aws-cdk-lib 2.137.0__py3-none-any.whl → 2.139.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk-lib might be problematic. Click here for more details.

Files changed (73) hide show
  1. aws_cdk/__init__.py +8 -0
  2. aws_cdk/_jsii/__init__.py +1 -1
  3. aws_cdk/_jsii/{aws-cdk-lib@2.137.0.jsii.tgz → aws-cdk-lib@2.139.0.jsii.tgz} +0 -0
  4. aws_cdk/aws_amplify/__init__.py +29 -113
  5. aws_cdk/aws_apigateway/__init__.py +29 -16
  6. aws_cdk/aws_appconfig/__init__.py +315 -77
  7. aws_cdk/aws_appintegrations/__init__.py +55 -6
  8. aws_cdk/aws_apprunner/__init__.py +5 -2
  9. aws_cdk/aws_appsync/__init__.py +400 -13
  10. aws_cdk/aws_aps/__init__.py +64 -47
  11. aws_cdk/aws_autoscaling/__init__.py +62 -60
  12. aws_cdk/aws_b2bi/__init__.py +2 -6
  13. aws_cdk/aws_backup/__init__.py +53 -57
  14. aws_cdk/aws_batch/__init__.py +109 -0
  15. aws_cdk/aws_bcmdataexports/__init__.py +1114 -0
  16. aws_cdk/aws_bedrock/__init__.py +4144 -0
  17. aws_cdk/aws_chatbot/__init__.py +6 -4
  18. aws_cdk/aws_cleanrooms/__init__.py +526 -3
  19. aws_cdk/aws_cleanroomsml/__init__.py +960 -0
  20. aws_cdk/aws_cloudtrail/__init__.py +10 -10
  21. aws_cdk/aws_cloudwatch/__init__.py +244 -8
  22. aws_cdk/aws_codebuild/__init__.py +27 -22
  23. aws_cdk/aws_codeconnections/__init__.py +435 -0
  24. aws_cdk/aws_cognito/__init__.py +175 -79
  25. aws_cdk/aws_datazone/__init__.py +22 -0
  26. aws_cdk/aws_deadline/__init__.py +5394 -0
  27. aws_cdk/aws_dms/__init__.py +2 -4
  28. aws_cdk/aws_ec2/__init__.py +402 -247
  29. aws_cdk/aws_ecr/__init__.py +630 -0
  30. aws_cdk/aws_ecs/__init__.py +361 -20
  31. aws_cdk/aws_efs/__init__.py +594 -2
  32. aws_cdk/aws_elasticache/__init__.py +86 -32
  33. aws_cdk/aws_elasticloadbalancingv2/__init__.py +75 -10
  34. aws_cdk/aws_emr/__init__.py +2 -2
  35. aws_cdk/aws_entityresolution/__init__.py +1982 -773
  36. aws_cdk/aws_events_targets/__init__.py +17 -4
  37. aws_cdk/aws_globalaccelerator/__init__.py +443 -0
  38. aws_cdk/aws_iam/__init__.py +1 -2
  39. aws_cdk/aws_internetmonitor/__init__.py +14 -6
  40. aws_cdk/aws_ivs/__init__.py +1273 -71
  41. aws_cdk/aws_kms/__init__.py +44 -0
  42. aws_cdk/aws_lambda/__init__.py +9 -0
  43. aws_cdk/aws_mediatailor/__init__.py +41 -0
  44. aws_cdk/aws_oam/__init__.py +204 -0
  45. aws_cdk/aws_personalize/__init__.py +8 -6
  46. aws_cdk/aws_pinpoint/__init__.py +5 -3
  47. aws_cdk/aws_pipes/__init__.py +5 -1
  48. aws_cdk/aws_quicksight/__init__.py +12 -6
  49. aws_cdk/aws_rds/__init__.py +370 -96
  50. aws_cdk/aws_redshiftserverless/__init__.py +157 -0
  51. aws_cdk/aws_route53/__init__.py +587 -14
  52. aws_cdk/aws_sagemaker/__init__.py +233 -2
  53. aws_cdk/aws_securityhub/__init__.py +4940 -102
  54. aws_cdk/aws_securitylake/__init__.py +1326 -89
  55. aws_cdk/aws_ses_actions/__init__.py +155 -0
  56. aws_cdk/aws_sns/__init__.py +61 -4
  57. aws_cdk/aws_ssm/__init__.py +5 -2
  58. aws_cdk/aws_ssmcontacts/__init__.py +11 -4
  59. aws_cdk/aws_stepfunctions/__init__.py +8 -16
  60. aws_cdk/aws_stepfunctions_tasks/__init__.py +676 -1
  61. aws_cdk/aws_timestream/__init__.py +1045 -0
  62. aws_cdk/aws_transfer/__init__.py +19 -10
  63. aws_cdk/aws_verifiedpermissions/__init__.py +114 -37
  64. aws_cdk/aws_wisdom/__init__.py +2 -2
  65. aws_cdk/aws_workspacesthinclient/__init__.py +8 -8
  66. aws_cdk/custom_resources/__init__.py +688 -26
  67. aws_cdk/cx_api/__init__.py +17 -0
  68. {aws_cdk_lib-2.137.0.dist-info → aws_cdk_lib-2.139.0.dist-info}/METADATA +3 -3
  69. {aws_cdk_lib-2.137.0.dist-info → aws_cdk_lib-2.139.0.dist-info}/RECORD +73 -69
  70. {aws_cdk_lib-2.137.0.dist-info → aws_cdk_lib-2.139.0.dist-info}/LICENSE +0 -0
  71. {aws_cdk_lib-2.137.0.dist-info → aws_cdk_lib-2.139.0.dist-info}/NOTICE +0 -0
  72. {aws_cdk_lib-2.137.0.dist-info → aws_cdk_lib-2.139.0.dist-info}/WHEEL +0 -0
  73. {aws_cdk_lib-2.137.0.dist-info → aws_cdk_lib-2.139.0.dist-info}/top_level.txt +0 -0
@@ -599,6 +599,30 @@ provider = cognito.UserPoolIdentityProviderGoogle(self, "Google",
599
599
  )
600
600
  ```
601
601
 
602
+ Using SAML identity provider is possible to use SAML metadata file content or SAML metadata file url.
603
+
604
+ ```python
605
+ userpool = cognito.UserPool(self, "Pool")
606
+
607
+ # specify the metadata as a file content
608
+ cognito.UserPoolIdentityProviderSaml(self, "userpoolIdpFile",
609
+ user_pool=userpool,
610
+ metadata=cognito.UserPoolIdentityProviderSamlMetadata.file("my-file-contents"),
611
+ # Whether to require encrypted SAML assertions from IdP
612
+ encrypted_responses=True,
613
+ # The signing algorithm for the SAML requests
614
+ request_signing_algorithm=cognito.SigningAlgorithm.RSA_SHA256,
615
+ # Enable IdP initiated SAML auth flow
616
+ idp_initiated=True
617
+ )
618
+
619
+ # specify the metadata as a URL
620
+ cognito.UserPoolIdentityProviderSaml(self, "userpoolidpUrl",
621
+ user_pool=userpool,
622
+ metadata=cognito.UserPoolIdentityProviderSamlMetadata.url("https://my-metadata-url.com")
623
+ )
624
+ ```
625
+
602
626
  Attribute mapping allows mapping attributes provided by the third-party identity providers to [standard and custom
603
627
  attributes](#Attributes) of the user pool. Learn more about [Specifying Identity Provider Attribute Mappings for Your
604
628
  User Pool](https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-specifying-attribute-mapping.html).
@@ -14452,6 +14476,39 @@ class SignInUrlOptions(BaseUrlOptions):
14452
14476
  )
14453
14477
 
14454
14478
 
14479
+ @jsii.enum(jsii_type="aws-cdk-lib.aws_cognito.SigningAlgorithm")
14480
+ class SigningAlgorithm(enum.Enum):
14481
+ '''Signing algorithms for SAML requests.
14482
+
14483
+ :exampleMetadata: infused
14484
+
14485
+ Example::
14486
+
14487
+ userpool = cognito.UserPool(self, "Pool")
14488
+
14489
+ # specify the metadata as a file content
14490
+ cognito.UserPoolIdentityProviderSaml(self, "userpoolIdpFile",
14491
+ user_pool=userpool,
14492
+ metadata=cognito.UserPoolIdentityProviderSamlMetadata.file("my-file-contents"),
14493
+ # Whether to require encrypted SAML assertions from IdP
14494
+ encrypted_responses=True,
14495
+ # The signing algorithm for the SAML requests
14496
+ request_signing_algorithm=cognito.SigningAlgorithm.RSA_SHA256,
14497
+ # Enable IdP initiated SAML auth flow
14498
+ idp_initiated=True
14499
+ )
14500
+
14501
+ # specify the metadata as a URL
14502
+ cognito.UserPoolIdentityProviderSaml(self, "userpoolidpUrl",
14503
+ user_pool=userpool,
14504
+ metadata=cognito.UserPoolIdentityProviderSamlMetadata.url("https://my-metadata-url.com")
14505
+ )
14506
+ '''
14507
+
14508
+ RSA_SHA256 = "RSA_SHA256"
14509
+ '''RSA with SHA-256.'''
14510
+
14511
+
14455
14512
  @jsii.data_type(
14456
14513
  jsii_type="aws-cdk-lib.aws_cognito.StandardAttribute",
14457
14514
  jsii_struct_bases=[],
@@ -17754,48 +17811,28 @@ class UserPoolIdentityProviderSaml(
17754
17811
  '''Represents an identity provider that integrates with SAML.
17755
17812
 
17756
17813
  :resource: AWS::Cognito::UserPoolIdentityProvider
17757
- :exampleMetadata: fixture=_generated
17814
+ :exampleMetadata: infused
17758
17815
 
17759
17816
  Example::
17760
17817
 
17761
- # The code below shows an example of how to instantiate this type.
17762
- # The values are placeholders you should change.
17763
- from aws_cdk import aws_cognito as cognito
17764
-
17765
- # provider_attribute: cognito.ProviderAttribute
17766
- # user_pool: cognito.UserPool
17767
- # user_pool_identity_provider_saml_metadata: cognito.UserPoolIdentityProviderSamlMetadata
17818
+ userpool = cognito.UserPool(self, "Pool")
17768
17819
 
17769
- user_pool_identity_provider_saml = cognito.UserPoolIdentityProviderSaml(self, "MyUserPoolIdentityProviderSaml",
17770
- metadata=user_pool_identity_provider_saml_metadata,
17771
- user_pool=user_pool,
17820
+ # specify the metadata as a file content
17821
+ cognito.UserPoolIdentityProviderSaml(self, "userpoolIdpFile",
17822
+ user_pool=userpool,
17823
+ metadata=cognito.UserPoolIdentityProviderSamlMetadata.file("my-file-contents"),
17824
+ # Whether to require encrypted SAML assertions from IdP
17825
+ encrypted_responses=True,
17826
+ # The signing algorithm for the SAML requests
17827
+ request_signing_algorithm=cognito.SigningAlgorithm.RSA_SHA256,
17828
+ # Enable IdP initiated SAML auth flow
17829
+ idp_initiated=True
17830
+ )
17772
17831
 
17773
- # the properties below are optional
17774
- attribute_mapping=cognito.AttributeMapping(
17775
- address=provider_attribute,
17776
- birthdate=provider_attribute,
17777
- custom={
17778
- "custom_key": provider_attribute
17779
- },
17780
- email=provider_attribute,
17781
- family_name=provider_attribute,
17782
- fullname=provider_attribute,
17783
- gender=provider_attribute,
17784
- given_name=provider_attribute,
17785
- last_update_time=provider_attribute,
17786
- locale=provider_attribute,
17787
- middle_name=provider_attribute,
17788
- nickname=provider_attribute,
17789
- phone_number=provider_attribute,
17790
- preferred_username=provider_attribute,
17791
- profile_page=provider_attribute,
17792
- profile_picture=provider_attribute,
17793
- timezone=provider_attribute,
17794
- website=provider_attribute
17795
- ),
17796
- identifiers=["identifiers"],
17797
- idp_signout=False,
17798
- name="name"
17832
+ # specify the metadata as a URL
17833
+ cognito.UserPoolIdentityProviderSaml(self, "userpoolidpUrl",
17834
+ user_pool=userpool,
17835
+ metadata=cognito.UserPoolIdentityProviderSamlMetadata.url("https://my-metadata-url.com")
17799
17836
  )
17800
17837
  '''
17801
17838
 
@@ -17805,9 +17842,12 @@ class UserPoolIdentityProviderSaml(
17805
17842
  id: builtins.str,
17806
17843
  *,
17807
17844
  metadata: "UserPoolIdentityProviderSamlMetadata",
17845
+ encrypted_responses: typing.Optional[builtins.bool] = None,
17808
17846
  identifiers: typing.Optional[typing.Sequence[builtins.str]] = None,
17847
+ idp_initiated: typing.Optional[builtins.bool] = None,
17809
17848
  idp_signout: typing.Optional[builtins.bool] = None,
17810
17849
  name: typing.Optional[builtins.str] = None,
17850
+ request_signing_algorithm: typing.Optional[SigningAlgorithm] = None,
17811
17851
  user_pool: IUserPool,
17812
17852
  attribute_mapping: typing.Optional[typing.Union[AttributeMapping, typing.Dict[builtins.str, typing.Any]]] = None,
17813
17853
  ) -> None:
@@ -17815,9 +17855,12 @@ class UserPoolIdentityProviderSaml(
17815
17855
  :param scope: -
17816
17856
  :param id: -
17817
17857
  :param metadata: The SAML metadata.
17858
+ :param encrypted_responses: Whether to require encrypted SAML assertions from IdP. Default: false
17818
17859
  :param identifiers: Identifiers. Identifiers can be used to redirect users to the correct IdP in multitenant apps. Default: - no identifiers used
17860
+ :param idp_initiated: Whether to enable IdP-initiated SAML auth flows. Default: false
17819
17861
  :param idp_signout: Whether to enable the "Sign-out flow" feature. Default: - false
17820
17862
  :param name: The name of the provider. Must be between 3 and 32 characters. Default: - the unique ID of the construct
17863
+ :param request_signing_algorithm: The signing algorithm for SAML requests. Default: - don't sign requests
17821
17864
  :param user_pool: The user pool to which this construct provides identities.
17822
17865
  :param attribute_mapping: Mapping attributes from the identity provider to standard and custom attributes of the user pool. Default: - no attribute mapping
17823
17866
  '''
@@ -17827,9 +17870,12 @@ class UserPoolIdentityProviderSaml(
17827
17870
  check_type(argname="argument id", value=id, expected_type=type_hints["id"])
17828
17871
  props = UserPoolIdentityProviderSamlProps(
17829
17872
  metadata=metadata,
17873
+ encrypted_responses=encrypted_responses,
17830
17874
  identifiers=identifiers,
17875
+ idp_initiated=idp_initiated,
17831
17876
  idp_signout=idp_signout,
17832
17877
  name=name,
17878
+ request_signing_algorithm=request_signing_algorithm,
17833
17879
  user_pool=user_pool,
17834
17880
  attribute_mapping=attribute_mapping,
17835
17881
  )
@@ -17853,15 +17899,29 @@ class UserPoolIdentityProviderSamlMetadata(
17853
17899
  ):
17854
17900
  '''Metadata for a SAML user pool identity provider.
17855
17901
 
17856
- :exampleMetadata: fixture=_generated
17902
+ :exampleMetadata: infused
17857
17903
 
17858
17904
  Example::
17859
17905
 
17860
- # The code below shows an example of how to instantiate this type.
17861
- # The values are placeholders you should change.
17862
- from aws_cdk import aws_cognito as cognito
17906
+ userpool = cognito.UserPool(self, "Pool")
17863
17907
 
17864
- user_pool_identity_provider_saml_metadata = cognito.UserPoolIdentityProviderSamlMetadata.file("fileContent")
17908
+ # specify the metadata as a file content
17909
+ cognito.UserPoolIdentityProviderSaml(self, "userpoolIdpFile",
17910
+ user_pool=userpool,
17911
+ metadata=cognito.UserPoolIdentityProviderSamlMetadata.file("my-file-contents"),
17912
+ # Whether to require encrypted SAML assertions from IdP
17913
+ encrypted_responses=True,
17914
+ # The signing algorithm for the SAML requests
17915
+ request_signing_algorithm=cognito.SigningAlgorithm.RSA_SHA256,
17916
+ # Enable IdP initiated SAML auth flow
17917
+ idp_initiated=True
17918
+ )
17919
+
17920
+ # specify the metadata as a URL
17921
+ cognito.UserPoolIdentityProviderSaml(self, "userpoolidpUrl",
17922
+ user_pool=userpool,
17923
+ metadata=cognito.UserPoolIdentityProviderSamlMetadata.url("https://my-metadata-url.com")
17924
+ )
17865
17925
  '''
17866
17926
 
17867
17927
  @jsii.member(jsii_name="file")
@@ -17920,9 +17980,12 @@ class UserPoolIdentityProviderSamlMetadataType(enum.Enum):
17920
17980
  "user_pool": "userPool",
17921
17981
  "attribute_mapping": "attributeMapping",
17922
17982
  "metadata": "metadata",
17983
+ "encrypted_responses": "encryptedResponses",
17923
17984
  "identifiers": "identifiers",
17985
+ "idp_initiated": "idpInitiated",
17924
17986
  "idp_signout": "idpSignout",
17925
17987
  "name": "name",
17988
+ "request_signing_algorithm": "requestSigningAlgorithm",
17926
17989
  },
17927
17990
  )
17928
17991
  class UserPoolIdentityProviderSamlProps(UserPoolIdentityProviderProps):
@@ -17932,61 +17995,47 @@ class UserPoolIdentityProviderSamlProps(UserPoolIdentityProviderProps):
17932
17995
  user_pool: IUserPool,
17933
17996
  attribute_mapping: typing.Optional[typing.Union[AttributeMapping, typing.Dict[builtins.str, typing.Any]]] = None,
17934
17997
  metadata: UserPoolIdentityProviderSamlMetadata,
17998
+ encrypted_responses: typing.Optional[builtins.bool] = None,
17935
17999
  identifiers: typing.Optional[typing.Sequence[builtins.str]] = None,
18000
+ idp_initiated: typing.Optional[builtins.bool] = None,
17936
18001
  idp_signout: typing.Optional[builtins.bool] = None,
17937
18002
  name: typing.Optional[builtins.str] = None,
18003
+ request_signing_algorithm: typing.Optional[SigningAlgorithm] = None,
17938
18004
  ) -> None:
17939
18005
  '''Properties to initialize UserPoolIdentityProviderSaml.
17940
18006
 
17941
18007
  :param user_pool: The user pool to which this construct provides identities.
17942
18008
  :param attribute_mapping: Mapping attributes from the identity provider to standard and custom attributes of the user pool. Default: - no attribute mapping
17943
18009
  :param metadata: The SAML metadata.
18010
+ :param encrypted_responses: Whether to require encrypted SAML assertions from IdP. Default: false
17944
18011
  :param identifiers: Identifiers. Identifiers can be used to redirect users to the correct IdP in multitenant apps. Default: - no identifiers used
18012
+ :param idp_initiated: Whether to enable IdP-initiated SAML auth flows. Default: false
17945
18013
  :param idp_signout: Whether to enable the "Sign-out flow" feature. Default: - false
17946
18014
  :param name: The name of the provider. Must be between 3 and 32 characters. Default: - the unique ID of the construct
18015
+ :param request_signing_algorithm: The signing algorithm for SAML requests. Default: - don't sign requests
17947
18016
 
17948
- :exampleMetadata: fixture=_generated
18017
+ :exampleMetadata: infused
17949
18018
 
17950
18019
  Example::
17951
18020
 
17952
- # The code below shows an example of how to instantiate this type.
17953
- # The values are placeholders you should change.
17954
- from aws_cdk import aws_cognito as cognito
17955
-
17956
- # provider_attribute: cognito.ProviderAttribute
17957
- # user_pool: cognito.UserPool
17958
- # user_pool_identity_provider_saml_metadata: cognito.UserPoolIdentityProviderSamlMetadata
18021
+ userpool = cognito.UserPool(self, "Pool")
17959
18022
 
17960
- user_pool_identity_provider_saml_props = cognito.UserPoolIdentityProviderSamlProps(
17961
- metadata=user_pool_identity_provider_saml_metadata,
17962
- user_pool=user_pool,
18023
+ # specify the metadata as a file content
18024
+ cognito.UserPoolIdentityProviderSaml(self, "userpoolIdpFile",
18025
+ user_pool=userpool,
18026
+ metadata=cognito.UserPoolIdentityProviderSamlMetadata.file("my-file-contents"),
18027
+ # Whether to require encrypted SAML assertions from IdP
18028
+ encrypted_responses=True,
18029
+ # The signing algorithm for the SAML requests
18030
+ request_signing_algorithm=cognito.SigningAlgorithm.RSA_SHA256,
18031
+ # Enable IdP initiated SAML auth flow
18032
+ idp_initiated=True
18033
+ )
17963
18034
 
17964
- # the properties below are optional
17965
- attribute_mapping=cognito.AttributeMapping(
17966
- address=provider_attribute,
17967
- birthdate=provider_attribute,
17968
- custom={
17969
- "custom_key": provider_attribute
17970
- },
17971
- email=provider_attribute,
17972
- family_name=provider_attribute,
17973
- fullname=provider_attribute,
17974
- gender=provider_attribute,
17975
- given_name=provider_attribute,
17976
- last_update_time=provider_attribute,
17977
- locale=provider_attribute,
17978
- middle_name=provider_attribute,
17979
- nickname=provider_attribute,
17980
- phone_number=provider_attribute,
17981
- preferred_username=provider_attribute,
17982
- profile_page=provider_attribute,
17983
- profile_picture=provider_attribute,
17984
- timezone=provider_attribute,
17985
- website=provider_attribute
17986
- ),
17987
- identifiers=["identifiers"],
17988
- idp_signout=False,
17989
- name="name"
18035
+ # specify the metadata as a URL
18036
+ cognito.UserPoolIdentityProviderSaml(self, "userpoolidpUrl",
18037
+ user_pool=userpool,
18038
+ metadata=cognito.UserPoolIdentityProviderSamlMetadata.url("https://my-metadata-url.com")
17990
18039
  )
17991
18040
  '''
17992
18041
  if isinstance(attribute_mapping, dict):
@@ -17996,21 +18045,30 @@ class UserPoolIdentityProviderSamlProps(UserPoolIdentityProviderProps):
17996
18045
  check_type(argname="argument user_pool", value=user_pool, expected_type=type_hints["user_pool"])
17997
18046
  check_type(argname="argument attribute_mapping", value=attribute_mapping, expected_type=type_hints["attribute_mapping"])
17998
18047
  check_type(argname="argument metadata", value=metadata, expected_type=type_hints["metadata"])
18048
+ check_type(argname="argument encrypted_responses", value=encrypted_responses, expected_type=type_hints["encrypted_responses"])
17999
18049
  check_type(argname="argument identifiers", value=identifiers, expected_type=type_hints["identifiers"])
18050
+ check_type(argname="argument idp_initiated", value=idp_initiated, expected_type=type_hints["idp_initiated"])
18000
18051
  check_type(argname="argument idp_signout", value=idp_signout, expected_type=type_hints["idp_signout"])
18001
18052
  check_type(argname="argument name", value=name, expected_type=type_hints["name"])
18053
+ check_type(argname="argument request_signing_algorithm", value=request_signing_algorithm, expected_type=type_hints["request_signing_algorithm"])
18002
18054
  self._values: typing.Dict[builtins.str, typing.Any] = {
18003
18055
  "user_pool": user_pool,
18004
18056
  "metadata": metadata,
18005
18057
  }
18006
18058
  if attribute_mapping is not None:
18007
18059
  self._values["attribute_mapping"] = attribute_mapping
18060
+ if encrypted_responses is not None:
18061
+ self._values["encrypted_responses"] = encrypted_responses
18008
18062
  if identifiers is not None:
18009
18063
  self._values["identifiers"] = identifiers
18064
+ if idp_initiated is not None:
18065
+ self._values["idp_initiated"] = idp_initiated
18010
18066
  if idp_signout is not None:
18011
18067
  self._values["idp_signout"] = idp_signout
18012
18068
  if name is not None:
18013
18069
  self._values["name"] = name
18070
+ if request_signing_algorithm is not None:
18071
+ self._values["request_signing_algorithm"] = request_signing_algorithm
18014
18072
 
18015
18073
  @builtins.property
18016
18074
  def user_pool(self) -> IUserPool:
@@ -18035,6 +18093,17 @@ class UserPoolIdentityProviderSamlProps(UserPoolIdentityProviderProps):
18035
18093
  assert result is not None, "Required property 'metadata' is missing"
18036
18094
  return typing.cast(UserPoolIdentityProviderSamlMetadata, result)
18037
18095
 
18096
+ @builtins.property
18097
+ def encrypted_responses(self) -> typing.Optional[builtins.bool]:
18098
+ '''Whether to require encrypted SAML assertions from IdP.
18099
+
18100
+ :default: false
18101
+
18102
+ :see: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-SAML-signing-encryption.html#cognito-user-pools-SAML-encryption
18103
+ '''
18104
+ result = self._values.get("encrypted_responses")
18105
+ return typing.cast(typing.Optional[builtins.bool], result)
18106
+
18038
18107
  @builtins.property
18039
18108
  def identifiers(self) -> typing.Optional[typing.List[builtins.str]]:
18040
18109
  '''Identifiers.
@@ -18046,6 +18115,15 @@ class UserPoolIdentityProviderSamlProps(UserPoolIdentityProviderProps):
18046
18115
  result = self._values.get("identifiers")
18047
18116
  return typing.cast(typing.Optional[typing.List[builtins.str]], result)
18048
18117
 
18118
+ @builtins.property
18119
+ def idp_initiated(self) -> typing.Optional[builtins.bool]:
18120
+ '''Whether to enable IdP-initiated SAML auth flows.
18121
+
18122
+ :default: false
18123
+ '''
18124
+ result = self._values.get("idp_initiated")
18125
+ return typing.cast(typing.Optional[builtins.bool], result)
18126
+
18049
18127
  @builtins.property
18050
18128
  def idp_signout(self) -> typing.Optional[builtins.bool]:
18051
18129
  '''Whether to enable the "Sign-out flow" feature.
@@ -18066,6 +18144,17 @@ class UserPoolIdentityProviderSamlProps(UserPoolIdentityProviderProps):
18066
18144
  result = self._values.get("name")
18067
18145
  return typing.cast(typing.Optional[builtins.str], result)
18068
18146
 
18147
+ @builtins.property
18148
+ def request_signing_algorithm(self) -> typing.Optional[SigningAlgorithm]:
18149
+ '''The signing algorithm for SAML requests.
18150
+
18151
+ :default: - don't sign requests
18152
+
18153
+ :see: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-SAML-signing-encryption.html#cognito-user-pools-SAML-signing
18154
+ '''
18155
+ result = self._values.get("request_signing_algorithm")
18156
+ return typing.cast(typing.Optional[SigningAlgorithm], result)
18157
+
18069
18158
  def __eq__(self, rhs: typing.Any) -> builtins.bool:
18070
18159
  return isinstance(rhs, self.__class__) and rhs._values == self._values
18071
18160
 
@@ -20595,6 +20684,7 @@ __all__ = [
20595
20684
  "ResourceServerScopeProps",
20596
20685
  "SignInAliases",
20597
20686
  "SignInUrlOptions",
20687
+ "SigningAlgorithm",
20598
20688
  "StandardAttribute",
20599
20689
  "StandardAttributes",
20600
20690
  "StandardAttributesMask",
@@ -22889,9 +22979,12 @@ def _typecheckingstub__718ac630a451940587ebda0797cfbdec5b11e5bcd3f498d39d6663201
22889
22979
  id: builtins.str,
22890
22980
  *,
22891
22981
  metadata: UserPoolIdentityProviderSamlMetadata,
22982
+ encrypted_responses: typing.Optional[builtins.bool] = None,
22892
22983
  identifiers: typing.Optional[typing.Sequence[builtins.str]] = None,
22984
+ idp_initiated: typing.Optional[builtins.bool] = None,
22893
22985
  idp_signout: typing.Optional[builtins.bool] = None,
22894
22986
  name: typing.Optional[builtins.str] = None,
22987
+ request_signing_algorithm: typing.Optional[SigningAlgorithm] = None,
22895
22988
  user_pool: IUserPool,
22896
22989
  attribute_mapping: typing.Optional[typing.Union[AttributeMapping, typing.Dict[builtins.str, typing.Any]]] = None,
22897
22990
  ) -> None:
@@ -22915,9 +23008,12 @@ def _typecheckingstub__2f52f706aa700f252fccd887b4c4fad1305e00535d6e476a5d2ee9577
22915
23008
  user_pool: IUserPool,
22916
23009
  attribute_mapping: typing.Optional[typing.Union[AttributeMapping, typing.Dict[builtins.str, typing.Any]]] = None,
22917
23010
  metadata: UserPoolIdentityProviderSamlMetadata,
23011
+ encrypted_responses: typing.Optional[builtins.bool] = None,
22918
23012
  identifiers: typing.Optional[typing.Sequence[builtins.str]] = None,
23013
+ idp_initiated: typing.Optional[builtins.bool] = None,
22919
23014
  idp_signout: typing.Optional[builtins.bool] = None,
22920
23015
  name: typing.Optional[builtins.str] = None,
23016
+ request_signing_algorithm: typing.Optional[SigningAlgorithm] = None,
22921
23017
  ) -> None:
22922
23018
  """Type checking stubs"""
22923
23019
  pass
@@ -112,6 +112,7 @@ class CfnDataSource(
112
112
  )],
113
113
 
114
114
  # the properties below are optional
115
+ auto_import_data_quality_result=False,
115
116
  data_access_role="dataAccessRole"
116
117
  ),
117
118
  redshift_run_configuration=datazone.CfnDataSource.RedshiftRunConfigurationInputProperty(
@@ -558,6 +559,7 @@ class CfnDataSource(
558
559
  )],
559
560
 
560
561
  # the properties below are optional
562
+ auto_import_data_quality_result=False,
561
563
  data_access_role="dataAccessRole"
562
564
  ),
563
565
  redshift_run_configuration=datazone.CfnDataSource.RedshiftRunConfigurationInputProperty(
@@ -810,6 +812,7 @@ class CfnDataSource(
810
812
  jsii_struct_bases=[],
811
813
  name_mapping={
812
814
  "relational_filter_configurations": "relationalFilterConfigurations",
815
+ "auto_import_data_quality_result": "autoImportDataQualityResult",
813
816
  "data_access_role": "dataAccessRole",
814
817
  },
815
818
  )
@@ -818,11 +821,13 @@ class CfnDataSource(
818
821
  self,
819
822
  *,
820
823
  relational_filter_configurations: typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnDataSource.RelationalFilterConfigurationProperty", typing.Dict[builtins.str, typing.Any]]]]],
824
+ auto_import_data_quality_result: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
821
825
  data_access_role: typing.Optional[builtins.str] = None,
822
826
  ) -> None:
823
827
  '''The configuration details of the AWS Glue data source.
824
828
 
825
829
  :param relational_filter_configurations: The relational filter configurations included in the configuration details of the AWS Glue data source.
830
+ :param auto_import_data_quality_result: Specifies whether to automatically import data quality metrics as part of the data source run.
826
831
  :param data_access_role: The data access role included in the configuration details of the AWS Glue data source.
827
832
 
828
833
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-datazone-datasource-gluerunconfigurationinput.html
@@ -847,16 +852,20 @@ class CfnDataSource(
847
852
  )],
848
853
 
849
854
  # the properties below are optional
855
+ auto_import_data_quality_result=False,
850
856
  data_access_role="dataAccessRole"
851
857
  )
852
858
  '''
853
859
  if __debug__:
854
860
  type_hints = typing.get_type_hints(_typecheckingstub__ad6a5a243d0193849a3ba940cfbd956439268966f2ff08bff1fbcf5af20fe953)
855
861
  check_type(argname="argument relational_filter_configurations", value=relational_filter_configurations, expected_type=type_hints["relational_filter_configurations"])
862
+ check_type(argname="argument auto_import_data_quality_result", value=auto_import_data_quality_result, expected_type=type_hints["auto_import_data_quality_result"])
856
863
  check_type(argname="argument data_access_role", value=data_access_role, expected_type=type_hints["data_access_role"])
857
864
  self._values: typing.Dict[builtins.str, typing.Any] = {
858
865
  "relational_filter_configurations": relational_filter_configurations,
859
866
  }
867
+ if auto_import_data_quality_result is not None:
868
+ self._values["auto_import_data_quality_result"] = auto_import_data_quality_result
860
869
  if data_access_role is not None:
861
870
  self._values["data_access_role"] = data_access_role
862
871
 
@@ -872,6 +881,17 @@ class CfnDataSource(
872
881
  assert result is not None, "Required property 'relational_filter_configurations' is missing"
873
882
  return typing.cast(typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnDataSource.RelationalFilterConfigurationProperty"]]], result)
874
883
 
884
+ @builtins.property
885
+ def auto_import_data_quality_result(
886
+ self,
887
+ ) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
888
+ '''Specifies whether to automatically import data quality metrics as part of the data source run.
889
+
890
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-datazone-datasource-gluerunconfigurationinput.html#cfn-datazone-datasource-gluerunconfigurationinput-autoimportdataqualityresult
891
+ '''
892
+ result = self._values.get("auto_import_data_quality_result")
893
+ return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], result)
894
+
875
895
  @builtins.property
876
896
  def data_access_role(self) -> typing.Optional[builtins.str]:
877
897
  '''The data access role included in the configuration details of the AWS Glue data source.
@@ -1577,6 +1597,7 @@ class CfnDataSourceProps:
1577
1597
  )],
1578
1598
 
1579
1599
  # the properties below are optional
1600
+ auto_import_data_quality_result=False,
1580
1601
  data_access_role="dataAccessRole"
1581
1602
  ),
1582
1603
  redshift_run_configuration=datazone.CfnDataSource.RedshiftRunConfigurationInputProperty(
@@ -4835,6 +4856,7 @@ def _typecheckingstub__e39737bda51e6e9e0b04ce2c0598b00c495cf2dad8f53d4761c7a31ec
4835
4856
  def _typecheckingstub__ad6a5a243d0193849a3ba940cfbd956439268966f2ff08bff1fbcf5af20fe953(
4836
4857
  *,
4837
4858
  relational_filter_configurations: typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnDataSource.RelationalFilterConfigurationProperty, typing.Dict[builtins.str, typing.Any]]]]],
4859
+ auto_import_data_quality_result: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
4838
4860
  data_access_role: typing.Optional[builtins.str] = None,
4839
4861
  ) -> None:
4840
4862
  """Type checking stubs"""