aws-cdk.cx-api 2.175.0__tar.gz → 2.176.0__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk.cx-api might be problematic. Click here for more details.

Files changed (18) hide show
  1. {aws_cdk_cx_api-2.175.0/src/aws_cdk.cx_api.egg-info → aws_cdk_cx_api-2.176.0}/PKG-INFO +26 -5
  2. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/README.md +25 -4
  3. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/setup.py +2 -2
  4. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/src/aws_cdk/cx_api/__init__.py +25 -4
  5. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/src/aws_cdk/cx_api/_jsii/__init__.py +1 -1
  6. aws_cdk_cx_api-2.176.0/src/aws_cdk/cx_api/_jsii/cx-api@2.176.0.jsii.tgz +0 -0
  7. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0/src/aws_cdk.cx_api.egg-info}/PKG-INFO +26 -5
  8. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/src/aws_cdk.cx_api.egg-info/SOURCES.txt +1 -1
  9. aws_cdk_cx_api-2.175.0/src/aws_cdk/cx_api/_jsii/cx-api@2.175.0.jsii.tgz +0 -0
  10. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/LICENSE +0 -0
  11. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/MANIFEST.in +0 -0
  12. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/NOTICE +0 -0
  13. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/pyproject.toml +0 -0
  14. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/setup.cfg +0 -0
  15. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/src/aws_cdk/cx_api/py.typed +0 -0
  16. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/src/aws_cdk.cx_api.egg-info/dependency_links.txt +0 -0
  17. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/src/aws_cdk.cx_api.egg-info/requires.txt +0 -0
  18. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/src/aws_cdk.cx_api.egg-info/top_level.txt +0 -0
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: aws-cdk.cx-api
3
- Version: 2.175.0
3
+ Version: 2.176.0
4
4
  Summary: Cloud executable protocol
5
5
  Home-page: https://github.com/aws/aws-cdk
6
6
  Author: Amazon Web Services
@@ -48,7 +48,7 @@ and error indicating that a bucket policy already exists.
48
48
  In cases where we know what the required policy is we can go ahead and create the policy so we can
49
49
  remain in control of it.
50
50
 
51
- https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3
51
+ [https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3](https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3)
52
52
 
53
53
  *cdk.json*
54
54
 
@@ -151,7 +151,7 @@ enabled on the bucket.
151
151
  This flag uses a Bucket Policy statement to allow Server Access Log delivery, following best
152
152
  practices for S3.
153
153
 
154
- https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html
154
+ [https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html](https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html)
155
155
 
156
156
  ```json
157
157
  {
@@ -201,7 +201,7 @@ Enable this feature flag to use the `AmazonEMRServicePolicy_v2` managed policies
201
201
  This is a feature flag as the old behavior will be deprecated, but some resources may require manual
202
202
  intervention since they might not have the appropriate tags propagated automatically.
203
203
 
204
- https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html
204
+ [https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html)
205
205
 
206
206
  *cdk.json*
207
207
 
@@ -394,7 +394,7 @@ When this featuer flag is enabled, remove the default deployment alarm settings
394
394
  When enabled, IAM Policy created to run tasks won't include the task definition ARN, only the revision ARN.
395
395
 
396
396
  When this feature flag is enabled, the IAM Policy created to run tasks won't include the task definition ARN, only the revision ARN.
397
- The revision ARN is more specific than the task definition ARN. See https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html
397
+ The revision ARN is more specific than the task definition ARN. See [https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html](https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html)
398
398
  for more details.
399
399
 
400
400
  *cdk.json*
@@ -585,3 +585,24 @@ guarantee the correct execution of the feature in all platforms. See [Github dis
585
585
  },
586
586
  }
587
587
  ```
588
+
589
+ * `@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault`
590
+
591
+ When enabled, the default security group ingress rules will allow IPv6 ingress from anywhere,
592
+ For internet facing ALBs with `dualstack-without-public-ipv4` IP address type, the default security group rules
593
+ will allow IPv6 ingress from anywhere (::/0). Previously, the default security group rules would only allow IPv4 ingress.
594
+
595
+ Using a feature flag to make sure existing customers who might be relying
596
+ on the overly restrictive permissions are not broken.,
597
+
598
+ If the flag is set to false then the default security group rules will only allow IPv4 ingress.
599
+
600
+ *cdk.json*
601
+
602
+ ```json
603
+ {
604
+ "context": {
605
+ "@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault": true
606
+ }
607
+ }
608
+ ```
@@ -18,7 +18,7 @@ and error indicating that a bucket policy already exists.
18
18
  In cases where we know what the required policy is we can go ahead and create the policy so we can
19
19
  remain in control of it.
20
20
 
21
- https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3
21
+ [https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3](https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3)
22
22
 
23
23
  *cdk.json*
24
24
 
@@ -121,7 +121,7 @@ enabled on the bucket.
121
121
  This flag uses a Bucket Policy statement to allow Server Access Log delivery, following best
122
122
  practices for S3.
123
123
 
124
- https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html
124
+ [https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html](https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html)
125
125
 
126
126
  ```json
127
127
  {
@@ -171,7 +171,7 @@ Enable this feature flag to use the `AmazonEMRServicePolicy_v2` managed policies
171
171
  This is a feature flag as the old behavior will be deprecated, but some resources may require manual
172
172
  intervention since they might not have the appropriate tags propagated automatically.
173
173
 
174
- https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html
174
+ [https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html)
175
175
 
176
176
  *cdk.json*
177
177
 
@@ -364,7 +364,7 @@ When this featuer flag is enabled, remove the default deployment alarm settings
364
364
  When enabled, IAM Policy created to run tasks won't include the task definition ARN, only the revision ARN.
365
365
 
366
366
  When this feature flag is enabled, the IAM Policy created to run tasks won't include the task definition ARN, only the revision ARN.
367
- The revision ARN is more specific than the task definition ARN. See https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html
367
+ The revision ARN is more specific than the task definition ARN. See [https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html](https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html)
368
368
  for more details.
369
369
 
370
370
  *cdk.json*
@@ -555,3 +555,24 @@ guarantee the correct execution of the feature in all platforms. See [Github dis
555
555
  },
556
556
  }
557
557
  ```
558
+
559
+ * `@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault`
560
+
561
+ When enabled, the default security group ingress rules will allow IPv6 ingress from anywhere,
562
+ For internet facing ALBs with `dualstack-without-public-ipv4` IP address type, the default security group rules
563
+ will allow IPv6 ingress from anywhere (::/0). Previously, the default security group rules would only allow IPv4 ingress.
564
+
565
+ Using a feature flag to make sure existing customers who might be relying
566
+ on the overly restrictive permissions are not broken.,
567
+
568
+ If the flag is set to false then the default security group rules will only allow IPv4 ingress.
569
+
570
+ *cdk.json*
571
+
572
+ ```json
573
+ {
574
+ "context": {
575
+ "@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault": true
576
+ }
577
+ }
578
+ ```
@@ -5,7 +5,7 @@ kwargs = json.loads(
5
5
  """
6
6
  {
7
7
  "name": "aws-cdk.cx-api",
8
- "version": "2.175.0",
8
+ "version": "2.176.0",
9
9
  "description": "Cloud executable protocol",
10
10
  "license": "Apache-2.0",
11
11
  "url": "https://github.com/aws/aws-cdk",
@@ -26,7 +26,7 @@ kwargs = json.loads(
26
26
  ],
27
27
  "package_data": {
28
28
  "aws_cdk.cx_api._jsii": [
29
- "cx-api@2.175.0.jsii.tgz"
29
+ "cx-api@2.176.0.jsii.tgz"
30
30
  ],
31
31
  "aws_cdk.cx_api": [
32
32
  "py.typed"
@@ -19,7 +19,7 @@ and error indicating that a bucket policy already exists.
19
19
  In cases where we know what the required policy is we can go ahead and create the policy so we can
20
20
  remain in control of it.
21
21
 
22
- https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3
22
+ [https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3](https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3)
23
23
 
24
24
  *cdk.json*
25
25
 
@@ -122,7 +122,7 @@ enabled on the bucket.
122
122
  This flag uses a Bucket Policy statement to allow Server Access Log delivery, following best
123
123
  practices for S3.
124
124
 
125
- https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html
125
+ [https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html](https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html)
126
126
 
127
127
  ```json
128
128
  {
@@ -172,7 +172,7 @@ Enable this feature flag to use the `AmazonEMRServicePolicy_v2` managed policies
172
172
  This is a feature flag as the old behavior will be deprecated, but some resources may require manual
173
173
  intervention since they might not have the appropriate tags propagated automatically.
174
174
 
175
- https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html
175
+ [https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html)
176
176
 
177
177
  *cdk.json*
178
178
 
@@ -365,7 +365,7 @@ When this featuer flag is enabled, remove the default deployment alarm settings
365
365
  When enabled, IAM Policy created to run tasks won't include the task definition ARN, only the revision ARN.
366
366
 
367
367
  When this feature flag is enabled, the IAM Policy created to run tasks won't include the task definition ARN, only the revision ARN.
368
- The revision ARN is more specific than the task definition ARN. See https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html
368
+ The revision ARN is more specific than the task definition ARN. See [https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html](https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html)
369
369
  for more details.
370
370
 
371
371
  *cdk.json*
@@ -556,6 +556,27 @@ guarantee the correct execution of the feature in all platforms. See [Github dis
556
556
  },
557
557
  }
558
558
  ```
559
+
560
+ * `@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault`
561
+
562
+ When enabled, the default security group ingress rules will allow IPv6 ingress from anywhere,
563
+ For internet facing ALBs with `dualstack-without-public-ipv4` IP address type, the default security group rules
564
+ will allow IPv6 ingress from anywhere (::/0). Previously, the default security group rules would only allow IPv4 ingress.
565
+
566
+ Using a feature flag to make sure existing customers who might be relying
567
+ on the overly restrictive permissions are not broken.,
568
+
569
+ If the flag is set to false then the default security group rules will only allow IPv4 ingress.
570
+
571
+ *cdk.json*
572
+
573
+ ```json
574
+ {
575
+ "context": {
576
+ "@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault": true
577
+ }
578
+ }
579
+ ```
559
580
  '''
560
581
  from pkgutil import extend_path
561
582
  __path__ = extend_path(__path__, __name__)
@@ -31,7 +31,7 @@ def check_type(argname: str, value: object, expected_type: typing.Any) -> typing
31
31
  import aws_cdk.cloud_assembly_schema._jsii
32
32
 
33
33
  __jsii_assembly__ = jsii.JSIIAssembly.load(
34
- "@aws-cdk/cx-api", "2.175.0", __name__[0:-6], "cx-api@2.175.0.jsii.tgz"
34
+ "@aws-cdk/cx-api", "2.176.0", __name__[0:-6], "cx-api@2.176.0.jsii.tgz"
35
35
  )
36
36
 
37
37
  __all__ = [
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: aws-cdk.cx-api
3
- Version: 2.175.0
3
+ Version: 2.176.0
4
4
  Summary: Cloud executable protocol
5
5
  Home-page: https://github.com/aws/aws-cdk
6
6
  Author: Amazon Web Services
@@ -48,7 +48,7 @@ and error indicating that a bucket policy already exists.
48
48
  In cases where we know what the required policy is we can go ahead and create the policy so we can
49
49
  remain in control of it.
50
50
 
51
- https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3
51
+ [https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3](https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3)
52
52
 
53
53
  *cdk.json*
54
54
 
@@ -151,7 +151,7 @@ enabled on the bucket.
151
151
  This flag uses a Bucket Policy statement to allow Server Access Log delivery, following best
152
152
  practices for S3.
153
153
 
154
- https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html
154
+ [https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html](https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html)
155
155
 
156
156
  ```json
157
157
  {
@@ -201,7 +201,7 @@ Enable this feature flag to use the `AmazonEMRServicePolicy_v2` managed policies
201
201
  This is a feature flag as the old behavior will be deprecated, but some resources may require manual
202
202
  intervention since they might not have the appropriate tags propagated automatically.
203
203
 
204
- https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html
204
+ [https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html)
205
205
 
206
206
  *cdk.json*
207
207
 
@@ -394,7 +394,7 @@ When this featuer flag is enabled, remove the default deployment alarm settings
394
394
  When enabled, IAM Policy created to run tasks won't include the task definition ARN, only the revision ARN.
395
395
 
396
396
  When this feature flag is enabled, the IAM Policy created to run tasks won't include the task definition ARN, only the revision ARN.
397
- The revision ARN is more specific than the task definition ARN. See https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html
397
+ The revision ARN is more specific than the task definition ARN. See [https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html](https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html)
398
398
  for more details.
399
399
 
400
400
  *cdk.json*
@@ -585,3 +585,24 @@ guarantee the correct execution of the feature in all platforms. See [Github dis
585
585
  },
586
586
  }
587
587
  ```
588
+
589
+ * `@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault`
590
+
591
+ When enabled, the default security group ingress rules will allow IPv6 ingress from anywhere,
592
+ For internet facing ALBs with `dualstack-without-public-ipv4` IP address type, the default security group rules
593
+ will allow IPv6 ingress from anywhere (::/0). Previously, the default security group rules would only allow IPv4 ingress.
594
+
595
+ Using a feature flag to make sure existing customers who might be relying
596
+ on the overly restrictive permissions are not broken.,
597
+
598
+ If the flag is set to false then the default security group rules will only allow IPv4 ingress.
599
+
600
+ *cdk.json*
601
+
602
+ ```json
603
+ {
604
+ "context": {
605
+ "@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault": true
606
+ }
607
+ }
608
+ ```
@@ -12,4 +12,4 @@ src/aws_cdk.cx_api.egg-info/top_level.txt
12
12
  src/aws_cdk/cx_api/__init__.py
13
13
  src/aws_cdk/cx_api/py.typed
14
14
  src/aws_cdk/cx_api/_jsii/__init__.py
15
- src/aws_cdk/cx_api/_jsii/cx-api@2.175.0.jsii.tgz
15
+ src/aws_cdk/cx_api/_jsii/cx-api@2.176.0.jsii.tgz