aws-cdk.cx-api 2.187.0__tar.gz → 2.189.0__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk.cx-api might be problematic. Click here for more details.

Files changed (18) hide show
  1. {aws_cdk_cx_api-2.187.0/src/aws_cdk.cx_api.egg-info → aws_cdk_cx_api-2.189.0}/PKG-INFO +24 -3
  2. {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.189.0}/README.md +23 -2
  3. {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.189.0}/setup.py +2 -2
  4. {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.189.0}/src/aws_cdk/cx_api/__init__.py +23 -2
  5. {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.189.0}/src/aws_cdk/cx_api/_jsii/__init__.py +1 -1
  6. aws_cdk_cx_api-2.189.0/src/aws_cdk/cx_api/_jsii/cx-api@2.189.0.jsii.tgz +0 -0
  7. {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.189.0/src/aws_cdk.cx_api.egg-info}/PKG-INFO +24 -3
  8. {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.189.0}/src/aws_cdk.cx_api.egg-info/SOURCES.txt +1 -1
  9. aws_cdk_cx_api-2.187.0/src/aws_cdk/cx_api/_jsii/cx-api@2.187.0.jsii.tgz +0 -0
  10. {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.189.0}/LICENSE +0 -0
  11. {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.189.0}/MANIFEST.in +0 -0
  12. {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.189.0}/NOTICE +0 -0
  13. {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.189.0}/pyproject.toml +0 -0
  14. {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.189.0}/setup.cfg +0 -0
  15. {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.189.0}/src/aws_cdk/cx_api/py.typed +0 -0
  16. {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.189.0}/src/aws_cdk.cx_api.egg-info/dependency_links.txt +0 -0
  17. {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.189.0}/src/aws_cdk.cx_api.egg-info/requires.txt +0 -0
  18. {aws_cdk_cx_api-2.187.0 → aws_cdk_cx_api-2.189.0}/src/aws_cdk.cx_api.egg-info/top_level.txt +0 -0
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: aws-cdk.cx-api
3
- Version: 2.187.0
3
+ Version: 2.189.0
4
4
  Summary: Cloud executable protocol
5
5
  Home-page: https://github.com/aws/aws-cdk
6
6
  Author: Amazon Web Services
@@ -644,16 +644,19 @@ When this feature flag is enabled, CDK expands the scope of usage data collectio
644
644
 
645
645
  * `@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy`
646
646
 
647
- When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
647
+ [Deprecated default feature] When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
648
648
  The purpose of this is to prevent lambda from creating a dependency on the Default Policy Statement.
649
649
  This solves an issue where a circular dependency could occur if adding lambda to something like a Cognito Trigger, then adding the User Pool to the lambda execution role permissions.
650
+ However in the current implementation, we have removed a dependency of the lambda function on the policy. In addition to this, a Role will be attached to the Policy instead of an inline policy being attached to the role.
651
+ This will create a data race condition in the CloudFormation template because the creation of the Lambda function no longer waits for the policy to be created. Having said that, we are not deprecating the feature (we are defaulting the feature flag to false for new stacks) since this feature can still be used to get around the circular dependency issue (issue-7016) particularly in cases where the lambda resource creation doesnt need to depend on the policy resource creation.
652
+ We recommend to unset the feature flag if already set which will restore the original behavior.
650
653
 
651
654
  *cdk.json*
652
655
 
653
656
  ```json
654
657
  {
655
658
  "context": {
656
- "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": true
659
+ "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": false
657
660
  }
658
661
  }
659
662
  ```
@@ -725,3 +728,21 @@ When enabled, table replica will be default to the removal policy of source tabl
725
728
  }
726
729
  }
727
730
  ```
731
+
732
+ * `@aws-cdk/cognito:logUserPoolClientSecretValue`
733
+
734
+ When this feature flag is enabled, the SDK API call response to desribe user pool client values will be logged in the custom
735
+ resource lambda function logs.
736
+
737
+ When this feature flag is disabled, the SDK API call response to describe user pool client values will not be logged in the custom
738
+ resource lambda function logs.
739
+
740
+ *cdk.json*
741
+
742
+ ```json
743
+ {
744
+ "context": {
745
+ "@aws-cdk/cognito:logUserPoolClientSecretValue": true
746
+ }
747
+ }
748
+ ```
@@ -615,16 +615,19 @@ When this feature flag is enabled, CDK expands the scope of usage data collectio
615
615
 
616
616
  * `@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy`
617
617
 
618
- When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
618
+ [Deprecated default feature] When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
619
619
  The purpose of this is to prevent lambda from creating a dependency on the Default Policy Statement.
620
620
  This solves an issue where a circular dependency could occur if adding lambda to something like a Cognito Trigger, then adding the User Pool to the lambda execution role permissions.
621
+ However in the current implementation, we have removed a dependency of the lambda function on the policy. In addition to this, a Role will be attached to the Policy instead of an inline policy being attached to the role.
622
+ This will create a data race condition in the CloudFormation template because the creation of the Lambda function no longer waits for the policy to be created. Having said that, we are not deprecating the feature (we are defaulting the feature flag to false for new stacks) since this feature can still be used to get around the circular dependency issue (issue-7016) particularly in cases where the lambda resource creation doesnt need to depend on the policy resource creation.
623
+ We recommend to unset the feature flag if already set which will restore the original behavior.
621
624
 
622
625
  *cdk.json*
623
626
 
624
627
  ```json
625
628
  {
626
629
  "context": {
627
- "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": true
630
+ "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": false
628
631
  }
629
632
  }
630
633
  ```
@@ -696,3 +699,21 @@ When enabled, table replica will be default to the removal policy of source tabl
696
699
  }
697
700
  }
698
701
  ```
702
+
703
+ * `@aws-cdk/cognito:logUserPoolClientSecretValue`
704
+
705
+ When this feature flag is enabled, the SDK API call response to desribe user pool client values will be logged in the custom
706
+ resource lambda function logs.
707
+
708
+ When this feature flag is disabled, the SDK API call response to describe user pool client values will not be logged in the custom
709
+ resource lambda function logs.
710
+
711
+ *cdk.json*
712
+
713
+ ```json
714
+ {
715
+ "context": {
716
+ "@aws-cdk/cognito:logUserPoolClientSecretValue": true
717
+ }
718
+ }
719
+ ```
@@ -5,7 +5,7 @@ kwargs = json.loads(
5
5
  """
6
6
  {
7
7
  "name": "aws-cdk.cx-api",
8
- "version": "2.187.0",
8
+ "version": "2.189.0",
9
9
  "description": "Cloud executable protocol",
10
10
  "license": "Apache-2.0",
11
11
  "url": "https://github.com/aws/aws-cdk",
@@ -26,7 +26,7 @@ kwargs = json.loads(
26
26
  ],
27
27
  "package_data": {
28
28
  "aws_cdk.cx_api._jsii": [
29
- "cx-api@2.187.0.jsii.tgz"
29
+ "cx-api@2.189.0.jsii.tgz"
30
30
  ],
31
31
  "aws_cdk.cx_api": [
32
32
  "py.typed"
@@ -616,16 +616,19 @@ When this feature flag is enabled, CDK expands the scope of usage data collectio
616
616
 
617
617
  * `@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy`
618
618
 
619
- When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
619
+ [Deprecated default feature] When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
620
620
  The purpose of this is to prevent lambda from creating a dependency on the Default Policy Statement.
621
621
  This solves an issue where a circular dependency could occur if adding lambda to something like a Cognito Trigger, then adding the User Pool to the lambda execution role permissions.
622
+ However in the current implementation, we have removed a dependency of the lambda function on the policy. In addition to this, a Role will be attached to the Policy instead of an inline policy being attached to the role.
623
+ This will create a data race condition in the CloudFormation template because the creation of the Lambda function no longer waits for the policy to be created. Having said that, we are not deprecating the feature (we are defaulting the feature flag to false for new stacks) since this feature can still be used to get around the circular dependency issue (issue-7016) particularly in cases where the lambda resource creation doesnt need to depend on the policy resource creation.
624
+ We recommend to unset the feature flag if already set which will restore the original behavior.
622
625
 
623
626
  *cdk.json*
624
627
 
625
628
  ```json
626
629
  {
627
630
  "context": {
628
- "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": true
631
+ "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": false
629
632
  }
630
633
  }
631
634
  ```
@@ -697,6 +700,24 @@ When enabled, table replica will be default to the removal policy of source tabl
697
700
  }
698
701
  }
699
702
  ```
703
+
704
+ * `@aws-cdk/cognito:logUserPoolClientSecretValue`
705
+
706
+ When this feature flag is enabled, the SDK API call response to desribe user pool client values will be logged in the custom
707
+ resource lambda function logs.
708
+
709
+ When this feature flag is disabled, the SDK API call response to describe user pool client values will not be logged in the custom
710
+ resource lambda function logs.
711
+
712
+ *cdk.json*
713
+
714
+ ```json
715
+ {
716
+ "context": {
717
+ "@aws-cdk/cognito:logUserPoolClientSecretValue": true
718
+ }
719
+ }
720
+ ```
700
721
  '''
701
722
  from pkgutil import extend_path
702
723
  __path__ = extend_path(__path__, __name__)
@@ -31,7 +31,7 @@ def check_type(argname: str, value: object, expected_type: typing.Any) -> typing
31
31
  import aws_cdk.cloud_assembly_schema._jsii
32
32
 
33
33
  __jsii_assembly__ = jsii.JSIIAssembly.load(
34
- "@aws-cdk/cx-api", "2.187.0", __name__[0:-6], "cx-api@2.187.0.jsii.tgz"
34
+ "@aws-cdk/cx-api", "2.189.0", __name__[0:-6], "cx-api@2.189.0.jsii.tgz"
35
35
  )
36
36
 
37
37
  __all__ = [
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: aws-cdk.cx-api
3
- Version: 2.187.0
3
+ Version: 2.189.0
4
4
  Summary: Cloud executable protocol
5
5
  Home-page: https://github.com/aws/aws-cdk
6
6
  Author: Amazon Web Services
@@ -644,16 +644,19 @@ When this feature flag is enabled, CDK expands the scope of usage data collectio
644
644
 
645
645
  * `@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy`
646
646
 
647
- When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
647
+ [Deprecated default feature] When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy.
648
648
  The purpose of this is to prevent lambda from creating a dependency on the Default Policy Statement.
649
649
  This solves an issue where a circular dependency could occur if adding lambda to something like a Cognito Trigger, then adding the User Pool to the lambda execution role permissions.
650
+ However in the current implementation, we have removed a dependency of the lambda function on the policy. In addition to this, a Role will be attached to the Policy instead of an inline policy being attached to the role.
651
+ This will create a data race condition in the CloudFormation template because the creation of the Lambda function no longer waits for the policy to be created. Having said that, we are not deprecating the feature (we are defaulting the feature flag to false for new stacks) since this feature can still be used to get around the circular dependency issue (issue-7016) particularly in cases where the lambda resource creation doesnt need to depend on the policy resource creation.
652
+ We recommend to unset the feature flag if already set which will restore the original behavior.
650
653
 
651
654
  *cdk.json*
652
655
 
653
656
  ```json
654
657
  {
655
658
  "context": {
656
- "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": true
659
+ "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": false
657
660
  }
658
661
  }
659
662
  ```
@@ -725,3 +728,21 @@ When enabled, table replica will be default to the removal policy of source tabl
725
728
  }
726
729
  }
727
730
  ```
731
+
732
+ * `@aws-cdk/cognito:logUserPoolClientSecretValue`
733
+
734
+ When this feature flag is enabled, the SDK API call response to desribe user pool client values will be logged in the custom
735
+ resource lambda function logs.
736
+
737
+ When this feature flag is disabled, the SDK API call response to describe user pool client values will not be logged in the custom
738
+ resource lambda function logs.
739
+
740
+ *cdk.json*
741
+
742
+ ```json
743
+ {
744
+ "context": {
745
+ "@aws-cdk/cognito:logUserPoolClientSecretValue": true
746
+ }
747
+ }
748
+ ```
@@ -12,4 +12,4 @@ src/aws_cdk.cx_api.egg-info/top_level.txt
12
12
  src/aws_cdk/cx_api/__init__.py
13
13
  src/aws_cdk/cx_api/py.typed
14
14
  src/aws_cdk/cx_api/_jsii/__init__.py
15
- src/aws_cdk/cx_api/_jsii/cx-api@2.187.0.jsii.tgz
15
+ src/aws_cdk/cx_api/_jsii/cx-api@2.189.0.jsii.tgz