You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: packages/aws-cdk-lib/cx-api/FEATURE_FLAGS.md
+26-26Lines changed: 26 additions & 26 deletions
Original file line number
Diff line number
Diff line change
@@ -100,9 +100,9 @@ Flags come in three types:
100
100
|[@aws-cdk/pipelines:reduceCrossAccountActionRoleTrustScope](#aws-cdkpipelinesreducecrossaccountactionroletrustscope)| When enabled, scopes down the trust policy for the cross-account action role | 2.189.0 | new default |
101
101
|[@aws-cdk/core:aspectPrioritiesMutating](#aws-cdkcoreaspectprioritiesmutating)| When set to true, Aspects added by the construct library on your behalf will be given a priority of MUTATING. | 2.189.1 | new default |
102
102
|[@aws-cdk/s3-notifications:addS3TrustKeyPolicyForSnsSubscriptions](#aws-cdks3-notificationsadds3trustkeypolicyforsnssubscriptions)| Add an S3 trust policy to a KMS key resource policy for SNS subscriptions. | 2.195.0 | fix |
103
-
|[@aws-cdk/aws-stepfunctions-tasks:lambdaInvokeGrantAllVersions](#aws-cdkaws-stepfunctions-taskslambdainvokegrantallversions)| When enabled, LambdaInvoke grants permissions to all versions of a Lambda function by default | V2NEXT | fix |
104
103
|[@aws-cdk/aws-ec2:requirePrivateSubnetsForEgressOnlyInternetGateway](#aws-cdkaws-ec2requireprivatesubnetsforegressonlyinternetgateway)| When enabled, the EgressOnlyGateway resource is only created if private subnets are defined in the dual-stack VPC. | 2.196.0 | fix |
105
104
|[@aws-cdk/aws-s3:publicAccessBlockedByDefault](#aws-cdkaws-s3publicaccessblockedbydefault)| When enabled, setting any combination of options for BlockPublicAccess will automatically set true for any options not defined. | 2.196.0 | fix |
105
+
|[@aws-cdk/aws-stepfunctions-tasks:lambdaInvokeGrantAllVersions](#aws-cdkaws-stepfunctions-taskslambdainvokegrantallversions)| When enabled, LambdaInvoke grants permissions to all versions of a Lambda function by default | V2NEXT | fix |
106
106
107
107
<!-- END table -->
108
108
@@ -2111,39 +2111,31 @@ When this feature flag is enabled, a S3 trust policy will be added to the KMS ke
*When enabled, the EgressOnlyGateway resource is only created if private subnets are defined in the dual-stack VPC.*
2131
+
*When enabled, setting any combination of options for BlockPublicAccess will automatically set true for any options not defined.*
2143
2132
2144
2133
Flag type: Backwards incompatible bugfix
2145
2134
2146
-
When this feature flag is enabled, EgressOnlyGateway resource will not be created when you create a vpc with only public subnets.
2135
+
When BlockPublicAccess is not set at all, s3's default behavior will be to set all options to true in aws console.
2136
+
The previous behavior in cdk before this feature was; if only some of the BlockPublicAccessOptions were set (not all 4), then the ones undefined would default to false.
2137
+
This is counter intuitive to the console behavior where the options would start in true state and a user would uncheck the boxes as needed.
2138
+
The new behavior from this feature will allow a user, for example, to set 1 of the 4 BlockPublicAccessOpsions to false, and on deployment the other 3 will remain true.
2147
2139
2148
2140
2149
2141
| Since | Default | Recommended |
@@ -2152,22 +2144,30 @@ When this feature flag is enabled, EgressOnlyGateway resource will not be create
*When enabled, setting any combination of options for BlockPublicAccess will automatically set true for any options not defined.*
2149
+
*When enabled, LambdaInvoke grants permissions to all versions of a Lambda function by default*
2158
2150
2159
2151
Flag type: Backwards incompatible bugfix
2160
2152
2161
-
When BlockPublicAccess is not set at all, s3's default behavior will be to set all options to true in aws console.
2162
-
The previous behavior in cdk before this feature was; if only some of the BlockPublicAccessOptions were set (not all 4), then the ones undefined would default to false.
2163
-
This is counter intuitive to the console behavior where the options would start in true state and a user would uncheck the boxes as needed.
2164
-
The new behavior from this feature will allow a user, for example, to set 1 of the 4 BlockPublicAccessOpsions to false, and on deployment the other 3 will remain true.
2153
+
When a Step Function invokes a Lambda function version, it requires IAM permissions specifically for that version.
2154
+
Currently, the AWS CDK's `LambdaInvoke` construct automatically creates IAM permissions for the specific Lambda
2155
+
version referenced, but these permissions are updated during redeployment to only include the new version, removing
2156
+
access to previous versions.
2157
+
2158
+
This can cause in-flight Step Function executions to fail when new Lambda versions are deployed.
2159
+
2160
+
When this feature flag is enabled, the `LambdaInvoke` construct will automatically grant permissions to both:
2161
+
- The specific Lambda version referenced
2162
+
- All versions of the Lambda function (using a wildcard)
2163
+
2164
+
This ensures that in-flight executions continue to work even after deploying updates to Lambda functions.
0 commit comments