aws-cdk-lib 2.137.0__py3-none-any.whl → 2.139.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk-lib might be problematic. Click here for more details.
- aws_cdk/__init__.py +8 -0
- aws_cdk/_jsii/__init__.py +1 -1
- aws_cdk/_jsii/{aws-cdk-lib@2.137.0.jsii.tgz → aws-cdk-lib@2.139.0.jsii.tgz} +0 -0
- aws_cdk/aws_amplify/__init__.py +29 -113
- aws_cdk/aws_apigateway/__init__.py +29 -16
- aws_cdk/aws_appconfig/__init__.py +315 -77
- aws_cdk/aws_appintegrations/__init__.py +55 -6
- aws_cdk/aws_apprunner/__init__.py +5 -2
- aws_cdk/aws_appsync/__init__.py +400 -13
- aws_cdk/aws_aps/__init__.py +64 -47
- aws_cdk/aws_autoscaling/__init__.py +62 -60
- aws_cdk/aws_b2bi/__init__.py +2 -6
- aws_cdk/aws_backup/__init__.py +53 -57
- aws_cdk/aws_batch/__init__.py +109 -0
- aws_cdk/aws_bcmdataexports/__init__.py +1114 -0
- aws_cdk/aws_bedrock/__init__.py +4144 -0
- aws_cdk/aws_chatbot/__init__.py +6 -4
- aws_cdk/aws_cleanrooms/__init__.py +526 -3
- aws_cdk/aws_cleanroomsml/__init__.py +960 -0
- aws_cdk/aws_cloudtrail/__init__.py +10 -10
- aws_cdk/aws_cloudwatch/__init__.py +244 -8
- aws_cdk/aws_codebuild/__init__.py +27 -22
- aws_cdk/aws_codeconnections/__init__.py +435 -0
- aws_cdk/aws_cognito/__init__.py +175 -79
- aws_cdk/aws_datazone/__init__.py +22 -0
- aws_cdk/aws_deadline/__init__.py +5394 -0
- aws_cdk/aws_dms/__init__.py +2 -4
- aws_cdk/aws_ec2/__init__.py +402 -247
- aws_cdk/aws_ecr/__init__.py +630 -0
- aws_cdk/aws_ecs/__init__.py +361 -20
- aws_cdk/aws_efs/__init__.py +594 -2
- aws_cdk/aws_elasticache/__init__.py +86 -32
- aws_cdk/aws_elasticloadbalancingv2/__init__.py +75 -10
- aws_cdk/aws_emr/__init__.py +2 -2
- aws_cdk/aws_entityresolution/__init__.py +1982 -773
- aws_cdk/aws_events_targets/__init__.py +17 -4
- aws_cdk/aws_globalaccelerator/__init__.py +443 -0
- aws_cdk/aws_iam/__init__.py +1 -2
- aws_cdk/aws_internetmonitor/__init__.py +14 -6
- aws_cdk/aws_ivs/__init__.py +1273 -71
- aws_cdk/aws_kms/__init__.py +44 -0
- aws_cdk/aws_lambda/__init__.py +9 -0
- aws_cdk/aws_mediatailor/__init__.py +41 -0
- aws_cdk/aws_oam/__init__.py +204 -0
- aws_cdk/aws_personalize/__init__.py +8 -6
- aws_cdk/aws_pinpoint/__init__.py +5 -3
- aws_cdk/aws_pipes/__init__.py +5 -1
- aws_cdk/aws_quicksight/__init__.py +12 -6
- aws_cdk/aws_rds/__init__.py +370 -96
- aws_cdk/aws_redshiftserverless/__init__.py +157 -0
- aws_cdk/aws_route53/__init__.py +587 -14
- aws_cdk/aws_sagemaker/__init__.py +233 -2
- aws_cdk/aws_securityhub/__init__.py +4940 -102
- aws_cdk/aws_securitylake/__init__.py +1326 -89
- aws_cdk/aws_ses_actions/__init__.py +155 -0
- aws_cdk/aws_sns/__init__.py +61 -4
- aws_cdk/aws_ssm/__init__.py +5 -2
- aws_cdk/aws_ssmcontacts/__init__.py +11 -4
- aws_cdk/aws_stepfunctions/__init__.py +8 -16
- aws_cdk/aws_stepfunctions_tasks/__init__.py +676 -1
- aws_cdk/aws_timestream/__init__.py +1045 -0
- aws_cdk/aws_transfer/__init__.py +19 -10
- aws_cdk/aws_verifiedpermissions/__init__.py +114 -37
- aws_cdk/aws_wisdom/__init__.py +2 -2
- aws_cdk/aws_workspacesthinclient/__init__.py +8 -8
- aws_cdk/custom_resources/__init__.py +688 -26
- aws_cdk/cx_api/__init__.py +17 -0
- {aws_cdk_lib-2.137.0.dist-info → aws_cdk_lib-2.139.0.dist-info}/METADATA +3 -3
- {aws_cdk_lib-2.137.0.dist-info → aws_cdk_lib-2.139.0.dist-info}/RECORD +73 -69
- {aws_cdk_lib-2.137.0.dist-info → aws_cdk_lib-2.139.0.dist-info}/LICENSE +0 -0
- {aws_cdk_lib-2.137.0.dist-info → aws_cdk_lib-2.139.0.dist-info}/NOTICE +0 -0
- {aws_cdk_lib-2.137.0.dist-info → aws_cdk_lib-2.139.0.dist-info}/WHEEL +0 -0
- {aws_cdk_lib-2.137.0.dist-info → aws_cdk_lib-2.139.0.dist-info}/top_level.txt +0 -0
aws_cdk/aws_cognito/__init__.py
CHANGED
|
@@ -599,6 +599,30 @@ provider = cognito.UserPoolIdentityProviderGoogle(self, "Google",
|
|
|
599
599
|
)
|
|
600
600
|
```
|
|
601
601
|
|
|
602
|
+
Using SAML identity provider is possible to use SAML metadata file content or SAML metadata file url.
|
|
603
|
+
|
|
604
|
+
```python
|
|
605
|
+
userpool = cognito.UserPool(self, "Pool")
|
|
606
|
+
|
|
607
|
+
# specify the metadata as a file content
|
|
608
|
+
cognito.UserPoolIdentityProviderSaml(self, "userpoolIdpFile",
|
|
609
|
+
user_pool=userpool,
|
|
610
|
+
metadata=cognito.UserPoolIdentityProviderSamlMetadata.file("my-file-contents"),
|
|
611
|
+
# Whether to require encrypted SAML assertions from IdP
|
|
612
|
+
encrypted_responses=True,
|
|
613
|
+
# The signing algorithm for the SAML requests
|
|
614
|
+
request_signing_algorithm=cognito.SigningAlgorithm.RSA_SHA256,
|
|
615
|
+
# Enable IdP initiated SAML auth flow
|
|
616
|
+
idp_initiated=True
|
|
617
|
+
)
|
|
618
|
+
|
|
619
|
+
# specify the metadata as a URL
|
|
620
|
+
cognito.UserPoolIdentityProviderSaml(self, "userpoolidpUrl",
|
|
621
|
+
user_pool=userpool,
|
|
622
|
+
metadata=cognito.UserPoolIdentityProviderSamlMetadata.url("https://my-metadata-url.com")
|
|
623
|
+
)
|
|
624
|
+
```
|
|
625
|
+
|
|
602
626
|
Attribute mapping allows mapping attributes provided by the third-party identity providers to [standard and custom
|
|
603
627
|
attributes](#Attributes) of the user pool. Learn more about [Specifying Identity Provider Attribute Mappings for Your
|
|
604
628
|
User Pool](https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-specifying-attribute-mapping.html).
|
|
@@ -14452,6 +14476,39 @@ class SignInUrlOptions(BaseUrlOptions):
|
|
|
14452
14476
|
)
|
|
14453
14477
|
|
|
14454
14478
|
|
|
14479
|
+
@jsii.enum(jsii_type="aws-cdk-lib.aws_cognito.SigningAlgorithm")
|
|
14480
|
+
class SigningAlgorithm(enum.Enum):
|
|
14481
|
+
'''Signing algorithms for SAML requests.
|
|
14482
|
+
|
|
14483
|
+
:exampleMetadata: infused
|
|
14484
|
+
|
|
14485
|
+
Example::
|
|
14486
|
+
|
|
14487
|
+
userpool = cognito.UserPool(self, "Pool")
|
|
14488
|
+
|
|
14489
|
+
# specify the metadata as a file content
|
|
14490
|
+
cognito.UserPoolIdentityProviderSaml(self, "userpoolIdpFile",
|
|
14491
|
+
user_pool=userpool,
|
|
14492
|
+
metadata=cognito.UserPoolIdentityProviderSamlMetadata.file("my-file-contents"),
|
|
14493
|
+
# Whether to require encrypted SAML assertions from IdP
|
|
14494
|
+
encrypted_responses=True,
|
|
14495
|
+
# The signing algorithm for the SAML requests
|
|
14496
|
+
request_signing_algorithm=cognito.SigningAlgorithm.RSA_SHA256,
|
|
14497
|
+
# Enable IdP initiated SAML auth flow
|
|
14498
|
+
idp_initiated=True
|
|
14499
|
+
)
|
|
14500
|
+
|
|
14501
|
+
# specify the metadata as a URL
|
|
14502
|
+
cognito.UserPoolIdentityProviderSaml(self, "userpoolidpUrl",
|
|
14503
|
+
user_pool=userpool,
|
|
14504
|
+
metadata=cognito.UserPoolIdentityProviderSamlMetadata.url("https://my-metadata-url.com")
|
|
14505
|
+
)
|
|
14506
|
+
'''
|
|
14507
|
+
|
|
14508
|
+
RSA_SHA256 = "RSA_SHA256"
|
|
14509
|
+
'''RSA with SHA-256.'''
|
|
14510
|
+
|
|
14511
|
+
|
|
14455
14512
|
@jsii.data_type(
|
|
14456
14513
|
jsii_type="aws-cdk-lib.aws_cognito.StandardAttribute",
|
|
14457
14514
|
jsii_struct_bases=[],
|
|
@@ -17754,48 +17811,28 @@ class UserPoolIdentityProviderSaml(
|
|
|
17754
17811
|
'''Represents an identity provider that integrates with SAML.
|
|
17755
17812
|
|
|
17756
17813
|
:resource: AWS::Cognito::UserPoolIdentityProvider
|
|
17757
|
-
:exampleMetadata:
|
|
17814
|
+
:exampleMetadata: infused
|
|
17758
17815
|
|
|
17759
17816
|
Example::
|
|
17760
17817
|
|
|
17761
|
-
|
|
17762
|
-
# The values are placeholders you should change.
|
|
17763
|
-
from aws_cdk import aws_cognito as cognito
|
|
17764
|
-
|
|
17765
|
-
# provider_attribute: cognito.ProviderAttribute
|
|
17766
|
-
# user_pool: cognito.UserPool
|
|
17767
|
-
# user_pool_identity_provider_saml_metadata: cognito.UserPoolIdentityProviderSamlMetadata
|
|
17818
|
+
userpool = cognito.UserPool(self, "Pool")
|
|
17768
17819
|
|
|
17769
|
-
|
|
17770
|
-
|
|
17771
|
-
user_pool=
|
|
17820
|
+
# specify the metadata as a file content
|
|
17821
|
+
cognito.UserPoolIdentityProviderSaml(self, "userpoolIdpFile",
|
|
17822
|
+
user_pool=userpool,
|
|
17823
|
+
metadata=cognito.UserPoolIdentityProviderSamlMetadata.file("my-file-contents"),
|
|
17824
|
+
# Whether to require encrypted SAML assertions from IdP
|
|
17825
|
+
encrypted_responses=True,
|
|
17826
|
+
# The signing algorithm for the SAML requests
|
|
17827
|
+
request_signing_algorithm=cognito.SigningAlgorithm.RSA_SHA256,
|
|
17828
|
+
# Enable IdP initiated SAML auth flow
|
|
17829
|
+
idp_initiated=True
|
|
17830
|
+
)
|
|
17772
17831
|
|
|
17773
|
-
|
|
17774
|
-
|
|
17775
|
-
|
|
17776
|
-
|
|
17777
|
-
custom={
|
|
17778
|
-
"custom_key": provider_attribute
|
|
17779
|
-
},
|
|
17780
|
-
email=provider_attribute,
|
|
17781
|
-
family_name=provider_attribute,
|
|
17782
|
-
fullname=provider_attribute,
|
|
17783
|
-
gender=provider_attribute,
|
|
17784
|
-
given_name=provider_attribute,
|
|
17785
|
-
last_update_time=provider_attribute,
|
|
17786
|
-
locale=provider_attribute,
|
|
17787
|
-
middle_name=provider_attribute,
|
|
17788
|
-
nickname=provider_attribute,
|
|
17789
|
-
phone_number=provider_attribute,
|
|
17790
|
-
preferred_username=provider_attribute,
|
|
17791
|
-
profile_page=provider_attribute,
|
|
17792
|
-
profile_picture=provider_attribute,
|
|
17793
|
-
timezone=provider_attribute,
|
|
17794
|
-
website=provider_attribute
|
|
17795
|
-
),
|
|
17796
|
-
identifiers=["identifiers"],
|
|
17797
|
-
idp_signout=False,
|
|
17798
|
-
name="name"
|
|
17832
|
+
# specify the metadata as a URL
|
|
17833
|
+
cognito.UserPoolIdentityProviderSaml(self, "userpoolidpUrl",
|
|
17834
|
+
user_pool=userpool,
|
|
17835
|
+
metadata=cognito.UserPoolIdentityProviderSamlMetadata.url("https://my-metadata-url.com")
|
|
17799
17836
|
)
|
|
17800
17837
|
'''
|
|
17801
17838
|
|
|
@@ -17805,9 +17842,12 @@ class UserPoolIdentityProviderSaml(
|
|
|
17805
17842
|
id: builtins.str,
|
|
17806
17843
|
*,
|
|
17807
17844
|
metadata: "UserPoolIdentityProviderSamlMetadata",
|
|
17845
|
+
encrypted_responses: typing.Optional[builtins.bool] = None,
|
|
17808
17846
|
identifiers: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
17847
|
+
idp_initiated: typing.Optional[builtins.bool] = None,
|
|
17809
17848
|
idp_signout: typing.Optional[builtins.bool] = None,
|
|
17810
17849
|
name: typing.Optional[builtins.str] = None,
|
|
17850
|
+
request_signing_algorithm: typing.Optional[SigningAlgorithm] = None,
|
|
17811
17851
|
user_pool: IUserPool,
|
|
17812
17852
|
attribute_mapping: typing.Optional[typing.Union[AttributeMapping, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
17813
17853
|
) -> None:
|
|
@@ -17815,9 +17855,12 @@ class UserPoolIdentityProviderSaml(
|
|
|
17815
17855
|
:param scope: -
|
|
17816
17856
|
:param id: -
|
|
17817
17857
|
:param metadata: The SAML metadata.
|
|
17858
|
+
:param encrypted_responses: Whether to require encrypted SAML assertions from IdP. Default: false
|
|
17818
17859
|
:param identifiers: Identifiers. Identifiers can be used to redirect users to the correct IdP in multitenant apps. Default: - no identifiers used
|
|
17860
|
+
:param idp_initiated: Whether to enable IdP-initiated SAML auth flows. Default: false
|
|
17819
17861
|
:param idp_signout: Whether to enable the "Sign-out flow" feature. Default: - false
|
|
17820
17862
|
:param name: The name of the provider. Must be between 3 and 32 characters. Default: - the unique ID of the construct
|
|
17863
|
+
:param request_signing_algorithm: The signing algorithm for SAML requests. Default: - don't sign requests
|
|
17821
17864
|
:param user_pool: The user pool to which this construct provides identities.
|
|
17822
17865
|
:param attribute_mapping: Mapping attributes from the identity provider to standard and custom attributes of the user pool. Default: - no attribute mapping
|
|
17823
17866
|
'''
|
|
@@ -17827,9 +17870,12 @@ class UserPoolIdentityProviderSaml(
|
|
|
17827
17870
|
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
17828
17871
|
props = UserPoolIdentityProviderSamlProps(
|
|
17829
17872
|
metadata=metadata,
|
|
17873
|
+
encrypted_responses=encrypted_responses,
|
|
17830
17874
|
identifiers=identifiers,
|
|
17875
|
+
idp_initiated=idp_initiated,
|
|
17831
17876
|
idp_signout=idp_signout,
|
|
17832
17877
|
name=name,
|
|
17878
|
+
request_signing_algorithm=request_signing_algorithm,
|
|
17833
17879
|
user_pool=user_pool,
|
|
17834
17880
|
attribute_mapping=attribute_mapping,
|
|
17835
17881
|
)
|
|
@@ -17853,15 +17899,29 @@ class UserPoolIdentityProviderSamlMetadata(
|
|
|
17853
17899
|
):
|
|
17854
17900
|
'''Metadata for a SAML user pool identity provider.
|
|
17855
17901
|
|
|
17856
|
-
:exampleMetadata:
|
|
17902
|
+
:exampleMetadata: infused
|
|
17857
17903
|
|
|
17858
17904
|
Example::
|
|
17859
17905
|
|
|
17860
|
-
|
|
17861
|
-
# The values are placeholders you should change.
|
|
17862
|
-
from aws_cdk import aws_cognito as cognito
|
|
17906
|
+
userpool = cognito.UserPool(self, "Pool")
|
|
17863
17907
|
|
|
17864
|
-
|
|
17908
|
+
# specify the metadata as a file content
|
|
17909
|
+
cognito.UserPoolIdentityProviderSaml(self, "userpoolIdpFile",
|
|
17910
|
+
user_pool=userpool,
|
|
17911
|
+
metadata=cognito.UserPoolIdentityProviderSamlMetadata.file("my-file-contents"),
|
|
17912
|
+
# Whether to require encrypted SAML assertions from IdP
|
|
17913
|
+
encrypted_responses=True,
|
|
17914
|
+
# The signing algorithm for the SAML requests
|
|
17915
|
+
request_signing_algorithm=cognito.SigningAlgorithm.RSA_SHA256,
|
|
17916
|
+
# Enable IdP initiated SAML auth flow
|
|
17917
|
+
idp_initiated=True
|
|
17918
|
+
)
|
|
17919
|
+
|
|
17920
|
+
# specify the metadata as a URL
|
|
17921
|
+
cognito.UserPoolIdentityProviderSaml(self, "userpoolidpUrl",
|
|
17922
|
+
user_pool=userpool,
|
|
17923
|
+
metadata=cognito.UserPoolIdentityProviderSamlMetadata.url("https://my-metadata-url.com")
|
|
17924
|
+
)
|
|
17865
17925
|
'''
|
|
17866
17926
|
|
|
17867
17927
|
@jsii.member(jsii_name="file")
|
|
@@ -17920,9 +17980,12 @@ class UserPoolIdentityProviderSamlMetadataType(enum.Enum):
|
|
|
17920
17980
|
"user_pool": "userPool",
|
|
17921
17981
|
"attribute_mapping": "attributeMapping",
|
|
17922
17982
|
"metadata": "metadata",
|
|
17983
|
+
"encrypted_responses": "encryptedResponses",
|
|
17923
17984
|
"identifiers": "identifiers",
|
|
17985
|
+
"idp_initiated": "idpInitiated",
|
|
17924
17986
|
"idp_signout": "idpSignout",
|
|
17925
17987
|
"name": "name",
|
|
17988
|
+
"request_signing_algorithm": "requestSigningAlgorithm",
|
|
17926
17989
|
},
|
|
17927
17990
|
)
|
|
17928
17991
|
class UserPoolIdentityProviderSamlProps(UserPoolIdentityProviderProps):
|
|
@@ -17932,61 +17995,47 @@ class UserPoolIdentityProviderSamlProps(UserPoolIdentityProviderProps):
|
|
|
17932
17995
|
user_pool: IUserPool,
|
|
17933
17996
|
attribute_mapping: typing.Optional[typing.Union[AttributeMapping, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
17934
17997
|
metadata: UserPoolIdentityProviderSamlMetadata,
|
|
17998
|
+
encrypted_responses: typing.Optional[builtins.bool] = None,
|
|
17935
17999
|
identifiers: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
18000
|
+
idp_initiated: typing.Optional[builtins.bool] = None,
|
|
17936
18001
|
idp_signout: typing.Optional[builtins.bool] = None,
|
|
17937
18002
|
name: typing.Optional[builtins.str] = None,
|
|
18003
|
+
request_signing_algorithm: typing.Optional[SigningAlgorithm] = None,
|
|
17938
18004
|
) -> None:
|
|
17939
18005
|
'''Properties to initialize UserPoolIdentityProviderSaml.
|
|
17940
18006
|
|
|
17941
18007
|
:param user_pool: The user pool to which this construct provides identities.
|
|
17942
18008
|
:param attribute_mapping: Mapping attributes from the identity provider to standard and custom attributes of the user pool. Default: - no attribute mapping
|
|
17943
18009
|
:param metadata: The SAML metadata.
|
|
18010
|
+
:param encrypted_responses: Whether to require encrypted SAML assertions from IdP. Default: false
|
|
17944
18011
|
:param identifiers: Identifiers. Identifiers can be used to redirect users to the correct IdP in multitenant apps. Default: - no identifiers used
|
|
18012
|
+
:param idp_initiated: Whether to enable IdP-initiated SAML auth flows. Default: false
|
|
17945
18013
|
:param idp_signout: Whether to enable the "Sign-out flow" feature. Default: - false
|
|
17946
18014
|
:param name: The name of the provider. Must be between 3 and 32 characters. Default: - the unique ID of the construct
|
|
18015
|
+
:param request_signing_algorithm: The signing algorithm for SAML requests. Default: - don't sign requests
|
|
17947
18016
|
|
|
17948
|
-
:exampleMetadata:
|
|
18017
|
+
:exampleMetadata: infused
|
|
17949
18018
|
|
|
17950
18019
|
Example::
|
|
17951
18020
|
|
|
17952
|
-
|
|
17953
|
-
# The values are placeholders you should change.
|
|
17954
|
-
from aws_cdk import aws_cognito as cognito
|
|
17955
|
-
|
|
17956
|
-
# provider_attribute: cognito.ProviderAttribute
|
|
17957
|
-
# user_pool: cognito.UserPool
|
|
17958
|
-
# user_pool_identity_provider_saml_metadata: cognito.UserPoolIdentityProviderSamlMetadata
|
|
18021
|
+
userpool = cognito.UserPool(self, "Pool")
|
|
17959
18022
|
|
|
17960
|
-
|
|
17961
|
-
|
|
17962
|
-
user_pool=
|
|
18023
|
+
# specify the metadata as a file content
|
|
18024
|
+
cognito.UserPoolIdentityProviderSaml(self, "userpoolIdpFile",
|
|
18025
|
+
user_pool=userpool,
|
|
18026
|
+
metadata=cognito.UserPoolIdentityProviderSamlMetadata.file("my-file-contents"),
|
|
18027
|
+
# Whether to require encrypted SAML assertions from IdP
|
|
18028
|
+
encrypted_responses=True,
|
|
18029
|
+
# The signing algorithm for the SAML requests
|
|
18030
|
+
request_signing_algorithm=cognito.SigningAlgorithm.RSA_SHA256,
|
|
18031
|
+
# Enable IdP initiated SAML auth flow
|
|
18032
|
+
idp_initiated=True
|
|
18033
|
+
)
|
|
17963
18034
|
|
|
17964
|
-
|
|
17965
|
-
|
|
17966
|
-
|
|
17967
|
-
|
|
17968
|
-
custom={
|
|
17969
|
-
"custom_key": provider_attribute
|
|
17970
|
-
},
|
|
17971
|
-
email=provider_attribute,
|
|
17972
|
-
family_name=provider_attribute,
|
|
17973
|
-
fullname=provider_attribute,
|
|
17974
|
-
gender=provider_attribute,
|
|
17975
|
-
given_name=provider_attribute,
|
|
17976
|
-
last_update_time=provider_attribute,
|
|
17977
|
-
locale=provider_attribute,
|
|
17978
|
-
middle_name=provider_attribute,
|
|
17979
|
-
nickname=provider_attribute,
|
|
17980
|
-
phone_number=provider_attribute,
|
|
17981
|
-
preferred_username=provider_attribute,
|
|
17982
|
-
profile_page=provider_attribute,
|
|
17983
|
-
profile_picture=provider_attribute,
|
|
17984
|
-
timezone=provider_attribute,
|
|
17985
|
-
website=provider_attribute
|
|
17986
|
-
),
|
|
17987
|
-
identifiers=["identifiers"],
|
|
17988
|
-
idp_signout=False,
|
|
17989
|
-
name="name"
|
|
18035
|
+
# specify the metadata as a URL
|
|
18036
|
+
cognito.UserPoolIdentityProviderSaml(self, "userpoolidpUrl",
|
|
18037
|
+
user_pool=userpool,
|
|
18038
|
+
metadata=cognito.UserPoolIdentityProviderSamlMetadata.url("https://my-metadata-url.com")
|
|
17990
18039
|
)
|
|
17991
18040
|
'''
|
|
17992
18041
|
if isinstance(attribute_mapping, dict):
|
|
@@ -17996,21 +18045,30 @@ class UserPoolIdentityProviderSamlProps(UserPoolIdentityProviderProps):
|
|
|
17996
18045
|
check_type(argname="argument user_pool", value=user_pool, expected_type=type_hints["user_pool"])
|
|
17997
18046
|
check_type(argname="argument attribute_mapping", value=attribute_mapping, expected_type=type_hints["attribute_mapping"])
|
|
17998
18047
|
check_type(argname="argument metadata", value=metadata, expected_type=type_hints["metadata"])
|
|
18048
|
+
check_type(argname="argument encrypted_responses", value=encrypted_responses, expected_type=type_hints["encrypted_responses"])
|
|
17999
18049
|
check_type(argname="argument identifiers", value=identifiers, expected_type=type_hints["identifiers"])
|
|
18050
|
+
check_type(argname="argument idp_initiated", value=idp_initiated, expected_type=type_hints["idp_initiated"])
|
|
18000
18051
|
check_type(argname="argument idp_signout", value=idp_signout, expected_type=type_hints["idp_signout"])
|
|
18001
18052
|
check_type(argname="argument name", value=name, expected_type=type_hints["name"])
|
|
18053
|
+
check_type(argname="argument request_signing_algorithm", value=request_signing_algorithm, expected_type=type_hints["request_signing_algorithm"])
|
|
18002
18054
|
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
18003
18055
|
"user_pool": user_pool,
|
|
18004
18056
|
"metadata": metadata,
|
|
18005
18057
|
}
|
|
18006
18058
|
if attribute_mapping is not None:
|
|
18007
18059
|
self._values["attribute_mapping"] = attribute_mapping
|
|
18060
|
+
if encrypted_responses is not None:
|
|
18061
|
+
self._values["encrypted_responses"] = encrypted_responses
|
|
18008
18062
|
if identifiers is not None:
|
|
18009
18063
|
self._values["identifiers"] = identifiers
|
|
18064
|
+
if idp_initiated is not None:
|
|
18065
|
+
self._values["idp_initiated"] = idp_initiated
|
|
18010
18066
|
if idp_signout is not None:
|
|
18011
18067
|
self._values["idp_signout"] = idp_signout
|
|
18012
18068
|
if name is not None:
|
|
18013
18069
|
self._values["name"] = name
|
|
18070
|
+
if request_signing_algorithm is not None:
|
|
18071
|
+
self._values["request_signing_algorithm"] = request_signing_algorithm
|
|
18014
18072
|
|
|
18015
18073
|
@builtins.property
|
|
18016
18074
|
def user_pool(self) -> IUserPool:
|
|
@@ -18035,6 +18093,17 @@ class UserPoolIdentityProviderSamlProps(UserPoolIdentityProviderProps):
|
|
|
18035
18093
|
assert result is not None, "Required property 'metadata' is missing"
|
|
18036
18094
|
return typing.cast(UserPoolIdentityProviderSamlMetadata, result)
|
|
18037
18095
|
|
|
18096
|
+
@builtins.property
|
|
18097
|
+
def encrypted_responses(self) -> typing.Optional[builtins.bool]:
|
|
18098
|
+
'''Whether to require encrypted SAML assertions from IdP.
|
|
18099
|
+
|
|
18100
|
+
:default: false
|
|
18101
|
+
|
|
18102
|
+
:see: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-SAML-signing-encryption.html#cognito-user-pools-SAML-encryption
|
|
18103
|
+
'''
|
|
18104
|
+
result = self._values.get("encrypted_responses")
|
|
18105
|
+
return typing.cast(typing.Optional[builtins.bool], result)
|
|
18106
|
+
|
|
18038
18107
|
@builtins.property
|
|
18039
18108
|
def identifiers(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
18040
18109
|
'''Identifiers.
|
|
@@ -18046,6 +18115,15 @@ class UserPoolIdentityProviderSamlProps(UserPoolIdentityProviderProps):
|
|
|
18046
18115
|
result = self._values.get("identifiers")
|
|
18047
18116
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
18048
18117
|
|
|
18118
|
+
@builtins.property
|
|
18119
|
+
def idp_initiated(self) -> typing.Optional[builtins.bool]:
|
|
18120
|
+
'''Whether to enable IdP-initiated SAML auth flows.
|
|
18121
|
+
|
|
18122
|
+
:default: false
|
|
18123
|
+
'''
|
|
18124
|
+
result = self._values.get("idp_initiated")
|
|
18125
|
+
return typing.cast(typing.Optional[builtins.bool], result)
|
|
18126
|
+
|
|
18049
18127
|
@builtins.property
|
|
18050
18128
|
def idp_signout(self) -> typing.Optional[builtins.bool]:
|
|
18051
18129
|
'''Whether to enable the "Sign-out flow" feature.
|
|
@@ -18066,6 +18144,17 @@ class UserPoolIdentityProviderSamlProps(UserPoolIdentityProviderProps):
|
|
|
18066
18144
|
result = self._values.get("name")
|
|
18067
18145
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
18068
18146
|
|
|
18147
|
+
@builtins.property
|
|
18148
|
+
def request_signing_algorithm(self) -> typing.Optional[SigningAlgorithm]:
|
|
18149
|
+
'''The signing algorithm for SAML requests.
|
|
18150
|
+
|
|
18151
|
+
:default: - don't sign requests
|
|
18152
|
+
|
|
18153
|
+
:see: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-SAML-signing-encryption.html#cognito-user-pools-SAML-signing
|
|
18154
|
+
'''
|
|
18155
|
+
result = self._values.get("request_signing_algorithm")
|
|
18156
|
+
return typing.cast(typing.Optional[SigningAlgorithm], result)
|
|
18157
|
+
|
|
18069
18158
|
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
18070
18159
|
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
18071
18160
|
|
|
@@ -20595,6 +20684,7 @@ __all__ = [
|
|
|
20595
20684
|
"ResourceServerScopeProps",
|
|
20596
20685
|
"SignInAliases",
|
|
20597
20686
|
"SignInUrlOptions",
|
|
20687
|
+
"SigningAlgorithm",
|
|
20598
20688
|
"StandardAttribute",
|
|
20599
20689
|
"StandardAttributes",
|
|
20600
20690
|
"StandardAttributesMask",
|
|
@@ -22889,9 +22979,12 @@ def _typecheckingstub__718ac630a451940587ebda0797cfbdec5b11e5bcd3f498d39d6663201
|
|
|
22889
22979
|
id: builtins.str,
|
|
22890
22980
|
*,
|
|
22891
22981
|
metadata: UserPoolIdentityProviderSamlMetadata,
|
|
22982
|
+
encrypted_responses: typing.Optional[builtins.bool] = None,
|
|
22892
22983
|
identifiers: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
22984
|
+
idp_initiated: typing.Optional[builtins.bool] = None,
|
|
22893
22985
|
idp_signout: typing.Optional[builtins.bool] = None,
|
|
22894
22986
|
name: typing.Optional[builtins.str] = None,
|
|
22987
|
+
request_signing_algorithm: typing.Optional[SigningAlgorithm] = None,
|
|
22895
22988
|
user_pool: IUserPool,
|
|
22896
22989
|
attribute_mapping: typing.Optional[typing.Union[AttributeMapping, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
22897
22990
|
) -> None:
|
|
@@ -22915,9 +23008,12 @@ def _typecheckingstub__2f52f706aa700f252fccd887b4c4fad1305e00535d6e476a5d2ee9577
|
|
|
22915
23008
|
user_pool: IUserPool,
|
|
22916
23009
|
attribute_mapping: typing.Optional[typing.Union[AttributeMapping, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
22917
23010
|
metadata: UserPoolIdentityProviderSamlMetadata,
|
|
23011
|
+
encrypted_responses: typing.Optional[builtins.bool] = None,
|
|
22918
23012
|
identifiers: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
23013
|
+
idp_initiated: typing.Optional[builtins.bool] = None,
|
|
22919
23014
|
idp_signout: typing.Optional[builtins.bool] = None,
|
|
22920
23015
|
name: typing.Optional[builtins.str] = None,
|
|
23016
|
+
request_signing_algorithm: typing.Optional[SigningAlgorithm] = None,
|
|
22921
23017
|
) -> None:
|
|
22922
23018
|
"""Type checking stubs"""
|
|
22923
23019
|
pass
|
aws_cdk/aws_datazone/__init__.py
CHANGED
|
@@ -112,6 +112,7 @@ class CfnDataSource(
|
|
|
112
112
|
)],
|
|
113
113
|
|
|
114
114
|
# the properties below are optional
|
|
115
|
+
auto_import_data_quality_result=False,
|
|
115
116
|
data_access_role="dataAccessRole"
|
|
116
117
|
),
|
|
117
118
|
redshift_run_configuration=datazone.CfnDataSource.RedshiftRunConfigurationInputProperty(
|
|
@@ -558,6 +559,7 @@ class CfnDataSource(
|
|
|
558
559
|
)],
|
|
559
560
|
|
|
560
561
|
# the properties below are optional
|
|
562
|
+
auto_import_data_quality_result=False,
|
|
561
563
|
data_access_role="dataAccessRole"
|
|
562
564
|
),
|
|
563
565
|
redshift_run_configuration=datazone.CfnDataSource.RedshiftRunConfigurationInputProperty(
|
|
@@ -810,6 +812,7 @@ class CfnDataSource(
|
|
|
810
812
|
jsii_struct_bases=[],
|
|
811
813
|
name_mapping={
|
|
812
814
|
"relational_filter_configurations": "relationalFilterConfigurations",
|
|
815
|
+
"auto_import_data_quality_result": "autoImportDataQualityResult",
|
|
813
816
|
"data_access_role": "dataAccessRole",
|
|
814
817
|
},
|
|
815
818
|
)
|
|
@@ -818,11 +821,13 @@ class CfnDataSource(
|
|
|
818
821
|
self,
|
|
819
822
|
*,
|
|
820
823
|
relational_filter_configurations: typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnDataSource.RelationalFilterConfigurationProperty", typing.Dict[builtins.str, typing.Any]]]]],
|
|
824
|
+
auto_import_data_quality_result: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
821
825
|
data_access_role: typing.Optional[builtins.str] = None,
|
|
822
826
|
) -> None:
|
|
823
827
|
'''The configuration details of the AWS Glue data source.
|
|
824
828
|
|
|
825
829
|
:param relational_filter_configurations: The relational filter configurations included in the configuration details of the AWS Glue data source.
|
|
830
|
+
:param auto_import_data_quality_result: Specifies whether to automatically import data quality metrics as part of the data source run.
|
|
826
831
|
:param data_access_role: The data access role included in the configuration details of the AWS Glue data source.
|
|
827
832
|
|
|
828
833
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-datazone-datasource-gluerunconfigurationinput.html
|
|
@@ -847,16 +852,20 @@ class CfnDataSource(
|
|
|
847
852
|
)],
|
|
848
853
|
|
|
849
854
|
# the properties below are optional
|
|
855
|
+
auto_import_data_quality_result=False,
|
|
850
856
|
data_access_role="dataAccessRole"
|
|
851
857
|
)
|
|
852
858
|
'''
|
|
853
859
|
if __debug__:
|
|
854
860
|
type_hints = typing.get_type_hints(_typecheckingstub__ad6a5a243d0193849a3ba940cfbd956439268966f2ff08bff1fbcf5af20fe953)
|
|
855
861
|
check_type(argname="argument relational_filter_configurations", value=relational_filter_configurations, expected_type=type_hints["relational_filter_configurations"])
|
|
862
|
+
check_type(argname="argument auto_import_data_quality_result", value=auto_import_data_quality_result, expected_type=type_hints["auto_import_data_quality_result"])
|
|
856
863
|
check_type(argname="argument data_access_role", value=data_access_role, expected_type=type_hints["data_access_role"])
|
|
857
864
|
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
858
865
|
"relational_filter_configurations": relational_filter_configurations,
|
|
859
866
|
}
|
|
867
|
+
if auto_import_data_quality_result is not None:
|
|
868
|
+
self._values["auto_import_data_quality_result"] = auto_import_data_quality_result
|
|
860
869
|
if data_access_role is not None:
|
|
861
870
|
self._values["data_access_role"] = data_access_role
|
|
862
871
|
|
|
@@ -872,6 +881,17 @@ class CfnDataSource(
|
|
|
872
881
|
assert result is not None, "Required property 'relational_filter_configurations' is missing"
|
|
873
882
|
return typing.cast(typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnDataSource.RelationalFilterConfigurationProperty"]]], result)
|
|
874
883
|
|
|
884
|
+
@builtins.property
|
|
885
|
+
def auto_import_data_quality_result(
|
|
886
|
+
self,
|
|
887
|
+
) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
|
|
888
|
+
'''Specifies whether to automatically import data quality metrics as part of the data source run.
|
|
889
|
+
|
|
890
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-datazone-datasource-gluerunconfigurationinput.html#cfn-datazone-datasource-gluerunconfigurationinput-autoimportdataqualityresult
|
|
891
|
+
'''
|
|
892
|
+
result = self._values.get("auto_import_data_quality_result")
|
|
893
|
+
return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], result)
|
|
894
|
+
|
|
875
895
|
@builtins.property
|
|
876
896
|
def data_access_role(self) -> typing.Optional[builtins.str]:
|
|
877
897
|
'''The data access role included in the configuration details of the AWS Glue data source.
|
|
@@ -1577,6 +1597,7 @@ class CfnDataSourceProps:
|
|
|
1577
1597
|
)],
|
|
1578
1598
|
|
|
1579
1599
|
# the properties below are optional
|
|
1600
|
+
auto_import_data_quality_result=False,
|
|
1580
1601
|
data_access_role="dataAccessRole"
|
|
1581
1602
|
),
|
|
1582
1603
|
redshift_run_configuration=datazone.CfnDataSource.RedshiftRunConfigurationInputProperty(
|
|
@@ -4835,6 +4856,7 @@ def _typecheckingstub__e39737bda51e6e9e0b04ce2c0598b00c495cf2dad8f53d4761c7a31ec
|
|
|
4835
4856
|
def _typecheckingstub__ad6a5a243d0193849a3ba940cfbd956439268966f2ff08bff1fbcf5af20fe953(
|
|
4836
4857
|
*,
|
|
4837
4858
|
relational_filter_configurations: typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnDataSource.RelationalFilterConfigurationProperty, typing.Dict[builtins.str, typing.Any]]]]],
|
|
4859
|
+
auto_import_data_quality_result: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
4838
4860
|
data_access_role: typing.Optional[builtins.str] = None,
|
|
4839
4861
|
) -> None:
|
|
4840
4862
|
"""Type checking stubs"""
|