aws-cdk-lib 2.136.1__py3-none-any.whl → 2.138.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk-lib might be problematic. Click here for more details.
- aws_cdk/__init__.py +8 -0
- aws_cdk/_jsii/__init__.py +1 -1
- aws_cdk/_jsii/{aws-cdk-lib@2.136.1.jsii.tgz → aws-cdk-lib@2.138.0.jsii.tgz} +0 -0
- aws_cdk/assertions/__init__.py +152 -5
- aws_cdk/aws_amplify/__init__.py +29 -113
- aws_cdk/aws_appconfig/__init__.py +26 -33
- aws_cdk/aws_apprunner/__init__.py +5 -2
- aws_cdk/aws_appsync/__init__.py +400 -13
- aws_cdk/aws_aps/__init__.py +64 -47
- aws_cdk/aws_b2bi/__init__.py +2 -6
- aws_cdk/aws_backup/__init__.py +27 -23
- aws_cdk/aws_batch/__init__.py +103 -0
- aws_cdk/aws_bcmdataexports/__init__.py +1114 -0
- aws_cdk/aws_chatbot/__init__.py +6 -4
- aws_cdk/aws_cleanrooms/__init__.py +526 -3
- aws_cdk/aws_cleanroomsml/__init__.py +960 -0
- aws_cdk/aws_cloudfront/__init__.py +196 -15
- aws_cdk/aws_cloudtrail/__init__.py +10 -10
- aws_cdk/aws_cloudwatch/__init__.py +124 -8
- aws_cdk/aws_codebuild/__init__.py +27 -22
- aws_cdk/aws_codeconnections/__init__.py +435 -0
- aws_cdk/aws_cognito/__init__.py +175 -79
- aws_cdk/aws_deadline/__init__.py +5394 -0
- aws_cdk/aws_ec2/__init__.py +379 -173
- aws_cdk/aws_ecr_assets/__init__.py +3 -4
- aws_cdk/aws_ecs/__init__.py +240 -1
- aws_cdk/aws_efs/__init__.py +2 -2
- aws_cdk/aws_elasticache/__init__.py +86 -32
- aws_cdk/aws_elasticloadbalancingv2/__init__.py +275 -5
- aws_cdk/aws_emr/__init__.py +2 -2
- aws_cdk/aws_entityresolution/__init__.py +1982 -773
- aws_cdk/aws_globalaccelerator/__init__.py +443 -0
- aws_cdk/aws_iam/__init__.py +24 -40
- aws_cdk/aws_internetmonitor/__init__.py +14 -6
- aws_cdk/aws_ivs/__init__.py +1273 -71
- aws_cdk/aws_kms/__init__.py +8 -13
- aws_cdk/aws_mediatailor/__init__.py +41 -0
- aws_cdk/aws_personalize/__init__.py +8 -6
- aws_cdk/aws_pinpoint/__init__.py +5 -3
- aws_cdk/aws_pipes/__init__.py +5 -1
- aws_cdk/aws_quicksight/__init__.py +12 -6
- aws_cdk/aws_rds/__init__.py +355 -85
- aws_cdk/aws_route53/__init__.py +591 -18
- aws_cdk/aws_s3_deployment/__init__.py +84 -7
- aws_cdk/aws_sagemaker/__init__.py +233 -2
- aws_cdk/aws_securityhub/__init__.py +4940 -102
- aws_cdk/aws_securitylake/__init__.py +1237 -55
- aws_cdk/aws_sns/__init__.py +183 -4
- aws_cdk/aws_ssmcontacts/__init__.py +11 -4
- aws_cdk/aws_stepfunctions/__init__.py +8 -16
- aws_cdk/aws_stepfunctions_tasks/__init__.py +676 -1
- aws_cdk/aws_transfer/__init__.py +4 -4
- aws_cdk/aws_verifiedpermissions/__init__.py +114 -37
- aws_cdk/aws_workspacesthinclient/__init__.py +8 -8
- aws_cdk/custom_resources/__init__.py +248 -26
- {aws_cdk_lib-2.136.1.dist-info → aws_cdk_lib-2.138.0.dist-info}/METADATA +3 -3
- {aws_cdk_lib-2.136.1.dist-info → aws_cdk_lib-2.138.0.dist-info}/RECORD +61 -57
- {aws_cdk_lib-2.136.1.dist-info → aws_cdk_lib-2.138.0.dist-info}/LICENSE +0 -0
- {aws_cdk_lib-2.136.1.dist-info → aws_cdk_lib-2.138.0.dist-info}/NOTICE +0 -0
- {aws_cdk_lib-2.136.1.dist-info → aws_cdk_lib-2.138.0.dist-info}/WHEEL +0 -0
- {aws_cdk_lib-2.136.1.dist-info → aws_cdk_lib-2.138.0.dist-info}/top_level.txt +0 -0
aws_cdk/aws_cognito/__init__.py
CHANGED
|
@@ -599,6 +599,30 @@ provider = cognito.UserPoolIdentityProviderGoogle(self, "Google",
|
|
|
599
599
|
)
|
|
600
600
|
```
|
|
601
601
|
|
|
602
|
+
Using SAML identity provider is possible to use SAML metadata file content or SAML metadata file url.
|
|
603
|
+
|
|
604
|
+
```python
|
|
605
|
+
userpool = cognito.UserPool(self, "Pool")
|
|
606
|
+
|
|
607
|
+
# specify the metadata as a file content
|
|
608
|
+
cognito.UserPoolIdentityProviderSaml(self, "userpoolIdpFile",
|
|
609
|
+
user_pool=userpool,
|
|
610
|
+
metadata=cognito.UserPoolIdentityProviderSamlMetadata.file("my-file-contents"),
|
|
611
|
+
# Whether to require encrypted SAML assertions from IdP
|
|
612
|
+
encrypted_responses=True,
|
|
613
|
+
# The signing algorithm for the SAML requests
|
|
614
|
+
request_signing_algorithm=cognito.SigningAlgorithm.RSA_SHA256,
|
|
615
|
+
# Enable IdP initiated SAML auth flow
|
|
616
|
+
idp_initiated=True
|
|
617
|
+
)
|
|
618
|
+
|
|
619
|
+
# specify the metadata as a URL
|
|
620
|
+
cognito.UserPoolIdentityProviderSaml(self, "userpoolidpUrl",
|
|
621
|
+
user_pool=userpool,
|
|
622
|
+
metadata=cognito.UserPoolIdentityProviderSamlMetadata.url("https://my-metadata-url.com")
|
|
623
|
+
)
|
|
624
|
+
```
|
|
625
|
+
|
|
602
626
|
Attribute mapping allows mapping attributes provided by the third-party identity providers to [standard and custom
|
|
603
627
|
attributes](#Attributes) of the user pool. Learn more about [Specifying Identity Provider Attribute Mappings for Your
|
|
604
628
|
User Pool](https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-specifying-attribute-mapping.html).
|
|
@@ -14452,6 +14476,39 @@ class SignInUrlOptions(BaseUrlOptions):
|
|
|
14452
14476
|
)
|
|
14453
14477
|
|
|
14454
14478
|
|
|
14479
|
+
@jsii.enum(jsii_type="aws-cdk-lib.aws_cognito.SigningAlgorithm")
|
|
14480
|
+
class SigningAlgorithm(enum.Enum):
|
|
14481
|
+
'''Signing algorithms for SAML requests.
|
|
14482
|
+
|
|
14483
|
+
:exampleMetadata: infused
|
|
14484
|
+
|
|
14485
|
+
Example::
|
|
14486
|
+
|
|
14487
|
+
userpool = cognito.UserPool(self, "Pool")
|
|
14488
|
+
|
|
14489
|
+
# specify the metadata as a file content
|
|
14490
|
+
cognito.UserPoolIdentityProviderSaml(self, "userpoolIdpFile",
|
|
14491
|
+
user_pool=userpool,
|
|
14492
|
+
metadata=cognito.UserPoolIdentityProviderSamlMetadata.file("my-file-contents"),
|
|
14493
|
+
# Whether to require encrypted SAML assertions from IdP
|
|
14494
|
+
encrypted_responses=True,
|
|
14495
|
+
# The signing algorithm for the SAML requests
|
|
14496
|
+
request_signing_algorithm=cognito.SigningAlgorithm.RSA_SHA256,
|
|
14497
|
+
# Enable IdP initiated SAML auth flow
|
|
14498
|
+
idp_initiated=True
|
|
14499
|
+
)
|
|
14500
|
+
|
|
14501
|
+
# specify the metadata as a URL
|
|
14502
|
+
cognito.UserPoolIdentityProviderSaml(self, "userpoolidpUrl",
|
|
14503
|
+
user_pool=userpool,
|
|
14504
|
+
metadata=cognito.UserPoolIdentityProviderSamlMetadata.url("https://my-metadata-url.com")
|
|
14505
|
+
)
|
|
14506
|
+
'''
|
|
14507
|
+
|
|
14508
|
+
RSA_SHA256 = "RSA_SHA256"
|
|
14509
|
+
'''RSA with SHA-256.'''
|
|
14510
|
+
|
|
14511
|
+
|
|
14455
14512
|
@jsii.data_type(
|
|
14456
14513
|
jsii_type="aws-cdk-lib.aws_cognito.StandardAttribute",
|
|
14457
14514
|
jsii_struct_bases=[],
|
|
@@ -17754,48 +17811,28 @@ class UserPoolIdentityProviderSaml(
|
|
|
17754
17811
|
'''Represents an identity provider that integrates with SAML.
|
|
17755
17812
|
|
|
17756
17813
|
:resource: AWS::Cognito::UserPoolIdentityProvider
|
|
17757
|
-
:exampleMetadata:
|
|
17814
|
+
:exampleMetadata: infused
|
|
17758
17815
|
|
|
17759
17816
|
Example::
|
|
17760
17817
|
|
|
17761
|
-
|
|
17762
|
-
# The values are placeholders you should change.
|
|
17763
|
-
from aws_cdk import aws_cognito as cognito
|
|
17764
|
-
|
|
17765
|
-
# provider_attribute: cognito.ProviderAttribute
|
|
17766
|
-
# user_pool: cognito.UserPool
|
|
17767
|
-
# user_pool_identity_provider_saml_metadata: cognito.UserPoolIdentityProviderSamlMetadata
|
|
17818
|
+
userpool = cognito.UserPool(self, "Pool")
|
|
17768
17819
|
|
|
17769
|
-
|
|
17770
|
-
|
|
17771
|
-
user_pool=
|
|
17820
|
+
# specify the metadata as a file content
|
|
17821
|
+
cognito.UserPoolIdentityProviderSaml(self, "userpoolIdpFile",
|
|
17822
|
+
user_pool=userpool,
|
|
17823
|
+
metadata=cognito.UserPoolIdentityProviderSamlMetadata.file("my-file-contents"),
|
|
17824
|
+
# Whether to require encrypted SAML assertions from IdP
|
|
17825
|
+
encrypted_responses=True,
|
|
17826
|
+
# The signing algorithm for the SAML requests
|
|
17827
|
+
request_signing_algorithm=cognito.SigningAlgorithm.RSA_SHA256,
|
|
17828
|
+
# Enable IdP initiated SAML auth flow
|
|
17829
|
+
idp_initiated=True
|
|
17830
|
+
)
|
|
17772
17831
|
|
|
17773
|
-
|
|
17774
|
-
|
|
17775
|
-
|
|
17776
|
-
|
|
17777
|
-
custom={
|
|
17778
|
-
"custom_key": provider_attribute
|
|
17779
|
-
},
|
|
17780
|
-
email=provider_attribute,
|
|
17781
|
-
family_name=provider_attribute,
|
|
17782
|
-
fullname=provider_attribute,
|
|
17783
|
-
gender=provider_attribute,
|
|
17784
|
-
given_name=provider_attribute,
|
|
17785
|
-
last_update_time=provider_attribute,
|
|
17786
|
-
locale=provider_attribute,
|
|
17787
|
-
middle_name=provider_attribute,
|
|
17788
|
-
nickname=provider_attribute,
|
|
17789
|
-
phone_number=provider_attribute,
|
|
17790
|
-
preferred_username=provider_attribute,
|
|
17791
|
-
profile_page=provider_attribute,
|
|
17792
|
-
profile_picture=provider_attribute,
|
|
17793
|
-
timezone=provider_attribute,
|
|
17794
|
-
website=provider_attribute
|
|
17795
|
-
),
|
|
17796
|
-
identifiers=["identifiers"],
|
|
17797
|
-
idp_signout=False,
|
|
17798
|
-
name="name"
|
|
17832
|
+
# specify the metadata as a URL
|
|
17833
|
+
cognito.UserPoolIdentityProviderSaml(self, "userpoolidpUrl",
|
|
17834
|
+
user_pool=userpool,
|
|
17835
|
+
metadata=cognito.UserPoolIdentityProviderSamlMetadata.url("https://my-metadata-url.com")
|
|
17799
17836
|
)
|
|
17800
17837
|
'''
|
|
17801
17838
|
|
|
@@ -17805,9 +17842,12 @@ class UserPoolIdentityProviderSaml(
|
|
|
17805
17842
|
id: builtins.str,
|
|
17806
17843
|
*,
|
|
17807
17844
|
metadata: "UserPoolIdentityProviderSamlMetadata",
|
|
17845
|
+
encrypted_responses: typing.Optional[builtins.bool] = None,
|
|
17808
17846
|
identifiers: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
17847
|
+
idp_initiated: typing.Optional[builtins.bool] = None,
|
|
17809
17848
|
idp_signout: typing.Optional[builtins.bool] = None,
|
|
17810
17849
|
name: typing.Optional[builtins.str] = None,
|
|
17850
|
+
request_signing_algorithm: typing.Optional[SigningAlgorithm] = None,
|
|
17811
17851
|
user_pool: IUserPool,
|
|
17812
17852
|
attribute_mapping: typing.Optional[typing.Union[AttributeMapping, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
17813
17853
|
) -> None:
|
|
@@ -17815,9 +17855,12 @@ class UserPoolIdentityProviderSaml(
|
|
|
17815
17855
|
:param scope: -
|
|
17816
17856
|
:param id: -
|
|
17817
17857
|
:param metadata: The SAML metadata.
|
|
17858
|
+
:param encrypted_responses: Whether to require encrypted SAML assertions from IdP. Default: false
|
|
17818
17859
|
:param identifiers: Identifiers. Identifiers can be used to redirect users to the correct IdP in multitenant apps. Default: - no identifiers used
|
|
17860
|
+
:param idp_initiated: Whether to enable IdP-initiated SAML auth flows. Default: false
|
|
17819
17861
|
:param idp_signout: Whether to enable the "Sign-out flow" feature. Default: - false
|
|
17820
17862
|
:param name: The name of the provider. Must be between 3 and 32 characters. Default: - the unique ID of the construct
|
|
17863
|
+
:param request_signing_algorithm: The signing algorithm for SAML requests. Default: - don't sign requests
|
|
17821
17864
|
:param user_pool: The user pool to which this construct provides identities.
|
|
17822
17865
|
:param attribute_mapping: Mapping attributes from the identity provider to standard and custom attributes of the user pool. Default: - no attribute mapping
|
|
17823
17866
|
'''
|
|
@@ -17827,9 +17870,12 @@ class UserPoolIdentityProviderSaml(
|
|
|
17827
17870
|
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
17828
17871
|
props = UserPoolIdentityProviderSamlProps(
|
|
17829
17872
|
metadata=metadata,
|
|
17873
|
+
encrypted_responses=encrypted_responses,
|
|
17830
17874
|
identifiers=identifiers,
|
|
17875
|
+
idp_initiated=idp_initiated,
|
|
17831
17876
|
idp_signout=idp_signout,
|
|
17832
17877
|
name=name,
|
|
17878
|
+
request_signing_algorithm=request_signing_algorithm,
|
|
17833
17879
|
user_pool=user_pool,
|
|
17834
17880
|
attribute_mapping=attribute_mapping,
|
|
17835
17881
|
)
|
|
@@ -17853,15 +17899,29 @@ class UserPoolIdentityProviderSamlMetadata(
|
|
|
17853
17899
|
):
|
|
17854
17900
|
'''Metadata for a SAML user pool identity provider.
|
|
17855
17901
|
|
|
17856
|
-
:exampleMetadata:
|
|
17902
|
+
:exampleMetadata: infused
|
|
17857
17903
|
|
|
17858
17904
|
Example::
|
|
17859
17905
|
|
|
17860
|
-
|
|
17861
|
-
# The values are placeholders you should change.
|
|
17862
|
-
from aws_cdk import aws_cognito as cognito
|
|
17906
|
+
userpool = cognito.UserPool(self, "Pool")
|
|
17863
17907
|
|
|
17864
|
-
|
|
17908
|
+
# specify the metadata as a file content
|
|
17909
|
+
cognito.UserPoolIdentityProviderSaml(self, "userpoolIdpFile",
|
|
17910
|
+
user_pool=userpool,
|
|
17911
|
+
metadata=cognito.UserPoolIdentityProviderSamlMetadata.file("my-file-contents"),
|
|
17912
|
+
# Whether to require encrypted SAML assertions from IdP
|
|
17913
|
+
encrypted_responses=True,
|
|
17914
|
+
# The signing algorithm for the SAML requests
|
|
17915
|
+
request_signing_algorithm=cognito.SigningAlgorithm.RSA_SHA256,
|
|
17916
|
+
# Enable IdP initiated SAML auth flow
|
|
17917
|
+
idp_initiated=True
|
|
17918
|
+
)
|
|
17919
|
+
|
|
17920
|
+
# specify the metadata as a URL
|
|
17921
|
+
cognito.UserPoolIdentityProviderSaml(self, "userpoolidpUrl",
|
|
17922
|
+
user_pool=userpool,
|
|
17923
|
+
metadata=cognito.UserPoolIdentityProviderSamlMetadata.url("https://my-metadata-url.com")
|
|
17924
|
+
)
|
|
17865
17925
|
'''
|
|
17866
17926
|
|
|
17867
17927
|
@jsii.member(jsii_name="file")
|
|
@@ -17920,9 +17980,12 @@ class UserPoolIdentityProviderSamlMetadataType(enum.Enum):
|
|
|
17920
17980
|
"user_pool": "userPool",
|
|
17921
17981
|
"attribute_mapping": "attributeMapping",
|
|
17922
17982
|
"metadata": "metadata",
|
|
17983
|
+
"encrypted_responses": "encryptedResponses",
|
|
17923
17984
|
"identifiers": "identifiers",
|
|
17985
|
+
"idp_initiated": "idpInitiated",
|
|
17924
17986
|
"idp_signout": "idpSignout",
|
|
17925
17987
|
"name": "name",
|
|
17988
|
+
"request_signing_algorithm": "requestSigningAlgorithm",
|
|
17926
17989
|
},
|
|
17927
17990
|
)
|
|
17928
17991
|
class UserPoolIdentityProviderSamlProps(UserPoolIdentityProviderProps):
|
|
@@ -17932,61 +17995,47 @@ class UserPoolIdentityProviderSamlProps(UserPoolIdentityProviderProps):
|
|
|
17932
17995
|
user_pool: IUserPool,
|
|
17933
17996
|
attribute_mapping: typing.Optional[typing.Union[AttributeMapping, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
17934
17997
|
metadata: UserPoolIdentityProviderSamlMetadata,
|
|
17998
|
+
encrypted_responses: typing.Optional[builtins.bool] = None,
|
|
17935
17999
|
identifiers: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
18000
|
+
idp_initiated: typing.Optional[builtins.bool] = None,
|
|
17936
18001
|
idp_signout: typing.Optional[builtins.bool] = None,
|
|
17937
18002
|
name: typing.Optional[builtins.str] = None,
|
|
18003
|
+
request_signing_algorithm: typing.Optional[SigningAlgorithm] = None,
|
|
17938
18004
|
) -> None:
|
|
17939
18005
|
'''Properties to initialize UserPoolIdentityProviderSaml.
|
|
17940
18006
|
|
|
17941
18007
|
:param user_pool: The user pool to which this construct provides identities.
|
|
17942
18008
|
:param attribute_mapping: Mapping attributes from the identity provider to standard and custom attributes of the user pool. Default: - no attribute mapping
|
|
17943
18009
|
:param metadata: The SAML metadata.
|
|
18010
|
+
:param encrypted_responses: Whether to require encrypted SAML assertions from IdP. Default: false
|
|
17944
18011
|
:param identifiers: Identifiers. Identifiers can be used to redirect users to the correct IdP in multitenant apps. Default: - no identifiers used
|
|
18012
|
+
:param idp_initiated: Whether to enable IdP-initiated SAML auth flows. Default: false
|
|
17945
18013
|
:param idp_signout: Whether to enable the "Sign-out flow" feature. Default: - false
|
|
17946
18014
|
:param name: The name of the provider. Must be between 3 and 32 characters. Default: - the unique ID of the construct
|
|
18015
|
+
:param request_signing_algorithm: The signing algorithm for SAML requests. Default: - don't sign requests
|
|
17947
18016
|
|
|
17948
|
-
:exampleMetadata:
|
|
18017
|
+
:exampleMetadata: infused
|
|
17949
18018
|
|
|
17950
18019
|
Example::
|
|
17951
18020
|
|
|
17952
|
-
|
|
17953
|
-
# The values are placeholders you should change.
|
|
17954
|
-
from aws_cdk import aws_cognito as cognito
|
|
17955
|
-
|
|
17956
|
-
# provider_attribute: cognito.ProviderAttribute
|
|
17957
|
-
# user_pool: cognito.UserPool
|
|
17958
|
-
# user_pool_identity_provider_saml_metadata: cognito.UserPoolIdentityProviderSamlMetadata
|
|
18021
|
+
userpool = cognito.UserPool(self, "Pool")
|
|
17959
18022
|
|
|
17960
|
-
|
|
17961
|
-
|
|
17962
|
-
user_pool=
|
|
18023
|
+
# specify the metadata as a file content
|
|
18024
|
+
cognito.UserPoolIdentityProviderSaml(self, "userpoolIdpFile",
|
|
18025
|
+
user_pool=userpool,
|
|
18026
|
+
metadata=cognito.UserPoolIdentityProviderSamlMetadata.file("my-file-contents"),
|
|
18027
|
+
# Whether to require encrypted SAML assertions from IdP
|
|
18028
|
+
encrypted_responses=True,
|
|
18029
|
+
# The signing algorithm for the SAML requests
|
|
18030
|
+
request_signing_algorithm=cognito.SigningAlgorithm.RSA_SHA256,
|
|
18031
|
+
# Enable IdP initiated SAML auth flow
|
|
18032
|
+
idp_initiated=True
|
|
18033
|
+
)
|
|
17963
18034
|
|
|
17964
|
-
|
|
17965
|
-
|
|
17966
|
-
|
|
17967
|
-
|
|
17968
|
-
custom={
|
|
17969
|
-
"custom_key": provider_attribute
|
|
17970
|
-
},
|
|
17971
|
-
email=provider_attribute,
|
|
17972
|
-
family_name=provider_attribute,
|
|
17973
|
-
fullname=provider_attribute,
|
|
17974
|
-
gender=provider_attribute,
|
|
17975
|
-
given_name=provider_attribute,
|
|
17976
|
-
last_update_time=provider_attribute,
|
|
17977
|
-
locale=provider_attribute,
|
|
17978
|
-
middle_name=provider_attribute,
|
|
17979
|
-
nickname=provider_attribute,
|
|
17980
|
-
phone_number=provider_attribute,
|
|
17981
|
-
preferred_username=provider_attribute,
|
|
17982
|
-
profile_page=provider_attribute,
|
|
17983
|
-
profile_picture=provider_attribute,
|
|
17984
|
-
timezone=provider_attribute,
|
|
17985
|
-
website=provider_attribute
|
|
17986
|
-
),
|
|
17987
|
-
identifiers=["identifiers"],
|
|
17988
|
-
idp_signout=False,
|
|
17989
|
-
name="name"
|
|
18035
|
+
# specify the metadata as a URL
|
|
18036
|
+
cognito.UserPoolIdentityProviderSaml(self, "userpoolidpUrl",
|
|
18037
|
+
user_pool=userpool,
|
|
18038
|
+
metadata=cognito.UserPoolIdentityProviderSamlMetadata.url("https://my-metadata-url.com")
|
|
17990
18039
|
)
|
|
17991
18040
|
'''
|
|
17992
18041
|
if isinstance(attribute_mapping, dict):
|
|
@@ -17996,21 +18045,30 @@ class UserPoolIdentityProviderSamlProps(UserPoolIdentityProviderProps):
|
|
|
17996
18045
|
check_type(argname="argument user_pool", value=user_pool, expected_type=type_hints["user_pool"])
|
|
17997
18046
|
check_type(argname="argument attribute_mapping", value=attribute_mapping, expected_type=type_hints["attribute_mapping"])
|
|
17998
18047
|
check_type(argname="argument metadata", value=metadata, expected_type=type_hints["metadata"])
|
|
18048
|
+
check_type(argname="argument encrypted_responses", value=encrypted_responses, expected_type=type_hints["encrypted_responses"])
|
|
17999
18049
|
check_type(argname="argument identifiers", value=identifiers, expected_type=type_hints["identifiers"])
|
|
18050
|
+
check_type(argname="argument idp_initiated", value=idp_initiated, expected_type=type_hints["idp_initiated"])
|
|
18000
18051
|
check_type(argname="argument idp_signout", value=idp_signout, expected_type=type_hints["idp_signout"])
|
|
18001
18052
|
check_type(argname="argument name", value=name, expected_type=type_hints["name"])
|
|
18053
|
+
check_type(argname="argument request_signing_algorithm", value=request_signing_algorithm, expected_type=type_hints["request_signing_algorithm"])
|
|
18002
18054
|
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
18003
18055
|
"user_pool": user_pool,
|
|
18004
18056
|
"metadata": metadata,
|
|
18005
18057
|
}
|
|
18006
18058
|
if attribute_mapping is not None:
|
|
18007
18059
|
self._values["attribute_mapping"] = attribute_mapping
|
|
18060
|
+
if encrypted_responses is not None:
|
|
18061
|
+
self._values["encrypted_responses"] = encrypted_responses
|
|
18008
18062
|
if identifiers is not None:
|
|
18009
18063
|
self._values["identifiers"] = identifiers
|
|
18064
|
+
if idp_initiated is not None:
|
|
18065
|
+
self._values["idp_initiated"] = idp_initiated
|
|
18010
18066
|
if idp_signout is not None:
|
|
18011
18067
|
self._values["idp_signout"] = idp_signout
|
|
18012
18068
|
if name is not None:
|
|
18013
18069
|
self._values["name"] = name
|
|
18070
|
+
if request_signing_algorithm is not None:
|
|
18071
|
+
self._values["request_signing_algorithm"] = request_signing_algorithm
|
|
18014
18072
|
|
|
18015
18073
|
@builtins.property
|
|
18016
18074
|
def user_pool(self) -> IUserPool:
|
|
@@ -18035,6 +18093,17 @@ class UserPoolIdentityProviderSamlProps(UserPoolIdentityProviderProps):
|
|
|
18035
18093
|
assert result is not None, "Required property 'metadata' is missing"
|
|
18036
18094
|
return typing.cast(UserPoolIdentityProviderSamlMetadata, result)
|
|
18037
18095
|
|
|
18096
|
+
@builtins.property
|
|
18097
|
+
def encrypted_responses(self) -> typing.Optional[builtins.bool]:
|
|
18098
|
+
'''Whether to require encrypted SAML assertions from IdP.
|
|
18099
|
+
|
|
18100
|
+
:default: false
|
|
18101
|
+
|
|
18102
|
+
:see: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-SAML-signing-encryption.html#cognito-user-pools-SAML-encryption
|
|
18103
|
+
'''
|
|
18104
|
+
result = self._values.get("encrypted_responses")
|
|
18105
|
+
return typing.cast(typing.Optional[builtins.bool], result)
|
|
18106
|
+
|
|
18038
18107
|
@builtins.property
|
|
18039
18108
|
def identifiers(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
18040
18109
|
'''Identifiers.
|
|
@@ -18046,6 +18115,15 @@ class UserPoolIdentityProviderSamlProps(UserPoolIdentityProviderProps):
|
|
|
18046
18115
|
result = self._values.get("identifiers")
|
|
18047
18116
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
18048
18117
|
|
|
18118
|
+
@builtins.property
|
|
18119
|
+
def idp_initiated(self) -> typing.Optional[builtins.bool]:
|
|
18120
|
+
'''Whether to enable IdP-initiated SAML auth flows.
|
|
18121
|
+
|
|
18122
|
+
:default: false
|
|
18123
|
+
'''
|
|
18124
|
+
result = self._values.get("idp_initiated")
|
|
18125
|
+
return typing.cast(typing.Optional[builtins.bool], result)
|
|
18126
|
+
|
|
18049
18127
|
@builtins.property
|
|
18050
18128
|
def idp_signout(self) -> typing.Optional[builtins.bool]:
|
|
18051
18129
|
'''Whether to enable the "Sign-out flow" feature.
|
|
@@ -18066,6 +18144,17 @@ class UserPoolIdentityProviderSamlProps(UserPoolIdentityProviderProps):
|
|
|
18066
18144
|
result = self._values.get("name")
|
|
18067
18145
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
18068
18146
|
|
|
18147
|
+
@builtins.property
|
|
18148
|
+
def request_signing_algorithm(self) -> typing.Optional[SigningAlgorithm]:
|
|
18149
|
+
'''The signing algorithm for SAML requests.
|
|
18150
|
+
|
|
18151
|
+
:default: - don't sign requests
|
|
18152
|
+
|
|
18153
|
+
:see: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-SAML-signing-encryption.html#cognito-user-pools-SAML-signing
|
|
18154
|
+
'''
|
|
18155
|
+
result = self._values.get("request_signing_algorithm")
|
|
18156
|
+
return typing.cast(typing.Optional[SigningAlgorithm], result)
|
|
18157
|
+
|
|
18069
18158
|
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
18070
18159
|
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
18071
18160
|
|
|
@@ -20595,6 +20684,7 @@ __all__ = [
|
|
|
20595
20684
|
"ResourceServerScopeProps",
|
|
20596
20685
|
"SignInAliases",
|
|
20597
20686
|
"SignInUrlOptions",
|
|
20687
|
+
"SigningAlgorithm",
|
|
20598
20688
|
"StandardAttribute",
|
|
20599
20689
|
"StandardAttributes",
|
|
20600
20690
|
"StandardAttributesMask",
|
|
@@ -22889,9 +22979,12 @@ def _typecheckingstub__718ac630a451940587ebda0797cfbdec5b11e5bcd3f498d39d6663201
|
|
|
22889
22979
|
id: builtins.str,
|
|
22890
22980
|
*,
|
|
22891
22981
|
metadata: UserPoolIdentityProviderSamlMetadata,
|
|
22982
|
+
encrypted_responses: typing.Optional[builtins.bool] = None,
|
|
22892
22983
|
identifiers: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
22984
|
+
idp_initiated: typing.Optional[builtins.bool] = None,
|
|
22893
22985
|
idp_signout: typing.Optional[builtins.bool] = None,
|
|
22894
22986
|
name: typing.Optional[builtins.str] = None,
|
|
22987
|
+
request_signing_algorithm: typing.Optional[SigningAlgorithm] = None,
|
|
22895
22988
|
user_pool: IUserPool,
|
|
22896
22989
|
attribute_mapping: typing.Optional[typing.Union[AttributeMapping, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
22897
22990
|
) -> None:
|
|
@@ -22915,9 +23008,12 @@ def _typecheckingstub__2f52f706aa700f252fccd887b4c4fad1305e00535d6e476a5d2ee9577
|
|
|
22915
23008
|
user_pool: IUserPool,
|
|
22916
23009
|
attribute_mapping: typing.Optional[typing.Union[AttributeMapping, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
22917
23010
|
metadata: UserPoolIdentityProviderSamlMetadata,
|
|
23011
|
+
encrypted_responses: typing.Optional[builtins.bool] = None,
|
|
22918
23012
|
identifiers: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
23013
|
+
idp_initiated: typing.Optional[builtins.bool] = None,
|
|
22919
23014
|
idp_signout: typing.Optional[builtins.bool] = None,
|
|
22920
23015
|
name: typing.Optional[builtins.str] = None,
|
|
23016
|
+
request_signing_algorithm: typing.Optional[SigningAlgorithm] = None,
|
|
22921
23017
|
) -> None:
|
|
22922
23018
|
"""Type checking stubs"""
|
|
22923
23019
|
pass
|