aws-cdk.cx-api 2.175.0__tar.gz → 2.229.0__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk.cx-api might be problematic. Click here for more details.

Files changed (19) hide show
  1. {aws_cdk_cx_api-2.175.0/src/aws_cdk.cx_api.egg-info → aws_cdk_cx_api-2.229.0}/PKG-INFO +270 -9
  2. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.229.0}/README.md +266 -4
  3. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.229.0}/pyproject.toml +2 -2
  4. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.229.0}/setup.py +5 -6
  5. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.229.0}/src/aws_cdk/cx_api/__init__.py +320 -34
  6. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.229.0}/src/aws_cdk/cx_api/_jsii/__init__.py +1 -1
  7. aws_cdk_cx_api-2.229.0/src/aws_cdk/cx_api/_jsii/cx-api@2.229.0.jsii.tgz +0 -0
  8. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.229.0/src/aws_cdk.cx_api.egg-info}/PKG-INFO +270 -9
  9. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.229.0}/src/aws_cdk.cx_api.egg-info/SOURCES.txt +1 -1
  10. aws_cdk_cx_api-2.229.0/src/aws_cdk.cx_api.egg-info/requires.txt +4 -0
  11. aws_cdk_cx_api-2.175.0/src/aws_cdk/cx_api/_jsii/cx-api@2.175.0.jsii.tgz +0 -0
  12. aws_cdk_cx_api-2.175.0/src/aws_cdk.cx_api.egg-info/requires.txt +0 -4
  13. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.229.0}/LICENSE +0 -0
  14. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.229.0}/MANIFEST.in +0 -0
  15. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.229.0}/NOTICE +0 -0
  16. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.229.0}/setup.cfg +0 -0
  17. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.229.0}/src/aws_cdk/cx_api/py.typed +0 -0
  18. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.229.0}/src/aws_cdk.cx_api.egg-info/dependency_links.txt +0 -0
  19. {aws_cdk_cx_api-2.175.0 → aws_cdk_cx_api-2.229.0}/src/aws_cdk.cx_api.egg-info/top_level.txt +0 -0
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: aws-cdk.cx-api
3
- Version: 2.175.0
3
+ Version: 2.229.0
4
4
  Summary: Cloud executable protocol
5
5
  Home-page: https://github.com/aws/aws-cdk
6
6
  Author: Amazon Web Services
@@ -10,7 +10,6 @@ Classifier: Intended Audience :: Developers
10
10
  Classifier: Operating System :: OS Independent
11
11
  Classifier: Programming Language :: JavaScript
12
12
  Classifier: Programming Language :: Python :: 3 :: Only
13
- Classifier: Programming Language :: Python :: 3.8
14
13
  Classifier: Programming Language :: Python :: 3.9
15
14
  Classifier: Programming Language :: Python :: 3.10
16
15
  Classifier: Programming Language :: Python :: 3.11
@@ -19,12 +18,12 @@ Classifier: Development Status :: 5 - Production/Stable
19
18
  Classifier: License :: OSI Approved
20
19
  Classifier: Framework :: AWS CDK
21
20
  Classifier: Framework :: AWS CDK :: 2
22
- Requires-Python: ~=3.8
21
+ Requires-Python: ~=3.9
23
22
  Description-Content-Type: text/markdown
24
23
  License-File: LICENSE
25
24
  License-File: NOTICE
26
- Requires-Dist: aws-cdk.cloud-assembly-schema<40.0.0,>=39.0.0
27
- Requires-Dist: jsii<2.0.0,>=1.104.0
25
+ Requires-Dist: aws-cdk.cloud-assembly-schema>=45.0.0
26
+ Requires-Dist: jsii<2.0.0,>=1.119.0
28
27
  Requires-Dist: publication>=0.0.3
29
28
  Requires-Dist: typeguard<4.3.0,>=2.13.3
30
29
 
@@ -48,7 +47,7 @@ and error indicating that a bucket policy already exists.
48
47
  In cases where we know what the required policy is we can go ahead and create the policy so we can
49
48
  remain in control of it.
50
49
 
51
- https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3
50
+ [https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3](https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3)
52
51
 
53
52
  *cdk.json*
54
53
 
@@ -151,7 +150,7 @@ enabled on the bucket.
151
150
  This flag uses a Bucket Policy statement to allow Server Access Log delivery, following best
152
151
  practices for S3.
153
152
 
154
- https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html
153
+ [https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html](https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html)
155
154
 
156
155
  ```json
157
156
  {
@@ -201,7 +200,7 @@ Enable this feature flag to use the `AmazonEMRServicePolicy_v2` managed policies
201
200
  This is a feature flag as the old behavior will be deprecated, but some resources may require manual
202
201
  intervention since they might not have the appropriate tags propagated automatically.
203
202
 
204
- https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html
203
+ [https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html)
205
204
 
206
205
  *cdk.json*
207
206
 
@@ -340,6 +339,20 @@ When this feature flag is enabled and calling KMS key grant method, the created
340
339
  }
341
340
  ```
342
341
 
342
+ * `@aws-cdk/aws-kms:applyImportedAliasPermissionsToPrincipal`
343
+
344
+ Enable grant methods on imported KMS Aliases to apply permissions scoped by the alias using the `kms:ResourceAliases` condition key. When this flag is disabled, grant* methods on `Alias.fromAliasName` remain no-ops to preserve existing behavior.
345
+
346
+ *cdk.json*
347
+
348
+ ```json
349
+ {
350
+ "context": {
351
+ "@aws-cdk/aws-kms:applyImportedAliasPermissionsToPrincipal": true
352
+ }
353
+ }
354
+ ```
355
+
343
356
  * `@aws-cdk/aws-eks:nodegroupNameAttribute`
344
357
 
345
358
  When enabled, nodegroupName attribute of the provisioned EKS NodeGroup will not have the cluster name prefix.
@@ -394,7 +407,7 @@ When this featuer flag is enabled, remove the default deployment alarm settings
394
407
  When enabled, IAM Policy created to run tasks won't include the task definition ARN, only the revision ARN.
395
408
 
396
409
  When this feature flag is enabled, the IAM Policy created to run tasks won't include the task definition ARN, only the revision ARN.
397
- The revision ARN is more specific than the task definition ARN. See https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html
410
+ The revision ARN is more specific than the task definition ARN. See [https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html](https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html)
398
411
  for more details.
399
412
 
400
413
  *cdk.json*
@@ -585,3 +598,251 @@ guarantee the correct execution of the feature in all platforms. See [Github dis
585
598
  },
586
599
  }
587
600
  ```
601
+
602
+ * `@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault`
603
+
604
+ When enabled, the default security group ingress rules will allow IPv6 ingress from anywhere,
605
+ For internet facing ALBs with `dualstack-without-public-ipv4` IP address type, the default security group rules
606
+ will allow IPv6 ingress from anywhere (::/0). Previously, the default security group rules would only allow IPv4 ingress.
607
+
608
+ Using a feature flag to make sure existing customers who might be relying
609
+ on the overly restrictive permissions are not broken.,
610
+
611
+ If the flag is set to false then the default security group rules will only allow IPv4 ingress.
612
+
613
+ *cdk.json*
614
+
615
+ ```json
616
+ {
617
+ "context": {
618
+ "@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault": true
619
+ }
620
+ }
621
+ ```
622
+
623
+ * `@aws-cdk/aws-iam:oidcRejectUnauthorizedConnections`
624
+
625
+ When this feature flag is enabled, the default behaviour of OIDC Provider's custom resource handler will
626
+ default to reject unauthorized connections when downloading CA Certificates.
627
+
628
+ When this feature flag is disabled, the behaviour will be the same as current and will allow downloading
629
+ thumbprints from unsecure connnections.
630
+
631
+ *cdk.json*
632
+
633
+ ```json
634
+ {
635
+ "context": {
636
+ "@aws-cdk/aws-iam:oidcRejectUnauthorizedConnections": true
637
+ }
638
+ }
639
+ ```
640
+
641
+ * `@aws-cdk/core:enableAdditionalMetadataCollection`
642
+
643
+ When this feature flag is enabled, CDK expands the scope of usage data collection to include the:
644
+
645
+ * L2 construct property keys - Collect which property keys you use from the L2 constructs in your app. This includes property keys nested in dictionary objects.
646
+ * L2 construct property values of BOOL and ENUM types - Collect property key values of only BOOL and ENUM types. All other types, such as string values or construct references will be redacted.
647
+ * L2 construct method usage - Collection method name, parameter keys and parameter values of BOOL and ENUM type.
648
+
649
+ *cdk.json*
650
+
651
+ ```json
652
+ {
653
+ "context": {
654
+ "@aws-cdk/core:enableAdditionalMetadataCollection": true
655
+ }
656
+ }
657
+ ```
658
+
659
+ * `@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy`
660
+
661
+ [Deprecated default feature] When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
662
+ The purpose of this is to prevent lambda from creating a dependency on the Default Policy Statement.
663
+ This solves an issue where a circular dependency could occur if adding lambda to something like a Cognito Trigger, then adding the User Pool to the lambda execution role permissions.
664
+ However in the current implementation, we have removed a dependency of the lambda function on the policy. In addition to this, a Role will be attached to the Policy instead of an inline policy being attached to the role.
665
+ This will create a data race condition in the CloudFormation template because the creation of the Lambda function no longer waits for the policy to be created. Having said that, we are not deprecating the feature (we are defaulting the feature flag to false for new stacks) since this feature can still be used to get around the circular dependency issue (issue-7016) particularly in cases where the lambda resource creation doesnt need to depend on the policy resource creation.
666
+ We recommend to unset the feature flag if already set which will restore the original behavior.
667
+
668
+ *cdk.json*
669
+
670
+ ```json
671
+ {
672
+ "context": {
673
+ "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": false
674
+ }
675
+ }
676
+ ```
677
+
678
+ * `@aws-cdk/aws-s3:setUniqueReplicationRoleName`
679
+
680
+ When this feature flag is enabled, a unique role name is specified only when performing cross-account replication.
681
+ When disabled, 'CDKReplicationRole' is always specified.
682
+
683
+ *cdk.json*
684
+
685
+ ```json
686
+ {
687
+ "context": {
688
+ "@aws-cdk/aws-s3:setUniqueReplicationRoleName": true
689
+ }
690
+ }
691
+ ```
692
+
693
+ * `@aws-cdk/pipelines:reduceStageRoleTrustScope`
694
+
695
+ When this feature flag is enabled, the root account principal will not be added to the trust policy of stage role.
696
+ When this feature flag is disabled, it will keep the root account principal in the trust policy.
697
+
698
+ *cdk.json*
699
+
700
+ ```json
701
+ {
702
+ "context": {
703
+ "@aws-cdk/pipelines:reduceStageRoleTrustScope": true
704
+ }
705
+ }
706
+ ```
707
+
708
+ * `@aws-cdk/aws-events:requireEventBusPolicySid`
709
+
710
+ When this flag is enabled:
711
+
712
+ * Resource policies will be created with Statement IDs for service principals
713
+ * The operation will succeed as expected
714
+
715
+ When this flag is disabled:
716
+
717
+ * A warning will be emitted
718
+ * The grant operation will be dropped
719
+ * No permissions will be added
720
+
721
+ *cdk.json*
722
+
723
+ ```json
724
+ {
725
+ "context": {
726
+ "@aws-cdk/aws-events:requireEventBusPolicySid": true
727
+ }
728
+ }
729
+ ```
730
+
731
+ * `@aws-cdk/aws-dynamodb:retainTableReplica`
732
+
733
+ Currently, table replica will always be deleted when stack deletes regardless of source table's deletion policy.
734
+ When enabled, table replica will be default to the removal policy of source table unless specified otherwise.
735
+
736
+ *cdk.json*
737
+
738
+ ```json
739
+ {
740
+ "context": {
741
+ "@aws-cdk/aws-dynamodb:retainTableReplica": true
742
+ }
743
+ }
744
+ ```
745
+
746
+ * `@aws-cdk/cognito:logUserPoolClientSecretValue`
747
+
748
+ When this feature flag is enabled, the SDK API call response to desribe user pool client values will be logged in the custom
749
+ resource lambda function logs.
750
+
751
+ When this feature flag is disabled, the SDK API call response to describe user pool client values will not be logged in the custom
752
+ resource lambda function logs.
753
+
754
+ *cdk.json*
755
+
756
+ ```json
757
+ {
758
+ "context": {
759
+ "@aws-cdk/cognito:logUserPoolClientSecretValue": true
760
+ }
761
+ }
762
+ ```
763
+
764
+ * `@aws-cdk/aws-s3:publicAccessBlockedByDefault`
765
+
766
+ When BlockPublicAccess is not set at all, s3's default behavior will be to set all options to true in aws console.
767
+ The previous behavior in cdk before this feature was; if only some of the BlockPublicAccessOptions were set (not all 4), then the ones undefined would default to false.
768
+ This is counter intuitive to the console behavior where the options would start in true state and a user would uncheck the boxes as needed.
769
+ The new behavior from this feature will allow a user, for example, to set 1 of the 4 BlockPublicAccessOpsions to false, and on deployment the other 3 will remain true.
770
+
771
+ *cdk.json*
772
+
773
+ ```json
774
+ {
775
+ "context": {
776
+ "@aws-cdk/aws-s3:publicAccessBlockedByDefault": true
777
+ }
778
+ }
779
+ ```
780
+
781
+ * `@aws-cdk/aws-ec2:requirePrivateSubnetsForEgressOnlyInternetGateway`
782
+
783
+ When this feature flag is enabled, EgressOnlyGateway is created only for dual-stack VPC with private subnets
784
+
785
+ When this feature flag is disabled, EgressOnlyGateway resource is created for all dual-stack VPC regardless of subnet type
786
+
787
+ *cdk.json*
788
+
789
+ ```json
790
+ {
791
+ "context": {
792
+ "@aws-cdk/aws-ec2:requirePrivateSubnetsForEgressOnlyInternetGateway": true
793
+ }
794
+ }
795
+ ```
796
+
797
+ * `@aws-cdk/aws-stepfunctions-tasks:httpInvokeDynamicJsonPathEndpoint`
798
+
799
+ When this feature flag is enabled, the JSONPath apiEndpoint value will be resolved dynamically at runtime, while slightly increasing the size of the state machine definition.
800
+ When disabled, the JSONPath apiEndpoint property will only support a static string value.
801
+
802
+ _cdk.json
803
+
804
+ ```json
805
+ {
806
+ "context": {
807
+ "@aws-cdk/aws-stepfunctions-tasks:httpInvokeDynamicJsonPathEndpoint": true
808
+ }
809
+ }
810
+ ```
811
+
812
+ * `@aws-cdk/aws-signer:signingProfileNamePassedToCfn`
813
+
814
+ When this feature flag is enabled, the `signingProfileName` property is passed to the L1 `CfnSigningProfile` construct,
815
+ which ensures that the AWS Signer profile is created with the specified name.
816
+
817
+ When this feature flag is disabled, the `signingProfileName` is not passed to CloudFormation, maintaining backward
818
+ compatibility with existing deployments where CloudFormation auto-generated profile names.
819
+
820
+ This feature flag is needed because enabling it can cause existing signing profiles to be
821
+ replaced during deployment if a `signingProfileName` was specified but not previously used
822
+ in the CloudFormation template.
823
+
824
+ *cdk.json*
825
+
826
+ ```json
827
+ {
828
+ "context": {
829
+ "@aws-cdk/aws-signer:signingProfileNamePassedToCfn": true
830
+ }
831
+ }
832
+ ```
833
+
834
+ * `@aws-cdk/aws-ecs-patterns:uniqueTargetGroupId`
835
+
836
+ When enabled, ECS patterns will generate unique target group IDs that include the load balancer name and type (public/private). This prevents CloudFormation conflicts when switching between public and private load balancers.
837
+
838
+ Without this flag, switching an ApplicationLoadBalancedFargateService from public to private (or vice versa) fails with "target group cannot be associated with more than one load balancer" error.
839
+
840
+ *cdk.json*
841
+
842
+ ```json
843
+ {
844
+ "context": {
845
+ "@aws-cdk/aws-ecs-patterns:uniqueTargetGroupId": true
846
+ }
847
+ }
848
+ ```
@@ -18,7 +18,7 @@ and error indicating that a bucket policy already exists.
18
18
  In cases where we know what the required policy is we can go ahead and create the policy so we can
19
19
  remain in control of it.
20
20
 
21
- https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3
21
+ [https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3](https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3)
22
22
 
23
23
  *cdk.json*
24
24
 
@@ -121,7 +121,7 @@ enabled on the bucket.
121
121
  This flag uses a Bucket Policy statement to allow Server Access Log delivery, following best
122
122
  practices for S3.
123
123
 
124
- https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html
124
+ [https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html](https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html)
125
125
 
126
126
  ```json
127
127
  {
@@ -171,7 +171,7 @@ Enable this feature flag to use the `AmazonEMRServicePolicy_v2` managed policies
171
171
  This is a feature flag as the old behavior will be deprecated, but some resources may require manual
172
172
  intervention since they might not have the appropriate tags propagated automatically.
173
173
 
174
- https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html
174
+ [https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html)
175
175
 
176
176
  *cdk.json*
177
177
 
@@ -310,6 +310,20 @@ When this feature flag is enabled and calling KMS key grant method, the created
310
310
  }
311
311
  ```
312
312
 
313
+ * `@aws-cdk/aws-kms:applyImportedAliasPermissionsToPrincipal`
314
+
315
+ Enable grant methods on imported KMS Aliases to apply permissions scoped by the alias using the `kms:ResourceAliases` condition key. When this flag is disabled, grant* methods on `Alias.fromAliasName` remain no-ops to preserve existing behavior.
316
+
317
+ *cdk.json*
318
+
319
+ ```json
320
+ {
321
+ "context": {
322
+ "@aws-cdk/aws-kms:applyImportedAliasPermissionsToPrincipal": true
323
+ }
324
+ }
325
+ ```
326
+
313
327
  * `@aws-cdk/aws-eks:nodegroupNameAttribute`
314
328
 
315
329
  When enabled, nodegroupName attribute of the provisioned EKS NodeGroup will not have the cluster name prefix.
@@ -364,7 +378,7 @@ When this featuer flag is enabled, remove the default deployment alarm settings
364
378
  When enabled, IAM Policy created to run tasks won't include the task definition ARN, only the revision ARN.
365
379
 
366
380
  When this feature flag is enabled, the IAM Policy created to run tasks won't include the task definition ARN, only the revision ARN.
367
- The revision ARN is more specific than the task definition ARN. See https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html
381
+ The revision ARN is more specific than the task definition ARN. See [https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html](https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html)
368
382
  for more details.
369
383
 
370
384
  *cdk.json*
@@ -555,3 +569,251 @@ guarantee the correct execution of the feature in all platforms. See [Github dis
555
569
  },
556
570
  }
557
571
  ```
572
+
573
+ * `@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault`
574
+
575
+ When enabled, the default security group ingress rules will allow IPv6 ingress from anywhere,
576
+ For internet facing ALBs with `dualstack-without-public-ipv4` IP address type, the default security group rules
577
+ will allow IPv6 ingress from anywhere (::/0). Previously, the default security group rules would only allow IPv4 ingress.
578
+
579
+ Using a feature flag to make sure existing customers who might be relying
580
+ on the overly restrictive permissions are not broken.,
581
+
582
+ If the flag is set to false then the default security group rules will only allow IPv4 ingress.
583
+
584
+ *cdk.json*
585
+
586
+ ```json
587
+ {
588
+ "context": {
589
+ "@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault": true
590
+ }
591
+ }
592
+ ```
593
+
594
+ * `@aws-cdk/aws-iam:oidcRejectUnauthorizedConnections`
595
+
596
+ When this feature flag is enabled, the default behaviour of OIDC Provider's custom resource handler will
597
+ default to reject unauthorized connections when downloading CA Certificates.
598
+
599
+ When this feature flag is disabled, the behaviour will be the same as current and will allow downloading
600
+ thumbprints from unsecure connnections.
601
+
602
+ *cdk.json*
603
+
604
+ ```json
605
+ {
606
+ "context": {
607
+ "@aws-cdk/aws-iam:oidcRejectUnauthorizedConnections": true
608
+ }
609
+ }
610
+ ```
611
+
612
+ * `@aws-cdk/core:enableAdditionalMetadataCollection`
613
+
614
+ When this feature flag is enabled, CDK expands the scope of usage data collection to include the:
615
+
616
+ * L2 construct property keys - Collect which property keys you use from the L2 constructs in your app. This includes property keys nested in dictionary objects.
617
+ * L2 construct property values of BOOL and ENUM types - Collect property key values of only BOOL and ENUM types. All other types, such as string values or construct references will be redacted.
618
+ * L2 construct method usage - Collection method name, parameter keys and parameter values of BOOL and ENUM type.
619
+
620
+ *cdk.json*
621
+
622
+ ```json
623
+ {
624
+ "context": {
625
+ "@aws-cdk/core:enableAdditionalMetadataCollection": true
626
+ }
627
+ }
628
+ ```
629
+
630
+ * `@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy`
631
+
632
+ [Deprecated default feature] When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
633
+ The purpose of this is to prevent lambda from creating a dependency on the Default Policy Statement.
634
+ This solves an issue where a circular dependency could occur if adding lambda to something like a Cognito Trigger, then adding the User Pool to the lambda execution role permissions.
635
+ However in the current implementation, we have removed a dependency of the lambda function on the policy. In addition to this, a Role will be attached to the Policy instead of an inline policy being attached to the role.
636
+ This will create a data race condition in the CloudFormation template because the creation of the Lambda function no longer waits for the policy to be created. Having said that, we are not deprecating the feature (we are defaulting the feature flag to false for new stacks) since this feature can still be used to get around the circular dependency issue (issue-7016) particularly in cases where the lambda resource creation doesnt need to depend on the policy resource creation.
637
+ We recommend to unset the feature flag if already set which will restore the original behavior.
638
+
639
+ *cdk.json*
640
+
641
+ ```json
642
+ {
643
+ "context": {
644
+ "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": false
645
+ }
646
+ }
647
+ ```
648
+
649
+ * `@aws-cdk/aws-s3:setUniqueReplicationRoleName`
650
+
651
+ When this feature flag is enabled, a unique role name is specified only when performing cross-account replication.
652
+ When disabled, 'CDKReplicationRole' is always specified.
653
+
654
+ *cdk.json*
655
+
656
+ ```json
657
+ {
658
+ "context": {
659
+ "@aws-cdk/aws-s3:setUniqueReplicationRoleName": true
660
+ }
661
+ }
662
+ ```
663
+
664
+ * `@aws-cdk/pipelines:reduceStageRoleTrustScope`
665
+
666
+ When this feature flag is enabled, the root account principal will not be added to the trust policy of stage role.
667
+ When this feature flag is disabled, it will keep the root account principal in the trust policy.
668
+
669
+ *cdk.json*
670
+
671
+ ```json
672
+ {
673
+ "context": {
674
+ "@aws-cdk/pipelines:reduceStageRoleTrustScope": true
675
+ }
676
+ }
677
+ ```
678
+
679
+ * `@aws-cdk/aws-events:requireEventBusPolicySid`
680
+
681
+ When this flag is enabled:
682
+
683
+ * Resource policies will be created with Statement IDs for service principals
684
+ * The operation will succeed as expected
685
+
686
+ When this flag is disabled:
687
+
688
+ * A warning will be emitted
689
+ * The grant operation will be dropped
690
+ * No permissions will be added
691
+
692
+ *cdk.json*
693
+
694
+ ```json
695
+ {
696
+ "context": {
697
+ "@aws-cdk/aws-events:requireEventBusPolicySid": true
698
+ }
699
+ }
700
+ ```
701
+
702
+ * `@aws-cdk/aws-dynamodb:retainTableReplica`
703
+
704
+ Currently, table replica will always be deleted when stack deletes regardless of source table's deletion policy.
705
+ When enabled, table replica will be default to the removal policy of source table unless specified otherwise.
706
+
707
+ *cdk.json*
708
+
709
+ ```json
710
+ {
711
+ "context": {
712
+ "@aws-cdk/aws-dynamodb:retainTableReplica": true
713
+ }
714
+ }
715
+ ```
716
+
717
+ * `@aws-cdk/cognito:logUserPoolClientSecretValue`
718
+
719
+ When this feature flag is enabled, the SDK API call response to desribe user pool client values will be logged in the custom
720
+ resource lambda function logs.
721
+
722
+ When this feature flag is disabled, the SDK API call response to describe user pool client values will not be logged in the custom
723
+ resource lambda function logs.
724
+
725
+ *cdk.json*
726
+
727
+ ```json
728
+ {
729
+ "context": {
730
+ "@aws-cdk/cognito:logUserPoolClientSecretValue": true
731
+ }
732
+ }
733
+ ```
734
+
735
+ * `@aws-cdk/aws-s3:publicAccessBlockedByDefault`
736
+
737
+ When BlockPublicAccess is not set at all, s3's default behavior will be to set all options to true in aws console.
738
+ The previous behavior in cdk before this feature was; if only some of the BlockPublicAccessOptions were set (not all 4), then the ones undefined would default to false.
739
+ This is counter intuitive to the console behavior where the options would start in true state and a user would uncheck the boxes as needed.
740
+ The new behavior from this feature will allow a user, for example, to set 1 of the 4 BlockPublicAccessOpsions to false, and on deployment the other 3 will remain true.
741
+
742
+ *cdk.json*
743
+
744
+ ```json
745
+ {
746
+ "context": {
747
+ "@aws-cdk/aws-s3:publicAccessBlockedByDefault": true
748
+ }
749
+ }
750
+ ```
751
+
752
+ * `@aws-cdk/aws-ec2:requirePrivateSubnetsForEgressOnlyInternetGateway`
753
+
754
+ When this feature flag is enabled, EgressOnlyGateway is created only for dual-stack VPC with private subnets
755
+
756
+ When this feature flag is disabled, EgressOnlyGateway resource is created for all dual-stack VPC regardless of subnet type
757
+
758
+ *cdk.json*
759
+
760
+ ```json
761
+ {
762
+ "context": {
763
+ "@aws-cdk/aws-ec2:requirePrivateSubnetsForEgressOnlyInternetGateway": true
764
+ }
765
+ }
766
+ ```
767
+
768
+ * `@aws-cdk/aws-stepfunctions-tasks:httpInvokeDynamicJsonPathEndpoint`
769
+
770
+ When this feature flag is enabled, the JSONPath apiEndpoint value will be resolved dynamically at runtime, while slightly increasing the size of the state machine definition.
771
+ When disabled, the JSONPath apiEndpoint property will only support a static string value.
772
+
773
+ _cdk.json
774
+
775
+ ```json
776
+ {
777
+ "context": {
778
+ "@aws-cdk/aws-stepfunctions-tasks:httpInvokeDynamicJsonPathEndpoint": true
779
+ }
780
+ }
781
+ ```
782
+
783
+ * `@aws-cdk/aws-signer:signingProfileNamePassedToCfn`
784
+
785
+ When this feature flag is enabled, the `signingProfileName` property is passed to the L1 `CfnSigningProfile` construct,
786
+ which ensures that the AWS Signer profile is created with the specified name.
787
+
788
+ When this feature flag is disabled, the `signingProfileName` is not passed to CloudFormation, maintaining backward
789
+ compatibility with existing deployments where CloudFormation auto-generated profile names.
790
+
791
+ This feature flag is needed because enabling it can cause existing signing profiles to be
792
+ replaced during deployment if a `signingProfileName` was specified but not previously used
793
+ in the CloudFormation template.
794
+
795
+ *cdk.json*
796
+
797
+ ```json
798
+ {
799
+ "context": {
800
+ "@aws-cdk/aws-signer:signingProfileNamePassedToCfn": true
801
+ }
802
+ }
803
+ ```
804
+
805
+ * `@aws-cdk/aws-ecs-patterns:uniqueTargetGroupId`
806
+
807
+ When enabled, ECS patterns will generate unique target group IDs that include the load balancer name and type (public/private). This prevents CloudFormation conflicts when switching between public and private load balancers.
808
+
809
+ Without this flag, switching an ApplicationLoadBalancedFargateService from public to private (or vice versa) fails with "target group cannot be associated with more than one load balancer" error.
810
+
811
+ *cdk.json*
812
+
813
+ ```json
814
+ {
815
+ "context": {
816
+ "@aws-cdk/aws-ecs-patterns:uniqueTargetGroupId": true
817
+ }
818
+ }
819
+ ```
@@ -1,9 +1,9 @@
1
1
  [build-system]
2
- requires = ["setuptools~=70.0.0", "wheel~=0.42"]
2
+ requires = ["setuptools~=75.3.2", "build~=1.3.0"]
3
3
  build-backend = "setuptools.build_meta"
4
4
 
5
5
  [tool.pyright]
6
6
  defineConstant = { DEBUG = true }
7
- pythonVersion = "3.8"
7
+ pythonVersion = "3.9"
8
8
  pythonPlatform = "All"
9
9
  reportSelfClsParameterName = false
@@ -5,7 +5,7 @@ kwargs = json.loads(
5
5
  """
6
6
  {
7
7
  "name": "aws-cdk.cx-api",
8
- "version": "2.175.0",
8
+ "version": "2.229.0",
9
9
  "description": "Cloud executable protocol",
10
10
  "license": "Apache-2.0",
11
11
  "url": "https://github.com/aws/aws-cdk",
@@ -26,16 +26,16 @@ kwargs = json.loads(
26
26
  ],
27
27
  "package_data": {
28
28
  "aws_cdk.cx_api._jsii": [
29
- "cx-api@2.175.0.jsii.tgz"
29
+ "cx-api@2.229.0.jsii.tgz"
30
30
  ],
31
31
  "aws_cdk.cx_api": [
32
32
  "py.typed"
33
33
  ]
34
34
  },
35
- "python_requires": "~=3.8",
35
+ "python_requires": "~=3.9",
36
36
  "install_requires": [
37
- "aws-cdk.cloud-assembly-schema>=39.0.0, <40.0.0",
38
- "jsii>=1.104.0, <2.0.0",
37
+ "aws-cdk.cloud-assembly-schema>=45.0.0",
38
+ "jsii>=1.119.0, <2.0.0",
39
39
  "publication>=0.0.3",
40
40
  "typeguard>=2.13.3,<4.3.0"
41
41
  ],
@@ -44,7 +44,6 @@ kwargs = json.loads(
44
44
  "Operating System :: OS Independent",
45
45
  "Programming Language :: JavaScript",
46
46
  "Programming Language :: Python :: 3 :: Only",
47
- "Programming Language :: Python :: 3.8",
48
47
  "Programming Language :: Python :: 3.9",
49
48
  "Programming Language :: Python :: 3.10",
50
49
  "Programming Language :: Python :: 3.11",