aws-cdk-lib 2.142.1__py3-none-any.whl → 2.143.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk-lib might be problematic. Click here for more details.

Files changed (49) hide show
  1. aws_cdk/_jsii/__init__.py +1 -1
  2. aws_cdk/_jsii/{aws-cdk-lib@2.142.1.jsii.tgz → aws-cdk-lib@2.143.1.jsii.tgz} +0 -0
  3. aws_cdk/aws_amplify/__init__.py +12 -5
  4. aws_cdk/aws_backup/__init__.py +3 -3
  5. aws_cdk/aws_batch/__init__.py +237 -0
  6. aws_cdk/aws_bedrock/__init__.py +700 -16
  7. aws_cdk/aws_budgets/__init__.py +282 -3
  8. aws_cdk/aws_cloudtrail/__init__.py +12 -2
  9. aws_cdk/aws_codebuild/__init__.py +44 -0
  10. aws_cdk/aws_codepipeline/__init__.py +91 -4
  11. aws_cdk/aws_cognito/__init__.py +75 -0
  12. aws_cdk/aws_datazone/__init__.py +1743 -448
  13. aws_cdk/aws_dynamodb/__init__.py +60 -25
  14. aws_cdk/aws_ec2/__init__.py +112 -39
  15. aws_cdk/aws_ecs/__init__.py +3 -3
  16. aws_cdk/aws_ecs_patterns/__init__.py +106 -0
  17. aws_cdk/aws_eks/__init__.py +13 -10
  18. aws_cdk/aws_elasticache/__init__.py +9 -0
  19. aws_cdk/aws_events/__init__.py +219 -14
  20. aws_cdk/aws_events_targets/__init__.py +140 -3
  21. aws_cdk/aws_fms/__init__.py +42 -43
  22. aws_cdk/aws_fsx/__init__.py +3 -3
  23. aws_cdk/aws_identitystore/__init__.py +11 -11
  24. aws_cdk/aws_lambda/__init__.py +45 -0
  25. aws_cdk/aws_lambda_nodejs/__init__.py +16 -6
  26. aws_cdk/aws_lightsail/__init__.py +9 -0
  27. aws_cdk/aws_location/__init__.py +8 -4
  28. aws_cdk/aws_mediaconnect/__init__.py +1789 -39
  29. aws_cdk/aws_mediatailor/__init__.py +21 -1
  30. aws_cdk/aws_mwaa/__init__.py +82 -0
  31. aws_cdk/aws_neptune/__init__.py +374 -0
  32. aws_cdk/aws_personalize/__init__.py +9 -3
  33. aws_cdk/aws_pipes/__init__.py +7 -7
  34. aws_cdk/aws_quicksight/__init__.py +684 -156
  35. aws_cdk/aws_rds/__init__.py +88 -24
  36. aws_cdk/aws_redshift/__init__.py +0 -46
  37. aws_cdk/aws_route53resolver/__init__.py +23 -0
  38. aws_cdk/aws_s3/__init__.py +4 -4
  39. aws_cdk/aws_sagemaker/__init__.py +185 -4
  40. aws_cdk/aws_securityhub/__init__.py +387 -1
  41. aws_cdk/aws_ssm/__init__.py +14 -6
  42. aws_cdk/aws_sso/__init__.py +1243 -34
  43. aws_cdk/cx_api/__init__.py +16 -0
  44. {aws_cdk_lib-2.142.1.dist-info → aws_cdk_lib-2.143.1.dist-info}/METADATA +1 -1
  45. {aws_cdk_lib-2.142.1.dist-info → aws_cdk_lib-2.143.1.dist-info}/RECORD +49 -49
  46. {aws_cdk_lib-2.142.1.dist-info → aws_cdk_lib-2.143.1.dist-info}/LICENSE +0 -0
  47. {aws_cdk_lib-2.142.1.dist-info → aws_cdk_lib-2.143.1.dist-info}/NOTICE +0 -0
  48. {aws_cdk_lib-2.142.1.dist-info → aws_cdk_lib-2.143.1.dist-info}/WHEEL +0 -0
  49. {aws_cdk_lib-2.142.1.dist-info → aws_cdk_lib-2.143.1.dist-info}/top_level.txt +0 -0
@@ -431,7 +431,7 @@ Example for max storage configuration:
431
431
  # vpc: ec2.Vpc
432
432
 
433
433
  instance = rds.DatabaseInstance(self, "Instance",
434
- engine=rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_15_2),
434
+ engine=rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_16_3),
435
435
  # optional, defaults to m5.large
436
436
  instance_type=ec2.InstanceType.of(ec2.InstanceClass.BURSTABLE2, ec2.InstanceSize.SMALL),
437
437
  vpc=vpc,
@@ -445,7 +445,7 @@ To use dual-stack mode, specify `NetworkType.DUAL` on the `networkType` property
445
445
  # vpc: ec2.Vpc
446
446
  # VPC and subnets must have IPv6 CIDR blocks
447
447
  instance = rds.DatabaseInstance(self, "Instance",
448
- engine=rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_15_2),
448
+ engine=rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_16_3),
449
449
  vpc=vpc,
450
450
  network_type=rds.NetworkType.DUAL,
451
451
  publicly_accessible=False
@@ -464,7 +464,7 @@ a source database respectively:
464
464
 
465
465
  rds.DatabaseInstanceFromSnapshot(self, "Instance",
466
466
  snapshot_identifier="my-snapshot",
467
- engine=rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_15_2),
467
+ engine=rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_16_3),
468
468
  # optional, defaults to m5.large
469
469
  instance_type=ec2.InstanceType.of(ec2.InstanceClass.BURSTABLE2, ec2.InstanceSize.LARGE),
470
470
  vpc=vpc
@@ -775,7 +775,7 @@ The following examples use a `DatabaseInstance`, but the same usage is applicabl
775
775
  ```python
776
776
  # vpc: ec2.Vpc
777
777
 
778
- engine = rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_15_2)
778
+ engine = rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_16_3)
779
779
  rds.DatabaseInstance(self, "InstanceWithUsername",
780
780
  engine=engine,
781
781
  vpc=vpc,
@@ -801,7 +801,7 @@ Secrets generated by `fromGeneratedSecret()` can be customized:
801
801
  ```python
802
802
  # vpc: ec2.Vpc
803
803
 
804
- engine = rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_15_2)
804
+ engine = rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_16_3)
805
805
  my_key = kms.Key(self, "MyKey")
806
806
 
807
807
  rds.DatabaseInstance(self, "InstanceWithCustomizedSecret",
@@ -823,7 +823,7 @@ As noted above, Databases created with `DatabaseInstanceFromSnapshot` or `Server
823
823
  ```python
824
824
  # vpc: ec2.Vpc
825
825
 
826
- engine = rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_15_2)
826
+ engine = rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_16_3)
827
827
  my_key = kms.Key(self, "MyKey")
828
828
 
829
829
  rds.DatabaseInstanceFromSnapshot(self, "InstanceFromSnapshotWithCustomizedSecret",
@@ -1238,7 +1238,7 @@ audit_log_group = cluster.cloudwatch_log_groups.audit
1238
1238
  # Exporting logs from an instance
1239
1239
  instance = rds.DatabaseInstance(self, "Instance",
1240
1240
  engine=rds.DatabaseInstanceEngine.postgres(
1241
- version=rds.PostgresEngineVersion.VER_15_2
1241
+ version=rds.PostgresEngineVersion.VER_16_3
1242
1242
  ),
1243
1243
  vpc=vpc,
1244
1244
  cloudwatch_logs_exports=["postgresql"], # Export the PostgreSQL logs
@@ -2148,7 +2148,12 @@ class AuroraMysqlEngineVersion(
2148
2148
  @jsii.python.classproperty
2149
2149
  @jsii.member(jsii_name="VER_2_07_10")
2150
2150
  def VER_2_07_10(cls) -> "AuroraMysqlEngineVersion":
2151
- '''Version "5.7.mysql_aurora.2.07.10".'''
2151
+ '''(deprecated) Version "5.7.mysql_aurora.2.07.10".
2152
+
2153
+ :deprecated: Version 5.7.mysql_aurora.2.07.10 is no longer supported by Amazon RDS.
2154
+
2155
+ :stability: deprecated
2156
+ '''
2152
2157
  return typing.cast("AuroraMysqlEngineVersion", jsii.sget(cls, "VER_2_07_10"))
2153
2158
 
2154
2159
  @jsii.python.classproperty
@@ -2231,7 +2236,12 @@ class AuroraMysqlEngineVersion(
2231
2236
  @jsii.python.classproperty
2232
2237
  @jsii.member(jsii_name="VER_2_07_9")
2233
2238
  def VER_2_07_9(cls) -> "AuroraMysqlEngineVersion":
2234
- '''Version "5.7.mysql_aurora.2.07.9".'''
2239
+ '''(deprecated) Version "5.7.mysql_aurora.2.07.9".
2240
+
2241
+ :deprecated: Version 5.7.mysql_aurora.2.07.9 is no longer supported by Amazon RDS.
2242
+
2243
+ :stability: deprecated
2244
+ '''
2235
2245
  return typing.cast("AuroraMysqlEngineVersion", jsii.sget(cls, "VER_2_07_9"))
2236
2246
 
2237
2247
  @jsii.python.classproperty
@@ -2433,37 +2443,67 @@ class AuroraMysqlEngineVersion(
2433
2443
  @jsii.python.classproperty
2434
2444
  @jsii.member(jsii_name="VER_3_01_0")
2435
2445
  def VER_3_01_0(cls) -> "AuroraMysqlEngineVersion":
2436
- '''Version "8.0.mysql_aurora.3.01.0".'''
2446
+ '''(deprecated) Version "8.0.mysql_aurora.3.01.0".
2447
+
2448
+ :deprecated: Aurora MySQL 8.0.mysql_aurora.3.01.0 is no longer supported by Amazon RDS.
2449
+
2450
+ :stability: deprecated
2451
+ '''
2437
2452
  return typing.cast("AuroraMysqlEngineVersion", jsii.sget(cls, "VER_3_01_0"))
2438
2453
 
2439
2454
  @jsii.python.classproperty
2440
2455
  @jsii.member(jsii_name="VER_3_01_1")
2441
2456
  def VER_3_01_1(cls) -> "AuroraMysqlEngineVersion":
2442
- '''Version "8.0.mysql_aurora.3.01.1".'''
2457
+ '''(deprecated) Version "8.0.mysql_aurora.3.01.1".
2458
+
2459
+ :deprecated: Aurora MySQL 8.0.mysql_aurora.3.01.1 is no longer supported by Amazon RDS.
2460
+
2461
+ :stability: deprecated
2462
+ '''
2443
2463
  return typing.cast("AuroraMysqlEngineVersion", jsii.sget(cls, "VER_3_01_1"))
2444
2464
 
2445
2465
  @jsii.python.classproperty
2446
2466
  @jsii.member(jsii_name="VER_3_02_0")
2447
2467
  def VER_3_02_0(cls) -> "AuroraMysqlEngineVersion":
2448
- '''Version "8.0.mysql_aurora.3.02.0".'''
2468
+ '''(deprecated) Version "8.0.mysql_aurora.3.02.0".
2469
+
2470
+ :deprecated: Aurora MySQL 8.0.mysql_aurora.3.02.0 is no longer supported by Amazon RDS.
2471
+
2472
+ :stability: deprecated
2473
+ '''
2449
2474
  return typing.cast("AuroraMysqlEngineVersion", jsii.sget(cls, "VER_3_02_0"))
2450
2475
 
2451
2476
  @jsii.python.classproperty
2452
2477
  @jsii.member(jsii_name="VER_3_02_1")
2453
2478
  def VER_3_02_1(cls) -> "AuroraMysqlEngineVersion":
2454
- '''Version "8.0.mysql_aurora.3.02.1".'''
2479
+ '''(deprecated) Version "8.0.mysql_aurora.3.02.1".
2480
+
2481
+ :deprecated: Aurora MySQL 8.0.mysql_aurora.3.02.1 is no longer supported by Amazon RDS.
2482
+
2483
+ :stability: deprecated
2484
+ '''
2455
2485
  return typing.cast("AuroraMysqlEngineVersion", jsii.sget(cls, "VER_3_02_1"))
2456
2486
 
2457
2487
  @jsii.python.classproperty
2458
2488
  @jsii.member(jsii_name="VER_3_02_2")
2459
2489
  def VER_3_02_2(cls) -> "AuroraMysqlEngineVersion":
2460
- '''Version "8.0.mysql_aurora.3.02.2".'''
2490
+ '''(deprecated) Version "8.0.mysql_aurora.3.02.2".
2491
+
2492
+ :deprecated: Aurora MySQL 8.0.mysql_aurora.3.02.2 is no longer supported by Amazon RDS.
2493
+
2494
+ :stability: deprecated
2495
+ '''
2461
2496
  return typing.cast("AuroraMysqlEngineVersion", jsii.sget(cls, "VER_3_02_2"))
2462
2497
 
2463
2498
  @jsii.python.classproperty
2464
2499
  @jsii.member(jsii_name="VER_3_02_3")
2465
2500
  def VER_3_02_3(cls) -> "AuroraMysqlEngineVersion":
2466
- '''Version "8.0.mysql_aurora.3.02.3".'''
2501
+ '''(deprecated) Version "8.0.mysql_aurora.3.02.3".
2502
+
2503
+ :deprecated: Aurora MySQL 8.0.mysql_aurora.3.02.3 is no longer supported by Amazon RDS.
2504
+
2505
+ :stability: deprecated
2506
+ '''
2467
2507
  return typing.cast("AuroraMysqlEngineVersion", jsii.sget(cls, "VER_3_02_3"))
2468
2508
 
2469
2509
  @jsii.python.classproperty
@@ -3215,6 +3255,12 @@ class AuroraPostgresEngineVersion(
3215
3255
  '''Version "12.17".'''
3216
3256
  return typing.cast("AuroraPostgresEngineVersion", jsii.sget(cls, "VER_12_17"))
3217
3257
 
3258
+ @jsii.python.classproperty
3259
+ @jsii.member(jsii_name="VER_12_18")
3260
+ def VER_12_18(cls) -> "AuroraPostgresEngineVersion":
3261
+ '''Version "12.18".'''
3262
+ return typing.cast("AuroraPostgresEngineVersion", jsii.sget(cls, "VER_12_18"))
3263
+
3218
3264
  @jsii.python.classproperty
3219
3265
  @jsii.member(jsii_name="VER_12_4")
3220
3266
  def VER_12_4(cls) -> "AuroraPostgresEngineVersion":
@@ -3289,6 +3335,12 @@ class AuroraPostgresEngineVersion(
3289
3335
  '''Version "13.13".'''
3290
3336
  return typing.cast("AuroraPostgresEngineVersion", jsii.sget(cls, "VER_13_13"))
3291
3337
 
3338
+ @jsii.python.classproperty
3339
+ @jsii.member(jsii_name="VER_13_14")
3340
+ def VER_13_14(cls) -> "AuroraPostgresEngineVersion":
3341
+ '''Version "13.14".'''
3342
+ return typing.cast("AuroraPostgresEngineVersion", jsii.sget(cls, "VER_13_14"))
3343
+
3292
3344
  @jsii.python.classproperty
3293
3345
  @jsii.member(jsii_name="VER_13_3")
3294
3346
  def VER_13_3(cls) -> "AuroraPostgresEngineVersion":
@@ -3357,6 +3409,12 @@ class AuroraPostgresEngineVersion(
3357
3409
  '''Version "14.10".'''
3358
3410
  return typing.cast("AuroraPostgresEngineVersion", jsii.sget(cls, "VER_14_10"))
3359
3411
 
3412
+ @jsii.python.classproperty
3413
+ @jsii.member(jsii_name="VER_14_11")
3414
+ def VER_14_11(cls) -> "AuroraPostgresEngineVersion":
3415
+ '''Version "14.11".'''
3416
+ return typing.cast("AuroraPostgresEngineVersion", jsii.sget(cls, "VER_14_11"))
3417
+
3360
3418
  @jsii.python.classproperty
3361
3419
  @jsii.member(jsii_name="VER_14_3")
3362
3420
  def VER_14_3(cls) -> "AuroraPostgresEngineVersion":
@@ -18702,7 +18760,7 @@ class CredentialsBaseOptions:
18702
18760
 
18703
18761
  # vpc: ec2.Vpc
18704
18762
 
18705
- engine = rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_15_2)
18763
+ engine = rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_16_3)
18706
18764
  my_key = kms.Key(self, "MyKey")
18707
18765
 
18708
18766
  rds.DatabaseInstance(self, "InstanceWithCustomizedSecret",
@@ -22238,7 +22296,7 @@ class DatabaseInstanceReadReplicaProps(DatabaseInstanceNewProps):
22238
22296
 
22239
22297
  rds.DatabaseInstanceFromSnapshot(self, "Instance",
22240
22298
  snapshot_identifier="my-snapshot",
22241
- engine=rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_15_2),
22299
+ engine=rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_16_3),
22242
22300
  # optional, defaults to m5.large
22243
22301
  instance_type=ec2.InstanceType.of(ec2.InstanceClass.BURSTABLE2, ec2.InstanceSize.LARGE),
22244
22302
  vpc=vpc
@@ -32261,7 +32319,7 @@ class PostgresEngineVersion(
32261
32319
 
32262
32320
  # vpc: ec2.Vpc
32263
32321
 
32264
- engine = rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_15_2)
32322
+ engine = rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_16_3)
32265
32323
  my_key = kms.Key(self, "MyKey")
32266
32324
 
32267
32325
  rds.DatabaseInstance(self, "InstanceWithCustomizedSecret",
@@ -33181,6 +33239,12 @@ class PostgresEngineVersion(
33181
33239
  '''Version "16.2".'''
33182
33240
  return typing.cast("PostgresEngineVersion", jsii.sget(cls, "VER_16_2"))
33183
33241
 
33242
+ @jsii.python.classproperty
33243
+ @jsii.member(jsii_name="VER_16_3")
33244
+ def VER_16_3(cls) -> "PostgresEngineVersion":
33245
+ '''Version "16.3".'''
33246
+ return typing.cast("PostgresEngineVersion", jsii.sget(cls, "VER_16_3"))
33247
+
33184
33248
  @jsii.python.classproperty
33185
33249
  @jsii.member(jsii_name="VER_9_6_24")
33186
33250
  def VER_9_6_24(cls) -> "PostgresEngineVersion":
@@ -33224,7 +33288,7 @@ class PostgresInstanceEngineProps:
33224
33288
 
33225
33289
  # vpc: ec2.Vpc
33226
33290
 
33227
- engine = rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_15_2)
33291
+ engine = rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_16_3)
33228
33292
  my_key = kms.Key(self, "MyKey")
33229
33293
 
33230
33294
  rds.DatabaseInstance(self, "InstanceWithCustomizedSecret",
@@ -35941,7 +36005,7 @@ class SnapshotCredentials(
35941
36005
 
35942
36006
  # vpc: ec2.Vpc
35943
36007
 
35944
- engine = rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_15_2)
36008
+ engine = rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_16_3)
35945
36009
  my_key = kms.Key(self, "MyKey")
35946
36010
 
35947
36011
  rds.DatabaseInstanceFromSnapshot(self, "InstanceFromSnapshotWithCustomizedSecret",
@@ -36251,7 +36315,7 @@ class SnapshotCredentialsFromGeneratedPasswordOptions:
36251
36315
 
36252
36316
  # vpc: ec2.Vpc
36253
36317
 
36254
- engine = rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_15_2)
36318
+ engine = rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_16_3)
36255
36319
  my_key = kms.Key(self, "MyKey")
36256
36320
 
36257
36321
  rds.DatabaseInstanceFromSnapshot(self, "InstanceFromSnapshotWithCustomizedSecret",
@@ -39748,7 +39812,7 @@ class DatabaseInstanceFromSnapshot(
39748
39812
 
39749
39813
  rds.DatabaseInstanceFromSnapshot(self, "Instance",
39750
39814
  snapshot_identifier="my-snapshot",
39751
- engine=rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_15_2),
39815
+ engine=rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_16_3),
39752
39816
  # optional, defaults to m5.large
39753
39817
  instance_type=ec2.InstanceType.of(ec2.InstanceClass.BURSTABLE2, ec2.InstanceSize.LARGE),
39754
39818
  vpc=vpc
@@ -40305,7 +40369,7 @@ class DatabaseInstanceFromSnapshotProps(DatabaseInstanceSourceProps):
40305
40369
 
40306
40370
  rds.DatabaseInstanceFromSnapshot(self, "Instance",
40307
40371
  snapshot_identifier="my-snapshot",
40308
- engine=rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_15_2),
40372
+ engine=rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_16_3),
40309
40373
  # optional, defaults to m5.large
40310
40374
  instance_type=ec2.InstanceType.of(ec2.InstanceClass.BURSTABLE2, ec2.InstanceSize.LARGE),
40311
40375
  vpc=vpc
@@ -42027,7 +42091,7 @@ class DatabaseInstanceReadReplica(
42027
42091
 
42028
42092
  rds.DatabaseInstanceFromSnapshot(self, "Instance",
42029
42093
  snapshot_identifier="my-snapshot",
42030
- engine=rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_15_2),
42094
+ engine=rds.DatabaseInstanceEngine.postgres(version=rds.PostgresEngineVersion.VER_16_3),
42031
42095
  # optional, defaults to m5.large
42032
42096
  instance_type=ec2.InstanceType.of(ec2.InstanceClass.BURSTABLE2, ec2.InstanceSize.LARGE),
42033
42097
  vpc=vpc
@@ -123,7 +123,6 @@ class CfnCluster(
123
123
  maintenance_track_name="maintenanceTrackName",
124
124
  manage_master_password=False,
125
125
  manual_snapshot_retention_period=123,
126
- master_password_secret_kms_key_id="masterPasswordSecretKmsKeyId",
127
126
  master_user_password="masterUserPassword",
128
127
  multi_az=False,
129
128
  namespace_resource_policy=namespace_resource_policy,
@@ -186,7 +185,6 @@ class CfnCluster(
186
185
  maintenance_track_name: typing.Optional[builtins.str] = None,
187
186
  manage_master_password: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
188
187
  manual_snapshot_retention_period: typing.Optional[jsii.Number] = None,
189
- master_password_secret_kms_key_id: typing.Optional[builtins.str] = None,
190
188
  master_user_password: typing.Optional[builtins.str] = None,
191
189
  multi_az: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
192
190
  namespace_resource_policy: typing.Any = None,
@@ -242,7 +240,6 @@ class CfnCluster(
242
240
  :param maintenance_track_name: An optional parameter for the name of the maintenance track for the cluster. If you don't provide a maintenance track name, the cluster is assigned to the ``current`` track.
243
241
  :param manage_master_password: If ``true`` , Amazon Redshift uses AWS Secrets Manager to manage this cluster's admin credentials. You can't use ``MasterUserPassword`` if ``ManageMasterPassword`` is true. If ``ManageMasterPassword`` is false or not set, Amazon Redshift uses ``MasterUserPassword`` for the admin user account's password.
244
242
  :param manual_snapshot_retention_period: The default number of days to retain a manual snapshot. If the value is -1, the snapshot is retained indefinitely. This setting doesn't change the retention period of existing snapshots. The value must be either -1 or an integer between 1 and 3,653.
245
- :param master_password_secret_kms_key_id: The ID of the AWS Key Management Service (KMS) key used to encrypt and store the cluster's admin credentials secret. You can only use this parameter if ``ManageMasterPassword`` is true.
246
243
  :param master_user_password: The password associated with the admin user account for the cluster that is being created. You can't use ``MasterUserPassword`` if ``ManageMasterPassword`` is ``true`` . Constraints: - Must be between 8 and 64 characters in length. - Must contain at least one uppercase letter. - Must contain at least one lowercase letter. - Must contain one number. - Can be any printable ASCII character (ASCII code 33-126) except ``'`` (single quote), ``"`` (double quote), ``\\`` , ``/`` , or ``@`` .
247
244
  :param multi_az: A boolean indicating whether Amazon Redshift should deploy the cluster in two Availability Zones. The default is false.
248
245
  :param namespace_resource_policy: The policy that is attached to a resource.
@@ -300,7 +297,6 @@ class CfnCluster(
300
297
  maintenance_track_name=maintenance_track_name,
301
298
  manage_master_password=manage_master_password,
302
299
  manual_snapshot_retention_period=manual_snapshot_retention_period,
303
- master_password_secret_kms_key_id=master_password_secret_kms_key_id,
304
300
  master_user_password=master_user_password,
305
301
  multi_az=multi_az,
306
302
  namespace_resource_policy=namespace_resource_policy,
@@ -922,22 +918,6 @@ class CfnCluster(
922
918
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
923
919
  jsii.set(self, "manualSnapshotRetentionPeriod", value)
924
920
 
925
- @builtins.property
926
- @jsii.member(jsii_name="masterPasswordSecretKmsKeyId")
927
- def master_password_secret_kms_key_id(self) -> typing.Optional[builtins.str]:
928
- '''The ID of the AWS Key Management Service (KMS) key used to encrypt and store the cluster's admin credentials secret.'''
929
- return typing.cast(typing.Optional[builtins.str], jsii.get(self, "masterPasswordSecretKmsKeyId"))
930
-
931
- @master_password_secret_kms_key_id.setter
932
- def master_password_secret_kms_key_id(
933
- self,
934
- value: typing.Optional[builtins.str],
935
- ) -> None:
936
- if __debug__:
937
- type_hints = typing.get_type_hints(_typecheckingstub__e26594c22a23597c2bcb39be035e857bb61d132ed89a50d4d58e1a8f8c369e12)
938
- check_type(argname="argument value", value=value, expected_type=type_hints["value"])
939
- jsii.set(self, "masterPasswordSecretKmsKeyId", value)
940
-
941
921
  @builtins.property
942
922
  @jsii.member(jsii_name="masterUserPassword")
943
923
  def master_user_password(self) -> typing.Optional[builtins.str]:
@@ -1797,7 +1777,6 @@ class CfnClusterParameterGroupProps:
1797
1777
  "maintenance_track_name": "maintenanceTrackName",
1798
1778
  "manage_master_password": "manageMasterPassword",
1799
1779
  "manual_snapshot_retention_period": "manualSnapshotRetentionPeriod",
1800
- "master_password_secret_kms_key_id": "masterPasswordSecretKmsKeyId",
1801
1780
  "master_user_password": "masterUserPassword",
1802
1781
  "multi_az": "multiAz",
1803
1782
  "namespace_resource_policy": "namespaceResourcePolicy",
@@ -1855,7 +1834,6 @@ class CfnClusterProps:
1855
1834
  maintenance_track_name: typing.Optional[builtins.str] = None,
1856
1835
  manage_master_password: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
1857
1836
  manual_snapshot_retention_period: typing.Optional[jsii.Number] = None,
1858
- master_password_secret_kms_key_id: typing.Optional[builtins.str] = None,
1859
1837
  master_user_password: typing.Optional[builtins.str] = None,
1860
1838
  multi_az: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
1861
1839
  namespace_resource_policy: typing.Any = None,
@@ -1910,7 +1888,6 @@ class CfnClusterProps:
1910
1888
  :param maintenance_track_name: An optional parameter for the name of the maintenance track for the cluster. If you don't provide a maintenance track name, the cluster is assigned to the ``current`` track.
1911
1889
  :param manage_master_password: If ``true`` , Amazon Redshift uses AWS Secrets Manager to manage this cluster's admin credentials. You can't use ``MasterUserPassword`` if ``ManageMasterPassword`` is true. If ``ManageMasterPassword`` is false or not set, Amazon Redshift uses ``MasterUserPassword`` for the admin user account's password.
1912
1890
  :param manual_snapshot_retention_period: The default number of days to retain a manual snapshot. If the value is -1, the snapshot is retained indefinitely. This setting doesn't change the retention period of existing snapshots. The value must be either -1 or an integer between 1 and 3,653.
1913
- :param master_password_secret_kms_key_id: The ID of the AWS Key Management Service (KMS) key used to encrypt and store the cluster's admin credentials secret. You can only use this parameter if ``ManageMasterPassword`` is true.
1914
1891
  :param master_user_password: The password associated with the admin user account for the cluster that is being created. You can't use ``MasterUserPassword`` if ``ManageMasterPassword`` is ``true`` . Constraints: - Must be between 8 and 64 characters in length. - Must contain at least one uppercase letter. - Must contain at least one lowercase letter. - Must contain one number. - Can be any printable ASCII character (ASCII code 33-126) except ``'`` (single quote), ``"`` (double quote), ``\\`` , ``/`` , or ``@`` .
1915
1892
  :param multi_az: A boolean indicating whether Amazon Redshift should deploy the cluster in two Availability Zones. The default is false.
1916
1893
  :param namespace_resource_policy: The policy that is attached to a resource.
@@ -1983,7 +1960,6 @@ class CfnClusterProps:
1983
1960
  maintenance_track_name="maintenanceTrackName",
1984
1961
  manage_master_password=False,
1985
1962
  manual_snapshot_retention_period=123,
1986
- master_password_secret_kms_key_id="masterPasswordSecretKmsKeyId",
1987
1963
  master_user_password="masterUserPassword",
1988
1964
  multi_az=False,
1989
1965
  namespace_resource_policy=namespace_resource_policy,
@@ -2042,7 +2018,6 @@ class CfnClusterProps:
2042
2018
  check_type(argname="argument maintenance_track_name", value=maintenance_track_name, expected_type=type_hints["maintenance_track_name"])
2043
2019
  check_type(argname="argument manage_master_password", value=manage_master_password, expected_type=type_hints["manage_master_password"])
2044
2020
  check_type(argname="argument manual_snapshot_retention_period", value=manual_snapshot_retention_period, expected_type=type_hints["manual_snapshot_retention_period"])
2045
- check_type(argname="argument master_password_secret_kms_key_id", value=master_password_secret_kms_key_id, expected_type=type_hints["master_password_secret_kms_key_id"])
2046
2021
  check_type(argname="argument master_user_password", value=master_user_password, expected_type=type_hints["master_user_password"])
2047
2022
  check_type(argname="argument multi_az", value=multi_az, expected_type=type_hints["multi_az"])
2048
2023
  check_type(argname="argument namespace_resource_policy", value=namespace_resource_policy, expected_type=type_hints["namespace_resource_policy"])
@@ -2125,8 +2100,6 @@ class CfnClusterProps:
2125
2100
  self._values["manage_master_password"] = manage_master_password
2126
2101
  if manual_snapshot_retention_period is not None:
2127
2102
  self._values["manual_snapshot_retention_period"] = manual_snapshot_retention_period
2128
- if master_password_secret_kms_key_id is not None:
2129
- self._values["master_password_secret_kms_key_id"] = master_password_secret_kms_key_id
2130
2103
  if master_user_password is not None:
2131
2104
  self._values["master_user_password"] = master_user_password
2132
2105
  if multi_az is not None:
@@ -2588,17 +2561,6 @@ class CfnClusterProps:
2588
2561
  result = self._values.get("manual_snapshot_retention_period")
2589
2562
  return typing.cast(typing.Optional[jsii.Number], result)
2590
2563
 
2591
- @builtins.property
2592
- def master_password_secret_kms_key_id(self) -> typing.Optional[builtins.str]:
2593
- '''The ID of the AWS Key Management Service (KMS) key used to encrypt and store the cluster's admin credentials secret.
2594
-
2595
- You can only use this parameter if ``ManageMasterPassword`` is true.
2596
-
2597
- :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-redshift-cluster.html#cfn-redshift-cluster-masterpasswordsecretkmskeyid
2598
- '''
2599
- result = self._values.get("master_password_secret_kms_key_id")
2600
- return typing.cast(typing.Optional[builtins.str], result)
2601
-
2602
2564
  @builtins.property
2603
2565
  def master_user_password(self) -> typing.Optional[builtins.str]:
2604
2566
  '''The password associated with the admin user account for the cluster that is being created.
@@ -5945,7 +5907,6 @@ def _typecheckingstub__f6d25f70797e3ae67b635ec776926582ff0be975c8173c4af217f7f6e
5945
5907
  maintenance_track_name: typing.Optional[builtins.str] = None,
5946
5908
  manage_master_password: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
5947
5909
  manual_snapshot_retention_period: typing.Optional[jsii.Number] = None,
5948
- master_password_secret_kms_key_id: typing.Optional[builtins.str] = None,
5949
5910
  master_user_password: typing.Optional[builtins.str] = None,
5950
5911
  multi_az: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
5951
5912
  namespace_resource_policy: typing.Any = None,
@@ -6178,12 +6139,6 @@ def _typecheckingstub__47928702ad781fa3915ff0f5068c3b692ff5d8d891b871ca8319d3632
6178
6139
  """Type checking stubs"""
6179
6140
  pass
6180
6141
 
6181
- def _typecheckingstub__e26594c22a23597c2bcb39be035e857bb61d132ed89a50d4d58e1a8f8c369e12(
6182
- value: typing.Optional[builtins.str],
6183
- ) -> None:
6184
- """Type checking stubs"""
6185
- pass
6186
-
6187
6142
  def _typecheckingstub__15113bc0292eb3a900fcad9d620cd08c320a19dfce07db8d055112a353c48cba(
6188
6143
  value: typing.Optional[builtins.str],
6189
6144
  ) -> None:
@@ -6417,7 +6372,6 @@ def _typecheckingstub__88d0d566c2d2524449f4cc4b794952814b68b5dcd5494f1bcdf5b417e
6417
6372
  maintenance_track_name: typing.Optional[builtins.str] = None,
6418
6373
  manage_master_password: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
6419
6374
  manual_snapshot_retention_period: typing.Optional[jsii.Number] = None,
6420
- master_password_secret_kms_key_id: typing.Optional[builtins.str] = None,
6421
6375
  master_user_password: typing.Optional[builtins.str] = None,
6422
6376
  multi_az: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
6423
6377
  namespace_resource_policy: typing.Any = None,
@@ -440,6 +440,7 @@ class CfnFirewallRuleGroup(
440
440
  block_override_domain="blockOverrideDomain",
441
441
  block_override_ttl=123,
442
442
  block_response="blockResponse",
443
+ firewall_domain_redirection_action="firewallDomainRedirectionAction",
443
444
  qtype="qtype"
444
445
  )],
445
446
  name="name",
@@ -668,6 +669,7 @@ class CfnFirewallRuleGroup(
668
669
  "block_override_domain": "blockOverrideDomain",
669
670
  "block_override_ttl": "blockOverrideTtl",
670
671
  "block_response": "blockResponse",
672
+ "firewall_domain_redirection_action": "firewallDomainRedirectionAction",
671
673
  "qtype": "qtype",
672
674
  },
673
675
  )
@@ -682,6 +684,7 @@ class CfnFirewallRuleGroup(
682
684
  block_override_domain: typing.Optional[builtins.str] = None,
683
685
  block_override_ttl: typing.Optional[jsii.Number] = None,
684
686
  block_response: typing.Optional[builtins.str] = None,
687
+ firewall_domain_redirection_action: typing.Optional[builtins.str] = None,
685
688
  qtype: typing.Optional[builtins.str] = None,
686
689
  ) -> None:
687
690
  '''A single firewall rule in a rule group.
@@ -693,6 +696,7 @@ class CfnFirewallRuleGroup(
693
696
  :param block_override_domain: The custom DNS record to send back in response to the query. Used for the rule action ``BLOCK`` with a ``BlockResponse`` setting of ``OVERRIDE`` .
694
697
  :param block_override_ttl: The recommended amount of time, in seconds, for the DNS resolver or web browser to cache the provided override record. Used for the rule action ``BLOCK`` with a ``BlockResponse`` setting of ``OVERRIDE`` .
695
698
  :param block_response: The way that you want DNS Firewall to block the request. Used for the rule action setting ``BLOCK`` . - ``NODATA`` - Respond indicating that the query was successful, but no response is available for it. - ``NXDOMAIN`` - Respond indicating that the domain name that's in the query doesn't exist. - ``OVERRIDE`` - Provide a custom override in the response. This option requires custom handling details in the rule's ``BlockOverride*`` settings.
699
+ :param firewall_domain_redirection_action: How you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME, or DNAME. ``Inspect_Redirection_Domain`` (Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be added to the domain list. ``Trust_Redirection_Domain`` inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the domain in the redirection list to the domain list.
696
700
  :param qtype: The DNS query type you want the rule to evaluate. Allowed values are; - A: Returns an IPv4 address. - AAAA: Returns an Ipv6 address. - CAA: Restricts CAs that can create SSL/TLS certifications for the domain. - CNAME: Returns another domain name. - DS: Record that identifies the DNSSEC signing key of a delegated zone. - MX: Specifies mail servers. - NAPTR: Regular-expression-based rewriting of domain names. - NS: Authoritative name servers. - PTR: Maps an IP address to a domain name. - SOA: Start of authority record for the zone. - SPF: Lists the servers authorized to send emails from a domain. - SRV: Application specific values that identify servers. - TXT: Verifies email senders and application-specific values. - A query type you define by using the DNS type ID, for example 28 for AAAA. The values must be defined as TYPE NUMBER , where the NUMBER can be 1-65334, for example, TYPE28. For more information, see `List of DNS record types <https://docs.aws.amazon.com/https://en.wikipedia.org/wiki/List_of_DNS_record_types>`_ .
697
701
 
698
702
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-route53resolver-firewallrulegroup-firewallrule.html
@@ -714,6 +718,7 @@ class CfnFirewallRuleGroup(
714
718
  block_override_domain="blockOverrideDomain",
715
719
  block_override_ttl=123,
716
720
  block_response="blockResponse",
721
+ firewall_domain_redirection_action="firewallDomainRedirectionAction",
717
722
  qtype="qtype"
718
723
  )
719
724
  '''
@@ -726,6 +731,7 @@ class CfnFirewallRuleGroup(
726
731
  check_type(argname="argument block_override_domain", value=block_override_domain, expected_type=type_hints["block_override_domain"])
727
732
  check_type(argname="argument block_override_ttl", value=block_override_ttl, expected_type=type_hints["block_override_ttl"])
728
733
  check_type(argname="argument block_response", value=block_response, expected_type=type_hints["block_response"])
734
+ check_type(argname="argument firewall_domain_redirection_action", value=firewall_domain_redirection_action, expected_type=type_hints["firewall_domain_redirection_action"])
729
735
  check_type(argname="argument qtype", value=qtype, expected_type=type_hints["qtype"])
730
736
  self._values: typing.Dict[builtins.str, typing.Any] = {
731
737
  "action": action,
@@ -740,6 +746,8 @@ class CfnFirewallRuleGroup(
740
746
  self._values["block_override_ttl"] = block_override_ttl
741
747
  if block_response is not None:
742
748
  self._values["block_response"] = block_response
749
+ if firewall_domain_redirection_action is not None:
750
+ self._values["firewall_domain_redirection_action"] = firewall_domain_redirection_action
743
751
  if qtype is not None:
744
752
  self._values["qtype"] = qtype
745
753
 
@@ -830,6 +838,19 @@ class CfnFirewallRuleGroup(
830
838
  result = self._values.get("block_response")
831
839
  return typing.cast(typing.Optional[builtins.str], result)
832
840
 
841
+ @builtins.property
842
+ def firewall_domain_redirection_action(self) -> typing.Optional[builtins.str]:
843
+ '''How you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME, or DNAME.
844
+
845
+ ``Inspect_Redirection_Domain`` (Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be added to the domain list.
846
+
847
+ ``Trust_Redirection_Domain`` inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the domain in the redirection list to the domain list.
848
+
849
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-route53resolver-firewallrulegroup-firewallrule.html#cfn-route53resolver-firewallrulegroup-firewallrule-firewalldomainredirectionaction
850
+ '''
851
+ result = self._values.get("firewall_domain_redirection_action")
852
+ return typing.cast(typing.Optional[builtins.str], result)
853
+
833
854
  @builtins.property
834
855
  def qtype(self) -> typing.Optional[builtins.str]:
835
856
  '''The DNS query type you want the rule to evaluate. Allowed values are;
@@ -1321,6 +1342,7 @@ class CfnFirewallRuleGroupProps:
1321
1342
  block_override_domain="blockOverrideDomain",
1322
1343
  block_override_ttl=123,
1323
1344
  block_response="blockResponse",
1345
+ firewall_domain_redirection_action="firewallDomainRedirectionAction",
1324
1346
  qtype="qtype"
1325
1347
  )],
1326
1348
  name="name",
@@ -4249,6 +4271,7 @@ def _typecheckingstub__61f0f7aa6db62533b4486bd58a4692d76a133c14cd2281a8ea8e083c9
4249
4271
  block_override_domain: typing.Optional[builtins.str] = None,
4250
4272
  block_override_ttl: typing.Optional[jsii.Number] = None,
4251
4273
  block_response: typing.Optional[builtins.str] = None,
4274
+ firewall_domain_redirection_action: typing.Optional[builtins.str] = None,
4252
4275
  qtype: typing.Optional[builtins.str] = None,
4253
4276
  ) -> None:
4254
4277
  """Type checking stubs"""
@@ -1756,7 +1756,7 @@ class BucketProps:
1756
1756
  :param access_control: Specifies a canned ACL that grants predefined permissions to the bucket. Default: BucketAccessControl.PRIVATE
1757
1757
  :param auto_delete_objects: Whether all objects should be automatically deleted when the bucket is removed from the stack or when the stack is deleted. Requires the ``removalPolicy`` to be set to ``RemovalPolicy.DESTROY``. **Warning** if you have deployed a bucket with ``autoDeleteObjects: true``, switching this to ``false`` in a CDK version *before* ``1.126.0`` will lead to all objects in the bucket being deleted. Be sure to update your bucket resources by deploying with CDK version ``1.126.0`` or later **before** switching this value to ``false``. Setting ``autoDeleteObjects`` to true on a bucket will add ``s3:PutBucketPolicy`` to the bucket policy. This is because during bucket deletion, the custom resource provider needs to update the bucket policy by adding a deny policy for ``s3:PutObject`` to prevent race conditions with external bucket writers. Default: false
1758
1758
  :param block_public_access: The block public access configuration of this bucket. Default: - CloudFormation defaults will apply. New buckets and objects don't allow public access, but users can modify bucket policies or object permissions to allow public access
1759
- :param bucket_key_enabled: Whether Amazon S3 should use its own intermediary key to generate data keys. Only relevant when using KMS for encryption. - If not enabled, every object GET and PUT will cause an API call to KMS (with the attendant cost implications of that). - If enabled, S3 will use its own time-limited key instead. Only relevant, when Encryption is set to ``BucketEncryption.KMS`` or ``BucketEncryption.KMS_MANAGED``. Default: - false
1759
+ :param bucket_key_enabled: Whether Amazon S3 should use its own intermediary key to generate data keys. Only relevant when using KMS for encryption. - If not enabled, every object GET and PUT will cause an API call to KMS (with the attendant cost implications of that). - If enabled, S3 will use its own time-limited key instead. Only relevant, when Encryption is not set to ``BucketEncryption.UNENCRYPTED``. Default: - false
1760
1760
  :param bucket_name: Physical name of this bucket. Default: - Assigned by CloudFormation (recommended).
1761
1761
  :param cors: The CORS configuration of this bucket. Default: - No CORS configuration.
1762
1762
  :param encryption: The kind of server-side encryption to apply to this bucket. If you choose KMS, you can specify a KMS key via ``encryptionKey``. If encryption key is not specified, a key will automatically be created. Default: - ``KMS`` if ``encryptionKey`` is specified, or ``UNENCRYPTED`` otherwise. But if ``UNENCRYPTED`` is specified, the bucket will be encrypted as ``S3_MANAGED`` automatically.
@@ -1952,7 +1952,7 @@ class BucketProps:
1952
1952
  attendant cost implications of that).
1953
1953
  - If enabled, S3 will use its own time-limited key instead.
1954
1954
 
1955
- Only relevant, when Encryption is set to ``BucketEncryption.KMS`` or ``BucketEncryption.KMS_MANAGED``.
1955
+ Only relevant, when Encryption is not set to ``BucketEncryption.UNENCRYPTED``.
1956
1956
 
1957
1957
  :default: - false
1958
1958
  '''
@@ -5148,7 +5148,7 @@ class CfnBucket(
5148
5148
  mode: typing.Optional[builtins.str] = None,
5149
5149
  years: typing.Optional[jsii.Number] = None,
5150
5150
  ) -> None:
5151
- '''The container element for specifying the default Object Lock retention settings for new objects placed in the specified bucket.
5151
+ '''The container element for optionally specifying the default Object Lock retention settings for new objects placed in the specified bucket.
5152
5152
 
5153
5153
  .. epigraph::
5154
5154
 
@@ -19370,7 +19370,7 @@ class Bucket(
19370
19370
  :param access_control: Specifies a canned ACL that grants predefined permissions to the bucket. Default: BucketAccessControl.PRIVATE
19371
19371
  :param auto_delete_objects: Whether all objects should be automatically deleted when the bucket is removed from the stack or when the stack is deleted. Requires the ``removalPolicy`` to be set to ``RemovalPolicy.DESTROY``. **Warning** if you have deployed a bucket with ``autoDeleteObjects: true``, switching this to ``false`` in a CDK version *before* ``1.126.0`` will lead to all objects in the bucket being deleted. Be sure to update your bucket resources by deploying with CDK version ``1.126.0`` or later **before** switching this value to ``false``. Setting ``autoDeleteObjects`` to true on a bucket will add ``s3:PutBucketPolicy`` to the bucket policy. This is because during bucket deletion, the custom resource provider needs to update the bucket policy by adding a deny policy for ``s3:PutObject`` to prevent race conditions with external bucket writers. Default: false
19372
19372
  :param block_public_access: The block public access configuration of this bucket. Default: - CloudFormation defaults will apply. New buckets and objects don't allow public access, but users can modify bucket policies or object permissions to allow public access
19373
- :param bucket_key_enabled: Whether Amazon S3 should use its own intermediary key to generate data keys. Only relevant when using KMS for encryption. - If not enabled, every object GET and PUT will cause an API call to KMS (with the attendant cost implications of that). - If enabled, S3 will use its own time-limited key instead. Only relevant, when Encryption is set to ``BucketEncryption.KMS`` or ``BucketEncryption.KMS_MANAGED``. Default: - false
19373
+ :param bucket_key_enabled: Whether Amazon S3 should use its own intermediary key to generate data keys. Only relevant when using KMS for encryption. - If not enabled, every object GET and PUT will cause an API call to KMS (with the attendant cost implications of that). - If enabled, S3 will use its own time-limited key instead. Only relevant, when Encryption is not set to ``BucketEncryption.UNENCRYPTED``. Default: - false
19374
19374
  :param bucket_name: Physical name of this bucket. Default: - Assigned by CloudFormation (recommended).
19375
19375
  :param cors: The CORS configuration of this bucket. Default: - No CORS configuration.
19376
19376
  :param encryption: The kind of server-side encryption to apply to this bucket. If you choose KMS, you can specify a KMS key via ``encryptionKey``. If encryption key is not specified, a key will automatically be created. Default: - ``KMS`` if ``encryptionKey`` is specified, or ``UNENCRYPTED`` otherwise. But if ``UNENCRYPTED`` is specified, the bucket will be encrypted as ``S3_MANAGED`` automatically.