aws-cdk.cx-api 2.184.1__tar.gz → 2.186.0__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk.cx-api might be problematic. Click here for more details.
- {aws_cdk_cx_api-2.184.1/src/aws_cdk.cx_api.egg-info → aws_cdk_cx_api-2.186.0}/PKG-INFO +54 -1
- {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/README.md +53 -0
- {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/setup.py +2 -2
- {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/src/aws_cdk/cx_api/__init__.py +53 -0
- {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/src/aws_cdk/cx_api/_jsii/__init__.py +1 -1
- aws_cdk_cx_api-2.186.0/src/aws_cdk/cx_api/_jsii/cx-api@2.186.0.jsii.tgz +0 -0
- {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0/src/aws_cdk.cx_api.egg-info}/PKG-INFO +54 -1
- {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/src/aws_cdk.cx_api.egg-info/SOURCES.txt +1 -1
- aws_cdk_cx_api-2.184.1/src/aws_cdk/cx_api/_jsii/cx-api@2.184.1.jsii.tgz +0 -0
- {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/LICENSE +0 -0
- {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/MANIFEST.in +0 -0
- {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/NOTICE +0 -0
- {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/pyproject.toml +0 -0
- {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/setup.cfg +0 -0
- {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/src/aws_cdk/cx_api/py.typed +0 -0
- {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/src/aws_cdk.cx_api.egg-info/dependency_links.txt +0 -0
- {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/src/aws_cdk.cx_api.egg-info/requires.txt +0 -0
- {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/src/aws_cdk.cx_api.egg-info/top_level.txt +0 -0
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.1
|
|
2
2
|
Name: aws-cdk.cx-api
|
|
3
|
-
Version: 2.
|
|
3
|
+
Version: 2.186.0
|
|
4
4
|
Summary: Cloud executable protocol
|
|
5
5
|
Home-page: https://github.com/aws/aws-cdk
|
|
6
6
|
Author: Amazon Web Services
|
|
@@ -657,3 +657,56 @@ This solves an issue where a circular dependency could occur if adding lambda to
|
|
|
657
657
|
}
|
|
658
658
|
}
|
|
659
659
|
```
|
|
660
|
+
|
|
661
|
+
* `@aws-cdk/aws-s3:setUniqueReplicationRoleName`
|
|
662
|
+
|
|
663
|
+
When this feature flag is enabled, a unique role name is specified only when performing cross-account replication.
|
|
664
|
+
When disabled, 'CDKReplicationRole' is always specified.
|
|
665
|
+
|
|
666
|
+
*cdk.json*
|
|
667
|
+
|
|
668
|
+
```json
|
|
669
|
+
{
|
|
670
|
+
"context": {
|
|
671
|
+
"@aws-cdk/aws-s3:setUniqueReplicationRoleName": true
|
|
672
|
+
}
|
|
673
|
+
}
|
|
674
|
+
```
|
|
675
|
+
|
|
676
|
+
* `@aws-cdk/pipelines:reduceStageRoleTrustScope`
|
|
677
|
+
|
|
678
|
+
When this feature flag is enabled, the root account principal will not be added to the trust policy of stage role.
|
|
679
|
+
When this feature flag is disabled, it will keep the root account principal in the trust policy.
|
|
680
|
+
|
|
681
|
+
*cdk.json*
|
|
682
|
+
|
|
683
|
+
```json
|
|
684
|
+
{
|
|
685
|
+
"context": {
|
|
686
|
+
"@aws-cdk/pipelines:reduceStageRoleTrustScope": true
|
|
687
|
+
}
|
|
688
|
+
}
|
|
689
|
+
```
|
|
690
|
+
|
|
691
|
+
* `@aws-cdk/aws-events:requireEventBusPolicySid`
|
|
692
|
+
|
|
693
|
+
When this flag is enabled:
|
|
694
|
+
|
|
695
|
+
* Resource policies will be created with Statement IDs for service principals
|
|
696
|
+
* The operation will succeed as expected
|
|
697
|
+
|
|
698
|
+
When this flag is disabled:
|
|
699
|
+
|
|
700
|
+
* A warning will be emitted
|
|
701
|
+
* The grant operation will be dropped
|
|
702
|
+
* No permissions will be added
|
|
703
|
+
|
|
704
|
+
*cdk.json*
|
|
705
|
+
|
|
706
|
+
```json
|
|
707
|
+
{
|
|
708
|
+
"context": {
|
|
709
|
+
"@aws-cdk/aws-events:requireEventBusPolicySid": true
|
|
710
|
+
}
|
|
711
|
+
}
|
|
712
|
+
```
|
|
@@ -628,3 +628,56 @@ This solves an issue where a circular dependency could occur if adding lambda to
|
|
|
628
628
|
}
|
|
629
629
|
}
|
|
630
630
|
```
|
|
631
|
+
|
|
632
|
+
* `@aws-cdk/aws-s3:setUniqueReplicationRoleName`
|
|
633
|
+
|
|
634
|
+
When this feature flag is enabled, a unique role name is specified only when performing cross-account replication.
|
|
635
|
+
When disabled, 'CDKReplicationRole' is always specified.
|
|
636
|
+
|
|
637
|
+
*cdk.json*
|
|
638
|
+
|
|
639
|
+
```json
|
|
640
|
+
{
|
|
641
|
+
"context": {
|
|
642
|
+
"@aws-cdk/aws-s3:setUniqueReplicationRoleName": true
|
|
643
|
+
}
|
|
644
|
+
}
|
|
645
|
+
```
|
|
646
|
+
|
|
647
|
+
* `@aws-cdk/pipelines:reduceStageRoleTrustScope`
|
|
648
|
+
|
|
649
|
+
When this feature flag is enabled, the root account principal will not be added to the trust policy of stage role.
|
|
650
|
+
When this feature flag is disabled, it will keep the root account principal in the trust policy.
|
|
651
|
+
|
|
652
|
+
*cdk.json*
|
|
653
|
+
|
|
654
|
+
```json
|
|
655
|
+
{
|
|
656
|
+
"context": {
|
|
657
|
+
"@aws-cdk/pipelines:reduceStageRoleTrustScope": true
|
|
658
|
+
}
|
|
659
|
+
}
|
|
660
|
+
```
|
|
661
|
+
|
|
662
|
+
* `@aws-cdk/aws-events:requireEventBusPolicySid`
|
|
663
|
+
|
|
664
|
+
When this flag is enabled:
|
|
665
|
+
|
|
666
|
+
* Resource policies will be created with Statement IDs for service principals
|
|
667
|
+
* The operation will succeed as expected
|
|
668
|
+
|
|
669
|
+
When this flag is disabled:
|
|
670
|
+
|
|
671
|
+
* A warning will be emitted
|
|
672
|
+
* The grant operation will be dropped
|
|
673
|
+
* No permissions will be added
|
|
674
|
+
|
|
675
|
+
*cdk.json*
|
|
676
|
+
|
|
677
|
+
```json
|
|
678
|
+
{
|
|
679
|
+
"context": {
|
|
680
|
+
"@aws-cdk/aws-events:requireEventBusPolicySid": true
|
|
681
|
+
}
|
|
682
|
+
}
|
|
683
|
+
```
|
|
@@ -5,7 +5,7 @@ kwargs = json.loads(
|
|
|
5
5
|
"""
|
|
6
6
|
{
|
|
7
7
|
"name": "aws-cdk.cx-api",
|
|
8
|
-
"version": "2.
|
|
8
|
+
"version": "2.186.0",
|
|
9
9
|
"description": "Cloud executable protocol",
|
|
10
10
|
"license": "Apache-2.0",
|
|
11
11
|
"url": "https://github.com/aws/aws-cdk",
|
|
@@ -26,7 +26,7 @@ kwargs = json.loads(
|
|
|
26
26
|
],
|
|
27
27
|
"package_data": {
|
|
28
28
|
"aws_cdk.cx_api._jsii": [
|
|
29
|
-
"cx-api@2.
|
|
29
|
+
"cx-api@2.186.0.jsii.tgz"
|
|
30
30
|
],
|
|
31
31
|
"aws_cdk.cx_api": [
|
|
32
32
|
"py.typed"
|
|
@@ -629,6 +629,59 @@ This solves an issue where a circular dependency could occur if adding lambda to
|
|
|
629
629
|
}
|
|
630
630
|
}
|
|
631
631
|
```
|
|
632
|
+
|
|
633
|
+
* `@aws-cdk/aws-s3:setUniqueReplicationRoleName`
|
|
634
|
+
|
|
635
|
+
When this feature flag is enabled, a unique role name is specified only when performing cross-account replication.
|
|
636
|
+
When disabled, 'CDKReplicationRole' is always specified.
|
|
637
|
+
|
|
638
|
+
*cdk.json*
|
|
639
|
+
|
|
640
|
+
```json
|
|
641
|
+
{
|
|
642
|
+
"context": {
|
|
643
|
+
"@aws-cdk/aws-s3:setUniqueReplicationRoleName": true
|
|
644
|
+
}
|
|
645
|
+
}
|
|
646
|
+
```
|
|
647
|
+
|
|
648
|
+
* `@aws-cdk/pipelines:reduceStageRoleTrustScope`
|
|
649
|
+
|
|
650
|
+
When this feature flag is enabled, the root account principal will not be added to the trust policy of stage role.
|
|
651
|
+
When this feature flag is disabled, it will keep the root account principal in the trust policy.
|
|
652
|
+
|
|
653
|
+
*cdk.json*
|
|
654
|
+
|
|
655
|
+
```json
|
|
656
|
+
{
|
|
657
|
+
"context": {
|
|
658
|
+
"@aws-cdk/pipelines:reduceStageRoleTrustScope": true
|
|
659
|
+
}
|
|
660
|
+
}
|
|
661
|
+
```
|
|
662
|
+
|
|
663
|
+
* `@aws-cdk/aws-events:requireEventBusPolicySid`
|
|
664
|
+
|
|
665
|
+
When this flag is enabled:
|
|
666
|
+
|
|
667
|
+
* Resource policies will be created with Statement IDs for service principals
|
|
668
|
+
* The operation will succeed as expected
|
|
669
|
+
|
|
670
|
+
When this flag is disabled:
|
|
671
|
+
|
|
672
|
+
* A warning will be emitted
|
|
673
|
+
* The grant operation will be dropped
|
|
674
|
+
* No permissions will be added
|
|
675
|
+
|
|
676
|
+
*cdk.json*
|
|
677
|
+
|
|
678
|
+
```json
|
|
679
|
+
{
|
|
680
|
+
"context": {
|
|
681
|
+
"@aws-cdk/aws-events:requireEventBusPolicySid": true
|
|
682
|
+
}
|
|
683
|
+
}
|
|
684
|
+
```
|
|
632
685
|
'''
|
|
633
686
|
from pkgutil import extend_path
|
|
634
687
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -31,7 +31,7 @@ def check_type(argname: str, value: object, expected_type: typing.Any) -> typing
|
|
|
31
31
|
import aws_cdk.cloud_assembly_schema._jsii
|
|
32
32
|
|
|
33
33
|
__jsii_assembly__ = jsii.JSIIAssembly.load(
|
|
34
|
-
"@aws-cdk/cx-api", "2.
|
|
34
|
+
"@aws-cdk/cx-api", "2.186.0", __name__[0:-6], "cx-api@2.186.0.jsii.tgz"
|
|
35
35
|
)
|
|
36
36
|
|
|
37
37
|
__all__ = [
|
|
Binary file
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.1
|
|
2
2
|
Name: aws-cdk.cx-api
|
|
3
|
-
Version: 2.
|
|
3
|
+
Version: 2.186.0
|
|
4
4
|
Summary: Cloud executable protocol
|
|
5
5
|
Home-page: https://github.com/aws/aws-cdk
|
|
6
6
|
Author: Amazon Web Services
|
|
@@ -657,3 +657,56 @@ This solves an issue where a circular dependency could occur if adding lambda to
|
|
|
657
657
|
}
|
|
658
658
|
}
|
|
659
659
|
```
|
|
660
|
+
|
|
661
|
+
* `@aws-cdk/aws-s3:setUniqueReplicationRoleName`
|
|
662
|
+
|
|
663
|
+
When this feature flag is enabled, a unique role name is specified only when performing cross-account replication.
|
|
664
|
+
When disabled, 'CDKReplicationRole' is always specified.
|
|
665
|
+
|
|
666
|
+
*cdk.json*
|
|
667
|
+
|
|
668
|
+
```json
|
|
669
|
+
{
|
|
670
|
+
"context": {
|
|
671
|
+
"@aws-cdk/aws-s3:setUniqueReplicationRoleName": true
|
|
672
|
+
}
|
|
673
|
+
}
|
|
674
|
+
```
|
|
675
|
+
|
|
676
|
+
* `@aws-cdk/pipelines:reduceStageRoleTrustScope`
|
|
677
|
+
|
|
678
|
+
When this feature flag is enabled, the root account principal will not be added to the trust policy of stage role.
|
|
679
|
+
When this feature flag is disabled, it will keep the root account principal in the trust policy.
|
|
680
|
+
|
|
681
|
+
*cdk.json*
|
|
682
|
+
|
|
683
|
+
```json
|
|
684
|
+
{
|
|
685
|
+
"context": {
|
|
686
|
+
"@aws-cdk/pipelines:reduceStageRoleTrustScope": true
|
|
687
|
+
}
|
|
688
|
+
}
|
|
689
|
+
```
|
|
690
|
+
|
|
691
|
+
* `@aws-cdk/aws-events:requireEventBusPolicySid`
|
|
692
|
+
|
|
693
|
+
When this flag is enabled:
|
|
694
|
+
|
|
695
|
+
* Resource policies will be created with Statement IDs for service principals
|
|
696
|
+
* The operation will succeed as expected
|
|
697
|
+
|
|
698
|
+
When this flag is disabled:
|
|
699
|
+
|
|
700
|
+
* A warning will be emitted
|
|
701
|
+
* The grant operation will be dropped
|
|
702
|
+
* No permissions will be added
|
|
703
|
+
|
|
704
|
+
*cdk.json*
|
|
705
|
+
|
|
706
|
+
```json
|
|
707
|
+
{
|
|
708
|
+
"context": {
|
|
709
|
+
"@aws-cdk/aws-events:requireEventBusPolicySid": true
|
|
710
|
+
}
|
|
711
|
+
}
|
|
712
|
+
```
|
|
Binary file
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
{aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/src/aws_cdk.cx_api.egg-info/dependency_links.txt
RENAMED
|
File without changes
|
|
File without changes
|
|
File without changes
|