aws-cdk-lib 2.73.0__py3-none-any.whl → 2.76.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk-lib might be problematic. Click here for more details.
- aws_cdk/__init__.py +245 -259
- aws_cdk/_jsii/__init__.py +1 -1
- aws_cdk/_jsii/{aws-cdk-lib@2.73.0.jsii.tgz → aws-cdk-lib@2.76.0.jsii.tgz} +0 -0
- aws_cdk/aws_amplifyuibuilder/__init__.py +182 -214
- aws_cdk/aws_apigateway/__init__.py +95 -148
- aws_cdk/aws_appconfig/__init__.py +8 -4
- aws_cdk/aws_appflow/__init__.py +27 -52
- aws_cdk/aws_appmesh/__init__.py +91 -200
- aws_cdk/aws_apprunner/__init__.py +4 -16
- aws_cdk/aws_appstream/__init__.py +18 -82
- aws_cdk/aws_athena/__init__.py +18 -32
- aws_cdk/aws_backup/__init__.py +48 -86
- aws_cdk/aws_batch/__init__.py +9 -2
- aws_cdk/aws_billingconductor/__init__.py +12 -7
- aws_cdk/aws_budgets/__init__.py +8 -17
- aws_cdk/aws_certificatemanager/__init__.py +7 -4
- aws_cdk/aws_cloudfront/__init__.py +14 -11
- aws_cdk/aws_cloudfront_origins/__init__.py +18 -8
- aws_cdk/aws_cloudtrail/__init__.py +7 -14
- aws_cdk/aws_cloudwatch/__init__.py +63 -35
- aws_cdk/aws_codebuild/__init__.py +10 -13
- aws_cdk/aws_codecommit/__init__.py +0 -1
- aws_cdk/aws_codedeploy/__init__.py +165 -162
- aws_cdk/aws_codegurureviewer/__init__.py +4 -4
- aws_cdk/aws_codepipeline/__init__.py +0 -4
- aws_cdk/aws_codepipeline_actions/__init__.py +16 -164
- aws_cdk/aws_cognito/__init__.py +195 -100
- aws_cdk/aws_config/__init__.py +28 -51
- aws_cdk/aws_connectcampaigns/__init__.py +5 -6
- aws_cdk/aws_databrew/__init__.py +5 -6
- aws_cdk/aws_dlm/__init__.py +33 -71
- aws_cdk/aws_docdb/__init__.py +20 -76
- aws_cdk/aws_dynamodb/__init__.py +29 -22
- aws_cdk/aws_ec2/__init__.py +2414 -603
- aws_cdk/aws_ecr/__init__.py +1 -2
- aws_cdk/aws_ecr_assets/__init__.py +27 -14
- aws_cdk/aws_ecs/__init__.py +458 -163
- aws_cdk/aws_ecs_patterns/__init__.py +13 -11
- aws_cdk/aws_eks/__init__.py +13 -8
- aws_cdk/aws_elasticloadbalancing/__init__.py +16 -9
- aws_cdk/aws_elasticloadbalancingv2/__init__.py +142 -82
- aws_cdk/aws_elasticloadbalancingv2_actions/__init__.py +126 -61
- aws_cdk/aws_elasticsearch/__init__.py +0 -7
- aws_cdk/aws_emr/__init__.py +7 -16
- aws_cdk/aws_emrserverless/__init__.py +14 -18
- aws_cdk/aws_events/__init__.py +33 -29
- aws_cdk/aws_events_targets/__init__.py +248 -89
- aws_cdk/aws_frauddetector/__init__.py +3 -4
- aws_cdk/aws_fsx/__init__.py +13 -7
- aws_cdk/aws_gamelift/__init__.py +11 -20
- aws_cdk/aws_grafana/__init__.py +4 -4
- aws_cdk/aws_iam/__init__.py +21 -25
- aws_cdk/aws_imagebuilder/__init__.py +58 -80
- aws_cdk/aws_internetmonitor/__init__.py +18 -10
- aws_cdk/aws_iot/__init__.py +16 -10
- aws_cdk/aws_iotcoredeviceadvisor/__init__.py +16 -26
- aws_cdk/aws_iotevents/__init__.py +6 -4
- aws_cdk/aws_iotfleetwise/__init__.py +27 -40
- aws_cdk/aws_iotsitewise/__init__.py +8 -5
- aws_cdk/aws_iotwireless/__init__.py +14 -9
- aws_cdk/aws_kinesisfirehose/__init__.py +21 -38
- aws_cdk/aws_lambda/__init__.py +76 -53
- aws_cdk/aws_lambda_event_sources/__init__.py +6 -21
- aws_cdk/aws_logs/__init__.py +5 -7
- aws_cdk/aws_macie/__init__.py +28 -23
- aws_cdk/aws_mediaconnect/__init__.py +5 -8
- aws_cdk/aws_mediaconvert/__init__.py +2 -2
- aws_cdk/aws_medialive/__init__.py +2 -4
- aws_cdk/aws_mediapackage/__init__.py +9 -18
- aws_cdk/aws_memorydb/__init__.py +5 -10
- aws_cdk/aws_mwaa/__init__.py +8 -4
- aws_cdk/aws_neptune/__init__.py +4 -4
- aws_cdk/aws_networkfirewall/__init__.py +8 -4
- aws_cdk/aws_networkmanager/__init__.py +4 -4
- aws_cdk/aws_nimblestudio/__init__.py +25 -45
- aws_cdk/aws_opensearchservice/__init__.py +0 -1
- aws_cdk/aws_panorama/__init__.py +11 -12
- aws_cdk/aws_personalize/__init__.py +46 -72
- aws_cdk/aws_pinpoint/__init__.py +36 -65
- aws_cdk/aws_quicksight/__init__.py +9972 -13374
- aws_cdk/aws_rds/__init__.py +53 -22
- aws_cdk/aws_route53/__init__.py +8 -16
- aws_cdk/aws_route53_targets/__init__.py +2 -4
- aws_cdk/aws_s3/__init__.py +41 -90
- aws_cdk/aws_s3_notifications/__init__.py +0 -3
- aws_cdk/aws_sagemaker/__init__.py +16 -10
- aws_cdk/aws_secretsmanager/__init__.py +17 -14
- aws_cdk/aws_servicecatalog/__init__.py +60 -83
- aws_cdk/aws_servicediscovery/__init__.py +4 -6
- aws_cdk/aws_ses/__init__.py +734 -28
- aws_cdk/aws_sns/__init__.py +4 -8
- aws_cdk/aws_ssm/__init__.py +19 -23
- aws_cdk/aws_ssmcontacts/__init__.py +10 -6
- aws_cdk/aws_ssmincidents/__init__.py +2 -1
- aws_cdk/aws_sso/__init__.py +4 -4
- aws_cdk/aws_stepfunctions/__init__.py +6 -15
- aws_cdk/aws_stepfunctions_tasks/__init__.py +51 -24
- aws_cdk/aws_timestream/__init__.py +22 -28
- aws_cdk/aws_transfer/__init__.py +188 -86
- aws_cdk/aws_wafv2/__init__.py +54 -38
- aws_cdk/aws_xray/__init__.py +15 -22
- aws_cdk/cloud_assembly_schema/__init__.py +14 -6
- aws_cdk/custom_resources/__init__.py +2 -3
- aws_cdk/pipelines/__init__.py +104 -134
- aws_cdk/triggers/__init__.py +46 -61
- {aws_cdk_lib-2.73.0.dist-info → aws_cdk_lib-2.76.0.dist-info}/METADATA +47 -92
- {aws_cdk_lib-2.73.0.dist-info → aws_cdk_lib-2.76.0.dist-info}/RECORD +111 -111
- {aws_cdk_lib-2.73.0.dist-info → aws_cdk_lib-2.76.0.dist-info}/LICENSE +0 -0
- {aws_cdk_lib-2.73.0.dist-info → aws_cdk_lib-2.76.0.dist-info}/NOTICE +0 -0
- {aws_cdk_lib-2.73.0.dist-info → aws_cdk_lib-2.76.0.dist-info}/WHEEL +0 -0
- {aws_cdk_lib-2.73.0.dist-info → aws_cdk_lib-2.76.0.dist-info}/top_level.txt +0 -0
aws_cdk/aws_wafv2/__init__.py
CHANGED
|
@@ -3278,7 +3278,7 @@ class CfnRuleGroup(
|
|
|
3278
3278
|
|
|
3279
3279
|
This is used to indicate the web request component to inspect, in the ``FieldToMatch`` specification.
|
|
3280
3280
|
|
|
3281
|
-
:param oversize_handling: What AWS WAF should do if the body is larger than AWS WAF can inspect. AWS WAF does not support inspecting the entire contents of the
|
|
3281
|
+
:param oversize_handling: What AWS WAF should do if the body is larger than AWS WAF can inspect. AWS WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service only forwards the contents that are below the limit to AWS WAF for inspection. The default limit is 8 KB (8,192 kilobytes) for regional resources and 16 KB (16,384 kilobytes) for CloudFront distributions. For CloudFront distributions, you can increase the limit in the web ACL ``AssociationConfig`` , for additional processing fees. The options for oversize handling are the following: - ``CONTINUE`` - Inspect the body normally, according to the rule inspection criteria. - ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request. - ``NO_MATCH`` - Treat the web request as not matching the rule statement. You can combine the ``MATCH`` or ``NO_MATCH`` settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit. Default: ``CONTINUE``
|
|
3282
3282
|
|
|
3283
3283
|
:link: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-rulegroup-body.html
|
|
3284
3284
|
:exampleMetadata: fixture=_generated
|
|
@@ -3304,7 +3304,9 @@ class CfnRuleGroup(
|
|
|
3304
3304
|
def oversize_handling(self) -> typing.Optional[builtins.str]:
|
|
3305
3305
|
'''What AWS WAF should do if the body is larger than AWS WAF can inspect.
|
|
3306
3306
|
|
|
3307
|
-
AWS WAF does not support inspecting the entire contents of the
|
|
3307
|
+
AWS WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service only forwards the contents that are below the limit to AWS WAF for inspection.
|
|
3308
|
+
|
|
3309
|
+
The default limit is 8 KB (8,192 kilobytes) for regional resources and 16 KB (16,384 kilobytes) for CloudFront distributions. For CloudFront distributions, you can increase the limit in the web ACL ``AssociationConfig`` , for additional processing fees.
|
|
3308
3310
|
|
|
3309
3311
|
The options for oversize handling are the following:
|
|
3310
3312
|
|
|
@@ -3312,7 +3314,7 @@ class CfnRuleGroup(
|
|
|
3312
3314
|
- ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request.
|
|
3313
3315
|
- ``NO_MATCH`` - Treat the web request as not matching the rule statement.
|
|
3314
3316
|
|
|
3315
|
-
You can combine the ``MATCH`` or ``NO_MATCH`` settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over
|
|
3317
|
+
You can combine the ``MATCH`` or ``NO_MATCH`` settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit.
|
|
3316
3318
|
|
|
3317
3319
|
Default: ``CONTINUE``
|
|
3318
3320
|
|
|
@@ -4434,10 +4436,10 @@ class CfnRuleGroup(
|
|
|
4434
4436
|
``"FieldToMatch": { "Method": { "Name": "DELETE" } }``
|
|
4435
4437
|
|
|
4436
4438
|
:param all_query_arguments: Inspect all query arguments.
|
|
4437
|
-
:param body: Inspect the request body as plain text. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form.
|
|
4439
|
+
:param body: Inspect the request body as plain text. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. A limited amount of the request body is forwarded to AWS WAF for inspection by the underlying host service. For regional resources, the limit is 8 KB (8,192 kilobytes) and for CloudFront distributions, the limit is 16 KB (16,384 kilobytes). For CloudFront distributions, you can increase the limit in the web ACL's ``AssociationConfig`` , for additional processing fees. For information about how to handle oversized request bodies, see the ``Body`` object configuration.
|
|
4438
4440
|
:param cookies: Inspect the request cookies. You must configure scope and pattern matching filters in the ``Cookies`` object, to define the set of cookies and the parts of the cookies that AWS WAF inspects. Only the first 8 KB (8192 bytes) of a request's cookies and only the first 200 cookies are forwarded to AWS WAF for inspection by the underlying host service. You must configure how to handle any oversize cookie content in the ``Cookies`` object. AWS WAF applies the pattern matching filters to the cookies that it receives from the underlying host service.
|
|
4439
4441
|
:param headers: Inspect the request headers. You must configure scope and pattern matching filters in the ``Headers`` object, to define the set of headers to and the parts of the headers that AWS WAF inspects. Only the first 8 KB (8192 bytes) of a request's headers and only the first 200 headers are forwarded to AWS WAF for inspection by the underlying host service. You must configure how to handle any oversize header content in the ``Headers`` object. AWS WAF applies the pattern matching filters to the headers that it receives from the underlying host service.
|
|
4440
|
-
:param json_body: Inspect the request body as JSON. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form.
|
|
4442
|
+
:param json_body: Inspect the request body as JSON. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. A limited amount of the request body is forwarded to AWS WAF for inspection by the underlying host service. For regional resources, the limit is 8 KB (8,192 kilobytes) and for CloudFront distributions, the limit is 16 KB (16,384 kilobytes). For CloudFront distributions, you can increase the limit in the web ACL's ``AssociationConfig`` , for additional processing fees. For information about how to handle oversized request bodies, see the ``JsonBody`` object configuration.
|
|
4441
4443
|
:param method: Inspect the HTTP method. The method indicates the type of operation that the request is asking the origin to perform.
|
|
4442
4444
|
:param query_string: Inspect the query string. This is the part of a URL that appears after a ``?`` character, if any.
|
|
4443
4445
|
:param single_header: Inspect a single header. Provide the name of the header to inspect, for example, ``User-Agent`` or ``Referer`` . This setting isn't case sensitive. Example JSON: ``"SingleHeader": { "Name": "haystack" }`` Alternately, you can filter and inspect all headers with the ``Headers`` ``FieldToMatch`` setting.
|
|
@@ -4553,7 +4555,9 @@ class CfnRuleGroup(
|
|
|
4553
4555
|
|
|
4554
4556
|
The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form.
|
|
4555
4557
|
|
|
4556
|
-
|
|
4558
|
+
A limited amount of the request body is forwarded to AWS WAF for inspection by the underlying host service. For regional resources, the limit is 8 KB (8,192 kilobytes) and for CloudFront distributions, the limit is 16 KB (16,384 kilobytes). For CloudFront distributions, you can increase the limit in the web ACL's ``AssociationConfig`` , for additional processing fees.
|
|
4559
|
+
|
|
4560
|
+
For information about how to handle oversized request bodies, see the ``Body`` object configuration.
|
|
4557
4561
|
|
|
4558
4562
|
:link: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-rulegroup-fieldtomatch.html#cfn-wafv2-rulegroup-fieldtomatch-body
|
|
4559
4563
|
'''
|
|
@@ -4598,7 +4602,9 @@ class CfnRuleGroup(
|
|
|
4598
4602
|
|
|
4599
4603
|
The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form.
|
|
4600
4604
|
|
|
4601
|
-
|
|
4605
|
+
A limited amount of the request body is forwarded to AWS WAF for inspection by the underlying host service. For regional resources, the limit is 8 KB (8,192 kilobytes) and for CloudFront distributions, the limit is 16 KB (16,384 kilobytes). For CloudFront distributions, you can increase the limit in the web ACL's ``AssociationConfig`` , for additional processing fees.
|
|
4606
|
+
|
|
4607
|
+
For information about how to handle oversized request bodies, see the ``JsonBody`` object configuration.
|
|
4602
4608
|
|
|
4603
4609
|
:link: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-rulegroup-fieldtomatch.html#cfn-wafv2-rulegroup-fieldtomatch-jsonbody
|
|
4604
4610
|
'''
|
|
@@ -5385,7 +5391,7 @@ class CfnRuleGroup(
|
|
|
5385
5391
|
:param match_pattern: The patterns to look for in the JSON body. AWS WAF inspects the results of these pattern matches against the rule inspection criteria.
|
|
5386
5392
|
:param match_scope: The parts of the JSON to match against using the ``MatchPattern`` . If you specify ``All`` , AWS WAF matches against keys and values.
|
|
5387
5393
|
:param invalid_fallback_behavior: What AWS WAF should do if it fails to completely parse the JSON body. The options are the following:. - ``EVALUATE_AS_STRING`` - Inspect the body as plain text. AWS WAF applies the text transformations and inspection criteria that you defined for the JSON inspection to the body text string. - ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request. - ``NO_MATCH`` - Treat the web request as not matching the rule statement. If you don't provide this setting, AWS WAF parses and evaluates the content only up to the first parsing failure that it encounters. AWS WAF does its best to parse the entire JSON body, but might be forced to stop for reasons such as invalid characters, duplicate keys, truncation, and any content whose root node isn't an object or an array. AWS WAF parses the JSON in the following examples as two valid key, value pairs: - Missing comma: ``{"key1":"value1""key2":"value2"}`` - Missing colon: ``{"key1":"value1","key2""value2"}`` - Extra colons: ``{"key1"::"value1","key2""value2"}``
|
|
5388
|
-
:param oversize_handling: What AWS WAF should do if the body is larger than AWS WAF can inspect. AWS WAF does not support inspecting the entire contents of the
|
|
5394
|
+
:param oversize_handling: What AWS WAF should do if the body is larger than AWS WAF can inspect. AWS WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service only forwards the contents that are below the limit to AWS WAF for inspection. The default limit is 8 KB (8,192 kilobytes) for regional resources and 16 KB (16,384 kilobytes) for CloudFront distributions. For CloudFront distributions, you can increase the limit in the web ACL ``AssociationConfig`` , for additional processing fees. The options for oversize handling are the following: - ``CONTINUE`` - Inspect the body normally, according to the rule inspection criteria. - ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request. - ``NO_MATCH`` - Treat the web request as not matching the rule statement. You can combine the ``MATCH`` or ``NO_MATCH`` settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit. Default: ``CONTINUE``
|
|
5389
5395
|
|
|
5390
5396
|
:link: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-rulegroup-jsonbody.html
|
|
5391
5397
|
:exampleMetadata: fixture=_generated
|
|
@@ -5478,7 +5484,9 @@ class CfnRuleGroup(
|
|
|
5478
5484
|
def oversize_handling(self) -> typing.Optional[builtins.str]:
|
|
5479
5485
|
'''What AWS WAF should do if the body is larger than AWS WAF can inspect.
|
|
5480
5486
|
|
|
5481
|
-
AWS WAF does not support inspecting the entire contents of the
|
|
5487
|
+
AWS WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service only forwards the contents that are below the limit to AWS WAF for inspection.
|
|
5488
|
+
|
|
5489
|
+
The default limit is 8 KB (8,192 kilobytes) for regional resources and 16 KB (16,384 kilobytes) for CloudFront distributions. For CloudFront distributions, you can increase the limit in the web ACL ``AssociationConfig`` , for additional processing fees.
|
|
5482
5490
|
|
|
5483
5491
|
The options for oversize handling are the following:
|
|
5484
5492
|
|
|
@@ -5486,7 +5494,7 @@ class CfnRuleGroup(
|
|
|
5486
5494
|
- ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request.
|
|
5487
5495
|
- ``NO_MATCH`` - Treat the web request as not matching the rule statement.
|
|
5488
5496
|
|
|
5489
|
-
You can combine the ``MATCH`` or ``NO_MATCH`` settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over
|
|
5497
|
+
You can combine the ``MATCH`` or ``NO_MATCH`` settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit.
|
|
5490
5498
|
|
|
5491
5499
|
Default: ``CONTINUE``
|
|
5492
5500
|
|
|
@@ -8209,7 +8217,7 @@ class CfnRuleGroup(
|
|
|
8209
8217
|
|
|
8210
8218
|
For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes.
|
|
8211
8219
|
|
|
8212
|
-
If you configure AWS WAF to inspect the request body, AWS WAF inspects only the
|
|
8220
|
+
If you configure AWS WAF to inspect the request body, AWS WAF inspects only the number of bytes of the body up to the limit for the web ACL. By default, for regional web ACLs, this limit is 8 KB (8,192 kilobytes) and for CloudFront web ACLs, this limit is 16 KB (16,384 kilobytes). For CloudFront web ACLs, you can increase the limit in the web ACL ``AssociationConfig`` , for additional fees. If you know that the request body for your web requests should never exceed the inspection limit, you could use a size constraint statement to block requests that have a larger request body size.
|
|
8213
8221
|
|
|
8214
8222
|
If you choose URI for the value of Part of the request to filter on, the slash (/) in the URI counts as one character. For example, the URI ``/logo.jpg`` is nine characters long.
|
|
8215
8223
|
|
|
@@ -8559,7 +8567,7 @@ class CfnRuleGroup(
|
|
|
8559
8567
|
:param rate_based_statement: A rate-based rule tracks the rate of requests for each originating IP address, and triggers the rule action when the rate exceeds a limit that you specify on the number of requests in any 5-minute time span. You can use this to put a temporary block on requests from an IP address that is sending excessive requests. AWS WAF tracks and manages web requests separately for each instance of a rate-based rule that you use. For example, if you provide the same rate-based rule settings in two web ACLs, each of the two rule statements represents a separate instance of the rate-based rule and gets its own tracking and management by AWS WAF . If you define a rate-based rule inside a rule group, and then use that rule group in multiple places, each use creates a separate instance of the rate-based rule that gets its own tracking and management by AWS WAF . When the rule action triggers, AWS WAF blocks additional requests from the IP address until the request rate falls below the limit. You can optionally nest another statement inside the rate-based statement, to narrow the scope of the rule so that it only counts requests that match the nested statement. For example, based on recent requests that you have seen from an attacker, you might create a rate-based rule with a nested AND rule statement that contains the following nested statements: - An IP match statement with an IP set that specifies the address 192.0.2.44. - A string match statement that searches in the User-Agent header for the string BadBot. In this rate-based rule, you also define a rate limit. For this example, the rate limit is 1,000. Requests that meet the criteria of both of the nested statements are counted. If the count exceeds 1,000 requests per five minutes, the rule action triggers. Requests that do not meet the criteria of both of the nested statements are not counted towards the rate limit and are not affected by this rule. You cannot nest a ``RateBasedStatement`` inside another statement, for example inside a ``NotStatement`` or ``OrStatement`` . You can define a ``RateBasedStatement`` inside a web ACL and inside a rule group.
|
|
8560
8568
|
:param regex_match_statement: A rule statement used to search web request components for a match against a single regular expression.
|
|
8561
8569
|
:param regex_pattern_set_reference_statement: A rule statement used to search web request components for matches with regular expressions. To use this, create a ``RegexPatternSet`` that specifies the expressions that you want to detect, then use the ARN of that set in this statement. A web request matches the pattern set rule statement if the request component matches any of the patterns in the set. Each regex pattern set rule statement references a regex pattern set. You create and maintain the set independent of your rules. This allows you to use the single set in multiple rules. When you update the referenced set, AWS WAF automatically updates all rules that reference it.
|
|
8562
|
-
:param size_constraint_statement: A rule statement that compares a number of bytes against the size of a request component, using a comparison operator, such as greater than (>) or less than (<). For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes. If you configure AWS WAF to inspect the request body, AWS WAF inspects only the
|
|
8570
|
+
:param size_constraint_statement: A rule statement that compares a number of bytes against the size of a request component, using a comparison operator, such as greater than (>) or less than (<). For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes. If you configure AWS WAF to inspect the request body, AWS WAF inspects only the number of bytes of the body up to the limit for the web ACL. By default, for regional web ACLs, this limit is 8 KB (8,192 kilobytes) and for CloudFront web ACLs, this limit is 16 KB (16,384 kilobytes). For CloudFront web ACLs, you can increase the limit in the web ACL ``AssociationConfig`` , for additional fees. If you know that the request body for your web requests should never exceed the inspection limit, you could use a size constraint statement to block requests that have a larger request body size. If you choose URI for the value of Part of the request to filter on, the slash (/) in the URI counts as one character. For example, the URI ``/logo.jpg`` is nine characters long.
|
|
8563
8571
|
:param sqli_match_statement: A rule statement that inspects for malicious SQL code. Attackers insert malicious SQL code into web requests to do things like modify your database or extract data from it.
|
|
8564
8572
|
:param xss_match_statement: A rule statement that inspects for cross-site scripting (XSS) attacks. In XSS attacks, the attacker uses vulnerabilities in a benign website as a vehicle to inject malicious client-site scripts into other legitimate web browsers.
|
|
8565
8573
|
|
|
@@ -10428,7 +10436,7 @@ class CfnRuleGroup(
|
|
|
10428
10436
|
|
|
10429
10437
|
For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes.
|
|
10430
10438
|
|
|
10431
|
-
If you configure AWS WAF to inspect the request body, AWS WAF inspects only the
|
|
10439
|
+
If you configure AWS WAF to inspect the request body, AWS WAF inspects only the number of bytes of the body up to the limit for the web ACL. By default, for regional web ACLs, this limit is 8 KB (8,192 kilobytes) and for CloudFront web ACLs, this limit is 16 KB (16,384 kilobytes). For CloudFront web ACLs, you can increase the limit in the web ACL ``AssociationConfig`` , for additional fees. If you know that the request body for your web requests should never exceed the inspection limit, you could use a size constraint statement to block requests that have a larger request body size.
|
|
10432
10440
|
|
|
10433
10441
|
If you choose URI for the value of Part of the request to filter on, the slash (/) in the URI counts as one character. For example, the URI ``/logo.jpg`` is nine characters long.
|
|
10434
10442
|
|
|
@@ -13397,7 +13405,7 @@ class CfnWebACL(
|
|
|
13397
13405
|
|
|
13398
13406
|
This is used to indicate the web request component to inspect, in the ``FieldToMatch`` specification.
|
|
13399
13407
|
|
|
13400
|
-
:param oversize_handling: What AWS WAF should do if the body is larger than AWS WAF can inspect. AWS WAF does not support inspecting the entire contents of the
|
|
13408
|
+
:param oversize_handling: What AWS WAF should do if the body is larger than AWS WAF can inspect. AWS WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service only forwards the contents that are below the limit to AWS WAF for inspection. The default limit is 8 KB (8,192 kilobytes) for regional resources and 16 KB (16,384 kilobytes) for CloudFront distributions. For CloudFront distributions, you can increase the limit in the web ACL ``AssociationConfig`` , for additional processing fees. The options for oversize handling are the following: - ``CONTINUE`` - Inspect the body normally, according to the rule inspection criteria. - ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request. - ``NO_MATCH`` - Treat the web request as not matching the rule statement. You can combine the ``MATCH`` or ``NO_MATCH`` settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit. Default: ``CONTINUE``
|
|
13401
13409
|
|
|
13402
13410
|
:link: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-body.html
|
|
13403
13411
|
:exampleMetadata: fixture=_generated
|
|
@@ -13423,7 +13431,9 @@ class CfnWebACL(
|
|
|
13423
13431
|
def oversize_handling(self) -> typing.Optional[builtins.str]:
|
|
13424
13432
|
'''What AWS WAF should do if the body is larger than AWS WAF can inspect.
|
|
13425
13433
|
|
|
13426
|
-
AWS WAF does not support inspecting the entire contents of the
|
|
13434
|
+
AWS WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service only forwards the contents that are below the limit to AWS WAF for inspection.
|
|
13435
|
+
|
|
13436
|
+
The default limit is 8 KB (8,192 kilobytes) for regional resources and 16 KB (16,384 kilobytes) for CloudFront distributions. For CloudFront distributions, you can increase the limit in the web ACL ``AssociationConfig`` , for additional processing fees.
|
|
13427
13437
|
|
|
13428
13438
|
The options for oversize handling are the following:
|
|
13429
13439
|
|
|
@@ -13431,7 +13441,7 @@ class CfnWebACL(
|
|
|
13431
13441
|
- ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request.
|
|
13432
13442
|
- ``NO_MATCH`` - Treat the web request as not matching the rule statement.
|
|
13433
13443
|
|
|
13434
|
-
You can combine the ``MATCH`` or ``NO_MATCH`` settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over
|
|
13444
|
+
You can combine the ``MATCH`` or ``NO_MATCH`` settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit.
|
|
13435
13445
|
|
|
13436
13446
|
Default: ``CONTINUE``
|
|
13437
13447
|
|
|
@@ -14801,10 +14811,10 @@ class CfnWebACL(
|
|
|
14801
14811
|
``"FieldToMatch": { "Method": { "Name": "DELETE" } }``
|
|
14802
14812
|
|
|
14803
14813
|
:param all_query_arguments: Inspect all query arguments.
|
|
14804
|
-
:param body: Inspect the request body as plain text. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form.
|
|
14814
|
+
:param body: Inspect the request body as plain text. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. A limited amount of the request body is forwarded to AWS WAF for inspection by the underlying host service. For regional resources, the limit is 8 KB (8,192 kilobytes) and for CloudFront distributions, the limit is 16 KB (16,384 kilobytes). For CloudFront distributions, you can increase the limit in the web ACL's ``AssociationConfig`` , for additional processing fees. For information about how to handle oversized request bodies, see the ``Body`` object configuration.
|
|
14805
14815
|
:param cookies: Inspect the request cookies. You must configure scope and pattern matching filters in the ``Cookies`` object, to define the set of cookies and the parts of the cookies that AWS WAF inspects. Only the first 8 KB (8192 bytes) of a request's cookies and only the first 200 cookies are forwarded to AWS WAF for inspection by the underlying host service. You must configure how to handle any oversize cookie content in the ``Cookies`` object. AWS WAF applies the pattern matching filters to the cookies that it receives from the underlying host service.
|
|
14806
14816
|
:param headers: Inspect the request headers. You must configure scope and pattern matching filters in the ``Headers`` object, to define the set of headers to and the parts of the headers that AWS WAF inspects. Only the first 8 KB (8192 bytes) of a request's headers and only the first 200 headers are forwarded to AWS WAF for inspection by the underlying host service. You must configure how to handle any oversize header content in the ``Headers`` object. AWS WAF applies the pattern matching filters to the headers that it receives from the underlying host service.
|
|
14807
|
-
:param json_body: Inspect the request body as JSON. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form.
|
|
14817
|
+
:param json_body: Inspect the request body as JSON. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. A limited amount of the request body is forwarded to AWS WAF for inspection by the underlying host service. For regional resources, the limit is 8 KB (8,192 kilobytes) and for CloudFront distributions, the limit is 16 KB (16,384 kilobytes). For CloudFront distributions, you can increase the limit in the web ACL's ``AssociationConfig`` , for additional processing fees. For information about how to handle oversized request bodies, see the ``JsonBody`` object configuration.
|
|
14808
14818
|
:param method: Inspect the HTTP method. The method indicates the type of operation that the request is asking the origin to perform.
|
|
14809
14819
|
:param query_string: Inspect the query string. This is the part of a URL that appears after a ``?`` character, if any.
|
|
14810
14820
|
:param single_header: Inspect a single header. Provide the name of the header to inspect, for example, ``User-Agent`` or ``Referer`` . This setting isn't case sensitive. Example JSON: ``"SingleHeader": { "Name": "haystack" }`` Alternately, you can filter and inspect all headers with the ``Headers`` ``FieldToMatch`` setting.
|
|
@@ -14920,7 +14930,9 @@ class CfnWebACL(
|
|
|
14920
14930
|
|
|
14921
14931
|
The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form.
|
|
14922
14932
|
|
|
14923
|
-
|
|
14933
|
+
A limited amount of the request body is forwarded to AWS WAF for inspection by the underlying host service. For regional resources, the limit is 8 KB (8,192 kilobytes) and for CloudFront distributions, the limit is 16 KB (16,384 kilobytes). For CloudFront distributions, you can increase the limit in the web ACL's ``AssociationConfig`` , for additional processing fees.
|
|
14934
|
+
|
|
14935
|
+
For information about how to handle oversized request bodies, see the ``Body`` object configuration.
|
|
14924
14936
|
|
|
14925
14937
|
:link: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-fieldtomatch.html#cfn-wafv2-webacl-fieldtomatch-body
|
|
14926
14938
|
'''
|
|
@@ -14965,7 +14977,9 @@ class CfnWebACL(
|
|
|
14965
14977
|
|
|
14966
14978
|
The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form.
|
|
14967
14979
|
|
|
14968
|
-
|
|
14980
|
+
A limited amount of the request body is forwarded to AWS WAF for inspection by the underlying host service. For regional resources, the limit is 8 KB (8,192 kilobytes) and for CloudFront distributions, the limit is 16 KB (16,384 kilobytes). For CloudFront distributions, you can increase the limit in the web ACL's ``AssociationConfig`` , for additional processing fees.
|
|
14981
|
+
|
|
14982
|
+
For information about how to handle oversized request bodies, see the ``JsonBody`` object configuration.
|
|
14969
14983
|
|
|
14970
14984
|
:link: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-fieldtomatch.html#cfn-wafv2-webacl-fieldtomatch-jsonbody
|
|
14971
14985
|
'''
|
|
@@ -15752,7 +15766,7 @@ class CfnWebACL(
|
|
|
15752
15766
|
:param match_pattern: The patterns to look for in the JSON body. AWS WAF inspects the results of these pattern matches against the rule inspection criteria.
|
|
15753
15767
|
:param match_scope: The parts of the JSON to match against using the ``MatchPattern`` . If you specify ``All`` , AWS WAF matches against keys and values.
|
|
15754
15768
|
:param invalid_fallback_behavior: What AWS WAF should do if it fails to completely parse the JSON body. The options are the following:. - ``EVALUATE_AS_STRING`` - Inspect the body as plain text. AWS WAF applies the text transformations and inspection criteria that you defined for the JSON inspection to the body text string. - ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request. - ``NO_MATCH`` - Treat the web request as not matching the rule statement. If you don't provide this setting, AWS WAF parses and evaluates the content only up to the first parsing failure that it encounters. AWS WAF does its best to parse the entire JSON body, but might be forced to stop for reasons such as invalid characters, duplicate keys, truncation, and any content whose root node isn't an object or an array. AWS WAF parses the JSON in the following examples as two valid key, value pairs: - Missing comma: ``{"key1":"value1""key2":"value2"}`` - Missing colon: ``{"key1":"value1","key2""value2"}`` - Extra colons: ``{"key1"::"value1","key2""value2"}``
|
|
15755
|
-
:param oversize_handling: What AWS WAF should do if the body is larger than AWS WAF can inspect. AWS WAF does not support inspecting the entire contents of the
|
|
15769
|
+
:param oversize_handling: What AWS WAF should do if the body is larger than AWS WAF can inspect. AWS WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service only forwards the contents that are below the limit to AWS WAF for inspection. The default limit is 8 KB (8,192 kilobytes) for regional resources and 16 KB (16,384 kilobytes) for CloudFront distributions. For CloudFront distributions, you can increase the limit in the web ACL ``AssociationConfig`` , for additional processing fees. The options for oversize handling are the following: - ``CONTINUE`` - Inspect the body normally, according to the rule inspection criteria. - ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request. - ``NO_MATCH`` - Treat the web request as not matching the rule statement. You can combine the ``MATCH`` or ``NO_MATCH`` settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit. Default: ``CONTINUE``
|
|
15756
15770
|
|
|
15757
15771
|
:link: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-jsonbody.html
|
|
15758
15772
|
:exampleMetadata: fixture=_generated
|
|
@@ -15845,7 +15859,9 @@ class CfnWebACL(
|
|
|
15845
15859
|
def oversize_handling(self) -> typing.Optional[builtins.str]:
|
|
15846
15860
|
'''What AWS WAF should do if the body is larger than AWS WAF can inspect.
|
|
15847
15861
|
|
|
15848
|
-
AWS WAF does not support inspecting the entire contents of the
|
|
15862
|
+
AWS WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service only forwards the contents that are below the limit to AWS WAF for inspection.
|
|
15863
|
+
|
|
15864
|
+
The default limit is 8 KB (8,192 kilobytes) for regional resources and 16 KB (16,384 kilobytes) for CloudFront distributions. For CloudFront distributions, you can increase the limit in the web ACL ``AssociationConfig`` , for additional processing fees.
|
|
15849
15865
|
|
|
15850
15866
|
The options for oversize handling are the following:
|
|
15851
15867
|
|
|
@@ -15853,7 +15869,7 @@ class CfnWebACL(
|
|
|
15853
15869
|
- ``MATCH`` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request.
|
|
15854
15870
|
- ``NO_MATCH`` - Treat the web request as not matching the rule statement.
|
|
15855
15871
|
|
|
15856
|
-
You can combine the ``MATCH`` or ``NO_MATCH`` settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over
|
|
15872
|
+
You can combine the ``MATCH`` or ``NO_MATCH`` settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit.
|
|
15857
15873
|
|
|
15858
15874
|
Default: ``CONTINUE``
|
|
15859
15875
|
|
|
@@ -21297,7 +21313,7 @@ class CfnWebACL(
|
|
|
21297
21313
|
|
|
21298
21314
|
For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes.
|
|
21299
21315
|
|
|
21300
|
-
If you configure AWS WAF to inspect the request body, AWS WAF inspects only the
|
|
21316
|
+
If you configure AWS WAF to inspect the request body, AWS WAF inspects only the number of bytes of the body up to the limit for the web ACL. By default, for regional web ACLs, this limit is 8 KB (8,192 kilobytes) and for CloudFront web ACLs, this limit is 16 KB (16,384 kilobytes). For CloudFront web ACLs, you can increase the limit in the web ACL ``AssociationConfig`` , for additional fees. If you know that the request body for your web requests should never exceed the inspection limit, you could use a size constraint statement to block requests that have a larger request body size.
|
|
21301
21317
|
|
|
21302
21318
|
If you choose URI for the value of Part of the request to filter on, the slash (/) in the URI counts as one character. For example, the URI ``/logo.jpg`` is nine characters long.
|
|
21303
21319
|
|
|
@@ -21653,7 +21669,7 @@ class CfnWebACL(
|
|
|
21653
21669
|
:param regex_match_statement: A rule statement used to search web request components for a match against a single regular expression.
|
|
21654
21670
|
:param regex_pattern_set_reference_statement: A rule statement used to search web request components for matches with regular expressions. To use this, create a ``RegexPatternSet`` that specifies the expressions that you want to detect, then use the ARN of that set in this statement. A web request matches the pattern set rule statement if the request component matches any of the patterns in the set. Each regex pattern set rule statement references a regex pattern set. You create and maintain the set independent of your rules. This allows you to use the single set in multiple rules. When you update the referenced set, AWS WAF automatically updates all rules that reference it.
|
|
21655
21671
|
:param rule_group_reference_statement: A rule statement used to run the rules that are defined in a ``RuleGroup`` . To use this, create a rule group with your rules, then provide the ARN of the rule group in this statement. You cannot nest a ``RuleGroupReferenceStatement`` , for example for use inside a ``NotStatement`` or ``OrStatement`` . You can only use a rule group reference statement at the top level inside a web ACL.
|
|
21656
|
-
:param size_constraint_statement: A rule statement that compares a number of bytes against the size of a request component, using a comparison operator, such as greater than (>) or less than (<). For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes. If you configure AWS WAF to inspect the request body, AWS WAF inspects only the
|
|
21672
|
+
:param size_constraint_statement: A rule statement that compares a number of bytes against the size of a request component, using a comparison operator, such as greater than (>) or less than (<). For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes. If you configure AWS WAF to inspect the request body, AWS WAF inspects only the number of bytes of the body up to the limit for the web ACL. By default, for regional web ACLs, this limit is 8 KB (8,192 kilobytes) and for CloudFront web ACLs, this limit is 16 KB (16,384 kilobytes). For CloudFront web ACLs, you can increase the limit in the web ACL ``AssociationConfig`` , for additional fees. If you know that the request body for your web requests should never exceed the inspection limit, you could use a size constraint statement to block requests that have a larger request body size. If you choose URI for the value of Part of the request to filter on, the slash (/) in the URI counts as one character. For example, the URI ``/logo.jpg`` is nine characters long.
|
|
21657
21673
|
:param sqli_match_statement: A rule statement that inspects for malicious SQL code. Attackers insert malicious SQL code into web requests to do things like modify your database or extract data from it.
|
|
21658
21674
|
:param xss_match_statement: A rule statement that inspects for cross-site scripting (XSS) attacks. In XSS attacks, the attacker uses vulnerabilities in a benign website as a vehicle to inject malicious client-site scripts into other legitimate web browsers.
|
|
21659
21675
|
|
|
@@ -24767,7 +24783,7 @@ class CfnWebACL(
|
|
|
24767
24783
|
|
|
24768
24784
|
For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes.
|
|
24769
24785
|
|
|
24770
|
-
If you configure AWS WAF to inspect the request body, AWS WAF inspects only the
|
|
24786
|
+
If you configure AWS WAF to inspect the request body, AWS WAF inspects only the number of bytes of the body up to the limit for the web ACL. By default, for regional web ACLs, this limit is 8 KB (8,192 kilobytes) and for CloudFront web ACLs, this limit is 16 KB (16,384 kilobytes). For CloudFront web ACLs, you can increase the limit in the web ACL ``AssociationConfig`` , for additional fees. If you know that the request body for your web requests should never exceed the inspection limit, you could use a size constraint statement to block requests that have a larger request body size.
|
|
24771
24787
|
|
|
24772
24788
|
If you choose URI for the value of Part of the request to filter on, the slash (/) in the URI counts as one character. For example, the URI ``/logo.jpg`` is nine characters long.
|
|
24773
24789
|
|
|
@@ -25224,7 +25240,7 @@ class CfnWebACLAssociation(
|
|
|
25224
25240
|
|
|
25225
25241
|
:param scope: - scope in which this resource is defined.
|
|
25226
25242
|
:param id: - scoped id of the resource.
|
|
25227
|
-
:param resource_arn: The Amazon Resource Name (ARN) of the resource to associate with the web ACL. The ARN must be in one of the following formats: - For an Application Load Balancer: ``arn:
|
|
25243
|
+
:param resource_arn: The Amazon Resource Name (ARN) of the resource to associate with the web ACL. The ARN must be in one of the following formats: - For an Application Load Balancer: ``arn: *partition* :elasticloadbalancing: *region* : *account-id* :loadbalancer/app/ *load-balancer-name* / *load-balancer-id*`` - For an Amazon API Gateway REST API: ``arn: *partition* :apigateway: *region* ::/restapis/ *api-id* /stages/ *stage-name*`` - For an AWS AppSync GraphQL API: ``arn: *partition* :appsync: *region* : *account-id* :apis/ *GraphQLApiId*`` - For an Amazon Cognito user pool: ``arn: *partition* :cognito-idp: *region* : *account-id* :userpool/ *user-pool-id*`` - For an AWS App Runner service: ``arn: *partition* :apprunner: *region* : *account-id* :service/ *apprunner-service-name* / *apprunner-service-id*``
|
|
25228
25244
|
:param web_acl_arn: The Amazon Resource Name (ARN) of the web ACL that you want to associate with the resource.
|
|
25229
25245
|
'''
|
|
25230
25246
|
if __debug__:
|
|
@@ -25279,11 +25295,11 @@ class CfnWebACLAssociation(
|
|
|
25279
25295
|
|
|
25280
25296
|
The ARN must be in one of the following formats:
|
|
25281
25297
|
|
|
25282
|
-
- For an Application Load Balancer: ``arn:
|
|
25283
|
-
- For an Amazon API Gateway REST API: ``arn:
|
|
25284
|
-
- For an AWS AppSync GraphQL API: ``arn:
|
|
25285
|
-
- For an Amazon Cognito user pool: ``arn:
|
|
25286
|
-
- For an AWS App Runner service: ``arn:
|
|
25298
|
+
- For an Application Load Balancer: ``arn: *partition* :elasticloadbalancing: *region* : *account-id* :loadbalancer/app/ *load-balancer-name* / *load-balancer-id*``
|
|
25299
|
+
- For an Amazon API Gateway REST API: ``arn: *partition* :apigateway: *region* ::/restapis/ *api-id* /stages/ *stage-name*``
|
|
25300
|
+
- For an AWS AppSync GraphQL API: ``arn: *partition* :appsync: *region* : *account-id* :apis/ *GraphQLApiId*``
|
|
25301
|
+
- For an Amazon Cognito user pool: ``arn: *partition* :cognito-idp: *region* : *account-id* :userpool/ *user-pool-id*``
|
|
25302
|
+
- For an AWS App Runner service: ``arn: *partition* :apprunner: *region* : *account-id* :service/ *apprunner-service-name* / *apprunner-service-id*``
|
|
25287
25303
|
|
|
25288
25304
|
:link: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-wafv2-webaclassociation.html#cfn-wafv2-webaclassociation-resourcearn
|
|
25289
25305
|
'''
|
|
@@ -25327,7 +25343,7 @@ class CfnWebACLAssociationProps:
|
|
|
25327
25343
|
) -> None:
|
|
25328
25344
|
'''Properties for defining a ``CfnWebACLAssociation``.
|
|
25329
25345
|
|
|
25330
|
-
:param resource_arn: The Amazon Resource Name (ARN) of the resource to associate with the web ACL. The ARN must be in one of the following formats: - For an Application Load Balancer: ``arn:
|
|
25346
|
+
:param resource_arn: The Amazon Resource Name (ARN) of the resource to associate with the web ACL. The ARN must be in one of the following formats: - For an Application Load Balancer: ``arn: *partition* :elasticloadbalancing: *region* : *account-id* :loadbalancer/app/ *load-balancer-name* / *load-balancer-id*`` - For an Amazon API Gateway REST API: ``arn: *partition* :apigateway: *region* ::/restapis/ *api-id* /stages/ *stage-name*`` - For an AWS AppSync GraphQL API: ``arn: *partition* :appsync: *region* : *account-id* :apis/ *GraphQLApiId*`` - For an Amazon Cognito user pool: ``arn: *partition* :cognito-idp: *region* : *account-id* :userpool/ *user-pool-id*`` - For an AWS App Runner service: ``arn: *partition* :apprunner: *region* : *account-id* :service/ *apprunner-service-name* / *apprunner-service-id*``
|
|
25331
25347
|
:param web_acl_arn: The Amazon Resource Name (ARN) of the web ACL that you want to associate with the resource.
|
|
25332
25348
|
|
|
25333
25349
|
:link: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-wafv2-webaclassociation.html
|
|
@@ -25359,11 +25375,11 @@ class CfnWebACLAssociationProps:
|
|
|
25359
25375
|
|
|
25360
25376
|
The ARN must be in one of the following formats:
|
|
25361
25377
|
|
|
25362
|
-
- For an Application Load Balancer: ``arn:
|
|
25363
|
-
- For an Amazon API Gateway REST API: ``arn:
|
|
25364
|
-
- For an AWS AppSync GraphQL API: ``arn:
|
|
25365
|
-
- For an Amazon Cognito user pool: ``arn:
|
|
25366
|
-
- For an AWS App Runner service: ``arn:
|
|
25378
|
+
- For an Application Load Balancer: ``arn: *partition* :elasticloadbalancing: *region* : *account-id* :loadbalancer/app/ *load-balancer-name* / *load-balancer-id*``
|
|
25379
|
+
- For an Amazon API Gateway REST API: ``arn: *partition* :apigateway: *region* ::/restapis/ *api-id* /stages/ *stage-name*``
|
|
25380
|
+
- For an AWS AppSync GraphQL API: ``arn: *partition* :appsync: *region* : *account-id* :apis/ *GraphQLApiId*``
|
|
25381
|
+
- For an Amazon Cognito user pool: ``arn: *partition* :cognito-idp: *region* : *account-id* :userpool/ *user-pool-id*``
|
|
25382
|
+
- For an AWS App Runner service: ``arn: *partition* :apprunner: *region* : *account-id* :service/ *apprunner-service-name* / *apprunner-service-id*``
|
|
25367
25383
|
|
|
25368
25384
|
:link: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-wafv2-webaclassociation.html#cfn-wafv2-webaclassociation-resourcearn
|
|
25369
25385
|
'''
|
aws_cdk/aws_xray/__init__.py
CHANGED
|
@@ -502,8 +502,6 @@ class CfnResourcePolicy(
|
|
|
502
502
|
):
|
|
503
503
|
'''A CloudFormation ``AWS::XRay::ResourcePolicy``.
|
|
504
504
|
|
|
505
|
-
Sets the resource policy to grant one or more AWS services and accounts permissions to access X-Ray. Each resource policy will be associated with a specific AWS account. Each AWS account can have a maximum of 5 resource policies, and each policy name must be unique within that account. The maximum size of each resource policy is 5KB.
|
|
506
|
-
|
|
507
505
|
:cloudformationResource: AWS::XRay::ResourcePolicy
|
|
508
506
|
:link: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-xray-resourcepolicy.html
|
|
509
507
|
:exampleMetadata: fixture=_generated
|
|
@@ -536,8 +534,8 @@ class CfnResourcePolicy(
|
|
|
536
534
|
|
|
537
535
|
:param scope: - scope in which this resource is defined.
|
|
538
536
|
:param id: - scoped id of the resource.
|
|
539
|
-
:param policy_document:
|
|
540
|
-
:param policy_name:
|
|
537
|
+
:param policy_document: ``AWS::XRay::ResourcePolicy.PolicyDocument``.
|
|
538
|
+
:param policy_name: ``AWS::XRay::ResourcePolicy.PolicyName``.
|
|
541
539
|
:param bypass_policy_lockout_check: ``AWS::XRay::ResourcePolicy.BypassPolicyLockoutCheck``.
|
|
542
540
|
'''
|
|
543
541
|
if __debug__:
|
|
@@ -590,7 +588,7 @@ class CfnResourcePolicy(
|
|
|
590
588
|
@builtins.property
|
|
591
589
|
@jsii.member(jsii_name="policyDocument")
|
|
592
590
|
def policy_document(self) -> builtins.str:
|
|
593
|
-
'''
|
|
591
|
+
'''``AWS::XRay::ResourcePolicy.PolicyDocument``.
|
|
594
592
|
|
|
595
593
|
:link: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-xray-resourcepolicy.html#cfn-xray-resourcepolicy-policydocument
|
|
596
594
|
'''
|
|
@@ -606,9 +604,7 @@ class CfnResourcePolicy(
|
|
|
606
604
|
@builtins.property
|
|
607
605
|
@jsii.member(jsii_name="policyName")
|
|
608
606
|
def policy_name(self) -> builtins.str:
|
|
609
|
-
'''
|
|
610
|
-
|
|
611
|
-
Must be unique within a specific AWS account.
|
|
607
|
+
'''``AWS::XRay::ResourcePolicy.PolicyName``.
|
|
612
608
|
|
|
613
609
|
:link: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-xray-resourcepolicy.html#cfn-xray-resourcepolicy-policyname
|
|
614
610
|
'''
|
|
@@ -662,8 +658,8 @@ class CfnResourcePolicyProps:
|
|
|
662
658
|
) -> None:
|
|
663
659
|
'''Properties for defining a ``CfnResourcePolicy``.
|
|
664
660
|
|
|
665
|
-
:param policy_document:
|
|
666
|
-
:param policy_name:
|
|
661
|
+
:param policy_document: ``AWS::XRay::ResourcePolicy.PolicyDocument``.
|
|
662
|
+
:param policy_name: ``AWS::XRay::ResourcePolicy.PolicyName``.
|
|
667
663
|
:param bypass_policy_lockout_check: ``AWS::XRay::ResourcePolicy.BypassPolicyLockoutCheck``.
|
|
668
664
|
|
|
669
665
|
:link: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-xray-resourcepolicy.html
|
|
@@ -697,7 +693,7 @@ class CfnResourcePolicyProps:
|
|
|
697
693
|
|
|
698
694
|
@builtins.property
|
|
699
695
|
def policy_document(self) -> builtins.str:
|
|
700
|
-
'''
|
|
696
|
+
'''``AWS::XRay::ResourcePolicy.PolicyDocument``.
|
|
701
697
|
|
|
702
698
|
:link: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-xray-resourcepolicy.html#cfn-xray-resourcepolicy-policydocument
|
|
703
699
|
'''
|
|
@@ -707,9 +703,7 @@ class CfnResourcePolicyProps:
|
|
|
707
703
|
|
|
708
704
|
@builtins.property
|
|
709
705
|
def policy_name(self) -> builtins.str:
|
|
710
|
-
'''
|
|
711
|
-
|
|
712
|
-
Must be unique within a specific AWS account.
|
|
706
|
+
'''``AWS::XRay::ResourcePolicy.PolicyName``.
|
|
713
707
|
|
|
714
708
|
:link: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-xray-resourcepolicy.html#cfn-xray-resourcepolicy-policyname
|
|
715
709
|
'''
|
|
@@ -1293,11 +1287,10 @@ class CfnSamplingRule(
|
|
|
1293
1287
|
modified_at: typing.Optional[builtins.str] = None,
|
|
1294
1288
|
sampling_rule: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnSamplingRule.SamplingRuleProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
1295
1289
|
) -> None:
|
|
1296
|
-
'''
|
|
1297
|
-
|
|
1298
|
-
:param
|
|
1299
|
-
:param
|
|
1300
|
-
:param sampling_rule: The sampling rule.
|
|
1290
|
+
'''
|
|
1291
|
+
:param created_at: ``CfnSamplingRule.SamplingRuleRecordProperty.CreatedAt``.
|
|
1292
|
+
:param modified_at: ``CfnSamplingRule.SamplingRuleRecordProperty.ModifiedAt``.
|
|
1293
|
+
:param sampling_rule: ``CfnSamplingRule.SamplingRuleRecordProperty.SamplingRule``.
|
|
1301
1294
|
|
|
1302
1295
|
:link: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-xray-samplingrule-samplingrulerecord.html
|
|
1303
1296
|
:exampleMetadata: fixture=_generated
|
|
@@ -1345,7 +1338,7 @@ class CfnSamplingRule(
|
|
|
1345
1338
|
|
|
1346
1339
|
@builtins.property
|
|
1347
1340
|
def created_at(self) -> typing.Optional[builtins.str]:
|
|
1348
|
-
'''
|
|
1341
|
+
'''``CfnSamplingRule.SamplingRuleRecordProperty.CreatedAt``.
|
|
1349
1342
|
|
|
1350
1343
|
:link: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-xray-samplingrule-samplingrulerecord.html#cfn-xray-samplingrule-samplingrulerecord-createdat
|
|
1351
1344
|
'''
|
|
@@ -1354,7 +1347,7 @@ class CfnSamplingRule(
|
|
|
1354
1347
|
|
|
1355
1348
|
@builtins.property
|
|
1356
1349
|
def modified_at(self) -> typing.Optional[builtins.str]:
|
|
1357
|
-
'''
|
|
1350
|
+
'''``CfnSamplingRule.SamplingRuleRecordProperty.ModifiedAt``.
|
|
1358
1351
|
|
|
1359
1352
|
:link: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-xray-samplingrule-samplingrulerecord.html#cfn-xray-samplingrule-samplingrulerecord-modifiedat
|
|
1360
1353
|
'''
|
|
@@ -1365,7 +1358,7 @@ class CfnSamplingRule(
|
|
|
1365
1358
|
def sampling_rule(
|
|
1366
1359
|
self,
|
|
1367
1360
|
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnSamplingRule.SamplingRuleProperty"]]:
|
|
1368
|
-
'''
|
|
1361
|
+
'''``CfnSamplingRule.SamplingRuleRecordProperty.SamplingRule``.
|
|
1369
1362
|
|
|
1370
1363
|
:link: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-xray-samplingrule-samplingrulerecord.html#cfn-xray-samplingrule-samplingrulerecord-samplingrule
|
|
1371
1364
|
'''
|
|
@@ -1686,7 +1686,6 @@ class ContainerImageAssetCacheOption:
|
|
|
1686
1686
|
|
|
1687
1687
|
Example::
|
|
1688
1688
|
|
|
1689
|
-
# Example automatically generated from non-compiling source. May contain errors.
|
|
1690
1689
|
"registry"
|
|
1691
1690
|
'''
|
|
1692
1691
|
result = self._values.get("type")
|
|
@@ -1703,8 +1702,13 @@ class ContainerImageAssetCacheOption:
|
|
|
1703
1702
|
|
|
1704
1703
|
Example::
|
|
1705
1704
|
|
|
1706
|
-
#
|
|
1707
|
-
|
|
1705
|
+
# branch: str
|
|
1706
|
+
|
|
1707
|
+
|
|
1708
|
+
params = {
|
|
1709
|
+
"ref": f"12345678.dkr.ecr.us-west-2.amazonaws.com/cache:{branch}",
|
|
1710
|
+
"mode": "max"
|
|
1711
|
+
}
|
|
1708
1712
|
'''
|
|
1709
1713
|
result = self._values.get("params")
|
|
1710
1714
|
return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
|
|
@@ -3842,7 +3846,6 @@ class DockerCacheOption:
|
|
|
3842
3846
|
|
|
3843
3847
|
Example::
|
|
3844
3848
|
|
|
3845
|
-
# Example automatically generated from non-compiling source. May contain errors.
|
|
3846
3849
|
"registry"
|
|
3847
3850
|
'''
|
|
3848
3851
|
result = self._values.get("type")
|
|
@@ -3859,8 +3862,13 @@ class DockerCacheOption:
|
|
|
3859
3862
|
|
|
3860
3863
|
Example::
|
|
3861
3864
|
|
|
3862
|
-
#
|
|
3863
|
-
|
|
3865
|
+
# branch: str
|
|
3866
|
+
|
|
3867
|
+
|
|
3868
|
+
params = {
|
|
3869
|
+
"ref": f"12345678.dkr.ecr.us-west-2.amazonaws.com/cache:{branch}",
|
|
3870
|
+
"mode": "max"
|
|
3871
|
+
}
|
|
3864
3872
|
'''
|
|
3865
3873
|
result = self._values.get("params")
|
|
3866
3874
|
return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
|
|
@@ -535,12 +535,11 @@ Additionally, the Lambda function can be placed in a private VPC by using the `v
|
|
|
535
535
|
and `vpcSubnets` properties.
|
|
536
536
|
|
|
537
537
|
```python
|
|
538
|
-
#
|
|
539
|
-
# my_vpc: ec2.Vpc
|
|
538
|
+
# vpc: ec2.Vpc
|
|
540
539
|
|
|
541
540
|
cr.AwsCustomResource(self, "CustomizedInVpc",
|
|
542
541
|
vpc=vpc,
|
|
543
|
-
vpc_subnets=SubnetSelection(subnet_type=ec2.SubnetType.
|
|
542
|
+
vpc_subnets=ec2.SubnetSelection(subnet_type=ec2.SubnetType.PRIVATE_WITH_EGRESS),
|
|
544
543
|
policy=cr.AwsCustomResourcePolicy.from_sdk_calls(
|
|
545
544
|
resources=cr.AwsCustomResourcePolicy.ANY_RESOURCE
|
|
546
545
|
)
|