Skip to content

Releases: aws/aws-cdk

v2.163.1

22 Oct 19:34
c14a1ff
Compare
Choose a tag to compare

Bug Fixes

  • 'Need to perform AWS calls for account' when doing cross-account deployments (#31846) (5aa63d1), closes #31845

Alpha modules (2.163.1-alpha.0)

v2.163.0

22 Oct 01:12
ad5325a
Compare
Choose a tag to compare

Features

Bug Fixes

  • cli: cdk import errors with 'S3 error: Access Denied' (#31727) (cd324d0), closes #31597 #31716
  • lambda: filterRule.null() returns empty array (#31701) (5830ee1), closes #31458
  • s3: add support for uppercase characters in legacy bucket names (#31813) (7bebf40), closes #31731
  • stepfunctions-tasks: stateMachine construct doesn't generate a valid policy for default StateMachineRole (#31801) (efbbddb), closes #31714

Alpha modules (2.163.0-alpha.0)

Features

  • ec2: disable api termination (#30620) (108737d)
  • kinesisfirehose-alpha: refactor sourceStream property to support multiple types of sources (#31723) (0260046)
  • pipes-enrichments: support API destination enrichment (#31312) (1557793), closes #29383
  • pipes-targets: add CloudWatch Logs (#30665) (893769e)

Bug Fixes

  • ec2: exposed userDataCausesReplacement in BastionHostLinuxProps (#31416) (029c298), closes #31348
  • scheduler-alpha: remove targetOverrides prop from Schedule (#31799) (be4154b)

v2.162.1

11 Oct 18:12
10aa526
Compare
Choose a tag to compare

Bug Fixes


Alpha modules (2.162.1-alpha.0)

v2.162.0

10 Oct 21:00
c8d7dd3
Compare
Choose a tag to compare

Features

Bug Fixes

  • core: cdk diff on large templates fails when passing in toolkitStackName and qualifier (#31636) (f603c97), closes #29179
  • ecs: ecs exec cannot be enabled for ECS Anywhere (ecs.ExternalService) (#31374) (cff1fcd), closes #31181
  • elasticloadbalancingv2: http2Enabled with true is ignored in ApplicationLoadBalancer (#31675) (c1b240e), closes #31609
  • event-targets: ecsTask uses invalid task definition arn in policy (#31615) (4ada3ea), closes #30390 #30484
  • iam: override Role.applyRemovalPolicy for customizeRoles (#31652) (35ed5c6), closes #31651
  • s3: unable to update the s3 event notifications on an existing S3 bucket (#31431) (0a56c0d), closes #31303

Alpha modules (2.162.0-alpha.0)

⚠ BREAKING CHANGES TO EXPERIMENTAL FEATURES

  • kinesisfirehose-alpha: replaced destinations property with destination (singular) and changed the type from array of Destinations to a single Destination. Old behaviour would only allow an array with a single Destination to be passed in anyway.

Features

Bug Fixes

  • cli-lib: cannot bootstrap specific environment (#31713) (fec4bb1)

Miscellaneous Chores

  • kinesisfirehose-alpha: replacedestinations property with destination and change type from array to single IDestination (#31630) (1e2cff1)

v2.161.1

05 Oct 05:57
0a606c9
Compare
Choose a tag to compare

Reverts


Alpha modules (2.161.1-alpha.0)

v2.161.0

04 Oct 02:55
be5ad8b
Compare
Choose a tag to compare

Features

Bug Fixes


Alpha modules (2.161.0-alpha.0)

⚠ BREAKING CHANGES TO EXPERIMENTAL FEATURES

  • kinesisfirehose-destinations: the logging and logGroup properties in DestinationLoggingProps have been removed and replaced with a single optional property loggingConfig which accepts a class of type LoggingConfig.

Details

Combine the logging and logGroup properties into a single new optional property called loggingConfig which accepts a class of type LoggingConfig.

LoggingConfig is an abstract class which can be instantiated through either an instance of EnableLogging or DisableLogging which can be used in the following 3 ways:

import * as logs from 'aws-cdk-lib/aws-logs';

const logGroup = new logs.LogGroup(this, 'Log Group');
declare const bucket: s3.Bucket;

// 1. Enable logging with no parameters - a log group will be created for you
const destinationWithLogging = new destinations.S3Bucket(bucket, {
  loggingConfig: new destinations.EnableLogging(),
});

// 2. Enable a logging and pass in a logGroup to be used
const destinationWithLoggingAndMyLogGroup = new destinations.S3Bucket(bucket, {
  loggingConfig: new destinations.EnableLogging(logGroup),
});

// 3. Disable logging (does not accept any parameters so it is now impossible to provide a logGroup in this case)
const destinationWithoutLogging = new destinations.S3Bucket(bucket, {
  loggingConfig: new destinations.DisableLogging(),
});

Description of how you validated changes

unit + integ test

Checklist

Features

Read more

v2.160.0

24 Sep 16:10
7a8ae02
Compare
Choose a tag to compare

Features


Alpha modules (2.160.0-alpha.0)

Features

  • kinesisanalytics-flink: support Apache Flink 1.20 (#31349) (b3b9aa8)

Bug Fixes

v2.159.1

19 Sep 21:49
c66f4e3
Compare
Choose a tag to compare

Reverts

  • fix(ec2): fixing vpc endpoint pattern for ecr and ecr docker (#31496) (f7e8452)

Alpha modules (2.159.1-alpha.0)

v2.159.0

19 Sep 01:51
d77a1b2
Compare
Choose a tag to compare

Features

Bug Fixes


Alpha modules (2.159.0-alpha.0)

⚠ BREAKING CHANGES TO EXPERIMENTAL FEATURES

  • kinesisfirehose-alpha: encryptionKey property is removed and encryption property type has changed from the StreamEncryption enum to the StreamEncryption class.

To pass in a KMS key for the customer managed key case, use StreamEncryption.customerManagedKey(key)

Details

Replaced encryption and encryptionKey properties with a single property encryption of type StreamEncryption and is used by calling one of the 3 methods:

SreamEncryption.unencrypted()
StreamEncryption.awsOwnedKey()
StreamEncryption.customerManagedKey(key?: IKey)

This makes it so it's not longer possible to pass in a key when the encryption type is AWS owned or unencrypted. The key is an optional parameter in StreamEncryption.customerManagedKey(key?: IKey) so following the previous behaviour, if a key is provided it will be used, otherwise a key will be created for the user.

Description of how you validated changes

Generated templates do not change so behaviour remains the same.

Updated integ/unit tests.

Checklist

Features

Bug Fixes

  • ec2: fixing vpc endpoint pattern for ecr and ecr docker (#31434) (95c49ab)

Miscellaneous Chores

  • kinesisfirehose-alpha: refactor encryption property to combine encryptionKey (#31430) (8e92185)

v2.158.0

11 Sep 20:17
4b8714d
Compare
Choose a tag to compare

Bug Fixes


Alpha modules (2.158.0-alpha.0)

Features