8000 Comparing v2.191.0...v2.192.0 · aws/aws-cdk · GitHub
[go: up one dir, main page]

Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: aws/aws-cdk
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v2.191.0
Choose a base ref
...
head repository: aws/aws-cdk
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: v2.192.0
Choose a head ref
  • 14 commits
  • 165 files changed
  • 12 contributors

Commits on Apr 22, 2025

  1. chore: update error message to include key name for metric (#34221)

    ### Issue # (if applicable)
    
    Closes #34156 
    
    ### Reason for this change
    
    Updating the message to provide better message
    
    ### Description of changes
    
    Simple change on the message to include key name
    
    ### Describe any new or updated permissions being added
    
    N/A
    
    ### Description of how you validated changes
    
    Local build has been successful
    
    ### Checklist
    - [ ] My code adheres to the [CONTRIBUTING GUIDE](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md) and [DESIGN GUIDELINES](https://github.com/aws/aws-cdk/blob/main/docs/DESIGN_GUIDELINES.md)
    
    ----
    
    *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
    Y-JayKim authored Apr 22, 2025
    Configuration menu
    Copy the full SHA
    181aa3a View commit details
    Browse the repository at this point in the history
  2. feat(rds): add support for SQL Server engine versions 15.00.4430.1.v1…

    … and 16.00.4185.3.v1 (#34175)
    
    Ref: [Amazon RDS for SQL Server supports new minor versions for SQL Server 2019 and 2022](https://aws.amazon.com/about-aws/whats-new/2025/04/amazon-rds-sql-server-2019-2022/)
    
    ```sh
    % aws rds describe-db-engine-versions --engine sqlserver-ee --query "DBEngineVersions[?EngineVersion=='15.00.4430.1.v1'].[DBEngineVersionDescription,EngineVersion,DBParameterGroupFamily,MajorEngineVersion,Status]" 
    [
        [
            "SQL Server 2019 15.00.4430.1.v1",
            "15.00.4430.1.v1",
            "sqlserver-ee-15.0",
            "15.00",
            "available"
        ]
    ]
    
    
    % aws rds describe-db-engine-versions --engine sqlserver-ee --query "DBEngineVersions[?EngineVersion=='16.00.4185.3.v1'].[DBEngineVersionDescription,EngineVersion,DBParameterGroupFamily,MajorEngineVersion,Status]" 
    [
        [
            "SQL Server 2022 16.00.4185.3.v1",
            "16.00.4185.3.v1",
            "sqlserver-ee-16.0",
            "16.00",
            "available"
        ]
    ]
    ```
    
    ### Checklist
    - [x] My code adheres to the [CONTRIBUTING GUIDE](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md) and [DESIGN GUIDELINES](https://github.com/aws/aws-cdk/blob/main/docs/DESIGN_GUIDELINES.md)
    
    ----
    
    *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
    mazyu36 authored Apr 22, 2025
    Configuration menu
    Copy the full SHA
    63f09f1 View commit details
    Browse the repository at this point in the history

Commits on Apr 23, 2025

  1. Configuration menu
    Copy the full SHA
    564c890 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    59aeaf6 View commit details
    Browse the repository at this point in the history
  3. feat(applicationsignals-alpha): introduce Application Signals L2 cons…

    …tructs (#32931)
    
    ### Issue # (if applicable)
    
    N/A
    
    ### Description of changes
    
    This PR adds L2 constructs to simplify the Application Signals enablement process. See aws/aws-cdk-rfcs#672 for more details.
    
    ### Describe any new or updated permissions being added
    
    
    
    ### Checklist
    - [x] My code adheres to the [CONTRIBUTING GUIDE](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md) and [DESIGN GUIDELINES](https://github.com/aws/aws-cdk/blob/main/docs/DESIGN_GUIDELINES.md)
    
    ----
    
    *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
    bjrara authored Apr 23, 2025
    Configuration menu
    Copy the full SHA
    e7a6e14 View commit details
    Browse the repository at this point in the history
  4. feat(iam): support Role.fromLookup() method (#33603)

    ### Issue # (if applicable)
    
    Closes #33602.
    
    ### Reason for this change
    
    
    
    There will be many cases where IAM roles will be created outside the CFn stack and used.
    Importing actual existing roles from AWS accounts is very convenience. It is also useful to be able to make an error if a role does not exist.
    
    On the other hand, a generic Context Provider for CloudControl API has been added in aws-cdk-cli.
    
    aws/aws-cdk-cli#138
    
    This allows us to implement new context methods.
    
    ### Description of changes
    
    
    
    Add `Role.fromLookup` method using the new context provider.
    
    ### Describe any new or updated permissions being added
    
    
    
    
    ### Description of how you validated changes
    
    
    
    Both unit and integ tests.
    
    ### Checklist
    - [x] My code adheres to the [CONTRIBUTING GUIDE](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md) and [DESIGN GUIDELINES](https://github.com/aws/aws-cdk/blob/main/docs/DESIGN_GUIDELINES.md)
    
    ----
    
    *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
    go-to-k authored Apr 23, 2025
    Configuration menu
    Copy the full SHA
    9e3cbf6 View commit details
    Browse the repository at this point in the history
  5. chore(cognito-identitypool): make role attachment resource public (#3…

    …4234)
    
    ### Issue # (if applicable)
    
    N/A
    
    ### Reason for this change
    
    In order to allow for more flexibility when configuring Identity Pool resources, one may need to override attributes in the role attachment. To make this process easier, we should be able to access this resource the same way as we would access the L2 resource.
    
    ### Description of changes
    
    ```ts
      // private readonly roleAttachment: IdentityPoolRoleAttachment;
      public readonly roleAttachment: IdentityPoolRoleAttachment;
    ```
    
    ### Describe any new or updated permissions being added
    
    N/A
    
    ### Description of how you validated changes
    
    `yarn build && yarn test aws-cognito-identitypool`
    
    ### Checklist
    - [x] My code adheres to the [CONTRIBUTING GUIDE](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md) and [DESIGN GUIDELINES](https://github.com/aws/aws-cdk/blob/main/docs/DESIGN_GUIDELINES.md)
    
    ----
    
    *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
    Leo10Gama authored Apr 23, 2025
    Configuration menu
    Copy the full SHA
    87e1add View commit details
    Browse the repository at this point in the history
  6. feat(ses): add fromEmailIdentityArn (#33984)

    ### Issue # (if applicable)
    
    Closes #33981 
    
    ### Reason for this change
    
    The SES module currently lacks a method to import an `EmailIdentity` by its ARN, which is inconsistent with many other CDK resource libraries. Supporting this would allow users to follow a consistent pattern when managing resources across CDK stacks.
    
    ### Description of changes
    
    - Added a new static method `EmailIdentity.fromEmailIdentityArn(scope, id, emailIdentityArn)` to enable importing an `EmailIdentity` by ARN.
    
    ### Describe any new or updated permissions being added
    
    No new IAM permissions are required, as this change does not perform any operations requiring permissions. It only allows referencing an existing SES Email Identity by ARN.
    
    ### Description of how you validated changes
    
    - Added unit tests in `email-identity.test.ts` 
    10000
    to verify that the ARN is correctly parsed and the resulting `IEmailIdentity` behaves as expected.
    
    ### Checklist
    - [x] My code adheres to the [CONTRIBUTING GUIDE](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md) and [DESIGN GUIDELINES](https://github.com/aws/aws-cdk/blob/main/docs/DESIGN_GUIDELINES.md)
    
    ----
    
    *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
    hassaku63 authored Apr 23, 2025
    Configuration menu
    Copy the full SHA
    72ee4a7 View commit details
    Browse the repository at this point in the history

Commits on Apr 24, 2025

  1. feat(apigateway): add mode property for SpecRestApi (#34198)

    ### Issue # (if applicable)
    N/A
    
    ### Reason for this change
    `AWS::ApiGateway::RestApi` has a `mode` property, but the L2 construct for API Gateway (SpecRestApi class) does not currently expose this property.  
    Therefore, I added the `mode` property to the `SpecRestApiProps` interface.
    
    
    
    ### Description of changes
    
    
    
    - Introduced an optional `mode` property in `SpecRestApiProps`.
    - Created an enum class `RestApiMode` to define the possible values for `mode`. This enum includes two values: `merge` and `overwrite`.
    - Added unit and integration tests.
    - Updated the README.md for aws-apigateway.
    
    ### Describe any new or updated permissions being added
    
    
    No new IAM permissions are introduced.
    
    ### Description of how you validated changes
    
    
    - `packages/aws-cdk-lib/aws-apigateway/test/restapi.test.ts`
    - `packages/@aws-cdk-testing/framework-integ/test/aws-apigateway/test/integ.spec-restapi.ts`
    
    ### Checklist
    - [x] My code adheres to the [CONTRIBUTING GUIDE](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md) and [DESIGN GUIDELINES](https://github.com/aws/aws-cdk/blob/main/docs/DESIGN_GUIDELINES.md)
    
    ----
    
    *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license.*
    tttol authored Apr 24, 2025
    Configuration menu
    Copy the full SHA
    feadd8c View commit details
    Browse the repository at this point in the history
  2. fix(eks): update aws-node-termination-handler chart version (#34218)

    ### Issue # (if applicable)
    
    Closes #34217
    
    ### Reason for this change
    
    
    - Current Chart version is 0.18.0
    https://artifacthub.io/packages/helm/aws/aws-node-termination-handler/0.18.0
    https://github.com/aws/aws-cdk/blob/58c2631de585b300cf8573ab423dcc75791cc3d2/packages/aws-cdk-lib/aws-eks/lib/cluster.ts#L1184-L1188
    - Latest available version is 0.27.0
    https://artifacthub.io/packages/helm/aws-node-termination-handler/aws-node-termination-handler
    - The outdated version of aws-node-termination-handler (0.18.0) is causing cluster creation failures for Kubernetes v1.25 and above.
      - Related: aws/aws-node-termination-handler#638
    
    ### Description of changes
    
    
    Update aws-node-termination-handler chart version
    
    ### Describe any new or updated permissions being added
    
    
    None
    
    ### Description of how you validated changes
    
    
    Pass unit/integration tests
    ### Checklist
    - [x] My code adheres to the [CONTRIBUTING GUIDE](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md) and [DESIGN GUIDELINES](https://github.com/aws/aws-cdk/blob/main/docs/DESIGN_GUIDELINES.md)
    
    ----
    
    *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
    wafuwafu13 authored Apr 24, 2025
    Configuration menu
    Copy the full SHA
    3380742 View commit details
    Browse the repository at this point in the history
  3. feat(events): Rule support role (#33779)

    ### Issue # (if applicable)
    
    Closes #33722
    
    ### Description of changes
    Event Rule support IAM Role
    
    ### Description of how you validated changes
    Unit + Integ
    
    ### Checklist
    - [x] My code adheres to the [CONTRIBUTING GUIDE](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md) and [DESIGN GUIDELINES](https://github.com/aws/aws-cdk/blob/main/docs/DESIGN_GUIDELINES.md)
    
    ----
    
    *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
    phuhung273 authored Apr 24, 2025
    Configuration menu
    Copy the full SHA
    9e4c9a9 View commit details
    Browse the repository at this point in the history
  4. chore(release): 2.192.0

    AWS CDK Team committed Apr 24, 2025
    Configuration menu
    Copy the full SHA
    5fe4570 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    f5467af View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    4ec1df8 View commit details
    Browse the repository at this point in the history
Loading
0