aws-cdk.cx-api 2.184.1__tar.gz → 2.186.0__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk.cx-api might be problematic. Click here for more details.

Files changed (18) hide show
  1. {aws_cdk_cx_api-2.184.1/src/aws_cdk.cx_api.egg-info → aws_cdk_cx_api-2.186.0}/PKG-INFO +54 -1
  2. {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/README.md +53 -0
  3. {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/setup.py +2 -2
  4. {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/src/aws_cdk/cx_api/__init__.py +53 -0
  5. {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/src/aws_cdk/cx_api/_jsii/__init__.py +1 -1
  6. aws_cdk_cx_api-2.186.0/src/aws_cdk/cx_api/_jsii/cx-api@2.186.0.jsii.tgz +0 -0
  7. {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0/src/aws_cdk.cx_api.egg-info}/PKG-INFO +54 -1
  8. {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/src/aws_cdk.cx_api.egg-info/SOURCES.txt +1 -1
  9. aws_cdk_cx_api-2.184.1/src/aws_cdk/cx_api/_jsii/cx-api@2.184.1.jsii.tgz +0 -0
  10. {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/LICENSE +0 -0
  11. {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/MANIFEST.in +0 -0
  12. {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/NOTICE +0 -0
  13. {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/pyproject.toml +0 -0
  14. {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/setup.cfg +0 -0
  15. {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/src/aws_cdk/cx_api/py.typed +0 -0
  16. {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/src/aws_cdk.cx_api.egg-info/dependency_links.txt +0 -0
  17. {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/src/aws_cdk.cx_api.egg-info/requires.txt +0 -0
  18. {aws_cdk_cx_api-2.184.1 → aws_cdk_cx_api-2.186.0}/src/aws_cdk.cx_api.egg-info/top_level.txt +0 -0
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: aws-cdk.cx-api
3
- Version: 2.184.1
3
+ Version: 2.186.0
4
4
  Summary: Cloud executable protocol
5
5
  Home-page: https://github.com/aws/aws-cdk
6
6
  Author: Amazon Web Services
@@ -657,3 +657,56 @@ This solves an issue where a circular dependency could occur if adding lambda to
657
657
  }
658
658
  }
659
659
  ```
660
+
661
+ * `@aws-cdk/aws-s3:setUniqueReplicationRoleName`
662
+
663
+ When this feature flag is enabled, a unique role name is specified only when performing cross-account replication.
664
+ When disabled, 'CDKReplicationRole' is always specified.
665
+
666
+ *cdk.json*
667
+
668
+ ```json
669
+ {
670
+ "context": {
671
+ "@aws-cdk/aws-s3:setUniqueReplicationRoleName": true
672
+ }
673
+ }
674
+ ```
675
+
676
+ * `@aws-cdk/pipelines:reduceStageRoleTrustScope`
677
+
678
+ When this feature flag is enabled, the root account principal will not be added to the trust policy of stage role.
679
+ When this feature flag is disabled, it will keep the root account principal in the trust policy.
680
+
681
+ *cdk.json*
682
+
683
+ ```json
684
+ {
685
+ "context": {
686
+ "@aws-cdk/pipelines:reduceStageRoleTrustScope": true
687
+ }
688
+ }
689
+ ```
690
+
691
+ * `@aws-cdk/aws-events:requireEventBusPolicySid`
692
+
693
+ When this flag is enabled:
694
+
695
+ * Resource policies will be created with Statement IDs for service principals
696
+ * The operation will succeed as expected
697
+
698
+ When this flag is disabled:
699
+
700
+ * A warning will be emitted
701
+ * The grant operation will be dropped
702
+ * No permissions will be added
703
+
704
+ *cdk.json*
705
+
706
+ ```json
707
+ {
708
+ "context": {
709
+ "@aws-cdk/aws-events:requireEventBusPolicySid": true
710
+ }
711
+ }
712
+ ```
@@ -628,3 +628,56 @@ This solves an issue where a circular dependency could occur if adding lambda to
628
628
  }
629
629
  }
630
630
  ```
631
+
632
+ * `@aws-cdk/aws-s3:setUniqueReplicationRoleName`
633
+
634
+ When this feature flag is enabled, a unique role name is specified only when performing cross-account replication.
635
+ When disabled, 'CDKReplicationRole' is always specified.
636
+
637
+ *cdk.json*
638
+
639
+ ```json
640
+ {
641
+ "context": {
642
+ "@aws-cdk/aws-s3:setUniqueReplicationRoleName": true
643
+ }
644
+ }
645
+ ```
646
+
647
+ * `@aws-cdk/pipelines:reduceStageRoleTrustScope`
648
+
649
+ When this feature flag is enabled, the root account principal will not be added to the trust policy of stage role.
650
+ When this feature flag is disabled, it will keep the root account principal in the trust policy.
651
+
652
+ *cdk.json*
653
+
654
+ ```json
655
+ {
656
+ "context": {
657
+ "@aws-cdk/pipelines:reduceStageRoleTrustScope": true
658
+ }
659
+ }
660
+ ```
661
+
662
+ * `@aws-cdk/aws-events:requireEventBusPolicySid`
663
+
664
+ When this flag is enabled:
665
+
666
+ * Resource policies will be created with Statement IDs for service principals
667
+ * The operation will succeed as expected
668
+
669
+ When this flag is disabled:
670
+
671
+ * A warning will be emitted
672
+ * The grant operation will be dropped
673
+ * No permissions will be added
674
+
675
+ *cdk.json*
676
+
677
+ ```json
678
+ {
679
+ "context": {
680
+ "@aws-cdk/aws-events:requireEventBusPolicySid": true
681
+ }
682
+ }
683
+ ```
@@ -5,7 +5,7 @@ kwargs = json.loads(
5
5
  """
6
6
  {
7
7
  "name": "aws-cdk.cx-api",
8
- "version": "2.184.1",
8
+ "version": "2.186.0",
9
9
  "description": "Cloud executable protocol",
10
10
  "license": "Apache-2.0",
11
11
  "url": "https://github.com/aws/aws-cdk",
@@ -26,7 +26,7 @@ kwargs = json.loads(
26
26
  ],
27
27
  "package_data": {
28
28
  "aws_cdk.cx_api._jsii": [
29
- "cx-api@2.184.1.jsii.tgz"
29
+ "cx-api@2.186.0.jsii.tgz"
30
30
  ],
31
31
  "aws_cdk.cx_api": [
32
32
  "py.typed"
@@ -629,6 +629,59 @@ This solves an issue where a circular dependency could occur if adding lambda to
629
629
  }
630
630
  }
631
631
  ```
632
+
633
+ * `@aws-cdk/aws-s3:setUniqueReplicationRoleName`
634
+
635
+ When this feature flag is enabled, a unique role name is specified only when performing cross-account replication.
636
+ When disabled, 'CDKReplicationRole' is always specified.
637
+
638
+ *cdk.json*
639
+
640
+ ```json
641
+ {
642
+ "context": {
643
+ "@aws-cdk/aws-s3:setUniqueReplicationRoleName": true
644
+ }
645
+ }
646
+ ```
647
+
648
+ * `@aws-cdk/pipelines:reduceStageRoleTrustScope`
649
+
650
+ When this feature flag is enabled, the root account principal will not be added to the trust policy of stage role.
651
+ When this feature flag is disabled, it will keep the root account principal in the trust policy.
652
+
653
+ *cdk.json*
654
+
655
+ ```json
656
+ {
657
+ "context": {
658
+ "@aws-cdk/pipelines:reduceStageRoleTrustScope": true
659
+ }
660
+ }
661
+ ```
662
+
663
+ * `@aws-cdk/aws-events:requireEventBusPolicySid`
664
+
665
+ When this flag is enabled:
666
+
667
+ * Resource policies will be created with Statement IDs for service principals
668
+ * The operation will succeed as expected
669
+
670
+ When this flag is disabled:
671
+
672
+ * A warning will be emitted
673
+ * The grant operation will be dropped
674
+ * No permissions will be added
675
+
676
+ *cdk.json*
677
+
678
+ ```json
679
+ {
680
+ "context": {
681
+ "@aws-cdk/aws-events:requireEventBusPolicySid": true
682
+ }
683
+ }
684
+ ```
632
685
  '''
633
686
  from pkgutil import extend_path
634
687
  __path__ = extend_path(__path__, __name__)
@@ -31,7 +31,7 @@ def check_type(argname: str, value: object, expected_type: typing.Any) -> typing
31
31
  import aws_cdk.cloud_assembly_schema._jsii
32
32
 
33
33
  __jsii_assembly__ = jsii.JSIIAssembly.load(
34
- "@aws-cdk/cx-api", "2.184.1", __name__[0:-6], "cx-api@2.184.1.jsii.tgz"
34
+ "@aws-cdk/cx-api", "2.186.0", __name__[0:-6], "cx-api@2.186.0.jsii.tgz"
35
35
  )
36
36
 
37
37
  __all__ = [
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: aws-cdk.cx-api
3
- Version: 2.184.1
3
+ Version: 2.186.0
4
4
  Summary: Cloud executable protocol
5
5
  Home-page: https://github.com/aws/aws-cdk
6
6
  Author: Amazon Web Services
@@ -657,3 +657,56 @@ This solves an issue where a circular dependency could occur if adding lambda to
657
657
  }
658
658
  }
659
659
  ```
660
+
661
+ * `@aws-cdk/aws-s3:setUniqueReplicationRoleName`
662
+
663
+ When this feature flag is enabled, a unique role name is specified only when performing cross-account replication.
664
+ When disabled, 'CDKReplicationRole' is always specified.
665
+
666
+ *cdk.json*
667
+
668
+ ```json
669
+ {
670
+ "context": {
671
+ "@aws-cdk/aws-s3:setUniqueReplicationRoleName": true
672
+ }
673
+ }
674
+ ```
675
+
676
+ * `@aws-cdk/pipelines:reduceStageRoleTrustScope`
677
+
678
+ When this feature flag is enabled, the root account principal will not be added to the trust policy of stage role.
679
+ When this feature flag is disabled, it will keep the root account principal in the trust policy.
680
+
681
+ *cdk.json*
682
+
683
+ ```json
684
+ {
685
+ "context": {
686
+ "@aws-cdk/pipelines:reduceStageRoleTrustScope": true
687
+ }
688
+ }
689
+ ```
690
+
691
+ * `@aws-cdk/aws-events:requireEventBusPolicySid`
692
+
693
+ When this flag is enabled:
694
+
695
+ * Resource policies will be created with Statement IDs for service principals
696
+ * The operation will succeed as expected
697
+
698
+ When this flag is disabled:
699
+
700
+ * A warning will be emitted
701
+ * The grant operation will be dropped
702
+ * No permissions will be added
703
+
704
+ *cdk.json*
705
+
706
+ ```json
707
+ {
708
+ "context": {
709
+ "@aws-cdk/aws-events:requireEventBusPolicySid": true
710
+ }
711
+ }
712
+ ```
@@ -12,4 +12,4 @@ src/aws_cdk.cx_api.egg-info/top_level.txt
12
12
  src/aws_cdk/cx_api/__init__.py
13
13
  src/aws_cdk/cx_api/py.typed
14
14
  src/aws_cdk/cx_api/_jsii/__init__.py
15
- src/aws_cdk/cx_api/_jsii/cx-api@2.184.1.jsii.tgz
15
+ src/aws_cdk/cx_api/_jsii/cx-api@2.186.0.jsii.tgz