aws-cdk.cx-api 2.163.1__tar.gz → 2.232.2__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (19) hide show
  1. {aws_cdk_cx_api-2.163.1 → aws_cdk_cx_api-2.232.2}/LICENSE +1 -1
  2. {aws_cdk_cx_api-2.163.1 → aws_cdk_cx_api-2.232.2}/NOTICE +1 -1
  3. {aws_cdk_cx_api-2.163.1/src/aws_cdk.cx_api.egg-info → aws_cdk_cx_api-2.232.2}/PKG-INFO +351 -10
  4. {aws_cdk_cx_api-2.163.1 → aws_cdk_cx_api-2.232.2}/README.md +346 -4
  5. {aws_cdk_cx_api-2.163.1 → aws_cdk_cx_api-2.232.2}/pyproject.toml +2 -2
  6. {aws_cdk_cx_api-2.163.1 → aws_cdk_cx_api-2.232.2}/setup.py +6 -7
  7. {aws_cdk_cx_api-2.163.1 → aws_cdk_cx_api-2.232.2}/src/aws_cdk/cx_api/__init__.py +445 -40
  8. {aws_cdk_cx_api-2.163.1 → aws_cdk_cx_api-2.232.2}/src/aws_cdk/cx_api/_jsii/__init__.py +1 -1
  9. aws_cdk_cx_api-2.232.2/src/aws_cdk/cx_api/_jsii/cx-api@2.232.2.jsii.tgz +0 -0
  10. {aws_cdk_cx_api-2.163.1 → aws_cdk_cx_api-2.232.2/src/aws_cdk.cx_api.egg-info}/PKG-INFO +351 -10
  11. {aws_cdk_cx_api-2.163.1 → aws_cdk_cx_api-2.232.2}/src/aws_cdk.cx_api.egg-info/SOURCES.txt +1 -1
  12. aws_cdk_cx_api-2.232.2/src/aws_cdk.cx_api.egg-info/requires.txt +4 -0
  13. aws_cdk_cx_api-2.163.1/src/aws_cdk/cx_api/_jsii/cx-api@2.163.1.jsii.tgz +0 -0
  14. aws_cdk_cx_api-2.163.1/src/aws_cdk.cx_api.egg-info/requires.txt +0 -4
  15. {aws_cdk_cx_api-2.163.1 → aws_cdk_cx_api-2.232.2}/MANIFEST.in +0 -0
  16. {aws_cdk_cx_api-2.163.1 → aws_cdk_cx_api-2.232.2}/setup.cfg +0 -0
  17. {aws_cdk_cx_api-2.163.1 → aws_cdk_cx_api-2.232.2}/src/aws_cdk/cx_api/py.typed +0 -0
  18. {aws_cdk_cx_api-2.163.1 → aws_cdk_cx_api-2.232.2}/src/aws_cdk.cx_api.egg-info/dependency_links.txt +0 -0
  19. {aws_cdk_cx_api-2.163.1 → aws_cdk_cx_api-2.232.2}/src/aws_cdk.cx_api.egg-info/top_level.txt +0 -0
@@ -186,7 +186,7 @@
186
186
  same "printed page" as the copyright notice for easier
187
187
  identification within third-party archives.
188
188
 
189
- Copyright 2018-2024 Amazon.com, Inc. or its affiliates. All Rights Reserved.
189
+ Copyright 2018-2025 Amazon.com, Inc. or its affiliates. All Rights Reserved.
190
190
 
191
191
  Licensed under the Apache License, Version 2.0 (the "License");
192
192
  you may not use this file except in compliance with the License.
@@ -1,5 +1,5 @@
1
1
  AWS Cloud Development Kit (AWS CDK)
2
- Copyright 2018-2024 Amazon.com, Inc. or its affiliates. All Rights Reserved.
2
+ Copyright 2018-2025 Amazon.com, Inc. or its affiliates. All Rights Reserved.
3
3
 
4
4
  -------------------------------------------------------------------------------
5
5
 
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: aws-cdk.cx-api
3
- Version: 2.163.1
3
+ Version: 2.232.2
4
4
  Summary: Cloud executable protocol
5
5
  Home-page: https://github.com/aws/aws-cdk
6
6
  Author: Amazon Web Services
@@ -10,7 +10,6 @@ Classifier: Intended Audience :: Developers
10
10
  Classifier: Operating System :: OS Independent
11
11
  Classifier: Programming Language :: JavaScript
12
12
  Classifier: Programming Language :: Python :: 3 :: Only
13
- Classifier: Programming Language :: Python :: 3.8
14
13
  Classifier: Programming Language :: Python :: 3.9
15
14
  Classifier: Programming Language :: Python :: 3.10
16
15
  Classifier: Programming Language :: Python :: 3.11
@@ -19,14 +18,14 @@ Classifier: Development Status :: 5 - Production/Stable
19
18
  Classifier: License :: OSI Approved
20
19
  Classifier: Framework :: AWS CDK
21
20
  Classifier: Framework :: AWS CDK :: 2
22
- Requires-Python: ~=3.8
21
+ Requires-Python: ~=3.9
23
22
  Description-Content-Type: text/markdown
24
23
  License-File: LICENSE
25
24
  License-File: NOTICE
26
- Requires-Dist: aws-cdk.cloud-assembly-schema<39.0.0,>=38.0.0
27
- Requires-Dist: jsii<2.0.0,>=1.103.1
25
+ Requires-Dist: aws-cdk.cloud-assembly-schema>=45.0.0
26
+ Requires-Dist: jsii<2.0.0,>=1.120.0
28
27
  Requires-Dist: publication>=0.0.3
29
- Requires-Dist: typeguard<5.0.0,>=2.13.3
28
+ Requires-Dist: typeguard==2.13.3
30
29
 
31
30
  # Cloud Executable API
32
31
 
@@ -48,7 +47,7 @@ and error indicating that a bucket policy already exists.
48
47
  In cases where we know what the required policy is we can go ahead and create the policy so we can
49
48
  remain in control of it.
50
49
 
51
- https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3
50
+ [https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3](https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3)
52
51
 
53
52
  *cdk.json*
54
53
 
@@ -151,7 +150,7 @@ enabled on the bucket.
151
150
  This flag uses a Bucket Policy statement to allow Server Access Log delivery, following best
152
151
  practices for S3.
153
152
 
154
- https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html
153
+ [https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html](https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html)
155
154
 
156
155
  ```json
157
156
  {
@@ -201,7 +200,7 @@ Enable this feature flag to use the `AmazonEMRServicePolicy_v2` managed policies
201
200
  This is a feature flag as the old behavior will be deprecated, but some resources may require manual
202
201
  intervention since they might not have the appropriate tags propagated automatically.
203
202
 
204
- https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html
203
+ [https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html)
205
204
 
206
205
  *cdk.json*
207
206
 
@@ -340,6 +339,20 @@ When this feature flag is enabled and calling KMS key grant method, the created
340
339
  }
341
340
  ```
342
341
 
342
+ * `@aws-cdk/aws-kms:applyImportedAliasPermissionsToPrincipal`
343
+
344
+ Enable grant methods on imported KMS Aliases to apply permissions scoped by the alias using the `kms:ResourceAliases` condition key. When this flag is disabled, grant* methods on `Alias.fromAliasName` remain no-ops to preserve existing behavior.
345
+
346
+ *cdk.json*
347
+
348
+ ```json
349
+ {
350
+ "context": {
351
+ "@aws-cdk/aws-kms:applyImportedAliasPermissionsToPrincipal": true
352
+ }
353
+ }
354
+ ```
355
+
343
356
  * `@aws-cdk/aws-eks:nodegroupNameAttribute`
344
357
 
345
358
  When enabled, nodegroupName attribute of the provisioned EKS NodeGroup will not have the cluster name prefix.
@@ -394,7 +407,7 @@ When this featuer flag is enabled, remove the default deployment alarm settings
394
407
  When enabled, IAM Policy created to run tasks won't include the task definition ARN, only the revision ARN.
395
408
 
396
409
  When this feature flag is enabled, the IAM Policy created to run tasks won't include the task definition ARN, only the revision ARN.
397
- The revision ARN is more specific than the task definition ARN. See https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html
410
+ The revision ARN is more specific than the task definition ARN. See [https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html](https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html)
398
411
  for more details.
399
412
 
400
413
  *cdk.json*
@@ -505,3 +518,331 @@ occur between these tightly coupled dependencies when using the AWS SDK v3 in La
505
518
  }
506
519
  }
507
520
  ```
521
+
522
+ * `@aws-cdk/aws-dynamodb:resourcePolicyPerReplica`
523
+
524
+ If this flag is not set, the default behavior for `TableV2` is to use a different `resourcePolicy` for each replica.
525
+
526
+ If this flag is set to false, the behavior is that each replica shares the same `resourcePolicy` as the source table.
527
+ This will prevent you from creating a new table which has an additional replica and a resource policy.
528
+
529
+ This is a feature flag as the old behavior was technically incorrect but users may have come to depend on it.
530
+
531
+ *cdk.json*
532
+
533
+ ```json
534
+ {
535
+ "context": {
536
+ "@aws-cdk/aws-dynamodb:resourcePolicyPerReplica": false,
537
+ },
538
+ }
539
+ ```
540
+
541
+ * `@aws-cdk/aws-route53-targets:userPoolDomainNameMethodWithoutCustomResource`
542
+
543
+ When enabled, use a new method for DNS Name of user pool domain target without creating a custom resource.
544
+
545
+ When this feature flag is enabled, a new method will be used to get the DNS Name of the user pool domain target. The old method
546
+ creates a custom resource internally, but the new method doesn't need a custom resource.
547
+
548
+ If the flag is set to false then a custom resource will be created when using `UserPoolDomainTarget`.
549
+
550
+ *cdk.json*
551
+
552
+ ```json
553
+ {
554
+ "context": {
555
+ "@aws-cdk/aws-route53-targets:userPoolDomainNameMethodWithoutCustomResource": true
556
+ }
557
+ }
558
+ ```
559
+
560
+ * `@aws-cdk/aws-ecs:disableEcsImdsBlocking`
561
+
562
+ When set to true, CDK synth will throw exception if canContainersAccessInstanceRole is false.
563
+
564
+ In an ECS Cluster with `MachineImageType.AMAZON_LINUX_2`, the canContainersAccessInstanceRole=false option attempts to add commands to block containers from
565
+ accessing IMDS. CDK cannot guarantee the correct execution of the feature in all platforms. Setting this feature flag
566
+ to true will ensure CDK does not attempt to implement IMDS blocking. By <ins>**end of 2025**</ins>, CDK will remove the
567
+ IMDS blocking feature. See [Github discussion](https://github.com/aws/aws-cdk/discussions/32609) for more information.
568
+
569
+ **It is recommended to follow ECS documentation to block IMDS for your specific platform and cluster configuration.**
570
+
571
+ *cdk.json*
572
+
573
+ ```json
574
+ {
575
+ "context": {
576
+ "@aws-cdk/aws-ecs:disableEcsImdsBlocking": true
577
+ }
578
+ }
579
+ ```
580
+
581
+ * `@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature`
582
+
583
+ When set to true along with canContainersAccessInstanceRole=false in ECS cluster, new updated commands will be added to UserData to block container accessing IMDS. **Applicable to Linux only.**
584
+
585
+ In an ECS Cluster with `MachineImageType.AMAZON_LINUX_2`, the canContainersAccessInstanceRole=false option attempts to add commands to block containers from
586
+ accessing IMDS. Set this flag to true in order to use new and updated commands. Please note that this
587
+ feature alone with this feature flag will be deprecated by <ins>end of 2025</ins> as CDK cannot
588
+ guarantee the correct execution of the feature in all platforms. See [Github discussion](https://github.com/aws/aws-cdk/discussions/32609) for more information.
589
+
590
+ **It is recommended to follow ECS documentation to block IMDS for your specific platform and cluster configuration.**
591
+
592
+ *cdk.json*
593
+
594
+ ```json
595
+ {
596
+ "context": {
597
+ "@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature": false,
598
+ },
599
+ }
600
+ ```
601
+
602
+ * `@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault`
603
+
604
+ When enabled, the default security group ingress rules will allow IPv6 ingress from anywhere,
605
+ For internet facing ALBs with `dualstack-without-public-ipv4` IP address type, the default security group rules
606
+ will allow IPv6 ingress from anywhere (::/0). Previously, the default security group rules would only allow IPv4 ingress.
607
+
608
+ Using a feature flag to make sure existing customers who might be relying
609
+ on the overly restrictive permissions are not broken.,
610
+
611
+ If the flag is set to false then the default security group rules will only allow IPv4 ingress.
612
+
613
+ *cdk.json*
614
+
615
+ ```json
616
+ {
617
+ "context": {
618
+ "@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault": true
619
+ }
620
+ }
621
+ ```
622
+
623
+ * `@aws-cdk/aws-iam:oidcRejectUnauthorizedConnections`
624
+
625
+ When this feature flag is enabled, the default behaviour of OIDC Provider's custom resource handler will
626
+ default to reject unauthorized connections when downloading CA Certificates.
627
+
628
+ When this feature flag is disabled, the behaviour will be the same as current and will allow downloading
629
+ thumbprints from unsecure connnections.
630
+
631
+ *cdk.json*
632
+
633
+ ```json
634
+ {
635
+ "context": {
636
+ "@aws-cdk/aws-iam:oidcRejectUnauthorizedConnections": true
637
+ }
638
+ }
639
+ ```
640
+
641
+ * `@aws-cdk/core:enableAdditionalMetadataCollection`
642
+
643
+ When this feature flag is enabled, CDK expands the scope of usage data collection to include the:
644
+
645
+ * L2 construct property keys - Collect which property keys you use from the L2 constructs in your app. This includes property keys nested in dictionary objects.
646
+ * L2 construct property values of BOOL and ENUM types - Collect property key values of only BOOL and ENUM types. All other types, such as string values or construct references will be redacted.
647
+ * L2 construct method usage - Collection method name, parameter keys and parameter values of BOOL and ENUM type.
648
+
649
+ *cdk.json*
650
+
651
+ ```json
652
+ {
653
+ "context": {
654
+ "@aws-cdk/core:enableAdditionalMetadataCollection": true
655
+ }
656
+ }
657
+ ```
658
+
659
+ * `@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy`
660
+
661
+ [Deprecated default feature] When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
662
+ The purpose of this is to prevent lambda from creating a dependency on the Default Policy Statement.
663
+ This solves an issue where a circular dependency could occur if adding lambda to something like a Cognito Trigger, then adding the User Pool to the lambda execution role permissions.
664
+ However in the current implementation, we have removed a dependency of the lambda function on the policy. In addition to this, a Role will be attached to the Policy instead of an inline policy being attached to the role.
665
+ This will create a data race condition in the CloudFormation template because the creation of the Lambda function no longer waits for the policy to be created. Having said that, we are not deprecating the feature (we are defaulting the feature flag to false for new stacks) since this feature can still be used to get around the circular dependency issue (issue-7016) particularly in cases where the lambda resource creation doesnt need to depend on the policy resource creation.
666
+ We recommend to unset the feature flag if already set which will restore the original behavior.
667
+
668
+ *cdk.json*
669
+
670
+ ```json
671
+ {
672
+ "context": {
673
+ "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": false
674
+ }
675
+ }
676
+ ```
677
+
678
+ * `@aws-cdk/aws-s3:setUniqueReplicationRoleName`
679
+
680
+ When this feature flag is enabled, a unique role name is specified only when performing cross-account replication.
681
+ When disabled, 'CDKReplicationRole' is always specified.
682
+
683
+ *cdk.json*
684
+
685
+ ```json
686
+ {
687
+ "context": {
688
+ "@aws-cdk/aws-s3:setUniqueReplicationRoleName": true
689
+ }
690
+ }
691
+ ```
692
+
693
+ * `@aws-cdk/pipelines:reduceStageRoleTrustScope`
694
+
695
+ When this feature flag is enabled, the root account principal will not be added to the trust policy of stage role.
696
+ When this feature flag is disabled, it will keep the root account principal in the trust policy.
697
+
698
+ *cdk.json*
699
+
700
+ ```json
701
+ {
702
+ "context": {
703
+ "@aws-cdk/pipelines:reduceStageRoleTrustScope": true
704
+ }
705
+ }
706
+ ```
707
+
708
+ * `@aws-cdk/aws-events:requireEventBusPolicySid`
709
+
710
+ When this flag is enabled:
711
+
712
+ * Resource policies will be created with Statement IDs for service principals
713
+ * The operation will succeed as expected
714
+
715
+ When this flag is disabled:
716
+
717
+ * A warning will be emitted
718
+ * The grant operation will be dropped
719
+ * No permissions will be added
720
+
721
+ *cdk.json*
722
+
723
+ ```json
724
+ {
725
+ "context": {
726
+ "@aws-cdk/aws-events:requireEventBusPolicySid": true
727
+ }
728
+ }
729
+ ```
730
+
731
+ * `@aws-cdk/aws-dynamodb:retainTableReplica`
732
+
733
+ Currently, table replica will always be deleted when stack deletes regardless of source table's deletion policy.
734
+ When enabled, table replica will be default to the removal policy of source table unless specified otherwise.
735
+
736
+ *cdk.json*
737
+
738
+ ```json
739
+ {
740
+ "context": {
741
+ "@aws-cdk/aws-dynamodb:retainTableReplica": true
742
+ }
743
+ }
744
+ ```
745
+
746
+ * `@aws-cdk/cognito:logUserPoolClientSecretValue`
747
+
748
+ When this feature flag is enabled, the SDK API call response to desribe user pool client values will be logged in the custom
749
+ resource lambda function logs.
750
+
751
+ When this feature flag is disabled, the SDK API call response to describe user pool client values will not be logged in the custom
752
+ resource lambda function logs.
753
+
754
+ *cdk.json*
755
+
756
+ ```json
757
+ {
758
+ "context": {
759
+ "@aws-cdk/cognito:logUserPoolClientSecretValue": true
760
+ }
761
+ }
762
+ ```
763
+
764
+ * `@aws-cdk/aws-s3:publicAccessBlockedByDefault`
765
+
766
+ When BlockPublicAccess is not set at all, s3's default behavior will be to set all options to true in aws console.
767
+ The previous behavior in cdk before this feature was; if only some of the BlockPublicAccessOptions were set (not all 4), then the ones undefined would default to false.
768
+ This is counter intuitive to the console behavior where the options would start in true state and a user would uncheck the boxes as needed.
769
+ The new behavior from this feature will allow a user, for example, to set 1 of the 4 BlockPublicAccessOpsions to false, and on deployment the other 3 will remain true.
770
+
771
+ *cdk.json*
772
+
773
+ ```json
774
+ {
775
+ "context": {
776
+ "@aws-cdk/aws-s3:publicAccessBlockedByDefault": true
777
+ }
778
+ }
779
+ ```
780
+
781
+ * `@aws-cdk/aws-ec2:requirePrivateSubnetsForEgressOnlyInternetGateway`
782
+
783
+ When this feature flag is enabled, EgressOnlyGateway is created only for dual-stack VPC with private subnets
784
+
785
+ When this feature flag is disabled, EgressOnlyGateway resource is created for all dual-stack VPC regardless of subnet type
786
+
787
+ *cdk.json*
788
+
789
+ ```json
790
+ {
791
+ "context": {
792
+ "@aws-cdk/aws-ec2:requirePrivateSubnetsForEgressOnlyInternetGateway": true
793
+ }
794
+ }
795
+ ```
796
+
797
+ * `@aws-cdk/aws-stepfunctions-tasks:httpInvokeDynamicJsonPathEndpoint`
798
+
799
+ When this feature flag is enabled, the JSONPath apiEndpoint value will be resolved dynamically at runtime, while slightly increasing the size of the state machine definition.
800
+ When disabled, the JSONPath apiEndpoint property will only support a static string value.
801
+
802
+ _cdk.json
803
+
804
+ ```json
805
+ {
806
+ "context": {
807
+ "@aws-cdk/aws-stepfunctions-tasks:httpInvokeDynamicJsonPathEndpoint": true
808
+ }
809
+ }
810
+ ```
811
+
812
+ * `@aws-cdk/aws-signer:signingProfileNamePassedToCfn`
813
+
814
+ When this feature flag is enabled, the `signingProfileName` property is passed to the L1 `CfnSigningProfile` construct,
815
+ which ensures that the AWS Signer profile is created with the specified name.
816
+
817
+ When this feature flag is disabled, the `signingProfileName` is not passed to CloudFormation, maintaining backward
818
+ compatibility with existing deployments where CloudFormation auto-generated profile names.
819
+
820
+ This feature flag is needed because enabling it can cause existing signing profiles to be
821
+ replaced during deployment if a `signingProfileName` was specified but not previously used
822
+ in the CloudFormation template.
823
+
824
+ *cdk.json*
825
+
826
+ ```json
827
+ {
828
+ "context": {
829
+ "@aws-cdk/aws-signer:signingProfileNamePassedToCfn": true
830
+ }
831
+ }
832
+ ```
833
+
834
+ * `@aws-cdk/aws-ecs-patterns:uniqueTargetGroupId`
835
+
836
+ When enabled, ECS patterns will generate unique target group IDs that include the load balancer name and type (public/private). This prevents CloudFormation conflicts when switching between public and private load balancers.
837
+
838
+ Without this flag, switching an ApplicationLoadBalancedFargateService from public to private (or vice versa) fails with "target group cannot be associated with more than one load balancer" error.
839
+
840
+ *cdk.json*
841
+
842
+ ```json
843
+ {
844
+ "context": {
845
+ "@aws-cdk/aws-ecs-patterns:uniqueTargetGroupId": true
846
+ }
847
+ }
848
+ ```