You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.v2.alpha.md
+8Lines changed: 8 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,6 +2,14 @@
2
2
3
3
All notable changes to this project will be documented in this file. See [standard-version](https://github.com/conventional-changelog/standard-version) for commit guidelines.
Copy file name to clipboardExpand all lines: CHANGELOG.v2.md
+25Lines changed: 25 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,6 +2,31 @@
2
2
3
3
All notable changes to this project will be documented in this file. See [standard-version](https://github.com/conventional-changelog/standard-version) for commit guidelines.
***core:** 'postCliContext' property allows context that cannot be overridden by the CLI ([#21743](https://github.com/aws/aws-cdk/issues/21743)) ([a618096](https://github.com/aws/aws-cdk/commit/a618096432a27a808a0352ea186fe1e4db2911c4))
16
+
***dynamodb:** Changes how metricForOperation methods are used ([#22097](https://github.com/aws/aws-cdk/issues/22097)) ([fcb311d](https://github.com/aws/aws-cdk/commit/fcb311d615422b76f18b6be60dd466b315fcd6b0)), closes [#21963](https://github.com/aws/aws-cdk/issues/21963)
17
+
***logs:** add dimensions to metric filter ([#21654](https://github.com/aws/aws-cdk/issues/21654)) ([f834a45](https://github.com/aws/aws-cdk/commit/f834a4537643b32131076111be0693c6f8f96b24)), closes [/github.com/aws/aws-cdk/issues/16999#issuecomment-1005172655](https://github.com/aws//github.com/aws/aws-cdk/issues/16999/issues/issuecomment-1005172655)[#16999](https://github.com/aws/aws-cdk/issues/16999)
18
+
***pipelines:** allow disabling use of change sets ([#21619](https://github.com/aws/aws-cdk/issues/21619)) ([05723e7](https://github.com/aws/aws-cdk/commit/05723e74cc0e760f570c36ec02a70e8936287814)), closes [#20827](https://github.com/aws/aws-cdk/issues/20827)
19
+
***s3-deployment:** extract flag to disable automatic unzipping ([#21805](https://github.com/aws/aws-cdk/issues/21805)) ([91898b5](https://github.com/aws/aws-cdk/commit/91898b51573c0bfd0f26ae7610feb6a400bc8159)), closes [#8065](https://github.com/aws/aws-cdk/issues/8065)
20
+
21
+
22
+
### Bug Fixes
23
+
24
+
***aws-elasticloadbalancingv2:** Validation for interval and timeout of application-target-group ([#22225](https://github.com/aws/aws-cdk/issues/22225)) ([6128e39](https://github.com/aws/aws-cdk/commit/6128e3908f4f6b6a1db66ebf7f77b6c966d1f9e7))
25
+
***cli:** SSO credentials do not work when using a proxy ([#22115](https://github.com/aws/aws-cdk/issues/22115)) ([c425e8c](https://github.com/aws/aws-cdk/commit/c425e8ca1a3d296eb6a7fd7e005d07c1eadd16aa)), closes [#21328](https://github.com/aws/aws-cdk/issues/21328)
26
+
***elbv2:** Use correct format for parsing imported target group ARNs ([#22153](https://github.com/aws/aws-cdk/issues/22153)) ([4704d4c](https://github.com/aws/aws-cdk/commit/4704d4c4ac065634dbada3732193a6753369dd12))
27
+
***rds:** changing engine versions would fail to update on DBInstances that were part of a DBCluster ([#22185](https://github.com/aws/aws-cdk/issues/22185)) ([c070ace](https://github.com/aws/aws-cdk/commit/c070acea1b12ec4f73c7d2087c5408d7e38a90a3)), closes [#21758](https://github.com/aws/aws-cdk/issues/21758)[#22180](https://github.com/aws/aws-cdk/issues/22180)
28
+
* cannot use values that return an instance of a deprecated class for non TS / JS language ([#22204](https://github.com/aws/aws-cdk/issues/22204)) ([4cad2cf](https://github.com/aws/aws-cdk/commit/4cad2cf7e1ca41dedae6adc8866792e5f71b2123))
// In the case of "allowAllOutbound", we don't add any more rules. There
501
539
// is only one rule which allows all traffic and that subsumes any other
502
540
// rule.
503
541
if(!remoteRule){// Warn only if addEgressRule() was explicitely called
504
542
Annotations.of(this).addWarning('Ignoring Egress rule since \'allowAllOutbound\' is set to true; To add customized rules, set allowAllOutbound=false on the SecurityGroup');
505
543
}
506
544
return;
507
-
}else{
545
+
}elseif(!isIpv6&&!this.allowAllOutbound){
508
546
// Otherwise, if the bogus rule exists we can now remove it because the
509
547
// presence of any other rule will get rid of EC2's implicit "all
510
548
// outbound" rule anyway.
511
549
this.removeNoTrafficRule();
512
550
}
513
551
552
+
if(isIpv6&&this.allowAllIpv6Outbound){
553
+
// In the case of "allowAllIpv6Outbound", we don't add any more rules. There
554
+
// is only one rule which allows all traffic and that subsumes any other
555
+
// rule.
556
+
if(!remoteRule){// Warn only if addEgressRule() was explicitely called
557
+
Annotations.of(this).addWarning('Ignoring Egress rule since \'allowAllIpv6Outbound\' is set to true; To add customized rules, set allowAllIpv6Outbound=false on the SecurityGroup');
@@ -532,7 +580,7 @@ export class SecurityGroup extends SecurityGroupBase {
532
580
// to "allOutbound=true" mode, because we might have already emitted
533
581
// EgressRule objects (which count as rules added later) and there's no way
534
582
// to recall those. Better to prevent this for now.
535
-
thrownewError('Cannot add an "all traffic" egress rule in this way; set allowAllOutbound=true on the SecurityGroup instead.');
583
+
thrownewError('Cannot add an "all traffic" egress rule in this way; set allowAllOutbound=true (for ipv6) or allowAllIpv6Outbound=true (for ipv6) on the SecurityGroup instead.');
536
584
}
537
585
538
586
this.addDirectEgressRule(rule);
@@ -596,6 +644,31 @@ export class SecurityGroup extends SecurityGroupBase {
596
644
}
597
645
}
598
646
647
+
/**
648
+
* Add a allow all ipv6 egress rule to the securityGroup
649
+
*
650
+
* This depends on allowAllIpv6Outbound:
651
+
*
652
+
* - If allowAllIpv6Outbound is true, we will add an allow all rule.
653
+
* - If allowAllOutbound is false, we don't do anything since EC2 does not add
654
+
* a default allow all ipv6 rule.
655
+
*/
656
+
privateaddDefaultIpv6EgressRule(){
657
+
constdescription='Allow all outbound ipv6 traffic by default';
0 commit comments