aws-cdk.app-staging-synthesizer-alpha 2.173.4a0__tar.gz → 2.227.0a0__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk.app-staging-synthesizer-alpha might be problematic. Click here for more details.
- {aws_cdk_app_staging_synthesizer_alpha-2.173.4a0 → aws_cdk_app_staging_synthesizer_alpha-2.227.0a0}/LICENSE +1 -1
- aws_cdk_app_staging_synthesizer_alpha-2.227.0a0/NOTICE +2 -0
- {aws_cdk_app_staging_synthesizer_alpha-2.173.4a0/src/aws_cdk.app_staging_synthesizer_alpha.egg-info → aws_cdk_app_staging_synthesizer_alpha-2.227.0a0}/PKG-INFO +9 -10
- {aws_cdk_app_staging_synthesizer_alpha-2.173.4a0 → aws_cdk_app_staging_synthesizer_alpha-2.227.0a0}/README.md +5 -5
- {aws_cdk_app_staging_synthesizer_alpha-2.173.4a0 → aws_cdk_app_staging_synthesizer_alpha-2.227.0a0}/pyproject.toml +2 -2
- {aws_cdk_app_staging_synthesizer_alpha-2.173.4a0 → aws_cdk_app_staging_synthesizer_alpha-2.227.0a0}/setup.py +5 -6
- {aws_cdk_app_staging_synthesizer_alpha-2.173.4a0 → aws_cdk_app_staging_synthesizer_alpha-2.227.0a0}/src/aws_cdk/app_staging_synthesizer_alpha/__init__.py +71 -14
- {aws_cdk_app_staging_synthesizer_alpha-2.173.4a0 → aws_cdk_app_staging_synthesizer_alpha-2.227.0a0}/src/aws_cdk/app_staging_synthesizer_alpha/_jsii/__init__.py +2 -2
- aws_cdk_app_staging_synthesizer_alpha-2.227.0a0/src/aws_cdk/app_staging_synthesizer_alpha/_jsii/app-staging-synthesizer-alpha@2.227.0-alpha.0.jsii.tgz +0 -0
- {aws_cdk_app_staging_synthesizer_alpha-2.173.4a0 → aws_cdk_app_staging_synthesizer_alpha-2.227.0a0/src/aws_cdk.app_staging_synthesizer_alpha.egg-info}/PKG-INFO +9 -10
- {aws_cdk_app_staging_synthesizer_alpha-2.173.4a0 → aws_cdk_app_staging_synthesizer_alpha-2.227.0a0}/src/aws_cdk.app_staging_synthesizer_alpha.egg-info/SOURCES.txt +1 -1
- {aws_cdk_app_staging_synthesizer_alpha-2.173.4a0 → aws_cdk_app_staging_synthesizer_alpha-2.227.0a0}/src/aws_cdk.app_staging_synthesizer_alpha.egg-info/requires.txt +2 -2
- aws_cdk_app_staging_synthesizer_alpha-2.173.4a0/NOTICE +0 -2
- aws_cdk_app_staging_synthesizer_alpha-2.173.4a0/src/aws_cdk/app_staging_synthesizer_alpha/_jsii/app-staging-synthesizer-alpha@2.173.4-alpha.0.jsii.tgz +0 -0
- {aws_cdk_app_staging_synthesizer_alpha-2.173.4a0 → aws_cdk_app_staging_synthesizer_alpha-2.227.0a0}/MANIFEST.in +0 -0
- {aws_cdk_app_staging_synthesizer_alpha-2.173.4a0 → aws_cdk_app_staging_synthesizer_alpha-2.227.0a0}/setup.cfg +0 -0
- {aws_cdk_app_staging_synthesizer_alpha-2.173.4a0 → aws_cdk_app_staging_synthesizer_alpha-2.227.0a0}/src/aws_cdk/app_staging_synthesizer_alpha/py.typed +0 -0
- {aws_cdk_app_staging_synthesizer_alpha-2.173.4a0 → aws_cdk_app_staging_synthesizer_alpha-2.227.0a0}/src/aws_cdk.app_staging_synthesizer_alpha.egg-info/dependency_links.txt +0 -0
- {aws_cdk_app_staging_synthesizer_alpha-2.173.4a0 → aws_cdk_app_staging_synthesizer_alpha-2.227.0a0}/src/aws_cdk.app_staging_synthesizer_alpha.egg-info/top_level.txt +0 -0
|
@@ -186,7 +186,7 @@
|
|
|
186
186
|
same "printed page" as the copyright notice for easier
|
|
187
187
|
identification within third-party archives.
|
|
188
188
|
|
|
189
|
-
Copyright 2018-
|
|
189
|
+
Copyright 2018-2025 Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
|
190
190
|
|
|
191
191
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
192
192
|
you may not use this file except in compliance with the License.
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.1
|
|
2
2
|
Name: aws-cdk.app-staging-synthesizer-alpha
|
|
3
|
-
Version: 2.
|
|
3
|
+
Version: 2.227.0a0
|
|
4
4
|
Summary: Cdk synthesizer for with app-scoped staging stack
|
|
5
5
|
Home-page: https://github.com/aws/aws-cdk
|
|
6
6
|
Author: Amazon Web Services
|
|
@@ -10,7 +10,6 @@ Classifier: Intended Audience :: Developers
|
|
|
10
10
|
Classifier: Operating System :: OS Independent
|
|
11
11
|
Classifier: Programming Language :: JavaScript
|
|
12
12
|
Classifier: Programming Language :: Python :: 3 :: Only
|
|
13
|
-
Classifier: Programming Language :: Python :: 3.8
|
|
14
13
|
Classifier: Programming Language :: Python :: 3.9
|
|
15
14
|
Classifier: Programming Language :: Python :: 3.10
|
|
16
15
|
Classifier: Programming Language :: Python :: 3.11
|
|
@@ -19,13 +18,13 @@ Classifier: Development Status :: 4 - Beta
|
|
|
19
18
|
Classifier: License :: OSI Approved
|
|
20
19
|
Classifier: Framework :: AWS CDK
|
|
21
20
|
Classifier: Framework :: AWS CDK :: 2
|
|
22
|
-
Requires-Python: ~=3.
|
|
21
|
+
Requires-Python: ~=3.9
|
|
23
22
|
Description-Content-Type: text/markdown
|
|
24
23
|
License-File: LICENSE
|
|
25
24
|
License-File: NOTICE
|
|
26
|
-
Requires-Dist: aws-cdk-lib<3.0.0,>=2.
|
|
25
|
+
Requires-Dist: aws-cdk-lib<3.0.0,>=2.227.0
|
|
27
26
|
Requires-Dist: constructs<11.0.0,>=10.0.0
|
|
28
|
-
Requires-Dist: jsii<2.0.0,>=1.
|
|
27
|
+
Requires-Dist: jsii<2.0.0,>=1.119.0
|
|
29
28
|
Requires-Dist: publication>=0.0.3
|
|
30
29
|
Requires-Dist: typeguard<4.3.0,>=2.13.3
|
|
31
30
|
|
|
@@ -203,7 +202,7 @@ These credentials must have the ability to perform CloudFormation calls,
|
|
|
203
202
|
lookup resources in your account, and perform CloudFormation deployment.
|
|
204
203
|
For a full list of what is necessary, see `LookupRole`, `DeploymentActionRole`,
|
|
205
204
|
and `CloudFormationExecutionRole` in the
|
|
206
|
-
[bootstrap template](https://github.com/aws/aws-cdk/blob/main/packages/aws-cdk/lib/api/bootstrap/bootstrap-template.yaml).
|
|
205
|
+
[bootstrap template](https://github.com/aws/aws-cdk-cli/blob/main/packages/aws-cdk/lib/api/bootstrap/bootstrap-template.yaml).
|
|
207
206
|
|
|
208
207
|
```python
|
|
209
208
|
from aws_cdk.aws_s3 import BucketEncryption
|
|
@@ -368,17 +367,17 @@ Or you can roll your own staging resources from scratch, as long as it implement
|
|
|
368
367
|
```python
|
|
369
368
|
@jsii.implements(IStagingResources)
|
|
370
369
|
class CustomStagingStack(Stack):
|
|
371
|
-
def __init__(self, scope, id, *, description=None, env=None, stackName=None, tags=None, notificationArns=None, synthesizer=None, terminationProtection=None, analyticsReporting=None, crossRegionReferences=None, permissionsBoundary=None, suppressTemplateIndentation=None):
|
|
372
|
-
super().__init__(scope, id, description=description, env=env, stackName=stackName, tags=tags, notificationArns=notificationArns, synthesizer=synthesizer, terminationProtection=terminationProtection, analyticsReporting=analyticsReporting, crossRegionReferences=crossRegionReferences, permissionsBoundary=permissionsBoundary, suppressTemplateIndentation=suppressTemplateIndentation)
|
|
370
|
+
def __init__(self, scope, id, *, description=None, env=None, stackName=None, tags=None, notificationArns=None, synthesizer=None, terminationProtection=None, analyticsReporting=None, crossRegionReferences=None, permissionsBoundary=None, suppressTemplateIndentation=None, propertyInjectors=None):
|
|
371
|
+
super().__init__(scope, id, description=description, env=env, stackName=stackName, tags=tags, notificationArns=notificationArns, synthesizer=synthesizer, terminationProtection=terminationProtection, analyticsReporting=analyticsReporting, crossRegionReferences=crossRegionReferences, permissionsBoundary=permissionsBoundary, suppressTemplateIndentation=suppressTemplateIndentation, propertyInjectors=propertyInjectors)
|
|
373
372
|
|
|
374
|
-
def add_file(self, *, sourceHash, executable=None, fileName=None, packaging=None, deployTime=None):
|
|
373
|
+
def add_file(self, *, sourceHash, executable=None, fileName=None, packaging=None, deployTime=None, displayName=None):
|
|
375
374
|
return FileStagingLocation(
|
|
376
375
|
bucket_name="amzn-s3-demo-bucket",
|
|
377
376
|
assume_role_arn="myArn",
|
|
378
377
|
dependency_stack=self
|
|
379
378
|
)
|
|
380
379
|
|
|
381
|
-
def add_docker_image(self, *, sourceHash, executable=None, directoryName=None, dockerBuildArgs=None, dockerBuildSecrets=None, dockerBuildSsh=None, dockerBuildTarget=None, dockerFile=None, repositoryName=None, networkMode=None, platform=None, dockerOutputs=None, assetName=None, dockerCacheFrom=None, dockerCacheTo=None, dockerCacheDisabled=None):
|
|
380
|
+
def add_docker_image(self, *, sourceHash, executable=None, directoryName=None, dockerBuildArgs=None, dockerBuildSecrets=None, dockerBuildSsh=None, dockerBuildTarget=None, dockerFile=None, repositoryName=None, networkMode=None, platform=None, dockerOutputs=None, assetName=None, dockerCacheFrom=None, dockerCacheTo=None, dockerCacheDisabled=None, displayName=None):
|
|
382
381
|
return ImageStagingLocation(
|
|
383
382
|
repo_name="myRepo",
|
|
384
383
|
assume_role_arn="myArn",
|
|
@@ -172,7 +172,7 @@ These credentials must have the ability to perform CloudFormation calls,
|
|
|
172
172
|
lookup resources in your account, and perform CloudFormation deployment.
|
|
173
173
|
For a full list of what is necessary, see `LookupRole`, `DeploymentActionRole`,
|
|
174
174
|
and `CloudFormationExecutionRole` in the
|
|
175
|
-
[bootstrap template](https://github.com/aws/aws-cdk/blob/main/packages/aws-cdk/lib/api/bootstrap/bootstrap-template.yaml).
|
|
175
|
+
[bootstrap template](https://github.com/aws/aws-cdk-cli/blob/main/packages/aws-cdk/lib/api/bootstrap/bootstrap-template.yaml).
|
|
176
176
|
|
|
177
177
|
```python
|
|
178
178
|
from aws_cdk.aws_s3 import BucketEncryption
|
|
@@ -337,17 +337,17 @@ Or you can roll your own staging resources from scratch, as long as it implement
|
|
|
337
337
|
```python
|
|
338
338
|
@jsii.implements(IStagingResources)
|
|
339
339
|
class CustomStagingStack(Stack):
|
|
340
|
-
def __init__(self, scope, id, *, description=None, env=None, stackName=None, tags=None, notificationArns=None, synthesizer=None, terminationProtection=None, analyticsReporting=None, crossRegionReferences=None, permissionsBoundary=None, suppressTemplateIndentation=None):
|
|
341
|
-
super().__init__(scope, id, description=description, env=env, stackName=stackName, tags=tags, notificationArns=notificationArns, synthesizer=synthesizer, terminationProtection=terminationProtection, analyticsReporting=analyticsReporting, crossRegionReferences=crossRegionReferences, permissionsBoundary=permissionsBoundary, suppressTemplateIndentation=suppressTemplateIndentation)
|
|
340
|
+
def __init__(self, scope, id, *, description=None, env=None, stackName=None, tags=None, notificationArns=None, synthesizer=None, terminationProtection=None, analyticsReporting=None, crossRegionReferences=None, permissionsBoundary=None, suppressTemplateIndentation=None, propertyInjectors=None):
|
|
341
|
+
super().__init__(scope, id, description=description, env=env, stackName=stackName, tags=tags, notificationArns=notificationArns, synthesizer=synthesizer, terminationProtection=terminationProtection, analyticsReporting=analyticsReporting, crossRegionReferences=crossRegionReferences, permissionsBoundary=permissionsBoundary, suppressTemplateIndentation=suppressTemplateIndentation, propertyInjectors=propertyInjectors)
|
|
342
342
|
|
|
343
|
-
def add_file(self, *, sourceHash, executable=None, fileName=None, packaging=None, deployTime=None):
|
|
343
|
+
def add_file(self, *, sourceHash, executable=None, fileName=None, packaging=None, deployTime=None, displayName=None):
|
|
344
344
|
return FileStagingLocation(
|
|
345
345
|
bucket_name="amzn-s3-demo-bucket",
|
|
346
346
|
assume_role_arn="myArn",
|
|
347
347
|
dependency_stack=self
|
|
348
348
|
)
|
|
349
349
|
|
|
350
|
-
def add_docker_image(self, *, sourceHash, executable=None, directoryName=None, dockerBuildArgs=None, dockerBuildSecrets=None, dockerBuildSsh=None, dockerBuildTarget=None, dockerFile=None, repositoryName=None, networkMode=None, platform=None, dockerOutputs=None, assetName=None, dockerCacheFrom=None, dockerCacheTo=None, dockerCacheDisabled=None):
|
|
350
|
+
def add_docker_image(self, *, sourceHash, executable=None, directoryName=None, dockerBuildArgs=None, dockerBuildSecrets=None, dockerBuildSsh=None, dockerBuildTarget=None, dockerFile=None, repositoryName=None, networkMode=None, platform=None, dockerOutputs=None, assetName=None, dockerCacheFrom=None, dockerCacheTo=None, dockerCacheDisabled=None, displayName=None):
|
|
351
351
|
return ImageStagingLocation(
|
|
352
352
|
repo_name="myRepo",
|
|
353
353
|
assume_role_arn="myArn",
|
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
[build-system]
|
|
2
|
-
requires = ["setuptools~=
|
|
2
|
+
requires = ["setuptools~=75.3.2", "build~=1.3.0"]
|
|
3
3
|
build-backend = "setuptools.build_meta"
|
|
4
4
|
|
|
5
5
|
[tool.pyright]
|
|
6
6
|
defineConstant = { DEBUG = true }
|
|
7
|
-
pythonVersion = "3.
|
|
7
|
+
pythonVersion = "3.9"
|
|
8
8
|
pythonPlatform = "All"
|
|
9
9
|
reportSelfClsParameterName = false
|
|
@@ -5,7 +5,7 @@ kwargs = json.loads(
|
|
|
5
5
|
"""
|
|
6
6
|
{
|
|
7
7
|
"name": "aws-cdk.app-staging-synthesizer-alpha",
|
|
8
|
-
"version": "2.
|
|
8
|
+
"version": "2.227.0.a0",
|
|
9
9
|
"description": "Cdk synthesizer for with app-scoped staging stack",
|
|
10
10
|
"license": "Apache-2.0",
|
|
11
11
|
"url": "https://github.com/aws/aws-cdk",
|
|
@@ -26,17 +26,17 @@ kwargs = json.loads(
|
|
|
26
26
|
],
|
|
27
27
|
"package_data": {
|
|
28
28
|
"aws_cdk.app_staging_synthesizer_alpha._jsii": [
|
|
29
|
-
"app-staging-synthesizer-alpha@2.
|
|
29
|
+
"app-staging-synthesizer-alpha@2.227.0-alpha.0.jsii.tgz"
|
|
30
30
|
],
|
|
31
31
|
"aws_cdk.app_staging_synthesizer_alpha": [
|
|
32
32
|
"py.typed"
|
|
33
33
|
]
|
|
34
34
|
},
|
|
35
|
-
"python_requires": "~=3.
|
|
35
|
+
"python_requires": "~=3.9",
|
|
36
36
|
"install_requires": [
|
|
37
|
-
"aws-cdk-lib>=2.
|
|
37
|
+
"aws-cdk-lib>=2.227.0, <3.0.0",
|
|
38
38
|
"constructs>=10.0.0, <11.0.0",
|
|
39
|
-
"jsii>=1.
|
|
39
|
+
"jsii>=1.119.0, <2.0.0",
|
|
40
40
|
"publication>=0.0.3",
|
|
41
41
|
"typeguard>=2.13.3,<4.3.0"
|
|
42
42
|
],
|
|
@@ -45,7 +45,6 @@ kwargs = json.loads(
|
|
|
45
45
|
"Operating System :: OS Independent",
|
|
46
46
|
"Programming Language :: JavaScript",
|
|
47
47
|
"Programming Language :: Python :: 3 :: Only",
|
|
48
|
-
"Programming Language :: Python :: 3.8",
|
|
49
48
|
"Programming Language :: Python :: 3.9",
|
|
50
49
|
"Programming Language :: Python :: 3.10",
|
|
51
50
|
"Programming Language :: Python :: 3.11",
|
|
@@ -173,7 +173,7 @@ These credentials must have the ability to perform CloudFormation calls,
|
|
|
173
173
|
lookup resources in your account, and perform CloudFormation deployment.
|
|
174
174
|
For a full list of what is necessary, see `LookupRole`, `DeploymentActionRole`,
|
|
175
175
|
and `CloudFormationExecutionRole` in the
|
|
176
|
-
[bootstrap template](https://github.com/aws/aws-cdk/blob/main/packages/aws-cdk/lib/api/bootstrap/bootstrap-template.yaml).
|
|
176
|
+
[bootstrap template](https://github.com/aws/aws-cdk-cli/blob/main/packages/aws-cdk/lib/api/bootstrap/bootstrap-template.yaml).
|
|
177
177
|
|
|
178
178
|
```python
|
|
179
179
|
from aws_cdk.aws_s3 import BucketEncryption
|
|
@@ -338,17 +338,17 @@ Or you can roll your own staging resources from scratch, as long as it implement
|
|
|
338
338
|
```python
|
|
339
339
|
@jsii.implements(IStagingResources)
|
|
340
340
|
class CustomStagingStack(Stack):
|
|
341
|
-
def __init__(self, scope, id, *, description=None, env=None, stackName=None, tags=None, notificationArns=None, synthesizer=None, terminationProtection=None, analyticsReporting=None, crossRegionReferences=None, permissionsBoundary=None, suppressTemplateIndentation=None):
|
|
342
|
-
super().__init__(scope, id, description=description, env=env, stackName=stackName, tags=tags, notificationArns=notificationArns, synthesizer=synthesizer, terminationProtection=terminationProtection, analyticsReporting=analyticsReporting, crossRegionReferences=crossRegionReferences, permissionsBoundary=permissionsBoundary, suppressTemplateIndentation=suppressTemplateIndentation)
|
|
341
|
+
def __init__(self, scope, id, *, description=None, env=None, stackName=None, tags=None, notificationArns=None, synthesizer=None, terminationProtection=None, analyticsReporting=None, crossRegionReferences=None, permissionsBoundary=None, suppressTemplateIndentation=None, propertyInjectors=None):
|
|
342
|
+
super().__init__(scope, id, description=description, env=env, stackName=stackName, tags=tags, notificationArns=notificationArns, synthesizer=synthesizer, terminationProtection=terminationProtection, analyticsReporting=analyticsReporting, crossRegionReferences=crossRegionReferences, permissionsBoundary=permissionsBoundary, suppressTemplateIndentation=suppressTemplateIndentation, propertyInjectors=propertyInjectors)
|
|
343
343
|
|
|
344
|
-
def add_file(self, *, sourceHash, executable=None, fileName=None, packaging=None, deployTime=None):
|
|
344
|
+
def add_file(self, *, sourceHash, executable=None, fileName=None, packaging=None, deployTime=None, displayName=None):
|
|
345
345
|
return FileStagingLocation(
|
|
346
346
|
bucket_name="amzn-s3-demo-bucket",
|
|
347
347
|
assume_role_arn="myArn",
|
|
348
348
|
dependency_stack=self
|
|
349
349
|
)
|
|
350
350
|
|
|
351
|
-
def add_docker_image(self, *, sourceHash, executable=None, directoryName=None, dockerBuildArgs=None, dockerBuildSecrets=None, dockerBuildSsh=None, dockerBuildTarget=None, dockerFile=None, repositoryName=None, networkMode=None, platform=None, dockerOutputs=None, assetName=None, dockerCacheFrom=None, dockerCacheTo=None, dockerCacheDisabled=None):
|
|
351
|
+
def add_docker_image(self, *, sourceHash, executable=None, directoryName=None, dockerBuildArgs=None, dockerBuildSecrets=None, dockerBuildSsh=None, dockerBuildTarget=None, dockerFile=None, repositoryName=None, networkMode=None, platform=None, dockerOutputs=None, assetName=None, dockerCacheFrom=None, dockerCacheTo=None, dockerCacheDisabled=None, displayName=None):
|
|
352
352
|
return ImageStagingLocation(
|
|
353
353
|
repo_name="myRepo",
|
|
354
354
|
assume_role_arn="myArn",
|
|
@@ -587,6 +587,7 @@ class AppStagingSynthesizer(
|
|
|
587
587
|
source_hash: builtins.str,
|
|
588
588
|
asset_name: typing.Optional[builtins.str] = None,
|
|
589
589
|
directory_name: typing.Optional[builtins.str] = None,
|
|
590
|
+
display_name: typing.Optional[builtins.str] = None,
|
|
590
591
|
docker_build_args: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
|
|
591
592
|
docker_build_secrets: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
|
|
592
593
|
docker_build_ssh: typing.Optional[builtins.str] = None,
|
|
@@ -607,6 +608,7 @@ class AppStagingSynthesizer(
|
|
|
607
608
|
:param source_hash: The hash of the contents of the docker build context. This hash is used throughout the system to identify this image and avoid duplicate work in case the source did not change. NOTE: this means that if you wish to update your docker image, you must make a modification to the source (e.g. add some metadata to your Dockerfile).
|
|
608
609
|
:param asset_name: Unique identifier of the docker image asset and its potential revisions. Required if using AppScopedStagingSynthesizer. Default: - no asset name
|
|
609
610
|
:param directory_name: The directory where the Dockerfile is stored, must be relative to the cloud assembly root. Default: - Exactly one of ``directoryName`` and ``executable`` is required
|
|
611
|
+
:param display_name: A display name for this asset. If supplied, the display name will be used in locations where the asset identifier is printed, like in the CLI progress information. Default: - The asset hash is used to display the asset
|
|
610
612
|
:param docker_build_args: Build args to pass to the ``docker build`` command. Since Docker build arguments are resolved before deployment, keys and values cannot refer to unresolved tokens (such as ``lambda.functionArn`` or ``queue.queueUrl``). Only allowed when ``directoryName`` is specified. Default: - no build args are passed
|
|
611
613
|
:param docker_build_secrets: Build secrets to pass to the ``docker build`` command. Since Docker build secrets are resolved before deployment, keys and values cannot refer to unresolved tokens (such as ``lambda.functionArn`` or ``queue.queueUrl``). Only allowed when ``directoryName`` is specified. Default: - no build secrets are passed
|
|
612
614
|
:param docker_build_ssh: SSH agent socket or keys to pass to the ``docker buildx`` command. Default: - no ssh arg is passed
|
|
@@ -626,6 +628,7 @@ class AppStagingSynthesizer(
|
|
|
626
628
|
source_hash=source_hash,
|
|
627
629
|
asset_name=asset_name,
|
|
628
630
|
directory_name=directory_name,
|
|
631
|
+
display_name=display_name,
|
|
629
632
|
docker_build_args=docker_build_args,
|
|
630
633
|
docker_build_secrets=docker_build_secrets,
|
|
631
634
|
docker_build_ssh=docker_build_ssh,
|
|
@@ -648,6 +651,7 @@ class AppStagingSynthesizer(
|
|
|
648
651
|
*,
|
|
649
652
|
source_hash: builtins.str,
|
|
650
653
|
deploy_time: typing.Optional[builtins.bool] = None,
|
|
654
|
+
display_name: typing.Optional[builtins.str] = None,
|
|
651
655
|
executable: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
652
656
|
file_name: typing.Optional[builtins.str] = None,
|
|
653
657
|
packaging: typing.Optional[_aws_cdk_ceddda9d.FileAssetPackaging] = None,
|
|
@@ -658,6 +662,7 @@ class AppStagingSynthesizer(
|
|
|
658
662
|
|
|
659
663
|
:param source_hash: A hash on the content source. This hash is used to uniquely identify this asset throughout the system. If this value doesn't change, the asset will not be rebuilt or republished.
|
|
660
664
|
:param deploy_time: Whether or not the asset needs to exist beyond deployment time; i.e. are copied over to a different location and not needed afterwards. Setting this property to true has an impact on the lifecycle of the asset, because we will assume that it is safe to delete after the CloudFormation deployment succeeds. For example, Lambda Function assets are copied over to Lambda during deployment. Therefore, it is not necessary to store the asset in S3, so we consider those deployTime assets. Default: false
|
|
665
|
+
:param display_name: A display name for this asset. If supplied, the display name will be used in locations where the asset identifier is printed, like in the CLI progress information. Default: - The asset hash is used to display the asset
|
|
661
666
|
:param executable: An external command that will produce the packaged asset. The command should produce the location of a ZIP file on ``stdout``. Default: - Exactly one of ``fileName`` and ``executable`` is required
|
|
662
667
|
:param file_name: The path, relative to the root of the cloud assembly, in which this asset source resides. This can be a path to a file or a directory, depending on the packaging type. Default: - Exactly one of ``fileName`` and ``executable`` is required
|
|
663
668
|
:param packaging: Which type of packaging to perform. Default: - Required if ``fileName`` is specified.
|
|
@@ -667,6 +672,7 @@ class AppStagingSynthesizer(
|
|
|
667
672
|
_asset = _aws_cdk_ceddda9d.FileAssetSource(
|
|
668
673
|
source_hash=source_hash,
|
|
669
674
|
deploy_time=deploy_time,
|
|
675
|
+
display_name=display_name,
|
|
670
676
|
executable=executable,
|
|
671
677
|
file_name=file_name,
|
|
672
678
|
packaging=packaging,
|
|
@@ -1549,6 +1555,7 @@ class DefaultStagingStackOptions:
|
|
|
1549
1555
|
"env": "env",
|
|
1550
1556
|
"notification_arns": "notificationArns",
|
|
1551
1557
|
"permissions_boundary": "permissionsBoundary",
|
|
1558
|
+
"property_injectors": "propertyInjectors",
|
|
1552
1559
|
"stack_name": "stackName",
|
|
1553
1560
|
"suppress_template_indentation": "suppressTemplateIndentation",
|
|
1554
1561
|
"synthesizer": "synthesizer",
|
|
@@ -1580,6 +1587,7 @@ class DefaultStagingStackProps(
|
|
|
1580
1587
|
env: typing.Optional[typing.Union[_aws_cdk_ceddda9d.Environment, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
1581
1588
|
notification_arns: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
1582
1589
|
permissions_boundary: typing.Optional[_aws_cdk_ceddda9d.PermissionsBoundary] = None,
|
|
1590
|
+
property_injectors: typing.Optional[typing.Sequence[_aws_cdk_ceddda9d.IPropertyInjector]] = None,
|
|
1583
1591
|
stack_name: typing.Optional[builtins.str] = None,
|
|
1584
1592
|
suppress_template_indentation: typing.Optional[builtins.bool] = None,
|
|
1585
1593
|
synthesizer: typing.Optional[_aws_cdk_ceddda9d.IStackSynthesizer] = None,
|
|
@@ -1603,14 +1611,15 @@ class DefaultStagingStackProps(
|
|
|
1603
1611
|
:param cross_region_references: Enable this flag to allow native cross region stack references. Enabling this will create a CloudFormation custom resource in both the producing stack and consuming stack in order to perform the export/import This feature is currently experimental Default: false
|
|
1604
1612
|
:param description: A description of the stack. Default: - No description.
|
|
1605
1613
|
:param env: The AWS environment (account/region) where this stack will be deployed. Set the ``region``/``account`` fields of ``env`` to either a concrete value to select the indicated environment (recommended for production stacks), or to the values of environment variables ``CDK_DEFAULT_REGION``/``CDK_DEFAULT_ACCOUNT`` to let the target environment depend on the AWS credentials/configuration that the CDK CLI is executed under (recommended for development stacks). If the ``Stack`` is instantiated inside a ``Stage``, any undefined ``region``/``account`` fields from ``env`` will default to the same field on the encompassing ``Stage``, if configured there. If either ``region`` or ``account`` are not set nor inherited from ``Stage``, the Stack will be considered "*environment-agnostic*"". Environment-agnostic stacks can be deployed to any environment but may not be able to take advantage of all features of the CDK. For example, they will not be able to use environmental context lookups such as ``ec2.Vpc.fromLookup`` and will not automatically translate Service Principals to the right format based on the environment's AWS partition, and other such enhancements. Default: - The environment of the containing ``Stage`` if available, otherwise create the stack will be environment-agnostic.
|
|
1606
|
-
:param notification_arns: SNS Topic ARNs that will receive stack events. Default: - no
|
|
1614
|
+
:param notification_arns: SNS Topic ARNs that will receive stack events. Default: - no notification arns.
|
|
1607
1615
|
:param permissions_boundary: Options for applying a permissions boundary to all IAM Roles and Users created within this Stage. Default: - no permissions boundary is applied
|
|
1616
|
+
:param property_injectors: A list of IPropertyInjector attached to this Stack. Default: - no PropertyInjectors
|
|
1608
1617
|
:param stack_name: Name to deploy the stack with. Default: - Derived from construct path.
|
|
1609
1618
|
:param suppress_template_indentation: Enable this flag to suppress indentation in generated CloudFormation templates. If not specified, the value of the ``@aws-cdk/core:suppressTemplateIndentation`` context key will be used. If that is not specified, then the default value ``false`` will be used. Default: - the value of ``@aws-cdk/core:suppressTemplateIndentation``, or ``false`` if that is not set.
|
|
1610
1619
|
:param synthesizer: Synthesis method to use while deploying this stack. The Stack Synthesizer controls aspects of synthesis and deployment, like how assets are referenced and what IAM roles to use. For more information, see the README of the main CDK package. If not specified, the ``defaultStackSynthesizer`` from ``App`` will be used. If that is not specified, ``DefaultStackSynthesizer`` is used if ``@aws-cdk/core:newStyleStackSynthesis`` is set to ``true`` or the CDK major version is v2. In CDK v1 ``LegacyStackSynthesizer`` is the default if no other synthesizer is specified. Default: - The synthesizer specified on ``App``, or ``DefaultStackSynthesizer`` otherwise.
|
|
1611
|
-
:param tags:
|
|
1620
|
+
:param tags: Tags that will be applied to the Stack. These tags are applied to the CloudFormation Stack itself. They will not appear in the CloudFormation template. However, at deployment time, CloudFormation will apply these tags to all resources in the stack that support tagging. You will not be able to exempt resources from tagging (using the ``excludeResourceTypes`` property of ``Tags.of(...).add()``) for tags applied in this way. Default: {}
|
|
1612
1621
|
:param termination_protection: Whether to enable termination protection for this stack. Default: false
|
|
1613
|
-
:param qualifier: (experimental) The qualifier used to specialize strings.
|
|
1622
|
+
:param qualifier: (experimental) The qualifier used to specialize strings. Can be used to specify custom bootstrapped role names
|
|
1614
1623
|
:param deploy_role_arn: (experimental) The ARN of the deploy action role, if given. This role will need permissions to read from to the staging resources. Default: - The CLI credentials are assumed, no additional permissions are granted.
|
|
1615
1624
|
|
|
1616
1625
|
:stability: experimental
|
|
@@ -1626,6 +1635,7 @@ class DefaultStagingStackProps(
|
|
|
1626
1635
|
|
|
1627
1636
|
# bootstrap_role: app_staging_synthesizer_alpha.BootstrapRole
|
|
1628
1637
|
# permissions_boundary: cdk.PermissionsBoundary
|
|
1638
|
+
# property_injector: cdk.IPropertyInjector
|
|
1629
1639
|
# stack_synthesizer: cdk.StackSynthesizer
|
|
1630
1640
|
|
|
1631
1641
|
default_staging_stack_props = app_staging_synthesizer_alpha.DefaultStagingStackProps(
|
|
@@ -1649,6 +1659,7 @@ class DefaultStagingStackProps(
|
|
|
1649
1659
|
image_asset_version_count=123,
|
|
1650
1660
|
notification_arns=["notificationArns"],
|
|
1651
1661
|
permissions_boundary=permissions_boundary,
|
|
1662
|
+
property_injectors=[property_injector],
|
|
1652
1663
|
stack_name="stackName",
|
|
1653
1664
|
staging_bucket_name="stagingBucketName",
|
|
1654
1665
|
staging_stack_name_prefix="stagingStackNamePrefix",
|
|
@@ -1679,6 +1690,7 @@ class DefaultStagingStackProps(
|
|
|
1679
1690
|
check_type(argname="argument env", value=env, expected_type=type_hints["env"])
|
|
1680
1691
|
check_type(argname="argument notification_arns", value=notification_arns, expected_type=type_hints["notification_arns"])
|
|
1681
1692
|
check_type(argname="argument permissions_boundary", value=permissions_boundary, expected_type=type_hints["permissions_boundary"])
|
|
1693
|
+
check_type(argname="argument property_injectors", value=property_injectors, expected_type=type_hints["property_injectors"])
|
|
1682
1694
|
check_type(argname="argument stack_name", value=stack_name, expected_type=type_hints["stack_name"])
|
|
1683
1695
|
check_type(argname="argument suppress_template_indentation", value=suppress_template_indentation, expected_type=type_hints["suppress_template_indentation"])
|
|
1684
1696
|
check_type(argname="argument synthesizer", value=synthesizer, expected_type=type_hints["synthesizer"])
|
|
@@ -1717,6 +1729,8 @@ class DefaultStagingStackProps(
|
|
|
1717
1729
|
self._values["notification_arns"] = notification_arns
|
|
1718
1730
|
if permissions_boundary is not None:
|
|
1719
1731
|
self._values["permissions_boundary"] = permissions_boundary
|
|
1732
|
+
if property_injectors is not None:
|
|
1733
|
+
self._values["property_injectors"] = property_injectors
|
|
1720
1734
|
if stack_name is not None:
|
|
1721
1735
|
self._values["stack_name"] = stack_name
|
|
1722
1736
|
if suppress_template_indentation is not None:
|
|
@@ -1974,7 +1988,7 @@ class DefaultStagingStackProps(
|
|
|
1974
1988
|
def notification_arns(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
1975
1989
|
'''SNS Topic ARNs that will receive stack events.
|
|
1976
1990
|
|
|
1977
|
-
:default: - no
|
|
1991
|
+
:default: - no notification arns.
|
|
1978
1992
|
'''
|
|
1979
1993
|
result = self._values.get("notification_arns")
|
|
1980
1994
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
@@ -1990,6 +2004,17 @@ class DefaultStagingStackProps(
|
|
|
1990
2004
|
result = self._values.get("permissions_boundary")
|
|
1991
2005
|
return typing.cast(typing.Optional[_aws_cdk_ceddda9d.PermissionsBoundary], result)
|
|
1992
2006
|
|
|
2007
|
+
@builtins.property
|
|
2008
|
+
def property_injectors(
|
|
2009
|
+
self,
|
|
2010
|
+
) -> typing.Optional[typing.List[_aws_cdk_ceddda9d.IPropertyInjector]]:
|
|
2011
|
+
'''A list of IPropertyInjector attached to this Stack.
|
|
2012
|
+
|
|
2013
|
+
:default: - no PropertyInjectors
|
|
2014
|
+
'''
|
|
2015
|
+
result = self._values.get("property_injectors")
|
|
2016
|
+
return typing.cast(typing.Optional[typing.List[_aws_cdk_ceddda9d.IPropertyInjector]], result)
|
|
2017
|
+
|
|
1993
2018
|
@builtins.property
|
|
1994
2019
|
def stack_name(self) -> typing.Optional[builtins.str]:
|
|
1995
2020
|
'''Name to deploy the stack with.
|
|
@@ -2033,7 +2058,15 @@ class DefaultStagingStackProps(
|
|
|
2033
2058
|
|
|
2034
2059
|
@builtins.property
|
|
2035
2060
|
def tags(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
|
|
2036
|
-
'''
|
|
2061
|
+
'''Tags that will be applied to the Stack.
|
|
2062
|
+
|
|
2063
|
+
These tags are applied to the CloudFormation Stack itself. They will not
|
|
2064
|
+
appear in the CloudFormation template.
|
|
2065
|
+
|
|
2066
|
+
However, at deployment time, CloudFormation will apply these tags to all
|
|
2067
|
+
resources in the stack that support tagging. You will not be able to exempt
|
|
2068
|
+
resources from tagging (using the ``excludeResourceTypes`` property of
|
|
2069
|
+
``Tags.of(...).add()``) for tags applied in this way.
|
|
2037
2070
|
|
|
2038
2071
|
:default: {}
|
|
2039
2072
|
'''
|
|
@@ -2053,7 +2086,7 @@ class DefaultStagingStackProps(
|
|
|
2053
2086
|
def qualifier(self) -> builtins.str:
|
|
2054
2087
|
'''(experimental) The qualifier used to specialize strings.
|
|
2055
2088
|
|
|
2056
|
-
|
|
2089
|
+
Can be used to specify custom bootstrapped role names
|
|
2057
2090
|
|
|
2058
2091
|
:stability: experimental
|
|
2059
2092
|
'''
|
|
@@ -2328,6 +2361,7 @@ class IStagingResources(_constructs_77d1e7e8.IConstruct, typing_extensions.Proto
|
|
|
2328
2361
|
source_hash: builtins.str,
|
|
2329
2362
|
asset_name: typing.Optional[builtins.str] = None,
|
|
2330
2363
|
directory_name: typing.Optional[builtins.str] = None,
|
|
2364
|
+
display_name: typing.Optional[builtins.str] = None,
|
|
2331
2365
|
docker_build_args: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
|
|
2332
2366
|
docker_build_secrets: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
|
|
2333
2367
|
docker_build_ssh: typing.Optional[builtins.str] = None,
|
|
@@ -2346,6 +2380,7 @@ class IStagingResources(_constructs_77d1e7e8.IConstruct, typing_extensions.Proto
|
|
|
2346
2380
|
:param source_hash: The hash of the contents of the docker build context. This hash is used throughout the system to identify this image and avoid duplicate work in case the source did not change. NOTE: this means that if you wish to update your docker image, you must make a modification to the source (e.g. add some metadata to your Dockerfile).
|
|
2347
2381
|
:param asset_name: Unique identifier of the docker image asset and its potential revisions. Required if using AppScopedStagingSynthesizer. Default: - no asset name
|
|
2348
2382
|
:param directory_name: The directory where the Dockerfile is stored, must be relative to the cloud assembly root. Default: - Exactly one of ``directoryName`` and ``executable`` is required
|
|
2383
|
+
:param display_name: A display name for this asset. If supplied, the display name will be used in locations where the asset identifier is printed, like in the CLI progress information. Default: - The asset hash is used to display the asset
|
|
2349
2384
|
:param docker_build_args: Build args to pass to the ``docker build`` command. Since Docker build arguments are resolved before deployment, keys and values cannot refer to unresolved tokens (such as ``lambda.functionArn`` or ``queue.queueUrl``). Only allowed when ``directoryName`` is specified. Default: - no build args are passed
|
|
2350
2385
|
:param docker_build_secrets: Build secrets to pass to the ``docker build`` command. Since Docker build secrets are resolved before deployment, keys and values cannot refer to unresolved tokens (such as ``lambda.functionArn`` or ``queue.queueUrl``). Only allowed when ``directoryName`` is specified. Default: - no build secrets are passed
|
|
2351
2386
|
:param docker_build_ssh: SSH agent socket or keys to pass to the ``docker buildx`` command. Default: - no ssh arg is passed
|
|
@@ -2369,6 +2404,7 @@ class IStagingResources(_constructs_77d1e7e8.IConstruct, typing_extensions.Proto
|
|
|
2369
2404
|
*,
|
|
2370
2405
|
source_hash: builtins.str,
|
|
2371
2406
|
deploy_time: typing.Optional[builtins.bool] = None,
|
|
2407
|
+
display_name: typing.Optional[builtins.str] = None,
|
|
2372
2408
|
executable: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
2373
2409
|
file_name: typing.Optional[builtins.str] = None,
|
|
2374
2410
|
packaging: typing.Optional[_aws_cdk_ceddda9d.FileAssetPackaging] = None,
|
|
@@ -2377,6 +2413,7 @@ class IStagingResources(_constructs_77d1e7e8.IConstruct, typing_extensions.Proto
|
|
|
2377
2413
|
|
|
2378
2414
|
:param source_hash: A hash on the content source. This hash is used to uniquely identify this asset throughout the system. If this value doesn't change, the asset will not be rebuilt or republished.
|
|
2379
2415
|
:param deploy_time: Whether or not the asset needs to exist beyond deployment time; i.e. are copied over to a different location and not needed afterwards. Setting this property to true has an impact on the lifecycle of the asset, because we will assume that it is safe to delete after the CloudFormation deployment succeeds. For example, Lambda Function assets are copied over to Lambda during deployment. Therefore, it is not necessary to store the asset in S3, so we consider those deployTime assets. Default: false
|
|
2416
|
+
:param display_name: A display name for this asset. If supplied, the display name will be used in locations where the asset identifier is printed, like in the CLI progress information. Default: - The asset hash is used to display the asset
|
|
2380
2417
|
:param executable: An external command that will produce the packaged asset. The command should produce the location of a ZIP file on ``stdout``. Default: - Exactly one of ``fileName`` and ``executable`` is required
|
|
2381
2418
|
:param file_name: The path, relative to the root of the cloud assembly, in which this asset source resides. This can be a path to a file or a directory, depending on the packaging type. Default: - Exactly one of ``fileName`` and ``executable`` is required
|
|
2382
2419
|
:param packaging: Which type of packaging to perform. Default: - Required if ``fileName`` is specified.
|
|
@@ -2403,6 +2440,7 @@ class _IStagingResourcesProxy(
|
|
|
2403
2440
|
source_hash: builtins.str,
|
|
2404
2441
|
asset_name: typing.Optional[builtins.str] = None,
|
|
2405
2442
|
directory_name: typing.Optional[builtins.str] = None,
|
|
2443
|
+
display_name: typing.Optional[builtins.str] = None,
|
|
2406
2444
|
docker_build_args: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
|
|
2407
2445
|
docker_build_secrets: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
|
|
2408
2446
|
docker_build_ssh: typing.Optional[builtins.str] = None,
|
|
@@ -2421,6 +2459,7 @@ class _IStagingResourcesProxy(
|
|
|
2421
2459
|
:param source_hash: The hash of the contents of the docker build context. This hash is used throughout the system to identify this image and avoid duplicate work in case the source did not change. NOTE: this means that if you wish to update your docker image, you must make a modification to the source (e.g. add some metadata to your Dockerfile).
|
|
2422
2460
|
:param asset_name: Unique identifier of the docker image asset and its potential revisions. Required if using AppScopedStagingSynthesizer. Default: - no asset name
|
|
2423
2461
|
:param directory_name: The directory where the Dockerfile is stored, must be relative to the cloud assembly root. Default: - Exactly one of ``directoryName`` and ``executable`` is required
|
|
2462
|
+
:param display_name: A display name for this asset. If supplied, the display name will be used in locations where the asset identifier is printed, like in the CLI progress information. Default: - The asset hash is used to display the asset
|
|
2424
2463
|
:param docker_build_args: Build args to pass to the ``docker build`` command. Since Docker build arguments are resolved before deployment, keys and values cannot refer to unresolved tokens (such as ``lambda.functionArn`` or ``queue.queueUrl``). Only allowed when ``directoryName`` is specified. Default: - no build args are passed
|
|
2425
2464
|
:param docker_build_secrets: Build secrets to pass to the ``docker build`` command. Since Docker build secrets are resolved before deployment, keys and values cannot refer to unresolved tokens (such as ``lambda.functionArn`` or ``queue.queueUrl``). Only allowed when ``directoryName`` is specified. Default: - no build secrets are passed
|
|
2426
2465
|
:param docker_build_ssh: SSH agent socket or keys to pass to the ``docker buildx`` command. Default: - no ssh arg is passed
|
|
@@ -2440,6 +2479,7 @@ class _IStagingResourcesProxy(
|
|
|
2440
2479
|
source_hash=source_hash,
|
|
2441
2480
|
asset_name=asset_name,
|
|
2442
2481
|
directory_name=directory_name,
|
|
2482
|
+
display_name=display_name,
|
|
2443
2483
|
docker_build_args=docker_build_args,
|
|
2444
2484
|
docker_build_secrets=docker_build_secrets,
|
|
2445
2485
|
docker_build_ssh=docker_build_ssh,
|
|
@@ -2462,6 +2502,7 @@ class _IStagingResourcesProxy(
|
|
|
2462
2502
|
*,
|
|
2463
2503
|
source_hash: builtins.str,
|
|
2464
2504
|
deploy_time: typing.Optional[builtins.bool] = None,
|
|
2505
|
+
display_name: typing.Optional[builtins.str] = None,
|
|
2465
2506
|
executable: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
2466
2507
|
file_name: typing.Optional[builtins.str] = None,
|
|
2467
2508
|
packaging: typing.Optional[_aws_cdk_ceddda9d.FileAssetPackaging] = None,
|
|
@@ -2470,6 +2511,7 @@ class _IStagingResourcesProxy(
|
|
|
2470
2511
|
|
|
2471
2512
|
:param source_hash: A hash on the content source. This hash is used to uniquely identify this asset throughout the system. If this value doesn't change, the asset will not be rebuilt or republished.
|
|
2472
2513
|
:param deploy_time: Whether or not the asset needs to exist beyond deployment time; i.e. are copied over to a different location and not needed afterwards. Setting this property to true has an impact on the lifecycle of the asset, because we will assume that it is safe to delete after the CloudFormation deployment succeeds. For example, Lambda Function assets are copied over to Lambda during deployment. Therefore, it is not necessary to store the asset in S3, so we consider those deployTime assets. Default: false
|
|
2514
|
+
:param display_name: A display name for this asset. If supplied, the display name will be used in locations where the asset identifier is printed, like in the CLI progress information. Default: - The asset hash is used to display the asset
|
|
2473
2515
|
:param executable: An external command that will produce the packaged asset. The command should produce the location of a ZIP file on ``stdout``. Default: - Exactly one of ``fileName`` and ``executable`` is required
|
|
2474
2516
|
:param file_name: The path, relative to the root of the cloud assembly, in which this asset source resides. This can be a path to a file or a directory, depending on the packaging type. Default: - Exactly one of ``fileName`` and ``executable`` is required
|
|
2475
2517
|
:param packaging: Which type of packaging to perform. Default: - Required if ``fileName`` is specified.
|
|
@@ -2479,6 +2521,7 @@ class _IStagingResourcesProxy(
|
|
|
2479
2521
|
asset = _aws_cdk_ceddda9d.FileAssetSource(
|
|
2480
2522
|
source_hash=source_hash,
|
|
2481
2523
|
deploy_time=deploy_time,
|
|
2524
|
+
display_name=display_name,
|
|
2482
2525
|
executable=executable,
|
|
2483
2526
|
file_name=file_name,
|
|
2484
2527
|
packaging=packaging,
|
|
@@ -3216,6 +3259,7 @@ class DefaultStagingStack(
|
|
|
3216
3259
|
env: typing.Optional[typing.Union[_aws_cdk_ceddda9d.Environment, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
3217
3260
|
notification_arns: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
3218
3261
|
permissions_boundary: typing.Optional[_aws_cdk_ceddda9d.PermissionsBoundary] = None,
|
|
3262
|
+
property_injectors: typing.Optional[typing.Sequence[_aws_cdk_ceddda9d.IPropertyInjector]] = None,
|
|
3219
3263
|
stack_name: typing.Optional[builtins.str] = None,
|
|
3220
3264
|
suppress_template_indentation: typing.Optional[builtins.bool] = None,
|
|
3221
3265
|
synthesizer: typing.Optional[_aws_cdk_ceddda9d.IStackSynthesizer] = None,
|
|
@@ -3225,7 +3269,7 @@ class DefaultStagingStack(
|
|
|
3225
3269
|
'''
|
|
3226
3270
|
:param scope: -
|
|
3227
3271
|
:param id: -
|
|
3228
|
-
:param qualifier: (experimental) The qualifier used to specialize strings.
|
|
3272
|
+
:param qualifier: (experimental) The qualifier used to specialize strings. Can be used to specify custom bootstrapped role names
|
|
3229
3273
|
:param deploy_role_arn: (experimental) The ARN of the deploy action role, if given. This role will need permissions to read from to the staging resources. Default: - The CLI credentials are assumed, no additional permissions are granted.
|
|
3230
3274
|
:param app_id: (experimental) A unique identifier for the application that the staging stack belongs to. This identifier will be used in the name of staging resources created for this application, and should be unique across CDK apps. The identifier should include lowercase characters and dashes ('-') only and have a maximum of 20 characters.
|
|
3231
3275
|
:param staging_bucket_encryption: (experimental) Encryption type for staging bucket. In future versions of this package, the default will be BucketEncryption.S3_MANAGED. In previous versions of this package, the default was to use KMS encryption for the staging bucket. KMS keys cost $1/month, which could result in unexpected costs for users who are not aware of this. As we stabilize this module we intend to make the default S3-managed encryption, which is free. However, the migration path from KMS to S3 managed encryption for existing buckets is not straightforward. Therefore, for now, this property is required. If you have an existing staging bucket encrypted with a KMS key, you will likely want to set this property to BucketEncryption.KMS. If you are creating a new staging bucket, you can set this property to BucketEncryption.S3_MANAGED to avoid the cost of a KMS key.
|
|
@@ -3240,12 +3284,13 @@ class DefaultStagingStack(
|
|
|
3240
3284
|
:param cross_region_references: Enable this flag to allow native cross region stack references. Enabling this will create a CloudFormation custom resource in both the producing stack and consuming stack in order to perform the export/import This feature is currently experimental Default: false
|
|
3241
3285
|
:param description: A description of the stack. Default: - No description.
|
|
3242
3286
|
:param env: The AWS environment (account/region) where this stack will be deployed. Set the ``region``/``account`` fields of ``env`` to either a concrete value to select the indicated environment (recommended for production stacks), or to the values of environment variables ``CDK_DEFAULT_REGION``/``CDK_DEFAULT_ACCOUNT`` to let the target environment depend on the AWS credentials/configuration that the CDK CLI is executed under (recommended for development stacks). If the ``Stack`` is instantiated inside a ``Stage``, any undefined ``region``/``account`` fields from ``env`` will default to the same field on the encompassing ``Stage``, if configured there. If either ``region`` or ``account`` are not set nor inherited from ``Stage``, the Stack will be considered "*environment-agnostic*"". Environment-agnostic stacks can be deployed to any environment but may not be able to take advantage of all features of the CDK. For example, they will not be able to use environmental context lookups such as ``ec2.Vpc.fromLookup`` and will not automatically translate Service Principals to the right format based on the environment's AWS partition, and other such enhancements. Default: - The environment of the containing ``Stage`` if available, otherwise create the stack will be environment-agnostic.
|
|
3243
|
-
:param notification_arns: SNS Topic ARNs that will receive stack events. Default: - no
|
|
3287
|
+
:param notification_arns: SNS Topic ARNs that will receive stack events. Default: - no notification arns.
|
|
3244
3288
|
:param permissions_boundary: Options for applying a permissions boundary to all IAM Roles and Users created within this Stage. Default: - no permissions boundary is applied
|
|
3289
|
+
:param property_injectors: A list of IPropertyInjector attached to this Stack. Default: - no PropertyInjectors
|
|
3245
3290
|
:param stack_name: Name to deploy the stack with. Default: - Derived from construct path.
|
|
3246
3291
|
:param suppress_template_indentation: Enable this flag to suppress indentation in generated CloudFormation templates. If not specified, the value of the ``@aws-cdk/core:suppressTemplateIndentation`` context key will be used. If that is not specified, then the default value ``false`` will be used. Default: - the value of ``@aws-cdk/core:suppressTemplateIndentation``, or ``false`` if that is not set.
|
|
3247
3292
|
:param synthesizer: Synthesis method to use while deploying this stack. The Stack Synthesizer controls aspects of synthesis and deployment, like how assets are referenced and what IAM roles to use. For more information, see the README of the main CDK package. If not specified, the ``defaultStackSynthesizer`` from ``App`` will be used. If that is not specified, ``DefaultStackSynthesizer`` is used if ``@aws-cdk/core:newStyleStackSynthesis`` is set to ``true`` or the CDK major version is v2. In CDK v1 ``LegacyStackSynthesizer`` is the default if no other synthesizer is specified. Default: - The synthesizer specified on ``App``, or ``DefaultStackSynthesizer`` otherwise.
|
|
3248
|
-
:param tags:
|
|
3293
|
+
:param tags: Tags that will be applied to the Stack. These tags are applied to the CloudFormation Stack itself. They will not appear in the CloudFormation template. However, at deployment time, CloudFormation will apply these tags to all resources in the stack that support tagging. You will not be able to exempt resources from tagging (using the ``excludeResourceTypes`` property of ``Tags.of(...).add()``) for tags applied in this way. Default: {}
|
|
3249
3294
|
:param termination_protection: Whether to enable termination protection for this stack. Default: false
|
|
3250
3295
|
|
|
3251
3296
|
:stability: experimental
|
|
@@ -3272,6 +3317,7 @@ class DefaultStagingStack(
|
|
|
3272
3317
|
env=env,
|
|
3273
3318
|
notification_arns=notification_arns,
|
|
3274
3319
|
permissions_boundary=permissions_boundary,
|
|
3320
|
+
property_injectors=property_injectors,
|
|
3275
3321
|
stack_name=stack_name,
|
|
3276
3322
|
suppress_template_indentation=suppress_template_indentation,
|
|
3277
3323
|
synthesizer=synthesizer,
|
|
@@ -3331,6 +3377,7 @@ class DefaultStagingStack(
|
|
|
3331
3377
|
source_hash: builtins.str,
|
|
3332
3378
|
asset_name: typing.Optional[builtins.str] = None,
|
|
3333
3379
|
directory_name: typing.Optional[builtins.str] = None,
|
|
3380
|
+
display_name: typing.Optional[builtins.str] = None,
|
|
3334
3381
|
docker_build_args: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
|
|
3335
3382
|
docker_build_secrets: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
|
|
3336
3383
|
docker_build_ssh: typing.Optional[builtins.str] = None,
|
|
@@ -3349,6 +3396,7 @@ class DefaultStagingStack(
|
|
|
3349
3396
|
:param source_hash: The hash of the contents of the docker build context. This hash is used throughout the system to identify this image and avoid duplicate work in case the source did not change. NOTE: this means that if you wish to update your docker image, you must make a modification to the source (e.g. add some metadata to your Dockerfile).
|
|
3350
3397
|
:param asset_name: Unique identifier of the docker image asset and its potential revisions. Required if using AppScopedStagingSynthesizer. Default: - no asset name
|
|
3351
3398
|
:param directory_name: The directory where the Dockerfile is stored, must be relative to the cloud assembly root. Default: - Exactly one of ``directoryName`` and ``executable`` is required
|
|
3399
|
+
:param display_name: A display name for this asset. If supplied, the display name will be used in locations where the asset identifier is printed, like in the CLI progress information. Default: - The asset hash is used to display the asset
|
|
3352
3400
|
:param docker_build_args: Build args to pass to the ``docker build`` command. Since Docker build arguments are resolved before deployment, keys and values cannot refer to unresolved tokens (such as ``lambda.functionArn`` or ``queue.queueUrl``). Only allowed when ``directoryName`` is specified. Default: - no build args are passed
|
|
3353
3401
|
:param docker_build_secrets: Build secrets to pass to the ``docker build`` command. Since Docker build secrets are resolved before deployment, keys and values cannot refer to unresolved tokens (such as ``lambda.functionArn`` or ``queue.queueUrl``). Only allowed when ``directoryName`` is specified. Default: - no build secrets are passed
|
|
3354
3402
|
:param docker_build_ssh: SSH agent socket or keys to pass to the ``docker buildx`` command. Default: - no ssh arg is passed
|
|
@@ -3368,6 +3416,7 @@ class DefaultStagingStack(
|
|
|
3368
3416
|
source_hash=source_hash,
|
|
3369
3417
|
asset_name=asset_name,
|
|
3370
3418
|
directory_name=directory_name,
|
|
3419
|
+
display_name=display_name,
|
|
3371
3420
|
docker_build_args=docker_build_args,
|
|
3372
3421
|
docker_build_secrets=docker_build_secrets,
|
|
3373
3422
|
docker_build_ssh=docker_build_ssh,
|
|
@@ -3390,6 +3439,7 @@ class DefaultStagingStack(
|
|
|
3390
3439
|
*,
|
|
3391
3440
|
source_hash: builtins.str,
|
|
3392
3441
|
deploy_time: typing.Optional[builtins.bool] = None,
|
|
3442
|
+
display_name: typing.Optional[builtins.str] = None,
|
|
3393
3443
|
executable: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
3394
3444
|
file_name: typing.Optional[builtins.str] = None,
|
|
3395
3445
|
packaging: typing.Optional[_aws_cdk_ceddda9d.FileAssetPackaging] = None,
|
|
@@ -3398,6 +3448,7 @@ class DefaultStagingStack(
|
|
|
3398
3448
|
|
|
3399
3449
|
:param source_hash: A hash on the content source. This hash is used to uniquely identify this asset throughout the system. If this value doesn't change, the asset will not be rebuilt or republished.
|
|
3400
3450
|
:param deploy_time: Whether or not the asset needs to exist beyond deployment time; i.e. are copied over to a different location and not needed afterwards. Setting this property to true has an impact on the lifecycle of the asset, because we will assume that it is safe to delete after the CloudFormation deployment succeeds. For example, Lambda Function assets are copied over to Lambda during deployment. Therefore, it is not necessary to store the asset in S3, so we consider those deployTime assets. Default: false
|
|
3451
|
+
:param display_name: A display name for this asset. If supplied, the display name will be used in locations where the asset identifier is printed, like in the CLI progress information. Default: - The asset hash is used to display the asset
|
|
3401
3452
|
:param executable: An external command that will produce the packaged asset. The command should produce the location of a ZIP file on ``stdout``. Default: - Exactly one of ``fileName`` and ``executable`` is required
|
|
3402
3453
|
:param file_name: The path, relative to the root of the cloud assembly, in which this asset source resides. This can be a path to a file or a directory, depending on the packaging type. Default: - Exactly one of ``fileName`` and ``executable`` is required
|
|
3403
3454
|
:param packaging: Which type of packaging to perform. Default: - Required if ``fileName`` is specified.
|
|
@@ -3407,6 +3458,7 @@ class DefaultStagingStack(
|
|
|
3407
3458
|
asset = _aws_cdk_ceddda9d.FileAssetSource(
|
|
3408
3459
|
source_hash=source_hash,
|
|
3409
3460
|
deploy_time=deploy_time,
|
|
3461
|
+
display_name=display_name,
|
|
3410
3462
|
executable=executable,
|
|
3411
3463
|
file_name=file_name,
|
|
3412
3464
|
packaging=packaging,
|
|
@@ -3567,6 +3619,7 @@ def _typecheckingstub__ac9f132bcac8375ac08c16bf3c9bb7407b641e71cfd23cea8b50befa3
|
|
|
3567
3619
|
env: typing.Optional[typing.Union[_aws_cdk_ceddda9d.Environment, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
3568
3620
|
notification_arns: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
3569
3621
|
permissions_boundary: typing.Optional[_aws_cdk_ceddda9d.PermissionsBoundary] = None,
|
|
3622
|
+
property_injectors: typing.Optional[typing.Sequence[_aws_cdk_ceddda9d.IPropertyInjector]] = None,
|
|
3570
3623
|
stack_name: typing.Optional[builtins.str] = None,
|
|
3571
3624
|
suppress_template_indentation: typing.Optional[builtins.bool] = None,
|
|
3572
3625
|
synthesizer: typing.Optional[_aws_cdk_ceddda9d.IStackSynthesizer] = None,
|
|
@@ -3669,6 +3722,7 @@ def _typecheckingstub__ca741a4572a1f95a8d82e9d029388b8a2d72acacb69715277b6a785b4
|
|
|
3669
3722
|
env: typing.Optional[typing.Union[_aws_cdk_ceddda9d.Environment, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
3670
3723
|
notification_arns: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
3671
3724
|
permissions_boundary: typing.Optional[_aws_cdk_ceddda9d.PermissionsBoundary] = None,
|
|
3725
|
+
property_injectors: typing.Optional[typing.Sequence[_aws_cdk_ceddda9d.IPropertyInjector]] = None,
|
|
3672
3726
|
stack_name: typing.Optional[builtins.str] = None,
|
|
3673
3727
|
suppress_template_indentation: typing.Optional[builtins.bool] = None,
|
|
3674
3728
|
synthesizer: typing.Optional[_aws_cdk_ceddda9d.IStackSynthesizer] = None,
|
|
@@ -3677,3 +3731,6 @@ def _typecheckingstub__ca741a4572a1f95a8d82e9d029388b8a2d72acacb69715277b6a785b4
|
|
|
3677
3731
|
) -> None:
|
|
3678
3732
|
"""Type checking stubs"""
|
|
3679
3733
|
pass
|
|
3734
|
+
|
|
3735
|
+
for cls in [IStagingResources, IStagingResourcesFactory]:
|
|
3736
|
+
typing.cast(typing.Any, cls).__protocol_attrs__ = typing.cast(typing.Any, cls).__protocol_attrs__ - set(['__jsii_proxy_class__', '__jsii_type__'])
|
|
@@ -33,9 +33,9 @@ import constructs._jsii
|
|
|
33
33
|
|
|
34
34
|
__jsii_assembly__ = jsii.JSIIAssembly.load(
|
|
35
35
|
"@aws-cdk/app-staging-synthesizer-alpha",
|
|
36
|
-
"2.
|
|
36
|
+
"2.227.0-alpha.0",
|
|
37
37
|
__name__[0:-6],
|
|
38
|
-
"app-staging-synthesizer-alpha@2.
|
|
38
|
+
"app-staging-synthesizer-alpha@2.227.0-alpha.0.jsii.tgz",
|
|
39
39
|
)
|
|
40
40
|
|
|
41
41
|
__all__ = [
|
|
Binary file
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.1
|
|
2
2
|
Name: aws-cdk.app-staging-synthesizer-alpha
|
|
3
|
-
Version: 2.
|
|
3
|
+
Version: 2.227.0a0
|
|
4
4
|
Summary: Cdk synthesizer for with app-scoped staging stack
|
|
5
5
|
Home-page: https://github.com/aws/aws-cdk
|
|
6
6
|
Author: Amazon Web Services
|
|
@@ -10,7 +10,6 @@ Classifier: Intended Audience :: Developers
|
|
|
10
10
|
Classifier: Operating System :: OS Independent
|
|
11
11
|
Classifier: Programming Language :: JavaScript
|
|
12
12
|
Classifier: Programming Language :: Python :: 3 :: Only
|
|
13
|
-
Classifier: Programming Language :: Python :: 3.8
|
|
14
13
|
Classifier: Programming Language :: Python :: 3.9
|
|
15
14
|
Classifier: Programming Language :: Python :: 3.10
|
|
16
15
|
Classifier: Programming Language :: Python :: 3.11
|
|
@@ -19,13 +18,13 @@ Classifier: Development Status :: 4 - Beta
|
|
|
19
18
|
Classifier: License :: OSI Approved
|
|
20
19
|
Classifier: Framework :: AWS CDK
|
|
21
20
|
Classifier: Framework :: AWS CDK :: 2
|
|
22
|
-
Requires-Python: ~=3.
|
|
21
|
+
Requires-Python: ~=3.9
|
|
23
22
|
Description-Content-Type: text/markdown
|
|
24
23
|
License-File: LICENSE
|
|
25
24
|
License-File: NOTICE
|
|
26
|
-
Requires-Dist: aws-cdk-lib<3.0.0,>=2.
|
|
25
|
+
Requires-Dist: aws-cdk-lib<3.0.0,>=2.227.0
|
|
27
26
|
Requires-Dist: constructs<11.0.0,>=10.0.0
|
|
28
|
-
Requires-Dist: jsii<2.0.0,>=1.
|
|
27
|
+
Requires-Dist: jsii<2.0.0,>=1.119.0
|
|
29
28
|
Requires-Dist: publication>=0.0.3
|
|
30
29
|
Requires-Dist: typeguard<4.3.0,>=2.13.3
|
|
31
30
|
|
|
@@ -203,7 +202,7 @@ These credentials must have the ability to perform CloudFormation calls,
|
|
|
203
202
|
lookup resources in your account, and perform CloudFormation deployment.
|
|
204
203
|
For a full list of what is necessary, see `LookupRole`, `DeploymentActionRole`,
|
|
205
204
|
and `CloudFormationExecutionRole` in the
|
|
206
|
-
[bootstrap template](https://github.com/aws/aws-cdk/blob/main/packages/aws-cdk/lib/api/bootstrap/bootstrap-template.yaml).
|
|
205
|
+
[bootstrap template](https://github.com/aws/aws-cdk-cli/blob/main/packages/aws-cdk/lib/api/bootstrap/bootstrap-template.yaml).
|
|
207
206
|
|
|
208
207
|
```python
|
|
209
208
|
from aws_cdk.aws_s3 import BucketEncryption
|
|
@@ -368,17 +367,17 @@ Or you can roll your own staging resources from scratch, as long as it implement
|
|
|
368
367
|
```python
|
|
369
368
|
@jsii.implements(IStagingResources)
|
|
370
369
|
class CustomStagingStack(Stack):
|
|
371
|
-
def __init__(self, scope, id, *, description=None, env=None, stackName=None, tags=None, notificationArns=None, synthesizer=None, terminationProtection=None, analyticsReporting=None, crossRegionReferences=None, permissionsBoundary=None, suppressTemplateIndentation=None):
|
|
372
|
-
super().__init__(scope, id, description=description, env=env, stackName=stackName, tags=tags, notificationArns=notificationArns, synthesizer=synthesizer, terminationProtection=terminationProtection, analyticsReporting=analyticsReporting, crossRegionReferences=crossRegionReferences, permissionsBoundary=permissionsBoundary, suppressTemplateIndentation=suppressTemplateIndentation)
|
|
370
|
+
def __init__(self, scope, id, *, description=None, env=None, stackName=None, tags=None, notificationArns=None, synthesizer=None, terminationProtection=None, analyticsReporting=None, crossRegionReferences=None, permissionsBoundary=None, suppressTemplateIndentation=None, propertyInjectors=None):
|
|
371
|
+
super().__init__(scope, id, description=description, env=env, stackName=stackName, tags=tags, notificationArns=notificationArns, synthesizer=synthesizer, terminationProtection=terminationProtection, analyticsReporting=analyticsReporting, crossRegionReferences=crossRegionReferences, permissionsBoundary=permissionsBoundary, suppressTemplateIndentation=suppressTemplateIndentation, propertyInjectors=propertyInjectors)
|
|
373
372
|
|
|
374
|
-
def add_file(self, *, sourceHash, executable=None, fileName=None, packaging=None, deployTime=None):
|
|
373
|
+
def add_file(self, *, sourceHash, executable=None, fileName=None, packaging=None, deployTime=None, displayName=None):
|
|
375
374
|
return FileStagingLocation(
|
|
376
375
|
bucket_name="amzn-s3-demo-bucket",
|
|
377
376
|
assume_role_arn="myArn",
|
|
378
377
|
dependency_stack=self
|
|
379
378
|
)
|
|
380
379
|
|
|
381
|
-
def add_docker_image(self, *, sourceHash, executable=None, directoryName=None, dockerBuildArgs=None, dockerBuildSecrets=None, dockerBuildSsh=None, dockerBuildTarget=None, dockerFile=None, repositoryName=None, networkMode=None, platform=None, dockerOutputs=None, assetName=None, dockerCacheFrom=None, dockerCacheTo=None, dockerCacheDisabled=None):
|
|
380
|
+
def add_docker_image(self, *, sourceHash, executable=None, directoryName=None, dockerBuildArgs=None, dockerBuildSecrets=None, dockerBuildSsh=None, dockerBuildTarget=None, dockerFile=None, repositoryName=None, networkMode=None, platform=None, dockerOutputs=None, assetName=None, dockerCacheFrom=None, dockerCacheTo=None, dockerCacheDisabled=None, displayName=None):
|
|
382
381
|
return ImageStagingLocation(
|
|
383
382
|
repo_name="myRepo",
|
|
384
383
|
assume_role_arn="myArn",
|
|
@@ -12,4 +12,4 @@ src/aws_cdk.app_staging_synthesizer_alpha.egg-info/top_level.txt
|
|
|
12
12
|
src/aws_cdk/app_staging_synthesizer_alpha/__init__.py
|
|
13
13
|
src/aws_cdk/app_staging_synthesizer_alpha/py.typed
|
|
14
14
|
src/aws_cdk/app_staging_synthesizer_alpha/_jsii/__init__.py
|
|
15
|
-
src/aws_cdk/app_staging_synthesizer_alpha/_jsii/app-staging-synthesizer-alpha@2.
|
|
15
|
+
src/aws_cdk/app_staging_synthesizer_alpha/_jsii/app-staging-synthesizer-alpha@2.227.0-alpha.0.jsii.tgz
|
|
Binary file
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|