aws-cdk-lib 2.216.0__py3-none-any.whl → 2.218.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk-lib might be problematic. Click here for more details.

Files changed (151) hide show
  1. aws_cdk/__init__.py +60 -28
  2. aws_cdk/_jsii/__init__.py +1 -1
  3. aws_cdk/_jsii/{aws-cdk-lib@2.216.0.jsii.tgz → aws-cdk-lib@2.218.0.jsii.tgz} +0 -0
  4. aws_cdk/aws_acmpca/__init__.py +1 -1
  5. aws_cdk/aws_amazonmq/__init__.py +87 -0
  6. aws_cdk/aws_amplify/__init__.py +8 -8
  7. aws_cdk/aws_apigateway/__init__.py +229 -6
  8. aws_cdk/aws_apigatewayv2/__init__.py +60 -2
  9. aws_cdk/aws_appconfig/__init__.py +145 -0
  10. aws_cdk/aws_appflow/__init__.py +116 -0
  11. aws_cdk/aws_appintegrations/__init__.py +116 -0
  12. aws_cdk/aws_appmesh/__init__.py +12 -12
  13. aws_cdk/aws_appstream/__init__.py +101 -4
  14. aws_cdk/aws_appsync/__init__.py +61 -3
  15. aws_cdk/aws_apptest/__init__.py +58 -0
  16. aws_cdk/aws_aps/__init__.py +459 -0
  17. aws_cdk/aws_athena/__init__.py +58 -0
  18. aws_cdk/aws_auditmanager/__init__.py +58 -0
  19. aws_cdk/aws_backup/__init__.py +145 -0
  20. aws_cdk/aws_batch/__init__.py +64 -2
  21. aws_cdk/aws_bedrock/__init__.py +277 -0
  22. aws_cdk/aws_bedrockagentcore/__init__.py +3178 -0
  23. aws_cdk/aws_cassandra/__init__.py +29 -0
  24. aws_cdk/aws_certificatemanager/__init__.py +38 -10
  25. aws_cdk/aws_cleanrooms/__init__.py +163 -0
  26. aws_cdk/aws_cloudformation/__init__.py +14 -14
  27. aws_cdk/aws_cloudfront/__init__.py +69 -8
  28. aws_cdk/aws_cloudfront_origins/__init__.py +87 -7
  29. aws_cdk/aws_cloudtrail/__init__.py +58 -0
  30. aws_cdk/aws_cloudwatch/__init__.py +145 -0
  31. aws_cdk/aws_codebuild/__init__.py +115 -12
  32. aws_cdk/aws_codedeploy/__init__.py +29 -0
  33. aws_cdk/aws_codeguruprofiler/__init__.py +58 -0
  34. aws_cdk/aws_codepipeline/__init__.py +29 -0
  35. aws_cdk/aws_cognito/__init__.py +89 -2
  36. aws_cdk/aws_config/__init__.py +58 -0
  37. aws_cdk/aws_connect/__init__.py +138 -10
  38. aws_cdk/aws_cur/__init__.py +86 -3
  39. aws_cdk/aws_customerprofiles/__init__.py +58 -0
  40. aws_cdk/aws_datapipeline/__init__.py +29 -0
  41. aws_cdk/aws_datasync/__init__.py +351 -0
  42. aws_cdk/aws_datazone/__init__.py +733 -2
  43. aws_cdk/aws_directoryservice/__init__.py +29 -0
  44. aws_cdk/aws_dms/__init__.py +58 -0
  45. aws_cdk/aws_docdb/__init__.py +153 -25
  46. aws_cdk/aws_dsql/__init__.py +29 -0
  47. aws_cdk/aws_dynamodb/__init__.py +181 -0
  48. aws_cdk/aws_ec2/__init__.py +2031 -10
  49. aws_cdk/aws_ecr/__init__.py +116 -0
  50. aws_cdk/aws_ecs/__init__.py +142 -12
  51. aws_cdk/aws_efs/__init__.py +116 -0
  52. aws_cdk/aws_eks/__init__.py +118 -0
  53. aws_cdk/aws_elasticache/__init__.py +261 -0
  54. aws_cdk/aws_elasticbeanstalk/__init__.py +29 -0
  55. aws_cdk/aws_elasticloadbalancingv2/__init__.py +48 -0
  56. aws_cdk/aws_elasticsearch/__init__.py +2 -2
  57. aws_cdk/aws_emr/__init__.py +87 -0
  58. aws_cdk/aws_emrcontainers/__init__.py +58 -0
  59. aws_cdk/aws_emrserverless/__init__.py +58 -0
  60. aws_cdk/aws_entityresolution/__init__.py +145 -0
  61. aws_cdk/aws_events/__init__.py +290 -0
  62. aws_cdk/aws_evs/__init__.py +58 -4
  63. aws_cdk/aws_finspace/__init__.py +58 -0
  64. aws_cdk/aws_gamelift/__init__.py +507 -56
  65. aws_cdk/aws_glue/__init__.py +145 -0
  66. aws_cdk/aws_greengrass/__init__.py +464 -0
  67. aws_cdk/aws_groundstation/__init__.py +87 -0
  68. aws_cdk/aws_guardduty/__init__.py +87 -0
  69. aws_cdk/aws_healthimaging/__init__.py +58 -0
  70. aws_cdk/aws_healthlake/__init__.py +29 -0
  71. aws_cdk/aws_iam/__init__.py +1 -1
  72. aws_cdk/aws_internetmonitor/__init__.py +58 -0
  73. aws_cdk/aws_iot/__init__.py +957 -0
  74. aws_cdk/aws_iotanalytics/__init__.py +116 -0
  75. aws_cdk/aws_iotcoredeviceadvisor/__init__.py +93 -38
  76. aws_cdk/aws_iotevents/__init__.py +87 -0
  77. aws_cdk/aws_iotfleethub/__init__.py +58 -0
  78. aws_cdk/aws_iotfleetwise/__init__.py +116 -0
  79. aws_cdk/aws_iotsitewise/__init__.py +568 -111
  80. aws_cdk/aws_iottwinmaker/__init__.py +145 -0
  81. aws_cdk/aws_iotwireless/__init__.py +464 -0
  82. aws_cdk/aws_kendra/__init__.py +116 -0
  83. aws_cdk/aws_kinesis/__init__.py +58 -0
  84. aws_cdk/aws_kinesisanalytics/__init__.py +31 -0
  85. aws_cdk/aws_kinesisanalyticsv2/__init__.py +29 -0
  86. aws_cdk/aws_kinesisfirehose/__init__.py +58 -0
  87. aws_cdk/aws_kinesisvideo/__init__.py +29 -0
  88. aws_cdk/aws_kms/__init__.py +68 -2
  89. aws_cdk/aws_lambda/__init__.py +104 -0
  90. aws_cdk/aws_lex/__init__.py +29 -0
  91. aws_cdk/aws_location/__init__.py +348 -0
  92. aws_cdk/aws_logs/__init__.py +232 -0
  93. aws_cdk/aws_lookoutequipment/__init__.py +29 -0
  94. aws_cdk/aws_lookoutvision/__init__.py +58 -0
  95. aws_cdk/aws_managedblockchain/__init__.py +145 -0
  96. aws_cdk/aws_medialive/__init__.py +562 -0
  97. aws_cdk/aws_mediapackage/__init__.py +2 -2
  98. aws_cdk/aws_mediatailor/__init__.py +174 -0
  99. aws_cdk/aws_memorydb/__init__.py +203 -0
  100. aws_cdk/aws_mwaa/__init__.py +58 -0
  101. aws_cdk/aws_networkfirewall/__init__.py +10 -10
  102. aws_cdk/aws_networkmanager/__init__.py +92 -0
  103. aws_cdk/aws_nimblestudio/__init__.py +29 -0
  104. aws_cdk/aws_odb/__init__.py +2082 -195
  105. aws_cdk/aws_omics/__init__.py +1520 -103
  106. aws_cdk/aws_opensearchserverless/__init__.py +222 -21
  107. aws_cdk/aws_opensearchservice/__init__.py +5 -4
  108. aws_cdk/aws_opsworks/__init__.py +29 -0
  109. aws_cdk/aws_opsworkscm/__init__.py +29 -0
  110. aws_cdk/aws_organizations/__init__.py +116 -0
  111. aws_cdk/aws_panorama/__init__.py +116 -0
  112. aws_cdk/aws_pcs/__init__.py +9 -9
  113. aws_cdk/aws_pinpoint/__init__.py +116 -0
  114. aws_cdk/aws_qbusiness/__init__.py +232 -0
  115. aws_cdk/aws_qldb/__init__.py +29 -0
  116. aws_cdk/aws_quicksight/__init__.py +295 -3
  117. aws_cdk/aws_rds/__init__.py +402 -58
  118. aws_cdk/aws_redshift/__init__.py +29 -0
  119. aws_cdk/aws_rekognition/__init__.py +87 -0
  120. aws_cdk/aws_resourcegroups/__init__.py +58 -0
  121. aws_cdk/aws_rolesanywhere/__init__.py +145 -0
  122. aws_cdk/aws_route53recoveryreadiness/__init__.py +58 -0
  123. aws_cdk/aws_route53resolver/__init__.py +29 -0
  124. aws_cdk/aws_s3/__init__.py +116 -0
  125. aws_cdk/aws_s3express/__init__.py +116 -0
  126. aws_cdk/aws_sagemaker/__init__.py +715 -1
  127. aws_cdk/aws_scheduler/__init__.py +29 -0
  128. aws_cdk/aws_secretsmanager/__init__.py +29 -0
  129. aws_cdk/aws_servicecatalog/__init__.py +191 -154
  130. aws_cdk/aws_servicecatalogappregistry/__init__.py +116 -0
  131. aws_cdk/aws_servicediscovery/__init__.py +58 -0
  132. aws_cdk/aws_ses/__init__.py +261 -0
  133. aws_cdk/aws_simspaceweaver/__init__.py +29 -0
  134. aws_cdk/aws_smsvoice/__init__.py +5218 -0
  135. aws_cdk/aws_ssm/__init__.py +87 -0
  136. aws_cdk/aws_synthetics/__init__.py +29 -0
  137. aws_cdk/aws_timestream/__init__.py +87 -0
  138. aws_cdk/aws_transfer/__init__.py +274 -12
  139. aws_cdk/aws_verifiedpermissions/__init__.py +59 -1
  140. aws_cdk/aws_voiceid/__init__.py +29 -0
  141. aws_cdk/aws_wisdom/__init__.py +232 -0
  142. aws_cdk/aws_workspaces/__init__.py +58 -0
  143. aws_cdk/aws_workspacesinstances/__init__.py +670 -2
  144. aws_cdk/aws_workspacesthinclient/__init__.py +58 -0
  145. aws_cdk/pipelines/__init__.py +5 -1
  146. {aws_cdk_lib-2.216.0.dist-info → aws_cdk_lib-2.218.0.dist-info}/METADATA +1 -1
  147. {aws_cdk_lib-2.216.0.dist-info → aws_cdk_lib-2.218.0.dist-info}/RECORD +151 -149
  148. {aws_cdk_lib-2.216.0.dist-info → aws_cdk_lib-2.218.0.dist-info}/LICENSE +0 -0
  149. {aws_cdk_lib-2.216.0.dist-info → aws_cdk_lib-2.218.0.dist-info}/NOTICE +0 -0
  150. {aws_cdk_lib-2.216.0.dist-info → aws_cdk_lib-2.218.0.dist-info}/WHEEL +0 -0
  151. {aws_cdk_lib-2.216.0.dist-info → aws_cdk_lib-2.218.0.dist-info}/top_level.txt +0 -0
@@ -950,7 +950,7 @@ class CfnTLSInspectionConfigurationProps:
950
950
  ) -> None:
951
951
  '''Properties for defining a ``CfnTLSInspectionConfiguration``.
952
952
 
953
- :param tls_inspection_configuration: The object that defines a TLS inspection configuration. AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using AWS Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
953
+ :param tls_inspection_configuration: The object that defines a TLS inspection configuration. AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
954
954
  :param tls_inspection_configuration_name: The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.
955
955
  :param description: A description of the TLS inspection configuration.
956
956
  :param tags: The key:value pairs to associate with the resource.
@@ -1025,7 +1025,7 @@ class CfnTLSInspectionConfigurationProps:
1025
1025
  ) -> typing.Union[_IResolvable_da3f097b, "CfnTLSInspectionConfiguration.TLSInspectionConfigurationProperty"]:
1026
1026
  '''The object that defines a TLS inspection configuration.
1027
1027
 
1028
- AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using AWS Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
1028
+ AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
1029
1029
 
1030
1030
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-tlsinspectionconfiguration.html#cfn-networkfirewall-tlsinspectionconfiguration-tlsinspectionconfiguration
1031
1031
  '''
@@ -6682,7 +6682,7 @@ class CfnTLSInspectionConfiguration(
6682
6682
  '''
6683
6683
  :param scope: Scope in which this resource is defined.
6684
6684
  :param id: Construct identifier for this resource (unique in its scope).
6685
- :param tls_inspection_configuration: The object that defines a TLS inspection configuration. AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using AWS Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
6685
+ :param tls_inspection_configuration: The object that defines a TLS inspection configuration. AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
6686
6686
  :param tls_inspection_configuration_name: The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.
6687
6687
  :param description: A description of the TLS inspection configuration.
6688
6688
  :param tags: The key:value pairs to associate with the resource.
@@ -7063,13 +7063,13 @@ class CfnTLSInspectionConfiguration(
7063
7063
  scopes: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnTLSInspectionConfiguration.ServerCertificateScopeProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
7064
7064
  server_certificates: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnTLSInspectionConfiguration.ServerCertificateProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
7065
7065
  ) -> None:
7066
- '''Configures the AWS Certificate Manager certificates and scope that Network Firewall uses to decrypt and re-encrypt traffic using a `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ . You can configure ``ServerCertificates`` for inbound SSL/TLS inspection, a ``CertificateAuthorityArn`` for outbound SSL/TLS inspection, or both. For information about working with certificates for TLS inspection, see `Using SSL/TLS server certficiates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* .
7066
+ '''Configures the Certificate Manager certificates and scope that Network Firewall uses to decrypt and re-encrypt traffic using a `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ . You can configure ``ServerCertificates`` for inbound SSL/TLS inspection, a ``CertificateAuthorityArn`` for outbound SSL/TLS inspection, or both. For information about working with certificates for TLS inspection, see `Using SSL/TLS server certficiates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* .
7067
7067
 
7068
7068
  .. epigraph::
7069
7069
 
7070
7070
  If a server certificate that's associated with your `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ is revoked, deleted, or expired it can result in client-side TLS errors.
7071
7071
 
7072
- :param certificate_authority_arn: The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within AWS Certificate Manager (ACM) to use for outbound SSL/TLS inspection. The following limitations apply: - You can use CA certificates that you imported into ACM, but you can't generate CA certificates with ACM. - You can't use certificates issued by AWS Private Certificate Authority . For more information about configuring certificates for outbound inspection, see `Using SSL/TLS certificates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* . For information about working with certificates in ACM, see `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *AWS Certificate Manager User Guide* .
7072
+ :param certificate_authority_arn: The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within Certificate Manager (ACM) to use for outbound SSL/TLS inspection. The following limitations apply: - You can use CA certificates that you imported into ACM, but you can't generate CA certificates with ACM. - You can't use certificates issued by AWS Private Certificate Authority . For more information about configuring certificates for outbound inspection, see `Using SSL/TLS certificates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* . For information about working with certificates in ACM, see `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *Certificate Manager User Guide* .
7073
7073
  :param check_certificate_revocation_status: When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status. If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-servercertificateconfiguration.html>`_ .
7074
7074
  :param scopes: A list of scopes.
7075
7075
  :param server_certificates: The list of server certificates to use for inbound SSL/TLS inspection.
@@ -7129,7 +7129,7 @@ class CfnTLSInspectionConfiguration(
7129
7129
 
7130
7130
  @builtins.property
7131
7131
  def certificate_authority_arn(self) -> typing.Optional[builtins.str]:
7132
- '''The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within AWS Certificate Manager (ACM) to use for outbound SSL/TLS inspection.
7132
+ '''The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within Certificate Manager (ACM) to use for outbound SSL/TLS inspection.
7133
7133
 
7134
7134
  The following limitations apply:
7135
7135
 
@@ -7138,7 +7138,7 @@ class CfnTLSInspectionConfiguration(
7138
7138
 
7139
7139
  For more information about configuring certificates for outbound inspection, see `Using SSL/TLS certificates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* .
7140
7140
 
7141
- For information about working with certificates in ACM, see `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *AWS Certificate Manager User Guide* .
7141
+ For information about working with certificates in ACM, see `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *Certificate Manager User Guide* .
7142
7142
 
7143
7143
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration.html#cfn-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration-certificateauthorityarn
7144
7144
  '''
@@ -7202,9 +7202,9 @@ class CfnTLSInspectionConfiguration(
7202
7202
  *,
7203
7203
  resource_arn: typing.Optional[builtins.str] = None,
7204
7204
  ) -> None:
7205
- '''Any AWS Certificate Manager (ACM) Secure Sockets Layer/Transport Layer Security (SSL/TLS) server certificate that's associated with a `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration.html>`_ . Used in a `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ for inspection of inbound traffic to your firewall. You must request or import a SSL/TLS certificate into ACM for each domain Network Firewall needs to decrypt and inspect. AWS Network Firewall uses the SSL/TLS certificates to decrypt specified inbound SSL/TLS traffic going to your firewall. For information about working with certificates in AWS Certificate Manager , see `Request a public certificate <https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-request-public.html>`_ or `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *AWS Certificate Manager User Guide* .
7205
+ '''Any Certificate Manager (ACM) Secure Sockets Layer/Transport Layer Security (SSL/TLS) server certificate that's associated with a `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration.html>`_ . Used in a `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ for inspection of inbound traffic to your firewall. You must request or import a SSL/TLS certificate into ACM for each domain Network Firewall needs to decrypt and inspect. AWS Network Firewall uses the SSL/TLS certificates to decrypt specified inbound SSL/TLS traffic going to your firewall. For information about working with certificates in Certificate Manager , see `Request a public certificate <https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-request-public.html>`_ or `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *Certificate Manager User Guide* .
7206
7206
 
7207
- :param resource_arn: The Amazon Resource Name (ARN) of the AWS Certificate Manager SSL/TLS server certificate that's used for inbound SSL/TLS inspection.
7207
+ :param resource_arn: The Amazon Resource Name (ARN) of the Certificate Manager SSL/TLS server certificate that's used for inbound SSL/TLS inspection.
7208
7208
 
7209
7209
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificate.html
7210
7210
  :exampleMetadata: fixture=_generated
@@ -7228,7 +7228,7 @@ class CfnTLSInspectionConfiguration(
7228
7228
 
7229
7229
  @builtins.property
7230
7230
  def resource_arn(self) -> typing.Optional[builtins.str]:
7231
- '''The Amazon Resource Name (ARN) of the AWS Certificate Manager SSL/TLS server certificate that's used for inbound SSL/TLS inspection.
7231
+ '''The Amazon Resource Name (ARN) of the Certificate Manager SSL/TLS server certificate that's used for inbound SSL/TLS inspection.
7232
7232
 
7233
7233
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificate.html#cfn-networkfirewall-tlsinspectionconfiguration-servercertificate-resourcearn
7234
7234
  '''
@@ -3986,6 +3986,15 @@ class CfnConnectAttachment(
3986
3986
  '''
3987
3987
  return typing.cast(builtins.str, jsii.get(self, "attrCreatedAt"))
3988
3988
 
3989
+ @builtins.property
3990
+ @jsii.member(jsii_name="attrLastModificationErrors")
3991
+ def attr_last_modification_errors(self) -> typing.List[builtins.str]:
3992
+ '''Errors from the last modification of the attachment.
3993
+
3994
+ :cloudformationAttribute: LastModificationErrors
3995
+ '''
3996
+ return typing.cast(typing.List[builtins.str], jsii.get(self, "attrLastModificationErrors"))
3997
+
3989
3998
  @builtins.property
3990
3999
  @jsii.member(jsii_name="attrOwnerAccountId")
3991
4000
  def attr_owner_account_id(self) -> builtins.str:
@@ -4599,6 +4608,15 @@ class CfnConnectPeer(
4599
4608
  '''
4600
4609
  return typing.cast(builtins.str, jsii.get(self, "attrEdgeLocation"))
4601
4610
 
4611
+ @builtins.property
4612
+ @jsii.member(jsii_name="attrLastModificationErrors")
4613
+ def attr_last_modification_errors(self) -> typing.List[builtins.str]:
4614
+ '''Describes the error associated with the attachment request.
4615
+
4616
+ :cloudformationAttribute: LastModificationErrors
4617
+ '''
4618
+ return typing.cast(typing.List[builtins.str], jsii.get(self, "attrLastModificationErrors"))
4619
+
4602
4620
  @builtins.property
4603
4621
  @jsii.member(jsii_name="attrState")
4604
4622
  def attr_state(self) -> builtins.str:
@@ -6391,6 +6409,15 @@ class CfnDirectConnectGatewayAttachment(
6391
6409
  '''
6392
6410
  return typing.cast(builtins.str, jsii.get(self, "attrCreatedAt"))
6393
6411
 
6412
+ @builtins.property
6413
+ @jsii.member(jsii_name="attrLastModificationErrors")
6414
+ def attr_last_modification_errors(self) -> typing.List[builtins.str]:
6415
+ '''Errors from the last modification of the attachment.
6416
+
6417
+ :cloudformationAttribute: LastModificationErrors
6418
+ '''
6419
+ return typing.cast(typing.List[builtins.str], jsii.get(self, "attrLastModificationErrors"))
6420
+
6394
6421
  @builtins.property
6395
6422
  @jsii.member(jsii_name="attrNetworkFunctionGroupName")
6396
6423
  def attr_network_function_group_name(self) -> builtins.str:
@@ -7854,6 +7881,15 @@ class CfnSiteToSiteVpnAttachment(
7854
7881
  '''
7855
7882
  return typing.cast(builtins.str, jsii.get(self, "attrEdgeLocation"))
7856
7883
 
7884
+ @builtins.property
7885
+ @jsii.member(jsii_name="attrLastModificationErrors")
7886
+ def attr_last_modification_errors(self) -> typing.List[builtins.str]:
7887
+ '''Errors from the last modification of the attachment.
7888
+
7889
+ :cloudformationAttribute: LastModificationErrors
7890
+ '''
7891
+ return typing.cast(typing.List[builtins.str], jsii.get(self, "attrLastModificationErrors"))
7892
+
7857
7893
  @builtins.property
7858
7894
  @jsii.member(jsii_name="attrOwnerAccountId")
7859
7895
  def attr_owner_account_id(self) -> builtins.str:
@@ -8308,6 +8344,15 @@ class CfnTransitGatewayPeering(
8308
8344
  '''
8309
8345
  return typing.cast(builtins.str, jsii.get(self, "attrEdgeLocation"))
8310
8346
 
8347
+ @builtins.property
8348
+ @jsii.member(jsii_name="attrLastModificationErrors")
8349
+ def attr_last_modification_errors(self) -> typing.List[builtins.str]:
8350
+ '''Errors from the last modification of the transit gateway peering.
8351
+
8352
+ :cloudformationAttribute: LastModificationErrors
8353
+ '''
8354
+ return typing.cast(typing.List[builtins.str], jsii.get(self, "attrLastModificationErrors"))
8355
+
8311
8356
  @builtins.property
8312
8357
  @jsii.member(jsii_name="attrOwnerAccountId")
8313
8358
  def attr_owner_account_id(self) -> builtins.str:
@@ -8721,6 +8766,15 @@ class CfnTransitGatewayRouteTableAttachment(
8721
8766
  '''
8722
8767
  return typing.cast(builtins.str, jsii.get(self, "attrEdgeLocation"))
8723
8768
 
8769
+ @builtins.property
8770
+ @jsii.member(jsii_name="attrLastModificationErrors")
8771
+ def attr_last_modification_errors(self) -> typing.List[builtins.str]:
8772
+ '''Errors from the last modification of the attachment.
8773
+
8774
+ :cloudformationAttribute: LastModificationErrors
8775
+ '''
8776
+ return typing.cast(typing.List[builtins.str], jsii.get(self, "attrLastModificationErrors"))
8777
+
8724
8778
  @builtins.property
8725
8779
  @jsii.member(jsii_name="attrOwnerAccountId")
8726
8780
  def attr_owner_account_id(self) -> builtins.str:
@@ -9155,6 +9209,27 @@ class CfnVpcAttachment(
9155
9209
 
9156
9210
  jsii.create(self.__class__, self, [scope, id, props])
9157
9211
 
9212
+ @jsii.member(jsii_name="fromAttachmentId")
9213
+ @builtins.classmethod
9214
+ def from_attachment_id(
9215
+ cls,
9216
+ scope: _constructs_77d1e7e8.Construct,
9217
+ id: builtins.str,
9218
+ attachment_id: builtins.str,
9219
+ ) -> IVpcAttachmentRef:
9220
+ '''Creates a new IVpcAttachmentRef from a attachmentId.
9221
+
9222
+ :param scope: -
9223
+ :param id: -
9224
+ :param attachment_id: -
9225
+ '''
9226
+ if __debug__:
9227
+ type_hints = typing.get_type_hints(_typecheckingstub__5a9cbfd55c4f0f5e8645015279c1b35386da05b3099b1496eadec4750792fd9d)
9228
+ check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
9229
+ check_type(argname="argument id", value=id, expected_type=type_hints["id"])
9230
+ check_type(argname="argument attachment_id", value=attachment_id, expected_type=type_hints["attachment_id"])
9231
+ return typing.cast(IVpcAttachmentRef, jsii.sinvoke(cls, "fromAttachmentId", [scope, id, attachment_id]))
9232
+
9158
9233
  @jsii.member(jsii_name="inspect")
9159
9234
  def inspect(self, inspector: _TreeInspector_488e0dd5) -> None:
9160
9235
  '''Examines the CloudFormation resource and discloses attributes.
@@ -9241,6 +9316,15 @@ class CfnVpcAttachment(
9241
9316
  '''
9242
9317
  return typing.cast(builtins.str, jsii.get(self, "attrEdgeLocation"))
9243
9318
 
9319
+ @builtins.property
9320
+ @jsii.member(jsii_name="attrLastModificationErrors")
9321
+ def attr_last_modification_errors(self) -> typing.List[builtins.str]:
9322
+ '''Errors from the last modification of the attachment.
9323
+
9324
+ :cloudformationAttribute: LastModificationErrors
9325
+ '''
9326
+ return typing.cast(typing.List[builtins.str], jsii.get(self, "attrLastModificationErrors"))
9327
+
9244
9328
  @builtins.property
9245
9329
  @jsii.member(jsii_name="attrNetworkFunctionGroupName")
9246
9330
  def attr_network_function_group_name(self) -> builtins.str:
@@ -11074,6 +11158,14 @@ def _typecheckingstub__962ef8273d6d2d97a33b00603b7bf87793fdecfaae4031352d9cbc1bc
11074
11158
  """Type checking stubs"""
11075
11159
  pass
11076
11160
 
11161
+ def _typecheckingstub__5a9cbfd55c4f0f5e8645015279c1b35386da05b3099b1496eadec4750792fd9d(
11162
+ scope: _constructs_77d1e7e8.Construct,
11163
+ id: builtins.str,
11164
+ attachment_id: builtins.str,
11165
+ ) -> None:
11166
+ """Type checking stubs"""
11167
+ pass
11168
+
11077
11169
  def _typecheckingstub__066721874248356323b7edc6b2c638d14ec9d95fc08966f64139e05c40164db7(
11078
11170
  inspector: _TreeInspector_488e0dd5,
11079
11171
  ) -> None:
@@ -2221,6 +2221,27 @@ class CfnStudio(
2221
2221
 
2222
2222
  jsii.create(self.__class__, self, [scope, id, props])
2223
2223
 
2224
+ @jsii.member(jsii_name="fromStudioId")
2225
+ @builtins.classmethod
2226
+ def from_studio_id(
2227
+ cls,
2228
+ scope: _constructs_77d1e7e8.Construct,
2229
+ id: builtins.str,
2230
+ studio_id: builtins.str,
2231
+ ) -> IStudioRef:
2232
+ '''Creates a new IStudioRef from a studioId.
2233
+
2234
+ :param scope: -
2235
+ :param id: -
2236
+ :param studio_id: -
2237
+ '''
2238
+ if __debug__:
2239
+ type_hints = typing.get_type_hints(_typecheckingstub__bd2bf748ce8156650a8f97cdc57655ec8a309bab4bf87feae2916f958649aee9)
2240
+ check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
2241
+ check_type(argname="argument id", value=id, expected_type=type_hints["id"])
2242
+ check_type(argname="argument studio_id", value=studio_id, expected_type=type_hints["studio_id"])
2243
+ return typing.cast(IStudioRef, jsii.sinvoke(cls, "fromStudioId", [scope, id, studio_id]))
2244
+
2224
2245
  @jsii.member(jsii_name="inspect")
2225
2246
  def inspect(self, inspector: _TreeInspector_488e0dd5) -> None:
2226
2247
  '''Examines the CloudFormation resource and discloses attributes.
@@ -3733,6 +3754,14 @@ def _typecheckingstub__45420baa577c3a8eb786b8d20404bcbc5573494502885eb1f55a89702
3733
3754
  """Type checking stubs"""
3734
3755
  pass
3735
3756
 
3757
+ def _typecheckingstub__bd2bf748ce8156650a8f97cdc57655ec8a309bab4bf87feae2916f958649aee9(
3758
+ scope: _constructs_77d1e7e8.Construct,
3759
+ id: builtins.str,
3760
+ studio_id: builtins.str,
3761
+ ) -> None:
3762
+ """Type checking stubs"""
3763
+ pass
3764
+
3736
3765
  def _typecheckingstub__a95feb38c2ffd266287aa8d0e3539b938c3d8fffe708542e910fcb088e43f36e(
3737
3766
  inspector: _TreeInspector_488e0dd5,
3738
3767
  ) -> None: