aws-cdk-lib 2.182.0__py3-none-any.whl → 2.184.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk-lib might be problematic. Click here for more details.
- aws_cdk/__init__.py +459 -33
- aws_cdk/_jsii/__init__.py +1 -1
- aws_cdk/_jsii/{aws-cdk-lib@2.182.0.jsii.tgz → aws-cdk-lib@2.184.0.jsii.tgz} +0 -0
- aws_cdk/aws_batch/__init__.py +15 -9
- aws_cdk/aws_bedrock/__init__.py +5804 -2325
- aws_cdk/aws_ce/__init__.py +141 -3
- aws_cdk/aws_cloudformation/__init__.py +26 -33
- aws_cdk/aws_cloudfront/experimental/__init__.py +2 -2
- aws_cdk/aws_cloudtrail/__init__.py +4 -4
- aws_cdk/aws_codebuild/__init__.py +4 -10
- aws_cdk/aws_cognito/__init__.py +3 -3
- aws_cdk/aws_dms/__init__.py +350 -0
- aws_cdk/aws_ec2/__init__.py +63 -5
- aws_cdk/aws_elasticache/__init__.py +3 -3
- aws_cdk/aws_emr/__init__.py +9 -3
- aws_cdk/aws_events/__init__.py +3 -1
- aws_cdk/aws_events_targets/__init__.py +31 -7
- aws_cdk/aws_gameliftstreams/__init__.py +1205 -0
- aws_cdk/aws_iam/__init__.py +290 -35
- aws_cdk/aws_inspector/__init__.py +13 -10
- aws_cdk/aws_iot/__init__.py +616 -22
- aws_cdk/aws_iotfleetwise/__init__.py +72 -10
- aws_cdk/aws_iotsitewise/__init__.py +12 -8
- aws_cdk/aws_kafkaconnect/__init__.py +4 -2
- aws_cdk/aws_kinesisfirehose/__init__.py +45 -51
- aws_cdk/aws_lambda/__init__.py +27 -18
- aws_cdk/aws_lambda_event_sources/__init__.py +14 -14
- aws_cdk/aws_logs/__init__.py +133 -0
- aws_cdk/aws_medialive/__init__.py +86 -86
- aws_cdk/aws_msk/__init__.py +236 -128
- aws_cdk/aws_neptunegraph/__init__.py +3 -3
- aws_cdk/aws_opensearchserverless/__init__.py +1031 -0
- aws_cdk/aws_quicksight/__init__.py +6511 -20331
- aws_cdk/aws_rds/__init__.py +264 -32
- aws_cdk/aws_redshift/__init__.py +8 -8
- aws_cdk/aws_sagemaker/__init__.py +12 -5
- aws_cdk/aws_securitylake/__init__.py +3 -0
- aws_cdk/aws_synthetics/__init__.py +2 -0
- aws_cdk/aws_transfer/__init__.py +241 -40
- aws_cdk/aws_wafv2/__init__.py +118 -30
- aws_cdk/aws_xray/__init__.py +195 -0
- aws_cdk/cloud_assembly_schema/__init__.py +2 -2
- aws_cdk/custom_resources/__init__.py +65 -8
- {aws_cdk_lib-2.182.0.dist-info → aws_cdk_lib-2.184.0.dist-info}/METADATA +5 -6
- {aws_cdk_lib-2.182.0.dist-info → aws_cdk_lib-2.184.0.dist-info}/RECORD +49 -48
- {aws_cdk_lib-2.182.0.dist-info → aws_cdk_lib-2.184.0.dist-info}/LICENSE +0 -0
- {aws_cdk_lib-2.182.0.dist-info → aws_cdk_lib-2.184.0.dist-info}/NOTICE +0 -0
- {aws_cdk_lib-2.182.0.dist-info → aws_cdk_lib-2.184.0.dist-info}/WHEEL +0 -0
- {aws_cdk_lib-2.182.0.dist-info → aws_cdk_lib-2.184.0.dist-info}/top_level.txt +0 -0
aws_cdk/aws_wafv2/__init__.py
CHANGED
|
@@ -4499,7 +4499,7 @@ class CfnRuleGroup(
|
|
|
4499
4499
|
:param cookies: Inspect the request cookies. You must configure scope and pattern matching filters in the ``Cookies`` object, to define the set of cookies and the parts of the cookies that AWS WAF inspects. Only the first 8 KB (8192 bytes) of a request's cookies and only the first 200 cookies are forwarded to AWS WAF for inspection by the underlying host service. You must configure how to handle any oversize cookie content in the ``Cookies`` object. AWS WAF applies the pattern matching filters to the cookies that it receives from the underlying host service.
|
|
4500
4500
|
:param headers: Inspect the request headers. You must configure scope and pattern matching filters in the ``Headers`` object, to define the set of headers to and the parts of the headers that AWS WAF inspects. Only the first 8 KB (8192 bytes) of a request's headers and only the first 200 headers are forwarded to AWS WAF for inspection by the underlying host service. You must configure how to handle any oversize header content in the ``Headers`` object. AWS WAF applies the pattern matching filters to the headers that it receives from the underlying host service.
|
|
4501
4501
|
:param ja3_fingerprint: Available for use with Amazon CloudFront distributions and Application Load Balancers. Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information. .. epigraph:: You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` . You can obtain the JA3 fingerprint for client requests from the web ACL logs. If AWS WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see `Log fields <https://docs.aws.amazon.com/waf/latest/developerguide/logging-fields.html>`_ in the *AWS WAF Developer Guide* . Provide the JA3 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
|
|
4502
|
-
:param ja4_fingerprint:
|
|
4502
|
+
:param ja4_fingerprint: Available for use with Amazon CloudFront distributions and Application Load Balancers. Match against the request's JA4 fingerprint. The JA4 fingerprint is a 36-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information. .. epigraph:: You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` . You can obtain the JA4 fingerprint for client requests from the web ACL logs. If AWS WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see `Log fields <https://docs.aws.amazon.com/waf/latest/developerguide/logging-fields.html>`_ in the *AWS WAF Developer Guide* . Provide the JA4 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
|
|
4503
4503
|
:param json_body: Inspect the request body as JSON. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. AWS WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service only forwards the contents that are within the limit to AWS WAF for inspection. - For Application Load Balancer and AWS AppSync , the limit is fixed at 8 KB (8,192 bytes). - For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and you can increase the limit for each resource type in the web ACL ``AssociationConfig`` , for additional processing fees. For information about how to handle oversized request bodies, see the ``JsonBody`` object configuration.
|
|
4504
4504
|
:param method: Inspect the HTTP method. The method indicates the type of operation that the request is asking the origin to perform.
|
|
4505
4505
|
:param query_string: Inspect the query string. This is the part of a URL that appears after a ``?`` character, if any.
|
|
@@ -4694,7 +4694,16 @@ class CfnRuleGroup(
|
|
|
4694
4694
|
def ja4_fingerprint(
|
|
4695
4695
|
self,
|
|
4696
4696
|
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnRuleGroup.JA4FingerprintProperty"]]:
|
|
4697
|
-
'''
|
|
4697
|
+
'''Available for use with Amazon CloudFront distributions and Application Load Balancers.
|
|
4698
|
+
|
|
4699
|
+
Match against the request's JA4 fingerprint. The JA4 fingerprint is a 36-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information.
|
|
4700
|
+
.. epigraph::
|
|
4701
|
+
|
|
4702
|
+
You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` .
|
|
4703
|
+
|
|
4704
|
+
You can obtain the JA4 fingerprint for client requests from the web ACL logs. If AWS WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see `Log fields <https://docs.aws.amazon.com/waf/latest/developerguide/logging-fields.html>`_ in the *AWS WAF Developer Guide* .
|
|
4705
|
+
|
|
4706
|
+
Provide the JA4 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
|
|
4698
4707
|
|
|
4699
4708
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-rulegroup-fieldtomatch.html#cfn-wafv2-rulegroup-fieldtomatch-ja4fingerprint
|
|
4700
4709
|
'''
|
|
@@ -5546,9 +5555,18 @@ class CfnRuleGroup(
|
|
|
5546
5555
|
)
|
|
5547
5556
|
class JA4FingerprintProperty:
|
|
5548
5557
|
def __init__(self, *, fallback_behavior: builtins.str) -> None:
|
|
5549
|
-
'''
|
|
5558
|
+
'''Available for use with Amazon CloudFront distributions and Application Load Balancers.
|
|
5559
|
+
|
|
5560
|
+
Match against the request's JA4 fingerprint. The JA4 fingerprint is a 36-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information.
|
|
5561
|
+
.. epigraph::
|
|
5550
5562
|
|
|
5551
|
-
|
|
5563
|
+
You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` .
|
|
5564
|
+
|
|
5565
|
+
You can obtain the JA4 fingerprint for client requests from the web ACL logs. If AWS WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see `Log fields <https://docs.aws.amazon.com/waf/latest/developerguide/logging-fields.html>`_ in the *AWS WAF Developer Guide* .
|
|
5566
|
+
|
|
5567
|
+
Provide the JA4 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
|
|
5568
|
+
|
|
5569
|
+
:param fallback_behavior: The match status to assign to the web request if the request doesn't have a JA4 fingerprint. You can specify the following fallback behaviors: - ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request. - ``NO_MATCH`` - Treat the web request as not matching the rule statement.
|
|
5552
5570
|
|
|
5553
5571
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-rulegroup-ja4fingerprint.html
|
|
5554
5572
|
:exampleMetadata: fixture=_generated
|
|
@@ -5572,7 +5590,13 @@ class CfnRuleGroup(
|
|
|
5572
5590
|
|
|
5573
5591
|
@builtins.property
|
|
5574
5592
|
def fallback_behavior(self) -> builtins.str:
|
|
5575
|
-
'''
|
|
5593
|
+
'''The match status to assign to the web request if the request doesn't have a JA4 fingerprint.
|
|
5594
|
+
|
|
5595
|
+
You can specify the following fallback behaviors:
|
|
5596
|
+
|
|
5597
|
+
- ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request.
|
|
5598
|
+
- ``NO_MATCH`` - Treat the web request as not matching the rule statement.
|
|
5599
|
+
|
|
5576
5600
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-rulegroup-ja4fingerprint.html#cfn-wafv2-rulegroup-ja4fingerprint-fallbackbehavior
|
|
5577
5601
|
'''
|
|
5578
5602
|
result = self._values.get("fallback_behavior")
|
|
@@ -7027,8 +7051,8 @@ class CfnRuleGroup(
|
|
|
7027
7051
|
:param header: Use the value of a header in the request as an aggregate key. Each distinct value in the header contributes to the aggregation instance. If you use a single header as your custom key, then each value fully defines an aggregation instance.
|
|
7028
7052
|
:param http_method: Use the request's HTTP method as an aggregate key. Each distinct HTTP method contributes to the aggregation instance. If you use just the HTTP method as your custom key, then each method fully defines an aggregation instance.
|
|
7029
7053
|
:param ip: Use the request's originating IP address as an aggregate key. Each distinct IP address contributes to the aggregation instance. When you specify an IP or forwarded IP in the custom key settings, you must also specify at least one other key to use. You can aggregate on only the IP address by specifying ``IP`` in your rate-based statement's ``AggregateKeyType`` .
|
|
7030
|
-
:param ja3_fingerprint:
|
|
7031
|
-
:param ja4_fingerprint:
|
|
7054
|
+
:param ja3_fingerprint: Use the request's JA3 fingerprint as an aggregate key. If you use a single JA3 fingerprint as your custom key, then each value fully defines an aggregation instance.
|
|
7055
|
+
:param ja4_fingerprint: Use the request's JA4 fingerprint as an aggregate key. If you use a single JA4 fingerprint as your custom key, then each value fully defines an aggregation instance.
|
|
7032
7056
|
:param label_namespace: Use the specified label namespace as an aggregate key. Each distinct fully qualified label name that has the specified label namespace contributes to the aggregation instance. If you use just one label namespace as your custom key, then each label name fully defines an aggregation instance. This uses only labels that have been added to the request by rules that are evaluated before this rate-based rule in the web ACL. For information about label namespaces and names, see `Label syntax and naming requirements <https://docs.aws.amazon.com/waf/latest/developerguide/waf-rule-label-requirements.html>`_ in the *AWS WAF Developer Guide* .
|
|
7033
7057
|
:param query_argument: Use the specified query argument as an aggregate key. Each distinct value for the named query argument contributes to the aggregation instance. If you use a single query argument as your custom key, then each value fully defines an aggregation instance.
|
|
7034
7058
|
:param query_string: Use the request's query string as an aggregate key. Each distinct string contributes to the aggregation instance. If you use just the query string as your custom key, then each string fully defines an aggregation instance.
|
|
@@ -7199,7 +7223,9 @@ class CfnRuleGroup(
|
|
|
7199
7223
|
def ja3_fingerprint(
|
|
7200
7224
|
self,
|
|
7201
7225
|
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnRuleGroup.RateLimitJA3FingerprintProperty"]]:
|
|
7202
|
-
'''
|
|
7226
|
+
'''Use the request's JA3 fingerprint as an aggregate key.
|
|
7227
|
+
|
|
7228
|
+
If you use a single JA3 fingerprint as your custom key, then each value fully defines an aggregation instance.
|
|
7203
7229
|
|
|
7204
7230
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-rulegroup-ratebasedstatementcustomkey.html#cfn-wafv2-rulegroup-ratebasedstatementcustomkey-ja3fingerprint
|
|
7205
7231
|
'''
|
|
@@ -7210,7 +7236,9 @@ class CfnRuleGroup(
|
|
|
7210
7236
|
def ja4_fingerprint(
|
|
7211
7237
|
self,
|
|
7212
7238
|
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnRuleGroup.RateLimitJA4FingerprintProperty"]]:
|
|
7213
|
-
'''
|
|
7239
|
+
'''Use the request's JA4 fingerprint as an aggregate key.
|
|
7240
|
+
|
|
7241
|
+
If you use a single JA4 fingerprint as your custom key, then each value fully defines an aggregation instance.
|
|
7214
7242
|
|
|
7215
7243
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-rulegroup-ratebasedstatementcustomkey.html#cfn-wafv2-rulegroup-ratebasedstatementcustomkey-ja4fingerprint
|
|
7216
7244
|
'''
|
|
@@ -8102,9 +8130,11 @@ class CfnRuleGroup(
|
|
|
8102
8130
|
)
|
|
8103
8131
|
class RateLimitJA3FingerprintProperty:
|
|
8104
8132
|
def __init__(self, *, fallback_behavior: builtins.str) -> None:
|
|
8105
|
-
'''
|
|
8133
|
+
'''Use the request's JA3 fingerprint derived from the TLS Client Hello of an incoming request as an aggregate key.
|
|
8106
8134
|
|
|
8107
|
-
|
|
8135
|
+
If you use a single JA3 fingerprint as your custom key, then each value fully defines an aggregation instance.
|
|
8136
|
+
|
|
8137
|
+
:param fallback_behavior: The match status to assign to the web request if there is insufficient TSL Client Hello information to compute the JA3 fingerprint. You can specify the following fallback behaviors: - ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request. - ``NO_MATCH`` - Treat the web request as not matching the rule statement.
|
|
8108
8138
|
|
|
8109
8139
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-rulegroup-ratelimitja3fingerprint.html
|
|
8110
8140
|
:exampleMetadata: fixture=_generated
|
|
@@ -8128,7 +8158,13 @@ class CfnRuleGroup(
|
|
|
8128
8158
|
|
|
8129
8159
|
@builtins.property
|
|
8130
8160
|
def fallback_behavior(self) -> builtins.str:
|
|
8131
|
-
'''
|
|
8161
|
+
'''The match status to assign to the web request if there is insufficient TSL Client Hello information to compute the JA3 fingerprint.
|
|
8162
|
+
|
|
8163
|
+
You can specify the following fallback behaviors:
|
|
8164
|
+
|
|
8165
|
+
- ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request.
|
|
8166
|
+
- ``NO_MATCH`` - Treat the web request as not matching the rule statement.
|
|
8167
|
+
|
|
8132
8168
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-rulegroup-ratelimitja3fingerprint.html#cfn-wafv2-rulegroup-ratelimitja3fingerprint-fallbackbehavior
|
|
8133
8169
|
'''
|
|
8134
8170
|
result = self._values.get("fallback_behavior")
|
|
@@ -8153,9 +8189,11 @@ class CfnRuleGroup(
|
|
|
8153
8189
|
)
|
|
8154
8190
|
class RateLimitJA4FingerprintProperty:
|
|
8155
8191
|
def __init__(self, *, fallback_behavior: builtins.str) -> None:
|
|
8156
|
-
'''
|
|
8192
|
+
'''Use the request's JA4 fingerprint derived from the TLS Client Hello of an incoming request as an aggregate key.
|
|
8193
|
+
|
|
8194
|
+
If you use a single JA4 fingerprint as your custom key, then each value fully defines an aggregation instance.
|
|
8157
8195
|
|
|
8158
|
-
:param fallback_behavior:
|
|
8196
|
+
:param fallback_behavior: The match status to assign to the web request if there is insufficient TSL Client Hello information to compute the JA4 fingerprint. You can specify the following fallback behaviors: - ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request. - ``NO_MATCH`` - Treat the web request as not matching the rule statement.
|
|
8159
8197
|
|
|
8160
8198
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-rulegroup-ratelimitja4fingerprint.html
|
|
8161
8199
|
:exampleMetadata: fixture=_generated
|
|
@@ -8179,7 +8217,13 @@ class CfnRuleGroup(
|
|
|
8179
8217
|
|
|
8180
8218
|
@builtins.property
|
|
8181
8219
|
def fallback_behavior(self) -> builtins.str:
|
|
8182
|
-
'''
|
|
8220
|
+
'''The match status to assign to the web request if there is insufficient TSL Client Hello information to compute the JA4 fingerprint.
|
|
8221
|
+
|
|
8222
|
+
You can specify the following fallback behaviors:
|
|
8223
|
+
|
|
8224
|
+
- ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request.
|
|
8225
|
+
- ``NO_MATCH`` - Treat the web request as not matching the rule statement.
|
|
8226
|
+
|
|
8183
8227
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-rulegroup-ratelimitja4fingerprint.html#cfn-wafv2-rulegroup-ratelimitja4fingerprint-fallbackbehavior
|
|
8184
8228
|
'''
|
|
8185
8229
|
result = self._values.get("fallback_behavior")
|
|
@@ -14356,7 +14400,7 @@ class CfnWebACL(
|
|
|
14356
14400
|
:param cookies: Inspect the request cookies. You must configure scope and pattern matching filters in the ``Cookies`` object, to define the set of cookies and the parts of the cookies that AWS WAF inspects. Only the first 8 KB (8192 bytes) of a request's cookies and only the first 200 cookies are forwarded to AWS WAF for inspection by the underlying host service. You must configure how to handle any oversize cookie content in the ``Cookies`` object. AWS WAF applies the pattern matching filters to the cookies that it receives from the underlying host service.
|
|
14357
14401
|
:param headers: Inspect the request headers. You must configure scope and pattern matching filters in the ``Headers`` object, to define the set of headers to and the parts of the headers that AWS WAF inspects. Only the first 8 KB (8192 bytes) of a request's headers and only the first 200 headers are forwarded to AWS WAF for inspection by the underlying host service. You must configure how to handle any oversize header content in the ``Headers`` object. AWS WAF applies the pattern matching filters to the headers that it receives from the underlying host service.
|
|
14358
14402
|
:param ja3_fingerprint: Available for use with Amazon CloudFront distributions and Application Load Balancers. Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information. .. epigraph:: You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` . You can obtain the JA3 fingerprint for client requests from the web ACL logs. If AWS WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see `Log fields <https://docs.aws.amazon.com/waf/latest/developerguide/logging-fields.html>`_ in the *AWS WAF Developer Guide* . Provide the JA3 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
|
|
14359
|
-
:param ja4_fingerprint:
|
|
14403
|
+
:param ja4_fingerprint: Available for use with Amazon CloudFront distributions and Application Load Balancers. Match against the request's JA4 fingerprint. The JA4 fingerprint is a 36-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information. .. epigraph:: You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` . You can obtain the JA4 fingerprint for client requests from the web ACL logs. If AWS WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see `Log fields <https://docs.aws.amazon.com/waf/latest/developerguide/logging-fields.html>`_ in the *AWS WAF Developer Guide* . Provide the JA4 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
|
|
14360
14404
|
:param json_body: Inspect the request body as JSON. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. AWS WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service only forwards the contents that are within the limit to AWS WAF for inspection. - For Application Load Balancer and AWS AppSync , the limit is fixed at 8 KB (8,192 bytes). - For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and you can increase the limit for each resource type in the web ACL ``AssociationConfig`` , for additional processing fees. For information about how to handle oversized request bodies, see the ``JsonBody`` object configuration.
|
|
14361
14405
|
:param method: Inspect the HTTP method. The method indicates the type of operation that the request is asking the origin to perform.
|
|
14362
14406
|
:param query_string: Inspect the query string. This is the part of a URL that appears after a ``?`` character, if any.
|
|
@@ -14551,7 +14595,16 @@ class CfnWebACL(
|
|
|
14551
14595
|
def ja4_fingerprint(
|
|
14552
14596
|
self,
|
|
14553
14597
|
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnWebACL.JA4FingerprintProperty"]]:
|
|
14554
|
-
'''
|
|
14598
|
+
'''Available for use with Amazon CloudFront distributions and Application Load Balancers.
|
|
14599
|
+
|
|
14600
|
+
Match against the request's JA4 fingerprint. The JA4 fingerprint is a 36-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information.
|
|
14601
|
+
.. epigraph::
|
|
14602
|
+
|
|
14603
|
+
You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` .
|
|
14604
|
+
|
|
14605
|
+
You can obtain the JA4 fingerprint for client requests from the web ACL logs. If AWS WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see `Log fields <https://docs.aws.amazon.com/waf/latest/developerguide/logging-fields.html>`_ in the *AWS WAF Developer Guide* .
|
|
14606
|
+
|
|
14607
|
+
Provide the JA4 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
|
|
14555
14608
|
|
|
14556
14609
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-fieldtomatch.html#cfn-wafv2-webacl-fieldtomatch-ja4fingerprint
|
|
14557
14610
|
'''
|
|
@@ -15403,9 +15456,18 @@ class CfnWebACL(
|
|
|
15403
15456
|
)
|
|
15404
15457
|
class JA4FingerprintProperty:
|
|
15405
15458
|
def __init__(self, *, fallback_behavior: builtins.str) -> None:
|
|
15406
|
-
'''
|
|
15459
|
+
'''Available for use with Amazon CloudFront distributions and Application Load Balancers.
|
|
15460
|
+
|
|
15461
|
+
Match against the request's JA4 fingerprint. The JA4 fingerprint is a 36-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information.
|
|
15462
|
+
.. epigraph::
|
|
15407
15463
|
|
|
15408
|
-
|
|
15464
|
+
You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` .
|
|
15465
|
+
|
|
15466
|
+
You can obtain the JA4 fingerprint for client requests from the web ACL logs. If AWS WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see `Log fields <https://docs.aws.amazon.com/waf/latest/developerguide/logging-fields.html>`_ in the *AWS WAF Developer Guide* .
|
|
15467
|
+
|
|
15468
|
+
Provide the JA4 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
|
|
15469
|
+
|
|
15470
|
+
:param fallback_behavior: The match status to assign to the web request if the request doesn't have a JA4 fingerprint. You can specify the following fallback behaviors: - ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request. - ``NO_MATCH`` - Treat the web request as not matching the rule statement.
|
|
15409
15471
|
|
|
15410
15472
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-ja4fingerprint.html
|
|
15411
15473
|
:exampleMetadata: fixture=_generated
|
|
@@ -15429,7 +15491,13 @@ class CfnWebACL(
|
|
|
15429
15491
|
|
|
15430
15492
|
@builtins.property
|
|
15431
15493
|
def fallback_behavior(self) -> builtins.str:
|
|
15432
|
-
'''
|
|
15494
|
+
'''The match status to assign to the web request if the request doesn't have a JA4 fingerprint.
|
|
15495
|
+
|
|
15496
|
+
You can specify the following fallback behaviors:
|
|
15497
|
+
|
|
15498
|
+
- ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request.
|
|
15499
|
+
- ``NO_MATCH`` - Treat the web request as not matching the rule statement.
|
|
15500
|
+
|
|
15433
15501
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-ja4fingerprint.html#cfn-wafv2-webacl-ja4fingerprint-fallbackbehavior
|
|
15434
15502
|
'''
|
|
15435
15503
|
result = self._values.get("fallback_behavior")
|
|
@@ -16512,8 +16580,8 @@ class CfnWebACL(
|
|
|
16512
16580
|
:param header: Use the value of a header in the request as an aggregate key. Each distinct value in the header contributes to the aggregation instance. If you use a single header as your custom key, then each value fully defines an aggregation instance.
|
|
16513
16581
|
:param http_method: Use the request's HTTP method as an aggregate key. Each distinct HTTP method contributes to the aggregation instance. If you use just the HTTP method as your custom key, then each method fully defines an aggregation instance.
|
|
16514
16582
|
:param ip: Use the request's originating IP address as an aggregate key. Each distinct IP address contributes to the aggregation instance. When you specify an IP or forwarded IP in the custom key settings, you must also specify at least one other key to use. You can aggregate on only the IP address by specifying ``IP`` in your rate-based statement's ``AggregateKeyType`` .
|
|
16515
|
-
:param ja3_fingerprint:
|
|
16516
|
-
:param ja4_fingerprint:
|
|
16583
|
+
:param ja3_fingerprint: Use the request's JA3 fingerprint as an aggregate key. If you use a single JA3 fingerprint as your custom key, then each value fully defines an aggregation instance.
|
|
16584
|
+
:param ja4_fingerprint: Use the request's JA4 fingerprint as an aggregate key. If you use a single JA4 fingerprint as your custom key, then each value fully defines an aggregation instance.
|
|
16517
16585
|
:param label_namespace: Use the specified label namespace as an aggregate key. Each distinct fully qualified label name that has the specified label namespace contributes to the aggregation instance. If you use just one label namespace as your custom key, then each label name fully defines an aggregation instance. This uses only labels that have been added to the request by rules that are evaluated before this rate-based rule in the web ACL. For information about label namespaces and names, see `Label syntax and naming requirements <https://docs.aws.amazon.com/waf/latest/developerguide/waf-rule-label-requirements.html>`_ in the *AWS WAF Developer Guide* .
|
|
16518
16586
|
:param query_argument: Use the specified query argument as an aggregate key. Each distinct value for the named query argument contributes to the aggregation instance. If you use a single query argument as your custom key, then each value fully defines an aggregation instance.
|
|
16519
16587
|
:param query_string: Use the request's query string as an aggregate key. Each distinct string contributes to the aggregation instance. If you use just the query string as your custom key, then each string fully defines an aggregation instance.
|
|
@@ -16684,7 +16752,9 @@ class CfnWebACL(
|
|
|
16684
16752
|
def ja3_fingerprint(
|
|
16685
16753
|
self,
|
|
16686
16754
|
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnWebACL.RateLimitJA3FingerprintProperty"]]:
|
|
16687
|
-
'''
|
|
16755
|
+
'''Use the request's JA3 fingerprint as an aggregate key.
|
|
16756
|
+
|
|
16757
|
+
If you use a single JA3 fingerprint as your custom key, then each value fully defines an aggregation instance.
|
|
16688
16758
|
|
|
16689
16759
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-ratebasedstatementcustomkey.html#cfn-wafv2-webacl-ratebasedstatementcustomkey-ja3fingerprint
|
|
16690
16760
|
'''
|
|
@@ -16695,7 +16765,9 @@ class CfnWebACL(
|
|
|
16695
16765
|
def ja4_fingerprint(
|
|
16696
16766
|
self,
|
|
16697
16767
|
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnWebACL.RateLimitJA4FingerprintProperty"]]:
|
|
16698
|
-
'''
|
|
16768
|
+
'''Use the request's JA4 fingerprint as an aggregate key.
|
|
16769
|
+
|
|
16770
|
+
If you use a single JA4 fingerprint as your custom key, then each value fully defines an aggregation instance.
|
|
16699
16771
|
|
|
16700
16772
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-ratebasedstatementcustomkey.html#cfn-wafv2-webacl-ratebasedstatementcustomkey-ja4fingerprint
|
|
16701
16773
|
'''
|
|
@@ -17156,9 +17228,11 @@ class CfnWebACL(
|
|
|
17156
17228
|
)
|
|
17157
17229
|
class RateLimitJA3FingerprintProperty:
|
|
17158
17230
|
def __init__(self, *, fallback_behavior: builtins.str) -> None:
|
|
17159
|
-
'''
|
|
17231
|
+
'''Use the request's JA3 fingerprint derived from the TLS Client Hello of an incoming request as an aggregate key.
|
|
17160
17232
|
|
|
17161
|
-
|
|
17233
|
+
If you use a single JA3 fingerprint as your custom key, then each value fully defines an aggregation instance.
|
|
17234
|
+
|
|
17235
|
+
:param fallback_behavior: The match status to assign to the web request if there is insufficient TSL Client Hello information to compute the JA3 fingerprint. You can specify the following fallback behaviors: - ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request. - ``NO_MATCH`` - Treat the web request as not matching the rule statement.
|
|
17162
17236
|
|
|
17163
17237
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-ratelimitja3fingerprint.html
|
|
17164
17238
|
:exampleMetadata: fixture=_generated
|
|
@@ -17182,7 +17256,13 @@ class CfnWebACL(
|
|
|
17182
17256
|
|
|
17183
17257
|
@builtins.property
|
|
17184
17258
|
def fallback_behavior(self) -> builtins.str:
|
|
17185
|
-
'''
|
|
17259
|
+
'''The match status to assign to the web request if there is insufficient TSL Client Hello information to compute the JA3 fingerprint.
|
|
17260
|
+
|
|
17261
|
+
You can specify the following fallback behaviors:
|
|
17262
|
+
|
|
17263
|
+
- ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request.
|
|
17264
|
+
- ``NO_MATCH`` - Treat the web request as not matching the rule statement.
|
|
17265
|
+
|
|
17186
17266
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-ratelimitja3fingerprint.html#cfn-wafv2-webacl-ratelimitja3fingerprint-fallbackbehavior
|
|
17187
17267
|
'''
|
|
17188
17268
|
result = self._values.get("fallback_behavior")
|
|
@@ -17207,9 +17287,11 @@ class CfnWebACL(
|
|
|
17207
17287
|
)
|
|
17208
17288
|
class RateLimitJA4FingerprintProperty:
|
|
17209
17289
|
def __init__(self, *, fallback_behavior: builtins.str) -> None:
|
|
17210
|
-
'''
|
|
17290
|
+
'''Use the request's JA4 fingerprint derived from the TLS Client Hello of an incoming request as an aggregate key.
|
|
17291
|
+
|
|
17292
|
+
If you use a single JA4 fingerprint as your custom key, then each value fully defines an aggregation instance.
|
|
17211
17293
|
|
|
17212
|
-
:param fallback_behavior:
|
|
17294
|
+
:param fallback_behavior: The match status to assign to the web request if there is insufficient TSL Client Hello information to compute the JA4 fingerprint. You can specify the following fallback behaviors: - ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request. - ``NO_MATCH`` - Treat the web request as not matching the rule statement.
|
|
17213
17295
|
|
|
17214
17296
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-ratelimitja4fingerprint.html
|
|
17215
17297
|
:exampleMetadata: fixture=_generated
|
|
@@ -17233,7 +17315,13 @@ class CfnWebACL(
|
|
|
17233
17315
|
|
|
17234
17316
|
@builtins.property
|
|
17235
17317
|
def fallback_behavior(self) -> builtins.str:
|
|
17236
|
-
'''
|
|
17318
|
+
'''The match status to assign to the web request if there is insufficient TSL Client Hello information to compute the JA4 fingerprint.
|
|
17319
|
+
|
|
17320
|
+
You can specify the following fallback behaviors:
|
|
17321
|
+
|
|
17322
|
+
- ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request.
|
|
17323
|
+
- ``NO_MATCH`` - Treat the web request as not matching the rule statement.
|
|
17324
|
+
|
|
17237
17325
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-ratelimitja4fingerprint.html#cfn-wafv2-webacl-ratelimitja4fingerprint-fallbackbehavior
|
|
17238
17326
|
'''
|
|
17239
17327
|
result = self._values.get("fallback_behavior")
|
aws_cdk/aws_xray/__init__.py
CHANGED
|
@@ -1765,6 +1765,165 @@ class CfnSamplingRuleProps:
|
|
|
1765
1765
|
)
|
|
1766
1766
|
|
|
1767
1767
|
|
|
1768
|
+
@jsii.implements(_IInspectable_c2943556)
|
|
1769
|
+
class CfnTransactionSearchConfig(
|
|
1770
|
+
_CfnResource_9df397a6,
|
|
1771
|
+
metaclass=jsii.JSIIMeta,
|
|
1772
|
+
jsii_type="aws-cdk-lib.aws_xray.CfnTransactionSearchConfig",
|
|
1773
|
+
):
|
|
1774
|
+
'''This schema provides construct and validation rules for AWS-XRay TransactionSearchConfig resource parameters.
|
|
1775
|
+
|
|
1776
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-xray-transactionsearchconfig.html
|
|
1777
|
+
:cloudformationResource: AWS::XRay::TransactionSearchConfig
|
|
1778
|
+
:exampleMetadata: fixture=_generated
|
|
1779
|
+
|
|
1780
|
+
Example::
|
|
1781
|
+
|
|
1782
|
+
# The code below shows an example of how to instantiate this type.
|
|
1783
|
+
# The values are placeholders you should change.
|
|
1784
|
+
from aws_cdk import aws_xray as xray
|
|
1785
|
+
|
|
1786
|
+
cfn_transaction_search_config = xray.CfnTransactionSearchConfig(self, "MyCfnTransactionSearchConfig",
|
|
1787
|
+
indexing_percentage=123
|
|
1788
|
+
)
|
|
1789
|
+
'''
|
|
1790
|
+
|
|
1791
|
+
def __init__(
|
|
1792
|
+
self,
|
|
1793
|
+
scope: _constructs_77d1e7e8.Construct,
|
|
1794
|
+
id: builtins.str,
|
|
1795
|
+
*,
|
|
1796
|
+
indexing_percentage: typing.Optional[jsii.Number] = None,
|
|
1797
|
+
) -> None:
|
|
1798
|
+
'''
|
|
1799
|
+
:param scope: Scope in which this resource is defined.
|
|
1800
|
+
:param id: Construct identifier for this resource (unique in its scope).
|
|
1801
|
+
:param indexing_percentage: Determines the percentage of traces indexed from CloudWatch Logs to X-Ray.
|
|
1802
|
+
'''
|
|
1803
|
+
if __debug__:
|
|
1804
|
+
type_hints = typing.get_type_hints(_typecheckingstub__f4e1a30e946dc148e1f6ca9dc5dce1a4c01ae226f9b2a99f68a6bfd8caeabe51)
|
|
1805
|
+
check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
|
|
1806
|
+
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
1807
|
+
props = CfnTransactionSearchConfigProps(
|
|
1808
|
+
indexing_percentage=indexing_percentage
|
|
1809
|
+
)
|
|
1810
|
+
|
|
1811
|
+
jsii.create(self.__class__, self, [scope, id, props])
|
|
1812
|
+
|
|
1813
|
+
@jsii.member(jsii_name="inspect")
|
|
1814
|
+
def inspect(self, inspector: _TreeInspector_488e0dd5) -> None:
|
|
1815
|
+
'''Examines the CloudFormation resource and discloses attributes.
|
|
1816
|
+
|
|
1817
|
+
:param inspector: tree inspector to collect and process attributes.
|
|
1818
|
+
'''
|
|
1819
|
+
if __debug__:
|
|
1820
|
+
type_hints = typing.get_type_hints(_typecheckingstub__394cc58a2d528bf2d5be35ac0c8c35c1fb008b91fb4981e2a17b7c6ffdba2f6b)
|
|
1821
|
+
check_type(argname="argument inspector", value=inspector, expected_type=type_hints["inspector"])
|
|
1822
|
+
return typing.cast(None, jsii.invoke(self, "inspect", [inspector]))
|
|
1823
|
+
|
|
1824
|
+
@jsii.member(jsii_name="renderProperties")
|
|
1825
|
+
def _render_properties(
|
|
1826
|
+
self,
|
|
1827
|
+
props: typing.Mapping[builtins.str, typing.Any],
|
|
1828
|
+
) -> typing.Mapping[builtins.str, typing.Any]:
|
|
1829
|
+
'''
|
|
1830
|
+
:param props: -
|
|
1831
|
+
'''
|
|
1832
|
+
if __debug__:
|
|
1833
|
+
type_hints = typing.get_type_hints(_typecheckingstub__60d903fbe1bf5e78e1363dfa2d6b437d90640f9c35b6768d40e1327382ee8fcb)
|
|
1834
|
+
check_type(argname="argument props", value=props, expected_type=type_hints["props"])
|
|
1835
|
+
return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.invoke(self, "renderProperties", [props]))
|
|
1836
|
+
|
|
1837
|
+
@jsii.python.classproperty
|
|
1838
|
+
@jsii.member(jsii_name="CFN_RESOURCE_TYPE_NAME")
|
|
1839
|
+
def CFN_RESOURCE_TYPE_NAME(cls) -> builtins.str:
|
|
1840
|
+
'''The CloudFormation resource type name for this resource class.'''
|
|
1841
|
+
return typing.cast(builtins.str, jsii.sget(cls, "CFN_RESOURCE_TYPE_NAME"))
|
|
1842
|
+
|
|
1843
|
+
@builtins.property
|
|
1844
|
+
@jsii.member(jsii_name="attrAccountId")
|
|
1845
|
+
def attr_account_id(self) -> builtins.str:
|
|
1846
|
+
'''User account id, used as the primary identifier for the resource.
|
|
1847
|
+
|
|
1848
|
+
:cloudformationAttribute: AccountId
|
|
1849
|
+
'''
|
|
1850
|
+
return typing.cast(builtins.str, jsii.get(self, "attrAccountId"))
|
|
1851
|
+
|
|
1852
|
+
@builtins.property
|
|
1853
|
+
@jsii.member(jsii_name="cfnProperties")
|
|
1854
|
+
def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
|
|
1855
|
+
return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.get(self, "cfnProperties"))
|
|
1856
|
+
|
|
1857
|
+
@builtins.property
|
|
1858
|
+
@jsii.member(jsii_name="indexingPercentage")
|
|
1859
|
+
def indexing_percentage(self) -> typing.Optional[jsii.Number]:
|
|
1860
|
+
'''Determines the percentage of traces indexed from CloudWatch Logs to X-Ray.'''
|
|
1861
|
+
return typing.cast(typing.Optional[jsii.Number], jsii.get(self, "indexingPercentage"))
|
|
1862
|
+
|
|
1863
|
+
@indexing_percentage.setter
|
|
1864
|
+
def indexing_percentage(self, value: typing.Optional[jsii.Number]) -> None:
|
|
1865
|
+
if __debug__:
|
|
1866
|
+
type_hints = typing.get_type_hints(_typecheckingstub__667a8dfa445e5a7771cc889a458d31a28e3722f0192c79d0a77ca783777108dc)
|
|
1867
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1868
|
+
jsii.set(self, "indexingPercentage", value) # pyright: ignore[reportArgumentType]
|
|
1869
|
+
|
|
1870
|
+
|
|
1871
|
+
@jsii.data_type(
|
|
1872
|
+
jsii_type="aws-cdk-lib.aws_xray.CfnTransactionSearchConfigProps",
|
|
1873
|
+
jsii_struct_bases=[],
|
|
1874
|
+
name_mapping={"indexing_percentage": "indexingPercentage"},
|
|
1875
|
+
)
|
|
1876
|
+
class CfnTransactionSearchConfigProps:
|
|
1877
|
+
def __init__(
|
|
1878
|
+
self,
|
|
1879
|
+
*,
|
|
1880
|
+
indexing_percentage: typing.Optional[jsii.Number] = None,
|
|
1881
|
+
) -> None:
|
|
1882
|
+
'''Properties for defining a ``CfnTransactionSearchConfig``.
|
|
1883
|
+
|
|
1884
|
+
:param indexing_percentage: Determines the percentage of traces indexed from CloudWatch Logs to X-Ray.
|
|
1885
|
+
|
|
1886
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-xray-transactionsearchconfig.html
|
|
1887
|
+
:exampleMetadata: fixture=_generated
|
|
1888
|
+
|
|
1889
|
+
Example::
|
|
1890
|
+
|
|
1891
|
+
# The code below shows an example of how to instantiate this type.
|
|
1892
|
+
# The values are placeholders you should change.
|
|
1893
|
+
from aws_cdk import aws_xray as xray
|
|
1894
|
+
|
|
1895
|
+
cfn_transaction_search_config_props = xray.CfnTransactionSearchConfigProps(
|
|
1896
|
+
indexing_percentage=123
|
|
1897
|
+
)
|
|
1898
|
+
'''
|
|
1899
|
+
if __debug__:
|
|
1900
|
+
type_hints = typing.get_type_hints(_typecheckingstub__b2b1f6ec191fd59be2f27330c4455e3dafefecd89a9d126ea095d2128052987b)
|
|
1901
|
+
check_type(argname="argument indexing_percentage", value=indexing_percentage, expected_type=type_hints["indexing_percentage"])
|
|
1902
|
+
self._values: typing.Dict[builtins.str, typing.Any] = {}
|
|
1903
|
+
if indexing_percentage is not None:
|
|
1904
|
+
self._values["indexing_percentage"] = indexing_percentage
|
|
1905
|
+
|
|
1906
|
+
@builtins.property
|
|
1907
|
+
def indexing_percentage(self) -> typing.Optional[jsii.Number]:
|
|
1908
|
+
'''Determines the percentage of traces indexed from CloudWatch Logs to X-Ray.
|
|
1909
|
+
|
|
1910
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-xray-transactionsearchconfig.html#cfn-xray-transactionsearchconfig-indexingpercentage
|
|
1911
|
+
'''
|
|
1912
|
+
result = self._values.get("indexing_percentage")
|
|
1913
|
+
return typing.cast(typing.Optional[jsii.Number], result)
|
|
1914
|
+
|
|
1915
|
+
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
1916
|
+
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
1917
|
+
|
|
1918
|
+
def __ne__(self, rhs: typing.Any) -> builtins.bool:
|
|
1919
|
+
return not (rhs == self)
|
|
1920
|
+
|
|
1921
|
+
def __repr__(self) -> str:
|
|
1922
|
+
return "CfnTransactionSearchConfigProps(%s)" % ", ".join(
|
|
1923
|
+
k + "=" + repr(v) for k, v in self._values.items()
|
|
1924
|
+
)
|
|
1925
|
+
|
|
1926
|
+
|
|
1768
1927
|
__all__ = [
|
|
1769
1928
|
"CfnGroup",
|
|
1770
1929
|
"CfnGroupProps",
|
|
@@ -1772,6 +1931,8 @@ __all__ = [
|
|
|
1772
1931
|
"CfnResourcePolicyProps",
|
|
1773
1932
|
"CfnSamplingRule",
|
|
1774
1933
|
"CfnSamplingRuleProps",
|
|
1934
|
+
"CfnTransactionSearchConfig",
|
|
1935
|
+
"CfnTransactionSearchConfigProps",
|
|
1775
1936
|
]
|
|
1776
1937
|
|
|
1777
1938
|
publication.publish()
|
|
@@ -2003,3 +2164,37 @@ def _typecheckingstub__6728191ed28a57c9130311eb26a506218d6fceeade2816c46cf035cf4
|
|
|
2003
2164
|
) -> None:
|
|
2004
2165
|
"""Type checking stubs"""
|
|
2005
2166
|
pass
|
|
2167
|
+
|
|
2168
|
+
def _typecheckingstub__f4e1a30e946dc148e1f6ca9dc5dce1a4c01ae226f9b2a99f68a6bfd8caeabe51(
|
|
2169
|
+
scope: _constructs_77d1e7e8.Construct,
|
|
2170
|
+
id: builtins.str,
|
|
2171
|
+
*,
|
|
2172
|
+
indexing_percentage: typing.Optional[jsii.Number] = None,
|
|
2173
|
+
) -> None:
|
|
2174
|
+
"""Type checking stubs"""
|
|
2175
|
+
pass
|
|
2176
|
+
|
|
2177
|
+
def _typecheckingstub__394cc58a2d528bf2d5be35ac0c8c35c1fb008b91fb4981e2a17b7c6ffdba2f6b(
|
|
2178
|
+
inspector: _TreeInspector_488e0dd5,
|
|
2179
|
+
) -> None:
|
|
2180
|
+
"""Type checking stubs"""
|
|
2181
|
+
pass
|
|
2182
|
+
|
|
2183
|
+
def _typecheckingstub__60d903fbe1bf5e78e1363dfa2d6b437d90640f9c35b6768d40e1327382ee8fcb(
|
|
2184
|
+
props: typing.Mapping[builtins.str, typing.Any],
|
|
2185
|
+
) -> None:
|
|
2186
|
+
"""Type checking stubs"""
|
|
2187
|
+
pass
|
|
2188
|
+
|
|
2189
|
+
def _typecheckingstub__667a8dfa445e5a7771cc889a458d31a28e3722f0192c79d0a77ca783777108dc(
|
|
2190
|
+
value: typing.Optional[jsii.Number],
|
|
2191
|
+
) -> None:
|
|
2192
|
+
"""Type checking stubs"""
|
|
2193
|
+
pass
|
|
2194
|
+
|
|
2195
|
+
def _typecheckingstub__b2b1f6ec191fd59be2f27330c4455e3dafefecd89a9d126ea095d2128052987b(
|
|
2196
|
+
*,
|
|
2197
|
+
indexing_percentage: typing.Optional[jsii.Number] = None,
|
|
2198
|
+
) -> None:
|
|
2199
|
+
"""Type checking stubs"""
|
|
2200
|
+
pass
|
|
@@ -2912,7 +2912,7 @@ class DeployOptions(DefaultCdkOptions):
|
|
|
2912
2912
|
:param notification_arns: ARNs of SNS topics that CloudFormation will notify with stack related events. Default: - no notifications
|
|
2913
2913
|
:param outputs_file: Path to file where stack outputs will be written after a successful deploy as JSON. Default: - Outputs are not written to any file
|
|
2914
2914
|
:param parameters: Additional parameters for CloudFormation at deploy time. Default: {}
|
|
2915
|
-
:param require_approval: What kind of security changes require approval. Default: RequireApproval.
|
|
2915
|
+
:param require_approval: What kind of security changes require approval. Default: RequireApproval.NEVER
|
|
2916
2916
|
:param reuse_assets: Reuse the assets with the given asset IDs. Default: - do not reuse assets
|
|
2917
2917
|
:param rollback: Rollback failed deployments. Default: true
|
|
2918
2918
|
:param toolkit_stack_name: Name of the toolkit stack to use/deploy. Default: CDKToolkit
|
|
@@ -3391,7 +3391,7 @@ class DeployOptions(DefaultCdkOptions):
|
|
|
3391
3391
|
def require_approval(self) -> typing.Optional["RequireApproval"]:
|
|
3392
3392
|
'''What kind of security changes require approval.
|
|
3393
3393
|
|
|
3394
|
-
:default: RequireApproval.
|
|
3394
|
+
:default: RequireApproval.NEVER
|
|
3395
3395
|
'''
|
|
3396
3396
|
result = self._values.get("require_approval")
|
|
3397
3397
|
return typing.cast(typing.Optional["RequireApproval"], result)
|