aws-cdk-lib 2.146.0__py3-none-any.whl → 2.147.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk-lib might be problematic. Click here for more details.

Files changed (68) hide show
  1. aws_cdk/__init__.py +11 -12
  2. aws_cdk/_jsii/__init__.py +1 -1
  3. aws_cdk/_jsii/{aws-cdk-lib@2.146.0.jsii.tgz → aws-cdk-lib@2.147.1.jsii.tgz} +0 -0
  4. aws_cdk/aws_apigateway/__init__.py +32 -12
  5. aws_cdk/aws_apigatewayv2/__init__.py +48 -2
  6. aws_cdk/aws_apigatewayv2_integrations/__init__.py +142 -4
  7. aws_cdk/aws_appconfig/__init__.py +8 -4
  8. aws_cdk/aws_applicationsignals/__init__.py +1766 -0
  9. aws_cdk/aws_auditmanager/__init__.py +5 -1
  10. aws_cdk/aws_autoscaling/__init__.py +65 -20
  11. aws_cdk/aws_batch/__init__.py +215 -0
  12. aws_cdk/aws_bedrock/__init__.py +272 -103
  13. aws_cdk/aws_cloudformation/__init__.py +5 -11
  14. aws_cdk/aws_cloudfront/__init__.py +10 -3
  15. aws_cdk/aws_cloudtrail/__init__.py +56 -2
  16. aws_cdk/aws_codebuild/__init__.py +62 -29
  17. aws_cdk/aws_codepipeline/__init__.py +10 -5
  18. aws_cdk/aws_datazone/__init__.py +80 -68
  19. aws_cdk/aws_deadline/__init__.py +603 -17
  20. aws_cdk/aws_ec2/__init__.py +237 -112
  21. aws_cdk/aws_ecs/__init__.py +20 -18
  22. aws_cdk/aws_eks/__init__.py +15 -9
  23. aws_cdk/aws_elasticloadbalancingv2/__init__.py +11 -5
  24. aws_cdk/aws_emrserverless/__init__.py +5 -5
  25. aws_cdk/aws_events/__init__.py +36 -16
  26. aws_cdk/aws_fsx/__init__.py +126 -21
  27. aws_cdk/aws_globalaccelerator/__init__.py +2 -1
  28. aws_cdk/aws_globalaccelerator_endpoints/__init__.py +35 -4
  29. aws_cdk/aws_glue/__init__.py +26 -0
  30. aws_cdk/aws_grafana/__init__.py +4 -4
  31. aws_cdk/aws_groundstation/__init__.py +55 -35
  32. aws_cdk/aws_guardduty/__init__.py +826 -0
  33. aws_cdk/aws_iot/__init__.py +3 -3
  34. aws_cdk/aws_lambda/__init__.py +7 -5
  35. aws_cdk/aws_lightsail/__init__.py +1 -1
  36. aws_cdk/aws_location/__init__.py +10 -11
  37. aws_cdk/aws_mediapackagev2/__init__.py +38 -20
  38. aws_cdk/aws_mediatailor/__init__.py +2 -2
  39. aws_cdk/aws_msk/__init__.py +4 -4
  40. aws_cdk/aws_mwaa/__init__.py +16 -8
  41. aws_cdk/aws_nimblestudio/__init__.py +9 -9
  42. aws_cdk/aws_opensearchservice/__init__.py +5 -4
  43. aws_cdk/aws_opsworks/__init__.py +3 -3
  44. aws_cdk/aws_osis/__init__.py +33 -4
  45. aws_cdk/aws_pipes/__init__.py +97 -45
  46. aws_cdk/aws_quicksight/__init__.py +23 -21
  47. aws_cdk/aws_rds/__init__.py +43 -11
  48. aws_cdk/aws_refactorspaces/__init__.py +3 -3
  49. aws_cdk/aws_rolesanywhere/__init__.py +21 -14
  50. aws_cdk/aws_route53/__init__.py +3 -3
  51. aws_cdk/aws_sagemaker/__init__.py +5 -2
  52. aws_cdk/aws_securityhub/__init__.py +163 -78
  53. aws_cdk/aws_securitylake/__init__.py +7 -5
  54. aws_cdk/aws_ses/__init__.py +117 -0
  55. aws_cdk/aws_simspaceweaver/__init__.py +2 -2
  56. aws_cdk/aws_sns/__init__.py +6 -4
  57. aws_cdk/aws_sqs/__init__.py +3 -3
  58. aws_cdk/aws_stepfunctions/__init__.py +51 -28
  59. aws_cdk/aws_stepfunctions_tasks/__init__.py +56 -2
  60. aws_cdk/aws_transfer/__init__.py +8 -2
  61. aws_cdk/aws_wafv2/__init__.py +10 -10
  62. aws_cdk/aws_workspacesweb/__init__.py +8 -8
  63. {aws_cdk_lib-2.146.0.dist-info → aws_cdk_lib-2.147.1.dist-info}/METADATA +1 -1
  64. {aws_cdk_lib-2.146.0.dist-info → aws_cdk_lib-2.147.1.dist-info}/RECORD +68 -67
  65. {aws_cdk_lib-2.146.0.dist-info → aws_cdk_lib-2.147.1.dist-info}/LICENSE +0 -0
  66. {aws_cdk_lib-2.146.0.dist-info → aws_cdk_lib-2.147.1.dist-info}/NOTICE +0 -0
  67. {aws_cdk_lib-2.146.0.dist-info → aws_cdk_lib-2.147.1.dist-info}/WHEEL +0 -0
  68. {aws_cdk_lib-2.146.0.dist-info → aws_cdk_lib-2.147.1.dist-info}/top_level.txt +0 -0
@@ -1163,6 +1163,15 @@ tasks.GlueStartJobRun(self, "Task",
1163
1163
  )
1164
1164
  ```
1165
1165
 
1166
+ You can choose the execution class by setting the `executionClass` property.
1167
+
1168
+ ```python
1169
+ tasks.GlueStartJobRun(self, "Task",
1170
+ glue_job_name="my-glue-job",
1171
+ execution_class=tasks.ExecutionClass.FLEX
1172
+ )
1173
+ ```
1174
+
1166
1175
  ### StartCrawlerRun
1167
1176
 
1168
1177
  You can call the [`StartCrawler`](https://docs.aws.amazon.com/glue/latest/dg/aws-glue-api-crawler-crawling.html#aws-glue-api-crawler-crawling-StartCrawler) API from a `Task` state through AWS SDK service integrations.
@@ -22406,6 +22415,30 @@ class EventBridgePutEventsProps(_TaskStateBaseProps_3a62b6d0):
22406
22415
  )
22407
22416
 
22408
22417
 
22418
+ @jsii.enum(jsii_type="aws-cdk-lib.aws_stepfunctions_tasks.ExecutionClass")
22419
+ class ExecutionClass(enum.Enum):
22420
+ '''The excecution class of the job.
22421
+
22422
+ :exampleMetadata: infused
22423
+
22424
+ Example::
22425
+
22426
+ tasks.GlueStartJobRun(self, "Task",
22427
+ glue_job_name="my-glue-job",
22428
+ execution_class=tasks.ExecutionClass.FLEX
22429
+ )
22430
+ '''
22431
+
22432
+ FLEX = "FLEX"
22433
+ '''The flexible execution class is appropriate for time-insensitive jobs whose start and completion times may vary.
22434
+
22435
+ Only jobs with AWS Glue version 3.0 and above and command type ``glueetl`` will be allowed to set ``ExecutionClass`` to ``FLEX``.
22436
+ The flexible execution class is available for Spark jobs.
22437
+ '''
22438
+ STANDARD = "STANDARD"
22439
+ '''The standard execution class is ideal for time-sensitive workloads that require fast job startup and dedicated resources.'''
22440
+
22441
+
22409
22442
  class GlueDataBrewStartJobRun(
22410
22443
  _TaskStateBase_b5c0a816,
22411
22444
  metaclass=jsii.JSIIMeta,
@@ -23191,6 +23224,7 @@ class GlueStartJobRun(
23191
23224
  *,
23192
23225
  glue_job_name: builtins.str,
23193
23226
  arguments: typing.Optional[_TaskInput_91b91b91] = None,
23227
+ execution_class: typing.Optional[ExecutionClass] = None,
23194
23228
  notify_delay_after: typing.Optional[_Duration_4839e8c3] = None,
23195
23229
  security_configuration: typing.Optional[builtins.str] = None,
23196
23230
  worker_configuration: typing.Optional[typing.Union["WorkerConfigurationProperty", typing.Dict[builtins.str, typing.Any]]] = None,
@@ -23212,6 +23246,7 @@ class GlueStartJobRun(
23212
23246
  :param id: Descriptive identifier for this chainable.
23213
23247
  :param glue_job_name: Glue job name.
23214
23248
  :param arguments: The job arguments specifically for this run. For this job run, they replace the default arguments set in the job definition itself. Default: - Default arguments set in the job definition
23249
+ :param execution_class: The excecution class of the job. Default: - STANDARD
23215
23250
  :param notify_delay_after: After a job run starts, the number of minutes to wait before sending a job run delay notification. Must be at least 1 minute. Default: - Default delay set in the job definition
23216
23251
  :param security_configuration: The name of the SecurityConfiguration structure to be used with this job run. This must match the Glue API Default: - Default configuration set in the job definition
23217
23252
  :param worker_configuration: The worker configuration for this run. Default: - Default worker configuration in the job definition
@@ -23235,6 +23270,7 @@ class GlueStartJobRun(
23235
23270
  props = GlueStartJobRunProps(
23236
23271
  glue_job_name=glue_job_name,
23237
23272
  arguments=arguments,
23273
+ execution_class=execution_class,
23238
23274
  notify_delay_after=notify_delay_after,
23239
23275
  security_configuration=security_configuration,
23240
23276
  worker_configuration=worker_configuration,
@@ -23283,6 +23319,7 @@ class GlueStartJobRun(
23283
23319
  "timeout": "timeout",
23284
23320
  "glue_job_name": "glueJobName",
23285
23321
  "arguments": "arguments",
23322
+ "execution_class": "executionClass",
23286
23323
  "notify_delay_after": "notifyDelayAfter",
23287
23324
  "security_configuration": "securityConfiguration",
23288
23325
  "worker_configuration": "workerConfiguration",
@@ -23306,6 +23343,7 @@ class GlueStartJobRunProps(_TaskStateBaseProps_3a62b6d0):
23306
23343
  timeout: typing.Optional[_Duration_4839e8c3] = None,
23307
23344
  glue_job_name: builtins.str,
23308
23345
  arguments: typing.Optional[_TaskInput_91b91b91] = None,
23346
+ execution_class: typing.Optional[ExecutionClass] = None,
23309
23347
  notify_delay_after: typing.Optional[_Duration_4839e8c3] = None,
23310
23348
  security_configuration: typing.Optional[builtins.str] = None,
23311
23349
  worker_configuration: typing.Optional[typing.Union["WorkerConfigurationProperty", typing.Dict[builtins.str, typing.Any]]] = None,
@@ -23326,6 +23364,7 @@ class GlueStartJobRunProps(_TaskStateBaseProps_3a62b6d0):
23326
23364
  :param timeout: (deprecated) Timeout for the task. Default: - None
23327
23365
  :param glue_job_name: Glue job name.
23328
23366
  :param arguments: The job arguments specifically for this run. For this job run, they replace the default arguments set in the job definition itself. Default: - Default arguments set in the job definition
23367
+ :param execution_class: The excecution class of the job. Default: - STANDARD
23329
23368
  :param notify_delay_after: After a job run starts, the number of minutes to wait before sending a job run delay notification. Must be at least 1 minute. Default: - Default delay set in the job definition
23330
23369
  :param security_configuration: The name of the SecurityConfiguration structure to be used with this job run. This must match the Glue API Default: - Default configuration set in the job definition
23331
23370
  :param worker_configuration: The worker configuration for this run. Default: - Default worker configuration in the job definition
@@ -23362,6 +23401,7 @@ class GlueStartJobRunProps(_TaskStateBaseProps_3a62b6d0):
23362
23401
  check_type(argname="argument timeout", value=timeout, expected_type=type_hints["timeout"])
23363
23402
  check_type(argname="argument glue_job_name", value=glue_job_name, expected_type=type_hints["glue_job_name"])
23364
23403
  check_type(argname="argument arguments", value=arguments, expected_type=type_hints["arguments"])
23404
+ check_type(argname="argument execution_class", value=execution_class, expected_type=type_hints["execution_class"])
23365
23405
  check_type(argname="argument notify_delay_after", value=notify_delay_after, expected_type=type_hints["notify_delay_after"])
23366
23406
  check_type(argname="argument security_configuration", value=security_configuration, expected_type=type_hints["security_configuration"])
23367
23407
  check_type(argname="argument worker_configuration", value=worker_configuration, expected_type=type_hints["worker_configuration"])
@@ -23394,6 +23434,8 @@ class GlueStartJobRunProps(_TaskStateBaseProps_3a62b6d0):
23394
23434
  self._values["timeout"] = timeout
23395
23435
  if arguments is not None:
23396
23436
  self._values["arguments"] = arguments
23437
+ if execution_class is not None:
23438
+ self._values["execution_class"] = execution_class
23397
23439
  if notify_delay_after is not None:
23398
23440
  self._values["notify_delay_after"] = notify_delay_after
23399
23441
  if security_configuration is not None:
@@ -23575,6 +23617,15 @@ class GlueStartJobRunProps(_TaskStateBaseProps_3a62b6d0):
23575
23617
  result = self._values.get("arguments")
23576
23618
  return typing.cast(typing.Optional[_TaskInput_91b91b91], result)
23577
23619
 
23620
+ @builtins.property
23621
+ def execution_class(self) -> typing.Optional[ExecutionClass]:
23622
+ '''The excecution class of the job.
23623
+
23624
+ :default: - STANDARD
23625
+ '''
23626
+ result = self._values.get("execution_class")
23627
+ return typing.cast(typing.Optional[ExecutionClass], result)
23628
+
23578
23629
  @builtins.property
23579
23630
  def notify_delay_after(self) -> typing.Optional[_Duration_4839e8c3]:
23580
23631
  '''After a job run starts, the number of minutes to wait before sending a job run delay notification.
@@ -33102,6 +33153,8 @@ class WorkerType(enum.Enum):
33102
33153
 
33103
33154
  STANDARD = "STANDARD"
33104
33155
  '''Each worker provides 4 vCPU, 16 GB of memory and a 50GB disk, and 2 executors per worker.'''
33156
+ G_025X = "G_025X"
33157
+ '''Each worker maps to 0.25 DPU (2 vCPU, 4 GB of memory, 64 GB disk), and provides 1 executor per worker. Suitable for low volume streaming jobs.'''
33105
33158
  G_1X = "G_1X"
33106
33159
  '''Each worker maps to 1 DPU (4 vCPU, 16 GB of memory, 64 GB disk), and provides 1 executor per worker.
33107
33160
 
@@ -33122,8 +33175,6 @@ class WorkerType(enum.Enum):
33122
33175
 
33123
33176
  We recommend this worker type for jobs whose workloads contain your most demanding transforms, aggregations, joins, and queries. This worker type is available only for AWS Glue version 3.0 or later jobs.
33124
33177
  '''
33125
- G_025X = "G_025X"
33126
- '''Each worker maps to 0.25 DPU (2 vCPU, 4 GB of memory, 64 GB disk), and provides 1 executor per worker. Suitable for low volume streaming jobs.'''
33127
33178
  Z_2X = "Z_2X"
33128
33179
  '''Each worker maps to 2 high-memory DPU [M-DPU] (8 vCPU, 64 GB of memory, 128 GB disk).
33129
33180
 
@@ -33457,6 +33508,7 @@ __all__ = [
33457
33508
  "EventBridgePutEvents",
33458
33509
  "EventBridgePutEventsEntry",
33459
33510
  "EventBridgePutEventsProps",
33511
+ "ExecutionClass",
33460
33512
  "GlueDataBrewStartJobRun",
33461
33513
  "GlueDataBrewStartJobRunProps",
33462
33514
  "GlueStartCrawlerRun",
@@ -35687,6 +35739,7 @@ def _typecheckingstub__ca53b69e05a043466b0fb8d683b8908756bbb80a6167bf6e801b2cc4b
35687
35739
  *,
35688
35740
  glue_job_name: builtins.str,
35689
35741
  arguments: typing.Optional[_TaskInput_91b91b91] = None,
35742
+ execution_class: typing.Optional[ExecutionClass] = None,
35690
35743
  notify_delay_after: typing.Optional[_Duration_4839e8c3] = None,
35691
35744
  security_configuration: typing.Optional[builtins.str] = None,
35692
35745
  worker_configuration: typing.Optional[typing.Union[WorkerConfigurationProperty, typing.Dict[builtins.str, typing.Any]]] = None,
@@ -35722,6 +35775,7 @@ def _typecheckingstub__6a5a6a067402f20efc3f218ecff8d7cae8c7206cf0bfb73907469d47f
35722
35775
  timeout: typing.Optional[_Duration_4839e8c3] = None,
35723
35776
  glue_job_name: builtins.str,
35724
35777
  arguments: typing.Optional[_TaskInput_91b91b91] = None,
35778
+ execution_class: typing.Optional[ExecutionClass] = None,
35725
35779
  notify_delay_after: typing.Optional[_Duration_4839e8c3] = None,
35726
35780
  security_configuration: typing.Optional[builtins.str] = None,
35727
35781
  worker_configuration: typing.Optional[typing.Union[WorkerConfigurationProperty, typing.Dict[builtins.str, typing.Any]]] = None,
@@ -3025,8 +3025,8 @@ class CfnServer(
3025
3025
 
3026
3026
  It is used by actions that trigger a workflow to begin execution.
3027
3027
 
3028
- :param on_partial_upload: A trigger that starts a workflow if a file is only partially uploaded. You can attach a workflow to a server that executes whenever there is a partial upload. A *partial upload* occurs when a file is open when the session disconnects.
3029
- :param on_upload: A trigger that starts a workflow: the workflow begins to execute after a file is uploaded. To remove an associated workflow from a server, you can provide an empty ``OnUpload`` object, as in the following example. ``aws transfer update-server --server-id s-01234567890abcdef --workflow-details '{"OnUpload":[]}'``
3028
+ :param on_partial_upload: A trigger that starts a workflow if a file is only partially uploaded. You can attach a workflow to a server that executes whenever there is a partial upload. A *partial upload* occurs when a file is open when the session disconnects. .. epigraph:: ``OnPartialUpload`` can contain a maximum of one ``WorkflowDetail`` object.
3029
+ :param on_upload: A trigger that starts a workflow: the workflow begins to execute after a file is uploaded. To remove an associated workflow from a server, you can provide an empty ``OnUpload`` object, as in the following example. ``aws transfer update-server --server-id s-01234567890abcdef --workflow-details '{"OnUpload":[]}'`` .. epigraph:: ``OnUpload`` can contain a maximum of one ``WorkflowDetail`` object.
3030
3030
 
3031
3031
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-transfer-server-workflowdetails.html
3032
3032
  :exampleMetadata: fixture=_generated
@@ -3067,6 +3067,9 @@ class CfnServer(
3067
3067
  You can attach a workflow to a server that executes whenever there is a partial upload.
3068
3068
 
3069
3069
  A *partial upload* occurs when a file is open when the session disconnects.
3070
+ .. epigraph::
3071
+
3072
+ ``OnPartialUpload`` can contain a maximum of one ``WorkflowDetail`` object.
3070
3073
 
3071
3074
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-transfer-server-workflowdetails.html#cfn-transfer-server-workflowdetails-onpartialupload
3072
3075
  '''
@@ -3082,6 +3085,9 @@ class CfnServer(
3082
3085
  To remove an associated workflow from a server, you can provide an empty ``OnUpload`` object, as in the following example.
3083
3086
 
3084
3087
  ``aws transfer update-server --server-id s-01234567890abcdef --workflow-details '{"OnUpload":[]}'``
3088
+ .. epigraph::
3089
+
3090
+ ``OnUpload`` can contain a maximum of one ``WorkflowDetail`` object.
3085
3091
 
3086
3092
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-transfer-server-workflowdetails.html#cfn-transfer-server-workflowdetails-onupload
3087
3093
  '''
@@ -4426,7 +4426,7 @@ class CfnRuleGroup(
4426
4426
  :param body: Inspect the request body as plain text. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. AWS WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service only forwards the contents that are within the limit to AWS WAF for inspection. - For Application Load Balancer and AWS AppSync , the limit is fixed at 8 KB (8,192 bytes). - For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and you can increase the limit for each resource type in the web ACL ``AssociationConfig`` , for additional processing fees. For information about how to handle oversized request bodies, see the ``Body`` object configuration.
4427
4427
  :param cookies: Inspect the request cookies. You must configure scope and pattern matching filters in the ``Cookies`` object, to define the set of cookies and the parts of the cookies that AWS WAF inspects. Only the first 8 KB (8192 bytes) of a request's cookies and only the first 200 cookies are forwarded to AWS WAF for inspection by the underlying host service. You must configure how to handle any oversize cookie content in the ``Cookies`` object. AWS WAF applies the pattern matching filters to the cookies that it receives from the underlying host service.
4428
4428
  :param headers: Inspect the request headers. You must configure scope and pattern matching filters in the ``Headers`` object, to define the set of headers to and the parts of the headers that AWS WAF inspects. Only the first 8 KB (8192 bytes) of a request's headers and only the first 200 headers are forwarded to AWS WAF for inspection by the underlying host service. You must configure how to handle any oversize header content in the ``Headers`` object. AWS WAF applies the pattern matching filters to the headers that it receives from the underlying host service.
4429
- :param ja3_fingerprint: Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information. .. epigraph:: You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` . You can obtain the JA3 fingerprint for client requests from the web ACL logs. If AWS WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see `Log fields <https://docs.aws.amazon.com/waf/latest/developerguide/logging-fields.html>`_ in the *AWS WAF Developer Guide* . Provide the JA3 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
4429
+ :param ja3_fingerprint: Available for use with Amazon CloudFront distributions and Application Load Balancers. Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information. .. epigraph:: You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` . You can obtain the JA3 fingerprint for client requests from the web ACL logs. If AWS WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see `Log fields <https://docs.aws.amazon.com/waf/latest/developerguide/logging-fields.html>`_ in the *AWS WAF Developer Guide* . Provide the JA3 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
4430
4430
  :param json_body: Inspect the request body as JSON. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. AWS WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service only forwards the contents that are within the limit to AWS WAF for inspection. - For Application Load Balancer and AWS AppSync , the limit is fixed at 8 KB (8,192 bytes). - For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and you can increase the limit for each resource type in the web ACL ``AssociationConfig`` , for additional processing fees. For information about how to handle oversized request bodies, see the ``JsonBody`` object configuration.
4431
4431
  :param method: Inspect the HTTP method. The method indicates the type of operation that the request is asking the origin to perform.
4432
4432
  :param query_string: Inspect the query string. This is the part of a URL that appears after a ``?`` character, if any.
@@ -4595,9 +4595,9 @@ class CfnRuleGroup(
4595
4595
  def ja3_fingerprint(
4596
4596
  self,
4597
4597
  ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnRuleGroup.JA3FingerprintProperty"]]:
4598
- '''Match against the request's JA3 fingerprint.
4598
+ '''Available for use with Amazon CloudFront distributions and Application Load Balancers.
4599
4599
 
4600
- The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information.
4600
+ Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information.
4601
4601
  .. epigraph::
4602
4602
 
4603
4603
  You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` .
@@ -5390,9 +5390,9 @@ class CfnRuleGroup(
5390
5390
  )
5391
5391
  class JA3FingerprintProperty:
5392
5392
  def __init__(self, *, fallback_behavior: builtins.str) -> None:
5393
- '''Match against the request's JA3 fingerprint.
5393
+ '''Available for use with Amazon CloudFront distributions and Application Load Balancers.
5394
5394
 
5395
- The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information.
5395
+ Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information.
5396
5396
  .. epigraph::
5397
5397
 
5398
5398
  You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` .
@@ -13906,7 +13906,7 @@ class CfnWebACL(
13906
13906
  :param body: Inspect the request body as plain text. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. AWS WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service only forwards the contents that are within the limit to AWS WAF for inspection. - For Application Load Balancer and AWS AppSync , the limit is fixed at 8 KB (8,192 bytes). - For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and you can increase the limit for each resource type in the web ACL ``AssociationConfig`` , for additional processing fees. For information about how to handle oversized request bodies, see the ``Body`` object configuration.
13907
13907
  :param cookies: Inspect the request cookies. You must configure scope and pattern matching filters in the ``Cookies`` object, to define the set of cookies and the parts of the cookies that AWS WAF inspects. Only the first 8 KB (8192 bytes) of a request's cookies and only the first 200 cookies are forwarded to AWS WAF for inspection by the underlying host service. You must configure how to handle any oversize cookie content in the ``Cookies`` object. AWS WAF applies the pattern matching filters to the cookies that it receives from the underlying host service.
13908
13908
  :param headers: Inspect the request headers. You must configure scope and pattern matching filters in the ``Headers`` object, to define the set of headers to and the parts of the headers that AWS WAF inspects. Only the first 8 KB (8192 bytes) of a request's headers and only the first 200 headers are forwarded to AWS WAF for inspection by the underlying host service. You must configure how to handle any oversize header content in the ``Headers`` object. AWS WAF applies the pattern matching filters to the headers that it receives from the underlying host service.
13909
- :param ja3_fingerprint: Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information. .. epigraph:: You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` . You can obtain the JA3 fingerprint for client requests from the web ACL logs. If AWS WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see `Log fields <https://docs.aws.amazon.com/waf/latest/developerguide/logging-fields.html>`_ in the *AWS WAF Developer Guide* . Provide the JA3 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
13909
+ :param ja3_fingerprint: Available for use with Amazon CloudFront distributions and Application Load Balancers. Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information. .. epigraph:: You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` . You can obtain the JA3 fingerprint for client requests from the web ACL logs. If AWS WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see `Log fields <https://docs.aws.amazon.com/waf/latest/developerguide/logging-fields.html>`_ in the *AWS WAF Developer Guide* . Provide the JA3 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
13910
13910
  :param json_body: Inspect the request body as JSON. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. AWS WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service only forwards the contents that are within the limit to AWS WAF for inspection. - For Application Load Balancer and AWS AppSync , the limit is fixed at 8 KB (8,192 bytes). - For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and you can increase the limit for each resource type in the web ACL ``AssociationConfig`` , for additional processing fees. For information about how to handle oversized request bodies, see the ``JsonBody`` object configuration.
13911
13911
  :param method: Inspect the HTTP method. The method indicates the type of operation that the request is asking the origin to perform.
13912
13912
  :param query_string: Inspect the query string. This is the part of a URL that appears after a ``?`` character, if any.
@@ -14075,9 +14075,9 @@ class CfnWebACL(
14075
14075
  def ja3_fingerprint(
14076
14076
  self,
14077
14077
  ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnWebACL.JA3FingerprintProperty"]]:
14078
- '''Match against the request's JA3 fingerprint.
14078
+ '''Available for use with Amazon CloudFront distributions and Application Load Balancers.
14079
14079
 
14080
- The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information.
14080
+ Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information.
14081
14081
  .. epigraph::
14082
14082
 
14083
14083
  You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` .
@@ -14870,9 +14870,9 @@ class CfnWebACL(
14870
14870
  )
14871
14871
  class JA3FingerprintProperty:
14872
14872
  def __init__(self, *, fallback_behavior: builtins.str) -> None:
14873
- '''Match against the request's JA3 fingerprint.
14873
+ '''Available for use with Amazon CloudFront distributions and Application Load Balancers.
14874
14874
 
14875
- The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information.
14875
+ Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information.
14876
14876
  .. epigraph::
14877
14877
 
14878
14878
  You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` .
@@ -1157,7 +1157,7 @@ class CfnNetworkSettings(
1157
1157
 
1158
1158
  The VPC must have default tenancy. VPCs with dedicated tenancy are not supported.
1159
1159
 
1160
- For availability consideration, you must have at least two subnets created in two different Availability Zones. WorkSpaces Web is available in a subset of the Availability Zones for each supported Region. For more information, see `Supported Availability Zones <https://docs.aws.amazon.com/workspaces-web/latest/adminguide/availability-zones.html>`_ .
1160
+ For availability consideration, you must have at least two subnets created in two different Availability Zones. WorkSpaces Secure Browser is available in a subset of the Availability Zones for each supported Region. For more information, see `Supported Availability Zones <https://docs.aws.amazon.com/workspaces-web/latest/adminguide/availability-zones.html>`_ .
1161
1161
 
1162
1162
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-workspacesweb-networksettings.html
1163
1163
  :cloudformationResource: AWS::WorkSpacesWeb::NetworkSettings
@@ -1457,7 +1457,7 @@ class CfnPortal(
1457
1457
 
1458
1458
  A ``Standard`` web portal can't start browsing sessions unless you have at defined and associated an ``IdentityProvider`` and ``NetworkSettings`` resource. An ``IAM Identity Center`` web portal does not require an ``IdentityProvider`` resource.
1459
1459
 
1460
- For more information about web portals, see `What is Amazon WorkSpaces Web? <https://docs.aws.amazon.com/workspaces-web/latest/adminguide/what-is-workspaces-web.html.html>`_ .
1460
+ For more information about web portals, see `What is Amazon WorkSpaces Secure Browser? <https://docs.aws.amazon.com/workspaces-web/latest/adminguide/what-is-workspaces-web.html.html>`_ .
1461
1461
 
1462
1462
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-workspacesweb-portal.html
1463
1463
  :cloudformationResource: AWS::WorkSpacesWeb::Portal
@@ -1514,7 +1514,7 @@ class CfnPortal(
1514
1514
  :param scope: Scope in which this resource is defined.
1515
1515
  :param id: Construct identifier for this resource (unique in its scope).
1516
1516
  :param additional_encryption_context: The additional encryption context of the portal.
1517
- :param authentication_type: The type of authentication integration points used when signing into the web portal. Defaults to ``Standard`` . ``Standard`` web portals are authenticated directly through your identity provider (IdP). User and group access to your web portal is controlled through your IdP. You need to include an IdP resource in your template to integrate your IdP with your web portal. Completing the configuration for your IdP requires exchanging WorkSpaces Web’s SP metadata with your IdP’s IdP metadata. If your IdP requires the SP metadata first before returning the IdP metadata, you should follow these steps: 1. Create and deploy a CloudFormation template with a ``Standard`` portal with no ``IdentityProvider`` resource. 2. Retrieve the SP metadata using ``Fn:GetAtt`` , the WorkSpaces Web console, or by the calling the ``GetPortalServiceProviderMetadata`` API. 3. Submit the data to your IdP. 4. Add an ``IdentityProvider`` resource to your CloudFormation template. ``IAM Identity Center`` web portals are authenticated through AWS IAM Identity Center . They provide additional features, such as IdP-initiated authentication. Identity sources (including external identity provider integration) and other identity provider information must be configured in IAM Identity Center . User and group assignment must be done through the WorkSpaces Web console. These cannot be configured in CloudFormation.
1517
+ :param authentication_type: The type of authentication integration points used when signing into the web portal. Defaults to ``Standard`` . ``Standard`` web portals are authenticated directly through your identity provider (IdP). User and group access to your web portal is controlled through your IdP. You need to include an IdP resource in your template to integrate your IdP with your web portal. Completing the configuration for your IdP requires exchanging WorkSpaces Secure Browser’s SP metadata with your IdP’s IdP metadata. If your IdP requires the SP metadata first before returning the IdP metadata, you should follow these steps: 1. Create and deploy a CloudFormation template with a ``Standard`` portal with no ``IdentityProvider`` resource. 2. Retrieve the SP metadata using ``Fn:GetAtt`` , the WorkSpaces Secure Browser console, or by the calling the ``GetPortalServiceProviderMetadata`` API. 3. Submit the data to your IdP. 4. Add an ``IdentityProvider`` resource to your CloudFormation template. ``IAM Identity Center`` web portals are authenticated through AWS IAM Identity Center . They provide additional features, such as IdP-initiated authentication. Identity sources (including external identity provider integration) and other identity provider information must be configured in IAM Identity Center . User and group assignment must be done through the WorkSpaces Secure Browser console. These cannot be configured in CloudFormation.
1518
1518
  :param browser_settings_arn: The ARN of the browser settings that is associated with this web portal.
1519
1519
  :param customer_managed_key: The customer managed key of the web portal. *Pattern* : ``^arn:[\\w+=\\/,.@-]+:kms:[a-zA-Z0-9\\-]*:[a-zA-Z0-9]{1,12}:key\\/[a-zA-Z0-9-]+$``
1520
1520
  :param display_name: The name of the web portal.
@@ -1883,7 +1883,7 @@ class CfnPortalProps:
1883
1883
  '''Properties for defining a ``CfnPortal``.
1884
1884
 
1885
1885
  :param additional_encryption_context: The additional encryption context of the portal.
1886
- :param authentication_type: The type of authentication integration points used when signing into the web portal. Defaults to ``Standard`` . ``Standard`` web portals are authenticated directly through your identity provider (IdP). User and group access to your web portal is controlled through your IdP. You need to include an IdP resource in your template to integrate your IdP with your web portal. Completing the configuration for your IdP requires exchanging WorkSpaces Web’s SP metadata with your IdP’s IdP metadata. If your IdP requires the SP metadata first before returning the IdP metadata, you should follow these steps: 1. Create and deploy a CloudFormation template with a ``Standard`` portal with no ``IdentityProvider`` resource. 2. Retrieve the SP metadata using ``Fn:GetAtt`` , the WorkSpaces Web console, or by the calling the ``GetPortalServiceProviderMetadata`` API. 3. Submit the data to your IdP. 4. Add an ``IdentityProvider`` resource to your CloudFormation template. ``IAM Identity Center`` web portals are authenticated through AWS IAM Identity Center . They provide additional features, such as IdP-initiated authentication. Identity sources (including external identity provider integration) and other identity provider information must be configured in IAM Identity Center . User and group assignment must be done through the WorkSpaces Web console. These cannot be configured in CloudFormation.
1886
+ :param authentication_type: The type of authentication integration points used when signing into the web portal. Defaults to ``Standard`` . ``Standard`` web portals are authenticated directly through your identity provider (IdP). User and group access to your web portal is controlled through your IdP. You need to include an IdP resource in your template to integrate your IdP with your web portal. Completing the configuration for your IdP requires exchanging WorkSpaces Secure Browser’s SP metadata with your IdP’s IdP metadata. If your IdP requires the SP metadata first before returning the IdP metadata, you should follow these steps: 1. Create and deploy a CloudFormation template with a ``Standard`` portal with no ``IdentityProvider`` resource. 2. Retrieve the SP metadata using ``Fn:GetAtt`` , the WorkSpaces Secure Browser console, or by the calling the ``GetPortalServiceProviderMetadata`` API. 3. Submit the data to your IdP. 4. Add an ``IdentityProvider`` resource to your CloudFormation template. ``IAM Identity Center`` web portals are authenticated through AWS IAM Identity Center . They provide additional features, such as IdP-initiated authentication. Identity sources (including external identity provider integration) and other identity provider information must be configured in IAM Identity Center . User and group assignment must be done through the WorkSpaces Secure Browser console. These cannot be configured in CloudFormation.
1887
1887
  :param browser_settings_arn: The ARN of the browser settings that is associated with this web portal.
1888
1888
  :param customer_managed_key: The customer managed key of the web portal. *Pattern* : ``^arn:[\\w+=\\/,.@-]+:kms:[a-zA-Z0-9\\-]*:[a-zA-Z0-9]{1,12}:key\\/[a-zA-Z0-9-]+$``
1889
1889
  :param display_name: The name of the web portal.
@@ -1984,14 +1984,14 @@ class CfnPortalProps:
1984
1984
  def authentication_type(self) -> typing.Optional[builtins.str]:
1985
1985
  '''The type of authentication integration points used when signing into the web portal. Defaults to ``Standard`` .
1986
1986
 
1987
- ``Standard`` web portals are authenticated directly through your identity provider (IdP). User and group access to your web portal is controlled through your IdP. You need to include an IdP resource in your template to integrate your IdP with your web portal. Completing the configuration for your IdP requires exchanging WorkSpaces Web’s SP metadata with your IdP’s IdP metadata. If your IdP requires the SP metadata first before returning the IdP metadata, you should follow these steps:
1987
+ ``Standard`` web portals are authenticated directly through your identity provider (IdP). User and group access to your web portal is controlled through your IdP. You need to include an IdP resource in your template to integrate your IdP with your web portal. Completing the configuration for your IdP requires exchanging WorkSpaces Secure Browser’s SP metadata with your IdP’s IdP metadata. If your IdP requires the SP metadata first before returning the IdP metadata, you should follow these steps:
1988
1988
 
1989
1989
  1. Create and deploy a CloudFormation template with a ``Standard`` portal with no ``IdentityProvider`` resource.
1990
- 2. Retrieve the SP metadata using ``Fn:GetAtt`` , the WorkSpaces Web console, or by the calling the ``GetPortalServiceProviderMetadata`` API.
1990
+ 2. Retrieve the SP metadata using ``Fn:GetAtt`` , the WorkSpaces Secure Browser console, or by the calling the ``GetPortalServiceProviderMetadata`` API.
1991
1991
  3. Submit the data to your IdP.
1992
1992
  4. Add an ``IdentityProvider`` resource to your CloudFormation template.
1993
1993
 
1994
- ``IAM Identity Center`` web portals are authenticated through AWS IAM Identity Center . They provide additional features, such as IdP-initiated authentication. Identity sources (including external identity provider integration) and other identity provider information must be configured in IAM Identity Center . User and group assignment must be done through the WorkSpaces Web console. These cannot be configured in CloudFormation.
1994
+ ``IAM Identity Center`` web portals are authenticated through AWS IAM Identity Center . They provide additional features, such as IdP-initiated authentication. Identity sources (including external identity provider integration) and other identity provider information must be configured in IAM Identity Center . User and group assignment must be done through the WorkSpaces Secure Browser console. These cannot be configured in CloudFormation.
1995
1995
 
1996
1996
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-workspacesweb-portal.html#cfn-workspacesweb-portal-authenticationtype
1997
1997
  '''
@@ -2339,7 +2339,7 @@ class CfnUserAccessLoggingSettings(
2339
2339
  ):
2340
2340
  '''This resource specifies user access logging settings that can be associated with a web portal.
2341
2341
 
2342
- In order to receive logs from WorkSpaces Web, you must have an Amazon Kinesis Data Stream that starts with "amazon-workspaces-web-*". Your Amazon Kinesis data stream must either have server-side encryption turned off, or must use AWS managed keys for server-side encryption.
2342
+ In order to receive logs from WorkSpaces Secure Browser, you must have an Amazon Kinesis Data Stream that starts with "amazon-workspaces-web-*". Your Amazon Kinesis data stream must either have server-side encryption turned off, or must use AWS managed keys for server-side encryption.
2343
2343
 
2344
2344
  For more information about setting server-side encryption in Amazon Kinesis , see `How Do I Get Started with Server-Side Encryption? <https://docs.aws.amazon.com/streams/latest/dev/getting-started-with-sse.html>`_ .
2345
2345
 
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: aws-cdk-lib
3
- Version: 2.146.0
3
+ Version: 2.147.1
4
4
  Summary: Version 2 of the AWS Cloud Development Kit library
5
5
  Home-page: https://github.com/aws/aws-cdk
6
6
  Author: Amazon Web Services