aws-cdk.aws-ec2-alpha 2.175.1a0__tar.gz → 2.176.0a0__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk.aws-ec2-alpha might be problematic. Click here for more details.

Files changed (18) hide show
  1. {aws_cdk_aws_ec2_alpha-2.175.1a0/src/aws_cdk.aws_ec2_alpha.egg-info → aws_cdk_aws_ec2_alpha-2.176.0a0}/PKG-INFO +8 -8
  2. {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0}/README.md +6 -6
  3. {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0}/setup.py +3 -3
  4. {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0}/src/aws_cdk/aws_ec2_alpha/__init__.py +7 -7
  5. {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0}/src/aws_cdk/aws_ec2_alpha/_jsii/__init__.py +2 -2
  6. aws_cdk_aws_ec2_alpha-2.176.0a0/src/aws_cdk/aws_ec2_alpha/_jsii/aws-ec2-alpha@2.176.0-alpha.0.jsii.tgz +0 -0
  7. {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0/src/aws_cdk.aws_ec2_alpha.egg-info}/PKG-INFO +8 -8
  8. {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0}/src/aws_cdk.aws_ec2_alpha.egg-info/SOURCES.txt +1 -1
  9. {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0}/src/aws_cdk.aws_ec2_alpha.egg-info/requires.txt +1 -1
  10. aws_cdk_aws_ec2_alpha-2.175.1a0/src/aws_cdk/aws_ec2_alpha/_jsii/aws-ec2-alpha@2.175.1-alpha.0.jsii.tgz +0 -0
  11. {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0}/LICENSE +0 -0
  12. {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0}/MANIFEST.in +0 -0
  13. {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0}/NOTICE +0 -0
  14. {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0}/pyproject.toml +0 -0
  15. {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0}/setup.cfg +0 -0
  16. {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0}/src/aws_cdk/aws_ec2_alpha/py.typed +0 -0
  17. {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0}/src/aws_cdk.aws_ec2_alpha.egg-info/dependency_links.txt +0 -0
  18. {aws_cdk_aws_ec2_alpha-2.175.1a0 → aws_cdk_aws_ec2_alpha-2.176.0a0}/src/aws_cdk.aws_ec2_alpha.egg-info/top_level.txt +0 -0
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: aws-cdk.aws-ec2-alpha
3
- Version: 2.175.1a0
3
+ Version: 2.176.0a0
4
4
  Summary: The CDK construct library for VPC V2
5
5
  Home-page: https://github.com/aws/aws-cdk
6
6
  Author: Amazon Web Services
@@ -23,7 +23,7 @@ Requires-Python: ~=3.8
23
23
  Description-Content-Type: text/markdown
24
24
  License-File: LICENSE
25
25
  License-File: NOTICE
26
- Requires-Dist: aws-cdk-lib<3.0.0,>=2.175.1
26
+ Requires-Dist: aws-cdk-lib<3.0.0,>=2.176.0
27
27
  Requires-Dist: constructs<11.0.0,>=10.0.0
28
28
  Requires-Dist: jsii<2.0.0,>=1.104.0
29
29
  Requires-Dist: publication>=0.0.3
@@ -327,7 +327,7 @@ acceptor_vpc = VpcV2(self, "VpcA",
327
327
  acceptor_role_arn = acceptor_vpc.create_acceptor_vpc_role("000000000000")
328
328
  ```
329
329
 
330
- After creating an IAM role in the acceptor account, we can initiate the peering connection request from the requestor VPC. Import accpeptorVpc to the stack using `fromVpcV2Attributes` method, it is recommended to specify owner account id of the acceptor VPC in case of cross account peering connection, if acceptor VPC is hosted in different region provide region value for import as well.
330
+ After creating an IAM role in the acceptor account, we can initiate the peering connection request from the requestor VPC. Import acceptorVpc to the stack using `fromVpcV2Attributes` method, it is recommended to specify owner account id of the acceptor VPC in case of cross account peering connection, if acceptor VPC is hosted in different region provide region value for import as well.
331
331
  The following code snippet demonstrates how to set up VPC peering between two VPCs in different AWS accounts using CDK:
332
332
 
333
333
  ```python
@@ -483,11 +483,11 @@ For more information, see [What is AWS Site-to-Site VPN?](https://docs.aws.amazo
483
483
 
484
484
  VPN route propagation is a feature in Amazon Web Services (AWS) that automatically updates route tables in your Virtual Private Cloud (VPC) with routes learned from a VPN connection.
485
485
 
486
- To enable VPN route propogation, use the `vpnRoutePropagation` property to specify the subnets as an input to the function. VPN route propagation will then be enabled for each subnet with the corresponding route table IDs.
486
+ To enable VPN route propagation, use the `vpnRoutePropagation` property to specify the subnets as an input to the function. VPN route propagation will then be enabled for each subnet with the corresponding route table IDs.
487
487
 
488
488
  Additionally, you can set up a route in any route table with the target set to the VPN Gateway. The function `enableVpnGatewayV2` returns a `VPNGatewayV2` object that you can reference later.
489
489
 
490
- The code example below provides the definition for setting up a VPN gateway with `vpnRoutePropogation` enabled:
490
+ The code example below provides the definition for setting up a VPN gateway with `vpnRoutePropagation` enabled:
491
491
 
492
492
  ```python
493
493
  stack = Stack()
@@ -515,7 +515,7 @@ An internet gateway is a horizontally scaled, redundant, and highly available VP
515
515
  For more information, see [Enable VPC internet access using internet gateways](https://docs.aws.amazon.com/vpc/latest/userguide/vpc-igw-internet-access.html).
516
516
 
517
517
  You can add an internet gateway to a VPC using `addInternetGateway` method. By default, this method creates a route in all Public Subnets with outbound destination set to `0.0.0.0` for IPv4 and `::0` for IPv6 enabled VPC.
518
- Instead of using the default settings, you can configure a custom destinatation range by providing an optional input `destination` to the method.
518
+ Instead of using the default settings, you can configure a custom destination range by providing an optional input `destination` to the method.
519
519
 
520
520
  The code example below shows how to add an internet gateway with a custom outbound destination IP range:
521
521
 
@@ -558,12 +558,12 @@ imported_vpc = VpcV2.from_vpc_v2_attributes(stack, "ImportedVpc",
558
558
 
559
559
  In case of cross account or cross region VPC, its recommended to provide region and ownerAccountId so that these values for the VPC can be used to populate correct arn value for the VPC. If a VPC region and account ID is not provided, then region and account configured in the stack will be used. Furthermore, these fields will be referenced later while setting up VPC peering connection, so its necessary to set these fields to a correct value.
560
560
 
561
- Below is an example of importing a cross region and cross acount VPC, VPC arn for this case would be 'arn:aws:ec2:us-west-2:123456789012:vpc/mockVpcID'
561
+ Below is an example of importing a cross region and cross account VPC, VPC arn for this case would be 'arn:aws:ec2:us-west-2:123456789012:vpc/mockVpcID'
562
562
 
563
563
  ```python
564
564
  stack = Stack()
565
565
 
566
- # Importing a cross acount or cross region VPC
566
+ # Importing a cross account or cross region VPC
567
567
  imported_vpc = VpcV2.from_vpc_v2_attributes(stack, "ImportedVpc",
568
568
  vpc_id="mockVpcID",
569
569
  vpc_cidr_block="10.0.0.0/16",
@@ -296,7 +296,7 @@ acceptor_vpc = VpcV2(self, "VpcA",
296
296
  acceptor_role_arn = acceptor_vpc.create_acceptor_vpc_role("000000000000")
297
297
  ```
298
298
 
299
- After creating an IAM role in the acceptor account, we can initiate the peering connection request from the requestor VPC. Import accpeptorVpc to the stack using `fromVpcV2Attributes` method, it is recommended to specify owner account id of the acceptor VPC in case of cross account peering connection, if acceptor VPC is hosted in different region provide region value for import as well.
299
+ After creating an IAM role in the acceptor account, we can initiate the peering connection request from the requestor VPC. Import acceptorVpc to the stack using `fromVpcV2Attributes` method, it is recommended to specify owner account id of the acceptor VPC in case of cross account peering connection, if acceptor VPC is hosted in different region provide region value for import as well.
300
300
  The following code snippet demonstrates how to set up VPC peering between two VPCs in different AWS accounts using CDK:
301
301
 
302
302
  ```python
@@ -452,11 +452,11 @@ For more information, see [What is AWS Site-to-Site VPN?](https://docs.aws.amazo
452
452
 
453
453
  VPN route propagation is a feature in Amazon Web Services (AWS) that automatically updates route tables in your Virtual Private Cloud (VPC) with routes learned from a VPN connection.
454
454
 
455
- To enable VPN route propogation, use the `vpnRoutePropagation` property to specify the subnets as an input to the function. VPN route propagation will then be enabled for each subnet with the corresponding route table IDs.
455
+ To enable VPN route propagation, use the `vpnRoutePropagation` property to specify the subnets as an input to the function. VPN route propagation will then be enabled for each subnet with the corresponding route table IDs.
456
456
 
457
457
  Additionally, you can set up a route in any route table with the target set to the VPN Gateway. The function `enableVpnGatewayV2` returns a `VPNGatewayV2` object that you can reference later.
458
458
 
459
- The code example below provides the definition for setting up a VPN gateway with `vpnRoutePropogation` enabled:
459
+ The code example below provides the definition for setting up a VPN gateway with `vpnRoutePropagation` enabled:
460
460
 
461
461
  ```python
462
462
  stack = Stack()
@@ -484,7 +484,7 @@ An internet gateway is a horizontally scaled, redundant, and highly available VP
484
484
  For more information, see [Enable VPC internet access using internet gateways](https://docs.aws.amazon.com/vpc/latest/userguide/vpc-igw-internet-access.html).
485
485
 
486
486
  You can add an internet gateway to a VPC using `addInternetGateway` method. By default, this method creates a route in all Public Subnets with outbound destination set to `0.0.0.0` for IPv4 and `::0` for IPv6 enabled VPC.
487
- Instead of using the default settings, you can configure a custom destinatation range by providing an optional input `destination` to the method.
487
+ Instead of using the default settings, you can configure a custom destination range by providing an optional input `destination` to the method.
488
488
 
489
489
  The code example below shows how to add an internet gateway with a custom outbound destination IP range:
490
490
 
@@ -527,12 +527,12 @@ imported_vpc = VpcV2.from_vpc_v2_attributes(stack, "ImportedVpc",
527
527
 
528
528
  In case of cross account or cross region VPC, its recommended to provide region and ownerAccountId so that these values for the VPC can be used to populate correct arn value for the VPC. If a VPC region and account ID is not provided, then region and account configured in the stack will be used. Furthermore, these fields will be referenced later while setting up VPC peering connection, so its necessary to set these fields to a correct value.
529
529
 
530
- Below is an example of importing a cross region and cross acount VPC, VPC arn for this case would be 'arn:aws:ec2:us-west-2:123456789012:vpc/mockVpcID'
530
+ Below is an example of importing a cross region and cross account VPC, VPC arn for this case would be 'arn:aws:ec2:us-west-2:123456789012:vpc/mockVpcID'
531
531
 
532
532
  ```python
533
533
  stack = Stack()
534
534
 
535
- # Importing a cross acount or cross region VPC
535
+ # Importing a cross account or cross region VPC
536
536
  imported_vpc = VpcV2.from_vpc_v2_attributes(stack, "ImportedVpc",
537
537
  vpc_id="mockVpcID",
538
538
  vpc_cidr_block="10.0.0.0/16",
@@ -5,7 +5,7 @@ kwargs = json.loads(
5
5
  """
6
6
  {
7
7
  "name": "aws-cdk.aws-ec2-alpha",
8
- "version": "2.175.1.a0",
8
+ "version": "2.176.0.a0",
9
9
  "description": "The CDK construct library for VPC V2",
10
10
  "license": "Apache-2.0",
11
11
  "url": "https://github.com/aws/aws-cdk",
@@ -26,7 +26,7 @@ kwargs = json.loads(
26
26
  ],
27
27
  "package_data": {
28
28
  "aws_cdk.aws_ec2_alpha._jsii": [
29
- "aws-ec2-alpha@2.175.1-alpha.0.jsii.tgz"
29
+ "aws-ec2-alpha@2.176.0-alpha.0.jsii.tgz"
30
30
  ],
31
31
  "aws_cdk.aws_ec2_alpha": [
32
32
  "py.typed"
@@ -34,7 +34,7 @@ kwargs = json.loads(
34
34
  },
35
35
  "python_requires": "~=3.8",
36
36
  "install_requires": [
37
- "aws-cdk-lib>=2.175.1, <3.0.0",
37
+ "aws-cdk-lib>=2.176.0, <3.0.0",
38
38
  "constructs>=10.0.0, <11.0.0",
39
39
  "jsii>=1.104.0, <2.0.0",
40
40
  "publication>=0.0.3",
@@ -297,7 +297,7 @@ acceptor_vpc = VpcV2(self, "VpcA",
297
297
  acceptor_role_arn = acceptor_vpc.create_acceptor_vpc_role("000000000000")
298
298
  ```
299
299
 
300
- After creating an IAM role in the acceptor account, we can initiate the peering connection request from the requestor VPC. Import accpeptorVpc to the stack using `fromVpcV2Attributes` method, it is recommended to specify owner account id of the acceptor VPC in case of cross account peering connection, if acceptor VPC is hosted in different region provide region value for import as well.
300
+ After creating an IAM role in the acceptor account, we can initiate the peering connection request from the requestor VPC. Import acceptorVpc to the stack using `fromVpcV2Attributes` method, it is recommended to specify owner account id of the acceptor VPC in case of cross account peering connection, if acceptor VPC is hosted in different region provide region value for import as well.
301
301
  The following code snippet demonstrates how to set up VPC peering between two VPCs in different AWS accounts using CDK:
302
302
 
303
303
  ```python
@@ -453,11 +453,11 @@ For more information, see [What is AWS Site-to-Site VPN?](https://docs.aws.amazo
453
453
 
454
454
  VPN route propagation is a feature in Amazon Web Services (AWS) that automatically updates route tables in your Virtual Private Cloud (VPC) with routes learned from a VPN connection.
455
455
 
456
- To enable VPN route propogation, use the `vpnRoutePropagation` property to specify the subnets as an input to the function. VPN route propagation will then be enabled for each subnet with the corresponding route table IDs.
456
+ To enable VPN route propagation, use the `vpnRoutePropagation` property to specify the subnets as an input to the function. VPN route propagation will then be enabled for each subnet with the corresponding route table IDs.
457
457
 
458
458
  Additionally, you can set up a route in any route table with the target set to the VPN Gateway. The function `enableVpnGatewayV2` returns a `VPNGatewayV2` object that you can reference later.
459
459
 
460
- The code example below provides the definition for setting up a VPN gateway with `vpnRoutePropogation` enabled:
460
+ The code example below provides the definition for setting up a VPN gateway with `vpnRoutePropagation` enabled:
461
461
 
462
462
  ```python
463
463
  stack = Stack()
@@ -485,7 +485,7 @@ An internet gateway is a horizontally scaled, redundant, and highly available VP
485
485
  For more information, see [Enable VPC internet access using internet gateways](https://docs.aws.amazon.com/vpc/latest/userguide/vpc-igw-internet-access.html).
486
486
 
487
487
  You can add an internet gateway to a VPC using `addInternetGateway` method. By default, this method creates a route in all Public Subnets with outbound destination set to `0.0.0.0` for IPv4 and `::0` for IPv6 enabled VPC.
488
- Instead of using the default settings, you can configure a custom destinatation range by providing an optional input `destination` to the method.
488
+ Instead of using the default settings, you can configure a custom destination range by providing an optional input `destination` to the method.
489
489
 
490
490
  The code example below shows how to add an internet gateway with a custom outbound destination IP range:
491
491
 
@@ -528,12 +528,12 @@ imported_vpc = VpcV2.from_vpc_v2_attributes(stack, "ImportedVpc",
528
528
 
529
529
  In case of cross account or cross region VPC, its recommended to provide region and ownerAccountId so that these values for the VPC can be used to populate correct arn value for the VPC. If a VPC region and account ID is not provided, then region and account configured in the stack will be used. Furthermore, these fields will be referenced later while setting up VPC peering connection, so its necessary to set these fields to a correct value.
530
530
 
531
- Below is an example of importing a cross region and cross acount VPC, VPC arn for this case would be 'arn:aws:ec2:us-west-2:123456789012:vpc/mockVpcID'
531
+ Below is an example of importing a cross region and cross account VPC, VPC arn for this case would be 'arn:aws:ec2:us-west-2:123456789012:vpc/mockVpcID'
532
532
 
533
533
  ```python
534
534
  stack = Stack()
535
535
 
536
- # Importing a cross acount or cross region VPC
536
+ # Importing a cross account or cross region VPC
537
537
  imported_vpc = VpcV2.from_vpc_v2_attributes(stack, "ImportedVpc",
538
538
  vpc_id="mockVpcID",
539
539
  vpc_cidr_block="10.0.0.0/16",
@@ -4050,7 +4050,7 @@ class Route(
4050
4050
  @builtins.property
4051
4051
  @jsii.member(jsii_name="targetRouterType")
4052
4052
  def target_router_type(self) -> _aws_cdk_aws_ec2_ceddda9d.RouterType:
4053
- '''(experimental) The type of router the route is targetting.
4053
+ '''(experimental) The type of router the route is targeting.
4054
4054
 
4055
4055
  :stability: experimental
4056
4056
  '''
@@ -33,9 +33,9 @@ import constructs._jsii
33
33
 
34
34
  __jsii_assembly__ = jsii.JSIIAssembly.load(
35
35
  "@aws-cdk/aws-ec2-alpha",
36
- "2.175.1-alpha.0",
36
+ "2.176.0-alpha.0",
37
37
  __name__[0:-6],
38
- "aws-ec2-alpha@2.175.1-alpha.0.jsii.tgz",
38
+ "aws-ec2-alpha@2.176.0-alpha.0.jsii.tgz",
39
39
  )
40
40
 
41
41
  __all__ = [
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: aws-cdk.aws-ec2-alpha
3
- Version: 2.175.1a0
3
+ Version: 2.176.0a0
4
4
  Summary: The CDK construct library for VPC V2
5
5
  Home-page: https://github.com/aws/aws-cdk
6
6
  Author: Amazon Web Services
@@ -23,7 +23,7 @@ Requires-Python: ~=3.8
23
23
  Description-Content-Type: text/markdown
24
24
  License-File: LICENSE
25
25
  License-File: NOTICE
26
- Requires-Dist: aws-cdk-lib<3.0.0,>=2.175.1
26
+ Requires-Dist: aws-cdk-lib<3.0.0,>=2.176.0
27
27
  Requires-Dist: constructs<11.0.0,>=10.0.0
28
28
  Requires-Dist: jsii<2.0.0,>=1.104.0
29
29
  Requires-Dist: publication>=0.0.3
@@ -327,7 +327,7 @@ acceptor_vpc = VpcV2(self, "VpcA",
327
327
  acceptor_role_arn = acceptor_vpc.create_acceptor_vpc_role("000000000000")
328
328
  ```
329
329
 
330
- After creating an IAM role in the acceptor account, we can initiate the peering connection request from the requestor VPC. Import accpeptorVpc to the stack using `fromVpcV2Attributes` method, it is recommended to specify owner account id of the acceptor VPC in case of cross account peering connection, if acceptor VPC is hosted in different region provide region value for import as well.
330
+ After creating an IAM role in the acceptor account, we can initiate the peering connection request from the requestor VPC. Import acceptorVpc to the stack using `fromVpcV2Attributes` method, it is recommended to specify owner account id of the acceptor VPC in case of cross account peering connection, if acceptor VPC is hosted in different region provide region value for import as well.
331
331
  The following code snippet demonstrates how to set up VPC peering between two VPCs in different AWS accounts using CDK:
332
332
 
333
333
  ```python
@@ -483,11 +483,11 @@ For more information, see [What is AWS Site-to-Site VPN?](https://docs.aws.amazo
483
483
 
484
484
  VPN route propagation is a feature in Amazon Web Services (AWS) that automatically updates route tables in your Virtual Private Cloud (VPC) with routes learned from a VPN connection.
485
485
 
486
- To enable VPN route propogation, use the `vpnRoutePropagation` property to specify the subnets as an input to the function. VPN route propagation will then be enabled for each subnet with the corresponding route table IDs.
486
+ To enable VPN route propagation, use the `vpnRoutePropagation` property to specify the subnets as an input to the function. VPN route propagation will then be enabled for each subnet with the corresponding route table IDs.
487
487
 
488
488
  Additionally, you can set up a route in any route table with the target set to the VPN Gateway. The function `enableVpnGatewayV2` returns a `VPNGatewayV2` object that you can reference later.
489
489
 
490
- The code example below provides the definition for setting up a VPN gateway with `vpnRoutePropogation` enabled:
490
+ The code example below provides the definition for setting up a VPN gateway with `vpnRoutePropagation` enabled:
491
491
 
492
492
  ```python
493
493
  stack = Stack()
@@ -515,7 +515,7 @@ An internet gateway is a horizontally scaled, redundant, and highly available VP
515
515
  For more information, see [Enable VPC internet access using internet gateways](https://docs.aws.amazon.com/vpc/latest/userguide/vpc-igw-internet-access.html).
516
516
 
517
517
  You can add an internet gateway to a VPC using `addInternetGateway` method. By default, this method creates a route in all Public Subnets with outbound destination set to `0.0.0.0` for IPv4 and `::0` for IPv6 enabled VPC.
518
- Instead of using the default settings, you can configure a custom destinatation range by providing an optional input `destination` to the method.
518
+ Instead of using the default settings, you can configure a custom destination range by providing an optional input `destination` to the method.
519
519
 
520
520
  The code example below shows how to add an internet gateway with a custom outbound destination IP range:
521
521
 
@@ -558,12 +558,12 @@ imported_vpc = VpcV2.from_vpc_v2_attributes(stack, "ImportedVpc",
558
558
 
559
559
  In case of cross account or cross region VPC, its recommended to provide region and ownerAccountId so that these values for the VPC can be used to populate correct arn value for the VPC. If a VPC region and account ID is not provided, then region and account configured in the stack will be used. Furthermore, these fields will be referenced later while setting up VPC peering connection, so its necessary to set these fields to a correct value.
560
560
 
561
- Below is an example of importing a cross region and cross acount VPC, VPC arn for this case would be 'arn:aws:ec2:us-west-2:123456789012:vpc/mockVpcID'
561
+ Below is an example of importing a cross region and cross account VPC, VPC arn for this case would be 'arn:aws:ec2:us-west-2:123456789012:vpc/mockVpcID'
562
562
 
563
563
  ```python
564
564
  stack = Stack()
565
565
 
566
- # Importing a cross acount or cross region VPC
566
+ # Importing a cross account or cross region VPC
567
567
  imported_vpc = VpcV2.from_vpc_v2_attributes(stack, "ImportedVpc",
568
568
  vpc_id="mockVpcID",
569
569
  vpc_cidr_block="10.0.0.0/16",
@@ -12,4 +12,4 @@ src/aws_cdk.aws_ec2_alpha.egg-info/top_level.txt
12
12
  src/aws_cdk/aws_ec2_alpha/__init__.py
13
13
  src/aws_cdk/aws_ec2_alpha/py.typed
14
14
  src/aws_cdk/aws_ec2_alpha/_jsii/__init__.py
15
- src/aws_cdk/aws_ec2_alpha/_jsii/aws-ec2-alpha@2.175.1-alpha.0.jsii.tgz
15
+ src/aws_cdk/aws_ec2_alpha/_jsii/aws-ec2-alpha@2.176.0-alpha.0.jsii.tgz
@@ -1,4 +1,4 @@
1
- aws-cdk-lib<3.0.0,>=2.175.1
1
+ aws-cdk-lib<3.0.0,>=2.176.0
2
2
  constructs<11.0.0,>=10.0.0
3
3
  jsii<2.0.0,>=1.104.0
4
4
  publication>=0.0.3