aws-cdk-lib 2.178.1__py3-none-any.whl → 2.179.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk-lib might be problematic. Click here for more details.

Files changed (34) hide show
  1. aws_cdk/__init__.py +69 -35
  2. aws_cdk/_jsii/__init__.py +1 -2
  3. aws_cdk/_jsii/{aws-cdk-lib@2.178.1.jsii.tgz → aws-cdk-lib@2.179.0.jsii.tgz} +0 -0
  4. aws_cdk/aws_apigateway/__init__.py +170 -29
  5. aws_cdk/aws_apigatewayv2/__init__.py +151 -32
  6. aws_cdk/aws_apigatewayv2_integrations/__init__.py +348 -0
  7. aws_cdk/aws_applicationautoscaling/__init__.py +8 -8
  8. aws_cdk/aws_appsync/__init__.py +6 -4
  9. aws_cdk/aws_cloudfront/__init__.py +5 -5
  10. aws_cdk/aws_codebuild/__init__.py +216 -0
  11. aws_cdk/aws_codepipeline/__init__.py +89 -28
  12. aws_cdk/aws_codepipeline_actions/__init__.py +526 -62
  13. aws_cdk/aws_cognito/__init__.py +676 -20
  14. aws_cdk/aws_ec2/__init__.py +25 -9
  15. aws_cdk/aws_ecs/__init__.py +8 -8
  16. aws_cdk/aws_eks/__init__.py +555 -179
  17. aws_cdk/aws_elasticloadbalancingv2/__init__.py +99 -0
  18. aws_cdk/aws_events/__init__.py +9 -15
  19. aws_cdk/aws_events_targets/__init__.py +303 -16
  20. aws_cdk/aws_iam/__init__.py +3 -3
  21. aws_cdk/aws_ivs/__init__.py +241 -73
  22. aws_cdk/aws_logs/__init__.py +62 -13
  23. aws_cdk/aws_pinpoint/__init__.py +14 -9
  24. aws_cdk/aws_rds/__init__.py +168 -24
  25. aws_cdk/aws_s3/__init__.py +9 -9
  26. aws_cdk/aws_stepfunctions_tasks/__init__.py +127 -21
  27. aws_cdk/pipelines/__init__.py +2 -2
  28. {aws_cdk_lib-2.178.1.dist-info → aws_cdk_lib-2.179.0.dist-info}/METADATA +1 -2
  29. {aws_cdk_lib-2.178.1.dist-info → aws_cdk_lib-2.179.0.dist-info}/RECORD +33 -34
  30. aws_cdk/lambda_layer_kubectl/__init__.py +0 -107
  31. {aws_cdk_lib-2.178.1.dist-info → aws_cdk_lib-2.179.0.dist-info}/LICENSE +0 -0
  32. {aws_cdk_lib-2.178.1.dist-info → aws_cdk_lib-2.179.0.dist-info}/NOTICE +0 -0
  33. {aws_cdk_lib-2.178.1.dist-info → aws_cdk_lib-2.179.0.dist-info}/WHEEL +0 -0
  34. {aws_cdk_lib-2.178.1.dist-info → aws_cdk_lib-2.179.0.dist-info}/top_level.txt +0 -0
@@ -176,7 +176,9 @@ MetricFilter(self, "MetricFilter",
176
176
  log_group=log_group,
177
177
  metric_namespace="MyApp",
178
178
  metric_name="Latency",
179
- filter_pattern=FilterPattern.exists("$.latency"),
179
+ filter_pattern=FilterPattern.all(
180
+ FilterPattern.exists("$.latency"),
181
+ FilterPattern.regex_value("$.message", "=", "bind: address already in use")),
180
182
  metric_value="$.latency"
181
183
  )
182
184
  ```
@@ -315,6 +317,8 @@ and then descending into it, such as `$.field` or `$.list[0].field`.
315
317
 
316
318
  * `FilterPattern.stringValue(field, comparison, string)`: matches if the given
317
319
  field compares as indicated with the given string value.
320
+ * `FilterPattern.regexValue(field, comparison, string)`: matches if the given
321
+ field compares as indicated with the given regex pattern.
318
322
  * `FilterPattern.numberValue(field, comparison, number)`: matches if the given
319
323
  field compares as indicated with the given numerical value.
320
324
  * `FilterPattern.isNull(field)`: matches if the given field exists and has the
@@ -342,7 +346,8 @@ pattern = logs.FilterPattern.all(
342
346
  logs.FilterPattern.string_value("$.component", "=", "HttpServer"),
343
347
  logs.FilterPattern.any(
344
348
  logs.FilterPattern.boolean_value("$.error", True),
345
- logs.FilterPattern.number_value("$.latency", ">", 1000)))
349
+ logs.FilterPattern.number_value("$.latency", ">", 1000)),
350
+ logs.FilterPattern.regex_value("$.message", "=", "bind address already in use"))
346
351
  ```
347
352
 
348
353
  ## Space-delimited table patterns
@@ -9754,6 +9759,37 @@ class FilterPattern(
9754
9759
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
9755
9760
  return typing.cast("JsonPattern", jsii.sinvoke(cls, "numberValue", [json_field, comparison, value]))
9756
9761
 
9762
+ @jsii.member(jsii_name="regexValue")
9763
+ @builtins.classmethod
9764
+ def regex_value(
9765
+ cls,
9766
+ json_field: builtins.str,
9767
+ comparison: builtins.str,
9768
+ value: builtins.str,
9769
+ ) -> "JsonPattern":
9770
+ '''A JSON log pattern that compares against a Regex values.
9771
+
9772
+ This pattern only matches if the event is a JSON event, and the indicated field inside
9773
+ compares with the regex value.
9774
+
9775
+ Use '$' to indicate the root of the JSON structure. The comparison operator can only
9776
+ compare equality or inequality.
9777
+
9778
+ For more information, see:
9779
+
9780
+ https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/FilterAndPatternSyntax.html
9781
+
9782
+ :param json_field: Field inside JSON. Example: "$.myField"
9783
+ :param comparison: Comparison to carry out. Either = or !=.
9784
+ :param value: The regex value to compare to.
9785
+ '''
9786
+ if __debug__:
9787
+ type_hints = typing.get_type_hints(_typecheckingstub__2a7a4c0a4a33b651a6a0a1fe2ce451f20e4fa36e60b8a3b9bd496de7c0f04c0f)
9788
+ check_type(argname="argument json_field", value=json_field, expected_type=type_hints["json_field"])
9789
+ check_type(argname="argument comparison", value=comparison, expected_type=type_hints["comparison"])
9790
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
9791
+ return typing.cast("JsonPattern", jsii.sinvoke(cls, "regexValue", [json_field, comparison, value]))
9792
+
9757
9793
  @jsii.member(jsii_name="spaceDelimited")
9758
9794
  @builtins.classmethod
9759
9795
  def space_delimited(cls, *columns: builtins.str) -> "SpaceDelimitedTextPattern":
@@ -10494,18 +10530,19 @@ class JsonPattern(
10494
10530
  ):
10495
10531
  '''Base class for patterns that only match JSON log events.
10496
10532
 
10497
- :exampleMetadata: infused
10533
+ :exampleMetadata: lit=aws-logs/test/integ.metricfilter.lit.ts infused
10498
10534
 
10499
10535
  Example::
10500
10536
 
10501
- # Search for all events where the component field is equal to
10502
- # "HttpServer" and either error is true or the latency is higher
10503
- # than 1000.
10504
- pattern = logs.FilterPattern.all(
10505
- logs.FilterPattern.string_value("$.component", "=", "HttpServer"),
10506
- logs.FilterPattern.any(
10507
- logs.FilterPattern.boolean_value("$.error", True),
10508
- logs.FilterPattern.number_value("$.latency", ">", 1000)))
10537
+ MetricFilter(self, "MetricFilter",
10538
+ log_group=log_group,
10539
+ metric_namespace="MyApp",
10540
+ metric_name="Latency",
10541
+ filter_pattern=FilterPattern.all(
10542
+ FilterPattern.exists("$.latency"),
10543
+ FilterPattern.regex_value("$.message", "=", "bind: address already in use")),
10544
+ metric_value="$.latency"
10545
+ )
10509
10546
  '''
10510
10547
 
10511
10548
  def __init__(self, json_pattern_string: builtins.str) -> None:
@@ -11780,7 +11817,9 @@ class MetricFilter(
11780
11817
  log_group=log_group,
11781
11818
  metric_namespace="MyApp",
11782
11819
  metric_name="Latency",
11783
- filter_pattern=FilterPattern.exists("$.latency"),
11820
+ filter_pattern=FilterPattern.all(
11821
+ FilterPattern.exists("$.latency"),
11822
+ FilterPattern.regex_value("$.message", "=", "bind: address already in use")),
11784
11823
  metric_value="$.latency"
11785
11824
  )
11786
11825
  '''
@@ -12110,7 +12149,9 @@ class MetricFilterProps(MetricFilterOptions):
12110
12149
  log_group=log_group,
12111
12150
  metric_namespace="MyApp",
12112
12151
  metric_name="Latency",
12113
- filter_pattern=FilterPattern.exists("$.latency"),
12152
+ filter_pattern=FilterPattern.all(
12153
+ FilterPattern.exists("$.latency"),
12154
+ FilterPattern.regex_value("$.message", "=", "bind: address already in use")),
12114
12155
  metric_value="$.latency"
12115
12156
  )
12116
12157
  '''
@@ -14891,6 +14932,14 @@ def _typecheckingstub__b1cb7dce1caa0866199f67de4ab23972e5d6dc3cd90ca77ce9a5f09f7
14891
14932
  """Type checking stubs"""
14892
14933
  pass
14893
14934
 
14935
+ def _typecheckingstub__2a7a4c0a4a33b651a6a0a1fe2ce451f20e4fa36e60b8a3b9bd496de7c0f04c0f(
14936
+ json_field: builtins.str,
14937
+ comparison: builtins.str,
14938
+ value: builtins.str,
14939
+ ) -> None:
14940
+ """Type checking stubs"""
14941
+ pass
14942
+
14894
14943
  def _typecheckingstub__3f5f56f60ccfd9dae1e3e3f54e54d87c6fb3e287c5bd2ad7924a4578ee4f8121(
14895
14944
  *columns: builtins.str,
14896
14945
  ) -> None:
@@ -2184,21 +2184,26 @@ class CfnApp(
2184
2184
 
2185
2185
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-pinpoint-app.html
2186
2186
  :cloudformationResource: AWS::Pinpoint::App
2187
- :exampleMetadata: fixture=_generated
2187
+ :exampleMetadata: infused
2188
2188
 
2189
2189
  Example::
2190
2190
 
2191
- # The code below shows an example of how to instantiate this type.
2192
- # The values are placeholders you should change.
2193
- from aws_cdk import aws_pinpoint as pinpoint
2191
+ import aws_cdk.aws_pinpoint as pinpoint
2194
2192
 
2195
- # tags: Any
2193
+ # user_pool: cognito.UserPool
2194
+ # pinpoint_app: pinpoint.CfnApp
2195
+ # pinpoint_role: iam.Role
2196
2196
 
2197
- cfn_app = pinpoint.CfnApp(self, "MyCfnApp",
2198
- name="name",
2199
2197
 
2200
- # the properties below are optional
2201
- tags=tags
2198
+ cognito.UserPoolClient(self, "Client",
2199
+ user_pool=user_pool,
2200
+ analytics=cognito.AnalyticsConfiguration(
2201
+ # Your Pinpoint project
2202
+ application=pinpoint_app,
2203
+
2204
+ # Whether to include user data in analytics events
2205
+ share_user_data=True
2206
+ )
2202
2207
  )
2203
2208
  '''
2204
2209