aws-cdk-lib 2.218.0__py3-none-any.whl → 2.219.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk-lib might be problematic. Click here for more details.

Files changed (35) hide show
  1. aws_cdk/__init__.py +19 -19
  2. aws_cdk/_jsii/__init__.py +1 -1
  3. aws_cdk/_jsii/{aws-cdk-lib@2.218.0.jsii.tgz → aws-cdk-lib@2.219.0.jsii.tgz} +0 -0
  4. aws_cdk/aws_amazonmq/__init__.py +98 -87
  5. aws_cdk/aws_apigateway/__init__.py +39 -0
  6. aws_cdk/aws_bcmdataexports/__init__.py +9 -0
  7. aws_cdk/aws_bedrock/__init__.py +356 -1
  8. aws_cdk/aws_bedrockagentcore/__init__.py +297 -157
  9. aws_cdk/aws_codebuild/__init__.py +339 -62
  10. aws_cdk/aws_connect/__init__.py +9 -9
  11. aws_cdk/aws_cur/__init__.py +5 -3
  12. aws_cdk/aws_datasync/__init__.py +44 -22
  13. aws_cdk/aws_datazone/__init__.py +35 -33
  14. aws_cdk/aws_directoryservice/__init__.py +0 -29
  15. aws_cdk/aws_dms/__init__.py +3 -5
  16. aws_cdk/aws_ec2/__init__.py +2622 -22
  17. aws_cdk/aws_ecs/__init__.py +2681 -79
  18. aws_cdk/aws_entityresolution/__init__.py +18 -0
  19. aws_cdk/aws_greengrassv2/__init__.py +29 -0
  20. aws_cdk/aws_msk/__init__.py +4 -2
  21. aws_cdk/aws_networkfirewall/__init__.py +6 -2
  22. aws_cdk/aws_networkmanager/__init__.py +29 -29
  23. aws_cdk/aws_opensearchservice/__init__.py +58 -0
  24. aws_cdk/aws_opsworkscm/__init__.py +0 -29
  25. aws_cdk/aws_quicksight/__init__.py +38 -0
  26. aws_cdk/aws_rds/__init__.py +33 -14
  27. aws_cdk/aws_route53/__init__.py +8 -2
  28. aws_cdk/aws_servicecatalog/__init__.py +78 -86
  29. aws_cdk/aws_smsvoice/__init__.py +319 -0
  30. {aws_cdk_lib-2.218.0.dist-info → aws_cdk_lib-2.219.0.dist-info}/METADATA +2 -2
  31. {aws_cdk_lib-2.218.0.dist-info → aws_cdk_lib-2.219.0.dist-info}/RECORD +35 -35
  32. {aws_cdk_lib-2.218.0.dist-info → aws_cdk_lib-2.219.0.dist-info}/LICENSE +0 -0
  33. {aws_cdk_lib-2.218.0.dist-info → aws_cdk_lib-2.219.0.dist-info}/NOTICE +0 -0
  34. {aws_cdk_lib-2.218.0.dist-info → aws_cdk_lib-2.219.0.dist-info}/WHEEL +0 -0
  35. {aws_cdk_lib-2.218.0.dist-info → aws_cdk_lib-2.219.0.dist-info}/top_level.txt +0 -0
@@ -5403,7 +5403,7 @@ class CfnDBClusterProps:
5403
5403
  :param iops: The amount of Provisioned IOPS (input/output operations per second) to be initially allocated for each DB instance in the Multi-AZ DB cluster. For information about valid IOPS values, see `Provisioned IOPS storage <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_Storage.html#USER_PIOPS>`_ in the *Amazon RDS User Guide* . This setting is required to create a Multi-AZ DB cluster. Valid for Cluster Type: Multi-AZ DB clusters only Constraints: - Must be a multiple between .5 and 50 of the storage amount for the DB cluster.
5404
5404
  :param kms_key_id: The Amazon Resource Name (ARN) of the AWS KMS key that is used to encrypt the database instances in the DB cluster, such as ``arn:aws:kms:us-east-1:012345678910:key/abcd1234-a123-456a-a12b-a123b4cd56ef`` . If you enable the ``StorageEncrypted`` property but don't specify this property, the default KMS key is used. If you specify this property, you must set the ``StorageEncrypted`` property to ``true`` . If you specify the ``SnapshotIdentifier`` property, the ``StorageEncrypted`` property value is inherited from the snapshot, and if the DB cluster is encrypted, the specified ``KmsKeyId`` property is used. If you create a read replica of an encrypted DB cluster in another AWS Region, make sure to set ``KmsKeyId`` to a KMS key identifier that is valid in the destination AWS Region. This KMS key is used to encrypt the read replica in that AWS Region. Valid for: Aurora DB clusters and Multi-AZ DB clusters
5405
5405
  :param manage_master_user_password: Specifies whether to manage the master user password with AWS Secrets Manager. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide* and `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html>`_ in the *Amazon Aurora User Guide.* Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters Constraints: - Can't manage the master user password with AWS Secrets Manager if ``MasterUserPassword`` is specified.
5406
- :param master_user_authentication_type: Specifies the authentication type for the master user. With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB cluster. You can specify one of the following values: - ``password`` - Use standard database authentication with a password. - ``iam-db-auth`` - Use IAM database authentication for the master user. Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters This option is only valid for RDS for PostgreSQL and Aurora PostgreSQL engines.
5406
+ :param master_user_authentication_type: Specifies the authentication type for the master user. With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB cluster. You can specify one of the following values: - ``password`` - Use standard database authentication with a password. - ``iam-db-auth`` - Use IAM database authentication for the master user. Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters This option is only valid for RDS for MySQL, RDS for MariaDB, RDS for PostgreSQL, Aurora MySQL, and Aurora PostgreSQL engines.
5407
5407
  :param master_username: The name of the master user for the DB cluster. .. epigraph:: If you specify the ``SourceDBClusterIdentifier`` , ``SnapshotIdentifier`` , or ``GlobalClusterIdentifier`` property, don't specify this property. The value is inherited from the source DB cluster, the snapshot, or the primary DB cluster for the global database cluster, respectively. Valid for: Aurora DB clusters and Multi-AZ DB clusters
5408
5408
  :param master_user_password: The master password for the DB instance. .. epigraph:: If you specify the ``SourceDBClusterIdentifier`` , ``SnapshotIdentifier`` , or ``GlobalClusterIdentifier`` property, don't specify this property. The value is inherited from the source DB cluster, the snapshot, or the primary DB cluster for the global database cluster, respectively. Valid for: Aurora DB clusters and Multi-AZ DB clusters
5409
5409
  :param master_user_secret: The secret managed by RDS in AWS Secrets Manager for the master user password. .. epigraph:: When you restore a DB cluster from a snapshot, Amazon RDS generates a new secret instead of reusing the secret specified in the ``SecretArn`` property. This ensures that the restored DB cluster is securely managed with a dedicated secret. To maintain consistent integration with your application, you might need to update resource configurations to reference the newly created secret. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide* and `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html>`_ in the *Amazon Aurora User Guide.*
@@ -6297,7 +6297,7 @@ class CfnDBClusterProps:
6297
6297
 
6298
6298
  Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters
6299
6299
 
6300
- This option is only valid for RDS for PostgreSQL and Aurora PostgreSQL engines.
6300
+ This option is only valid for RDS for MySQL, RDS for MariaDB, RDS for PostgreSQL, Aurora MySQL, and Aurora PostgreSQL engines.
6301
6301
 
6302
6302
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbcluster.html#cfn-rds-dbcluster-masteruserauthenticationtype
6303
6303
  '''
@@ -7025,7 +7025,7 @@ class CfnDBInstanceProps:
7025
7025
  :param kms_key_id: The ARN of the AWS KMS key that's used to encrypt the DB instance, such as ``arn:aws:kms:us-east-1:012345678910:key/abcd1234-a123-456a-a12b-a123b4cd56ef`` . If you enable the StorageEncrypted property but don't specify this property, AWS CloudFormation uses the default KMS key. If you specify this property, you must set the StorageEncrypted property to true. If you specify the ``SourceDBInstanceIdentifier`` or ``SourceDbiResourceId`` property, don't specify this property. The value is inherited from the source DB instance, and if the DB instance is encrypted, the specified ``KmsKeyId`` property is used. However, if the source DB instance is in a different AWS Region, you must specify a KMS key ID. If you specify the ``SourceDBInstanceAutomatedBackupsArn`` property, don't specify this property. The value is inherited from the source DB instance automated backup, and if the automated backup is encrypted, the specified ``KmsKeyId`` property is used. If you create an encrypted read replica in a different AWS Region, then you must specify a KMS key for the destination AWS Region. KMS encryption keys are specific to the region that they're created in, and you can't use encryption keys from one region in another region. If you specify the ``DBSnapshotIdentifier`` property, don't specify this property. The ``StorageEncrypted`` property value is inherited from the snapshot. If the DB instance is encrypted, the specified ``KmsKeyId`` property is also inherited from the snapshot. If you specify ``DBSecurityGroups`` , AWS CloudFormation ignores this property. To specify both a security group and this property, you must use a VPC security group. For more information about Amazon RDS and VPC, see `Using Amazon RDS with Amazon VPC <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_VPC.html>`_ in the *Amazon RDS User Guide* . *Amazon Aurora* Not applicable. The KMS key identifier is managed by the DB cluster.
7026
7026
  :param license_model: License model information for this DB instance. Valid Values: - Aurora MySQL - ``general-public-license`` - Aurora PostgreSQL - ``postgresql-license`` - RDS for Db2 - ``bring-your-own-license`` . For more information about RDS for Db2 licensing, see ` <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/db2-licensing.html>`_ in the *Amazon RDS User Guide.* - RDS for MariaDB - ``general-public-license`` - RDS for Microsoft SQL Server - ``license-included`` - RDS for MySQL - ``general-public-license`` - RDS for Oracle - ``bring-your-own-license`` or ``license-included`` - RDS for PostgreSQL - ``postgresql-license`` .. epigraph:: If you've specified ``DBSecurityGroups`` and then you update the license model, AWS CloudFormation replaces the underlying DB instance. This will incur some interruptions to database availability.
7027
7027
  :param manage_master_user_password: Specifies whether to manage the master user password with AWS Secrets Manager. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide.* Constraints: - Can't manage the master user password with AWS Secrets Manager if ``MasterUserPassword`` is specified.
7028
- :param master_user_authentication_type: Specifies the authentication type for the master user. With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB instance. You can specify one of the following values: - ``password`` - Use standard database authentication with a password. - ``iam-db-auth`` - Use IAM database authentication for the master user. This option is only valid for RDS for PostgreSQL and Aurora PostgreSQL engines.
7028
+ :param master_user_authentication_type: Specifies the authentication type for the master user. With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB instance. You can specify one of the following values: - ``password`` - Use standard database authentication with a password. - ``iam-db-auth`` - Use IAM database authentication for the master user. This option is only valid for RDS for MySQL, RDS for MariaDB, RDS for PostgreSQL, Aurora MySQL, and Aurora PostgreSQL engines.
7029
7029
  :param master_username: The master user name for the DB instance. .. epigraph:: If you specify the ``SourceDBInstanceIdentifier`` or ``DBSnapshotIdentifier`` property, don't specify this property. The value is inherited from the source DB instance or snapshot. When migrating a self-managed Db2 database, we recommend that you use the same master username as your self-managed Db2 instance name. *Amazon Aurora* Not applicable. The name for the master user is managed by the DB cluster. *RDS for Db2* Constraints: - Must be 1 to 16 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for MariaDB* Constraints: - Must be 1 to 16 letters or numbers. - Can't be a reserved word for the chosen database engine. *RDS for Microsoft SQL Server* Constraints: - Must be 1 to 128 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for MySQL* Constraints: - Must be 1 to 16 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for Oracle* Constraints: - Must be 1 to 30 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for PostgreSQL* Constraints: - Must be 1 to 63 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine.
7030
7030
  :param master_user_password: The password for the master user. The password can include any printable ASCII character except "/", """, or "@". *Amazon Aurora* Not applicable. The password for the master user is managed by the DB cluster. *RDS for Db2* Must contain from 8 to 255 characters. *RDS for MariaDB* Constraints: Must contain from 8 to 41 characters. *RDS for Microsoft SQL Server* Constraints: Must contain from 8 to 128 characters. *RDS for MySQL* Constraints: Must contain from 8 to 41 characters. *RDS for Oracle* Constraints: Must contain from 8 to 30 characters. *RDS for PostgreSQL* Constraints: Must contain from 8 to 128 characters.
7031
7031
  :param master_user_secret: The secret managed by RDS in AWS Secrets Manager for the master user password. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide.*
@@ -8385,7 +8385,7 @@ class CfnDBInstanceProps:
8385
8385
  - ``password`` - Use standard database authentication with a password.
8386
8386
  - ``iam-db-auth`` - Use IAM database authentication for the master user.
8387
8387
 
8388
- This option is only valid for RDS for PostgreSQL and Aurora PostgreSQL engines.
8388
+ This option is only valid for RDS for MySQL, RDS for MariaDB, RDS for PostgreSQL, Aurora MySQL, and Aurora PostgreSQL engines.
8389
8389
 
8390
8390
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbinstance.html#cfn-rds-dbinstance-masteruserauthenticationtype
8391
8391
  '''
@@ -9243,7 +9243,7 @@ class CfnDBProxyEndpointProps:
9243
9243
  :param db_proxy_endpoint_name: The name of the DB proxy endpoint to create.
9244
9244
  :param db_proxy_name: The name of the DB proxy associated with the DB proxy endpoint that you create.
9245
9245
  :param vpc_subnet_ids: The VPC subnet IDs for the DB proxy endpoint that you create. You can specify a different set of subnet IDs than for the original DB proxy.
9246
- :param endpoint_network_type: The network type of the DB proxy endpoint. The network type determines the IP version that the proxy endpoint supports.
9246
+ :param endpoint_network_type: The network type of the DB proxy endpoint. The network type determines the IP version that the proxy endpoint supports. Valid values: - ``IPV4`` - The proxy endpoint supports IPv4 only. - ``IPV6`` - The proxy endpoint supports IPv6 only. - ``DUAL`` - The proxy endpoint supports both IPv4 and IPv6.
9247
9247
  :param tags: An optional set of key-value pairs to associate arbitrary data of your choosing with the proxy.
9248
9248
  :param target_role: A value that indicates whether the DB proxy endpoint can be used for read/write or read-only operations.
9249
9249
  :param vpc_security_group_ids: The VPC security group IDs for the DB proxy endpoint that you create. You can specify a different set of security group IDs than for the original DB proxy. The default is the default security group for the VPC.
@@ -9333,6 +9333,12 @@ class CfnDBProxyEndpointProps:
9333
9333
 
9334
9334
  The network type determines the IP version that the proxy endpoint supports.
9335
9335
 
9336
+ Valid values:
9337
+
9338
+ - ``IPV4`` - The proxy endpoint supports IPv4 only.
9339
+ - ``IPV6`` - The proxy endpoint supports IPv6 only.
9340
+ - ``DUAL`` - The proxy endpoint supports both IPv4 and IPv6.
9341
+
9336
9342
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbproxyendpoint.html#cfn-rds-dbproxyendpoint-endpointnetworktype
9337
9343
  '''
9338
9344
  result = self._values.get("endpoint_network_type")
@@ -9426,12 +9432,12 @@ class CfnDBProxyProps:
9426
9432
  :param vpc_subnet_ids: One or more VPC subnet IDs to associate with the new proxy.
9427
9433
  :param auth: The authorization mechanism that the proxy uses.
9428
9434
  :param debug_logging: Specifies whether the proxy logs detailed connection and query information. When you enable ``DebugLogging`` , the proxy captures connection details and connection pool behavior from your queries. Debug logging increases CloudWatch costs and can impact proxy performance. Enable this option only when you need to troubleshoot connection or performance issues.
9429
- :param default_auth_scheme: The default authentication scheme that the proxy uses for client connections to the proxy and connections from the proxy to the underlying database.
9430
- :param endpoint_network_type: The network type of the DB proxy endpoint. The network type determines the IP version that the proxy endpoint supports.
9435
+ :param default_auth_scheme: The default authentication scheme that the proxy uses for client connections to the proxy and connections from the proxy to the underlying database. Valid values are ``NONE`` and ``IAM_AUTH`` . When set to ``IAM_AUTH`` , the proxy uses end-to-end IAM authentication to connect to the database.
9436
+ :param endpoint_network_type: The network type of the DB proxy endpoint. The network type determines the IP version that the proxy endpoint supports. Valid values: - ``IPV4`` - The proxy endpoint supports IPv4 only. - ``IPV6`` - The proxy endpoint supports IPv6 only. - ``DUAL`` - The proxy endpoint supports both IPv4 and IPv6.
9431
9437
  :param idle_client_timeout: The number of seconds that a connection to the proxy can be inactive before the proxy disconnects it. You can set this value higher or lower than the connection timeout limit for the associated database.
9432
9438
  :param require_tls: Specifies whether Transport Layer Security (TLS) encryption is required for connections to the proxy. By enabling this setting, you can enforce encrypted TLS connections to the proxy.
9433
9439
  :param tags: An optional set of key-value pairs to associate arbitrary data of your choosing with the proxy.
9434
- :param target_connection_network_type: The network type that the proxy uses to connect to the target database. The network type determines the IP version that the proxy uses for connections to the database.
9440
+ :param target_connection_network_type: The network type that the proxy uses to connect to the target database. The network type determines the IP version that the proxy uses for connections to the database. Valid values: - ``IPV4`` - The proxy connects to the database using IPv4 only. - ``IPV6`` - The proxy connects to the database using IPv6 only.
9435
9441
  :param vpc_security_group_ids: One or more VPC security group IDs to associate with the new proxy. If you plan to update the resource, don't specify VPC security groups in a shared VPC.
9436
9442
 
9437
9443
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbproxy.html
@@ -9582,6 +9588,8 @@ class CfnDBProxyProps:
9582
9588
  def default_auth_scheme(self) -> typing.Optional[builtins.str]:
9583
9589
  '''The default authentication scheme that the proxy uses for client connections to the proxy and connections from the proxy to the underlying database.
9584
9590
 
9591
+ Valid values are ``NONE`` and ``IAM_AUTH`` . When set to ``IAM_AUTH`` , the proxy uses end-to-end IAM authentication to connect to the database.
9592
+
9585
9593
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbproxy.html#cfn-rds-dbproxy-defaultauthscheme
9586
9594
  '''
9587
9595
  result = self._values.get("default_auth_scheme")
@@ -9593,6 +9601,12 @@ class CfnDBProxyProps:
9593
9601
 
9594
9602
  The network type determines the IP version that the proxy endpoint supports.
9595
9603
 
9604
+ Valid values:
9605
+
9606
+ - ``IPV4`` - The proxy endpoint supports IPv4 only.
9607
+ - ``IPV6`` - The proxy endpoint supports IPv6 only.
9608
+ - ``DUAL`` - The proxy endpoint supports both IPv4 and IPv6.
9609
+
9596
9610
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbproxy.html#cfn-rds-dbproxy-endpointnetworktype
9597
9611
  '''
9598
9612
  result = self._values.get("endpoint_network_type")
@@ -9637,6 +9651,11 @@ class CfnDBProxyProps:
9637
9651
 
9638
9652
  The network type determines the IP version that the proxy uses for connections to the database.
9639
9653
 
9654
+ Valid values:
9655
+
9656
+ - ``IPV4`` - The proxy connects to the database using IPv4 only.
9657
+ - ``IPV6`` - The proxy connects to the database using IPv6 only.
9658
+
9640
9659
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbproxy.html#cfn-rds-dbproxy-targetconnectionnetworktype
9641
9660
  '''
9642
9661
  result = self._values.get("target_connection_network_type")
@@ -36962,7 +36981,7 @@ class CfnDBCluster(
36962
36981
  :param iops: The amount of Provisioned IOPS (input/output operations per second) to be initially allocated for each DB instance in the Multi-AZ DB cluster. For information about valid IOPS values, see `Provisioned IOPS storage <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_Storage.html#USER_PIOPS>`_ in the *Amazon RDS User Guide* . This setting is required to create a Multi-AZ DB cluster. Valid for Cluster Type: Multi-AZ DB clusters only Constraints: - Must be a multiple between .5 and 50 of the storage amount for the DB cluster.
36963
36982
  :param kms_key_id: The Amazon Resource Name (ARN) of the AWS KMS key that is used to encrypt the database instances in the DB cluster, such as ``arn:aws:kms:us-east-1:012345678910:key/abcd1234-a123-456a-a12b-a123b4cd56ef`` . If you enable the ``StorageEncrypted`` property but don't specify this property, the default KMS key is used. If you specify this property, you must set the ``StorageEncrypted`` property to ``true`` . If you specify the ``SnapshotIdentifier`` property, the ``StorageEncrypted`` property value is inherited from the snapshot, and if the DB cluster is encrypted, the specified ``KmsKeyId`` property is used. If you create a read replica of an encrypted DB cluster in another AWS Region, make sure to set ``KmsKeyId`` to a KMS key identifier that is valid in the destination AWS Region. This KMS key is used to encrypt the read replica in that AWS Region. Valid for: Aurora DB clusters and Multi-AZ DB clusters
36964
36983
  :param manage_master_user_password: Specifies whether to manage the master user password with AWS Secrets Manager. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide* and `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html>`_ in the *Amazon Aurora User Guide.* Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters Constraints: - Can't manage the master user password with AWS Secrets Manager if ``MasterUserPassword`` is specified.
36965
- :param master_user_authentication_type: Specifies the authentication type for the master user. With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB cluster. You can specify one of the following values: - ``password`` - Use standard database authentication with a password. - ``iam-db-auth`` - Use IAM database authentication for the master user. Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters This option is only valid for RDS for PostgreSQL and Aurora PostgreSQL engines.
36984
+ :param master_user_authentication_type: Specifies the authentication type for the master user. With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB cluster. You can specify one of the following values: - ``password`` - Use standard database authentication with a password. - ``iam-db-auth`` - Use IAM database authentication for the master user. Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters This option is only valid for RDS for MySQL, RDS for MariaDB, RDS for PostgreSQL, Aurora MySQL, and Aurora PostgreSQL engines.
36966
36985
  :param master_username: The name of the master user for the DB cluster. .. epigraph:: If you specify the ``SourceDBClusterIdentifier`` , ``SnapshotIdentifier`` , or ``GlobalClusterIdentifier`` property, don't specify this property. The value is inherited from the source DB cluster, the snapshot, or the primary DB cluster for the global database cluster, respectively. Valid for: Aurora DB clusters and Multi-AZ DB clusters
36967
36986
  :param master_user_password: The master password for the DB instance. .. epigraph:: If you specify the ``SourceDBClusterIdentifier`` , ``SnapshotIdentifier`` , or ``GlobalClusterIdentifier`` property, don't specify this property. The value is inherited from the source DB cluster, the snapshot, or the primary DB cluster for the global database cluster, respectively. Valid for: Aurora DB clusters and Multi-AZ DB clusters
36968
36987
  :param master_user_secret: The secret managed by RDS in AWS Secrets Manager for the master user password. .. epigraph:: When you restore a DB cluster from a snapshot, Amazon RDS generates a new secret instead of reusing the secret specified in the ``SecretArn`` property. This ensures that the restored DB cluster is securely managed with a dedicated secret. To maintain consistent integration with your application, you might need to update resource configurations to reference the newly created secret. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide* and `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html>`_ in the *Amazon Aurora User Guide.*
@@ -39105,7 +39124,7 @@ class CfnDBInstance(
39105
39124
  :param kms_key_id: The ARN of the AWS KMS key that's used to encrypt the DB instance, such as ``arn:aws:kms:us-east-1:012345678910:key/abcd1234-a123-456a-a12b-a123b4cd56ef`` . If you enable the StorageEncrypted property but don't specify this property, AWS CloudFormation uses the default KMS key. If you specify this property, you must set the StorageEncrypted property to true. If you specify the ``SourceDBInstanceIdentifier`` or ``SourceDbiResourceId`` property, don't specify this property. The value is inherited from the source DB instance, and if the DB instance is encrypted, the specified ``KmsKeyId`` property is used. However, if the source DB instance is in a different AWS Region, you must specify a KMS key ID. If you specify the ``SourceDBInstanceAutomatedBackupsArn`` property, don't specify this property. The value is inherited from the source DB instance automated backup, and if the automated backup is encrypted, the specified ``KmsKeyId`` property is used. If you create an encrypted read replica in a different AWS Region, then you must specify a KMS key for the destination AWS Region. KMS encryption keys are specific to the region that they're created in, and you can't use encryption keys from one region in another region. If you specify the ``DBSnapshotIdentifier`` property, don't specify this property. The ``StorageEncrypted`` property value is inherited from the snapshot. If the DB instance is encrypted, the specified ``KmsKeyId`` property is also inherited from the snapshot. If you specify ``DBSecurityGroups`` , AWS CloudFormation ignores this property. To specify both a security group and this property, you must use a VPC security group. For more information about Amazon RDS and VPC, see `Using Amazon RDS with Amazon VPC <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_VPC.html>`_ in the *Amazon RDS User Guide* . *Amazon Aurora* Not applicable. The KMS key identifier is managed by the DB cluster.
39106
39125
  :param license_model: License model information for this DB instance. Valid Values: - Aurora MySQL - ``general-public-license`` - Aurora PostgreSQL - ``postgresql-license`` - RDS for Db2 - ``bring-your-own-license`` . For more information about RDS for Db2 licensing, see ` <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/db2-licensing.html>`_ in the *Amazon RDS User Guide.* - RDS for MariaDB - ``general-public-license`` - RDS for Microsoft SQL Server - ``license-included`` - RDS for MySQL - ``general-public-license`` - RDS for Oracle - ``bring-your-own-license`` or ``license-included`` - RDS for PostgreSQL - ``postgresql-license`` .. epigraph:: If you've specified ``DBSecurityGroups`` and then you update the license model, AWS CloudFormation replaces the underlying DB instance. This will incur some interruptions to database availability.
39107
39126
  :param manage_master_user_password: Specifies whether to manage the master user password with AWS Secrets Manager. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide.* Constraints: - Can't manage the master user password with AWS Secrets Manager if ``MasterUserPassword`` is specified.
39108
- :param master_user_authentication_type: Specifies the authentication type for the master user. With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB instance. You can specify one of the following values: - ``password`` - Use standard database authentication with a password. - ``iam-db-auth`` - Use IAM database authentication for the master user. This option is only valid for RDS for PostgreSQL and Aurora PostgreSQL engines.
39127
+ :param master_user_authentication_type: Specifies the authentication type for the master user. With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB instance. You can specify one of the following values: - ``password`` - Use standard database authentication with a password. - ``iam-db-auth`` - Use IAM database authentication for the master user. This option is only valid for RDS for MySQL, RDS for MariaDB, RDS for PostgreSQL, Aurora MySQL, and Aurora PostgreSQL engines.
39109
39128
  :param master_username: The master user name for the DB instance. .. epigraph:: If you specify the ``SourceDBInstanceIdentifier`` or ``DBSnapshotIdentifier`` property, don't specify this property. The value is inherited from the source DB instance or snapshot. When migrating a self-managed Db2 database, we recommend that you use the same master username as your self-managed Db2 instance name. *Amazon Aurora* Not applicable. The name for the master user is managed by the DB cluster. *RDS for Db2* Constraints: - Must be 1 to 16 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for MariaDB* Constraints: - Must be 1 to 16 letters or numbers. - Can't be a reserved word for the chosen database engine. *RDS for Microsoft SQL Server* Constraints: - Must be 1 to 128 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for MySQL* Constraints: - Must be 1 to 16 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for Oracle* Constraints: - Must be 1 to 30 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for PostgreSQL* Constraints: - Must be 1 to 63 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine.
39110
39129
  :param master_user_password: The password for the master user. The password can include any printable ASCII character except "/", """, or "@". *Amazon Aurora* Not applicable. The password for the master user is managed by the DB cluster. *RDS for Db2* Must contain from 8 to 255 characters. *RDS for MariaDB* Constraints: Must contain from 8 to 41 characters. *RDS for Microsoft SQL Server* Constraints: Must contain from 8 to 128 characters. *RDS for MySQL* Constraints: Must contain from 8 to 41 characters. *RDS for Oracle* Constraints: Must contain from 8 to 30 characters. *RDS for PostgreSQL* Constraints: Must contain from 8 to 128 characters.
39111
39130
  :param master_user_secret: The secret managed by RDS in AWS Secrets Manager for the master user password. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide.*
@@ -41553,12 +41572,12 @@ class CfnDBProxy(
41553
41572
  :param vpc_subnet_ids: One or more VPC subnet IDs to associate with the new proxy.
41554
41573
  :param auth: The authorization mechanism that the proxy uses.
41555
41574
  :param debug_logging: Specifies whether the proxy logs detailed connection and query information. When you enable ``DebugLogging`` , the proxy captures connection details and connection pool behavior from your queries. Debug logging increases CloudWatch costs and can impact proxy performance. Enable this option only when you need to troubleshoot connection or performance issues.
41556
- :param default_auth_scheme: The default authentication scheme that the proxy uses for client connections to the proxy and connections from the proxy to the underlying database.
41557
- :param endpoint_network_type: The network type of the DB proxy endpoint. The network type determines the IP version that the proxy endpoint supports.
41575
+ :param default_auth_scheme: The default authentication scheme that the proxy uses for client connections to the proxy and connections from the proxy to the underlying database. Valid values are ``NONE`` and ``IAM_AUTH`` . When set to ``IAM_AUTH`` , the proxy uses end-to-end IAM authentication to connect to the database.
41576
+ :param endpoint_network_type: The network type of the DB proxy endpoint. The network type determines the IP version that the proxy endpoint supports. Valid values: - ``IPV4`` - The proxy endpoint supports IPv4 only. - ``IPV6`` - The proxy endpoint supports IPv6 only. - ``DUAL`` - The proxy endpoint supports both IPv4 and IPv6.
41558
41577
  :param idle_client_timeout: The number of seconds that a connection to the proxy can be inactive before the proxy disconnects it. You can set this value higher or lower than the connection timeout limit for the associated database.
41559
41578
  :param require_tls: Specifies whether Transport Layer Security (TLS) encryption is required for connections to the proxy. By enabling this setting, you can enforce encrypted TLS connections to the proxy.
41560
41579
  :param tags: An optional set of key-value pairs to associate arbitrary data of your choosing with the proxy.
41561
- :param target_connection_network_type: The network type that the proxy uses to connect to the target database. The network type determines the IP version that the proxy uses for connections to the database.
41580
+ :param target_connection_network_type: The network type that the proxy uses to connect to the target database. The network type determines the IP version that the proxy uses for connections to the database. Valid values: - ``IPV4`` - The proxy connects to the database using IPv4 only. - ``IPV6`` - The proxy connects to the database using IPv6 only.
41562
41581
  :param vpc_security_group_ids: One or more VPC security group IDs to associate with the new proxy. If you plan to update the resource, don't specify VPC security groups in a shared VPC.
41563
41582
  '''
41564
41583
  if __debug__:
@@ -42111,7 +42130,7 @@ class CfnDBProxyEndpoint(
42111
42130
  :param db_proxy_endpoint_name: The name of the DB proxy endpoint to create.
42112
42131
  :param db_proxy_name: The name of the DB proxy associated with the DB proxy endpoint that you create.
42113
42132
  :param vpc_subnet_ids: The VPC subnet IDs for the DB proxy endpoint that you create. You can specify a different set of subnet IDs than for the original DB proxy.
42114
- :param endpoint_network_type: The network type of the DB proxy endpoint. The network type determines the IP version that the proxy endpoint supports.
42133
+ :param endpoint_network_type: The network type of the DB proxy endpoint. The network type determines the IP version that the proxy endpoint supports. Valid values: - ``IPV4`` - The proxy endpoint supports IPv4 only. - ``IPV6`` - The proxy endpoint supports IPv6 only. - ``DUAL`` - The proxy endpoint supports both IPv4 and IPv6.
42115
42134
  :param tags: An optional set of key-value pairs to associate arbitrary data of your choosing with the proxy.
42116
42135
  :param target_role: A value that indicates whether the DB proxy endpoint can be used for read/write or read-only operations.
42117
42136
  :param vpc_security_group_ids: The VPC security group IDs for the DB proxy endpoint that you create. You can specify a different set of security group IDs than for the original DB proxy. The default is the default security group for the VPC.
@@ -12686,7 +12686,7 @@ class CfnRecordSet(
12686
12686
 
12687
12687
  :param dns_name: *Alias records only:* The value that you specify depends on where you want to route queries:. - **Amazon API Gateway custom regional APIs and edge-optimized APIs** - Specify the applicable domain name for your API. You can get the applicable value using the AWS CLI command `get-domain-names <https://docs.aws.amazon.com/cli/latest/reference/apigateway/get-domain-names.html>`_ : - For regional APIs, specify the value of ``regionalDomainName`` . - For edge-optimized APIs, specify the value of ``distributionDomainName`` . This is the name of the associated CloudFront distribution, such as ``da1b2c3d4e5.cloudfront.net`` . .. epigraph:: The name of the record that you're creating must match a custom domain name for your API, such as ``api.example.com`` . - **Amazon Virtual Private Cloud interface VPC endpoint** - Enter the API endpoint for the interface endpoint, such as ``vpce-123456789abcdef01-example-us-east-1a.elasticloadbalancing.us-east-1.vpce.amazonaws.com`` . For edge-optimized APIs, this is the domain name for the corresponding CloudFront distribution. You can get the value of ``DnsName`` using the AWS CLI command `describe-vpc-endpoints <https://docs.aws.amazon.com/cli/latest/reference/ec2/describe-vpc-endpoints.html>`_ . - **CloudFront distribution** - Specify the domain name that CloudFront assigned when you created your distribution. Your CloudFront distribution must include an alternate domain name that matches the name of the record. For example, if the name of the record is *acme.example.com* , your CloudFront distribution must include *acme.example.com* as one of the alternate domain names. For more information, see `Using Alternate Domain Names (CNAMEs) <https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/CNAMEs.html>`_ in the *Amazon CloudFront Developer Guide* . You can't create a record in a private hosted zone to route traffic to a CloudFront distribution. .. epigraph:: For failover alias records, you can't specify a CloudFront distribution for both the primary and secondary records. A distribution must include an alternate domain name that matches the name of the record. However, the primary and secondary records have the same name, and you can't include the same alternate domain name in more than one distribution. - **Elastic Beanstalk environment** - If the domain name for your Elastic Beanstalk environment includes the region that you deployed the environment in, you can create an alias record that routes traffic to the environment. For example, the domain name ``my-environment. *us-west-2* .elasticbeanstalk.com`` is a regionalized domain name. .. epigraph:: For environments that were created before early 2016, the domain name doesn't include the region. To route traffic to these environments, you must create a CNAME record instead of an alias record. Note that you can't create a CNAME record for the root domain name. For example, if your domain name is example.com, you can create a record that routes traffic for acme.example.com to your Elastic Beanstalk environment, but you can't create a record that routes traffic for example.com to your Elastic Beanstalk environment. For Elastic Beanstalk environments that have regionalized subdomains, specify the ``CNAME`` attribute for the environment. You can use the following methods to get the value of the CNAME attribute: - *AWS Management Console* : For information about how to get the value by using the console, see `Using Custom Domains with AWS Elastic Beanstalk <https://docs.aws.amazon.com/elasticbeanstalk/latest/dg/customdomains.html>`_ in the *AWS Elastic Beanstalk Developer Guide* . - *Elastic Beanstalk API* : Use the ``DescribeEnvironments`` action to get the value of the ``CNAME`` attribute. For more information, see `DescribeEnvironments <https://docs.aws.amazon.com/elasticbeanstalk/latest/api/API_DescribeEnvironments.html>`_ in the *AWS Elastic Beanstalk API Reference* . - *AWS CLI* : Use the ``describe-environments`` command to get the value of the ``CNAME`` attribute. For more information, see `describe-environments <https://docs.aws.amazon.com/cli/latest/reference/elasticbeanstalk/describe-environments.html>`_ in the *AWS CLI* . - **ELB load balancer** - Specify the DNS name that is associated with the load balancer. Get the DNS name by using the AWS Management Console , the ELB API, or the AWS CLI . - *AWS Management Console* : Go to the EC2 page, choose *Load Balancers* in the navigation pane, choose the load balancer, choose the *Description* tab, and get the value of the *DNS name* field. If you're routing traffic to a Classic Load Balancer, get the value that begins with *dualstack* . If you're routing traffic to another type of load balancer, get the value that applies to the record type, A or AAAA. - *Elastic Load Balancing API* : Use ``DescribeLoadBalancers`` to get the value of ``DNSName`` . For more information, see the applicable guide: - Classic Load Balancers: `DescribeLoadBalancers <https://docs.aws.amazon.com/elasticloadbalancing/2012-06-01/APIReference/API_DescribeLoadBalancers.html>`_ - Application and Network Load Balancers: `DescribeLoadBalancers <https://docs.aws.amazon.com/elasticloadbalancing/latest/APIReference/API_DescribeLoadBalancers.html>`_ - *CloudFormation Fn::GetAtt intrinsic function* : Use the `Fn::GetAtt <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/intrinsic-function-reference-getatt.html>`_ intrinsic function to get the value of ``DNSName`` : - `Classic Load Balancers <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-elb.html#aws-properties-ec2-elb-return-values>`_ . - `Application and Network Load Balancers <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-elasticloadbalancingv2-loadbalancer.html#aws-resource-elasticloadbalancingv2-loadbalancer-return-values>`_ . - *AWS CLI* : Use ``describe-load-balancers`` to get the value of ``DNSName`` . For more information, see the applicable guide: - Classic Load Balancers: `describe-load-balancers <https://docs.aws.amazon.com/cli/latest/reference/elb/describe-load-balancers.html>`_ - Application and Network Load Balancers: `describe-load-balancers <https://docs.aws.amazon.com/cli/latest/reference/elbv2/describe-load-balancers.html>`_ - **Global Accelerator accelerator** - Specify the DNS name for your accelerator: - *Global Accelerator API* : To get the DNS name, use `DescribeAccelerator <https://docs.aws.amazon.com/global-accelerator/latest/api/API_DescribeAccelerator.html>`_ . - *AWS CLI* : To get the DNS name, use `describe-accelerator <https://docs.aws.amazon.com/cli/latest/reference/globalaccelerator/describe-accelerator.html>`_ . - **Amazon S3 bucket that is configured as a static website** - Specify the domain name of the Amazon S3 website endpoint that you created the bucket in, for example, ``s3-website.us-east-2.amazonaws.com`` . For more information about valid values, see the table `Amazon S3 Website Endpoints <https://docs.aws.amazon.com/general/latest/gr/s3.html#s3_website_region_endpoints>`_ in the *Amazon Web Services General Reference* . For more information about using S3 buckets for websites, see `Getting Started with Amazon Route 53 <https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/getting-started.html>`_ in the *Amazon Route 53 Developer Guide.* - **Another Route 53 record** - Specify the value of the ``Name`` element for a record in the current hosted zone. .. epigraph:: If you're creating an alias record that has the same name as the hosted zone (known as the zone apex), you can't specify the domain name for a record for which the value of ``Type`` is ``CNAME`` . This is because the alias record must have the same type as the record that you're routing traffic to, and creating a CNAME record for the zone apex isn't supported even for an alias record.
12688
12688
  :param hosted_zone_id: *Alias resource records sets only* : The value used depends on where you want to route traffic:. - **Amazon API Gateway custom regional APIs and edge-optimized APIs** - Specify the hosted zone ID for your API. You can get the applicable value using the AWS CLI command `get-domain-names <https://docs.aws.amazon.com/cli/latest/reference/apigateway/get-domain-names.html>`_ : - For regional APIs, specify the value of ``regionalHostedZoneId`` . - For edge-optimized APIs, specify the value of ``distributionHostedZoneId`` . - **Amazon Virtual Private Cloud interface VPC endpoint** - Specify the hosted zone ID for your interface endpoint. You can get the value of ``HostedZoneId`` using the AWS CLI command `describe-vpc-endpoints <https://docs.aws.amazon.com/cli/latest/reference/ec2/describe-vpc-endpoints.html>`_ . - **CloudFront distribution** - Specify ``Z2FDTNDATAQYW2`` . This is always the hosted zone ID when you create an alias record that routes traffic to a CloudFront distribution. .. epigraph:: Alias records for CloudFront can't be created in a private zone. - **Elastic Beanstalk environment** - Specify the hosted zone ID for the region that you created the environment in. The environment must have a regionalized subdomain. For a list of regions and the corresponding hosted zone IDs, see `AWS Elastic Beanstalk endpoints and quotas <https://docs.aws.amazon.com/general/latest/gr/elasticbeanstalk.html>`_ in the *Amazon Web Services General Reference* . - **ELB load balancer** - Specify the value of the hosted zone ID for the load balancer. Use the following methods to get the hosted zone ID: - `Service Endpoints <https://docs.aws.amazon.com/general/latest/gr/elb.html>`_ table in the "Elastic Load Balancing Endpoints and Quotas" topic in the *Amazon Web Services General Reference* : Use the value that corresponds with the region that you created your load balancer in. Note that there are separate columns for Application and Classic Load Balancers and for Network Load Balancers. - *AWS Management Console* : Go to the Amazon EC2 page, choose *Load Balancers* in the navigation pane, select the load balancer, and get the value of the *Hosted zone* field on the *Description* tab. - *Elastic Load Balancing API* : Use ``DescribeLoadBalancers`` to get the applicable value. For more information, see the applicable guide: - Classic Load Balancers: Use `DescribeLoadBalancers <https://docs.aws.amazon.com/elasticloadbalancing/2012-06-01/APIReference/API_DescribeLoadBalancers.html>`_ to get the value of ``CanonicalHostedZoneNameID`` . - Application and Network Load Balancers: Use `DescribeLoadBalancers <https://docs.aws.amazon.com/elasticloadbalancing/latest/APIReference/API_DescribeLoadBalancers.html>`_ to get the value of ``CanonicalHostedZoneID`` . - *CloudFormation Fn::GetAtt intrinsic function* : Use the `Fn::GetAtt <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/intrinsic-function-reference-getatt.html>`_ intrinsic function to get the applicable value: - Classic Load Balancers: Get `CanonicalHostedZoneNameID <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-elb.html#aws-properties-ec2-elb-return-values>`_ . - Application and Network Load Balancers: Get `CanonicalHostedZoneID <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-elasticloadbalancingv2-loadbalancer.html#aws-resource-elasticloadbalancingv2-loadbalancer-return-values>`_ . - *AWS CLI* : Use ``describe-load-balancers`` to get the applicable value. For more information, see the applicable guide: - Classic Load Balancers: Use `describe-load-balancers <https://docs.aws.amazon.com/cli/latest/reference/elb/describe-load-balancers.html>`_ to get the value of ``CanonicalHostedZoneNameID`` . - Application and Network Load Balancers: Use `describe-load-balancers <https://docs.aws.amazon.com/cli/latest/reference/elbv2/describe-load-balancers.html>`_ to get the value of ``CanonicalHostedZoneID`` . - **Global Accelerator accelerator** - Specify ``Z2BJ6XQ5FK7U4H`` . - **An Amazon S3 bucket configured as a static website** - Specify the hosted zone ID for the region that you created the bucket in. For more information about valid values, see the table `Amazon S3 Website Endpoints <https://docs.aws.amazon.com/general/latest/gr/s3.html#s3_website_region_endpoints>`_ in the *Amazon Web Services General Reference* . - **Another Route 53 record in your hosted zone** - Specify the hosted zone ID of your hosted zone. (An alias record can't reference a record in a different hosted zone.)
12689
- :param evaluate_target_health: *Applies only to alias, failover alias, geolocation alias, latency alias, and weighted alias resource record sets:* When ``EvaluateTargetHealth`` is ``true`` , an alias resource record set inherits the health of the referenced AWS resource, such as an ELB load balancer or another resource record set in the hosted zone. Note the following: - **CloudFront distributions** - You can't set ``EvaluateTargetHealth`` to ``true`` when the alias target is a CloudFront distribution. - **Elastic Beanstalk environments that have regionalized subdomains** - If you specify an Elastic Beanstalk environment in ``DNSName`` and the environment contains an ELB load balancer, Elastic Load Balancing routes queries only to the healthy Amazon EC2 instances that are registered with the load balancer. (An environment automatically contains an ELB load balancer if it includes more than one Amazon EC2 instance.) If you set ``EvaluateTargetHealth`` to ``true`` and either no Amazon EC2 instances are healthy or the load balancer itself is unhealthy, Route 53 routes queries to other available resources that are healthy, if any. If the environment contains a single Amazon EC2 instance, there are no special requirements. - **ELB load balancers** - Health checking behavior depends on the type of load balancer: - *Classic Load Balancers* : If you specify an ELB Classic Load Balancer in ``DNSName`` , Elastic Load Balancing routes queries only to the healthy Amazon EC2 instances that are registered with the load balancer. If you set ``EvaluateTargetHealth`` to ``true`` and either no EC2 instances are healthy or the load balancer itself is unhealthy, Route 53 routes queries to other resources. - *Application and Network Load Balancers* : If you specify an ELB Application or Network Load Balancer and you set ``EvaluateTargetHealth`` to ``true`` , Route 53 routes queries to the load balancer based on the health of the target groups that are associated with the load balancer: - For an Application or Network Load Balancer to be considered healthy, every target group that contains targets must contain at least one healthy target. If any target group contains only unhealthy targets, the load balancer is considered unhealthy, and Route 53 routes queries to other resources. - A target group that has no registered targets is considered unhealthy. .. epigraph:: When you create a load balancer, you configure settings for Elastic Load Balancing health checks; they're not Route 53 health checks, but they perform a similar function. Do not create Route 53 health checks for the EC2 instances that you register with an ELB load balancer. - **S3 buckets** - There are no special requirements for setting ``EvaluateTargetHealth`` to ``true`` when the alias target is an S3 bucket. - **Other records in the same hosted zone** - If the AWS resource that you specify in ``DNSName`` is a record or a group of records (for example, a group of weighted records) but is not another alias record, we recommend that you associate a health check with all of the records in the alias target. For more information, see `What Happens When You Omit Health Checks? <https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/dns-failover-complex-configs.html#dns-failover-complex-configs-hc-omitting>`_ in the *Amazon Route 53 Developer Guide* . For more information and examples, see `Amazon Route 53 Health Checks and DNS Failover <https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/dns-failover.html>`_ in the *Amazon Route 53 Developer Guide* .
12689
+ :param evaluate_target_health: *Applies only to alias, failover alias, geolocation alias, latency alias, and weighted alias resource record sets:* When ``EvaluateTargetHealth`` is ``true`` , an alias resource record set inherits the health of the referenced AWS resource, such as an ELB load balancer or another resource record set in the hosted zone. Note the following: - **CloudFront distributions** - You can't set ``EvaluateTargetHealth`` to ``true`` when the alias target is a CloudFront distribution. - **Elastic Beanstalk environments that have regionalized subdomains** - If you specify an Elastic Beanstalk environment in ``DNSName`` and the environment contains an ELB load balancer, Elastic Load Balancing routes queries only to the healthy Amazon EC2 instances that are registered with the load balancer. (An environment automatically contains an ELB load balancer if it includes more than one Amazon EC2 instance.) If you set ``EvaluateTargetHealth`` to ``true`` and either no Amazon EC2 instances are healthy or the load balancer itself is unhealthy, Route 53 routes queries to other available resources that are healthy, if any. If the environment contains a single Amazon EC2 instance, there are no special requirements. - **ELB load balancers** - Health checking behavior depends on the type of load balancer: - *Classic Load Balancers* : If you specify an ELB Classic Load Balancer in ``DNSName`` , Elastic Load Balancing routes queries only to the healthy Amazon EC2 instances that are registered with the load balancer. If you set ``EvaluateTargetHealth`` to ``true`` and either no EC2 instances are healthy or the load balancer itself is unhealthy, Route 53 routes queries to other resources. - *Application and Network Load Balancers* : If you specify an ELB Application or Network Load Balancer and you set ``EvaluateTargetHealth`` to ``true`` , Route 53 routes queries to the load balancer based on the health of the target groups that are associated with the load balancer: - For an Application or Network Load Balancer to be considered healthy, every target group that contains targets must contain at least one healthy target. If any target group contains only unhealthy targets, the load balancer is considered unhealthy, and Route 53 routes queries to other resources. - A target group that has no registered targets is considered unhealthy. .. epigraph:: When you create a load balancer, you configure settings for Elastic Load Balancing health checks; they're not Route 53 health checks, but they perform a similar function. Do not create Route 53 health checks for the EC2 instances that you register with an ELB load balancer. - **API Gateway APIs** - There are no special requirements for setting ``EvaluateTargetHealth`` to ``true`` when the alias target is an API Gateway API. However, because API Gateway is highly available by design, ``EvaluateTargetHealth`` provides no operational benefit and `Route 53 health checks <https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/dns-failover.html>`_ are recommended instead for failover scenarios. - **S3 buckets** - There are no special requirements for setting ``EvaluateTargetHealth`` to ``true`` when the alias target is an S3 bucket. However, because S3 buckets are highly available by design, ``EvaluateTargetHealth`` provides no operational benefit and `Route 53 health checks <https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/dns-failover.html>`_ are recommended instead for failover scenarios. - **VPC interface endpoints** - There are no special requirements for setting ``EvaluateTargetHealth`` to ``true`` when the alias target is a VPC interface endpoint. However, because VPC interface endpoints are highly available by design, ``EvaluateTargetHealth`` provides no operational benefit and `Route 53 health checks <https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/dns-failover.html>`_ are recommended instead for failover scenarios. - **Other records in the same hosted zone** - If the AWS resource that you specify in ``DNSName`` is a record or a group of records (for example, a group of weighted records) but is not another alias record, we recommend that you associate a health check with all of the records in the alias target. For more information, see `What Happens When You Omit Health Checks? <https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/dns-failover-complex-configs.html#dns-failover-complex-configs-hc-omitting>`_ in the *Amazon Route 53 Developer Guide* . .. epigraph:: While ``EvaluateTargetHealth`` can be set to ``true`` for highly available AWS services (such as S3 buckets, VPC interface endpoints, and API Gateway), these services are designed for high availability and rarely experience outages that would be detected by this feature. For failover scenarios with these services, consider using `Route 53 health checks <https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/dns-failover.html>`_ that monitor your application's ability to access the service instead. For more information and examples, see `Amazon Route 53 Health Checks and DNS Failover <https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/dns-failover.html>`_ in the *Amazon Route 53 Developer Guide* .
12690
12690
 
12691
12691
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-route53-recordset-aliastarget.html
12692
12692
  :exampleMetadata: fixture=_generated
@@ -12840,9 +12840,15 @@ class CfnRecordSet(
12840
12840
 
12841
12841
  When you create a load balancer, you configure settings for Elastic Load Balancing health checks; they're not Route 53 health checks, but they perform a similar function. Do not create Route 53 health checks for the EC2 instances that you register with an ELB load balancer.
12842
12842
 
12843
- - **S3 buckets** - There are no special requirements for setting ``EvaluateTargetHealth`` to ``true`` when the alias target is an S3 bucket.
12843
+ - **API Gateway APIs** - There are no special requirements for setting ``EvaluateTargetHealth`` to ``true`` when the alias target is an API Gateway API. However, because API Gateway is highly available by design, ``EvaluateTargetHealth`` provides no operational benefit and `Route 53 health checks <https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/dns-failover.html>`_ are recommended instead for failover scenarios.
12844
+ - **S3 buckets** - There are no special requirements for setting ``EvaluateTargetHealth`` to ``true`` when the alias target is an S3 bucket. However, because S3 buckets are highly available by design, ``EvaluateTargetHealth`` provides no operational benefit and `Route 53 health checks <https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/dns-failover.html>`_ are recommended instead for failover scenarios.
12845
+ - **VPC interface endpoints** - There are no special requirements for setting ``EvaluateTargetHealth`` to ``true`` when the alias target is a VPC interface endpoint. However, because VPC interface endpoints are highly available by design, ``EvaluateTargetHealth`` provides no operational benefit and `Route 53 health checks <https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/dns-failover.html>`_ are recommended instead for failover scenarios.
12844
12846
  - **Other records in the same hosted zone** - If the AWS resource that you specify in ``DNSName`` is a record or a group of records (for example, a group of weighted records) but is not another alias record, we recommend that you associate a health check with all of the records in the alias target. For more information, see `What Happens When You Omit Health Checks? <https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/dns-failover-complex-configs.html#dns-failover-complex-configs-hc-omitting>`_ in the *Amazon Route 53 Developer Guide* .
12845
12847
 
12848
+ .. epigraph::
12849
+
12850
+ While ``EvaluateTargetHealth`` can be set to ``true`` for highly available AWS services (such as S3 buckets, VPC interface endpoints, and API Gateway), these services are designed for high availability and rarely experience outages that would be detected by this feature. For failover scenarios with these services, consider using `Route 53 health checks <https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/dns-failover.html>`_ that monitor your application's ability to access the service instead.
12851
+
12846
12852
  For more information and examples, see `Amazon Route 53 Health Checks and DNS Failover <https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/dns-failover.html>`_ in the *Amazon Route 53 Developer Guide* .
12847
12853
 
12848
12854
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-route53-recordset-aliastarget.html#cfn-route53-recordset-aliastarget-evaluatetargethealth
@@ -1757,27 +1757,27 @@ class CfnLaunchTemplateConstraintProps:
1757
1757
  jsii_type="aws-cdk-lib.aws_servicecatalog.CfnPortfolioPrincipalAssociationProps",
1758
1758
  jsii_struct_bases=[],
1759
1759
  name_mapping={
1760
- "principal_type": "principalType",
1761
- "accept_language": "acceptLanguage",
1762
1760
  "portfolio_id": "portfolioId",
1763
1761
  "principal_arn": "principalArn",
1762
+ "principal_type": "principalType",
1763
+ "accept_language": "acceptLanguage",
1764
1764
  },
1765
1765
  )
1766
1766
  class CfnPortfolioPrincipalAssociationProps:
1767
1767
  def __init__(
1768
1768
  self,
1769
1769
  *,
1770
+ portfolio_id: builtins.str,
1771
+ principal_arn: builtins.str,
1770
1772
  principal_type: builtins.str,
1771
1773
  accept_language: typing.Optional[builtins.str] = None,
1772
- portfolio_id: typing.Optional[builtins.str] = None,
1773
- principal_arn: typing.Optional[builtins.str] = None,
1774
1774
  ) -> None:
1775
1775
  '''Properties for defining a ``CfnPortfolioPrincipalAssociation``.
1776
1776
 
1777
- :param principal_type: The principal type. The supported values are ``IAM`` and ``IAM_PATTERN`` .
1778
- :param accept_language: The language code. - ``jp`` - Japanese - ``zh`` - Chinese
1779
1777
  :param portfolio_id: The portfolio identifier.
1780
1778
  :param principal_arn: The ARN of the principal ( IAM user, role, or group).
1779
+ :param principal_type: The principal type. The supported values are ``IAM`` and ``IAM_PATTERN`` .
1780
+ :param accept_language: The language code. - ``jp`` - Japanese - ``zh`` - Chinese
1781
1781
 
1782
1782
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-servicecatalog-portfolioprincipalassociation.html
1783
1783
  :exampleMetadata: fixture=_generated
@@ -1789,29 +1789,47 @@ class CfnPortfolioPrincipalAssociationProps:
1789
1789
  from aws_cdk import aws_servicecatalog as servicecatalog
1790
1790
 
1791
1791
  cfn_portfolio_principal_association_props = servicecatalog.CfnPortfolioPrincipalAssociationProps(
1792
+ portfolio_id="portfolioId",
1793
+ principal_arn="principalArn",
1792
1794
  principal_type="principalType",
1793
1795
 
1794
1796
  # the properties below are optional
1795
- accept_language="acceptLanguage",
1796
- portfolio_id="portfolioId",
1797
- principal_arn="principalArn"
1797
+ accept_language="acceptLanguage"
1798
1798
  )
1799
1799
  '''
1800
1800
  if __debug__:
1801
1801
  type_hints = typing.get_type_hints(_typecheckingstub__86aa94ae9b8977b851184740615709136e8ab87d84e565bd4ed1c37202e743af)
1802
- check_type(argname="argument principal_type", value=principal_type, expected_type=type_hints["principal_type"])
1803
- check_type(argname="argument accept_language", value=accept_language, expected_type=type_hints["accept_language"])
1804
1802
  check_type(argname="argument portfolio_id", value=portfolio_id, expected_type=type_hints["portfolio_id"])
1805
1803
  check_type(argname="argument principal_arn", value=principal_arn, expected_type=type_hints["principal_arn"])
1804
+ check_type(argname="argument principal_type", value=principal_type, expected_type=type_hints["principal_type"])
1805
+ check_type(argname="argument accept_language", value=accept_language, expected_type=type_hints["accept_language"])
1806
1806
  self._values: typing.Dict[builtins.str, typing.Any] = {
1807
+ "portfolio_id": portfolio_id,
1808
+ "principal_arn": principal_arn,
1807
1809
  "principal_type": principal_type,
1808
1810
  }
1809
1811
  if accept_language is not None:
1810
1812
  self._values["accept_language"] = accept_language
1811
- if portfolio_id is not None:
1812
- self._values["portfolio_id"] = portfolio_id
1813
- if principal_arn is not None:
1814
- self._values["principal_arn"] = principal_arn
1813
+
1814
+ @builtins.property
1815
+ def portfolio_id(self) -> builtins.str:
1816
+ '''The portfolio identifier.
1817
+
1818
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-servicecatalog-portfolioprincipalassociation.html#cfn-servicecatalog-portfolioprincipalassociation-portfolioid
1819
+ '''
1820
+ result = self._values.get("portfolio_id")
1821
+ assert result is not None, "Required property 'portfolio_id' is missing"
1822
+ return typing.cast(builtins.str, result)
1823
+
1824
+ @builtins.property
1825
+ def principal_arn(self) -> builtins.str:
1826
+ '''The ARN of the principal ( IAM user, role, or group).
1827
+
1828
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-servicecatalog-portfolioprincipalassociation.html#cfn-servicecatalog-portfolioprincipalassociation-principalarn
1829
+ '''
1830
+ result = self._values.get("principal_arn")
1831
+ assert result is not None, "Required property 'principal_arn' is missing"
1832
+ return typing.cast(builtins.str, result)
1815
1833
 
1816
1834
  @builtins.property
1817
1835
  def principal_type(self) -> builtins.str:
@@ -1837,24 +1855,6 @@ class CfnPortfolioPrincipalAssociationProps:
1837
1855
  result = self._values.get("accept_language")
1838
1856
  return typing.cast(typing.Optional[builtins.str], result)
1839
1857
 
1840
- @builtins.property
1841
- def portfolio_id(self) -> typing.Optional[builtins.str]:
1842
- '''The portfolio identifier.
1843
-
1844
- :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-servicecatalog-portfolioprincipalassociation.html#cfn-servicecatalog-portfolioprincipalassociation-portfolioid
1845
- '''
1846
- result = self._values.get("portfolio_id")
1847
- return typing.cast(typing.Optional[builtins.str], result)
1848
-
1849
- @builtins.property
1850
- def principal_arn(self) -> typing.Optional[builtins.str]:
1851
- '''The ARN of the principal ( IAM user, role, or group).
1852
-
1853
- :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-servicecatalog-portfolioprincipalassociation.html#cfn-servicecatalog-portfolioprincipalassociation-principalarn
1854
- '''
1855
- result = self._values.get("principal_arn")
1856
- return typing.cast(typing.Optional[builtins.str], result)
1857
-
1858
1858
  def __eq__(self, rhs: typing.Any) -> builtins.bool:
1859
1859
  return isinstance(rhs, self.__class__) and rhs._values == self._values
1860
1860
 
@@ -9776,12 +9776,12 @@ class CfnPortfolioPrincipalAssociation(
9776
9776
  from aws_cdk import aws_servicecatalog as servicecatalog
9777
9777
 
9778
9778
  cfn_portfolio_principal_association = servicecatalog.CfnPortfolioPrincipalAssociation(self, "MyCfnPortfolioPrincipalAssociation",
9779
+ portfolio_id="portfolioId",
9780
+ principal_arn="principalArn",
9779
9781
  principal_type="principalType",
9780
9782
 
9781
9783
  # the properties below are optional
9782
- accept_language="acceptLanguage",
9783
- portfolio_id="portfolioId",
9784
- principal_arn="principalArn"
9784
+ accept_language="acceptLanguage"
9785
9785
  )
9786
9786
  '''
9787
9787
 
@@ -9790,28 +9790,28 @@ class CfnPortfolioPrincipalAssociation(
9790
9790
  scope: _constructs_77d1e7e8.Construct,
9791
9791
  id: builtins.str,
9792
9792
  *,
9793
+ portfolio_id: builtins.str,
9794
+ principal_arn: builtins.str,
9793
9795
  principal_type: builtins.str,
9794
9796
  accept_language: typing.Optional[builtins.str] = None,
9795
- portfolio_id: typing.Optional[builtins.str] = None,
9796
- principal_arn: typing.Optional[builtins.str] = None,
9797
9797
  ) -> None:
9798
9798
  '''
9799
9799
  :param scope: Scope in which this resource is defined.
9800
9800
  :param id: Construct identifier for this resource (unique in its scope).
9801
- :param principal_type: The principal type. The supported values are ``IAM`` and ``IAM_PATTERN`` .
9802
- :param accept_language: The language code. - ``jp`` - Japanese - ``zh`` - Chinese
9803
9801
  :param portfolio_id: The portfolio identifier.
9804
9802
  :param principal_arn: The ARN of the principal ( IAM user, role, or group).
9803
+ :param principal_type: The principal type. The supported values are ``IAM`` and ``IAM_PATTERN`` .
9804
+ :param accept_language: The language code. - ``jp`` - Japanese - ``zh`` - Chinese
9805
9805
  '''
9806
9806
  if __debug__:
9807
9807
  type_hints = typing.get_type_hints(_typecheckingstub__2b8a7d450a71f88f29341f360bc05a021b910027171e4e63c9be6c67c4d53b2a)
9808
9808
  check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
9809
9809
  check_type(argname="argument id", value=id, expected_type=type_hints["id"])
9810
9810
  props = CfnPortfolioPrincipalAssociationProps(
9811
- principal_type=principal_type,
9812
- accept_language=accept_language,
9813
9811
  portfolio_id=portfolio_id,
9814
9812
  principal_arn=principal_arn,
9813
+ principal_type=principal_type,
9814
+ accept_language=accept_language,
9815
9815
  )
9816
9816
 
9817
9817
  jsii.create(self.__class__, self, [scope, id, props])
@@ -9867,6 +9867,32 @@ class CfnPortfolioPrincipalAssociation(
9867
9867
  '''A reference to a PortfolioPrincipalAssociation resource.'''
9868
9868
  return typing.cast(PortfolioPrincipalAssociationReference, jsii.get(self, "portfolioPrincipalAssociationRef"))
9869
9869
 
9870
+ @builtins.property
9871
+ @jsii.member(jsii_name="portfolioId")
9872
+ def portfolio_id(self) -> builtins.str:
9873
+ '''The portfolio identifier.'''
9874
+ return typing.cast(builtins.str, jsii.get(self, "portfolioId"))
9875
+
9876
+ @portfolio_id.setter
9877
+ def portfolio_id(self, value: builtins.str) -> None:
9878
+ if __debug__:
9879
+ type_hints = typing.get_type_hints(_typecheckingstub__726706747073f477b14d5b31fa14aba7087b2fc4265414101c6069e458c605ef)
9880
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
9881
+ jsii.set(self, "portfolioId", value) # pyright: ignore[reportArgumentType]
9882
+
9883
+ @builtins.property
9884
+ @jsii.member(jsii_name="principalArn")
9885
+ def principal_arn(self) -> builtins.str:
9886
+ '''The ARN of the principal ( IAM user, role, or group).'''
9887
+ return typing.cast(builtins.str, jsii.get(self, "principalArn"))
9888
+
9889
+ @principal_arn.setter
9890
+ def principal_arn(self, value: builtins.str) -> None:
9891
+ if __debug__:
9892
+ type_hints = typing.get_type_hints(_typecheckingstub__71c52a4171fa242df45a083617e532d09ea08d89eea6a461f83e7608b28c48bb)
9893
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
9894
+ jsii.set(self, "principalArn", value) # pyright: ignore[reportArgumentType]
9895
+
9870
9896
  @builtins.property
9871
9897
  @jsii.member(jsii_name="principalType")
9872
9898
  def principal_type(self) -> builtins.str:
@@ -9893,32 +9919,6 @@ class CfnPortfolioPrincipalAssociation(
9893
9919
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
9894
9920
  jsii.set(self, "acceptLanguage", value) # pyright: ignore[reportArgumentType]
9895
9921
 
9896
- @builtins.property
9897
- @jsii.member(jsii_name="portfolioId")
9898
- def portfolio_id(self) -> typing.Optional[builtins.str]:
9899
- '''The portfolio identifier.'''
9900
- return typing.cast(typing.Optional[builtins.str], jsii.get(self, "portfolioId"))
9901
-
9902
- @portfolio_id.setter
9903
- def portfolio_id(self, value: typing.Optional[builtins.str]) -> None:
9904
- if __debug__:
9905
- type_hints = typing.get_type_hints(_typecheckingstub__726706747073f477b14d5b31fa14aba7087b2fc4265414101c6069e458c605ef)
9906
- check_type(argname="argument value", value=value, expected_type=type_hints["value"])
9907
- jsii.set(self, "portfolioId", value) # pyright: ignore[reportArgumentType]
9908
-
9909
- @builtins.property
9910
- @jsii.member(jsii_name="principalArn")
9911
- def principal_arn(self) -> typing.Optional[builtins.str]:
9912
- '''The ARN of the principal ( IAM user, role, or group).'''
9913
- return typing.cast(typing.Optional[builtins.str], jsii.get(self, "principalArn"))
9914
-
9915
- @principal_arn.setter
9916
- def principal_arn(self, value: typing.Optional[builtins.str]) -> None:
9917
- if __debug__:
9918
- type_hints = typing.get_type_hints(_typecheckingstub__71c52a4171fa242df45a083617e532d09ea08d89eea6a461f83e7608b28c48bb)
9919
- check_type(argname="argument value", value=value, expected_type=type_hints["value"])
9920
- jsii.set(self, "principalArn", value) # pyright: ignore[reportArgumentType]
9921
-
9922
9922
 
9923
9923
  @jsii.implements(_IInspectable_c2943556, IPortfolioProductAssociationRef)
9924
9924
  class CfnPortfolioProductAssociation(
@@ -10009,14 +10009,6 @@ class CfnPortfolioProductAssociation(
10009
10009
  '''The CloudFormation resource type name for this resource class.'''
10010
10010
  return typing.cast(builtins.str, jsii.sget(cls, "CFN_RESOURCE_TYPE_NAME"))
10011
10011
 
10012
- @builtins.property
10013
- @jsii.member(jsii_name="attrId")
10014
- def attr_id(self) -> builtins.str:
10015
- '''
10016
- :cloudformationAttribute: Id
10017
- '''
10018
- return typing.cast(builtins.str, jsii.get(self, "attrId"))
10019
-
10020
10012
  @builtins.property
10021
10013
  @jsii.member(jsii_name="cfnProperties")
10022
10014
  def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
@@ -11724,10 +11716,10 @@ def _typecheckingstub__782bde46fdc76fe863545140febd1fe95f163b327614047bf13a8ac26
11724
11716
 
11725
11717
  def _typecheckingstub__86aa94ae9b8977b851184740615709136e8ab87d84e565bd4ed1c37202e743af(
11726
11718
  *,
11719
+ portfolio_id: builtins.str,
11720
+ principal_arn: builtins.str,
11727
11721
  principal_type: builtins.str,
11728
11722
  accept_language: typing.Optional[builtins.str] = None,
11729
- portfolio_id: typing.Optional[builtins.str] = None,
11730
- principal_arn: typing.Optional[builtins.str] = None,
11731
11723
  ) -> None:
11732
11724
  """Type checking stubs"""
11733
11725
  pass
@@ -12974,10 +12966,10 @@ def _typecheckingstub__2b8a7d450a71f88f29341f360bc05a021b910027171e4e63c9be6c67c
12974
12966
  scope: _constructs_77d1e7e8.Construct,
12975
12967
  id: builtins.str,
12976
12968
  *,
12969
+ portfolio_id: builtins.str,
12970
+ principal_arn: builtins.str,
12977
12971
  principal_type: builtins.str,
12978
12972
  accept_language: typing.Optional[builtins.str] = None,
12979
- portfolio_id: typing.Optional[builtins.str] = None,
12980
- principal_arn: typing.Optional[builtins.str] = None,
12981
12973
  ) -> None:
12982
12974
  """Type checking stubs"""
12983
12975
  pass
@@ -12994,25 +12986,25 @@ def _typecheckingstub__257e8fbedbaa67aa61288a1f94be02039da4ac33558591be208505deb
12994
12986
  """Type checking stubs"""
12995
12987
  pass
12996
12988
 
12997
- def _typecheckingstub__66dbe3deef345271ae1cfb35b0e313622b15892928d8581127c03e117db33585(
12989
+ def _typecheckingstub__726706747073f477b14d5b31fa14aba7087b2fc4265414101c6069e458c605ef(
12998
12990
  value: builtins.str,
12999
12991
  ) -> None:
13000
12992
  """Type checking stubs"""
13001
12993
  pass
13002
12994
 
13003
- def _typecheckingstub__1390265bc6b4e797f81f5a56c99acfec9dceeb8b223c28fc92f325ebf1ee9136(
13004
- value: typing.Optional[builtins.str],
12995
+ def _typecheckingstub__71c52a4171fa242df45a083617e532d09ea08d89eea6a461f83e7608b28c48bb(
12996
+ value: builtins.str,
13005
12997
  ) -> None:
13006
12998
  """Type checking stubs"""
13007
12999
  pass
13008
13000
 
13009
- def _typecheckingstub__726706747073f477b14d5b31fa14aba7087b2fc4265414101c6069e458c605ef(
13010
- value: typing.Optional[builtins.str],
13001
+ def _typecheckingstub__66dbe3deef345271ae1cfb35b0e313622b15892928d8581127c03e117db33585(
13002
+ value: builtins.str,
13011
13003
  ) -> None:
13012
13004
  """Type checking stubs"""
13013
13005
  pass
13014
13006
 
13015
- def _typecheckingstub__71c52a4171fa242df45a083617e532d09ea08d89eea6a461f83e7608b28c48bb(
13007
+ def _typecheckingstub__1390265bc6b4e797f81f5a56c99acfec9dceeb8b223c28fc92f325ebf1ee9136(
13016
13008
  value: typing.Optional[builtins.str],
13017
13009
  ) -> None:
13018
13010
  """Type checking stubs"""