You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
chore(cx-api): feature flags are documented incorrectly (#25994)
```ts
// !!! IMPORTANT !!!
//
// When you introduce a new flag, set its 'introducedIn.v2' value to the literal string
// 'V2·NEXT', without the dot.
//
// DO NOT USE A VARIABLE. DO NOT DEFINE A CONSTANT. The actual value will be string-replaced at
// version bump time.
```
Well, this proved to be difficult. Some places we supplied `V2·NEXT`, _with_ the dot. This PR manually updates everything back to when they were released, because we've missed the boat on the magic V2NEXT updates.
cc @corymhall for visibility, since you and I were the culprits and I was copying you :)
----
*By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
Copy file name to clipboardExpand all lines: packages/aws-cdk-lib/cx-api/FEATURE_FLAGS.md
+80-80Lines changed: 80 additions & 80 deletions
Original file line number
Diff line number
Diff line change
@@ -17,10 +17,6 @@ Flags come in three types:
17
17
18
18
| Flag | Summary | Since | Type |
19
19
| ----- | ----- | ----- | ----- |
20
-
|[@aws-cdk/aws-apigateway:requestValidatorUniqueId](#aws-cdkaws-apigatewayrequestvalidatoruniqueid)| Generate a unique id for each RequestValidator added to a method | V2·NEXT | (fix) |
21
-
|[@aws-cdk/aws-ec2:restrictDefaultSecurityGroup](#aws-cdkaws-ec2restrictdefaultsecuritygroup)| Restrict access to the VPC default security group | V2·NEXT | (default) |
22
-
|[@aws-cdk/aws-kms:aliasNameRef](#aws-cdkaws-kmsaliasnameref)| KMS Alias name and keyArn will have implicit reference to KMS Key | V2·NEXT | (fix) |
23
-
|[@aws-cdk/aws-route53-patters:useCertificate](#aws-cdkaws-route53-pattersusecertificate)| Use the official `Certificate` resource instead of `DnsValidatedCertificate`| V2·NEXT | (default) |
24
20
|[@aws-cdk/core:newStyleStackSynthesis](#aws-cdkcorenewstylestacksynthesis)| Switch to new stack synthesis method which enables CI/CD | 2.0.0 | (fix) |
25
21
|[@aws-cdk/core:stackRelativeExports](#aws-cdkcorestackrelativeexports)| Name exports based on the construct paths relative to the stack, rather than the global construct path | 2.0.0 | (fix) |
26
22
|[@aws-cdk/aws-rds:lowercaseDbIdentifier](#aws-cdkaws-rdslowercasedbidentifier)| Force lowercasing of RDS Cluster names in CDK | 2.0.0 | (fix) |
@@ -46,13 +42,17 @@ Flags come in three types:
46
42
|[@aws-cdk/aws-iam:importedRoleStackSafeDefaultPolicyName](#aws-cdkaws-iamimportedrolestacksafedefaultpolicyname)| Enable this feature to by default create default policy names for imported roles that depend on the stack the role is in. | 2.60.0 | (fix) |
47
43
|[@aws-cdk/aws-s3:serverAccessLogsUseBucketPolicy](#aws-cdkaws-s3serveraccesslogsusebucketpolicy)| Use S3 Bucket Policy instead of ACLs for Server Access Logging | 2.60.0 | (fix) |
48
44
|[@aws-cdk/customresources:installLatestAwsSdkDefault](#aws-cdkcustomresourcesinstalllatestawssdkdefault)| Whether to install the latest SDK by default in AwsCustomResource | 2.60.0 | (default) |
45
+
|[@aws-cdk/aws-route53-patters:useCertificate](#aws-cdkaws-route53-pattersusecertificate)| Use the official `Certificate` resource instead of `DnsValidatedCertificate`| 2.61.0 | (default) |
49
46
|[@aws-cdk/aws-codedeploy:removeAlarmsFromDeploymentGroup](#aws-cdkaws-codedeployremovealarmsfromdeploymentgroup)| Remove CloudWatch alarms from deployment group | 2.65.0 | (fix) |
50
47
|[@aws-cdk/aws-rds:databaseProxyUniqueResourceName](#aws-cdkaws-rdsdatabaseproxyuniqueresourcename)| Use unique resource name for Database Proxy | 2.65.0 | (fix) |
51
48
|[@aws-cdk/aws-apigateway:authorizerChangeDeploymentLogicalId](#aws-cdkaws-apigatewayauthorizerchangedeploymentlogicalid)| Include authorizer configuration in the calculation of the API deployment logical ID. | 2.66.0 | (fix) |
52
49
|[@aws-cdk/aws-ec2:launchTemplateDefaultUserData](#aws-cdkaws-ec2launchtemplatedefaultuserdata)| Define user data for a launch template by default when a machine image is provided. | 2.67.0 | (fix) |
53
50
|[@aws-cdk/aws-secretsmanager:useAttachedSecretResourcePolicyForSecretTargetAttachments](#aws-cdkaws-secretsmanageruseattachedsecretresourcepolicyforsecrettargetattachments)| SecretTargetAttachments uses the ResourcePolicy of the attached Secret. | 2.67.0 | (fix) |
54
51
|[@aws-cdk/aws-redshift:columnId](#aws-cdkaws-redshiftcolumnid)| Whether to use an ID to track Redshift column changes | 2.68.0 | (fix) |
|[@aws-cdk/aws-apigateway:requestValidatorUniqueId](#aws-cdkaws-apigatewayrequestvalidatoruniqueid)| Generate a unique id for each RequestValidator added to a method | 2.78.0 | (fix) |
54
+
|[@aws-cdk/aws-ec2:restrictDefaultSecurityGroup](#aws-cdkaws-ec2restrictdefaultsecuritygroup)| Restrict access to the VPC default security group | 2.78.0 | (default) |
55
+
|[@aws-cdk/aws-kms:aliasNameRef](#aws-cdkaws-kmsaliasnameref)| KMS Alias name and keyArn will have implicit reference to KMS Key | 2.83.0 | (fix) |
56
56
|[@aws-cdk/core:includePrefixInUniqueNameGeneration](#aws-cdkcoreincludeprefixinuniquenamegeneration)| Include the stack prefix in the stack name generation process | 2.84.0 | (fix) |
57
57
58
58
<!-- END table -->
@@ -328,82 +328,6 @@ Encryption can also be configured explicitly using the `encrypted` property.
328
328
**Compatibility with old behavior:** Pass the `encrypted: false` property to the `FileSystem` construct to disable encryption.
0 commit comments