aws-cdk.app-staging-synthesizer-alpha 2.159.0a0__py3-none-any.whl → 2.160.0a0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk.app-staging-synthesizer-alpha might be problematic. Click here for more details.

@@ -338,8 +338,8 @@ Or you can roll your own staging resources from scratch, as long as it implement
338
338
  ```python
339
339
  @jsii.implements(IStagingResources)
340
340
  class CustomStagingStack(Stack):
341
- def __init__(self, scope, id, *, description=None, env=None, stackName=None, tags=None, synthesizer=None, terminationProtection=None, analyticsReporting=None, crossRegionReferences=None, permissionsBoundary=None, suppressTemplateIndentation=None):
342
- super().__init__(scope, id, description=description, env=env, stackName=stackName, tags=tags, synthesizer=synthesizer, terminationProtection=terminationProtection, analyticsReporting=analyticsReporting, crossRegionReferences=crossRegionReferences, permissionsBoundary=permissionsBoundary, suppressTemplateIndentation=suppressTemplateIndentation)
341
+ def __init__(self, scope, id, *, description=None, env=None, stackName=None, tags=None, notificationArns=None, synthesizer=None, terminationProtection=None, analyticsReporting=None, crossRegionReferences=None, permissionsBoundary=None, suppressTemplateIndentation=None):
342
+ super().__init__(scope, id, description=description, env=env, stackName=stackName, tags=tags, notificationArns=notificationArns, synthesizer=synthesizer, terminationProtection=terminationProtection, analyticsReporting=analyticsReporting, crossRegionReferences=crossRegionReferences, permissionsBoundary=permissionsBoundary, suppressTemplateIndentation=suppressTemplateIndentation)
343
343
 
344
344
  def add_file(self, *, sourceHash, executable=None, fileName=None, packaging=None, deployTime=None):
345
345
  return FileStagingLocation(
@@ -1547,6 +1547,7 @@ class DefaultStagingStackOptions:
1547
1547
  "cross_region_references": "crossRegionReferences",
1548
1548
  "description": "description",
1549
1549
  "env": "env",
1550
+ "notification_arns": "notificationArns",
1550
1551
  "permissions_boundary": "permissionsBoundary",
1551
1552
  "stack_name": "stackName",
1552
1553
  "suppress_template_indentation": "suppressTemplateIndentation",
@@ -1577,6 +1578,7 @@ class DefaultStagingStackProps(
1577
1578
  cross_region_references: typing.Optional[builtins.bool] = None,
1578
1579
  description: typing.Optional[builtins.str] = None,
1579
1580
  env: typing.Optional[typing.Union[_aws_cdk_ceddda9d.Environment, typing.Dict[builtins.str, typing.Any]]] = None,
1581
+ notification_arns: typing.Optional[typing.Sequence[builtins.str]] = None,
1580
1582
  permissions_boundary: typing.Optional[_aws_cdk_ceddda9d.PermissionsBoundary] = None,
1581
1583
  stack_name: typing.Optional[builtins.str] = None,
1582
1584
  suppress_template_indentation: typing.Optional[builtins.bool] = None,
@@ -1601,6 +1603,7 @@ class DefaultStagingStackProps(
1601
1603
  :param cross_region_references: Enable this flag to allow native cross region stack references. Enabling this will create a CloudFormation custom resource in both the producing stack and consuming stack in order to perform the export/import This feature is currently experimental Default: false
1602
1604
  :param description: A description of the stack. Default: - No description.
1603
1605
  :param env: The AWS environment (account/region) where this stack will be deployed. Set the ``region``/``account`` fields of ``env`` to either a concrete value to select the indicated environment (recommended for production stacks), or to the values of environment variables ``CDK_DEFAULT_REGION``/``CDK_DEFAULT_ACCOUNT`` to let the target environment depend on the AWS credentials/configuration that the CDK CLI is executed under (recommended for development stacks). If the ``Stack`` is instantiated inside a ``Stage``, any undefined ``region``/``account`` fields from ``env`` will default to the same field on the encompassing ``Stage``, if configured there. If either ``region`` or ``account`` are not set nor inherited from ``Stage``, the Stack will be considered "*environment-agnostic*"". Environment-agnostic stacks can be deployed to any environment but may not be able to take advantage of all features of the CDK. For example, they will not be able to use environmental context lookups such as ``ec2.Vpc.fromLookup`` and will not automatically translate Service Principals to the right format based on the environment's AWS partition, and other such enhancements. Default: - The environment of the containing ``Stage`` if available, otherwise create the stack will be environment-agnostic.
1606
+ :param notification_arns: SNS Topic ARNs that will receive stack events. Default: - no notfication arns.
1604
1607
  :param permissions_boundary: Options for applying a permissions boundary to all IAM Roles and Users created within this Stage. Default: - no permissions boundary is applied
1605
1608
  :param stack_name: Name to deploy the stack with. Default: - Derived from construct path.
1606
1609
  :param suppress_template_indentation: Enable this flag to suppress indentation in generated CloudFormation templates. If not specified, the value of the ``@aws-cdk/core:suppressTemplateIndentation`` context key will be used. If that is not specified, then the default value ``false`` will be used. Default: - the value of ``@aws-cdk/core:suppressTemplateIndentation``, or ``false`` if that is not set.
@@ -1644,6 +1647,7 @@ class DefaultStagingStackProps(
1644
1647
  file_asset_publishing_role=bootstrap_role,
1645
1648
  image_asset_publishing_role=bootstrap_role,
1646
1649
  image_asset_version_count=123,
1650
+ notification_arns=["notificationArns"],
1647
1651
  permissions_boundary=permissions_boundary,
1648
1652
  stack_name="stackName",
1649
1653
  staging_bucket_name="stagingBucketName",
@@ -1673,6 +1677,7 @@ class DefaultStagingStackProps(
1673
1677
  check_type(argname="argument cross_region_references", value=cross_region_references, expected_type=type_hints["cross_region_references"])
1674
1678
  check_type(argname="argument description", value=description, expected_type=type_hints["description"])
1675
1679
  check_type(argname="argument env", value=env, expected_type=type_hints["env"])
1680
+ check_type(argname="argument notification_arns", value=notification_arns, expected_type=type_hints["notification_arns"])
1676
1681
  check_type(argname="argument permissions_boundary", value=permissions_boundary, expected_type=type_hints["permissions_boundary"])
1677
1682
  check_type(argname="argument stack_name", value=stack_name, expected_type=type_hints["stack_name"])
1678
1683
  check_type(argname="argument suppress_template_indentation", value=suppress_template_indentation, expected_type=type_hints["suppress_template_indentation"])
@@ -1708,6 +1713,8 @@ class DefaultStagingStackProps(
1708
1713
  self._values["description"] = description
1709
1714
  if env is not None:
1710
1715
  self._values["env"] = env
1716
+ if notification_arns is not None:
1717
+ self._values["notification_arns"] = notification_arns
1711
1718
  if permissions_boundary is not None:
1712
1719
  self._values["permissions_boundary"] = permissions_boundary
1713
1720
  if stack_name is not None:
@@ -1963,6 +1970,15 @@ class DefaultStagingStackProps(
1963
1970
  result = self._values.get("env")
1964
1971
  return typing.cast(typing.Optional[_aws_cdk_ceddda9d.Environment], result)
1965
1972
 
1973
+ @builtins.property
1974
+ def notification_arns(self) -> typing.Optional[typing.List[builtins.str]]:
1975
+ '''SNS Topic ARNs that will receive stack events.
1976
+
1977
+ :default: - no notfication arns.
1978
+ '''
1979
+ result = self._values.get("notification_arns")
1980
+ return typing.cast(typing.Optional[typing.List[builtins.str]], result)
1981
+
1966
1982
  @builtins.property
1967
1983
  def permissions_boundary(
1968
1984
  self,
@@ -3198,6 +3214,7 @@ class DefaultStagingStack(
3198
3214
  cross_region_references: typing.Optional[builtins.bool] = None,
3199
3215
  description: typing.Optional[builtins.str] = None,
3200
3216
  env: typing.Optional[typing.Union[_aws_cdk_ceddda9d.Environment, typing.Dict[builtins.str, typing.Any]]] = None,
3217
+ notification_arns: typing.Optional[typing.Sequence[builtins.str]] = None,
3201
3218
  permissions_boundary: typing.Optional[_aws_cdk_ceddda9d.PermissionsBoundary] = None,
3202
3219
  stack_name: typing.Optional[builtins.str] = None,
3203
3220
  suppress_template_indentation: typing.Optional[builtins.bool] = None,
@@ -3223,6 +3240,7 @@ class DefaultStagingStack(
3223
3240
  :param cross_region_references: Enable this flag to allow native cross region stack references. Enabling this will create a CloudFormation custom resource in both the producing stack and consuming stack in order to perform the export/import This feature is currently experimental Default: false
3224
3241
  :param description: A description of the stack. Default: - No description.
3225
3242
  :param env: The AWS environment (account/region) where this stack will be deployed. Set the ``region``/``account`` fields of ``env`` to either a concrete value to select the indicated environment (recommended for production stacks), or to the values of environment variables ``CDK_DEFAULT_REGION``/``CDK_DEFAULT_ACCOUNT`` to let the target environment depend on the AWS credentials/configuration that the CDK CLI is executed under (recommended for development stacks). If the ``Stack`` is instantiated inside a ``Stage``, any undefined ``region``/``account`` fields from ``env`` will default to the same field on the encompassing ``Stage``, if configured there. If either ``region`` or ``account`` are not set nor inherited from ``Stage``, the Stack will be considered "*environment-agnostic*"". Environment-agnostic stacks can be deployed to any environment but may not be able to take advantage of all features of the CDK. For example, they will not be able to use environmental context lookups such as ``ec2.Vpc.fromLookup`` and will not automatically translate Service Principals to the right format based on the environment's AWS partition, and other such enhancements. Default: - The environment of the containing ``Stage`` if available, otherwise create the stack will be environment-agnostic.
3243
+ :param notification_arns: SNS Topic ARNs that will receive stack events. Default: - no notfication arns.
3226
3244
  :param permissions_boundary: Options for applying a permissions boundary to all IAM Roles and Users created within this Stage. Default: - no permissions boundary is applied
3227
3245
  :param stack_name: Name to deploy the stack with. Default: - Derived from construct path.
3228
3246
  :param suppress_template_indentation: Enable this flag to suppress indentation in generated CloudFormation templates. If not specified, the value of the ``@aws-cdk/core:suppressTemplateIndentation`` context key will be used. If that is not specified, then the default value ``false`` will be used. Default: - the value of ``@aws-cdk/core:suppressTemplateIndentation``, or ``false`` if that is not set.
@@ -3252,6 +3270,7 @@ class DefaultStagingStack(
3252
3270
  cross_region_references=cross_region_references,
3253
3271
  description=description,
3254
3272
  env=env,
3273
+ notification_arns=notification_arns,
3255
3274
  permissions_boundary=permissions_boundary,
3256
3275
  stack_name=stack_name,
3257
3276
  suppress_template_indentation=suppress_template_indentation,
@@ -3546,6 +3565,7 @@ def _typecheckingstub__ac9f132bcac8375ac08c16bf3c9bb7407b641e71cfd23cea8b50befa3
3546
3565
  cross_region_references: typing.Optional[builtins.bool] = None,
3547
3566
  description: typing.Optional[builtins.str] = None,
3548
3567
  env: typing.Optional[typing.Union[_aws_cdk_ceddda9d.Environment, typing.Dict[builtins.str, typing.Any]]] = None,
3568
+ notification_arns: typing.Optional[typing.Sequence[builtins.str]] = None,
3549
3569
  permissions_boundary: typing.Optional[_aws_cdk_ceddda9d.PermissionsBoundary] = None,
3550
3570
  stack_name: typing.Optional[builtins.str] = None,
3551
3571
  suppress_template_indentation: typing.Optional[builtins.bool] = None,
@@ -3647,6 +3667,7 @@ def _typecheckingstub__ca741a4572a1f95a8d82e9d029388b8a2d72acacb69715277b6a785b4
3647
3667
  cross_region_references: typing.Optional[builtins.bool] = None,
3648
3668
  description: typing.Optional[builtins.str] = None,
3649
3669
  env: typing.Optional[typing.Union[_aws_cdk_ceddda9d.Environment, typing.Dict[builtins.str, typing.Any]]] = None,
3670
+ notification_arns: typing.Optional[typing.Sequence[builtins.str]] = None,
3650
3671
  permissions_boundary: typing.Optional[_aws_cdk_ceddda9d.PermissionsBoundary] = None,
3651
3672
  stack_name: typing.Optional[builtins.str] = None,
3652
3673
  suppress_template_indentation: typing.Optional[builtins.bool] = None,
@@ -33,9 +33,9 @@ import constructs._jsii
33
33
 
34
34
  __jsii_assembly__ = jsii.JSIIAssembly.load(
35
35
  "@aws-cdk/app-staging-synthesizer-alpha",
36
- "2.159.0-alpha.0",
36
+ "2.160.0-alpha.0",
37
37
  __name__[0:-6],
38
- "app-staging-synthesizer-alpha@2.159.0-alpha.0.jsii.tgz",
38
+ "app-staging-synthesizer-alpha@2.160.0-alpha.0.jsii.tgz",
39
39
  )
40
40
 
41
41
  __all__ = [
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: aws-cdk.app-staging-synthesizer-alpha
3
- Version: 2.159.0a0
3
+ Version: 2.160.0a0
4
4
  Summary: Cdk synthesizer for with app-scoped staging stack
5
5
  Home-page: https://github.com/aws/aws-cdk
6
6
  Author: Amazon Web Services
@@ -23,7 +23,7 @@ Requires-Python: ~=3.8
23
23
  Description-Content-Type: text/markdown
24
24
  License-File: LICENSE
25
25
  License-File: NOTICE
26
- Requires-Dist: aws-cdk-lib<3.0.0,>=2.159.0
26
+ Requires-Dist: aws-cdk-lib<3.0.0,>=2.160.0
27
27
  Requires-Dist: constructs<11.0.0,>=10.0.0
28
28
  Requires-Dist: jsii<2.0.0,>=1.103.1
29
29
  Requires-Dist: publication>=0.0.3
@@ -368,8 +368,8 @@ Or you can roll your own staging resources from scratch, as long as it implement
368
368
  ```python
369
369
  @jsii.implements(IStagingResources)
370
370
  class CustomStagingStack(Stack):
371
- def __init__(self, scope, id, *, description=None, env=None, stackName=None, tags=None, synthesizer=None, terminationProtection=None, analyticsReporting=None, crossRegionReferences=None, permissionsBoundary=None, suppressTemplateIndentation=None):
372
- super().__init__(scope, id, description=description, env=env, stackName=stackName, tags=tags, synthesizer=synthesizer, terminationProtection=terminationProtection, analyticsReporting=analyticsReporting, crossRegionReferences=crossRegionReferences, permissionsBoundary=permissionsBoundary, suppressTemplateIndentation=suppressTemplateIndentation)
371
+ def __init__(self, scope, id, *, description=None, env=None, stackName=None, tags=None, notificationArns=None, synthesizer=None, terminationProtection=None, analyticsReporting=None, crossRegionReferences=None, permissionsBoundary=None, suppressTemplateIndentation=None):
372
+ super().__init__(scope, id, description=description, env=env, stackName=stackName, tags=tags, notificationArns=notificationArns, synthesizer=synthesizer, terminationProtection=terminationProtection, analyticsReporting=analyticsReporting, crossRegionReferences=crossRegionReferences, permissionsBoundary=permissionsBoundary, suppressTemplateIndentation=suppressTemplateIndentation)
373
373
 
374
374
  def add_file(self, *, sourceHash, executable=None, fileName=None, packaging=None, deployTime=None):
375
375
  return FileStagingLocation(
@@ -0,0 +1,10 @@
1
+ aws_cdk/app_staging_synthesizer_alpha/__init__.py,sha256=qpUVbFUfadhN0McXqCYSswoRG2TfMFrOlaB5HzT6VZA,205242
2
+ aws_cdk/app_staging_synthesizer_alpha/py.typed,sha256=AbpHGcgLb-kRsJGnwFEktk7uzpZOCcBY74-YBdrKVGs,1
3
+ aws_cdk/app_staging_synthesizer_alpha/_jsii/__init__.py,sha256=y_bAXo_KWlcs3tvwzmcuvHKlbUihPKTalEqa3Soot8o,1511
4
+ aws_cdk/app_staging_synthesizer_alpha/_jsii/app-staging-synthesizer-alpha@2.160.0-alpha.0.jsii.tgz,sha256=mq2U_hJ3OZWwKow2f2H0L0BDGuoPTS47uhW8cZ1GXco,86643
5
+ aws_cdk.app_staging_synthesizer_alpha-2.160.0a0.dist-info/LICENSE,sha256=kEDF86xJUQh1E9M7UPKKbHepBEdFxIUyoGfTwQB7zKg,11391
6
+ aws_cdk.app_staging_synthesizer_alpha-2.160.0a0.dist-info/METADATA,sha256=zNBNW2BLzzJh0KZYCRgcBf_Bv86us84qMDmq4fy2CuQ,18325
7
+ aws_cdk.app_staging_synthesizer_alpha-2.160.0a0.dist-info/NOTICE,sha256=dXf56qvx2VDNCaqiRscOD2IH5GbmqbnKRzroZCeLtaQ,113
8
+ aws_cdk.app_staging_synthesizer_alpha-2.160.0a0.dist-info/WHEEL,sha256=eOLhNAGa2EW3wWl_TU484h7q1UNgy0JXjjoqKoxAAQc,92
9
+ aws_cdk.app_staging_synthesizer_alpha-2.160.0a0.dist-info/top_level.txt,sha256=1TALAKbuUGsMSrfKWEf268lySCmcqSEO6cDYe_XlLHM,8
10
+ aws_cdk.app_staging_synthesizer_alpha-2.160.0a0.dist-info/RECORD,,
@@ -1,10 +0,0 @@
1
- aws_cdk/app_staging_synthesizer_alpha/__init__.py,sha256=ykdfm_lltCJI7m48fyr6ETFq72FsLXGaByU7GDEWCbo,203894
2
- aws_cdk/app_staging_synthesizer_alpha/py.typed,sha256=AbpHGcgLb-kRsJGnwFEktk7uzpZOCcBY74-YBdrKVGs,1
3
- aws_cdk/app_staging_synthesizer_alpha/_jsii/__init__.py,sha256=RRf83XQlvBHieVSmgCnl0FUr9Tbv1xF8Hs6jqQOn3ac,1511
4
- aws_cdk/app_staging_synthesizer_alpha/_jsii/app-staging-synthesizer-alpha@2.159.0-alpha.0.jsii.tgz,sha256=dCZB4GyUNqqso-QsBKNSgFmia2vvVvv0TFj9ZRr2Zww,86585
5
- aws_cdk.app_staging_synthesizer_alpha-2.159.0a0.dist-info/LICENSE,sha256=kEDF86xJUQh1E9M7UPKKbHepBEdFxIUyoGfTwQB7zKg,11391
6
- aws_cdk.app_staging_synthesizer_alpha-2.159.0a0.dist-info/METADATA,sha256=1qWcDWOwak88TrMFiSNCTDdo6etRpXBNAvbUR7OtWaU,18267
7
- aws_cdk.app_staging_synthesizer_alpha-2.159.0a0.dist-info/NOTICE,sha256=dXf56qvx2VDNCaqiRscOD2IH5GbmqbnKRzroZCeLtaQ,113
8
- aws_cdk.app_staging_synthesizer_alpha-2.159.0a0.dist-info/WHEEL,sha256=eOLhNAGa2EW3wWl_TU484h7q1UNgy0JXjjoqKoxAAQc,92
9
- aws_cdk.app_staging_synthesizer_alpha-2.159.0a0.dist-info/top_level.txt,sha256=1TALAKbuUGsMSrfKWEf268lySCmcqSEO6cDYe_XlLHM,8
10
- aws_cdk.app_staging_synthesizer_alpha-2.159.0a0.dist-info/RECORD,,