aws-cdk-lib 2.152.0__py3-none-any.whl → 2.154.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk-lib might be problematic. Click here for more details.

Files changed (269) hide show
  1. aws_cdk/__init__.py +157 -215
  2. aws_cdk/_jsii/__init__.py +2 -1
  3. aws_cdk/_jsii/{aws-cdk-lib@2.152.0.jsii.tgz → aws-cdk-lib@2.154.0.jsii.tgz} +0 -0
  4. aws_cdk/alexa_ask/__init__.py +3 -3
  5. aws_cdk/aws_accessanalyzer/__init__.py +5 -5
  6. aws_cdk/aws_acmpca/__init__.py +79 -24
  7. aws_cdk/aws_amazonmq/__init__.py +161 -161
  8. aws_cdk/aws_amplify/__init__.py +36 -36
  9. aws_cdk/aws_amplifyuibuilder/__init__.py +32 -32
  10. aws_cdk/aws_apigateway/__init__.py +122 -122
  11. aws_cdk/aws_apigatewayv2/__init__.py +135 -121
  12. aws_cdk/aws_apigatewayv2_integrations/__init__.py +12 -12
  13. aws_cdk/aws_appconfig/__init__.py +59 -59
  14. aws_cdk/aws_appflow/__init__.py +20 -20
  15. aws_cdk/aws_appintegrations/__init__.py +19 -19
  16. aws_cdk/aws_applicationautoscaling/__init__.py +31 -16
  17. aws_cdk/aws_applicationinsights/__init__.py +11 -11
  18. aws_cdk/aws_applicationsignals/__init__.py +5 -5
  19. aws_cdk/aws_appmesh/__init__.py +35 -35
  20. aws_cdk/aws_apprunner/__init__.py +25 -25
  21. aws_cdk/aws_appstream/__init__.py +105 -105
  22. aws_cdk/aws_appsync/__init__.py +89 -89
  23. aws_cdk/aws_apptest/__init__.py +25 -25
  24. aws_cdk/aws_aps/__init__.py +14 -14
  25. aws_cdk/aws_arczonalshift/__init__.py +200 -3
  26. aws_cdk/aws_athena/__init__.py +25 -25
  27. aws_cdk/aws_auditmanager/__init__.py +15 -15
  28. aws_cdk/aws_autoscaling/__init__.py +84 -84
  29. aws_cdk/aws_autoscalingplans/__init__.py +2 -2
  30. aws_cdk/aws_b2bi/__init__.py +24 -24
  31. aws_cdk/aws_backup/__init__.py +33 -33
  32. aws_cdk/aws_backupgateway/__init__.py +7 -7
  33. aws_cdk/aws_batch/__init__.py +289 -35
  34. aws_cdk/aws_bcmdataexports/__init__.py +2 -2
  35. aws_cdk/aws_bedrock/__init__.py +13239 -3277
  36. aws_cdk/aws_billingconductor/__init__.py +28 -28
  37. aws_cdk/aws_budgets/__init__.py +12 -12
  38. aws_cdk/aws_cassandra/__init__.py +16 -16
  39. aws_cdk/aws_ce/__init__.py +17 -17
  40. aws_cdk/aws_certificatemanager/__init__.py +9 -9
  41. aws_cdk/aws_chatbot/__init__.py +22 -22
  42. aws_cdk/aws_cleanrooms/__init__.py +2470 -307
  43. aws_cdk/aws_cleanroomsml/__init__.py +5 -5
  44. aws_cdk/aws_cloud9/__init__.py +10 -10
  45. aws_cdk/aws_cloudformation/__init__.py +94 -69
  46. aws_cdk/aws_cloudfront/__init__.py +31 -30
  47. aws_cdk/aws_cloudfront/experimental/__init__.py +23 -0
  48. aws_cdk/aws_cloudtrail/__init__.py +46 -44
  49. aws_cdk/aws_cloudwatch/__init__.py +61 -69
  50. aws_cdk/aws_codeartifact/__init__.py +19 -19
  51. aws_cdk/aws_codebuild/__init__.py +60 -68
  52. aws_cdk/aws_codecommit/__init__.py +10 -6
  53. aws_cdk/aws_codeconnections/__init__.py +5 -5
  54. aws_cdk/aws_codedeploy/__init__.py +28 -28
  55. aws_cdk/aws_codeguruprofiler/__init__.py +5 -5
  56. aws_cdk/aws_codegurureviewer/__init__.py +6 -6
  57. aws_cdk/aws_codepipeline/__init__.py +849 -52
  58. aws_cdk/aws_codepipeline_actions/__init__.py +1 -1
  59. aws_cdk/aws_codestar/__init__.py +8 -8
  60. aws_cdk/aws_codestarconnections/__init__.py +17 -17
  61. aws_cdk/aws_codestarnotifications/__init__.py +10 -10
  62. aws_cdk/aws_cognito/__init__.py +465 -133
  63. aws_cdk/aws_comprehend/__init__.py +20 -20
  64. aws_cdk/aws_config/__init__.py +67 -67
  65. aws_cdk/aws_connect/__init__.py +139 -137
  66. aws_cdk/aws_connectcampaigns/__init__.py +5 -5
  67. aws_cdk/aws_controltower/__init__.py +12 -12
  68. aws_cdk/aws_cur/__init__.py +12 -12
  69. aws_cdk/aws_customerprofiles/__init__.py +36 -36
  70. aws_cdk/aws_databrew/__init__.py +45 -45
  71. aws_cdk/aws_datapipeline/__init__.py +12 -8
  72. aws_cdk/aws_datasync/__init__.py +119 -117
  73. aws_cdk/aws_datazone/__init__.py +63 -63
  74. aws_cdk/aws_dax/__init__.py +20 -20
  75. aws_cdk/aws_deadline/__init__.py +221 -292
  76. aws_cdk/aws_detective/__init__.py +8 -8
  77. aws_cdk/aws_devicefarm/__init__.py +37 -37
  78. aws_cdk/aws_devopsguru/__init__.py +2 -2
  79. aws_cdk/aws_directoryservice/__init__.py +15 -15
  80. aws_cdk/aws_dlm/__init__.py +12 -12
  81. aws_cdk/aws_dms/__init__.py +300 -298
  82. aws_cdk/aws_docdb/__init__.py +49 -49
  83. aws_cdk/aws_docdbelastic/__init__.py +14 -14
  84. aws_cdk/aws_dynamodb/__init__.py +371 -37
  85. aws_cdk/aws_ec2/__init__.py +900 -606
  86. aws_cdk/aws_ecr/__init__.py +117 -77
  87. aws_cdk/aws_ecr_assets/__init__.py +4 -4
  88. aws_cdk/aws_ecs/__init__.py +190 -191
  89. aws_cdk/aws_ecs_patterns/__init__.py +2 -2
  90. aws_cdk/aws_efs/__init__.py +22 -22
  91. aws_cdk/aws_eks/__init__.py +177 -61
  92. aws_cdk/aws_elasticache/__init__.py +218 -226
  93. aws_cdk/aws_elasticbeanstalk/__init__.py +25 -25
  94. aws_cdk/aws_elasticloadbalancing/__init__.py +16 -16
  95. aws_cdk/aws_elasticloadbalancingv2/__init__.py +1066 -102
  96. aws_cdk/aws_elasticloadbalancingv2_targets/__init__.py +86 -4
  97. aws_cdk/aws_elasticsearch/__init__.py +16 -16
  98. aws_cdk/aws_emr/__init__.py +74 -74
  99. aws_cdk/aws_emrcontainers/__init__.py +3 -3
  100. aws_cdk/aws_emrserverless/__init__.py +157 -14
  101. aws_cdk/aws_entityresolution/__init__.py +613 -35
  102. aws_cdk/aws_events/__init__.py +42 -42
  103. aws_cdk/aws_eventschemas/__init__.py +16 -16
  104. aws_cdk/aws_evidently/__init__.py +38 -38
  105. aws_cdk/aws_finspace/__init__.py +8 -8
  106. aws_cdk/aws_fis/__init__.py +12 -12
  107. aws_cdk/aws_fms/__init__.py +21 -21
  108. aws_cdk/aws_forecast/__init__.py +18 -11
  109. aws_cdk/aws_frauddetector/__init__.py +35 -35
  110. aws_cdk/aws_fsx/__init__.py +35 -35
  111. aws_cdk/aws_gamelift/__init__.py +103 -103
  112. aws_cdk/aws_globalaccelerator/__init__.py +46 -24
  113. aws_cdk/aws_glue/__init__.py +132 -139
  114. aws_cdk/aws_grafana/__init__.py +17 -17
  115. aws_cdk/aws_greengrass/__init__.py +48 -48
  116. aws_cdk/aws_greengrassv2/__init__.py +10 -10
  117. aws_cdk/aws_groundstation/__init__.py +16 -16
  118. aws_cdk/aws_guardduty/__init__.py +40 -38
  119. aws_cdk/aws_healthimaging/__init__.py +3 -3
  120. aws_cdk/aws_healthlake/__init__.py +6 -6
  121. aws_cdk/aws_iam/__init__.py +120 -122
  122. aws_cdk/aws_identitystore/__init__.py +6 -6
  123. aws_cdk/aws_imagebuilder/__init__.py +92 -92
  124. aws_cdk/aws_inspector/__init__.py +8 -8
  125. aws_cdk/aws_inspectorv2/__init__.py +102 -97
  126. aws_cdk/aws_internetmonitor/__init__.py +12 -12
  127. aws_cdk/aws_iot/__init__.py +141 -141
  128. aws_cdk/aws_iot1click/__init__.py +9 -9
  129. aws_cdk/aws_iotanalytics/__init__.py +21 -21
  130. aws_cdk/aws_iotcoredeviceadvisor/__init__.py +2 -2
  131. aws_cdk/aws_iotevents/__init__.py +20 -20
  132. aws_cdk/aws_iotfleethub/__init__.py +4 -4
  133. aws_cdk/aws_iotfleetwise/__init__.py +45 -45
  134. aws_cdk/aws_iotsitewise/__init__.py +40 -40
  135. aws_cdk/aws_iotthingsgraph/__init__.py +2 -2
  136. aws_cdk/aws_iottwinmaker/__init__.py +34 -34
  137. aws_cdk/aws_iotwireless/__init__.py +66 -66
  138. aws_cdk/aws_ivs/__init__.py +32 -32
  139. aws_cdk/aws_ivschat/__init__.py +9 -9
  140. aws_cdk/aws_kafkaconnect/__init__.py +22 -22
  141. aws_cdk/aws_kendra/__init__.py +28 -28
  142. aws_cdk/aws_kendraranking/__init__.py +4 -4
  143. aws_cdk/aws_kinesis/__init__.py +8 -8
  144. aws_cdk/aws_kinesisanalytics/__init__.py +23 -23
  145. aws_cdk/aws_kinesisanalyticsv2/__init__.py +15 -15
  146. aws_cdk/aws_kinesisfirehose/__init__.py +677 -18
  147. aws_cdk/aws_kinesisvideo/__init__.py +10 -10
  148. aws_cdk/aws_kms/__init__.py +20 -20
  149. aws_cdk/aws_lakeformation/__init__.py +36 -36
  150. aws_cdk/aws_lambda/__init__.py +435 -227
  151. aws_cdk/aws_lambda_nodejs/__init__.py +23 -0
  152. aws_cdk/aws_launchwizard/__init__.py +508 -0
  153. aws_cdk/aws_lex/__init__.py +24 -24
  154. aws_cdk/aws_licensemanager/__init__.py +17 -17
  155. aws_cdk/aws_lightsail/__init__.py +90 -90
  156. aws_cdk/aws_location/__init__.py +41 -41
  157. aws_cdk/aws_logs/__init__.py +50 -50
  158. aws_cdk/aws_lookoutequipment/__init__.py +9 -9
  159. aws_cdk/aws_lookoutmetrics/__init__.py +10 -10
  160. aws_cdk/aws_lookoutvision/__init__.py +1 -1
  161. aws_cdk/aws_m2/__init__.py +20 -20
  162. aws_cdk/aws_macie/__init__.py +19 -19
  163. aws_cdk/aws_managedblockchain/__init__.py +10 -10
  164. aws_cdk/aws_mediaconnect/__init__.py +114 -77
  165. aws_cdk/aws_mediaconvert/__init__.py +20 -20
  166. aws_cdk/aws_medialive/__init__.py +44 -76
  167. aws_cdk/aws_mediapackage/__init__.py +38 -38
  168. aws_cdk/aws_mediapackagev2/__init__.py +178 -25
  169. aws_cdk/aws_mediastore/__init__.py +7 -7
  170. aws_cdk/aws_mediatailor/__init__.py +40 -40
  171. aws_cdk/aws_memorydb/__init__.py +41 -41
  172. aws_cdk/aws_msk/__init__.py +39 -39
  173. aws_cdk/aws_mwaa/__init__.py +25 -25
  174. aws_cdk/aws_neptune/__init__.py +55 -55
  175. aws_cdk/aws_neptunegraph/__init__.py +11 -11
  176. aws_cdk/aws_networkfirewall/__init__.py +36 -30
  177. aws_cdk/aws_networkmanager/__init__.py +1062 -91
  178. aws_cdk/aws_nimblestudio/__init__.py +31 -31
  179. aws_cdk/aws_oam/__init__.py +8 -8
  180. aws_cdk/aws_omics/__init__.py +36 -36
  181. aws_cdk/aws_opensearchserverless/__init__.py +25 -25
  182. aws_cdk/aws_opensearchservice/__init__.py +20 -20
  183. aws_cdk/aws_opsworks/__init__.py +87 -87
  184. aws_cdk/aws_opsworkscm/__init__.py +21 -21
  185. aws_cdk/aws_organizations/__init__.py +17 -17
  186. aws_cdk/aws_osis/__init__.py +122 -9
  187. aws_cdk/aws_panorama/__init__.py +27 -22
  188. aws_cdk/aws_paymentcryptography/__init__.py +7 -7
  189. aws_cdk/aws_pcaconnectorad/__init__.py +17 -17
  190. aws_cdk/aws_personalize/__init__.py +19 -19
  191. aws_cdk/aws_pinpoint/__init__.py +122 -122
  192. aws_cdk/aws_pinpointemail/__init__.py +16 -16
  193. aws_cdk/aws_pipes/__init__.py +14 -16
  194. aws_cdk/aws_proton/__init__.py +19 -19
  195. aws_cdk/aws_qbusiness/__init__.py +160 -45
  196. aws_cdk/aws_qldb/__init__.py +12 -12
  197. aws_cdk/aws_quicksight/__init__.py +91 -91
  198. aws_cdk/aws_ram/__init__.py +11 -11
  199. aws_cdk/aws_rds/__init__.py +365 -259
  200. aws_cdk/aws_redshift/__init__.py +136 -91
  201. aws_cdk/aws_redshiftserverless/__init__.py +27 -27
  202. aws_cdk/aws_refactorspaces/__init__.py +26 -26
  203. aws_cdk/aws_rekognition/__init__.py +16 -16
  204. aws_cdk/aws_resiliencehub/__init__.py +15 -15
  205. aws_cdk/aws_resourceexplorer2/__init__.py +8 -8
  206. aws_cdk/aws_resourcegroups/__init__.py +6 -6
  207. aws_cdk/aws_robomaker/__init__.py +25 -25
  208. aws_cdk/aws_rolesanywhere/__init__.py +67 -19
  209. aws_cdk/aws_route53/__init__.py +36 -36
  210. aws_cdk/aws_route53profiles/__init__.py +11 -11
  211. aws_cdk/aws_route53recoverycontrol/__init__.py +14 -14
  212. aws_cdk/aws_route53recoveryreadiness/__init__.py +13 -13
  213. aws_cdk/aws_route53resolver/__init__.py +123 -82
  214. aws_cdk/aws_rum/__init__.py +6 -6
  215. aws_cdk/aws_s3/__init__.py +136 -80
  216. aws_cdk/aws_s3_deployment/__init__.py +30 -24
  217. aws_cdk/aws_s3_notifications/__init__.py +3 -4
  218. aws_cdk/aws_s3express/__init__.py +5 -5
  219. aws_cdk/aws_s3objectlambda/__init__.py +6 -6
  220. aws_cdk/aws_s3outposts/__init__.py +16 -16
  221. aws_cdk/aws_sagemaker/__init__.py +2412 -280
  222. aws_cdk/aws_sam/__init__.py +101 -101
  223. aws_cdk/aws_scheduler/__init__.py +13 -13
  224. aws_cdk/aws_sdb/__init__.py +1 -1
  225. aws_cdk/aws_secretsmanager/__init__.py +20 -19
  226. aws_cdk/aws_securityhub/__init__.py +70 -57
  227. aws_cdk/aws_securitylake/__init__.py +341 -16
  228. aws_cdk/aws_servicecatalog/__init__.py +87 -87
  229. aws_cdk/aws_servicecatalogappregistry/__init__.py +12 -12
  230. aws_cdk/aws_servicediscovery/__init__.py +23 -23
  231. aws_cdk/aws_ses/__init__.py +12038 -5604
  232. aws_cdk/aws_shield/__init__.py +15 -15
  233. aws_cdk/aws_signer/__init__.py +9 -9
  234. aws_cdk/aws_simspaceweaver/__init__.py +5 -5
  235. aws_cdk/aws_sns/__init__.py +28 -28
  236. aws_cdk/aws_sqs/__init__.py +20 -20
  237. aws_cdk/aws_ssm/__init__.py +172 -101
  238. aws_cdk/aws_ssmcontacts/__init__.py +18 -18
  239. aws_cdk/aws_ssmincidents/__init__.py +11 -11
  240. aws_cdk/aws_sso/__init__.py +31 -31
  241. aws_cdk/aws_stepfunctions/__init__.py +370 -28
  242. aws_cdk/aws_supportapp/__init__.py +11 -11
  243. aws_cdk/aws_synthetics/__init__.py +18 -18
  244. aws_cdk/aws_systemsmanagersap/__init__.py +48 -7
  245. aws_cdk/aws_timestream/__init__.py +34 -34
  246. aws_cdk/aws_transfer/__init__.py +57 -57
  247. aws_cdk/aws_verifiedpermissions/__init__.py +11 -11
  248. aws_cdk/aws_voiceid/__init__.py +4 -4
  249. aws_cdk/aws_vpclattice/__init__.py +42 -42
  250. aws_cdk/aws_waf/__init__.py +17 -17
  251. aws_cdk/aws_wafregional/__init__.py +28 -28
  252. aws_cdk/aws_wafv2/__init__.py +39 -39
  253. aws_cdk/aws_wisdom/__init__.py +16 -16
  254. aws_cdk/aws_workspaces/__init__.py +18 -18
  255. aws_cdk/aws_workspacesthinclient/__init__.py +63 -9
  256. aws_cdk/aws_workspacesweb/__init__.py +87 -46
  257. aws_cdk/aws_xray/__init__.py +12 -12
  258. aws_cdk/cloud_assembly_schema/__init__.py +348 -239
  259. aws_cdk/custom_resources/__init__.py +283 -0
  260. aws_cdk/cx_api/__init__.py +15 -15
  261. aws_cdk/pipelines/__init__.py +172 -237
  262. aws_cdk/triggers/__init__.py +23 -0
  263. {aws_cdk_lib-2.152.0.dist-info → aws_cdk_lib-2.154.0.dist-info}/METADATA +3 -2
  264. aws_cdk_lib-2.154.0.dist-info/RECORD +292 -0
  265. aws_cdk_lib-2.152.0.dist-info/RECORD +0 -291
  266. {aws_cdk_lib-2.152.0.dist-info → aws_cdk_lib-2.154.0.dist-info}/LICENSE +0 -0
  267. {aws_cdk_lib-2.152.0.dist-info → aws_cdk_lib-2.154.0.dist-info}/NOTICE +0 -0
  268. {aws_cdk_lib-2.152.0.dist-info → aws_cdk_lib-2.154.0.dist-info}/WHEEL +0 -0
  269. {aws_cdk_lib-2.152.0.dist-info → aws_cdk_lib-2.154.0.dist-info}/top_level.txt +0 -0
@@ -473,7 +473,7 @@ class CfnChannel(
473
473
  if __debug__:
474
474
  type_hints = typing.get_type_hints(_typecheckingstub__af90446cbf2dae59bef52fb3ee6ec0e5b9c6098eff5af75a5963dd51c4683a5e)
475
475
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
476
- jsii.set(self, "destinations", value)
476
+ jsii.set(self, "destinations", value) # pyright: ignore[reportArgumentType]
477
477
 
478
478
  @builtins.property
479
479
  @jsii.member(jsii_name="name")
@@ -486,7 +486,7 @@ class CfnChannel(
486
486
  if __debug__:
487
487
  type_hints = typing.get_type_hints(_typecheckingstub__9f6f560b40b7326691d9bf63d6ea7b8ad77377af3911f812fa5d243141752b34)
488
488
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
489
- jsii.set(self, "name", value)
489
+ jsii.set(self, "name", value) # pyright: ignore[reportArgumentType]
490
490
 
491
491
  @builtins.property
492
492
  @jsii.member(jsii_name="source")
@@ -499,7 +499,7 @@ class CfnChannel(
499
499
  if __debug__:
500
500
  type_hints = typing.get_type_hints(_typecheckingstub__63777c16355eca1495edc2932fdadb55a7e3c86d73124f1d93d1c28b2ad64ee7)
501
501
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
502
- jsii.set(self, "source", value)
502
+ jsii.set(self, "source", value) # pyright: ignore[reportArgumentType]
503
503
 
504
504
  @builtins.property
505
505
  @jsii.member(jsii_name="tagsRaw")
@@ -512,7 +512,7 @@ class CfnChannel(
512
512
  if __debug__:
513
513
  type_hints = typing.get_type_hints(_typecheckingstub__29044cfd0c28f00acd85e04beb454a19a2c4d87d4786f0af019f0209c639da8b)
514
514
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
515
- jsii.set(self, "tagsRaw", value)
515
+ jsii.set(self, "tagsRaw", value) # pyright: ignore[reportArgumentType]
516
516
 
517
517
  @jsii.data_type(
518
518
  jsii_type="aws-cdk-lib.aws_cloudtrail.CfnChannel.DestinationProperty",
@@ -913,7 +913,7 @@ class CfnEventDataStore(
913
913
  if __debug__:
914
914
  type_hints = typing.get_type_hints(_typecheckingstub__7bc51d9a1ef5affc48ffb624785b29a7a5d0a3eba5e72b94f687da94194f4973)
915
915
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
916
- jsii.set(self, "advancedEventSelectors", value)
916
+ jsii.set(self, "advancedEventSelectors", value) # pyright: ignore[reportArgumentType]
917
917
 
918
918
  @builtins.property
919
919
  @jsii.member(jsii_name="billingMode")
@@ -926,7 +926,7 @@ class CfnEventDataStore(
926
926
  if __debug__:
927
927
  type_hints = typing.get_type_hints(_typecheckingstub__106939491635761bff083d6af3ca26d1723f9df71ec433399c5746554b88e334)
928
928
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
929
- jsii.set(self, "billingMode", value)
929
+ jsii.set(self, "billingMode", value) # pyright: ignore[reportArgumentType]
930
930
 
931
931
  @builtins.property
932
932
  @jsii.member(jsii_name="federationEnabled")
@@ -944,7 +944,7 @@ class CfnEventDataStore(
944
944
  if __debug__:
945
945
  type_hints = typing.get_type_hints(_typecheckingstub__765513d5a073b76962f766e5dc1a967c4ad42a5bb2200d9f880aac945789b35d)
946
946
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
947
- jsii.set(self, "federationEnabled", value)
947
+ jsii.set(self, "federationEnabled", value) # pyright: ignore[reportArgumentType]
948
948
 
949
949
  @builtins.property
950
950
  @jsii.member(jsii_name="federationRoleArn")
@@ -957,7 +957,7 @@ class CfnEventDataStore(
957
957
  if __debug__:
958
958
  type_hints = typing.get_type_hints(_typecheckingstub__02d5876fb281f125b4a84c7554b6ae992b9b7433cab839d402d60601a9872704)
959
959
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
960
- jsii.set(self, "federationRoleArn", value)
960
+ jsii.set(self, "federationRoleArn", value) # pyright: ignore[reportArgumentType]
961
961
 
962
962
  @builtins.property
963
963
  @jsii.member(jsii_name="ingestionEnabled")
@@ -975,7 +975,7 @@ class CfnEventDataStore(
975
975
  if __debug__:
976
976
  type_hints = typing.get_type_hints(_typecheckingstub__3120b4fc57c151f577843e6f55242684964162de4d4061991c82480a0fae581b)
977
977
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
978
- jsii.set(self, "ingestionEnabled", value)
978
+ jsii.set(self, "ingestionEnabled", value) # pyright: ignore[reportArgumentType]
979
979
 
980
980
  @builtins.property
981
981
  @jsii.member(jsii_name="insightsDestination")
@@ -988,7 +988,7 @@ class CfnEventDataStore(
988
988
  if __debug__:
989
989
  type_hints = typing.get_type_hints(_typecheckingstub__d10aa59d5d60b5a68edf57d8df52934e03f5e4f0802a1d7dab4552592f2ee609)
990
990
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
991
- jsii.set(self, "insightsDestination", value)
991
+ jsii.set(self, "insightsDestination", value) # pyright: ignore[reportArgumentType]
992
992
 
993
993
  @builtins.property
994
994
  @jsii.member(jsii_name="insightSelectors")
@@ -1006,7 +1006,7 @@ class CfnEventDataStore(
1006
1006
  if __debug__:
1007
1007
  type_hints = typing.get_type_hints(_typecheckingstub__b360ff34d6b267287ccf6e4c636b401ab6c739c7a90856639462b1c738855c92)
1008
1008
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1009
- jsii.set(self, "insightSelectors", value)
1009
+ jsii.set(self, "insightSelectors", value) # pyright: ignore[reportArgumentType]
1010
1010
 
1011
1011
  @builtins.property
1012
1012
  @jsii.member(jsii_name="kmsKeyId")
@@ -1019,7 +1019,7 @@ class CfnEventDataStore(
1019
1019
  if __debug__:
1020
1020
  type_hints = typing.get_type_hints(_typecheckingstub__b2945b7a3d4af202bf1a8d8550ce4b17a1ab219e4dd829832fc9bd51a53c69b0)
1021
1021
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1022
- jsii.set(self, "kmsKeyId", value)
1022
+ jsii.set(self, "kmsKeyId", value) # pyright: ignore[reportArgumentType]
1023
1023
 
1024
1024
  @builtins.property
1025
1025
  @jsii.member(jsii_name="multiRegionEnabled")
@@ -1037,7 +1037,7 @@ class CfnEventDataStore(
1037
1037
  if __debug__:
1038
1038
  type_hints = typing.get_type_hints(_typecheckingstub__69742230d7479a5e2d180046d6dbe2ea4627b1fbe6861d248e8fa77f7c0dcd20)
1039
1039
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1040
- jsii.set(self, "multiRegionEnabled", value)
1040
+ jsii.set(self, "multiRegionEnabled", value) # pyright: ignore[reportArgumentType]
1041
1041
 
1042
1042
  @builtins.property
1043
1043
  @jsii.member(jsii_name="name")
@@ -1050,7 +1050,7 @@ class CfnEventDataStore(
1050
1050
  if __debug__:
1051
1051
  type_hints = typing.get_type_hints(_typecheckingstub__a01c2b1ec1e4ebac8e9e92744ee1402309ee4033c2267e1089f605b125f4b192)
1052
1052
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1053
- jsii.set(self, "name", value)
1053
+ jsii.set(self, "name", value) # pyright: ignore[reportArgumentType]
1054
1054
 
1055
1055
  @builtins.property
1056
1056
  @jsii.member(jsii_name="organizationEnabled")
@@ -1068,7 +1068,7 @@ class CfnEventDataStore(
1068
1068
  if __debug__:
1069
1069
  type_hints = typing.get_type_hints(_typecheckingstub__565712bf828bb8c2b0f6a80ca025d431aa72043d60fff9a95e02336f6f1e0d1c)
1070
1070
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1071
- jsii.set(self, "organizationEnabled", value)
1071
+ jsii.set(self, "organizationEnabled", value) # pyright: ignore[reportArgumentType]
1072
1072
 
1073
1073
  @builtins.property
1074
1074
  @jsii.member(jsii_name="retentionPeriod")
@@ -1081,7 +1081,7 @@ class CfnEventDataStore(
1081
1081
  if __debug__:
1082
1082
  type_hints = typing.get_type_hints(_typecheckingstub__9508e34267838b75568905c8769ff7999130a13cb85b3d1abf67ef17b5958102)
1083
1083
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1084
- jsii.set(self, "retentionPeriod", value)
1084
+ jsii.set(self, "retentionPeriod", value) # pyright: ignore[reportArgumentType]
1085
1085
 
1086
1086
  @builtins.property
1087
1087
  @jsii.member(jsii_name="tagsRaw")
@@ -1094,7 +1094,7 @@ class CfnEventDataStore(
1094
1094
  if __debug__:
1095
1095
  type_hints = typing.get_type_hints(_typecheckingstub__e6acb86a62af0621d981781f78b5611035089e25ca1472411f75d1b6e352ead2)
1096
1096
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1097
- jsii.set(self, "tagsRaw", value)
1097
+ jsii.set(self, "tagsRaw", value) # pyright: ignore[reportArgumentType]
1098
1098
 
1099
1099
  @builtins.property
1100
1100
  @jsii.member(jsii_name="terminationProtectionEnabled")
@@ -1112,7 +1112,7 @@ class CfnEventDataStore(
1112
1112
  if __debug__:
1113
1113
  type_hints = typing.get_type_hints(_typecheckingstub__f57ea7bcecd4a4cd58674384395db2bcf2721c3bcfa216c86922651a268041e5)
1114
1114
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1115
- jsii.set(self, "terminationProtectionEnabled", value)
1115
+ jsii.set(self, "terminationProtectionEnabled", value) # pyright: ignore[reportArgumentType]
1116
1116
 
1117
1117
  @jsii.data_type(
1118
1118
  jsii_type="aws-cdk-lib.aws_cloudtrail.CfnEventDataStore.AdvancedEventSelectorProperty",
@@ -1248,7 +1248,7 @@ class CfnEventDataStore(
1248
1248
  ) -> None:
1249
1249
  '''A single selector statement in an advanced event selector.
1250
1250
 
1251
- :param field: A field in a CloudTrail event record on which to filter events to be logged. For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the field is used only for selecting events as filtering is not supported. For CloudTrail management events, supported fields include ``readOnly`` , ``eventCategory`` , and ``eventSource`` . For CloudTrail data events, supported fields include ``readOnly`` , ``eventCategory`` , ``eventName`` , ``resources.type`` , and ``resources.ARN`` . For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the only supported field is ``eventCategory`` . - *``readOnly``* - Optional. Can be set to ``Equals`` a value of ``true`` or ``false`` . If you do not add this field, CloudTrail logs both ``read`` and ``write`` events. A value of ``true`` logs only ``read`` events. A value of ``false`` logs only ``write`` events. - *``eventSource``* - For filtering management events only. This can be set to ``NotEquals`` ``kms.amazonaws.com`` or ``NotEquals`` ``rdsdata.amazonaws.com`` . - *``eventName``* - Can use any operator. You can use it to filter in or filter out any data event logged to CloudTrail, such as ``PutBucket`` or ``GetSnapshotBlock`` . You can have multiple values for this field, separated by commas. - *``eventCategory``* - This is required and must be set to ``Equals`` . - For CloudTrail management events, the value must be ``Management`` . - For CloudTrail data events, the value must be ``Data`` . The following are used only for event data stores: - For CloudTrail Insights events, the value must be ``Insight`` . - For AWS Config configuration items, the value must be ``ConfigurationItem`` . - For Audit Manager evidence, the value must be ``Evidence`` . - For non- AWS events, the value must be ``ActivityAuditLog`` . - *``resources.type``* - This field is required for CloudTrail data events. ``resources.type`` can only use the ``Equals`` operator, and the value can be one of the following: - ``AWS::AppConfig::Configuration`` - ``AWS::B2BI::Transformer`` - ``AWS::Bedrock::AgentAlias`` - ``AWS::Bedrock::FlowAlias`` - ``AWS::Bedrock::Guardrail`` - ``AWS::Bedrock::KnowledgeBase`` - ``AWS::Cassandra::Table`` - ``AWS::CloudFront::KeyValueStore`` - ``AWS::CloudTrail::Channel`` - ``AWS::CloudWatch::Metric`` - ``AWS::CodeWhisperer::Customization`` - ``AWS::CodeWhisperer::Profile`` - ``AWS::Cognito::IdentityPool`` - ``AWS::DynamoDB::Stream`` - ``AWS::DynamoDB::Table`` - ``AWS::EC2::Snapshot`` - ``AWS::EMRWAL::Workspace`` - ``AWS::FinSpace::Environment`` - ``AWS::Glue::Table`` - ``AWS::GreengrassV2::ComponentVersion`` - ``AWS::GreengrassV2::Deployment`` - ``AWS::GuardDuty::Detector`` - ``AWS::IoT::Certificate`` - ``AWS::IoT::Thing`` - ``AWS::IoTSiteWise::Asset`` - ``AWS::IoTSiteWise::TimeSeries`` - ``AWS::IoTTwinMaker::Entity`` - ``AWS::IoTTwinMaker::Workspace`` - ``AWS::KendraRanking::ExecutionPlan`` - ``AWS::Kinesis::Stream`` - ``AWS::Kinesis::StreamConsumer`` - ``AWS::KinesisVideo::Stream`` - ``AWS::Lambda::Function`` - ``AWS::MachineLearning::MlModel`` - ``AWS::ManagedBlockchain::Network`` - ``AWS::ManagedBlockchain::Node`` - ``AWS::MedicalImaging::Datastore`` - ``AWS::NeptuneGraph::Graph`` - ``AWS::One::UKey`` - ``AWS::One::User`` - ``AWS::PaymentCryptography::Alias`` - ``AWS::PaymentCryptography::Key`` - ``AWS::PCAConnectorAD::Connector`` - ``AWS::PCAConnectorSCEP::Connector`` - ``AWS::QApps:QApp`` - ``AWS::QBusiness::Application`` - ``AWS::QBusiness::DataSource`` - ``AWS::QBusiness::Index`` - ``AWS::QBusiness::WebExperience`` - ``AWS::RDS::DBCluster`` - ``AWS::S3::AccessPoint`` - ``AWS::S3::Object`` - ``AWS::S3Express::Object`` - ``AWS::S3ObjectLambda::AccessPoint`` - ``AWS::S3Outposts::Object`` - ``AWS::SageMaker::Endpoint`` - ``AWS::SageMaker::ExperimentTrialComponent`` - ``AWS::SageMaker::FeatureGroup`` - ``AWS::ServiceDiscovery::Namespace`` - ``AWS::ServiceDiscovery::Service`` - ``AWS::SCN::Instance`` - ``AWS::SNS::PlatformEndpoint`` - ``AWS::SNS::Topic`` - ``AWS::SQS::Queue`` - ``AWS::SSM::ManagedNode`` - ``AWS::SSMMessages::ControlChannel`` - ``AWS::StepFunctions::StateMachine`` - ``AWS::SWF::Domain`` - ``AWS::ThinClient::Device`` - ``AWS::ThinClient::Environment`` - ``AWS::Timestream::Database`` - ``AWS::Timestream::Table`` - ``AWS::VerifiedPermissions::PolicyStore`` - ``AWS::XRay::Trace`` You can have only one ``resources.type`` field per selector. To log data events on more than one resource type, add another selector. - *``resources.ARN``* - You can use any operator with ``resources.ARN`` , but if you use ``Equals`` or ``NotEquals`` , the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. To log all data events for all objects in a specific S3 bucket, use the ``StartsWith`` operator, and include only the bucket ARN as the matching value. For information about filtering on the ``resources.ARN`` field, see `Filtering data events by resources.ARN <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/filtering-data-events.html#filtering-data-events-resourcearn>`_ in the *AWS CloudTrail User Guide* . .. epigraph:: You can't use the ``resources.ARN`` field to filter resource types that do not have ARNs.
1251
+ :param field: A field in a CloudTrail event record on which to filter events to be logged. For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the field is used only for selecting events as filtering is not supported. For CloudTrail management events, supported fields include ``readOnly`` , ``eventCategory`` , and ``eventSource`` . For CloudTrail data events, supported fields include ``readOnly`` , ``eventCategory`` , ``eventName`` , ``resources.type`` , and ``resources.ARN`` . For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the only supported field is ``eventCategory`` . - *``readOnly``* - Optional. Can be set to ``Equals`` a value of ``true`` or ``false`` . If you do not add this field, CloudTrail logs both ``read`` and ``write`` events. A value of ``true`` logs only ``read`` events. A value of ``false`` logs only ``write`` events. - *``eventSource``* - For filtering management events only. This can be set to ``NotEquals`` ``kms.amazonaws.com`` or ``NotEquals`` ``rdsdata.amazonaws.com`` . - *``eventName``* - Can use any operator. You can use it to filter in or filter out any data event logged to CloudTrail, such as ``PutBucket`` or ``GetSnapshotBlock`` . You can have multiple values for this field, separated by commas. - *``eventCategory``* - This is required and must be set to ``Equals`` . - For CloudTrail management events, the value must be ``Management`` . - For CloudTrail data events, the value must be ``Data`` . The following are used only for event data stores: - For CloudTrail Insights events, the value must be ``Insight`` . - For AWS Config configuration items, the value must be ``ConfigurationItem`` . - For Audit Manager evidence, the value must be ``Evidence`` . - For non- AWS events, the value must be ``ActivityAuditLog`` . - *``resources.type``* - This field is required for CloudTrail data events. ``resources.type`` can only use the ``Equals`` operator, and the value can be one of the following: - ``AWS::AppConfig::Configuration`` - ``AWS::B2BI::Transformer`` - ``AWS::Bedrock::AgentAlias`` - ``AWS::Bedrock::FlowAlias`` - ``AWS::Bedrock::Guardrail`` - ``AWS::Bedrock::KnowledgeBase`` - ``AWS::Cassandra::Table`` - ``AWS::CloudFront::KeyValueStore`` - ``AWS::CloudTrail::Channel`` - ``AWS::CloudWatch::Metric`` - ``AWS::CodeWhisperer::Customization`` - ``AWS::CodeWhisperer::Profile`` - ``AWS::Cognito::IdentityPool`` - ``AWS::DynamoDB::Stream`` - ``AWS::DynamoDB::Table`` - ``AWS::EC2::Snapshot`` - ``AWS::EMRWAL::Workspace`` - ``AWS::FinSpace::Environment`` - ``AWS::Glue::Table`` - ``AWS::GreengrassV2::ComponentVersion`` - ``AWS::GreengrassV2::Deployment`` - ``AWS::GuardDuty::Detector`` - ``AWS::IoT::Certificate`` - ``AWS::IoT::Thing`` - ``AWS::IoTSiteWise::Asset`` - ``AWS::IoTSiteWise::TimeSeries`` - ``AWS::IoTTwinMaker::Entity`` - ``AWS::IoTTwinMaker::Workspace`` - ``AWS::KendraRanking::ExecutionPlan`` - ``AWS::Kinesis::Stream`` - ``AWS::Kinesis::StreamConsumer`` - ``AWS::KinesisVideo::Stream`` - ``AWS::Lambda::Function`` - ``AWS::MachineLearning::MlModel`` - ``AWS::ManagedBlockchain::Network`` - ``AWS::ManagedBlockchain::Node`` - ``AWS::MedicalImaging::Datastore`` - ``AWS::NeptuneGraph::Graph`` - ``AWS::One::UKey`` - ``AWS::One::User`` - ``AWS::PaymentCryptography::Alias`` - ``AWS::PaymentCryptography::Key`` - ``AWS::PCAConnectorAD::Connector`` - ``AWS::PCAConnectorSCEP::Connector`` - ``AWS::QApps:QApp`` - ``AWS::QBusiness::Application`` - ``AWS::QBusiness::DataSource`` - ``AWS::QBusiness::Index`` - ``AWS::QBusiness::WebExperience`` - ``AWS::RDS::DBCluster`` - ``AWS::RUM::AppMonitor`` - ``AWS::S3::AccessPoint`` - ``AWS::S3::Object`` - ``AWS::S3Express::Object`` - ``AWS::S3ObjectLambda::AccessPoint`` - ``AWS::S3Outposts::Object`` - ``AWS::SageMaker::Endpoint`` - ``AWS::SageMaker::ExperimentTrialComponent`` - ``AWS::SageMaker::FeatureGroup`` - ``AWS::ServiceDiscovery::Namespace`` - ``AWS::ServiceDiscovery::Service`` - ``AWS::SCN::Instance`` - ``AWS::SNS::PlatformEndpoint`` - ``AWS::SNS::Topic`` - ``AWS::SQS::Queue`` - ``AWS::SSM::ManagedNode`` - ``AWS::SSMMessages::ControlChannel`` - ``AWS::StepFunctions::StateMachine`` - ``AWS::SWF::Domain`` - ``AWS::ThinClient::Device`` - ``AWS::ThinClient::Environment`` - ``AWS::Timestream::Database`` - ``AWS::Timestream::Table`` - ``AWS::VerifiedPermissions::PolicyStore`` - ``AWS::XRay::Trace`` You can have only one ``resources.type`` field per selector. To log data events on more than one resource type, add another selector. - *``resources.ARN``* - You can use any operator with ``resources.ARN`` , but if you use ``Equals`` or ``NotEquals`` , the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. To log all data events for all objects in a specific S3 bucket, use the ``StartsWith`` operator, and include only the bucket ARN as the matching value. For information about filtering on the ``resources.ARN`` field, see `Filtering data events by resources.ARN <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/filtering-data-events.html#filtering-data-events-resourcearn>`_ in the *AWS CloudTrail User Guide* . .. epigraph:: You can't use the ``resources.ARN`` field to filter resource types that do not have ARNs.
1252
1252
  :param ends_with: An operator that includes events that match the last few characters of the event record field specified as the value of ``Field`` .
1253
1253
  :param equal_to: An operator that includes events that match the exact value of the event record field specified as the value of ``Field`` . This is the only valid operator that you can use with the ``readOnly`` , ``eventCategory`` , and ``resources.type`` fields.
1254
1254
  :param not_ends_with: An operator that excludes events that match the last few characters of the event record field specified as the value of ``Field`` .
@@ -1378,6 +1378,7 @@ class CfnEventDataStore(
1378
1378
  - ``AWS::QBusiness::Index``
1379
1379
  - ``AWS::QBusiness::WebExperience``
1380
1380
  - ``AWS::RDS::DBCluster``
1381
+ - ``AWS::RUM::AppMonitor``
1381
1382
  - ``AWS::S3::AccessPoint``
1382
1383
  - ``AWS::S3::Object``
1383
1384
  - ``AWS::S3Express::Object``
@@ -1994,7 +1995,7 @@ class CfnResourcePolicy(
1994
1995
  if __debug__:
1995
1996
  type_hints = typing.get_type_hints(_typecheckingstub__c2bbc7a61c40e678ccc323afced9d77064978b41254369fee4db815497450dcd)
1996
1997
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1997
- jsii.set(self, "resourceArn", value)
1998
+ jsii.set(self, "resourceArn", value) # pyright: ignore[reportArgumentType]
1998
1999
 
1999
2000
  @builtins.property
2000
2001
  @jsii.member(jsii_name="resourcePolicy")
@@ -2007,7 +2008,7 @@ class CfnResourcePolicy(
2007
2008
  if __debug__:
2008
2009
  type_hints = typing.get_type_hints(_typecheckingstub__e81052ff397bfd1d58bc17a51da7f1ee393c63b322c1b7d43b49b11f481e0ade)
2009
2010
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2010
- jsii.set(self, "resourcePolicy", value)
2011
+ jsii.set(self, "resourcePolicy", value) # pyright: ignore[reportArgumentType]
2011
2012
 
2012
2013
 
2013
2014
  @jsii.data_type(
@@ -2302,7 +2303,7 @@ class CfnTrail(
2302
2303
  if __debug__:
2303
2304
  type_hints = typing.get_type_hints(_typecheckingstub__28420bf6c9605a8eeb3ac59acf7f894b63e53a96b92e9d477f9cd206f2f9cf41)
2304
2305
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2305
- jsii.set(self, "isLogging", value)
2306
+ jsii.set(self, "isLogging", value) # pyright: ignore[reportArgumentType]
2306
2307
 
2307
2308
  @builtins.property
2308
2309
  @jsii.member(jsii_name="s3BucketName")
@@ -2315,7 +2316,7 @@ class CfnTrail(
2315
2316
  if __debug__:
2316
2317
  type_hints = typing.get_type_hints(_typecheckingstub__950bb01f69a31c7f47512f3a4330d4ce5db85c66795a79936ef3af33a322c8b2)
2317
2318
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2318
- jsii.set(self, "s3BucketName", value)
2319
+ jsii.set(self, "s3BucketName", value) # pyright: ignore[reportArgumentType]
2319
2320
 
2320
2321
  @builtins.property
2321
2322
  @jsii.member(jsii_name="advancedEventSelectors")
@@ -2333,7 +2334,7 @@ class CfnTrail(
2333
2334
  if __debug__:
2334
2335
  type_hints = typing.get_type_hints(_typecheckingstub__ae10dc28d41ecf82427e4cef4ce27f9c40933974aaf57ffd8e73f19c06621f53)
2335
2336
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2336
- jsii.set(self, "advancedEventSelectors", value)
2337
+ jsii.set(self, "advancedEventSelectors", value) # pyright: ignore[reportArgumentType]
2337
2338
 
2338
2339
  @builtins.property
2339
2340
  @jsii.member(jsii_name="cloudWatchLogsLogGroupArn")
@@ -2349,7 +2350,7 @@ class CfnTrail(
2349
2350
  if __debug__:
2350
2351
  type_hints = typing.get_type_hints(_typecheckingstub__58f37437f0af59fad3f65c1d9ef003f52fa49f6aabcba3b40c779f379b8b0410)
2351
2352
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2352
- jsii.set(self, "cloudWatchLogsLogGroupArn", value)
2353
+ jsii.set(self, "cloudWatchLogsLogGroupArn", value) # pyright: ignore[reportArgumentType]
2353
2354
 
2354
2355
  @builtins.property
2355
2356
  @jsii.member(jsii_name="cloudWatchLogsRoleArn")
@@ -2362,7 +2363,7 @@ class CfnTrail(
2362
2363
  if __debug__:
2363
2364
  type_hints = typing.get_type_hints(_typecheckingstub__cabe9b73fb8bc4d76fde324653a247811fa621cc9003d2c46e84b890b919cd28)
2364
2365
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2365
- jsii.set(self, "cloudWatchLogsRoleArn", value)
2366
+ jsii.set(self, "cloudWatchLogsRoleArn", value) # pyright: ignore[reportArgumentType]
2366
2367
 
2367
2368
  @builtins.property
2368
2369
  @jsii.member(jsii_name="enableLogFileValidation")
@@ -2383,7 +2384,7 @@ class CfnTrail(
2383
2384
  if __debug__:
2384
2385
  type_hints = typing.get_type_hints(_typecheckingstub__0b942505386f8e61551da02925be57cd0474923089182c193fde0b17fe804056)
2385
2386
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2386
- jsii.set(self, "enableLogFileValidation", value)
2387
+ jsii.set(self, "enableLogFileValidation", value) # pyright: ignore[reportArgumentType]
2387
2388
 
2388
2389
  @builtins.property
2389
2390
  @jsii.member(jsii_name="eventSelectors")
@@ -2401,7 +2402,7 @@ class CfnTrail(
2401
2402
  if __debug__:
2402
2403
  type_hints = typing.get_type_hints(_typecheckingstub__1ef2943100a700e4bd2b0922f697c3d0da51c014bec4f2a8c4063f59e83067d7)
2403
2404
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2404
- jsii.set(self, "eventSelectors", value)
2405
+ jsii.set(self, "eventSelectors", value) # pyright: ignore[reportArgumentType]
2405
2406
 
2406
2407
  @builtins.property
2407
2408
  @jsii.member(jsii_name="includeGlobalServiceEvents")
@@ -2419,7 +2420,7 @@ class CfnTrail(
2419
2420
  if __debug__:
2420
2421
  type_hints = typing.get_type_hints(_typecheckingstub__1a1c2489b0dca720e7fab9917132eaf8dc9468d58f2d500bccd7579577d74434)
2421
2422
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2422
- jsii.set(self, "includeGlobalServiceEvents", value)
2423
+ jsii.set(self, "includeGlobalServiceEvents", value) # pyright: ignore[reportArgumentType]
2423
2424
 
2424
2425
  @builtins.property
2425
2426
  @jsii.member(jsii_name="insightSelectors")
@@ -2437,7 +2438,7 @@ class CfnTrail(
2437
2438
  if __debug__:
2438
2439
  type_hints = typing.get_type_hints(_typecheckingstub__2d11150f51682efcafc38f048d84c35a263b443e02355965298d566b0714947d)
2439
2440
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2440
- jsii.set(self, "insightSelectors", value)
2441
+ jsii.set(self, "insightSelectors", value) # pyright: ignore[reportArgumentType]
2441
2442
 
2442
2443
  @builtins.property
2443
2444
  @jsii.member(jsii_name="isMultiRegionTrail")
@@ -2455,7 +2456,7 @@ class CfnTrail(
2455
2456
  if __debug__:
2456
2457
  type_hints = typing.get_type_hints(_typecheckingstub__48558347dbb5febc8abf93096cfc174c76cbab4c443d68076643e329fb0787c0)
2457
2458
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2458
- jsii.set(self, "isMultiRegionTrail", value)
2459
+ jsii.set(self, "isMultiRegionTrail", value) # pyright: ignore[reportArgumentType]
2459
2460
 
2460
2461
  @builtins.property
2461
2462
  @jsii.member(jsii_name="isOrganizationTrail")
@@ -2473,7 +2474,7 @@ class CfnTrail(
2473
2474
  if __debug__:
2474
2475
  type_hints = typing.get_type_hints(_typecheckingstub__583ab7d05361279f7f55956fec04616c02d033f55ef6113a3cf8c36630cd5ec5)
2475
2476
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2476
- jsii.set(self, "isOrganizationTrail", value)
2477
+ jsii.set(self, "isOrganizationTrail", value) # pyright: ignore[reportArgumentType]
2477
2478
 
2478
2479
  @builtins.property
2479
2480
  @jsii.member(jsii_name="kmsKeyId")
@@ -2486,7 +2487,7 @@ class CfnTrail(
2486
2487
  if __debug__:
2487
2488
  type_hints = typing.get_type_hints(_typecheckingstub__4fac6d2810385893265f6ef2611c9d8ceaa7635731b1ae56291d8e43a83cc907)
2488
2489
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2489
- jsii.set(self, "kmsKeyId", value)
2490
+ jsii.set(self, "kmsKeyId", value) # pyright: ignore[reportArgumentType]
2490
2491
 
2491
2492
  @builtins.property
2492
2493
  @jsii.member(jsii_name="s3KeyPrefix")
@@ -2499,7 +2500,7 @@ class CfnTrail(
2499
2500
  if __debug__:
2500
2501
  type_hints = typing.get_type_hints(_typecheckingstub__a62410d04026f326fad72a00ba17b36e83eb965baeada846126607f600de0f7f)
2501
2502
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2502
- jsii.set(self, "s3KeyPrefix", value)
2503
+ jsii.set(self, "s3KeyPrefix", value) # pyright: ignore[reportArgumentType]
2503
2504
 
2504
2505
  @builtins.property
2505
2506
  @jsii.member(jsii_name="snsTopicName")
@@ -2512,7 +2513,7 @@ class CfnTrail(
2512
2513
  if __debug__:
2513
2514
  type_hints = typing.get_type_hints(_typecheckingstub__99ce4d6977c0c8f0ad39dd667104baf8babcda3f6e64b94361cd24302f9bfb12)
2514
2515
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2515
- jsii.set(self, "snsTopicName", value)
2516
+ jsii.set(self, "snsTopicName", value) # pyright: ignore[reportArgumentType]
2516
2517
 
2517
2518
  @builtins.property
2518
2519
  @jsii.member(jsii_name="tagsRaw")
@@ -2525,7 +2526,7 @@ class CfnTrail(
2525
2526
  if __debug__:
2526
2527
  type_hints = typing.get_type_hints(_typecheckingstub__b6e90bde6d2082aefdd7c19acee054825987d54ead9c95ec2dbe11a014f72339)
2527
2528
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2528
- jsii.set(self, "tagsRaw", value)
2529
+ jsii.set(self, "tagsRaw", value) # pyright: ignore[reportArgumentType]
2529
2530
 
2530
2531
  @builtins.property
2531
2532
  @jsii.member(jsii_name="trailName")
@@ -2541,7 +2542,7 @@ class CfnTrail(
2541
2542
  if __debug__:
2542
2543
  type_hints = typing.get_type_hints(_typecheckingstub__29683f56476eaa26adca4a9a9312d409428d1af457282b2a0f93af552333a02e)
2543
2544
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2544
- jsii.set(self, "trailName", value)
2545
+ jsii.set(self, "trailName", value) # pyright: ignore[reportArgumentType]
2545
2546
 
2546
2547
  @jsii.data_type(
2547
2548
  jsii_type="aws-cdk-lib.aws_cloudtrail.CfnTrail.AdvancedEventSelectorProperty",
@@ -2677,7 +2678,7 @@ class CfnTrail(
2677
2678
  ) -> None:
2678
2679
  '''A single selector statement in an advanced event selector.
2679
2680
 
2680
- :param field: A field in a CloudTrail event record on which to filter events to be logged. For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the field is used only for selecting events as filtering is not supported. For CloudTrail management events, supported fields include ``readOnly`` , ``eventCategory`` , and ``eventSource`` . For CloudTrail data events, supported fields include ``readOnly`` , ``eventCategory`` , ``eventName`` , ``resources.type`` , and ``resources.ARN`` . For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the only supported field is ``eventCategory`` . - *``readOnly``* - Optional. Can be set to ``Equals`` a value of ``true`` or ``false`` . If you do not add this field, CloudTrail logs both ``read`` and ``write`` events. A value of ``true`` logs only ``read`` events. A value of ``false`` logs only ``write`` events. - *``eventSource``* - For filtering management events only. This can be set to ``NotEquals`` ``kms.amazonaws.com`` or ``NotEquals`` ``rdsdata.amazonaws.com`` . - *``eventName``* - Can use any operator. You can use it to filter in or filter out any data event logged to CloudTrail, such as ``PutBucket`` or ``GetSnapshotBlock`` . You can have multiple values for this field, separated by commas. - *``eventCategory``* - This is required and must be set to ``Equals`` . - For CloudTrail management events, the value must be ``Management`` . - For CloudTrail data events, the value must be ``Data`` . The following are used only for event data stores: - For CloudTrail Insights events, the value must be ``Insight`` . - For AWS Config configuration items, the value must be ``ConfigurationItem`` . - For Audit Manager evidence, the value must be ``Evidence`` . - For non- AWS events, the value must be ``ActivityAuditLog`` . - *``resources.type``* - This field is required for CloudTrail data events. ``resources.type`` can only use the ``Equals`` operator, and the value can be one of the following: - ``AWS::AppConfig::Configuration`` - ``AWS::B2BI::Transformer`` - ``AWS::Bedrock::AgentAlias`` - ``AWS::Bedrock::FlowAlias`` - ``AWS::Bedrock::Guardrail`` - ``AWS::Bedrock::KnowledgeBase`` - ``AWS::Cassandra::Table`` - ``AWS::CloudFront::KeyValueStore`` - ``AWS::CloudTrail::Channel`` - ``AWS::CloudWatch::Metric`` - ``AWS::CodeWhisperer::Customization`` - ``AWS::CodeWhisperer::Profile`` - ``AWS::Cognito::IdentityPool`` - ``AWS::DynamoDB::Stream`` - ``AWS::DynamoDB::Table`` - ``AWS::EC2::Snapshot`` - ``AWS::EMRWAL::Workspace`` - ``AWS::FinSpace::Environment`` - ``AWS::Glue::Table`` - ``AWS::GreengrassV2::ComponentVersion`` - ``AWS::GreengrassV2::Deployment`` - ``AWS::GuardDuty::Detector`` - ``AWS::IoT::Certificate`` - ``AWS::IoT::Thing`` - ``AWS::IoTSiteWise::Asset`` - ``AWS::IoTSiteWise::TimeSeries`` - ``AWS::IoTTwinMaker::Entity`` - ``AWS::IoTTwinMaker::Workspace`` - ``AWS::KendraRanking::ExecutionPlan`` - ``AWS::Kinesis::Stream`` - ``AWS::Kinesis::StreamConsumer`` - ``AWS::KinesisVideo::Stream`` - ``AWS::Lambda::Function`` - ``AWS::MachineLearning::MlModel`` - ``AWS::ManagedBlockchain::Network`` - ``AWS::ManagedBlockchain::Node`` - ``AWS::MedicalImaging::Datastore`` - ``AWS::NeptuneGraph::Graph`` - ``AWS::One::UKey`` - ``AWS::One::User`` - ``AWS::PaymentCryptography::Alias`` - ``AWS::PaymentCryptography::Key`` - ``AWS::PCAConnectorAD::Connector`` - ``AWS::PCAConnectorSCEP::Connector`` - ``AWS::QApps:QApp`` - ``AWS::QBusiness::Application`` - ``AWS::QBusiness::DataSource`` - ``AWS::QBusiness::Index`` - ``AWS::QBusiness::WebExperience`` - ``AWS::RDS::DBCluster`` - ``AWS::S3::AccessPoint`` - ``AWS::S3::Object`` - ``AWS::S3Express::Object`` - ``AWS::S3ObjectLambda::AccessPoint`` - ``AWS::S3Outposts::Object`` - ``AWS::SageMaker::Endpoint`` - ``AWS::SageMaker::ExperimentTrialComponent`` - ``AWS::SageMaker::FeatureGroup`` - ``AWS::ServiceDiscovery::Namespace`` - ``AWS::ServiceDiscovery::Service`` - ``AWS::SCN::Instance`` - ``AWS::SNS::PlatformEndpoint`` - ``AWS::SNS::Topic`` - ``AWS::SQS::Queue`` - ``AWS::SSM::ManagedNode`` - ``AWS::SSMMessages::ControlChannel`` - ``AWS::StepFunctions::StateMachine`` - ``AWS::SWF::Domain`` - ``AWS::ThinClient::Device`` - ``AWS::ThinClient::Environment`` - ``AWS::Timestream::Database`` - ``AWS::Timestream::Table`` - ``AWS::VerifiedPermissions::PolicyStore`` - ``AWS::XRay::Trace`` You can have only one ``resources.type`` field per selector. To log data events on more than one resource type, add another selector. - *``resources.ARN``* - You can use any operator with ``resources.ARN`` , but if you use ``Equals`` or ``NotEquals`` , the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. To log all data events for all objects in a specific S3 bucket, use the ``StartsWith`` operator, and include only the bucket ARN as the matching value. For information about filtering on the ``resources.ARN`` field, see `Filtering data events by resources.ARN <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/filtering-data-events.html#filtering-data-events-resourcearn>`_ in the *AWS CloudTrail User Guide* . .. epigraph:: You can't use the ``resources.ARN`` field to filter resource types that do not have ARNs.
2681
+ :param field: A field in a CloudTrail event record on which to filter events to be logged. For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the field is used only for selecting events as filtering is not supported. For CloudTrail management events, supported fields include ``readOnly`` , ``eventCategory`` , and ``eventSource`` . For CloudTrail data events, supported fields include ``readOnly`` , ``eventCategory`` , ``eventName`` , ``resources.type`` , and ``resources.ARN`` . For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the only supported field is ``eventCategory`` . - *``readOnly``* - Optional. Can be set to ``Equals`` a value of ``true`` or ``false`` . If you do not add this field, CloudTrail logs both ``read`` and ``write`` events. A value of ``true`` logs only ``read`` events. A value of ``false`` logs only ``write`` events. - *``eventSource``* - For filtering management events only. This can be set to ``NotEquals`` ``kms.amazonaws.com`` or ``NotEquals`` ``rdsdata.amazonaws.com`` . - *``eventName``* - Can use any operator. You can use it to filter in or filter out any data event logged to CloudTrail, such as ``PutBucket`` or ``GetSnapshotBlock`` . You can have multiple values for this field, separated by commas. - *``eventCategory``* - This is required and must be set to ``Equals`` . - For CloudTrail management events, the value must be ``Management`` . - For CloudTrail data events, the value must be ``Data`` . The following are used only for event data stores: - For CloudTrail Insights events, the value must be ``Insight`` . - For AWS Config configuration items, the value must be ``ConfigurationItem`` . - For Audit Manager evidence, the value must be ``Evidence`` . - For non- AWS events, the value must be ``ActivityAuditLog`` . - *``resources.type``* - This field is required for CloudTrail data events. ``resources.type`` can only use the ``Equals`` operator, and the value can be one of the following: - ``AWS::AppConfig::Configuration`` - ``AWS::B2BI::Transformer`` - ``AWS::Bedrock::AgentAlias`` - ``AWS::Bedrock::FlowAlias`` - ``AWS::Bedrock::Guardrail`` - ``AWS::Bedrock::KnowledgeBase`` - ``AWS::Cassandra::Table`` - ``AWS::CloudFront::KeyValueStore`` - ``AWS::CloudTrail::Channel`` - ``AWS::CloudWatch::Metric`` - ``AWS::CodeWhisperer::Customization`` - ``AWS::CodeWhisperer::Profile`` - ``AWS::Cognito::IdentityPool`` - ``AWS::DynamoDB::Stream`` - ``AWS::DynamoDB::Table`` - ``AWS::EC2::Snapshot`` - ``AWS::EMRWAL::Workspace`` - ``AWS::FinSpace::Environment`` - ``AWS::Glue::Table`` - ``AWS::GreengrassV2::ComponentVersion`` - ``AWS::GreengrassV2::Deployment`` - ``AWS::GuardDuty::Detector`` - ``AWS::IoT::Certificate`` - ``AWS::IoT::Thing`` - ``AWS::IoTSiteWise::Asset`` - ``AWS::IoTSiteWise::TimeSeries`` - ``AWS::IoTTwinMaker::Entity`` - ``AWS::IoTTwinMaker::Workspace`` - ``AWS::KendraRanking::ExecutionPlan`` - ``AWS::Kinesis::Stream`` - ``AWS::Kinesis::StreamConsumer`` - ``AWS::KinesisVideo::Stream`` - ``AWS::Lambda::Function`` - ``AWS::MachineLearning::MlModel`` - ``AWS::ManagedBlockchain::Network`` - ``AWS::ManagedBlockchain::Node`` - ``AWS::MedicalImaging::Datastore`` - ``AWS::NeptuneGraph::Graph`` - ``AWS::One::UKey`` - ``AWS::One::User`` - ``AWS::PaymentCryptography::Alias`` - ``AWS::PaymentCryptography::Key`` - ``AWS::PCAConnectorAD::Connector`` - ``AWS::PCAConnectorSCEP::Connector`` - ``AWS::QApps:QApp`` - ``AWS::QBusiness::Application`` - ``AWS::QBusiness::DataSource`` - ``AWS::QBusiness::Index`` - ``AWS::QBusiness::WebExperience`` - ``AWS::RDS::DBCluster`` - ``AWS::RUM::AppMonitor`` - ``AWS::S3::AccessPoint`` - ``AWS::S3::Object`` - ``AWS::S3Express::Object`` - ``AWS::S3ObjectLambda::AccessPoint`` - ``AWS::S3Outposts::Object`` - ``AWS::SageMaker::Endpoint`` - ``AWS::SageMaker::ExperimentTrialComponent`` - ``AWS::SageMaker::FeatureGroup`` - ``AWS::ServiceDiscovery::Namespace`` - ``AWS::ServiceDiscovery::Service`` - ``AWS::SCN::Instance`` - ``AWS::SNS::PlatformEndpoint`` - ``AWS::SNS::Topic`` - ``AWS::SQS::Queue`` - ``AWS::SSM::ManagedNode`` - ``AWS::SSMMessages::ControlChannel`` - ``AWS::StepFunctions::StateMachine`` - ``AWS::SWF::Domain`` - ``AWS::ThinClient::Device`` - ``AWS::ThinClient::Environment`` - ``AWS::Timestream::Database`` - ``AWS::Timestream::Table`` - ``AWS::VerifiedPermissions::PolicyStore`` - ``AWS::XRay::Trace`` You can have only one ``resources.type`` field per selector. To log data events on more than one resource type, add another selector. - *``resources.ARN``* - You can use any operator with ``resources.ARN`` , but if you use ``Equals`` or ``NotEquals`` , the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. To log all data events for all objects in a specific S3 bucket, use the ``StartsWith`` operator, and include only the bucket ARN as the matching value. For information about filtering on the ``resources.ARN`` field, see `Filtering data events by resources.ARN <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/filtering-data-events.html#filtering-data-events-resourcearn>`_ in the *AWS CloudTrail User Guide* . .. epigraph:: You can't use the ``resources.ARN`` field to filter resource types that do not have ARNs.
2681
2682
  :param ends_with: An operator that includes events that match the last few characters of the event record field specified as the value of ``Field`` .
2682
2683
  :param equal_to: An operator that includes events that match the exact value of the event record field specified as the value of ``Field`` . This is the only valid operator that you can use with the ``readOnly`` , ``eventCategory`` , and ``resources.type`` fields.
2683
2684
  :param not_ends_with: An operator that excludes events that match the last few characters of the event record field specified as the value of ``Field`` .
@@ -2807,6 +2808,7 @@ class CfnTrail(
2807
2808
  - ``AWS::QBusiness::Index``
2808
2809
  - ``AWS::QBusiness::WebExperience``
2809
2810
  - ``AWS::RDS::DBCluster``
2811
+ - ``AWS::RUM::AppMonitor``
2810
2812
  - ``AWS::S3::AccessPoint``
2811
2813
  - ``AWS::S3::Object``
2812
2814
  - ``AWS::S3Express::Object``
@@ -2938,11 +2940,11 @@ class CfnTrail(
2938
2940
 
2939
2941
  The total number of allowed data resources is 250. This number can be distributed between 1 and 5 event selectors, but the total cannot exceed 250 across all selectors for the trail.
2940
2942
 
2941
- The following example demonstrates how logging works when you configure logging of all data events for a general purpose bucket named ``DOC-EXAMPLE-BUCKET1`` . In this example, the CloudTrail user specified an empty prefix, and the option to log both ``Read`` and ``Write`` data events.
2943
+ The following example demonstrates how logging works when you configure logging of all data events for a general purpose bucket named ``amzn-s3-demo-bucket1`` . In this example, the CloudTrail user specified an empty prefix, and the option to log both ``Read`` and ``Write`` data events.
2942
2944
 
2943
- - A user uploads an image file to ``DOC-EXAMPLE-BUCKET1`` .
2945
+ - A user uploads an image file to ``amzn-s3-demo-bucket1`` .
2944
2946
  - The ``PutObject`` API operation is an Amazon S3 object-level API. It is recorded as a data event in CloudTrail. Because the CloudTrail user specified an S3 bucket with an empty prefix, events that occur on any object in that bucket are logged. The trail processes and logs the event.
2945
- - A user uploads an object to an Amazon S3 bucket named ``arn:aws:s3:::DOC-EXAMPLE-BUCKET1`` .
2947
+ - A user uploads an object to an Amazon S3 bucket named ``arn:aws:s3:::amzn-s3-demo-bucket1`` .
2946
2948
  - The ``PutObject`` API operation occurred for an object in an S3 bucket that the CloudTrail user didn't specify for the trail. The trail doesn’t log the event.
2947
2949
 
2948
2950
  The following example demonstrates how logging works when you configure logging of AWS Lambda data events for a Lambda function named *MyLambdaFunction* , but not for all Lambda functions.
@@ -2952,7 +2954,7 @@ class CfnTrail(
2952
2954
  - The ``Invoke`` API operation on *MyOtherLambdaFunction* is an Lambda API. Because the CloudTrail user did not specify logging data events for all Lambda functions, the ``Invoke`` operation for *MyOtherLambdaFunction* does not match the function specified for the trail. The trail doesn’t log the event.
2953
2955
 
2954
2956
  :param type: The resource type in which you want to log data events. You can specify the following *basic* event selector resource types: - ``AWS::DynamoDB::Table`` - ``AWS::Lambda::Function`` - ``AWS::S3::Object`` Additional resource types are available through *advanced* event selectors. For more information about these additional resource types, see `AdvancedFieldSelector <https://docs.aws.amazon.com/awscloudtrail/latest/APIReference/API_AdvancedFieldSelector.html>`_ .
2955
- :param values: An array of Amazon Resource Name (ARN) strings or partial ARN strings for the specified resource type. - To log data events for all objects in all S3 buckets in your AWS account , specify the prefix as ``arn:aws:s3`` . .. epigraph:: This also enables logging of data event activity performed by any user or role in your AWS account , even if that activity is performed on a bucket that belongs to another AWS account . - To log data events for all objects in an S3 bucket, specify the bucket and an empty object prefix such as ``arn:aws:s3:::DOC-EXAMPLE-BUCKET1/`` . The trail logs data events for all objects in this S3 bucket. - To log data events for specific objects, specify the S3 bucket and object prefix such as ``arn:aws:s3:::DOC-EXAMPLE-BUCKET1/example-images`` . The trail logs data events for objects in this S3 bucket that match the prefix. - To log data events for all Lambda functions in your AWS account , specify the prefix as ``arn:aws:lambda`` . .. epigraph:: This also enables logging of ``Invoke`` activity performed by any user or role in your AWS account , even if that activity is performed on a function that belongs to another AWS account . - To log data events for a specific Lambda function, specify the function ARN. .. epigraph:: Lambda function ARNs are exact. For example, if you specify a function ARN *arn:aws:lambda:us-west-2:111111111111:function:helloworld* , data events will only be logged for *arn:aws:lambda:us-west-2:111111111111:function:helloworld* . They will not be logged for *arn:aws:lambda:us-west-2:111111111111:function:helloworld2* . - To log data events for all DynamoDB tables in your AWS account , specify the prefix as ``arn:aws:dynamodb`` .
2957
+ :param values: An array of Amazon Resource Name (ARN) strings or partial ARN strings for the specified resource type. - To log data events for all objects in all S3 buckets in your AWS account , specify the prefix as ``arn:aws:s3`` . .. epigraph:: This also enables logging of data event activity performed by any user or role in your AWS account , even if that activity is performed on a bucket that belongs to another AWS account . - To log data events for all objects in an S3 bucket, specify the bucket and an empty object prefix such as ``arn:aws:s3:::amzn-s3-demo-bucket1/`` . The trail logs data events for all objects in this S3 bucket. - To log data events for specific objects, specify the S3 bucket and object prefix such as ``arn:aws:s3:::amzn-s3-demo-bucket1/example-images`` . The trail logs data events for objects in this S3 bucket that match the prefix. - To log data events for all Lambda functions in your AWS account , specify the prefix as ``arn:aws:lambda`` . .. epigraph:: This also enables logging of ``Invoke`` activity performed by any user or role in your AWS account , even if that activity is performed on a function that belongs to another AWS account . - To log data events for a specific Lambda function, specify the function ARN. .. epigraph:: Lambda function ARNs are exact. For example, if you specify a function ARN *arn:aws:lambda:us-west-2:111111111111:function:helloworld* , data events will only be logged for *arn:aws:lambda:us-west-2:111111111111:function:helloworld* . They will not be logged for *arn:aws:lambda:us-west-2:111111111111:function:helloworld2* . - To log data events for all DynamoDB tables in your AWS account , specify the prefix as ``arn:aws:dynamodb`` .
2956
2958
 
2957
2959
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudtrail-trail-dataresource.html
2958
2960
  :exampleMetadata: fixture=_generated
@@ -3008,8 +3010,8 @@ class CfnTrail(
3008
3010
 
3009
3011
  This also enables logging of data event activity performed by any user or role in your AWS account , even if that activity is performed on a bucket that belongs to another AWS account .
3010
3012
 
3011
- - To log data events for all objects in an S3 bucket, specify the bucket and an empty object prefix such as ``arn:aws:s3:::DOC-EXAMPLE-BUCKET1/`` . The trail logs data events for all objects in this S3 bucket.
3012
- - To log data events for specific objects, specify the S3 bucket and object prefix such as ``arn:aws:s3:::DOC-EXAMPLE-BUCKET1/example-images`` . The trail logs data events for objects in this S3 bucket that match the prefix.
3013
+ - To log data events for all objects in an S3 bucket, specify the bucket and an empty object prefix such as ``arn:aws:s3:::amzn-s3-demo-bucket1/`` . The trail logs data events for all objects in this S3 bucket.
3014
+ - To log data events for specific objects, specify the S3 bucket and object prefix such as ``arn:aws:s3:::amzn-s3-demo-bucket1/example-images`` . The trail logs data events for objects in this S3 bucket that match the prefix.
3013
3015
  - To log data events for all Lambda functions in your AWS account , specify the prefix as ``arn:aws:lambda`` .
3014
3016
 
3015
3017
  .. epigraph::