aws-cdk-lib 2.127.0__py3-none-any.whl → 2.129.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk-lib might be problematic. Click here for more details.

Files changed (103) hide show
  1. aws_cdk/__init__.py +6 -10
  2. aws_cdk/_jsii/__init__.py +1 -1
  3. aws_cdk/_jsii/{aws-cdk-lib@2.127.0.jsii.tgz → aws-cdk-lib@2.129.0.jsii.tgz} +0 -0
  4. aws_cdk/aws_amazonmq/__init__.py +6 -24
  5. aws_cdk/aws_amplify/__init__.py +1 -2
  6. aws_cdk/aws_appconfig/__init__.py +0 -16
  7. aws_cdk/aws_applicationautoscaling/__init__.py +55 -22
  8. aws_cdk/aws_appstream/__init__.py +14 -14
  9. aws_cdk/aws_appsync/__init__.py +334 -3
  10. aws_cdk/aws_autoscaling/__init__.py +11 -7
  11. aws_cdk/aws_batch/__init__.py +137 -16
  12. aws_cdk/aws_cleanrooms/__init__.py +1 -2
  13. aws_cdk/aws_cloudformation/__init__.py +2 -10
  14. aws_cdk/aws_cloudfront/__init__.py +15 -8
  15. aws_cdk/aws_cloudfront/experimental/__init__.py +22 -0
  16. aws_cdk/aws_cloudfront_origins/__init__.py +332 -0
  17. aws_cdk/aws_cloudtrail/__init__.py +12 -2
  18. aws_cdk/aws_cloudwatch/__init__.py +925 -133
  19. aws_cdk/aws_codedeploy/__init__.py +69 -0
  20. aws_cdk/aws_codepipeline/__init__.py +1461 -111
  21. aws_cdk/aws_codepipeline_actions/__init__.py +40 -34
  22. aws_cdk/aws_cognito/__init__.py +0 -9
  23. aws_cdk/aws_config/__init__.py +2 -2
  24. aws_cdk/aws_connect/__init__.py +6 -1
  25. aws_cdk/aws_controltower/__init__.py +527 -7
  26. aws_cdk/aws_datasync/__init__.py +2 -2
  27. aws_cdk/aws_directoryservice/__init__.py +2 -3
  28. aws_cdk/aws_dynamodb/__init__.py +7 -0
  29. aws_cdk/aws_ec2/__init__.py +117 -210
  30. aws_cdk/aws_ecs/__init__.py +537 -3
  31. aws_cdk/aws_eks/__init__.py +1 -1
  32. aws_cdk/aws_elasticache/__init__.py +27 -20
  33. aws_cdk/aws_elasticloadbalancingv2/__init__.py +3 -4
  34. aws_cdk/aws_emr/__init__.py +23 -3
  35. aws_cdk/aws_events_targets/__init__.py +64 -20
  36. aws_cdk/aws_fis/__init__.py +4 -4
  37. aws_cdk/aws_frauddetector/__init__.py +3 -3
  38. aws_cdk/aws_globalaccelerator/__init__.py +2 -6
  39. aws_cdk/aws_glue/__init__.py +84 -55
  40. aws_cdk/aws_groundstation/__init__.py +8 -12
  41. aws_cdk/aws_guardduty/__init__.py +74 -70
  42. aws_cdk/aws_iam/__init__.py +16 -23
  43. aws_cdk/aws_imagebuilder/__init__.py +178 -156
  44. aws_cdk/aws_internetmonitor/__init__.py +12 -10
  45. aws_cdk/aws_iot/__init__.py +17 -10
  46. aws_cdk/aws_iotevents/__init__.py +4 -4
  47. aws_cdk/aws_iotfleetwise/__init__.py +10 -5
  48. aws_cdk/aws_iottwinmaker/__init__.py +3 -5
  49. aws_cdk/aws_iotwireless/__init__.py +35 -23
  50. aws_cdk/aws_kendra/__init__.py +36 -15
  51. aws_cdk/aws_kinesisfirehose/__init__.py +155 -114
  52. aws_cdk/aws_lambda/__init__.py +175 -15
  53. aws_cdk/aws_lambda_nodejs/__init__.py +22 -0
  54. aws_cdk/aws_lightsail/__init__.py +14 -18
  55. aws_cdk/aws_logs/__init__.py +15 -15
  56. aws_cdk/aws_mediaconnect/__init__.py +5 -3
  57. aws_cdk/aws_medialive/__init__.py +3 -12
  58. aws_cdk/aws_mediapackagev2/__init__.py +287 -286
  59. aws_cdk/aws_mediatailor/__init__.py +2 -2
  60. aws_cdk/aws_memorydb/__init__.py +2 -2
  61. aws_cdk/aws_msk/__init__.py +6 -3
  62. aws_cdk/aws_mwaa/__init__.py +10 -5
  63. aws_cdk/aws_neptunegraph/__init__.py +84 -66
  64. aws_cdk/aws_networkfirewall/__init__.py +5 -8
  65. aws_cdk/aws_networkmanager/__init__.py +3 -3
  66. aws_cdk/aws_nimblestudio/__init__.py +2 -4
  67. aws_cdk/aws_opensearchservice/__init__.py +6 -7
  68. aws_cdk/aws_osis/__init__.py +1 -3
  69. aws_cdk/aws_pinpoint/__init__.py +5 -5
  70. aws_cdk/aws_pipes/__init__.py +5 -5
  71. aws_cdk/aws_quicksight/__init__.py +5 -10
  72. aws_cdk/aws_rds/__init__.py +38 -21
  73. aws_cdk/aws_redshift/__init__.py +9 -5
  74. aws_cdk/aws_redshiftserverless/__init__.py +62 -38
  75. aws_cdk/aws_rolesanywhere/__init__.py +41 -53
  76. aws_cdk/aws_route53/__init__.py +532 -6
  77. aws_cdk/aws_route53recoverycontrol/__init__.py +1 -3
  78. aws_cdk/aws_route53recoveryreadiness/__init__.py +2 -2
  79. aws_cdk/aws_route53resolver/__init__.py +1 -4
  80. aws_cdk/aws_s3/__init__.py +12 -6
  81. aws_cdk/aws_s3_deployment/__init__.py +29 -0
  82. aws_cdk/aws_s3objectlambda/__init__.py +7 -4
  83. aws_cdk/aws_s3outposts/__init__.py +1 -1
  84. aws_cdk/aws_sagemaker/__init__.py +195 -11
  85. aws_cdk/aws_servicecatalogappregistry/__init__.py +3 -3
  86. aws_cdk/aws_ses/__init__.py +166 -9
  87. aws_cdk/aws_sns/__init__.py +185 -38
  88. aws_cdk/aws_sqs/__init__.py +10 -12
  89. aws_cdk/aws_ssm/__init__.py +16 -16
  90. aws_cdk/aws_ssmincidents/__init__.py +1 -1
  91. aws_cdk/aws_synthetics/__init__.py +94 -21
  92. aws_cdk/aws_verifiedpermissions/__init__.py +1 -2
  93. aws_cdk/aws_vpclattice/__init__.py +8 -4
  94. aws_cdk/aws_wafv2/__init__.py +14 -59
  95. aws_cdk/aws_workspaces/__init__.py +5 -4
  96. aws_cdk/aws_workspacesweb/__init__.py +6 -12
  97. aws_cdk/triggers/__init__.py +22 -0
  98. {aws_cdk_lib-2.127.0.dist-info → aws_cdk_lib-2.129.0.dist-info}/METADATA +1 -1
  99. {aws_cdk_lib-2.127.0.dist-info → aws_cdk_lib-2.129.0.dist-info}/RECORD +103 -103
  100. {aws_cdk_lib-2.127.0.dist-info → aws_cdk_lib-2.129.0.dist-info}/LICENSE +0 -0
  101. {aws_cdk_lib-2.127.0.dist-info → aws_cdk_lib-2.129.0.dist-info}/NOTICE +0 -0
  102. {aws_cdk_lib-2.127.0.dist-info → aws_cdk_lib-2.129.0.dist-info}/WHEEL +0 -0
  103. {aws_cdk_lib-2.127.0.dist-info → aws_cdk_lib-2.129.0.dist-info}/top_level.txt +0 -0
@@ -809,7 +809,7 @@ class CfnLoggingConfiguration(
809
809
 
810
810
  ``"FieldToMatch": { "Method": { "Name": "DELETE" } }``
811
811
 
812
- :param json_body: Redact the request body JSON.
812
+ :param json_body:
813
813
  :param method: Redact the indicated HTTP method. The method indicates the type of operation that the request is asking the origin to perform.
814
814
  :param query_string: Redact the query string. This is the part of a URL that appears after a ``?`` character, if any.
815
815
  :param single_header: Redact a single header. Provide the name of the header to inspect, for example, ``User-Agent`` or ``Referer`` . This setting isn't case sensitive. Example JSON: ``"SingleHeader": { "Name": "haystack" }``
@@ -859,8 +859,7 @@ class CfnLoggingConfiguration(
859
859
 
860
860
  @builtins.property
861
861
  def json_body(self) -> typing.Any:
862
- '''Redact the request body JSON.
863
-
862
+ '''
864
863
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-loggingconfiguration-fieldtomatch.html#cfn-wafv2-loggingconfiguration-fieldtomatch-jsonbody
865
864
  '''
866
865
  result = self._values.get("json_body")
@@ -1041,17 +1040,10 @@ class CfnLoggingConfiguration(
1041
1040
  match_scope: builtins.str,
1042
1041
  invalid_fallback_behavior: typing.Optional[builtins.str] = None,
1043
1042
  ) -> None:
1044
- '''Inspect the body of the web request as JSON. The body immediately follows the request headers.
1045
-
1046
- This is used to indicate the web request component to inspect, in the ``FieldToMatch`` specification.
1047
-
1048
- Use the specifications in this object to indicate which parts of the JSON body to inspect using the rule's inspection criteria. AWS WAF inspects only the parts of the JSON that result from the matches that you indicate.
1049
-
1050
- Example JSON: ``"JsonBody": { "MatchPattern": { "All": {} }, "MatchScope": "ALL" }``
1051
-
1052
- :param match_pattern: The patterns to look for in the JSON body. AWS WAF inspects the results of these pattern matches against the rule inspection criteria.
1053
- :param match_scope: The parts of the JSON to match against using the ``MatchPattern`` . If you specify ``ALL`` , AWS WAF matches against keys and values. ``All`` does not require a match to be found in the keys and a match to be found in the values. It requires a match to be found in the keys or the values or both. To require a match in the keys and in the values, use a logical ``AND`` statement to combine two match rules, one that inspects the keys and another that inspects the values.
1054
- :param invalid_fallback_behavior: What AWS WAF should do if it fails to completely parse the JSON body. The options are the following:. - ``EVALUATE_AS_STRING`` - Inspect the body as plain text. AWS WAF applies the text transformations and inspection criteria that you defined for the JSON inspection to the body text string. - ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request. - ``NO_MATCH`` - Treat the web request as not matching the rule statement. If you don't provide this setting, AWS WAF parses and evaluates the content only up to the first parsing failure that it encounters. AWS WAF does its best to parse the entire JSON body, but might be forced to stop for reasons such as invalid characters, duplicate keys, truncation, and any content whose root node isn't an object or an array. AWS WAF parses the JSON in the following examples as two valid key, value pairs: - Missing comma: ``{"key1":"value1""key2":"value2"}`` - Missing colon: ``{"key1":"value1","key2""value2"}`` - Extra colons: ``{"key1"::"value1","key2""value2"}``
1043
+ '''
1044
+ :param match_pattern:
1045
+ :param match_scope:
1046
+ :param invalid_fallback_behavior:
1055
1047
 
1056
1048
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-loggingconfiguration-jsonbody.html
1057
1049
  :exampleMetadata: fixture=_generated
@@ -1091,10 +1083,7 @@ class CfnLoggingConfiguration(
1091
1083
  def match_pattern(
1092
1084
  self,
1093
1085
  ) -> typing.Union[_IResolvable_da3f097b, "CfnLoggingConfiguration.MatchPatternProperty"]:
1094
- '''The patterns to look for in the JSON body.
1095
-
1096
- AWS WAF inspects the results of these pattern matches against the rule inspection criteria.
1097
-
1086
+ '''
1098
1087
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-loggingconfiguration-jsonbody.html#cfn-wafv2-loggingconfiguration-jsonbody-matchpattern
1099
1088
  '''
1100
1089
  result = self._values.get("match_pattern")
@@ -1103,12 +1092,7 @@ class CfnLoggingConfiguration(
1103
1092
 
1104
1093
  @builtins.property
1105
1094
  def match_scope(self) -> builtins.str:
1106
- '''The parts of the JSON to match against using the ``MatchPattern`` .
1107
-
1108
- If you specify ``ALL`` , AWS WAF matches against keys and values.
1109
-
1110
- ``All`` does not require a match to be found in the keys and a match to be found in the values. It requires a match to be found in the keys or the values or both. To require a match in the keys and in the values, use a logical ``AND`` statement to combine two match rules, one that inspects the keys and another that inspects the values.
1111
-
1095
+ '''
1112
1096
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-loggingconfiguration-jsonbody.html#cfn-wafv2-loggingconfiguration-jsonbody-matchscope
1113
1097
  '''
1114
1098
  result = self._values.get("match_scope")
@@ -1117,22 +1101,7 @@ class CfnLoggingConfiguration(
1117
1101
 
1118
1102
  @builtins.property
1119
1103
  def invalid_fallback_behavior(self) -> typing.Optional[builtins.str]:
1120
- '''What AWS WAF should do if it fails to completely parse the JSON body. The options are the following:.
1121
-
1122
- - ``EVALUATE_AS_STRING`` - Inspect the body as plain text. AWS WAF applies the text transformations and inspection criteria that you defined for the JSON inspection to the body text string.
1123
- - ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request.
1124
- - ``NO_MATCH`` - Treat the web request as not matching the rule statement.
1125
-
1126
- If you don't provide this setting, AWS WAF parses and evaluates the content only up to the first parsing failure that it encounters.
1127
-
1128
- AWS WAF does its best to parse the entire JSON body, but might be forced to stop for reasons such as invalid characters, duplicate keys, truncation, and any content whose root node isn't an object or an array.
1129
-
1130
- AWS WAF parses the JSON in the following examples as two valid key, value pairs:
1131
-
1132
- - Missing comma: ``{"key1":"value1""key2":"value2"}``
1133
- - Missing colon: ``{"key1":"value1","key2""value2"}``
1134
- - Extra colons: ``{"key1"::"value1","key2""value2"}``
1135
-
1104
+ '''
1136
1105
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-loggingconfiguration-jsonbody.html#cfn-wafv2-loggingconfiguration-jsonbody-invalidfallbackbehavior
1137
1106
  '''
1138
1107
  result = self._values.get("invalid_fallback_behavior")
@@ -1301,12 +1270,9 @@ class CfnLoggingConfiguration(
1301
1270
  all: typing.Any = None,
1302
1271
  included_paths: typing.Optional[typing.Sequence[builtins.str]] = None,
1303
1272
  ) -> None:
1304
- '''The patterns to look for in the JSON body.
1305
-
1306
- AWS WAF inspects the results of these pattern matches against the rule inspection criteria.
1307
-
1308
- :param all: Match all of the elements. You must specify either this setting or the ``IncludedPaths`` setting, but not both.
1309
- :param included_paths: Match only the specified include paths. Provide the include paths using JSON Pointer syntax. For example, ``"IncludedPaths": ["/dogs/0/name", "/dogs/1/name"]`` . For information about this syntax, see the Internet Engineering Task Force (IETF) documentation `JavaScript Object Notation (JSON) Pointer <https://docs.aws.amazon.com/https://tools.ietf.org/html/rfc6901>`_ . You must specify either this setting or the ``All`` setting, but not both. .. epigraph:: Don't use this option to include all paths. Instead, use the ``All`` setting.
1273
+ '''
1274
+ :param all:
1275
+ :param included_paths:
1310
1276
 
1311
1277
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-loggingconfiguration-matchpattern.html
1312
1278
  :exampleMetadata: fixture=_generated
@@ -1336,10 +1302,7 @@ class CfnLoggingConfiguration(
1336
1302
 
1337
1303
  @builtins.property
1338
1304
  def all(self) -> typing.Any:
1339
- '''Match all of the elements.
1340
-
1341
- You must specify either this setting or the ``IncludedPaths`` setting, but not both.
1342
-
1305
+ '''
1343
1306
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-loggingconfiguration-matchpattern.html#cfn-wafv2-loggingconfiguration-matchpattern-all
1344
1307
  '''
1345
1308
  result = self._values.get("all")
@@ -1347,15 +1310,7 @@ class CfnLoggingConfiguration(
1347
1310
 
1348
1311
  @builtins.property
1349
1312
  def included_paths(self) -> typing.Optional[typing.List[builtins.str]]:
1350
- '''Match only the specified include paths.
1351
-
1352
- Provide the include paths using JSON Pointer syntax. For example, ``"IncludedPaths": ["/dogs/0/name", "/dogs/1/name"]`` . For information about this syntax, see the Internet Engineering Task Force (IETF) documentation `JavaScript Object Notation (JSON) Pointer <https://docs.aws.amazon.com/https://tools.ietf.org/html/rfc6901>`_ .
1353
-
1354
- You must specify either this setting or the ``All`` setting, but not both.
1355
- .. epigraph::
1356
-
1357
- Don't use this option to include all paths. Instead, use the ``All`` setting.
1358
-
1313
+ '''
1359
1314
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-loggingconfiguration-matchpattern.html#cfn-wafv2-loggingconfiguration-matchpattern-includedpaths
1360
1315
  '''
1361
1316
  result = self._values.get("included_paths")
@@ -146,8 +146,7 @@ class CfnConnectionAlias(
146
146
  @builtins.property
147
147
  @jsii.member(jsii_name="attrAssociations")
148
148
  def attr_associations(self) -> _IResolvable_da3f097b:
149
- '''The association status of the connection alias.
150
-
149
+ '''
151
150
  :cloudformationAttribute: Associations
152
151
  '''
153
152
  return typing.cast(_IResolvable_da3f097b, jsii.get(self, "attrAssociations"))
@@ -449,7 +448,7 @@ class CfnWorkspace(
449
448
  :param id: Construct identifier for this resource (unique in its scope).
450
449
  :param bundle_id: The identifier of the bundle for the WorkSpace.
451
450
  :param directory_id: The identifier of the AWS Directory Service directory for the WorkSpace.
452
- :param user_name: The user name of the user for the WorkSpace. This user name must exist in the AWS Directory Service directory for the WorkSpace.
451
+ :param user_name: The user name of the user for the WorkSpace. This user name must exist in the AWS Directory Service directory for the WorkSpace. The reserved keyword, ``[UNDEFINED]`` , is used when creating user-decoupled WorkSpaces.
453
452
  :param root_volume_encryption_enabled: Indicates whether the data stored on the root volume is encrypted.
454
453
  :param tags: The tags for the WorkSpace.
455
454
  :param user_volume_encryption_enabled: Indicates whether the data stored on the user volume is encrypted.
@@ -809,7 +808,7 @@ class CfnWorkspaceProps:
809
808
 
810
809
  :param bundle_id: The identifier of the bundle for the WorkSpace.
811
810
  :param directory_id: The identifier of the AWS Directory Service directory for the WorkSpace.
812
- :param user_name: The user name of the user for the WorkSpace. This user name must exist in the AWS Directory Service directory for the WorkSpace.
811
+ :param user_name: The user name of the user for the WorkSpace. This user name must exist in the AWS Directory Service directory for the WorkSpace. The reserved keyword, ``[UNDEFINED]`` , is used when creating user-decoupled WorkSpaces.
813
812
  :param root_volume_encryption_enabled: Indicates whether the data stored on the root volume is encrypted.
814
813
  :param tags: The tags for the WorkSpace.
815
814
  :param user_volume_encryption_enabled: Indicates whether the data stored on the user volume is encrypted.
@@ -899,6 +898,8 @@ class CfnWorkspaceProps:
899
898
 
900
899
  This user name must exist in the AWS Directory Service directory for the WorkSpace.
901
900
 
901
+ The reserved keyword, ``[UNDEFINED]`` , is used when creating user-decoupled WorkSpaces.
902
+
902
903
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-workspaces-workspace.html#cfn-workspaces-workspace-username
903
904
  '''
904
905
  result = self._values.get("user_name")
@@ -156,8 +156,7 @@ class CfnBrowserSettings(
156
156
  @builtins.property
157
157
  @jsii.member(jsii_name="attrAssociatedPortalArns")
158
158
  def attr_associated_portal_arns(self) -> typing.List[builtins.str]:
159
- '''A list of web portal ARNs that the browser settings resource is associated with.
160
-
159
+ '''
161
160
  :cloudformationAttribute: AssociatedPortalArns
162
161
  '''
163
162
  return typing.cast(typing.List[builtins.str], jsii.get(self, "attrAssociatedPortalArns"))
@@ -776,8 +775,7 @@ class CfnIpAccessSettings(
776
775
  @builtins.property
777
776
  @jsii.member(jsii_name="attrAssociatedPortalArns")
778
777
  def attr_associated_portal_arns(self) -> typing.List[builtins.str]:
779
- '''A list of web portal ARNs that this IP access settings resource is associated with.
780
-
778
+ '''
781
779
  :cloudformationAttribute: AssociatedPortalArns
782
780
  '''
783
781
  return typing.cast(typing.List[builtins.str], jsii.get(self, "attrAssociatedPortalArns"))
@@ -1229,8 +1227,7 @@ class CfnNetworkSettings(
1229
1227
  @builtins.property
1230
1228
  @jsii.member(jsii_name="attrAssociatedPortalArns")
1231
1229
  def attr_associated_portal_arns(self) -> typing.List[builtins.str]:
1232
- '''A list of web portal ARNs that this network settings is associated with.
1233
-
1230
+ '''
1234
1231
  :cloudformationAttribute: AssociatedPortalArns
1235
1232
  '''
1236
1233
  return typing.cast(typing.List[builtins.str], jsii.get(self, "attrAssociatedPortalArns"))
@@ -2104,8 +2101,7 @@ class CfnTrustStore(
2104
2101
  @builtins.property
2105
2102
  @jsii.member(jsii_name="attrAssociatedPortalArns")
2106
2103
  def attr_associated_portal_arns(self) -> typing.List[builtins.str]:
2107
- '''A list of web portal ARNs that this trust store is associated with.
2108
-
2104
+ '''
2109
2105
  :cloudformationAttribute: AssociatedPortalArns
2110
2106
  '''
2111
2107
  return typing.cast(typing.List[builtins.str], jsii.get(self, "attrAssociatedPortalArns"))
@@ -2322,8 +2318,7 @@ class CfnUserAccessLoggingSettings(
2322
2318
  @builtins.property
2323
2319
  @jsii.member(jsii_name="attrAssociatedPortalArns")
2324
2320
  def attr_associated_portal_arns(self) -> typing.List[builtins.str]:
2325
- '''A list of web portal ARNs that this user access logging settings is associated with.
2326
-
2321
+ '''
2327
2322
  :cloudformationAttribute: AssociatedPortalArns
2328
2323
  '''
2329
2324
  return typing.cast(typing.List[builtins.str], jsii.get(self, "attrAssociatedPortalArns"))
@@ -2592,8 +2587,7 @@ class CfnUserSettings(
2592
2587
  @builtins.property
2593
2588
  @jsii.member(jsii_name="attrAssociatedPortalArns")
2594
2589
  def attr_associated_portal_arns(self) -> typing.List[builtins.str]:
2595
- '''A list of web portal ARNs that this user settings resource is associated with.
2596
-
2590
+ '''
2597
2591
  :cloudformationAttribute: AssociatedPortalArns
2598
2592
  '''
2599
2593
  return typing.cast(typing.List[builtins.str], jsii.get(self, "attrAssociatedPortalArns"))
@@ -417,6 +417,7 @@ class TriggerFunction(
417
417
  function_name: typing.Optional[builtins.str] = None,
418
418
  initial_policy: typing.Optional[typing.Sequence[_PolicyStatement_0fe33853]] = None,
419
419
  insights_version: typing.Optional[_LambdaInsightsVersion_9dfbfef9] = None,
420
+ ipv6_allowed_for_dual_stack: typing.Optional[builtins.bool] = None,
420
421
  layers: typing.Optional[typing.Sequence[_ILayerVersion_5ac127c8]] = None,
421
422
  log_format: typing.Optional[builtins.str] = None,
422
423
  logging_format: typing.Optional[_LoggingFormat_30be8e01] = None,
@@ -471,6 +472,7 @@ class TriggerFunction(
471
472
  :param function_name: A name for the function. Default: - AWS CloudFormation generates a unique physical ID and uses that ID for the function's name. For more information, see Name Type.
472
473
  :param initial_policy: Initial policy statements to add to the created Lambda Role. You can call ``addToRolePolicy`` to the created lambda to add statements post creation. Default: - No policy statements are added to the created Lambda role.
473
474
  :param insights_version: Specify the version of CloudWatch Lambda insights to use for monitoring. Default: - No Lambda Insights
475
+ :param ipv6_allowed_for_dual_stack: Allows outbound IPv6 traffic on VPC functions that are connected to dual-stack subnets. Only used if 'vpc' is supplied. Default: false
474
476
  :param layers: A list of layers to add to the function's execution environment. You can configure your Lambda function to pull in additional code during initialization in the form of layers. Layers are packages of libraries or other dependencies that can be used by multiple functions. Default: - No layers.
475
477
  :param log_format: Sets the logFormat for the function. Default: "Text"
476
478
  :param logging_format: Sets the loggingFormat for the function. Default: LoggingFormat.TEXT
@@ -527,6 +529,7 @@ class TriggerFunction(
527
529
  function_name=function_name,
528
530
  initial_policy=initial_policy,
529
531
  insights_version=insights_version,
532
+ ipv6_allowed_for_dual_stack=ipv6_allowed_for_dual_stack,
530
533
  layers=layers,
531
534
  log_format=log_format,
532
535
  logging_format=logging_format,
@@ -889,6 +892,7 @@ class TriggerProps(TriggerOptions):
889
892
  "function_name": "functionName",
890
893
  "initial_policy": "initialPolicy",
891
894
  "insights_version": "insightsVersion",
895
+ "ipv6_allowed_for_dual_stack": "ipv6AllowedForDualStack",
892
896
  "layers": "layers",
893
897
  "log_format": "logFormat",
894
898
  "logging_format": "loggingFormat",
@@ -945,6 +949,7 @@ class TriggerFunctionProps(_FunctionProps_a308e854, TriggerOptions):
945
949
  function_name: typing.Optional[builtins.str] = None,
946
950
  initial_policy: typing.Optional[typing.Sequence[_PolicyStatement_0fe33853]] = None,
947
951
  insights_version: typing.Optional[_LambdaInsightsVersion_9dfbfef9] = None,
952
+ ipv6_allowed_for_dual_stack: typing.Optional[builtins.bool] = None,
948
953
  layers: typing.Optional[typing.Sequence[_ILayerVersion_5ac127c8]] = None,
949
954
  log_format: typing.Optional[builtins.str] = None,
950
955
  logging_format: typing.Optional[_LoggingFormat_30be8e01] = None,
@@ -998,6 +1003,7 @@ class TriggerFunctionProps(_FunctionProps_a308e854, TriggerOptions):
998
1003
  :param function_name: A name for the function. Default: - AWS CloudFormation generates a unique physical ID and uses that ID for the function's name. For more information, see Name Type.
999
1004
  :param initial_policy: Initial policy statements to add to the created Lambda Role. You can call ``addToRolePolicy`` to the created lambda to add statements post creation. Default: - No policy statements are added to the created Lambda role.
1000
1005
  :param insights_version: Specify the version of CloudWatch Lambda insights to use for monitoring. Default: - No Lambda Insights
1006
+ :param ipv6_allowed_for_dual_stack: Allows outbound IPv6 traffic on VPC functions that are connected to dual-stack subnets. Only used if 'vpc' is supplied. Default: false
1001
1007
  :param layers: A list of layers to add to the function's execution environment. You can configure your Lambda function to pull in additional code during initialization in the form of layers. Layers are packages of libraries or other dependencies that can be used by multiple functions. Default: - No layers.
1002
1008
  :param log_format: Sets the logFormat for the function. Default: "Text"
1003
1009
  :param logging_format: Sets the loggingFormat for the function. Default: LoggingFormat.TEXT
@@ -1072,6 +1078,7 @@ class TriggerFunctionProps(_FunctionProps_a308e854, TriggerOptions):
1072
1078
  check_type(argname="argument function_name", value=function_name, expected_type=type_hints["function_name"])
1073
1079
  check_type(argname="argument initial_policy", value=initial_policy, expected_type=type_hints["initial_policy"])
1074
1080
  check_type(argname="argument insights_version", value=insights_version, expected_type=type_hints["insights_version"])
1081
+ check_type(argname="argument ipv6_allowed_for_dual_stack", value=ipv6_allowed_for_dual_stack, expected_type=type_hints["ipv6_allowed_for_dual_stack"])
1075
1082
  check_type(argname="argument layers", value=layers, expected_type=type_hints["layers"])
1076
1083
  check_type(argname="argument log_format", value=log_format, expected_type=type_hints["log_format"])
1077
1084
  check_type(argname="argument logging_format", value=logging_format, expected_type=type_hints["logging_format"])
@@ -1150,6 +1157,8 @@ class TriggerFunctionProps(_FunctionProps_a308e854, TriggerOptions):
1150
1157
  self._values["initial_policy"] = initial_policy
1151
1158
  if insights_version is not None:
1152
1159
  self._values["insights_version"] = insights_version
1160
+ if ipv6_allowed_for_dual_stack is not None:
1161
+ self._values["ipv6_allowed_for_dual_stack"] = ipv6_allowed_for_dual_stack
1153
1162
  if layers is not None:
1154
1163
  self._values["layers"] = layers
1155
1164
  if log_format is not None:
@@ -1449,6 +1458,17 @@ class TriggerFunctionProps(_FunctionProps_a308e854, TriggerOptions):
1449
1458
  result = self._values.get("insights_version")
1450
1459
  return typing.cast(typing.Optional[_LambdaInsightsVersion_9dfbfef9], result)
1451
1460
 
1461
+ @builtins.property
1462
+ def ipv6_allowed_for_dual_stack(self) -> typing.Optional[builtins.bool]:
1463
+ '''Allows outbound IPv6 traffic on VPC functions that are connected to dual-stack subnets.
1464
+
1465
+ Only used if 'vpc' is supplied.
1466
+
1467
+ :default: false
1468
+ '''
1469
+ result = self._values.get("ipv6_allowed_for_dual_stack")
1470
+ return typing.cast(typing.Optional[builtins.bool], result)
1471
+
1452
1472
  @builtins.property
1453
1473
  def layers(self) -> typing.Optional[typing.List[_ILayerVersion_5ac127c8]]:
1454
1474
  '''A list of layers to add to the function's execution environment.
@@ -1904,6 +1924,7 @@ def _typecheckingstub__6f34c5ba084706d20d6ef37a7f59673b20ed3425ffc7035fc8ea888e9
1904
1924
  function_name: typing.Optional[builtins.str] = None,
1905
1925
  initial_policy: typing.Optional[typing.Sequence[_PolicyStatement_0fe33853]] = None,
1906
1926
  insights_version: typing.Optional[_LambdaInsightsVersion_9dfbfef9] = None,
1927
+ ipv6_allowed_for_dual_stack: typing.Optional[builtins.bool] = None,
1907
1928
  layers: typing.Optional[typing.Sequence[_ILayerVersion_5ac127c8]] = None,
1908
1929
  log_format: typing.Optional[builtins.str] = None,
1909
1930
  logging_format: typing.Optional[_LoggingFormat_30be8e01] = None,
@@ -1991,6 +2012,7 @@ def _typecheckingstub__b2f4b009b0160d566d798bfa6d813ccc8440e1a9e0f75c99449184a2f
1991
2012
  function_name: typing.Optional[builtins.str] = None,
1992
2013
  initial_policy: typing.Optional[typing.Sequence[_PolicyStatement_0fe33853]] = None,
1993
2014
  insights_version: typing.Optional[_LambdaInsightsVersion_9dfbfef9] = None,
2015
+ ipv6_allowed_for_dual_stack: typing.Optional[builtins.bool] = None,
1994
2016
  layers: typing.Optional[typing.Sequence[_ILayerVersion_5ac127c8]] = None,
1995
2017
  log_format: typing.Optional[builtins.str] = None,
1996
2018
  logging_format: typing.Optional[_LoggingFormat_30be8e01] = None,
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: aws-cdk-lib
3
- Version: 2.127.0
3
+ Version: 2.129.0
4
4
  Summary: Version 2 of the AWS Cloud Development Kit library
5
5
  Home-page: https://github.com/aws/aws-cdk
6
6
  Author: Amazon Web Services