aws-cdk.cx-api 2.178.2__tar.gz → 2.180.0__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk.cx-api might be problematic. Click here for more details.

Files changed (18) hide show
  1. {aws_cdk_cx_api-2.178.2/src/aws_cdk.cx_api.egg-info → aws_cdk_cx_api-2.180.0}/PKG-INFO +17 -1
  2. {aws_cdk_cx_api-2.178.2 → aws_cdk_cx_api-2.180.0}/README.md +16 -0
  3. {aws_cdk_cx_api-2.178.2 → aws_cdk_cx_api-2.180.0}/setup.py +2 -2
  4. {aws_cdk_cx_api-2.178.2 → aws_cdk_cx_api-2.180.0}/src/aws_cdk/cx_api/__init__.py +16 -0
  5. {aws_cdk_cx_api-2.178.2 → aws_cdk_cx_api-2.180.0}/src/aws_cdk/cx_api/_jsii/__init__.py +1 -1
  6. aws_cdk_cx_api-2.180.0/src/aws_cdk/cx_api/_jsii/cx-api@2.180.0.jsii.tgz +0 -0
  7. {aws_cdk_cx_api-2.178.2 → aws_cdk_cx_api-2.180.0/src/aws_cdk.cx_api.egg-info}/PKG-INFO +17 -1
  8. {aws_cdk_cx_api-2.178.2 → aws_cdk_cx_api-2.180.0}/src/aws_cdk.cx_api.egg-info/SOURCES.txt +1 -1
  9. aws_cdk_cx_api-2.178.2/src/aws_cdk/cx_api/_jsii/cx-api@2.178.2.jsii.tgz +0 -0
  10. {aws_cdk_cx_api-2.178.2 → aws_cdk_cx_api-2.180.0}/LICENSE +0 -0
  11. {aws_cdk_cx_api-2.178.2 → aws_cdk_cx_api-2.180.0}/MANIFEST.in +0 -0
  12. {aws_cdk_cx_api-2.178.2 → aws_cdk_cx_api-2.180.0}/NOTICE +0 -0
  13. {aws_cdk_cx_api-2.178.2 → aws_cdk_cx_api-2.180.0}/pyproject.toml +0 -0
  14. {aws_cdk_cx_api-2.178.2 → aws_cdk_cx_api-2.180.0}/setup.cfg +0 -0
  15. {aws_cdk_cx_api-2.178.2 → aws_cdk_cx_api-2.180.0}/src/aws_cdk/cx_api/py.typed +0 -0
  16. {aws_cdk_cx_api-2.178.2 → aws_cdk_cx_api-2.180.0}/src/aws_cdk.cx_api.egg-info/dependency_links.txt +0 -0
  17. {aws_cdk_cx_api-2.178.2 → aws_cdk_cx_api-2.180.0}/src/aws_cdk.cx_api.egg-info/requires.txt +0 -0
  18. {aws_cdk_cx_api-2.178.2 → aws_cdk_cx_api-2.180.0}/src/aws_cdk.cx_api.egg-info/top_level.txt +0 -0
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: aws-cdk.cx-api
3
- Version: 2.178.2
3
+ Version: 2.180.0
4
4
  Summary: Cloud executable protocol
5
5
  Home-page: https://github.com/aws/aws-cdk
6
6
  Author: Amazon Web Services
@@ -642,3 +642,19 @@ When this feature flag is enabled, CDK expands the scope of usage data collectio
642
642
  }
643
643
  }
644
644
  ```
645
+
646
+ * `@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy`
647
+
648
+ When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
649
+ The purpose of this is to prevent lambda from creating a dependency on the Default Policy Statement.
650
+ This solves an issue where a circular dependency could occur if adding lambda to something like a Cognito Trigger, then adding the User Pool to the lambda execution role permissions.
651
+
652
+ *cdk.json*
653
+
654
+ ```json
655
+ {
656
+ "context": {
657
+ "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": true
658
+ }
659
+ }
660
+ ```
@@ -612,3 +612,19 @@ When this feature flag is enabled, CDK expands the scope of usage data collectio
612
612
  }
613
613
  }
614
614
  ```
615
+
616
+ * `@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy`
617
+
618
+ When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
619
+ The purpose of this is to prevent lambda from creating a dependency on the Default Policy Statement.
620
+ This solves an issue where a circular dependency could occur if adding lambda to something like a Cognito Trigger, then adding the User Pool to the lambda execution role permissions.
621
+
622
+ *cdk.json*
623
+
624
+ ```json
625
+ {
626
+ "context": {
627
+ "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": true
628
+ }
629
+ }
630
+ ```
@@ -5,7 +5,7 @@ kwargs = json.loads(
5
5
  """
6
6
  {
7
7
  "name": "aws-cdk.cx-api",
8
- "version": "2.178.2",
8
+ "version": "2.180.0",
9
9
  "description": "Cloud executable protocol",
10
10
  "license": "Apache-2.0",
11
11
  "url": "https://github.com/aws/aws-cdk",
@@ -26,7 +26,7 @@ kwargs = json.loads(
26
26
  ],
27
27
  "package_data": {
28
28
  "aws_cdk.cx_api._jsii": [
29
- "cx-api@2.178.2.jsii.tgz"
29
+ "cx-api@2.180.0.jsii.tgz"
30
30
  ],
31
31
  "aws_cdk.cx_api": [
32
32
  "py.typed"
@@ -613,6 +613,22 @@ When this feature flag is enabled, CDK expands the scope of usage data collectio
613
613
  }
614
614
  }
615
615
  ```
616
+
617
+ * `@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy`
618
+
619
+ When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
620
+ The purpose of this is to prevent lambda from creating a dependency on the Default Policy Statement.
621
+ This solves an issue where a circular dependency could occur if adding lambda to something like a Cognito Trigger, then adding the User Pool to the lambda execution role permissions.
622
+
623
+ *cdk.json*
624
+
625
+ ```json
626
+ {
627
+ "context": {
628
+ "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": true
629
+ }
630
+ }
631
+ ```
616
632
  '''
617
633
  from pkgutil import extend_path
618
634
  __path__ = extend_path(__path__, __name__)
@@ -31,7 +31,7 @@ def check_type(argname: str, value: object, expected_type: typing.Any) -> typing
31
31
  import aws_cdk.cloud_assembly_schema._jsii
32
32
 
33
33
  __jsii_assembly__ = jsii.JSIIAssembly.load(
34
- "@aws-cdk/cx-api", "2.178.2", __name__[0:-6], "cx-api@2.178.2.jsii.tgz"
34
+ "@aws-cdk/cx-api", "2.180.0", __name__[0:-6], "cx-api@2.180.0.jsii.tgz"
35
35
  )
36
36
 
37
37
  __all__ = [
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: aws-cdk.cx-api
3
- Version: 2.178.2
3
+ Version: 2.180.0
4
4
  Summary: Cloud executable protocol
5
5
  Home-page: https://github.com/aws/aws-cdk
6
6
  Author: Amazon Web Services
@@ -642,3 +642,19 @@ When this feature flag is enabled, CDK expands the scope of usage data collectio
642
642
  }
643
643
  }
644
644
  ```
645
+
646
+ * `@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy`
647
+
648
+ When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
649
+ The purpose of this is to prevent lambda from creating a dependency on the Default Policy Statement.
650
+ This solves an issue where a circular dependency could occur if adding lambda to something like a Cognito Trigger, then adding the User Pool to the lambda execution role permissions.
651
+
652
+ *cdk.json*
653
+
654
+ ```json
655
+ {
656
+ "context": {
657
+ "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": true
658
+ }
659
+ }
660
+ ```
@@ -12,4 +12,4 @@ src/aws_cdk.cx_api.egg-info/top_level.txt
12
12
  src/aws_cdk/cx_api/__init__.py
13
13
  src/aws_cdk/cx_api/py.typed
14
14
  src/aws_cdk/cx_api/_jsii/__init__.py
15
- src/aws_cdk/cx_api/_jsii/cx-api@2.178.2.jsii.tgz
15
+ src/aws_cdk/cx_api/_jsii/cx-api@2.180.0.jsii.tgz