aws-cdk-lib 2.153.0__py3-none-any.whl → 2.154.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk-lib might be problematic. Click here for more details.

Files changed (266) hide show
  1. aws_cdk/__init__.py +157 -215
  2. aws_cdk/_jsii/__init__.py +2 -1
  3. aws_cdk/_jsii/{aws-cdk-lib@2.153.0.jsii.tgz → aws-cdk-lib@2.154.0.jsii.tgz} +0 -0
  4. aws_cdk/alexa_ask/__init__.py +3 -3
  5. aws_cdk/aws_accessanalyzer/__init__.py +5 -5
  6. aws_cdk/aws_acmpca/__init__.py +79 -24
  7. aws_cdk/aws_amazonmq/__init__.py +161 -161
  8. aws_cdk/aws_amplify/__init__.py +36 -36
  9. aws_cdk/aws_amplifyuibuilder/__init__.py +32 -32
  10. aws_cdk/aws_apigateway/__init__.py +122 -122
  11. aws_cdk/aws_apigatewayv2/__init__.py +135 -121
  12. aws_cdk/aws_apigatewayv2_integrations/__init__.py +12 -12
  13. aws_cdk/aws_appconfig/__init__.py +59 -59
  14. aws_cdk/aws_appflow/__init__.py +20 -20
  15. aws_cdk/aws_appintegrations/__init__.py +19 -19
  16. aws_cdk/aws_applicationautoscaling/__init__.py +31 -16
  17. aws_cdk/aws_applicationinsights/__init__.py +11 -11
  18. aws_cdk/aws_applicationsignals/__init__.py +5 -5
  19. aws_cdk/aws_appmesh/__init__.py +35 -35
  20. aws_cdk/aws_apprunner/__init__.py +25 -25
  21. aws_cdk/aws_appstream/__init__.py +105 -105
  22. aws_cdk/aws_appsync/__init__.py +89 -89
  23. aws_cdk/aws_apptest/__init__.py +25 -25
  24. aws_cdk/aws_aps/__init__.py +14 -14
  25. aws_cdk/aws_arczonalshift/__init__.py +200 -3
  26. aws_cdk/aws_athena/__init__.py +25 -25
  27. aws_cdk/aws_auditmanager/__init__.py +15 -15
  28. aws_cdk/aws_autoscaling/__init__.py +84 -84
  29. aws_cdk/aws_autoscalingplans/__init__.py +2 -2
  30. aws_cdk/aws_b2bi/__init__.py +24 -24
  31. aws_cdk/aws_backup/__init__.py +33 -33
  32. aws_cdk/aws_backupgateway/__init__.py +7 -7
  33. aws_cdk/aws_batch/__init__.py +289 -35
  34. aws_cdk/aws_bcmdataexports/__init__.py +2 -2
  35. aws_cdk/aws_bedrock/__init__.py +13239 -3277
  36. aws_cdk/aws_billingconductor/__init__.py +28 -28
  37. aws_cdk/aws_budgets/__init__.py +12 -12
  38. aws_cdk/aws_cassandra/__init__.py +16 -16
  39. aws_cdk/aws_ce/__init__.py +17 -17
  40. aws_cdk/aws_certificatemanager/__init__.py +9 -9
  41. aws_cdk/aws_chatbot/__init__.py +22 -22
  42. aws_cdk/aws_cleanrooms/__init__.py +2470 -307
  43. aws_cdk/aws_cleanroomsml/__init__.py +5 -5
  44. aws_cdk/aws_cloud9/__init__.py +10 -10
  45. aws_cdk/aws_cloudformation/__init__.py +94 -69
  46. aws_cdk/aws_cloudfront/__init__.py +31 -30
  47. aws_cdk/aws_cloudtrail/__init__.py +46 -44
  48. aws_cdk/aws_cloudwatch/__init__.py +61 -69
  49. aws_cdk/aws_codeartifact/__init__.py +19 -19
  50. aws_cdk/aws_codebuild/__init__.py +60 -68
  51. aws_cdk/aws_codecommit/__init__.py +10 -6
  52. aws_cdk/aws_codeconnections/__init__.py +5 -5
  53. aws_cdk/aws_codedeploy/__init__.py +28 -28
  54. aws_cdk/aws_codeguruprofiler/__init__.py +5 -5
  55. aws_cdk/aws_codegurureviewer/__init__.py +6 -6
  56. aws_cdk/aws_codepipeline/__init__.py +849 -52
  57. aws_cdk/aws_codepipeline_actions/__init__.py +1 -1
  58. aws_cdk/aws_codestar/__init__.py +8 -8
  59. aws_cdk/aws_codestarconnections/__init__.py +17 -17
  60. aws_cdk/aws_codestarnotifications/__init__.py +10 -10
  61. aws_cdk/aws_cognito/__init__.py +465 -133
  62. aws_cdk/aws_comprehend/__init__.py +20 -20
  63. aws_cdk/aws_config/__init__.py +67 -67
  64. aws_cdk/aws_connect/__init__.py +139 -137
  65. aws_cdk/aws_connectcampaigns/__init__.py +5 -5
  66. aws_cdk/aws_controltower/__init__.py +12 -12
  67. aws_cdk/aws_cur/__init__.py +12 -12
  68. aws_cdk/aws_customerprofiles/__init__.py +36 -36
  69. aws_cdk/aws_databrew/__init__.py +45 -45
  70. aws_cdk/aws_datapipeline/__init__.py +12 -8
  71. aws_cdk/aws_datasync/__init__.py +119 -117
  72. aws_cdk/aws_datazone/__init__.py +63 -63
  73. aws_cdk/aws_dax/__init__.py +20 -20
  74. aws_cdk/aws_deadline/__init__.py +221 -292
  75. aws_cdk/aws_detective/__init__.py +8 -8
  76. aws_cdk/aws_devicefarm/__init__.py +37 -37
  77. aws_cdk/aws_devopsguru/__init__.py +2 -2
  78. aws_cdk/aws_directoryservice/__init__.py +15 -15
  79. aws_cdk/aws_dlm/__init__.py +12 -12
  80. aws_cdk/aws_dms/__init__.py +300 -298
  81. aws_cdk/aws_docdb/__init__.py +49 -49
  82. aws_cdk/aws_docdbelastic/__init__.py +14 -14
  83. aws_cdk/aws_dynamodb/__init__.py +371 -37
  84. aws_cdk/aws_ec2/__init__.py +900 -606
  85. aws_cdk/aws_ecr/__init__.py +117 -77
  86. aws_cdk/aws_ecr_assets/__init__.py +4 -4
  87. aws_cdk/aws_ecs/__init__.py +190 -191
  88. aws_cdk/aws_ecs_patterns/__init__.py +2 -2
  89. aws_cdk/aws_efs/__init__.py +22 -22
  90. aws_cdk/aws_eks/__init__.py +177 -61
  91. aws_cdk/aws_elasticache/__init__.py +218 -226
  92. aws_cdk/aws_elasticbeanstalk/__init__.py +25 -25
  93. aws_cdk/aws_elasticloadbalancing/__init__.py +16 -16
  94. aws_cdk/aws_elasticloadbalancingv2/__init__.py +1066 -102
  95. aws_cdk/aws_elasticloadbalancingv2_targets/__init__.py +86 -4
  96. aws_cdk/aws_elasticsearch/__init__.py +16 -16
  97. aws_cdk/aws_emr/__init__.py +74 -74
  98. aws_cdk/aws_emrcontainers/__init__.py +3 -3
  99. aws_cdk/aws_emrserverless/__init__.py +157 -14
  100. aws_cdk/aws_entityresolution/__init__.py +613 -35
  101. aws_cdk/aws_events/__init__.py +42 -42
  102. aws_cdk/aws_eventschemas/__init__.py +16 -16
  103. aws_cdk/aws_evidently/__init__.py +38 -38
  104. aws_cdk/aws_finspace/__init__.py +8 -8
  105. aws_cdk/aws_fis/__init__.py +12 -12
  106. aws_cdk/aws_fms/__init__.py +21 -21
  107. aws_cdk/aws_forecast/__init__.py +18 -11
  108. aws_cdk/aws_frauddetector/__init__.py +35 -35
  109. aws_cdk/aws_fsx/__init__.py +35 -35
  110. aws_cdk/aws_gamelift/__init__.py +103 -103
  111. aws_cdk/aws_globalaccelerator/__init__.py +46 -24
  112. aws_cdk/aws_glue/__init__.py +132 -139
  113. aws_cdk/aws_grafana/__init__.py +17 -17
  114. aws_cdk/aws_greengrass/__init__.py +48 -48
  115. aws_cdk/aws_greengrassv2/__init__.py +10 -10
  116. aws_cdk/aws_groundstation/__init__.py +16 -16
  117. aws_cdk/aws_guardduty/__init__.py +40 -38
  118. aws_cdk/aws_healthimaging/__init__.py +3 -3
  119. aws_cdk/aws_healthlake/__init__.py +6 -6
  120. aws_cdk/aws_iam/__init__.py +120 -122
  121. aws_cdk/aws_identitystore/__init__.py +6 -6
  122. aws_cdk/aws_imagebuilder/__init__.py +92 -92
  123. aws_cdk/aws_inspector/__init__.py +8 -8
  124. aws_cdk/aws_inspectorv2/__init__.py +102 -97
  125. aws_cdk/aws_internetmonitor/__init__.py +12 -12
  126. aws_cdk/aws_iot/__init__.py +141 -141
  127. aws_cdk/aws_iot1click/__init__.py +9 -9
  128. aws_cdk/aws_iotanalytics/__init__.py +21 -21
  129. aws_cdk/aws_iotcoredeviceadvisor/__init__.py +2 -2
  130. aws_cdk/aws_iotevents/__init__.py +20 -20
  131. aws_cdk/aws_iotfleethub/__init__.py +4 -4
  132. aws_cdk/aws_iotfleetwise/__init__.py +45 -45
  133. aws_cdk/aws_iotsitewise/__init__.py +40 -40
  134. aws_cdk/aws_iotthingsgraph/__init__.py +2 -2
  135. aws_cdk/aws_iottwinmaker/__init__.py +34 -34
  136. aws_cdk/aws_iotwireless/__init__.py +66 -66
  137. aws_cdk/aws_ivs/__init__.py +32 -32
  138. aws_cdk/aws_ivschat/__init__.py +9 -9
  139. aws_cdk/aws_kafkaconnect/__init__.py +22 -22
  140. aws_cdk/aws_kendra/__init__.py +28 -28
  141. aws_cdk/aws_kendraranking/__init__.py +4 -4
  142. aws_cdk/aws_kinesis/__init__.py +8 -8
  143. aws_cdk/aws_kinesisanalytics/__init__.py +23 -23
  144. aws_cdk/aws_kinesisanalyticsv2/__init__.py +15 -15
  145. aws_cdk/aws_kinesisfirehose/__init__.py +677 -18
  146. aws_cdk/aws_kinesisvideo/__init__.py +10 -10
  147. aws_cdk/aws_kms/__init__.py +20 -20
  148. aws_cdk/aws_lakeformation/__init__.py +36 -36
  149. aws_cdk/aws_lambda/__init__.py +174 -118
  150. aws_cdk/aws_launchwizard/__init__.py +508 -0
  151. aws_cdk/aws_lex/__init__.py +24 -24
  152. aws_cdk/aws_licensemanager/__init__.py +17 -17
  153. aws_cdk/aws_lightsail/__init__.py +90 -90
  154. aws_cdk/aws_location/__init__.py +41 -41
  155. aws_cdk/aws_logs/__init__.py +50 -50
  156. aws_cdk/aws_lookoutequipment/__init__.py +9 -9
  157. aws_cdk/aws_lookoutmetrics/__init__.py +10 -10
  158. aws_cdk/aws_lookoutvision/__init__.py +1 -1
  159. aws_cdk/aws_m2/__init__.py +20 -20
  160. aws_cdk/aws_macie/__init__.py +19 -19
  161. aws_cdk/aws_managedblockchain/__init__.py +10 -10
  162. aws_cdk/aws_mediaconnect/__init__.py +114 -77
  163. aws_cdk/aws_mediaconvert/__init__.py +20 -20
  164. aws_cdk/aws_medialive/__init__.py +44 -76
  165. aws_cdk/aws_mediapackage/__init__.py +38 -38
  166. aws_cdk/aws_mediapackagev2/__init__.py +178 -25
  167. aws_cdk/aws_mediastore/__init__.py +7 -7
  168. aws_cdk/aws_mediatailor/__init__.py +40 -40
  169. aws_cdk/aws_memorydb/__init__.py +41 -41
  170. aws_cdk/aws_msk/__init__.py +39 -39
  171. aws_cdk/aws_mwaa/__init__.py +25 -25
  172. aws_cdk/aws_neptune/__init__.py +55 -55
  173. aws_cdk/aws_neptunegraph/__init__.py +11 -11
  174. aws_cdk/aws_networkfirewall/__init__.py +36 -30
  175. aws_cdk/aws_networkmanager/__init__.py +1062 -91
  176. aws_cdk/aws_nimblestudio/__init__.py +31 -31
  177. aws_cdk/aws_oam/__init__.py +8 -8
  178. aws_cdk/aws_omics/__init__.py +36 -36
  179. aws_cdk/aws_opensearchserverless/__init__.py +25 -25
  180. aws_cdk/aws_opensearchservice/__init__.py +20 -20
  181. aws_cdk/aws_opsworks/__init__.py +87 -87
  182. aws_cdk/aws_opsworkscm/__init__.py +21 -21
  183. aws_cdk/aws_organizations/__init__.py +17 -17
  184. aws_cdk/aws_osis/__init__.py +122 -9
  185. aws_cdk/aws_panorama/__init__.py +27 -22
  186. aws_cdk/aws_paymentcryptography/__init__.py +7 -7
  187. aws_cdk/aws_pcaconnectorad/__init__.py +17 -17
  188. aws_cdk/aws_personalize/__init__.py +19 -19
  189. aws_cdk/aws_pinpoint/__init__.py +122 -122
  190. aws_cdk/aws_pinpointemail/__init__.py +16 -16
  191. aws_cdk/aws_pipes/__init__.py +14 -16
  192. aws_cdk/aws_proton/__init__.py +19 -19
  193. aws_cdk/aws_qbusiness/__init__.py +160 -45
  194. aws_cdk/aws_qldb/__init__.py +12 -12
  195. aws_cdk/aws_quicksight/__init__.py +91 -91
  196. aws_cdk/aws_ram/__init__.py +11 -11
  197. aws_cdk/aws_rds/__init__.py +365 -259
  198. aws_cdk/aws_redshift/__init__.py +136 -91
  199. aws_cdk/aws_redshiftserverless/__init__.py +27 -27
  200. aws_cdk/aws_refactorspaces/__init__.py +26 -26
  201. aws_cdk/aws_rekognition/__init__.py +16 -16
  202. aws_cdk/aws_resiliencehub/__init__.py +15 -15
  203. aws_cdk/aws_resourceexplorer2/__init__.py +8 -8
  204. aws_cdk/aws_resourcegroups/__init__.py +6 -6
  205. aws_cdk/aws_robomaker/__init__.py +25 -25
  206. aws_cdk/aws_rolesanywhere/__init__.py +67 -19
  207. aws_cdk/aws_route53/__init__.py +36 -36
  208. aws_cdk/aws_route53profiles/__init__.py +11 -11
  209. aws_cdk/aws_route53recoverycontrol/__init__.py +14 -14
  210. aws_cdk/aws_route53recoveryreadiness/__init__.py +13 -13
  211. aws_cdk/aws_route53resolver/__init__.py +123 -82
  212. aws_cdk/aws_rum/__init__.py +6 -6
  213. aws_cdk/aws_s3/__init__.py +136 -80
  214. aws_cdk/aws_s3_deployment/__init__.py +30 -24
  215. aws_cdk/aws_s3_notifications/__init__.py +3 -4
  216. aws_cdk/aws_s3express/__init__.py +5 -5
  217. aws_cdk/aws_s3objectlambda/__init__.py +6 -6
  218. aws_cdk/aws_s3outposts/__init__.py +16 -16
  219. aws_cdk/aws_sagemaker/__init__.py +2412 -280
  220. aws_cdk/aws_sam/__init__.py +101 -101
  221. aws_cdk/aws_scheduler/__init__.py +13 -13
  222. aws_cdk/aws_sdb/__init__.py +1 -1
  223. aws_cdk/aws_secretsmanager/__init__.py +20 -19
  224. aws_cdk/aws_securityhub/__init__.py +70 -57
  225. aws_cdk/aws_securitylake/__init__.py +341 -16
  226. aws_cdk/aws_servicecatalog/__init__.py +87 -87
  227. aws_cdk/aws_servicecatalogappregistry/__init__.py +12 -12
  228. aws_cdk/aws_servicediscovery/__init__.py +23 -23
  229. aws_cdk/aws_ses/__init__.py +12038 -5604
  230. aws_cdk/aws_shield/__init__.py +15 -15
  231. aws_cdk/aws_signer/__init__.py +9 -9
  232. aws_cdk/aws_simspaceweaver/__init__.py +5 -5
  233. aws_cdk/aws_sns/__init__.py +28 -28
  234. aws_cdk/aws_sqs/__init__.py +20 -20
  235. aws_cdk/aws_ssm/__init__.py +172 -101
  236. aws_cdk/aws_ssmcontacts/__init__.py +18 -18
  237. aws_cdk/aws_ssmincidents/__init__.py +11 -11
  238. aws_cdk/aws_sso/__init__.py +31 -31
  239. aws_cdk/aws_stepfunctions/__init__.py +370 -28
  240. aws_cdk/aws_supportapp/__init__.py +11 -11
  241. aws_cdk/aws_synthetics/__init__.py +18 -18
  242. aws_cdk/aws_systemsmanagersap/__init__.py +48 -7
  243. aws_cdk/aws_timestream/__init__.py +34 -34
  244. aws_cdk/aws_transfer/__init__.py +57 -57
  245. aws_cdk/aws_verifiedpermissions/__init__.py +11 -11
  246. aws_cdk/aws_voiceid/__init__.py +4 -4
  247. aws_cdk/aws_vpclattice/__init__.py +42 -42
  248. aws_cdk/aws_waf/__init__.py +17 -17
  249. aws_cdk/aws_wafregional/__init__.py +28 -28
  250. aws_cdk/aws_wafv2/__init__.py +39 -39
  251. aws_cdk/aws_wisdom/__init__.py +16 -16
  252. aws_cdk/aws_workspaces/__init__.py +18 -18
  253. aws_cdk/aws_workspacesthinclient/__init__.py +63 -9
  254. aws_cdk/aws_workspacesweb/__init__.py +87 -46
  255. aws_cdk/aws_xray/__init__.py +12 -12
  256. aws_cdk/cloud_assembly_schema/__init__.py +348 -239
  257. aws_cdk/custom_resources/__init__.py +283 -0
  258. aws_cdk/cx_api/__init__.py +15 -15
  259. aws_cdk/pipelines/__init__.py +172 -237
  260. {aws_cdk_lib-2.153.0.dist-info → aws_cdk_lib-2.154.0.dist-info}/METADATA +3 -2
  261. aws_cdk_lib-2.154.0.dist-info/RECORD +292 -0
  262. aws_cdk_lib-2.153.0.dist-info/RECORD +0 -291
  263. {aws_cdk_lib-2.153.0.dist-info → aws_cdk_lib-2.154.0.dist-info}/LICENSE +0 -0
  264. {aws_cdk_lib-2.153.0.dist-info → aws_cdk_lib-2.154.0.dist-info}/NOTICE +0 -0
  265. {aws_cdk_lib-2.153.0.dist-info → aws_cdk_lib-2.154.0.dist-info}/WHEEL +0 -0
  266. {aws_cdk_lib-2.153.0.dist-info → aws_cdk_lib-2.154.0.dist-info}/top_level.txt +0 -0
@@ -444,7 +444,7 @@ class CfnPublicRepository(
444
444
  if __debug__:
445
445
  type_hints = typing.get_type_hints(_typecheckingstub__ff52c4c89f76461de2458e82c2bfd20f4de3951ad8eab58aec1b52004c07cea7)
446
446
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
447
- jsii.set(self, "repositoryCatalogData", value)
447
+ jsii.set(self, "repositoryCatalogData", value) # pyright: ignore[reportArgumentType]
448
448
 
449
449
  @builtins.property
450
450
  @jsii.member(jsii_name="repositoryName")
@@ -457,7 +457,7 @@ class CfnPublicRepository(
457
457
  if __debug__:
458
458
  type_hints = typing.get_type_hints(_typecheckingstub__c540342cfab06c3e938dc25340d0df062558f4ba1bb13c342e9740ee0e1e909a)
459
459
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
460
- jsii.set(self, "repositoryName", value)
460
+ jsii.set(self, "repositoryName", value) # pyright: ignore[reportArgumentType]
461
461
 
462
462
  @builtins.property
463
463
  @jsii.member(jsii_name="repositoryPolicyText")
@@ -470,7 +470,7 @@ class CfnPublicRepository(
470
470
  if __debug__:
471
471
  type_hints = typing.get_type_hints(_typecheckingstub__3a5d0a391359eb22e8e450fd43d68011135dcfa6d843724b27da64f19e19aad7)
472
472
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
473
- jsii.set(self, "repositoryPolicyText", value)
473
+ jsii.set(self, "repositoryPolicyText", value) # pyright: ignore[reportArgumentType]
474
474
 
475
475
  @builtins.property
476
476
  @jsii.member(jsii_name="tagsRaw")
@@ -483,7 +483,7 @@ class CfnPublicRepository(
483
483
  if __debug__:
484
484
  type_hints = typing.get_type_hints(_typecheckingstub__e01e3d955755b76bef4d0ce1b9a558313454d69c44cb97d65b4fcb564602a54d)
485
485
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
486
- jsii.set(self, "tagsRaw", value)
486
+ jsii.set(self, "tagsRaw", value) # pyright: ignore[reportArgumentType]
487
487
 
488
488
  @jsii.data_type(
489
489
  jsii_type="aws-cdk-lib.aws_ecr.CfnPublicRepository.RepositoryCatalogDataProperty",
@@ -839,7 +839,7 @@ class CfnPullThroughCacheRule(
839
839
  if __debug__:
840
840
  type_hints = typing.get_type_hints(_typecheckingstub__a379fdfcc316f1fba45c0243614513599bd6a9e9b599a9e279a8cc606e4bf382)
841
841
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
842
- jsii.set(self, "credentialArn", value)
842
+ jsii.set(self, "credentialArn", value) # pyright: ignore[reportArgumentType]
843
843
 
844
844
  @builtins.property
845
845
  @jsii.member(jsii_name="ecrRepositoryPrefix")
@@ -852,7 +852,7 @@ class CfnPullThroughCacheRule(
852
852
  if __debug__:
853
853
  type_hints = typing.get_type_hints(_typecheckingstub__97e7364a9d8ce3c9c0a95d7d650a21956fb29a984bd55c4450ace32814a23728)
854
854
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
855
- jsii.set(self, "ecrRepositoryPrefix", value)
855
+ jsii.set(self, "ecrRepositoryPrefix", value) # pyright: ignore[reportArgumentType]
856
856
 
857
857
  @builtins.property
858
858
  @jsii.member(jsii_name="upstreamRegistry")
@@ -865,7 +865,7 @@ class CfnPullThroughCacheRule(
865
865
  if __debug__:
866
866
  type_hints = typing.get_type_hints(_typecheckingstub__9e6176654c03645cd104e31d54362eb32d0b3856b8d7015586ea920e9ef9cc77)
867
867
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
868
- jsii.set(self, "upstreamRegistry", value)
868
+ jsii.set(self, "upstreamRegistry", value) # pyright: ignore[reportArgumentType]
869
869
 
870
870
  @builtins.property
871
871
  @jsii.member(jsii_name="upstreamRegistryUrl")
@@ -878,7 +878,7 @@ class CfnPullThroughCacheRule(
878
878
  if __debug__:
879
879
  type_hints = typing.get_type_hints(_typecheckingstub__7eb1d214154bb7e817af1779f0f5bf9f4b1c880ec0a8357fa98987f1063b451f)
880
880
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
881
- jsii.set(self, "upstreamRegistryUrl", value)
881
+ jsii.set(self, "upstreamRegistryUrl", value) # pyright: ignore[reportArgumentType]
882
882
 
883
883
 
884
884
  @jsii.data_type(
@@ -1089,7 +1089,7 @@ class CfnRegistryPolicy(
1089
1089
  if __debug__:
1090
1090
  type_hints = typing.get_type_hints(_typecheckingstub__22f296a7fd25dcbd0e6d71e5f19c5a64bea31bc39494f50b1a2fdceb3a96d82b)
1091
1091
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1092
- jsii.set(self, "policyText", value)
1092
+ jsii.set(self, "policyText", value) # pyright: ignore[reportArgumentType]
1093
1093
 
1094
1094
 
1095
1095
  @jsii.data_type(
@@ -1270,7 +1270,7 @@ class CfnReplicationConfiguration(
1270
1270
  if __debug__:
1271
1271
  type_hints = typing.get_type_hints(_typecheckingstub__99f4c1062f6a81bbbbbb1ec51556be75ca089974820458f2cf7c2b6ef30a1f4b)
1272
1272
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1273
- jsii.set(self, "replicationConfiguration", value)
1273
+ jsii.set(self, "replicationConfiguration", value) # pyright: ignore[reportArgumentType]
1274
1274
 
1275
1275
  @jsii.data_type(
1276
1276
  jsii_type="aws-cdk-lib.aws_ecr.CfnReplicationConfiguration.ReplicationConfigurationProperty",
@@ -1811,7 +1811,7 @@ class CfnRepository(
1811
1811
  if __debug__:
1812
1812
  type_hints = typing.get_type_hints(_typecheckingstub__0cdf31a68d1403243dabdc584938d9cf5b1769c665a1d405daaaa8438f7d0367)
1813
1813
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1814
- jsii.set(self, "emptyOnDelete", value)
1814
+ jsii.set(self, "emptyOnDelete", value) # pyright: ignore[reportArgumentType]
1815
1815
 
1816
1816
  @builtins.property
1817
1817
  @jsii.member(jsii_name="encryptionConfiguration")
@@ -1829,7 +1829,7 @@ class CfnRepository(
1829
1829
  if __debug__:
1830
1830
  type_hints = typing.get_type_hints(_typecheckingstub__cf78a5a76e0710f9d352977f8ee877ef0fc7f3c43b6cd9839d2fbeaff522caa1)
1831
1831
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1832
- jsii.set(self, "encryptionConfiguration", value)
1832
+ jsii.set(self, "encryptionConfiguration", value) # pyright: ignore[reportArgumentType]
1833
1833
 
1834
1834
  @builtins.property
1835
1835
  @jsii.member(jsii_name="imageScanningConfiguration")
@@ -1847,7 +1847,7 @@ class CfnRepository(
1847
1847
  if __debug__:
1848
1848
  type_hints = typing.get_type_hints(_typecheckingstub__0ae9439aabd4d324bf1d5bdb5b430c995fa4f0fdc0cb44daa41909d48e778564)
1849
1849
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1850
- jsii.set(self, "imageScanningConfiguration", value)
1850
+ jsii.set(self, "imageScanningConfiguration", value) # pyright: ignore[reportArgumentType]
1851
1851
 
1852
1852
  @builtins.property
1853
1853
  @jsii.member(jsii_name="imageTagMutability")
@@ -1860,7 +1860,7 @@ class CfnRepository(
1860
1860
  if __debug__:
1861
1861
  type_hints = typing.get_type_hints(_typecheckingstub__6d75698f85ccefe489f53d4f155b619c9c3df1026fe201828f3f0ccc7b5fda28)
1862
1862
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1863
- jsii.set(self, "imageTagMutability", value)
1863
+ jsii.set(self, "imageTagMutability", value) # pyright: ignore[reportArgumentType]
1864
1864
 
1865
1865
  @builtins.property
1866
1866
  @jsii.member(jsii_name="lifecyclePolicy")
@@ -1878,7 +1878,7 @@ class CfnRepository(
1878
1878
  if __debug__:
1879
1879
  type_hints = typing.get_type_hints(_typecheckingstub__47418c52de9eb82b5a96dfa3524d84345309cf3a2f06fbbc30eaa7da852a33fa)
1880
1880
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1881
- jsii.set(self, "lifecyclePolicy", value)
1881
+ jsii.set(self, "lifecyclePolicy", value) # pyright: ignore[reportArgumentType]
1882
1882
 
1883
1883
  @builtins.property
1884
1884
  @jsii.member(jsii_name="repositoryName")
@@ -1891,7 +1891,7 @@ class CfnRepository(
1891
1891
  if __debug__:
1892
1892
  type_hints = typing.get_type_hints(_typecheckingstub__320e28aebae3ff1053b4006047e990e27e37c3a2753340ee0372d4f8e354bc2b)
1893
1893
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1894
- jsii.set(self, "repositoryName", value)
1894
+ jsii.set(self, "repositoryName", value) # pyright: ignore[reportArgumentType]
1895
1895
 
1896
1896
  @builtins.property
1897
1897
  @jsii.member(jsii_name="repositoryPolicyText")
@@ -1904,7 +1904,7 @@ class CfnRepository(
1904
1904
  if __debug__:
1905
1905
  type_hints = typing.get_type_hints(_typecheckingstub__ab6f8914cd6d9319d4c072a32100fe3532bf6bfdfe1b069100045f46efd7f432)
1906
1906
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1907
- jsii.set(self, "repositoryPolicyText", value)
1907
+ jsii.set(self, "repositoryPolicyText", value) # pyright: ignore[reportArgumentType]
1908
1908
 
1909
1909
  @builtins.property
1910
1910
  @jsii.member(jsii_name="tagsRaw")
@@ -1917,7 +1917,7 @@ class CfnRepository(
1917
1917
  if __debug__:
1918
1918
  type_hints = typing.get_type_hints(_typecheckingstub__a187140649b7378ce5c825b26017544130f832c6f44250242ffcc01b801ada76)
1919
1919
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1920
- jsii.set(self, "tagsRaw", value)
1920
+ jsii.set(self, "tagsRaw", value) # pyright: ignore[reportArgumentType]
1921
1921
 
1922
1922
  @jsii.data_type(
1923
1923
  jsii_type="aws-cdk-lib.aws_ecr.CfnRepository.EncryptionConfigurationProperty",
@@ -1933,11 +1933,11 @@ class CfnRepository(
1933
1933
  ) -> None:
1934
1934
  '''The encryption configuration for the repository. This determines how the contents of your repository are encrypted at rest.
1935
1935
 
1936
- By default, when no encryption configuration is set or the ``AES256`` encryption type is used, Amazon ECR uses server-side encryption with Amazon S3-managed encryption keys which encrypts your data at rest using an AES-256 encryption algorithm. This does not require any action on your part.
1936
+ By default, when no encryption configuration is set or the ``AES256`` encryption type is used, Amazon ECR uses server-side encryption with Amazon S3-managed encryption keys which encrypts your data at rest using an AES256 encryption algorithm. This does not require any action on your part.
1937
1937
 
1938
1938
  For more control over the encryption of the contents of your repository, you can use server-side encryption with AWS Key Management Service key stored in AWS Key Management Service ( AWS KMS ) to encrypt your images. For more information, see `Amazon ECR encryption at rest <https://docs.aws.amazon.com/AmazonECR/latest/userguide/encryption-at-rest.html>`_ in the *Amazon Elastic Container Registry User Guide* .
1939
1939
 
1940
- :param encryption_type: The encryption type to use. If you use the ``KMS`` encryption type, the contents of the repository will be encrypted using server-side encryption with AWS Key Management Service key stored in AWS KMS . When you use AWS KMS to encrypt your data, you can either use the default AWS managed AWS KMS key for Amazon ECR, or specify your own AWS KMS key, which you already created. For more information, see `Protecting data using server-side encryption with an AWS KMS key stored in AWS Key Management Service (SSE-KMS) <https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingKMSEncryption.html>`_ in the *Amazon Simple Storage Service Console Developer Guide* . If you use the ``AES256`` encryption type, Amazon ECR uses server-side encryption with Amazon S3-managed encryption keys which encrypts the images in the repository using an AES-256 encryption algorithm. For more information, see `Protecting data using server-side encryption with Amazon S3-managed encryption keys (SSE-S3) <https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingServerSideEncryption.html>`_ in the *Amazon Simple Storage Service Console Developer Guide* .
1940
+ :param encryption_type: The encryption type to use. If you use the ``KMS`` encryption type, the contents of the repository will be encrypted using server-side encryption with AWS Key Management Service key stored in AWS KMS . When you use AWS KMS to encrypt your data, you can either use the default AWS managed AWS KMS key for Amazon ECR, or specify your own AWS KMS key, which you already created. For more information, see `Protecting data using server-side encryption with an AWS KMS key stored in AWS Key Management Service (SSE-KMS) <https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingKMSEncryption.html>`_ in the *Amazon Simple Storage Service Console Developer Guide* . If you use the ``AES256`` encryption type, Amazon ECR uses server-side encryption with Amazon S3-managed encryption keys which encrypts the images in the repository using an AES256 encryption algorithm. For more information, see `Protecting data using server-side encryption with Amazon S3-managed encryption keys (SSE-S3) <https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingServerSideEncryption.html>`_ in the *Amazon Simple Storage Service Console Developer Guide* .
1941
1941
  :param kms_key: If you use the ``KMS`` encryption type, specify the AWS KMS key to use for encryption. The alias, key ID, or full ARN of the AWS KMS key can be specified. The key must exist in the same Region as the repository. If no key is specified, the default AWS managed AWS KMS key for Amazon ECR will be used.
1942
1942
 
1943
1943
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ecr-repository-encryptionconfiguration.html
@@ -1972,7 +1972,7 @@ class CfnRepository(
1972
1972
 
1973
1973
  If you use the ``KMS`` encryption type, the contents of the repository will be encrypted using server-side encryption with AWS Key Management Service key stored in AWS KMS . When you use AWS KMS to encrypt your data, you can either use the default AWS managed AWS KMS key for Amazon ECR, or specify your own AWS KMS key, which you already created. For more information, see `Protecting data using server-side encryption with an AWS KMS key stored in AWS Key Management Service (SSE-KMS) <https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingKMSEncryption.html>`_ in the *Amazon Simple Storage Service Console Developer Guide* .
1974
1974
 
1975
- If you use the ``AES256`` encryption type, Amazon ECR uses server-side encryption with Amazon S3-managed encryption keys which encrypts the images in the repository using an AES-256 encryption algorithm. For more information, see `Protecting data using server-side encryption with Amazon S3-managed encryption keys (SSE-S3) <https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingServerSideEncryption.html>`_ in the *Amazon Simple Storage Service Console Developer Guide* .
1975
+ If you use the ``AES256`` encryption type, Amazon ECR uses server-side encryption with Amazon S3-managed encryption keys which encrypts the images in the repository using an AES256 encryption algorithm. For more information, see `Protecting data using server-side encryption with Amazon S3-managed encryption keys (SSE-S3) <https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingServerSideEncryption.html>`_ in the *Amazon Simple Storage Service Console Developer Guide* .
1976
1976
 
1977
1977
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ecr-repository-encryptionconfiguration.html#cfn-ecr-repository-encryptionconfiguration-encryptiontype
1978
1978
  '''
@@ -2145,7 +2145,7 @@ class CfnRepositoryCreationTemplate(
2145
2145
  metaclass=jsii.JSIIMeta,
2146
2146
  jsii_type="aws-cdk-lib.aws_ecr.CfnRepositoryCreationTemplate",
2147
2147
  ):
2148
- '''AWS::ECR::RepositoryCreationTemplate is used to create repository with configuration from a pre-defined template.
2148
+ '''The details of the repository creation template associated with the request.
2149
2149
 
2150
2150
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-ecr-repositorycreationtemplate.html
2151
2151
  :cloudformationResource: AWS::ECR::RepositoryCreationTemplate
@@ -2162,6 +2162,7 @@ class CfnRepositoryCreationTemplate(
2162
2162
  prefix="prefix",
2163
2163
 
2164
2164
  # the properties below are optional
2165
+ custom_role_arn="customRoleArn",
2165
2166
  description="description",
2166
2167
  encryption_configuration=ecr.CfnRepositoryCreationTemplate.EncryptionConfigurationProperty(
2167
2168
  encryption_type="encryptionType",
@@ -2186,6 +2187,7 @@ class CfnRepositoryCreationTemplate(
2186
2187
  *,
2187
2188
  applied_for: typing.Sequence[builtins.str],
2188
2189
  prefix: builtins.str,
2190
+ custom_role_arn: typing.Optional[builtins.str] = None,
2189
2191
  description: typing.Optional[builtins.str] = None,
2190
2192
  encryption_configuration: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnRepositoryCreationTemplate.EncryptionConfigurationProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
2191
2193
  image_tag_mutability: typing.Optional[builtins.str] = None,
@@ -2196,14 +2198,15 @@ class CfnRepositoryCreationTemplate(
2196
2198
  '''
2197
2199
  :param scope: Scope in which this resource is defined.
2198
2200
  :param id: Construct identifier for this resource (unique in its scope).
2199
- :param applied_for: A list of enumerable Strings representing the repository creation scenarios that the template will apply towards.
2200
- :param prefix: The prefix use to match the repository name and apply the template.
2201
- :param description: The description of the template.
2202
- :param encryption_configuration: The encryption configuration for the repository. This determines how the contents of your repository are encrypted at rest. By default, when no encryption configuration is set or the ``AES256`` encryption type is used, Amazon ECR uses server-side encryption with Amazon S3-managed encryption keys which encrypts your data at rest using an AES-256 encryption algorithm. This does not require any action on your part. For more control over the encryption of the contents of your repository, you can use server-side encryption with AWS Key Management Service key stored in AWS Key Management Service ( AWS KMS ) to encrypt your images. For more information, see `Amazon ECR encryption at rest <https://docs.aws.amazon.com/AmazonECR/latest/userguide/encryption-at-rest.html>`_ in the *Amazon Elastic Container Registry User Guide* .
2203
- :param image_tag_mutability: The image tag mutability setting for the repository.
2204
- :param lifecycle_policy: The JSON lifecycle policy text to apply to the repository. For information about lifecycle policy syntax, see https://docs.aws.amazon.com/AmazonECR/latest/userguide/LifecyclePolicies.html
2205
- :param repository_policy: The JSON repository policy text to apply to the repository. For more information, see https://docs.aws.amazon.com/AmazonECR/latest/userguide/RepositoryPolicyExamples.html
2206
- :param resource_tags: The tags attached to the resource.
2201
+ :param applied_for: A list of enumerable Strings representing the repository creation scenarios that this template will apply towards. The two supported scenarios are PULL_THROUGH_CACHE and REPLICATION
2202
+ :param prefix: The repository namespace prefix associated with the repository creation template.
2203
+ :param custom_role_arn: The ARN of the role to be assumed by Amazon ECR. Amazon ECR will assume your supplied role when the customRoleArn is specified. When this field isn't specified, Amazon ECR will use the service-linked role for the repository creation template.
2204
+ :param description: The description associated with the repository creation template.
2205
+ :param encryption_configuration: The encryption configuration associated with the repository creation template.
2206
+ :param image_tag_mutability: The tag mutability setting for the repository. If this parameter is omitted, the default setting of MUTABLE will be used which will allow image tags to be overwritten. If IMMUTABLE is specified, all image tags within the repository will be immutable which will prevent them from being overwritten.
2207
+ :param lifecycle_policy: The lifecycle policy to use for repositories created using the template.
2208
+ :param repository_policy: he repository policy to apply to repositories created using the template. A repository policy is a permissions policy associated with a repository to control access permissions.
2209
+ :param resource_tags: The metadata to apply to the repository to help you categorize and organize. Each tag consists of a key and an optional value, both of which you define. Tag keys can have a maximum character length of 128 characters, and tag values can have a maximum length of 256 characters.
2207
2210
  '''
2208
2211
  if __debug__:
2209
2212
  type_hints = typing.get_type_hints(_typecheckingstub__494445c3594e6c48becf87b896b56289e6923275ed1be048e55a955aad19112e)
@@ -2212,6 +2215,7 @@ class CfnRepositoryCreationTemplate(
2212
2215
  props = CfnRepositoryCreationTemplateProps(
2213
2216
  applied_for=applied_for,
2214
2217
  prefix=prefix,
2218
+ custom_role_arn=custom_role_arn,
2215
2219
  description=description,
2216
2220
  encryption_configuration=encryption_configuration,
2217
2221
  image_tag_mutability=image_tag_mutability,
@@ -2255,7 +2259,7 @@ class CfnRepositoryCreationTemplate(
2255
2259
  @builtins.property
2256
2260
  @jsii.member(jsii_name="attrCreatedAt")
2257
2261
  def attr_created_at(self) -> builtins.str:
2258
- '''Create timestamp of the template.
2262
+ '''The date and time, in JavaScript date format, when the repository creation template was created.
2259
2263
 
2260
2264
  :cloudformationAttribute: CreatedAt
2261
2265
  '''
@@ -2264,7 +2268,7 @@ class CfnRepositoryCreationTemplate(
2264
2268
  @builtins.property
2265
2269
  @jsii.member(jsii_name="attrUpdatedAt")
2266
2270
  def attr_updated_at(self) -> builtins.str:
2267
- '''Update timestamp of the template.
2271
+ '''The date and time, in JavaScript date format, when the repository creation template was last updated.
2268
2272
 
2269
2273
  :cloudformationAttribute: UpdatedAt
2270
2274
  '''
@@ -2278,7 +2282,7 @@ class CfnRepositoryCreationTemplate(
2278
2282
  @builtins.property
2279
2283
  @jsii.member(jsii_name="appliedFor")
2280
2284
  def applied_for(self) -> typing.List[builtins.str]:
2281
- '''A list of enumerable Strings representing the repository creation scenarios that the template will apply towards.'''
2285
+ '''A list of enumerable Strings representing the repository creation scenarios that this template will apply towards.'''
2282
2286
  return typing.cast(typing.List[builtins.str], jsii.get(self, "appliedFor"))
2283
2287
 
2284
2288
  @applied_for.setter
@@ -2286,12 +2290,12 @@ class CfnRepositoryCreationTemplate(
2286
2290
  if __debug__:
2287
2291
  type_hints = typing.get_type_hints(_typecheckingstub__d70128c5c73464a6960bdf3e12180f730d72102eeb954991a5ee91b6ced476e1)
2288
2292
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2289
- jsii.set(self, "appliedFor", value)
2293
+ jsii.set(self, "appliedFor", value) # pyright: ignore[reportArgumentType]
2290
2294
 
2291
2295
  @builtins.property
2292
2296
  @jsii.member(jsii_name="prefix")
2293
2297
  def prefix(self) -> builtins.str:
2294
- '''The prefix use to match the repository name and apply the template.'''
2298
+ '''The repository namespace prefix associated with the repository creation template.'''
2295
2299
  return typing.cast(builtins.str, jsii.get(self, "prefix"))
2296
2300
 
2297
2301
  @prefix.setter
@@ -2299,12 +2303,25 @@ class CfnRepositoryCreationTemplate(
2299
2303
  if __debug__:
2300
2304
  type_hints = typing.get_type_hints(_typecheckingstub__7421fb0840fe7d5bdb7ebafbc563d2498adfea23d49797835c3b7262cf06acbe)
2301
2305
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2302
- jsii.set(self, "prefix", value)
2306
+ jsii.set(self, "prefix", value) # pyright: ignore[reportArgumentType]
2307
+
2308
+ @builtins.property
2309
+ @jsii.member(jsii_name="customRoleArn")
2310
+ def custom_role_arn(self) -> typing.Optional[builtins.str]:
2311
+ '''The ARN of the role to be assumed by Amazon ECR.'''
2312
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "customRoleArn"))
2313
+
2314
+ @custom_role_arn.setter
2315
+ def custom_role_arn(self, value: typing.Optional[builtins.str]) -> None:
2316
+ if __debug__:
2317
+ type_hints = typing.get_type_hints(_typecheckingstub__f311f608554230e0e0d247def1a5aa1b17b63e6e3d1eff562fa5d4d2be6645db)
2318
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2319
+ jsii.set(self, "customRoleArn", value) # pyright: ignore[reportArgumentType]
2303
2320
 
2304
2321
  @builtins.property
2305
2322
  @jsii.member(jsii_name="description")
2306
2323
  def description(self) -> typing.Optional[builtins.str]:
2307
- '''The description of the template.'''
2324
+ '''The description associated with the repository creation template.'''
2308
2325
  return typing.cast(typing.Optional[builtins.str], jsii.get(self, "description"))
2309
2326
 
2310
2327
  @description.setter
@@ -2312,17 +2329,14 @@ class CfnRepositoryCreationTemplate(
2312
2329
  if __debug__:
2313
2330
  type_hints = typing.get_type_hints(_typecheckingstub__e5438699040b3663de96ef1aac64ac4344fe755ea3bb114b36fdb20c66eeb12e)
2314
2331
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2315
- jsii.set(self, "description", value)
2332
+ jsii.set(self, "description", value) # pyright: ignore[reportArgumentType]
2316
2333
 
2317
2334
  @builtins.property
2318
2335
  @jsii.member(jsii_name="encryptionConfiguration")
2319
2336
  def encryption_configuration(
2320
2337
  self,
2321
2338
  ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnRepositoryCreationTemplate.EncryptionConfigurationProperty"]]:
2322
- '''The encryption configuration for the repository.
2323
-
2324
- This determines how the contents of your repository are encrypted at rest.
2325
- '''
2339
+ '''The encryption configuration associated with the repository creation template.'''
2326
2340
  return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnRepositoryCreationTemplate.EncryptionConfigurationProperty"]], jsii.get(self, "encryptionConfiguration"))
2327
2341
 
2328
2342
  @encryption_configuration.setter
@@ -2333,12 +2347,12 @@ class CfnRepositoryCreationTemplate(
2333
2347
  if __debug__:
2334
2348
  type_hints = typing.get_type_hints(_typecheckingstub__dc9a1c0060c4bcb98843249551561d40d0d01c6137b55d2fc6b20909c4d50df4)
2335
2349
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2336
- jsii.set(self, "encryptionConfiguration", value)
2350
+ jsii.set(self, "encryptionConfiguration", value) # pyright: ignore[reportArgumentType]
2337
2351
 
2338
2352
  @builtins.property
2339
2353
  @jsii.member(jsii_name="imageTagMutability")
2340
2354
  def image_tag_mutability(self) -> typing.Optional[builtins.str]:
2341
- '''The image tag mutability setting for the repository.'''
2355
+ '''The tag mutability setting for the repository.'''
2342
2356
  return typing.cast(typing.Optional[builtins.str], jsii.get(self, "imageTagMutability"))
2343
2357
 
2344
2358
  @image_tag_mutability.setter
@@ -2346,12 +2360,12 @@ class CfnRepositoryCreationTemplate(
2346
2360
  if __debug__:
2347
2361
  type_hints = typing.get_type_hints(_typecheckingstub__0d03ac6e7b2975934cbd1c8b2470015fc671509b1b82834732e60abe440bad58)
2348
2362
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2349
- jsii.set(self, "imageTagMutability", value)
2363
+ jsii.set(self, "imageTagMutability", value) # pyright: ignore[reportArgumentType]
2350
2364
 
2351
2365
  @builtins.property
2352
2366
  @jsii.member(jsii_name="lifecyclePolicy")
2353
2367
  def lifecycle_policy(self) -> typing.Optional[builtins.str]:
2354
- '''The JSON lifecycle policy text to apply to the repository.'''
2368
+ '''The lifecycle policy to use for repositories created using the template.'''
2355
2369
  return typing.cast(typing.Optional[builtins.str], jsii.get(self, "lifecyclePolicy"))
2356
2370
 
2357
2371
  @lifecycle_policy.setter
@@ -2359,12 +2373,12 @@ class CfnRepositoryCreationTemplate(
2359
2373
  if __debug__:
2360
2374
  type_hints = typing.get_type_hints(_typecheckingstub__e2e08b01e66ab87aacff8f76d06c2abf47c27bd4366b69a73969d43a0b0b636a)
2361
2375
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2362
- jsii.set(self, "lifecyclePolicy", value)
2376
+ jsii.set(self, "lifecyclePolicy", value) # pyright: ignore[reportArgumentType]
2363
2377
 
2364
2378
  @builtins.property
2365
2379
  @jsii.member(jsii_name="repositoryPolicy")
2366
2380
  def repository_policy(self) -> typing.Optional[builtins.str]:
2367
- '''The JSON repository policy text to apply to the repository.'''
2381
+ '''he repository policy to apply to repositories created using the template.'''
2368
2382
  return typing.cast(typing.Optional[builtins.str], jsii.get(self, "repositoryPolicy"))
2369
2383
 
2370
2384
  @repository_policy.setter
@@ -2372,14 +2386,14 @@ class CfnRepositoryCreationTemplate(
2372
2386
  if __debug__:
2373
2387
  type_hints = typing.get_type_hints(_typecheckingstub__6133d22d20cb78fbb430ebd26935743e57cfc66d8da0d8b426c625527396018f)
2374
2388
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2375
- jsii.set(self, "repositoryPolicy", value)
2389
+ jsii.set(self, "repositoryPolicy", value) # pyright: ignore[reportArgumentType]
2376
2390
 
2377
2391
  @builtins.property
2378
2392
  @jsii.member(jsii_name="resourceTags")
2379
2393
  def resource_tags(
2380
2394
  self,
2381
2395
  ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, _CfnTag_f6864754]]]]:
2382
- '''The tags attached to the resource.'''
2396
+ '''The metadata to apply to the repository to help you categorize and organize.'''
2383
2397
  return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, _CfnTag_f6864754]]]], jsii.get(self, "resourceTags"))
2384
2398
 
2385
2399
  @resource_tags.setter
@@ -2390,7 +2404,7 @@ class CfnRepositoryCreationTemplate(
2390
2404
  if __debug__:
2391
2405
  type_hints = typing.get_type_hints(_typecheckingstub__c2fb99e1f96881ee2eeb1081388dcf7c16b80d047a366d3bbc0d4a883ac0e52b)
2392
2406
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2393
- jsii.set(self, "resourceTags", value)
2407
+ jsii.set(self, "resourceTags", value) # pyright: ignore[reportArgumentType]
2394
2408
 
2395
2409
  @jsii.data_type(
2396
2410
  jsii_type="aws-cdk-lib.aws_ecr.CfnRepositoryCreationTemplate.EncryptionConfigurationProperty",
@@ -2406,11 +2420,11 @@ class CfnRepositoryCreationTemplate(
2406
2420
  ) -> None:
2407
2421
  '''The encryption configuration for the repository. This determines how the contents of your repository are encrypted at rest.
2408
2422
 
2409
- By default, when no encryption configuration is set or the ``AES256`` encryption type is used, Amazon ECR uses server-side encryption with Amazon S3-managed encryption keys which encrypts your data at rest using an AES-256 encryption algorithm. This does not require any action on your part.
2423
+ By default, when no encryption configuration is set or the ``AES256`` encryption type is used, Amazon ECR uses server-side encryption with Amazon S3-managed encryption keys which encrypts your data at rest using an AES256 encryption algorithm. This does not require any action on your part.
2410
2424
 
2411
2425
  For more control over the encryption of the contents of your repository, you can use server-side encryption with AWS Key Management Service key stored in AWS Key Management Service ( AWS KMS ) to encrypt your images. For more information, see `Amazon ECR encryption at rest <https://docs.aws.amazon.com/AmazonECR/latest/userguide/encryption-at-rest.html>`_ in the *Amazon Elastic Container Registry User Guide* .
2412
2426
 
2413
- :param encryption_type: The encryption type to use. If you use the ``KMS`` encryption type, the contents of the repository will be encrypted using server-side encryption with AWS Key Management Service key stored in AWS KMS . When you use AWS KMS to encrypt your data, you can either use the default AWS managed AWS KMS key for Amazon ECR, or specify your own AWS KMS key, which you already created. For more information, see `Protecting data using server-side encryption with an AWS KMS key stored in AWS Key Management Service (SSE-KMS) <https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingKMSEncryption.html>`_ in the *Amazon Simple Storage Service Console Developer Guide* . If you use the ``AES256`` encryption type, Amazon ECR uses server-side encryption with Amazon S3-managed encryption keys which encrypts the images in the repository using an AES-256 encryption algorithm. For more information, see `Protecting data using server-side encryption with Amazon S3-managed encryption keys (SSE-S3) <https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingServerSideEncryption.html>`_ in the *Amazon Simple Storage Service Console Developer Guide* .
2427
+ :param encryption_type: The encryption type to use. If you use the ``KMS`` encryption type, the contents of the repository will be encrypted using server-side encryption with AWS Key Management Service key stored in AWS KMS . When you use AWS KMS to encrypt your data, you can either use the default AWS managed AWS KMS key for Amazon ECR, or specify your own AWS KMS key, which you already created. For more information, see `Protecting data using server-side encryption with an AWS KMS key stored in AWS Key Management Service (SSE-KMS) <https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingKMSEncryption.html>`_ in the *Amazon Simple Storage Service Console Developer Guide* . If you use the ``AES256`` encryption type, Amazon ECR uses server-side encryption with Amazon S3-managed encryption keys which encrypts the images in the repository using an AES256 encryption algorithm. For more information, see `Protecting data using server-side encryption with Amazon S3-managed encryption keys (SSE-S3) <https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingServerSideEncryption.html>`_ in the *Amazon Simple Storage Service Console Developer Guide* .
2414
2428
  :param kms_key: If you use the ``KMS`` encryption type, specify the AWS KMS key to use for encryption. The alias, key ID, or full ARN of the AWS KMS key can be specified. The key must exist in the same Region as the repository. If no key is specified, the default AWS managed AWS KMS key for Amazon ECR will be used.
2415
2429
 
2416
2430
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ecr-repositorycreationtemplate-encryptionconfiguration.html
@@ -2445,7 +2459,7 @@ class CfnRepositoryCreationTemplate(
2445
2459
 
2446
2460
  If you use the ``KMS`` encryption type, the contents of the repository will be encrypted using server-side encryption with AWS Key Management Service key stored in AWS KMS . When you use AWS KMS to encrypt your data, you can either use the default AWS managed AWS KMS key for Amazon ECR, or specify your own AWS KMS key, which you already created. For more information, see `Protecting data using server-side encryption with an AWS KMS key stored in AWS Key Management Service (SSE-KMS) <https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingKMSEncryption.html>`_ in the *Amazon Simple Storage Service Console Developer Guide* .
2447
2461
 
2448
- If you use the ``AES256`` encryption type, Amazon ECR uses server-side encryption with Amazon S3-managed encryption keys which encrypts the images in the repository using an AES-256 encryption algorithm. For more information, see `Protecting data using server-side encryption with Amazon S3-managed encryption keys (SSE-S3) <https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingServerSideEncryption.html>`_ in the *Amazon Simple Storage Service Console Developer Guide* .
2462
+ If you use the ``AES256`` encryption type, Amazon ECR uses server-side encryption with Amazon S3-managed encryption keys which encrypts the images in the repository using an AES256 encryption algorithm. For more information, see `Protecting data using server-side encryption with Amazon S3-managed encryption keys (SSE-S3) <https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingServerSideEncryption.html>`_ in the *Amazon Simple Storage Service Console Developer Guide* .
2449
2463
 
2450
2464
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ecr-repositorycreationtemplate-encryptionconfiguration.html#cfn-ecr-repositorycreationtemplate-encryptionconfiguration-encryptiontype
2451
2465
  '''
@@ -2482,6 +2496,7 @@ class CfnRepositoryCreationTemplate(
2482
2496
  name_mapping={
2483
2497
  "applied_for": "appliedFor",
2484
2498
  "prefix": "prefix",
2499
+ "custom_role_arn": "customRoleArn",
2485
2500
  "description": "description",
2486
2501
  "encryption_configuration": "encryptionConfiguration",
2487
2502
  "image_tag_mutability": "imageTagMutability",
@@ -2496,6 +2511,7 @@ class CfnRepositoryCreationTemplateProps:
2496
2511
  *,
2497
2512
  applied_for: typing.Sequence[builtins.str],
2498
2513
  prefix: builtins.str,
2514
+ custom_role_arn: typing.Optional[builtins.str] = None,
2499
2515
  description: typing.Optional[builtins.str] = None,
2500
2516
  encryption_configuration: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnRepositoryCreationTemplate.EncryptionConfigurationProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
2501
2517
  image_tag_mutability: typing.Optional[builtins.str] = None,
@@ -2505,14 +2521,15 @@ class CfnRepositoryCreationTemplateProps:
2505
2521
  ) -> None:
2506
2522
  '''Properties for defining a ``CfnRepositoryCreationTemplate``.
2507
2523
 
2508
- :param applied_for: A list of enumerable Strings representing the repository creation scenarios that the template will apply towards.
2509
- :param prefix: The prefix use to match the repository name and apply the template.
2510
- :param description: The description of the template.
2511
- :param encryption_configuration: The encryption configuration for the repository. This determines how the contents of your repository are encrypted at rest. By default, when no encryption configuration is set or the ``AES256`` encryption type is used, Amazon ECR uses server-side encryption with Amazon S3-managed encryption keys which encrypts your data at rest using an AES-256 encryption algorithm. This does not require any action on your part. For more control over the encryption of the contents of your repository, you can use server-side encryption with AWS Key Management Service key stored in AWS Key Management Service ( AWS KMS ) to encrypt your images. For more information, see `Amazon ECR encryption at rest <https://docs.aws.amazon.com/AmazonECR/latest/userguide/encryption-at-rest.html>`_ in the *Amazon Elastic Container Registry User Guide* .
2512
- :param image_tag_mutability: The image tag mutability setting for the repository.
2513
- :param lifecycle_policy: The JSON lifecycle policy text to apply to the repository. For information about lifecycle policy syntax, see https://docs.aws.amazon.com/AmazonECR/latest/userguide/LifecyclePolicies.html
2514
- :param repository_policy: The JSON repository policy text to apply to the repository. For more information, see https://docs.aws.amazon.com/AmazonECR/latest/userguide/RepositoryPolicyExamples.html
2515
- :param resource_tags: The tags attached to the resource.
2524
+ :param applied_for: A list of enumerable Strings representing the repository creation scenarios that this template will apply towards. The two supported scenarios are PULL_THROUGH_CACHE and REPLICATION
2525
+ :param prefix: The repository namespace prefix associated with the repository creation template.
2526
+ :param custom_role_arn: The ARN of the role to be assumed by Amazon ECR. Amazon ECR will assume your supplied role when the customRoleArn is specified. When this field isn't specified, Amazon ECR will use the service-linked role for the repository creation template.
2527
+ :param description: The description associated with the repository creation template.
2528
+ :param encryption_configuration: The encryption configuration associated with the repository creation template.
2529
+ :param image_tag_mutability: The tag mutability setting for the repository. If this parameter is omitted, the default setting of MUTABLE will be used which will allow image tags to be overwritten. If IMMUTABLE is specified, all image tags within the repository will be immutable which will prevent them from being overwritten.
2530
+ :param lifecycle_policy: The lifecycle policy to use for repositories created using the template.
2531
+ :param repository_policy: he repository policy to apply to repositories created using the template. A repository policy is a permissions policy associated with a repository to control access permissions.
2532
+ :param resource_tags: The metadata to apply to the repository to help you categorize and organize. Each tag consists of a key and an optional value, both of which you define. Tag keys can have a maximum character length of 128 characters, and tag values can have a maximum length of 256 characters.
2516
2533
 
2517
2534
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-ecr-repositorycreationtemplate.html
2518
2535
  :exampleMetadata: fixture=_generated
@@ -2528,6 +2545,7 @@ class CfnRepositoryCreationTemplateProps:
2528
2545
  prefix="prefix",
2529
2546
 
2530
2547
  # the properties below are optional
2548
+ custom_role_arn="customRoleArn",
2531
2549
  description="description",
2532
2550
  encryption_configuration=ecr.CfnRepositoryCreationTemplate.EncryptionConfigurationProperty(
2533
2551
  encryption_type="encryptionType",
@@ -2548,6 +2566,7 @@ class CfnRepositoryCreationTemplateProps:
2548
2566
  type_hints = typing.get_type_hints(_typecheckingstub__623a27e5bf9e58dfa2c0c25d5b312731cce32386963e30de33e3bd636fb982d3)
2549
2567
  check_type(argname="argument applied_for", value=applied_for, expected_type=type_hints["applied_for"])
2550
2568
  check_type(argname="argument prefix", value=prefix, expected_type=type_hints["prefix"])
2569
+ check_type(argname="argument custom_role_arn", value=custom_role_arn, expected_type=type_hints["custom_role_arn"])
2551
2570
  check_type(argname="argument description", value=description, expected_type=type_hints["description"])
2552
2571
  check_type(argname="argument encryption_configuration", value=encryption_configuration, expected_type=type_hints["encryption_configuration"])
2553
2572
  check_type(argname="argument image_tag_mutability", value=image_tag_mutability, expected_type=type_hints["image_tag_mutability"])
@@ -2558,6 +2577,8 @@ class CfnRepositoryCreationTemplateProps:
2558
2577
  "applied_for": applied_for,
2559
2578
  "prefix": prefix,
2560
2579
  }
2580
+ if custom_role_arn is not None:
2581
+ self._values["custom_role_arn"] = custom_role_arn
2561
2582
  if description is not None:
2562
2583
  self._values["description"] = description
2563
2584
  if encryption_configuration is not None:
@@ -2573,7 +2594,9 @@ class CfnRepositoryCreationTemplateProps:
2573
2594
 
2574
2595
  @builtins.property
2575
2596
  def applied_for(self) -> typing.List[builtins.str]:
2576
- '''A list of enumerable Strings representing the repository creation scenarios that the template will apply towards.
2597
+ '''A list of enumerable Strings representing the repository creation scenarios that this template will apply towards.
2598
+
2599
+ The two supported scenarios are PULL_THROUGH_CACHE and REPLICATION
2577
2600
 
2578
2601
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-ecr-repositorycreationtemplate.html#cfn-ecr-repositorycreationtemplate-appliedfor
2579
2602
  '''
@@ -2583,7 +2606,7 @@ class CfnRepositoryCreationTemplateProps:
2583
2606
 
2584
2607
  @builtins.property
2585
2608
  def prefix(self) -> builtins.str:
2586
- '''The prefix use to match the repository name and apply the template.
2609
+ '''The repository namespace prefix associated with the repository creation template.
2587
2610
 
2588
2611
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-ecr-repositorycreationtemplate.html#cfn-ecr-repositorycreationtemplate-prefix
2589
2612
  '''
@@ -2591,9 +2614,20 @@ class CfnRepositoryCreationTemplateProps:
2591
2614
  assert result is not None, "Required property 'prefix' is missing"
2592
2615
  return typing.cast(builtins.str, result)
2593
2616
 
2617
+ @builtins.property
2618
+ def custom_role_arn(self) -> typing.Optional[builtins.str]:
2619
+ '''The ARN of the role to be assumed by Amazon ECR.
2620
+
2621
+ Amazon ECR will assume your supplied role when the customRoleArn is specified. When this field isn't specified, Amazon ECR will use the service-linked role for the repository creation template.
2622
+
2623
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-ecr-repositorycreationtemplate.html#cfn-ecr-repositorycreationtemplate-customrolearn
2624
+ '''
2625
+ result = self._values.get("custom_role_arn")
2626
+ return typing.cast(typing.Optional[builtins.str], result)
2627
+
2594
2628
  @builtins.property
2595
2629
  def description(self) -> typing.Optional[builtins.str]:
2596
- '''The description of the template.
2630
+ '''The description associated with the repository creation template.
2597
2631
 
2598
2632
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-ecr-repositorycreationtemplate.html#cfn-ecr-repositorycreationtemplate-description
2599
2633
  '''
@@ -2604,11 +2638,7 @@ class CfnRepositoryCreationTemplateProps:
2604
2638
  def encryption_configuration(
2605
2639
  self,
2606
2640
  ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, CfnRepositoryCreationTemplate.EncryptionConfigurationProperty]]:
2607
- '''The encryption configuration for the repository. This determines how the contents of your repository are encrypted at rest.
2608
-
2609
- By default, when no encryption configuration is set or the ``AES256`` encryption type is used, Amazon ECR uses server-side encryption with Amazon S3-managed encryption keys which encrypts your data at rest using an AES-256 encryption algorithm. This does not require any action on your part.
2610
-
2611
- For more control over the encryption of the contents of your repository, you can use server-side encryption with AWS Key Management Service key stored in AWS Key Management Service ( AWS KMS ) to encrypt your images. For more information, see `Amazon ECR encryption at rest <https://docs.aws.amazon.com/AmazonECR/latest/userguide/encryption-at-rest.html>`_ in the *Amazon Elastic Container Registry User Guide* .
2641
+ '''The encryption configuration associated with the repository creation template.
2612
2642
 
2613
2643
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-ecr-repositorycreationtemplate.html#cfn-ecr-repositorycreationtemplate-encryptionconfiguration
2614
2644
  '''
@@ -2617,7 +2647,9 @@ class CfnRepositoryCreationTemplateProps:
2617
2647
 
2618
2648
  @builtins.property
2619
2649
  def image_tag_mutability(self) -> typing.Optional[builtins.str]:
2620
- '''The image tag mutability setting for the repository.
2650
+ '''The tag mutability setting for the repository.
2651
+
2652
+ If this parameter is omitted, the default setting of MUTABLE will be used which will allow image tags to be overwritten. If IMMUTABLE is specified, all image tags within the repository will be immutable which will prevent them from being overwritten.
2621
2653
 
2622
2654
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-ecr-repositorycreationtemplate.html#cfn-ecr-repositorycreationtemplate-imagetagmutability
2623
2655
  '''
@@ -2626,9 +2658,7 @@ class CfnRepositoryCreationTemplateProps:
2626
2658
 
2627
2659
  @builtins.property
2628
2660
  def lifecycle_policy(self) -> typing.Optional[builtins.str]:
2629
- '''The JSON lifecycle policy text to apply to the repository.
2630
-
2631
- For information about lifecycle policy syntax, see https://docs.aws.amazon.com/AmazonECR/latest/userguide/LifecyclePolicies.html
2661
+ '''The lifecycle policy to use for repositories created using the template.
2632
2662
 
2633
2663
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-ecr-repositorycreationtemplate.html#cfn-ecr-repositorycreationtemplate-lifecyclepolicy
2634
2664
  '''
@@ -2637,9 +2667,9 @@ class CfnRepositoryCreationTemplateProps:
2637
2667
 
2638
2668
  @builtins.property
2639
2669
  def repository_policy(self) -> typing.Optional[builtins.str]:
2640
- '''The JSON repository policy text to apply to the repository.
2670
+ '''he repository policy to apply to repositories created using the template.
2641
2671
 
2642
- For more information, see https://docs.aws.amazon.com/AmazonECR/latest/userguide/RepositoryPolicyExamples.html
2672
+ A repository policy is a permissions policy associated with a repository to control access permissions.
2643
2673
 
2644
2674
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-ecr-repositorycreationtemplate.html#cfn-ecr-repositorycreationtemplate-repositorypolicy
2645
2675
  '''
@@ -2650,7 +2680,9 @@ class CfnRepositoryCreationTemplateProps:
2650
2680
  def resource_tags(
2651
2681
  self,
2652
2682
  ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, _CfnTag_f6864754]]]]:
2653
- '''The tags attached to the resource.
2683
+ '''The metadata to apply to the repository to help you categorize and organize.
2684
+
2685
+ Each tag consists of a key and an optional value, both of which you define. Tag keys can have a maximum character length of 128 characters, and tag values can have a maximum length of 256 characters.
2654
2686
 
2655
2687
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-ecr-repositorycreationtemplate.html#cfn-ecr-repositorycreationtemplate-resourcetags
2656
2688
  '''
@@ -5273,6 +5305,7 @@ def _typecheckingstub__494445c3594e6c48becf87b896b56289e6923275ed1be048e55a955aa
5273
5305
  *,
5274
5306
  applied_for: typing.Sequence[builtins.str],
5275
5307
  prefix: builtins.str,
5308
+ custom_role_arn: typing.Optional[builtins.str] = None,
5276
5309
  description: typing.Optional[builtins.str] = None,
5277
5310
  encryption_configuration: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnRepositoryCreationTemplate.EncryptionConfigurationProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
5278
5311
  image_tag_mutability: typing.Optional[builtins.str] = None,
@@ -5307,6 +5340,12 @@ def _typecheckingstub__7421fb0840fe7d5bdb7ebafbc563d2498adfea23d49797835c3b7262c
5307
5340
  """Type checking stubs"""
5308
5341
  pass
5309
5342
 
5343
+ def _typecheckingstub__f311f608554230e0e0d247def1a5aa1b17b63e6e3d1eff562fa5d4d2be6645db(
5344
+ value: typing.Optional[builtins.str],
5345
+ ) -> None:
5346
+ """Type checking stubs"""
5347
+ pass
5348
+
5310
5349
  def _typecheckingstub__e5438699040b3663de96ef1aac64ac4344fe755ea3bb114b36fdb20c66eeb12e(
5311
5350
  value: typing.Optional[builtins.str],
5312
5351
  ) -> None:
@@ -5355,6 +5394,7 @@ def _typecheckingstub__623a27e5bf9e58dfa2c0c25d5b312731cce32386963e30de33e3bd636
5355
5394
  *,
5356
5395
  applied_for: typing.Sequence[builtins.str],
5357
5396
  prefix: builtins.str,
5397
+ custom_role_arn: typing.Optional[builtins.str] = None,
5358
5398
  description: typing.Optional[builtins.str] = None,
5359
5399
  encryption_configuration: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnRepositoryCreationTemplate.EncryptionConfigurationProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
5360
5400
  image_tag_mutability: typing.Optional[builtins.str] = None,