@pulumi/aws 7.0.0-alpha.2 → 7.0.0-rc.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/accessanalyzer/analyzer.d.ts +54 -7
- package/accessanalyzer/analyzer.js +48 -1
- package/accessanalyzer/analyzer.js.map +1 -1
- package/amp/index.d.ts +3 -0
- package/amp/index.js +6 -1
- package/amp/index.js.map +1 -1
- package/amp/queryLoggingConfiguration.d.ts +107 -0
- package/amp/queryLoggingConfiguration.js +82 -0
- package/amp/queryLoggingConfiguration.js.map +1 -0
- package/amplify/app.d.ts +26 -0
- package/amplify/app.js +16 -0
- package/amplify/app.js.map +1 -1
- package/amplify/branch.d.ts +12 -0
- package/amplify/branch.js +2 -0
- package/amplify/branch.js.map +1 -1
- package/bedrock/agentAgent.d.ts +2 -2
- package/bedrock/agentAgent.js +2 -2
- package/bedrock/agentAgentCollaborator.d.ts +4 -4
- package/bedrock/agentAgentCollaborator.js +4 -4
- package/cloudfront/distribution.d.ts +12 -0
- package/cloudfront/distribution.js +2 -0
- package/cloudfront/distribution.js.map +1 -1
- package/cloudfront/getDistribution.d.ts +4 -0
- package/cloudfront/getDistribution.js.map +1 -1
- package/cloudtrail/trail.d.ts +2 -2
- package/cloudtrail/trail.js +2 -2
- package/cloudwatch/eventArchive.d.ts +91 -15
- package/cloudwatch/eventArchive.js +67 -1
- package/cloudwatch/eventArchive.js.map +1 -1
- package/cloudwatch/logGroup.d.ts +6 -6
- package/codeartifact/domainPermissions.d.ts +1 -1
- package/codeartifact/domainPermissions.js +0 -3
- package/codeartifact/domainPermissions.js.map +1 -1
- package/connect/botAssociation.d.ts +1 -1
- package/connect/botAssociation.js +1 -1
- package/controltower/controlTowerControl.d.ts +1 -1
- package/controltower/controlTowerControl.js +1 -1
- package/cur/reportDefinition.d.ts +3 -3
- package/datasync/agent.d.ts +1 -1
- package/datasync/agent.js +1 -1
- package/dynamodb/table.d.ts +36 -1
- package/dynamodb/table.js +36 -1
- package/dynamodb/table.js.map +1 -1
- package/dynamodb/tag.d.ts +1 -1
- package/dynamodb/tag.js +1 -1
- package/ec2/getManagedPrefixList.d.ts +2 -2
- package/ec2/getManagedPrefixList.js +2 -2
- package/ec2/securityGroupRule.d.ts +1 -1
- package/ec2/securityGroupRule.js +1 -1
- package/ec2/vpc.d.ts +2 -2
- package/ec2/vpc.js +2 -2
- package/ec2/vpcIpam.d.ts +1 -1
- package/ec2/vpcIpam.js +1 -1
- package/ec2/vpcIpamPool.d.ts +4 -4
- package/ec2/vpcIpamPool.js +4 -4
- package/ec2/vpcIpamPoolCidr.d.ts +3 -3
- package/ec2/vpcIpamPoolCidr.js +3 -3
- package/ec2/vpcIpamPoolCidrAllocation.d.ts +4 -4
- package/ec2/vpcIpamPoolCidrAllocation.js +4 -4
- package/ec2/vpcIpamPreviewNextCidr.d.ts +2 -2
- package/ec2/vpcIpamPreviewNextCidr.js +2 -2
- package/ec2/vpcIpamResourceDiscovery.d.ts +1 -1
- package/ec2/vpcIpamResourceDiscovery.js +1 -1
- package/ec2/vpcIpamScope.d.ts +1 -1
- package/ec2/vpcIpamScope.js +1 -1
- package/ecr/registryPolicy.d.ts +1 -1
- package/ecr/registryPolicy.js +1 -1
- package/eks/cluster.d.ts +2 -4
- package/eks/cluster.js +0 -2
- package/eks/cluster.js.map +1 -1
- package/eks/podIdentityAssociation.d.ts +32 -0
- package/eks/podIdentityAssociation.js +6 -0
- package/eks/podIdentityAssociation.js.map +1 -1
- package/elasticsearch/domain.d.ts +2 -2
- package/elasticsearch/domain.js +2 -2
- package/emr/cluster.d.ts +12 -0
- package/emr/cluster.js +2 -0
- package/emr/cluster.js.map +1 -1
- package/fms/policy.d.ts +12 -0
- package/fms/policy.js +2 -0
- package/fms/policy.js.map +1 -1
- package/getRegion.d.ts +2 -2
- package/getService.d.ts +2 -2
- package/getService.js +2 -2
- package/glue/job.d.ts +12 -0
- package/glue/job.js +2 -0
- package/glue/job.js.map +1 -1
- package/glue/resourcePolicy.d.ts +1 -1
- package/glue/resourcePolicy.js +1 -1
- package/guardduty/detectorFeature.d.ts +21 -0
- package/guardduty/detectorFeature.js +21 -0
- package/guardduty/detectorFeature.js.map +1 -1
- package/guardduty/memberDetectorFeature.d.ts +1 -11
- package/guardduty/memberDetectorFeature.js +1 -11
- package/guardduty/memberDetectorFeature.js.map +1 -1
- package/guardduty/publishingDestination.d.ts +2 -2
- package/guardduty/publishingDestination.js +2 -2
- package/iam/rolePolicy.d.ts +21 -15
- package/iam/rolePolicy.js.map +1 -1
- package/imagebuilder/imageRecipe.d.ts +1 -1
- package/imagebuilder/imageRecipe.js +1 -1
- package/kinesis/firehoseDeliveryStream.d.ts +1 -1
- package/kinesis/firehoseDeliveryStream.js +1 -1
- package/kinesis/getStreamConsumer.d.ts +9 -0
- package/kinesis/getStreamConsumer.js +2 -0
- package/kinesis/getStreamConsumer.js.map +1 -1
- package/kinesis/streamConsumer.d.ts +15 -0
- package/kinesis/streamConsumer.js +4 -0
- package/kinesis/streamConsumer.js.map +1 -1
- package/kms/getKey.d.ts +1 -1
- package/kms/key.d.ts +3 -3
- package/lightsail/instancePublicPorts.d.ts +6 -6
- package/macie/findingsFilter.d.ts +1 -1
- package/macie/findingsFilter.js +1 -1
- package/mediastore/containerPolicy.d.ts +1 -1
- package/mediastore/containerPolicy.js +1 -1
- package/networkfirewall/firewallPolicy.d.ts +51 -2
- package/networkfirewall/firewallPolicy.js +51 -2
- package/networkfirewall/firewallPolicy.js.map +1 -1
- package/networkmanager/dxGatewayAttachment.d.ts +1 -1
- package/networkmanager/dxGatewayAttachment.js +1 -1
- package/opensearch/domain.d.ts +2 -2
- package/opensearch/domain.js +2 -2
- package/opensearch/inboundConnectionAccepter.d.ts +2 -2
- package/opensearch/inboundConnectionAccepter.js +2 -2
- package/opensearch/outboundConnection.d.ts +2 -2
- package/opensearch/outboundConnection.js +2 -2
- package/opensearchingest/pipeline.d.ts +1 -1
- package/opensearchingest/pipeline.js +1 -1
- package/package.json +2 -2
- package/quicksight/dataSource.d.ts +1 -1
- package/quicksight/dataSource.js +1 -1
- package/rbin/rule.d.ts +52 -17
- package/rbin/rule.js +26 -1
- package/rbin/rule.js.map +1 -1
- package/route53/getTrafficPolicyDocument.d.ts +4 -4
- package/route53/getTrafficPolicyDocument.js +4 -4
- package/route53/profilesResourceAssociation.d.ts +1 -1
- package/s3/bucket.d.ts +5 -4
- package/s3/bucketPolicy.d.ts +2 -0
- package/s3/bucketPolicy.js +2 -0
- package/s3/bucketPolicy.js.map +1 -1
- package/s3/directoryBucket.d.ts +30 -0
- package/s3/directoryBucket.js +4 -0
- package/s3/directoryBucket.js.map +1 -1
- package/s3tables/table.d.ts +62 -0
- package/s3tables/table.js +49 -0
- package/s3tables/table.js.map +1 -1
- package/sagemaker/flowDefinition.d.ts +1 -1
- package/sagemaker/flowDefinition.js +1 -1
- package/securityhub/productSubscription.d.ts +1 -1
- package/securityhub/productSubscription.js +1 -1
- package/securityhub/standardsSubscription.d.ts +1 -1
- package/securityhub/standardsSubscription.js +1 -1
- package/serverlessrepository/cloudFormationStack.d.ts +1 -1
- package/serverlessrepository/cloudFormationStack.js +1 -1
- package/shield/drtAccessLogBucketAssociation.d.ts +1 -1
- package/shield/drtAccessLogBucketAssociation.js +1 -1
- package/shield/protection.d.ts +1 -1
- package/shield/protection.js +1 -1
- package/shield/protectionGroup.d.ts +2 -2
- package/shield/protectionGroup.js +2 -2
- package/shield/protectionHealthCheckAssociation.d.ts +1 -1
- package/shield/protectionHealthCheckAssociation.js +1 -1
- package/ssm/parameter.d.ts +1 -1
- package/ssm/quicksetupConfigurationManager.d.ts +2 -2
- package/ssm/quicksetupConfigurationManager.js +2 -2
- package/ssoadmin/applicationAccessScope.d.ts +1 -1
- package/ssoadmin/applicationAccessScope.js +1 -1
- package/ssoadmin/applicationAssignment.d.ts +2 -2
- package/ssoadmin/applicationAssignment.js +2 -2
- package/ssoadmin/applicationAssignmentConfiguration.d.ts +1 -1
- package/ssoadmin/applicationAssignmentConfiguration.js +1 -1
- package/ssoadmin/getApplicationAssignments.d.ts +2 -2
- package/ssoadmin/getApplicationAssignments.js +2 -2
- package/types/input.d.ts +217 -26
- package/types/input.js.map +1 -1
- package/types/output.d.ts +209 -25
- package/types/output.js.map +1 -1
|
@@ -17,7 +17,7 @@ const utilities = require("../utilities");
|
|
|
17
17
|
* import * as aws from "@pulumi/aws";
|
|
18
18
|
*
|
|
19
19
|
* const example = aws.ssoadmin.getApplicationAssignments({
|
|
20
|
-
* applicationArn: exampleAwsSsoadminApplication.
|
|
20
|
+
* applicationArn: exampleAwsSsoadminApplication.arn,
|
|
21
21
|
* });
|
|
22
22
|
* ```
|
|
23
23
|
*/
|
|
@@ -41,7 +41,7 @@ exports.getApplicationAssignments = getApplicationAssignments;
|
|
|
41
41
|
* import * as aws from "@pulumi/aws";
|
|
42
42
|
*
|
|
43
43
|
* const example = aws.ssoadmin.getApplicationAssignments({
|
|
44
|
-
* applicationArn: exampleAwsSsoadminApplication.
|
|
44
|
+
* applicationArn: exampleAwsSsoadminApplication.arn,
|
|
45
45
|
* });
|
|
46
46
|
* ```
|
|
47
47
|
*/
|
package/types/input.d.ts
CHANGED
|
@@ -1336,33 +1336,63 @@ export interface ProviderIgnoreTags {
|
|
|
1336
1336
|
export declare namespace accessanalyzer {
|
|
1337
1337
|
interface AnalyzerConfiguration {
|
|
1338
1338
|
/**
|
|
1339
|
-
*
|
|
1339
|
+
* Specifies the configuration of an internal access analyzer for an AWS organization or account. This configuration determines how the analyzer evaluates access within your AWS environment. See `internalAccess` Block for details.
|
|
1340
|
+
*/
|
|
1341
|
+
internalAccess?: pulumi.Input<inputs.accessanalyzer.AnalyzerConfigurationInternalAccess>;
|
|
1342
|
+
/**
|
|
1343
|
+
* Specifies the configuration of an unused access analyzer for an AWS organization or account. See `unusedAccess` Block for details.
|
|
1340
1344
|
*/
|
|
1341
1345
|
unusedAccess?: pulumi.Input<inputs.accessanalyzer.AnalyzerConfigurationUnusedAccess>;
|
|
1342
1346
|
}
|
|
1347
|
+
interface AnalyzerConfigurationInternalAccess {
|
|
1348
|
+
/**
|
|
1349
|
+
* Information about analysis rules for the internal access analyzer. These rules determine which resources and access patterns will be analyzed. See `analysisRule` Block for Internal Access Analyzer for details.
|
|
1350
|
+
*/
|
|
1351
|
+
analysisRule?: pulumi.Input<inputs.accessanalyzer.AnalyzerConfigurationInternalAccessAnalysisRule>;
|
|
1352
|
+
}
|
|
1353
|
+
interface AnalyzerConfigurationInternalAccessAnalysisRule {
|
|
1354
|
+
/**
|
|
1355
|
+
* List of rules for the internal access analyzer containing criteria to include in analysis. Only resources that meet the rule criteria will generate findings. See `inclusion` Block for details.
|
|
1356
|
+
*/
|
|
1357
|
+
inclusions?: pulumi.Input<pulumi.Input<inputs.accessanalyzer.AnalyzerConfigurationInternalAccessAnalysisRuleInclusion>[]>;
|
|
1358
|
+
}
|
|
1359
|
+
interface AnalyzerConfigurationInternalAccessAnalysisRuleInclusion {
|
|
1360
|
+
/**
|
|
1361
|
+
* List of AWS account IDs to apply to the internal access analysis rule criteria. Account IDs can only be applied to the analysis rule criteria for organization-level analyzers.
|
|
1362
|
+
*/
|
|
1363
|
+
accountIds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
1364
|
+
/**
|
|
1365
|
+
* List of resource ARNs to apply to the internal access analysis rule criteria. The analyzer will only generate findings for resources that match these ARNs.
|
|
1366
|
+
*/
|
|
1367
|
+
resourceArns?: pulumi.Input<pulumi.Input<string>[]>;
|
|
1368
|
+
/**
|
|
1369
|
+
* List of resource types to apply to the internal access analysis rule criteria. The analyzer will only generate findings for resources of these types. Refer to [InternalAccessAnalysisRuleCriteria](https://docs.aws.amazon.com/access-analyzer/latest/APIReference/API_InternalAccessAnalysisRuleCriteria.html) in the AWS IAM Access Analyzer API Reference for valid values.
|
|
1370
|
+
*/
|
|
1371
|
+
resourceTypes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
1372
|
+
}
|
|
1343
1373
|
interface AnalyzerConfigurationUnusedAccess {
|
|
1344
1374
|
/**
|
|
1345
|
-
*
|
|
1375
|
+
* Information about analysis rules for the analyzer. Analysis rules determine which entities will generate findings based on the criteria you define when you create the rule. See `analysisRule` Block for Unused Access Analyzer for details.
|
|
1346
1376
|
*/
|
|
1347
1377
|
analysisRule?: pulumi.Input<inputs.accessanalyzer.AnalyzerConfigurationUnusedAccessAnalysisRule>;
|
|
1348
1378
|
/**
|
|
1349
|
-
*
|
|
1379
|
+
* Specified access age in days for which to generate findings for unused access.
|
|
1350
1380
|
*/
|
|
1351
1381
|
unusedAccessAge?: pulumi.Input<number>;
|
|
1352
1382
|
}
|
|
1353
1383
|
interface AnalyzerConfigurationUnusedAccessAnalysisRule {
|
|
1354
1384
|
/**
|
|
1355
|
-
*
|
|
1385
|
+
* List of rules for the analyzer containing criteria to exclude from analysis. Entities that meet the rule criteria will not generate findings. See `exclusion` Block for details.
|
|
1356
1386
|
*/
|
|
1357
1387
|
exclusions?: pulumi.Input<pulumi.Input<inputs.accessanalyzer.AnalyzerConfigurationUnusedAccessAnalysisRuleExclusion>[]>;
|
|
1358
1388
|
}
|
|
1359
1389
|
interface AnalyzerConfigurationUnusedAccessAnalysisRuleExclusion {
|
|
1360
1390
|
/**
|
|
1361
|
-
*
|
|
1391
|
+
* List of AWS account IDs to apply to the analysis rule criteria. The accounts cannot include the organization analyzer owner account. Account IDs can only be applied to the analysis rule criteria for organization-level analyzers.
|
|
1362
1392
|
*/
|
|
1363
1393
|
accountIds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
1364
1394
|
/**
|
|
1365
|
-
*
|
|
1395
|
+
* List of key-value pairs for resource tags to exclude from the analysis.
|
|
1366
1396
|
*/
|
|
1367
1397
|
resourceTags?: pulumi.Input<pulumi.Input<{
|
|
1368
1398
|
[key: string]: pulumi.Input<string>;
|
|
@@ -2222,6 +2252,42 @@ export declare namespace alb {
|
|
|
2222
2252
|
}
|
|
2223
2253
|
}
|
|
2224
2254
|
export declare namespace amp {
|
|
2255
|
+
interface QueryLoggingConfigurationDestination {
|
|
2256
|
+
/**
|
|
2257
|
+
* Configuration block for CloudWatch Logs destination. See `cloudwatchLogs`.
|
|
2258
|
+
*/
|
|
2259
|
+
cloudwatchLogs?: pulumi.Input<inputs.amp.QueryLoggingConfigurationDestinationCloudwatchLogs>;
|
|
2260
|
+
/**
|
|
2261
|
+
* A list of filter configurations that specify which logs should be sent to the destination. See `filters`.
|
|
2262
|
+
*/
|
|
2263
|
+
filters?: pulumi.Input<inputs.amp.QueryLoggingConfigurationDestinationFilters>;
|
|
2264
|
+
}
|
|
2265
|
+
interface QueryLoggingConfigurationDestinationCloudwatchLogs {
|
|
2266
|
+
/**
|
|
2267
|
+
* The ARN of the CloudWatch log group to which query logs will be sent.
|
|
2268
|
+
*/
|
|
2269
|
+
logGroupArn: pulumi.Input<string>;
|
|
2270
|
+
}
|
|
2271
|
+
interface QueryLoggingConfigurationDestinationFilters {
|
|
2272
|
+
/**
|
|
2273
|
+
* The Query Samples Processed (QSP) threshold above which queries will be logged. Queries processing more samples than this threshold will be captured in logs.
|
|
2274
|
+
*/
|
|
2275
|
+
qspThreshold: pulumi.Input<number>;
|
|
2276
|
+
}
|
|
2277
|
+
interface QueryLoggingConfigurationTimeouts {
|
|
2278
|
+
/**
|
|
2279
|
+
* A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as "30s" or "2h45m". Valid time units are "s" (seconds), "m" (minutes), "h" (hours).
|
|
2280
|
+
*/
|
|
2281
|
+
create?: pulumi.Input<string>;
|
|
2282
|
+
/**
|
|
2283
|
+
* A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as "30s" or "2h45m". Valid time units are "s" (seconds), "m" (minutes), "h" (hours). Setting a timeout for a Delete operation is only applicable if changes are saved into state before the destroy operation occurs.
|
|
2284
|
+
*/
|
|
2285
|
+
delete?: pulumi.Input<string>;
|
|
2286
|
+
/**
|
|
2287
|
+
* A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as "30s" or "2h45m". Valid time units are "s" (seconds), "m" (minutes), "h" (hours).
|
|
2288
|
+
*/
|
|
2289
|
+
update?: pulumi.Input<string>;
|
|
2290
|
+
}
|
|
2225
2291
|
interface ScraperDestination {
|
|
2226
2292
|
/**
|
|
2227
2293
|
* Configuration block for an Amazon Managed Prometheus workspace destination. See `amp`.
|
|
@@ -2379,6 +2445,12 @@ export declare namespace amplify {
|
|
|
2379
2445
|
*/
|
|
2380
2446
|
target: pulumi.Input<string>;
|
|
2381
2447
|
}
|
|
2448
|
+
interface AppJobConfig {
|
|
2449
|
+
/**
|
|
2450
|
+
* Size of the build instance. Valid values: `STANDARD_8GB`, `LARGE_16GB`, and `XLARGE_72GB`. Default: `STANDARD_8GB`.
|
|
2451
|
+
*/
|
|
2452
|
+
buildComputeType?: pulumi.Input<string>;
|
|
2453
|
+
}
|
|
2382
2454
|
interface AppProductionBranch {
|
|
2383
2455
|
/**
|
|
2384
2456
|
* Branch name for the production branch.
|
|
@@ -14481,6 +14553,10 @@ export declare namespace codebuild {
|
|
|
14481
14553
|
* the [CodeBuild User Guide](https://docs.aws.amazon.com/codebuild/latest/userguide/build-env-ref-compute-types.html).
|
|
14482
14554
|
*/
|
|
14483
14555
|
computeType: pulumi.Input<string>;
|
|
14556
|
+
/**
|
|
14557
|
+
* Configuration block. Detailed below.
|
|
14558
|
+
*/
|
|
14559
|
+
dockerServer?: pulumi.Input<inputs.codebuild.ProjectEnvironmentDockerServer>;
|
|
14484
14560
|
/**
|
|
14485
14561
|
* Configuration block. Detailed below.
|
|
14486
14562
|
*/
|
|
@@ -14520,6 +14596,16 @@ export declare namespace codebuild {
|
|
|
14520
14596
|
*/
|
|
14521
14597
|
type: pulumi.Input<string>;
|
|
14522
14598
|
}
|
|
14599
|
+
interface ProjectEnvironmentDockerServer {
|
|
14600
|
+
/**
|
|
14601
|
+
* Compute type for the Docker server. Valid values: `BUILD_GENERAL1_SMALL`, `BUILD_GENERAL1_MEDIUM`, `BUILD_GENERAL1_LARGE`, `BUILD_GENERAL1_XLARGE`, and `BUILD_GENERAL1_2XLARGE`.
|
|
14602
|
+
*/
|
|
14603
|
+
computeType: pulumi.Input<string>;
|
|
14604
|
+
/**
|
|
14605
|
+
* List of security group IDs to assign to the Docker server.
|
|
14606
|
+
*/
|
|
14607
|
+
securityGroupIds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
14608
|
+
}
|
|
14523
14609
|
interface ProjectEnvironmentEnvironmentVariable {
|
|
14524
14610
|
/**
|
|
14525
14611
|
* Environment variable's name or key.
|
|
@@ -21014,6 +21100,10 @@ export declare namespace dynamodb {
|
|
|
21014
21100
|
* ARN of the table
|
|
21015
21101
|
*/
|
|
21016
21102
|
arn?: pulumi.Input<string>;
|
|
21103
|
+
/**
|
|
21104
|
+
* Whether this global table will be using `STRONG` consistency mode or `EVENTUAL` consistency mode. Default value is `EVENTUAL`.
|
|
21105
|
+
*/
|
|
21106
|
+
consistencyMode?: pulumi.Input<string>;
|
|
21017
21107
|
/**
|
|
21018
21108
|
* ARN of the CMK that should be used for the AWS KMS encryption.
|
|
21019
21109
|
* This argument should only be used if the key is different from the default KMS-managed DynamoDB key, `alias/aws/dynamodb`.
|
|
@@ -26638,7 +26728,7 @@ export declare namespace ecr {
|
|
|
26638
26728
|
/**
|
|
26639
26729
|
* A list of image tag prefixes on which to take action.
|
|
26640
26730
|
*/
|
|
26641
|
-
tagPrefixList?: pulumi.Input<
|
|
26731
|
+
tagPrefixList?: pulumi.Input<pulumi.Input<string>[]>;
|
|
26642
26732
|
/**
|
|
26643
26733
|
* The tag status of the image. Either 'tagged', 'untagged', or 'any'.
|
|
26644
26734
|
*/
|
|
@@ -53770,25 +53860,23 @@ export declare namespace lightsail {
|
|
|
53770
53860
|
*/
|
|
53771
53861
|
cidrListAliases?: pulumi.Input<pulumi.Input<string>[]>;
|
|
53772
53862
|
/**
|
|
53773
|
-
* Set of CIDR
|
|
53863
|
+
* Set of IPv4 addresses or ranges of IPv4 addresses (in CIDR notation) that are allowed to connect to an instance through the ports, and the protocol.
|
|
53774
53864
|
*/
|
|
53775
53865
|
cidrs?: pulumi.Input<pulumi.Input<string>[]>;
|
|
53776
53866
|
/**
|
|
53777
|
-
* First port in a range of open ports on an instance.
|
|
53867
|
+
* First port in a range of open ports on an instance. See [PortInfo](https://docs.aws.amazon.com/lightsail/2016-11-28/api-reference/API_PortInfo.html) for details.
|
|
53778
53868
|
*/
|
|
53779
53869
|
fromPort: pulumi.Input<number>;
|
|
53780
53870
|
/**
|
|
53781
|
-
* Set of IPv6 CIDR
|
|
53871
|
+
* Set of IPv6 addresses or ranges of IPv6 addresses (in CIDR notation) that are allowed to connect to an instance through the ports, and the protocol.
|
|
53782
53872
|
*/
|
|
53783
53873
|
ipv6Cidrs?: pulumi.Input<pulumi.Input<string>[]>;
|
|
53784
53874
|
/**
|
|
53785
|
-
* IP protocol name. Valid values: `tcp`, `all`, `udp`, `icmp`.
|
|
53875
|
+
* IP protocol name. Valid values: `tcp`, `all`, `udp`, `icmp`, `icmpv6`. See [PortInfo](https://docs.aws.amazon.com/lightsail/2016-11-28/api-reference/API_PortInfo.html) for details.
|
|
53786
53876
|
*/
|
|
53787
53877
|
protocol: pulumi.Input<string>;
|
|
53788
53878
|
/**
|
|
53789
|
-
* Last port in a range of open ports on an instance.
|
|
53790
|
-
*
|
|
53791
|
-
* The following arguments are optional:
|
|
53879
|
+
* Last port in a range of open ports on an instance. See [PortInfo](https://docs.aws.amazon.com/lightsail/2016-11-28/api-reference/API_PortInfo.html) for details.
|
|
53792
53880
|
*/
|
|
53793
53881
|
toPort: pulumi.Input<number>;
|
|
53794
53882
|
}
|
|
@@ -57791,6 +57879,12 @@ export declare namespace networkfirewall {
|
|
|
57791
57879
|
tcpIdleTimeoutSeconds?: pulumi.Input<number>;
|
|
57792
57880
|
}
|
|
57793
57881
|
interface FirewallPolicyFirewallPolicyStatefulRuleGroupReference {
|
|
57882
|
+
/**
|
|
57883
|
+
* Whether to enable deep threat inspection, which allows AWS to analyze service logs of network traffic processed by these rule groups to identify threat indicators across customers. AWS will use these threat indicators to improve the active threat defense managed rule groups and protect the security of AWS customers and services. This only applies to active threat defense maanaged rule groups.
|
|
57884
|
+
*
|
|
57885
|
+
* For details, refer to [AWS active threat defense for AWS Network Firewall](https://docs.aws.amazon.com/network-firewall/latest/developerguide/aws-managed-rule-groups-atd.html) in the AWS Network Firewall Developer Guide.
|
|
57886
|
+
*/
|
|
57887
|
+
deepThreatInspection?: pulumi.Input<string>;
|
|
57794
57888
|
/**
|
|
57795
57889
|
* Configuration block for override values
|
|
57796
57890
|
*/
|
|
@@ -58578,6 +58672,10 @@ export declare namespace networkmanager {
|
|
|
58578
58672
|
* List of strings containing Autonomous System Numbers (ASNs) to assign to Core Network Edges. By default, the core network automatically assigns an ASN for each Core Network Edge but you can optionally define the ASN in the edge-locations for each Region. The ASN uses an array of integer ranges only from `64512` to `65534` and `4200000000` to `4294967294` expressed as a string like `"64512-65534"`. No other ASN ranges can be used.
|
|
58579
58673
|
*/
|
|
58580
58674
|
asnRanges: string[];
|
|
58675
|
+
/**
|
|
58676
|
+
* Indicates whether DNS resolution is enabled for the core network. The value can be either `true` or `false`. When set to `true`, DNS resolution is enabled for VPCs attached to the core network, allowing resources in different VPCs to resolve each other's domain names. The default is `true`.
|
|
58677
|
+
*/
|
|
58678
|
+
dnsSupport?: boolean;
|
|
58581
58679
|
/**
|
|
58582
58680
|
* A block value of AWS Region locations where you're creating Core Network Edges. Detailed below.
|
|
58583
58681
|
*/
|
|
@@ -58586,6 +58684,10 @@ export declare namespace networkmanager {
|
|
|
58586
58684
|
* The Classless Inter-Domain Routing (CIDR) block range used to create tunnels for AWS Transit Gateway Connect. The format is standard AWS CIDR range (for example, `10.0.1.0/24`). You can optionally define the inside CIDR in the Core Network Edges section per Region. The minimum is a `/24` for IPv4 or `/64` for IPv6. You can provide multiple `/24` subnets or a larger CIDR range. If you define a larger CIDR range, new Core Network Edges will be automatically assigned `/24` and `/64` subnets from the larger CIDR. an Inside CIDR block is required for attaching Connect attachments to a Core Network Edge.
|
|
58587
58685
|
*/
|
|
58588
58686
|
insideCidrBlocks?: string[];
|
|
58687
|
+
/**
|
|
58688
|
+
* — (Optional) Indicates whether security group referencing is enabled for the core network. The value can be either `true` or `false`. When set to `true`, security groups in one VPC can reference security groups in another VPC attached to the core network, enabling more flexible security configurations across your network. The default is `false`.
|
|
58689
|
+
*/
|
|
58690
|
+
securityGroupReferencingSupport?: boolean;
|
|
58589
58691
|
/**
|
|
58590
58692
|
* Indicates whether the core network forwards traffic over multiple equal-cost routes using VPN. The value can be either `true` or `false`. The default is `true`.
|
|
58591
58693
|
*/
|
|
@@ -58596,6 +58698,10 @@ export declare namespace networkmanager {
|
|
|
58596
58698
|
* List of strings containing Autonomous System Numbers (ASNs) to assign to Core Network Edges. By default, the core network automatically assigns an ASN for each Core Network Edge but you can optionally define the ASN in the edge-locations for each Region. The ASN uses an array of integer ranges only from `64512` to `65534` and `4200000000` to `4294967294` expressed as a string like `"64512-65534"`. No other ASN ranges can be used.
|
|
58597
58699
|
*/
|
|
58598
58700
|
asnRanges: pulumi.Input<pulumi.Input<string>[]>;
|
|
58701
|
+
/**
|
|
58702
|
+
* Indicates whether DNS resolution is enabled for the core network. The value can be either `true` or `false`. When set to `true`, DNS resolution is enabled for VPCs attached to the core network, allowing resources in different VPCs to resolve each other's domain names. The default is `true`.
|
|
58703
|
+
*/
|
|
58704
|
+
dnsSupport?: pulumi.Input<boolean>;
|
|
58599
58705
|
/**
|
|
58600
58706
|
* A block value of AWS Region locations where you're creating Core Network Edges. Detailed below.
|
|
58601
58707
|
*/
|
|
@@ -58604,6 +58710,10 @@ export declare namespace networkmanager {
|
|
|
58604
58710
|
* The Classless Inter-Domain Routing (CIDR) block range used to create tunnels for AWS Transit Gateway Connect. The format is standard AWS CIDR range (for example, `10.0.1.0/24`). You can optionally define the inside CIDR in the Core Network Edges section per Region. The minimum is a `/24` for IPv4 or `/64` for IPv6. You can provide multiple `/24` subnets or a larger CIDR range. If you define a larger CIDR range, new Core Network Edges will be automatically assigned `/24` and `/64` subnets from the larger CIDR. an Inside CIDR block is required for attaching Connect attachments to a Core Network Edge.
|
|
58605
58711
|
*/
|
|
58606
58712
|
insideCidrBlocks?: pulumi.Input<pulumi.Input<string>[]>;
|
|
58713
|
+
/**
|
|
58714
|
+
* — (Optional) Indicates whether security group referencing is enabled for the core network. The value can be either `true` or `false`. When set to `true`, security groups in one VPC can reference security groups in another VPC attached to the core network, enabling more flexible security configurations across your network. The default is `false`.
|
|
58715
|
+
*/
|
|
58716
|
+
securityGroupReferencingSupport?: pulumi.Input<boolean>;
|
|
58607
58717
|
/**
|
|
58608
58718
|
* Indicates whether the core network forwards traffic over multiple equal-cost routes using VPN. The value can be either `true` or `false`. The default is `true`.
|
|
58609
58719
|
*/
|
|
@@ -62227,6 +62337,18 @@ export declare namespace ram {
|
|
|
62227
62337
|
}
|
|
62228
62338
|
}
|
|
62229
62339
|
export declare namespace rbin {
|
|
62340
|
+
interface RuleExcludeResourceTag {
|
|
62341
|
+
/**
|
|
62342
|
+
* Tag key.
|
|
62343
|
+
*
|
|
62344
|
+
* The following argument is optional:
|
|
62345
|
+
*/
|
|
62346
|
+
resourceTagKey: pulumi.Input<string>;
|
|
62347
|
+
/**
|
|
62348
|
+
* Tag value.
|
|
62349
|
+
*/
|
|
62350
|
+
resourceTagValue?: pulumi.Input<string>;
|
|
62351
|
+
}
|
|
62230
62352
|
interface RuleLockConfiguration {
|
|
62231
62353
|
/**
|
|
62232
62354
|
* Information about the retention rule unlock delay. See `unlockDelay` below.
|
|
@@ -62235,33 +62357,33 @@ export declare namespace rbin {
|
|
|
62235
62357
|
}
|
|
62236
62358
|
interface RuleLockConfigurationUnlockDelay {
|
|
62237
62359
|
/**
|
|
62238
|
-
*
|
|
62360
|
+
* Unit of time in which to measure the unlock delay. Currently, the unlock delay can be measure only in days.
|
|
62239
62361
|
*/
|
|
62240
62362
|
unlockDelayUnit: pulumi.Input<string>;
|
|
62241
62363
|
/**
|
|
62242
|
-
*
|
|
62364
|
+
* Unlock delay period, measured in the unit specified for UnlockDelayUnit.
|
|
62243
62365
|
*/
|
|
62244
62366
|
unlockDelayValue: pulumi.Input<number>;
|
|
62245
62367
|
}
|
|
62246
62368
|
interface RuleResourceTag {
|
|
62247
62369
|
/**
|
|
62248
|
-
*
|
|
62370
|
+
* Tag key.
|
|
62249
62371
|
*
|
|
62250
62372
|
* The following argument is optional:
|
|
62251
62373
|
*/
|
|
62252
62374
|
resourceTagKey: pulumi.Input<string>;
|
|
62253
62375
|
/**
|
|
62254
|
-
*
|
|
62376
|
+
* Tag value.
|
|
62255
62377
|
*/
|
|
62256
62378
|
resourceTagValue?: pulumi.Input<string>;
|
|
62257
62379
|
}
|
|
62258
62380
|
interface RuleRetentionPeriod {
|
|
62259
62381
|
/**
|
|
62260
|
-
*
|
|
62382
|
+
* Unit of time in which the retention period is measured. Currently, only DAYS is supported.
|
|
62261
62383
|
*/
|
|
62262
62384
|
retentionPeriodUnit: pulumi.Input<string>;
|
|
62263
62385
|
/**
|
|
62264
|
-
*
|
|
62386
|
+
* Period value for which the retention rule is to retain resources. The period is measured using the unit specified for RetentionPeriodUnit.
|
|
62265
62387
|
*/
|
|
62266
62388
|
retentionPeriodValue: pulumi.Input<number>;
|
|
62267
62389
|
}
|
|
@@ -67132,6 +67254,41 @@ export declare namespace s3tables {
|
|
|
67132
67254
|
*/
|
|
67133
67255
|
minSnapshotsToKeep: pulumi.Input<number>;
|
|
67134
67256
|
}
|
|
67257
|
+
interface TableMetadata {
|
|
67258
|
+
/**
|
|
67259
|
+
* Contains details about the metadata for an Iceberg table. This block defines the schema structure for the Apache Iceberg table format.
|
|
67260
|
+
* See `iceberg` below.
|
|
67261
|
+
*/
|
|
67262
|
+
iceberg: pulumi.Input<inputs.s3tables.TableMetadataIceberg>;
|
|
67263
|
+
}
|
|
67264
|
+
interface TableMetadataIceberg {
|
|
67265
|
+
/**
|
|
67266
|
+
* Schema configuration for the Iceberg table.
|
|
67267
|
+
* See `schema` below.
|
|
67268
|
+
*/
|
|
67269
|
+
schema: pulumi.Input<inputs.s3tables.TableMetadataIcebergSchema>;
|
|
67270
|
+
}
|
|
67271
|
+
interface TableMetadataIcebergSchema {
|
|
67272
|
+
/**
|
|
67273
|
+
* List of schema fields for the Iceberg table. Each field defines a column in the table schema.
|
|
67274
|
+
* See `field` below.
|
|
67275
|
+
*/
|
|
67276
|
+
fields?: pulumi.Input<pulumi.Input<inputs.s3tables.TableMetadataIcebergSchemaField>[]>;
|
|
67277
|
+
}
|
|
67278
|
+
interface TableMetadataIcebergSchemaField {
|
|
67279
|
+
/**
|
|
67280
|
+
* The name of the field.
|
|
67281
|
+
*/
|
|
67282
|
+
name: pulumi.Input<string>;
|
|
67283
|
+
/**
|
|
67284
|
+
* A Boolean value that specifies whether values are required for each row in this field. Defaults to `false`.
|
|
67285
|
+
*/
|
|
67286
|
+
required?: pulumi.Input<boolean>;
|
|
67287
|
+
/**
|
|
67288
|
+
* The field type. S3 Tables supports all Apache Iceberg primitive types including: `boolean`, `int`, `long`, `float`, `double`, `decimal(precision,scale)`, `date`, `time`, `timestamp`, `timestamptz`, `string`, `uuid`, `fixed(length)`, `binary`.
|
|
67289
|
+
*/
|
|
67290
|
+
type: pulumi.Input<string>;
|
|
67291
|
+
}
|
|
67135
67292
|
}
|
|
67136
67293
|
export declare namespace sagemaker {
|
|
67137
67294
|
interface AppImageConfigCodeEditorAppImageConfig {
|
|
@@ -80920,6 +81077,10 @@ export declare namespace wafv2 {
|
|
|
80920
81077
|
* Additional configuration for using the Account Creation Fraud Prevention managed rule group. Use this to specify information such as the registration page of your application and the type of content to accept or reject from the client.
|
|
80921
81078
|
*/
|
|
80922
81079
|
awsManagedRulesAcfpRuleSet?: pulumi.Input<inputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAcfpRuleSet>;
|
|
81080
|
+
/**
|
|
81081
|
+
* Configuration for using the anti-DDoS managed rule group. See `awsManagedRulesAntiDdosRuleSet` for more details.
|
|
81082
|
+
*/
|
|
81083
|
+
awsManagedRulesAntiDdosRuleSet?: pulumi.Input<inputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSet>;
|
|
80923
81084
|
/**
|
|
80924
81085
|
* Additional configuration for using the Account Takeover Protection managed rule group. Use this to specify information such as the sign-in page of your application and the type of content to accept or reject from the client.
|
|
80925
81086
|
*/
|
|
@@ -81089,6 +81250,42 @@ export declare namespace wafv2 {
|
|
|
81089
81250
|
*/
|
|
81090
81251
|
successCodes: pulumi.Input<pulumi.Input<number>[]>;
|
|
81091
81252
|
}
|
|
81253
|
+
interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSet {
|
|
81254
|
+
/**
|
|
81255
|
+
* Configuration for the request handling that's applied by the managed rule group rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` during a distributed denial of service (DDoS) attack. See `clientSideActionConfig` for more details.
|
|
81256
|
+
*/
|
|
81257
|
+
clientSideActionConfig: pulumi.Input<inputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfig>;
|
|
81258
|
+
/**
|
|
81259
|
+
* Sensitivity that the rule group rule DDoSRequests uses when matching against the DDoS suspicion labeling on a request. Valid values are `LOW` (Default), `MEDIUM`, and `HIGH`.
|
|
81260
|
+
*/
|
|
81261
|
+
sensitivityToBlock?: pulumi.Input<string>;
|
|
81262
|
+
}
|
|
81263
|
+
interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfig {
|
|
81264
|
+
/**
|
|
81265
|
+
* Configuration for the use of the `AWSManagedRulesAntiDDoSRuleSet` rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests`.
|
|
81266
|
+
*/
|
|
81267
|
+
challenge: pulumi.Input<inputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfigChallenge>;
|
|
81268
|
+
}
|
|
81269
|
+
interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfigChallenge {
|
|
81270
|
+
/**
|
|
81271
|
+
* Block for the list of the regular expressions to match against the web request URI, used to identify requests that can't handle a silent browser challenge.
|
|
81272
|
+
*/
|
|
81273
|
+
exemptUriRegularExpressions?: pulumi.Input<pulumi.Input<inputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfigChallengeExemptUriRegularExpression>[]>;
|
|
81274
|
+
/**
|
|
81275
|
+
* Sensitivity that the rule group rule ChallengeDDoSRequests uses when matching against the DDoS suspicion labeling on a request. Valid values are `LOW`, `MEDIUM` and `HIGH` (Default).
|
|
81276
|
+
*/
|
|
81277
|
+
sensitivity?: pulumi.Input<string>;
|
|
81278
|
+
/**
|
|
81279
|
+
* Configuration whether to use the `AWSManagedRulesAntiDDoSRuleSet` rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` in the rule group evaluation. Valid values are `ENABLED` and `DISABLED`.
|
|
81280
|
+
*/
|
|
81281
|
+
usageOfAction: pulumi.Input<string>;
|
|
81282
|
+
}
|
|
81283
|
+
interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfigChallengeExemptUriRegularExpression {
|
|
81284
|
+
/**
|
|
81285
|
+
* Regular expression string.
|
|
81286
|
+
*/
|
|
81287
|
+
regexString?: pulumi.Input<string>;
|
|
81288
|
+
}
|
|
81092
81289
|
interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAtpRuleSet {
|
|
81093
81290
|
/**
|
|
81094
81291
|
* Whether or not to allow the use of regular expressions in the login page path.
|
|
@@ -81238,9 +81435,6 @@ export declare namespace wafv2 {
|
|
|
81238
81435
|
* Instructs AWS WAF to run a Captcha check against the web request. See `captcha` below for details.
|
|
81239
81436
|
*/
|
|
81240
81437
|
captcha?: pulumi.Input<inputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementRuleActionOverrideActionToUseCaptcha>;
|
|
81241
|
-
/**
|
|
81242
|
-
* Instructs AWS WAF to run a check against the request to verify that the request is coming from a legitimate client session. See `challenge` below for details.
|
|
81243
|
-
*/
|
|
81244
81438
|
challenge?: pulumi.Input<inputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementRuleActionOverrideActionToUseChallenge>;
|
|
81245
81439
|
count?: pulumi.Input<inputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementRuleActionOverrideActionToUseCount>;
|
|
81246
81440
|
}
|
|
@@ -84883,9 +85077,6 @@ export declare namespace wafv2 {
|
|
|
84883
85077
|
* Instructs AWS WAF to run a Captcha check against the web request. See `captcha` below for details.
|
|
84884
85078
|
*/
|
|
84885
85079
|
captcha?: pulumi.Input<inputs.wafv2.WebAclRuleStatementRuleGroupReferenceStatementRuleActionOverrideActionToUseCaptcha>;
|
|
84886
|
-
/**
|
|
84887
|
-
* Instructs AWS WAF to run a check against the request to verify that the request is coming from a legitimate client session. See `challenge` below for details.
|
|
84888
|
-
*/
|
|
84889
85080
|
challenge?: pulumi.Input<inputs.wafv2.WebAclRuleStatementRuleGroupReferenceStatementRuleActionOverrideActionToUseChallenge>;
|
|
84890
85081
|
count?: pulumi.Input<inputs.wafv2.WebAclRuleStatementRuleGroupReferenceStatementRuleActionOverrideActionToUseCount>;
|
|
84891
85082
|
}
|
package/types/input.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"input.js","sourceRoot":"","sources":["../../types/input.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;
|
|
1
|
+
{"version":3,"file":"input.js","sourceRoot":"","sources":["../../types/input.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAsvsBjF,IAAiB,GAAG,CAqhKnB;AArhKD,WAAiB,GAAG;IAgmIhB;;OAEG;IACH,SAAgB,kCAAkC,CAAC,GAAwB;;QACvE,uCACO,GAAG,KACN,WAAW,EAAE,MAAA,CAAC,GAAG,CAAC,WAAW,CAAC,mCAAI,EAAE,IACtC;IACN,CAAC;IALe,sCAAkC,qCAKjD,CAAA;IA4CD;;OAEG;IACH,SAAgB,mCAAmC,CAAC,GAAyB;;QACzE,uCACO,GAAG,KACN,WAAW,EAAE,MAAA,CAAC,GAAG,CAAC,WAAW,CAAC,mCAAI,EAAE,IACtC;IACN,CAAC;IALe,uCAAmC,sCAKlD,CAAA;AAy3BL,CAAC,EArhKgB,GAAG,GAAH,WAAG,KAAH,WAAG,QAqhKnB;AAojsCD,IAAiB,GAAG,CAwcnB;AAxcD,WAAiB,GAAG;IAyXhB;;OAEG;IACH,SAAgB,sCAAsC,CAAC,GAA4B;;QAC/E,uCACO,GAAG,KACN,WAAW,EAAE,MAAA,CAAC,GAAG,CAAC,WAAW,CAAC,mCAAI,WAAW,IAC/C;IACN,CAAC;IALe,0CAAsC,yCAKrD,CAAA;AAuEL,CAAC,EAxcgB,GAAG,GAAH,WAAG,KAAH,WAAG,QAwcnB"}
|