aws-cdk-lib 2.212.0__py3-none-any.whl → 2.214.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk-lib might be problematic. Click here for more details.
- aws_cdk/__init__.py +23 -3
- aws_cdk/_jsii/__init__.py +1 -1
- aws_cdk/_jsii/{aws-cdk-lib@2.212.0.jsii.tgz → aws-cdk-lib@2.214.0.jsii.tgz} +0 -0
- aws_cdk/aws_appconfig/__init__.py +18 -6
- aws_cdk/aws_appintegrations/__init__.py +4 -4
- aws_cdk/aws_apprunner/__init__.py +5 -8
- aws_cdk/aws_aps/__init__.py +243 -10
- aws_cdk/aws_b2bi/__init__.py +1015 -128
- aws_cdk/aws_batch/__init__.py +33 -11
- aws_cdk/aws_bedrock/__init__.py +22 -216
- aws_cdk/aws_budgets/__init__.py +18 -0
- aws_cdk/aws_certificatemanager/__init__.py +96 -15
- aws_cdk/aws_cloudformation/__init__.py +3 -3
- aws_cdk/aws_cloudwatch/__init__.py +80 -49
- aws_cdk/aws_cognito/__init__.py +76 -5
- aws_cdk/aws_connect/__init__.py +188 -2
- aws_cdk/aws_datazone/__init__.py +2267 -0
- aws_cdk/aws_deadline/__init__.py +6 -5
- aws_cdk/aws_dynamodb/__init__.py +418 -56
- aws_cdk/aws_ec2/__init__.py +51 -10
- aws_cdk/aws_ecs/__init__.py +288 -25
- aws_cdk/aws_ecs_patterns/__init__.py +2 -0
- aws_cdk/aws_eks/__init__.py +124 -0
- aws_cdk/aws_elasticloadbalancingv2/__init__.py +6 -2
- aws_cdk/aws_entityresolution/__init__.py +107 -0
- aws_cdk/aws_events/__init__.py +153 -55
- aws_cdk/aws_events_targets/__init__.py +87 -36
- aws_cdk/aws_fsx/__init__.py +62 -0
- aws_cdk/aws_gameliftstreams/__init__.py +1 -1
- aws_cdk/aws_glue/__init__.py +205 -23
- aws_cdk/aws_guardduty/__init__.py +205 -100
- aws_cdk/aws_iam/__init__.py +18 -0
- aws_cdk/aws_inspectorv2/__init__.py +125 -80
- aws_cdk/aws_iot/__init__.py +37 -19
- aws_cdk/aws_iotsitewise/__init__.py +111 -75
- aws_cdk/aws_ivs/__init__.py +17 -17
- aws_cdk/aws_kinesisanalytics/__init__.py +122 -3
- aws_cdk/aws_kinesisanalyticsv2/__init__.py +122 -3
- aws_cdk/aws_lambda/__init__.py +23 -2
- aws_cdk/aws_logs/__init__.py +20 -15
- aws_cdk/aws_mediapackagev2/__init__.py +2 -2
- aws_cdk/aws_networkfirewall/__init__.py +6 -6
- aws_cdk/aws_omics/__init__.py +477 -2
- aws_cdk/aws_qbusiness/__init__.py +4 -2
- aws_cdk/aws_rds/__init__.py +132 -4
- aws_cdk/aws_route53/__init__.py +18 -11
- aws_cdk/aws_s3/__init__.py +4 -4
- aws_cdk/aws_s3_deployment/__init__.py +45 -0
- aws_cdk/aws_sagemaker/__init__.py +653 -0
- aws_cdk/aws_servicediscovery/__init__.py +22 -37
- aws_cdk/aws_sns/__init__.py +12 -2
- aws_cdk/aws_sns_subscriptions/__init__.py +3 -1
- aws_cdk/aws_sqs/__init__.py +5 -5
- aws_cdk/aws_ssm/__init__.py +8 -3
- aws_cdk/aws_ssmquicksetup/__init__.py +2 -2
- aws_cdk/aws_synthetics/__init__.py +222 -12
- aws_cdk/aws_transfer/__init__.py +15 -2
- aws_cdk/aws_vpclattice/__init__.py +41 -0
- aws_cdk/aws_workspacesweb/__init__.py +71 -41
- {aws_cdk_lib-2.212.0.dist-info → aws_cdk_lib-2.214.0.dist-info}/METADATA +2 -2
- {aws_cdk_lib-2.212.0.dist-info → aws_cdk_lib-2.214.0.dist-info}/RECORD +65 -65
- {aws_cdk_lib-2.212.0.dist-info → aws_cdk_lib-2.214.0.dist-info}/LICENSE +0 -0
- {aws_cdk_lib-2.212.0.dist-info → aws_cdk_lib-2.214.0.dist-info}/NOTICE +0 -0
- {aws_cdk_lib-2.212.0.dist-info → aws_cdk_lib-2.214.0.dist-info}/WHEEL +0 -0
- {aws_cdk_lib-2.212.0.dist-info → aws_cdk_lib-2.214.0.dist-info}/top_level.txt +0 -0
aws_cdk/aws_lambda/__init__.py
CHANGED
|
@@ -4066,7 +4066,7 @@ class CfnCodeSigningConfig(
|
|
|
4066
4066
|
def __init__(self, *, untrusted_artifact_on_deployment: builtins.str) -> None:
|
|
4067
4067
|
'''Code signing configuration `policies <https://docs.aws.amazon.com/lambda/latest/dg/configuration-codesigning.html#config-codesigning-policies>`_ specify the validation failure action for signature mismatch or expiry.
|
|
4068
4068
|
|
|
4069
|
-
:param untrusted_artifact_on_deployment: Code signing configuration policy for deployment validation failure. If you set the policy to ``Enforce`` , Lambda blocks the deployment request if signature validation checks fail. If you set the policy to ``Warn`` , Lambda allows the deployment and
|
|
4069
|
+
:param untrusted_artifact_on_deployment: Code signing configuration policy for deployment validation failure. If you set the policy to ``Enforce`` , Lambda blocks the deployment request if signature validation checks fail. If you set the policy to ``Warn`` , Lambda allows the deployment and issues a new Amazon CloudWatch metric ( ``SignatureValidationErrors`` ) and also stores the warning in the CloudTrail log. Default value: ``Warn`` Default: - "Warn"
|
|
4070
4070
|
|
|
4071
4071
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-lambda-codesigningconfig-codesigningpolicies.html
|
|
4072
4072
|
:exampleMetadata: fixture=_generated
|
|
@@ -4092,7 +4092,7 @@ class CfnCodeSigningConfig(
|
|
|
4092
4092
|
def untrusted_artifact_on_deployment(self) -> builtins.str:
|
|
4093
4093
|
'''Code signing configuration policy for deployment validation failure.
|
|
4094
4094
|
|
|
4095
|
-
If you set the policy to ``Enforce`` , Lambda blocks the deployment request if signature validation checks fail. If you set the policy to ``Warn`` , Lambda allows the deployment and
|
|
4095
|
+
If you set the policy to ``Enforce`` , Lambda blocks the deployment request if signature validation checks fail. If you set the policy to ``Warn`` , Lambda allows the deployment and issues a new Amazon CloudWatch metric ( ``SignatureValidationErrors`` ) and also stores the warning in the CloudTrail log.
|
|
4096
4096
|
|
|
4097
4097
|
Default value: ``Warn``
|
|
4098
4098
|
|
|
@@ -12005,6 +12005,7 @@ class Code(metaclass=jsii.JSIIAbstractClass, jsii_type="aws-cdk-lib.aws_lambda.C
|
|
|
12005
12005
|
cache_from: typing.Optional[typing.Sequence[typing.Union[_DockerCacheOption_63aeecf2, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
12006
12006
|
cache_to: typing.Optional[typing.Union[_DockerCacheOption_63aeecf2, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
12007
12007
|
file: typing.Optional[builtins.str] = None,
|
|
12008
|
+
network: typing.Optional[builtins.str] = None,
|
|
12008
12009
|
platform: typing.Optional[builtins.str] = None,
|
|
12009
12010
|
target_stage: typing.Optional[builtins.str] = None,
|
|
12010
12011
|
) -> "AssetCode":
|
|
@@ -12021,6 +12022,7 @@ class Code(metaclass=jsii.JSIIAbstractClass, jsii_type="aws-cdk-lib.aws_lambda.C
|
|
|
12021
12022
|
:param cache_from: Cache from options to pass to the ``docker build`` command. Default: - no cache from args are passed
|
|
12022
12023
|
:param cache_to: Cache to options to pass to the ``docker build`` command. Default: - no cache to args are passed
|
|
12023
12024
|
:param file: Name of the Dockerfile, must relative to the docker build path. Default: ``Dockerfile``
|
|
12025
|
+
:param network: Docker `Networking options <https://docs.docker.com/reference/cli/docker/buildx/build/#network>`_. Default: - no networking options
|
|
12024
12026
|
:param platform: Set platform if server is multi-platform capable. *Requires Docker Engine API v1.38+*. Example value: ``linux/amd64`` Default: - no platform specified
|
|
12025
12027
|
:param target_stage: Set build target for multi-stage container builds. Any stage defined afterwards will be ignored. Example value: ``build-env`` Default: - Build all stages defined in the Dockerfile
|
|
12026
12028
|
'''
|
|
@@ -12035,6 +12037,7 @@ class Code(metaclass=jsii.JSIIAbstractClass, jsii_type="aws-cdk-lib.aws_lambda.C
|
|
|
12035
12037
|
cache_from=cache_from,
|
|
12036
12038
|
cache_to=cache_to,
|
|
12037
12039
|
file=file,
|
|
12040
|
+
network=network,
|
|
12038
12041
|
platform=platform,
|
|
12039
12042
|
target_stage=target_stage,
|
|
12040
12043
|
)
|
|
@@ -12957,6 +12960,7 @@ class DlqDestinationConfig:
|
|
|
12957
12960
|
"cache_from": "cacheFrom",
|
|
12958
12961
|
"cache_to": "cacheTo",
|
|
12959
12962
|
"file": "file",
|
|
12963
|
+
"network": "network",
|
|
12960
12964
|
"platform": "platform",
|
|
12961
12965
|
"target_stage": "targetStage",
|
|
12962
12966
|
"image_path": "imagePath",
|
|
@@ -12972,6 +12976,7 @@ class DockerBuildAssetOptions(_DockerBuildOptions_8e28be8a):
|
|
|
12972
12976
|
cache_from: typing.Optional[typing.Sequence[typing.Union[_DockerCacheOption_63aeecf2, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
12973
12977
|
cache_to: typing.Optional[typing.Union[_DockerCacheOption_63aeecf2, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
12974
12978
|
file: typing.Optional[builtins.str] = None,
|
|
12979
|
+
network: typing.Optional[builtins.str] = None,
|
|
12975
12980
|
platform: typing.Optional[builtins.str] = None,
|
|
12976
12981
|
target_stage: typing.Optional[builtins.str] = None,
|
|
12977
12982
|
image_path: typing.Optional[builtins.str] = None,
|
|
@@ -12984,6 +12989,7 @@ class DockerBuildAssetOptions(_DockerBuildOptions_8e28be8a):
|
|
|
12984
12989
|
:param cache_from: Cache from options to pass to the ``docker build`` command. Default: - no cache from args are passed
|
|
12985
12990
|
:param cache_to: Cache to options to pass to the ``docker build`` command. Default: - no cache to args are passed
|
|
12986
12991
|
:param file: Name of the Dockerfile, must relative to the docker build path. Default: ``Dockerfile``
|
|
12992
|
+
:param network: Docker `Networking options <https://docs.docker.com/reference/cli/docker/buildx/build/#network>`_. Default: - no networking options
|
|
12987
12993
|
:param platform: Set platform if server is multi-platform capable. *Requires Docker Engine API v1.38+*. Example value: ``linux/amd64`` Default: - no platform specified
|
|
12988
12994
|
:param target_stage: Set build target for multi-stage container builds. Any stage defined afterwards will be ignored. Example value: ``build-env`` Default: - Build all stages defined in the Dockerfile
|
|
12989
12995
|
:param image_path: The path in the Docker image where the asset is located after the build operation. Default: /asset
|
|
@@ -13020,6 +13026,7 @@ class DockerBuildAssetOptions(_DockerBuildOptions_8e28be8a):
|
|
|
13020
13026
|
),
|
|
13021
13027
|
file="file",
|
|
13022
13028
|
image_path="imagePath",
|
|
13029
|
+
network="network",
|
|
13023
13030
|
output_path="outputPath",
|
|
13024
13031
|
platform="platform",
|
|
13025
13032
|
target_stage="targetStage"
|
|
@@ -13034,6 +13041,7 @@ class DockerBuildAssetOptions(_DockerBuildOptions_8e28be8a):
|
|
|
13034
13041
|
check_type(argname="argument cache_from", value=cache_from, expected_type=type_hints["cache_from"])
|
|
13035
13042
|
check_type(argname="argument cache_to", value=cache_to, expected_type=type_hints["cache_to"])
|
|
13036
13043
|
check_type(argname="argument file", value=file, expected_type=type_hints["file"])
|
|
13044
|
+
check_type(argname="argument network", value=network, expected_type=type_hints["network"])
|
|
13037
13045
|
check_type(argname="argument platform", value=platform, expected_type=type_hints["platform"])
|
|
13038
13046
|
check_type(argname="argument target_stage", value=target_stage, expected_type=type_hints["target_stage"])
|
|
13039
13047
|
check_type(argname="argument image_path", value=image_path, expected_type=type_hints["image_path"])
|
|
@@ -13049,6 +13057,8 @@ class DockerBuildAssetOptions(_DockerBuildOptions_8e28be8a):
|
|
|
13049
13057
|
self._values["cache_to"] = cache_to
|
|
13050
13058
|
if file is not None:
|
|
13051
13059
|
self._values["file"] = file
|
|
13060
|
+
if network is not None:
|
|
13061
|
+
self._values["network"] = network
|
|
13052
13062
|
if platform is not None:
|
|
13053
13063
|
self._values["platform"] = platform
|
|
13054
13064
|
if target_stage is not None:
|
|
@@ -13103,6 +13113,15 @@ class DockerBuildAssetOptions(_DockerBuildOptions_8e28be8a):
|
|
|
13103
13113
|
result = self._values.get("file")
|
|
13104
13114
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
13105
13115
|
|
|
13116
|
+
@builtins.property
|
|
13117
|
+
def network(self) -> typing.Optional[builtins.str]:
|
|
13118
|
+
'''Docker `Networking options <https://docs.docker.com/reference/cli/docker/buildx/build/#network>`_.
|
|
13119
|
+
|
|
13120
|
+
:default: - no networking options
|
|
13121
|
+
'''
|
|
13122
|
+
result = self._values.get("network")
|
|
13123
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
13124
|
+
|
|
13106
13125
|
@builtins.property
|
|
13107
13126
|
def platform(self) -> typing.Optional[builtins.str]:
|
|
13108
13127
|
'''Set platform if server is multi-platform capable. *Requires Docker Engine API v1.38+*.
|
|
@@ -32246,6 +32265,7 @@ def _typecheckingstub__5d398ddff6fb1e58c2dafd59b4cd46de157e95f7c1faf544bd0e4cee3
|
|
|
32246
32265
|
cache_from: typing.Optional[typing.Sequence[typing.Union[_DockerCacheOption_63aeecf2, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
32247
32266
|
cache_to: typing.Optional[typing.Union[_DockerCacheOption_63aeecf2, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
32248
32267
|
file: typing.Optional[builtins.str] = None,
|
|
32268
|
+
network: typing.Optional[builtins.str] = None,
|
|
32249
32269
|
platform: typing.Optional[builtins.str] = None,
|
|
32250
32270
|
target_stage: typing.Optional[builtins.str] = None,
|
|
32251
32271
|
) -> None:
|
|
@@ -32358,6 +32378,7 @@ def _typecheckingstub__cbc49d837c4da70ff80dadf559d6f8c32fce03c67b454d4d81e625f4f
|
|
|
32358
32378
|
cache_from: typing.Optional[typing.Sequence[typing.Union[_DockerCacheOption_63aeecf2, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
32359
32379
|
cache_to: typing.Optional[typing.Union[_DockerCacheOption_63aeecf2, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
32360
32380
|
file: typing.Optional[builtins.str] = None,
|
|
32381
|
+
network: typing.Optional[builtins.str] = None,
|
|
32361
32382
|
platform: typing.Optional[builtins.str] = None,
|
|
32362
32383
|
target_stage: typing.Optional[builtins.str] = None,
|
|
32363
32384
|
image_path: typing.Optional[builtins.str] = None,
|
aws_cdk/aws_logs/__init__.py
CHANGED
|
@@ -1703,9 +1703,10 @@ class CfnDeliveryDestination(
|
|
|
1703
1703
|
delivery_destination_name: typing.Optional[builtins.str] = None,
|
|
1704
1704
|
delivery_destination_policy: typing.Any = None,
|
|
1705
1705
|
) -> None:
|
|
1706
|
-
'''
|
|
1707
|
-
|
|
1708
|
-
:param
|
|
1706
|
+
'''An IAM policy that grants permissions to CloudWatch Logs to deliver logs cross-account to a specified destination in this account.
|
|
1707
|
+
|
|
1708
|
+
:param delivery_destination_name: A name for an existing destination.
|
|
1709
|
+
:param delivery_destination_policy: Creates or updates an access policy associated with an existing destination. An access policy is an `IAM policy document <https://docs.aws.amazon.com/IAM/latest/UserGuide/policies_overview.html>`_ that is used to authorize claims to register a subscription filter against a given destination.
|
|
1709
1710
|
|
|
1710
1711
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-logs-deliverydestination-destinationpolicy.html
|
|
1711
1712
|
:exampleMetadata: fixture=_generated
|
|
@@ -1735,7 +1736,7 @@ class CfnDeliveryDestination(
|
|
|
1735
1736
|
|
|
1736
1737
|
@builtins.property
|
|
1737
1738
|
def delivery_destination_name(self) -> typing.Optional[builtins.str]:
|
|
1738
|
-
'''
|
|
1739
|
+
'''A name for an existing destination.
|
|
1739
1740
|
|
|
1740
1741
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-logs-deliverydestination-destinationpolicy.html#cfn-logs-deliverydestination-destinationpolicy-deliverydestinationname
|
|
1741
1742
|
'''
|
|
@@ -1744,7 +1745,9 @@ class CfnDeliveryDestination(
|
|
|
1744
1745
|
|
|
1745
1746
|
@builtins.property
|
|
1746
1747
|
def delivery_destination_policy(self) -> typing.Any:
|
|
1747
|
-
'''
|
|
1748
|
+
'''Creates or updates an access policy associated with an existing destination.
|
|
1749
|
+
|
|
1750
|
+
An access policy is an `IAM policy document <https://docs.aws.amazon.com/IAM/latest/UserGuide/policies_overview.html>`_ that is used to authorize claims to register a subscription filter against a given destination.
|
|
1748
1751
|
|
|
1749
1752
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-logs-deliverydestination-destinationpolicy.html#cfn-logs-deliverydestination-destinationpolicy-deliverydestinationpolicy
|
|
1750
1753
|
'''
|
|
@@ -3629,13 +3632,13 @@ class CfnLogGroup(
|
|
|
3629
3632
|
'''
|
|
3630
3633
|
:param scope: Scope in which this resource is defined.
|
|
3631
3634
|
:param id: Construct identifier for this resource (unique in its scope).
|
|
3632
|
-
:param data_protection_policy: Creates a data protection policy and assigns it to the log group. A data protection policy can help safeguard sensitive data that's ingested by the log group by auditing and masking the sensitive log data. When a user who does not have permission to view masked data views a log event that includes masked data, the sensitive data is replaced by asterisks.
|
|
3635
|
+
:param data_protection_policy: Creates a data protection policy and assigns it to the log group. A data protection policy can help safeguard sensitive data that's ingested by the log group by auditing and masking the sensitive log data. When a user who does not have permission to view masked data views a log event that includes masked data, the sensitive data is replaced by asterisks.
|
|
3633
3636
|
:param field_index_policies: Creates or updates a *field index policy* for the specified log group. Only log groups in the Standard log class support field index policies. For more information about log classes, see `Log classes <https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/CloudWatch_Logs_Log_Classes.html>`_ . You can use field index policies to create *field indexes* on fields found in log events in the log group. Creating field indexes lowers the costs for CloudWatch Logs Insights queries that reference those field indexes, because these queries attempt to skip the processing of log events that are known to not match the indexed field. Good fields to index are fields that you often need to query for and fields that have high cardinality of values Common examples of indexes include request ID, session ID, userID, and instance IDs. For more information, see `Create field indexes to improve query performance and reduce costs <https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/CloudWatchLogs-Field-Indexing.html>`_ . Currently, this array supports only one field index policy object.
|
|
3634
3637
|
:param kms_key_id: The Amazon Resource Name (ARN) of the AWS KMS key to use when encrypting log data. To associate an AWS KMS key with the log group, specify the ARN of that KMS key here. If you do so, ingested data is encrypted using this key. This association is stored as long as the data encrypted with the KMS key is still within CloudWatch Logs . This enables CloudWatch Logs to decrypt this data whenever it is requested. If you attempt to associate a KMS key with the log group but the KMS key doesn't exist or is deactivated, you will receive an ``InvalidParameterException`` error. Log group data is always encrypted in CloudWatch Logs . If you omit this key, the encryption does not use AWS KMS . For more information, see `Encrypt log data in CloudWatch Logs using AWS Key Management Service <https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/encrypt-log-data-kms.html>`_
|
|
3635
3638
|
:param log_group_class: Specifies the log group class for this log group. There are two classes:. - The ``Standard`` log class supports all CloudWatch Logs features. - The ``Infrequent Access`` log class supports a subset of CloudWatch Logs features and incurs lower costs. For details about the features supported by each class, see `Log classes <https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/CloudWatch_Logs_Log_Classes.html>`_ Default: - "STANDARD"
|
|
3636
3639
|
:param log_group_name: The name of the log group. If you don't specify a name, AWS CloudFormation generates a unique ID for the log group.
|
|
3637
|
-
:param resource_policy_document:
|
|
3638
|
-
:param retention_in_days: The number of days to retain the log events in the specified log group. Possible values are: 1, 3, 5, 7, 14, 30, 60, 90, 120, 150, 180, 365, 400, 545, 731, 1096, 1827, 2192, 2557, 2922, 3288, and 3653. To set a log group so that its log events do not expire,
|
|
3640
|
+
:param resource_policy_document: Creates or updates a resource policy for the specified log group that allows other services to put log events to this account. A LogGroup can have 1 resource policy.
|
|
3641
|
+
:param retention_in_days: The number of days to retain the log events in the specified log group. Possible values are: 1, 3, 5, 7, 14, 30, 60, 90, 120, 150, 180, 365, 400, 545, 731, 1096, 1827, 2192, 2557, 2922, 3288, and 3653. To set a log group so that its log events do not expire, do not specify this property.
|
|
3639
3642
|
:param tags: An array of key-value pairs to apply to the log group. For more information, see `Tag <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html>`_ .
|
|
3640
3643
|
'''
|
|
3641
3644
|
if __debug__:
|
|
@@ -3781,6 +3784,7 @@ class CfnLogGroup(
|
|
|
3781
3784
|
@builtins.property
|
|
3782
3785
|
@jsii.member(jsii_name="resourcePolicyDocument")
|
|
3783
3786
|
def resource_policy_document(self) -> typing.Any:
|
|
3787
|
+
'''Creates or updates a resource policy for the specified log group that allows other services to put log events to this account.'''
|
|
3784
3788
|
return typing.cast(typing.Any, jsii.get(self, "resourcePolicyDocument"))
|
|
3785
3789
|
|
|
3786
3790
|
@resource_policy_document.setter
|
|
@@ -3846,13 +3850,13 @@ class CfnLogGroupProps:
|
|
|
3846
3850
|
) -> None:
|
|
3847
3851
|
'''Properties for defining a ``CfnLogGroup``.
|
|
3848
3852
|
|
|
3849
|
-
:param data_protection_policy: Creates a data protection policy and assigns it to the log group. A data protection policy can help safeguard sensitive data that's ingested by the log group by auditing and masking the sensitive log data. When a user who does not have permission to view masked data views a log event that includes masked data, the sensitive data is replaced by asterisks.
|
|
3853
|
+
:param data_protection_policy: Creates a data protection policy and assigns it to the log group. A data protection policy can help safeguard sensitive data that's ingested by the log group by auditing and masking the sensitive log data. When a user who does not have permission to view masked data views a log event that includes masked data, the sensitive data is replaced by asterisks.
|
|
3850
3854
|
:param field_index_policies: Creates or updates a *field index policy* for the specified log group. Only log groups in the Standard log class support field index policies. For more information about log classes, see `Log classes <https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/CloudWatch_Logs_Log_Classes.html>`_ . You can use field index policies to create *field indexes* on fields found in log events in the log group. Creating field indexes lowers the costs for CloudWatch Logs Insights queries that reference those field indexes, because these queries attempt to skip the processing of log events that are known to not match the indexed field. Good fields to index are fields that you often need to query for and fields that have high cardinality of values Common examples of indexes include request ID, session ID, userID, and instance IDs. For more information, see `Create field indexes to improve query performance and reduce costs <https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/CloudWatchLogs-Field-Indexing.html>`_ . Currently, this array supports only one field index policy object.
|
|
3851
3855
|
:param kms_key_id: The Amazon Resource Name (ARN) of the AWS KMS key to use when encrypting log data. To associate an AWS KMS key with the log group, specify the ARN of that KMS key here. If you do so, ingested data is encrypted using this key. This association is stored as long as the data encrypted with the KMS key is still within CloudWatch Logs . This enables CloudWatch Logs to decrypt this data whenever it is requested. If you attempt to associate a KMS key with the log group but the KMS key doesn't exist or is deactivated, you will receive an ``InvalidParameterException`` error. Log group data is always encrypted in CloudWatch Logs . If you omit this key, the encryption does not use AWS KMS . For more information, see `Encrypt log data in CloudWatch Logs using AWS Key Management Service <https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/encrypt-log-data-kms.html>`_
|
|
3852
3856
|
:param log_group_class: Specifies the log group class for this log group. There are two classes:. - The ``Standard`` log class supports all CloudWatch Logs features. - The ``Infrequent Access`` log class supports a subset of CloudWatch Logs features and incurs lower costs. For details about the features supported by each class, see `Log classes <https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/CloudWatch_Logs_Log_Classes.html>`_ Default: - "STANDARD"
|
|
3853
3857
|
:param log_group_name: The name of the log group. If you don't specify a name, AWS CloudFormation generates a unique ID for the log group.
|
|
3854
|
-
:param resource_policy_document:
|
|
3855
|
-
:param retention_in_days: The number of days to retain the log events in the specified log group. Possible values are: 1, 3, 5, 7, 14, 30, 60, 90, 120, 150, 180, 365, 400, 545, 731, 1096, 1827, 2192, 2557, 2922, 3288, and 3653. To set a log group so that its log events do not expire,
|
|
3858
|
+
:param resource_policy_document: Creates or updates a resource policy for the specified log group that allows other services to put log events to this account. A LogGroup can have 1 resource policy.
|
|
3859
|
+
:param retention_in_days: The number of days to retain the log events in the specified log group. Possible values are: 1, 3, 5, 7, 14, 30, 60, 90, 120, 150, 180, 365, 400, 545, 731, 1096, 1827, 2192, 2557, 2922, 3288, and 3653. To set a log group so that its log events do not expire, do not specify this property.
|
|
3856
3860
|
:param tags: An array of key-value pairs to apply to the log group. For more information, see `Tag <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html>`_ .
|
|
3857
3861
|
|
|
3858
3862
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-logs-loggroup.html
|
|
@@ -3916,8 +3920,6 @@ class CfnLogGroupProps:
|
|
|
3916
3920
|
|
|
3917
3921
|
A data protection policy can help safeguard sensitive data that's ingested by the log group by auditing and masking the sensitive log data. When a user who does not have permission to view masked data views a log event that includes masked data, the sensitive data is replaced by asterisks.
|
|
3918
3922
|
|
|
3919
|
-
For more information, including a list of types of data that can be audited and masked, see `Protect sensitive log data with masking <https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/mask-sensitive-log-data.html>`_ .
|
|
3920
|
-
|
|
3921
3923
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-logs-loggroup.html#cfn-logs-loggroup-dataprotectionpolicy
|
|
3922
3924
|
'''
|
|
3923
3925
|
result = self._values.get("data_protection_policy")
|
|
@@ -3984,7 +3986,10 @@ class CfnLogGroupProps:
|
|
|
3984
3986
|
|
|
3985
3987
|
@builtins.property
|
|
3986
3988
|
def resource_policy_document(self) -> typing.Any:
|
|
3987
|
-
'''
|
|
3989
|
+
'''Creates or updates a resource policy for the specified log group that allows other services to put log events to this account.
|
|
3990
|
+
|
|
3991
|
+
A LogGroup can have 1 resource policy.
|
|
3992
|
+
|
|
3988
3993
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-logs-loggroup.html#cfn-logs-loggroup-resourcepolicydocument
|
|
3989
3994
|
'''
|
|
3990
3995
|
result = self._values.get("resource_policy_document")
|
|
@@ -3996,7 +4001,7 @@ class CfnLogGroupProps:
|
|
|
3996
4001
|
|
|
3997
4002
|
Possible values are: 1, 3, 5, 7, 14, 30, 60, 90, 120, 150, 180, 365, 400, 545, 731, 1096, 1827, 2192, 2557, 2922, 3288, and 3653.
|
|
3998
4003
|
|
|
3999
|
-
To set a log group so that its log events do not expire,
|
|
4004
|
+
To set a log group so that its log events do not expire, do not specify this property.
|
|
4000
4005
|
|
|
4001
4006
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-logs-loggroup.html#cfn-logs-loggroup-retentionindays
|
|
4002
4007
|
'''
|
|
@@ -433,7 +433,7 @@ class CfnChannel(
|
|
|
433
433
|
) -> None:
|
|
434
434
|
'''The configuration for input switching based on the media quality confidence score (MQCS) as provided from AWS Elemental MediaLive.
|
|
435
435
|
|
|
436
|
-
:param mqcs_input_switching: When true, AWS Elemental MediaPackage performs input switching based on the MQCS. Default is
|
|
436
|
+
:param mqcs_input_switching: When true, AWS Elemental MediaPackage performs input switching based on the MQCS. Default is false. This setting is valid only when ``InputType`` is ``CMAF`` .
|
|
437
437
|
:param preferred_input: For CMAF inputs, indicates which input MediaPackage should prefer when both inputs have equal MQCS scores. Select ``1`` to prefer the first ingest endpoint, or ``2`` to prefer the second ingest endpoint. If you don't specify a preferred input, MediaPackage uses its default switching behavior when MQCS scores are equal.
|
|
438
438
|
|
|
439
439
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-mediapackagev2-channel-inputswitchconfiguration.html
|
|
@@ -466,7 +466,7 @@ class CfnChannel(
|
|
|
466
466
|
) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
|
|
467
467
|
'''When true, AWS Elemental MediaPackage performs input switching based on the MQCS.
|
|
468
468
|
|
|
469
|
-
Default is
|
|
469
|
+
Default is false. This setting is valid only when ``InputType`` is ``CMAF`` .
|
|
470
470
|
|
|
471
471
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-mediapackagev2-channel-inputswitchconfiguration.html#cfn-mediapackagev2-channel-inputswitchconfiguration-mqcsinputswitching
|
|
472
472
|
'''
|
|
@@ -6048,7 +6048,7 @@ class CfnTLSInspectionConfiguration(
|
|
|
6048
6048
|
) -> None:
|
|
6049
6049
|
'''When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status.
|
|
6050
6050
|
|
|
6051
|
-
If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/
|
|
6051
|
+
If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-servercertificateconfiguration.html>`_ .
|
|
6052
6052
|
|
|
6053
6053
|
:param revoked_status_action: Configures how Network Firewall processes traffic when it determines that the certificate presented by the server in the SSL/TLS connection has a revoked status. - *PASS* - Allow the connection to continue, and pass subsequent packets to the stateful engine for inspection. - *DROP* - Network Firewall closes the connection and drops subsequent packets for that connection. - *REJECT* - Network Firewall sends a TCP reject packet back to your client. The service closes the connection and drops subsequent packets for that connection. ``REJECT`` is available only for TCP traffic.
|
|
6054
6054
|
:param unknown_status_action: Configures how Network Firewall processes traffic when it determines that the certificate presented by the server in the SSL/TLS connection has an unknown status, or a status that cannot be determined for any other reason, including when the service is unable to connect to the OCSP and CRL endpoints for the certificate. - *PASS* - Allow the connection to continue, and pass subsequent packets to the stateful engine for inspection. - *DROP* - Network Firewall closes the connection and drops subsequent packets for that connection. - *REJECT* - Network Firewall sends a TCP reject packet back to your client. The service closes the connection and drops subsequent packets for that connection. ``REJECT`` is available only for TCP traffic.
|
|
@@ -6205,14 +6205,14 @@ class CfnTLSInspectionConfiguration(
|
|
|
6205
6205
|
scopes: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnTLSInspectionConfiguration.ServerCertificateScopeProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
6206
6206
|
server_certificates: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnTLSInspectionConfiguration.ServerCertificateProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
6207
6207
|
) -> None:
|
|
6208
|
-
'''Configures the AWS Certificate Manager certificates and scope that Network Firewall uses to decrypt and re-encrypt traffic using a `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/
|
|
6208
|
+
'''Configures the AWS Certificate Manager certificates and scope that Network Firewall uses to decrypt and re-encrypt traffic using a `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ . You can configure ``ServerCertificates`` for inbound SSL/TLS inspection, a ``CertificateAuthorityArn`` for outbound SSL/TLS inspection, or both. For information about working with certificates for TLS inspection, see `Using SSL/TLS server certficiates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* .
|
|
6209
6209
|
|
|
6210
6210
|
.. epigraph::
|
|
6211
6211
|
|
|
6212
|
-
If a server certificate that's associated with your `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/
|
|
6212
|
+
If a server certificate that's associated with your `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ is revoked, deleted, or expired it can result in client-side TLS errors.
|
|
6213
6213
|
|
|
6214
6214
|
:param certificate_authority_arn: The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within AWS Certificate Manager (ACM) to use for outbound SSL/TLS inspection. The following limitations apply: - You can use CA certificates that you imported into ACM, but you can't generate CA certificates with ACM. - You can't use certificates issued by AWS Private Certificate Authority . For more information about configuring certificates for outbound inspection, see `Using SSL/TLS certificates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* . For information about working with certificates in ACM, see `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *AWS Certificate Manager User Guide* .
|
|
6215
|
-
:param check_certificate_revocation_status: When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status. If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/
|
|
6215
|
+
:param check_certificate_revocation_status: When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status. If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-servercertificateconfiguration.html>`_ .
|
|
6216
6216
|
:param scopes: A list of scopes.
|
|
6217
6217
|
:param server_certificates: The list of server certificates to use for inbound SSL/TLS inspection.
|
|
6218
6218
|
|
|
@@ -6293,7 +6293,7 @@ class CfnTLSInspectionConfiguration(
|
|
|
6293
6293
|
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnTLSInspectionConfiguration.CheckCertificateRevocationStatusProperty"]]:
|
|
6294
6294
|
'''When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status.
|
|
6295
6295
|
|
|
6296
|
-
If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/
|
|
6296
|
+
If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-servercertificateconfiguration.html>`_ .
|
|
6297
6297
|
|
|
6298
6298
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration.html#cfn-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration-checkcertificaterevocationstatus
|
|
6299
6299
|
'''
|
|
@@ -6344,7 +6344,7 @@ class CfnTLSInspectionConfiguration(
|
|
|
6344
6344
|
*,
|
|
6345
6345
|
resource_arn: typing.Optional[builtins.str] = None,
|
|
6346
6346
|
) -> None:
|
|
6347
|
-
'''Any AWS Certificate Manager (ACM) Secure Sockets Layer/Transport Layer Security (SSL/TLS) server certificate that's associated with a `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration.html>`_ . Used in a `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/
|
|
6347
|
+
'''Any AWS Certificate Manager (ACM) Secure Sockets Layer/Transport Layer Security (SSL/TLS) server certificate that's associated with a `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration.html>`_ . Used in a `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ for inspection of inbound traffic to your firewall. You must request or import a SSL/TLS certificate into ACM for each domain Network Firewall needs to decrypt and inspect. AWS Network Firewall uses the SSL/TLS certificates to decrypt specified inbound SSL/TLS traffic going to your firewall. For information about working with certificates in AWS Certificate Manager , see `Request a public certificate <https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-request-public.html>`_ or `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *AWS Certificate Manager User Guide* .
|
|
6348
6348
|
|
|
6349
6349
|
:param resource_arn: The Amazon Resource Name (ARN) of the AWS Certificate Manager SSL/TLS server certificate that's used for inbound SSL/TLS inspection.
|
|
6350
6350
|
|