You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: packages/aws-cdk-lib/cx-api/FEATURE_FLAGS.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,7 +38,7 @@ Flags come in three types:
38
38
|[@aws-cdk/core:enablePartitionLiterals](#aws-cdkcoreenablepartitionliterals)| Make ARNs concrete if AWS partition is known | 2.38.0 | fix |
39
39
|[@aws-cdk/aws-ecs:disableExplicitDeploymentControllerForCircuitBreaker](#aws-cdkaws-ecsdisableexplicitdeploymentcontrollerforcircuitbreaker)| Avoid setting the "ECS" deployment controller when adding a circuit breaker | 2.51.0 | fix |
40
40
|[@aws-cdk/aws-events:eventsTargetQueueSameAccount](#aws-cdkaws-eventseventstargetqueuesameaccount)| Event Rules may only push to encrypted SQS queues in the same account | 2.51.0 | fix |
41
-
|[@aws-cdk/aws-iam:importedRoleStackSafeDefaultPolicyName](#aws-cdkaws-iamimportedrolestacksafedefaultpolicyname)| Enable this feature to by default create default policy names for imported roles that depend on the stack the role is in. | 2.60.0 | fix |
41
+
|[@aws-cdk/aws-iam:importedRoleStackSafeDefaultPolicyName](#aws-cdkaws-iamimportedrolestacksafedefaultpolicyname)| Enable this feature to create default policy names for imported roles that depend on the stack the role is in. | 2.60.0 | fix |
42
42
|[@aws-cdk/aws-s3:serverAccessLogsUseBucketPolicy](#aws-cdkaws-s3serveraccesslogsusebucketpolicy)| Use S3 Bucket Policy instead of ACLs for Server Access Logging | 2.60.0 | fix |
43
43
|[@aws-cdk/customresources:installLatestAwsSdkDefault](#aws-cdkcustomresourcesinstalllatestawssdkdefault)| Whether to install the latest SDK by default in AwsCustomResource | 2.60.0 | new default |
44
44
|[@aws-cdk/aws-route53-patters:useCertificate](#aws-cdkaws-route53-pattersusecertificate)| Use the official `Certificate` resource instead of `DnsValidatedCertificate`| 2.61.0 | new default |
@@ -877,7 +877,7 @@ always apply, regardless of the value of this flag.
*Enable this feature to by default create default policy names for imported roles that depend on the stack the role is in.*
880
+
*Enable this feature to create default policy names for imported roles that depend on the stack the role is in.*
881
881
882
882
Flag type: Backwards incompatible bugfix
883
883
@@ -900,7 +900,7 @@ This new implementation creates default policy names based on the constructs nod
900
900
901
901
Flag type: Backwards incompatible bugfix
902
902
903
-
Enable this feature flag to use S3 Bucket Policy for granting permission fo Server Access Logging
903
+
Enable this feature flag to use S3 Bucket Policy for granting permission for Server Access Logging
904
904
rather than using the canned `LogDeliveryWrite` ACL. ACLs do not work when Object Ownership is
905
905
enabled on the bucket.
906
906
@@ -1280,7 +1280,7 @@ Set this flag to false for existing mount targets.
1280
1280
Flag type: New default behavior
1281
1281
1282
1282
If this is set, and a `runtime` prop is not passed to, Lambda NodeJs
1283
-
functions will us the latest version of the runtime provided by the Lambda
1283
+
functions will use the latest version of the runtime provided by the Lambda
1284
1284
service. Do not use this if you your lambda function is reliant on dependencies
1285
1285
shipped as part of the runtime environment.
1286
1286
@@ -1502,7 +1502,7 @@ When this feature flag is disabled, it will keep the root account principal in t
1502
1502
1503
1503
Flag type: New default behavior
1504
1504
1505
-
When this featuer flag is enabled, remove the default deployment alarm settings when creating a AWS ECS service.
1505
+
When this feature flag is enabled, remove the default deployment alarm settings when creating a AWS ECS service.
1506
1506
1507
1507
1508
1508
| Since | Unset behaves like | Recommended value |
@@ -1753,8 +1753,8 @@ the latest Amazon Linux 2023 version will be used instead of Amazon Linux 2.
1753
1753
1754
1754
Flag type: Configuration option
1755
1755
1756
-
Currently, when Aspects are invoked in one single pass of the construct tree.
1757
-
This means that the Aspects that create other Aspects are not run and Aspects that create new nodes of the tree sometimes do not inherit their parent Aspects.
1756
+
Previously, Aspects were invoked in a single pass of the construct tree.
1757
+
This meant that Aspects which created other Aspects were not run, and Aspects that created new nodes in the tree sometimes did not inherit their parent Aspects.
1758
1758
1759
1759
When this feature flag is enabled, a stabilization loop is run to recurse the construct tree multiple times when invoking Aspects.
1760
1760
@@ -1993,7 +1993,7 @@ When enabled, table replica will be default to the removal policy of source tabl
1993
1993
1994
1994
Flag type: New default behavior
1995
1995
1996
-
When this feature flag is enabled, the SDK API call response to desribe user pool client values will be logged in the custom
1996
+
When this feature flag is enabled, the SDK API call response to describe user pool client values will be logged in the custom
1997
1997
resource lambda function logs.
1998
1998
1999
1999
When this feature flag is disabled, the SDK API call response to describe user pool client values will not be logged in the custom
@@ -2172,7 +2172,7 @@ When this feature flag is disabled, a loggroup is created by Lambda service on f
2172
2172
of the function (existing behavior).
2173
2173
LogGroups created in this way do not support Tag propagation, Property Injectors, Aspects.
2174
2174
2175
-
DO NOT ENABLE: If you have and existing app defining a lambda function and
2175
+
DO NOT ENABLE: If you have an existing app defining a lambda function and
2176
2176
have not supplied a logGroup or logRetention prop and your lambda function has
2177
2177
executed at least once, the logGroup has been already created with the same name
0 commit comments