aws-cdk-lib 2.216.0__py3-none-any.whl → 2.217.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk-lib might be problematic. Click here for more details.
- aws_cdk/__init__.py +60 -28
- aws_cdk/_jsii/__init__.py +1 -1
- aws_cdk/_jsii/{aws-cdk-lib@2.216.0.jsii.tgz → aws-cdk-lib@2.217.0.jsii.tgz} +0 -0
- aws_cdk/aws_acmpca/__init__.py +1 -1
- aws_cdk/aws_amplify/__init__.py +8 -8
- aws_cdk/aws_apigateway/__init__.py +26 -6
- aws_cdk/aws_apigatewayv2/__init__.py +2 -2
- aws_cdk/aws_appmesh/__init__.py +12 -12
- aws_cdk/aws_appstream/__init__.py +14 -4
- aws_cdk/aws_appsync/__init__.py +3 -3
- aws_cdk/aws_aps/__init__.py +459 -0
- aws_cdk/aws_batch/__init__.py +6 -2
- aws_cdk/aws_bedrock/__init__.py +132 -0
- aws_cdk/aws_bedrockagentcore/__init__.py +3178 -0
- aws_cdk/aws_certificatemanager/__init__.py +9 -10
- aws_cdk/aws_cleanrooms/__init__.py +163 -0
- aws_cdk/aws_cloudformation/__init__.py +14 -14
- aws_cdk/aws_cloudfront/__init__.py +12 -8
- aws_cdk/aws_cognito/__init__.py +2 -2
- aws_cdk/aws_connect/__init__.py +138 -10
- aws_cdk/aws_cur/__init__.py +57 -3
- aws_cdk/aws_datasync/__init__.py +351 -0
- aws_cdk/aws_datazone/__init__.py +675 -2
- aws_cdk/aws_dynamodb/__init__.py +123 -0
- aws_cdk/aws_ec2/__init__.py +55 -10
- aws_cdk/aws_ecs/__init__.py +55 -12
- aws_cdk/aws_elasticloadbalancingv2/__init__.py +48 -0
- aws_cdk/aws_elasticsearch/__init__.py +2 -2
- aws_cdk/aws_evs/__init__.py +58 -4
- aws_cdk/aws_gamelift/__init__.py +72 -56
- aws_cdk/aws_iam/__init__.py +1 -1
- aws_cdk/aws_iotcoredeviceadvisor/__init__.py +35 -38
- aws_cdk/aws_iotsitewise/__init__.py +75 -111
- aws_cdk/aws_kms/__init__.py +10 -2
- aws_cdk/aws_lambda/__init__.py +46 -0
- aws_cdk/aws_medialive/__init__.py +127 -0
- aws_cdk/aws_mediapackage/__init__.py +2 -2
- aws_cdk/aws_networkfirewall/__init__.py +10 -10
- aws_cdk/aws_networkmanager/__init__.py +63 -0
- aws_cdk/aws_odb/__init__.py +2082 -195
- aws_cdk/aws_omics/__init__.py +1414 -171
- aws_cdk/aws_opensearchserverless/__init__.py +164 -21
- aws_cdk/aws_opensearchservice/__init__.py +5 -4
- aws_cdk/aws_pcs/__init__.py +9 -9
- aws_cdk/aws_quicksight/__init__.py +295 -3
- aws_cdk/aws_rds/__init__.py +338 -58
- aws_cdk/aws_sagemaker/__init__.py +251 -1
- aws_cdk/aws_servicecatalog/__init__.py +162 -154
- aws_cdk/aws_smsvoice/__init__.py +5218 -0
- aws_cdk/aws_transfer/__init__.py +13 -12
- aws_cdk/aws_verifiedpermissions/__init__.py +1 -1
- aws_cdk/aws_workspacesinstances/__init__.py +641 -2
- {aws_cdk_lib-2.216.0.dist-info → aws_cdk_lib-2.217.0.dist-info}/METADATA +1 -1
- {aws_cdk_lib-2.216.0.dist-info → aws_cdk_lib-2.217.0.dist-info}/RECORD +58 -56
- {aws_cdk_lib-2.216.0.dist-info → aws_cdk_lib-2.217.0.dist-info}/LICENSE +0 -0
- {aws_cdk_lib-2.216.0.dist-info → aws_cdk_lib-2.217.0.dist-info}/NOTICE +0 -0
- {aws_cdk_lib-2.216.0.dist-info → aws_cdk_lib-2.217.0.dist-info}/WHEEL +0 -0
- {aws_cdk_lib-2.216.0.dist-info → aws_cdk_lib-2.217.0.dist-info}/top_level.txt +0 -0
aws_cdk/aws_transfer/__init__.py
CHANGED
|
@@ -1008,7 +1008,7 @@ class CfnServerProps:
|
|
|
1008
1008
|
) -> None:
|
|
1009
1009
|
'''Properties for defining a ``CfnServer``.
|
|
1010
1010
|
|
|
1011
|
-
:param certificate: The Amazon Resource Name (ARN) of the
|
|
1011
|
+
:param certificate: The Amazon Resource Name (ARN) of the Certificate Manager (ACM) certificate. Required when ``Protocols`` is set to ``FTPS`` . To request a new public certificate, see `Request a public certificate <https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-request-public.html>`_ in the *Certificate Manager User Guide* . To import an existing certificate into ACM, see `Importing certificates into ACM <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *Certificate Manager User Guide* . To request a private certificate to use FTPS through private IP addresses, see `Request a private certificate <https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-request-private.html>`_ in the *Certificate Manager User Guide* . Certificates with the following cryptographic algorithms and key sizes are supported: - 2048-bit RSA (RSA_2048) - 4096-bit RSA (RSA_4096) - Elliptic Prime Curve 256 bit (EC_prime256v1) - Elliptic Prime Curve 384 bit (EC_secp384r1) - Elliptic Prime Curve 521 bit (EC_secp521r1) .. epigraph:: The certificate must be a valid SSL/TLS X.509 version 3 certificate with FQDN or IP address specified and information about the issuer.
|
|
1012
1012
|
:param domain: Specifies the domain of the storage system that is used for file transfers. There are two domains available: Amazon Simple Storage Service (Amazon S3) and Amazon Elastic File System (Amazon EFS). The default value is S3.
|
|
1013
1013
|
:param endpoint_details: The virtual private cloud (VPC) endpoint settings that are configured for your server. When you host your endpoint within your VPC, you can make your endpoint accessible only to resources within your VPC, or you can attach Elastic IP addresses and make your endpoint accessible to clients over the internet. Your VPC's default security groups are automatically assigned to your endpoint.
|
|
1014
1014
|
:param endpoint_type: The type of endpoint that you want your server to use. You can choose to make your server's endpoint publicly accessible (PUBLIC) or host it inside your VPC. With an endpoint that is hosted in a VPC, you can restrict access to your server and resources only within your VPC or choose to make it internet facing by attaching Elastic IP addresses directly to it. .. epigraph:: After May 19, 2021, you won't be able to create a server using ``EndpointType=VPC_ENDPOINT`` in your AWS account if your account hasn't already done so before May 19, 2021. If you have already created servers with ``EndpointType=VPC_ENDPOINT`` in your AWS account on or before May 19, 2021, you will not be affected. After this date, use ``EndpointType`` = ``VPC`` . For more information, see `Discontinuing the use of VPC_ENDPOINT <https://docs.aws.amazon.com//transfer/latest/userguide/create-server-in-vpc.html#deprecate-vpc-endpoint>`_ . It is recommended that you use ``VPC`` as the ``EndpointType`` . With this endpoint type, you have the option to directly associate up to three Elastic IPv4 addresses (BYO IP included) with your server's endpoint and use VPC security groups to restrict traffic by the client's public IP address. This is not possible with ``EndpointType`` set to ``VPC_ENDPOINT`` .
|
|
@@ -1019,7 +1019,7 @@ class CfnServerProps:
|
|
|
1019
1019
|
:param post_authentication_login_banner: Specifies a string to display when users connect to a server. This string is displayed after the user authenticates. .. epigraph:: The SFTP protocol does not support post-authentication display banners.
|
|
1020
1020
|
:param pre_authentication_login_banner: Specifies a string to display when users connect to a server. This string is displayed before the user authenticates. For example, the following banner displays details about using the system: ``This system is for the use of authorized users only. Individuals using this computer system without authority, or in excess of their authority, are subject to having all of their activities on this system monitored and recorded by system personnel.``
|
|
1021
1021
|
:param protocol_details: The protocol settings that are configured for your server. - To indicate passive mode (for FTP and FTPS protocols), use the ``PassiveIp`` parameter. Enter a single dotted-quad IPv4 address, such as the external IP address of a firewall, router, or load balancer. - To ignore the error that is generated when the client attempts to use the ``SETSTAT`` command on a file that you are uploading to an Amazon S3 bucket, use the ``SetStatOption`` parameter. To have the AWS Transfer Family server ignore the ``SETSTAT`` command and upload files without needing to make any changes to your SFTP client, set the value to ``ENABLE_NO_OP`` . If you set the ``SetStatOption`` parameter to ``ENABLE_NO_OP`` , Transfer Family generates a log entry to Amazon CloudWatch Logs, so that you can determine when the client is making a ``SETSTAT`` call. - To determine whether your AWS Transfer Family server resumes recent, negotiated sessions through a unique session ID, use the ``TlsSessionResumptionMode`` parameter. - ``As2Transports`` indicates the transport method for the AS2 messages. Currently, only HTTP is supported. The ``Protocols`` parameter is an array of strings. *Allowed values* : One or more of ``SFTP`` , ``FTPS`` , ``FTP`` , ``AS2``
|
|
1022
|
-
:param protocols: Specifies the file transfer protocol or protocols over which your file transfer protocol client can connect to your server's endpoint. The available protocols are: - ``SFTP`` (Secure Shell (SSH) File Transfer Protocol): File transfer over SSH - ``FTPS`` (File Transfer Protocol Secure): File transfer with TLS encryption - ``FTP`` (File Transfer Protocol): Unencrypted file transfer - ``AS2`` (Applicability Statement 2): used for transporting structured business-to-business data .. epigraph:: - If you select ``FTPS`` , you must choose a certificate stored in
|
|
1022
|
+
:param protocols: Specifies the file transfer protocol or protocols over which your file transfer protocol client can connect to your server's endpoint. The available protocols are: - ``SFTP`` (Secure Shell (SSH) File Transfer Protocol): File transfer over SSH - ``FTPS`` (File Transfer Protocol Secure): File transfer with TLS encryption - ``FTP`` (File Transfer Protocol): Unencrypted file transfer - ``AS2`` (Applicability Statement 2): used for transporting structured business-to-business data .. epigraph:: - If you select ``FTPS`` , you must choose a certificate stored in Certificate Manager (ACM) which is used to identify your server when clients connect to it over FTPS. - If ``Protocol`` includes either ``FTP`` or ``FTPS`` , then the ``EndpointType`` must be ``VPC`` and the ``IdentityProviderType`` must be either ``AWS_DIRECTORY_SERVICE`` , ``AWS_LAMBDA`` , or ``API_GATEWAY`` . - If ``Protocol`` includes ``FTP`` , then ``AddressAllocationIds`` cannot be associated. - If ``Protocol`` is set only to ``SFTP`` , the ``EndpointType`` can be set to ``PUBLIC`` and the ``IdentityProviderType`` can be set any of the supported identity types: ``SERVICE_MANAGED`` , ``AWS_DIRECTORY_SERVICE`` , ``AWS_LAMBDA`` , or ``API_GATEWAY`` . - If ``Protocol`` includes ``AS2`` , then the ``EndpointType`` must be ``VPC`` , and domain must be Amazon S3. The ``Protocols`` parameter is an array of strings. *Allowed values* : One or more of ``SFTP`` , ``FTPS`` , ``FTP`` , ``AS2``
|
|
1023
1023
|
:param s3_storage_options: Specifies whether or not performance for your Amazon S3 directories is optimized. - If using the console, this is enabled by default. - If using the API or CLI, this is disabled by default. By default, home directory mappings have a ``TYPE`` of ``DIRECTORY`` . If you enable this option, you would then need to explicitly set the ``HomeDirectoryMapEntry`` ``Type`` to ``FILE`` if you want a mapping to have a file target.
|
|
1024
1024
|
:param security_policy_name: Specifies the name of the security policy for the server.
|
|
1025
1025
|
:param structured_log_destinations: Specifies the log groups to which your server logs are sent. To specify a log group, you must provide the ARN for an existing log group. In this case, the format of the log group is as follows: ``arn:aws:logs:region-name:amazon-account-id:log-group:log-group-name:*`` For example, ``arn:aws:logs:us-east-1:111122223333:log-group:mytestgroup:*`` If you have previously specified a log group for a server, you can clear it, and in effect turn off structured logging, by providing an empty value for this parameter in an ``update-server`` call. For example: ``update-server --server-id s-1234567890abcdef0 --structured-log-destinations``
|
|
@@ -1143,15 +1143,13 @@ class CfnServerProps:
|
|
|
1143
1143
|
|
|
1144
1144
|
@builtins.property
|
|
1145
1145
|
def certificate(self) -> typing.Optional[builtins.str]:
|
|
1146
|
-
'''The Amazon Resource Name (ARN) of the
|
|
1146
|
+
'''The Amazon Resource Name (ARN) of the Certificate Manager (ACM) certificate. Required when ``Protocols`` is set to ``FTPS`` .
|
|
1147
1147
|
|
|
1148
|
-
|
|
1149
|
-
|
|
1150
|
-
To request a new public certificate, see `Request a public certificate <https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-request-public.html>`_ in the *AWS Certificate Manager User Guide* .
|
|
1148
|
+
To request a new public certificate, see `Request a public certificate <https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-request-public.html>`_ in the *Certificate Manager User Guide* .
|
|
1151
1149
|
|
|
1152
|
-
To import an existing certificate into ACM, see `Importing certificates into ACM <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *
|
|
1150
|
+
To import an existing certificate into ACM, see `Importing certificates into ACM <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *Certificate Manager User Guide* .
|
|
1153
1151
|
|
|
1154
|
-
To request a private certificate to use FTPS through private IP addresses, see `Request a private certificate <https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-request-private.html>`_ in the *
|
|
1152
|
+
To request a private certificate to use FTPS through private IP addresses, see `Request a private certificate <https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-request-private.html>`_ in the *Certificate Manager User Guide* .
|
|
1155
1153
|
|
|
1156
1154
|
Certificates with the following cryptographic algorithms and key sizes are supported:
|
|
1157
1155
|
|
|
@@ -1329,7 +1327,7 @@ class CfnServerProps:
|
|
|
1329
1327
|
|
|
1330
1328
|
.. epigraph::
|
|
1331
1329
|
|
|
1332
|
-
- If you select ``FTPS`` , you must choose a certificate stored in
|
|
1330
|
+
- If you select ``FTPS`` , you must choose a certificate stored in Certificate Manager (ACM) which is used to identify your server when clients connect to it over FTPS.
|
|
1333
1331
|
- If ``Protocol`` includes either ``FTP`` or ``FTPS`` , then the ``EndpointType`` must be ``VPC`` and the ``IdentityProviderType`` must be either ``AWS_DIRECTORY_SERVICE`` , ``AWS_LAMBDA`` , or ``API_GATEWAY`` .
|
|
1334
1332
|
- If ``Protocol`` includes ``FTP`` , then ``AddressAllocationIds`` cannot be associated.
|
|
1335
1333
|
- If ``Protocol`` is set only to ``SFTP`` , the ``EndpointType`` can be set to ``PUBLIC`` and the ``IdentityProviderType`` can be set any of the supported identity types: ``SERVICE_MANAGED`` , ``AWS_DIRECTORY_SERVICE`` , ``AWS_LAMBDA`` , or ``API_GATEWAY`` .
|
|
@@ -4349,7 +4347,7 @@ class CfnServer(
|
|
|
4349
4347
|
'''
|
|
4350
4348
|
:param scope: Scope in which this resource is defined.
|
|
4351
4349
|
:param id: Construct identifier for this resource (unique in its scope).
|
|
4352
|
-
:param certificate: The Amazon Resource Name (ARN) of the
|
|
4350
|
+
:param certificate: The Amazon Resource Name (ARN) of the Certificate Manager (ACM) certificate. Required when ``Protocols`` is set to ``FTPS`` . To request a new public certificate, see `Request a public certificate <https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-request-public.html>`_ in the *Certificate Manager User Guide* . To import an existing certificate into ACM, see `Importing certificates into ACM <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *Certificate Manager User Guide* . To request a private certificate to use FTPS through private IP addresses, see `Request a private certificate <https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-request-private.html>`_ in the *Certificate Manager User Guide* . Certificates with the following cryptographic algorithms and key sizes are supported: - 2048-bit RSA (RSA_2048) - 4096-bit RSA (RSA_4096) - Elliptic Prime Curve 256 bit (EC_prime256v1) - Elliptic Prime Curve 384 bit (EC_secp384r1) - Elliptic Prime Curve 521 bit (EC_secp521r1) .. epigraph:: The certificate must be a valid SSL/TLS X.509 version 3 certificate with FQDN or IP address specified and information about the issuer.
|
|
4353
4351
|
:param domain: Specifies the domain of the storage system that is used for file transfers. There are two domains available: Amazon Simple Storage Service (Amazon S3) and Amazon Elastic File System (Amazon EFS). The default value is S3.
|
|
4354
4352
|
:param endpoint_details: The virtual private cloud (VPC) endpoint settings that are configured for your server. When you host your endpoint within your VPC, you can make your endpoint accessible only to resources within your VPC, or you can attach Elastic IP addresses and make your endpoint accessible to clients over the internet. Your VPC's default security groups are automatically assigned to your endpoint.
|
|
4355
4353
|
:param endpoint_type: The type of endpoint that you want your server to use. You can choose to make your server's endpoint publicly accessible (PUBLIC) or host it inside your VPC. With an endpoint that is hosted in a VPC, you can restrict access to your server and resources only within your VPC or choose to make it internet facing by attaching Elastic IP addresses directly to it. .. epigraph:: After May 19, 2021, you won't be able to create a server using ``EndpointType=VPC_ENDPOINT`` in your AWS account if your account hasn't already done so before May 19, 2021. If you have already created servers with ``EndpointType=VPC_ENDPOINT`` in your AWS account on or before May 19, 2021, you will not be affected. After this date, use ``EndpointType`` = ``VPC`` . For more information, see `Discontinuing the use of VPC_ENDPOINT <https://docs.aws.amazon.com//transfer/latest/userguide/create-server-in-vpc.html#deprecate-vpc-endpoint>`_ . It is recommended that you use ``VPC`` as the ``EndpointType`` . With this endpoint type, you have the option to directly associate up to three Elastic IPv4 addresses (BYO IP included) with your server's endpoint and use VPC security groups to restrict traffic by the client's public IP address. This is not possible with ``EndpointType`` set to ``VPC_ENDPOINT`` .
|
|
@@ -4360,7 +4358,7 @@ class CfnServer(
|
|
|
4360
4358
|
:param post_authentication_login_banner: Specifies a string to display when users connect to a server. This string is displayed after the user authenticates. .. epigraph:: The SFTP protocol does not support post-authentication display banners.
|
|
4361
4359
|
:param pre_authentication_login_banner: Specifies a string to display when users connect to a server. This string is displayed before the user authenticates. For example, the following banner displays details about using the system: ``This system is for the use of authorized users only. Individuals using this computer system without authority, or in excess of their authority, are subject to having all of their activities on this system monitored and recorded by system personnel.``
|
|
4362
4360
|
:param protocol_details: The protocol settings that are configured for your server. - To indicate passive mode (for FTP and FTPS protocols), use the ``PassiveIp`` parameter. Enter a single dotted-quad IPv4 address, such as the external IP address of a firewall, router, or load balancer. - To ignore the error that is generated when the client attempts to use the ``SETSTAT`` command on a file that you are uploading to an Amazon S3 bucket, use the ``SetStatOption`` parameter. To have the AWS Transfer Family server ignore the ``SETSTAT`` command and upload files without needing to make any changes to your SFTP client, set the value to ``ENABLE_NO_OP`` . If you set the ``SetStatOption`` parameter to ``ENABLE_NO_OP`` , Transfer Family generates a log entry to Amazon CloudWatch Logs, so that you can determine when the client is making a ``SETSTAT`` call. - To determine whether your AWS Transfer Family server resumes recent, negotiated sessions through a unique session ID, use the ``TlsSessionResumptionMode`` parameter. - ``As2Transports`` indicates the transport method for the AS2 messages. Currently, only HTTP is supported. The ``Protocols`` parameter is an array of strings. *Allowed values* : One or more of ``SFTP`` , ``FTPS`` , ``FTP`` , ``AS2``
|
|
4363
|
-
:param protocols: Specifies the file transfer protocol or protocols over which your file transfer protocol client can connect to your server's endpoint. The available protocols are: - ``SFTP`` (Secure Shell (SSH) File Transfer Protocol): File transfer over SSH - ``FTPS`` (File Transfer Protocol Secure): File transfer with TLS encryption - ``FTP`` (File Transfer Protocol): Unencrypted file transfer - ``AS2`` (Applicability Statement 2): used for transporting structured business-to-business data .. epigraph:: - If you select ``FTPS`` , you must choose a certificate stored in
|
|
4361
|
+
:param protocols: Specifies the file transfer protocol or protocols over which your file transfer protocol client can connect to your server's endpoint. The available protocols are: - ``SFTP`` (Secure Shell (SSH) File Transfer Protocol): File transfer over SSH - ``FTPS`` (File Transfer Protocol Secure): File transfer with TLS encryption - ``FTP`` (File Transfer Protocol): Unencrypted file transfer - ``AS2`` (Applicability Statement 2): used for transporting structured business-to-business data .. epigraph:: - If you select ``FTPS`` , you must choose a certificate stored in Certificate Manager (ACM) which is used to identify your server when clients connect to it over FTPS. - If ``Protocol`` includes either ``FTP`` or ``FTPS`` , then the ``EndpointType`` must be ``VPC`` and the ``IdentityProviderType`` must be either ``AWS_DIRECTORY_SERVICE`` , ``AWS_LAMBDA`` , or ``API_GATEWAY`` . - If ``Protocol`` includes ``FTP`` , then ``AddressAllocationIds`` cannot be associated. - If ``Protocol`` is set only to ``SFTP`` , the ``EndpointType`` can be set to ``PUBLIC`` and the ``IdentityProviderType`` can be set any of the supported identity types: ``SERVICE_MANAGED`` , ``AWS_DIRECTORY_SERVICE`` , ``AWS_LAMBDA`` , or ``API_GATEWAY`` . - If ``Protocol`` includes ``AS2`` , then the ``EndpointType`` must be ``VPC`` , and domain must be Amazon S3. The ``Protocols`` parameter is an array of strings. *Allowed values* : One or more of ``SFTP`` , ``FTPS`` , ``FTP`` , ``AS2``
|
|
4364
4362
|
:param s3_storage_options: Specifies whether or not performance for your Amazon S3 directories is optimized. - If using the console, this is enabled by default. - If using the API or CLI, this is disabled by default. By default, home directory mappings have a ``TYPE`` of ``DIRECTORY`` . If you enable this option, you would then need to explicitly set the ``HomeDirectoryMapEntry`` ``Type`` to ``FILE`` if you want a mapping to have a file target.
|
|
4365
4363
|
:param security_policy_name: Specifies the name of the security policy for the server.
|
|
4366
4364
|
:param structured_log_destinations: Specifies the log groups to which your server logs are sent. To specify a log group, you must provide the ARN for an existing log group. In this case, the format of the log group is as follows: ``arn:aws:logs:region-name:amazon-account-id:log-group:log-group-name:*`` For example, ``arn:aws:logs:us-east-1:111122223333:log-group:mytestgroup:*`` If you have previously specified a log group for a server, you can clear it, and in effect turn off structured logging, by providing an empty value for this parameter in an ``update-server`` call. For example: ``update-server --server-id s-1234567890abcdef0 --structured-log-destinations``
|
|
@@ -4487,7 +4485,10 @@ class CfnServer(
|
|
|
4487
4485
|
@builtins.property
|
|
4488
4486
|
@jsii.member(jsii_name="certificate")
|
|
4489
4487
|
def certificate(self) -> typing.Optional[builtins.str]:
|
|
4490
|
-
'''The Amazon Resource Name (ARN) of the
|
|
4488
|
+
'''The Amazon Resource Name (ARN) of the Certificate Manager (ACM) certificate.
|
|
4489
|
+
|
|
4490
|
+
Required when ``Protocols`` is set to ``FTPS`` .
|
|
4491
|
+
'''
|
|
4491
4492
|
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "certificate"))
|
|
4492
4493
|
|
|
4493
4494
|
@certificate.setter
|
|
@@ -986,7 +986,7 @@ class CfnIdentitySource(
|
|
|
986
986
|
|
|
987
987
|
After you create an identity source, you can use the identities provided by the IdP as proxies for the principal in authorization queries that use the `IsAuthorizedWithToken <https://docs.aws.amazon.com/verifiedpermissions/latest/apireference/API_IsAuthorizedWithToken.html>`_ operation. These identities take the form of tokens that contain claims about the user, such as IDs, attributes and group memberships. Amazon Cognito provides both identity tokens and access tokens, and Verified Permissions can use either or both. Any combination of identity and access tokens results in the same Cedar principal. Verified Permissions automatically translates the information about the identities into the standard Cedar attributes that can be evaluated by your policies. Because the Amazon Cognito identity and access tokens can contain different information, the tokens you choose to use determine the attributes that are available to access in the Cedar principal from your policies.
|
|
988
988
|
|
|
989
|
-
Amazon Cognito Identity is not available in all of the same AWS Regions as
|
|
989
|
+
Amazon Cognito Identity is not available in all of the same AWS Regions as . Because of this, the ``AWS::VerifiedPermissions::IdentitySource`` type is not available to create from AWS CloudFormation in Regions where Amazon Cognito Identity is not currently available. Users can still create ``AWS::VerifiedPermissions::IdentitySource`` in those Regions, but only from the AWS CLI , SDK, or from the AWS console.
|
|
990
990
|
.. epigraph::
|
|
991
991
|
|
|
992
992
|
To reference a user from this identity source in your Cedar policies, use the following syntax.
|