aws-cdk-lib 2.160.0__py3-none-any.whl → 2.161.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk-lib might be problematic. Click here for more details.
- aws_cdk/__init__.py +21 -14
- aws_cdk/_jsii/__init__.py +1 -1
- aws_cdk/_jsii/{aws-cdk-lib@2.160.0.jsii.tgz → aws-cdk-lib@2.161.1.jsii.tgz} +0 -0
- aws_cdk/aws_apigatewayv2/__init__.py +13 -14
- aws_cdk/aws_autoscaling/__init__.py +2 -2
- aws_cdk/aws_b2bi/__init__.py +2283 -672
- aws_cdk/aws_batch/__init__.py +9 -5
- aws_cdk/aws_bedrock/__init__.py +52 -20
- aws_cdk/aws_cloudformation/__init__.py +9 -9
- aws_cdk/aws_cloudtrail/__init__.py +97 -183
- aws_cdk/aws_cloudwatch/__init__.py +38 -42
- aws_cdk/aws_datasync/__init__.py +1 -1
- aws_cdk/aws_ec2/__init__.py +114 -8
- aws_cdk/aws_ecs/__init__.py +513 -2
- aws_cdk/aws_eks/__init__.py +118 -2
- aws_cdk/aws_elasticloadbalancingv2/__init__.py +5 -3
- aws_cdk/aws_glue/__init__.py +386 -0
- aws_cdk/aws_iotfleetwise/__init__.py +49 -49
- aws_cdk/aws_iottwinmaker/__init__.py +4 -4
- aws_cdk/aws_iotwireless/__init__.py +2 -1
- aws_cdk/aws_kinesisfirehose/__init__.py +52 -76
- aws_cdk/aws_lambda/__init__.py +383 -244
- aws_cdk/aws_logs/__init__.py +431 -3
- aws_cdk/aws_mediaconnect/__init__.py +6 -4
- aws_cdk/aws_medialive/__init__.py +36 -0
- aws_cdk/aws_organizations/__init__.py +4 -3
- aws_cdk/aws_pipes/__init__.py +2 -2
- aws_cdk/aws_quicksight/__init__.py +1086 -6
- aws_cdk/aws_rds/__init__.py +158 -3
- aws_cdk/aws_route53resolver/__init__.py +3 -17
- aws_cdk/aws_s3/__init__.py +20 -11
- aws_cdk/aws_s3_deployment/__init__.py +45 -0
- aws_cdk/aws_s3express/__init__.py +314 -4
- aws_cdk/aws_sagemaker/__init__.py +44 -4
- aws_cdk/aws_secretsmanager/__init__.py +14 -7
- aws_cdk/aws_securityhub/__init__.py +16 -14
- aws_cdk/aws_ses/__init__.py +52 -18
- aws_cdk/aws_sqs/__init__.py +16 -14
- aws_cdk/aws_ssm/__init__.py +6 -2
- aws_cdk/aws_synthetics/__init__.py +46 -0
- aws_cdk/aws_waf/__init__.py +33 -22
- aws_cdk/aws_wafregional/__init__.py +36 -24
- aws_cdk/aws_workspacesweb/__init__.py +54 -3
- aws_cdk/cloudformation_include/__init__.py +28 -0
- aws_cdk/cx_api/__init__.py +50 -0
- {aws_cdk_lib-2.160.0.dist-info → aws_cdk_lib-2.161.1.dist-info}/METADATA +1 -1
- {aws_cdk_lib-2.160.0.dist-info → aws_cdk_lib-2.161.1.dist-info}/RECORD +51 -51
- {aws_cdk_lib-2.160.0.dist-info → aws_cdk_lib-2.161.1.dist-info}/LICENSE +0 -0
- {aws_cdk_lib-2.160.0.dist-info → aws_cdk_lib-2.161.1.dist-info}/NOTICE +0 -0
- {aws_cdk_lib-2.160.0.dist-info → aws_cdk_lib-2.161.1.dist-info}/WHEEL +0 -0
- {aws_cdk_lib-2.160.0.dist-info → aws_cdk_lib-2.161.1.dist-info}/top_level.txt +0 -0
aws_cdk/aws_ec2/__init__.py
CHANGED
|
@@ -30492,7 +30492,7 @@ class CfnNatGateway(
|
|
|
30492
30492
|
:param connectivity_type: Indicates whether the NAT gateway supports public or private connectivity. The default is public connectivity.
|
|
30493
30493
|
:param max_drain_duration_seconds: The maximum amount of time to wait (in seconds) before forcibly releasing the IP addresses if connections are still in progress. Default value is 350 seconds.
|
|
30494
30494
|
:param private_ip_address: The private IPv4 address to assign to the NAT gateway. If you don't provide an address, a private IPv4 address will be automatically assigned.
|
|
30495
|
-
:param secondary_allocation_ids: Secondary EIP allocation IDs. For more information, see `Create a NAT gateway <https://docs.aws.amazon.com/vpc/latest/userguide/
|
|
30495
|
+
:param secondary_allocation_ids: Secondary EIP allocation IDs. For more information, see `Create a NAT gateway <https://docs.aws.amazon.com/vpc/latest/userguide/nat-gateway-working-with.html>`_ in the *Amazon VPC User Guide* .
|
|
30496
30496
|
:param secondary_private_ip_address_count: [Private NAT gateway only] The number of secondary private IPv4 addresses you want to assign to the NAT gateway. For more information about secondary addresses, see `Create a NAT gateway <https://docs.aws.amazon.com/vpc/latest/userguide/vpc-nat-gateway.html#nat-gateway-creating>`_ in the *Amazon Virtual Private Cloud User Guide* . ``SecondaryPrivateIpAddressCount`` and ``SecondaryPrivateIpAddresses`` cannot be set at the same time.
|
|
30497
30497
|
:param secondary_private_ip_addresses: Secondary private IPv4 addresses. For more information about secondary addresses, see `Create a NAT gateway <https://docs.aws.amazon.com/vpc/latest/userguide/vpc-nat-gateway.html#nat-gateway-creating>`_ in the *Amazon Virtual Private Cloud User Guide* . ``SecondaryPrivateIpAddressCount`` and ``SecondaryPrivateIpAddresses`` cannot be set at the same time.
|
|
30498
30498
|
:param tags: The tags for the NAT gateway.
|
|
@@ -30730,7 +30730,7 @@ class CfnNatGatewayProps:
|
|
|
30730
30730
|
:param connectivity_type: Indicates whether the NAT gateway supports public or private connectivity. The default is public connectivity.
|
|
30731
30731
|
:param max_drain_duration_seconds: The maximum amount of time to wait (in seconds) before forcibly releasing the IP addresses if connections are still in progress. Default value is 350 seconds.
|
|
30732
30732
|
:param private_ip_address: The private IPv4 address to assign to the NAT gateway. If you don't provide an address, a private IPv4 address will be automatically assigned.
|
|
30733
|
-
:param secondary_allocation_ids: Secondary EIP allocation IDs. For more information, see `Create a NAT gateway <https://docs.aws.amazon.com/vpc/latest/userguide/
|
|
30733
|
+
:param secondary_allocation_ids: Secondary EIP allocation IDs. For more information, see `Create a NAT gateway <https://docs.aws.amazon.com/vpc/latest/userguide/nat-gateway-working-with.html>`_ in the *Amazon VPC User Guide* .
|
|
30734
30734
|
:param secondary_private_ip_address_count: [Private NAT gateway only] The number of secondary private IPv4 addresses you want to assign to the NAT gateway. For more information about secondary addresses, see `Create a NAT gateway <https://docs.aws.amazon.com/vpc/latest/userguide/vpc-nat-gateway.html#nat-gateway-creating>`_ in the *Amazon Virtual Private Cloud User Guide* . ``SecondaryPrivateIpAddressCount`` and ``SecondaryPrivateIpAddresses`` cannot be set at the same time.
|
|
30735
30735
|
:param secondary_private_ip_addresses: Secondary private IPv4 addresses. For more information about secondary addresses, see `Create a NAT gateway <https://docs.aws.amazon.com/vpc/latest/userguide/vpc-nat-gateway.html#nat-gateway-creating>`_ in the *Amazon Virtual Private Cloud User Guide* . ``SecondaryPrivateIpAddressCount`` and ``SecondaryPrivateIpAddresses`` cannot be set at the same time.
|
|
30736
30736
|
:param tags: The tags for the NAT gateway.
|
|
@@ -30850,7 +30850,7 @@ class CfnNatGatewayProps:
|
|
|
30850
30850
|
def secondary_allocation_ids(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
30851
30851
|
'''Secondary EIP allocation IDs.
|
|
30852
30852
|
|
|
30853
|
-
For more information, see `Create a NAT gateway <https://docs.aws.amazon.com/vpc/latest/userguide/
|
|
30853
|
+
For more information, see `Create a NAT gateway <https://docs.aws.amazon.com/vpc/latest/userguide/nat-gateway-working-with.html>`_ in the *Amazon VPC User Guide* .
|
|
30854
30854
|
|
|
30855
30855
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-ec2-natgateway.html#cfn-ec2-natgateway-secondaryallocationids
|
|
30856
30856
|
'''
|
|
@@ -51260,6 +51260,7 @@ class CfnTransitGateway(
|
|
|
51260
51260
|
dns_support="dnsSupport",
|
|
51261
51261
|
multicast_support="multicastSupport",
|
|
51262
51262
|
propagation_default_route_table_id="propagationDefaultRouteTableId",
|
|
51263
|
+
security_group_referencing_support="securityGroupReferencingSupport",
|
|
51263
51264
|
tags=[CfnTag(
|
|
51264
51265
|
key="key",
|
|
51265
51266
|
value="value"
|
|
@@ -51283,6 +51284,7 @@ class CfnTransitGateway(
|
|
|
51283
51284
|
dns_support: typing.Optional[builtins.str] = None,
|
|
51284
51285
|
multicast_support: typing.Optional[builtins.str] = None,
|
|
51285
51286
|
propagation_default_route_table_id: typing.Optional[builtins.str] = None,
|
|
51287
|
+
security_group_referencing_support: typing.Optional[builtins.str] = None,
|
|
51286
51288
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
51287
51289
|
transit_gateway_cidr_blocks: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
51288
51290
|
vpn_ecmp_support: typing.Optional[builtins.str] = None,
|
|
@@ -51299,6 +51301,7 @@ class CfnTransitGateway(
|
|
|
51299
51301
|
:param dns_support: Enable or disable DNS support. Enabled by default.
|
|
51300
51302
|
:param multicast_support: Indicates whether multicast is enabled on the transit gateway.
|
|
51301
51303
|
:param propagation_default_route_table_id: The ID of the default propagation route table.
|
|
51304
|
+
:param security_group_referencing_support: Enables you to reference a security group across VPCs attached to a transit gateway (TGW). Use this option to simplify security group management and control of instance-to-instance traffic across VPCs that are connected by transit gateway. You can also use this option to migrate from VPC peering (which was the only option that supported security group referencing) to transit gateways (which now also support security group referencing). This option is disabled by default and there are no additional costs to use this feature. For important information about this feature, see `Create a transit gateway <https://docs.aws.amazon.com/vpc/latest/tgw/tgw-transit-gateways.html#create-tgw>`_ in the *AWS Transit Gateway Guide* .
|
|
51302
51305
|
:param tags: The tags for the transit gateway.
|
|
51303
51306
|
:param transit_gateway_cidr_blocks: The transit gateway CIDR blocks.
|
|
51304
51307
|
:param vpn_ecmp_support: Enable or disable Equal Cost Multipath Protocol support. Enabled by default.
|
|
@@ -51317,6 +51320,7 @@ class CfnTransitGateway(
|
|
|
51317
51320
|
dns_support=dns_support,
|
|
51318
51321
|
multicast_support=multicast_support,
|
|
51319
51322
|
propagation_default_route_table_id=propagation_default_route_table_id,
|
|
51323
|
+
security_group_referencing_support=security_group_referencing_support,
|
|
51320
51324
|
tags=tags,
|
|
51321
51325
|
transit_gateway_cidr_blocks=transit_gateway_cidr_blocks,
|
|
51322
51326
|
vpn_ecmp_support=vpn_ecmp_support,
|
|
@@ -51514,6 +51518,22 @@ class CfnTransitGateway(
|
|
|
51514
51518
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
51515
51519
|
jsii.set(self, "propagationDefaultRouteTableId", value) # pyright: ignore[reportArgumentType]
|
|
51516
51520
|
|
|
51521
|
+
@builtins.property
|
|
51522
|
+
@jsii.member(jsii_name="securityGroupReferencingSupport")
|
|
51523
|
+
def security_group_referencing_support(self) -> typing.Optional[builtins.str]:
|
|
51524
|
+
'''Enables you to reference a security group across VPCs attached to a transit gateway (TGW).'''
|
|
51525
|
+
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "securityGroupReferencingSupport"))
|
|
51526
|
+
|
|
51527
|
+
@security_group_referencing_support.setter
|
|
51528
|
+
def security_group_referencing_support(
|
|
51529
|
+
self,
|
|
51530
|
+
value: typing.Optional[builtins.str],
|
|
51531
|
+
) -> None:
|
|
51532
|
+
if __debug__:
|
|
51533
|
+
type_hints = typing.get_type_hints(_typecheckingstub__a3f506ba1d4c7659981ecfc231f5fb9ba7e866a8317415667ead4b5ff07b05dc)
|
|
51534
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
51535
|
+
jsii.set(self, "securityGroupReferencingSupport", value) # pyright: ignore[reportArgumentType]
|
|
51536
|
+
|
|
51517
51537
|
@builtins.property
|
|
51518
51538
|
@jsii.member(jsii_name="tagsRaw")
|
|
51519
51539
|
def tags_raw(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
|
|
@@ -51753,6 +51773,7 @@ class CfnTransitGatewayAttachment(
|
|
|
51753
51773
|
"appliance_mode_support": "applianceModeSupport",
|
|
51754
51774
|
"dns_support": "dnsSupport",
|
|
51755
51775
|
"ipv6_support": "ipv6Support",
|
|
51776
|
+
"security_group_referencing_support": "securityGroupReferencingSupport",
|
|
51756
51777
|
},
|
|
51757
51778
|
)
|
|
51758
51779
|
class OptionsProperty:
|
|
@@ -51762,12 +51783,14 @@ class CfnTransitGatewayAttachment(
|
|
|
51762
51783
|
appliance_mode_support: typing.Optional[builtins.str] = None,
|
|
51763
51784
|
dns_support: typing.Optional[builtins.str] = None,
|
|
51764
51785
|
ipv6_support: typing.Optional[builtins.str] = None,
|
|
51786
|
+
security_group_referencing_support: typing.Optional[builtins.str] = None,
|
|
51765
51787
|
) -> None:
|
|
51766
51788
|
'''Describes the VPC attachment options.
|
|
51767
51789
|
|
|
51768
51790
|
:param appliance_mode_support: Enable or disable appliance mode support. The default is ``disable`` .
|
|
51769
51791
|
:param dns_support: Enable or disable DNS support. The default is ``disable`` .
|
|
51770
51792
|
:param ipv6_support: Enable or disable IPv6 support. The default is ``disable`` .
|
|
51793
|
+
:param security_group_referencing_support: Enables you to reference a security group across VPCs attached to a transit gateway (TGW). Use this option to simplify security group management and control of instance-to-instance traffic across VPCs that are connected by transit gateway. You can also use this option to migrate from VPC peering (which was the only option that supported security group referencing) to transit gateways (which now also support security group referencing). This option is disabled by default and there are no additional costs to use this feature. For important information about this feature, see `Create a transit gateway <https://docs.aws.amazon.com/vpc/latest/tgw/tgw-transit-gateways.html#create-tgw>`_ in the *AWS Transit Gateway Guide* .
|
|
51771
51794
|
|
|
51772
51795
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-transitgatewayattachment-options.html
|
|
51773
51796
|
:exampleMetadata: fixture=_generated
|
|
@@ -51781,7 +51804,8 @@ class CfnTransitGatewayAttachment(
|
|
|
51781
51804
|
options_property = ec2.CfnTransitGatewayAttachment.OptionsProperty(
|
|
51782
51805
|
appliance_mode_support="applianceModeSupport",
|
|
51783
51806
|
dns_support="dnsSupport",
|
|
51784
|
-
ipv6_support="ipv6Support"
|
|
51807
|
+
ipv6_support="ipv6Support",
|
|
51808
|
+
security_group_referencing_support="securityGroupReferencingSupport"
|
|
51785
51809
|
)
|
|
51786
51810
|
'''
|
|
51787
51811
|
if __debug__:
|
|
@@ -51789,6 +51813,7 @@ class CfnTransitGatewayAttachment(
|
|
|
51789
51813
|
check_type(argname="argument appliance_mode_support", value=appliance_mode_support, expected_type=type_hints["appliance_mode_support"])
|
|
51790
51814
|
check_type(argname="argument dns_support", value=dns_support, expected_type=type_hints["dns_support"])
|
|
51791
51815
|
check_type(argname="argument ipv6_support", value=ipv6_support, expected_type=type_hints["ipv6_support"])
|
|
51816
|
+
check_type(argname="argument security_group_referencing_support", value=security_group_referencing_support, expected_type=type_hints["security_group_referencing_support"])
|
|
51792
51817
|
self._values: typing.Dict[builtins.str, typing.Any] = {}
|
|
51793
51818
|
if appliance_mode_support is not None:
|
|
51794
51819
|
self._values["appliance_mode_support"] = appliance_mode_support
|
|
@@ -51796,6 +51821,8 @@ class CfnTransitGatewayAttachment(
|
|
|
51796
51821
|
self._values["dns_support"] = dns_support
|
|
51797
51822
|
if ipv6_support is not None:
|
|
51798
51823
|
self._values["ipv6_support"] = ipv6_support
|
|
51824
|
+
if security_group_referencing_support is not None:
|
|
51825
|
+
self._values["security_group_referencing_support"] = security_group_referencing_support
|
|
51799
51826
|
|
|
51800
51827
|
@builtins.property
|
|
51801
51828
|
def appliance_mode_support(self) -> typing.Optional[builtins.str]:
|
|
@@ -51830,6 +51857,19 @@ class CfnTransitGatewayAttachment(
|
|
|
51830
51857
|
result = self._values.get("ipv6_support")
|
|
51831
51858
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
51832
51859
|
|
|
51860
|
+
@builtins.property
|
|
51861
|
+
def security_group_referencing_support(self) -> typing.Optional[builtins.str]:
|
|
51862
|
+
'''Enables you to reference a security group across VPCs attached to a transit gateway (TGW).
|
|
51863
|
+
|
|
51864
|
+
Use this option to simplify security group management and control of instance-to-instance traffic across VPCs that are connected by transit gateway. You can also use this option to migrate from VPC peering (which was the only option that supported security group referencing) to transit gateways (which now also support security group referencing). This option is disabled by default and there are no additional costs to use this feature.
|
|
51865
|
+
|
|
51866
|
+
For important information about this feature, see `Create a transit gateway <https://docs.aws.amazon.com/vpc/latest/tgw/tgw-transit-gateways.html#create-tgw>`_ in the *AWS Transit Gateway Guide* .
|
|
51867
|
+
|
|
51868
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-transitgatewayattachment-options.html#cfn-ec2-transitgatewayattachment-options-securitygroupreferencingsupport
|
|
51869
|
+
'''
|
|
51870
|
+
result = self._values.get("security_group_referencing_support")
|
|
51871
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
51872
|
+
|
|
51833
51873
|
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
51834
51874
|
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
51835
51875
|
|
|
@@ -53954,6 +53994,7 @@ class CfnTransitGatewayPeeringAttachmentProps:
|
|
|
53954
53994
|
"dns_support": "dnsSupport",
|
|
53955
53995
|
"multicast_support": "multicastSupport",
|
|
53956
53996
|
"propagation_default_route_table_id": "propagationDefaultRouteTableId",
|
|
53997
|
+
"security_group_referencing_support": "securityGroupReferencingSupport",
|
|
53957
53998
|
"tags": "tags",
|
|
53958
53999
|
"transit_gateway_cidr_blocks": "transitGatewayCidrBlocks",
|
|
53959
54000
|
"vpn_ecmp_support": "vpnEcmpSupport",
|
|
@@ -53972,6 +54013,7 @@ class CfnTransitGatewayProps:
|
|
|
53972
54013
|
dns_support: typing.Optional[builtins.str] = None,
|
|
53973
54014
|
multicast_support: typing.Optional[builtins.str] = None,
|
|
53974
54015
|
propagation_default_route_table_id: typing.Optional[builtins.str] = None,
|
|
54016
|
+
security_group_referencing_support: typing.Optional[builtins.str] = None,
|
|
53975
54017
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
53976
54018
|
transit_gateway_cidr_blocks: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
53977
54019
|
vpn_ecmp_support: typing.Optional[builtins.str] = None,
|
|
@@ -53987,6 +54029,7 @@ class CfnTransitGatewayProps:
|
|
|
53987
54029
|
:param dns_support: Enable or disable DNS support. Enabled by default.
|
|
53988
54030
|
:param multicast_support: Indicates whether multicast is enabled on the transit gateway.
|
|
53989
54031
|
:param propagation_default_route_table_id: The ID of the default propagation route table.
|
|
54032
|
+
:param security_group_referencing_support: Enables you to reference a security group across VPCs attached to a transit gateway (TGW). Use this option to simplify security group management and control of instance-to-instance traffic across VPCs that are connected by transit gateway. You can also use this option to migrate from VPC peering (which was the only option that supported security group referencing) to transit gateways (which now also support security group referencing). This option is disabled by default and there are no additional costs to use this feature. For important information about this feature, see `Create a transit gateway <https://docs.aws.amazon.com/vpc/latest/tgw/tgw-transit-gateways.html#create-tgw>`_ in the *AWS Transit Gateway Guide* .
|
|
53990
54033
|
:param tags: The tags for the transit gateway.
|
|
53991
54034
|
:param transit_gateway_cidr_blocks: The transit gateway CIDR blocks.
|
|
53992
54035
|
:param vpn_ecmp_support: Enable or disable Equal Cost Multipath Protocol support. Enabled by default.
|
|
@@ -54010,6 +54053,7 @@ class CfnTransitGatewayProps:
|
|
|
54010
54053
|
dns_support="dnsSupport",
|
|
54011
54054
|
multicast_support="multicastSupport",
|
|
54012
54055
|
propagation_default_route_table_id="propagationDefaultRouteTableId",
|
|
54056
|
+
security_group_referencing_support="securityGroupReferencingSupport",
|
|
54013
54057
|
tags=[CfnTag(
|
|
54014
54058
|
key="key",
|
|
54015
54059
|
value="value"
|
|
@@ -54029,6 +54073,7 @@ class CfnTransitGatewayProps:
|
|
|
54029
54073
|
check_type(argname="argument dns_support", value=dns_support, expected_type=type_hints["dns_support"])
|
|
54030
54074
|
check_type(argname="argument multicast_support", value=multicast_support, expected_type=type_hints["multicast_support"])
|
|
54031
54075
|
check_type(argname="argument propagation_default_route_table_id", value=propagation_default_route_table_id, expected_type=type_hints["propagation_default_route_table_id"])
|
|
54076
|
+
check_type(argname="argument security_group_referencing_support", value=security_group_referencing_support, expected_type=type_hints["security_group_referencing_support"])
|
|
54032
54077
|
check_type(argname="argument tags", value=tags, expected_type=type_hints["tags"])
|
|
54033
54078
|
check_type(argname="argument transit_gateway_cidr_blocks", value=transit_gateway_cidr_blocks, expected_type=type_hints["transit_gateway_cidr_blocks"])
|
|
54034
54079
|
check_type(argname="argument vpn_ecmp_support", value=vpn_ecmp_support, expected_type=type_hints["vpn_ecmp_support"])
|
|
@@ -54051,6 +54096,8 @@ class CfnTransitGatewayProps:
|
|
|
54051
54096
|
self._values["multicast_support"] = multicast_support
|
|
54052
54097
|
if propagation_default_route_table_id is not None:
|
|
54053
54098
|
self._values["propagation_default_route_table_id"] = propagation_default_route_table_id
|
|
54099
|
+
if security_group_referencing_support is not None:
|
|
54100
|
+
self._values["security_group_referencing_support"] = security_group_referencing_support
|
|
54054
54101
|
if tags is not None:
|
|
54055
54102
|
self._values["tags"] = tags
|
|
54056
54103
|
if transit_gateway_cidr_blocks is not None:
|
|
@@ -54149,6 +54196,19 @@ class CfnTransitGatewayProps:
|
|
|
54149
54196
|
result = self._values.get("propagation_default_route_table_id")
|
|
54150
54197
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
54151
54198
|
|
|
54199
|
+
@builtins.property
|
|
54200
|
+
def security_group_referencing_support(self) -> typing.Optional[builtins.str]:
|
|
54201
|
+
'''Enables you to reference a security group across VPCs attached to a transit gateway (TGW).
|
|
54202
|
+
|
|
54203
|
+
Use this option to simplify security group management and control of instance-to-instance traffic across VPCs that are connected by transit gateway. You can also use this option to migrate from VPC peering (which was the only option that supported security group referencing) to transit gateways (which now also support security group referencing). This option is disabled by default and there are no additional costs to use this feature.
|
|
54204
|
+
|
|
54205
|
+
For important information about this feature, see `Create a transit gateway <https://docs.aws.amazon.com/vpc/latest/tgw/tgw-transit-gateways.html#create-tgw>`_ in the *AWS Transit Gateway Guide* .
|
|
54206
|
+
|
|
54207
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-ec2-transitgateway.html#cfn-ec2-transitgateway-securitygroupreferencingsupport
|
|
54208
|
+
'''
|
|
54209
|
+
result = self._values.get("security_group_referencing_support")
|
|
54210
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
54211
|
+
|
|
54152
54212
|
@builtins.property
|
|
54153
54213
|
def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
|
|
54154
54214
|
'''The tags for the transit gateway.
|
|
@@ -55268,6 +55328,7 @@ class CfnTransitGatewayVpcAttachment(
|
|
|
55268
55328
|
"appliance_mode_support": "applianceModeSupport",
|
|
55269
55329
|
"dns_support": "dnsSupport",
|
|
55270
55330
|
"ipv6_support": "ipv6Support",
|
|
55331
|
+
"security_group_referencing_support": "securityGroupReferencingSupport",
|
|
55271
55332
|
},
|
|
55272
55333
|
)
|
|
55273
55334
|
class OptionsProperty:
|
|
@@ -55277,12 +55338,14 @@ class CfnTransitGatewayVpcAttachment(
|
|
|
55277
55338
|
appliance_mode_support: typing.Optional[builtins.str] = None,
|
|
55278
55339
|
dns_support: typing.Optional[builtins.str] = None,
|
|
55279
55340
|
ipv6_support: typing.Optional[builtins.str] = None,
|
|
55341
|
+
security_group_referencing_support: typing.Optional[builtins.str] = None,
|
|
55280
55342
|
) -> None:
|
|
55281
55343
|
'''Describes the VPC attachment options.
|
|
55282
55344
|
|
|
55283
55345
|
:param appliance_mode_support: Enable or disable appliance mode support. The default is ``disable`` .
|
|
55284
55346
|
:param dns_support: Enable or disable DNS support. The default is ``disable`` .
|
|
55285
55347
|
:param ipv6_support: Enable or disable IPv6 support. The default is ``disable`` .
|
|
55348
|
+
:param security_group_referencing_support: Enables you to reference a security group across VPCs attached to a transit gateway (TGW). Use this option to simplify security group management and control of instance-to-instance traffic across VPCs that are connected by transit gateway. You can also use this option to migrate from VPC peering (which was the only option that supported security group referencing) to transit gateways (which now also support security group referencing). This option is disabled by default and there are no additional costs to use this feature. For important information about this feature, see `Create a transit gateway <https://docs.aws.amazon.com/vpc/latest/tgw/tgw-transit-gateways.html#create-tgw>`_ in the *AWS Transit Gateway Guide* .
|
|
55286
55349
|
|
|
55287
55350
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-transitgatewayvpcattachment-options.html
|
|
55288
55351
|
:exampleMetadata: fixture=_generated
|
|
@@ -55296,7 +55359,8 @@ class CfnTransitGatewayVpcAttachment(
|
|
|
55296
55359
|
options_property = ec2.CfnTransitGatewayVpcAttachment.OptionsProperty(
|
|
55297
55360
|
appliance_mode_support="applianceModeSupport",
|
|
55298
55361
|
dns_support="dnsSupport",
|
|
55299
|
-
ipv6_support="ipv6Support"
|
|
55362
|
+
ipv6_support="ipv6Support",
|
|
55363
|
+
security_group_referencing_support="securityGroupReferencingSupport"
|
|
55300
55364
|
)
|
|
55301
55365
|
'''
|
|
55302
55366
|
if __debug__:
|
|
@@ -55304,6 +55368,7 @@ class CfnTransitGatewayVpcAttachment(
|
|
|
55304
55368
|
check_type(argname="argument appliance_mode_support", value=appliance_mode_support, expected_type=type_hints["appliance_mode_support"])
|
|
55305
55369
|
check_type(argname="argument dns_support", value=dns_support, expected_type=type_hints["dns_support"])
|
|
55306
55370
|
check_type(argname="argument ipv6_support", value=ipv6_support, expected_type=type_hints["ipv6_support"])
|
|
55371
|
+
check_type(argname="argument security_group_referencing_support", value=security_group_referencing_support, expected_type=type_hints["security_group_referencing_support"])
|
|
55307
55372
|
self._values: typing.Dict[builtins.str, typing.Any] = {}
|
|
55308
55373
|
if appliance_mode_support is not None:
|
|
55309
55374
|
self._values["appliance_mode_support"] = appliance_mode_support
|
|
@@ -55311,6 +55376,8 @@ class CfnTransitGatewayVpcAttachment(
|
|
|
55311
55376
|
self._values["dns_support"] = dns_support
|
|
55312
55377
|
if ipv6_support is not None:
|
|
55313
55378
|
self._values["ipv6_support"] = ipv6_support
|
|
55379
|
+
if security_group_referencing_support is not None:
|
|
55380
|
+
self._values["security_group_referencing_support"] = security_group_referencing_support
|
|
55314
55381
|
|
|
55315
55382
|
@builtins.property
|
|
55316
55383
|
def appliance_mode_support(self) -> typing.Optional[builtins.str]:
|
|
@@ -55345,6 +55412,19 @@ class CfnTransitGatewayVpcAttachment(
|
|
|
55345
55412
|
result = self._values.get("ipv6_support")
|
|
55346
55413
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
55347
55414
|
|
|
55415
|
+
@builtins.property
|
|
55416
|
+
def security_group_referencing_support(self) -> typing.Optional[builtins.str]:
|
|
55417
|
+
'''Enables you to reference a security group across VPCs attached to a transit gateway (TGW).
|
|
55418
|
+
|
|
55419
|
+
Use this option to simplify security group management and control of instance-to-instance traffic across VPCs that are connected by transit gateway. You can also use this option to migrate from VPC peering (which was the only option that supported security group referencing) to transit gateways (which now also support security group referencing). This option is disabled by default and there are no additional costs to use this feature.
|
|
55420
|
+
|
|
55421
|
+
For important information about this feature, see `Create a transit gateway <https://docs.aws.amazon.com/vpc/latest/tgw/tgw-transit-gateways.html#create-tgw>`_ in the *AWS Transit Gateway Guide* .
|
|
55422
|
+
|
|
55423
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-transitgatewayvpcattachment-options.html#cfn-ec2-transitgatewayvpcattachment-options-securitygroupreferencingsupport
|
|
55424
|
+
'''
|
|
55425
|
+
result = self._values.get("security_group_referencing_support")
|
|
55426
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
55427
|
+
|
|
55348
55428
|
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
55349
55429
|
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
55350
55430
|
|
|
@@ -56550,7 +56630,7 @@ class CfnVPCEndpoint(
|
|
|
56550
56630
|
:param id: Construct identifier for this resource (unique in its scope).
|
|
56551
56631
|
:param service_name: The name of the endpoint service.
|
|
56552
56632
|
:param vpc_id: The ID of the VPC.
|
|
56553
|
-
:param policy_document: An endpoint policy, which controls access to the service from the VPC. The default endpoint policy allows full access to the service. Endpoint policies are supported only for gateway and interface endpoints. For CloudFormation templates in YAML, you can provide the policy in JSON or YAML format. AWS CloudFormation converts
|
|
56633
|
+
:param policy_document: An endpoint policy, which controls access to the service from the VPC. The default endpoint policy allows full access to the service. Endpoint policies are supported only for gateway and interface endpoints. For CloudFormation templates in YAML, you can provide the policy in JSON or YAML format. For example, if you have a JSON policy, you can convert it to YAML before including it in the YAML template, and AWS CloudFormation converts the policy to JSON format before calling the API actions for AWS PrivateLink . Alternatively, you can include the JSON directly in the YAML, as shown in the following ``Properties`` section: ``Properties: VpcEndpointType: 'Interface' ServiceName: !Sub 'com.amazonaws.${AWS::Region}.logs' PolicyDocument: '{ "Version":"2012-10-17", "Statement": [{ "Effect":"Allow", "Principal":"*", "Action":["logs:Describe*","logs:Get*","logs:List*","logs:FilterLogEvents"], "Resource":"*" }] }'``
|
|
56554
56634
|
:param private_dns_enabled: Indicate whether to associate a private hosted zone with the specified VPC. The private hosted zone contains a record set for the default public DNS name for the service for the Region (for example, ``kinesis.us-east-1.amazonaws.com`` ), which resolves to the private IP addresses of the endpoint network interfaces in the VPC. This enables you to make requests to the default public DNS name for the service instead of the public DNS names that are automatically generated by the VPC endpoint service. To use a private hosted zone, you must set the following VPC attributes to ``true`` : ``enableDnsHostnames`` and ``enableDnsSupport`` . This property is supported only for interface endpoints. Default: ``false``
|
|
56555
56635
|
:param route_table_ids: The IDs of the route tables. Routing is supported only for gateway endpoints.
|
|
56556
56636
|
:param security_group_ids: The IDs of the security groups to associate with the endpoint network interfaces. If this parameter is not specified, we use the default security group for the VPC. Security groups are supported only for interface endpoints.
|
|
@@ -57075,7 +57155,7 @@ class CfnVPCEndpointProps:
|
|
|
57075
57155
|
|
|
57076
57156
|
:param service_name: The name of the endpoint service.
|
|
57077
57157
|
:param vpc_id: The ID of the VPC.
|
|
57078
|
-
:param policy_document: An endpoint policy, which controls access to the service from the VPC. The default endpoint policy allows full access to the service. Endpoint policies are supported only for gateway and interface endpoints. For CloudFormation templates in YAML, you can provide the policy in JSON or YAML format. AWS CloudFormation converts
|
|
57158
|
+
:param policy_document: An endpoint policy, which controls access to the service from the VPC. The default endpoint policy allows full access to the service. Endpoint policies are supported only for gateway and interface endpoints. For CloudFormation templates in YAML, you can provide the policy in JSON or YAML format. For example, if you have a JSON policy, you can convert it to YAML before including it in the YAML template, and AWS CloudFormation converts the policy to JSON format before calling the API actions for AWS PrivateLink . Alternatively, you can include the JSON directly in the YAML, as shown in the following ``Properties`` section: ``Properties: VpcEndpointType: 'Interface' ServiceName: !Sub 'com.amazonaws.${AWS::Region}.logs' PolicyDocument: '{ "Version":"2012-10-17", "Statement": [{ "Effect":"Allow", "Principal":"*", "Action":["logs:Describe*","logs:Get*","logs:List*","logs:FilterLogEvents"], "Resource":"*" }] }'``
|
|
57079
57159
|
:param private_dns_enabled: Indicate whether to associate a private hosted zone with the specified VPC. The private hosted zone contains a record set for the default public DNS name for the service for the Region (for example, ``kinesis.us-east-1.amazonaws.com`` ), which resolves to the private IP addresses of the endpoint network interfaces in the VPC. This enables you to make requests to the default public DNS name for the service instead of the public DNS names that are automatically generated by the VPC endpoint service. To use a private hosted zone, you must set the following VPC attributes to ``true`` : ``enableDnsHostnames`` and ``enableDnsSupport`` . This property is supported only for interface endpoints. Default: ``false``
|
|
57080
57160
|
:param route_table_ids: The IDs of the route tables. Routing is supported only for gateway endpoints.
|
|
57081
57161
|
:param security_group_ids: The IDs of the security groups to associate with the endpoint network interfaces. If this parameter is not specified, we use the default security group for the VPC. Security groups are supported only for interface endpoints.
|
|
@@ -57159,7 +57239,9 @@ class CfnVPCEndpointProps:
|
|
|
57159
57239
|
|
|
57160
57240
|
The default endpoint policy allows full access to the service. Endpoint policies are supported only for gateway and interface endpoints.
|
|
57161
57241
|
|
|
57162
|
-
For CloudFormation templates in YAML, you can provide the policy in JSON or YAML format. AWS CloudFormation converts
|
|
57242
|
+
For CloudFormation templates in YAML, you can provide the policy in JSON or YAML format. For example, if you have a JSON policy, you can convert it to YAML before including it in the YAML template, and AWS CloudFormation converts the policy to JSON format before calling the API actions for AWS PrivateLink . Alternatively, you can include the JSON directly in the YAML, as shown in the following ``Properties`` section:
|
|
57243
|
+
|
|
57244
|
+
``Properties: VpcEndpointType: 'Interface' ServiceName: !Sub 'com.amazonaws.${AWS::Region}.logs' PolicyDocument: '{ "Version":"2012-10-17", "Statement": [{ "Effect":"Allow", "Principal":"*", "Action":["logs:Describe*","logs:Get*","logs:List*","logs:FilterLogEvents"], "Resource":"*" }] }'``
|
|
57163
57245
|
|
|
57164
57246
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-ec2-vpcendpoint.html#cfn-ec2-vpcendpoint-policydocument
|
|
57165
57247
|
'''
|
|
@@ -73349,6 +73431,10 @@ class InstanceClass(enum.Enum):
|
|
|
73349
73431
|
'''Graphics-optimized instances, 6th generation.'''
|
|
73350
73432
|
G6 = "G6"
|
|
73351
73433
|
'''Graphics-optimized instances, 6th generation.'''
|
|
73434
|
+
GRAPHICS6_EFFICIENT = "GRAPHICS6_EFFICIENT"
|
|
73435
|
+
'''Cost-efficient GPU-based instances for AI inference and spatial computing workloads, 6th generation.'''
|
|
73436
|
+
G6E = "G6E"
|
|
73437
|
+
'''Cost-efficient GPU-based instances for AI inference and spatial computing workloads, 6th generation.'''
|
|
73352
73438
|
PARALLEL2 = "PARALLEL2"
|
|
73353
73439
|
'''Parallel-processing optimized instances, 2nd generation.'''
|
|
73354
73440
|
P2 = "P2"
|
|
@@ -75130,6 +75216,11 @@ class InterfaceVpcEndpointAwsService(
|
|
|
75130
75216
|
def DIRECTORY_SERVICE(cls) -> "InterfaceVpcEndpointAwsService":
|
|
75131
75217
|
return typing.cast("InterfaceVpcEndpointAwsService", jsii.sget(cls, "DIRECTORY_SERVICE"))
|
|
75132
75218
|
|
|
75219
|
+
@jsii.python.classproperty
|
|
75220
|
+
@jsii.member(jsii_name="DYNAMODB")
|
|
75221
|
+
def DYNAMODB(cls) -> "InterfaceVpcEndpointAwsService":
|
|
75222
|
+
return typing.cast("InterfaceVpcEndpointAwsService", jsii.sget(cls, "DYNAMODB"))
|
|
75223
|
+
|
|
75133
75224
|
@jsii.python.classproperty
|
|
75134
75225
|
@jsii.member(jsii_name="EBS_DIRECT")
|
|
75135
75226
|
def EBS_DIRECT(cls) -> "InterfaceVpcEndpointAwsService":
|
|
@@ -75991,6 +76082,11 @@ class InterfaceVpcEndpointAwsService(
|
|
|
75991
76082
|
def SAGEMAKER_API(cls) -> "InterfaceVpcEndpointAwsService":
|
|
75992
76083
|
return typing.cast("InterfaceVpcEndpointAwsService", jsii.sget(cls, "SAGEMAKER_API"))
|
|
75993
76084
|
|
|
76085
|
+
@jsii.python.classproperty
|
|
76086
|
+
@jsii.member(jsii_name="SAGEMAKER_EXPERIMENTS")
|
|
76087
|
+
def SAGEMAKER_EXPERIMENTS(cls) -> "InterfaceVpcEndpointAwsService":
|
|
76088
|
+
return typing.cast("InterfaceVpcEndpointAwsService", jsii.sget(cls, "SAGEMAKER_EXPERIMENTS"))
|
|
76089
|
+
|
|
75994
76090
|
@jsii.python.classproperty
|
|
75995
76091
|
@jsii.member(jsii_name="SAGEMAKER_FEATURESTORE_RUNTIME")
|
|
75996
76092
|
def SAGEMAKER_FEATURESTORE_RUNTIME(cls) -> "InterfaceVpcEndpointAwsService":
|
|
@@ -102100,6 +102196,7 @@ def _typecheckingstub__bba1945c40ffe23ea319a1157d643d40dd9ada3eb2884ee096699e549
|
|
|
102100
102196
|
dns_support: typing.Optional[builtins.str] = None,
|
|
102101
102197
|
multicast_support: typing.Optional[builtins.str] = None,
|
|
102102
102198
|
propagation_default_route_table_id: typing.Optional[builtins.str] = None,
|
|
102199
|
+
security_group_referencing_support: typing.Optional[builtins.str] = None,
|
|
102103
102200
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
102104
102201
|
transit_gateway_cidr_blocks: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
102105
102202
|
vpn_ecmp_support: typing.Optional[builtins.str] = None,
|
|
@@ -102173,6 +102270,12 @@ def _typecheckingstub__96eb40466e83d16bb71ed5f295e56c3ec41178edaf7dada2d08c5cfbf
|
|
|
102173
102270
|
"""Type checking stubs"""
|
|
102174
102271
|
pass
|
|
102175
102272
|
|
|
102273
|
+
def _typecheckingstub__a3f506ba1d4c7659981ecfc231f5fb9ba7e866a8317415667ead4b5ff07b05dc(
|
|
102274
|
+
value: typing.Optional[builtins.str],
|
|
102275
|
+
) -> None:
|
|
102276
|
+
"""Type checking stubs"""
|
|
102277
|
+
pass
|
|
102278
|
+
|
|
102176
102279
|
def _typecheckingstub__ce7a4c126005c51509a0bd7f2c9b3dd762ba3bd0c8c5a303dfdcdb1ae2aa45ac(
|
|
102177
102280
|
value: typing.Optional[typing.List[_CfnTag_f6864754]],
|
|
102178
102281
|
) -> None:
|
|
@@ -102251,6 +102354,7 @@ def _typecheckingstub__1a6a91070bc957616b318464b989714fb81382073cacd0ab2b00be277
|
|
|
102251
102354
|
appliance_mode_support: typing.Optional[builtins.str] = None,
|
|
102252
102355
|
dns_support: typing.Optional[builtins.str] = None,
|
|
102253
102356
|
ipv6_support: typing.Optional[builtins.str] = None,
|
|
102357
|
+
security_group_referencing_support: typing.Optional[builtins.str] = None,
|
|
102254
102358
|
) -> None:
|
|
102255
102359
|
"""Type checking stubs"""
|
|
102256
102360
|
pass
|
|
@@ -102617,6 +102721,7 @@ def _typecheckingstub__49fd996c8de156c654fbaab604bd7c39350335d42f26ebf85fab17421
|
|
|
102617
102721
|
dns_support: typing.Optional[builtins.str] = None,
|
|
102618
102722
|
multicast_support: typing.Optional[builtins.str] = None,
|
|
102619
102723
|
propagation_default_route_table_id: typing.Optional[builtins.str] = None,
|
|
102724
|
+
security_group_referencing_support: typing.Optional[builtins.str] = None,
|
|
102620
102725
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
102621
102726
|
transit_gateway_cidr_blocks: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
102622
102727
|
vpn_ecmp_support: typing.Optional[builtins.str] = None,
|
|
@@ -102882,6 +102987,7 @@ def _typecheckingstub__ea53e7949c27ba728a0fa1f4b7f62f321894de9f55e4d88a106982259
|
|
|
102882
102987
|
appliance_mode_support: typing.Optional[builtins.str] = None,
|
|
102883
102988
|
dns_support: typing.Optional[builtins.str] = None,
|
|
102884
102989
|
ipv6_support: typing.Optional[builtins.str] = None,
|
|
102990
|
+
security_group_referencing_support: typing.Optional[builtins.str] = None,
|
|
102885
102991
|
) -> None:
|
|
102886
102992
|
"""Type checking stubs"""
|
|
102887
102993
|
pass
|