aws-cdk-lib 2.219.0__py3-none-any.whl → 2.221.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk-lib might be problematic. Click here for more details.
- aws_cdk/__init__.py +33 -35
- aws_cdk/_jsii/__init__.py +1 -1
- aws_cdk/_jsii/{aws-cdk-lib@2.219.0.jsii.tgz → aws-cdk-lib@2.221.0.jsii.tgz} +0 -0
- aws_cdk/alexa_ask/__init__.py +3 -0
- aws_cdk/aws_accessanalyzer/__init__.py +3 -0
- aws_cdk/aws_acmpca/__init__.py +4 -1
- aws_cdk/aws_aiops/__init__.py +3 -0
- aws_cdk/aws_amazonmq/__init__.py +3 -29
- aws_cdk/aws_amplify/__init__.py +3 -0
- aws_cdk/aws_amplifyuibuilder/__init__.py +3 -0
- aws_cdk/aws_apigateway/__init__.py +3 -0
- aws_cdk/aws_apigatewayv2/__init__.py +3 -0
- aws_cdk/aws_appconfig/__init__.py +3 -29
- aws_cdk/aws_appflow/__init__.py +3 -0
- aws_cdk/aws_appintegrations/__init__.py +3 -0
- aws_cdk/aws_applicationautoscaling/__init__.py +3 -0
- aws_cdk/aws_applicationinsights/__init__.py +3 -0
- aws_cdk/aws_applicationsignals/__init__.py +453 -2
- aws_cdk/aws_appmesh/__init__.py +3 -0
- aws_cdk/aws_apprunner/__init__.py +3 -0
- aws_cdk/aws_appstream/__init__.py +3 -0
- aws_cdk/aws_appsync/__init__.py +3 -0
- aws_cdk/aws_apptest/__init__.py +3 -0
- aws_cdk/aws_aps/__init__.py +1168 -83
- aws_cdk/aws_arcregionswitch/__init__.py +11 -0
- aws_cdk/aws_arczonalshift/__init__.py +3 -0
- aws_cdk/aws_athena/__init__.py +3 -0
- aws_cdk/aws_auditmanager/__init__.py +3 -0
- aws_cdk/aws_autoscaling/__init__.py +3 -0
- aws_cdk/aws_autoscaling_common/__init__.py +3 -0
- aws_cdk/aws_autoscalingplans/__init__.py +3 -0
- aws_cdk/aws_b2bi/__init__.py +3 -0
- aws_cdk/aws_backup/__init__.py +32 -29
- aws_cdk/aws_backupgateway/__init__.py +3 -0
- aws_cdk/aws_batch/__init__.py +112 -7
- aws_cdk/aws_bcmdataexports/__init__.py +3 -0
- aws_cdk/aws_bedrock/__init__.py +53 -45
- aws_cdk/aws_bedrockagentcore/__init__.py +8499 -1732
- aws_cdk/aws_billingconductor/__init__.py +3 -0
- aws_cdk/aws_budgets/__init__.py +3 -0
- aws_cdk/aws_cassandra/__init__.py +3 -0
- aws_cdk/aws_ce/__init__.py +3 -0
- aws_cdk/aws_certificatemanager/__init__.py +3 -0
- aws_cdk/aws_chatbot/__init__.py +3 -0
- aws_cdk/aws_cleanrooms/__init__.py +3 -0
- aws_cdk/aws_cleanroomsml/__init__.py +3 -0
- aws_cdk/aws_cloud9/__init__.py +3 -0
- aws_cdk/aws_cloudformation/__init__.py +3 -0
- aws_cdk/aws_cloudfront/__init__.py +69 -3
- aws_cdk/aws_cloudfront/experimental/__init__.py +4 -0
- aws_cdk/aws_cloudfront_origins/__init__.py +87 -6
- aws_cdk/aws_cloudtrail/__init__.py +3 -0
- aws_cdk/aws_cloudwatch/__init__.py +8 -5
- aws_cdk/aws_codeartifact/__init__.py +3 -0
- aws_cdk/aws_codebuild/__init__.py +3 -0
- aws_cdk/aws_codecommit/__init__.py +3 -0
- aws_cdk/aws_codeconnections/__init__.py +3 -0
- aws_cdk/aws_codedeploy/__init__.py +3 -0
- aws_cdk/aws_codeguruprofiler/__init__.py +3 -0
- aws_cdk/aws_codegurureviewer/__init__.py +3 -0
- aws_cdk/aws_codepipeline/__init__.py +3 -0
- aws_cdk/aws_codepipeline_actions/__init__.py +3 -0
- aws_cdk/aws_codestar/__init__.py +3 -0
- aws_cdk/aws_codestarconnections/__init__.py +3 -0
- aws_cdk/aws_codestarnotifications/__init__.py +3 -0
- aws_cdk/aws_cognito/__init__.py +9 -4
- aws_cdk/aws_cognito_identitypool/__init__.py +3 -0
- aws_cdk/aws_comprehend/__init__.py +3 -0
- aws_cdk/aws_config/__init__.py +3 -0
- aws_cdk/aws_connect/__init__.py +1232 -2
- aws_cdk/aws_connectcampaigns/__init__.py +3 -0
- aws_cdk/aws_connectcampaignsv2/__init__.py +3 -0
- aws_cdk/aws_controltower/__init__.py +3 -0
- aws_cdk/aws_cur/__init__.py +3 -0
- aws_cdk/aws_customerprofiles/__init__.py +3 -29
- aws_cdk/aws_databrew/__init__.py +3 -0
- aws_cdk/aws_datapipeline/__init__.py +3 -0
- aws_cdk/aws_datasync/__init__.py +3 -0
- aws_cdk/aws_datazone/__init__.py +17 -15
- aws_cdk/aws_dax/__init__.py +15 -3
- aws_cdk/aws_deadline/__init__.py +3 -0
- aws_cdk/aws_detective/__init__.py +3 -0
- aws_cdk/aws_devicefarm/__init__.py +3 -0
- aws_cdk/aws_devopsguru/__init__.py +3 -0
- aws_cdk/aws_directoryservice/__init__.py +32 -0
- aws_cdk/aws_dlm/__init__.py +3 -0
- aws_cdk/aws_dms/__init__.py +3 -0
- aws_cdk/aws_docdb/__init__.py +14 -3
- aws_cdk/aws_docdbelastic/__init__.py +3 -0
- aws_cdk/aws_dsql/__init__.py +3 -0
- aws_cdk/aws_dynamodb/__init__.py +3 -0
- aws_cdk/aws_ec2/__init__.py +205 -48
- aws_cdk/aws_ecr/__init__.py +156 -33
- aws_cdk/aws_ecs/__init__.py +429 -182
- aws_cdk/aws_efs/__init__.py +3 -0
- aws_cdk/aws_eks/__init__.py +117 -67
- aws_cdk/aws_elasticache/__init__.py +3 -0
- aws_cdk/aws_elasticbeanstalk/__init__.py +3 -0
- aws_cdk/aws_elasticloadbalancing/__init__.py +3 -0
- aws_cdk/aws_elasticloadbalancingv2/__init__.py +445 -36
- aws_cdk/aws_elasticsearch/__init__.py +3 -0
- aws_cdk/aws_emr/__init__.py +3 -0
- aws_cdk/aws_emrcontainers/__init__.py +3 -0
- aws_cdk/aws_emrserverless/__init__.py +12 -11
- aws_cdk/aws_entityresolution/__init__.py +3 -0
- aws_cdk/aws_events/__init__.py +73 -29
- aws_cdk/aws_events_targets/__init__.py +3 -0
- aws_cdk/aws_eventschemas/__init__.py +3 -0
- aws_cdk/aws_evidently/__init__.py +3 -0
- aws_cdk/aws_evs/__init__.py +3 -0
- aws_cdk/aws_finspace/__init__.py +3 -0
- aws_cdk/aws_fis/__init__.py +3 -0
- aws_cdk/aws_fms/__init__.py +3 -0
- aws_cdk/aws_forecast/__init__.py +3 -0
- aws_cdk/aws_frauddetector/__init__.py +3 -0
- aws_cdk/aws_fsx/__init__.py +7 -4
- aws_cdk/aws_gamelift/__init__.py +3 -0
- aws_cdk/aws_gameliftstreams/__init__.py +8 -5
- aws_cdk/aws_globalaccelerator/__init__.py +3 -0
- aws_cdk/aws_glue/__init__.py +11 -80
- aws_cdk/aws_grafana/__init__.py +3 -0
- aws_cdk/aws_greengrass/__init__.py +3 -0
- aws_cdk/aws_greengrassv2/__init__.py +3 -0
- aws_cdk/aws_groundstation/__init__.py +3 -0
- aws_cdk/aws_guardduty/__init__.py +3 -0
- aws_cdk/aws_healthimaging/__init__.py +3 -0
- aws_cdk/aws_healthlake/__init__.py +3 -0
- aws_cdk/aws_iam/__init__.py +30 -32
- aws_cdk/aws_identitystore/__init__.py +3 -0
- aws_cdk/aws_imagebuilder/__init__.py +896 -0
- aws_cdk/aws_inspector/__init__.py +3 -0
- aws_cdk/aws_inspectorv2/__init__.py +3 -0
- aws_cdk/aws_internetmonitor/__init__.py +3 -0
- aws_cdk/aws_invoicing/__init__.py +3 -0
- aws_cdk/aws_iot/__init__.py +3 -0
- aws_cdk/aws_iotanalytics/__init__.py +3 -0
- aws_cdk/aws_iotcoredeviceadvisor/__init__.py +3 -0
- aws_cdk/aws_iotevents/__init__.py +3 -0
- aws_cdk/aws_iotfleethub/__init__.py +3 -0
- aws_cdk/aws_iotfleetwise/__init__.py +3 -0
- aws_cdk/aws_iotsitewise/__init__.py +139 -80
- aws_cdk/aws_iotthingsgraph/__init__.py +3 -0
- aws_cdk/aws_iottwinmaker/__init__.py +3 -87
- aws_cdk/aws_iotwireless/__init__.py +61 -0
- aws_cdk/aws_ivs/__init__.py +3 -0
- aws_cdk/aws_ivschat/__init__.py +3 -0
- aws_cdk/aws_kafkaconnect/__init__.py +3 -0
- aws_cdk/aws_kendra/__init__.py +3 -58
- aws_cdk/aws_kendraranking/__init__.py +3 -0
- aws_cdk/aws_kinesis/__init__.py +98 -4
- aws_cdk/aws_kinesisanalytics/__init__.py +3 -0
- aws_cdk/aws_kinesisanalyticsv2/__init__.py +3 -0
- aws_cdk/aws_kinesisfirehose/__init__.py +1709 -10
- aws_cdk/aws_kinesisvideo/__init__.py +3 -29
- aws_cdk/aws_kms/__init__.py +3 -0
- aws_cdk/aws_lakeformation/__init__.py +3 -0
- aws_cdk/aws_lambda/__init__.py +57 -7
- aws_cdk/aws_lambda_nodejs/__init__.py +3 -0
- aws_cdk/aws_launchwizard/__init__.py +3 -0
- aws_cdk/aws_lex/__init__.py +3 -29
- aws_cdk/aws_licensemanager/__init__.py +3 -0
- aws_cdk/aws_lightsail/__init__.py +587 -0
- aws_cdk/aws_location/__init__.py +3 -0
- aws_cdk/aws_logs/__init__.py +283 -9
- aws_cdk/aws_lookoutequipment/__init__.py +3 -29
- aws_cdk/aws_lookoutmetrics/__init__.py +17 -2
- aws_cdk/aws_lookoutvision/__init__.py +3 -0
- aws_cdk/aws_m2/__init__.py +62 -13
- aws_cdk/aws_macie/__init__.py +3 -0
- aws_cdk/aws_managedblockchain/__init__.py +3 -0
- aws_cdk/aws_mediaconnect/__init__.py +3 -0
- aws_cdk/aws_mediaconvert/__init__.py +3 -0
- aws_cdk/aws_medialive/__init__.py +279 -33
- aws_cdk/aws_mediapackage/__init__.py +3 -0
- aws_cdk/aws_mediapackagev2/__init__.py +3 -0
- aws_cdk/aws_mediastore/__init__.py +3 -0
- aws_cdk/aws_mediatailor/__init__.py +3 -58
- aws_cdk/aws_memorydb/__init__.py +3 -0
- aws_cdk/aws_mpa/__init__.py +3 -0
- aws_cdk/aws_msk/__init__.py +3 -0
- aws_cdk/aws_mwaa/__init__.py +8 -5
- aws_cdk/aws_neptune/__init__.py +188 -70
- aws_cdk/aws_neptunegraph/__init__.py +3 -0
- aws_cdk/aws_networkfirewall/__init__.py +3 -0
- aws_cdk/aws_networkmanager/__init__.py +32 -0
- aws_cdk/aws_nimblestudio/__init__.py +3 -0
- aws_cdk/aws_notifications/__init__.py +3 -0
- aws_cdk/aws_notificationscontacts/__init__.py +3 -0
- aws_cdk/aws_oam/__init__.py +3 -0
- aws_cdk/aws_observabilityadmin/__init__.py +1365 -187
- aws_cdk/aws_odb/__init__.py +4 -1
- aws_cdk/aws_omics/__init__.py +10 -1
- aws_cdk/aws_opensearchserverless/__init__.py +3 -0
- aws_cdk/aws_opensearchservice/__init__.py +9 -0
- aws_cdk/aws_opsworks/__init__.py +3 -0
- aws_cdk/aws_opsworkscm/__init__.py +3 -0
- aws_cdk/aws_organizations/__init__.py +3 -116
- aws_cdk/aws_osis/__init__.py +157 -0
- aws_cdk/aws_panorama/__init__.py +3 -0
- aws_cdk/aws_paymentcryptography/__init__.py +3 -0
- aws_cdk/aws_pcaconnectorad/__init__.py +3 -0
- aws_cdk/aws_pcaconnectorscep/__init__.py +3 -0
- aws_cdk/aws_pcs/__init__.py +227 -33
- aws_cdk/aws_personalize/__init__.py +3 -0
- aws_cdk/aws_pinpoint/__init__.py +61 -58
- aws_cdk/aws_pinpointemail/__init__.py +3 -0
- aws_cdk/aws_pipes/__init__.py +3 -0
- aws_cdk/aws_proton/__init__.py +3 -0
- aws_cdk/aws_qbusiness/__init__.py +3 -174
- aws_cdk/aws_qldb/__init__.py +3 -29
- aws_cdk/aws_quicksight/__init__.py +493 -406
- aws_cdk/aws_ram/__init__.py +3 -0
- aws_cdk/aws_rbin/__init__.py +3 -0
- aws_cdk/aws_rds/__init__.py +71 -42
- aws_cdk/aws_redshift/__init__.py +3 -0
- aws_cdk/aws_redshiftserverless/__init__.py +3 -0
- aws_cdk/aws_refactorspaces/__init__.py +21 -6
- aws_cdk/aws_rekognition/__init__.py +3 -29
- aws_cdk/aws_resiliencehub/__init__.py +3 -0
- aws_cdk/aws_resourceexplorer2/__init__.py +3 -0
- aws_cdk/aws_resourcegroups/__init__.py +3 -0
- aws_cdk/aws_robomaker/__init__.py +3 -0
- aws_cdk/aws_rolesanywhere/__init__.py +3 -0
- aws_cdk/aws_route53/__init__.py +148 -24
- aws_cdk/aws_route53_targets/__init__.py +3 -0
- aws_cdk/aws_route53profiles/__init__.py +3 -0
- aws_cdk/aws_route53recoverycontrol/__init__.py +3 -0
- aws_cdk/aws_route53recoveryreadiness/__init__.py +3 -0
- aws_cdk/aws_route53resolver/__init__.py +11 -4
- aws_cdk/aws_rum/__init__.py +3 -0
- aws_cdk/aws_s3/__init__.py +80 -43
- aws_cdk/aws_s3_deployment/__init__.py +3 -0
- aws_cdk/aws_s3express/__init__.py +3 -0
- aws_cdk/aws_s3objectlambda/__init__.py +47 -12
- aws_cdk/aws_s3outposts/__init__.py +3 -0
- aws_cdk/aws_s3tables/__init__.py +3 -0
- aws_cdk/aws_sagemaker/__init__.py +166 -87
- aws_cdk/aws_sam/__init__.py +3 -0
- aws_cdk/aws_scheduler/__init__.py +3 -29
- aws_cdk/aws_sdb/__init__.py +3 -0
- aws_cdk/aws_secretsmanager/__init__.py +3 -0
- aws_cdk/aws_securityhub/__init__.py +3 -0
- aws_cdk/aws_securitylake/__init__.py +3 -0
- aws_cdk/aws_servicecatalog/__init__.py +161 -144
- aws_cdk/aws_servicecatalogappregistry/__init__.py +3 -0
- aws_cdk/aws_servicediscovery/__init__.py +3 -0
- aws_cdk/aws_ses/__init__.py +3 -0
- aws_cdk/aws_shield/__init__.py +3 -0
- aws_cdk/aws_signer/__init__.py +3 -0
- aws_cdk/aws_simspaceweaver/__init__.py +3 -0
- aws_cdk/aws_smsvoice/__init__.py +3 -29
- aws_cdk/aws_sns/__init__.py +3 -0
- aws_cdk/aws_sqs/__init__.py +3 -0
- aws_cdk/aws_ssm/__init__.py +10 -3
- aws_cdk/aws_ssmcontacts/__init__.py +3 -0
- aws_cdk/aws_ssmguiconnect/__init__.py +3 -0
- aws_cdk/aws_ssmincidents/__init__.py +3 -0
- aws_cdk/aws_ssmquicksetup/__init__.py +470 -3
- aws_cdk/aws_sso/__init__.py +3 -0
- aws_cdk/aws_stepfunctions/__init__.py +23 -19
- aws_cdk/aws_stepfunctions_tasks/__init__.py +6 -3
- aws_cdk/aws_supportapp/__init__.py +3 -0
- aws_cdk/aws_synthetics/__init__.py +80 -27
- aws_cdk/aws_systemsmanagersap/__init__.py +3 -0
- aws_cdk/aws_timestream/__init__.py +3 -29
- aws_cdk/aws_transfer/__init__.py +20 -34
- aws_cdk/aws_verifiedpermissions/__init__.py +3 -0
- aws_cdk/aws_voiceid/__init__.py +3 -0
- aws_cdk/aws_vpclattice/__init__.py +7 -4
- aws_cdk/aws_waf/__init__.py +3 -0
- aws_cdk/aws_wafregional/__init__.py +3 -0
- aws_cdk/aws_wafv2/__init__.py +3 -0
- aws_cdk/aws_wisdom/__init__.py +3 -116
- aws_cdk/aws_workspaces/__init__.py +3 -0
- aws_cdk/aws_workspacesinstances/__init__.py +3 -0
- aws_cdk/aws_workspacesthinclient/__init__.py +3 -0
- aws_cdk/aws_workspacesweb/__init__.py +3 -0
- aws_cdk/aws_xray/__init__.py +3 -0
- aws_cdk/cloud_assembly_schema/__init__.py +3 -0
- aws_cdk/cx_api/__init__.py +34 -0
- aws_cdk/pipelines/__init__.py +3 -0
- aws_cdk/region_info/__init__.py +3 -0
- aws_cdk/triggers/__init__.py +3 -0
- {aws_cdk_lib-2.219.0.dist-info → aws_cdk_lib-2.221.0.dist-info}/METADATA +2 -2
- aws_cdk_lib-2.221.0.dist-info/RECORD +313 -0
- aws_cdk_lib-2.219.0.dist-info/RECORD +0 -313
- {aws_cdk_lib-2.219.0.dist-info → aws_cdk_lib-2.221.0.dist-info}/LICENSE +0 -0
- {aws_cdk_lib-2.219.0.dist-info → aws_cdk_lib-2.221.0.dist-info}/NOTICE +0 -0
- {aws_cdk_lib-2.219.0.dist-info → aws_cdk_lib-2.221.0.dist-info}/WHEEL +0 -0
- {aws_cdk_lib-2.219.0.dist-info → aws_cdk_lib-2.221.0.dist-info}/top_level.txt +0 -0
|
@@ -780,27 +780,6 @@ class CfnStream(
|
|
|
780
780
|
|
|
781
781
|
jsii.create(self.__class__, self, [scope, id, props])
|
|
782
782
|
|
|
783
|
-
@jsii.member(jsii_name="fromStreamArn")
|
|
784
|
-
@builtins.classmethod
|
|
785
|
-
def from_stream_arn(
|
|
786
|
-
cls,
|
|
787
|
-
scope: _constructs_77d1e7e8.Construct,
|
|
788
|
-
id: builtins.str,
|
|
789
|
-
arn: builtins.str,
|
|
790
|
-
) -> IStreamRef:
|
|
791
|
-
'''Creates a new IStreamRef from an ARN.
|
|
792
|
-
|
|
793
|
-
:param scope: -
|
|
794
|
-
:param id: -
|
|
795
|
-
:param arn: -
|
|
796
|
-
'''
|
|
797
|
-
if __debug__:
|
|
798
|
-
type_hints = typing.get_type_hints(_typecheckingstub__fe0f44c811e2d2cc90117554fb9deac330b94d4acd5a32161f8a4592bdd478e7)
|
|
799
|
-
check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
|
|
800
|
-
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
801
|
-
check_type(argname="argument arn", value=arn, expected_type=type_hints["arn"])
|
|
802
|
-
return typing.cast(IStreamRef, jsii.sinvoke(cls, "fromStreamArn", [scope, id, arn]))
|
|
803
|
-
|
|
804
783
|
@jsii.member(jsii_name="inspect")
|
|
805
784
|
def inspect(self, inspector: _TreeInspector_488e0dd5) -> None:
|
|
806
785
|
'''Examines the CloudFormation resource and discloses attributes.
|
|
@@ -1049,14 +1028,6 @@ def _typecheckingstub__9ec46ef966c55301f1d7f90935a5a7340c3d7ee98963234b59d16d191
|
|
|
1049
1028
|
"""Type checking stubs"""
|
|
1050
1029
|
pass
|
|
1051
1030
|
|
|
1052
|
-
def _typecheckingstub__fe0f44c811e2d2cc90117554fb9deac330b94d4acd5a32161f8a4592bdd478e7(
|
|
1053
|
-
scope: _constructs_77d1e7e8.Construct,
|
|
1054
|
-
id: builtins.str,
|
|
1055
|
-
arn: builtins.str,
|
|
1056
|
-
) -> None:
|
|
1057
|
-
"""Type checking stubs"""
|
|
1058
|
-
pass
|
|
1059
|
-
|
|
1060
1031
|
def _typecheckingstub__9cce8d8f4e1ffc1f91558eea316dc5656b61eced6fd4e5ed8f9c5d2aedaeb00f(
|
|
1061
1032
|
inspector: _TreeInspector_488e0dd5,
|
|
1062
1033
|
) -> None:
|
|
@@ -1104,3 +1075,6 @@ def _typecheckingstub__916b61187a1fea0754be9981eeeb345ba75e61b6417bbde10d8246657
|
|
|
1104
1075
|
) -> None:
|
|
1105
1076
|
"""Type checking stubs"""
|
|
1106
1077
|
pass
|
|
1078
|
+
|
|
1079
|
+
for cls in [ISignalingChannelRef, IStreamRef]:
|
|
1080
|
+
typing.cast(typing.Any, cls).__protocol_attrs__ = typing.cast(typing.Any, cls).__protocol_attrs__ - set(['__jsii_proxy_class__', '__jsii_type__'])
|
aws_cdk/aws_kms/__init__.py
CHANGED
|
@@ -4532,3 +4532,6 @@ def _typecheckingstub__889887809ebfcb10b086b9443331082b607fe1c8b476e14ebc4925835
|
|
|
4532
4532
|
) -> None:
|
|
4533
4533
|
"""Type checking stubs"""
|
|
4534
4534
|
pass
|
|
4535
|
+
|
|
4536
|
+
for cls in [IAlias, IAliasRef, IKey, IKeyRef, IReplicaKeyRef]:
|
|
4537
|
+
typing.cast(typing.Any, cls).__protocol_attrs__ = typing.cast(typing.Any, cls).__protocol_attrs__ - set(['__jsii_proxy_class__', '__jsii_type__'])
|
|
@@ -7160,3 +7160,6 @@ def _typecheckingstub__dbfafd4ff73d1cb58139774825c816ddf21d5913087c696e01ca730ed
|
|
|
7160
7160
|
) -> None:
|
|
7161
7161
|
"""Type checking stubs"""
|
|
7162
7162
|
pass
|
|
7163
|
+
|
|
7164
|
+
for cls in [IDataCellsFilterRef, IDataLakeSettingsRef, IPermissionsRef, IPrincipalPermissionsRef, IResourceRef, ITagAssociationRef, ITagRef]:
|
|
7165
|
+
typing.cast(typing.Any, cls).__protocol_attrs__ = typing.cast(typing.Any, cls).__protocol_attrs__ - set(['__jsii_proxy_class__', '__jsii_type__'])
|
aws_cdk/aws_lambda/__init__.py
CHANGED
|
@@ -661,6 +661,17 @@ CfnOutput(self, "TheUrl",
|
|
|
661
661
|
)
|
|
662
662
|
```
|
|
663
663
|
|
|
664
|
+
### Important Function URL Permission Update - Oct 2025
|
|
665
|
+
|
|
666
|
+
Starting Oct 2025, Function URL invocation will require two permissions
|
|
667
|
+
|
|
668
|
+
* lambda:InvokeFunctionUrl
|
|
669
|
+
* lambda:InvokeFunction (New)
|
|
670
|
+
|
|
671
|
+
CDK has updated `grantInvokeUrl` and `addFunctionUrl` to add both permission above.
|
|
672
|
+
|
|
673
|
+
If your existing CDK stack uses `grantInvokeUrl` or `addFunctionUrl`, your next deployment will automatically add the `lambda:InvokeFunction` permission without requiring any code changes. This ensures your Function URLs continue working seamlessly. No additional actions are needed.
|
|
674
|
+
|
|
664
675
|
### CORS configuration for Function URLs
|
|
665
676
|
|
|
666
677
|
If you want your Function URLs to be invokable from a web page in browser, you
|
|
@@ -5343,8 +5354,8 @@ class CfnPermissionProps:
|
|
|
5343
5354
|
:param function_name: The name or ARN of the Lambda function, version, or alias. **Name formats** - *Function name* – ``my-function`` (name-only), ``my-function:v1`` (with alias). - *Function ARN* – ``arn:aws:lambda:us-west-2:123456789012:function:my-function`` . - *Partial ARN* – ``123456789012:function:my-function`` . You can append a version number or alias to any of the formats. The length constraint applies only to the full ARN. If you specify only the function name, it is limited to 64 characters in length.
|
|
5344
5355
|
:param principal: The AWS service , AWS account , IAM user, or IAM role that invokes the function. If you specify a service, use ``SourceArn`` or ``SourceAccount`` to limit who can invoke the function through that service.
|
|
5345
5356
|
:param event_source_token: For Alexa Smart Home functions, a token that the invoker must supply.
|
|
5346
|
-
:param function_url_auth_type: The type of authentication that your function URL uses. Set to ``AWS_IAM`` if you want to restrict access to authenticated users only. Set to ``NONE`` if you want to bypass IAM authentication to create a public endpoint. For more information, see `
|
|
5347
|
-
:param invoked_via_function_url:
|
|
5357
|
+
:param function_url_auth_type: The type of authentication that your function URL uses. Set to ``AWS_IAM`` if you want to restrict access to authenticated users only. Set to ``NONE`` if you want to bypass IAM authentication to create a public endpoint. For more information, see `Control access to Lambda function URLs <https://docs.aws.amazon.com/lambda/latest/dg/urls-auth.html>`_ .
|
|
5358
|
+
:param invoked_via_function_url: Restricts the ``lambda:InvokeFunction`` action to function URL calls. When set to ``true`` , this prevents the principal from invoking the function by any means other than the function URL. For more information, see `Control access to Lambda function URLs <https://docs.aws.amazon.com/lambda/latest/dg/urls-auth.html>`_ .
|
|
5348
5359
|
:param principal_org_id: The identifier for your organization in AWS Organizations . Use this to grant permissions to all the AWS accounts under this organization.
|
|
5349
5360
|
:param source_account: For AWS service , the ID of the AWS account that owns the resource. Use this together with ``SourceArn`` to ensure that the specified account owns the resource. It is possible for an Amazon S3 bucket to be deleted by its owner and recreated by another account.
|
|
5350
5361
|
:param source_arn: For AWS services , the ARN of the AWS resource that invokes the function. For example, an Amazon S3 bucket or Amazon SNS topic. Note that Lambda configures the comparison using the ``StringLike`` operator.
|
|
@@ -5455,7 +5466,7 @@ class CfnPermissionProps:
|
|
|
5455
5466
|
def function_url_auth_type(self) -> typing.Optional[builtins.str]:
|
|
5456
5467
|
'''The type of authentication that your function URL uses.
|
|
5457
5468
|
|
|
5458
|
-
Set to ``AWS_IAM`` if you want to restrict access to authenticated users only. Set to ``NONE`` if you want to bypass IAM authentication to create a public endpoint. For more information, see `
|
|
5469
|
+
Set to ``AWS_IAM`` if you want to restrict access to authenticated users only. Set to ``NONE`` if you want to bypass IAM authentication to create a public endpoint. For more information, see `Control access to Lambda function URLs <https://docs.aws.amazon.com/lambda/latest/dg/urls-auth.html>`_ .
|
|
5459
5470
|
|
|
5460
5471
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lambda-permission.html#cfn-lambda-permission-functionurlauthtype
|
|
5461
5472
|
'''
|
|
@@ -5466,7 +5477,10 @@ class CfnPermissionProps:
|
|
|
5466
5477
|
def invoked_via_function_url(
|
|
5467
5478
|
self,
|
|
5468
5479
|
) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
|
|
5469
|
-
'''
|
|
5480
|
+
'''Restricts the ``lambda:InvokeFunction`` action to function URL calls.
|
|
5481
|
+
|
|
5482
|
+
When set to ``true`` , this prevents the principal from invoking the function by any means other than the function URL. For more information, see `Control access to Lambda function URLs <https://docs.aws.amazon.com/lambda/latest/dg/urls-auth.html>`_ .
|
|
5483
|
+
|
|
5470
5484
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lambda-permission.html#cfn-lambda-permission-invokedviafunctionurl
|
|
5471
5485
|
'''
|
|
5472
5486
|
result = self._values.get("invoked_via_function_url")
|
|
@@ -15337,6 +15351,7 @@ class ParamsAndSecretsVersions(enum.Enum):
|
|
|
15337
15351
|
"action": "action",
|
|
15338
15352
|
"event_source_token": "eventSourceToken",
|
|
15339
15353
|
"function_url_auth_type": "functionUrlAuthType",
|
|
15354
|
+
"invoked_via_function_url": "invokedViaFunctionUrl",
|
|
15340
15355
|
"organization_id": "organizationId",
|
|
15341
15356
|
"scope": "scope",
|
|
15342
15357
|
"source_account": "sourceAccount",
|
|
@@ -15351,6 +15366,7 @@ class Permission:
|
|
|
15351
15366
|
action: typing.Optional[builtins.str] = None,
|
|
15352
15367
|
event_source_token: typing.Optional[builtins.str] = None,
|
|
15353
15368
|
function_url_auth_type: typing.Optional[FunctionUrlAuthType] = None,
|
|
15369
|
+
invoked_via_function_url: typing.Optional[builtins.bool] = None,
|
|
15354
15370
|
organization_id: typing.Optional[builtins.str] = None,
|
|
15355
15371
|
scope: typing.Optional[_constructs_77d1e7e8.Construct] = None,
|
|
15356
15372
|
source_account: typing.Optional[builtins.str] = None,
|
|
@@ -15362,6 +15378,7 @@ class Permission:
|
|
|
15362
15378
|
:param action: The Lambda actions that you want to allow in this statement. For example, you can specify lambda:CreateFunction to specify a certain action, or use a wildcard (``lambda:*``) to grant permission to all Lambda actions. For a list of actions, see Actions and Condition Context Keys for AWS Lambda in the IAM User Guide. Default: 'lambda:InvokeFunction'
|
|
15363
15379
|
:param event_source_token: A unique token that must be supplied by the principal invoking the function. Default: - The caller would not need to present a token.
|
|
15364
15380
|
:param function_url_auth_type: The authType for the function URL that you are granting permissions for. Default: - No functionUrlAuthType
|
|
15381
|
+
:param invoked_via_function_url: The condition key for limiting the scope of lambda:InvokeFunction action to Function URL only. When set to true, it restricts the principal in this policy to perform invokes for the resource only via Function URLs. Default: - false
|
|
15365
15382
|
:param organization_id: The organization you want to grant permissions to. Use this ONLY if you need to grant permissions to a subset of the organization. If you want to grant permissions to the entire organization, sending the organization principal through the ``principal`` property will suffice. You can use this property to ensure that all source principals are owned by a specific organization. Default: - No organizationId
|
|
15366
15383
|
:param scope: The scope to which the permission constructs be attached. The default is the Lambda function construct itself, but this would need to be different in cases such as cross-stack references where the Permissions would need to sit closer to the consumer of this permission (i.e., the caller). Default: - The instance of lambda.IFunction
|
|
15367
15384
|
:param source_account: The AWS account ID (without hyphens) of the source owner. For example, if you specify an S3 bucket in the SourceArn property, this value is the bucket owner's account ID. You can use this property to ensure that all source principals are owned by a specific account.
|
|
@@ -15389,6 +15406,7 @@ class Permission:
|
|
|
15389
15406
|
check_type(argname="argument action", value=action, expected_type=type_hints["action"])
|
|
15390
15407
|
check_type(argname="argument event_source_token", value=event_source_token, expected_type=type_hints["event_source_token"])
|
|
15391
15408
|
check_type(argname="argument function_url_auth_type", value=function_url_auth_type, expected_type=type_hints["function_url_auth_type"])
|
|
15409
|
+
check_type(argname="argument invoked_via_function_url", value=invoked_via_function_url, expected_type=type_hints["invoked_via_function_url"])
|
|
15392
15410
|
check_type(argname="argument organization_id", value=organization_id, expected_type=type_hints["organization_id"])
|
|
15393
15411
|
check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
|
|
15394
15412
|
check_type(argname="argument source_account", value=source_account, expected_type=type_hints["source_account"])
|
|
@@ -15402,6 +15420,8 @@ class Permission:
|
|
|
15402
15420
|
self._values["event_source_token"] = event_source_token
|
|
15403
15421
|
if function_url_auth_type is not None:
|
|
15404
15422
|
self._values["function_url_auth_type"] = function_url_auth_type
|
|
15423
|
+
if invoked_via_function_url is not None:
|
|
15424
|
+
self._values["invoked_via_function_url"] = invoked_via_function_url
|
|
15405
15425
|
if organization_id is not None:
|
|
15406
15426
|
self._values["organization_id"] = organization_id
|
|
15407
15427
|
if scope is not None:
|
|
@@ -15463,6 +15483,17 @@ class Permission:
|
|
|
15463
15483
|
result = self._values.get("function_url_auth_type")
|
|
15464
15484
|
return typing.cast(typing.Optional[FunctionUrlAuthType], result)
|
|
15465
15485
|
|
|
15486
|
+
@builtins.property
|
|
15487
|
+
def invoked_via_function_url(self) -> typing.Optional[builtins.bool]:
|
|
15488
|
+
'''The condition key for limiting the scope of lambda:InvokeFunction action to Function URL only.
|
|
15489
|
+
|
|
15490
|
+
When set to true, it restricts the principal in this policy to perform invokes for the resource only via Function URLs.
|
|
15491
|
+
|
|
15492
|
+
:default: - false
|
|
15493
|
+
'''
|
|
15494
|
+
result = self._values.get("invoked_via_function_url")
|
|
15495
|
+
return typing.cast(typing.Optional[builtins.bool], result)
|
|
15496
|
+
|
|
15466
15497
|
@builtins.property
|
|
15467
15498
|
def organization_id(self) -> typing.Optional[builtins.str]:
|
|
15468
15499
|
'''The organization you want to grant permissions to.
|
|
@@ -24700,7 +24731,7 @@ class CfnPermission(
|
|
|
24700
24731
|
|
|
24701
24732
|
To grant permission to another account, specify the account ID as the ``Principal`` . To grant permission to an organization defined in AWS Organizations , specify the organization ID as the ``PrincipalOrgID`` . For AWS services, the principal is a domain-style identifier defined by the service, like ``s3.amazonaws.com`` or ``sns.amazonaws.com`` . For AWS services, you can also specify the ARN of the associated resource as the ``SourceArn`` . If you grant permission to a service principal without specifying the source, other accounts could potentially configure resources in their account to invoke your Lambda function.
|
|
24702
24733
|
|
|
24703
|
-
If your function has a function URL, you can specify the ``FunctionUrlAuthType`` parameter. This adds a condition to your permission that only applies when your function URL's ``AuthType`` matches the specified ``FunctionUrlAuthType`` . For more information about the ``AuthType`` parameter, see `
|
|
24734
|
+
If your function has a function URL, you can specify the ``FunctionUrlAuthType`` parameter. This adds a condition to your permission that only applies when your function URL's ``AuthType`` matches the specified ``FunctionUrlAuthType`` . For more information about the ``AuthType`` parameter, see `Control access to Lambda function URLs <https://docs.aws.amazon.com/lambda/latest/dg/urls-auth.html>`_ .
|
|
24704
24735
|
|
|
24705
24736
|
This resource adds a statement to a resource-based permission policy for the function. For more information about function policies, see `Lambda Function Policies <https://docs.aws.amazon.com/lambda/latest/dg/access-control-resource-based.html>`_ .
|
|
24706
24737
|
|
|
@@ -24751,8 +24782,8 @@ class CfnPermission(
|
|
|
24751
24782
|
:param function_name: The name or ARN of the Lambda function, version, or alias. **Name formats** - *Function name* – ``my-function`` (name-only), ``my-function:v1`` (with alias). - *Function ARN* – ``arn:aws:lambda:us-west-2:123456789012:function:my-function`` . - *Partial ARN* – ``123456789012:function:my-function`` . You can append a version number or alias to any of the formats. The length constraint applies only to the full ARN. If you specify only the function name, it is limited to 64 characters in length.
|
|
24752
24783
|
:param principal: The AWS service , AWS account , IAM user, or IAM role that invokes the function. If you specify a service, use ``SourceArn`` or ``SourceAccount`` to limit who can invoke the function through that service.
|
|
24753
24784
|
:param event_source_token: For Alexa Smart Home functions, a token that the invoker must supply.
|
|
24754
|
-
:param function_url_auth_type: The type of authentication that your function URL uses. Set to ``AWS_IAM`` if you want to restrict access to authenticated users only. Set to ``NONE`` if you want to bypass IAM authentication to create a public endpoint. For more information, see `
|
|
24755
|
-
:param invoked_via_function_url:
|
|
24785
|
+
:param function_url_auth_type: The type of authentication that your function URL uses. Set to ``AWS_IAM`` if you want to restrict access to authenticated users only. Set to ``NONE`` if you want to bypass IAM authentication to create a public endpoint. For more information, see `Control access to Lambda function URLs <https://docs.aws.amazon.com/lambda/latest/dg/urls-auth.html>`_ .
|
|
24786
|
+
:param invoked_via_function_url: Restricts the ``lambda:InvokeFunction`` action to function URL calls. When set to ``true`` , this prevents the principal from invoking the function by any means other than the function URL. For more information, see `Control access to Lambda function URLs <https://docs.aws.amazon.com/lambda/latest/dg/urls-auth.html>`_ .
|
|
24756
24787
|
:param principal_org_id: The identifier for your organization in AWS Organizations . Use this to grant permissions to all the AWS accounts under this organization.
|
|
24757
24788
|
:param source_account: For AWS service , the ID of the AWS account that owns the resource. Use this together with ``SourceArn`` to ensure that the specified account owns the resource. It is possible for an Amazon S3 bucket to be deleted by its owner and recreated by another account.
|
|
24758
24789
|
:param source_arn: For AWS services , the ARN of the AWS resource that invokes the function. For example, an Amazon S3 bucket or Amazon SNS topic. Note that Lambda configures the comparison using the ``StringLike`` operator.
|
|
@@ -24894,6 +24925,7 @@ class CfnPermission(
|
|
|
24894
24925
|
def invoked_via_function_url(
|
|
24895
24926
|
self,
|
|
24896
24927
|
) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
|
|
24928
|
+
'''Restricts the ``lambda:InvokeFunction`` action to function URL calls.'''
|
|
24897
24929
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], jsii.get(self, "invokedViaFunctionUrl"))
|
|
24898
24930
|
|
|
24899
24931
|
@invoked_via_function_url.setter
|
|
@@ -27005,6 +27037,7 @@ class IFunction(
|
|
|
27005
27037
|
action: typing.Optional[builtins.str] = None,
|
|
27006
27038
|
event_source_token: typing.Optional[builtins.str] = None,
|
|
27007
27039
|
function_url_auth_type: typing.Optional[FunctionUrlAuthType] = None,
|
|
27040
|
+
invoked_via_function_url: typing.Optional[builtins.bool] = None,
|
|
27008
27041
|
organization_id: typing.Optional[builtins.str] = None,
|
|
27009
27042
|
scope: typing.Optional[_constructs_77d1e7e8.Construct] = None,
|
|
27010
27043
|
source_account: typing.Optional[builtins.str] = None,
|
|
@@ -27017,6 +27050,7 @@ class IFunction(
|
|
|
27017
27050
|
:param action: The Lambda actions that you want to allow in this statement. For example, you can specify lambda:CreateFunction to specify a certain action, or use a wildcard (``lambda:*``) to grant permission to all Lambda actions. For a list of actions, see Actions and Condition Context Keys for AWS Lambda in the IAM User Guide. Default: 'lambda:InvokeFunction'
|
|
27018
27051
|
:param event_source_token: A unique token that must be supplied by the principal invoking the function. Default: - The caller would not need to present a token.
|
|
27019
27052
|
:param function_url_auth_type: The authType for the function URL that you are granting permissions for. Default: - No functionUrlAuthType
|
|
27053
|
+
:param invoked_via_function_url: The condition key for limiting the scope of lambda:InvokeFunction action to Function URL only. When set to true, it restricts the principal in this policy to perform invokes for the resource only via Function URLs. Default: - false
|
|
27020
27054
|
:param organization_id: The organization you want to grant permissions to. Use this ONLY if you need to grant permissions to a subset of the organization. If you want to grant permissions to the entire organization, sending the organization principal through the ``principal`` property will suffice. You can use this property to ensure that all source principals are owned by a specific organization. Default: - No organizationId
|
|
27021
27055
|
:param scope: The scope to which the permission constructs be attached. The default is the Lambda function construct itself, but this would need to be different in cases such as cross-stack references where the Permissions would need to sit closer to the consumer of this permission (i.e., the caller). Default: - The instance of lambda.IFunction
|
|
27022
27056
|
:param source_account: The AWS account ID (without hyphens) of the source owner. For example, if you specify an S3 bucket in the SourceArn property, this value is the bucket owner's account ID. You can use this property to ensure that all source principals are owned by a specific account.
|
|
@@ -27504,6 +27538,7 @@ class _IFunctionProxy(
|
|
|
27504
27538
|
action: typing.Optional[builtins.str] = None,
|
|
27505
27539
|
event_source_token: typing.Optional[builtins.str] = None,
|
|
27506
27540
|
function_url_auth_type: typing.Optional[FunctionUrlAuthType] = None,
|
|
27541
|
+
invoked_via_function_url: typing.Optional[builtins.bool] = None,
|
|
27507
27542
|
organization_id: typing.Optional[builtins.str] = None,
|
|
27508
27543
|
scope: typing.Optional[_constructs_77d1e7e8.Construct] = None,
|
|
27509
27544
|
source_account: typing.Optional[builtins.str] = None,
|
|
@@ -27516,6 +27551,7 @@ class _IFunctionProxy(
|
|
|
27516
27551
|
:param action: The Lambda actions that you want to allow in this statement. For example, you can specify lambda:CreateFunction to specify a certain action, or use a wildcard (``lambda:*``) to grant permission to all Lambda actions. For a list of actions, see Actions and Condition Context Keys for AWS Lambda in the IAM User Guide. Default: 'lambda:InvokeFunction'
|
|
27517
27552
|
:param event_source_token: A unique token that must be supplied by the principal invoking the function. Default: - The caller would not need to present a token.
|
|
27518
27553
|
:param function_url_auth_type: The authType for the function URL that you are granting permissions for. Default: - No functionUrlAuthType
|
|
27554
|
+
:param invoked_via_function_url: The condition key for limiting the scope of lambda:InvokeFunction action to Function URL only. When set to true, it restricts the principal in this policy to perform invokes for the resource only via Function URLs. Default: - false
|
|
27519
27555
|
:param organization_id: The organization you want to grant permissions to. Use this ONLY if you need to grant permissions to a subset of the organization. If you want to grant permissions to the entire organization, sending the organization principal through the ``principal`` property will suffice. You can use this property to ensure that all source principals are owned by a specific organization. Default: - No organizationId
|
|
27520
27556
|
:param scope: The scope to which the permission constructs be attached. The default is the Lambda function construct itself, but this would need to be different in cases such as cross-stack references where the Permissions would need to sit closer to the consumer of this permission (i.e., the caller). Default: - The instance of lambda.IFunction
|
|
27521
27557
|
:param source_account: The AWS account ID (without hyphens) of the source owner. For example, if you specify an S3 bucket in the SourceArn property, this value is the bucket owner's account ID. You can use this property to ensure that all source principals are owned by a specific account.
|
|
@@ -27531,6 +27567,7 @@ class _IFunctionProxy(
|
|
|
27531
27567
|
action=action,
|
|
27532
27568
|
event_source_token=event_source_token,
|
|
27533
27569
|
function_url_auth_type=function_url_auth_type,
|
|
27570
|
+
invoked_via_function_url=invoked_via_function_url,
|
|
27534
27571
|
organization_id=organization_id,
|
|
27535
27572
|
scope=scope,
|
|
27536
27573
|
source_account=source_account,
|
|
@@ -28806,6 +28843,7 @@ class FunctionBase(
|
|
|
28806
28843
|
action: typing.Optional[builtins.str] = None,
|
|
28807
28844
|
event_source_token: typing.Optional[builtins.str] = None,
|
|
28808
28845
|
function_url_auth_type: typing.Optional[FunctionUrlAuthType] = None,
|
|
28846
|
+
invoked_via_function_url: typing.Optional[builtins.bool] = None,
|
|
28809
28847
|
organization_id: typing.Optional[builtins.str] = None,
|
|
28810
28848
|
scope: typing.Optional[_constructs_77d1e7e8.Construct] = None,
|
|
28811
28849
|
source_account: typing.Optional[builtins.str] = None,
|
|
@@ -28818,6 +28856,7 @@ class FunctionBase(
|
|
|
28818
28856
|
:param action: The Lambda actions that you want to allow in this statement. For example, you can specify lambda:CreateFunction to specify a certain action, or use a wildcard (``lambda:*``) to grant permission to all Lambda actions. For a list of actions, see Actions and Condition Context Keys for AWS Lambda in the IAM User Guide. Default: 'lambda:InvokeFunction'
|
|
28819
28857
|
:param event_source_token: A unique token that must be supplied by the principal invoking the function. Default: - The caller would not need to present a token.
|
|
28820
28858
|
:param function_url_auth_type: The authType for the function URL that you are granting permissions for. Default: - No functionUrlAuthType
|
|
28859
|
+
:param invoked_via_function_url: The condition key for limiting the scope of lambda:InvokeFunction action to Function URL only. When set to true, it restricts the principal in this policy to perform invokes for the resource only via Function URLs. Default: - false
|
|
28821
28860
|
:param organization_id: The organization you want to grant permissions to. Use this ONLY if you need to grant permissions to a subset of the organization. If you want to grant permissions to the entire organization, sending the organization principal through the ``principal`` property will suffice. You can use this property to ensure that all source principals are owned by a specific organization. Default: - No organizationId
|
|
28822
28861
|
:param scope: The scope to which the permission constructs be attached. The default is the Lambda function construct itself, but this would need to be different in cases such as cross-stack references where the Permissions would need to sit closer to the consumer of this permission (i.e., the caller). Default: - The instance of lambda.IFunction
|
|
28823
28862
|
:param source_account: The AWS account ID (without hyphens) of the source owner. For example, if you specify an S3 bucket in the SourceArn property, this value is the bucket owner's account ID. You can use this property to ensure that all source principals are owned by a specific account.
|
|
@@ -28833,6 +28872,7 @@ class FunctionBase(
|
|
|
28833
28872
|
action=action,
|
|
28834
28873
|
event_source_token=event_source_token,
|
|
28835
28874
|
function_url_auth_type=function_url_auth_type,
|
|
28875
|
+
invoked_via_function_url=invoked_via_function_url,
|
|
28836
28876
|
organization_id=organization_id,
|
|
28837
28877
|
scope=scope,
|
|
28838
28878
|
source_account=source_account,
|
|
@@ -29892,6 +29932,7 @@ class SingletonFunction(
|
|
|
29892
29932
|
action: typing.Optional[builtins.str] = None,
|
|
29893
29933
|
event_source_token: typing.Optional[builtins.str] = None,
|
|
29894
29934
|
function_url_auth_type: typing.Optional[FunctionUrlAuthType] = None,
|
|
29935
|
+
invoked_via_function_url: typing.Optional[builtins.bool] = None,
|
|
29895
29936
|
organization_id: typing.Optional[builtins.str] = None,
|
|
29896
29937
|
scope: typing.Optional[_constructs_77d1e7e8.Construct] = None,
|
|
29897
29938
|
source_account: typing.Optional[builtins.str] = None,
|
|
@@ -29904,6 +29945,7 @@ class SingletonFunction(
|
|
|
29904
29945
|
:param action: The Lambda actions that you want to allow in this statement. For example, you can specify lambda:CreateFunction to specify a certain action, or use a wildcard (``lambda:*``) to grant permission to all Lambda actions. For a list of actions, see Actions and Condition Context Keys for AWS Lambda in the IAM User Guide. Default: 'lambda:InvokeFunction'
|
|
29905
29946
|
:param event_source_token: A unique token that must be supplied by the principal invoking the function. Default: - The caller would not need to present a token.
|
|
29906
29947
|
:param function_url_auth_type: The authType for the function URL that you are granting permissions for. Default: - No functionUrlAuthType
|
|
29948
|
+
:param invoked_via_function_url: The condition key for limiting the scope of lambda:InvokeFunction action to Function URL only. When set to true, it restricts the principal in this policy to perform invokes for the resource only via Function URLs. Default: - false
|
|
29907
29949
|
:param organization_id: The organization you want to grant permissions to. Use this ONLY if you need to grant permissions to a subset of the organization. If you want to grant permissions to the entire organization, sending the organization principal through the ``principal`` property will suffice. You can use this property to ensure that all source principals are owned by a specific organization. Default: - No organizationId
|
|
29908
29950
|
:param scope: The scope to which the permission constructs be attached. The default is the Lambda function construct itself, but this would need to be different in cases such as cross-stack references where the Permissions would need to sit closer to the consumer of this permission (i.e., the caller). Default: - The instance of lambda.IFunction
|
|
29909
29951
|
:param source_account: The AWS account ID (without hyphens) of the source owner. For example, if you specify an S3 bucket in the SourceArn property, this value is the bucket owner's account ID. You can use this property to ensure that all source principals are owned by a specific account.
|
|
@@ -29917,6 +29959,7 @@ class SingletonFunction(
|
|
|
29917
29959
|
action=action,
|
|
29918
29960
|
event_source_token=event_source_token,
|
|
29919
29961
|
function_url_auth_type=function_url_auth_type,
|
|
29962
|
+
invoked_via_function_url=invoked_via_function_url,
|
|
29920
29963
|
organization_id=organization_id,
|
|
29921
29964
|
scope=scope,
|
|
29922
29965
|
source_account=source_account,
|
|
@@ -33115,6 +33158,7 @@ def _typecheckingstub__43f02634f6ed895ea88b35db6c7a6ba5a7da45fa4945d0f90bf36d079
|
|
|
33115
33158
|
action: typing.Optional[builtins.str] = None,
|
|
33116
33159
|
event_source_token: typing.Optional[builtins.str] = None,
|
|
33117
33160
|
function_url_auth_type: typing.Optional[FunctionUrlAuthType] = None,
|
|
33161
|
+
invoked_via_function_url: typing.Optional[builtins.bool] = None,
|
|
33118
33162
|
organization_id: typing.Optional[builtins.str] = None,
|
|
33119
33163
|
scope: typing.Optional[_constructs_77d1e7e8.Construct] = None,
|
|
33120
33164
|
source_account: typing.Optional[builtins.str] = None,
|
|
@@ -34803,6 +34847,7 @@ def _typecheckingstub__012ac5126b1401118a0cd31e22b2fef5e1ab897a320c6edf7d16633af
|
|
|
34803
34847
|
action: typing.Optional[builtins.str] = None,
|
|
34804
34848
|
event_source_token: typing.Optional[builtins.str] = None,
|
|
34805
34849
|
function_url_auth_type: typing.Optional[FunctionUrlAuthType] = None,
|
|
34850
|
+
invoked_via_function_url: typing.Optional[builtins.bool] = None,
|
|
34806
34851
|
organization_id: typing.Optional[builtins.str] = None,
|
|
34807
34852
|
scope: typing.Optional[_constructs_77d1e7e8.Construct] = None,
|
|
34808
34853
|
source_account: typing.Optional[builtins.str] = None,
|
|
@@ -35048,6 +35093,7 @@ def _typecheckingstub__213097e02686d5b4e582802e2e3e822fb2c79f2920c55d92f2f4f8f05
|
|
|
35048
35093
|
action: typing.Optional[builtins.str] = None,
|
|
35049
35094
|
event_source_token: typing.Optional[builtins.str] = None,
|
|
35050
35095
|
function_url_auth_type: typing.Optional[FunctionUrlAuthType] = None,
|
|
35096
|
+
invoked_via_function_url: typing.Optional[builtins.bool] = None,
|
|
35051
35097
|
organization_id: typing.Optional[builtins.str] = None,
|
|
35052
35098
|
scope: typing.Optional[_constructs_77d1e7e8.Construct] = None,
|
|
35053
35099
|
source_account: typing.Optional[builtins.str] = None,
|
|
@@ -35245,6 +35291,7 @@ def _typecheckingstub__6d48a048e22819587505668ae6e1fbdfeedaaaf355ad52bd1196e683b
|
|
|
35245
35291
|
action: typing.Optional[builtins.str] = None,
|
|
35246
35292
|
event_source_token: typing.Optional[builtins.str] = None,
|
|
35247
35293
|
function_url_auth_type: typing.Optional[FunctionUrlAuthType] = None,
|
|
35294
|
+
invoked_via_function_url: typing.Optional[builtins.bool] = None,
|
|
35248
35295
|
organization_id: typing.Optional[builtins.str] = None,
|
|
35249
35296
|
scope: typing.Optional[_constructs_77d1e7e8.Construct] = None,
|
|
35250
35297
|
source_account: typing.Optional[builtins.str] = None,
|
|
@@ -35583,3 +35630,6 @@ def _typecheckingstub__368a49fe1f866c7ea7986c57b6f8488d0fddea8f62bf05ec1ed7eb09b
|
|
|
35583
35630
|
) -> None:
|
|
35584
35631
|
"""Type checking stubs"""
|
|
35585
35632
|
pass
|
|
35633
|
+
|
|
35634
|
+
for cls in [IAlias, IAliasRef, ICodeSigningConfig, ICodeSigningConfigRef, IDestination, IEventInvokeConfigRef, IEventSource, IEventSourceDlq, IEventSourceMapping, IEventSourceMappingRef, IFunction, IFunctionRef, IFunctionUrl, ILayerVersion, ILayerVersionPermissionRef, ILayerVersionRef, IPermissionRef, IScalableFunctionAttribute, ISchemaRegistry, IUrlRef, IVersion, IVersionRef]:
|
|
35635
|
+
typing.cast(typing.Any, cls).__protocol_attrs__ = typing.cast(typing.Any, cls).__protocol_attrs__ - set(['__jsii_proxy_class__', '__jsii_type__'])
|
|
@@ -3193,3 +3193,6 @@ def _typecheckingstub__2da45b394f0332be0f6d6b7468d9fb54961953d56265da69955d36ffa
|
|
|
3193
3193
|
) -> None:
|
|
3194
3194
|
"""Type checking stubs"""
|
|
3195
3195
|
pass
|
|
3196
|
+
|
|
3197
|
+
for cls in [ICommandHooks]:
|
|
3198
|
+
typing.cast(typing.Any, cls).__protocol_attrs__ = typing.cast(typing.Any, cls).__protocol_attrs__ - set(['__jsii_proxy_class__', '__jsii_type__'])
|
|
@@ -625,3 +625,6 @@ def _typecheckingstub__057665c8ffa5f5cdaedcf0301e727d15ee8b0244807853f59c72aadbb
|
|
|
625
625
|
) -> None:
|
|
626
626
|
"""Type checking stubs"""
|
|
627
627
|
pass
|
|
628
|
+
|
|
629
|
+
for cls in [IDeploymentRef]:
|
|
630
|
+
typing.cast(typing.Any, cls).__protocol_attrs__ = typing.cast(typing.Any, cls).__protocol_attrs__ - set(['__jsii_proxy_class__', '__jsii_type__'])
|
aws_cdk/aws_lex/__init__.py
CHANGED
|
@@ -13794,27 +13794,6 @@ class CfnBotAlias(
|
|
|
13794
13794
|
|
|
13795
13795
|
jsii.create(self.__class__, self, [scope, id, props])
|
|
13796
13796
|
|
|
13797
|
-
@jsii.member(jsii_name="fromBotAliasArn")
|
|
13798
|
-
@builtins.classmethod
|
|
13799
|
-
def from_bot_alias_arn(
|
|
13800
|
-
cls,
|
|
13801
|
-
scope: _constructs_77d1e7e8.Construct,
|
|
13802
|
-
id: builtins.str,
|
|
13803
|
-
arn: builtins.str,
|
|
13804
|
-
) -> IBotAliasRef:
|
|
13805
|
-
'''Creates a new IBotAliasRef from an ARN.
|
|
13806
|
-
|
|
13807
|
-
:param scope: -
|
|
13808
|
-
:param id: -
|
|
13809
|
-
:param arn: -
|
|
13810
|
-
'''
|
|
13811
|
-
if __debug__:
|
|
13812
|
-
type_hints = typing.get_type_hints(_typecheckingstub__2ab747fa9eb7cb105192618f589a683ebd337733abaa1cc095d0ab0c0fa55d0d)
|
|
13813
|
-
check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
|
|
13814
|
-
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
13815
|
-
check_type(argname="argument arn", value=arn, expected_type=type_hints["arn"])
|
|
13816
|
-
return typing.cast(IBotAliasRef, jsii.sinvoke(cls, "fromBotAliasArn", [scope, id, arn]))
|
|
13817
|
-
|
|
13818
13797
|
@jsii.member(jsii_name="inspect")
|
|
13819
13798
|
def inspect(self, inspector: _TreeInspector_488e0dd5) -> None:
|
|
13820
13799
|
'''Examines the CloudFormation resource and discloses attributes.
|
|
@@ -16545,14 +16524,6 @@ def _typecheckingstub__57cf179c443f74ff3b1c43c56eef686f369711792e444e53d5668f07a
|
|
|
16545
16524
|
"""Type checking stubs"""
|
|
16546
16525
|
pass
|
|
16547
16526
|
|
|
16548
|
-
def _typecheckingstub__2ab747fa9eb7cb105192618f589a683ebd337733abaa1cc095d0ab0c0fa55d0d(
|
|
16549
|
-
scope: _constructs_77d1e7e8.Construct,
|
|
16550
|
-
id: builtins.str,
|
|
16551
|
-
arn: builtins.str,
|
|
16552
|
-
) -> None:
|
|
16553
|
-
"""Type checking stubs"""
|
|
16554
|
-
pass
|
|
16555
|
-
|
|
16556
16527
|
def _typecheckingstub__69e306fef7aca1ecd05a385248f8253ae3fef56958f84e69c038125bb4b466d0(
|
|
16557
16528
|
inspector: _TreeInspector_488e0dd5,
|
|
16558
16529
|
) -> None:
|
|
@@ -16795,3 +16766,6 @@ def _typecheckingstub__c2269eb87c059c5d27aab85364fde6b4ccb6e21ca5bc766b939d038b5
|
|
|
16795
16766
|
) -> None:
|
|
16796
16767
|
"""Type checking stubs"""
|
|
16797
16768
|
pass
|
|
16769
|
+
|
|
16770
|
+
for cls in [IBotAliasRef, IBotRef, IBotVersionRef, IResourcePolicyRef]:
|
|
16771
|
+
typing.cast(typing.Any, cls).__protocol_attrs__ = typing.cast(typing.Any, cls).__protocol_attrs__ - set(['__jsii_proxy_class__', '__jsii_type__'])
|
|
@@ -2058,3 +2058,6 @@ def _typecheckingstub__483b5b4e301dfddf60a6c6da8bdc4898ec615b5045a70ceeeefc10fe7
|
|
|
2058
2058
|
) -> None:
|
|
2059
2059
|
"""Type checking stubs"""
|
|
2060
2060
|
pass
|
|
2061
|
+
|
|
2062
|
+
for cls in [IGrantRef, ILicenseRef]:
|
|
2063
|
+
typing.cast(typing.Any, cls).__protocol_attrs__ = typing.cast(typing.Any, cls).__protocol_attrs__ - set(['__jsii_proxy_class__', '__jsii_type__'])
|