Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): bump the aws-cdk group across 1 directory with 2 updates #2818

Merged
merged 1 commit into from
Jul 24, 2024

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Jul 23, 2024

Bumps the aws-cdk group with 2 updates in the / directory: aws-cdk-lib and aws-cdk.

Updates aws-cdk-lib from 2.145.0 to 2.150.0

Release notes

Sourced from aws-cdk-lib's releases.

v2.150.0

Features

Bug Fixes

  • custom-resources: provider framework will always log all data including confidential data (#30689) (9bd92da), closes #30275
  • stepfunctions-tasks: allow camelCase for parameters of CallAwsServiceCrossRegion (#30795) (5d6ace8), closes #30799

Alpha modules (2.150.0-alpha.0)

v2.149.0

Features

  • codedeploy: zonal configuration for ServerDeploymentConfig (#30429) (da0dc57), closes #30430
  • codestarnotifications: add createdBy property for notification rule (#30780) (a68b418)
  • stepfunctions-tasks: add guardrailConfiguration and trace property to the BedrockInvokeModel (#30426) (772b1d1), closes #30425
  • stepfunctions-tasks: enable resultReuseConfiguration in AthenaStartQueryExecution (#30447) (046bf56), closes #30446
  • update L1 CloudFormation resource definitions (#30786) (6d0a09f)

Bug Fixes

  • apigateway: authorization scope is not added when not explicitly defining authorization type in method or root api (#30822) (e4367a0), closes #30444
  • scheduler-targetes-alpha: multiple schedules cause resolution error during synth (#30634) (727e886), closes #28713

Alpha modules (2.149.0-alpha.0)

v2.148.1

Bug Fixes

  • apigateway: authorization scope is not added when not explicitly defining authorization type in method or root api (#30822) (4bee768), closes #30444

Alpha modules (2.148.1-alpha.0)

v2.148.0

Features

... (truncated)

Changelog

Sourced from aws-cdk-lib's changelog.

2.150.0 (2024-07-22)

Features

Bug Fixes

  • custom-resources: provider framework will always log all data including confidential data (#30689) (9bd92da), closes #30275
  • stepfunctions-tasks: allow camelCase for parameters of CallAwsServiceCrossRegion (#30795) (5d6ace8), closes #30799

2.149.0 (2024-07-12)

Features

  • codedeploy: zonal configuration for ServerDeploymentConfig (#30429) (da0dc57), closes #30430
  • codestarnotifications: add createdBy property for notification rule (#30780) (a68b418)
  • stepfunctions-tasks: add guardrailConfiguration and trace property to the BedrockInvokeModel (#30426) (772b1d1), closes #30425
  • stepfunctions-tasks: enable resultReuseConfiguration in AthenaStartQueryExecution (#30447) (046bf56), closes #30446
  • update L1 CloudFormation resource definitions (#30786) (6d0a09f)

Bug Fixes

  • apigateway: authorization scope is not added when not explicitly defining authorization type in method or root api (#30822) (e4367a0), closes #30444
  • scheduler-targetes-alpha: multiple schedules cause resolution error during synth (#30634) (727e886), closes #28713

2.148.1 (2024-07-11)

Bug Fixes

  • apigateway: authorization scope is not added when not explicitly defining authorization type in method or root api (#30822) (4bee768), closes #30444

2.148.0 (2024-07-05)

Features

... (truncated)

Commits
  • 153a698 feat: update L1 CloudFormation resource definitions (#30921)
  • 7621439 chore(ec2): make applyCloudFormationInit() function public (#30907)
  • b4377a5 feat(lambda): add SnapStart support for arm64 functions (#30898)
  • 230b56b feat(logs): enabling IA log group creation in CN and GovCloud regions (#30904)
  • d918499 chore(lambda): update the fact tables and tests for lambda layers v0.102.1 (#...
  • 726a3be chore: cleanup custom resource handler files (#30887)
  • bbf1ad4 chore(synthetics): add nodejs puppeteer 8 runtime (#30851)
  • 90a41d5 feat(ec2): add g6 instance (#30693)
  • e12ecb1 docs(eks): add documentation about add-ons (#30815)
  • 40a8e61 docs: fix SnsAction typo for aws-cdk-lib aws_cloudwatch Alarm addAlarmAction ...
  • Additional commits viewable in compare view

Updates aws-cdk from 2.145.0 to 2.150.0

Release notes

Sourced from aws-cdk's releases.

v2.150.0

Features

Bug Fixes

  • custom-resources: provider framework will always log all data including confidential data (#30689) (9bd92da), closes #30275
  • stepfunctions-tasks: allow camelCase for parameters of CallAwsServiceCrossRegion (#30795) (5d6ace8), closes #30799

Alpha modules (2.150.0-alpha.0)

v2.149.0

Features

  • codedeploy: zonal configuration for ServerDeploymentConfig (#30429) (da0dc57), closes #30430
  • codestarnotifications: add createdBy property for notification rule (#30780) (a68b418)
  • stepfunctions-tasks: add guardrailConfiguration and trace property to the BedrockInvokeModel (#30426) (772b1d1), closes #30425
  • stepfunctions-tasks: enable resultReuseConfiguration in AthenaStartQueryExecution (#30447) (046bf56), closes #30446
  • update L1 CloudFormation resource definitions (#30786) (6d0a09f)

Bug Fixes

  • apigateway: authorization scope is not added when not explicitly defining authorization type in method or root api (#30822) (e4367a0), closes #30444
  • scheduler-targetes-alpha: multiple schedules cause resolution error during synth (#30634) (727e886), closes #28713

Alpha modules (2.149.0-alpha.0)

v2.148.1

Bug Fixes

  • apigateway: authorization scope is not added when not explicitly defining authorization type in method or root api (#30822) (4bee768), closes #30444

Alpha modules (2.148.1-alpha.0)

v2.148.0

Features

... (truncated)

Changelog

Sourced from aws-cdk's changelog.

2.150.0 (2024-07-22)

Features

Bug Fixes

  • custom-resources: provider framework will always log all data including confidential data (#30689) (9bd92da), closes #30275
  • stepfunctions-tasks: allow camelCase for parameters of CallAwsServiceCrossRegion (#30795) (5d6ace8), closes #30799

2.149.0 (2024-07-12)

Features

  • codedeploy: zonal configuration for ServerDeploymentConfig (#30429) (da0dc57), closes #30430
  • codestarnotifications: add createdBy property for notification rule (#30780) (a68b418)
  • stepfunctions-tasks: add guardrailConfiguration and trace property to the BedrockInvokeModel (#30426) (772b1d1), closes #30425
  • stepfunctions-tasks: enable resultReuseConfiguration in AthenaStartQueryExecution (#30447) (046bf56), closes #30446
  • update L1 CloudFormation resource definitions (#30786) (6d0a09f)

Bug Fixes

  • apigateway: authorization scope is not added when not explicitly defining authorization type in method or root api (#30822) (e4367a0), closes #30444
  • scheduler-targetes-alpha: multiple schedules cause resolution error during synth (#30634) (727e886), closes #28713

2.148.1 (2024-07-11)

Bug Fixes

  • apigateway: authorization scope is not added when not explicitly defining authorization type in method or root api (#30822) (4bee768), closes #30444

2.148.0 (2024-07-05)

Features

... (truncated)

Commits

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions

@dependabot dependabot bot requested review from a team as code owners July 23, 2024 13:54
@boring-cyborg boring-cyborg bot added dependencies Changes that touch dependencies, e.g. Dependabot, etc. documentation Improvements or additions to documentation labels Jul 23, 2024
@pull-request-size pull-request-size bot added the size/S PR between 10-29 LOC label Jul 23, 2024
@dependabot dependabot bot force-pushed the dependabot/npm_and_yarn/aws-cdk-9c886a842c branch 5 times, most recently from cc11a4c to 2c8db7a Compare July 23, 2024 17:03
Bumps the aws-cdk group with 2 updates in the / directory: [aws-cdk-lib](https://github.com/aws/aws-cdk/tree/HEAD/packages/aws-cdk-lib) and [aws-cdk](https://github.com/aws/aws-cdk/tree/HEAD/packages/aws-cdk).


Updates `aws-cdk-lib` from 2.145.0 to 2.150.0
- [Release notes](https://github.com/aws/aws-cdk/releases)
- [Changelog](https://github.com/aws/aws-cdk/blob/main/CHANGELOG.v2.md)
- [Commits](https://github.com/aws/aws-cdk/commits/v2.150.0/packages/aws-cdk-lib)

Updates `aws-cdk` from 2.145.0 to 2.150.0
- [Release notes](https://github.com/aws/aws-cdk/releases)
- [Changelog](https://github.com/aws/aws-cdk/blob/main/CHANGELOG.v2.md)
- [Commits](https://github.com/aws/aws-cdk/commits/v2.150.0/packages/aws-cdk)

---
updated-dependencies:
- dependency-name: aws-cdk-lib
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: aws-cdk
- dependency-name: aws-cdk
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: aws-cdk
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot force-pushed the dependabot/npm_and_yarn/aws-cdk-9c886a842c branch from 2c8db7a to 834daab Compare July 24, 2024 08:02
Copy link

sonarcloud bot commented Jul 24, 2024

@dreamorosi
Copy link
Contributor

I have tested this update (and the previous 2.149) and it appears that it solves the bug I reported in aws/aws-cdk#30694 which caused #2699.

I have created a stack with this content:

import { Stack, type StackProps, CfnOutput, RemovalPolicy } from 'aws-cdk-lib';
import { Construct } from 'constructs';
import { Runtime, Tracing } from 'aws-cdk-lib/aws-lambda';
import { NodejsFunction, OutputFormat } from 'aws-cdk-lib/aws-lambda-nodejs';
import { RetentionDays } from 'aws-cdk-lib/aws-logs';

export class CanadaregionStack extends Stack {
  constructor(scope: Construct, id: string, props?: StackProps) {
    super(scope, id, props);

    const fnName = 'CanadaregionFn';
    const fn = new NodejsFunction(this, 'MyFunction', {
      functionName: fnName,
      runtime: Runtime.NODEJS_20_X,
      entry: './src/index.ts',
      handler: 'handler',
      tracing: Tracing.ACTIVE,
      bundling: {
        minify: true,
        mainFields: ['module', 'main'],
        sourceMap: true,
        format: OutputFormat.ESM,
      },
      logRetention: RetentionDays.ONE_DAY, // <-- this property causes the creation of a custom resource
    });

    new CfnOutput(this, 'FunctionArn', {
      value: fn.functionArn,
    });
  }
}

The stack creates a custom resource because the logRetention property is set; the bug I discovered caused deployments to fail when targeting the ca-central-1 due to the region not being present in a mapping called LatestNodeRuntimeMap that is used by custom resources to look up the latest available Node.js runtime.

Running the stack above, I was able to confirm that the region is now in fact present in the mapping, see below full stack output.

{
 "Resources": {
  "MyLogGroup5C0DAD85": {
   "Type": "AWS::Logs::LogGroup",
   "Properties": {
    "LogGroupName": "/aws/lambda/CanadaregionFn",
    "RetentionInDays": 1
   },
   "UpdateReplacePolicy": "Delete",
   "DeletionPolicy": "Delete",
   "Metadata": {
    "aws:cdk:path": "CanadaregionStack/MyLogGroup/Resource"
   }
  },
  "MyFunctionServiceRole3C357FF2": {
   "Type": "AWS::IAM::Role",
   "Properties": {
    "AssumeRolePolicyDocument": {
     "Statement": [
      {
       "Action": "sts:AssumeRole",
       "Effect": "Allow",
       "Principal": {
        "Service": "lambda.amazonaws.com"
       }
      }
     ],
     "Version": "2012-10-17"
    },
    "ManagedPolicyArns": [
     {
      "Fn::Join": [
       "",
       [
        "arn:",
        {
         "Ref": "AWS::Partition"
        },
        ":iam::aws:policy/service-role/AWSLambdaBasicExecutionRole"
       ]
      ]
     }
    ]
   },
   "Metadata": {
    "aws:cdk:path": "CanadaregionStack/MyFunction/ServiceRole/Resource"
   }
  },
  "MyFunctionServiceRoleDefaultPolicyB705ABD4": {
   "Type": "AWS::IAM::Policy",
   "Properties": {
    "PolicyDocument": {
     "Statement": [
      {
       "Action": [
        "xray:PutTelemetryRecords",
        "xray:PutTraceSegments"
       ],
       "Effect": "Allow",
       "Resource": "*"
      }
     ],
     "Version": "2012-10-17"
    },
    "PolicyName": "MyFunctionServiceRoleDefaultPolicyB705ABD4",
    "Roles": [
     {
      "Ref": "MyFunctionServiceRole3C357FF2"
     }
    ]
   },
   "Metadata": {
    "aws:cdk:path": "CanadaregionStack/MyFunction/ServiceRole/DefaultPolicy/Resource"
   }
  },
  "MyFunction3BAA72D1": {
   "Type": "AWS::Lambda::Function",
   "Properties": {
    "Code": {
     "S3Bucket": {
      "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
     },
     "S3Key": "c7ff225c61b1afaa65460038b8c7b0f1c24e1d1ecc36b681ac7ab7b6841d7dc2.zip"
    },
    "FunctionName": "CanadaregionFn",
    "Handler": "index.handler",
    "Role": {
     "Fn::GetAtt": [
      "MyFunctionServiceRole3C357FF2",
      "Arn"
     ]
    },
    "Runtime": "nodejs20.x",
    "TracingConfig": {
     "Mode": "Active"
    }
   },
   "DependsOn": [
    "MyFunctionServiceRoleDefaultPolicyB705ABD4",
    "MyFunctionServiceRole3C357FF2"
   ],
   "Metadata": {
    "aws:cdk:path": "CanadaregionStack/MyFunction/Resource",
    "aws:asset:path": "asset.c7ff225c61b1afaa65460038b8c7b0f1c24e1d1ecc36b681ac7ab7b6841d7dc2",
    "aws:asset:is-bundled": true,
    "aws:asset:property": "Code"
   }
  },
  "MyFunctionLogRetention6A8272A3": {
   "Type": "Custom::LogRetention",
   "Properties": {
    "ServiceToken": {
     "Fn::GetAtt": [
      "LogRetentionaae0aa3c5b4d4f87b02d85b201efdd8aFD4BFC8A",
      "Arn"
     ]
    },
    "LogGroupName": {
     "Fn::Join": [
      "",
      [
       "/aws/lambda/",
       {
        "Ref": "MyFunction3BAA72D1"
       }
      ]
     ]
    },
    "RetentionInDays": 1
   },
   "Metadata": {
    "aws:cdk:path": "CanadaregionStack/MyFunction/LogRetention/Resource"
   }
  },
  "LogRetentionaae0aa3c5b4d4f87b02d85b201efdd8aServiceRole9741ECFB": {
   "Type": "AWS::IAM::Role",
   "Properties": {
    "AssumeRolePolicyDocument": {
     "Statement": [
      {
       "Action": "sts:AssumeRole",
       "Effect": "Allow",
       "Principal": {
        "Service": "lambda.amazonaws.com"
       }
      }
     ],
     "Version": "2012-10-17"
    },
    "ManagedPolicyArns": [
     {
      "Fn::Join": [
       "",
       [
        "arn:",
        {
         "Ref": "AWS::Partition"
        },
        ":iam::aws:policy/service-role/AWSLambdaBasicExecutionRole"
       ]
      ]
     }
    ]
   },
   "Metadata": {
    "aws:cdk:path": "CanadaregionStack/LogRetentionaae0aa3c5b4d4f87b02d85b201efdd8a/ServiceRole/Resource"
   }
  },
  "LogRetentionaae0aa3c5b4d4f87b02d85b201efdd8aServiceRoleDefaultPolicyADDA7DEB": {
   "Type": "AWS::IAM::Policy",
   "Properties": {
    "PolicyDocument": {
     "Statement": [
      {
       "Action": [
        "logs:DeleteRetentionPolicy",
        "logs:PutRetentionPolicy"
       ],
       "Effect": "Allow",
       "Resource": "*"
      }
     ],
     "Version": "2012-10-17"
    },
    "PolicyName": "LogRetentionaae0aa3c5b4d4f87b02d85b201efdd8aServiceRoleDefaultPolicyADDA7DEB",
    "Roles": [
     {
      "Ref": "LogRetentionaae0aa3c5b4d4f87b02d85b201efdd8aServiceRole9741ECFB"
     }
    ]
   },
   "Metadata": {
    "aws:cdk:path": "CanadaregionStack/LogRetentionaae0aa3c5b4d4f87b02d85b201efdd8a/ServiceRole/DefaultPolicy/Resource"
   }
  },
  "LogRetentionaae0aa3c5b4d4f87b02d85b201efdd8aFD4BFC8A": {
   "Type": "AWS::Lambda::Function",
   "Properties": {
    "Handler": "index.handler",
    "Runtime": {
     "Fn::FindInMap": [
      "LatestNodeRuntimeMap",
      {
       "Ref": "AWS::Region"
      },
      "value"
     ]
    },
    "Timeout": 900,
    "Code": {
     "S3Bucket": {
      "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
     },
     "S3Key": "4e26bf2d0a26f2097fb2b261f22bb51e3f6b4b52635777b1e54edbd8e2d58c35.zip"
    },
    "Role": {
     "Fn::GetAtt": [
      "LogRetentionaae0aa3c5b4d4f87b02d85b201efdd8aServiceRole9741ECFB",
      "Arn"
     ]
    }
   },
   "DependsOn": [
    "LogRetentionaae0aa3c5b4d4f87b02d85b201efdd8aServiceRoleDefaultPolicyADDA7DEB",
    "LogRetentionaae0aa3c5b4d4f87b02d85b201efdd8aServiceRole9741ECFB"
   ],
   "Metadata": {
    "aws:cdk:path": "CanadaregionStack/LogRetentionaae0aa3c5b4d4f87b02d85b201efdd8a/Resource",
    "aws:asset:path": "asset.4e26bf2d0a26f2097fb2b261f22bb51e3f6b4b52635777b1e54edbd8e2d58c35",
    "aws:asset:is-bundled": false,
    "aws:asset:property": "Code"
   }
  },
  "CDKMetadata": {
   "Type": "AWS::CDK::Metadata",
   "Properties": {
    "Analytics": "v2:deflate64:H4sIAAAAAAAA/z2Oy26DQAxFvyX7wU1IN102SO0mfYh8AHIGMxoeNsIzjSrEv1cDSVfn2paPncPh+QX2O7xpZusu6/0V5ktA2xm8aTX34hTms7j3SeJoiob/81lcSYE4eOHF9Dhca6xYamoVPle8RbZpajwOMJfSUxKs/Jbe299UbmkxeqxQlYLCa4LRI5yi7SicUOmuh6Lhh3QxJanEyZJZFy4BnWe3XngMioY/cBzv7a8YxhhSKoRrv0nSw9Dq00++h0MO+a5V77MpcvADQbnxD7eQDVYmAQAA"
   },
   "Metadata": {
    "aws:cdk:path": "CanadaregionStack/CDKMetadata/Default"
   },
   "Condition": "CDKMetadataAvailable"
  }
 },
 "Mappings": {
  "LatestNodeRuntimeMap": {
   "af-south-1": {
    "value": "nodejs20.x"
   },
   "ap-east-1": {
    "value": "nodejs20.x"
   },
   "ap-northeast-1": {
    "value": "nodejs20.x"
   },
   "ap-northeast-2": {
    "value": "nodejs20.x"
   },
   "ap-northeast-3": {
    "value": "nodejs20.x"
   },
   "ap-south-1": {
    "value": "nodejs20.x"
   },
   "ap-south-2": {
    "value": "nodejs20.x"
   },
   "ap-southeast-1": {
    "value": "nodejs20.x"
   },
   "ap-southeast-2": {
    "value": "nodejs20.x"
   },
   "ap-southeast-3": {
    "value": "nodejs20.x"
   },
   "ap-southeast-4": {
    "value": "nodejs20.x"
   },
   "ap-southeast-5": {
    "value": "nodejs20.x"
   },
   "ap-southeast-7": {
    "value": "nodejs20.x"
   },
   "ca-central-1": {
    "value": "nodejs20.x"
   },
   "ca-west-1": {
    "value": "nodejs20.x"
   },
   "cn-north-1": {
    "value": "nodejs18.x"
   },
   "cn-northwest-1": {
    "value": "nodejs18.x"
   },
   "eu-central-1": {
    "value": "nodejs20.x"
   },
   "eu-central-2": {
    "value": "nodejs20.x"
   },
   "eu-north-1": {
    "value": "nodejs20.x"
   },
   "eu-south-1": {
    "value": "nodejs20.x"
   },
   "eu-south-2": {
    "value": "nodejs20.x"
   },
   "eu-west-1": {
    "value": "nodejs20.x"
   },
   "eu-west-2": {
    "value": "nodejs20.x"
   },
   "eu-west-3": {
    "value": "nodejs20.x"
   },
   "il-central-1": {
    "value": "nodejs20.x"
   },
   "me-central-1": {
    "value": "nodejs20.x"
   },
   "me-south-1": {
    "value": "nodejs20.x"
   },
   "mx-central-1": {
    "value": "nodejs20.x"
   },
   "sa-east-1": {
    "value": "nodejs20.x"
   },
   "us-east-1": {
    "value": "nodejs20.x"
   },
   "us-east-2": {
    "value": "nodejs20.x"
   },
   "us-west-1": {
    "value": "nodejs20.x"
   },
   "us-west-2": {
    "value": "nodejs20.x"
   }
  }
 },
 "Outputs": {
  "FunctionArn": {
   "Value": {
    "Fn::GetAtt": [
     "MyFunction3BAA72D1",
     "Arn"
    ]
   }
  }
 },
 "Conditions": {
  "CDKMetadataAvailable": {
   "Fn::Or": [
    {
     "Fn::Or": [
      {
       "Fn::Equals": [
        {
         "Ref": "AWS::Region"
        },
        "af-south-1"
       ]
      },
      {
       "Fn::Equals": [
        {
         "Ref": "AWS::Region"
        },
        "ap-east-1"
       ]
      },
      {
       "Fn::Equals": [
        {
         "Ref": "AWS::Region"
        },
        "ap-northeast-1"
       ]
      },
      {
       "Fn::Equals": [
        {
         "Ref": "AWS::Region"
        },
        "ap-northeast-2"
       ]
      },
      {
       "Fn::Equals": [
        {
         "Ref": "AWS::Region"
        },
        "ap-south-1"
       ]
      },
      {
       "Fn::Equals": [
        {
         "Ref": "AWS::Region"
        },
        "ap-southeast-1"
       ]
      },
      {
       "Fn::Equals": [
        {
         "Ref": "AWS::Region"
        },
        "ap-southeast-2"
       ]
      },
      {
       "Fn::Equals": [
        {
         "Ref": "AWS::Region"
        },
        "ca-central-1"
       ]
      },
      {
       "Fn::Equals": [
        {
         "Ref": "AWS::Region"
        },
        "cn-north-1"
       ]
      },
      {
       "Fn::Equals": [
        {
         "Ref": "AWS::Region"
        },
        "cn-northwest-1"
       ]
      }
     ]
    },
    {
     "Fn::Or": [
      {
       "Fn::Equals": [
        {
         "Ref": "AWS::Region"
        },
        "eu-central-1"
       ]
      },
      {
       "Fn::Equals": [
        {
         "Ref": "AWS::Region"
        },
        "eu-north-1"
       ]
      },
      {
       "Fn::Equals": [
        {
         "Ref": "AWS::Region"
        },
        "eu-south-1"
       ]
      },
      {
       "Fn::Equals": [
        {
         "Ref": "AWS::Region"
        },
        "eu-west-1"
       ]
      },
      {
       "Fn::Equals": [
        {
         "Ref": "AWS::Region"
        },
        "eu-west-2"
       ]
      },
      {
       "Fn::Equals": [
        {
         "Ref": "AWS::Region"
        },
        "eu-west-3"
       ]
      },
      {
       "Fn::Equals": [
        {
         "Ref": "AWS::Region"
        },
        "il-central-1"
       ]
      },
      {
       "Fn::Equals": [
        {
         "Ref": "AWS::Region"
        },
        "me-central-1"
       ]
      },
      {
       "Fn::Equals": [
        {
         "Ref": "AWS::Region"
        },
        "me-south-1"
       ]
      },
      {
       "Fn::Equals": [
        {
         "Ref": "AWS::Region"
        },
        "sa-east-1"
       ]
      }
     ]
    },
    {
     "Fn::Or": [
      {
       "Fn::Equals": [
        {
         "Ref": "AWS::Region"
        },
        "us-east-1"
       ]
      },
      {
       "Fn::Equals": [
        {
         "Ref": "AWS::Region"
        },
        "us-east-2"
       ]
      },
      {
       "Fn::Equals": [
        {
         "Ref": "AWS::Region"
        },
        "us-west-1"
       ]
      },
      {
       "Fn::Equals": [
        {
         "Ref": "AWS::Region"
        },
        "us-west-2"
       ]
      }
     ]
    }
   ]
  }
 },
 "Parameters": {
  "BootstrapVersion": {
   "Type": "AWS::SSM::Parameter::Value<String>",
   "Default": "/cdk-bootstrap/hnb659fds/version",
   "Description": "Version of the CDK Bootstrap resources in this environment, automatically retrieved from SSM Parameter Store. [cdk:skip]"
  }
 },
 "Rules": {
  "CheckBootstrapVersion": {
   "Assertions": [
    {
     "Assert": {
      "Fn::Not": [
       {
        "Fn::Contains": [
         [
          "1",
          "2",
          "3",
          "4",
          "5"
         ],
         {
          "Ref": "BootstrapVersion"
         }
        ]
       }
      ]
     },
     "AssertDescription": "CDK bootstrap stack version 6 required. Please run 'cdk bootstrap' with a recent version of the CDK CLI."
    }
   ]
  }
 }
}

With this in mind, it should now be safe to upgrade CDK and continue our deployments.

@dreamorosi dreamorosi merged commit 507861c into main Jul 24, 2024
11 checks passed
@dreamorosi dreamorosi deleted the dependabot/npm_and_yarn/aws-cdk-9c886a842c branch July 24, 2024 08:53
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Changes that touch dependencies, e.g. Dependabot, etc. documentation Improvements or additions to documentation size/S PR between 10-29 LOC
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant