aws-cdk-lib 2.100.0__py3-none-any.whl → 2.101.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk-lib might be problematic. Click here for more details.
- aws_cdk/_jsii/__init__.py +1 -1
- aws_cdk/_jsii/{aws-cdk-lib@2.100.0.jsii.tgz → aws-cdk-lib@2.101.1.jsii.tgz} +0 -0
- aws_cdk/aws_apigatewayv2/__init__.py +0 -8
- aws_cdk/aws_appconfig/__init__.py +101 -18
- aws_cdk/aws_apprunner/__init__.py +5 -2
- aws_cdk/aws_appstream/__init__.py +18 -26
- aws_cdk/aws_cloudfront/__init__.py +251 -3
- aws_cdk/aws_cloudtrail/__init__.py +47 -3
- aws_cdk/aws_cognito/__init__.py +414 -8
- aws_cdk/aws_dlm/__init__.py +10 -9
- aws_cdk/aws_ec2/__init__.py +308 -179
- aws_cdk/aws_events/__init__.py +62 -86
- aws_cdk/aws_fms/__init__.py +3 -3
- aws_cdk/aws_grafana/__init__.py +4 -4
- aws_cdk/aws_greengrassv2/__init__.py +1 -8
- aws_cdk/aws_iot/__init__.py +714 -0
- aws_cdk/aws_iotsitewise/__init__.py +3 -3
- aws_cdk/aws_kinesisanalytics/__init__.py +15 -15
- aws_cdk/aws_kinesisanalyticsv2/__init__.py +15 -15
- aws_cdk/aws_kinesisfirehose/__init__.py +87 -40
- aws_cdk/aws_lambda/__init__.py +34 -4
- aws_cdk/aws_lightsail/__init__.py +3 -1
- aws_cdk/aws_mediatailor/__init__.py +24 -1
- aws_cdk/aws_quicksight/__init__.py +2508 -55
- aws_cdk/aws_rds/__init__.py +121 -51
- aws_cdk/aws_sagemaker/__init__.py +5 -3
- aws_cdk/aws_sns/__init__.py +42 -5
- aws_cdk/aws_ssm/__init__.py +0 -8
- aws_cdk/aws_stepfunctions/__init__.py +233 -16
- aws_cdk/aws_stepfunctions_tasks/__init__.py +926 -27
- aws_cdk/aws_transfer/__init__.py +4 -4
- aws_cdk/aws_workspacesweb/__init__.py +3 -3
- {aws_cdk_lib-2.100.0.dist-info → aws_cdk_lib-2.101.1.dist-info}/METADATA +1 -1
- {aws_cdk_lib-2.100.0.dist-info → aws_cdk_lib-2.101.1.dist-info}/RECORD +38 -38
- {aws_cdk_lib-2.100.0.dist-info → aws_cdk_lib-2.101.1.dist-info}/LICENSE +0 -0
- {aws_cdk_lib-2.100.0.dist-info → aws_cdk_lib-2.101.1.dist-info}/NOTICE +0 -0
- {aws_cdk_lib-2.100.0.dist-info → aws_cdk_lib-2.101.1.dist-info}/WHEEL +0 -0
- {aws_cdk_lib-2.100.0.dist-info → aws_cdk_lib-2.101.1.dist-info}/top_level.txt +0 -0
aws_cdk/aws_events/__init__.py
CHANGED
|
@@ -3325,11 +3325,14 @@ class CfnEventBus(
|
|
|
3325
3325
|
# The values are placeholders you should change.
|
|
3326
3326
|
from aws_cdk import aws_events as events
|
|
3327
3327
|
|
|
3328
|
+
# policy: Any
|
|
3329
|
+
|
|
3328
3330
|
cfn_event_bus = events.CfnEventBus(self, "MyCfnEventBus",
|
|
3329
3331
|
name="name",
|
|
3330
3332
|
|
|
3331
3333
|
# the properties below are optional
|
|
3332
3334
|
event_source_name="eventSourceName",
|
|
3335
|
+
policy=policy,
|
|
3333
3336
|
tags=[events.CfnEventBus.TagEntryProperty(
|
|
3334
3337
|
key="key",
|
|
3335
3338
|
value="value"
|
|
@@ -3344,6 +3347,7 @@ class CfnEventBus(
|
|
|
3344
3347
|
*,
|
|
3345
3348
|
name: builtins.str,
|
|
3346
3349
|
event_source_name: typing.Optional[builtins.str] = None,
|
|
3350
|
+
policy: typing.Any = None,
|
|
3347
3351
|
tags: typing.Optional[typing.Sequence[typing.Union["CfnEventBus.TagEntryProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
3348
3352
|
) -> None:
|
|
3349
3353
|
'''
|
|
@@ -3351,6 +3355,7 @@ class CfnEventBus(
|
|
|
3351
3355
|
:param id: Construct identifier for this resource (unique in its scope).
|
|
3352
3356
|
:param name: The name of the new event bus. Custom event bus names can't contain the ``/`` character, but you can use the ``/`` character in partner event bus names. In addition, for partner event buses, the name must exactly match the name of the partner event source that this event bus is matched to. You can't use the name ``default`` for a custom event bus, as this name is already used for your account's default event bus.
|
|
3353
3357
|
:param event_source_name: If you are creating a partner event bus, this specifies the partner event source that the new event bus will be matched with.
|
|
3358
|
+
:param policy:
|
|
3354
3359
|
:param tags: Tags to associate with the event bus.
|
|
3355
3360
|
'''
|
|
3356
3361
|
if __debug__:
|
|
@@ -3358,7 +3363,7 @@ class CfnEventBus(
|
|
|
3358
3363
|
check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
|
|
3359
3364
|
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
3360
3365
|
props = CfnEventBusProps(
|
|
3361
|
-
name=name, event_source_name=event_source_name, tags=tags
|
|
3366
|
+
name=name, event_source_name=event_source_name, policy=policy, tags=tags
|
|
3362
3367
|
)
|
|
3363
3368
|
|
|
3364
3369
|
jsii.create(self.__class__, self, [scope, id, props])
|
|
@@ -3459,6 +3464,18 @@ class CfnEventBus(
|
|
|
3459
3464
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
3460
3465
|
jsii.set(self, "eventSourceName", value)
|
|
3461
3466
|
|
|
3467
|
+
@builtins.property
|
|
3468
|
+
@jsii.member(jsii_name="policy")
|
|
3469
|
+
def policy(self) -> typing.Any:
|
|
3470
|
+
return typing.cast(typing.Any, jsii.get(self, "policy"))
|
|
3471
|
+
|
|
3472
|
+
@policy.setter
|
|
3473
|
+
def policy(self, value: typing.Any) -> None:
|
|
3474
|
+
if __debug__:
|
|
3475
|
+
type_hints = typing.get_type_hints(_typecheckingstub__6069dbf8a749c1a9a0cd15c07c6efbd2f70dbd4c7e3a6e98efd29bdb8c7acb24)
|
|
3476
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
3477
|
+
jsii.set(self, "policy", value)
|
|
3478
|
+
|
|
3462
3479
|
@builtins.property
|
|
3463
3480
|
@jsii.member(jsii_name="tags")
|
|
3464
3481
|
def tags(self) -> typing.Optional[typing.List["CfnEventBus.TagEntryProperty"]]:
|
|
@@ -4025,6 +4042,7 @@ class CfnEventBusPolicyProps:
|
|
|
4025
4042
|
name_mapping={
|
|
4026
4043
|
"name": "name",
|
|
4027
4044
|
"event_source_name": "eventSourceName",
|
|
4045
|
+
"policy": "policy",
|
|
4028
4046
|
"tags": "tags",
|
|
4029
4047
|
},
|
|
4030
4048
|
)
|
|
@@ -4034,12 +4052,14 @@ class CfnEventBusProps:
|
|
|
4034
4052
|
*,
|
|
4035
4053
|
name: builtins.str,
|
|
4036
4054
|
event_source_name: typing.Optional[builtins.str] = None,
|
|
4055
|
+
policy: typing.Any = None,
|
|
4037
4056
|
tags: typing.Optional[typing.Sequence[typing.Union[CfnEventBus.TagEntryProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
4038
4057
|
) -> None:
|
|
4039
4058
|
'''Properties for defining a ``CfnEventBus``.
|
|
4040
4059
|
|
|
4041
4060
|
:param name: The name of the new event bus. Custom event bus names can't contain the ``/`` character, but you can use the ``/`` character in partner event bus names. In addition, for partner event buses, the name must exactly match the name of the partner event source that this event bus is matched to. You can't use the name ``default`` for a custom event bus, as this name is already used for your account's default event bus.
|
|
4042
4061
|
:param event_source_name: If you are creating a partner event bus, this specifies the partner event source that the new event bus will be matched with.
|
|
4062
|
+
:param policy:
|
|
4043
4063
|
:param tags: Tags to associate with the event bus.
|
|
4044
4064
|
|
|
4045
4065
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-events-eventbus.html
|
|
@@ -4051,11 +4071,14 @@ class CfnEventBusProps:
|
|
|
4051
4071
|
# The values are placeholders you should change.
|
|
4052
4072
|
from aws_cdk import aws_events as events
|
|
4053
4073
|
|
|
4074
|
+
# policy: Any
|
|
4075
|
+
|
|
4054
4076
|
cfn_event_bus_props = events.CfnEventBusProps(
|
|
4055
4077
|
name="name",
|
|
4056
4078
|
|
|
4057
4079
|
# the properties below are optional
|
|
4058
4080
|
event_source_name="eventSourceName",
|
|
4081
|
+
policy=policy,
|
|
4059
4082
|
tags=[events.CfnEventBus.TagEntryProperty(
|
|
4060
4083
|
key="key",
|
|
4061
4084
|
value="value"
|
|
@@ -4066,12 +4089,15 @@ class CfnEventBusProps:
|
|
|
4066
4089
|
type_hints = typing.get_type_hints(_typecheckingstub__79e3f734387b70ada8040490433e9e9ec9b92701ddfb55826c4adc11103c69a9)
|
|
4067
4090
|
check_type(argname="argument name", value=name, expected_type=type_hints["name"])
|
|
4068
4091
|
check_type(argname="argument event_source_name", value=event_source_name, expected_type=type_hints["event_source_name"])
|
|
4092
|
+
check_type(argname="argument policy", value=policy, expected_type=type_hints["policy"])
|
|
4069
4093
|
check_type(argname="argument tags", value=tags, expected_type=type_hints["tags"])
|
|
4070
4094
|
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
4071
4095
|
"name": name,
|
|
4072
4096
|
}
|
|
4073
4097
|
if event_source_name is not None:
|
|
4074
4098
|
self._values["event_source_name"] = event_source_name
|
|
4099
|
+
if policy is not None:
|
|
4100
|
+
self._values["policy"] = policy
|
|
4075
4101
|
if tags is not None:
|
|
4076
4102
|
self._values["tags"] = tags
|
|
4077
4103
|
|
|
@@ -4098,6 +4124,14 @@ class CfnEventBusProps:
|
|
|
4098
4124
|
result = self._values.get("event_source_name")
|
|
4099
4125
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
4100
4126
|
|
|
4127
|
+
@builtins.property
|
|
4128
|
+
def policy(self) -> typing.Any:
|
|
4129
|
+
'''
|
|
4130
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-events-eventbus.html#cfn-events-eventbus-policy
|
|
4131
|
+
'''
|
|
4132
|
+
result = self._values.get("policy")
|
|
4133
|
+
return typing.cast(typing.Any, result)
|
|
4134
|
+
|
|
4101
4135
|
@builtins.property
|
|
4102
4136
|
def tags(self) -> typing.Optional[typing.List[CfnEventBus.TagEntryProperty]]:
|
|
4103
4137
|
'''Tags to associate with the event bus.
|
|
@@ -4255,6 +4289,7 @@ class CfnRule(
|
|
|
4255
4289
|
db_user="dbUser",
|
|
4256
4290
|
secret_manager_arn="secretManagerArn",
|
|
4257
4291
|
sql="sql",
|
|
4292
|
+
sqls=["sqls"],
|
|
4258
4293
|
statement_name="statementName",
|
|
4259
4294
|
with_event=False
|
|
4260
4295
|
),
|
|
@@ -5808,6 +5843,7 @@ class CfnRule(
|
|
|
5808
5843
|
"db_user": "dbUser",
|
|
5809
5844
|
"secret_manager_arn": "secretManagerArn",
|
|
5810
5845
|
"sql": "sql",
|
|
5846
|
+
"sqls": "sqls",
|
|
5811
5847
|
"statement_name": "statementName",
|
|
5812
5848
|
"with_event": "withEvent",
|
|
5813
5849
|
},
|
|
@@ -5820,6 +5856,7 @@ class CfnRule(
|
|
|
5820
5856
|
db_user: typing.Optional[builtins.str] = None,
|
|
5821
5857
|
secret_manager_arn: typing.Optional[builtins.str] = None,
|
|
5822
5858
|
sql: typing.Optional[builtins.str] = None,
|
|
5859
|
+
sqls: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
5823
5860
|
statement_name: typing.Optional[builtins.str] = None,
|
|
5824
5861
|
with_event: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
5825
5862
|
) -> None:
|
|
@@ -5829,6 +5866,7 @@ class CfnRule(
|
|
|
5829
5866
|
:param db_user: The database user name. Required when authenticating using temporary credentials.
|
|
5830
5867
|
:param secret_manager_arn: The name or ARN of the secret that enables access to the database. Required when authenticating using AWS Secrets Manager.
|
|
5831
5868
|
:param sql: The SQL statement text to run.
|
|
5869
|
+
:param sqls:
|
|
5832
5870
|
:param statement_name: The name of the SQL statement. You can name the SQL statement when you create it to identify the query.
|
|
5833
5871
|
:param with_event: Indicates whether to send an event back to EventBridge after the SQL statement runs.
|
|
5834
5872
|
|
|
@@ -5848,6 +5886,7 @@ class CfnRule(
|
|
|
5848
5886
|
db_user="dbUser",
|
|
5849
5887
|
secret_manager_arn="secretManagerArn",
|
|
5850
5888
|
sql="sql",
|
|
5889
|
+
sqls=["sqls"],
|
|
5851
5890
|
statement_name="statementName",
|
|
5852
5891
|
with_event=False
|
|
5853
5892
|
)
|
|
@@ -5858,6 +5897,7 @@ class CfnRule(
|
|
|
5858
5897
|
check_type(argname="argument db_user", value=db_user, expected_type=type_hints["db_user"])
|
|
5859
5898
|
check_type(argname="argument secret_manager_arn", value=secret_manager_arn, expected_type=type_hints["secret_manager_arn"])
|
|
5860
5899
|
check_type(argname="argument sql", value=sql, expected_type=type_hints["sql"])
|
|
5900
|
+
check_type(argname="argument sqls", value=sqls, expected_type=type_hints["sqls"])
|
|
5861
5901
|
check_type(argname="argument statement_name", value=statement_name, expected_type=type_hints["statement_name"])
|
|
5862
5902
|
check_type(argname="argument with_event", value=with_event, expected_type=type_hints["with_event"])
|
|
5863
5903
|
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
@@ -5869,6 +5909,8 @@ class CfnRule(
|
|
|
5869
5909
|
self._values["secret_manager_arn"] = secret_manager_arn
|
|
5870
5910
|
if sql is not None:
|
|
5871
5911
|
self._values["sql"] = sql
|
|
5912
|
+
if sqls is not None:
|
|
5913
|
+
self._values["sqls"] = sqls
|
|
5872
5914
|
if statement_name is not None:
|
|
5873
5915
|
self._values["statement_name"] = statement_name
|
|
5874
5916
|
if with_event is not None:
|
|
@@ -5917,6 +5959,14 @@ class CfnRule(
|
|
|
5917
5959
|
result = self._values.get("sql")
|
|
5918
5960
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
5919
5961
|
|
|
5962
|
+
@builtins.property
|
|
5963
|
+
def sqls(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
5964
|
+
'''
|
|
5965
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-events-rule-redshiftdataparameters.html#cfn-events-rule-redshiftdataparameters-sqls
|
|
5966
|
+
'''
|
|
5967
|
+
result = self._values.get("sqls")
|
|
5968
|
+
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
5969
|
+
|
|
5920
5970
|
@builtins.property
|
|
5921
5971
|
def statement_name(self) -> typing.Optional[builtins.str]:
|
|
5922
5972
|
'''The name of the SQL statement.
|
|
@@ -6339,83 +6389,6 @@ class CfnRule(
|
|
|
6339
6389
|
k + "=" + repr(v) for k, v in self._values.items()
|
|
6340
6390
|
)
|
|
6341
6391
|
|
|
6342
|
-
@jsii.data_type(
|
|
6343
|
-
jsii_type="aws-cdk-lib.aws_events.CfnRule.TagProperty",
|
|
6344
|
-
jsii_struct_bases=[],
|
|
6345
|
-
name_mapping={"key": "key", "value": "value"},
|
|
6346
|
-
)
|
|
6347
|
-
class TagProperty:
|
|
6348
|
-
def __init__(
|
|
6349
|
-
self,
|
|
6350
|
-
*,
|
|
6351
|
-
key: typing.Optional[builtins.str] = None,
|
|
6352
|
-
value: typing.Optional[builtins.str] = None,
|
|
6353
|
-
) -> None:
|
|
6354
|
-
'''A key-value pair associated with an ECS Target of an EventBridge rule.
|
|
6355
|
-
|
|
6356
|
-
The tag will be propagated to ECS by EventBridge when starting an ECS task based on a matched event.
|
|
6357
|
-
.. epigraph::
|
|
6358
|
-
|
|
6359
|
-
Currently, tags are only available when using ECS with EventBridge .
|
|
6360
|
-
|
|
6361
|
-
:param key: A string you can use to assign a value. The combination of tag keys and values can help you organize and categorize your resources.
|
|
6362
|
-
:param value: The value for the specified tag key.
|
|
6363
|
-
|
|
6364
|
-
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-events-rule-tag.html
|
|
6365
|
-
:exampleMetadata: fixture=_generated
|
|
6366
|
-
|
|
6367
|
-
Example::
|
|
6368
|
-
|
|
6369
|
-
# The code below shows an example of how to instantiate this type.
|
|
6370
|
-
# The values are placeholders you should change.
|
|
6371
|
-
from aws_cdk import aws_events as events
|
|
6372
|
-
|
|
6373
|
-
tag_property = events.CfnRule.TagProperty(
|
|
6374
|
-
key="key",
|
|
6375
|
-
value="value"
|
|
6376
|
-
)
|
|
6377
|
-
'''
|
|
6378
|
-
if __debug__:
|
|
6379
|
-
type_hints = typing.get_type_hints(_typecheckingstub__631f1d2d2d85524250006a517cca6b338bebc43b645c2702b2ce2831b61f317a)
|
|
6380
|
-
check_type(argname="argument key", value=key, expected_type=type_hints["key"])
|
|
6381
|
-
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
6382
|
-
self._values: typing.Dict[builtins.str, typing.Any] = {}
|
|
6383
|
-
if key is not None:
|
|
6384
|
-
self._values["key"] = key
|
|
6385
|
-
if value is not None:
|
|
6386
|
-
self._values["value"] = value
|
|
6387
|
-
|
|
6388
|
-
@builtins.property
|
|
6389
|
-
def key(self) -> typing.Optional[builtins.str]:
|
|
6390
|
-
'''A string you can use to assign a value.
|
|
6391
|
-
|
|
6392
|
-
The combination of tag keys and values can help you organize and categorize your resources.
|
|
6393
|
-
|
|
6394
|
-
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-events-rule-tag.html#cfn-events-rule-tag-key
|
|
6395
|
-
'''
|
|
6396
|
-
result = self._values.get("key")
|
|
6397
|
-
return typing.cast(typing.Optional[builtins.str], result)
|
|
6398
|
-
|
|
6399
|
-
@builtins.property
|
|
6400
|
-
def value(self) -> typing.Optional[builtins.str]:
|
|
6401
|
-
'''The value for the specified tag key.
|
|
6402
|
-
|
|
6403
|
-
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-events-rule-tag.html#cfn-events-rule-tag-value
|
|
6404
|
-
'''
|
|
6405
|
-
result = self._values.get("value")
|
|
6406
|
-
return typing.cast(typing.Optional[builtins.str], result)
|
|
6407
|
-
|
|
6408
|
-
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
6409
|
-
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
6410
|
-
|
|
6411
|
-
def __ne__(self, rhs: typing.Any) -> builtins.bool:
|
|
6412
|
-
return not (rhs == self)
|
|
6413
|
-
|
|
6414
|
-
def __repr__(self) -> str:
|
|
6415
|
-
return "TagProperty(%s)" % ", ".join(
|
|
6416
|
-
k + "=" + repr(v) for k, v in self._values.items()
|
|
6417
|
-
)
|
|
6418
|
-
|
|
6419
6392
|
@jsii.data_type(
|
|
6420
6393
|
jsii_type="aws-cdk-lib.aws_events.CfnRule.TargetProperty",
|
|
6421
6394
|
jsii_struct_bases=[],
|
|
@@ -6581,6 +6554,7 @@ class CfnRule(
|
|
|
6581
6554
|
db_user="dbUser",
|
|
6582
6555
|
secret_manager_arn="secretManagerArn",
|
|
6583
6556
|
sql="sql",
|
|
6557
|
+
sqls=["sqls"],
|
|
6584
6558
|
statement_name="statementName",
|
|
6585
6559
|
with_event=False
|
|
6586
6560
|
),
|
|
@@ -7008,6 +6982,7 @@ class CfnRuleProps:
|
|
|
7008
6982
|
db_user="dbUser",
|
|
7009
6983
|
secret_manager_arn="secretManagerArn",
|
|
7010
6984
|
sql="sql",
|
|
6985
|
+
sqls=["sqls"],
|
|
7011
6986
|
statement_name="statementName",
|
|
7012
6987
|
with_event=False
|
|
7013
6988
|
),
|
|
@@ -11643,6 +11618,7 @@ def _typecheckingstub__5766595a149723459145d9f55c6afa7ed3017d49f4af7cec85e0fffe2
|
|
|
11643
11618
|
*,
|
|
11644
11619
|
name: builtins.str,
|
|
11645
11620
|
event_source_name: typing.Optional[builtins.str] = None,
|
|
11621
|
+
policy: typing.Any = None,
|
|
11646
11622
|
tags: typing.Optional[typing.Sequence[typing.Union[CfnEventBus.TagEntryProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
11647
11623
|
) -> None:
|
|
11648
11624
|
"""Type checking stubs"""
|
|
@@ -11672,6 +11648,12 @@ def _typecheckingstub__1c09871ed225f5073f64a2472bb4ad2653f751351d1d800cc2db527a4
|
|
|
11672
11648
|
"""Type checking stubs"""
|
|
11673
11649
|
pass
|
|
11674
11650
|
|
|
11651
|
+
def _typecheckingstub__6069dbf8a749c1a9a0cd15c07c6efbd2f70dbd4c7e3a6e98efd29bdb8c7acb24(
|
|
11652
|
+
value: typing.Any,
|
|
11653
|
+
) -> None:
|
|
11654
|
+
"""Type checking stubs"""
|
|
11655
|
+
pass
|
|
11656
|
+
|
|
11675
11657
|
def _typecheckingstub__7839bb5f17e47516f1a7287848eb4905b08ca899cd21b2544645df1f4bedb748(
|
|
11676
11658
|
value: typing.Optional[typing.List[CfnEventBus.TagEntryProperty]],
|
|
11677
11659
|
) -> None:
|
|
@@ -11773,6 +11755,7 @@ def _typecheckingstub__79e3f734387b70ada8040490433e9e9ec9b92701ddfb55826c4adc111
|
|
|
11773
11755
|
*,
|
|
11774
11756
|
name: builtins.str,
|
|
11775
11757
|
event_source_name: typing.Optional[builtins.str] = None,
|
|
11758
|
+
policy: typing.Any = None,
|
|
11776
11759
|
tags: typing.Optional[typing.Sequence[typing.Union[CfnEventBus.TagEntryProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
11777
11760
|
) -> None:
|
|
11778
11761
|
"""Type checking stubs"""
|
|
@@ -11976,6 +11959,7 @@ def _typecheckingstub__183646a052d824f887b6e170455aff3fbf5557ac2188f001395f11ea4
|
|
|
11976
11959
|
db_user: typing.Optional[builtins.str] = None,
|
|
11977
11960
|
secret_manager_arn: typing.Optional[builtins.str] = None,
|
|
11978
11961
|
sql: typing.Optional[builtins.str] = None,
|
|
11962
|
+
sqls: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
11979
11963
|
statement_name: typing.Optional[builtins.str] = None,
|
|
11980
11964
|
with_event: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
11981
11965
|
) -> None:
|
|
@@ -12027,14 +12011,6 @@ def _typecheckingstub__0c3b4b126e08cc64ec28ca363e425756d47fd556f940c55bffd86e3ad
|
|
|
12027
12011
|
"""Type checking stubs"""
|
|
12028
12012
|
pass
|
|
12029
12013
|
|
|
12030
|
-
def _typecheckingstub__631f1d2d2d85524250006a517cca6b338bebc43b645c2702b2ce2831b61f317a(
|
|
12031
|
-
*,
|
|
12032
|
-
key: typing.Optional[builtins.str] = None,
|
|
12033
|
-
value: typing.Optional[builtins.str] = None,
|
|
12034
|
-
) -> None:
|
|
12035
|
-
"""Type checking stubs"""
|
|
12036
|
-
pass
|
|
12037
|
-
|
|
12038
12014
|
def _typecheckingstub__0bb173839da3c22730cab96567bb586361722029ca0fab74f2c0ebd9eea2ed31(
|
|
12039
12015
|
*,
|
|
12040
12016
|
arn: builtins.str,
|
aws_cdk/aws_fms/__init__.py
CHANGED
|
@@ -345,7 +345,7 @@ class CfnPolicy(
|
|
|
345
345
|
:param exclude_map: Specifies the AWS account IDs and AWS Organizations organizational units (OUs) to exclude from the policy. Specifying an OU is the equivalent of specifying all accounts in the OU and in any of its child OUs, including any child OUs and accounts that are added at a later time. You can specify inclusions or exclusions, but not both. If you specify an ``IncludeMap`` , AWS Firewall Manager applies the policy to all accounts specified by the ``IncludeMap`` , and does not evaluate any ``ExcludeMap`` specifications. If you do not specify an ``IncludeMap`` , then Firewall Manager applies the policy to all accounts except for those specified by the ``ExcludeMap`` . You can specify account IDs, OUs, or a combination: - Specify account IDs by setting the key to ``ACCOUNT`` . For example, the following is a valid map: ``{“ACCOUNT” : [“accountID1”, “accountID2”]}`` . - Specify OUs by setting the key to ``ORGUNIT`` . For example, the following is a valid map: ``{“ORGUNIT” : [“ouid111”, “ouid112”]}`` . - Specify accounts and OUs together in a single map, separated with a comma. For example, the following is a valid map: ``{“ACCOUNT” : [“accountID1”, “accountID2”], “ORGUNIT” : [“ouid111”, “ouid112”]}`` .
|
|
346
346
|
:param include_map: Specifies the AWS account IDs and AWS Organizations organizational units (OUs) to include in the policy. Specifying an OU is the equivalent of specifying all accounts in the OU and in any of its child OUs, including any child OUs and accounts that are added at a later time. You can specify inclusions or exclusions, but not both. If you specify an ``IncludeMap`` , AWS Firewall Manager applies the policy to all accounts specified by the ``IncludeMap`` , and does not evaluate any ``ExcludeMap`` specifications. If you do not specify an ``IncludeMap`` , then Firewall Manager applies the policy to all accounts except for those specified by the ``ExcludeMap`` . You can specify account IDs, OUs, or a combination: - Specify account IDs by setting the key to ``ACCOUNT`` . For example, the following is a valid map: ``{“ACCOUNT” : [“accountID1”, “accountID2”]}`` . - Specify OUs by setting the key to ``ORGUNIT`` . For example, the following is a valid map: ``{“ORGUNIT” : [“ouid111”, “ouid112”]}`` . - Specify accounts and OUs together in a single map, separated with a comma. For example, the following is a valid map: ``{“ACCOUNT” : [“accountID1”, “accountID2”], “ORGUNIT” : [“ouid111”, “ouid112”]}`` .
|
|
347
347
|
:param policy_description: The definition of the AWS Network Firewall firewall policy.
|
|
348
|
-
:param resources_clean_up: Indicates whether AWS Firewall Manager should automatically remove protections from resources that leave the policy scope and clean up resources that Firewall Manager is managing for accounts when those accounts leave policy scope. For example, Firewall Manager will disassociate a Firewall Manager managed web ACL from a protected customer resource when the customer resource leaves policy scope. By default, Firewall Manager doesn't remove protections or delete Firewall Manager managed resources. This option is not available for AWS WAF Classic policies.
|
|
348
|
+
:param resources_clean_up: Indicates whether AWS Firewall Manager should automatically remove protections from resources that leave the policy scope and clean up resources that Firewall Manager is managing for accounts when those accounts leave policy scope. For example, Firewall Manager will disassociate a Firewall Manager managed web ACL from a protected customer resource when the customer resource leaves policy scope. By default, Firewall Manager doesn't remove protections or delete Firewall Manager managed resources. This option is not available for Shield Advanced or AWS WAF Classic policies.
|
|
349
349
|
:param resource_set_ids: The unique identifiers of the resource sets used by the policy.
|
|
350
350
|
:param resource_tags: An array of ``ResourceTag`` objects, used to explicitly include resources in the policy scope or explicitly exclude them. If this isn't set, then tags aren't used to modify policy scope. See also ``ExcludeResourceTags`` .
|
|
351
351
|
:param resource_type: The type of resource protected by or in scope of the policy. This is in the format shown in the `AWS Resource Types Reference <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-template-resource-type-ref.html>`_ . To apply this policy to multiple resource types, specify a resource type of ``ResourceTypeList`` and then specify the resource types in a ``ResourceTypeList`` . For AWS WAF and Shield Advanced, example resource types include ``AWS::ElasticLoadBalancingV2::LoadBalancer`` and ``AWS::CloudFront::Distribution`` . For a security group common policy, valid values are ``AWS::EC2::NetworkInterface`` and ``AWS::EC2::Instance`` . For a security group content audit policy, valid values are ``AWS::EC2::SecurityGroup`` , ``AWS::EC2::NetworkInterface`` , and ``AWS::EC2::Instance`` . For a security group usage audit policy, the value is ``AWS::EC2::SecurityGroup`` . For an AWS Network Firewall policy or DNS Firewall policy, the value is ``AWS::EC2::VPC`` .
|
|
@@ -1324,7 +1324,7 @@ class CfnPolicyProps:
|
|
|
1324
1324
|
:param exclude_map: Specifies the AWS account IDs and AWS Organizations organizational units (OUs) to exclude from the policy. Specifying an OU is the equivalent of specifying all accounts in the OU and in any of its child OUs, including any child OUs and accounts that are added at a later time. You can specify inclusions or exclusions, but not both. If you specify an ``IncludeMap`` , AWS Firewall Manager applies the policy to all accounts specified by the ``IncludeMap`` , and does not evaluate any ``ExcludeMap`` specifications. If you do not specify an ``IncludeMap`` , then Firewall Manager applies the policy to all accounts except for those specified by the ``ExcludeMap`` . You can specify account IDs, OUs, or a combination: - Specify account IDs by setting the key to ``ACCOUNT`` . For example, the following is a valid map: ``{“ACCOUNT” : [“accountID1”, “accountID2”]}`` . - Specify OUs by setting the key to ``ORGUNIT`` . For example, the following is a valid map: ``{“ORGUNIT” : [“ouid111”, “ouid112”]}`` . - Specify accounts and OUs together in a single map, separated with a comma. For example, the following is a valid map: ``{“ACCOUNT” : [“accountID1”, “accountID2”], “ORGUNIT” : [“ouid111”, “ouid112”]}`` .
|
|
1325
1325
|
:param include_map: Specifies the AWS account IDs and AWS Organizations organizational units (OUs) to include in the policy. Specifying an OU is the equivalent of specifying all accounts in the OU and in any of its child OUs, including any child OUs and accounts that are added at a later time. You can specify inclusions or exclusions, but not both. If you specify an ``IncludeMap`` , AWS Firewall Manager applies the policy to all accounts specified by the ``IncludeMap`` , and does not evaluate any ``ExcludeMap`` specifications. If you do not specify an ``IncludeMap`` , then Firewall Manager applies the policy to all accounts except for those specified by the ``ExcludeMap`` . You can specify account IDs, OUs, or a combination: - Specify account IDs by setting the key to ``ACCOUNT`` . For example, the following is a valid map: ``{“ACCOUNT” : [“accountID1”, “accountID2”]}`` . - Specify OUs by setting the key to ``ORGUNIT`` . For example, the following is a valid map: ``{“ORGUNIT” : [“ouid111”, “ouid112”]}`` . - Specify accounts and OUs together in a single map, separated with a comma. For example, the following is a valid map: ``{“ACCOUNT” : [“accountID1”, “accountID2”], “ORGUNIT” : [“ouid111”, “ouid112”]}`` .
|
|
1326
1326
|
:param policy_description: The definition of the AWS Network Firewall firewall policy.
|
|
1327
|
-
:param resources_clean_up: Indicates whether AWS Firewall Manager should automatically remove protections from resources that leave the policy scope and clean up resources that Firewall Manager is managing for accounts when those accounts leave policy scope. For example, Firewall Manager will disassociate a Firewall Manager managed web ACL from a protected customer resource when the customer resource leaves policy scope. By default, Firewall Manager doesn't remove protections or delete Firewall Manager managed resources. This option is not available for AWS WAF Classic policies.
|
|
1327
|
+
:param resources_clean_up: Indicates whether AWS Firewall Manager should automatically remove protections from resources that leave the policy scope and clean up resources that Firewall Manager is managing for accounts when those accounts leave policy scope. For example, Firewall Manager will disassociate a Firewall Manager managed web ACL from a protected customer resource when the customer resource leaves policy scope. By default, Firewall Manager doesn't remove protections or delete Firewall Manager managed resources. This option is not available for Shield Advanced or AWS WAF Classic policies.
|
|
1328
1328
|
:param resource_set_ids: The unique identifiers of the resource sets used by the policy.
|
|
1329
1329
|
:param resource_tags: An array of ``ResourceTag`` objects, used to explicitly include resources in the policy scope or explicitly exclude them. If this isn't set, then tags aren't used to modify policy scope. See also ``ExcludeResourceTags`` .
|
|
1330
1330
|
:param resource_type: The type of resource protected by or in scope of the policy. This is in the format shown in the `AWS Resource Types Reference <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-template-resource-type-ref.html>`_ . To apply this policy to multiple resource types, specify a resource type of ``ResourceTypeList`` and then specify the resource types in a ``ResourceTypeList`` . For AWS WAF and Shield Advanced, example resource types include ``AWS::ElasticLoadBalancingV2::LoadBalancer`` and ``AWS::CloudFront::Distribution`` . For a security group common policy, valid values are ``AWS::EC2::NetworkInterface`` and ``AWS::EC2::Instance`` . For a security group content audit policy, valid values are ``AWS::EC2::SecurityGroup`` , ``AWS::EC2::NetworkInterface`` , and ``AWS::EC2::Instance`` . For a security group usage audit policy, the value is ``AWS::EC2::SecurityGroup`` . For an AWS Network Firewall policy or DNS Firewall policy, the value is ``AWS::EC2::VPC`` .
|
|
@@ -1662,7 +1662,7 @@ class CfnPolicyProps:
|
|
|
1662
1662
|
|
|
1663
1663
|
By default, Firewall Manager doesn't remove protections or delete Firewall Manager managed resources.
|
|
1664
1664
|
|
|
1665
|
-
This option is not available for AWS WAF Classic policies.
|
|
1665
|
+
This option is not available for Shield Advanced or AWS WAF Classic policies.
|
|
1666
1666
|
|
|
1667
1667
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-fms-policy.html#cfn-fms-policy-resourcescleanup
|
|
1668
1668
|
'''
|
aws_cdk/aws_grafana/__init__.py
CHANGED
|
@@ -143,7 +143,7 @@ class CfnWorkspace(
|
|
|
143
143
|
:param scope: Scope in which this resource is defined.
|
|
144
144
|
:param id: Construct identifier for this resource (unique in its scope).
|
|
145
145
|
:param account_access_type: Specifies whether the workspace can access AWS resources in this AWS account only, or whether it can also access AWS resources in other accounts in the same organization. If this is ``ORGANIZATION`` , the ``OrganizationalUnits`` parameter specifies which organizational units the workspace can access.
|
|
146
|
-
:param authentication_providers: Specifies whether this workspace uses SAML 2.0, AWS IAM Identity Center
|
|
146
|
+
:param authentication_providers: Specifies whether this workspace uses SAML 2.0, AWS IAM Identity Center , or both to authenticate users for using the Grafana console within a workspace. For more information, see `User authentication in Amazon Managed Grafana <https://docs.aws.amazon.com/grafana/latest/userguide/authentication-in-AMG.html>`_ .
|
|
147
147
|
:param permission_type: If this is ``SERVICE_MANAGED`` , and the workplace was created through the Amazon Managed Grafana console, then Amazon Managed Grafana automatically creates the IAM roles and provisions the permissions that the workspace needs to use AWS data sources and notification channels. If this is ``CUSTOMER_MANAGED`` , you must manage those roles and permissions yourself. If you are working with a workspace in a member account of an organization and that account is not a delegated administrator account, and you want the workspace to access data sources in other AWS accounts in the organization, this parameter must be set to ``CUSTOMER_MANAGED`` . For more information about converting between customer and service managed, see `Managing permissions for data sources and notification channels <https://docs.aws.amazon.com/grafana/latest/userguide/AMG-datasource-and-notification.html>`_ . For more information about the roles and permissions that must be managed for customer managed workspaces, see `Amazon Managed Grafana permissions and policies for AWS data sources and notification channels <https://docs.aws.amazon.com/grafana/latest/userguide/AMG-manage-permissions.html>`_
|
|
148
148
|
:param client_token: A unique, case-sensitive, user-provided identifier to ensure the idempotency of the request.
|
|
149
149
|
:param data_sources: Specifies the AWS data sources that have been configured to have IAM roles and permissions created to allow Amazon Managed Grafana to read data from these sources. This list is only used when the workspace was created through the AWS console, and the ``permissionType`` is ``SERVICE_MANAGED`` .
|
|
@@ -327,7 +327,7 @@ class CfnWorkspace(
|
|
|
327
327
|
@builtins.property
|
|
328
328
|
@jsii.member(jsii_name="authenticationProviders")
|
|
329
329
|
def authentication_providers(self) -> typing.List[builtins.str]:
|
|
330
|
-
'''Specifies whether this workspace uses SAML 2.0, AWS IAM Identity Center
|
|
330
|
+
'''Specifies whether this workspace uses SAML 2.0, AWS IAM Identity Center , or both to authenticate users for using the Grafana console within a workspace. For more information, see `User authentication in Amazon Managed Grafana <https://docs.aws.amazon.com/grafana/latest/userguide/authentication-in-AMG.html>`_ .'''
|
|
331
331
|
return typing.cast(typing.List[builtins.str], jsii.get(self, "authenticationProviders"))
|
|
332
332
|
|
|
333
333
|
@authentication_providers.setter
|
|
@@ -1201,7 +1201,7 @@ class CfnWorkspaceProps:
|
|
|
1201
1201
|
'''Properties for defining a ``CfnWorkspace``.
|
|
1202
1202
|
|
|
1203
1203
|
:param account_access_type: Specifies whether the workspace can access AWS resources in this AWS account only, or whether it can also access AWS resources in other accounts in the same organization. If this is ``ORGANIZATION`` , the ``OrganizationalUnits`` parameter specifies which organizational units the workspace can access.
|
|
1204
|
-
:param authentication_providers: Specifies whether this workspace uses SAML 2.0, AWS IAM Identity Center
|
|
1204
|
+
:param authentication_providers: Specifies whether this workspace uses SAML 2.0, AWS IAM Identity Center , or both to authenticate users for using the Grafana console within a workspace. For more information, see `User authentication in Amazon Managed Grafana <https://docs.aws.amazon.com/grafana/latest/userguide/authentication-in-AMG.html>`_ .
|
|
1205
1205
|
:param permission_type: If this is ``SERVICE_MANAGED`` , and the workplace was created through the Amazon Managed Grafana console, then Amazon Managed Grafana automatically creates the IAM roles and provisions the permissions that the workspace needs to use AWS data sources and notification channels. If this is ``CUSTOMER_MANAGED`` , you must manage those roles and permissions yourself. If you are working with a workspace in a member account of an organization and that account is not a delegated administrator account, and you want the workspace to access data sources in other AWS accounts in the organization, this parameter must be set to ``CUSTOMER_MANAGED`` . For more information about converting between customer and service managed, see `Managing permissions for data sources and notification channels <https://docs.aws.amazon.com/grafana/latest/userguide/AMG-datasource-and-notification.html>`_ . For more information about the roles and permissions that must be managed for customer managed workspaces, see `Amazon Managed Grafana permissions and policies for AWS data sources and notification channels <https://docs.aws.amazon.com/grafana/latest/userguide/AMG-manage-permissions.html>`_
|
|
1206
1206
|
:param client_token: A unique, case-sensitive, user-provided identifier to ensure the idempotency of the request.
|
|
1207
1207
|
:param data_sources: Specifies the AWS data sources that have been configured to have IAM roles and permissions created to allow Amazon Managed Grafana to read data from these sources. This list is only used when the workspace was created through the AWS console, and the ``permissionType`` is ``SERVICE_MANAGED`` .
|
|
@@ -1338,7 +1338,7 @@ class CfnWorkspaceProps:
|
|
|
1338
1338
|
|
|
1339
1339
|
@builtins.property
|
|
1340
1340
|
def authentication_providers(self) -> typing.List[builtins.str]:
|
|
1341
|
-
'''Specifies whether this workspace uses SAML 2.0, AWS IAM Identity Center
|
|
1341
|
+
'''Specifies whether this workspace uses SAML 2.0, AWS IAM Identity Center , or both to authenticate users for using the Grafana console within a workspace. For more information, see `User authentication in Amazon Managed Grafana <https://docs.aws.amazon.com/grafana/latest/userguide/authentication-in-AMG.html>`_ .
|
|
1342
1342
|
|
|
1343
1343
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-grafana-workspace.html#cfn-grafana-workspace-authenticationproviders
|
|
1344
1344
|
'''
|
|
@@ -72,14 +72,7 @@ class CfnComponentVersion(
|
|
|
72
72
|
|
|
73
73
|
Create a component from an AWS Lambda function that runs on AWS IoT Greengrass . This creates a recipe and artifacts from the Lambda function's deployment package. You can use this operation to migrate Lambda functions from AWS IoT Greengrass V1 to AWS IoT Greengrass V2 .
|
|
74
74
|
|
|
75
|
-
This function
|
|
76
|
-
|
|
77
|
-
- Python 2.7 – ``python2.7``
|
|
78
|
-
- Python 3.7 – ``python3.7``
|
|
79
|
-
- Python 3.8 – ``python3.8``
|
|
80
|
-
- Java 8 – ``java8``
|
|
81
|
-
- Node.js 10 – ``nodejs10.x``
|
|
82
|
-
- Node.js 12 – ``nodejs12.x``
|
|
75
|
+
This function accepts Lambda functions in all supported versions of Python, Node.js, and Java runtimes. AWS IoT Greengrass doesn't apply any additional restrictions on deprecated Lambda runtime versions.
|
|
83
76
|
|
|
84
77
|
To create a component from a Lambda function, specify ``lambdaFunction`` when you call this operation.
|
|
85
78
|
|