aws-cdk-lib 2.146.0__py3-none-any.whl → 2.147.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk-lib might be problematic. Click here for more details.
- aws_cdk/__init__.py +10 -11
- aws_cdk/_jsii/__init__.py +1 -1
- aws_cdk/_jsii/{aws-cdk-lib@2.146.0.jsii.tgz → aws-cdk-lib@2.147.0.jsii.tgz} +0 -0
- aws_cdk/aws_apigateway/__init__.py +32 -12
- aws_cdk/aws_apigatewayv2/__init__.py +48 -2
- aws_cdk/aws_apigatewayv2_integrations/__init__.py +142 -4
- aws_cdk/aws_appconfig/__init__.py +8 -4
- aws_cdk/aws_applicationsignals/__init__.py +1766 -0
- aws_cdk/aws_auditmanager/__init__.py +5 -1
- aws_cdk/aws_autoscaling/__init__.py +65 -20
- aws_cdk/aws_batch/__init__.py +215 -0
- aws_cdk/aws_bedrock/__init__.py +272 -103
- aws_cdk/aws_cloudformation/__init__.py +5 -11
- aws_cdk/aws_cloudfront/__init__.py +10 -3
- aws_cdk/aws_cloudtrail/__init__.py +56 -2
- aws_cdk/aws_codebuild/__init__.py +62 -29
- aws_cdk/aws_codepipeline/__init__.py +10 -5
- aws_cdk/aws_datazone/__init__.py +80 -68
- aws_cdk/aws_deadline/__init__.py +603 -17
- aws_cdk/aws_ec2/__init__.py +237 -112
- aws_cdk/aws_ecs/__init__.py +20 -18
- aws_cdk/aws_eks/__init__.py +15 -9
- aws_cdk/aws_elasticloadbalancingv2/__init__.py +11 -5
- aws_cdk/aws_emrserverless/__init__.py +5 -5
- aws_cdk/aws_events/__init__.py +36 -16
- aws_cdk/aws_fsx/__init__.py +126 -21
- aws_cdk/aws_globalaccelerator/__init__.py +2 -1
- aws_cdk/aws_globalaccelerator_endpoints/__init__.py +35 -4
- aws_cdk/aws_glue/__init__.py +26 -0
- aws_cdk/aws_grafana/__init__.py +4 -4
- aws_cdk/aws_groundstation/__init__.py +55 -35
- aws_cdk/aws_guardduty/__init__.py +826 -0
- aws_cdk/aws_iot/__init__.py +3 -3
- aws_cdk/aws_lambda/__init__.py +7 -5
- aws_cdk/aws_lightsail/__init__.py +1 -1
- aws_cdk/aws_location/__init__.py +10 -11
- aws_cdk/aws_mediapackagev2/__init__.py +38 -20
- aws_cdk/aws_mediatailor/__init__.py +2 -2
- aws_cdk/aws_msk/__init__.py +4 -4
- aws_cdk/aws_mwaa/__init__.py +16 -8
- aws_cdk/aws_nimblestudio/__init__.py +9 -9
- aws_cdk/aws_opensearchservice/__init__.py +5 -4
- aws_cdk/aws_opsworks/__init__.py +3 -3
- aws_cdk/aws_osis/__init__.py +33 -4
- aws_cdk/aws_pipes/__init__.py +97 -45
- aws_cdk/aws_quicksight/__init__.py +23 -21
- aws_cdk/aws_rds/__init__.py +43 -11
- aws_cdk/aws_refactorspaces/__init__.py +3 -3
- aws_cdk/aws_rolesanywhere/__init__.py +21 -14
- aws_cdk/aws_sagemaker/__init__.py +5 -2
- aws_cdk/aws_securityhub/__init__.py +163 -78
- aws_cdk/aws_securitylake/__init__.py +7 -5
- aws_cdk/aws_ses/__init__.py +117 -0
- aws_cdk/aws_simspaceweaver/__init__.py +2 -2
- aws_cdk/aws_sns/__init__.py +6 -4
- aws_cdk/aws_sqs/__init__.py +3 -3
- aws_cdk/aws_stepfunctions/__init__.py +51 -28
- aws_cdk/aws_stepfunctions_tasks/__init__.py +56 -2
- aws_cdk/aws_transfer/__init__.py +8 -2
- aws_cdk/aws_wafv2/__init__.py +10 -10
- aws_cdk/aws_workspacesweb/__init__.py +8 -8
- {aws_cdk_lib-2.146.0.dist-info → aws_cdk_lib-2.147.0.dist-info}/METADATA +1 -1
- {aws_cdk_lib-2.146.0.dist-info → aws_cdk_lib-2.147.0.dist-info}/RECORD +67 -66
- {aws_cdk_lib-2.146.0.dist-info → aws_cdk_lib-2.147.0.dist-info}/LICENSE +0 -0
- {aws_cdk_lib-2.146.0.dist-info → aws_cdk_lib-2.147.0.dist-info}/NOTICE +0 -0
- {aws_cdk_lib-2.146.0.dist-info → aws_cdk_lib-2.147.0.dist-info}/WHEEL +0 -0
- {aws_cdk_lib-2.146.0.dist-info → aws_cdk_lib-2.147.0.dist-info}/top_level.txt +0 -0
|
@@ -1163,6 +1163,15 @@ tasks.GlueStartJobRun(self, "Task",
|
|
|
1163
1163
|
)
|
|
1164
1164
|
```
|
|
1165
1165
|
|
|
1166
|
+
You can choose the execution class by setting the `executionClass` property.
|
|
1167
|
+
|
|
1168
|
+
```python
|
|
1169
|
+
tasks.GlueStartJobRun(self, "Task",
|
|
1170
|
+
glue_job_name="my-glue-job",
|
|
1171
|
+
execution_class=tasks.ExecutionClass.FLEX
|
|
1172
|
+
)
|
|
1173
|
+
```
|
|
1174
|
+
|
|
1166
1175
|
### StartCrawlerRun
|
|
1167
1176
|
|
|
1168
1177
|
You can call the [`StartCrawler`](https://docs.aws.amazon.com/glue/latest/dg/aws-glue-api-crawler-crawling.html#aws-glue-api-crawler-crawling-StartCrawler) API from a `Task` state through AWS SDK service integrations.
|
|
@@ -22406,6 +22415,30 @@ class EventBridgePutEventsProps(_TaskStateBaseProps_3a62b6d0):
|
|
|
22406
22415
|
)
|
|
22407
22416
|
|
|
22408
22417
|
|
|
22418
|
+
@jsii.enum(jsii_type="aws-cdk-lib.aws_stepfunctions_tasks.ExecutionClass")
|
|
22419
|
+
class ExecutionClass(enum.Enum):
|
|
22420
|
+
'''The excecution class of the job.
|
|
22421
|
+
|
|
22422
|
+
:exampleMetadata: infused
|
|
22423
|
+
|
|
22424
|
+
Example::
|
|
22425
|
+
|
|
22426
|
+
tasks.GlueStartJobRun(self, "Task",
|
|
22427
|
+
glue_job_name="my-glue-job",
|
|
22428
|
+
execution_class=tasks.ExecutionClass.FLEX
|
|
22429
|
+
)
|
|
22430
|
+
'''
|
|
22431
|
+
|
|
22432
|
+
FLEX = "FLEX"
|
|
22433
|
+
'''The flexible execution class is appropriate for time-insensitive jobs whose start and completion times may vary.
|
|
22434
|
+
|
|
22435
|
+
Only jobs with AWS Glue version 3.0 and above and command type ``glueetl`` will be allowed to set ``ExecutionClass`` to ``FLEX``.
|
|
22436
|
+
The flexible execution class is available for Spark jobs.
|
|
22437
|
+
'''
|
|
22438
|
+
STANDARD = "STANDARD"
|
|
22439
|
+
'''The standard execution class is ideal for time-sensitive workloads that require fast job startup and dedicated resources.'''
|
|
22440
|
+
|
|
22441
|
+
|
|
22409
22442
|
class GlueDataBrewStartJobRun(
|
|
22410
22443
|
_TaskStateBase_b5c0a816,
|
|
22411
22444
|
metaclass=jsii.JSIIMeta,
|
|
@@ -23191,6 +23224,7 @@ class GlueStartJobRun(
|
|
|
23191
23224
|
*,
|
|
23192
23225
|
glue_job_name: builtins.str,
|
|
23193
23226
|
arguments: typing.Optional[_TaskInput_91b91b91] = None,
|
|
23227
|
+
execution_class: typing.Optional[ExecutionClass] = None,
|
|
23194
23228
|
notify_delay_after: typing.Optional[_Duration_4839e8c3] = None,
|
|
23195
23229
|
security_configuration: typing.Optional[builtins.str] = None,
|
|
23196
23230
|
worker_configuration: typing.Optional[typing.Union["WorkerConfigurationProperty", typing.Dict[builtins.str, typing.Any]]] = None,
|
|
@@ -23212,6 +23246,7 @@ class GlueStartJobRun(
|
|
|
23212
23246
|
:param id: Descriptive identifier for this chainable.
|
|
23213
23247
|
:param glue_job_name: Glue job name.
|
|
23214
23248
|
:param arguments: The job arguments specifically for this run. For this job run, they replace the default arguments set in the job definition itself. Default: - Default arguments set in the job definition
|
|
23249
|
+
:param execution_class: The excecution class of the job. Default: - STANDARD
|
|
23215
23250
|
:param notify_delay_after: After a job run starts, the number of minutes to wait before sending a job run delay notification. Must be at least 1 minute. Default: - Default delay set in the job definition
|
|
23216
23251
|
:param security_configuration: The name of the SecurityConfiguration structure to be used with this job run. This must match the Glue API Default: - Default configuration set in the job definition
|
|
23217
23252
|
:param worker_configuration: The worker configuration for this run. Default: - Default worker configuration in the job definition
|
|
@@ -23235,6 +23270,7 @@ class GlueStartJobRun(
|
|
|
23235
23270
|
props = GlueStartJobRunProps(
|
|
23236
23271
|
glue_job_name=glue_job_name,
|
|
23237
23272
|
arguments=arguments,
|
|
23273
|
+
execution_class=execution_class,
|
|
23238
23274
|
notify_delay_after=notify_delay_after,
|
|
23239
23275
|
security_configuration=security_configuration,
|
|
23240
23276
|
worker_configuration=worker_configuration,
|
|
@@ -23283,6 +23319,7 @@ class GlueStartJobRun(
|
|
|
23283
23319
|
"timeout": "timeout",
|
|
23284
23320
|
"glue_job_name": "glueJobName",
|
|
23285
23321
|
"arguments": "arguments",
|
|
23322
|
+
"execution_class": "executionClass",
|
|
23286
23323
|
"notify_delay_after": "notifyDelayAfter",
|
|
23287
23324
|
"security_configuration": "securityConfiguration",
|
|
23288
23325
|
"worker_configuration": "workerConfiguration",
|
|
@@ -23306,6 +23343,7 @@ class GlueStartJobRunProps(_TaskStateBaseProps_3a62b6d0):
|
|
|
23306
23343
|
timeout: typing.Optional[_Duration_4839e8c3] = None,
|
|
23307
23344
|
glue_job_name: builtins.str,
|
|
23308
23345
|
arguments: typing.Optional[_TaskInput_91b91b91] = None,
|
|
23346
|
+
execution_class: typing.Optional[ExecutionClass] = None,
|
|
23309
23347
|
notify_delay_after: typing.Optional[_Duration_4839e8c3] = None,
|
|
23310
23348
|
security_configuration: typing.Optional[builtins.str] = None,
|
|
23311
23349
|
worker_configuration: typing.Optional[typing.Union["WorkerConfigurationProperty", typing.Dict[builtins.str, typing.Any]]] = None,
|
|
@@ -23326,6 +23364,7 @@ class GlueStartJobRunProps(_TaskStateBaseProps_3a62b6d0):
|
|
|
23326
23364
|
:param timeout: (deprecated) Timeout for the task. Default: - None
|
|
23327
23365
|
:param glue_job_name: Glue job name.
|
|
23328
23366
|
:param arguments: The job arguments specifically for this run. For this job run, they replace the default arguments set in the job definition itself. Default: - Default arguments set in the job definition
|
|
23367
|
+
:param execution_class: The excecution class of the job. Default: - STANDARD
|
|
23329
23368
|
:param notify_delay_after: After a job run starts, the number of minutes to wait before sending a job run delay notification. Must be at least 1 minute. Default: - Default delay set in the job definition
|
|
23330
23369
|
:param security_configuration: The name of the SecurityConfiguration structure to be used with this job run. This must match the Glue API Default: - Default configuration set in the job definition
|
|
23331
23370
|
:param worker_configuration: The worker configuration for this run. Default: - Default worker configuration in the job definition
|
|
@@ -23362,6 +23401,7 @@ class GlueStartJobRunProps(_TaskStateBaseProps_3a62b6d0):
|
|
|
23362
23401
|
check_type(argname="argument timeout", value=timeout, expected_type=type_hints["timeout"])
|
|
23363
23402
|
check_type(argname="argument glue_job_name", value=glue_job_name, expected_type=type_hints["glue_job_name"])
|
|
23364
23403
|
check_type(argname="argument arguments", value=arguments, expected_type=type_hints["arguments"])
|
|
23404
|
+
check_type(argname="argument execution_class", value=execution_class, expected_type=type_hints["execution_class"])
|
|
23365
23405
|
check_type(argname="argument notify_delay_after", value=notify_delay_after, expected_type=type_hints["notify_delay_after"])
|
|
23366
23406
|
check_type(argname="argument security_configuration", value=security_configuration, expected_type=type_hints["security_configuration"])
|
|
23367
23407
|
check_type(argname="argument worker_configuration", value=worker_configuration, expected_type=type_hints["worker_configuration"])
|
|
@@ -23394,6 +23434,8 @@ class GlueStartJobRunProps(_TaskStateBaseProps_3a62b6d0):
|
|
|
23394
23434
|
self._values["timeout"] = timeout
|
|
23395
23435
|
if arguments is not None:
|
|
23396
23436
|
self._values["arguments"] = arguments
|
|
23437
|
+
if execution_class is not None:
|
|
23438
|
+
self._values["execution_class"] = execution_class
|
|
23397
23439
|
if notify_delay_after is not None:
|
|
23398
23440
|
self._values["notify_delay_after"] = notify_delay_after
|
|
23399
23441
|
if security_configuration is not None:
|
|
@@ -23575,6 +23617,15 @@ class GlueStartJobRunProps(_TaskStateBaseProps_3a62b6d0):
|
|
|
23575
23617
|
result = self._values.get("arguments")
|
|
23576
23618
|
return typing.cast(typing.Optional[_TaskInput_91b91b91], result)
|
|
23577
23619
|
|
|
23620
|
+
@builtins.property
|
|
23621
|
+
def execution_class(self) -> typing.Optional[ExecutionClass]:
|
|
23622
|
+
'''The excecution class of the job.
|
|
23623
|
+
|
|
23624
|
+
:default: - STANDARD
|
|
23625
|
+
'''
|
|
23626
|
+
result = self._values.get("execution_class")
|
|
23627
|
+
return typing.cast(typing.Optional[ExecutionClass], result)
|
|
23628
|
+
|
|
23578
23629
|
@builtins.property
|
|
23579
23630
|
def notify_delay_after(self) -> typing.Optional[_Duration_4839e8c3]:
|
|
23580
23631
|
'''After a job run starts, the number of minutes to wait before sending a job run delay notification.
|
|
@@ -33102,6 +33153,8 @@ class WorkerType(enum.Enum):
|
|
|
33102
33153
|
|
|
33103
33154
|
STANDARD = "STANDARD"
|
|
33104
33155
|
'''Each worker provides 4 vCPU, 16 GB of memory and a 50GB disk, and 2 executors per worker.'''
|
|
33156
|
+
G_025X = "G_025X"
|
|
33157
|
+
'''Each worker maps to 0.25 DPU (2 vCPU, 4 GB of memory, 64 GB disk), and provides 1 executor per worker. Suitable for low volume streaming jobs.'''
|
|
33105
33158
|
G_1X = "G_1X"
|
|
33106
33159
|
'''Each worker maps to 1 DPU (4 vCPU, 16 GB of memory, 64 GB disk), and provides 1 executor per worker.
|
|
33107
33160
|
|
|
@@ -33122,8 +33175,6 @@ class WorkerType(enum.Enum):
|
|
|
33122
33175
|
|
|
33123
33176
|
We recommend this worker type for jobs whose workloads contain your most demanding transforms, aggregations, joins, and queries. This worker type is available only for AWS Glue version 3.0 or later jobs.
|
|
33124
33177
|
'''
|
|
33125
|
-
G_025X = "G_025X"
|
|
33126
|
-
'''Each worker maps to 0.25 DPU (2 vCPU, 4 GB of memory, 64 GB disk), and provides 1 executor per worker. Suitable for low volume streaming jobs.'''
|
|
33127
33178
|
Z_2X = "Z_2X"
|
|
33128
33179
|
'''Each worker maps to 2 high-memory DPU [M-DPU] (8 vCPU, 64 GB of memory, 128 GB disk).
|
|
33129
33180
|
|
|
@@ -33457,6 +33508,7 @@ __all__ = [
|
|
|
33457
33508
|
"EventBridgePutEvents",
|
|
33458
33509
|
"EventBridgePutEventsEntry",
|
|
33459
33510
|
"EventBridgePutEventsProps",
|
|
33511
|
+
"ExecutionClass",
|
|
33460
33512
|
"GlueDataBrewStartJobRun",
|
|
33461
33513
|
"GlueDataBrewStartJobRunProps",
|
|
33462
33514
|
"GlueStartCrawlerRun",
|
|
@@ -35687,6 +35739,7 @@ def _typecheckingstub__ca53b69e05a043466b0fb8d683b8908756bbb80a6167bf6e801b2cc4b
|
|
|
35687
35739
|
*,
|
|
35688
35740
|
glue_job_name: builtins.str,
|
|
35689
35741
|
arguments: typing.Optional[_TaskInput_91b91b91] = None,
|
|
35742
|
+
execution_class: typing.Optional[ExecutionClass] = None,
|
|
35690
35743
|
notify_delay_after: typing.Optional[_Duration_4839e8c3] = None,
|
|
35691
35744
|
security_configuration: typing.Optional[builtins.str] = None,
|
|
35692
35745
|
worker_configuration: typing.Optional[typing.Union[WorkerConfigurationProperty, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
@@ -35722,6 +35775,7 @@ def _typecheckingstub__6a5a6a067402f20efc3f218ecff8d7cae8c7206cf0bfb73907469d47f
|
|
|
35722
35775
|
timeout: typing.Optional[_Duration_4839e8c3] = None,
|
|
35723
35776
|
glue_job_name: builtins.str,
|
|
35724
35777
|
arguments: typing.Optional[_TaskInput_91b91b91] = None,
|
|
35778
|
+
execution_class: typing.Optional[ExecutionClass] = None,
|
|
35725
35779
|
notify_delay_after: typing.Optional[_Duration_4839e8c3] = None,
|
|
35726
35780
|
security_configuration: typing.Optional[builtins.str] = None,
|
|
35727
35781
|
worker_configuration: typing.Optional[typing.Union[WorkerConfigurationProperty, typing.Dict[builtins.str, typing.Any]]] = None,
|
aws_cdk/aws_transfer/__init__.py
CHANGED
|
@@ -3025,8 +3025,8 @@ class CfnServer(
|
|
|
3025
3025
|
|
|
3026
3026
|
It is used by actions that trigger a workflow to begin execution.
|
|
3027
3027
|
|
|
3028
|
-
:param on_partial_upload: A trigger that starts a workflow if a file is only partially uploaded. You can attach a workflow to a server that executes whenever there is a partial upload. A *partial upload* occurs when a file is open when the session disconnects.
|
|
3029
|
-
:param on_upload: A trigger that starts a workflow: the workflow begins to execute after a file is uploaded. To remove an associated workflow from a server, you can provide an empty ``OnUpload`` object, as in the following example. ``aws transfer update-server --server-id s-01234567890abcdef --workflow-details '{"OnUpload":[]}'``
|
|
3028
|
+
:param on_partial_upload: A trigger that starts a workflow if a file is only partially uploaded. You can attach a workflow to a server that executes whenever there is a partial upload. A *partial upload* occurs when a file is open when the session disconnects. .. epigraph:: ``OnPartialUpload`` can contain a maximum of one ``WorkflowDetail`` object.
|
|
3029
|
+
:param on_upload: A trigger that starts a workflow: the workflow begins to execute after a file is uploaded. To remove an associated workflow from a server, you can provide an empty ``OnUpload`` object, as in the following example. ``aws transfer update-server --server-id s-01234567890abcdef --workflow-details '{"OnUpload":[]}'`` .. epigraph:: ``OnUpload`` can contain a maximum of one ``WorkflowDetail`` object.
|
|
3030
3030
|
|
|
3031
3031
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-transfer-server-workflowdetails.html
|
|
3032
3032
|
:exampleMetadata: fixture=_generated
|
|
@@ -3067,6 +3067,9 @@ class CfnServer(
|
|
|
3067
3067
|
You can attach a workflow to a server that executes whenever there is a partial upload.
|
|
3068
3068
|
|
|
3069
3069
|
A *partial upload* occurs when a file is open when the session disconnects.
|
|
3070
|
+
.. epigraph::
|
|
3071
|
+
|
|
3072
|
+
``OnPartialUpload`` can contain a maximum of one ``WorkflowDetail`` object.
|
|
3070
3073
|
|
|
3071
3074
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-transfer-server-workflowdetails.html#cfn-transfer-server-workflowdetails-onpartialupload
|
|
3072
3075
|
'''
|
|
@@ -3082,6 +3085,9 @@ class CfnServer(
|
|
|
3082
3085
|
To remove an associated workflow from a server, you can provide an empty ``OnUpload`` object, as in the following example.
|
|
3083
3086
|
|
|
3084
3087
|
``aws transfer update-server --server-id s-01234567890abcdef --workflow-details '{"OnUpload":[]}'``
|
|
3088
|
+
.. epigraph::
|
|
3089
|
+
|
|
3090
|
+
``OnUpload`` can contain a maximum of one ``WorkflowDetail`` object.
|
|
3085
3091
|
|
|
3086
3092
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-transfer-server-workflowdetails.html#cfn-transfer-server-workflowdetails-onupload
|
|
3087
3093
|
'''
|
aws_cdk/aws_wafv2/__init__.py
CHANGED
|
@@ -4426,7 +4426,7 @@ class CfnRuleGroup(
|
|
|
4426
4426
|
:param body: Inspect the request body as plain text. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. AWS WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service only forwards the contents that are within the limit to AWS WAF for inspection. - For Application Load Balancer and AWS AppSync , the limit is fixed at 8 KB (8,192 bytes). - For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and you can increase the limit for each resource type in the web ACL ``AssociationConfig`` , for additional processing fees. For information about how to handle oversized request bodies, see the ``Body`` object configuration.
|
|
4427
4427
|
:param cookies: Inspect the request cookies. You must configure scope and pattern matching filters in the ``Cookies`` object, to define the set of cookies and the parts of the cookies that AWS WAF inspects. Only the first 8 KB (8192 bytes) of a request's cookies and only the first 200 cookies are forwarded to AWS WAF for inspection by the underlying host service. You must configure how to handle any oversize cookie content in the ``Cookies`` object. AWS WAF applies the pattern matching filters to the cookies that it receives from the underlying host service.
|
|
4428
4428
|
:param headers: Inspect the request headers. You must configure scope and pattern matching filters in the ``Headers`` object, to define the set of headers to and the parts of the headers that AWS WAF inspects. Only the first 8 KB (8192 bytes) of a request's headers and only the first 200 headers are forwarded to AWS WAF for inspection by the underlying host service. You must configure how to handle any oversize header content in the ``Headers`` object. AWS WAF applies the pattern matching filters to the headers that it receives from the underlying host service.
|
|
4429
|
-
:param ja3_fingerprint: Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information. .. epigraph:: You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` . You can obtain the JA3 fingerprint for client requests from the web ACL logs. If AWS WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see `Log fields <https://docs.aws.amazon.com/waf/latest/developerguide/logging-fields.html>`_ in the *AWS WAF Developer Guide* . Provide the JA3 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
|
|
4429
|
+
:param ja3_fingerprint: Available for use with Amazon CloudFront distributions and Application Load Balancers. Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information. .. epigraph:: You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` . You can obtain the JA3 fingerprint for client requests from the web ACL logs. If AWS WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see `Log fields <https://docs.aws.amazon.com/waf/latest/developerguide/logging-fields.html>`_ in the *AWS WAF Developer Guide* . Provide the JA3 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
|
|
4430
4430
|
:param json_body: Inspect the request body as JSON. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. AWS WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service only forwards the contents that are within the limit to AWS WAF for inspection. - For Application Load Balancer and AWS AppSync , the limit is fixed at 8 KB (8,192 bytes). - For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and you can increase the limit for each resource type in the web ACL ``AssociationConfig`` , for additional processing fees. For information about how to handle oversized request bodies, see the ``JsonBody`` object configuration.
|
|
4431
4431
|
:param method: Inspect the HTTP method. The method indicates the type of operation that the request is asking the origin to perform.
|
|
4432
4432
|
:param query_string: Inspect the query string. This is the part of a URL that appears after a ``?`` character, if any.
|
|
@@ -4595,9 +4595,9 @@ class CfnRuleGroup(
|
|
|
4595
4595
|
def ja3_fingerprint(
|
|
4596
4596
|
self,
|
|
4597
4597
|
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnRuleGroup.JA3FingerprintProperty"]]:
|
|
4598
|
-
'''
|
|
4598
|
+
'''Available for use with Amazon CloudFront distributions and Application Load Balancers.
|
|
4599
4599
|
|
|
4600
|
-
The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information.
|
|
4600
|
+
Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information.
|
|
4601
4601
|
.. epigraph::
|
|
4602
4602
|
|
|
4603
4603
|
You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` .
|
|
@@ -5390,9 +5390,9 @@ class CfnRuleGroup(
|
|
|
5390
5390
|
)
|
|
5391
5391
|
class JA3FingerprintProperty:
|
|
5392
5392
|
def __init__(self, *, fallback_behavior: builtins.str) -> None:
|
|
5393
|
-
'''
|
|
5393
|
+
'''Available for use with Amazon CloudFront distributions and Application Load Balancers.
|
|
5394
5394
|
|
|
5395
|
-
The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information.
|
|
5395
|
+
Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information.
|
|
5396
5396
|
.. epigraph::
|
|
5397
5397
|
|
|
5398
5398
|
You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` .
|
|
@@ -13906,7 +13906,7 @@ class CfnWebACL(
|
|
|
13906
13906
|
:param body: Inspect the request body as plain text. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. AWS WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service only forwards the contents that are within the limit to AWS WAF for inspection. - For Application Load Balancer and AWS AppSync , the limit is fixed at 8 KB (8,192 bytes). - For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and you can increase the limit for each resource type in the web ACL ``AssociationConfig`` , for additional processing fees. For information about how to handle oversized request bodies, see the ``Body`` object configuration.
|
|
13907
13907
|
:param cookies: Inspect the request cookies. You must configure scope and pattern matching filters in the ``Cookies`` object, to define the set of cookies and the parts of the cookies that AWS WAF inspects. Only the first 8 KB (8192 bytes) of a request's cookies and only the first 200 cookies are forwarded to AWS WAF for inspection by the underlying host service. You must configure how to handle any oversize cookie content in the ``Cookies`` object. AWS WAF applies the pattern matching filters to the cookies that it receives from the underlying host service.
|
|
13908
13908
|
:param headers: Inspect the request headers. You must configure scope and pattern matching filters in the ``Headers`` object, to define the set of headers to and the parts of the headers that AWS WAF inspects. Only the first 8 KB (8192 bytes) of a request's headers and only the first 200 headers are forwarded to AWS WAF for inspection by the underlying host service. You must configure how to handle any oversize header content in the ``Headers`` object. AWS WAF applies the pattern matching filters to the headers that it receives from the underlying host service.
|
|
13909
|
-
:param ja3_fingerprint: Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information. .. epigraph:: You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` . You can obtain the JA3 fingerprint for client requests from the web ACL logs. If AWS WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see `Log fields <https://docs.aws.amazon.com/waf/latest/developerguide/logging-fields.html>`_ in the *AWS WAF Developer Guide* . Provide the JA3 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
|
|
13909
|
+
:param ja3_fingerprint: Available for use with Amazon CloudFront distributions and Application Load Balancers. Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information. .. epigraph:: You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` . You can obtain the JA3 fingerprint for client requests from the web ACL logs. If AWS WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see `Log fields <https://docs.aws.amazon.com/waf/latest/developerguide/logging-fields.html>`_ in the *AWS WAF Developer Guide* . Provide the JA3 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
|
|
13910
13910
|
:param json_body: Inspect the request body as JSON. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. AWS WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service only forwards the contents that are within the limit to AWS WAF for inspection. - For Application Load Balancer and AWS AppSync , the limit is fixed at 8 KB (8,192 bytes). - For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and you can increase the limit for each resource type in the web ACL ``AssociationConfig`` , for additional processing fees. For information about how to handle oversized request bodies, see the ``JsonBody`` object configuration.
|
|
13911
13911
|
:param method: Inspect the HTTP method. The method indicates the type of operation that the request is asking the origin to perform.
|
|
13912
13912
|
:param query_string: Inspect the query string. This is the part of a URL that appears after a ``?`` character, if any.
|
|
@@ -14075,9 +14075,9 @@ class CfnWebACL(
|
|
|
14075
14075
|
def ja3_fingerprint(
|
|
14076
14076
|
self,
|
|
14077
14077
|
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnWebACL.JA3FingerprintProperty"]]:
|
|
14078
|
-
'''
|
|
14078
|
+
'''Available for use with Amazon CloudFront distributions and Application Load Balancers.
|
|
14079
14079
|
|
|
14080
|
-
The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information.
|
|
14080
|
+
Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information.
|
|
14081
14081
|
.. epigraph::
|
|
14082
14082
|
|
|
14083
14083
|
You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` .
|
|
@@ -14870,9 +14870,9 @@ class CfnWebACL(
|
|
|
14870
14870
|
)
|
|
14871
14871
|
class JA3FingerprintProperty:
|
|
14872
14872
|
def __init__(self, *, fallback_behavior: builtins.str) -> None:
|
|
14873
|
-
'''
|
|
14873
|
+
'''Available for use with Amazon CloudFront distributions and Application Load Balancers.
|
|
14874
14874
|
|
|
14875
|
-
The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information.
|
|
14875
|
+
Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information.
|
|
14876
14876
|
.. epigraph::
|
|
14877
14877
|
|
|
14878
14878
|
You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` .
|
|
@@ -1157,7 +1157,7 @@ class CfnNetworkSettings(
|
|
|
1157
1157
|
|
|
1158
1158
|
The VPC must have default tenancy. VPCs with dedicated tenancy are not supported.
|
|
1159
1159
|
|
|
1160
|
-
For availability consideration, you must have at least two subnets created in two different Availability Zones. WorkSpaces
|
|
1160
|
+
For availability consideration, you must have at least two subnets created in two different Availability Zones. WorkSpaces Secure Browser is available in a subset of the Availability Zones for each supported Region. For more information, see `Supported Availability Zones <https://docs.aws.amazon.com/workspaces-web/latest/adminguide/availability-zones.html>`_ .
|
|
1161
1161
|
|
|
1162
1162
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-workspacesweb-networksettings.html
|
|
1163
1163
|
:cloudformationResource: AWS::WorkSpacesWeb::NetworkSettings
|
|
@@ -1457,7 +1457,7 @@ class CfnPortal(
|
|
|
1457
1457
|
|
|
1458
1458
|
A ``Standard`` web portal can't start browsing sessions unless you have at defined and associated an ``IdentityProvider`` and ``NetworkSettings`` resource. An ``IAM Identity Center`` web portal does not require an ``IdentityProvider`` resource.
|
|
1459
1459
|
|
|
1460
|
-
For more information about web portals, see `What is Amazon WorkSpaces
|
|
1460
|
+
For more information about web portals, see `What is Amazon WorkSpaces Secure Browser? <https://docs.aws.amazon.com/workspaces-web/latest/adminguide/what-is-workspaces-web.html.html>`_ .
|
|
1461
1461
|
|
|
1462
1462
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-workspacesweb-portal.html
|
|
1463
1463
|
:cloudformationResource: AWS::WorkSpacesWeb::Portal
|
|
@@ -1514,7 +1514,7 @@ class CfnPortal(
|
|
|
1514
1514
|
:param scope: Scope in which this resource is defined.
|
|
1515
1515
|
:param id: Construct identifier for this resource (unique in its scope).
|
|
1516
1516
|
:param additional_encryption_context: The additional encryption context of the portal.
|
|
1517
|
-
:param authentication_type: The type of authentication integration points used when signing into the web portal. Defaults to ``Standard`` . ``Standard`` web portals are authenticated directly through your identity provider (IdP). User and group access to your web portal is controlled through your IdP. You need to include an IdP resource in your template to integrate your IdP with your web portal. Completing the configuration for your IdP requires exchanging WorkSpaces
|
|
1517
|
+
:param authentication_type: The type of authentication integration points used when signing into the web portal. Defaults to ``Standard`` . ``Standard`` web portals are authenticated directly through your identity provider (IdP). User and group access to your web portal is controlled through your IdP. You need to include an IdP resource in your template to integrate your IdP with your web portal. Completing the configuration for your IdP requires exchanging WorkSpaces Secure Browser’s SP metadata with your IdP’s IdP metadata. If your IdP requires the SP metadata first before returning the IdP metadata, you should follow these steps: 1. Create and deploy a CloudFormation template with a ``Standard`` portal with no ``IdentityProvider`` resource. 2. Retrieve the SP metadata using ``Fn:GetAtt`` , the WorkSpaces Secure Browser console, or by the calling the ``GetPortalServiceProviderMetadata`` API. 3. Submit the data to your IdP. 4. Add an ``IdentityProvider`` resource to your CloudFormation template. ``IAM Identity Center`` web portals are authenticated through AWS IAM Identity Center . They provide additional features, such as IdP-initiated authentication. Identity sources (including external identity provider integration) and other identity provider information must be configured in IAM Identity Center . User and group assignment must be done through the WorkSpaces Secure Browser console. These cannot be configured in CloudFormation.
|
|
1518
1518
|
:param browser_settings_arn: The ARN of the browser settings that is associated with this web portal.
|
|
1519
1519
|
:param customer_managed_key: The customer managed key of the web portal. *Pattern* : ``^arn:[\\w+=\\/,.@-]+:kms:[a-zA-Z0-9\\-]*:[a-zA-Z0-9]{1,12}:key\\/[a-zA-Z0-9-]+$``
|
|
1520
1520
|
:param display_name: The name of the web portal.
|
|
@@ -1883,7 +1883,7 @@ class CfnPortalProps:
|
|
|
1883
1883
|
'''Properties for defining a ``CfnPortal``.
|
|
1884
1884
|
|
|
1885
1885
|
:param additional_encryption_context: The additional encryption context of the portal.
|
|
1886
|
-
:param authentication_type: The type of authentication integration points used when signing into the web portal. Defaults to ``Standard`` . ``Standard`` web portals are authenticated directly through your identity provider (IdP). User and group access to your web portal is controlled through your IdP. You need to include an IdP resource in your template to integrate your IdP with your web portal. Completing the configuration for your IdP requires exchanging WorkSpaces
|
|
1886
|
+
:param authentication_type: The type of authentication integration points used when signing into the web portal. Defaults to ``Standard`` . ``Standard`` web portals are authenticated directly through your identity provider (IdP). User and group access to your web portal is controlled through your IdP. You need to include an IdP resource in your template to integrate your IdP with your web portal. Completing the configuration for your IdP requires exchanging WorkSpaces Secure Browser’s SP metadata with your IdP’s IdP metadata. If your IdP requires the SP metadata first before returning the IdP metadata, you should follow these steps: 1. Create and deploy a CloudFormation template with a ``Standard`` portal with no ``IdentityProvider`` resource. 2. Retrieve the SP metadata using ``Fn:GetAtt`` , the WorkSpaces Secure Browser console, or by the calling the ``GetPortalServiceProviderMetadata`` API. 3. Submit the data to your IdP. 4. Add an ``IdentityProvider`` resource to your CloudFormation template. ``IAM Identity Center`` web portals are authenticated through AWS IAM Identity Center . They provide additional features, such as IdP-initiated authentication. Identity sources (including external identity provider integration) and other identity provider information must be configured in IAM Identity Center . User and group assignment must be done through the WorkSpaces Secure Browser console. These cannot be configured in CloudFormation.
|
|
1887
1887
|
:param browser_settings_arn: The ARN of the browser settings that is associated with this web portal.
|
|
1888
1888
|
:param customer_managed_key: The customer managed key of the web portal. *Pattern* : ``^arn:[\\w+=\\/,.@-]+:kms:[a-zA-Z0-9\\-]*:[a-zA-Z0-9]{1,12}:key\\/[a-zA-Z0-9-]+$``
|
|
1889
1889
|
:param display_name: The name of the web portal.
|
|
@@ -1984,14 +1984,14 @@ class CfnPortalProps:
|
|
|
1984
1984
|
def authentication_type(self) -> typing.Optional[builtins.str]:
|
|
1985
1985
|
'''The type of authentication integration points used when signing into the web portal. Defaults to ``Standard`` .
|
|
1986
1986
|
|
|
1987
|
-
``Standard`` web portals are authenticated directly through your identity provider (IdP). User and group access to your web portal is controlled through your IdP. You need to include an IdP resource in your template to integrate your IdP with your web portal. Completing the configuration for your IdP requires exchanging WorkSpaces
|
|
1987
|
+
``Standard`` web portals are authenticated directly through your identity provider (IdP). User and group access to your web portal is controlled through your IdP. You need to include an IdP resource in your template to integrate your IdP with your web portal. Completing the configuration for your IdP requires exchanging WorkSpaces Secure Browser’s SP metadata with your IdP’s IdP metadata. If your IdP requires the SP metadata first before returning the IdP metadata, you should follow these steps:
|
|
1988
1988
|
|
|
1989
1989
|
1. Create and deploy a CloudFormation template with a ``Standard`` portal with no ``IdentityProvider`` resource.
|
|
1990
|
-
2. Retrieve the SP metadata using ``Fn:GetAtt`` , the WorkSpaces
|
|
1990
|
+
2. Retrieve the SP metadata using ``Fn:GetAtt`` , the WorkSpaces Secure Browser console, or by the calling the ``GetPortalServiceProviderMetadata`` API.
|
|
1991
1991
|
3. Submit the data to your IdP.
|
|
1992
1992
|
4. Add an ``IdentityProvider`` resource to your CloudFormation template.
|
|
1993
1993
|
|
|
1994
|
-
``IAM Identity Center`` web portals are authenticated through AWS IAM Identity Center . They provide additional features, such as IdP-initiated authentication. Identity sources (including external identity provider integration) and other identity provider information must be configured in IAM Identity Center . User and group assignment must be done through the WorkSpaces
|
|
1994
|
+
``IAM Identity Center`` web portals are authenticated through AWS IAM Identity Center . They provide additional features, such as IdP-initiated authentication. Identity sources (including external identity provider integration) and other identity provider information must be configured in IAM Identity Center . User and group assignment must be done through the WorkSpaces Secure Browser console. These cannot be configured in CloudFormation.
|
|
1995
1995
|
|
|
1996
1996
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-workspacesweb-portal.html#cfn-workspacesweb-portal-authenticationtype
|
|
1997
1997
|
'''
|
|
@@ -2339,7 +2339,7 @@ class CfnUserAccessLoggingSettings(
|
|
|
2339
2339
|
):
|
|
2340
2340
|
'''This resource specifies user access logging settings that can be associated with a web portal.
|
|
2341
2341
|
|
|
2342
|
-
In order to receive logs from WorkSpaces
|
|
2342
|
+
In order to receive logs from WorkSpaces Secure Browser, you must have an Amazon Kinesis Data Stream that starts with "amazon-workspaces-web-*". Your Amazon Kinesis data stream must either have server-side encryption turned off, or must use AWS managed keys for server-side encryption.
|
|
2343
2343
|
|
|
2344
2344
|
For more information about setting server-side encryption in Amazon Kinesis , see `How Do I Get Started with Server-Side Encryption? <https://docs.aws.amazon.com/streams/latest/dev/getting-started-with-sse.html>`_ .
|
|
2345
2345
|
|