Skip to content

Commit 09e2ce0

Browse files
committed
v1.1.0 release
1 parent bf06093 commit 09e2ce0

File tree

230 files changed

+22123
-11232
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

230 files changed

+22123
-11232
lines changed

.env.example

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -31,10 +31,3 @@ ACCEPT_SOLUTION_TERMS_OF_USE="" # Must be set to "Accept" for the compute stack
3131
# commands in package.json use HUB_ACCOUNT_ID for the account hosting ECR
3232
# PRIVATE_ECR_REPO="example-repo-name" # The private ECR repo name for hosting the account cleaner image.
3333
# PRIVATE_ECR_REPO_REGION="us-east-1" # Region for the private ECR repo being used.
34-
35-
# E2E Test Configs (only required to run E2E test suite) (Optional)
36-
# DATA_STACK="InnovationSandbox-Data" # Name of the deployed Data stack.
37-
# COMPUTE_STACK="InnovationSandbox-Compute" # Name of the deployed Compute stack.
38-
# SANDBOX_ACCOUNT_ID="000000000000" # AWS account id to use for testing the account cleaner.
39-
# SANDBOX_ACCOUNT_ADMIN_ROLE_NAME="Admin" # The name of the administrative role to use in the test account.
40-
# EMAIL_FROM="[email protected]" # The email address to use for notifications during the e2e tests.

.gitignore

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ bom.json
1010
.env
1111
git-info
1212
build
13+
*.tsbuildinfo
1314

1415
# CDK asset staging directory
1516
.cdk.staging

CHANGELOG.md

Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,39 @@ All notable changes to this project will be documented in this file.
55
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
66
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
77

8+
## [1.1.0] - 2025-10-29
9+
10+
### Added
11+
12+
- Lease unfreezing capability allowing users to reinstate frozen leases ([#42](https://github.com/aws-solutions/innovation-sandbox-on-aws/issues/42))
13+
- Cost reporting groups feature for tracking and reporting costs by organizational groups ([#43](https://github.com/aws-solutions/innovation-sandbox-on-aws/issues/43))
14+
- Lease assignment functionality allowing administrators and managers to assign leases to other users([#44](https://github.com/aws-solutions/innovation-sandbox-on-aws/issues/44))
15+
- Prioritization of accounts that have been used less recently when selecting an account to use in a lease
16+
- Visibility configuration to set lease templates as PUBLIC or PRIVATE - PUBLIC templates are visible to all users, while PRIVATE templates are only accessible to Admin and Manager roles, enabling administrators to create restricted templates for specific use cases
17+
18+
### Fixed
19+
20+
- IP allow list configuration issues ([#35](https://github.com/aws-solutions/innovation-sandbox-on-aws/pull/35)) (@maniryu)
21+
- Filtered out Credit and Refund entries from cost explorer queries for more accurate reporting ([#36](https://github.com/aws-solutions/innovation-sandbox-on-aws/pull/47)) (@RuidiH)
22+
- Permission issue preventing deployment of IDC stack in delegated admin account
23+
- Execution does not exist bug in account cleaner step function
24+
25+
### Security
26+
27+
- Upgraded `aws-nuke` to mitigate:
28+
- [CVE-2025-47906](https://nvd.nist.gov/vuln/detail/CVE-2025-47906)
29+
- [CVE-2025-47907](https://nvd.nist.gov/vuln/detail/CVE-2025-47907)
30+
- Upgraded `vite` to mitigate [CVE-2025-62522](https://nvd.nist.gov/vuln/detail/CVE-2025-62522)
31+
- Upgraded `python3-pip` to mitigate [CVE-2025-8869](https://nvd.nist.gov/vuln/detail/CVE-2025-8869)
32+
- Upgraded `python3-pip-wheel` to mitigate [CVE-2025-8869](https://nvd.nist.gov/vuln/detail/CVE-2025-8869)
33+
- Upgraded `openssl-libs` to mitigate:
34+
- [CVE-2025-9230](https://nvd.nist.gov/vuln/detail/CVE-2025-9230)
35+
- [CVE-2025-9231](https://nvd.nist.gov/vuln/detail/CVE-2025-9231)
36+
- Upgraded `openssl-fips-provider-latest` to mitigate:
37+
- [CVE-2025-9230](https://nvd.nist.gov/vuln/detail/CVE-2025-9230)
38+
- [CVE-2025-9231](https://nvd.nist.gov/vuln/detail/CVE-2025-9231)
39+
- Upgraded `brace-expansion` to mitigate [CVE-2025-5889](https://nvd.nist.gov/vuln/detail/CVE-2025-5889)
40+
841
## [1.0.5] - 2025-10-09
942

1043
### Fixed

0 commit comments

Comments
 (0)