aws-cdk-lib 2.189.1__py3-none-any.whl → 2.190.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk-lib might be problematic. Click here for more details.
- aws_cdk/_jsii/__init__.py +1 -1
- aws_cdk/_jsii/{aws-cdk-lib@2.189.1.jsii.tgz → aws-cdk-lib@2.190.0.jsii.tgz} +0 -0
- aws_cdk/aws_acmpca/__init__.py +6 -6
- aws_cdk/aws_apigatewayv2/__init__.py +374 -6
- aws_cdk/aws_applicationautoscaling/__init__.py +16 -10
- aws_cdk/aws_applicationsignals/__init__.py +204 -31
- aws_cdk/aws_backup/__init__.py +0 -41
- aws_cdk/aws_batch/__init__.py +215 -0
- aws_cdk/aws_bedrock/__init__.py +287 -0
- aws_cdk/aws_cleanrooms/__init__.py +1392 -78
- aws_cdk/aws_cloudfront/__init__.py +1 -0
- aws_cdk/aws_cloudtrail/__init__.py +24 -26
- aws_cdk/aws_codebuild/__init__.py +59 -7
- aws_cdk/aws_dms/__init__.py +43 -0
- aws_cdk/aws_ec2/__init__.py +364 -30
- aws_cdk/aws_ecs/__init__.py +36 -5
- aws_cdk/aws_eks/__init__.py +2 -100
- aws_cdk/aws_elasticache/__init__.py +6 -11
- aws_cdk/aws_elasticloadbalancingv2/__init__.py +341 -0
- aws_cdk/aws_events/__init__.py +67 -13
- aws_cdk/aws_fsx/__init__.py +9 -21
- aws_cdk/aws_iam/__init__.py +1 -1
- aws_cdk/aws_iot/__init__.py +6 -6
- aws_cdk/aws_kafkaconnect/__init__.py +2 -2
- aws_cdk/aws_kinesis/__init__.py +44 -0
- aws_cdk/aws_lex/__init__.py +615 -39
- aws_cdk/aws_location/__init__.py +4 -4
- aws_cdk/aws_macie/__init__.py +14 -3
- aws_cdk/aws_memorydb/__init__.py +87 -0
- aws_cdk/aws_msk/__init__.py +226 -127
- aws_cdk/aws_neptune/__init__.py +0 -8
- aws_cdk/aws_opensearchservice/__init__.py +64 -56
- aws_cdk/aws_paymentcryptography/__init__.py +41 -0
- aws_cdk/aws_qbusiness/__init__.py +175 -3
- aws_cdk/aws_quicksight/__init__.py +393 -0
- aws_cdk/aws_rds/__init__.py +113 -120
- aws_cdk/aws_redshiftserverless/__init__.py +4 -14
- aws_cdk/aws_route53resolver/__init__.py +60 -9
- aws_cdk/aws_s3/__init__.py +34 -1
- aws_cdk/aws_s3_deployment/__init__.py +202 -5
- aws_cdk/aws_sagemaker/__init__.py +40 -40
- aws_cdk/aws_ssmquicksetup/__init__.py +3 -3
- aws_cdk/aws_stepfunctions/__init__.py +720 -45
- aws_cdk/aws_transfer/__init__.py +55 -2
- aws_cdk/pipelines/__init__.py +1 -2
- {aws_cdk_lib-2.189.1.dist-info → aws_cdk_lib-2.190.0.dist-info}/METADATA +1 -1
- {aws_cdk_lib-2.189.1.dist-info → aws_cdk_lib-2.190.0.dist-info}/RECORD +51 -51
- {aws_cdk_lib-2.189.1.dist-info → aws_cdk_lib-2.190.0.dist-info}/LICENSE +0 -0
- {aws_cdk_lib-2.189.1.dist-info → aws_cdk_lib-2.190.0.dist-info}/NOTICE +0 -0
- {aws_cdk_lib-2.189.1.dist-info → aws_cdk_lib-2.190.0.dist-info}/WHEEL +0 -0
- {aws_cdk_lib-2.189.1.dist-info → aws_cdk_lib-2.190.0.dist-info}/top_level.txt +0 -0
aws_cdk/_jsii/__init__.py
CHANGED
|
@@ -34,7 +34,7 @@ import aws_cdk.cloud_assembly_schema._jsii
|
|
|
34
34
|
import constructs._jsii
|
|
35
35
|
|
|
36
36
|
__jsii_assembly__ = jsii.JSIIAssembly.load(
|
|
37
|
-
"aws-cdk-lib", "2.
|
|
37
|
+
"aws-cdk-lib", "2.190.0", __name__[0:-6], "aws-cdk-lib@2.190.0.jsii.tgz"
|
|
38
38
|
)
|
|
39
39
|
|
|
40
40
|
__all__ = [
|
|
Binary file
|
aws_cdk/aws_acmpca/__init__.py
CHANGED
|
@@ -2311,7 +2311,7 @@ class CfnCertificateAuthority(
|
|
|
2311
2311
|
:param subject: Structure that contains X.500 distinguished name information for your private CA.
|
|
2312
2312
|
:param type: Type of your private CA.
|
|
2313
2313
|
:param csr_extensions: Specifies information to be added to the extension section of the certificate signing request (CSR).
|
|
2314
|
-
:param key_storage_security_standard: Specifies a cryptographic key management compliance standard
|
|
2314
|
+
:param key_storage_security_standard: Specifies a cryptographic key management compliance standard for handling and protecting CA keys. Default: FIPS_140_2_LEVEL_3_OR_HIGHER .. epigraph:: Some AWS Regions don't support the default value. When you create a CA in these Regions, you must use ``CCPC_LEVEL_1_OR_HIGHER`` for the ``KeyStorageSecurityStandard`` parameter. If you don't, the operation returns an ``InvalidArgsException`` with this message: "A certificate authority cannot be created in this region with the specified security standard." For information about security standard support in different AWS Regions, see `Storage and security compliance of AWS Private CA private keys <https://docs.aws.amazon.com/privateca/latest/userguide/data-protection.html#private-keys>`_ .
|
|
2315
2315
|
:param revocation_configuration: Information about the Online Certificate Status Protocol (OCSP) configuration or certificate revocation list (CRL) created and maintained by your private CA.
|
|
2316
2316
|
:param tags: Key-value pairs that will be attached to the new private CA. You can associate up to 50 tags with a private CA. For information using tags with IAM to manage permissions, see `Controlling Access Using IAM Tags <https://docs.aws.amazon.com/IAM/latest/UserGuide/access_iam-tags.html>`_ .
|
|
2317
2317
|
:param usage_mode: Specifies whether the CA issues general-purpose certificates that typically require a revocation mechanism, or short-lived certificates that may optionally omit revocation because they expire quickly. Short-lived certificate validity is limited to seven days. The default value is GENERAL_PURPOSE.
|
|
@@ -2471,7 +2471,7 @@ class CfnCertificateAuthority(
|
|
|
2471
2471
|
@builtins.property
|
|
2472
2472
|
@jsii.member(jsii_name="keyStorageSecurityStandard")
|
|
2473
2473
|
def key_storage_security_standard(self) -> typing.Optional[builtins.str]:
|
|
2474
|
-
'''Specifies a cryptographic key management compliance standard
|
|
2474
|
+
'''Specifies a cryptographic key management compliance standard for handling and protecting CA keys.'''
|
|
2475
2475
|
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "keyStorageSecurityStandard"))
|
|
2476
2476
|
|
|
2477
2477
|
@key_storage_security_standard.setter
|
|
@@ -4575,7 +4575,7 @@ class CfnCertificateAuthorityProps:
|
|
|
4575
4575
|
:param subject: Structure that contains X.500 distinguished name information for your private CA.
|
|
4576
4576
|
:param type: Type of your private CA.
|
|
4577
4577
|
:param csr_extensions: Specifies information to be added to the extension section of the certificate signing request (CSR).
|
|
4578
|
-
:param key_storage_security_standard: Specifies a cryptographic key management compliance standard
|
|
4578
|
+
:param key_storage_security_standard: Specifies a cryptographic key management compliance standard for handling and protecting CA keys. Default: FIPS_140_2_LEVEL_3_OR_HIGHER .. epigraph:: Some AWS Regions don't support the default value. When you create a CA in these Regions, you must use ``CCPC_LEVEL_1_OR_HIGHER`` for the ``KeyStorageSecurityStandard`` parameter. If you don't, the operation returns an ``InvalidArgsException`` with this message: "A certificate authority cannot be created in this region with the specified security standard." For information about security standard support in different AWS Regions, see `Storage and security compliance of AWS Private CA private keys <https://docs.aws.amazon.com/privateca/latest/userguide/data-protection.html#private-keys>`_ .
|
|
4579
4579
|
:param revocation_configuration: Information about the Online Certificate Status Protocol (OCSP) configuration or certificate revocation list (CRL) created and maintained by your private CA.
|
|
4580
4580
|
:param tags: Key-value pairs that will be attached to the new private CA. You can associate up to 50 tags with a private CA. For information using tags with IAM to manage permissions, see `Controlling Access Using IAM Tags <https://docs.aws.amazon.com/IAM/latest/UserGuide/access_iam-tags.html>`_ .
|
|
4581
4581
|
:param usage_mode: Specifies whether the CA issues general-purpose certificates that typically require a revocation mechanism, or short-lived certificates that may optionally omit revocation because they expire quickly. Short-lived certificate validity is limited to seven days. The default value is GENERAL_PURPOSE.
|
|
@@ -4694,14 +4694,14 @@ class CfnCertificateAuthorityProps:
|
|
|
4694
4694
|
|
|
4695
4695
|
@builtins.property
|
|
4696
4696
|
def key_storage_security_standard(self) -> typing.Optional[builtins.str]:
|
|
4697
|
-
'''Specifies a cryptographic key management compliance standard
|
|
4697
|
+
'''Specifies a cryptographic key management compliance standard for handling and protecting CA keys.
|
|
4698
4698
|
|
|
4699
4699
|
Default: FIPS_140_2_LEVEL_3_OR_HIGHER
|
|
4700
4700
|
.. epigraph::
|
|
4701
4701
|
|
|
4702
|
-
Some AWS Regions
|
|
4702
|
+
Some AWS Regions don't support the default value. When you create a CA in these Regions, you must use ``CCPC_LEVEL_1_OR_HIGHER`` for the ``KeyStorageSecurityStandard`` parameter. If you don't, the operation returns an ``InvalidArgsException`` with this message: "A certificate authority cannot be created in this region with the specified security standard."
|
|
4703
4703
|
|
|
4704
|
-
For information about security standard support in
|
|
4704
|
+
For information about security standard support in different AWS Regions, see `Storage and security compliance of AWS Private CA private keys <https://docs.aws.amazon.com/privateca/latest/userguide/data-protection.html#private-keys>`_ .
|
|
4705
4705
|
|
|
4706
4706
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-acmpca-certificateauthority.html#cfn-acmpca-certificateauthority-keystoragesecuritystandard
|
|
4707
4707
|
'''
|