aws-cdk-lib 2.219.0__py3-none-any.whl → 2.221.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk-lib might be problematic. Click here for more details.

Files changed (290) hide show
  1. aws_cdk/__init__.py +33 -35
  2. aws_cdk/_jsii/__init__.py +1 -1
  3. aws_cdk/_jsii/{aws-cdk-lib@2.219.0.jsii.tgz → aws-cdk-lib@2.221.0.jsii.tgz} +0 -0
  4. aws_cdk/alexa_ask/__init__.py +3 -0
  5. aws_cdk/aws_accessanalyzer/__init__.py +3 -0
  6. aws_cdk/aws_acmpca/__init__.py +4 -1
  7. aws_cdk/aws_aiops/__init__.py +3 -0
  8. aws_cdk/aws_amazonmq/__init__.py +3 -29
  9. aws_cdk/aws_amplify/__init__.py +3 -0
  10. aws_cdk/aws_amplifyuibuilder/__init__.py +3 -0
  11. aws_cdk/aws_apigateway/__init__.py +3 -0
  12. aws_cdk/aws_apigatewayv2/__init__.py +3 -0
  13. aws_cdk/aws_appconfig/__init__.py +3 -29
  14. aws_cdk/aws_appflow/__init__.py +3 -0
  15. aws_cdk/aws_appintegrations/__init__.py +3 -0
  16. aws_cdk/aws_applicationautoscaling/__init__.py +3 -0
  17. aws_cdk/aws_applicationinsights/__init__.py +3 -0
  18. aws_cdk/aws_applicationsignals/__init__.py +453 -2
  19. aws_cdk/aws_appmesh/__init__.py +3 -0
  20. aws_cdk/aws_apprunner/__init__.py +3 -0
  21. aws_cdk/aws_appstream/__init__.py +3 -0
  22. aws_cdk/aws_appsync/__init__.py +3 -0
  23. aws_cdk/aws_apptest/__init__.py +3 -0
  24. aws_cdk/aws_aps/__init__.py +1168 -83
  25. aws_cdk/aws_arcregionswitch/__init__.py +11 -0
  26. aws_cdk/aws_arczonalshift/__init__.py +3 -0
  27. aws_cdk/aws_athena/__init__.py +3 -0
  28. aws_cdk/aws_auditmanager/__init__.py +3 -0
  29. aws_cdk/aws_autoscaling/__init__.py +3 -0
  30. aws_cdk/aws_autoscaling_common/__init__.py +3 -0
  31. aws_cdk/aws_autoscalingplans/__init__.py +3 -0
  32. aws_cdk/aws_b2bi/__init__.py +3 -0
  33. aws_cdk/aws_backup/__init__.py +32 -29
  34. aws_cdk/aws_backupgateway/__init__.py +3 -0
  35. aws_cdk/aws_batch/__init__.py +112 -7
  36. aws_cdk/aws_bcmdataexports/__init__.py +3 -0
  37. aws_cdk/aws_bedrock/__init__.py +53 -45
  38. aws_cdk/aws_bedrockagentcore/__init__.py +8499 -1732
  39. aws_cdk/aws_billingconductor/__init__.py +3 -0
  40. aws_cdk/aws_budgets/__init__.py +3 -0
  41. aws_cdk/aws_cassandra/__init__.py +3 -0
  42. aws_cdk/aws_ce/__init__.py +3 -0
  43. aws_cdk/aws_certificatemanager/__init__.py +3 -0
  44. aws_cdk/aws_chatbot/__init__.py +3 -0
  45. aws_cdk/aws_cleanrooms/__init__.py +3 -0
  46. aws_cdk/aws_cleanroomsml/__init__.py +3 -0
  47. aws_cdk/aws_cloud9/__init__.py +3 -0
  48. aws_cdk/aws_cloudformation/__init__.py +3 -0
  49. aws_cdk/aws_cloudfront/__init__.py +69 -3
  50. aws_cdk/aws_cloudfront/experimental/__init__.py +4 -0
  51. aws_cdk/aws_cloudfront_origins/__init__.py +87 -6
  52. aws_cdk/aws_cloudtrail/__init__.py +3 -0
  53. aws_cdk/aws_cloudwatch/__init__.py +8 -5
  54. aws_cdk/aws_codeartifact/__init__.py +3 -0
  55. aws_cdk/aws_codebuild/__init__.py +3 -0
  56. aws_cdk/aws_codecommit/__init__.py +3 -0
  57. aws_cdk/aws_codeconnections/__init__.py +3 -0
  58. aws_cdk/aws_codedeploy/__init__.py +3 -0
  59. aws_cdk/aws_codeguruprofiler/__init__.py +3 -0
  60. aws_cdk/aws_codegurureviewer/__init__.py +3 -0
  61. aws_cdk/aws_codepipeline/__init__.py +3 -0
  62. aws_cdk/aws_codepipeline_actions/__init__.py +3 -0
  63. aws_cdk/aws_codestar/__init__.py +3 -0
  64. aws_cdk/aws_codestarconnections/__init__.py +3 -0
  65. aws_cdk/aws_codestarnotifications/__init__.py +3 -0
  66. aws_cdk/aws_cognito/__init__.py +9 -4
  67. aws_cdk/aws_cognito_identitypool/__init__.py +3 -0
  68. aws_cdk/aws_comprehend/__init__.py +3 -0
  69. aws_cdk/aws_config/__init__.py +3 -0
  70. aws_cdk/aws_connect/__init__.py +1232 -2
  71. aws_cdk/aws_connectcampaigns/__init__.py +3 -0
  72. aws_cdk/aws_connectcampaignsv2/__init__.py +3 -0
  73. aws_cdk/aws_controltower/__init__.py +3 -0
  74. aws_cdk/aws_cur/__init__.py +3 -0
  75. aws_cdk/aws_customerprofiles/__init__.py +3 -29
  76. aws_cdk/aws_databrew/__init__.py +3 -0
  77. aws_cdk/aws_datapipeline/__init__.py +3 -0
  78. aws_cdk/aws_datasync/__init__.py +3 -0
  79. aws_cdk/aws_datazone/__init__.py +17 -15
  80. aws_cdk/aws_dax/__init__.py +15 -3
  81. aws_cdk/aws_deadline/__init__.py +3 -0
  82. aws_cdk/aws_detective/__init__.py +3 -0
  83. aws_cdk/aws_devicefarm/__init__.py +3 -0
  84. aws_cdk/aws_devopsguru/__init__.py +3 -0
  85. aws_cdk/aws_directoryservice/__init__.py +32 -0
  86. aws_cdk/aws_dlm/__init__.py +3 -0
  87. aws_cdk/aws_dms/__init__.py +3 -0
  88. aws_cdk/aws_docdb/__init__.py +14 -3
  89. aws_cdk/aws_docdbelastic/__init__.py +3 -0
  90. aws_cdk/aws_dsql/__init__.py +3 -0
  91. aws_cdk/aws_dynamodb/__init__.py +3 -0
  92. aws_cdk/aws_ec2/__init__.py +205 -48
  93. aws_cdk/aws_ecr/__init__.py +156 -33
  94. aws_cdk/aws_ecs/__init__.py +429 -182
  95. aws_cdk/aws_efs/__init__.py +3 -0
  96. aws_cdk/aws_eks/__init__.py +117 -67
  97. aws_cdk/aws_elasticache/__init__.py +3 -0
  98. aws_cdk/aws_elasticbeanstalk/__init__.py +3 -0
  99. aws_cdk/aws_elasticloadbalancing/__init__.py +3 -0
  100. aws_cdk/aws_elasticloadbalancingv2/__init__.py +445 -36
  101. aws_cdk/aws_elasticsearch/__init__.py +3 -0
  102. aws_cdk/aws_emr/__init__.py +3 -0
  103. aws_cdk/aws_emrcontainers/__init__.py +3 -0
  104. aws_cdk/aws_emrserverless/__init__.py +12 -11
  105. aws_cdk/aws_entityresolution/__init__.py +3 -0
  106. aws_cdk/aws_events/__init__.py +73 -29
  107. aws_cdk/aws_events_targets/__init__.py +3 -0
  108. aws_cdk/aws_eventschemas/__init__.py +3 -0
  109. aws_cdk/aws_evidently/__init__.py +3 -0
  110. aws_cdk/aws_evs/__init__.py +3 -0
  111. aws_cdk/aws_finspace/__init__.py +3 -0
  112. aws_cdk/aws_fis/__init__.py +3 -0
  113. aws_cdk/aws_fms/__init__.py +3 -0
  114. aws_cdk/aws_forecast/__init__.py +3 -0
  115. aws_cdk/aws_frauddetector/__init__.py +3 -0
  116. aws_cdk/aws_fsx/__init__.py +7 -4
  117. aws_cdk/aws_gamelift/__init__.py +3 -0
  118. aws_cdk/aws_gameliftstreams/__init__.py +8 -5
  119. aws_cdk/aws_globalaccelerator/__init__.py +3 -0
  120. aws_cdk/aws_glue/__init__.py +11 -80
  121. aws_cdk/aws_grafana/__init__.py +3 -0
  122. aws_cdk/aws_greengrass/__init__.py +3 -0
  123. aws_cdk/aws_greengrassv2/__init__.py +3 -0
  124. aws_cdk/aws_groundstation/__init__.py +3 -0
  125. aws_cdk/aws_guardduty/__init__.py +3 -0
  126. aws_cdk/aws_healthimaging/__init__.py +3 -0
  127. aws_cdk/aws_healthlake/__init__.py +3 -0
  128. aws_cdk/aws_iam/__init__.py +30 -32
  129. aws_cdk/aws_identitystore/__init__.py +3 -0
  130. aws_cdk/aws_imagebuilder/__init__.py +896 -0
  131. aws_cdk/aws_inspector/__init__.py +3 -0
  132. aws_cdk/aws_inspectorv2/__init__.py +3 -0
  133. aws_cdk/aws_internetmonitor/__init__.py +3 -0
  134. aws_cdk/aws_invoicing/__init__.py +3 -0
  135. aws_cdk/aws_iot/__init__.py +3 -0
  136. aws_cdk/aws_iotanalytics/__init__.py +3 -0
  137. aws_cdk/aws_iotcoredeviceadvisor/__init__.py +3 -0
  138. aws_cdk/aws_iotevents/__init__.py +3 -0
  139. aws_cdk/aws_iotfleethub/__init__.py +3 -0
  140. aws_cdk/aws_iotfleetwise/__init__.py +3 -0
  141. aws_cdk/aws_iotsitewise/__init__.py +139 -80
  142. aws_cdk/aws_iotthingsgraph/__init__.py +3 -0
  143. aws_cdk/aws_iottwinmaker/__init__.py +3 -87
  144. aws_cdk/aws_iotwireless/__init__.py +61 -0
  145. aws_cdk/aws_ivs/__init__.py +3 -0
  146. aws_cdk/aws_ivschat/__init__.py +3 -0
  147. aws_cdk/aws_kafkaconnect/__init__.py +3 -0
  148. aws_cdk/aws_kendra/__init__.py +3 -58
  149. aws_cdk/aws_kendraranking/__init__.py +3 -0
  150. aws_cdk/aws_kinesis/__init__.py +98 -4
  151. aws_cdk/aws_kinesisanalytics/__init__.py +3 -0
  152. aws_cdk/aws_kinesisanalyticsv2/__init__.py +3 -0
  153. aws_cdk/aws_kinesisfirehose/__init__.py +1709 -10
  154. aws_cdk/aws_kinesisvideo/__init__.py +3 -29
  155. aws_cdk/aws_kms/__init__.py +3 -0
  156. aws_cdk/aws_lakeformation/__init__.py +3 -0
  157. aws_cdk/aws_lambda/__init__.py +57 -7
  158. aws_cdk/aws_lambda_nodejs/__init__.py +3 -0
  159. aws_cdk/aws_launchwizard/__init__.py +3 -0
  160. aws_cdk/aws_lex/__init__.py +3 -29
  161. aws_cdk/aws_licensemanager/__init__.py +3 -0
  162. aws_cdk/aws_lightsail/__init__.py +587 -0
  163. aws_cdk/aws_location/__init__.py +3 -0
  164. aws_cdk/aws_logs/__init__.py +283 -9
  165. aws_cdk/aws_lookoutequipment/__init__.py +3 -29
  166. aws_cdk/aws_lookoutmetrics/__init__.py +17 -2
  167. aws_cdk/aws_lookoutvision/__init__.py +3 -0
  168. aws_cdk/aws_m2/__init__.py +62 -13
  169. aws_cdk/aws_macie/__init__.py +3 -0
  170. aws_cdk/aws_managedblockchain/__init__.py +3 -0
  171. aws_cdk/aws_mediaconnect/__init__.py +3 -0
  172. aws_cdk/aws_mediaconvert/__init__.py +3 -0
  173. aws_cdk/aws_medialive/__init__.py +279 -33
  174. aws_cdk/aws_mediapackage/__init__.py +3 -0
  175. aws_cdk/aws_mediapackagev2/__init__.py +3 -0
  176. aws_cdk/aws_mediastore/__init__.py +3 -0
  177. aws_cdk/aws_mediatailor/__init__.py +3 -58
  178. aws_cdk/aws_memorydb/__init__.py +3 -0
  179. aws_cdk/aws_mpa/__init__.py +3 -0
  180. aws_cdk/aws_msk/__init__.py +3 -0
  181. aws_cdk/aws_mwaa/__init__.py +8 -5
  182. aws_cdk/aws_neptune/__init__.py +188 -70
  183. aws_cdk/aws_neptunegraph/__init__.py +3 -0
  184. aws_cdk/aws_networkfirewall/__init__.py +3 -0
  185. aws_cdk/aws_networkmanager/__init__.py +32 -0
  186. aws_cdk/aws_nimblestudio/__init__.py +3 -0
  187. aws_cdk/aws_notifications/__init__.py +3 -0
  188. aws_cdk/aws_notificationscontacts/__init__.py +3 -0
  189. aws_cdk/aws_oam/__init__.py +3 -0
  190. aws_cdk/aws_observabilityadmin/__init__.py +1365 -187
  191. aws_cdk/aws_odb/__init__.py +4 -1
  192. aws_cdk/aws_omics/__init__.py +10 -1
  193. aws_cdk/aws_opensearchserverless/__init__.py +3 -0
  194. aws_cdk/aws_opensearchservice/__init__.py +9 -0
  195. aws_cdk/aws_opsworks/__init__.py +3 -0
  196. aws_cdk/aws_opsworkscm/__init__.py +3 -0
  197. aws_cdk/aws_organizations/__init__.py +3 -116
  198. aws_cdk/aws_osis/__init__.py +157 -0
  199. aws_cdk/aws_panorama/__init__.py +3 -0
  200. aws_cdk/aws_paymentcryptography/__init__.py +3 -0
  201. aws_cdk/aws_pcaconnectorad/__init__.py +3 -0
  202. aws_cdk/aws_pcaconnectorscep/__init__.py +3 -0
  203. aws_cdk/aws_pcs/__init__.py +227 -33
  204. aws_cdk/aws_personalize/__init__.py +3 -0
  205. aws_cdk/aws_pinpoint/__init__.py +61 -58
  206. aws_cdk/aws_pinpointemail/__init__.py +3 -0
  207. aws_cdk/aws_pipes/__init__.py +3 -0
  208. aws_cdk/aws_proton/__init__.py +3 -0
  209. aws_cdk/aws_qbusiness/__init__.py +3 -174
  210. aws_cdk/aws_qldb/__init__.py +3 -29
  211. aws_cdk/aws_quicksight/__init__.py +493 -406
  212. aws_cdk/aws_ram/__init__.py +3 -0
  213. aws_cdk/aws_rbin/__init__.py +3 -0
  214. aws_cdk/aws_rds/__init__.py +71 -42
  215. aws_cdk/aws_redshift/__init__.py +3 -0
  216. aws_cdk/aws_redshiftserverless/__init__.py +3 -0
  217. aws_cdk/aws_refactorspaces/__init__.py +21 -6
  218. aws_cdk/aws_rekognition/__init__.py +3 -29
  219. aws_cdk/aws_resiliencehub/__init__.py +3 -0
  220. aws_cdk/aws_resourceexplorer2/__init__.py +3 -0
  221. aws_cdk/aws_resourcegroups/__init__.py +3 -0
  222. aws_cdk/aws_robomaker/__init__.py +3 -0
  223. aws_cdk/aws_rolesanywhere/__init__.py +3 -0
  224. aws_cdk/aws_route53/__init__.py +148 -24
  225. aws_cdk/aws_route53_targets/__init__.py +3 -0
  226. aws_cdk/aws_route53profiles/__init__.py +3 -0
  227. aws_cdk/aws_route53recoverycontrol/__init__.py +3 -0
  228. aws_cdk/aws_route53recoveryreadiness/__init__.py +3 -0
  229. aws_cdk/aws_route53resolver/__init__.py +11 -4
  230. aws_cdk/aws_rum/__init__.py +3 -0
  231. aws_cdk/aws_s3/__init__.py +80 -43
  232. aws_cdk/aws_s3_deployment/__init__.py +3 -0
  233. aws_cdk/aws_s3express/__init__.py +3 -0
  234. aws_cdk/aws_s3objectlambda/__init__.py +47 -12
  235. aws_cdk/aws_s3outposts/__init__.py +3 -0
  236. aws_cdk/aws_s3tables/__init__.py +3 -0
  237. aws_cdk/aws_sagemaker/__init__.py +166 -87
  238. aws_cdk/aws_sam/__init__.py +3 -0
  239. aws_cdk/aws_scheduler/__init__.py +3 -29
  240. aws_cdk/aws_sdb/__init__.py +3 -0
  241. aws_cdk/aws_secretsmanager/__init__.py +3 -0
  242. aws_cdk/aws_securityhub/__init__.py +3 -0
  243. aws_cdk/aws_securitylake/__init__.py +3 -0
  244. aws_cdk/aws_servicecatalog/__init__.py +161 -144
  245. aws_cdk/aws_servicecatalogappregistry/__init__.py +3 -0
  246. aws_cdk/aws_servicediscovery/__init__.py +3 -0
  247. aws_cdk/aws_ses/__init__.py +3 -0
  248. aws_cdk/aws_shield/__init__.py +3 -0
  249. aws_cdk/aws_signer/__init__.py +3 -0
  250. aws_cdk/aws_simspaceweaver/__init__.py +3 -0
  251. aws_cdk/aws_smsvoice/__init__.py +3 -29
  252. aws_cdk/aws_sns/__init__.py +3 -0
  253. aws_cdk/aws_sqs/__init__.py +3 -0
  254. aws_cdk/aws_ssm/__init__.py +10 -3
  255. aws_cdk/aws_ssmcontacts/__init__.py +3 -0
  256. aws_cdk/aws_ssmguiconnect/__init__.py +3 -0
  257. aws_cdk/aws_ssmincidents/__init__.py +3 -0
  258. aws_cdk/aws_ssmquicksetup/__init__.py +470 -3
  259. aws_cdk/aws_sso/__init__.py +3 -0
  260. aws_cdk/aws_stepfunctions/__init__.py +23 -19
  261. aws_cdk/aws_stepfunctions_tasks/__init__.py +6 -3
  262. aws_cdk/aws_supportapp/__init__.py +3 -0
  263. aws_cdk/aws_synthetics/__init__.py +80 -27
  264. aws_cdk/aws_systemsmanagersap/__init__.py +3 -0
  265. aws_cdk/aws_timestream/__init__.py +3 -29
  266. aws_cdk/aws_transfer/__init__.py +20 -34
  267. aws_cdk/aws_verifiedpermissions/__init__.py +3 -0
  268. aws_cdk/aws_voiceid/__init__.py +3 -0
  269. aws_cdk/aws_vpclattice/__init__.py +7 -4
  270. aws_cdk/aws_waf/__init__.py +3 -0
  271. aws_cdk/aws_wafregional/__init__.py +3 -0
  272. aws_cdk/aws_wafv2/__init__.py +3 -0
  273. aws_cdk/aws_wisdom/__init__.py +3 -116
  274. aws_cdk/aws_workspaces/__init__.py +3 -0
  275. aws_cdk/aws_workspacesinstances/__init__.py +3 -0
  276. aws_cdk/aws_workspacesthinclient/__init__.py +3 -0
  277. aws_cdk/aws_workspacesweb/__init__.py +3 -0
  278. aws_cdk/aws_xray/__init__.py +3 -0
  279. aws_cdk/cloud_assembly_schema/__init__.py +3 -0
  280. aws_cdk/cx_api/__init__.py +34 -0
  281. aws_cdk/pipelines/__init__.py +3 -0
  282. aws_cdk/region_info/__init__.py +3 -0
  283. aws_cdk/triggers/__init__.py +3 -0
  284. {aws_cdk_lib-2.219.0.dist-info → aws_cdk_lib-2.221.0.dist-info}/METADATA +2 -2
  285. aws_cdk_lib-2.221.0.dist-info/RECORD +313 -0
  286. aws_cdk_lib-2.219.0.dist-info/RECORD +0 -313
  287. {aws_cdk_lib-2.219.0.dist-info → aws_cdk_lib-2.221.0.dist-info}/LICENSE +0 -0
  288. {aws_cdk_lib-2.219.0.dist-info → aws_cdk_lib-2.221.0.dist-info}/NOTICE +0 -0
  289. {aws_cdk_lib-2.219.0.dist-info → aws_cdk_lib-2.221.0.dist-info}/WHEEL +0 -0
  290. {aws_cdk_lib-2.219.0.dist-info → aws_cdk_lib-2.221.0.dist-info}/top_level.txt +0 -0
@@ -780,27 +780,6 @@ class CfnStream(
780
780
 
781
781
  jsii.create(self.__class__, self, [scope, id, props])
782
782
 
783
- @jsii.member(jsii_name="fromStreamArn")
784
- @builtins.classmethod
785
- def from_stream_arn(
786
- cls,
787
- scope: _constructs_77d1e7e8.Construct,
788
- id: builtins.str,
789
- arn: builtins.str,
790
- ) -> IStreamRef:
791
- '''Creates a new IStreamRef from an ARN.
792
-
793
- :param scope: -
794
- :param id: -
795
- :param arn: -
796
- '''
797
- if __debug__:
798
- type_hints = typing.get_type_hints(_typecheckingstub__fe0f44c811e2d2cc90117554fb9deac330b94d4acd5a32161f8a4592bdd478e7)
799
- check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
800
- check_type(argname="argument id", value=id, expected_type=type_hints["id"])
801
- check_type(argname="argument arn", value=arn, expected_type=type_hints["arn"])
802
- return typing.cast(IStreamRef, jsii.sinvoke(cls, "fromStreamArn", [scope, id, arn]))
803
-
804
783
  @jsii.member(jsii_name="inspect")
805
784
  def inspect(self, inspector: _TreeInspector_488e0dd5) -> None:
806
785
  '''Examines the CloudFormation resource and discloses attributes.
@@ -1049,14 +1028,6 @@ def _typecheckingstub__9ec46ef966c55301f1d7f90935a5a7340c3d7ee98963234b59d16d191
1049
1028
  """Type checking stubs"""
1050
1029
  pass
1051
1030
 
1052
- def _typecheckingstub__fe0f44c811e2d2cc90117554fb9deac330b94d4acd5a32161f8a4592bdd478e7(
1053
- scope: _constructs_77d1e7e8.Construct,
1054
- id: builtins.str,
1055
- arn: builtins.str,
1056
- ) -> None:
1057
- """Type checking stubs"""
1058
- pass
1059
-
1060
1031
  def _typecheckingstub__9cce8d8f4e1ffc1f91558eea316dc5656b61eced6fd4e5ed8f9c5d2aedaeb00f(
1061
1032
  inspector: _TreeInspector_488e0dd5,
1062
1033
  ) -> None:
@@ -1104,3 +1075,6 @@ def _typecheckingstub__916b61187a1fea0754be9981eeeb345ba75e61b6417bbde10d8246657
1104
1075
  ) -> None:
1105
1076
  """Type checking stubs"""
1106
1077
  pass
1078
+
1079
+ for cls in [ISignalingChannelRef, IStreamRef]:
1080
+ typing.cast(typing.Any, cls).__protocol_attrs__ = typing.cast(typing.Any, cls).__protocol_attrs__ - set(['__jsii_proxy_class__', '__jsii_type__'])
@@ -4532,3 +4532,6 @@ def _typecheckingstub__889887809ebfcb10b086b9443331082b607fe1c8b476e14ebc4925835
4532
4532
  ) -> None:
4533
4533
  """Type checking stubs"""
4534
4534
  pass
4535
+
4536
+ for cls in [IAlias, IAliasRef, IKey, IKeyRef, IReplicaKeyRef]:
4537
+ typing.cast(typing.Any, cls).__protocol_attrs__ = typing.cast(typing.Any, cls).__protocol_attrs__ - set(['__jsii_proxy_class__', '__jsii_type__'])
@@ -7160,3 +7160,6 @@ def _typecheckingstub__dbfafd4ff73d1cb58139774825c816ddf21d5913087c696e01ca730ed
7160
7160
  ) -> None:
7161
7161
  """Type checking stubs"""
7162
7162
  pass
7163
+
7164
+ for cls in [IDataCellsFilterRef, IDataLakeSettingsRef, IPermissionsRef, IPrincipalPermissionsRef, IResourceRef, ITagAssociationRef, ITagRef]:
7165
+ typing.cast(typing.Any, cls).__protocol_attrs__ = typing.cast(typing.Any, cls).__protocol_attrs__ - set(['__jsii_proxy_class__', '__jsii_type__'])
@@ -661,6 +661,17 @@ CfnOutput(self, "TheUrl",
661
661
  )
662
662
  ```
663
663
 
664
+ ### Important Function URL Permission Update - Oct 2025
665
+
666
+ Starting Oct 2025, Function URL invocation will require two permissions
667
+
668
+ * lambda:InvokeFunctionUrl
669
+ * lambda:InvokeFunction (New)
670
+
671
+ CDK has updated `grantInvokeUrl` and `addFunctionUrl` to add both permission above.
672
+
673
+ If your existing CDK stack uses `grantInvokeUrl` or `addFunctionUrl`, your next deployment will automatically add the `lambda:InvokeFunction` permission without requiring any code changes. This ensures your Function URLs continue working seamlessly. No additional actions are needed.
674
+
664
675
  ### CORS configuration for Function URLs
665
676
 
666
677
  If you want your Function URLs to be invokable from a web page in browser, you
@@ -5343,8 +5354,8 @@ class CfnPermissionProps:
5343
5354
  :param function_name: The name or ARN of the Lambda function, version, or alias. **Name formats** - *Function name* – ``my-function`` (name-only), ``my-function:v1`` (with alias). - *Function ARN* – ``arn:aws:lambda:us-west-2:123456789012:function:my-function`` . - *Partial ARN* – ``123456789012:function:my-function`` . You can append a version number or alias to any of the formats. The length constraint applies only to the full ARN. If you specify only the function name, it is limited to 64 characters in length.
5344
5355
  :param principal: The AWS service , AWS account , IAM user, or IAM role that invokes the function. If you specify a service, use ``SourceArn`` or ``SourceAccount`` to limit who can invoke the function through that service.
5345
5356
  :param event_source_token: For Alexa Smart Home functions, a token that the invoker must supply.
5346
- :param function_url_auth_type: The type of authentication that your function URL uses. Set to ``AWS_IAM`` if you want to restrict access to authenticated users only. Set to ``NONE`` if you want to bypass IAM authentication to create a public endpoint. For more information, see `Security and auth model for Lambda function URLs <https://docs.aws.amazon.com/lambda/latest/dg/urls-auth.html>`_ .
5347
- :param invoked_via_function_url:
5357
+ :param function_url_auth_type: The type of authentication that your function URL uses. Set to ``AWS_IAM`` if you want to restrict access to authenticated users only. Set to ``NONE`` if you want to bypass IAM authentication to create a public endpoint. For more information, see `Control access to Lambda function URLs <https://docs.aws.amazon.com/lambda/latest/dg/urls-auth.html>`_ .
5358
+ :param invoked_via_function_url: Restricts the ``lambda:InvokeFunction`` action to function URL calls. When set to ``true`` , this prevents the principal from invoking the function by any means other than the function URL. For more information, see `Control access to Lambda function URLs <https://docs.aws.amazon.com/lambda/latest/dg/urls-auth.html>`_ .
5348
5359
  :param principal_org_id: The identifier for your organization in AWS Organizations . Use this to grant permissions to all the AWS accounts under this organization.
5349
5360
  :param source_account: For AWS service , the ID of the AWS account that owns the resource. Use this together with ``SourceArn`` to ensure that the specified account owns the resource. It is possible for an Amazon S3 bucket to be deleted by its owner and recreated by another account.
5350
5361
  :param source_arn: For AWS services , the ARN of the AWS resource that invokes the function. For example, an Amazon S3 bucket or Amazon SNS topic. Note that Lambda configures the comparison using the ``StringLike`` operator.
@@ -5455,7 +5466,7 @@ class CfnPermissionProps:
5455
5466
  def function_url_auth_type(self) -> typing.Optional[builtins.str]:
5456
5467
  '''The type of authentication that your function URL uses.
5457
5468
 
5458
- Set to ``AWS_IAM`` if you want to restrict access to authenticated users only. Set to ``NONE`` if you want to bypass IAM authentication to create a public endpoint. For more information, see `Security and auth model for Lambda function URLs <https://docs.aws.amazon.com/lambda/latest/dg/urls-auth.html>`_ .
5469
+ Set to ``AWS_IAM`` if you want to restrict access to authenticated users only. Set to ``NONE`` if you want to bypass IAM authentication to create a public endpoint. For more information, see `Control access to Lambda function URLs <https://docs.aws.amazon.com/lambda/latest/dg/urls-auth.html>`_ .
5459
5470
 
5460
5471
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lambda-permission.html#cfn-lambda-permission-functionurlauthtype
5461
5472
  '''
@@ -5466,7 +5477,10 @@ class CfnPermissionProps:
5466
5477
  def invoked_via_function_url(
5467
5478
  self,
5468
5479
  ) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
5469
- '''
5480
+ '''Restricts the ``lambda:InvokeFunction`` action to function URL calls.
5481
+
5482
+ When set to ``true`` , this prevents the principal from invoking the function by any means other than the function URL. For more information, see `Control access to Lambda function URLs <https://docs.aws.amazon.com/lambda/latest/dg/urls-auth.html>`_ .
5483
+
5470
5484
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lambda-permission.html#cfn-lambda-permission-invokedviafunctionurl
5471
5485
  '''
5472
5486
  result = self._values.get("invoked_via_function_url")
@@ -15337,6 +15351,7 @@ class ParamsAndSecretsVersions(enum.Enum):
15337
15351
  "action": "action",
15338
15352
  "event_source_token": "eventSourceToken",
15339
15353
  "function_url_auth_type": "functionUrlAuthType",
15354
+ "invoked_via_function_url": "invokedViaFunctionUrl",
15340
15355
  "organization_id": "organizationId",
15341
15356
  "scope": "scope",
15342
15357
  "source_account": "sourceAccount",
@@ -15351,6 +15366,7 @@ class Permission:
15351
15366
  action: typing.Optional[builtins.str] = None,
15352
15367
  event_source_token: typing.Optional[builtins.str] = None,
15353
15368
  function_url_auth_type: typing.Optional[FunctionUrlAuthType] = None,
15369
+ invoked_via_function_url: typing.Optional[builtins.bool] = None,
15354
15370
  organization_id: typing.Optional[builtins.str] = None,
15355
15371
  scope: typing.Optional[_constructs_77d1e7e8.Construct] = None,
15356
15372
  source_account: typing.Optional[builtins.str] = None,
@@ -15362,6 +15378,7 @@ class Permission:
15362
15378
  :param action: The Lambda actions that you want to allow in this statement. For example, you can specify lambda:CreateFunction to specify a certain action, or use a wildcard (``lambda:*``) to grant permission to all Lambda actions. For a list of actions, see Actions and Condition Context Keys for AWS Lambda in the IAM User Guide. Default: 'lambda:InvokeFunction'
15363
15379
  :param event_source_token: A unique token that must be supplied by the principal invoking the function. Default: - The caller would not need to present a token.
15364
15380
  :param function_url_auth_type: The authType for the function URL that you are granting permissions for. Default: - No functionUrlAuthType
15381
+ :param invoked_via_function_url: The condition key for limiting the scope of lambda:InvokeFunction action to Function URL only. When set to true, it restricts the principal in this policy to perform invokes for the resource only via Function URLs. Default: - false
15365
15382
  :param organization_id: The organization you want to grant permissions to. Use this ONLY if you need to grant permissions to a subset of the organization. If you want to grant permissions to the entire organization, sending the organization principal through the ``principal`` property will suffice. You can use this property to ensure that all source principals are owned by a specific organization. Default: - No organizationId
15366
15383
  :param scope: The scope to which the permission constructs be attached. The default is the Lambda function construct itself, but this would need to be different in cases such as cross-stack references where the Permissions would need to sit closer to the consumer of this permission (i.e., the caller). Default: - The instance of lambda.IFunction
15367
15384
  :param source_account: The AWS account ID (without hyphens) of the source owner. For example, if you specify an S3 bucket in the SourceArn property, this value is the bucket owner's account ID. You can use this property to ensure that all source principals are owned by a specific account.
@@ -15389,6 +15406,7 @@ class Permission:
15389
15406
  check_type(argname="argument action", value=action, expected_type=type_hints["action"])
15390
15407
  check_type(argname="argument event_source_token", value=event_source_token, expected_type=type_hints["event_source_token"])
15391
15408
  check_type(argname="argument function_url_auth_type", value=function_url_auth_type, expected_type=type_hints["function_url_auth_type"])
15409
+ check_type(argname="argument invoked_via_function_url", value=invoked_via_function_url, expected_type=type_hints["invoked_via_function_url"])
15392
15410
  check_type(argname="argument organization_id", value=organization_id, expected_type=type_hints["organization_id"])
15393
15411
  check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
15394
15412
  check_type(argname="argument source_account", value=source_account, expected_type=type_hints["source_account"])
@@ -15402,6 +15420,8 @@ class Permission:
15402
15420
  self._values["event_source_token"] = event_source_token
15403
15421
  if function_url_auth_type is not None:
15404
15422
  self._values["function_url_auth_type"] = function_url_auth_type
15423
+ if invoked_via_function_url is not None:
15424
+ self._values["invoked_via_function_url"] = invoked_via_function_url
15405
15425
  if organization_id is not None:
15406
15426
  self._values["organization_id"] = organization_id
15407
15427
  if scope is not None:
@@ -15463,6 +15483,17 @@ class Permission:
15463
15483
  result = self._values.get("function_url_auth_type")
15464
15484
  return typing.cast(typing.Optional[FunctionUrlAuthType], result)
15465
15485
 
15486
+ @builtins.property
15487
+ def invoked_via_function_url(self) -> typing.Optional[builtins.bool]:
15488
+ '''The condition key for limiting the scope of lambda:InvokeFunction action to Function URL only.
15489
+
15490
+ When set to true, it restricts the principal in this policy to perform invokes for the resource only via Function URLs.
15491
+
15492
+ :default: - false
15493
+ '''
15494
+ result = self._values.get("invoked_via_function_url")
15495
+ return typing.cast(typing.Optional[builtins.bool], result)
15496
+
15466
15497
  @builtins.property
15467
15498
  def organization_id(self) -> typing.Optional[builtins.str]:
15468
15499
  '''The organization you want to grant permissions to.
@@ -24700,7 +24731,7 @@ class CfnPermission(
24700
24731
 
24701
24732
  To grant permission to another account, specify the account ID as the ``Principal`` . To grant permission to an organization defined in AWS Organizations , specify the organization ID as the ``PrincipalOrgID`` . For AWS services, the principal is a domain-style identifier defined by the service, like ``s3.amazonaws.com`` or ``sns.amazonaws.com`` . For AWS services, you can also specify the ARN of the associated resource as the ``SourceArn`` . If you grant permission to a service principal without specifying the source, other accounts could potentially configure resources in their account to invoke your Lambda function.
24702
24733
 
24703
- If your function has a function URL, you can specify the ``FunctionUrlAuthType`` parameter. This adds a condition to your permission that only applies when your function URL's ``AuthType`` matches the specified ``FunctionUrlAuthType`` . For more information about the ``AuthType`` parameter, see `Security and auth model for Lambda function URLs <https://docs.aws.amazon.com/lambda/latest/dg/urls-auth.html>`_ .
24734
+ If your function has a function URL, you can specify the ``FunctionUrlAuthType`` parameter. This adds a condition to your permission that only applies when your function URL's ``AuthType`` matches the specified ``FunctionUrlAuthType`` . For more information about the ``AuthType`` parameter, see `Control access to Lambda function URLs <https://docs.aws.amazon.com/lambda/latest/dg/urls-auth.html>`_ .
24704
24735
 
24705
24736
  This resource adds a statement to a resource-based permission policy for the function. For more information about function policies, see `Lambda Function Policies <https://docs.aws.amazon.com/lambda/latest/dg/access-control-resource-based.html>`_ .
24706
24737
 
@@ -24751,8 +24782,8 @@ class CfnPermission(
24751
24782
  :param function_name: The name or ARN of the Lambda function, version, or alias. **Name formats** - *Function name* – ``my-function`` (name-only), ``my-function:v1`` (with alias). - *Function ARN* – ``arn:aws:lambda:us-west-2:123456789012:function:my-function`` . - *Partial ARN* – ``123456789012:function:my-function`` . You can append a version number or alias to any of the formats. The length constraint applies only to the full ARN. If you specify only the function name, it is limited to 64 characters in length.
24752
24783
  :param principal: The AWS service , AWS account , IAM user, or IAM role that invokes the function. If you specify a service, use ``SourceArn`` or ``SourceAccount`` to limit who can invoke the function through that service.
24753
24784
  :param event_source_token: For Alexa Smart Home functions, a token that the invoker must supply.
24754
- :param function_url_auth_type: The type of authentication that your function URL uses. Set to ``AWS_IAM`` if you want to restrict access to authenticated users only. Set to ``NONE`` if you want to bypass IAM authentication to create a public endpoint. For more information, see `Security and auth model for Lambda function URLs <https://docs.aws.amazon.com/lambda/latest/dg/urls-auth.html>`_ .
24755
- :param invoked_via_function_url:
24785
+ :param function_url_auth_type: The type of authentication that your function URL uses. Set to ``AWS_IAM`` if you want to restrict access to authenticated users only. Set to ``NONE`` if you want to bypass IAM authentication to create a public endpoint. For more information, see `Control access to Lambda function URLs <https://docs.aws.amazon.com/lambda/latest/dg/urls-auth.html>`_ .
24786
+ :param invoked_via_function_url: Restricts the ``lambda:InvokeFunction`` action to function URL calls. When set to ``true`` , this prevents the principal from invoking the function by any means other than the function URL. For more information, see `Control access to Lambda function URLs <https://docs.aws.amazon.com/lambda/latest/dg/urls-auth.html>`_ .
24756
24787
  :param principal_org_id: The identifier for your organization in AWS Organizations . Use this to grant permissions to all the AWS accounts under this organization.
24757
24788
  :param source_account: For AWS service , the ID of the AWS account that owns the resource. Use this together with ``SourceArn`` to ensure that the specified account owns the resource. It is possible for an Amazon S3 bucket to be deleted by its owner and recreated by another account.
24758
24789
  :param source_arn: For AWS services , the ARN of the AWS resource that invokes the function. For example, an Amazon S3 bucket or Amazon SNS topic. Note that Lambda configures the comparison using the ``StringLike`` operator.
@@ -24894,6 +24925,7 @@ class CfnPermission(
24894
24925
  def invoked_via_function_url(
24895
24926
  self,
24896
24927
  ) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
24928
+ '''Restricts the ``lambda:InvokeFunction`` action to function URL calls.'''
24897
24929
  return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], jsii.get(self, "invokedViaFunctionUrl"))
24898
24930
 
24899
24931
  @invoked_via_function_url.setter
@@ -27005,6 +27037,7 @@ class IFunction(
27005
27037
  action: typing.Optional[builtins.str] = None,
27006
27038
  event_source_token: typing.Optional[builtins.str] = None,
27007
27039
  function_url_auth_type: typing.Optional[FunctionUrlAuthType] = None,
27040
+ invoked_via_function_url: typing.Optional[builtins.bool] = None,
27008
27041
  organization_id: typing.Optional[builtins.str] = None,
27009
27042
  scope: typing.Optional[_constructs_77d1e7e8.Construct] = None,
27010
27043
  source_account: typing.Optional[builtins.str] = None,
@@ -27017,6 +27050,7 @@ class IFunction(
27017
27050
  :param action: The Lambda actions that you want to allow in this statement. For example, you can specify lambda:CreateFunction to specify a certain action, or use a wildcard (``lambda:*``) to grant permission to all Lambda actions. For a list of actions, see Actions and Condition Context Keys for AWS Lambda in the IAM User Guide. Default: 'lambda:InvokeFunction'
27018
27051
  :param event_source_token: A unique token that must be supplied by the principal invoking the function. Default: - The caller would not need to present a token.
27019
27052
  :param function_url_auth_type: The authType for the function URL that you are granting permissions for. Default: - No functionUrlAuthType
27053
+ :param invoked_via_function_url: The condition key for limiting the scope of lambda:InvokeFunction action to Function URL only. When set to true, it restricts the principal in this policy to perform invokes for the resource only via Function URLs. Default: - false
27020
27054
  :param organization_id: The organization you want to grant permissions to. Use this ONLY if you need to grant permissions to a subset of the organization. If you want to grant permissions to the entire organization, sending the organization principal through the ``principal`` property will suffice. You can use this property to ensure that all source principals are owned by a specific organization. Default: - No organizationId
27021
27055
  :param scope: The scope to which the permission constructs be attached. The default is the Lambda function construct itself, but this would need to be different in cases such as cross-stack references where the Permissions would need to sit closer to the consumer of this permission (i.e., the caller). Default: - The instance of lambda.IFunction
27022
27056
  :param source_account: The AWS account ID (without hyphens) of the source owner. For example, if you specify an S3 bucket in the SourceArn property, this value is the bucket owner's account ID. You can use this property to ensure that all source principals are owned by a specific account.
@@ -27504,6 +27538,7 @@ class _IFunctionProxy(
27504
27538
  action: typing.Optional[builtins.str] = None,
27505
27539
  event_source_token: typing.Optional[builtins.str] = None,
27506
27540
  function_url_auth_type: typing.Optional[FunctionUrlAuthType] = None,
27541
+ invoked_via_function_url: typing.Optional[builtins.bool] = None,
27507
27542
  organization_id: typing.Optional[builtins.str] = None,
27508
27543
  scope: typing.Optional[_constructs_77d1e7e8.Construct] = None,
27509
27544
  source_account: typing.Optional[builtins.str] = None,
@@ -27516,6 +27551,7 @@ class _IFunctionProxy(
27516
27551
  :param action: The Lambda actions that you want to allow in this statement. For example, you can specify lambda:CreateFunction to specify a certain action, or use a wildcard (``lambda:*``) to grant permission to all Lambda actions. For a list of actions, see Actions and Condition Context Keys for AWS Lambda in the IAM User Guide. Default: 'lambda:InvokeFunction'
27517
27552
  :param event_source_token: A unique token that must be supplied by the principal invoking the function. Default: - The caller would not need to present a token.
27518
27553
  :param function_url_auth_type: The authType for the function URL that you are granting permissions for. Default: - No functionUrlAuthType
27554
+ :param invoked_via_function_url: The condition key for limiting the scope of lambda:InvokeFunction action to Function URL only. When set to true, it restricts the principal in this policy to perform invokes for the resource only via Function URLs. Default: - false
27519
27555
  :param organization_id: The organization you want to grant permissions to. Use this ONLY if you need to grant permissions to a subset of the organization. If you want to grant permissions to the entire organization, sending the organization principal through the ``principal`` property will suffice. You can use this property to ensure that all source principals are owned by a specific organization. Default: - No organizationId
27520
27556
  :param scope: The scope to which the permission constructs be attached. The default is the Lambda function construct itself, but this would need to be different in cases such as cross-stack references where the Permissions would need to sit closer to the consumer of this permission (i.e., the caller). Default: - The instance of lambda.IFunction
27521
27557
  :param source_account: The AWS account ID (without hyphens) of the source owner. For example, if you specify an S3 bucket in the SourceArn property, this value is the bucket owner's account ID. You can use this property to ensure that all source principals are owned by a specific account.
@@ -27531,6 +27567,7 @@ class _IFunctionProxy(
27531
27567
  action=action,
27532
27568
  event_source_token=event_source_token,
27533
27569
  function_url_auth_type=function_url_auth_type,
27570
+ invoked_via_function_url=invoked_via_function_url,
27534
27571
  organization_id=organization_id,
27535
27572
  scope=scope,
27536
27573
  source_account=source_account,
@@ -28806,6 +28843,7 @@ class FunctionBase(
28806
28843
  action: typing.Optional[builtins.str] = None,
28807
28844
  event_source_token: typing.Optional[builtins.str] = None,
28808
28845
  function_url_auth_type: typing.Optional[FunctionUrlAuthType] = None,
28846
+ invoked_via_function_url: typing.Optional[builtins.bool] = None,
28809
28847
  organization_id: typing.Optional[builtins.str] = None,
28810
28848
  scope: typing.Optional[_constructs_77d1e7e8.Construct] = None,
28811
28849
  source_account: typing.Optional[builtins.str] = None,
@@ -28818,6 +28856,7 @@ class FunctionBase(
28818
28856
  :param action: The Lambda actions that you want to allow in this statement. For example, you can specify lambda:CreateFunction to specify a certain action, or use a wildcard (``lambda:*``) to grant permission to all Lambda actions. For a list of actions, see Actions and Condition Context Keys for AWS Lambda in the IAM User Guide. Default: 'lambda:InvokeFunction'
28819
28857
  :param event_source_token: A unique token that must be supplied by the principal invoking the function. Default: - The caller would not need to present a token.
28820
28858
  :param function_url_auth_type: The authType for the function URL that you are granting permissions for. Default: - No functionUrlAuthType
28859
+ :param invoked_via_function_url: The condition key for limiting the scope of lambda:InvokeFunction action to Function URL only. When set to true, it restricts the principal in this policy to perform invokes for the resource only via Function URLs. Default: - false
28821
28860
  :param organization_id: The organization you want to grant permissions to. Use this ONLY if you need to grant permissions to a subset of the organization. If you want to grant permissions to the entire organization, sending the organization principal through the ``principal`` property will suffice. You can use this property to ensure that all source principals are owned by a specific organization. Default: - No organizationId
28822
28861
  :param scope: The scope to which the permission constructs be attached. The default is the Lambda function construct itself, but this would need to be different in cases such as cross-stack references where the Permissions would need to sit closer to the consumer of this permission (i.e., the caller). Default: - The instance of lambda.IFunction
28823
28862
  :param source_account: The AWS account ID (without hyphens) of the source owner. For example, if you specify an S3 bucket in the SourceArn property, this value is the bucket owner's account ID. You can use this property to ensure that all source principals are owned by a specific account.
@@ -28833,6 +28872,7 @@ class FunctionBase(
28833
28872
  action=action,
28834
28873
  event_source_token=event_source_token,
28835
28874
  function_url_auth_type=function_url_auth_type,
28875
+ invoked_via_function_url=invoked_via_function_url,
28836
28876
  organization_id=organization_id,
28837
28877
  scope=scope,
28838
28878
  source_account=source_account,
@@ -29892,6 +29932,7 @@ class SingletonFunction(
29892
29932
  action: typing.Optional[builtins.str] = None,
29893
29933
  event_source_token: typing.Optional[builtins.str] = None,
29894
29934
  function_url_auth_type: typing.Optional[FunctionUrlAuthType] = None,
29935
+ invoked_via_function_url: typing.Optional[builtins.bool] = None,
29895
29936
  organization_id: typing.Optional[builtins.str] = None,
29896
29937
  scope: typing.Optional[_constructs_77d1e7e8.Construct] = None,
29897
29938
  source_account: typing.Optional[builtins.str] = None,
@@ -29904,6 +29945,7 @@ class SingletonFunction(
29904
29945
  :param action: The Lambda actions that you want to allow in this statement. For example, you can specify lambda:CreateFunction to specify a certain action, or use a wildcard (``lambda:*``) to grant permission to all Lambda actions. For a list of actions, see Actions and Condition Context Keys for AWS Lambda in the IAM User Guide. Default: 'lambda:InvokeFunction'
29905
29946
  :param event_source_token: A unique token that must be supplied by the principal invoking the function. Default: - The caller would not need to present a token.
29906
29947
  :param function_url_auth_type: The authType for the function URL that you are granting permissions for. Default: - No functionUrlAuthType
29948
+ :param invoked_via_function_url: The condition key for limiting the scope of lambda:InvokeFunction action to Function URL only. When set to true, it restricts the principal in this policy to perform invokes for the resource only via Function URLs. Default: - false
29907
29949
  :param organization_id: The organization you want to grant permissions to. Use this ONLY if you need to grant permissions to a subset of the organization. If you want to grant permissions to the entire organization, sending the organization principal through the ``principal`` property will suffice. You can use this property to ensure that all source principals are owned by a specific organization. Default: - No organizationId
29908
29950
  :param scope: The scope to which the permission constructs be attached. The default is the Lambda function construct itself, but this would need to be different in cases such as cross-stack references where the Permissions would need to sit closer to the consumer of this permission (i.e., the caller). Default: - The instance of lambda.IFunction
29909
29951
  :param source_account: The AWS account ID (without hyphens) of the source owner. For example, if you specify an S3 bucket in the SourceArn property, this value is the bucket owner's account ID. You can use this property to ensure that all source principals are owned by a specific account.
@@ -29917,6 +29959,7 @@ class SingletonFunction(
29917
29959
  action=action,
29918
29960
  event_source_token=event_source_token,
29919
29961
  function_url_auth_type=function_url_auth_type,
29962
+ invoked_via_function_url=invoked_via_function_url,
29920
29963
  organization_id=organization_id,
29921
29964
  scope=scope,
29922
29965
  source_account=source_account,
@@ -33115,6 +33158,7 @@ def _typecheckingstub__43f02634f6ed895ea88b35db6c7a6ba5a7da45fa4945d0f90bf36d079
33115
33158
  action: typing.Optional[builtins.str] = None,
33116
33159
  event_source_token: typing.Optional[builtins.str] = None,
33117
33160
  function_url_auth_type: typing.Optional[FunctionUrlAuthType] = None,
33161
+ invoked_via_function_url: typing.Optional[builtins.bool] = None,
33118
33162
  organization_id: typing.Optional[builtins.str] = None,
33119
33163
  scope: typing.Optional[_constructs_77d1e7e8.Construct] = None,
33120
33164
  source_account: typing.Optional[builtins.str] = None,
@@ -34803,6 +34847,7 @@ def _typecheckingstub__012ac5126b1401118a0cd31e22b2fef5e1ab897a320c6edf7d16633af
34803
34847
  action: typing.Optional[builtins.str] = None,
34804
34848
  event_source_token: typing.Optional[builtins.str] = None,
34805
34849
  function_url_auth_type: typing.Optional[FunctionUrlAuthType] = None,
34850
+ invoked_via_function_url: typing.Optional[builtins.bool] = None,
34806
34851
  organization_id: typing.Optional[builtins.str] = None,
34807
34852
  scope: typing.Optional[_constructs_77d1e7e8.Construct] = None,
34808
34853
  source_account: typing.Optional[builtins.str] = None,
@@ -35048,6 +35093,7 @@ def _typecheckingstub__213097e02686d5b4e582802e2e3e822fb2c79f2920c55d92f2f4f8f05
35048
35093
  action: typing.Optional[builtins.str] = None,
35049
35094
  event_source_token: typing.Optional[builtins.str] = None,
35050
35095
  function_url_auth_type: typing.Optional[FunctionUrlAuthType] = None,
35096
+ invoked_via_function_url: typing.Optional[builtins.bool] = None,
35051
35097
  organization_id: typing.Optional[builtins.str] = None,
35052
35098
  scope: typing.Optional[_constructs_77d1e7e8.Construct] = None,
35053
35099
  source_account: typing.Optional[builtins.str] = None,
@@ -35245,6 +35291,7 @@ def _typecheckingstub__6d48a048e22819587505668ae6e1fbdfeedaaaf355ad52bd1196e683b
35245
35291
  action: typing.Optional[builtins.str] = None,
35246
35292
  event_source_token: typing.Optional[builtins.str] = None,
35247
35293
  function_url_auth_type: typing.Optional[FunctionUrlAuthType] = None,
35294
+ invoked_via_function_url: typing.Optional[builtins.bool] = None,
35248
35295
  organization_id: typing.Optional[builtins.str] = None,
35249
35296
  scope: typing.Optional[_constructs_77d1e7e8.Construct] = None,
35250
35297
  source_account: typing.Optional[builtins.str] = None,
@@ -35583,3 +35630,6 @@ def _typecheckingstub__368a49fe1f866c7ea7986c57b6f8488d0fddea8f62bf05ec1ed7eb09b
35583
35630
  ) -> None:
35584
35631
  """Type checking stubs"""
35585
35632
  pass
35633
+
35634
+ for cls in [IAlias, IAliasRef, ICodeSigningConfig, ICodeSigningConfigRef, IDestination, IEventInvokeConfigRef, IEventSource, IEventSourceDlq, IEventSourceMapping, IEventSourceMappingRef, IFunction, IFunctionRef, IFunctionUrl, ILayerVersion, ILayerVersionPermissionRef, ILayerVersionRef, IPermissionRef, IScalableFunctionAttribute, ISchemaRegistry, IUrlRef, IVersion, IVersionRef]:
35635
+ typing.cast(typing.Any, cls).__protocol_attrs__ = typing.cast(typing.Any, cls).__protocol_attrs__ - set(['__jsii_proxy_class__', '__jsii_type__'])
@@ -3193,3 +3193,6 @@ def _typecheckingstub__2da45b394f0332be0f6d6b7468d9fb54961953d56265da69955d36ffa
3193
3193
  ) -> None:
3194
3194
  """Type checking stubs"""
3195
3195
  pass
3196
+
3197
+ for cls in [ICommandHooks]:
3198
+ typing.cast(typing.Any, cls).__protocol_attrs__ = typing.cast(typing.Any, cls).__protocol_attrs__ - set(['__jsii_proxy_class__', '__jsii_type__'])
@@ -625,3 +625,6 @@ def _typecheckingstub__057665c8ffa5f5cdaedcf0301e727d15ee8b0244807853f59c72aadbb
625
625
  ) -> None:
626
626
  """Type checking stubs"""
627
627
  pass
628
+
629
+ for cls in [IDeploymentRef]:
630
+ typing.cast(typing.Any, cls).__protocol_attrs__ = typing.cast(typing.Any, cls).__protocol_attrs__ - set(['__jsii_proxy_class__', '__jsii_type__'])
@@ -13794,27 +13794,6 @@ class CfnBotAlias(
13794
13794
 
13795
13795
  jsii.create(self.__class__, self, [scope, id, props])
13796
13796
 
13797
- @jsii.member(jsii_name="fromBotAliasArn")
13798
- @builtins.classmethod
13799
- def from_bot_alias_arn(
13800
- cls,
13801
- scope: _constructs_77d1e7e8.Construct,
13802
- id: builtins.str,
13803
- arn: builtins.str,
13804
- ) -> IBotAliasRef:
13805
- '''Creates a new IBotAliasRef from an ARN.
13806
-
13807
- :param scope: -
13808
- :param id: -
13809
- :param arn: -
13810
- '''
13811
- if __debug__:
13812
- type_hints = typing.get_type_hints(_typecheckingstub__2ab747fa9eb7cb105192618f589a683ebd337733abaa1cc095d0ab0c0fa55d0d)
13813
- check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
13814
- check_type(argname="argument id", value=id, expected_type=type_hints["id"])
13815
- check_type(argname="argument arn", value=arn, expected_type=type_hints["arn"])
13816
- return typing.cast(IBotAliasRef, jsii.sinvoke(cls, "fromBotAliasArn", [scope, id, arn]))
13817
-
13818
13797
  @jsii.member(jsii_name="inspect")
13819
13798
  def inspect(self, inspector: _TreeInspector_488e0dd5) -> None:
13820
13799
  '''Examines the CloudFormation resource and discloses attributes.
@@ -16545,14 +16524,6 @@ def _typecheckingstub__57cf179c443f74ff3b1c43c56eef686f369711792e444e53d5668f07a
16545
16524
  """Type checking stubs"""
16546
16525
  pass
16547
16526
 
16548
- def _typecheckingstub__2ab747fa9eb7cb105192618f589a683ebd337733abaa1cc095d0ab0c0fa55d0d(
16549
- scope: _constructs_77d1e7e8.Construct,
16550
- id: builtins.str,
16551
- arn: builtins.str,
16552
- ) -> None:
16553
- """Type checking stubs"""
16554
- pass
16555
-
16556
16527
  def _typecheckingstub__69e306fef7aca1ecd05a385248f8253ae3fef56958f84e69c038125bb4b466d0(
16557
16528
  inspector: _TreeInspector_488e0dd5,
16558
16529
  ) -> None:
@@ -16795,3 +16766,6 @@ def _typecheckingstub__c2269eb87c059c5d27aab85364fde6b4ccb6e21ca5bc766b939d038b5
16795
16766
  ) -> None:
16796
16767
  """Type checking stubs"""
16797
16768
  pass
16769
+
16770
+ for cls in [IBotAliasRef, IBotRef, IBotVersionRef, IResourcePolicyRef]:
16771
+ typing.cast(typing.Any, cls).__protocol_attrs__ = typing.cast(typing.Any, cls).__protocol_attrs__ - set(['__jsii_proxy_class__', '__jsii_type__'])
@@ -2058,3 +2058,6 @@ def _typecheckingstub__483b5b4e301dfddf60a6c6da8bdc4898ec615b5045a70ceeeefc10fe7
2058
2058
  ) -> None:
2059
2059
  """Type checking stubs"""
2060
2060
  pass
2061
+
2062
+ for cls in [IGrantRef, ILicenseRef]:
2063
+ typing.cast(typing.Any, cls).__protocol_attrs__ = typing.cast(typing.Any, cls).__protocol_attrs__ - set(['__jsii_proxy_class__', '__jsii_type__'])