diff --git a/website/docs/cdktf/python/d/connect_instance_storage_config.html.markdown b/website/docs/cdktf/python/d/connect_instance_storage_config.html.markdown index 2d3ee00ea05..2645ca26e97 100644 --- a/website/docs/cdktf/python/d/connect_instance_storage_config.html.markdown +++ b/website/docs/cdktf/python/d/connect_instance_storage_config.html.markdown @@ -27,7 +27,7 @@ class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) DataAwsConnectInstanceStorageConfig(self, "example", - association_id="1234567890123456789012345678901234567890123456789012345678901234", + association_id="1234567891234567890122345678912345678901223456789123456789012234", instance_id="aaaaaaaa-bbbb-cccc-dddd-111111111111", resource_type="CONTACT_TRACE_RECORDS" ) @@ -93,4 +93,4 @@ The `encryption_config` configuration block supports the following arguments: * `encryption_type` - The type of encryption. Valid Values: `KMS`. * `key_id` - The full ARN of the encryption key. Be sure to provide the full ARN of the encryption key, not just the ID. - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/d/ebs_volume.html.markdown b/website/docs/cdktf/python/d/ebs_volume.html.markdown index 85ee94fb8bf..90add0bbe21 100644 --- a/website/docs/cdktf/python/d/ebs_volume.html.markdown +++ b/website/docs/cdktf/python/d/ebs_volume.html.markdown @@ -56,7 +56,7 @@ This data source exports the following attributes in addition to the arguments a * `id` - Volume ID (e.g., vol-59fcb34e). * `volume_id` - Volume ID (e.g., vol-59fcb34e). -* `arn` - Volume ARN (e.g., arn:aws:ec2:us-east-1:0123456789012:volume/vol-59fcb34e). +* `arn` - Volume ARN (e.g., arn:aws:ec2:us-east-1:123456789012:volume/vol-59fcb34e). * `availability_zone` - AZ where the EBS volume exists. * `encrypted` - Whether the disk is encrypted. * `iops` - Amount of IOPS for the disk. @@ -77,4 +77,4 @@ This data source exports the following attributes in addition to the arguments a [1]: http://docs.aws.amazon.com/cli/latest/reference/ec2/describe-volumes.html - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/d/elasticache_reserved_cache_node_offering.html.markdown b/website/docs/cdktf/python/d/elasticache_reserved_cache_node_offering.html.markdown index 83e8e062b7d..947079f8323 100644 --- a/website/docs/cdktf/python/d/elasticache_reserved_cache_node_offering.html.markdown +++ b/website/docs/cdktf/python/d/elasticache_reserved_cache_node_offering.html.markdown @@ -48,7 +48,7 @@ The following arguments are supported: For other current generation nodes (i.e. T2, M3, M4, R3, or R4) the only valid value is `Heavy Utilization`. For previous generation modes (i.e. T1, M1, M2, or C1) valid values are `Heavy Utilization`, `Medium Utilization`, and `Light Utilization`. * `product_description` - (Required) Engine type for the reserved cache node. - Valid values are `redis` and `memcached`. + Valid values are `redis`, `valkey` and `memcached`. ## Attribute Reference @@ -58,4 +58,4 @@ In addition to all arguments above, the following attributes are exported: * `fixed_price` - Fixed price charged for this reserved cache node. * `offering_id` - Unique identifier for the reservation. - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/d/elasticache_serverless_cache.html.markdown b/website/docs/cdktf/python/d/elasticache_serverless_cache.html.markdown index fa1e5fb41a9..dd37f479cf8 100644 --- a/website/docs/cdktf/python/d/elasticache_serverless_cache.html.markdown +++ b/website/docs/cdktf/python/d/elasticache_serverless_cache.html.markdown @@ -44,7 +44,7 @@ This data source exports the following attributes in addition to the arguments a * `arn` - The Amazon Resource Name (ARN) of the serverless cache. * `cache_usage_limits` - The cache usage limits for storage and ElastiCache Processing Units for the cache. See [`cache_usage_limits` Block](#cache_usage_limits-block) for details. * `create_time` - Timestamp of when the serverless cache was created. -* `daily_snapshot_time` - The daily time that snapshots will be created from the new serverless cache. Only available for engine type `"redis"`. +* `daily_snapshot_time` - The daily time that snapshots will be created from the new serverless cache. Only available for engine types `"redis"` and `"valkey"`. * `description` - Description of the serverless cache. * `endpoint` - Represents the information required for client programs to connect to the cache. See [`endpoint` Block](#endpoint-block) for details. * `engine` – Name of the cache engine. @@ -94,4 +94,4 @@ The `reader_endpoint` block exports the following attributes: * `address` - The DNS hostname of the cache node. * `port` - The port number that the cache engine is listening on. Set as integer. - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/d/lakeformation_data_lake_settings.html.markdown b/website/docs/cdktf/python/d/lakeformation_data_lake_settings.html.markdown index 42a0755f91a..5c4c7d842b2 100644 --- a/website/docs/cdktf/python/d/lakeformation_data_lake_settings.html.markdown +++ b/website/docs/cdktf/python/d/lakeformation_data_lake_settings.html.markdown @@ -42,14 +42,15 @@ The following arguments are optional: This data source exports the following attributes in addition to the arguments above: * `admins` – List of ARNs of AWS Lake Formation principals (IAM users or roles). -* `read_only_admins` – List of ARNs of AWS Lake Formation principals (IAM users or roles) with only view access to the resources. +* `allow_external_data_filtering` - Whether to allow Amazon EMR clusters to access data managed by Lake Formation. +* `allow_full_table_external_data_access` - Whether to allow a third-party query engine to get data access credentials without session tags when a caller has full data access permissions. +* `authorized_session_tag_value_list` - Lake Formation relies on a privileged process secured by Amazon EMR or the third party integrator to tag the user's role while assuming it. * `create_database_default_permissions` - Up to three configuration blocks of principal permissions for default create database permissions. Detailed below. * `create_table_default_permissions` - Up to three configuration blocks of principal permissions for default create table permissions. Detailed below. -* `trusted_resource_owners` – List of the resource-owning account IDs that the caller's account can use to share their user access details (user ARNs). -* `allow_external_data_filtering` - Whether to allow Amazon EMR clusters to access data managed by Lake Formation. * `external_data_filtering_allow_list` - A list of the account IDs of Amazon Web Services accounts with Amazon EMR clusters that are to perform data filtering. -* `authorized_session_tag_value_list` - Lake Formation relies on a privileged process secured by Amazon EMR or the third party integrator to tag the user's role while assuming it. -* `allow_full_table_external_data_access` - Whether to allow a third-party query engine to get data access credentials without session tags when a caller has full data access permissions. +* `parameters` - Key-value map of additional configuration. `CROSS_ACCOUNT_VERSION` will be set to values `"1"`, `"2"`, `"3"`, or `"4"`. `SET_CONTEXT` will also be returned with a value of `TRUE`. In a fresh account, prior to configuring, `CROSS_ACCOUNT_VERSION` is `"1"`. +* `read_only_admins` – List of ARNs of AWS Lake Formation principals (IAM users or roles) with only view access to the resources. +* `trusted_resource_owners` – List of the resource-owning account IDs that the caller's account can use to share their user access details (user ARNs). ### create_database_default_permissions @@ -61,4 +62,4 @@ This data source exports the following attributes in addition to the arguments a * `permissions` - List of permissions granted to the principal. * `principal` - Principal who is granted permissions. - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/d/lb_listener_rule.html.markdown b/website/docs/cdktf/python/d/lb_listener_rule.html.markdown new file mode 100644 index 00000000000..f4c22860e93 --- /dev/null +++ b/website/docs/cdktf/python/d/lb_listener_rule.html.markdown @@ -0,0 +1,188 @@ +--- +subcategory: "ELB (Elastic Load Balancing)" +layout: "aws" +page_title: "AWS: aws_lb_listener_rule" +description: |- + Terraform data source for managing an AWS ELB (Elastic Load Balancing) Listener Rule. +--- + + + +# Data Source: aws_lb_listener_rule + +Provides information about an AWS Elastic Load Balancing Listener Rule. + +## Example Usage + +### Match by Rule ARN + +```python +# DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug +from constructs import Construct +from cdktf import VariableType, TerraformVariable, TerraformStack +# +# Provider bindings are generated by running `cdktf get`. +# See https://cdk.tf/provider-generation for more details. +# +from imports.aws. import DataAwsLbListenerRule +class MyConvertedCode(TerraformStack): + def __init__(self, scope, name): + super().__init__(scope, name) + # Terraform Variables are not always the best fit for getting inputs in the context of Terraform CDK. + # You can read more about this at https://cdk.tf/variables + lb_rule_arn = TerraformVariable(self, "lb_rule_arn", + type=VariableType.STRING + ) + DataAwsLbListenerRule(self, "example", + arn=lb_rule_arn.value + ) +``` + +### Match by Listener ARN and Priority + +```python +# DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug +from constructs import Construct +from cdktf import VariableType, TerraformVariable, TerraformStack +# +# Provider bindings are generated by running `cdktf get`. +# See https://cdk.tf/provider-generation for more details. +# +from imports.aws. import DataAwsLbListenerRule +class MyConvertedCode(TerraformStack): + def __init__(self, scope, name): + super().__init__(scope, name) + # Terraform Variables are not always the best fit for getting inputs in the context of Terraform CDK. + # You can read more about this at https://cdk.tf/variables + lb_listener_arn = TerraformVariable(self, "lb_listener_arn", + type=VariableType.STRING + ) + lb_rule_priority = TerraformVariable(self, "lb_rule_priority", + type=VariableType.NUMBER + ) + DataAwsLbListenerRule(self, "example", + listener_arn=lb_listener_arn.value, + priority=lb_rule_priority.value + ) +``` + +## Argument Reference + +This data source supports the following arguments: + +* `arn` - (Optional) ARN of the Listener Rule. + Either `arn` or `listener_arn` must be set. +* `listener_arn` - (Optional) ARN of the associated Listener. + Either `arn` or `listener_arn` must be set. +* `priority` - (Optional) Priority of the Listener Rule within the Listener. + Must be set if `listener_arn` is set, otherwise must not be set. + +## Attribute Reference + +This data source exports the following attributes in addition to the arguments above: + +* `action` - List of actions associated with the rule, sorted by `order`. + [Detailed below](#action). +* `condition` - Set of conditions associated with the rule. + [Detailed below](#condition). +* `tags` - Tags assigned to the Listener Rule. + +### `action` + +* `type` - The type of the action, indicates which sub-block will be populated. +* `order` - The evaluation order of the action. +* `authenticate_cognito` - An action to authenticate using Amazon Cognito. + [Detailed below](#authenticate_cognito). +* `authenticate_oidc` - An action to authenticate using OIDC. + [Detailed below](#authenticate_oidc). +* `fixed_response` - An action to return a fixed response. + [Detailed below](#fixed_response). +* `forward` - An action to forward the request. + [Detailed below](#forward). +* `redirect` - An action to redirect the request. + [Detailed below](#redirect). + +#### `authenticate_cognito` + +* `authentication_request_extra_params` - Set of additional parameters for the request. + [Detailed below](#authentication_request_extra_params). +* `on_unauthenticated_request` - Behavior when the client is not authenticated. +* `scope` - Set of user claims requested. +* `session_cookie_name` - Name of the cookie used to maintain session information. +* `session_timeout` - Maximum duration of the authentication session in seconds. +* `user_pool_arn` - ARN of the Cognito user pool. +* `user_pool_client_id` - ID of the Cognito user pool client. +* `user_pool_domain` - Domain prefix or fully-qualified domain name of the Cognito user pool. + +#### `authenticate_oidc` + +* `authentication_request_extra_params` - Set of additional parameters for the request. + [Detailed below](#authentication_request_extra_params). +* `authorization_endpoint` - The authorization endpoint of the IdP. +* `client_id` - OAuth 2.0 client identifier. +* `issuer` - OIDC issuer identifier of the IdP. +* `on_unauthenticated_request` - Behavior when the client is not authenticated. +* `scope` - Set of user claims requested. +* `session_cookie_name` - Name of the cookie used to maintain session information. +* `session_timeout` - Maximum duration of the authentication session in seconds. +* `token_endpoint` - The token endpoint of the IdP. +* `user_info_endpoint` - The user info endpoint of the IdP. + +#### `authentication_request_extra_params` + +* `key` - Key of query parameter +* `value` - Value of query parameter + +#### `fixed_response` + +* `content_type` - Content type of the response. +* `message_body` - Message body of the response. +* `status_code` - HTTP response code of the response. + +#### `forward` + +* `stickiness` - Target group stickiness for the rule. + [Detailed below](#stickiness). +* `target_group` - Set of target groups for the action. + [Detailed below](#target_group). + +#### `stickiness` + +* `duration` - The time period, in seconds, during which requests from a client should be routed to the same target group. +* `enabled` - Indicates whether target group stickiness is enabled. + +#### `target_group` + +* `arn` - ARN of the target group. +* `weight` - Weight of the target group. + +#### `redirect` + +* `host` - The hostname. +* `path` - The absolute path, starting with `/`. +* `port` - The port. +* `protocol` - The protocol. +* `query` - The query parameters. +* `status_code` - The HTTP redirect code. + +### `condition` + +* `host_header` - Contains a single attribute `values`, which contains a set of host names. +* `http_header` - HTTP header and values to match. + [Detailed below](#http_header). +* `http_request_method` - Contains a single attribute `values`, which contains a set of HTTP request methods. +* `path_pattern` - Contains a single attribute `values`, which contains a set of path patterns to compare against the request URL. +* `query_string` - Query string parameters to match. + [Detailed below](#query_string). +* `source_ip` - Contains a single attribute `values`, which contains a set of source IPs in CIDR notation. + +#### `http_header` + +* `http_header_name` - Name of the HTTP header to match. +* `values` - Set of values to compare against the value of the HTTP header. + +#### `query_string` + +* `values` - Set of `key`-`value` pairs indicating the query string parameters to match. + + \ No newline at end of file diff --git a/website/docs/cdktf/python/d/networkmanager_core_network_policy_document.html.markdown b/website/docs/cdktf/python/d/networkmanager_core_network_policy_document.html.markdown index b79206a7878..b0c826ada71 100644 --- a/website/docs/cdktf/python/d/networkmanager_core_network_policy_document.html.markdown +++ b/website/docs/cdktf/python/d/networkmanager_core_network_policy_document.html.markdown @@ -193,7 +193,6 @@ The following arguments are available: * `conditions` (Required) - A block argument. Detailed Below. * `description` (Optional) - A user-defined description that further helps identify the rule. * `rule_number` (Required) - An integer from `1` to `65535` indicating the rule's order number. Rules are processed in order from the lowest numbered rule to the highest. Rules stop processing when a rule is matched. It's important to make sure that you number your rules in the exact order that you want them processed. -* `add_to_network_function_group` (Optional) - The name of the network function group to attach to the attachment policy. ### `action` @@ -282,4 +281,4 @@ This data source exports the following attributes in addition to the arguments a * `json` - Standard JSON policy document rendered based on the arguments above. - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/d/shield_protection.html.markdown b/website/docs/cdktf/python/d/shield_protection.html.markdown index c6a2ba4f22e..4a383aef93f 100644 --- a/website/docs/cdktf/python/d/shield_protection.html.markdown +++ b/website/docs/cdktf/python/d/shield_protection.html.markdown @@ -48,7 +48,7 @@ class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) DataAwsShieldProtection(self, "example", - resource_arn="arn:aws:globalaccelerator::012345678901:accelerator/1234abcd-abcd-1234-abcd-1234abcdefgh" + resource_arn="arn:aws:globalaccelerator::123456789012:accelerator/1234abcd-abcd-1234-abcd-1234abcdefgh" ) ``` @@ -68,4 +68,4 @@ This data source exports the following attributes in addition to the arguments a * `name` - Name of the protection. * `protection_arn` - ARN of the protection. - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/d/ssoadmin_application.html.markdown b/website/docs/cdktf/python/d/ssoadmin_application.html.markdown index 0621472d3e2..cf36ce241c1 100644 --- a/website/docs/cdktf/python/d/ssoadmin_application.html.markdown +++ b/website/docs/cdktf/python/d/ssoadmin_application.html.markdown @@ -29,7 +29,7 @@ class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) DataAwsSsoadminApplication(self, "example", - application_arn="arn:aws:sso::012345678901:application/ssoins-1234/apl-5678" + application_arn="arn:aws:sso::123456789012:application/ssoins-1234/apl-5678" ) ``` @@ -52,4 +52,4 @@ This data source exports the following attributes in addition to the arguments a * `portal_options` - Options for the portal associated with an application. See the `aws_ssoadmin_application` [resource documentation](../r/ssoadmin_application.html.markdown#portal_options-argument-reference). The attributes are the same. * `status` - Status of the application. - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/index.html.markdown b/website/docs/cdktf/python/index.html.markdown index 18bef1069a1..c5e951b9b60 100644 --- a/website/docs/cdktf/python/index.html.markdown +++ b/website/docs/cdktf/python/index.html.markdown @@ -13,7 +13,7 @@ Use the Amazon Web Services (AWS) provider to interact with the many resources supported by AWS. You must configure the provider with the proper credentials before you can use it. -Use the navigation to the left to read about the available resources. There are currently 1439 resources and 588 data sources available in the provider. +Use the navigation to the left to read about the available resources. There are currently 1441 resources and 588 data sources available in the provider. To learn the basics of Terraform using this provider, follow the hands-on [get started tutorials](https://learn.hashicorp.com/tutorials/terraform/infrastructure-as-code?in=terraform/aws-get-started&utm_source=WEBSITE&utm_medium=WEB_IO&utm_offer=ARTICLE_PAGE&utm_content=DOCS). Interact with AWS services, @@ -898,4 +898,4 @@ Approaches differ per authentication providers: There used to be no better way to get account ID out of the API when using the federated account until `sts:GetCallerIdentity` was introduced. - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/ami_copy.html.markdown b/website/docs/cdktf/python/r/ami_copy.html.markdown index 2ce30a53397..a3bb0dfbd95 100644 --- a/website/docs/cdktf/python/r/ami_copy.html.markdown +++ b/website/docs/cdktf/python/r/ami_copy.html.markdown @@ -37,7 +37,6 @@ class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) AmiCopy(self, "example", - description="A copy of ami-xxxxxxxx", name="terraform-example", source_ami_id="ami-xxxxxxxx", source_ami_region="us-west-1", @@ -83,4 +82,4 @@ configuration. * `update` - (Default `40m`) * `delete` - (Default `90m`) - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/api_gateway_integration.html.markdown b/website/docs/cdktf/python/r/api_gateway_integration.html.markdown index 9d7dc1833bb..4478e3b4a9a 100644 --- a/website/docs/cdktf/python/r/api_gateway_integration.html.markdown +++ b/website/docs/cdktf/python/r/api_gateway_integration.html.markdown @@ -241,7 +241,7 @@ This resource supports the following arguments: * `connection_id` - (Optional) ID of the VpcLink used for the integration. **Required** if `connection_type` is `VPC_LINK` * `uri` - (Optional) Input's URI. **Required** if `type` is `AWS`, `AWS_PROXY`, `HTTP` or `HTTP_PROXY`. For HTTP integrations, the URI must be a fully formed, encoded HTTP(S) URL according to the RFC-3986 specification . For AWS integrations, the URI should be of the form `arn:aws:apigateway:{region}:{subdomain.service|service}:{path|action}/{service_api}`. `region`, `subdomain` and `service` are used to determine the right endpoint. - e.g., `arn:aws:apigateway:eu-west-1:lambda:path/2015-03-31/functions/arn:aws:lambda:eu-west-1:012345678901:function:my-func/invocations`. For private integrations, the URI parameter is not used for routing requests to your endpoint, but is used for setting the Host header and for certificate validation. + e.g., `arn:aws:apigateway:eu-west-1:lambda:path/2015-03-31/functions/arn:aws:lambda:eu-west-1:123456789012:function:my-func/invocations`. For private integrations, the URI parameter is not used for routing requests to your endpoint, but is used for setting the Host header and for certificate validation. * `credentials` - (Optional) Credentials required for the integration. For `AWS` integrations, 2 options are available. To specify an IAM Role for Amazon API Gateway to assume, use the role's ARN. To require that the caller's identity be passed through from the request, specify the string `arn:aws:iam::\*:user/\*`. * `request_templates` - (Optional) Map of the integration's request templates. * `request_parameters` - (Optional) Map of request query string parameters and headers that should be passed to the backend responder. @@ -288,4 +288,4 @@ Using `terraform import`, import `aws_api_gateway_integration` using `REST-API-I % terraform import aws_api_gateway_integration.example 12345abcde/67890fghij/GET ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/auditmanager_assessment_delegation.html.markdown b/website/docs/cdktf/python/r/auditmanager_assessment_delegation.html.markdown index 432495ce3a7..9f6b8f2c86a 100644 --- a/website/docs/cdktf/python/r/auditmanager_assessment_delegation.html.markdown +++ b/website/docs/cdktf/python/r/auditmanager_assessment_delegation.html.markdown @@ -73,13 +73,13 @@ from imports.aws.auditmanager_assessment_delegation import AuditmanagerAssessmen class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) - AuditmanagerAssessmentDelegation.generate_config_for_import(self, "example", "abcdef-123456,arn:aws:iam::012345678901:role/example,example") + AuditmanagerAssessmentDelegation.generate_config_for_import(self, "example", "abcdef-123456,arn:aws:iam::123456789012:role/example,example") ``` Using `terraform import`, import Audit Manager Assessment Delegation using the `id`. For example: ```console -% terraform import aws_auditmanager_assessment_delegation.example abcdef-123456,arn:aws:iam::012345678901:role/example,example +% terraform import aws_auditmanager_assessment_delegation.example abcdef-123456,arn:aws:iam::123456789012:role/example,example ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/auditmanager_framework_share.html.markdown b/website/docs/cdktf/python/r/auditmanager_framework_share.html.markdown index 01040e7b9a8..c058ebd560a 100644 --- a/website/docs/cdktf/python/r/auditmanager_framework_share.html.markdown +++ b/website/docs/cdktf/python/r/auditmanager_framework_share.html.markdown @@ -29,7 +29,7 @@ class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) AuditmanagerFrameworkShare(self, "example", - destination_account="012345678901", + destination_account="123456789012", destination_region="us-east-1", framework_id=Token.as_string(aws_auditmanager_framework_example.id) ) @@ -79,4 +79,4 @@ Using `terraform import`, import Audit Manager Framework Share using the `id`. F % terraform import aws_auditmanager_framework_share.example abcdef-123456 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/auditmanager_organization_admin_account_registration.html.markdown b/website/docs/cdktf/python/r/auditmanager_organization_admin_account_registration.html.markdown index 1191a77624f..225013e38ab 100644 --- a/website/docs/cdktf/python/r/auditmanager_organization_admin_account_registration.html.markdown +++ b/website/docs/cdktf/python/r/auditmanager_organization_admin_account_registration.html.markdown @@ -29,7 +29,7 @@ class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) AuditmanagerOrganizationAdminAccountRegistration(self, "example", - admin_account_id="012345678901" + admin_account_id="123456789012" ) ``` @@ -62,13 +62,13 @@ from imports.aws.auditmanager_organization_admin_account_registration import Aud class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) - AuditmanagerOrganizationAdminAccountRegistration.generate_config_for_import(self, "example", "012345678901 ") + AuditmanagerOrganizationAdminAccountRegistration.generate_config_for_import(self, "example", "123456789012 ") ``` Using `terraform import`, import Audit Manager Organization Admin Account Registration using the `id`. For example: ```console -% terraform import aws_auditmanager_organization_admin_account_registration.example 012345678901 +% terraform import aws_auditmanager_organization_admin_account_registration.example 123456789012 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/chatbot_slack_channel_configuration.html.markdown b/website/docs/cdktf/python/r/chatbot_slack_channel_configuration.html.markdown index 20ba2dd52ec..d1dc24b3d56 100644 --- a/website/docs/cdktf/python/r/chatbot_slack_channel_configuration.html.markdown +++ b/website/docs/cdktf/python/r/chatbot_slack_channel_configuration.html.markdown @@ -89,13 +89,13 @@ from imports.aws.chatbot_slack_channel_configuration import ChatbotSlackChannelC class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) - ChatbotSlackChannelConfiguration.generate_config_for_import(self, "example", "arn:aws:chatbot::012345678901:chat-configuration/slack-channel/min-slaka-kanal") + ChatbotSlackChannelConfiguration.generate_config_for_import(self, "example", "arn:aws:chatbot::123456789012:chat-configuration/slack-channel/min-slaka-kanal") ``` Using `terraform import`, import Chatbot Slack Channel Configuration using the `chat_configuration_arn`. For example: ```console -% terraform import aws_chatbot_slack_channel_configuration.example arn:aws:chatbot::012345678901:chat-configuration/slack-channel/min-slaka-kanal +% terraform import aws_chatbot_slack_channel_configuration.example arn:aws:chatbot::123456789012:chat-configuration/slack-channel/min-slaka-kanal ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/codedeploy_deployment_config.html.markdown b/website/docs/cdktf/python/r/codedeploy_deployment_config.html.markdown index 525097be1d3..55e554c4ea9 100644 --- a/website/docs/cdktf/python/r/codedeploy_deployment_config.html.markdown +++ b/website/docs/cdktf/python/r/codedeploy_deployment_config.html.markdown @@ -118,6 +118,7 @@ This resource supports the following arguments: * `compute_platform` - (Optional) The compute platform can be `Server`, `Lambda`, or `ECS`. Default is `Server`. * `minimum_healthy_hosts` - (Optional) A minimum_healthy_hosts block. Required for `Server` compute platform. Minimum Healthy Hosts are documented below. * `traffic_routing_config` - (Optional) A traffic_routing_config block. Traffic Routing Config is documented below. +* `zonal_config` - (Optional) A zonal_config block. Zonal Config is documented below. The `minimum_healthy_hosts` block supports the following: @@ -143,6 +144,17 @@ The `time_based_linear` block supports the following: * `interval` - (Optional) The number of minutes between each incremental traffic shift of a `TimeBasedLinear` deployment. * `percentage` - (Optional) The percentage of traffic that is shifted at the start of each increment of a `TimeBasedLinear` deployment. +The `zonal_config` block supports the following: + +* `first_zone_monitor_duration_in_seconds` - (Optional) The period of time, in seconds, that CodeDeploy must wait after completing a deployment to the first Availability Zone. CodeDeploy will wait this amount of time before starting a deployment to the second Availability Zone. If you don't specify a value for `first_zone_monitor_duration_in_seconds`, then CodeDeploy uses the `monitor_duration_in_seconds` value for the first Availability Zone. +* `minimum_healthy_hosts_per_zone` - (Optional) The number or percentage of instances that must remain available per Availability Zone during a deployment. If you don't specify a value under `minimum_healthy_hosts_per_zone`, then CodeDeploy uses a default value of 0 percent. This block is more documented below. +* `monitor_duration_in_seconds` - (Optional) The period of time, in seconds, that CodeDeploy must wait after completing a deployment to an Availability Zone. CodeDeploy will wait this amount of time before starting a deployment to the next Availability Zone. If you don't specify a `monitor_duration_in_seconds`, CodeDeploy starts deploying to the next Availability Zone immediately. + +The `minimum_healthy_hosts_per_zone` block supports the following: + +* `type` - (Required) The type can either be `FLEET_PERCENT` or `HOST_COUNT`. +* `value` - (Required) The value when the type is `FLEET_PERCENT` represents the minimum number of healthy instances as a percentage of the total number of instances in the Availability Zone during a deployment. If you specify FLEET_PERCENT, at the start of the deployment, AWS CodeDeploy converts the percentage to the equivalent number of instance and rounds up fractional instances. When the type is `HOST_COUNT`, the value represents the minimum number of healthy instances in the Availability Zone as an absolute value. + ## Attribute Reference This resource exports the following attributes in addition to the arguments above: @@ -176,4 +188,4 @@ Using `terraform import`, import CodeDeploy Deployment Configurations using the % terraform import aws_codedeploy_deployment_config.example my-deployment-config ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/codedeploy_deployment_group.html.markdown b/website/docs/cdktf/python/r/codedeploy_deployment_group.html.markdown index e68611ab938..9bf8b2a49bf 100644 --- a/website/docs/cdktf/python/r/codedeploy_deployment_group.html.markdown +++ b/website/docs/cdktf/python/r/codedeploy_deployment_group.html.markdown @@ -232,6 +232,7 @@ This resource supports the following arguments: * `on_premises_instance_tag_filter` - (Optional) On premise tag filters associated with the group. See the AWS docs for details. * `trigger_configuration` - (Optional) Configuration block(s) of the triggers for the deployment group (documented below). * `outdated_instances_strategy` - (Optional) Configuration block of Indicates what happens when new Amazon EC2 instances are launched mid-deployment and do not receive the deployed application revision. Valid values are `UPDATE` and `IGNORE`. Defaults to `UPDATE`. +* `termination_hook_enabled` - (Optional) Indicates whether the deployment group was configured to have CodeDeploy install a termination hook into an Auto Scaling group. * `tags` - (Optional) Key-value map of resource tags. If configured with a provider [`default_tags` configuration block](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#default_tags-configuration-block) present, tags with matching keys will overwrite those defined at the provider-level. ### alarm_configuration Argument Reference @@ -414,4 +415,4 @@ Using `terraform import`, import CodeDeploy Deployment Groups using `app_name`, [1]: http://docs.aws.amazon.com/codedeploy/latest/userguide/monitoring-sns-event-notifications-create-trigger.html - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/datazone_user_profile.html.markdown b/website/docs/cdktf/python/r/datazone_user_profile.html.markdown index e0cdfa69be1..cc146e0d8c8 100644 --- a/website/docs/cdktf/python/r/datazone_user_profile.html.markdown +++ b/website/docs/cdktf/python/r/datazone_user_profile.html.markdown @@ -78,13 +78,13 @@ from imports.aws.datazone_user_profile import DatazoneUserProfile class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) - DatazoneUserProfile.generate_config_for_import(self, "example", "arn:aws:iam::012345678901:user/example,dzd_54nakfrg9k6sri,IAM") + DatazoneUserProfile.generate_config_for_import(self, "example", "arn:aws:iam::123456789012:user/example,dzd_54nakfrg9k6sri,IAM") ``` Using `terraform import`, import DataZone User Profile using the `user_identifier,domain_identifier,type`. For example: ```console -% terraform import aws_datazone_user_profile.example arn:aws:iam::012345678901:user/example,dzd_54nakfrg9k6suo,IAM +% terraform import aws_datazone_user_profile.example arn:aws:iam::123456789012:user/example,dzd_54nakfrg9k6suo,IAM ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/dynamodb_kinesis_streaming_destination.html.markdown b/website/docs/cdktf/python/r/dynamodb_kinesis_streaming_destination.html.markdown index 97e165a412e..95a6107feed 100644 --- a/website/docs/cdktf/python/r/dynamodb_kinesis_streaming_destination.html.markdown +++ b/website/docs/cdktf/python/r/dynamodb_kinesis_streaming_destination.html.markdown @@ -45,6 +45,7 @@ class MyConvertedCode(TerraformStack): aws_kinesis_stream_example.override_logical_id("example") aws_dynamodb_kinesis_streaming_destination_example = DynamodbKinesisStreamingDestination(self, "example_2", + approximate_creation_date_time_precision="MICROSECOND", stream_arn=Token.as_string(aws_kinesis_stream_example.arn), table_name=example.name ) @@ -56,11 +57,10 @@ class MyConvertedCode(TerraformStack): This resource supports the following arguments: +* `approximate_creation_date_time_precision` - (Optional) Toggle for the precision of Kinesis data stream timestamp. Valid values: `MILLISECOND` and `MICROSECOND`. * `stream_arn` - (Required) The ARN for a Kinesis data stream. This must exist in the same account and region as the DynamoDB table. - -* `table_name` - (Required) The name of the DynamoDB table. There - can only be one Kinesis streaming destination for a given DynamoDB table. - +* `table_name` - (Required) The name of the DynamoDB table. There can only be one Kinesis streaming destination for a given DynamoDB table. + ## Attribute Reference This resource exports the following attributes in addition to the arguments above: @@ -92,4 +92,4 @@ Using `terraform import`, import DynamoDB Kinesis Streaming Destinations using t % terraform import aws_dynamodb_kinesis_streaming_destination.example example,arn:aws:kinesis:us-east-1:111122223333:exampleStreamName ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/ebs_volume.html.markdown b/website/docs/cdktf/python/r/ebs_volume.html.markdown index e7765865714..e471c6f9051 100644 --- a/website/docs/cdktf/python/r/ebs_volume.html.markdown +++ b/website/docs/cdktf/python/r/ebs_volume.html.markdown @@ -61,7 +61,7 @@ This resource supports the following arguments: This resource exports the following attributes in addition to the arguments above: * `id` - The volume ID (e.g., vol-59fcb34e). -* `arn` - The volume ARN (e.g., arn:aws:ec2:us-east-1:0123456789012:volume/vol-59fcb34e). +* `arn` - The volume ARN (e.g., arn:aws:ec2:us-east-1:123456789012:volume/vol-59fcb34e). * `tags_all` - A map of tags assigned to the resource, including those inherited from the provider [`default_tags` configuration block](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#default_tags-configuration-block). ## Timeouts @@ -97,4 +97,4 @@ Using `terraform import`, import EBS Volumes using the `id`. For example: % terraform import aws_ebs_volume.id vol-049df61146c4d7901 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/ecr_registry_scanning_configuration.html.markdown b/website/docs/cdktf/python/r/ecr_registry_scanning_configuration.html.markdown index 6de76f592d7..3bc6c7c73ff 100644 --- a/website/docs/cdktf/python/r/ecr_registry_scanning_configuration.html.markdown +++ b/website/docs/cdktf/python/r/ecr_registry_scanning_configuration.html.markdown @@ -111,13 +111,13 @@ from imports.aws.ecr_registry_scanning_configuration import EcrRegistryScanningC class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) - EcrRegistryScanningConfiguration.generate_config_for_import(self, "example", "012345678901") + EcrRegistryScanningConfiguration.generate_config_for_import(self, "example", "123456789012") ``` Using `terraform import`, import ECR Scanning Configurations using the `registry_id`. For example: ```console -% terraform import aws_ecr_registry_scanning_configuration.example 012345678901 +% terraform import aws_ecr_registry_scanning_configuration.example 123456789012 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/elasticache_cluster.html.markdown b/website/docs/cdktf/python/r/elasticache_cluster.html.markdown index cc711d12cd3..0a1948bb665 100644 --- a/website/docs/cdktf/python/r/elasticache_cluster.html.markdown +++ b/website/docs/cdktf/python/r/elasticache_cluster.html.markdown @@ -205,7 +205,7 @@ class MyConvertedCode(TerraformStack): The following arguments are required: * `cluster_id` – (Required) Group identifier. ElastiCache converts this name to lowercase. Changing this value will re-create the resource. -* `engine` – (Optional, Required if `replication_group_id` is not specified) Name of the cache engine to be used for this cache cluster. Valid values are `memcached` or `redis`. +* `engine` – (Optional, Required if `replication_group_id` is not specified) Name of the cache engine to be used for this cache cluster. Valid values are `memcached` and `redis`. * `node_type` – (Required unless `replication_group_id` is provided) The instance class used. See AWS documentation for information on [supported node types for Redis](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/CacheNodes.SupportedTypes.html) and [guidance on selecting node types for Redis](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/nodes-select-size.html). See AWS documentation for information on [supported node types for Memcached](https://docs.aws.amazon.com/AmazonElastiCache/latest/mem-ug/CacheNodes.SupportedTypes.html) and [guidance on selecting node types for Memcached](https://docs.aws.amazon.com/AmazonElastiCache/latest/mem-ug/nodes-select-size.html). @@ -304,4 +304,4 @@ Using `terraform import`, import ElastiCache Clusters using the `cluster_id`. Fo % terraform import aws_elasticache_cluster.my_cluster my_cluster ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/elasticache_global_replication_group.html.markdown b/website/docs/cdktf/python/r/elasticache_global_replication_group.html.markdown index d914d57b86e..c2ff8bcf76b 100644 --- a/website/docs/cdktf/python/r/elasticache_global_replication_group.html.markdown +++ b/website/docs/cdktf/python/r/elasticache_global_replication_group.html.markdown @@ -52,7 +52,7 @@ class MyConvertedCode(TerraformStack): ) ``` -### Managing Redis Engine Versions +### Managing Redis OOS/Valkey Engine Versions The initial Redis version is determined by the version set on the primary replication group. However, once it is part of a Global Replication Group, @@ -186,4 +186,4 @@ Using `terraform import`, import ElastiCache Global Replication Groups using the % terraform import aws_elasticache_global_replication_group.my_global_replication_group okuqm-global-replication-group-1 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/elasticache_replication_group.html.markdown b/website/docs/cdktf/python/r/elasticache_replication_group.html.markdown index 5fe637bc500..e0cd239ca5c 100644 --- a/website/docs/cdktf/python/r/elasticache_replication_group.html.markdown +++ b/website/docs/cdktf/python/r/elasticache_replication_group.html.markdown @@ -33,7 +33,7 @@ for more information. ## Example Usage -### Redis Cluster Mode Disabled +### Redis OSS/Valkey Cluster Mode Disabled To create a single shard primary with single read replica: @@ -105,7 +105,7 @@ class MyConvertedCode(TerraformStack): ) ``` -### Redis Cluster Mode Enabled +### Redis OSS/Valkey Cluster Mode Enabled To create two shards with a primary and a single read replica each: @@ -262,12 +262,12 @@ The following arguments are optional: * `auth_token` - (Optional) Password used to access a password protected server. Can be specified only if `transit_encryption_enabled = true`. * `auth_token_update_strategy` - (Optional) Strategy to use when updating the `auth_token`. Valid values are `SET`, `ROTATE`, and `DELETE`. Defaults to `ROTATE`. * `auto_minor_version_upgrade` - (Optional) Specifies whether minor version engine upgrades will be applied automatically to the underlying Cache Cluster instances during the maintenance window. - Only supported for engine type `"redis"` and if the engine version is 6 or higher. + Only supported for engine types `"redis"` and `"valkey"` and if the engine version is 6 or higher. Defaults to `true`. * `automatic_failover_enabled` - (Optional) Specifies whether a read-only replica will be automatically promoted to read/write primary if the existing primary fails. If enabled, `num_cache_clusters` must be greater than 1. Must be enabled for Redis (cluster mode enabled) replication groups. Defaults to `false`. * `cluster_mode` - (Optional) Specifies whether cluster mode is enabled or disabled. Valid values are `enabled` or `disabled` or `compatible` * `data_tiering_enabled` - (Optional) Enables data tiering. Data tiering is only supported for replication groups using the r6gd node type. This parameter must be set to `true` when using r6gd nodes. -* `engine` - (Optional) Name of the cache engine to be used for the clusters in this replication group. The only valid value is `redis`. +* `engine` - (Optional) Name of the cache engine to be used for the clusters in this replication group. Valid values are `redis` or `valkey`. * `engine_version` - (Optional) Version number of the cache engine to be used for the cache clusters in this replication group. If the version is 7 or higher, the major and minor version should be set, e.g., `7.2`. If the version is 6, the major and minor version can be set, e.g., `6.2`, @@ -278,7 +278,7 @@ The following arguments are optional: * `global_replication_group_id` - (Optional) The ID of the global replication group to which this replication group should belong. If this parameter is specified, the replication group is added to the specified global replication group as a secondary replication group; otherwise, the replication group is not part of any global replication group. If `global_replication_group_id` is set, the `num_node_groups` parameter cannot be set. * `ip_discovery` - (Optional) The IP version to advertise in the discovery protocol. Valid values are `ipv4` or `ipv6`. * `kms_key_id` - (Optional) The ARN of the key that you wish to use if encrypting at rest. If not supplied, uses service managed encryption. Can be specified only if `at_rest_encryption_enabled = true`. -* `log_delivery_configuration` - (Optional, Redis only) Specifies the destination and format of Redis [SLOWLOG](https://redis.io/commands/slowlog) or Redis [Engine Log](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/Log_Delivery.html#Log_contents-engine-log). See the documentation on [Amazon ElastiCache](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/Log_Delivery.html#Log_contents-engine-log). See [Log Delivery Configuration](#log-delivery-configuration) below for more details. +* `log_delivery_configuration` - (Optional, Redis only) Specifies the destination and format of Redis OSS/Valkey [SLOWLOG](https://redis.io/commands/slowlog) or Redis OSS/Valkey [Engine Log](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/Log_Delivery.html#Log_contents-engine-log). See the documentation on [Amazon ElastiCache](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/Log_Delivery.html#Log_contents-engine-log). See [Log Delivery Configuration](#log-delivery-configuration) below for more details. * `maintenance_window` – (Optional) Specifies the weekly time range for when maintenance on the cache cluster is performed. The format is `ddd:hh24:mi-ddd:hh24:mi` (24H Clock UTC). The minimum maintenance window is a 60 minute period. Example: `sun:05:00-sun:09:00` * `multi_az_enabled` - (Optional) Specifies whether to enable Multi-AZ Support for the replication group. If `true`, `automatic_failover_enabled` must also be enabled. @@ -324,7 +324,7 @@ The following arguments are optional: ### Log Delivery Configuration -The `log_delivery_configuration` block allows the streaming of Redis [SLOWLOG](https://redis.io/commands/slowlog) or Redis [Engine Log](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/Log_Delivery.html#Log_contents-engine-log) to CloudWatch Logs or Kinesis Data Firehose. Max of 2 blocks. +The `log_delivery_configuration` block allows the streaming of Redis OSS/Valkey [SLOWLOG](https://redis.io/commands/slowlog) or Redis OSS/Valkey [Engine Log](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/Log_Delivery.html#Log_contents-engine-log) to CloudWatch Logs or Kinesis Data Firehose. Max of 2 blocks. * `destination` - Name of either the CloudWatch Logs LogGroup or Kinesis Data Firehose resource. * `destination_type` - For CloudWatch Logs use `cloudwatch-logs` or for Kinesis Data Firehose use `kinesis-firehose`. @@ -378,4 +378,4 @@ Using `terraform import`, import ElastiCache Replication Groups using the `repli % terraform import aws_elasticache_replication_group.my_replication_group replication-group-1 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/elasticache_serverless_cache.html.markdown b/website/docs/cdktf/python/r/elasticache_serverless_cache.html.markdown index 1609101378c..3c99616ade4 100644 --- a/website/docs/cdktf/python/r/elasticache_serverless_cache.html.markdown +++ b/website/docs/cdktf/python/r/elasticache_serverless_cache.html.markdown @@ -10,7 +10,7 @@ description: |- # Resource: aws_elasticache_serverless_cache -Provides an ElastiCache Serverless Cache resource which manages memcached or redis. +Provides an ElastiCache Serverless Cache resource which manages memcached, redis or valkey. ## Example Usage @@ -51,7 +51,7 @@ class MyConvertedCode(TerraformStack): ) ``` -### Redis Serverless +### Redis OSS Serverless ```python # DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug @@ -90,17 +90,56 @@ class MyConvertedCode(TerraformStack): ) ``` +### Valkey Serverless + +```python +# DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug +from constructs import Construct +from cdktf import Token, Fn, TerraformStack +# +# Provider bindings are generated by running `cdktf get`. +# See https://cdk.tf/provider-generation for more details. +# +from imports.aws.elasticache_serverless_cache import ElasticacheServerlessCache +class MyConvertedCode(TerraformStack): + def __init__(self, scope, name): + super().__init__(scope, name) + ElasticacheServerlessCache(self, "example", + cache_usage_limits=[ElasticacheServerlessCacheCacheUsageLimits( + data_storage=[ElasticacheServerlessCacheCacheUsageLimitsDataStorage( + maximum=10, + unit="GB" + ) + ], + ecpu_per_second=[ElasticacheServerlessCacheCacheUsageLimitsEcpuPerSecond( + maximum=5000 + ) + ] + ) + ], + daily_snapshot_time="09:00", + description="Test Server", + engine="valkey", + kms_key_id=test.arn, + major_engine_version="7", + name="example", + security_group_ids=[Token.as_string(aws_security_group_test.id)], + snapshot_retention_limit=1, + subnet_ids=Token.as_list(Fn.lookup_nested(aws_subnet_test, ["*", "id"])) + ) +``` + ## Argument Reference The following arguments are required: -* `engine` – (Required) Name of the cache engine to be used for this cache cluster. Valid values are `memcached` or `redis`. +* `engine` – (Required) Name of the cache engine to be used for this cache cluster. Valid values are `memcached`, `redis` or `valkey`. * `name` – (Required) The Cluster name which serves as a unique identifier to the serverless cache The following arguments are optional: * `cache_usage_limits` - (Optional) Sets the cache usage limits for storage and ElastiCache Processing Units for the cache. See [`cache_usage_limits` Block](#cache_usage_limits-block) for details. -* `daily_snapshot_time` - (Optional) The daily time that snapshots will be created from the new serverless cache. Only supported for engine type `"redis"`. Defaults to `0`. +* `daily_snapshot_time` - (Optional) The daily time that snapshots will be created from the new serverless cache. Only supported for engine types `"redis"` or `"valkey"`. Defaults to `0`. * `description` - (Optional) User-provided description for the serverless cache. The default is NULL. * `kms_key_id` - (Optional) ARN of the customer managed key for encrypting the data at rest. If no KMS key is provided, a default service key is used. * `major_engine_version` – (Optional) The version of the cache engine that will be used to create the serverless cache. @@ -193,4 +232,4 @@ Using `terraform import`, import ElastiCache Serverless Cache using the `name`. % terraform import aws_elasticache_serverless_cache.my_cluster my_cluster ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/imagebuilder_workflow.html.markdown b/website/docs/cdktf/python/r/imagebuilder_workflow.html.markdown index 21f2fd18efe..b8fd7a441db 100644 --- a/website/docs/cdktf/python/r/imagebuilder_workflow.html.markdown +++ b/website/docs/cdktf/python/r/imagebuilder_workflow.html.markdown @@ -11,6 +11,8 @@ description: |- Terraform resource for managing an AWS EC2 Image Builder Workflow. +-> Image Builder manages the workflows for the distribution stage. Therefore, using the DISTRIBUTION workflow type results in an error. + ## Example Usage ### Basic Usage @@ -40,7 +42,7 @@ class MyConvertedCode(TerraformStack): The following arguments are required: * `name` - (Required) Name of the workflow. -* `type` - (Required) Type of the workflow. Valid values: `BUILD`, `TEST`, `DISTRIBUTION`. +* `type` - (Required) Type of the workflow. Valid values: `BUILD`, `TEST`. * `version` - (Required) Version of the workflow. The following arguments are optional: @@ -87,4 +89,4 @@ Using `terraform import`, import EC2 Image Builder Workflow using the `example_i Certain resource arguments, such as `uri`, cannot be read via the API and imported into Terraform. Terraform will display a difference for these arguments the first run after import if declared in the Terraform configuration for an imported resource. - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/inspector2_delegated_admin_account.html.markdown b/website/docs/cdktf/python/r/inspector2_delegated_admin_account.html.markdown index 636c9835845..1627599b92b 100644 --- a/website/docs/cdktf/python/r/inspector2_delegated_admin_account.html.markdown +++ b/website/docs/cdktf/python/r/inspector2_delegated_admin_account.html.markdown @@ -70,13 +70,13 @@ from imports.aws.inspector2_delegated_admin_account import Inspector2DelegatedAd class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) - Inspector2DelegatedAdminAccount.generate_config_for_import(self, "example", "012345678901") + Inspector2DelegatedAdminAccount.generate_config_for_import(self, "example", "123456789012") ``` Using `terraform import`, import Inspector Delegated Admin Account using the `account_id`. For example: ```console -% terraform import aws_inspector2_delegated_admin_account.example 012345678901 +% terraform import aws_inspector2_delegated_admin_account.example 123456789012 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/instance.html.markdown b/website/docs/cdktf/python/r/instance.html.markdown index d95d06586f1..dd2e183eb7e 100644 --- a/website/docs/cdktf/python/r/instance.html.markdown +++ b/website/docs/cdktf/python/r/instance.html.markdown @@ -226,7 +226,7 @@ class MyConvertedCode(TerraformStack): super().__init__(scope, name) Instance(self, "this", ami="ami-0dcc1e21636832c5d", - host_resource_group_arn="arn:aws:resource-groups:us-west-2:012345678901:group/win-testhost", + host_resource_group_arn="arn:aws:resource-groups:us-west-2:123456789012:group/win-testhost", instance_type="m5.large", tenancy="host" ) @@ -537,4 +537,4 @@ Using `terraform import`, import instances using the `id`. For example: % terraform import aws_instance.web i-12345678 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/kinesis_firehose_delivery_stream.html.markdown b/website/docs/cdktf/python/r/kinesis_firehose_delivery_stream.html.markdown index b3cb26cdea6..9daab6e722a 100644 --- a/website/docs/cdktf/python/r/kinesis_firehose_delivery_stream.html.markdown +++ b/website/docs/cdktf/python/r/kinesis_firehose_delivery_stream.html.markdown @@ -537,6 +537,97 @@ class MyConvertedCode(TerraformStack): ) ``` +### Iceberg Destination + +```python +# DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug +from constructs import Construct +from cdktf import Token, TerraformStack +# +# Provider bindings are generated by running `cdktf get`. +# See https://cdk.tf/provider-generation for more details. +# +from imports.aws.data_aws_caller_identity import DataAwsCallerIdentity +from imports.aws.data_aws_partition import DataAwsPartition +from imports.aws.data_aws_region import DataAwsRegion +from imports.aws.glue_catalog_database import GlueCatalogDatabase +from imports.aws.glue_catalog_table import GlueCatalogTable +from imports.aws.kinesis_firehose_delivery_stream import KinesisFirehoseDeliveryStream +from imports.aws.s3_bucket import S3Bucket +class MyConvertedCode(TerraformStack): + def __init__(self, scope, name): + super().__init__(scope, name) + test = GlueCatalogDatabase(self, "test", + name="test" + ) + bucket = S3Bucket(self, "bucket", + bucket="test-bucket", + force_destroy=True + ) + current = DataAwsCallerIdentity(self, "current") + data_aws_partition_current = DataAwsPartition(self, "current_3") + # This allows the Terraform resource name to match the original name. You can remove the call if you don't need them to match. + data_aws_partition_current.override_logical_id("current") + data_aws_region_current = DataAwsRegion(self, "current_4") + # This allows the Terraform resource name to match the original name. You can remove the call if you don't need them to match. + data_aws_region_current.override_logical_id("current") + aws_glue_catalog_table_test = GlueCatalogTable(self, "test_5", + database_name=test.name, + name="test", + open_table_format_input=GlueCatalogTableOpenTableFormatInput( + iceberg_input=GlueCatalogTableOpenTableFormatInputIcebergInput( + metadata_operation="CREATE", + version=Token.as_string(2) + ) + ), + parameters={ + "format": "parquet" + }, + storage_descriptor=GlueCatalogTableStorageDescriptor( + columns=[GlueCatalogTableStorageDescriptorColumns( + name="my_column_1", + type="int" + ) + ], + location="s3://${" + bucket.id + "}" + ), + table_type="EXTERNAL_TABLE" + ) + # This allows the Terraform resource name to match the original name. You can remove the call if you don't need them to match. + aws_glue_catalog_table_test.override_logical_id("test") + KinesisFirehoseDeliveryStream(self, "test_stream", + destination="iceberg", + iceberg_configuration=KinesisFirehoseDeliveryStreamIcebergConfiguration( + buffering_interval=400, + buffering_size=10, + catalog_arn="arn:${" + data_aws_partition_current.partition + "}:glue:${" + data_aws_region_current.name + "}:${" + current.account_id + "}:catalog", + destination_table_configuration=[KinesisFirehoseDeliveryStreamIcebergConfigurationDestinationTableConfiguration( + database_name=test.name, + table_name=Token.as_string(aws_glue_catalog_table_test.name) + ) + ], + processing_configuration=KinesisFirehoseDeliveryStreamIcebergConfigurationProcessingConfiguration( + enabled=Token.as_boolean("true"), + processors=[KinesisFirehoseDeliveryStreamIcebergConfigurationProcessingConfigurationProcessors( + parameters=[KinesisFirehoseDeliveryStreamIcebergConfigurationProcessingConfigurationProcessorsParameters( + parameter_name="LambdaArn", + parameter_value="${" + lambda_processor.arn + "}:$LATEST" + ) + ], + type="Lambda" + ) + ] + ), + role_arn=firehose_role.arn, + s3_configuration=KinesisFirehoseDeliveryStreamIcebergConfigurationS3Configuration( + bucket_arn=bucket.arn, + role_arn=firehose_role.arn + ) + ), + name="terraform-kinesis-firehose-test-stream" + ) +``` + ### Splunk Destination ```python @@ -671,6 +762,7 @@ This resource supports the following arguments: * `elasticsearch_configuration` - (Optional) Configuration options when `destination` is `elasticsearch`. See [`elasticsearch_configuration` block](#elasticsearch_configuration-block) below for details. * `extended_s3_configuration` - (Optional, only Required when `destination` is `extended_s3`) Enhanced configuration options for the s3 destination. See [`extended_s3_configuration` block](#extended_s3_configuration-block) below for details. * `http_endpoint_configuration` - (Optional) Configuration options when `destination` is `http_endpoint`. Requires the user to also specify an `s3_configuration` block. See [`http_endpoint_configuration` block](#http_endpoint_configuration-block) below for details. +* `iceberg_configuration` - (Optional) Configuration options when `destination` is `iceberg`. See [`iceberg_configuration` block](#iceberg_configuration-block) below for details. * `opensearch_configuration` - (Optional) Configuration options when `destination` is `opensearch`. See [`opensearch_configuration` block](#opensearch_configuration-block) below for details. * `opensearchserverless_configuration` - (Optional) Configuration options when `destination` is `opensearchserverless`. See [`opensearchserverless_configuration` block](#opensearchserverless_configuration-block) below for details. * `redshift_configuration` - (Optional) Configuration options when `destination` is `redshift`. Requires the user to also specify an `s3_configuration` block. See [`redshift_configuration` block](#redshift_configuration-block) below for details. @@ -757,6 +849,20 @@ The `elasticsearch_configuration` configuration block supports the following arg * `vpc_config` - (Optional) The VPC configuration for the delivery stream to connect to Elastic Search associated with the VPC. See [`vpc_config` block](#vpc_config-block) below for details. * `processing_configuration` - (Optional) The data processing configuration. See [`processing_configuration` block](#processing_configuration-block) below for details. +### `iceberg_configuration` block + +The `iceberg_configuration` configuration block supports the following arguments: + +* `buffering_interval` - (Optional) Buffer incoming data for the specified period of time, in seconds between 0 and 900, before delivering it to the destination. The default value is 300. +* `buffering_size` - (Optional) Buffer incoming data to the specified size, in MBs between 1 and 128, before delivering it to the destination. The default value is 5. +* `catalog_arn` - (Required) Glue catalog ARN identifier of the destination Apache Iceberg Tables. You must specify the ARN in the format `arn:aws:glue:region:account-id:catalog` +* `cloudwatch_logging_options` - (Optional) The CloudWatch Logging Options for the delivery stream. See [`cloudwatch_logging_options` block](#cloudwatch_logging_options-block) below for details. +* `destination_table_configuration` - (Optional) Destination table configurations which Firehose uses to deliver data to Apache Iceberg Tables. Firehose will write data with insert if table specific configuration is not provided. See [`destination_table_configuration` block](#destination_table_configuration-block) below for details. +* `processing_configuration` - (Optional) The data processing configuration. See [`processing_configuration` block](#processing_configuration-block) below for details. +* `role_arn` - (Required) The ARN of the IAM role to be assumed by Firehose for calling Apache Iceberg Tables. +* `retry_duration` - (Optional) The period of time, in seconds between 0 to 7200, during which Firehose retries to deliver data to the specified destination. +* `s3_configuration` - (Required) The S3 Configuration. See [`s3_configuration` block](#s3_configuration-block) below for details. + ### `opensearch_configuration` block The `opensearch_configuration` configuration block supports the following arguments: @@ -1068,6 +1174,15 @@ The `schema_configuration` configuration block supports the following arguments: * `region` - (Optional) If you don't specify an AWS Region, the default is the current region. * `version_id` - (Optional) Specifies the table version for the output data schema. Defaults to `LATEST`. +### `destination_table_configuration` block + +The `destination_table_configuration` configuration block supports the following arguments: + +* `database_name` - (Required) The name of the Apache Iceberg database. +* `table_name` - (Required) The name of the Apache Iceberg Table. +* `s3_error_output_prefix` - (Optional) The table specific S3 error output prefix. All the errors that occurred while delivering to this table will be prefixed with this value in S3 destination. +* `unique_keys` - (Optional) A list of unique keys for a given Apache Iceberg table. Firehose will use these for running Create, Update, or Delete operations on the given Iceberg table. + ### `dynamic_partitioning_configuration` block The `dynamic_partitioning_configuration` configuration block supports the following arguments: @@ -1127,4 +1242,4 @@ Using `terraform import`, import Kinesis Firehose Delivery streams using the str Note: Import does not work for stream destination `s3`. Consider using `extended_s3` since `s3` destination is deprecated. - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/lakeformation_data_lake_settings.html.markdown b/website/docs/cdktf/python/r/lakeformation_data_lake_settings.html.markdown index f1fcafb78e4..936d660f155 100644 --- a/website/docs/cdktf/python/r/lakeformation_data_lake_settings.html.markdown +++ b/website/docs/cdktf/python/r/lakeformation_data_lake_settings.html.markdown @@ -100,22 +100,44 @@ class MyConvertedCode(TerraformStack): ) ``` +### Change Cross Account Version + +```python +# DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug +from constructs import Construct +from cdktf import TerraformStack +# +# Provider bindings are generated by running `cdktf get`. +# See https://cdk.tf/provider-generation for more details. +# +from imports.aws.lakeformation_data_lake_settings import LakeformationDataLakeSettings +class MyConvertedCode(TerraformStack): + def __init__(self, scope, name): + super().__init__(scope, name) + LakeformationDataLakeSettings(self, "example", + parameters={ + "CROSS_ACCOUNT_VERSION": "3" + } + ) +``` + ## Argument Reference The following arguments are optional: * `admins` – (Optional) Set of ARNs of AWS Lake Formation principals (IAM users or roles). -* `read_only_admins` – (Optional) Set of ARNs of AWS Lake Formation principals (IAM users or roles) with only view access to the resources. +* `allow_external_data_filtering` - (Optional) Whether to allow Amazon EMR clusters to access data managed by Lake Formation. +* `allow_full_table_external_data_access` - (Optional) Whether to allow a third-party query engine to get data access credentials without session tags when a caller has full data access permissions. +* `authorized_session_tag_value_list` - (Optional) Lake Formation relies on a privileged process secured by Amazon EMR or the third party integrator to tag the user's role while assuming it. * `catalog_id` – (Optional) Identifier for the Data Catalog. By default, the account ID. * `create_database_default_permissions` - (Optional) Up to three configuration blocks of principal permissions for default create database permissions. Detailed below. * `create_table_default_permissions` - (Optional) Up to three configuration blocks of principal permissions for default create table permissions. Detailed below. -* `trusted_resource_owners` – (Optional) List of the resource-owning account IDs that the caller's account can use to share their user access details (user ARNs). -* `allow_external_data_filtering` - (Optional) Whether to allow Amazon EMR clusters to access data managed by Lake Formation. * `external_data_filtering_allow_list` - (Optional) A list of the account IDs of Amazon Web Services accounts with Amazon EMR clusters that are to perform data filtering. -* `authorized_session_tag_value_list` - (Optional) Lake Formation relies on a privileged process secured by Amazon EMR or the third party integrator to tag the user's role while assuming it. -* `allow_full_table_external_data_access` - (Optional) Whether to allow a third-party query engine to get data access credentials without session tags when a caller has full data access permissions. +* `parameters` - Key-value map of additional configuration. Valid values for the `CROSS_ACCOUNT_VERSION` key are `"1"`, `"2"`, `"3"`, or `"4"`. `SET_CONTEXT` is also returned with a value of `TRUE`. In a fresh account, prior to configuring, `CROSS_ACCOUNT_VERSION` is `"1"`. Destroying this resource sets the `CROSS_ACCOUNT_VERSION` to `"1"`. +* `read_only_admins` – (Optional) Set of ARNs of AWS Lake Formation principals (IAM users or roles) with only view access to the resources. +* `trusted_resource_owners` – (Optional) List of the resource-owning account IDs that the caller's account can use to share their user access details (user ARNs). -~> **NOTE:** Although optional, not including `admins`, `create_database_default_permissions`, `create_table_default_permissions`, and/or `trusted_resource_owners` results in the setting being cleared. +~> **NOTE:** Although optional, not including `admins`, `create_database_default_permissions`, `create_table_default_permissions`, `parameters`, and/or `trusted_resource_owners` results in the setting being cleared. ### create_database_default_permissions @@ -135,4 +157,4 @@ The following arguments are optional: This resource exports no additional attributes. - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/lb.html.markdown b/website/docs/cdktf/python/r/lb.html.markdown index d73858df13e..ea7013416d7 100644 --- a/website/docs/cdktf/python/r/lb.html.markdown +++ b/website/docs/cdktf/python/r/lb.html.markdown @@ -151,6 +151,7 @@ This resource supports the following arguments: * `enable_tls_version_and_cipher_suite_headers` - (Optional) Whether the two headers (`x-amzn-tls-version` and `x-amzn-tls-cipher-suite`), which contain information about the negotiated TLS version and cipher suite, are added to the client request before sending it to the target. Only valid for Load Balancers of type `application`. Defaults to `false` * `enable_xff_client_port` - (Optional) Whether the X-Forwarded-For header should preserve the source port that the client used to connect to the load balancer in `application` load balancers. Defaults to `false`. * `enable_waf_fail_open` - (Optional) Whether to allow a WAF-enabled load balancer to route requests to targets if it is unable to forward the request to AWS WAF. Defaults to `false`. +* `enable_zonal_shift` - (Optional) Whether zonal shift is enabled. Defaults to `false`. * `enforce_security_group_inbound_rules_on_private_link_traffic` - (Optional) Whether inbound security group rules are enforced for traffic originating from a PrivateLink. Only valid for Load Balancers of type `network`. The possible values are `on` and `off`. * `idle_timeout` - (Optional) Time in seconds that the connection is allowed to be idle. Only valid for Load Balancers of type `application`. Default: 60. * `internal` - (Optional) If true, the LB will be internal. Defaults to `false`. @@ -229,4 +230,4 @@ Using `terraform import`, import LBs using their ARN. For example: % terraform import aws_lb.bar arn:aws:elasticloadbalancing:us-west-2:123456789012:loadbalancer/app/my-load-balancer/50dc6c495c0c9188 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/lb_listener.html.markdown b/website/docs/cdktf/python/r/lb_listener.html.markdown index c802ddb4380..dbffd4e779e 100644 --- a/website/docs/cdktf/python/r/lb_listener.html.markdown +++ b/website/docs/cdktf/python/r/lb_listener.html.markdown @@ -349,6 +349,7 @@ The following arguments are optional: * `port` - (Optional) Port on which the load balancer is listening. Not valid for Gateway Load Balancers. * `protocol` - (Optional) Protocol for connections from clients to the load balancer. For Application Load Balancers, valid values are `HTTP` and `HTTPS`, with a default of `HTTP`. For Network Load Balancers, valid values are `TCP`, `TLS`, `UDP`, and `TCP_UDP`. Not valid to use `UDP` or `TCP_UDP` if dual-stack mode is enabled. Not valid for Gateway Load Balancers. * `ssl_policy` - (Optional) Name of the SSL Policy for the listener. Required if `protocol` is `HTTPS` or `TLS`. Default is `ELBSecurityPolicy-2016-08`. +* `tcp_idle_timeout_seconds` - (Optional) TCP idle timeout value in seconds. Can only be set if protocol is `TCP` on Network Load Balancer, or with a Gateway Load Balancer. Not supported for Application Load Balancers. Valid values are between `60` and `6000` inclusive. Default: `350`. * `tags` - (Optional) A map of tags to assign to the resource. If configured with a provider [`default_tags` configuration block](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#default_tags-configuration-block) present, tags with matching keys will overwrite those defined at the provider-level. ### default_action @@ -505,4 +506,4 @@ Using `terraform import`, import listeners using their ARN. For example: % terraform import aws_lb_listener.front_end arn:aws:elasticloadbalancing:us-west-2:187416307283:listener/app/front-end-alb/8e4497da625e2d8a/9ab28ade35828f96 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/lb_listener_rule.html.markdown b/website/docs/cdktf/python/r/lb_listener_rule.html.markdown index 4598e711b81..b03a7efc775 100644 --- a/website/docs/cdktf/python/r/lb_listener_rule.html.markdown +++ b/website/docs/cdktf/python/r/lb_listener_rule.html.markdown @@ -224,7 +224,7 @@ Action Blocks (for `action`) support the following: Forward Blocks (for `forward`) support the following: -* `target_group` - (Required) One or more target groups block. +* `target_group` - (Required) One or more target group blocks. * `stickiness` - (Optional) The target group stickiness for the rule. Target Group Blocks (for `target_group`) supports the following: @@ -350,4 +350,4 @@ Using `terraform import`, import rules using their ARN. For example: % terraform import aws_lb_listener_rule.front_end arn:aws:elasticloadbalancing:us-west-2:187416307283:listener-rule/app/test/8e4497da625e2d8a/9ab28ade35828f96/67b3d2d36dd7c26b ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/redshift_data_share_authorization.html.markdown b/website/docs/cdktf/python/r/redshift_data_share_authorization.html.markdown index d00f4664466..d7d048b5595 100644 --- a/website/docs/cdktf/python/r/redshift_data_share_authorization.html.markdown +++ b/website/docs/cdktf/python/r/redshift_data_share_authorization.html.markdown @@ -28,8 +28,8 @@ class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) RedshiftDataShareAuthorization(self, "example", - consumer_identifier="012345678901", - data_share_arn="arn:aws:redshift:us-west-2:012345678901:datashare:3072dae5-022b-4d45-9cd3-01f010aae4b2/example_share" + consumer_identifier="123456789012", + data_share_arn="arn:aws:redshift:us-west-2:123456789012:datashare:3072dae5-022b-4d45-9cd3-01f010aae4b2/example_share" ) ``` @@ -68,13 +68,13 @@ from imports.aws.redshift_data_share_authorization import RedshiftDataShareAutho class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) - RedshiftDataShareAuthorization.generate_config_for_import(self, "example", "arn:aws:redshift:us-west-2:012345678901:datashare:3072dae5-022b-4d45-9cd3-01f010aae4b2/example_share,012345678901") + RedshiftDataShareAuthorization.generate_config_for_import(self, "example", "arn:aws:redshift:us-west-2:123456789012:datashare:3072dae5-022b-4d45-9cd3-01f010aae4b2/example_share,123456789012") ``` Using `terraform import`, import Redshift Data Share Authorization using the `id`. For example: ```console -% terraform import aws_redshift_data_share_authorization.example arn:aws:redshift:us-west-2:012345678901:datashare:3072dae5-022b-4d45-9cd3-01f010aae4b2/example_share,012345678901 +% terraform import aws_redshift_data_share_authorization.example arn:aws:redshift:us-west-2:123456789012:datashare:3072dae5-022b-4d45-9cd3-01f010aae4b2/example_share,123456789012 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/redshift_data_share_consumer_association.html.markdown b/website/docs/cdktf/python/r/redshift_data_share_consumer_association.html.markdown index ba245f06776..37638683a10 100644 --- a/website/docs/cdktf/python/r/redshift_data_share_consumer_association.html.markdown +++ b/website/docs/cdktf/python/r/redshift_data_share_consumer_association.html.markdown @@ -29,7 +29,7 @@ class MyConvertedCode(TerraformStack): super().__init__(scope, name) RedshiftDataShareConsumerAssociation(self, "example", associate_entire_account=True, - data_share_arn="arn:aws:redshift:us-west-2:012345678901:datashare:b3bfde75-73fd-408b-9086-d6fccfd6d588/example" + data_share_arn="arn:aws:redshift:us-west-2:123456789012:datashare:b3bfde75-73fd-408b-9086-d6fccfd6d588/example" ) ``` @@ -49,7 +49,7 @@ class MyConvertedCode(TerraformStack): super().__init__(scope, name) RedshiftDataShareConsumerAssociation(self, "example", consumer_region="us-west-2", - data_share_arn="arn:aws:redshift:us-west-2:012345678901:datashare:b3bfde75-73fd-408b-9086-d6fccfd6d588/example" + data_share_arn="arn:aws:redshift:us-west-2:123456789012:datashare:b3bfde75-73fd-408b-9086-d6fccfd6d588/example" ) ``` @@ -90,13 +90,13 @@ from imports.aws.redshift_data_share_consumer_association import RedshiftDataSha class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) - RedshiftDataShareConsumerAssociation.generate_config_for_import(self, "example", "arn:aws:redshift:us-west-2:012345678901:datashare:b3bfde75-73fd-408b-9086-d6fccfd6d588/example,,,us-west-2") + RedshiftDataShareConsumerAssociation.generate_config_for_import(self, "example", "arn:aws:redshift:us-west-2:123456789012:datashare:b3bfde75-73fd-408b-9086-d6fccfd6d588/example,,,us-west-2") ``` Using `terraform import`, import Redshift Data Share Consumer Association using the `id`. For example: ```console -% terraform import aws_redshift_data_share_consumer_association.example arn:aws:redshift:us-west-2:012345678901:datashare:b3bfde75-73fd-408b-9086-d6fccfd6d588/example,,,us-west-2 +% terraform import aws_redshift_data_share_consumer_association.example arn:aws:redshift:us-west-2:123456789012:datashare:b3bfde75-73fd-408b-9086-d6fccfd6d588/example,,,us-west-2 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/route53profiles_association.html.markdown b/website/docs/cdktf/python/r/route53profiles_association.html.markdown index 2104aab9fc2..9b4f78b7877 100644 --- a/website/docs/cdktf/python/r/route53profiles_association.html.markdown +++ b/website/docs/cdktf/python/r/route53profiles_association.html.markdown @@ -51,10 +51,8 @@ class MyConvertedCode(TerraformStack): The following arguments are required: -* `name` - (Required) Name of the Profile Association. - +* `name` - (Required) Name of the Profile Association. Must match a regex of `(?!^[0-9]+$)([a-zA-Z0-9\\-_' ']+)`. * `profile_id` - (Required) ID of the profile associated with the VPC. - * `resource_id` - (Required) Resource ID of the VPC the profile to be associated with. ## Attribute Reference @@ -62,8 +60,7 @@ The following arguments are required: This resource exports the following attributes in addition to the arguments above: * `id` - ID of the Profile Association. -* `name` - Name of the Profile Association. -* `status` - Status of the Profile Association. Valid values [AWS docs](https://docs.aws.amazon.com/Route53/latest/APIReference/API_route53profiles_Profile.html) +* `status` - Status of the Profile Association. See the [AWS docs](https://docs.aws.amazon.com/Route53/latest/APIReference/API_route53profiles_Profile.html) for valid values. * `status_message` - Status message of the Profile Association. ## Timeouts @@ -71,6 +68,7 @@ This resource exports the following attributes in addition to the arguments abov [Configuration options](https://developer.hashicorp.com/terraform/language/resources/syntax#operation-timeouts): * `create` - (Default `30m`) +* `update` - (Default `5m`) * `delete` - (Default `30m`) ## Import @@ -98,4 +96,4 @@ Using `terraform import`, import Route 53 Profiles Association using the `exampl % terraform import aws_route53profiles_association.example rpa-id-12345678 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/sagemaker_hub.html.markdown b/website/docs/cdktf/python/r/sagemaker_hub.html.markdown new file mode 100644 index 00000000000..47cb8c5a7ef --- /dev/null +++ b/website/docs/cdktf/python/r/sagemaker_hub.html.markdown @@ -0,0 +1,85 @@ +--- +subcategory: "SageMaker" +layout: "aws" +page_title: "AWS: aws_sagemaker_hub" +description: |- + Provides a SageMaker Hub resource. +--- + + + +# Resource: aws_sagemaker_hub + +Provides a SageMaker Hub resource. + +## Example Usage + +### Basic usage + +```python +# DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug +from constructs import Construct +from cdktf import TerraformStack +# +# Provider bindings are generated by running `cdktf get`. +# See https://cdk.tf/provider-generation for more details. +# +from imports.aws.sagemaker_hub import SagemakerHub +class MyConvertedCode(TerraformStack): + def __init__(self, scope, name): + super().__init__(scope, name) + SagemakerHub(self, "example", + hub_description="example", + hub_name="example" + ) +``` + +## Argument Reference + +This resource supports the following arguments: + +* `hub_name` - (Required) The name of the hub. +* `hub_description` - (Required) A description of the hub. +* `hub_display_name` - (Optional) The display name of the hub. +* `hub_search_keywords` - (Optional) The searchable keywords for the hub. +* `s3_storage_config` - (Optional) The Amazon S3 storage configuration for the hub. See [S3 Storage Config](#s3-storage-config) details below. +* `tags` - (Optional) A map of tags to assign to the resource. If configured with a provider [`default_tags` configuration block](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#default_tags-configuration-block) present, tags with matching keys will overwrite those defined at the provider-level. + +### S3 Storage Config + +* `s3_output_path` - (Optional) The Amazon S3 bucket prefix for hosting hub content.interface. + +## Attribute Reference + +This resource exports the following attributes in addition to the arguments above: + +* `id` - The name of the Hub. +* `arn` - The Amazon Resource Name (ARN) assigned by AWS to this Hub. +* `tags_all` - A map of tags assigned to the resource, including those inherited from the provider [`default_tags` configuration block](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#default_tags-configuration-block). + +## Import + +In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to import SageMaker Hubs using the `name`. For example: + +```python +# DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug +from constructs import Construct +from cdktf import TerraformStack +# +# Provider bindings are generated by running `cdktf get`. +# See https://cdk.tf/provider-generation for more details. +# +from imports.aws.sagemaker_hub import SagemakerHub +class MyConvertedCode(TerraformStack): + def __init__(self, scope, name): + super().__init__(scope, name) + SagemakerHub.generate_config_for_import(self, "testHub", "my-code-repo") +``` + +Using `terraform import`, import SageMaker Hubs using the `name`. For example: + +```console +% terraform import aws_sagemaker_hub.test_hub my-code-repo +``` + + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/schemas_registry_policy.html.markdown b/website/docs/cdktf/python/r/schemas_registry_policy.html.markdown index 14c91cbf62d..5c454aac87f 100644 --- a/website/docs/cdktf/python/r/schemas_registry_policy.html.markdown +++ b/website/docs/cdktf/python/r/schemas_registry_policy.html.markdown @@ -38,7 +38,7 @@ class MyConvertedCode(TerraformStack): type="AWS" ) ], - resources=["arn:aws:schemas:us-east-1:012345678901:registry/example", "arn:aws:schemas:us-east-1:012345678901:schema/example*" + resources=["arn:aws:schemas:us-east-1:123456789012:registry/example", "arn:aws:schemas:us-east-1:123456789012:schema/example*" ], sid="example" ) @@ -96,4 +96,4 @@ Using `terraform import`, import EventBridge Schema Registry Policy using the `r % terraform import aws_schemas_registry_policy.example example ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/servicequotas_template_association.html.markdown b/website/docs/cdktf/python/r/servicequotas_template_association.html.markdown index 2c9e2342976..2e694773e28 100644 --- a/website/docs/cdktf/python/r/servicequotas_template_association.html.markdown +++ b/website/docs/cdktf/python/r/servicequotas_template_association.html.markdown @@ -61,13 +61,13 @@ from imports.aws.servicequotas_template_association import ServicequotasTemplate class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) - ServicequotasTemplateAssociation.generate_config_for_import(self, "example", "012345678901") + ServicequotasTemplateAssociation.generate_config_for_import(self, "example", "123456789012") ``` Using `terraform import`, import Service Quotas Template Association using the `id`. For example: ```console -% terraform import aws_servicequotas_template_association.example 012345678901 +% terraform import aws_servicequotas_template_association.example 123456789012 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/shield_subscription.html.markdown b/website/docs/cdktf/python/r/shield_subscription.html.markdown index 1000a9e24c7..670ec487845 100644 --- a/website/docs/cdktf/python/r/shield_subscription.html.markdown +++ b/website/docs/cdktf/python/r/shield_subscription.html.markdown @@ -66,13 +66,13 @@ from imports.aws.shield_subscription import ShieldSubscription class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) - ShieldSubscription.generate_config_for_import(self, "example", "012345678901") + ShieldSubscription.generate_config_for_import(self, "example", "123456789012") ``` Using `terraform import`, import Shield Subscription using the `id`. For example: ```console -% terraform import aws_shield_subscription.example 012345678901 +% terraform import aws_shield_subscription.example 123456789012 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/sns_platform_application.html.markdown b/website/docs/cdktf/python/r/sns_platform_application.html.markdown index df035a2a527..feea6c43aed 100644 --- a/website/docs/cdktf/python/r/sns_platform_application.html.markdown +++ b/website/docs/cdktf/python/r/sns_platform_application.html.markdown @@ -128,13 +128,13 @@ from imports.aws.sns_platform_application import SnsPlatformApplication class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) - SnsPlatformApplication.generate_config_for_import(self, "gcmApplication", "arn:aws:sns:us-west-2:0123456789012:app/GCM/gcm_application") + SnsPlatformApplication.generate_config_for_import(self, "gcmApplication", "arn:aws:sns:us-west-2:123456789012:app/GCM/gcm_application") ``` Using `terraform import`, import SNS platform applications using the ARN. For example: ```console -% terraform import aws_sns_platform_application.gcm_application arn:aws:sns:us-west-2:0123456789012:app/GCM/gcm_application +% terraform import aws_sns_platform_application.gcm_application arn:aws:sns:us-west-2:123456789012:app/GCM/gcm_application ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/sns_topic.html.markdown b/website/docs/cdktf/python/r/sns_topic.html.markdown index 88880bccc7f..e6f872a8f4d 100644 --- a/website/docs/cdktf/python/r/sns_topic.html.markdown +++ b/website/docs/cdktf/python/r/sns_topic.html.markdown @@ -154,13 +154,13 @@ from imports.aws.sns_topic import SnsTopic class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) - SnsTopic.generate_config_for_import(self, "userUpdates", "arn:aws:sns:us-west-2:0123456789012:my-topic") + SnsTopic.generate_config_for_import(self, "userUpdates", "arn:aws:sns:us-west-2:123456789012:my-topic") ``` Using `terraform import`, import SNS Topics using the topic `arn`. For example: ```console -% terraform import aws_sns_topic.user_updates arn:aws:sns:us-west-2:0123456789012:my-topic +% terraform import aws_sns_topic.user_updates arn:aws:sns:us-west-2:123456789012:my-topic ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/sns_topic_data_protection_policy.html.markdown b/website/docs/cdktf/python/r/sns_topic_data_protection_policy.html.markdown index 99cd96cc349..68f7963c524 100644 --- a/website/docs/cdktf/python/r/sns_topic_data_protection_policy.html.markdown +++ b/website/docs/cdktf/python/r/sns_topic_data_protection_policy.html.markdown @@ -82,13 +82,13 @@ from imports.aws.sns_topic_data_protection_policy import SnsTopicDataProtectionP class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) - SnsTopicDataProtectionPolicy.generate_config_for_import(self, "example", "arn:aws:sns:us-west-2:0123456789012:example") + SnsTopicDataProtectionPolicy.generate_config_for_import(self, "example", "arn:aws:sns:us-west-2:123456789012:example") ``` Using `terraform import`, import SNS Data Protection Topic Policy using the topic ARN. For example: ```console -% terraform import aws_sns_topic_data_protection_policy.example arn:aws:sns:us-west-2:0123456789012:example +% terraform import aws_sns_topic_data_protection_policy.example arn:aws:sns:us-west-2:123456789012:example ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/sns_topic_policy.html.markdown b/website/docs/cdktf/python/r/sns_topic_policy.html.markdown index 7c095224386..953cd34ff9c 100644 --- a/website/docs/cdktf/python/r/sns_topic_policy.html.markdown +++ b/website/docs/cdktf/python/r/sns_topic_policy.html.markdown @@ -90,13 +90,13 @@ from imports.aws.sns_topic_policy import SnsTopicPolicy class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) - SnsTopicPolicy.generate_config_for_import(self, "userUpdates", "arn:aws:sns:us-west-2:0123456789012:my-topic") + SnsTopicPolicy.generate_config_for_import(self, "userUpdates", "arn:aws:sns:us-west-2:123456789012:my-topic") ``` Using `terraform import`, import SNS Topic Policy using the topic ARN. For example: ```console -% terraform import aws_sns_topic_policy.user_updates arn:aws:sns:us-west-2:0123456789012:my-topic +% terraform import aws_sns_topic_policy.user_updates arn:aws:sns:us-west-2:123456789012:my-topic ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/sns_topic_subscription.html.markdown b/website/docs/cdktf/python/r/sns_topic_subscription.html.markdown index 5f32a414e93..d5388aa292a 100644 --- a/website/docs/cdktf/python/r/sns_topic_subscription.html.markdown +++ b/website/docs/cdktf/python/r/sns_topic_subscription.html.markdown @@ -321,13 +321,13 @@ from imports.aws.sns_topic_subscription import SnsTopicSubscription class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) - SnsTopicSubscription.generate_config_for_import(self, "userUpdatesSqsTarget", "arn:aws:sns:us-west-2:0123456789012:my-topic:8a21d249-4329-4871-acc6-7be709c6ea7f") + SnsTopicSubscription.generate_config_for_import(self, "userUpdatesSqsTarget", "arn:aws:sns:us-west-2:123456789012:my-topic:8a21d249-4329-4871-acc6-7be709c6ea7f") ``` Using `terraform import`, import SNS Topic Subscriptions using the subscription `arn`. For example: ```console -% terraform import aws_sns_topic_subscription.user_updates_sqs_target arn:aws:sns:us-west-2:0123456789012:my-topic:8a21d249-4329-4871-acc6-7be709c6ea7f +% terraform import aws_sns_topic_subscription.user_updates_sqs_target arn:aws:sns:us-west-2:123456789012:my-topic:8a21d249-4329-4871-acc6-7be709c6ea7f ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/sqs_queue_policy.html.markdown b/website/docs/cdktf/python/r/sqs_queue_policy.html.markdown index 12f6a8c2de5..cdce26552b6 100644 --- a/website/docs/cdktf/python/r/sqs_queue_policy.html.markdown +++ b/website/docs/cdktf/python/r/sqs_queue_policy.html.markdown @@ -87,13 +87,13 @@ from imports.aws.sqs_queue_policy import SqsQueuePolicy class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) - SqsQueuePolicy.generate_config_for_import(self, "test", "https://queue.amazonaws.com/0123456789012/myqueue") + SqsQueuePolicy.generate_config_for_import(self, "test", "https://queue.amazonaws.com/123456789012/myqueue") ``` Using `terraform import`, import SQS Queue Policies using the queue URL. For example: ```console -% terraform import aws_sqs_queue_policy.test https://queue.amazonaws.com/0123456789012/myqueue +% terraform import aws_sqs_queue_policy.test https://queue.amazonaws.com/123456789012/myqueue ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/sqs_queue_redrive_allow_policy.html.markdown b/website/docs/cdktf/python/r/sqs_queue_redrive_allow_policy.html.markdown index b533fa39f6a..4f349de0b79 100644 --- a/website/docs/cdktf/python/r/sqs_queue_redrive_allow_policy.html.markdown +++ b/website/docs/cdktf/python/r/sqs_queue_redrive_allow_policy.html.markdown @@ -77,13 +77,13 @@ from imports.aws.sqs_queue_redrive_allow_policy import SqsQueueRedriveAllowPolic class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) - SqsQueueRedriveAllowPolicy.generate_config_for_import(self, "test", "https://queue.amazonaws.com/0123456789012/myqueue") + SqsQueueRedriveAllowPolicy.generate_config_for_import(self, "test", "https://queue.amazonaws.com/123456789012/myqueue") ``` Using `terraform import`, import SQS Queue Redrive Allow Policies using the queue URL. For example: ```console -% terraform import aws_sqs_queue_redrive_allow_policy.test https://queue.amazonaws.com/0123456789012/myqueue +% terraform import aws_sqs_queue_redrive_allow_policy.test https://queue.amazonaws.com/123456789012/myqueue ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/sqs_queue_redrive_policy.html.markdown b/website/docs/cdktf/python/r/sqs_queue_redrive_policy.html.markdown index b6c7b6fffd8..d1360fa5d0b 100644 --- a/website/docs/cdktf/python/r/sqs_queue_redrive_policy.html.markdown +++ b/website/docs/cdktf/python/r/sqs_queue_redrive_policy.html.markdown @@ -82,13 +82,13 @@ from imports.aws.sqs_queue_redrive_policy import SqsQueueRedrivePolicy class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) - SqsQueueRedrivePolicy.generate_config_for_import(self, "test", "https://queue.amazonaws.com/0123456789012/myqueue") + SqsQueueRedrivePolicy.generate_config_for_import(self, "test", "https://queue.amazonaws.com/123456789012/myqueue") ``` Using `terraform import`, import SQS Queue Redrive Policies using the queue URL. For example: ```console -% terraform import aws_sqs_queue_redrive_policy.test https://queue.amazonaws.com/0123456789012/myqueue +% terraform import aws_sqs_queue_redrive_policy.test https://queue.amazonaws.com/123456789012/myqueue ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/ssoadmin_application.html.markdown b/website/docs/cdktf/python/r/ssoadmin_application.html.markdown index 1a40b84bccd..aeca43b1434 100644 --- a/website/docs/cdktf/python/r/ssoadmin_application.html.markdown +++ b/website/docs/cdktf/python/r/ssoadmin_application.html.markdown @@ -132,13 +132,13 @@ from imports.aws.ssoadmin_application import SsoadminApplication class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) - SsoadminApplication.generate_config_for_import(self, "example", "arn:aws:sso::012345678901:application/id-12345678") + SsoadminApplication.generate_config_for_import(self, "example", "arn:aws:sso::123456789012:application/id-12345678") ``` Using `terraform import`, import SSO Admin Application using the `id`. For example: ```console -% terraform import aws_ssoadmin_application.example arn:aws:sso::012345678901:application/id-12345678 +% terraform import aws_ssoadmin_application.example arn:aws:sso::123456789012:application/id-12345678 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/ssoadmin_application_access_scope.html.markdown b/website/docs/cdktf/python/r/ssoadmin_application_access_scope.html.markdown index f1fcb4cfe3f..c7b36e531e3 100644 --- a/website/docs/cdktf/python/r/ssoadmin_application_access_scope.html.markdown +++ b/website/docs/cdktf/python/r/ssoadmin_application_access_scope.html.markdown @@ -41,7 +41,7 @@ class MyConvertedCode(TerraformStack): aws_ssoadmin_application_access_scope_example = SsoadminApplicationAccessScope(self, "example_2", application_arn=Token.as_string(aws_ssoadmin_application_example.application_arn), - authorized_targets=["arn:aws:sso::012345678901:application/ssoins-012345678901/apl-012345678901" + authorized_targets=["arn:aws:sso::123456789012:application/ssoins-123456789012/apl-123456789012" ], scope="sso:account:access" ) @@ -82,13 +82,13 @@ from imports.aws.ssoadmin_application_access_scope import SsoadminApplicationAcc class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) - SsoadminApplicationAccessScope.generate_config_for_import(self, "example", "arn:aws:sso::012345678901:application/ssoins-012345678901/apl-012345678901,sso:account:access") + SsoadminApplicationAccessScope.generate_config_for_import(self, "example", "arn:aws:sso::123456789012:application/ssoins-123456789012/apl-123456789012,sso:account:access") ``` Using `terraform import`, import SSO Admin Application Access Scope using the `id`. For example: ```console -% terraform import aws_ssoadmin_application_access_scope.example arn:aws:sso::012345678901:application/ssoins-012345678901/apl-012345678901,sso:account:access +% terraform import aws_ssoadmin_application_access_scope.example arn:aws:sso::123456789012:application/ssoins-123456789012/apl-123456789012,sso:account:access ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/ssoadmin_application_assignment.html.markdown b/website/docs/cdktf/python/r/ssoadmin_application_assignment.html.markdown index df2eec2a424..528ee1479ec 100644 --- a/website/docs/cdktf/python/r/ssoadmin_application_assignment.html.markdown +++ b/website/docs/cdktf/python/r/ssoadmin_application_assignment.html.markdown @@ -85,13 +85,13 @@ from imports.aws.ssoadmin_application_assignment import SsoadminApplicationAssig class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) - SsoadminApplicationAssignment.generate_config_for_import(self, "example", "arn:aws:sso::012345678901:application/id-12345678,abcd1234,USER") + SsoadminApplicationAssignment.generate_config_for_import(self, "example", "arn:aws:sso::123456789012:application/id-12345678,abcd1234,USER") ``` Using `terraform import`, import SSO Admin Application Assignment using the `id`. For example: ```console -% terraform import aws_ssoadmin_application_assignment.example arn:aws:sso::012345678901:application/id-12345678,abcd1234,USER +% terraform import aws_ssoadmin_application_assignment.example arn:aws:sso::123456789012:application/id-12345678,abcd1234,USER ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/ssoadmin_application_assignment_configuration.html.markdown b/website/docs/cdktf/python/r/ssoadmin_application_assignment_configuration.html.markdown index 64ab42c9323..eeb35f51d8f 100644 --- a/website/docs/cdktf/python/r/ssoadmin_application_assignment_configuration.html.markdown +++ b/website/docs/cdktf/python/r/ssoadmin_application_assignment_configuration.html.markdown @@ -67,13 +67,13 @@ from imports.aws.ssoadmin_application_assignment_configuration import SsoadminAp class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) - SsoadminApplicationAssignmentConfiguration.generate_config_for_import(self, "example", "arn:aws:sso::012345678901:application/id-12345678") + SsoadminApplicationAssignmentConfiguration.generate_config_for_import(self, "example", "arn:aws:sso::123456789012:application/id-12345678") ``` Using `terraform import`, import SSO Admin Application Assignment Configuration using the `id`. For example: ```console -% terraform import aws_ssoadmin_application_assignment_configuration.example arn:aws:sso::012345678901:application/id-12345678 +% terraform import aws_ssoadmin_application_assignment_configuration.example arn:aws:sso::123456789012:application/id-12345678 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/ssoadmin_trusted_token_issuer.html.markdown b/website/docs/cdktf/python/r/ssoadmin_trusted_token_issuer.html.markdown index 619fc7adb71..2dfd66e46e6 100644 --- a/website/docs/cdktf/python/r/ssoadmin_trusted_token_issuer.html.markdown +++ b/website/docs/cdktf/python/r/ssoadmin_trusted_token_issuer.html.markdown @@ -98,13 +98,13 @@ from imports.aws.ssoadmin_trusted_token_issuer import SsoadminTrustedTokenIssuer class MyConvertedCode(TerraformStack): def __init__(self, scope, name): super().__init__(scope, name) - SsoadminTrustedTokenIssuer.generate_config_for_import(self, "example", "arn:aws:sso::012345678901:trustedTokenIssuer/ssoins-lu1ye3gew4mbc7ju/tti-2657c556-9707-11ee-b9d1-0242ac120002") + SsoadminTrustedTokenIssuer.generate_config_for_import(self, "example", "arn:aws:sso::123456789012:trustedTokenIssuer/ssoins-lu1ye3gew4mbc7ju/tti-2657c556-9707-11ee-b9d1-0242ac120002") ``` Using `terraform import`, import SSO Admin Trusted Token Issuer using the `id`. For example: ```console -% terraform import aws_ssoadmin_trusted_token_issuer.example arn:aws:sso::012345678901:trustedTokenIssuer/ssoins-lu1ye3gew4mbc7ju/tti-2657c556-9707-11ee-b9d1-0242ac120002 +% terraform import aws_ssoadmin_trusted_token_issuer.example arn:aws:sso::123456789012:trustedTokenIssuer/ssoins-lu1ye3gew4mbc7ju/tti-2657c556-9707-11ee-b9d1-0242ac120002 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/python/r/transfer_server.html.markdown b/website/docs/cdktf/python/r/transfer_server.html.markdown index 6fdc7eb606a..ff31d432cad 100644 --- a/website/docs/cdktf/python/r/transfer_server.html.markdown +++ b/website/docs/cdktf/python/r/transfer_server.html.markdown @@ -237,6 +237,7 @@ This resource supports the following arguments: * `TransferSecurityPolicy-PQ-SSH-FIPS-Experimental-2023-04` * `TransferSecurityPolicy-Restricted-2018-11` * `TransferSecurityPolicy-Restricted-2020-06` + * `TransferSecurityPolicy-Restricted-2024-06` See [Security policies for AWS Transfer Family servers](https://docs.aws.amazon.com/transfer/latest/userguide/security-policies.html) for details. * `structured_log_destinations` - (Optional) A set of ARNs of destinations that will receive structured logs from the transfer server such as CloudWatch Log Group ARNs. If provided this enables the transfer server to emit structured logs to the specified locations. @@ -328,4 +329,4 @@ Using `terraform import`, import Transfer Servers using the server `id`. For exa Certain resource arguments, such as `host_key`, cannot be read via the API and imported into Terraform. Terraform will display a difference for these arguments the first run after import if declared in the Terraform configuration for an imported resource. - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/d/connect_instance_storage_config.html.markdown b/website/docs/cdktf/typescript/d/connect_instance_storage_config.html.markdown index 789d7f4f15a..955461b96e2 100644 --- a/website/docs/cdktf/typescript/d/connect_instance_storage_config.html.markdown +++ b/website/docs/cdktf/typescript/d/connect_instance_storage_config.html.markdown @@ -28,7 +28,7 @@ class MyConvertedCode extends TerraformStack { super(scope, name); new DataAwsConnectInstanceStorageConfig(this, "example", { associationId: - "1234567890123456789012345678901234567890123456789012345678901234", + "1234567891234567890122345678912345678901223456789123456789012234", instanceId: "aaaaaaaa-bbbb-cccc-dddd-111111111111", resourceType: "CONTACT_TRACE_RECORDS", }); @@ -97,4 +97,4 @@ The `encryptionConfig` configuration block supports the following arguments: * `encryptionType` - The type of encryption. Valid Values: `KMS`. * `keyId` - The full ARN of the encryption key. Be sure to provide the full ARN of the encryption key, not just the ID. - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/d/ebs_volume.html.markdown b/website/docs/cdktf/typescript/d/ebs_volume.html.markdown index 70aa907a3db..9a57ce5b711 100644 --- a/website/docs/cdktf/typescript/d/ebs_volume.html.markdown +++ b/website/docs/cdktf/typescript/d/ebs_volume.html.markdown @@ -61,7 +61,7 @@ This data source exports the following attributes in addition to the arguments a * `id` - Volume ID (e.g., vol-59fcb34e). * `volumeId` - Volume ID (e.g., vol-59fcb34e). -* `arn` - Volume ARN (e.g., arn:aws:ec2:us-east-1:0123456789012:volume/vol-59fcb34e). +* `arn` - Volume ARN (e.g., arn:aws:ec2:us-east-1:123456789012:volume/vol-59fcb34e). * `availabilityZone` - AZ where the EBS volume exists. * `encrypted` - Whether the disk is encrypted. * `iops` - Amount of IOPS for the disk. @@ -82,4 +82,4 @@ This data source exports the following attributes in addition to the arguments a [1]: http://docs.aws.amazon.com/cli/latest/reference/ec2/describe-volumes.html - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/d/elasticache_reserved_cache_node_offering.html.markdown b/website/docs/cdktf/typescript/d/elasticache_reserved_cache_node_offering.html.markdown index 5ab5570dd91..8cfd2620277 100644 --- a/website/docs/cdktf/typescript/d/elasticache_reserved_cache_node_offering.html.markdown +++ b/website/docs/cdktf/typescript/d/elasticache_reserved_cache_node_offering.html.markdown @@ -51,7 +51,7 @@ The following arguments are supported: For other current generation nodes (i.e. T2, M3, M4, R3, or R4) the only valid value is `Heavy Utilization`. For previous generation modes (i.e. T1, M1, M2, or C1) valid values are `Heavy Utilization`, `Medium Utilization`, and `Light Utilization`. * `productDescription` - (Required) Engine type for the reserved cache node. - Valid values are `redis` and `memcached`. + Valid values are `redis`, `valkey` and `memcached`. ## Attribute Reference @@ -61,4 +61,4 @@ In addition to all arguments above, the following attributes are exported: * `fixedPrice` - Fixed price charged for this reserved cache node. * `offeringId` - Unique identifier for the reservation. - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/d/elasticache_serverless_cache.html.markdown b/website/docs/cdktf/typescript/d/elasticache_serverless_cache.html.markdown index 38e54f22041..67b13574bdb 100644 --- a/website/docs/cdktf/typescript/d/elasticache_serverless_cache.html.markdown +++ b/website/docs/cdktf/typescript/d/elasticache_serverless_cache.html.markdown @@ -47,7 +47,7 @@ This data source exports the following attributes in addition to the arguments a * `arn` - The Amazon Resource Name (ARN) of the serverless cache. * `cacheUsageLimits` - The cache usage limits for storage and ElastiCache Processing Units for the cache. See [`cacheUsageLimits` Block](#cache_usage_limits-block) for details. * `createTime` - Timestamp of when the serverless cache was created. -* `dailySnapshotTime` - The daily time that snapshots will be created from the new serverless cache. Only available for engine type `"redis"`. +* `dailySnapshotTime` - The daily time that snapshots will be created from the new serverless cache. Only available for engine types `"redis"` and `"valkey"`. * `description` - Description of the serverless cache. * `endpoint` - Represents the information required for client programs to connect to the cache. See [`endpoint` Block](#endpoint-block) for details. * `engine` – Name of the cache engine. @@ -97,4 +97,4 @@ The `readerEndpoint` block exports the following attributes: * `address` - The DNS hostname of the cache node. * `port` - The port number that the cache engine is listening on. Set as integer. - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/d/lakeformation_data_lake_settings.html.markdown b/website/docs/cdktf/typescript/d/lakeformation_data_lake_settings.html.markdown index 769aa0350ec..76fe890a0ec 100644 --- a/website/docs/cdktf/typescript/d/lakeformation_data_lake_settings.html.markdown +++ b/website/docs/cdktf/typescript/d/lakeformation_data_lake_settings.html.markdown @@ -45,14 +45,15 @@ The following arguments are optional: This data source exports the following attributes in addition to the arguments above: * `admins` – List of ARNs of AWS Lake Formation principals (IAM users or roles). -* `readOnlyAdmins` – List of ARNs of AWS Lake Formation principals (IAM users or roles) with only view access to the resources. +* `allowExternalDataFiltering` - Whether to allow Amazon EMR clusters to access data managed by Lake Formation. +* `allowFullTableExternalDataAccess` - Whether to allow a third-party query engine to get data access credentials without session tags when a caller has full data access permissions. +* `authorizedSessionTagValueList` - Lake Formation relies on a privileged process secured by Amazon EMR or the third party integrator to tag the user's role while assuming it. * `createDatabaseDefaultPermissions` - Up to three configuration blocks of principal permissions for default create database permissions. Detailed below. * `createTableDefaultPermissions` - Up to three configuration blocks of principal permissions for default create table permissions. Detailed below. -* `trustedResourceOwners` – List of the resource-owning account IDs that the caller's account can use to share their user access details (user ARNs). -* `allowExternalDataFiltering` - Whether to allow Amazon EMR clusters to access data managed by Lake Formation. * `externalDataFilteringAllowList` - A list of the account IDs of Amazon Web Services accounts with Amazon EMR clusters that are to perform data filtering. -* `authorizedSessionTagValueList` - Lake Formation relies on a privileged process secured by Amazon EMR or the third party integrator to tag the user's role while assuming it. -* `allowFullTableExternalDataAccess` - Whether to allow a third-party query engine to get data access credentials without session tags when a caller has full data access permissions. +* `parameters` - Key-value map of additional configuration. `CROSS_ACCOUNT_VERSION` will be set to values `"1"`, `"2"`, `"3"`, or `"4"`. `SET_CONTEXT` will also be returned with a value of `TRUE`. In a fresh account, prior to configuring, `CROSS_ACCOUNT_VERSION` is `"1"`. +* `readOnlyAdmins` – List of ARNs of AWS Lake Formation principals (IAM users or roles) with only view access to the resources. +* `trustedResourceOwners` – List of the resource-owning account IDs that the caller's account can use to share their user access details (user ARNs). ### create_database_default_permissions @@ -64,4 +65,4 @@ This data source exports the following attributes in addition to the arguments a * `permissions` - List of permissions granted to the principal. * `principal` - Principal who is granted permissions. - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/d/lb_listener_rule.html.markdown b/website/docs/cdktf/typescript/d/lb_listener_rule.html.markdown new file mode 100644 index 00000000000..7d05d4d7e5d --- /dev/null +++ b/website/docs/cdktf/typescript/d/lb_listener_rule.html.markdown @@ -0,0 +1,194 @@ +--- +subcategory: "ELB (Elastic Load Balancing)" +layout: "aws" +page_title: "AWS: aws_lb_listener_rule" +description: |- + Terraform data source for managing an AWS ELB (Elastic Load Balancing) Listener Rule. +--- + + + +# Data Source: aws_lb_listener_rule + +Provides information about an AWS Elastic Load Balancing Listener Rule. + +## Example Usage + +### Match by Rule ARN + +```typescript +// DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug +import { Construct } from "constructs"; +import { VariableType, TerraformVariable, TerraformStack } from "cdktf"; +/* + * Provider bindings are generated by running `cdktf get`. + * See https://cdk.tf/provider-generation for more details. + */ +import { DataAwsLbListenerRule } from "./.gen/providers/aws/"; +class MyConvertedCode extends TerraformStack { + constructor(scope: Construct, name: string) { + super(scope, name); + /*Terraform Variables are not always the best fit for getting inputs in the context of Terraform CDK. + You can read more about this at https://cdk.tf/variables*/ + const lbRuleArn = new TerraformVariable(this, "lb_rule_arn", { + type: VariableType.STRING, + }); + new DataAwsLbListenerRule(this, "example", { + arn: lbRuleArn.value, + }); + } +} + +``` + +### Match by Listener ARN and Priority + +```typescript +// DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug +import { Construct } from "constructs"; +import { VariableType, TerraformVariable, TerraformStack } from "cdktf"; +/* + * Provider bindings are generated by running `cdktf get`. + * See https://cdk.tf/provider-generation for more details. + */ +import { DataAwsLbListenerRule } from "./.gen/providers/aws/"; +class MyConvertedCode extends TerraformStack { + constructor(scope: Construct, name: string) { + super(scope, name); + /*Terraform Variables are not always the best fit for getting inputs in the context of Terraform CDK. + You can read more about this at https://cdk.tf/variables*/ + const lbListenerArn = new TerraformVariable(this, "lb_listener_arn", { + type: VariableType.STRING, + }); + const lbRulePriority = new TerraformVariable(this, "lb_rule_priority", { + type: VariableType.NUMBER, + }); + new DataAwsLbListenerRule(this, "example", { + listener_arn: lbListenerArn.value, + priority: lbRulePriority.value, + }); + } +} + +``` + +## Argument Reference + +This data source supports the following arguments: + +* `arn` - (Optional) ARN of the Listener Rule. + Either `arn` or `listenerArn` must be set. +* `listenerArn` - (Optional) ARN of the associated Listener. + Either `arn` or `listenerArn` must be set. +* `priority` - (Optional) Priority of the Listener Rule within the Listener. + Must be set if `listenerArn` is set, otherwise must not be set. + +## Attribute Reference + +This data source exports the following attributes in addition to the arguments above: + +* `action` - List of actions associated with the rule, sorted by `order`. + [Detailed below](#action). +* `condition` - Set of conditions associated with the rule. + [Detailed below](#condition). +* `tags` - Tags assigned to the Listener Rule. + +### `action` + +* `type` - The type of the action, indicates which sub-block will be populated. +* `order` - The evaluation order of the action. +* `authenticateCognito` - An action to authenticate using Amazon Cognito. + [Detailed below](#authenticate_cognito). +* `authenticateOidc` - An action to authenticate using OIDC. + [Detailed below](#authenticate_oidc). +* `fixedResponse` - An action to return a fixed response. + [Detailed below](#fixed_response). +* `forward` - An action to forward the request. + [Detailed below](#forward). +* `redirect` - An action to redirect the request. + [Detailed below](#redirect). + +#### `authenticateCognito` + +* `authenticationRequestExtraParams` - Set of additional parameters for the request. + [Detailed below](#authentication_request_extra_params). +* `onUnauthenticatedRequest` - Behavior when the client is not authenticated. +* `scope` - Set of user claims requested. +* `sessionCookieName` - Name of the cookie used to maintain session information. +* `sessionTimeout` - Maximum duration of the authentication session in seconds. +* `userPoolArn` - ARN of the Cognito user pool. +* `userPoolClientId` - ID of the Cognito user pool client. +* `userPoolDomain` - Domain prefix or fully-qualified domain name of the Cognito user pool. + +#### `authenticateOidc` + +* `authenticationRequestExtraParams` - Set of additional parameters for the request. + [Detailed below](#authentication_request_extra_params). +* `authorizationEndpoint` - The authorization endpoint of the IdP. +* `clientId` - OAuth 2.0 client identifier. +* `issuer` - OIDC issuer identifier of the IdP. +* `onUnauthenticatedRequest` - Behavior when the client is not authenticated. +* `scope` - Set of user claims requested. +* `sessionCookieName` - Name of the cookie used to maintain session information. +* `sessionTimeout` - Maximum duration of the authentication session in seconds. +* `tokenEndpoint` - The token endpoint of the IdP. +* `userInfoEndpoint` - The user info endpoint of the IdP. + +#### `authenticationRequestExtraParams` + +* `key` - Key of query parameter +* `value` - Value of query parameter + +#### `fixedResponse` + +* `contentType` - Content type of the response. +* `messageBody` - Message body of the response. +* `statusCode` - HTTP response code of the response. + +#### `forward` + +* `stickiness` - Target group stickiness for the rule. + [Detailed below](#stickiness). +* `targetGroup` - Set of target groups for the action. + [Detailed below](#target_group). + +#### `stickiness` + +* `duration` - The time period, in seconds, during which requests from a client should be routed to the same target group. +* `enabled` - Indicates whether target group stickiness is enabled. + +#### `targetGroup` + +* `arn` - ARN of the target group. +* `weight` - Weight of the target group. + +#### `redirect` + +* `host` - The hostname. +* `path` - The absolute path, starting with `/`. +* `port` - The port. +* `protocol` - The protocol. +* `query` - The query parameters. +* `statusCode` - The HTTP redirect code. + +### `condition` + +* `hostHeader` - Contains a single attribute `values`, which contains a set of host names. +* `httpHeader` - HTTP header and values to match. + [Detailed below](#http_header). +* `httpRequestMethod` - Contains a single attribute `values`, which contains a set of HTTP request methods. +* `pathPattern` - Contains a single attribute `values`, which contains a set of path patterns to compare against the request URL. +* `queryString` - Query string parameters to match. + [Detailed below](#query_string). +* `sourceIp` - Contains a single attribute `values`, which contains a set of source IPs in CIDR notation. + +#### `httpHeader` + +* `httpHeaderName` - Name of the HTTP header to match. +* `values` - Set of values to compare against the value of the HTTP header. + +#### `queryString` + +* `values` - Set of `key`-`value` pairs indicating the query string parameters to match. + + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/d/networkmanager_core_network_policy_document.html.markdown b/website/docs/cdktf/typescript/d/networkmanager_core_network_policy_document.html.markdown index c3709525bdf..8b450a41f5b 100644 --- a/website/docs/cdktf/typescript/d/networkmanager_core_network_policy_document.html.markdown +++ b/website/docs/cdktf/typescript/d/networkmanager_core_network_policy_document.html.markdown @@ -206,7 +206,6 @@ The following arguments are available: * `conditions` (Required) - A block argument. Detailed Below. * `description` (Optional) - A user-defined description that further helps identify the rule. * `ruleNumber` (Required) - An integer from `1` to `65535` indicating the rule's order number. Rules are processed in order from the lowest numbered rule to the highest. Rules stop processing when a rule is matched. It's important to make sure that you number your rules in the exact order that you want them processed. -* `addToNetworkFunctionGroup` (Optional) - The name of the network function group to attach to the attachment policy. ### `action` @@ -295,4 +294,4 @@ This data source exports the following attributes in addition to the arguments a * `json` - Standard JSON policy document rendered based on the arguments above. - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/d/shield_protection.html.markdown b/website/docs/cdktf/typescript/d/shield_protection.html.markdown index 2f4fc2fc017..d69f83bdfcc 100644 --- a/website/docs/cdktf/typescript/d/shield_protection.html.markdown +++ b/website/docs/cdktf/typescript/d/shield_protection.html.markdown @@ -52,7 +52,7 @@ class MyConvertedCode extends TerraformStack { super(scope, name); new DataAwsShieldProtection(this, "example", { resourceArn: - "arn:aws:globalaccelerator::012345678901:accelerator/1234abcd-abcd-1234-abcd-1234abcdefgh", + "arn:aws:globalaccelerator::123456789012:accelerator/1234abcd-abcd-1234-abcd-1234abcdefgh", }); } } @@ -75,4 +75,4 @@ This data source exports the following attributes in addition to the arguments a * `name` - Name of the protection. * `protectionArn` - ARN of the protection. - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/d/ssoadmin_application.html.markdown b/website/docs/cdktf/typescript/d/ssoadmin_application.html.markdown index 2357d9f08ba..72caad15782 100644 --- a/website/docs/cdktf/typescript/d/ssoadmin_application.html.markdown +++ b/website/docs/cdktf/typescript/d/ssoadmin_application.html.markdown @@ -30,7 +30,7 @@ class MyConvertedCode extends TerraformStack { super(scope, name); new DataAwsSsoadminApplication(this, "example", { applicationArn: - "arn:aws:sso::012345678901:application/ssoins-1234/apl-5678", + "arn:aws:sso::123456789012:application/ssoins-1234/apl-5678", }); } } @@ -56,4 +56,4 @@ This data source exports the following attributes in addition to the arguments a * `portalOptions` - Options for the portal associated with an application. See the `aws_ssoadmin_application` [resource documentation](../r/ssoadmin_application.html.markdown#portal_options-argument-reference). The attributes are the same. * `status` - Status of the application. - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/index.html.markdown b/website/docs/cdktf/typescript/index.html.markdown index 754b1c3aa98..18f0b15a435 100644 --- a/website/docs/cdktf/typescript/index.html.markdown +++ b/website/docs/cdktf/typescript/index.html.markdown @@ -13,7 +13,7 @@ Use the Amazon Web Services (AWS) provider to interact with the many resources supported by AWS. You must configure the provider with the proper credentials before you can use it. -Use the navigation to the left to read about the available resources. There are currently 1439 resources and 588 data sources available in the provider. +Use the navigation to the left to read about the available resources. There are currently 1441 resources and 588 data sources available in the provider. To learn the basics of Terraform using this provider, follow the hands-on [get started tutorials](https://learn.hashicorp.com/tutorials/terraform/infrastructure-as-code?in=terraform/aws-get-started&utm_source=WEBSITE&utm_medium=WEB_IO&utm_offer=ARTICLE_PAGE&utm_content=DOCS). Interact with AWS services, @@ -949,4 +949,4 @@ Approaches differ per authentication providers: There used to be no better way to get account ID out of the API when using the federated account until `sts:GetCallerIdentity` was introduced. - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/ami_copy.html.markdown b/website/docs/cdktf/typescript/r/ami_copy.html.markdown index f36a3413acf..520ee1d86a4 100644 --- a/website/docs/cdktf/typescript/r/ami_copy.html.markdown +++ b/website/docs/cdktf/typescript/r/ami_copy.html.markdown @@ -37,7 +37,6 @@ class MyConvertedCode extends TerraformStack { constructor(scope: Construct, name: string) { super(scope, name); new AmiCopy(this, "example", { - description: "A copy of ami-xxxxxxxx", name: "terraform-example", sourceAmiId: "ami-xxxxxxxx", sourceAmiRegion: "us-west-1", @@ -86,4 +85,4 @@ configuration. * `update` - (Default `40m`) * `delete` - (Default `90m`) - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/api_gateway_integration.html.markdown b/website/docs/cdktf/typescript/r/api_gateway_integration.html.markdown index 55593d7b459..0c326d1c623 100644 --- a/website/docs/cdktf/typescript/r/api_gateway_integration.html.markdown +++ b/website/docs/cdktf/typescript/r/api_gateway_integration.html.markdown @@ -267,7 +267,7 @@ This resource supports the following arguments: * `connectionId` - (Optional) ID of the VpcLink used for the integration. **Required** if `connectionType` is `VPC_LINK` * `uri` - (Optional) Input's URI. **Required** if `type` is `AWS`, `AWS_PROXY`, `HTTP` or `HTTP_PROXY`. For HTTP integrations, the URI must be a fully formed, encoded HTTP(S) URL according to the RFC-3986 specification . For AWS integrations, the URI should be of the form `arn:aws:apigateway:{region}:{subdomain.service|service}:{path|action}/{service_api}`. `region`, `subdomain` and `service` are used to determine the right endpoint. - e.g., `arn:aws:apigateway:eu-west-1:lambda:path/2015-03-31/functions/arn:aws:lambda:eu-west-1:012345678901:function:my-func/invocations`. For private integrations, the URI parameter is not used for routing requests to your endpoint, but is used for setting the Host header and for certificate validation. + e.g., `arn:aws:apigateway:eu-west-1:lambda:path/2015-03-31/functions/arn:aws:lambda:eu-west-1:123456789012:function:my-func/invocations`. For private integrations, the URI parameter is not used for routing requests to your endpoint, but is used for setting the Host header and for certificate validation. * `credentials` - (Optional) Credentials required for the integration. For `AWS` integrations, 2 options are available. To specify an IAM Role for Amazon API Gateway to assume, use the role's ARN. To require that the caller's identity be passed through from the request, specify the string `arn:aws:iam::\*:user/\*`. * `requestTemplates` - (Optional) Map of the integration's request templates. * `requestParameters` - (Optional) Map of request query string parameters and headers that should be passed to the backend responder. @@ -321,4 +321,4 @@ Using `terraform import`, import `aws_api_gateway_integration` using `REST-API-I % terraform import aws_api_gateway_integration.example 12345abcde/67890fghij/GET ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/auditmanager_assessment_delegation.html.markdown b/website/docs/cdktf/typescript/r/auditmanager_assessment_delegation.html.markdown index 4f959eb07ef..85091d60124 100644 --- a/website/docs/cdktf/typescript/r/auditmanager_assessment_delegation.html.markdown +++ b/website/docs/cdktf/typescript/r/auditmanager_assessment_delegation.html.markdown @@ -79,7 +79,7 @@ class MyConvertedCode extends TerraformStack { AuditmanagerAssessmentDelegation.generateConfigForImport( this, "example", - "abcdef-123456,arn:aws:iam::012345678901:role/example,example" + "abcdef-123456,arn:aws:iam::123456789012:role/example,example" ); } } @@ -89,7 +89,7 @@ class MyConvertedCode extends TerraformStack { Using `terraform import`, import Audit Manager Assessment Delegation using the `id`. For example: ```console -% terraform import aws_auditmanager_assessment_delegation.example abcdef-123456,arn:aws:iam::012345678901:role/example,example +% terraform import aws_auditmanager_assessment_delegation.example abcdef-123456,arn:aws:iam::123456789012:role/example,example ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/auditmanager_framework_share.html.markdown b/website/docs/cdktf/typescript/r/auditmanager_framework_share.html.markdown index 57a958cb60b..2584a950e5d 100644 --- a/website/docs/cdktf/typescript/r/auditmanager_framework_share.html.markdown +++ b/website/docs/cdktf/typescript/r/auditmanager_framework_share.html.markdown @@ -29,7 +29,7 @@ class MyConvertedCode extends TerraformStack { constructor(scope: Construct, name: string) { super(scope, name); new AuditmanagerFrameworkShare(this, "example", { - destinationAccount: "012345678901", + destinationAccount: "123456789012", destinationRegion: "us-east-1", frameworkId: Token.asString(awsAuditmanagerFrameworkExample.id), }); @@ -89,4 +89,4 @@ Using `terraform import`, import Audit Manager Framework Share using the `id`. F % terraform import aws_auditmanager_framework_share.example abcdef-123456 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/auditmanager_organization_admin_account_registration.html.markdown b/website/docs/cdktf/typescript/r/auditmanager_organization_admin_account_registration.html.markdown index 9a84b9ef47a..c1da5cbc018 100644 --- a/website/docs/cdktf/typescript/r/auditmanager_organization_admin_account_registration.html.markdown +++ b/website/docs/cdktf/typescript/r/auditmanager_organization_admin_account_registration.html.markdown @@ -29,7 +29,7 @@ class MyConvertedCode extends TerraformStack { constructor(scope: Construct, name: string) { super(scope, name); new AuditmanagerOrganizationAdminAccountRegistration(this, "example", { - adminAccountId: "012345678901", + adminAccountId: "123456789012", }); } } @@ -68,7 +68,7 @@ class MyConvertedCode extends TerraformStack { AuditmanagerOrganizationAdminAccountRegistration.generateConfigForImport( this, "example", - "012345678901 " + "123456789012 " ); } } @@ -78,7 +78,7 @@ class MyConvertedCode extends TerraformStack { Using `terraform import`, import Audit Manager Organization Admin Account Registration using the `id`. For example: ```console -% terraform import aws_auditmanager_organization_admin_account_registration.example 012345678901 +% terraform import aws_auditmanager_organization_admin_account_registration.example 123456789012 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/chatbot_slack_channel_configuration.html.markdown b/website/docs/cdktf/typescript/r/chatbot_slack_channel_configuration.html.markdown index 6513adbcc8d..00c57f50bcf 100644 --- a/website/docs/cdktf/typescript/r/chatbot_slack_channel_configuration.html.markdown +++ b/website/docs/cdktf/typescript/r/chatbot_slack_channel_configuration.html.markdown @@ -95,7 +95,7 @@ class MyConvertedCode extends TerraformStack { ChatbotSlackChannelConfiguration.generateConfigForImport( this, "example", - "arn:aws:chatbot::012345678901:chat-configuration/slack-channel/min-slaka-kanal" + "arn:aws:chatbot::123456789012:chat-configuration/slack-channel/min-slaka-kanal" ); } } @@ -105,7 +105,7 @@ class MyConvertedCode extends TerraformStack { Using `terraform import`, import Chatbot Slack Channel Configuration using the `chatConfigurationArn`. For example: ```console -% terraform import aws_chatbot_slack_channel_configuration.example arn:aws:chatbot::012345678901:chat-configuration/slack-channel/min-slaka-kanal +% terraform import aws_chatbot_slack_channel_configuration.example arn:aws:chatbot::123456789012:chat-configuration/slack-channel/min-slaka-kanal ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/codedeploy_deployment_config.html.markdown b/website/docs/cdktf/typescript/r/codedeploy_deployment_config.html.markdown index e54969f03ce..9d7d71e2fb6 100644 --- a/website/docs/cdktf/typescript/r/codedeploy_deployment_config.html.markdown +++ b/website/docs/cdktf/typescript/r/codedeploy_deployment_config.html.markdown @@ -134,6 +134,7 @@ This resource supports the following arguments: * `computePlatform` - (Optional) The compute platform can be `Server`, `Lambda`, or `ECS`. Default is `Server`. * `minimumHealthyHosts` - (Optional) A minimum_healthy_hosts block. Required for `Server` compute platform. Minimum Healthy Hosts are documented below. * `trafficRoutingConfig` - (Optional) A traffic_routing_config block. Traffic Routing Config is documented below. +* `zonalConfig` - (Optional) A zonal_config block. Zonal Config is documented below. The `minimumHealthyHosts` block supports the following: @@ -159,6 +160,17 @@ The `timeBasedLinear` block supports the following: * `interval` - (Optional) The number of minutes between each incremental traffic shift of a `TimeBasedLinear` deployment. * `percentage` - (Optional) The percentage of traffic that is shifted at the start of each increment of a `TimeBasedLinear` deployment. +The `zonalConfig` block supports the following: + +* `firstZoneMonitorDurationInSeconds` - (Optional) The period of time, in seconds, that CodeDeploy must wait after completing a deployment to the first Availability Zone. CodeDeploy will wait this amount of time before starting a deployment to the second Availability Zone. If you don't specify a value for `firstZoneMonitorDurationInSeconds`, then CodeDeploy uses the `monitorDurationInSeconds` value for the first Availability Zone. +* `minimumHealthyHostsPerZone` - (Optional) The number or percentage of instances that must remain available per Availability Zone during a deployment. If you don't specify a value under `minimumHealthyHostsPerZone`, then CodeDeploy uses a default value of 0 percent. This block is more documented below. +* `monitorDurationInSeconds` - (Optional) The period of time, in seconds, that CodeDeploy must wait after completing a deployment to an Availability Zone. CodeDeploy will wait this amount of time before starting a deployment to the next Availability Zone. If you don't specify a `monitorDurationInSeconds`, CodeDeploy starts deploying to the next Availability Zone immediately. + +The `minimumHealthyHostsPerZone` block supports the following: + +* `type` - (Required) The type can either be `FLEET_PERCENT` or `HOST_COUNT`. +* `value` - (Required) The value when the type is `FLEET_PERCENT` represents the minimum number of healthy instances as a percentage of the total number of instances in the Availability Zone during a deployment. If you specify FLEET_PERCENT, at the start of the deployment, AWS CodeDeploy converts the percentage to the equivalent number of instance and rounds up fractional instances. When the type is `HOST_COUNT`, the value represents the minimum number of healthy instances in the Availability Zone as an absolute value. + ## Attribute Reference This resource exports the following attributes in addition to the arguments above: @@ -199,4 +211,4 @@ Using `terraform import`, import CodeDeploy Deployment Configurations using the % terraform import aws_codedeploy_deployment_config.example my-deployment-config ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/codedeploy_deployment_group.html.markdown b/website/docs/cdktf/typescript/r/codedeploy_deployment_group.html.markdown index 2c9db8c1e03..c72c7cbd4bf 100644 --- a/website/docs/cdktf/typescript/r/codedeploy_deployment_group.html.markdown +++ b/website/docs/cdktf/typescript/r/codedeploy_deployment_group.html.markdown @@ -262,6 +262,7 @@ This resource supports the following arguments: * `onPremisesInstanceTagFilter` - (Optional) On premise tag filters associated with the group. See the AWS docs for details. * `triggerConfiguration` - (Optional) Configuration block(s) of the triggers for the deployment group (documented below). * `outdatedInstancesStrategy` - (Optional) Configuration block of Indicates what happens when new Amazon EC2 instances are launched mid-deployment and do not receive the deployed application revision. Valid values are `UPDATE` and `IGNORE`. Defaults to `UPDATE`. +* `termination_hook_enabled` - (Optional) Indicates whether the deployment group was configured to have CodeDeploy install a termination hook into an Auto Scaling group. * `tags` - (Optional) Key-value map of resource tags. If configured with a provider [`defaultTags` configuration block](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#default_tags-configuration-block) present, tags with matching keys will overwrite those defined at the provider-level. ### alarm_configuration Argument Reference @@ -451,4 +452,4 @@ Using `terraform import`, import CodeDeploy Deployment Groups using `appName`, a [1]: http://docs.aws.amazon.com/codedeploy/latest/userguide/monitoring-sns-event-notifications-create-trigger.html - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/datazone_user_profile.html.markdown b/website/docs/cdktf/typescript/r/datazone_user_profile.html.markdown index 2743b72b71e..98f84d96c5f 100644 --- a/website/docs/cdktf/typescript/r/datazone_user_profile.html.markdown +++ b/website/docs/cdktf/typescript/r/datazone_user_profile.html.markdown @@ -84,7 +84,7 @@ class MyConvertedCode extends TerraformStack { DatazoneUserProfile.generateConfigForImport( this, "example", - "arn:aws:iam::012345678901:user/example,dzd_54nakfrg9k6sri,IAM" + "arn:aws:iam::123456789012:user/example,dzd_54nakfrg9k6sri,IAM" ); } } @@ -94,7 +94,7 @@ class MyConvertedCode extends TerraformStack { Using `terraform import`, import DataZone User Profile using the `user_identifier,domain_identifier,type`. For example: ```console -% terraform import aws_datazone_user_profile.example arn:aws:iam::012345678901:user/example,dzd_54nakfrg9k6suo,IAM +% terraform import aws_datazone_user_profile.example arn:aws:iam::123456789012:user/example,dzd_54nakfrg9k6suo,IAM ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/dynamodb_kinesis_streaming_destination.html.markdown b/website/docs/cdktf/typescript/r/dynamodb_kinesis_streaming_destination.html.markdown index d11f59b2556..c473fffff48 100644 --- a/website/docs/cdktf/typescript/r/dynamodb_kinesis_streaming_destination.html.markdown +++ b/website/docs/cdktf/typescript/r/dynamodb_kinesis_streaming_destination.html.markdown @@ -46,6 +46,7 @@ class MyConvertedCode extends TerraformStack { awsKinesisStreamExample.overrideLogicalId("example"); const awsDynamodbKinesisStreamingDestinationExample = new DynamodbKinesisStreamingDestination(this, "example_2", { + approximateCreationDateTimePrecision: "MICROSECOND", streamArn: Token.asString(awsKinesisStreamExample.arn), tableName: example.name, }); @@ -60,11 +61,10 @@ class MyConvertedCode extends TerraformStack { This resource supports the following arguments: +* `approximateCreationDateTimePrecision` - (Optional) Toggle for the precision of Kinesis data stream timestamp. Valid values: `MILLISECOND` and `MICROSECOND`. * `streamArn` - (Required) The ARN for a Kinesis data stream. This must exist in the same account and region as the DynamoDB table. - -* `tableName` - (Required) The name of the DynamoDB table. There - can only be one Kinesis streaming destination for a given DynamoDB table. - +* `tableName` - (Required) The name of the DynamoDB table. There can only be one Kinesis streaming destination for a given DynamoDB table. + ## Attribute Reference This resource exports the following attributes in addition to the arguments above: @@ -103,4 +103,4 @@ Using `terraform import`, import DynamoDB Kinesis Streaming Destinations using t % terraform import aws_dynamodb_kinesis_streaming_destination.example example,arn:aws:kinesis:us-east-1:111122223333:exampleStreamName ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/ebs_volume.html.markdown b/website/docs/cdktf/typescript/r/ebs_volume.html.markdown index 045544cd22a..0428da19f3a 100644 --- a/website/docs/cdktf/typescript/r/ebs_volume.html.markdown +++ b/website/docs/cdktf/typescript/r/ebs_volume.html.markdown @@ -64,7 +64,7 @@ This resource supports the following arguments: This resource exports the following attributes in addition to the arguments above: * `id` - The volume ID (e.g., vol-59fcb34e). -* `arn` - The volume ARN (e.g., arn:aws:ec2:us-east-1:0123456789012:volume/vol-59fcb34e). +* `arn` - The volume ARN (e.g., arn:aws:ec2:us-east-1:123456789012:volume/vol-59fcb34e). * `tagsAll` - A map of tags assigned to the resource, including those inherited from the provider [`defaultTags` configuration block](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#default_tags-configuration-block). ## Timeouts @@ -103,4 +103,4 @@ Using `terraform import`, import EBS Volumes using the `id`. For example: % terraform import aws_ebs_volume.id vol-049df61146c4d7901 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/ecr_registry_scanning_configuration.html.markdown b/website/docs/cdktf/typescript/r/ecr_registry_scanning_configuration.html.markdown index 7e4a9449c07..63aa58fe253 100644 --- a/website/docs/cdktf/typescript/r/ecr_registry_scanning_configuration.html.markdown +++ b/website/docs/cdktf/typescript/r/ecr_registry_scanning_configuration.html.markdown @@ -126,7 +126,7 @@ class MyConvertedCode extends TerraformStack { EcrRegistryScanningConfiguration.generateConfigForImport( this, "example", - "012345678901" + "123456789012" ); } } @@ -136,7 +136,7 @@ class MyConvertedCode extends TerraformStack { Using `terraform import`, import ECR Scanning Configurations using the `registryId`. For example: ```console -% terraform import aws_ecr_registry_scanning_configuration.example 012345678901 +% terraform import aws_ecr_registry_scanning_configuration.example 123456789012 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/elasticache_cluster.html.markdown b/website/docs/cdktf/typescript/r/elasticache_cluster.html.markdown index 9ca0d4b0571..fd597990af5 100644 --- a/website/docs/cdktf/typescript/r/elasticache_cluster.html.markdown +++ b/website/docs/cdktf/typescript/r/elasticache_cluster.html.markdown @@ -241,7 +241,7 @@ class MyConvertedCode extends TerraformStack { The following arguments are required: * `clusterId` – (Required) Group identifier. ElastiCache converts this name to lowercase. Changing this value will re-create the resource. -* `engine` – (Optional, Required if `replicationGroupId` is not specified) Name of the cache engine to be used for this cache cluster. Valid values are `memcached` or `redis`. +* `engine` – (Optional, Required if `replicationGroupId` is not specified) Name of the cache engine to be used for this cache cluster. Valid values are `memcached` and `redis`. * `nodeType` – (Required unless `replicationGroupId` is provided) The instance class used. See AWS documentation for information on [supported node types for Redis](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/CacheNodes.SupportedTypes.html) and [guidance on selecting node types for Redis](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/nodes-select-size.html). See AWS documentation for information on [supported node types for Memcached](https://docs.aws.amazon.com/AmazonElastiCache/latest/mem-ug/CacheNodes.SupportedTypes.html) and [guidance on selecting node types for Memcached](https://docs.aws.amazon.com/AmazonElastiCache/latest/mem-ug/nodes-select-size.html). @@ -343,4 +343,4 @@ Using `terraform import`, import ElastiCache Clusters using the `clusterId`. For % terraform import aws_elasticache_cluster.my_cluster my_cluster ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/elasticache_global_replication_group.html.markdown b/website/docs/cdktf/typescript/r/elasticache_global_replication_group.html.markdown index 8750ee92f92..06a7ca68063 100644 --- a/website/docs/cdktf/typescript/r/elasticache_global_replication_group.html.markdown +++ b/website/docs/cdktf/typescript/r/elasticache_global_replication_group.html.markdown @@ -55,7 +55,7 @@ class MyConvertedCode extends TerraformStack { ``` -### Managing Redis Engine Versions +### Managing Redis OOS/Valkey Engine Versions The initial Redis version is determined by the version set on the primary replication group. However, once it is part of a Global Replication Group, @@ -198,4 +198,4 @@ Using `terraform import`, import ElastiCache Global Replication Groups using the % terraform import aws_elasticache_global_replication_group.my_global_replication_group okuqm-global-replication-group-1 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/elasticache_replication_group.html.markdown b/website/docs/cdktf/typescript/r/elasticache_replication_group.html.markdown index 921054e4246..3f21d269615 100644 --- a/website/docs/cdktf/typescript/r/elasticache_replication_group.html.markdown +++ b/website/docs/cdktf/typescript/r/elasticache_replication_group.html.markdown @@ -33,7 +33,7 @@ for more information. ## Example Usage -### Redis Cluster Mode Disabled +### Redis OSS/Valkey Cluster Mode Disabled To create a single shard primary with single read replica: @@ -110,7 +110,7 @@ class MyConvertedCode extends TerraformStack { ``` -### Redis Cluster Mode Enabled +### Redis OSS/Valkey Cluster Mode Enabled To create two shards with a primary and a single read replica each: @@ -283,12 +283,12 @@ The following arguments are optional: * `authToken` - (Optional) Password used to access a password protected server. Can be specified only if `transit_encryption_enabled = true`. * `authTokenUpdateStrategy` - (Optional) Strategy to use when updating the `authToken`. Valid values are `SET`, `ROTATE`, and `DELETE`. Defaults to `ROTATE`. * `autoMinorVersionUpgrade` - (Optional) Specifies whether minor version engine upgrades will be applied automatically to the underlying Cache Cluster instances during the maintenance window. - Only supported for engine type `"redis"` and if the engine version is 6 or higher. + Only supported for engine types `"redis"` and `"valkey"` and if the engine version is 6 or higher. Defaults to `true`. * `automaticFailoverEnabled` - (Optional) Specifies whether a read-only replica will be automatically promoted to read/write primary if the existing primary fails. If enabled, `numCacheClusters` must be greater than 1. Must be enabled for Redis (cluster mode enabled) replication groups. Defaults to `false`. * `clusterMode` - (Optional) Specifies whether cluster mode is enabled or disabled. Valid values are `enabled` or `disabled` or `compatible` * `dataTieringEnabled` - (Optional) Enables data tiering. Data tiering is only supported for replication groups using the r6gd node type. This parameter must be set to `true` when using r6gd nodes. -* `engine` - (Optional) Name of the cache engine to be used for the clusters in this replication group. The only valid value is `redis`. +* `engine` - (Optional) Name of the cache engine to be used for the clusters in this replication group. Valid values are `redis` or `valkey`. * `engineVersion` - (Optional) Version number of the cache engine to be used for the cache clusters in this replication group. If the version is 7 or higher, the major and minor version should be set, e.g., `7.2`. If the version is 6, the major and minor version can be set, e.g., `6.2`, @@ -299,7 +299,7 @@ The following arguments are optional: * `globalReplicationGroupId` - (Optional) The ID of the global replication group to which this replication group should belong. If this parameter is specified, the replication group is added to the specified global replication group as a secondary replication group; otherwise, the replication group is not part of any global replication group. If `globalReplicationGroupId` is set, the `numNodeGroups` parameter cannot be set. * `ipDiscovery` - (Optional) The IP version to advertise in the discovery protocol. Valid values are `ipv4` or `ipv6`. * `kmsKeyId` - (Optional) The ARN of the key that you wish to use if encrypting at rest. If not supplied, uses service managed encryption. Can be specified only if `at_rest_encryption_enabled = true`. -* `logDeliveryConfiguration` - (Optional, Redis only) Specifies the destination and format of Redis [SLOWLOG](https://redis.io/commands/slowlog) or Redis [Engine Log](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/Log_Delivery.html#Log_contents-engine-log). See the documentation on [Amazon ElastiCache](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/Log_Delivery.html#Log_contents-engine-log). See [Log Delivery Configuration](#log-delivery-configuration) below for more details. +* `logDeliveryConfiguration` - (Optional, Redis only) Specifies the destination and format of Redis OSS/Valkey [SLOWLOG](https://redis.io/commands/slowlog) or Redis OSS/Valkey [Engine Log](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/Log_Delivery.html#Log_contents-engine-log). See the documentation on [Amazon ElastiCache](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/Log_Delivery.html#Log_contents-engine-log). See [Log Delivery Configuration](#log-delivery-configuration) below for more details. * `maintenanceWindow` – (Optional) Specifies the weekly time range for when maintenance on the cache cluster is performed. The format is `ddd:hh24:mi-ddd:hh24:mi` (24H Clock UTC). The minimum maintenance window is a 60 minute period. Example: `sun:05:00-sun:09:00` * `multiAzEnabled` - (Optional) Specifies whether to enable Multi-AZ Support for the replication group. If `true`, `automaticFailoverEnabled` must also be enabled. @@ -345,7 +345,7 @@ The following arguments are optional: ### Log Delivery Configuration -The `logDeliveryConfiguration` block allows the streaming of Redis [SLOWLOG](https://redis.io/commands/slowlog) or Redis [Engine Log](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/Log_Delivery.html#Log_contents-engine-log) to CloudWatch Logs or Kinesis Data Firehose. Max of 2 blocks. +The `logDeliveryConfiguration` block allows the streaming of Redis OSS/Valkey [SLOWLOG](https://redis.io/commands/slowlog) or Redis OSS/Valkey [Engine Log](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/Log_Delivery.html#Log_contents-engine-log) to CloudWatch Logs or Kinesis Data Firehose. Max of 2 blocks. * `destination` - Name of either the CloudWatch Logs LogGroup or Kinesis Data Firehose resource. * `destinationType` - For CloudWatch Logs use `cloudwatch-logs` or for Kinesis Data Firehose use `kinesis-firehose`. @@ -406,4 +406,4 @@ Using `terraform import`, import ElastiCache Replication Groups using the `repli % terraform import aws_elasticache_replication_group.my_replication_group replication-group-1 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/elasticache_serverless_cache.html.markdown b/website/docs/cdktf/typescript/r/elasticache_serverless_cache.html.markdown index 78798015f50..970ad83f23d 100644 --- a/website/docs/cdktf/typescript/r/elasticache_serverless_cache.html.markdown +++ b/website/docs/cdktf/typescript/r/elasticache_serverless_cache.html.markdown @@ -10,7 +10,7 @@ description: |- # Resource: aws_elasticache_serverless_cache -Provides an ElastiCache Serverless Cache resource which manages memcached or redis. +Provides an ElastiCache Serverless Cache resource which manages memcached, redis or valkey. ## Example Usage @@ -57,7 +57,7 @@ class MyConvertedCode extends TerraformStack { ``` -### Redis Serverless +### Redis OSS Serverless ```typescript // DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug @@ -102,17 +102,62 @@ class MyConvertedCode extends TerraformStack { ``` +### Valkey Serverless + +```typescript +// DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug +import { Construct } from "constructs"; +import { Token, Fn, TerraformStack } from "cdktf"; +/* + * Provider bindings are generated by running `cdktf get`. + * See https://cdk.tf/provider-generation for more details. + */ +import { ElasticacheServerlessCache } from "./.gen/providers/aws/elasticache-serverless-cache"; +class MyConvertedCode extends TerraformStack { + constructor(scope: Construct, name: string) { + super(scope, name); + new ElasticacheServerlessCache(this, "example", { + cacheUsageLimits: [ + { + dataStorage: [ + { + maximum: 10, + unit: "GB", + }, + ], + ecpuPerSecond: [ + { + maximum: 5000, + }, + ], + }, + ], + dailySnapshotTime: "09:00", + description: "Test Server", + engine: "valkey", + kmsKeyId: test.arn, + majorEngineVersion: "7", + name: "example", + securityGroupIds: [Token.asString(awsSecurityGroupTest.id)], + snapshotRetentionLimit: 1, + subnetIds: Token.asList(Fn.lookupNested(awsSubnetTest, ["*", "id"])), + }); + } +} + +``` + ## Argument Reference The following arguments are required: -* `engine` – (Required) Name of the cache engine to be used for this cache cluster. Valid values are `memcached` or `redis`. +* `engine` – (Required) Name of the cache engine to be used for this cache cluster. Valid values are `memcached`, `redis` or `valkey`. * `name` – (Required) The Cluster name which serves as a unique identifier to the serverless cache The following arguments are optional: * `cacheUsageLimits` - (Optional) Sets the cache usage limits for storage and ElastiCache Processing Units for the cache. See [`cacheUsageLimits` Block](#cache_usage_limits-block) for details. -* `dailySnapshotTime` - (Optional) The daily time that snapshots will be created from the new serverless cache. Only supported for engine type `"redis"`. Defaults to `0`. +* `dailySnapshotTime` - (Optional) The daily time that snapshots will be created from the new serverless cache. Only supported for engine types `"redis"` or `"valkey"`. Defaults to `0`. * `description` - (Optional) User-provided description for the serverless cache. The default is NULL. * `kmsKeyId` - (Optional) ARN of the customer managed key for encrypting the data at rest. If no KMS key is provided, a default service key is used. * `majorEngineVersion` – (Optional) The version of the cache engine that will be used to create the serverless cache. @@ -212,4 +257,4 @@ Using `terraform import`, import ElastiCache Serverless Cache using the `name`. % terraform import aws_elasticache_serverless_cache.my_cluster my_cluster ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/imagebuilder_workflow.html.markdown b/website/docs/cdktf/typescript/r/imagebuilder_workflow.html.markdown index be0aba40574..b13447cf6fc 100644 --- a/website/docs/cdktf/typescript/r/imagebuilder_workflow.html.markdown +++ b/website/docs/cdktf/typescript/r/imagebuilder_workflow.html.markdown @@ -11,6 +11,8 @@ description: |- Terraform resource for managing an AWS EC2 Image Builder Workflow. +-> Image Builder manages the workflows for the distribution stage. Therefore, using the DISTRIBUTION workflow type results in an error. + ## Example Usage ### Basic Usage @@ -43,7 +45,7 @@ class MyConvertedCode extends TerraformStack { The following arguments are required: * `name` - (Required) Name of the workflow. -* `type` - (Required) Type of the workflow. Valid values: `BUILD`, `TEST`, `DISTRIBUTION`. +* `type` - (Required) Type of the workflow. Valid values: `BUILD`, `TEST`. * `version` - (Required) Version of the workflow. The following arguments are optional: @@ -97,4 +99,4 @@ Using `terraform import`, import EC2 Image Builder Workflow using the `example_i Certain resource arguments, such as `uri`, cannot be read via the API and imported into Terraform. Terraform will display a difference for these arguments the first run after import if declared in the Terraform configuration for an imported resource. - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/inspector2_delegated_admin_account.html.markdown b/website/docs/cdktf/typescript/r/inspector2_delegated_admin_account.html.markdown index 566be7b083e..fd47f6920eb 100644 --- a/website/docs/cdktf/typescript/r/inspector2_delegated_admin_account.html.markdown +++ b/website/docs/cdktf/typescript/r/inspector2_delegated_admin_account.html.markdown @@ -76,7 +76,7 @@ class MyConvertedCode extends TerraformStack { Inspector2DelegatedAdminAccount.generateConfigForImport( this, "example", - "012345678901" + "123456789012" ); } } @@ -86,7 +86,7 @@ class MyConvertedCode extends TerraformStack { Using `terraform import`, import Inspector Delegated Admin Account using the `accountId`. For example: ```console -% terraform import aws_inspector2_delegated_admin_account.example 012345678901 +% terraform import aws_inspector2_delegated_admin_account.example 123456789012 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/instance.html.markdown b/website/docs/cdktf/typescript/r/instance.html.markdown index 281aa80df7d..0472009dbce 100644 --- a/website/docs/cdktf/typescript/r/instance.html.markdown +++ b/website/docs/cdktf/typescript/r/instance.html.markdown @@ -245,7 +245,7 @@ class MyConvertedCode extends TerraformStack { new Instance(this, "this", { ami: "ami-0dcc1e21636832c5d", hostResourceGroupArn: - "arn:aws:resource-groups:us-west-2:012345678901:group/win-testhost", + "arn:aws:resource-groups:us-west-2:123456789012:group/win-testhost", instanceType: "m5.large", tenancy: "host", }); @@ -562,4 +562,4 @@ Using `terraform import`, import instances using the `id`. For example: % terraform import aws_instance.web i-12345678 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/kinesis_firehose_delivery_stream.html.markdown b/website/docs/cdktf/typescript/r/kinesis_firehose_delivery_stream.html.markdown index 92be2d80018..70db821339c 100644 --- a/website/docs/cdktf/typescript/r/kinesis_firehose_delivery_stream.html.markdown +++ b/website/docs/cdktf/typescript/r/kinesis_firehose_delivery_stream.html.markdown @@ -632,6 +632,111 @@ class MyConvertedCode extends TerraformStack { ``` +### Iceberg Destination + +```typescript +// DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug +import { Construct } from "constructs"; +import { Token, TerraformStack } from "cdktf"; +/* + * Provider bindings are generated by running `cdktf get`. + * See https://cdk.tf/provider-generation for more details. + */ +import { DataAwsCallerIdentity } from "./.gen/providers/aws/data-aws-caller-identity"; +import { DataAwsPartition } from "./.gen/providers/aws/data-aws-partition"; +import { DataAwsRegion } from "./.gen/providers/aws/data-aws-region"; +import { GlueCatalogDatabase } from "./.gen/providers/aws/glue-catalog-database"; +import { GlueCatalogTable } from "./.gen/providers/aws/glue-catalog-table"; +import { KinesisFirehoseDeliveryStream } from "./.gen/providers/aws/kinesis-firehose-delivery-stream"; +import { S3Bucket } from "./.gen/providers/aws/s3-bucket"; +class MyConvertedCode extends TerraformStack { + constructor(scope: Construct, name: string) { + super(scope, name); + const test = new GlueCatalogDatabase(this, "test", { + name: "test", + }); + const bucket = new S3Bucket(this, "bucket", { + bucket: "test-bucket", + forceDestroy: true, + }); + const current = new DataAwsCallerIdentity(this, "current", {}); + const dataAwsPartitionCurrent = new DataAwsPartition(this, "current_3", {}); + /*This allows the Terraform resource name to match the original name. You can remove the call if you don't need them to match.*/ + dataAwsPartitionCurrent.overrideLogicalId("current"); + const dataAwsRegionCurrent = new DataAwsRegion(this, "current_4", {}); + /*This allows the Terraform resource name to match the original name. You can remove the call if you don't need them to match.*/ + dataAwsRegionCurrent.overrideLogicalId("current"); + const awsGlueCatalogTableTest = new GlueCatalogTable(this, "test_5", { + databaseName: test.name, + name: "test", + openTableFormatInput: { + icebergInput: { + metadataOperation: "CREATE", + version: Token.asString(2), + }, + }, + parameters: { + format: "parquet", + }, + storageDescriptor: { + columns: [ + { + name: "my_column_1", + type: "int", + }, + ], + location: "s3://${" + bucket.id + "}", + }, + tableType: "EXTERNAL_TABLE", + }); + /*This allows the Terraform resource name to match the original name. You can remove the call if you don't need them to match.*/ + awsGlueCatalogTableTest.overrideLogicalId("test"); + new KinesisFirehoseDeliveryStream(this, "test_stream", { + destination: "iceberg", + icebergConfiguration: { + bufferingInterval: 400, + bufferingSize: 10, + catalogArn: + "arn:${" + + dataAwsPartitionCurrent.partition + + "}:glue:${" + + dataAwsRegionCurrent.name + + "}:${" + + current.accountId + + "}:catalog", + destinationTableConfiguration: [ + { + databaseName: test.name, + tableName: Token.asString(awsGlueCatalogTableTest.name), + }, + ], + processingConfiguration: { + enabled: Token.asBoolean("true"), + processors: [ + { + parameters: [ + { + parameterName: "LambdaArn", + parameterValue: "${" + lambdaProcessor.arn + "}:$LATEST", + }, + ], + type: "Lambda", + }, + ], + }, + roleArn: firehoseRole.arn, + s3Configuration: { + bucketArn: bucket.arn, + roleArn: firehoseRole.arn, + }, + }, + name: "terraform-kinesis-firehose-test-stream", + }); + } +} + +``` + ### Splunk Destination ```typescript @@ -777,6 +882,7 @@ This resource supports the following arguments: * `elasticsearchConfiguration` - (Optional) Configuration options when `destination` is `elasticsearch`. See [`elasticsearchConfiguration` block](#elasticsearch_configuration-block) below for details. * `extendedS3Configuration` - (Optional, only Required when `destination` is `extended_s3`) Enhanced configuration options for the s3 destination. See [`extendedS3Configuration` block](#extended_s3_configuration-block) below for details. * `httpEndpointConfiguration` - (Optional) Configuration options when `destination` is `httpEndpoint`. Requires the user to also specify an `s3Configuration` block. See [`httpEndpointConfiguration` block](#http_endpoint_configuration-block) below for details. +* `icebergConfiguration` - (Optional) Configuration options when `destination` is `iceberg`. See [`icebergConfiguration` block](#iceberg_configuration-block) below for details. * `opensearchConfiguration` - (Optional) Configuration options when `destination` is `opensearch`. See [`opensearchConfiguration` block](#opensearch_configuration-block) below for details. * `opensearchserverlessConfiguration` - (Optional) Configuration options when `destination` is `opensearchserverless`. See [`opensearchserverlessConfiguration` block](#opensearchserverless_configuration-block) below for details. * `redshiftConfiguration` - (Optional) Configuration options when `destination` is `redshift`. Requires the user to also specify an `s3Configuration` block. See [`redshiftConfiguration` block](#redshift_configuration-block) below for details. @@ -863,6 +969,20 @@ The `elasticsearchConfiguration` configuration block supports the following argu * `vpcConfig` - (Optional) The VPC configuration for the delivery stream to connect to Elastic Search associated with the VPC. See [`vpcConfig` block](#vpc_config-block) below for details. * `processingConfiguration` - (Optional) The data processing configuration. See [`processingConfiguration` block](#processing_configuration-block) below for details. +### `icebergConfiguration` block + +The `icebergConfiguration` configuration block supports the following arguments: + +* `bufferingInterval` - (Optional) Buffer incoming data for the specified period of time, in seconds between 0 and 900, before delivering it to the destination. The default value is 300. +* `bufferingSize` - (Optional) Buffer incoming data to the specified size, in MBs between 1 and 128, before delivering it to the destination. The default value is 5. +* `catalogArn` - (Required) Glue catalog ARN identifier of the destination Apache Iceberg Tables. You must specify the ARN in the format `arn:aws:glue:region:account-id:catalog` +* `cloudwatchLoggingOptions` - (Optional) The CloudWatch Logging Options for the delivery stream. See [`cloudwatchLoggingOptions` block](#cloudwatch_logging_options-block) below for details. +* `destinationTableConfiguration` - (Optional) Destination table configurations which Firehose uses to deliver data to Apache Iceberg Tables. Firehose will write data with insert if table specific configuration is not provided. See [`destinationTableConfiguration` block](#destination_table_configuration-block) below for details. +* `processingConfiguration` - (Optional) The data processing configuration. See [`processingConfiguration` block](#processing_configuration-block) below for details. +* `roleArn` - (Required) The ARN of the IAM role to be assumed by Firehose for calling Apache Iceberg Tables. +* `retryDuration` - (Optional) The period of time, in seconds between 0 to 7200, during which Firehose retries to deliver data to the specified destination. +* `s3Configuration` - (Required) The S3 Configuration. See [`s3Configuration` block](#s3_configuration-block) below for details. + ### `opensearchConfiguration` block The `opensearchConfiguration` configuration block supports the following arguments: @@ -1185,6 +1305,15 @@ The `schemaConfiguration` configuration block supports the following arguments: * `region` - (Optional) If you don't specify an AWS Region, the default is the current region. * `versionId` - (Optional) Specifies the table version for the output data schema. Defaults to `LATEST`. +### `destinationTableConfiguration` block + +The `destinationTableConfiguration` configuration block supports the following arguments: + +* `databaseName` - (Required) The name of the Apache Iceberg database. +* `tableName` - (Required) The name of the Apache Iceberg Table. +* `s3ErrorOutputPrefix` - (Optional) The table specific S3 error output prefix. All the errors that occurred while delivering to this table will be prefixed with this value in S3 destination. +* `uniqueKeys` - (Optional) A list of unique keys for a given Apache Iceberg table. Firehose will use these for running Create, Update, or Delete operations on the given Iceberg table. + ### `dynamicPartitioningConfiguration` block The `dynamicPartitioningConfiguration` configuration block supports the following arguments: @@ -1251,4 +1380,4 @@ Using `terraform import`, import Kinesis Firehose Delivery streams using the str Note: Import does not work for stream destination `s3`. Consider using `extended_s3` since `s3` destination is deprecated. - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/lakeformation_data_lake_settings.html.markdown b/website/docs/cdktf/typescript/r/lakeformation_data_lake_settings.html.markdown index b457f9f0282..a217c044cb8 100644 --- a/website/docs/cdktf/typescript/r/lakeformation_data_lake_settings.html.markdown +++ b/website/docs/cdktf/typescript/r/lakeformation_data_lake_settings.html.markdown @@ -113,22 +113,47 @@ class MyConvertedCode extends TerraformStack { ``` +### Change Cross Account Version + +```typescript +// DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug +import { Construct } from "constructs"; +import { TerraformStack } from "cdktf"; +/* + * Provider bindings are generated by running `cdktf get`. + * See https://cdk.tf/provider-generation for more details. + */ +import { LakeformationDataLakeSettings } from "./.gen/providers/aws/lakeformation-data-lake-settings"; +class MyConvertedCode extends TerraformStack { + constructor(scope: Construct, name: string) { + super(scope, name); + new LakeformationDataLakeSettings(this, "example", { + parameters: { + CROSS_ACCOUNT_VERSION: "3", + }, + }); + } +} + +``` + ## Argument Reference The following arguments are optional: * `admins` – (Optional) Set of ARNs of AWS Lake Formation principals (IAM users or roles). -* `readOnlyAdmins` – (Optional) Set of ARNs of AWS Lake Formation principals (IAM users or roles) with only view access to the resources. +* `allowExternalDataFiltering` - (Optional) Whether to allow Amazon EMR clusters to access data managed by Lake Formation. +* `allowFullTableExternalDataAccess` - (Optional) Whether to allow a third-party query engine to get data access credentials without session tags when a caller has full data access permissions. +* `authorizedSessionTagValueList` - (Optional) Lake Formation relies on a privileged process secured by Amazon EMR or the third party integrator to tag the user's role while assuming it. * `catalogId` – (Optional) Identifier for the Data Catalog. By default, the account ID. * `createDatabaseDefaultPermissions` - (Optional) Up to three configuration blocks of principal permissions for default create database permissions. Detailed below. * `createTableDefaultPermissions` - (Optional) Up to three configuration blocks of principal permissions for default create table permissions. Detailed below. -* `trustedResourceOwners` – (Optional) List of the resource-owning account IDs that the caller's account can use to share their user access details (user ARNs). -* `allowExternalDataFiltering` - (Optional) Whether to allow Amazon EMR clusters to access data managed by Lake Formation. * `externalDataFilteringAllowList` - (Optional) A list of the account IDs of Amazon Web Services accounts with Amazon EMR clusters that are to perform data filtering. -* `authorizedSessionTagValueList` - (Optional) Lake Formation relies on a privileged process secured by Amazon EMR or the third party integrator to tag the user's role while assuming it. -* `allowFullTableExternalDataAccess` - (Optional) Whether to allow a third-party query engine to get data access credentials without session tags when a caller has full data access permissions. +* `parameters` - Key-value map of additional configuration. Valid values for the `CROSS_ACCOUNT_VERSION` key are `"1"`, `"2"`, `"3"`, or `"4"`. `SET_CONTEXT` is also returned with a value of `TRUE`. In a fresh account, prior to configuring, `CROSS_ACCOUNT_VERSION` is `"1"`. Destroying this resource sets the `CROSS_ACCOUNT_VERSION` to `"1"`. +* `readOnlyAdmins` – (Optional) Set of ARNs of AWS Lake Formation principals (IAM users or roles) with only view access to the resources. +* `trustedResourceOwners` – (Optional) List of the resource-owning account IDs that the caller's account can use to share their user access details (user ARNs). -~> **NOTE:** Although optional, not including `admins`, `createDatabaseDefaultPermissions`, `createTableDefaultPermissions`, and/or `trustedResourceOwners` results in the setting being cleared. +~> **NOTE:** Although optional, not including `admins`, `createDatabaseDefaultPermissions`, `createTableDefaultPermissions`, `parameters`, and/or `trustedResourceOwners` results in the setting being cleared. ### create_database_default_permissions @@ -148,4 +173,4 @@ The following arguments are optional: This resource exports no additional attributes. - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/lb.html.markdown b/website/docs/cdktf/typescript/r/lb.html.markdown index ca68c164af9..36723a031fe 100644 --- a/website/docs/cdktf/typescript/r/lb.html.markdown +++ b/website/docs/cdktf/typescript/r/lb.html.markdown @@ -171,6 +171,7 @@ This resource supports the following arguments: * `enableTlsVersionAndCipherSuiteHeaders` - (Optional) Whether the two headers (`x-amzn-tls-version` and `x-amzn-tls-cipher-suite`), which contain information about the negotiated TLS version and cipher suite, are added to the client request before sending it to the target. Only valid for Load Balancers of type `application`. Defaults to `false` * `enableXffClientPort` - (Optional) Whether the X-Forwarded-For header should preserve the source port that the client used to connect to the load balancer in `application` load balancers. Defaults to `false`. * `enableWafFailOpen` - (Optional) Whether to allow a WAF-enabled load balancer to route requests to targets if it is unable to forward the request to AWS WAF. Defaults to `false`. +* `enableZonalShift` - (Optional) Whether zonal shift is enabled. Defaults to `false`. * `enforceSecurityGroupInboundRulesOnPrivateLinkTraffic` - (Optional) Whether inbound security group rules are enforced for traffic originating from a PrivateLink. Only valid for Load Balancers of type `network`. The possible values are `on` and `off`. * `idleTimeout` - (Optional) Time in seconds that the connection is allowed to be idle. Only valid for Load Balancers of type `application`. Default: 60. * `internal` - (Optional) If true, the LB will be internal. Defaults to `false`. @@ -256,4 +257,4 @@ Using `terraform import`, import LBs using their ARN. For example: % terraform import aws_lb.bar arn:aws:elasticloadbalancing:us-west-2:123456789012:loadbalancer/app/my-load-balancer/50dc6c495c0c9188 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/lb_listener.html.markdown b/website/docs/cdktf/typescript/r/lb_listener.html.markdown index 30c26971fb5..a0416c9bea9 100644 --- a/website/docs/cdktf/typescript/r/lb_listener.html.markdown +++ b/website/docs/cdktf/typescript/r/lb_listener.html.markdown @@ -393,6 +393,7 @@ The following arguments are optional: * `port` - (Optional) Port on which the load balancer is listening. Not valid for Gateway Load Balancers. * `protocol` - (Optional) Protocol for connections from clients to the load balancer. For Application Load Balancers, valid values are `HTTP` and `HTTPS`, with a default of `HTTP`. For Network Load Balancers, valid values are `TCP`, `TLS`, `UDP`, and `TCP_UDP`. Not valid to use `UDP` or `TCP_UDP` if dual-stack mode is enabled. Not valid for Gateway Load Balancers. * `sslPolicy` - (Optional) Name of the SSL Policy for the listener. Required if `protocol` is `HTTPS` or `TLS`. Default is `ELBSecurityPolicy-2016-08`. +* `tcpIdleTimeoutSeconds` - (Optional) TCP idle timeout value in seconds. Can only be set if protocol is `TCP` on Network Load Balancer, or with a Gateway Load Balancer. Not supported for Application Load Balancers. Valid values are between `60` and `6000` inclusive. Default: `350`. * `tags` - (Optional) A map of tags to assign to the resource. If configured with a provider [`defaultTags` configuration block](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#default_tags-configuration-block) present, tags with matching keys will overwrite those defined at the provider-level. ### default_action @@ -556,4 +557,4 @@ Using `terraform import`, import listeners using their ARN. For example: % terraform import aws_lb_listener.front_end arn:aws:elasticloadbalancing:us-west-2:187416307283:listener/app/front-end-alb/8e4497da625e2d8a/9ab28ade35828f96 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/lb_listener_rule.html.markdown b/website/docs/cdktf/typescript/r/lb_listener_rule.html.markdown index 2db42534c8f..3a09d2cc59b 100644 --- a/website/docs/cdktf/typescript/r/lb_listener_rule.html.markdown +++ b/website/docs/cdktf/typescript/r/lb_listener_rule.html.markdown @@ -257,7 +257,7 @@ Action Blocks (for `action`) support the following: Forward Blocks (for `forward`) support the following: -* `targetGroup` - (Required) One or more target groups block. +* `targetGroup` - (Required) One or more target group blocks. * `stickiness` - (Optional) The target group stickiness for the rule. Target Group Blocks (for `targetGroup`) supports the following: @@ -390,4 +390,4 @@ Using `terraform import`, import rules using their ARN. For example: % terraform import aws_lb_listener_rule.front_end arn:aws:elasticloadbalancing:us-west-2:187416307283:listener-rule/app/test/8e4497da625e2d8a/9ab28ade35828f96/67b3d2d36dd7c26b ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/redshift_data_share_authorization.html.markdown b/website/docs/cdktf/typescript/r/redshift_data_share_authorization.html.markdown index 7bcde51442a..ca733774824 100644 --- a/website/docs/cdktf/typescript/r/redshift_data_share_authorization.html.markdown +++ b/website/docs/cdktf/typescript/r/redshift_data_share_authorization.html.markdown @@ -28,9 +28,9 @@ class MyConvertedCode extends TerraformStack { constructor(scope: Construct, name: string) { super(scope, name); new RedshiftDataShareAuthorization(this, "example", { - consumerIdentifier: "012345678901", + consumerIdentifier: "123456789012", dataShareArn: - "arn:aws:redshift:us-west-2:012345678901:datashare:3072dae5-022b-4d45-9cd3-01f010aae4b2/example_share", + "arn:aws:redshift:us-west-2:123456789012:datashare:3072dae5-022b-4d45-9cd3-01f010aae4b2/example_share", }); } } @@ -75,7 +75,7 @@ class MyConvertedCode extends TerraformStack { RedshiftDataShareAuthorization.generateConfigForImport( this, "example", - "arn:aws:redshift:us-west-2:012345678901:datashare:3072dae5-022b-4d45-9cd3-01f010aae4b2/example_share,012345678901" + "arn:aws:redshift:us-west-2:123456789012:datashare:3072dae5-022b-4d45-9cd3-01f010aae4b2/example_share,123456789012" ); } } @@ -85,7 +85,7 @@ class MyConvertedCode extends TerraformStack { Using `terraform import`, import Redshift Data Share Authorization using the `id`. For example: ```console -% terraform import aws_redshift_data_share_authorization.example arn:aws:redshift:us-west-2:012345678901:datashare:3072dae5-022b-4d45-9cd3-01f010aae4b2/example_share,012345678901 +% terraform import aws_redshift_data_share_authorization.example arn:aws:redshift:us-west-2:123456789012:datashare:3072dae5-022b-4d45-9cd3-01f010aae4b2/example_share,123456789012 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/redshift_data_share_consumer_association.html.markdown b/website/docs/cdktf/typescript/r/redshift_data_share_consumer_association.html.markdown index 32a4a5825be..63c6497ba9c 100644 --- a/website/docs/cdktf/typescript/r/redshift_data_share_consumer_association.html.markdown +++ b/website/docs/cdktf/typescript/r/redshift_data_share_consumer_association.html.markdown @@ -30,7 +30,7 @@ class MyConvertedCode extends TerraformStack { new RedshiftDataShareConsumerAssociation(this, "example", { associateEntireAccount: true, dataShareArn: - "arn:aws:redshift:us-west-2:012345678901:datashare:b3bfde75-73fd-408b-9086-d6fccfd6d588/example", + "arn:aws:redshift:us-west-2:123456789012:datashare:b3bfde75-73fd-408b-9086-d6fccfd6d588/example", }); } } @@ -54,7 +54,7 @@ class MyConvertedCode extends TerraformStack { new RedshiftDataShareConsumerAssociation(this, "example", { consumerRegion: "us-west-2", dataShareArn: - "arn:aws:redshift:us-west-2:012345678901:datashare:b3bfde75-73fd-408b-9086-d6fccfd6d588/example", + "arn:aws:redshift:us-west-2:123456789012:datashare:b3bfde75-73fd-408b-9086-d6fccfd6d588/example", }); } } @@ -101,7 +101,7 @@ class MyConvertedCode extends TerraformStack { RedshiftDataShareConsumerAssociation.generateConfigForImport( this, "example", - "arn:aws:redshift:us-west-2:012345678901:datashare:b3bfde75-73fd-408b-9086-d6fccfd6d588/example,,,us-west-2" + "arn:aws:redshift:us-west-2:123456789012:datashare:b3bfde75-73fd-408b-9086-d6fccfd6d588/example,,,us-west-2" ); } } @@ -111,7 +111,7 @@ class MyConvertedCode extends TerraformStack { Using `terraform import`, import Redshift Data Share Consumer Association using the `id`. For example: ```console -% terraform import aws_redshift_data_share_consumer_association.example arn:aws:redshift:us-west-2:012345678901:datashare:b3bfde75-73fd-408b-9086-d6fccfd6d588/example,,,us-west-2 +% terraform import aws_redshift_data_share_consumer_association.example arn:aws:redshift:us-west-2:123456789012:datashare:b3bfde75-73fd-408b-9086-d6fccfd6d588/example,,,us-west-2 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/route53profiles_association.html.markdown b/website/docs/cdktf/typescript/r/route53profiles_association.html.markdown index 7fb010b82fe..9cac02ab386 100644 --- a/website/docs/cdktf/typescript/r/route53profiles_association.html.markdown +++ b/website/docs/cdktf/typescript/r/route53profiles_association.html.markdown @@ -58,10 +58,8 @@ class MyConvertedCode extends TerraformStack { The following arguments are required: -* `name` - (Required) Name of the Profile Association. - +* `name` - (Required) Name of the Profile Association. Must match a regex of `(?!^[0-9]+$)([a-zA-Z0-9\\-_' ']+)`. * `profileId` - (Required) ID of the profile associated with the VPC. - * `resourceId` - (Required) Resource ID of the VPC the profile to be associated with. ## Attribute Reference @@ -69,8 +67,7 @@ The following arguments are required: This resource exports the following attributes in addition to the arguments above: * `id` - ID of the Profile Association. -* `name` - Name of the Profile Association. -* `status` - Status of the Profile Association. Valid values [AWS docs](https://docs.aws.amazon.com/Route53/latest/APIReference/API_route53profiles_Profile.html) +* `status` - Status of the Profile Association. See the [AWS docs](https://docs.aws.amazon.com/Route53/latest/APIReference/API_route53profiles_Profile.html) for valid values. * `statusMessage` - Status message of the Profile Association. ## Timeouts @@ -78,6 +75,7 @@ This resource exports the following attributes in addition to the arguments abov [Configuration options](https://developer.hashicorp.com/terraform/language/resources/syntax#operation-timeouts): * `create` - (Default `30m`) +* `update` - (Default `5m`) * `delete` - (Default `30m`) ## Import @@ -112,4 +110,4 @@ Using `terraform import`, import Route 53 Profiles Association using the `exampl % terraform import aws_route53profiles_association.example rpa-id-12345678 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/sagemaker_hub.html.markdown b/website/docs/cdktf/typescript/r/sagemaker_hub.html.markdown new file mode 100644 index 00000000000..874a70d22c7 --- /dev/null +++ b/website/docs/cdktf/typescript/r/sagemaker_hub.html.markdown @@ -0,0 +1,91 @@ +--- +subcategory: "SageMaker" +layout: "aws" +page_title: "AWS: aws_sagemaker_hub" +description: |- + Provides a SageMaker Hub resource. +--- + + + +# Resource: aws_sagemaker_hub + +Provides a SageMaker Hub resource. + +## Example Usage + +### Basic usage + +```typescript +// DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug +import { Construct } from "constructs"; +import { TerraformStack } from "cdktf"; +/* + * Provider bindings are generated by running `cdktf get`. + * See https://cdk.tf/provider-generation for more details. + */ +import { SagemakerHub } from "./.gen/providers/aws/sagemaker-hub"; +class MyConvertedCode extends TerraformStack { + constructor(scope: Construct, name: string) { + super(scope, name); + new SagemakerHub(this, "example", { + hubDescription: "example", + hubName: "example", + }); + } +} + +``` + +## Argument Reference + +This resource supports the following arguments: + +* `hubName` - (Required) The name of the hub. +* `hubDescription` - (Required) A description of the hub. +* `hubDisplayName` - (Optional) The display name of the hub. +* `hubSearchKeywords` - (Optional) The searchable keywords for the hub. +* `s3StorageConfig` - (Optional) The Amazon S3 storage configuration for the hub. See [S3 Storage Config](#s3-storage-config) details below. +* `tags` - (Optional) A map of tags to assign to the resource. If configured with a provider [`defaultTags` configuration block](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#default_tags-configuration-block) present, tags with matching keys will overwrite those defined at the provider-level. + +### S3 Storage Config + +* `s3OutputPath` - (Optional) The Amazon S3 bucket prefix for hosting hub content.interface. + +## Attribute Reference + +This resource exports the following attributes in addition to the arguments above: + +* `id` - The name of the Hub. +* `arn` - The Amazon Resource Name (ARN) assigned by AWS to this Hub. +* `tagsAll` - A map of tags assigned to the resource, including those inherited from the provider [`defaultTags` configuration block](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#default_tags-configuration-block). + +## Import + +In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to import SageMaker Hubs using the `name`. For example: + +```typescript +// DO NOT EDIT. Code generated by 'cdktf convert' - Please report bugs at https://cdk.tf/bug +import { Construct } from "constructs"; +import { TerraformStack } from "cdktf"; +/* + * Provider bindings are generated by running `cdktf get`. + * See https://cdk.tf/provider-generation for more details. + */ +import { SagemakerHub } from "./.gen/providers/aws/sagemaker-hub"; +class MyConvertedCode extends TerraformStack { + constructor(scope: Construct, name: string) { + super(scope, name); + SagemakerHub.generateConfigForImport(this, "testHub", "my-code-repo"); + } +} + +``` + +Using `terraform import`, import SageMaker Hubs using the `name`. For example: + +```console +% terraform import aws_sagemaker_hub.test_hub my-code-repo +``` + + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/schemas_registry_policy.html.markdown b/website/docs/cdktf/typescript/r/schemas_registry_policy.html.markdown index 3b1e6513de2..5ba98c36b6c 100644 --- a/website/docs/cdktf/typescript/r/schemas_registry_policy.html.markdown +++ b/website/docs/cdktf/typescript/r/schemas_registry_policy.html.markdown @@ -41,8 +41,8 @@ class MyConvertedCode extends TerraformStack { }, ], resources: [ - "arn:aws:schemas:us-east-1:012345678901:registry/example", - "arn:aws:schemas:us-east-1:012345678901:schema/example*", + "arn:aws:schemas:us-east-1:123456789012:registry/example", + "arn:aws:schemas:us-east-1:123456789012:schema/example*", ], sid: "example", }, @@ -110,4 +110,4 @@ Using `terraform import`, import EventBridge Schema Registry Policy using the `r % terraform import aws_schemas_registry_policy.example example ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/servicequotas_template_association.html.markdown b/website/docs/cdktf/typescript/r/servicequotas_template_association.html.markdown index bcbdd7f387b..d8ea3080759 100644 --- a/website/docs/cdktf/typescript/r/servicequotas_template_association.html.markdown +++ b/website/docs/cdktf/typescript/r/servicequotas_template_association.html.markdown @@ -67,7 +67,7 @@ class MyConvertedCode extends TerraformStack { ServicequotasTemplateAssociation.generateConfigForImport( this, "example", - "012345678901" + "123456789012" ); } } @@ -77,7 +77,7 @@ class MyConvertedCode extends TerraformStack { Using `terraform import`, import Service Quotas Template Association using the `id`. For example: ```console -% terraform import aws_servicequotas_template_association.example 012345678901 +% terraform import aws_servicequotas_template_association.example 123456789012 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/shield_subscription.html.markdown b/website/docs/cdktf/typescript/r/shield_subscription.html.markdown index 5ff27da7069..3f9f499e7fa 100644 --- a/website/docs/cdktf/typescript/r/shield_subscription.html.markdown +++ b/website/docs/cdktf/typescript/r/shield_subscription.html.markdown @@ -69,7 +69,7 @@ import { ShieldSubscription } from "./.gen/providers/aws/shield-subscription"; class MyConvertedCode extends TerraformStack { constructor(scope: Construct, name: string) { super(scope, name); - ShieldSubscription.generateConfigForImport(this, "example", "012345678901"); + ShieldSubscription.generateConfigForImport(this, "example", "123456789012"); } } @@ -78,7 +78,7 @@ class MyConvertedCode extends TerraformStack { Using `terraform import`, import Shield Subscription using the `id`. For example: ```console -% terraform import aws_shield_subscription.example 012345678901 +% terraform import aws_shield_subscription.example 123456789012 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/sns_platform_application.html.markdown b/website/docs/cdktf/typescript/r/sns_platform_application.html.markdown index bb5df3d3dbf..4c8610b9b50 100644 --- a/website/docs/cdktf/typescript/r/sns_platform_application.html.markdown +++ b/website/docs/cdktf/typescript/r/sns_platform_application.html.markdown @@ -140,7 +140,7 @@ class MyConvertedCode extends TerraformStack { SnsPlatformApplication.generateConfigForImport( this, "gcmApplication", - "arn:aws:sns:us-west-2:0123456789012:app/GCM/gcm_application" + "arn:aws:sns:us-west-2:123456789012:app/GCM/gcm_application" ); } } @@ -150,7 +150,7 @@ class MyConvertedCode extends TerraformStack { Using `terraform import`, import SNS platform applications using the ARN. For example: ```console -% terraform import aws_sns_platform_application.gcm_application arn:aws:sns:us-west-2:0123456789012:app/GCM/gcm_application +% terraform import aws_sns_platform_application.gcm_application arn:aws:sns:us-west-2:123456789012:app/GCM/gcm_application ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/sns_topic.html.markdown b/website/docs/cdktf/typescript/r/sns_topic.html.markdown index b12cf7588dc..f64367343bc 100644 --- a/website/docs/cdktf/typescript/r/sns_topic.html.markdown +++ b/website/docs/cdktf/typescript/r/sns_topic.html.markdown @@ -170,7 +170,7 @@ class MyConvertedCode extends TerraformStack { SnsTopic.generateConfigForImport( this, "userUpdates", - "arn:aws:sns:us-west-2:0123456789012:my-topic" + "arn:aws:sns:us-west-2:123456789012:my-topic" ); } } @@ -180,7 +180,7 @@ class MyConvertedCode extends TerraformStack { Using `terraform import`, import SNS Topics using the topic `arn`. For example: ```console -% terraform import aws_sns_topic.user_updates arn:aws:sns:us-west-2:0123456789012:my-topic +% terraform import aws_sns_topic.user_updates arn:aws:sns:us-west-2:123456789012:my-topic ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/sns_topic_data_protection_policy.html.markdown b/website/docs/cdktf/typescript/r/sns_topic_data_protection_policy.html.markdown index e8d87a2aad6..dd155b2b7d7 100644 --- a/website/docs/cdktf/typescript/r/sns_topic_data_protection_policy.html.markdown +++ b/website/docs/cdktf/typescript/r/sns_topic_data_protection_policy.html.markdown @@ -91,7 +91,7 @@ class MyConvertedCode extends TerraformStack { SnsTopicDataProtectionPolicy.generateConfigForImport( this, "example", - "arn:aws:sns:us-west-2:0123456789012:example" + "arn:aws:sns:us-west-2:123456789012:example" ); } } @@ -101,7 +101,7 @@ class MyConvertedCode extends TerraformStack { Using `terraform import`, import SNS Data Protection Topic Policy using the topic ARN. For example: ```console -% terraform import aws_sns_topic_data_protection_policy.example arn:aws:sns:us-west-2:0123456789012:example +% terraform import aws_sns_topic_data_protection_policy.example arn:aws:sns:us-west-2:123456789012:example ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/sns_topic_policy.html.markdown b/website/docs/cdktf/typescript/r/sns_topic_policy.html.markdown index 2d66185d2bd..83020f08454 100644 --- a/website/docs/cdktf/typescript/r/sns_topic_policy.html.markdown +++ b/website/docs/cdktf/typescript/r/sns_topic_policy.html.markdown @@ -112,7 +112,7 @@ class MyConvertedCode extends TerraformStack { SnsTopicPolicy.generateConfigForImport( this, "userUpdates", - "arn:aws:sns:us-west-2:0123456789012:my-topic" + "arn:aws:sns:us-west-2:123456789012:my-topic" ); } } @@ -122,7 +122,7 @@ class MyConvertedCode extends TerraformStack { Using `terraform import`, import SNS Topic Policy using the topic ARN. For example: ```console -% terraform import aws_sns_topic_policy.user_updates arn:aws:sns:us-west-2:0123456789012:my-topic +% terraform import aws_sns_topic_policy.user_updates arn:aws:sns:us-west-2:123456789012:my-topic ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/sns_topic_subscription.html.markdown b/website/docs/cdktf/typescript/r/sns_topic_subscription.html.markdown index d77891b8611..b8ed1cb7cc9 100644 --- a/website/docs/cdktf/typescript/r/sns_topic_subscription.html.markdown +++ b/website/docs/cdktf/typescript/r/sns_topic_subscription.html.markdown @@ -398,7 +398,7 @@ class MyConvertedCode extends TerraformStack { SnsTopicSubscription.generateConfigForImport( this, "userUpdatesSqsTarget", - "arn:aws:sns:us-west-2:0123456789012:my-topic:8a21d249-4329-4871-acc6-7be709c6ea7f" + "arn:aws:sns:us-west-2:123456789012:my-topic:8a21d249-4329-4871-acc6-7be709c6ea7f" ); } } @@ -408,7 +408,7 @@ class MyConvertedCode extends TerraformStack { Using `terraform import`, import SNS Topic Subscriptions using the subscription `arn`. For example: ```console -% terraform import aws_sns_topic_subscription.user_updates_sqs_target arn:aws:sns:us-west-2:0123456789012:my-topic:8a21d249-4329-4871-acc6-7be709c6ea7f +% terraform import aws_sns_topic_subscription.user_updates_sqs_target arn:aws:sns:us-west-2:123456789012:my-topic:8a21d249-4329-4871-acc6-7be709c6ea7f ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/sqs_queue_policy.html.markdown b/website/docs/cdktf/typescript/r/sqs_queue_policy.html.markdown index da8e2404a07..ad51ea5434f 100644 --- a/website/docs/cdktf/typescript/r/sqs_queue_policy.html.markdown +++ b/website/docs/cdktf/typescript/r/sqs_queue_policy.html.markdown @@ -96,7 +96,7 @@ class MyConvertedCode extends TerraformStack { SqsQueuePolicy.generateConfigForImport( this, "test", - "https://queue.amazonaws.com/0123456789012/myqueue" + "https://queue.amazonaws.com/123456789012/myqueue" ); } } @@ -106,7 +106,7 @@ class MyConvertedCode extends TerraformStack { Using `terraform import`, import SQS Queue Policies using the queue URL. For example: ```console -% terraform import aws_sqs_queue_policy.test https://queue.amazonaws.com/0123456789012/myqueue +% terraform import aws_sqs_queue_policy.test https://queue.amazonaws.com/123456789012/myqueue ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/sqs_queue_redrive_allow_policy.html.markdown b/website/docs/cdktf/typescript/r/sqs_queue_redrive_allow_policy.html.markdown index 19f8b989794..85bbdd48c12 100644 --- a/website/docs/cdktf/typescript/r/sqs_queue_redrive_allow_policy.html.markdown +++ b/website/docs/cdktf/typescript/r/sqs_queue_redrive_allow_policy.html.markdown @@ -89,7 +89,7 @@ class MyConvertedCode extends TerraformStack { SqsQueueRedriveAllowPolicy.generateConfigForImport( this, "test", - "https://queue.amazonaws.com/0123456789012/myqueue" + "https://queue.amazonaws.com/123456789012/myqueue" ); } } @@ -99,7 +99,7 @@ class MyConvertedCode extends TerraformStack { Using `terraform import`, import SQS Queue Redrive Allow Policies using the queue URL. For example: ```console -% terraform import aws_sqs_queue_redrive_allow_policy.test https://queue.amazonaws.com/0123456789012/myqueue +% terraform import aws_sqs_queue_redrive_allow_policy.test https://queue.amazonaws.com/123456789012/myqueue ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/sqs_queue_redrive_policy.html.markdown b/website/docs/cdktf/typescript/r/sqs_queue_redrive_policy.html.markdown index 81b3bad35db..1234f58690c 100644 --- a/website/docs/cdktf/typescript/r/sqs_queue_redrive_policy.html.markdown +++ b/website/docs/cdktf/typescript/r/sqs_queue_redrive_policy.html.markdown @@ -90,7 +90,7 @@ class MyConvertedCode extends TerraformStack { SqsQueueRedrivePolicy.generateConfigForImport( this, "test", - "https://queue.amazonaws.com/0123456789012/myqueue" + "https://queue.amazonaws.com/123456789012/myqueue" ); } } @@ -100,7 +100,7 @@ class MyConvertedCode extends TerraformStack { Using `terraform import`, import SQS Queue Redrive Policies using the queue URL. For example: ```console -% terraform import aws_sqs_queue_redrive_policy.test https://queue.amazonaws.com/0123456789012/myqueue +% terraform import aws_sqs_queue_redrive_policy.test https://queue.amazonaws.com/123456789012/myqueue ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/ssoadmin_application.html.markdown b/website/docs/cdktf/typescript/r/ssoadmin_application.html.markdown index fba7a2eb885..c95ea888b03 100644 --- a/website/docs/cdktf/typescript/r/ssoadmin_application.html.markdown +++ b/website/docs/cdktf/typescript/r/ssoadmin_application.html.markdown @@ -153,7 +153,7 @@ class MyConvertedCode extends TerraformStack { SsoadminApplication.generateConfigForImport( this, "example", - "arn:aws:sso::012345678901:application/id-12345678" + "arn:aws:sso::123456789012:application/id-12345678" ); } } @@ -163,7 +163,7 @@ class MyConvertedCode extends TerraformStack { Using `terraform import`, import SSO Admin Application using the `id`. For example: ```console -% terraform import aws_ssoadmin_application.example arn:aws:sso::012345678901:application/id-12345678 +% terraform import aws_ssoadmin_application.example arn:aws:sso::123456789012:application/id-12345678 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/ssoadmin_application_access_scope.html.markdown b/website/docs/cdktf/typescript/r/ssoadmin_application_access_scope.html.markdown index eccfaed1b54..cede520ae64 100644 --- a/website/docs/cdktf/typescript/r/ssoadmin_application_access_scope.html.markdown +++ b/website/docs/cdktf/typescript/r/ssoadmin_application_access_scope.html.markdown @@ -49,7 +49,7 @@ class MyConvertedCode extends TerraformStack { awsSsoadminApplicationExample.applicationArn ), authorizedTargets: [ - "arn:aws:sso::012345678901:application/ssoins-012345678901/apl-012345678901", + "arn:aws:sso::123456789012:application/ssoins-123456789012/apl-123456789012", ], scope: "sso:account:access", }); @@ -96,7 +96,7 @@ class MyConvertedCode extends TerraformStack { SsoadminApplicationAccessScope.generateConfigForImport( this, "example", - "arn:aws:sso::012345678901:application/ssoins-012345678901/apl-012345678901,sso:account:access" + "arn:aws:sso::123456789012:application/ssoins-123456789012/apl-123456789012,sso:account:access" ); } } @@ -106,7 +106,7 @@ class MyConvertedCode extends TerraformStack { Using `terraform import`, import SSO Admin Application Access Scope using the `id`. For example: ```console -% terraform import aws_ssoadmin_application_access_scope.example arn:aws:sso::012345678901:application/ssoins-012345678901/apl-012345678901,sso:account:access +% terraform import aws_ssoadmin_application_access_scope.example arn:aws:sso::123456789012:application/ssoins-123456789012/apl-123456789012,sso:account:access ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/ssoadmin_application_assignment.html.markdown b/website/docs/cdktf/typescript/r/ssoadmin_application_assignment.html.markdown index 42c3b2a3110..f4f328640fe 100644 --- a/website/docs/cdktf/typescript/r/ssoadmin_application_assignment.html.markdown +++ b/website/docs/cdktf/typescript/r/ssoadmin_application_assignment.html.markdown @@ -98,7 +98,7 @@ class MyConvertedCode extends TerraformStack { SsoadminApplicationAssignment.generateConfigForImport( this, "example", - "arn:aws:sso::012345678901:application/id-12345678,abcd1234,USER" + "arn:aws:sso::123456789012:application/id-12345678,abcd1234,USER" ); } } @@ -108,7 +108,7 @@ class MyConvertedCode extends TerraformStack { Using `terraform import`, import SSO Admin Application Assignment using the `id`. For example: ```console -% terraform import aws_ssoadmin_application_assignment.example arn:aws:sso::012345678901:application/id-12345678,abcd1234,USER +% terraform import aws_ssoadmin_application_assignment.example arn:aws:sso::123456789012:application/id-12345678,abcd1234,USER ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/ssoadmin_application_assignment_configuration.html.markdown b/website/docs/cdktf/typescript/r/ssoadmin_application_assignment_configuration.html.markdown index e2c383dcd94..07192d33638 100644 --- a/website/docs/cdktf/typescript/r/ssoadmin_application_assignment_configuration.html.markdown +++ b/website/docs/cdktf/typescript/r/ssoadmin_application_assignment_configuration.html.markdown @@ -75,7 +75,7 @@ class MyConvertedCode extends TerraformStack { SsoadminApplicationAssignmentConfiguration.generateConfigForImport( this, "example", - "arn:aws:sso::012345678901:application/id-12345678" + "arn:aws:sso::123456789012:application/id-12345678" ); } } @@ -85,7 +85,7 @@ class MyConvertedCode extends TerraformStack { Using `terraform import`, import SSO Admin Application Assignment Configuration using the `id`. For example: ```console -% terraform import aws_ssoadmin_application_assignment_configuration.example arn:aws:sso::012345678901:application/id-12345678 +% terraform import aws_ssoadmin_application_assignment_configuration.example arn:aws:sso::123456789012:application/id-12345678 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/ssoadmin_trusted_token_issuer.html.markdown b/website/docs/cdktf/typescript/r/ssoadmin_trusted_token_issuer.html.markdown index 5b36bb1d889..353dc599528 100644 --- a/website/docs/cdktf/typescript/r/ssoadmin_trusted_token_issuer.html.markdown +++ b/website/docs/cdktf/typescript/r/ssoadmin_trusted_token_issuer.html.markdown @@ -111,7 +111,7 @@ class MyConvertedCode extends TerraformStack { SsoadminTrustedTokenIssuer.generateConfigForImport( this, "example", - "arn:aws:sso::012345678901:trustedTokenIssuer/ssoins-lu1ye3gew4mbc7ju/tti-2657c556-9707-11ee-b9d1-0242ac120002" + "arn:aws:sso::123456789012:trustedTokenIssuer/ssoins-lu1ye3gew4mbc7ju/tti-2657c556-9707-11ee-b9d1-0242ac120002" ); } } @@ -121,7 +121,7 @@ class MyConvertedCode extends TerraformStack { Using `terraform import`, import SSO Admin Trusted Token Issuer using the `id`. For example: ```console -% terraform import aws_ssoadmin_trusted_token_issuer.example arn:aws:sso::012345678901:trustedTokenIssuer/ssoins-lu1ye3gew4mbc7ju/tti-2657c556-9707-11ee-b9d1-0242ac120002 +% terraform import aws_ssoadmin_trusted_token_issuer.example arn:aws:sso::123456789012:trustedTokenIssuer/ssoins-lu1ye3gew4mbc7ju/tti-2657c556-9707-11ee-b9d1-0242ac120002 ``` - \ No newline at end of file + \ No newline at end of file diff --git a/website/docs/cdktf/typescript/r/transfer_server.html.markdown b/website/docs/cdktf/typescript/r/transfer_server.html.markdown index cd9a11b2011..a95ba237b25 100644 --- a/website/docs/cdktf/typescript/r/transfer_server.html.markdown +++ b/website/docs/cdktf/typescript/r/transfer_server.html.markdown @@ -270,6 +270,7 @@ This resource supports the following arguments: * `TransferSecurityPolicy-PQ-SSH-FIPS-Experimental-2023-04` * `TransferSecurityPolicy-Restricted-2018-11` * `TransferSecurityPolicy-Restricted-2020-06` + * `TransferSecurityPolicy-Restricted-2024-06` See [Security policies for AWS Transfer Family servers](https://docs.aws.amazon.com/transfer/latest/userguide/security-policies.html) for details. * `structuredLogDestinations` - (Optional) A set of ARNs of destinations that will receive structured logs from the transfer server such as CloudWatch Log Group ARNs. If provided this enables the transfer server to emit structured logs to the specified locations. @@ -364,4 +365,4 @@ Using `terraform import`, import Transfer Servers using the server `id`. For exa Certain resource arguments, such as `hostKey`, cannot be read via the API and imported into Terraform. Terraform will display a difference for these arguments the first run after import if declared in the Terraform configuration for an imported resource. - \ No newline at end of file + \ No newline at end of file