Skip to content

Commit cb831d2

Browse files
AWSAWS
authored andcommitted
v2.7.2
1 parent 83c0958 commit cb831d2

File tree

10 files changed

+214
-37
lines changed

10 files changed

+214
-37
lines changed

CHANGELOG.md

Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,48 @@ All notable changes to this project will be documented in this file.
44
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
55
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
66

7+
## [2.7.1] - 2024-05-30
8+
* Update dependencies & runtimes ([#186]((https://github.com/aws-solutions/aws-control-tower-customizations/issues/186)), [#193]((https://github.com/aws-solutions/aws-control-tower-customizations/issues/193)))
9+
* Building the solution from source now requires Python 3.11 or higher
10+
* Update Python Lambda runtimes to 3.11
11+
* Update Ruby version to 3.3
12+
* Update CodeBuild container image to `aws/codebuild/standard:7.0`
13+
* Pinned version for `PyYAML` to 5.3.1 due to [yaml/pyyaml#724](https://github.com/yaml/pyyaml/issues/724) ([#183](https://github.com/aws-solutions/aws-control-tower-customizations/issues/183), [#184](https://github.com/aws-solutions/aws-control-tower-customizations/issues/184))
14+
* Pinned version for `moto` to 4.2.14.
15+
* Add `UpdateReplacePolicy` and `DeletionPolicy` to lifecycle event queue and DLQ to improve deployment safety.
16+
17+
## [2.7.0] - 2023-11-10
18+
- Resolve `ConcurrentModificationException` errors that occur during parallel SCP deployments due to a race condition when enabling SCPs [#175](https://github.com/aws-solutions/aws-control-tower-customizations/issues/175)
19+
- Improve performance when querying for StackSet instance account IDs in large organizations [#174](https://github.com/aws-solutions/aws-control-tower-customizations/issues/174)
20+
- The CFCT pipeline now triggers on `UpdateManagedAccount` Control Tower lifecycle events, in addition to `CreateManagedAccount` events [#173](https://github.com/aws-solutions/aws-control-tower-customizations/issues/173)
21+
- Honor the `CodeCommitBranchName` stack parameter on the CFCT repo’s initial commit. The example code is now committed to your chosen branch instead of `main` [#117](https://github.com/aws-solutions/aws-control-tower-customizations/issues/117)
22+
- Enable the use of privately registered CloudFormation resources in customization templates (for example, the `AWSUtility::CloudFormation::CommandRunner` resource type) [#76](https://github.com/aws-solutions/aws-control-tower-customizations/issues/76)
23+
- CFCT now ignores non-existent OU targets when deploying SCPs, aligning with how non-existent OUs are treated when deploying StackSets [#126](https://github.com/aws-solutions/aws-control-tower-customizations/issues/126)
24+
25+
## [2.6.0] - 2023-05-18
26+
- Now supported in the following regions: me-south-1, af-south-1, eu-south-1, ap-east-1, us-west-1.
27+
- Manifest now allows the use of S3 global urls to download template files and uses regional urls as a fallback mechanism.
28+
- Eventbased triggers for CodePipeline deployments now supported.
29+
30+
## [2.5.3] - 2023-04-25
31+
- Bugfix: Add S3 bucket policy necessary for new CfCT deployments
32+
33+
## [2.5.2] - 2022-12-12
34+
- Fix bug where adding a resource to the middle of the manifest file caused CFCT to submit step function executions for all remaining manifest resources even if those resources had no changes
35+
- Drop polling wait time for step function execution status from 30s to 15s
36+
37+
## [2.5.1] - 2022-10-19
38+
- Add support for AWS GovCloud
39+
- Please note: using CFCT in AWS GovCloud requires the Control Tower home region to be AWS GovCloud West (us-gov-west-1)
40+
41+
## [2.5.0] - 2022-08-26
42+
- Support for opt-in deletion of Stack Set resources. This functionality is only supported when using the manifest v2 schema. Opting in to the new functionality reduces the overhead of manually deleting resources provisioned by CfCT.
43+
- In the manifest v2 schema, the `enable_stack_set_deletion` flag is set to `false` by default. In this configuration, when a resource is removed from Customizations for Control Tower's manifest, no actions will be taken against the StackSet removed.
44+
- Once opting into `enable_stack_set_deletion` by setting its value to `true` in the manifest, Removing a resource in its entirety from the manifest will delete the StackSet and all owned resources.
45+
- https://docs.aws.amazon.com/controltower/latest/userguide/cfct-delete-stack.html
46+
>**Note:** With `enable_stack_set_deletion` set to `true`, on the next invocation of CfCT, **ALL** resources not declared in the manifest, that start with the prefix `CustomControlTower-` and have the associated Tag: `"Key": "AWS_Solutions", "Value": "CustomControlTowerStackSet"` will be deleted
47+
- Bug Fix: Resolves a bug with CFCT versions >= 2.0.0 where using a v1 manifest format and defining a resource block without a parameter_file attribute (which is optional in v1 manifests) causes the CFCT pipeline to fail.
48+
749
## [2.4.0] - 2022-06-08
850
- Add support for CfCT pipeline to fail if any stack instances within a stack set deployment have failed
951
- New template parameter `EnforceSuccessfulStackInstances` can be set to True to achieve this behaviour

VERSION

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
v2.7.1
1+
v2.7.2

0 commit comments

Comments
 (0)