Skip to content

Commit d4a45d5

Browse files
rycerratrgd11
authored andcommitted
release/v1.14.0
1 parent 03c74b2 commit d4a45d5

File tree

5 files changed

+27
-325
lines changed

5 files changed

+27
-325
lines changed

CHANGELOG.md

Lines changed: 23 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,48 +5,66 @@ All notable changes to this project will be documented in this file.
55
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
66
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
77

8-
## [1.14.0] - 2025-10-27
8+
## [1.14.0] - 2025-11-24
99

1010
### Added
11+
1112
- feat(cloudwatch): add config for cloud watch metric filter default value
1213
- feat(config): dynamic aws regions lookup
1314
- feat(config): support include in yaml files
1415
- feat(control-tower): add additional status logging
1516
- feat(control-tower): add support of control tower 4.0
1617
- feat(networking): add vpn connection ipv6 support
17-
- feat(module): add control tower logging
18+
- feat(networking): enable ip targets
19+
- feat(organizations): override default allowed scp attachment values
20+
- feat(securityhub): add support for CIS AWS Foundations Benchmark v5.0.0
21+
- feat(securityhub): add support for any future standard supported by securityhub
22+
- feat(ssm): implement ssm document block public access at account level
23+
- feat(toolkit): enable forceBootstrap with toolkit
24+
- feat(uninstaller): add support for local config directories when uninstalling LZA
1825

1926
### Fixed
2027

28+
- fix(account): improve error handling for org account creation
29+
- fix(asea): avoid re-processing custom resources deleted from ASEA stacks
2130
- fix(asea): fix conditional to delete custom resources with old naming convention
2231
- fix(cdk): fix external pipeline diagnostics
2332
- fix(cdk): updated cdk from 2.158 to 2.1027, disabled telemetry by default
2433
- fix(cdk): update customizations to use cdk dependency management
2534
- fix(config): fix issue where accountIds were not be added to list, update pitr config for dynamodb tables
35+
- fix(config): improve error logging in validation
2636
- fix(control-tower): landing zone operation fails on cmk permission
2737
- fix(control-tower): ou registration fails in CT with BadRequestException: Invalid request body
2838
- fix(control-tower): update operation to maintain existing unchanged manifests properties
39+
- fix(control-tower): upgrade check fails for missing configHubConfig object in manifest
40+
- fix(dependencies): update glob package version
2941
- fix(identity-center): removed deprecated filter option
3042
- fix(logging): ignore failed CreateLogGroup event
43+
- fix(logging): skipped tags for AWS::Lambda::EventSourceMapping resource in govcloud
3144
- fix(metadata): add s3 read permissions for config artifact bucket to accelerator metadata lambda service role
3245
- fix(metadata): changed ou lookups to only latest commit
3346
- fix(modules): fixed external credentials for account alias module
47+
- fix(modules): enable each module execution skip by environment variable
3448
- fix(networking): delete default vpc in accounts without a vpc
3549
- fix(networking): fix logic for nlb ip address role not provisioning
50+
- fix(networking): fix vpc stack dependencies
51+
- fix(networking): update lookup for tgw vpc attachment in govcloud
52+
- fix(organizations): updated detachment logic to target policy based on the event only
3653
- fix(pipeline): replace cdk s3 deploy with s3 api for s3 based config
3754
- fix(pipeline): removed cdk bucket deploy for config that has s3 as source
55+
- fix(prerequisites): updated service quota logic to continue if it encounters an error
3856
- fix(s3): add s3ResourcePolicyAttachments for access log bucket
57+
- fix(ssm): block public document sharing module fails to assume role in external pipeline account
58+
- fix(ssm): preserve ssm runAsEnabled setting and runAsDefaultUser
3959
- fix(tags): skip adding tags for events rule
4060
- fix(utility): fix aws arn validation to support partitions other than commercial
4161
- fix(validation): allow top-level domains in route53 resolver rules
4262
- fix(validation): updated regex validation for Route53 Resolver Rule DNS to pass TLD
4363
- fix: make email comparison case-insensitive in account validation
44-
- fix(ssm): block public document sharing module fails to assume role in external pipeline account
4564

4665
### Changed
47-
- feat(securityhub): add suppport for any future standard supported by securityhub
48-
- chore(cloudtrail): add documentation for cloudtrail data events behavior
4966

67+
- chore(cloudtrail): add documentation for cloudtrail data events behavior
5068
- chore(cdk): upgrade aws-cdk-lib and migrate stack management to toolkit-lib
5169
- chore(package): removes dependency of fs package
5270
- chore(package): upgrade lerna, nx, axios, eslint*, prettier packages

source/packages/@aws-accelerator/accelerator/test/__snapshots__/network-prep-stack.test.ts.snap

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1189,7 +1189,7 @@ drop http $HOME_NET any -> $EXTERNAL_NET any (http.host; content:"example.com";
11891189
},
11901190
"Environment": {
11911191
"Variables": {
1192-
"SOLUTION_ID": "AwsSolution/SO0199/1.15.0",
1192+
"SOLUTION_ID": "AwsSolution/SO0199/1.14.0",
11931193
},
11941194
},
11951195
"Handler": "__entrypoint__.handler",

source/packages/@aws-accelerator/accelerator/test/__snapshots__/network-vpc-stack.test.ts.snap

Lines changed: 0 additions & 213 deletions
Original file line numberDiff line numberDiff line change
@@ -138,103 +138,6 @@ exports[`NetworkVpcStack > Construct(NetworkVpcStack): Snapshot Test 1`] = `
138138
"Type": "Custom::SsmPutParameterValue",
139139
"UpdateReplacePolicy": "Delete",
140140
},
141-
"CustomDeleteDefaultVpcCustomResourceProviderHandler87E89F35": {
142-
"DependsOn": [
143-
"CustomDeleteDefaultVpcCustomResourceProviderRole80963EEF",
144-
],
145-
"Properties": {
146-
"Code": {
147-
"S3Bucket": "cdk-hnb659fds-assets-555555555555-us-east-1",
148-
"S3Key": "REPLACED-GENERATED-NAME.zip",
149-
},
150-
"Environment": {
151-
"Variables": {
152-
"SOLUTION_ID": "AwsSolution/SO0199/1.14.0",
153-
},
154-
},
155-
"Handler": "__entrypoint__.handler",
156-
"MemorySize": 512,
157-
"Role": {
158-
"Fn::GetAtt": [
159-
"CustomDeleteDefaultVpcCustomResourceProviderRole80963EEF",
160-
"Arn",
161-
],
162-
},
163-
"Runtime": "nodejs20.x",
164-
"Timeout": 900,
165-
},
166-
"Type": "AWS::Lambda::Function",
167-
},
168-
"CustomDeleteDefaultVpcCustomResourceProviderLogGroup4113DA48": {
169-
"DeletionPolicy": "Delete",
170-
"Properties": {
171-
"LogGroupName": {
172-
"Fn::Join": [
173-
"",
174-
[
175-
"/aws/lambda/",
176-
{
177-
"Ref": "CustomDeleteDefaultVpcCustomResourceProviderHandler87E89F35",
178-
},
179-
],
180-
],
181-
},
182-
"RetentionInDays": 3653,
183-
},
184-
"Type": "AWS::Logs::LogGroup",
185-
"UpdateReplacePolicy": "Delete",
186-
},
187-
"CustomDeleteDefaultVpcCustomResourceProviderRole80963EEF": {
188-
"Properties": {
189-
"AssumeRolePolicyDocument": {
190-
"Statement": [
191-
{
192-
"Action": "sts:AssumeRole",
193-
"Effect": "Allow",
194-
"Principal": {
195-
"Service": "lambda.amazonaws.com",
196-
},
197-
},
198-
],
199-
"Version": "2012-10-17",
200-
},
201-
"ManagedPolicyArns": [
202-
{
203-
"Fn::Sub": "arn:\${AWS::Partition}:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole",
204-
},
205-
],
206-
"Policies": [
207-
{
208-
"PolicyDocument": {
209-
"Statement": [
210-
{
211-
"Action": [
212-
"ec2:DeleteInternetGateway",
213-
"ec2:DetachInternetGateway",
214-
"ec2:DeleteNetworkAcl",
215-
"ec2:DeleteRoute",
216-
"ec2:DeleteSecurityGroup",
217-
"ec2:DeleteSubnet",
218-
"ec2:DeleteVpc",
219-
"ec2:DescribeInternetGateways",
220-
"ec2:DescribeNetworkAcls",
221-
"ec2:DescribeRouteTables",
222-
"ec2:DescribeSecurityGroups",
223-
"ec2:DescribeSubnets",
224-
"ec2:DescribeVpcs",
225-
],
226-
"Effect": "Allow",
227-
"Resource": "*",
228-
},
229-
],
230-
"Version": "2012-10-17",
231-
},
232-
"PolicyName": "Inline",
233-
},
234-
],
235-
},
236-
"Type": "AWS::IAM::Role",
237-
},
238141
"CustomSsmGetParameterValueCustomResourceProviderHandlerAAD0E7EE": {
239142
"DependsOn": [
240143
"CustomSsmGetParameterValueCustomResourceProviderRoleB3AFDDB2",
@@ -1373,122 +1276,6 @@ exports[`NoVpcFlowLogStack > Construct(NetworkVpcStack): Snapshot Test 1`] = `
13731276
},
13741277
},
13751278
"Resources": {
1376-
"CustomDeleteDefaultVpcCustomResourceProviderHandler87E89F35": {
1377-
"DependsOn": [
1378-
"CustomDeleteDefaultVpcCustomResourceProviderRole80963EEF",
1379-
],
1380-
"Properties": {
1381-
"Code": {
1382-
"S3Bucket": "cdk-hnb659fds-assets-111111111111-us-east-1",
1383-
"S3Key": "REPLACED-GENERATED-NAME.zip",
1384-
},
1385-
"Environment": {
1386-
"Variables": {
1387-
"SOLUTION_ID": "AwsSolution/SO0199/1.14.0",
1388-
},
1389-
},
1390-
"Handler": "__entrypoint__.handler",
1391-
"MemorySize": 512,
1392-
"Role": {
1393-
"Fn::GetAtt": [
1394-
"CustomDeleteDefaultVpcCustomResourceProviderRole80963EEF",
1395-
"Arn",
1396-
],
1397-
},
1398-
"Runtime": "nodejs20.x",
1399-
"Timeout": 900,
1400-
},
1401-
"Type": "AWS::Lambda::Function",
1402-
},
1403-
"CustomDeleteDefaultVpcCustomResourceProviderLogGroup4113DA48": {
1404-
"DeletionPolicy": "Delete",
1405-
"Properties": {
1406-
"KmsKeyId": {
1407-
"Ref": "SsmParameterValueacceleratorkmscloudwatchkeyarnC96584B6F00A464EAD1953AFF4B05118Parameter",
1408-
},
1409-
"LogGroupName": {
1410-
"Fn::Join": [
1411-
"",
1412-
[
1413-
"/aws/lambda/",
1414-
{
1415-
"Ref": "CustomDeleteDefaultVpcCustomResourceProviderHandler87E89F35",
1416-
},
1417-
],
1418-
],
1419-
},
1420-
"RetentionInDays": 3653,
1421-
},
1422-
"Type": "AWS::Logs::LogGroup",
1423-
"UpdateReplacePolicy": "Delete",
1424-
},
1425-
"CustomDeleteDefaultVpcCustomResourceProviderRole80963EEF": {
1426-
"Properties": {
1427-
"AssumeRolePolicyDocument": {
1428-
"Statement": [
1429-
{
1430-
"Action": "sts:AssumeRole",
1431-
"Effect": "Allow",
1432-
"Principal": {
1433-
"Service": "lambda.amazonaws.com",
1434-
},
1435-
},
1436-
],
1437-
"Version": "2012-10-17",
1438-
},
1439-
"ManagedPolicyArns": [
1440-
{
1441-
"Fn::Sub": "arn:\${AWS::Partition}:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole",
1442-
},
1443-
],
1444-
"Policies": [
1445-
{
1446-
"PolicyDocument": {
1447-
"Statement": [
1448-
{
1449-
"Action": [
1450-
"ec2:DeleteInternetGateway",
1451-
"ec2:DetachInternetGateway",
1452-
"ec2:DeleteNetworkAcl",
1453-
"ec2:DeleteRoute",
1454-
"ec2:DeleteSecurityGroup",
1455-
"ec2:DeleteSubnet",
1456-
"ec2:DeleteVpc",
1457-
"ec2:DescribeInternetGateways",
1458-
"ec2:DescribeNetworkAcls",
1459-
"ec2:DescribeRouteTables",
1460-
"ec2:DescribeSecurityGroups",
1461-
"ec2:DescribeSubnets",
1462-
"ec2:DescribeVpcs",
1463-
],
1464-
"Effect": "Allow",
1465-
"Resource": "*",
1466-
},
1467-
],
1468-
"Version": "2012-10-17",
1469-
},
1470-
"PolicyName": "Inline",
1471-
},
1472-
],
1473-
},
1474-
"Type": "AWS::IAM::Role",
1475-
},
1476-
"DeleteDefaultVpc4DBAE36C": {
1477-
"DeletionPolicy": "Delete",
1478-
"DependsOn": [
1479-
"CustomDeleteDefaultVpcCustomResourceProviderLogGroup4113DA48",
1480-
],
1481-
"Properties": {
1482-
"ServiceToken": {
1483-
"Fn::GetAtt": [
1484-
"CustomDeleteDefaultVpcCustomResourceProviderHandler87E89F35",
1485-
"Arn",
1486-
],
1487-
},
1488-
},
1489-
"Type": "Custom::DeleteDefaultVpc",
1490-
"UpdateReplacePolicy": "Delete",
1491-
},
14921279
"EnableCentralEndpointsRoleB69A8E04": {
14931280
"Metadata": {
14941281
"cdk_nag": {

0 commit comments

Comments
 (0)