aws-cdk.app-staging-synthesizer-alpha 2.178.0a0__tar.gz → 2.232.1a0__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (19) hide show
  1. {aws_cdk_app_staging_synthesizer_alpha-2.178.0a0/src/aws_cdk.app_staging_synthesizer_alpha.egg-info → aws_cdk_app_staging_synthesizer_alpha-2.232.1a0}/PKG-INFO +10 -11
  2. {aws_cdk_app_staging_synthesizer_alpha-2.178.0a0 → aws_cdk_app_staging_synthesizer_alpha-2.232.1a0}/README.md +5 -5
  3. {aws_cdk_app_staging_synthesizer_alpha-2.178.0a0 → aws_cdk_app_staging_synthesizer_alpha-2.232.1a0}/pyproject.toml +2 -2
  4. {aws_cdk_app_staging_synthesizer_alpha-2.178.0a0 → aws_cdk_app_staging_synthesizer_alpha-2.232.1a0}/setup.py +6 -7
  5. {aws_cdk_app_staging_synthesizer_alpha-2.178.0a0 → aws_cdk_app_staging_synthesizer_alpha-2.232.1a0}/src/aws_cdk/app_staging_synthesizer_alpha/__init__.py +71 -14
  6. {aws_cdk_app_staging_synthesizer_alpha-2.178.0a0 → aws_cdk_app_staging_synthesizer_alpha-2.232.1a0}/src/aws_cdk/app_staging_synthesizer_alpha/_jsii/__init__.py +2 -2
  7. aws_cdk_app_staging_synthesizer_alpha-2.232.1a0/src/aws_cdk/app_staging_synthesizer_alpha/_jsii/app-staging-synthesizer-alpha@2.232.1-alpha.0.jsii.tgz +0 -0
  8. {aws_cdk_app_staging_synthesizer_alpha-2.178.0a0 → aws_cdk_app_staging_synthesizer_alpha-2.232.1a0/src/aws_cdk.app_staging_synthesizer_alpha.egg-info}/PKG-INFO +10 -11
  9. {aws_cdk_app_staging_synthesizer_alpha-2.178.0a0 → aws_cdk_app_staging_synthesizer_alpha-2.232.1a0}/src/aws_cdk.app_staging_synthesizer_alpha.egg-info/SOURCES.txt +1 -1
  10. aws_cdk_app_staging_synthesizer_alpha-2.232.1a0/src/aws_cdk.app_staging_synthesizer_alpha.egg-info/requires.txt +5 -0
  11. aws_cdk_app_staging_synthesizer_alpha-2.178.0a0/src/aws_cdk/app_staging_synthesizer_alpha/_jsii/app-staging-synthesizer-alpha@2.178.0-alpha.0.jsii.tgz +0 -0
  12. aws_cdk_app_staging_synthesizer_alpha-2.178.0a0/src/aws_cdk.app_staging_synthesizer_alpha.egg-info/requires.txt +0 -5
  13. {aws_cdk_app_staging_synthesizer_alpha-2.178.0a0 → aws_cdk_app_staging_synthesizer_alpha-2.232.1a0}/LICENSE +0 -0
  14. {aws_cdk_app_staging_synthesizer_alpha-2.178.0a0 → aws_cdk_app_staging_synthesizer_alpha-2.232.1a0}/MANIFEST.in +0 -0
  15. {aws_cdk_app_staging_synthesizer_alpha-2.178.0a0 → aws_cdk_app_staging_synthesizer_alpha-2.232.1a0}/NOTICE +0 -0
  16. {aws_cdk_app_staging_synthesizer_alpha-2.178.0a0 → aws_cdk_app_staging_synthesizer_alpha-2.232.1a0}/setup.cfg +0 -0
  17. {aws_cdk_app_staging_synthesizer_alpha-2.178.0a0 → aws_cdk_app_staging_synthesizer_alpha-2.232.1a0}/src/aws_cdk/app_staging_synthesizer_alpha/py.typed +0 -0
  18. {aws_cdk_app_staging_synthesizer_alpha-2.178.0a0 → aws_cdk_app_staging_synthesizer_alpha-2.232.1a0}/src/aws_cdk.app_staging_synthesizer_alpha.egg-info/dependency_links.txt +0 -0
  19. {aws_cdk_app_staging_synthesizer_alpha-2.178.0a0 → aws_cdk_app_staging_synthesizer_alpha-2.232.1a0}/src/aws_cdk.app_staging_synthesizer_alpha.egg-info/top_level.txt +0 -0
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: aws-cdk.app-staging-synthesizer-alpha
3
- Version: 2.178.0a0
3
+ Version: 2.232.1a0
4
4
  Summary: Cdk synthesizer for with app-scoped staging stack
5
5
  Home-page: https://github.com/aws/aws-cdk
6
6
  Author: Amazon Web Services
@@ -10,7 +10,6 @@ Classifier: Intended Audience :: Developers
10
10
  Classifier: Operating System :: OS Independent
11
11
  Classifier: Programming Language :: JavaScript
12
12
  Classifier: Programming Language :: Python :: 3 :: Only
13
- Classifier: Programming Language :: Python :: 3.8
14
13
  Classifier: Programming Language :: Python :: 3.9
15
14
  Classifier: Programming Language :: Python :: 3.10
16
15
  Classifier: Programming Language :: Python :: 3.11
@@ -19,15 +18,15 @@ Classifier: Development Status :: 4 - Beta
19
18
  Classifier: License :: OSI Approved
20
19
  Classifier: Framework :: AWS CDK
21
20
  Classifier: Framework :: AWS CDK :: 2
22
- Requires-Python: ~=3.8
21
+ Requires-Python: ~=3.9
23
22
  Description-Content-Type: text/markdown
24
23
  License-File: LICENSE
25
24
  License-File: NOTICE
26
- Requires-Dist: aws-cdk-lib<3.0.0,>=2.178.0
25
+ Requires-Dist: aws-cdk-lib<3.0.0,>=2.232.1
27
26
  Requires-Dist: constructs<11.0.0,>=10.0.0
28
- Requires-Dist: jsii<2.0.0,>=1.106.0
27
+ Requires-Dist: jsii<2.0.0,>=1.120.0
29
28
  Requires-Dist: publication>=0.0.3
30
- Requires-Dist: typeguard<4.3.0,>=2.13.3
29
+ Requires-Dist: typeguard==2.13.3
31
30
 
32
31
  # App Staging Synthesizer
33
32
 
@@ -203,7 +202,7 @@ These credentials must have the ability to perform CloudFormation calls,
203
202
  lookup resources in your account, and perform CloudFormation deployment.
204
203
  For a full list of what is necessary, see `LookupRole`, `DeploymentActionRole`,
205
204
  and `CloudFormationExecutionRole` in the
206
- [bootstrap template](https://github.com/aws/aws-cdk/blob/main/packages/aws-cdk/lib/api/bootstrap/bootstrap-template.yaml).
205
+ [bootstrap template](https://github.com/aws/aws-cdk-cli/blob/main/packages/aws-cdk/lib/api/bootstrap/bootstrap-template.yaml).
207
206
 
208
207
  ```python
209
208
  from aws_cdk.aws_s3 import BucketEncryption
@@ -368,17 +367,17 @@ Or you can roll your own staging resources from scratch, as long as it implement
368
367
  ```python
369
368
  @jsii.implements(IStagingResources)
370
369
  class CustomStagingStack(Stack):
371
- def __init__(self, scope, id, *, description=None, env=None, stackName=None, tags=None, notificationArns=None, synthesizer=None, terminationProtection=None, analyticsReporting=None, crossRegionReferences=None, permissionsBoundary=None, suppressTemplateIndentation=None):
372
- super().__init__(scope, id, description=description, env=env, stackName=stackName, tags=tags, notificationArns=notificationArns, synthesizer=synthesizer, terminationProtection=terminationProtection, analyticsReporting=analyticsReporting, crossRegionReferences=crossRegionReferences, permissionsBoundary=permissionsBoundary, suppressTemplateIndentation=suppressTemplateIndentation)
370
+ def __init__(self, scope, id, *, description=None, env=None, stackName=None, tags=None, notificationArns=None, synthesizer=None, terminationProtection=None, analyticsReporting=None, crossRegionReferences=None, permissionsBoundary=None, suppressTemplateIndentation=None, propertyInjectors=None):
371
+ super().__init__(scope, id, description=description, env=env, stackName=stackName, tags=tags, notificationArns=notificationArns, synthesizer=synthesizer, terminationProtection=terminationProtection, analyticsReporting=analyticsReporting, crossRegionReferences=crossRegionReferences, permissionsBoundary=permissionsBoundary, suppressTemplateIndentation=suppressTemplateIndentation, propertyInjectors=propertyInjectors)
373
372
 
374
- def add_file(self, *, sourceHash, executable=None, fileName=None, packaging=None, deployTime=None):
373
+ def add_file(self, *, sourceHash, executable=None, fileName=None, packaging=None, deployTime=None, displayName=None):
375
374
  return FileStagingLocation(
376
375
  bucket_name="amzn-s3-demo-bucket",
377
376
  assume_role_arn="myArn",
378
377
  dependency_stack=self
379
378
  )
380
379
 
381
- def add_docker_image(self, *, sourceHash, executable=None, directoryName=None, dockerBuildArgs=None, dockerBuildSecrets=None, dockerBuildSsh=None, dockerBuildTarget=None, dockerFile=None, repositoryName=None, networkMode=None, platform=None, dockerOutputs=None, assetName=None, dockerCacheFrom=None, dockerCacheTo=None, dockerCacheDisabled=None):
380
+ def add_docker_image(self, *, sourceHash, executable=None, directoryName=None, dockerBuildArgs=None, dockerBuildSecrets=None, dockerBuildSsh=None, dockerBuildTarget=None, dockerFile=None, repositoryName=None, networkMode=None, platform=None, dockerOutputs=None, assetName=None, dockerCacheFrom=None, dockerCacheTo=None, dockerCacheDisabled=None, displayName=None):
382
381
  return ImageStagingLocation(
383
382
  repo_name="myRepo",
384
383
  assume_role_arn="myArn",
@@ -172,7 +172,7 @@ These credentials must have the ability to perform CloudFormation calls,
172
172
  lookup resources in your account, and perform CloudFormation deployment.
173
173
  For a full list of what is necessary, see `LookupRole`, `DeploymentActionRole`,
174
174
  and `CloudFormationExecutionRole` in the
175
- [bootstrap template](https://github.com/aws/aws-cdk/blob/main/packages/aws-cdk/lib/api/bootstrap/bootstrap-template.yaml).
175
+ [bootstrap template](https://github.com/aws/aws-cdk-cli/blob/main/packages/aws-cdk/lib/api/bootstrap/bootstrap-template.yaml).
176
176
 
177
177
  ```python
178
178
  from aws_cdk.aws_s3 import BucketEncryption
@@ -337,17 +337,17 @@ Or you can roll your own staging resources from scratch, as long as it implement
337
337
  ```python
338
338
  @jsii.implements(IStagingResources)
339
339
  class CustomStagingStack(Stack):
340
- def __init__(self, scope, id, *, description=None, env=None, stackName=None, tags=None, notificationArns=None, synthesizer=None, terminationProtection=None, analyticsReporting=None, crossRegionReferences=None, permissionsBoundary=None, suppressTemplateIndentation=None):
341
- super().__init__(scope, id, description=description, env=env, stackName=stackName, tags=tags, notificationArns=notificationArns, synthesizer=synthesizer, terminationProtection=terminationProtection, analyticsReporting=analyticsReporting, crossRegionReferences=crossRegionReferences, permissionsBoundary=permissionsBoundary, suppressTemplateIndentation=suppressTemplateIndentation)
340
+ def __init__(self, scope, id, *, description=None, env=None, stackName=None, tags=None, notificationArns=None, synthesizer=None, terminationProtection=None, analyticsReporting=None, crossRegionReferences=None, permissionsBoundary=None, suppressTemplateIndentation=None, propertyInjectors=None):
341
+ super().__init__(scope, id, description=description, env=env, stackName=stackName, tags=tags, notificationArns=notificationArns, synthesizer=synthesizer, terminationProtection=terminationProtection, analyticsReporting=analyticsReporting, crossRegionReferences=crossRegionReferences, permissionsBoundary=permissionsBoundary, suppressTemplateIndentation=suppressTemplateIndentation, propertyInjectors=propertyInjectors)
342
342
 
343
- def add_file(self, *, sourceHash, executable=None, fileName=None, packaging=None, deployTime=None):
343
+ def add_file(self, *, sourceHash, executable=None, fileName=None, packaging=None, deployTime=None, displayName=None):
344
344
  return FileStagingLocation(
345
345
  bucket_name="amzn-s3-demo-bucket",
346
346
  assume_role_arn="myArn",
347
347
  dependency_stack=self
348
348
  )
349
349
 
350
- def add_docker_image(self, *, sourceHash, executable=None, directoryName=None, dockerBuildArgs=None, dockerBuildSecrets=None, dockerBuildSsh=None, dockerBuildTarget=None, dockerFile=None, repositoryName=None, networkMode=None, platform=None, dockerOutputs=None, assetName=None, dockerCacheFrom=None, dockerCacheTo=None, dockerCacheDisabled=None):
350
+ def add_docker_image(self, *, sourceHash, executable=None, directoryName=None, dockerBuildArgs=None, dockerBuildSecrets=None, dockerBuildSsh=None, dockerBuildTarget=None, dockerFile=None, repositoryName=None, networkMode=None, platform=None, dockerOutputs=None, assetName=None, dockerCacheFrom=None, dockerCacheTo=None, dockerCacheDisabled=None, displayName=None):
351
351
  return ImageStagingLocation(
352
352
  repo_name="myRepo",
353
353
  assume_role_arn="myArn",
@@ -1,9 +1,9 @@
1
1
  [build-system]
2
- requires = ["setuptools~=70.0.0", "wheel~=0.42"]
2
+ requires = ["setuptools~=75.3.2", "build~=1.3.0"]
3
3
  build-backend = "setuptools.build_meta"
4
4
 
5
5
  [tool.pyright]
6
6
  defineConstant = { DEBUG = true }
7
- pythonVersion = "3.8"
7
+ pythonVersion = "3.9"
8
8
  pythonPlatform = "All"
9
9
  reportSelfClsParameterName = false
@@ -5,7 +5,7 @@ kwargs = json.loads(
5
5
  """
6
6
  {
7
7
  "name": "aws-cdk.app-staging-synthesizer-alpha",
8
- "version": "2.178.0.a0",
8
+ "version": "2.232.1.a0",
9
9
  "description": "Cdk synthesizer for with app-scoped staging stack",
10
10
  "license": "Apache-2.0",
11
11
  "url": "https://github.com/aws/aws-cdk",
@@ -26,26 +26,25 @@ kwargs = json.loads(
26
26
  ],
27
27
  "package_data": {
28
28
  "aws_cdk.app_staging_synthesizer_alpha._jsii": [
29
- "app-staging-synthesizer-alpha@2.178.0-alpha.0.jsii.tgz"
29
+ "app-staging-synthesizer-alpha@2.232.1-alpha.0.jsii.tgz"
30
30
  ],
31
31
  "aws_cdk.app_staging_synthesizer_alpha": [
32
32
  "py.typed"
33
33
  ]
34
34
  },
35
- "python_requires": "~=3.8",
35
+ "python_requires": "~=3.9",
36
36
  "install_requires": [
37
- "aws-cdk-lib>=2.178.0, <3.0.0",
37
+ "aws-cdk-lib>=2.232.1, <3.0.0",
38
38
  "constructs>=10.0.0, <11.0.0",
39
- "jsii>=1.106.0, <2.0.0",
39
+ "jsii>=1.120.0, <2.0.0",
40
40
  "publication>=0.0.3",
41
- "typeguard>=2.13.3,<4.3.0"
41
+ "typeguard==2.13.3"
42
42
  ],
43
43
  "classifiers": [
44
44
  "Intended Audience :: Developers",
45
45
  "Operating System :: OS Independent",
46
46
  "Programming Language :: JavaScript",
47
47
  "Programming Language :: Python :: 3 :: Only",
48
- "Programming Language :: Python :: 3.8",
49
48
  "Programming Language :: Python :: 3.9",
50
49
  "Programming Language :: Python :: 3.10",
51
50
  "Programming Language :: Python :: 3.11",
@@ -173,7 +173,7 @@ These credentials must have the ability to perform CloudFormation calls,
173
173
  lookup resources in your account, and perform CloudFormation deployment.
174
174
  For a full list of what is necessary, see `LookupRole`, `DeploymentActionRole`,
175
175
  and `CloudFormationExecutionRole` in the
176
- [bootstrap template](https://github.com/aws/aws-cdk/blob/main/packages/aws-cdk/lib/api/bootstrap/bootstrap-template.yaml).
176
+ [bootstrap template](https://github.com/aws/aws-cdk-cli/blob/main/packages/aws-cdk/lib/api/bootstrap/bootstrap-template.yaml).
177
177
 
178
178
  ```python
179
179
  from aws_cdk.aws_s3 import BucketEncryption
@@ -338,17 +338,17 @@ Or you can roll your own staging resources from scratch, as long as it implement
338
338
  ```python
339
339
  @jsii.implements(IStagingResources)
340
340
  class CustomStagingStack(Stack):
341
- def __init__(self, scope, id, *, description=None, env=None, stackName=None, tags=None, notificationArns=None, synthesizer=None, terminationProtection=None, analyticsReporting=None, crossRegionReferences=None, permissionsBoundary=None, suppressTemplateIndentation=None):
342
- super().__init__(scope, id, description=description, env=env, stackName=stackName, tags=tags, notificationArns=notificationArns, synthesizer=synthesizer, terminationProtection=terminationProtection, analyticsReporting=analyticsReporting, crossRegionReferences=crossRegionReferences, permissionsBoundary=permissionsBoundary, suppressTemplateIndentation=suppressTemplateIndentation)
341
+ def __init__(self, scope, id, *, description=None, env=None, stackName=None, tags=None, notificationArns=None, synthesizer=None, terminationProtection=None, analyticsReporting=None, crossRegionReferences=None, permissionsBoundary=None, suppressTemplateIndentation=None, propertyInjectors=None):
342
+ super().__init__(scope, id, description=description, env=env, stackName=stackName, tags=tags, notificationArns=notificationArns, synthesizer=synthesizer, terminationProtection=terminationProtection, analyticsReporting=analyticsReporting, crossRegionReferences=crossRegionReferences, permissionsBoundary=permissionsBoundary, suppressTemplateIndentation=suppressTemplateIndentation, propertyInjectors=propertyInjectors)
343
343
 
344
- def add_file(self, *, sourceHash, executable=None, fileName=None, packaging=None, deployTime=None):
344
+ def add_file(self, *, sourceHash, executable=None, fileName=None, packaging=None, deployTime=None, displayName=None):
345
345
  return FileStagingLocation(
346
346
  bucket_name="amzn-s3-demo-bucket",
347
347
  assume_role_arn="myArn",
348
348
  dependency_stack=self
349
349
  )
350
350
 
351
- def add_docker_image(self, *, sourceHash, executable=None, directoryName=None, dockerBuildArgs=None, dockerBuildSecrets=None, dockerBuildSsh=None, dockerBuildTarget=None, dockerFile=None, repositoryName=None, networkMode=None, platform=None, dockerOutputs=None, assetName=None, dockerCacheFrom=None, dockerCacheTo=None, dockerCacheDisabled=None):
351
+ def add_docker_image(self, *, sourceHash, executable=None, directoryName=None, dockerBuildArgs=None, dockerBuildSecrets=None, dockerBuildSsh=None, dockerBuildTarget=None, dockerFile=None, repositoryName=None, networkMode=None, platform=None, dockerOutputs=None, assetName=None, dockerCacheFrom=None, dockerCacheTo=None, dockerCacheDisabled=None, displayName=None):
352
352
  return ImageStagingLocation(
353
353
  repo_name="myRepo",
354
354
  assume_role_arn="myArn",
@@ -587,6 +587,7 @@ class AppStagingSynthesizer(
587
587
  source_hash: builtins.str,
588
588
  asset_name: typing.Optional[builtins.str] = None,
589
589
  directory_name: typing.Optional[builtins.str] = None,
590
+ display_name: typing.Optional[builtins.str] = None,
590
591
  docker_build_args: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
591
592
  docker_build_secrets: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
592
593
  docker_build_ssh: typing.Optional[builtins.str] = None,
@@ -607,6 +608,7 @@ class AppStagingSynthesizer(
607
608
  :param source_hash: The hash of the contents of the docker build context. This hash is used throughout the system to identify this image and avoid duplicate work in case the source did not change. NOTE: this means that if you wish to update your docker image, you must make a modification to the source (e.g. add some metadata to your Dockerfile).
608
609
  :param asset_name: Unique identifier of the docker image asset and its potential revisions. Required if using AppScopedStagingSynthesizer. Default: - no asset name
609
610
  :param directory_name: The directory where the Dockerfile is stored, must be relative to the cloud assembly root. Default: - Exactly one of ``directoryName`` and ``executable`` is required
611
+ :param display_name: A display name for this asset. If supplied, the display name will be used in locations where the asset identifier is printed, like in the CLI progress information. Default: - The asset hash is used to display the asset
610
612
  :param docker_build_args: Build args to pass to the ``docker build`` command. Since Docker build arguments are resolved before deployment, keys and values cannot refer to unresolved tokens (such as ``lambda.functionArn`` or ``queue.queueUrl``). Only allowed when ``directoryName`` is specified. Default: - no build args are passed
611
613
  :param docker_build_secrets: Build secrets to pass to the ``docker build`` command. Since Docker build secrets are resolved before deployment, keys and values cannot refer to unresolved tokens (such as ``lambda.functionArn`` or ``queue.queueUrl``). Only allowed when ``directoryName`` is specified. Default: - no build secrets are passed
612
614
  :param docker_build_ssh: SSH agent socket or keys to pass to the ``docker buildx`` command. Default: - no ssh arg is passed
@@ -626,6 +628,7 @@ class AppStagingSynthesizer(
626
628
  source_hash=source_hash,
627
629
  asset_name=asset_name,
628
630
  directory_name=directory_name,
631
+ display_name=display_name,
629
632
  docker_build_args=docker_build_args,
630
633
  docker_build_secrets=docker_build_secrets,
631
634
  docker_build_ssh=docker_build_ssh,
@@ -648,6 +651,7 @@ class AppStagingSynthesizer(
648
651
  *,
649
652
  source_hash: builtins.str,
650
653
  deploy_time: typing.Optional[builtins.bool] = None,
654
+ display_name: typing.Optional[builtins.str] = None,
651
655
  executable: typing.Optional[typing.Sequence[builtins.str]] = None,
652
656
  file_name: typing.Optional[builtins.str] = None,
653
657
  packaging: typing.Optional[_aws_cdk_ceddda9d.FileAssetPackaging] = None,
@@ -658,6 +662,7 @@ class AppStagingSynthesizer(
658
662
 
659
663
  :param source_hash: A hash on the content source. This hash is used to uniquely identify this asset throughout the system. If this value doesn't change, the asset will not be rebuilt or republished.
660
664
  :param deploy_time: Whether or not the asset needs to exist beyond deployment time; i.e. are copied over to a different location and not needed afterwards. Setting this property to true has an impact on the lifecycle of the asset, because we will assume that it is safe to delete after the CloudFormation deployment succeeds. For example, Lambda Function assets are copied over to Lambda during deployment. Therefore, it is not necessary to store the asset in S3, so we consider those deployTime assets. Default: false
665
+ :param display_name: A display name for this asset. If supplied, the display name will be used in locations where the asset identifier is printed, like in the CLI progress information. Default: - The asset hash is used to display the asset
661
666
  :param executable: An external command that will produce the packaged asset. The command should produce the location of a ZIP file on ``stdout``. Default: - Exactly one of ``fileName`` and ``executable`` is required
662
667
  :param file_name: The path, relative to the root of the cloud assembly, in which this asset source resides. This can be a path to a file or a directory, depending on the packaging type. Default: - Exactly one of ``fileName`` and ``executable`` is required
663
668
  :param packaging: Which type of packaging to perform. Default: - Required if ``fileName`` is specified.
@@ -667,6 +672,7 @@ class AppStagingSynthesizer(
667
672
  _asset = _aws_cdk_ceddda9d.FileAssetSource(
668
673
  source_hash=source_hash,
669
674
  deploy_time=deploy_time,
675
+ display_name=display_name,
670
676
  executable=executable,
671
677
  file_name=file_name,
672
678
  packaging=packaging,
@@ -1549,6 +1555,7 @@ class DefaultStagingStackOptions:
1549
1555
  "env": "env",
1550
1556
  "notification_arns": "notificationArns",
1551
1557
  "permissions_boundary": "permissionsBoundary",
1558
+ "property_injectors": "propertyInjectors",
1552
1559
  "stack_name": "stackName",
1553
1560
  "suppress_template_indentation": "suppressTemplateIndentation",
1554
1561
  "synthesizer": "synthesizer",
@@ -1580,6 +1587,7 @@ class DefaultStagingStackProps(
1580
1587
  env: typing.Optional[typing.Union[_aws_cdk_ceddda9d.Environment, typing.Dict[builtins.str, typing.Any]]] = None,
1581
1588
  notification_arns: typing.Optional[typing.Sequence[builtins.str]] = None,
1582
1589
  permissions_boundary: typing.Optional[_aws_cdk_ceddda9d.PermissionsBoundary] = None,
1590
+ property_injectors: typing.Optional[typing.Sequence[_aws_cdk_ceddda9d.IPropertyInjector]] = None,
1583
1591
  stack_name: typing.Optional[builtins.str] = None,
1584
1592
  suppress_template_indentation: typing.Optional[builtins.bool] = None,
1585
1593
  synthesizer: typing.Optional[_aws_cdk_ceddda9d.IStackSynthesizer] = None,
@@ -1603,14 +1611,15 @@ class DefaultStagingStackProps(
1603
1611
  :param cross_region_references: Enable this flag to allow native cross region stack references. Enabling this will create a CloudFormation custom resource in both the producing stack and consuming stack in order to perform the export/import This feature is currently experimental Default: false
1604
1612
  :param description: A description of the stack. Default: - No description.
1605
1613
  :param env: The AWS environment (account/region) where this stack will be deployed. Set the ``region``/``account`` fields of ``env`` to either a concrete value to select the indicated environment (recommended for production stacks), or to the values of environment variables ``CDK_DEFAULT_REGION``/``CDK_DEFAULT_ACCOUNT`` to let the target environment depend on the AWS credentials/configuration that the CDK CLI is executed under (recommended for development stacks). If the ``Stack`` is instantiated inside a ``Stage``, any undefined ``region``/``account`` fields from ``env`` will default to the same field on the encompassing ``Stage``, if configured there. If either ``region`` or ``account`` are not set nor inherited from ``Stage``, the Stack will be considered "*environment-agnostic*"". Environment-agnostic stacks can be deployed to any environment but may not be able to take advantage of all features of the CDK. For example, they will not be able to use environmental context lookups such as ``ec2.Vpc.fromLookup`` and will not automatically translate Service Principals to the right format based on the environment's AWS partition, and other such enhancements. Default: - The environment of the containing ``Stage`` if available, otherwise create the stack will be environment-agnostic.
1606
- :param notification_arns: SNS Topic ARNs that will receive stack events. Default: - no notfication arns.
1614
+ :param notification_arns: SNS Topic ARNs that will receive stack events. Default: - no notification arns.
1607
1615
  :param permissions_boundary: Options for applying a permissions boundary to all IAM Roles and Users created within this Stage. Default: - no permissions boundary is applied
1616
+ :param property_injectors: A list of IPropertyInjector attached to this Stack. Default: - no PropertyInjectors
1608
1617
  :param stack_name: Name to deploy the stack with. Default: - Derived from construct path.
1609
1618
  :param suppress_template_indentation: Enable this flag to suppress indentation in generated CloudFormation templates. If not specified, the value of the ``@aws-cdk/core:suppressTemplateIndentation`` context key will be used. If that is not specified, then the default value ``false`` will be used. Default: - the value of ``@aws-cdk/core:suppressTemplateIndentation``, or ``false`` if that is not set.
1610
1619
  :param synthesizer: Synthesis method to use while deploying this stack. The Stack Synthesizer controls aspects of synthesis and deployment, like how assets are referenced and what IAM roles to use. For more information, see the README of the main CDK package. If not specified, the ``defaultStackSynthesizer`` from ``App`` will be used. If that is not specified, ``DefaultStackSynthesizer`` is used if ``@aws-cdk/core:newStyleStackSynthesis`` is set to ``true`` or the CDK major version is v2. In CDK v1 ``LegacyStackSynthesizer`` is the default if no other synthesizer is specified. Default: - The synthesizer specified on ``App``, or ``DefaultStackSynthesizer`` otherwise.
1611
- :param tags: Stack tags that will be applied to all the taggable resources and the stack itself. Default: {}
1620
+ :param tags: Tags that will be applied to the Stack. These tags are applied to the CloudFormation Stack itself. They will not appear in the CloudFormation template. However, at deployment time, CloudFormation will apply these tags to all resources in the stack that support tagging. You will not be able to exempt resources from tagging (using the ``excludeResourceTypes`` property of ``Tags.of(...).add()``) for tags applied in this way. Default: {}
1612
1621
  :param termination_protection: Whether to enable termination protection for this stack. Default: false
1613
- :param qualifier: (experimental) The qualifier used to specialize strings. Shouldn't be necessary but who knows what people might do.
1622
+ :param qualifier: (experimental) The qualifier used to specialize strings. Can be used to specify custom bootstrapped role names
1614
1623
  :param deploy_role_arn: (experimental) The ARN of the deploy action role, if given. This role will need permissions to read from to the staging resources. Default: - The CLI credentials are assumed, no additional permissions are granted.
1615
1624
 
1616
1625
  :stability: experimental
@@ -1626,6 +1635,7 @@ class DefaultStagingStackProps(
1626
1635
 
1627
1636
  # bootstrap_role: app_staging_synthesizer_alpha.BootstrapRole
1628
1637
  # permissions_boundary: cdk.PermissionsBoundary
1638
+ # property_injector: cdk.IPropertyInjector
1629
1639
  # stack_synthesizer: cdk.StackSynthesizer
1630
1640
 
1631
1641
  default_staging_stack_props = app_staging_synthesizer_alpha.DefaultStagingStackProps(
@@ -1649,6 +1659,7 @@ class DefaultStagingStackProps(
1649
1659
  image_asset_version_count=123,
1650
1660
  notification_arns=["notificationArns"],
1651
1661
  permissions_boundary=permissions_boundary,
1662
+ property_injectors=[property_injector],
1652
1663
  stack_name="stackName",
1653
1664
  staging_bucket_name="stagingBucketName",
1654
1665
  staging_stack_name_prefix="stagingStackNamePrefix",
@@ -1679,6 +1690,7 @@ class DefaultStagingStackProps(
1679
1690
  check_type(argname="argument env", value=env, expected_type=type_hints["env"])
1680
1691
  check_type(argname="argument notification_arns", value=notification_arns, expected_type=type_hints["notification_arns"])
1681
1692
  check_type(argname="argument permissions_boundary", value=permissions_boundary, expected_type=type_hints["permissions_boundary"])
1693
+ check_type(argname="argument property_injectors", value=property_injectors, expected_type=type_hints["property_injectors"])
1682
1694
  check_type(argname="argument stack_name", value=stack_name, expected_type=type_hints["stack_name"])
1683
1695
  check_type(argname="argument suppress_template_indentation", value=suppress_template_indentation, expected_type=type_hints["suppress_template_indentation"])
1684
1696
  check_type(argname="argument synthesizer", value=synthesizer, expected_type=type_hints["synthesizer"])
@@ -1717,6 +1729,8 @@ class DefaultStagingStackProps(
1717
1729
  self._values["notification_arns"] = notification_arns
1718
1730
  if permissions_boundary is not None:
1719
1731
  self._values["permissions_boundary"] = permissions_boundary
1732
+ if property_injectors is not None:
1733
+ self._values["property_injectors"] = property_injectors
1720
1734
  if stack_name is not None:
1721
1735
  self._values["stack_name"] = stack_name
1722
1736
  if suppress_template_indentation is not None:
@@ -1974,7 +1988,7 @@ class DefaultStagingStackProps(
1974
1988
  def notification_arns(self) -> typing.Optional[typing.List[builtins.str]]:
1975
1989
  '''SNS Topic ARNs that will receive stack events.
1976
1990
 
1977
- :default: - no notfication arns.
1991
+ :default: - no notification arns.
1978
1992
  '''
1979
1993
  result = self._values.get("notification_arns")
1980
1994
  return typing.cast(typing.Optional[typing.List[builtins.str]], result)
@@ -1990,6 +2004,17 @@ class DefaultStagingStackProps(
1990
2004
  result = self._values.get("permissions_boundary")
1991
2005
  return typing.cast(typing.Optional[_aws_cdk_ceddda9d.PermissionsBoundary], result)
1992
2006
 
2007
+ @builtins.property
2008
+ def property_injectors(
2009
+ self,
2010
+ ) -> typing.Optional[typing.List[_aws_cdk_ceddda9d.IPropertyInjector]]:
2011
+ '''A list of IPropertyInjector attached to this Stack.
2012
+
2013
+ :default: - no PropertyInjectors
2014
+ '''
2015
+ result = self._values.get("property_injectors")
2016
+ return typing.cast(typing.Optional[typing.List[_aws_cdk_ceddda9d.IPropertyInjector]], result)
2017
+
1993
2018
  @builtins.property
1994
2019
  def stack_name(self) -> typing.Optional[builtins.str]:
1995
2020
  '''Name to deploy the stack with.
@@ -2033,7 +2058,15 @@ class DefaultStagingStackProps(
2033
2058
 
2034
2059
  @builtins.property
2035
2060
  def tags(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
2036
- '''Stack tags that will be applied to all the taggable resources and the stack itself.
2061
+ '''Tags that will be applied to the Stack.
2062
+
2063
+ These tags are applied to the CloudFormation Stack itself. They will not
2064
+ appear in the CloudFormation template.
2065
+
2066
+ However, at deployment time, CloudFormation will apply these tags to all
2067
+ resources in the stack that support tagging. You will not be able to exempt
2068
+ resources from tagging (using the ``excludeResourceTypes`` property of
2069
+ ``Tags.of(...).add()``) for tags applied in this way.
2037
2070
 
2038
2071
  :default: {}
2039
2072
  '''
@@ -2053,7 +2086,7 @@ class DefaultStagingStackProps(
2053
2086
  def qualifier(self) -> builtins.str:
2054
2087
  '''(experimental) The qualifier used to specialize strings.
2055
2088
 
2056
- Shouldn't be necessary but who knows what people might do.
2089
+ Can be used to specify custom bootstrapped role names
2057
2090
 
2058
2091
  :stability: experimental
2059
2092
  '''
@@ -2328,6 +2361,7 @@ class IStagingResources(_constructs_77d1e7e8.IConstruct, typing_extensions.Proto
2328
2361
  source_hash: builtins.str,
2329
2362
  asset_name: typing.Optional[builtins.str] = None,
2330
2363
  directory_name: typing.Optional[builtins.str] = None,
2364
+ display_name: typing.Optional[builtins.str] = None,
2331
2365
  docker_build_args: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
2332
2366
  docker_build_secrets: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
2333
2367
  docker_build_ssh: typing.Optional[builtins.str] = None,
@@ -2346,6 +2380,7 @@ class IStagingResources(_constructs_77d1e7e8.IConstruct, typing_extensions.Proto
2346
2380
  :param source_hash: The hash of the contents of the docker build context. This hash is used throughout the system to identify this image and avoid duplicate work in case the source did not change. NOTE: this means that if you wish to update your docker image, you must make a modification to the source (e.g. add some metadata to your Dockerfile).
2347
2381
  :param asset_name: Unique identifier of the docker image asset and its potential revisions. Required if using AppScopedStagingSynthesizer. Default: - no asset name
2348
2382
  :param directory_name: The directory where the Dockerfile is stored, must be relative to the cloud assembly root. Default: - Exactly one of ``directoryName`` and ``executable`` is required
2383
+ :param display_name: A display name for this asset. If supplied, the display name will be used in locations where the asset identifier is printed, like in the CLI progress information. Default: - The asset hash is used to display the asset
2349
2384
  :param docker_build_args: Build args to pass to the ``docker build`` command. Since Docker build arguments are resolved before deployment, keys and values cannot refer to unresolved tokens (such as ``lambda.functionArn`` or ``queue.queueUrl``). Only allowed when ``directoryName`` is specified. Default: - no build args are passed
2350
2385
  :param docker_build_secrets: Build secrets to pass to the ``docker build`` command. Since Docker build secrets are resolved before deployment, keys and values cannot refer to unresolved tokens (such as ``lambda.functionArn`` or ``queue.queueUrl``). Only allowed when ``directoryName`` is specified. Default: - no build secrets are passed
2351
2386
  :param docker_build_ssh: SSH agent socket or keys to pass to the ``docker buildx`` command. Default: - no ssh arg is passed
@@ -2369,6 +2404,7 @@ class IStagingResources(_constructs_77d1e7e8.IConstruct, typing_extensions.Proto
2369
2404
  *,
2370
2405
  source_hash: builtins.str,
2371
2406
  deploy_time: typing.Optional[builtins.bool] = None,
2407
+ display_name: typing.Optional[builtins.str] = None,
2372
2408
  executable: typing.Optional[typing.Sequence[builtins.str]] = None,
2373
2409
  file_name: typing.Optional[builtins.str] = None,
2374
2410
  packaging: typing.Optional[_aws_cdk_ceddda9d.FileAssetPackaging] = None,
@@ -2377,6 +2413,7 @@ class IStagingResources(_constructs_77d1e7e8.IConstruct, typing_extensions.Proto
2377
2413
 
2378
2414
  :param source_hash: A hash on the content source. This hash is used to uniquely identify this asset throughout the system. If this value doesn't change, the asset will not be rebuilt or republished.
2379
2415
  :param deploy_time: Whether or not the asset needs to exist beyond deployment time; i.e. are copied over to a different location and not needed afterwards. Setting this property to true has an impact on the lifecycle of the asset, because we will assume that it is safe to delete after the CloudFormation deployment succeeds. For example, Lambda Function assets are copied over to Lambda during deployment. Therefore, it is not necessary to store the asset in S3, so we consider those deployTime assets. Default: false
2416
+ :param display_name: A display name for this asset. If supplied, the display name will be used in locations where the asset identifier is printed, like in the CLI progress information. Default: - The asset hash is used to display the asset
2380
2417
  :param executable: An external command that will produce the packaged asset. The command should produce the location of a ZIP file on ``stdout``. Default: - Exactly one of ``fileName`` and ``executable`` is required
2381
2418
  :param file_name: The path, relative to the root of the cloud assembly, in which this asset source resides. This can be a path to a file or a directory, depending on the packaging type. Default: - Exactly one of ``fileName`` and ``executable`` is required
2382
2419
  :param packaging: Which type of packaging to perform. Default: - Required if ``fileName`` is specified.
@@ -2403,6 +2440,7 @@ class _IStagingResourcesProxy(
2403
2440
  source_hash: builtins.str,
2404
2441
  asset_name: typing.Optional[builtins.str] = None,
2405
2442
  directory_name: typing.Optional[builtins.str] = None,
2443
+ display_name: typing.Optional[builtins.str] = None,
2406
2444
  docker_build_args: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
2407
2445
  docker_build_secrets: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
2408
2446
  docker_build_ssh: typing.Optional[builtins.str] = None,
@@ -2421,6 +2459,7 @@ class _IStagingResourcesProxy(
2421
2459
  :param source_hash: The hash of the contents of the docker build context. This hash is used throughout the system to identify this image and avoid duplicate work in case the source did not change. NOTE: this means that if you wish to update your docker image, you must make a modification to the source (e.g. add some metadata to your Dockerfile).
2422
2460
  :param asset_name: Unique identifier of the docker image asset and its potential revisions. Required if using AppScopedStagingSynthesizer. Default: - no asset name
2423
2461
  :param directory_name: The directory where the Dockerfile is stored, must be relative to the cloud assembly root. Default: - Exactly one of ``directoryName`` and ``executable`` is required
2462
+ :param display_name: A display name for this asset. If supplied, the display name will be used in locations where the asset identifier is printed, like in the CLI progress information. Default: - The asset hash is used to display the asset
2424
2463
  :param docker_build_args: Build args to pass to the ``docker build`` command. Since Docker build arguments are resolved before deployment, keys and values cannot refer to unresolved tokens (such as ``lambda.functionArn`` or ``queue.queueUrl``). Only allowed when ``directoryName`` is specified. Default: - no build args are passed
2425
2464
  :param docker_build_secrets: Build secrets to pass to the ``docker build`` command. Since Docker build secrets are resolved before deployment, keys and values cannot refer to unresolved tokens (such as ``lambda.functionArn`` or ``queue.queueUrl``). Only allowed when ``directoryName`` is specified. Default: - no build secrets are passed
2426
2465
  :param docker_build_ssh: SSH agent socket or keys to pass to the ``docker buildx`` command. Default: - no ssh arg is passed
@@ -2440,6 +2479,7 @@ class _IStagingResourcesProxy(
2440
2479
  source_hash=source_hash,
2441
2480
  asset_name=asset_name,
2442
2481
  directory_name=directory_name,
2482
+ display_name=display_name,
2443
2483
  docker_build_args=docker_build_args,
2444
2484
  docker_build_secrets=docker_build_secrets,
2445
2485
  docker_build_ssh=docker_build_ssh,
@@ -2462,6 +2502,7 @@ class _IStagingResourcesProxy(
2462
2502
  *,
2463
2503
  source_hash: builtins.str,
2464
2504
  deploy_time: typing.Optional[builtins.bool] = None,
2505
+ display_name: typing.Optional[builtins.str] = None,
2465
2506
  executable: typing.Optional[typing.Sequence[builtins.str]] = None,
2466
2507
  file_name: typing.Optional[builtins.str] = None,
2467
2508
  packaging: typing.Optional[_aws_cdk_ceddda9d.FileAssetPackaging] = None,
@@ -2470,6 +2511,7 @@ class _IStagingResourcesProxy(
2470
2511
 
2471
2512
  :param source_hash: A hash on the content source. This hash is used to uniquely identify this asset throughout the system. If this value doesn't change, the asset will not be rebuilt or republished.
2472
2513
  :param deploy_time: Whether or not the asset needs to exist beyond deployment time; i.e. are copied over to a different location and not needed afterwards. Setting this property to true has an impact on the lifecycle of the asset, because we will assume that it is safe to delete after the CloudFormation deployment succeeds. For example, Lambda Function assets are copied over to Lambda during deployment. Therefore, it is not necessary to store the asset in S3, so we consider those deployTime assets. Default: false
2514
+ :param display_name: A display name for this asset. If supplied, the display name will be used in locations where the asset identifier is printed, like in the CLI progress information. Default: - The asset hash is used to display the asset
2473
2515
  :param executable: An external command that will produce the packaged asset. The command should produce the location of a ZIP file on ``stdout``. Default: - Exactly one of ``fileName`` and ``executable`` is required
2474
2516
  :param file_name: The path, relative to the root of the cloud assembly, in which this asset source resides. This can be a path to a file or a directory, depending on the packaging type. Default: - Exactly one of ``fileName`` and ``executable`` is required
2475
2517
  :param packaging: Which type of packaging to perform. Default: - Required if ``fileName`` is specified.
@@ -2479,6 +2521,7 @@ class _IStagingResourcesProxy(
2479
2521
  asset = _aws_cdk_ceddda9d.FileAssetSource(
2480
2522
  source_hash=source_hash,
2481
2523
  deploy_time=deploy_time,
2524
+ display_name=display_name,
2482
2525
  executable=executable,
2483
2526
  file_name=file_name,
2484
2527
  packaging=packaging,
@@ -3216,6 +3259,7 @@ class DefaultStagingStack(
3216
3259
  env: typing.Optional[typing.Union[_aws_cdk_ceddda9d.Environment, typing.Dict[builtins.str, typing.Any]]] = None,
3217
3260
  notification_arns: typing.Optional[typing.Sequence[builtins.str]] = None,
3218
3261
  permissions_boundary: typing.Optional[_aws_cdk_ceddda9d.PermissionsBoundary] = None,
3262
+ property_injectors: typing.Optional[typing.Sequence[_aws_cdk_ceddda9d.IPropertyInjector]] = None,
3219
3263
  stack_name: typing.Optional[builtins.str] = None,
3220
3264
  suppress_template_indentation: typing.Optional[builtins.bool] = None,
3221
3265
  synthesizer: typing.Optional[_aws_cdk_ceddda9d.IStackSynthesizer] = None,
@@ -3225,7 +3269,7 @@ class DefaultStagingStack(
3225
3269
  '''
3226
3270
  :param scope: -
3227
3271
  :param id: -
3228
- :param qualifier: (experimental) The qualifier used to specialize strings. Shouldn't be necessary but who knows what people might do.
3272
+ :param qualifier: (experimental) The qualifier used to specialize strings. Can be used to specify custom bootstrapped role names
3229
3273
  :param deploy_role_arn: (experimental) The ARN of the deploy action role, if given. This role will need permissions to read from to the staging resources. Default: - The CLI credentials are assumed, no additional permissions are granted.
3230
3274
  :param app_id: (experimental) A unique identifier for the application that the staging stack belongs to. This identifier will be used in the name of staging resources created for this application, and should be unique across CDK apps. The identifier should include lowercase characters and dashes ('-') only and have a maximum of 20 characters.
3231
3275
  :param staging_bucket_encryption: (experimental) Encryption type for staging bucket. In future versions of this package, the default will be BucketEncryption.S3_MANAGED. In previous versions of this package, the default was to use KMS encryption for the staging bucket. KMS keys cost $1/month, which could result in unexpected costs for users who are not aware of this. As we stabilize this module we intend to make the default S3-managed encryption, which is free. However, the migration path from KMS to S3 managed encryption for existing buckets is not straightforward. Therefore, for now, this property is required. If you have an existing staging bucket encrypted with a KMS key, you will likely want to set this property to BucketEncryption.KMS. If you are creating a new staging bucket, you can set this property to BucketEncryption.S3_MANAGED to avoid the cost of a KMS key.
@@ -3240,12 +3284,13 @@ class DefaultStagingStack(
3240
3284
  :param cross_region_references: Enable this flag to allow native cross region stack references. Enabling this will create a CloudFormation custom resource in both the producing stack and consuming stack in order to perform the export/import This feature is currently experimental Default: false
3241
3285
  :param description: A description of the stack. Default: - No description.
3242
3286
  :param env: The AWS environment (account/region) where this stack will be deployed. Set the ``region``/``account`` fields of ``env`` to either a concrete value to select the indicated environment (recommended for production stacks), or to the values of environment variables ``CDK_DEFAULT_REGION``/``CDK_DEFAULT_ACCOUNT`` to let the target environment depend on the AWS credentials/configuration that the CDK CLI is executed under (recommended for development stacks). If the ``Stack`` is instantiated inside a ``Stage``, any undefined ``region``/``account`` fields from ``env`` will default to the same field on the encompassing ``Stage``, if configured there. If either ``region`` or ``account`` are not set nor inherited from ``Stage``, the Stack will be considered "*environment-agnostic*"". Environment-agnostic stacks can be deployed to any environment but may not be able to take advantage of all features of the CDK. For example, they will not be able to use environmental context lookups such as ``ec2.Vpc.fromLookup`` and will not automatically translate Service Principals to the right format based on the environment's AWS partition, and other such enhancements. Default: - The environment of the containing ``Stage`` if available, otherwise create the stack will be environment-agnostic.
3243
- :param notification_arns: SNS Topic ARNs that will receive stack events. Default: - no notfication arns.
3287
+ :param notification_arns: SNS Topic ARNs that will receive stack events. Default: - no notification arns.
3244
3288
  :param permissions_boundary: Options for applying a permissions boundary to all IAM Roles and Users created within this Stage. Default: - no permissions boundary is applied
3289
+ :param property_injectors: A list of IPropertyInjector attached to this Stack. Default: - no PropertyInjectors
3245
3290
  :param stack_name: Name to deploy the stack with. Default: - Derived from construct path.
3246
3291
  :param suppress_template_indentation: Enable this flag to suppress indentation in generated CloudFormation templates. If not specified, the value of the ``@aws-cdk/core:suppressTemplateIndentation`` context key will be used. If that is not specified, then the default value ``false`` will be used. Default: - the value of ``@aws-cdk/core:suppressTemplateIndentation``, or ``false`` if that is not set.
3247
3292
  :param synthesizer: Synthesis method to use while deploying this stack. The Stack Synthesizer controls aspects of synthesis and deployment, like how assets are referenced and what IAM roles to use. For more information, see the README of the main CDK package. If not specified, the ``defaultStackSynthesizer`` from ``App`` will be used. If that is not specified, ``DefaultStackSynthesizer`` is used if ``@aws-cdk/core:newStyleStackSynthesis`` is set to ``true`` or the CDK major version is v2. In CDK v1 ``LegacyStackSynthesizer`` is the default if no other synthesizer is specified. Default: - The synthesizer specified on ``App``, or ``DefaultStackSynthesizer`` otherwise.
3248
- :param tags: Stack tags that will be applied to all the taggable resources and the stack itself. Default: {}
3293
+ :param tags: Tags that will be applied to the Stack. These tags are applied to the CloudFormation Stack itself. They will not appear in the CloudFormation template. However, at deployment time, CloudFormation will apply these tags to all resources in the stack that support tagging. You will not be able to exempt resources from tagging (using the ``excludeResourceTypes`` property of ``Tags.of(...).add()``) for tags applied in this way. Default: {}
3249
3294
  :param termination_protection: Whether to enable termination protection for this stack. Default: false
3250
3295
 
3251
3296
  :stability: experimental
@@ -3272,6 +3317,7 @@ class DefaultStagingStack(
3272
3317
  env=env,
3273
3318
  notification_arns=notification_arns,
3274
3319
  permissions_boundary=permissions_boundary,
3320
+ property_injectors=property_injectors,
3275
3321
  stack_name=stack_name,
3276
3322
  suppress_template_indentation=suppress_template_indentation,
3277
3323
  synthesizer=synthesizer,
@@ -3331,6 +3377,7 @@ class DefaultStagingStack(
3331
3377
  source_hash: builtins.str,
3332
3378
  asset_name: typing.Optional[builtins.str] = None,
3333
3379
  directory_name: typing.Optional[builtins.str] = None,
3380
+ display_name: typing.Optional[builtins.str] = None,
3334
3381
  docker_build_args: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
3335
3382
  docker_build_secrets: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
3336
3383
  docker_build_ssh: typing.Optional[builtins.str] = None,
@@ -3349,6 +3396,7 @@ class DefaultStagingStack(
3349
3396
  :param source_hash: The hash of the contents of the docker build context. This hash is used throughout the system to identify this image and avoid duplicate work in case the source did not change. NOTE: this means that if you wish to update your docker image, you must make a modification to the source (e.g. add some metadata to your Dockerfile).
3350
3397
  :param asset_name: Unique identifier of the docker image asset and its potential revisions. Required if using AppScopedStagingSynthesizer. Default: - no asset name
3351
3398
  :param directory_name: The directory where the Dockerfile is stored, must be relative to the cloud assembly root. Default: - Exactly one of ``directoryName`` and ``executable`` is required
3399
+ :param display_name: A display name for this asset. If supplied, the display name will be used in locations where the asset identifier is printed, like in the CLI progress information. Default: - The asset hash is used to display the asset
3352
3400
  :param docker_build_args: Build args to pass to the ``docker build`` command. Since Docker build arguments are resolved before deployment, keys and values cannot refer to unresolved tokens (such as ``lambda.functionArn`` or ``queue.queueUrl``). Only allowed when ``directoryName`` is specified. Default: - no build args are passed
3353
3401
  :param docker_build_secrets: Build secrets to pass to the ``docker build`` command. Since Docker build secrets are resolved before deployment, keys and values cannot refer to unresolved tokens (such as ``lambda.functionArn`` or ``queue.queueUrl``). Only allowed when ``directoryName`` is specified. Default: - no build secrets are passed
3354
3402
  :param docker_build_ssh: SSH agent socket or keys to pass to the ``docker buildx`` command. Default: - no ssh arg is passed
@@ -3368,6 +3416,7 @@ class DefaultStagingStack(
3368
3416
  source_hash=source_hash,
3369
3417
  asset_name=asset_name,
3370
3418
  directory_name=directory_name,
3419
+ display_name=display_name,
3371
3420
  docker_build_args=docker_build_args,
3372
3421
  docker_build_secrets=docker_build_secrets,
3373
3422
  docker_build_ssh=docker_build_ssh,
@@ -3390,6 +3439,7 @@ class DefaultStagingStack(
3390
3439
  *,
3391
3440
  source_hash: builtins.str,
3392
3441
  deploy_time: typing.Optional[builtins.bool] = None,
3442
+ display_name: typing.Optional[builtins.str] = None,
3393
3443
  executable: typing.Optional[typing.Sequence[builtins.str]] = None,
3394
3444
  file_name: typing.Optional[builtins.str] = None,
3395
3445
  packaging: typing.Optional[_aws_cdk_ceddda9d.FileAssetPackaging] = None,
@@ -3398,6 +3448,7 @@ class DefaultStagingStack(
3398
3448
 
3399
3449
  :param source_hash: A hash on the content source. This hash is used to uniquely identify this asset throughout the system. If this value doesn't change, the asset will not be rebuilt or republished.
3400
3450
  :param deploy_time: Whether or not the asset needs to exist beyond deployment time; i.e. are copied over to a different location and not needed afterwards. Setting this property to true has an impact on the lifecycle of the asset, because we will assume that it is safe to delete after the CloudFormation deployment succeeds. For example, Lambda Function assets are copied over to Lambda during deployment. Therefore, it is not necessary to store the asset in S3, so we consider those deployTime assets. Default: false
3451
+ :param display_name: A display name for this asset. If supplied, the display name will be used in locations where the asset identifier is printed, like in the CLI progress information. Default: - The asset hash is used to display the asset
3401
3452
  :param executable: An external command that will produce the packaged asset. The command should produce the location of a ZIP file on ``stdout``. Default: - Exactly one of ``fileName`` and ``executable`` is required
3402
3453
  :param file_name: The path, relative to the root of the cloud assembly, in which this asset source resides. This can be a path to a file or a directory, depending on the packaging type. Default: - Exactly one of ``fileName`` and ``executable`` is required
3403
3454
  :param packaging: Which type of packaging to perform. Default: - Required if ``fileName`` is specified.
@@ -3407,6 +3458,7 @@ class DefaultStagingStack(
3407
3458
  asset = _aws_cdk_ceddda9d.FileAssetSource(
3408
3459
  source_hash=source_hash,
3409
3460
  deploy_time=deploy_time,
3461
+ display_name=display_name,
3410
3462
  executable=executable,
3411
3463
  file_name=file_name,
3412
3464
  packaging=packaging,
@@ -3567,6 +3619,7 @@ def _typecheckingstub__ac9f132bcac8375ac08c16bf3c9bb7407b641e71cfd23cea8b50befa3
3567
3619
  env: typing.Optional[typing.Union[_aws_cdk_ceddda9d.Environment, typing.Dict[builtins.str, typing.Any]]] = None,
3568
3620
  notification_arns: typing.Optional[typing.Sequence[builtins.str]] = None,
3569
3621
  permissions_boundary: typing.Optional[_aws_cdk_ceddda9d.PermissionsBoundary] = None,
3622
+ property_injectors: typing.Optional[typing.Sequence[_aws_cdk_ceddda9d.IPropertyInjector]] = None,
3570
3623
  stack_name: typing.Optional[builtins.str] = None,
3571
3624
  suppress_template_indentation: typing.Optional[builtins.bool] = None,
3572
3625
  synthesizer: typing.Optional[_aws_cdk_ceddda9d.IStackSynthesizer] = None,
@@ -3669,6 +3722,7 @@ def _typecheckingstub__ca741a4572a1f95a8d82e9d029388b8a2d72acacb69715277b6a785b4
3669
3722
  env: typing.Optional[typing.Union[_aws_cdk_ceddda9d.Environment, typing.Dict[builtins.str, typing.Any]]] = None,
3670
3723
  notification_arns: typing.Optional[typing.Sequence[builtins.str]] = None,
3671
3724
  permissions_boundary: typing.Optional[_aws_cdk_ceddda9d.PermissionsBoundary] = None,
3725
+ property_injectors: typing.Optional[typing.Sequence[_aws_cdk_ceddda9d.IPropertyInjector]] = None,
3672
3726
  stack_name: typing.Optional[builtins.str] = None,
3673
3727
  suppress_template_indentation: typing.Optional[builtins.bool] = None,
3674
3728
  synthesizer: typing.Optional[_aws_cdk_ceddda9d.IStackSynthesizer] = None,
@@ -3677,3 +3731,6 @@ def _typecheckingstub__ca741a4572a1f95a8d82e9d029388b8a2d72acacb69715277b6a785b4
3677
3731
  ) -> None:
3678
3732
  """Type checking stubs"""
3679
3733
  pass
3734
+
3735
+ for cls in [IStagingResources, IStagingResourcesFactory]:
3736
+ typing.cast(typing.Any, cls).__protocol_attrs__ = typing.cast(typing.Any, cls).__protocol_attrs__ - set(['__jsii_proxy_class__', '__jsii_type__'])
@@ -33,9 +33,9 @@ import constructs._jsii
33
33
 
34
34
  __jsii_assembly__ = jsii.JSIIAssembly.load(
35
35
  "@aws-cdk/app-staging-synthesizer-alpha",
36
- "2.178.0-alpha.0",
36
+ "2.232.1-alpha.0",
37
37
  __name__[0:-6],
38
- "app-staging-synthesizer-alpha@2.178.0-alpha.0.jsii.tgz",
38
+ "app-staging-synthesizer-alpha@2.232.1-alpha.0.jsii.tgz",
39
39
  )
40
40
 
41
41
  __all__ = [
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: aws-cdk.app-staging-synthesizer-alpha
3
- Version: 2.178.0a0
3
+ Version: 2.232.1a0
4
4
  Summary: Cdk synthesizer for with app-scoped staging stack
5
5
  Home-page: https://github.com/aws/aws-cdk
6
6
  Author: Amazon Web Services
@@ -10,7 +10,6 @@ Classifier: Intended Audience :: Developers
10
10
  Classifier: Operating System :: OS Independent
11
11
  Classifier: Programming Language :: JavaScript
12
12
  Classifier: Programming Language :: Python :: 3 :: Only
13
- Classifier: Programming Language :: Python :: 3.8
14
13
  Classifier: Programming Language :: Python :: 3.9
15
14
  Classifier: Programming Language :: Python :: 3.10
16
15
  Classifier: Programming Language :: Python :: 3.11
@@ -19,15 +18,15 @@ Classifier: Development Status :: 4 - Beta
19
18
  Classifier: License :: OSI Approved
20
19
  Classifier: Framework :: AWS CDK
21
20
  Classifier: Framework :: AWS CDK :: 2
22
- Requires-Python: ~=3.8
21
+ Requires-Python: ~=3.9
23
22
  Description-Content-Type: text/markdown
24
23
  License-File: LICENSE
25
24
  License-File: NOTICE
26
- Requires-Dist: aws-cdk-lib<3.0.0,>=2.178.0
25
+ Requires-Dist: aws-cdk-lib<3.0.0,>=2.232.1
27
26
  Requires-Dist: constructs<11.0.0,>=10.0.0
28
- Requires-Dist: jsii<2.0.0,>=1.106.0
27
+ Requires-Dist: jsii<2.0.0,>=1.120.0
29
28
  Requires-Dist: publication>=0.0.3
30
- Requires-Dist: typeguard<4.3.0,>=2.13.3
29
+ Requires-Dist: typeguard==2.13.3
31
30
 
32
31
  # App Staging Synthesizer
33
32
 
@@ -203,7 +202,7 @@ These credentials must have the ability to perform CloudFormation calls,
203
202
  lookup resources in your account, and perform CloudFormation deployment.
204
203
  For a full list of what is necessary, see `LookupRole`, `DeploymentActionRole`,
205
204
  and `CloudFormationExecutionRole` in the
206
- [bootstrap template](https://github.com/aws/aws-cdk/blob/main/packages/aws-cdk/lib/api/bootstrap/bootstrap-template.yaml).
205
+ [bootstrap template](https://github.com/aws/aws-cdk-cli/blob/main/packages/aws-cdk/lib/api/bootstrap/bootstrap-template.yaml).
207
206
 
208
207
  ```python
209
208
  from aws_cdk.aws_s3 import BucketEncryption
@@ -368,17 +367,17 @@ Or you can roll your own staging resources from scratch, as long as it implement
368
367
  ```python
369
368
  @jsii.implements(IStagingResources)
370
369
  class CustomStagingStack(Stack):
371
- def __init__(self, scope, id, *, description=None, env=None, stackName=None, tags=None, notificationArns=None, synthesizer=None, terminationProtection=None, analyticsReporting=None, crossRegionReferences=None, permissionsBoundary=None, suppressTemplateIndentation=None):
372
- super().__init__(scope, id, description=description, env=env, stackName=stackName, tags=tags, notificationArns=notificationArns, synthesizer=synthesizer, terminationProtection=terminationProtection, analyticsReporting=analyticsReporting, crossRegionReferences=crossRegionReferences, permissionsBoundary=permissionsBoundary, suppressTemplateIndentation=suppressTemplateIndentation)
370
+ def __init__(self, scope, id, *, description=None, env=None, stackName=None, tags=None, notificationArns=None, synthesizer=None, terminationProtection=None, analyticsReporting=None, crossRegionReferences=None, permissionsBoundary=None, suppressTemplateIndentation=None, propertyInjectors=None):
371
+ super().__init__(scope, id, description=description, env=env, stackName=stackName, tags=tags, notificationArns=notificationArns, synthesizer=synthesizer, terminationProtection=terminationProtection, analyticsReporting=analyticsReporting, crossRegionReferences=crossRegionReferences, permissionsBoundary=permissionsBoundary, suppressTemplateIndentation=suppressTemplateIndentation, propertyInjectors=propertyInjectors)
373
372
 
374
- def add_file(self, *, sourceHash, executable=None, fileName=None, packaging=None, deployTime=None):
373
+ def add_file(self, *, sourceHash, executable=None, fileName=None, packaging=None, deployTime=None, displayName=None):
375
374
  return FileStagingLocation(
376
375
  bucket_name="amzn-s3-demo-bucket",
377
376
  assume_role_arn="myArn",
378
377
  dependency_stack=self
379
378
  )
380
379
 
381
- def add_docker_image(self, *, sourceHash, executable=None, directoryName=None, dockerBuildArgs=None, dockerBuildSecrets=None, dockerBuildSsh=None, dockerBuildTarget=None, dockerFile=None, repositoryName=None, networkMode=None, platform=None, dockerOutputs=None, assetName=None, dockerCacheFrom=None, dockerCacheTo=None, dockerCacheDisabled=None):
380
+ def add_docker_image(self, *, sourceHash, executable=None, directoryName=None, dockerBuildArgs=None, dockerBuildSecrets=None, dockerBuildSsh=None, dockerBuildTarget=None, dockerFile=None, repositoryName=None, networkMode=None, platform=None, dockerOutputs=None, assetName=None, dockerCacheFrom=None, dockerCacheTo=None, dockerCacheDisabled=None, displayName=None):
382
381
  return ImageStagingLocation(
383
382
  repo_name="myRepo",
384
383
  assume_role_arn="myArn",
@@ -12,4 +12,4 @@ src/aws_cdk.app_staging_synthesizer_alpha.egg-info/top_level.txt
12
12
  src/aws_cdk/app_staging_synthesizer_alpha/__init__.py
13
13
  src/aws_cdk/app_staging_synthesizer_alpha/py.typed
14
14
  src/aws_cdk/app_staging_synthesizer_alpha/_jsii/__init__.py
15
- src/aws_cdk/app_staging_synthesizer_alpha/_jsii/app-staging-synthesizer-alpha@2.178.0-alpha.0.jsii.tgz
15
+ src/aws_cdk/app_staging_synthesizer_alpha/_jsii/app-staging-synthesizer-alpha@2.232.1-alpha.0.jsii.tgz
@@ -0,0 +1,5 @@
1
+ aws-cdk-lib<3.0.0,>=2.232.1
2
+ constructs<11.0.0,>=10.0.0
3
+ jsii<2.0.0,>=1.120.0
4
+ publication>=0.0.3
5
+ typeguard==2.13.3
@@ -1,5 +0,0 @@
1
- aws-cdk-lib<3.0.0,>=2.178.0
2
- constructs<11.0.0,>=10.0.0
3
- jsii<2.0.0,>=1.106.0
4
- publication>=0.0.3
5
- typeguard<4.3.0,>=2.13.3