aws-cdk-lib 2.100.0__py3-none-any.whl → 2.101.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk-lib might be problematic. Click here for more details.

Files changed (38) hide show
  1. aws_cdk/_jsii/__init__.py +1 -1
  2. aws_cdk/_jsii/{aws-cdk-lib@2.100.0.jsii.tgz → aws-cdk-lib@2.101.1.jsii.tgz} +0 -0
  3. aws_cdk/aws_apigatewayv2/__init__.py +0 -8
  4. aws_cdk/aws_appconfig/__init__.py +101 -18
  5. aws_cdk/aws_apprunner/__init__.py +5 -2
  6. aws_cdk/aws_appstream/__init__.py +18 -26
  7. aws_cdk/aws_cloudfront/__init__.py +251 -3
  8. aws_cdk/aws_cloudtrail/__init__.py +47 -3
  9. aws_cdk/aws_cognito/__init__.py +414 -8
  10. aws_cdk/aws_dlm/__init__.py +10 -9
  11. aws_cdk/aws_ec2/__init__.py +308 -179
  12. aws_cdk/aws_events/__init__.py +62 -86
  13. aws_cdk/aws_fms/__init__.py +3 -3
  14. aws_cdk/aws_grafana/__init__.py +4 -4
  15. aws_cdk/aws_greengrassv2/__init__.py +1 -8
  16. aws_cdk/aws_iot/__init__.py +714 -0
  17. aws_cdk/aws_iotsitewise/__init__.py +3 -3
  18. aws_cdk/aws_kinesisanalytics/__init__.py +15 -15
  19. aws_cdk/aws_kinesisanalyticsv2/__init__.py +15 -15
  20. aws_cdk/aws_kinesisfirehose/__init__.py +87 -40
  21. aws_cdk/aws_lambda/__init__.py +34 -4
  22. aws_cdk/aws_lightsail/__init__.py +3 -1
  23. aws_cdk/aws_mediatailor/__init__.py +24 -1
  24. aws_cdk/aws_quicksight/__init__.py +2508 -55
  25. aws_cdk/aws_rds/__init__.py +121 -51
  26. aws_cdk/aws_sagemaker/__init__.py +5 -3
  27. aws_cdk/aws_sns/__init__.py +42 -5
  28. aws_cdk/aws_ssm/__init__.py +0 -8
  29. aws_cdk/aws_stepfunctions/__init__.py +233 -16
  30. aws_cdk/aws_stepfunctions_tasks/__init__.py +926 -27
  31. aws_cdk/aws_transfer/__init__.py +4 -4
  32. aws_cdk/aws_workspacesweb/__init__.py +3 -3
  33. {aws_cdk_lib-2.100.0.dist-info → aws_cdk_lib-2.101.1.dist-info}/METADATA +1 -1
  34. {aws_cdk_lib-2.100.0.dist-info → aws_cdk_lib-2.101.1.dist-info}/RECORD +38 -38
  35. {aws_cdk_lib-2.100.0.dist-info → aws_cdk_lib-2.101.1.dist-info}/LICENSE +0 -0
  36. {aws_cdk_lib-2.100.0.dist-info → aws_cdk_lib-2.101.1.dist-info}/NOTICE +0 -0
  37. {aws_cdk_lib-2.100.0.dist-info → aws_cdk_lib-2.101.1.dist-info}/WHEEL +0 -0
  38. {aws_cdk_lib-2.100.0.dist-info → aws_cdk_lib-2.101.1.dist-info}/top_level.txt +0 -0
@@ -3325,11 +3325,14 @@ class CfnEventBus(
3325
3325
  # The values are placeholders you should change.
3326
3326
  from aws_cdk import aws_events as events
3327
3327
 
3328
+ # policy: Any
3329
+
3328
3330
  cfn_event_bus = events.CfnEventBus(self, "MyCfnEventBus",
3329
3331
  name="name",
3330
3332
 
3331
3333
  # the properties below are optional
3332
3334
  event_source_name="eventSourceName",
3335
+ policy=policy,
3333
3336
  tags=[events.CfnEventBus.TagEntryProperty(
3334
3337
  key="key",
3335
3338
  value="value"
@@ -3344,6 +3347,7 @@ class CfnEventBus(
3344
3347
  *,
3345
3348
  name: builtins.str,
3346
3349
  event_source_name: typing.Optional[builtins.str] = None,
3350
+ policy: typing.Any = None,
3347
3351
  tags: typing.Optional[typing.Sequence[typing.Union["CfnEventBus.TagEntryProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
3348
3352
  ) -> None:
3349
3353
  '''
@@ -3351,6 +3355,7 @@ class CfnEventBus(
3351
3355
  :param id: Construct identifier for this resource (unique in its scope).
3352
3356
  :param name: The name of the new event bus. Custom event bus names can't contain the ``/`` character, but you can use the ``/`` character in partner event bus names. In addition, for partner event buses, the name must exactly match the name of the partner event source that this event bus is matched to. You can't use the name ``default`` for a custom event bus, as this name is already used for your account's default event bus.
3353
3357
  :param event_source_name: If you are creating a partner event bus, this specifies the partner event source that the new event bus will be matched with.
3358
+ :param policy:
3354
3359
  :param tags: Tags to associate with the event bus.
3355
3360
  '''
3356
3361
  if __debug__:
@@ -3358,7 +3363,7 @@ class CfnEventBus(
3358
3363
  check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
3359
3364
  check_type(argname="argument id", value=id, expected_type=type_hints["id"])
3360
3365
  props = CfnEventBusProps(
3361
- name=name, event_source_name=event_source_name, tags=tags
3366
+ name=name, event_source_name=event_source_name, policy=policy, tags=tags
3362
3367
  )
3363
3368
 
3364
3369
  jsii.create(self.__class__, self, [scope, id, props])
@@ -3459,6 +3464,18 @@ class CfnEventBus(
3459
3464
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
3460
3465
  jsii.set(self, "eventSourceName", value)
3461
3466
 
3467
+ @builtins.property
3468
+ @jsii.member(jsii_name="policy")
3469
+ def policy(self) -> typing.Any:
3470
+ return typing.cast(typing.Any, jsii.get(self, "policy"))
3471
+
3472
+ @policy.setter
3473
+ def policy(self, value: typing.Any) -> None:
3474
+ if __debug__:
3475
+ type_hints = typing.get_type_hints(_typecheckingstub__6069dbf8a749c1a9a0cd15c07c6efbd2f70dbd4c7e3a6e98efd29bdb8c7acb24)
3476
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
3477
+ jsii.set(self, "policy", value)
3478
+
3462
3479
  @builtins.property
3463
3480
  @jsii.member(jsii_name="tags")
3464
3481
  def tags(self) -> typing.Optional[typing.List["CfnEventBus.TagEntryProperty"]]:
@@ -4025,6 +4042,7 @@ class CfnEventBusPolicyProps:
4025
4042
  name_mapping={
4026
4043
  "name": "name",
4027
4044
  "event_source_name": "eventSourceName",
4045
+ "policy": "policy",
4028
4046
  "tags": "tags",
4029
4047
  },
4030
4048
  )
@@ -4034,12 +4052,14 @@ class CfnEventBusProps:
4034
4052
  *,
4035
4053
  name: builtins.str,
4036
4054
  event_source_name: typing.Optional[builtins.str] = None,
4055
+ policy: typing.Any = None,
4037
4056
  tags: typing.Optional[typing.Sequence[typing.Union[CfnEventBus.TagEntryProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
4038
4057
  ) -> None:
4039
4058
  '''Properties for defining a ``CfnEventBus``.
4040
4059
 
4041
4060
  :param name: The name of the new event bus. Custom event bus names can't contain the ``/`` character, but you can use the ``/`` character in partner event bus names. In addition, for partner event buses, the name must exactly match the name of the partner event source that this event bus is matched to. You can't use the name ``default`` for a custom event bus, as this name is already used for your account's default event bus.
4042
4061
  :param event_source_name: If you are creating a partner event bus, this specifies the partner event source that the new event bus will be matched with.
4062
+ :param policy:
4043
4063
  :param tags: Tags to associate with the event bus.
4044
4064
 
4045
4065
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-events-eventbus.html
@@ -4051,11 +4071,14 @@ class CfnEventBusProps:
4051
4071
  # The values are placeholders you should change.
4052
4072
  from aws_cdk import aws_events as events
4053
4073
 
4074
+ # policy: Any
4075
+
4054
4076
  cfn_event_bus_props = events.CfnEventBusProps(
4055
4077
  name="name",
4056
4078
 
4057
4079
  # the properties below are optional
4058
4080
  event_source_name="eventSourceName",
4081
+ policy=policy,
4059
4082
  tags=[events.CfnEventBus.TagEntryProperty(
4060
4083
  key="key",
4061
4084
  value="value"
@@ -4066,12 +4089,15 @@ class CfnEventBusProps:
4066
4089
  type_hints = typing.get_type_hints(_typecheckingstub__79e3f734387b70ada8040490433e9e9ec9b92701ddfb55826c4adc11103c69a9)
4067
4090
  check_type(argname="argument name", value=name, expected_type=type_hints["name"])
4068
4091
  check_type(argname="argument event_source_name", value=event_source_name, expected_type=type_hints["event_source_name"])
4092
+ check_type(argname="argument policy", value=policy, expected_type=type_hints["policy"])
4069
4093
  check_type(argname="argument tags", value=tags, expected_type=type_hints["tags"])
4070
4094
  self._values: typing.Dict[builtins.str, typing.Any] = {
4071
4095
  "name": name,
4072
4096
  }
4073
4097
  if event_source_name is not None:
4074
4098
  self._values["event_source_name"] = event_source_name
4099
+ if policy is not None:
4100
+ self._values["policy"] = policy
4075
4101
  if tags is not None:
4076
4102
  self._values["tags"] = tags
4077
4103
 
@@ -4098,6 +4124,14 @@ class CfnEventBusProps:
4098
4124
  result = self._values.get("event_source_name")
4099
4125
  return typing.cast(typing.Optional[builtins.str], result)
4100
4126
 
4127
+ @builtins.property
4128
+ def policy(self) -> typing.Any:
4129
+ '''
4130
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-events-eventbus.html#cfn-events-eventbus-policy
4131
+ '''
4132
+ result = self._values.get("policy")
4133
+ return typing.cast(typing.Any, result)
4134
+
4101
4135
  @builtins.property
4102
4136
  def tags(self) -> typing.Optional[typing.List[CfnEventBus.TagEntryProperty]]:
4103
4137
  '''Tags to associate with the event bus.
@@ -4255,6 +4289,7 @@ class CfnRule(
4255
4289
  db_user="dbUser",
4256
4290
  secret_manager_arn="secretManagerArn",
4257
4291
  sql="sql",
4292
+ sqls=["sqls"],
4258
4293
  statement_name="statementName",
4259
4294
  with_event=False
4260
4295
  ),
@@ -5808,6 +5843,7 @@ class CfnRule(
5808
5843
  "db_user": "dbUser",
5809
5844
  "secret_manager_arn": "secretManagerArn",
5810
5845
  "sql": "sql",
5846
+ "sqls": "sqls",
5811
5847
  "statement_name": "statementName",
5812
5848
  "with_event": "withEvent",
5813
5849
  },
@@ -5820,6 +5856,7 @@ class CfnRule(
5820
5856
  db_user: typing.Optional[builtins.str] = None,
5821
5857
  secret_manager_arn: typing.Optional[builtins.str] = None,
5822
5858
  sql: typing.Optional[builtins.str] = None,
5859
+ sqls: typing.Optional[typing.Sequence[builtins.str]] = None,
5823
5860
  statement_name: typing.Optional[builtins.str] = None,
5824
5861
  with_event: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
5825
5862
  ) -> None:
@@ -5829,6 +5866,7 @@ class CfnRule(
5829
5866
  :param db_user: The database user name. Required when authenticating using temporary credentials.
5830
5867
  :param secret_manager_arn: The name or ARN of the secret that enables access to the database. Required when authenticating using AWS Secrets Manager.
5831
5868
  :param sql: The SQL statement text to run.
5869
+ :param sqls:
5832
5870
  :param statement_name: The name of the SQL statement. You can name the SQL statement when you create it to identify the query.
5833
5871
  :param with_event: Indicates whether to send an event back to EventBridge after the SQL statement runs.
5834
5872
 
@@ -5848,6 +5886,7 @@ class CfnRule(
5848
5886
  db_user="dbUser",
5849
5887
  secret_manager_arn="secretManagerArn",
5850
5888
  sql="sql",
5889
+ sqls=["sqls"],
5851
5890
  statement_name="statementName",
5852
5891
  with_event=False
5853
5892
  )
@@ -5858,6 +5897,7 @@ class CfnRule(
5858
5897
  check_type(argname="argument db_user", value=db_user, expected_type=type_hints["db_user"])
5859
5898
  check_type(argname="argument secret_manager_arn", value=secret_manager_arn, expected_type=type_hints["secret_manager_arn"])
5860
5899
  check_type(argname="argument sql", value=sql, expected_type=type_hints["sql"])
5900
+ check_type(argname="argument sqls", value=sqls, expected_type=type_hints["sqls"])
5861
5901
  check_type(argname="argument statement_name", value=statement_name, expected_type=type_hints["statement_name"])
5862
5902
  check_type(argname="argument with_event", value=with_event, expected_type=type_hints["with_event"])
5863
5903
  self._values: typing.Dict[builtins.str, typing.Any] = {
@@ -5869,6 +5909,8 @@ class CfnRule(
5869
5909
  self._values["secret_manager_arn"] = secret_manager_arn
5870
5910
  if sql is not None:
5871
5911
  self._values["sql"] = sql
5912
+ if sqls is not None:
5913
+ self._values["sqls"] = sqls
5872
5914
  if statement_name is not None:
5873
5915
  self._values["statement_name"] = statement_name
5874
5916
  if with_event is not None:
@@ -5917,6 +5959,14 @@ class CfnRule(
5917
5959
  result = self._values.get("sql")
5918
5960
  return typing.cast(typing.Optional[builtins.str], result)
5919
5961
 
5962
+ @builtins.property
5963
+ def sqls(self) -> typing.Optional[typing.List[builtins.str]]:
5964
+ '''
5965
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-events-rule-redshiftdataparameters.html#cfn-events-rule-redshiftdataparameters-sqls
5966
+ '''
5967
+ result = self._values.get("sqls")
5968
+ return typing.cast(typing.Optional[typing.List[builtins.str]], result)
5969
+
5920
5970
  @builtins.property
5921
5971
  def statement_name(self) -> typing.Optional[builtins.str]:
5922
5972
  '''The name of the SQL statement.
@@ -6339,83 +6389,6 @@ class CfnRule(
6339
6389
  k + "=" + repr(v) for k, v in self._values.items()
6340
6390
  )
6341
6391
 
6342
- @jsii.data_type(
6343
- jsii_type="aws-cdk-lib.aws_events.CfnRule.TagProperty",
6344
- jsii_struct_bases=[],
6345
- name_mapping={"key": "key", "value": "value"},
6346
- )
6347
- class TagProperty:
6348
- def __init__(
6349
- self,
6350
- *,
6351
- key: typing.Optional[builtins.str] = None,
6352
- value: typing.Optional[builtins.str] = None,
6353
- ) -> None:
6354
- '''A key-value pair associated with an ECS Target of an EventBridge rule.
6355
-
6356
- The tag will be propagated to ECS by EventBridge when starting an ECS task based on a matched event.
6357
- .. epigraph::
6358
-
6359
- Currently, tags are only available when using ECS with EventBridge .
6360
-
6361
- :param key: A string you can use to assign a value. The combination of tag keys and values can help you organize and categorize your resources.
6362
- :param value: The value for the specified tag key.
6363
-
6364
- :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-events-rule-tag.html
6365
- :exampleMetadata: fixture=_generated
6366
-
6367
- Example::
6368
-
6369
- # The code below shows an example of how to instantiate this type.
6370
- # The values are placeholders you should change.
6371
- from aws_cdk import aws_events as events
6372
-
6373
- tag_property = events.CfnRule.TagProperty(
6374
- key="key",
6375
- value="value"
6376
- )
6377
- '''
6378
- if __debug__:
6379
- type_hints = typing.get_type_hints(_typecheckingstub__631f1d2d2d85524250006a517cca6b338bebc43b645c2702b2ce2831b61f317a)
6380
- check_type(argname="argument key", value=key, expected_type=type_hints["key"])
6381
- check_type(argname="argument value", value=value, expected_type=type_hints["value"])
6382
- self._values: typing.Dict[builtins.str, typing.Any] = {}
6383
- if key is not None:
6384
- self._values["key"] = key
6385
- if value is not None:
6386
- self._values["value"] = value
6387
-
6388
- @builtins.property
6389
- def key(self) -> typing.Optional[builtins.str]:
6390
- '''A string you can use to assign a value.
6391
-
6392
- The combination of tag keys and values can help you organize and categorize your resources.
6393
-
6394
- :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-events-rule-tag.html#cfn-events-rule-tag-key
6395
- '''
6396
- result = self._values.get("key")
6397
- return typing.cast(typing.Optional[builtins.str], result)
6398
-
6399
- @builtins.property
6400
- def value(self) -> typing.Optional[builtins.str]:
6401
- '''The value for the specified tag key.
6402
-
6403
- :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-events-rule-tag.html#cfn-events-rule-tag-value
6404
- '''
6405
- result = self._values.get("value")
6406
- return typing.cast(typing.Optional[builtins.str], result)
6407
-
6408
- def __eq__(self, rhs: typing.Any) -> builtins.bool:
6409
- return isinstance(rhs, self.__class__) and rhs._values == self._values
6410
-
6411
- def __ne__(self, rhs: typing.Any) -> builtins.bool:
6412
- return not (rhs == self)
6413
-
6414
- def __repr__(self) -> str:
6415
- return "TagProperty(%s)" % ", ".join(
6416
- k + "=" + repr(v) for k, v in self._values.items()
6417
- )
6418
-
6419
6392
  @jsii.data_type(
6420
6393
  jsii_type="aws-cdk-lib.aws_events.CfnRule.TargetProperty",
6421
6394
  jsii_struct_bases=[],
@@ -6581,6 +6554,7 @@ class CfnRule(
6581
6554
  db_user="dbUser",
6582
6555
  secret_manager_arn="secretManagerArn",
6583
6556
  sql="sql",
6557
+ sqls=["sqls"],
6584
6558
  statement_name="statementName",
6585
6559
  with_event=False
6586
6560
  ),
@@ -7008,6 +6982,7 @@ class CfnRuleProps:
7008
6982
  db_user="dbUser",
7009
6983
  secret_manager_arn="secretManagerArn",
7010
6984
  sql="sql",
6985
+ sqls=["sqls"],
7011
6986
  statement_name="statementName",
7012
6987
  with_event=False
7013
6988
  ),
@@ -11643,6 +11618,7 @@ def _typecheckingstub__5766595a149723459145d9f55c6afa7ed3017d49f4af7cec85e0fffe2
11643
11618
  *,
11644
11619
  name: builtins.str,
11645
11620
  event_source_name: typing.Optional[builtins.str] = None,
11621
+ policy: typing.Any = None,
11646
11622
  tags: typing.Optional[typing.Sequence[typing.Union[CfnEventBus.TagEntryProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
11647
11623
  ) -> None:
11648
11624
  """Type checking stubs"""
@@ -11672,6 +11648,12 @@ def _typecheckingstub__1c09871ed225f5073f64a2472bb4ad2653f751351d1d800cc2db527a4
11672
11648
  """Type checking stubs"""
11673
11649
  pass
11674
11650
 
11651
+ def _typecheckingstub__6069dbf8a749c1a9a0cd15c07c6efbd2f70dbd4c7e3a6e98efd29bdb8c7acb24(
11652
+ value: typing.Any,
11653
+ ) -> None:
11654
+ """Type checking stubs"""
11655
+ pass
11656
+
11675
11657
  def _typecheckingstub__7839bb5f17e47516f1a7287848eb4905b08ca899cd21b2544645df1f4bedb748(
11676
11658
  value: typing.Optional[typing.List[CfnEventBus.TagEntryProperty]],
11677
11659
  ) -> None:
@@ -11773,6 +11755,7 @@ def _typecheckingstub__79e3f734387b70ada8040490433e9e9ec9b92701ddfb55826c4adc111
11773
11755
  *,
11774
11756
  name: builtins.str,
11775
11757
  event_source_name: typing.Optional[builtins.str] = None,
11758
+ policy: typing.Any = None,
11776
11759
  tags: typing.Optional[typing.Sequence[typing.Union[CfnEventBus.TagEntryProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
11777
11760
  ) -> None:
11778
11761
  """Type checking stubs"""
@@ -11976,6 +11959,7 @@ def _typecheckingstub__183646a052d824f887b6e170455aff3fbf5557ac2188f001395f11ea4
11976
11959
  db_user: typing.Optional[builtins.str] = None,
11977
11960
  secret_manager_arn: typing.Optional[builtins.str] = None,
11978
11961
  sql: typing.Optional[builtins.str] = None,
11962
+ sqls: typing.Optional[typing.Sequence[builtins.str]] = None,
11979
11963
  statement_name: typing.Optional[builtins.str] = None,
11980
11964
  with_event: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
11981
11965
  ) -> None:
@@ -12027,14 +12011,6 @@ def _typecheckingstub__0c3b4b126e08cc64ec28ca363e425756d47fd556f940c55bffd86e3ad
12027
12011
  """Type checking stubs"""
12028
12012
  pass
12029
12013
 
12030
- def _typecheckingstub__631f1d2d2d85524250006a517cca6b338bebc43b645c2702b2ce2831b61f317a(
12031
- *,
12032
- key: typing.Optional[builtins.str] = None,
12033
- value: typing.Optional[builtins.str] = None,
12034
- ) -> None:
12035
- """Type checking stubs"""
12036
- pass
12037
-
12038
12014
  def _typecheckingstub__0bb173839da3c22730cab96567bb586361722029ca0fab74f2c0ebd9eea2ed31(
12039
12015
  *,
12040
12016
  arn: builtins.str,
@@ -345,7 +345,7 @@ class CfnPolicy(
345
345
  :param exclude_map: Specifies the AWS account IDs and AWS Organizations organizational units (OUs) to exclude from the policy. Specifying an OU is the equivalent of specifying all accounts in the OU and in any of its child OUs, including any child OUs and accounts that are added at a later time. You can specify inclusions or exclusions, but not both. If you specify an ``IncludeMap`` , AWS Firewall Manager applies the policy to all accounts specified by the ``IncludeMap`` , and does not evaluate any ``ExcludeMap`` specifications. If you do not specify an ``IncludeMap`` , then Firewall Manager applies the policy to all accounts except for those specified by the ``ExcludeMap`` . You can specify account IDs, OUs, or a combination: - Specify account IDs by setting the key to ``ACCOUNT`` . For example, the following is a valid map: ``{“ACCOUNT” : [“accountID1”, “accountID2”]}`` . - Specify OUs by setting the key to ``ORGUNIT`` . For example, the following is a valid map: ``{“ORGUNIT” : [“ouid111”, “ouid112”]}`` . - Specify accounts and OUs together in a single map, separated with a comma. For example, the following is a valid map: ``{“ACCOUNT” : [“accountID1”, “accountID2”], “ORGUNIT” : [“ouid111”, “ouid112”]}`` .
346
346
  :param include_map: Specifies the AWS account IDs and AWS Organizations organizational units (OUs) to include in the policy. Specifying an OU is the equivalent of specifying all accounts in the OU and in any of its child OUs, including any child OUs and accounts that are added at a later time. You can specify inclusions or exclusions, but not both. If you specify an ``IncludeMap`` , AWS Firewall Manager applies the policy to all accounts specified by the ``IncludeMap`` , and does not evaluate any ``ExcludeMap`` specifications. If you do not specify an ``IncludeMap`` , then Firewall Manager applies the policy to all accounts except for those specified by the ``ExcludeMap`` . You can specify account IDs, OUs, or a combination: - Specify account IDs by setting the key to ``ACCOUNT`` . For example, the following is a valid map: ``{“ACCOUNT” : [“accountID1”, “accountID2”]}`` . - Specify OUs by setting the key to ``ORGUNIT`` . For example, the following is a valid map: ``{“ORGUNIT” : [“ouid111”, “ouid112”]}`` . - Specify accounts and OUs together in a single map, separated with a comma. For example, the following is a valid map: ``{“ACCOUNT” : [“accountID1”, “accountID2”], “ORGUNIT” : [“ouid111”, “ouid112”]}`` .
347
347
  :param policy_description: The definition of the AWS Network Firewall firewall policy.
348
- :param resources_clean_up: Indicates whether AWS Firewall Manager should automatically remove protections from resources that leave the policy scope and clean up resources that Firewall Manager is managing for accounts when those accounts leave policy scope. For example, Firewall Manager will disassociate a Firewall Manager managed web ACL from a protected customer resource when the customer resource leaves policy scope. By default, Firewall Manager doesn't remove protections or delete Firewall Manager managed resources. This option is not available for AWS WAF Classic policies.
348
+ :param resources_clean_up: Indicates whether AWS Firewall Manager should automatically remove protections from resources that leave the policy scope and clean up resources that Firewall Manager is managing for accounts when those accounts leave policy scope. For example, Firewall Manager will disassociate a Firewall Manager managed web ACL from a protected customer resource when the customer resource leaves policy scope. By default, Firewall Manager doesn't remove protections or delete Firewall Manager managed resources. This option is not available for Shield Advanced or AWS WAF Classic policies.
349
349
  :param resource_set_ids: The unique identifiers of the resource sets used by the policy.
350
350
  :param resource_tags: An array of ``ResourceTag`` objects, used to explicitly include resources in the policy scope or explicitly exclude them. If this isn't set, then tags aren't used to modify policy scope. See also ``ExcludeResourceTags`` .
351
351
  :param resource_type: The type of resource protected by or in scope of the policy. This is in the format shown in the `AWS Resource Types Reference <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-template-resource-type-ref.html>`_ . To apply this policy to multiple resource types, specify a resource type of ``ResourceTypeList`` and then specify the resource types in a ``ResourceTypeList`` . For AWS WAF and Shield Advanced, example resource types include ``AWS::ElasticLoadBalancingV2::LoadBalancer`` and ``AWS::CloudFront::Distribution`` . For a security group common policy, valid values are ``AWS::EC2::NetworkInterface`` and ``AWS::EC2::Instance`` . For a security group content audit policy, valid values are ``AWS::EC2::SecurityGroup`` , ``AWS::EC2::NetworkInterface`` , and ``AWS::EC2::Instance`` . For a security group usage audit policy, the value is ``AWS::EC2::SecurityGroup`` . For an AWS Network Firewall policy or DNS Firewall policy, the value is ``AWS::EC2::VPC`` .
@@ -1324,7 +1324,7 @@ class CfnPolicyProps:
1324
1324
  :param exclude_map: Specifies the AWS account IDs and AWS Organizations organizational units (OUs) to exclude from the policy. Specifying an OU is the equivalent of specifying all accounts in the OU and in any of its child OUs, including any child OUs and accounts that are added at a later time. You can specify inclusions or exclusions, but not both. If you specify an ``IncludeMap`` , AWS Firewall Manager applies the policy to all accounts specified by the ``IncludeMap`` , and does not evaluate any ``ExcludeMap`` specifications. If you do not specify an ``IncludeMap`` , then Firewall Manager applies the policy to all accounts except for those specified by the ``ExcludeMap`` . You can specify account IDs, OUs, or a combination: - Specify account IDs by setting the key to ``ACCOUNT`` . For example, the following is a valid map: ``{“ACCOUNT” : [“accountID1”, “accountID2”]}`` . - Specify OUs by setting the key to ``ORGUNIT`` . For example, the following is a valid map: ``{“ORGUNIT” : [“ouid111”, “ouid112”]}`` . - Specify accounts and OUs together in a single map, separated with a comma. For example, the following is a valid map: ``{“ACCOUNT” : [“accountID1”, “accountID2”], “ORGUNIT” : [“ouid111”, “ouid112”]}`` .
1325
1325
  :param include_map: Specifies the AWS account IDs and AWS Organizations organizational units (OUs) to include in the policy. Specifying an OU is the equivalent of specifying all accounts in the OU and in any of its child OUs, including any child OUs and accounts that are added at a later time. You can specify inclusions or exclusions, but not both. If you specify an ``IncludeMap`` , AWS Firewall Manager applies the policy to all accounts specified by the ``IncludeMap`` , and does not evaluate any ``ExcludeMap`` specifications. If you do not specify an ``IncludeMap`` , then Firewall Manager applies the policy to all accounts except for those specified by the ``ExcludeMap`` . You can specify account IDs, OUs, or a combination: - Specify account IDs by setting the key to ``ACCOUNT`` . For example, the following is a valid map: ``{“ACCOUNT” : [“accountID1”, “accountID2”]}`` . - Specify OUs by setting the key to ``ORGUNIT`` . For example, the following is a valid map: ``{“ORGUNIT” : [“ouid111”, “ouid112”]}`` . - Specify accounts and OUs together in a single map, separated with a comma. For example, the following is a valid map: ``{“ACCOUNT” : [“accountID1”, “accountID2”], “ORGUNIT” : [“ouid111”, “ouid112”]}`` .
1326
1326
  :param policy_description: The definition of the AWS Network Firewall firewall policy.
1327
- :param resources_clean_up: Indicates whether AWS Firewall Manager should automatically remove protections from resources that leave the policy scope and clean up resources that Firewall Manager is managing for accounts when those accounts leave policy scope. For example, Firewall Manager will disassociate a Firewall Manager managed web ACL from a protected customer resource when the customer resource leaves policy scope. By default, Firewall Manager doesn't remove protections or delete Firewall Manager managed resources. This option is not available for AWS WAF Classic policies.
1327
+ :param resources_clean_up: Indicates whether AWS Firewall Manager should automatically remove protections from resources that leave the policy scope and clean up resources that Firewall Manager is managing for accounts when those accounts leave policy scope. For example, Firewall Manager will disassociate a Firewall Manager managed web ACL from a protected customer resource when the customer resource leaves policy scope. By default, Firewall Manager doesn't remove protections or delete Firewall Manager managed resources. This option is not available for Shield Advanced or AWS WAF Classic policies.
1328
1328
  :param resource_set_ids: The unique identifiers of the resource sets used by the policy.
1329
1329
  :param resource_tags: An array of ``ResourceTag`` objects, used to explicitly include resources in the policy scope or explicitly exclude them. If this isn't set, then tags aren't used to modify policy scope. See also ``ExcludeResourceTags`` .
1330
1330
  :param resource_type: The type of resource protected by or in scope of the policy. This is in the format shown in the `AWS Resource Types Reference <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-template-resource-type-ref.html>`_ . To apply this policy to multiple resource types, specify a resource type of ``ResourceTypeList`` and then specify the resource types in a ``ResourceTypeList`` . For AWS WAF and Shield Advanced, example resource types include ``AWS::ElasticLoadBalancingV2::LoadBalancer`` and ``AWS::CloudFront::Distribution`` . For a security group common policy, valid values are ``AWS::EC2::NetworkInterface`` and ``AWS::EC2::Instance`` . For a security group content audit policy, valid values are ``AWS::EC2::SecurityGroup`` , ``AWS::EC2::NetworkInterface`` , and ``AWS::EC2::Instance`` . For a security group usage audit policy, the value is ``AWS::EC2::SecurityGroup`` . For an AWS Network Firewall policy or DNS Firewall policy, the value is ``AWS::EC2::VPC`` .
@@ -1662,7 +1662,7 @@ class CfnPolicyProps:
1662
1662
 
1663
1663
  By default, Firewall Manager doesn't remove protections or delete Firewall Manager managed resources.
1664
1664
 
1665
- This option is not available for AWS WAF Classic policies.
1665
+ This option is not available for Shield Advanced or AWS WAF Classic policies.
1666
1666
 
1667
1667
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-fms-policy.html#cfn-fms-policy-resourcescleanup
1668
1668
  '''
@@ -143,7 +143,7 @@ class CfnWorkspace(
143
143
  :param scope: Scope in which this resource is defined.
144
144
  :param id: Construct identifier for this resource (unique in its scope).
145
145
  :param account_access_type: Specifies whether the workspace can access AWS resources in this AWS account only, or whether it can also access AWS resources in other accounts in the same organization. If this is ``ORGANIZATION`` , the ``OrganizationalUnits`` parameter specifies which organizational units the workspace can access.
146
- :param authentication_providers: Specifies whether this workspace uses SAML 2.0, AWS IAM Identity Center (successor to AWS Single Sign-On) , or both to authenticate users for using the Grafana console within a workspace. For more information, see `User authentication in Amazon Managed Grafana <https://docs.aws.amazon.com/grafana/latest/userguide/authentication-in-AMG.html>`_ .
146
+ :param authentication_providers: Specifies whether this workspace uses SAML 2.0, AWS IAM Identity Center , or both to authenticate users for using the Grafana console within a workspace. For more information, see `User authentication in Amazon Managed Grafana <https://docs.aws.amazon.com/grafana/latest/userguide/authentication-in-AMG.html>`_ .
147
147
  :param permission_type: If this is ``SERVICE_MANAGED`` , and the workplace was created through the Amazon Managed Grafana console, then Amazon Managed Grafana automatically creates the IAM roles and provisions the permissions that the workspace needs to use AWS data sources and notification channels. If this is ``CUSTOMER_MANAGED`` , you must manage those roles and permissions yourself. If you are working with a workspace in a member account of an organization and that account is not a delegated administrator account, and you want the workspace to access data sources in other AWS accounts in the organization, this parameter must be set to ``CUSTOMER_MANAGED`` . For more information about converting between customer and service managed, see `Managing permissions for data sources and notification channels <https://docs.aws.amazon.com/grafana/latest/userguide/AMG-datasource-and-notification.html>`_ . For more information about the roles and permissions that must be managed for customer managed workspaces, see `Amazon Managed Grafana permissions and policies for AWS data sources and notification channels <https://docs.aws.amazon.com/grafana/latest/userguide/AMG-manage-permissions.html>`_
148
148
  :param client_token: A unique, case-sensitive, user-provided identifier to ensure the idempotency of the request.
149
149
  :param data_sources: Specifies the AWS data sources that have been configured to have IAM roles and permissions created to allow Amazon Managed Grafana to read data from these sources. This list is only used when the workspace was created through the AWS console, and the ``permissionType`` is ``SERVICE_MANAGED`` .
@@ -327,7 +327,7 @@ class CfnWorkspace(
327
327
  @builtins.property
328
328
  @jsii.member(jsii_name="authenticationProviders")
329
329
  def authentication_providers(self) -> typing.List[builtins.str]:
330
- '''Specifies whether this workspace uses SAML 2.0, AWS IAM Identity Center (successor to AWS Single Sign-On) , or both to authenticate users for using the Grafana console within a workspace. For more information, see `User authentication in Amazon Managed Grafana <https://docs.aws.amazon.com/grafana/latest/userguide/authentication-in-AMG.html>`_ .'''
330
+ '''Specifies whether this workspace uses SAML 2.0, AWS IAM Identity Center , or both to authenticate users for using the Grafana console within a workspace. For more information, see `User authentication in Amazon Managed Grafana <https://docs.aws.amazon.com/grafana/latest/userguide/authentication-in-AMG.html>`_ .'''
331
331
  return typing.cast(typing.List[builtins.str], jsii.get(self, "authenticationProviders"))
332
332
 
333
333
  @authentication_providers.setter
@@ -1201,7 +1201,7 @@ class CfnWorkspaceProps:
1201
1201
  '''Properties for defining a ``CfnWorkspace``.
1202
1202
 
1203
1203
  :param account_access_type: Specifies whether the workspace can access AWS resources in this AWS account only, or whether it can also access AWS resources in other accounts in the same organization. If this is ``ORGANIZATION`` , the ``OrganizationalUnits`` parameter specifies which organizational units the workspace can access.
1204
- :param authentication_providers: Specifies whether this workspace uses SAML 2.0, AWS IAM Identity Center (successor to AWS Single Sign-On) , or both to authenticate users for using the Grafana console within a workspace. For more information, see `User authentication in Amazon Managed Grafana <https://docs.aws.amazon.com/grafana/latest/userguide/authentication-in-AMG.html>`_ .
1204
+ :param authentication_providers: Specifies whether this workspace uses SAML 2.0, AWS IAM Identity Center , or both to authenticate users for using the Grafana console within a workspace. For more information, see `User authentication in Amazon Managed Grafana <https://docs.aws.amazon.com/grafana/latest/userguide/authentication-in-AMG.html>`_ .
1205
1205
  :param permission_type: If this is ``SERVICE_MANAGED`` , and the workplace was created through the Amazon Managed Grafana console, then Amazon Managed Grafana automatically creates the IAM roles and provisions the permissions that the workspace needs to use AWS data sources and notification channels. If this is ``CUSTOMER_MANAGED`` , you must manage those roles and permissions yourself. If you are working with a workspace in a member account of an organization and that account is not a delegated administrator account, and you want the workspace to access data sources in other AWS accounts in the organization, this parameter must be set to ``CUSTOMER_MANAGED`` . For more information about converting between customer and service managed, see `Managing permissions for data sources and notification channels <https://docs.aws.amazon.com/grafana/latest/userguide/AMG-datasource-and-notification.html>`_ . For more information about the roles and permissions that must be managed for customer managed workspaces, see `Amazon Managed Grafana permissions and policies for AWS data sources and notification channels <https://docs.aws.amazon.com/grafana/latest/userguide/AMG-manage-permissions.html>`_
1206
1206
  :param client_token: A unique, case-sensitive, user-provided identifier to ensure the idempotency of the request.
1207
1207
  :param data_sources: Specifies the AWS data sources that have been configured to have IAM roles and permissions created to allow Amazon Managed Grafana to read data from these sources. This list is only used when the workspace was created through the AWS console, and the ``permissionType`` is ``SERVICE_MANAGED`` .
@@ -1338,7 +1338,7 @@ class CfnWorkspaceProps:
1338
1338
 
1339
1339
  @builtins.property
1340
1340
  def authentication_providers(self) -> typing.List[builtins.str]:
1341
- '''Specifies whether this workspace uses SAML 2.0, AWS IAM Identity Center (successor to AWS Single Sign-On) , or both to authenticate users for using the Grafana console within a workspace. For more information, see `User authentication in Amazon Managed Grafana <https://docs.aws.amazon.com/grafana/latest/userguide/authentication-in-AMG.html>`_ .
1341
+ '''Specifies whether this workspace uses SAML 2.0, AWS IAM Identity Center , or both to authenticate users for using the Grafana console within a workspace. For more information, see `User authentication in Amazon Managed Grafana <https://docs.aws.amazon.com/grafana/latest/userguide/authentication-in-AMG.html>`_ .
1342
1342
 
1343
1343
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-grafana-workspace.html#cfn-grafana-workspace-authenticationproviders
1344
1344
  '''
@@ -72,14 +72,7 @@ class CfnComponentVersion(
72
72
 
73
73
  Create a component from an AWS Lambda function that runs on AWS IoT Greengrass . This creates a recipe and artifacts from the Lambda function's deployment package. You can use this operation to migrate Lambda functions from AWS IoT Greengrass V1 to AWS IoT Greengrass V2 .
74
74
 
75
- This function only accepts Lambda functions that use the following runtimes:
76
-
77
- - Python 2.7 – ``python2.7``
78
- - Python 3.7 – ``python3.7``
79
- - Python 3.8 – ``python3.8``
80
- - Java 8 – ``java8``
81
- - Node.js 10 – ``nodejs10.x``
82
- - Node.js 12 – ``nodejs12.x``
75
+ This function accepts Lambda functions in all supported versions of Python, Node.js, and Java runtimes. AWS IoT Greengrass doesn't apply any additional restrictions on deprecated Lambda runtime versions.
83
76
 
84
77
  To create a component from a Lambda function, specify ``lambdaFunction`` when you call this operation.
85
78