aws-cdk.cx-api 2.186.0__tar.gz → 2.188.0__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk.cx-api might be problematic. Click here for more details.
- {aws_cdk_cx_api-2.186.0 → aws_cdk_cx_api-2.188.0}/PKG-INFO +41 -5
- aws_cdk_cx_api-2.186.0/src/aws_cdk.cx_api.egg-info/PKG-INFO → aws_cdk_cx_api-2.188.0/README.md +38 -31
- {aws_cdk_cx_api-2.186.0 → aws_cdk_cx_api-2.188.0}/pyproject.toml +1 -1
- {aws_cdk_cx_api-2.186.0 → aws_cdk_cx_api-2.188.0}/setup.py +4 -4
- {aws_cdk_cx_api-2.186.0 → aws_cdk_cx_api-2.188.0}/src/aws_cdk/cx_api/__init__.py +38 -2
- {aws_cdk_cx_api-2.186.0 → aws_cdk_cx_api-2.188.0}/src/aws_cdk/cx_api/_jsii/__init__.py +1 -1
- aws_cdk_cx_api-2.188.0/src/aws_cdk/cx_api/_jsii/cx-api@2.188.0.jsii.tgz +0 -0
- aws_cdk_cx_api-2.186.0/README.md → aws_cdk_cx_api-2.188.0/src/aws_cdk.cx_api.egg-info/PKG-INFO +67 -2
- {aws_cdk_cx_api-2.186.0 → aws_cdk_cx_api-2.188.0}/src/aws_cdk.cx_api.egg-info/SOURCES.txt +1 -1
- aws_cdk_cx_api-2.188.0/src/aws_cdk.cx_api.egg-info/requires.txt +4 -0
- aws_cdk_cx_api-2.186.0/src/aws_cdk/cx_api/_jsii/cx-api@2.186.0.jsii.tgz +0 -0
- aws_cdk_cx_api-2.186.0/src/aws_cdk.cx_api.egg-info/requires.txt +0 -4
- {aws_cdk_cx_api-2.186.0 → aws_cdk_cx_api-2.188.0}/LICENSE +0 -0
- {aws_cdk_cx_api-2.186.0 → aws_cdk_cx_api-2.188.0}/MANIFEST.in +0 -0
- {aws_cdk_cx_api-2.186.0 → aws_cdk_cx_api-2.188.0}/NOTICE +0 -0
- {aws_cdk_cx_api-2.186.0 → aws_cdk_cx_api-2.188.0}/setup.cfg +0 -0
- {aws_cdk_cx_api-2.186.0 → aws_cdk_cx_api-2.188.0}/src/aws_cdk/cx_api/py.typed +0 -0
- {aws_cdk_cx_api-2.186.0 → aws_cdk_cx_api-2.188.0}/src/aws_cdk.cx_api.egg-info/dependency_links.txt +0 -0
- {aws_cdk_cx_api-2.186.0 → aws_cdk_cx_api-2.188.0}/src/aws_cdk.cx_api.egg-info/top_level.txt +0 -0
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.1
|
|
2
2
|
Name: aws-cdk.cx-api
|
|
3
|
-
Version: 2.
|
|
3
|
+
Version: 2.188.0
|
|
4
4
|
Summary: Cloud executable protocol
|
|
5
5
|
Home-page: https://github.com/aws/aws-cdk
|
|
6
6
|
Author: Amazon Web Services
|
|
@@ -22,8 +22,8 @@ Requires-Python: ~=3.9
|
|
|
22
22
|
Description-Content-Type: text/markdown
|
|
23
23
|
License-File: LICENSE
|
|
24
24
|
License-File: NOTICE
|
|
25
|
-
Requires-Dist: aws-cdk.cloud-assembly-schema<
|
|
26
|
-
Requires-Dist: jsii<2.0.0,>=1.
|
|
25
|
+
Requires-Dist: aws-cdk.cloud-assembly-schema<42.0.0,>=41.0.0
|
|
26
|
+
Requires-Dist: jsii<2.0.0,>=1.110.0
|
|
27
27
|
Requires-Dist: publication>=0.0.3
|
|
28
28
|
Requires-Dist: typeguard<4.3.0,>=2.13.3
|
|
29
29
|
|
|
@@ -644,16 +644,19 @@ When this feature flag is enabled, CDK expands the scope of usage data collectio
|
|
|
644
644
|
|
|
645
645
|
* `@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy`
|
|
646
646
|
|
|
647
|
-
When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
|
|
647
|
+
[Deprecated default feature] When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
|
|
648
648
|
The purpose of this is to prevent lambda from creating a dependency on the Default Policy Statement.
|
|
649
649
|
This solves an issue where a circular dependency could occur if adding lambda to something like a Cognito Trigger, then adding the User Pool to the lambda execution role permissions.
|
|
650
|
+
However in the current implementation, we have removed a dependency of the lambda function on the policy. In addition to this, a Role will be attached to the Policy instead of an inline policy being attached to the role.
|
|
651
|
+
This will create a data race condition in the CloudFormation template because the creation of the Lambda function no longer waits for the policy to be created. Having said that, we are not deprecating the feature (we are defaulting the feature flag to false for new stacks) since this feature can still be used to get around the circular dependency issue (issue-7016) particularly in cases where the lambda resource creation doesnt need to depend on the policy resource creation.
|
|
652
|
+
We recommend to unset the feature flag if already set which will restore the original behavior.
|
|
650
653
|
|
|
651
654
|
*cdk.json*
|
|
652
655
|
|
|
653
656
|
```json
|
|
654
657
|
{
|
|
655
658
|
"context": {
|
|
656
|
-
"@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy":
|
|
659
|
+
"@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": false
|
|
657
660
|
}
|
|
658
661
|
}
|
|
659
662
|
```
|
|
@@ -710,3 +713,36 @@ When this flag is disabled:
|
|
|
710
713
|
}
|
|
711
714
|
}
|
|
712
715
|
```
|
|
716
|
+
|
|
717
|
+
* `@aws-cdk/aws-dynamodb:retainTableReplica`
|
|
718
|
+
|
|
719
|
+
Currently, table replica will always be deleted when stack deletes regardless of source table's deletion policy.
|
|
720
|
+
When enabled, table replica will be default to the removal policy of source table unless specified otherwise.
|
|
721
|
+
|
|
722
|
+
*cdk.json*
|
|
723
|
+
|
|
724
|
+
```json
|
|
725
|
+
{
|
|
726
|
+
"context": {
|
|
727
|
+
"@aws-cdk/aws-dynamodb:retainTableReplica": true
|
|
728
|
+
}
|
|
729
|
+
}
|
|
730
|
+
```
|
|
731
|
+
|
|
732
|
+
* `@aws-cdk/cognito:logUserPoolClientSecretValue`
|
|
733
|
+
|
|
734
|
+
When this feature flag is enabled, the SDK API call response to desribe user pool client values will be logged in the custom
|
|
735
|
+
resource lambda function logs.
|
|
736
|
+
|
|
737
|
+
When this feature flag is disabled, the SDK API call response to describe user pool client values will not be logged in the custom
|
|
738
|
+
resource lambda function logs.
|
|
739
|
+
|
|
740
|
+
*cdk.json*
|
|
741
|
+
|
|
742
|
+
```json
|
|
743
|
+
{
|
|
744
|
+
"context": {
|
|
745
|
+
"@aws-cdk/cognito:logUserPoolClientSecretValue": true
|
|
746
|
+
}
|
|
747
|
+
}
|
|
748
|
+
```
|
aws_cdk_cx_api-2.186.0/src/aws_cdk.cx_api.egg-info/PKG-INFO → aws_cdk_cx_api-2.188.0/README.md
RENAMED
|
@@ -1,32 +1,3 @@
|
|
|
1
|
-
Metadata-Version: 2.1
|
|
2
|
-
Name: aws-cdk.cx-api
|
|
3
|
-
Version: 2.186.0
|
|
4
|
-
Summary: Cloud executable protocol
|
|
5
|
-
Home-page: https://github.com/aws/aws-cdk
|
|
6
|
-
Author: Amazon Web Services
|
|
7
|
-
License: Apache-2.0
|
|
8
|
-
Project-URL: Source, https://github.com/aws/aws-cdk.git
|
|
9
|
-
Classifier: Intended Audience :: Developers
|
|
10
|
-
Classifier: Operating System :: OS Independent
|
|
11
|
-
Classifier: Programming Language :: JavaScript
|
|
12
|
-
Classifier: Programming Language :: Python :: 3 :: Only
|
|
13
|
-
Classifier: Programming Language :: Python :: 3.9
|
|
14
|
-
Classifier: Programming Language :: Python :: 3.10
|
|
15
|
-
Classifier: Programming Language :: Python :: 3.11
|
|
16
|
-
Classifier: Typing :: Typed
|
|
17
|
-
Classifier: Development Status :: 5 - Production/Stable
|
|
18
|
-
Classifier: License :: OSI Approved
|
|
19
|
-
Classifier: Framework :: AWS CDK
|
|
20
|
-
Classifier: Framework :: AWS CDK :: 2
|
|
21
|
-
Requires-Python: ~=3.9
|
|
22
|
-
Description-Content-Type: text/markdown
|
|
23
|
-
License-File: LICENSE
|
|
24
|
-
License-File: NOTICE
|
|
25
|
-
Requires-Dist: aws-cdk.cloud-assembly-schema<41.0.0,>=40.6.0
|
|
26
|
-
Requires-Dist: jsii<2.0.0,>=1.109.0
|
|
27
|
-
Requires-Dist: publication>=0.0.3
|
|
28
|
-
Requires-Dist: typeguard<4.3.0,>=2.13.3
|
|
29
|
-
|
|
30
1
|
# Cloud Executable API
|
|
31
2
|
|
|
32
3
|
This module is part of the [AWS Cloud Development Kit](https://github.com/aws/aws-cdk) project.
|
|
@@ -644,16 +615,19 @@ When this feature flag is enabled, CDK expands the scope of usage data collectio
|
|
|
644
615
|
|
|
645
616
|
* `@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy`
|
|
646
617
|
|
|
647
|
-
When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
|
|
618
|
+
[Deprecated default feature] When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
|
|
648
619
|
The purpose of this is to prevent lambda from creating a dependency on the Default Policy Statement.
|
|
649
620
|
This solves an issue where a circular dependency could occur if adding lambda to something like a Cognito Trigger, then adding the User Pool to the lambda execution role permissions.
|
|
621
|
+
However in the current implementation, we have removed a dependency of the lambda function on the policy. In addition to this, a Role will be attached to the Policy instead of an inline policy being attached to the role.
|
|
622
|
+
This will create a data race condition in the CloudFormation template because the creation of the Lambda function no longer waits for the policy to be created. Having said that, we are not deprecating the feature (we are defaulting the feature flag to false for new stacks) since this feature can still be used to get around the circular dependency issue (issue-7016) particularly in cases where the lambda resource creation doesnt need to depend on the policy resource creation.
|
|
623
|
+
We recommend to unset the feature flag if already set which will restore the original behavior.
|
|
650
624
|
|
|
651
625
|
*cdk.json*
|
|
652
626
|
|
|
653
627
|
```json
|
|
654
628
|
{
|
|
655
629
|
"context": {
|
|
656
|
-
"@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy":
|
|
630
|
+
"@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": false
|
|
657
631
|
}
|
|
658
632
|
}
|
|
659
633
|
```
|
|
@@ -710,3 +684,36 @@ When this flag is disabled:
|
|
|
710
684
|
}
|
|
711
685
|
}
|
|
712
686
|
```
|
|
687
|
+
|
|
688
|
+
* `@aws-cdk/aws-dynamodb:retainTableReplica`
|
|
689
|
+
|
|
690
|
+
Currently, table replica will always be deleted when stack deletes regardless of source table's deletion policy.
|
|
691
|
+
When enabled, table replica will be default to the removal policy of source table unless specified otherwise.
|
|
692
|
+
|
|
693
|
+
*cdk.json*
|
|
694
|
+
|
|
695
|
+
```json
|
|
696
|
+
{
|
|
697
|
+
"context": {
|
|
698
|
+
"@aws-cdk/aws-dynamodb:retainTableReplica": true
|
|
699
|
+
}
|
|
700
|
+
}
|
|
701
|
+
```
|
|
702
|
+
|
|
703
|
+
* `@aws-cdk/cognito:logUserPoolClientSecretValue`
|
|
704
|
+
|
|
705
|
+
When this feature flag is enabled, the SDK API call response to desribe user pool client values will be logged in the custom
|
|
706
|
+
resource lambda function logs.
|
|
707
|
+
|
|
708
|
+
When this feature flag is disabled, the SDK API call response to describe user pool client values will not be logged in the custom
|
|
709
|
+
resource lambda function logs.
|
|
710
|
+
|
|
711
|
+
*cdk.json*
|
|
712
|
+
|
|
713
|
+
```json
|
|
714
|
+
{
|
|
715
|
+
"context": {
|
|
716
|
+
"@aws-cdk/cognito:logUserPoolClientSecretValue": true
|
|
717
|
+
}
|
|
718
|
+
}
|
|
719
|
+
```
|
|
@@ -5,7 +5,7 @@ kwargs = json.loads(
|
|
|
5
5
|
"""
|
|
6
6
|
{
|
|
7
7
|
"name": "aws-cdk.cx-api",
|
|
8
|
-
"version": "2.
|
|
8
|
+
"version": "2.188.0",
|
|
9
9
|
"description": "Cloud executable protocol",
|
|
10
10
|
"license": "Apache-2.0",
|
|
11
11
|
"url": "https://github.com/aws/aws-cdk",
|
|
@@ -26,7 +26,7 @@ kwargs = json.loads(
|
|
|
26
26
|
],
|
|
27
27
|
"package_data": {
|
|
28
28
|
"aws_cdk.cx_api._jsii": [
|
|
29
|
-
"cx-api@2.
|
|
29
|
+
"cx-api@2.188.0.jsii.tgz"
|
|
30
30
|
],
|
|
31
31
|
"aws_cdk.cx_api": [
|
|
32
32
|
"py.typed"
|
|
@@ -34,8 +34,8 @@ kwargs = json.loads(
|
|
|
34
34
|
},
|
|
35
35
|
"python_requires": "~=3.9",
|
|
36
36
|
"install_requires": [
|
|
37
|
-
"aws-cdk.cloud-assembly-schema>=
|
|
38
|
-
"jsii>=1.
|
|
37
|
+
"aws-cdk.cloud-assembly-schema>=41.0.0, <42.0.0",
|
|
38
|
+
"jsii>=1.110.0, <2.0.0",
|
|
39
39
|
"publication>=0.0.3",
|
|
40
40
|
"typeguard>=2.13.3,<4.3.0"
|
|
41
41
|
],
|
|
@@ -616,16 +616,19 @@ When this feature flag is enabled, CDK expands the scope of usage data collectio
|
|
|
616
616
|
|
|
617
617
|
* `@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy`
|
|
618
618
|
|
|
619
|
-
When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
|
|
619
|
+
[Deprecated default feature] When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
|
|
620
620
|
The purpose of this is to prevent lambda from creating a dependency on the Default Policy Statement.
|
|
621
621
|
This solves an issue where a circular dependency could occur if adding lambda to something like a Cognito Trigger, then adding the User Pool to the lambda execution role permissions.
|
|
622
|
+
However in the current implementation, we have removed a dependency of the lambda function on the policy. In addition to this, a Role will be attached to the Policy instead of an inline policy being attached to the role.
|
|
623
|
+
This will create a data race condition in the CloudFormation template because the creation of the Lambda function no longer waits for the policy to be created. Having said that, we are not deprecating the feature (we are defaulting the feature flag to false for new stacks) since this feature can still be used to get around the circular dependency issue (issue-7016) particularly in cases where the lambda resource creation doesnt need to depend on the policy resource creation.
|
|
624
|
+
We recommend to unset the feature flag if already set which will restore the original behavior.
|
|
622
625
|
|
|
623
626
|
*cdk.json*
|
|
624
627
|
|
|
625
628
|
```json
|
|
626
629
|
{
|
|
627
630
|
"context": {
|
|
628
|
-
"@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy":
|
|
631
|
+
"@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": false
|
|
629
632
|
}
|
|
630
633
|
}
|
|
631
634
|
```
|
|
@@ -682,6 +685,39 @@ When this flag is disabled:
|
|
|
682
685
|
}
|
|
683
686
|
}
|
|
684
687
|
```
|
|
688
|
+
|
|
689
|
+
* `@aws-cdk/aws-dynamodb:retainTableReplica`
|
|
690
|
+
|
|
691
|
+
Currently, table replica will always be deleted when stack deletes regardless of source table's deletion policy.
|
|
692
|
+
When enabled, table replica will be default to the removal policy of source table unless specified otherwise.
|
|
693
|
+
|
|
694
|
+
*cdk.json*
|
|
695
|
+
|
|
696
|
+
```json
|
|
697
|
+
{
|
|
698
|
+
"context": {
|
|
699
|
+
"@aws-cdk/aws-dynamodb:retainTableReplica": true
|
|
700
|
+
}
|
|
701
|
+
}
|
|
702
|
+
```
|
|
703
|
+
|
|
704
|
+
* `@aws-cdk/cognito:logUserPoolClientSecretValue`
|
|
705
|
+
|
|
706
|
+
When this feature flag is enabled, the SDK API call response to desribe user pool client values will be logged in the custom
|
|
707
|
+
resource lambda function logs.
|
|
708
|
+
|
|
709
|
+
When this feature flag is disabled, the SDK API call response to describe user pool client values will not be logged in the custom
|
|
710
|
+
resource lambda function logs.
|
|
711
|
+
|
|
712
|
+
*cdk.json*
|
|
713
|
+
|
|
714
|
+
```json
|
|
715
|
+
{
|
|
716
|
+
"context": {
|
|
717
|
+
"@aws-cdk/cognito:logUserPoolClientSecretValue": true
|
|
718
|
+
}
|
|
719
|
+
}
|
|
720
|
+
```
|
|
685
721
|
'''
|
|
686
722
|
from pkgutil import extend_path
|
|
687
723
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -31,7 +31,7 @@ def check_type(argname: str, value: object, expected_type: typing.Any) -> typing
|
|
|
31
31
|
import aws_cdk.cloud_assembly_schema._jsii
|
|
32
32
|
|
|
33
33
|
__jsii_assembly__ = jsii.JSIIAssembly.load(
|
|
34
|
-
"@aws-cdk/cx-api", "2.
|
|
34
|
+
"@aws-cdk/cx-api", "2.188.0", __name__[0:-6], "cx-api@2.188.0.jsii.tgz"
|
|
35
35
|
)
|
|
36
36
|
|
|
37
37
|
__all__ = [
|
|
Binary file
|
aws_cdk_cx_api-2.186.0/README.md → aws_cdk_cx_api-2.188.0/src/aws_cdk.cx_api.egg-info/PKG-INFO
RENAMED
|
@@ -1,3 +1,32 @@
|
|
|
1
|
+
Metadata-Version: 2.1
|
|
2
|
+
Name: aws-cdk.cx-api
|
|
3
|
+
Version: 2.188.0
|
|
4
|
+
Summary: Cloud executable protocol
|
|
5
|
+
Home-page: https://github.com/aws/aws-cdk
|
|
6
|
+
Author: Amazon Web Services
|
|
7
|
+
License: Apache-2.0
|
|
8
|
+
Project-URL: Source, https://github.com/aws/aws-cdk.git
|
|
9
|
+
Classifier: Intended Audience :: Developers
|
|
10
|
+
Classifier: Operating System :: OS Independent
|
|
11
|
+
Classifier: Programming Language :: JavaScript
|
|
12
|
+
Classifier: Programming Language :: Python :: 3 :: Only
|
|
13
|
+
Classifier: Programming Language :: Python :: 3.9
|
|
14
|
+
Classifier: Programming Language :: Python :: 3.10
|
|
15
|
+
Classifier: Programming Language :: Python :: 3.11
|
|
16
|
+
Classifier: Typing :: Typed
|
|
17
|
+
Classifier: Development Status :: 5 - Production/Stable
|
|
18
|
+
Classifier: License :: OSI Approved
|
|
19
|
+
Classifier: Framework :: AWS CDK
|
|
20
|
+
Classifier: Framework :: AWS CDK :: 2
|
|
21
|
+
Requires-Python: ~=3.9
|
|
22
|
+
Description-Content-Type: text/markdown
|
|
23
|
+
License-File: LICENSE
|
|
24
|
+
License-File: NOTICE
|
|
25
|
+
Requires-Dist: aws-cdk.cloud-assembly-schema<42.0.0,>=41.0.0
|
|
26
|
+
Requires-Dist: jsii<2.0.0,>=1.110.0
|
|
27
|
+
Requires-Dist: publication>=0.0.3
|
|
28
|
+
Requires-Dist: typeguard<4.3.0,>=2.13.3
|
|
29
|
+
|
|
1
30
|
# Cloud Executable API
|
|
2
31
|
|
|
3
32
|
This module is part of the [AWS Cloud Development Kit](https://github.com/aws/aws-cdk) project.
|
|
@@ -615,16 +644,19 @@ When this feature flag is enabled, CDK expands the scope of usage data collectio
|
|
|
615
644
|
|
|
616
645
|
* `@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy`
|
|
617
646
|
|
|
618
|
-
When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
|
|
647
|
+
[Deprecated default feature] When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
|
|
619
648
|
The purpose of this is to prevent lambda from creating a dependency on the Default Policy Statement.
|
|
620
649
|
This solves an issue where a circular dependency could occur if adding lambda to something like a Cognito Trigger, then adding the User Pool to the lambda execution role permissions.
|
|
650
|
+
However in the current implementation, we have removed a dependency of the lambda function on the policy. In addition to this, a Role will be attached to the Policy instead of an inline policy being attached to the role.
|
|
651
|
+
This will create a data race condition in the CloudFormation template because the creation of the Lambda function no longer waits for the policy to be created. Having said that, we are not deprecating the feature (we are defaulting the feature flag to false for new stacks) since this feature can still be used to get around the circular dependency issue (issue-7016) particularly in cases where the lambda resource creation doesnt need to depend on the policy resource creation.
|
|
652
|
+
We recommend to unset the feature flag if already set which will restore the original behavior.
|
|
621
653
|
|
|
622
654
|
*cdk.json*
|
|
623
655
|
|
|
624
656
|
```json
|
|
625
657
|
{
|
|
626
658
|
"context": {
|
|
627
|
-
"@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy":
|
|
659
|
+
"@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": false
|
|
628
660
|
}
|
|
629
661
|
}
|
|
630
662
|
```
|
|
@@ -681,3 +713,36 @@ When this flag is disabled:
|
|
|
681
713
|
}
|
|
682
714
|
}
|
|
683
715
|
```
|
|
716
|
+
|
|
717
|
+
* `@aws-cdk/aws-dynamodb:retainTableReplica`
|
|
718
|
+
|
|
719
|
+
Currently, table replica will always be deleted when stack deletes regardless of source table's deletion policy.
|
|
720
|
+
When enabled, table replica will be default to the removal policy of source table unless specified otherwise.
|
|
721
|
+
|
|
722
|
+
*cdk.json*
|
|
723
|
+
|
|
724
|
+
```json
|
|
725
|
+
{
|
|
726
|
+
"context": {
|
|
727
|
+
"@aws-cdk/aws-dynamodb:retainTableReplica": true
|
|
728
|
+
}
|
|
729
|
+
}
|
|
730
|
+
```
|
|
731
|
+
|
|
732
|
+
* `@aws-cdk/cognito:logUserPoolClientSecretValue`
|
|
733
|
+
|
|
734
|
+
When this feature flag is enabled, the SDK API call response to desribe user pool client values will be logged in the custom
|
|
735
|
+
resource lambda function logs.
|
|
736
|
+
|
|
737
|
+
When this feature flag is disabled, the SDK API call response to describe user pool client values will not be logged in the custom
|
|
738
|
+
resource lambda function logs.
|
|
739
|
+
|
|
740
|
+
*cdk.json*
|
|
741
|
+
|
|
742
|
+
```json
|
|
743
|
+
{
|
|
744
|
+
"context": {
|
|
745
|
+
"@aws-cdk/cognito:logUserPoolClientSecretValue": true
|
|
746
|
+
}
|
|
747
|
+
}
|
|
748
|
+
```
|
|
Binary file
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
{aws_cdk_cx_api-2.186.0 → aws_cdk_cx_api-2.188.0}/src/aws_cdk.cx_api.egg-info/dependency_links.txt
RENAMED
|
File without changes
|
|
File without changes
|