aws-cdk-lib 2.198.0__py3-none-any.whl → 2.200.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk-lib might be problematic. Click here for more details.
- aws_cdk/__init__.py +22 -24
- aws_cdk/_jsii/__init__.py +1 -1
- aws_cdk/_jsii/{aws-cdk-lib@2.198.0.jsii.tgz → aws-cdk-lib@2.200.0.jsii.tgz} +0 -0
- aws_cdk/aws_acmpca/__init__.py +1 -1
- aws_cdk/aws_apigateway/__init__.py +1 -1
- aws_cdk/aws_appconfig/__init__.py +296 -48
- aws_cdk/aws_applicationautoscaling/__init__.py +4 -4
- aws_cdk/aws_aps/__init__.py +365 -14
- aws_cdk/aws_autoscaling/__init__.py +4 -4
- aws_cdk/aws_bedrock/__init__.py +436 -28
- aws_cdk/aws_cloudformation/__init__.py +17 -23
- aws_cdk/aws_cloudfront_origins/__init__.py +1 -1
- aws_cdk/aws_cloudtrail/__init__.py +4 -4
- aws_cdk/aws_cloudwatch/__init__.py +50 -1
- aws_cdk/aws_codebuild/__init__.py +116 -0
- aws_cdk/aws_datazone/__init__.py +699 -9
- aws_cdk/aws_deadline/__init__.py +38 -10
- aws_cdk/aws_ec2/__init__.py +97 -28
- aws_cdk/aws_ecs_patterns/__init__.py +49 -3
- aws_cdk/aws_eks/__init__.py +40 -9
- aws_cdk/aws_elasticloadbalancingv2/__init__.py +7 -7
- aws_cdk/aws_emr/__init__.py +36 -2
- aws_cdk/aws_events_targets/__init__.py +78 -1
- aws_cdk/aws_fsx/__init__.py +122 -0
- aws_cdk/aws_glue/__init__.py +55 -26
- aws_cdk/aws_iam/__init__.py +376 -2
- aws_cdk/aws_iot/__init__.py +57 -5
- aws_cdk/aws_kinesisfirehose/__init__.py +5 -1
- aws_cdk/aws_lambda/__init__.py +65 -45
- aws_cdk/aws_lex/__init__.py +27 -13
- aws_cdk/aws_lightsail/__init__.py +452 -0
- aws_cdk/aws_medialive/__init__.py +699 -497
- aws_cdk/aws_msk/__init__.py +4 -4
- aws_cdk/aws_networkfirewall/__init__.py +9 -5
- aws_cdk/aws_nimblestudio/__init__.py +208 -400
- aws_cdk/aws_panorama/__init__.py +30 -3
- aws_cdk/aws_pcs/__init__.py +12 -5
- aws_cdk/aws_rds/__init__.py +28 -16
- aws_cdk/aws_s3/__init__.py +367 -6
- aws_cdk/aws_s3express/__init__.py +789 -0
- aws_cdk/aws_ses/__init__.py +549 -32
- aws_cdk/aws_sns_subscriptions/__init__.py +256 -1
- aws_cdk/aws_stepfunctions/__init__.py +55 -17
- aws_cdk/aws_stepfunctions_tasks/__init__.py +1502 -2
- aws_cdk/aws_synthetics/__init__.py +26 -16
- aws_cdk/aws_voiceid/__init__.py +13 -3
- aws_cdk/aws_vpclattice/__init__.py +219 -209
- aws_cdk/cloud_assembly_schema/__init__.py +137 -42
- aws_cdk/cx_api/__init__.py +7 -7
- {aws_cdk_lib-2.198.0.dist-info → aws_cdk_lib-2.200.0.dist-info}/METADATA +2 -2
- {aws_cdk_lib-2.198.0.dist-info → aws_cdk_lib-2.200.0.dist-info}/RECORD +55 -55
- {aws_cdk_lib-2.198.0.dist-info → aws_cdk_lib-2.200.0.dist-info}/LICENSE +0 -0
- {aws_cdk_lib-2.198.0.dist-info → aws_cdk_lib-2.200.0.dist-info}/NOTICE +0 -0
- {aws_cdk_lib-2.198.0.dist-info → aws_cdk_lib-2.200.0.dist-info}/WHEEL +0 -0
- {aws_cdk_lib-2.198.0.dist-info → aws_cdk_lib-2.200.0.dist-info}/top_level.txt +0 -0
|
@@ -2121,12 +2121,10 @@ class CfnHookVersion(
|
|
|
2121
2121
|
@builtins.property
|
|
2122
2122
|
@jsii.member(jsii_name="attrVisibility")
|
|
2123
2123
|
def attr_visibility(self) -> builtins.str:
|
|
2124
|
-
'''The
|
|
2124
|
+
'''The visibility level that determines who can see and use this Hook in CloudFormation operations:.
|
|
2125
2125
|
|
|
2126
|
-
|
|
2127
|
-
|
|
2128
|
-
- ``PRIVATE`` : The extension (Hook) is only visible and usable within the account in which it's registered. CloudFormation marks any resources you register as ``PRIVATE`` .
|
|
2129
|
-
- ``PUBLIC`` : The extension (Hook) is publicly visible and usable within any AWS account.
|
|
2126
|
+
- ``PRIVATE`` : The Hook is only visible and usable within the account where it was registered. CloudFormation automatically marks any Hooks you register as ``PRIVATE`` .
|
|
2127
|
+
- ``PUBLIC`` : The Hook is publicly visible and usable within any AWS account.
|
|
2130
2128
|
|
|
2131
2129
|
:cloudformationAttribute: Visibility
|
|
2132
2130
|
'''
|
|
@@ -4048,12 +4046,10 @@ class CfnModuleVersion(
|
|
|
4048
4046
|
@builtins.property
|
|
4049
4047
|
@jsii.member(jsii_name="attrVisibility")
|
|
4050
4048
|
def attr_visibility(self) -> builtins.str:
|
|
4051
|
-
'''The
|
|
4052
|
-
|
|
4053
|
-
Valid values include:
|
|
4049
|
+
'''The visibility level that determines who can see and use this module in CloudFormation operations:.
|
|
4054
4050
|
|
|
4055
|
-
- ``PRIVATE`` : The
|
|
4056
|
-
- ``PUBLIC`` : The
|
|
4051
|
+
- ``PRIVATE`` : The module is only visible and usable within the account where it was registered. CloudFormation automatically marks any modules you register as ``PRIVATE`` .
|
|
4052
|
+
- ``PUBLIC`` : The module is publicly visible and usable within any AWS account.
|
|
4057
4053
|
|
|
4058
4054
|
:cloudformationAttribute: Visibility
|
|
4059
4055
|
'''
|
|
@@ -5128,7 +5124,7 @@ class CfnResourceVersion(
|
|
|
5128
5124
|
|
|
5129
5125
|
CloudFormation determines the provisioning type during registration, based on the types of handlers in the schema handler package submitted.
|
|
5130
5126
|
|
|
5131
|
-
|
|
5127
|
+
Possible values:
|
|
5132
5128
|
|
|
5133
5129
|
- ``FULLY_MUTABLE`` : The resource type includes an update handler to process updates to the type during stack update operations.
|
|
5134
5130
|
- ``IMMUTABLE`` : The resource type doesn't include an update handler, so the type can't be updated and must instead be replaced during stack update operations.
|
|
@@ -5164,12 +5160,10 @@ class CfnResourceVersion(
|
|
|
5164
5160
|
@builtins.property
|
|
5165
5161
|
@jsii.member(jsii_name="attrVisibility")
|
|
5166
5162
|
def attr_visibility(self) -> builtins.str:
|
|
5167
|
-
'''The
|
|
5168
|
-
|
|
5169
|
-
Valid values include:
|
|
5163
|
+
'''The visibility level that determines who can see and use this resource in CloudFormation operations:.
|
|
5170
5164
|
|
|
5171
|
-
- ``PRIVATE`` : The
|
|
5172
|
-
- ``PUBLIC`` : The
|
|
5165
|
+
- ``PRIVATE`` : The resource is only visible and usable within the account where it was registered. CloudFormation automatically marks any resources you register as ``PRIVATE`` .
|
|
5166
|
+
- ``PUBLIC`` : The resource is publicly visible and usable within any AWS account.
|
|
5173
5167
|
|
|
5174
5168
|
:cloudformationAttribute: Visibility
|
|
5175
5169
|
'''
|
|
@@ -5449,7 +5443,7 @@ class CfnStack(
|
|
|
5449
5443
|
):
|
|
5450
5444
|
'''The ``AWS::CloudFormation::Stack`` resource nests a stack as a resource in a top-level template.
|
|
5451
5445
|
|
|
5452
|
-
For more information, see `
|
|
5446
|
+
For more information, see `Nested stacks <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-nested-stacks.html>`_ in the *AWS CloudFormation User Guide* .
|
|
5453
5447
|
|
|
5454
5448
|
You can add output values from a nested stack within the containing template. You use the `GetAtt <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/intrinsic-function-reference-getatt.html>`_ function with the nested stack's logical name and the name of the output value in the nested stack in the format ``Outputs. *NestedStackOutputName*`` .
|
|
5455
5449
|
|
|
@@ -5457,7 +5451,7 @@ class CfnStack(
|
|
|
5457
5451
|
|
|
5458
5452
|
When you apply template changes to update a top-level stack, CloudFormation updates the top-level stack and initiates an update to its nested stacks. CloudFormation updates the resources of modified nested stacks, but doesn't update the resources of unmodified nested stacks.
|
|
5459
5453
|
|
|
5460
|
-
|
|
5454
|
+
For stacks that contain IAM resources, you must acknowledge IAM capabilities. Also, make sure that you have cancel update stack permissions, which are required if an update rolls back. For more information about IAM and CloudFormation , see `Controlling access with AWS Identity and Access Management <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/control-access-with-iam.html>`_ in the *AWS CloudFormation User Guide* .
|
|
5461
5455
|
.. epigraph::
|
|
5462
5456
|
|
|
5463
5457
|
A subset of ``AWS::CloudFormation::Stack`` resource type properties listed below are available to customers using CloudFormation , AWS CDK , and Cloud Control to configure.
|
|
@@ -5623,7 +5617,7 @@ class CfnStack(
|
|
|
5623
5617
|
@builtins.property
|
|
5624
5618
|
@jsii.member(jsii_name="attrParentId")
|
|
5625
5619
|
def attr_parent_id(self) -> builtins.str:
|
|
5626
|
-
'''For nested stacks
|
|
5620
|
+
'''For nested stacks, returns the stack ID of the direct parent of this stack.
|
|
5627
5621
|
|
|
5628
5622
|
For the first level of nested stacks, the root stack is also the parent stack.
|
|
5629
5623
|
|
|
@@ -5634,7 +5628,7 @@ class CfnStack(
|
|
|
5634
5628
|
@builtins.property
|
|
5635
5629
|
@jsii.member(jsii_name="attrRootId")
|
|
5636
5630
|
def attr_root_id(self) -> builtins.str:
|
|
5637
|
-
'''For nested stacks
|
|
5631
|
+
'''For nested stacks, returns the stack ID of the top-level stack to which the nested stack ultimately belongs.
|
|
5638
5632
|
|
|
5639
5633
|
:cloudformationAttribute: RootId
|
|
5640
5634
|
'''
|
|
@@ -6102,7 +6096,7 @@ class CfnStackSet(
|
|
|
6102
6096
|
:param permission_model: Describes how the IAM roles required for stack set operations are created. - With ``SELF_MANAGED`` permissions, you must create the administrator and execution roles required to deploy to target accounts. For more information, see `Grant self-managed permissions <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs-self-managed.html>`_ in the *AWS CloudFormation User Guide* . - With ``SERVICE_MANAGED`` permissions, StackSets automatically creates the IAM roles required to deploy to accounts managed by AWS Organizations . For more information, see `Activate trusted access for stack sets with AWS Organizations <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-activate-trusted-access.html>`_ in the *AWS CloudFormation User Guide* .
|
|
6103
6097
|
:param stack_set_name: The name to associate with the stack set. The name must be unique in the Region where you create your stack set.
|
|
6104
6098
|
:param administration_role_arn: The Amazon Resource Number (ARN) of the IAM role to use to create this stack set. Specify an IAM role only if you are using customized administrator roles to control which users or groups can manage specific stack sets within the same administrator account. Use customized administrator roles to control which users or groups can manage specific stack sets within the same administrator account. For more information, see `Grant self-managed permissions <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs-self-managed.html>`_ in the *AWS CloudFormation User Guide* . Valid only if the permissions model is ``SELF_MANAGED`` .
|
|
6105
|
-
:param auto_deployment: Describes whether StackSets automatically deploys to AWS Organizations accounts that are added to a target organization or organizational unit (OU). For more information, see `
|
|
6099
|
+
:param auto_deployment: Describes whether StackSets automatically deploys to AWS Organizations accounts that are added to a target organization or organizational unit (OU). For more information, see `Enable or disable automatic deployments for StackSets in AWS Organizations <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-manage-auto-deployment.html>`_ in the *AWS CloudFormation User Guide* . Required if the permissions model is ``SERVICE_MANAGED`` . (Not used with self-managed permissions.)
|
|
6106
6100
|
:param call_as: Specifies whether you are acting as an account administrator in the organization's management account or as a delegated administrator in a member account. By default, ``SELF`` is specified. Use ``SELF`` for stack sets with self-managed permissions. - To create a stack set with service-managed permissions while signed in to the management account, specify ``SELF`` . - To create a stack set with service-managed permissions while signed in to a delegated administrator account, specify ``DELEGATED_ADMIN`` . Your AWS account must be registered as a delegated admin in the management account. For more information, see `Register a delegated administrator <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-delegated-admin.html>`_ in the *AWS CloudFormation User Guide* . Stack sets with service-managed permissions are created in the management account, including stack sets that are created by delegated administrators. Valid only if the permissions model is ``SERVICE_MANAGED`` .
|
|
6107
6101
|
:param capabilities: The capabilities that are allowed in the stack set. Some stack set templates might include resources that can affect permissions in your AWS account —for example, by creating new IAM users. For more information, see `Acknowledging IAM resources in CloudFormation templates <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/control-access-with-iam.html#using-iam-capabilities>`_ in the *AWS CloudFormation User Guide* .
|
|
6108
6102
|
:param description: A description of the stack set.
|
|
@@ -7080,7 +7074,7 @@ class CfnStackSetProps:
|
|
|
7080
7074
|
:param permission_model: Describes how the IAM roles required for stack set operations are created. - With ``SELF_MANAGED`` permissions, you must create the administrator and execution roles required to deploy to target accounts. For more information, see `Grant self-managed permissions <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs-self-managed.html>`_ in the *AWS CloudFormation User Guide* . - With ``SERVICE_MANAGED`` permissions, StackSets automatically creates the IAM roles required to deploy to accounts managed by AWS Organizations . For more information, see `Activate trusted access for stack sets with AWS Organizations <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-activate-trusted-access.html>`_ in the *AWS CloudFormation User Guide* .
|
|
7081
7075
|
:param stack_set_name: The name to associate with the stack set. The name must be unique in the Region where you create your stack set.
|
|
7082
7076
|
:param administration_role_arn: The Amazon Resource Number (ARN) of the IAM role to use to create this stack set. Specify an IAM role only if you are using customized administrator roles to control which users or groups can manage specific stack sets within the same administrator account. Use customized administrator roles to control which users or groups can manage specific stack sets within the same administrator account. For more information, see `Grant self-managed permissions <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs-self-managed.html>`_ in the *AWS CloudFormation User Guide* . Valid only if the permissions model is ``SELF_MANAGED`` .
|
|
7083
|
-
:param auto_deployment: Describes whether StackSets automatically deploys to AWS Organizations accounts that are added to a target organization or organizational unit (OU). For more information, see `
|
|
7077
|
+
:param auto_deployment: Describes whether StackSets automatically deploys to AWS Organizations accounts that are added to a target organization or organizational unit (OU). For more information, see `Enable or disable automatic deployments for StackSets in AWS Organizations <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-manage-auto-deployment.html>`_ in the *AWS CloudFormation User Guide* . Required if the permissions model is ``SERVICE_MANAGED`` . (Not used with self-managed permissions.)
|
|
7084
7078
|
:param call_as: Specifies whether you are acting as an account administrator in the organization's management account or as a delegated administrator in a member account. By default, ``SELF`` is specified. Use ``SELF`` for stack sets with self-managed permissions. - To create a stack set with service-managed permissions while signed in to the management account, specify ``SELF`` . - To create a stack set with service-managed permissions while signed in to a delegated administrator account, specify ``DELEGATED_ADMIN`` . Your AWS account must be registered as a delegated admin in the management account. For more information, see `Register a delegated administrator <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-delegated-admin.html>`_ in the *AWS CloudFormation User Guide* . Stack sets with service-managed permissions are created in the management account, including stack sets that are created by delegated administrators. Valid only if the permissions model is ``SERVICE_MANAGED`` .
|
|
7085
7079
|
:param capabilities: The capabilities that are allowed in the stack set. Some stack set templates might include resources that can affect permissions in your AWS account —for example, by creating new IAM users. For more information, see `Acknowledging IAM resources in CloudFormation templates <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/control-access-with-iam.html#using-iam-capabilities>`_ in the *AWS CloudFormation User Guide* .
|
|
7086
7080
|
:param description: A description of the stack set.
|
|
@@ -7249,7 +7243,7 @@ class CfnStackSetProps:
|
|
|
7249
7243
|
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, CfnStackSet.AutoDeploymentProperty]]:
|
|
7250
7244
|
'''Describes whether StackSets automatically deploys to AWS Organizations accounts that are added to a target organization or organizational unit (OU).
|
|
7251
7245
|
|
|
7252
|
-
For more information, see `
|
|
7246
|
+
For more information, see `Enable or disable automatic deployments for StackSets in AWS Organizations <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-manage-auto-deployment.html>`_ in the *AWS CloudFormation User Guide* .
|
|
7253
7247
|
|
|
7254
7248
|
Required if the permissions model is ``SERVICE_MANAGED`` . (Not used with self-managed permissions.)
|
|
7255
7249
|
|
|
@@ -681,7 +681,7 @@ You can allow the traffic from the CloudFront managed prefix list named **com.am
|
|
|
681
681
|
cf_origin_facing = ec2.PrefixList.from_lookup(self, "CloudFrontOriginFacing",
|
|
682
682
|
prefix_list_name="com.amazonaws.global.cloudfront.origin-facing"
|
|
683
683
|
)
|
|
684
|
-
alb.connections.allow_from(
|
|
684
|
+
alb.connections.allow_from(cf_origin_facing, ec2.Port.HTTP)
|
|
685
685
|
```
|
|
686
686
|
|
|
687
687
|
#### The VPC origin service security group
|
|
@@ -2877,7 +2877,7 @@ class CfnTrail(
|
|
|
2877
2877
|
:param insight_selectors: A JSON string that contains the Insights types you want to log on a trail. ``ApiCallRateInsight`` and ``ApiErrorRateInsight`` are valid Insight types. The ``ApiCallRateInsight`` Insights type analyzes write-only management API calls that are aggregated per minute against a baseline API call volume. The ``ApiErrorRateInsight`` Insights type analyzes management API calls that result in error codes. The error is shown if the API call is unsuccessful.
|
|
2878
2878
|
:param is_multi_region_trail: Specifies whether the trail applies only to the current Region or to all Regions. The default is false. If the trail exists only in the current Region and this value is set to true, shadow trails (replications of the trail) will be created in the other Regions. If the trail exists in all Regions and this value is set to false, the trail will remain in the Region where it was created, and its shadow trails in other Regions will be deleted. As a best practice, consider using trails that log events in all Regions.
|
|
2879
2879
|
:param is_organization_trail: Specifies whether the trail is applied to all accounts in an organization in AWS Organizations , or only for the current AWS account . The default is false, and cannot be true unless the call is made on behalf of an AWS account that is the management account for an organization in AWS Organizations . If the trail is not an organization trail and this is set to ``true`` , the trail will be created in all AWS accounts that belong to the organization. If the trail is an organization trail and this is set to ``false`` , the trail will remain in the current AWS account but be deleted from all member accounts in the organization. .. epigraph:: Only the management account for the organization can convert an organization trail to a non-organization trail, or convert a non-organization trail to an organization trail.
|
|
2880
|
-
:param kms_key_id: Specifies the AWS KMS key ID to use to encrypt the logs delivered by CloudTrail. The value can be an alias name prefixed by "alias/", a fully specified ARN to an alias, a fully specified ARN to a key, or a globally unique identifier. CloudTrail also supports AWS KMS multi-Region keys. For more information about multi-Region keys, see `Using multi-Region keys <https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html>`_ in the *AWS Key Management Service Developer Guide* . Examples: - alias/MyAliasName - arn:aws:kms:us-east-2:123456789012:alias/MyAliasName - arn:aws:kms:us-east-2:123456789012:key/12345678-1234-1234-1234-123456789012 - 12345678-1234-1234-1234-123456789012
|
|
2880
|
+
:param kms_key_id: Specifies the AWS KMS key ID to use to encrypt the logs and digest files delivered by CloudTrail. The value can be an alias name prefixed by "alias/", a fully specified ARN to an alias, a fully specified ARN to a key, or a globally unique identifier. CloudTrail also supports AWS KMS multi-Region keys. For more information about multi-Region keys, see `Using multi-Region keys <https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html>`_ in the *AWS Key Management Service Developer Guide* . Examples: - alias/MyAliasName - arn:aws:kms:us-east-2:123456789012:alias/MyAliasName - arn:aws:kms:us-east-2:123456789012:key/12345678-1234-1234-1234-123456789012 - 12345678-1234-1234-1234-123456789012
|
|
2881
2881
|
:param s3_key_prefix: Specifies the Amazon S3 key prefix that comes after the name of the bucket you have designated for log file delivery. For more information, see `Finding Your CloudTrail Log Files <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/get-and-view-cloudtrail-log-files.html#cloudtrail-find-log-files>`_ . The maximum length is 200 characters.
|
|
2882
2882
|
:param sns_topic_name: Specifies the name or ARN of the Amazon SNS topic defined for notification of log file delivery. The maximum length is 256 characters.
|
|
2883
2883
|
:param tags: A custom set of tags (key-value pairs) for this trail.
|
|
@@ -3157,7 +3157,7 @@ class CfnTrail(
|
|
|
3157
3157
|
@builtins.property
|
|
3158
3158
|
@jsii.member(jsii_name="kmsKeyId")
|
|
3159
3159
|
def kms_key_id(self) -> typing.Optional[builtins.str]:
|
|
3160
|
-
'''Specifies the AWS KMS key ID to use to encrypt the logs delivered by CloudTrail.'''
|
|
3160
|
+
'''Specifies the AWS KMS key ID to use to encrypt the logs and digest files delivered by CloudTrail.'''
|
|
3161
3161
|
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "kmsKeyId"))
|
|
3162
3162
|
|
|
3163
3163
|
@kms_key_id.setter
|
|
@@ -3945,7 +3945,7 @@ class CfnTrailProps:
|
|
|
3945
3945
|
:param insight_selectors: A JSON string that contains the Insights types you want to log on a trail. ``ApiCallRateInsight`` and ``ApiErrorRateInsight`` are valid Insight types. The ``ApiCallRateInsight`` Insights type analyzes write-only management API calls that are aggregated per minute against a baseline API call volume. The ``ApiErrorRateInsight`` Insights type analyzes management API calls that result in error codes. The error is shown if the API call is unsuccessful.
|
|
3946
3946
|
:param is_multi_region_trail: Specifies whether the trail applies only to the current Region or to all Regions. The default is false. If the trail exists only in the current Region and this value is set to true, shadow trails (replications of the trail) will be created in the other Regions. If the trail exists in all Regions and this value is set to false, the trail will remain in the Region where it was created, and its shadow trails in other Regions will be deleted. As a best practice, consider using trails that log events in all Regions.
|
|
3947
3947
|
:param is_organization_trail: Specifies whether the trail is applied to all accounts in an organization in AWS Organizations , or only for the current AWS account . The default is false, and cannot be true unless the call is made on behalf of an AWS account that is the management account for an organization in AWS Organizations . If the trail is not an organization trail and this is set to ``true`` , the trail will be created in all AWS accounts that belong to the organization. If the trail is an organization trail and this is set to ``false`` , the trail will remain in the current AWS account but be deleted from all member accounts in the organization. .. epigraph:: Only the management account for the organization can convert an organization trail to a non-organization trail, or convert a non-organization trail to an organization trail.
|
|
3948
|
-
:param kms_key_id: Specifies the AWS KMS key ID to use to encrypt the logs delivered by CloudTrail. The value can be an alias name prefixed by "alias/", a fully specified ARN to an alias, a fully specified ARN to a key, or a globally unique identifier. CloudTrail also supports AWS KMS multi-Region keys. For more information about multi-Region keys, see `Using multi-Region keys <https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html>`_ in the *AWS Key Management Service Developer Guide* . Examples: - alias/MyAliasName - arn:aws:kms:us-east-2:123456789012:alias/MyAliasName - arn:aws:kms:us-east-2:123456789012:key/12345678-1234-1234-1234-123456789012 - 12345678-1234-1234-1234-123456789012
|
|
3948
|
+
:param kms_key_id: Specifies the AWS KMS key ID to use to encrypt the logs and digest files delivered by CloudTrail. The value can be an alias name prefixed by "alias/", a fully specified ARN to an alias, a fully specified ARN to a key, or a globally unique identifier. CloudTrail also supports AWS KMS multi-Region keys. For more information about multi-Region keys, see `Using multi-Region keys <https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html>`_ in the *AWS Key Management Service Developer Guide* . Examples: - alias/MyAliasName - arn:aws:kms:us-east-2:123456789012:alias/MyAliasName - arn:aws:kms:us-east-2:123456789012:key/12345678-1234-1234-1234-123456789012 - 12345678-1234-1234-1234-123456789012
|
|
3949
3949
|
:param s3_key_prefix: Specifies the Amazon S3 key prefix that comes after the name of the bucket you have designated for log file delivery. For more information, see `Finding Your CloudTrail Log Files <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/get-and-view-cloudtrail-log-files.html#cloudtrail-find-log-files>`_ . The maximum length is 200 characters.
|
|
3950
3950
|
:param sns_topic_name: Specifies the name or ARN of the Amazon SNS topic defined for notification of log file delivery. The maximum length is 256 characters.
|
|
3951
3951
|
:param tags: A custom set of tags (key-value pairs) for this trail.
|
|
@@ -4222,7 +4222,7 @@ class CfnTrailProps:
|
|
|
4222
4222
|
|
|
4223
4223
|
@builtins.property
|
|
4224
4224
|
def kms_key_id(self) -> typing.Optional[builtins.str]:
|
|
4225
|
-
'''Specifies the AWS KMS key ID to use to encrypt the logs delivered by CloudTrail.
|
|
4225
|
+
'''Specifies the AWS KMS key ID to use to encrypt the logs and digest files delivered by CloudTrail.
|
|
4226
4226
|
|
|
4227
4227
|
The value can be an alias name prefixed by "alias/", a fully specified ARN to an alias, a fully specified ARN to a key, or a globally unique identifier.
|
|
4228
4228
|
|
|
@@ -5458,6 +5458,7 @@ class CfnInsightRule(
|
|
|
5458
5458
|
rule_state="ruleState",
|
|
5459
5459
|
|
|
5460
5460
|
# the properties below are optional
|
|
5461
|
+
apply_on_transformed_logs=False,
|
|
5461
5462
|
tags=[CfnTag(
|
|
5462
5463
|
key="key",
|
|
5463
5464
|
value="value"
|
|
@@ -5473,6 +5474,7 @@ class CfnInsightRule(
|
|
|
5473
5474
|
rule_body: builtins.str,
|
|
5474
5475
|
rule_name: builtins.str,
|
|
5475
5476
|
rule_state: builtins.str,
|
|
5477
|
+
apply_on_transformed_logs: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
5476
5478
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
5477
5479
|
) -> None:
|
|
5478
5480
|
'''
|
|
@@ -5481,6 +5483,7 @@ class CfnInsightRule(
|
|
|
5481
5483
|
:param rule_body: The definition of the rule, as a JSON object. For details about the syntax, see `Contributor Insights Rule Syntax <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/ContributorInsights-RuleSyntax.html>`_ in the *Amazon CloudWatch User Guide* .
|
|
5482
5484
|
:param rule_name: The name of the rule.
|
|
5483
5485
|
:param rule_state: The current state of the rule. Valid values are ``ENABLED`` and ``DISABLED`` .
|
|
5486
|
+
:param apply_on_transformed_logs:
|
|
5484
5487
|
:param tags: A list of key-value pairs to associate with the Contributor Insights rule. You can associate as many as 50 tags with a rule. Tags can help you organize and categorize your resources. For more information, see `Tagging Your Amazon CloudWatch Resources <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch-Tagging.html>`_ . To be able to associate tags with a rule, you must have the ``cloudwatch:TagResource`` permission in addition to the ``cloudwatch:PutInsightRule`` permission.
|
|
5485
5488
|
'''
|
|
5486
5489
|
if __debug__:
|
|
@@ -5488,7 +5491,11 @@ class CfnInsightRule(
|
|
|
5488
5491
|
check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
|
|
5489
5492
|
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
5490
5493
|
props = CfnInsightRuleProps(
|
|
5491
|
-
rule_body=rule_body,
|
|
5494
|
+
rule_body=rule_body,
|
|
5495
|
+
rule_name=rule_name,
|
|
5496
|
+
rule_state=rule_state,
|
|
5497
|
+
apply_on_transformed_logs=apply_on_transformed_logs,
|
|
5498
|
+
tags=tags,
|
|
5492
5499
|
)
|
|
5493
5500
|
|
|
5494
5501
|
jsii.create(self.__class__, self, [scope, id, props])
|
|
@@ -5599,6 +5606,23 @@ class CfnInsightRule(
|
|
|
5599
5606
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
5600
5607
|
jsii.set(self, "ruleState", value) # pyright: ignore[reportArgumentType]
|
|
5601
5608
|
|
|
5609
|
+
@builtins.property
|
|
5610
|
+
@jsii.member(jsii_name="applyOnTransformedLogs")
|
|
5611
|
+
def apply_on_transformed_logs(
|
|
5612
|
+
self,
|
|
5613
|
+
) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
|
|
5614
|
+
return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], jsii.get(self, "applyOnTransformedLogs"))
|
|
5615
|
+
|
|
5616
|
+
@apply_on_transformed_logs.setter
|
|
5617
|
+
def apply_on_transformed_logs(
|
|
5618
|
+
self,
|
|
5619
|
+
value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
|
|
5620
|
+
) -> None:
|
|
5621
|
+
if __debug__:
|
|
5622
|
+
type_hints = typing.get_type_hints(_typecheckingstub__9c9111e23da0920d9dadfa879557f9838793eca0312c1c2bec0dc6eb25325512)
|
|
5623
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
5624
|
+
jsii.set(self, "applyOnTransformedLogs", value) # pyright: ignore[reportArgumentType]
|
|
5625
|
+
|
|
5602
5626
|
@builtins.property
|
|
5603
5627
|
@jsii.member(jsii_name="tagsRaw")
|
|
5604
5628
|
def tags_raw(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
|
|
@@ -5620,6 +5644,7 @@ class CfnInsightRule(
|
|
|
5620
5644
|
"rule_body": "ruleBody",
|
|
5621
5645
|
"rule_name": "ruleName",
|
|
5622
5646
|
"rule_state": "ruleState",
|
|
5647
|
+
"apply_on_transformed_logs": "applyOnTransformedLogs",
|
|
5623
5648
|
"tags": "tags",
|
|
5624
5649
|
},
|
|
5625
5650
|
)
|
|
@@ -5630,6 +5655,7 @@ class CfnInsightRuleProps:
|
|
|
5630
5655
|
rule_body: builtins.str,
|
|
5631
5656
|
rule_name: builtins.str,
|
|
5632
5657
|
rule_state: builtins.str,
|
|
5658
|
+
apply_on_transformed_logs: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
5633
5659
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
5634
5660
|
) -> None:
|
|
5635
5661
|
'''Properties for defining a ``CfnInsightRule``.
|
|
@@ -5637,6 +5663,7 @@ class CfnInsightRuleProps:
|
|
|
5637
5663
|
:param rule_body: The definition of the rule, as a JSON object. For details about the syntax, see `Contributor Insights Rule Syntax <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/ContributorInsights-RuleSyntax.html>`_ in the *Amazon CloudWatch User Guide* .
|
|
5638
5664
|
:param rule_name: The name of the rule.
|
|
5639
5665
|
:param rule_state: The current state of the rule. Valid values are ``ENABLED`` and ``DISABLED`` .
|
|
5666
|
+
:param apply_on_transformed_logs:
|
|
5640
5667
|
:param tags: A list of key-value pairs to associate with the Contributor Insights rule. You can associate as many as 50 tags with a rule. Tags can help you organize and categorize your resources. For more information, see `Tagging Your Amazon CloudWatch Resources <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch-Tagging.html>`_ . To be able to associate tags with a rule, you must have the ``cloudwatch:TagResource`` permission in addition to the ``cloudwatch:PutInsightRule`` permission.
|
|
5641
5668
|
|
|
5642
5669
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudwatch-insightrule.html
|
|
@@ -5654,6 +5681,7 @@ class CfnInsightRuleProps:
|
|
|
5654
5681
|
rule_state="ruleState",
|
|
5655
5682
|
|
|
5656
5683
|
# the properties below are optional
|
|
5684
|
+
apply_on_transformed_logs=False,
|
|
5657
5685
|
tags=[CfnTag(
|
|
5658
5686
|
key="key",
|
|
5659
5687
|
value="value"
|
|
@@ -5665,12 +5693,15 @@ class CfnInsightRuleProps:
|
|
|
5665
5693
|
check_type(argname="argument rule_body", value=rule_body, expected_type=type_hints["rule_body"])
|
|
5666
5694
|
check_type(argname="argument rule_name", value=rule_name, expected_type=type_hints["rule_name"])
|
|
5667
5695
|
check_type(argname="argument rule_state", value=rule_state, expected_type=type_hints["rule_state"])
|
|
5696
|
+
check_type(argname="argument apply_on_transformed_logs", value=apply_on_transformed_logs, expected_type=type_hints["apply_on_transformed_logs"])
|
|
5668
5697
|
check_type(argname="argument tags", value=tags, expected_type=type_hints["tags"])
|
|
5669
5698
|
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
5670
5699
|
"rule_body": rule_body,
|
|
5671
5700
|
"rule_name": rule_name,
|
|
5672
5701
|
"rule_state": rule_state,
|
|
5673
5702
|
}
|
|
5703
|
+
if apply_on_transformed_logs is not None:
|
|
5704
|
+
self._values["apply_on_transformed_logs"] = apply_on_transformed_logs
|
|
5674
5705
|
if tags is not None:
|
|
5675
5706
|
self._values["tags"] = tags
|
|
5676
5707
|
|
|
@@ -5708,6 +5739,16 @@ class CfnInsightRuleProps:
|
|
|
5708
5739
|
assert result is not None, "Required property 'rule_state' is missing"
|
|
5709
5740
|
return typing.cast(builtins.str, result)
|
|
5710
5741
|
|
|
5742
|
+
@builtins.property
|
|
5743
|
+
def apply_on_transformed_logs(
|
|
5744
|
+
self,
|
|
5745
|
+
) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
|
|
5746
|
+
'''
|
|
5747
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudwatch-insightrule.html#cfn-cloudwatch-insightrule-applyontransformedlogs
|
|
5748
|
+
'''
|
|
5749
|
+
result = self._values.get("apply_on_transformed_logs")
|
|
5750
|
+
return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], result)
|
|
5751
|
+
|
|
5711
5752
|
@builtins.property
|
|
5712
5753
|
def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
|
|
5713
5754
|
'''A list of key-value pairs to associate with the Contributor Insights rule.
|
|
@@ -16475,6 +16516,7 @@ def _typecheckingstub__7d177572b447b5b9761effd52cd14b4510ca4c8fc8607968bdc5e0bd8
|
|
|
16475
16516
|
rule_body: builtins.str,
|
|
16476
16517
|
rule_name: builtins.str,
|
|
16477
16518
|
rule_state: builtins.str,
|
|
16519
|
+
apply_on_transformed_logs: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
16478
16520
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
16479
16521
|
) -> None:
|
|
16480
16522
|
"""Type checking stubs"""
|
|
@@ -16510,6 +16552,12 @@ def _typecheckingstub__45517418d6e99e8c2af45e33f2d1375212c73bac3d2c9599691ac383e
|
|
|
16510
16552
|
"""Type checking stubs"""
|
|
16511
16553
|
pass
|
|
16512
16554
|
|
|
16555
|
+
def _typecheckingstub__9c9111e23da0920d9dadfa879557f9838793eca0312c1c2bec0dc6eb25325512(
|
|
16556
|
+
value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
|
|
16557
|
+
) -> None:
|
|
16558
|
+
"""Type checking stubs"""
|
|
16559
|
+
pass
|
|
16560
|
+
|
|
16513
16561
|
def _typecheckingstub__7d330e494e47f68df8f1753b4e301d3df252f832725f14292abf5fa4ee104054(
|
|
16514
16562
|
value: typing.Optional[typing.List[_CfnTag_f6864754]],
|
|
16515
16563
|
) -> None:
|
|
@@ -16521,6 +16569,7 @@ def _typecheckingstub__ea720192b6c423ff900f4b69425db7a31e90fed21a852500910edce45
|
|
|
16521
16569
|
rule_body: builtins.str,
|
|
16522
16570
|
rule_name: builtins.str,
|
|
16523
16571
|
rule_state: builtins.str,
|
|
16572
|
+
apply_on_transformed_logs: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
16524
16573
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
16525
16574
|
) -> None:
|
|
16526
16575
|
"""Type checking stubs"""
|
|
@@ -3434,6 +3434,12 @@ class CfnProject(
|
|
|
3434
3434
|
|
|
3435
3435
|
# the properties below are optional
|
|
3436
3436
|
certificate="certificate",
|
|
3437
|
+
docker_server=codebuild.CfnProject.DockerServerProperty(
|
|
3438
|
+
compute_type="computeType",
|
|
3439
|
+
|
|
3440
|
+
# the properties below are optional
|
|
3441
|
+
security_group_ids=["securityGroupIds"]
|
|
3442
|
+
),
|
|
3437
3443
|
environment_variables=[codebuild.CfnProject.EnvironmentVariableProperty(
|
|
3438
3444
|
name="name",
|
|
3439
3445
|
value="value",
|
|
@@ -4647,6 +4653,79 @@ class CfnProject(
|
|
|
4647
4653
|
k + "=" + repr(v) for k, v in self._values.items()
|
|
4648
4654
|
)
|
|
4649
4655
|
|
|
4656
|
+
@jsii.data_type(
|
|
4657
|
+
jsii_type="aws-cdk-lib.aws_codebuild.CfnProject.DockerServerProperty",
|
|
4658
|
+
jsii_struct_bases=[],
|
|
4659
|
+
name_mapping={
|
|
4660
|
+
"compute_type": "computeType",
|
|
4661
|
+
"security_group_ids": "securityGroupIds",
|
|
4662
|
+
},
|
|
4663
|
+
)
|
|
4664
|
+
class DockerServerProperty:
|
|
4665
|
+
def __init__(
|
|
4666
|
+
self,
|
|
4667
|
+
*,
|
|
4668
|
+
compute_type: builtins.str,
|
|
4669
|
+
security_group_ids: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
4670
|
+
) -> None:
|
|
4671
|
+
'''
|
|
4672
|
+
:param compute_type:
|
|
4673
|
+
:param security_group_ids:
|
|
4674
|
+
|
|
4675
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-codebuild-project-dockerserver.html
|
|
4676
|
+
:exampleMetadata: fixture=_generated
|
|
4677
|
+
|
|
4678
|
+
Example::
|
|
4679
|
+
|
|
4680
|
+
# The code below shows an example of how to instantiate this type.
|
|
4681
|
+
# The values are placeholders you should change.
|
|
4682
|
+
from aws_cdk import aws_codebuild as codebuild
|
|
4683
|
+
|
|
4684
|
+
docker_server_property = codebuild.CfnProject.DockerServerProperty(
|
|
4685
|
+
compute_type="computeType",
|
|
4686
|
+
|
|
4687
|
+
# the properties below are optional
|
|
4688
|
+
security_group_ids=["securityGroupIds"]
|
|
4689
|
+
)
|
|
4690
|
+
'''
|
|
4691
|
+
if __debug__:
|
|
4692
|
+
type_hints = typing.get_type_hints(_typecheckingstub__ee61866f55895d4c64262dab381d049015ede37529178930c3463abdb3999a8a)
|
|
4693
|
+
check_type(argname="argument compute_type", value=compute_type, expected_type=type_hints["compute_type"])
|
|
4694
|
+
check_type(argname="argument security_group_ids", value=security_group_ids, expected_type=type_hints["security_group_ids"])
|
|
4695
|
+
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
4696
|
+
"compute_type": compute_type,
|
|
4697
|
+
}
|
|
4698
|
+
if security_group_ids is not None:
|
|
4699
|
+
self._values["security_group_ids"] = security_group_ids
|
|
4700
|
+
|
|
4701
|
+
@builtins.property
|
|
4702
|
+
def compute_type(self) -> builtins.str:
|
|
4703
|
+
'''
|
|
4704
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-codebuild-project-dockerserver.html#cfn-codebuild-project-dockerserver-computetype
|
|
4705
|
+
'''
|
|
4706
|
+
result = self._values.get("compute_type")
|
|
4707
|
+
assert result is not None, "Required property 'compute_type' is missing"
|
|
4708
|
+
return typing.cast(builtins.str, result)
|
|
4709
|
+
|
|
4710
|
+
@builtins.property
|
|
4711
|
+
def security_group_ids(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
4712
|
+
'''
|
|
4713
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-codebuild-project-dockerserver.html#cfn-codebuild-project-dockerserver-securitygroupids
|
|
4714
|
+
'''
|
|
4715
|
+
result = self._values.get("security_group_ids")
|
|
4716
|
+
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
4717
|
+
|
|
4718
|
+
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
4719
|
+
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
4720
|
+
|
|
4721
|
+
def __ne__(self, rhs: typing.Any) -> builtins.bool:
|
|
4722
|
+
return not (rhs == self)
|
|
4723
|
+
|
|
4724
|
+
def __repr__(self) -> str:
|
|
4725
|
+
return "DockerServerProperty(%s)" % ", ".join(
|
|
4726
|
+
k + "=" + repr(v) for k, v in self._values.items()
|
|
4727
|
+
)
|
|
4728
|
+
|
|
4650
4729
|
@jsii.data_type(
|
|
4651
4730
|
jsii_type="aws-cdk-lib.aws_codebuild.CfnProject.EnvironmentProperty",
|
|
4652
4731
|
jsii_struct_bases=[],
|
|
@@ -4655,6 +4734,7 @@ class CfnProject(
|
|
|
4655
4734
|
"image": "image",
|
|
4656
4735
|
"type": "type",
|
|
4657
4736
|
"certificate": "certificate",
|
|
4737
|
+
"docker_server": "dockerServer",
|
|
4658
4738
|
"environment_variables": "environmentVariables",
|
|
4659
4739
|
"fleet": "fleet",
|
|
4660
4740
|
"image_pull_credentials_type": "imagePullCredentialsType",
|
|
@@ -4670,6 +4750,7 @@ class CfnProject(
|
|
|
4670
4750
|
image: builtins.str,
|
|
4671
4751
|
type: builtins.str,
|
|
4672
4752
|
certificate: typing.Optional[builtins.str] = None,
|
|
4753
|
+
docker_server: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnProject.DockerServerProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
4673
4754
|
environment_variables: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnProject.EnvironmentVariableProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
4674
4755
|
fleet: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnProject.ProjectFleetProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
4675
4756
|
image_pull_credentials_type: typing.Optional[builtins.str] = None,
|
|
@@ -4682,6 +4763,7 @@ class CfnProject(
|
|
|
4682
4763
|
:param image: The image tag or image digest that identifies the Docker image to use for this build project. Use the following formats: - For an image tag: ``<registry>/<repository>:<tag>`` . For example, in the Docker repository that CodeBuild uses to manage its Docker images, this would be ``aws/codebuild/standard:4.0`` . - For an image digest: ``<registry>/<repository>@<digest>`` . For example, to specify an image with the digest "sha256:cbbf2f9a99b47fc460d422812b6a5adff7dfee951d8fa2e4a98caa0382cfbdbf," use ``<registry>/<repository>@sha256:cbbf2f9a99b47fc460d422812b6a5adff7dfee951d8fa2e4a98caa0382cfbdbf`` . For more information, see `Docker images provided by CodeBuild <https://docs.aws.amazon.com//codebuild/latest/userguide/build-env-ref-available.html>`_ in the *AWS CodeBuild user guide* .
|
|
4683
4764
|
:param type: The type of build environment to use for related builds. .. epigraph:: If you're using compute fleets during project creation, ``type`` will be ignored. For more information, see `Build environment compute types <https://docs.aws.amazon.com//codebuild/latest/userguide/build-env-ref-compute-types.html>`_ in the *AWS CodeBuild user guide* .
|
|
4684
4765
|
:param certificate: The ARN of the Amazon S3 bucket, path prefix, and object key that contains the PEM-encoded certificate for the build project. For more information, see `certificate <https://docs.aws.amazon.com/codebuild/latest/userguide/create-project-cli.html#cli.environment.certificate>`_ in the *AWS CodeBuild User Guide* .
|
|
4766
|
+
:param docker_server:
|
|
4685
4767
|
:param environment_variables: A set of environment variables to make available to builds for this build project.
|
|
4686
4768
|
:param fleet:
|
|
4687
4769
|
:param image_pull_credentials_type: The type of credentials AWS CodeBuild uses to pull images in your build. There are two valid values:. - ``CODEBUILD`` specifies that AWS CodeBuild uses its own credentials. This requires that you modify your ECR repository policy to trust AWS CodeBuild service principal. - ``SERVICE_ROLE`` specifies that AWS CodeBuild uses your build project's service role. When you use a cross-account or private registry image, you must use SERVICE_ROLE credentials. When you use an AWS CodeBuild curated image, you must use CODEBUILD credentials.
|
|
@@ -4704,6 +4786,12 @@ class CfnProject(
|
|
|
4704
4786
|
|
|
4705
4787
|
# the properties below are optional
|
|
4706
4788
|
certificate="certificate",
|
|
4789
|
+
docker_server=codebuild.CfnProject.DockerServerProperty(
|
|
4790
|
+
compute_type="computeType",
|
|
4791
|
+
|
|
4792
|
+
# the properties below are optional
|
|
4793
|
+
security_group_ids=["securityGroupIds"]
|
|
4794
|
+
),
|
|
4707
4795
|
environment_variables=[codebuild.CfnProject.EnvironmentVariableProperty(
|
|
4708
4796
|
name="name",
|
|
4709
4797
|
value="value",
|
|
@@ -4728,6 +4816,7 @@ class CfnProject(
|
|
|
4728
4816
|
check_type(argname="argument image", value=image, expected_type=type_hints["image"])
|
|
4729
4817
|
check_type(argname="argument type", value=type, expected_type=type_hints["type"])
|
|
4730
4818
|
check_type(argname="argument certificate", value=certificate, expected_type=type_hints["certificate"])
|
|
4819
|
+
check_type(argname="argument docker_server", value=docker_server, expected_type=type_hints["docker_server"])
|
|
4731
4820
|
check_type(argname="argument environment_variables", value=environment_variables, expected_type=type_hints["environment_variables"])
|
|
4732
4821
|
check_type(argname="argument fleet", value=fleet, expected_type=type_hints["fleet"])
|
|
4733
4822
|
check_type(argname="argument image_pull_credentials_type", value=image_pull_credentials_type, expected_type=type_hints["image_pull_credentials_type"])
|
|
@@ -4740,6 +4829,8 @@ class CfnProject(
|
|
|
4740
4829
|
}
|
|
4741
4830
|
if certificate is not None:
|
|
4742
4831
|
self._values["certificate"] = certificate
|
|
4832
|
+
if docker_server is not None:
|
|
4833
|
+
self._values["docker_server"] = docker_server
|
|
4743
4834
|
if environment_variables is not None:
|
|
4744
4835
|
self._values["environment_variables"] = environment_variables
|
|
4745
4836
|
if fleet is not None:
|
|
@@ -4838,6 +4929,16 @@ class CfnProject(
|
|
|
4838
4929
|
result = self._values.get("certificate")
|
|
4839
4930
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
4840
4931
|
|
|
4932
|
+
@builtins.property
|
|
4933
|
+
def docker_server(
|
|
4934
|
+
self,
|
|
4935
|
+
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnProject.DockerServerProperty"]]:
|
|
4936
|
+
'''
|
|
4937
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-codebuild-project-environment.html#cfn-codebuild-project-environment-dockerserver
|
|
4938
|
+
'''
|
|
4939
|
+
result = self._values.get("docker_server")
|
|
4940
|
+
return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnProject.DockerServerProperty"]], result)
|
|
4941
|
+
|
|
4841
4942
|
@builtins.property
|
|
4842
4943
|
def environment_variables(
|
|
4843
4944
|
self,
|
|
@@ -6847,6 +6948,12 @@ class CfnProjectProps:
|
|
|
6847
6948
|
|
|
6848
6949
|
# the properties below are optional
|
|
6849
6950
|
certificate="certificate",
|
|
6951
|
+
docker_server=codebuild.CfnProject.DockerServerProperty(
|
|
6952
|
+
compute_type="computeType",
|
|
6953
|
+
|
|
6954
|
+
# the properties below are optional
|
|
6955
|
+
security_group_ids=["securityGroupIds"]
|
|
6956
|
+
),
|
|
6850
6957
|
environment_variables=[codebuild.CfnProject.EnvironmentVariableProperty(
|
|
6851
6958
|
name="name",
|
|
6852
6959
|
value="value",
|
|
@@ -19224,12 +19331,21 @@ def _typecheckingstub__3c17ec87ec820fc95c2f50ce8b9145f0fd5d2f902f5e08f4e59b9de7c
|
|
|
19224
19331
|
"""Type checking stubs"""
|
|
19225
19332
|
pass
|
|
19226
19333
|
|
|
19334
|
+
def _typecheckingstub__ee61866f55895d4c64262dab381d049015ede37529178930c3463abdb3999a8a(
|
|
19335
|
+
*,
|
|
19336
|
+
compute_type: builtins.str,
|
|
19337
|
+
security_group_ids: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
19338
|
+
) -> None:
|
|
19339
|
+
"""Type checking stubs"""
|
|
19340
|
+
pass
|
|
19341
|
+
|
|
19227
19342
|
def _typecheckingstub__357ba2b62e83543cbaf88f71d45a8de5489e377a6db9e3c7c356c3a91c1aef44(
|
|
19228
19343
|
*,
|
|
19229
19344
|
compute_type: builtins.str,
|
|
19230
19345
|
image: builtins.str,
|
|
19231
19346
|
type: builtins.str,
|
|
19232
19347
|
certificate: typing.Optional[builtins.str] = None,
|
|
19348
|
+
docker_server: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnProject.DockerServerProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
19233
19349
|
environment_variables: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnProject.EnvironmentVariableProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
19234
19350
|
fleet: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnProject.ProjectFleetProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
19235
19351
|
image_pull_credentials_type: typing.Optional[builtins.str] = None,
|