aws-cdk-lib 2.182.0__py3-none-any.whl → 2.184.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk-lib might be problematic. Click here for more details.

Files changed (49) hide show
  1. aws_cdk/__init__.py +459 -33
  2. aws_cdk/_jsii/__init__.py +1 -1
  3. aws_cdk/_jsii/{aws-cdk-lib@2.182.0.jsii.tgz → aws-cdk-lib@2.184.0.jsii.tgz} +0 -0
  4. aws_cdk/aws_batch/__init__.py +15 -9
  5. aws_cdk/aws_bedrock/__init__.py +5804 -2325
  6. aws_cdk/aws_ce/__init__.py +141 -3
  7. aws_cdk/aws_cloudformation/__init__.py +26 -33
  8. aws_cdk/aws_cloudfront/experimental/__init__.py +2 -2
  9. aws_cdk/aws_cloudtrail/__init__.py +4 -4
  10. aws_cdk/aws_codebuild/__init__.py +4 -10
  11. aws_cdk/aws_cognito/__init__.py +3 -3
  12. aws_cdk/aws_dms/__init__.py +350 -0
  13. aws_cdk/aws_ec2/__init__.py +63 -5
  14. aws_cdk/aws_elasticache/__init__.py +3 -3
  15. aws_cdk/aws_emr/__init__.py +9 -3
  16. aws_cdk/aws_events/__init__.py +3 -1
  17. aws_cdk/aws_events_targets/__init__.py +31 -7
  18. aws_cdk/aws_gameliftstreams/__init__.py +1205 -0
  19. aws_cdk/aws_iam/__init__.py +290 -35
  20. aws_cdk/aws_inspector/__init__.py +13 -10
  21. aws_cdk/aws_iot/__init__.py +616 -22
  22. aws_cdk/aws_iotfleetwise/__init__.py +72 -10
  23. aws_cdk/aws_iotsitewise/__init__.py +12 -8
  24. aws_cdk/aws_kafkaconnect/__init__.py +4 -2
  25. aws_cdk/aws_kinesisfirehose/__init__.py +45 -51
  26. aws_cdk/aws_lambda/__init__.py +27 -18
  27. aws_cdk/aws_lambda_event_sources/__init__.py +14 -14
  28. aws_cdk/aws_logs/__init__.py +133 -0
  29. aws_cdk/aws_medialive/__init__.py +86 -86
  30. aws_cdk/aws_msk/__init__.py +236 -128
  31. aws_cdk/aws_neptunegraph/__init__.py +3 -3
  32. aws_cdk/aws_opensearchserverless/__init__.py +1031 -0
  33. aws_cdk/aws_quicksight/__init__.py +6511 -20331
  34. aws_cdk/aws_rds/__init__.py +264 -32
  35. aws_cdk/aws_redshift/__init__.py +8 -8
  36. aws_cdk/aws_sagemaker/__init__.py +12 -5
  37. aws_cdk/aws_securitylake/__init__.py +3 -0
  38. aws_cdk/aws_synthetics/__init__.py +2 -0
  39. aws_cdk/aws_transfer/__init__.py +241 -40
  40. aws_cdk/aws_wafv2/__init__.py +118 -30
  41. aws_cdk/aws_xray/__init__.py +195 -0
  42. aws_cdk/cloud_assembly_schema/__init__.py +2 -2
  43. aws_cdk/custom_resources/__init__.py +65 -8
  44. {aws_cdk_lib-2.182.0.dist-info → aws_cdk_lib-2.184.0.dist-info}/METADATA +5 -6
  45. {aws_cdk_lib-2.182.0.dist-info → aws_cdk_lib-2.184.0.dist-info}/RECORD +49 -48
  46. {aws_cdk_lib-2.182.0.dist-info → aws_cdk_lib-2.184.0.dist-info}/LICENSE +0 -0
  47. {aws_cdk_lib-2.182.0.dist-info → aws_cdk_lib-2.184.0.dist-info}/NOTICE +0 -0
  48. {aws_cdk_lib-2.182.0.dist-info → aws_cdk_lib-2.184.0.dist-info}/WHEEL +0 -0
  49. {aws_cdk_lib-2.182.0.dist-info → aws_cdk_lib-2.184.0.dist-info}/top_level.txt +0 -0
@@ -4373,10 +4373,15 @@ class CfnSAMLProvider(
4373
4373
  from aws_cdk import aws_iam as iam
4374
4374
 
4375
4375
  cfn_sAMLProvider = iam.CfnSAMLProvider(self, "MyCfnSAMLProvider",
4376
- saml_metadata_document="samlMetadataDocument",
4377
-
4378
- # the properties below are optional
4376
+ add_private_key="addPrivateKey",
4377
+ assertion_encryption_mode="assertionEncryptionMode",
4379
4378
  name="name",
4379
+ private_key_list=[iam.CfnSAMLProvider.SAMLPrivateKeyProperty(
4380
+ key_id="keyId",
4381
+ timestamp="timestamp"
4382
+ )],
4383
+ remove_private_key="removePrivateKey",
4384
+ saml_metadata_document="samlMetadataDocument",
4380
4385
  tags=[CfnTag(
4381
4386
  key="key",
4382
4387
  value="value"
@@ -4389,15 +4394,23 @@ class CfnSAMLProvider(
4389
4394
  scope: _constructs_77d1e7e8.Construct,
4390
4395
  id: builtins.str,
4391
4396
  *,
4392
- saml_metadata_document: builtins.str,
4397
+ add_private_key: typing.Optional[builtins.str] = None,
4398
+ assertion_encryption_mode: typing.Optional[builtins.str] = None,
4393
4399
  name: typing.Optional[builtins.str] = None,
4400
+ private_key_list: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnSAMLProvider.SAMLPrivateKeyProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
4401
+ remove_private_key: typing.Optional[builtins.str] = None,
4402
+ saml_metadata_document: typing.Optional[builtins.str] = None,
4394
4403
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
4395
4404
  ) -> None:
4396
4405
  '''
4397
4406
  :param scope: Scope in which this resource is defined.
4398
4407
  :param id: Construct identifier for this resource (unique in its scope).
4399
- :param saml_metadata_document: An XML document generated by an identity provider (IdP) that supports SAML 2.0. The document includes the issuer's name, expiration information, and keys that can be used to validate the SAML authentication response (assertions) that are received from the IdP. You must generate the metadata document using the identity management software that is used as your organization's IdP. For more information, see `About SAML 2.0-based federation <https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_saml.html>`_ in the *IAM User Guide*
4408
+ :param add_private_key: The private key from your external identity provider.
4409
+ :param assertion_encryption_mode: The encryption setting for the SAML provider.
4400
4410
  :param name: The name of the provider to create. This parameter allows (through its `regex pattern <https://docs.aws.amazon.com/http://wikipedia.org/wiki/regex>`_ ) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-
4411
+ :param private_key_list:
4412
+ :param remove_private_key: The Key ID of the private key to remove.
4413
+ :param saml_metadata_document: An XML document generated by an identity provider (IdP) that supports SAML 2.0. The document includes the issuer's name, expiration information, and keys that can be used to validate the SAML authentication response (assertions) that are received from the IdP. You must generate the metadata document using the identity management software that is used as your organization's IdP. For more information, see `About SAML 2.0-based federation <https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_saml.html>`_ in the *IAM User Guide*
4401
4414
  :param tags: A list of tags that you want to attach to the new IAM SAML provider. Each tag consists of a key name and an associated value. For more information about tagging, see `Tagging IAM resources <https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html>`_ in the *IAM User Guide* . .. epigraph:: If any one of the tags is invalid or if you exceed the allowed maximum number of tags, then the entire request fails and the resource is not created.
4402
4415
  '''
4403
4416
  if __debug__:
@@ -4405,7 +4418,13 @@ class CfnSAMLProvider(
4405
4418
  check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
4406
4419
  check_type(argname="argument id", value=id, expected_type=type_hints["id"])
4407
4420
  props = CfnSAMLProviderProps(
4408
- saml_metadata_document=saml_metadata_document, name=name, tags=tags
4421
+ add_private_key=add_private_key,
4422
+ assertion_encryption_mode=assertion_encryption_mode,
4423
+ name=name,
4424
+ private_key_list=private_key_list,
4425
+ remove_private_key=remove_private_key,
4426
+ saml_metadata_document=saml_metadata_document,
4427
+ tags=tags,
4409
4428
  )
4410
4429
 
4411
4430
  jsii.create(self.__class__, self, [scope, id, props])
@@ -4449,6 +4468,15 @@ class CfnSAMLProvider(
4449
4468
  '''
4450
4469
  return typing.cast(builtins.str, jsii.get(self, "attrArn"))
4451
4470
 
4471
+ @builtins.property
4472
+ @jsii.member(jsii_name="attrSamlProviderUuid")
4473
+ def attr_saml_provider_uuid(self) -> builtins.str:
4474
+ '''The unique identifier assigned to the SAML provider.
4475
+
4476
+ :cloudformationAttribute: SamlProviderUUID
4477
+ '''
4478
+ return typing.cast(builtins.str, jsii.get(self, "attrSamlProviderUuid"))
4479
+
4452
4480
  @builtins.property
4453
4481
  @jsii.member(jsii_name="cfnProperties")
4454
4482
  def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
@@ -4461,17 +4489,30 @@ class CfnSAMLProvider(
4461
4489
  return typing.cast(_TagManager_0a598cb3, jsii.get(self, "tags"))
4462
4490
 
4463
4491
  @builtins.property
4464
- @jsii.member(jsii_name="samlMetadataDocument")
4465
- def saml_metadata_document(self) -> builtins.str:
4466
- '''An XML document generated by an identity provider (IdP) that supports SAML 2.0. The document includes the issuer's name, expiration information, and keys that can be used to validate the SAML authentication response (assertions) that are received from the IdP. You must generate the metadata document using the identity management software that is used as your organization's IdP.'''
4467
- return typing.cast(builtins.str, jsii.get(self, "samlMetadataDocument"))
4492
+ @jsii.member(jsii_name="addPrivateKey")
4493
+ def add_private_key(self) -> typing.Optional[builtins.str]:
4494
+ '''The private key from your external identity provider.'''
4495
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "addPrivateKey"))
4468
4496
 
4469
- @saml_metadata_document.setter
4470
- def saml_metadata_document(self, value: builtins.str) -> None:
4497
+ @add_private_key.setter
4498
+ def add_private_key(self, value: typing.Optional[builtins.str]) -> None:
4471
4499
  if __debug__:
4472
- type_hints = typing.get_type_hints(_typecheckingstub__6c9b70ef0e0ed94f53ecf2221518796deaf4c5a9353a14b0183e26bbe0e0d57c)
4500
+ type_hints = typing.get_type_hints(_typecheckingstub__8eda0b212280ae29b138f852bf55874f8617cd18d7ed484f68edc38bffe20894)
4473
4501
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
4474
- jsii.set(self, "samlMetadataDocument", value) # pyright: ignore[reportArgumentType]
4502
+ jsii.set(self, "addPrivateKey", value) # pyright: ignore[reportArgumentType]
4503
+
4504
+ @builtins.property
4505
+ @jsii.member(jsii_name="assertionEncryptionMode")
4506
+ def assertion_encryption_mode(self) -> typing.Optional[builtins.str]:
4507
+ '''The encryption setting for the SAML provider.'''
4508
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "assertionEncryptionMode"))
4509
+
4510
+ @assertion_encryption_mode.setter
4511
+ def assertion_encryption_mode(self, value: typing.Optional[builtins.str]) -> None:
4512
+ if __debug__:
4513
+ type_hints = typing.get_type_hints(_typecheckingstub__b22ac38ad8a3fd6af168b0c9077c481244d37477d750cb3920773c2aa0381628)
4514
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
4515
+ jsii.set(self, "assertionEncryptionMode", value) # pyright: ignore[reportArgumentType]
4475
4516
 
4476
4517
  @builtins.property
4477
4518
  @jsii.member(jsii_name="name")
@@ -4486,6 +4527,49 @@ class CfnSAMLProvider(
4486
4527
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
4487
4528
  jsii.set(self, "name", value) # pyright: ignore[reportArgumentType]
4488
4529
 
4530
+ @builtins.property
4531
+ @jsii.member(jsii_name="privateKeyList")
4532
+ def private_key_list(
4533
+ self,
4534
+ ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnSAMLProvider.SAMLPrivateKeyProperty"]]]]:
4535
+ return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnSAMLProvider.SAMLPrivateKeyProperty"]]]], jsii.get(self, "privateKeyList"))
4536
+
4537
+ @private_key_list.setter
4538
+ def private_key_list(
4539
+ self,
4540
+ value: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnSAMLProvider.SAMLPrivateKeyProperty"]]]],
4541
+ ) -> None:
4542
+ if __debug__:
4543
+ type_hints = typing.get_type_hints(_typecheckingstub__4b658e1199288ad46a20aa58d7a48bed2a7a2ce85d292b87c990c63d1cbea592)
4544
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
4545
+ jsii.set(self, "privateKeyList", value) # pyright: ignore[reportArgumentType]
4546
+
4547
+ @builtins.property
4548
+ @jsii.member(jsii_name="removePrivateKey")
4549
+ def remove_private_key(self) -> typing.Optional[builtins.str]:
4550
+ '''The Key ID of the private key to remove.'''
4551
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "removePrivateKey"))
4552
+
4553
+ @remove_private_key.setter
4554
+ def remove_private_key(self, value: typing.Optional[builtins.str]) -> None:
4555
+ if __debug__:
4556
+ type_hints = typing.get_type_hints(_typecheckingstub__9ee9b5a78619fab076894e18105c29d8554950dedb6d0b06ebdb5bdcf17266e1)
4557
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
4558
+ jsii.set(self, "removePrivateKey", value) # pyright: ignore[reportArgumentType]
4559
+
4560
+ @builtins.property
4561
+ @jsii.member(jsii_name="samlMetadataDocument")
4562
+ def saml_metadata_document(self) -> typing.Optional[builtins.str]:
4563
+ '''An XML document generated by an identity provider (IdP) that supports SAML 2.0. The document includes the issuer's name, expiration information, and keys that can be used to validate the SAML authentication response (assertions) that are received from the IdP. You must generate the metadata document using the identity management software that is used as your organization's IdP.'''
4564
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "samlMetadataDocument"))
4565
+
4566
+ @saml_metadata_document.setter
4567
+ def saml_metadata_document(self, value: typing.Optional[builtins.str]) -> None:
4568
+ if __debug__:
4569
+ type_hints = typing.get_type_hints(_typecheckingstub__6c9b70ef0e0ed94f53ecf2221518796deaf4c5a9353a14b0183e26bbe0e0d57c)
4570
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
4571
+ jsii.set(self, "samlMetadataDocument", value) # pyright: ignore[reportArgumentType]
4572
+
4489
4573
  @builtins.property
4490
4574
  @jsii.member(jsii_name="tagsRaw")
4491
4575
  def tags_raw(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
@@ -4499,13 +4583,83 @@ class CfnSAMLProvider(
4499
4583
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
4500
4584
  jsii.set(self, "tagsRaw", value) # pyright: ignore[reportArgumentType]
4501
4585
 
4586
+ @jsii.data_type(
4587
+ jsii_type="aws-cdk-lib.aws_iam.CfnSAMLProvider.SAMLPrivateKeyProperty",
4588
+ jsii_struct_bases=[],
4589
+ name_mapping={"key_id": "keyId", "timestamp": "timestamp"},
4590
+ )
4591
+ class SAMLPrivateKeyProperty:
4592
+ def __init__(self, *, key_id: builtins.str, timestamp: builtins.str) -> None:
4593
+ '''The private key metadata for the SAML provider.
4594
+
4595
+ :param key_id: The unique identifier for the SAML private key.
4596
+ :param timestamp: The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format, when the private key was uploaded.
4597
+
4598
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-samlprovider-samlprivatekey.html
4599
+ :exampleMetadata: fixture=_generated
4600
+
4601
+ Example::
4602
+
4603
+ # The code below shows an example of how to instantiate this type.
4604
+ # The values are placeholders you should change.
4605
+ from aws_cdk import aws_iam as iam
4606
+
4607
+ s_aMLPrivate_key_property = iam.CfnSAMLProvider.SAMLPrivateKeyProperty(
4608
+ key_id="keyId",
4609
+ timestamp="timestamp"
4610
+ )
4611
+ '''
4612
+ if __debug__:
4613
+ type_hints = typing.get_type_hints(_typecheckingstub__e7b8165114a2decbdfd66da703311b43a9b1c50edd7d65c71d2b8484a52e4f02)
4614
+ check_type(argname="argument key_id", value=key_id, expected_type=type_hints["key_id"])
4615
+ check_type(argname="argument timestamp", value=timestamp, expected_type=type_hints["timestamp"])
4616
+ self._values: typing.Dict[builtins.str, typing.Any] = {
4617
+ "key_id": key_id,
4618
+ "timestamp": timestamp,
4619
+ }
4620
+
4621
+ @builtins.property
4622
+ def key_id(self) -> builtins.str:
4623
+ '''The unique identifier for the SAML private key.
4624
+
4625
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-samlprovider-samlprivatekey.html#cfn-iam-samlprovider-samlprivatekey-keyid
4626
+ '''
4627
+ result = self._values.get("key_id")
4628
+ assert result is not None, "Required property 'key_id' is missing"
4629
+ return typing.cast(builtins.str, result)
4630
+
4631
+ @builtins.property
4632
+ def timestamp(self) -> builtins.str:
4633
+ '''The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format, when the private key was uploaded.
4634
+
4635
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-samlprovider-samlprivatekey.html#cfn-iam-samlprovider-samlprivatekey-timestamp
4636
+ '''
4637
+ result = self._values.get("timestamp")
4638
+ assert result is not None, "Required property 'timestamp' is missing"
4639
+ return typing.cast(builtins.str, result)
4640
+
4641
+ def __eq__(self, rhs: typing.Any) -> builtins.bool:
4642
+ return isinstance(rhs, self.__class__) and rhs._values == self._values
4643
+
4644
+ def __ne__(self, rhs: typing.Any) -> builtins.bool:
4645
+ return not (rhs == self)
4646
+
4647
+ def __repr__(self) -> str:
4648
+ return "SAMLPrivateKeyProperty(%s)" % ", ".join(
4649
+ k + "=" + repr(v) for k, v in self._values.items()
4650
+ )
4651
+
4502
4652
 
4503
4653
  @jsii.data_type(
4504
4654
  jsii_type="aws-cdk-lib.aws_iam.CfnSAMLProviderProps",
4505
4655
  jsii_struct_bases=[],
4506
4656
  name_mapping={
4507
- "saml_metadata_document": "samlMetadataDocument",
4657
+ "add_private_key": "addPrivateKey",
4658
+ "assertion_encryption_mode": "assertionEncryptionMode",
4508
4659
  "name": "name",
4660
+ "private_key_list": "privateKeyList",
4661
+ "remove_private_key": "removePrivateKey",
4662
+ "saml_metadata_document": "samlMetadataDocument",
4509
4663
  "tags": "tags",
4510
4664
  },
4511
4665
  )
@@ -4513,14 +4667,22 @@ class CfnSAMLProviderProps:
4513
4667
  def __init__(
4514
4668
  self,
4515
4669
  *,
4516
- saml_metadata_document: builtins.str,
4670
+ add_private_key: typing.Optional[builtins.str] = None,
4671
+ assertion_encryption_mode: typing.Optional[builtins.str] = None,
4517
4672
  name: typing.Optional[builtins.str] = None,
4673
+ private_key_list: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnSAMLProvider.SAMLPrivateKeyProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
4674
+ remove_private_key: typing.Optional[builtins.str] = None,
4675
+ saml_metadata_document: typing.Optional[builtins.str] = None,
4518
4676
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
4519
4677
  ) -> None:
4520
4678
  '''Properties for defining a ``CfnSAMLProvider``.
4521
4679
 
4522
- :param saml_metadata_document: An XML document generated by an identity provider (IdP) that supports SAML 2.0. The document includes the issuer's name, expiration information, and keys that can be used to validate the SAML authentication response (assertions) that are received from the IdP. You must generate the metadata document using the identity management software that is used as your organization's IdP. For more information, see `About SAML 2.0-based federation <https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_saml.html>`_ in the *IAM User Guide*
4680
+ :param add_private_key: The private key from your external identity provider.
4681
+ :param assertion_encryption_mode: The encryption setting for the SAML provider.
4523
4682
  :param name: The name of the provider to create. This parameter allows (through its `regex pattern <https://docs.aws.amazon.com/http://wikipedia.org/wiki/regex>`_ ) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-
4683
+ :param private_key_list:
4684
+ :param remove_private_key: The Key ID of the private key to remove.
4685
+ :param saml_metadata_document: An XML document generated by an identity provider (IdP) that supports SAML 2.0. The document includes the issuer's name, expiration information, and keys that can be used to validate the SAML authentication response (assertions) that are received from the IdP. You must generate the metadata document using the identity management software that is used as your organization's IdP. For more information, see `About SAML 2.0-based federation <https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_saml.html>`_ in the *IAM User Guide*
4524
4686
  :param tags: A list of tags that you want to attach to the new IAM SAML provider. Each tag consists of a key name and an associated value. For more information about tagging, see `Tagging IAM resources <https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags.html>`_ in the *IAM User Guide* . .. epigraph:: If any one of the tags is invalid or if you exceed the allowed maximum number of tags, then the entire request fails and the resource is not created.
4525
4687
 
4526
4688
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-samlprovider.html
@@ -4533,10 +4695,15 @@ class CfnSAMLProviderProps:
4533
4695
  from aws_cdk import aws_iam as iam
4534
4696
 
4535
4697
  cfn_sAMLProvider_props = iam.CfnSAMLProviderProps(
4536
- saml_metadata_document="samlMetadataDocument",
4537
-
4538
- # the properties below are optional
4698
+ add_private_key="addPrivateKey",
4699
+ assertion_encryption_mode="assertionEncryptionMode",
4539
4700
  name="name",
4701
+ private_key_list=[iam.CfnSAMLProvider.SAMLPrivateKeyProperty(
4702
+ key_id="keyId",
4703
+ timestamp="timestamp"
4704
+ )],
4705
+ remove_private_key="removePrivateKey",
4706
+ saml_metadata_document="samlMetadataDocument",
4540
4707
  tags=[CfnTag(
4541
4708
  key="key",
4542
4709
  value="value"
@@ -4545,28 +4712,46 @@ class CfnSAMLProviderProps:
4545
4712
  '''
4546
4713
  if __debug__:
4547
4714
  type_hints = typing.get_type_hints(_typecheckingstub__753bbb479e0c0a542a8456d357a3312bedbcc25e8753ca69dabd0ebf09aa6de7)
4548
- check_type(argname="argument saml_metadata_document", value=saml_metadata_document, expected_type=type_hints["saml_metadata_document"])
4715
+ check_type(argname="argument add_private_key", value=add_private_key, expected_type=type_hints["add_private_key"])
4716
+ check_type(argname="argument assertion_encryption_mode", value=assertion_encryption_mode, expected_type=type_hints["assertion_encryption_mode"])
4549
4717
  check_type(argname="argument name", value=name, expected_type=type_hints["name"])
4718
+ check_type(argname="argument private_key_list", value=private_key_list, expected_type=type_hints["private_key_list"])
4719
+ check_type(argname="argument remove_private_key", value=remove_private_key, expected_type=type_hints["remove_private_key"])
4720
+ check_type(argname="argument saml_metadata_document", value=saml_metadata_document, expected_type=type_hints["saml_metadata_document"])
4550
4721
  check_type(argname="argument tags", value=tags, expected_type=type_hints["tags"])
4551
- self._values: typing.Dict[builtins.str, typing.Any] = {
4552
- "saml_metadata_document": saml_metadata_document,
4553
- }
4722
+ self._values: typing.Dict[builtins.str, typing.Any] = {}
4723
+ if add_private_key is not None:
4724
+ self._values["add_private_key"] = add_private_key
4725
+ if assertion_encryption_mode is not None:
4726
+ self._values["assertion_encryption_mode"] = assertion_encryption_mode
4554
4727
  if name is not None:
4555
4728
  self._values["name"] = name
4729
+ if private_key_list is not None:
4730
+ self._values["private_key_list"] = private_key_list
4731
+ if remove_private_key is not None:
4732
+ self._values["remove_private_key"] = remove_private_key
4733
+ if saml_metadata_document is not None:
4734
+ self._values["saml_metadata_document"] = saml_metadata_document
4556
4735
  if tags is not None:
4557
4736
  self._values["tags"] = tags
4558
4737
 
4559
4738
  @builtins.property
4560
- def saml_metadata_document(self) -> builtins.str:
4561
- '''An XML document generated by an identity provider (IdP) that supports SAML 2.0. The document includes the issuer's name, expiration information, and keys that can be used to validate the SAML authentication response (assertions) that are received from the IdP. You must generate the metadata document using the identity management software that is used as your organization's IdP.
4739
+ def add_private_key(self) -> typing.Optional[builtins.str]:
4740
+ '''The private key from your external identity provider.
4562
4741
 
4563
- For more information, see `About SAML 2.0-based federation <https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_saml.html>`_ in the *IAM User Guide*
4742
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-samlprovider.html#cfn-iam-samlprovider-addprivatekey
4743
+ '''
4744
+ result = self._values.get("add_private_key")
4745
+ return typing.cast(typing.Optional[builtins.str], result)
4564
4746
 
4565
- :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-samlprovider.html#cfn-iam-samlprovider-samlmetadatadocument
4747
+ @builtins.property
4748
+ def assertion_encryption_mode(self) -> typing.Optional[builtins.str]:
4749
+ '''The encryption setting for the SAML provider.
4750
+
4751
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-samlprovider.html#cfn-iam-samlprovider-assertionencryptionmode
4566
4752
  '''
4567
- result = self._values.get("saml_metadata_document")
4568
- assert result is not None, "Required property 'saml_metadata_document' is missing"
4569
- return typing.cast(builtins.str, result)
4753
+ result = self._values.get("assertion_encryption_mode")
4754
+ return typing.cast(typing.Optional[builtins.str], result)
4570
4755
 
4571
4756
  @builtins.property
4572
4757
  def name(self) -> typing.Optional[builtins.str]:
@@ -4579,6 +4764,36 @@ class CfnSAMLProviderProps:
4579
4764
  result = self._values.get("name")
4580
4765
  return typing.cast(typing.Optional[builtins.str], result)
4581
4766
 
4767
+ @builtins.property
4768
+ def private_key_list(
4769
+ self,
4770
+ ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnSAMLProvider.SAMLPrivateKeyProperty]]]]:
4771
+ '''
4772
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-samlprovider.html#cfn-iam-samlprovider-privatekeylist
4773
+ '''
4774
+ result = self._values.get("private_key_list")
4775
+ return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnSAMLProvider.SAMLPrivateKeyProperty]]]], result)
4776
+
4777
+ @builtins.property
4778
+ def remove_private_key(self) -> typing.Optional[builtins.str]:
4779
+ '''The Key ID of the private key to remove.
4780
+
4781
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-samlprovider.html#cfn-iam-samlprovider-removeprivatekey
4782
+ '''
4783
+ result = self._values.get("remove_private_key")
4784
+ return typing.cast(typing.Optional[builtins.str], result)
4785
+
4786
+ @builtins.property
4787
+ def saml_metadata_document(self) -> typing.Optional[builtins.str]:
4788
+ '''An XML document generated by an identity provider (IdP) that supports SAML 2.0. The document includes the issuer's name, expiration information, and keys that can be used to validate the SAML authentication response (assertions) that are received from the IdP. You must generate the metadata document using the identity management software that is used as your organization's IdP.
4789
+
4790
+ For more information, see `About SAML 2.0-based federation <https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_saml.html>`_ in the *IAM User Guide*
4791
+
4792
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-samlprovider.html#cfn-iam-samlprovider-samlmetadatadocument
4793
+ '''
4794
+ result = self._values.get("saml_metadata_document")
4795
+ return typing.cast(typing.Optional[builtins.str], result)
4796
+
4582
4797
  @builtins.property
4583
4798
  def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
4584
4799
  '''A list of tags that you want to attach to the new IAM SAML provider.
@@ -15531,8 +15746,12 @@ def _typecheckingstub__f64934981377388842130b01da042285d0dfa38ef82a7537c7ff86f5d
15531
15746
  scope: _constructs_77d1e7e8.Construct,
15532
15747
  id: builtins.str,
15533
15748
  *,
15534
- saml_metadata_document: builtins.str,
15749
+ add_private_key: typing.Optional[builtins.str] = None,
15750
+ assertion_encryption_mode: typing.Optional[builtins.str] = None,
15535
15751
  name: typing.Optional[builtins.str] = None,
15752
+ private_key_list: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnSAMLProvider.SAMLPrivateKeyProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
15753
+ remove_private_key: typing.Optional[builtins.str] = None,
15754
+ saml_metadata_document: typing.Optional[builtins.str] = None,
15536
15755
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
15537
15756
  ) -> None:
15538
15757
  """Type checking stubs"""
@@ -15550,8 +15769,14 @@ def _typecheckingstub__aa493901e136133decf51345379fd4b5dd35432e35f354e5dd453eb7d
15550
15769
  """Type checking stubs"""
15551
15770
  pass
15552
15771
 
15553
- def _typecheckingstub__6c9b70ef0e0ed94f53ecf2221518796deaf4c5a9353a14b0183e26bbe0e0d57c(
15554
- value: builtins.str,
15772
+ def _typecheckingstub__8eda0b212280ae29b138f852bf55874f8617cd18d7ed484f68edc38bffe20894(
15773
+ value: typing.Optional[builtins.str],
15774
+ ) -> None:
15775
+ """Type checking stubs"""
15776
+ pass
15777
+
15778
+ def _typecheckingstub__b22ac38ad8a3fd6af168b0c9077c481244d37477d750cb3920773c2aa0381628(
15779
+ value: typing.Optional[builtins.str],
15555
15780
  ) -> None:
15556
15781
  """Type checking stubs"""
15557
15782
  pass
@@ -15562,16 +15787,46 @@ def _typecheckingstub__bf699aa7d755e072f3b60499335fb6469de4ed3bdb0605652b9c32698
15562
15787
  """Type checking stubs"""
15563
15788
  pass
15564
15789
 
15790
+ def _typecheckingstub__4b658e1199288ad46a20aa58d7a48bed2a7a2ce85d292b87c990c63d1cbea592(
15791
+ value: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnSAMLProvider.SAMLPrivateKeyProperty]]]],
15792
+ ) -> None:
15793
+ """Type checking stubs"""
15794
+ pass
15795
+
15796
+ def _typecheckingstub__9ee9b5a78619fab076894e18105c29d8554950dedb6d0b06ebdb5bdcf17266e1(
15797
+ value: typing.Optional[builtins.str],
15798
+ ) -> None:
15799
+ """Type checking stubs"""
15800
+ pass
15801
+
15802
+ def _typecheckingstub__6c9b70ef0e0ed94f53ecf2221518796deaf4c5a9353a14b0183e26bbe0e0d57c(
15803
+ value: typing.Optional[builtins.str],
15804
+ ) -> None:
15805
+ """Type checking stubs"""
15806
+ pass
15807
+
15565
15808
  def _typecheckingstub__b139c04642da2a9b428a58eb37077beb7f9b79971517b5fd95e8c7dbfa322e67(
15566
15809
  value: typing.Optional[typing.List[_CfnTag_f6864754]],
15567
15810
  ) -> None:
15568
15811
  """Type checking stubs"""
15569
15812
  pass
15570
15813
 
15814
+ def _typecheckingstub__e7b8165114a2decbdfd66da703311b43a9b1c50edd7d65c71d2b8484a52e4f02(
15815
+ *,
15816
+ key_id: builtins.str,
15817
+ timestamp: builtins.str,
15818
+ ) -> None:
15819
+ """Type checking stubs"""
15820
+ pass
15821
+
15571
15822
  def _typecheckingstub__753bbb479e0c0a542a8456d357a3312bedbcc25e8753ca69dabd0ebf09aa6de7(
15572
15823
  *,
15573
- saml_metadata_document: builtins.str,
15824
+ add_private_key: typing.Optional[builtins.str] = None,
15825
+ assertion_encryption_mode: typing.Optional[builtins.str] = None,
15574
15826
  name: typing.Optional[builtins.str] = None,
15827
+ private_key_list: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnSAMLProvider.SAMLPrivateKeyProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
15828
+ remove_private_key: typing.Optional[builtins.str] = None,
15829
+ saml_metadata_document: typing.Optional[builtins.str] = None,
15575
15830
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
15576
15831
  ) -> None:
15577
15832
  """Type checking stubs"""
@@ -80,19 +80,20 @@ class AssessmentTemplate(
80
80
  TODO: This class should implement IAssessmentTemplate and "construct-ctor-props-type:aws-cdk-lib.aws_inspector.AssessmentTemplate" should be
81
81
  removed from ``awslint.json`` when implementing the L2 construct
82
82
 
83
- :exampleMetadata: fixture=_generated
83
+ :exampleMetadata: infused
84
84
 
85
85
  Example::
86
86
 
87
- # The code below shows an example of how to instantiate this type.
88
- # The values are placeholders you should change.
89
- from aws_cdk import aws_inspector as inspector
87
+ import aws_cdk.aws_inspector as inspector
88
+
89
+ # cfn_assessment_template: inspector.CfnAssessmentTemplate
90
90
 
91
- assessment_template = inspector.AssessmentTemplate(self, "MyAssessmentTemplate",
92
- account="account",
93
- environment_from_arn="environmentFromArn",
94
- physical_name="physicalName",
95
- region="region"
91
+
92
+ assessment_template = inspector.AssessmentTemplate.from_cfn_assessment_template(self, "MyAssessmentTemplate", cfn_assessment_template)
93
+
94
+ Schedule(self, "Schedule",
95
+ schedule=ScheduleExpression.rate(Duration.minutes(60)),
96
+ target=targets.InspectorStartAssessmentRun(assessment_template)
96
97
  )
97
98
  '''
98
99
 
@@ -400,8 +401,10 @@ class CfnAssessmentTemplate(
400
401
 
401
402
  import aws_cdk.aws_inspector as inspector
402
403
 
403
- # assessment_template: inspector.CfnAssessmentTemplate
404
+ # cfn_assessment_template: inspector.CfnAssessmentTemplate
405
+
404
406
 
407
+ assessment_template = inspector.AssessmentTemplate.from_cfn_assessment_template(self, "MyAssessmentTemplate", cfn_assessment_template)
405
408
 
406
409
  Schedule(self, "Schedule",
407
410
  schedule=ScheduleExpression.rate(Duration.minutes(60)),