-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(cognito-identitypool-alpha): prevent stacks from not deploying correctly #33609
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
(This review is outdated)
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #33609 +/- ##
=======================================
Coverage 82.21% 82.21%
=======================================
Files 119 119
Lines 6876 6876
Branches 1162 1162
=======================================
Hits 5653 5653
Misses 1120 1120
Partials 103 103
Flags with carried forward coverage won't be shown. Click here to find out more.
|
Exemption Request: The snapshot has been updated |
AWS CodeBuild CI Report
Powered by github-codebuild-logs, available on the AWS Serverless Application Repository |
For the sake of completeness, this avoids redeployments with versions
...which is identical to what these changes result in it being. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
✅ Updated pull request passes all PRLinter validations. Dismissing previous PRLinter review.
Thank you for contributing! Your pull request will be updated from main and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork). |
Comments on closed issues and PRs are hard for our team to see. |
Issue # (if applicable)
Closes #33510
Reason for this change
A previous change (PR33305) removed the
IdentityPoolRoleAttachment
L2 construct, which also changed the creation logic of the default role attachment in theIdentityPool
L2. This not only triggered redeployments, but did not allow for redeployment at all, as the new role attachment (with a different resource hash) was trying to be created before the old one was removed. This led to failed deployments, as only one role attachment can exist per identity pool.Description of changes
Brought back the
IdentityPoolRoleAttachment
L2 logic to prevent redeployment for customers using CDK<v2.179.0
. However, the construct is now no longer being exported, which preserves the original intention of preventing confusion about using this resource.Describe any new or updated permissions being added
N/A
Description of how you validated changes
yarn test && yarn integ test/integ.identitypool.js --update-on-failed
Checklist
BREAKING CHANGE: Any
IdentityPool
resources deployed in versions>=2.179.0
will now fail to deploy. You will need to delete theIdentityPoolRoleAttachment
from your stack via the console before redeploying.By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license