aws-cdk-lib 2.215.0__py3-none-any.whl → 2.217.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk-lib might be problematic. Click here for more details.

Files changed (64) hide show
  1. aws_cdk/__init__.py +90 -58
  2. aws_cdk/_jsii/__init__.py +1 -1
  3. aws_cdk/_jsii/{aws-cdk-lib@2.215.0.jsii.tgz → aws-cdk-lib@2.217.0.jsii.tgz} +0 -0
  4. aws_cdk/aws_acmpca/__init__.py +1 -1
  5. aws_cdk/aws_amplify/__init__.py +8 -8
  6. aws_cdk/aws_apigateway/__init__.py +26 -6
  7. aws_cdk/aws_apigatewayv2/__init__.py +32 -21
  8. aws_cdk/aws_appmesh/__init__.py +12 -12
  9. aws_cdk/aws_appstream/__init__.py +14 -4
  10. aws_cdk/aws_appsync/__init__.py +3 -3
  11. aws_cdk/aws_aps/__init__.py +459 -0
  12. aws_cdk/aws_batch/__init__.py +6 -2
  13. aws_cdk/aws_bedrock/__init__.py +162 -0
  14. aws_cdk/aws_bedrockagentcore/__init__.py +3178 -0
  15. aws_cdk/aws_certificatemanager/__init__.py +9 -10
  16. aws_cdk/aws_cleanrooms/__init__.py +163 -0
  17. aws_cdk/aws_cloudformation/__init__.py +14 -14
  18. aws_cdk/aws_cloudfront/__init__.py +91 -10
  19. aws_cdk/aws_cloudfront_origins/__init__.py +422 -47
  20. aws_cdk/aws_cognito/__init__.py +2 -2
  21. aws_cdk/aws_connect/__init__.py +138 -10
  22. aws_cdk/aws_cur/__init__.py +57 -3
  23. aws_cdk/aws_datasync/__init__.py +351 -0
  24. aws_cdk/aws_datazone/__init__.py +675 -2
  25. aws_cdk/aws_dynamodb/__init__.py +123 -0
  26. aws_cdk/aws_ec2/__init__.py +55 -10
  27. aws_cdk/aws_ecr/__init__.py +4 -0
  28. aws_cdk/aws_ecs/__init__.py +55 -12
  29. aws_cdk/aws_elasticloadbalancingv2/__init__.py +275 -0
  30. aws_cdk/aws_elasticsearch/__init__.py +2 -2
  31. aws_cdk/aws_events/__init__.py +187 -0
  32. aws_cdk/aws_evs/__init__.py +58 -4
  33. aws_cdk/aws_gamelift/__init__.py +72 -56
  34. aws_cdk/aws_iam/__init__.py +1 -1
  35. aws_cdk/aws_iotcoredeviceadvisor/__init__.py +35 -38
  36. aws_cdk/aws_iotsitewise/__init__.py +75 -111
  37. aws_cdk/aws_kinesisanalytics/__init__.py +315 -125
  38. aws_cdk/aws_kms/__init__.py +10 -2
  39. aws_cdk/aws_lambda/__init__.py +62 -8
  40. aws_cdk/aws_medialive/__init__.py +127 -0
  41. aws_cdk/aws_mediapackage/__init__.py +2 -2
  42. aws_cdk/aws_networkfirewall/__init__.py +10 -10
  43. aws_cdk/aws_networkmanager/__init__.py +63 -0
  44. aws_cdk/aws_odb/__init__.py +2082 -195
  45. aws_cdk/aws_omics/__init__.py +1414 -171
  46. aws_cdk/aws_opensearchserverless/__init__.py +164 -21
  47. aws_cdk/aws_opensearchservice/__init__.py +5 -4
  48. aws_cdk/aws_pcs/__init__.py +9 -9
  49. aws_cdk/aws_quicksight/__init__.py +295 -3
  50. aws_cdk/aws_rds/__init__.py +338 -58
  51. aws_cdk/aws_route53/__init__.py +5926 -4376
  52. aws_cdk/aws_sagemaker/__init__.py +251 -1
  53. aws_cdk/aws_servicecatalog/__init__.py +162 -154
  54. aws_cdk/aws_smsvoice/__init__.py +5218 -0
  55. aws_cdk/aws_stepfunctions_tasks/__init__.py +669 -81
  56. aws_cdk/aws_transfer/__init__.py +13 -12
  57. aws_cdk/aws_verifiedpermissions/__init__.py +1 -1
  58. aws_cdk/aws_workspacesinstances/__init__.py +641 -2
  59. {aws_cdk_lib-2.215.0.dist-info → aws_cdk_lib-2.217.0.dist-info}/METADATA +1 -1
  60. {aws_cdk_lib-2.215.0.dist-info → aws_cdk_lib-2.217.0.dist-info}/RECORD +64 -62
  61. {aws_cdk_lib-2.215.0.dist-info → aws_cdk_lib-2.217.0.dist-info}/LICENSE +0 -0
  62. {aws_cdk_lib-2.215.0.dist-info → aws_cdk_lib-2.217.0.dist-info}/NOTICE +0 -0
  63. {aws_cdk_lib-2.215.0.dist-info → aws_cdk_lib-2.217.0.dist-info}/WHEEL +0 -0
  64. {aws_cdk_lib-2.215.0.dist-info → aws_cdk_lib-2.217.0.dist-info}/top_level.txt +0 -0
@@ -950,7 +950,7 @@ class CfnTLSInspectionConfigurationProps:
950
950
  ) -> None:
951
951
  '''Properties for defining a ``CfnTLSInspectionConfiguration``.
952
952
 
953
- :param tls_inspection_configuration: The object that defines a TLS inspection configuration. AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using AWS Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
953
+ :param tls_inspection_configuration: The object that defines a TLS inspection configuration. AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
954
954
  :param tls_inspection_configuration_name: The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.
955
955
  :param description: A description of the TLS inspection configuration.
956
956
  :param tags: The key:value pairs to associate with the resource.
@@ -1025,7 +1025,7 @@ class CfnTLSInspectionConfigurationProps:
1025
1025
  ) -> typing.Union[_IResolvable_da3f097b, "CfnTLSInspectionConfiguration.TLSInspectionConfigurationProperty"]:
1026
1026
  '''The object that defines a TLS inspection configuration.
1027
1027
 
1028
- AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using AWS Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
1028
+ AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
1029
1029
 
1030
1030
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-tlsinspectionconfiguration.html#cfn-networkfirewall-tlsinspectionconfiguration-tlsinspectionconfiguration
1031
1031
  '''
@@ -6682,7 +6682,7 @@ class CfnTLSInspectionConfiguration(
6682
6682
  '''
6683
6683
  :param scope: Scope in which this resource is defined.
6684
6684
  :param id: Construct identifier for this resource (unique in its scope).
6685
- :param tls_inspection_configuration: The object that defines a TLS inspection configuration. AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using AWS Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
6685
+ :param tls_inspection_configuration: The object that defines a TLS inspection configuration. AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
6686
6686
  :param tls_inspection_configuration_name: The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.
6687
6687
  :param description: A description of the TLS inspection configuration.
6688
6688
  :param tags: The key:value pairs to associate with the resource.
@@ -7063,13 +7063,13 @@ class CfnTLSInspectionConfiguration(
7063
7063
  scopes: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnTLSInspectionConfiguration.ServerCertificateScopeProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
7064
7064
  server_certificates: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnTLSInspectionConfiguration.ServerCertificateProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
7065
7065
  ) -> None:
7066
- '''Configures the AWS Certificate Manager certificates and scope that Network Firewall uses to decrypt and re-encrypt traffic using a `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ . You can configure ``ServerCertificates`` for inbound SSL/TLS inspection, a ``CertificateAuthorityArn`` for outbound SSL/TLS inspection, or both. For information about working with certificates for TLS inspection, see `Using SSL/TLS server certficiates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* .
7066
+ '''Configures the Certificate Manager certificates and scope that Network Firewall uses to decrypt and re-encrypt traffic using a `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ . You can configure ``ServerCertificates`` for inbound SSL/TLS inspection, a ``CertificateAuthorityArn`` for outbound SSL/TLS inspection, or both. For information about working with certificates for TLS inspection, see `Using SSL/TLS server certficiates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* .
7067
7067
 
7068
7068
  .. epigraph::
7069
7069
 
7070
7070
  If a server certificate that's associated with your `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ is revoked, deleted, or expired it can result in client-side TLS errors.
7071
7071
 
7072
- :param certificate_authority_arn: The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within AWS Certificate Manager (ACM) to use for outbound SSL/TLS inspection. The following limitations apply: - You can use CA certificates that you imported into ACM, but you can't generate CA certificates with ACM. - You can't use certificates issued by AWS Private Certificate Authority . For more information about configuring certificates for outbound inspection, see `Using SSL/TLS certificates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* . For information about working with certificates in ACM, see `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *AWS Certificate Manager User Guide* .
7072
+ :param certificate_authority_arn: The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within Certificate Manager (ACM) to use for outbound SSL/TLS inspection. The following limitations apply: - You can use CA certificates that you imported into ACM, but you can't generate CA certificates with ACM. - You can't use certificates issued by AWS Private Certificate Authority . For more information about configuring certificates for outbound inspection, see `Using SSL/TLS certificates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* . For information about working with certificates in ACM, see `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *Certificate Manager User Guide* .
7073
7073
  :param check_certificate_revocation_status: When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status. If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-servercertificateconfiguration.html>`_ .
7074
7074
  :param scopes: A list of scopes.
7075
7075
  :param server_certificates: The list of server certificates to use for inbound SSL/TLS inspection.
@@ -7129,7 +7129,7 @@ class CfnTLSInspectionConfiguration(
7129
7129
 
7130
7130
  @builtins.property
7131
7131
  def certificate_authority_arn(self) -> typing.Optional[builtins.str]:
7132
- '''The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within AWS Certificate Manager (ACM) to use for outbound SSL/TLS inspection.
7132
+ '''The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within Certificate Manager (ACM) to use for outbound SSL/TLS inspection.
7133
7133
 
7134
7134
  The following limitations apply:
7135
7135
 
@@ -7138,7 +7138,7 @@ class CfnTLSInspectionConfiguration(
7138
7138
 
7139
7139
  For more information about configuring certificates for outbound inspection, see `Using SSL/TLS certificates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* .
7140
7140
 
7141
- For information about working with certificates in ACM, see `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *AWS Certificate Manager User Guide* .
7141
+ For information about working with certificates in ACM, see `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *Certificate Manager User Guide* .
7142
7142
 
7143
7143
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration.html#cfn-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration-certificateauthorityarn
7144
7144
  '''
@@ -7202,9 +7202,9 @@ class CfnTLSInspectionConfiguration(
7202
7202
  *,
7203
7203
  resource_arn: typing.Optional[builtins.str] = None,
7204
7204
  ) -> None:
7205
- '''Any AWS Certificate Manager (ACM) Secure Sockets Layer/Transport Layer Security (SSL/TLS) server certificate that's associated with a `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration.html>`_ . Used in a `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ for inspection of inbound traffic to your firewall. You must request or import a SSL/TLS certificate into ACM for each domain Network Firewall needs to decrypt and inspect. AWS Network Firewall uses the SSL/TLS certificates to decrypt specified inbound SSL/TLS traffic going to your firewall. For information about working with certificates in AWS Certificate Manager , see `Request a public certificate <https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-request-public.html>`_ or `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *AWS Certificate Manager User Guide* .
7205
+ '''Any Certificate Manager (ACM) Secure Sockets Layer/Transport Layer Security (SSL/TLS) server certificate that's associated with a `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration.html>`_ . Used in a `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ for inspection of inbound traffic to your firewall. You must request or import a SSL/TLS certificate into ACM for each domain Network Firewall needs to decrypt and inspect. AWS Network Firewall uses the SSL/TLS certificates to decrypt specified inbound SSL/TLS traffic going to your firewall. For information about working with certificates in Certificate Manager , see `Request a public certificate <https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-request-public.html>`_ or `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *Certificate Manager User Guide* .
7206
7206
 
7207
- :param resource_arn: The Amazon Resource Name (ARN) of the AWS Certificate Manager SSL/TLS server certificate that's used for inbound SSL/TLS inspection.
7207
+ :param resource_arn: The Amazon Resource Name (ARN) of the Certificate Manager SSL/TLS server certificate that's used for inbound SSL/TLS inspection.
7208
7208
 
7209
7209
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificate.html
7210
7210
  :exampleMetadata: fixture=_generated
@@ -7228,7 +7228,7 @@ class CfnTLSInspectionConfiguration(
7228
7228
 
7229
7229
  @builtins.property
7230
7230
  def resource_arn(self) -> typing.Optional[builtins.str]:
7231
- '''The Amazon Resource Name (ARN) of the AWS Certificate Manager SSL/TLS server certificate that's used for inbound SSL/TLS inspection.
7231
+ '''The Amazon Resource Name (ARN) of the Certificate Manager SSL/TLS server certificate that's used for inbound SSL/TLS inspection.
7232
7232
 
7233
7233
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificate.html#cfn-networkfirewall-tlsinspectionconfiguration-servercertificate-resourcearn
7234
7234
  '''
@@ -3986,6 +3986,15 @@ class CfnConnectAttachment(
3986
3986
  '''
3987
3987
  return typing.cast(builtins.str, jsii.get(self, "attrCreatedAt"))
3988
3988
 
3989
+ @builtins.property
3990
+ @jsii.member(jsii_name="attrLastModificationErrors")
3991
+ def attr_last_modification_errors(self) -> typing.List[builtins.str]:
3992
+ '''Errors from the last modification of the attachment.
3993
+
3994
+ :cloudformationAttribute: LastModificationErrors
3995
+ '''
3996
+ return typing.cast(typing.List[builtins.str], jsii.get(self, "attrLastModificationErrors"))
3997
+
3989
3998
  @builtins.property
3990
3999
  @jsii.member(jsii_name="attrOwnerAccountId")
3991
4000
  def attr_owner_account_id(self) -> builtins.str:
@@ -4599,6 +4608,15 @@ class CfnConnectPeer(
4599
4608
  '''
4600
4609
  return typing.cast(builtins.str, jsii.get(self, "attrEdgeLocation"))
4601
4610
 
4611
+ @builtins.property
4612
+ @jsii.member(jsii_name="attrLastModificationErrors")
4613
+ def attr_last_modification_errors(self) -> typing.List[builtins.str]:
4614
+ '''Describes the error associated with the attachment request.
4615
+
4616
+ :cloudformationAttribute: LastModificationErrors
4617
+ '''
4618
+ return typing.cast(typing.List[builtins.str], jsii.get(self, "attrLastModificationErrors"))
4619
+
4602
4620
  @builtins.property
4603
4621
  @jsii.member(jsii_name="attrState")
4604
4622
  def attr_state(self) -> builtins.str:
@@ -6391,6 +6409,15 @@ class CfnDirectConnectGatewayAttachment(
6391
6409
  '''
6392
6410
  return typing.cast(builtins.str, jsii.get(self, "attrCreatedAt"))
6393
6411
 
6412
+ @builtins.property
6413
+ @jsii.member(jsii_name="attrLastModificationErrors")
6414
+ def attr_last_modification_errors(self) -> typing.List[builtins.str]:
6415
+ '''Errors from the last modification of the attachment.
6416
+
6417
+ :cloudformationAttribute: LastModificationErrors
6418
+ '''
6419
+ return typing.cast(typing.List[builtins.str], jsii.get(self, "attrLastModificationErrors"))
6420
+
6394
6421
  @builtins.property
6395
6422
  @jsii.member(jsii_name="attrNetworkFunctionGroupName")
6396
6423
  def attr_network_function_group_name(self) -> builtins.str:
@@ -7854,6 +7881,15 @@ class CfnSiteToSiteVpnAttachment(
7854
7881
  '''
7855
7882
  return typing.cast(builtins.str, jsii.get(self, "attrEdgeLocation"))
7856
7883
 
7884
+ @builtins.property
7885
+ @jsii.member(jsii_name="attrLastModificationErrors")
7886
+ def attr_last_modification_errors(self) -> typing.List[builtins.str]:
7887
+ '''Errors from the last modification of the attachment.
7888
+
7889
+ :cloudformationAttribute: LastModificationErrors
7890
+ '''
7891
+ return typing.cast(typing.List[builtins.str], jsii.get(self, "attrLastModificationErrors"))
7892
+
7857
7893
  @builtins.property
7858
7894
  @jsii.member(jsii_name="attrOwnerAccountId")
7859
7895
  def attr_owner_account_id(self) -> builtins.str:
@@ -8308,6 +8344,15 @@ class CfnTransitGatewayPeering(
8308
8344
  '''
8309
8345
  return typing.cast(builtins.str, jsii.get(self, "attrEdgeLocation"))
8310
8346
 
8347
+ @builtins.property
8348
+ @jsii.member(jsii_name="attrLastModificationErrors")
8349
+ def attr_last_modification_errors(self) -> typing.List[builtins.str]:
8350
+ '''Errors from the last modification of the transit gateway peering.
8351
+
8352
+ :cloudformationAttribute: LastModificationErrors
8353
+ '''
8354
+ return typing.cast(typing.List[builtins.str], jsii.get(self, "attrLastModificationErrors"))
8355
+
8311
8356
  @builtins.property
8312
8357
  @jsii.member(jsii_name="attrOwnerAccountId")
8313
8358
  def attr_owner_account_id(self) -> builtins.str:
@@ -8721,6 +8766,15 @@ class CfnTransitGatewayRouteTableAttachment(
8721
8766
  '''
8722
8767
  return typing.cast(builtins.str, jsii.get(self, "attrEdgeLocation"))
8723
8768
 
8769
+ @builtins.property
8770
+ @jsii.member(jsii_name="attrLastModificationErrors")
8771
+ def attr_last_modification_errors(self) -> typing.List[builtins.str]:
8772
+ '''Errors from the last modification of the attachment.
8773
+
8774
+ :cloudformationAttribute: LastModificationErrors
8775
+ '''
8776
+ return typing.cast(typing.List[builtins.str], jsii.get(self, "attrLastModificationErrors"))
8777
+
8724
8778
  @builtins.property
8725
8779
  @jsii.member(jsii_name="attrOwnerAccountId")
8726
8780
  def attr_owner_account_id(self) -> builtins.str:
@@ -9241,6 +9295,15 @@ class CfnVpcAttachment(
9241
9295
  '''
9242
9296
  return typing.cast(builtins.str, jsii.get(self, "attrEdgeLocation"))
9243
9297
 
9298
+ @builtins.property
9299
+ @jsii.member(jsii_name="attrLastModificationErrors")
9300
+ def attr_last_modification_errors(self) -> typing.List[builtins.str]:
9301
+ '''Errors from the last modification of the attachment.
9302
+
9303
+ :cloudformationAttribute: LastModificationErrors
9304
+ '''
9305
+ return typing.cast(typing.List[builtins.str], jsii.get(self, "attrLastModificationErrors"))
9306
+
9244
9307
  @builtins.property
9245
9308
  @jsii.member(jsii_name="attrNetworkFunctionGroupName")
9246
9309
  def attr_network_function_group_name(self) -> builtins.str: