aws-cdk-lib 2.182.0__py3-none-any.whl → 2.184.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk-lib might be problematic. Click here for more details.

Files changed (49) hide show
  1. aws_cdk/__init__.py +459 -33
  2. aws_cdk/_jsii/__init__.py +1 -1
  3. aws_cdk/_jsii/{aws-cdk-lib@2.182.0.jsii.tgz → aws-cdk-lib@2.184.0.jsii.tgz} +0 -0
  4. aws_cdk/aws_batch/__init__.py +15 -9
  5. aws_cdk/aws_bedrock/__init__.py +5804 -2325
  6. aws_cdk/aws_ce/__init__.py +141 -3
  7. aws_cdk/aws_cloudformation/__init__.py +26 -33
  8. aws_cdk/aws_cloudfront/experimental/__init__.py +2 -2
  9. aws_cdk/aws_cloudtrail/__init__.py +4 -4
  10. aws_cdk/aws_codebuild/__init__.py +4 -10
  11. aws_cdk/aws_cognito/__init__.py +3 -3
  12. aws_cdk/aws_dms/__init__.py +350 -0
  13. aws_cdk/aws_ec2/__init__.py +63 -5
  14. aws_cdk/aws_elasticache/__init__.py +3 -3
  15. aws_cdk/aws_emr/__init__.py +9 -3
  16. aws_cdk/aws_events/__init__.py +3 -1
  17. aws_cdk/aws_events_targets/__init__.py +31 -7
  18. aws_cdk/aws_gameliftstreams/__init__.py +1205 -0
  19. aws_cdk/aws_iam/__init__.py +290 -35
  20. aws_cdk/aws_inspector/__init__.py +13 -10
  21. aws_cdk/aws_iot/__init__.py +616 -22
  22. aws_cdk/aws_iotfleetwise/__init__.py +72 -10
  23. aws_cdk/aws_iotsitewise/__init__.py +12 -8
  24. aws_cdk/aws_kafkaconnect/__init__.py +4 -2
  25. aws_cdk/aws_kinesisfirehose/__init__.py +45 -51
  26. aws_cdk/aws_lambda/__init__.py +27 -18
  27. aws_cdk/aws_lambda_event_sources/__init__.py +14 -14
  28. aws_cdk/aws_logs/__init__.py +133 -0
  29. aws_cdk/aws_medialive/__init__.py +86 -86
  30. aws_cdk/aws_msk/__init__.py +236 -128
  31. aws_cdk/aws_neptunegraph/__init__.py +3 -3
  32. aws_cdk/aws_opensearchserverless/__init__.py +1031 -0
  33. aws_cdk/aws_quicksight/__init__.py +6511 -20331
  34. aws_cdk/aws_rds/__init__.py +264 -32
  35. aws_cdk/aws_redshift/__init__.py +8 -8
  36. aws_cdk/aws_sagemaker/__init__.py +12 -5
  37. aws_cdk/aws_securitylake/__init__.py +3 -0
  38. aws_cdk/aws_synthetics/__init__.py +2 -0
  39. aws_cdk/aws_transfer/__init__.py +241 -40
  40. aws_cdk/aws_wafv2/__init__.py +118 -30
  41. aws_cdk/aws_xray/__init__.py +195 -0
  42. aws_cdk/cloud_assembly_schema/__init__.py +2 -2
  43. aws_cdk/custom_resources/__init__.py +65 -8
  44. {aws_cdk_lib-2.182.0.dist-info → aws_cdk_lib-2.184.0.dist-info}/METADATA +5 -6
  45. {aws_cdk_lib-2.182.0.dist-info → aws_cdk_lib-2.184.0.dist-info}/RECORD +49 -48
  46. {aws_cdk_lib-2.182.0.dist-info → aws_cdk_lib-2.184.0.dist-info}/LICENSE +0 -0
  47. {aws_cdk_lib-2.182.0.dist-info → aws_cdk_lib-2.184.0.dist-info}/NOTICE +0 -0
  48. {aws_cdk_lib-2.182.0.dist-info → aws_cdk_lib-2.184.0.dist-info}/WHEEL +0 -0
  49. {aws_cdk_lib-2.182.0.dist-info → aws_cdk_lib-2.184.0.dist-info}/top_level.txt +0 -0
@@ -4499,7 +4499,7 @@ class CfnRuleGroup(
4499
4499
  :param cookies: Inspect the request cookies. You must configure scope and pattern matching filters in the ``Cookies`` object, to define the set of cookies and the parts of the cookies that AWS WAF inspects. Only the first 8 KB (8192 bytes) of a request's cookies and only the first 200 cookies are forwarded to AWS WAF for inspection by the underlying host service. You must configure how to handle any oversize cookie content in the ``Cookies`` object. AWS WAF applies the pattern matching filters to the cookies that it receives from the underlying host service.
4500
4500
  :param headers: Inspect the request headers. You must configure scope and pattern matching filters in the ``Headers`` object, to define the set of headers to and the parts of the headers that AWS WAF inspects. Only the first 8 KB (8192 bytes) of a request's headers and only the first 200 headers are forwarded to AWS WAF for inspection by the underlying host service. You must configure how to handle any oversize header content in the ``Headers`` object. AWS WAF applies the pattern matching filters to the headers that it receives from the underlying host service.
4501
4501
  :param ja3_fingerprint: Available for use with Amazon CloudFront distributions and Application Load Balancers. Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information. .. epigraph:: You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` . You can obtain the JA3 fingerprint for client requests from the web ACL logs. If AWS WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see `Log fields <https://docs.aws.amazon.com/waf/latest/developerguide/logging-fields.html>`_ in the *AWS WAF Developer Guide* . Provide the JA3 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
4502
- :param ja4_fingerprint: Includes the JA4 fingerprint of a web request.
4502
+ :param ja4_fingerprint: Available for use with Amazon CloudFront distributions and Application Load Balancers. Match against the request's JA4 fingerprint. The JA4 fingerprint is a 36-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information. .. epigraph:: You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` . You can obtain the JA4 fingerprint for client requests from the web ACL logs. If AWS WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see `Log fields <https://docs.aws.amazon.com/waf/latest/developerguide/logging-fields.html>`_ in the *AWS WAF Developer Guide* . Provide the JA4 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
4503
4503
  :param json_body: Inspect the request body as JSON. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. AWS WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service only forwards the contents that are within the limit to AWS WAF for inspection. - For Application Load Balancer and AWS AppSync , the limit is fixed at 8 KB (8,192 bytes). - For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and you can increase the limit for each resource type in the web ACL ``AssociationConfig`` , for additional processing fees. For information about how to handle oversized request bodies, see the ``JsonBody`` object configuration.
4504
4504
  :param method: Inspect the HTTP method. The method indicates the type of operation that the request is asking the origin to perform.
4505
4505
  :param query_string: Inspect the query string. This is the part of a URL that appears after a ``?`` character, if any.
@@ -4694,7 +4694,16 @@ class CfnRuleGroup(
4694
4694
  def ja4_fingerprint(
4695
4695
  self,
4696
4696
  ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnRuleGroup.JA4FingerprintProperty"]]:
4697
- '''Includes the JA4 fingerprint of a web request.
4697
+ '''Available for use with Amazon CloudFront distributions and Application Load Balancers.
4698
+
4699
+ Match against the request's JA4 fingerprint. The JA4 fingerprint is a 36-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information.
4700
+ .. epigraph::
4701
+
4702
+ You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` .
4703
+
4704
+ You can obtain the JA4 fingerprint for client requests from the web ACL logs. If AWS WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see `Log fields <https://docs.aws.amazon.com/waf/latest/developerguide/logging-fields.html>`_ in the *AWS WAF Developer Guide* .
4705
+
4706
+ Provide the JA4 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
4698
4707
 
4699
4708
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-rulegroup-fieldtomatch.html#cfn-wafv2-rulegroup-fieldtomatch-ja4fingerprint
4700
4709
  '''
@@ -5546,9 +5555,18 @@ class CfnRuleGroup(
5546
5555
  )
5547
5556
  class JA4FingerprintProperty:
5548
5557
  def __init__(self, *, fallback_behavior: builtins.str) -> None:
5549
- '''Includes the JA4 fingerprint of a web request.
5558
+ '''Available for use with Amazon CloudFront distributions and Application Load Balancers.
5559
+
5560
+ Match against the request's JA4 fingerprint. The JA4 fingerprint is a 36-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information.
5561
+ .. epigraph::
5550
5562
 
5551
- :param fallback_behavior:
5563
+ You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` .
5564
+
5565
+ You can obtain the JA4 fingerprint for client requests from the web ACL logs. If AWS WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see `Log fields <https://docs.aws.amazon.com/waf/latest/developerguide/logging-fields.html>`_ in the *AWS WAF Developer Guide* .
5566
+
5567
+ Provide the JA4 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
5568
+
5569
+ :param fallback_behavior: The match status to assign to the web request if the request doesn't have a JA4 fingerprint. You can specify the following fallback behaviors: - ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request. - ``NO_MATCH`` - Treat the web request as not matching the rule statement.
5552
5570
 
5553
5571
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-rulegroup-ja4fingerprint.html
5554
5572
  :exampleMetadata: fixture=_generated
@@ -5572,7 +5590,13 @@ class CfnRuleGroup(
5572
5590
 
5573
5591
  @builtins.property
5574
5592
  def fallback_behavior(self) -> builtins.str:
5575
- '''
5593
+ '''The match status to assign to the web request if the request doesn't have a JA4 fingerprint.
5594
+
5595
+ You can specify the following fallback behaviors:
5596
+
5597
+ - ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request.
5598
+ - ``NO_MATCH`` - Treat the web request as not matching the rule statement.
5599
+
5576
5600
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-rulegroup-ja4fingerprint.html#cfn-wafv2-rulegroup-ja4fingerprint-fallbackbehavior
5577
5601
  '''
5578
5602
  result = self._values.get("fallback_behavior")
@@ -7027,8 +7051,8 @@ class CfnRuleGroup(
7027
7051
  :param header: Use the value of a header in the request as an aggregate key. Each distinct value in the header contributes to the aggregation instance. If you use a single header as your custom key, then each value fully defines an aggregation instance.
7028
7052
  :param http_method: Use the request's HTTP method as an aggregate key. Each distinct HTTP method contributes to the aggregation instance. If you use just the HTTP method as your custom key, then each method fully defines an aggregation instance.
7029
7053
  :param ip: Use the request's originating IP address as an aggregate key. Each distinct IP address contributes to the aggregation instance. When you specify an IP or forwarded IP in the custom key settings, you must also specify at least one other key to use. You can aggregate on only the IP address by specifying ``IP`` in your rate-based statement's ``AggregateKeyType`` .
7030
- :param ja3_fingerprint: Specifies the request's JA3 fingerprint as an aggregate key for a rate-based rule.
7031
- :param ja4_fingerprint: Specifies the request's JA4 fingerprint as an aggregate key for a rate-based rule.
7054
+ :param ja3_fingerprint: Use the request's JA3 fingerprint as an aggregate key. If you use a single JA3 fingerprint as your custom key, then each value fully defines an aggregation instance.
7055
+ :param ja4_fingerprint: Use the request's JA4 fingerprint as an aggregate key. If you use a single JA4 fingerprint as your custom key, then each value fully defines an aggregation instance.
7032
7056
  :param label_namespace: Use the specified label namespace as an aggregate key. Each distinct fully qualified label name that has the specified label namespace contributes to the aggregation instance. If you use just one label namespace as your custom key, then each label name fully defines an aggregation instance. This uses only labels that have been added to the request by rules that are evaluated before this rate-based rule in the web ACL. For information about label namespaces and names, see `Label syntax and naming requirements <https://docs.aws.amazon.com/waf/latest/developerguide/waf-rule-label-requirements.html>`_ in the *AWS WAF Developer Guide* .
7033
7057
  :param query_argument: Use the specified query argument as an aggregate key. Each distinct value for the named query argument contributes to the aggregation instance. If you use a single query argument as your custom key, then each value fully defines an aggregation instance.
7034
7058
  :param query_string: Use the request's query string as an aggregate key. Each distinct string contributes to the aggregation instance. If you use just the query string as your custom key, then each string fully defines an aggregation instance.
@@ -7199,7 +7223,9 @@ class CfnRuleGroup(
7199
7223
  def ja3_fingerprint(
7200
7224
  self,
7201
7225
  ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnRuleGroup.RateLimitJA3FingerprintProperty"]]:
7202
- '''Specifies the request's JA3 fingerprint as an aggregate key for a rate-based rule.
7226
+ '''Use the request's JA3 fingerprint as an aggregate key.
7227
+
7228
+ If you use a single JA3 fingerprint as your custom key, then each value fully defines an aggregation instance.
7203
7229
 
7204
7230
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-rulegroup-ratebasedstatementcustomkey.html#cfn-wafv2-rulegroup-ratebasedstatementcustomkey-ja3fingerprint
7205
7231
  '''
@@ -7210,7 +7236,9 @@ class CfnRuleGroup(
7210
7236
  def ja4_fingerprint(
7211
7237
  self,
7212
7238
  ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnRuleGroup.RateLimitJA4FingerprintProperty"]]:
7213
- '''Specifies the request's JA4 fingerprint as an aggregate key for a rate-based rule.
7239
+ '''Use the request's JA4 fingerprint as an aggregate key.
7240
+
7241
+ If you use a single JA4 fingerprint as your custom key, then each value fully defines an aggregation instance.
7214
7242
 
7215
7243
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-rulegroup-ratebasedstatementcustomkey.html#cfn-wafv2-rulegroup-ratebasedstatementcustomkey-ja4fingerprint
7216
7244
  '''
@@ -8102,9 +8130,11 @@ class CfnRuleGroup(
8102
8130
  )
8103
8131
  class RateLimitJA3FingerprintProperty:
8104
8132
  def __init__(self, *, fallback_behavior: builtins.str) -> None:
8105
- '''Specifies the request's JA3 fingerprint as an aggregate key for a rate-based rule.
8133
+ '''Use the request's JA3 fingerprint derived from the TLS Client Hello of an incoming request as an aggregate key.
8106
8134
 
8107
- :param fallback_behavior:
8135
+ If you use a single JA3 fingerprint as your custom key, then each value fully defines an aggregation instance.
8136
+
8137
+ :param fallback_behavior: The match status to assign to the web request if there is insufficient TSL Client Hello information to compute the JA3 fingerprint. You can specify the following fallback behaviors: - ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request. - ``NO_MATCH`` - Treat the web request as not matching the rule statement.
8108
8138
 
8109
8139
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-rulegroup-ratelimitja3fingerprint.html
8110
8140
  :exampleMetadata: fixture=_generated
@@ -8128,7 +8158,13 @@ class CfnRuleGroup(
8128
8158
 
8129
8159
  @builtins.property
8130
8160
  def fallback_behavior(self) -> builtins.str:
8131
- '''
8161
+ '''The match status to assign to the web request if there is insufficient TSL Client Hello information to compute the JA3 fingerprint.
8162
+
8163
+ You can specify the following fallback behaviors:
8164
+
8165
+ - ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request.
8166
+ - ``NO_MATCH`` - Treat the web request as not matching the rule statement.
8167
+
8132
8168
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-rulegroup-ratelimitja3fingerprint.html#cfn-wafv2-rulegroup-ratelimitja3fingerprint-fallbackbehavior
8133
8169
  '''
8134
8170
  result = self._values.get("fallback_behavior")
@@ -8153,9 +8189,11 @@ class CfnRuleGroup(
8153
8189
  )
8154
8190
  class RateLimitJA4FingerprintProperty:
8155
8191
  def __init__(self, *, fallback_behavior: builtins.str) -> None:
8156
- '''Specifies the request's JA4 fingerprint as an aggregate key for a rate-based rule.
8192
+ '''Use the request's JA4 fingerprint derived from the TLS Client Hello of an incoming request as an aggregate key.
8193
+
8194
+ If you use a single JA4 fingerprint as your custom key, then each value fully defines an aggregation instance.
8157
8195
 
8158
- :param fallback_behavior:
8196
+ :param fallback_behavior: The match status to assign to the web request if there is insufficient TSL Client Hello information to compute the JA4 fingerprint. You can specify the following fallback behaviors: - ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request. - ``NO_MATCH`` - Treat the web request as not matching the rule statement.
8159
8197
 
8160
8198
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-rulegroup-ratelimitja4fingerprint.html
8161
8199
  :exampleMetadata: fixture=_generated
@@ -8179,7 +8217,13 @@ class CfnRuleGroup(
8179
8217
 
8180
8218
  @builtins.property
8181
8219
  def fallback_behavior(self) -> builtins.str:
8182
- '''
8220
+ '''The match status to assign to the web request if there is insufficient TSL Client Hello information to compute the JA4 fingerprint.
8221
+
8222
+ You can specify the following fallback behaviors:
8223
+
8224
+ - ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request.
8225
+ - ``NO_MATCH`` - Treat the web request as not matching the rule statement.
8226
+
8183
8227
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-rulegroup-ratelimitja4fingerprint.html#cfn-wafv2-rulegroup-ratelimitja4fingerprint-fallbackbehavior
8184
8228
  '''
8185
8229
  result = self._values.get("fallback_behavior")
@@ -14356,7 +14400,7 @@ class CfnWebACL(
14356
14400
  :param cookies: Inspect the request cookies. You must configure scope and pattern matching filters in the ``Cookies`` object, to define the set of cookies and the parts of the cookies that AWS WAF inspects. Only the first 8 KB (8192 bytes) of a request's cookies and only the first 200 cookies are forwarded to AWS WAF for inspection by the underlying host service. You must configure how to handle any oversize cookie content in the ``Cookies`` object. AWS WAF applies the pattern matching filters to the cookies that it receives from the underlying host service.
14357
14401
  :param headers: Inspect the request headers. You must configure scope and pattern matching filters in the ``Headers`` object, to define the set of headers to and the parts of the headers that AWS WAF inspects. Only the first 8 KB (8192 bytes) of a request's headers and only the first 200 headers are forwarded to AWS WAF for inspection by the underlying host service. You must configure how to handle any oversize header content in the ``Headers`` object. AWS WAF applies the pattern matching filters to the headers that it receives from the underlying host service.
14358
14402
  :param ja3_fingerprint: Available for use with Amazon CloudFront distributions and Application Load Balancers. Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information. .. epigraph:: You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` . You can obtain the JA3 fingerprint for client requests from the web ACL logs. If AWS WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see `Log fields <https://docs.aws.amazon.com/waf/latest/developerguide/logging-fields.html>`_ in the *AWS WAF Developer Guide* . Provide the JA3 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
14359
- :param ja4_fingerprint: Includes the JA4 fingerprint of a web request.
14403
+ :param ja4_fingerprint: Available for use with Amazon CloudFront distributions and Application Load Balancers. Match against the request's JA4 fingerprint. The JA4 fingerprint is a 36-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information. .. epigraph:: You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` . You can obtain the JA4 fingerprint for client requests from the web ACL logs. If AWS WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see `Log fields <https://docs.aws.amazon.com/waf/latest/developerguide/logging-fields.html>`_ in the *AWS WAF Developer Guide* . Provide the JA4 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
14360
14404
  :param json_body: Inspect the request body as JSON. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. AWS WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service only forwards the contents that are within the limit to AWS WAF for inspection. - For Application Load Balancer and AWS AppSync , the limit is fixed at 8 KB (8,192 bytes). - For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and you can increase the limit for each resource type in the web ACL ``AssociationConfig`` , for additional processing fees. For information about how to handle oversized request bodies, see the ``JsonBody`` object configuration.
14361
14405
  :param method: Inspect the HTTP method. The method indicates the type of operation that the request is asking the origin to perform.
14362
14406
  :param query_string: Inspect the query string. This is the part of a URL that appears after a ``?`` character, if any.
@@ -14551,7 +14595,16 @@ class CfnWebACL(
14551
14595
  def ja4_fingerprint(
14552
14596
  self,
14553
14597
  ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnWebACL.JA4FingerprintProperty"]]:
14554
- '''Includes the JA4 fingerprint of a web request.
14598
+ '''Available for use with Amazon CloudFront distributions and Application Load Balancers.
14599
+
14600
+ Match against the request's JA4 fingerprint. The JA4 fingerprint is a 36-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information.
14601
+ .. epigraph::
14602
+
14603
+ You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` .
14604
+
14605
+ You can obtain the JA4 fingerprint for client requests from the web ACL logs. If AWS WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see `Log fields <https://docs.aws.amazon.com/waf/latest/developerguide/logging-fields.html>`_ in the *AWS WAF Developer Guide* .
14606
+
14607
+ Provide the JA4 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
14555
14608
 
14556
14609
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-fieldtomatch.html#cfn-wafv2-webacl-fieldtomatch-ja4fingerprint
14557
14610
  '''
@@ -15403,9 +15456,18 @@ class CfnWebACL(
15403
15456
  )
15404
15457
  class JA4FingerprintProperty:
15405
15458
  def __init__(self, *, fallback_behavior: builtins.str) -> None:
15406
- '''Includes the JA4 fingerprint of a web request.
15459
+ '''Available for use with Amazon CloudFront distributions and Application Load Balancers.
15460
+
15461
+ Match against the request's JA4 fingerprint. The JA4 fingerprint is a 36-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information.
15462
+ .. epigraph::
15407
15463
 
15408
- :param fallback_behavior:
15464
+ You can use this choice only with a string match ``ByteMatchStatement`` with the ``PositionalConstraint`` set to ``EXACTLY`` .
15465
+
15466
+ You can obtain the JA4 fingerprint for client requests from the web ACL logs. If AWS WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see `Log fields <https://docs.aws.amazon.com/waf/latest/developerguide/logging-fields.html>`_ in the *AWS WAF Developer Guide* .
15467
+
15468
+ Provide the JA4 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
15469
+
15470
+ :param fallback_behavior: The match status to assign to the web request if the request doesn't have a JA4 fingerprint. You can specify the following fallback behaviors: - ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request. - ``NO_MATCH`` - Treat the web request as not matching the rule statement.
15409
15471
 
15410
15472
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-ja4fingerprint.html
15411
15473
  :exampleMetadata: fixture=_generated
@@ -15429,7 +15491,13 @@ class CfnWebACL(
15429
15491
 
15430
15492
  @builtins.property
15431
15493
  def fallback_behavior(self) -> builtins.str:
15432
- '''
15494
+ '''The match status to assign to the web request if the request doesn't have a JA4 fingerprint.
15495
+
15496
+ You can specify the following fallback behaviors:
15497
+
15498
+ - ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request.
15499
+ - ``NO_MATCH`` - Treat the web request as not matching the rule statement.
15500
+
15433
15501
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-ja4fingerprint.html#cfn-wafv2-webacl-ja4fingerprint-fallbackbehavior
15434
15502
  '''
15435
15503
  result = self._values.get("fallback_behavior")
@@ -16512,8 +16580,8 @@ class CfnWebACL(
16512
16580
  :param header: Use the value of a header in the request as an aggregate key. Each distinct value in the header contributes to the aggregation instance. If you use a single header as your custom key, then each value fully defines an aggregation instance.
16513
16581
  :param http_method: Use the request's HTTP method as an aggregate key. Each distinct HTTP method contributes to the aggregation instance. If you use just the HTTP method as your custom key, then each method fully defines an aggregation instance.
16514
16582
  :param ip: Use the request's originating IP address as an aggregate key. Each distinct IP address contributes to the aggregation instance. When you specify an IP or forwarded IP in the custom key settings, you must also specify at least one other key to use. You can aggregate on only the IP address by specifying ``IP`` in your rate-based statement's ``AggregateKeyType`` .
16515
- :param ja3_fingerprint: Specifies the request's JA3 fingerprint as an aggregate key for a rate-based rule.
16516
- :param ja4_fingerprint: Specifies the request's JA4 fingerprint as an aggregate key for a rate-based rule.
16583
+ :param ja3_fingerprint: Use the request's JA3 fingerprint as an aggregate key. If you use a single JA3 fingerprint as your custom key, then each value fully defines an aggregation instance.
16584
+ :param ja4_fingerprint: Use the request's JA4 fingerprint as an aggregate key. If you use a single JA4 fingerprint as your custom key, then each value fully defines an aggregation instance.
16517
16585
  :param label_namespace: Use the specified label namespace as an aggregate key. Each distinct fully qualified label name that has the specified label namespace contributes to the aggregation instance. If you use just one label namespace as your custom key, then each label name fully defines an aggregation instance. This uses only labels that have been added to the request by rules that are evaluated before this rate-based rule in the web ACL. For information about label namespaces and names, see `Label syntax and naming requirements <https://docs.aws.amazon.com/waf/latest/developerguide/waf-rule-label-requirements.html>`_ in the *AWS WAF Developer Guide* .
16518
16586
  :param query_argument: Use the specified query argument as an aggregate key. Each distinct value for the named query argument contributes to the aggregation instance. If you use a single query argument as your custom key, then each value fully defines an aggregation instance.
16519
16587
  :param query_string: Use the request's query string as an aggregate key. Each distinct string contributes to the aggregation instance. If you use just the query string as your custom key, then each string fully defines an aggregation instance.
@@ -16684,7 +16752,9 @@ class CfnWebACL(
16684
16752
  def ja3_fingerprint(
16685
16753
  self,
16686
16754
  ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnWebACL.RateLimitJA3FingerprintProperty"]]:
16687
- '''Specifies the request's JA3 fingerprint as an aggregate key for a rate-based rule.
16755
+ '''Use the request's JA3 fingerprint as an aggregate key.
16756
+
16757
+ If you use a single JA3 fingerprint as your custom key, then each value fully defines an aggregation instance.
16688
16758
 
16689
16759
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-ratebasedstatementcustomkey.html#cfn-wafv2-webacl-ratebasedstatementcustomkey-ja3fingerprint
16690
16760
  '''
@@ -16695,7 +16765,9 @@ class CfnWebACL(
16695
16765
  def ja4_fingerprint(
16696
16766
  self,
16697
16767
  ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnWebACL.RateLimitJA4FingerprintProperty"]]:
16698
- '''Specifies the request's JA4 fingerprint as an aggregate key for a rate-based rule.
16768
+ '''Use the request's JA4 fingerprint as an aggregate key.
16769
+
16770
+ If you use a single JA4 fingerprint as your custom key, then each value fully defines an aggregation instance.
16699
16771
 
16700
16772
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-ratebasedstatementcustomkey.html#cfn-wafv2-webacl-ratebasedstatementcustomkey-ja4fingerprint
16701
16773
  '''
@@ -17156,9 +17228,11 @@ class CfnWebACL(
17156
17228
  )
17157
17229
  class RateLimitJA3FingerprintProperty:
17158
17230
  def __init__(self, *, fallback_behavior: builtins.str) -> None:
17159
- '''Specifies the request's JA3 fingerprint as an aggregate key for a rate-based rule.
17231
+ '''Use the request's JA3 fingerprint derived from the TLS Client Hello of an incoming request as an aggregate key.
17160
17232
 
17161
- :param fallback_behavior:
17233
+ If you use a single JA3 fingerprint as your custom key, then each value fully defines an aggregation instance.
17234
+
17235
+ :param fallback_behavior: The match status to assign to the web request if there is insufficient TSL Client Hello information to compute the JA3 fingerprint. You can specify the following fallback behaviors: - ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request. - ``NO_MATCH`` - Treat the web request as not matching the rule statement.
17162
17236
 
17163
17237
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-ratelimitja3fingerprint.html
17164
17238
  :exampleMetadata: fixture=_generated
@@ -17182,7 +17256,13 @@ class CfnWebACL(
17182
17256
 
17183
17257
  @builtins.property
17184
17258
  def fallback_behavior(self) -> builtins.str:
17185
- '''
17259
+ '''The match status to assign to the web request if there is insufficient TSL Client Hello information to compute the JA3 fingerprint.
17260
+
17261
+ You can specify the following fallback behaviors:
17262
+
17263
+ - ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request.
17264
+ - ``NO_MATCH`` - Treat the web request as not matching the rule statement.
17265
+
17186
17266
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-ratelimitja3fingerprint.html#cfn-wafv2-webacl-ratelimitja3fingerprint-fallbackbehavior
17187
17267
  '''
17188
17268
  result = self._values.get("fallback_behavior")
@@ -17207,9 +17287,11 @@ class CfnWebACL(
17207
17287
  )
17208
17288
  class RateLimitJA4FingerprintProperty:
17209
17289
  def __init__(self, *, fallback_behavior: builtins.str) -> None:
17210
- '''Specifies the request's JA4 fingerprint as an aggregate key for a rate-based rule.
17290
+ '''Use the request's JA4 fingerprint derived from the TLS Client Hello of an incoming request as an aggregate key.
17291
+
17292
+ If you use a single JA4 fingerprint as your custom key, then each value fully defines an aggregation instance.
17211
17293
 
17212
- :param fallback_behavior:
17294
+ :param fallback_behavior: The match status to assign to the web request if there is insufficient TSL Client Hello information to compute the JA4 fingerprint. You can specify the following fallback behaviors: - ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request. - ``NO_MATCH`` - Treat the web request as not matching the rule statement.
17213
17295
 
17214
17296
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-ratelimitja4fingerprint.html
17215
17297
  :exampleMetadata: fixture=_generated
@@ -17233,7 +17315,13 @@ class CfnWebACL(
17233
17315
 
17234
17316
  @builtins.property
17235
17317
  def fallback_behavior(self) -> builtins.str:
17236
- '''
17318
+ '''The match status to assign to the web request if there is insufficient TSL Client Hello information to compute the JA4 fingerprint.
17319
+
17320
+ You can specify the following fallback behaviors:
17321
+
17322
+ - ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request.
17323
+ - ``NO_MATCH`` - Treat the web request as not matching the rule statement.
17324
+
17237
17325
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-ratelimitja4fingerprint.html#cfn-wafv2-webacl-ratelimitja4fingerprint-fallbackbehavior
17238
17326
  '''
17239
17327
  result = self._values.get("fallback_behavior")
@@ -1765,6 +1765,165 @@ class CfnSamplingRuleProps:
1765
1765
  )
1766
1766
 
1767
1767
 
1768
+ @jsii.implements(_IInspectable_c2943556)
1769
+ class CfnTransactionSearchConfig(
1770
+ _CfnResource_9df397a6,
1771
+ metaclass=jsii.JSIIMeta,
1772
+ jsii_type="aws-cdk-lib.aws_xray.CfnTransactionSearchConfig",
1773
+ ):
1774
+ '''This schema provides construct and validation rules for AWS-XRay TransactionSearchConfig resource parameters.
1775
+
1776
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-xray-transactionsearchconfig.html
1777
+ :cloudformationResource: AWS::XRay::TransactionSearchConfig
1778
+ :exampleMetadata: fixture=_generated
1779
+
1780
+ Example::
1781
+
1782
+ # The code below shows an example of how to instantiate this type.
1783
+ # The values are placeholders you should change.
1784
+ from aws_cdk import aws_xray as xray
1785
+
1786
+ cfn_transaction_search_config = xray.CfnTransactionSearchConfig(self, "MyCfnTransactionSearchConfig",
1787
+ indexing_percentage=123
1788
+ )
1789
+ '''
1790
+
1791
+ def __init__(
1792
+ self,
1793
+ scope: _constructs_77d1e7e8.Construct,
1794
+ id: builtins.str,
1795
+ *,
1796
+ indexing_percentage: typing.Optional[jsii.Number] = None,
1797
+ ) -> None:
1798
+ '''
1799
+ :param scope: Scope in which this resource is defined.
1800
+ :param id: Construct identifier for this resource (unique in its scope).
1801
+ :param indexing_percentage: Determines the percentage of traces indexed from CloudWatch Logs to X-Ray.
1802
+ '''
1803
+ if __debug__:
1804
+ type_hints = typing.get_type_hints(_typecheckingstub__f4e1a30e946dc148e1f6ca9dc5dce1a4c01ae226f9b2a99f68a6bfd8caeabe51)
1805
+ check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
1806
+ check_type(argname="argument id", value=id, expected_type=type_hints["id"])
1807
+ props = CfnTransactionSearchConfigProps(
1808
+ indexing_percentage=indexing_percentage
1809
+ )
1810
+
1811
+ jsii.create(self.__class__, self, [scope, id, props])
1812
+
1813
+ @jsii.member(jsii_name="inspect")
1814
+ def inspect(self, inspector: _TreeInspector_488e0dd5) -> None:
1815
+ '''Examines the CloudFormation resource and discloses attributes.
1816
+
1817
+ :param inspector: tree inspector to collect and process attributes.
1818
+ '''
1819
+ if __debug__:
1820
+ type_hints = typing.get_type_hints(_typecheckingstub__394cc58a2d528bf2d5be35ac0c8c35c1fb008b91fb4981e2a17b7c6ffdba2f6b)
1821
+ check_type(argname="argument inspector", value=inspector, expected_type=type_hints["inspector"])
1822
+ return typing.cast(None, jsii.invoke(self, "inspect", [inspector]))
1823
+
1824
+ @jsii.member(jsii_name="renderProperties")
1825
+ def _render_properties(
1826
+ self,
1827
+ props: typing.Mapping[builtins.str, typing.Any],
1828
+ ) -> typing.Mapping[builtins.str, typing.Any]:
1829
+ '''
1830
+ :param props: -
1831
+ '''
1832
+ if __debug__:
1833
+ type_hints = typing.get_type_hints(_typecheckingstub__60d903fbe1bf5e78e1363dfa2d6b437d90640f9c35b6768d40e1327382ee8fcb)
1834
+ check_type(argname="argument props", value=props, expected_type=type_hints["props"])
1835
+ return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.invoke(self, "renderProperties", [props]))
1836
+
1837
+ @jsii.python.classproperty
1838
+ @jsii.member(jsii_name="CFN_RESOURCE_TYPE_NAME")
1839
+ def CFN_RESOURCE_TYPE_NAME(cls) -> builtins.str:
1840
+ '''The CloudFormation resource type name for this resource class.'''
1841
+ return typing.cast(builtins.str, jsii.sget(cls, "CFN_RESOURCE_TYPE_NAME"))
1842
+
1843
+ @builtins.property
1844
+ @jsii.member(jsii_name="attrAccountId")
1845
+ def attr_account_id(self) -> builtins.str:
1846
+ '''User account id, used as the primary identifier for the resource.
1847
+
1848
+ :cloudformationAttribute: AccountId
1849
+ '''
1850
+ return typing.cast(builtins.str, jsii.get(self, "attrAccountId"))
1851
+
1852
+ @builtins.property
1853
+ @jsii.member(jsii_name="cfnProperties")
1854
+ def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
1855
+ return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.get(self, "cfnProperties"))
1856
+
1857
+ @builtins.property
1858
+ @jsii.member(jsii_name="indexingPercentage")
1859
+ def indexing_percentage(self) -> typing.Optional[jsii.Number]:
1860
+ '''Determines the percentage of traces indexed from CloudWatch Logs to X-Ray.'''
1861
+ return typing.cast(typing.Optional[jsii.Number], jsii.get(self, "indexingPercentage"))
1862
+
1863
+ @indexing_percentage.setter
1864
+ def indexing_percentage(self, value: typing.Optional[jsii.Number]) -> None:
1865
+ if __debug__:
1866
+ type_hints = typing.get_type_hints(_typecheckingstub__667a8dfa445e5a7771cc889a458d31a28e3722f0192c79d0a77ca783777108dc)
1867
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1868
+ jsii.set(self, "indexingPercentage", value) # pyright: ignore[reportArgumentType]
1869
+
1870
+
1871
+ @jsii.data_type(
1872
+ jsii_type="aws-cdk-lib.aws_xray.CfnTransactionSearchConfigProps",
1873
+ jsii_struct_bases=[],
1874
+ name_mapping={"indexing_percentage": "indexingPercentage"},
1875
+ )
1876
+ class CfnTransactionSearchConfigProps:
1877
+ def __init__(
1878
+ self,
1879
+ *,
1880
+ indexing_percentage: typing.Optional[jsii.Number] = None,
1881
+ ) -> None:
1882
+ '''Properties for defining a ``CfnTransactionSearchConfig``.
1883
+
1884
+ :param indexing_percentage: Determines the percentage of traces indexed from CloudWatch Logs to X-Ray.
1885
+
1886
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-xray-transactionsearchconfig.html
1887
+ :exampleMetadata: fixture=_generated
1888
+
1889
+ Example::
1890
+
1891
+ # The code below shows an example of how to instantiate this type.
1892
+ # The values are placeholders you should change.
1893
+ from aws_cdk import aws_xray as xray
1894
+
1895
+ cfn_transaction_search_config_props = xray.CfnTransactionSearchConfigProps(
1896
+ indexing_percentage=123
1897
+ )
1898
+ '''
1899
+ if __debug__:
1900
+ type_hints = typing.get_type_hints(_typecheckingstub__b2b1f6ec191fd59be2f27330c4455e3dafefecd89a9d126ea095d2128052987b)
1901
+ check_type(argname="argument indexing_percentage", value=indexing_percentage, expected_type=type_hints["indexing_percentage"])
1902
+ self._values: typing.Dict[builtins.str, typing.Any] = {}
1903
+ if indexing_percentage is not None:
1904
+ self._values["indexing_percentage"] = indexing_percentage
1905
+
1906
+ @builtins.property
1907
+ def indexing_percentage(self) -> typing.Optional[jsii.Number]:
1908
+ '''Determines the percentage of traces indexed from CloudWatch Logs to X-Ray.
1909
+
1910
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-xray-transactionsearchconfig.html#cfn-xray-transactionsearchconfig-indexingpercentage
1911
+ '''
1912
+ result = self._values.get("indexing_percentage")
1913
+ return typing.cast(typing.Optional[jsii.Number], result)
1914
+
1915
+ def __eq__(self, rhs: typing.Any) -> builtins.bool:
1916
+ return isinstance(rhs, self.__class__) and rhs._values == self._values
1917
+
1918
+ def __ne__(self, rhs: typing.Any) -> builtins.bool:
1919
+ return not (rhs == self)
1920
+
1921
+ def __repr__(self) -> str:
1922
+ return "CfnTransactionSearchConfigProps(%s)" % ", ".join(
1923
+ k + "=" + repr(v) for k, v in self._values.items()
1924
+ )
1925
+
1926
+
1768
1927
  __all__ = [
1769
1928
  "CfnGroup",
1770
1929
  "CfnGroupProps",
@@ -1772,6 +1931,8 @@ __all__ = [
1772
1931
  "CfnResourcePolicyProps",
1773
1932
  "CfnSamplingRule",
1774
1933
  "CfnSamplingRuleProps",
1934
+ "CfnTransactionSearchConfig",
1935
+ "CfnTransactionSearchConfigProps",
1775
1936
  ]
1776
1937
 
1777
1938
  publication.publish()
@@ -2003,3 +2164,37 @@ def _typecheckingstub__6728191ed28a57c9130311eb26a506218d6fceeade2816c46cf035cf4
2003
2164
  ) -> None:
2004
2165
  """Type checking stubs"""
2005
2166
  pass
2167
+
2168
+ def _typecheckingstub__f4e1a30e946dc148e1f6ca9dc5dce1a4c01ae226f9b2a99f68a6bfd8caeabe51(
2169
+ scope: _constructs_77d1e7e8.Construct,
2170
+ id: builtins.str,
2171
+ *,
2172
+ indexing_percentage: typing.Optional[jsii.Number] = None,
2173
+ ) -> None:
2174
+ """Type checking stubs"""
2175
+ pass
2176
+
2177
+ def _typecheckingstub__394cc58a2d528bf2d5be35ac0c8c35c1fb008b91fb4981e2a17b7c6ffdba2f6b(
2178
+ inspector: _TreeInspector_488e0dd5,
2179
+ ) -> None:
2180
+ """Type checking stubs"""
2181
+ pass
2182
+
2183
+ def _typecheckingstub__60d903fbe1bf5e78e1363dfa2d6b437d90640f9c35b6768d40e1327382ee8fcb(
2184
+ props: typing.Mapping[builtins.str, typing.Any],
2185
+ ) -> None:
2186
+ """Type checking stubs"""
2187
+ pass
2188
+
2189
+ def _typecheckingstub__667a8dfa445e5a7771cc889a458d31a28e3722f0192c79d0a77ca783777108dc(
2190
+ value: typing.Optional[jsii.Number],
2191
+ ) -> None:
2192
+ """Type checking stubs"""
2193
+ pass
2194
+
2195
+ def _typecheckingstub__b2b1f6ec191fd59be2f27330c4455e3dafefecd89a9d126ea095d2128052987b(
2196
+ *,
2197
+ indexing_percentage: typing.Optional[jsii.Number] = None,
2198
+ ) -> None:
2199
+ """Type checking stubs"""
2200
+ pass
@@ -2912,7 +2912,7 @@ class DeployOptions(DefaultCdkOptions):
2912
2912
  :param notification_arns: ARNs of SNS topics that CloudFormation will notify with stack related events. Default: - no notifications
2913
2913
  :param outputs_file: Path to file where stack outputs will be written after a successful deploy as JSON. Default: - Outputs are not written to any file
2914
2914
  :param parameters: Additional parameters for CloudFormation at deploy time. Default: {}
2915
- :param require_approval: What kind of security changes require approval. Default: RequireApproval.Never
2915
+ :param require_approval: What kind of security changes require approval. Default: RequireApproval.NEVER
2916
2916
  :param reuse_assets: Reuse the assets with the given asset IDs. Default: - do not reuse assets
2917
2917
  :param rollback: Rollback failed deployments. Default: true
2918
2918
  :param toolkit_stack_name: Name of the toolkit stack to use/deploy. Default: CDKToolkit
@@ -3391,7 +3391,7 @@ class DeployOptions(DefaultCdkOptions):
3391
3391
  def require_approval(self) -> typing.Optional["RequireApproval"]:
3392
3392
  '''What kind of security changes require approval.
3393
3393
 
3394
- :default: RequireApproval.Never
3394
+ :default: RequireApproval.NEVER
3395
3395
  '''
3396
3396
  result = self._values.get("require_approval")
3397
3397
  return typing.cast(typing.Optional["RequireApproval"], result)