Skip to content

Commit

Permalink
fix(efs): recreate integ.ecs-job-definition
Browse files Browse the repository at this point in the history
  • Loading branch information
ahmetsoykan committed Jun 30, 2023
1 parent 8eb1c49 commit 3676a67
Show file tree
Hide file tree
Showing 12 changed files with 68 additions and 66 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@
"validateOnSynth": false,
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
"cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
"stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/dbfcc646c8225dd32d69798b87a8a94086dd89a2b3137bdf4e0ec96d79cdd4cb.json",
"stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/238f54a14cd8d0bb9eb91ee7e9b46e920ee851fc9520c7c2fa74c997889b2ccb.json",
"requiresBootstrapStackVersion": 6,
"bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
"additionalDependencies": [
Expand Down Expand Up @@ -183,22 +183,16 @@
"data": "myFileSystemEfsSecurityGroup5809542D"
}
],
"/stack/myFileSystem/EfsMountTarget1": [
"/stack/myFileSystem/EfsMountTarget-PrivateSubnet1": [
{
"type": "aws:cdk:logicalId",
"data": "myFileSystemEfsMountTarget154A20479"
"data": "myFileSystemEfsMountTargetPrivateSubnet1752908A7"
}
],
"/stack/myFileSystem/EfsMountTarget2": [
"/stack/myFileSystem/EfsMountTarget-PrivateSubnet2": [
{
"type": "aws:cdk:logicalId",
"data": "myFileSystemEfsMountTarget2E187D733"
}
],
"/stack/mySecret/Resource": [
{
"type": "aws:cdk:logicalId",
"data": "mySecretE4D0A59C"
"data": "myFileSystemEfsMountTargetPrivateSubnet245A93748"
}
],
"/stack/myContainer/ExecutionRole/Resource": [
Expand Down
Original file line number Diff line number Diff line change
@@ -1,15 +1,15 @@
{
"version": "32.0.0",
"files": {
"dbfcc646c8225dd32d69798b87a8a94086dd89a2b3137bdf4e0ec96d79cdd4cb": {
"238f54a14cd8d0bb9eb91ee7e9b46e920ee851fc9520c7c2fa74c997889b2ccb": {
"source": {
"path": "stack.template.json",
"packaging": "file"
},
"destinations": {
"current_account-current_region": {
"bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
"objectKey": "dbfcc646c8225dd32d69798b87a8a94086dd89a2b3137bdf4e0ec96d79cdd4cb.json",
"objectKey": "238f54a14cd8d0bb9eb91ee7e9b46e920ee851fc9520c7c2fa74c997889b2ccb.json",
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
}
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -427,7 +427,7 @@
}
}
},
"myFileSystemEfsMountTarget154A20479": {
"myFileSystemEfsMountTargetPrivateSubnet1752908A7": {
"Type": "AWS::EFS::MountTarget",
"Properties": {
"FileSystemId": {
Expand All @@ -446,7 +446,7 @@
}
}
},
"myFileSystemEfsMountTarget2E187D733": {
"myFileSystemEfsMountTargetPrivateSubnet245A93748": {
"Type": "AWS::EFS::MountTarget",
"Properties": {
"FileSystemId": {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -715,9 +715,9 @@
"version": "0.0.0"
}
},
"EfsMountTarget1": {
"id": "EfsMountTarget1",
"path": "stack/myFileSystem/EfsMountTarget1",
"EfsMountTarget-PrivateSubnet1": {
"id": "EfsMountTarget-PrivateSubnet1",
"path": "stack/myFileSystem/EfsMountTarget-PrivateSubnet1",
"attributes": {
"aws:cdk:cloudformation:type": "AWS::EFS::MountTarget",
"aws:cdk:cloudformation:props": {
Expand All @@ -742,9 +742,9 @@
"version": "0.0.0"
}
},
"EfsMountTarget2": {
"id": "EfsMountTarget2",
"path": "stack/myFileSystem/EfsMountTarget2",
"EfsMountTarget-PrivateSubnet2": {
"id": "EfsMountTarget-PrivateSubnet2",
"path": "stack/myFileSystem/EfsMountTarget-PrivateSubnet2",
"attributes": {
"aws:cdk:cloudformation:type": "AWS::EFS::MountTarget",
"aws:cdk:cloudformation:props": {
Expand Down Expand Up @@ -775,30 +775,6 @@
"version": "0.0.0"
}
},
"mySecret": {
"id": "mySecret",
"path": "stack/mySecret",
"children": {
"Resource": {
"id": "Resource",
"path": "stack/mySecret/Resource",
"attributes": {
"aws:cdk:cloudformation:type": "AWS::SecretsManager::Secret",
"aws:cdk:cloudformation:props": {
"generateSecretString": {}
}
},
"constructInfo": {
"fqn": "aws-cdk-lib.aws_secretsmanager.CfnSecret",
"version": "0.0.0"
}
}
},
"constructInfo": {
"fqn": "aws-cdk-lib.aws_secretsmanager.Secret",
"version": "0.0.0"
}
},
"myContainer": {
"id": "myContainer",
"path": "stack/myContainer",
Expand Down Expand Up @@ -848,8 +824,8 @@
}
},
"constructInfo": {
"fqn": "constructs.Construct",
"version": "10.2.52"
"fqn": "@aws-cdk/aws-batch-alpha.EcsEc2ContainerDefinition",
"version": "0.0.0"
}
},
"ECSJobDefn": {
Expand Down Expand Up @@ -892,14 +868,6 @@
"value": "12"
}
],
"secrets": [
{
"name": "MY_SECRET_ENV_VAR",
"valueFrom": {
"Ref": "mySecretE4D0A59C"
}
}
],
"mountPoints": [
{
"containerPath": "ahhh",
Expand Down Expand Up @@ -948,7 +916,7 @@
}
},
"constructInfo": {
"fqn": "aws-cdk-lib.Resource",
"fqn": "@aws-cdk/aws-batch-alpha.EcsJobDefinition",
"version": "0.0.0"
}
},
Expand Down Expand Up @@ -1001,8 +969,8 @@
}
},
"constructInfo": {
"fqn": "constructs.Construct",
"version": "10.2.52"
"fqn": "@aws-cdk/aws-batch-alpha.EcsFargateContainerDefinition",
"version": "0.0.0"
}
},
"ECSFargateJobDefn": {
Expand Down Expand Up @@ -1086,7 +1054,7 @@
}
},
"constructInfo": {
"fqn": "aws-cdk-lib.Resource",
"fqn": "@aws-cdk/aws-batch-alpha.EcsJobDefinition",
"version": "0.0.0"
}
},
Expand Down Expand Up @@ -1235,8 +1203,8 @@
}
},
"constructInfo": {
"fqn": "constructs.Construct",
"version": "10.2.52"
"fqn": "@aws-cdk/aws-batch-alpha.EcsEc2ContainerDefinition",
"version": "0.0.0"
}
},
"ECSDockerJobDefn": {
Expand Down Expand Up @@ -1287,7 +1255,7 @@
}
},
"constructInfo": {
"fqn": "aws-cdk-lib.Resource",
"fqn": "@aws-cdk/aws-batch-alpha.EcsJobDefinition",
"version": "0.0.0"
}
},
Expand Down Expand Up @@ -1326,7 +1294,7 @@
"path": "BatchEcsJobDefinitionTest/DefaultTest/Default",
"constructInfo": {
"fqn": "constructs.Construct",
"version": "10.2.52"
"version": "10.2.55"
}
},
"DeployAssert": {
Expand Down Expand Up @@ -1372,7 +1340,7 @@
"path": "Tree",
"constructInfo": {
"fqn": "constructs.Construct",
"version": "10.2.52"
"version": "10.2.55"
}
}
},
Expand Down
22 changes: 21 additions & 1 deletion packages/@aws-cdk/cx-api/FEATURE_FLAGS.md
Original file line number Diff line number Diff line change
Expand Up @@ -54,6 +54,7 @@ Flags come in three types:
| [@aws-cdk/aws-ec2:restrictDefaultSecurityGroup](#aws-cdkaws-ec2restrictdefaultsecuritygroup) | Restrict access to the VPC default security group | 2.78.0 | (default) |
| [@aws-cdk/aws-kms:aliasNameRef](#aws-cdkaws-kmsaliasnameref) | KMS Alias name and keyArn will have implicit reference to KMS Key | 2.83.0 | (fix) |
| [@aws-cdk/core:includePrefixInUniqueNameGeneration](#aws-cdkcoreincludeprefixinuniquenamegeneration) | Include the stack prefix in the stack name generation process | 2.84.0 | (fix) |
| [@aws-cdk/aws-efs:mountTargetOrderInsensitiveLogicalId](#aws-cdkaws-efsmounttargetorderinsensitivelogicalid) | When enabled, mount targets will have a stable logicalId that is linked to the associated subnet. | V2NEXT | (fix) |

<!-- END table -->

Expand Down Expand Up @@ -98,7 +99,8 @@ The following json shows the current recommended set of flags, as `cdk init` wou
"@aws-cdk/aws-ec2:restrictDefaultSecurityGroup": true,
"@aws-cdk/aws-apigateway:requestValidatorUniqueId": true,
"@aws-cdk/aws-kms:aliasNameRef": true,
"@aws-cdk/core:includePrefixInUniqueNameGeneration": true
"@aws-cdk/core:includePrefixInUniqueNameGeneration": true,
"@aws-cdk/aws-efs:mountTargetOrderInsensitiveLogicalId": true
}
}
```
Expand Down Expand Up @@ -1008,4 +1010,22 @@ is not viable in some productive setups.
| 2.84.0 | `false` | `true` |


### @aws-cdk/aws-efs:mountTargetOrderInsensitiveLogicalId

*When enabled, mount targets will have a stable logicalId that is linked to the associated subnet.* (fix)

When this feature flag is enabled, each mount target will have a stable
logicalId that is linked to the associated subnet. If the flag is set to
false then the logicalIds of the mount targets can change if the number of
subnets changes.

Set this flag to false for existing mount targets.


| Since | Default | Recommended |
| ----- | ----- | ----- |
| (not in v1) | | |
| V2NEXT | `false` | `true` |


<!-- END details -->
22 changes: 21 additions & 1 deletion packages/aws-cdk-lib/cx-api/FEATURE_FLAGS.md
Original file line number Diff line number Diff line change
Expand Up @@ -58,6 +58,7 @@ Flags come in three types:
| [@aws-cdk/aws-ec2:restrictDefaultSecurityGroup](#aws-cdkaws-ec2restrictdefaultsecuritygroup) | Restrict access to the VPC default security group | 2.78.0 | (default) |
| [@aws-cdk/aws-kms:aliasNameRef](#aws-cdkaws-kmsaliasnameref) | KMS Alias name and keyArn will have implicit reference to KMS Key | 2.83.0 | (fix) |
| [@aws-cdk/core:includePrefixInUniqueNameGeneration](#aws-cdkcoreincludeprefixinuniquenamegeneration) | Include the stack prefix in the stack name generation process | 2.84.0 | (fix) |
| [@aws-cdk/aws-efs:mountTargetOrderInsensitiveLogicalId](#aws-cdkaws-efsmounttargetorderinsensitivelogicalid) | When enabled, mount targets will have a stable logicalId that is linked to the associated subnet. | V2NEXT | (fix) |

<!-- END table -->

Expand Down Expand Up @@ -102,7 +103,8 @@ The following json shows the current recommended set of flags, as `cdk init` wou
"@aws-cdk/aws-ec2:restrictDefaultSecurityGroup": true,
"@aws-cdk/aws-apigateway:requestValidatorUniqueId": true,
"@aws-cdk/aws-kms:aliasNameRef": true,
"@aws-cdk/core:includePrefixInUniqueNameGeneration": true
"@aws-cdk/core:includePrefixInUniqueNameGeneration": true,
"@aws-cdk/aws-efs:mountTargetOrderInsensitiveLogicalId": true
}
}
```
Expand Down Expand Up @@ -1088,4 +1090,22 @@ is not viable in some productive setups.
| 2.84.0 | `false` | `true` |


### @aws-cdk/aws-efs:mountTargetOrderInsensitiveLogicalId

*When enabled, mount targets will have a stable logicalId that is linked to the associated subnet.* (fix)

When this feature flag is enabled, each mount target will have a stable
logicalId that is linked to the associated subnet. If the flag is set to
false then the logicalIds of the mount targets can change if the number of
subnets changes.

Set this flag to false for existing mount targets.


| Since | Default | Recommended |
| ----- | ----- | ----- |
| (not in v1) | | |
| V2NEXT | `false` | `true` |


<!-- END details -->

0 comments on commit 3676a67

Please sign in to comment.