aws-cdk-lib 2.189.0__py3-none-any.whl → 2.189.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk-lib might be problematic. Click here for more details.

aws_cdk/__init__.py CHANGED
@@ -22975,7 +22975,7 @@ class Stage(
22975
22975
  :param id: -
22976
22976
  :param env: Default AWS environment (account/region) for ``Stack``s in this ``Stage``. Stacks defined inside this ``Stage`` with either ``region`` or ``account`` missing from its env will use the corresponding field given here. If either ``region`` or ``account``is is not configured for ``Stack`` (either on the ``Stack`` itself or on the containing ``Stage``), the Stack will be *environment-agnostic*. Environment-agnostic stacks can be deployed to any environment, may not be able to take advantage of all features of the CDK. For example, they will not be able to use environmental context lookups, will not automatically translate Service Principals to the right format based on the environment's AWS partition, and other such enhancements. Default: - The environments should be configured on the ``Stack``s.
22977
22977
  :param outdir: The output directory into which to emit synthesized artifacts. Can only be specified if this stage is the root stage (the app). If this is specified and this stage is nested within another stage, an error will be thrown. Default: - for nested stages, outdir will be determined as a relative directory to the outdir of the app. For apps, if outdir is not specified, a temporary directory will be created.
22978
- :param permissions_boundary: Options for applying a permissions boundary to all IAM Roles and Users created within this Stage. Default: - no permissions boundary is applied
22978
+ :param permissions_boundary: Options for applying a permissions boundary to all IAM Roles and Users created within this Stage. Be aware that this feature uses Aspects, and the Aspects are applied at the Stack level with a priority of ``MUTATING`` (if the feature flag ``@aws-cdk/core:aspectPrioritiesMutating`` is set) or ``DEFAULT`` (if the flag is not set). This is relevant if you are both using your own Aspects to assign Permissions Boundaries, as well as specifying this property. The Aspect added by this property will overwrite the Permissions Boundary assigned by your own Aspect if both: (a) your Aspect has a lower or equal priority to the automatic Aspect, and (b) your Aspect is applied *above* the Stack level. If either of those conditions are not true, your own Aspect will win. We recommend assigning Permissions Boundaries only using the provided APIs, and not using custom Aspects. Default: - no permissions boundary is applied
22979
22979
  :param policy_validation_beta1: Validation plugins to run during synthesis. If any plugin reports any violation, synthesis will be interrupted and the report displayed to the user. Default: - no validation plugins are used
22980
22980
  :param stage_name: Name of this stage. Default: - Derived from the id.
22981
22981
  '''
@@ -23141,7 +23141,7 @@ class StageProps:
23141
23141
 
23142
23142
  :param env: Default AWS environment (account/region) for ``Stack``s in this ``Stage``. Stacks defined inside this ``Stage`` with either ``region`` or ``account`` missing from its env will use the corresponding field given here. If either ``region`` or ``account``is is not configured for ``Stack`` (either on the ``Stack`` itself or on the containing ``Stage``), the Stack will be *environment-agnostic*. Environment-agnostic stacks can be deployed to any environment, may not be able to take advantage of all features of the CDK. For example, they will not be able to use environmental context lookups, will not automatically translate Service Principals to the right format based on the environment's AWS partition, and other such enhancements. Default: - The environments should be configured on the ``Stack``s.
23143
23143
  :param outdir: The output directory into which to emit synthesized artifacts. Can only be specified if this stage is the root stage (the app). If this is specified and this stage is nested within another stage, an error will be thrown. Default: - for nested stages, outdir will be determined as a relative directory to the outdir of the app. For apps, if outdir is not specified, a temporary directory will be created.
23144
- :param permissions_boundary: Options for applying a permissions boundary to all IAM Roles and Users created within this Stage. Default: - no permissions boundary is applied
23144
+ :param permissions_boundary: Options for applying a permissions boundary to all IAM Roles and Users created within this Stage. Be aware that this feature uses Aspects, and the Aspects are applied at the Stack level with a priority of ``MUTATING`` (if the feature flag ``@aws-cdk/core:aspectPrioritiesMutating`` is set) or ``DEFAULT`` (if the flag is not set). This is relevant if you are both using your own Aspects to assign Permissions Boundaries, as well as specifying this property. The Aspect added by this property will overwrite the Permissions Boundary assigned by your own Aspect if both: (a) your Aspect has a lower or equal priority to the automatic Aspect, and (b) your Aspect is applied *above* the Stack level. If either of those conditions are not true, your own Aspect will win. We recommend assigning Permissions Boundaries only using the provided APIs, and not using custom Aspects. Default: - no permissions boundary is applied
23145
23145
  :param policy_validation_beta1: Validation plugins to run during synthesis. If any plugin reports any violation, synthesis will be interrupted and the report displayed to the user. Default: - no validation plugins are used
23146
23146
  :param stage_name: Name of this stage. Default: - Derived from the id.
23147
23147
 
@@ -23242,6 +23242,20 @@ class StageProps:
23242
23242
  def permissions_boundary(self) -> typing.Optional[PermissionsBoundary]:
23243
23243
  '''Options for applying a permissions boundary to all IAM Roles and Users created within this Stage.
23244
23244
 
23245
+ Be aware that this feature uses Aspects, and the Aspects are applied at the
23246
+ Stack level with a priority of ``MUTATING`` (if the feature flag
23247
+ ``@aws-cdk/core:aspectPrioritiesMutating`` is set) or ``DEFAULT`` (if the flag
23248
+ is not set). This is relevant if you are both using your own Aspects to
23249
+ assign Permissions Boundaries, as well as specifying this property. The
23250
+ Aspect added by this property will overwrite the Permissions Boundary
23251
+ assigned by your own Aspect if both: (a) your Aspect has a lower or equal
23252
+ priority to the automatic Aspect, and (b) your Aspect is applied *above*
23253
+ the Stack level. If either of those conditions are not true, your own
23254
+ Aspect will win.
23255
+
23256
+ We recommend assigning Permissions Boundaries only using the provided APIs,
23257
+ and not using custom Aspects.
23258
+
23245
23259
  :default: - no permissions boundary is applied
23246
23260
  '''
23247
23261
  result = self._values.get("permissions_boundary")
aws_cdk/_jsii/__init__.py CHANGED
@@ -34,7 +34,7 @@ import aws_cdk.cloud_assembly_schema._jsii
34
34
  import constructs._jsii
35
35
 
36
36
  __jsii_assembly__ = jsii.JSIIAssembly.load(
37
- "aws-cdk-lib", "2.189.0", __name__[0:-6], "aws-cdk-lib@2.189.0.jsii.tgz"
37
+ "aws-cdk-lib", "2.189.1", __name__[0:-6], "aws-cdk-lib@2.189.1.jsii.tgz"
38
38
  )
39
39
 
40
40
  __all__ = [
@@ -1906,17 +1906,17 @@ class CustomResourceConfig(
1906
1906
  return typing.cast(None, jsii.invoke(self, "addLambdaRuntime", [lambda_runtime]))
1907
1907
 
1908
1908
  @jsii.member(jsii_name="addLogRetentionLifetime")
1909
- def add_log_retention_lifetime(self, rentention: _RetentionDays_070f99f0) -> None:
1909
+ def add_log_retention_lifetime(self, retention: _RetentionDays_070f99f0) -> None:
1910
1910
  '''Set the log retention of AWS-vended custom resource lambdas.
1911
1911
 
1912
1912
  This feature is currently experimental.
1913
1913
 
1914
- :param rentention: -
1914
+ :param retention: -
1915
1915
  '''
1916
1916
  if __debug__:
1917
1917
  type_hints = typing.get_type_hints(_typecheckingstub__b24e4182dd0a87c24dfd3d5c1bc10b91914571416d15e209d3fbd01cdcca86c3)
1918
- check_type(argname="argument rentention", value=rentention, expected_type=type_hints["rentention"])
1919
- return typing.cast(None, jsii.invoke(self, "addLogRetentionLifetime", [rentention]))
1918
+ check_type(argname="argument retention", value=retention, expected_type=type_hints["retention"])
1919
+ return typing.cast(None, jsii.invoke(self, "addLogRetentionLifetime", [retention]))
1920
1920
 
1921
1921
  @jsii.member(jsii_name="addRemovalPolicy")
1922
1922
  def add_removal_policy(self, removal_policy: _RemovalPolicy_9f93c814) -> None:
@@ -3339,7 +3339,7 @@ def _typecheckingstub__78a138e921609d9dcf95b341aa403897a831e305855b6a8bf80efcf60
3339
3339
  pass
3340
3340
 
3341
3341
  def _typecheckingstub__b24e4182dd0a87c24dfd3d5c1bc10b91914571416d15e209d3fbd01cdcca86c3(
3342
- rentention: _RetentionDays_070f99f0,
3342
+ retention: _RetentionDays_070f99f0,
3343
3343
  ) -> None:
3344
3344
  """Type checking stubs"""
3345
3345
  pass
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: aws-cdk-lib
3
- Version: 2.189.0
3
+ Version: 2.189.1
4
4
  Summary: Version 2 of the AWS Cloud Development Kit library
5
5
  Home-page: https://github.com/aws/aws-cdk
6
6
  Author: Amazon Web Services
@@ -1,7 +1,7 @@
1
- aws_cdk/__init__.py,sha256=nf1FA7AcIs1ztqIbWTUx5XSzOXLtSSkAEGF9Y-PuH9Q,2007883
1
+ aws_cdk/__init__.py,sha256=HFcGuLFK8-oUym24ep2bj6onmb7buY2pmrqJ8WZVIWA,2010305
2
2
  aws_cdk/py.typed,sha256=AbpHGcgLb-kRsJGnwFEktk7uzpZOCcBY74-YBdrKVGs,1
3
- aws_cdk/_jsii/__init__.py,sha256=zu5dJ561H4HOY12o_1f1u69TAo54XGvEwZEOJxQFti8,1543
4
- aws_cdk/_jsii/aws-cdk-lib@2.189.0.jsii.tgz,sha256=lmWjE7bJ5xXAXsQRoZPIpUCne8GRgrKalhegqN8nCpg,24912876
3
+ aws_cdk/_jsii/__init__.py,sha256=vrR5balmQlg3GD2QmOz_V7gH4R5d2gTaj2QkC3mu2zg,1543
4
+ aws_cdk/_jsii/aws-cdk-lib@2.189.1.jsii.tgz,sha256=EIife09UprPNSONyf98Bx2D8zXedc8uH_1kS_CScqvU,24914949
5
5
  aws_cdk/alexa_ask/__init__.py,sha256=yF4ftch7XArzAniw_xoUmGi3wLGeBqIUlOjBTHSxDb4,36370
6
6
  aws_cdk/assertions/__init__.py,sha256=Fe7BZZpx5cUrxKtNdGbU4eXue79txDh_GqjfLV5wgCM,94355
7
7
  aws_cdk/aws_accessanalyzer/__init__.py,sha256=XiNBttjwK1s2CYyccwKCXH5Nzb74L1i6rVnZ9Zwh49I,57464
@@ -288,16 +288,16 @@ aws_cdk/aws_workspacesweb/__init__.py,sha256=CppQEMxEhUPkEPh6MmFFfhsm1c2TybopdiZ
288
288
  aws_cdk/aws_xray/__init__.py,sha256=xEfRY-cPsnAqrrYueXFUxXskU4CxwejB1wrTMGrNKCc,106868
289
289
  aws_cdk/cloud_assembly_schema/__init__.py,sha256=wHlXj15A7f9W-R3uji25dmuU3wrVEPwPY1K9994sf1g,442173
290
290
  aws_cdk/cloudformation_include/__init__.py,sha256=nWU59UskSwMHLVfmA2qrsTOqUk65NWElIPTvp-KLA_8,50358
291
- aws_cdk/custom_resources/__init__.py,sha256=lZy80GjA5K94Dr5vkA4C_77fc4Ow0vrSBQ-4P6K2M18,173059
291
+ aws_cdk/custom_resources/__init__.py,sha256=e-O8RnTVodaNjcUE4bBFfd-7fs2bAZU8OUBi0jXa-bs,173052
292
292
  aws_cdk/cx_api/__init__.py,sha256=Mr8k4GD-Ri_RNHCRg1XmAuvWslDobHbHrokUJZpBvV0,178992
293
293
  aws_cdk/lambda_layer_awscli/__init__.py,sha256=FUcVOwp5XHkYiFms2BGfZWWYCo4vujoEtc9uN-Jc570,3291
294
294
  aws_cdk/lambda_layer_node_proxy_agent/__init__.py,sha256=Q0PMbPsP4A7YO-YZe9esn-iziyQHEXR5z1CSSNfeHn8,3306
295
295
  aws_cdk/pipelines/__init__.py,sha256=G30L4IJCcklHZ5tZjASyAYk6oDjCdERXQaeYiESh6ig,402861
296
296
  aws_cdk/region_info/__init__.py,sha256=5GAO_ld0t-3caLW28eV9FWHMrqRq5CyV1L4pFALx9Y4,39656
297
297
  aws_cdk/triggers/__init__.py,sha256=fPVnj7ot9BFSzO-cTWQz9bMuGPG1hqZFJ7ROMkq0vnk,123578
298
- aws_cdk_lib-2.189.0.dist-info/LICENSE,sha256=y47tc38H0C4DpGljYUZDl8XxidQjNxxGLq-K4jwv6Xc,11391
299
- aws_cdk_lib-2.189.0.dist-info/METADATA,sha256=JqnGNtnNbN4ZGO3_fVUyLsHj61mq7KEuHCa8WWSi1c0,59922
300
- aws_cdk_lib-2.189.0.dist-info/NOTICE,sha256=lrDSwMl9zn-5xv2z3qp2Rw6Nm8pARejpIJ5eXzJtuQk,41177
301
- aws_cdk_lib-2.189.0.dist-info/WHEEL,sha256=iAkIy5fosb7FzIOwONchHf19Qu7_1wCWyFNR5gu9nU0,91
302
- aws_cdk_lib-2.189.0.dist-info/top_level.txt,sha256=1TALAKbuUGsMSrfKWEf268lySCmcqSEO6cDYe_XlLHM,8
303
- aws_cdk_lib-2.189.0.dist-info/RECORD,,
298
+ aws_cdk_lib-2.189.1.dist-info/LICENSE,sha256=y47tc38H0C4DpGljYUZDl8XxidQjNxxGLq-K4jwv6Xc,11391
299
+ aws_cdk_lib-2.189.1.dist-info/METADATA,sha256=gKjGyso96lZDwSRafz6_8hUOPN6CbOkxgv5iC3Bp8jo,59922
300
+ aws_cdk_lib-2.189.1.dist-info/NOTICE,sha256=lrDSwMl9zn-5xv2z3qp2Rw6Nm8pARejpIJ5eXzJtuQk,41177
301
+ aws_cdk_lib-2.189.1.dist-info/WHEEL,sha256=iAkIy5fosb7FzIOwONchHf19Qu7_1wCWyFNR5gu9nU0,91
302
+ aws_cdk_lib-2.189.1.dist-info/top_level.txt,sha256=1TALAKbuUGsMSrfKWEf268lySCmcqSEO6cDYe_XlLHM,8
303
+ aws_cdk_lib-2.189.1.dist-info/RECORD,,