aws-cdk.app-staging-synthesizer-alpha 2.207.0a0__py3-none-any.whl → 2.223.0a0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk.app-staging-synthesizer-alpha might be problematic. Click here for more details.

@@ -1611,7 +1611,7 @@ class DefaultStagingStackProps(
1611
1611
  :param cross_region_references: Enable this flag to allow native cross region stack references. Enabling this will create a CloudFormation custom resource in both the producing stack and consuming stack in order to perform the export/import This feature is currently experimental Default: false
1612
1612
  :param description: A description of the stack. Default: - No description.
1613
1613
  :param env: The AWS environment (account/region) where this stack will be deployed. Set the ``region``/``account`` fields of ``env`` to either a concrete value to select the indicated environment (recommended for production stacks), or to the values of environment variables ``CDK_DEFAULT_REGION``/``CDK_DEFAULT_ACCOUNT`` to let the target environment depend on the AWS credentials/configuration that the CDK CLI is executed under (recommended for development stacks). If the ``Stack`` is instantiated inside a ``Stage``, any undefined ``region``/``account`` fields from ``env`` will default to the same field on the encompassing ``Stage``, if configured there. If either ``region`` or ``account`` are not set nor inherited from ``Stage``, the Stack will be considered "*environment-agnostic*"". Environment-agnostic stacks can be deployed to any environment but may not be able to take advantage of all features of the CDK. For example, they will not be able to use environmental context lookups such as ``ec2.Vpc.fromLookup`` and will not automatically translate Service Principals to the right format based on the environment's AWS partition, and other such enhancements. Default: - The environment of the containing ``Stage`` if available, otherwise create the stack will be environment-agnostic.
1614
- :param notification_arns: SNS Topic ARNs that will receive stack events. Default: - no notfication arns.
1614
+ :param notification_arns: SNS Topic ARNs that will receive stack events. Default: - no notification arns.
1615
1615
  :param permissions_boundary: Options for applying a permissions boundary to all IAM Roles and Users created within this Stage. Default: - no permissions boundary is applied
1616
1616
  :param property_injectors: A list of IPropertyInjector attached to this Stack. Default: - no PropertyInjectors
1617
1617
  :param stack_name: Name to deploy the stack with. Default: - Derived from construct path.
@@ -1619,7 +1619,7 @@ class DefaultStagingStackProps(
1619
1619
  :param synthesizer: Synthesis method to use while deploying this stack. The Stack Synthesizer controls aspects of synthesis and deployment, like how assets are referenced and what IAM roles to use. For more information, see the README of the main CDK package. If not specified, the ``defaultStackSynthesizer`` from ``App`` will be used. If that is not specified, ``DefaultStackSynthesizer`` is used if ``@aws-cdk/core:newStyleStackSynthesis`` is set to ``true`` or the CDK major version is v2. In CDK v1 ``LegacyStackSynthesizer`` is the default if no other synthesizer is specified. Default: - The synthesizer specified on ``App``, or ``DefaultStackSynthesizer`` otherwise.
1620
1620
  :param tags: Tags that will be applied to the Stack. These tags are applied to the CloudFormation Stack itself. They will not appear in the CloudFormation template. However, at deployment time, CloudFormation will apply these tags to all resources in the stack that support tagging. You will not be able to exempt resources from tagging (using the ``excludeResourceTypes`` property of ``Tags.of(...).add()``) for tags applied in this way. Default: {}
1621
1621
  :param termination_protection: Whether to enable termination protection for this stack. Default: false
1622
- :param qualifier: (experimental) The qualifier used to specialize strings. Shouldn't be necessary but who knows what people might do.
1622
+ :param qualifier: (experimental) The qualifier used to specialize strings. Can be used to specify custom bootstrapped role names
1623
1623
  :param deploy_role_arn: (experimental) The ARN of the deploy action role, if given. This role will need permissions to read from to the staging resources. Default: - The CLI credentials are assumed, no additional permissions are granted.
1624
1624
 
1625
1625
  :stability: experimental
@@ -1988,7 +1988,7 @@ class DefaultStagingStackProps(
1988
1988
  def notification_arns(self) -> typing.Optional[typing.List[builtins.str]]:
1989
1989
  '''SNS Topic ARNs that will receive stack events.
1990
1990
 
1991
- :default: - no notfication arns.
1991
+ :default: - no notification arns.
1992
1992
  '''
1993
1993
  result = self._values.get("notification_arns")
1994
1994
  return typing.cast(typing.Optional[typing.List[builtins.str]], result)
@@ -2086,7 +2086,7 @@ class DefaultStagingStackProps(
2086
2086
  def qualifier(self) -> builtins.str:
2087
2087
  '''(experimental) The qualifier used to specialize strings.
2088
2088
 
2089
- Shouldn't be necessary but who knows what people might do.
2089
+ Can be used to specify custom bootstrapped role names
2090
2090
 
2091
2091
  :stability: experimental
2092
2092
  '''
@@ -3269,7 +3269,7 @@ class DefaultStagingStack(
3269
3269
  '''
3270
3270
  :param scope: -
3271
3271
  :param id: -
3272
- :param qualifier: (experimental) The qualifier used to specialize strings. Shouldn't be necessary but who knows what people might do.
3272
+ :param qualifier: (experimental) The qualifier used to specialize strings. Can be used to specify custom bootstrapped role names
3273
3273
  :param deploy_role_arn: (experimental) The ARN of the deploy action role, if given. This role will need permissions to read from to the staging resources. Default: - The CLI credentials are assumed, no additional permissions are granted.
3274
3274
  :param app_id: (experimental) A unique identifier for the application that the staging stack belongs to. This identifier will be used in the name of staging resources created for this application, and should be unique across CDK apps. The identifier should include lowercase characters and dashes ('-') only and have a maximum of 20 characters.
3275
3275
  :param staging_bucket_encryption: (experimental) Encryption type for staging bucket. In future versions of this package, the default will be BucketEncryption.S3_MANAGED. In previous versions of this package, the default was to use KMS encryption for the staging bucket. KMS keys cost $1/month, which could result in unexpected costs for users who are not aware of this. As we stabilize this module we intend to make the default S3-managed encryption, which is free. However, the migration path from KMS to S3 managed encryption for existing buckets is not straightforward. Therefore, for now, this property is required. If you have an existing staging bucket encrypted with a KMS key, you will likely want to set this property to BucketEncryption.KMS. If you are creating a new staging bucket, you can set this property to BucketEncryption.S3_MANAGED to avoid the cost of a KMS key.
@@ -3284,7 +3284,7 @@ class DefaultStagingStack(
3284
3284
  :param cross_region_references: Enable this flag to allow native cross region stack references. Enabling this will create a CloudFormation custom resource in both the producing stack and consuming stack in order to perform the export/import This feature is currently experimental Default: false
3285
3285
  :param description: A description of the stack. Default: - No description.
3286
3286
  :param env: The AWS environment (account/region) where this stack will be deployed. Set the ``region``/``account`` fields of ``env`` to either a concrete value to select the indicated environment (recommended for production stacks), or to the values of environment variables ``CDK_DEFAULT_REGION``/``CDK_DEFAULT_ACCOUNT`` to let the target environment depend on the AWS credentials/configuration that the CDK CLI is executed under (recommended for development stacks). If the ``Stack`` is instantiated inside a ``Stage``, any undefined ``region``/``account`` fields from ``env`` will default to the same field on the encompassing ``Stage``, if configured there. If either ``region`` or ``account`` are not set nor inherited from ``Stage``, the Stack will be considered "*environment-agnostic*"". Environment-agnostic stacks can be deployed to any environment but may not be able to take advantage of all features of the CDK. For example, they will not be able to use environmental context lookups such as ``ec2.Vpc.fromLookup`` and will not automatically translate Service Principals to the right format based on the environment's AWS partition, and other such enhancements. Default: - The environment of the containing ``Stage`` if available, otherwise create the stack will be environment-agnostic.
3287
- :param notification_arns: SNS Topic ARNs that will receive stack events. Default: - no notfication arns.
3287
+ :param notification_arns: SNS Topic ARNs that will receive stack events. Default: - no notification arns.
3288
3288
  :param permissions_boundary: Options for applying a permissions boundary to all IAM Roles and Users created within this Stage. Default: - no permissions boundary is applied
3289
3289
  :param property_injectors: A list of IPropertyInjector attached to this Stack. Default: - no PropertyInjectors
3290
3290
  :param stack_name: Name to deploy the stack with. Default: - Derived from construct path.
@@ -3731,3 +3731,6 @@ def _typecheckingstub__ca741a4572a1f95a8d82e9d029388b8a2d72acacb69715277b6a785b4
3731
3731
  ) -> None:
3732
3732
  """Type checking stubs"""
3733
3733
  pass
3734
+
3735
+ for cls in [IStagingResources, IStagingResourcesFactory]:
3736
+ typing.cast(typing.Any, cls).__protocol_attrs__ = typing.cast(typing.Any, cls).__protocol_attrs__ - set(['__jsii_proxy_class__', '__jsii_type__'])
@@ -33,9 +33,9 @@ import constructs._jsii
33
33
 
34
34
  __jsii_assembly__ = jsii.JSIIAssembly.load(
35
35
  "@aws-cdk/app-staging-synthesizer-alpha",
36
- "2.207.0-alpha.0",
36
+ "2.223.0-alpha.0",
37
37
  __name__[0:-6],
38
- "app-staging-synthesizer-alpha@2.207.0-alpha.0.jsii.tgz",
38
+ "app-staging-synthesizer-alpha@2.223.0-alpha.0.jsii.tgz",
39
39
  )
40
40
 
41
41
  __all__ = [
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: aws-cdk.app-staging-synthesizer-alpha
3
- Version: 2.207.0a0
3
+ Version: 2.223.0a0
4
4
  Summary: Cdk synthesizer for with app-scoped staging stack
5
5
  Home-page: https://github.com/aws/aws-cdk
6
6
  Author: Amazon Web Services
@@ -22,11 +22,11 @@ Requires-Python: ~=3.9
22
22
  Description-Content-Type: text/markdown
23
23
  License-File: LICENSE
24
24
  License-File: NOTICE
25
- Requires-Dist: aws-cdk-lib<3.0.0,>=2.207.0
26
- Requires-Dist: constructs<11.0.0,>=10.0.0
27
- Requires-Dist: jsii<2.0.0,>=1.112.0
28
- Requires-Dist: publication>=0.0.3
29
- Requires-Dist: typeguard<4.3.0,>=2.13.3
25
+ Requires-Dist: aws-cdk-lib <3.0.0,>=2.223.0
26
+ Requires-Dist: constructs <11.0.0,>=10.0.0
27
+ Requires-Dist: jsii <2.0.0,>=1.118.0
28
+ Requires-Dist: publication >=0.0.3
29
+ Requires-Dist: typeguard <4.3.0,>=2.13.3
30
30
 
31
31
  # App Staging Synthesizer
32
32
 
@@ -0,0 +1,10 @@
1
+ aws_cdk/app_staging_synthesizer_alpha/__init__.py,sha256=6Sw_J0oW8k4oyptGkNHHbZpeze7L95XJkcUsS0jAqCI,210857
2
+ aws_cdk/app_staging_synthesizer_alpha/py.typed,sha256=AbpHGcgLb-kRsJGnwFEktk7uzpZOCcBY74-YBdrKVGs,1
3
+ aws_cdk/app_staging_synthesizer_alpha/_jsii/__init__.py,sha256=EWMNeKV8lHEFD5Y6McK3xg7OH3F2Qt1j0jSyRVIlfMo,1511
4
+ aws_cdk/app_staging_synthesizer_alpha/_jsii/app-staging-synthesizer-alpha@2.223.0-alpha.0.jsii.tgz,sha256=KbjjDDg5P-zV9XwAgmc5gaA0TT9nlxx_BLpmNFS-5Oo,87800
5
+ aws_cdk_app_staging_synthesizer_alpha-2.223.0a0.dist-info/LICENSE,sha256=y47tc38H0C4DpGljYUZDl8XxidQjNxxGLq-K4jwv6Xc,11391
6
+ aws_cdk_app_staging_synthesizer_alpha-2.223.0a0.dist-info/METADATA,sha256=htHdZMxvVxReadTyRToaguKExE_UBv7pCwmwaMuVw4s,18392
7
+ aws_cdk_app_staging_synthesizer_alpha-2.223.0a0.dist-info/NOTICE,sha256=ZDV6_xBfMvhFtjjBh_f6lJjhZ2AEWWAGGkx2kLKHiuc,113
8
+ aws_cdk_app_staging_synthesizer_alpha-2.223.0a0.dist-info/WHEEL,sha256=iAkIy5fosb7FzIOwONchHf19Qu7_1wCWyFNR5gu9nU0,91
9
+ aws_cdk_app_staging_synthesizer_alpha-2.223.0a0.dist-info/top_level.txt,sha256=1TALAKbuUGsMSrfKWEf268lySCmcqSEO6cDYe_XlLHM,8
10
+ aws_cdk_app_staging_synthesizer_alpha-2.223.0a0.dist-info/RECORD,,
@@ -1,10 +0,0 @@
1
- aws_cdk/app_staging_synthesizer_alpha/__init__.py,sha256=SqCRhAuBK2BMXr2OcDpfHAOPD-P5rbAdCbvarP9WjjQ,210659
2
- aws_cdk/app_staging_synthesizer_alpha/py.typed,sha256=AbpHGcgLb-kRsJGnwFEktk7uzpZOCcBY74-YBdrKVGs,1
3
- aws_cdk/app_staging_synthesizer_alpha/_jsii/__init__.py,sha256=2TCw5L0nR9aPumRK88qFY0FGYmweLXmQAtrWSDM6_VM,1511
4
- aws_cdk/app_staging_synthesizer_alpha/_jsii/app-staging-synthesizer-alpha@2.207.0-alpha.0.jsii.tgz,sha256=mYkTijEzk3JE2tM0ku7ioITGl_wjeAH5d5D3ez7dF-k,87137
5
- aws_cdk_app_staging_synthesizer_alpha-2.207.0a0.dist-info/LICENSE,sha256=y47tc38H0C4DpGljYUZDl8XxidQjNxxGLq-K4jwv6Xc,11391
6
- aws_cdk_app_staging_synthesizer_alpha-2.207.0a0.dist-info/METADATA,sha256=Hch2icaHSNvfNsZR3c58C6ciXl9_Pu_nQQyfbRHAjh8,18387
7
- aws_cdk_app_staging_synthesizer_alpha-2.207.0a0.dist-info/NOTICE,sha256=ZDV6_xBfMvhFtjjBh_f6lJjhZ2AEWWAGGkx2kLKHiuc,113
8
- aws_cdk_app_staging_synthesizer_alpha-2.207.0a0.dist-info/WHEEL,sha256=iAkIy5fosb7FzIOwONchHf19Qu7_1wCWyFNR5gu9nU0,91
9
- aws_cdk_app_staging_synthesizer_alpha-2.207.0a0.dist-info/top_level.txt,sha256=1TALAKbuUGsMSrfKWEf268lySCmcqSEO6cDYe_XlLHM,8
10
- aws_cdk_app_staging_synthesizer_alpha-2.207.0a0.dist-info/RECORD,,