aws-cdk-lib 2.160.0__py3-none-any.whl → 2.161.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk-lib might be problematic. Click here for more details.

Files changed (51) hide show
  1. aws_cdk/__init__.py +21 -14
  2. aws_cdk/_jsii/__init__.py +1 -1
  3. aws_cdk/_jsii/{aws-cdk-lib@2.160.0.jsii.tgz → aws-cdk-lib@2.161.1.jsii.tgz} +0 -0
  4. aws_cdk/aws_apigatewayv2/__init__.py +13 -14
  5. aws_cdk/aws_autoscaling/__init__.py +2 -2
  6. aws_cdk/aws_b2bi/__init__.py +2283 -672
  7. aws_cdk/aws_batch/__init__.py +9 -5
  8. aws_cdk/aws_bedrock/__init__.py +52 -20
  9. aws_cdk/aws_cloudformation/__init__.py +9 -9
  10. aws_cdk/aws_cloudtrail/__init__.py +97 -183
  11. aws_cdk/aws_cloudwatch/__init__.py +38 -42
  12. aws_cdk/aws_datasync/__init__.py +1 -1
  13. aws_cdk/aws_ec2/__init__.py +114 -8
  14. aws_cdk/aws_ecs/__init__.py +513 -2
  15. aws_cdk/aws_eks/__init__.py +118 -2
  16. aws_cdk/aws_elasticloadbalancingv2/__init__.py +5 -3
  17. aws_cdk/aws_glue/__init__.py +386 -0
  18. aws_cdk/aws_iotfleetwise/__init__.py +49 -49
  19. aws_cdk/aws_iottwinmaker/__init__.py +4 -4
  20. aws_cdk/aws_iotwireless/__init__.py +2 -1
  21. aws_cdk/aws_kinesisfirehose/__init__.py +52 -76
  22. aws_cdk/aws_lambda/__init__.py +383 -244
  23. aws_cdk/aws_logs/__init__.py +431 -3
  24. aws_cdk/aws_mediaconnect/__init__.py +6 -4
  25. aws_cdk/aws_medialive/__init__.py +36 -0
  26. aws_cdk/aws_organizations/__init__.py +4 -3
  27. aws_cdk/aws_pipes/__init__.py +2 -2
  28. aws_cdk/aws_quicksight/__init__.py +1086 -6
  29. aws_cdk/aws_rds/__init__.py +158 -3
  30. aws_cdk/aws_route53resolver/__init__.py +3 -17
  31. aws_cdk/aws_s3/__init__.py +20 -11
  32. aws_cdk/aws_s3_deployment/__init__.py +45 -0
  33. aws_cdk/aws_s3express/__init__.py +314 -4
  34. aws_cdk/aws_sagemaker/__init__.py +44 -4
  35. aws_cdk/aws_secretsmanager/__init__.py +14 -7
  36. aws_cdk/aws_securityhub/__init__.py +16 -14
  37. aws_cdk/aws_ses/__init__.py +52 -18
  38. aws_cdk/aws_sqs/__init__.py +16 -14
  39. aws_cdk/aws_ssm/__init__.py +6 -2
  40. aws_cdk/aws_synthetics/__init__.py +46 -0
  41. aws_cdk/aws_waf/__init__.py +33 -22
  42. aws_cdk/aws_wafregional/__init__.py +36 -24
  43. aws_cdk/aws_workspacesweb/__init__.py +54 -3
  44. aws_cdk/cloudformation_include/__init__.py +28 -0
  45. aws_cdk/cx_api/__init__.py +50 -0
  46. {aws_cdk_lib-2.160.0.dist-info → aws_cdk_lib-2.161.1.dist-info}/METADATA +1 -1
  47. {aws_cdk_lib-2.160.0.dist-info → aws_cdk_lib-2.161.1.dist-info}/RECORD +51 -51
  48. {aws_cdk_lib-2.160.0.dist-info → aws_cdk_lib-2.161.1.dist-info}/LICENSE +0 -0
  49. {aws_cdk_lib-2.160.0.dist-info → aws_cdk_lib-2.161.1.dist-info}/NOTICE +0 -0
  50. {aws_cdk_lib-2.160.0.dist-info → aws_cdk_lib-2.161.1.dist-info}/WHEEL +0 -0
  51. {aws_cdk_lib-2.160.0.dist-info → aws_cdk_lib-2.161.1.dist-info}/top_level.txt +0 -0
@@ -30492,7 +30492,7 @@ class CfnNatGateway(
30492
30492
  :param connectivity_type: Indicates whether the NAT gateway supports public or private connectivity. The default is public connectivity.
30493
30493
  :param max_drain_duration_seconds: The maximum amount of time to wait (in seconds) before forcibly releasing the IP addresses if connections are still in progress. Default value is 350 seconds.
30494
30494
  :param private_ip_address: The private IPv4 address to assign to the NAT gateway. If you don't provide an address, a private IPv4 address will be automatically assigned.
30495
- :param secondary_allocation_ids: Secondary EIP allocation IDs. For more information, see `Create a NAT gateway <https://docs.aws.amazon.com/vpc/latest/userguide/vpc-nat-gateway.html#nat-gateway-creating>`_ in the *Amazon VPC User Guide* .
30495
+ :param secondary_allocation_ids: Secondary EIP allocation IDs. For more information, see `Create a NAT gateway <https://docs.aws.amazon.com/vpc/latest/userguide/nat-gateway-working-with.html>`_ in the *Amazon VPC User Guide* .
30496
30496
  :param secondary_private_ip_address_count: [Private NAT gateway only] The number of secondary private IPv4 addresses you want to assign to the NAT gateway. For more information about secondary addresses, see `Create a NAT gateway <https://docs.aws.amazon.com/vpc/latest/userguide/vpc-nat-gateway.html#nat-gateway-creating>`_ in the *Amazon Virtual Private Cloud User Guide* . ``SecondaryPrivateIpAddressCount`` and ``SecondaryPrivateIpAddresses`` cannot be set at the same time.
30497
30497
  :param secondary_private_ip_addresses: Secondary private IPv4 addresses. For more information about secondary addresses, see `Create a NAT gateway <https://docs.aws.amazon.com/vpc/latest/userguide/vpc-nat-gateway.html#nat-gateway-creating>`_ in the *Amazon Virtual Private Cloud User Guide* . ``SecondaryPrivateIpAddressCount`` and ``SecondaryPrivateIpAddresses`` cannot be set at the same time.
30498
30498
  :param tags: The tags for the NAT gateway.
@@ -30730,7 +30730,7 @@ class CfnNatGatewayProps:
30730
30730
  :param connectivity_type: Indicates whether the NAT gateway supports public or private connectivity. The default is public connectivity.
30731
30731
  :param max_drain_duration_seconds: The maximum amount of time to wait (in seconds) before forcibly releasing the IP addresses if connections are still in progress. Default value is 350 seconds.
30732
30732
  :param private_ip_address: The private IPv4 address to assign to the NAT gateway. If you don't provide an address, a private IPv4 address will be automatically assigned.
30733
- :param secondary_allocation_ids: Secondary EIP allocation IDs. For more information, see `Create a NAT gateway <https://docs.aws.amazon.com/vpc/latest/userguide/vpc-nat-gateway.html#nat-gateway-creating>`_ in the *Amazon VPC User Guide* .
30733
+ :param secondary_allocation_ids: Secondary EIP allocation IDs. For more information, see `Create a NAT gateway <https://docs.aws.amazon.com/vpc/latest/userguide/nat-gateway-working-with.html>`_ in the *Amazon VPC User Guide* .
30734
30734
  :param secondary_private_ip_address_count: [Private NAT gateway only] The number of secondary private IPv4 addresses you want to assign to the NAT gateway. For more information about secondary addresses, see `Create a NAT gateway <https://docs.aws.amazon.com/vpc/latest/userguide/vpc-nat-gateway.html#nat-gateway-creating>`_ in the *Amazon Virtual Private Cloud User Guide* . ``SecondaryPrivateIpAddressCount`` and ``SecondaryPrivateIpAddresses`` cannot be set at the same time.
30735
30735
  :param secondary_private_ip_addresses: Secondary private IPv4 addresses. For more information about secondary addresses, see `Create a NAT gateway <https://docs.aws.amazon.com/vpc/latest/userguide/vpc-nat-gateway.html#nat-gateway-creating>`_ in the *Amazon Virtual Private Cloud User Guide* . ``SecondaryPrivateIpAddressCount`` and ``SecondaryPrivateIpAddresses`` cannot be set at the same time.
30736
30736
  :param tags: The tags for the NAT gateway.
@@ -30850,7 +30850,7 @@ class CfnNatGatewayProps:
30850
30850
  def secondary_allocation_ids(self) -> typing.Optional[typing.List[builtins.str]]:
30851
30851
  '''Secondary EIP allocation IDs.
30852
30852
 
30853
- For more information, see `Create a NAT gateway <https://docs.aws.amazon.com/vpc/latest/userguide/vpc-nat-gateway.html#nat-gateway-creating>`_ in the *Amazon VPC User Guide* .
30853
+ For more information, see `Create a NAT gateway <https://docs.aws.amazon.com/vpc/latest/userguide/nat-gateway-working-with.html>`_ in the *Amazon VPC User Guide* .
30854
30854
 
30855
30855
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-ec2-natgateway.html#cfn-ec2-natgateway-secondaryallocationids
30856
30856
  '''
@@ -51260,6 +51260,7 @@ class CfnTransitGateway(
51260
51260
  dns_support="dnsSupport",
51261
51261
  multicast_support="multicastSupport",
51262
51262
  propagation_default_route_table_id="propagationDefaultRouteTableId",
51263
+ security_group_referencing_support="securityGroupReferencingSupport",
51263
51264
  tags=[CfnTag(
51264
51265
  key="key",
51265
51266
  value="value"
@@ -51283,6 +51284,7 @@ class CfnTransitGateway(
51283
51284
  dns_support: typing.Optional[builtins.str] = None,
51284
51285
  multicast_support: typing.Optional[builtins.str] = None,
51285
51286
  propagation_default_route_table_id: typing.Optional[builtins.str] = None,
51287
+ security_group_referencing_support: typing.Optional[builtins.str] = None,
51286
51288
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
51287
51289
  transit_gateway_cidr_blocks: typing.Optional[typing.Sequence[builtins.str]] = None,
51288
51290
  vpn_ecmp_support: typing.Optional[builtins.str] = None,
@@ -51299,6 +51301,7 @@ class CfnTransitGateway(
51299
51301
  :param dns_support: Enable or disable DNS support. Enabled by default.
51300
51302
  :param multicast_support: Indicates whether multicast is enabled on the transit gateway.
51301
51303
  :param propagation_default_route_table_id: The ID of the default propagation route table.
51304
+ :param security_group_referencing_support: Enables you to reference a security group across VPCs attached to a transit gateway (TGW). Use this option to simplify security group management and control of instance-to-instance traffic across VPCs that are connected by transit gateway. You can also use this option to migrate from VPC peering (which was the only option that supported security group referencing) to transit gateways (which now also support security group referencing). This option is disabled by default and there are no additional costs to use this feature. For important information about this feature, see `Create a transit gateway <https://docs.aws.amazon.com/vpc/latest/tgw/tgw-transit-gateways.html#create-tgw>`_ in the *AWS Transit Gateway Guide* .
51302
51305
  :param tags: The tags for the transit gateway.
51303
51306
  :param transit_gateway_cidr_blocks: The transit gateway CIDR blocks.
51304
51307
  :param vpn_ecmp_support: Enable or disable Equal Cost Multipath Protocol support. Enabled by default.
@@ -51317,6 +51320,7 @@ class CfnTransitGateway(
51317
51320
  dns_support=dns_support,
51318
51321
  multicast_support=multicast_support,
51319
51322
  propagation_default_route_table_id=propagation_default_route_table_id,
51323
+ security_group_referencing_support=security_group_referencing_support,
51320
51324
  tags=tags,
51321
51325
  transit_gateway_cidr_blocks=transit_gateway_cidr_blocks,
51322
51326
  vpn_ecmp_support=vpn_ecmp_support,
@@ -51514,6 +51518,22 @@ class CfnTransitGateway(
51514
51518
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
51515
51519
  jsii.set(self, "propagationDefaultRouteTableId", value) # pyright: ignore[reportArgumentType]
51516
51520
 
51521
+ @builtins.property
51522
+ @jsii.member(jsii_name="securityGroupReferencingSupport")
51523
+ def security_group_referencing_support(self) -> typing.Optional[builtins.str]:
51524
+ '''Enables you to reference a security group across VPCs attached to a transit gateway (TGW).'''
51525
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "securityGroupReferencingSupport"))
51526
+
51527
+ @security_group_referencing_support.setter
51528
+ def security_group_referencing_support(
51529
+ self,
51530
+ value: typing.Optional[builtins.str],
51531
+ ) -> None:
51532
+ if __debug__:
51533
+ type_hints = typing.get_type_hints(_typecheckingstub__a3f506ba1d4c7659981ecfc231f5fb9ba7e866a8317415667ead4b5ff07b05dc)
51534
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
51535
+ jsii.set(self, "securityGroupReferencingSupport", value) # pyright: ignore[reportArgumentType]
51536
+
51517
51537
  @builtins.property
51518
51538
  @jsii.member(jsii_name="tagsRaw")
51519
51539
  def tags_raw(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
@@ -51753,6 +51773,7 @@ class CfnTransitGatewayAttachment(
51753
51773
  "appliance_mode_support": "applianceModeSupport",
51754
51774
  "dns_support": "dnsSupport",
51755
51775
  "ipv6_support": "ipv6Support",
51776
+ "security_group_referencing_support": "securityGroupReferencingSupport",
51756
51777
  },
51757
51778
  )
51758
51779
  class OptionsProperty:
@@ -51762,12 +51783,14 @@ class CfnTransitGatewayAttachment(
51762
51783
  appliance_mode_support: typing.Optional[builtins.str] = None,
51763
51784
  dns_support: typing.Optional[builtins.str] = None,
51764
51785
  ipv6_support: typing.Optional[builtins.str] = None,
51786
+ security_group_referencing_support: typing.Optional[builtins.str] = None,
51765
51787
  ) -> None:
51766
51788
  '''Describes the VPC attachment options.
51767
51789
 
51768
51790
  :param appliance_mode_support: Enable or disable appliance mode support. The default is ``disable`` .
51769
51791
  :param dns_support: Enable or disable DNS support. The default is ``disable`` .
51770
51792
  :param ipv6_support: Enable or disable IPv6 support. The default is ``disable`` .
51793
+ :param security_group_referencing_support: Enables you to reference a security group across VPCs attached to a transit gateway (TGW). Use this option to simplify security group management and control of instance-to-instance traffic across VPCs that are connected by transit gateway. You can also use this option to migrate from VPC peering (which was the only option that supported security group referencing) to transit gateways (which now also support security group referencing). This option is disabled by default and there are no additional costs to use this feature. For important information about this feature, see `Create a transit gateway <https://docs.aws.amazon.com/vpc/latest/tgw/tgw-transit-gateways.html#create-tgw>`_ in the *AWS Transit Gateway Guide* .
51771
51794
 
51772
51795
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-transitgatewayattachment-options.html
51773
51796
  :exampleMetadata: fixture=_generated
@@ -51781,7 +51804,8 @@ class CfnTransitGatewayAttachment(
51781
51804
  options_property = ec2.CfnTransitGatewayAttachment.OptionsProperty(
51782
51805
  appliance_mode_support="applianceModeSupport",
51783
51806
  dns_support="dnsSupport",
51784
- ipv6_support="ipv6Support"
51807
+ ipv6_support="ipv6Support",
51808
+ security_group_referencing_support="securityGroupReferencingSupport"
51785
51809
  )
51786
51810
  '''
51787
51811
  if __debug__:
@@ -51789,6 +51813,7 @@ class CfnTransitGatewayAttachment(
51789
51813
  check_type(argname="argument appliance_mode_support", value=appliance_mode_support, expected_type=type_hints["appliance_mode_support"])
51790
51814
  check_type(argname="argument dns_support", value=dns_support, expected_type=type_hints["dns_support"])
51791
51815
  check_type(argname="argument ipv6_support", value=ipv6_support, expected_type=type_hints["ipv6_support"])
51816
+ check_type(argname="argument security_group_referencing_support", value=security_group_referencing_support, expected_type=type_hints["security_group_referencing_support"])
51792
51817
  self._values: typing.Dict[builtins.str, typing.Any] = {}
51793
51818
  if appliance_mode_support is not None:
51794
51819
  self._values["appliance_mode_support"] = appliance_mode_support
@@ -51796,6 +51821,8 @@ class CfnTransitGatewayAttachment(
51796
51821
  self._values["dns_support"] = dns_support
51797
51822
  if ipv6_support is not None:
51798
51823
  self._values["ipv6_support"] = ipv6_support
51824
+ if security_group_referencing_support is not None:
51825
+ self._values["security_group_referencing_support"] = security_group_referencing_support
51799
51826
 
51800
51827
  @builtins.property
51801
51828
  def appliance_mode_support(self) -> typing.Optional[builtins.str]:
@@ -51830,6 +51857,19 @@ class CfnTransitGatewayAttachment(
51830
51857
  result = self._values.get("ipv6_support")
51831
51858
  return typing.cast(typing.Optional[builtins.str], result)
51832
51859
 
51860
+ @builtins.property
51861
+ def security_group_referencing_support(self) -> typing.Optional[builtins.str]:
51862
+ '''Enables you to reference a security group across VPCs attached to a transit gateway (TGW).
51863
+
51864
+ Use this option to simplify security group management and control of instance-to-instance traffic across VPCs that are connected by transit gateway. You can also use this option to migrate from VPC peering (which was the only option that supported security group referencing) to transit gateways (which now also support security group referencing). This option is disabled by default and there are no additional costs to use this feature.
51865
+
51866
+ For important information about this feature, see `Create a transit gateway <https://docs.aws.amazon.com/vpc/latest/tgw/tgw-transit-gateways.html#create-tgw>`_ in the *AWS Transit Gateway Guide* .
51867
+
51868
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-transitgatewayattachment-options.html#cfn-ec2-transitgatewayattachment-options-securitygroupreferencingsupport
51869
+ '''
51870
+ result = self._values.get("security_group_referencing_support")
51871
+ return typing.cast(typing.Optional[builtins.str], result)
51872
+
51833
51873
  def __eq__(self, rhs: typing.Any) -> builtins.bool:
51834
51874
  return isinstance(rhs, self.__class__) and rhs._values == self._values
51835
51875
 
@@ -53954,6 +53994,7 @@ class CfnTransitGatewayPeeringAttachmentProps:
53954
53994
  "dns_support": "dnsSupport",
53955
53995
  "multicast_support": "multicastSupport",
53956
53996
  "propagation_default_route_table_id": "propagationDefaultRouteTableId",
53997
+ "security_group_referencing_support": "securityGroupReferencingSupport",
53957
53998
  "tags": "tags",
53958
53999
  "transit_gateway_cidr_blocks": "transitGatewayCidrBlocks",
53959
54000
  "vpn_ecmp_support": "vpnEcmpSupport",
@@ -53972,6 +54013,7 @@ class CfnTransitGatewayProps:
53972
54013
  dns_support: typing.Optional[builtins.str] = None,
53973
54014
  multicast_support: typing.Optional[builtins.str] = None,
53974
54015
  propagation_default_route_table_id: typing.Optional[builtins.str] = None,
54016
+ security_group_referencing_support: typing.Optional[builtins.str] = None,
53975
54017
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
53976
54018
  transit_gateway_cidr_blocks: typing.Optional[typing.Sequence[builtins.str]] = None,
53977
54019
  vpn_ecmp_support: typing.Optional[builtins.str] = None,
@@ -53987,6 +54029,7 @@ class CfnTransitGatewayProps:
53987
54029
  :param dns_support: Enable or disable DNS support. Enabled by default.
53988
54030
  :param multicast_support: Indicates whether multicast is enabled on the transit gateway.
53989
54031
  :param propagation_default_route_table_id: The ID of the default propagation route table.
54032
+ :param security_group_referencing_support: Enables you to reference a security group across VPCs attached to a transit gateway (TGW). Use this option to simplify security group management and control of instance-to-instance traffic across VPCs that are connected by transit gateway. You can also use this option to migrate from VPC peering (which was the only option that supported security group referencing) to transit gateways (which now also support security group referencing). This option is disabled by default and there are no additional costs to use this feature. For important information about this feature, see `Create a transit gateway <https://docs.aws.amazon.com/vpc/latest/tgw/tgw-transit-gateways.html#create-tgw>`_ in the *AWS Transit Gateway Guide* .
53990
54033
  :param tags: The tags for the transit gateway.
53991
54034
  :param transit_gateway_cidr_blocks: The transit gateway CIDR blocks.
53992
54035
  :param vpn_ecmp_support: Enable or disable Equal Cost Multipath Protocol support. Enabled by default.
@@ -54010,6 +54053,7 @@ class CfnTransitGatewayProps:
54010
54053
  dns_support="dnsSupport",
54011
54054
  multicast_support="multicastSupport",
54012
54055
  propagation_default_route_table_id="propagationDefaultRouteTableId",
54056
+ security_group_referencing_support="securityGroupReferencingSupport",
54013
54057
  tags=[CfnTag(
54014
54058
  key="key",
54015
54059
  value="value"
@@ -54029,6 +54073,7 @@ class CfnTransitGatewayProps:
54029
54073
  check_type(argname="argument dns_support", value=dns_support, expected_type=type_hints["dns_support"])
54030
54074
  check_type(argname="argument multicast_support", value=multicast_support, expected_type=type_hints["multicast_support"])
54031
54075
  check_type(argname="argument propagation_default_route_table_id", value=propagation_default_route_table_id, expected_type=type_hints["propagation_default_route_table_id"])
54076
+ check_type(argname="argument security_group_referencing_support", value=security_group_referencing_support, expected_type=type_hints["security_group_referencing_support"])
54032
54077
  check_type(argname="argument tags", value=tags, expected_type=type_hints["tags"])
54033
54078
  check_type(argname="argument transit_gateway_cidr_blocks", value=transit_gateway_cidr_blocks, expected_type=type_hints["transit_gateway_cidr_blocks"])
54034
54079
  check_type(argname="argument vpn_ecmp_support", value=vpn_ecmp_support, expected_type=type_hints["vpn_ecmp_support"])
@@ -54051,6 +54096,8 @@ class CfnTransitGatewayProps:
54051
54096
  self._values["multicast_support"] = multicast_support
54052
54097
  if propagation_default_route_table_id is not None:
54053
54098
  self._values["propagation_default_route_table_id"] = propagation_default_route_table_id
54099
+ if security_group_referencing_support is not None:
54100
+ self._values["security_group_referencing_support"] = security_group_referencing_support
54054
54101
  if tags is not None:
54055
54102
  self._values["tags"] = tags
54056
54103
  if transit_gateway_cidr_blocks is not None:
@@ -54149,6 +54196,19 @@ class CfnTransitGatewayProps:
54149
54196
  result = self._values.get("propagation_default_route_table_id")
54150
54197
  return typing.cast(typing.Optional[builtins.str], result)
54151
54198
 
54199
+ @builtins.property
54200
+ def security_group_referencing_support(self) -> typing.Optional[builtins.str]:
54201
+ '''Enables you to reference a security group across VPCs attached to a transit gateway (TGW).
54202
+
54203
+ Use this option to simplify security group management and control of instance-to-instance traffic across VPCs that are connected by transit gateway. You can also use this option to migrate from VPC peering (which was the only option that supported security group referencing) to transit gateways (which now also support security group referencing). This option is disabled by default and there are no additional costs to use this feature.
54204
+
54205
+ For important information about this feature, see `Create a transit gateway <https://docs.aws.amazon.com/vpc/latest/tgw/tgw-transit-gateways.html#create-tgw>`_ in the *AWS Transit Gateway Guide* .
54206
+
54207
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-ec2-transitgateway.html#cfn-ec2-transitgateway-securitygroupreferencingsupport
54208
+ '''
54209
+ result = self._values.get("security_group_referencing_support")
54210
+ return typing.cast(typing.Optional[builtins.str], result)
54211
+
54152
54212
  @builtins.property
54153
54213
  def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
54154
54214
  '''The tags for the transit gateway.
@@ -55268,6 +55328,7 @@ class CfnTransitGatewayVpcAttachment(
55268
55328
  "appliance_mode_support": "applianceModeSupport",
55269
55329
  "dns_support": "dnsSupport",
55270
55330
  "ipv6_support": "ipv6Support",
55331
+ "security_group_referencing_support": "securityGroupReferencingSupport",
55271
55332
  },
55272
55333
  )
55273
55334
  class OptionsProperty:
@@ -55277,12 +55338,14 @@ class CfnTransitGatewayVpcAttachment(
55277
55338
  appliance_mode_support: typing.Optional[builtins.str] = None,
55278
55339
  dns_support: typing.Optional[builtins.str] = None,
55279
55340
  ipv6_support: typing.Optional[builtins.str] = None,
55341
+ security_group_referencing_support: typing.Optional[builtins.str] = None,
55280
55342
  ) -> None:
55281
55343
  '''Describes the VPC attachment options.
55282
55344
 
55283
55345
  :param appliance_mode_support: Enable or disable appliance mode support. The default is ``disable`` .
55284
55346
  :param dns_support: Enable or disable DNS support. The default is ``disable`` .
55285
55347
  :param ipv6_support: Enable or disable IPv6 support. The default is ``disable`` .
55348
+ :param security_group_referencing_support: Enables you to reference a security group across VPCs attached to a transit gateway (TGW). Use this option to simplify security group management and control of instance-to-instance traffic across VPCs that are connected by transit gateway. You can also use this option to migrate from VPC peering (which was the only option that supported security group referencing) to transit gateways (which now also support security group referencing). This option is disabled by default and there are no additional costs to use this feature. For important information about this feature, see `Create a transit gateway <https://docs.aws.amazon.com/vpc/latest/tgw/tgw-transit-gateways.html#create-tgw>`_ in the *AWS Transit Gateway Guide* .
55286
55349
 
55287
55350
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-transitgatewayvpcattachment-options.html
55288
55351
  :exampleMetadata: fixture=_generated
@@ -55296,7 +55359,8 @@ class CfnTransitGatewayVpcAttachment(
55296
55359
  options_property = ec2.CfnTransitGatewayVpcAttachment.OptionsProperty(
55297
55360
  appliance_mode_support="applianceModeSupport",
55298
55361
  dns_support="dnsSupport",
55299
- ipv6_support="ipv6Support"
55362
+ ipv6_support="ipv6Support",
55363
+ security_group_referencing_support="securityGroupReferencingSupport"
55300
55364
  )
55301
55365
  '''
55302
55366
  if __debug__:
@@ -55304,6 +55368,7 @@ class CfnTransitGatewayVpcAttachment(
55304
55368
  check_type(argname="argument appliance_mode_support", value=appliance_mode_support, expected_type=type_hints["appliance_mode_support"])
55305
55369
  check_type(argname="argument dns_support", value=dns_support, expected_type=type_hints["dns_support"])
55306
55370
  check_type(argname="argument ipv6_support", value=ipv6_support, expected_type=type_hints["ipv6_support"])
55371
+ check_type(argname="argument security_group_referencing_support", value=security_group_referencing_support, expected_type=type_hints["security_group_referencing_support"])
55307
55372
  self._values: typing.Dict[builtins.str, typing.Any] = {}
55308
55373
  if appliance_mode_support is not None:
55309
55374
  self._values["appliance_mode_support"] = appliance_mode_support
@@ -55311,6 +55376,8 @@ class CfnTransitGatewayVpcAttachment(
55311
55376
  self._values["dns_support"] = dns_support
55312
55377
  if ipv6_support is not None:
55313
55378
  self._values["ipv6_support"] = ipv6_support
55379
+ if security_group_referencing_support is not None:
55380
+ self._values["security_group_referencing_support"] = security_group_referencing_support
55314
55381
 
55315
55382
  @builtins.property
55316
55383
  def appliance_mode_support(self) -> typing.Optional[builtins.str]:
@@ -55345,6 +55412,19 @@ class CfnTransitGatewayVpcAttachment(
55345
55412
  result = self._values.get("ipv6_support")
55346
55413
  return typing.cast(typing.Optional[builtins.str], result)
55347
55414
 
55415
+ @builtins.property
55416
+ def security_group_referencing_support(self) -> typing.Optional[builtins.str]:
55417
+ '''Enables you to reference a security group across VPCs attached to a transit gateway (TGW).
55418
+
55419
+ Use this option to simplify security group management and control of instance-to-instance traffic across VPCs that are connected by transit gateway. You can also use this option to migrate from VPC peering (which was the only option that supported security group referencing) to transit gateways (which now also support security group referencing). This option is disabled by default and there are no additional costs to use this feature.
55420
+
55421
+ For important information about this feature, see `Create a transit gateway <https://docs.aws.amazon.com/vpc/latest/tgw/tgw-transit-gateways.html#create-tgw>`_ in the *AWS Transit Gateway Guide* .
55422
+
55423
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-transitgatewayvpcattachment-options.html#cfn-ec2-transitgatewayvpcattachment-options-securitygroupreferencingsupport
55424
+ '''
55425
+ result = self._values.get("security_group_referencing_support")
55426
+ return typing.cast(typing.Optional[builtins.str], result)
55427
+
55348
55428
  def __eq__(self, rhs: typing.Any) -> builtins.bool:
55349
55429
  return isinstance(rhs, self.__class__) and rhs._values == self._values
55350
55430
 
@@ -56550,7 +56630,7 @@ class CfnVPCEndpoint(
56550
56630
  :param id: Construct identifier for this resource (unique in its scope).
56551
56631
  :param service_name: The name of the endpoint service.
56552
56632
  :param vpc_id: The ID of the VPC.
56553
- :param policy_document: An endpoint policy, which controls access to the service from the VPC. The default endpoint policy allows full access to the service. Endpoint policies are supported only for gateway and interface endpoints. For CloudFormation templates in YAML, you can provide the policy in JSON or YAML format. AWS CloudFormation converts YAML policies to JSON format before calling the API to create or modify the VPC endpoint.
56633
+ :param policy_document: An endpoint policy, which controls access to the service from the VPC. The default endpoint policy allows full access to the service. Endpoint policies are supported only for gateway and interface endpoints. For CloudFormation templates in YAML, you can provide the policy in JSON or YAML format. For example, if you have a JSON policy, you can convert it to YAML before including it in the YAML template, and AWS CloudFormation converts the policy to JSON format before calling the API actions for AWS PrivateLink . Alternatively, you can include the JSON directly in the YAML, as shown in the following ``Properties`` section: ``Properties: VpcEndpointType: 'Interface' ServiceName: !Sub 'com.amazonaws.${AWS::Region}.logs' PolicyDocument: '{ "Version":"2012-10-17", "Statement": [{ "Effect":"Allow", "Principal":"*", "Action":["logs:Describe*","logs:Get*","logs:List*","logs:FilterLogEvents"], "Resource":"*" }] }'``
56554
56634
  :param private_dns_enabled: Indicate whether to associate a private hosted zone with the specified VPC. The private hosted zone contains a record set for the default public DNS name for the service for the Region (for example, ``kinesis.us-east-1.amazonaws.com`` ), which resolves to the private IP addresses of the endpoint network interfaces in the VPC. This enables you to make requests to the default public DNS name for the service instead of the public DNS names that are automatically generated by the VPC endpoint service. To use a private hosted zone, you must set the following VPC attributes to ``true`` : ``enableDnsHostnames`` and ``enableDnsSupport`` . This property is supported only for interface endpoints. Default: ``false``
56555
56635
  :param route_table_ids: The IDs of the route tables. Routing is supported only for gateway endpoints.
56556
56636
  :param security_group_ids: The IDs of the security groups to associate with the endpoint network interfaces. If this parameter is not specified, we use the default security group for the VPC. Security groups are supported only for interface endpoints.
@@ -57075,7 +57155,7 @@ class CfnVPCEndpointProps:
57075
57155
 
57076
57156
  :param service_name: The name of the endpoint service.
57077
57157
  :param vpc_id: The ID of the VPC.
57078
- :param policy_document: An endpoint policy, which controls access to the service from the VPC. The default endpoint policy allows full access to the service. Endpoint policies are supported only for gateway and interface endpoints. For CloudFormation templates in YAML, you can provide the policy in JSON or YAML format. AWS CloudFormation converts YAML policies to JSON format before calling the API to create or modify the VPC endpoint.
57158
+ :param policy_document: An endpoint policy, which controls access to the service from the VPC. The default endpoint policy allows full access to the service. Endpoint policies are supported only for gateway and interface endpoints. For CloudFormation templates in YAML, you can provide the policy in JSON or YAML format. For example, if you have a JSON policy, you can convert it to YAML before including it in the YAML template, and AWS CloudFormation converts the policy to JSON format before calling the API actions for AWS PrivateLink . Alternatively, you can include the JSON directly in the YAML, as shown in the following ``Properties`` section: ``Properties: VpcEndpointType: 'Interface' ServiceName: !Sub 'com.amazonaws.${AWS::Region}.logs' PolicyDocument: '{ "Version":"2012-10-17", "Statement": [{ "Effect":"Allow", "Principal":"*", "Action":["logs:Describe*","logs:Get*","logs:List*","logs:FilterLogEvents"], "Resource":"*" }] }'``
57079
57159
  :param private_dns_enabled: Indicate whether to associate a private hosted zone with the specified VPC. The private hosted zone contains a record set for the default public DNS name for the service for the Region (for example, ``kinesis.us-east-1.amazonaws.com`` ), which resolves to the private IP addresses of the endpoint network interfaces in the VPC. This enables you to make requests to the default public DNS name for the service instead of the public DNS names that are automatically generated by the VPC endpoint service. To use a private hosted zone, you must set the following VPC attributes to ``true`` : ``enableDnsHostnames`` and ``enableDnsSupport`` . This property is supported only for interface endpoints. Default: ``false``
57080
57160
  :param route_table_ids: The IDs of the route tables. Routing is supported only for gateway endpoints.
57081
57161
  :param security_group_ids: The IDs of the security groups to associate with the endpoint network interfaces. If this parameter is not specified, we use the default security group for the VPC. Security groups are supported only for interface endpoints.
@@ -57159,7 +57239,9 @@ class CfnVPCEndpointProps:
57159
57239
 
57160
57240
  The default endpoint policy allows full access to the service. Endpoint policies are supported only for gateway and interface endpoints.
57161
57241
 
57162
- For CloudFormation templates in YAML, you can provide the policy in JSON or YAML format. AWS CloudFormation converts YAML policies to JSON format before calling the API to create or modify the VPC endpoint.
57242
+ For CloudFormation templates in YAML, you can provide the policy in JSON or YAML format. For example, if you have a JSON policy, you can convert it to YAML before including it in the YAML template, and AWS CloudFormation converts the policy to JSON format before calling the API actions for AWS PrivateLink . Alternatively, you can include the JSON directly in the YAML, as shown in the following ``Properties`` section:
57243
+
57244
+ ``Properties: VpcEndpointType: 'Interface' ServiceName: !Sub 'com.amazonaws.${AWS::Region}.logs' PolicyDocument: '{ "Version":"2012-10-17", "Statement": [{ "Effect":"Allow", "Principal":"*", "Action":["logs:Describe*","logs:Get*","logs:List*","logs:FilterLogEvents"], "Resource":"*" }] }'``
57163
57245
 
57164
57246
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-ec2-vpcendpoint.html#cfn-ec2-vpcendpoint-policydocument
57165
57247
  '''
@@ -73349,6 +73431,10 @@ class InstanceClass(enum.Enum):
73349
73431
  '''Graphics-optimized instances, 6th generation.'''
73350
73432
  G6 = "G6"
73351
73433
  '''Graphics-optimized instances, 6th generation.'''
73434
+ GRAPHICS6_EFFICIENT = "GRAPHICS6_EFFICIENT"
73435
+ '''Cost-efficient GPU-based instances for AI inference and spatial computing workloads, 6th generation.'''
73436
+ G6E = "G6E"
73437
+ '''Cost-efficient GPU-based instances for AI inference and spatial computing workloads, 6th generation.'''
73352
73438
  PARALLEL2 = "PARALLEL2"
73353
73439
  '''Parallel-processing optimized instances, 2nd generation.'''
73354
73440
  P2 = "P2"
@@ -75130,6 +75216,11 @@ class InterfaceVpcEndpointAwsService(
75130
75216
  def DIRECTORY_SERVICE(cls) -> "InterfaceVpcEndpointAwsService":
75131
75217
  return typing.cast("InterfaceVpcEndpointAwsService", jsii.sget(cls, "DIRECTORY_SERVICE"))
75132
75218
 
75219
+ @jsii.python.classproperty
75220
+ @jsii.member(jsii_name="DYNAMODB")
75221
+ def DYNAMODB(cls) -> "InterfaceVpcEndpointAwsService":
75222
+ return typing.cast("InterfaceVpcEndpointAwsService", jsii.sget(cls, "DYNAMODB"))
75223
+
75133
75224
  @jsii.python.classproperty
75134
75225
  @jsii.member(jsii_name="EBS_DIRECT")
75135
75226
  def EBS_DIRECT(cls) -> "InterfaceVpcEndpointAwsService":
@@ -75991,6 +76082,11 @@ class InterfaceVpcEndpointAwsService(
75991
76082
  def SAGEMAKER_API(cls) -> "InterfaceVpcEndpointAwsService":
75992
76083
  return typing.cast("InterfaceVpcEndpointAwsService", jsii.sget(cls, "SAGEMAKER_API"))
75993
76084
 
76085
+ @jsii.python.classproperty
76086
+ @jsii.member(jsii_name="SAGEMAKER_EXPERIMENTS")
76087
+ def SAGEMAKER_EXPERIMENTS(cls) -> "InterfaceVpcEndpointAwsService":
76088
+ return typing.cast("InterfaceVpcEndpointAwsService", jsii.sget(cls, "SAGEMAKER_EXPERIMENTS"))
76089
+
75994
76090
  @jsii.python.classproperty
75995
76091
  @jsii.member(jsii_name="SAGEMAKER_FEATURESTORE_RUNTIME")
75996
76092
  def SAGEMAKER_FEATURESTORE_RUNTIME(cls) -> "InterfaceVpcEndpointAwsService":
@@ -102100,6 +102196,7 @@ def _typecheckingstub__bba1945c40ffe23ea319a1157d643d40dd9ada3eb2884ee096699e549
102100
102196
  dns_support: typing.Optional[builtins.str] = None,
102101
102197
  multicast_support: typing.Optional[builtins.str] = None,
102102
102198
  propagation_default_route_table_id: typing.Optional[builtins.str] = None,
102199
+ security_group_referencing_support: typing.Optional[builtins.str] = None,
102103
102200
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
102104
102201
  transit_gateway_cidr_blocks: typing.Optional[typing.Sequence[builtins.str]] = None,
102105
102202
  vpn_ecmp_support: typing.Optional[builtins.str] = None,
@@ -102173,6 +102270,12 @@ def _typecheckingstub__96eb40466e83d16bb71ed5f295e56c3ec41178edaf7dada2d08c5cfbf
102173
102270
  """Type checking stubs"""
102174
102271
  pass
102175
102272
 
102273
+ def _typecheckingstub__a3f506ba1d4c7659981ecfc231f5fb9ba7e866a8317415667ead4b5ff07b05dc(
102274
+ value: typing.Optional[builtins.str],
102275
+ ) -> None:
102276
+ """Type checking stubs"""
102277
+ pass
102278
+
102176
102279
  def _typecheckingstub__ce7a4c126005c51509a0bd7f2c9b3dd762ba3bd0c8c5a303dfdcdb1ae2aa45ac(
102177
102280
  value: typing.Optional[typing.List[_CfnTag_f6864754]],
102178
102281
  ) -> None:
@@ -102251,6 +102354,7 @@ def _typecheckingstub__1a6a91070bc957616b318464b989714fb81382073cacd0ab2b00be277
102251
102354
  appliance_mode_support: typing.Optional[builtins.str] = None,
102252
102355
  dns_support: typing.Optional[builtins.str] = None,
102253
102356
  ipv6_support: typing.Optional[builtins.str] = None,
102357
+ security_group_referencing_support: typing.Optional[builtins.str] = None,
102254
102358
  ) -> None:
102255
102359
  """Type checking stubs"""
102256
102360
  pass
@@ -102617,6 +102721,7 @@ def _typecheckingstub__49fd996c8de156c654fbaab604bd7c39350335d42f26ebf85fab17421
102617
102721
  dns_support: typing.Optional[builtins.str] = None,
102618
102722
  multicast_support: typing.Optional[builtins.str] = None,
102619
102723
  propagation_default_route_table_id: typing.Optional[builtins.str] = None,
102724
+ security_group_referencing_support: typing.Optional[builtins.str] = None,
102620
102725
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
102621
102726
  transit_gateway_cidr_blocks: typing.Optional[typing.Sequence[builtins.str]] = None,
102622
102727
  vpn_ecmp_support: typing.Optional[builtins.str] = None,
@@ -102882,6 +102987,7 @@ def _typecheckingstub__ea53e7949c27ba728a0fa1f4b7f62f321894de9f55e4d88a106982259
102882
102987
  appliance_mode_support: typing.Optional[builtins.str] = None,
102883
102988
  dns_support: typing.Optional[builtins.str] = None,
102884
102989
  ipv6_support: typing.Optional[builtins.str] = None,
102990
+ security_group_referencing_support: typing.Optional[builtins.str] = None,
102885
102991
  ) -> None:
102886
102992
  """Type checking stubs"""
102887
102993
  pass