Mariusz Nowak
8e85fe611b
feat(Standalone): Support China mirror for binary downloads
2020-04-07 10:03:18 +12:00
Mariusz Nowak
8d4ed6dd2a
refactor(AWS HTTP API): Unify warning messages
2020-04-07 09:57:21 +12:00
Mariusz Nowak
08ad5ce040
refactor(AWS HTTP API): Improve error message for 29s timeout
2020-04-07 09:57:21 +12:00
Edward Goubely
3138ef1771
fix(AWS ALB): Fix handling of provisioned concurrency ( #7285 )
2020-04-06 13:55:22 +12:00
Thomas Schaaf
001f56cf5a
fix: Recognize AWS Web Identify Credentials ( #7442 )
2020-04-02 17:32:06 +13:00
Mariusz Nowak
7a3a45f0b3
fix(AWS Lambda): Respect external IAM role at destinations
...
Fixes #7448
2020-03-20 11:15:21 +13:00
Mariusz Nowak
903ec8ce1c
test: Move scope of final cleanup
2020-03-20 11:15:21 +13:00
Mariusz Nowak
dc958ff6bf
refactor(AWS HTTP API): Ensure function name in a warning message
2020-03-17 21:57:41 +13:00
Mariusz Nowak
841aac941f
fix(AWS HTTP API): Do not validate timeout when no httpApi event
2020-03-17 21:57:41 +13:00
Ada Ye
962506b435
fix(Templates): Fix support for ~/.. paths ( #7381 )
2020-03-17 10:33:09 +13:00
DougHamil
2d25e678cb
feat(AWS Websocket): routeResponseSelectionExpression setting ( #7233 )
...
Fixes #6130
2020-03-16 22:00:44 +13:00
Austin J. Alexander
9b627fbf7e
fix(AWS Websocket): Fix AWS partition support ( #7430 )
2020-03-09 12:19:15 +13:00
Arben Bakiu
7310782294
fix(Variables): Relax pattern to allow non-ascii defaults ( #7431 )
2020-03-08 09:43:16 +13:00
Mariusz Nowak
8ed6a6e7d7
feat(AWS Lambda): Support destinations configuration
2020-03-07 11:00:35 +13:00
Mariusz Nowak
55a98bdd47
refactor(AWS Lambda): Introduce reusable lambda ARN resolver
2020-03-07 11:00:35 +13:00
Mariusz Nowak
e8d4606a6a
refactor(AWS Lambda): Reconfigure condition
2020-03-07 11:00:35 +13:00
Mariusz Nowak
0898664c68
fix(AWS Cognito): Fix pool update handling
2020-03-05 10:26:08 +13:00
Mariusz Nowak
b52a41d9ee
fix(AWS HTTP API): Ensure function timeout setting is respected
...
Additionally deprecate (by not documenting) a `timeout` setting on HTT API endpoint.
As HTTP API endpoints can only be configured through functions, it seems logical to treat function timeout setting as the only source of truth.
2020-03-05 10:25:51 +13:00
Callum Smits
7d67f33b08
fix: Add source account to lambda permissions for s3 events ( #7417 )
2020-03-03 15:28:21 +13:00
Mariusz Nowak
df9846d9af
feat(AWS HTTP API): Support timeout configuration
2020-02-28 11:26:44 +13:00
Arben Bakiu
d84e9e7d1e
fix: Fix handler resolution (multi . case) for local invocation ( #7398 )
2020-02-28 11:19:09 +13:00
Mariusz Nowak
f47b340e4f
feat(AWS HTTP API): Support attachment to externally created API
2020-02-27 09:34:28 +13:00
Mariusz Nowak
69afca5a02
refactor: Provide room for more SDK requests when gathering stack info
2020-02-27 09:34:28 +13:00
Kamrul Hasan
6655a48f08
docs: Fix typo in Azure documentation ( #7392 )
2020-02-26 13:38:07 +13:00
Mariusz Nowak
f2cb89a3ca
feat(AWS HTTP API): Support access logs configuration
2020-02-26 13:20:58 +13:00
Mariusz Nowak
6a13eee0d4
refactor(AWS HTTP API): Improve config resolution
2020-02-26 13:20:58 +13:00
Mariusz Nowak
3d79a7a169
fix(AWS HTTP API): Configure default stage explicity
...
It's the only option to ensure stage configuration can be enriched
and the only way to make catch all route removable
2020-02-26 12:11:37 +13:00
Arben Bakiu
5017f038d6
fix: Service state path resolution ( #7388 )
2020-02-26 10:22:51 +13:00
Alexandre Tremblay
19012a9068
feat(AWS APIGW): Support association of VPC endpoint ids ( #7382 )
2020-02-25 13:07:04 +13:00
darko1979
8518000d4f
fix: When packaging do not crash on deps with no package.json ( #7368 )
2020-02-25 09:40:37 +13:00
frozenbonito
90b3a8f81e
fix: Ensure AWS creds resolution for local docker invocation ( #7375 )
2020-02-24 17:18:29 +13:00
Geoff Baskwill
08ec261a3c
feat: Support resource.extensions for safe resource extensions ( #7352 )
...
Merge logic for extending resources with the existing framework
using `resources.Resources` has some surprising behaviours.
This introduces a more formalized definition for extending resources, where
`Metadata` and `Properties` will be shallowly merged (the values for existing
keys will be replaced instead of merged), the `DependsOn` list will be added
to, and the values for `CreationPolicy`, `DeletionPolicy`, `UpdatePolicy`, and
`UpdateReplacePolicy` will be replaced if they exist in the extension.
Extension of other resource attributes is not supported at this time.
2020-02-24 10:45:14 +13:00
Frédéric Barthelet
103fdacc29
fix: Ensure AWS EventBrigde target ids fit 64 chars limit ( #7359 )
2020-02-21 12:41:30 +13:00
Mariusz Nowak
4162353939
test: Workaround occasional race condition
2020-02-21 10:50:44 +13:00
Thomas Schaaf
9a0aaa843b
fix: Ensure consistency in IAM role and policy names ( #7357 )
2020-02-20 10:37:55 +13:00
tcastelli
292b1caf58
fix: Fix handling of redrivePolicy in SNS events. ( #7277 )
2020-02-19 14:17:30 +13:00
frozenbonito
c09f71897a
fix: Ensure AWS env vars in local invocation made with docker ( #7349 )
2020-02-19 13:52:33 +13:00
Mariusz Nowak
fbf99fa2ab
feat(AWS HTTP API): JWT authorizers support
2020-02-18 14:59:28 +13:00
Mariusz Nowak
1dcc53be4c
refactor(AWS HTTP API): Nest routeTargetData in config
2020-02-18 14:59:28 +13:00
coyoteecd
9b701a4056
feat(AWS APIGW): Support logs.restApi.roleManagedExternally ( #7333 )
2020-02-18 13:59:57 +13:00
Mariusz Nowak
ca69387285
feat(AWS HTTP API): CORS configuration
2020-02-17 14:25:19 +13:00
Mariusz Nowak
dfeca8e622
test(AWS HTTP API): Rename fixture
2020-02-17 14:25:19 +13:00
Mariusz Nowak
44c2342aeb
fix(AWS HTTP API): Publish to default stage
...
Framework for each stage creates new API,
therefore there's no point in generating a stage
2020-02-17 13:41:09 +13:00
Mariusz Nowak
ed4b6efe69
test(AWS HTTP API): Fix typo
2020-02-17 13:41:09 +13:00
Isen
3910df1ba6
feat: Support provider.alb.targetGroupPrefix setting ( #7322 )
2020-02-14 15:49:02 +13:00
Zac Charles
9eba2187f9
feat: Support Kinesis Enhanced Fan-out (Consumer) streams ( #7320 )
2020-02-14 13:09:27 +13:00
Geoff Baskwill
7abb23edc8
feat: Support managedExternally option for authorizers ( #7327 )
...
There are use cases where an API creator does not have permissions to
add permissions to the custom authorizer lambda; one example is when
the custom authorizer lambda exists in a separate AWS account. In these
cases, we need to be able to omit the `AWS::Lambda::Permission` resource
from the stack.
This change adds the `managedExternally` attribute to the `authorizer`.
When `managedExternally` is `true`, the stack will not create the
`AWS::Lambda::Permission` resource.
**Important note:** The permission does still need to be created before
the stack is deployed, or creating the authorizer will fail.
2020-02-13 12:20:16 +13:00
Thomas Schaaf
09466b5a17
feat: Support provider.rolePermissionsBoundary to set IAM boundary ( #7319 )
2020-02-13 09:43:24 +13:00
Richard Davison
f6d9bfd6c6
feat: Improve performance of local invocation using docker ( #7178 )
2020-02-12 11:21:45 +13:00
Edmundo Rodrigues
0592a27dbc
feat: Support tweaking max concurrent artifcat uploads count ( #7295 )
2020-02-12 10:04:20 +13:00