aws-cdk-lib 2.216.0__py3-none-any.whl → 2.218.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk-lib might be problematic. Click here for more details.
- aws_cdk/__init__.py +60 -28
- aws_cdk/_jsii/__init__.py +1 -1
- aws_cdk/_jsii/{aws-cdk-lib@2.216.0.jsii.tgz → aws-cdk-lib@2.218.0.jsii.tgz} +0 -0
- aws_cdk/aws_acmpca/__init__.py +1 -1
- aws_cdk/aws_amazonmq/__init__.py +87 -0
- aws_cdk/aws_amplify/__init__.py +8 -8
- aws_cdk/aws_apigateway/__init__.py +229 -6
- aws_cdk/aws_apigatewayv2/__init__.py +60 -2
- aws_cdk/aws_appconfig/__init__.py +145 -0
- aws_cdk/aws_appflow/__init__.py +116 -0
- aws_cdk/aws_appintegrations/__init__.py +116 -0
- aws_cdk/aws_appmesh/__init__.py +12 -12
- aws_cdk/aws_appstream/__init__.py +101 -4
- aws_cdk/aws_appsync/__init__.py +61 -3
- aws_cdk/aws_apptest/__init__.py +58 -0
- aws_cdk/aws_aps/__init__.py +459 -0
- aws_cdk/aws_athena/__init__.py +58 -0
- aws_cdk/aws_auditmanager/__init__.py +58 -0
- aws_cdk/aws_backup/__init__.py +145 -0
- aws_cdk/aws_batch/__init__.py +64 -2
- aws_cdk/aws_bedrock/__init__.py +277 -0
- aws_cdk/aws_bedrockagentcore/__init__.py +3178 -0
- aws_cdk/aws_cassandra/__init__.py +29 -0
- aws_cdk/aws_certificatemanager/__init__.py +38 -10
- aws_cdk/aws_cleanrooms/__init__.py +163 -0
- aws_cdk/aws_cloudformation/__init__.py +14 -14
- aws_cdk/aws_cloudfront/__init__.py +69 -8
- aws_cdk/aws_cloudfront_origins/__init__.py +87 -7
- aws_cdk/aws_cloudtrail/__init__.py +58 -0
- aws_cdk/aws_cloudwatch/__init__.py +145 -0
- aws_cdk/aws_codebuild/__init__.py +115 -12
- aws_cdk/aws_codedeploy/__init__.py +29 -0
- aws_cdk/aws_codeguruprofiler/__init__.py +58 -0
- aws_cdk/aws_codepipeline/__init__.py +29 -0
- aws_cdk/aws_cognito/__init__.py +89 -2
- aws_cdk/aws_config/__init__.py +58 -0
- aws_cdk/aws_connect/__init__.py +138 -10
- aws_cdk/aws_cur/__init__.py +86 -3
- aws_cdk/aws_customerprofiles/__init__.py +58 -0
- aws_cdk/aws_datapipeline/__init__.py +29 -0
- aws_cdk/aws_datasync/__init__.py +351 -0
- aws_cdk/aws_datazone/__init__.py +733 -2
- aws_cdk/aws_directoryservice/__init__.py +29 -0
- aws_cdk/aws_dms/__init__.py +58 -0
- aws_cdk/aws_docdb/__init__.py +153 -25
- aws_cdk/aws_dsql/__init__.py +29 -0
- aws_cdk/aws_dynamodb/__init__.py +181 -0
- aws_cdk/aws_ec2/__init__.py +2031 -10
- aws_cdk/aws_ecr/__init__.py +116 -0
- aws_cdk/aws_ecs/__init__.py +142 -12
- aws_cdk/aws_efs/__init__.py +116 -0
- aws_cdk/aws_eks/__init__.py +118 -0
- aws_cdk/aws_elasticache/__init__.py +261 -0
- aws_cdk/aws_elasticbeanstalk/__init__.py +29 -0
- aws_cdk/aws_elasticloadbalancingv2/__init__.py +48 -0
- aws_cdk/aws_elasticsearch/__init__.py +2 -2
- aws_cdk/aws_emr/__init__.py +87 -0
- aws_cdk/aws_emrcontainers/__init__.py +58 -0
- aws_cdk/aws_emrserverless/__init__.py +58 -0
- aws_cdk/aws_entityresolution/__init__.py +145 -0
- aws_cdk/aws_events/__init__.py +290 -0
- aws_cdk/aws_evs/__init__.py +58 -4
- aws_cdk/aws_finspace/__init__.py +58 -0
- aws_cdk/aws_gamelift/__init__.py +507 -56
- aws_cdk/aws_glue/__init__.py +145 -0
- aws_cdk/aws_greengrass/__init__.py +464 -0
- aws_cdk/aws_groundstation/__init__.py +87 -0
- aws_cdk/aws_guardduty/__init__.py +87 -0
- aws_cdk/aws_healthimaging/__init__.py +58 -0
- aws_cdk/aws_healthlake/__init__.py +29 -0
- aws_cdk/aws_iam/__init__.py +1 -1
- aws_cdk/aws_internetmonitor/__init__.py +58 -0
- aws_cdk/aws_iot/__init__.py +957 -0
- aws_cdk/aws_iotanalytics/__init__.py +116 -0
- aws_cdk/aws_iotcoredeviceadvisor/__init__.py +93 -38
- aws_cdk/aws_iotevents/__init__.py +87 -0
- aws_cdk/aws_iotfleethub/__init__.py +58 -0
- aws_cdk/aws_iotfleetwise/__init__.py +116 -0
- aws_cdk/aws_iotsitewise/__init__.py +568 -111
- aws_cdk/aws_iottwinmaker/__init__.py +145 -0
- aws_cdk/aws_iotwireless/__init__.py +464 -0
- aws_cdk/aws_kendra/__init__.py +116 -0
- aws_cdk/aws_kinesis/__init__.py +58 -0
- aws_cdk/aws_kinesisanalytics/__init__.py +31 -0
- aws_cdk/aws_kinesisanalyticsv2/__init__.py +29 -0
- aws_cdk/aws_kinesisfirehose/__init__.py +58 -0
- aws_cdk/aws_kinesisvideo/__init__.py +29 -0
- aws_cdk/aws_kms/__init__.py +68 -2
- aws_cdk/aws_lambda/__init__.py +104 -0
- aws_cdk/aws_lex/__init__.py +29 -0
- aws_cdk/aws_location/__init__.py +348 -0
- aws_cdk/aws_logs/__init__.py +232 -0
- aws_cdk/aws_lookoutequipment/__init__.py +29 -0
- aws_cdk/aws_lookoutvision/__init__.py +58 -0
- aws_cdk/aws_managedblockchain/__init__.py +145 -0
- aws_cdk/aws_medialive/__init__.py +562 -0
- aws_cdk/aws_mediapackage/__init__.py +2 -2
- aws_cdk/aws_mediatailor/__init__.py +174 -0
- aws_cdk/aws_memorydb/__init__.py +203 -0
- aws_cdk/aws_mwaa/__init__.py +58 -0
- aws_cdk/aws_networkfirewall/__init__.py +10 -10
- aws_cdk/aws_networkmanager/__init__.py +92 -0
- aws_cdk/aws_nimblestudio/__init__.py +29 -0
- aws_cdk/aws_odb/__init__.py +2082 -195
- aws_cdk/aws_omics/__init__.py +1520 -103
- aws_cdk/aws_opensearchserverless/__init__.py +222 -21
- aws_cdk/aws_opensearchservice/__init__.py +5 -4
- aws_cdk/aws_opsworks/__init__.py +29 -0
- aws_cdk/aws_opsworkscm/__init__.py +29 -0
- aws_cdk/aws_organizations/__init__.py +116 -0
- aws_cdk/aws_panorama/__init__.py +116 -0
- aws_cdk/aws_pcs/__init__.py +9 -9
- aws_cdk/aws_pinpoint/__init__.py +116 -0
- aws_cdk/aws_qbusiness/__init__.py +232 -0
- aws_cdk/aws_qldb/__init__.py +29 -0
- aws_cdk/aws_quicksight/__init__.py +295 -3
- aws_cdk/aws_rds/__init__.py +402 -58
- aws_cdk/aws_redshift/__init__.py +29 -0
- aws_cdk/aws_rekognition/__init__.py +87 -0
- aws_cdk/aws_resourcegroups/__init__.py +58 -0
- aws_cdk/aws_rolesanywhere/__init__.py +145 -0
- aws_cdk/aws_route53recoveryreadiness/__init__.py +58 -0
- aws_cdk/aws_route53resolver/__init__.py +29 -0
- aws_cdk/aws_s3/__init__.py +116 -0
- aws_cdk/aws_s3express/__init__.py +116 -0
- aws_cdk/aws_sagemaker/__init__.py +715 -1
- aws_cdk/aws_scheduler/__init__.py +29 -0
- aws_cdk/aws_secretsmanager/__init__.py +29 -0
- aws_cdk/aws_servicecatalog/__init__.py +191 -154
- aws_cdk/aws_servicecatalogappregistry/__init__.py +116 -0
- aws_cdk/aws_servicediscovery/__init__.py +58 -0
- aws_cdk/aws_ses/__init__.py +261 -0
- aws_cdk/aws_simspaceweaver/__init__.py +29 -0
- aws_cdk/aws_smsvoice/__init__.py +5218 -0
- aws_cdk/aws_ssm/__init__.py +87 -0
- aws_cdk/aws_synthetics/__init__.py +29 -0
- aws_cdk/aws_timestream/__init__.py +87 -0
- aws_cdk/aws_transfer/__init__.py +274 -12
- aws_cdk/aws_verifiedpermissions/__init__.py +59 -1
- aws_cdk/aws_voiceid/__init__.py +29 -0
- aws_cdk/aws_wisdom/__init__.py +232 -0
- aws_cdk/aws_workspaces/__init__.py +58 -0
- aws_cdk/aws_workspacesinstances/__init__.py +670 -2
- aws_cdk/aws_workspacesthinclient/__init__.py +58 -0
- aws_cdk/pipelines/__init__.py +5 -1
- {aws_cdk_lib-2.216.0.dist-info → aws_cdk_lib-2.218.0.dist-info}/METADATA +1 -1
- {aws_cdk_lib-2.216.0.dist-info → aws_cdk_lib-2.218.0.dist-info}/RECORD +151 -149
- {aws_cdk_lib-2.216.0.dist-info → aws_cdk_lib-2.218.0.dist-info}/LICENSE +0 -0
- {aws_cdk_lib-2.216.0.dist-info → aws_cdk_lib-2.218.0.dist-info}/NOTICE +0 -0
- {aws_cdk_lib-2.216.0.dist-info → aws_cdk_lib-2.218.0.dist-info}/WHEEL +0 -0
- {aws_cdk_lib-2.216.0.dist-info → aws_cdk_lib-2.218.0.dist-info}/top_level.txt +0 -0
|
@@ -950,7 +950,7 @@ class CfnTLSInspectionConfigurationProps:
|
|
|
950
950
|
) -> None:
|
|
951
951
|
'''Properties for defining a ``CfnTLSInspectionConfiguration``.
|
|
952
952
|
|
|
953
|
-
:param tls_inspection_configuration: The object that defines a TLS inspection configuration. AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using
|
|
953
|
+
:param tls_inspection_configuration: The object that defines a TLS inspection configuration. AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
|
|
954
954
|
:param tls_inspection_configuration_name: The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.
|
|
955
955
|
:param description: A description of the TLS inspection configuration.
|
|
956
956
|
:param tags: The key:value pairs to associate with the resource.
|
|
@@ -1025,7 +1025,7 @@ class CfnTLSInspectionConfigurationProps:
|
|
|
1025
1025
|
) -> typing.Union[_IResolvable_da3f097b, "CfnTLSInspectionConfiguration.TLSInspectionConfigurationProperty"]:
|
|
1026
1026
|
'''The object that defines a TLS inspection configuration.
|
|
1027
1027
|
|
|
1028
|
-
AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using
|
|
1028
|
+
AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
|
|
1029
1029
|
|
|
1030
1030
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-tlsinspectionconfiguration.html#cfn-networkfirewall-tlsinspectionconfiguration-tlsinspectionconfiguration
|
|
1031
1031
|
'''
|
|
@@ -6682,7 +6682,7 @@ class CfnTLSInspectionConfiguration(
|
|
|
6682
6682
|
'''
|
|
6683
6683
|
:param scope: Scope in which this resource is defined.
|
|
6684
6684
|
:param id: Construct identifier for this resource (unique in its scope).
|
|
6685
|
-
:param tls_inspection_configuration: The object that defines a TLS inspection configuration. AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using
|
|
6685
|
+
:param tls_inspection_configuration: The object that defines a TLS inspection configuration. AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
|
|
6686
6686
|
:param tls_inspection_configuration_name: The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.
|
|
6687
6687
|
:param description: A description of the TLS inspection configuration.
|
|
6688
6688
|
:param tags: The key:value pairs to associate with the resource.
|
|
@@ -7063,13 +7063,13 @@ class CfnTLSInspectionConfiguration(
|
|
|
7063
7063
|
scopes: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnTLSInspectionConfiguration.ServerCertificateScopeProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
7064
7064
|
server_certificates: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnTLSInspectionConfiguration.ServerCertificateProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
7065
7065
|
) -> None:
|
|
7066
|
-
'''Configures the
|
|
7066
|
+
'''Configures the Certificate Manager certificates and scope that Network Firewall uses to decrypt and re-encrypt traffic using a `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ . You can configure ``ServerCertificates`` for inbound SSL/TLS inspection, a ``CertificateAuthorityArn`` for outbound SSL/TLS inspection, or both. For information about working with certificates for TLS inspection, see `Using SSL/TLS server certficiates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* .
|
|
7067
7067
|
|
|
7068
7068
|
.. epigraph::
|
|
7069
7069
|
|
|
7070
7070
|
If a server certificate that's associated with your `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ is revoked, deleted, or expired it can result in client-side TLS errors.
|
|
7071
7071
|
|
|
7072
|
-
:param certificate_authority_arn: The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within
|
|
7072
|
+
:param certificate_authority_arn: The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within Certificate Manager (ACM) to use for outbound SSL/TLS inspection. The following limitations apply: - You can use CA certificates that you imported into ACM, but you can't generate CA certificates with ACM. - You can't use certificates issued by AWS Private Certificate Authority . For more information about configuring certificates for outbound inspection, see `Using SSL/TLS certificates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* . For information about working with certificates in ACM, see `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *Certificate Manager User Guide* .
|
|
7073
7073
|
:param check_certificate_revocation_status: When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status. If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-servercertificateconfiguration.html>`_ .
|
|
7074
7074
|
:param scopes: A list of scopes.
|
|
7075
7075
|
:param server_certificates: The list of server certificates to use for inbound SSL/TLS inspection.
|
|
@@ -7129,7 +7129,7 @@ class CfnTLSInspectionConfiguration(
|
|
|
7129
7129
|
|
|
7130
7130
|
@builtins.property
|
|
7131
7131
|
def certificate_authority_arn(self) -> typing.Optional[builtins.str]:
|
|
7132
|
-
'''The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within
|
|
7132
|
+
'''The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within Certificate Manager (ACM) to use for outbound SSL/TLS inspection.
|
|
7133
7133
|
|
|
7134
7134
|
The following limitations apply:
|
|
7135
7135
|
|
|
@@ -7138,7 +7138,7 @@ class CfnTLSInspectionConfiguration(
|
|
|
7138
7138
|
|
|
7139
7139
|
For more information about configuring certificates for outbound inspection, see `Using SSL/TLS certificates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* .
|
|
7140
7140
|
|
|
7141
|
-
For information about working with certificates in ACM, see `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *
|
|
7141
|
+
For information about working with certificates in ACM, see `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *Certificate Manager User Guide* .
|
|
7142
7142
|
|
|
7143
7143
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration.html#cfn-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration-certificateauthorityarn
|
|
7144
7144
|
'''
|
|
@@ -7202,9 +7202,9 @@ class CfnTLSInspectionConfiguration(
|
|
|
7202
7202
|
*,
|
|
7203
7203
|
resource_arn: typing.Optional[builtins.str] = None,
|
|
7204
7204
|
) -> None:
|
|
7205
|
-
'''Any
|
|
7205
|
+
'''Any Certificate Manager (ACM) Secure Sockets Layer/Transport Layer Security (SSL/TLS) server certificate that's associated with a `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration.html>`_ . Used in a `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ for inspection of inbound traffic to your firewall. You must request or import a SSL/TLS certificate into ACM for each domain Network Firewall needs to decrypt and inspect. AWS Network Firewall uses the SSL/TLS certificates to decrypt specified inbound SSL/TLS traffic going to your firewall. For information about working with certificates in Certificate Manager , see `Request a public certificate <https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-request-public.html>`_ or `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *Certificate Manager User Guide* .
|
|
7206
7206
|
|
|
7207
|
-
:param resource_arn: The Amazon Resource Name (ARN) of the
|
|
7207
|
+
:param resource_arn: The Amazon Resource Name (ARN) of the Certificate Manager SSL/TLS server certificate that's used for inbound SSL/TLS inspection.
|
|
7208
7208
|
|
|
7209
7209
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificate.html
|
|
7210
7210
|
:exampleMetadata: fixture=_generated
|
|
@@ -7228,7 +7228,7 @@ class CfnTLSInspectionConfiguration(
|
|
|
7228
7228
|
|
|
7229
7229
|
@builtins.property
|
|
7230
7230
|
def resource_arn(self) -> typing.Optional[builtins.str]:
|
|
7231
|
-
'''The Amazon Resource Name (ARN) of the
|
|
7231
|
+
'''The Amazon Resource Name (ARN) of the Certificate Manager SSL/TLS server certificate that's used for inbound SSL/TLS inspection.
|
|
7232
7232
|
|
|
7233
7233
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificate.html#cfn-networkfirewall-tlsinspectionconfiguration-servercertificate-resourcearn
|
|
7234
7234
|
'''
|
|
@@ -3986,6 +3986,15 @@ class CfnConnectAttachment(
|
|
|
3986
3986
|
'''
|
|
3987
3987
|
return typing.cast(builtins.str, jsii.get(self, "attrCreatedAt"))
|
|
3988
3988
|
|
|
3989
|
+
@builtins.property
|
|
3990
|
+
@jsii.member(jsii_name="attrLastModificationErrors")
|
|
3991
|
+
def attr_last_modification_errors(self) -> typing.List[builtins.str]:
|
|
3992
|
+
'''Errors from the last modification of the attachment.
|
|
3993
|
+
|
|
3994
|
+
:cloudformationAttribute: LastModificationErrors
|
|
3995
|
+
'''
|
|
3996
|
+
return typing.cast(typing.List[builtins.str], jsii.get(self, "attrLastModificationErrors"))
|
|
3997
|
+
|
|
3989
3998
|
@builtins.property
|
|
3990
3999
|
@jsii.member(jsii_name="attrOwnerAccountId")
|
|
3991
4000
|
def attr_owner_account_id(self) -> builtins.str:
|
|
@@ -4599,6 +4608,15 @@ class CfnConnectPeer(
|
|
|
4599
4608
|
'''
|
|
4600
4609
|
return typing.cast(builtins.str, jsii.get(self, "attrEdgeLocation"))
|
|
4601
4610
|
|
|
4611
|
+
@builtins.property
|
|
4612
|
+
@jsii.member(jsii_name="attrLastModificationErrors")
|
|
4613
|
+
def attr_last_modification_errors(self) -> typing.List[builtins.str]:
|
|
4614
|
+
'''Describes the error associated with the attachment request.
|
|
4615
|
+
|
|
4616
|
+
:cloudformationAttribute: LastModificationErrors
|
|
4617
|
+
'''
|
|
4618
|
+
return typing.cast(typing.List[builtins.str], jsii.get(self, "attrLastModificationErrors"))
|
|
4619
|
+
|
|
4602
4620
|
@builtins.property
|
|
4603
4621
|
@jsii.member(jsii_name="attrState")
|
|
4604
4622
|
def attr_state(self) -> builtins.str:
|
|
@@ -6391,6 +6409,15 @@ class CfnDirectConnectGatewayAttachment(
|
|
|
6391
6409
|
'''
|
|
6392
6410
|
return typing.cast(builtins.str, jsii.get(self, "attrCreatedAt"))
|
|
6393
6411
|
|
|
6412
|
+
@builtins.property
|
|
6413
|
+
@jsii.member(jsii_name="attrLastModificationErrors")
|
|
6414
|
+
def attr_last_modification_errors(self) -> typing.List[builtins.str]:
|
|
6415
|
+
'''Errors from the last modification of the attachment.
|
|
6416
|
+
|
|
6417
|
+
:cloudformationAttribute: LastModificationErrors
|
|
6418
|
+
'''
|
|
6419
|
+
return typing.cast(typing.List[builtins.str], jsii.get(self, "attrLastModificationErrors"))
|
|
6420
|
+
|
|
6394
6421
|
@builtins.property
|
|
6395
6422
|
@jsii.member(jsii_name="attrNetworkFunctionGroupName")
|
|
6396
6423
|
def attr_network_function_group_name(self) -> builtins.str:
|
|
@@ -7854,6 +7881,15 @@ class CfnSiteToSiteVpnAttachment(
|
|
|
7854
7881
|
'''
|
|
7855
7882
|
return typing.cast(builtins.str, jsii.get(self, "attrEdgeLocation"))
|
|
7856
7883
|
|
|
7884
|
+
@builtins.property
|
|
7885
|
+
@jsii.member(jsii_name="attrLastModificationErrors")
|
|
7886
|
+
def attr_last_modification_errors(self) -> typing.List[builtins.str]:
|
|
7887
|
+
'''Errors from the last modification of the attachment.
|
|
7888
|
+
|
|
7889
|
+
:cloudformationAttribute: LastModificationErrors
|
|
7890
|
+
'''
|
|
7891
|
+
return typing.cast(typing.List[builtins.str], jsii.get(self, "attrLastModificationErrors"))
|
|
7892
|
+
|
|
7857
7893
|
@builtins.property
|
|
7858
7894
|
@jsii.member(jsii_name="attrOwnerAccountId")
|
|
7859
7895
|
def attr_owner_account_id(self) -> builtins.str:
|
|
@@ -8308,6 +8344,15 @@ class CfnTransitGatewayPeering(
|
|
|
8308
8344
|
'''
|
|
8309
8345
|
return typing.cast(builtins.str, jsii.get(self, "attrEdgeLocation"))
|
|
8310
8346
|
|
|
8347
|
+
@builtins.property
|
|
8348
|
+
@jsii.member(jsii_name="attrLastModificationErrors")
|
|
8349
|
+
def attr_last_modification_errors(self) -> typing.List[builtins.str]:
|
|
8350
|
+
'''Errors from the last modification of the transit gateway peering.
|
|
8351
|
+
|
|
8352
|
+
:cloudformationAttribute: LastModificationErrors
|
|
8353
|
+
'''
|
|
8354
|
+
return typing.cast(typing.List[builtins.str], jsii.get(self, "attrLastModificationErrors"))
|
|
8355
|
+
|
|
8311
8356
|
@builtins.property
|
|
8312
8357
|
@jsii.member(jsii_name="attrOwnerAccountId")
|
|
8313
8358
|
def attr_owner_account_id(self) -> builtins.str:
|
|
@@ -8721,6 +8766,15 @@ class CfnTransitGatewayRouteTableAttachment(
|
|
|
8721
8766
|
'''
|
|
8722
8767
|
return typing.cast(builtins.str, jsii.get(self, "attrEdgeLocation"))
|
|
8723
8768
|
|
|
8769
|
+
@builtins.property
|
|
8770
|
+
@jsii.member(jsii_name="attrLastModificationErrors")
|
|
8771
|
+
def attr_last_modification_errors(self) -> typing.List[builtins.str]:
|
|
8772
|
+
'''Errors from the last modification of the attachment.
|
|
8773
|
+
|
|
8774
|
+
:cloudformationAttribute: LastModificationErrors
|
|
8775
|
+
'''
|
|
8776
|
+
return typing.cast(typing.List[builtins.str], jsii.get(self, "attrLastModificationErrors"))
|
|
8777
|
+
|
|
8724
8778
|
@builtins.property
|
|
8725
8779
|
@jsii.member(jsii_name="attrOwnerAccountId")
|
|
8726
8780
|
def attr_owner_account_id(self) -> builtins.str:
|
|
@@ -9155,6 +9209,27 @@ class CfnVpcAttachment(
|
|
|
9155
9209
|
|
|
9156
9210
|
jsii.create(self.__class__, self, [scope, id, props])
|
|
9157
9211
|
|
|
9212
|
+
@jsii.member(jsii_name="fromAttachmentId")
|
|
9213
|
+
@builtins.classmethod
|
|
9214
|
+
def from_attachment_id(
|
|
9215
|
+
cls,
|
|
9216
|
+
scope: _constructs_77d1e7e8.Construct,
|
|
9217
|
+
id: builtins.str,
|
|
9218
|
+
attachment_id: builtins.str,
|
|
9219
|
+
) -> IVpcAttachmentRef:
|
|
9220
|
+
'''Creates a new IVpcAttachmentRef from a attachmentId.
|
|
9221
|
+
|
|
9222
|
+
:param scope: -
|
|
9223
|
+
:param id: -
|
|
9224
|
+
:param attachment_id: -
|
|
9225
|
+
'''
|
|
9226
|
+
if __debug__:
|
|
9227
|
+
type_hints = typing.get_type_hints(_typecheckingstub__5a9cbfd55c4f0f5e8645015279c1b35386da05b3099b1496eadec4750792fd9d)
|
|
9228
|
+
check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
|
|
9229
|
+
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
9230
|
+
check_type(argname="argument attachment_id", value=attachment_id, expected_type=type_hints["attachment_id"])
|
|
9231
|
+
return typing.cast(IVpcAttachmentRef, jsii.sinvoke(cls, "fromAttachmentId", [scope, id, attachment_id]))
|
|
9232
|
+
|
|
9158
9233
|
@jsii.member(jsii_name="inspect")
|
|
9159
9234
|
def inspect(self, inspector: _TreeInspector_488e0dd5) -> None:
|
|
9160
9235
|
'''Examines the CloudFormation resource and discloses attributes.
|
|
@@ -9241,6 +9316,15 @@ class CfnVpcAttachment(
|
|
|
9241
9316
|
'''
|
|
9242
9317
|
return typing.cast(builtins.str, jsii.get(self, "attrEdgeLocation"))
|
|
9243
9318
|
|
|
9319
|
+
@builtins.property
|
|
9320
|
+
@jsii.member(jsii_name="attrLastModificationErrors")
|
|
9321
|
+
def attr_last_modification_errors(self) -> typing.List[builtins.str]:
|
|
9322
|
+
'''Errors from the last modification of the attachment.
|
|
9323
|
+
|
|
9324
|
+
:cloudformationAttribute: LastModificationErrors
|
|
9325
|
+
'''
|
|
9326
|
+
return typing.cast(typing.List[builtins.str], jsii.get(self, "attrLastModificationErrors"))
|
|
9327
|
+
|
|
9244
9328
|
@builtins.property
|
|
9245
9329
|
@jsii.member(jsii_name="attrNetworkFunctionGroupName")
|
|
9246
9330
|
def attr_network_function_group_name(self) -> builtins.str:
|
|
@@ -11074,6 +11158,14 @@ def _typecheckingstub__962ef8273d6d2d97a33b00603b7bf87793fdecfaae4031352d9cbc1bc
|
|
|
11074
11158
|
"""Type checking stubs"""
|
|
11075
11159
|
pass
|
|
11076
11160
|
|
|
11161
|
+
def _typecheckingstub__5a9cbfd55c4f0f5e8645015279c1b35386da05b3099b1496eadec4750792fd9d(
|
|
11162
|
+
scope: _constructs_77d1e7e8.Construct,
|
|
11163
|
+
id: builtins.str,
|
|
11164
|
+
attachment_id: builtins.str,
|
|
11165
|
+
) -> None:
|
|
11166
|
+
"""Type checking stubs"""
|
|
11167
|
+
pass
|
|
11168
|
+
|
|
11077
11169
|
def _typecheckingstub__066721874248356323b7edc6b2c638d14ec9d95fc08966f64139e05c40164db7(
|
|
11078
11170
|
inspector: _TreeInspector_488e0dd5,
|
|
11079
11171
|
) -> None:
|
|
@@ -2221,6 +2221,27 @@ class CfnStudio(
|
|
|
2221
2221
|
|
|
2222
2222
|
jsii.create(self.__class__, self, [scope, id, props])
|
|
2223
2223
|
|
|
2224
|
+
@jsii.member(jsii_name="fromStudioId")
|
|
2225
|
+
@builtins.classmethod
|
|
2226
|
+
def from_studio_id(
|
|
2227
|
+
cls,
|
|
2228
|
+
scope: _constructs_77d1e7e8.Construct,
|
|
2229
|
+
id: builtins.str,
|
|
2230
|
+
studio_id: builtins.str,
|
|
2231
|
+
) -> IStudioRef:
|
|
2232
|
+
'''Creates a new IStudioRef from a studioId.
|
|
2233
|
+
|
|
2234
|
+
:param scope: -
|
|
2235
|
+
:param id: -
|
|
2236
|
+
:param studio_id: -
|
|
2237
|
+
'''
|
|
2238
|
+
if __debug__:
|
|
2239
|
+
type_hints = typing.get_type_hints(_typecheckingstub__bd2bf748ce8156650a8f97cdc57655ec8a309bab4bf87feae2916f958649aee9)
|
|
2240
|
+
check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
|
|
2241
|
+
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
2242
|
+
check_type(argname="argument studio_id", value=studio_id, expected_type=type_hints["studio_id"])
|
|
2243
|
+
return typing.cast(IStudioRef, jsii.sinvoke(cls, "fromStudioId", [scope, id, studio_id]))
|
|
2244
|
+
|
|
2224
2245
|
@jsii.member(jsii_name="inspect")
|
|
2225
2246
|
def inspect(self, inspector: _TreeInspector_488e0dd5) -> None:
|
|
2226
2247
|
'''Examines the CloudFormation resource and discloses attributes.
|
|
@@ -3733,6 +3754,14 @@ def _typecheckingstub__45420baa577c3a8eb786b8d20404bcbc5573494502885eb1f55a89702
|
|
|
3733
3754
|
"""Type checking stubs"""
|
|
3734
3755
|
pass
|
|
3735
3756
|
|
|
3757
|
+
def _typecheckingstub__bd2bf748ce8156650a8f97cdc57655ec8a309bab4bf87feae2916f958649aee9(
|
|
3758
|
+
scope: _constructs_77d1e7e8.Construct,
|
|
3759
|
+
id: builtins.str,
|
|
3760
|
+
studio_id: builtins.str,
|
|
3761
|
+
) -> None:
|
|
3762
|
+
"""Type checking stubs"""
|
|
3763
|
+
pass
|
|
3764
|
+
|
|
3736
3765
|
def _typecheckingstub__a95feb38c2ffd266287aa8d0e3539b938c3d8fffe708542e910fcb088e43f36e(
|
|
3737
3766
|
inspector: _TreeInspector_488e0dd5,
|
|
3738
3767
|
) -> None:
|