aws-cdk.cx-api 2.175.0__tar.gz → 2.229.0__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk.cx-api might be problematic. Click here for more details.
- {aws_cdk_cx_api-2.175.0/src/aws_cdk.cx_api.egg-info → aws_cdk_cx_api-2.229.0}/PKG-INFO +270 -9
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.229.0}/README.md +266 -4
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.229.0}/pyproject.toml +2 -2
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.229.0}/setup.py +5 -6
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.229.0}/src/aws_cdk/cx_api/__init__.py +320 -34
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.229.0}/src/aws_cdk/cx_api/_jsii/__init__.py +1 -1
- aws_cdk_cx_api-2.229.0/src/aws_cdk/cx_api/_jsii/cx-api@2.229.0.jsii.tgz +0 -0
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.229.0/src/aws_cdk.cx_api.egg-info}/PKG-INFO +270 -9
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.229.0}/src/aws_cdk.cx_api.egg-info/SOURCES.txt +1 -1
- aws_cdk_cx_api-2.229.0/src/aws_cdk.cx_api.egg-info/requires.txt +4 -0
- aws_cdk_cx_api-2.175.0/src/aws_cdk/cx_api/_jsii/cx-api@2.175.0.jsii.tgz +0 -0
- aws_cdk_cx_api-2.175.0/src/aws_cdk.cx_api.egg-info/requires.txt +0 -4
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.229.0}/LICENSE +0 -0
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.229.0}/MANIFEST.in +0 -0
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.229.0}/NOTICE +0 -0
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.229.0}/setup.cfg +0 -0
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.229.0}/src/aws_cdk/cx_api/py.typed +0 -0
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.229.0}/src/aws_cdk.cx_api.egg-info/dependency_links.txt +0 -0
- {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.229.0}/src/aws_cdk.cx_api.egg-info/top_level.txt +0 -0
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.1
|
|
2
2
|
Name: aws-cdk.cx-api
|
|
3
|
-
Version: 2.
|
|
3
|
+
Version: 2.229.0
|
|
4
4
|
Summary: Cloud executable protocol
|
|
5
5
|
Home-page: https://github.com/aws/aws-cdk
|
|
6
6
|
Author: Amazon Web Services
|
|
@@ -10,7 +10,6 @@ Classifier: Intended Audience :: Developers
|
|
|
10
10
|
Classifier: Operating System :: OS Independent
|
|
11
11
|
Classifier: Programming Language :: JavaScript
|
|
12
12
|
Classifier: Programming Language :: Python :: 3 :: Only
|
|
13
|
-
Classifier: Programming Language :: Python :: 3.8
|
|
14
13
|
Classifier: Programming Language :: Python :: 3.9
|
|
15
14
|
Classifier: Programming Language :: Python :: 3.10
|
|
16
15
|
Classifier: Programming Language :: Python :: 3.11
|
|
@@ -19,12 +18,12 @@ Classifier: Development Status :: 5 - Production/Stable
|
|
|
19
18
|
Classifier: License :: OSI Approved
|
|
20
19
|
Classifier: Framework :: AWS CDK
|
|
21
20
|
Classifier: Framework :: AWS CDK :: 2
|
|
22
|
-
Requires-Python: ~=3.
|
|
21
|
+
Requires-Python: ~=3.9
|
|
23
22
|
Description-Content-Type: text/markdown
|
|
24
23
|
License-File: LICENSE
|
|
25
24
|
License-File: NOTICE
|
|
26
|
-
Requires-Dist: aws-cdk.cloud-assembly-schema
|
|
27
|
-
Requires-Dist: jsii<2.0.0,>=1.
|
|
25
|
+
Requires-Dist: aws-cdk.cloud-assembly-schema>=45.0.0
|
|
26
|
+
Requires-Dist: jsii<2.0.0,>=1.119.0
|
|
28
27
|
Requires-Dist: publication>=0.0.3
|
|
29
28
|
Requires-Dist: typeguard<4.3.0,>=2.13.3
|
|
30
29
|
|
|
@@ -48,7 +47,7 @@ and error indicating that a bucket policy already exists.
|
|
|
48
47
|
In cases where we know what the required policy is we can go ahead and create the policy so we can
|
|
49
48
|
remain in control of it.
|
|
50
49
|
|
|
51
|
-
https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3
|
|
50
|
+
[https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3](https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3)
|
|
52
51
|
|
|
53
52
|
*cdk.json*
|
|
54
53
|
|
|
@@ -151,7 +150,7 @@ enabled on the bucket.
|
|
|
151
150
|
This flag uses a Bucket Policy statement to allow Server Access Log delivery, following best
|
|
152
151
|
practices for S3.
|
|
153
152
|
|
|
154
|
-
https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html
|
|
153
|
+
[https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html](https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html)
|
|
155
154
|
|
|
156
155
|
```json
|
|
157
156
|
{
|
|
@@ -201,7 +200,7 @@ Enable this feature flag to use the `AmazonEMRServicePolicy_v2` managed policies
|
|
|
201
200
|
This is a feature flag as the old behavior will be deprecated, but some resources may require manual
|
|
202
201
|
intervention since they might not have the appropriate tags propagated automatically.
|
|
203
202
|
|
|
204
|
-
https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html
|
|
203
|
+
[https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html)
|
|
205
204
|
|
|
206
205
|
*cdk.json*
|
|
207
206
|
|
|
@@ -340,6 +339,20 @@ When this feature flag is enabled and calling KMS key grant method, the created
|
|
|
340
339
|
}
|
|
341
340
|
```
|
|
342
341
|
|
|
342
|
+
* `@aws-cdk/aws-kms:applyImportedAliasPermissionsToPrincipal`
|
|
343
|
+
|
|
344
|
+
Enable grant methods on imported KMS Aliases to apply permissions scoped by the alias using the `kms:ResourceAliases` condition key. When this flag is disabled, grant* methods on `Alias.fromAliasName` remain no-ops to preserve existing behavior.
|
|
345
|
+
|
|
346
|
+
*cdk.json*
|
|
347
|
+
|
|
348
|
+
```json
|
|
349
|
+
{
|
|
350
|
+
"context": {
|
|
351
|
+
"@aws-cdk/aws-kms:applyImportedAliasPermissionsToPrincipal": true
|
|
352
|
+
}
|
|
353
|
+
}
|
|
354
|
+
```
|
|
355
|
+
|
|
343
356
|
* `@aws-cdk/aws-eks:nodegroupNameAttribute`
|
|
344
357
|
|
|
345
358
|
When enabled, nodegroupName attribute of the provisioned EKS NodeGroup will not have the cluster name prefix.
|
|
@@ -394,7 +407,7 @@ When this featuer flag is enabled, remove the default deployment alarm settings
|
|
|
394
407
|
When enabled, IAM Policy created to run tasks won't include the task definition ARN, only the revision ARN.
|
|
395
408
|
|
|
396
409
|
When this feature flag is enabled, the IAM Policy created to run tasks won't include the task definition ARN, only the revision ARN.
|
|
397
|
-
The revision ARN is more specific than the task definition ARN. See https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html
|
|
410
|
+
The revision ARN is more specific than the task definition ARN. See [https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html](https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html)
|
|
398
411
|
for more details.
|
|
399
412
|
|
|
400
413
|
*cdk.json*
|
|
@@ -585,3 +598,251 @@ guarantee the correct execution of the feature in all platforms. See [Github dis
|
|
|
585
598
|
},
|
|
586
599
|
}
|
|
587
600
|
```
|
|
601
|
+
|
|
602
|
+
* `@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault`
|
|
603
|
+
|
|
604
|
+
When enabled, the default security group ingress rules will allow IPv6 ingress from anywhere,
|
|
605
|
+
For internet facing ALBs with `dualstack-without-public-ipv4` IP address type, the default security group rules
|
|
606
|
+
will allow IPv6 ingress from anywhere (::/0). Previously, the default security group rules would only allow IPv4 ingress.
|
|
607
|
+
|
|
608
|
+
Using a feature flag to make sure existing customers who might be relying
|
|
609
|
+
on the overly restrictive permissions are not broken.,
|
|
610
|
+
|
|
611
|
+
If the flag is set to false then the default security group rules will only allow IPv4 ingress.
|
|
612
|
+
|
|
613
|
+
*cdk.json*
|
|
614
|
+
|
|
615
|
+
```json
|
|
616
|
+
{
|
|
617
|
+
"context": {
|
|
618
|
+
"@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault": true
|
|
619
|
+
}
|
|
620
|
+
}
|
|
621
|
+
```
|
|
622
|
+
|
|
623
|
+
* `@aws-cdk/aws-iam:oidcRejectUnauthorizedConnections`
|
|
624
|
+
|
|
625
|
+
When this feature flag is enabled, the default behaviour of OIDC Provider's custom resource handler will
|
|
626
|
+
default to reject unauthorized connections when downloading CA Certificates.
|
|
627
|
+
|
|
628
|
+
When this feature flag is disabled, the behaviour will be the same as current and will allow downloading
|
|
629
|
+
thumbprints from unsecure connnections.
|
|
630
|
+
|
|
631
|
+
*cdk.json*
|
|
632
|
+
|
|
633
|
+
```json
|
|
634
|
+
{
|
|
635
|
+
"context": {
|
|
636
|
+
"@aws-cdk/aws-iam:oidcRejectUnauthorizedConnections": true
|
|
637
|
+
}
|
|
638
|
+
}
|
|
639
|
+
```
|
|
640
|
+
|
|
641
|
+
* `@aws-cdk/core:enableAdditionalMetadataCollection`
|
|
642
|
+
|
|
643
|
+
When this feature flag is enabled, CDK expands the scope of usage data collection to include the:
|
|
644
|
+
|
|
645
|
+
* L2 construct property keys - Collect which property keys you use from the L2 constructs in your app. This includes property keys nested in dictionary objects.
|
|
646
|
+
* L2 construct property values of BOOL and ENUM types - Collect property key values of only BOOL and ENUM types. All other types, such as string values or construct references will be redacted.
|
|
647
|
+
* L2 construct method usage - Collection method name, parameter keys and parameter values of BOOL and ENUM type.
|
|
648
|
+
|
|
649
|
+
*cdk.json*
|
|
650
|
+
|
|
651
|
+
```json
|
|
652
|
+
{
|
|
653
|
+
"context": {
|
|
654
|
+
"@aws-cdk/core:enableAdditionalMetadataCollection": true
|
|
655
|
+
}
|
|
656
|
+
}
|
|
657
|
+
```
|
|
658
|
+
|
|
659
|
+
* `@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy`
|
|
660
|
+
|
|
661
|
+
[Deprecated default feature] When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
|
|
662
|
+
The purpose of this is to prevent lambda from creating a dependency on the Default Policy Statement.
|
|
663
|
+
This solves an issue where a circular dependency could occur if adding lambda to something like a Cognito Trigger, then adding the User Pool to the lambda execution role permissions.
|
|
664
|
+
However in the current implementation, we have removed a dependency of the lambda function on the policy. In addition to this, a Role will be attached to the Policy instead of an inline policy being attached to the role.
|
|
665
|
+
This will create a data race condition in the CloudFormation template because the creation of the Lambda function no longer waits for the policy to be created. Having said that, we are not deprecating the feature (we are defaulting the feature flag to false for new stacks) since this feature can still be used to get around the circular dependency issue (issue-7016) particularly in cases where the lambda resource creation doesnt need to depend on the policy resource creation.
|
|
666
|
+
We recommend to unset the feature flag if already set which will restore the original behavior.
|
|
667
|
+
|
|
668
|
+
*cdk.json*
|
|
669
|
+
|
|
670
|
+
```json
|
|
671
|
+
{
|
|
672
|
+
"context": {
|
|
673
|
+
"@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": false
|
|
674
|
+
}
|
|
675
|
+
}
|
|
676
|
+
```
|
|
677
|
+
|
|
678
|
+
* `@aws-cdk/aws-s3:setUniqueReplicationRoleName`
|
|
679
|
+
|
|
680
|
+
When this feature flag is enabled, a unique role name is specified only when performing cross-account replication.
|
|
681
|
+
When disabled, 'CDKReplicationRole' is always specified.
|
|
682
|
+
|
|
683
|
+
*cdk.json*
|
|
684
|
+
|
|
685
|
+
```json
|
|
686
|
+
{
|
|
687
|
+
"context": {
|
|
688
|
+
"@aws-cdk/aws-s3:setUniqueReplicationRoleName": true
|
|
689
|
+
}
|
|
690
|
+
}
|
|
691
|
+
```
|
|
692
|
+
|
|
693
|
+
* `@aws-cdk/pipelines:reduceStageRoleTrustScope`
|
|
694
|
+
|
|
695
|
+
When this feature flag is enabled, the root account principal will not be added to the trust policy of stage role.
|
|
696
|
+
When this feature flag is disabled, it will keep the root account principal in the trust policy.
|
|
697
|
+
|
|
698
|
+
*cdk.json*
|
|
699
|
+
|
|
700
|
+
```json
|
|
701
|
+
{
|
|
702
|
+
"context": {
|
|
703
|
+
"@aws-cdk/pipelines:reduceStageRoleTrustScope": true
|
|
704
|
+
}
|
|
705
|
+
}
|
|
706
|
+
```
|
|
707
|
+
|
|
708
|
+
* `@aws-cdk/aws-events:requireEventBusPolicySid`
|
|
709
|
+
|
|
710
|
+
When this flag is enabled:
|
|
711
|
+
|
|
712
|
+
* Resource policies will be created with Statement IDs for service principals
|
|
713
|
+
* The operation will succeed as expected
|
|
714
|
+
|
|
715
|
+
When this flag is disabled:
|
|
716
|
+
|
|
717
|
+
* A warning will be emitted
|
|
718
|
+
* The grant operation will be dropped
|
|
719
|
+
* No permissions will be added
|
|
720
|
+
|
|
721
|
+
*cdk.json*
|
|
722
|
+
|
|
723
|
+
```json
|
|
724
|
+
{
|
|
725
|
+
"context": {
|
|
726
|
+
"@aws-cdk/aws-events:requireEventBusPolicySid": true
|
|
727
|
+
}
|
|
728
|
+
}
|
|
729
|
+
```
|
|
730
|
+
|
|
731
|
+
* `@aws-cdk/aws-dynamodb:retainTableReplica`
|
|
732
|
+
|
|
733
|
+
Currently, table replica will always be deleted when stack deletes regardless of source table's deletion policy.
|
|
734
|
+
When enabled, table replica will be default to the removal policy of source table unless specified otherwise.
|
|
735
|
+
|
|
736
|
+
*cdk.json*
|
|
737
|
+
|
|
738
|
+
```json
|
|
739
|
+
{
|
|
740
|
+
"context": {
|
|
741
|
+
"@aws-cdk/aws-dynamodb:retainTableReplica": true
|
|
742
|
+
}
|
|
743
|
+
}
|
|
744
|
+
```
|
|
745
|
+
|
|
746
|
+
* `@aws-cdk/cognito:logUserPoolClientSecretValue`
|
|
747
|
+
|
|
748
|
+
When this feature flag is enabled, the SDK API call response to desribe user pool client values will be logged in the custom
|
|
749
|
+
resource lambda function logs.
|
|
750
|
+
|
|
751
|
+
When this feature flag is disabled, the SDK API call response to describe user pool client values will not be logged in the custom
|
|
752
|
+
resource lambda function logs.
|
|
753
|
+
|
|
754
|
+
*cdk.json*
|
|
755
|
+
|
|
756
|
+
```json
|
|
757
|
+
{
|
|
758
|
+
"context": {
|
|
759
|
+
"@aws-cdk/cognito:logUserPoolClientSecretValue": true
|
|
760
|
+
}
|
|
761
|
+
}
|
|
762
|
+
```
|
|
763
|
+
|
|
764
|
+
* `@aws-cdk/aws-s3:publicAccessBlockedByDefault`
|
|
765
|
+
|
|
766
|
+
When BlockPublicAccess is not set at all, s3's default behavior will be to set all options to true in aws console.
|
|
767
|
+
The previous behavior in cdk before this feature was; if only some of the BlockPublicAccessOptions were set (not all 4), then the ones undefined would default to false.
|
|
768
|
+
This is counter intuitive to the console behavior where the options would start in true state and a user would uncheck the boxes as needed.
|
|
769
|
+
The new behavior from this feature will allow a user, for example, to set 1 of the 4 BlockPublicAccessOpsions to false, and on deployment the other 3 will remain true.
|
|
770
|
+
|
|
771
|
+
*cdk.json*
|
|
772
|
+
|
|
773
|
+
```json
|
|
774
|
+
{
|
|
775
|
+
"context": {
|
|
776
|
+
"@aws-cdk/aws-s3:publicAccessBlockedByDefault": true
|
|
777
|
+
}
|
|
778
|
+
}
|
|
779
|
+
```
|
|
780
|
+
|
|
781
|
+
* `@aws-cdk/aws-ec2:requirePrivateSubnetsForEgressOnlyInternetGateway`
|
|
782
|
+
|
|
783
|
+
When this feature flag is enabled, EgressOnlyGateway is created only for dual-stack VPC with private subnets
|
|
784
|
+
|
|
785
|
+
When this feature flag is disabled, EgressOnlyGateway resource is created for all dual-stack VPC regardless of subnet type
|
|
786
|
+
|
|
787
|
+
*cdk.json*
|
|
788
|
+
|
|
789
|
+
```json
|
|
790
|
+
{
|
|
791
|
+
"context": {
|
|
792
|
+
"@aws-cdk/aws-ec2:requirePrivateSubnetsForEgressOnlyInternetGateway": true
|
|
793
|
+
}
|
|
794
|
+
}
|
|
795
|
+
```
|
|
796
|
+
|
|
797
|
+
* `@aws-cdk/aws-stepfunctions-tasks:httpInvokeDynamicJsonPathEndpoint`
|
|
798
|
+
|
|
799
|
+
When this feature flag is enabled, the JSONPath apiEndpoint value will be resolved dynamically at runtime, while slightly increasing the size of the state machine definition.
|
|
800
|
+
When disabled, the JSONPath apiEndpoint property will only support a static string value.
|
|
801
|
+
|
|
802
|
+
_cdk.json
|
|
803
|
+
|
|
804
|
+
```json
|
|
805
|
+
{
|
|
806
|
+
"context": {
|
|
807
|
+
"@aws-cdk/aws-stepfunctions-tasks:httpInvokeDynamicJsonPathEndpoint": true
|
|
808
|
+
}
|
|
809
|
+
}
|
|
810
|
+
```
|
|
811
|
+
|
|
812
|
+
* `@aws-cdk/aws-signer:signingProfileNamePassedToCfn`
|
|
813
|
+
|
|
814
|
+
When this feature flag is enabled, the `signingProfileName` property is passed to the L1 `CfnSigningProfile` construct,
|
|
815
|
+
which ensures that the AWS Signer profile is created with the specified name.
|
|
816
|
+
|
|
817
|
+
When this feature flag is disabled, the `signingProfileName` is not passed to CloudFormation, maintaining backward
|
|
818
|
+
compatibility with existing deployments where CloudFormation auto-generated profile names.
|
|
819
|
+
|
|
820
|
+
This feature flag is needed because enabling it can cause existing signing profiles to be
|
|
821
|
+
replaced during deployment if a `signingProfileName` was specified but not previously used
|
|
822
|
+
in the CloudFormation template.
|
|
823
|
+
|
|
824
|
+
*cdk.json*
|
|
825
|
+
|
|
826
|
+
```json
|
|
827
|
+
{
|
|
828
|
+
"context": {
|
|
829
|
+
"@aws-cdk/aws-signer:signingProfileNamePassedToCfn": true
|
|
830
|
+
}
|
|
831
|
+
}
|
|
832
|
+
```
|
|
833
|
+
|
|
834
|
+
* `@aws-cdk/aws-ecs-patterns:uniqueTargetGroupId`
|
|
835
|
+
|
|
836
|
+
When enabled, ECS patterns will generate unique target group IDs that include the load balancer name and type (public/private). This prevents CloudFormation conflicts when switching between public and private load balancers.
|
|
837
|
+
|
|
838
|
+
Without this flag, switching an ApplicationLoadBalancedFargateService from public to private (or vice versa) fails with "target group cannot be associated with more than one load balancer" error.
|
|
839
|
+
|
|
840
|
+
*cdk.json*
|
|
841
|
+
|
|
842
|
+
```json
|
|
843
|
+
{
|
|
844
|
+
"context": {
|
|
845
|
+
"@aws-cdk/aws-ecs-patterns:uniqueTargetGroupId": true
|
|
846
|
+
}
|
|
847
|
+
}
|
|
848
|
+
```
|
|
@@ -18,7 +18,7 @@ and error indicating that a bucket policy already exists.
|
|
|
18
18
|
In cases where we know what the required policy is we can go ahead and create the policy so we can
|
|
19
19
|
remain in control of it.
|
|
20
20
|
|
|
21
|
-
https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3
|
|
21
|
+
[https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3](https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3)
|
|
22
22
|
|
|
23
23
|
*cdk.json*
|
|
24
24
|
|
|
@@ -121,7 +121,7 @@ enabled on the bucket.
|
|
|
121
121
|
This flag uses a Bucket Policy statement to allow Server Access Log delivery, following best
|
|
122
122
|
practices for S3.
|
|
123
123
|
|
|
124
|
-
https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html
|
|
124
|
+
[https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html](https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html)
|
|
125
125
|
|
|
126
126
|
```json
|
|
127
127
|
{
|
|
@@ -171,7 +171,7 @@ Enable this feature flag to use the `AmazonEMRServicePolicy_v2` managed policies
|
|
|
171
171
|
This is a feature flag as the old behavior will be deprecated, but some resources may require manual
|
|
172
172
|
intervention since they might not have the appropriate tags propagated automatically.
|
|
173
173
|
|
|
174
|
-
https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html
|
|
174
|
+
[https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html)
|
|
175
175
|
|
|
176
176
|
*cdk.json*
|
|
177
177
|
|
|
@@ -310,6 +310,20 @@ When this feature flag is enabled and calling KMS key grant method, the created
|
|
|
310
310
|
}
|
|
311
311
|
```
|
|
312
312
|
|
|
313
|
+
* `@aws-cdk/aws-kms:applyImportedAliasPermissionsToPrincipal`
|
|
314
|
+
|
|
315
|
+
Enable grant methods on imported KMS Aliases to apply permissions scoped by the alias using the `kms:ResourceAliases` condition key. When this flag is disabled, grant* methods on `Alias.fromAliasName` remain no-ops to preserve existing behavior.
|
|
316
|
+
|
|
317
|
+
*cdk.json*
|
|
318
|
+
|
|
319
|
+
```json
|
|
320
|
+
{
|
|
321
|
+
"context": {
|
|
322
|
+
"@aws-cdk/aws-kms:applyImportedAliasPermissionsToPrincipal": true
|
|
323
|
+
}
|
|
324
|
+
}
|
|
325
|
+
```
|
|
326
|
+
|
|
313
327
|
* `@aws-cdk/aws-eks:nodegroupNameAttribute`
|
|
314
328
|
|
|
315
329
|
When enabled, nodegroupName attribute of the provisioned EKS NodeGroup will not have the cluster name prefix.
|
|
@@ -364,7 +378,7 @@ When this featuer flag is enabled, remove the default deployment alarm settings
|
|
|
364
378
|
When enabled, IAM Policy created to run tasks won't include the task definition ARN, only the revision ARN.
|
|
365
379
|
|
|
366
380
|
When this feature flag is enabled, the IAM Policy created to run tasks won't include the task definition ARN, only the revision ARN.
|
|
367
|
-
The revision ARN is more specific than the task definition ARN. See https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html
|
|
381
|
+
The revision ARN is more specific than the task definition ARN. See [https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html](https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html)
|
|
368
382
|
for more details.
|
|
369
383
|
|
|
370
384
|
*cdk.json*
|
|
@@ -555,3 +569,251 @@ guarantee the correct execution of the feature in all platforms. See [Github dis
|
|
|
555
569
|
},
|
|
556
570
|
}
|
|
557
571
|
```
|
|
572
|
+
|
|
573
|
+
* `@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault`
|
|
574
|
+
|
|
575
|
+
When enabled, the default security group ingress rules will allow IPv6 ingress from anywhere,
|
|
576
|
+
For internet facing ALBs with `dualstack-without-public-ipv4` IP address type, the default security group rules
|
|
577
|
+
will allow IPv6 ingress from anywhere (::/0). Previously, the default security group rules would only allow IPv4 ingress.
|
|
578
|
+
|
|
579
|
+
Using a feature flag to make sure existing customers who might be relying
|
|
580
|
+
on the overly restrictive permissions are not broken.,
|
|
581
|
+
|
|
582
|
+
If the flag is set to false then the default security group rules will only allow IPv4 ingress.
|
|
583
|
+
|
|
584
|
+
*cdk.json*
|
|
585
|
+
|
|
586
|
+
```json
|
|
587
|
+
{
|
|
588
|
+
"context": {
|
|
589
|
+
"@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault": true
|
|
590
|
+
}
|
|
591
|
+
}
|
|
592
|
+
```
|
|
593
|
+
|
|
594
|
+
* `@aws-cdk/aws-iam:oidcRejectUnauthorizedConnections`
|
|
595
|
+
|
|
596
|
+
When this feature flag is enabled, the default behaviour of OIDC Provider's custom resource handler will
|
|
597
|
+
default to reject unauthorized connections when downloading CA Certificates.
|
|
598
|
+
|
|
599
|
+
When this feature flag is disabled, the behaviour will be the same as current and will allow downloading
|
|
600
|
+
thumbprints from unsecure connnections.
|
|
601
|
+
|
|
602
|
+
*cdk.json*
|
|
603
|
+
|
|
604
|
+
```json
|
|
605
|
+
{
|
|
606
|
+
"context": {
|
|
607
|
+
"@aws-cdk/aws-iam:oidcRejectUnauthorizedConnections": true
|
|
608
|
+
}
|
|
609
|
+
}
|
|
610
|
+
```
|
|
611
|
+
|
|
612
|
+
* `@aws-cdk/core:enableAdditionalMetadataCollection`
|
|
613
|
+
|
|
614
|
+
When this feature flag is enabled, CDK expands the scope of usage data collection to include the:
|
|
615
|
+
|
|
616
|
+
* L2 construct property keys - Collect which property keys you use from the L2 constructs in your app. This includes property keys nested in dictionary objects.
|
|
617
|
+
* L2 construct property values of BOOL and ENUM types - Collect property key values of only BOOL and ENUM types. All other types, such as string values or construct references will be redacted.
|
|
618
|
+
* L2 construct method usage - Collection method name, parameter keys and parameter values of BOOL and ENUM type.
|
|
619
|
+
|
|
620
|
+
*cdk.json*
|
|
621
|
+
|
|
622
|
+
```json
|
|
623
|
+
{
|
|
624
|
+
"context": {
|
|
625
|
+
"@aws-cdk/core:enableAdditionalMetadataCollection": true
|
|
626
|
+
}
|
|
627
|
+
}
|
|
628
|
+
```
|
|
629
|
+
|
|
630
|
+
* `@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy`
|
|
631
|
+
|
|
632
|
+
[Deprecated default feature] When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
|
|
633
|
+
The purpose of this is to prevent lambda from creating a dependency on the Default Policy Statement.
|
|
634
|
+
This solves an issue where a circular dependency could occur if adding lambda to something like a Cognito Trigger, then adding the User Pool to the lambda execution role permissions.
|
|
635
|
+
However in the current implementation, we have removed a dependency of the lambda function on the policy. In addition to this, a Role will be attached to the Policy instead of an inline policy being attached to the role.
|
|
636
|
+
This will create a data race condition in the CloudFormation template because the creation of the Lambda function no longer waits for the policy to be created. Having said that, we are not deprecating the feature (we are defaulting the feature flag to false for new stacks) since this feature can still be used to get around the circular dependency issue (issue-7016) particularly in cases where the lambda resource creation doesnt need to depend on the policy resource creation.
|
|
637
|
+
We recommend to unset the feature flag if already set which will restore the original behavior.
|
|
638
|
+
|
|
639
|
+
*cdk.json*
|
|
640
|
+
|
|
641
|
+
```json
|
|
642
|
+
{
|
|
643
|
+
"context": {
|
|
644
|
+
"@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": false
|
|
645
|
+
}
|
|
646
|
+
}
|
|
647
|
+
```
|
|
648
|
+
|
|
649
|
+
* `@aws-cdk/aws-s3:setUniqueReplicationRoleName`
|
|
650
|
+
|
|
651
|
+
When this feature flag is enabled, a unique role name is specified only when performing cross-account replication.
|
|
652
|
+
When disabled, 'CDKReplicationRole' is always specified.
|
|
653
|
+
|
|
654
|
+
*cdk.json*
|
|
655
|
+
|
|
656
|
+
```json
|
|
657
|
+
{
|
|
658
|
+
"context": {
|
|
659
|
+
"@aws-cdk/aws-s3:setUniqueReplicationRoleName": true
|
|
660
|
+
}
|
|
661
|
+
}
|
|
662
|
+
```
|
|
663
|
+
|
|
664
|
+
* `@aws-cdk/pipelines:reduceStageRoleTrustScope`
|
|
665
|
+
|
|
666
|
+
When this feature flag is enabled, the root account principal will not be added to the trust policy of stage role.
|
|
667
|
+
When this feature flag is disabled, it will keep the root account principal in the trust policy.
|
|
668
|
+
|
|
669
|
+
*cdk.json*
|
|
670
|
+
|
|
671
|
+
```json
|
|
672
|
+
{
|
|
673
|
+
"context": {
|
|
674
|
+
"@aws-cdk/pipelines:reduceStageRoleTrustScope": true
|
|
675
|
+
}
|
|
676
|
+
}
|
|
677
|
+
```
|
|
678
|
+
|
|
679
|
+
* `@aws-cdk/aws-events:requireEventBusPolicySid`
|
|
680
|
+
|
|
681
|
+
When this flag is enabled:
|
|
682
|
+
|
|
683
|
+
* Resource policies will be created with Statement IDs for service principals
|
|
684
|
+
* The operation will succeed as expected
|
|
685
|
+
|
|
686
|
+
When this flag is disabled:
|
|
687
|
+
|
|
688
|
+
* A warning will be emitted
|
|
689
|
+
* The grant operation will be dropped
|
|
690
|
+
* No permissions will be added
|
|
691
|
+
|
|
692
|
+
*cdk.json*
|
|
693
|
+
|
|
694
|
+
```json
|
|
695
|
+
{
|
|
696
|
+
"context": {
|
|
697
|
+
"@aws-cdk/aws-events:requireEventBusPolicySid": true
|
|
698
|
+
}
|
|
699
|
+
}
|
|
700
|
+
```
|
|
701
|
+
|
|
702
|
+
* `@aws-cdk/aws-dynamodb:retainTableReplica`
|
|
703
|
+
|
|
704
|
+
Currently, table replica will always be deleted when stack deletes regardless of source table's deletion policy.
|
|
705
|
+
When enabled, table replica will be default to the removal policy of source table unless specified otherwise.
|
|
706
|
+
|
|
707
|
+
*cdk.json*
|
|
708
|
+
|
|
709
|
+
```json
|
|
710
|
+
{
|
|
711
|
+
"context": {
|
|
712
|
+
"@aws-cdk/aws-dynamodb:retainTableReplica": true
|
|
713
|
+
}
|
|
714
|
+
}
|
|
715
|
+
```
|
|
716
|
+
|
|
717
|
+
* `@aws-cdk/cognito:logUserPoolClientSecretValue`
|
|
718
|
+
|
|
719
|
+
When this feature flag is enabled, the SDK API call response to desribe user pool client values will be logged in the custom
|
|
720
|
+
resource lambda function logs.
|
|
721
|
+
|
|
722
|
+
When this feature flag is disabled, the SDK API call response to describe user pool client values will not be logged in the custom
|
|
723
|
+
resource lambda function logs.
|
|
724
|
+
|
|
725
|
+
*cdk.json*
|
|
726
|
+
|
|
727
|
+
```json
|
|
728
|
+
{
|
|
729
|
+
"context": {
|
|
730
|
+
"@aws-cdk/cognito:logUserPoolClientSecretValue": true
|
|
731
|
+
}
|
|
732
|
+
}
|
|
733
|
+
```
|
|
734
|
+
|
|
735
|
+
* `@aws-cdk/aws-s3:publicAccessBlockedByDefault`
|
|
736
|
+
|
|
737
|
+
When BlockPublicAccess is not set at all, s3's default behavior will be to set all options to true in aws console.
|
|
738
|
+
The previous behavior in cdk before this feature was; if only some of the BlockPublicAccessOptions were set (not all 4), then the ones undefined would default to false.
|
|
739
|
+
This is counter intuitive to the console behavior where the options would start in true state and a user would uncheck the boxes as needed.
|
|
740
|
+
The new behavior from this feature will allow a user, for example, to set 1 of the 4 BlockPublicAccessOpsions to false, and on deployment the other 3 will remain true.
|
|
741
|
+
|
|
742
|
+
*cdk.json*
|
|
743
|
+
|
|
744
|
+
```json
|
|
745
|
+
{
|
|
746
|
+
"context": {
|
|
747
|
+
"@aws-cdk/aws-s3:publicAccessBlockedByDefault": true
|
|
748
|
+
}
|
|
749
|
+
}
|
|
750
|
+
```
|
|
751
|
+
|
|
752
|
+
* `@aws-cdk/aws-ec2:requirePrivateSubnetsForEgressOnlyInternetGateway`
|
|
753
|
+
|
|
754
|
+
When this feature flag is enabled, EgressOnlyGateway is created only for dual-stack VPC with private subnets
|
|
755
|
+
|
|
756
|
+
When this feature flag is disabled, EgressOnlyGateway resource is created for all dual-stack VPC regardless of subnet type
|
|
757
|
+
|
|
758
|
+
*cdk.json*
|
|
759
|
+
|
|
760
|
+
```json
|
|
761
|
+
{
|
|
762
|
+
"context": {
|
|
763
|
+
"@aws-cdk/aws-ec2:requirePrivateSubnetsForEgressOnlyInternetGateway": true
|
|
764
|
+
}
|
|
765
|
+
}
|
|
766
|
+
```
|
|
767
|
+
|
|
768
|
+
* `@aws-cdk/aws-stepfunctions-tasks:httpInvokeDynamicJsonPathEndpoint`
|
|
769
|
+
|
|
770
|
+
When this feature flag is enabled, the JSONPath apiEndpoint value will be resolved dynamically at runtime, while slightly increasing the size of the state machine definition.
|
|
771
|
+
When disabled, the JSONPath apiEndpoint property will only support a static string value.
|
|
772
|
+
|
|
773
|
+
_cdk.json
|
|
774
|
+
|
|
775
|
+
```json
|
|
776
|
+
{
|
|
777
|
+
"context": {
|
|
778
|
+
"@aws-cdk/aws-stepfunctions-tasks:httpInvokeDynamicJsonPathEndpoint": true
|
|
779
|
+
}
|
|
780
|
+
}
|
|
781
|
+
```
|
|
782
|
+
|
|
783
|
+
* `@aws-cdk/aws-signer:signingProfileNamePassedToCfn`
|
|
784
|
+
|
|
785
|
+
When this feature flag is enabled, the `signingProfileName` property is passed to the L1 `CfnSigningProfile` construct,
|
|
786
|
+
which ensures that the AWS Signer profile is created with the specified name.
|
|
787
|
+
|
|
788
|
+
When this feature flag is disabled, the `signingProfileName` is not passed to CloudFormation, maintaining backward
|
|
789
|
+
compatibility with existing deployments where CloudFormation auto-generated profile names.
|
|
790
|
+
|
|
791
|
+
This feature flag is needed because enabling it can cause existing signing profiles to be
|
|
792
|
+
replaced during deployment if a `signingProfileName` was specified but not previously used
|
|
793
|
+
in the CloudFormation template.
|
|
794
|
+
|
|
795
|
+
*cdk.json*
|
|
796
|
+
|
|
797
|
+
```json
|
|
798
|
+
{
|
|
799
|
+
"context": {
|
|
800
|
+
"@aws-cdk/aws-signer:signingProfileNamePassedToCfn": true
|
|
801
|
+
}
|
|
802
|
+
}
|
|
803
|
+
```
|
|
804
|
+
|
|
805
|
+
* `@aws-cdk/aws-ecs-patterns:uniqueTargetGroupId`
|
|
806
|
+
|
|
807
|
+
When enabled, ECS patterns will generate unique target group IDs that include the load balancer name and type (public/private). This prevents CloudFormation conflicts when switching between public and private load balancers.
|
|
808
|
+
|
|
809
|
+
Without this flag, switching an ApplicationLoadBalancedFargateService from public to private (or vice versa) fails with "target group cannot be associated with more than one load balancer" error.
|
|
810
|
+
|
|
811
|
+
*cdk.json*
|
|
812
|
+
|
|
813
|
+
```json
|
|
814
|
+
{
|
|
815
|
+
"context": {
|
|
816
|
+
"@aws-cdk/aws-ecs-patterns:uniqueTargetGroupId": true
|
|
817
|
+
}
|
|
818
|
+
}
|
|
819
|
+
```
|
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
[build-system]
|
|
2
|
-
requires = ["setuptools~=
|
|
2
|
+
requires = ["setuptools~=75.3.2", "build~=1.3.0"]
|
|
3
3
|
build-backend = "setuptools.build_meta"
|
|
4
4
|
|
|
5
5
|
[tool.pyright]
|
|
6
6
|
defineConstant = { DEBUG = true }
|
|
7
|
-
pythonVersion = "3.
|
|
7
|
+
pythonVersion = "3.9"
|
|
8
8
|
pythonPlatform = "All"
|
|
9
9
|
reportSelfClsParameterName = false
|
|
@@ -5,7 +5,7 @@ kwargs = json.loads(
|
|
|
5
5
|
"""
|
|
6
6
|
{
|
|
7
7
|
"name": "aws-cdk.cx-api",
|
|
8
|
-
"version": "2.
|
|
8
|
+
"version": "2.229.0",
|
|
9
9
|
"description": "Cloud executable protocol",
|
|
10
10
|
"license": "Apache-2.0",
|
|
11
11
|
"url": "https://github.com/aws/aws-cdk",
|
|
@@ -26,16 +26,16 @@ kwargs = json.loads(
|
|
|
26
26
|
],
|
|
27
27
|
"package_data": {
|
|
28
28
|
"aws_cdk.cx_api._jsii": [
|
|
29
|
-
"cx-api@2.
|
|
29
|
+
"cx-api@2.229.0.jsii.tgz"
|
|
30
30
|
],
|
|
31
31
|
"aws_cdk.cx_api": [
|
|
32
32
|
"py.typed"
|
|
33
33
|
]
|
|
34
34
|
},
|
|
35
|
-
"python_requires": "~=3.
|
|
35
|
+
"python_requires": "~=3.9",
|
|
36
36
|
"install_requires": [
|
|
37
|
-
"aws-cdk.cloud-assembly-schema>=
|
|
38
|
-
"jsii>=1.
|
|
37
|
+
"aws-cdk.cloud-assembly-schema>=45.0.0",
|
|
38
|
+
"jsii>=1.119.0, <2.0.0",
|
|
39
39
|
"publication>=0.0.3",
|
|
40
40
|
"typeguard>=2.13.3,<4.3.0"
|
|
41
41
|
],
|
|
@@ -44,7 +44,6 @@ kwargs = json.loads(
|
|
|
44
44
|
"Operating System :: OS Independent",
|
|
45
45
|
"Programming Language :: JavaScript",
|
|
46
46
|
"Programming Language :: Python :: 3 :: Only",
|
|
47
|
-
"Programming Language :: Python :: 3.8",
|
|
48
47
|
"Programming Language :: Python :: 3.9",
|
|
49
48
|
"Programming Language :: Python :: 3.10",
|
|
50
49
|
"Programming Language :: Python :: 3.11",
|