aws-cdk.cx-api 2.186.0__py3-none-any.whl → 2.188.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk.cx-api might be problematic. Click here for more details.

@@ -616,16 +616,19 @@ When this feature flag is enabled, CDK expands the scope of usage data collectio
616
616
 
617
617
  * `@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy`
618
618
 
619
- When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
619
+ [Deprecated default feature] When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
620
620
  The purpose of this is to prevent lambda from creating a dependency on the Default Policy Statement.
621
621
  This solves an issue where a circular dependency could occur if adding lambda to something like a Cognito Trigger, then adding the User Pool to the lambda execution role permissions.
622
+ However in the current implementation, we have removed a dependency of the lambda function on the policy. In addition to this, a Role will be attached to the Policy instead of an inline policy being attached to the role.
623
+ This will create a data race condition in the CloudFormation template because the creation of the Lambda function no longer waits for the policy to be created. Having said that, we are not deprecating the feature (we are defaulting the feature flag to false for new stacks) since this feature can still be used to get around the circular dependency issue (issue-7016) particularly in cases where the lambda resource creation doesnt need to depend on the policy resource creation.
624
+ We recommend to unset the feature flag if already set which will restore the original behavior.
622
625
 
623
626
  *cdk.json*
624
627
 
625
628
  ```json
626
629
  {
627
630
  "context": {
628
- "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": true
631
+ "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": false
629
632
  }
630
633
  }
631
634
  ```
@@ -682,6 +685,39 @@ When this flag is disabled:
682
685
  }
683
686
  }
684
687
  ```
688
+
689
+ * `@aws-cdk/aws-dynamodb:retainTableReplica`
690
+
691
+ Currently, table replica will always be deleted when stack deletes regardless of source table's deletion policy.
692
+ When enabled, table replica will be default to the removal policy of source table unless specified otherwise.
693
+
694
+ *cdk.json*
695
+
696
+ ```json
697
+ {
698
+ "context": {
699
+ "@aws-cdk/aws-dynamodb:retainTableReplica": true
700
+ }
701
+ }
702
+ ```
703
+
704
+ * `@aws-cdk/cognito:logUserPoolClientSecretValue`
705
+
706
+ When this feature flag is enabled, the SDK API call response to desribe user pool client values will be logged in the custom
707
+ resource lambda function logs.
708
+
709
+ When this feature flag is disabled, the SDK API call response to describe user pool client values will not be logged in the custom
710
+ resource lambda function logs.
711
+
712
+ *cdk.json*
713
+
714
+ ```json
715
+ {
716
+ "context": {
717
+ "@aws-cdk/cognito:logUserPoolClientSecretValue": true
718
+ }
719
+ }
720
+ ```
685
721
  '''
686
722
  from pkgutil import extend_path
687
723
  __path__ = extend_path(__path__, __name__)
@@ -31,7 +31,7 @@ def check_type(argname: str, value: object, expected_type: typing.Any) -> typing
31
31
  import aws_cdk.cloud_assembly_schema._jsii
32
32
 
33
33
  __jsii_assembly__ = jsii.JSIIAssembly.load(
34
- "@aws-cdk/cx-api", "2.186.0", __name__[0:-6], "cx-api@2.186.0.jsii.tgz"
34
+ "@aws-cdk/cx-api", "2.188.0", __name__[0:-6], "cx-api@2.188.0.jsii.tgz"
35
35
  )
36
36
 
37
37
  __all__ = [
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: aws-cdk.cx-api
3
- Version: 2.186.0
3
+ Version: 2.188.0
4
4
  Summary: Cloud executable protocol
5
5
  Home-page: https://github.com/aws/aws-cdk
6
6
  Author: Amazon Web Services
@@ -22,8 +22,8 @@ Requires-Python: ~=3.9
22
22
  Description-Content-Type: text/markdown
23
23
  License-File: LICENSE
24
24
  License-File: NOTICE
25
- Requires-Dist: aws-cdk.cloud-assembly-schema<41.0.0,>=40.6.0
26
- Requires-Dist: jsii<2.0.0,>=1.109.0
25
+ Requires-Dist: aws-cdk.cloud-assembly-schema<42.0.0,>=41.0.0
26
+ Requires-Dist: jsii<2.0.0,>=1.110.0
27
27
  Requires-Dist: publication>=0.0.3
28
28
  Requires-Dist: typeguard<4.3.0,>=2.13.3
29
29
 
@@ -644,16 +644,19 @@ When this feature flag is enabled, CDK expands the scope of usage data collectio
644
644
 
645
645
  * `@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy`
646
646
 
647
- When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
647
+ [Deprecated default feature] When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
648
648
  The purpose of this is to prevent lambda from creating a dependency on the Default Policy Statement.
649
649
  This solves an issue where a circular dependency could occur if adding lambda to something like a Cognito Trigger, then adding the User Pool to the lambda execution role permissions.
650
+ However in the current implementation, we have removed a dependency of the lambda function on the policy. In addition to this, a Role will be attached to the Policy instead of an inline policy being attached to the role.
651
+ This will create a data race condition in the CloudFormation template because the creation of the Lambda function no longer waits for the policy to be created. Having said that, we are not deprecating the feature (we are defaulting the feature flag to false for new stacks) since this feature can still be used to get around the circular dependency issue (issue-7016) particularly in cases where the lambda resource creation doesnt need to depend on the policy resource creation.
652
+ We recommend to unset the feature flag if already set which will restore the original behavior.
650
653
 
651
654
  *cdk.json*
652
655
 
653
656
  ```json
654
657
  {
655
658
  "context": {
656
- "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": true
659
+ "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": false
657
660
  }
658
661
  }
659
662
  ```
@@ -710,3 +713,36 @@ When this flag is disabled:
710
713
  }
711
714
  }
712
715
  ```
716
+
717
+ * `@aws-cdk/aws-dynamodb:retainTableReplica`
718
+
719
+ Currently, table replica will always be deleted when stack deletes regardless of source table's deletion policy.
720
+ When enabled, table replica will be default to the removal policy of source table unless specified otherwise.
721
+
722
+ *cdk.json*
723
+
724
+ ```json
725
+ {
726
+ "context": {
727
+ "@aws-cdk/aws-dynamodb:retainTableReplica": true
728
+ }
729
+ }
730
+ ```
731
+
732
+ * `@aws-cdk/cognito:logUserPoolClientSecretValue`
733
+
734
+ When this feature flag is enabled, the SDK API call response to desribe user pool client values will be logged in the custom
735
+ resource lambda function logs.
736
+
737
+ When this feature flag is disabled, the SDK API call response to describe user pool client values will not be logged in the custom
738
+ resource lambda function logs.
739
+
740
+ *cdk.json*
741
+
742
+ ```json
743
+ {
744
+ "context": {
745
+ "@aws-cdk/cognito:logUserPoolClientSecretValue": true
746
+ }
747
+ }
748
+ ```
@@ -0,0 +1,10 @@
1
+ aws_cdk/cx_api/__init__.py,sha256=hHFLZ9iKg8OSodjYXHHHybq3VtJ5fBrISPN0LnMjtMo,197290
2
+ aws_cdk/cx_api/py.typed,sha256=AbpHGcgLb-kRsJGnwFEktk7uzpZOCcBY74-YBdrKVGs,1
3
+ aws_cdk/cx_api/_jsii/__init__.py,sha256=4wFo2FTLrvzKAqgxMt-edpGXTQDP9D5vJIk3Wjb3kK8,1434
4
+ aws_cdk/cx_api/_jsii/cx-api@2.188.0.jsii.tgz,sha256=Z1-W32yF1ab7i_-hzFpIS7CHAmWt8ruulkLS9PU6auQ,246052
5
+ aws_cdk_cx_api-2.188.0.dist-info/LICENSE,sha256=y47tc38H0C4DpGljYUZDl8XxidQjNxxGLq-K4jwv6Xc,11391
6
+ aws_cdk_cx_api-2.188.0.dist-info/METADATA,sha256=0x0t1UdmNtCiRFUjI-wQLVC-5HeGswTpEGUkMVQ1Krk,25387
7
+ aws_cdk_cx_api-2.188.0.dist-info/NOTICE,sha256=ADLo99tv5kq5gQDGp9ApDXyR8I8l6SQRbLl_UT8kHuY,1078
8
+ aws_cdk_cx_api-2.188.0.dist-info/WHEEL,sha256=iAkIy5fosb7FzIOwONchHf19Qu7_1wCWyFNR5gu9nU0,91
9
+ aws_cdk_cx_api-2.188.0.dist-info/top_level.txt,sha256=1TALAKbuUGsMSrfKWEf268lySCmcqSEO6cDYe_XlLHM,8
10
+ aws_cdk_cx_api-2.188.0.dist-info/RECORD,,
@@ -1,5 +1,5 @@
1
1
  Wheel-Version: 1.0
2
- Generator: bdist_wheel (0.45.1)
2
+ Generator: setuptools (75.3.2)
3
3
  Root-Is-Purelib: true
4
4
  Tag: py3-none-any
5
5
 
@@ -1,10 +0,0 @@
1
- aws_cdk/cx_api/__init__.py,sha256=4aTEKRU3AzohrT8S5dP7m5wGPbG5LsMnl2KqiVLqSSc,195615
2
- aws_cdk/cx_api/py.typed,sha256=AbpHGcgLb-kRsJGnwFEktk7uzpZOCcBY74-YBdrKVGs,1
3
- aws_cdk/cx_api/_jsii/__init__.py,sha256=aiwIxyXkwYQRoc8-82KP9Hw4e7zvXKBQVI8p7d9rr1U,1434
4
- aws_cdk/cx_api/_jsii/cx-api@2.186.0.jsii.tgz,sha256=kKcj-IinS1b9JrZhKkboBhvq8nVPRxEUgoWzGCt4jPw,242485
5
- aws_cdk.cx_api-2.186.0.dist-info/LICENSE,sha256=y47tc38H0C4DpGljYUZDl8XxidQjNxxGLq-K4jwv6Xc,11391
6
- aws_cdk.cx_api-2.186.0.dist-info/METADATA,sha256=jk3EEmz-Zx7ulp1n5_vDDJ-rTwp63HFyQcGEphw93d0,23712
7
- aws_cdk.cx_api-2.186.0.dist-info/NOTICE,sha256=ADLo99tv5kq5gQDGp9ApDXyR8I8l6SQRbLl_UT8kHuY,1078
8
- aws_cdk.cx_api-2.186.0.dist-info/WHEEL,sha256=tZoeGjtWxWRfdplE7E3d45VPlLNQnvbKiYnx7gwAy8A,92
9
- aws_cdk.cx_api-2.186.0.dist-info/top_level.txt,sha256=1TALAKbuUGsMSrfKWEf268lySCmcqSEO6cDYe_XlLHM,8
10
- aws_cdk.cx_api-2.186.0.dist-info/RECORD,,