Skip to content

Commit f8252a2

Browse files
author
Jay Kim
committed
fix: lint issue fix on build failure
1 parent 52fe66e commit f8252a2

File tree

2 files changed

+27
-27
lines changed

2 files changed

+27
-27
lines changed

packages/aws-cdk-lib/aws-stepfunctions-tasks/lib/lambda/invoke.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ import * as iam from '../../../aws-iam';
33
import * as lambda from '../../../aws-lambda';
44
import * as sfn from '../../../aws-stepfunctions';
55
import * as cdk from '../../../core';
6-
import * as cxapi from '../../../cx-api';
76
import { ValidationError } from '../../../core';
7+
import * as cxapi from '../../../cx-api';
88
import { integrationResourceArn, validatePatternSupported } from '../private/task-utils';
99

1010
interface LambdaInvokeBaseProps {

packages/aws-cdk-lib/cx-api/FEATURE_FLAGS.md

Lines changed: 26 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -100,9 +100,9 @@ Flags come in three types:
100100
| [@aws-cdk/pipelines:reduceCrossAccountActionRoleTrustScope](#aws-cdkpipelinesreducecrossaccountactionroletrustscope) | When enabled, scopes down the trust policy for the cross-account action role | 2.189.0 | new default |
101101
| [@aws-cdk/core:aspectPrioritiesMutating](#aws-cdkcoreaspectprioritiesmutating) | When set to true, Aspects added by the construct library on your behalf will be given a priority of MUTATING. | 2.189.1 | new default |
102102
| [@aws-cdk/s3-notifications:addS3TrustKeyPolicyForSnsSubscriptions](#aws-cdks3-notificationsadds3trustkeypolicyforsnssubscriptions) | Add an S3 trust policy to a KMS key resource policy for SNS subscriptions. | 2.195.0 | fix |
103-
| [@aws-cdk/aws-stepfunctions-tasks:lambdaInvokeGrantAllVersions](#aws-cdkaws-stepfunctions-taskslambdainvokegrantallversions) | When enabled, LambdaInvoke grants permissions to all versions of a Lambda function by default | V2NEXT | fix |
104103
| [@aws-cdk/aws-ec2:requirePrivateSubnetsForEgressOnlyInternetGateway](#aws-cdkaws-ec2requireprivatesubnetsforegressonlyinternetgateway) | When enabled, the EgressOnlyGateway resource is only created if private subnets are defined in the dual-stack VPC. | 2.196.0 | fix |
105104
| [@aws-cdk/aws-s3:publicAccessBlockedByDefault](#aws-cdkaws-s3publicaccessblockedbydefault) | When enabled, setting any combination of options for BlockPublicAccess will automatically set true for any options not defined. | 2.196.0 | fix |
105+
| [@aws-cdk/aws-stepfunctions-tasks:lambdaInvokeGrantAllVersions](#aws-cdkaws-stepfunctions-taskslambdainvokegrantallversions) | When enabled, LambdaInvoke grants permissions to all versions of a Lambda function by default | V2NEXT | fix |
106106

107107
<!-- END table -->
108108

@@ -2111,39 +2111,31 @@ When this feature flag is enabled, a S3 trust policy will be added to the KMS ke
21112111
| 2.195.0 | `false` | `true` |
21122112

21132113

2114-
### @aws-cdk/aws-stepfunctions-tasks:lambdaInvokeGrantAllVersions
2114+
### @aws-cdk/aws-ec2:requirePrivateSubnetsForEgressOnlyInternetGateway
21152115

2116-
*When enabled, LambdaInvoke grants permissions to all versions of a Lambda function by default*
2116+
*When enabled, the EgressOnlyGateway resource is only created if private subnets are defined in the dual-stack VPC.*
21172117

21182118
Flag type: Backwards incompatible bugfix
21192119

2120-
When a Step Function invokes a Lambda function version, it requires IAM permissions specifically for that version.
2121-
Currently, the AWS CDK's `LambdaInvoke` construct automatically creates IAM permissions for the specific Lambda
2122-
version referenced, but these permissions are updated during redeployment to only include the new version, removing
2123-
access to previous versions.
2124-
2125-
This can cause in-flight Step Function executions to fail when new Lambda versions are deployed.
2126-
2127-
When this feature flag is enabled, the `LambdaInvoke` construct will automatically grant permissions to both:
2128-
- The specific Lambda version referenced
2129-
- All versions of the Lambda function (using a wildcard)
2130-
2131-
This ensures that in-flight executions continue to work even after deploying updates to Lambda functions.
2120+
When this feature flag is enabled, EgressOnlyGateway resource will not be created when you create a vpc with only public subnets.
21322121

21332122

21342123
| Since | Default | Recommended |
21352124
| ----- | ----- | ----- |
21362125
| (not in v1) | | |
2137-
| V2NEXT | `false` | `true` |
2126+
| 2.196.0 | `false` | `true` |
21382127

21392128

2140-
### @aws-cdk/aws-ec2:requirePrivateSubnetsForEgressOnlyInternetGateway
2129+
### @aws-cdk/aws-s3:publicAccessBlockedByDefault
21412130

2142-
*When enabled, the EgressOnlyGateway resource is only created if private subnets are defined in the dual-stack VPC.*
2131+
*When enabled, setting any combination of options for BlockPublicAccess will automatically set true for any options not defined.*
21432132

21442133
Flag type: Backwards incompatible bugfix
21452134

2146-
When this feature flag is enabled, EgressOnlyGateway resource will not be created when you create a vpc with only public subnets.
2135+
When BlockPublicAccess is not set at all, s3's default behavior will be to set all options to true in aws console.
2136+
The previous behavior in cdk before this feature was; if only some of the BlockPublicAccessOptions were set (not all 4), then the ones undefined would default to false.
2137+
This is counter intuitive to the console behavior where the options would start in true state and a user would uncheck the boxes as needed.
2138+
The new behavior from this feature will allow a user, for example, to set 1 of the 4 BlockPublicAccessOpsions to false, and on deployment the other 3 will remain true.
21472139

21482140

21492141
| Since | Default | Recommended |
@@ -2152,22 +2144,30 @@ When this feature flag is enabled, EgressOnlyGateway resource will not be create
21522144
| 2.196.0 | `false` | `true` |
21532145

21542146

2155-
### @aws-cdk/aws-s3:publicAccessBlockedByDefault
2147+
### @aws-cdk/aws-stepfunctions-tasks:lambdaInvokeGrantAllVersions
21562148

2157-
*When enabled, setting any combination of options for BlockPublicAccess will automatically set true for any options not defined.*
2149+
*When enabled, LambdaInvoke grants permissions to all versions of a Lambda function by default*
21582150

21592151
Flag type: Backwards incompatible bugfix
21602152

2161-
When BlockPublicAccess is not set at all, s3's default behavior will be to set all options to true in aws console.
2162-
The previous behavior in cdk before this feature was; if only some of the BlockPublicAccessOptions were set (not all 4), then the ones undefined would default to false.
2163-
This is counter intuitive to the console behavior where the options would start in true state and a user would uncheck the boxes as needed.
2164-
The new behavior from this feature will allow a user, for example, to set 1 of the 4 BlockPublicAccessOpsions to false, and on deployment the other 3 will remain true.
2153+
When a Step Function invokes a Lambda function version, it requires IAM permissions specifically for that version.
2154+
Currently, the AWS CDK's `LambdaInvoke` construct automatically creates IAM permissions for the specific Lambda
2155+
version referenced, but these permissions are updated during redeployment to only include the new version, removing
2156+
access to previous versions.
2157+
2158+
This can cause in-flight Step Function executions to fail when new Lambda versions are deployed.
2159+
2160+
When this feature flag is enabled, the `LambdaInvoke` construct will automatically grant permissions to both:
2161+
- The specific Lambda version referenced
2162+
- All versions of the Lambda function (using a wildcard)
2163+
2164+
This ensures that in-flight executions continue to work even after deploying updates to Lambda functions.
21652165

21662166

21672167
| Since | Default | Recommended |
21682168
| ----- | ----- | ----- |
21692169
| (not in v1) | | |
2170-
| 2.196.0 | `false` | `true` |
2170+
| V2NEXT | `false` | `true` |
21712171

21722172

21732173
<!-- END details -->

0 commit comments

Comments
 (0)