aws-cdk.cx-api 2.186.0__tar.gz → 2.188.0__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk.cx-api might be problematic. Click here for more details.

Files changed (19) hide show
  1. {aws_cdk_cx_api-2.186.0 → aws_cdk_cx_api-2.188.0}/PKG-INFO +41 -5
  2. aws_cdk_cx_api-2.186.0/src/aws_cdk.cx_api.egg-info/PKG-INFO → aws_cdk_cx_api-2.188.0/README.md +38 -31
  3. {aws_cdk_cx_api-2.186.0 → aws_cdk_cx_api-2.188.0}/pyproject.toml +1 -1
  4. {aws_cdk_cx_api-2.186.0 → aws_cdk_cx_api-2.188.0}/setup.py +4 -4
  5. {aws_cdk_cx_api-2.186.0 → aws_cdk_cx_api-2.188.0}/src/aws_cdk/cx_api/__init__.py +38 -2
  6. {aws_cdk_cx_api-2.186.0 → aws_cdk_cx_api-2.188.0}/src/aws_cdk/cx_api/_jsii/__init__.py +1 -1
  7. aws_cdk_cx_api-2.188.0/src/aws_cdk/cx_api/_jsii/cx-api@2.188.0.jsii.tgz +0 -0
  8. aws_cdk_cx_api-2.186.0/README.md → aws_cdk_cx_api-2.188.0/src/aws_cdk.cx_api.egg-info/PKG-INFO +67 -2
  9. {aws_cdk_cx_api-2.186.0 → aws_cdk_cx_api-2.188.0}/src/aws_cdk.cx_api.egg-info/SOURCES.txt +1 -1
  10. aws_cdk_cx_api-2.188.0/src/aws_cdk.cx_api.egg-info/requires.txt +4 -0
  11. aws_cdk_cx_api-2.186.0/src/aws_cdk/cx_api/_jsii/cx-api@2.186.0.jsii.tgz +0 -0
  12. aws_cdk_cx_api-2.186.0/src/aws_cdk.cx_api.egg-info/requires.txt +0 -4
  13. {aws_cdk_cx_api-2.186.0 → aws_cdk_cx_api-2.188.0}/LICENSE +0 -0
  14. {aws_cdk_cx_api-2.186.0 → aws_cdk_cx_api-2.188.0}/MANIFEST.in +0 -0
  15. {aws_cdk_cx_api-2.186.0 → aws_cdk_cx_api-2.188.0}/NOTICE +0 -0
  16. {aws_cdk_cx_api-2.186.0 → aws_cdk_cx_api-2.188.0}/setup.cfg +0 -0
  17. {aws_cdk_cx_api-2.186.0 → aws_cdk_cx_api-2.188.0}/src/aws_cdk/cx_api/py.typed +0 -0
  18. {aws_cdk_cx_api-2.186.0 → aws_cdk_cx_api-2.188.0}/src/aws_cdk.cx_api.egg-info/dependency_links.txt +0 -0
  19. {aws_cdk_cx_api-2.186.0 → aws_cdk_cx_api-2.188.0}/src/aws_cdk.cx_api.egg-info/top_level.txt +0 -0
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: aws-cdk.cx-api
3
- Version: 2.186.0
3
+ Version: 2.188.0
4
4
  Summary: Cloud executable protocol
5
5
  Home-page: https://github.com/aws/aws-cdk
6
6
  Author: Amazon Web Services
@@ -22,8 +22,8 @@ Requires-Python: ~=3.9
22
22
  Description-Content-Type: text/markdown
23
23
  License-File: LICENSE
24
24
  License-File: NOTICE
25
- Requires-Dist: aws-cdk.cloud-assembly-schema<41.0.0,>=40.6.0
26
- Requires-Dist: jsii<2.0.0,>=1.109.0
25
+ Requires-Dist: aws-cdk.cloud-assembly-schema<42.0.0,>=41.0.0
26
+ Requires-Dist: jsii<2.0.0,>=1.110.0
27
27
  Requires-Dist: publication>=0.0.3
28
28
  Requires-Dist: typeguard<4.3.0,>=2.13.3
29
29
 
@@ -644,16 +644,19 @@ When this feature flag is enabled, CDK expands the scope of usage data collectio
644
644
 
645
645
  * `@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy`
646
646
 
647
- When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
647
+ [Deprecated default feature] When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
648
648
  The purpose of this is to prevent lambda from creating a dependency on the Default Policy Statement.
649
649
  This solves an issue where a circular dependency could occur if adding lambda to something like a Cognito Trigger, then adding the User Pool to the lambda execution role permissions.
650
+ However in the current implementation, we have removed a dependency of the lambda function on the policy. In addition to this, a Role will be attached to the Policy instead of an inline policy being attached to the role.
651
+ This will create a data race condition in the CloudFormation template because the creation of the Lambda function no longer waits for the policy to be created. Having said that, we are not deprecating the feature (we are defaulting the feature flag to false for new stacks) since this feature can still be used to get around the circular dependency issue (issue-7016) particularly in cases where the lambda resource creation doesnt need to depend on the policy resource creation.
652
+ We recommend to unset the feature flag if already set which will restore the original behavior.
650
653
 
651
654
  *cdk.json*
652
655
 
653
656
  ```json
654
657
  {
655
658
  "context": {
656
- "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": true
659
+ "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": false
657
660
  }
658
661
  }
659
662
  ```
@@ -710,3 +713,36 @@ When this flag is disabled:
710
713
  }
711
714
  }
712
715
  ```
716
+
717
+ * `@aws-cdk/aws-dynamodb:retainTableReplica`
718
+
719
+ Currently, table replica will always be deleted when stack deletes regardless of source table's deletion policy.
720
+ When enabled, table replica will be default to the removal policy of source table unless specified otherwise.
721
+
722
+ *cdk.json*
723
+
724
+ ```json
725
+ {
726
+ "context": {
727
+ "@aws-cdk/aws-dynamodb:retainTableReplica": true
728
+ }
729
+ }
730
+ ```
731
+
732
+ * `@aws-cdk/cognito:logUserPoolClientSecretValue`
733
+
734
+ When this feature flag is enabled, the SDK API call response to desribe user pool client values will be logged in the custom
735
+ resource lambda function logs.
736
+
737
+ When this feature flag is disabled, the SDK API call response to describe user pool client values will not be logged in the custom
738
+ resource lambda function logs.
739
+
740
+ *cdk.json*
741
+
742
+ ```json
743
+ {
744
+ "context": {
745
+ "@aws-cdk/cognito:logUserPoolClientSecretValue": true
746
+ }
747
+ }
748
+ ```
@@ -1,32 +1,3 @@
1
- Metadata-Version: 2.1
2
- Name: aws-cdk.cx-api
3
- Version: 2.186.0
4
- Summary: Cloud executable protocol
5
- Home-page: https://github.com/aws/aws-cdk
6
- Author: Amazon Web Services
7
- License: Apache-2.0
8
- Project-URL: Source, https://github.com/aws/aws-cdk.git
9
- Classifier: Intended Audience :: Developers
10
- Classifier: Operating System :: OS Independent
11
- Classifier: Programming Language :: JavaScript
12
- Classifier: Programming Language :: Python :: 3 :: Only
13
- Classifier: Programming Language :: Python :: 3.9
14
- Classifier: Programming Language :: Python :: 3.10
15
- Classifier: Programming Language :: Python :: 3.11
16
- Classifier: Typing :: Typed
17
- Classifier: Development Status :: 5 - Production/Stable
18
- Classifier: License :: OSI Approved
19
- Classifier: Framework :: AWS CDK
20
- Classifier: Framework :: AWS CDK :: 2
21
- Requires-Python: ~=3.9
22
- Description-Content-Type: text/markdown
23
- License-File: LICENSE
24
- License-File: NOTICE
25
- Requires-Dist: aws-cdk.cloud-assembly-schema<41.0.0,>=40.6.0
26
- Requires-Dist: jsii<2.0.0,>=1.109.0
27
- Requires-Dist: publication>=0.0.3
28
- Requires-Dist: typeguard<4.3.0,>=2.13.3
29
-
30
1
  # Cloud Executable API
31
2
 
32
3
  This module is part of the [AWS Cloud Development Kit](https://github.com/aws/aws-cdk) project.
@@ -644,16 +615,19 @@ When this feature flag is enabled, CDK expands the scope of usage data collectio
644
615
 
645
616
  * `@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy`
646
617
 
647
- When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
618
+ [Deprecated default feature] When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
648
619
  The purpose of this is to prevent lambda from creating a dependency on the Default Policy Statement.
649
620
  This solves an issue where a circular dependency could occur if adding lambda to something like a Cognito Trigger, then adding the User Pool to the lambda execution role permissions.
621
+ However in the current implementation, we have removed a dependency of the lambda function on the policy. In addition to this, a Role will be attached to the Policy instead of an inline policy being attached to the role.
622
+ This will create a data race condition in the CloudFormation template because the creation of the Lambda function no longer waits for the policy to be created. Having said that, we are not deprecating the feature (we are defaulting the feature flag to false for new stacks) since this feature can still be used to get around the circular dependency issue (issue-7016) particularly in cases where the lambda resource creation doesnt need to depend on the policy resource creation.
623
+ We recommend to unset the feature flag if already set which will restore the original behavior.
650
624
 
651
625
  *cdk.json*
652
626
 
653
627
  ```json
654
628
  {
655
629
  "context": {
656
- "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": true
630
+ "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": false
657
631
  }
658
632
  }
659
633
  ```
@@ -710,3 +684,36 @@ When this flag is disabled:
710
684
  }
711
685
  }
712
686
  ```
687
+
688
+ * `@aws-cdk/aws-dynamodb:retainTableReplica`
689
+
690
+ Currently, table replica will always be deleted when stack deletes regardless of source table's deletion policy.
691
+ When enabled, table replica will be default to the removal policy of source table unless specified otherwise.
692
+
693
+ *cdk.json*
694
+
695
+ ```json
696
+ {
697
+ "context": {
698
+ "@aws-cdk/aws-dynamodb:retainTableReplica": true
699
+ }
700
+ }
701
+ ```
702
+
703
+ * `@aws-cdk/cognito:logUserPoolClientSecretValue`
704
+
705
+ When this feature flag is enabled, the SDK API call response to desribe user pool client values will be logged in the custom
706
+ resource lambda function logs.
707
+
708
+ When this feature flag is disabled, the SDK API call response to describe user pool client values will not be logged in the custom
709
+ resource lambda function logs.
710
+
711
+ *cdk.json*
712
+
713
+ ```json
714
+ {
715
+ "context": {
716
+ "@aws-cdk/cognito:logUserPoolClientSecretValue": true
717
+ }
718
+ }
719
+ ```
@@ -1,5 +1,5 @@
1
1
  [build-system]
2
- requires = ["setuptools~=70.0.0", "wheel~=0.42"]
2
+ requires = ["setuptools~=75.3.2", "wheel~=0.42"]
3
3
  build-backend = "setuptools.build_meta"
4
4
 
5
5
  [tool.pyright]
@@ -5,7 +5,7 @@ kwargs = json.loads(
5
5
  """
6
6
  {
7
7
  "name": "aws-cdk.cx-api",
8
- "version": "2.186.0",
8
+ "version": "2.188.0",
9
9
  "description": "Cloud executable protocol",
10
10
  "license": "Apache-2.0",
11
11
  "url": "https://github.com/aws/aws-cdk",
@@ -26,7 +26,7 @@ kwargs = json.loads(
26
26
  ],
27
27
  "package_data": {
28
28
  "aws_cdk.cx_api._jsii": [
29
- "cx-api@2.186.0.jsii.tgz"
29
+ "cx-api@2.188.0.jsii.tgz"
30
30
  ],
31
31
  "aws_cdk.cx_api": [
32
32
  "py.typed"
@@ -34,8 +34,8 @@ kwargs = json.loads(
34
34
  },
35
35
  "python_requires": "~=3.9",
36
36
  "install_requires": [
37
- "aws-cdk.cloud-assembly-schema>=40.6.0, <41.0.0",
38
- "jsii>=1.109.0, <2.0.0",
37
+ "aws-cdk.cloud-assembly-schema>=41.0.0, <42.0.0",
38
+ "jsii>=1.110.0, <2.0.0",
39
39
  "publication>=0.0.3",
40
40
  "typeguard>=2.13.3,<4.3.0"
41
41
  ],
@@ -616,16 +616,19 @@ When this feature flag is enabled, CDK expands the scope of usage data collectio
616
616
 
617
617
  * `@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy`
618
618
 
619
- When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
619
+ [Deprecated default feature] When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
620
620
  The purpose of this is to prevent lambda from creating a dependency on the Default Policy Statement.
621
621
  This solves an issue where a circular dependency could occur if adding lambda to something like a Cognito Trigger, then adding the User Pool to the lambda execution role permissions.
622
+ However in the current implementation, we have removed a dependency of the lambda function on the policy. In addition to this, a Role will be attached to the Policy instead of an inline policy being attached to the role.
623
+ This will create a data race condition in the CloudFormation template because the creation of the Lambda function no longer waits for the policy to be created. Having said that, we are not deprecating the feature (we are defaulting the feature flag to false for new stacks) since this feature can still be used to get around the circular dependency issue (issue-7016) particularly in cases where the lambda resource creation doesnt need to depend on the policy resource creation.
624
+ We recommend to unset the feature flag if already set which will restore the original behavior.
622
625
 
623
626
  *cdk.json*
624
627
 
625
628
  ```json
626
629
  {
627
630
  "context": {
628
- "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": true
631
+ "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": false
629
632
  }
630
633
  }
631
634
  ```
@@ -682,6 +685,39 @@ When this flag is disabled:
682
685
  }
683
686
  }
684
687
  ```
688
+
689
+ * `@aws-cdk/aws-dynamodb:retainTableReplica`
690
+
691
+ Currently, table replica will always be deleted when stack deletes regardless of source table's deletion policy.
692
+ When enabled, table replica will be default to the removal policy of source table unless specified otherwise.
693
+
694
+ *cdk.json*
695
+
696
+ ```json
697
+ {
698
+ "context": {
699
+ "@aws-cdk/aws-dynamodb:retainTableReplica": true
700
+ }
701
+ }
702
+ ```
703
+
704
+ * `@aws-cdk/cognito:logUserPoolClientSecretValue`
705
+
706
+ When this feature flag is enabled, the SDK API call response to desribe user pool client values will be logged in the custom
707
+ resource lambda function logs.
708
+
709
+ When this feature flag is disabled, the SDK API call response to describe user pool client values will not be logged in the custom
710
+ resource lambda function logs.
711
+
712
+ *cdk.json*
713
+
714
+ ```json
715
+ {
716
+ "context": {
717
+ "@aws-cdk/cognito:logUserPoolClientSecretValue": true
718
+ }
719
+ }
720
+ ```
685
721
  '''
686
722
  from pkgutil import extend_path
687
723
  __path__ = extend_path(__path__, __name__)
@@ -31,7 +31,7 @@ def check_type(argname: str, value: object, expected_type: typing.Any) -> typing
31
31
  import aws_cdk.cloud_assembly_schema._jsii
32
32
 
33
33
  __jsii_assembly__ = jsii.JSIIAssembly.load(
34
- "@aws-cdk/cx-api", "2.186.0", __name__[0:-6], "cx-api@2.186.0.jsii.tgz"
34
+ "@aws-cdk/cx-api", "2.188.0", __name__[0:-6], "cx-api@2.188.0.jsii.tgz"
35
35
  )
36
36
 
37
37
  __all__ = [
@@ -1,3 +1,32 @@
1
+ Metadata-Version: 2.1
2
+ Name: aws-cdk.cx-api
3
+ Version: 2.188.0
4
+ Summary: Cloud executable protocol
5
+ Home-page: https://github.com/aws/aws-cdk
6
+ Author: Amazon Web Services
7
+ License: Apache-2.0
8
+ Project-URL: Source, https://github.com/aws/aws-cdk.git
9
+ Classifier: Intended Audience :: Developers
10
+ Classifier: Operating System :: OS Independent
11
+ Classifier: Programming Language :: JavaScript
12
+ Classifier: Programming Language :: Python :: 3 :: Only
13
+ Classifier: Programming Language :: Python :: 3.9
14
+ Classifier: Programming Language :: Python :: 3.10
15
+ Classifier: Programming Language :: Python :: 3.11
16
+ Classifier: Typing :: Typed
17
+ Classifier: Development Status :: 5 - Production/Stable
18
+ Classifier: License :: OSI Approved
19
+ Classifier: Framework :: AWS CDK
20
+ Classifier: Framework :: AWS CDK :: 2
21
+ Requires-Python: ~=3.9
22
+ Description-Content-Type: text/markdown
23
+ License-File: LICENSE
24
+ License-File: NOTICE
25
+ Requires-Dist: aws-cdk.cloud-assembly-schema<42.0.0,>=41.0.0
26
+ Requires-Dist: jsii<2.0.0,>=1.110.0
27
+ Requires-Dist: publication>=0.0.3
28
+ Requires-Dist: typeguard<4.3.0,>=2.13.3
29
+
1
30
  # Cloud Executable API
2
31
 
3
32
  This module is part of the [AWS Cloud Development Kit](https://github.com/aws/aws-cdk) project.
@@ -615,16 +644,19 @@ When this feature flag is enabled, CDK expands the scope of usage data collectio
615
644
 
616
645
  * `@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy`
617
646
 
618
- When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
647
+ [Deprecated default feature] When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
619
648
  The purpose of this is to prevent lambda from creating a dependency on the Default Policy Statement.
620
649
  This solves an issue where a circular dependency could occur if adding lambda to something like a Cognito Trigger, then adding the User Pool to the lambda execution role permissions.
650
+ However in the current implementation, we have removed a dependency of the lambda function on the policy. In addition to this, a Role will be attached to the Policy instead of an inline policy being attached to the role.
651
+ This will create a data race condition in the CloudFormation template because the creation of the Lambda function no longer waits for the policy to be created. Having said that, we are not deprecating the feature (we are defaulting the feature flag to false for new stacks) since this feature can still be used to get around the circular dependency issue (issue-7016) particularly in cases where the lambda resource creation doesnt need to depend on the policy resource creation.
652
+ We recommend to unset the feature flag if already set which will restore the original behavior.
621
653
 
622
654
  *cdk.json*
623
655
 
624
656
  ```json
625
657
  {
626
658
  "context": {
627
- "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": true
659
+ "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": false
628
660
  }
629
661
  }
630
662
  ```
@@ -681,3 +713,36 @@ When this flag is disabled:
681
713
  }
682
714
  }
683
715
  ```
716
+
717
+ * `@aws-cdk/aws-dynamodb:retainTableReplica`
718
+
719
+ Currently, table replica will always be deleted when stack deletes regardless of source table's deletion policy.
720
+ When enabled, table replica will be default to the removal policy of source table unless specified otherwise.
721
+
722
+ *cdk.json*
723
+
724
+ ```json
725
+ {
726
+ "context": {
727
+ "@aws-cdk/aws-dynamodb:retainTableReplica": true
728
+ }
729
+ }
730
+ ```
731
+
732
+ * `@aws-cdk/cognito:logUserPoolClientSecretValue`
733
+
734
+ When this feature flag is enabled, the SDK API call response to desribe user pool client values will be logged in the custom
735
+ resource lambda function logs.
736
+
737
+ When this feature flag is disabled, the SDK API call response to describe user pool client values will not be logged in the custom
738
+ resource lambda function logs.
739
+
740
+ *cdk.json*
741
+
742
+ ```json
743
+ {
744
+ "context": {
745
+ "@aws-cdk/cognito:logUserPoolClientSecretValue": true
746
+ }
747
+ }
748
+ ```
@@ -12,4 +12,4 @@ src/aws_cdk.cx_api.egg-info/top_level.txt
12
12
  src/aws_cdk/cx_api/__init__.py
13
13
  src/aws_cdk/cx_api/py.typed
14
14
  src/aws_cdk/cx_api/_jsii/__init__.py
15
- src/aws_cdk/cx_api/_jsii/cx-api@2.186.0.jsii.tgz
15
+ src/aws_cdk/cx_api/_jsii/cx-api@2.188.0.jsii.tgz
@@ -0,0 +1,4 @@
1
+ aws-cdk.cloud-assembly-schema<42.0.0,>=41.0.0
2
+ jsii<2.0.0,>=1.110.0
3
+ publication>=0.0.3
4
+ typeguard<4.3.0,>=2.13.3
@@ -1,4 +0,0 @@
1
- aws-cdk.cloud-assembly-schema<41.0.0,>=40.6.0
2
- jsii<2.0.0,>=1.109.0
3
- publication>=0.0.3
4
- typeguard<4.3.0,>=2.13.3