aws-cdk-lib 2.198.0__py3-none-any.whl → 2.200.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk-lib might be problematic. Click here for more details.

Files changed (55) hide show
  1. aws_cdk/__init__.py +22 -24
  2. aws_cdk/_jsii/__init__.py +1 -1
  3. aws_cdk/_jsii/{aws-cdk-lib@2.198.0.jsii.tgz → aws-cdk-lib@2.200.0.jsii.tgz} +0 -0
  4. aws_cdk/aws_acmpca/__init__.py +1 -1
  5. aws_cdk/aws_apigateway/__init__.py +1 -1
  6. aws_cdk/aws_appconfig/__init__.py +296 -48
  7. aws_cdk/aws_applicationautoscaling/__init__.py +4 -4
  8. aws_cdk/aws_aps/__init__.py +365 -14
  9. aws_cdk/aws_autoscaling/__init__.py +4 -4
  10. aws_cdk/aws_bedrock/__init__.py +436 -28
  11. aws_cdk/aws_cloudformation/__init__.py +17 -23
  12. aws_cdk/aws_cloudfront_origins/__init__.py +1 -1
  13. aws_cdk/aws_cloudtrail/__init__.py +4 -4
  14. aws_cdk/aws_cloudwatch/__init__.py +50 -1
  15. aws_cdk/aws_codebuild/__init__.py +116 -0
  16. aws_cdk/aws_datazone/__init__.py +699 -9
  17. aws_cdk/aws_deadline/__init__.py +38 -10
  18. aws_cdk/aws_ec2/__init__.py +97 -28
  19. aws_cdk/aws_ecs_patterns/__init__.py +49 -3
  20. aws_cdk/aws_eks/__init__.py +40 -9
  21. aws_cdk/aws_elasticloadbalancingv2/__init__.py +7 -7
  22. aws_cdk/aws_emr/__init__.py +36 -2
  23. aws_cdk/aws_events_targets/__init__.py +78 -1
  24. aws_cdk/aws_fsx/__init__.py +122 -0
  25. aws_cdk/aws_glue/__init__.py +55 -26
  26. aws_cdk/aws_iam/__init__.py +376 -2
  27. aws_cdk/aws_iot/__init__.py +57 -5
  28. aws_cdk/aws_kinesisfirehose/__init__.py +5 -1
  29. aws_cdk/aws_lambda/__init__.py +65 -45
  30. aws_cdk/aws_lex/__init__.py +27 -13
  31. aws_cdk/aws_lightsail/__init__.py +452 -0
  32. aws_cdk/aws_medialive/__init__.py +699 -497
  33. aws_cdk/aws_msk/__init__.py +4 -4
  34. aws_cdk/aws_networkfirewall/__init__.py +9 -5
  35. aws_cdk/aws_nimblestudio/__init__.py +208 -400
  36. aws_cdk/aws_panorama/__init__.py +30 -3
  37. aws_cdk/aws_pcs/__init__.py +12 -5
  38. aws_cdk/aws_rds/__init__.py +28 -16
  39. aws_cdk/aws_s3/__init__.py +367 -6
  40. aws_cdk/aws_s3express/__init__.py +789 -0
  41. aws_cdk/aws_ses/__init__.py +549 -32
  42. aws_cdk/aws_sns_subscriptions/__init__.py +256 -1
  43. aws_cdk/aws_stepfunctions/__init__.py +55 -17
  44. aws_cdk/aws_stepfunctions_tasks/__init__.py +1502 -2
  45. aws_cdk/aws_synthetics/__init__.py +26 -16
  46. aws_cdk/aws_voiceid/__init__.py +13 -3
  47. aws_cdk/aws_vpclattice/__init__.py +219 -209
  48. aws_cdk/cloud_assembly_schema/__init__.py +137 -42
  49. aws_cdk/cx_api/__init__.py +7 -7
  50. {aws_cdk_lib-2.198.0.dist-info → aws_cdk_lib-2.200.0.dist-info}/METADATA +2 -2
  51. {aws_cdk_lib-2.198.0.dist-info → aws_cdk_lib-2.200.0.dist-info}/RECORD +55 -55
  52. {aws_cdk_lib-2.198.0.dist-info → aws_cdk_lib-2.200.0.dist-info}/LICENSE +0 -0
  53. {aws_cdk_lib-2.198.0.dist-info → aws_cdk_lib-2.200.0.dist-info}/NOTICE +0 -0
  54. {aws_cdk_lib-2.198.0.dist-info → aws_cdk_lib-2.200.0.dist-info}/WHEEL +0 -0
  55. {aws_cdk_lib-2.198.0.dist-info → aws_cdk_lib-2.200.0.dist-info}/top_level.txt +0 -0
@@ -2121,12 +2121,10 @@ class CfnHookVersion(
2121
2121
  @builtins.property
2122
2122
  @jsii.member(jsii_name="attrVisibility")
2123
2123
  def attr_visibility(self) -> builtins.str:
2124
- '''The scope at which the Hook is visible and usable in CloudFormation operations.
2124
+ '''The visibility level that determines who can see and use this Hook in CloudFormation operations:.
2125
2125
 
2126
- Valid values include:
2127
-
2128
- - ``PRIVATE`` : The extension (Hook) is only visible and usable within the account in which it's registered. CloudFormation marks any resources you register as ``PRIVATE`` .
2129
- - ``PUBLIC`` : The extension (Hook) is publicly visible and usable within any AWS account.
2126
+ - ``PRIVATE`` : The Hook is only visible and usable within the account where it was registered. CloudFormation automatically marks any Hooks you register as ``PRIVATE`` .
2127
+ - ``PUBLIC`` : The Hook is publicly visible and usable within any AWS account.
2130
2128
 
2131
2129
  :cloudformationAttribute: Visibility
2132
2130
  '''
@@ -4048,12 +4046,10 @@ class CfnModuleVersion(
4048
4046
  @builtins.property
4049
4047
  @jsii.member(jsii_name="attrVisibility")
4050
4048
  def attr_visibility(self) -> builtins.str:
4051
- '''The scope at which the module is visible and usable in CloudFormation operations.
4052
-
4053
- Valid values include:
4049
+ '''The visibility level that determines who can see and use this module in CloudFormation operations:.
4054
4050
 
4055
- - ``PRIVATE`` : The extension (module) is only visible and usable within the account in which it is registered. CloudFormation marks any extensions you register as ``PRIVATE`` .
4056
- - ``PUBLIC`` : The extension (module) is publicly visible and usable within any AWS account.
4051
+ - ``PRIVATE`` : The module is only visible and usable within the account where it was registered. CloudFormation automatically marks any modules you register as ``PRIVATE`` .
4052
+ - ``PUBLIC`` : The module is publicly visible and usable within any AWS account.
4057
4053
 
4058
4054
  :cloudformationAttribute: Visibility
4059
4055
  '''
@@ -5128,7 +5124,7 @@ class CfnResourceVersion(
5128
5124
 
5129
5125
  CloudFormation determines the provisioning type during registration, based on the types of handlers in the schema handler package submitted.
5130
5126
 
5131
- Valid values include:
5127
+ Possible values:
5132
5128
 
5133
5129
  - ``FULLY_MUTABLE`` : The resource type includes an update handler to process updates to the type during stack update operations.
5134
5130
  - ``IMMUTABLE`` : The resource type doesn't include an update handler, so the type can't be updated and must instead be replaced during stack update operations.
@@ -5164,12 +5160,10 @@ class CfnResourceVersion(
5164
5160
  @builtins.property
5165
5161
  @jsii.member(jsii_name="attrVisibility")
5166
5162
  def attr_visibility(self) -> builtins.str:
5167
- '''The scope at which the resource is visible and usable in CloudFormation operations.
5168
-
5169
- Valid values include:
5163
+ '''The visibility level that determines who can see and use this resource in CloudFormation operations:.
5170
5164
 
5171
- - ``PRIVATE`` : The extension (resource) is only visible and usable within the account in which it is registered. CloudFormation marks any extensions you register as ``PRIVATE`` .
5172
- - ``PUBLIC`` : The extension (resource) is publicly visible and usable within any AWS account.
5165
+ - ``PRIVATE`` : The resource is only visible and usable within the account where it was registered. CloudFormation automatically marks any resources you register as ``PRIVATE`` .
5166
+ - ``PUBLIC`` : The resource is publicly visible and usable within any AWS account.
5173
5167
 
5174
5168
  :cloudformationAttribute: Visibility
5175
5169
  '''
@@ -5449,7 +5443,7 @@ class CfnStack(
5449
5443
  ):
5450
5444
  '''The ``AWS::CloudFormation::Stack`` resource nests a stack as a resource in a top-level template.
5451
5445
 
5452
- For more information, see `Embed stacks within other stacks using nested stacks <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-nested-stacks.html>`_ in the *AWS CloudFormation User Guide* .
5446
+ For more information, see `Nested stacks <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-nested-stacks.html>`_ in the *AWS CloudFormation User Guide* .
5453
5447
 
5454
5448
  You can add output values from a nested stack within the containing template. You use the `GetAtt <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/intrinsic-function-reference-getatt.html>`_ function with the nested stack's logical name and the name of the output value in the nested stack in the format ``Outputs. *NestedStackOutputName*`` .
5455
5449
 
@@ -5457,7 +5451,7 @@ class CfnStack(
5457
5451
 
5458
5452
  When you apply template changes to update a top-level stack, CloudFormation updates the top-level stack and initiates an update to its nested stacks. CloudFormation updates the resources of modified nested stacks, but doesn't update the resources of unmodified nested stacks.
5459
5453
 
5460
- You must acknowledge IAM capabilities for nested stacks that contain IAM resources. Also, verify that you have cancel update stack permissions, which is required if an update rolls back. For more information about IAM and CloudFormation , see `Controlling access with AWS Identity and Access Management <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/control-access-with-iam.html>`_ in the *AWS CloudFormation User Guide* .
5454
+ For stacks that contain IAM resources, you must acknowledge IAM capabilities. Also, make sure that you have cancel update stack permissions, which are required if an update rolls back. For more information about IAM and CloudFormation , see `Controlling access with AWS Identity and Access Management <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/control-access-with-iam.html>`_ in the *AWS CloudFormation User Guide* .
5461
5455
  .. epigraph::
5462
5456
 
5463
5457
  A subset of ``AWS::CloudFormation::Stack`` resource type properties listed below are available to customers using CloudFormation , AWS CDK , and Cloud Control to configure.
@@ -5623,7 +5617,7 @@ class CfnStack(
5623
5617
  @builtins.property
5624
5618
  @jsii.member(jsii_name="attrParentId")
5625
5619
  def attr_parent_id(self) -> builtins.str:
5626
- '''For nested stacks--stacks created as resources for another stack--returns the stack ID of the direct parent of this stack.
5620
+ '''For nested stacks, returns the stack ID of the direct parent of this stack.
5627
5621
 
5628
5622
  For the first level of nested stacks, the root stack is also the parent stack.
5629
5623
 
@@ -5634,7 +5628,7 @@ class CfnStack(
5634
5628
  @builtins.property
5635
5629
  @jsii.member(jsii_name="attrRootId")
5636
5630
  def attr_root_id(self) -> builtins.str:
5637
- '''For nested stacks--stacks created as resources for another stack--returns the stack ID of the top-level stack to which the nested stack ultimately belongs.
5631
+ '''For nested stacks, returns the stack ID of the top-level stack to which the nested stack ultimately belongs.
5638
5632
 
5639
5633
  :cloudformationAttribute: RootId
5640
5634
  '''
@@ -6102,7 +6096,7 @@ class CfnStackSet(
6102
6096
  :param permission_model: Describes how the IAM roles required for stack set operations are created. - With ``SELF_MANAGED`` permissions, you must create the administrator and execution roles required to deploy to target accounts. For more information, see `Grant self-managed permissions <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs-self-managed.html>`_ in the *AWS CloudFormation User Guide* . - With ``SERVICE_MANAGED`` permissions, StackSets automatically creates the IAM roles required to deploy to accounts managed by AWS Organizations . For more information, see `Activate trusted access for stack sets with AWS Organizations <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-activate-trusted-access.html>`_ in the *AWS CloudFormation User Guide* .
6103
6097
  :param stack_set_name: The name to associate with the stack set. The name must be unique in the Region where you create your stack set.
6104
6098
  :param administration_role_arn: The Amazon Resource Number (ARN) of the IAM role to use to create this stack set. Specify an IAM role only if you are using customized administrator roles to control which users or groups can manage specific stack sets within the same administrator account. Use customized administrator roles to control which users or groups can manage specific stack sets within the same administrator account. For more information, see `Grant self-managed permissions <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs-self-managed.html>`_ in the *AWS CloudFormation User Guide* . Valid only if the permissions model is ``SELF_MANAGED`` .
6105
- :param auto_deployment: Describes whether StackSets automatically deploys to AWS Organizations accounts that are added to a target organization or organizational unit (OU). For more information, see `Manage automatic deployments for CloudFormation StackSets that use service-managed permissions <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-manage-auto-deployment.html>`_ in the *AWS CloudFormation User Guide* . Required if the permissions model is ``SERVICE_MANAGED`` . (Not used with self-managed permissions.)
6099
+ :param auto_deployment: Describes whether StackSets automatically deploys to AWS Organizations accounts that are added to a target organization or organizational unit (OU). For more information, see `Enable or disable automatic deployments for StackSets in AWS Organizations <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-manage-auto-deployment.html>`_ in the *AWS CloudFormation User Guide* . Required if the permissions model is ``SERVICE_MANAGED`` . (Not used with self-managed permissions.)
6106
6100
  :param call_as: Specifies whether you are acting as an account administrator in the organization's management account or as a delegated administrator in a member account. By default, ``SELF`` is specified. Use ``SELF`` for stack sets with self-managed permissions. - To create a stack set with service-managed permissions while signed in to the management account, specify ``SELF`` . - To create a stack set with service-managed permissions while signed in to a delegated administrator account, specify ``DELEGATED_ADMIN`` . Your AWS account must be registered as a delegated admin in the management account. For more information, see `Register a delegated administrator <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-delegated-admin.html>`_ in the *AWS CloudFormation User Guide* . Stack sets with service-managed permissions are created in the management account, including stack sets that are created by delegated administrators. Valid only if the permissions model is ``SERVICE_MANAGED`` .
6107
6101
  :param capabilities: The capabilities that are allowed in the stack set. Some stack set templates might include resources that can affect permissions in your AWS account —for example, by creating new IAM users. For more information, see `Acknowledging IAM resources in CloudFormation templates <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/control-access-with-iam.html#using-iam-capabilities>`_ in the *AWS CloudFormation User Guide* .
6108
6102
  :param description: A description of the stack set.
@@ -7080,7 +7074,7 @@ class CfnStackSetProps:
7080
7074
  :param permission_model: Describes how the IAM roles required for stack set operations are created. - With ``SELF_MANAGED`` permissions, you must create the administrator and execution roles required to deploy to target accounts. For more information, see `Grant self-managed permissions <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs-self-managed.html>`_ in the *AWS CloudFormation User Guide* . - With ``SERVICE_MANAGED`` permissions, StackSets automatically creates the IAM roles required to deploy to accounts managed by AWS Organizations . For more information, see `Activate trusted access for stack sets with AWS Organizations <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-activate-trusted-access.html>`_ in the *AWS CloudFormation User Guide* .
7081
7075
  :param stack_set_name: The name to associate with the stack set. The name must be unique in the Region where you create your stack set.
7082
7076
  :param administration_role_arn: The Amazon Resource Number (ARN) of the IAM role to use to create this stack set. Specify an IAM role only if you are using customized administrator roles to control which users or groups can manage specific stack sets within the same administrator account. Use customized administrator roles to control which users or groups can manage specific stack sets within the same administrator account. For more information, see `Grant self-managed permissions <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs-self-managed.html>`_ in the *AWS CloudFormation User Guide* . Valid only if the permissions model is ``SELF_MANAGED`` .
7083
- :param auto_deployment: Describes whether StackSets automatically deploys to AWS Organizations accounts that are added to a target organization or organizational unit (OU). For more information, see `Manage automatic deployments for CloudFormation StackSets that use service-managed permissions <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-manage-auto-deployment.html>`_ in the *AWS CloudFormation User Guide* . Required if the permissions model is ``SERVICE_MANAGED`` . (Not used with self-managed permissions.)
7077
+ :param auto_deployment: Describes whether StackSets automatically deploys to AWS Organizations accounts that are added to a target organization or organizational unit (OU). For more information, see `Enable or disable automatic deployments for StackSets in AWS Organizations <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-manage-auto-deployment.html>`_ in the *AWS CloudFormation User Guide* . Required if the permissions model is ``SERVICE_MANAGED`` . (Not used with self-managed permissions.)
7084
7078
  :param call_as: Specifies whether you are acting as an account administrator in the organization's management account or as a delegated administrator in a member account. By default, ``SELF`` is specified. Use ``SELF`` for stack sets with self-managed permissions. - To create a stack set with service-managed permissions while signed in to the management account, specify ``SELF`` . - To create a stack set with service-managed permissions while signed in to a delegated administrator account, specify ``DELEGATED_ADMIN`` . Your AWS account must be registered as a delegated admin in the management account. For more information, see `Register a delegated administrator <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-delegated-admin.html>`_ in the *AWS CloudFormation User Guide* . Stack sets with service-managed permissions are created in the management account, including stack sets that are created by delegated administrators. Valid only if the permissions model is ``SERVICE_MANAGED`` .
7085
7079
  :param capabilities: The capabilities that are allowed in the stack set. Some stack set templates might include resources that can affect permissions in your AWS account —for example, by creating new IAM users. For more information, see `Acknowledging IAM resources in CloudFormation templates <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/control-access-with-iam.html#using-iam-capabilities>`_ in the *AWS CloudFormation User Guide* .
7086
7080
  :param description: A description of the stack set.
@@ -7249,7 +7243,7 @@ class CfnStackSetProps:
7249
7243
  ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, CfnStackSet.AutoDeploymentProperty]]:
7250
7244
  '''Describes whether StackSets automatically deploys to AWS Organizations accounts that are added to a target organization or organizational unit (OU).
7251
7245
 
7252
- For more information, see `Manage automatic deployments for CloudFormation StackSets that use service-managed permissions <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-manage-auto-deployment.html>`_ in the *AWS CloudFormation User Guide* .
7246
+ For more information, see `Enable or disable automatic deployments for StackSets in AWS Organizations <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-manage-auto-deployment.html>`_ in the *AWS CloudFormation User Guide* .
7253
7247
 
7254
7248
  Required if the permissions model is ``SERVICE_MANAGED`` . (Not used with self-managed permissions.)
7255
7249
 
@@ -681,7 +681,7 @@ You can allow the traffic from the CloudFront managed prefix list named **com.am
681
681
  cf_origin_facing = ec2.PrefixList.from_lookup(self, "CloudFrontOriginFacing",
682
682
  prefix_list_name="com.amazonaws.global.cloudfront.origin-facing"
683
683
  )
684
- alb.connections.allow_from(ec2.Peer.prefix_list(cf_origin_facing.prefix_list_id), ec2.Port.HTTP)
684
+ alb.connections.allow_from(cf_origin_facing, ec2.Port.HTTP)
685
685
  ```
686
686
 
687
687
  #### The VPC origin service security group
@@ -2877,7 +2877,7 @@ class CfnTrail(
2877
2877
  :param insight_selectors: A JSON string that contains the Insights types you want to log on a trail. ``ApiCallRateInsight`` and ``ApiErrorRateInsight`` are valid Insight types. The ``ApiCallRateInsight`` Insights type analyzes write-only management API calls that are aggregated per minute against a baseline API call volume. The ``ApiErrorRateInsight`` Insights type analyzes management API calls that result in error codes. The error is shown if the API call is unsuccessful.
2878
2878
  :param is_multi_region_trail: Specifies whether the trail applies only to the current Region or to all Regions. The default is false. If the trail exists only in the current Region and this value is set to true, shadow trails (replications of the trail) will be created in the other Regions. If the trail exists in all Regions and this value is set to false, the trail will remain in the Region where it was created, and its shadow trails in other Regions will be deleted. As a best practice, consider using trails that log events in all Regions.
2879
2879
  :param is_organization_trail: Specifies whether the trail is applied to all accounts in an organization in AWS Organizations , or only for the current AWS account . The default is false, and cannot be true unless the call is made on behalf of an AWS account that is the management account for an organization in AWS Organizations . If the trail is not an organization trail and this is set to ``true`` , the trail will be created in all AWS accounts that belong to the organization. If the trail is an organization trail and this is set to ``false`` , the trail will remain in the current AWS account but be deleted from all member accounts in the organization. .. epigraph:: Only the management account for the organization can convert an organization trail to a non-organization trail, or convert a non-organization trail to an organization trail.
2880
- :param kms_key_id: Specifies the AWS KMS key ID to use to encrypt the logs delivered by CloudTrail. The value can be an alias name prefixed by "alias/", a fully specified ARN to an alias, a fully specified ARN to a key, or a globally unique identifier. CloudTrail also supports AWS KMS multi-Region keys. For more information about multi-Region keys, see `Using multi-Region keys <https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html>`_ in the *AWS Key Management Service Developer Guide* . Examples: - alias/MyAliasName - arn:aws:kms:us-east-2:123456789012:alias/MyAliasName - arn:aws:kms:us-east-2:123456789012:key/12345678-1234-1234-1234-123456789012 - 12345678-1234-1234-1234-123456789012
2880
+ :param kms_key_id: Specifies the AWS KMS key ID to use to encrypt the logs and digest files delivered by CloudTrail. The value can be an alias name prefixed by "alias/", a fully specified ARN to an alias, a fully specified ARN to a key, or a globally unique identifier. CloudTrail also supports AWS KMS multi-Region keys. For more information about multi-Region keys, see `Using multi-Region keys <https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html>`_ in the *AWS Key Management Service Developer Guide* . Examples: - alias/MyAliasName - arn:aws:kms:us-east-2:123456789012:alias/MyAliasName - arn:aws:kms:us-east-2:123456789012:key/12345678-1234-1234-1234-123456789012 - 12345678-1234-1234-1234-123456789012
2881
2881
  :param s3_key_prefix: Specifies the Amazon S3 key prefix that comes after the name of the bucket you have designated for log file delivery. For more information, see `Finding Your CloudTrail Log Files <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/get-and-view-cloudtrail-log-files.html#cloudtrail-find-log-files>`_ . The maximum length is 200 characters.
2882
2882
  :param sns_topic_name: Specifies the name or ARN of the Amazon SNS topic defined for notification of log file delivery. The maximum length is 256 characters.
2883
2883
  :param tags: A custom set of tags (key-value pairs) for this trail.
@@ -3157,7 +3157,7 @@ class CfnTrail(
3157
3157
  @builtins.property
3158
3158
  @jsii.member(jsii_name="kmsKeyId")
3159
3159
  def kms_key_id(self) -> typing.Optional[builtins.str]:
3160
- '''Specifies the AWS KMS key ID to use to encrypt the logs delivered by CloudTrail.'''
3160
+ '''Specifies the AWS KMS key ID to use to encrypt the logs and digest files delivered by CloudTrail.'''
3161
3161
  return typing.cast(typing.Optional[builtins.str], jsii.get(self, "kmsKeyId"))
3162
3162
 
3163
3163
  @kms_key_id.setter
@@ -3945,7 +3945,7 @@ class CfnTrailProps:
3945
3945
  :param insight_selectors: A JSON string that contains the Insights types you want to log on a trail. ``ApiCallRateInsight`` and ``ApiErrorRateInsight`` are valid Insight types. The ``ApiCallRateInsight`` Insights type analyzes write-only management API calls that are aggregated per minute against a baseline API call volume. The ``ApiErrorRateInsight`` Insights type analyzes management API calls that result in error codes. The error is shown if the API call is unsuccessful.
3946
3946
  :param is_multi_region_trail: Specifies whether the trail applies only to the current Region or to all Regions. The default is false. If the trail exists only in the current Region and this value is set to true, shadow trails (replications of the trail) will be created in the other Regions. If the trail exists in all Regions and this value is set to false, the trail will remain in the Region where it was created, and its shadow trails in other Regions will be deleted. As a best practice, consider using trails that log events in all Regions.
3947
3947
  :param is_organization_trail: Specifies whether the trail is applied to all accounts in an organization in AWS Organizations , or only for the current AWS account . The default is false, and cannot be true unless the call is made on behalf of an AWS account that is the management account for an organization in AWS Organizations . If the trail is not an organization trail and this is set to ``true`` , the trail will be created in all AWS accounts that belong to the organization. If the trail is an organization trail and this is set to ``false`` , the trail will remain in the current AWS account but be deleted from all member accounts in the organization. .. epigraph:: Only the management account for the organization can convert an organization trail to a non-organization trail, or convert a non-organization trail to an organization trail.
3948
- :param kms_key_id: Specifies the AWS KMS key ID to use to encrypt the logs delivered by CloudTrail. The value can be an alias name prefixed by "alias/", a fully specified ARN to an alias, a fully specified ARN to a key, or a globally unique identifier. CloudTrail also supports AWS KMS multi-Region keys. For more information about multi-Region keys, see `Using multi-Region keys <https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html>`_ in the *AWS Key Management Service Developer Guide* . Examples: - alias/MyAliasName - arn:aws:kms:us-east-2:123456789012:alias/MyAliasName - arn:aws:kms:us-east-2:123456789012:key/12345678-1234-1234-1234-123456789012 - 12345678-1234-1234-1234-123456789012
3948
+ :param kms_key_id: Specifies the AWS KMS key ID to use to encrypt the logs and digest files delivered by CloudTrail. The value can be an alias name prefixed by "alias/", a fully specified ARN to an alias, a fully specified ARN to a key, or a globally unique identifier. CloudTrail also supports AWS KMS multi-Region keys. For more information about multi-Region keys, see `Using multi-Region keys <https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html>`_ in the *AWS Key Management Service Developer Guide* . Examples: - alias/MyAliasName - arn:aws:kms:us-east-2:123456789012:alias/MyAliasName - arn:aws:kms:us-east-2:123456789012:key/12345678-1234-1234-1234-123456789012 - 12345678-1234-1234-1234-123456789012
3949
3949
  :param s3_key_prefix: Specifies the Amazon S3 key prefix that comes after the name of the bucket you have designated for log file delivery. For more information, see `Finding Your CloudTrail Log Files <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/get-and-view-cloudtrail-log-files.html#cloudtrail-find-log-files>`_ . The maximum length is 200 characters.
3950
3950
  :param sns_topic_name: Specifies the name or ARN of the Amazon SNS topic defined for notification of log file delivery. The maximum length is 256 characters.
3951
3951
  :param tags: A custom set of tags (key-value pairs) for this trail.
@@ -4222,7 +4222,7 @@ class CfnTrailProps:
4222
4222
 
4223
4223
  @builtins.property
4224
4224
  def kms_key_id(self) -> typing.Optional[builtins.str]:
4225
- '''Specifies the AWS KMS key ID to use to encrypt the logs delivered by CloudTrail.
4225
+ '''Specifies the AWS KMS key ID to use to encrypt the logs and digest files delivered by CloudTrail.
4226
4226
 
4227
4227
  The value can be an alias name prefixed by "alias/", a fully specified ARN to an alias, a fully specified ARN to a key, or a globally unique identifier.
4228
4228
 
@@ -5458,6 +5458,7 @@ class CfnInsightRule(
5458
5458
  rule_state="ruleState",
5459
5459
 
5460
5460
  # the properties below are optional
5461
+ apply_on_transformed_logs=False,
5461
5462
  tags=[CfnTag(
5462
5463
  key="key",
5463
5464
  value="value"
@@ -5473,6 +5474,7 @@ class CfnInsightRule(
5473
5474
  rule_body: builtins.str,
5474
5475
  rule_name: builtins.str,
5475
5476
  rule_state: builtins.str,
5477
+ apply_on_transformed_logs: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
5476
5478
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
5477
5479
  ) -> None:
5478
5480
  '''
@@ -5481,6 +5483,7 @@ class CfnInsightRule(
5481
5483
  :param rule_body: The definition of the rule, as a JSON object. For details about the syntax, see `Contributor Insights Rule Syntax <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/ContributorInsights-RuleSyntax.html>`_ in the *Amazon CloudWatch User Guide* .
5482
5484
  :param rule_name: The name of the rule.
5483
5485
  :param rule_state: The current state of the rule. Valid values are ``ENABLED`` and ``DISABLED`` .
5486
+ :param apply_on_transformed_logs:
5484
5487
  :param tags: A list of key-value pairs to associate with the Contributor Insights rule. You can associate as many as 50 tags with a rule. Tags can help you organize and categorize your resources. For more information, see `Tagging Your Amazon CloudWatch Resources <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch-Tagging.html>`_ . To be able to associate tags with a rule, you must have the ``cloudwatch:TagResource`` permission in addition to the ``cloudwatch:PutInsightRule`` permission.
5485
5488
  '''
5486
5489
  if __debug__:
@@ -5488,7 +5491,11 @@ class CfnInsightRule(
5488
5491
  check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
5489
5492
  check_type(argname="argument id", value=id, expected_type=type_hints["id"])
5490
5493
  props = CfnInsightRuleProps(
5491
- rule_body=rule_body, rule_name=rule_name, rule_state=rule_state, tags=tags
5494
+ rule_body=rule_body,
5495
+ rule_name=rule_name,
5496
+ rule_state=rule_state,
5497
+ apply_on_transformed_logs=apply_on_transformed_logs,
5498
+ tags=tags,
5492
5499
  )
5493
5500
 
5494
5501
  jsii.create(self.__class__, self, [scope, id, props])
@@ -5599,6 +5606,23 @@ class CfnInsightRule(
5599
5606
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
5600
5607
  jsii.set(self, "ruleState", value) # pyright: ignore[reportArgumentType]
5601
5608
 
5609
+ @builtins.property
5610
+ @jsii.member(jsii_name="applyOnTransformedLogs")
5611
+ def apply_on_transformed_logs(
5612
+ self,
5613
+ ) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
5614
+ return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], jsii.get(self, "applyOnTransformedLogs"))
5615
+
5616
+ @apply_on_transformed_logs.setter
5617
+ def apply_on_transformed_logs(
5618
+ self,
5619
+ value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
5620
+ ) -> None:
5621
+ if __debug__:
5622
+ type_hints = typing.get_type_hints(_typecheckingstub__9c9111e23da0920d9dadfa879557f9838793eca0312c1c2bec0dc6eb25325512)
5623
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
5624
+ jsii.set(self, "applyOnTransformedLogs", value) # pyright: ignore[reportArgumentType]
5625
+
5602
5626
  @builtins.property
5603
5627
  @jsii.member(jsii_name="tagsRaw")
5604
5628
  def tags_raw(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
@@ -5620,6 +5644,7 @@ class CfnInsightRule(
5620
5644
  "rule_body": "ruleBody",
5621
5645
  "rule_name": "ruleName",
5622
5646
  "rule_state": "ruleState",
5647
+ "apply_on_transformed_logs": "applyOnTransformedLogs",
5623
5648
  "tags": "tags",
5624
5649
  },
5625
5650
  )
@@ -5630,6 +5655,7 @@ class CfnInsightRuleProps:
5630
5655
  rule_body: builtins.str,
5631
5656
  rule_name: builtins.str,
5632
5657
  rule_state: builtins.str,
5658
+ apply_on_transformed_logs: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
5633
5659
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
5634
5660
  ) -> None:
5635
5661
  '''Properties for defining a ``CfnInsightRule``.
@@ -5637,6 +5663,7 @@ class CfnInsightRuleProps:
5637
5663
  :param rule_body: The definition of the rule, as a JSON object. For details about the syntax, see `Contributor Insights Rule Syntax <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/ContributorInsights-RuleSyntax.html>`_ in the *Amazon CloudWatch User Guide* .
5638
5664
  :param rule_name: The name of the rule.
5639
5665
  :param rule_state: The current state of the rule. Valid values are ``ENABLED`` and ``DISABLED`` .
5666
+ :param apply_on_transformed_logs:
5640
5667
  :param tags: A list of key-value pairs to associate with the Contributor Insights rule. You can associate as many as 50 tags with a rule. Tags can help you organize and categorize your resources. For more information, see `Tagging Your Amazon CloudWatch Resources <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch-Tagging.html>`_ . To be able to associate tags with a rule, you must have the ``cloudwatch:TagResource`` permission in addition to the ``cloudwatch:PutInsightRule`` permission.
5641
5668
 
5642
5669
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudwatch-insightrule.html
@@ -5654,6 +5681,7 @@ class CfnInsightRuleProps:
5654
5681
  rule_state="ruleState",
5655
5682
 
5656
5683
  # the properties below are optional
5684
+ apply_on_transformed_logs=False,
5657
5685
  tags=[CfnTag(
5658
5686
  key="key",
5659
5687
  value="value"
@@ -5665,12 +5693,15 @@ class CfnInsightRuleProps:
5665
5693
  check_type(argname="argument rule_body", value=rule_body, expected_type=type_hints["rule_body"])
5666
5694
  check_type(argname="argument rule_name", value=rule_name, expected_type=type_hints["rule_name"])
5667
5695
  check_type(argname="argument rule_state", value=rule_state, expected_type=type_hints["rule_state"])
5696
+ check_type(argname="argument apply_on_transformed_logs", value=apply_on_transformed_logs, expected_type=type_hints["apply_on_transformed_logs"])
5668
5697
  check_type(argname="argument tags", value=tags, expected_type=type_hints["tags"])
5669
5698
  self._values: typing.Dict[builtins.str, typing.Any] = {
5670
5699
  "rule_body": rule_body,
5671
5700
  "rule_name": rule_name,
5672
5701
  "rule_state": rule_state,
5673
5702
  }
5703
+ if apply_on_transformed_logs is not None:
5704
+ self._values["apply_on_transformed_logs"] = apply_on_transformed_logs
5674
5705
  if tags is not None:
5675
5706
  self._values["tags"] = tags
5676
5707
 
@@ -5708,6 +5739,16 @@ class CfnInsightRuleProps:
5708
5739
  assert result is not None, "Required property 'rule_state' is missing"
5709
5740
  return typing.cast(builtins.str, result)
5710
5741
 
5742
+ @builtins.property
5743
+ def apply_on_transformed_logs(
5744
+ self,
5745
+ ) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
5746
+ '''
5747
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudwatch-insightrule.html#cfn-cloudwatch-insightrule-applyontransformedlogs
5748
+ '''
5749
+ result = self._values.get("apply_on_transformed_logs")
5750
+ return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], result)
5751
+
5711
5752
  @builtins.property
5712
5753
  def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
5713
5754
  '''A list of key-value pairs to associate with the Contributor Insights rule.
@@ -16475,6 +16516,7 @@ def _typecheckingstub__7d177572b447b5b9761effd52cd14b4510ca4c8fc8607968bdc5e0bd8
16475
16516
  rule_body: builtins.str,
16476
16517
  rule_name: builtins.str,
16477
16518
  rule_state: builtins.str,
16519
+ apply_on_transformed_logs: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
16478
16520
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
16479
16521
  ) -> None:
16480
16522
  """Type checking stubs"""
@@ -16510,6 +16552,12 @@ def _typecheckingstub__45517418d6e99e8c2af45e33f2d1375212c73bac3d2c9599691ac383e
16510
16552
  """Type checking stubs"""
16511
16553
  pass
16512
16554
 
16555
+ def _typecheckingstub__9c9111e23da0920d9dadfa879557f9838793eca0312c1c2bec0dc6eb25325512(
16556
+ value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
16557
+ ) -> None:
16558
+ """Type checking stubs"""
16559
+ pass
16560
+
16513
16561
  def _typecheckingstub__7d330e494e47f68df8f1753b4e301d3df252f832725f14292abf5fa4ee104054(
16514
16562
  value: typing.Optional[typing.List[_CfnTag_f6864754]],
16515
16563
  ) -> None:
@@ -16521,6 +16569,7 @@ def _typecheckingstub__ea720192b6c423ff900f4b69425db7a31e90fed21a852500910edce45
16521
16569
  rule_body: builtins.str,
16522
16570
  rule_name: builtins.str,
16523
16571
  rule_state: builtins.str,
16572
+ apply_on_transformed_logs: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
16524
16573
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
16525
16574
  ) -> None:
16526
16575
  """Type checking stubs"""
@@ -3434,6 +3434,12 @@ class CfnProject(
3434
3434
 
3435
3435
  # the properties below are optional
3436
3436
  certificate="certificate",
3437
+ docker_server=codebuild.CfnProject.DockerServerProperty(
3438
+ compute_type="computeType",
3439
+
3440
+ # the properties below are optional
3441
+ security_group_ids=["securityGroupIds"]
3442
+ ),
3437
3443
  environment_variables=[codebuild.CfnProject.EnvironmentVariableProperty(
3438
3444
  name="name",
3439
3445
  value="value",
@@ -4647,6 +4653,79 @@ class CfnProject(
4647
4653
  k + "=" + repr(v) for k, v in self._values.items()
4648
4654
  )
4649
4655
 
4656
+ @jsii.data_type(
4657
+ jsii_type="aws-cdk-lib.aws_codebuild.CfnProject.DockerServerProperty",
4658
+ jsii_struct_bases=[],
4659
+ name_mapping={
4660
+ "compute_type": "computeType",
4661
+ "security_group_ids": "securityGroupIds",
4662
+ },
4663
+ )
4664
+ class DockerServerProperty:
4665
+ def __init__(
4666
+ self,
4667
+ *,
4668
+ compute_type: builtins.str,
4669
+ security_group_ids: typing.Optional[typing.Sequence[builtins.str]] = None,
4670
+ ) -> None:
4671
+ '''
4672
+ :param compute_type:
4673
+ :param security_group_ids:
4674
+
4675
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-codebuild-project-dockerserver.html
4676
+ :exampleMetadata: fixture=_generated
4677
+
4678
+ Example::
4679
+
4680
+ # The code below shows an example of how to instantiate this type.
4681
+ # The values are placeholders you should change.
4682
+ from aws_cdk import aws_codebuild as codebuild
4683
+
4684
+ docker_server_property = codebuild.CfnProject.DockerServerProperty(
4685
+ compute_type="computeType",
4686
+
4687
+ # the properties below are optional
4688
+ security_group_ids=["securityGroupIds"]
4689
+ )
4690
+ '''
4691
+ if __debug__:
4692
+ type_hints = typing.get_type_hints(_typecheckingstub__ee61866f55895d4c64262dab381d049015ede37529178930c3463abdb3999a8a)
4693
+ check_type(argname="argument compute_type", value=compute_type, expected_type=type_hints["compute_type"])
4694
+ check_type(argname="argument security_group_ids", value=security_group_ids, expected_type=type_hints["security_group_ids"])
4695
+ self._values: typing.Dict[builtins.str, typing.Any] = {
4696
+ "compute_type": compute_type,
4697
+ }
4698
+ if security_group_ids is not None:
4699
+ self._values["security_group_ids"] = security_group_ids
4700
+
4701
+ @builtins.property
4702
+ def compute_type(self) -> builtins.str:
4703
+ '''
4704
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-codebuild-project-dockerserver.html#cfn-codebuild-project-dockerserver-computetype
4705
+ '''
4706
+ result = self._values.get("compute_type")
4707
+ assert result is not None, "Required property 'compute_type' is missing"
4708
+ return typing.cast(builtins.str, result)
4709
+
4710
+ @builtins.property
4711
+ def security_group_ids(self) -> typing.Optional[typing.List[builtins.str]]:
4712
+ '''
4713
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-codebuild-project-dockerserver.html#cfn-codebuild-project-dockerserver-securitygroupids
4714
+ '''
4715
+ result = self._values.get("security_group_ids")
4716
+ return typing.cast(typing.Optional[typing.List[builtins.str]], result)
4717
+
4718
+ def __eq__(self, rhs: typing.Any) -> builtins.bool:
4719
+ return isinstance(rhs, self.__class__) and rhs._values == self._values
4720
+
4721
+ def __ne__(self, rhs: typing.Any) -> builtins.bool:
4722
+ return not (rhs == self)
4723
+
4724
+ def __repr__(self) -> str:
4725
+ return "DockerServerProperty(%s)" % ", ".join(
4726
+ k + "=" + repr(v) for k, v in self._values.items()
4727
+ )
4728
+
4650
4729
  @jsii.data_type(
4651
4730
  jsii_type="aws-cdk-lib.aws_codebuild.CfnProject.EnvironmentProperty",
4652
4731
  jsii_struct_bases=[],
@@ -4655,6 +4734,7 @@ class CfnProject(
4655
4734
  "image": "image",
4656
4735
  "type": "type",
4657
4736
  "certificate": "certificate",
4737
+ "docker_server": "dockerServer",
4658
4738
  "environment_variables": "environmentVariables",
4659
4739
  "fleet": "fleet",
4660
4740
  "image_pull_credentials_type": "imagePullCredentialsType",
@@ -4670,6 +4750,7 @@ class CfnProject(
4670
4750
  image: builtins.str,
4671
4751
  type: builtins.str,
4672
4752
  certificate: typing.Optional[builtins.str] = None,
4753
+ docker_server: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnProject.DockerServerProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
4673
4754
  environment_variables: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnProject.EnvironmentVariableProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
4674
4755
  fleet: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnProject.ProjectFleetProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
4675
4756
  image_pull_credentials_type: typing.Optional[builtins.str] = None,
@@ -4682,6 +4763,7 @@ class CfnProject(
4682
4763
  :param image: The image tag or image digest that identifies the Docker image to use for this build project. Use the following formats: - For an image tag: ``<registry>/<repository>:<tag>`` . For example, in the Docker repository that CodeBuild uses to manage its Docker images, this would be ``aws/codebuild/standard:4.0`` . - For an image digest: ``<registry>/<repository>@<digest>`` . For example, to specify an image with the digest "sha256:cbbf2f9a99b47fc460d422812b6a5adff7dfee951d8fa2e4a98caa0382cfbdbf," use ``<registry>/<repository>@sha256:cbbf2f9a99b47fc460d422812b6a5adff7dfee951d8fa2e4a98caa0382cfbdbf`` . For more information, see `Docker images provided by CodeBuild <https://docs.aws.amazon.com//codebuild/latest/userguide/build-env-ref-available.html>`_ in the *AWS CodeBuild user guide* .
4683
4764
  :param type: The type of build environment to use for related builds. .. epigraph:: If you're using compute fleets during project creation, ``type`` will be ignored. For more information, see `Build environment compute types <https://docs.aws.amazon.com//codebuild/latest/userguide/build-env-ref-compute-types.html>`_ in the *AWS CodeBuild user guide* .
4684
4765
  :param certificate: The ARN of the Amazon S3 bucket, path prefix, and object key that contains the PEM-encoded certificate for the build project. For more information, see `certificate <https://docs.aws.amazon.com/codebuild/latest/userguide/create-project-cli.html#cli.environment.certificate>`_ in the *AWS CodeBuild User Guide* .
4766
+ :param docker_server:
4685
4767
  :param environment_variables: A set of environment variables to make available to builds for this build project.
4686
4768
  :param fleet:
4687
4769
  :param image_pull_credentials_type: The type of credentials AWS CodeBuild uses to pull images in your build. There are two valid values:. - ``CODEBUILD`` specifies that AWS CodeBuild uses its own credentials. This requires that you modify your ECR repository policy to trust AWS CodeBuild service principal. - ``SERVICE_ROLE`` specifies that AWS CodeBuild uses your build project's service role. When you use a cross-account or private registry image, you must use SERVICE_ROLE credentials. When you use an AWS CodeBuild curated image, you must use CODEBUILD credentials.
@@ -4704,6 +4786,12 @@ class CfnProject(
4704
4786
 
4705
4787
  # the properties below are optional
4706
4788
  certificate="certificate",
4789
+ docker_server=codebuild.CfnProject.DockerServerProperty(
4790
+ compute_type="computeType",
4791
+
4792
+ # the properties below are optional
4793
+ security_group_ids=["securityGroupIds"]
4794
+ ),
4707
4795
  environment_variables=[codebuild.CfnProject.EnvironmentVariableProperty(
4708
4796
  name="name",
4709
4797
  value="value",
@@ -4728,6 +4816,7 @@ class CfnProject(
4728
4816
  check_type(argname="argument image", value=image, expected_type=type_hints["image"])
4729
4817
  check_type(argname="argument type", value=type, expected_type=type_hints["type"])
4730
4818
  check_type(argname="argument certificate", value=certificate, expected_type=type_hints["certificate"])
4819
+ check_type(argname="argument docker_server", value=docker_server, expected_type=type_hints["docker_server"])
4731
4820
  check_type(argname="argument environment_variables", value=environment_variables, expected_type=type_hints["environment_variables"])
4732
4821
  check_type(argname="argument fleet", value=fleet, expected_type=type_hints["fleet"])
4733
4822
  check_type(argname="argument image_pull_credentials_type", value=image_pull_credentials_type, expected_type=type_hints["image_pull_credentials_type"])
@@ -4740,6 +4829,8 @@ class CfnProject(
4740
4829
  }
4741
4830
  if certificate is not None:
4742
4831
  self._values["certificate"] = certificate
4832
+ if docker_server is not None:
4833
+ self._values["docker_server"] = docker_server
4743
4834
  if environment_variables is not None:
4744
4835
  self._values["environment_variables"] = environment_variables
4745
4836
  if fleet is not None:
@@ -4838,6 +4929,16 @@ class CfnProject(
4838
4929
  result = self._values.get("certificate")
4839
4930
  return typing.cast(typing.Optional[builtins.str], result)
4840
4931
 
4932
+ @builtins.property
4933
+ def docker_server(
4934
+ self,
4935
+ ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnProject.DockerServerProperty"]]:
4936
+ '''
4937
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-codebuild-project-environment.html#cfn-codebuild-project-environment-dockerserver
4938
+ '''
4939
+ result = self._values.get("docker_server")
4940
+ return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnProject.DockerServerProperty"]], result)
4941
+
4841
4942
  @builtins.property
4842
4943
  def environment_variables(
4843
4944
  self,
@@ -6847,6 +6948,12 @@ class CfnProjectProps:
6847
6948
 
6848
6949
  # the properties below are optional
6849
6950
  certificate="certificate",
6951
+ docker_server=codebuild.CfnProject.DockerServerProperty(
6952
+ compute_type="computeType",
6953
+
6954
+ # the properties below are optional
6955
+ security_group_ids=["securityGroupIds"]
6956
+ ),
6850
6957
  environment_variables=[codebuild.CfnProject.EnvironmentVariableProperty(
6851
6958
  name="name",
6852
6959
  value="value",
@@ -19224,12 +19331,21 @@ def _typecheckingstub__3c17ec87ec820fc95c2f50ce8b9145f0fd5d2f902f5e08f4e59b9de7c
19224
19331
  """Type checking stubs"""
19225
19332
  pass
19226
19333
 
19334
+ def _typecheckingstub__ee61866f55895d4c64262dab381d049015ede37529178930c3463abdb3999a8a(
19335
+ *,
19336
+ compute_type: builtins.str,
19337
+ security_group_ids: typing.Optional[typing.Sequence[builtins.str]] = None,
19338
+ ) -> None:
19339
+ """Type checking stubs"""
19340
+ pass
19341
+
19227
19342
  def _typecheckingstub__357ba2b62e83543cbaf88f71d45a8de5489e377a6db9e3c7c356c3a91c1aef44(
19228
19343
  *,
19229
19344
  compute_type: builtins.str,
19230
19345
  image: builtins.str,
19231
19346
  type: builtins.str,
19232
19347
  certificate: typing.Optional[builtins.str] = None,
19348
+ docker_server: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnProject.DockerServerProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
19233
19349
  environment_variables: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnProject.EnvironmentVariableProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
19234
19350
  fleet: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnProject.ProjectFleetProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
19235
19351
  image_pull_credentials_type: typing.Optional[builtins.str] = None,