aws-cdk.cx-api 2.187.0__tar.gz → 2.188.0__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk.cx-api might be problematic. Click here for more details.
- {aws_cdk_cx_api-2.187.0/src/aws_cdk.cx_api.egg-info → aws_cdk_cx_api-2.188.0}/PKG-INFO +24 -3
- {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.188.0}/README.md +23 -2
- {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.188.0}/setup.py +2 -2
- {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.188.0}/src/aws_cdk/cx_api/__init__.py +23 -2
- {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.188.0}/src/aws_cdk/cx_api/_jsii/__init__.py +1 -1
- aws_cdk_cx_api-2.188.0/src/aws_cdk/cx_api/_jsii/cx-api@2.188.0.jsii.tgz +0 -0
- {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.188.0/src/aws_cdk.cx_api.egg-info}/PKG-INFO +24 -3
- {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.188.0}/src/aws_cdk.cx_api.egg-info/SOURCES.txt +1 -1
- aws_cdk_cx_api-2.187.0/src/aws_cdk/cx_api/_jsii/cx-api@2.187.0.jsii.tgz +0 -0
- {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.188.0}/LICENSE +0 -0
- {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.188.0}/MANIFEST.in +0 -0
- {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.188.0}/NOTICE +0 -0
- {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.188.0}/pyproject.toml +0 -0
- {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.188.0}/setup.cfg +0 -0
- {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.188.0}/src/aws_cdk/cx_api/py.typed +0 -0
- {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.188.0}/src/aws_cdk.cx_api.egg-info/dependency_links.txt +0 -0
- {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.188.0}/src/aws_cdk.cx_api.egg-info/requires.txt +0 -0
- {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.188.0}/src/aws_cdk.cx_api.egg-info/top_level.txt +0 -0
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.1
|
|
2
2
|
Name: aws-cdk.cx-api
|
|
3
|
-
Version: 2.
|
|
3
|
+
Version: 2.188.0
|
|
4
4
|
Summary: Cloud executable protocol
|
|
5
5
|
Home-page: https://github.com/aws/aws-cdk
|
|
6
6
|
Author: Amazon Web Services
|
|
@@ -644,16 +644,19 @@ When this feature flag is enabled, CDK expands the scope of usage data collectio
|
|
|
644
644
|
|
|
645
645
|
* `@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy`
|
|
646
646
|
|
|
647
|
-
When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
|
|
647
|
+
[Deprecated default feature] When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
|
|
648
648
|
The purpose of this is to prevent lambda from creating a dependency on the Default Policy Statement.
|
|
649
649
|
This solves an issue where a circular dependency could occur if adding lambda to something like a Cognito Trigger, then adding the User Pool to the lambda execution role permissions.
|
|
650
|
+
However in the current implementation, we have removed a dependency of the lambda function on the policy. In addition to this, a Role will be attached to the Policy instead of an inline policy being attached to the role.
|
|
651
|
+
This will create a data race condition in the CloudFormation template because the creation of the Lambda function no longer waits for the policy to be created. Having said that, we are not deprecating the feature (we are defaulting the feature flag to false for new stacks) since this feature can still be used to get around the circular dependency issue (issue-7016) particularly in cases where the lambda resource creation doesnt need to depend on the policy resource creation.
|
|
652
|
+
We recommend to unset the feature flag if already set which will restore the original behavior.
|
|
650
653
|
|
|
651
654
|
*cdk.json*
|
|
652
655
|
|
|
653
656
|
```json
|
|
654
657
|
{
|
|
655
658
|
"context": {
|
|
656
|
-
"@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy":
|
|
659
|
+
"@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": false
|
|
657
660
|
}
|
|
658
661
|
}
|
|
659
662
|
```
|
|
@@ -725,3 +728,21 @@ When enabled, table replica will be default to the removal policy of source tabl
|
|
|
725
728
|
}
|
|
726
729
|
}
|
|
727
730
|
```
|
|
731
|
+
|
|
732
|
+
* `@aws-cdk/cognito:logUserPoolClientSecretValue`
|
|
733
|
+
|
|
734
|
+
When this feature flag is enabled, the SDK API call response to desribe user pool client values will be logged in the custom
|
|
735
|
+
resource lambda function logs.
|
|
736
|
+
|
|
737
|
+
When this feature flag is disabled, the SDK API call response to describe user pool client values will not be logged in the custom
|
|
738
|
+
resource lambda function logs.
|
|
739
|
+
|
|
740
|
+
*cdk.json*
|
|
741
|
+
|
|
742
|
+
```json
|
|
743
|
+
{
|
|
744
|
+
"context": {
|
|
745
|
+
"@aws-cdk/cognito:logUserPoolClientSecretValue": true
|
|
746
|
+
}
|
|
747
|
+
}
|
|
748
|
+
```
|
|
@@ -615,16 +615,19 @@ When this feature flag is enabled, CDK expands the scope of usage data collectio
|
|
|
615
615
|
|
|
616
616
|
* `@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy`
|
|
617
617
|
|
|
618
|
-
When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
|
|
618
|
+
[Deprecated default feature] When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
|
|
619
619
|
The purpose of this is to prevent lambda from creating a dependency on the Default Policy Statement.
|
|
620
620
|
This solves an issue where a circular dependency could occur if adding lambda to something like a Cognito Trigger, then adding the User Pool to the lambda execution role permissions.
|
|
621
|
+
However in the current implementation, we have removed a dependency of the lambda function on the policy. In addition to this, a Role will be attached to the Policy instead of an inline policy being attached to the role.
|
|
622
|
+
This will create a data race condition in the CloudFormation template because the creation of the Lambda function no longer waits for the policy to be created. Having said that, we are not deprecating the feature (we are defaulting the feature flag to false for new stacks) since this feature can still be used to get around the circular dependency issue (issue-7016) particularly in cases where the lambda resource creation doesnt need to depend on the policy resource creation.
|
|
623
|
+
We recommend to unset the feature flag if already set which will restore the original behavior.
|
|
621
624
|
|
|
622
625
|
*cdk.json*
|
|
623
626
|
|
|
624
627
|
```json
|
|
625
628
|
{
|
|
626
629
|
"context": {
|
|
627
|
-
"@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy":
|
|
630
|
+
"@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": false
|
|
628
631
|
}
|
|
629
632
|
}
|
|
630
633
|
```
|
|
@@ -696,3 +699,21 @@ When enabled, table replica will be default to the removal policy of source tabl
|
|
|
696
699
|
}
|
|
697
700
|
}
|
|
698
701
|
```
|
|
702
|
+
|
|
703
|
+
* `@aws-cdk/cognito:logUserPoolClientSecretValue`
|
|
704
|
+
|
|
705
|
+
When this feature flag is enabled, the SDK API call response to desribe user pool client values will be logged in the custom
|
|
706
|
+
resource lambda function logs.
|
|
707
|
+
|
|
708
|
+
When this feature flag is disabled, the SDK API call response to describe user pool client values will not be logged in the custom
|
|
709
|
+
resource lambda function logs.
|
|
710
|
+
|
|
711
|
+
*cdk.json*
|
|
712
|
+
|
|
713
|
+
```json
|
|
714
|
+
{
|
|
715
|
+
"context": {
|
|
716
|
+
"@aws-cdk/cognito:logUserPoolClientSecretValue": true
|
|
717
|
+
}
|
|
718
|
+
}
|
|
719
|
+
```
|
|
@@ -5,7 +5,7 @@ kwargs = json.loads(
|
|
|
5
5
|
"""
|
|
6
6
|
{
|
|
7
7
|
"name": "aws-cdk.cx-api",
|
|
8
|
-
"version": "2.
|
|
8
|
+
"version": "2.188.0",
|
|
9
9
|
"description": "Cloud executable protocol",
|
|
10
10
|
"license": "Apache-2.0",
|
|
11
11
|
"url": "https://github.com/aws/aws-cdk",
|
|
@@ -26,7 +26,7 @@ kwargs = json.loads(
|
|
|
26
26
|
],
|
|
27
27
|
"package_data": {
|
|
28
28
|
"aws_cdk.cx_api._jsii": [
|
|
29
|
-
"cx-api@2.
|
|
29
|
+
"cx-api@2.188.0.jsii.tgz"
|
|
30
30
|
],
|
|
31
31
|
"aws_cdk.cx_api": [
|
|
32
32
|
"py.typed"
|
|
@@ -616,16 +616,19 @@ When this feature flag is enabled, CDK expands the scope of usage data collectio
|
|
|
616
616
|
|
|
617
617
|
* `@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy`
|
|
618
618
|
|
|
619
|
-
When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
|
|
619
|
+
[Deprecated default feature] When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
|
|
620
620
|
The purpose of this is to prevent lambda from creating a dependency on the Default Policy Statement.
|
|
621
621
|
This solves an issue where a circular dependency could occur if adding lambda to something like a Cognito Trigger, then adding the User Pool to the lambda execution role permissions.
|
|
622
|
+
However in the current implementation, we have removed a dependency of the lambda function on the policy. In addition to this, a Role will be attached to the Policy instead of an inline policy being attached to the role.
|
|
623
|
+
This will create a data race condition in the CloudFormation template because the creation of the Lambda function no longer waits for the policy to be created. Having said that, we are not deprecating the feature (we are defaulting the feature flag to false for new stacks) since this feature can still be used to get around the circular dependency issue (issue-7016) particularly in cases where the lambda resource creation doesnt need to depend on the policy resource creation.
|
|
624
|
+
We recommend to unset the feature flag if already set which will restore the original behavior.
|
|
622
625
|
|
|
623
626
|
*cdk.json*
|
|
624
627
|
|
|
625
628
|
```json
|
|
626
629
|
{
|
|
627
630
|
"context": {
|
|
628
|
-
"@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy":
|
|
631
|
+
"@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": false
|
|
629
632
|
}
|
|
630
633
|
}
|
|
631
634
|
```
|
|
@@ -697,6 +700,24 @@ When enabled, table replica will be default to the removal policy of source tabl
|
|
|
697
700
|
}
|
|
698
701
|
}
|
|
699
702
|
```
|
|
703
|
+
|
|
704
|
+
* `@aws-cdk/cognito:logUserPoolClientSecretValue`
|
|
705
|
+
|
|
706
|
+
When this feature flag is enabled, the SDK API call response to desribe user pool client values will be logged in the custom
|
|
707
|
+
resource lambda function logs.
|
|
708
|
+
|
|
709
|
+
When this feature flag is disabled, the SDK API call response to describe user pool client values will not be logged in the custom
|
|
710
|
+
resource lambda function logs.
|
|
711
|
+
|
|
712
|
+
*cdk.json*
|
|
713
|
+
|
|
714
|
+
```json
|
|
715
|
+
{
|
|
716
|
+
"context": {
|
|
717
|
+
"@aws-cdk/cognito:logUserPoolClientSecretValue": true
|
|
718
|
+
}
|
|
719
|
+
}
|
|
720
|
+
```
|
|
700
721
|
'''
|
|
701
722
|
from pkgutil import extend_path
|
|
702
723
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -31,7 +31,7 @@ def check_type(argname: str, value: object, expected_type: typing.Any) -> typing
|
|
|
31
31
|
import aws_cdk.cloud_assembly_schema._jsii
|
|
32
32
|
|
|
33
33
|
__jsii_assembly__ = jsii.JSIIAssembly.load(
|
|
34
|
-
"@aws-cdk/cx-api", "2.
|
|
34
|
+
"@aws-cdk/cx-api", "2.188.0", __name__[0:-6], "cx-api@2.188.0.jsii.tgz"
|
|
35
35
|
)
|
|
36
36
|
|
|
37
37
|
__all__ = [
|
|
Binary file
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.1
|
|
2
2
|
Name: aws-cdk.cx-api
|
|
3
|
-
Version: 2.
|
|
3
|
+
Version: 2.188.0
|
|
4
4
|
Summary: Cloud executable protocol
|
|
5
5
|
Home-page: https://github.com/aws/aws-cdk
|
|
6
6
|
Author: Amazon Web Services
|
|
@@ -644,16 +644,19 @@ When this feature flag is enabled, CDK expands the scope of usage data collectio
|
|
|
644
644
|
|
|
645
645
|
* `@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy`
|
|
646
646
|
|
|
647
|
-
When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
|
|
647
|
+
[Deprecated default feature] When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
|
|
648
648
|
The purpose of this is to prevent lambda from creating a dependency on the Default Policy Statement.
|
|
649
649
|
This solves an issue where a circular dependency could occur if adding lambda to something like a Cognito Trigger, then adding the User Pool to the lambda execution role permissions.
|
|
650
|
+
However in the current implementation, we have removed a dependency of the lambda function on the policy. In addition to this, a Role will be attached to the Policy instead of an inline policy being attached to the role.
|
|
651
|
+
This will create a data race condition in the CloudFormation template because the creation of the Lambda function no longer waits for the policy to be created. Having said that, we are not deprecating the feature (we are defaulting the feature flag to false for new stacks) since this feature can still be used to get around the circular dependency issue (issue-7016) particularly in cases where the lambda resource creation doesnt need to depend on the policy resource creation.
|
|
652
|
+
We recommend to unset the feature flag if already set which will restore the original behavior.
|
|
650
653
|
|
|
651
654
|
*cdk.json*
|
|
652
655
|
|
|
653
656
|
```json
|
|
654
657
|
{
|
|
655
658
|
"context": {
|
|
656
|
-
"@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy":
|
|
659
|
+
"@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": false
|
|
657
660
|
}
|
|
658
661
|
}
|
|
659
662
|
```
|
|
@@ -725,3 +728,21 @@ When enabled, table replica will be default to the removal policy of source tabl
|
|
|
725
728
|
}
|
|
726
729
|
}
|
|
727
730
|
```
|
|
731
|
+
|
|
732
|
+
* `@aws-cdk/cognito:logUserPoolClientSecretValue`
|
|
733
|
+
|
|
734
|
+
When this feature flag is enabled, the SDK API call response to desribe user pool client values will be logged in the custom
|
|
735
|
+
resource lambda function logs.
|
|
736
|
+
|
|
737
|
+
When this feature flag is disabled, the SDK API call response to describe user pool client values will not be logged in the custom
|
|
738
|
+
resource lambda function logs.
|
|
739
|
+
|
|
740
|
+
*cdk.json*
|
|
741
|
+
|
|
742
|
+
```json
|
|
743
|
+
{
|
|
744
|
+
"context": {
|
|
745
|
+
"@aws-cdk/cognito:logUserPoolClientSecretValue": true
|
|
746
|
+
}
|
|
747
|
+
}
|
|
748
|
+
```
|
|
Binary file
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
{aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.188.0}/src/aws_cdk.cx_api.egg-info/dependency_links.txt
RENAMED
|
File without changes
|
|
File without changes
|
|
File without changes
|