Skip to content

Commit c16686e

Browse files
johnrawsrgd11
authored andcommitted
release/v1.5.0
1 parent 9a51893 commit c16686e

File tree

2 files changed

+155
-1
lines changed

2 files changed

+155
-1
lines changed

CHANGELOG.md

+154
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,160 @@ All notable changes to this project will be documented in this file.
55
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
66
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
77

8+
9+
## [1.5.0] - 2023-10-05
10+
11+
### Added
12+
- feat(backup) add Backup vault policy
13+
- feat(config): allow users to set stack concurrency
14+
- feat(config) M2131 WAF logging enabled
15+
- feat(control-tower): add control tower controls
16+
- feat(identity-center): add IdentityCenter extended permission set and assignment
17+
- feat(logging): enable non-accelerator subscription filter destination replacement
18+
- feat(logging): move larger CloudWatch logs payloads back into kinesis stream for re-ingestion
19+
- feat(networking): add ability to reference dynamic configuration file replacements and license files for EC2 firewalls
20+
- feat(networking): add dynamic EC2 firewall site-to-site VPN connections and configuration replacements
21+
- feat(networking): add exclude regions for default VPC
22+
- feat(networking): allow gateway and interface endpoint service customizations
23+
- feat(networking): Created Shared ALB and supporting resources (ACM, Target Groups)
24+
- feat(replacements): support Policy Replacements in VPC Endpoint policies
25+
- feat(s3): allow import of S3 buckets
26+
- feat(s3): support lifecycle rules for given prefix
27+
- feat(security-hub): allow customers to disable Security Hub CloudWatch logs
28+
- feat(service-catalog): support service catalog product constraints
29+
- feat(ssm): allow SSM replacements through replacements-config.yaml
30+
- feat(ssm): allow creation of custom SSM parameters
31+
- feat(tags): Support Customer Tags
32+
### Changed
33+
- enhancement(docs): add script to generate versioned TypeDocs
34+
- enhancement(iam): make managed AD resolverRuleName property optional
35+
- enhancement(networking): add ability to define advanced VPN tunnel configuration parameters
36+
- enhancement(networking): add ability to dynamically reference same-VPC subnets as a route destination
37+
- enhancement(networking): add ability to reference physical IDs for subnet availability zones and for Network Firewall endpoint lookups
38+
- enhancement(networking): add AWSManagedAggregateThreatList to supported DNS firewall managed domain lists
39+
- enhancement(pipeline): allow synth and deploy to write to stack specific directories
40+
- enhancement(validation): Add config rule name validation
41+
- enhancement(validation): add name uniqueness check for IAM policies and roles
42+
- enhancement(validation): add validation for security delegated admin account
43+
- chore(deps): bump semver to 7.5.2
44+
- chore(deps): bump lerna to 7.2.0
45+
- chore(deps): bump proxy-agent to 6.3.0
46+
- chore(deps): bump aws-cdk to 2.93.0
47+
- chore(docs): added instructions for validations and tests
48+
- chore(docs): added documentation for excluded regions in audit manager
49+
- chore(docs): document dynamic partitioning format in TypeDocs
50+
- chore(docs): remove invalid targets for routeTableEntry
51+
- chore(docs): update TransitGatewayAttachmentConfig docs to reflect subnet update behavior
52+
- chore(docs): updated typedoc example for budget notifications
53+
- chore(docs): update maxAggregationInterval to match appropriate unit
54+
- chore(docs): VPC Flow Logs central logging method indicated service-native S3 logging
55+
- chore(logging): add accelerator roles to central bucket policy
56+
- chore(organizations): Moved getOrgId function to config
57+
- chore(organizations): Removed Check for Tag and Backup policies in AWS GovCloud
58+
- chore(test): update test pipeline lambda functions to Node.js 16 runtime
59+
- chore(utils): moved chunkArray to utils
60+
- chore(validation): Remove let from config validation
61+
- chore: license file updates
62+
- chore: refactor engine to reduce complexity
63+
- chore: updated dependencies for aws-sdk
64+
### Fixed
65+
- fix(accelerator-prefix): accelerator prefix remains hardcoded in some constructs
66+
- fix(accounts): allow Control Tower account enrollment in GovCloud
67+
- fix(acm): Duplicate certificate imported on CR update
68+
- fix(applications): allow launchTemplates without userData, remove securityGroup checks
69+
- fix(audit-manager): excluded regions list ignored in security audit stack
70+
- fix(bootstrap): synth large environments runs out of memory
71+
- fix(cdk): fixed promise bug for parallel deployments
72+
- fix(cloudwatch): log replication with exclusion times out
73+
- fix(cloudwatch): Updated logic to deploy CW log groups to OUs
74+
- fix(customizations): make security groups optional in launch templates
75+
- fix(deployment) - Enforce IMDS v2 for Managed Active Directory controlling EC2 instance
76+
- fix(guardduty): create guardduty prefix in s3 destination when prefix deleted by life cycle policy
77+
- fix(guardduty): support account create and delete actions for more than 50 accounts
78+
- fix(guardduty): Delete publishing destination when enabled is false
79+
- fix(guardduty): Updated createMembers function to use SDKv3
80+
- fix(iam): remove permissive runInstance from policy
81+
- fix(iam): add IAM validation for roles, groups, users to Policies
82+
- fix(iam): failed to assume role with static partition
83+
- fix(iam): Added error handling for service linked role already existing
84+
- fix(iam): update boundary control policy IAM get user actions
85+
- fix(identity-center): incorrect sso regional endpoint
86+
- fix(identity-center): fix api rate exceeded issue
87+
- fix(limits): Allow service quota limits to be defined with regions
88+
- fix(logging): change kms key lookup for central bucket
89+
- fix(logging): fixed logging stack deployment order
90+
- fix(logging): central log bucket cmk role exists when centralized logging changed
91+
- fix(logging): enable CloudWatch logging on Firehose
92+
- fix(logging): Add prefix creation for imported central log buckets
93+
- fix(logging): add firehose records processor to exclusion list default
94+
- fix(logging): compress logs within lambda and set firehose transform to uncompressed
95+
- fix(MAD): Remove key pair from MAD instance
96+
- fix(networking): duplicate construct error when creating GWLB endpoints in multiple VPCs under the same account
97+
- fix(networking): fix underscore subnet names
98+
- fix(networking): Transit gateway peering fails when multiple accepter tgw has multiple requester
99+
- fix(networking): Fixed IPv6 validation for Prefix Lists
100+
- fix(networking): incorrect private hosted zones created for interface endpoint services with specific API subdomains
101+
- fix(networking): AZ not defined error when outpost subnet is configured
102+
- fix(networking): fixed isTarget conditions for target groups
103+
- fix(networking): update regional conditions for shared ALBs
104+
- fix(networking): EC2 firewall config replacements incorrectly matches multiple variables on a single line
105+
- fix(networking): EC2 firewall config replacements missing hostname lookup
106+
- fix(organizations): load ou units asynchronously
107+
- fix(pipeline): useManagementAccessRole optional
108+
- fix(pipeline): time out in CodePipeline Review stage
109+
- fix(pipeline): change assume role behavior on management account
110+
- fix(pipeline): add nagSupression to firewall service linked role
111+
- fix(pipeline): toolkit does not use prefix variable
112+
- fix(replacements): Updated generatePolicyReplacements arguments to include organization id
113+
- fix(roles): add UUID to service linked role to prevent accidental deletion
114+
- fix(roles): make security audit stack partition aware
115+
- fix(roles): add delay on service linked role creation
116+
- fix(roles): create service linked role in custom resource
117+
- fix(saml): SAML login is hardcoded
118+
- fix(s3): access logs bucket external policy fix
119+
- fix(scp): scpRevertChanges should use accelerator prefix
120+
- fix(security): bring your own KMS key cannot reference service-linked roles in key policy file
121+
- fix(security): Increased memory for GuardDuty custom resource
122+
- fix(security): custom config rule discarding triggering resource types
123+
- fix(ssm): PutSsmParameter upgrade from v1.3.x to v1.4.2+ fails
124+
- fix(ssm): Added check to see if roles exist before policy attachment
125+
- fix(sso): Added validation to flag permission set assignments created for management account
126+
- fix(tagging): Accel-P tag is appropriately set on resources
127+
- fix(uninstaller) detach customer policies prior to delete
128+
- fix(validation): Add config rule name validation
129+
- fix(validation): validate certificate deployment target
130+
- fix(validation): undefined Config remediation target account name causes false positive
131+
### Configuration Changes
132+
- enhancement(aws-best-practices): Added README for Best Practices
133+
- enhancement(aws-best-practices): Update Macie Permissions
134+
- enhancement(aws-best-practices): apply SCPs to security OU
135+
- enhancement(aws-best-practices-govcloud):update AWS GovCloud(US) configuration per FedRAMP assessment
136+
- chore(education): migrate EDU sample configuration directory to external repository
137+
- chore(elections): remove election sample directory
138+
- chore(config): cccs/tse Config updates
139+
## [1.4.3] - 2023-07-19
140+
141+
### Fixed
142+
- fix(logging): cloudwatch logging, change log format in firehose to json
143+
- fix(organizations): large OU organizations fail to load during prepare stage
144+
- fix(networking): cannot provision new IPAM subnets when VPC has CIDRs from non-contiguous CIDR blocks
145+
- fix(networking): Modify Transit Gateway resource lookup construct ids
146+
- fix(validate-config): ValidateEnvironmentConfig improperly evaluates enrolled CT accounts as not enrolled
147+
148+
### Configuration Changes
149+
- chore(aws-best-practices-tse-se): include granular billing SCP permission updates
150+
- chore(aws-best-practices-cccs-medium): include granular billing SCP permission updates
151+
152+
## [1.4.2] - 2023-06-16
153+
154+
### Fixed
155+
156+
- fix(ssm): PutSsmParameters custom resource ignores new accounts
157+
- chore(organizations): moved getOrganizationId to organizations-config
158+
- fix(iam): service linked roles fail to create in multi-region deployment
159+
- fix(validation): TGW route validation fails when prefixList deployment targets do not have excluded regions
160+
- fix(validation): incorrectly configured security delegated admin account isn’t caught by validation
161+
- fix(docs): README indicates S3 server access logs are replicated to central logs bucket
8162
## [1.4.1] - 2023-05-18
9163

10164
### Fixed

source/packages/@aws-accelerator/accelerator/test/__snapshots__/logging-stack.test.ts.snap

+1-1
Original file line numberDiff line numberDiff line change
@@ -8243,7 +8243,7 @@ exports[`LoggingStack Construct(LoggingStack): Snapshot Test 2`] = `
82438243
"Properties": {
82448244
"Name": "/accelerator/AWSAccelerator-LoggingStack-333333333333-us-west-2/version",
82458245
"Type": "String",
8246-
"Value": "1.4.1",
8246+
"Value": "1.5.0",
82478247
},
82488248
"Type": "AWS::SSM::Parameter",
82498249
},

0 commit comments

Comments
 (0)