerIdentity = aws.getCallerIdentity({});
13
16
  * const example = new aws.networkfirewall.FirewallPolicy("example", {
14
17
  * name: "example",
15
18
  * firewallPolicy: {
@@ -19,7 +22,7 @@ import * as outputs from "../types/output";
19
22
  * priority: 1,
20
23
  * resourceArn: exampleAwsNetworkfirewallRuleGroup.arn,
21
24
  * }],
22
- * tlsInspectionConfigurationArn: "arn:aws:network-firewall:REGION:ACCT:tls-configuration/example",
25
+ * tlsInspectionConfigurationArn: Promise.all([currentGetPartition, current, currentGetCallerIdentity]).then(([currentGetPartition, current, currentGetCallerIdentity]) => `arn:${currentGetPartition.partition}:network-firewall:${current.region}:${currentGetCallerIdentity.accountId}:tls-configuration/example`),
23
26
  * },
24
27
  * tags: {
25
28
  * Tag1: "Value1",
@@ -68,7 +71,7 @@ import * as outputs from "../types/output";
68
71
  * import * as pulumi from "@pulumi/pulumi";
69
72
  * import * as aws from "@pulumi/aws";
70
73
  *
71
- * const test = new aws.networkfirewall.FirewallPolicy("test", {
74
+ * const example = new aws.networkfirewall.FirewallPolicy("example", {
72
75
  * name: "example",
73
76
  * firewallPolicy: {
74
77
  * statelessDefaultActions: [
@@ -90,6 +93,52 @@ import * as outputs from "../types/output";
90
93
  * });
91
94
  * ```
92
95
  *
96
+ * ## Policy with Active Threat Defense in Action Order
97
+ *
98
+ * ```typescript
99
+ * import * as pulumi from "@pulumi/pulumi";
100
+ * import * as aws from "@pulumi/aws";
101
+ *
102
+ * const current = aws.getRegion({});
103
+ * const currentGetPartition = aws.getPartition({});
104
+ * const example = new aws.networkfirewall.FirewallPolicy("example", {
105
+ * name: "example",
106
+ * firewallPolicy: {
107
+ * statelessFragmentDefaultActions: ["aws:drop"],
108
+ * statelessDefaultActions: ["aws:pass"],
109
+ * statefulRuleGroupReferences: [{
110
+ * deepThreatInspection: "true",
111
+ * resourceArn: Promise.all([currentGetPartition, current]).then(([currentGetPartition, current]) => `arn:${currentGetPartition.partition}:network-firewall:${current.region}:aws-managed:stateful-rulegroup/AttackInfrastructureActionOrder`),
112
+ * }],
113
+ * },
114
+ * });
115
+ * ```
116
+ *
117
+ * ## Policy with Active Threat Defense in Strict Order
118
+ *
119
+ * ```typescript
120
+ * import * as pulumi from "@pulumi/pulumi";
121
+ * import * as aws from "@pulumi/aws";
122
+ *
123
+ * const current = aws.getRegion({});
124
+ * const currentGetPartition = aws.getPartition({});
125
+ * const example = new aws.networkfirewall.FirewallPolicy("example", {
126
+ * name: "example",
127
+ * firewallPolicy: {
128
+ * statelessFragmentDefaultActions: ["aws:drop"],
129
+ * statelessDefaultActions: ["aws:pass"],
130
+ * statefulEngineOptions: {
131
+ * ruleOrder: "STRICT_ORDER",
132
+ * },
133
+ * statefulRuleGroupReferences: [{
134
+ * deepThreatInspection: "false",
135
+ * priority: 1,
136
+ * resourceArn: Promise.all([currentGetPartition, current]).then(([currentGetPartition, current]) => `arn:${currentGetPartition.partition}:network-firewall:${current.region}:aws-managed:stateful-rulegroup/AttackInfrastructureStrictOrder`),
137
+ * }],
138
+ * },
139
+ * });
140
+ * ```
141
+ *
93
142
  * ## Import
94
143
  *
95
144
  * Using `pulumi import`, import Network Firewall Policies using their `arn`. For example:
@@ -14,6 +14,9 @@ const utilities = require("../utilities");
14
14
  * import * as pulumi from "@pulumi/pulumi";
15
15
  * import * as aws from "@pulumi/aws";
16
16
  *
17
+ * const current = aws.getRegion({});
18
+ * const currentGetPartition = aws.getPartition({});
19
+ * const currentGetCallerIdentity = aws.getCallerIdentity({});
17
20
  * const example = new aws.networkfirewall.FirewallPolicy("example", {
18
21
  * name: "example",
19
22
  * firewallPolicy: {
@@ -23,7 +26,7 @@ const utilities = require("../utilities");
23
26
  * priority: 1,
24
27
  * resourceArn: exampleAwsNetworkfirewallRuleGroup.arn,
25
28
  * }],
26
- * tlsInspectionConfigurationArn: "arn:aws:network-firewall:REGION:ACCT:tls-configuration/example",
29
+ * tlsInspectionConfigurationArn: Promise.all([currentGetPartition, current, currentGetCallerIdentity]).then(([currentGetPartition, current, currentGetCallerIdentity]) => `arn:${currentGetPartition.partition}:network-firewall:${current.region}:${currentGetCallerIdentity.accountId}:tls-configuration/example`),
27
30
  * },
28
31
  * tags: {
29
32
  * Tag1: "Value1",
@@ -72,7 +75,7 @@ const utilities = require("../utilities");
72
75
  * import * as pulumi from "@pulumi/pulumi";
73
76
  * import * as aws from "@pulumi/aws";
74
77
  *
75
- * const test = new aws.networkfirewall.FirewallPolicy("test", {
78
+ * const example = new aws.networkfirewall.FirewallPolicy("example", {
76
79
  * name: "example",
77
80
  * firewallPolicy: {
78
81
  * statelessDefaultActions: [
@@ -94,6 +97,52 @@ const utilities = require("../utilities");
94
97
  * });
95
98
  * ```
96
99
  *
100
+ * ## Policy with Active Threat Defense in Action Order
101
+ *
102
+ * ```typescript
103
+ * import * as pulumi from "@pulumi/pulumi";
104
+ * import * as aws from "@pulumi/aws";
105
+ *
106
+ * const current = aws.getRegion({});
107
+ * const currentGetPartition = aws.getPartition({});
108
+ * const example = new aws.networkfirewall.FirewallPolicy("example", {
109
+ * name: "example",
110
+ * firewallPolicy: {
111
+ * statelessFragmentDefaultActions: ["aws:drop"],
112
+ * statelessDefaultActions: ["aws:pass"],
113
+ * statefulRuleGroupReferences: [{
114
+ * deepThreatInspection: "true",
115
+ * resourceArn: Promise.all([currentGetPartition, current]).then(([currentGetPartition, current]) => `arn:${currentGetPartition.partition}:network-firewall:${current.region}:aws-managed:stateful-rulegroup/AttackInfrastructureActionOrder`),
116
+ * }],
117
+ * },
118
+ * });
119
+ * ```
120
+ *
121
+ * ## Policy with Active Threat Defense in Strict Order
122
+ *
123
+ * ```typescript
124
+ * import * as pulumi from "@pulumi/pulumi";
125
+ * import * as aws from "@pulumi/aws";
126
+ *
127
+ * const current = aws.getRegion({});
128
+ * const currentGetPartition = aws.getPartition({});
129
+ * const example = new aws.networkfirewall.FirewallPolicy("example", {
130
+ * name: "example",
131
+ * firewallPolicy: {
132
+ * statelessFragmentDefaultActions: ["aws:drop"],
133
+ * statelessDefaultActions: ["aws:pass"],
134
+ * statefulEngineOptions: {
135
+ * ruleOrder: "STRICT_ORDER",
136
+ * },
137
+ * statefulRuleGroupReferences: [{
138
+ * deepThreatInspection: "false",
139
+ * priority: 1,
140
+ * resourceArn: Promise.all([currentGetPartition, current]).then(([currentGetPartition, current]) => `arn:${currentGetPartition.partition}:network-firewall:${current.region}:aws-managed:stateful-rulegroup/AttackInfrastructureStrictOrder`),
141
+ * }],
142
+ * },
143
+ * });
144
+ * ```
145
+ *
97
146
  * ## Import
98
147
  *
99
148
  * Using `pulumi import`, import Network Firewall Policies using their `arn`. For example:
@@ -1 +1 @@
1
- {"version":3,"file":"firewallPolicy.js","sourceRoot":"","sources":["../../networkfirewall/firewallPolicy.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAIzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAgGG;AACH,MAAa,cAAe,SAAQ,MAAM,CAAC,cAAc;IACrD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA2B,EAAE,IAAmC;QACzH,OAAO,IAAI,cAAc,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACrE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,cAAc,CAAC,YAAY,CAAC;IAC/D,CAAC;IA+CD,YAAY,IAAY,EAAE,WAAsD,EAAE,IAAmC;QACjH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA8C,CAAC;YAC7D,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SACzE;aAAM;YACH,MAAM,IAAI,GAAG,WAA6C,CAAC;YAC3D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,cAAc,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC3D,MAAM,IAAI,KAAK,CAAC,4CAA4C,CAAC,CAAC;aACjE;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,yBAAyB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,KAAK,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC1C,cAAc,CAAC,SAAS,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC9C,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACrD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,cAAc,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACnE,CAAC;;AAxGL,wCAyGC;AA3FG,gBAAgB;AACO,2BAAY,GAAG,mDAAmD,CAAC"}
1
+ {"version":3,"file":"firewallPolicy.js","sourceRoot":"","sources":["../../networkfirewall/firewallPolicy.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAIzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiJG;AACH,MAAa,cAAe,SAAQ,MAAM,CAAC,cAAc;IACrD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA2B,EAAE,IAAmC;QACzH,OAAO,IAAI,cAAc,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACrE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,cAAc,CAAC,YAAY,CAAC;IAC/D,CAAC;IA+CD,YAAY,IAAY,EAAE,WAAsD,EAAE,IAAmC;QACjH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA8C,CAAC;YAC7D,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SACzE;aAAM;YACH,MAAM,IAAI,GAAG,WAA6C,CAAC;YAC3D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,cAAc,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC3D,MAAM,IAAI,KAAK,CAAC,4CAA4C,CAAC,CAAC;aACjE;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,yBAAyB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,KAAK,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC1C,cAAc,CAAC,SAAS,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC9C,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACrD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,cAAc,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACnE,CAAC;;AAxGL,wCAyGC;AA3FG,gBAAgB;AACO,2BAAY,GAAG,mDAAmD,CAAC"}
@@ -17,7 +17,7 @@ import * as outputs from "../types/output";
17
17
  * const test = new aws.networkmanager.DxGatewayAttachment("test", {
18
18
  * coreNetworkId: testAwsNetworkmanagerCoreNetworkPolicyAttachment.coreNetworkId,
19
19
  * directConnectGatewayArn: `arn:aws:directconnect::${current.accountId}:dx-gateway/${testAwsDxGateway.id}`,
20
- * edgeLocations: [currentAwsRegion.name],
20
+ * edgeLocations: [currentAwsRegion.region],
21
21
  * });
22
22
  * ```
23
23
  *
@@ -21,7 +21,7 @@ const utilities = require("../utilities");
21
21
  * const test = new aws.networkmanager.DxGatewayAttachment("test", {
22
22
  * coreNetworkId: testAwsNetworkmanagerCoreNetworkPolicyAttachment.coreNetworkId,
23
23
  * directConnectGatewayArn: `arn:aws:directconnect::${current.accountId}:dx-gateway/${testAwsDxGateway.id}`,
24
- * edgeLocations: [currentAwsRegion.name],
24
+ * edgeLocations: [currentAwsRegion.region],
25
25
  * });
26
26
  * ```
27
27
  *
@@ -61,7 +61,7 @@ import * as outputs from "../types/output";
61
61
  * identifiers: ["*"],
62
62
  * }],
63
63
  * actions: ["es:*"],
64
- * resources: [`arn:aws:es:${current.name}:${currentGetCallerIdentity.accountId}:domain/${domain}/*`],
64
+ * resources: [`arn:aws:es:${current.region}:${currentGetCallerIdentity.accountId}:domain/${domain}/*`],
65
65
  * conditions: [{
66
66
  * test: "IpAddress",
67
67
  * variable: "aws:SourceIp",
@@ -152,7 +152,7 @@ import * as outputs from "../types/output";
152
152
  * identifiers: ["*"],
153
153
  * }],
154
154
  * actions: ["es:*"],
155
- * resources: [`arn:aws:es:${current.name}:${currentGetCallerIdentity.accountId}:domain/${domain}/*`],
155
+ * resources: [`arn:aws:es:${current.region}:${currentGetCallerIdentity.accountId}:domain/${domain}/*`],
156
156
  * }],
157
157
  * }));
158
158
  * const exampleDomain = new aws.opensearch.Domain("example", {
@@ -65,7 +65,7 @@ const utilities = require("../utilities");
65
65
  * identifiers: ["*"],
66
66
  * }],
67
67
  * actions: ["es:*"],
68
- * resources: [`arn:aws:es:${current.name}:${currentGetCallerIdentity.accountId}:domain/${domain}/*`],
68
+ * resources: [`arn:aws:es:${current.region}:${currentGetCallerIdentity.accountId}:domain/${domain}/*`],
69
69
  * conditions: [{
70
70
  * test: "IpAddress",
71
71
  * variable: "aws:SourceIp",
@@ -156,7 +156,7 @@ const utilities = require("../utilities");
156
156
  * identifiers: ["*"],
157
157
  * }],
158
158
  * actions: ["es:*"],
159
- * resources: [`arn:aws:es:${current.name}:${currentGetCallerIdentity.accountId}:domain/${domain}/*`],
159
+ * resources: [`arn:aws:es:${current.region}:${currentGetCallerIdentity.accountId}:domain/${domain}/*`],
160
160
  * }],
161
161
  * }));
162
162
  * const exampleDomain = new aws.opensearch.Domain("example", {
@@ -16,12 +16,12 @@ import * as pulumi from "@pulumi/pulumi";
16
16
  * connectionAlias: "outbound_connection",
17
17
  * localDomainInfo: {
18
18
  * ownerId: current.then(current => current.accountId),
19
- * region: currentGetRegion.then(currentGetRegion => currentGetRegion.name),
19
+ * region: currentGetRegion.then(currentGetRegion => currentGetRegion.region),
20
20
  * domainName: localDomain.domainName,
21
21
  * },
22
22
  * remoteDomainInfo: {
23
23
  * ownerId: current.then(current => current.accountId),
24
- * region: currentGetRegion.then(currentGetRegion => currentGetRegion.name),
24
+ * region: currentGetRegion.then(currentGetRegion => currentGetRegion.region),
25
25
  * domainName: remoteDomain.domainName,
26
26
  * },
27
27
  * });
@@ -22,12 +22,12 @@ const utilities = require("../utilities");
22
22
  * connectionAlias: "outbound_connection",
23
23
  * localDomainInfo: {
24
24
  * ownerId: current.then(current => current.accountId),
25
- * region: currentGetRegion.then(currentGetRegion => currentGetRegion.name),
25
+ * region: currentGetRegion.then(currentGetRegion => currentGetRegion.region),
26
26
  * domainName: localDomain.domainName,
27
27
  * },
28
28
  * remoteDomainInfo: {
29
29
  * ownerId: current.then(current => current.accountId),
30
- * region: currentGetRegion.then(currentGetRegion => currentGetRegion.name),
30
+ * region: currentGetRegion.then(currentGetRegion => currentGetRegion.region),
31
31
  * domainName: remoteDomain.domainName,
32
32
  * },
33
33
  * });
@@ -19,12 +19,12 @@ import * as outputs from "../types/output";
19
19
  * connectionMode: "DIRECT",
20
20
  * localDomainInfo: {
21
21
  * ownerId: current.then(current => current.accountId),
22
- * region: currentGetRegion.then(currentGetRegion => currentGetRegion.name),
22
+ * region: currentGetRegion.then(currentGetRegion => currentGetRegion.region),
23
23
  * domainName: localDomain.domainName,
24
24
  * },
25
25
  * remoteDomainInfo: {
26
26
  * ownerId: current.then(current => current.accountId),
27
- * region: currentGetRegion.then(currentGetRegion => currentGetRegion.name),
27
+ * region: currentGetRegion.then(currentGetRegion => currentGetRegion.region),
28
28
  * domainName: remoteDomain.domainName,
29
29
  * },
30
30
  * });
@@ -23,12 +23,12 @@ const utilities = require("../utilities");
23
23
  * connectionMode: "DIRECT",
24
24
  * localDomainInfo: {
25
25
  * ownerId: current.then(current => current.accountId),
26
- * region: currentGetRegion.then(currentGetRegion => currentGetRegion.name),
26
+ * region: currentGetRegion.then(currentGetRegion => currentGetRegion.region),
27
27
  * domainName: localDomain.domainName,
28
28
  * },
29
29
  * remoteDomainInfo: {
30
30
  * ownerId: current.then(current => current.accountId),
31
- * region: currentGetRegion.then(currentGetRegion => currentGetRegion.name),
31
+ * region: currentGetRegion.then(currentGetRegion => currentGetRegion.region),
32
32
  * domainName: remoteDomain.domainName,
33
33
  * },
34
34
  * });
@@ -35,7 +35,7 @@ import * as outputs from "../types/output";
35
35
  * - s3:
36
36
  * aws:
37
37
  * sts_role_arn: "${arn}"
38
- * region: "${current.name}"
38
+ * region: "${current.region}"
39
39
  * bucket: "example"
40
40
  * threshold:
41
41
  * event_collect_timeout: "60s"
@@ -39,7 +39,7 @@ const utilities = require("../utilities");
39
39
  * - s3:
40
40
  * aws:
41
41
  * sts_role_arn: "${arn}"
42
- * region: "${current.name}"
42
+ * region: "${current.region}"
43
43
  * bucket: "example"
44
44
  * threshold:
45
45
  * event_collect_timeout: "60s"
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@pulumi/aws",
3
- "version": "7.0.0-alpha.2",
3
+ "version": "7.0.0-alpha.3",
4
4
  "description": "A Pulumi package for creating and managing Amazon Web Services (AWS) cloud resources.",
5
5
  "keywords": [
6
6
  "pulumi",
@@ -24,6 +24,6 @@
24
24
  "pulumi": {
25
25
  "resource": true,
26
26
  "name": "aws",
27
- "version": "7.0.0-alpha.2"
27
+ "version": "7.0.0-alpha.3"
28
28
  }
29
29
  }
@@ -42,7 +42,7 @@ import * as outputs from "../types/output";
42
42
  * key: "manifest.json",
43
43
  * content: pulumi.jsonStringify({
44
44
  * fileLocations: [{
45
- * URIPrefixes: [pulumi.all([example.id, currentGetRegion, currentGetPartition]).apply(([id, currentGetRegion, currentGetPartition]) => `https://${id}.s3-${currentGetRegion.name}.${currentGetPartition.dnsSuffix}`)],
45
+ * URIPrefixes: [pulumi.all([example.id, currentGetRegion, currentGetPartition]).apply(([id, currentGetRegion, currentGetPartition]) => `https://${id}.s3-${currentGetRegion.region}.${currentGetPartition.dnsSuffix}`)],
46
46
  * }],
47
47
  * globalUploadSettings: {
48
48
  * format: "CSV",