4119 Commits

Author SHA1 Message Date
Mariusz Nowak
8e85fe611b feat(Standalone): Support China mirror for binary downloads 2020-04-07 10:03:18 +12:00
Mariusz Nowak
8d4ed6dd2a refactor(AWS HTTP API): Unify warning messages 2020-04-07 09:57:21 +12:00
Mariusz Nowak
08ad5ce040 refactor(AWS HTTP API): Improve error message for 29s timeout 2020-04-07 09:57:21 +12:00
Edward Goubely
3138ef1771
fix(AWS ALB): Fix handling of provisioned concurrency (#7285) 2020-04-06 13:55:22 +12:00
Thomas Schaaf
001f56cf5a
fix: Recognize AWS Web Identify Credentials (#7442) 2020-04-02 17:32:06 +13:00
Mariusz Nowak
7a3a45f0b3 fix(AWS Lambda): Respect external IAM role at destinations
Fixes #7448
2020-03-20 11:15:21 +13:00
Mariusz Nowak
903ec8ce1c test: Move scope of final cleanup 2020-03-20 11:15:21 +13:00
Mariusz Nowak
dc958ff6bf refactor(AWS HTTP API): Ensure function name in a warning message 2020-03-17 21:57:41 +13:00
Mariusz Nowak
841aac941f fix(AWS HTTP API): Do not validate timeout when no httpApi event 2020-03-17 21:57:41 +13:00
Ada Ye
962506b435
fix(Templates): Fix support for ~/.. paths (#7381) 2020-03-17 10:33:09 +13:00
DougHamil
2d25e678cb
feat(AWS Websocket): routeResponseSelectionExpression setting (#7233)
Fixes #6130
2020-03-16 22:00:44 +13:00
Austin J. Alexander
9b627fbf7e
fix(AWS Websocket): Fix AWS partition support (#7430) 2020-03-09 12:19:15 +13:00
Arben Bakiu
7310782294
fix(Variables): Relax pattern to allow non-ascii defaults (#7431) 2020-03-08 09:43:16 +13:00
Mariusz Nowak
8ed6a6e7d7 feat(AWS Lambda): Support destinations configuration 2020-03-07 11:00:35 +13:00
Mariusz Nowak
55a98bdd47 refactor(AWS Lambda): Introduce reusable lambda ARN resolver 2020-03-07 11:00:35 +13:00
Mariusz Nowak
e8d4606a6a refactor(AWS Lambda): Reconfigure condition 2020-03-07 11:00:35 +13:00
Mariusz Nowak
0898664c68 fix(AWS Cognito): Fix pool update handling 2020-03-05 10:26:08 +13:00
Mariusz Nowak
b52a41d9ee fix(AWS HTTP API): Ensure function timeout setting is respected
Additionally deprecate (by not documenting) a `timeout` setting on HTT API endpoint.
As HTTP API endpoints can only be configured through functions, it seems logical to treat function timeout setting as the only source of truth.
2020-03-05 10:25:51 +13:00
Callum Smits
7d67f33b08
fix: Add source account to lambda permissions for s3 events (#7417) 2020-03-03 15:28:21 +13:00
Mariusz Nowak
df9846d9af feat(AWS HTTP API): Support timeout configuration 2020-02-28 11:26:44 +13:00
Arben Bakiu
d84e9e7d1e
fix: Fix handler resolution (multi . case) for local invocation (#7398) 2020-02-28 11:19:09 +13:00
Mariusz Nowak
f47b340e4f feat(AWS HTTP API): Support attachment to externally created API 2020-02-27 09:34:28 +13:00
Mariusz Nowak
69afca5a02 refactor: Provide room for more SDK requests when gathering stack info 2020-02-27 09:34:28 +13:00
Kamrul Hasan
6655a48f08
docs: Fix typo in Azure documentation (#7392) 2020-02-26 13:38:07 +13:00
Mariusz Nowak
f2cb89a3ca feat(AWS HTTP API): Support access logs configuration 2020-02-26 13:20:58 +13:00
Mariusz Nowak
6a13eee0d4 refactor(AWS HTTP API): Improve config resolution 2020-02-26 13:20:58 +13:00
Mariusz Nowak
3d79a7a169 fix(AWS HTTP API): Configure default stage explicity
It's the only option to ensure stage configuration can be enriched
and the only way to make catch all route removable
2020-02-26 12:11:37 +13:00
Arben Bakiu
5017f038d6
fix: Service state path resolution (#7388) 2020-02-26 10:22:51 +13:00
Alexandre Tremblay
19012a9068
feat(AWS APIGW): Support association of VPC endpoint ids (#7382) 2020-02-25 13:07:04 +13:00
darko1979
8518000d4f
fix: When packaging do not crash on deps with no package.json (#7368) 2020-02-25 09:40:37 +13:00
frozenbonito
90b3a8f81e
fix: Ensure AWS creds resolution for local docker invocation (#7375) 2020-02-24 17:18:29 +13:00
Geoff Baskwill
08ec261a3c
feat: Support resource.extensions for safe resource extensions (#7352)
Merge logic for extending resources with the existing framework
using `resources.Resources` has some surprising behaviours.

This introduces a more formalized definition for extending resources, where
`Metadata` and `Properties` will be shallowly merged (the values for existing
keys will be replaced instead of merged), the `DependsOn` list will be added
to, and the values for `CreationPolicy`, `DeletionPolicy`, `UpdatePolicy`, and
`UpdateReplacePolicy` will be replaced if they exist in the extension.

Extension of other resource attributes is not supported at this time.
2020-02-24 10:45:14 +13:00
Frédéric Barthelet
103fdacc29
fix: Ensure AWS EventBrigde target ids fit 64 chars limit (#7359) 2020-02-21 12:41:30 +13:00
Mariusz Nowak
4162353939 test: Workaround occasional race condition 2020-02-21 10:50:44 +13:00
Thomas Schaaf
9a0aaa843b
fix: Ensure consistency in IAM role and policy names (#7357) 2020-02-20 10:37:55 +13:00
tcastelli
292b1caf58
fix: Fix handling of redrivePolicy in SNS events. (#7277) 2020-02-19 14:17:30 +13:00
frozenbonito
c09f71897a
fix: Ensure AWS env vars in local invocation made with docker (#7349) 2020-02-19 13:52:33 +13:00
Mariusz Nowak
fbf99fa2ab feat(AWS HTTP API): JWT authorizers support 2020-02-18 14:59:28 +13:00
Mariusz Nowak
1dcc53be4c refactor(AWS HTTP API): Nest routeTargetData in config 2020-02-18 14:59:28 +13:00
coyoteecd
9b701a4056
feat(AWS APIGW): Support logs.restApi.roleManagedExternally (#7333) 2020-02-18 13:59:57 +13:00
Mariusz Nowak
ca69387285 feat(AWS HTTP API): CORS configuration 2020-02-17 14:25:19 +13:00
Mariusz Nowak
dfeca8e622 test(AWS HTTP API): Rename fixture 2020-02-17 14:25:19 +13:00
Mariusz Nowak
44c2342aeb fix(AWS HTTP API): Publish to default stage
Framework for each stage creates new API,
therefore there's no point in generating a stage
2020-02-17 13:41:09 +13:00
Mariusz Nowak
ed4b6efe69 test(AWS HTTP API): Fix typo 2020-02-17 13:41:09 +13:00
Isen
3910df1ba6
feat: Support provider.alb.targetGroupPrefix setting (#7322) 2020-02-14 15:49:02 +13:00
Zac Charles
9eba2187f9
feat: Support Kinesis Enhanced Fan-out (Consumer) streams (#7320) 2020-02-14 13:09:27 +13:00
Geoff Baskwill
7abb23edc8
feat: Support managedExternally option for authorizers (#7327)
There are use cases where an API creator does not have permissions to
add permissions to the custom authorizer lambda; one example is when
the custom authorizer lambda exists in a separate AWS account. In these
cases, we need to be able to omit the `AWS::Lambda::Permission` resource
from the stack.

This change adds the `managedExternally` attribute to the `authorizer`.
When `managedExternally` is `true`, the stack will not create the
`AWS::Lambda::Permission` resource.

**Important note:** The permission does still need to be created before
the stack is deployed, or creating the authorizer will fail.
2020-02-13 12:20:16 +13:00
Thomas Schaaf
09466b5a17
feat: Support provider.rolePermissionsBoundary to set IAM boundary (#7319) 2020-02-13 09:43:24 +13:00
Richard Davison
f6d9bfd6c6
feat: Improve performance of local invocation using docker (#7178) 2020-02-12 11:21:45 +13:00
Edmundo Rodrigues
0592a27dbc
feat: Support tweaking max concurrent artifcat uploads count (#7295) 2020-02-12 10:04:20 +13:00