aws-cdk.aws-ec2-alpha 2.175.1a0__tar.gz → 2.176.0a0__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk.aws-ec2-alpha might be problematic. Click here for more details.
- {aws_cdk_aws_ec2_alpha-2.175.1a0/src/aws_cdk.aws_ec2_alpha.egg-info → aws_cdk_aws_ec2_alpha-2.176.0a0}/PKG-INFO +8 -8
- {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0}/README.md +6 -6
- {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0}/setup.py +3 -3
- {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0}/src/aws_cdk/aws_ec2_alpha/__init__.py +7 -7
- {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0}/src/aws_cdk/aws_ec2_alpha/_jsii/__init__.py +2 -2
- aws_cdk_aws_ec2_alpha-2.176.0a0/src/aws_cdk/aws_ec2_alpha/_jsii/aws-ec2-alpha@2.176.0-alpha.0.jsii.tgz +0 -0
- {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0/src/aws_cdk.aws_ec2_alpha.egg-info}/PKG-INFO +8 -8
- {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0}/src/aws_cdk.aws_ec2_alpha.egg-info/SOURCES.txt +1 -1
- {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0}/src/aws_cdk.aws_ec2_alpha.egg-info/requires.txt +1 -1
- aws_cdk_aws_ec2_alpha-2.175.1a0/src/aws_cdk/aws_ec2_alpha/_jsii/aws-ec2-alpha@2.175.1-alpha.0.jsii.tgz +0 -0
- {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0}/LICENSE +0 -0
- {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0}/MANIFEST.in +0 -0
- {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0}/NOTICE +0 -0
- {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0}/pyproject.toml +0 -0
- {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0}/setup.cfg +0 -0
- {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0}/src/aws_cdk/aws_ec2_alpha/py.typed +0 -0
- {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0}/src/aws_cdk.aws_ec2_alpha.egg-info/dependency_links.txt +0 -0
- {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0}/src/aws_cdk.aws_ec2_alpha.egg-info/top_level.txt +0 -0
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.1
|
|
2
2
|
Name: aws-cdk.aws-ec2-alpha
|
|
3
|
-
Version: 2.
|
|
3
|
+
Version: 2.176.0a0
|
|
4
4
|
Summary: The CDK construct library for VPC V2
|
|
5
5
|
Home-page: https://github.com/aws/aws-cdk
|
|
6
6
|
Author: Amazon Web Services
|
|
@@ -23,7 +23,7 @@ Requires-Python: ~=3.8
|
|
|
23
23
|
Description-Content-Type: text/markdown
|
|
24
24
|
License-File: LICENSE
|
|
25
25
|
License-File: NOTICE
|
|
26
|
-
Requires-Dist: aws-cdk-lib<3.0.0,>=2.
|
|
26
|
+
Requires-Dist: aws-cdk-lib<3.0.0,>=2.176.0
|
|
27
27
|
Requires-Dist: constructs<11.0.0,>=10.0.0
|
|
28
28
|
Requires-Dist: jsii<2.0.0,>=1.104.0
|
|
29
29
|
Requires-Dist: publication>=0.0.3
|
|
@@ -327,7 +327,7 @@ acceptor_vpc = VpcV2(self, "VpcA",
|
|
|
327
327
|
acceptor_role_arn = acceptor_vpc.create_acceptor_vpc_role("000000000000")
|
|
328
328
|
```
|
|
329
329
|
|
|
330
|
-
After creating an IAM role in the acceptor account, we can initiate the peering connection request from the requestor VPC. Import
|
|
330
|
+
After creating an IAM role in the acceptor account, we can initiate the peering connection request from the requestor VPC. Import acceptorVpc to the stack using `fromVpcV2Attributes` method, it is recommended to specify owner account id of the acceptor VPC in case of cross account peering connection, if acceptor VPC is hosted in different region provide region value for import as well.
|
|
331
331
|
The following code snippet demonstrates how to set up VPC peering between two VPCs in different AWS accounts using CDK:
|
|
332
332
|
|
|
333
333
|
```python
|
|
@@ -483,11 +483,11 @@ For more information, see [What is AWS Site-to-Site VPN?](https://docs.aws.amazo
|
|
|
483
483
|
|
|
484
484
|
VPN route propagation is a feature in Amazon Web Services (AWS) that automatically updates route tables in your Virtual Private Cloud (VPC) with routes learned from a VPN connection.
|
|
485
485
|
|
|
486
|
-
To enable VPN route
|
|
486
|
+
To enable VPN route propagation, use the `vpnRoutePropagation` property to specify the subnets as an input to the function. VPN route propagation will then be enabled for each subnet with the corresponding route table IDs.
|
|
487
487
|
|
|
488
488
|
Additionally, you can set up a route in any route table with the target set to the VPN Gateway. The function `enableVpnGatewayV2` returns a `VPNGatewayV2` object that you can reference later.
|
|
489
489
|
|
|
490
|
-
The code example below provides the definition for setting up a VPN gateway with `
|
|
490
|
+
The code example below provides the definition for setting up a VPN gateway with `vpnRoutePropagation` enabled:
|
|
491
491
|
|
|
492
492
|
```python
|
|
493
493
|
stack = Stack()
|
|
@@ -515,7 +515,7 @@ An internet gateway is a horizontally scaled, redundant, and highly available VP
|
|
|
515
515
|
For more information, see [Enable VPC internet access using internet gateways](https://docs.aws.amazon.com/vpc/latest/userguide/vpc-igw-internet-access.html).
|
|
516
516
|
|
|
517
517
|
You can add an internet gateway to a VPC using `addInternetGateway` method. By default, this method creates a route in all Public Subnets with outbound destination set to `0.0.0.0` for IPv4 and `::0` for IPv6 enabled VPC.
|
|
518
|
-
Instead of using the default settings, you can configure a custom
|
|
518
|
+
Instead of using the default settings, you can configure a custom destination range by providing an optional input `destination` to the method.
|
|
519
519
|
|
|
520
520
|
The code example below shows how to add an internet gateway with a custom outbound destination IP range:
|
|
521
521
|
|
|
@@ -558,12 +558,12 @@ imported_vpc = VpcV2.from_vpc_v2_attributes(stack, "ImportedVpc",
|
|
|
558
558
|
|
|
559
559
|
In case of cross account or cross region VPC, its recommended to provide region and ownerAccountId so that these values for the VPC can be used to populate correct arn value for the VPC. If a VPC region and account ID is not provided, then region and account configured in the stack will be used. Furthermore, these fields will be referenced later while setting up VPC peering connection, so its necessary to set these fields to a correct value.
|
|
560
560
|
|
|
561
|
-
Below is an example of importing a cross region and cross
|
|
561
|
+
Below is an example of importing a cross region and cross account VPC, VPC arn for this case would be 'arn:aws:ec2:us-west-2:123456789012:vpc/mockVpcID'
|
|
562
562
|
|
|
563
563
|
```python
|
|
564
564
|
stack = Stack()
|
|
565
565
|
|
|
566
|
-
# Importing a cross
|
|
566
|
+
# Importing a cross account or cross region VPC
|
|
567
567
|
imported_vpc = VpcV2.from_vpc_v2_attributes(stack, "ImportedVpc",
|
|
568
568
|
vpc_id="mockVpcID",
|
|
569
569
|
vpc_cidr_block="10.0.0.0/16",
|
|
@@ -296,7 +296,7 @@ acceptor_vpc = VpcV2(self, "VpcA",
|
|
|
296
296
|
acceptor_role_arn = acceptor_vpc.create_acceptor_vpc_role("000000000000")
|
|
297
297
|
```
|
|
298
298
|
|
|
299
|
-
After creating an IAM role in the acceptor account, we can initiate the peering connection request from the requestor VPC. Import
|
|
299
|
+
After creating an IAM role in the acceptor account, we can initiate the peering connection request from the requestor VPC. Import acceptorVpc to the stack using `fromVpcV2Attributes` method, it is recommended to specify owner account id of the acceptor VPC in case of cross account peering connection, if acceptor VPC is hosted in different region provide region value for import as well.
|
|
300
300
|
The following code snippet demonstrates how to set up VPC peering between two VPCs in different AWS accounts using CDK:
|
|
301
301
|
|
|
302
302
|
```python
|
|
@@ -452,11 +452,11 @@ For more information, see [What is AWS Site-to-Site VPN?](https://docs.aws.amazo
|
|
|
452
452
|
|
|
453
453
|
VPN route propagation is a feature in Amazon Web Services (AWS) that automatically updates route tables in your Virtual Private Cloud (VPC) with routes learned from a VPN connection.
|
|
454
454
|
|
|
455
|
-
To enable VPN route
|
|
455
|
+
To enable VPN route propagation, use the `vpnRoutePropagation` property to specify the subnets as an input to the function. VPN route propagation will then be enabled for each subnet with the corresponding route table IDs.
|
|
456
456
|
|
|
457
457
|
Additionally, you can set up a route in any route table with the target set to the VPN Gateway. The function `enableVpnGatewayV2` returns a `VPNGatewayV2` object that you can reference later.
|
|
458
458
|
|
|
459
|
-
The code example below provides the definition for setting up a VPN gateway with `
|
|
459
|
+
The code example below provides the definition for setting up a VPN gateway with `vpnRoutePropagation` enabled:
|
|
460
460
|
|
|
461
461
|
```python
|
|
462
462
|
stack = Stack()
|
|
@@ -484,7 +484,7 @@ An internet gateway is a horizontally scaled, redundant, and highly available VP
|
|
|
484
484
|
For more information, see [Enable VPC internet access using internet gateways](https://docs.aws.amazon.com/vpc/latest/userguide/vpc-igw-internet-access.html).
|
|
485
485
|
|
|
486
486
|
You can add an internet gateway to a VPC using `addInternetGateway` method. By default, this method creates a route in all Public Subnets with outbound destination set to `0.0.0.0` for IPv4 and `::0` for IPv6 enabled VPC.
|
|
487
|
-
Instead of using the default settings, you can configure a custom
|
|
487
|
+
Instead of using the default settings, you can configure a custom destination range by providing an optional input `destination` to the method.
|
|
488
488
|
|
|
489
489
|
The code example below shows how to add an internet gateway with a custom outbound destination IP range:
|
|
490
490
|
|
|
@@ -527,12 +527,12 @@ imported_vpc = VpcV2.from_vpc_v2_attributes(stack, "ImportedVpc",
|
|
|
527
527
|
|
|
528
528
|
In case of cross account or cross region VPC, its recommended to provide region and ownerAccountId so that these values for the VPC can be used to populate correct arn value for the VPC. If a VPC region and account ID is not provided, then region and account configured in the stack will be used. Furthermore, these fields will be referenced later while setting up VPC peering connection, so its necessary to set these fields to a correct value.
|
|
529
529
|
|
|
530
|
-
Below is an example of importing a cross region and cross
|
|
530
|
+
Below is an example of importing a cross region and cross account VPC, VPC arn for this case would be 'arn:aws:ec2:us-west-2:123456789012:vpc/mockVpcID'
|
|
531
531
|
|
|
532
532
|
```python
|
|
533
533
|
stack = Stack()
|
|
534
534
|
|
|
535
|
-
# Importing a cross
|
|
535
|
+
# Importing a cross account or cross region VPC
|
|
536
536
|
imported_vpc = VpcV2.from_vpc_v2_attributes(stack, "ImportedVpc",
|
|
537
537
|
vpc_id="mockVpcID",
|
|
538
538
|
vpc_cidr_block="10.0.0.0/16",
|
|
@@ -5,7 +5,7 @@ kwargs = json.loads(
|
|
|
5
5
|
"""
|
|
6
6
|
{
|
|
7
7
|
"name": "aws-cdk.aws-ec2-alpha",
|
|
8
|
-
"version": "2.
|
|
8
|
+
"version": "2.176.0.a0",
|
|
9
9
|
"description": "The CDK construct library for VPC V2",
|
|
10
10
|
"license": "Apache-2.0",
|
|
11
11
|
"url": "https://github.com/aws/aws-cdk",
|
|
@@ -26,7 +26,7 @@ kwargs = json.loads(
|
|
|
26
26
|
],
|
|
27
27
|
"package_data": {
|
|
28
28
|
"aws_cdk.aws_ec2_alpha._jsii": [
|
|
29
|
-
"aws-ec2-alpha@2.
|
|
29
|
+
"aws-ec2-alpha@2.176.0-alpha.0.jsii.tgz"
|
|
30
30
|
],
|
|
31
31
|
"aws_cdk.aws_ec2_alpha": [
|
|
32
32
|
"py.typed"
|
|
@@ -34,7 +34,7 @@ kwargs = json.loads(
|
|
|
34
34
|
},
|
|
35
35
|
"python_requires": "~=3.8",
|
|
36
36
|
"install_requires": [
|
|
37
|
-
"aws-cdk-lib>=2.
|
|
37
|
+
"aws-cdk-lib>=2.176.0, <3.0.0",
|
|
38
38
|
"constructs>=10.0.0, <11.0.0",
|
|
39
39
|
"jsii>=1.104.0, <2.0.0",
|
|
40
40
|
"publication>=0.0.3",
|
|
@@ -297,7 +297,7 @@ acceptor_vpc = VpcV2(self, "VpcA",
|
|
|
297
297
|
acceptor_role_arn = acceptor_vpc.create_acceptor_vpc_role("000000000000")
|
|
298
298
|
```
|
|
299
299
|
|
|
300
|
-
After creating an IAM role in the acceptor account, we can initiate the peering connection request from the requestor VPC. Import
|
|
300
|
+
After creating an IAM role in the acceptor account, we can initiate the peering connection request from the requestor VPC. Import acceptorVpc to the stack using `fromVpcV2Attributes` method, it is recommended to specify owner account id of the acceptor VPC in case of cross account peering connection, if acceptor VPC is hosted in different region provide region value for import as well.
|
|
301
301
|
The following code snippet demonstrates how to set up VPC peering between two VPCs in different AWS accounts using CDK:
|
|
302
302
|
|
|
303
303
|
```python
|
|
@@ -453,11 +453,11 @@ For more information, see [What is AWS Site-to-Site VPN?](https://docs.aws.amazo
|
|
|
453
453
|
|
|
454
454
|
VPN route propagation is a feature in Amazon Web Services (AWS) that automatically updates route tables in your Virtual Private Cloud (VPC) with routes learned from a VPN connection.
|
|
455
455
|
|
|
456
|
-
To enable VPN route
|
|
456
|
+
To enable VPN route propagation, use the `vpnRoutePropagation` property to specify the subnets as an input to the function. VPN route propagation will then be enabled for each subnet with the corresponding route table IDs.
|
|
457
457
|
|
|
458
458
|
Additionally, you can set up a route in any route table with the target set to the VPN Gateway. The function `enableVpnGatewayV2` returns a `VPNGatewayV2` object that you can reference later.
|
|
459
459
|
|
|
460
|
-
The code example below provides the definition for setting up a VPN gateway with `
|
|
460
|
+
The code example below provides the definition for setting up a VPN gateway with `vpnRoutePropagation` enabled:
|
|
461
461
|
|
|
462
462
|
```python
|
|
463
463
|
stack = Stack()
|
|
@@ -485,7 +485,7 @@ An internet gateway is a horizontally scaled, redundant, and highly available VP
|
|
|
485
485
|
For more information, see [Enable VPC internet access using internet gateways](https://docs.aws.amazon.com/vpc/latest/userguide/vpc-igw-internet-access.html).
|
|
486
486
|
|
|
487
487
|
You can add an internet gateway to a VPC using `addInternetGateway` method. By default, this method creates a route in all Public Subnets with outbound destination set to `0.0.0.0` for IPv4 and `::0` for IPv6 enabled VPC.
|
|
488
|
-
Instead of using the default settings, you can configure a custom
|
|
488
|
+
Instead of using the default settings, you can configure a custom destination range by providing an optional input `destination` to the method.
|
|
489
489
|
|
|
490
490
|
The code example below shows how to add an internet gateway with a custom outbound destination IP range:
|
|
491
491
|
|
|
@@ -528,12 +528,12 @@ imported_vpc = VpcV2.from_vpc_v2_attributes(stack, "ImportedVpc",
|
|
|
528
528
|
|
|
529
529
|
In case of cross account or cross region VPC, its recommended to provide region and ownerAccountId so that these values for the VPC can be used to populate correct arn value for the VPC. If a VPC region and account ID is not provided, then region and account configured in the stack will be used. Furthermore, these fields will be referenced later while setting up VPC peering connection, so its necessary to set these fields to a correct value.
|
|
530
530
|
|
|
531
|
-
Below is an example of importing a cross region and cross
|
|
531
|
+
Below is an example of importing a cross region and cross account VPC, VPC arn for this case would be 'arn:aws:ec2:us-west-2:123456789012:vpc/mockVpcID'
|
|
532
532
|
|
|
533
533
|
```python
|
|
534
534
|
stack = Stack()
|
|
535
535
|
|
|
536
|
-
# Importing a cross
|
|
536
|
+
# Importing a cross account or cross region VPC
|
|
537
537
|
imported_vpc = VpcV2.from_vpc_v2_attributes(stack, "ImportedVpc",
|
|
538
538
|
vpc_id="mockVpcID",
|
|
539
539
|
vpc_cidr_block="10.0.0.0/16",
|
|
@@ -4050,7 +4050,7 @@ class Route(
|
|
|
4050
4050
|
@builtins.property
|
|
4051
4051
|
@jsii.member(jsii_name="targetRouterType")
|
|
4052
4052
|
def target_router_type(self) -> _aws_cdk_aws_ec2_ceddda9d.RouterType:
|
|
4053
|
-
'''(experimental) The type of router the route is
|
|
4053
|
+
'''(experimental) The type of router the route is targeting.
|
|
4054
4054
|
|
|
4055
4055
|
:stability: experimental
|
|
4056
4056
|
'''
|
|
@@ -33,9 +33,9 @@ import constructs._jsii
|
|
|
33
33
|
|
|
34
34
|
__jsii_assembly__ = jsii.JSIIAssembly.load(
|
|
35
35
|
"@aws-cdk/aws-ec2-alpha",
|
|
36
|
-
"2.
|
|
36
|
+
"2.176.0-alpha.0",
|
|
37
37
|
__name__[0:-6],
|
|
38
|
-
"aws-ec2-alpha@2.
|
|
38
|
+
"aws-ec2-alpha@2.176.0-alpha.0.jsii.tgz",
|
|
39
39
|
)
|
|
40
40
|
|
|
41
41
|
__all__ = [
|
|
Binary file
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.1
|
|
2
2
|
Name: aws-cdk.aws-ec2-alpha
|
|
3
|
-
Version: 2.
|
|
3
|
+
Version: 2.176.0a0
|
|
4
4
|
Summary: The CDK construct library for VPC V2
|
|
5
5
|
Home-page: https://github.com/aws/aws-cdk
|
|
6
6
|
Author: Amazon Web Services
|
|
@@ -23,7 +23,7 @@ Requires-Python: ~=3.8
|
|
|
23
23
|
Description-Content-Type: text/markdown
|
|
24
24
|
License-File: LICENSE
|
|
25
25
|
License-File: NOTICE
|
|
26
|
-
Requires-Dist: aws-cdk-lib<3.0.0,>=2.
|
|
26
|
+
Requires-Dist: aws-cdk-lib<3.0.0,>=2.176.0
|
|
27
27
|
Requires-Dist: constructs<11.0.0,>=10.0.0
|
|
28
28
|
Requires-Dist: jsii<2.0.0,>=1.104.0
|
|
29
29
|
Requires-Dist: publication>=0.0.3
|
|
@@ -327,7 +327,7 @@ acceptor_vpc = VpcV2(self, "VpcA",
|
|
|
327
327
|
acceptor_role_arn = acceptor_vpc.create_acceptor_vpc_role("000000000000")
|
|
328
328
|
```
|
|
329
329
|
|
|
330
|
-
After creating an IAM role in the acceptor account, we can initiate the peering connection request from the requestor VPC. Import
|
|
330
|
+
After creating an IAM role in the acceptor account, we can initiate the peering connection request from the requestor VPC. Import acceptorVpc to the stack using `fromVpcV2Attributes` method, it is recommended to specify owner account id of the acceptor VPC in case of cross account peering connection, if acceptor VPC is hosted in different region provide region value for import as well.
|
|
331
331
|
The following code snippet demonstrates how to set up VPC peering between two VPCs in different AWS accounts using CDK:
|
|
332
332
|
|
|
333
333
|
```python
|
|
@@ -483,11 +483,11 @@ For more information, see [What is AWS Site-to-Site VPN?](https://docs.aws.amazo
|
|
|
483
483
|
|
|
484
484
|
VPN route propagation is a feature in Amazon Web Services (AWS) that automatically updates route tables in your Virtual Private Cloud (VPC) with routes learned from a VPN connection.
|
|
485
485
|
|
|
486
|
-
To enable VPN route
|
|
486
|
+
To enable VPN route propagation, use the `vpnRoutePropagation` property to specify the subnets as an input to the function. VPN route propagation will then be enabled for each subnet with the corresponding route table IDs.
|
|
487
487
|
|
|
488
488
|
Additionally, you can set up a route in any route table with the target set to the VPN Gateway. The function `enableVpnGatewayV2` returns a `VPNGatewayV2` object that you can reference later.
|
|
489
489
|
|
|
490
|
-
The code example below provides the definition for setting up a VPN gateway with `
|
|
490
|
+
The code example below provides the definition for setting up a VPN gateway with `vpnRoutePropagation` enabled:
|
|
491
491
|
|
|
492
492
|
```python
|
|
493
493
|
stack = Stack()
|
|
@@ -515,7 +515,7 @@ An internet gateway is a horizontally scaled, redundant, and highly available VP
|
|
|
515
515
|
For more information, see [Enable VPC internet access using internet gateways](https://docs.aws.amazon.com/vpc/latest/userguide/vpc-igw-internet-access.html).
|
|
516
516
|
|
|
517
517
|
You can add an internet gateway to a VPC using `addInternetGateway` method. By default, this method creates a route in all Public Subnets with outbound destination set to `0.0.0.0` for IPv4 and `::0` for IPv6 enabled VPC.
|
|
518
|
-
Instead of using the default settings, you can configure a custom
|
|
518
|
+
Instead of using the default settings, you can configure a custom destination range by providing an optional input `destination` to the method.
|
|
519
519
|
|
|
520
520
|
The code example below shows how to add an internet gateway with a custom outbound destination IP range:
|
|
521
521
|
|
|
@@ -558,12 +558,12 @@ imported_vpc = VpcV2.from_vpc_v2_attributes(stack, "ImportedVpc",
|
|
|
558
558
|
|
|
559
559
|
In case of cross account or cross region VPC, its recommended to provide region and ownerAccountId so that these values for the VPC can be used to populate correct arn value for the VPC. If a VPC region and account ID is not provided, then region and account configured in the stack will be used. Furthermore, these fields will be referenced later while setting up VPC peering connection, so its necessary to set these fields to a correct value.
|
|
560
560
|
|
|
561
|
-
Below is an example of importing a cross region and cross
|
|
561
|
+
Below is an example of importing a cross region and cross account VPC, VPC arn for this case would be 'arn:aws:ec2:us-west-2:123456789012:vpc/mockVpcID'
|
|
562
562
|
|
|
563
563
|
```python
|
|
564
564
|
stack = Stack()
|
|
565
565
|
|
|
566
|
-
# Importing a cross
|
|
566
|
+
# Importing a cross account or cross region VPC
|
|
567
567
|
imported_vpc = VpcV2.from_vpc_v2_attributes(stack, "ImportedVpc",
|
|
568
568
|
vpc_id="mockVpcID",
|
|
569
569
|
vpc_cidr_block="10.0.0.0/16",
|
|
@@ -12,4 +12,4 @@ src/aws_cdk.aws_ec2_alpha.egg-info/top_level.txt
|
|
|
12
12
|
src/aws_cdk/aws_ec2_alpha/__init__.py
|
|
13
13
|
src/aws_cdk/aws_ec2_alpha/py.typed
|
|
14
14
|
src/aws_cdk/aws_ec2_alpha/_jsii/__init__.py
|
|
15
|
-
src/aws_cdk/aws_ec2_alpha/_jsii/aws-ec2-alpha@2.
|
|
15
|
+
src/aws_cdk/aws_ec2_alpha/_jsii/aws-ec2-alpha@2.176.0-alpha.0.jsii.tgz
|
|
Binary file
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|