aws-cdk.cx-api 2.175.0__tar.gz → 2.176.0__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk.cx-api might be problematic. Click here for more details.
- {aws_cdk_cx_api-2.175.0/src/aws_cdk.cx_api.egg-info → aws_cdk_cx_api-2.176.0}/PKG-INFO +26 -5
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/README.md +25 -4
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/setup.py +2 -2
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/src/aws_cdk/cx_api/__init__.py +25 -4
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/src/aws_cdk/cx_api/_jsii/__init__.py +1 -1
- aws_cdk_cx_api-2.176.0/src/aws_cdk/cx_api/_jsii/cx-api@2.176.0.jsii.tgz +0 -0
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0/src/aws_cdk.cx_api.egg-info}/PKG-INFO +26 -5
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/src/aws_cdk.cx_api.egg-info/SOURCES.txt +1 -1
- aws_cdk_cx_api-2.175.0/src/aws_cdk/cx_api/_jsii/cx-api@2.175.0.jsii.tgz +0 -0
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/LICENSE +0 -0
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/MANIFEST.in +0 -0
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/NOTICE +0 -0
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/pyproject.toml +0 -0
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/setup.cfg +0 -0
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/src/aws_cdk/cx_api/py.typed +0 -0
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/src/aws_cdk.cx_api.egg-info/dependency_links.txt +0 -0
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/src/aws_cdk.cx_api.egg-info/requires.txt +0 -0
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/src/aws_cdk.cx_api.egg-info/top_level.txt +0 -0
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.1
|
|
2
2
|
Name: aws-cdk.cx-api
|
|
3
|
-
Version: 2.
|
|
3
|
+
Version: 2.176.0
|
|
4
4
|
Summary: Cloud executable protocol
|
|
5
5
|
Home-page: https://github.com/aws/aws-cdk
|
|
6
6
|
Author: Amazon Web Services
|
|
@@ -48,7 +48,7 @@ and error indicating that a bucket policy already exists.
|
|
|
48
48
|
In cases where we know what the required policy is we can go ahead and create the policy so we can
|
|
49
49
|
remain in control of it.
|
|
50
50
|
|
|
51
|
-
https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3
|
|
51
|
+
[https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3](https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3)
|
|
52
52
|
|
|
53
53
|
*cdk.json*
|
|
54
54
|
|
|
@@ -151,7 +151,7 @@ enabled on the bucket.
|
|
|
151
151
|
This flag uses a Bucket Policy statement to allow Server Access Log delivery, following best
|
|
152
152
|
practices for S3.
|
|
153
153
|
|
|
154
|
-
https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html
|
|
154
|
+
[https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html](https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html)
|
|
155
155
|
|
|
156
156
|
```json
|
|
157
157
|
{
|
|
@@ -201,7 +201,7 @@ Enable this feature flag to use the `AmazonEMRServicePolicy_v2` managed policies
|
|
|
201
201
|
This is a feature flag as the old behavior will be deprecated, but some resources may require manual
|
|
202
202
|
intervention since they might not have the appropriate tags propagated automatically.
|
|
203
203
|
|
|
204
|
-
https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html
|
|
204
|
+
[https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html)
|
|
205
205
|
|
|
206
206
|
*cdk.json*
|
|
207
207
|
|
|
@@ -394,7 +394,7 @@ When this featuer flag is enabled, remove the default deployment alarm settings
|
|
|
394
394
|
When enabled, IAM Policy created to run tasks won't include the task definition ARN, only the revision ARN.
|
|
395
395
|
|
|
396
396
|
When this feature flag is enabled, the IAM Policy created to run tasks won't include the task definition ARN, only the revision ARN.
|
|
397
|
-
The revision ARN is more specific than the task definition ARN. See https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html
|
|
397
|
+
The revision ARN is more specific than the task definition ARN. See [https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html](https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html)
|
|
398
398
|
for more details.
|
|
399
399
|
|
|
400
400
|
*cdk.json*
|
|
@@ -585,3 +585,24 @@ guarantee the correct execution of the feature in all platforms. See [Github dis
|
|
|
585
585
|
},
|
|
586
586
|
}
|
|
587
587
|
```
|
|
588
|
+
|
|
589
|
+
* `@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault`
|
|
590
|
+
|
|
591
|
+
When enabled, the default security group ingress rules will allow IPv6 ingress from anywhere,
|
|
592
|
+
For internet facing ALBs with `dualstack-without-public-ipv4` IP address type, the default security group rules
|
|
593
|
+
will allow IPv6 ingress from anywhere (::/0). Previously, the default security group rules would only allow IPv4 ingress.
|
|
594
|
+
|
|
595
|
+
Using a feature flag to make sure existing customers who might be relying
|
|
596
|
+
on the overly restrictive permissions are not broken.,
|
|
597
|
+
|
|
598
|
+
If the flag is set to false then the default security group rules will only allow IPv4 ingress.
|
|
599
|
+
|
|
600
|
+
*cdk.json*
|
|
601
|
+
|
|
602
|
+
```json
|
|
603
|
+
{
|
|
604
|
+
"context": {
|
|
605
|
+
"@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault": true
|
|
606
|
+
}
|
|
607
|
+
}
|
|
608
|
+
```
|
|
@@ -18,7 +18,7 @@ and error indicating that a bucket policy already exists.
|
|
|
18
18
|
In cases where we know what the required policy is we can go ahead and create the policy so we can
|
|
19
19
|
remain in control of it.
|
|
20
20
|
|
|
21
|
-
https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3
|
|
21
|
+
[https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3](https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3)
|
|
22
22
|
|
|
23
23
|
*cdk.json*
|
|
24
24
|
|
|
@@ -121,7 +121,7 @@ enabled on the bucket.
|
|
|
121
121
|
This flag uses a Bucket Policy statement to allow Server Access Log delivery, following best
|
|
122
122
|
practices for S3.
|
|
123
123
|
|
|
124
|
-
https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html
|
|
124
|
+
[https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html](https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html)
|
|
125
125
|
|
|
126
126
|
```json
|
|
127
127
|
{
|
|
@@ -171,7 +171,7 @@ Enable this feature flag to use the `AmazonEMRServicePolicy_v2` managed policies
|
|
|
171
171
|
This is a feature flag as the old behavior will be deprecated, but some resources may require manual
|
|
172
172
|
intervention since they might not have the appropriate tags propagated automatically.
|
|
173
173
|
|
|
174
|
-
https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html
|
|
174
|
+
[https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html)
|
|
175
175
|
|
|
176
176
|
*cdk.json*
|
|
177
177
|
|
|
@@ -364,7 +364,7 @@ When this featuer flag is enabled, remove the default deployment alarm settings
|
|
|
364
364
|
When enabled, IAM Policy created to run tasks won't include the task definition ARN, only the revision ARN.
|
|
365
365
|
|
|
366
366
|
When this feature flag is enabled, the IAM Policy created to run tasks won't include the task definition ARN, only the revision ARN.
|
|
367
|
-
The revision ARN is more specific than the task definition ARN. See https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html
|
|
367
|
+
The revision ARN is more specific than the task definition ARN. See [https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html](https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html)
|
|
368
368
|
for more details.
|
|
369
369
|
|
|
370
370
|
*cdk.json*
|
|
@@ -555,3 +555,24 @@ guarantee the correct execution of the feature in all platforms. See [Github dis
|
|
|
555
555
|
},
|
|
556
556
|
}
|
|
557
557
|
```
|
|
558
|
+
|
|
559
|
+
* `@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault`
|
|
560
|
+
|
|
561
|
+
When enabled, the default security group ingress rules will allow IPv6 ingress from anywhere,
|
|
562
|
+
For internet facing ALBs with `dualstack-without-public-ipv4` IP address type, the default security group rules
|
|
563
|
+
will allow IPv6 ingress from anywhere (::/0). Previously, the default security group rules would only allow IPv4 ingress.
|
|
564
|
+
|
|
565
|
+
Using a feature flag to make sure existing customers who might be relying
|
|
566
|
+
on the overly restrictive permissions are not broken.,
|
|
567
|
+
|
|
568
|
+
If the flag is set to false then the default security group rules will only allow IPv4 ingress.
|
|
569
|
+
|
|
570
|
+
*cdk.json*
|
|
571
|
+
|
|
572
|
+
```json
|
|
573
|
+
{
|
|
574
|
+
"context": {
|
|
575
|
+
"@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault": true
|
|
576
|
+
}
|
|
577
|
+
}
|
|
578
|
+
```
|
|
@@ -5,7 +5,7 @@ kwargs = json.loads(
|
|
|
5
5
|
"""
|
|
6
6
|
{
|
|
7
7
|
"name": "aws-cdk.cx-api",
|
|
8
|
-
"version": "2.
|
|
8
|
+
"version": "2.176.0",
|
|
9
9
|
"description": "Cloud executable protocol",
|
|
10
10
|
"license": "Apache-2.0",
|
|
11
11
|
"url": "https://github.com/aws/aws-cdk",
|
|
@@ -26,7 +26,7 @@ kwargs = json.loads(
|
|
|
26
26
|
],
|
|
27
27
|
"package_data": {
|
|
28
28
|
"aws_cdk.cx_api._jsii": [
|
|
29
|
-
"cx-api@2.
|
|
29
|
+
"cx-api@2.176.0.jsii.tgz"
|
|
30
30
|
],
|
|
31
31
|
"aws_cdk.cx_api": [
|
|
32
32
|
"py.typed"
|
|
@@ -19,7 +19,7 @@ and error indicating that a bucket policy already exists.
|
|
|
19
19
|
In cases where we know what the required policy is we can go ahead and create the policy so we can
|
|
20
20
|
remain in control of it.
|
|
21
21
|
|
|
22
|
-
https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3
|
|
22
|
+
[https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3](https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3)
|
|
23
23
|
|
|
24
24
|
*cdk.json*
|
|
25
25
|
|
|
@@ -122,7 +122,7 @@ enabled on the bucket.
|
|
|
122
122
|
This flag uses a Bucket Policy statement to allow Server Access Log delivery, following best
|
|
123
123
|
practices for S3.
|
|
124
124
|
|
|
125
|
-
https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html
|
|
125
|
+
[https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html](https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html)
|
|
126
126
|
|
|
127
127
|
```json
|
|
128
128
|
{
|
|
@@ -172,7 +172,7 @@ Enable this feature flag to use the `AmazonEMRServicePolicy_v2` managed policies
|
|
|
172
172
|
This is a feature flag as the old behavior will be deprecated, but some resources may require manual
|
|
173
173
|
intervention since they might not have the appropriate tags propagated automatically.
|
|
174
174
|
|
|
175
|
-
https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html
|
|
175
|
+
[https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html)
|
|
176
176
|
|
|
177
177
|
*cdk.json*
|
|
178
178
|
|
|
@@ -365,7 +365,7 @@ When this featuer flag is enabled, remove the default deployment alarm settings
|
|
|
365
365
|
When enabled, IAM Policy created to run tasks won't include the task definition ARN, only the revision ARN.
|
|
366
366
|
|
|
367
367
|
When this feature flag is enabled, the IAM Policy created to run tasks won't include the task definition ARN, only the revision ARN.
|
|
368
|
-
The revision ARN is more specific than the task definition ARN. See https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html
|
|
368
|
+
The revision ARN is more specific than the task definition ARN. See [https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html](https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html)
|
|
369
369
|
for more details.
|
|
370
370
|
|
|
371
371
|
*cdk.json*
|
|
@@ -556,6 +556,27 @@ guarantee the correct execution of the feature in all platforms. See [Github dis
|
|
|
556
556
|
},
|
|
557
557
|
}
|
|
558
558
|
```
|
|
559
|
+
|
|
560
|
+
* `@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault`
|
|
561
|
+
|
|
562
|
+
When enabled, the default security group ingress rules will allow IPv6 ingress from anywhere,
|
|
563
|
+
For internet facing ALBs with `dualstack-without-public-ipv4` IP address type, the default security group rules
|
|
564
|
+
will allow IPv6 ingress from anywhere (::/0). Previously, the default security group rules would only allow IPv4 ingress.
|
|
565
|
+
|
|
566
|
+
Using a feature flag to make sure existing customers who might be relying
|
|
567
|
+
on the overly restrictive permissions are not broken.,
|
|
568
|
+
|
|
569
|
+
If the flag is set to false then the default security group rules will only allow IPv4 ingress.
|
|
570
|
+
|
|
571
|
+
*cdk.json*
|
|
572
|
+
|
|
573
|
+
```json
|
|
574
|
+
{
|
|
575
|
+
"context": {
|
|
576
|
+
"@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault": true
|
|
577
|
+
}
|
|
578
|
+
}
|
|
579
|
+
```
|
|
559
580
|
'''
|
|
560
581
|
from pkgutil import extend_path
|
|
561
582
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -31,7 +31,7 @@ def check_type(argname: str, value: object, expected_type: typing.Any) -> typing
|
|
|
31
31
|
import aws_cdk.cloud_assembly_schema._jsii
|
|
32
32
|
|
|
33
33
|
__jsii_assembly__ = jsii.JSIIAssembly.load(
|
|
34
|
-
"@aws-cdk/cx-api", "2.
|
|
34
|
+
"@aws-cdk/cx-api", "2.176.0", __name__[0:-6], "cx-api@2.176.0.jsii.tgz"
|
|
35
35
|
)
|
|
36
36
|
|
|
37
37
|
__all__ = [
|
|
Binary file
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.1
|
|
2
2
|
Name: aws-cdk.cx-api
|
|
3
|
-
Version: 2.
|
|
3
|
+
Version: 2.176.0
|
|
4
4
|
Summary: Cloud executable protocol
|
|
5
5
|
Home-page: https://github.com/aws/aws-cdk
|
|
6
6
|
Author: Amazon Web Services
|
|
@@ -48,7 +48,7 @@ and error indicating that a bucket policy already exists.
|
|
|
48
48
|
In cases where we know what the required policy is we can go ahead and create the policy so we can
|
|
49
49
|
remain in control of it.
|
|
50
50
|
|
|
51
|
-
https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3
|
|
51
|
+
[https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3](https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3)
|
|
52
52
|
|
|
53
53
|
*cdk.json*
|
|
54
54
|
|
|
@@ -151,7 +151,7 @@ enabled on the bucket.
|
|
|
151
151
|
This flag uses a Bucket Policy statement to allow Server Access Log delivery, following best
|
|
152
152
|
practices for S3.
|
|
153
153
|
|
|
154
|
-
https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html
|
|
154
|
+
[https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html](https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html)
|
|
155
155
|
|
|
156
156
|
```json
|
|
157
157
|
{
|
|
@@ -201,7 +201,7 @@ Enable this feature flag to use the `AmazonEMRServicePolicy_v2` managed policies
|
|
|
201
201
|
This is a feature flag as the old behavior will be deprecated, but some resources may require manual
|
|
202
202
|
intervention since they might not have the appropriate tags propagated automatically.
|
|
203
203
|
|
|
204
|
-
https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html
|
|
204
|
+
[https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html)
|
|
205
205
|
|
|
206
206
|
*cdk.json*
|
|
207
207
|
|
|
@@ -394,7 +394,7 @@ When this featuer flag is enabled, remove the default deployment alarm settings
|
|
|
394
394
|
When enabled, IAM Policy created to run tasks won't include the task definition ARN, only the revision ARN.
|
|
395
395
|
|
|
396
396
|
When this feature flag is enabled, the IAM Policy created to run tasks won't include the task definition ARN, only the revision ARN.
|
|
397
|
-
The revision ARN is more specific than the task definition ARN. See https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html
|
|
397
|
+
The revision ARN is more specific than the task definition ARN. See [https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html](https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html)
|
|
398
398
|
for more details.
|
|
399
399
|
|
|
400
400
|
*cdk.json*
|
|
@@ -585,3 +585,24 @@ guarantee the correct execution of the feature in all platforms. See [Github dis
|
|
|
585
585
|
},
|
|
586
586
|
}
|
|
587
587
|
```
|
|
588
|
+
|
|
589
|
+
* `@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault`
|
|
590
|
+
|
|
591
|
+
When enabled, the default security group ingress rules will allow IPv6 ingress from anywhere,
|
|
592
|
+
For internet facing ALBs with `dualstack-without-public-ipv4` IP address type, the default security group rules
|
|
593
|
+
will allow IPv6 ingress from anywhere (::/0). Previously, the default security group rules would only allow IPv4 ingress.
|
|
594
|
+
|
|
595
|
+
Using a feature flag to make sure existing customers who might be relying
|
|
596
|
+
on the overly restrictive permissions are not broken.,
|
|
597
|
+
|
|
598
|
+
If the flag is set to false then the default security group rules will only allow IPv4 ingress.
|
|
599
|
+
|
|
600
|
+
*cdk.json*
|
|
601
|
+
|
|
602
|
+
```json
|
|
603
|
+
{
|
|
604
|
+
"context": {
|
|
605
|
+
"@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault": true
|
|
606
|
+
}
|
|
607
|
+
}
|
|
608
|
+
```
|
|
Binary file
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
{aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.176.0}/src/aws_cdk.cx_api.egg-info/dependency_links.txt
RENAMED
|
File without changes
|
|
File without changes
|
|
File without changes
|