@pulumi/aws 7.0.0-alpha.2 → 7.0.0-rc.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/accessanalyzer/analyzer.d.ts +54 -7
- package/accessanalyzer/analyzer.js +48 -1
- package/accessanalyzer/analyzer.js.map +1 -1
- package/amp/index.d.ts +3 -0
- package/amp/index.js +6 -1
- package/amp/index.js.map +1 -1
- package/amp/queryLoggingConfiguration.d.ts +107 -0
- package/amp/queryLoggingConfiguration.js +82 -0
- package/amp/queryLoggingConfiguration.js.map +1 -0
- package/amplify/app.d.ts +26 -0
- package/amplify/app.js +16 -0
- package/amplify/app.js.map +1 -1
- package/amplify/branch.d.ts +12 -0
- package/amplify/branch.js +2 -0
- package/amplify/branch.js.map +1 -1
- package/bedrock/agentAgent.d.ts +2 -2
- package/bedrock/agentAgent.js +2 -2
- package/bedrock/agentAgentCollaborator.d.ts +4 -4
- package/bedrock/agentAgentCollaborator.js +4 -4
- package/cloudfront/distribution.d.ts +12 -0
- package/cloudfront/distribution.js +2 -0
- package/cloudfront/distribution.js.map +1 -1
- package/cloudfront/getDistribution.d.ts +4 -0
- package/cloudfront/getDistribution.js.map +1 -1
- package/cloudtrail/trail.d.ts +2 -2
- package/cloudtrail/trail.js +2 -2
- package/cloudwatch/eventArchive.d.ts +91 -15
- package/cloudwatch/eventArchive.js +67 -1
- package/cloudwatch/eventArchive.js.map +1 -1
- package/cloudwatch/logGroup.d.ts +6 -6
- package/codeartifact/domainPermissions.d.ts +1 -1
- package/codeartifact/domainPermissions.js +0 -3
- package/codeartifact/domainPermissions.js.map +1 -1
- package/connect/botAssociation.d.ts +1 -1
- package/connect/botAssociation.js +1 -1
- package/controltower/controlTowerControl.d.ts +1 -1
- package/controltower/controlTowerControl.js +1 -1
- package/cur/reportDefinition.d.ts +3 -3
- package/datasync/agent.d.ts +1 -1
- package/datasync/agent.js +1 -1
- package/dynamodb/table.d.ts +36 -1
- package/dynamodb/table.js +36 -1
- package/dynamodb/table.js.map +1 -1
- package/dynamodb/tag.d.ts +1 -1
- package/dynamodb/tag.js +1 -1
- package/ec2/getManagedPrefixList.d.ts +2 -2
- package/ec2/getManagedPrefixList.js +2 -2
- package/ec2/securityGroupRule.d.ts +1 -1
- package/ec2/securityGroupRule.js +1 -1
- package/ec2/vpc.d.ts +2 -2
- package/ec2/vpc.js +2 -2
- package/ec2/vpcIpam.d.ts +1 -1
- package/ec2/vpcIpam.js +1 -1
- package/ec2/vpcIpamPool.d.ts +4 -4
- package/ec2/vpcIpamPool.js +4 -4
- package/ec2/vpcIpamPoolCidr.d.ts +3 -3
- package/ec2/vpcIpamPoolCidr.js +3 -3
- package/ec2/vpcIpamPoolCidrAllocation.d.ts +4 -4
- package/ec2/vpcIpamPoolCidrAllocation.js +4 -4
- package/ec2/vpcIpamPreviewNextCidr.d.ts +2 -2
- package/ec2/vpcIpamPreviewNextCidr.js +2 -2
- package/ec2/vpcIpamResourceDiscovery.d.ts +1 -1
- package/ec2/vpcIpamResourceDiscovery.js +1 -1
- package/ec2/vpcIpamScope.d.ts +1 -1
- package/ec2/vpcIpamScope.js +1 -1
- package/ecr/registryPolicy.d.ts +1 -1
- package/ecr/registryPolicy.js +1 -1
- package/eks/cluster.d.ts +2 -4
- package/eks/cluster.js +0 -2
- package/eks/cluster.js.map +1 -1
- package/eks/podIdentityAssociation.d.ts +32 -0
- package/eks/podIdentityAssociation.js +6 -0
- package/eks/podIdentityAssociation.js.map +1 -1
- package/elasticsearch/domain.d.ts +2 -2
- package/elasticsearch/domain.js +2 -2
- package/emr/cluster.d.ts +12 -0
- package/emr/cluster.js +2 -0
- package/emr/cluster.js.map +1 -1
- package/fms/policy.d.ts +12 -0
- package/fms/policy.js +2 -0
- package/fms/policy.js.map +1 -1
- package/getRegion.d.ts +2 -2
- package/getService.d.ts +2 -2
- package/getService.js +2 -2
- package/glue/job.d.ts +12 -0
- package/glue/job.js +2 -0
- package/glue/job.js.map +1 -1
- package/glue/resourcePolicy.d.ts +1 -1
- package/glue/resourcePolicy.js +1 -1
- package/guardduty/detectorFeature.d.ts +21 -0
- package/guardduty/detectorFeature.js +21 -0
- package/guardduty/detectorFeature.js.map +1 -1
- package/guardduty/memberDetectorFeature.d.ts +1 -11
- package/guardduty/memberDetectorFeature.js +1 -11
- package/guardduty/memberDetectorFeature.js.map +1 -1
- package/guardduty/publishingDestination.d.ts +2 -2
- package/guardduty/publishingDestination.js +2 -2
- package/iam/rolePolicy.d.ts +21 -15
- package/iam/rolePolicy.js.map +1 -1
- package/imagebuilder/imageRecipe.d.ts +1 -1
- package/imagebuilder/imageRecipe.js +1 -1
- package/kinesis/firehoseDeliveryStream.d.ts +1 -1
- package/kinesis/firehoseDeliveryStream.js +1 -1
- package/kinesis/getStreamConsumer.d.ts +9 -0
- package/kinesis/getStreamConsumer.js +2 -0
- package/kinesis/getStreamConsumer.js.map +1 -1
- package/kinesis/streamConsumer.d.ts +15 -0
- package/kinesis/streamConsumer.js +4 -0
- package/kinesis/streamConsumer.js.map +1 -1
- package/kms/getKey.d.ts +1 -1
- package/kms/key.d.ts +3 -3
- package/lightsail/instancePublicPorts.d.ts +6 -6
- package/macie/findingsFilter.d.ts +1 -1
- package/macie/findingsFilter.js +1 -1
- package/mediastore/containerPolicy.d.ts +1 -1
- package/mediastore/containerPolicy.js +1 -1
- package/networkfirewall/firewallPolicy.d.ts +51 -2
- package/networkfirewall/firewallPolicy.js +51 -2
- package/networkfirewall/firewallPolicy.js.map +1 -1
- package/networkmanager/dxGatewayAttachment.d.ts +1 -1
- package/networkmanager/dxGatewayAttachment.js +1 -1
- package/opensearch/domain.d.ts +2 -2
- package/opensearch/domain.js +2 -2
- package/opensearch/inboundConnectionAccepter.d.ts +2 -2
- package/opensearch/inboundConnectionAccepter.js +2 -2
- package/opensearch/outboundConnection.d.ts +2 -2
- package/opensearch/outboundConnection.js +2 -2
- package/opensearchingest/pipeline.d.ts +1 -1
- package/opensearchingest/pipeline.js +1 -1
- package/package.json +2 -2
- package/quicksight/dataSource.d.ts +1 -1
- package/quicksight/dataSource.js +1 -1
- package/rbin/rule.d.ts +52 -17
- package/rbin/rule.js +26 -1
- package/rbin/rule.js.map +1 -1
- package/route53/getTrafficPolicyDocument.d.ts +4 -4
- package/route53/getTrafficPolicyDocument.js +4 -4
- package/route53/profilesResourceAssociation.d.ts +1 -1
- package/s3/bucket.d.ts +5 -4
- package/s3/bucketPolicy.d.ts +2 -0
- package/s3/bucketPolicy.js +2 -0
- package/s3/bucketPolicy.js.map +1 -1
- package/s3/directoryBucket.d.ts +30 -0
- package/s3/directoryBucket.js +4 -0
- package/s3/directoryBucket.js.map +1 -1
- package/s3tables/table.d.ts +62 -0
- package/s3tables/table.js +49 -0
- package/s3tables/table.js.map +1 -1
- package/sagemaker/flowDefinition.d.ts +1 -1
- package/sagemaker/flowDefinition.js +1 -1
- package/securityhub/productSubscription.d.ts +1 -1
- package/securityhub/productSubscription.js +1 -1
- package/securityhub/standardsSubscription.d.ts +1 -1
- package/securityhub/standardsSubscription.js +1 -1
- package/serverlessrepository/cloudFormationStack.d.ts +1 -1
- package/serverlessrepository/cloudFormationStack.js +1 -1
- package/shield/drtAccessLogBucketAssociation.d.ts +1 -1
- package/shield/drtAccessLogBucketAssociation.js +1 -1
- package/shield/protection.d.ts +1 -1
- package/shield/protection.js +1 -1
- package/shield/protectionGroup.d.ts +2 -2
- package/shield/protectionGroup.js +2 -2
- package/shield/protectionHealthCheckAssociation.d.ts +1 -1
- package/shield/protectionHealthCheckAssociation.js +1 -1
- package/ssm/parameter.d.ts +1 -1
- package/ssm/quicksetupConfigurationManager.d.ts +2 -2
- package/ssm/quicksetupConfigurationManager.js +2 -2
- package/ssoadmin/applicationAccessScope.d.ts +1 -1
- package/ssoadmin/applicationAccessScope.js +1 -1
- package/ssoadmin/applicationAssignment.d.ts +2 -2
- package/ssoadmin/applicationAssignment.js +2 -2
- package/ssoadmin/applicationAssignmentConfiguration.d.ts +1 -1
- package/ssoadmin/applicationAssignmentConfiguration.js +1 -1
- package/ssoadmin/getApplicationAssignments.d.ts +2 -2
- package/ssoadmin/getApplicationAssignments.js +2 -2
- package/types/input.d.ts +217 -26
- package/types/input.js.map +1 -1
- package/types/output.d.ts +209 -25
- package/types/output.js.map +1 -1
package/types/output.d.ts
CHANGED
|
@@ -32,33 +32,63 @@ export interface GetRegionsFilter {
|
|
|
32
32
|
export declare namespace accessanalyzer {
|
|
33
33
|
interface AnalyzerConfiguration {
|
|
34
34
|
/**
|
|
35
|
-
*
|
|
35
|
+
* Specifies the configuration of an internal access analyzer for an AWS organization or account. This configuration determines how the analyzer evaluates access within your AWS environment. See `internalAccess` Block for details.
|
|
36
|
+
*/
|
|
37
|
+
internalAccess?: outputs.accessanalyzer.AnalyzerConfigurationInternalAccess;
|
|
38
|
+
/**
|
|
39
|
+
* Specifies the configuration of an unused access analyzer for an AWS organization or account. See `unusedAccess` Block for details.
|
|
36
40
|
*/
|
|
37
41
|
unusedAccess?: outputs.accessanalyzer.AnalyzerConfigurationUnusedAccess;
|
|
38
42
|
}
|
|
43
|
+
interface AnalyzerConfigurationInternalAccess {
|
|
44
|
+
/**
|
|
45
|
+
* Information about analysis rules for the internal access analyzer. These rules determine which resources and access patterns will be analyzed. See `analysisRule` Block for Internal Access Analyzer for details.
|
|
46
|
+
*/
|
|
47
|
+
analysisRule?: outputs.accessanalyzer.AnalyzerConfigurationInternalAccessAnalysisRule;
|
|
48
|
+
}
|
|
49
|
+
interface AnalyzerConfigurationInternalAccessAnalysisRule {
|
|
50
|
+
/**
|
|
51
|
+
* List of rules for the internal access analyzer containing criteria to include in analysis. Only resources that meet the rule criteria will generate findings. See `inclusion` Block for details.
|
|
52
|
+
*/
|
|
53
|
+
inclusions?: outputs.accessanalyzer.AnalyzerConfigurationInternalAccessAnalysisRuleInclusion[];
|
|
54
|
+
}
|
|
55
|
+
interface AnalyzerConfigurationInternalAccessAnalysisRuleInclusion {
|
|
56
|
+
/**
|
|
57
|
+
* List of AWS account IDs to apply to the internal access analysis rule criteria. Account IDs can only be applied to the analysis rule criteria for organization-level analyzers.
|
|
58
|
+
*/
|
|
59
|
+
accountIds?: string[];
|
|
60
|
+
/**
|
|
61
|
+
* List of resource ARNs to apply to the internal access analysis rule criteria. The analyzer will only generate findings for resources that match these ARNs.
|
|
62
|
+
*/
|
|
63
|
+
resourceArns?: string[];
|
|
64
|
+
/**
|
|
65
|
+
* List of resource types to apply to the internal access analysis rule criteria. The analyzer will only generate findings for resources of these types. Refer to [InternalAccessAnalysisRuleCriteria](https://docs.aws.amazon.com/access-analyzer/latest/APIReference/API_InternalAccessAnalysisRuleCriteria.html) in the AWS IAM Access Analyzer API Reference for valid values.
|
|
66
|
+
*/
|
|
67
|
+
resourceTypes?: string[];
|
|
68
|
+
}
|
|
39
69
|
interface AnalyzerConfigurationUnusedAccess {
|
|
40
70
|
/**
|
|
41
|
-
*
|
|
71
|
+
* Information about analysis rules for the analyzer. Analysis rules determine which entities will generate findings based on the criteria you define when you create the rule. See `analysisRule` Block for Unused Access Analyzer for details.
|
|
42
72
|
*/
|
|
43
73
|
analysisRule?: outputs.accessanalyzer.AnalyzerConfigurationUnusedAccessAnalysisRule;
|
|
44
74
|
/**
|
|
45
|
-
*
|
|
75
|
+
* Specified access age in days for which to generate findings for unused access.
|
|
46
76
|
*/
|
|
47
77
|
unusedAccessAge?: number;
|
|
48
78
|
}
|
|
49
79
|
interface AnalyzerConfigurationUnusedAccessAnalysisRule {
|
|
50
80
|
/**
|
|
51
|
-
*
|
|
81
|
+
* List of rules for the analyzer containing criteria to exclude from analysis. Entities that meet the rule criteria will not generate findings. See `exclusion` Block for details.
|
|
52
82
|
*/
|
|
53
83
|
exclusions?: outputs.accessanalyzer.AnalyzerConfigurationUnusedAccessAnalysisRuleExclusion[];
|
|
54
84
|
}
|
|
55
85
|
interface AnalyzerConfigurationUnusedAccessAnalysisRuleExclusion {
|
|
56
86
|
/**
|
|
57
|
-
*
|
|
87
|
+
* List of AWS account IDs to apply to the analysis rule criteria. The accounts cannot include the organization analyzer owner account. Account IDs can only be applied to the analysis rule criteria for organization-level analyzers.
|
|
58
88
|
*/
|
|
59
89
|
accountIds?: string[];
|
|
60
90
|
/**
|
|
61
|
-
*
|
|
91
|
+
* List of key-value pairs for resource tags to exclude from the analysis.
|
|
62
92
|
*/
|
|
63
93
|
resourceTags?: {
|
|
64
94
|
[key: string]: string;
|
|
@@ -1068,6 +1098,42 @@ export declare namespace alb {
|
|
|
1068
1098
|
}
|
|
1069
1099
|
}
|
|
1070
1100
|
export declare namespace amp {
|
|
1101
|
+
interface QueryLoggingConfigurationDestination {
|
|
1102
|
+
/**
|
|
1103
|
+
* Configuration block for CloudWatch Logs destination. See `cloudwatchLogs`.
|
|
1104
|
+
*/
|
|
1105
|
+
cloudwatchLogs?: outputs.amp.QueryLoggingConfigurationDestinationCloudwatchLogs;
|
|
1106
|
+
/**
|
|
1107
|
+
* A list of filter configurations that specify which logs should be sent to the destination. See `filters`.
|
|
1108
|
+
*/
|
|
1109
|
+
filters?: outputs.amp.QueryLoggingConfigurationDestinationFilters;
|
|
1110
|
+
}
|
|
1111
|
+
interface QueryLoggingConfigurationDestinationCloudwatchLogs {
|
|
1112
|
+
/**
|
|
1113
|
+
* The ARN of the CloudWatch log group to which query logs will be sent.
|
|
1114
|
+
*/
|
|
1115
|
+
logGroupArn: string;
|
|
1116
|
+
}
|
|
1117
|
+
interface QueryLoggingConfigurationDestinationFilters {
|
|
1118
|
+
/**
|
|
1119
|
+
* The Query Samples Processed (QSP) threshold above which queries will be logged. Queries processing more samples than this threshold will be captured in logs.
|
|
1120
|
+
*/
|
|
1121
|
+
qspThreshold: number;
|
|
1122
|
+
}
|
|
1123
|
+
interface QueryLoggingConfigurationTimeouts {
|
|
1124
|
+
/**
|
|
1125
|
+
* A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as "30s" or "2h45m". Valid time units are "s" (seconds), "m" (minutes), "h" (hours).
|
|
1126
|
+
*/
|
|
1127
|
+
create?: string;
|
|
1128
|
+
/**
|
|
1129
|
+
* A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as "30s" or "2h45m". Valid time units are "s" (seconds), "m" (minutes), "h" (hours). Setting a timeout for a Delete operation is only applicable if changes are saved into state before the destroy operation occurs.
|
|
1130
|
+
*/
|
|
1131
|
+
delete?: string;
|
|
1132
|
+
/**
|
|
1133
|
+
* A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as "30s" or "2h45m". Valid time units are "s" (seconds), "m" (minutes), "h" (hours).
|
|
1134
|
+
*/
|
|
1135
|
+
update?: string;
|
|
1136
|
+
}
|
|
1071
1137
|
interface ScraperDestination {
|
|
1072
1138
|
/**
|
|
1073
1139
|
* Configuration block for an Amazon Managed Prometheus workspace destination. See `amp`.
|
|
@@ -1225,6 +1291,12 @@ export declare namespace amplify {
|
|
|
1225
1291
|
*/
|
|
1226
1292
|
target: string;
|
|
1227
1293
|
}
|
|
1294
|
+
interface AppJobConfig {
|
|
1295
|
+
/**
|
|
1296
|
+
* Size of the build instance. Valid values: `STANDARD_8GB`, `LARGE_16GB`, and `XLARGE_72GB`. Default: `STANDARD_8GB`.
|
|
1297
|
+
*/
|
|
1298
|
+
buildComputeType: string;
|
|
1299
|
+
}
|
|
1228
1300
|
interface AppProductionBranch {
|
|
1229
1301
|
/**
|
|
1230
1302
|
* Branch name for the production branch.
|
|
@@ -16159,6 +16231,10 @@ export declare namespace codebuild {
|
|
|
16159
16231
|
* the [CodeBuild User Guide](https://docs.aws.amazon.com/codebuild/latest/userguide/build-env-ref-compute-types.html).
|
|
16160
16232
|
*/
|
|
16161
16233
|
computeType: string;
|
|
16234
|
+
/**
|
|
16235
|
+
* Configuration block. Detailed below.
|
|
16236
|
+
*/
|
|
16237
|
+
dockerServer?: outputs.codebuild.ProjectEnvironmentDockerServer;
|
|
16162
16238
|
/**
|
|
16163
16239
|
* Configuration block. Detailed below.
|
|
16164
16240
|
*/
|
|
@@ -16198,6 +16274,16 @@ export declare namespace codebuild {
|
|
|
16198
16274
|
*/
|
|
16199
16275
|
type: string;
|
|
16200
16276
|
}
|
|
16277
|
+
interface ProjectEnvironmentDockerServer {
|
|
16278
|
+
/**
|
|
16279
|
+
* Compute type for the Docker server. Valid values: `BUILD_GENERAL1_SMALL`, `BUILD_GENERAL1_MEDIUM`, `BUILD_GENERAL1_LARGE`, `BUILD_GENERAL1_XLARGE`, and `BUILD_GENERAL1_2XLARGE`.
|
|
16280
|
+
*/
|
|
16281
|
+
computeType: string;
|
|
16282
|
+
/**
|
|
16283
|
+
* List of security group IDs to assign to the Docker server.
|
|
16284
|
+
*/
|
|
16285
|
+
securityGroupIds?: string[];
|
|
16286
|
+
}
|
|
16201
16287
|
interface ProjectEnvironmentEnvironmentVariable {
|
|
16202
16288
|
/**
|
|
16203
16289
|
* Environment variable's name or key.
|
|
@@ -25575,6 +25661,10 @@ export declare namespace dynamodb {
|
|
|
25575
25661
|
* ARN of the table
|
|
25576
25662
|
*/
|
|
25577
25663
|
arn: string;
|
|
25664
|
+
/**
|
|
25665
|
+
* Whether this global table will be using `STRONG` consistency mode or `EVENTUAL` consistency mode. Default value is `EVENTUAL`.
|
|
25666
|
+
*/
|
|
25667
|
+
consistencyMode?: string;
|
|
25578
25668
|
/**
|
|
25579
25669
|
* ARN of the CMK that should be used for the AWS KMS encryption.
|
|
25580
25670
|
* This argument should only be used if the key is different from the default KMS-managed DynamoDB key, `alias/aws/dynamodb`.
|
|
@@ -60991,25 +61081,23 @@ export declare namespace lightsail {
|
|
|
60991
61081
|
*/
|
|
60992
61082
|
cidrListAliases: string[];
|
|
60993
61083
|
/**
|
|
60994
|
-
* Set of CIDR
|
|
61084
|
+
* Set of IPv4 addresses or ranges of IPv4 addresses (in CIDR notation) that are allowed to connect to an instance through the ports, and the protocol.
|
|
60995
61085
|
*/
|
|
60996
61086
|
cidrs: string[];
|
|
60997
61087
|
/**
|
|
60998
|
-
* First port in a range of open ports on an instance.
|
|
61088
|
+
* First port in a range of open ports on an instance. See [PortInfo](https://docs.aws.amazon.com/lightsail/2016-11-28/api-reference/API_PortInfo.html) for details.
|
|
60999
61089
|
*/
|
|
61000
61090
|
fromPort: number;
|
|
61001
61091
|
/**
|
|
61002
|
-
* Set of IPv6 CIDR
|
|
61092
|
+
* Set of IPv6 addresses or ranges of IPv6 addresses (in CIDR notation) that are allowed to connect to an instance through the ports, and the protocol.
|
|
61003
61093
|
*/
|
|
61004
61094
|
ipv6Cidrs: string[];
|
|
61005
61095
|
/**
|
|
61006
|
-
* IP protocol name. Valid values: `tcp`, `all`, `udp`, `icmp`.
|
|
61096
|
+
* IP protocol name. Valid values: `tcp`, `all`, `udp`, `icmp`, `icmpv6`. See [PortInfo](https://docs.aws.amazon.com/lightsail/2016-11-28/api-reference/API_PortInfo.html) for details.
|
|
61007
61097
|
*/
|
|
61008
61098
|
protocol: string;
|
|
61009
61099
|
/**
|
|
61010
|
-
* Last port in a range of open ports on an instance.
|
|
61011
|
-
*
|
|
61012
|
-
* The following arguments are optional:
|
|
61100
|
+
* Last port in a range of open ports on an instance. See [PortInfo](https://docs.aws.amazon.com/lightsail/2016-11-28/api-reference/API_PortInfo.html) for details.
|
|
61013
61101
|
*/
|
|
61014
61102
|
toPort: number;
|
|
61015
61103
|
}
|
|
@@ -65409,6 +65497,12 @@ export declare namespace networkfirewall {
|
|
|
65409
65497
|
tcpIdleTimeoutSeconds?: number;
|
|
65410
65498
|
}
|
|
65411
65499
|
interface FirewallPolicyFirewallPolicyStatefulRuleGroupReference {
|
|
65500
|
+
/**
|
|
65501
|
+
* Whether to enable deep threat inspection, which allows AWS to analyze service logs of network traffic processed by these rule groups to identify threat indicators across customers. AWS will use these threat indicators to improve the active threat defense managed rule groups and protect the security of AWS customers and services. This only applies to active threat defense maanaged rule groups.
|
|
65502
|
+
*
|
|
65503
|
+
* For details, refer to [AWS active threat defense for AWS Network Firewall](https://docs.aws.amazon.com/network-firewall/latest/developerguide/aws-managed-rule-groups-atd.html) in the AWS Network Firewall Developer Guide.
|
|
65504
|
+
*/
|
|
65505
|
+
deepThreatInspection: string;
|
|
65412
65506
|
/**
|
|
65413
65507
|
* Configuration block for override values
|
|
65414
65508
|
*/
|
|
@@ -65574,6 +65668,7 @@ export declare namespace networkfirewall {
|
|
|
65574
65668
|
streamExceptionPolicy: string;
|
|
65575
65669
|
}
|
|
65576
65670
|
interface GetFirewallPolicyFirewallPolicyStatefulRuleGroupReference {
|
|
65671
|
+
deepThreatInspection: string;
|
|
65577
65672
|
overrides?: outputs.networkfirewall.GetFirewallPolicyFirewallPolicyStatefulRuleGroupReferenceOverride[];
|
|
65578
65673
|
priority: number;
|
|
65579
65674
|
resourceArn: string;
|
|
@@ -66262,6 +66357,10 @@ export declare namespace networkmanager {
|
|
|
66262
66357
|
* List of strings containing Autonomous System Numbers (ASNs) to assign to Core Network Edges. By default, the core network automatically assigns an ASN for each Core Network Edge but you can optionally define the ASN in the edge-locations for each Region. The ASN uses an array of integer ranges only from `64512` to `65534` and `4200000000` to `4294967294` expressed as a string like `"64512-65534"`. No other ASN ranges can be used.
|
|
66263
66358
|
*/
|
|
66264
66359
|
asnRanges: string[];
|
|
66360
|
+
/**
|
|
66361
|
+
* Indicates whether DNS resolution is enabled for the core network. The value can be either `true` or `false`. When set to `true`, DNS resolution is enabled for VPCs attached to the core network, allowing resources in different VPCs to resolve each other's domain names. The default is `true`.
|
|
66362
|
+
*/
|
|
66363
|
+
dnsSupport?: boolean;
|
|
66265
66364
|
/**
|
|
66266
66365
|
* A block value of AWS Region locations where you're creating Core Network Edges. Detailed below.
|
|
66267
66366
|
*/
|
|
@@ -66270,6 +66369,10 @@ export declare namespace networkmanager {
|
|
|
66270
66369
|
* The Classless Inter-Domain Routing (CIDR) block range used to create tunnels for AWS Transit Gateway Connect. The format is standard AWS CIDR range (for example, `10.0.1.0/24`). You can optionally define the inside CIDR in the Core Network Edges section per Region. The minimum is a `/24` for IPv4 or `/64` for IPv6. You can provide multiple `/24` subnets or a larger CIDR range. If you define a larger CIDR range, new Core Network Edges will be automatically assigned `/24` and `/64` subnets from the larger CIDR. an Inside CIDR block is required for attaching Connect attachments to a Core Network Edge.
|
|
66271
66370
|
*/
|
|
66272
66371
|
insideCidrBlocks?: string[];
|
|
66372
|
+
/**
|
|
66373
|
+
* — (Optional) Indicates whether security group referencing is enabled for the core network. The value can be either `true` or `false`. When set to `true`, security groups in one VPC can reference security groups in another VPC attached to the core network, enabling more flexible security configurations across your network. The default is `false`.
|
|
66374
|
+
*/
|
|
66375
|
+
securityGroupReferencingSupport?: boolean;
|
|
66273
66376
|
/**
|
|
66274
66377
|
* Indicates whether the core network forwards traffic over multiple equal-cost routes using VPN. The value can be either `true` or `false`. The default is `true`.
|
|
66275
66378
|
*/
|
|
@@ -70496,6 +70599,18 @@ export declare namespace ram {
|
|
|
70496
70599
|
}
|
|
70497
70600
|
}
|
|
70498
70601
|
export declare namespace rbin {
|
|
70602
|
+
interface RuleExcludeResourceTag {
|
|
70603
|
+
/**
|
|
70604
|
+
* Tag key.
|
|
70605
|
+
*
|
|
70606
|
+
* The following argument is optional:
|
|
70607
|
+
*/
|
|
70608
|
+
resourceTagKey: string;
|
|
70609
|
+
/**
|
|
70610
|
+
* Tag value.
|
|
70611
|
+
*/
|
|
70612
|
+
resourceTagValue?: string;
|
|
70613
|
+
}
|
|
70499
70614
|
interface RuleLockConfiguration {
|
|
70500
70615
|
/**
|
|
70501
70616
|
* Information about the retention rule unlock delay. See `unlockDelay` below.
|
|
@@ -70504,33 +70619,33 @@ export declare namespace rbin {
|
|
|
70504
70619
|
}
|
|
70505
70620
|
interface RuleLockConfigurationUnlockDelay {
|
|
70506
70621
|
/**
|
|
70507
|
-
*
|
|
70622
|
+
* Unit of time in which to measure the unlock delay. Currently, the unlock delay can be measure only in days.
|
|
70508
70623
|
*/
|
|
70509
70624
|
unlockDelayUnit: string;
|
|
70510
70625
|
/**
|
|
70511
|
-
*
|
|
70626
|
+
* Unlock delay period, measured in the unit specified for UnlockDelayUnit.
|
|
70512
70627
|
*/
|
|
70513
70628
|
unlockDelayValue: number;
|
|
70514
70629
|
}
|
|
70515
70630
|
interface RuleResourceTag {
|
|
70516
70631
|
/**
|
|
70517
|
-
*
|
|
70632
|
+
* Tag key.
|
|
70518
70633
|
*
|
|
70519
70634
|
* The following argument is optional:
|
|
70520
70635
|
*/
|
|
70521
70636
|
resourceTagKey: string;
|
|
70522
70637
|
/**
|
|
70523
|
-
*
|
|
70638
|
+
* Tag value.
|
|
70524
70639
|
*/
|
|
70525
70640
|
resourceTagValue?: string;
|
|
70526
70641
|
}
|
|
70527
70642
|
interface RuleRetentionPeriod {
|
|
70528
70643
|
/**
|
|
70529
|
-
*
|
|
70644
|
+
* Unit of time in which the retention period is measured. Currently, only DAYS is supported.
|
|
70530
70645
|
*/
|
|
70531
70646
|
retentionPeriodUnit: string;
|
|
70532
70647
|
/**
|
|
70533
|
-
*
|
|
70648
|
+
* Period value for which the retention rule is to retain resources. The period is measured using the unit specified for RetentionPeriodUnit.
|
|
70534
70649
|
*/
|
|
70535
70650
|
retentionPeriodValue: number;
|
|
70536
70651
|
}
|
|
@@ -75618,6 +75733,41 @@ export declare namespace s3tables {
|
|
|
75618
75733
|
*/
|
|
75619
75734
|
minSnapshotsToKeep: number;
|
|
75620
75735
|
}
|
|
75736
|
+
interface TableMetadata {
|
|
75737
|
+
/**
|
|
75738
|
+
* Contains details about the metadata for an Iceberg table. This block defines the schema structure for the Apache Iceberg table format.
|
|
75739
|
+
* See `iceberg` below.
|
|
75740
|
+
*/
|
|
75741
|
+
iceberg: outputs.s3tables.TableMetadataIceberg;
|
|
75742
|
+
}
|
|
75743
|
+
interface TableMetadataIceberg {
|
|
75744
|
+
/**
|
|
75745
|
+
* Schema configuration for the Iceberg table.
|
|
75746
|
+
* See `schema` below.
|
|
75747
|
+
*/
|
|
75748
|
+
schema: outputs.s3tables.TableMetadataIcebergSchema;
|
|
75749
|
+
}
|
|
75750
|
+
interface TableMetadataIcebergSchema {
|
|
75751
|
+
/**
|
|
75752
|
+
* List of schema fields for the Iceberg table. Each field defines a column in the table schema.
|
|
75753
|
+
* See `field` below.
|
|
75754
|
+
*/
|
|
75755
|
+
fields?: outputs.s3tables.TableMetadataIcebergSchemaField[];
|
|
75756
|
+
}
|
|
75757
|
+
interface TableMetadataIcebergSchemaField {
|
|
75758
|
+
/**
|
|
75759
|
+
* The name of the field.
|
|
75760
|
+
*/
|
|
75761
|
+
name: string;
|
|
75762
|
+
/**
|
|
75763
|
+
* A Boolean value that specifies whether values are required for each row in this field. Defaults to `false`.
|
|
75764
|
+
*/
|
|
75765
|
+
required: boolean;
|
|
75766
|
+
/**
|
|
75767
|
+
* The field type. S3 Tables supports all Apache Iceberg primitive types including: `boolean`, `int`, `long`, `float`, `double`, `decimal(precision,scale)`, `date`, `time`, `timestamp`, `timestamptz`, `string`, `uuid`, `fixed(length)`, `binary`.
|
|
75768
|
+
*/
|
|
75769
|
+
type: string;
|
|
75770
|
+
}
|
|
75621
75771
|
}
|
|
75622
75772
|
export declare namespace sagemaker {
|
|
75623
75773
|
interface AppImageConfigCodeEditorAppImageConfig {
|
|
@@ -90224,6 +90374,10 @@ export declare namespace wafv2 {
|
|
|
90224
90374
|
* Additional configuration for using the Account Creation Fraud Prevention managed rule group. Use this to specify information such as the registration page of your application and the type of content to accept or reject from the client.
|
|
90225
90375
|
*/
|
|
90226
90376
|
awsManagedRulesAcfpRuleSet?: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAcfpRuleSet;
|
|
90377
|
+
/**
|
|
90378
|
+
* Configuration for using the anti-DDoS managed rule group. See `awsManagedRulesAntiDdosRuleSet` for more details.
|
|
90379
|
+
*/
|
|
90380
|
+
awsManagedRulesAntiDdosRuleSet?: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSet;
|
|
90227
90381
|
/**
|
|
90228
90382
|
* Additional configuration for using the Account Takeover Protection managed rule group. Use this to specify information such as the sign-in page of your application and the type of content to accept or reject from the client.
|
|
90229
90383
|
*/
|
|
@@ -90393,6 +90547,42 @@ export declare namespace wafv2 {
|
|
|
90393
90547
|
*/
|
|
90394
90548
|
successCodes: number[];
|
|
90395
90549
|
}
|
|
90550
|
+
interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSet {
|
|
90551
|
+
/**
|
|
90552
|
+
* Configuration for the request handling that's applied by the managed rule group rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` during a distributed denial of service (DDoS) attack. See `clientSideActionConfig` for more details.
|
|
90553
|
+
*/
|
|
90554
|
+
clientSideActionConfig: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfig;
|
|
90555
|
+
/**
|
|
90556
|
+
* Sensitivity that the rule group rule DDoSRequests uses when matching against the DDoS suspicion labeling on a request. Valid values are `LOW` (Default), `MEDIUM`, and `HIGH`.
|
|
90557
|
+
*/
|
|
90558
|
+
sensitivityToBlock?: string;
|
|
90559
|
+
}
|
|
90560
|
+
interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfig {
|
|
90561
|
+
/**
|
|
90562
|
+
* Configuration for the use of the `AWSManagedRulesAntiDDoSRuleSet` rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests`.
|
|
90563
|
+
*/
|
|
90564
|
+
challenge: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfigChallenge;
|
|
90565
|
+
}
|
|
90566
|
+
interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfigChallenge {
|
|
90567
|
+
/**
|
|
90568
|
+
* Block for the list of the regular expressions to match against the web request URI, used to identify requests that can't handle a silent browser challenge.
|
|
90569
|
+
*/
|
|
90570
|
+
exemptUriRegularExpressions?: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfigChallengeExemptUriRegularExpression[];
|
|
90571
|
+
/**
|
|
90572
|
+
* Sensitivity that the rule group rule ChallengeDDoSRequests uses when matching against the DDoS suspicion labeling on a request. Valid values are `LOW`, `MEDIUM` and `HIGH` (Default).
|
|
90573
|
+
*/
|
|
90574
|
+
sensitivity?: string;
|
|
90575
|
+
/**
|
|
90576
|
+
* Configuration whether to use the `AWSManagedRulesAntiDDoSRuleSet` rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` in the rule group evaluation. Valid values are `ENABLED` and `DISABLED`.
|
|
90577
|
+
*/
|
|
90578
|
+
usageOfAction: string;
|
|
90579
|
+
}
|
|
90580
|
+
interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAntiDdosRuleSetClientSideActionConfigChallengeExemptUriRegularExpression {
|
|
90581
|
+
/**
|
|
90582
|
+
* Regular expression string.
|
|
90583
|
+
*/
|
|
90584
|
+
regexString?: string;
|
|
90585
|
+
}
|
|
90396
90586
|
interface WebAclRuleStatementManagedRuleGroupStatementManagedRuleGroupConfigAwsManagedRulesAtpRuleSet {
|
|
90397
90587
|
/**
|
|
90398
90588
|
* Whether or not to allow the use of regular expressions in the login page path.
|
|
@@ -90542,9 +90732,6 @@ export declare namespace wafv2 {
|
|
|
90542
90732
|
* Instructs AWS WAF to run a Captcha check against the web request. See `captcha` below for details.
|
|
90543
90733
|
*/
|
|
90544
90734
|
captcha?: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementRuleActionOverrideActionToUseCaptcha;
|
|
90545
|
-
/**
|
|
90546
|
-
* Instructs AWS WAF to run a check against the request to verify that the request is coming from a legitimate client session. See `challenge` below for details.
|
|
90547
|
-
*/
|
|
90548
90735
|
challenge?: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementRuleActionOverrideActionToUseChallenge;
|
|
90549
90736
|
count?: outputs.wafv2.WebAclRuleStatementManagedRuleGroupStatementRuleActionOverrideActionToUseCount;
|
|
90550
90737
|
}
|
|
@@ -94187,9 +94374,6 @@ export declare namespace wafv2 {
|
|
|
94187
94374
|
* Instructs AWS WAF to run a Captcha check against the web request. See `captcha` below for details.
|
|
94188
94375
|
*/
|
|
94189
94376
|
captcha?: outputs.wafv2.WebAclRuleStatementRuleGroupReferenceStatementRuleActionOverrideActionToUseCaptcha;
|
|
94190
|
-
/**
|
|
94191
|
-
* Instructs AWS WAF to run a check against the request to verify that the request is coming from a legitimate client session. See `challenge` below for details.
|
|
94192
|
-
*/
|
|
94193
94377
|
challenge?: outputs.wafv2.WebAclRuleStatementRuleGroupReferenceStatementRuleActionOverrideActionToUseChallenge;
|
|
94194
94378
|
count?: outputs.wafv2.WebAclRuleStatementRuleGroupReferenceStatementRuleActionOverrideActionToUseCount;
|
|
94195
94379
|
}
|
package/types/output.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"output.js","sourceRoot":"","sources":["../../types/output.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;
|
|
1
|
+
{"version":3,"file":"output.js","sourceRoot":"","sources":["../../types/output.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AA+p2BjF,IAAiB,GAAG,CA0rMnB;AA1rMD,WAAiB,GAAG;IAowKhB;;OAEG;IACH,SAAgB,kCAAkC,CAAC,GAAwB;;QACvE,uCACO,GAAG,KACN,WAAW,EAAE,MAAA,CAAC,GAAG,CAAC,WAAW,CAAC,mCAAI,EAAE,IACtC;IACN,CAAC;IALe,sCAAkC,qCAKjD,CAAA;IA4CD;;OAEG;IACH,SAAgB,mCAAmC,CAAC,GAAyB;;QACzE,uCACO,GAAG,KACN,WAAW,EAAE,MAAA,CAAC,GAAG,CAAC,WAAW,CAAC,mCAAI,EAAE,IACtC;IACN,CAAC;IALe,uCAAmC,sCAKlD,CAAA;AA03BL,CAAC,EA1rMgB,GAAG,GAAH,WAAG,KAAH,WAAG,QA0rMnB;AAm8xCD,IAAiB,GAAG,CA4cnB;AA5cD,WAAiB,GAAG;IA4XhB;;OAEG;IACH,SAAgB,sCAAsC,CAAC,GAA4B;;QAC/E,uCACO,GAAG,KACN,WAAW,EAAE,MAAA,CAAC,GAAG,CAAC,WAAW,CAAC,mCAAI,WAAW,IAC/C;IACN,CAAC;IALe,0CAAsC,yCAKrD,CAAA;AAwEL,CAAC,EA5cgB,GAAG,GAAH,WAAG,KAAH,WAAG,QA4cnB"}
|