aws-cdk-lib 2.127.0__py3-none-any.whl → 2.129.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk-lib might be problematic. Click here for more details.
- aws_cdk/__init__.py +6 -10
- aws_cdk/_jsii/__init__.py +1 -1
- aws_cdk/_jsii/{aws-cdk-lib@2.127.0.jsii.tgz → aws-cdk-lib@2.129.0.jsii.tgz} +0 -0
- aws_cdk/aws_amazonmq/__init__.py +6 -24
- aws_cdk/aws_amplify/__init__.py +1 -2
- aws_cdk/aws_appconfig/__init__.py +0 -16
- aws_cdk/aws_applicationautoscaling/__init__.py +55 -22
- aws_cdk/aws_appstream/__init__.py +14 -14
- aws_cdk/aws_appsync/__init__.py +334 -3
- aws_cdk/aws_autoscaling/__init__.py +11 -7
- aws_cdk/aws_batch/__init__.py +137 -16
- aws_cdk/aws_cleanrooms/__init__.py +1 -2
- aws_cdk/aws_cloudformation/__init__.py +2 -10
- aws_cdk/aws_cloudfront/__init__.py +15 -8
- aws_cdk/aws_cloudfront/experimental/__init__.py +22 -0
- aws_cdk/aws_cloudfront_origins/__init__.py +332 -0
- aws_cdk/aws_cloudtrail/__init__.py +12 -2
- aws_cdk/aws_cloudwatch/__init__.py +925 -133
- aws_cdk/aws_codedeploy/__init__.py +69 -0
- aws_cdk/aws_codepipeline/__init__.py +1461 -111
- aws_cdk/aws_codepipeline_actions/__init__.py +40 -34
- aws_cdk/aws_cognito/__init__.py +0 -9
- aws_cdk/aws_config/__init__.py +2 -2
- aws_cdk/aws_connect/__init__.py +6 -1
- aws_cdk/aws_controltower/__init__.py +527 -7
- aws_cdk/aws_datasync/__init__.py +2 -2
- aws_cdk/aws_directoryservice/__init__.py +2 -3
- aws_cdk/aws_dynamodb/__init__.py +7 -0
- aws_cdk/aws_ec2/__init__.py +117 -210
- aws_cdk/aws_ecs/__init__.py +537 -3
- aws_cdk/aws_eks/__init__.py +1 -1
- aws_cdk/aws_elasticache/__init__.py +27 -20
- aws_cdk/aws_elasticloadbalancingv2/__init__.py +3 -4
- aws_cdk/aws_emr/__init__.py +23 -3
- aws_cdk/aws_events_targets/__init__.py +64 -20
- aws_cdk/aws_fis/__init__.py +4 -4
- aws_cdk/aws_frauddetector/__init__.py +3 -3
- aws_cdk/aws_globalaccelerator/__init__.py +2 -6
- aws_cdk/aws_glue/__init__.py +84 -55
- aws_cdk/aws_groundstation/__init__.py +8 -12
- aws_cdk/aws_guardduty/__init__.py +74 -70
- aws_cdk/aws_iam/__init__.py +16 -23
- aws_cdk/aws_imagebuilder/__init__.py +178 -156
- aws_cdk/aws_internetmonitor/__init__.py +12 -10
- aws_cdk/aws_iot/__init__.py +17 -10
- aws_cdk/aws_iotevents/__init__.py +4 -4
- aws_cdk/aws_iotfleetwise/__init__.py +10 -5
- aws_cdk/aws_iottwinmaker/__init__.py +3 -5
- aws_cdk/aws_iotwireless/__init__.py +35 -23
- aws_cdk/aws_kendra/__init__.py +36 -15
- aws_cdk/aws_kinesisfirehose/__init__.py +155 -114
- aws_cdk/aws_lambda/__init__.py +175 -15
- aws_cdk/aws_lambda_nodejs/__init__.py +22 -0
- aws_cdk/aws_lightsail/__init__.py +14 -18
- aws_cdk/aws_logs/__init__.py +15 -15
- aws_cdk/aws_mediaconnect/__init__.py +5 -3
- aws_cdk/aws_medialive/__init__.py +3 -12
- aws_cdk/aws_mediapackagev2/__init__.py +287 -286
- aws_cdk/aws_mediatailor/__init__.py +2 -2
- aws_cdk/aws_memorydb/__init__.py +2 -2
- aws_cdk/aws_msk/__init__.py +6 -3
- aws_cdk/aws_mwaa/__init__.py +10 -5
- aws_cdk/aws_neptunegraph/__init__.py +84 -66
- aws_cdk/aws_networkfirewall/__init__.py +5 -8
- aws_cdk/aws_networkmanager/__init__.py +3 -3
- aws_cdk/aws_nimblestudio/__init__.py +2 -4
- aws_cdk/aws_opensearchservice/__init__.py +6 -7
- aws_cdk/aws_osis/__init__.py +1 -3
- aws_cdk/aws_pinpoint/__init__.py +5 -5
- aws_cdk/aws_pipes/__init__.py +5 -5
- aws_cdk/aws_quicksight/__init__.py +5 -10
- aws_cdk/aws_rds/__init__.py +38 -21
- aws_cdk/aws_redshift/__init__.py +9 -5
- aws_cdk/aws_redshiftserverless/__init__.py +62 -38
- aws_cdk/aws_rolesanywhere/__init__.py +41 -53
- aws_cdk/aws_route53/__init__.py +532 -6
- aws_cdk/aws_route53recoverycontrol/__init__.py +1 -3
- aws_cdk/aws_route53recoveryreadiness/__init__.py +2 -2
- aws_cdk/aws_route53resolver/__init__.py +1 -4
- aws_cdk/aws_s3/__init__.py +12 -6
- aws_cdk/aws_s3_deployment/__init__.py +29 -0
- aws_cdk/aws_s3objectlambda/__init__.py +7 -4
- aws_cdk/aws_s3outposts/__init__.py +1 -1
- aws_cdk/aws_sagemaker/__init__.py +195 -11
- aws_cdk/aws_servicecatalogappregistry/__init__.py +3 -3
- aws_cdk/aws_ses/__init__.py +166 -9
- aws_cdk/aws_sns/__init__.py +185 -38
- aws_cdk/aws_sqs/__init__.py +10 -12
- aws_cdk/aws_ssm/__init__.py +16 -16
- aws_cdk/aws_ssmincidents/__init__.py +1 -1
- aws_cdk/aws_synthetics/__init__.py +94 -21
- aws_cdk/aws_verifiedpermissions/__init__.py +1 -2
- aws_cdk/aws_vpclattice/__init__.py +8 -4
- aws_cdk/aws_wafv2/__init__.py +14 -59
- aws_cdk/aws_workspaces/__init__.py +5 -4
- aws_cdk/aws_workspacesweb/__init__.py +6 -12
- aws_cdk/triggers/__init__.py +22 -0
- {aws_cdk_lib-2.127.0.dist-info → aws_cdk_lib-2.129.0.dist-info}/METADATA +1 -1
- {aws_cdk_lib-2.127.0.dist-info → aws_cdk_lib-2.129.0.dist-info}/RECORD +103 -103
- {aws_cdk_lib-2.127.0.dist-info → aws_cdk_lib-2.129.0.dist-info}/LICENSE +0 -0
- {aws_cdk_lib-2.127.0.dist-info → aws_cdk_lib-2.129.0.dist-info}/NOTICE +0 -0
- {aws_cdk_lib-2.127.0.dist-info → aws_cdk_lib-2.129.0.dist-info}/WHEEL +0 -0
- {aws_cdk_lib-2.127.0.dist-info → aws_cdk_lib-2.129.0.dist-info}/top_level.txt +0 -0
aws_cdk/aws_wafv2/__init__.py
CHANGED
|
@@ -809,7 +809,7 @@ class CfnLoggingConfiguration(
|
|
|
809
809
|
|
|
810
810
|
``"FieldToMatch": { "Method": { "Name": "DELETE" } }``
|
|
811
811
|
|
|
812
|
-
:param json_body:
|
|
812
|
+
:param json_body:
|
|
813
813
|
:param method: Redact the indicated HTTP method. The method indicates the type of operation that the request is asking the origin to perform.
|
|
814
814
|
:param query_string: Redact the query string. This is the part of a URL that appears after a ``?`` character, if any.
|
|
815
815
|
:param single_header: Redact a single header. Provide the name of the header to inspect, for example, ``User-Agent`` or ``Referer`` . This setting isn't case sensitive. Example JSON: ``"SingleHeader": { "Name": "haystack" }``
|
|
@@ -859,8 +859,7 @@ class CfnLoggingConfiguration(
|
|
|
859
859
|
|
|
860
860
|
@builtins.property
|
|
861
861
|
def json_body(self) -> typing.Any:
|
|
862
|
-
'''
|
|
863
|
-
|
|
862
|
+
'''
|
|
864
863
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-loggingconfiguration-fieldtomatch.html#cfn-wafv2-loggingconfiguration-fieldtomatch-jsonbody
|
|
865
864
|
'''
|
|
866
865
|
result = self._values.get("json_body")
|
|
@@ -1041,17 +1040,10 @@ class CfnLoggingConfiguration(
|
|
|
1041
1040
|
match_scope: builtins.str,
|
|
1042
1041
|
invalid_fallback_behavior: typing.Optional[builtins.str] = None,
|
|
1043
1042
|
) -> None:
|
|
1044
|
-
'''
|
|
1045
|
-
|
|
1046
|
-
|
|
1047
|
-
|
|
1048
|
-
Use the specifications in this object to indicate which parts of the JSON body to inspect using the rule's inspection criteria. AWS WAF inspects only the parts of the JSON that result from the matches that you indicate.
|
|
1049
|
-
|
|
1050
|
-
Example JSON: ``"JsonBody": { "MatchPattern": { "All": {} }, "MatchScope": "ALL" }``
|
|
1051
|
-
|
|
1052
|
-
:param match_pattern: The patterns to look for in the JSON body. AWS WAF inspects the results of these pattern matches against the rule inspection criteria.
|
|
1053
|
-
:param match_scope: The parts of the JSON to match against using the ``MatchPattern`` . If you specify ``ALL`` , AWS WAF matches against keys and values. ``All`` does not require a match to be found in the keys and a match to be found in the values. It requires a match to be found in the keys or the values or both. To require a match in the keys and in the values, use a logical ``AND`` statement to combine two match rules, one that inspects the keys and another that inspects the values.
|
|
1054
|
-
:param invalid_fallback_behavior: What AWS WAF should do if it fails to completely parse the JSON body. The options are the following:. - ``EVALUATE_AS_STRING`` - Inspect the body as plain text. AWS WAF applies the text transformations and inspection criteria that you defined for the JSON inspection to the body text string. - ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request. - ``NO_MATCH`` - Treat the web request as not matching the rule statement. If you don't provide this setting, AWS WAF parses and evaluates the content only up to the first parsing failure that it encounters. AWS WAF does its best to parse the entire JSON body, but might be forced to stop for reasons such as invalid characters, duplicate keys, truncation, and any content whose root node isn't an object or an array. AWS WAF parses the JSON in the following examples as two valid key, value pairs: - Missing comma: ``{"key1":"value1""key2":"value2"}`` - Missing colon: ``{"key1":"value1","key2""value2"}`` - Extra colons: ``{"key1"::"value1","key2""value2"}``
|
|
1043
|
+
'''
|
|
1044
|
+
:param match_pattern:
|
|
1045
|
+
:param match_scope:
|
|
1046
|
+
:param invalid_fallback_behavior:
|
|
1055
1047
|
|
|
1056
1048
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-loggingconfiguration-jsonbody.html
|
|
1057
1049
|
:exampleMetadata: fixture=_generated
|
|
@@ -1091,10 +1083,7 @@ class CfnLoggingConfiguration(
|
|
|
1091
1083
|
def match_pattern(
|
|
1092
1084
|
self,
|
|
1093
1085
|
) -> typing.Union[_IResolvable_da3f097b, "CfnLoggingConfiguration.MatchPatternProperty"]:
|
|
1094
|
-
'''
|
|
1095
|
-
|
|
1096
|
-
AWS WAF inspects the results of these pattern matches against the rule inspection criteria.
|
|
1097
|
-
|
|
1086
|
+
'''
|
|
1098
1087
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-loggingconfiguration-jsonbody.html#cfn-wafv2-loggingconfiguration-jsonbody-matchpattern
|
|
1099
1088
|
'''
|
|
1100
1089
|
result = self._values.get("match_pattern")
|
|
@@ -1103,12 +1092,7 @@ class CfnLoggingConfiguration(
|
|
|
1103
1092
|
|
|
1104
1093
|
@builtins.property
|
|
1105
1094
|
def match_scope(self) -> builtins.str:
|
|
1106
|
-
'''
|
|
1107
|
-
|
|
1108
|
-
If you specify ``ALL`` , AWS WAF matches against keys and values.
|
|
1109
|
-
|
|
1110
|
-
``All`` does not require a match to be found in the keys and a match to be found in the values. It requires a match to be found in the keys or the values or both. To require a match in the keys and in the values, use a logical ``AND`` statement to combine two match rules, one that inspects the keys and another that inspects the values.
|
|
1111
|
-
|
|
1095
|
+
'''
|
|
1112
1096
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-loggingconfiguration-jsonbody.html#cfn-wafv2-loggingconfiguration-jsonbody-matchscope
|
|
1113
1097
|
'''
|
|
1114
1098
|
result = self._values.get("match_scope")
|
|
@@ -1117,22 +1101,7 @@ class CfnLoggingConfiguration(
|
|
|
1117
1101
|
|
|
1118
1102
|
@builtins.property
|
|
1119
1103
|
def invalid_fallback_behavior(self) -> typing.Optional[builtins.str]:
|
|
1120
|
-
'''
|
|
1121
|
-
|
|
1122
|
-
- ``EVALUATE_AS_STRING`` - Inspect the body as plain text. AWS WAF applies the text transformations and inspection criteria that you defined for the JSON inspection to the body text string.
|
|
1123
|
-
- ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request.
|
|
1124
|
-
- ``NO_MATCH`` - Treat the web request as not matching the rule statement.
|
|
1125
|
-
|
|
1126
|
-
If you don't provide this setting, AWS WAF parses and evaluates the content only up to the first parsing failure that it encounters.
|
|
1127
|
-
|
|
1128
|
-
AWS WAF does its best to parse the entire JSON body, but might be forced to stop for reasons such as invalid characters, duplicate keys, truncation, and any content whose root node isn't an object or an array.
|
|
1129
|
-
|
|
1130
|
-
AWS WAF parses the JSON in the following examples as two valid key, value pairs:
|
|
1131
|
-
|
|
1132
|
-
- Missing comma: ``{"key1":"value1""key2":"value2"}``
|
|
1133
|
-
- Missing colon: ``{"key1":"value1","key2""value2"}``
|
|
1134
|
-
- Extra colons: ``{"key1"::"value1","key2""value2"}``
|
|
1135
|
-
|
|
1104
|
+
'''
|
|
1136
1105
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-loggingconfiguration-jsonbody.html#cfn-wafv2-loggingconfiguration-jsonbody-invalidfallbackbehavior
|
|
1137
1106
|
'''
|
|
1138
1107
|
result = self._values.get("invalid_fallback_behavior")
|
|
@@ -1301,12 +1270,9 @@ class CfnLoggingConfiguration(
|
|
|
1301
1270
|
all: typing.Any = None,
|
|
1302
1271
|
included_paths: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
1303
1272
|
) -> None:
|
|
1304
|
-
'''
|
|
1305
|
-
|
|
1306
|
-
|
|
1307
|
-
|
|
1308
|
-
:param all: Match all of the elements. You must specify either this setting or the ``IncludedPaths`` setting, but not both.
|
|
1309
|
-
:param included_paths: Match only the specified include paths. Provide the include paths using JSON Pointer syntax. For example, ``"IncludedPaths": ["/dogs/0/name", "/dogs/1/name"]`` . For information about this syntax, see the Internet Engineering Task Force (IETF) documentation `JavaScript Object Notation (JSON) Pointer <https://docs.aws.amazon.com/https://tools.ietf.org/html/rfc6901>`_ . You must specify either this setting or the ``All`` setting, but not both. .. epigraph:: Don't use this option to include all paths. Instead, use the ``All`` setting.
|
|
1273
|
+
'''
|
|
1274
|
+
:param all:
|
|
1275
|
+
:param included_paths:
|
|
1310
1276
|
|
|
1311
1277
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-loggingconfiguration-matchpattern.html
|
|
1312
1278
|
:exampleMetadata: fixture=_generated
|
|
@@ -1336,10 +1302,7 @@ class CfnLoggingConfiguration(
|
|
|
1336
1302
|
|
|
1337
1303
|
@builtins.property
|
|
1338
1304
|
def all(self) -> typing.Any:
|
|
1339
|
-
'''
|
|
1340
|
-
|
|
1341
|
-
You must specify either this setting or the ``IncludedPaths`` setting, but not both.
|
|
1342
|
-
|
|
1305
|
+
'''
|
|
1343
1306
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-loggingconfiguration-matchpattern.html#cfn-wafv2-loggingconfiguration-matchpattern-all
|
|
1344
1307
|
'''
|
|
1345
1308
|
result = self._values.get("all")
|
|
@@ -1347,15 +1310,7 @@ class CfnLoggingConfiguration(
|
|
|
1347
1310
|
|
|
1348
1311
|
@builtins.property
|
|
1349
1312
|
def included_paths(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
1350
|
-
'''
|
|
1351
|
-
|
|
1352
|
-
Provide the include paths using JSON Pointer syntax. For example, ``"IncludedPaths": ["/dogs/0/name", "/dogs/1/name"]`` . For information about this syntax, see the Internet Engineering Task Force (IETF) documentation `JavaScript Object Notation (JSON) Pointer <https://docs.aws.amazon.com/https://tools.ietf.org/html/rfc6901>`_ .
|
|
1353
|
-
|
|
1354
|
-
You must specify either this setting or the ``All`` setting, but not both.
|
|
1355
|
-
.. epigraph::
|
|
1356
|
-
|
|
1357
|
-
Don't use this option to include all paths. Instead, use the ``All`` setting.
|
|
1358
|
-
|
|
1313
|
+
'''
|
|
1359
1314
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-loggingconfiguration-matchpattern.html#cfn-wafv2-loggingconfiguration-matchpattern-includedpaths
|
|
1360
1315
|
'''
|
|
1361
1316
|
result = self._values.get("included_paths")
|
|
@@ -146,8 +146,7 @@ class CfnConnectionAlias(
|
|
|
146
146
|
@builtins.property
|
|
147
147
|
@jsii.member(jsii_name="attrAssociations")
|
|
148
148
|
def attr_associations(self) -> _IResolvable_da3f097b:
|
|
149
|
-
'''
|
|
150
|
-
|
|
149
|
+
'''
|
|
151
150
|
:cloudformationAttribute: Associations
|
|
152
151
|
'''
|
|
153
152
|
return typing.cast(_IResolvable_da3f097b, jsii.get(self, "attrAssociations"))
|
|
@@ -449,7 +448,7 @@ class CfnWorkspace(
|
|
|
449
448
|
:param id: Construct identifier for this resource (unique in its scope).
|
|
450
449
|
:param bundle_id: The identifier of the bundle for the WorkSpace.
|
|
451
450
|
:param directory_id: The identifier of the AWS Directory Service directory for the WorkSpace.
|
|
452
|
-
:param user_name: The user name of the user for the WorkSpace. This user name must exist in the AWS Directory Service directory for the WorkSpace.
|
|
451
|
+
:param user_name: The user name of the user for the WorkSpace. This user name must exist in the AWS Directory Service directory for the WorkSpace. The reserved keyword, ``[UNDEFINED]`` , is used when creating user-decoupled WorkSpaces.
|
|
453
452
|
:param root_volume_encryption_enabled: Indicates whether the data stored on the root volume is encrypted.
|
|
454
453
|
:param tags: The tags for the WorkSpace.
|
|
455
454
|
:param user_volume_encryption_enabled: Indicates whether the data stored on the user volume is encrypted.
|
|
@@ -809,7 +808,7 @@ class CfnWorkspaceProps:
|
|
|
809
808
|
|
|
810
809
|
:param bundle_id: The identifier of the bundle for the WorkSpace.
|
|
811
810
|
:param directory_id: The identifier of the AWS Directory Service directory for the WorkSpace.
|
|
812
|
-
:param user_name: The user name of the user for the WorkSpace. This user name must exist in the AWS Directory Service directory for the WorkSpace.
|
|
811
|
+
:param user_name: The user name of the user for the WorkSpace. This user name must exist in the AWS Directory Service directory for the WorkSpace. The reserved keyword, ``[UNDEFINED]`` , is used when creating user-decoupled WorkSpaces.
|
|
813
812
|
:param root_volume_encryption_enabled: Indicates whether the data stored on the root volume is encrypted.
|
|
814
813
|
:param tags: The tags for the WorkSpace.
|
|
815
814
|
:param user_volume_encryption_enabled: Indicates whether the data stored on the user volume is encrypted.
|
|
@@ -899,6 +898,8 @@ class CfnWorkspaceProps:
|
|
|
899
898
|
|
|
900
899
|
This user name must exist in the AWS Directory Service directory for the WorkSpace.
|
|
901
900
|
|
|
901
|
+
The reserved keyword, ``[UNDEFINED]`` , is used when creating user-decoupled WorkSpaces.
|
|
902
|
+
|
|
902
903
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-workspaces-workspace.html#cfn-workspaces-workspace-username
|
|
903
904
|
'''
|
|
904
905
|
result = self._values.get("user_name")
|
|
@@ -156,8 +156,7 @@ class CfnBrowserSettings(
|
|
|
156
156
|
@builtins.property
|
|
157
157
|
@jsii.member(jsii_name="attrAssociatedPortalArns")
|
|
158
158
|
def attr_associated_portal_arns(self) -> typing.List[builtins.str]:
|
|
159
|
-
'''
|
|
160
|
-
|
|
159
|
+
'''
|
|
161
160
|
:cloudformationAttribute: AssociatedPortalArns
|
|
162
161
|
'''
|
|
163
162
|
return typing.cast(typing.List[builtins.str], jsii.get(self, "attrAssociatedPortalArns"))
|
|
@@ -776,8 +775,7 @@ class CfnIpAccessSettings(
|
|
|
776
775
|
@builtins.property
|
|
777
776
|
@jsii.member(jsii_name="attrAssociatedPortalArns")
|
|
778
777
|
def attr_associated_portal_arns(self) -> typing.List[builtins.str]:
|
|
779
|
-
'''
|
|
780
|
-
|
|
778
|
+
'''
|
|
781
779
|
:cloudformationAttribute: AssociatedPortalArns
|
|
782
780
|
'''
|
|
783
781
|
return typing.cast(typing.List[builtins.str], jsii.get(self, "attrAssociatedPortalArns"))
|
|
@@ -1229,8 +1227,7 @@ class CfnNetworkSettings(
|
|
|
1229
1227
|
@builtins.property
|
|
1230
1228
|
@jsii.member(jsii_name="attrAssociatedPortalArns")
|
|
1231
1229
|
def attr_associated_portal_arns(self) -> typing.List[builtins.str]:
|
|
1232
|
-
'''
|
|
1233
|
-
|
|
1230
|
+
'''
|
|
1234
1231
|
:cloudformationAttribute: AssociatedPortalArns
|
|
1235
1232
|
'''
|
|
1236
1233
|
return typing.cast(typing.List[builtins.str], jsii.get(self, "attrAssociatedPortalArns"))
|
|
@@ -2104,8 +2101,7 @@ class CfnTrustStore(
|
|
|
2104
2101
|
@builtins.property
|
|
2105
2102
|
@jsii.member(jsii_name="attrAssociatedPortalArns")
|
|
2106
2103
|
def attr_associated_portal_arns(self) -> typing.List[builtins.str]:
|
|
2107
|
-
'''
|
|
2108
|
-
|
|
2104
|
+
'''
|
|
2109
2105
|
:cloudformationAttribute: AssociatedPortalArns
|
|
2110
2106
|
'''
|
|
2111
2107
|
return typing.cast(typing.List[builtins.str], jsii.get(self, "attrAssociatedPortalArns"))
|
|
@@ -2322,8 +2318,7 @@ class CfnUserAccessLoggingSettings(
|
|
|
2322
2318
|
@builtins.property
|
|
2323
2319
|
@jsii.member(jsii_name="attrAssociatedPortalArns")
|
|
2324
2320
|
def attr_associated_portal_arns(self) -> typing.List[builtins.str]:
|
|
2325
|
-
'''
|
|
2326
|
-
|
|
2321
|
+
'''
|
|
2327
2322
|
:cloudformationAttribute: AssociatedPortalArns
|
|
2328
2323
|
'''
|
|
2329
2324
|
return typing.cast(typing.List[builtins.str], jsii.get(self, "attrAssociatedPortalArns"))
|
|
@@ -2592,8 +2587,7 @@ class CfnUserSettings(
|
|
|
2592
2587
|
@builtins.property
|
|
2593
2588
|
@jsii.member(jsii_name="attrAssociatedPortalArns")
|
|
2594
2589
|
def attr_associated_portal_arns(self) -> typing.List[builtins.str]:
|
|
2595
|
-
'''
|
|
2596
|
-
|
|
2590
|
+
'''
|
|
2597
2591
|
:cloudformationAttribute: AssociatedPortalArns
|
|
2598
2592
|
'''
|
|
2599
2593
|
return typing.cast(typing.List[builtins.str], jsii.get(self, "attrAssociatedPortalArns"))
|
aws_cdk/triggers/__init__.py
CHANGED
|
@@ -417,6 +417,7 @@ class TriggerFunction(
|
|
|
417
417
|
function_name: typing.Optional[builtins.str] = None,
|
|
418
418
|
initial_policy: typing.Optional[typing.Sequence[_PolicyStatement_0fe33853]] = None,
|
|
419
419
|
insights_version: typing.Optional[_LambdaInsightsVersion_9dfbfef9] = None,
|
|
420
|
+
ipv6_allowed_for_dual_stack: typing.Optional[builtins.bool] = None,
|
|
420
421
|
layers: typing.Optional[typing.Sequence[_ILayerVersion_5ac127c8]] = None,
|
|
421
422
|
log_format: typing.Optional[builtins.str] = None,
|
|
422
423
|
logging_format: typing.Optional[_LoggingFormat_30be8e01] = None,
|
|
@@ -471,6 +472,7 @@ class TriggerFunction(
|
|
|
471
472
|
:param function_name: A name for the function. Default: - AWS CloudFormation generates a unique physical ID and uses that ID for the function's name. For more information, see Name Type.
|
|
472
473
|
:param initial_policy: Initial policy statements to add to the created Lambda Role. You can call ``addToRolePolicy`` to the created lambda to add statements post creation. Default: - No policy statements are added to the created Lambda role.
|
|
473
474
|
:param insights_version: Specify the version of CloudWatch Lambda insights to use for monitoring. Default: - No Lambda Insights
|
|
475
|
+
:param ipv6_allowed_for_dual_stack: Allows outbound IPv6 traffic on VPC functions that are connected to dual-stack subnets. Only used if 'vpc' is supplied. Default: false
|
|
474
476
|
:param layers: A list of layers to add to the function's execution environment. You can configure your Lambda function to pull in additional code during initialization in the form of layers. Layers are packages of libraries or other dependencies that can be used by multiple functions. Default: - No layers.
|
|
475
477
|
:param log_format: Sets the logFormat for the function. Default: "Text"
|
|
476
478
|
:param logging_format: Sets the loggingFormat for the function. Default: LoggingFormat.TEXT
|
|
@@ -527,6 +529,7 @@ class TriggerFunction(
|
|
|
527
529
|
function_name=function_name,
|
|
528
530
|
initial_policy=initial_policy,
|
|
529
531
|
insights_version=insights_version,
|
|
532
|
+
ipv6_allowed_for_dual_stack=ipv6_allowed_for_dual_stack,
|
|
530
533
|
layers=layers,
|
|
531
534
|
log_format=log_format,
|
|
532
535
|
logging_format=logging_format,
|
|
@@ -889,6 +892,7 @@ class TriggerProps(TriggerOptions):
|
|
|
889
892
|
"function_name": "functionName",
|
|
890
893
|
"initial_policy": "initialPolicy",
|
|
891
894
|
"insights_version": "insightsVersion",
|
|
895
|
+
"ipv6_allowed_for_dual_stack": "ipv6AllowedForDualStack",
|
|
892
896
|
"layers": "layers",
|
|
893
897
|
"log_format": "logFormat",
|
|
894
898
|
"logging_format": "loggingFormat",
|
|
@@ -945,6 +949,7 @@ class TriggerFunctionProps(_FunctionProps_a308e854, TriggerOptions):
|
|
|
945
949
|
function_name: typing.Optional[builtins.str] = None,
|
|
946
950
|
initial_policy: typing.Optional[typing.Sequence[_PolicyStatement_0fe33853]] = None,
|
|
947
951
|
insights_version: typing.Optional[_LambdaInsightsVersion_9dfbfef9] = None,
|
|
952
|
+
ipv6_allowed_for_dual_stack: typing.Optional[builtins.bool] = None,
|
|
948
953
|
layers: typing.Optional[typing.Sequence[_ILayerVersion_5ac127c8]] = None,
|
|
949
954
|
log_format: typing.Optional[builtins.str] = None,
|
|
950
955
|
logging_format: typing.Optional[_LoggingFormat_30be8e01] = None,
|
|
@@ -998,6 +1003,7 @@ class TriggerFunctionProps(_FunctionProps_a308e854, TriggerOptions):
|
|
|
998
1003
|
:param function_name: A name for the function. Default: - AWS CloudFormation generates a unique physical ID and uses that ID for the function's name. For more information, see Name Type.
|
|
999
1004
|
:param initial_policy: Initial policy statements to add to the created Lambda Role. You can call ``addToRolePolicy`` to the created lambda to add statements post creation. Default: - No policy statements are added to the created Lambda role.
|
|
1000
1005
|
:param insights_version: Specify the version of CloudWatch Lambda insights to use for monitoring. Default: - No Lambda Insights
|
|
1006
|
+
:param ipv6_allowed_for_dual_stack: Allows outbound IPv6 traffic on VPC functions that are connected to dual-stack subnets. Only used if 'vpc' is supplied. Default: false
|
|
1001
1007
|
:param layers: A list of layers to add to the function's execution environment. You can configure your Lambda function to pull in additional code during initialization in the form of layers. Layers are packages of libraries or other dependencies that can be used by multiple functions. Default: - No layers.
|
|
1002
1008
|
:param log_format: Sets the logFormat for the function. Default: "Text"
|
|
1003
1009
|
:param logging_format: Sets the loggingFormat for the function. Default: LoggingFormat.TEXT
|
|
@@ -1072,6 +1078,7 @@ class TriggerFunctionProps(_FunctionProps_a308e854, TriggerOptions):
|
|
|
1072
1078
|
check_type(argname="argument function_name", value=function_name, expected_type=type_hints["function_name"])
|
|
1073
1079
|
check_type(argname="argument initial_policy", value=initial_policy, expected_type=type_hints["initial_policy"])
|
|
1074
1080
|
check_type(argname="argument insights_version", value=insights_version, expected_type=type_hints["insights_version"])
|
|
1081
|
+
check_type(argname="argument ipv6_allowed_for_dual_stack", value=ipv6_allowed_for_dual_stack, expected_type=type_hints["ipv6_allowed_for_dual_stack"])
|
|
1075
1082
|
check_type(argname="argument layers", value=layers, expected_type=type_hints["layers"])
|
|
1076
1083
|
check_type(argname="argument log_format", value=log_format, expected_type=type_hints["log_format"])
|
|
1077
1084
|
check_type(argname="argument logging_format", value=logging_format, expected_type=type_hints["logging_format"])
|
|
@@ -1150,6 +1157,8 @@ class TriggerFunctionProps(_FunctionProps_a308e854, TriggerOptions):
|
|
|
1150
1157
|
self._values["initial_policy"] = initial_policy
|
|
1151
1158
|
if insights_version is not None:
|
|
1152
1159
|
self._values["insights_version"] = insights_version
|
|
1160
|
+
if ipv6_allowed_for_dual_stack is not None:
|
|
1161
|
+
self._values["ipv6_allowed_for_dual_stack"] = ipv6_allowed_for_dual_stack
|
|
1153
1162
|
if layers is not None:
|
|
1154
1163
|
self._values["layers"] = layers
|
|
1155
1164
|
if log_format is not None:
|
|
@@ -1449,6 +1458,17 @@ class TriggerFunctionProps(_FunctionProps_a308e854, TriggerOptions):
|
|
|
1449
1458
|
result = self._values.get("insights_version")
|
|
1450
1459
|
return typing.cast(typing.Optional[_LambdaInsightsVersion_9dfbfef9], result)
|
|
1451
1460
|
|
|
1461
|
+
@builtins.property
|
|
1462
|
+
def ipv6_allowed_for_dual_stack(self) -> typing.Optional[builtins.bool]:
|
|
1463
|
+
'''Allows outbound IPv6 traffic on VPC functions that are connected to dual-stack subnets.
|
|
1464
|
+
|
|
1465
|
+
Only used if 'vpc' is supplied.
|
|
1466
|
+
|
|
1467
|
+
:default: false
|
|
1468
|
+
'''
|
|
1469
|
+
result = self._values.get("ipv6_allowed_for_dual_stack")
|
|
1470
|
+
return typing.cast(typing.Optional[builtins.bool], result)
|
|
1471
|
+
|
|
1452
1472
|
@builtins.property
|
|
1453
1473
|
def layers(self) -> typing.Optional[typing.List[_ILayerVersion_5ac127c8]]:
|
|
1454
1474
|
'''A list of layers to add to the function's execution environment.
|
|
@@ -1904,6 +1924,7 @@ def _typecheckingstub__6f34c5ba084706d20d6ef37a7f59673b20ed3425ffc7035fc8ea888e9
|
|
|
1904
1924
|
function_name: typing.Optional[builtins.str] = None,
|
|
1905
1925
|
initial_policy: typing.Optional[typing.Sequence[_PolicyStatement_0fe33853]] = None,
|
|
1906
1926
|
insights_version: typing.Optional[_LambdaInsightsVersion_9dfbfef9] = None,
|
|
1927
|
+
ipv6_allowed_for_dual_stack: typing.Optional[builtins.bool] = None,
|
|
1907
1928
|
layers: typing.Optional[typing.Sequence[_ILayerVersion_5ac127c8]] = None,
|
|
1908
1929
|
log_format: typing.Optional[builtins.str] = None,
|
|
1909
1930
|
logging_format: typing.Optional[_LoggingFormat_30be8e01] = None,
|
|
@@ -1991,6 +2012,7 @@ def _typecheckingstub__b2f4b009b0160d566d798bfa6d813ccc8440e1a9e0f75c99449184a2f
|
|
|
1991
2012
|
function_name: typing.Optional[builtins.str] = None,
|
|
1992
2013
|
initial_policy: typing.Optional[typing.Sequence[_PolicyStatement_0fe33853]] = None,
|
|
1993
2014
|
insights_version: typing.Optional[_LambdaInsightsVersion_9dfbfef9] = None,
|
|
2015
|
+
ipv6_allowed_for_dual_stack: typing.Optional[builtins.bool] = None,
|
|
1994
2016
|
layers: typing.Optional[typing.Sequence[_ILayerVersion_5ac127c8]] = None,
|
|
1995
2017
|
log_format: typing.Optional[builtins.str] = None,
|
|
1996
2018
|
logging_format: typing.Optional[_LoggingFormat_30be8e01] = None,
|