aws-cdk-cx-api 2.220.0


pip install aws-cdk-cx-api

  Latest version

Released: Oct 14, 2025

Project Links

Meta
Author: Amazon Web Services
Requires Python: ~=3.9

Classifiers

Intended Audience
  • Developers

Operating System
  • OS Independent

Programming Language
  • JavaScript
  • Python :: 3 :: Only
  • Python :: 3.9
  • Python :: 3.10
  • Python :: 3.11

Typing
  • Typed

Development Status
  • 5 - Production/Stable

License
  • OSI Approved

Framework
  • AWS CDK
  • AWS CDK :: 2

Cloud Executable API

This module is part of the AWS Cloud Development Kit project.

V2 Feature Flags

  • @aws-cdk/aws-s3:createDefaultLoggingPolicy

Enable this feature flag to create an S3 bucket policy by default in cases where an AWS service would automatically create the Policy if one does not exist.

For example, in order to send VPC flow logs to an S3 bucket, there is a specific Bucket Policy that needs to be attached to the bucket. If you create the bucket without a policy and then add the bucket as the flow log destination, the service will automatically create the bucket policy with the necessary permissions. If you were to then try and add your own bucket policy CloudFormation will throw and error indicating that a bucket policy already exists.

In cases where we know what the required policy is we can go ahead and create the policy so we can remain in control of it.

https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AWS-logs-and-resource-policy.html#AWS-logs-infrastructure-S3

cdk.json

{
  "context": {
    "@aws-cdk/aws-s3:createDefaultLoggingPolicy": true
  }
}
  • @aws-cdk/aws-sns-subscriptions:restrictSqsDescryption

Enable this feature flag to restrict the decryption of a SQS queue, which is subscribed to a SNS topic, to only the topic which it is subscribed to and not the whole SNS service of an account.

Previously the decryption was only restricted to the SNS service principal. To make the SQS subscription more secure, it is a good practice to restrict the decryption further and only allow the connected SNS topic to decryption the subscribed queue.

cdk.json

{
  "context": {
    "@aws-cdk/aws-sns-subscriptions:restrictSqsDescryption": true
  }
}
  • @aws-cdk/aws-apigateway:disableCloudWatchRole

Enable this feature flag to change the default behavior for aws-apigateway.RestApi and aws-apigateway.SpecRestApi to not create a CloudWatch role and Account. There is only a single ApiGateway account per AWS environment which means that each time you create a RestApi in your account the ApiGateway account is overwritten. If at some point the newest RestApi is deleted, the ApiGateway Account and CloudWatch role will also be deleted, breaking any existing ApiGateways that were depending on them.

When this flag is enabled you should either create the ApiGateway account and CloudWatch role separately or only enable the cloudWatchRole on a single RestApi.

cdk.json

{
  "context": {
    "@aws-cdk/aws-apigateway:disableCloudWatchRole": true
  }
}
  • @aws-cdk/core:enablePartitionLiterals

Enable this feature flag to have Stack.partition return a literal string for a stack's partition when the stack has a known region configured. If the region is undefined, or set to an unknown value, the Stack.partition will be the CloudFormation intrinsic value AWS::Partition. Without this feature flag, Stack.partition always returns the CloudFormation intrinsic value AWS::Partition.

This feature will often simplify ARN strings in CDK generated templates, for example:

 Principal:
   AWS:
     Fn::Join:
       - ""
       - - "arn:"
         - Ref: AWS::Partition
         - :iam::123456789876:root

becomes:

 Principal:
   AWS: "arn:aws:iam::123456789876:root"
  • @aws-cdk/aws-ecs:disableExplicitDeploymentControllerForCircuitBreaker

Enable this feature flag to avoid setting the "ECS" deployment controller when adding a circuit breaker to an ECS Service, as this will trigger a full replacement which fails to deploy when using set service names. This does not change any behaviour as the default deployment controller when it is not defined is ECS.

cdk.json

{
  "context": {
    "@aws-cdk/aws-ecs:disableExplicitDeploymentControllerForCircuitBreaker": true
  }
}
  • @aws-cdk/aws-s3:serverAccessLogsUseBucketPolicy

Enable this feature flag to use S3 Bucket Policy for granting permission fo Server Access Logging rather than using the canned LogDeliveryWrite ACL. ACLs do not work when Object Ownership is enabled on the bucket.

This flag uses a Bucket Policy statement to allow Server Access Log delivery, following best practices for S3.

https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html

{
  "context": {
    "@aws-cdk/aws-s3:serverAccessLogsUseBucketPolicy": true
  }
}
  • @aws-cdk/aws-rds:databaseProxyUniqueResourceName

Enable this feature flag to use unique resource names for each DatabaseProxy.

Previously, the default behavior for DatabaseProxy was to use id of the constructor for dbProxyName. In this case, users couldn't deploy DatabaseProxys that have the same id in the same region.

This is a feature flag as the old behavior was technically incorrect, but users may have come to depend on it.

{
  "context": {
    "@aws-cdk/aws-rds:databaseProxyUniqueResourceName": true
  }
}
  • @aws-cdk/aws-redshift:columnId

Enable this feature flag to allow the CDK to track changes in Redshift columns through their id attribute. This is a breaking change, as the name attribute was currently being used to track changes to Redshift columns.

Enabling this feature flag comes at a risk for existing Redshift columns, as the name attribute of a redshift column was currently being used. Therefore, to change a Redshift columns' name will essentially create a new column and delete the old one. This will cause data loss. If you choose to enable this flag, ensure that upon intial deployment (the first deployment after setting this feature flag), the name attribute of every column is not changed. After the intial deployment, you can freely change the name attribute of a column.

cdk.json

{
  "context": {
    "@aws-cdk/aws-redshift:columnId": true
  }
}
  • @aws-cdk/aws-stepfunctions-tasks:enableEmrServicePolicyV2

Enable this feature flag to use the AmazonEMRServicePolicy_v2 managed policies for the EMR service role.

This is a feature flag as the old behavior will be deprecated, but some resources may require manual intervention since they might not have the appropriate tags propagated automatically.

https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-iam-policies.html

cdk.json

{
  "context": {
    "@aws-cdk/aws-stepfunctions-tasks:enableEmrServicePolicyV2": true
  }
}
  • @aws-cdk/core:includePrefixInUniqueNameGeneration

Enable this feature flag to include the stack's prefixes to the name generation process.

Not doing so can cause the name of stack to exceed 128 characters:

  • The name generation ensures it doesn't exceed 128 characters
  • Without this feature flag, the prefix is prepended to the generated name, which result can exceed 128 characters

This is a feature flag as it changes the name generated for stacks. Any CDK application deployed prior this fix will most likely be generated with a new name, causing the stack to be recreated with the new name, and then deleting the old one. For applications running on production environments this can be unmanageable.

cdk.json

{
  "context": {
    "@aws-cdk/core:includePrefixInUniqueNameGeneration": true
  }
}
  • @aws-cdk/aws-lambda-nodejs:useLatestRuntimeVersion

Enable this feature flag to automatically use the latest available NodeJS version in the aws-lambda-nodejse.Function construct.

This allows creation of new functions using a version that will automatically stay up to date without breaking bundling of existing functions that externalize packages included in their environemnt such as aws-sdk.

Functions defined previously will continue to function correctly as long as they pass an explicit runtime version, or do not exclude packages during bundling.

cdk.json

{
  "context": {
    "@aws-cdk/aws-lambda-nodejs:useLatestRuntimeVersion": true
  }
}
  • @aws-cdk/aws-codepipeline-actions:useNewDefaultBranchForCodeCommitSource

Enable this feature flag to update the default branch for CodeCommit source actions to main.

Previously, the default branch for CodeCommit source actions was set to master. However, this convention is no longer supported, and repositories created after March 2021 now have main as their default branch.

cdk.json

{
  "context": {
    "@aws-cdk/aws-codepipeline-actions:useNewDefaultBranchForCodeCommitSource": true
  }
}
  • @aws-cdk/aws-cloudwatch-actions:changeLambdaPermissionLogicalIdForLambdaAction

Enable this feature flag to change the logical ID of the LambdaPermission for the LambdaAction to include an alarm ID.

Previously, only one alarm with the LambdaAction could be created per Lambda. This flag allows multiple alarms with the LambdaAction for the same Lambda to be created.

cdk.json

{
  "context": {
    "@aws-cdk/aws-cloudwatch-actions:changeLambdaPermissionLogicalIdForLambdaAction": true
  }
}
  • @aws-cdk/aws-codepipeline:crossAccountKeysDefaultValueToFalse

Enables Pipeline to set the default value for crossAccountKeys to false.

When this feature flag is enabled, and the crossAccountKeys property is not provided in a Pipeline construct, the construct automatically defaults the value of this property to false.

cdk.json

{
  "context": {
    "@aws-cdk/aws-codepipeline:crossAccountKeysDefaultValueToFalse": true
  }
}
  • @aws-cdk/aws-codepipeline:defaultPipelineTypeToV2

Enables Pipeline to set the default pipeline type to V2.

When this feature flag is enabled, and the pipelineType property is not provided in a Pipeline construct, the construct automatically defaults the value of this property to PipelineType.V2.

cdk.json

{
  "context": {
    "@aws-cdk/aws-codepipeline:defaultPipelineTypeToV2": true
  }
}
  • @aws-cdk/aws-kms:reduceCrossAccountRegionPolicyScope

Reduce resource scope of the IAM Policy created from KMS key grant to granting key only.

When this feature flag is enabled and calling KMS key grant method, the created IAM policy will reduce the resource scope from '*' to this specific granting KMS key.

cdk.json

{
  "context": {
    "@aws-cdk/aws-kms:reduceCrossAccountRegionPolicyScope": true
  }
}
  • @aws-cdk/aws-kms:applyImportedAliasPermissionsToPrincipal

Enable grant methods on imported KMS Aliases to apply permissions scoped by the alias using the kms:ResourceAliases condition key. When this flag is disabled, grant* methods on Alias.fromAliasName remain no-ops to preserve existing behavior.

cdk.json

{
  "context": {
    "@aws-cdk/aws-kms:applyImportedAliasPermissionsToPrincipal": true
  }
}
  • @aws-cdk/aws-eks:nodegroupNameAttribute

When enabled, nodegroupName attribute of the provisioned EKS NodeGroup will not have the cluster name prefix.

When this feature flag is enabled, the nodegroupName attribute will be exactly the name of the nodegroup without any prefix.

cdk.json

{
  "context": {
    "@aws-cdk/aws-eks:nodegroupNameAttribute": true
  }
}
  • @aws-cdk/aws-ec2:ebsDefaultGp3Volume

When enabled, the default volume type of the EBS volume will be GP3.

When this featuer flag is enabled, the default volume type of the EBS volume will be EbsDeviceVolumeType.GENERAL_PURPOSE_SSD_GP3

cdk.json

{
  "context": {
    "@aws-cdk/aws-ec2:ebsDefaultGp3Volume": true
  }
}
  • @aws-cdk/aws-ecs:removeDefaultDeploymentAlarm

When enabled, remove default deployment alarm settings.

When this featuer flag is enabled, remove the default deployment alarm settings when creating a AWS ECS service.

cdk.json

{
  "context": {
    "@aws-cdk/aws-ec2:ebsDefaultGp3Volume": true
  }
}
  • @aws-cdk/aws-stepfunctions-tasks:ecsReduceRunTaskPermissions

When enabled, IAM Policy created to run tasks won't include the task definition ARN, only the revision ARN.

When this feature flag is enabled, the IAM Policy created to run tasks won't include the task definition ARN, only the revision ARN. The revision ARN is more specific than the task definition ARN. See https://docs.aws.amazon.com/step-functions/latest/dg/ecs-iam.html for more details.

cdk.json

{
  "context": {
    "@aws-cdk/aws-stepfunctions-tasks:ecsReduceRunTaskPermissions": true
  }
}
  • @aws-cdk/aws-stepfunctions-taks:useNewS3UriParametersForBedrockInvokeModelTask

When enabled, use new props for S3 URI under input and output fields in task definition of state machine for bedrock invoke model.

When this feature flag is enabled, use newly introduced props s3InputUri and s3OutputUri to populate S3 uri under input and output fields in state machine task definition for Bedrock invoke model.

cdk.json

{
  "context": {
    "@aws-cdk/aws-stepfunctions-tasks:useNewS3UriParametersForBedrockInvokeModelTask": true
  }
}
  • @aws-cdk/aws-ecs:reduceEc2FargateCloudWatchPermissions

Currently, we will automatically add a number of cloudwatch permissions to the task role when no cloudwatch log group is specified as logConfiguration and it will grant 'Resources': ['*'] to the task role.

When this feature flag is enabled, we will only grant the necessary permissions when users specify cloudwatch log group.

cdk.json

{
  "context": {
    "@aws-cdk/aws-ecs:reduceEc2FargateCloudWatchPermissions": true
  }
}
  • @aws-cdk/aws-ec2:ec2SumTImeoutEnabled

Currently is both initOptions.timeout and resourceSignalTimeout are both specified in the options for creating an EC2 Instance, only the value from 'resourceSignalTimeout' will be used.

When this feature flag is enabled, if both initOptions.timeout and resourceSignalTimeout are specified, the values will to be summed together.

cdk.json

{
  "context": {
    "@aws-cdk/aws-ec2:ec2SumTImeoutEnabled": true
  }
}
  • @aws-cdk/aws-appsync:appSyncGraphQLAPIScopeLambdaPermission

Currently, when using a Lambda authorizer with an AppSync GraphQL API, the AWS CDK automatically generates the necessary AWS::Lambda::Permission to allow the AppSync API to invoke the Lambda authorizer. This permission is overly permissive because it lacks a SourceArn, meaning it allows invocations from any source.

When this feature flag is enabled, the AWS::Lambda::Permission will be properly scoped with the SourceArn corresponding to the specific AppSync GraphQL API.

cdk.json

{
  "context": {
    "@aws-cdk/aws-ec2:appSyncGraphQLAPIScopeLambdaPermission": true
  }
}
  • @aws-cdk/aws-rds:setCorrectValueForDatabaseInstanceReadReplicaInstanceResourceId

When enabled, the value of property instanceResourceId in construct DatabaseInstanceReadReplica will be set to the correct value which is DbiResourceId instead of currently DbInstanceArn* (fix)

When this feature flag is enabled, the value of that property will be as expected set to DbiResourceId attribute, and that will fix the grantConnect method.

cdk.json

{
  "context": {
    "@aws-cdk/aws-rds:setCorrectValueForDatabaseInstanceReadReplicaInstanceResourceId": true
  }
}
  • @aws-cdk/aws-lambda-nodejs:sdkV3ExcludeSmithyPackages

Currently, when bundling Lambda functions with the non-latest runtime that supports AWS SDK JavaScript (v3), only the @aws-sdk/* packages are excluded by default. However, this can cause version mismatches between the @aws-sdk/* and @smithy/* packages, as they are tightly coupled dependencies in AWS SDK v3.

When this feature flag is enabled, both @aws-sdk/* and @smithy/* packages will be excluded during the bundling process. This ensures that no mismatches occur between these tightly coupled dependencies when using the AWS SDK v3 in Lambda functions.

cdk.json

{
  "context": {
    "@aws-cdk/aws-lambda-nodejs:sdkV3ExcludeSmithyPackages": true
  }
}
  • @aws-cdk/aws-dynamodb:resourcePolicyPerReplica

If this flag is not set, the default behavior for TableV2 is to use a different resourcePolicy for each replica.

If this flag is set to false, the behavior is that each replica shares the same resourcePolicy as the source table. This will prevent you from creating a new table which has an additional replica and a resource policy.

This is a feature flag as the old behavior was technically incorrect but users may have come to depend on it.

cdk.json

{
  "context": {
    "@aws-cdk/aws-dynamodb:resourcePolicyPerReplica": false,
  },
}
  • @aws-cdk/aws-route53-targets:userPoolDomainNameMethodWithoutCustomResource

When enabled, use a new method for DNS Name of user pool domain target without creating a custom resource.

When this feature flag is enabled, a new method will be used to get the DNS Name of the user pool domain target. The old method creates a custom resource internally, but the new method doesn't need a custom resource.

If the flag is set to false then a custom resource will be created when using UserPoolDomainTarget.

cdk.json

{
  "context": {
    "@aws-cdk/aws-route53-targets:userPoolDomainNameMethodWithoutCustomResource": true
  }
}
  • @aws-cdk/aws-ecs:disableEcsImdsBlocking

When set to true, CDK synth will throw exception if canContainersAccessInstanceRole is false.

In an ECS Cluster with MachineImageType.AMAZON_LINUX_2, the canContainersAccessInstanceRole=false option attempts to add commands to block containers from accessing IMDS. CDK cannot guarantee the correct execution of the feature in all platforms. Setting this feature flag to true will ensure CDK does not attempt to implement IMDS blocking. By end of 2025, CDK will remove the IMDS blocking feature. See Github discussion for more information.

It is recommended to follow ECS documentation to block IMDS for your specific platform and cluster configuration.

cdk.json

{
  "context": {
    "@aws-cdk/aws-ecs:disableEcsImdsBlocking": true
  }
}
  • @aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature

When set to true along with canContainersAccessInstanceRole=false in ECS cluster, new updated commands will be added to UserData to block container accessing IMDS. Applicable to Linux only.

In an ECS Cluster with MachineImageType.AMAZON_LINUX_2, the canContainersAccessInstanceRole=false option attempts to add commands to block containers from accessing IMDS. Set this flag to true in order to use new and updated commands. Please note that this feature alone with this feature flag will be deprecated by end of 2025 as CDK cannot guarantee the correct execution of the feature in all platforms. See Github discussion for more information.

It is recommended to follow ECS documentation to block IMDS for your specific platform and cluster configuration.

cdk.json

{
  "context": {
    "@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature": false,
  },
}
  • @aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault

When enabled, the default security group ingress rules will allow IPv6 ingress from anywhere, For internet facing ALBs with dualstack-without-public-ipv4 IP address type, the default security group rules will allow IPv6 ingress from anywhere (::/0). Previously, the default security group rules would only allow IPv4 ingress.

Using a feature flag to make sure existing customers who might be relying on the overly restrictive permissions are not broken.,

If the flag is set to false then the default security group rules will only allow IPv4 ingress.

cdk.json

{
  "context": {
    "@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault": true
  }
}
  • @aws-cdk/aws-iam:oidcRejectUnauthorizedConnections

When this feature flag is enabled, the default behaviour of OIDC Provider's custom resource handler will default to reject unauthorized connections when downloading CA Certificates.

When this feature flag is disabled, the behaviour will be the same as current and will allow downloading thumbprints from unsecure connnections.

cdk.json

{
  "context": {
    "@aws-cdk/aws-iam:oidcRejectUnauthorizedConnections": true
  }
}
  • @aws-cdk/core:enableAdditionalMetadataCollection

When this feature flag is enabled, CDK expands the scope of usage data collection to include the:

  • L2 construct property keys - Collect which property keys you use from the L2 constructs in your app. This includes property keys nested in dictionary objects.
  • L2 construct property values of BOOL and ENUM types - Collect property key values of only BOOL and ENUM types. All other types, such as string values or construct references will be redacted.
  • L2 construct method usage - Collection method name, parameter keys and parameter values of BOOL and ENUM type.

cdk.json

{
  "context": {
    "@aws-cdk/core:enableAdditionalMetadataCollection": true
  }
}
  • @aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy

[Deprecated default feature] When this feature flag is enabled, Lambda will create new inline policies with AddToRolePolicy. The purpose of this is to prevent lambda from creating a dependency on the Default Policy Statement. This solves an issue where a circular dependency could occur if adding lambda to something like a Cognito Trigger, then adding the User Pool to the lambda execution role permissions. However in the current implementation, we have removed a dependency of the lambda function on the policy. In addition to this, a Role will be attached to the Policy instead of an inline policy being attached to the role. This will create a data race condition in the CloudFormation template because the creation of the Lambda function no longer waits for the policy to be created. Having said that, we are not deprecating the feature (we are defaulting the feature flag to false for new stacks) since this feature can still be used to get around the circular dependency issue (issue-7016) particularly in cases where the lambda resource creation doesnt need to depend on the policy resource creation. We recommend to unset the feature flag if already set which will restore the original behavior.

cdk.json

{
  "context": {
    "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": false
  }
}
  • @aws-cdk/aws-s3:setUniqueReplicationRoleName

When this feature flag is enabled, a unique role name is specified only when performing cross-account replication. When disabled, 'CDKReplicationRole' is always specified.

cdk.json

{
  "context": {
    "@aws-cdk/aws-s3:setUniqueReplicationRoleName": true
  }
}
  • @aws-cdk/pipelines:reduceStageRoleTrustScope

When this feature flag is enabled, the root account principal will not be added to the trust policy of stage role. When this feature flag is disabled, it will keep the root account principal in the trust policy.

cdk.json

{
  "context": {
    "@aws-cdk/pipelines:reduceStageRoleTrustScope": true
  }
}
  • @aws-cdk/aws-events:requireEventBusPolicySid

When this flag is enabled:

  • Resource policies will be created with Statement IDs for service principals
  • The operation will succeed as expected

When this flag is disabled:

  • A warning will be emitted
  • The grant operation will be dropped
  • No permissions will be added

cdk.json

{
  "context": {
    "@aws-cdk/aws-events:requireEventBusPolicySid": true
  }
}
  • @aws-cdk/aws-dynamodb:retainTableReplica

Currently, table replica will always be deleted when stack deletes regardless of source table's deletion policy. When enabled, table replica will be default to the removal policy of source table unless specified otherwise.

cdk.json

{
  "context": {
    "@aws-cdk/aws-dynamodb:retainTableReplica": true
  }
}
  • @aws-cdk/cognito:logUserPoolClientSecretValue

When this feature flag is enabled, the SDK API call response to desribe user pool client values will be logged in the custom resource lambda function logs.

When this feature flag is disabled, the SDK API call response to describe user pool client values will not be logged in the custom resource lambda function logs.

cdk.json

{
  "context": {
    "@aws-cdk/cognito:logUserPoolClientSecretValue": true
  }
}
  • @aws-cdk/aws-s3:publicAccessBlockedByDefault

When BlockPublicAccess is not set at all, s3's default behavior will be to set all options to true in aws console. The previous behavior in cdk before this feature was; if only some of the BlockPublicAccessOptions were set (not all 4), then the ones undefined would default to false. This is counter intuitive to the console behavior where the options would start in true state and a user would uncheck the boxes as needed. The new behavior from this feature will allow a user, for example, to set 1 of the 4 BlockPublicAccessOpsions to false, and on deployment the other 3 will remain true.

cdk.json

{
  "context": {
    "@aws-cdk/aws-s3:publicAccessBlockedByDefault": true
  }
}
  • @aws-cdk/aws-ec2:requirePrivateSubnetsForEgressOnlyInternetGateway

When this feature flag is enabled, EgressOnlyGateway is created only for dual-stack VPC with private subnets

When this feature flag is disabled, EgressOnlyGateway resource is created for all dual-stack VPC regardless of subnet type

cdk.json

{
  "context": {
    "@aws-cdk/aws-ec2:requirePrivateSubnetsForEgressOnlyInternetGateway": true
  }
}
  • @aws-cdk/aws-signer:signingProfileNamePassedToCfn

When this feature flag is enabled, the signingProfileName property is passed to the L1 CfnSigningProfile construct, which ensures that the AWS Signer profile is created with the specified name.

When this feature flag is disabled, the signingProfileName is not passed to CloudFormation, maintaining backward compatibility with existing deployments where CloudFormation auto-generated profile names.

This feature flag is needed because enabling it can cause existing signing profiles to be replaced during deployment if a signingProfileName was specified but not previously used in the CloudFormation template.

cdk.json

{
  "context": {
    "@aws-cdk/aws-signer:signingProfileNamePassedToCfn": true
  }
}
2.220.0 Oct 14, 2025
2.219.0 Oct 01, 2025
2.218.0 Sep 29, 2025
2.217.0 Sep 25, 2025
2.216.0 Sep 22, 2025
2.215.0 Sep 15, 2025
2.214.1 Oct 03, 2025
2.214.0 Sep 02, 2025
2.213.0 Aug 28, 2025
2.212.0 Aug 20, 2025
2.211.0 Aug 13, 2025
2.210.0 Aug 06, 2025
2.209.1 Aug 06, 2025
2.209.0 Aug 05, 2025
2.208.0 Jul 29, 2025
2.207.0 Jul 24, 2025
2.206.0 Jul 16, 2025
2.205.0 Jul 15, 2025
2.204.0 Jul 04, 2025
2.203.1 Jul 02, 2025
2.203.0 Jul 01, 2025
2.202.0 Jun 20, 2025
2.201.0 Jun 13, 2025
2.200.2 Jun 12, 2025
2.200.1 Jun 03, 2025
2.200.0 Jun 02, 2025
2.199.0 May 27, 2025
2.198.0 May 23, 2025
2.197.0 May 21, 2025
2.196.1 May 19, 2025
2.196.0 May 16, 2025
2.195.0 May 07, 2025
2.194.0 May 02, 2025
2.193.0 Apr 30, 2025
2.192.0 Apr 25, 2025
2.191.0 Apr 23, 2025
2.190.0 Apr 17, 2025
2.189.1 Apr 14, 2025
2.189.0 Apr 09, 2025
2.188.0 Apr 04, 2025
2.187.0 Mar 31, 2025
2.186.0 Mar 27, 2025
2.185.0 Mar 19, 2025
2.184.1 Mar 14, 2025
2.184.0 Mar 13, 2025
2.183.0 Mar 12, 2025
2.182.0 Mar 05, 2025
2.181.1 Feb 28, 2025
2.181.0 Feb 26, 2025
2.180.0 Feb 21, 2025
2.179.0 Feb 18, 2025
2.178.2 Feb 12, 2025
2.178.1 Feb 07, 2025
2.178.0 Feb 06, 2025
2.177.0 Jan 25, 2025
2.176.0 Jan 15, 2025
2.175.1 Jan 11, 2025
2.175.0 Jan 10, 2025
2.174.1 Jan 07, 2025
2.174.0 Jan 04, 2025
2.173.4 Dec 27, 2024
2.173.3 Dec 26, 2024
2.173.2 Dec 18, 2024
2.173.1 Dec 14, 2024
2.173.0 Dec 12, 2024
2.172.0 Dec 07, 2024
2.171.1 Nov 27, 2024
2.171.0 Nov 25, 2024
2.170.0 Nov 22, 2024
2.169.0 Nov 21, 2024
2.168.0 Nov 20, 2024
2.167.2 Nov 19, 2024
2.167.1 Nov 15, 2024
2.167.0 Nov 13, 2024
2.166.0 Nov 07, 2024
2.165.0 Oct 31, 2024
2.164.1 Oct 25, 2024
2.164.0 Oct 24, 2024
2.163.1 Oct 22, 2024
2.163.0 Oct 22, 2024
2.162.1 Oct 11, 2024
2.162.0 Oct 10, 2024
2.161.1 Oct 05, 2024
2.161.0 Oct 04, 2024
2.160.0 Sep 24, 2024
2.159.1 Sep 19, 2024
2.159.0 Sep 19, 2024
2.158.0 Sep 11, 2024
2.157.0 Sep 10, 2024
2.156.0 Sep 06, 2024
2.155.0 Aug 30, 2024
2.154.1 Aug 23, 2024
2.154.0 Aug 22, 2024
2.153.0 Aug 20, 2024
2.152.0 Aug 15, 2024
2.151.1 Aug 14, 2024
2.151.0 Aug 02, 2024
2.150.0 Jul 23, 2024
2.149.0 Jul 12, 2024
2.148.1 Jul 11, 2024
2.148.0 Jul 05, 2024
2.147.3 Jul 02, 2024
2.147.2 Jun 28, 2024
2.147.1 Jun 24, 2024
2.147.0 Jun 20, 2024
2.146.0 Jun 13, 2024
2.145.0 Jun 07, 2024
2.144.0 May 31, 2024
2.143.1 May 30, 2024
2.143.0 May 24, 2024
2.142.1 May 17, 2024
2.142.0 May 15, 2024
2.141.0 May 08, 2024
2.140.0 May 02, 2024
2.139.1 Apr 30, 2024
2.139.0 Apr 24, 2024
2.138.0 Apr 18, 2024
2.137.0 Apr 11, 2024
2.136.1 Apr 10, 2024
2.136.0 Apr 06, 2024
2.135.0 Apr 02, 2024
2.134.0 Mar 26, 2024
2.133.0 Mar 15, 2024
2.132.1 Mar 12, 2024
2.132.0 Mar 09, 2024
2.131.0 Mar 01, 2024
2.130.0 Feb 23, 2024
2.129.0 Feb 21, 2024
2.128.0 Feb 14, 2024
2.127.0 Feb 10, 2024
2.126.0 Feb 02, 2024
2.125.0 Feb 01, 2024
2.124.0 Jan 26, 2024
2.123.0 Jan 24, 2024
2.122.0 Jan 18, 2024
2.121.1 Jan 13, 2024
2.121.0 Jan 12, 2024
2.120.0 Jan 12, 2024
2.119.0 Jan 11, 2024
2.118.0 Jan 03, 2024
2.117.0 Dec 27, 2023
2.116.1 Dec 22, 2023
2.116.0 Dec 22, 2023
2.115.0 Dec 14, 2023
2.114.1 Dec 06, 2023
2.114.0 Dec 05, 2023
2.113.0 Dec 01, 2023
2.112.0 Dec 01, 2023
2.111.0 Nov 27, 2023
2.110.1 Nov 22, 2023
2.110.0 Nov 17, 2023
2.109.0 Nov 16, 2023
2.108.1 Nov 14, 2023
2.108.0 Nov 14, 2023
2.107.0 Nov 13, 2023
2.106.1 Nov 11, 2023
2.106.0 Nov 10, 2023
2.105.0 Nov 08, 2023
2.104.0 Nov 02, 2023
2.103.1 Oct 27, 2023
2.103.0 Oct 26, 2023
2.102.1 Oct 25, 2023
2.102.0 Oct 19, 2023
2.101.1 Oct 16, 2023
2.101.0 Oct 13, 2023
2.100.0 Oct 06, 2023
2.99.1 Sep 30, 2023
2.99.0 Sep 27, 2023
2.98.0 Sep 26, 2023
2.97.1 Sep 26, 2023
2.97.0 Sep 22, 2023
2.96.2 Sep 15, 2023
2.96.1 Sep 14, 2023
2.96.0 Sep 13, 2023
2.95.1 Sep 09, 2023
2.95.0 Sep 07, 2023
2.94.0 Sep 01, 2023
2.93.0 Aug 23, 2023
2.92.0 Aug 15, 2023
2.91.0 Aug 10, 2023
2.90.0 Aug 04, 2023
2.89.0 Jul 28, 2023
2.88.0 Jul 20, 2023
2.87.0 Jul 06, 2023
2.86.0 Jun 29, 2023
2.85.0 Jun 21, 2023
2.84.0 Jun 14, 2023
2.83.1 Jun 09, 2023
2.83.0 Jun 07, 2023
2.82.0 Jun 02, 2023
2.81.0 May 25, 2023
2.80.0 May 20, 2023
2.79.1 May 11, 2023
2.79.0 May 10, 2023
2.78.0 May 04, 2023
2.77.0 Apr 26, 2023
2.76.0 Apr 20, 2023
2.75.1 Apr 19, 2023
2.75.0 Apr 18, 2023
2.74.0 Apr 13, 2023
2.73.0 Apr 06, 2023
2.72.1 Mar 31, 2023
2.72.0 Mar 29, 2023
2.71.0 Mar 29, 2023
2.70.0 Mar 22, 2023
2.69.0 Mar 14, 2023
2.68.0 Mar 08, 2023
2.67.0 Mar 02, 2023
2.66.1 Feb 24, 2023
2.66.0 Feb 21, 2023
2.65.0 Feb 15, 2023
2.64.0 Feb 09, 2023
2.63.2 Feb 04, 2023
2.63.1 Feb 03, 2023
2.63.0 Jan 31, 2023
2.62.2 Jan 27, 2023
2.62.1 Jan 26, 2023
2.62.0 Jan 25, 2023
2.61.1 Jan 20, 2023
2.61.0 Jan 19, 2023
2.60.0 Jan 12, 2023
2.59.0 Jan 03, 2023
2.58.1 Dec 30, 2022
2.58.0 Dec 29, 2022
2.57.0 Dec 27, 2022
2.56.1 Dec 23, 2022
2.56.0 Dec 21, 2022
2.55.1 Dec 16, 2022
2.55.0 Dec 14, 2022
2.54.0 Dec 07, 2022
2.53.0 Nov 29, 2022
2.52.1 Nov 29, 2022
2.52.0 Nov 27, 2022
2.51.1 Nov 18, 2022
2.51.0 Nov 18, 2022
2.50.0 Nov 01, 2022
2.49.1 Nov 01, 2022
2.49.0 Oct 28, 2022
2.48.0 Oct 27, 2022
2.47.0 Oct 20, 2022
2.46.0 Oct 13, 2022
2.45.0 Oct 06, 2022
2.44.0 Sep 29, 2022
2.43.1 Sep 23, 2022
2.43.0 Sep 21, 2022
2.42.1 Sep 19, 2022
2.42.0 Sep 16, 2022
2.41.0 Sep 08, 2022
2.40.0 Sep 01, 2022
2.39.1 Aug 29, 2022
2.39.0 Aug 25, 2022
2.38.1 Aug 18, 2022
2.38.0 Aug 17, 2022
2.37.1 Aug 10, 2022
2.37.0 Aug 09, 2022
2.36.0 Aug 08, 2022
2.35.0 Aug 02, 2022
2.34.2 Jul 30, 2022
2.34.1 Jul 29, 2022
2.34.0 Jul 29, 2022
2.33.0 Jul 19, 2022
2.32.1 Jul 16, 2022
2.32.0 Jul 14, 2022
2.31.2 Jul 14, 2022
2.31.1 Jul 09, 2022
2.31.0 Jul 06, 2022
2.30.0 Jul 01, 2022
2.29.1 Jun 24, 2022
2.29.0 Jun 23, 2022
2.28.1 Jun 16, 2022
2.28.0 Jun 14, 2022
2.27.0 Jun 03, 2022
2.26.0 May 30, 2022
2.25.0 May 21, 2022
2.24.1 May 13, 2022
2.24.0 May 12, 2022
2.23.0 May 04, 2022
2.22.0 Apr 28, 2022
2.21.1 Apr 23, 2022
2.21.0 Apr 22, 2022
2.20.0 Apr 07, 2022
2.19.0 Apr 01, 2022
2.18.0 Mar 29, 2022
2.17.0 Mar 17, 2022
2.16.0 Mar 12, 2022
2.15.0 Mar 01, 2022
2.14.0 Feb 25, 2022
2.13.0 Feb 19, 2022
2.12.0 Feb 09, 2022
2.11.0 Feb 08, 2022
2.10.0 Jan 29, 2022
2.9.0 Jan 26, 2022
2.8.0 Jan 13, 2022
2.7.0 Jan 12, 2022
2.6.0 Jan 12, 2022
2.5.0 Jan 09, 2022
2.4.0 Jan 06, 2022
2.3.0 Dec 22, 2021
2.2.0 Dec 15, 2021
2.1.0 Dec 08, 2021
2.0.0 Dec 02, 2021
2.0.0rc33 Nov 26, 2021
2.0.0rc32 Nov 25, 2021
2.0.0rc31 Nov 23, 2021
2.0.0rc30 Nov 17, 2021
2.0.0rc29 Nov 10, 2021
2.0.0rc28 Nov 09, 2021
2.0.0rc27 Oct 27, 2021
2.0.0rc26 Oct 26, 2021
2.0.0rc25 Oct 22, 2021
2.0.0rc24 Oct 13, 2021
2.0.0rc23 Sep 23, 2021
2.0.0rc22 Sep 22, 2021
2.0.0rc21 Sep 08, 2021
2.0.0rc20 Sep 01, 2021
2.0.0rc19 Aug 25, 2021
2.0.0rc18 Aug 18, 2021
2.0.0rc17 Aug 11, 2021
2.0.0rc16 Aug 04, 2021
2.0.0rc15 Jul 28, 2021
2.0.0rc14 Jul 21, 2021
2.0.0rc13 Jul 20, 2021
2.0.0rc12 Jul 19, 2021
2.0.0rc11 Jul 07, 2021
2.0.0rc10 Jun 30, 2021
2.0.0rc9 Jun 23, 2021
2.0.0rc8 Jun 16, 2021
2.0.0rc7 Jun 09, 2021
2.0.0rc6 Jun 02, 2021
2.0.0rc5 May 28, 2021
2.0.0rc4 May 19, 2021
2.0.0rc3 May 12, 2021
2.0.0rc1 Apr 29, 2021
2.0.0a14 Apr 28, 2021
2.0.0a13 Apr 21, 2021
2.0.0a12 Apr 21, 2021
2.0.0a11 Apr 19, 2021
2.0.0a10 Apr 14, 2021
2.0.0a6 Mar 03, 2021
2.0.0a5 Feb 22, 2021
2.0.0a4 Feb 10, 2021
2.0.0a3 Feb 03, 2021
2.0.0a2 Jan 27, 2021
2.0.0a1 Jan 21, 2021
1.204.0 Jun 19, 2023
1.203.0 May 31, 2023
1.202.0 May 22, 2023
1.201.0 May 10, 2023
1.200.0 Apr 26, 2023
1.199.0 Apr 20, 2023
1.198.1 Mar 31, 2023
1.198.0 Mar 22, 2023
1.197.0 Mar 14, 2023
1.196.0 Mar 08, 2023
1.195.0 Mar 02, 2023
1.194.0 Feb 21, 2023
1.193.0 Feb 15, 2023
1.192.0 Feb 09, 2023
1.191.0 Jan 31, 2023
1.190.0 Jan 25, 2023
1.189.0 Jan 19, 2023
1.188.0 Jan 11, 2023
1.187.0 Jan 03, 2023
1.186.1 Dec 30, 2022
1.186.0 Dec 29, 2022
1.185.0 Dec 28, 2022
1.184.1 Dec 23, 2022
1.184.0 Dec 22, 2022
1.183.0 Dec 15, 2022
1.182.0 Dec 07, 2022
1.181.1 Nov 29, 2022
1.181.0 Nov 18, 2022
1.180.0 Nov 01, 2022
1.179.0 Oct 27, 2022
1.178.0 Oct 20, 2022
1.177.0 Oct 13, 2022
1.176.0 Oct 06, 2022
1.175.0 Sep 29, 2022
1.174.0 Sep 22, 2022
1.173.0 Sep 16, 2022
1.172.0 Sep 08, 2022
1.171.0 Aug 31, 2022
1.170.1 Aug 31, 2022
1.170.0 Aug 25, 2022
1.169.0 Aug 18, 2022
1.168.0 Aug 09, 2022
1.167.0 Aug 02, 2022
1.166.1 Jul 29, 2022
1.165.0 Jul 19, 2022
1.164.0 Jul 16, 2022
1.163.2 Jul 14, 2022
1.163.1 Jul 09, 2022
1.163.0 Jul 06, 2022
1.162.0 Jul 01, 2022
1.161.0 Jun 23, 2022
1.160.0 Jun 14, 2022
1.159.0 Jun 03, 2022
1.158.0 May 27, 2022
1.157.0 May 21, 2022
1.156.1 May 13, 2022
1.156.0 May 12, 2022
1.155.0 May 04, 2022
1.154.0 Apr 28, 2022
1.153.1 Apr 23, 2022
1.153.0 Apr 22, 2022
1.152.0 Apr 07, 2022
1.151.0 Apr 01, 2022
1.150.0 Mar 26, 2022
1.149.0 Mar 17, 2022
1.148.0 Mar 10, 2022
1.147.0 Mar 01, 2022
1.146.0 Feb 25, 2022
1.145.0 Feb 19, 2022
1.144.0 Feb 08, 2022
1.143.0 Feb 02, 2022
1.142.0 Jan 29, 2022
1.141.0 Jan 27, 2022
1.140.0 Jan 20, 2022
1.139.0 Jan 11, 2022
1.138.2 Jan 10, 2022
1.138.1 Jan 07, 2022
1.138.0 Jan 04, 2022
1.137.0 Dec 21, 2021
1.136.0 Dec 15, 2021
1.135.0 Dec 10, 2021
1.134.0 Nov 23, 2021
1.133.0 Nov 19, 2021
1.132.0 Nov 09, 2021
1.131.0 Nov 07, 2021
1.130.0 Oct 29, 2021
1.129.0 Oct 21, 2021
1.128.0 Oct 14, 2021
1.127.0 Oct 08, 2021
1.126.0 Oct 05, 2021
1.125.0 Sep 29, 2021
1.124.0 Sep 21, 2021
1.123.0 Sep 17, 2021
1.122.0 Sep 08, 2021
1.121.0 Sep 01, 2021
1.120.0 Aug 26, 2021
1.119.0 Aug 17, 2021
1.118.0 Aug 11, 2021
1.117.0 Aug 05, 2021
1.116.0 Jul 28, 2021
1.115.0 Jul 21, 2021
1.114.0 Jul 15, 2021
1.113.0 Jul 12, 2021
1.112.0 Jul 09, 2021
1.111.0 Jul 02, 2021
1.110.1 Jun 28, 2021
1.110.0 Jun 24, 2021
1.109.0 Jun 17, 2021
1.108.1 Jun 11, 2021
1.108.0 Jun 09, 2021
1.107.0 Jun 02, 2021
1.106.1 May 26, 2021
1.106.0 May 25, 2021
1.105.0 May 19, 2021
1.104.0 May 15, 2021
1.103.0 May 10, 2021
1.102.0 May 04, 2021
1.101.0 Apr 28, 2021
1.100.0 Apr 20, 2021
1.99.0 Apr 19, 2021
1.98.0 Apr 12, 2021
1.97.0 Apr 06, 2021
1.96.0 Apr 01, 2021
1.95.2 Apr 01, 2021
1.95.1 Mar 26, 2021
1.95.0 Mar 25, 2021
1.94.1 Mar 17, 2021
1.94.0 Mar 16, 2021
1.93.0 Mar 11, 2021
1.92.0 Mar 06, 2021
1.91.0 Feb 23, 2021
1.90.1 Feb 19, 2021
1.90.0 Feb 17, 2021
1.89.0 Feb 09, 2021
1.88.0 Feb 04, 2021
1.87.1 Jan 28, 2021
1.87.0 Jan 27, 2021
1.86.0 Jan 21, 2021
1.85.0 Jan 14, 2021
1.84.0 Jan 12, 2021
1.83.0 Jan 06, 2021
1.82.0 Jan 03, 2021
1.81.0 Dec 31, 2020
1.80.0 Dec 22, 2020
1.79.0 Dec 17, 2020
1.78.0 Dec 12, 2020
1.77.0 Dec 07, 2020
1.76.0 Dec 01, 2020
1.75.0 Nov 24, 2020
1.74.0 Nov 17, 2020
1.73.0 Nov 11, 2020
1.72.0 Nov 06, 2020
1.71.0 Oct 29, 2020
1.70.0 Oct 24, 2020
1.69.0 Oct 19, 2020
1.68.0 Oct 15, 2020
1.67.0 Oct 07, 2020
1.66.0 Oct 02, 2020
1.65.0 Oct 01, 2020
1.64.1 Sep 25, 2020
1.64.0 Sep 24, 2020
1.63.0 Sep 14, 2020
1.62.0 Sep 04, 2020
1.61.1 Aug 28, 2020
1.61.0 Aug 27, 2020
1.60.0 Aug 20, 2020
1.59.0 Aug 15, 2020
1.58.0 Aug 12, 2020
1.57.0 Aug 07, 2020
1.56.0 Aug 01, 2020
1.55.0 Jul 28, 2020
1.54.0 Jul 22, 2020
1.53.0 Jul 20, 2020
1.52.0 Jul 18, 2020
1.51.0 Jul 09, 2020
1.50.0 Jul 07, 2020
1.49.1 Jul 02, 2020
1.49.0 Jul 02, 2020
1.48.0 Jul 01, 2020
1.47.1 Jun 30, 2020
1.47.0 Jun 24, 2020
1.46.0 Jun 20, 2020
1.45.0 Jun 09, 2020
1.44.0 Jun 04, 2020
1.43.0 Jun 04, 2020
1.42.1 Jun 01, 2020
1.42.0 May 27, 2020
1.41.0 May 21, 2020
1.40.0 May 20, 2020
1.39.0 May 16, 2020
1.38.0 May 08, 2020
1.37.0 May 05, 2020
1.36.1 Apr 29, 2020
1.36.0 Apr 28, 2020
1.35.0 Apr 24, 2020
1.34.1 Apr 22, 2020
1.34.0 Apr 21, 2020
1.33.1 Apr 19, 2020
1.33.0 Apr 17, 2020
1.32.2 Apr 10, 2020
1.32.1 Apr 09, 2020
1.32.0 Apr 07, 2020
1.31.0 Mar 24, 2020
1.30.0 Mar 18, 2020
1.29.0 Mar 18, 2020
1.28.0 Mar 16, 2020
1.27.0 Mar 03, 2020
1.26.0 Feb 26, 2020
1.25.0 Feb 19, 2020
1.24.0 Feb 14, 2020
1.23.0 Feb 07, 2020
1.22.0 Jan 23, 2020
1.21.1 Jan 16, 2020
1.21.0 Jan 16, 2020
1.20.0 Jan 07, 2020
1.19.0 Dec 17, 2019
1.18.0 Nov 25, 2019
1.17.1 Nov 19, 2019
1.17.0 Nov 19, 2019
1.16.3 Nov 13, 2019
1.16.2 Nov 12, 2019
1.16.1 Nov 12, 2019
1.16.0 Nov 11, 2019
1.15.0 Oct 28, 2019
1.14.0 Oct 22, 2019
1.13.1 Oct 15, 2019
1.13.0 Oct 15, 2019
1.12.0 Oct 07, 2019
1.11.0 Oct 02, 2019
1.10.1 Oct 01, 2019
1.10.0 Sep 30, 2019
1.9.0 Sep 20, 2019
1.8.0 Sep 10, 2019
1.7.0 Sep 06, 2019
1.6.1 Aug 29, 2019
1.6.0 Aug 27, 2019
1.5.0 Aug 21, 2019
1.4.0 Aug 14, 2019
1.3.0 Aug 02, 2019
1.2.0 Jul 25, 2019
1.1.0 Jul 19, 2019
1.0.0 Jul 11, 2019
0.39.0 Jul 09, 2019
0.38.0 Jul 08, 2019
0.37.0 Jul 04, 2019
0.36.2 Jul 03, 2019
0.36.1 Jul 01, 2019
0.36.0 Jun 25, 2019
0.35.0 Jun 19, 2019
0.34.0 Jun 10, 2019
0.33.0 May 30, 2019
0.32.0 May 24, 2019
0.31.0 May 07, 2019
0.30.0 May 02, 2019
0.29.0 Apr 24, 2019
0.28.0 Apr 04, 2019
0.27.0 Mar 28, 2019
0.26.0 Mar 28, 2019

Wheel compatibility matrix

Platform Python 3
any

Files in release

Extras: None
Dependencies:
aws-cdk.cloud-assembly-schema (>=45.0.0)
jsii (<2.0.0,>=1.113.0)
publication (>=0.0.3)
typeguard (<4.3.0,>=2.13.3)