Tomasz Czubocha
6e87390918
style: fix formatting ( #12661 )
2024-07-03 12:18:09 -04:00
Tomasz Czubocha
ee8696357a
fix: call globalValidate and disassociateUsagePlan with this context ( #12660 )
2024-07-03 08:05:18 -04:00
Max Marze
e0d6a8acbb
fix: remove bluebird and set concurrency limits for packaging ( #12658 )
...
* fix: remove bluebird from zip-service
* fix: remove bluebird and set concurrency limits for packaging
2024-07-02 14:26:28 -04:00
Eslam λ Hefnawy
956d14a265
fix(cloudformation): ensure the Version property is a string ( #12647 )
2024-06-27 14:05:59 -04:00
Max Marze
893bfa7aef
chore: update eslint & prettier ( #12553 )
2024-05-29 11:51:04 -04:00
Max Marze
79df074fc7
feat: esbuild support ( #12462 )
...
* feat: zero config esbuild defaults
* feat: esbuild support
2024-05-06 15:22:16 -04:00
Austen
158f644cd0
feat: Refactor logging to reduce complexity ( #12432 )
...
* chore: Change logger
* chore: continue refactor
* chore: WIP
* chore: Sync
2024-04-17 13:26:31 -07:00
Tie
e1039ded5c
fix(AWS Schedule): Fix IAM role assignment ( #12030 )
2023-06-28 09:28:08 +02:00
Ben
483ea166fc
feat(AWS MSK): Support AT_TIMESTAMP starting position ( #12034 )
2023-06-22 13:19:32 +02:00
James Kyburz
a50773b60d
fix(AWS Websocket): Fix internal authorizers handling ( #11871 )
2023-06-20 14:10:49 +02:00
Inqnuam
04db0f045c
fix(AWS ALB): Recognize CIDR format at ip configuration ( #11889 )
2023-06-09 10:56:40 +02:00
Inqnuam
72b27cb4fe
fix(AWS ALB): Allow multiple http-header conditions ( #11888 )
2023-05-31 10:23:58 +02:00
AntonioGM
41e90c3043
fix(AWS CloudFront): Accept CF intrinsic functions in behavior
...
(PR #11994 )
2023-05-30 16:26:40 +02:00
Peter Reshetin
9d7b121bd1
feat(AWS Kinesis): More reliable consumer naming mode ( #9706 )
2023-05-17 14:44:07 +02:00
Tie
34d922d3d8
feat(AWS Schedule): AWS::Scheduler::Schedule based triggers ( #11935 )
2023-05-17 11:35:14 +02:00
Mitch Dempsey
d6de3346ce
feat(AWS EventBridge): Recognize $or in pattern property ( #11967 )
2023-05-15 17:48:41 +02:00
Rob Nielsen
75ce58b194
fix(AWS CloudWatch): Ensure no circular resource references ( #11893 )
2023-05-08 18:44:09 +02:00
Duy Tran
30dd50a90c
refactor: Remove BbPromise.bind usage ( #11875 )
2023-03-31 16:32:37 +02:00
Jonathan Keslin
93393777cb
feat(AWS CLoudFront): Recognize OriginAccessControlId field ( #11855 )
2023-03-24 10:23:54 +01:00
Anthony Roussel
2efe8169c9
feat(AWS EventBridge): description property ( #11821 )
2023-03-16 12:40:35 +01:00
Rob Nielsen
16dd286a1d
fix: Fix function references when represented by alias ( #11788 )
2023-03-14 12:39:51 +01:00
Duy Tran
1181780265
refactor: Replace _.entries with Object.entries ( #11793 )
2023-03-10 13:52:51 +01:00
Charlie Benger-Stevenson
6fe2ea5bc8
fix(AWS API Gateway): Fix support for provider.apiGateway.stage
...
(PR #11772 )
2023-03-03 17:18:54 +01:00
Martin Gerlach
7410275f66
feat(AWS Lambda): Ensure logs:TagResource permission to IAM role ( #11766 )
...
As announced by AWS in Dec 2022, there is a new API for tagging CloudWatch resources. New accounts/roles that need to tag CloudWatch LogGroups need the new `logs:TagResouce permission`.
2023-02-28 09:25:06 +01:00
ROSeaboyer
fc6bd57bbf
feat(AWS Schedule): Support CF instrinsic functions at .rate ( #11714 )
2023-01-31 09:48:06 +01:00
ROSeaboyer
b925c4cf9c
feat(AWS EventBridge): Support functions[].events[].eventBridge.name
...
(PR #11690 )
2023-01-19 15:03:44 +01:00
Jason Rowsell
57f27193e0
feat(AWS SQS): Support functions[].events[].sqs.maximumConcurrency
...
(PR #11678 )
2023-01-18 11:51:50 +01:00
ROSeaboyer
99cd9e69c1
refactor(AWS SQS): Optimize IAM permissions generation ( #11685 )
2023-01-18 11:49:40 +01:00
Shreyance Jain
e769570704
feat(AWS RabbitMQ): Support functions[].events[].filterPatterns ( #11659 )
2023-01-05 15:46:10 +01:00
Shreyance Jain
1b55710f0a
feat(AWS ActiveMQ): Support functions[].events[].filterPatterns ( #11656 )
2023-01-05 15:05:15 +01:00
Jason Rowsell
6a5e8d9ff3
feat(AWS Kafka): Support functions[].events[].filterPatterns ( #11645 )
2023-01-05 12:35:50 +01:00
Jason Rowsell
b7d6af6b13
feat(AWS SNS): Support functions[].events[].filterPolicyScope ( #11644 )
2022-12-30 16:16:55 +01:00
Shreyance Jain
63584a9a0d
feat(AWS MSK): Support functions[].events[].filterPatterns ( #11636 )
2022-12-28 15:12:47 +01:00
Jason Rowsell
906ea319dd
feat(AWS CloudFront): Recognize behavior.ResponseHeadersPolicyId
...
(PR #11633 )
2022-12-27 12:34:40 +01:00
timo92
2a5e11a997
feat: provider.logDataProtectionPolicy and functions[].logDataProtectionPolicy ( #11599 )
2022-12-20 14:28:39 +01:00
franzmango
4169ae183f
feat(AWS API Gateway): Allow CF funcs in authorizer.scopes ( #11505 )
2022-11-08 13:37:21 +01:00
Daniele Iasella
858758ea1e
feat(AWS Kafka): Support startingPositionTimestamp ( #11479 )
2022-11-07 15:14:32 +01:00
Pavan Andhukuri
0a49c4f5df
feat(AWS API Gateway): support provider.apiGateway.stage ( #11487 )
2022-10-31 13:02:55 +01:00
Daniele Iasella
5d41995c19
feat(AWS Kinesis): Support AT_TIMESTAMP starting position ( #11483 )
2022-10-31 10:30:42 +01:00
Jurriaan Proos
c5ca9b78fa
fix: Ensure maximum API gateway timeout ( #11453 )
2022-10-19 10:28:24 +02:00
Arthur Weber
65e9860838
feat(AWS CloudFront): Allow legacy behavior configuration ( #11411 )
2022-09-30 14:16:04 +02:00
Phil-Pinkowski
9bb3f11541
feat(AWS Kafka): Support consumerGroupId option ( #11345 )
2022-08-26 11:10:47 +02:00
Mariusz Nowak
91aff1d1c2
refactor: Remove obsolete comment
2022-08-16 13:52:34 +02:00
pjmattingly
b36cdf2db6
refactor: Replace _.flatten with Array.prototype.flat ( #11271 )
2022-07-28 12:42:51 +02:00
pjmattingly
4f7e12939c
refactor: Replace _.flatMap with Array.prototype.flatMap ( #11272 )
2022-07-28 10:45:41 +02:00
AustinMathuw
22802efde1
feat(AWS Cognito): Add Support for Custom Sender Triggers ( #11201 )
2022-07-26 18:20:50 +02:00
Corentin Doue
16b0cd60c9
feat(AWS HTTP API): Use the default API Gateway timeout of 30s ( #11223 )
2022-07-26 14:50:35 +02:00
Szymon Bartnik
9fd56fddbe
feat: Add X-Amzn-Trace-Id to default CORS headers ( #11168 )
2022-06-20 17:36:48 +02:00
Ariel Gordon
184cb030a8
feat(AWS MSK): Add support for SASL/SCRAM authentication ( #11060 )
2022-05-15 22:28:48 +02:00
Simon Archer
5af44a478e
feat(AWS S3): Support forceDeploy setting ( #11066 )
...
Co-authored-by: FIRE <48926119+Hibanka@users.noreply.github.com>
2022-05-13 08:57:06 +02:00