@pulumi/aws 7.0.0-alpha.2 → 7.0.0-alpha.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/accessanalyzer/analyzer.d.ts +54 -7
- package/accessanalyzer/analyzer.js +48 -1
- package/accessanalyzer/analyzer.js.map +1 -1
- package/amplify/app.d.ts +26 -0
- package/amplify/app.js +16 -0
- package/amplify/app.js.map +1 -1
- package/bedrock/agentAgent.d.ts +2 -2
- package/bedrock/agentAgent.js +2 -2
- package/bedrock/agentAgentCollaborator.d.ts +4 -4
- package/bedrock/agentAgentCollaborator.js +4 -4
- package/cloudtrail/trail.d.ts +2 -2
- package/cloudtrail/trail.js +2 -2
- package/cloudwatch/eventArchive.d.ts +91 -15
- package/cloudwatch/eventArchive.js +67 -1
- package/cloudwatch/eventArchive.js.map +1 -1
- package/cloudwatch/logGroup.d.ts +6 -6
- package/codeartifact/domainPermissions.d.ts +1 -1
- package/codeartifact/domainPermissions.js +0 -3
- package/codeartifact/domainPermissions.js.map +1 -1
- package/connect/botAssociation.d.ts +1 -1
- package/connect/botAssociation.js +1 -1
- package/controltower/controlTowerControl.d.ts +1 -1
- package/controltower/controlTowerControl.js +1 -1
- package/cur/reportDefinition.d.ts +3 -3
- package/datasync/agent.d.ts +1 -1
- package/datasync/agent.js +1 -1
- package/dynamodb/table.d.ts +1 -1
- package/dynamodb/table.js +1 -1
- package/dynamodb/tag.d.ts +1 -1
- package/dynamodb/tag.js +1 -1
- package/ec2/getManagedPrefixList.d.ts +2 -2
- package/ec2/getManagedPrefixList.js +2 -2
- package/ec2/securityGroupRule.d.ts +1 -1
- package/ec2/securityGroupRule.js +1 -1
- package/ec2/vpc.d.ts +2 -2
- package/ec2/vpc.js +2 -2
- package/ec2/vpcIpam.d.ts +1 -1
- package/ec2/vpcIpam.js +1 -1
- package/ec2/vpcIpamPool.d.ts +4 -4
- package/ec2/vpcIpamPool.js +4 -4
- package/ec2/vpcIpamPoolCidr.d.ts +3 -3
- package/ec2/vpcIpamPoolCidr.js +3 -3
- package/ec2/vpcIpamPoolCidrAllocation.d.ts +4 -4
- package/ec2/vpcIpamPoolCidrAllocation.js +4 -4
- package/ec2/vpcIpamPreviewNextCidr.d.ts +2 -2
- package/ec2/vpcIpamPreviewNextCidr.js +2 -2
- package/ec2/vpcIpamResourceDiscovery.d.ts +1 -1
- package/ec2/vpcIpamResourceDiscovery.js +1 -1
- package/ec2/vpcIpamScope.d.ts +1 -1
- package/ec2/vpcIpamScope.js +1 -1
- package/ecr/registryPolicy.d.ts +1 -1
- package/ecr/registryPolicy.js +1 -1
- package/eks/podIdentityAssociation.d.ts +32 -0
- package/eks/podIdentityAssociation.js +6 -0
- package/eks/podIdentityAssociation.js.map +1 -1
- package/elasticsearch/domain.d.ts +2 -2
- package/elasticsearch/domain.js +2 -2
- package/emr/cluster.d.ts +12 -0
- package/emr/cluster.js +2 -0
- package/emr/cluster.js.map +1 -1
- package/fms/policy.d.ts +12 -0
- package/fms/policy.js +2 -0
- package/fms/policy.js.map +1 -1
- package/getRegion.d.ts +2 -2
- package/getService.d.ts +2 -2
- package/getService.js +2 -2
- package/glue/job.d.ts +12 -0
- package/glue/job.js +2 -0
- package/glue/job.js.map +1 -1
- package/glue/resourcePolicy.d.ts +1 -1
- package/glue/resourcePolicy.js +1 -1
- package/guardduty/detectorFeature.d.ts +21 -0
- package/guardduty/detectorFeature.js +21 -0
- package/guardduty/detectorFeature.js.map +1 -1
- package/guardduty/memberDetectorFeature.d.ts +1 -11
- package/guardduty/memberDetectorFeature.js +1 -11
- package/guardduty/memberDetectorFeature.js.map +1 -1
- package/guardduty/publishingDestination.d.ts +2 -2
- package/guardduty/publishingDestination.js +2 -2
- package/imagebuilder/imageRecipe.d.ts +1 -1
- package/imagebuilder/imageRecipe.js +1 -1
- package/kinesis/firehoseDeliveryStream.d.ts +1 -1
- package/kinesis/firehoseDeliveryStream.js +1 -1
- package/kms/getKey.d.ts +1 -1
- package/kms/key.d.ts +3 -3
- package/lightsail/instancePublicPorts.d.ts +6 -6
- package/macie/findingsFilter.d.ts +1 -1
- package/macie/findingsFilter.js +1 -1
- package/mediastore/containerPolicy.d.ts +1 -1
- package/mediastore/containerPolicy.js +1 -1
- package/networkfirewall/firewallPolicy.d.ts +51 -2
- package/networkfirewall/firewallPolicy.js +51 -2
- package/networkfirewall/firewallPolicy.js.map +1 -1
- package/networkmanager/dxGatewayAttachment.d.ts +1 -1
- package/networkmanager/dxGatewayAttachment.js +1 -1
- package/opensearch/domain.d.ts +2 -2
- package/opensearch/domain.js +2 -2
- package/opensearch/inboundConnectionAccepter.d.ts +2 -2
- package/opensearch/inboundConnectionAccepter.js +2 -2
- package/opensearch/outboundConnection.d.ts +2 -2
- package/opensearch/outboundConnection.js +2 -2
- package/opensearchingest/pipeline.d.ts +1 -1
- package/opensearchingest/pipeline.js +1 -1
- package/package.json +2 -2
- package/quicksight/dataSource.d.ts +1 -1
- package/quicksight/dataSource.js +1 -1
- package/route53/getTrafficPolicyDocument.d.ts +4 -4
- package/route53/getTrafficPolicyDocument.js +4 -4
- package/s3/bucket.d.ts +5 -4
- package/s3/bucketPolicy.d.ts +2 -0
- package/s3/bucketPolicy.js +2 -0
- package/s3/bucketPolicy.js.map +1 -1
- package/s3tables/table.d.ts +62 -0
- package/s3tables/table.js +49 -0
- package/s3tables/table.js.map +1 -1
- package/sagemaker/flowDefinition.d.ts +1 -1
- package/sagemaker/flowDefinition.js +1 -1
- package/securityhub/productSubscription.d.ts +1 -1
- package/securityhub/productSubscription.js +1 -1
- package/securityhub/standardsSubscription.d.ts +1 -1
- package/securityhub/standardsSubscription.js +1 -1
- package/serverlessrepository/cloudFormationStack.d.ts +1 -1
- package/serverlessrepository/cloudFormationStack.js +1 -1
- package/shield/drtAccessLogBucketAssociation.d.ts +1 -1
- package/shield/drtAccessLogBucketAssociation.js +1 -1
- package/shield/protection.d.ts +1 -1
- package/shield/protection.js +1 -1
- package/shield/protectionGroup.d.ts +2 -2
- package/shield/protectionGroup.js +2 -2
- package/shield/protectionHealthCheckAssociation.d.ts +1 -1
- package/shield/protectionHealthCheckAssociation.js +1 -1
- package/ssm/parameter.d.ts +1 -1
- package/ssm/quicksetupConfigurationManager.d.ts +2 -2
- package/ssm/quicksetupConfigurationManager.js +2 -2
- package/types/input.d.ts +137 -20
- package/types/input.js.map +1 -1
- package/types/output.d.ts +137 -19
- package/types/output.js.map +1 -1
package/types/input.d.ts
CHANGED
|
@@ -1336,33 +1336,63 @@ export interface ProviderIgnoreTags {
|
|
|
1336
1336
|
export declare namespace accessanalyzer {
|
|
1337
1337
|
interface AnalyzerConfiguration {
|
|
1338
1338
|
/**
|
|
1339
|
-
*
|
|
1339
|
+
* Specifies the configuration of an internal access analyzer for an AWS organization or account. This configuration determines how the analyzer evaluates access within your AWS environment. See `internalAccess` Block for details.
|
|
1340
|
+
*/
|
|
1341
|
+
internalAccess?: pulumi.Input<inputs.accessanalyzer.AnalyzerConfigurationInternalAccess>;
|
|
1342
|
+
/**
|
|
1343
|
+
* Specifies the configuration of an unused access analyzer for an AWS organization or account. See `unusedAccess` Block for details.
|
|
1340
1344
|
*/
|
|
1341
1345
|
unusedAccess?: pulumi.Input<inputs.accessanalyzer.AnalyzerConfigurationUnusedAccess>;
|
|
1342
1346
|
}
|
|
1347
|
+
interface AnalyzerConfigurationInternalAccess {
|
|
1348
|
+
/**
|
|
1349
|
+
* Information about analysis rules for the internal access analyzer. These rules determine which resources and access patterns will be analyzed. See `analysisRule` Block for Internal Access Analyzer for details.
|
|
1350
|
+
*/
|
|
1351
|
+
analysisRule?: pulumi.Input<inputs.accessanalyzer.AnalyzerConfigurationInternalAccessAnalysisRule>;
|
|
1352
|
+
}
|
|
1353
|
+
interface AnalyzerConfigurationInternalAccessAnalysisRule {
|
|
1354
|
+
/**
|
|
1355
|
+
* List of rules for the internal access analyzer containing criteria to include in analysis. Only resources that meet the rule criteria will generate findings. See `inclusion` Block for details.
|
|
1356
|
+
*/
|
|
1357
|
+
inclusions?: pulumi.Input<pulumi.Input<inputs.accessanalyzer.AnalyzerConfigurationInternalAccessAnalysisRuleInclusion>[]>;
|
|
1358
|
+
}
|
|
1359
|
+
interface AnalyzerConfigurationInternalAccessAnalysisRuleInclusion {
|
|
1360
|
+
/**
|
|
1361
|
+
* List of AWS account IDs to apply to the internal access analysis rule criteria. Account IDs can only be applied to the analysis rule criteria for organization-level analyzers.
|
|
1362
|
+
*/
|
|
1363
|
+
accountIds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
1364
|
+
/**
|
|
1365
|
+
* List of resource ARNs to apply to the internal access analysis rule criteria. The analyzer will only generate findings for resources that match these ARNs.
|
|
1366
|
+
*/
|
|
1367
|
+
resourceArns?: pulumi.Input<pulumi.Input<string>[]>;
|
|
1368
|
+
/**
|
|
1369
|
+
* List of resource types to apply to the internal access analysis rule criteria. The analyzer will only generate findings for resources of these types. Refer to [InternalAccessAnalysisRuleCriteria](https://docs.aws.amazon.com/access-analyzer/latest/APIReference/API_InternalAccessAnalysisRuleCriteria.html) in the AWS IAM Access Analyzer API Reference for valid values.
|
|
1370
|
+
*/
|
|
1371
|
+
resourceTypes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
1372
|
+
}
|
|
1343
1373
|
interface AnalyzerConfigurationUnusedAccess {
|
|
1344
1374
|
/**
|
|
1345
|
-
*
|
|
1375
|
+
* Information about analysis rules for the analyzer. Analysis rules determine which entities will generate findings based on the criteria you define when you create the rule. See `analysisRule` Block for Unused Access Analyzer for details.
|
|
1346
1376
|
*/
|
|
1347
1377
|
analysisRule?: pulumi.Input<inputs.accessanalyzer.AnalyzerConfigurationUnusedAccessAnalysisRule>;
|
|
1348
1378
|
/**
|
|
1349
|
-
*
|
|
1379
|
+
* Specified access age in days for which to generate findings for unused access.
|
|
1350
1380
|
*/
|
|
1351
1381
|
unusedAccessAge?: pulumi.Input<number>;
|
|
1352
1382
|
}
|
|
1353
1383
|
interface AnalyzerConfigurationUnusedAccessAnalysisRule {
|
|
1354
1384
|
/**
|
|
1355
|
-
*
|
|
1385
|
+
* List of rules for the analyzer containing criteria to exclude from analysis. Entities that meet the rule criteria will not generate findings. See `exclusion` Block for details.
|
|
1356
1386
|
*/
|
|
1357
1387
|
exclusions?: pulumi.Input<pulumi.Input<inputs.accessanalyzer.AnalyzerConfigurationUnusedAccessAnalysisRuleExclusion>[]>;
|
|
1358
1388
|
}
|
|
1359
1389
|
interface AnalyzerConfigurationUnusedAccessAnalysisRuleExclusion {
|
|
1360
1390
|
/**
|
|
1361
|
-
*
|
|
1391
|
+
* List of AWS account IDs to apply to the analysis rule criteria. The accounts cannot include the organization analyzer owner account. Account IDs can only be applied to the analysis rule criteria for organization-level analyzers.
|
|
1362
1392
|
*/
|
|
1363
1393
|
accountIds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
1364
1394
|
/**
|
|
1365
|
-
*
|
|
1395
|
+
* List of key-value pairs for resource tags to exclude from the analysis.
|
|
1366
1396
|
*/
|
|
1367
1397
|
resourceTags?: pulumi.Input<pulumi.Input<{
|
|
1368
1398
|
[key: string]: pulumi.Input<string>;
|
|
@@ -2379,6 +2409,12 @@ export declare namespace amplify {
|
|
|
2379
2409
|
*/
|
|
2380
2410
|
target: pulumi.Input<string>;
|
|
2381
2411
|
}
|
|
2412
|
+
interface AppJobConfig {
|
|
2413
|
+
/**
|
|
2414
|
+
* Size of the build instance. Valid values: `STANDARD_8GB`, `LARGE_16GB`, and `XLARGE_72GB`. Default: `STANDARD_8GB`.
|
|
2415
|
+
*/
|
|
2416
|
+
buildComputeType?: pulumi.Input<string>;
|
|
2417
|
+
}
|
|
2382
2418
|
interface AppProductionBranch {
|
|
2383
2419
|
/**
|
|
2384
2420
|
* Branch name for the production branch.
|
|
@@ -14481,6 +14517,10 @@ export declare namespace codebuild {
|
|
|
14481
14517
|
* the [CodeBuild User Guide](https://docs.aws.amazon.com/codebuild/latest/userguide/build-env-ref-compute-types.html).
|
|
14482
14518
|
*/
|
|
14483
14519
|
computeType: pulumi.Input<string>;
|
|
14520
|
+
/**
|
|
14521
|
+
* Configuration block. Detailed below.
|
|
14522
|
+
*/
|
|
14523
|
+
dockerServer?: pulumi.Input<inputs.codebuild.ProjectEnvironmentDockerServer>;
|
|
14484
14524
|
/**
|
|
14485
14525
|
* Configuration block. Detailed below.
|
|
14486
14526
|
*/
|
|
@@ -14520,6 +14560,16 @@ export declare namespace codebuild {
|
|
|
14520
14560
|
*/
|
|
14521
14561
|
type: pulumi.Input<string>;
|
|
14522
14562
|
}
|
|
14563
|
+
interface ProjectEnvironmentDockerServer {
|
|
14564
|
+
/**
|
|
14565
|
+
* Compute type for the Docker server. Valid values: `BUILD_GENERAL1_SMALL`, `BUILD_GENERAL1_MEDIUM`, `BUILD_GENERAL1_LARGE`, `BUILD_GENERAL1_XLARGE`, and `BUILD_GENERAL1_2XLARGE`.
|
|
14566
|
+
*/
|
|
14567
|
+
computeType: pulumi.Input<string>;
|
|
14568
|
+
/**
|
|
14569
|
+
* List of security group IDs to assign to the Docker server.
|
|
14570
|
+
*/
|
|
14571
|
+
securityGroupIds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
14572
|
+
}
|
|
14523
14573
|
interface ProjectEnvironmentEnvironmentVariable {
|
|
14524
14574
|
/**
|
|
14525
14575
|
* Environment variable's name or key.
|
|
@@ -26638,7 +26688,7 @@ export declare namespace ecr {
|
|
|
26638
26688
|
/**
|
|
26639
26689
|
* A list of image tag prefixes on which to take action.
|
|
26640
26690
|
*/
|
|
26641
|
-
tagPrefixList?: pulumi.Input<
|
|
26691
|
+
tagPrefixList?: pulumi.Input<pulumi.Input<string>[]>;
|
|
26642
26692
|
/**
|
|
26643
26693
|
* The tag status of the image. Either 'tagged', 'untagged', or 'any'.
|
|
26644
26694
|
*/
|
|
@@ -53770,25 +53820,23 @@ export declare namespace lightsail {
|
|
|
53770
53820
|
*/
|
|
53771
53821
|
cidrListAliases?: pulumi.Input<pulumi.Input<string>[]>;
|
|
53772
53822
|
/**
|
|
53773
|
-
* Set of CIDR
|
|
53823
|
+
* Set of IPv4 addresses or ranges of IPv4 addresses (in CIDR notation) that are allowed to connect to an instance through the ports, and the protocol.
|
|
53774
53824
|
*/
|
|
53775
53825
|
cidrs?: pulumi.Input<pulumi.Input<string>[]>;
|
|
53776
53826
|
/**
|
|
53777
|
-
* First port in a range of open ports on an instance.
|
|
53827
|
+
* First port in a range of open ports on an instance. See [PortInfo](https://docs.aws.amazon.com/lightsail/2016-11-28/api-reference/API_PortInfo.html) for details.
|
|
53778
53828
|
*/
|
|
53779
53829
|
fromPort: pulumi.Input<number>;
|
|
53780
53830
|
/**
|
|
53781
|
-
* Set of IPv6 CIDR
|
|
53831
|
+
* Set of IPv6 addresses or ranges of IPv6 addresses (in CIDR notation) that are allowed to connect to an instance through the ports, and the protocol.
|
|
53782
53832
|
*/
|
|
53783
53833
|
ipv6Cidrs?: pulumi.Input<pulumi.Input<string>[]>;
|
|
53784
53834
|
/**
|
|
53785
|
-
* IP protocol name. Valid values: `tcp`, `all`, `udp`, `icmp`.
|
|
53835
|
+
* IP protocol name. Valid values: `tcp`, `all`, `udp`, `icmp`, `icmpv6`. See [PortInfo](https://docs.aws.amazon.com/lightsail/2016-11-28/api-reference/API_PortInfo.html) for details.
|
|
53786
53836
|
*/
|
|
53787
53837
|
protocol: pulumi.Input<string>;
|
|
53788
53838
|
/**
|
|
53789
|
-
* Last port in a range of open ports on an instance.
|
|
53790
|
-
*
|
|
53791
|
-
* The following arguments are optional:
|
|
53839
|
+
* Last port in a range of open ports on an instance. See [PortInfo](https://docs.aws.amazon.com/lightsail/2016-11-28/api-reference/API_PortInfo.html) for details.
|
|
53792
53840
|
*/
|
|
53793
53841
|
toPort: pulumi.Input<number>;
|
|
53794
53842
|
}
|
|
@@ -57791,6 +57839,12 @@ export declare namespace networkfirewall {
|
|
|
57791
57839
|
tcpIdleTimeoutSeconds?: pulumi.Input<number>;
|
|
57792
57840
|
}
|
|
57793
57841
|
interface FirewallPolicyFirewallPolicyStatefulRuleGroupReference {
|
|
57842
|
+
/**
|
|
57843
|
+
* Whether to enable deep threat inspection, which allows AWS to analyze service logs of network traffic processed by these rule groups to identify threat indicators across customers. AWS will use these threat indicators to improve the active threat defense managed rule groups and protect the security of AWS customers and services. This only applies to active threat defense maanaged rule groups.
|
|
57844
|
+
*
|
|
57845
|
+
* For details, refer to [AWS active threat defense for AWS Network Firewall](https://docs.aws.amazon.com/network-firewall/latest/developerguide/aws-managed-rule-groups-atd.html) in the AWS Network Firewall Developer Guide.
|
|
57846
|
+
*/
|
|
57847
|
+
deepThreatInspection?: pulumi.Input<string>;
|
|
57794
57848
|
/**
|
|
57795
57849
|
* Configuration block for override values
|
|
57796
57850
|
*/
|
|
@@ -67132,6 +67186,41 @@ export declare namespace s3tables {
|
|
|
67132
67186
|
*/
|
|
67133
67187
|
minSnapshotsToKeep: pulumi.Input<number>;
|
|
67134
67188
|
}
|
|
67189
|
+
interface TableMetadata {
|
|
67190
|
+
/**
|
|
67191
|
+
* Contains details about the metadata for an Iceberg table. This block defines the schema structure for the Apache Iceberg table format.
|
|
67192
|
+
* See `iceberg` below.
|
|
67193
|
+
*/
|
|
67194
|
+
iceberg: pulumi.Input<inputs.s3tables.TableMetadataIceberg>;
|
|
67195
|
+
}
|
|
67196
|
+
interface TableMetadataIceberg {
|
|
67197
|
+
/**
|
|
67198
|
+
* Schema configuration for the Iceberg table.
|
|
67199
|
+
* See `schema` below.
|
|
67200
|
+
*/
|
|
67201
|
+
schema: pulumi.Input<inputs.s3tables.TableMetadataIcebergSchema>;
|
|
67202
|
+
}
|
|
67203
|
+
interface TableMetadataIcebergSchema {
|
|
67204
|
+
/**
|
|
67205
|
+
* List of schema fields for the Iceberg table. Each field defines a column in the table schema.
|
|
67206
|
+
* See `field` below.
|
|
67207
|
+
*/
|
|
67208
|
+
fields?: pulumi.Input<pulumi.Input<inputs.s3tables.TableMetadataIcebergSchemaField>[]>;
|
|
67209
|
+
}
|
|
67210
|
+
interface TableMetadataIcebergSchemaField {
|
|
67211
|
+
/**
|
|
67212
|
+
* The name of the field.
|
|
67213
|
+
*/
|
|
67214
|
+
name: pulumi.Input<string>;
|
|
67215
|
+
/**
|
|
67216
|
+
* A Boolean value that specifies whether values are required for each row in this field. Defaults to `false`.
|
|
67217
|
+
*/
|
|
67218
|
+
required?: pulumi.Input<boolean>;
|
|
67219
|
+
/**
|
|
67220
|
+
* The field type. S3 Tables supports all Apache Iceberg primitive types including: `boolean`, `int`, `long`, `float`, `double`, `decimal(precision,scale)`, `date`, `time`, `timestamp`, `timestamptz`, `string`, `uuid`, `fixed(length)`, `binary`.
|
|
67221
|
+
*/
|
|
67222
|
+
type: pulumi.Input<string>;
|
|
67223
|
+
}
|
|
67135
67224
|
}
|
|
67136
67225
|
export declare namespace sagemaker {
|
|
67137
67226
|
interface AppImageConfigCodeEditorAppImageConfig {
|
|
@@ -80920,6 +81009,10 @@ export declare namespace wafv2 {
|
|
|
80920
81009
|
* Additional configuration for using the Account Creation Fraud Prevention managed rule group. Use this to specify information such as the registration page of your application and the type of content to accept or reject from the client.
|
|
80921
81010
|
*/
|
|
80922
81011
|
awsManagedRulesAcfpRuleSet?: pulumi.Input<inputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAcfpRuleSet>;
|
|
81012
|
+
/**
|
|
81013
|
+
* Configuration for using the anti-DDoS managed rule group. See `awsManagedRulesAntiDdosRuleSet` for more details.
|
|
81014
|
+
*/
|
|
81015
|
+
awsManagedRulesAntiDdosRuleSet?: pulumi.Input<inputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSet>;
|
|
80923
81016
|
/**
|
|
80924
81017
|
* Additional configuration for using the Account Takeover Protection managed rule group. Use this to specify information such as the sign-in page of your application and the type of content to accept or reject from the client.
|
|
80925
81018
|
*/
|
|
@@ -81089,6 +81182,36 @@ export declare namespace wafv2 {
|
|
|
81089
81182
|
*/
|
|
81090
81183
|
successCodes: pulumi.Input<pulumi.Input<number>[]>;
|
|
81091
81184
|
}
|
|
81185
|
+
interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSet {
|
|
81186
|
+
/**
|
|
81187
|
+
* Configuration for the request handling that's applied by the managed rule group rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` during a distributed denial of service (DDoS) attack. See `clientSideActionConfig` for more details.
|
|
81188
|
+
*/
|
|
81189
|
+
clientSideActionConfig: pulumi.Input<inputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfig>;
|
|
81190
|
+
/**
|
|
81191
|
+
* Sensitivity that the rule group rule DDoSRequests uses when matching against the DDoS suspicion labeling on a request. Valid values are `LOW` (Default), `MEDIUM`, and `HIGH`.
|
|
81192
|
+
*/
|
|
81193
|
+
sensitivityToBlock?: pulumi.Input<string>;
|
|
81194
|
+
}
|
|
81195
|
+
interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfig {
|
|
81196
|
+
/**
|
|
81197
|
+
* Configuration for the use of the `AWSManagedRulesAntiDDoSRuleSet` rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests`.
|
|
81198
|
+
*/
|
|
81199
|
+
challenge: pulumi.Input<inputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfigChallenge>;
|
|
81200
|
+
}
|
|
81201
|
+
interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfigChallenge {
|
|
81202
|
+
exemptUriRegularExpressions?: pulumi.Input<pulumi.Input<inputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfigChallengeExemptUriRegularExpression>[]>;
|
|
81203
|
+
/**
|
|
81204
|
+
* Sensitivity that the rule group rule ChallengeDDoSRequests uses when matching against the DDoS suspicion labeling on a request. Valid values are `LOW`, `MEDIUM` and `HIGH` (Default).
|
|
81205
|
+
*/
|
|
81206
|
+
sensitivity?: pulumi.Input<string>;
|
|
81207
|
+
/**
|
|
81208
|
+
* Configuration whether to use the `AWSManagedRulesAntiDDoSRuleSet` rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` in the rule group evaluation. Valid values are `ENABLED` and `DISABLED`.
|
|
81209
|
+
*/
|
|
81210
|
+
usageOfAction: pulumi.Input<string>;
|
|
81211
|
+
}
|
|
81212
|
+
interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfigChallengeExemptUriRegularExpression {
|
|
81213
|
+
regexString?: pulumi.Input<string>;
|
|
81214
|
+
}
|
|
81092
81215
|
interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAtpRuleSet {
|
|
81093
81216
|
/**
|
|
81094
81217
|
* Whether or not to allow the use of regular expressions in the login page path.
|
|
@@ -81238,9 +81361,6 @@ export declare namespace wafv2 {
|
|
|
81238
81361
|
* Instructs AWS WAF to run a Captcha check against the web request. See `captcha` below for details.
|
|
81239
81362
|
*/
|
|
81240
81363
|
captcha?: pulumi.Input<inputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementRuleActionOverrideActionToUseCaptcha>;
|
|
81241
|
-
/**
|
|
81242
|
-
* Instructs AWS WAF to run a check against the request to verify that the request is coming from a legitimate client session. See `challenge` below for details.
|
|
81243
|
-
*/
|
|
81244
81364
|
challenge?: pulumi.Input<inputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementRuleActionOverrideActionToUseChallenge>;
|
|
81245
81365
|
count?: pulumi.Input<inputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementRuleActionOverrideActionToUseCount>;
|
|
81246
81366
|
}
|
|
@@ -84883,9 +85003,6 @@ export declare namespace wafv2 {
|
|
|
84883
85003
|
* Instructs AWS WAF to run a Captcha check against the web request. See `captcha` below for details.
|
|
84884
85004
|
*/
|
|
84885
85005
|
captcha?: pulumi.Input<inputs.wafv2.WebAclRuleStatementRuleGroupReferenceStatementRuleActionOverrideActionToUseCaptcha>;
|
|
84886
|
-
/**
|
|
84887
|
-
* Instructs AWS WAF to run a check against the request to verify that the request is coming from a legitimate client session. See `challenge` below for details.
|
|
84888
|
-
*/
|
|
84889
85006
|
challenge?: pulumi.Input<inputs.wafv2.WebAclRuleStatementRuleGroupReferenceStatementRuleActionOverrideActionToUseChallenge>;
|
|
84890
85007
|
count?: pulumi.Input<inputs.wafv2.WebAclRuleStatementRuleGroupReferenceStatementRuleActionOverrideActionToUseCount>;
|
|
84891
85008
|
}
|
package/types/input.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"input.js","sourceRoot":"","sources":["../../types/input.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;
|
|
1
|
+
{"version":3,"file":"input.js","sourceRoot":"","sources":["../../types/input.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AA0ssBjF,IAAiB,GAAG,CAqhKnB;AArhKD,WAAiB,GAAG;IAgmIhB;;OAEG;IACH,SAAgB,kCAAkC,CAAC,GAAwB;;QACvE,uCACO,GAAG,KACN,WAAW,EAAE,MAAA,CAAC,GAAG,CAAC,WAAW,CAAC,mCAAI,EAAE,IACtC;IACN,CAAC;IALe,sCAAkC,qCAKjD,CAAA;IA4CD;;OAEG;IACH,SAAgB,mCAAmC,CAAC,GAAyB;;QACzE,uCACO,GAAG,KACN,WAAW,EAAE,MAAA,CAAC,GAAG,CAAC,WAAW,CAAC,mCAAI,EAAE,IACtC;IACN,CAAC;IALe,uCAAmC,sCAKlD,CAAA;AAy3BL,CAAC,EArhKgB,GAAG,GAAH,WAAG,KAAH,WAAG,QAqhKnB;AAuhsCD,IAAiB,GAAG,CAwcnB;AAxcD,WAAiB,GAAG;IAyXhB;;OAEG;IACH,SAAgB,sCAAsC,CAAC,GAA4B;;QAC/E,uCACO,GAAG,KACN,WAAW,EAAE,MAAA,CAAC,GAAG,CAAC,WAAW,CAAC,mCAAI,WAAW,IAC/C;IACN,CAAC;IALe,0CAAsC,yCAKrD,CAAA;AAuEL,CAAC,EAxcgB,GAAG,GAAH,WAAG,KAAH,WAAG,QAwcnB"}
|
package/types/output.d.ts
CHANGED
|
@@ -32,33 +32,63 @@ export interface GetRegionsFilter {
|
|
|
32
32
|
export declare namespace accessanalyzer {
|
|
33
33
|
interface AnalyzerConfiguration {
|
|
34
34
|
/**
|
|
35
|
-
*
|
|
35
|
+
* Specifies the configuration of an internal access analyzer for an AWS organization or account. This configuration determines how the analyzer evaluates access within your AWS environment. See `internalAccess` Block for details.
|
|
36
|
+
*/
|
|
37
|
+
internalAccess?: outputs.accessanalyzer.AnalyzerConfigurationInternalAccess;
|
|
38
|
+
/**
|
|
39
|
+
* Specifies the configuration of an unused access analyzer for an AWS organization or account. See `unusedAccess` Block for details.
|
|
36
40
|
*/
|
|
37
41
|
unusedAccess?: outputs.accessanalyzer.AnalyzerConfigurationUnusedAccess;
|
|
38
42
|
}
|
|
43
|
+
interface AnalyzerConfigurationInternalAccess {
|
|
44
|
+
/**
|
|
45
|
+
* Information about analysis rules for the internal access analyzer. These rules determine which resources and access patterns will be analyzed. See `analysisRule` Block for Internal Access Analyzer for details.
|
|
46
|
+
*/
|
|
47
|
+
analysisRule?: outputs.accessanalyzer.AnalyzerConfigurationInternalAccessAnalysisRule;
|
|
48
|
+
}
|
|
49
|
+
interface AnalyzerConfigurationInternalAccessAnalysisRule {
|
|
50
|
+
/**
|
|
51
|
+
* List of rules for the internal access analyzer containing criteria to include in analysis. Only resources that meet the rule criteria will generate findings. See `inclusion` Block for details.
|
|
52
|
+
*/
|
|
53
|
+
inclusions?: outputs.accessanalyzer.AnalyzerConfigurationInternalAccessAnalysisRuleInclusion[];
|
|
54
|
+
}
|
|
55
|
+
interface AnalyzerConfigurationInternalAccessAnalysisRuleInclusion {
|
|
56
|
+
/**
|
|
57
|
+
* List of AWS account IDs to apply to the internal access analysis rule criteria. Account IDs can only be applied to the analysis rule criteria for organization-level analyzers.
|
|
58
|
+
*/
|
|
59
|
+
accountIds?: string[];
|
|
60
|
+
/**
|
|
61
|
+
* List of resource ARNs to apply to the internal access analysis rule criteria. The analyzer will only generate findings for resources that match these ARNs.
|
|
62
|
+
*/
|
|
63
|
+
resourceArns?: string[];
|
|
64
|
+
/**
|
|
65
|
+
* List of resource types to apply to the internal access analysis rule criteria. The analyzer will only generate findings for resources of these types. Refer to [InternalAccessAnalysisRuleCriteria](https://docs.aws.amazon.com/access-analyzer/latest/APIReference/API_InternalAccessAnalysisRuleCriteria.html) in the AWS IAM Access Analyzer API Reference for valid values.
|
|
66
|
+
*/
|
|
67
|
+
resourceTypes?: string[];
|
|
68
|
+
}
|
|
39
69
|
interface AnalyzerConfigurationUnusedAccess {
|
|
40
70
|
/**
|
|
41
|
-
*
|
|
71
|
+
* Information about analysis rules for the analyzer. Analysis rules determine which entities will generate findings based on the criteria you define when you create the rule. See `analysisRule` Block for Unused Access Analyzer for details.
|
|
42
72
|
*/
|
|
43
73
|
analysisRule?: outputs.accessanalyzer.AnalyzerConfigurationUnusedAccessAnalysisRule;
|
|
44
74
|
/**
|
|
45
|
-
*
|
|
75
|
+
* Specified access age in days for which to generate findings for unused access.
|
|
46
76
|
*/
|
|
47
77
|
unusedAccessAge?: number;
|
|
48
78
|
}
|
|
49
79
|
interface AnalyzerConfigurationUnusedAccessAnalysisRule {
|
|
50
80
|
/**
|
|
51
|
-
*
|
|
81
|
+
* List of rules for the analyzer containing criteria to exclude from analysis. Entities that meet the rule criteria will not generate findings. See `exclusion` Block for details.
|
|
52
82
|
*/
|
|
53
83
|
exclusions?: outputs.accessanalyzer.AnalyzerConfigurationUnusedAccessAnalysisRuleExclusion[];
|
|
54
84
|
}
|
|
55
85
|
interface AnalyzerConfigurationUnusedAccessAnalysisRuleExclusion {
|
|
56
86
|
/**
|
|
57
|
-
*
|
|
87
|
+
* List of AWS account IDs to apply to the analysis rule criteria. The accounts cannot include the organization analyzer owner account. Account IDs can only be applied to the analysis rule criteria for organization-level analyzers.
|
|
58
88
|
*/
|
|
59
89
|
accountIds?: string[];
|
|
60
90
|
/**
|
|
61
|
-
*
|
|
91
|
+
* List of key-value pairs for resource tags to exclude from the analysis.
|
|
62
92
|
*/
|
|
63
93
|
resourceTags?: {
|
|
64
94
|
[key: string]: string;
|
|
@@ -1225,6 +1255,12 @@ export declare namespace amplify {
|
|
|
1225
1255
|
*/
|
|
1226
1256
|
target: string;
|
|
1227
1257
|
}
|
|
1258
|
+
interface AppJobConfig {
|
|
1259
|
+
/**
|
|
1260
|
+
* Size of the build instance. Valid values: `STANDARD_8GB`, `LARGE_16GB`, and `XLARGE_72GB`. Default: `STANDARD_8GB`.
|
|
1261
|
+
*/
|
|
1262
|
+
buildComputeType: string;
|
|
1263
|
+
}
|
|
1228
1264
|
interface AppProductionBranch {
|
|
1229
1265
|
/**
|
|
1230
1266
|
* Branch name for the production branch.
|
|
@@ -16159,6 +16195,10 @@ export declare namespace codebuild {
|
|
|
16159
16195
|
* the [CodeBuild User Guide](https://docs.aws.amazon.com/codebuild/latest/userguide/build-env-ref-compute-types.html).
|
|
16160
16196
|
*/
|
|
16161
16197
|
computeType: string;
|
|
16198
|
+
/**
|
|
16199
|
+
* Configuration block. Detailed below.
|
|
16200
|
+
*/
|
|
16201
|
+
dockerServer?: outputs.codebuild.ProjectEnvironmentDockerServer;
|
|
16162
16202
|
/**
|
|
16163
16203
|
* Configuration block. Detailed below.
|
|
16164
16204
|
*/
|
|
@@ -16198,6 +16238,16 @@ export declare namespace codebuild {
|
|
|
16198
16238
|
*/
|
|
16199
16239
|
type: string;
|
|
16200
16240
|
}
|
|
16241
|
+
interface ProjectEnvironmentDockerServer {
|
|
16242
|
+
/**
|
|
16243
|
+
* Compute type for the Docker server. Valid values: `BUILD_GENERAL1_SMALL`, `BUILD_GENERAL1_MEDIUM`, `BUILD_GENERAL1_LARGE`, `BUILD_GENERAL1_XLARGE`, and `BUILD_GENERAL1_2XLARGE`.
|
|
16244
|
+
*/
|
|
16245
|
+
computeType: string;
|
|
16246
|
+
/**
|
|
16247
|
+
* List of security group IDs to assign to the Docker server.
|
|
16248
|
+
*/
|
|
16249
|
+
securityGroupIds?: string[];
|
|
16250
|
+
}
|
|
16201
16251
|
interface ProjectEnvironmentEnvironmentVariable {
|
|
16202
16252
|
/**
|
|
16203
16253
|
* Environment variable's name or key.
|
|
@@ -60991,25 +61041,23 @@ export declare namespace lightsail {
|
|
|
60991
61041
|
*/
|
|
60992
61042
|
cidrListAliases: string[];
|
|
60993
61043
|
/**
|
|
60994
|
-
* Set of CIDR
|
|
61044
|
+
* Set of IPv4 addresses or ranges of IPv4 addresses (in CIDR notation) that are allowed to connect to an instance through the ports, and the protocol.
|
|
60995
61045
|
*/
|
|
60996
61046
|
cidrs: string[];
|
|
60997
61047
|
/**
|
|
60998
|
-
* First port in a range of open ports on an instance.
|
|
61048
|
+
* First port in a range of open ports on an instance. See [PortInfo](https://docs.aws.amazon.com/lightsail/2016-11-28/api-reference/API_PortInfo.html) for details.
|
|
60999
61049
|
*/
|
|
61000
61050
|
fromPort: number;
|
|
61001
61051
|
/**
|
|
61002
|
-
* Set of IPv6 CIDR
|
|
61052
|
+
* Set of IPv6 addresses or ranges of IPv6 addresses (in CIDR notation) that are allowed to connect to an instance through the ports, and the protocol.
|
|
61003
61053
|
*/
|
|
61004
61054
|
ipv6Cidrs: string[];
|
|
61005
61055
|
/**
|
|
61006
|
-
* IP protocol name. Valid values: `tcp`, `all`, `udp`, `icmp`.
|
|
61056
|
+
* IP protocol name. Valid values: `tcp`, `all`, `udp`, `icmp`, `icmpv6`. See [PortInfo](https://docs.aws.amazon.com/lightsail/2016-11-28/api-reference/API_PortInfo.html) for details.
|
|
61007
61057
|
*/
|
|
61008
61058
|
protocol: string;
|
|
61009
61059
|
/**
|
|
61010
|
-
* Last port in a range of open ports on an instance.
|
|
61011
|
-
*
|
|
61012
|
-
* The following arguments are optional:
|
|
61060
|
+
* Last port in a range of open ports on an instance. See [PortInfo](https://docs.aws.amazon.com/lightsail/2016-11-28/api-reference/API_PortInfo.html) for details.
|
|
61013
61061
|
*/
|
|
61014
61062
|
toPort: number;
|
|
61015
61063
|
}
|
|
@@ -65409,6 +65457,12 @@ export declare namespace networkfirewall {
|
|
|
65409
65457
|
tcpIdleTimeoutSeconds?: number;
|
|
65410
65458
|
}
|
|
65411
65459
|
interface FirewallPolicyFirewallPolicyStatefulRuleGroupReference {
|
|
65460
|
+
/**
|
|
65461
|
+
* Whether to enable deep threat inspection, which allows AWS to analyze service logs of network traffic processed by these rule groups to identify threat indicators across customers. AWS will use these threat indicators to improve the active threat defense managed rule groups and protect the security of AWS customers and services. This only applies to active threat defense maanaged rule groups.
|
|
65462
|
+
*
|
|
65463
|
+
* For details, refer to [AWS active threat defense for AWS Network Firewall](https://docs.aws.amazon.com/network-firewall/latest/developerguide/aws-managed-rule-groups-atd.html) in the AWS Network Firewall Developer Guide.
|
|
65464
|
+
*/
|
|
65465
|
+
deepThreatInspection: string;
|
|
65412
65466
|
/**
|
|
65413
65467
|
* Configuration block for override values
|
|
65414
65468
|
*/
|
|
@@ -65574,6 +65628,7 @@ export declare namespace networkfirewall {
|
|
|
65574
65628
|
streamExceptionPolicy: string;
|
|
65575
65629
|
}
|
|
65576
65630
|
interface GetFirewallPolicyFirewallPolicyStatefulRuleGroupReference {
|
|
65631
|
+
deepThreatInspection: string;
|
|
65577
65632
|
overrides?: outputs.networkfirewall.GetFirewallPolicyFirewallPolicyStatefulRuleGroupReferenceOverride[];
|
|
65578
65633
|
priority: number;
|
|
65579
65634
|
resourceArn: string;
|
|
@@ -75618,6 +75673,41 @@ export declare namespace s3tables {
|
|
|
75618
75673
|
*/
|
|
75619
75674
|
minSnapshotsToKeep: number;
|
|
75620
75675
|
}
|
|
75676
|
+
interface TableMetadata {
|
|
75677
|
+
/**
|
|
75678
|
+
* Contains details about the metadata for an Iceberg table. This block defines the schema structure for the Apache Iceberg table format.
|
|
75679
|
+
* See `iceberg` below.
|
|
75680
|
+
*/
|
|
75681
|
+
iceberg: outputs.s3tables.TableMetadataIceberg;
|
|
75682
|
+
}
|
|
75683
|
+
interface TableMetadataIceberg {
|
|
75684
|
+
/**
|
|
75685
|
+
* Schema configuration for the Iceberg table.
|
|
75686
|
+
* See `schema` below.
|
|
75687
|
+
*/
|
|
75688
|
+
schema: outputs.s3tables.TableMetadataIcebergSchema;
|
|
75689
|
+
}
|
|
75690
|
+
interface TableMetadataIcebergSchema {
|
|
75691
|
+
/**
|
|
75692
|
+
* List of schema fields for the Iceberg table. Each field defines a column in the table schema.
|
|
75693
|
+
* See `field` below.
|
|
75694
|
+
*/
|
|
75695
|
+
fields?: outputs.s3tables.TableMetadataIcebergSchemaField[];
|
|
75696
|
+
}
|
|
75697
|
+
interface TableMetadataIcebergSchemaField {
|
|
75698
|
+
/**
|
|
75699
|
+
* The name of the field.
|
|
75700
|
+
*/
|
|
75701
|
+
name: string;
|
|
75702
|
+
/**
|
|
75703
|
+
* A Boolean value that specifies whether values are required for each row in this field. Defaults to `false`.
|
|
75704
|
+
*/
|
|
75705
|
+
required: boolean;
|
|
75706
|
+
/**
|
|
75707
|
+
* The field type. S3 Tables supports all Apache Iceberg primitive types including: `boolean`, `int`, `long`, `float`, `double`, `decimal(precision,scale)`, `date`, `time`, `timestamp`, `timestamptz`, `string`, `uuid`, `fixed(length)`, `binary`.
|
|
75708
|
+
*/
|
|
75709
|
+
type: string;
|
|
75710
|
+
}
|
|
75621
75711
|
}
|
|
75622
75712
|
export declare namespace sagemaker {
|
|
75623
75713
|
interface AppImageConfigCodeEditorAppImageConfig {
|
|
@@ -90224,6 +90314,10 @@ export declare namespace wafv2 {
|
|
|
90224
90314
|
* Additional configuration for using the Account Creation Fraud Prevention managed rule group. Use this to specify information such as the registration page of your application and the type of content to accept or reject from the client.
|
|
90225
90315
|
*/
|
|
90226
90316
|
awsManagedRulesAcfpRuleSet?: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAcfpRuleSet;
|
|
90317
|
+
/**
|
|
90318
|
+
* Configuration for using the anti-DDoS managed rule group. See `awsManagedRulesAntiDdosRuleSet` for more details.
|
|
90319
|
+
*/
|
|
90320
|
+
awsManagedRulesAntiDdosRuleSet?: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSet;
|
|
90227
90321
|
/**
|
|
90228
90322
|
* Additional configuration for using the Account Takeover Protection managed rule group. Use this to specify information such as the sign-in page of your application and the type of content to accept or reject from the client.
|
|
90229
90323
|
*/
|
|
@@ -90393,6 +90487,36 @@ export declare namespace wafv2 {
|
|
|
90393
90487
|
*/
|
|
90394
90488
|
successCodes: number[];
|
|
90395
90489
|
}
|
|
90490
|
+
interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSet {
|
|
90491
|
+
/**
|
|
90492
|
+
* Configuration for the request handling that's applied by the managed rule group rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` during a distributed denial of service (DDoS) attack. See `clientSideActionConfig` for more details.
|
|
90493
|
+
*/
|
|
90494
|
+
clientSideActionConfig: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfig;
|
|
90495
|
+
/**
|
|
90496
|
+
* Sensitivity that the rule group rule DDoSRequests uses when matching against the DDoS suspicion labeling on a request. Valid values are `LOW` (Default), `MEDIUM`, and `HIGH`.
|
|
90497
|
+
*/
|
|
90498
|
+
sensitivityToBlock?: string;
|
|
90499
|
+
}
|
|
90500
|
+
interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfig {
|
|
90501
|
+
/**
|
|
90502
|
+
* Configuration for the use of the `AWSManagedRulesAntiDDoSRuleSet` rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests`.
|
|
90503
|
+
*/
|
|
90504
|
+
challenge: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfigChallenge;
|
|
90505
|
+
}
|
|
90506
|
+
interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfigChallenge {
|
|
90507
|
+
exemptUriRegularExpressions?: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfigChallengeExemptUriRegularExpression[];
|
|
90508
|
+
/**
|
|
90509
|
+
* Sensitivity that the rule group rule ChallengeDDoSRequests uses when matching against the DDoS suspicion labeling on a request. Valid values are `LOW`, `MEDIUM` and `HIGH` (Default).
|
|
90510
|
+
*/
|
|
90511
|
+
sensitivity?: string;
|
|
90512
|
+
/**
|
|
90513
|
+
* Configuration whether to use the `AWSManagedRulesAntiDDoSRuleSet` rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` in the rule group evaluation. Valid values are `ENABLED` and `DISABLED`.
|
|
90514
|
+
*/
|
|
90515
|
+
usageOfAction: string;
|
|
90516
|
+
}
|
|
90517
|
+
interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfigChallengeExemptUriRegularExpression {
|
|
90518
|
+
regexString?: string;
|
|
90519
|
+
}
|
|
90396
90520
|
interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAtpRuleSet {
|
|
90397
90521
|
/**
|
|
90398
90522
|
* Whether or not to allow the use of regular expressions in the login page path.
|
|
@@ -90542,9 +90666,6 @@ export declare namespace wafv2 {
|
|
|
90542
90666
|
* Instructs AWS WAF to run a Captcha check against the web request. See `captcha` below for details.
|
|
90543
90667
|
*/
|
|
90544
90668
|
captcha?: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementRuleActionOverrideActionToUseCaptcha;
|
|
90545
|
-
/**
|
|
90546
|
-
* Instructs AWS WAF to run a check against the request to verify that the request is coming from a legitimate client session. See `challenge` below for details.
|
|
90547
|
-
*/
|
|
90548
90669
|
challenge?: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementRuleActionOverrideActionToUseChallenge;
|
|
90549
90670
|
count?: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementRuleActionOverrideActionToUseCount;
|
|
90550
90671
|
}
|
|
@@ -94187,9 +94308,6 @@ export declare namespace wafv2 {
|
|
|
94187
94308
|
* Instructs AWS WAF to run a Captcha check against the web request. See `captcha` below for details.
|
|
94188
94309
|
*/
|
|
94189
94310
|
captcha?: outputs.wafv2.WebAclRuleStatementRuleGroupReferenceStatementRuleActionOverrideActionToUseCaptcha;
|
|
94190
|
-
/**
|
|
94191
|
-
* Instructs AWS WAF to run a check against the request to verify that the request is coming from a legitimate client session. See `challenge` below for details.
|
|
94192
|
-
*/
|
|
94193
94311
|
challenge?: outputs.wafv2.WebAclRuleStatementRuleGroupReferenceStatementRuleActionOverrideActionToUseChallenge;
|
|
94194
94312
|
count?: outputs.wafv2.WebAclRuleStatementRuleGroupReferenceStatementRuleActionOverrideActionToUseCount;
|
|
94195
94313
|
}
|
package/types/output.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"output.js","sourceRoot":"","sources":["../../types/output.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;
|
|
1
|
+
{"version":3,"file":"output.js","sourceRoot":"","sources":["../../types/output.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAmn2BjF,IAAiB,GAAG,CA0rMnB;AA1rMD,WAAiB,GAAG;IAowKhB;;OAEG;IACH,SAAgB,kCAAkC,CAAC,GAAwB;;QACvE,uCACO,GAAG,KACN,WAAW,EAAE,MAAA,CAAC,GAAG,CAAC,WAAW,CAAC,mCAAI,EAAE,IACtC;IACN,CAAC;IALe,sCAAkC,qCAKjD,CAAA;IA4CD;;OAEG;IACH,SAAgB,mCAAmC,CAAC,GAAyB;;QACzE,uCACO,GAAG,KACN,WAAW,EAAE,MAAA,CAAC,GAAG,CAAC,WAAW,CAAC,mCAAI,EAAE,IACtC;IACN,CAAC;IALe,uCAAmC,sCAKlD,CAAA;AA03BL,CAAC,EA1rMgB,GAAG,GAAH,WAAG,KAAH,WAAG,QA0rMnB;AA86xCD,IAAiB,GAAG,CA4cnB;AA5cD,WAAiB,GAAG;IA4XhB;;OAEG;IACH,SAAgB,sCAAsC,CAAC,GAA4B;;QAC/E,uCACO,GAAG,KACN,WAAW,EAAE,MAAA,CAAC,GAAG,CAAC,WAAW,CAAC,mCAAI,WAAW,IAC/C;IACN,CAAC;IALe,0CAAsC,yCAKrD,CAAA;AAwEL,CAAC,EA5cgB,GAAG,GAAH,WAAG,KAAH,WAAG,QA4cnB"}
|