You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: v2/bootstrapping-env.md
+2Lines changed: 2 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -261,6 +261,8 @@ This section contains a list of the changes made in each version\.
261
261
| 21 | 2\.149\.0 | Add condition to the file publishing role\.|
262
262
| 22 | 2\.160\.0 | Add sts:TagSession permissions to the trust policy of bootstrap IAM roles\.|
263
263
| 23 | 2\.161\.0 | Add cloudformation:RollbackStack and cloudformation:ContinueUpdateRollback permissions to the trust policy of the deploy IAM role\. This provides permissions for the cdk rollback command\.|
264
+
| 24 | 2\.165\.0 | Change the duration of days that noncurrent objects in the bootstrap bucket will be retained, from 365 to 30 days\. Since the new cdk gc command introduces the ability to delete objects in the bootstrap bucket, this new behavior ensures that deleted objects remain in the bootstrap bucket for 30 days instead of 365 days\. For more information on this change, see aws\-cdk PR [\#31949](https://github.com/aws/aws-cdk/pull/31949)\.|
265
+
| 25 | 2\.165\.0 | Add support to the bootstrap bucket for the removal of incomplete multipart uploads\. Incomplete multipart uploads will be deleted after 1 day\. For more information on this change, see aws\-cdk PR [\#31956](https://github.com/aws/aws-cdk/pull/31956)\.|
264
266
265
267
## Upgrade from legacy to modern bootstrap template<aname="bootstrapping-template"></a>
Copy file name to clipboardExpand all lines: v2/customize-synth.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -343,7 +343,7 @@ new DefaultStackSynthesizer(new DefaultStackSynthesizerProps
343
343
344
344
To modify the security credentials used to provide permissions during CDK deployments, you can customize synthesis by using `[CliCredentialsStackSynthesizer](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.CliCredentialsStackSynthesizer.html)`\. This synthesizer works with the default AWS resources that are created during bootstrapping to store assets, such as the Amazon S3 bucket and Amazon ECR repository\. Instead of using the default IAM roles created by the CDK during bootstrapping, it uses the security credentials of the actor initiating deployment\. Therefore, the security credentials of the actor must have valid permissions to perform all deployment actions\. The following diagram illustrates the deployment process when using this synthesizer:
+ By default, CloudFormation performs API calls in your account using the permissions of the actor\. Therefore, the current identity must have permission to make necessary changes to the AWS resources in the CloudFormation stack, along with the permissions to perform necessary CloudFormation operations, such as `CreateStack` or `UpdateStack`\. Deployment capabilities will be limited to the permissions of the actor\.
Copy file name to clipboardExpand all lines: v2/deploy.md
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -150,7 +150,7 @@ To deploy your application, we recommend that you use the CDK CLI `cdk deploy` c
150
150
151
151
When you run `cdk deploy`, the CDK CLI initiates `cdk synth` to prepare for deployment\. The following diagram illustrates the app lifecycle in the context of a deployment:
During deployment, the CDK CLI takes the cloud assembly produced by synthesis and deploys it to an AWS environment\. Assets are uploaded to Amazon S3 and Amazon ECR and the CloudFormation template is submitted to AWS CloudFormation for deployment\.
156
156
@@ -162,7 +162,7 @@ By the time the AWS CloudFormation deployment phase starts, your CDK app has alr
162
162
163
163
Before deployment can be performed, permissions must be established\. The following diagram illustrates the permissions that are used during a default deployment, when using the default bootstrapping process and stack synthesizer:
Copy file name to clipboardExpand all lines: v2/ecs_example.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
# Example: Create an AWS Fargate service using the AWS CDK<aname="ecs_example"></a>
2
2
3
-
In this example, we show you how to create an AWS Fargate \(Fargate\)service running on an Amazon Elastic Container Service \(Amazon ECS\) cluster that's fronted by an internet\-facing Application Load Balancer from an image on Amazon ECR\.
3
+
In this example, we show you how to create an AWS Fargate service running on an Amazon Elastic Container Service \(Amazon ECS\) cluster that's fronted by an internet\-facing Application Load Balancer from an image on Amazon ECR\.
4
4
5
5
Amazon ECS is a highly scalable, fast, container management service that makes it easy to run, stop, and manage Docker containers on a cluster\. You can host your cluster on serverless infrastructure that's managed by Amazon ECS by launching your services or tasks using the Fargate launch type\. For more control, you can host your tasks on a cluster of Amazon Elastic Compute Cloud \(Amazon EC2\) instances that you manage by using the Amazon EC2 launch type\.
Copy file name to clipboardExpand all lines: v2/featureflags.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ The AWS CDK uses *feature flags* to enable potentially breaking behaviors in a r
4
4
5
5
Feature flags are disabled by default\. Existing projects that do not specify the flag will continue to work as before with later AWS CDK releases\. New projects created using cdk init include flags enabling all features available in the release that created the project\. Edit `cdk.json` to disable any flags for which you prefer the earlier behavior\. You can also add flags to enable new behaviors after upgrading the AWS CDK\.
6
6
7
-
A list of all current feature flags can be found on the AWS CDK GitHub repository in [https://github.com/aws/aws-cdk/blob/main/packages/%40aws-cdk/cx-api/FEATURE_FLAGS.md](https://github.com/aws/aws-cdk/blob/main/packages/%40aws-cdk/cx-api/FEATURE_FLAGS.md)\. See the `CHANGELOG` in a given release for a description of any new feature flags added in that release\.
7
+
A list of all current feature flags can be found on the AWS CDK GitHub repository in [https://github.com/aws/aws-cdk/blob/main/packages/aws-cdk-lib/cx-api/FEATURE_FLAGS.md](https://github.com/aws/aws-cdk/blob/main/packages/aws-cdk-lib/cx-api/FEATURE_FLAGS.md)\. See the `CHANGELOG` in a given release for a description of any new feature flags added in that release\.
8
8
9
9
## Reverting to v1 behavior<aname="featureflags_disabling"></a>
Copy file name to clipboardExpand all lines: v2/home.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,7 @@ Create your own constructs that are customized for your unique use cases and sha
41
41
42
42
## Example of the AWS CDK<aname="home-example"></a>
43
43
44
-
The following is an example of using the AWS CDK Constructs Library to create an Amazon Elastic Container Service \(Amazon ECS\) service with AWS Fargate \(Fargate\)launch type\. For more details of this example, see [Example: Create an AWS Fargate service using the AWS CDK](ecs_example.md)\.
44
+
The following is an example of using the AWS CDK Constructs Library to create an Amazon Elastic Container Service \(Amazon ECS\) service with AWS Fargate launch type\. For more details of this example, see [Example: Create an AWS Fargate service using the AWS CDK](ecs_example.md)\.
Copy file name to clipboardExpand all lines: v2/identifiers.md
+8-8Lines changed: 8 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ The most common identifier, `id`, is the identifier passed as the second argumen
13
13
**Note**
14
14
The `id` of a stack is also the identifier that you use to refer to it in the [AWS CDK CLI reference](cli.md)\.
15
15
16
-
Let's look at an example where we have two constructs with the identifier `amzn-s3-demo-bucket` in our app\. The first is defined in the scope of the stack with the identifier `Stack1`\. The second is defined in the scope of a stack with the identifier `Stack2`\. Because they're defined in different scopes, this doesn't cause any conflict, and they can coexist in the same app without issues\.
16
+
Let's look at an example where we have two constructs with the identifier `MyBucket` in our app\. The first is defined in the scope of the stack with the identifier `Stack1`\. The second is defined in the scope of a stack with the identifier `Stack2`\. Because they're defined in different scopes, this doesn't cause any conflict, and they can coexist in the same app without issues\.
The constructs in an AWS CDK application form a hierarchy rooted in the `App` class\. We refer to the collection of IDs from a given construct, its parent construct, its grandparent, and so on to the root of the construct tree, as a *path*\.
149
149
150
-
The AWS CDK typically displays paths in your templates as a string\. The IDs from the levels are separated by slashes, starting at the node immediately under the root `App` instance, which is usually a stack\. For example, the paths of the two Amazon S3 bucket resources in the previous code example are `Stack1/amzn-s3-demo-bucket` and `Stack2/amzn-s3-demo-bucket`\.
150
+
The AWS CDK typically displays paths in your templates as a string\. The IDs from the levels are separated by slashes, starting at the node immediately under the root `App` instance, which is usually a stack\. For example, the paths of the two Amazon S3 bucket resources in the previous code example are `Stack1/MyBucket` and `Stack2/MyBucket`\.
151
151
152
152
You can access the path of any construct programmatically, as shown in the following example\. This gets the path of `myConstruct`\(or `my_construct`, as Python developers would write it\)\. Since IDs must be unique within the scope they are created, their paths are always unique within an AWS CDK application\.
Unique IDs serve as the *logical identifiers*\(or *logical names*\) of resources in the generated AWS CloudFormation templates for constructs that represent AWS resources\.
276
276
277
-
For example, the Amazon S3 bucket in the previous example that is created within `Stack2` results in an `AWS::S3::Bucket` resource\. The resource's logical ID is `Stack2amzn-s3-demo-bucket4DD88B4F` in the resulting AWS CloudFormation template\.\(For details on how this identifier is generated, see [Unique IDs](#identifiers_unique_ids)\.\)
277
+
For example, the Amazon S3 bucket in the previous example that is created within `Stack2` results in an `AWS::S3::Bucket` resource\. The resource's logical ID is `Stack2MyBucket4DD88B4F` in the resulting AWS CloudFormation template\.\(For details on how this identifier is generated, see [Unique IDs](#identifiers_unique_ids)\.\)
278
278
279
279
### Logical ID stability<aname="identifiers_logical_id_stability"></a>
@@ -553,15 +553,15 @@ Although you can use an external resource anywhere you'd use a similar resource
553
553
554
554
The logical names of resources in AWS CloudFormation are different from the names of resources that are shown in the AWS Management Console after they're deployed by AWS CloudFormation\. The AWS CDK calls these final names *physical names*\.
555
555
556
-
For example, AWS CloudFormation might create the Amazon S3 bucket with the logical ID `Stack2amzn-s3-demo-bucket4DD88B4F` from the previous example with the physical name `stack2amzn-s3-demo-bucket4dd88b4f-iuv1rbv9z3to`\.
556
+
For example, AWS CloudFormation might create the Amazon S3 bucket with the logical ID `Stack2MyBucket4DD88B4F` from the previous example with the physical name `stack2MyBucket4dd88b4f-iuv1rbv9z3to`\.
557
557
558
-
You can specify a physical name when creating constructs that represent resources by using the property *<resourceType>*Name\. The following example creates an Amazon S3 bucket with the physical name `amzn-s3-demo-bucket`\.
558
+
You can specify a physical name when creating constructs that represent resources by using the property *<resourceType>*Name\. The following example creates an Amazon S3 bucket with the physical name `MyBucket`\.
559
559
560
560
------
561
561
#### [ TypeScript ]
562
562
563
563
```
564
-
const bucket = new s3.Bucket(this, 'amzn-s3-demo-bucket', {
0 commit comments